From 0e62554ad36a0bf8cf9e857049be5aceafc81d37 Mon Sep 17 00:00:00 2001 From: Siddarth Mandalika Date: Wed, 9 Sep 2020 16:47:37 +0530 Subject: [PATCH 001/341] Update-bl-ovw-4318240 --- .../bitlocker/bitlocker-overview.md | 50 +++++++++---------- 1 file changed, 25 insertions(+), 25 deletions(-) diff --git a/windows/security/information-protection/bitlocker/bitlocker-overview.md b/windows/security/information-protection/bitlocker/bitlocker-overview.md index 131a256f82..8dff04be1f 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-overview.md +++ b/windows/security/information-protection/bitlocker/bitlocker-overview.md @@ -29,9 +29,9 @@ This topic provides a high-level overview of BitLocker, including a list of syst BitLocker Drive Encryption is a data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers. -BitLocker provides the most protection when used with a Trusted Platform Module (TPM) version 1.2 or later. The TPM is a hardware component installed in many newer computers by the computer manufacturers. It works with BitLocker to help protect user data and to ensure that a computer has not been tampered with while the system was offline. +BitLocker provides the maximum protection when used with a trusted platform module (TPM) version 1.2 or later versions. The TPM is a hardware component installed in many newer computers by the computer manufacturers. It works with BitLocker to help protect user data and to ensure that a computer has not been tampered with while the system was offline. -On computers that do not have a TPM version 1.2 or later, you can still use BitLocker to encrypt the Windows operating system drive. However, this implementation will require the user to insert a USB startup key to start the computer or resume from hibernation. Starting with Windows 8, you can use an operating system volume password to protect the operating system volume on a computer without TPM. Both options do not provide the pre-startup system integrity verification offered by BitLocker with a TPM. +On computers that do not have a TPM version 1.2 or later versions, you can still use BitLocker to encrypt the Windows operating system drive. However, this implementation requires the user to insert a USB startup key to start the computer or resume from hibernation. Starting with Windows 8, you can use an operating system volume password to protect the operating system volume on a computer without TPM. Both options do not provide the pre-startup system integrity verification offered by BitLocker with a TPM. In addition to the TPM, BitLocker offers the option to lock the normal startup process until the user supplies a personal identification number (PIN) or inserts a removable device, such as a USB flash drive, that contains a startup key. These additional security measures provide multifactor authentication and assurance that the computer will not start or resume from hibernation until the correct PIN or startup key is presented. @@ -39,13 +39,13 @@ In addition to the TPM, BitLocker offers the option to lock the normal startup p Data on a lost or stolen computer is vulnerable to unauthorized access, either by running a software-attack tool against it or by transferring the computer's hard disk to a different computer. BitLocker helps mitigate unauthorized data access by enhancing file and system protections. BitLocker also helps render data inaccessible when BitLocker-protected computers are decommissioned or recycled. -There are two additional tools in the Remote Server Administration Tools, which you can use to manage BitLocker. +There are two additional tools in the Remote Server Administration Tools which you can use to manage BitLocker. - **BitLocker Recovery Password Viewer**. The BitLocker Recovery Password Viewer enables you to locate and view BitLocker Drive Encryption recovery passwords that have been backed up to Active Directory Domain Services (AD DS). You can use this tool to help recover data that is stored on a drive that has been encrypted by using BitLocker. The BitLocker Recovery Password Viewer tool is an extension for the Active Directory Users and Computers Microsoft Management Console (MMC) snap-in. By using this tool, you can examine a computer object's **Properties** dialog box to view the corresponding BitLocker recovery passwords. Additionally, you can right-click a domain container and then search for a BitLocker recovery password across all the domains in the Active Directory forest. To view recovery passwords, you must be a domain administrator, or you must have been delegated permissions by a domain administrator. - **BitLocker Drive Encryption Tools**. BitLocker Drive Encryption Tools include the command-line tools, manage-bde and repair-bde, and the BitLocker cmdlets for Windows PowerShell. Both manage-bde and the BitLocker cmdlets can be used to perform any task that can be accomplished through the -BitLocker control panel, and they are appropriate to use for automated deployments and other scripting scenarios. Repair-bde is provided for disaster recovery scenarios in which a BitLocker protected drive cannot be unlocked normally or by using the recovery console. +BitLocker control panel, and they are appropriate to be used for automated deployments and other scripting scenarios. Repair-bde is provided for disaster recovery scenarios in which a BitLocker-protected drive cannot be unlocked normally or by using the recovery console. ## New and changed functionality @@ -55,9 +55,9 @@ To find out what's new in BitLocker for Windows 10, such as support for the XTS BitLocker has the following hardware requirements: -For BitLocker to use the system integrity check provided by a Trusted Platform Module (TPM), the computer must have TPM 1.2 or later. If your computer does not have a TPM, enabling BitLocker requires that you save a startup key on a removable device, such as a USB flash drive. +For BitLocker to use the system integrity check provided by a trusted platform module (TPM), the computer must have TPM 1.2 or later versions. If your computer does not have a TPM, enabling BitLocker makes it mandatory for you to save a startup key on a removable device, such as a USB flash drive. -A computer with a TPM must also have a Trusted Computing Group (TCG)-compliant BIOS or UEFI firmware. The BIOS or UEFI firmware establishes a chain of trust for the pre-operating system startup, and it must include support for TCG-specified Static Root of Trust Measurement. A computer without a TPM does not require TCG-compliant firmware. +A computer with a TPM must also have a trusted computing group (TCG)-compliant BIOS or UEFI firmware. The BIOS or UEFI firmware establishes a chain of trust for the pre-operating system startup, and it must include support for TCG-specified Static Root of Trust Measurement. A computer without a TPM does not require TCG-compliant firmware. The system BIOS or UEFI firmware (for TPM and non-TPM computers) must support the USB mass storage device class, including reading small files on a USB flash drive in the pre-operating system environment. @@ -65,37 +65,37 @@ The system BIOS or UEFI firmware (for TPM and non-TPM computers) must support th > From Windows 7, you can encrypt an OS drive without a TPM and USB flash drive. For this procedure, see [Tip of the Day: Bitlocker without TPM or USB](https://blogs.technet.microsoft.com/tip_of_the_day/2014/01/22/tip-of-the-day-bitlocker-without-tpm-or-usb/). > [!NOTE] -> TPM 2.0 is not supported in Legacy and CSM Modes of the BIOS. Devices with TPM 2.0 must have their BIOS mode configured as Native UEFI only. The Legacy and Compatibility Support Module (CSM) options must be disabled. For added security Enable the Secure Boot feature. +> TPM 2.0 is not supported in Legacy and Compatibility Support Module (CSM) modes of the BIOS. Devices with TPM 2.0 must have their BIOS mode configured as native UEFI only. The Legacy and CSM options must be disabled. For added security, enable the secure boot feature. -> Installed Operating System on hardware in legacy mode will stop the OS from booting when the BIOS mode is changed to UEFI. Use the tool [MBR2GPT](https://docs.microsoft.com/windows/deployment/mbr-to-gpt) before changing the BIOS mode which will prepare the OS and the disk to support UEFI. +> Installed Operating System on hardware in Legacy mode stops the OS from booting when the BIOS mode is changed to UEFI. Use the tool [MBR2GPT](https://docs.microsoft.com/windows/deployment/mbr-to-gpt) before changing the BIOS mode, which prepares the OS and the disk to support UEFI. The hard disk must be partitioned with at least two drives: - The operating system drive (or boot drive) contains the operating system and its support files. It must be formatted with the NTFS file system. -- The system drive contains the files that are needed to load Windows after the firmware has prepared the system hardware. BitLocker is not enabled on this drive. For BitLocker to work, the system drive must not be encrypted, must differ from the operating system drive, and must be formatted with the FAT32 file system on computers that use UEFI-based firmware or with the NTFS file system on computers that use BIOS firmware. We recommend that system drive be approximately 350 MB in size. After BitLocker is turned on it should have approximately 250 MB of free space. +- The system drive contains the files that are needed to load Windows after the firmware has prepared the system hardware. BitLocker is not enabled on this drive. For BitLocker to work, the system drive must not be encrypted, must differ from the operating system drive, and must be formatted with the FAT32 file system on computers that use UEFI-based firmware or with the NTFS file system on computers that use BIOS firmware. We recommend that system drive be approximately 350 MB in size. After BitLocker is turned on, it should have approximately 250 MB of free space. -When installed on a new computer, Windows will automatically create the partitions that are required for BitLocker. +When installed on a new computer, Windows automatically creates the partitions that are required for BitLocker. -When installing the BitLocker optional component on a server you will also need to install the Enhanced Storage feature, which is used to support hardware encrypted drives. +When installing the BitLocker optional component on a server, you will also need to install the Enhanced Storage feature, which is used to support hardware encrypted drives. ## In this section | Topic | Description | | - | - | -| [Overview of BitLocker Device Encryption in Windows 10](bitlocker-device-encryption-overview-windows-10.md) | This topic for the IT professional provides an overview of the ways that BitLocker Device Encryption can help protect data on devices running Windows 10. | -| [BitLocker frequently asked questions (FAQ)](bitlocker-frequently-asked-questions.md) | This topic for the IT professional answers frequently asked questions concerning the requirements to use, upgrade, deploy and administer, and key management policies for BitLocker.| -| [Prepare your organization for BitLocker: Planning and policies](prepare-your-organization-for-bitlocker-planning-and-policies.md)| This topic for the IT professional explains how can you plan your BitLocker deployment. | -| [BitLocker basic deployment](bitlocker-basic-deployment.md) | This topic for the IT professional explains how BitLocker features can be used to protect your data through drive encryption. | -| [BitLocker: How to deploy on Windows Server](bitlocker-how-to-deploy-on-windows-server.md)| This topic for the IT professional explains how to deploy BitLocker on Windows Server.| -| [BitLocker: How to enable Network Unlock](bitlocker-how-to-enable-network-unlock.md) | This topic for the IT professional describes how BitLocker Network Unlock works and how to configure it. | -| [BitLocker: Use BitLocker Drive Encryption Tools to manage BitLocker](bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md)| This topic for the IT professional describes how to use tools to manage BitLocker.| -| [BitLocker: Use BitLocker Recovery Password Viewer](bitlocker-use-bitlocker-recovery-password-viewer.md) | This topic for the IT professional describes how to use the BitLocker Recovery Password Viewer. | -| [BitLocker Group Policy settings](bitlocker-group-policy-settings.md) | This topic for IT professionals describes the function, location, and effect of each Group Policy setting that is used to manage BitLocker. | -| [BCD settings and BitLocker](bcd-settings-and-bitlocker.md) | This topic for IT professionals describes the BCD settings that are used by BitLocker.| -| [BitLocker Recovery Guide](bitlocker-recovery-guide-plan.md)| This topic for IT professionals describes how to recover BitLocker keys from AD DS. | -| [Protect BitLocker from pre-boot attacks](protect-bitlocker-from-pre-boot-attacks.md)| This detailed guide will help you understand the circumstances under which the use of pre-boot authentication is recommended for devices running Windows 10, Windows 8.1, Windows 8, or Windows 7; and when it can be safely omitted from a device’s configuration. | +| [Overview of BitLocker Device Encryption in Windows 10](bitlocker-device-encryption-overview-windows-10.md) | This topic provides an overview of the ways in which BitLocker Device Encryption can help protect data on devices running Windows 10. | +| [BitLocker frequently asked questions (FAQ)](bitlocker-frequently-asked-questions.md) | This topic answers frequently asked questions concerning the requirements to use, upgrade, deploy and administer, and key management policies for BitLocker.| +| [Prepare your organization for BitLocker: Planning and policies](prepare-your-organization-for-bitlocker-planning-and-policies.md)| This topic explains the procedure you can use to plan your BitLocker deployment. | +| [BitLocker basic deployment](bitlocker-basic-deployment.md) | This topic explains how BitLocker features can be used to protect your data through drive encryption. | +| [BitLocker: How to deploy on Windows Server](bitlocker-how-to-deploy-on-windows-server.md)| This topic explains how to deploy BitLocker on Windows Server.| +| [BitLocker: How to enable Network Unlock](bitlocker-how-to-enable-network-unlock.md) | This topic describes how BitLocker Network Unlock works and how to configure it. | +| [BitLocker: Use BitLocker Drive Encryption Tools to manage BitLocker](bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md)| This topic describes how to use tools to manage BitLocker.| +| [BitLocker: Use BitLocker Recovery Password Viewer](bitlocker-use-bitlocker-recovery-password-viewer.md) | This topic describes how to use the BitLocker Recovery Password Viewer. | +| [BitLocker Group Policy settings](bitlocker-group-policy-settings.md) | This topic describes the function, location, and effect of each group policy setting that is used to manage BitLocker. | +| [BCD settings and BitLocker](bcd-settings-and-bitlocker.md) | This topic describes the BCD settings that are used by BitLocker.| +| [BitLocker Recovery Guide](bitlocker-recovery-guide-plan.md)| This topic describes how to recover BitLocker keys from AD DS. | +| [Protect BitLocker from pre-boot attacks](protect-bitlocker-from-pre-boot-attacks.md)| This detailed guide helps you understand the circumstances under which the use of pre-boot authentication is recommended for devices running Windows 10, Windows 8.1, Windows 8, or Windows 7; and when it can be safely omitted from a device’s configuration. | | [Troubleshoot BitLocker](troubleshoot-bitlocker.md) | This guide describes the resources that can help you troubleshoot BitLocker issues, and provides solutions for several common BitLocker issues. | -| [Protecting cluster shared volumes and storage area networks with BitLocker](protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md)| This topic for IT pros describes how to protect CSVs and SANs with BitLocker.| -| [Enabling Secure Boot and BitLocker Device Encryption on Windows 10 IoT Core](https://developer.microsoft.com/windows/iot/docs/securebootandbitlocker) | This topic covers how to use BitLocker with Windows 10 IoT Core | +| [Protecting cluster shared volumes and storage area networks with BitLocker](protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md)| This topic describes how to protect CSVs and SANs with BitLocker.| +| [Enabling Secure Boot and BitLocker Device Encryption on Windows 10 IoT Core](https://developer.microsoft.com/windows/iot/docs/securebootandbitlocker) | This topic describes how to use BitLocker with Windows 10 IoT Core | From 7c25707f554008254f6112943a29a73f28867abc Mon Sep 17 00:00:00 2001 From: Siddarth Mandalika Date: Wed, 9 Sep 2020 20:03:59 +0530 Subject: [PATCH 002/341] Update-bl-rcvgdplan-4318240 --- .../bitlocker-recovery-guide-plan.md | 92 ++++++++++--------- 1 file changed, 48 insertions(+), 44 deletions(-) diff --git a/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan.md b/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan.md index 943135fa94..864f32d49a 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan.md +++ b/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan.md @@ -23,9 +23,9 @@ ms.custom: bitlocker **Applies to** - Windows 10 -This topic for IT professionals describes how to recover BitLocker keys from AD DS. +This topic describes how to recover BitLocker keys from AD DS. -Organizations can use BitLocker recovery information saved in Active Directory Domain Services (AD DS) to access BitLocker-protected data. Creating a recovery model for BitLocker while you are planning your BitLocker deployment is recommended. +Organizations can use BitLocker recovery information saved in Active Directory Domain Services (AD DS) to access BitLocker-protected data. It is recommended to create a recovery model for BitLocker while you are planning your BitLocker deployment. This article assumes that you understand how to set up AD DS to back up BitLocker recovery information automatically, and what types of recovery information are saved to AD DS. @@ -35,15 +35,15 @@ This article does not detail how to configure AD DS to store the BitLocker reco BitLocker recovery is the process by which you can restore access to a BitLocker-protected drive in the event that you cannot unlock the drive normally. In a recovery scenario, you have the following options to restore access to the drive: -- The user can supply the recovery password. If your organization allows users to print or store recovery passwords, the user can type in the 48-digit recovery password that they printed or stored on a USB drive or with your Microsoft Account online. (Saving a recovery password with your Microsoft Account online is only allowed when BitLocker is used on a PC that is not a member of a domain). -- A data recovery agent can use their credentials to unlock the drive. If the drive is an operating system drive, the drive must be mounted as a data drive on another computer for the data recovery agent to unlock it. -- A domain administrator can obtain the recovery password from AD DS and use it to unlock the drive. Storing recovery passwords in AD DS is recommended to provide a way for IT professionals to be able to obtain recovery passwords for drives in their organization if needed. This method requires that you have enabled this recovery method in the BitLocker Group Policy setting **Choose how BitLocker-protected operating system drives can be recovered** located at **Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\Operating System Drives** in the Local Group Policy Editor. For more information, see [BitLocker Group Policy settings](bitlocker-group-policy-settings.md). +- **The user can supply the recovery password.** If your organization allows users to print or store recovery passwords, the users can type in the 48-digit recovery password that they printed or stored on a USB drive or with your Microsoft account online. (Saving a recovery password with your Microsoft account online is only allowed when BitLocker is used on a PC that is not a member of a domain). +- **Data recovery agents can use their credentials to unlock the drive.** If the drive is an operating system drive, the drive must be mounted as a data drive on another computer for the data recovery agent to unlock it. +- **A domain administrator can obtain the recovery password from AD DS and use it to unlock the drive.** Storing recovery passwords in AD DS is recommended to provide a way for IT professionals to be able to obtain recovery passwords for drives in their organization if needed. This method makes it mandatory for you to enable this recovery method in the BitLocker group policy setting **Choose how BitLocker-protected operating system drives can be recovered** located at **Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\Operating System Drives** in the Local Group Policy Editor. For more information, see [BitLocker Group Policy settings](bitlocker-group-policy-settings.md). ### What causes BitLocker recovery? The following list provides examples of specific events that will cause BitLocker to enter recovery mode when attempting to start the operating system drive: -- On PCs that use BitLocker Drive Encryption, or on devices such as tablets or phones that use [BitLocker Device Encryption](bitlocker-device-encryption-overview-windows-10.md) only, when an attack is detected, the device will immediately reboot and enter into BitLocker recovery mode. To take advantage of this functionality Administrators can set the **Interactive logon: Machine account lockout threshold** Group Policy setting located in **\\Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options** in the Local Group Policy Editor, or use the **MaxFailedPasswordAttempts** policy of [Exchange ActiveSync](https://technet.microsoft.com/library/aa998357.aspx) (also configurable through [Windows Intune](https://technet.microsoft.com/library/jj733621.aspx)), to limit the number of failed password attempts before the device goes into Device Lockout. +- On PCs that use BitLocker Drive Encryption, or on devices such as tablets or phones that use [BitLocker Device Encryption](bitlocker-device-encryption-overview-windows-10.md) only, when an attack is detected, the device immediately reboots and enters into BitLocker recovery mode. To take advantage of this functionality, administrators can set the **Interactive logon: Machine account lockout threshold** group policy setting located in **\\Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options** in the Local Group Policy Editor, or use the **MaxFailedPasswordAttempts** policy of [Exchange ActiveSync](https://technet.microsoft.com/library/aa998357.aspx) (also configurable through [Windows Intune](https://technet.microsoft.com/library/jj733621.aspx)) to limit the number of failed password attempts before the device goes into Device Lockout. - On devices with TPM 1.2, changing the BIOS or firmware boot device order causes BitLocker recovery. However, devices with TPM 2.0 do not start BitLocker recovery in this case. TPM 2.0 does not consider a firmware change of boot device order as a security threat because the OS Boot Loader is not compromised. - Having the CD or DVD drive before the hard drive in the BIOS boot order and then inserting or removing a CD or DVD. - Failing to boot from a network drive before booting from the hard drive. @@ -60,22 +60,23 @@ The following list provides examples of specific events that will cause BitLocke - Removing, inserting, or completely depleting the charge on a smart battery on a portable computer. - Changes to the master boot record on the disk. - Changes to the boot manager on the disk. -- Hiding the TPM from the operating system. Some BIOS or UEFI settings can be used to prevent the enumeration of the TPM to the operating system. When implemented, this option can make the TPM hidden from the operating system. When the TPM is hidden, BIOS and UEFI secure startup are disabled, and the TPM does not respond to commands from any software. -- Using a different keyboard that does not correctly enter the PIN or whose keyboard map does not match the keyboard map assumed by the pre-boot environment. This can prevent the entry of enhanced PINs. -- Modifying the Platform Configuration Registers (PCRs) used by the TPM validation profile. For example, including **PCR\[1\]** would result in BitLocker measuring most changes to BIOS settings, causing BitLocker to enter recovery mode even when non-boot critical BIOS settings change. +- Hiding the TPM from the operating system. Some BIOS or UEFI settings can be used to prevent the enumeration of the TPM to the operating system. When implemented, this option makes the TPM hidden from the operating system. When the TPM is hidden, BIOS and UEFI secure startup are disabled, and the TPM does not respond to commands from any software. +- Using a different keyboard that does not correctly enter the PIN or whose keyboard map does not match the keyboard map assumed by the pre-boot environment. This prevents the entry of enhanced PINs. +- Modifying the Platform Configuration Registers (PCRs) used by the TPM validation profile. For example, including **PCR\[1\]** results in BitLocker measuring most changes to BIOS settings, causing BitLocker to enter recovery mode even when non-boot critical BIOS settings change. > [!NOTE] - > Some computers have BIOS settings that skip measurements to certain PCRs, such as **PCR\[2\]**. Changing this setting in the BIOS would cause BitLocker to enter recovery mode because the PCR measurement will be different. + > Some computers have BIOS settings that skip measurements to certain PCRs such as **PCR\[2\]**. Changing this setting in the BIOS causes BitLocker to enter recovery mode because the PCR measurement will be different. - Moving the BitLocker-protected drive into a new computer. - Upgrading the motherboard to a new one with a new TPM. - Losing the USB flash drive containing the startup key when startup key authentication has been enabled. - Failing the TPM self-test. -- Having a BIOS, UEFI firmware, or an option ROM component that is not compliant with the relevant Trusted Computing Group standards for a client computer. For example, a non-compliant implementation may record volatile data (such as time) in the TPM measurements, causing different measurements on each startup and causing BitLocker to start in recovery mode. +- Having a BIOS, UEFI firmware, or an option ROM component that is not compliant with the relevant Trusted Computing Group (TCG) standards for a client computer. For example, a non-compliant implementation records volatile data (such as time) in the TPM measurements, causing different measurements on each startup and causing BitLocker to start in recovery mode. - Changing the usage authorization for the storage root key of the TPM to a non-zero value. > [!NOTE] > The BitLocker TPM initialization process sets the usage authorization value to zero, so another user or process must explicitly have changed this value. + **Question: Does it imply that another user or process should change this to a non-zero value?** - Disabling the code integrity check or enabling test signing on Windows Boot Manager (Bootmgr). - Pressing the F8 or F10 key during the boot process. @@ -83,16 +84,17 @@ The following list provides examples of specific events that will cause BitLocke - Using a BIOS hot key during the boot process to change the boot order to something other than the hard drive. > [!NOTE] -> Before you begin recovery, we recommend that you determine what caused recovery. This might help prevent the problem from occurring again in the future. For instance, if you determine that an attacker has modified your computer by obtaining physical access, you can create new security policies for tracking who has physical presence. After the recovery password has been used to recover access to the PC, BitLocker will reseal the encryption key to the current values of the measured components. +> Before you begin recovery, we recommend that you determine what caused recovery. This might help prevent the problem from occurring again in the future. For instance, if you determine that an attacker has modified your computer by obtaining physical access, you can create new security policies for tracking who has physical presence. After the recovery password has been used to recover access to the PC, BitLocker reseals the encryption key to the current values of the measured components. -For planned scenarios, such as a known hardware or firmware upgrades, you can avoid initiating recovery by temporarily suspending BitLocker protection. Because suspending BitLocker leaves the drive fully encrypted, the administrator can quickly resume BitLocker protection after the planned task has been completed. Using suspend and resume also reseals the encryption key without requiring the entry of the recovery key. +For planned scenarios, such as a known hardware or firmware upgrade, you can avoid initiating recovery by temporarily suspending BitLocker protection. Because suspending BitLocker leaves the drive fully encrypted, the administrator can quickly resume BitLocker protection after the planned task has been completed. Using suspend and resume also reseals the encryption key without requiring the entry of the recovery key. > [!NOTE] > If suspended BitLocker will automatically resume protection when the PC is rebooted, unless a reboot count is specified using the manage-bde command line tool. +**Question: The above sentence looks incomplete. Can more inputs be provided? Or does "if" need to be removed?** -If software maintenance requires the computer be restarted and you are using two-factor authentication, you can enable BitLocker Network Unlock to provide the secondary authentication factor when the computers do not have an on-premises user to provide the additional authentication method. +If software maintenance requires the computer to be restarted and you are using two-factor authentication, you can enable BitLocker Network Unlock feature to provide the secondary authentication factor when the computers do not have an on-premises user to provide the additional authentication method. -Recovery has been described within the context of unplanned or undesired behavior, but you can also cause recovery as an intended production scenario, in order to manage access control. For example, when you redeploy desktop or laptop computers to other departments or employees in your enterprise, you can force BitLocker into recovery before the computer is given to a new user. +Recovery has been described within the context of unplanned or undesired behavior, but you can also cause recovery as an intended production scenario, in order to manage access control. For example, when you redeploy desktop or laptop computers to other departments or employees in your enterprise, you can force BitLocker into recovery mode before the computer is given to a new user. ## Testing recovery @@ -101,14 +103,14 @@ Before you create a thorough BitLocker recovery process, we recommend that you t **To force a recovery for the local computer** 1. Click the **Start** button, type **cmd** in the **Start Search** box, right-click **cmd.exe**, and then click **Run as administrator**. -2. At the command prompt, type the following command and then press ENTER: +2. At the command prompt, type the following command and then press **ENTER**: `manage-bde -forcerecovery ` **To force recovery for a remote computer** 1. On the Start screen, type **cmd.exe**, and then click **Run as administrator**. -2. At the command prompt, type the following command and then press ENTER: +2. At the command prompt, type the following command and then press **ENTER**: `manage-bde. -ComputerName -forcerecovery ` > [!NOTE] @@ -136,20 +138,20 @@ When you determine your recovery process, you should: ### Self-recovery -In some cases, users might have the recovery password in a printout or a USB flash drive and can perform self-recovery. We recommend that your organization create a policy for self-recovery. If self-recovery includes using a password or recovery key stored on a USB flash drive, the users should be warned not to store the USB flash drive in the same place as the PC, especially during travel, for example if both the PC and the recovery items are in the same bag it would be very easy for access to be gained to the PC by an unauthorized user. Another policy to consider is having users contact the Helpdesk before or after performing self-recovery so that the root cause can be identified. +In some cases, users might have the recovery password in a printout or a USB flash drive and can perform self-recovery. We recommend that your organization creates a policy for self-recovery. If self-recovery includes using a password or recovery key stored on a USB flash drive, the users must be warned not to store the USB flash drive in the same place as the PC, especially during travel. For example, if both the PC and the recovery items are in the same bag it would be very easy for access to be gained to the PC by an unauthorized user. Another policy to consider is having users contact the Helpdesk before or after performing self-recovery so that the root cause can be identified. ### Recovery password retrieval -If the user does not have a recovery password in a printout or on a USB flash drive, the user will need to be able to retrieve the recovery password from an online source. If the PC is a member of a domain the recovery password can be backed up to AD DS. However, this does not happen by default, you must have configured the appropriate Group Policy settings before BitLocker was enabled on the PC. BitLocker Group Policy settings can be found in the Local Group Policy Editor or the Group Policy Management Console (GPMC) under **Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption**. The following policy settings define the recovery methods that can be used to restore access to a BitLocker-protected drive if an authentication method fails or is unable to be used. +If the user does not have a recovery password in a printout or on a USB flash drive, the user will need to be able to retrieve the recovery password from an online source. If the PC is a member of a domain, the recovery password can be backed up to AD DS. However, this does not happen by default; you must have configured the appropriate group policy settings before BitLocker was enabled on the PC. BitLocker group policy settings can be found in the Local Group Policy Editor or the Group Policy Management Console (GPMC) under **Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption**. The following policy settings define the recovery methods that can be used to restore access to a BitLocker-protected drive if an authentication method fails or is unable to be used. - **Choose how BitLocker-protected operating system drives can be recovered** - **Choose how BitLocker-protected fixed drives can be recovered** - **Choose how BitLocker-protected removable drives can be recovered** -In each of these policies, select **Save BitLocker recovery information to Active Directory Domain Services** and then choose which BitLocker recovery information to store in Active Directory Domain Services (AD DS). Select the **Do not enable BitLocker until recovery information is stored in AD +In each of these policies, select **Save BitLocker recovery information to Active Directory Domain Services** and then choose which BitLocker recovery information to store in AD DS, select the **Do not enable BitLocker until recovery information is stored in AD DS** check box if you want to prevent users from enabling BitLocker unless the computer is connected to the domain and the backup of BitLocker recovery information for the drive to AD DS succeeds. > [!NOTE] -> If the PCs are part of a workgroup, users should be advised to save their BitLocker recovery password with their Microsoft Account online. Having an online copy of your BitLocker recovery password is recommended to help ensure that you do not lose access to your data in the event that recovery is required. +> If the PCs are part of a workgroup, users are advised to save their BitLocker recovery password with their Microsoft account online. Having an online copy of your BitLocker recovery password is recommended to help ensure that you do not lose access to your data in the event of a recovery being required. The BitLocker Recovery Password Viewer for Active Directory Users and Computers tool allows domain administrators to view BitLocker recovery passwords for specific computer objects in Active Directory. @@ -167,37 +169,36 @@ You can use the name of the user's computer to locate the recovery password in A ### Verify the user's identity -You should verify that the person that is asking for the recovery password is truly the authorized user of that computer. You may also wish to verify that the computer with the name the user provided belongs to the user. +You should verify whether the person who is asking for the recovery password is truly the authorized user of that computer. You may also wish to verify whether the computer for which the user provided the name belongs to the user. ### Locate the recovery password in AD DS -Locate the Computer object with the matching name in AD DS. Because Computer object names are listed in the AD DS global catalog, you should be able to locate the object even if you have a multi-domain forest. +Locate the computer object with the matching name in AD DS. Because computer object names are listed in the AD DS global catalog, you should be able to locate the object even if you have a multi-domain forest. ### Multiple recovery passwords -If multiple recovery passwords are stored under a computer object in AD DS, the name of the BitLocker recovery information object includes the date that the password was created. +If multiple recovery passwords are stored under a computer object in AD DS, the name of the BitLocker recovery information object includes the date on which the password was created. -If at any time you are unsure what password to provide, or if you think you might be providing the incorrect password, ask the user to read the eight character password ID that is displayed in the recovery console. +If at any time you are unsure about the password to be provided, or if you think you might be providing the incorrect password, ask the user to read the 8-character password ID that is displayed in the recovery console. -Since the password ID is a unique value that is associated with each recovery password stored in AD DS, running a query using this ID will find the correct password to unlock the encrypted volume. +Since the password ID is a unique value that is associated with each recovery password stored in AD DS, running a query using this ID finds the correct password to unlock the encrypted volume. ### Gather information to determine why recovery occurred -Before you give the user the recovery password, you should gather any information that will help determine why the recovery was needed, in order to analyze the root cause during the post-recovery analysis. For more info about post-recovery analysis, see [Post-recovery analysis](#bkmk-planningpostrecovery). +Before you give the user the recovery password, you should gather any information that will help determine why the recovery was needed, in order to analyze the root cause during the post-recovery analysis. For more information about post-recovery analysis, see [Post-recovery analysis](#bkmk-planningpostrecovery). ### Give the user the recovery password -Because the recovery password is 48 digits long the user may need to record the password by writing it down or typing it on a different computer. If you are using MBAM, the recovery password will be regenerated after it is recovered from the MBAM database to avoid the security risks associated with an uncontrolled password. +Because the recovery password is 48 digits long, the user may need to record the password by writing it down or typing it on a different computer. If you are using MBAM, the recovery password will be regenerated after it is recovered from the MBAM database to avoid the security risks associated with an uncontrolled password. > [!NOTE] > Because the 48-digit recovery password is long and contains a combination of digits, the user might mishear or mistype the password. The boot-time recovery console uses built-in checksum numbers to detect input errors in each 6-digit block of the 48-digit recovery password, and offers the user the opportunity to correct such errors. ### Post-recovery analysis -When a volume is unlocked using a recovery password, an event is written to the event log and the platform validation measurements are reset in the TPM to match the current configuration. Unlocking the volume means that the encryption key has been released and is ready for on-the-fly encryption -when data is written to the volume, and on-the-fly decryption when data is read from the volume. After the volume is unlocked, BitLocker behaves the same way, regardless of how the access was granted. +When a volume is unlocked using a recovery password, an event is written to the event log and the platform validation measurements are reset in the TPM to match the current configuration. Unlocking the volume means that the encryption key has been released and is ready for on-the-fly encryption when data is written to the volume, and on-the-fly decryption when data is read from the volume. After the volume is unlocked, BitLocker behaves the same way, regardless of how the access was granted. -If you notice that a computer is having repeated recovery password unlocks, you might want to have an administrator can perform post-recovery analysis to determine the root cause of the recovery and refresh BitLocker platform validation so that the user no longer needs to enter a recovery password each time that the computer starts up. See: +If you notice that a computer is having repeated recovery password unlocks, you might want to have an administrator perform post-recovery analysis to determine the root cause of the recovery and refresh BitLocker platform validation so that the user no longer needs to enter a recovery password each time the computer starts up. See: - [Determine the root cause of the recovery](#bkmk-determinecause) - [Refresh BitLocker protection](#bkmk-refreshprotection) @@ -210,20 +211,20 @@ While an administrator can remotely investigate the cause of recovery in some ca Review and answer the following questions for your organization: -1. What BitLocker protection mode is in effect (TPM, TPM + PIN, TPM + startup key, startup key only)? Which PCR profile is in use on the PC? +1. Which BitLocker protection mode is in effect (TPM, TPM + PIN, TPM + startup key, startup key only)? Which PCR profile is in use on the PC? 2. Did the user merely forget the PIN or lose the startup key? If a token was lost, where might the token be? 3. If TPM mode was in effect, was recovery caused by a boot file change? -4. If recovery was caused by a boot file change, is this due to an intended user action (for example, BIOS upgrade), or to malicious software? +4. If recovery was caused by a boot file change, is the boot file change due to an intended user action (for example, BIOS upgrade), or a malicious software? 5. When was the user last able to start the computer successfully, and what might have happened to the computer since then? 6. Might the user have encountered malicious software or left the computer unattended since the last successful startup? -To help you answer these questions, use the BitLocker command-line tool to view the current configuration and protection mode (for example, **manage-bde -status**). Scan the event log to find events that help indicate why recovery was initiated (for example, if boot file change occurred). Both of these capabilities can be performed remotely. +To help you answer these questions, use the BitLocker command-line tool to view the current configuration and protection mode (for example, **manage-bde -status**). Scan the event log to find events that help indicate why recovery was initiated (for example, if a boot file change occurred). Both of these capabilities can be performed remotely. ### Resolve the root cause After you have identified what caused recovery, you can reset BitLocker protection and avoid recovery on every startup. -The details of this reset can vary according to the root cause of the recovery. If you cannot determine the root cause, or if malicious software or a rootkit might have infected the computer, Helpdesk should apply best-practice virus policies to react appropriately. +The details of this reset can vary according to the root cause of the recovery. If you cannot determine the root cause, or if a malicious software or a rootkit might have infected the computer, Helpdesk should apply best-practice virus policies to react appropriately. > [!NOTE] > You can perform a BitLocker validation profile reset by suspending and resuming BitLocker. @@ -240,9 +241,10 @@ If a user has forgotten the PIN, you must reset the PIN while you are logged on 1. Unlock the computer using the recovery password. 2. Reset the PIN: 1. Right-click the drive and then click **Change PIN** - 2. In the BitLocker Drive Encryption dialog, click **Reset a forgotten PIN**. If you are not logged in with an administrator account you must provide administrative credentials at this time. - 3. In the PIN reset dialog, provide and confirm the new PIN to use and then click **Finish**. -3. You will use the new PIN the next time you unlock the drive. + 2. In the BitLocker Drive Encryption dialog, click **Reset a forgotten PIN**. If you are not logged in with an administrator account, you must provide administrative credentials at this time. + 3. In the PIN reset dialog, provide and confirm the new PIN to be used and then click **Finish**. +You will use the new PIN the next time you unlock the drive. +**Question: I am removing the bulleted number for the above phrase because it sounds more like a step result** ### Lost startup key @@ -250,26 +252,28 @@ If you have lost the USB flash drive that contains the startup key, then you mus **To prevent continued recovery due to a lost startup key** -1. Log on as an administrator to the computer that has the lost startup key. +1. Log on as an administrator to the computer that has its startup key lost. +**Question: Is the above rephrased version implying the intended meaning?** 2. Open Manage BitLocker. -3. Click **Duplicate start up key**, insert the clean USB drive on which you are going to write the key and then click **Save**. +3. Click **Duplicate start up key**, insert the clean USB drive on which you are going to write the key, and then click **Save**. ### Changes to boot files -This error might occur if you updated the firmware. As a best practice you should suspend BitLocker before making changes the firmware and then resume protection after the update has completed. This prevents the computer from going into recovery mode. However if changes were made when BitLocker protection was on you can simply log on to the computer using the recovery password and the platform validation profile will be updated so that recovery will not occur the next time. +This error occurs if you updated the firmware. As a best practice, you should suspend BitLocker before making changes to the firmware and then resume protection after the update has completed. This prevents the computer from going into recovery mode. However, if changes were made when BitLocker protection was on, you can simply log on to the computer using the recovery password and the platform validation profile will be updated so that recovery will not occur the next time. ## Windows RE and BitLocker Device Encryption -Windows Recovery Environment (RE) can be used to recover access to a drive protected by [BitLocker Device Encryption](bitlocker-device-encryption-overview-windows-10.md). If a PC is unable to boot after two failures, Startup Repair will automatically start. When Startup Repair is launched automatically due to boot failures, it will only execute operating system and driver file repairs, provided that the boot logs or any available crash dump point to a specific corrupted file. In Windows 8.1 and later, devices that include firmware to support specific TPM measurements for PCR\[7\] the TPM can validate that Windows RE is a trusted operating environment and will unlock any BitLocker-protected drives if Windows RE has not been modified. If the Windows RE environment has been modified, for example the TPM has been disabled, the drives will stay locked until the BitLocker recovery key is provided. If Startup Repair is not able to be run automatically from the PC and instead Windows RE is manually started from a repair disk, the BitLocker recovery key must be provided to unlock the BitLocker–protected drives. +Windows Recovery Environment (RE) can be used to recover access to a drive protected by [BitLocker Device Encryption](bitlocker-device-encryption-overview-windows-10.md). If a PC is unable to boot after two failures, Startup Repair automatically starts. When Startup Repair is launched automatically due to boot failures, it executes only operating system and driver file repairs, provided that the boot logs or any available crash dump points to a specific corrupted file. In Windows 8.1 and later versions, devices that include firmware to support specific TPM measurements for PCR\[7\] **the TPM** can validate that Windows RE is a trusted operating environment and unlock any BitLocker-protected drives if Windows RE has not been modified. If the Windows RE environment has been modified, for example, the TPM has been disabled, the drives stay locked until the BitLocker recovery key is provided. If Startup Repair is not able to be run automatically from the PC and instead, Windows RE is manually started from a repair disk, the BitLocker recovery key must be provided to unlock the BitLocker–protected drives. +**Question: The marked instance of TPM above renders the sentence ambiguous. Need inputs on the same** ## BitLocker recovery screen -During BitLocker recovery, Windows can display a custom recovery message and hints that identify where a key can be retrieved from. These improvements can help a user during BitLocker recovery. +During BitLocker recovery, Windows displays a custom recovery message and a few hints that identify where a key can be retrieved from. These improvements can help a user during BitLocker recovery. ### Custom recovery message -BitLocker Group Policy settings in Windows 10, version 1511, let you confiure a custom recovery message and URL on the BitLocker recovery screen, which can include the address of the BitLocker self-service recovery portal, the IT internal website, or a phone number for support. +BitLocker group policy settings in Windows 10, version 1511, let you confiure a custom recovery message and URL on the BitLocker recovery screen, which can include the address of the BitLocker self-service recovery portal, the IT internal website, or a phone number for support. This policy can be configured using GPO under **Computer Configuration** > **Administrative Templates** > **Windows Components** > **BitLocker Drive Encryption** > **Operating System Drives** > **Configure pre-boot recovery message and URL**. From e9040e6411da18eaa5fcc7165ac40acbf5294974 Mon Sep 17 00:00:00 2001 From: Siddarth Mandalika Date: Thu, 10 Sep 2020 12:20:40 +0530 Subject: [PATCH 003/341] Update bitlocker-recovery-guide-plan.md --- .../bitlocker-recovery-guide-plan.md | 43 ++++++++++--------- 1 file changed, 23 insertions(+), 20 deletions(-) diff --git a/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan.md b/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan.md index 864f32d49a..d6fe5d24d0 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan.md +++ b/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan.md @@ -273,7 +273,7 @@ During BitLocker recovery, Windows displays a custom recovery message and a few ### Custom recovery message -BitLocker group policy settings in Windows 10, version 1511, let you confiure a custom recovery message and URL on the BitLocker recovery screen, which can include the address of the BitLocker self-service recovery portal, the IT internal website, or a phone number for support. +BitLocker group policy settings in Windows 10, version 1511, let you configure a custom recovery message and URL on the BitLocker recovery screen, which can include the address of the BitLocker self-service recovery portal, the IT internal website, or a phone number for support. This policy can be configured using GPO under **Computer Configuration** > **Administrative Templates** > **Windows Components** > **BitLocker Drive Encryption** > **Operating System Drives** > **Configure pre-boot recovery message and URL**. @@ -290,25 +290,25 @@ Example of customized recovery screen: ### BitLocker recovery key hints -BitLocker metadata has been enhanced in Windows 10, version 1903 to include information about when and where the BitLocker recovery key was backed up. This information is not exposed through the UI or any public API. It is used solely by the BitLocker recovery screen in the form of hints to help a user locate a volume’s recovery key. Hints are displayed on the recovery screen and refer to the location where key has been saved. Hints are displayed in both the modern (blue) and legacy (black) recovery screen. This applies to both the bootmanager recovery screen and the WinRE unlock screen. +BitLocker metadata has been enhanced in Windows 10, version 1903, to include information about when and where the BitLocker recovery key was backed up. This information is not exposed through the UI or any public API. It is used solely by the BitLocker recovery screen in the form of hints to help a user locate a volume’s recovery key. Hints are displayed on the recovery screen and refer to the location where the key has been saved. Hints are displayed on both the modern (blue) and legacy (black) recovery screen. This applies to both the bootmanager recovery screen and the WinRE unlock screen. ![Customized BitLocker recovery screen](./images/bl-password-hint2.png) > [!IMPORTANT] -> We don't recommend printing recovery keys or saving them to a file. Instead, use Active Directory backup or a cloud-based backup. Cloud-based backup includes Azure Active Directory (Azure AD) and Microsoft Account. +> We don't recommend printing recovery keys or saving them to a file. Instead, use Active Directory backup or a cloud-based backup. Cloud-based backup includes Azure Active Directory (Azure AD) and Microsoft account. -There are rules governing which hint is shown during the recovery (in order of processing): +There are rules governing which hint is shown during the recovery (in the order of processing): 1. Always display custom recovery message if it has been configured (using GPO or MDM). 2. Always display generic hint: "For more information, go to https://aka.ms/recoverykeyfaq." -3. If multiple recovery keys exist on the volume, prioritize the last created (and successfully backed up) recovery key. +3. If multiple recovery keys exist on the volume, prioritize the last-created (and successfully backed up) recovery key. 4. Prioritize keys with successful backup over keys that have never been backed up. 5. Prioritize backup hints in the following order for remote backup locations: **Microsoft Account > Azure AD > Active Directory**. 6. If a key has been printed and saved to file, display a combined hint, “Look for a printout or a text file with the key,” instead of two separate hints. -7. If multiple backups of the same type (remove vs. local) have been performed for the same recovery key, prioritize backup info with latest backed up date. -8. There is no specific hint for keys saved to an on-premises Active Directory. In this case, a custom message (if configured) or a generic message, “Contact your organization’s help desk,” will be displayed. -9. If two recovery keys are present on the disk, but only one has been successfully backed up, the system will ask for a key that has been backed up, even if another key is newer. +7. If multiple backups of the same type (remove vs. local) have been performed for the same recovery key, prioritize backup info with latest backed-up date. +8. There is no specific hint for keys saved to an on-premises Active Directory. In this case, a custom message (if configured) or a generic message, “Contact your organization’s help desk,” is displayed. +9. If two recovery keys are present on the disk, but only one has been successfully backed up, the system asks for a key that has been backed up, even if another key is newer. #### Example 1 (single recovery key with single backup) @@ -321,7 +321,8 @@ There are rules governing which hint is shown during the recovery (in order of p | Printed | No | | Saved to file | No | -**Result:** The hint for the Microsoft Account and custom URL are displayed. +**Result:** The hints for the Microsoft account and custom URL are displayed. + ![Example 1 of Customized BitLocker recovery screen](./images/rp-example1.PNG) @@ -424,38 +425,38 @@ If the recovery methods discussed earlier in this document do not unlock the vol > [!NOTE] > You must use the BitLocker Repair tool **repair-bde** to use the BitLocker key package. -The BitLocker key package is not saved by default. To save the package along with the recovery password in AD DS you must select the **Backup recovery password and key package** option in the Group Policy settings that control the recovery method. You can also export the key package from a working volume. For more details on how to export key packages, see [Retrieving the BitLocker Key Package](#bkmk-appendixc). +The BitLocker key package is not saved, by default. To save the package along with the recovery password in AD DS, you must select the **Backup recovery password and key package** option in the group policy settings that control the recovery method. You can also export the key package from a working volume. For more details on how to export key packages, see [Retrieving the BitLocker Key Package](#bkmk-appendixc). ## Resetting recovery passwords -You should invalidate a recovery password after it has been provided and used. It should also be done when you intentionally want to invalidate an existing recovery password for any reason. +You must invalidate a recovery password after it has been provided and used, and when you intentionally want to invalidate an existing recovery password for any reason. You can reset the recovery password in two ways: -- **Use manage-bde** You can use manage-bde to remove the old recovery password and add a new recovery password. The procedure identifies the command and the syntax for this method. -- **Run a script** You can run a script to reset the password without decrypting the volume. The sample script in the procedure illustrates this functionality. The sample script creates a new recovery password and invalidates all other passwords. +- **Use manage-bde**. You can use manage-bde to remove the old recovery password and add a new recovery password. The procedure identifies the command and the syntax for this method. +- **Run a script**. You can run a script to reset the password without decrypting the volume. The sample script in the procedure illustrates this functionality. The sample script creates a new recovery password and invalidates all other passwords. **To reset a recovery password using manage-bde** -1. Remove the previous recovery password +1. Remove the previous recovery password. ```powershell Manage-bde –protectors –delete C: –type RecoveryPassword ``` -2. Add the new recovery password +2. Add the new recovery password. ```powershell Manage-bde –protectors –add C: -RecoveryPassword ``` -3. Get the ID of the new recovery password. From the screen copy the ID of the recovery password. +3. Get the ID of the new recovery password. From the screen, copy the ID of the recovery password. ```powershell Manage-bde –protectors –get C: -Type RecoveryPassword ``` -4. Backup the new recovery password to AD DS +4. Backup the new recovery password to AD DS. ```powershell Manage-bde –protectors –adbackup C: -id {EXAMPLE6-5507-4924-AA9E-AFB2EB003692} @@ -466,6 +467,7 @@ You can reset the recovery password in two ways: **To run the sample recovery password script** 1. Save the following sample script in a VBScript file. For example: ResetPassword.vbs. +**Question: The sample script seems missing**. 2. At the command prompt, type a command similar to the following: **cscript ResetPassword.vbs** @@ -474,7 +476,7 @@ You can reset the recovery password in two ways: > This sample script is configured to work only for the C volume. You must customize the script to match the volume where you want to test password reset. > [!NOTE] -> To manage a remote computer, you can specify the remote computer name rather than the local computer name. +> To manage a remote computer, you must specify the remote computer name rather than the local computer name. You can use the following sample script to create a VBScript file to reset the recovery passwords. @@ -553,10 +555,11 @@ WScript.Echo "A new recovery password has been added. Old passwords have been re You can use two methods to retrieve the key package, as described in [Using Additional Recovery Information](#bkmk-usingaddrecovery): -- **Export a previously-saved key package from AD DS.** You must have Read access to BitLocker recovery passwords that are stored in AD DS. +- **Export a previously saved key package from AD DS.** You must have Read access to BitLocker recovery passwords that are stored in AD DS. - **Export a new key package from an unlocked, BitLocker-protected volume.** You must have local administrator access to the working volume, before any damage has occurred. -The following sample script exports all previously-saved key packages from AD DS. +The following sample script exports all previously saved key packages from AD DS. +**Question: Sample script seems missing** **To run the sample key package retrieval script** From 5c6b8264b0c5e4a14ec0bcb6594c1abd920e2f76 Mon Sep 17 00:00:00 2001 From: Siddarth Mandalika Date: Thu, 10 Sep 2020 12:23:40 +0530 Subject: [PATCH 004/341] Update bitlocker-recovery-guide-plan.md --- .../bitlocker/bitlocker-recovery-guide-plan.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan.md b/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan.md index d6fe5d24d0..b5795232b6 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan.md +++ b/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan.md @@ -360,7 +360,7 @@ There are rules governing which hint is shown during the recovery (in the order |----------------------|-----------------| | Saved to Microsoft Account | No | | Saved to Azure AD | No | -| Saved to Acive Directory | No | +| Saved to Active Directory | No | | Printed | No | | Saved to file | Yes | | Creation time | **1PM** | From 2b3d41e0c5945192efc7b208776f58307a6801d6 Mon Sep 17 00:00:00 2001 From: Siddarth Mandalika Date: Fri, 11 Sep 2020 19:10:56 +0530 Subject: [PATCH 005/341] Update prep-bl-policies-4457208 --- ...ion-for-bitlocker-planning-and-policies.md | 76 ++++++++++--------- 1 file changed, 39 insertions(+), 37 deletions(-) diff --git a/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md b/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md index baa25d7cf6..d42faca138 100644 --- a/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md +++ b/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md @@ -24,9 +24,9 @@ ms.custom: bitlocker - Windows 10 -This topic for the IT professional explains how can you plan your BitLocker deployment. +This topic explains how to plan your BitLocker deployment. -When you design your BitLocker deployment strategy, define the appropriate policies and configuration requirements based on the business requirements of your organization. The following topics will help you collect information that you can use to frame your decision-making process about deploying and managing BitLocker systems. +When you design your BitLocker deployment strategy, define the appropriate policies and configuration requirements based on the business requirements of your organization. The following topics help you collect information that you can use to frame your decision-making process about deploying and managing BitLocker systems. ## Audit your environment @@ -36,7 +36,7 @@ Use the following questions to help you document your organization's current dis 1. Are there policies to address which computers will use BitLocker and which computers will not use BitLocker? 2. What policies exist to control recovery password and recovery key storage? -3. What are the policies for validating the identity of users that need to perform BitLocker recovery? +3. What are the policies for validating the identity of users who need to perform BitLocker recovery? 4. What policies exist to control who in the organization has access to recovery data? 5. What policies exist to control computer decommissioning or retirement? @@ -51,17 +51,18 @@ The trusted platform module (TPM) is a hardware component installed in many newe In addition, BitLocker offers the option to lock the normal startup process until the user supplies a personal identification number (PIN) or inserts a removable USB device, such as a flash drive, that contains a startup key. These additional security measures provide multifactor authentication and assurance that the computer will not start or resume from hibernation until the correct PIN or startup key is presented. -On computers that do not have a TPM version 1.2 or higher, you can still use BitLocker to encrypt the Windows operating system volume. However, this implementation will require the user to insert a USB startup key to start the computer or resume from hibernation, and does not provide the pre-startup system integrity verification offered by BitLocker working with a TPM. +On computers that do not have TPM 1.2 or higher versions, you can still use BitLocker to encrypt the Windows operating system volume. However, this implementation requires the user to insert a USB startup key to start the computer or resume it from hibernation, and does not provide the pre-startup system integrity verification offered by BitLocker working with a TPM. ### BitLocker key protectors | Key protector | Description | | - | - | -| TPM | A hardware device used to help establish a secure root-of-trust. BitLocker only supports TPM version 1.2 or higher.| +| TPM | A hardware device used to help establish a secure root-of-trust. BitLocker only supports TPM 1.2 or higher versions.| | PIN | A user-entered numeric key protector that can only be used in addition to the TPM.| | Enhanced PIN | A user-entered alphanumeric key protector that can only be used in addition to the TPM.| | Startup key | An encryption key that can be stored on most removable media. This key protector can be used alone on non-TPM computers, or in conjunction with a TPM for added security.| -| Recovery password | A 48-digit number used to unlock a volume when it is in recovery mode. Numbers can often be typed on a regular keyboard, if the numbers on the normal keyboard are not responding you can always use the function keys (F1-F10) to input the numbers.| +**Question:Is the conjunction with a TPM on TPM-enabled computers? The flow of the sentence requires the mention of the computer type** +| Recovery password | A 48-digit number used to unlock a volume when it is in recovery mode. Numbers can often be typed on a regular keyboard. If the numbers on the normal keyboard are not responding, you can always use the function keys (F1-F10) to input the numbers.| | Recovery key| An encryption key stored on removable media that can be used for recovering data encrypted on a BitLocker volume.| ### BitLocker authentication methods @@ -69,24 +70,25 @@ On computers that do not have a TPM version 1.2 or higher, you can still use Bi | Authentication method | Requires user interaction | Description | | - | - | - | | TPM only| No| TPM validates early boot components.| -| TPM + PIN | Yes| TPM validates early boot components. The user must enter the correct PIN before the start-up process can continue, and before the drive can be unlocked. The TPM will enter lockout if the incorrect PIN is entered repeatedly to protect the PIN from brute force attacks. The number of repeated attempts that will trigger a lockout is variable.| +| TPM + PIN | Yes| TPM validates early boot components. The user must enter the correct PIN before the start-up process can continue, and before the drive can be unlocked. The TPM enters lockout if the incorrect PIN is entered repeatedly, to protect the PIN from brute force attacks. The number of repeated attempts that will trigger a lockout is variable.| | TPM + Network key | No | The TPM successfully validates early boot components, and a valid encrypted network key has been provided from the WDS server. This authentication method provides automatic unlock of operating system volumes at system reboot while still maintaining multifactor authentication. | | TPM + startup key| Yes| The TPM successfully validates early boot components, and a USB flash drive containing the startup key has been inserted.| | Startup key only | Yes| The user is prompted to insert the USB flash drive that holds the recovery key and/or startup key and reboot the computer.| -**Will you support computers without TPM version 1.2 or higher?** +**Will you support computers without TPM 1.2 or higher versions?** -Determine whether you will support computers that do not have a TPM version 1.2 or higher in your environment. If you choose to support BitLocker on this type of computer, a user must use a USB startup key to boot the system. This requires additional support processes similar to multifactor authentication. +Determine whether you will support computers that do not have a TPM 1.2 or higher versions in your environment. If you choose to support BitLocker on this type of computer, a user must use a USB startup key to boot the system. This requires additional support processes similar to multifactor authentication. **What areas of your organization need a baseline level of data protection?** -The TPM-only authentication method will provide the most transparent user experience for organizations that need a baseline level of data protection to meet security policies. It has the lowest total cost of ownership. TPM-only might also be more appropriate for computers that are unattended or that must reboot unattended. +The TPM-only authentication method provides the most transparent user experience for organizations that need a baseline level of data protection to meet security policies. It has the lowest total cost of ownership. TPM-only might also be more appropriate for computers that are unattended or that must reboot unattended. +**Question: Does reboot unattended imply reboot automatically?** However, TPM-only authentication method offers the lowest level of data protection. This authentication method protects against attacks that modify early boot components, but the level of protection can be affected by potential weaknesses in hardware or in the early boot components. BitLocker’s multifactor authentication methods significantly increase the overall level of data protection. **What areas of your organization need a more secure level of data protection?** -If there are areas of your organization where data residing on user computers is considered highly-sensitive, consider the best practice of deploying BitLocker with multifactor authentication on those systems. Requiring the user to input a PIN significantly increases the level of protection for the system. You can also use BitLocker Network Unlock to allow these computers to automatically unlock when connected to a trusted wired network that can provide the Network Unlock key. +If there are areas of your organization in which user systems with highly sensitive data are found, consider the best practice of deploying BitLocker with multifactor authentication on those systems. Requiring the user to input a PIN significantly increases the level of protection for the system. You can also use BitLocker Network Unlock feature to allow these computers to automatically unlock when connected to a trusted wired network that can provide the Network Unlock key. **What multifactor authentication method does your organization prefer?** @@ -94,23 +96,23 @@ The protection differences provided by multifactor authentication methods cannot ## TPM hardware configurations -In your deployment plan, identify what TPM-based hardware platforms will be supported. Document the hardware models from an OEM of your choice, so that their configurations can be tested and supported. TPM hardware requires special consideration during all aspects of planning and deployment. +In your deployment plan, identify what TPM-based hardware platforms will be supported. Document the hardware models from an OEM of your choice so that their configurations can be tested and supported. TPM hardware requires special consideration during all aspects of planning and deployment. ### TPM 1.2 states and initialization -For TPM 1.2, there are multiple possible states. Windows 10 automatically initializes the TPM, which brings it to an enabled, activated, and owned state. This is the state that BitLocker requires before it can use the TPM. +For TPM 1.2, there are multiple possible states. Windows 10 automatically initializes the TPM that is then brought to an enabled, activated, and owned state. This is the state that BitLocker requires before it can use the TPM. ### Endorsement keys -For a TPM to be usable by BitLocker, it must contain an endorsement key, which is an RSA key pair. The private half of the key pair is held inside the TPM and is never revealed or accessible outside the TPM. If the TPM does not contain an endorsement key, BitLocker will force the TPM to generate one automatically as part of BitLocker setup. +For a TPM to be usable by BitLocker, it must contain an endorsement key, which is an RSA key pair. The private half of the key pair is held inside the TPM and is never revealed or accessible outside the TPM. If the TPM does not contain an endorsement key, BitLocker forces the TPM to generate one automatically as part of BitLocker setup. -An endorsement key can be created at various points in the TPM’s lifecycle, but needs to be created only once for the lifetime of the TPM. If an endorsement key does not exist for the TPM, it must be created before TPM ownership can be taken. +An endorsement key can be created at various points in the TPM’s lifecycle, but it needs to be created only once for the lifetime of the TPM. If an endorsement key does not exist for the TPM, it must be created before TPM ownership can be taken. For more information about the TPM and the TCG, see the Trusted Computing Group: Trusted Platform Module (TPM) Specifications (). ## Non-TPM hardware configurations -Devices that do not include a TPM can still be protected by drive encryption. Windows To Go workspaces can be BitLocker protected using a startup password and PCs without a TPM can use a startup key. +Devices that do not include a TPM can still be protected by drive encryption. Windows To Go workspaces can be BitLocker-protected using a startup password, and PCs without a TPM can use a startup key. Use the following questions to identify issues that might affect your deployment in a non-TPM configuration: @@ -118,16 +120,16 @@ Use the following questions to identify issues that might affect your deployment - Do you have budget for USB flash drives for each of these computers? - Do your existing non-TPM devices support USB devices at boot time? -Test your individual hardware platforms with the BitLocker system check option while you are enabling BitLocker. The system check will ensure that BitLocker can read the recovery information from a USB device and encryption keys correctly before it encrypts the volume. CD and DVD drives cannot act as a block storage device and cannot be used to store the BitLocker recovery material. +Test your individual hardware platforms with the **BitLocker system check** option while you are enabling BitLocker. The system check ensures that BitLocker can read the recovery information from a USB device and encryption keys correctly before it encrypts the volume. CD and DVD drives cannot act as a block storage device and cannot be used to store the BitLocker recovery material. ## Disk configuration considerations To function correctly, BitLocker requires a specific disk configuration. BitLocker requires two partitions that meet the following requirements: -- The operating system partition contains the operating system and its support files; it must be formatted with the NTFS file system -- The system partition (or boot partition) contains the files that are needed to load Windows after the BIOS or UEFI firware has prepared the system hardware. BitLocker is not enabled on this partition. For BitLocker to work, the system partition must not be encrypted and must be on a different partition than the operating system. On UEFI platforms the system partition must be formatted with the FAT 32 file system. On BIOS platforms the system partition must be formatted with the NTFS file system. It should be at least 350 MB in size +- The operating system partition contains the operating system and its support files; it must be formatted with the NTFS file system. +- The system partition (or boot partition) contains the files that are needed to load Windows after the BIOS or UEFI firware has prepared the system hardware. BitLocker is not enabled on this partition. For BitLocker to work, the system partition must not be encrypted and must be on a different partition than the operating system. On UEFI platforms, the system partition must be formatted with the FAT 32 file system. On BIOS platforms, the system partition must be formatted with the NTFS file system. It should be at least 350 MB in size. -Windows setup will automatically configure the disk drives of your computer to support BitLocker encryption. +Windows setup automatically configures the disk drives of your computer to support BitLocker encryption. Windows Recovery Environment (Windows RE) is an extensible recovery platform that is based on Windows Pre-installation Environment (Windows PE). When the computer fails to start, Windows automatically transitions into this environment, and the Startup Repair tool in Windows RE automates the diagnosis and repair of an unbootable Windows installation. Windows RE also contains the drivers and tools that are needed to unlock a volume protected by BitLocker by providing a recovery key or recovery password. To use Windows RE in conjunction with BitLocker, the Windows RE boot image must reside on a volume that is not protected by BitLocker. @@ -135,29 +137,29 @@ Windows RE can also be used from boot media other than the local hard disk. If y ## BitLocker provisioning -In Windows Vista and Windows 7, BitLocker was provisioned post installation for system and data volumes through either the manage-bde command line interface or the Control Panel user interface. With newer operating systems, BitLocker can be easily provisioned before the operating system is installed. Preprovisioning requires that the computer have a TPM. +In Windows Vista and Windows 7, BitLocker was provisioned post-installation for system and data volumes through either the manage-bde command line interface or the Control Panel user interface. With newer operating systems, BitLocker can be easily provisioned before the operating system is installed. Preprovisioning requires the computer to have a TPM. -To check the BitLocker status of a particular volume, administrators can look at the status of the drive in the BitLocker control panel applet or Windows Explorer. A status of "Waiting For Activation" with a yellow exclamation icon means that the drive was preprovisioned for BitLocker. This status means that there was only a clear protector used when encrypting the volume. In this case, the volume is not protected and needs to have a secure key added to the volume before the drive is considered fully protected. Administrators can use the control panel options, manage-bde tool or WMI APIs to add an appropriate key protector and the volume status will be updated. +To check the BitLocker status of a particular volume, administrators can look at the status of the drive in the BitLocker control panel applet or Windows Explorer. A status of "Waiting For Activation" with a yellow exclamation icon means that the drive was preprovisioned for BitLocker. This status means that there was only a clear protector used when encrypting the volume. In this case, the volume is not protected and needs to have a secure key added to the it before the drive is considered fully protected. Administrators can use the Control Panel options, manage-bde tool or WMI APIs to add an appropriate key protector, and the volume status will be updated. -When using the control panel options, administrators can choose to **Turn on BitLocker** and follow the steps in the wizard to add a protector, such as a PIN for an operating system volume (or a password if no TPM exists), or a password or smart card protector to a data volume. Then the drive security window is presented prior to changing the volume status. +When using the Control Panel options, administrators can choose to **Turn on BitLocker** and follow the steps in the wizard to add a protector, such as a PIN for an operating system volume (or a password if no TPM exists), or a password or smart card protector to a data volume. Then, the drive security window is presented prior to changing the volume status. -Administrators can enable BitLocker prior to operating system deployment from the Windows Pre-installation Environment (WinPE). This is done with a randomly generated clear key protector applied to the formatted volume and encrypting the volume prior to running the Windows setup process. If the encryption uses the Used Disk Space Only option this step takes only a few seconds and so incorporates well into regular deployment processes. +Administrators can enable BitLocker prior to operating system deployment from the Windows Pre-installation Environment (WinPE). This is done with a randomly generated clear key protector being applied to the formatted volume and made to encrypt the volume prior to running the Windows setup process (**Question: Is the change made to this sentence complying the intended meaning?**. If the encryption uses the **Used Disk Space Only** option, this step takes only a few seconds, and therefore, incorporates well into regular deployment processes. ## Used Disk Space Only encryption -The BitLocker Setup wizard provides administrators the ability to choose the Used Disk Space Only or Full encryption method when enabling BitLocker for a volume. Administrators can use the new BitLocker Group Policy setting to enforce either Used Disk Space Only or Full disk encryption. +The BitLocker Setup wizard provides administrators the ability to choose the Used Disk Space Only or Full encryption method when enabling BitLocker for a volume. Administrators can use the new BitLocker group policy setting to enforce either Used Disk Space Only or Full disk encryption. Launching the BitLocker Setup wizard prompts for the authentication method to be used (password and smart card are available for data volumes). Once the method is chosen and the recovery key is saved, you are asked to choose the drive encryption type, either Used Disk Space Only or Full drive encryption. -Used Disk Space Only means that only the portion of the drive that contains data will be encrypted, unused space will remain unencrypted. This causes the encryption process to be much faster, especially for new PCs and data drives. When BitLocker is enabled with this method as data is added to the drive the portion of the drive used will be encrypted, so there is never unencrypted data stored on the drive. +Used Disk Space Only means that only the portion of the drive that contains data is encrypted, and that the unused space remains unencrypted. This causes the encryption process to be much faster, especially for new PCs and data drives. When BitLocker is enabled with this method on data being added to the drive, the portion of the drive used is encrypted; thus, there is never unencrypted data stored on the drive. -Full drive encryption means that the entire drive will be encrypted, regardless of whether data is stored on it or not. This is useful for drives that have been repurposed and may contain data remnants from their previous use. +Full drive encryption means that the entire drive is encrypted, regardless of whether data is stored on it or not. This is useful for drives that have been repurposed and that may contain data remnants from their previous use. ## Active Directory Domain Services considerations -BitLocker integrates with Active Directory Domain Services (AD DS) to provide centralized key management. By default, no recovery information is backed up to Active Directory. Administrators can configure the following Group Policy setting for each drive type to enable backup of BitLocker recovery information: +BitLocker integrates with Active Directory Domain Services (AD DS) to provide centralized key management. By default, no recovery information is backed up to Active Directory. Administrators can configure the following group policy setting for each drive type to enable backup of BitLocker recovery information: -Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\*drive type*\\Choose how BitLocker protected drives can be recovered. +Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\*drive type*\\Choose how BitLocker-protected drives can be recovered. By default, only Domain Admins have access to BitLocker recovery information, but [access can be delegated to others](https://blogs.technet.microsoft.com/craigf/2011/01/26/delegating-access-in-ad-to-bitlocker-recovery-information/). @@ -169,28 +171,28 @@ The following recovery data is saved for each computer object: - **Key package data** - With this key package and the recovery password, you will be able decrypt portions of a BitLocker-protected volume if the disk is severely damaged. Each key package will only work with the volume it was created on, which can be identified by the corresponding volume ID. + With this key package and the recovery password, you will be able to decrypt portions of a BitLocker-protected volume if the disk is severely damaged. Each key package works only with the volume it was created on, which is identified by the corresponding volume ID. ## FIPS support for recovery password protector -Functionality introduced in Windows Server 2012 R2 and Windows 8.1, allows BitLocker to be fully functional in FIPS mode. +Functionality introduced in Windows Server 2012 R2 and Windows 8.1 allows BitLocker to be fully functional in FIPS mode. > [!NOTE] -> The United States Federal Information Processing Standard (FIPS) defines security and interoperability requirements for computer systems that are used by the U.S. federal government. The FIPS 140 standard defines approved cryptographic algorithms. The FIPS 140 standard also sets forth requirements for key generation and for key management. The National Institute of Standards and Technology (NIST) uses the Cryptographic Module Validation Program (CMVP) to determine whether a particular implementation of a cryptographic algorithm is compliant with the FIPS 140 standard. An implementation of a cryptographic algorithm is considered FIPS 140-compliant only if it has been submitted for and has passed NIST validation. An algorithm that has not been submitted cannot be considered FIPS-compliant even if the implementation produces identical data as a validated implementation of the same algorithm. +> The United States Federal Information Processing Standard (FIPS) defines security and interoperability requirements for computer systems that are used by the U.S. Federal Government. The FIPS-140 standard defines approved cryptographic algorithms. The FIPS-140 standard also sets forth requirements for key generation and for key management. The National Institute of Standards and Technology (NIST) uses the Cryptographic Module Validation Program (CMVP) to determine whether a particular implementation of a cryptographic algorithm is compliant with the FIPS-140 standard. An implementation of a cryptographic algorithm is considered FIPS-140-compliant only if it has been submitted for and has passed NIST validation. An algorithm that has not been submitted cannot be considered FIPS-compliant even if the implementation produces identical data as a validated implementation of the same algorithm. Prior to these supported versions of Windows, when Windows was in FIPS mode, BitLocker prevented the creation or use of recovery passwords and instead forced the user to use recovery keys. For more information about these issues, see the support article [kb947249](https://support.microsoft.com/kb/947249). But on computers running these supported systems with BitLocker enabled: -- FIPS-compliant recovery password protectors can be created when Windows is in FIPS mode. These protectors use the FIPS 140 NIST SP800-132 algorithm. +- FIPS-compliant recovery password protectors can be created when Windows is in FIPS mode. These protectors use the FIPS-140 NIST SP800-132 algorithm. - Recovery passwords created in FIPS mode on Windows 8.1 can be distinguished from recovery passwords created on other systems. -- Recovery unlock using the FIPS-compliant algorithm based recovery password protector work in all cases that currently work for recovery passwords. -- When FIPS-compliant recovery passwords unlock volumes, the volume is unlocked to allow read/write access even while in FIPS mode. +- Recovery unlock using the FIPS-compliant algorithm-based recovery password protector works in all cases that currently work for recovery passwords (**Question: Is this edited sentence conveying the intended meaning?**. +- When FIPS-compliant recovery passwords unlock volumes, the volume is allowed read/write access even while in FIPS mode. - FIPS-compliant recovery password protectors can be exported and stored in AD a while in FIPS mode. -The BitLocker Group Policy settings for recovery passwords work the same for all Windows versions that support BitLocker, whether in FIPs mode or not. +The BitLocker Group Policy settings for recovery passwords work the same for all Windows versions that support BitLocker, whether in FIPS mode or not. -However, you cannot use recovery passwords generated on a system in FIPS mode for systems earlier than Windows Server 2012 R2 and Windows 8.1. Recovery passwords created on Windows Server 2012 R2 and Windows 8.1 are incompatible with BitLocker on operating systems prior to Windows Server 2012 R2 and Windows 8.1; so recovery keys should be used instead. +However, you cannot use recovery passwords generated on a system in FIPS mode for systems earlier than Windows Server 2012 R2 and Windows 8.1. Recovery passwords created on Windows Server 2012 R2 and Windows 8.1 are incompatible with BitLocker on operating systems prior to Windows Server 2012 R2 and Windows 8.1; therefore, recovery keys should be used, instead. ## More information From 9f8bee674ba7a9785d7840b5f92aa9a1884b124b Mon Sep 17 00:00:00 2001 From: Siddarth Mandalika Date: Fri, 11 Sep 2020 19:17:31 +0530 Subject: [PATCH 006/341] Update prepare-your-organization-for-bitlocker-planning-and-policies.md --- ...are-your-organization-for-bitlocker-planning-and-policies.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md b/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md index d42faca138..f523d4f8af 100644 --- a/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md +++ b/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md @@ -127,7 +127,7 @@ Test your individual hardware platforms with the **BitLocker system check** opti To function correctly, BitLocker requires a specific disk configuration. BitLocker requires two partitions that meet the following requirements: - The operating system partition contains the operating system and its support files; it must be formatted with the NTFS file system. -- The system partition (or boot partition) contains the files that are needed to load Windows after the BIOS or UEFI firware has prepared the system hardware. BitLocker is not enabled on this partition. For BitLocker to work, the system partition must not be encrypted and must be on a different partition than the operating system. On UEFI platforms, the system partition must be formatted with the FAT 32 file system. On BIOS platforms, the system partition must be formatted with the NTFS file system. It should be at least 350 MB in size. +- The system partition (or boot partition) contains the files that are needed to load Windows after the BIOS or UEFI firmware has prepared the system hardware. BitLocker is not enabled on this partition. For BitLocker to work, the system partition must not be encrypted and must be on a different partition than the operating system. On UEFI platforms, the system partition must be formatted with the FAT 32 file system. On BIOS platforms, the system partition must be formatted with the NTFS file system. It should be at least 350 MB in size. Windows setup automatically configures the disk drives of your computer to support BitLocker encryption. From 31c849116414ce3f6ddeb27224078d1998bd9dda Mon Sep 17 00:00:00 2001 From: Siddarth Mandalika Date: Wed, 23 Sep 2020 19:10:34 +0530 Subject: [PATCH 007/341] Update protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md --- ...nd-storage-area-networks-with-bitlocker.md | 79 +++++++++---------- 1 file changed, 39 insertions(+), 40 deletions(-) diff --git a/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md b/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md index ac7c00f8b6..2dc14bd0e6 100644 --- a/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md +++ b/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md @@ -23,30 +23,29 @@ ms.custom: bitlocker **Applies to** - Windows Server 2016 -This topic for IT pros describes how to protect CSVs and SANs with BitLocker. +This topic describes the procedure to protect CSVs and SANs by using BitLocker. -BitLocker can protect both physical disk resources and cluster shared volumes version 2.0 (CSV2.0). BitLocker on clustered volumes allows for an additional layer of protection for administrators wishing to protect sensitive, highly available data. By adding additional protectors to the clustered volume, administrators can also add an additional barrier of security to resources within an organization by allowing only certain user accounts access to unlock the BitLocker volume. +BitLocker protects both physical disk resources and cluster shared volumes version 2.0 (CSV2.0). BitLocker on clustered volumes allows for an additional layer of protection for administrators wishing to protect sensitive, highly available data. By adding additional protectors to the clustered volume, administrators are adding an additional barrier of security to resources within an organization by allowing only certain user accounts access to unlock the BitLocker volume. ## Configuring BitLocker on Cluster Shared Volumes -### Using BitLocker with Clustered Volumes +### Using BitLocker with clustered volumes -BitLocker on volumes within a cluster are managed based on how the cluster service "views" the volume to be protected. The volume can be a physical disk resource such as a logical unit number (LUN) on a storage area network (SAN) or network attached storage (NAS). +Volumes within a cluster are managed with the help of BitLocker based on how the cluster service "views" the volume to be protected. The volume can be a physical disk resource such as a logical unit number (LUN) on a storage area network (SAN) or network attached storage (NAS). >**Important**  SANs used with BitLocker must have obtained Windows Hardware Certification. For more info, see [Windows Hardware Lab Kit](https://msdn.microsoft.com/library/windows/hardware/dn930814.aspx). -Alternatively, the volume can be a cluster-shared volume, a shared namespace, within the cluster. Windows Server 2012 expanded the CSV architecture, now known as CSV2.0, to enable support for BitLocker. When using BitLocker with volumes designated for a cluster, the volume will need to turn on -BitLocker before its addition to the storage pool within cluster or put the resource into maintenance mode before BitLocker operations will complete. +Alternatively, the volume can be a cluster-shared volume, a shared namespace, within the cluster **Question: Can it be rephrased as the volume can be one that is shared within the cluster?**. Windows Server 2012 expanded the CSV architecture, now known as CSV2.0, to enable support for BitLocker. When using BitLocker with volumes designated for a cluster, the volume must turn on BitLocker before its addition to the storage pool within cluster or put the resource into maintenance mode before BitLocker operations will complete. Windows PowerShell or the manage-bde command line interface is the preferred method to manage BitLocker on CSV2.0 volumes. This is recommended over the BitLocker Control Panel item because CSV2.0 volumes are mount points. Mount points are an NTFS object that is used to provide an entry point to other volumes. Mount points do not require the use of a drive letter. Volumes that lack drive letters do not appear in the BitLocker Control Panel item. Additionally, the new Active Directory-based protector option required for cluster disk resource or CSV2.0 resources is not available in the Control Panel item. ->**Note:**  Mount points can be used to support remote mount points on SMB based network shares. This type of share is not supported for BitLocker encryption. +>**Note:**  Mount points can be used to support remote mount points on SMB-based network shares. This type of share is not supported for BitLocker encryption. -For thinly provisioned storage, such as a Dynamic Virtual Hard Disk (VHD), BitLocker runs in Used Disk Space Only encryption mode. You cannot use the **manage-bde -WipeFreeSpace** command to transition the volume to full-volume encryption on these types of volumes. This is blocked in order to avoid expanding thinly provisioned volumes to occupy the entire backing store while wiping the unoccupied (free) space. +For thinly provisioned storage, such as a dynamic virtual hard disk (VHD), BitLocker runs in **Used Disk Space Only** encryption mode. You cannot use the **manage-bde -WipeFreeSpace** command to transition the volume to full-volume encryption on these types of volumes **Question: Can "on these types of volumes" be removed?**. This is blocked in order to avoid expanding thinly provisioned volumes to occupy the entire backing store while wiping the unoccupied (free) space. ### Active Directory-based protector -You can also use an Active Directory Domain Services (AD DS) protector for protecting clustered volumes held within your AD DS infrastructure. The **ADAccountOrGroup** protector is a domain security identifier (SID)-based protector that can be bound to a user account, machine account or group. When an unlock request is made for a protected volume, the BitLocker service interrupts the request and uses the BitLocker protect/unprotect APIs to unlock or deny the request. BitLocker will unlock protected volumes without user intervention by attempting protectors in the following order: +You can also use an Active Directory Domain Services (AD DS) protector for protecting clustered volumes held within your AD DS infrastructure. The **ADAccountOrGroup** protector is a domain security identifier (SID)-based protector that can be bound to a user account, machine account or group. When an unlock request is made for a protected volume, the BitLocker service interrupts the request and uses the BitLocker protect/unprotect APIs to unlock or deny the request. BitLocker unlocks protected volumes without user intervention by attempting protectors in the following order: 1. Clear key 2. Driver-based auto-unlock key @@ -57,14 +56,14 @@ You can also use an Active Directory Domain Services (AD DS) protector for prote 4. Registry-based auto-unlock key ->**Note:**  A Windows Server 2012 or later domain controller is required for this feature to work properly. +>**Note:**  A Windows Server 2012 or later version's domain controller is required for this feature to work properly. ### Turning on BitLocker before adding disks to a cluster using Windows PowerShell -BitLocker encryption is available for disks before or after addition to a cluster storage pool. The advantage of encrypting volumes prior to adding them to a cluster is that the disk resource does not require suspending the resource to complete the operation. To turn on BitLocker for a disk before adding it to a cluster, do the following: +BitLocker encryption is available for disks before or after addition to a cluster storage pool. The advantage of encrypting volumes prior to adding them to a cluster is that the disk resource does not require suspending the resource to complete the operation **Question: Can it be rephrased as "the disk resource need not be suspended for the volume encryption to be completed?**. To turn on BitLocker for a disk before adding it to a cluster, do the following: 1. Install the BitLocker Drive Encryption feature if it is not already installed. -2. Ensure the disk is formatted NTFS and has a drive letter assigned to it. +2. Ensure the disk is an NTFS-formatted one and has a drive letter assigned to it. 3. Identify the name of the cluster with Windows PowerShell. ```powershell @@ -77,16 +76,16 @@ BitLocker encryption is available for disks before or after addition to a cluste Enable-BitLocker E: -ADAccountOrGroupProtector -ADAccountOrGroup CLUSTER$ ``` - >**Warning:**  You must configure an **ADAccountOrGroup** protector using the cluster CNO for a BitLocker enabled volume to either be shared in a Cluster Shared Volume or to fail over properly in a traditional failover cluster. + >**Warning:**  You must configure an **ADAccountOrGroup** protector using the cluster CNO for a BitLocker-enabled volume either to be shared in a cluster-shared Volume or to fail over properly in a traditional failover cluster. 5. Repeat the preceding steps for each disk in the cluster. 6. Add the volume(s) to the cluster. ### Turning on BitLocker for a clustered disk using Windows PowerShell -When the cluster service owns a disk resource already, it needs to be set into maintenance mode before BitLocker can be enabled. Use the following steps for turning BitLocker on for a clustered disk: +When the cluster service owns a disk resource already, the disk resource needs to be set into maintenance mode before BitLocker can be enabled. Use the following steps for turning BitLocker on for a clustered disk: -1. Install the BitLocker Drive Encryption feature if it is not already installed. +1. Install the BitLocker drive encryption feature if it is not already installed. 2. Check the status of the cluster disk using Windows PowerShell. ```powershell @@ -110,9 +109,9 @@ When the cluster service owns a disk resource already, it needs to be set into m ```powershell Enable-BitLocker E: -ADAccountOrGroupProtector -ADAccountOrGroup CLUSTER$ ``` - >**Warning:**  You must configure an **ADAccountOrGroup** protector using the cluster CNO for a BitLocker enabled volume to either be shared in a Cluster Shared Volume or to fail over properly in a traditional failover cluster. + >**Warning:**  You must configure an **ADAccountOrGroup** protector using the cluster CNO for a BitLocker-enabled volume either to be shared in a cluster-shared Volume or to fail over properly in a traditional failover cluster. -6. Use **Resume-ClusterResource** to take the physical disk resource back out of maintenance mode: +6. Use **Resume-ClusterResource** to take back the physical disk resource out of maintenance mode: ```powershell Get-ClusterResource "Cluster Disk 1" | Resume-ClusterResource @@ -120,44 +119,44 @@ When the cluster service owns a disk resource already, it needs to be set into m 7. Repeat the preceding steps for each disk in the cluster. -### Adding BitLocker encrypted volumes to a cluster using manage-bde +### Adding BitLocker-encrypted volumes to a cluster using manage-bde -You can also use manage-bde to enable BitLocker on clustered volumes. The steps needed to add a physical disk resource or CSV2.0 volume to an existing cluster includes the following: +You can also use **manage-bde** to enable BitLocker on clustered volumes. The steps needed to add a physical disk resource or CSV2.0 volume to an existing cluster include the following: -1. Verify the BitLocker Drive Encryption feature is installed on the computer. +1. Verify that the BitLocker drive encryption feature is installed on the computer. 2. Ensure new storage is formatted as NTFS. -3. Encrypt the volume, add a recovery key and add the cluster administrator as a protector key using the manage-bde command line interface (see example): +3. Encrypt the volume, add a recovery key and add the cluster administrator as a protector key using the**manage-bde** command line interface (see example): - `Manage-bde -on -used -RP -sid domain\CNO$ -sync` - 1. BitLocker will check to see if the disk is already part of a cluster. If it is, administrators will encounter a hard block. Otherwise, the encryption will continue. + 1. BitLocker will check to see if the disk is already part of a cluster. If it is, administrators will encounter a hard block. Otherwise, the encryption continues. 2. Using the -sync parameter is optional. Using it ensures the command waits until the encryption for the volume is completed before releasing the volume for use in the cluster storage pool. -4. Open the Failover Cluster Manager snap-in or cluster PowerShell cmdlets to enable the disk to be clustered +4. Open the Failover Cluster Manager snap-in or cluster PowerShell cmdlets to enable the disk to be clustered. - - Once the disk is clustered it can also be enabled for CSV. + - Once the disk is clustered, it is enabled for CSV. -5. During the resource online operation, cluster will check to see if the disk is BitLocker encrypted. +5. During the resource online operation, cluster checks whether the disk is BitLocker encrypted. 1. If the volume is not BitLocker enabled, traditional cluster online operations occur. 2. If the volume is BitLocker enabled, the following check occurs: - - If volume is **locked**, BitLocker will impersonate the CNO and unlock the volume using the CNO protector. If this operation fails an event will be logged that the volume could not be unlocked and the online operation will fail. + - If volume is **locked**, BitLocker impersonates the CNO and unlocks the volume using the CNO protector. If this operation fails, an event is logged that the volume could not be unlocked and the online operation has failed. -6. Once the disk is online in the storage pool, it can be added to a CSV by right clicking on the disk resource and choosing "**Add to cluster shared volumes**". -CSVs can include both encrypted and unencrypted volumes. To check the status of a particular volume for BitLocker encryption, administrators can utilize the manage-bde -status command with a path to the volume inside the CSV namespace as seen in the example command line below. +6. Once the disk is online in the storage pool, it can be added to a CSV by right-clicking the disk resource and choosing "**Add to cluster shared volumes**". +CSVs include both encrypted and unencrypted volumes. To check the status of a particular volume for BitLocker encryption, administrators must utilize the **manage-bde -status** command with a path to the volume inside the CSV namespace as seen in the example command line below. ```powershell manage-bde -status "C:\ClusterStorage\volume1" ``` -### Physical Disk Resources +### Physical disk resources -Unlike CSV2.0 volumes, physical disk resources can only be accessed by one cluster node at a time. This means that operations such as encrypting, decrypting, locking or unlocking volumes require context to perform. For example, you cannot unlock or decrypt a physical disk resource if you are not administering the cluster node that owns the disk resource because the disk resource is not available. +Unlike CSV2.0 volumes, physical disk resources can only be accessed by one cluster node at a time. This means that operations such as encrypting, decrypting, locking or unlocking volumes require a context to perform. For example, you cannot unlock or decrypt a physical disk resource if you are not administering the cluster node that owns the disk resource because the disk resource is not available. ### Restrictions on BitLocker actions with cluster volumes -The following table contains information about both Physical Disk Resources (i.e. traditional failover cluster volumes) and Cluster Shared Volumes (CSV) and the actions that are allowed by BitLocker in each situation. +The following table contains information about both physical disk resources (i.e. traditional failover cluster volumes) and cluster shared volumes (CSV) and the actions that are allowed by BitLocker in each situation. @@ -262,17 +261,17 @@ The following table contains information about both Physical Disk Resources (i.e
->Note:** Although the manage-bde -pause command is Blocked in clusters, the cluster service will automatically resume a paused encryption or decryption from the MDS node +>Note:** Although the **manage-bde -pause** command is blocked in clusters, the cluster service automatically resumes a paused encryption or decryption from the MDS node. -In the case where a physical disk resource experiences a failover event during conversion, the new owning node will detect the conversion is not complete and will complete the conversion process. +In the case where a physical disk resource experiences a failover event during conversion, the new owning node detects that the conversion is not complete and completes the conversion process. ### Other considerations when using BitLocker on CSV2.0 Some other considerations to take into account for BitLocker on clustered storage include the following: -- BitLocker volumes have to be initialized and beginning encryption before they are available to add to a CSV2.0 volume. -- If an administrator needs to decrypt a CSV volume, remove the volume from the cluster or put into disk maintenance mode. You can add the CSV back to the cluster while waiting for decryption to complete. -- If an administrator needs to start encrypting a CSV volume, remove the volume from the cluster or put it in maintenance mode. -- If conversion is paused with encryption in progress and the CSV volume is offline from the cluster, the cluster thread (health check) will automatically resume conversion when the volume is online to the cluster. -- If conversion is paused with encryption in progress and a physical disk resource volume is offline from the cluster, the BitLocker driver will automatically resume conversion when the volume is online to the cluster. -- If conversion is paused with encryption in progress, while the CSV volume is in maintenance mode, the cluster thread (health check) will automatically resume conversion when moving the volume back from maintenance. -- If conversion is paused with encryption in progress, while the disk resource volume is in maintenance mode, the BitLocker driver will automatically resume conversion when the volume is moved back from maintenance mode. +- BitLocker volumes have to be initialized and beginning encryption before they are available to add to a CSV2.0 volume **Question: Can it be rephrased as "BitLocker volumes have to be initialized and have encryptions commenced on it?**. +- If an administrator needs to decrypt a CSV volume, remove the volume from the cluster or put it into disk maintenance mode. You can add the CSV back to the cluster while waiting for decryption to complete. +- If an administrator needs to start encrypting a CSV volume, remove the volume from the cluster or put it into maintenance mode. +- If conversion is paused with encryption in progress and the CSV volume is offline from the cluster, the cluster thread (health check) automatically resumes conversion when the volume is online to the cluster. +- If conversion is paused with encryption in progress and a physical disk resource volume is offline from the cluster, the BitLocker driver automatically resumes conversion when the volume is online to the cluster. +- If conversion is paused with encryption in progress, while the CSV volume is in maintenance mode, the cluster thread (health check) automatically resumes conversion when moving the volume back from maintenance. +- If conversion is paused with encryption in progress, while the disk resource volume is in maintenance mode, the BitLocker driver automatically resumes conversion when the volume is moved back from maintenance mode. From 5e544be8a97edcdf6bbc23c0d198a06cb809508c Mon Sep 17 00:00:00 2001 From: Asha Iyengar Date: Mon, 5 Oct 2020 17:41:54 +0530 Subject: [PATCH 008/341] Reviewed protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md (#3918) --- ...nd-storage-area-networks-with-bitlocker.md | 32 +++++++------------ 1 file changed, 12 insertions(+), 20 deletions(-) diff --git a/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md b/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md index 2dc14bd0e6..acb4171785 100644 --- a/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md +++ b/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md @@ -23,7 +23,7 @@ ms.custom: bitlocker **Applies to** - Windows Server 2016 -This topic describes the procedure to protect CSVs and SANs by using BitLocker. +This topic describes the procedure to protect cluster shared volumes (CSVs) and storage area networks (SANs) by using BitLocker. BitLocker protects both physical disk resources and cluster shared volumes version 2.0 (CSV2.0). BitLocker on clustered volumes allows for an additional layer of protection for administrators wishing to protect sensitive, highly available data. By adding additional protectors to the clustered volume, administrators are adding an additional barrier of security to resources within an organization by allowing only certain user accounts access to unlock the BitLocker volume. @@ -31,36 +31,34 @@ BitLocker protects both physical disk resources and cluster shared volumes versi ### Using BitLocker with clustered volumes -Volumes within a cluster are managed with the help of BitLocker based on how the cluster service "views" the volume to be protected. The volume can be a physical disk resource such as a logical unit number (LUN) on a storage area network (SAN) or network attached storage (NAS). +Volumes within a cluster are managed with the help of BitLocker based on how the cluster service "views" the volume to be protected. The volume can be a physical disk resource such as a logical unit number (LUN) on a SAN or network attached storage (NAS). >**Important**  SANs used with BitLocker must have obtained Windows Hardware Certification. For more info, see [Windows Hardware Lab Kit](https://msdn.microsoft.com/library/windows/hardware/dn930814.aspx). -Alternatively, the volume can be a cluster-shared volume, a shared namespace, within the cluster **Question: Can it be rephrased as the volume can be one that is shared within the cluster?**. Windows Server 2012 expanded the CSV architecture, now known as CSV2.0, to enable support for BitLocker. When using BitLocker with volumes designated for a cluster, the volume must turn on BitLocker before its addition to the storage pool within cluster or put the resource into maintenance mode before BitLocker operations will complete. +Alternatively, the volume can be a cluster shared volume, a shared namespace, within the cluster. Windows Server 2012 expanded the CSV architecture, now known as CSV2.0, to enable support for BitLocker. When using BitLocker with volumes designated for a cluster, the volume must turn on BitLocker before its addition to the storage pool within cluster or put the resource into maintenance mode before BitLocker operations are completed. Windows PowerShell or the manage-bde command line interface is the preferred method to manage BitLocker on CSV2.0 volumes. This is recommended over the BitLocker Control Panel item because CSV2.0 volumes are mount points. Mount points are an NTFS object that is used to provide an entry point to other volumes. Mount points do not require the use of a drive letter. Volumes that lack drive letters do not appear in the BitLocker Control Panel item. Additionally, the new Active Directory-based protector option required for cluster disk resource or CSV2.0 resources is not available in the Control Panel item. >**Note:**  Mount points can be used to support remote mount points on SMB-based network shares. This type of share is not supported for BitLocker encryption. -For thinly provisioned storage, such as a dynamic virtual hard disk (VHD), BitLocker runs in **Used Disk Space Only** encryption mode. You cannot use the **manage-bde -WipeFreeSpace** command to transition the volume to full-volume encryption on these types of volumes **Question: Can "on these types of volumes" be removed?**. This is blocked in order to avoid expanding thinly provisioned volumes to occupy the entire backing store while wiping the unoccupied (free) space. +For thinly provisioned storage, such as a dynamic virtual hard disk (VHD), BitLocker runs in **Used Disk Space Only** encryption mode. You cannot use the **manage-bde -WipeFreeSpace** command to transition the volume to full-volume encryption on thinly provisioned storage volumes. This is blocked to avoid expanding thinly provisioned volumes to occupy the entire backing store while wiping the unoccupied (free) space. ### Active Directory-based protector -You can also use an Active Directory Domain Services (AD DS) protector for protecting clustered volumes held within your AD DS infrastructure. The **ADAccountOrGroup** protector is a domain security identifier (SID)-based protector that can be bound to a user account, machine account or group. When an unlock request is made for a protected volume, the BitLocker service interrupts the request and uses the BitLocker protect/unprotect APIs to unlock or deny the request. BitLocker unlocks protected volumes without user intervention by attempting protectors in the following order: +You can also use an Active Directory Domain Services (AD DS) protector for protecting clustered volumes held within your AD DS infrastructure. The **ADAccountOrGroup** protector is a domain security identifier (SID)-based protector that can be bound to a user account, machine account, or group. When an unlock request is made for a protected volume, the BitLocker service interrupts the request and uses the BitLocker protect/unprotect APIs to unlock or deny the request. BitLocker unlocks protected volumes without user intervention by attempting protectors in the following order: 1. Clear key 2. Driver-based auto-unlock key -3. ADAccountOrGroup protector - - 1. Service context protector - 2. User protector - +3. **ADAccountOrGroup** protector + a. Service context protector + b. User protector 4. Registry-based auto-unlock key >**Note:**  A Windows Server 2012 or later version's domain controller is required for this feature to work properly. ### Turning on BitLocker before adding disks to a cluster using Windows PowerShell -BitLocker encryption is available for disks before or after addition to a cluster storage pool. The advantage of encrypting volumes prior to adding them to a cluster is that the disk resource does not require suspending the resource to complete the operation **Question: Can it be rephrased as "the disk resource need not be suspended for the volume encryption to be completed?**. To turn on BitLocker for a disk before adding it to a cluster, do the following: +BitLocker encryption is available for disks before or after addition to a cluster storage pool. The advantage of encrypting volumes prior to adding them to a cluster is that the disk resource does not require to suspend the resource to complete the operation. To turn on BitLocker for a disk before adding it to a cluster, do the following: 1. Install the BitLocker Drive Encryption feature if it is not already installed. 2. Ensure the disk is an NTFS-formatted one and has a drive letter assigned to it. @@ -69,21 +67,19 @@ BitLocker encryption is available for disks before or after addition to a cluste ```powershell Get-Cluster ``` - 4. Enable BitLocker on the volume of your choice with an **ADAccountOrGroup** protector, using the cluster name. For example, use a command such as: ```powershell Enable-BitLocker E: -ADAccountOrGroupProtector -ADAccountOrGroup CLUSTER$ ``` - - >**Warning:**  You must configure an **ADAccountOrGroup** protector using the cluster CNO for a BitLocker-enabled volume either to be shared in a cluster-shared Volume or to fail over properly in a traditional failover cluster. + >**Warning:**  You must configure a **ADAccountOrGroup** protector using the cluster CNO for a BitLocker-enabled volume either to be shared in a cluster-shared Volume or to fail over properly in a traditional failover cluster. 5. Repeat the preceding steps for each disk in the cluster. 6. Add the volume(s) to the cluster. ### Turning on BitLocker for a clustered disk using Windows PowerShell -When the cluster service owns a disk resource already, the disk resource needs to be set into maintenance mode before BitLocker can be enabled. Use the following steps for turning BitLocker on for a clustered disk: +When the cluster service owns a disk resource already, the disk resource needs to be set into maintenance mode before BitLocker can be enabled. To turn the Bitlocker on for a clustered disk using Windows PowerShell, do the following: 1. Install the BitLocker drive encryption feature if it is not already installed. 2. Check the status of the cluster disk using Windows PowerShell. @@ -91,19 +87,16 @@ When the cluster service owns a disk resource already, the disk resource needs t ```powershell Get-ClusterResource "Cluster Disk 1" ``` - 3. Put the physical disk resource into maintenance mode using Windows PowerShell. ```powershell Get-ClusterResource "Cluster Disk 1" | Suspend-ClusterResource ``` - 4. Identify the name of the cluster with Windows PowerShell. ```powershell Get-Cluster ``` - 5. Enable BitLocker on the volume of your choice with an **ADAccountOrGroup** protector, using the cluster name. For example, use a command such as: ```powershell @@ -116,7 +109,6 @@ When the cluster service owns a disk resource already, the disk resource needs t ```powershell Get-ClusterResource "Cluster Disk 1" | Resume-ClusterResource ``` - 7. Repeat the preceding steps for each disk in the cluster. ### Adding BitLocker-encrypted volumes to a cluster using manage-bde @@ -268,7 +260,7 @@ In the case where a physical disk resource experiences a failover event during c ### Other considerations when using BitLocker on CSV2.0 Some other considerations to take into account for BitLocker on clustered storage include the following: -- BitLocker volumes have to be initialized and beginning encryption before they are available to add to a CSV2.0 volume **Question: Can it be rephrased as "BitLocker volumes have to be initialized and have encryptions commenced on it?**. +- BitLocker volumes have to be initialized and begin encryption before they are available to add to a CSV2.0 volume . - If an administrator needs to decrypt a CSV volume, remove the volume from the cluster or put it into disk maintenance mode. You can add the CSV back to the cluster while waiting for decryption to complete. - If an administrator needs to start encrypting a CSV volume, remove the volume from the cluster or put it into maintenance mode. - If conversion is paused with encryption in progress and the CSV volume is offline from the cluster, the cluster thread (health check) automatically resumes conversion when the volume is online to the cluster. From a2f677246e1803579bc003986e59b380c806334f Mon Sep 17 00:00:00 2001 From: Siddarth Mandalika Date: Tue, 6 Oct 2020 10:51:14 +0530 Subject: [PATCH 009/341] Update bitlocker-overview.md --- .../information-protection/bitlocker/bitlocker-overview.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/security/information-protection/bitlocker/bitlocker-overview.md b/windows/security/information-protection/bitlocker/bitlocker-overview.md index 8dff04be1f..458f0a20c2 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-overview.md +++ b/windows/security/information-protection/bitlocker/bitlocker-overview.md @@ -29,7 +29,7 @@ This topic provides a high-level overview of BitLocker, including a list of syst BitLocker Drive Encryption is a data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers. -BitLocker provides the maximum protection when used with a trusted platform module (TPM) version 1.2 or later versions. The TPM is a hardware component installed in many newer computers by the computer manufacturers. It works with BitLocker to help protect user data and to ensure that a computer has not been tampered with while the system was offline. +BitLocker provides the maximum protection when used with a Trusted Platform Module (TPM) version 1.2 or later versions. The TPM is a hardware component installed in many newer computers by the computer manufacturers. It works with BitLocker to help protect user data and to ensure that a computer has not been tampered with while the system was offline. On computers that do not have a TPM version 1.2 or later versions, you can still use BitLocker to encrypt the Windows operating system drive. However, this implementation requires the user to insert a USB startup key to start the computer or resume from hibernation. Starting with Windows 8, you can use an operating system volume password to protect the operating system volume on a computer without TPM. Both options do not provide the pre-startup system integrity verification offered by BitLocker with a TPM. @@ -55,9 +55,9 @@ To find out what's new in BitLocker for Windows 10, such as support for the XTS BitLocker has the following hardware requirements: -For BitLocker to use the system integrity check provided by a trusted platform module (TPM), the computer must have TPM 1.2 or later versions. If your computer does not have a TPM, enabling BitLocker makes it mandatory for you to save a startup key on a removable device, such as a USB flash drive. +For BitLocker to use the system integrity check provided by a TPM, the computer must have TPM 1.2 or later versions. If your computer does not have a TPM, enabling BitLocker makes it mandatory for you to save a startup key on a removable device, such as a USB flash drive. -A computer with a TPM must also have a trusted computing group (TCG)-compliant BIOS or UEFI firmware. The BIOS or UEFI firmware establishes a chain of trust for the pre-operating system startup, and it must include support for TCG-specified Static Root of Trust Measurement. A computer without a TPM does not require TCG-compliant firmware. +A computer with a TPM must also have a Trusted Computing Group (TCG)-compliant BIOS or UEFI firmware. The BIOS or UEFI firmware establishes a chain of trust for the pre-operating system startup, and it must include support for TCG-specified Static Root of Trust Measurement. A computer without a TPM does not require TCG-compliant firmware. The system BIOS or UEFI firmware (for TPM and non-TPM computers) must support the USB mass storage device class, including reading small files on a USB flash drive in the pre-operating system environment. From 00bb28ce0573afef9496ea6c6e7776ce4794de01 Mon Sep 17 00:00:00 2001 From: Siddarth Mandalika Date: Fri, 9 Oct 2020 18:04:42 +0530 Subject: [PATCH 010/341] Update prepare-your-organization-for-bitlocker-planning-and-policies.md --- ...pare-your-organization-for-bitlocker-planning-and-policies.md | 1 - 1 file changed, 1 deletion(-) diff --git a/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md b/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md index f523d4f8af..180cf50eeb 100644 --- a/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md +++ b/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md @@ -54,7 +54,6 @@ In addition, BitLocker offers the option to lock the normal startup process unti On computers that do not have TPM 1.2 or higher versions, you can still use BitLocker to encrypt the Windows operating system volume. However, this implementation requires the user to insert a USB startup key to start the computer or resume it from hibernation, and does not provide the pre-startup system integrity verification offered by BitLocker working with a TPM. ### BitLocker key protectors - | Key protector | Description | | - | - | | TPM | A hardware device used to help establish a secure root-of-trust. BitLocker only supports TPM 1.2 or higher versions.| From ca6095f38e463d44bc5c07ecaf5e279ae4f32e94 Mon Sep 17 00:00:00 2001 From: Siddarth Mandalika Date: Fri, 9 Oct 2020 18:19:16 +0530 Subject: [PATCH 011/341] Update prepare-your-organization-for-bitlocker-planning-and-policies.md --- ...pare-your-organization-for-bitlocker-planning-and-policies.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md b/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md index 180cf50eeb..f523d4f8af 100644 --- a/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md +++ b/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md @@ -54,6 +54,7 @@ In addition, BitLocker offers the option to lock the normal startup process unti On computers that do not have TPM 1.2 or higher versions, you can still use BitLocker to encrypt the Windows operating system volume. However, this implementation requires the user to insert a USB startup key to start the computer or resume it from hibernation, and does not provide the pre-startup system integrity verification offered by BitLocker working with a TPM. ### BitLocker key protectors + | Key protector | Description | | - | - | | TPM | A hardware device used to help establish a secure root-of-trust. BitLocker only supports TPM 1.2 or higher versions.| From 74ad1a5f45a5990fc03a657f8686111ebc28ce76 Mon Sep 17 00:00:00 2001 From: Siddarth Mandalika Date: Mon, 12 Oct 2020 14:08:03 +0530 Subject: [PATCH 012/341] Update prepare-your-organization-for-bitlocker-planning-and-policies.md --- ...are-your-organization-for-bitlocker-planning-and-policies.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md b/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md index f523d4f8af..55ea45f733 100644 --- a/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md +++ b/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md @@ -55,7 +55,7 @@ On computers that do not have TPM 1.2 or higher versions, you can still use BitL ### BitLocker key protectors -| Key protector | Description | +|**Key protector** | **Description** | | - | - | | TPM | A hardware device used to help establish a secure root-of-trust. BitLocker only supports TPM 1.2 or higher versions.| | PIN | A user-entered numeric key protector that can only be used in addition to the TPM.| From b517200777225f3183aea2fa84eaad31bfd957df Mon Sep 17 00:00:00 2001 From: Siddarth Mandalika Date: Mon, 12 Oct 2020 14:22:16 +0530 Subject: [PATCH 013/341] Update prepare-your-organization Corrected the suggestion for PR3770 --- ...are-your-organization-for-bitlocker-planning-and-policies.md | 2 -- 1 file changed, 2 deletions(-) diff --git a/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md b/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md index f523d4f8af..fc7c0430c3 100644 --- a/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md +++ b/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md @@ -54,14 +54,12 @@ In addition, BitLocker offers the option to lock the normal startup process unti On computers that do not have TPM 1.2 or higher versions, you can still use BitLocker to encrypt the Windows operating system volume. However, this implementation requires the user to insert a USB startup key to start the computer or resume it from hibernation, and does not provide the pre-startup system integrity verification offered by BitLocker working with a TPM. ### BitLocker key protectors - | Key protector | Description | | - | - | | TPM | A hardware device used to help establish a secure root-of-trust. BitLocker only supports TPM 1.2 or higher versions.| | PIN | A user-entered numeric key protector that can only be used in addition to the TPM.| | Enhanced PIN | A user-entered alphanumeric key protector that can only be used in addition to the TPM.| | Startup key | An encryption key that can be stored on most removable media. This key protector can be used alone on non-TPM computers, or in conjunction with a TPM for added security.| -**Question:Is the conjunction with a TPM on TPM-enabled computers? The flow of the sentence requires the mention of the computer type** | Recovery password | A 48-digit number used to unlock a volume when it is in recovery mode. Numbers can often be typed on a regular keyboard. If the numbers on the normal keyboard are not responding, you can always use the function keys (F1-F10) to input the numbers.| | Recovery key| An encryption key stored on removable media that can be used for recovering data encrypted on a BitLocker volume.| From 8d2ea4dd09ce8dab7ba60c776fc9d0d3a4e94113 Mon Sep 17 00:00:00 2001 From: Siddarth Mandalika Date: Thu, 22 Oct 2020 13:03:16 +0530 Subject: [PATCH 014/341] Update bitlocker-recovery-guide-plan.md --- .../bitlocker/bitlocker-recovery-guide-plan.md | 1 - 1 file changed, 1 deletion(-) diff --git a/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan.md b/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan.md index db893c2f8b..4f1c187a4c 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan.md +++ b/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan.md @@ -92,7 +92,6 @@ For planned scenarios, such as a known hardware or firmware upgrades, you can av > [!NOTE] > If suspended BitLocker will automatically resume protection when the PC is rebooted, unless a reboot count is specified using the manage-bde command line tool. -**Question: The above sentence looks incomplete. Can more inputs be provided? Or does "if" need to be removed?** If software maintenance requires the computer to be restarted and you are using two-factor authentication, you can enable BitLocker network unlock feature to provide the secondary authentication factor when the computers do not have an on-premises user to provide the additional authentication method. From 0c00e7a77e799755f664d7ad3b440faede956526 Mon Sep 17 00:00:00 2001 From: Siddarth Mandalika Date: Thu, 22 Oct 2020 15:33:06 +0530 Subject: [PATCH 015/341] Update prepare-your-organization-for-bitlocker-planning-and-policies.md --- ...-your-organization-for-bitlocker-planning-and-policies.md | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md b/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md index fc7c0430c3..02a573b441 100644 --- a/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md +++ b/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md @@ -80,7 +80,6 @@ Determine whether you will support computers that do not have a TPM 1.2 or highe **What areas of your organization need a baseline level of data protection?** The TPM-only authentication method provides the most transparent user experience for organizations that need a baseline level of data protection to meet security policies. It has the lowest total cost of ownership. TPM-only might also be more appropriate for computers that are unattended or that must reboot unattended. -**Question: Does reboot unattended imply reboot automatically?** However, TPM-only authentication method offers the lowest level of data protection. This authentication method protects against attacks that modify early boot components, but the level of protection can be affected by potential weaknesses in hardware or in the early boot components. BitLocker’s multifactor authentication methods significantly increase the overall level of data protection. @@ -141,7 +140,7 @@ To check the BitLocker status of a particular volume, administrators can look at When using the Control Panel options, administrators can choose to **Turn on BitLocker** and follow the steps in the wizard to add a protector, such as a PIN for an operating system volume (or a password if no TPM exists), or a password or smart card protector to a data volume. Then, the drive security window is presented prior to changing the volume status. -Administrators can enable BitLocker prior to operating system deployment from the Windows Pre-installation Environment (WinPE). This is done with a randomly generated clear key protector being applied to the formatted volume and made to encrypt the volume prior to running the Windows setup process (**Question: Is the change made to this sentence complying the intended meaning?**. If the encryption uses the **Used Disk Space Only** option, this step takes only a few seconds, and therefore, incorporates well into regular deployment processes. +Administrators can enable BitLocker prior to operating system deployment from the Windows Pre-installation Environment (WinPE). This is done with a randomly generated clear key protector being applied to the formatted volume and made to encrypt the volume prior to running the Windows setup process. If the encryption uses the **Used Disk Space Only** option, this step takes only a few seconds, and therefore, incorporates well into regular deployment processes. ## Used Disk Space Only encryption @@ -184,7 +183,7 @@ But on computers running these supported systems with BitLocker enabled: - FIPS-compliant recovery password protectors can be created when Windows is in FIPS mode. These protectors use the FIPS-140 NIST SP800-132 algorithm. - Recovery passwords created in FIPS mode on Windows 8.1 can be distinguished from recovery passwords created on other systems. -- Recovery unlock using the FIPS-compliant algorithm-based recovery password protector works in all cases that currently work for recovery passwords (**Question: Is this edited sentence conveying the intended meaning?**. +- Recovery unlock using the FIPS-compliant algorithm-based recovery password protector works in all cases that currently work for recovery passwords. - When FIPS-compliant recovery passwords unlock volumes, the volume is allowed read/write access even while in FIPS mode. - FIPS-compliant recovery password protectors can be exported and stored in AD a while in FIPS mode. From 7bced2ce10c3a170e5e17cdc29eec29491494ad1 Mon Sep 17 00:00:00 2001 From: Siddarth Mandalika Date: Thu, 4 Mar 2021 11:54:40 +0530 Subject: [PATCH 016/341] Update bitlocker-basic-deployment.md --- .../bitlocker/bitlocker-basic-deployment.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/windows/security/information-protection/bitlocker/bitlocker-basic-deployment.md b/windows/security/information-protection/bitlocker/bitlocker-basic-deployment.md index 23047bf7f1..fcf11cf7d8 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-basic-deployment.md +++ b/windows/security/information-protection/bitlocker/bitlocker-basic-deployment.md @@ -110,9 +110,8 @@ The following table shows the compatibility matrix for systems that have been Bi Table 1: Cross compatibility for Windows 10, Windows 8.1, Windows 8, and Windows 7 encrypted volumes -||||| -|--- |--- |--- |--- | |Encryption Type|Windows 10 and Windows 8.1|Windows 8|Windows 7| +|--- |--- |--- |--- | |Fully encrypted on Windows 8|Presents as fully encrypted|N/A|Presented as fully encrypted| |Used Disk Space Only encrypted on Windows 8|Presents as encrypt on write|N/A|Presented as fully encrypted| |Fully encrypted volume from Windows 7|Presents as fully encrypted|Presented as fully encrypted|N/A| From c59c9d15aa893e4d8fa44b3d88ad675b1ee60086 Mon Sep 17 00:00:00 2001 From: Siddarth Mandalika Date: Thu, 4 Mar 2021 12:39:36 +0530 Subject: [PATCH 017/341] Update bitlocker-basic-deployment.md --- .../bitlocker/bitlocker-basic-deployment.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/windows/security/information-protection/bitlocker/bitlocker-basic-deployment.md b/windows/security/information-protection/bitlocker/bitlocker-basic-deployment.md index 23047bf7f1..fcf11cf7d8 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-basic-deployment.md +++ b/windows/security/information-protection/bitlocker/bitlocker-basic-deployment.md @@ -110,9 +110,8 @@ The following table shows the compatibility matrix for systems that have been Bi Table 1: Cross compatibility for Windows 10, Windows 8.1, Windows 8, and Windows 7 encrypted volumes -||||| -|--- |--- |--- |--- | |Encryption Type|Windows 10 and Windows 8.1|Windows 8|Windows 7| +|--- |--- |--- |--- | |Fully encrypted on Windows 8|Presents as fully encrypted|N/A|Presented as fully encrypted| |Used Disk Space Only encrypted on Windows 8|Presents as encrypt on write|N/A|Presented as fully encrypted| |Fully encrypted volume from Windows 7|Presents as fully encrypted|Presented as fully encrypted|N/A| From f3accee9338e79a8c005145929334436cf389a7d Mon Sep 17 00:00:00 2001 From: Siddarth Mandalika Date: Thu, 4 Mar 2021 12:44:29 +0530 Subject: [PATCH 018/341] Update bitlocker-recovery-guide-plan.md --- .../bitlocker/bitlocker-recovery-guide-plan.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan.md b/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan.md index ce14a9e593..dc77051862 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan.md +++ b/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan.md @@ -279,7 +279,7 @@ Windows Recovery Environment (RE) can be used to recover access to a drive prote This error might occur if you updated the firmware. As a best practice, you should suspend BitLocker before making changes to the firmware and then resume protection after the update has completed. This action prevents the computer from going into recovery mode. However if changes were made when BitLocker protection was on, then log on to the computer using the recovery password, and the platform validation profile will be updated so that recovery will not occur the next time. -## Windows RE and BitLocker Device Encryption +## Windows RE and its usage in BitLocker Device Encryption Windows Recovery Environment (RE) can be used to recover access to a drive protected by [BitLocker Device Encryption](bitlocker-device-encryption-overview-windows-10.md). If a PC is unable to boot after two failures, Startup Repair will automatically start. When Startup Repair is launched automatically due to boot failures, it will only execute operating system and driver file repairs, provided that the boot logs or any available crash dump point to a specific corrupted file. In Windows 8.1 and later, devices that include firmware to support specific TPM measurements for PCR\[7\] the TPM can validate that Windows RE is a trusted operating environment and will unlock any BitLocker-protected drives if Windows RE has not been modified. If the Windows RE environment has been modified, for example the TPM has been disabled, the drives will stay locked until the BitLocker recovery key is provided. If Startup Repair can't run automatically from the PC and instead Windows RE is manually started from a repair disk, then the BitLocker recovery key must be provided to unlock the BitLocker–protected drives. From 3b62934480fff611abf5d9867a5ec8f8ea325a3a Mon Sep 17 00:00:00 2001 From: Siddarth Mandalika Date: Fri, 5 Mar 2021 15:17:28 +0530 Subject: [PATCH 019/341] Update protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md --- ...lumes-and-storage-area-networks-with-bitlocker.md | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md b/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md index 983ef48df9..32acbff95e 100644 --- a/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md +++ b/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md @@ -25,7 +25,7 @@ ms.custom: bitlocker This topic describes the procedure to protect cluster shared volumes (CSVs) and storage area networks (SANs) by using BitLocker. -BitLocker protects both physical disk resources and cluster shared volumes version 2.0 (CSV2.0). BitLocker on clustered volumes allows for an additional layer of protection for administrators wishing to protect sensitive, highly available data. By adding additional protectors to the clustered volume, administrators are adding an additional barrier of security to resources within an organization by allowing only certain user accounts access to unlock the BitLocker volume. +BitLocker protects both physical disk resources and cluster shared volumes version 2.0 (CSV2.0). BitLocker on clustered volumes provides an extra layer of protection that can be used by administrators wishing to protect sensitive, highly available data. By adding this extra layer of protection to the clustered volume, administrators are increasing the security to resources within an organization by allowing only certain user accounts access to unlock the BitLocker volume. ## Configuring BitLocker on Cluster Shared Volumes @@ -41,7 +41,7 @@ Windows PowerShell or the manage-bde command-line interface is the preferred met >**Note:**  Mount points can be used to support remote mount points on SMB-based network shares. This type of share is not supported for BitLocker encryption. -For thinly provisioned storage, such as a dynamic virtual hard disk (VHD), BitLocker runs in **Used Disk Space Only** encryption mode. You cannot use the **manage-bde -WipeFreeSpace** command to transition the volume to full-volume encryption on thinly provisioned storage volumes. This is blocked to avoid expanding thinly provisioned volumes to occupy the entire backing store while wiping the unoccupied (free) space.. +For thinly provisioned storage, such as a dynamic virtual hard disk (VHD), BitLocker runs in **Used Disk Space Only** encryption mode. You cannot use the **manage-bde -WipeFreeSpace** command to transition the volume to full-volume encryption on thinly provisioned storage volumes. The usage of **manage-bde -WipeFreeSpace** command is blocked to avoid expanding thinly provisioned volumes to occupy the entire backing store while wiping the unoccupied (free) space. ### Active Directory-based protector @@ -79,7 +79,7 @@ BitLocker encryption is available for disks before or after addition to a cluste ### Turning on BitLocker for a clustered disk using Windows PowerShell -When the cluster service owns a disk resource already, the disk resource needs to be set into maintenance mode before BitLocker can be enabled. To turn the Bitlocker on for a clustered disk using Windows PowerShell, do the following: +When the cluster service owns a disk resource already, the disk resource needs to be set into maintenance mode before BitLocker can be enabled. To turn on the Bitlocker for a clustered disk using Windows PowerShell, perform the following steps: 1. Install the BitLocker drive encryption feature if it is not already installed. 2. Check the status of the cluster disk using Windows PowerShell. @@ -113,7 +113,7 @@ When the cluster service owns a disk resource already, the disk resource needs t ### Adding BitLocker-encrypted volumes to a cluster using manage-bde -You can also use **manage-bde** to enable BitLocker on clustered volumes. The steps needed to add a physical disk resource or CSV2.0 volume to an existing cluster include the following: +You can also use **manage-bde** to enable BitLocker on clustered volumes. The steps needed to add a physical disk resource or CSV2.0 volume to an existing cluster are: 1. Verify that the BitLocker drive encryption feature is installed on the computer. 2. Ensure new storage is formatted as NTFS. @@ -149,11 +149,11 @@ manage-bde -status "C:\ClusterStorage\volume1" ### Physical disk resources -Unlike CSV2.0 volumes, physical disk resources can only be accessed by one cluster node at a time. This means that operations such as encrypting, decrypting, locking or unlocking volumes require a context to perform. For example, you cannot unlock or decrypt a physical disk resource if you are not administering the cluster node that owns the disk resource because the disk resource is not available. +Unlike CSV2.0 volumes, physical disk resources can only be accessed by one cluster node at a time. This condition means that operations such as encrypting, decrypting, locking or unlocking volumes require a context to perform. For example, you cannot unlock or decrypt a physical disk resource if you are not administering the cluster node that owns the disk resource because the disk resource is not available. ### Restrictions on BitLocker actions with cluster volumes -The following table contains information about both physical disk resources (i.e. traditional failover cluster volumes) and cluster shared volumes (CSV) and the actions that are allowed by BitLocker in each situation. +The following table contains information about both physical disk resources (that is, traditional failover cluster volumes) and cluster shared volumes (CSV) and the actions that are allowed by BitLocker in each situation. From c8550e5e36f3f62abd8145f3cf6313bc0df9fe4c Mon Sep 17 00:00:00 2001 From: Siddarth Mandalika Date: Fri, 5 Mar 2021 15:23:00 +0530 Subject: [PATCH 020/341] Update protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md --- ...r-shared-volumes-and-storage-area-networks-with-bitlocker.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md b/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md index 32acbff95e..d3ea4a6ba2 100644 --- a/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md +++ b/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md @@ -25,7 +25,7 @@ ms.custom: bitlocker This topic describes the procedure to protect cluster shared volumes (CSVs) and storage area networks (SANs) by using BitLocker. -BitLocker protects both physical disk resources and cluster shared volumes version 2.0 (CSV2.0). BitLocker on clustered volumes provides an extra layer of protection that can be used by administrators wishing to protect sensitive, highly available data. By adding this extra layer of protection to the clustered volume, administrators are increasing the security to resources within an organization by allowing only certain user accounts access to unlock the BitLocker volume. +BitLocker protects both physical disk resources and cluster shared volumes version 2.0 (CSV2.0). BitLocker on clustered volumes provides an extra layer of protection that can be used by administrators wishing to protect sensitive, highly available data. The administrators use this extra layer of protection to increase the security to resources within an organization by allowing only certain user accounts access to unlock the BitLocker volume. ## Configuring BitLocker on Cluster Shared Volumes From 21b1e166d0f32dd558e92f8ac6ed74987fa5c2b5 Mon Sep 17 00:00:00 2001 From: Siddarth Mandalika Date: Fri, 5 Mar 2021 15:28:11 +0530 Subject: [PATCH 021/341] Update protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md --- ...r-shared-volumes-and-storage-area-networks-with-bitlocker.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md b/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md index d3ea4a6ba2..ae0507a14d 100644 --- a/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md +++ b/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md @@ -25,7 +25,7 @@ ms.custom: bitlocker This topic describes the procedure to protect cluster shared volumes (CSVs) and storage area networks (SANs) by using BitLocker. -BitLocker protects both physical disk resources and cluster shared volumes version 2.0 (CSV2.0). BitLocker on clustered volumes provides an extra layer of protection that can be used by administrators wishing to protect sensitive, highly available data. The administrators use this extra layer of protection to increase the security to resources within an organization by allowing only certain user accounts access to unlock the BitLocker volume. +BitLocker protects both physical disk resources and cluster shared volumes version 2.0 (CSV2.0). BitLocker on clustered volumes provides an extra layer of protection that can be used by administrators wishing to protect sensitive, highly available data. The administrators use this extra layer of protection to increase the security to resources. Only certain user accounts provided access to unlock the BitLocker volume. ## Configuring BitLocker on Cluster Shared Volumes From 8623f6afa0c04db9fff8840210a7d974085bcfbb Mon Sep 17 00:00:00 2001 From: Siddarth Mandalika Date: Sun, 7 Mar 2021 12:49:50 +0530 Subject: [PATCH 022/341] Update protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md --- ...hared-volumes-and-storage-area-networks-with-bitlocker.md | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md b/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md index ae0507a14d..dd8155bcdd 100644 --- a/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md +++ b/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md @@ -35,7 +35,10 @@ Volumes within a cluster are managed with the help of BitLocker based on how the >**Important**  SANs used with BitLocker must have obtained Windows Hardware Certification. For more info, see [Windows Hardware Lab Kit](https://msdn.microsoft.com/library/windows/hardware/dn930814.aspx). -Alternatively, the volume can be a cluster shared volume, a shared namespace, within the cluster. Windows Server 2012 expanded the CSV architecture, now known as CSV2.0, to enable support for BitLocker. When using BitLocker with volumes designated for a cluster, the volume must turn on BitLocker before its addition to the storage pool within cluster or put the resource into maintenance mode before BitLocker operations are completed. +Alternatively, the volume can be a cluster shared volume, a shared namespace, within the cluster. Windows Server 2012 expanded the CSV architecture, now known as CSV2.0, to enable support for BitLocker. The volumes that are designated for a cluster must do the following: + +- It must turn on BitLocker - Only after this done, the volumes can be added into the storage pool +- It must put the resource into maintenance mode before BitLocker operations are completed. Windows PowerShell or the manage-bde command-line interface is the preferred method to manage BitLocker on CSV2.0 volumes. This method is recommended over the BitLocker Control Panel item because CSV2.0 volumes are mount points. Mount points are an NTFS object that is used to provide an entry point to other volumes. Mount points do not require the use of a drive letter. Volumes that lack drive letters do not appear in the BitLocker Control Panel item. Additionally, the new Active Directory-based protector option required for cluster disk resource or CSV2.0 resources is not available in the Control Panel item. From b78d49c9fed05efd47fd3d0069898dd7e2a74581 Mon Sep 17 00:00:00 2001 From: Siddarth Mandalika Date: Sun, 7 Mar 2021 13:00:04 +0530 Subject: [PATCH 023/341] Update protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md --- ...nd-storage-area-networks-with-bitlocker.md | 20 +++++++++++-------- 1 file changed, 12 insertions(+), 8 deletions(-) diff --git a/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md b/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md index dd8155bcdd..7d35481c85 100644 --- a/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md +++ b/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md @@ -48,14 +48,17 @@ For thinly provisioned storage, such as a dynamic virtual hard disk (VHD), BitLo ### Active Directory-based protector -You can also use an Active Directory Domain Services (AD DS) protector for protecting clustered volumes held within your AD DS infrastructure. The **ADAccountOrGroup** protector is a domain security identifier (SID)-based protector that can be bound to a user account, machine account, or group. When an unlock request is made for a protected volume, the BitLocker service interrupts the request and uses the BitLocker protect/unprotect APIs to unlock or deny the request. BitLocker will unlock protected volumes without user intervention by attempting protectors in the following order: +You can also use an Active Directory Domain Services (AD DS) protector for protecting clustered volumes held within your AD DS infrastructure. The **ADAccountOrGroup** protector is a domain security identifier (SID)-based protector that can be bound to a user account, machine account, or group. When an unlock request is made for a protected volume, the following events take place: -1. Clear key -2. Driver-based auto-unlock key -3. **ADAccountOrGroup** protector - a. Service context protector - b. User protector -4. Registry-based auto-unlock key +- BitLocker service interrupts the request and uses the BitLocker protect/unprotect APIs to unlock or deny the request. +- BitLocker will unlock protected volumes without user intervention by attempting protectors in the following order: + + 1. Clear key + 2. Driver-based auto-unlock key + 3. **ADAccountOrGroup** protector + a. Service context protector + b. User protector + 4. Registry-based auto-unlock key >**Note:**  A Windows Server 2012 or later version's domain controller is required for this feature to work properly. @@ -125,7 +128,8 @@ You can also use **manage-bde** to enable BitLocker on clustered volumes. The st - `Manage-bde -on -used -RP -sid domain\CNO$ -sync` 1. BitLocker will check to see if the disk is already part of a cluster. If it is, administrators will encounter a hard block. Otherwise, the encryption continues. - 2. Using the -sync parameter is optional. Using it ensures the command waits until the encryption for the volume is completed before releasing the volume for use in the cluster storage pool. + 2. Using the -sync parameter is optional. However, using -sync parameter has the following advantage: + - The -sync parameter ensures the command waits until the encryption for the volume is completed before releasing the volume for use in the cluster storage pool. 4. Open the Failover Cluster Manager snap-in or cluster PowerShell cmdlets to enable the disk to be clustered. From 3c350893b42d6bbc99511682d7345e6eaec6ab36 Mon Sep 17 00:00:00 2001 From: Siddarth Mandalika Date: Sun, 7 Mar 2021 13:10:29 +0530 Subject: [PATCH 024/341] Update protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md --- ...volumes-and-storage-area-networks-with-bitlocker.md | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md b/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md index 7d35481c85..16782434b3 100644 --- a/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md +++ b/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md @@ -129,7 +129,7 @@ You can also use **manage-bde** to enable BitLocker on clustered volumes. The st 1. BitLocker will check to see if the disk is already part of a cluster. If it is, administrators will encounter a hard block. Otherwise, the encryption continues. 2. Using the -sync parameter is optional. However, using -sync parameter has the following advantage: - - The -sync parameter ensures the command waits until the encryption for the volume is completed before releasing the volume for use in the cluster storage pool. + - The -sync parameter ensures the command waits until the encryption for the volume is completed. The volume is then released for use in the cluster storage pool. 4. Open the Failover Cluster Manager snap-in or cluster PowerShell cmdlets to enable the disk to be clustered. @@ -143,10 +143,14 @@ You can also use **manage-bde** to enable BitLocker on clustered volumes. The st 2. If the volume is BitLocker enabled, the following check occurs: - - If volume is **locked**, BitLocker impersonates the CNO and unlocks the volume using the CNO protector. If this operation fails, an event is logged that the volume could not be unlocked and the online operation has failed. + - If volume is **locked**, BitLocker impersonates the CNO and unlocks the volume using the CNO protector. If these actions by Bitlocker fail, an event is logged. The logged event will state that the volume could not be unlocked and the online operation has failed. 6. Once the disk is online in the storage pool, it can be added to a CSV by right-clicking the disk resource and choosing "**Add to cluster shared volumes**". -CSVs include both encrypted and unencrypted volumes. To check the status of a particular volume for BitLocker encryption, administrators must utilize the **manage-bde -status** command with a path to the volume inside the CSV namespace as seen in the example command line below. +CSVs include both encrypted and unencrypted volumes. To check the status of a particular volume for BitLocker encryption: administrators must do the following task: + +- Utilize the **manage-bde -status** command with a path to the volume. + + The path must be one that is inside the CSV namespace as seen in the example command line below. ```powershell From 8180887bf8fecc42effd88bc3d24e5b099fab5ee Mon Sep 17 00:00:00 2001 From: Siddarth Mandalika Date: Sun, 7 Mar 2021 14:41:52 +0530 Subject: [PATCH 025/341] Update protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md --- ...lumes-and-storage-area-networks-with-bitlocker.md | 12 ++++++++---- 1 file changed, 8 insertions(+), 4 deletions(-) diff --git a/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md b/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md index 16782434b3..06c283bba1 100644 --- a/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md +++ b/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md @@ -35,16 +35,16 @@ Volumes within a cluster are managed with the help of BitLocker based on how the >**Important**  SANs used with BitLocker must have obtained Windows Hardware Certification. For more info, see [Windows Hardware Lab Kit](https://msdn.microsoft.com/library/windows/hardware/dn930814.aspx). -Alternatively, the volume can be a cluster shared volume, a shared namespace, within the cluster. Windows Server 2012 expanded the CSV architecture, now known as CSV2.0, to enable support for BitLocker. The volumes that are designated for a cluster must do the following: +Instead, the volume can be a cluster-shared volume. Windows Server 2012 expanded the CSV architecture, now known as CSV2.0, to enable support for BitLocker. The volumes that are designated for a cluster must do the following: - It must turn on BitLocker - Only after this done, the volumes can be added into the storage pool - It must put the resource into maintenance mode before BitLocker operations are completed. -Windows PowerShell or the manage-bde command-line interface is the preferred method to manage BitLocker on CSV2.0 volumes. This method is recommended over the BitLocker Control Panel item because CSV2.0 volumes are mount points. Mount points are an NTFS object that is used to provide an entry point to other volumes. Mount points do not require the use of a drive letter. Volumes that lack drive letters do not appear in the BitLocker Control Panel item. Additionally, the new Active Directory-based protector option required for cluster disk resource or CSV2.0 resources is not available in the Control Panel item. +Windows PowerShell or the manage-bde command-line interface is the preferred method to manage BitLocker on CSV2.0 volumes. This method is recommended over the BitLocker Control Panel item because CSV2.0 volumes are mount points. Mount points are an NTFS object that is used to provide an entry point to other volumes. Mount points don't require the use of a drive letter. Volumes that lack drive letters don''t appear in the BitLocker Control Panel item. Additionally, the new Active Directory-based protector option required for cluster disk resource or CSV2.0 resources isn't available in the Control Panel item. >**Note:**  Mount points can be used to support remote mount points on SMB-based network shares. This type of share is not supported for BitLocker encryption. -For thinly provisioned storage, such as a dynamic virtual hard disk (VHD), BitLocker runs in **Used Disk Space Only** encryption mode. You cannot use the **manage-bde -WipeFreeSpace** command to transition the volume to full-volume encryption on thinly provisioned storage volumes. The usage of **manage-bde -WipeFreeSpace** command is blocked to avoid expanding thinly provisioned volumes to occupy the entire backing store while wiping the unoccupied (free) space. +In the case of thinly provisioned storage, such as a dynamic virtual hard disk (VHD), BitLocker runs in **Used Disk Space Only** encryption mode. You can't use the **manage-bde -WipeFreeSpace** command to transition the volume to full-volume encryption on thinly provisioned storage volumes. The usage of **manage-bde -WipeFreeSpace** command is blocked to avoid expanding thinly provisioned volumes to occupy the entire backing store while wiping the unoccupied (free) space. ### Active Directory-based protector @@ -64,7 +64,11 @@ You can also use an Active Directory Domain Services (AD DS) protector for prote ### Turning on BitLocker before adding disks to a cluster using Windows PowerShell -BitLocker encryption is available for disks before or after addition to a cluster storage pool. The advantage of encrypting volumes prior to adding them to a cluster is that the disk resource does not require suspending the resource to complete the operation. To turn on BitLocker for a disk before adding it to a cluster: +BitLocker encryption is available for disks before these disks are added to a cluster storage pool. +> [!NOTE] +> The advantage of The Bitlocker encryption can even be made available for disks after they are added to a cluster storage pool. +The advantage of encrypting volumes prior to adding them to a cluster is that the disk resource need not be suspended to complete the operation. +To turn on BitLocker for a disk before adding it to a cluster: 1. Install the BitLocker Drive Encryption feature if it is not already installed. 2. Ensure the disk is an NTFS-formatted one and has a drive letter assigned to it. From d521d9e93347e998f52c548de9c527571ab58896 Mon Sep 17 00:00:00 2001 From: Siddarth Mandalika Date: Sun, 7 Mar 2021 14:53:10 +0530 Subject: [PATCH 026/341] Update bitlocker-basic-deployment.md --- .../bitlocker/bitlocker-basic-deployment.md | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/windows/security/information-protection/bitlocker/bitlocker-basic-deployment.md b/windows/security/information-protection/bitlocker/bitlocker-basic-deployment.md index fcf11cf7d8..c0a736e299 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-basic-deployment.md +++ b/windows/security/information-protection/bitlocker/bitlocker-basic-deployment.md @@ -55,9 +55,11 @@ Upon launch, the BitLocker Drive Encryption Wizard verifies the computer meets t |--- |--- | |Hardware configuration|The computer must meet the minimum requirements for the supported Windows versions.| |Operating system|BitLocker is an optional feature which can be installed by Server Manager on Windows Server 2012 and later.| -|Hardware TPM|TPM version 1.2 or 2.0.

A TPM is not required for BitLocker; however, only a computer with a TPM can provide the additional security of pre-startup system integrity verification and multifactor authentication.| +|Hardware TPM|TPM version 1.2 or 2.0.

A TPM is not required for BitLocker; however, only a computer with a TPM can provide security such as: +- verification of the integrity of the system before it is booted +- multifactor authentication.| |BIOS configuration|

  • A Trusted Computing Group (TCG)-compliant BIOS or UEFI firmware.
  • The boot order must be set to start first from the hard disk, and not the USB or CD drives.
  • The firmware must be able to read from a USB flash drive during startup.
  • | -|File system|For computers that boot natively with UEFI firmware, at least one FAT32 partition for the system drive and one NTFS partition for the operating system drive.
    For computers with legacy BIOS firmware, at least two NTFS disk partitions, one for the system drive and one for the operating system drive.
    For either firmware, the system drive partition must be at least 350 megabytes (MB) and set as the active partition.| +|File system| One FAT32 partition for the system drive and one NTFS partition for the operating system drive. This is applicable for computers that boot natively with UEFI firmware.
    For computers with legacy BIOS firmware, at least two NTFS disk partitions, one for the system drive and one for the operating system drive.
    For either firmware, the system drive partition must be at least 350 megabytes (MB) and set as the active partition.| |Hardware encrypted drive prerequisites (optional)|To use a hardware encrypted drive as the boot drive, the drive must be in the uninitialized state and in the security inactive state. In addition, the system must always boot with native UEFI version 2.3.1 or higher and the CSM (if any) disabled.| Upon passing the initial configuration, users are required to enter a password for the volume. If the volume does not pass the initial configuration for BitLocker, the user is presented with an error dialog describing the appropriate actions to be taken. From 9d80f4d9e23db9f1f12cff95a4890001a6141999 Mon Sep 17 00:00:00 2001 From: Siddarth Mandalika Date: Tue, 9 Mar 2021 11:29:12 +0530 Subject: [PATCH 027/341] Update bitlocker-basic-deployment.md --- .../bitlocker/bitlocker-basic-deployment.md | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/windows/security/information-protection/bitlocker/bitlocker-basic-deployment.md b/windows/security/information-protection/bitlocker/bitlocker-basic-deployment.md index 2146b82940..05e8f44ec6 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-basic-deployment.md +++ b/windows/security/information-protection/bitlocker/bitlocker-basic-deployment.md @@ -55,9 +55,7 @@ Upon launch, the BitLocker Drive Encryption Wizard verifies the computer meets t |--- |--- | |Hardware configuration|The computer must meet the minimum requirements for the supported Windows versions.| |Operating system|BitLocker is an optional feature which can be installed by Server Manager on Windows Server 2012 and later.| -|Hardware TPM|TPM version 1.2 or 2.0.

    A TPM is not required for BitLocker; however, only a computer with a TPM can provide security such as: -- verification of the integrity of the system before it is booted -- multifactor authentication.| +|Hardware TPM|TPM version 1.2 or 2.0.

    A TPM is not required for BitLocker; however, only a computer with a TPM can provide security such as (a) verification of the integrity of the system prior to its booting, and (b) multifactor authentication.| |BIOS configuration|

  • A Trusted Computing Group (TCG)-compliant BIOS or UEFI firmware.
  • The boot order must be set to start first from the hard disk, and not the USB or CD drives.
  • The firmware must be able to read from a USB flash drive during startup.
  • | |File system| One FAT32 partition for the system drive and one NTFS partition for the operating system drive. This is applicable for computers that boot natively with UEFI firmware.
    For computers with legacy BIOS firmware, at least two NTFS disk partitions, one for the system drive and one for the operating system drive.
    For either firmware, the system drive partition must be at least 350 megabytes (MB) and set as the active partition.| |Hardware encrypted drive prerequisites (optional)|To use a hardware encrypted drive as the boot drive, the drive must be in the uninitialized state and in the security inactive state. In addition, the system must always boot with native UEFI version 2.3.1 or higher and the CSM (if any) disabled.| From 7d9e4abd38c4506746ea6a88e4a26b570415ed81 Mon Sep 17 00:00:00 2001 From: valemieux <98555474+valemieux@users.noreply.github.com> Date: Mon, 8 Aug 2022 12:29:46 -0700 Subject: [PATCH 028/341] 24538295 - Adding CI Policy Command Docs --- .../TOC.yml | 2 + .../code-integrity-policy-commands.md | 192 ++++++++++++++++++ 2 files changed, 194 insertions(+) create mode 100644 windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md diff --git a/windows/security/threat-protection/windows-defender-application-control/TOC.yml b/windows/security/threat-protection/windows-defender-application-control/TOC.yml index a7d64bd225..cc2387f639 100644 --- a/windows/security/threat-protection/windows-defender-application-control/TOC.yml +++ b/windows/security/threat-protection/windows-defender-application-control/TOC.yml @@ -86,6 +86,8 @@ href: merge-windows-defender-application-control-policies.md - name: Enforce WDAC policies href: enforce-windows-defender-application-control-policies.md + - name: Code Integrity Policy, Token, and Miscellaneous Commands + href: code-integrity-policy-commands.md - name: Use code signing to simplify application control for classic Windows applications href: use-code-signing-to-simplify-application-control-for-classic-windows-applications.md items: diff --git a/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md b/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md new file mode 100644 index 0000000000..ffc8f5349b --- /dev/null +++ b/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md @@ -0,0 +1,192 @@ +--- +title: CI Policy, Token, and Miscellaneous Commands +description: Learn how to use Policy Commands, Token Commands, and Miscellaneous Commands. +author: valemieux +ms.author: v-alemieux +ms.service: WDAC +ms.topic: how-to +ms.date: 08/07/2022 +ms.custom: template-how-to +--- + +# CIPolicyCommands + +Generates Policy Commands, Token Commands, and Miscellaneous Commands for user mode code and drivers. + +# Policy Commands + +| Command:| --update-policy /Path/To/Policy/File | +| Description: | Add or update a policy on the current system | +| Alias: | -up | + +| Command:| --remove-policy PolicyGUID | +| Description: | Remove a policy indicated by PolicyGUID from the system | +| Alias: | -rp | + +| Command:| --list-policies | +| Description: | Dump information about all policies on the system, whether they be active or not | +| Alias: | -lp | + +# Token Commands + +| Command:| --add-token Path/To/Token/File [--token-id ID] | +| Description: | Deploy a token onto the current system, with an optional specific ID. | +| Alias: | -at | +>[!NOTE] If [ID] is specified, a pre-existing token with [ID] should not exist. + +| Command:| --remove-token ID | +| Description: | Remove a Token indicated by ID from the system. | +| Alias: | -rt | + +| Command:| --list-tokens | +| Description: | Dump information about all tokens on the system | +| Alias: | -lt | + +# Miscellaneous Commands + +| Command:| --device-id | +| Description: | Dump the Code Integrity Device Id | +| Alias: | -id | + +| Command:| --refresh | +| Description: | Attempt to Refresh CI Policies | +| Alias: | -r | + +| Command:| --help | +| Description: | Display help | +| Alias: | -h | + +#Examples + +#Example 1: Update Policy/Deploy +Extract BF61FE40-8929-4FDF-9EC2-F7A767717F0B.cip into C:\windows\system32 +```powershell``` +PS C:\Users\[USER] cd \windows\system32 +PS C:\windows\system32> .\BF61FE40-8929-4FDF-9EC2-F7A767717F0B.cip -up + +C:\Windows\System32>.\CITool.exe -update-policy \windows\system32\BF61FE40-8929-4FDF-9EC2-F7A767717F0B.cip +Usage: CiTool.exe COMMAND [-json] +Commands: +----------------------------- Policy Commands --------------------------------- + --update-policy /Path/To/Policy/File + Add or update a policy on the current system + aliases: -up + --remove-policy PolicyGUID + Remove a policy indicated by PolicyGUID from the system + aliases: -rp + --list-policies + Dump information about all policies on the system, whether they be active or not + aliases: -lp +----------------------------- Token Commands --------------------------------- + --add-token Path/To/Token/File [--token-id ID] + Deploy a token onto the current system, with an optional specific ID + If [ID] is specified, a pre-existing token with [ID] should not exist. + aliases:-at + --remove-token ID + Remove a Token indicated by ID from the system. + aliases: -rt + --list-tokens + Dump information about all tokens on the system + aliases: -lt +----------------------------- Misc Commands --------------------------------- + --device-id + Dump the Code Integrity Device Id + aliases: -id + --refresh + Attempt to Refresh CI Policies + aliases: -r + --help + Display this message + aliases: -h +----------------------------- Global Flags--------------------------------- + -json + Format output as json and suppress input +``` + +#Example 2: Refresh the policy +```powershell``` +PS C:\Users\[USER] cd \windows\system32 +PS C:\Windows\System32>.\CITool.exe --refresh +Operation Successful +``` + +#Example 3: Remove the policy +```powershell``` +PS C:\Users\[USER] cd \windows\system32 +PS C:\Windows\System32>.\CITool.exe --remove-policy {BF61FE40-8929-4FDF-9EC2-F7A767717F0B} +Usage: CiTool.exe COMMAND [-json] +Commands: +----------------------------- Policy Commands --------------------------------- + --update-policy /Path/To/Policy/File + Add or update a policy on the current system + aliases: -up + --remove-policy PolicyGUID + Remove a policy indicated by PolicyGUID from the system + aliases: -rp + --list-policies + Dump information about all policies on the system, whether they be active or not + aliases: -lp +----------------------------- Token Commands --------------------------------- + --add-token Path/To/Token/File [--token-id ID] + Deploy a token onto the current system, with an optional specific ID + If [ID] is specified, a pre-existing token with [ID] should not exist. + aliases:-at + --remove-token ID + Remove a Token indicated by ID from the system. + aliases: -rt + --list-tokens + Dump information about all tokens on the system + aliases: -lt +----------------------------- Misc Commands --------------------------------- + --device-id + Dump the Code Integrity Device Id + aliases: -id + --refresh + Attempt to Refresh CI Policies + aliases: -r + --help + Display this message + aliases: -h +----------------------------- Global Flags--------------------------------- + -json + Format output as json and suppress input +Press Enter to Exit +``` + +#Example 4: Display help +```powershell``` +PS C:\Users\[USER] cd \windows\system32 +PS C:\windows\system32> .\CITool.exe -h + +----------------------------- Policy Commands --------------------------------- + --update-policy /Path/To/Policy/File + Add or update a policy on the current system + aliases: -up + --remove-policy PolicyGUID + Remove a policy indicated by PolicyGUID from the system + aliases: -rp + --list-policies + Dump information about all policies on the system, whether they be active or not + aliases: -lp +----------------------------- Token Commands --------------------------------- + --add-token Path/To/Token/File [--token-id ID] + Deploy a token onto the current system, with an optional specific ID + If [ID] is specified, a pre-existing token with [ID] should not exist. + aliases:-at + --remove-token ID + Remove a Token indicated by ID from the system. + aliases: -rt + --list-tokens + Dump information about all tokens on the system + aliases: -lt +----------------------------- Misc Commands --------------------------------- + --device-id + Dump the Code Integrity Device Id + aliases: -id + --refresh + Attempt to Refresh CI Policies + aliases: -r + --help + Display this message + aliases: -h +``` \ No newline at end of file From 7cf1059272a5cc7944c094549155dc2f401c6254 Mon Sep 17 00:00:00 2001 From: valemieux <98555474+valemieux@users.noreply.github.com> Date: Mon, 8 Aug 2022 12:40:06 -0700 Subject: [PATCH 029/341] Update code-integrity-policy-commands.md --- .../code-integrity-policy-commands.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md b/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md index ffc8f5349b..0c216575ab 100644 --- a/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md +++ b/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md @@ -60,7 +60,7 @@ Generates Policy Commands, Token Commands, and Miscellaneous Commands for user m #Example 1: Update Policy/Deploy Extract BF61FE40-8929-4FDF-9EC2-F7A767717F0B.cip into C:\windows\system32 -```powershell``` +```powershell PS C:\Users\[USER] cd \windows\system32 PS C:\windows\system32> .\BF61FE40-8929-4FDF-9EC2-F7A767717F0B.cip -up @@ -104,14 +104,14 @@ Commands: ``` #Example 2: Refresh the policy -```powershell``` +```powershell PS C:\Users\[USER] cd \windows\system32 PS C:\Windows\System32>.\CITool.exe --refresh Operation Successful ``` #Example 3: Remove the policy -```powershell``` +```powershell PS C:\Users\[USER] cd \windows\system32 PS C:\Windows\System32>.\CITool.exe --remove-policy {BF61FE40-8929-4FDF-9EC2-F7A767717F0B} Usage: CiTool.exe COMMAND [-json] @@ -154,7 +154,7 @@ Press Enter to Exit ``` #Example 4: Display help -```powershell``` +```powershell PS C:\Users\[USER] cd \windows\system32 PS C:\windows\system32> .\CITool.exe -h From 339a934dbe21a9544d55bb06b8f3bbc5a246269b Mon Sep 17 00:00:00 2001 From: valemieux <98555474+valemieux@users.noreply.github.com> Date: Mon, 8 Aug 2022 13:02:16 -0700 Subject: [PATCH 030/341] Update code-integrity-policy-commands.md --- .../code-integrity-policy-commands.md | 22 +++++++++---------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md b/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md index 0c216575ab..ec6ca8c21b 100644 --- a/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md +++ b/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md @@ -15,53 +15,53 @@ Generates Policy Commands, Token Commands, and Miscellaneous Commands for user m # Policy Commands -| Command:| --update-policy /Path/To/Policy/File | +| Command:|--update-policy /Path/To/Policy/File | | Description: | Add or update a policy on the current system | | Alias: | -up | -| Command:| --remove-policy PolicyGUID | +| Command:|--remove-policy PolicyGUID | | Description: | Remove a policy indicated by PolicyGUID from the system | | Alias: | -rp | -| Command:| --list-policies | +| Command:|--list-policies | | Description: | Dump information about all policies on the system, whether they be active or not | | Alias: | -lp | # Token Commands -| Command:| --add-token Path/To/Token/File [--token-id ID] | +| Command:|--add-token Path/To/Token/File [--token-id ID] | | Description: | Deploy a token onto the current system, with an optional specific ID. | | Alias: | -at | >[!NOTE] If [ID] is specified, a pre-existing token with [ID] should not exist. -| Command:| --remove-token ID | +| Command:|--remove-token ID | | Description: | Remove a Token indicated by ID from the system. | | Alias: | -rt | -| Command:| --list-tokens | +| Command:|--list-tokens | | Description: | Dump information about all tokens on the system | | Alias: | -lt | # Miscellaneous Commands -| Command:| --device-id | +| Command:|--device-id | | Description: | Dump the Code Integrity Device Id | | Alias: | -id | -| Command:| --refresh | +| Command:|--refresh | | Description: | Attempt to Refresh CI Policies | | Alias: | -r | -| Command:| --help | +| Command:|--help | | Description: | Display help | | Alias: | -h | #Examples #Example 1: Update Policy/Deploy -Extract BF61FE40-8929-4FDF-9EC2-F7A767717F0B.cip into C:\windows\system32 +Extract policy file to C:\windows\system32 ```powershell -PS C:\Users\[USER] cd \windows\system32 +PS C:\Users\ cd \windows\system32 PS C:\windows\system32> .\BF61FE40-8929-4FDF-9EC2-F7A767717F0B.cip -up C:\Windows\System32>.\CITool.exe -update-policy \windows\system32\BF61FE40-8929-4FDF-9EC2-F7A767717F0B.cip From 5e833309c0555d2cfcd98a89073028fcbb49c98b Mon Sep 17 00:00:00 2001 From: valemieux <98555474+valemieux@users.noreply.github.com> Date: Mon, 8 Aug 2022 14:49:17 -0700 Subject: [PATCH 031/341] Update code-integrity-policy-commands.md --- .../code-integrity-policy-commands.md | 20 +++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md b/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md index ec6ca8c21b..4c153b656b 100644 --- a/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md +++ b/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md @@ -13,7 +13,7 @@ ms.custom: template-how-to Generates Policy Commands, Token Commands, and Miscellaneous Commands for user mode code and drivers. -# Policy Commands +## Policy Commands | Command:|--update-policy /Path/To/Policy/File | | Description: | Add or update a policy on the current system | @@ -27,7 +27,7 @@ Generates Policy Commands, Token Commands, and Miscellaneous Commands for user m | Description: | Dump information about all policies on the system, whether they be active or not | | Alias: | -lp | -# Token Commands +## Token Commands | Command:|--add-token Path/To/Token/File [--token-id ID] | | Description: | Deploy a token onto the current system, with an optional specific ID. | @@ -42,7 +42,7 @@ Generates Policy Commands, Token Commands, and Miscellaneous Commands for user m | Description: | Dump information about all tokens on the system | | Alias: | -lt | -# Miscellaneous Commands +## Miscellaneous Commands | Command:|--device-id | | Description: | Dump the Code Integrity Device Id | @@ -56,16 +56,16 @@ Generates Policy Commands, Token Commands, and Miscellaneous Commands for user m | Description: | Display help | | Alias: | -h | -#Examples +## Examples -#Example 1: Update Policy/Deploy +1. Update Policy/Deploy Extract policy file to C:\windows\system32 ```powershell PS C:\Users\ cd \windows\system32 PS C:\windows\system32> .\BF61FE40-8929-4FDF-9EC2-F7A767717F0B.cip -up C:\Windows\System32>.\CITool.exe -update-policy \windows\system32\BF61FE40-8929-4FDF-9EC2-F7A767717F0B.cip -Usage: CiTool.exe COMMAND [-json] +Usage: CiTool.exe COMMAND [Command-Options] [-json] Commands: ----------------------------- Policy Commands --------------------------------- --update-policy /Path/To/Policy/File @@ -103,18 +103,18 @@ Commands: Format output as json and suppress input ``` -#Example 2: Refresh the policy +2. Refresh the policy ```powershell PS C:\Users\[USER] cd \windows\system32 PS C:\Windows\System32>.\CITool.exe --refresh Operation Successful ``` -#Example 3: Remove the policy +3. Remove the policy ```powershell PS C:\Users\[USER] cd \windows\system32 PS C:\Windows\System32>.\CITool.exe --remove-policy {BF61FE40-8929-4FDF-9EC2-F7A767717F0B} -Usage: CiTool.exe COMMAND [-json] +Usage: CiTool.exe COMMAND [Command-Options] [-json] Commands: ----------------------------- Policy Commands --------------------------------- --update-policy /Path/To/Policy/File @@ -153,7 +153,7 @@ Commands: Press Enter to Exit ``` -#Example 4: Display help +4. Display help ```powershell PS C:\Users\[USER] cd \windows\system32 PS C:\windows\system32> .\CITool.exe -h From 1c0742872c7cd22e4d65fb6523dd15ae6ac08f0f Mon Sep 17 00:00:00 2001 From: valemieux <98555474+valemieux@users.noreply.github.com> Date: Mon, 8 Aug 2022 15:50:13 -0700 Subject: [PATCH 032/341] Update code-integrity-policy-commands.md --- .../code-integrity-policy-commands.md | 54 +++++++------------ 1 file changed, 20 insertions(+), 34 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md b/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md index 4c153b656b..60d8c53ebe 100644 --- a/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md +++ b/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md @@ -3,7 +3,7 @@ title: CI Policy, Token, and Miscellaneous Commands description: Learn how to use Policy Commands, Token Commands, and Miscellaneous Commands. author: valemieux ms.author: v-alemieux -ms.service: WDAC +ms.service: security ms.topic: how-to ms.date: 08/07/2022 ms.custom: template-how-to @@ -15,46 +15,32 @@ Generates Policy Commands, Token Commands, and Miscellaneous Commands for user m ## Policy Commands -| Command:|--update-policy /Path/To/Policy/File | -| Description: | Add or update a policy on the current system | -| Alias: | -up | - -| Command:|--remove-policy PolicyGUID | -| Description: | Remove a policy indicated by PolicyGUID from the system | -| Alias: | -rp | - -| Command:|--list-policies | -| Description: | Dump information about all policies on the system, whether they be active or not | -| Alias: | -lp | +| Command | Description | Alias | +| | | | +|--------|---------|---------| +|--update-policy /Path/To/Policy/File | Add or update a policy on the current system | -up | +| --remove-policy PolicyGUID | Remove a policy indicated by PolicyGUID from the system | -rp | +| --list-policies | Dump information about all policies on the system, whether they be active or not | -lp | ## Token Commands -| Command:|--add-token Path/To/Token/File [--token-id ID] | -| Description: | Deploy a token onto the current system, with an optional specific ID. | -| Alias: | -at | ->[!NOTE] If [ID] is specified, a pre-existing token with [ID] should not exist. +| Command | Description | Alias | +| | | | +|--------|---------|---------| +|--add-token Path/To/Token/File [--token-id ID] | Deploy a token onto the current system, with an optional specific ID. | -at | +|--remove-token ID | Remove a Token indicated by ID from the system. | -rt | +|--list-tokens | Dump information about all tokens on the system | -lt | -| Command:|--remove-token ID | -| Description: | Remove a Token indicated by ID from the system. | -| Alias: | -rt | - -| Command:|--list-tokens | -| Description: | Dump information about all tokens on the system | -| Alias: | -lt | +>[!NOTE] Regarding --add-token, if <[ID]> is specified, a pre-existing token with [ID] should not exist. ## Miscellaneous Commands -| Command:|--device-id | -| Description: | Dump the Code Integrity Device Id | -| Alias: | -id | - -| Command:|--refresh | -| Description: | Attempt to Refresh CI Policies | -| Alias: | -r | - -| Command:|--help | -| Description: | Display help | -| Alias: | -h | +| Command | Description | Alias | +| | | | +|--------|---------|---------| +|--device-id | Dump the Code Integrity Device ID | -id | +|--refresh | Attempt to Refresh CI Policies | -r | +|--help | Display help | -h | ## Examples From 983d4176fc6500086c88ffb37f383860b4aa6eeb Mon Sep 17 00:00:00 2001 From: valemieux <98555474+valemieux@users.noreply.github.com> Date: Mon, 8 Aug 2022 15:54:18 -0700 Subject: [PATCH 033/341] Update code-integrity-policy-commands.md --- .../code-integrity-policy-commands.md | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md b/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md index 60d8c53ebe..6e6a566a5b 100644 --- a/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md +++ b/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md @@ -18,7 +18,7 @@ Generates Policy Commands, Token Commands, and Miscellaneous Commands for user m | Command | Description | Alias | | | | | |--------|---------|---------| -|--update-policy /Path/To/Policy/File | Add or update a policy on the current system | -up | +| --update-policy /Path/To/Policy/File | Add or update a policy on the current system | -up | | --remove-policy PolicyGUID | Remove a policy indicated by PolicyGUID from the system | -rp | | --list-policies | Dump information about all policies on the system, whether they be active or not | -lp | @@ -27,9 +27,9 @@ Generates Policy Commands, Token Commands, and Miscellaneous Commands for user m | Command | Description | Alias | | | | | |--------|---------|---------| -|--add-token Path/To/Token/File [--token-id ID] | Deploy a token onto the current system, with an optional specific ID. | -at | -|--remove-token ID | Remove a Token indicated by ID from the system. | -rt | -|--list-tokens | Dump information about all tokens on the system | -lt | +| --add-token Path/To/Token/File [--token-id ID] | Deploy a token onto the current system, with an optional specific ID. | -at | +| --remove-token ID | Remove a Token indicated by ID from the system. | -rt | +| --list-tokens | Dump information about all tokens on the system | -lt | >[!NOTE] Regarding --add-token, if <[ID]> is specified, a pre-existing token with [ID] should not exist. @@ -38,9 +38,9 @@ Generates Policy Commands, Token Commands, and Miscellaneous Commands for user m | Command | Description | Alias | | | | | |--------|---------|---------| -|--device-id | Dump the Code Integrity Device ID | -id | -|--refresh | Attempt to Refresh CI Policies | -r | -|--help | Display help | -h | +| --device-id | Dump the Code Integrity Device ID | -id | +| --refresh | Attempt to Refresh CI Policies | -r | +| --help | Display help | -h | ## Examples From 1b6a574a3b1decfe56105fd33c1813a327a156c9 Mon Sep 17 00:00:00 2001 From: valemieux <98555474+valemieux@users.noreply.github.com> Date: Mon, 8 Aug 2022 16:03:25 -0700 Subject: [PATCH 034/341] Update code-integrity-policy-commands.md --- .../code-integrity-policy-commands.md | 5 +---- 1 file changed, 1 insertion(+), 4 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md b/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md index 6e6a566a5b..5a2860c500 100644 --- a/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md +++ b/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md @@ -16,7 +16,6 @@ Generates Policy Commands, Token Commands, and Miscellaneous Commands for user m ## Policy Commands | Command | Description | Alias | -| | | | |--------|---------|---------| | --update-policy /Path/To/Policy/File | Add or update a policy on the current system | -up | | --remove-policy PolicyGUID | Remove a policy indicated by PolicyGUID from the system | -rp | @@ -25,18 +24,16 @@ Generates Policy Commands, Token Commands, and Miscellaneous Commands for user m ## Token Commands | Command | Description | Alias | -| | | | |--------|---------|---------| | --add-token Path/To/Token/File [--token-id ID] | Deploy a token onto the current system, with an optional specific ID. | -at | | --remove-token ID | Remove a Token indicated by ID from the system. | -rt | | --list-tokens | Dump information about all tokens on the system | -lt | ->[!NOTE] Regarding --add-token, if <[ID]> is specified, a pre-existing token with [ID] should not exist. +>[!NOTE] Regarding --add-token, if <[ID]> is specified, a pre-existing token with <[ID]> should not exist. ## Miscellaneous Commands | Command | Description | Alias | -| | | | |--------|---------|---------| | --device-id | Dump the Code Integrity Device ID | -id | | --refresh | Attempt to Refresh CI Policies | -r | From 50179c0bbd6ef5f34eec6eb54c18d9fe45ba329e Mon Sep 17 00:00:00 2001 From: valemieux <98555474+valemieux@users.noreply.github.com> Date: Mon, 8 Aug 2022 16:10:09 -0700 Subject: [PATCH 035/341] Update code-integrity-policy-commands.md --- .../code-integrity-policy-commands.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md b/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md index 5a2860c500..8b250ca2cd 100644 --- a/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md +++ b/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md @@ -29,7 +29,8 @@ Generates Policy Commands, Token Commands, and Miscellaneous Commands for user m | --remove-token ID | Remove a Token indicated by ID from the system. | -rt | | --list-tokens | Dump information about all tokens on the system | -lt | ->[!NOTE] Regarding --add-token, if <[ID]> is specified, a pre-existing token with <[ID]> should not exist. +>[!NOTE] +>Regarding --add-token, if <[ID]> is specified, a pre-existing token with <[ID]> should not exist. ## Miscellaneous Commands From d3f84d880855ff613991931f6382308127c5a37e Mon Sep 17 00:00:00 2001 From: valemieux <98555474+valemieux@users.noreply.github.com> Date: Mon, 8 Aug 2022 23:56:41 -0700 Subject: [PATCH 036/341] Update code-integrity-policy-commands.md --- .../code-integrity-policy-commands.md | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md b/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md index 8b250ca2cd..0d60465937 100644 --- a/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md +++ b/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md @@ -30,7 +30,7 @@ Generates Policy Commands, Token Commands, and Miscellaneous Commands for user m | --list-tokens | Dump information about all tokens on the system | -lt | >[!NOTE] ->Regarding --add-token, if <[ID]> is specified, a pre-existing token with <[ID]> should not exist. +>Regarding --add-token, if [ID] is specified, a pre-existing token with [ID] should not exist. ## Miscellaneous Commands @@ -42,8 +42,11 @@ Generates Policy Commands, Token Commands, and Miscellaneous Commands for user m ## Examples -1. Update Policy/Deploy -Extract policy file to C:\windows\system32 +>[!NOTE] +>The following examples assume you have extracted the policy file {BF61FE40-8929-4FDF-9EC2-F7A767717F0B}.cip to C:\windows\system32 + +1. Update Policy + ```powershell PS C:\Users\ cd \windows\system32 PS C:\windows\system32> .\BF61FE40-8929-4FDF-9EC2-F7A767717F0B.cip -up From ac2c8afe45fb23442416240ac05719e1e6361df9 Mon Sep 17 00:00:00 2001 From: valemieux <98555474+valemieux@users.noreply.github.com> Date: Mon, 22 Aug 2022 11:26:07 -0700 Subject: [PATCH 037/341] Update code-integrity-policy-commands.md --- .../code-integrity-policy-commands.md | 24 +++++++++---------- 1 file changed, 12 insertions(+), 12 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md b/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md index 0d60465937..1f7042ee0c 100644 --- a/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md +++ b/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md @@ -2,14 +2,15 @@ title: CI Policy, Token, and Miscellaneous Commands description: Learn how to use Policy Commands, Token Commands, and Miscellaneous Commands. author: valemieux -ms.author: v-alemieux +ms.author: jgeurten ms.service: security +ms.reviewer: jgeurten ms.topic: how-to ms.date: 08/07/2022 ms.custom: template-how-to --- -# CIPolicyCommands +# Manage WDAC Policies with CI Tool Generates Policy Commands, Token Commands, and Miscellaneous Commands for user mode code and drivers. @@ -19,7 +20,7 @@ Generates Policy Commands, Token Commands, and Miscellaneous Commands for user m |--------|---------|---------| | --update-policy /Path/To/Policy/File | Add or update a policy on the current system | -up | | --remove-policy PolicyGUID | Remove a policy indicated by PolicyGUID from the system | -rp | -| --list-policies | Dump information about all policies on the system, whether they be active or not | -lp | +| --list-policies | Dump information about all policies on the system, whether they are active or not | -lp | ## Token Commands @@ -37,18 +38,17 @@ Generates Policy Commands, Token Commands, and Miscellaneous Commands for user m | Command | Description | Alias | |--------|---------|---------| | --device-id | Dump the Code Integrity Device ID | -id | -| --refresh | Attempt to Refresh CI Policies | -r | -| --help | Display help | -h | +| --refresh | Attempt to Refresh WDAC Policies | -r | +| --help | Display the tool's help menu | -h | ## Examples >[!NOTE] >The following examples assume you have extracted the policy file {BF61FE40-8929-4FDF-9EC2-F7A767717F0B}.cip to C:\windows\system32 -1. Update Policy +1. Deploy a WDAC policy onto the system ```powershell -PS C:\Users\ cd \windows\system32 PS C:\windows\system32> .\BF61FE40-8929-4FDF-9EC2-F7A767717F0B.cip -up C:\Windows\System32>.\CITool.exe -update-policy \windows\system32\BF61FE40-8929-4FDF-9EC2-F7A767717F0B.cip @@ -90,14 +90,14 @@ Commands: Format output as json and suppress input ``` -2. Refresh the policy +2. Refresh the WDAC policies in the \Windows\system32\CodeIntegrity\CiPolicies\Active folder ```powershell -PS C:\Users\[USER] cd \windows\system32 -PS C:\Windows\System32>.\CITool.exe --refresh +PS C:\Users\[USER] cd \Windows\system32\CodeIntegrity\CiPolicies\Active +PS C:\Windows\System32\CodeIntegrity\CiPolicies\Active>.\CITool --refresh Operation Successful ``` -3. Remove the policy +3. Remove a specific WDAC policy by GUID ```powershell PS C:\Users\[USER] cd \windows\system32 PS C:\Windows\System32>.\CITool.exe --remove-policy {BF61FE40-8929-4FDF-9EC2-F7A767717F0B} @@ -140,7 +140,7 @@ Commands: Press Enter to Exit ``` -4. Display help +4. Display the help menu ```powershell PS C:\Users\[USER] cd \windows\system32 PS C:\windows\system32> .\CITool.exe -h From acfd907b5b12ca8cd8315e6c0d59eb4d60eff9c7 Mon Sep 17 00:00:00 2001 From: valemieux <98555474+valemieux@users.noreply.github.com> Date: Mon, 22 Aug 2022 11:37:43 -0700 Subject: [PATCH 038/341] Update code-integrity-policy-commands.md --- .../code-integrity-policy-commands.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md b/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md index 1f7042ee0c..b722b9fcff 100644 --- a/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md +++ b/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md @@ -2,9 +2,9 @@ title: CI Policy, Token, and Miscellaneous Commands description: Learn how to use Policy Commands, Token Commands, and Miscellaneous Commands. author: valemieux -ms.author: jgeurten +ms.author: jogeurte ms.service: security -ms.reviewer: jgeurten +ms.reviewer: jogeurte ms.topic: how-to ms.date: 08/07/2022 ms.custom: template-how-to From 5162802ca0ba64302851eea4fe306b0002abb09e Mon Sep 17 00:00:00 2001 From: valemieux <98555474+valemieux@users.noreply.github.com> Date: Sun, 11 Sep 2022 22:56:37 -0700 Subject: [PATCH 039/341] Updating descriptions, titles, file name, and capitalization --- ...egrity-policy-commands.md => citool-commands.md} | 13 +++++-------- 1 file changed, 5 insertions(+), 8 deletions(-) rename windows/security/threat-protection/windows-defender-application-control/{code-integrity-policy-commands.md => citool-commands.md} (94%) diff --git a/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md b/windows/security/threat-protection/windows-defender-application-control/citool-commands.md similarity index 94% rename from windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md rename to windows/security/threat-protection/windows-defender-application-control/citool-commands.md index b722b9fcff..86d7700fd0 100644 --- a/windows/security/threat-protection/windows-defender-application-control/code-integrity-policy-commands.md +++ b/windows/security/threat-protection/windows-defender-application-control/citool-commands.md @@ -1,6 +1,6 @@ --- -title: CI Policy, Token, and Miscellaneous Commands -description: Learn how to use Policy Commands, Token Commands, and Miscellaneous Commands. +title: Managing CI Policies and Tokens with CiTool +description: Learn how to use Policy Commands, Token Commands, and Miscellaneous Commands in CiTool author: valemieux ms.author: jogeurte ms.service: security @@ -43,16 +43,13 @@ Generates Policy Commands, Token Commands, and Miscellaneous Commands for user m ## Examples ->[!NOTE] ->The following examples assume you have extracted the policy file {BF61FE40-8929-4FDF-9EC2-F7A767717F0B}.cip to C:\windows\system32 - 1. Deploy a WDAC policy onto the system ```powershell PS C:\windows\system32> .\BF61FE40-8929-4FDF-9EC2-F7A767717F0B.cip -up C:\Windows\System32>.\CITool.exe -update-policy \windows\system32\BF61FE40-8929-4FDF-9EC2-F7A767717F0B.cip -Usage: CiTool.exe COMMAND [Command-Options] [-json] +Usage: CiTool COMMAND [Command-Options] [-json] Commands: ----------------------------- Policy Commands --------------------------------- --update-policy /Path/To/Policy/File @@ -90,14 +87,14 @@ Commands: Format output as json and suppress input ``` -2. Refresh the WDAC policies in the \Windows\system32\CodeIntegrity\CiPolicies\Active folder +2. Refresh the WDAC policies in the \Windows\System32\CodeIntegrity\CiPolicies\Active folder ```powershell PS C:\Users\[USER] cd \Windows\system32\CodeIntegrity\CiPolicies\Active PS C:\Windows\System32\CodeIntegrity\CiPolicies\Active>.\CITool --refresh Operation Successful ``` -3. Remove a specific WDAC policy by GUID +3. Remove a specific WDAC policy by its policy ID ```powershell PS C:\Users\[USER] cd \windows\system32 PS C:\Windows\System32>.\CITool.exe --remove-policy {BF61FE40-8929-4FDF-9EC2-F7A767717F0B} From fbe5214a3d411a126818c7fd10650995b8a0607e Mon Sep 17 00:00:00 2001 From: valemieux <98555474+valemieux@users.noreply.github.com> Date: Sun, 11 Sep 2022 23:02:01 -0700 Subject: [PATCH 040/341] Update TOC.yml --- .../windows-defender-application-control/TOC.yml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-application-control/TOC.yml b/windows/security/threat-protection/windows-defender-application-control/TOC.yml index cc2387f639..e38c8944b3 100644 --- a/windows/security/threat-protection/windows-defender-application-control/TOC.yml +++ b/windows/security/threat-protection/windows-defender-application-control/TOC.yml @@ -86,8 +86,8 @@ href: merge-windows-defender-application-control-policies.md - name: Enforce WDAC policies href: enforce-windows-defender-application-control-policies.md - - name: Code Integrity Policy, Token, and Miscellaneous Commands - href: code-integrity-policy-commands.md + - name: Managing WDAC Policies with CI Tool + href: citool-commands.md - name: Use code signing to simplify application control for classic Windows applications href: use-code-signing-to-simplify-application-control-for-classic-windows-applications.md items: From eadad34b16f30d1a888db1a8b073a4e6c46f8cce Mon Sep 17 00:00:00 2001 From: valemieux <98555474+valemieux@users.noreply.github.com> Date: Mon, 12 Sep 2022 22:14:44 -0700 Subject: [PATCH 041/341] Update citool-commands.md --- .../citool-commands.md | 97 +++---------------- 1 file changed, 12 insertions(+), 85 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-application-control/citool-commands.md b/windows/security/threat-protection/windows-defender-application-control/citool-commands.md index 86d7700fd0..94c0be2807 100644 --- a/windows/security/threat-protection/windows-defender-application-control/citool-commands.md +++ b/windows/security/threat-protection/windows-defender-application-control/citool-commands.md @@ -10,9 +10,10 @@ ms.date: 08/07/2022 ms.custom: template-how-to --- -# Manage WDAC Policies with CI Tool +# Manage Windows Defender Application Control (WDAC) Policies with CI Tool -Generates Policy Commands, Token Commands, and Miscellaneous Commands for user mode code and drivers. +CI Tool makes Windows Defender Application Control (WDAC) policy management easier for IT admins. CI Tool can be used to manage Windows Defender Application Control policies and CI Tokens. +This article will describe how to use CI Tool to update and manage policies. CI Tool is now included in box as part of Windows and can be interacted with in the command line. ## Policy Commands @@ -46,101 +47,27 @@ Generates Policy Commands, Token Commands, and Miscellaneous Commands for user m 1. Deploy a WDAC policy onto the system ```powershell -PS C:\windows\system32> .\BF61FE40-8929-4FDF-9EC2-F7A767717F0B.cip -up - -C:\Windows\System32>.\CITool.exe -update-policy \windows\system32\BF61FE40-8929-4FDF-9EC2-F7A767717F0B.cip -Usage: CiTool COMMAND [Command-Options] [-json] -Commands: ------------------------------ Policy Commands --------------------------------- - --update-policy /Path/To/Policy/File - Add or update a policy on the current system - aliases: -up - --remove-policy PolicyGUID - Remove a policy indicated by PolicyGUID from the system - aliases: -rp - --list-policies - Dump information about all policies on the system, whether they be active or not - aliases: -lp ------------------------------ Token Commands --------------------------------- - --add-token Path/To/Token/File [--token-id ID] - Deploy a token onto the current system, with an optional specific ID - If [ID] is specified, a pre-existing token with [ID] should not exist. - aliases:-at - --remove-token ID - Remove a Token indicated by ID from the system. - aliases: -rt - --list-tokens - Dump information about all tokens on the system - aliases: -lt ------------------------------ Misc Commands --------------------------------- - --device-id - Dump the Code Integrity Device Id - aliases: -id - --refresh - Attempt to Refresh CI Policies - aliases: -r - --help - Display this message - aliases: -h ------------------------------ Global Flags--------------------------------- - -json - Format output as json and suppress input +PS C:\Users\[USER] CITool --update-policy "\Windows\Temp\{BF61FE40-8929-4FDF-9EC2-F7A767717F0B}.cip" +Operation Successful +Press Enter to Continue ``` -2. Refresh the WDAC policies in the \Windows\System32\CodeIntegrity\CiPolicies\Active folder +2. Refresh the WDAC policies ```powershell -PS C:\Users\[USER] cd \Windows\system32\CodeIntegrity\CiPolicies\Active -PS C:\Windows\System32\CodeIntegrity\CiPolicies\Active>.\CITool --refresh +PS C:\Users\[USER] CITool --refresh Operation Successful ``` 3. Remove a specific WDAC policy by its policy ID ```powershell -PS C:\Users\[USER] cd \windows\system32 -PS C:\Windows\System32>.\CITool.exe --remove-policy {BF61FE40-8929-4FDF-9EC2-F7A767717F0B} -Usage: CiTool.exe COMMAND [Command-Options] [-json] -Commands: ------------------------------ Policy Commands --------------------------------- - --update-policy /Path/To/Policy/File - Add or update a policy on the current system - aliases: -up - --remove-policy PolicyGUID - Remove a policy indicated by PolicyGUID from the system - aliases: -rp - --list-policies - Dump information about all policies on the system, whether they be active or not - aliases: -lp ------------------------------ Token Commands --------------------------------- - --add-token Path/To/Token/File [--token-id ID] - Deploy a token onto the current system, with an optional specific ID - If [ID] is specified, a pre-existing token with [ID] should not exist. - aliases:-at - --remove-token ID - Remove a Token indicated by ID from the system. - aliases: -rt - --list-tokens - Dump information about all tokens on the system - aliases: -lt ------------------------------ Misc Commands --------------------------------- - --device-id - Dump the Code Integrity Device Id - aliases: -id - --refresh - Attempt to Refresh CI Policies - aliases: -r - --help - Display this message - aliases: -h ------------------------------ Global Flags--------------------------------- - -json - Format output as json and suppress input -Press Enter to Exit +PS C:\Users\[USER] CiTool --remove-policy "{BF61FE40-8929-4FDF-9EC2-F7A767717F0B}" +Operation Successful +Press Enter to Continue ``` 4. Display the help menu ```powershell -PS C:\Users\[USER] cd \windows\system32 -PS C:\windows\system32> .\CITool.exe -h +PS C:\Users\[USER] CITool -h ----------------------------- Policy Commands --------------------------------- --update-policy /Path/To/Policy/File From 6f2fa0d82e9fe78cc6540a00d50d3255e8a9948c Mon Sep 17 00:00:00 2001 From: Siddarth Mandalika Date: Tue, 13 Sep 2022 15:31:12 +0530 Subject: [PATCH 042/341] fixed the warnings --- .../bitlocker/bitlocker-basic-deployment.md | 2 +- .../bitlocker-device-encryption-overview-windows-10.md | 3 +-- 2 files changed, 2 insertions(+), 3 deletions(-) diff --git a/windows/security/information-protection/bitlocker/bitlocker-basic-deployment.md b/windows/security/information-protection/bitlocker/bitlocker-basic-deployment.md index 05e8f44ec6..06f1349062 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-basic-deployment.md +++ b/windows/security/information-protection/bitlocker/bitlocker-basic-deployment.md @@ -111,7 +111,7 @@ The following table shows the compatibility matrix for systems that have been Bi Table 1: Cross compatibility for Windows 10, Windows 8.1, Windows 8, and Windows 7 encrypted volumes |Encryption Type|Windows 10 and Windows 8.1|Windows 8|Windows 7| -|--- |--- |--- |--- | +|---|---|---|---| |Fully encrypted on Windows 8|Presents as fully encrypted|N/A|Presented as fully encrypted| |Used Disk Space Only encrypted on Windows 8|Presents as encrypt on write|N/A|Presented as fully encrypted| |Fully encrypted volume from Windows 7|Presents as fully encrypted|Presented as fully encrypted|N/A| diff --git a/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10.md b/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10.md index af220e5c22..03b03a3499 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10.md +++ b/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10.md @@ -19,8 +19,7 @@ ms.custom: bitlocker # Overview of BitLocker Device Encryption in Windows 10 -**Applies to** -- Windows 10 +**Applies to:** Windows 10 This topic explains how BitLocker Device Encryption can help protect data on devices running Windows 10. For a general overview and list of topics about BitLocker, see [BitLocker](bitlocker-overview.md). From 60b0b59b3e73bb71f030c264caa7d12febc95af6 Mon Sep 17 00:00:00 2001 From: Siddarth Mandalika Date: Wed, 14 Sep 2022 10:40:15 +0530 Subject: [PATCH 043/341] Update protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md --- ...nd-storage-area-networks-with-bitlocker.md | 24 +++++++++---------- 1 file changed, 12 insertions(+), 12 deletions(-) diff --git a/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md b/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md index d3b6788152..53e04dc61e 100644 --- a/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md +++ b/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md @@ -31,9 +31,9 @@ Volumes within a cluster are managed with the help of BitLocker based on how the > [!IMPORTANT] > SANs used with BitLocker must have obtained Windows Hardware Certification. For more info, see [Windows Hardware Lab Kit](/windows-hardware/drivers/). -Instead, the volume can be a cluster-shared volume. Windows Server 2012 expanded the CSV architecture, now known as CSV2.0, to enable support for BitLocker. The volumes that are designated for a cluster must do the following: +Instead, the volume can be a cluster-shared volume. Windows Server 2012 expanded the CSV architecture, now known as CSV2.0, to enable support for BitLocker. The volumes that are designated for a cluster must do the following tasks: -- It must turn on BitLocker - Only after this done, the volumes can be added into the storage pool +- It must turn on BitLocker - Only after this task is done, the volumes can be added into the storage pool - It must put the resource into maintenance mode before BitLocker operations are completed. Windows PowerShell or the manage-bde command-line interface is the preferred method to manage BitLocker on CSV2.0 volumes. This method is recommended over the BitLocker Control Panel item because CSV2.0 volumes are mount points. Mount points are an NTFS object that is used to provide an entry point to other volumes. Mount points don't require the use of a drive letter. Volumes that lack drive letters don''t appear in the BitLocker Control Panel item. Additionally, the new Active Directory-based protector option required for cluster disk resource or CSV2.0 resources isn't available in the Control Panel item. @@ -41,7 +41,7 @@ Windows PowerShell or the manage-bde command-line interface is the preferred met > [!NOTE] > Mount points can be used to support remote mount points on SMB-based network shares. This type of share is not supported for BitLocker encryption. -In the case of thinly provisioned storage, such as a dynamic virtual hard disk (VHD), BitLocker runs in **Used Disk Space Only** encryption mode. You can't use the **manage-bde -WipeFreeSpace** command to transition the volume to full-volume encryption on thinly provisioned storage volumes. The usage of **manage-bde -WipeFreeSpace** command is blocked to avoid expanding thinly provisioned volumes to occupy the entire backing store while wiping the unoccupied (free) space. +If there's a thinly provisioned storage, such as a dynamic virtual hard disk (VHD), BitLocker runs in **Used Disk Space Only** encryption mode. You can't use the **manage-bde -WipeFreeSpace** command to transition the volume to full-volume encryption on thinly provisioned storage volumes. The usage of **manage-bde -WipeFreeSpace** command is blocked to avoid expanding thinly provisioned volumes to occupy the entire backing store while wiping the unoccupied (free) space. ### Active Directory-based protector @@ -68,7 +68,7 @@ BitLocker encryption is available for disks before these disks are added to a cl The advantage of encrypting volumes prior to adding them to a cluster is that the disk resource need not be suspended to complete the operation. To turn on BitLocker for a disk before adding it to a cluster: -1. Install the BitLocker Drive Encryption feature if it is not already installed. +1. Install the BitLocker Drive Encryption feature if it isn't already installed. 2. Ensure the disk is an NTFS-formatted one and has a drive letter assigned to it. 3. Identify the name of the cluster with Windows PowerShell. @@ -91,7 +91,7 @@ To turn on BitLocker for a disk before adding it to a cluster: When the cluster service owns a disk resource already, the disk resource needs to be set into maintenance mode before BitLocker can be enabled. To turn on the Bitlocker for a clustered disk using Windows PowerShell, perform the following steps: -1. Install the BitLocker drive encryption feature if it is not already installed. +1. Install the BitLocker drive encryption feature if it isn't already installed. 2. Check the status of the cluster disk using Windows PowerShell. ```powershell @@ -140,16 +140,16 @@ You can also use **manage-bde** to enable BitLocker on clustered volumes. The st 4. Open the Failover Cluster Manager snap-in or cluster PowerShell cmdlets to enable the disk to be clustered. - - Once the disk is clustered, it is enabled for CSV. + - Once the disk is clustered, it's enabled for CSV. 5. During the resource online operation, cluster checks whether the disk is BitLocker encrypted. - 1. If the volume is not BitLocker enabled, traditional cluster online operations occur. + 1. If the volume isn't BitLocker enabled, traditional cluster online operations occur. 2. If the volume is BitLocker enabled, the following check occurs: - - If volume is **locked**, BitLocker impersonates the CNO and unlocks the volume using the CNO protector. If these actions by Bitlocker fail, an event is logged. The logged event will state that the volume could not be unlocked and the online operation has failed. + - If volume is **locked**, BitLocker impersonates the CNO and unlocks the volume using the CNO protector. If these actions by BitLocker fail, an event is logged. The logged event will state that the volume couldn't be unlocked and the online operation has failed. 6. Once the disk is online in the storage pool, it can be added to a CSV by right-clicking the disk resource and choosing "**Add to cluster shared volumes**". CSVs include both encrypted and unencrypted volumes. To check the status of a particular volume for BitLocker encryption: administrators must do the following task: @@ -166,7 +166,7 @@ manage-bde -status "C:\ClusterStorage\volume1" ### Physical disk resources -Unlike CSV2.0 volumes, physical disk resources can only be accessed by one cluster node at a time. This condition means that operations such as encrypting, decrypting, locking or unlocking volumes require a context to perform. For example, you cannot unlock or decrypt a physical disk resource if you are not administering the cluster node that owns the disk resource because the disk resource is not available. +Unlike CSV2.0 volumes, physical disk resources can only be accessed by one cluster node at a time. This condition means that operations such as encrypting, decrypting, locking or unlocking volumes require a context to perform. For example, you can't unlock or decrypt a physical disk resource if you aren't administering the cluster node that owns the disk resource because the disk resource isn't available. ### Restrictions on BitLocker actions with cluster volumes @@ -277,12 +277,12 @@ The following table contains information about both physical disk resources (tha >Note:** Although the **manage-bde -pause** command is blocked in clusters, the cluster service automatically resumes a paused encryption or decryption from the MDS node. -In the case where a physical disk resource experiences a failover event during conversion, the new owning node detects that the conversion is not complete and completes the conversion process. +In the case where a physical disk resource experiences a failover event during conversion, the new owning node detects that the conversion isn't complete and completes the conversion process. ### Other considerations when using BitLocker on CSV2.0 -Some other considerations to take into account for BitLocker on clustered storage include the following: -- BitLocker volumes have to be initialized and begin encryption before they are available to add to a CSV2.0 volume . +Some other considerations to take into account for BitLocker on clustered storage include: +- BitLocker volumes have to be initialized and begin encryption before they're available to add to a CSV2.0 volume. - If an administrator needs to decrypt a CSV volume, remove the volume from the cluster or put it into disk maintenance mode. You can add the CSV back to the cluster while waiting for decryption to complete. - If an administrator needs to start encrypting a CSV volume, remove the volume from the cluster or put it into maintenance mode. - If conversion is paused with encryption in progress and the CSV volume is offline from the cluster, the cluster thread (health check) automatically resumes conversion when the volume is online to the cluster. From 30e7ad000c70cb64450541aa6bbd65116883a712 Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Wed, 14 Sep 2022 14:13:48 -0400 Subject: [PATCH 044/341] [EDU] Windows 11 SE FAQ --- education/windows/TOC.yml | 2 + education/windows/windows-11-se-faq.yml | 65 +++++++++++++++++++++++++ 2 files changed, 67 insertions(+) create mode 100644 education/windows/windows-11-se-faq.yml diff --git a/education/windows/TOC.yml b/education/windows/TOC.yml index f90e7d595f..582d1706f7 100644 --- a/education/windows/TOC.yml +++ b/education/windows/TOC.yml @@ -14,6 +14,8 @@ items: href: windows-11-se-overview.md - name: Settings and CSP list href: windows-11-se-settings-list.md + - name: Frequently Asked Questions (FAQ) + href: windows-11-se-faq.md - name: Windows in S Mode items: - name: Test Windows 10 in S mode on existing Windows 10 education devices diff --git a/education/windows/windows-11-se-faq.yml b/education/windows/windows-11-se-faq.yml new file mode 100644 index 0000000000..2232c7b22f --- /dev/null +++ b/education/windows/windows-11-se-faq.yml @@ -0,0 +1,65 @@ +### YamlMime:FAQ +metadata: + title: Windows 11 SE Frequently Asked Questions (FAQ) + description: Use these frequently asked questions (FAQ) to learn important details about Windows 11 SE. + ms.prod: windows + ms.technology: windows + author: paolomatarazzo + ms.author: paoloma + manager: aaroncz + ms.reviewer: + ms.collection: education + ms.topic: faq + localizationpriority: medium + ms.date: 09/14/2022 + appliesto: + - ✅ Windows 11 SE + +title: Common questions about Windows 11 SE +summary: Windows 11 SE combines the power and privacy of Windows 11 with educator feedback to create a simplified experience on devices built for education. This Frequently Asked Questions (FAQ) article is intended to help you learn more about Windows 11 SE so you can get to what matters most. + + + +sections: + - name: General + questions: + - question: What is Windows 11 SE? + answer: | + Windows 11 SE is a new cloud-first operating system that offers the power and reliability of Windows 11 with a simplified design and tools specially designed for schools. + To learn more, go to the [][]. + - question: Who uses Windows 11 SE? + answer: | + Windows 11 SE is designed for students in grades K-8 who use a laptop provided by their school. + - question: What are the major differences between Windows 11 and Windows 11 SE? + answer: | + Windows 11 SE was created based on feedback from educators who wanted a distraction-free experience for their students. Here are some of the differences that you'll find in Windows 11 SE: + - Experience a simplified user interface so you can stay focused on the important stuff + - Only IT admins can install apps. Users will not be able to access the Microsoft Store or download apps from the internet + - Use Snap Assist to maximize screen space on smaller screens with two-window snapping + - Store your Desktop, Documents, and Photos folders in the cloud using OneDrive, so your work is backed up and easy to find + - Express yourself and celebrate accomplishments with the *emoji and GIF panel* and *Stickers* + - name: Applications and settings + questions: + - question: Why is there no application store on Windows 11 SE? What apps will work on Windows 11 SE? + answer: | + The IT Admins at your school manage system settings (including application installation and the application store) to ensure all students have a safe, distraction-free experience. On your device you'll have pre-installed apps from Microsoft, from your IT admin, and from your device manufacturer. You can continue to use web apps on the Microsoft Edge browser, as web apps do not require installation. + To learn more, go to the [][]. + - question: Why is there no application store on Windows 11 SE? What apps will work on Windows 11 SE? + answer: | + The IT Admins at your school manage system settings (including application installation and the application store) to ensure all students have a safe, distraction-free experience. On your device you'll have pre-installed apps from Microsoft, from your IT admin, and from your device manufacturer. You can continue to use web apps on the Microsoft Edge browser, as web apps do not require installation. + To learn more, go to the [][]. + - name: Resources + questions: + - question: Where can I find more information how to deploy Windows 11 SE in my school? + answer: | + Here are some resources to get you started: [][]. + - question: Where can I learn more about Windows Autopilot? + answer: | + - [][] + - question: Where can I learn more about managing Windows SE devices with Microsoft Intune? + answer: | + - [][] + +additionalContent: | + ## Additional Content + Here's some optional text that can be placed at the end of the document. \ No newline at end of file From d8e8bb720eb42e6b3505283082922be7fd449e68 Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Wed, 14 Sep 2022 14:35:50 -0400 Subject: [PATCH 045/341] updates --- education/windows/TOC.yml | 2 +- education/windows/windows-11-se-faq.yml | 17 ++++++++++++++++- 2 files changed, 17 insertions(+), 2 deletions(-) diff --git a/education/windows/TOC.yml b/education/windows/TOC.yml index 582d1706f7..32ab158079 100644 --- a/education/windows/TOC.yml +++ b/education/windows/TOC.yml @@ -15,7 +15,7 @@ items: - name: Settings and CSP list href: windows-11-se-settings-list.md - name: Frequently Asked Questions (FAQ) - href: windows-11-se-faq.md + href: windows-11-se-faq.yml - name: Windows in S Mode items: - name: Test Windows 10 in S mode on existing Windows 10 education devices diff --git a/education/windows/windows-11-se-faq.yml b/education/windows/windows-11-se-faq.yml index 2232c7b22f..b7a50ea193 100644 --- a/education/windows/windows-11-se-faq.yml +++ b/education/windows/windows-11-se-faq.yml @@ -48,6 +48,12 @@ sections: answer: | The IT Admins at your school manage system settings (including application installation and the application store) to ensure all students have a safe, distraction-free experience. On your device you'll have pre-installed apps from Microsoft, from your IT admin, and from your device manufacturer. You can continue to use web apps on the Microsoft Edge browser, as web apps do not require installation. To learn more, go to the [][]. + - name: Out-of-box experience (OOBE) + questions: + - question: My Windows 11 SE device is stuck in OOBE, how can I reset it? + answer: To access the Settings application during OOBE on a Windows 11 SE device, press Shift+F10, then select the accessibility icon + + on the bottom-right corner of the screen. - name: Resources questions: - question: Where can I find more information how to deploy Windows 11 SE in my school? @@ -62,4 +68,13 @@ sections: additionalContent: | ## Additional Content - Here's some optional text that can be placed at the end of the document. \ No newline at end of file + Here's some optional text that can be placed at the end of the document. + + +------------------ +<--References--> + +[MEM-1]: /mem/intune/configuration/custom-settings-windows-10 + +[AZ-1]: /azure/active-directory/hybrid/how-to-connect-fed-saml-idp +[AZ-2]: /azure/active-directory/enterprise-users/licensing-groups-assign \ No newline at end of file From 851cf9172d0e5ae0c671af23699a07df74d453d1 Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Wed, 14 Sep 2022 14:42:04 -0400 Subject: [PATCH 046/341] updates --- education/windows/windows-11-se-faq.yml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/education/windows/windows-11-se-faq.yml b/education/windows/windows-11-se-faq.yml index b7a50ea193..c7c45570a8 100644 --- a/education/windows/windows-11-se-faq.yml +++ b/education/windows/windows-11-se-faq.yml @@ -52,8 +52,8 @@ sections: questions: - question: My Windows 11 SE device is stuck in OOBE, how can I reset it? answer: To access the Settings application during OOBE on a Windows 11 SE device, press Shift+F10, then select the accessibility icon - - on the bottom-right corner of the screen. + + on the bottom-right corner of the screen. - name: Resources questions: - question: Where can I find more information how to deploy Windows 11 SE in my school? @@ -72,7 +72,7 @@ additionalContent: | ------------------ -<--References--> + [MEM-1]: /mem/intune/configuration/custom-settings-windows-10 From c4d04b740fb2df770af2ab9dd954877eeb15446a Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Wed, 14 Sep 2022 14:46:11 -0400 Subject: [PATCH 047/341] updates --- education/windows/windows-11-se-faq.yml | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/education/windows/windows-11-se-faq.yml b/education/windows/windows-11-se-faq.yml index c7c45570a8..d760c05187 100644 --- a/education/windows/windows-11-se-faq.yml +++ b/education/windows/windows-11-se-faq.yml @@ -71,8 +71,7 @@ additionalContent: | Here's some optional text that can be placed at the end of the document. ------------------- - + [MEM-1]: /mem/intune/configuration/custom-settings-windows-10 From 63eb312557648afb9f8fb419d287226561476403 Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Wed, 14 Sep 2022 14:54:24 -0400 Subject: [PATCH 048/341] updates --- education/windows/windows-11-se-faq.yml | 2 -- 1 file changed, 2 deletions(-) diff --git a/education/windows/windows-11-se-faq.yml b/education/windows/windows-11-se-faq.yml index d760c05187..984da25340 100644 --- a/education/windows/windows-11-se-faq.yml +++ b/education/windows/windows-11-se-faq.yml @@ -71,8 +71,6 @@ additionalContent: | Here's some optional text that can be placed at the end of the document. - - [MEM-1]: /mem/intune/configuration/custom-settings-windows-10 [AZ-1]: /azure/active-directory/hybrid/how-to-connect-fed-saml-idp From 2f31101a344505bfe0e4e2d5177da87f5be6c784 Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Wed, 14 Sep 2022 15:05:35 -0400 Subject: [PATCH 049/341] updates --- education/windows/windows-11-se-faq.yml | 8 +------- 1 file changed, 1 insertion(+), 7 deletions(-) diff --git a/education/windows/windows-11-se-faq.yml b/education/windows/windows-11-se-faq.yml index 984da25340..39cdc0a62b 100644 --- a/education/windows/windows-11-se-faq.yml +++ b/education/windows/windows-11-se-faq.yml @@ -68,10 +68,4 @@ sections: additionalContent: | ## Additional Content - Here's some optional text that can be placed at the end of the document. - - -[MEM-1]: /mem/intune/configuration/custom-settings-windows-10 - -[AZ-1]: /azure/active-directory/hybrid/how-to-connect-fed-saml-idp -[AZ-2]: /azure/active-directory/enterprise-users/licensing-groups-assign \ No newline at end of file + Here's some optional text that can be placed at the end of the document. \ No newline at end of file From e6b414cad9cd46d40793f9691a7612c0404ed291 Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Wed, 14 Sep 2022 15:32:02 -0400 Subject: [PATCH 050/341] updates --- .../windows/images/ic_fluent_accessibility_16_regular.svg | 3 +++ education/windows/windows-11-se-faq.yml | 5 ++--- 2 files changed, 5 insertions(+), 3 deletions(-) create mode 100644 education/windows/images/ic_fluent_accessibility_16_regular.svg diff --git a/education/windows/images/ic_fluent_accessibility_16_regular.svg b/education/windows/images/ic_fluent_accessibility_16_regular.svg new file mode 100644 index 0000000000..4f8de69055 --- /dev/null +++ b/education/windows/images/ic_fluent_accessibility_16_regular.svg @@ -0,0 +1,3 @@ + + + \ No newline at end of file diff --git a/education/windows/windows-11-se-faq.yml b/education/windows/windows-11-se-faq.yml index 39cdc0a62b..0b616625b9 100644 --- a/education/windows/windows-11-se-faq.yml +++ b/education/windows/windows-11-se-faq.yml @@ -51,14 +51,13 @@ sections: - name: Out-of-box experience (OOBE) questions: - question: My Windows 11 SE device is stuck in OOBE, how can I reset it? - answer: To access the Settings application during OOBE on a Windows 11 SE device, press Shift+F10, then select the accessibility icon - - on the bottom-right corner of the screen. + answer: To access the Settings application during OOBE on a Windows 11 SE device, press Shift+F10, then select the **accessibility icon** :::image type="icon" source="images/ic_fluent_accessibility_16_regular.svg" border="false"::: on the bottom-right corner of the screen. - name: Resources questions: - question: Where can I find more information how to deploy Windows 11 SE in my school? answer: | Here are some resources to get you started: [][]. + :::image type="icon" source="images/ic_fluent_accessibility_16_regular.svg" border="false"::: - question: Where can I learn more about Windows Autopilot? answer: | - [][] From 0b721f0a9e3024d65d5cebacb0354295f025f703 Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Wed, 14 Sep 2022 15:41:37 -0400 Subject: [PATCH 051/341] updates --- education/windows/windows-11-se-faq.yml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/education/windows/windows-11-se-faq.yml b/education/windows/windows-11-se-faq.yml index 0b616625b9..b7175aa316 100644 --- a/education/windows/windows-11-se-faq.yml +++ b/education/windows/windows-11-se-faq.yml @@ -51,13 +51,14 @@ sections: - name: Out-of-box experience (OOBE) questions: - question: My Windows 11 SE device is stuck in OOBE, how can I reset it? - answer: To access the Settings application during OOBE on a Windows 11 SE device, press Shift+F10, then select the **accessibility icon** :::image type="icon" source="images/ic_fluent_accessibility_16_regular.svg" border="false"::: on the bottom-right corner of the screen. + answer: To access the Settings application during OOBE on a Windows 11 SE device, press Shift+F10, then select the **accessibility icon** on the bottom-right corner of the screen. + :::image type="icon" source="images/ic_fluent_accessibility_16_regular.svg" border="false"::: - name: Resources questions: - question: Where can I find more information how to deploy Windows 11 SE in my school? answer: | Here are some resources to get you started: [][]. - :::image type="icon" source="images/ic_fluent_accessibility_16_regular.svg" border="false"::: + - question: Where can I learn more about Windows Autopilot? answer: | - [][] From 9944763e04c3d250edb4b419bfbb4ac505afc5b1 Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Wed, 14 Sep 2022 15:52:28 -0400 Subject: [PATCH 052/341] updates --- education/windows/windows-11-se-faq.yml | 4 ---- education/windows/windows-11-se-overview.md | 4 ++++ 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/education/windows/windows-11-se-faq.yml b/education/windows/windows-11-se-faq.yml index b7175aa316..93f2a1beca 100644 --- a/education/windows/windows-11-se-faq.yml +++ b/education/windows/windows-11-se-faq.yml @@ -18,8 +18,6 @@ metadata: title: Common questions about Windows 11 SE summary: Windows 11 SE combines the power and privacy of Windows 11 with educator feedback to create a simplified experience on devices built for education. This Frequently Asked Questions (FAQ) article is intended to help you learn more about Windows 11 SE so you can get to what matters most. - - sections: - name: General questions: @@ -52,13 +50,11 @@ sections: questions: - question: My Windows 11 SE device is stuck in OOBE, how can I reset it? answer: To access the Settings application during OOBE on a Windows 11 SE device, press Shift+F10, then select the **accessibility icon** on the bottom-right corner of the screen. - :::image type="icon" source="images/ic_fluent_accessibility_16_regular.svg" border="false"::: - name: Resources questions: - question: Where can I find more information how to deploy Windows 11 SE in my school? answer: | Here are some resources to get you started: [][]. - - question: Where can I learn more about Windows Autopilot? answer: | - [][] diff --git a/education/windows/windows-11-se-overview.md b/education/windows/windows-11-se-overview.md index c8bca008ef..9ed80d7a04 100644 --- a/education/windows/windows-11-se-overview.md +++ b/education/windows/windows-11-se-overview.md @@ -174,6 +174,10 @@ When you deploy an app using Intune for Education, you may get a `0x87D300D9` er - If the app is approved, then it's possible the app is packaged wrong. For more information, see [Add your own apps](#add-your-own-applications) and [Configure applications with Microsoft Intune][EDUWIN-1] - If the app isn't approved, then it won't run on Windows 11 SE. To get apps approved, see [Add your own apps](#add-your-own-applications). Or, use an app that runs in a web browser, such as a web app or PWA +To access the Settings application during OOBE on a Windows 11 SE device, press Shift+F10, then select the accessibility icon + + on the bottom-right corner of the screen. + ## Related articles - [Tutorial: deploy and manage Windows devices in a school][EDUWIN-2] From d5b5be9966bf8badcef1336dd0fcc8081b466781 Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Wed, 14 Sep 2022 16:05:23 -0400 Subject: [PATCH 053/341] updates --- education/windows/windows-11-se-overview.md | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/education/windows/windows-11-se-overview.md b/education/windows/windows-11-se-overview.md index 9ed80d7a04..5ed8b32328 100644 --- a/education/windows/windows-11-se-overview.md +++ b/education/windows/windows-11-se-overview.md @@ -174,9 +174,7 @@ When you deploy an app using Intune for Education, you may get a `0x87D300D9` er - If the app is approved, then it's possible the app is packaged wrong. For more information, see [Add your own apps](#add-your-own-applications) and [Configure applications with Microsoft Intune][EDUWIN-1] - If the app isn't approved, then it won't run on Windows 11 SE. To get apps approved, see [Add your own apps](#add-your-own-applications). Or, use an app that runs in a web browser, such as a web app or PWA -To access the Settings application during OOBE on a Windows 11 SE device, press Shift+F10, then select the accessibility icon - - on the bottom-right corner of the screen. +To access the Settings application during OOBE on a Windows 11 SE device, press Shift+F10, then select the accessibility icon :::image type="icon" source="images/ic_fluent_accessibility_16_regular.svg" border="false"::: on the bottom-right corner of the screen. ## Related articles From 9a5de45f7cf8b66f5c9a48b08fbb0eec5699c748 Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Wed, 14 Sep 2022 16:39:22 -0400 Subject: [PATCH 054/341] updates --- ...ic_fluent_accessibility_16_regular.svg => accessibility.svg} | 2 +- education/windows/windows-11-se-overview.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) rename education/windows/images/{ic_fluent_accessibility_16_regular.svg => accessibility.svg} (95%) diff --git a/education/windows/images/ic_fluent_accessibility_16_regular.svg b/education/windows/images/accessibility.svg similarity index 95% rename from education/windows/images/ic_fluent_accessibility_16_regular.svg rename to education/windows/images/accessibility.svg index 4f8de69055..b35ad23e33 100644 --- a/education/windows/images/ic_fluent_accessibility_16_regular.svg +++ b/education/windows/images/accessibility.svg @@ -1,3 +1,3 @@ - + \ No newline at end of file diff --git a/education/windows/windows-11-se-overview.md b/education/windows/windows-11-se-overview.md index 5ed8b32328..0cb1ef8e16 100644 --- a/education/windows/windows-11-se-overview.md +++ b/education/windows/windows-11-se-overview.md @@ -174,7 +174,7 @@ When you deploy an app using Intune for Education, you may get a `0x87D300D9` er - If the app is approved, then it's possible the app is packaged wrong. For more information, see [Add your own apps](#add-your-own-applications) and [Configure applications with Microsoft Intune][EDUWIN-1] - If the app isn't approved, then it won't run on Windows 11 SE. To get apps approved, see [Add your own apps](#add-your-own-applications). Or, use an app that runs in a web browser, such as a web app or PWA -To access the Settings application during OOBE on a Windows 11 SE device, press Shift+F10, then select the accessibility icon :::image type="icon" source="images/ic_fluent_accessibility_16_regular.svg" border="false"::: on the bottom-right corner of the screen. +To access the Settings application during OOBE on a Windows 11 SE device, press Shift+F10, then select the accessibility icon :::image type="icon" source="images/accessibility.svg" border="false"::: on the bottom-right corner of the screen. ## Related articles From 4eee4954d8198633e5aabf014a29e2a6b1a4f586 Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Wed, 14 Sep 2022 16:55:42 -0400 Subject: [PATCH 055/341] updates --- education/windows/windows-11-se-faq.yml | 2 +- education/windows/windows-11-se-overview.md | 2 -- 2 files changed, 1 insertion(+), 3 deletions(-) diff --git a/education/windows/windows-11-se-faq.yml b/education/windows/windows-11-se-faq.yml index 93f2a1beca..eb42daa978 100644 --- a/education/windows/windows-11-se-faq.yml +++ b/education/windows/windows-11-se-faq.yml @@ -49,7 +49,7 @@ sections: - name: Out-of-box experience (OOBE) questions: - question: My Windows 11 SE device is stuck in OOBE, how can I reset it? - answer: To access the Settings application during OOBE on a Windows 11 SE device, press Shift+F10, then select the **accessibility icon** on the bottom-right corner of the screen. + answer: To access the Settings application during OOBE on a Windows 11 SE device, press Shift+F10, then select the accessibility icon ![accessibility icon](images/accessibility.svg] on the bottom-right corner of the screen. - name: Resources questions: - question: Where can I find more information how to deploy Windows 11 SE in my school? diff --git a/education/windows/windows-11-se-overview.md b/education/windows/windows-11-se-overview.md index 0cb1ef8e16..c8bca008ef 100644 --- a/education/windows/windows-11-se-overview.md +++ b/education/windows/windows-11-se-overview.md @@ -174,8 +174,6 @@ When you deploy an app using Intune for Education, you may get a `0x87D300D9` er - If the app is approved, then it's possible the app is packaged wrong. For more information, see [Add your own apps](#add-your-own-applications) and [Configure applications with Microsoft Intune][EDUWIN-1] - If the app isn't approved, then it won't run on Windows 11 SE. To get apps approved, see [Add your own apps](#add-your-own-applications). Or, use an app that runs in a web browser, such as a web app or PWA -To access the Settings application during OOBE on a Windows 11 SE device, press Shift+F10, then select the accessibility icon :::image type="icon" source="images/accessibility.svg" border="false"::: on the bottom-right corner of the screen. - ## Related articles - [Tutorial: deploy and manage Windows devices in a school][EDUWIN-2] From 65613a75b14f2d4ae4239104d99baa1271ad3d83 Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Wed, 14 Sep 2022 17:21:19 -0400 Subject: [PATCH 056/341] updates --- education/windows/windows-11-se-faq.yml | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/education/windows/windows-11-se-faq.yml b/education/windows/windows-11-se-faq.yml index eb42daa978..4d53fe00ef 100644 --- a/education/windows/windows-11-se-faq.yml +++ b/education/windows/windows-11-se-faq.yml @@ -49,7 +49,10 @@ sections: - name: Out-of-box experience (OOBE) questions: - question: My Windows 11 SE device is stuck in OOBE, how can I reset it? - answer: To access the Settings application during OOBE on a Windows 11 SE device, press Shift+F10, then select the accessibility icon ![accessibility icon](images/accessibility.svg] on the bottom-right corner of the screen. + answer: | + To access the Settings application during OOBE on a Windows 11 SE device, press Shift+F10, then select the accessibility icon :::image type="icon" source="images/accessibility.svg" border="false"::: on the bottom-right corner of the screen. + + - name: Resources questions: - question: Where can I find more information how to deploy Windows 11 SE in my school? From 679d36a057f17cc83fc58f7a6fb519d2279a1f78 Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Wed, 14 Sep 2022 17:52:35 -0400 Subject: [PATCH 057/341] update --- education/windows/windows-11-se-faq.yml | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/education/windows/windows-11-se-faq.yml b/education/windows/windows-11-se-faq.yml index 4d53fe00ef..934b47eb18 100644 --- a/education/windows/windows-11-se-faq.yml +++ b/education/windows/windows-11-se-faq.yml @@ -50,9 +50,7 @@ sections: questions: - question: My Windows 11 SE device is stuck in OOBE, how can I reset it? answer: | - To access the Settings application during OOBE on a Windows 11 SE device, press Shift+F10, then select the accessibility icon :::image type="icon" source="images/accessibility.svg" border="false"::: on the bottom-right corner of the screen. - - + To access the Settings application during OOBE on a Windows 11 SE device, press Shift+F10, then select the accessibility icon :::image type="icon" source="images/accessibility.svg" border="false"::: on the bottom-right corner of the screen. - name: Resources questions: - question: Where can I find more information how to deploy Windows 11 SE in my school? From 9a5ba9d2a0dbe1f5af149827d40f98adb2677226 Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Wed, 14 Sep 2022 18:34:36 -0400 Subject: [PATCH 058/341] updates --- education/windows/images/accessibility.svg | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/education/windows/images/accessibility.svg b/education/windows/images/accessibility.svg index b35ad23e33..793a95cf87 100644 --- a/education/windows/images/accessibility.svg +++ b/education/windows/images/accessibility.svg @@ -1,3 +1,3 @@ - + \ No newline at end of file From 5090368490df98a7b2ce3019598992097b66a421 Mon Sep 17 00:00:00 2001 From: valemieux <98555474+valemieux@users.noreply.github.com> Date: Thu, 15 Sep 2022 06:06:46 -0700 Subject: [PATCH 059/341] Update citool-commands.md --- .../citool-commands.md | 108 +++++++++--------- 1 file changed, 54 insertions(+), 54 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-application-control/citool-commands.md b/windows/security/threat-protection/windows-defender-application-control/citool-commands.md index 94c0be2807..846e91f229 100644 --- a/windows/security/threat-protection/windows-defender-application-control/citool-commands.md +++ b/windows/security/threat-protection/windows-defender-application-control/citool-commands.md @@ -19,20 +19,20 @@ This article will describe how to use CI Tool to update and manage policies. CI | Command | Description | Alias | |--------|---------|---------| -| --update-policy /Path/To/Policy/File | Add or update a policy on the current system | -up | -| --remove-policy PolicyGUID | Remove a policy indicated by PolicyGUID from the system | -rp | +| --update-policy | Add or update a policy on the current system | -up | +| --remove-policy | Remove a policy indicated by PolicyGUID from the system | -rp | | --list-policies | Dump information about all policies on the system, whether they are active or not | -lp | ## Token Commands | Command | Description | Alias | |--------|---------|---------| -| --add-token Path/To/Token/File [--token-id ID] | Deploy a token onto the current system, with an optional specific ID. | -at | -| --remove-token ID | Remove a Token indicated by ID from the system. | -rt | +| --add-token <--token-id ID> | Deploy a token onto the current system, with an optional specific ID. | -at | +| --remove-token | Remove a Token indicated by ID from the system. | -rt | | --list-tokens | Dump information about all tokens on the system | -lt | >[!NOTE] ->Regarding --add-token, if [ID] is specified, a pre-existing token with [ID] should not exist. +>Regarding --add-token, if is specified, a pre-existing token with should not exist. ## Miscellaneous Commands @@ -46,58 +46,58 @@ This article will describe how to use CI Tool to update and manage policies. CI 1. Deploy a WDAC policy onto the system -```powershell -PS C:\Users\[USER] CITool --update-policy "\Windows\Temp\{BF61FE40-8929-4FDF-9EC2-F7A767717F0B}.cip" -Operation Successful -Press Enter to Continue -``` + ```powershell + PS C:\Users\ CITool --update-policy "\Windows\Temp\{BF61FE40-8929-4FDF-9EC2-F7A767717F0B}.cip" + Operation Successful + Press Enter to Continue + ``` 2. Refresh the WDAC policies -```powershell -PS C:\Users\[USER] CITool --refresh -Operation Successful -``` + ```powershell + PS C:\Users\ CITool --refresh + Operation Successful + ``` 3. Remove a specific WDAC policy by its policy ID -```powershell -PS C:\Users\[USER] CiTool --remove-policy "{BF61FE40-8929-4FDF-9EC2-F7A767717F0B}" -Operation Successful -Press Enter to Continue -``` + ```powershell + PS C:\Users\ CiTool --remove-policy "{BF61FE40-8929-4FDF-9EC2-F7A767717F0B}" + Operation Successful + Press Enter to Continue + ``` 4. Display the help menu -```powershell -PS C:\Users\[USER] CITool -h - ------------------------------ Policy Commands --------------------------------- - --update-policy /Path/To/Policy/File - Add or update a policy on the current system - aliases: -up - --remove-policy PolicyGUID - Remove a policy indicated by PolicyGUID from the system - aliases: -rp - --list-policies - Dump information about all policies on the system, whether they be active or not - aliases: -lp ------------------------------ Token Commands --------------------------------- - --add-token Path/To/Token/File [--token-id ID] - Deploy a token onto the current system, with an optional specific ID - If [ID] is specified, a pre-existing token with [ID] should not exist. - aliases:-at - --remove-token ID - Remove a Token indicated by ID from the system. - aliases: -rt - --list-tokens - Dump information about all tokens on the system - aliases: -lt ------------------------------ Misc Commands --------------------------------- - --device-id - Dump the Code Integrity Device Id - aliases: -id - --refresh - Attempt to Refresh CI Policies - aliases: -r - --help - Display this message - aliases: -h -``` \ No newline at end of file + ```powershell + PS C:\Users\ CITool -h + + ----------------------------- Policy Commands --------------------------------- + --update-policy /Path/To/Policy/File + Add or update a policy on the current system + aliases: -up + --remove-policy PolicyGUID + Remove a policy indicated by PolicyGUID from the system + aliases: -rp + --list-policies + Dump information about all policies on the system, whether they be active or not + aliases: -lp + ----------------------------- Token Commands --------------------------------- + --add-token Path/To/Token/File <--token-id ID> + Deploy a token onto the current system, with an optional specific ID + If is specified, a pre-existing token with should not exist. + aliases:-at + --remove-token ID + Remove a Token indicated by ID from the system. + aliases: -rt + --list-tokens + Dump information about all tokens on the system + aliases: -lt + ----------------------------- Misc Commands --------------------------------- + --device-id + Dump the Code Integrity Device Id + aliases: -id + --refresh + Attempt to Refresh CI Policies + aliases: -r + --help + Display this message + aliases: -h + ``` \ No newline at end of file From 110539049b8be5224ecadcb627dc93c8bf1290a0 Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Thu, 15 Sep 2022 09:07:30 -0400 Subject: [PATCH 060/341] updates --- .../images/{ => icons}/accessibility.svg | 2 +- .../windows/images/icons/group-policy.svg | 3 + education/windows/images/icons/intune.svg | 24 ++++ .../images/icons/provisioning-package.svg | 3 + education/windows/windows-11-se-faq.yml | 9 +- education/windows/windows-11-se-overview.md | 104 ++++++++++++++++++ 6 files changed, 142 insertions(+), 3 deletions(-) rename education/windows/images/{ => icons}/accessibility.svg (96%) create mode 100644 education/windows/images/icons/group-policy.svg create mode 100644 education/windows/images/icons/intune.svg create mode 100644 education/windows/images/icons/provisioning-package.svg diff --git a/education/windows/images/accessibility.svg b/education/windows/images/icons/accessibility.svg similarity index 96% rename from education/windows/images/accessibility.svg rename to education/windows/images/icons/accessibility.svg index 793a95cf87..1c57fce1fc 100644 --- a/education/windows/images/accessibility.svg +++ b/education/windows/images/icons/accessibility.svg @@ -1,3 +1,3 @@ - + \ No newline at end of file diff --git a/education/windows/images/icons/group-policy.svg b/education/windows/images/icons/group-policy.svg new file mode 100644 index 0000000000..59e4c20420 --- /dev/null +++ b/education/windows/images/icons/group-policy.svg @@ -0,0 +1,3 @@ + + + \ No newline at end of file diff --git a/education/windows/images/icons/intune.svg b/education/windows/images/icons/intune.svg new file mode 100644 index 0000000000..6e0d938aed --- /dev/null +++ b/education/windows/images/icons/intune.svg @@ -0,0 +1,24 @@ + + + + + + + + + + + + + + + + Icon-intune-329 + + + + + + + + \ No newline at end of file diff --git a/education/windows/images/icons/provisioning-package.svg b/education/windows/images/icons/provisioning-package.svg new file mode 100644 index 0000000000..c83dc20c3e --- /dev/null +++ b/education/windows/images/icons/provisioning-package.svg @@ -0,0 +1,3 @@ + + + \ No newline at end of file diff --git a/education/windows/windows-11-se-faq.yml b/education/windows/windows-11-se-faq.yml index 934b47eb18..eb3558ea24 100644 --- a/education/windows/windows-11-se-faq.yml +++ b/education/windows/windows-11-se-faq.yml @@ -36,6 +36,11 @@ sections: - Use Snap Assist to maximize screen space on smaller screens with two-window snapping - Store your Desktop, Documents, and Photos folders in the cloud using OneDrive, so your work is backed up and easy to find - Express yourself and celebrate accomplishments with the *emoji and GIF panel* and *Stickers* + - name: Deployment + questions: + - question: Can I load Win11SE on any hardware? + answer: | + Windows 11 SE ... - name: Applications and settings questions: - question: Why is there no application store on Windows 11 SE? What apps will work on Windows 11 SE? @@ -48,9 +53,9 @@ sections: To learn more, go to the [][]. - name: Out-of-box experience (OOBE) questions: - - question: My Windows 11 SE device is stuck in OOBE, how can I reset it? + - question: My Windows 11 SE device is stuck in OOBE, how can I troubleshoot it? answer: | - To access the Settings application during OOBE on a Windows 11 SE device, press Shift+F10, then select the accessibility icon :::image type="icon" source="images/accessibility.svg" border="false"::: on the bottom-right corner of the screen. + To access the Settings application during OOBE on a Windows 11 SE device, press Shift+F10, then select the accessibility icon :::image type="icon" source="images/icons/accessibility.svg"::: on the bottom-right corner of the screen. - name: Resources questions: - question: Where can I find more information how to deploy Windows 11 SE in my school? diff --git a/education/windows/windows-11-se-overview.md b/education/windows/windows-11-se-overview.md index c8bca008ef..ce736cd8d7 100644 --- a/education/windows/windows-11-se-overview.md +++ b/education/windows/windows-11-se-overview.md @@ -174,6 +174,110 @@ When you deploy an app using Intune for Education, you may get a `0x87D300D9` er - If the app is approved, then it's possible the app is packaged wrong. For more information, see [Add your own apps](#add-your-own-applications) and [Configure applications with Microsoft Intune][EDUWIN-1] - If the app isn't approved, then it won't run on Windows 11 SE. To get apps approved, see [Add your own apps](#add-your-own-applications). Or, use an app that runs in a web browser, such as a web app or PWA +## Enable federated sign-in on devices + +Before you can sign-in with a federated IdP, your devices must be configured with different policies. Follow the instructions below to configure your devices using either Microsoft Intune or a provisioning package (PPKG). + +#### [:::image type="icon" source="images/icons/intune.svg"::: **Intune**](#tab/intune) + +To configure federated sign-in using Microsoft Intune, use a custom profile. + +1. Sign in to the Microsoft Endpoint Manager admin center and [create a profile with custom settings][MEM-1] +1. Specify a **Name**, **Description**, and use the values for each policy in the following table: + + | Policy | + |--------| + |
    ------- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Action

    On owner node of failover volume

    On Metadata Server (MDS) of CSV

    On (Data Server) DS of CSV

    Maintenance Mode

    Manage-bde –on

    Blocked

    Blocked

    Blocked

    Allowed

    Manage-bde –off

    Blocked

    Blocked

    Blocked

    Allowed

    Manage-bde Pause/Resume

    Blocked

    Blocked

    Blocked

    Allowed

    Manage-bde –lock

    Blocked

    Blocked

    Blocked

    Allowed

    manage-bde –wipe

    Blocked

    Blocked

    Blocked

    Allowed

    Unlock

    Automatic via cluster service

    Automatic via cluster service

    Automatic via cluster service

    Allowed

    manage-bde –protector –add

    Allowed

    Allowed

    Blocked

    Allowed

    manage-bde -protector -delete

    Allowed

    Allowed

    Blocked

    Allowed

    manage-bde –autounlock

    Allowed (not recommended)

    Allowed (not recommended)

    Blocked

    Allowed (not recommended)

    Manage-bde -upgrade

    Allowed

    Allowed

    Blocked

    Allowed

    Shrink

    Allowed

    Allowed

    Blocked

    Allowed

    Extend

    Allowed

    Allowed

    Blocked

    Allowed

    - ->Note:** Although the **manage-bde -pause** command is blocked in clusters, the cluster service automatically resumes a paused encryption or decryption from the MDS node. +| Action | On owner node of failover volume | On Metadata Server (MDS) of CSV | On (Data Server) DS of CSV | Maintenance Mode | +|--- |--- |--- |--- |--- | +|**Manage-bde –on**|Blocked|Blocked|Blocked|Allowed| +|**Manage-bde –off**|Blocked|Blocked|Blocked|Allowed| +|**Manage-bde Pause/Resume**|Blocked|Blocked**|Blocked|Allowed| +|**Manage-bde –lock**|Blocked|Blocked|Blocked|Allowed| +|**manage-bde –wipe**|Blocked|Blocked|Blocked|Allowed| +|**Unlock**|Automatic via cluster service|Automatic via cluster service|Automatic via cluster service|Allowed| +|**manage-bde –protector –add**|Allowed|Allowed|Blocked|Allowed| +|**manage-bde -protector -delete**|Allowed|Allowed|Blocked|Allowed| +|**manage-bde –autounlock**|Allowed (not recommended)|Allowed (not recommended)|Blocked|Allowed (not recommended)| +|**Manage-bde -upgrade**|Allowed|Allowed|Blocked|Allowed| +|**Shrink**|Allowed|Allowed|Blocked|Allowed| +|**Extend**|Allowed|Allowed|Blocked|Allowed| + +> [!NOTE] +> Although the **manage-bde -pause** command is blocked in clusters, the cluster service automatically resumes a paused encryption or decryption from the MDS node. In the case where a physical disk resource experiences a failover event during conversion, the new owning node detects that the conversion isn't complete and completes the conversion process. From a1df887f6671944604df056b6dfebe5b43f1bc60 Mon Sep 17 00:00:00 2001 From: Siddarth Mandalika Date: Fri, 16 Sep 2022 12:58:01 +0530 Subject: [PATCH 076/341] resolved comments --- .../bitlocker-device-encryption-overview-windows-10.md | 2 +- ...are-your-organization-for-bitlocker-planning-and-policies.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10.md b/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10.md index e0d12cc32a..20fe2b176d 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10.md +++ b/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10.md @@ -19,7 +19,7 @@ ms.custom: bitlocker **Applies to** - Windows 10 - Windows 11 -- Windows Server 2016 and above +- Windows Server 2016 and later This topic explains how BitLocker Device Encryption can help protect data on devices running Windows. For a general overview and list of topics about BitLocker, see [BitLocker](bitlocker-overview.md). diff --git a/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md b/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md index ff944581f9..1b77d14e1c 100644 --- a/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md +++ b/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md @@ -155,7 +155,7 @@ With Full drive encryption, the entire drive is encrypted, whether data is store BitLocker integrates with Active Directory Domain Services (AD DS) to provide centralized key management. By default, no recovery information is backed up to Active Directory. Administrators can configure the following group policy setting for each drive type to enable backup of BitLocker recovery information: -Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\*drive type*\\Choose how BitLocker-protected drives can be recovered. +Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\*drive type*\\Choose how BitLocker-protected drives can be recovered. By default, only Domain Admins have access to BitLocker recovery information, but [access can be delegated to others](/archive/blogs/craigf/delegating-access-in-ad-to-bitlocker-recovery-information). From 4d71847064fb5c6efa08877119f5bccc36a2e0ee Mon Sep 17 00:00:00 2001 From: Siddarth Mandalika Date: Fri, 16 Sep 2022 13:50:06 +0530 Subject: [PATCH 077/341] Update bitlocker-device-encryption-overview-windows-10.md --- .../bitlocker-device-encryption-overview-windows-10.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10.md b/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10.md index 334dcb3e62..e1d313bfbc 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10.md +++ b/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10.md @@ -22,8 +22,8 @@ ms.custom: bitlocker - Windows 11 - Windows Server 2016 and above -This topic explains how BitLocker Device Encryption can help protect data on devices running Windows. -For a general overview and list of topics about BitLocker, see [BitLocker](bitlocker-overview.md). +This article explains how BitLocker Device Encryption can help protect data on devices running Windows. +For a general overview and list of articles about BitLocker, see [BitLocker](bitlocker-overview.md). When users travel, their organization’s confidential data goes with them. Wherever confidential data is stored, it must be protected against unauthorized access. Windows has a long history of providing at-rest data-protection solutions that guard against nefarious attackers, beginning with the Encrypting File System in the Windows 2000 operating system. More recently, BitLocker has provided encryption for full drives and portable drives. Windows consistently improves data protection by improving existing options and providing new strategies. From 87448d4ead7a9a986c69db8b2ae433fd074e1727 Mon Sep 17 00:00:00 2001 From: Siddarth Mandalika Date: Fri, 16 Sep 2022 14:36:33 +0530 Subject: [PATCH 078/341] Update bitlocker-recovery-guide-plan.md --- .../bitlocker/bitlocker-recovery-guide-plan.md | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan.md b/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan.md index 54df9c5536..76cd8bab26 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan.md +++ b/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan.md @@ -102,14 +102,14 @@ Before you create a thorough BitLocker recovery process, we recommend that you t **To force a recovery for the local computer:** -1. Click the **Start** button, type **cmd** in the **Start Search** box, right-click **cmd.exe**, and then click **Run as administrator**. +1. Select the **Start** button, type **cmd** in the **Start Search** box, and select and hold **cmd.exe**, and then select **Run as administrator**. 2. At the command prompt, type the following command and then press **ENTER**: `manage-bde -forcerecovery ` **To force recovery for a remote computer:** -1. On the Start screen, type **cmd.exe**, and then click **Run as administrator**. +1. On the Start screen, type **cmd.exe**, and then select **Run as administrator**. 2. At the command prompt, type the following command and then press **ENTER**: @@ -150,7 +150,7 @@ If the user does not have a recovery password in a printout or on a USB flash dr - **Choose how BitLocker-protected operating system drives can be recovered** - **Choose how BitLocker-protected fixed drives can be recovered** - **Choose how BitLocker-protected removable drives can be recovered** -In each of these policies, select **Save BitLocker recovery information to Active Directory Domain Services** and then choose which BitLocker recovery information to store in AD DS. Select the **Do not enable BitLocker until recovery information is stored in AD +In each of these policies, select **Save BitLocker recovery information to Active Directory Domain Services** and then choose which BitLocker recovery information to store in AD DS. Check the **Do not enable BitLocker until recovery information is stored in AD DS** check box if you want to prevent users from enabling BitLocker unless the computer is connected to the domain and the backup of BitLocker recovery information for the drive to AD DS succeeds. > [!NOTE] @@ -250,9 +250,9 @@ If a user has forgotten the PIN, you must reset the PIN while you are logged on 1. Unlock the computer using the recovery password. 2. Reset the PIN: - 1. Right-click the drive and then click **Change PIN** - 2. In the BitLocker Drive Encryption dialog, click **Reset a forgotten PIN**. If you are not logged in with an administrator account, you must provide administrative credentials at this time. - 3. In the PIN reset dialog, provide and confirm the new PIN to be used and then click **Finish**. + 1. Select and hold the drive and then select **Change PIN** + 2. In the BitLocker Drive Encryption dialog, select **Reset a forgotten PIN**. If you are not logged in with an administrator account, you must provide administrative credentials at this time. + 3. In the PIN reset dialog, provide and confirm the new PIN to be used and then select **Finish**. 3. You will use the new PIN the next time you unlock the drive. ### Lost startup key @@ -263,7 +263,7 @@ If you have lost the USB flash drive that contains the startup key, then you mus 1. Log on as an administrator to the computer that has its startup key lost. 2. Open Manage BitLocker. -3. Click **Duplicate start up key**, insert the clean USB drive on which you are going to write the key, and then click **Save**. +3. Select **Duplicate start up key**, insert the clean USB drive on which you are going to write the key, and then select **Save**. ### Changes to boot files From 0264341de4b11b7d492b3d811fab1467d2fe43d0 Mon Sep 17 00:00:00 2001 From: Siddarth Mandalika Date: Fri, 16 Sep 2022 14:52:27 +0530 Subject: [PATCH 079/341] Update bitlocker-overview.md --- .../information-protection/bitlocker/bitlocker-overview.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/information-protection/bitlocker/bitlocker-overview.md b/windows/security/information-protection/bitlocker/bitlocker-overview.md index 9a6ffdc982..35d12539cf 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-overview.md +++ b/windows/security/information-protection/bitlocker/bitlocker-overview.md @@ -98,7 +98,7 @@ When installing the BitLocker optional component on a server, you will also need | [Protect BitLocker from pre-boot attacks](./bitlocker-countermeasures.md)| This detailed guide helps you understand the circumstances under which the use of pre-boot authentication is recommended for devices running Windows 10, Windows 8.1, Windows 8, or Windows 7; and when it can be safely omitted from a device’s configuration. | | [Troubleshoot BitLocker](troubleshoot-bitlocker.md) | This guide describes the resources that can help you troubleshoot BitLocker issues, and provides solutions for several common BitLocker issues. | | [Protecting cluster shared volumes and storage area networks with BitLocker](protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md)| This topic describes how to protect CSVs and SANs with BitLocker.| -| [Enabling Secure Boot and BitLocker Device Encryption on Windows 10 IoT Core](https://developer.microsoft.com/windows/iot/docs/securebootandbitlocker) | This topic describes how to use BitLocker with Windows 10 IoT Core | +| [Enabling Secure Boot and BitLocker Device Encryption on Windows IoT Core](/windows/iot-core/secure-your-device/SecureBootAndBitLocker) | This topic describes how to use BitLocker with Windows IoT Core | From 7fbb36d6daf20074ff79a82edf0164076f245e5f Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Fri, 16 Sep 2022 08:09:29 -0400 Subject: [PATCH 080/341] updates --- education/windows/images/icons/accessibility.svg | 2 +- education/windows/images/icons/group-policy.svg | 2 +- education/windows/images/icons/provisioning-package.svg | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/education/windows/images/icons/accessibility.svg b/education/windows/images/icons/accessibility.svg index f3a67e4764..5b5e0df394 100644 --- a/education/windows/images/icons/accessibility.svg +++ b/education/windows/images/icons/accessibility.svg @@ -1,3 +1,3 @@ - + \ No newline at end of file diff --git a/education/windows/images/icons/group-policy.svg b/education/windows/images/icons/group-policy.svg index 915247c0bc..d4626c1668 100644 --- a/education/windows/images/icons/group-policy.svg +++ b/education/windows/images/icons/group-policy.svg @@ -1,3 +1,3 @@ - + \ No newline at end of file diff --git a/education/windows/images/icons/provisioning-package.svg b/education/windows/images/icons/provisioning-package.svg index d8047940a6..24ae584973 100644 --- a/education/windows/images/icons/provisioning-package.svg +++ b/education/windows/images/icons/provisioning-package.svg @@ -1,3 +1,3 @@ - + \ No newline at end of file From c7cce95ddd8d1b5bd658ef7ba70adde6938095a4 Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Fri, 16 Sep 2022 12:44:32 -0400 Subject: [PATCH 081/341] updates --- education/windows/federated-sign-in.md | 2 +- education/windows/images/icons/accessibility.svg | 2 +- education/windows/images/icons/group-policy.svg | 2 +- education/windows/images/icons/provisioning-package.svg | 2 +- education/windows/images/icons/windows-os.svg | 3 +++ 5 files changed, 7 insertions(+), 4 deletions(-) create mode 100644 education/windows/images/icons/windows-os.svg diff --git a/education/windows/federated-sign-in.md b/education/windows/federated-sign-in.md index 2a0b87280d..d7c4c13f29 100644 --- a/education/windows/federated-sign-in.md +++ b/education/windows/federated-sign-in.md @@ -12,7 +12,7 @@ ms.reviewer: manager: aaroncz ms.collection: education appliesto: -- ✅ Windows 11 SE 22H2 +- :::image type="icon" source="images/icons/windows-os.svg"::: Windows 11 SE 22H2 --- diff --git a/education/windows/images/icons/accessibility.svg b/education/windows/images/icons/accessibility.svg index 5b5e0df394..21a6b4f235 100644 --- a/education/windows/images/icons/accessibility.svg +++ b/education/windows/images/icons/accessibility.svg @@ -1,3 +1,3 @@ - + \ No newline at end of file diff --git a/education/windows/images/icons/group-policy.svg b/education/windows/images/icons/group-policy.svg index d4626c1668..ace95add6b 100644 --- a/education/windows/images/icons/group-policy.svg +++ b/education/windows/images/icons/group-policy.svg @@ -1,3 +1,3 @@ - + \ No newline at end of file diff --git a/education/windows/images/icons/provisioning-package.svg b/education/windows/images/icons/provisioning-package.svg index 24ae584973..dbbad7d780 100644 --- a/education/windows/images/icons/provisioning-package.svg +++ b/education/windows/images/icons/provisioning-package.svg @@ -1,3 +1,3 @@ - + \ No newline at end of file diff --git a/education/windows/images/icons/windows-os.svg b/education/windows/images/icons/windows-os.svg new file mode 100644 index 0000000000..da64baf975 --- /dev/null +++ b/education/windows/images/icons/windows-os.svg @@ -0,0 +1,3 @@ + + + \ No newline at end of file From 53c05e668aa43e959ee1ec13120a53f465b36d5c Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Fri, 16 Sep 2022 13:07:06 -0400 Subject: [PATCH 082/341] updates --- education/windows/federated-sign-in.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/education/windows/federated-sign-in.md b/education/windows/federated-sign-in.md index d7c4c13f29..2a0b87280d 100644 --- a/education/windows/federated-sign-in.md +++ b/education/windows/federated-sign-in.md @@ -12,7 +12,7 @@ ms.reviewer: manager: aaroncz ms.collection: education appliesto: -- :::image type="icon" source="images/icons/windows-os.svg"::: Windows 11 SE 22H2 +- ✅ Windows 11 SE 22H2 --- From d541153c2970e565c58d28785546c19833b5396f Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Fri, 16 Sep 2022 14:05:21 -0400 Subject: [PATCH 083/341] updates --- education/windows/windows-11-se-faq.yml | 37 +++++++------------------ 1 file changed, 10 insertions(+), 27 deletions(-) diff --git a/education/windows/windows-11-se-faq.yml b/education/windows/windows-11-se-faq.yml index bab9f5c635..7c3a2a1d0a 100644 --- a/education/windows/windows-11-se-faq.yml +++ b/education/windows/windows-11-se-faq.yml @@ -43,37 +43,20 @@ sections: Windows 11 SE ... - name: Applications and settings questions: - - question: Why is there no application store on Windows 11 SE? What apps will work on Windows 11 SE? + - question: How can I install applications on Windows 11 SE? answer: | - The IT Admins at your school manage system settings (including application installation and the application store) to ensure all students have a safe, distraction-free experience. On your device you'll have pre-installed apps from Microsoft, from your IT admin, and from your device manufacturer. You can continue to use web apps on the Microsoft Edge browser, as web apps do not require installation. - To learn more, go to the [][]. - - question: Why is there no application store on Windows 11 SE? What apps will work on Windows 11 SE? + You can use Microsoft Intune to install applications on Windows 11 SE. + For more information, see [Configure applications with Microsoft Intune](education/windows/tutorial-school-deployment/configure-device-app). + - question: What apps will work on Windows 11 SE? answer: | - The IT Admins at your school manage system settings (including application installation and the application store) to ensure all students have a safe, distraction-free experience. On your device you'll have pre-installed apps from Microsoft, from your IT admin, and from your device manufacturer. You can continue to use web apps on the Microsoft Edge browser, as web apps do not require installation. - To learn more, go to the [][]. - - question: Why do I get 0x87D300D9 error code with a `Failed` state in Intune? + Windows 11 SE supports all web applications and a curated list of desktop applications. You can prepare and add a desktop app to Microsoft Intune as a Win32 app from the [approved app list](/education/windows/windows-11-se-overview), then distribute it. + For more information, see [Considerations for Windows 11 SE](education/windows/tutorial-school-deployment/configure-device-apps#considerations-for-windows-11-se). + - question: Why there's no application store on Windows 11 SE? answer: | - If you have an app that fails with this error, then: - - Make sure the app is on the [available applications list](#available-applications). Or, make sure your app is [approved for Windows 11 SE](#add-your-own-applications) - - If the app is approved, then it's possible the app is packaged wrong. For more information, see [Add your own apps](#add-your-own-applications) and [Configure applications with Microsoft Intune][EDUWIN-1] - - If the app isn't approved, then it won't run on Windows 11 SE. To get apps approved, see [Add your own apps](#add-your-own-applications). Or, use an app that runs in a web browser, such as a web app or PWA + IT Admins can manage system settings (including application installation and the application store) to ensure all students have a safe, distraction-free experience. On Windows SE devices, you have pre-installed apps from Microsoft, from your IT admin, and from your device manufacturer. You can continue to use web apps on the Microsoft Edge browser, as web apps do not require installation. + For more information, see [Configure applications with Microsoft Intune](education/windows/tutorial-school-deployment/configure-device-app). - name: Out-of-box experience (OOBE) questions: - question: My Windows 11 SE device is stuck in OOBE, how can I troubleshoot it? answer: | - To access the Settings application during OOBE on a Windows 11 SE device, press Shift+F10, then select the accessibility icon :::image type="icon" source="images/icons/accessibility.svg"::: on the bottom-right corner of the screen. - - name: Resources - questions: - - question: Where can I find more information how to deploy Windows 11 SE in my school? - answer: | - Here are some resources to get you started: [][]. - - question: Where can I learn more about Windows Autopilot? - answer: | - - [][] - - question: Where can I learn more about managing Windows SE devices with Microsoft Intune? - answer: | - - [][] - -additionalContent: | - ## Additional Content - Here's some optional text that can be placed at the end of the document. \ No newline at end of file + To access the Settings application during OOBE on a Windows 11 SE device, press Shift+F10, then select the accessibility icon :::image type="icon" source="images/icons/accessibility.svg"::: on the bottom-right corner of the screen. From the Settings application, you can troubleshoot the OOBE process and, optionally, trigger a device reset. From 51560473d90add42c6ddb345190e177c6b4787ca Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Fri, 16 Sep 2022 17:04:07 -0400 Subject: [PATCH 084/341] updates --- education/windows/images/icons/registry.svg | 48 +++++++++------------ 1 file changed, 21 insertions(+), 27 deletions(-) diff --git a/education/windows/images/icons/registry.svg b/education/windows/images/icons/registry.svg index 8e3f037c09..06ab4c09d7 100644 --- a/education/windows/images/icons/registry.svg +++ b/education/windows/images/icons/registry.svg @@ -1,28 +1,22 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + Icon-general-18 + + \ No newline at end of file From 508683f08cbdc82ff25d6252f390be9c26eabcef Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Fri, 16 Sep 2022 17:24:01 -0400 Subject: [PATCH 085/341] updates --- education/windows/federated-sign-in.md | 20 ++++++++++++++------ 1 file changed, 14 insertions(+), 6 deletions(-) diff --git a/education/windows/federated-sign-in.md b/education/windows/federated-sign-in.md index 2a0b87280d..3cc2845c35 100644 --- a/education/windows/federated-sign-in.md +++ b/education/windows/federated-sign-in.md @@ -54,14 +54,10 @@ To configure federated sign-in using Microsoft Intune, [create a custom profile] |
  • OMA-URI: **`./Vendor/MSFT/Policy/Config/Authentication/ConfigureWebCamAccessDomainNames`**
  • Data type: **String**
  • Value: This setting is optional, and it should be configured if you need to use the webcam during the sign-in process. Specify the list of domains that re llowed to use the webcam during the sign-in process, separated by a semicolon. For example: **`clever.com`**
  • | |
  • OMA-URI: **`./Vendor/MSFT/SharedPC/EnableSharedPCMode`**
  • Data type: **Boolean**
  • Value: **False**
  • | -:::image type="content" source="images/federated-authentication-settings-intune.png" alt-text="Custom policy showing the settings to be configured to enable federated sign-in" lightbox="images/edu-federated-authentication-settings.png" border="true"::: +:::image type="content" source="images/federated-authentication-settings-intune.png" alt-text="Custom policy showing the settings to be configured to enable federated sign-in" lightbox="images/federated-authentication-settings-intune.png" border="true"::: Assign the policy to a security group that contains as members the devices that require federated sign-in. -```OMA-URI - ./Vendor/MSFT/Policy/Config/FederatedAuthentication/EnableWebSignInForPrimaryUser -``` - #### [:::image type="icon" source="images/icons/provisioning-package.svg"::: **PPKG**](#tab/ppkg) To configure federated sign-in using a provisioning package, use the following settings: @@ -80,12 +76,24 @@ Apply the provisioning package to the devices that require federated sign-in. #### [:::image type="icon" source="images/icons/group-policy.svg"::: **GPO**](#tab/gpo) -This setting is not available in Group Policy. +This setting cannot be configured via Group Policy. #### [:::image type="icon" source="images/icons/registry.svg"::: **Registry**](#tab/reg) This setting cannot be configured via registry. +#### [:::image type="icon" source="images/icons/windows-os.svg"::: **CSP**](#tab/csp) + +To configure federated sign-in using Configuration Service Providers, use the following settings: + +| Setting | +|--------| +|
  • OMA-URI: **`./Vendor/MSFT/Policy/Config/FederatedAuthentication/EnableWebSignInForPrimaryUser`**
  • Data type: **Integer**
  • Value: **1**
  • | +|
  • OMA-URI: **`./Vendor/MSFT/Policy/Config/Authentication/ConfigureWebSignInAllowedUrls`**
  • Data type: **String**
  • Value: Semicolon separated list of domains, for example: **`samlidp.clever.com;clever.com;mobile-redirector.clever.com`**
  • | +|
  • OMA-URI: **`./Vendor/MSFT/Policy/Config/Education/IsEducationEnvironment`**
  • Data type: **Integer**
  • Value: **1**
  • | +|
  • OMA-URI: **`./Vendor/MSFT/Policy/Config/Authentication/ConfigureWebCamAccessDomainNames`**
  • Data type: **String**
  • Value: This setting is optional, and it should be configured if you need to use the webcam during the sign-in process. Specify the list of domains that re llowed to use the webcam during the sign-in process, separated by a semicolon. For example: **`clever.com`**
  • | +|
  • OMA-URI: **`./Vendor/MSFT/SharedPC/EnableSharedPCMode`**
  • Data type: **Boolean**
  • Value: **False**
  • | + --- ## How to use federated sign-in From 432fa7f4514c09ca4a9495b0ed3fb639aa3f9779 Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Fri, 16 Sep 2022 17:31:54 -0400 Subject: [PATCH 086/341] updates --- education/windows/federated-sign-in.md | 3 +++ education/windows/images/icons/powershell.svg | 20 +++++++++++++++++++ 2 files changed, 23 insertions(+) create mode 100644 education/windows/images/icons/powershell.svg diff --git a/education/windows/federated-sign-in.md b/education/windows/federated-sign-in.md index 3cc2845c35..254d3feff0 100644 --- a/education/windows/federated-sign-in.md +++ b/education/windows/federated-sign-in.md @@ -82,6 +82,9 @@ This setting cannot be configured via Group Policy. This setting cannot be configured via registry. +#### [:::image type="icon" source="images/icons/powershell.svg"::: **PowerShell**](#tab/reg) + +This setting cannot be configured via PowerShell. #### [:::image type="icon" source="images/icons/windows-os.svg"::: **CSP**](#tab/csp) To configure federated sign-in using Configuration Service Providers, use the following settings: diff --git a/education/windows/images/icons/powershell.svg b/education/windows/images/icons/powershell.svg new file mode 100644 index 0000000000..ab2d5152ca --- /dev/null +++ b/education/windows/images/icons/powershell.svg @@ -0,0 +1,20 @@ + + + + + + + + + + MsPortalFx.base.images-10 + + + + + + + + + + \ No newline at end of file From ca11de9021552e89f9f368fa158e8d39a5af7856 Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Sat, 17 Sep 2022 19:45:58 -0400 Subject: [PATCH 087/341] updates --- education/windows/federated-sign-in.md | 23 ++++++++++++----------- 1 file changed, 12 insertions(+), 11 deletions(-) diff --git a/education/windows/federated-sign-in.md b/education/windows/federated-sign-in.md index 254d3feff0..052a0eb15c 100644 --- a/education/windows/federated-sign-in.md +++ b/education/windows/federated-sign-in.md @@ -74,17 +74,6 @@ To configure federated sign-in using a provisioning package, use the following s Apply the provisioning package to the devices that require federated sign-in. -#### [:::image type="icon" source="images/icons/group-policy.svg"::: **GPO**](#tab/gpo) - -This setting cannot be configured via Group Policy. - -#### [:::image type="icon" source="images/icons/registry.svg"::: **Registry**](#tab/reg) - -This setting cannot be configured via registry. - -#### [:::image type="icon" source="images/icons/powershell.svg"::: **PowerShell**](#tab/reg) - -This setting cannot be configured via PowerShell. #### [:::image type="icon" source="images/icons/windows-os.svg"::: **CSP**](#tab/csp) To configure federated sign-in using Configuration Service Providers, use the following settings: @@ -97,6 +86,18 @@ To configure federated sign-in using Configuration Service Providers, use the fo |
  • OMA-URI: **`./Vendor/MSFT/Policy/Config/Authentication/ConfigureWebCamAccessDomainNames`**
  • Data type: **String**
  • Value: This setting is optional, and it should be configured if you need to use the webcam during the sign-in process. Specify the list of domains that re llowed to use the webcam during the sign-in process, separated by a semicolon. For example: **`clever.com`**
  • | |
  • OMA-URI: **`./Vendor/MSFT/SharedPC/EnableSharedPCMode`**
  • Data type: **Boolean**
  • Value: **False**
  • | +#### [:::image type="icon" source="images/icons/group-policy.svg"::: **GPO**](#tab/gpo) + +This setting cannot be configured via Group Policy. + +#### [:::image type="icon" source="images/icons/registry.svg"::: **Registry**](#tab/reg) + +This setting cannot be configured via registry. + +#### [:::image type="icon" source="images/icons/powershell.svg"::: **PowerShell**](#tab/ps) + +This setting cannot be configured via PowerShell. + --- ## How to use federated sign-in From fe57e235a41a04d9aaf0091090a33c1f81ac557c Mon Sep 17 00:00:00 2001 From: valemieux <98555474+valemieux@users.noreply.github.com> Date: Mon, 19 Sep 2022 10:22:54 -0700 Subject: [PATCH 088/341] Update citool-commands.md --- .../windows-defender-application-control/citool-commands.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-application-control/citool-commands.md b/windows/security/threat-protection/windows-defender-application-control/citool-commands.md index 846e91f229..0ce1cdebb9 100644 --- a/windows/security/threat-protection/windows-defender-application-control/citool-commands.md +++ b/windows/security/threat-protection/windows-defender-application-control/citool-commands.md @@ -13,7 +13,7 @@ ms.custom: template-how-to # Manage Windows Defender Application Control (WDAC) Policies with CI Tool CI Tool makes Windows Defender Application Control (WDAC) policy management easier for IT admins. CI Tool can be used to manage Windows Defender Application Control policies and CI Tokens. -This article will describe how to use CI Tool to update and manage policies. CI Tool is now included in box as part of Windows and can be interacted with in the command line. +This article will describe how to use CI Tool to update and manage policies. CI Tool will be included in box as part of Windows in the January lifecycle update and will be able to be interacted with in the command line. ## Policy Commands From 8af3f72b43aa7c20b46ad5173c55568f2e901205 Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Tue, 20 Sep 2022 15:05:18 -0400 Subject: [PATCH 089/341] updates --- .../tutorial-school-deployment/enroll-overview.md | 13 ++++--------- 1 file changed, 4 insertions(+), 9 deletions(-) diff --git a/education/windows/tutorial-school-deployment/enroll-overview.md b/education/windows/tutorial-school-deployment/enroll-overview.md index 1a0048e8b2..0d58d8889b 100644 --- a/education/windows/tutorial-school-deployment/enroll-overview.md +++ b/education/windows/tutorial-school-deployment/enroll-overview.md @@ -33,15 +33,10 @@ This [table][INT-1] describes the ideal scenarios for using either option. It's :::image type="content" source="./images/enroll.png" alt-text="The device lifecycle for Intune-managed devices - enrollment" border="false"::: Select one of the following options to learn the next steps about the enrollment method you chose: - -> [!div class="nextstepaction"] -> [Next: Automatic Intune enrollment via Azure AD join >](enroll-aadj.md) - -> [!div class="nextstepaction"] -> [Next: Bulk enrollment with provisioning packages >](enroll-package.md) - -> [!div class="nextstepaction"] -> [Next: Enroll devices with Windows Autopilot >](enroll-autopilot.md) +> [!div class="op_single_selector"] +> - [Automatic Intune enrollment via Azure AD join](enroll-aadj.md) +> - [Bulk enrollment with provisioning packages](enroll-package.md) +> - [Enroll devices with Windows Autopilot ](enroll-autopilot.md) From 2e8fd51e7f880aea4268773060d142e84d471338 Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Tue, 20 Sep 2022 15:10:02 -0400 Subject: [PATCH 090/341] updates --- education/windows/federated-sign-in.md | 131 ------------------ ...derated-authentication-settings-intune.png | Bin 126838 -> 0 bytes 2 files changed, 131 deletions(-) delete mode 100644 education/windows/federated-sign-in.md delete mode 100644 education/windows/images/federated-authentication-settings-intune.png diff --git a/education/windows/federated-sign-in.md b/education/windows/federated-sign-in.md deleted file mode 100644 index 052a0eb15c..0000000000 --- a/education/windows/federated-sign-in.md +++ /dev/null @@ -1,131 +0,0 @@ ---- -title: Configure federated sign-in for Windows devices -description: Description of federated sign-in feature for Windows 11 SE and how to configure it via Intune -ms.date: 09/15/2022 -ms.prod: windows -ms.technology: windows -ms.topic: how-to -ms.localizationpriority: medium -author: paolomatarazzo -ms.author: paoloma -ms.reviewer: -manager: aaroncz -ms.collection: education -appliesto: -- ✅ Windows 11 SE 22H2 ---- - - -# Configure federated sign-in for Windows 11 SE - -Starting in **Windows 11 SE, version 22H2**, you can enable your users to sign-in using a third-party identity provider (IdP). This feature is called **federated sign-in**. Federated sign-in is a great way to simplify the sign-in process for your users. Instead of having to remember a username and password, they can sign-in using their existing credentials from their IdP. For example, students and educators can use picture passwords or QR code badges to sign-in. - -## Benefits of federated sign-in - -With federated sign-in, students can sign-in in less time, and with less friction. -Fewer credentials to remember and a simplified sign-in process, enable students to be more engaged and focused on learning. - -## Prerequisites - -To implement federated sign-in, the following prerequisites must be met: - -1. An Azure AD tenant, with one or multiple domains federated to a third-party IdP. For more information, see [Use a SAML 2.0 Identity Provider (IdP) for Single Sign On][AZ-1] -1. Individual IdP accounts created: each user will require an account defined in the third-party IdP platform -1. Individual Azure AD accounts created: each user will require a matching account defined in Azure AD. These accounts are commonly created through automation, with a provisioning process offered by the IdP -1. Licenses assigned to the Azure AD user accounts. It's recommended to assign licenses to a dynamic group: when new users are provisioned in Azure AD, the licenses are automatically assigned. For more information, see [Assign licenses to users by group membership in Azure Active Directory][AZ-2] -1. Enable federated sign-in on the Windows devices that the users will be using - > [!IMPORTANT] - > This feature is exclusively available for Windows 11 SE, version 22H2. -1. The Windows devices must have *shared PC mode* disabled - -## Enable federated sign-in on devices - -Before you can sign-in with a federated IdP, your devices must be configured with different policies. Follow the instructions below to configure your devices using either Microsoft Intune or a provisioning package (PPKG). - -#### [:::image type="icon" source="images/icons/intune.svg"::: **Intune**](#tab/intune) - -To configure federated sign-in using Microsoft Intune, [create a custom profile][MEM-1] with the following settings: - -| Setting | -|--------| -|
  • OMA-URI: **`./Vendor/MSFT/Policy/Config/FederatedAuthentication/EnableWebSignInForPrimaryUser`**
  • Data type: **Integer**
  • Value: **1**
  • | -|
  • OMA-URI: **`./Vendor/MSFT/Policy/Config/Authentication/ConfigureWebSignInAllowedUrls`**
  • Data type: **String**
  • Value: Semicolon separated list of domains, for example: **`samlidp.clever.com;clever.com;mobile-redirector.clever.com`**
  • | -|
  • OMA-URI: **`./Vendor/MSFT/Policy/Config/Education/IsEducationEnvironment`**
  • Data type: **Integer**
  • Value: **1**
  • | -|
  • OMA-URI: **`./Vendor/MSFT/Policy/Config/Authentication/ConfigureWebCamAccessDomainNames`**
  • Data type: **String**
  • Value: This setting is optional, and it should be configured if you need to use the webcam during the sign-in process. Specify the list of domains that re llowed to use the webcam during the sign-in process, separated by a semicolon. For example: **`clever.com`**
  • | -|
  • OMA-URI: **`./Vendor/MSFT/SharedPC/EnableSharedPCMode`**
  • Data type: **Boolean**
  • Value: **False**
  • | - -:::image type="content" source="images/federated-authentication-settings-intune.png" alt-text="Custom policy showing the settings to be configured to enable federated sign-in" lightbox="images/federated-authentication-settings-intune.png" border="true"::: - -Assign the policy to a security group that contains as members the devices that require federated sign-in. - -#### [:::image type="icon" source="images/icons/provisioning-package.svg"::: **PPKG**](#tab/ppkg) - -To configure federated sign-in using a provisioning package, use the following settings: - -| Setting | -|--------| -|
  • Path: **`FederatedAuthentication/EnableWebSignInForPrimaryUser`**
  • Value: **Enabled**
  • | -|
  • Path: **`Policies/Authentication/ConfigureWebSignInAllowedUrls`**
  • Value: Semicolon separated list of domains, for example: **`samlidp.clever.com;clever.com;mobile-redirector.clever.com`**
  • | -|
  • Path: **`Policies/Education/IsEducationEnvironment`**
  • Data type: **Integer**
  • Value: **1**
  • | -|
  • Path: **`Policies/Authentication/ConfigureWebCamAccessDomainNames`**
  • Value: This setting is optional, and it should be configured if you need to use the webcam during the sign-in process. Specify the list of domains that are allowed to use the webcam during he sign-in process, separated by a semicolon. For example: **`clever.com`**
  • | -|
  • Path: **`SharedPC/EnableSharedPCMode`**
  • Value: **False**
  • | - -:::image type="content" source="images/federated-authentication-settings-ppkg.png" alt-text="Custom policy showing the settings to be configured to enable federated sign-in" lightbox="images/edu-federated-authentication-settings.png" border="true"::: - -Apply the provisioning package to the devices that require federated sign-in. - -#### [:::image type="icon" source="images/icons/windows-os.svg"::: **CSP**](#tab/csp) - -To configure federated sign-in using Configuration Service Providers, use the following settings: - -| Setting | -|--------| -|
  • OMA-URI: **`./Vendor/MSFT/Policy/Config/FederatedAuthentication/EnableWebSignInForPrimaryUser`**
  • Data type: **Integer**
  • Value: **1**
  • | -|
  • OMA-URI: **`./Vendor/MSFT/Policy/Config/Authentication/ConfigureWebSignInAllowedUrls`**
  • Data type: **String**
  • Value: Semicolon separated list of domains, for example: **`samlidp.clever.com;clever.com;mobile-redirector.clever.com`**
  • | -|
  • OMA-URI: **`./Vendor/MSFT/Policy/Config/Education/IsEducationEnvironment`**
  • Data type: **Integer**
  • Value: **1**
  • | -|
  • OMA-URI: **`./Vendor/MSFT/Policy/Config/Authentication/ConfigureWebCamAccessDomainNames`**
  • Data type: **String**
  • Value: This setting is optional, and it should be configured if you need to use the webcam during the sign-in process. Specify the list of domains that re llowed to use the webcam during the sign-in process, separated by a semicolon. For example: **`clever.com`**
  • | -|
  • OMA-URI: **`./Vendor/MSFT/SharedPC/EnableSharedPCMode`**
  • Data type: **Boolean**
  • Value: **False**
  • | - -#### [:::image type="icon" source="images/icons/group-policy.svg"::: **GPO**](#tab/gpo) - -This setting cannot be configured via Group Policy. - -#### [:::image type="icon" source="images/icons/registry.svg"::: **Registry**](#tab/reg) - -This setting cannot be configured via registry. - -#### [:::image type="icon" source="images/icons/powershell.svg"::: **PowerShell**](#tab/ps) - -This setting cannot be configured via PowerShell. - ---- - -## How to use federated sign-in - -Once the devices are configured, a new sign-in experience becomes available. - -As the end users enters their username, they will be redirected to the IdP sign-in page. Once the user is authenticated, they will be redirected back to the device, and the user will be signed-in. - -:::image type="content" source="./images/federated-sign-in.gif" alt-text="Windows 11 SE sign-in using federated sign-in through Clever and QR code badge." border="true"::: - -> [!IMPORTANT] -> Once the policy is enabled, the first user to sign-in to the device will also set the disambiguation page to the identity provider domain on the device. This means that the device will be defaulting to that IdP. The user can exit the federated sign-in flow by pressing Ctrl+Alt+Delete to get back to the standard Windows sign-in screen. - -## Known issues - -- Network and Accessibility menus aren't available in the web sign-in flow.  They can be accessed on the standard Windows sign-in page. While in the web sign-in flow, press Ctrl+Alt+Delete and the classic Windows sign-in UI will be shown, along with the buttons that launch those menus.  -- This feature won't work without access to network, as the authentication is done via a third-party provider over the network. Always make sure that there's a valid network connection, before trying to launch the web sign-in flow. -- The federated sign-in flow is not displayed if devices have *shared PC mode* enabled -- It is not supported to configure the *Azure AD preferred tenant name* feature with federated sign-in - -## Troubleshooting - -- The user can exit the federated sign-in flow by pressing Ctrl+Alt+Delete to get back to the standard Windows sign-in screen -- Select the *Other User* button, and the standard username/password credentials are available to log into the device - ------------ - -[MEM-1]: /mem/intune/configuration/custom-settings-windows-10 - -[AZ-1]: /azure/active-directory/hybrid/how-to-connect-fed-saml-idp -[AZ-2]: /azure/active-directory/enterprise-users/licensing-groups-assign \ No newline at end of file diff --git a/education/windows/images/federated-authentication-settings-intune.png b/education/windows/images/federated-authentication-settings-intune.png deleted file mode 100644 index 69dbe15c58465e19d57f7a6d267714c2194c875b..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 126838 zcmce7WmuHm8ub7Y!T=)DDGI1`H>jY9q%_hX-Q7b;NvTLkN=tVRogyXO9Yc5Lx92_I zIp=-P_y2pYYc7U~XP#&8d*AoE*IGM7K~54En;aVgf#6ELkx+y{uxufaJ55*^;FYgg zbf)0XUE4Pr4iE@2J@SDfrTBOcyol*2CHo3<^)41J9#qq3Lk$9hI?&1_W0ZKY0=GgZayyyZ5j@_R4T}St3q59~&}w(0+!DT^`397$-Zdigx#82#iff z+D)4IGk2r5{vfNsR1cq?BhBmUXVG{q@y}yfT`q>3?PhM7a#DU^y-mt2iz_F= z{~QAEdrnxN|MR;N%OA2KLBan#-UuoAi2u*$GLoJ)J*4~RG1&KD{@(xmh?&XB|NKZs zW}ncmXCJjl{0o1KFW-i76M8#*(J-Hkmj>`y*lU!2xNGh5$|LqE9o?XL2mKOj>C-0$!Hox7m84C0F~0hD zuoMD1ms(U{KYLS@Q1JeKs`WqCb^8p3^*f9O?~PY}6J71&H+CWpsWNjVB$g$H%1mr7 zPQ@r%NrP851G9fe&XF|jX_BgsL;bPfAv4zZs3@9jm_F?KI(eR)|K@drq4WQJkTO~Y z6Zc++Pfw2spEX@uX?+O}PBe8tdAo3=ANx*K^kb>G&Xq63xT&QL!fffI?~4-WGXp`x z8S+_M!>V;G`mx;9$*fzm9K2C{?2;vFznt*s@1s3f*(Y*(Ic#-H6C`vmVT|I()#s!qhLG05 zK&6$b-ez%3ygcHv-paTCxC30-cu(;%!_u;{^IjX6xRH^Of8_01yv6!dl?{a&107u_ z{O8XnePkYtaHc+^%bmBm%s44#dSvrlP*hTN9~zt#BLa5ZtJmz~3w-{Do~pKqbAI+! zk%QZJ6K4^(cB4NJ@$wk{chm%S>kg%)q|EGlKvcLch4aO0j~R(o*A@J}Pw<8CxmKe8 z7n14rQAI`-7#1l8F$PMLiBHPBm#7~~IHY+m5Z`bVLew~iRL38xLBK}+d!(H6+p``jAToa#@#NIJG5M|qN7Qu6oN zqLVcE^W%lAsE&d{Qy?w{sTfRn&ht<<%8-yS>W!RSRz^k!F4F^oFH7$_+W9_v&nsUU z7caePLLEYFg>*xPIN2dXA6b(up>M;N%5UuW4Ys!?Rl2fzSu06u_T5=5Nl7vEeD&4i ze2g^CaQ*#*>K;Fq`5~V|WjUq#CvEbdi&6kDoQf}E%BC@WVuuj7=ICpQWNKPv^ta)H zfzD@4Ol~XDYSlZnoA2uy+S=L-iRVd$tSJpUBMe7=M}IJ3gXpz<3<>M|MQhS^-`+lk zGDx6M+y=~o5Q9Mj_w~~)Tb8SR zUK>x8AJc8KShblp*x`3l6tfp&K}efBp*YN~O`MSK#iQXT3|e1%azqR`WC^?dUZ5=s zcqpS%@J8>Crp;9UzG^O(blPj>WQIaz{AT#yo~m&;Hc3=kC5)t9{O_&Gez#|IbK89K z1C>447+Su!EX!Y*Bzug z-`&}Wh*p?2N(l|!qjZM2~x@#;ar14OZ)Gc&vsdvz1gwu zL%@v-ZDFMP{A#F|3L_JVAj*r!-=$JRi3nw_jni)(RBsfG%#@z9*tK7NA|)eZ(9#wH z`M{?B+-!Z;x$sSdq*{2&bMr=+=h42TXQi>MN9=!d%i!wb;^HrzVxPJ?r;O}Ow9h== zIzu?J@zbejlyccoV*QD-uU-kLsHjLtN{&$|fq=ffITbVRPo{Fd?FgrETMS`b8_bmU z-xPIR`|~cRrm!F&Kqi5g2qKy2A4Hvu(&Ql^@S!(Fa`eg#85njE)rN}l7LOSjxsGSe zGBPuj)YX5bb5TEJv(c`%Gc#M4sacZClBtOb3*!*x^-vAk?s%u5@MoTvn}J1yN>XbR zJ{kO`GnV&&4*O~bnR`w>$aTzhOhR43+aZjL+#*&TPVckJJ z^Av5;`(dci5cX^-k&Ok(8`)_Fys5Nh) zU^DJDImnP1MXc}$TJJBmTh28kZBJDlHe=GT8~uKe>~%8nx|PDZDj_W`EnPzt0s{Sw zlc2bmiBYfNNN#lg`--pm`MWJVIdY5v1#8%L`NCJf(!mHvMf0Qx?N-+h%!}*H3hvY` zIfFQjiix4d&T-_HwkK9nEQQy1-}@4gw)w;p1*iK*tzqDcCUz{+d+bd%KIm;iS4Zn) zp=RWyJVSY;7+GcpWfK4|G#PV+xJdjF;~}OYhBXEGMs7G!jEGTSh(h1KT_ok8OP{zO zseu`Bd)fFMO2dKbgNBK>7u#tZl>o18E{POAcmlF9Zd1dcqH*s9R{|fR%&-&h>({U2 zC5D)w+K8!UR@KDCsaw|^^J3spzM;L>wC%ifidj5m6-J%Z90~Kpoq@X`bo)i7K4gDc zXbs}Bnk-t6j~ky~3Z3%`YP>mSleFN9h_`8&_|(0EeSNxc*3Jg&`dQYO_0yCBfBJTc zp>x*jR0KI2&-X~G5y>7gRdeoT%_U;D=WI2LL1Jy}(CHoQo0~Sm4U8cat4m`FkJBA` z28O@_P5fQTjVBnm)H24aj}zq>Ly1|;MMc>Dlm8j(KmzINNxak4qfv%TxZ7Iqrd-dy zkTGk;$vU5)LPqnujFx}Cvnt)`D3q!Q0Fe&v=>?dZw{PDTGc$2lgm$mwp1Npf4@qfh z6<>CYmn^-JmNo%%ye*pab~U3bBP;8mXF6NF6XK`zX?Xa1Y*j=ez4WiHyRcAUiyPtJ z+N{FIMdVc)#T9Ftcx5G*e35}Y!^j_ykm zayVHVz=f&fkqgHuo0!*M&g@|C+-`eyrq!kI^n5WHOqaxmh~At%x;g3;`$(N2e2yU} zw9Q?oBcC_Ao|D@`vlldn*r#?Y+149KtI{Z6+kW(3^1Zv@Os!M8E22-8g@ll>_2;{E za;PmRO`IQoef|@wC|H=5W;N~BxxKCZI$>?3j3he+CP+Z=B~I}4KTzh*FOAZ;I;YJz z0Sn *$9ogvl-r;vWH;I zloW~s%8wiehlVt&*%SO2YAqf-c<>plp&**?&9zR=cqE`Mn2$k%hSnc*Io#hoJZNd5 z0H===bRvg<|G-o+f^>0kaG+2>F@f{z7pXXi6V(E(f#pgXX=H}0cOmcU>H>w}7pM|D z?8hO$N=EAY^+eh5^+*{=jh*~jTS}X_p{RFSNnnjBoGwJvk&(}7eazzZ$AVaxNY8%O z>^}b<>qD?Lyuirs_372#(_+5`+_H;?XEu$-o5HIoc#U(BX7L%>*+Y3QHqJZa1ShVb z!ri}LyXXv0xPC6G^Xj#PK^10{NVK&}LcYU9>1kxQH3gLvSY_-`3@GWZUtiKU(8E}3 z&kWp8HUOHw%K#Aae~!r)Qc`#6>FFViJ?(3OSr6>sOs)Wu*PO3vMwrfY$9ngeSd3B* z2$C;33QEbz8DEs=r0y*8P~u^Zskx{J&X>4zSipWVNy@6XFWBz2)a5ITMVzq1S|lK# ztdKe1u7&BrZz&i|0N#HIzy@1Sw}Ip9*Xr{hPPV?+v9pEl6EYl(Z)tQE?!Er-A#5Qv zh~^=ag{Xiu@sce+X%a^uV@iDYk=ZG)AWv9uVzpM~&K-6RT(s`eh6HkSv_>MR#&aJZ zBE8)g`0!Jh^cd^@xMih+dh0I!{GnUPgypy;uP`-DLSs%_saF*q+RM!<2%*0Z(N@R1 z^%6pov5%Vt!j09Er*tq)f~!G{oeaH zeS(`?fB37WdJiJSR!chlXe3xP)V6azKv-*zIFXN0*gpDQZNfKF>u5eR)+Uojx?ENl zMUk%0zI8>}%!5+Zx_P|!yPM772A$+jw!AL1^+$De9EomX|D|+nV26C&g`}3#h%3m^ zFAd4#O$txk5%qhhBwDTna@mAK+yahk_iP%kRn--F85m-uq8J@+&Po2%IGD%`wQU}k zI&G@zxGv14>L#<+t}XuI@Yo(vi{sl3Ahr?j<%f&7n&Z=O__>fEK4vXyz@4qqFLUzq z!=BUrF%61)m;Rc7imEq;MRRS8O_(Y=E=~e0sMkqOs-{y{Ffnv=bm7Z>?~gEovre%T zdiqR!i?PDYYF9=?l8dOFogH$t4BG9JU9aq>cRu}rRhwVAUL37UD=R;UFYeUJ@1FJHZ8!9KYw$5dA{3X zsRM4o{jxE2Oh%i7qeRPP#wpR|2K_NTy?)sQz#Lo8SXbL)OC!#v-xuqlAW~dJMchyB z(0U&luZkXWiw7q5ji}uQfBbj{)faMpp5V6ny(V?c(p1-bAN_QOPs9>V%-UlNng}R4 zH!0|toBc6euaCzx_By=DMa0at9C|CXVD0!)Z{K25A!HMHIgXRzFA*)Wd^0_u$kDN~ z;&qpft7!FD6g74%y3C=p%yo-itUW5MUJP>F7{1#$*AG(J9ou&UmF~MFV)dd?DLN@+ zlUXs8{gapW3oQX*6fSqcQFqvP>w0D55I>{yAG9J+GVHj^uTyt3nFpm7jsxW@sNyPF zgkJc1ILb?rpH+R>u@eh}lQ~b&Nnhg*a})MG_GSc+o7Du~&IYmk*hjf>O9q%X`#1fn zDGsRrbK0ibUd*SH+5t4_wcUXM`smq)90huk5%bC{7%}M44UjAmytU^j5uZL`JMYf+ z{z+{m!udtDzJiQn;$)T`2CgSMWP#fzl&S%n8Up0Z1^|x%fOoe$t)ea zzmeOKQ&hC|V$oLHFEprSU_jQ-EoUJBJK9&CrMs$e5D^i99Q>!=10RGv+r-gxM7iA~v4++6g^i+7Yip+9t12qd zj+>+5p{xxcvI47oH8d=Fg~ZO+k3pH8-&ZCeBYTDDOR8Dz9GgFObv+(Y3l0fc@x`QB z4CCs9G%fAl!#WEI3p1E+^1WK+J3ZX>78%d z>({TfU=8_pE z`e%9n!M|7e7ea9WG!+oLZ55fBnJAxQW5*WY1W3XRu^?&8Zom9fm8Hr={%&MnTyujL z3w+g)Kl%G5H@=v#KSDRIUza+8YU3@3ev1TUM0N3cgIb|hvy!}6>&Lr<;>~^_Wgur^ zw5Z==Y~5B-NvW$#LviA#6k9RR;t`XbaYKpA?N9Vr^Q5rgM%TVp*RWHS+D!P zwtrA{c@+YXoDQaj#-W{H5)wMUe@`BO9?)59Ng(hW&(*L5ik9at8l@KtO&8RACvqI3 z?_*{#PB*Tg+;`=IeYRfRka(X4`~ z#y@c+ZLep2&?R^@5FGfn5X@920Y7HV8 z-H#?00MDTc3%Xd{eer2)zUxaNkgtfCVh%6oM6jEFH2afrx?(}p!fEExoJ0=x{8Qy1 z&hVsuF-^iz?MHP(ZPLuz7doLQX0nWtRuDo_euXm{z^yuVSZ9AQPL4(O!nZf`DStxX)J_AV@n z4o;?Q0&3YTS(uj_F0-mkX;7CD2rkbvtXe1O)wEEy)$OX;JM&uu>Fd)qTmk6lu6a|7 z!>X#P9bf6CU9T&~p0MCzSeu(~4y0p>%hQk(&x5qKm>H|HoJmqfDq#P>WyT9%8}4kh z_qjQhBjJ#*YztgTA#Oz{F1RqCeKlEH0Rghe&Q?FZ+4*zCEto83P@_ra#CETW$&2a^ z-Ui}Qy;V^m0%3ICzga{;NZ8#P*`s&1w~*+tBd}a|I>TmyTW?IR_-+Ak#nH@OxAh9A zp%gZCA$i_MhP96CFE928wpdt1@*TRZtIDjVc&V#zt3ds?yG6rC0;r2)X`{{2m&oo1 zq-h=Fei+o`_GY9xPT%u<<>K{b#e`+G7AtkqJ{IWYUsecG;sqv)mJdKWRhAfS`vedM zq!_xen&i&g6TVNMDg(mL7x0TRY~~s$1s#L4ldptmypA3|ed_hnN!NBEKp!RI*RMCT z-Cg>9iH#q_H$i|Qxr`<61VZ;lpEoh}x1xuu^^m5DF`cp8B{C|i@a)`Ajbi)!NX(Xg zDfu68F9-epJ!-rx`{UOc`tS&{n3&h9qgQw|^Lyu>NM3u|^N{5VP{Nw!JqIf^het~C z)FXQsKHVz@ljS)d_lJmr#G5;2U9-;7523a(2AM!HwwvO2)e7U6*W=!KV_h zB^2JR8}?@T*Oir0Ca^G!m&_Hj7wDNpKDUhq%@+S-NDKkg?hG30V`P!`+Zo$7U#rIN zuwN`CBf~m1=b5=6C8+VLMLN9#hJ9wvA|^>*yiy?{uENx_o`;RcEfh{GD+M^(!4V-L zMr(gkNduc>SagF>Ng$y2L)LdPQG+|z7su%yk<@3`C=h@=yHERsqxwhl^@lpb0e&x0 z*(B%RD{q}J>OD|aS-?LN7lY44pIzM)b3{i+*TqH=)~;Pm#PftviwN>($|~{&Ldjmf ze5nQsISuSg|A~5;+0tv(eDxRo$@Szg>&PG@8fF~rI^7C$dW5bm3K9k1y{j#-6t>G@ za2BlhCmjjud$64<)xjqK3Da9`7yAc5jXp{@jjCZf(ANPrw5gm z&xL0y^wZj81=Ie1HoNV-*)qarb?(-k)$%(~NxpsC$^uB;as7TGYdQ$))WgE8DZeT0 z=Ee3<5O#9l9!<{)9`(_3KKsO?*{~{B)JRMYU&v!aq6h8T$LzLEO~r`(>v%Kslof;x z9^7WB0~ahPL6;qwm$9rt-qtEA`(2EAws58=&n7#v!YS5=ve`h%1Ofo9Bemtk0Z-q} zbx24Eu2Z{N*xas3`=^yuUFycOMF-XfS7vQO!UQenwmkyCdzOJh*Dre6@4gTYIH|$G zA$Hj)Sqi>`0ZAIvk0Uen9xecn5WffAt4Q5V%GgGDXm~h%jfZ{xHMy!hQ)IT0hG*TC zVF2HM7ukKl9V0Oq85ecOiv5U(=T@~HR9ZT{*jEmlYQ&*mq2c*z zl*T|l0}Xwae8S|sz{un=6-z)svqNnvZP!{D^mli+|0&`{*Uo+8zW81M&W(}$5^q3w zFr`-@5f%m??St9kuw58beWadWhH#63RQ=xFb9lY*$$O4{4tQ{Rg0j18UBeT)M@v|7 zl^af&{uHEo?}@YY@0dulL!n&!6>p0fk#byoewj8ZC9;sTs!{OoURnQ(m)I@F!<3%$ zD0+nwF$?4@GNN{5UnMBk*i|B$63L?LO?7czK7_FtjKe@#MM5+}p?kPsP&M&n1|9^0 z2Ot)sME8xHs~s0_J+NdZ@{w4EIX_}REPQ)FU)Ii~knPhLt&oe|r| zD>L)#8n)$3@rB@vWI3+n@7=?FcC%ih zAQCUV+)uWo0G1B<^r?kg)>Blsz9jjXy#MA;uZWC{qlMp0MIZL&AA*_z8eG{A!!9gN zf%r6Xo}R)GA(ueL7icKn^@ger(2G-=CU~gBhDg=eW^+DI!RwhZ870n+u!Y6Yj=^ks z8bO!!myV8(>aky2MXOL@Cu46Vcc-fGQ~K3*6Z2~3xWkLBz(8mytElpxse=!ucOP$! z5c+`X8PM{!VgyFR?{Tz-aa!W*J99Gw+dr>6*1>-ss)JJ?k{lgv&Fgur61DkXWVj>_ zNST@3R+OB+VGKA`kL&WoWcLd)YWFjOEO|KJ76-`d+f{QfVYGCP~fUF!+H%w$^v2OC(O{G{>+37tl}NVq>F{W8_pH83KfeoPqrOb6mL;)X(5W zH#fJkB;g3&*zR^9LV-*BqQGa3W!(y{YhZr(8MaMu;+erC5oPz>G78lvas=^+HtZXG zyr86E>XLCN)}6ZfL-bCREPXvL%Q#*k3|`RVkykUJJ+Qp>#OVIF7oe!^;044VLTvnV zM$%RQ2WQCGfb_VCYHXAh1Bw5QM+a?fTCsnpsMu09M-9}+=3WeJa!#NJ!JNjl zA2Tp49J@bdVaaqIV_l@eb3fkEw()G5J2<@klPbP7r`u?xrD8+`1m9GJH`3QzCVU+G z8+jps<==KzdS4qW9@LPj+X&+~ukghYJaEXX*YNE?gyok2Sff=~>V8Ti?E3i=woAh3 z(DdJ1i2iZA*w5bu?)p4c+OaHl5C^m&7qwg5_cCKHqu)uXdOocS^Ql25#U}mKpm{jr zD1aA4fBRPMt^Q-W9keK$vc5oEY%+}OT?9Rcfkno!W?sqzqq(4D(>aakegXLUL<2~-IzSMfzaY^@iS zfrmeb+>}|e;fM+Qm?;U9q`%uMbD(k74mh=`O1FOBD~Y0~|RR z{QyDA@^5){lz^ChB$^DnRz#9qp|LY{0x8&43588LPoExB%ggQHJ&*2eogGw!#ISlH z6}`V2R_Cd0D4D&WNwUD#>5-I5b8T%nLuGZJVVAasRMRda9o<)*`j+hSwc#2r-UQsD zs#JR1t&=^ar!^j&f%*#X-XW7b9wq;CKuXloGXhR{x3~}u)HgtOR%=oJ?$&N=AE{sS zwj9~H$0h8=A93aiio^NQkUTl17zm(-(|Rt@jYNvw1dH7)oIsq^5yr$NcU0c|j~C^OAsdiEK)=5<(=KpaYcU)H z6cUgfJ{ZfAHR6YGZam_LR{&G;4tfa}n!-h`0Qa6@pP zZEbfDic^44(yX#>FJ-pmr9kO6->)T)XH9*`n~>C&kwLs0T3HP9qQ=ChYO}6#=&M0+ zn(pb*k}4pvFgrB8dBwoMp!#gFVS+L}kjM_>Yy329!)9sR~wFaWq{kRz9J3~q0(pW8NOWgOiN@9LlH0W=c? z14{V|bS}R0=iXhJu>>R}B$a(^jaT=<)kIQ@oUhA!lh=v?UR(F-;MQ)_s;a8CFQZMu zAkAN?;ae>HeTCB#Qjl~OmzNvcbj^H~+KCApTDROCw5!p|&rfDu32@UuvbbC( zBCqY8_(H#ay?<~p`X#oCmHEvc;(OV5_I-2XURW4XE%{2nJ+&<&Q)Le; zrL5^LoWs&M&Xqp*NP0#_2d~w~*f=;8P;W}<|LY6T*GB~hIO*-PK-PUHSX5dWP` z^XDY1fE#^aa9<$g49}{yNz!SNZv0^@stj5;JJub~J6E%M^DVhNy`S{;;*X1r$O8## zQAl~CAjBxZ4}yz|afXZ24K;pog)ts}Usxqtc67p;iXRfgb{kh>*f|J4%>n(G=%uG@ zUQ9m{5WCD7Esm%~ef`>!ajj_Zjcb)=P|UKX$>-qOY<%kLRhe7(eN)BreDk z0Gf1mY3co-))zo~D1`4Y0>XtF)bM?VSU6Ay&TrfhBbsBkmn&@XUVY>M?JkG1HRx@P z+X0-XKbqgUcU~v)`t^b{e4md~R+9Ff9^hMgyjE#I!vYkQ;t9)dF*_>-d~Zj~#Oi7XaAaSR}uB3WqM^YjBz`Ke-w~?DZuz>y3gghr@AP;XYwh_4Ub9Afm`WVY-X~oi}Ke_9pWR#5!Gw zcQb$#1o|%4dLU%g?Y(T!x~0FpLWoUXxqkY$aq-uFW?fw((A|G&#uCThq#2t>lM4t) zgQQGbe<58Ap@$2}xuSvjkY1au7b03&kx6z$18%rMkb*O&SLpf{XnA;|k>DVP>4|Hu z$XmQaAh2u1)zfnG{HDMmR@Bj%T{{Et0*IJmaDBxf?0dkS!XPio6AMf(%|+RBQ)!dt zS<80(lvnQVOEY>A(E#&&xW1@+4LASx?Hjw*q_T0ZdzeSoY&USb2vnkfdIO&T!*C?H z`|K0`d2{*5xnE6y(fNd~YQWegJsl@@F;9(XcWE)uHrh~(h+yopSL$*1-Zz5z8Dd}m zU~OI5=e*ri;?RjVTA&$Zqyh9ME5S;*`1B-5lw2P`)v zeH7W796qHzu;|2N0tDmpwRC(t_zajPP<4H?b8{zF=+e`GP=E`6HTL~wI{m8XHTQ1A zB_5#mNBU{HfK|x#bjIc7)AZWh+-Dj`CsVHV$qLWPii9h9+}JT*Xr-m-F6veX@~COjY_3V6vKL-ZppZTdT7yPWP%!=)m{ktC*%WmUBzb^4y;_g-{&2h@4>ZZgKu=JTmu=>j z9bH~M=!5T4suuL$9Hszn6Rr9Dk{wz~!u(^9s-Y1dF}?A|yl(-3xYiYW0s=BAM@Q%i zD@lqF=uETzBV?Y3b^$I%9mYnRY`NQ+GwN`u}0N;#lAZ9?3l_qA(%Fl-maf9|T zt2FoECzbra>3ISHSWnXB1343Kq)Y*DEx;Jy86JEj$q)W0Ug-2`mTUsKGZQoOhnd<6 z;Kzziqz`?{%$(0>yfb}*Z}YquM^e_c6}b11x|$ep2^|7o)2wzP;l^W{#M<=F!^0=L zw2GQ9UZ4O61vzNP4%vDbA1%St24OQ)MP`j)uB&%2kJl0FC>H`W>qP-^wo~U<%%hL@S$w7C)${n z2bE4y5Fjz{NXIse&C*L%lq_}FbyA5jg18RADLY4qC7bPj{SWIRk&y%#N*VX}f`^EH z!`1u=nG|O>H@9$?Ei zHW8VaJ{>509{^_q5G4bn$z6>@M1@29F;GezcFWBiH)CYLz~!kH{`m0&qE>?=nTQ5P zaBX9+709H3kIxfNlm~9aM@TS8?NyrWYyWJDWySEyblC8Xm6#$kXdVK6XK8%>#StT%C!zAdT{_bjDblT z5s|(wUcyj4ZbZRJxZ7H5xfn&?t6OF@_EcG7`InZr7Xwm(zRGt41SEma3x7<9<2D)s z3W{#v!BxL(C)w7@{C8>%4lb{P<>X9@u0))$rnduRTayPWhrwlcL(pJo#3jk9 zj@IFE;f8Tlc;~$ob=w>b5bO^9)s^acsfv+pInQ)zyY+>a8Ojc2_J*`_0~owDiCEgN zs5w6%a&u!hmZEc|ggDfo&04#L@@fWqcywlmvTcgDaEU%xCttXHl zvdhGfZaj4K2M;V$f$6tiIv>%?N3wW&sVOWfbcsue*ZD60jf7xY(&mli!5(a@pww`Z zu9=&X{9)A3(8 zXVVU>#u;csVNL9~`93t=*m~z^cTi!)sOqXdde2&OlS$eG&C2vAx0+X=gpgKtKSSCx z8`>r_ZD*ykg}I-(x#o7-8~@KP2FCE?nr>2#``C1>Z7U`0A&}NK_FTA~dZnK0qi@tr?huLMILl~sPJ+b$DtVw+W%+!yJ9K|Nv;TU|=|YAUNcllG zHuOo(T39c2xEWV7dmh~C4%|Xdqj?@f?;g~4xY*AjOOF&IhKP33nuFh+MYry>MSmpY zpRRSV3KJb0X7|wXI>$2bZ&7qrpv^SF9pzIc%!EV6ICz{56f{utCYJ&MNGlz{i4;## zy+k3-W2;C9G9G zW@e_Qr*;_ibf*SWvE6|@(vj5||8(smQ>qV8mgOkyF$j__70jJhe()t@+W<$+eSQ2t zPfPveR#D{kx6?9A38$)v$|oF{{-1Fl?EC++9R=I=zlrQ$&&s(jBa3P(>n-kmAq?v+ z2X>uFI8wYIAP|ru%km{Ee(&h58D=Gm+c`9DSWhF=G9EY_#sf`9_xFt{s2njAniLpZ zzTqFdRzLuNMxLKqa`|4UvbprVz=oeRbD_Ow8s${g?mlU+8R@8vOSN>OBd?i+Ph~Yl zuIZv_X(Ks38c}OSwc_=Ig{s><40H@JH@X-EUx<;~DXutr@y}Y#)~R@_upp$e;w6j0|d=q{wuoe z&xU>fwk7B#Ikx%mcHO(nMvJ+>PQJXCgZ8&=MCI>g_0k#Y0GsjGyAff3UnGM+18Z%# zPmBKgt@7l*zlF+8)%5dHeFl#bFto^nlI-t+m+=BOfRlXV*TA^?U-M-q@b`C@i)(F$ zuc`$9HQ|*1crWACgXzEMAp!Tl?->y2;^9+yJ99~~@hg?~uj~Ky<=x-+K9Q>s_Lwr4 zr^@|n7_7wqzM;sBAb|T{_eTw`emseZy#h}-TDJlJB{i0J5M1Vs5>v-c~`g7{_ z_O106*hK@5AbD^i6yVzQIqVa{#|q>lW_jPnQZ+r8Z1nH1{OgN}55V<)QE*-Q#8e1r zz_FS3I-S|ph@tGXKkSa`u9>Qc5WsO}H))PYue^CH?=yE}VUZxxi4q%0VPa#@ zd@#tXG1rw=&|ih#EnQ=G!hl!pX;s=#sa)LM+iz@TembVA1kUmuoQyTTAp(3zsOR#9 z1!W{p)o3ERP_^kr?VlP^lV&{FWl@2$J8EiY?%-KWncoh3GZ^|CFct#6WhQt=(D&xH047RP(3 zUpjO5&w+bI%udLzzUpF5`rg;(a6j_*VR>}?z0oe>_}{&3hT5s2x5AEsw+$}$v?)RG z-!+};Zvgj4akaIHrSIE1@Xik}DDP1~f5b||*3ZrY7F`Rl6X?L~NrqjTd=k>KSXh09 z>A4$5pk;TCKVIu(;Su{7IeU!75&L8B3C#F_1Wy3uM7=e{t59OQ^Oe{t!&j*6rhoKe zystQbVu){Dvr_p;XHLUkZXvZtR6-IKJC#tThZ!qYoO}zXkN$$T6nQ3KP9eaajE z+O}~x8!6hMqtEQuFG%<9CsnL{RpKSDQh#XM9vcMN5K&#fTa5S-Yn}8cID$Je^l)1} z@92&zw*>|KL~TDMNDg27N72!pxJ&2#cOJ7zm$^@7)n3(>d8{=o?VllIpyLx8{+Hwp zEF9};o)Q-!)d$0)DPB)!($2cS-B2<7preW{lkDN}=ymyc8e0h~0K3t;vKfj86l|9y z@a(ybw3PU*^xkqoiZ3!KCs0Ea0%Jph|odcsb)T*PHe# z^jCks4dVB5jHV4*X!;3m7o6c_6`^*rD9=XX6l~K*Z87kL!2~bNL_3u!pW;O(V^jPU zXJAI#sK=I1cW3QO67U{APHSR5u;lFJ>CUvz-S8rch3p*d#--$)iWwT2^Ale8Hc)@P zuen% zI52PFpLdfu(q2_v?%uLQM;|x-w0nHAGt+HYW>Ut$7mM6sCg6RI!y20>o049+T6qfm z1WTiu)~nI6x~qUImn`^eTcUvb(U`}VC@rA(A)P4>t33;VSwcG2;JXb8U=KqP1WL(Y zoWx}5ffEyZu$&+yE;hC;_s(JeuxG>OYAmdP?6h&@Qv8(XWP28*fW1-1%XrG6`&HBK z6rd-ik=&;EDn=TO9G+34Z%bPQgtd)&u?c3kPnH$j*z5KVnLGlrUdDlV^uTl9bUIQm zuKUJwZY2C|BItPT+u?A6(54k|+1$34!2`WE;WgKz(+367J7G(`Dw$hshk?nR+jr;f zFKZUJ3hU}D<;M*#yX(|dZ3VEz)XaBje88C6&6NeDBFujdNm;`*#^ct<5-0VNFttQ? zzQY63L{xAKi&70s_1vD?cqx)s;yWC6w?s&5ZuL(-jA-3%<1jX5Om=r*w3eq;zP;gO z+vjj*6=U*M6CGDVaL^>%6e}JyFs4$t*lk-igNrHe!j%?WHp| zD^_*QBX-2EuzUSu2PVHx-0p;MS^EA89_OU_tdE)_wRWejR85^FoN6~kcO*1>c3Ns6 zIafhjma1&Bs1f{rca+Tzv>szaR5E;3RP4RO&WK7`q&I)9Mfz@IMb&NJ288*t;p?952PXJbL$#43qQ*QG1lVRy-9~obNw6En;<2&Cc{rW z#An8wEX24hBF(m3s$zD!LC~LRkMdIYY!RMZDk!By1$j)rzYtQC_7*F+t}AfL*Fh#i z15?&SJ5J|WpLyrY>zhCQH_v})pSD-c!MYJC-hIdi2vN#Yxdh|}6+rFJm;*N@!Ix2F z0hNotC)rEWfI@r?Qy+gdCRtWF0yjMb5qy3gU9T?4C2|yW2I8=3f-5kSYe>Aiq45pHu(frKyl$8qWHelLBjdgI{(y_gejYvbECRrDKpb^G*+73{8?{_sg!#( zzWVow^(GXzvU;{3v5YhaxdpXQYpN+k=--L8c-tG0i@c;Mol}Eea4{cPSQcnp@Y^OH zF_hz*>q=m5P(=prdx!IfbL^Xy$~Ue`jeji8yz@?jSQ*9=r`B^K{*>fSRDs0$ za?^a>qw_o3lK9Nav`4)PBwxf=ZvJd$?pPQ#A1Izs9tDnSg3=w6Bsofuox09JKJ@i4 z@3jNs7|gbmOUDQtD?UM&_#_c`yFY%(;qfZVL@(Ny_h}ubR`f!z5*+ajXjti9(vhXlX_UQ+5m?5 zqhQh1Q*$wh!-0n4>95;n>ot?{{WnGy__ob^tf`1Q>KE+djWXQEbE&uE zm&)67Gv*s!J4rLb%GY(_+uecO#~wJ8H+FfOZ(w2t@bI7^Dw&5MlbYdFpy4oTenyhm zDKoB*%1nBZ{^KcYc=*}b9<4cG+s6vEmkV`d`#c1u-8TyWx4syha`{b3E*1EvNsaeh zd~$z3YdAM%64hmwsI{3BMVj^oYaB>`|H-MXA4sfV?{nZqV<^_1cJLAst;#WT@vzaM6OWI1w-gevdD5mRvS4w}K zPWnwrBMa93&W@9Q=<7E{Tk&b1P@GVlSRCxw71ldJZfyarw9%HO7gaYC}NtZ zZxc4#`PN)^^max;Uf44m>XXWQA@Zoswm>ITtn)HtN|bu4GovT4!VCH44X4SL==4o0 zlaNE)CW@DK+thKm;1%B`_I(4-b{sm!vAfGuArJpA}d> z*D&(u=M1Pp%Pv~XHXL#F`u%+0AS_ggEi95VQCG7s;rx{ujf`HzX0Qf=~R^$vP81I zu!ywKB#XRf;5iL`VJyozY-HHX?$(qh3a1qeo~xU|=PobfoA{X+(W;f}bYPlwczj<^ z)!;|F8-b2D`bY)2FqjTzQa#rK?uJOuX{!B;Z@&Cmjs>lmrTG=N2v@QFGq5pudf>Fd zA(ou|=}L8%3ED%2;mLhSrI_l}!R+qB#uHfOy~iS3HV5PN-sOCd@{8$Gqed#XhKWOg z;roYU#0!<@9$Dvy8{bQ=nRT+m#Nc^7EU=!I3nPNg8v8hcN}J{$xBnJg!zZ zo^{8n*!Cy8LEw^h(JL>mXIvgFEy?elBP{m8qeOq{^;J0^h4-Z&SLtzDqp)>>coOQ(#()u@f9e3^0W@NqmPvjIQ>KoIGcy`cyYnk5hYslP^y1BV-6;BxIItD3)XlJ*zBHDj=QYwT=}i5! z6XTJpH32z3{v2rctJ(E??Ykg*BmefAk`CeJhlgvpYviQ6ad;^smxZ?$sno7by4R~s!@ zD$C@-&A_B#5&dW%GMe{~)#g`LO%E;x6q|ZnGg42?3%wT3`gP6M$~zq-XD>01oI1vE zf)YG=gQ>UlhyERIHrqUy?BAB+&axg_a)M}VHP=C* zz7*6HF6sfX)=#+LG@)AHWld0yfN_lt^k;92ymrvu7l;ZDh9y|94Dh+rnV6VdnQbTw zi`u2}?;foyRePS>^PM22zMl>Sny2){Y&yePR&q�of_>VR>rs8=J!d{kueTwVCR0 zTRN?+;#gg|(fKc9ks3XGx2oQn!y_XLGxWRjz%kGa_Vfr2ir^qvM>G>jEJ#elBm>!5 z)9fnTK(=ZgJ$ZU)`!PH3;g-Hu!_tC~(V0La`8$6RcDgoP-CIYp%xGK% zoe|omF^#(C!(<39k6oSR)fI!AD|D+_XXQAG%AH2K6BR6hIJUBiuYxYY!6w!=Q_qV*#^Z3=1^PpRsG_+RKFSMSf zKk0lHvm7Suvwa#;uzS6F`b7bCY582Rgfhr(ozr8hs=lAkLo6uXQ2I94g6GY9*rdUY z4<1Hi{LmyKCSulRwRZ71lRoKM>k(br93BR@H6A!fdAB+|YE|;)Rm1wJf&VRMy_)C}p#AnPKPvUs33RiwFuDrG%q2K|{OEm88A?FuKR}mua15 zRNpuprN-|u=j$qU+sMw&CS;5?7~X4uOcnIayHymV9X2TPOG*_2K5 zuUSMUjs3JidKD$OMFUP);ssg0sqtVP@+B43<-U+jQca{L zS`7r_{3Op(!p=?P{?0+ba1P0IW+1`Cj|xHiHKmC2o>@4FkTWdk{E(#S|B&_;P*JvB z*yw-=NOy;TA}XzPw*>+s-5?^3bc1w@h=4SRptN*Kg90Mbozf}YXOHjq=6}{Y|61o+ ziX#j&&)l)&+Sk7B{{GUgQR+w{n|0;dyX|S2Pjp%a1|zC}>K<6{k&?vZ*vjYexahuq z%&U$oBp6-BH(LojEll6jT@XxDzu4AMd z^aCsfW)^sC8rbWY85k(E=Q7Q2!~<&SkW+Q7P)#4p^xW;U;>=vMT0qH)L)S!#K-loH zKp)|SBSE9#ZQr*da(OY=K9&EToR!^+i*FaG2nm%Q4h{_kB_^H@6&hRs%h&_|gR0LA zel)YeOtV-?g{6mw$b{?7i<6dfv*%)9 zK!J;SG*Qrn$m?_^RPjcPjf0&O^zh96B4l1ME!AW_9z0h6>?wk1!u)Kf>q3f$_g;_W zj#eoay;mX%;$XpT!)SG=h*s1QqOvOJP;cXi#*ptwap zp)=n@t=3Pq%8@NAmNJ34<3M)&c{`OTRzUYK4>b3nI| zFCqLs%B4<@7v(=or6^i{+D!BK9aY!2jT1twfVu0`(A{QkBR_t^!v06Rlj_V+P`gfV zdC)Yu-t>`d(7a=|BN;4n(UCjfMxcv8==^{=_O>$G?~RU7g`IwtGb}!qird6|IPDF^ z=lRj2q1E=;%Hqjm3lTak`kXz_4Gz{vqbeayZ%#*Camu*8@HB23J!iUYOh2Dt;NZVE zmQ^-kJ+RkLTEH>DStB7Wjm8pluk*Z3xYP6S$=vE>WNWJ|qJFseY0;|QdE@;rUQL00pwGyD#}jEjG&SOsjN*CQ|p$0cRasvGp?!}fWT$vKAl_?9;( zTDK`kmm?M%XwMx#m3kn=kIH|t+^`f|#=cY4)cD;KYm7Y)A$sorW; z&{O(f#2Z2kbA={y7Xxr@h!^%ZR>J7^dl#gM5PRuRR{P;fe$y$s} zEQdmJK~wqX8!avgp9<7ptC)6}2NJx{EY4`0OCR;FV;?G9AR5cWGh|7xQwrp8(z*R? zdul0%mYri}c0Fh?3#Xa9nti5}2P=9(#UlgnCa;coKaYF@o!;IRv;1tNfJ(~76TQV5?!K#&}+3W@|_^Z-RV3a!C0uZE zb!8M5rU7CG8ag^7A0N5(`R8&)OES^ImU^EHTuj$5dA$`REgyGG;1^@yBE0qL6(@Xe zmYxPbYhsVucIDU4jswo!3#-GmTEfY}#ODa|SnAA^9aoVu%Z}!B8EhquX9w;Jb8~(S zQh|mQ+7a+i2$SP&US7k)Ur*GF=ZQ^A12_^Zswxc*Y$}Izm23&$zJ2@PNJ-Nb#a~8d zX2&0!+-50#Y2$fpfwqJ}S{mB;=H@gs4W`s8TmXz^JUvW`rl5u!L#<%qpn5-fyn5?v z;;@Kl4N9RO7A$)0MAzx0B?k4Pr5AT=o!#(2eW4E-BVjJFnAWg5zA95K^;qZd{lykO2~97D#j zTp=A>#SZGlO*>rHk#dA_9XUm(_~sK?&9qGI zK&^z-7+frzY12fwzS5P9-uOTk|g^x$@G865|2RCd*pkBN;?L;kzjzS8zUw?J#O zAg@h7oUNMyUb*ugPP3S3-Iie0;=_iDcig8J>IfPMB8u}O?@znDDLE+*HN9$akW^e$M5tA6(ExB?-4{%fGAfZHyf8Ws43!(Cct2?ye|E&8P?(j- z$;y^hir5`{o>AUPb|ZVG8!*XbUZ4Y{|KN(T!9ntZ&s*r=upg9lba%J?deV{FL*a=* z1IlQ+9uDlrvKjV3L);US>G44ZAylBNKk0?PL`iSd{*qyQyhZgcyKas1c1uQZw%qpK zo>f^H^YHvwWih|g9?g07ghXS@bvJE-Yxfh*t1oTM(wE$K_O*DVlHaPOm)JtxjkCHL zgeB7D)2miwW`6yRh*)-SBa;ZFUcteHT;JmZ2#p!dJAKLLGt4p1{hlQ$T>I9$WdGgt zHvBO)GkcMeLVtzmZtRZR?^vt&kZJ*S8zBeI4qBTWY3m z{36A^6^-cu_z^|p&q@!L_NCce6!|22pU-Ojvm9OuG*0EdY`Bqjs<1LObjL;tZ3DX)O z?%==!Jk6FRIpzn2R1*kqfB|uBXJ?w1Zuvh|R8zx1y!>Je{lixfQWWz;J=9FWk5yG? z`o2WNXKDgEs~i zmEhDqGg)@-VXiDHlc_vC(}IN%2U_~{!or|MwUyQS=C7UAowM>7n;Hze?aj5lwYb~Q zh!9gJhua6oW0eQHgL-UbAM*2Mft!n{@9)AjFfd?SXR`Pn{>mYiT~`_zT1gfDj0mF6 z2qGaRPy6siQTCydHjclfkA#5%>~;zDYyK6h z36pQ6?!UgioYdB!Kt6|Y`EYD(Y}%1HywE^_F)CG0Osr<-mjxg@DBcDnVL-PEWgs=L z5f+)ApPw)sm8>MLSER};DpE?s!^Zag{84L+EhvLL3?w8ZIubsfDR&k$j%& z&56C8o!ghH4vvqF`WAawI5^r4k$(M$%$-bS(3C&1g@a1G-#eq%(nT9Rs zvYzs77c*h0WQ_j8Y2V&;D#Q+pYnK&d#+sKNWxY(^;u01XZayri6C{^H$Cp5+WBPIr zTL}4oFS0*Y+MDUA@7NI$0UNwn)4ubsbt^8vIa^#py>NkR3qQJfiA}5QG9RB>qNAOi z@51hLPB5NV2Rq_!XJr>E)~s!8;5%g?0wJH9Yx?=W7~B=-NoFR$-O+7m%jL8f;zR^Y z$vHdoBgB=IUqC<2RA>Axgm)B^T)Nl!8LfaZa>SJErg0@C4H=R4{gsLEV20d`zPIn+ zH)%y#K0cs^gV)zTU{<_vkv<>lqgwes`gl{%13Ssh8{3YLBWdlKdn!AUa;T|psl zm(38~<>h?PaLb&3-Zgk02=A_LiHykFk3{b$(ur#0sTC{Vl5`Aurrme5FzI!n;j4@g*Q zpylk)IPK;1NxE9y$#I>_$a#P(U8~(`w0yRDZB$G98YIimiqP25fD#-j8dB@#)d(3} zT90Yr&bSjY0o&Z$^3ly|f*2IcW#F}x#IO|4qoVOAD%#rG1bt$dhlgzlgdUL2PmlK+ zy2fcePmiW|2PeI=V%4fgtQ1u2Z@0Fz1TPrP2J8YKT*AhN69gr=K*7-XUDgEz44V%K z-Y{LcO#*QSI6g%Z@=yb^hYufi-nl2KsQ9wQv!=Ed`hop35 z0NTVc@h-Ktgpv-Gnv>tA!j+An3I6_Fv6_w#=5YM2$v1bphhicv?>7T3L)^YU?&XzG zwseEW=by{&IvC4?wv)kTWqO37re?_O;UV-1h(msm>}G{dm%?8pbqu;u4H=Q5=x|%M zy3n>5v9K^Z({lg2LnC<_3aT2K!$uvY;P`|GmDt^&%?*3#3IS&rT;CQeQQZ-eIGiV9~C zC0=m0YQ-rcxhn@f>r9rrX3Z@vp=lT4GmMEIIP&kVk5BLAUBbt2VeVWr8&NXC&XFiN^QmR;?oYW7xscKUO^@C8Y?7 zh!_<*(6gf^*+Z*{;!ey<3S&j!!z%UUuMK-N1k||!ZujfmjrNZ z|NGi$*cWIdoijdGq0`YNoBp`X)ePvzzb-#^EE^jB$4tPXJM|^-Sg55S6TOFH>z>rO@6BVd^m~N^Czh0RRZ)lQDPto&Q+;Ls>UJ={r3Q&xTfVhb7X-ZdL)Ks+|z8E@o3`NypN^;PMi{yw6uZM1v#+>yrL*T_07Bur+q z&IfMj`^qlcnZ3id_}s?2Z$kAo1(Kw;4tlyGr@{Z@lU9LyzB!S40z zSxjPL^bkJD-nkRhUk0*~N-8RThuaHHqobqqPX@A8Zh)pR+C$MpBz5e;8)z?JxOwyb zs*$U!AT;Ibe^M|sWF#UYda$>#v0=^Kt$7|k3JO%R(3p|qQ5qweRu8TX8WIN$f5Ye5 zMyq5~+4=q2_}2V}*}_!HYEDg<)QBq}C&SCO^aRs3QF!mB0-0WYq#VZ7M3m^>@_UwB zw}?UIrHo(1VOgc~EzkW#-BPm{=VQ<~!9cL87b3veIfG0{q1}RlZSo<8>UNo0p5~J+ ziKL*_hgrP_5SKb{q};bXJ8{WbdHv>1Is{u{PoK_yjkyWP@N@G0SAWim;5|%|_Mgv< zjg5o0dwY9}oVN@^3;i|oWK~t)^eg&Gripuc*4%=#sH%#NU}0xpfBkuz3WL{g z69bX(f=Du`rL9d)7~iavYP8JKS2M57^}#?{WN7FufwIod2hi~!x^VN#6*N$VSrZgR z&dsN!@q5|Ml>&x)uPJH->~NC9w_nKS_`;vPqwcZ?Vnow^<;jr^tJk?I?6PBPt5`Hk z%}9BzC&Flj94}wHh5>MpgpABZGIs5tqa#<_T4-x ziWFh~c03pTP*GW#(JDGVJ{a_D^}zukpLn#p5*71GDdJBqz^hj;YHEb5=>dQI{{6c* zG;kVzTa8V?wcb$?Ou~aEk)e~x^O+X%r_-C$Qsd))tuea$d8$UUt>HnTp~aZSpbEhN zjlI--R=49hVmp*zz+&z_=}9J-C?s=)k&_h{M;ICz*=|lr9Mc7nPE1S$g@?G55CG#LkL9qzAe4c7+|;(zr!O)N1njml&cDuC)e!xFY)7C7;XD z(mawlYd#nBpQ>l5+~9KgWt`J-a$@!R4$JlH4In>QWHT-4>_XYdz|PJdC+Z;x3lw_G zeWs@L5dlg9etotO4$jQZLJISg+Zw=Ie#cdc7rwqqIy&J9u}zMSCZ+>Pn=7J66p}A|r`M-ZYIP$=%m;1OPXtzvUFd0O zXse0_`TF|$rb-XDqf)$Z5S$)I#p7dt%2}r;L%S9#tRAD*u%aqqP(jR5D+rKGBe?$_ z4Gk@|u8t1W^mr(TB{P*7ASBz`+8U~MDv;5_z^9W2JxF(V_m@dYmOo4$PR$xo)Iz7) z$6?R-*tdjVJ5^Lv^bddi1Sgt3!ik5*^a|PfL3Zkct@`5*vORu5Os5F z>rC%MF`j2?m=SRse4?UsEiElGru1FAp$*71xGH9tr{3T}PH(B3R_#Ph;k^}OZc5Pb zVF=(r>+kP(-tOXSc?Mx?YU<@^MGSpR7qp8PB|fNVmKfwheBH$k(XphhZBhT_FMS^# zSqc#_ni0cDg;Vp!`SAsG{8TS7YkF?Si~MMMDQ3q#*o4 zLRvcO3kw+W4@`*6Y;0{Mp!@05r%#+#WBgoK6t%T+KB!;;Kosgof_3rh*RO!IV?k}U z-IyDi-JHz4rP35H3kgxfj;WDf!De!VCbIa~hJ=_5!H}bMCh*~Vr*(FYl$rx->j!lK z&DV;c+>xd>Rl+&7M2IyX3|enn{c;T18{qfzAdYeW8&hrKsLY}u`VH5=?_yx z$A^9=ZOD(i%nCbhb8G9__8r`&09+|mRWgM{eufA{R7{LNBo{fBKNl95E?-8#4np8C zag&pf#G#3=8mtWD0p<55qKSnBN|jcRjzJFdC5&yIyFi)McnGq zUdnxM_^ILtm97AN3x?<~o6W=z5rwR$&u5x1A?qfI0*|!4K$aeYP0nXc{QS2d6n5PA z|NRNmdr@hq!pZnTGAP_PpQ?rKp4DccJiSo@0R0NJ?9?I+cRUU`yEfe0QeEeY_iZ~}%pyMH$J;;!q-PH!XzP6Koe3WZY>ZW}G{#Lftl zlaq%&J-MYECW}dgxpu)@TNIW4-TM$P76Q;vWHet;a6doYXFjG7)sC>8ZJllir2904 zj#yq<*&5Kgj>H-f^(D`|8YW*wgBc3|r;Dl~eXrE#FfZE#sz|eQL(XsB_+3!arE`;mtXFyDAhJ(2EuZ&x07#K`9K!2uo zmkb1L(K$Fc`UVG$y58~td}UVTe$N~NXQW0^%uTfr%L@T%ldz8k`*;a8ls~An^L~_f zJwL_QM?#eY^swXgybdo~*K7&GK@Re7czAgk#m*^i+$@+n!=Urd%6eM8hb-=bS%Cu(b$@W2oiX(Mo}{M}s-Dhp5{g>)GzvF%sCA zKQ%%MPHwhR7a-w4=HpRFyMXB&%16fD3~S~`zR@4k0TY5!rWz_`^3 z;#TN4Rdc<;?Zcjf9B_JV&5{swL9)f4J-ZGKgsdY3U$dRv+>DlfWRi9Cn>ke1v4BeT zi)X#>4Pd9jCbv{eg*F1zg4#VQP+)_Fj8f0}Q4Z#z-!4-%XS4=itCaU1oMD2-&CUH1 zOmC&#LP#3Yz@}?yEQHsm^$(XMtLBuet4)59f&S~a{@{xZ;4{zET*M|*@53lj8-0|e z@N?5zItd)+3}kpSI~yBy)S%QcK9B-GGVDqBHzY_0*a`v$GOKl~@6R0gpYLGa$j4{8 zgg~y|uy#$sXeBO8XCa>ho%>OAiQ)bxGN&U_T<2Jb^MqZ5+VXf2lEs#WNeEl@P^AQsnPLp zWDTY%X$0IU8X6jG?3@BWe#C-xiNKMFC>Y3-vfoLnSSuS{byxkff8@d8;i1Hh7(>uB zP(6R25EJu6`KUP#pc7P7)It#M0W2autk8fJqSxn@V~mO*@firxiTa&!TwUm_u&KZs zHb;qum8zaSfs_zX(=NIMwy;rr06rZZ9g7WOzcH?=fs>+Df!}VVe3eC z1u}^#5BWyz)6|LxRLCk;FV7=Yfmoo(q>C!216FvU#V~j1VX;Y9Be>DGmc8!r05(BD zp_%mb{;0Gu{f!tbat>7l0?>}0tVrwfy{D7i$IS$-PzWfpUlLk&CRmkRdmT z0_dfbOQ01RKM@f~*FNhxTc`J|_X^WpIlJv}0}z3Ux!4W6g>MF1Gcx?o4>%##uT!sv zp13GXEUZr>3l}gvTgHou)GKeuudc-3ddj)6VQ0Iys)4Bg8gm|yk-;>fUV#ZRaj;Lw zOElT)4h-3p#SRb%MbH#_bnPKGkk$UUk`!*lz-buC$bcQC{>tLZ7?vb~xg3zLwW%L?t&)h$MV05yTU z{fNbR*mV-D)$wX_SdpX)Yw$q%0|_8go7>yI515;vx4wllUAEw{7F^%+ag>44K6vQq=u#!NF`SKgPrOqC4WY}&+mc)k|D2sgwr(e-8Wx%vl z(3D3rdUwZC-iDxuZKG_|$~RVRf8a}QULL9S{>mu+`uaNAN=f;fr+}A$149Xyy?}`0 zG(dgz%0%-7RYboY!Rl;@qU(B{5;7f@8#fw3<9xI2T5{pYx@GxzfJU)NJQ@c&E|nkP z^YtHNZnn5Y3Uj02i=7mzN3;MYg)g$h>FB;s3;eE&2!4;F+lFmn&jz=U!7K7AMH=Wg z>^gAlfr`a=)#F5ZT3XA}++Z#-F)=@Xe;%PDS&(u=sIxW9tgVF?7INlfm{Snni$|Jw z)+WZ7dt4Clt4dKKBLRK=%e+=&L349+WP`g~TMb*YZEzkCj%~8bm)Ecm48Od(IwL3v z-L;S)fvP`o(^c>u6t_%p;DDs4#Kf@XX6dkJvy<+CS8;irxkH*KUE>9P_snlT5=v4x zZVkIyA&1y=MUbsNt#=s_Ja=S6)g{NjBS>4KS!-~(yBj}wIlaux)KuI^N~(O%puQeu zW{uu+$RFq|9Epgs8vq-_jiFG;Qr~so;i{;r($wMOzk;?u;l?pgpa+$Aha(a& z7~hXwuag-y1>(1PpIvw`fA4Z4!kOIgfD zTQhvNlc)Qk+k<(>L`X!>K`$>5F8=cmUmh}Y-@pQlxm>8~{{I&E+GQ9%>xmlG!CM@@ zFqB(A?sLRw^J;DD|8WN6qlKGWQU;hj(ok!T zw>k?lFf^n$haL)V^FkI4LFd%$?1g$8?Xu+izpb}S)iR z1HvK9b#s@fsG#ht;KBQOc*aKpxs28&!1(doOsSdPrh1o|Cn+l{2y3RH_u<2aMJOCj zO?}TV3-4&z*_fngieY)c1JRBkm+zdhr`;^%57aJ{nJY zOWhTmA^gXp1FWewoSH8rQwKSp?NticHU}HBuh-c6NaY30k2m zJI@!dPUP3BV&|!vJBS48;^pmSs&NFX3;r}ABp~pn_Zl(hI$z4l0wQCUdgr;>X+Zws zpS`_3Y!aEu2C!m*PBl{lq8O!sx<3t{bRVU~^)+OTRr-xpet`-xA*C%ax*l}u%7>s8}7# zp(pE5`gNJxK_^Mx^5E#ma5?2X%<}x0Uip!j-|uSA`}gPoOv-wAcqAOnt2Yxu%Z0a*9PXG?!jHMbM-Bq*#r;*y&UZ=Rut}XyI(79ArBE1$u z9||x=9rIn_v|qea3!-s&DsFAZtCsG$;*2E*J40EsG>kFh~DTsR}OR@ z;GAtQWvQ20P(sn)vez*p;ys7YJW4Pu17IR5Yl|L!$RZ#n?zQl~fG{&ND|Fk(AF4gZ z$T@b~8(!G_E`^`a>GVfYAizWHJPbAjLL8_K(?gei6bdj9V3!Ri#O9kiI;g36a|2~F zB>rHmvF?$Qkp;+vPBw2&H(Bx%|Id{E@lW44#T3+P!s_cU*X&OmLnXuravcYVrlub7x{A&O$dl!2kTqg6|la<=g3 zvFOTnWUlXzJZwem;&Zr^Bxj}|i^@5A;y6VSqOL+;nU>>lTx9yvmfg(MqC z$MwbQe}Y%Y<;0lI&RFTZm0njZBq9BoO;=YJ2menbeEiCet4DFKYpw3dwFfKqg0{&D zS-!FvJ}^*^9uc3MoaB1CAXDL>AkD#?Y9aA|jT17JGWuuf@b?q56OeoD-&bE3jOg!s z`TNWNb?t!ipLLc$UUxhU1@G@y`u!-~suh@p|Gt#?{{P%w#Gcum;ndbQucG(N6n3iX zBrx|YyVlo`WyybDyCja(J{d|`{&Pob1D+ATup8SweP&7u`f#~FP`hVZk*)BV^6V`$ z5}pRk{rqV#QR4zw1le|Ubaa{`OK!f``j`L`m04O^q8;%9^qKqCEup>u5eU-^AOVBu zka?RF>*A~EXk-usS-=GlQPmmYfSerA8{X>4`E|K}4n?|FxX%6T#e(z6AKkh{Qw^hm zvuO>_D+C2De9r)j>TG6woACmM=5YQ35}_lC_tI;!I{YMYH@ac{`%Awfzrdd)m0oY9erL&1786|$Hd2%16h9v!Qfb|7ZA@PQ4)aD5SxwI96=2j^@`j-!6zZ$ zj8fAa4{qJI3M7~WjuHnj9Bzo~S{wk1e3_UCP@&l;JUDRi6WYB@<*}4fLMg}~=erUx z5UO&SKz%63%mXb7sC;001_0dN@Y``x+s=bA{**Z+(NM0{>tBi;WgNg_4(TB?alPoH8kI#OuhOM%(m+1U)|eOocJ~GL^mx)C7Ax?&M1u;mf$_=)o{NAOPQBgiaL+V$qToH#7!DO9>r6^yc zC?uC7B|4Dq08A$WvkQQ%KI{xgGlAiQfdw#HiVEfz7@!UW`i{uzg3Ed1 z>E)6XNH(F#i&dwJ1l9t4pSX#q)rW?m^A%*SrRIYnY2=XJr>8R(J^YuI6^S~%m%WHP zjf;4Bcl`U{IPnB~{(;T8mC8r+t<9H&&dPM*U#rZst<9=Lf3@z)@A8dMjAhY#PKx35 zNHlO#f6veXm&Nsb?heGu50H!bnX=i{Teo_Rf3Jz3IjVWw8u=@1l`4#*T>ydbJb0J{rBNco*NFC##O4i(X?7-&1`?*WS?WCd`dve|1L zK?F2KCO_WYopAws21&XU9J*7X%^V%vwgh=8%w>^wc=sLCfpygQWkUXV!aKXCGN{V-RW~ggH^niw>cv zqk{`$m6%9_2uN*$vvMFDLAu{mu!<1SeJ=7mbp_NiqpFHZ$Z?fm^wEtN^~&d0|A$_J zr_rFDo(1WX))yDCn@{1e1}qRVAS~~Ir4J|aFs{p~FThE~B!kcL3SNN3FBU+8phO(< z#T8;q$fn#_?&}00swz98XED=X%hffgL?uq2AH|&E@~Y?904Yi zI;JL7Z3Yw}0TciB?HidT83_q&i-gzgU%I=2lvGi%R%p=FOvKTM$@uKqGqRs|S6ejo zF3$hFgNREMG9Oh1Hd&r3pBvrC*BX*=&L6=%f8)Df+!?%?#;lgk{;VkdwjIltR(Vka z>7d#z2waav156#2oR!pmv$Wo4wiT;1Au+K%sn1?0Wce%P)E3n#+zjBc7aZRm72I-^ z+ufMdt6BT`^U1F@8yImoQB3(Hpj`QbpEM&O$6kB^K7ym}fU%|q=chq#_$CSh5FR*a zlSLQ%Q)*il9ZvQsO z>K+LEf?1N((4h3DmOw(Xpn(Xrs}fDoOrA17BEa-CaWwq`0wnWP!CZjfrFdScjpGdF z6-ai$9uMx^5to%kM;5{o6USCr#MlTWvDw0P4HUq(fcr%{4EQ-92HB>-eC#0MS9VBmj{<>=E(xVRS)@F-zN=Oq-n26f$VLFt~%a#WJSzd6q31DO%v zuwaszr;E!99qFj3sKBUOj?}@(!@YYQ^`?xJbicXR_^+Kk&blg!8Wdzz#06#)x5c*Tj?*|JUEkmAFTU$FlJL|ic`41ki=}f(VQ+$;)&yn|Cs4syA~ml(J!9UkIEU= zm)1*#N&{tes&H8xr;=Ek9v)a95M%-%gdk&8*H_kUrUI119q?A9H-=8P=Fq~m$56Qj z`=bxXu|R3?e>F5{z<^>k)G**2w2}`60{{%hSqwr2AL74+uY?5S5B&6{AxNEjUisw{ zoYh6cZ-apKMr$Sp#clAQ;6~69Pzx@c#Q*sx7ocaZ(%6#rgGvZ+>=IsY!9r;N`jx1O z%G=;IM3&3}^odDH$fZ@r1Z+a%?W9K72zQ}LydYgxb(w|)u-v%C}-8CPQ^{Pb+mCf-1jZGlTK$d1N zXjy&q2z)Q{<-ukmlW8EsAt>tPt+kb}LTo4Gv`)f7gf*#R{m`^=2o4<&|DP{`%DeeM zu7si@0i=3Uur%A~+;Fa6zph?nco7N%Ch2%ke-^HJXZDCEd2W()CM3UXQFG1 z)$hH`w3%XafKh_N7;=`*I?c9|blH|hYC zkpW0MmPH$7B}PC5^XngEGe5St3!0~pRphc4J0^E6Xb7c%X({hIwOX&ctvh)lT3XgU zKk~1@arpy~ZoV%$n3`Eg_xI-60=Xz&u7@d&nDKuHS$P3XpM~3EWSxfDpy>MkQXvtxQJa6+q&_ zK`IlBLZAf)9Z|!UB^%|oma7ndHnsr$v2S+<-_&UmgVZimu;OXjK0WDZ{)C2{ynkGM z#dn~2A-h~o>gv~<2i+WE4V;YuL+*iD8`QT+_9yAABH4+Q$hUs|dQn_#=j8O4akfYu zTuDg!2Q$x4d59_;9Uuf`fkB#a>BkwoGa=!r>X0Q`guVv-i9pq%!LQMd$=Ic{smH6+UED&6|_x<5lAqv@~%H%XKTG)n(5Y|_%>;*3#K&6S$QwL%}Ot0j%6AqYWuL!r`Y z{gTrD+XP*-JcY=wZ{I86+w3g&4g4#W3tD`C3!0aqk+!;;TDqL%Kb*ufF*heVvL}^i zC?`UfIUymy6u@L*GV_^fOn+Y%hiV2#Obv6CDBqI5-9aWYL)beo`=aBz1y@I(LcX&C zd(`XuXgD|GG(%EZrg(8~a9Z5@EM^0OCEh6LZ9k7I+4HBzlNUU7NnYC1Lj#&atN+&RWC)VjH>@htT8AJiOexY{#|J_wiCtvVV^8Nl-iT9?q! z(1<%6!GS=Nay3%7f`Cab;*+w<{G*)yI4HUkU*q=kh-R)0idRxn4f|-I+R|!xdQ^b3 z*I$PINUxwlDnP&Cg=tWWp+RniLkbfMOZ%Mr5m#dq#^j^@;2^5NOEl8Pwv5zD{T!74 zTc&ik(@k7!6L<#SZe+Tp?x*JJ7|(1A(U|Mt*X-b9WSDe)+%Rlw?Kqne~S}SB-w4^DJ2f?9xV9M-^!Bmqk*!}KKJOhBs8%3jDbfrxL15cwYZN2Hx044Wm3A1v zI2LA$EBF~)E+Co>xlCkbC|7UR*j~8);W{`mZYr%jRVL`>HcIv=J0w@ej#{+pV!2u+ z#`RCO^|}E3m`ry<_rRnH-8|5c_p<>Lr@<_lpDYK_-fr?QEM|)_MwOqJ8O=h#MM=xn zAt2uhj)L0kYH(_OGDLiV4KCnT2qNMIt(I%xC%epD{WNMHRH$eQlIQf-`QOj$kWy={ z2p^T6mw1W2Ky?F61s4bzOj=@r;A8L*pEP1)sIGQG9YvfuS^|R>+K5wCbBZiic%`Mo z$Ua*1UA@AO#?ZiU=b@ODJuBqMKvPpZpit9N%IQbfn}rwPiAPgD)s+tmllHmy#9pDx zp#Ub#d|cYt<)7Om-7TUx`WExUEp^EVfFK?s;#Y(@s1?6 zE23>x75vlFb$~(L4MzW3lA-vXwgq3S+(1V=v1h*^PUi6!lcQ~Lq+B;|d>lXvOA>NI zo_-h@dBPl4&FSjHY2|#N@9g3>eV&}6&)p+#4O_&|1)u(~i$#M2{5I6ZB(;%m)3|sM z-6)wq$_Mfg33zLW7W~y&^ZDwQ*>rb|^lDv6-8@f<&fM~qCC~@~;Q;}N2eo&DQX;_k|4$w|*szd#?ZP_i_=NjXA7u93M5im7LTG4B&cYOx_oOzYuV z6nR3mnv`T~wx7>Daf#9OWp=(^TU-yJgQ{*2kYi1Idou5n+i&zpWp64LTLuRPVpQ!f z`h=3(;k3rxUXpUYIycRfA5600@z$E9D1=;-Juc-@_SXGUr1 zt@~!4z-OcoHV#q>>xWh|1A`q@>97cb^~%`tSdD(Zk8LY}Y}i&rZa-F&GS5zPn%yjGE)L8>!%gNbwJGqYN)PP)J7avb?OR&*2AKv`- z5FH%(3Edw4u(b6%7cr$dv`t?IUAAT_;5(GiV`G9mVs2|7ZyZY0T@ep6dM=+o2Y#^Z zpg_UI(XQU57)iustMLW&{W-&LGQKHXyFJ(BEk?^ob*k)r)LC2C51gS(i#l9ME!X3C zx2eoh3;JPzr98E^hKr9MskzV}S?YPJCfPz-o3C@BGbAa9H55F@UzdG1QD{q?unU$+ z9q$Erg`863(~m>yzJZpzwHZ{Lp3WLNQgo^VDk28HU#O++v)0BcFTf(bbQc5StWff{ z+b&~xb#(`hvrdwvAxE&pu;9FjAe~C0hr(O$h6nRP!doV4-TbbQd2ru*G?O!-+Cc;J ztZx1z^#QXlo*-bSakb2;HuMqK@>RJZ16wF<`L10~ymvY|$W&7R~`lw>`4zc`GDs2 zY+fh~0Pk6%+-f{L0&sbfkJ$2MY9H?J8e`aH_nW>qh0#TW&c`VdRhde-SN zP(q*VR8FiP9Jr3U_l1G(y37V_3mnacIAuNeBQjmS9D|I3tf~)oZ=YB#FCj|=`)NO6)5^&US*a>Xhfg6or3Q%zya{eevL|T zqja|g7_xp4Oc^b|{?fPw30|?LRsWT!JDa-!xG&42GQjfsZyoJ=kgScA=aiO)NHaD- z4S@l+YVm0Z*uIbb<~Zw8t6yV~>%GwxA`3FsAan#nK)0A)pwnd1Q_eRZ9M0{gCD8)? zZaa@l_t~dIOY%xCEgIpt-W8%tt7~g{w7=Qx$XGvKBCEH*DzA6R5C61GHHUQXS*a!f zUPxRPphL*F34*1&=(b@uA~=UX8pA9EX_R1suOlD108`ci)&T{9j!*f*J0GQ;KZ-#( zC|4j^HUlUvTu8)W5sS@yQ>HFn%qD)N5MX^U|J|{@5G8_7P;nvD~M& z`L*QP0G@yQ$NAPL>B>1$#@RF??nwy_?BKwnTKQ*Qn$+`y+SVq%PrsNaV5Z9M~7rIcL`Dlada zevX}=_Bs|HA0OabyjH?R6aoSQoBR9acie%ihV0_Ax4#XbU|87(IzX!MjfN1?o9l1m z{!Z=S(P9G;dHJ_LU%jXJw0H9rdTO{iM!U8!%ES8+R>?q-eUKtb3&+07=<81<;d}q< z_d(#x2X1S6;G@WxW@-7{OI%1b3XR(EkacJ{%f0FvF+X4ga0(QjdEkF5zfLbX-X-qLPxjc(43rw&8)j+Vhff2@HHWzdF0I zku*pZ+3W>VPo?k_+i4R#*h86Z62Bf(J}sa_lde}3x=OAdY8e zXC_H0P@svR6=Fp85H&Qkx3`- zhi}#F4rn18C6HaU?guv0>IMc301o(4-ZDWT268ogpLD!wfR2Ev1LzA?S`jX7fd++e z0EduGM+m?-16;P}C0NP$mg@fD(g~G%rA21__xY0K0);jeUj_wH$w4E}STue^|Ch4i zg-@oaa?@R?rXe>_2o>K|`sAqH^lSEMZSU#=+OnUE9XXjHh%iVJNvDW<6ar^c`0QX- zl2Kaf3DBFNz%*3jatjuNqPltz7&EN4-Ahz=@7_gxd?f-W;99;EM}F2^oodxPM}@`3 zQupp*0VCW0N{F7P5}|h{^4^s*ZRZObX|4 zwlw-<`){9~p7!Kv@%etGhjvkPQfVY>*5lX_S|6IAXa^n*&?_jjacPjwdI5n6Xxcb8 z96_%6doBe$HMMu?a`YDj0{j^?^qBY6{)d#1K5x_mP|9Q!<{s_ge#C%0bpf2lYLWuy zdig13$X@E_)z;A=1Un0mk?b`a2u_d$;_2z>I5Dp}2_k zyVD6!CYR~PpKE@rjh>H64m>w3l?>T%Zc055uEhl^$n}&~$p11U|H~ZR)NlJVX#%ma z2-HvELmB~<483jcxd1d;-%x2b#Vk^XGq@;fwpyv{3JMV#+a|`wsj!dlJa{0jto&*ddGKh7)i@Q@PUSUYb8>Fh z9n4^NrijtQq(Hz5T;&SqEk>|})WXTYp|KjT@`vma#xfOpLzugXLtDTxfJNbU85^V6 z31$I<%!h*UTD z=j9Y3bJJ!>MNsmQcJPmxdnMjXP^@CGUmv3cI;~=cD1fdu(~bUu3&JkHu0V?-&(JO*XVFS2>hU~(3Fv+&^`!fpJ|=P=>r zmMt3Ko_&FlFa-zQ5zHgWMweqd;84H*kB=MAc+3a%p&A=*HTatr_>X(-lClR4q@+yr zNg{7r|wKaa!9b+UQ^Y=yN51GYI{n4yDm-1PSPjTf{ z#qnGOqFq}v)ksUuPk0PVXQaI3xu3MkIFw(I1)q}>cVr8?kWkaW02$EtDjZhGEG#Tw zI(qVTgrL-89{4AP7daYzm;YblDcQV;#2O!YjQpv&!*s#!ZR-uc1$1G*y0g4>MPq5> zdobcq4EKTJ2$Dtu>Aj7e-7P_A(lSSS4Fv@}VG$8z;yg4wtifRTdpy$JLKU)d9JI1} zFVP=af*!_duURRw`vb~vK<8wL?a-k8EsT;Kg&bfqC%$Voxf3pzM)CE`zw>nO*fp6m zi6mTSWc=6x(v2u7Azdn+l9J#2E%)B<{@!!0^VjjZ)>ygs+LL)gu;|KHd<) zr&i-%8AlUkI_wPECk3i{<)OZQ6d2NIK;sTm>um#z&ws>Ng()+vV~hxoxMhnDk+{_{%=H9O#C0OQ>qhc)esm-eM6E#J)@yl29tJiID)cE|_~ zO+Dc@jIjnkDhxbd?3pJ!(G^nG?gZa-^M!%?1;ZJ%OZ(qD!&T?BI>HV@g6X@@d1Ikb zh9p0NTjHNLZ}8`9*(0EROeH>`}-Y$&YVw= z+~9((Y2JoDH!k@d6y!gl5NcK`6kmrYycLWZftUo9pSAz%mAX2b!g)IN{af#3!Omf_ zS>1M+#{>OaY@x~dDPv}0Q?(`pPr=es`ndfuyiU`}>TN{Br~9df&nhYl&IJ?-cEWV2 zU^pe>=!893apvXba$HM!|7$$EiLGrUtS+eR5)@`jDk_3&YlYQWH8P0=Y*xlAZWS5U zN5I*nIrrZkWyRP-wJIb=9#!9kEI6VufAz337OQE_(pY|^v2UV(>Wfd7mXpUYcCma_7Z z0<(CHgM$FrSi;jIu?WZ;fK~y*G05zIx)$g>@FOpKmMc5%Zje0FGE9ts0g)hInX6m* zew|hzz}c)b!=w009q)l+rX~e%E>NJ2Vt?9ZS6_JT7dX{{xMs$$icl&Pm-DD*d9x2* z6dDTQJ|>ex3N+4nQ^+a8L9@qZ@bO~o{&I9WbXj0%GlstmViRt(C1XgX2%fILd&jK9 z6)0ij(Lt%;ZQIoBb6xeuDvu=4{K97L7ODab1YB1jqrWreaIY9To7G-r8$m@`@(K!V z0N+cj2d~@BG|)iG5-RVk;Cxa1T++e<(vRT_qYZw-Kt8L2>>TtCVBVvAo7t!-?y&a* z4j<5{$8LFG5eQpq$ZF6q+2g!*>z4CjzvQT}!0fU~tAZw0&TZhu z92MDK?wFz|Noi_BZ8+y_c zK?T>Ld|7<1qbHA46kPC!TY(4LpbP*T=3+mLKb2-cQ+ZwOGTVfP0)^Z~YHDgY zJ&}S56u*+!Up9lG0pU&d_DDKFiiU~Uj$iJ8ItLjAS?|5~3`!BWIZNO#pd>&F0TPbq zptOvLz(y_?*mEG84u;JEAsKhH08&AJ1uW2PAJ3A&WQ_Qm%Wc2ogNYOs0K-4$JVElh zwzjr4>C%T5P=XK38`1*c5#f4j$;r6y;BXt1|6oI3sqgHm;QI%W{e@-1;Q%mQjmjzr zhy5RN$Lbgw;=7s9`;J$IR#kbVEKb+B;mp__Qi2Co`x6&w1C8(nREPKh^)!r+w;TIN z0rYlYc6PRtBEUF+3TEZjjItm%g9j@;&pxe=b3sEsfR>;|=hN}Myo)h&j6s+Myu<aSfF31+ol_-gTeRHY9Ee1al%B2P-F?{7^fVCI5UkNrb&@~` zYvX==TfZrsn1Wo;<|+oRC$^XvHnouFl@uY5j-Op>*GMB3V-P9pCZB`!n<9hlxllUf zK~Q&WhHi8xkpxH2*h^PI_R;)2gZ_`7YeDxSO_8<Jw^s-+8MWy+IsX z?a7G=7hCgtGNT~C=tujjEb0e`rw2?Y;Ez7s%8W&LYLo;p-w=kUakA-u-VS@<=^Ud> zT46TJyvO?8zSO6XnXO^s>+(I%1HPwjr?+z2 zt%mdfScXC7fh*x8!}(Syjr)X_y>Fj_@h>h6asI=-PcJG;6D#r?OSjSvh7V)Y>qxz$ zW(K3J`E$60f$Vl&8R}xN<%jG-7;AbF$^nx7OBXL%%l?y-e zVy-%?otCnUvxi401m3~Hy;|S-Z|LCaA08Qr&_qBQgaNBzx;|ck#2o_FS4g8<2=w?C zB=?(+ms>-VZ3I6QGy#C)Gmevz^QR2Bv!bKz>j~mG4C=y=mk5a|V#8<7iyIp;XQxMC ztRIGHV*GMzj^#b~b50CI7HX+95bMKdq05oOF?kPBsV3RdS znhg&%`uoFyM5X?!q^e35p53e5Tme`sI*Yw?5csmSa{#I+`~Jg4E^g1;3;IZ( ze7wRjRt#d*-p@Q~1$2c=B=9Wo8B*G#oF2P}6gy(-*ChmgFMcKQ#HH+d90+lH*Z!u|G+Rz*^d~gfUQJc&R2R7T7|9+2KDGDWSc5nC)SnMuW`K$ zkOAXBnu&=1T3T|mD4@PTJzM^@Kije=$1}FulZT6GOZ{l>?(yffX19HOd|(dwkhi{( z7kW;fw5kzQB=7|+f-|Z-pcWu*hq!W&gmd@th1=Y>5?R8vY7 zv4$BaFt3{yfHXwo1ZQSu_E#nYS72FsF{bR04etEXR3!wPM4PE><~~K?RNjkANTbrT%B#mkPiXio zt@1Yb8s2a$CcmxC_4U1KrL&%11YHD7y1H1p^8;~_y&(ya)7?QQ$O}yx&Zpu%bJNh^ zeV$}n1s|I2EiHh0;NPS;$;dqVR9RVhC35ww1|(5t(Ac9^F4h|ABGTxmS_f-_P$jzywcn8hf3<_|na@$O&NeIf|?zVh{Wc)*V6JW3G~w$KMKqwDPq)GjcNk%k**DC$sShJRTz5bYCA2 zhM?XwIKf)R_X>?6@-m2z6~uIKR+Dt(jL9&A4FiY(yqdq~$gZ&t=x0Czz%@=+??ex6 zn@5P9Y@+~@x#qz{-vT(Coojk3{t%))Fk!8=WvJY^LPcf!D+kmt@7jq372o7MeyxMo{s72Z}!~E-nC+%b=gNg&tP*<6rWDw;Y!$ z;w$(ll;M_uX}e&f$ehOfwE!|bsmU5Q0Z8r;J6=<>JK7M2vQ6Qwz-1yWEi3s4bE~V7 z@T^wo3KA=off-GHf_*sKfeQp+-)7%4o2dG}k}U`B=5!@IY%zAxYpn~T8C z!C05cs|7+SAkTwpiF=cVn!3Nr(dcD37l3d8N61x}L_Gn2DFO*XVrFi?)(provo{D6 ze!(?y8T@AOu|u9qR6p%|K3-ya1?!1Q_Qx(R>6-b@aF&RiY_(bqWLyF)1DQi?Ol~}t zM`54xSe`yf}!1oB;SzxtKhe|`S5i6GACj*1|v z9R5dMU@|dcuT4Rvx0q~|qy}Ki{rtcmufYK-B#3SUufo7x+u@Fwd(sE|a1M#=kD84( z`is}NuYbW71*(EDvPva9u^@+=v-RzFwXt^Xs-27vQj8gxaih~1$_Eb7DY8YwUegcG zj|L02Q#Yn4O^<6P(h`0j633by$E+h_Cjnu>AD=E02Vv$xje{ii_LrKmz_Hf!y^8V4 zpI>C4J_>Q{j6nrJMAdx%oD}p$WNY2mDMcCu$1C@O04u_la{l$@5dbVq)Z5RWn;=qe z>oen%mQVQj`&P?8gSahw(+Uc35tPcNo@~%jR9=qTe(xSe;-vrS9~QV|)0g_wn@f*x zT(z2M5Zym7rwhC*6--J`*85KOn`2{hUmu!nY3(5Ek!vU(r@-P=&_N4~`+Hr7ilPkl<#x)L{d?P!hve?|yxog`7PA?~$4cfHacf3LJ)^~~crRM9<*w)dfCgq4}=BMH#XYzp7ts|0a1_~9(M{bzT zqkxkiekTUkLqOh4V?9La08oK?LDJ5Stv6K^;9mP~WfH6`etH!eMy=qk2}+QOB7Zv98cNlk1l`oT3W~j<9S^8$#ZYm8Ve66a8xo1xFULC zVVs@wZGtjA8J<@_*+84D)JB8N5VTQnT(khM3!M@>_2IM>4`J8U5xn!$O$R_FO&}6M z7EzHwy-oi}=Kk>j#`;86XM9gGea)2dD(n{M6k;q23JXg?+yNvLX_M3v(b`X#b|+Xy zckJx$wgG@|dvP$``l^e=Y_>@fArPUH0=}bda6~9Nm^}Xd^L|^Aez;|-7lwm_1H`~_ zz>2-&JkJD-EF1?vur4nLE6(^KX)L&OeAHu$Wgr>UtUGTGy?a3x=!;oEn9%){$R2DS z{7MX2wVXbM3lCkF0?^P?TSf}SjXQ>ym!@j@0Z%!t4BZcO=i_&rZmaX!%m4}$scn@~ zM1nys#wZ~0zUw}R;y}6-<_S12puE3xl60C zhjN^BAs!6ztHq5_IpGn}cdKfBz*U16?*vuF#f$11sX#_nd+l5oa$5nMhY9aTdQT*v zc7*>2due8IzL@ndK+RU)i&7*rLOvb*RRPGckurkh&s3`@2*T;}oDhVKXq*IUO4nR+kk<-|#$qLXJNpeFv(=Oo0EOA|aSa-CN52@~L zKu*}ZB9+ikJE>Os;qi^fR&_Nc(NvEb7m^(s8pn zUj699c_i>sEv8IRqu7g;=B=L4{17vtl0jZ$kT{{L!KD8BmAxp-m!09>9mEbr?$Hem zmVFX-qg!~_l@l)j3;b3DCNQOn;Xz78-S00vb5n*Exfu~xrUA_QHgC7=q1 zBnS@Vo>TDqMS|1|yl)_b#_%0CCV2J^*UFS3V~L^;+A!%Wp{dEqR17RiL78R`?567| z1j%kUb#xrczL8^U0ViLn-5+d#Gsv@n_wzhWHg*G)Lme1ec6aUp=`z+%LHFbk&7vpb zuI7j!o8LLQbQCQ+wGlL&uPb=cvYa2HL(W@kL%k2D^EakIRwC%HO8jgKN3w}JqGv$5 z&Tmz?@Ug0@vtX?io_ z#>+1Q?RXcmI#o@dLLwIw+>bOhaG}Wim*}!3ArznHZYZUO&90dS2Ois-uk@sm^snVN z<=P{l%EjTl4%q0<9ThntaKgal7w+VUfM~!+RMF|h)F7LQ%6kcffa9YkbQ={hh@Gr9psuzWL{J7vqjA+6gE6N2 zYv1t}jv)vYLa(pF7eTY^EjiiJD`{4WU+ zSKb5&$w_56nn136dHeIk=WWoowrrBapoY_$xWja#LHGe>`PrbCmt=Tu3{@lmG5|BOftVEbPF^?WYZs{3rL7oA(1flX=aCY0F^&3N zU7E#p$6u5KS;xb)Ju4>+1d zQH3rAz}dljO1Vxa`1sX8?M(~N*uTc(bpwB$D6)EifaO@Lef$d>8m6;zb7(%bjl|kW z);#2YQ|K2LW2+cN!Ip&d0s&f|HRr%nBgau=S3@f+^1D*4D+ZYehqbqAc~wd=tLT!# zOy&wid4jA+Z*dexc}*Y?2?5%j0Vb@>@^b=O2sJ?l$hsWOAm3mkuUZ@pfTmzPJP z;QA+Ks`7B~@jK2=k0I&8)V&3mS~N(B?20IcyW9x`blyA98*0`dOe2WzI%MA~=GEY+ zYXt9s%uf3wM9T7#=fehlbK9T=f_tKS;p@e2_0rOcj|MK{)1V49&nZyPH}{j!> z38oRJS1Uvoe9f5XbZA_WuAZpL1zHZV@`L?yF#G!%Dn4vOtWRtMpI=M3V9e|Cr7G6$ z8kv>J3*0i^rV<|aPg!O{f$Wc=7JMdtenO0niT5m%{zJx~uJJR+UN3)UWN^_@eTGlU-JK7#HPIlM2s{PxcQY92W>;3m zM}I+&)6fc!u7FSrh)Z6*W73Zzpaw!FBISIc{jO>A9ITg_vV+LP45Y@?jOq7B#@Yvfuloke|i_*nVKCfa3wof!|9WF%nL3?-r^yqWT?zpPff#s1BWc9~54lZ>y!Qyw^1NmJ zR&?`ILtw%bv1~nt=fo5d8sj$i}Tj_QToE7s`p@zJcYmVe5Ru3f)Zml-@c@ zB)S%HAS1dhPN3w0RAmI;y6GyYus}#^vWJ)9qy35sc(wp#KiXi6V7h{KU9A-gg0sheQu zIzw;geRg&x^vaRO6?{(uGWQUE?FPUbgy2y^!py&yv1-n3X$uRB`tKO9Ikuk91ZgtD zB?$6$2cF+zBkY z_vjp4u%HZta1EquwjD?~;MdhyPkb^VtRoy%i%9&T=mW8)PC!Zu4MbJOLPD^f@YP7D zI1pYZATRz7RKC#CuV)!={;Tv<-Fe9RIzi|W7uXT5>V_{(L?Wfy>(bJ@AKR3V4_d3t zWFfEsfr@aQ@FmKnI~IQ{@)HK%#FyFe5cMSiC?=3ODxfP50awYx+%`~o(}Vw`MR2b| z{W(mnCZ~BCJb;6%Tkl(Df?iiw-w)EI9Y^4j-$0FE`|9Thl^a{o@j)!u$fS{gJpOx~ zZEfVfGdq7HH{pa{wWHyJ5+2F++?f2-(x7GJMX*@Rm?1OPjd(#1k4Cd=8ebv+jsRqBx&=gaH@ayfiyuSu&gbJsb&JY6W8Vz(PhHPxid3LK$U?0j`G@C zG7xdNHK)Bh`C3Kf)RBhODsm%0h-g=M<01AKs0sfH?$7Y-6hUQ$!VnQefrf!~EmH5` zQ=HWW^@@uJzxP|3vN4RoIHg^3ZQP35Pagyi|aWrtf$q21ADBk4zSP47?*B&w{?=+Rl)y9|5S z_XyY;_F4K$4_zfyp6!=(tqlrU+K-ti&e``quEq}_4Uo$w{>JOdTa_O>j0Kw;?pA2< zqRy12!RsHgh35*bDn!`|?`|j}fQ20A8xRiX0#mE#`k1U>;ZHFsuT2$8h|4v^(cUcfo$l zQr26e8EvRJYR`|wUv?@mD?vp3+^UV^=pYXM<)>WhR)srIxkDh+kgDf4xB20c@vb-KsJ@R-;kD$wlM2zc15w?a?2Ug^cfx*E!x*r&6Rrefs{m- zowcIM$kvYkLvTcD)xk{t`IFNYaA$AYUX!Cf!Y^^($dn3qU6N}s_-sR2VB2+M|#85!c0tU=E^OAS>6IW0wDwZ zLZlQF;1BXL2gVZ)XgVa8zufEp7LS?%JBeJJNWje+oSHN;v9x&5VY?+GBR#|uuQ=O} zR*P@Mcf9+Iib37R(Fkj>Sjc`bA_yQFqOBgvX?*ad=bdNJi7Xls$0yW0X_wdv57=StyMlu{A@=NOW8}8@-G43PaIENJKY0qD;wF^DqNzB&Kj`=6)gl%AV35z z2HjhBL;Mh?K=MLjg_xW?4D!GbP7bQt1-9tFKpgq^#$!OXhu*CiP$k)h{-f{p5RBBA z-8!fYZS-iBCt^P@y-HSWyDB0(@fjOp?J+=Y)(*!FlKM=KhD7Zf`EFl==fj~s2iv6$ ztZkf#{2rQ(9iW{?93QAAm`-A}DiSMx2KI>2rw}(r1cfgq3Wf}z<;Z_QAb%3CE%Fo7 zvHzu!Mw*Vm!_tCEzCv^9zlC71k}{6pJ<`kJiPOYUx3MiQr3Zz6qE?_3gvvp33dS)Q zb7SEW3-p6rCnS>s!HCQc;!y$pmG6b1T0y$4@T%ReYav08pln7CSI|nMqmWV#$wERQ zGck}sa4`H}F6r}UIq(8pK_Q%4pxIu9$A7P%jN_ohzGfsy767=Nopg^_>=I-~YaVxP zsrp`iT%-_y3`_r6=M&=co)1+aTMnb+?DhOfDE`mKR{bcQT1DTD+Ot{CxD&olAsx7CZQ5VMXn~KD#Mu^nd#~X(el8Ud`I|(o8m} zIj$GE>N)t?Isfs-i|={NFZix8v$uJ=7eiM4*WpfHCk4Qve|~AU|NBX2$o6+d+FYH? zsc`47srdZ`V~E$P2g7O0W5}!e*4mbvh2RtJ!p6T3Jf#A;tiY97ufve8=M(@K0GiNz zWXJeVaE5A?re1b%7Q|-2cR-ZLtCugMabQL)*fDH9pr_moX@;R{@5F$H@~(A^{9o^; z=GN(-9qr$fJ0lxlQLLDi`0@s!1P>Ib?P;5wb5%lWc?0kRa23UmcQ4c(UlV4DEz_^f!VtW<~9(%TFYNt=<}a# z^snz8;w|@s#D2`gwI`fcQqW~h%8AIMzN2=(%jI0{U2k|1Ys1M)9rE6#` zQPo20ws&W$0Xtf(ink9s$_x{T-%BjKmM?hld41OK-?6EpZ}|vjt%jC2Fb%OjsJRB< zf6PMR*DqJ|(+CZ&a-w4rf-4^S2|qfts|lPs^PfK-*@)4}ZagJDmzQrVmTJA@_2p{j zA9#`Im5$013tl8Z*p=KRK(JU%*4_gQlMZq+WT5==0MVN0lh$#A71E$tQmHD|m1Mk# ze;xN3F=m4!cuEuwCzR_S0?PuIy#kNE+{r2K{wZP^I^qbjQ)0v}*xhZnYQUIrTL~O# z6nB(<%PT2y>D~r;@6KWm7*sbUG6xdu9c}fg7y6PT5vjQsT&kdu=ca*PL~7fn)r^OiXIn9{5r4x|nr_YW z^s?{%2v!u;yw&;!Qn3x7k5iI`7CJkRY{)_$DUwfTDUT2Q-N) zH?JHlN1ld{rpEQpw}*($9ipyGs6I;VeEZ2oZ#eenPo_+>n->#vb}vu^0)mZPrDi!J zccjH|*CM!S!Y9uBXxXvxb)5%HM$FS794$L2i&>+E7pnS(*X*h#-Y4CH<~#y_BBRwxqju%sVR*AX=V}q)I#mSP6IeWAh5;$}@?64jC_@=u z|2fu{-dzH9j+FV&e9!axgKqrWS2r*{hC|Dtm;C&BF#`w3W;&)BAAgRj)x;1=UM=vR z9;HCi+qX=D3kH4?A98<~IW*leu50`f;QV3{BjoFK7M4VswsDO!cg4NNe2AiZ`_|m` zq$kBOYhUYpQ`aj0)1ua0szMs-(;Vv^B39Wl%BU>S=^2b7d@dMwwz;e-ib8eX=B4b} zS+>L>!~A;QY6vs@zI>5K7)8*ANg)8=*OzTmgi!PaKAl)lMhk;ocw`{x`30sx_DToZ zWY|g6Fa;WiEJS`JzuE;8^Wj4U3`*dVE~FZ!I=MUZed^)P&4t-igxEzS3HF(yNT9Ta z^hNkT?K&lhG2NK1k91p|ex+bk=jp8HQTzZo2?)f`0$%5{-HM!F7sX->iEV;x*Cq938|2RI(b}*Q5?p4AG3Km%lGG=TKXN$(-<5*{ zpAY{Osp>J-(_G=)ED zzUwkv>?X(fFe~ci*L(M5six40fHo?Kjta_t!@_45_Duiwo9@1^Ut9BwVXcK>mDwj` zJj}gP^(bAc8ow`Z%Oz z?IqyNhH{PhD;QjmxL@#*e0<13*9*oEm^iEgp9?HNWiIkTCnL1MK+e6dzWH2zk%I^8 z6D&GPa|OGo;;&zGzh8gVrlh^C#JyKPJ$Ct+hPYOBtrj}0=~AHulVu~xqLwk9 z223ZX4wK}!K54>f*s>pVF>~jaBMgnItJAML+os~hhC&?ca-zL!$|V%|Mmr2H%ulphx8k< zcn+f&q>TvqnOOMvGGIvndn5B#7)JaSfUEx%9s?Uh_Z_fM-m41X!0Y^V>rHf)EsUhd&Nl1VrLd^-`t#+{;c;y9$t4_x z%7Ii};yU{3q-4+-PFlR-jLIQ#xQazMQOe0F;JS6~y5ie_z15j!C{wq0)wrFOACfX? z7G7nv!Bcy2d3iR-)uiX%%~e@&ebdGi$I`x*cEYyTBigp@1pM%k5WVrw zmD~ywTYBW-Pl4$}RYxRrCDYF*Q+_b4Ong$(pq^BjE4dS0@T{J4#@8q&m9I(dhyL7H zAFWH^&PO7~Xgy8h zg|8}Ae*RM2viyML;0eFq)|X=1mnTI&V`FKJku;{_wIMSOUz)=sN#uHpBn$%aJ!~nR z=buq#e`Iwk%V=ngy-eu#qy?*Ich~iOs^G0IB}$r#=AT$vbLme%5vH_Ap}XL}e-EB- zGLWFH3$d!h%H`N+i8y{$;)egUNB7;*^;eVv?)1M?@K!{vHdDg03Gvt1O0u;xiEG_(%QTzO1Q z`6(}nvBJJ@jsrHOsh?h|_M{Xn%opz7wRmtr8Il}oPMUNe%@xLi-T&B^ug=P}q15X-FjIzr_f-)g116UDQ_ZTSX)FTtm!0_Woei!?f6d2qsL69g;B zL{qZIdvTI6>$x9S3XDrvbC!zIOA`5(^4`X0{=hu1m?+-S25o!-=5;$|xhsrsG!hp< z`PNuS_`93E?(91pR^RpCzpam!SwHo;SoR7VcZDOg<|7*2 z8b?crftPmK9@mo_OCld6gz^LEV+8gWIp4ycSGR86)4tmsm4xcjCMDCeRqFxp?~5=S6dm-&S}71uzF1 z*i+ZJAHhv9Unc5B<>_PnkraotKWS-$A< zhynLOEP4F>E0qU(U}Y6|EK=1WoGbg@*Qfk#BM`Tv++4*>?@EJFOABdu=j1ngNOt4( znZ)z=INAwrjyV=P*QegSapKT}H!@@?knpjtprHNi%df`(?8z__v75O=8aZ5o6qw`1 zW=eK90Uh_eUhEf7jek{cy(|E#sNRg`dbmSgxZ@TZ;ePE)5Rz3);qFP92>7*FNDs8( z=W9|rI%B7eoA*peFHIpn{y&Rv<`r!621Mwqt=q7EpjC$W`NcKY8r-inpS7xcBblkn zF^GZ6T#nYIM-Sb0Ev$6=!yiOY(|o|N6!b1j3Rs*eVy!sFa7d)3rMc52(wkSQU_`aTpHLsJ%vh*ZB$hdu+-Mkm7q))+@^ua;I2(-z zGVYny-d!Miz#+kw{*JjF-fyDZWYCO7xllmJ_iN8d7{o&e*R#G6q@KJlzc?LO*KXa{ z{dR1{?4L5+z7H@KTq7uyI4R#Hows#4GWWe`yvN3x&bOx_J3xeH_FF9rYaV6X+2H9w zv(}SbNrTqY0-* zmD)g`+^pncdFXerVJow~f2$sb`<6WTtNuJtxY|>cqDRbaW#eqgyM^^0|=A%S;wntsF{hJNP z`0v)oZf$V%^N_2*Q;AU&NQKZ7Z7K@u{Xen~Iysrl`9$hPwohChB;oNO;3+)(xP6C# zRfrPmuCR$7K$&5Lj7&P8GBWw(#(CU&%UvDxyr+{g#GS^sxZ8;aExVf#gcB2~a^cIc zv4lHd!Bl^T@b|@>rBvH%8FwPfUb^wxzk`7#kuYM1XZm=oKc}87=jrk0-hyof&;UZq zzYi9w7|<|5e)q4@vM9x;6d>`3grOI|z=<#*=L-`bQAlXRA28E?yi?!in zbRqa_mr&$$>jBTF@k^egLFirXkPSEgCGXGXaa{qLF{js1u*kLd=9K4GTTk!J*Bymq zDde`47CKt}K?(1#Tt?*-Sld;J!5}U0E(YR$w7^`0MoM~4$!9AGMO!*b)Pbxr4ng|K zY3H>c`ZA%>CnCOwS0b<@nGTZKoQ}t!b0RxX+T1OROAYWx)7P&L z9?JZhZ^t306QBhfyJ;nQtE3A(eOdIgp(H9_7IPgy)$F$$olJ6=GM}rgh+KEiG;c~# zk!f?fQ<;nQs-@n`1bV&1?#kDEH%z}*YDTz^6kp_NlS1D;sN{Iom@*>dfz5G65Er={^t~HtV@V1 zt&(xiZWY5awv;<*VSy>IMK$CK@lJ^ME(#U26t#Gh`Vpx;H{|EY#!!RI?lPbKI8!3x zEkg#4Qt*#Mr<4Gaq><61fC*c{bqGoahn@8+1FZwfzszqFOSzmclQp>Zz0U&Q63iFH znQxEJMLmTlAt&lbsVx5J?Td8@d2GYzsH=_D{Px}la~>+OU^Z8GyiCdKW&F!JIdhN2xFil_>Rz4Fz%ivrs^#JzlH$u9-X2Y@qW8 zXLnRYyT`0--FqZ+$yBnX1y^c_+Ss>%Ce^n1>w|YkLCrjdZ zYL>K{`C(7o!(ou1+`=jyOWN|u_U><CNjw7l0ntHT1N=L$z$%q@qA2E*h>d9X^F3 zmIiA>P*s8`0WnB-apXXe0WD1-I8l@E3P9Ta4CKHdYVWzNrmBj}aD~Vqxh%|!7iZhT zi4jG$-XuPuo5<;_#H?qOY`J|fq&t*R79Toxh+JoNq~7|mAmlE9xIM8h0W3Xt=g*{J z9<)VcTTlS88b4xz?Vk@GEVmwfUM)@tgYsVZKCO(OYY#t0d2oic>)!S~7X=QHxwBn= z{d+Ku6qqVpfohQkGeG{4J)}+Ce3^Z1*(e<0@?Us`Y@%J;F)ZH%IWpTcl0B&E!S!td zjj@glxuatg&03g&ti01NZ@g!+yUi}j1Wi^(vY*%OwyHy^ zqrI2;)Wv5KHSR8BR zT1!KHkDZ;WO*@0=5K+iygHOAXLRRRiJso|{r=9e zWK{|PsnG=TZLc7(S9U~~k`_*A2J$B3I6eRR3sz|i>|WA}N33f1^{zalgYsGGwHIyE z={HG&eBMrH*cEV((mQ-5-9Bn1()%&*bht&oEr9c#irxCFi_iXB!56a(e(|^&eCJ68$Bqi;vi+IJ@WiV`tebY74WBBi#A)2LNJV`j}v{1FmlC*f4F~8@+}rW?_AwG zT=uRv_cA$KuVv3(8M5L5A$Su=C!^1tpwmtWJ{>UcbAHPQ;}(Rnz)Y;cb|2uMU2CHuC;)L#uCCi4(h5BQTk@P8vfHgMqsFP8wEi)czCp=+EotDT>V3s z3FR=>cK>D6mooAqOIF_8C)Yl=Uip@~K3ZyEXC!d_0!W1X-uXMcqTG}0#!kf3$ijx^ zh$hz*(BnV-B%68HMxO^PDqM6&8UU&jx+VR_VU-oHeUrQG$LNWW1dvcb=ebF7#k&z9=>_TW^^ zWX0{S4<5>}1;~uV(0?WfjZ?flIZCV1jAYDvJXw&_`8`pw)A#oc%WevPe;zF*NnZGy z$Pbu2+HHGnWK+VsEL8NG&mgpu*`V_bqSQWS5uP=~B>Y^&rJ|yUv55bne5~8x<-@m# zuVkr})}R_nI9<=#G>ku7G43u*D?P*uLr<2{Y%9$jR8`Z**l3Oj@L+T_*m)FUVlW^q zcBW#L`2Nv8tVIYTP+`+Urdl8{e#An2Yq)WONw~8mI31uyG`jaeUU=9p@0&!#zV-vX z^9SGnnXeEZnQ_-(U|!Vr0eSpwLYW?%ZuxUQu|2oqZd?ao$miHrgtbbi8DG1n;io=4tpVb*e zVyzw^H&#NaS?S7j*|i6k$Epia$q%iOX-KX@JUli7uS|cO zon&=WSMw`hPb{|0nl8M?!h#8p+y=@9#a=p5Zys3U;h^&Yas%`r(m=ijWD%Sah#jJOdljt@koFbG=bXLN>;dmzd&Nfh#b&9D=kDY2 z@?}tmB#hx;(Z7^6Hcsopd34HA8vi93>v_V_a-lA_jg=`$*iF1Rf^>e zWMI2b+YNLyB$6!l4-F;wS)nHBqFmOJf4uM!Ymu{jz!lGW6??M5@2h!yKP&-@O_t?@ zytclLf4h)#)* zDRm0O4iahJP7oE`cjL66AFkvUfFA9S@miYNk<$2h^4-QXo-#+D#U@3hPPrcWB$gbe znHXUFvAz-Ldj2&0^vu$t_iFa#K+3(?fz~S*PH+zj*(>c?YlEG-@gC%mC&6O_vHQw5 zd+DHS>ksrx$S~DvKJD2<0}JZPd~?> z1C8yqn>V}GeCg=uoRO|YK-R!^Pa&gry*ICBvEkH;m-LX}<%$m7c`$rW)r!AXaB+5) z)Sn!&$hIHfbtqd;s!2DF0k7boS0ZE7+8w5g1y~B}v0~{X)2;jWM~mj1?^GB*IOU$i zbXi}uyvSK~iunt=Zg5YvJZ}vxnL96(-JHgUWle{g1?47`Acr#qVnKm{QptAz9>vU7 z#Uny(%g6}oWZ@U((?_}Al4~U$mw}8&BW+20UCpki%a*tb&o3@+OoregE}a-p)fqIi zGWWv6*t!%rJ-3Y2b8aczKCm%os_baLk0EwjZ$E>nI*l2M)zO-D#=4^~lx-btC{#v9 zW;E>uoP&iu%-irirjZ9O(2k6jZ{*4T(46or9)nk`02VDs#lZaZjdX&v0rNH54-^Wp zBZ8UBs|_Cn^0Lz?Smy%#n*$c7xZ$JBi(#qJtT;s`HoNCze7nasqcic)j|2Q4;s2v- zvAcPvkKH%A6e=f>*7g)bpk>wF&6`FZ(F{;L6x{5OxFrL0+`&n#GVw&;Hr z1#zxb)ea99D?h+WIpyIG^M>lS2V(*Bj*w0RLpM)*o`fW>*y_D2PKhokFCTh#=kizf zsmE&Fne->rbJn3H#+Y@-!Ma=q7}s{YvM`O#kBY{v>i7C;j1MIy_*V5`9hjP#5t5Kx zf@M*Lw5-rk=saPxagmWYV5%>e!dthm^Hio1}g#aeoMZf?-dgRdw?bUXjDAEB5_0LW>~ zNkS6i_GTb&Y@4}`jO#YexdV){my$wXSzVpm*uYOz7%}mi0cC(etr+1<@>f&Vq1x~M zVG*{cLaX%AoB@^}n^9QDn$@)xj4 zAd*o2!J~UELOPZVDOEuMd>K96<8^H=h}zPyJ-y9_hx2^8 za8`0=^6ZzSq7+=;cEcx}BLwK&{zxjymoNH}vD4q&={i864u zasjgBj`7keTqPm3M#VzvI2(7OFVX_{9~wKpl3qQ^t;i-^xe%FiIU1gKNi6c8Uq2^cSvDC3ZCbz~@BD z1pmA=-vk%_j~jE(=)VEM$~ay4Nn2J7egmFhknruFS!jtO;v2{-)9PLIrH_m9Z! zacudCV=q|0tZVHX(u9eexOzV|-vJi^Nr3_Z7uQN$>6?GBS)plC?j7GS@Lq3kI3l;! zQ@QP6*8t#B&&hg8m2w8aw@W~I2drTL_0!`p9trF4ZGxM4PYSf&bO4n58w-Zq9R8bg zb{I+3f6w}U)50l^ETte{UknZoj(D&+17z^))*%lAD!>;_H*8ov1}@kitQj=7Fk@NJ zEG^xJ-PGIv({#yzrrSusaD@r<$LVzSS8$L3;oo2Oj#&Tg-vn+?{{pT3{k^Kh|A6ZL zj6d=S{(mF>i2n21VLS~C|1X#KC3dCKiy@gUE&JvY=(a0Q44R~Vjc+<;zYg>+qDB253?CqS>3C&kFXrV8t{iMsc_k3|ELfPJ_FVM*U>!W%q3sh0fS>E$q!NT>FRiG}U;1Z9A&=q@o5@_8OJ1E0ye#P&&HZ{;Mxv|C04(o=Tq^2vaSH!od^FJqH zPw(5Sr!Q{Hr>KDon|Kcv)VcsDSqI=kkgFMY7>#_S&N-d_JwcY4w_@b5rfqa^y0e_q zzQiW=$(ka~iMpmHy6nBfvyKQnA4op{$!h?meh{2}H8G(B*!cUA8EI*++e1S`xlI{B z#baY*1HR{K)Fse62faQ6UP#Qq64E9HzTM#IQ<86l2l1ycB3c@BK8_ICPpwRx^wK#m4zF`9d$oNIyk(k2mL*%`LjVKOSElHpxffpsbgBuc&3g z^p`#{H~yaZ%ktw`hSJgQ+0^dG+7B(-R`0)!hzOYBLs~FEHv!69VC@;`{W~3R_amhW zgfNzzTnl<1<&JAyre>hTGQ|e%83ZD)<+8#lr4Fu+UghQGCGAyihlrfgRSrF4=(!*m z8ep>lQtTB-A^ZepuwH8f2sk2LP9B@7vkHxRWV@Lz`%nkxRS;x)C57~$ZUH<2n5V`R)+oHQb{82t3u!l3t1MZjaf zcohSO%s+;Gtv^dOR|gGrnSzVpRu~zzt2A7NpUp~#TP!ex#UrAZj#yTj_hF$BD_u}v z|Ls}}B&<8x`im-{)eZcDz?Gv}?rQwQ6!5jQK-B=(3>-pz!on^iqBa1|0E`lx+h~Zq zF_I)%ir`rQPKBtm|qSEqVilKo43I(l$2Gp5{e^_>d%X~mIy7;ng`2grUh*{h{ zwDWMzh0Q>u3ng4R6_o*Vb&x=50)~p5y80zx!h~D6JbzwTavTYyyvrcTprax6#6ZUIUX&>0EmOAsqJr5EE~I8WtJZwQUE2n5!#e! zs3>ObrWkf3P|o{Sw3?{uoBRMONpN>+8aeQ=AQ=S^FzVeG<7j%9u!x9rAV`%z$UXEf zKc5|`nZU9MI%e(X_5xZN2r|8X|K6-<6lO!~0mw`s;PQO;&X4?r!bj`qptcCy^IzWw z@BZhM_vb4IFf__@j&@<)C-us8bdtg$7h;~(^VU4Win{mXv~|q7Q79szJyx4o_t{`r zvPs}RFIZ-50MtgrN+Etr@CKyh z;%~p6p*-C?&p{Gg;tswKC99H@Zd-Q`L8=W5H6CkeF~u;weaH*@2h2JURWvuX|JU3` z-X%&(bnX}{SYBd`W2zrF%my?Y8Rt8UdDK>cNg!cqvW-M67hb*dOng-l3E&6k`*SEE zLjp?`Y!nDh)x08RpMd?li>vMH*IcI!z19NoW}W=#IF@JZ2Due-$mLY-kU$skYUKl4je)bXpBMQ~Jp;7H#S#km!eZ$W2(Gg<40pO~Tt;Nf}l7_DPu#_iARCHS8O{qYv=}* zsT3G{vI22{QEiKn;EprG&Ab1QzkbeCyyuSKEGu61ku5o|@U%)rh?*v1KwV?>J>CIi z$W8iDIJK~)99c$^bv|14o})uQKIAYQi3Tb&LN0}Va~)jjUHQ^bc&i7eC|T|JqnYXH z2?*Yz`RqUclRv>^(DZ@KA88r_Y*=Wta(D>B$wd}1KWs5KH+foWNR^rz8;OA-+Z@pr zWwWB@9@Li6dks#pvrVsvy+yoThbld?dh?UGAYiJMzwxM%8)ogsI24@Vu3?>^JY`5L zHU{)VRm(4hW&%hY+~wGb)UCi*wbL4UnW#sD_n@c#)*OVeE&z06$|WIAT%1#} zH!O@E^;lWi&#GGRLSdQchZL;Gb!-mR?$uPaFwa|#(WR5W(`{BkYn-SdVMxeXvj!|HzI zWagN34^DMVY(wnEor(E*f9`SDE2rDqr{_Qo)6CH?ZJ7SfotF|xc@EtEX;*H8$}|vs z%BW-ck;U8xod0-l9Plqgc|Id1-qV+UrDBRmj;vMg8UcqCDpG%89D@PO0*FXvjC-!o zGTk%p)JkLPyt&=3imCy~boekwZ->u?D~LV?bPZZ7BjGGX)quM(8p^QP>gP9mE1j9I zih8%Bp^d6*rtzUf2CBB8^ZCYkmQeu!k&P$f02kLOC7=>jRJ``(*_TP~AF^2PX`esW z0eeQrikYx2Q#zLI+_?501tF6LUVkNM=v7s(SAHT3s;nfF45biJRE%g{i5R?LZ25$a(V+dknch$pdcva_*2y0flvsDeZ*&H z<0vXBf*4i90INPL{12N_o1bS;C~m6}meQ3r;ZrPTW-A+V*qgE3T`}SOZ-@uIo!c1U zAjOklHGYzo)eD~?W8Mr)`liGymSGJ1E^ijXh8t(Cut=u6)4jPpaTpQ41?a7K0S`$Sy>(Bhaz*e z9Pw30T*s?~r!Ni;oE4N56Jb8h_g7aN#K7g&gVf|T$5kSWVi>`~LK4s#4osFk>pPPy z6L+H2{soOgP@&hzirK12`Vx$Yt&L3+tOOg7;zQl7c0YzU7eJBaE*$wyUn|Ximrd?t zjUhUKRR@aa91; zckN2XASOExbfTQB`3e4szK{8=FSCHt1*EO zLT+VAWl}v0>mvz8DSuAEz8sHK#q=TI$Ca@IFarwxc+f@z#RNdsqCA1u!$Cqm_5m^| zo%R9n3CG{~?gj>3-k?tcFbo@7&TD`x`C@!1iWi8)xjomWz|pR-p*1~Jh5nwll+6Wm z3m4=F45=jV8W=EEpiln%`68sM)~nskX_~M+28P?@>?&K9i@@-5VtV@4?Qv0Y18i@M z{p+xC!eFei)smu+>R4GN+$+gBD@>p3A;9}**m~7c2J!gGUbAsU$?`c6(p^dz2BU}i zHs(qn$1(Ry;J;__y?zH&WOcX>JG4)J5rUlYd#q)u#Z{-(*Vhk!&70cbXs2D_-<_aCidiGiS$D7 zlj#}F#))RXnvM<}5V7=4O(ld~TkwI^2(!KIi7V~2t&0Gcb$qMEbDS-46O-G&wuL-k zu2Ip^k)kF>QgJ!nsrB^tKP-9(BP@z1sa$uN9z=67IUj+@=K3j@IOH=TA5x)~Zlli# zu*6&%rqwqOl=s`&J3070z*&yG=gOj`k6i)yK}>Og>*TEnuf1rl#Nqg@44rinzp~JoA1wO*R@bQ_Z*1 z(RjSC+f5W(8yhHExf#BFgBgT^l(kg77eCVjJWL<(AFW3K(VN;Hul9vrbj9JghbZ{x z-8(j4b?NUB_!EWDSYVNGU;_8lPy3F>t-hXXk?g(wMK#a-0RD`jJKgf;F|4UVHEckJ z+l-C!JHCDs>jir@P^a)1cEUiCVQCn!0n0<%0ekK}X7z10C7!7k06+rhN27t56U6xf$30l6nq}T+>qnap-`L-7GxumOL`R*R z=p#{4E%VYBlN{%NSW)3<{^Ewg}QG*8%G8`#;6iVjNf<@)=-fA{Pj zcW0=IYMY7XeMSKGQP?O%n>0l>&g%+Yi2msbGm2w$?j4Iw;-`kdbq}}WA`C1d&(t`s z(?P1YGIEBWPEA0`S8Ro~PoLi(N=+{$ra7@;9+3kw*4L?W^n zFw!r3B`08xO$Mf+fJ^g*)=VnM4pf=N&rS2aRB04mfPsCx2=f3%VJTbcpr@49` z14>X$UksT+W<;C7oBV9AqT=4{04pN(0ka4%m79xe>b-vRV@*XvhxbS(-kYHeHOdWy zXuxLppggu4BH{Wg^>Lm>azO}g`t*2w4QOU$ZOWOiw?3v-^78TN{d#-*{@$LxMy0c& zt2H|6`Tl-OM=Si+wh03&8df+URcCu!?pKfyn{<5v0wl?~brK9A2-6@MD=rCc+zWkL zZ1|bn3!d1?Nt0I>ip8k~4}s->D;j<0Mw=+v?|FibM{=-45VZu)1tR|ODO+&xVdXUz z^KjXmV}32Yxv_l>omVYdxff5UU5#0p+Qs8BK zf0&NzzuKx{3p>Su_~p%!;YEN=BFr9b_x)tK#r^DwJ_LP!M9Qj2{icwUi%YLRTh^NC zCOT!FhHFx2eetz z(^FYN)-`-MGb5wEUow;mx{H&{6`q-yK_wtkRlaf)B^}2~4k8}>nOgZ69`0+ML~I7P zfL;>}b;Y73hXAZr1GcjmA$}h#1*=X^D)ux}x);Df24i|>CtARS4H!8agQ;;;%l!!m zry(<@QwJ{hvAVk17fm>828@n|MlaDdAyNW@Af&xFy2y!C0^rnqtf^_?FbHLkr&c9P z<2u4FJ6P_A@5d)v<2U^Ge^SaJ)rg&rVXK79OlfoVj9w~E&TE~*#b<$%i+N~&3x|xy zv#F`cK^Q~4uMbQ^7(Hxwn?UXcyeH&TRWHQPY$g^J5xDHG;&-;@YWqzs53=i(b8>PH zY`4NpPAm(~JzUKj2-8t;gD479;E5(fH8c=Fzg0jS|E+E0WT{43$TQpP=4N=^&On8?|6 z`=zlOkhrDZQUA?C$2r{f0823(9r$g?M{!x5)dyi_@_SATKWG3c1XBP#1?n5*5b4);T3t<% zeIEkU05I|UQvc%1@(N((zf)khZFuwH%>1qt<;Dm*(|60>( zn!YW+J`>dn^47)c`|to7zg|;W&(NL((SyCiY)xZxb03-1ddNz_Q0BDZQ)@W>X;k&p zf>CU(M|JrH5Px0v7t;YpI|9%?99}*G7;G83i+Ctos*oFtYlHPwjdEW|1qz+C08Hgt z<;V;HfX>O$Isel(ZB~zyGjF4~d;1t6AVD5cGv($DJ2GjV)>EQT(Bej}l8VK; zLXNafC`*&{0)PsIk2_B%g6+ZHq*M6kO7Y2+QqXM^8ZRe|VltfE7Cu5ldq4vv1yXHt zp6>*Hhh9LRBve(MT@qe{Hy~F>K5&z5&RGs0LOMikH|g^2yYd+H9v&WGWQ{$udnWQM z)Z28BVh46Oq`GOq8;9cqIu04P!~Mp*mv@w&JbCrw$K|cH z@$qRP^(&npS8GA zKo<+M`gE&C^#chh>4u>#+rciS=X{zmlD2{_aPzZH!O))WRGSqoZK(L9>6-^1o-U8N zXeij92(R~hPDCf78^1WiN3}vb^-_e|xKi!~;aldCL(Yf49+baRiCl4KXSH5AJnq}= zr%zE&d#@H#PMRs6V&HU}m5}&qg`$7b3$GZKw1t-K-Se^CA4*v#u+R^jg(w8pHD;d) z&Hdsvn%)#zlO>^|dnKvi`oTbj^LOn;zKo~rjJP;?7vT0--JBVVtcC+YLJS!NWAaJd zRnSyK0mPQbNG6W!z}uxWwi1y-+FDt9SyPjc1{es9lK9#KN3QE2wv;6CGI48!_w5IU zT4;wsAr&gGN9fOH+iM}-2Zj?Khuy7?sK}|B6Afu1VG3OPwK2)2qCBAn zDi!$=Bq8&keiQ8zth)1n8jf~r2U~(vkAnrepp~f&e@tVJxsCODH+(4VfsCR)Xu;|^ zgp4p(Bg$Y(6+0w)dMV(LHMud)5n6crtPP|~6EQ}yB9070%1}rO*mhdZYo4HfCaRl2 z0uCQ9PbX@>k9}(bXF^uzEn^g3z7x@E_s{BmY-lP%^BbN&pl(*I;t>u z&sU& z;(AQ2u3FlbLcM+Zm*w{byR@vV2u7DQ7e|4O>F~YHIOQZb3ITkBMwLbgBCiE@3$;zyq}0P?d>ojC_V&3(+&yt8TXf-@ zF58PQLERMUXSc)lMb}}^=10_)`TJf`P(xAV`+_CNm(}<77B)Jd#bCVw->jUfgNvO4 zf|ro@sZWJoikzIJK?vbE?r|RW44;>Rv>2Mii~Tvm2hPt`6|2DmA#et{0~qjfM-Sf& zWe*PGb;H11SsR-Ty>*Q5WMo|Tc`+d?oO&&d0*6wR(cEl20pdU7ywd~@0$ty~>+GUJ z;3D6DpoDor&hOyAi}L!821$@*%K6pnWsX)=O+J|%zCK+2P?!i8k%m-;h(`ytGdDZc zB}v(MGNJ*HwKIrno6AmS*MVrH7w@xK|9;2$`NtL2+iuh3CnV4b^M$ztE{{CZcqnn% zcRmpe;n1#l1wht>yganv;9#Y-Ic06~I{0(uJK5IOoNx{+X~7SQ0f#h?(-X{#rX508 zh(YqvN0%r^X29&T zb#QR{i?6Q)h8tDB}dfjnS<78&VRq4jwziNCRtGR=6>+U#mV`R;B?S0x}Xzn#-HLsQ`@y z^G0#*=iKFQ$KNbCinkfCfjt8{q=f^OF5J%Bi!<|!U7E1A?n3SX>~fn|l%NBPaT(J> zhSwO+d1u*VYaePs`XhTAEyuqeUM0LX3BCq(&#F(oTiXecA&Yw-qz-~1!C>8SPSb7k z8#k;*Phf2!N}RzSZps?7v$Gh$@PP(ok}_0JGcy}{DG}o@zY@?=D7Idhy0?c-q;qxp zb%p6Q*u*B^TUFJXF=#aoRaXQHpDa}KX<*=ZTFi-Tz?u#qHm_=Ft%X(}3mn@pQAPh4 zfMSOF*JP%~`GV}KM3R?MMk9)S#(rh!8dN2`XOEsEF%e|)09%Ssrf;-I?BP5m&scB0 zx3b=BdbG7-rfL1>Ve&SK;o3LPvw#p~n{)b2 zA&qZu%jX%kJ+)i-aSm5_gb-y7I*&@HwWDgF*#WT4TTFajCfzCaB{Fo!*Fzv4A%Qsj z={m-sLT{m&O0mNodXU0kuH0e+7kYJb!bguDrRC)K0b%EItQ!Gqcgm!!$H7eqW`Z_; z($#pp7Oom8#)YGZz)z+Whx~X%Bn}>4 zPRXEg@FWItSJnreAL|o^8QEg?;a~}fJB>Ttw*n<@Wc-ncXqWT{BA{z# zPkmXdI>ym8@}z_q-+E#K4Xf(CS4w*N1;nHhj5t^=kDS6S z8X(w!7N3*NAY11CW*le?20h=LBR!X8ch;OA*B4TCWV?oVlgSs0_=WcIK|ku9AJgJk z5`W0doc>y@p!L$=l{iDApGKF&K0w1B3y0_xb5%?2K>>%f{|8U#bWcrqq3ab9!yJ@; z$3a}G?H&-NrRF<$;R5vd8%v+j7@L~cvF95Vx4HjzC4FPx^oraMP75B_z1*Y>DC|D9 zTkArfoD3~)D?*T223{wR=^+%;LrJQiOjzE5;w0dMevUex2F6*9ih?JNMp?<1qFdSC4FIg61D@D)bP>BT`E?OhMWJeu@^Hn_n9t2;kjoFp43-foi6m3zQ7zr+(RqnboceEZRuJYKr=_RYzBqSjL&d3NkPWGHtgmAl7_QW@ zceY0wG=6tH+Ot90DJlg{tdPermxeq9Z40ogAUio=iFLJ2Y`os+@81k!7`e9v$ldulcd4)m8Zl0umTza_QJaSM}VLky9AsAf1Sd z2tQ&zmt{j0w5xp^gW{S`E4OKta%39QTqUxBob zQLTcg(s`%u z#SV6fb0H9v#6&6-=n$Y{olOZ+ni`-@to=ixsD}xfeqH0K!ecJGnn;`<8ymYf>TyE% z^qVsYlqV64X<5NGLX0@s&XIQA>hgo^-@mcL^r4pXZ(I40N2d`uj*hq$C(ajP3N?02 z*P@|C^IK7HC8z#89do{tllqAy0?wZGE%wg%oG3z}fvQI%sVxxOAMIb7SXmiODFc*A z8D9}{7-$YT0|M*%VYh6a{nDYez5Tu12QLRZ+a=~9C{@CdhdphhAzXH<#_Kp5kJyAQ zsS!5%^_eQS`R-I)=zyAC)wyxjYx&TY5+EAjLuwtgeGHq6HZu%joLDpST+3$DXx`p=LyLas}+?<>N!gY4~`bj)F zd3pHT+uN{@OG1ku>K}ZHTp~!Wkr>jDLd;Xe=SHe*Mq;j{pi ze}@wG4qTTec+{1Gs#m-8_Tnju=r7-!GqaZO_avSKU{v@&J@Y?r(vtE_FmO;#hr1_S z3}%Dn$y^LU|MM+ho}-#8fAn#mD%q91gJ0C;ZF#VzA{|GuG;jKEFxW1)mTcY2bC%qb zzsM&jPs`4RQfRX1MxXiV(K|Y2RCM&+6Z7SjI_Iy;s(&)5-)YqEzY=lkTeZ%`?U!EA zR^Xl-2&T1LnFQtj!oAJNXM6L;5eAi0?;j21Se!wPR44|C4dcca2UVK>2d)Bn02>1| z=*_bBo(HrO!-~Fm+{6_g!??T;cu)3w6%8n>0#oY+8tg;k$^(PA7g-^>j|}-&_L-tY#-tMSzG5m+WD8R^Pf>^(OM4k`sr}fI=SdVl_r{1|Lk+X z06O)o-O#ACCEdn;lxA^e?9LIs`!-)i+G6nO?i#~u>}5ahV)A>nF%N=f-cNxC0H8vq z0B?tQa3E>Uy&!^w+}!U){EoO#H;1_72uG3bUxV}eovlFmS!>LF_IFsb%9^~Pi*3za zjjFzsW?uZ2f)hQx=h{xRnP^{a)kaSqTPXPfLIw<`^T%?<`}*Lxf*1#)isPxj`m^O&Qp}V^08dyL@`6E||B{DI4C!P-Ba3CKxy4QF{@JWfIEPDD z-SFnG4ZJf=SdBkaZ%jEa=2xFpQP8Li2+ZJyTX#F$nS}c$Vts)fp3jln>_tJV0-!L%Pn*5|Yx(e1G40Uv z#FI`?g(rL=*egYwA3XP1#`$cern@TLaiP>+?_J!A4=f~>xTR-MO)s(TRtpKLRaSof zOb=am`43uv<18{Cq>}LfRu{N5Lf}R)_b66?7`#m&6!wXVB1B!kaRZGNAQXI19OM9z zNx+!l!+8fXd}QFO^EUG)RzKBQLrhwk5B^XuEK;!oYgfp)P+8p;(K9?Kop=pjFWb#FF<*}JkB&?|n+2`f;N%Bc%0@trz4`bt7<^@~-@0`lD;`j8 z^?>@!b31fso%5-|_R7i0F(`xYoFA_iX40;DbwkWI{>zukppz;wjC<)4G^Wd`2L-U& z*bJfZg?tm>qH{s6N=gUw@4f7=uYyG8Ak4byfbMMftVmV$?owM|K!6AsS__>XJ!4cW zxc|ZG_FYlo^+dte8Cx)gLDbCapzx1CvoLJ&3hP3Z&OZ3-vv|MO8ybdWpZW8z_LpI^ zobOWvY3QoOw^@N_QQ}8sM(>5VLG-_3z3vj`rAuN!b%bs?;yNy{KOO$M?arrjtdCVy z0{{}){+=5bvI3Y{5@N}y8mM|qg63GM##oBZYlzl#+am9PB7~*9;D7BRX`5dF!CvF1 zxxUdhM$o@+y|%k&Z56;HXr4#r1-keXyR^roG>LRmw64iodrW>37oyp9qz1L z$ye{`=|QNQ)rX^N4V_u4`M)C?xK7~t15u>9wz*l7%=8{6)&|&|x7~*5hEUtp3w#CC zGQ&@-8AVa|L5CAXbk67B_HJZ6y1eUKyRPM?LW>V}frI&*h(0#*tU){*S@XHMECPqi z`2c>7aGh-g_da-p$bSd72sD(I+qNPrsc*V1m-&DvST*WS)OZmr0o)ak=0O0oz0Sxe zjWq_+l5bS{zypeU_`k5Cp#HrKj&+Y#3iFi5cmt=N^*1a~jB2d6ddQmRd{h4fHL)gA zE1jM+IX$4Lo05X;jIwgS!(d-%Rn^KD@;}>UVv$oxW_y?7byGQc`S8JoloZ+x$!JS+ z^Q&{vKS_jY4RXF_WO&1>F%6;e{tX4SC(iqP9okh)F^-!KPhy25{`DdNu z{O+jy=P`3$|9=&wz5k6!^w;&b)c!BOWLoEc`6ae2|4V=2B|_@?LvKJ)RkW%?e zP*TrS*`WXO#i3CDTf2H(r0=$g3D<3-#z19I$uWPNaTpHDlRdY??`To>@B+g=?S-V? z;@j3eP`=C4Ys}y>QQqn4TD`ZWlRL{RwcE5_>MkrC$4P>nA`^q9xPBirCk~yp|6YUh zCpFMYN-T$8Cvr{T$**o=zV2`K2bVtPr0@mge{q-`^f?QykoUd7^PGbBts7>cIHtPg zriEpSad2@@?W!#7rKKZAyZD#LMR*)RDg*%P`}T{Nh~jTwRwEs8%%1t~91)Lod{TzE zfq|PE32fl6(&cI2SH?N)T+h$U)SRkRDUnrocEJ32>bq-o9FLlm6#m{ivYA{`GBE$_ zjvyTnPQt<>5mn(4OG#nMrS2cEUerjtjen7hkA~{RQijqE8hg&3mq?0ZUKJe4a{cf7 z^H<9VN@BPx-t*?KvKFL!L=u zg*4g?#wvj(tn%wf@6)Gj0{;7OB~V6S$j+y}-AX(BB^l!Ap)9QfL$g9P#zzn8AWIG! zmQPneZrLGSR?-3BJFdBI<=;A9s%1$GmD#IAMLx|pJJM26R20D=22?N_3ieF1zKY2S zHT+{y5G|Y5xS*8jggw_8*ZihJApGN~oX{`|v> zsK!R{bOxdaC^M==R9s#fAG}U+9=IJpp3PA&#kf>q?mA7DzAms!Z>)I%E{#+=)+j(L z0(?Y3K#*p*>Jjod|_vWobMjspi^W+?d|OS`3jJdSqytB4Bfhl6OS)8DU<5Sy$&r<+Dm{= z5fM3ouUwKSO`&YG?nt~M8;tG!E4pI~AcnQT$NN$g@tz@TZ3}N_ zW@38bmr9qdd3XT|1XHd+Tmt}%kEHlOCJx*D=;c2e%UIr6HkO5twSM-@ySTWRCujD+ zo{WL#DI5O_ymi)}#nln*!eLQNW(lt=}xk<92ZM;>8eM`2!aTL-XMsA$Mqpyp4*Qtj8@bR_^_4CNt_`K+BimLi)F3 zjJ+G2H0Mw(cE+!})K6eB^XE<31PrYk<~rDJ1bVZ|26 zPqE*W4>S4sqwyiqqLzu}gHxL=4@Z>6uew^;Q+v!`(0-8`wW)d^f~L!aOf02tC_TTp z(pTr}HoC`UkKIV1ehzjoP3I|HuT#k12p9eFBN^u06W1$4J*?N}t4p01rfBkxiVT!n zzYfvFn$_$HEToo?muBi!}ROr1WGL@v#@v!jIyynqLyWcUrQBj>vVYGFIx z?-F*kwTG#=j)g^0RTmBbt~fR4Cx#3 z+a8Vw^GhwK$$LqBMLnx8XMA@Rj%Q+Gi2Z|tqRd?sT5h4fd13etGWdAn&fKK|A{4!9 zWL#WmTAFeBI6D-7uu%Yg;wT3QCkQSvYm_-jedzy@-}X9vF8_p`(pbn*KDB9LwECoX zKK5Ni;idikeTmK+$4iS_NH>L{c(F<^$R+25H5#9iPUsTU6h@7;hr_KqwaT{6eacd& zTTNO&7C9BFaO|Xj4EuhSI#H~8{hF9>vt`GJ(kZrMw;}}@$-|Jl27nfDr0y0TKNy_) zH8iBwY6l!>@EEu)vvm3%PPG<%9EyQZz)Al;QQKjGh(XV*wmZLgv=}ilNL0e(Tj+h+ z+=z4bIDr!O5(>91Iabb+bcH3w{_M$!8D{-seo_cHNtLj3ZrEkdM`gsZxeeq_g0u{x z^93sf_R$9&5jv*QSY?7ekA4g)XlY?kYEweNG5q#Oe`>Ps_M$>7<M34Y6#H3bRoof!6+ zQkO`!T-H;OtzUX@dXU$kv^xfO%4$AfE#;{$DQCa(PA+%$^K=B#S%DKqsI`TI*C!C~ zmj2!cyw%}4R{x;TE1@6p(h?|Jx}NafZARu{pkMiUC}0I8CSLhd%Oa;!UF}OcPb>54 z1)P_m6r=bXdsftKA3=zS^pJ9(a7i2G8Ew)%oUw>RZW3RFzlqk|4AmLgyYQ#G07#X9 z58%$Tv|zMcbq5Dv#Gj0yrtOdEf%SRf&Es>SK$6UPz^9%>_efMhfx~mQSnKE16ixap zc6Zw0KOq72u#}YM9S7P1jtbvNqF;A6hf5A_cUM+cPA)Am$V5d(CQ7KIL&}In%0&j0 zCOCgt7L9rB=C6y2ic*tP$?NMiY;W(n=;|f%SVVu(WQx-N_KrK3g%zKD>L-i+SA+1| z3){O3Dz&VPD!GrB*Flx`zLcg#K{lL129R@+vHdVu z_k@cAd2#B_w}F8dp(S5GU8$MySZ8==1=yq_(>@zcTsLZ`^M^+^8`VV1$<4msFfo>Q z=KI?A6=r&gl3;l|en-&BE}}LSBP;k4D4tYILNd0vS6}FFEt#yA{UV*{pV}GT99z17 z&|f)uJaF|!Qo!UhFtbw=U=mfwuSz{rv$c>HHi2#S6^(Dq@hp|R>+unb)yWw~7Zcvu zj`yLE4L*q6-TqYv?JSUylz|Pl=Q`i+Y;zh5W+M{lO9-=fod>_9tVn0!$efc)wzN4 zPjBA#b4AlpIA4Fv74e1KbFa?~wv2ZFPL< zxXTZlGz1tLkg{aRSE!d^yyPB&si-H4@UY*$N?bz3l(24WE&Z8dt{-7`1t)@!JnSir_~gdC8b zXy~gZrGo6Y;UVIyKB9eQhYhi*koq|Nw+JI$e&}!n2d5+onP+IC^H_3zwXUQn8NKD5 zACBc##*z3w{Ma$fKdlmu2{D-tEgO|HH$HAxetCLiqe~P47@miGcYSn%Za#kweO4Bd zrh1Lnjg`?tf&@ZBRrl44Wx^s)L~L_DI$F?ZJQJ!C(sQ=c6*%m;>v1b$-5*m@d9F%# zf#L`8m=fI~3rKWX6J3)Rd#>W_VE4&v@q23$<+E_ z5Ed3T!CfPJ8D*Q}!*~GzDDB2E&?W5^ix~8FZwiC){=oYTgWX7oMzy)eeg?j^Jw!K1 zf9pEQ^javc@Q_XCc)GbF!ms%K8k8)@PWW|fVKi;5xv?Q@YoO?OuSqt0z^0JlqNRg~ zzKh}u|CSIq>OrT1+N3#4QA5LE2iq0Gz>FtxK*AQoAPx))d^P5J?Z>3i)2H{F;``Sg zn_%l|-?7hKGP=f^Jl}93$;~vhN4}56u^lLwkCl}A7P*av!&$Iue$C|AeU)K5PEdGI zbxKirwX(r*HoJdniVAGd3r#)l6fzvg(}_Xyl=-!xTdl9i?<+$@*m2J1&!W&WCTJ_# zq0lR-h8FgW;mjSyk9@apus4EO;v=Rwk}KX}&u9=1PnWZWn*$M_wwfsiS>z#g}XMnm_65JM4eTSBd$ZghE7}fZg&(s%D8F0ev`@0@7&9id3#%3z=(oS#5 z)D*c9@T^g6@Yjg3UEL&U_TFL{gS(|c;4P}f5#VjOy1G$+%%(IS4}mZUyiCd*uybifJ*3Mp$REw%sLptTy97eSo@D0w>>N1Any>8+r5 zXj;HIbp#c#go;cJ+mD$2k2EwYoW2!b6`(e+Ung7AK7_;cb$GtA?Px}?DO?^W|5Y({ z)nN)O{<~R%NZ90qGYHoi^+8*HmwB-QYuNf>%xxd(OM`LlrUkKuoj4C67J*von42^STfSK$F6((4tJOS7b1fb}LyQJ8h`m1H&{t72}aKp<>)VqrD`>rPz zZ3L(lm$jAqoq}#DzUf!0el8Rf-aR-rGnIZNSKi(_7zFuQ!Dpa7{CU|jmY=s)=;2G4 z@MT|I4SDr_XqQ1J;A_9e%j#f(9Rj$=@q z+g6t(E1dNPg1EA>?XiNS2u2A49tby){Pn4PSKEwjrUqc}!hkG7%e}~W5fC1r2k`2J zh|fe=f|xgT3@;2+Uv<97lR1d8Uqbcv;n$DsModha71Y_lB=NL2F`3%&sM=D!8POa8Fn`6lgAzelBMZ=NMC>@awjFTZHH@H62eMS%Z$Gbm**zSfmfgGwG1 zs7nY?J`4|IaoI7KRL#F~&S3Z!Q1$hxEdmPDS<_N}OLuf6bTA)@>(3y>d_bjY(t|8(+!oHTc_E$oaL=!yW z`++-m|MK#WANI-ci_1?@kmJ*g6GCE1^pj2+^}T9$EJPa9pzD;v)X7q@_9l{HY?MUv zIo#cJIM1u=w z?FEM{9Q;D`f3N&XY*H{S5!G8iUV^e9k`P|Nx#9dcPw;gm^x&bz4BW}-Lx=kpp*&Q5 zG-L58C3{t2#Rw{LM;LoC*o(`z`cji2&S#kxDaq!$DL)tJzZ`TbncVSUk2EX&|5ZNj zA7yMem|xr-Psn&r>g>Gx%udli4SjHb1E<~9G%_gzr1$T%@E>uy9%IyiM0ECWp36|s zn%Sb9M=F7Rq2pu6R06P^T$SlhT zQ5c8nsFIOZ;me#c_e(~?hXtcWlHvv}_`5;?tR{yAIFfB~S4@+f#B^!(Bs)sFzrQcx zWOd5|DccI-L2UN-I+oX8A^!aADF~{C;7OJ(h{ONcCw)x&KnJc9l#On9d>-25-5(f+*?l~|F~#jLZze8=8Y@>npgqWvU<7#MLJVuxLHUUTiRQE zlrlIEJmi6Ch0<9bu)#_Dn78SNqoch@Z!_=~-c2=hke59Bi7{)iGHXo_hz?kkDyJR3 zIH#Avt;1z+wR{bQsy^t=QQIzsR_9&K$DTGnn}?IsES~OGPw%xDmZW8gZQ=zyGCrWO z{kfVmJFaEfG2fkKQA-Mn9s{|$=wt4O7F&zGZHtED;?q2cmIw5Z$u+SPalBT%{Q3Bx zil~|&>tM&(f(57b!08_D?_x&UD3Y|j|Isa{rgkyn0gY;3mv54*-6F@9`?NC8#)c$M zIX`I{s;Od+4I`MebK zYalI!WIKitY6MibO)h|-guw|ElanUZVA2H`%6w!SoM-nv5ctI~Qu-WfHDlH*UFawx z@OpO$k0{Jg6w81m-g7_bGYOU;jQUJ`#s%zyR*C2l~aB$p8*00qBaD@R!a>oJ%CUr}bts7*dibEi4R-HDNE090a-eSD z-)KQ;ZQbkzQv&@cb1W*l>@5hv*mmhN%hq4Z~y2u~<( zKJ5_gr?9m646QB{)OCE}|3EF^#kJ<}NKo{w1#mNDExCq%tV56hT2J+W4>}6WA9U8YW z=kQp^kzIsCqgXsS*h`G=vRiZh-7t@J{so#sY@*?O95)S;6;&EUDFx{gLht_~ zs^#0aYf*+qMn6INiN|UEIs~A9qeWUMb!RG>gh2A)05+yfR)T8S@XFy+lh52|>`1x=p3FIH7ld|6TNhtFH<^kECk z%<|)w7DjPlu(Uq(opR&LsXIA2>mjj%0)24gg&1}j2;)209YZf-VflpS;35=-U!N5r zvr^JMj>PKZ|Q=qIDxYj%QnWDQ=32@6f29sqF2y8?I5vS=}9%eSS%c#fl z^4`Ef0?{KWtaj*mT}My`usH?7bc8v^kgcCC{ddeqMfD{V5;{1i&qH4W>dcV11dsi zt2CeZ`uUv~5D>_u|2HJnvY6Aeih_cxNZ*QtgdRf)S|kXX5b!O=_Rl$oNTBx>(ES&9 z*aVV69P+#3WBfm~y>(cW{ntG@ zgn$YN7A+tuAkqj(mly~rAl==ebSqNQQqm$N(v7rIA_4-EL#If0!`Zj-eB*u3`CY$1 z&Ro~S_y9A^eSd22wbowS>RnDf{Kn_QP9ZX06b)!Qp(_72h;ktMydp~Cg+m|)N*2T~ zXji4!_)%Od(z^A}0}U0=K=9u-G{k|$tP3aI1P3*>Rz!4U096PK6r3Y%QCIO>Ud6=F zx?iI=V%=IApv#?HTqJ;IAK<=ouPYf!&SYT6q*$gRel!oDgyZHWLPIn-`E0X`|8iy+ zoGSd26#iTK)omYn?Q$UTW2X1HN%Y(l6f%ti!*6*!;ZV;6vQg;Jl!L5=z+fkcEzdbD`7gZt}xAs29;FMari;t9)C( zptx|Y!D+KtO7QnN`r~M7Y6_d4e*RUz>YniRM|XO^f7iEH^|))UQ-K%>_4W7rfqMj0 zG^Bt}1mJ|BE!i&YU{>szK)qb|HN)^0f+T)_URAGE-)Dsaum6P#Drg|dQ1yg@z;1^B zfk!UZOD3xcG!xH_sHZg*#KyN#&2Mi9fM-+?;`gTs77JiucdezyW^cpfV4Br~ID^M> zhyh0xv_pt*{l@ok*eRePHkM6O}Q z#=7q^>-U!PGdtM$0`Un+xGMn{l8YArm_dZ*Xla zwqNimdn$0azV}cx>iI3TAAhJBnSj?%QSGRURkig2?RKNNy2Pl+Li#hk$dK)b5|7dj3mtbNOee zxsXuHd-@38?QUipRlLu}iyLDj_#^)=!h5@~Brl(mk|iP`p;-QOmQY9kL>c?NI-}Xk0#jguoLdA!iXX z*{b&NqI|{!AJrUt+mZztV1+=95*As~dTkmo&Z0+cgB@^k->W9bm^%U|6(scsfyX3B zwHD9!W# zO8^v^|Kk|BeG5s!$iA7D02F`$xW+^Wp7+KF^mZPY&Ba`au-FlN`%9v-C!C&`0CCK{ds1L#`oOX*B`E|* zO399SP`60#TZR}_{7;z*ff?^le*C|y%1%auQUe3T%~zPrNC4FNg@GW_6c2Ra34p1g z>pS=G2%H>aJ$E9SBi0&?f-y88Q56kP zB9t3WG?GO7uY<>A+Y-}CYmtnWRL7N%05nUFbiXjFf*S)w<`rfQQ}+C^-}p5uP3~ln zBo<&W6#rRv} zhtmL+wy`+aKk>;+N@|&gO99*epG2c%f1*i8Z0z#~r{t0Pz3o-YLe z7Gj`~GL>csw~$Z;F6hz2hbZumyOf8h1ZK_0?`mGUc@%3PWs85O|khO{bzTxvX@C)NLw{%;1u6XB}3xX#Cr#k_Li|2EXA4v<@FniQ3C zcPSGXZ^gw?fFF3H(@iiZ1*ij7Q;N~czcLl84x?8qRVC-olRg7tYAIDY;6L{7qLCJo!x#w=P&$$2lxmUVBzp$w-KLe3eBodb7;Mgt_gJbU)? zCGq-V=##71DVt$w`Z*A;zDPV2uRek_ovu$-=h$2f6KcI=wo?2X9JP;ylj##7DpEQsAZC`Bc|52O(FO%D-cO~BH zQ17irJ8X@#HshG!1aKBYpE6$TfV4@oes27b$fJ@Bj|ZFRP#rfAab18NM!GNiXypuM zy^D{vwCe|}q?QV0zGa_9JD}AKR@J{9isC7}Chs0Hxd~J~sup|dBtF*04MF~F6AH{j zZeAdZQyyI0n~pKt{ColYPPepDiwJ#x;t(dY=?rgP!-7TB-;j1maQd0UKYF{1rYeE zni~a;)jY5R0mwVPktvTTO?uJaYX;*!%-@Fg(ZE0=7wvzV#IG;s!~DQXjMd^cX}wG3 zLl$3~L+5Gk6w5?6YwLPGMCudTGM$^hvA@;!S;A|xP(y=~>=)}mowCmfV4?8I=l z8umP1h4~}wMesX7C-06HlZpG{(8BwgqicrEA4ZL@wheor+%CD3imY$$f9)>1V!;Yh zN*I1JyWq6+RKLaR@XL_!(1D1iWe)-UQ?XQPS$frrdXYn-JyGy9z&tiC%n1&F*T9F7 zy#LeGCIK9)bU}ClXolS-pBUJOkc9urGZ#-Tkv!0`)XAYyu}K+w7Ay53_G92eDgvb3 z1Yd8l%SWgk_5{;i7)13~Z5d!U3+tXOhRPHqEl-|4y}Ipo=otdAdwBL}l#!eo6`VC7 zmuYeFao5;Ps%94C$=2Bsq=!3?M^63%(XE8yY~yuM)jN}GD*0d}&h-Br;Rk;Lkf%t% zX|r>Mu6v@WF7bv2D)#(nzbH{=|AxekX7JeTeTIm$OHfsg|hC@MB@6tIn!l1#ZwHlud+l;A~J zvM((la{{4DuJr6+tXVHPtc3}+WwBkDRXQG<%O_5sI|odWT-;BQ1g{TY&x45Nl}kzJ zqr2s~*-rMTD74RtKu>KF^!}+ze1!>dLqT9~@jm>SaB+D=J^R3wyL&(@P*qbq!COB~mbhHsB7Zc4p*d!LhIgQPd1!dCvyB z3$|$}iG})KU36NuIFoZon9?z{nVpxm%wAR2eYnt9>wbQf(>;Jz923k&$0h5fccC5i zoROiP@k1g>Zy(*G18+%#uQB{2hix&iu&(qL3*62MdG~WP}ap58JKX ze5mG7V{-$Qjh>-V5JO}(mRYIQXXQnwWWNo_#=b|Kzc&DzHfc{wzW5!|(%Z+%m~AomFYu}0_=;Pc0#^L& zeCMmucsjUuV0EFa-mKsor9<;T>g%GfwGgPJQC!r*$@TD$Qy5-YL@>wNnOIoF>c&t| z)DJs5?edC_gbXQbVmMHKd|%_r#WJ!#++dg)^g6OLW|r#nw>~`8_n`*%-g}bdbrmu# zrM+p)_<8eD?UiYVY5Q?7ral91_(hD$>kFtGWdu(<gE?RqHU1klrA#YM9h?N;|s@r0BLIjAT@?ttKKyCOi98 z0U5l#`l{DmBikce`il;vZoLahzsJst=9(e7=I&(D%Fyz$XR@fMWNVV^lgpa!yB8qy z$EHn@Bx62vk_=it9#Ldw9S7>vtF<@W{XKBsFa5DTc?L0>ekfGHzHcm}TIOlVQjDRj zx&01=hOlr}4J`1l>uj~-4h{I*Jl%?=L z?V@Z9VM_K6oo1if_Pz%ONcOx=PbzCK7EO7;XZw; zumom3KxUI(i|BzleetMvmpjgC34_sahxh8=fwn9Bzr`Y}1DAG=2P*gT8QKM`Hni%Z zd+!>@Uf~YW{y`HH^zNRqc3`};D?T$-QqoHbD_t>U=}6kjE@C>X9xwdE&l=#1+0l{)Zk5 zuNS1%3c~ZMsvbneKpRg{{>Ss7OGD?j#0$!=hZH?Y;&bYv?e=z)JflTC|C~3mdXb)= zzF7y4%m~;U-6q1-9X}P32A(Xnj-)$E4kY0C3#l zF{l=)mR`!}MO1!0-zq0(y>xJ^xTNIPjoG>C`h?RtIfUEt`+ROpi<*?}Uo_ZW-%tDW z_I3;J!^hr(gLHQvJW!ytY$S8oPE9WCaGYS2U8cz8b!jK|CzA^9?YW08V9qFVzG>86 z4-RTqR8>{uEz#6{njS0mZZ^Js_J6?9w*}q^h#{<;6o!G?c`WH8j=PU;Y-Edh&_z0b zYXGgy5tF*RFLfU>_wmg##^|)vvF|P6?{bA0q_f})#o8xsKd}Y;e61$30`W%s!;1kY zAiXM_h8sovmhfZPARQrN_3YKF_t1sX(L$_@C-=9i>7>qCa>T5Fwb~c=r06&%W;#4f zsK=m_!q8Gxz0ObloCXLIeCT!YlFA(BhvQDzoqUJoOLLB|A6#2tybdmrRiXs*<8LjZ> z;@)tALxFg2P4yBhBbak!R2Kwroq{X4;bNL;8$4`~PQ=Nq;C4_@|0HpQU%e9{vNUf{ zaNNt3aT#2S^s{ITcX?`S%hjGB>^ z-|q|g@x$2G&S88dS)5S3jW+&qtcAubi98L6JUZ?3=5-{lbIAcSbG+Y`KzTth(wa=1ribu> zeBm_7*XX9`zGlIfP)T<$fw(m~uWm08e}HrY1*H&XnjV}A8Qsa+eU>m-uPn?qf0F38 z3PvXe2X7HxX><8H$B~$OyzIVv!+ozi=}Xi(PQKTyTK0}viYc8m0s=$H>-Y2eQj9w^ z^|Q6;bM|}UDScNnJPzkakx8*vekY7;nH?2Mu({IKr`6hir>m+t^!4i>wxnmlM$-aa zh#|sv39*4-$}_if5wMJ`3>HY!rcmNGFhrCqgC0ivLa-$8&YX#^Heit{qS_Lf>;Ex% zsWJ85^*mbvXZa^jQnu5qxRo{?I-vkCDhhGj;X& z`de?%Ui2}H4P*Ik`y)2W?cFZE{96_ee-AnX!Qn(8)P;TWK5g*K`aUw=@7vpD5dTMZ zyl>|cM|ji=JlgNYZj)Y6^Md72#JvJv(CcErk{%%6aTYYW@f!9mTfWG%NwgiD>u_jL6n zN*M#22Bj$A+9&;E`KP#bXa~2ngnO!D7Q4=;7sLa-ePO}kQA2$~9O4E$^3Oh^P@3~> z73WBUBuUrS!>rf>E3{8szM5S$#Uz56_e0zji;i zg+3*pMsM5Po4Yk7^G>M@OOzFPHsQB80!Q_bnRb0EaV zMk7r@N-E;vA-uQ0-`UrPaBiNSp2W<;2m;r+_{nIFt%e$}&fjd(0}pIHKKj}-VOp;Z z^2S$jx9^7d`+a7FlL+kpqOD}YQ&Q~gG^K20xy~vZwU9JC5KS~pC(R;McuZ?3`SrD_ z@U`%h%@iU0`W56B5sBhU5zcn}KNc1wTwM0w>G4z+9JJRT$H1J8$-J@h# zu;;nRsQ~$HM8v|j1N+eX9Kned$|o7$vkIDwxnT3v_)@G>puA!#LwI)LT+>u2*FPT^ zGYRCL16r8hHkeUac5L?bES~kICAyj1M52OVxxaHWo?{ae^>&FOWa`fHrw&8ewc7=L z#!#t$VVM{k16Oz#dw6)btN1l8bpwJZ*-XA}`5be+mv{WBC~H(RGF@=(N6OBetjEu0IpX0X%WW9& z#Q^blztk2%ghHps-tDbRbE#Pp;#exLieDs*^YzHO5RegcXSmaBCyzC+)!ilfI??gL zfgs*#!nNC-exIBFDdTjwd_)o1bREG0;Q{aF;>OQqj5@65nTp{t$GoLoA|_}l&~CrM zcd!-9=4sj5rgOsj{KboJQ&T0lEjr)c?ys<88a?}81jE}$jNg=)5`}J|k}=$VoOAX# z*m&td@+J=7m>yS@;wP#2St26OH?&dNIXMJOiul2cYFb*XZqUC36Q=5jX0r(KpM&@B z)7#EEBQoA}+z|1D>T|2B(HBv@)Mst*kDU5;L>h+qF+QHdT=fv(I;o{uLAwu?(h55* zTphkzKj!8DB|szf>R>51fOrTKfO2Z@A6YMQ(a2-huY<#SgAnzMmUgG*aCb57G?&dO-OnZiG;Z^niyiNbj6ALCyweH}>R>g*qoLTOn+>`N zm9=u;ys5J|Sb`YYK%XD@+XSLSsZQYHA1PG2jzR?PpzA5zEGa3`X^XvSY-Sej1_q`# z3X6);>;{h8-PN|%{~k1d^(gJ*;rNuJ8z&~{icVEy)iqRJ8}n$7eR)z81Lc|JhQ+{s za_0vJk$z2ZN|L%{|M2AM-X1Orb-Yz6oU+q>DSmmOew3Barjl8d$Qt}}z#&2;P0mT7 zCMxRU!M4XS5A=jgGXa2@frUj9bWXq)qfm(UsN9Bb#C2Wz#fx&*fY0XKlaWfAA3;(Z z79H)In0N^(OaG%#8XO$VH|t|DQ4^9y?w<)o^nh zXU}S=u4KNN_jr*&85c*Jic}=v1IZx|&g`blNil`zIMKC>;_Kea)`v~f@ur7_sD~~y zF0Q&&GpqI)(s9@JHI0_L9&yyA>%e%6lRO23g@ zyA7XrBl#HekfRws?GjArqvGLaVZC=|UHnrsokZ5BmeZr-{j;NAdLP>_@Q0MSfUD}j zHcU0dClDe%03-^XKx!kmf{jxD@Z5NC|;WWSU3wQN} zIq%)~V{FGYNe>z_dzY;jvIRURVewkkRL?z$`z=FRTwEL(x{xH7sqneARU8V{fJZ?J z%fU9`_lo%Yb@*eG(^CVZHZPT%?&nc;r%*dTu()bupv`J zc@CKS44B(j1_3+^n+c|Bj$-UZP}fdO=ptw;G--ESYoSluJlmO5q?+?%@xp-y{_o9! zyuK+U$@2|O-!aea-}h&VK$BpMx7&?C5#PtauVH!9!VvEe>&HCx!}w$2qdPQB(y+b_zGai1tCoOeH3Ptxmo{}`lD5hrvUF9Xldq?j!N*8svE#uLw~j*s?Vb6b#u zJn1B~JaOR$$YB-SX6aa12n7W*rte_<)dC2DIbK=)-d97;QmfHmq_GH$HLP)Q8yoiC zT#eJP1A#XIiuB1Xe`8}zOiVVL%U*B)lDNN~jW^a+fywo>W2^KD#|y6A7};T`_5E}( zw=FHvbh$0REa}y&=grg}lxn5sqEb=;=9-F%QRuIfjEsyZ&&OGc_qvfLA<@zFZXqvU zeu7rO1v>ROC=pPBAeJ*4mG&*YX`RL^3q>6ha0Pdil%f@IY$#BvcBnew&Y`|m(QuSz z?HOo~w@?3_1iznmRYU;r>!D!!S$)ehyMyJE=?S=iDdC>?GzXLC!bTWgYQd&P%gTBN zdg9fSw|oDvfAjC*P+!pgAo`9z`p+yb-LX<2&&pQJ>RwjNdc5a1ii?AjYJ!D@^<#PY z4idcV?Y-$S-4!E1{(2{y6EjwG!yAzX>4Xa%kJM(u-%3gxc+J8K_(jA#S zu~3O_`q$yV_dH7X{^Q3I61M2m8x9zjJV0aC9xhrz9sHrj`M*capJ#Hqs@P{k%2ACDl~|7sHoe`Ct%fAIL1*Es*2t^fAw-T$Q%=)wQe3Do_6acU6$Uz{3} z5IoKJ1>SRT_09or7}5*V3~Zzas=?zN?H>zAfJ)5n`xetJcw;-7BVDH)ts#_d{*8A=8`B(kcyqE+qMWbeh2X_lDTGQdq6z} ziFI+VOhM7Uu?E$vaFYFny(KBY3BY#Tad(=z3rY`WZVfA;j4g${A=???f`cr6!J=?K zzC~Ybes{faS~1UEbT#(cNG)75w~^uHr|X8%&rXz-+#v!W22$N?;Vt8r)F4oXM6D`q zKesHmdaJ>CQ{9=*lY09W^v!HaKUX*n@%Gf_q81!dipt5I#;GPXgGyF%&h~Vd4d`XK z#``-{@Oq5%%~ei8oq@r6N8%x+M|Mu*R7-e)V~gC7%W`$$E{w3RsgO9RZ;obK=!wa0 zxm^kPV>6WM_e%^irBr*gX|*!qvd_-S*urXc_uTMYY@95l6!_^f2`?KOB!Gs2N%I-= z4O|SELx+8EDx#L+bIr-g0oA3XqhmQ&&Mex>rfQY?rGx=3uRW7nhwok z0mWwhrhIF{d4d$U>;U% zwGC9StAa`Lmtuv?q5J!MuLPV3VRE1Q;GB!13`r=jT}ouq5ZoTh?YP9XHT>g3D#VdL z%D>YljXH>*f>b#VLYnpceXIM>uf}?*mDNrD;qUX}E$uIZ*K?4OzDaoRT`-3oC{4f8 zCB^D;pawfAEV+m#4Ib`|%cFlh3qQJ&C@h2$-F+@+O={~H)i|%g^&6iv;qQ@0IC*@I8py4k`KDuA>_B5OqF27tb9kThH4W%J{OvB8KK|F?oJ>}I{@-zoV5 z9i;BZ_fj}m%p>5IT(?}B#q^9tGYp6?VNunP`d6v@a@nW1rfuvAPvheNTz7AC8ah)g z4DI&j2d5Qnp+rhq<1~jD>|Q#r$KKWpa5FpwodW>zrp(C-XLcygB?L$m3hxTXg&X$X zCcJOlT68L$&&n#rz}KX=K##dBdw7BmXua!hVR0b+qUHu{LIsw?&Tu?@F5I=Xx1WIK zOL8mzIWUVMg$vVIx4;rYfF!k}4;x^*>@cQ8MkZddP0-v~!FT1_wTh~x)6YF&G#=D? zur1bRYzrw}XJQHsua>T0?S*j~C^DRUhILqYVFhy72B20_D{FfX-lQhdOU|mbNyw@R0CUrPC}0=LWqL6&q&;vd`6u+ z4<6Tq7`kT!hzP2MH1~u&j>HCB6J&gMPrJvLGB_11pOX5$|8QX=5s94kC@m(+V|^;T zaAQhW5j%}X_zVCzx10*Hu}s_~aW1l|aHKwgD1g#RAXw??)3jh{p%VnLBnIh0NOP^z z+C7t9Si~>D@2Y6PRSFGmbjoFxf`e#u=fD6XGnCN;L-m5xaai6)dg<<(LG}YFyWMn; znVGh(Qm7_aU7-tk^I`Wq9HRhR8CdZ+*xSFYuBLiABd}mg4cel#GFP_(S+KBgdOA0U z!U^#(Ree9fRWLLW*IYW^^9%D`_{R8iL3zleVO?Is?VE{WG+_IFet`(0Y7z^Y@V&r5 z+FIh}Tnm4Te(oRl^7`}uP^D}i|JlQO*J8Ma1wZY^*5*|ntIFnmJ*iB=czzF=_j#Ur z8tc6`1DY-x#W2oXy$b%{k4`z;|mvA)Zg_#qlWtdMvMbDYm17`L4o|EudYCc ztXkeX3Cy*I;qE}$assWv$9(!yH3u@Lt@9V|#W4FkS$--hzzT45njX-_`9EWf*zA5P zz|r(2_nEGBpvA3(9wxNWbtB2O!FgHn>TQ=bm?V+^X-5>FRjMZuv_h3^?m?h4mPs4%saJT34SJ#uscW=1;WE?mEce#TJ5?Q*Z>r(v( zU9HLm6SH(Gu75({jHca6l!Qb|*!?syQ&Vz|-aK(9m0N2BIKIJ2u=2IhrRKh6XB)@P zDCzaOd@<(+V*@#7ugCs7Ggb6doZcSk^iF)rl0sB#2ih%U)=dFe_O&YRa93ZBd`TIJr0}x*1X%-oq+eF2P9gGYPo`MuSRC;_uiKM`4l%LRQ3*D!qWHAY* zba;<^84MfqZ${YX6$|bIo;`6`1Nb`7EwBU-h6(cYimF8OFJBwdzdnEs9nMZ6*t#Q6 z6lZH5Vgj6AF~pe~FTv0OzEb!N4>_{{T z?pmPQ4r~dY#(kTzI`q9e35TR~-wuHzPle?dl1_I9#rAyWVBYCDWa#cH<%!H}{vW_%psm z7JlN=(v0qIdgBZbragf}9Vof5nE`v$pefuP zXgW-5cdEiv4F+s5Q`MInAHURWQ6Z;~pGG!8VD4d5aIn4aG{k-S`&Qg>IyJ5X(-j(v zScj7pVkS*dEI4QODB*B)eEi72ASsV zfLAte-k*Yy9a0b8)b>R`zq@eaI5Jx|3QhWFRM{*)bvQoD8HF5mrFv>IMw_PX@xC@c zr|uOO7xNC63g=eqd1rK7*s^Fm`tYiQ{%_iwLX9YP&O?6Kbw-#{(I~M012WUu$b-5z z;K1g6I#ax%;aWeyebo^dJIaHpb0%bPn!MP-u8IxE3TVXC&VQN;WiD_FU`-avXzpA1 zCD7(}MKM{36Jak5S2izxyIOM=3d2@ zi~JFs0do)W>o35c^rd#f1}ZD8y{KHPbb()l`QmBdnJoKQ36mf!MS%#xyHR&_2V#Xd zc>ltTsQa`18iuFXyTy8%srhfv_ckJN4i|cB@+4gI)Kp{Pe5zc+R`D> zbx3q}cK-Oe^l4n&m(nNJMllbxDo@r+>GTfy2J9}73M5&PkYJGxnB_IndHS zMVG~dz1>)tX?faM7;)a$-sD()u5I?*UutuAq zO9I39CdB1Du#R`&+$~&PJmbFR&!u(XcRZKZH~*;Eh!ytl@EI`B*I9jawa`M~H`Qn& z=;@08M4L^}#nn~dBFk&m$g9_`Nq$kt&vrH! zV23;k4VhGqim&QVMvAqkDDa_4Q$+AwItkBPNUl}T=lR){($gk@f>oi9WHz#pQon=n zidzPsJDMSU8{0(Dz+(BuVpd#)*@v4~Rrt6xp0xk6rqZ9p7xu`I!zJ@WKs(q?Ufus` zy|od0y9`&BLmt3Jh}v{VYaA$}p{b_r-RXQQulsg`-S&ABCO=4wKo||D zIUcO^R*^ufnj=+vjqR=Kw4$P?$}t%dBjwx7um{a^a-_OA!L4UAS-UdF`@YB2IK%Xj zni|t-dmE*^4QD}9LMllRN-mJ;bO%tddwj%1(YY*AwM8Tj4+$zUQ1RCtKApBslKl$+ ze&)ffsI1JX84?M(iMPl@Klc76(RKW>nmYFfr+;Fh4)Pq1pXb$(9qf;gWK6L1XbZIP zjE*!^JK*jXDoacuHCE@YJs=IUaHArdV_U4TZ`Q%}^J^kc>BJLv7lMO3uWCT{3SdIe zucp4#VxVj>^gQI8h&jdDT4_k;mb^Bb_TFJPD7Q~}kTj-2PKeTfM(ZF}O&$=@et~%R z;&IS@y~rL@yS-u4lKa%F`*n4mTo&5esKdiU1hv!Bq6RD;U`@&5gI}9ZS%6KA`ffDO z5b^7zD%g(jUv&Wl3=c_PK$M*TSC)v;0OntSBx2Szqt3~;o-cWkW zU=_J5k~s+fND=ky?iIq$aTCLr1wSFq(lu-d%-quBh_S9(E${O^waWdQummdkhIFO; z&mQHJU*+b%?yIrwx(ZHkEqcl~8zi2h&jo?8}<$AGBXCW?dX5?fcu8VSx*D8e~6DG^% zSp4d#OD`!yYF+s~o7UH~3B{Y-C?yT>067l@k_B3afg2Tpiy$=l0GPfWxEDdq4r}*G zrsp(cC4HJ+P*4DpuLIR6{$Gfq&rDYuA;ePmM(Lpz^Yv>|`*PyWcYt!h3w>87n{}E3 zNdqZnyY+*)Bw)mNJ&q`A_LpM0n8Ag6d(=Z1WYmYs9B=v0Aj5nCIWv$Ez)d>LLpLt( zb)tDz>b(v_o>6!`qpWjm!#?O<-@e@L}~ zi63xTKiau1RI$^g16CZ^{ruvAbN~#!v^GFgCXj-M&|_2S%x)#=-^0o_z;)|-dm9Ch z^<>3LeMa9*$H&_3lhuXO)Gy;bH+DawJk36#juy4g4Av|?txN!34=Et~&9guU&1>L+ zoo154=$HcSLO^+OTUIutHefUi$a*`CvM>w39y?LZfp;7j!s6tsvS#7QF41M@vj&C z`q$e>AB`|5J#JnliuFAD_?2RGo6z0;b6uy4MqMBy9S@-uSW`h0O(r*UPHs>#AvB>*{(A-s{mS3<&84w%LuF z43XfNdja?rJLTrsn`Tg$OP3=xWC%vc8*2Mc`i(vl)$-iD+44o-1%J_l?$R0b8o>0o z1aYONdfo1qJi=T4_*vN4&zt+#3~9SuDa;(T)X$lV4ns$tkp zY8vTI4inL4>NBy)>qzLmtb$uJVBWMeT)8?EXNCAQ1EYx0kZNiao*$F>a0K@ZUVYd zNUMfu<~7$I&DV+%VK+2F%vV7UX#)(Rgqxe-#KZ*U7ocgpf+%>te4*>b*r!Q&_3A7t zG`Nz!+2_}?`{&DN3Rmz)swelHJaib}7$)|M6T~`wDb^?E(e^|hb*xXS%JyW(_Hc+i z4}GiqQ)yC>mT{}JWwofR)rRbra;cjKm$x=H#-JS{Vtx-PIEv=_^;3uoznfdN`2c)? z`ya76joKRkxVDBeNt6f>rHSr)CMGJt#e-gXtSe2b&@MG2LrN4IxGdmYPXtp7FNF%$ zCuAhKt6mR)>`+V$v!bGc1`pHO*%`S`nlg*Pm>q3^{5M7(FZjJx^^9%HQ^b>2+OrMwqcd8C?OgmgdfGItRDm!1SGY?51 z;`OhXqdLvTDk!M2R|#c(c<%XqFnC~r|0XT%c5GB=D2-YZxAC~*g^L&OlhJy99K+PM zPJ+8aL`5Z-z3JoaO$+I-Q7thRHDZzu>ei~=nK&8Fp#CTJgdm~?Js9Df3&fhUCvd-w zj0C@UfvuvAheF(qe9urzT3O|B$!7KN-MI62kNo}2b+!uZ@i+EQ{#dF$sm(?@iQ}19 zgOx5zC^qVOVV1cXZ%1c95qsjhw>uYQ?RB+gU_6t!H0r-NeJoQ?#J%K*f|e+`cSNz< z{Y0^m1r!kAMT6(KSkh^^Tp<9iqX zbqtWAh-~9Gt+_B#jrP6zUmYyg&Hz=dUQOo78Rd>TES#HV#`05;7Mm|~E4R@QivPSr z_7QJ?dD*(U@8u5Jb*@B`6}M$n?nx~8j8Lw!v9a-{q~tOAp#D2-(K^^V!XhJYF4*BW z&UI(78?{pogi>#TCBs<0tYHzEVbQ?sG{wt^i1PwRJCo4VrZu$V8LvRA@Ik%skep&5 zXyYk`-6>^-c2ms-Gh~yRpcNMzwA<6ki<1=2>UlXbl1!lU=N{{u9qgQhu77LDk%c^d z5RUbrf>WZc-Yz>+69E%G*TE^qIy1~kES;d#=}aQ~7D3K3{K2u7h`zPPMRs$1xALmpZ>dRUW+HBv!E zU{=p{0TGD55WH8mi`wD7U)8Gj(&~uPjScZO}_KT zEL^K%k>`le^jESVkE4sxUq=~9E_0!_M+A4S)oZ*L$-}ntLnbpEQCH~cr4Z7&z*y?S(}?&50|kABIiR&R*Hj@yGPFQ4Whv%7;mf`Y$MJ@9wZaIrKp97xO#+eK z?e;P#s1f{T3gFnLjcy?UHSP-Z6~8yym~4ca)_ZdWHZI}gT|@?b9p$yZgHYH|PZJvT z2=GYQmf+*i5ZG{n2xq_<7T*e-C|}x>AVxysrc-0d1*|kQb%+1O7Q0{kHau*x+4K@8 zTXDg-3X>@tFaKV__}unpfrB{zK-TINi7ER33ao|V0{`0A(Rm+BrWJfKE#W(~EKyAh z*-=LK|J4HQxM^#P#B#H-c^)0PZ)|Tvo%|WqoG8}szcwg>@V?8}oUK$LDj?lj&fAt= zRebb&rv2+{)A_s;)(`Mbi9Gb6e&Ie%t1$FP7H{MK<@c~pV2^nm+F`S7ZhSI)aX#cI z{vro)coVKu7Q=t;8xj(FFZ+-tA6+{%U(1aO|2Kksvi$0Qzv%ypjsDj)ApiQ@@sHr_ zpLhMgBg+r6>$E+AgVr~&fCdz<&wdld8x94oGDO($&D#bB-n9W@Q&0bs;tq{0xd3!< zZNT(dG{deJP^Hd$PeHbQ#PY==t4=#q!{Zb_4!qo(2G9LQq!mEmAUtN=unGBO%oRN6 zcJnuVUivpOe2b<;qT&VR8y5wV5((XgQo3d#O@;r>v&t$g#MBtpc*pOI&u?Gl8Q^CkHbrlub;iQIr|E&2B zj(J7383Q;c{HW0)^l2_VfFu}OTH5aFJZuxH2lBe!tCcYL5EQ5A~4z6V0kk9%!I0zwJzgO9Nu-VZIrUEnfoH z;o^iYqGB>F8O-{H!9vmt-3U-9AenL9w_WlqCl!Ilc}^<~BK5ll*q$>p@}LQA0K!DY z*N+Ad7&#GB(^#ce9gdj%xyB$wRS$5bNkykIKrQ=zwqIaF19SzttaRwq-l+ug$Y2^7 zikPUEJy}|H03-@WnSTSdctLGygP8%S%YU=%E6#CLghc~^C`8$H9tFO7h|=1f@M+lIGBVI)qJ}^5Pn~pBK+dZVw(dd%E{D)kh#Rl%KcYW5N^;Tug%WX%v zVQn!npNFajrVmp~x9}hj6#>H*eGbuc7q6l1AuHsrF7F)wV8GyNM@=-}gU}i7L$gRd zM)iSGy|+(*14f1p;9#T;k3%fs%CK z_=|wDytdD?RVwWt*eege2QCIBVrG`bB~644V5as+l@kJ?7~CO>KIbt@P-^uJ`tFEv z%jWg*KUk0at&P5rrKRjO8Pt4dlcHnk$ELHZf?_ZLUn!U4KIeHH#yyh1_?G|C({;v% zuYMoDXUd0xTHM+K7bmX~I-L-x| zVpeCks45)URVGDIVZ(%c3Ia%Vau2r`9i`_o_6snEf2^EK-WQg+Ow_3Su zwo%BU+Cs$B(Oh_cLq7AtM5%d4MiDK4Loh?NW(eS{jqMyZP)%cC{n$!90XI$0gn!h% zIuTzdrF$+kzDn8N^6=`+N8AD-IxL?9*RuMwa{i_hI9Pz_)g!CG`lD-^cz%DzTA85z z)@+0OJIsO`6Z!b}XPasSR8-VJ;+#4! zIzgqjR`d0vNn!QG(-ne#&rU&|4GJYIu*!*As}n>o>v|?;nMKiCi0h+qq6JI7(}sI5 z?!}k5*tjE=6|Dmu(8*F9*7S`y1u@s>-SZzvSCRvs;E$La8(a6E(K0qM!9YcC3rF5R z0aAPxce_WiGe0ZR8;+bX9@c0r>fZEAp4@8KtB_?M z#c7leP~-KouA05rqCH(Ma^#{Btqq74?rrv}xRp{XejP4K|9mvak{exL{!Q6o&zAGO zP;LXXKU!%dFb23VI%F-jIFGi<8Pg*)F_3$5GsEDFz(vsd>C*=?vY`%^WOnSN67fp>B6T^QVC4~ z39H4KAj1<+^vI1Q|{entS z+GqvenNpRz3m#@1F`-Gd@~T#U#0&!O&vY**vGA82MZhFp?MKV;HBm=GeYH#6cj6L8 z&U3e2wsd>52j1PXC0&k+;3fESosASR@rV`or3y{}xPJ6-O+^LW+J+8>f)c_6JrJ_U zRlbK`hmtTLv)(Buf`CCjyA>7#P%sZ2Hb@cKg{dWr{gSJha`PIbs5R-hmxh z`}pXPO{?Yx^W?oslIrad_iVMYUz(|Lh6eom_Xm=JCw`NjE@>}VMzHgm%juQ*E`W!f zog?Gc9oyajV_GhIY;9}q&&N70KR%Uc(=>4S6Hx}diH~fpiQn4%B2?E+W~Jd0&8qbb zL?6WbW*1>_9GqBJt}1QbhH4+sXMBylNdY&F@4K4O=0H@Ik+f%@eMJ$zGOl`i?X5B1 zQPcG}4Da1PG1k#+&ZVIktgN6L5a#Z*;eZQ}uJ0O1v-+$>jNqNF#5F8Z ziA_IwI=tOq`4W14Dm!q?Dv^nRnJzI4#7SLTz+zTw<|$jj8z~B|<11W`M6X)|Bc!b3 z4N3S;&Mz@tYDJb}7LpN^HMe$8^2xz3_vWZAKVi6#rk4$8ix8dOXRC&|e`y1@Y6 zi_@g8DWmrNCu}?{=Ep#Q0F_Ys$_8%=KB^eLbh>x1aQ+P}ln?8(sm{|a)mYZU+zs=( z2q(k60}~S{@Gd@|uBGsB5+*_id-xz=uBEV02j*~hpz-8_^T@z}KhS6lhBZW3Y?HqP z1H?sU1XnpAsS577lr0l~%m071MWKeEX~3H1J|b2pvh%A~tD2x_ zrJ`EwD$dV$8Nzu{{&Y1f;F3YoN`(D;#nRjWEe+cr`l>Ne*Io8+LHzKm?&e#6KZC*B z*POFDP`h;j>KTFmheqizFoNzn(b2k5(?XWg7D*(KJ#j-{F8D6GQxd63+}i_+Zn<-z?{n+-Ur3p22N?# zVH!HF=*>~7gsW3Yl7E~vUb>xljqa?K z<=ZY{n<3~G05th-tbdnp)n@1qs#-iIx#TqU$ahybPMG?5EzfEqNz22_!uxl2CK+UN z#DXI3G)8(Pqp<7Dxhvh!tM=gu;VHbX0e2}S(~^^+z2uoMeD+AGvfiAinHdvuc%LF7 z=2r%pgI(+vI=tQf*QuU^mZ8>Wvv36h8S0h^5@hJpc4{93yVTQzi>QPMwlAOMq;gDw zYdaIi!HI-2=(1T+>TL$ltzy7;ke1C5t?z8+d3Yf~c59nmB}-Tt){82L)7gP-$*)a) zaU8aEJ0SYTMm**Cx<_0_W(lBYu;Q zpC2*829=gd6FE}ls0*hka@Ij9S)RHqP{v?>x3bo%Mmb{wqMrSD;eNv#{(wfzCV2!u z&PohpPEp899~IX463iaEbc?R7rsf}zaX=60R)qqck0``|3k2#{OEFHDHheu_L;C8I z5LNk(WLnN8sgQ*>)ii^Me*1Uj5aatpk>_`6{%bDXiVIUrtgPV%GelUd3*8AWpWGRu zU=M+_4KKW9YJ+EDwTybOi2@`fDK(T#&>$)2(d?_=x*7)9>RrAR%mzIy(;#dwoAaMITMx{h% z`=giQcutjAYf!UHXz=JusO~XN1r%d^cGm9bsTnLB)%vBc7|;E|CHbNCLBWlyCuZA| z#MRW|pek3hXy^kXXVCaR$Qj=84!z`@5bRQW#mB#Zdtj1pyW53euZ&LbZ&5QlcOrT|qzuL0YH@Dkbzt?+MZZ z1QH>T(2~4$bmsT&eV_L}@80{~`|Ek;Gk!3JbN1PL?bY`8yOzPwaDHw0VNJ@+>$$$z zPD5-0=z}Ch)NcUY)GnPvJLIeRRN~5N9F+b(e`xRfg!E++$|W>#ajhR0skyxz48&cC zC0|SSxEGc-Zu|v6D+h(8K2cos#kDSe%#IcXyuj6j8}P^eRj#L7bwiUkFq-8>yx#QX zkt_;c78hT`m;i|w=0{%7ulA1&CU`t{#+d02pk&_$|Ll(4rz=Nxse8p;)eX$obzwGEhMAwx?n6{s208o5Rx- zobhkT*CY^l<@E-UzDjR&S8yGx(2BIdzToDq27-5GpzHEagG-yvz#+(qJz-scIFQV+ z?ZLK-?_FxBQu?9sd)}(D`)(`f&;;`UD-HOd*q!mOuVtw?F)!6(MjNpTii-OYxd1pz z^9R|2;ZTU=P^f)?c?;RS_$B-sNaFl-#Sx;xuF+k}zufikuHLu>eI4orAei%0UExK( z84&J3HUfNlg&j;QV8460O5S^hWkl8n5KIGfeFNwB{5uvl_p1(9k!^U~&a>m^#jLfd z_~AcqpaZ?<7fyF2uWcc;L@Xeu$aiXIw;*u@;F=wY2p}+-*P>||VJNRare<~gvt+tzAYg@zUl7Z%C7T zo7`6Vb&$l?z?jYZ3?8r?9251z^tWx@LZRFzu>zO3TK@!Kn?BrOVA%*p7WgDNDs8X( zM$YEOH}!mntQ9iMif!_Xx!2sK0HIsOWN$T_eq92E{ogwo%VJyz(F0#c4{HIc-B|Zd zr`^ddm{77i`0S7bfsQ{)Ayt95-m@RCrFEI@4Bm*ATKU{3vL!1cGgHA-LqJtbLe9XR zPZ&go+E@B#hT@!Er9qm^Vwg1eS>X26*5!*=IF6D0StT{n53*`*pwa*_3Bh&D=JVW- zIy{};Ot^a@LJ|X5Z#c6o^sA`!MJC#P>b=ZRTmy#s&B+0RzQt2@a2527>DH%C<!IioZvw=6P`ZSD$q%e`vCQ=fpzH6~X1@J6qX|XWLGo!@gPpFIE#! zA4e{~I3+x|s@UP$5Vbad1irWhU<}S*|+pev%rH1 zXVL!|jsm;q*HN)c1Oz})Aqe~ZJEuf`hO)2yre_v{5KztOo>{EywvSOAW!}HP!EWHg z2QGxPO(H>eTU9t40G497?aDVks576c(AmR=0h^>nm&R6GH*_(=Lr#tO_cvvFU6U<2 zCymML_-m!TdYmm-=+t zzF60nyBuH>b1z~3ff|^OOZn%tcR0IB^{=KOq5`YuWq3;hQa2K?z*dDdtt5{k2V6o23Ct=zK0 z`%gpi5aLE&1jb6bHR9f|7b;%@!h0t~qaDSNk=z@-;h#zY=e?iYqf(t8J$>>;$^Pfs z_LMUxxGNt&o!=lIw9~eH&(WR9QWAH#=v``&=?eiaYGxeM?ZP$GPXnUXK1D}G(tr<* zLZP5{G;%&PD)k-aaSo1G_4M?dQHgL$$8`^3FfUXD=fHO*u#3L|RDhR{k6h~ZdFo%q z2ln6r7lvGE?GL`6PcVCu=e*%eDWH}H47-kE5H{pQqPkirARquvWw&kHwzqxZn~Ogz zUX?NgBq%IhSi=U`xI0s_{Yby;nEy+~TsX-@Wg0^`q}lkNZ0S>S6YC z!oMpD3(sDNIpdOl>W;wsGtyj?Rw30*vO(1fTv{|PB5m)77>eAyj!^2KuP4QG6NRK_ z=Kz=nrI?X6%}CiGsJjha3yxp0{96Cc!QLLBF}8Phid+eM^5iTqe2ZMdfBo}Uq|Pru zCJ-_IcbESM3Y5RT#TecIDYd#FcHNVFoY0vD`IlKj->Ux{%xO~68L8IxFFzu@Q@&uI z?YWQ_7tcgos*x(pIg(erzyIpf)|(d{fB!4~KCggH^xK93Zl`Ah7wvzud;acE-L00v z$@>lWCLP@$p1CFDV8oNCINgr(cWt9e=C~VuV&aHuFZ^Z)^Gh?nY*_byTk*t?iX|(< ze@R)>WWSWG6Wlu+=5tDgsVjD>!AU7$hN%IxFFU!uU-x!>yodgvdzTT?G}>$vbkKQi z{GudtOtcR5P?-CG{NA~(+_fJ!ZB3u;iXJO&7YbXy&%haY?foTPGuOOY6$-HL1xD>N z0$D`Z0vPC$aI`sVGu@G)P6FDeQ=FBO*KFuMXlfHFsPrVZda1`)7dmN=Ra6vtOn1!E zp`p@ABb(c`k5Y&<6Ly=(o!t!V7~6A*nSzmqJHc_PmhL`sOZ=`uj8j-bLV}}GGWy&X zd6)je!$8^^n5z&LhC^cuIH6R>XMfdy3n!0WhAu9OLLr|p&GSJgPTFO)qntoWkwT^mG_*~l<=-q2USk9HL{LN{JQRxf$@>Mtbn8MPbeZJK(2lSrSxIiY zFCcsB;0!bjQ{*<$1c&E@jT@mL_+yxsdT1wrJPmMm3wxD)?xOLirJ3%2S-ulDe`OB2 z>$EeRu}eKK6g}-RSg48TXdd|&UU8bBlpSp#LRme7o$ z=#93P0#UH{G_qLm(GVor3*gZ&lu=0I#1CC({+Y{{A_qp6O#_4cS(U~XJt~BHF=MmG zJ-tDKTX_URAFlBrGB!$LP{Xzcv1!jpLE~oy01M-~)NNps?>*bc3*E0Gq2RH~c9C(n z@)wep8nXi>VhM?fYuE^wG-wfU?fm&22bARj1QAbXUB?a!<$`A_Qw8m4Pm`{D8}4!EF;e6 zSLZCJKEE=JEh#O( z;meCsFuieYosqd9(J+J2SgMoaGh}%}c}3DPGbdGal=SRbUU|_lnIHiLK-v$TBF$6Z z1p?t6x#Z`QJYL^ehZ(uKjODYyr(o5a^DAu6`_Jp!)CNeDXy^|r>F)I&TOtXBPDlub z#*<_4cA|nM@upGnAeKX3gH9@59p)bG>IG2d4WK+ua1vJw+hYv8S}$~GTvCHuxd{OL zG{H=r7f1-ShRl^~yEN5W?Goi0bkVw#%zQwI1U0)9J1b>?j9Ja0Gk)o;^YBjE(t)h?%EAPc z@gK;AvfBC8Y+t0lzaa|Bb+p2^ms>S4cUdyNDo=zJiwKp$ud(v5SQTPmWsv>`Sh_Qs zqN)Cu{J%aFx@@`wrii$8i!vhDxHoHqC)J#Xb{Rdfp&_k48f`XTX(sWbq!g!xg+vzk`{>+z(g1gM)gasDV!X40_i zB8gXn-kfup4trts42%m!L02HNxWzBaH}(jq91J(O>NQm zfYg~7gAVASV9c0RL?VkFR>G`YxC@pcAa>QET~8pC={drW;^?uf(fhV38FvqBn_5iB0ZR&Zru~IYgbz-t8FdfVWbqPSoFh$XCsdy+9m7dF`1?C9zdTS)r_lsL>j*M+6sHx(rWp4?T8$*9 zE^+uYg0SrLun z@Z^IVIGPha-9#dBjKW|rX0yJo!d~kye7KdTp3Pdbgd-qe&fow_6Vqopjz2rP|L3{B0+AHdWPBNWl>(JhQVDo-&XPGEG`Izr$H!Vw2W;-b*0|a-dw$(U@)D?|5&QZhwl3-@qDs@0n>h_#At#udQ%=P^$VA{5$@a z|H@1r^!$7IK_}6ElK=i3F0S8pjr{ZDh09RdYy61~hSts_KC_5P| zBlBAPMt)M~>$_CHv= zR&t)Iv!Wn4%A*McQ`2i~%j{iQ62SR$4RCUbQ-m0OmO&rxHn<(MoidZNEB$?B3g+Xp zZUdF%qk_6%@C$tAP3L*gxlc4X(`%CUU2nS7ABe+XY8NJ$b*ED+EAW26tsQgi7Wcwf zx6Yi9FM0jy6=5ytmFb)SW+n%FGPiP!umrmdsJY@K%5taao1Bu8)03^03QCg$t0~OV z%GEiOt(ui8(|I`Uzr2tbMs z9_mD$7nqUhW6$I~*6ImrreY<)dFJB{VK^{y6Q9JEU@-OTD0*5&h2s8F<)})d0NP6MLqr&M)wDc$j0~?FgHf%(ENvd{cG2;?Tf9?HHup^%vKFPdrPi?p z<`wy#^<_N&7+G!2(0_Tc)AG|_KkFKzyxP|Q2>CeG(N95JVdD9lyaPf){3;bwEET_m zv3dM~utFaHgL&nX3E*7xwVzOh74T@@Ccq_n&qmHM)Ue2g&+{!zcU=&6^vPctivEaK z$M0MwnKJzT4`J>{;<%-EF7?IJofRHUP$a1?JYKq}*Xf;;SS= z4bFA`^~J}RP(H9?2cUV>lP@(PHq8Tp^h6(Ly8CeCQN3+H`G2YAFw-V9i?Anu+PNKX zVoWM|Coz>5h`!!?IsP}`<;^j?cfIr&EOkM1u!|`^GucZ8458jyOLRc>6l-#F()Q+h z^72QXlyF)QCv}vwo?1;QjP#@8lmeG)vPQF))IvE}kLmW~(BOh=@zT9bFVAc3-*0gd z&ZF)Uhj%_4M)gstiWwxZQpmP83%NpbUc+9QD+COGl;S4EJe!XX2A|+MQEzB%G``3` zZwn@8otU2XV zUA!TRpTyZUVV0j?{%J~dfNDx_Yp9GYdVvuuh~rXfHI+jQl_&2?MOIC-X0$GVTP&48 z4$Dh!>+OpQ4t}9R$%Ha4aia@_z|3(wkBZ7YN~yicl>Do)pWd^ElO>Xyi*9{%Y9AO# z2*^*5q?F+>vVmX6qtz#9@+xQk)YsSV>M@Ip$vHLG!js}(I9RyoB_8Xm?QU`Gr{DA9 zr49=VS5`ZdaM&sLN4@EsvFQmSbuGh$e{)9h&Hz*9Bc=g+m}HeoS!ch!jz%igg=r}7 zHCIusH$bC71ZE3c&mMeff33G&1NH+?FU*3lFth+GU=h7s@L2a@Pn-^;tH;~S#hdwT zw^M-5l3%X9o!w(h4<^kjAbD&vw!~0n+TVq?p4>*6y-8w~$9}POutTL!ElFTFX}wIP zQim0PRWrZ2xPFR(d4SbDEyRS-BDl7mQBz(Xfi{5cWfLoXUuUap8=9WYe}3|N{~D;k z`D~qlcuY=VZ&i>y6!eeYb)4Vno-p1Dk|A%%q;@I7io zJj$-I_cmLbaL{$Vp$-u-qJ_Xu5=R+@|8Xv)ej?8N06NdqxVY++=?AOSmCJFoT*D$o z>YGXx_LpbZ)z>=b`=DlEU2Bl6+@2m%e840$%ijMC`Did6FL$Rlv>`swd^$Y#&=G1amM|Wdc((##CK+ z7Ak)YZ@#h+XECs7r@q8|glLVoOJ1g);)FDH(iG;QE9@y5nqA~h0$WSQ8Kug0`|_!b zl1Hn`f>5JbqD}|WHnu|x{unH-txk_%r>&f z`!;p=xCBzmmzy7LFB&s6H5DYS_Q-|JiCcH2n&yfOK-uy))qM*0Qv_1h|g>{Z%Af-rG?v-_BC*v>vdi{#o~OTbXP!NBRW9maW&7u}IxHS_jOcDa-=H>=%cpmJM_vaPJXoH zZGG-#TwEN!YK2}YSg1NW{Qje7NlAYpGy|{Ck|;aqXI}(sGfwmfHD2QQY7)ALZqI0s0ISFbOK zC!c#%=#`rao$Ld?G-5S-^CA)w#KIV;p4ooaiR%Vd`C8d>#F*xZ(ac2aCB>K~X@at# zh?r)5Zhujc6<8`s2gYom8ZW7BK9P*vo88bU0!mfuM=gh0{z;N;`f$R^X}pO4n(uS*02~- z=c}JcWnB)>73iN}zQMK4QwMU-R`#z{P^RFSmaB`?h5_E};S$SAKG!MV<;Bf>wRxsW zVLk3;a{>ZCr!GHK3r!@qqWN8tc+JbH6)zS@s^*JqO|{kb|qi@L@lESD4&+2B! z=U?N37}5o^#I+}ieV3+xHSGBOG(zS#UQ@-pNd7vToR;7|UqxeUhRf@l6s}mndL>?J}MY6%-rr= zF!1xM*(q1wN}pV+aKZLhEY%@ip9jC9k`ZgKZz5N!fmWS+-c1$IN)3ucLBWynM04tam<@-C28Id=ID{fjt|z z?`Hc5Pqaiu@w=UYq5fb@qf);0U&%NFKXyhUo3dA&p%6EM%f*Dt> zHulB~s*C*YVdfI#K@FXm0#7GdWxhWZMa>7N;YQwiC8E3#_YPS{AZIF$>O?Y1iSmm- zu`;hDj=uU`Y;;un+-*8>$xGb#!73{!>)Cci?Q|*Up)zrO)cM6gl3HwAwoM93v69TZ z10KVC?JkN1c-E448lKt`J56Ld&bug7=p21o*1ND`}{?eK5N}q%S2u~H&$12D>I5<)C zdd?0<3K+(pq$o#dsHUR9d9cbSIbg9Q&!kHeF+r?e*eLRT`C0BxNL&FPB5Ou|?p+{+ z&exKzw`W9(aCiG16PaJ^4U?$)oN*#KKov z4a@=#d(HN>Pq=3cF|~9r4c?XS4S)wQR_C4Vn~)o%1BDpZDxgc~NtNGcUH(ikEhv zx7~9u$?7AD-%g9#X-D<_(+3aibRNl z2iAZ*esXn;4IIfLPmgu)+E;2#(B=HXHK-{%^mBLlt~XcnaJv)8-(V^*H7eDOIw4Y>B%)TT{HuScc|JQg(hKrI$kd)S_SR0 z2^h~kuu1k2YMAz>5<6u#8ge7IVKP@@M=1v|Z|5OqY`0PD@jSMq!Td!(+n-`g3J3Sp zaU~Z^|+$McJefMzD1O*vFGQpPL}>l%V`b;V<^AY=f|J`*qA!m5N-m2kq>&q zOXl0JGG2K1j7mzrdzN)}udX@SBAYCOFNH=2Ws~j(Hl9Ph4V#fY4tqBRXOR>jt^D6`RL!G>FYTR7` zht!QpsjG8GA^Lc*xwI~d^Wtp|odS6UhygIon5|9VjYC^Ovxc*}pjn1X48fCzp7KQS z-*I@#^616rilM3obt&@sQL!cr&jW6M~KiZXiJ>I;u~p*=A< zpKsGC=B&5PRf`$1mA8hi9$wp8;%&Bd%eiJDy6-w#>;^uj_Z)qsziv3b>ZTX3fW zj4-po{LbO(VL07u!AJm5WHbEyq=W6v-ymKq>dollR}s6M(c$`2=)%In&7se~(#fr1 zkbc?AOY8B&x8oxZ# zH^ms3{%+1$bt=d`7h?8DpPoGJ5;pRZ0-u&bmV)cLF~Y<;15ti&AGLpiPb>ztE|7mX+gL2yKSx~9-GCj$u57pFUm zWT{|G!YFx_;s<=EUYS)JGzE;?mM#T!(}2$SE05~(nf5|>+g{oS{1AN;OkYzQfgu18$jCnhE)T$_$% z3B)+D-WC=%7oulp73a7<%x6OK3XCvS^4><;bwuc4(+&mt4d2t*>XC~$&oqDXpsslk z+0~PE!p=6dNX?gVZ}VC0Yj_9NMj8(r-8BCei^bx50V>k3^JVGd!>vVDaO@Ngh4t`A znv{eK0A@BXq`);x*15Rurk#593)ct9ss5e(TO5tH96fruQg^0dH$De(F(LoZ1`mQ> z%ysUGsm+-^FKzIaEF>d(=2-ZL4LjsT?s7dBhwXuFj;#Z~+0bS@;dIUz(W?1U!jX+! z_bfv=>26h08zIptz^{GD6w+ACBCzlx8j+#-0dqP1g}2Xz)M1$?(U89oJ+TjN3`3In z`7RgNAz7z^MJVj-J7e+fQ?8!_{;y;pm5xCkbIU;faWQ?qzZ04-&EZ|XKZNV)3$A~% zvS%zd{&U35^%xn__v?_C-pocWfk^c1P<+MT=~k|gR>%$gef`_-9{JDQ_{W!jOx^!V z=zhq?583!38~+jY{GZ+_3L0O+;CPYi;`u+XeOKZC0VD9Ae#(zK|7{)*{g}ERs_cg< z`+uU!ekhs$qLP`1)}zd$l{2f(2JL+HvB7s`ElbPQ}JC|en`cS4f40%_@OI)sLj7c z;fDno`FkdQ7}Fnq#Xq9(!^QgHZT>9_KOFBLG05Md@Lvtb-mi9S=Q8sL>bQRPj^}2` zu`k!!E2DSRB_@<6U8Hx>9zJ|{4!x6`J5w+F4s_-NI@R>t+?5i=WieAVF0QJZ+vM*( z%#%9x^wP9C^2_hdQ}jO+ti|o%=C;0dYa~uBX2&Aa=I&L*t06qPw@H3VBU~UJ4%FiQ ze%O~Fzs-?Z8zb3lwoJtS7=XQ-Pp@v^8mUXeEdIl8;4+)}|1t9Xwm3d{IG@h?6G0vZ z(^g-FPkWl2YYSx6wj{}qD$vFlgD!+pmnz9*C}HGkCGbWhQeK$P)Wdb!3YOyTukqVs zO76D3G5I=qjIf-9x`2unz0y=pQ-mTxEyu9Cxkk8tmcM7N6~}TgzM(=)#t-^wNj&1q z#>+A%o{9P{=W*&MwI`B}Od7%1q##Zb{SOC-qeSdcOqhG!{Oh1cI z8Qqy;V5+hyJNwE3pT+XzlM7*owH6}1lk9HJLwor~mzLO*#+M`j*>>;Y__LkEqYG7P5g zWcyQ<&}5tD(l|4smWHOLCT=a6HjWfNetSJ9>JXhwAUxtTeZEWE$MZ`!Ov&C2TR#NO zObImf2*NsDJR&Hi95yL4k=B_-j^+%+E*blBde^E~6De*>a=n6o#VqJ`G5Rda7k9;3 zgZRXscDO-gGt@40zRAor#2!hMa}viY!#w!tD$t%EQy44RrDvY#I5VZ=O}k}pA5|Yb zAhW~$3&lLfs+roDA;j?k3igZ5+xLtoxwl<0H8llDa}f~HI+{0e$=}+@eUG)+P@m#I zrR5NHC@WR|4|1}Uf_}a1osZ%54}ZJ+!M((CjRDM*7{gL8r#$vz7QLc3`T2lRjW99< zoPb~7)Q+5-MkdXcpf>a#x9DaT1(?KCG4X0;Kr@1U;q@k;Z%Q~5=0z9i}HGc%8-;y$ih)G^j;c2eliq-`d;HNzV>p}i*4ByzP2 z*TTaItp4@OLZqiIY!9sjeu_IRvpZqN^xUfk9Akx8db#;nzChyIf&LgCe^(|WE=5I5 zRB$-zcc)|&=X52S-mj)26QV5`PjMc8p3m_i8Cb}Z#~T$`wLh=)=#-8R7^nF35WY;I z(%snE`fgKQ&yX?U?%M~hp3xNN3=C9FHcTd!`&dk}7RsA$oz9W-Acx60UDnbM5NETd zv-9&C)rN~D0a-i#d7faREXiNWm>BC-O^_6!Fjm=>zFSkRJS7CZiJk^*hsG$A)yLH> z7e!AJDeu$r^Ce1$+_cy%hhCeBrWoMHU)ENd^LArbl9GY00rl9&3!7Ermnc2tnmCgv zhw62Sa-g0{`!SOI$J2!xUDoTHLl`9`SQThEXBznRVPYqdn6g4Alk?fD`R>bKwoA#& zzc{QFJH9=&`UoJxS^x~ckVkJL0L?W4c$wzic*I^15^?v3-5-7wE|>8qXoT)&{2LSmR}{MDd^c{ zR!W(jZHbT@ddly-d;=(V2zoKelhLn0Zz<~d{P`)ev1usg%E}a8H8wbycV+!_@0~%+ zyOoFDRU$MLVY8j1qzh4eMp#H~?N3bh%eK z&KgNeM@MImgjo_3%lULUUTVT%0ma27!42X~9?8CS+s6CwVC5DmhmKGa|JCr8gs!Js zdp#!}zY9=s^U~iVG#mxX9IIL^EurRdEi+s&B~D23c=HWf)8jBBsRGo^0q;dJxw({l z1s^duwwHh*bfdkqm{T7wA5c;bX|=sKIlWy}d&b*wQkfB9uG63Kc&_7X}M||8)u$7JTDi&yN^@GHe z8Xohf`GHGfD~sI*Wa%IdPyDIdXJN$_UhxDT6ciL(VRh;dK8f&I_ZM1CQz$wmMy-pw`c*!G=G6S;rF)*P>_ zwiQzRbK=-qLWBt?{R(PM_vAjg3RTTE`=-^CSk%g^bSd|<=e(A#EtrdWD^nb&GL-qJ zsnj-5tA)1hX(vp|Y*PoFiB$^k-ia;XgBC>h0oD&;+4@t9Qm^P+>Ju4^QXVH}2_>H( zhE|acV&CTh1@F>eP`wayIZ@HcHc@DOWYUDus55CLp>#rs{q?Y&vt1iB+mODQJ&sV3 zHPzfMZrPf%vYe56Aqv2GB`cKb)f|(+y5G<7ZsYn;#Cw-(Hmh7;V?0${^@L|h<8#-Y z**k8ycM8sx(?2Gon2DKpCToL-mOi)n&o-lvTqLf}%p;$UzbU`6G9Ms_a`Ov91T39Q z<(A*mYS+{dTrtG4wK3}TQaL#yzw+W-if8Ja(wel_;`^3lW#Nb2uQRe$jTKirJFcZ} zmi7vg6i_J?&pAMAE9|c1o*_%R%rt}xs+?fO*av!;<3D$+Wa`*nh#K1TH^-Z3@M3 zCn)9|U%+(<1KPWFCu#Kt6d;MJu3UI4;63DeF^Z%-Uwfz#+>r$#(y~UI0y(LQVoHXp zRn}ATYO9371>-P2HFPTCMz7oZv+#*U=?({NPNqCJ+@(1l;F28MsUwgoK`fS3GcQnS z#My`pDv23ZXUJ{0k+W(~%3QxY-6Nplea%Rtn_M93Tlm`351hS2MbEHPb91f1A-;vx zTwL6@5iGz?eyM=^#aF0$B9wL&ORZRc@+#VFvQS5R9yD2VgfD_`-;Unc(Z zsae1(0-jUz8hchJ1T#G~)zF()tqMl1X~JOLsU9tqddRS9xisn!XFkH^n-JNkG12j= z0lrbMZ!do}@%ggWSz)1WhMFxP;PK%0Z-e6>hCY}LqXaLGi@S}%Ve@5nFf#r_mH7?2 z<_6IQC-+7V<|+H4drx=uW=h>`#X5LdtuDL9t2y1-&u?FJ%i7X+b*nr1p;GF+&sq@y za|Ii(i1~w_#bRDRLG`<1pl#BX6u*mK&%hvhwIV^e%$a6DTK<=3G@I=5;<-2Ow%(TG z-Trf$iK+8m$9a?o;(IV{NoDU9$f;5aE(*6z*mPo~|D2lK;fqIPc$zo6q$JeX$Yxqy z3)ny7pl56xy$W5dWVDV4% zL<#Dx>wq7*4=Qm$%+%4_TS{=s>9$93wL^hxbLAZNT2bI|1$5@H`SM8}9LjT>&=;eR z*er|>$1!t(f*-z5x}&>4o=C)bczRlO&s;~=X1 z8cl{ya?f!b$-Usn-7~jQD|2^nuFe;M7xUNl1BXtq_bC(WX|yU5kJ}_@5Da05rL80?eBh`LZ$AwaeQsa3*tHNVU$haLTBo0 z&$=f_Eg&fM(~wl|uD>FbpR5+d{`}6IM`8Raup?B5hlk;P`irL@EBExoGTDuOA)^sl zi%UyZD+^mY;3HB%GfjDJdCqu{=abSFF0SL7k80P%SgK-)gI#9Ld?-z(!X7OeKe+y z6!es8NmP;`tx>(*IRVUxoz<*CzhR`#N*iKZY?9_NCU-vy*>t?V2;Ktc1t9Zj%=zOn zmlVA{Gf|h_?E_JV(JHAzEgwFdQC;K{YCD#dRET#kIemKHY2QUQ)WHIe^*&`ru%(*g zIvVq;_1Cq%_nUXCp>7#TT5(onC+ zXTTj&0sG!uE4=mbf&a{cSjW&%6`oF5+|P9ni(0L&;(BjjjA4?cNk(ygy|Ycrk~N4A zDiv_{T#pm=Vo5?vf{ZYa8Zp_J)-StAkKT&O%JDu`dU7zfB+;)!>aA)u>W;g{j{Mdp zPt$X8?dzO5f~t@aDaLd-rsc)wr*>oeJ22UDh~7j@OSYBIk&+!cYi(?>Q;{~x8d1u{ zc@DPKgGyT=K!QKrC@O<)gN06ZgI)CSdWZ$ifUvW#Z&>h=X4GYB|*a{fzJhy+K}Q{ z(Tg1WRqP!6X6*<%Daz0%tEG{}98QFcNLEIM)s)R;clzf!V_4>q-u|q%ST@qC3sg_G$s^r>AccC3lV^421L20*0H*ACE+ z8mDpC($M{3PTIK?ie{|O+Nd?>n9~!!d9jl(EI|b(Mn*<%QY7lrBU4%HHvJ_Igu&ft zsDVPCY||PXDCvLyWnRVl4=7XvFo2PJWgEAC*f0a)x1=_Zv~QQjownD!3TvfDCSof~ zC%ZLeYqLioazp=>?BOC(L&tR`de7XL zw3W#@dxxl0<@W)$7Yfv9sl%B%sVO{xQxXebs+X^}sgTi#a0>*j=YZ9T+bZOHDvWLJ z=gntq74X4z-TP=(=x0lZW7pF3Hl-D9zV<8QH@?h7>e-*-wHu^exK=JnrOsg;wX-a@z-uH#7UigMXDB4!`vLR>;{uKJGiYdDYG9&s#4WrV@EZ$k9n* zWCheJCzUL7WtAXDsCF`PHYz-nu8D5TyplhWofVjREIR8>Ymq}?z#1c5NbSoD{PDQv zc(tHE*~MN?RG?cxp%i&2!`52iNmy0Rz zE>2)1Fpm=j70gDJ8W5pQR8|6d}`qM-df)gap?*Yl&H8&B{Bm`f1re zuO!M~K#ATUL~M#MxO}1cFMTO*jR4=Zx6?jZN`u~WN34bllMgPv?Pk%0a@4AqQ>)4?b!1(X7WCz~ zOZ;5SiF30TjhkO|g&)l*%}MVotZI_G~~%Ny%_b5LmbF20IprERkOi(T=mU(=ngY06x5ak zja{G<@)0?rhdva)UKo$o8OQn2u4L#nCMl$9L*#k#YCanJY;>+@fjTIRJnC`riXX#=wm*VAU zGnbPUPv;oCYpd`KY7SnaKts$98280!BV_+%XjLbN1T8-VZYa~O@oBqA5Dd5O{R@irb@lXcQ}${d2s}Nf#DJepp+=`pB+E%k zA3@JCOT=!RAk^^@kfcHIZR^F}lcoM5VmES6`0j_fz-RC{*P*6dON>;O74Hu9_IiIc zfuelSln}a;MN_F%DA<*CZS{lYk>D4euf}Tn$26_F1IR*NZN3fjz;d^WS8$J|ZRFBE zC7bpSrswFt0X;#A3Z8;o_a6Kk+|-egZ=b;*|HGF@{*o!IPnA&J(mlR-33Vn;Ho~E4 zvejkB{9k+DK#8HWEclfVzZQsl_{(=NZ>fwgw?nEVGt*UFXA{>{)-!b-u3HE9v^q77 zIe5Rum>l;#o|OBx@i4h}A~#caQ^k71qwVhGWbfBd*$X_vbIJ;ifo-bL)wga6jZ^V%|e}ZKXS$XnD23}Giou4ii&U5bvDYELy5I4492Su zk18#K(93)0n!LYMve_{nd7^w56y{6H6R*xvPmr>@1noD&klTN7%`tixIR3wx?EUQb zpDL~v7$sBiPTAV%|vCD<)!_Sw1+*6Jg8-by6-TJCsi-2deHDtH{gnR(k z|1g{1Kl~3){r}OI<*lLou{n7IaEnAnzTN4ic`XRosl~sKFLu0m0b>mg{_k*~e?%j) zNnaM;X8CXNn3B^4LE3ThdnWpWXy4Xz;rIXAX904wSNZSs^ur^gAW$D6oJX#&&m#9& zKfiSN3rz72-haL#{Ov3JhKt|lMqW~2zdb~{HEm&Vbav~m@_iT%+$2!xS0{mOa>yu8 c$#XWpcu;09dw$X#`L~Pe+UN7m-g@xg0FwC5VE_OC From 606b478b9192d68cd4555dac0fc55baf6c0ac120 Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Tue, 20 Sep 2022 15:21:16 -0400 Subject: [PATCH 091/341] updates --- education/windows/index.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/education/windows/index.yml b/education/windows/index.yml index 5205e02a4a..49bf899f85 100644 --- a/education/windows/index.yml +++ b/education/windows/index.yml @@ -73,7 +73,7 @@ landingContent: links: - text: Provisioning package settings url: set-up-school-pcs-provisioning-package.md - - linkListType: video + - linkListType: videos links: - text: Use the Set up School PCs App url: https://www.youtube.com/watch?v=2ZLup_-PhkA From 11f137dc57d2aee3e74166702d67f950c6eee3aa Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Tue, 20 Sep 2022 15:21:22 -0400 Subject: [PATCH 092/341] updates --- education/windows/index.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/education/windows/index.yml b/education/windows/index.yml index 49bf899f85..5205e02a4a 100644 --- a/education/windows/index.yml +++ b/education/windows/index.yml @@ -73,7 +73,7 @@ landingContent: links: - text: Provisioning package settings url: set-up-school-pcs-provisioning-package.md - - linkListType: videos + - linkListType: video links: - text: Use the Set up School PCs App url: https://www.youtube.com/watch?v=2ZLup_-PhkA From e2e3e10af45e911f0ef1c473d3dbb1c4b3766625 Mon Sep 17 00:00:00 2001 From: Thorsten Sauter Date: Sun, 25 Sep 2022 04:47:48 -0700 Subject: [PATCH 093/341] Fixed broken link in Hello Planning Guide This fixes the broken link in the WHFB Planning Guide. The link text is the title of the page being linked to. --- .../hello-for-business/hello-planning-guide.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-planning-guide.md b/windows/security/identity-protection/hello-for-business/hello-planning-guide.md index 32137c8e75..e48d058b7b 100644 --- a/windows/security/identity-protection/hello-for-business/hello-planning-guide.md +++ b/windows/security/identity-protection/hello-for-business/hello-planning-guide.md @@ -93,7 +93,7 @@ It's fundamentally important to understand which deployment model to use for a s A deployment's trust type defines how each Windows Hello for Business client authenticates to the on-premises Active Directory. There are two trust types: key trust and certificate trust. > [!NOTE] -> Windows Hello for Business introduced a new trust model called cloud Kerberos trust, in early 2022. This model enables deployment of Windows Hello for Business using the infrastructure introduced for supporting [security key sign-in on Hybrid Azure AD-joined devices and on-premises resource access on Azure AD Joined devices](/azure/active-directory/authentication/howto-authentication-passwordless-security-key-on-premises). For more information, see ./hello-hybrid-cloud-kerberos-trust.md. +> Windows Hello for Business introduced a new trust model called cloud Kerberos trust, in early 2022. This model enables deployment of Windows Hello for Business using the infrastructure introduced for supporting [security key sign-in on Hybrid Azure AD-joined devices and on-premises resource access on Azure AD Joined devices](/azure/active-directory/authentication/howto-authentication-passwordless-security-key-on-premises). For more information, see [Hybrid Cloud Kerberos Trust Deployment (Preview)](./hello-hybrid-cloud-kerberos-trust.md). The key trust type does not require issuing authentication certificates to end users. Users authenticate using a hardware-bound key created during the built-in provisioning experience. This requires an adequate distribution of Windows Server 2016 or later domain controllers relative to your existing authentication and the number of users included in your Windows Hello for Business deployment. Read the [Planning an adequate number of Windows Server 2016 or later Domain Controllers for Windows Hello for Business deployments](hello-adequate-domain-controllers.md) to learn more. @@ -349,4 +349,4 @@ If boxes **2a** or **2b** read **modern management** and you want devices to aut ## Congratulations, You're Done -Your Windows Hello for Business planning worksheet should be complete. This guide provided understanding of the components used in the Windows Hello for Business infrastructure and rationalization of why they are used. The worksheet gives you an overview of the requirements needed to continue the next phase of the deployment. With this worksheet, you'll be able to identify key elements of your Windows Hello for Business deployment. \ No newline at end of file +Your Windows Hello for Business planning worksheet should be complete. This guide provided understanding of the components used in the Windows Hello for Business infrastructure and rationalization of why they are used. The worksheet gives you an overview of the requirements needed to continue the next phase of the deployment. With this worksheet, you'll be able to identify key elements of your Windows Hello for Business deployment. From f36fa0a98d6930784bd78fc3702fd0ca0484e643 Mon Sep 17 00:00:00 2001 From: Vinay Pamnani <37223378+vinaypamnani-msft@users.noreply.github.com> Date: Tue, 27 Sep 2022 10:52:21 -0400 Subject: [PATCH 094/341] Metadata Changes --- .../hello-for-business/retired/hello-how-it-works.md | 6 +++--- .../advanced-security-audit-policy-settings.md | 6 +++--- .../auditing/advanced-security-auditing.md | 6 +++--- ...nitoring-recommendations-for-many-audit-events.md | 6 +++--- ...apply-a-basic-audit-policy-on-a-file-or-folder.md | 6 +++--- .../auditing/audit-account-lockout.md | 6 +++--- .../auditing/audit-application-generated.md | 6 +++--- .../auditing/audit-application-group-management.md | 6 +++--- .../auditing/audit-audit-policy-change.md | 6 +++--- .../auditing/audit-authentication-policy-change.md | 6 +++--- .../auditing/audit-authorization-policy-change.md | 6 +++--- .../auditing/audit-central-access-policy-staging.md | 6 +++--- .../auditing/audit-certification-services.md | 6 +++--- .../auditing/audit-computer-account-management.md | 6 +++--- .../auditing/audit-credential-validation.md | 6 +++--- .../audit-detailed-directory-service-replication.md | 6 +++--- .../auditing/audit-detailed-file-share.md | 6 +++--- .../auditing/audit-directory-service-access.md | 6 +++--- .../auditing/audit-directory-service-changes.md | 6 +++--- .../auditing/audit-directory-service-replication.md | 6 +++--- .../auditing/audit-distribution-group-management.md | 6 +++--- .../auditing/audit-dpapi-activity.md | 6 +++--- .../threat-protection/auditing/audit-file-share.md | 6 +++--- .../threat-protection/auditing/audit-file-system.md | 6 +++--- .../auditing/audit-filtering-platform-connection.md | 6 +++--- .../auditing/audit-filtering-platform-packet-drop.md | 6 +++--- .../audit-filtering-platform-policy-change.md | 6 +++--- .../auditing/audit-group-membership.md | 6 +++--- .../auditing/audit-handle-manipulation.md | 6 +++--- .../threat-protection/auditing/audit-ipsec-driver.md | 6 +++--- .../auditing/audit-ipsec-extended-mode.md | 6 +++--- .../auditing/audit-ipsec-main-mode.md | 6 +++--- .../auditing/audit-ipsec-quick-mode.md | 6 +++--- .../audit-kerberos-authentication-service.md | 6 +++--- .../audit-kerberos-service-ticket-operations.md | 6 +++--- .../auditing/audit-kernel-object.md | 6 +++--- .../threat-protection/auditing/audit-logoff.md | 6 +++--- .../threat-protection/auditing/audit-logon.md | 6 +++--- .../audit-mpssvc-rule-level-policy-change.md | 6 +++--- .../auditing/audit-network-policy-server.md | 6 +++--- .../auditing/audit-non-sensitive-privilege-use.md | 6 +++--- .../auditing/audit-other-account-logon-events.md | 6 +++--- .../audit-other-account-management-events.md | 6 +++--- .../auditing/audit-other-logonlogoff-events.md | 6 +++--- .../auditing/audit-other-object-access-events.md | 6 +++--- .../auditing/audit-other-policy-change-events.md | 6 +++--- .../auditing/audit-other-privilege-use-events.md | 6 +++--- .../auditing/audit-other-system-events.md | 6 +++--- .../threat-protection/auditing/audit-pnp-activity.md | 6 +++--- .../auditing/audit-process-creation.md | 6 +++--- .../auditing/audit-process-termination.md | 6 +++--- .../threat-protection/auditing/audit-registry.md | 6 +++--- .../auditing/audit-removable-storage.md | 6 +++--- .../threat-protection/auditing/audit-rpc-events.md | 6 +++--- .../security/threat-protection/auditing/audit-sam.md | 6 +++--- .../auditing/audit-security-group-management.md | 6 +++--- .../auditing/audit-security-state-change.md | 6 +++--- .../auditing/audit-security-system-extension.md | 6 +++--- .../auditing/audit-sensitive-privilege-use.md | 6 +++--- .../auditing/audit-special-logon.md | 6 +++--- .../auditing/audit-system-integrity.md | 6 +++--- .../auditing/audit-token-right-adjusted.md | 6 +++--- .../auditing/audit-user-account-management.md | 6 +++--- .../auditing/audit-user-device-claims.md | 6 +++--- .../auditing/basic-audit-account-logon-events.md | 6 +++--- .../auditing/basic-audit-account-management.md | 6 +++--- .../auditing/basic-audit-directory-service-access.md | 6 +++--- .../auditing/basic-audit-logon-events.md | 6 +++--- .../auditing/basic-audit-object-access.md | 6 +++--- .../auditing/basic-audit-policy-change.md | 6 +++--- .../auditing/basic-audit-privilege-use.md | 6 +++--- .../auditing/basic-audit-process-tracking.md | 6 +++--- .../auditing/basic-audit-system-events.md | 6 +++--- .../auditing/basic-security-audit-policies.md | 6 +++--- .../auditing/basic-security-audit-policy-settings.md | 6 +++--- ...ic-audit-policy-settings-for-an-event-category.md | 6 +++--- .../threat-protection/auditing/event-1100.md | 6 +++--- .../threat-protection/auditing/event-1102.md | 6 +++--- .../threat-protection/auditing/event-1104.md | 6 +++--- .../threat-protection/auditing/event-1105.md | 6 +++--- .../threat-protection/auditing/event-1108.md | 6 +++--- .../threat-protection/auditing/event-4608.md | 6 +++--- .../threat-protection/auditing/event-4610.md | 6 +++--- .../threat-protection/auditing/event-4611.md | 6 +++--- .../threat-protection/auditing/event-4612.md | 6 +++--- .../threat-protection/auditing/event-4614.md | 6 +++--- .../threat-protection/auditing/event-4615.md | 6 +++--- .../threat-protection/auditing/event-4616.md | 6 +++--- .../threat-protection/auditing/event-4618.md | 6 +++--- .../threat-protection/auditing/event-4621.md | 6 +++--- .../threat-protection/auditing/event-4622.md | 6 +++--- .../threat-protection/auditing/event-4624.md | 6 +++--- .../threat-protection/auditing/event-4625.md | 6 +++--- .../threat-protection/auditing/event-4626.md | 6 +++--- .../threat-protection/auditing/event-4627.md | 6 +++--- .../threat-protection/auditing/event-4634.md | 6 +++--- .../threat-protection/auditing/event-4647.md | 6 +++--- .../threat-protection/auditing/event-4648.md | 6 +++--- .../threat-protection/auditing/event-4649.md | 6 +++--- .../threat-protection/auditing/event-4656.md | 6 +++--- .../threat-protection/auditing/event-4657.md | 6 +++--- .../threat-protection/auditing/event-4658.md | 6 +++--- .../threat-protection/auditing/event-4660.md | 6 +++--- .../threat-protection/auditing/event-4661.md | 6 +++--- .../threat-protection/auditing/event-4662.md | 6 +++--- .../threat-protection/auditing/event-4663.md | 6 +++--- .../threat-protection/auditing/event-4664.md | 6 +++--- .../threat-protection/auditing/event-4670.md | 6 +++--- .../threat-protection/auditing/event-4671.md | 6 +++--- .../threat-protection/auditing/event-4672.md | 6 +++--- .../threat-protection/auditing/event-4673.md | 6 +++--- .../threat-protection/auditing/event-4674.md | 6 +++--- .../threat-protection/auditing/event-4675.md | 6 +++--- .../threat-protection/auditing/event-4688.md | 6 +++--- .../threat-protection/auditing/event-4689.md | 6 +++--- .../threat-protection/auditing/event-4690.md | 6 +++--- .../threat-protection/auditing/event-4691.md | 6 +++--- .../threat-protection/auditing/event-4692.md | 6 +++--- .../threat-protection/auditing/event-4693.md | 6 +++--- .../threat-protection/auditing/event-4694.md | 6 +++--- .../threat-protection/auditing/event-4695.md | 6 +++--- .../threat-protection/auditing/event-4696.md | 6 +++--- .../threat-protection/auditing/event-4697.md | 6 +++--- .../threat-protection/auditing/event-4698.md | 6 +++--- .../threat-protection/auditing/event-4699.md | 6 +++--- .../threat-protection/auditing/event-4700.md | 6 +++--- .../threat-protection/auditing/event-4701.md | 6 +++--- .../threat-protection/auditing/event-4702.md | 6 +++--- .../threat-protection/auditing/event-4703.md | 6 +++--- .../threat-protection/auditing/event-4704.md | 6 +++--- .../threat-protection/auditing/event-4705.md | 6 +++--- .../threat-protection/auditing/event-4706.md | 6 +++--- .../threat-protection/auditing/event-4707.md | 6 +++--- .../threat-protection/auditing/event-4713.md | 6 +++--- .../threat-protection/auditing/event-4714.md | 6 +++--- .../threat-protection/auditing/event-4715.md | 6 +++--- .../threat-protection/auditing/event-4716.md | 6 +++--- .../threat-protection/auditing/event-4717.md | 6 +++--- .../threat-protection/auditing/event-4718.md | 6 +++--- .../threat-protection/auditing/event-4719.md | 6 +++--- .../threat-protection/auditing/event-4720.md | 6 +++--- .../threat-protection/auditing/event-4722.md | 6 +++--- .../threat-protection/auditing/event-4723.md | 6 +++--- .../threat-protection/auditing/event-4724.md | 6 +++--- .../threat-protection/auditing/event-4725.md | 6 +++--- .../threat-protection/auditing/event-4726.md | 6 +++--- .../threat-protection/auditing/event-4731.md | 6 +++--- .../threat-protection/auditing/event-4732.md | 6 +++--- .../threat-protection/auditing/event-4733.md | 6 +++--- .../threat-protection/auditing/event-4734.md | 6 +++--- .../threat-protection/auditing/event-4735.md | 6 +++--- .../threat-protection/auditing/event-4738.md | 6 +++--- .../threat-protection/auditing/event-4739.md | 6 +++--- .../threat-protection/auditing/event-4740.md | 6 +++--- .../threat-protection/auditing/event-4741.md | 6 +++--- .../threat-protection/auditing/event-4742.md | 6 +++--- .../threat-protection/auditing/event-4743.md | 6 +++--- .../threat-protection/auditing/event-4749.md | 6 +++--- .../threat-protection/auditing/event-4750.md | 6 +++--- .../threat-protection/auditing/event-4751.md | 6 +++--- .../threat-protection/auditing/event-4752.md | 6 +++--- .../threat-protection/auditing/event-4753.md | 6 +++--- .../threat-protection/auditing/event-4764.md | 6 +++--- .../threat-protection/auditing/event-4765.md | 6 +++--- .../threat-protection/auditing/event-4766.md | 6 +++--- .../threat-protection/auditing/event-4767.md | 6 +++--- .../threat-protection/auditing/event-4768.md | 6 +++--- .../threat-protection/auditing/event-4769.md | 6 +++--- .../threat-protection/auditing/event-4770.md | 6 +++--- .../threat-protection/auditing/event-4771.md | 6 +++--- .../threat-protection/auditing/event-4772.md | 6 +++--- .../threat-protection/auditing/event-4773.md | 6 +++--- .../threat-protection/auditing/event-4774.md | 6 +++--- .../threat-protection/auditing/event-4775.md | 6 +++--- .../threat-protection/auditing/event-4776.md | 6 +++--- .../threat-protection/auditing/event-4777.md | 6 +++--- .../threat-protection/auditing/event-4778.md | 6 +++--- .../threat-protection/auditing/event-4779.md | 6 +++--- .../threat-protection/auditing/event-4780.md | 6 +++--- .../threat-protection/auditing/event-4781.md | 6 +++--- .../threat-protection/auditing/event-4782.md | 6 +++--- .../threat-protection/auditing/event-4793.md | 6 +++--- .../threat-protection/auditing/event-4794.md | 6 +++--- .../threat-protection/auditing/event-4798.md | 6 +++--- .../threat-protection/auditing/event-4799.md | 6 +++--- .../threat-protection/auditing/event-4800.md | 6 +++--- .../threat-protection/auditing/event-4801.md | 6 +++--- .../threat-protection/auditing/event-4802.md | 6 +++--- .../threat-protection/auditing/event-4803.md | 6 +++--- .../threat-protection/auditing/event-4816.md | 6 +++--- .../threat-protection/auditing/event-4817.md | 6 +++--- .../threat-protection/auditing/event-4818.md | 6 +++--- .../threat-protection/auditing/event-4819.md | 6 +++--- .../threat-protection/auditing/event-4826.md | 6 +++--- .../threat-protection/auditing/event-4864.md | 6 +++--- .../threat-protection/auditing/event-4865.md | 6 +++--- .../threat-protection/auditing/event-4866.md | 6 +++--- .../threat-protection/auditing/event-4867.md | 6 +++--- .../threat-protection/auditing/event-4902.md | 6 +++--- .../threat-protection/auditing/event-4904.md | 6 +++--- .../threat-protection/auditing/event-4905.md | 6 +++--- .../threat-protection/auditing/event-4906.md | 6 +++--- .../threat-protection/auditing/event-4907.md | 6 +++--- .../threat-protection/auditing/event-4908.md | 6 +++--- .../threat-protection/auditing/event-4909.md | 6 +++--- .../threat-protection/auditing/event-4910.md | 6 +++--- .../threat-protection/auditing/event-4911.md | 6 +++--- .../threat-protection/auditing/event-4912.md | 6 +++--- .../threat-protection/auditing/event-4913.md | 6 +++--- .../threat-protection/auditing/event-4928.md | 6 +++--- .../threat-protection/auditing/event-4929.md | 6 +++--- .../threat-protection/auditing/event-4930.md | 6 +++--- .../threat-protection/auditing/event-4931.md | 6 +++--- .../threat-protection/auditing/event-4932.md | 6 +++--- .../threat-protection/auditing/event-4933.md | 6 +++--- .../threat-protection/auditing/event-4934.md | 6 +++--- .../threat-protection/auditing/event-4935.md | 6 +++--- .../threat-protection/auditing/event-4936.md | 6 +++--- .../threat-protection/auditing/event-4937.md | 6 +++--- .../threat-protection/auditing/event-4944.md | 6 +++--- .../threat-protection/auditing/event-4945.md | 6 +++--- .../threat-protection/auditing/event-4946.md | 6 +++--- .../threat-protection/auditing/event-4947.md | 6 +++--- .../threat-protection/auditing/event-4948.md | 6 +++--- .../threat-protection/auditing/event-4949.md | 6 +++--- .../threat-protection/auditing/event-4950.md | 6 +++--- .../threat-protection/auditing/event-4951.md | 6 +++--- .../threat-protection/auditing/event-4952.md | 6 +++--- .../threat-protection/auditing/event-4953.md | 6 +++--- .../threat-protection/auditing/event-4954.md | 6 +++--- .../threat-protection/auditing/event-4956.md | 6 +++--- .../threat-protection/auditing/event-4957.md | 6 +++--- .../threat-protection/auditing/event-4958.md | 6 +++--- .../threat-protection/auditing/event-4964.md | 6 +++--- .../threat-protection/auditing/event-4985.md | 6 +++--- .../threat-protection/auditing/event-5024.md | 6 +++--- .../threat-protection/auditing/event-5025.md | 6 +++--- .../threat-protection/auditing/event-5027.md | 6 +++--- .../threat-protection/auditing/event-5028.md | 6 +++--- .../threat-protection/auditing/event-5029.md | 6 +++--- .../threat-protection/auditing/event-5030.md | 6 +++--- .../threat-protection/auditing/event-5031.md | 6 +++--- .../threat-protection/auditing/event-5032.md | 6 +++--- .../threat-protection/auditing/event-5033.md | 6 +++--- .../threat-protection/auditing/event-5034.md | 6 +++--- .../threat-protection/auditing/event-5035.md | 6 +++--- .../threat-protection/auditing/event-5037.md | 6 +++--- .../threat-protection/auditing/event-5038.md | 6 +++--- .../threat-protection/auditing/event-5039.md | 6 +++--- .../threat-protection/auditing/event-5051.md | 6 +++--- .../threat-protection/auditing/event-5056.md | 6 +++--- .../threat-protection/auditing/event-5057.md | 6 +++--- .../threat-protection/auditing/event-5058.md | 6 +++--- .../threat-protection/auditing/event-5059.md | 6 +++--- .../threat-protection/auditing/event-5060.md | 6 +++--- .../threat-protection/auditing/event-5061.md | 6 +++--- .../threat-protection/auditing/event-5062.md | 6 +++--- .../threat-protection/auditing/event-5063.md | 6 +++--- .../threat-protection/auditing/event-5064.md | 6 +++--- .../threat-protection/auditing/event-5065.md | 6 +++--- .../threat-protection/auditing/event-5066.md | 6 +++--- .../threat-protection/auditing/event-5067.md | 6 +++--- .../threat-protection/auditing/event-5068.md | 6 +++--- .../threat-protection/auditing/event-5069.md | 6 +++--- .../threat-protection/auditing/event-5070.md | 6 +++--- .../threat-protection/auditing/event-5136.md | 6 +++--- .../threat-protection/auditing/event-5137.md | 6 +++--- .../threat-protection/auditing/event-5138.md | 6 +++--- .../threat-protection/auditing/event-5139.md | 6 +++--- .../threat-protection/auditing/event-5140.md | 6 +++--- .../threat-protection/auditing/event-5141.md | 6 +++--- .../threat-protection/auditing/event-5142.md | 6 +++--- .../threat-protection/auditing/event-5143.md | 6 +++--- .../threat-protection/auditing/event-5144.md | 6 +++--- .../threat-protection/auditing/event-5145.md | 6 +++--- .../threat-protection/auditing/event-5148.md | 6 +++--- .../threat-protection/auditing/event-5149.md | 6 +++--- .../threat-protection/auditing/event-5150.md | 6 +++--- .../threat-protection/auditing/event-5151.md | 6 +++--- .../threat-protection/auditing/event-5152.md | 6 +++--- .../threat-protection/auditing/event-5153.md | 6 +++--- .../threat-protection/auditing/event-5154.md | 6 +++--- .../threat-protection/auditing/event-5155.md | 6 +++--- .../threat-protection/auditing/event-5156.md | 6 +++--- .../threat-protection/auditing/event-5157.md | 6 +++--- .../threat-protection/auditing/event-5158.md | 6 +++--- .../threat-protection/auditing/event-5159.md | 6 +++--- .../threat-protection/auditing/event-5168.md | 6 +++--- .../threat-protection/auditing/event-5376.md | 6 +++--- .../threat-protection/auditing/event-5377.md | 6 +++--- .../threat-protection/auditing/event-5378.md | 6 +++--- .../threat-protection/auditing/event-5447.md | 6 +++--- .../threat-protection/auditing/event-5632.md | 6 +++--- .../threat-protection/auditing/event-5633.md | 6 +++--- .../threat-protection/auditing/event-5712.md | 6 +++--- .../threat-protection/auditing/event-5888.md | 6 +++--- .../threat-protection/auditing/event-5889.md | 6 +++--- .../threat-protection/auditing/event-5890.md | 6 +++--- .../threat-protection/auditing/event-6144.md | 6 +++--- .../threat-protection/auditing/event-6145.md | 6 +++--- .../threat-protection/auditing/event-6281.md | 6 +++--- .../threat-protection/auditing/event-6400.md | 6 +++--- .../threat-protection/auditing/event-6401.md | 6 +++--- .../threat-protection/auditing/event-6402.md | 6 +++--- .../threat-protection/auditing/event-6403.md | 6 +++--- .../threat-protection/auditing/event-6404.md | 6 +++--- .../threat-protection/auditing/event-6405.md | 6 +++--- .../threat-protection/auditing/event-6406.md | 6 +++--- .../threat-protection/auditing/event-6407.md | 6 +++--- .../threat-protection/auditing/event-6408.md | 6 +++--- .../threat-protection/auditing/event-6409.md | 6 +++--- .../threat-protection/auditing/event-6410.md | 6 +++--- .../threat-protection/auditing/event-6416.md | 6 +++--- .../threat-protection/auditing/event-6419.md | 6 +++--- .../threat-protection/auditing/event-6420.md | 6 +++--- .../threat-protection/auditing/event-6421.md | 6 +++--- .../threat-protection/auditing/event-6422.md | 6 +++--- .../threat-protection/auditing/event-6423.md | 6 +++--- .../threat-protection/auditing/event-6424.md | 6 +++--- .../file-system-global-object-access-auditing.md | 6 +++--- .../how-to-list-xml-elements-in-eventdata.md | 6 +++--- ...tor-central-access-policy-and-rule-definitions.md | 6 +++--- .../auditing/monitor-claim-types.md | 6 +++--- .../monitor-resource-attribute-definitions.md | 6 +++--- ...ess-policies-associated-with-files-and-folders.md | 6 +++--- ...al-access-policies-that-apply-on-a-file-server.md | 6 +++--- ...r-the-resource-attributes-on-files-and-folders.md | 6 +++--- .../monitor-the-use-of-removable-storage-devices.md | 6 +++--- .../monitor-user-and-device-claims-during-sign-in.md | 6 +++--- .../threat-protection/auditing/other-events.md | 6 +++--- ...and-deploying-advanced-security-audit-policies.md | 6 +++--- .../registry-global-object-access-auditing.md | 6 +++--- .../auditing/security-auditing-overview.md | 6 +++--- ...ions-to-monitor-dynamic-access-control-objects.md | 6 +++--- .../auditing/view-the-security-event-log.md | 6 +++--- ...ws-support-advanced-audit-policy-configuration.md | 6 +++--- ...tualization-based-protection-of-code-integrity.md | 6 +++--- ...urity-and-windows-defender-application-control.md | 6 +++--- ...tualization-based-protection-of-code-integrity.md | 6 +++--- .../configure-md-app-guard.md | 6 +++--- .../install-md-app-guard.md | 6 +++--- .../md-app-guard-browser-extension.md | 6 +++--- .../md-app-guard-overview.md | 6 +++--- .../reqs-md-app-guard.md | 2 +- ...rosoft-defender-smartscreen-available-settings.md | 6 +++--- .../microsoft-defender-smartscreen-overview.md | 6 +++--- ...oft-defender-smartscreen-set-individual-device.md | 6 +++--- ...hing-protection-microsoft-defender-smartscreen.md | 10 +++++----- .../access-credential-manager-as-a-trusted-caller.md | 6 +++--- .../access-this-computer-from-the-network.md | 6 +++--- .../account-lockout-duration.md | 6 +++--- .../account-lockout-policy.md | 6 +++--- .../account-lockout-threshold.md | 6 +++--- .../security-policy-settings/account-policies.md | 6 +++--- .../accounts-administrator-account-status.md | 6 +++--- .../accounts-block-microsoft-accounts.md | 6 +++--- .../accounts-guest-account-status.md | 6 +++--- ...t-use-of-blank-passwords-to-console-logon-only.md | 6 +++--- .../accounts-rename-administrator-account.md | 6 +++--- .../accounts-rename-guest-account.md | 6 +++--- .../act-as-part-of-the-operating-system.md | 6 +++--- .../add-workstations-to-domain.md | 6 +++--- .../adjust-memory-quotas-for-a-process.md | 6 +++--- .../administer-security-policy-settings.md | 6 +++--- .../security-policy-settings/allow-log-on-locally.md | 6 +++--- .../allow-log-on-through-remote-desktop-services.md | 6 +++--- ...udit-audit-the-access-of-global-system-objects.md | 6 +++--- ...-audit-the-use-of-backup-and-restore-privilege.md | 6 +++--- ...-audit-policy-subcategory-settings-to-override.md | 6 +++--- .../security-policy-settings/audit-policy.md | 6 +++--- ...m-immediately-if-unable-to-log-security-audits.md | 6 +++--- .../back-up-files-and-directories.md | 6 +++--- .../bypass-traverse-checking.md | 6 +++--- .../change-the-system-time.md | 6 +++--- .../security-policy-settings/change-the-time-zone.md | 6 +++--- .../security-policy-settings/create-a-pagefile.md | 6 +++--- .../create-a-token-object.md | 6 +++--- .../create-global-objects.md | 6 +++--- .../create-permanent-shared-objects.md | 6 +++--- .../create-symbolic-links.md | 6 +++--- ...ity-descriptor-definition-language-sddl-syntax.md | 6 +++--- ...ity-descriptor-definition-language-sddl-syntax.md | 6 +++--- .../security-policy-settings/debug-programs.md | 6 +++--- .../deny-access-to-this-computer-from-the-network.md | 6 +++--- .../deny-log-on-as-a-batch-job.md | 6 +++--- .../deny-log-on-as-a-service.md | 6 +++--- .../security-policy-settings/deny-log-on-locally.md | 6 +++--- .../deny-log-on-through-remote-desktop-services.md | 6 +++--- .../devices-allow-undock-without-having-to-log-on.md | 6 +++--- ...es-allowed-to-format-and-eject-removable-media.md | 6 +++--- ...-prevent-users-from-installing-printer-drivers.md | 6 +++--- ...t-cd-rom-access-to-locally-logged-on-user-only.md | 6 +++--- ...t-floppy-access-to-locally-logged-on-user-only.md | 6 +++--- ...oller-allow-server-operators-to-schedule-tasks.md | 6 +++--- ...in-controller-ldap-server-signing-requirements.md | 6 +++--- ...roller-refuse-machine-account-password-changes.md | 6 +++--- ...lly-encrypt-or-sign-secure-channel-data-always.md | 6 +++--- ...ally-encrypt-secure-channel-data-when-possible.md | 6 +++--- ...gitally-sign-secure-channel-data-when-possible.md | 6 +++--- ...ember-disable-machine-account-password-changes.md | 6 +++--- ...in-member-maximum-machine-account-password-age.md | 6 +++--- ...quire-strong-windows-2000-or-later-session-key.md | 6 +++--- ...and-user-accounts-to-be-trusted-for-delegation.md | 6 +++--- .../enforce-password-history.md | 6 +++--- .../enforce-user-logon-restrictions.md | 6 +++--- .../force-shutdown-from-a-remote-system.md | 6 +++--- .../generate-security-audits.md | 6 +++--- .../how-to-configure-security-policy-settings.md | 6 +++--- .../impersonate-a-client-after-authentication.md | 6 +++--- .../increase-a-process-working-set.md | 6 +++--- .../increase-scheduling-priority.md | 6 +++--- ...ay-user-information-when-the-session-is-locked.md | 6 +++--- ...nteractive-logon-do-not-display-last-user-name.md | 6 +++--- .../interactive-logon-do-not-require-ctrl-alt-del.md | 6 +++--- ...ractive-logon-dont-display-username-at-sign-in.md | 6 +++--- ...active-logon-machine-account-lockout-threshold.md | 6 +++--- .../interactive-logon-machine-inactivity-limit.md | 6 +++--- ...on-message-text-for-users-attempting-to-log-on.md | 8 ++++---- ...n-message-title-for-users-attempting-to-log-on.md | 8 ++++---- ...che-in-case-domain-controller-is-not-available.md | 6 +++--- ...ompt-user-to-change-password-before-expiration.md | 6 +++--- ...ontroller-authentication-to-unlock-workstation.md | 6 +++--- .../interactive-logon-require-smart-card.md | 6 +++--- .../interactive-logon-smart-card-removal-behavior.md | 6 +++--- .../security-policy-settings/kerberos-policy.md | 6 +++--- .../load-and-unload-device-drivers.md | 6 +++--- .../security-policy-settings/lock-pages-in-memory.md | 6 +++--- .../log-on-as-a-batch-job.md | 6 +++--- .../security-policy-settings/log-on-as-a-service.md | 6 +++--- .../manage-auditing-and-security-log.md | 6 +++--- .../maximum-lifetime-for-service-ticket.md | 6 +++--- .../maximum-lifetime-for-user-ticket-renewal.md | 6 +++--- .../maximum-lifetime-for-user-ticket.md | 6 +++--- .../security-policy-settings/maximum-password-age.md | 6 +++--- ...m-tolerance-for-computer-clock-synchronization.md | 6 +++--- ...rk-client-digitally-sign-communications-always.md | 6 +++--- ...nencrypted-password-to-third-party-smb-servers.md | 6 +++--- ...f-idle-time-required-before-suspending-session.md | 6 +++--- ...r-attempt-s4u2self-to-obtain-claim-information.md | 6 +++--- ...rk-server-digitally-sign-communications-always.md | 6 +++--- ...ver-disconnect-clients-when-logon-hours-expire.md | 6 +++--- ...server-server-spn-target-name-validation-level.md | 6 +++--- .../security-policy-settings/minimum-password-age.md | 6 +++--- .../minimum-password-length.md | 6 +++--- .../modify-an-object-label.md | 6 +++--- .../modify-firmware-environment-values.md | 6 +++--- ...ork-access-allow-anonymous-sidname-translation.md | 6 +++--- ...onymous-enumeration-of-sam-accounts-and-shares.md | 6 +++--- ...ot-allow-anonymous-enumeration-of-sam-accounts.md | 6 +++--- ...rds-and-credentials-for-network-authentication.md | 6 +++--- ...-everyone-permissions-apply-to-anonymous-users.md | 6 +++--- ...s-named-pipes-that-can-be-accessed-anonymously.md | 6 +++--- ...emotely-accessible-registry-paths-and-subpaths.md | 6 +++--- ...work-access-remotely-accessible-registry-paths.md | 6 +++--- ...ict-anonymous-access-to-named-pipes-and-shares.md | 6 +++--- ...trict-clients-allowed-to-make-remote-sam-calls.md | 6 +++--- ...access-shares-that-can-be-accessed-anonymously.md | 6 +++--- ...-sharing-and-security-model-for-local-accounts.md | 6 +++--- .../network-list-manager-policies.md | 6 +++--- ...local-system-to-use-computer-identity-for-ntlm.md | 6 +++--- ...curity-allow-localsystem-null-session-fallback.md | 6 +++--- ...ests-to-this-computer-to-use-online-identities.md | 6 +++--- ...onfigure-encryption-types-allowed-for-kerberos.md | 6 +++--- ...lan-manager-hash-value-on-next-password-change.md | 6 +++--- ...-security-force-logoff-when-logon-hours-expire.md | 6 +++--- ...work-security-lan-manager-authentication-level.md | 6 +++--- ...work-security-ldap-client-signing-requirements.md | 6 +++--- ...or-ntlm-ssp-based-including-secure-rpc-clients.md | 6 +++--- ...or-ntlm-ssp-based-including-secure-rpc-servers.md | 6 +++--- ...mote-server-exceptions-for-ntlm-authentication.md | 6 +++--- ...rict-ntlm-add-server-exceptions-in-this-domain.md | 6 +++--- ...rity-restrict-ntlm-audit-incoming-ntlm-traffic.md | 6 +++--- ...-ntlm-audit-ntlm-authentication-in-this-domain.md | 6 +++--- ...k-security-restrict-ntlm-incoming-ntlm-traffic.md | 6 +++--- ...strict-ntlm-ntlm-authentication-in-this-domain.md | 6 +++--- ...t-ntlm-outgoing-ntlm-traffic-to-remote-servers.md | 6 +++--- .../password-must-meet-complexity-requirements.md | 6 +++--- .../security-policy-settings/password-policy.md | 6 +++--- .../perform-volume-maintenance-tasks.md | 6 +++--- .../profile-single-process.md | 6 +++--- .../profile-system-performance.md | 6 +++--- ...y-console-allow-automatic-administrative-logon.md | 6 +++--- ...oppy-copy-and-access-to-all-drives-and-folders.md | 6 +++--- .../remove-computer-from-docking-station.md | 6 +++--- .../replace-a-process-level-token.md | 6 +++--- .../reset-account-lockout-counter-after.md | 6 +++--- .../restore-files-and-directories.md | 6 +++--- ...secpol-advanced-security-audit-policy-settings.md | 6 +++--- .../security-policy-settings/security-options.md | 6 +++--- .../security-policy-settings-reference.md | 6 +++--- .../security-policy-settings.md | 6 +++--- .../security-policy-settings/shut-down-the-system.md | 6 +++--- ...ystem-to-be-shut-down-without-having-to-log-on.md | 6 +++--- .../shutdown-clear-virtual-memory-pagefile.md | 6 +++--- ...rk-client-digitally-sign-communications-always.md | 6 +++--- ...digitally-sign-communications-if-server-agrees.md | 6 +++--- ...rk-server-digitally-sign-communications-always.md | 6 +++--- ...digitally-sign-communications-if-client-agrees.md | 6 +++--- .../store-passwords-using-reversible-encryption.md | 6 +++--- .../synchronize-directory-service-data.md | 6 +++--- ...rotection-for-user-keys-stored-on-the-computer.md | 6 +++--- ...-algorithms-for-encryption-hashing-and-signing.md | 6 +++--- ...-case-insensitivity-for-non-windows-subsystems.md | 6 +++--- ...default-permissions-of-internal-system-objects.md | 6 +++--- .../system-settings-optional-subsystems.md | 6 +++--- ...-executables-for-software-restriction-policies.md | 6 +++--- .../take-ownership-of-files-or-other-objects.md | 6 +++--- ...al-mode-for-the-built-in-administrator-account.md | 6 +++--- ...for-elevation-without-using-the-secure-desktop.md | 6 +++--- ...ompt-for-administrators-in-admin-approval-mode.md | 6 +++--- ...ior-of-the-elevation-prompt-for-standard-users.md | 6 +++--- ...ication-installations-and-prompt-for-elevation.md | 6 +++--- ...vate-executables-that-are-signed-and-validated.md | 6 +++--- ...cations-that-are-installed-in-secure-locations.md | 6 +++--- ...-run-all-administrators-in-admin-approval-mode.md | 6 +++--- ...he-secure-desktop-when-prompting-for-elevation.md | 6 +++--- ...-registry-write-failures-to-per-user-locations.md | 6 +++--- .../user-rights-assignment.md | 6 +++--- ...gging-operational-guide-appid-tagging-policies.md | 4 ++-- .../AppIdTagging/deploy-appid-tagging-policies.md | 4 ++-- .../design-create-appid-tagging-policies.md | 4 ++-- ...fender-application-control-appid-tagging-guide.md | 4 ++-- .../LOB-win32-apps-on-s.md | 4 ++-- ...in-windows-defender-application-control-policy.md | 6 +++--- ...r-packaged-apps-to-existing-applocker-rule-set.md | 6 +++--- .../applocker/administer-applocker.md | 6 +++--- .../applocker-architecture-and-components.md | 6 +++--- .../applocker/applocker-functions.md | 6 +++--- .../applocker/applocker-overview.md | 6 +++--- .../applocker/applocker-policies-deployment-guide.md | 6 +++--- .../applocker/applocker-policies-design-guide.md | 6 +++--- .../applocker/applocker-policy-use-scenarios.md | 6 +++--- .../applocker-processes-and-interactions.md | 6 +++--- .../applocker/applocker-settings.md | 6 +++--- .../applocker/applocker-technical-reference.md | 6 +++--- .../configure-an-applocker-policy-for-audit-only.md | 6 +++--- ...onfigure-an-applocker-policy-for-enforce-rules.md | 6 +++--- .../configure-exceptions-for-an-applocker-rule.md | 6 +++--- .../configure-the-appLocker-reference-device.md | 6 +++--- .../configure-the-application-identity-service.md | 6 +++--- .../applocker/create-a-rule-for-packaged-apps.md | 6 +++--- .../create-a-rule-that-uses-a-file-hash-condition.md | 6 +++--- .../create-a-rule-that-uses-a-path-condition.md | 6 +++--- .../create-a-rule-that-uses-a-publisher-condition.md | 6 +++--- .../applocker/create-applocker-default-rules.md | 6 +++--- ...f-applications-deployed-to-each-business-group.md | 6 +++--- .../applocker/create-your-applocker-policies.md | 6 +++--- .../applocker/create-your-applocker-rules.md | 6 +++--- .../applocker/delete-an-applocker-rule.md | 6 +++--- ...er-policies-by-using-the-enforce-rules-setting.md | 6 +++--- .../deploy-the-applocker-policy-into-production.md | 6 +++--- ...ne-group-policy-structure-and-rule-enforcement.md | 6 +++--- ...s-are-digitally-signed-on-a-reference-computer.md | 6 +++--- .../determine-your-application-control-objectives.md | 6 +++--- ...ge-when-users-try-to-run-a-blocked-application.md | 6 +++--- .../applocker/dll-rules-in-applocker.md | 6 +++--- ...olicy-structure-and-applocker-rule-enforcement.md | 6 +++--- .../applocker/document-your-application-list.md | 6 +++--- .../applocker/document-your-applocker-rules.md | 6 +++--- .../applocker/edit-an-applocker-policy.md | 6 +++--- .../applocker/edit-applocker-rules.md | 6 +++--- .../applocker/enable-the-dll-rule-collection.md | 6 +++--- .../applocker/enforce-applocker-rules.md | 6 +++--- .../applocker/executable-rules-in-applocker.md | 6 +++--- .../export-an-applocker-policy-from-a-gpo.md | 6 +++--- .../export-an-applocker-policy-to-an-xml-file.md | 6 +++--- .../applocker/how-applocker-works-techref.md | 6 +++--- ...port-an-applocker-policy-from-another-computer.md | 6 +++--- .../import-an-applocker-policy-into-a-gpo.md | 6 +++--- .../applocker/maintain-applocker-policies.md | 6 +++--- .../applocker/manage-packaged-apps-with-applocker.md | 6 +++--- ...pplocker-policies-by-using-set-applockerpolicy.md | 6 +++--- .../applocker/merge-applocker-policies-manually.md | 6 +++--- .../monitor-application-usage-with-applocker.md | 6 +++--- .../applocker/optimize-applocker-performance.md | 6 +++--- ...-and-packaged-app-installer-rules-in-applocker.md | 6 +++--- .../plan-for-applocker-policy-management.md | 6 +++--- .../applocker/refresh-an-applocker-policy.md | 6 +++--- .../requirements-for-deploying-applocker-policies.md | 6 +++--- .../applocker/requirements-to-use-applocker.md | 6 +++--- .../run-the-automatically-generate-rules-wizard.md | 6 +++--- .../applocker/script-rules-in-applocker.md | 6 +++--- .../security-considerations-for-applocker.md | 6 +++--- .../applocker/select-types-of-rules-to-create.md | 6 +++--- ...applocker-policy-by-using-test-applockerpolicy.md | 6 +++--- .../applocker/test-and-update-an-applocker-policy.md | 6 +++--- .../applocker/tools-to-use-with-applocker.md | 6 +++--- .../understand-applocker-enforcement-settings.md | 6 +++--- .../understand-applocker-policy-design-decisions.md | 6 +++--- ...nforcement-setting-inheritance-in-group-policy.md | 6 +++--- ...rstand-the-applocker-policy-deployment-process.md | 6 +++--- ...ding-applocker-allow-and-deny-actions-on-rules.md | 6 +++--- .../understanding-applocker-default-rules.md | 6 +++--- .../understanding-applocker-rule-behavior.md | 6 +++--- .../understanding-applocker-rule-collections.md | 6 +++--- .../understanding-applocker-rule-condition-types.md | 6 +++--- .../understanding-applocker-rule-exceptions.md | 6 +++--- ...ding-the-file-hash-rule-condition-in-applocker.md | 6 +++--- ...rstanding-the-path-rule-condition-in-applocker.md | 6 +++--- ...ding-the-publisher-rule-condition-in-applocker.md | 6 +++--- ...uter-to-create-and-maintain-applocker-policies.md | 6 +++--- ...ftware-restriction-policies-in-the-same-domain.md | 6 +++--- .../use-the-applocker-windows-powershell-cmdlets.md | 6 +++--- .../applocker/using-event-viewer-with-applocker.md | 6 +++--- ...re-restriction-policies-and-applocker-policies.md | 6 +++--- .../applocker/what-is-applocker.md | 6 +++--- .../windows-installer-rules-in-applocker.md | 6 +++--- .../applocker/working-with-applocker-policies.md | 6 +++--- .../applocker/working-with-applocker-rules.md | 6 +++--- ...-windows-defender-application-control-policies.md | 4 ++-- ...-windows-defender-application-control-policies.md | 4 ++-- ...horized-apps-deployed-with-a-managed-installer.md | 4 ++-- .../configure-wdac-managed-installer.md | 4 ++-- ...-cert-for-windows-defender-application-control.md | 4 ++-- .../create-initial-default-policy.md | 4 ++-- .../create-wdac-deny-policy.md | 4 ++-- .../create-wdac-policy-for-fully-managed-devices.md | 4 ++-- ...o-support-windows-defender-application-control.md | 4 ++-- ...-windows-defender-application-control-policies.md | 4 ++-- .../deployment/deploy-wdac-policies-with-memcm.md | 2 +- .../deployment/deploy-wdac-policies-with-script.md | 2 +- ...pplication-control-policies-using-group-policy.md | 4 ++-- ...-windows-defender-application-control-policies.md | 4 ++-- ...-windows-defender-application-control-policies.md | 2 +- .../event-id-explanations.md | 4 ++-- .../event-tag-explanations.md | 4 ++-- .../example-wdac-base-policies.md | 4 ++-- .../feature-availability.md | 4 ++-- ...apps-with-windows-defender-application-control.md | 4 ++-- ...-windows-defender-application-control-policies.md | 4 ++-- .../microsoft-recommended-driver-block-rules.md | 6 +++--- .../operations/known-issues.md | 2 +- ...indows-defender-application-control-management.md | 4 ++-- ...ontrol-events-centrally-using-advanced-hunting.md | 4 ++-- .../select-types-of-rules-to-create.md | 4 ++-- .../types-of-devices.md | 4 ++-- ...er-application-control-policy-design-decisions.md | 4 ++-- ...ation-control-for-classic-windows-applications.md | 4 ++-- ...signing-portal-in-microsoft-store-for-business.md | 4 ++-- ...defender-application-control-against-tampering.md | 4 ++-- ...-control-specific-plug-ins-add-ins-and-modules.md | 4 ++-- ...application-control-with-dynamic-code-security.md | 4 ++-- ...cation-control-with-intelligent-security-graph.md | 4 ++-- .../wdac-and-applocker-overview.md | 6 +++--- .../wdac-wizard-create-base-policy.md | 4 ++-- .../wdac-wizard-create-supplemental-policy.md | 4 ++-- .../wdac-wizard-editing-policy.md | 4 ++-- .../wdac-wizard-merging-policies.md | 4 ++-- .../wdac-wizard.md | 4 ++-- ...-defender-application-control-deployment-guide.md | 2 +- ...dows-defender-application-control-design-guide.md | 4 ++-- ...defender-application-control-operational-guide.md | 4 ++-- .../windows-defender-application-control.md | 6 +++--- .../wdsc-account-protection.md | 8 ++++---- .../wdsc-app-browser-control.md | 6 +++--- .../wdsc-customize-contact-information.md | 6 +++--- .../wdsc-device-performance-health.md | 6 +++--- .../wdsc-device-security.md | 6 +++--- .../wdsc-family-options.md | 6 +++--- .../wdsc-firewall-network-protection.md | 8 ++++---- .../wdsc-hide-notifications.md | 6 +++--- .../wdsc-virus-threat-protection.md | 6 +++--- .../wdsc-windows-10-in-s-mode.md | 6 +++--- .../windows-defender-security-center.md | 6 +++--- ...ware-based-root-of-trust-helps-protect-windows.md | 6 +++--- .../system-guard-secure-launch-and-smm-protection.md | 6 +++--- ...ion-devices-to-the-membership-group-for-a-zone.md | 12 ++++++------ ...est-devices-to-the-membership-group-for-a-zone.md | 12 ++++++------ ...template-files-for-settings-used-in-this-guide.md | 12 ++++++------ .../assign-security-group-filters-to-the-gpo.md | 12 ++++++------ .../windows-firewall/basic-firewall-policy-design.md | 12 ++++++------ .../windows-firewall/best-practices-configuring.md | 12 ++++++------ .../windows-firewall/boundary-zone-gpos.md | 12 ++++++------ .../windows-firewall/boundary-zone.md | 12 ++++++------ ...tificate-based-isolation-policy-design-example.md | 12 ++++++------ .../certificate-based-isolation-policy-design.md | 12 ++++++------ .../change-rules-from-request-to-require-mode.md | 12 ++++++------ .../checklist-configuring-basic-firewall-settings.md | 12 ++++++------ ...-configuring-rules-for-an-isolated-server-zone.md | 12 ++++++------ ...r-servers-in-a-standalone-isolated-server-zone.md | 12 ++++++------ ...cklist-configuring-rules-for-the-boundary-zone.md | 12 ++++++------ ...list-configuring-rules-for-the-encryption-zone.md | 12 ++++++------ ...list-configuring-rules-for-the-isolated-domain.md | 12 ++++++------ .../checklist-creating-group-policy-objects.md | 12 ++++++------ .../checklist-creating-inbound-firewall-rules.md | 12 ++++++------ .../checklist-creating-outbound-firewall-rules.md | 12 ++++++------ ...r-clients-of-a-standalone-isolated-server-zone.md | 12 ++++++------ ...st-implementing-a-basic-firewall-policy-design.md | 12 ++++++------ ...ng-a-certificate-based-isolation-policy-design.md | 12 ++++++------ ...-implementing-a-domain-isolation-policy-design.md | 12 ++++++------ ...ng-a-standalone-server-isolation-policy-design.md | 12 ++++++------ .../configure-authentication-methods.md | 12 ++++++------ .../configure-data-protection-quick-mode-settings.md | 12 ++++++------ ...p-policy-to-autoenroll-and-deploy-certificates.md | 12 ++++++------ .../configure-key-exchange-main-mode-settings.md | 12 ++++++------ .../configure-the-rules-to-require-encryption.md | 12 ++++++------ .../configure-the-windows-firewall-log.md | 12 ++++++------ ...orkstation-authentication-certificate-template.md | 12 ++++++------ ...ppress-notifications-when-a-program-is-blocked.md | 12 ++++++------ ...nfirm-that-certificates-are-deployed-correctly.md | 12 ++++++------ .../copy-a-gpo-to-create-a-new-gpo.md | 12 ++++++------ .../create-a-group-account-in-active-directory.md | 12 ++++++------ .../windows-firewall/create-a-group-policy-object.md | 12 ++++++------ .../create-an-authentication-exemption-list-rule.md | 12 ++++++------ .../create-an-authentication-request-rule.md | 12 ++++++------ .../windows-firewall/create-an-inbound-icmp-rule.md | 12 ++++++------ .../windows-firewall/create-an-inbound-port-rule.md | 12 ++++++------ .../create-an-inbound-program-or-service-rule.md | 12 ++++++------ .../windows-firewall/create-an-outbound-port-rule.md | 12 ++++++------ .../create-an-outbound-program-or-service-rule.md | 12 ++++++------ .../create-inbound-rules-to-support-rpc.md | 12 ++++++------ .../create-windows-firewall-rules-in-intune.md | 12 ++++++------ .../create-wmi-filters-for-the-gpo.md | 12 ++++++------ ...ndows-firewall-with-advanced-security-strategy.md | 12 ++++++------ .../determining-the-trusted-state-of-your-devices.md | 12 ++++++------ .../windows-firewall/documenting-the-zones.md | 12 ++++++------ .../domain-isolation-policy-design-example.md | 12 ++++++------ .../domain-isolation-policy-design.md | 12 ++++++------ .../enable-predefined-inbound-rules.md | 12 ++++++------ .../enable-predefined-outbound-rules.md | 12 ++++++------ .../windows-firewall/encryption-zone-gpos.md | 12 ++++++------ .../windows-firewall/encryption-zone.md | 12 ++++++------ ...irewall-with-advanced-security-design-examples.md | 12 ++++++------ .../exempt-icmp-from-authentication.md | 12 ++++++------ .../windows-firewall/exemption-list.md | 12 ++++++------ .../windows-firewall/filter-origin-documentation.md | 12 ++++++------ .../windows-firewall/firewall-gpos.md | 12 ++++++------ .../firewall-policy-design-example.md | 12 ++++++------ .../firewall-settings-lost-on-upgrade.md | 12 ++++++------ ...rmation-about-your-active-directory-deployment.md | 12 ++++++------ ...tion-about-your-current-network-infrastructure.md | 12 ++++++------ .../gathering-information-about-your-devices.md | 12 ++++++------ .../gathering-other-relevant-information.md | 12 ++++++------ .../gathering-the-information-you-need.md | 12 ++++++------ .../windows-firewall/gpo-domiso-boundary.md | 12 ++++++------ .../windows-firewall/gpo-domiso-encryption.md | 12 ++++++------ .../windows-firewall/gpo-domiso-firewall.md | 12 ++++++------ .../gpo-domiso-isolateddomain-clients.md | 12 ++++++------ .../gpo-domiso-isolateddomain-servers.md | 12 ++++++------ ...rewall-with-advanced-security-deployment-goals.md | 12 ++++++------ ...ws-firewall-with-advanced-security-design-plan.md | 12 ++++++------ .../windows-firewall/isolated-domain-gpos.md | 12 ++++++------ .../windows-firewall/isolated-domain.md | 12 ++++++------ .../isolating-apps-on-your-network.md | 12 ++++++------ .../windows-firewall/link-the-gpo-to-the-domain.md | 12 ++++++------ ...windows-firewall-with-advanced-security-design.md | 12 ++++++------ ...pply-to-a-different-zone-or-version-of-windows.md | 12 ++++++------ ...icy-management-console-to-ip-security-policies.md | 12 ++++++------ ...ole-to-windows-firewall-with-advanced-security.md | 12 ++++++------ ...-policy-management-console-to-windows-firewall.md | 12 ++++++------ .../open-windows-firewall-with-advanced-security.md | 12 ++++++------ .../planning-certificate-based-authentication.md | 12 ++++++------ .../planning-domain-isolation-zones.md | 12 ++++++------ .../windows-firewall/planning-gpo-deployment.md | 12 ++++++------ ...oup-policy-deployment-for-your-isolation-zones.md | 12 ++++++------ .../planning-isolation-groups-for-the-zones.md | 12 ++++++------ .../planning-network-access-groups.md | 12 ++++++------ .../planning-server-isolation-zones.md | 12 ++++++------ .../planning-settings-for-a-basic-firewall-policy.md | 12 ++++++------ .../windows-firewall/planning-the-gpos.md | 12 ++++++------ ...deploy-windows-firewall-with-advanced-security.md | 12 ++++++------ ...windows-firewall-with-advanced-security-design.md | 12 ++++++------ .../procedures-used-in-this-guide.md | 12 ++++++------ .../protect-devices-from-unwanted-network-traffic.md | 12 ++++++------ .../threat-protection/windows-firewall/quarantine.md | 12 ++++++------ ...ion-when-accessing-sensitive-network-resources.md | 12 ++++++------ ...rict-access-to-only-specified-users-or-devices.md | 12 ++++++------ .../restrict-access-to-only-trusted-devices.md | 12 ++++++------ ...trict-server-access-to-members-of-a-group-only.md | 12 ++++++------ ...ng-end-to-end-ipsec-connections-by-using-ikev2.md | 12 ++++++------ .../windows-firewall/server-isolation-gpos.md | 12 ++++++------ .../server-isolation-policy-design-example.md | 12 ++++++------ .../server-isolation-policy-design.md | 12 ++++++------ .../windows-firewall/troubleshooting-uwp-firewall.md | 12 ++++++------ ...indows-firewall-and-configure-default-behavior.md | 12 ++++++------ ...firewall-with-advanced-security-design-process.md | 12 ++++++------ .../verify-that-network-traffic-is-authenticated.md | 12 ++++++------ ...ecurity-administration-with-windows-powershell.md | 12 ++++++------ ...rewall-with-advanced-security-deployment-guide.md | 12 ++++++------ ...s-firewall-with-advanced-security-design-guide.md | 12 ++++++------ .../windows-firewall-with-advanced-security.md | 12 ++++++------ .../windows-sandbox/windows-sandbox-architecture.md | 6 +++--- .../windows-sandbox-configure-using-wsb-file.md | 6 +++--- .../windows-sandbox/windows-sandbox-overview.md | 6 +++--- .../get-support-for-security-baselines.md | 6 +++--- .../security-compliance-toolkit-10.md | 6 +++--- .../windows-security-baselines.md | 6 +++--- 787 files changed, 2659 insertions(+), 2659 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/retired/hello-how-it-works.md b/windows/security/identity-protection/hello-for-business/retired/hello-how-it-works.md index aaca362314..c5548809e1 100644 --- a/windows/security/identity-protection/hello-for-business/retired/hello-how-it-works.md +++ b/windows/security/identity-protection/hello-for-business/retired/hello-how-it-works.md @@ -8,9 +8,9 @@ ms.author: paoloma ms.date: 10/16/2017 manager: aaroncz ms.topic: article -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 --- # How Windows Hello for Business works in Windows devices diff --git a/windows/security/threat-protection/auditing/advanced-security-audit-policy-settings.md b/windows/security/threat-protection/auditing/advanced-security-audit-policy-settings.md index 076b555055..d4d91dca07 100644 --- a/windows/security/threat-protection/auditing/advanced-security-audit-policy-settings.md +++ b/windows/security/threat-protection/auditing/advanced-security-audit-policy-settings.md @@ -3,14 +3,14 @@ title: Advanced security audit policy settings (Windows 10) description: This reference for IT professionals provides information about the advanced audit policy settings that are available in Windows and the audit events that they generate. ms.assetid: 93b28b92-796f-4036-a53b-8b9e80f9f171 ms.reviewer: This reference for IT professionals provides information about the advanced audit policy settings that are available in Windows and the audit events that they generate. -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: none -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/auditing/advanced-security-auditing.md b/windows/security/threat-protection/auditing/advanced-security-auditing.md index 0b3fae0f35..9bc1f821b8 100644 --- a/windows/security/threat-protection/auditing/advanced-security-auditing.md +++ b/windows/security/threat-protection/auditing/advanced-security-auditing.md @@ -3,14 +3,14 @@ title: Advanced security audit policies (Windows 10) description: Advanced security audit policy settings may appear to overlap with basic policies, but they are recorded and applied differently. Learn more about them here. ms.assetid: 6FE8AC10-F48E-4BBF-979B-43A5DFDC5DFC ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: none -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/auditing/appendix-a-security-monitoring-recommendations-for-many-audit-events.md b/windows/security/threat-protection/auditing/appendix-a-security-monitoring-recommendations-for-many-audit-events.md index 258ea0a79b..b176620db8 100644 --- a/windows/security/threat-protection/auditing/appendix-a-security-monitoring-recommendations-for-many-audit-events.md +++ b/windows/security/threat-protection/auditing/appendix-a-security-monitoring-recommendations-for-many-audit-events.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md index 7cc6b35da0..cd0cb7d36f 100644 --- a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md +++ b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md @@ -3,14 +3,14 @@ title: Apply a basic audit policy on a file or folder (Windows 10) description: Apply audit policies to individual files and folders on your computer by setting the permission type to record access attempts in the security log. ms.assetid: 565E7249-5CD0-4B2E-B2C0-B3A0793A51E2 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: none -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/auditing/audit-account-lockout.md b/windows/security/threat-protection/auditing/audit-account-lockout.md index 2d936555a6..12b0ddc395 100644 --- a/windows/security/threat-protection/auditing/audit-account-lockout.md +++ b/windows/security/threat-protection/auditing/audit-account-lockout.md @@ -3,14 +3,14 @@ title: Audit Account Lockout (Windows 10) description: The policy setting, Audit Account Lockout, enables you to audit security events generated by a failed attempt to log on to an account that is locked out. ms.assetid: da68624b-a174-482c-9bc5-ddddab38e589 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-application-generated.md b/windows/security/threat-protection/auditing/audit-application-generated.md index f778de2af2..a6bb26f2b2 100644 --- a/windows/security/threat-protection/auditing/audit-application-generated.md +++ b/windows/security/threat-protection/auditing/audit-application-generated.md @@ -3,14 +3,14 @@ title: Audit Application Generated (Windows 10) description: The policy setting, Audit Application Generated, determines if audit events are generated when applications attempt to use the Windows Auditing APIs. ms.assetid: 6c58a365-b25b-42b8-98ab-819002e31871 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-application-group-management.md b/windows/security/threat-protection/auditing/audit-application-group-management.md index 3cb78ff1b1..40db38bfb4 100644 --- a/windows/security/threat-protection/auditing/audit-application-group-management.md +++ b/windows/security/threat-protection/auditing/audit-application-group-management.md @@ -3,14 +3,14 @@ title: Audit Application Group Management (Windows 10) description: The policy setting, Audit Application Group Management, determines if audit events are generated when application group management tasks are performed. ms.assetid: 1bcaa41e-5027-4a86-96b7-f04eaf1c0606 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-audit-policy-change.md b/windows/security/threat-protection/auditing/audit-audit-policy-change.md index ae75fb4fef..af01de791c 100644 --- a/windows/security/threat-protection/auditing/audit-audit-policy-change.md +++ b/windows/security/threat-protection/auditing/audit-audit-policy-change.md @@ -3,14 +3,14 @@ title: Audit Audit Policy Change (Windows 10) description: The Advanced Security Audit policy setting, Audit Audit Policy Change, determines if audit events are generated when changes are made to audit policy. ms.assetid: 7153bf75-6978-4d7e-a821-59a699efb8a9 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-authentication-policy-change.md b/windows/security/threat-protection/auditing/audit-authentication-policy-change.md index 68c6747f77..1e4d381758 100644 --- a/windows/security/threat-protection/auditing/audit-authentication-policy-change.md +++ b/windows/security/threat-protection/auditing/audit-authentication-policy-change.md @@ -3,14 +3,14 @@ title: Audit Authentication Policy Change (Windows 10) description: The Advanced Security Audit policy setting, Audit Authentication Policy Change, determines if audit events are generated when authentication policy is changed. ms.assetid: aa9cea7a-aadf-47b7-b704-ac253b8e79be ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-authorization-policy-change.md b/windows/security/threat-protection/auditing/audit-authorization-policy-change.md index 03111b60f9..fbf9267a82 100644 --- a/windows/security/threat-protection/auditing/audit-authorization-policy-change.md +++ b/windows/security/threat-protection/auditing/audit-authorization-policy-change.md @@ -3,14 +3,14 @@ title: Audit Authorization Policy Change (Windows 10) description: The policy setting, Audit Authorization Policy Change, determines if audit events are generated when specific changes are made to the authorization policy. ms.assetid: ca0587a2-a2b3-4300-aa5d-48b4553c3b36 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-central-access-policy-staging.md b/windows/security/threat-protection/auditing/audit-central-access-policy-staging.md index a877583e94..0f9623bc2a 100644 --- a/windows/security/threat-protection/auditing/audit-central-access-policy-staging.md +++ b/windows/security/threat-protection/auditing/audit-central-access-policy-staging.md @@ -3,14 +3,14 @@ title: Audit Central Access Policy Staging (Windows 10) description: The Advanced Security Audit policy setting, Audit Central Access Policy Staging, determines permissions on a Central Access Policy. ms.assetid: D9BB11CE-949A-4B48-82BF-30DC5E6FC67D ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-certification-services.md b/windows/security/threat-protection/auditing/audit-certification-services.md index 5c5e3cfccd..ab5dc1db6b 100644 --- a/windows/security/threat-protection/auditing/audit-certification-services.md +++ b/windows/security/threat-protection/auditing/audit-certification-services.md @@ -3,14 +3,14 @@ title: Audit Certification Services (Windows 10) description: The policy setting, Audit Certification Services, decides if events are generated when Active Directory Certificate Services (ADA CS) operations are performed. ms.assetid: cdefc34e-fb1f-4eff-b766-17713c5a1b03 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-computer-account-management.md b/windows/security/threat-protection/auditing/audit-computer-account-management.md index c544d87734..2fca8cb4ff 100644 --- a/windows/security/threat-protection/auditing/audit-computer-account-management.md +++ b/windows/security/threat-protection/auditing/audit-computer-account-management.md @@ -3,14 +3,14 @@ title: Audit Computer Account Management (Windows 10) description: The policy setting, Audit Computer Account Management, determines if audit events are generated when a computer account is created, changed, or deleted. ms.assetid: 6c406693-57bf-4411-bb6c-ff83ce548991 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-credential-validation.md b/windows/security/threat-protection/auditing/audit-credential-validation.md index ad726d2c61..f09b2e6ceb 100644 --- a/windows/security/threat-protection/auditing/audit-credential-validation.md +++ b/windows/security/threat-protection/auditing/audit-credential-validation.md @@ -3,14 +3,14 @@ title: Audit Credential Validation (Windows 10) description: The policy setting, Audit Credential Validation, determines if audit events are generated when user account logon request credentials are submitted. ms.assetid: 6654b33a-922e-4a43-8223-ec5086dfc926 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-detailed-directory-service-replication.md b/windows/security/threat-protection/auditing/audit-detailed-directory-service-replication.md index 9af371fb40..9f83de62ed 100644 --- a/windows/security/threat-protection/auditing/audit-detailed-directory-service-replication.md +++ b/windows/security/threat-protection/auditing/audit-detailed-directory-service-replication.md @@ -3,14 +3,14 @@ title: Audit Detailed Directory Service Replication (Windows 10) description: The Audit Detailed Directory Service Replication setting decides if audit events contain detailed tracking info about data replicated between domain controllers ms.assetid: 1b89c8f5-bce7-4b20-8701-42585c7ab993 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-detailed-file-share.md b/windows/security/threat-protection/auditing/audit-detailed-file-share.md index 15e15c2540..cf232819c0 100644 --- a/windows/security/threat-protection/auditing/audit-detailed-file-share.md +++ b/windows/security/threat-protection/auditing/audit-detailed-file-share.md @@ -3,14 +3,14 @@ title: Audit Detailed File Share (Windows 10) description: The Advanced Security Audit policy setting, Audit Detailed File Share, allows you to audit attempts to access files and folders on a shared folder. ms.assetid: 60310104-b820-4033-a1cb-022a34f064ae ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-directory-service-access.md b/windows/security/threat-protection/auditing/audit-directory-service-access.md index 927eb3b00a..c6e8118ded 100644 --- a/windows/security/threat-protection/auditing/audit-directory-service-access.md +++ b/windows/security/threat-protection/auditing/audit-directory-service-access.md @@ -3,14 +3,14 @@ title: Audit Directory Service Access (Windows 10) description: The policy setting Audit Directory Service Access determines if audit events are generated when an Active Directory Domain Services (ADA DS) object is accessed. ms.assetid: ba2562ba-4282-4588-b87c-a3fcb771c7d0 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-directory-service-changes.md b/windows/security/threat-protection/auditing/audit-directory-service-changes.md index c012915713..caa1701475 100644 --- a/windows/security/threat-protection/auditing/audit-directory-service-changes.md +++ b/windows/security/threat-protection/auditing/audit-directory-service-changes.md @@ -3,14 +3,14 @@ title: Audit Directory Service Changes (Windows 10) description: The policy setting Audit Directory Service Changes determines if audit events are generated when objects in Active Directory Domain Services (AD DS) are changed ms.assetid: 9f7c0dd4-3977-47dd-a0fb-ec2f17cad05e ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-directory-service-replication.md b/windows/security/threat-protection/auditing/audit-directory-service-replication.md index f745f49759..5a424dae77 100644 --- a/windows/security/threat-protection/auditing/audit-directory-service-replication.md +++ b/windows/security/threat-protection/auditing/audit-directory-service-replication.md @@ -3,14 +3,14 @@ title: Audit Directory Service Replication (Windows 10) description: Audit Directory Service Replication is a policy setting that decides if audit events are created when replication between two domain controllers begins or ends. ms.assetid: b95d296c-7993-4e8d-8064-a8bbe284bd56 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-distribution-group-management.md b/windows/security/threat-protection/auditing/audit-distribution-group-management.md index 8317bd58a5..76eb29a0bc 100644 --- a/windows/security/threat-protection/auditing/audit-distribution-group-management.md +++ b/windows/security/threat-protection/auditing/audit-distribution-group-management.md @@ -3,14 +3,14 @@ title: Audit Distribution Group Management (Windows 10) description: The policy setting, Audit Distribution Group Management, determines if audit events are generated for specific distribution-group management tasks. ms.assetid: d46693a4-5887-4a58-85db-2f6cba224a66 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-dpapi-activity.md b/windows/security/threat-protection/auditing/audit-dpapi-activity.md index ec0e0c8843..00a34ebb03 100644 --- a/windows/security/threat-protection/auditing/audit-dpapi-activity.md +++ b/windows/security/threat-protection/auditing/audit-dpapi-activity.md @@ -3,14 +3,14 @@ title: Audit DPAPI Activity (Windows 10) description: The policy setting, Audit DPAPI Activity, decides if encryption/decryption calls to the data protection application interface (DPAPI) generate audit events. ms.assetid: be4d4c83-c857-4e3d-a84e-8bcc3f2c99cd ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-file-share.md b/windows/security/threat-protection/auditing/audit-file-share.md index 7d9f3c613e..29e1ca9570 100644 --- a/windows/security/threat-protection/auditing/audit-file-share.md +++ b/windows/security/threat-protection/auditing/audit-file-share.md @@ -3,14 +3,14 @@ title: Audit File Share (Windows 10) description: The Advanced Security Audit policy setting, Audit File Share, determines if the operating system generates audit events when a file share is accessed. ms.assetid: 9ea985f8-8936-4b79-abdb-35cbb7138f78 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-file-system.md b/windows/security/threat-protection/auditing/audit-file-system.md index 1d2aa49bd8..12885568e0 100644 --- a/windows/security/threat-protection/auditing/audit-file-system.md +++ b/windows/security/threat-protection/auditing/audit-file-system.md @@ -3,14 +3,14 @@ title: Audit File System (Windows 10) description: The Advanced Security Audit policy setting, Audit File System, determines if audit events are generated when users attempt to access file system objects. ms.assetid: 6a71f283-b8e5-41ac-b348-0b7ec6ea0b1f ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-filtering-platform-connection.md b/windows/security/threat-protection/auditing/audit-filtering-platform-connection.md index 16b00b3889..d7e01c186a 100644 --- a/windows/security/threat-protection/auditing/audit-filtering-platform-connection.md +++ b/windows/security/threat-protection/auditing/audit-filtering-platform-connection.md @@ -3,14 +3,14 @@ title: Audit Filtering Platform Connection (Windows 10) description: The policy setting, Audit Filtering Platform Connection, decides if audit events are generated when connections are allow/blocked by Windows Filtering Platform. ms.assetid: d72936e9-ff01-4d18-b864-a4958815df59 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-filtering-platform-packet-drop.md b/windows/security/threat-protection/auditing/audit-filtering-platform-packet-drop.md index 40a667e051..6f9481da89 100644 --- a/windows/security/threat-protection/auditing/audit-filtering-platform-packet-drop.md +++ b/windows/security/threat-protection/auditing/audit-filtering-platform-packet-drop.md @@ -3,14 +3,14 @@ title: Audit Filtering Platform Packet Drop (Windows 10) description: The policy setting, Audit Filtering Platform Packet Drop, determines if audit events are generated when packets are dropped by the Windows Filtering Platform. ms.assetid: 95457601-68d1-4385-af20-87916ddab906 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-filtering-platform-policy-change.md b/windows/security/threat-protection/auditing/audit-filtering-platform-policy-change.md index ffefdd58cb..ae7aca862f 100644 --- a/windows/security/threat-protection/auditing/audit-filtering-platform-policy-change.md +++ b/windows/security/threat-protection/auditing/audit-filtering-platform-policy-change.md @@ -3,14 +3,14 @@ title: Audit Filtering Platform Policy Change (Windows 10) description: The policy setting, Audit Filtering Platform Policy Change, determines if audit events are generated for certain IPsec and Windows Filtering Platform actions. ms.assetid: 0eaf1c56-672b-4ea9-825a-22dc03eb4041 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-group-membership.md b/windows/security/threat-protection/auditing/audit-group-membership.md index 97bb5b57e1..1ae73ba656 100644 --- a/windows/security/threat-protection/auditing/audit-group-membership.md +++ b/windows/security/threat-protection/auditing/audit-group-membership.md @@ -3,14 +3,14 @@ title: Audit Group Membership (Windows 10) description: Using the advanced security audit policy setting, Audit Group Membership, you can audit group memberships when they're enumerated on the client PC. ms.assetid: 1CD7B014-FBD9-44B9-9274-CC5715DE58B9 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-handle-manipulation.md b/windows/security/threat-protection/auditing/audit-handle-manipulation.md index b64ddae053..84d320a966 100644 --- a/windows/security/threat-protection/auditing/audit-handle-manipulation.md +++ b/windows/security/threat-protection/auditing/audit-handle-manipulation.md @@ -3,14 +3,14 @@ title: Audit Handle Manipulation (Windows 10) description: The Advanced Security Audit policy setting, Audit Handle Manipulation, determines if audit events are generated when a handle to an object is opened or closed. ms.assetid: 1fbb004a-ccdc-4c80-b3da-a4aa7a9f4091 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-ipsec-driver.md b/windows/security/threat-protection/auditing/audit-ipsec-driver.md index 1cdb6f9140..a31f2e95b9 100644 --- a/windows/security/threat-protection/auditing/audit-ipsec-driver.md +++ b/windows/security/threat-protection/auditing/audit-ipsec-driver.md @@ -3,14 +3,14 @@ title: Audit IPsec Driver (Windows 10) description: The Advanced Security Audit policy setting, Audit IPsec Driver, determines if audit events are generated for the activities of the IPsec driver. ms.assetid: c8b8c02f-5ad0-4ee5-9123-ea8cdae356a5 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-ipsec-extended-mode.md b/windows/security/threat-protection/auditing/audit-ipsec-extended-mode.md index 7e372d5a0e..121c17cdf3 100644 --- a/windows/security/threat-protection/auditing/audit-ipsec-extended-mode.md +++ b/windows/security/threat-protection/auditing/audit-ipsec-extended-mode.md @@ -3,14 +3,14 @@ title: Audit IPsec Extended Mode (Windows 10) description: The setting, Audit IPsec Extended Mode, determines if audit events are generated for the results of IKE protocol and AuthIP during Extended Mode negotiations. ms.assetid: 2b4fee9e-482a-4181-88a8-6a79d8fc8049 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-ipsec-main-mode.md b/windows/security/threat-protection/auditing/audit-ipsec-main-mode.md index 675299ef05..e250004563 100644 --- a/windows/security/threat-protection/auditing/audit-ipsec-main-mode.md +++ b/windows/security/threat-protection/auditing/audit-ipsec-main-mode.md @@ -3,14 +3,14 @@ title: Audit IPsec Main Mode (Windows 10) description: Learn about the policy setting, Audit IPsec Main Mode, which determines if the results of certain protocols generate events during Main Mode negotiations. ms.assetid: 06ed26ec-3620-4ef4-a47a-c70df9c8827b ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-ipsec-quick-mode.md b/windows/security/threat-protection/auditing/audit-ipsec-quick-mode.md index 982e294c4c..412c2ed30e 100644 --- a/windows/security/threat-protection/auditing/audit-ipsec-quick-mode.md +++ b/windows/security/threat-protection/auditing/audit-ipsec-quick-mode.md @@ -3,14 +3,14 @@ title: Audit IPsec Quick Mode (Windows 10) description: The policy setting, Audit IPsec Quick Mode, decides if audit events are generated for the results of the IKE protocol and AuthIP during Quick Mode negotiations. ms.assetid: 7be67a15-c2ce-496a-9719-e25ac7699114 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-kerberos-authentication-service.md b/windows/security/threat-protection/auditing/audit-kerberos-authentication-service.md index c4245be658..cf603612e7 100644 --- a/windows/security/threat-protection/auditing/audit-kerberos-authentication-service.md +++ b/windows/security/threat-protection/auditing/audit-kerberos-authentication-service.md @@ -3,14 +3,14 @@ title: Audit Kerberos Authentication Service (Windows 10) description: The policy setting Audit Kerberos Authentication Service decides if audit events are generated for Kerberos authentication ticket-granting ticket (TGT) requests ms.assetid: 990dd6d9-1a1f-4cce-97ba-5d7e0a7db859 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-kerberos-service-ticket-operations.md b/windows/security/threat-protection/auditing/audit-kerberos-service-ticket-operations.md index 71f4e995c9..775390d2fd 100644 --- a/windows/security/threat-protection/auditing/audit-kerberos-service-ticket-operations.md +++ b/windows/security/threat-protection/auditing/audit-kerberos-service-ticket-operations.md @@ -3,14 +3,14 @@ title: Audit Kerberos Service Ticket Operations (Windows 10) description: The policy setting, Audit Kerberos Service Ticket Operations, determines if security audit events are generated for Kerberos service ticket requests. ms.assetid: ddc0abef-ac7f-4849-b90d-66700470ccd6 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-kernel-object.md b/windows/security/threat-protection/auditing/audit-kernel-object.md index 7262c46dd7..8d8700c72e 100644 --- a/windows/security/threat-protection/auditing/audit-kernel-object.md +++ b/windows/security/threat-protection/auditing/audit-kernel-object.md @@ -3,14 +3,14 @@ title: Audit Kernel Object (Windows 10) description: The policy setting, Audit Kernel Object, decides if user attempts to access the system kernel (which includes mutexes and semaphores) generate audit events. ms.assetid: 75619d8b-b1eb-445b-afc9-0f9053be97fb ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-logoff.md b/windows/security/threat-protection/auditing/audit-logoff.md index 92a4bed8a5..764e61eca5 100644 --- a/windows/security/threat-protection/auditing/audit-logoff.md +++ b/windows/security/threat-protection/auditing/audit-logoff.md @@ -3,14 +3,14 @@ title: Audit Logoff (Windows 10) description: The Advanced Security Audit policy setting, Audit Logoff, determines if audit events are generated when logon sessions are terminated. ms.assetid: 681e51f2-ba06-46f5-af8c-d9c48d515432 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-logon.md b/windows/security/threat-protection/auditing/audit-logon.md index f3450fc499..896c41e4c2 100644 --- a/windows/security/threat-protection/auditing/audit-logon.md +++ b/windows/security/threat-protection/auditing/audit-logon.md @@ -3,14 +3,14 @@ title: Audit Logon (Windows 10) description: The Advanced Security Audit policy setting, Audit Logon, determines if audit events are generated when a user attempts to log on to a computer. ms.assetid: ca968d03-7d52-48c4-ba0e-2bcd2937231b ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-mpssvc-rule-level-policy-change.md b/windows/security/threat-protection/auditing/audit-mpssvc-rule-level-policy-change.md index aac15f25fa..25553898cc 100644 --- a/windows/security/threat-protection/auditing/audit-mpssvc-rule-level-policy-change.md +++ b/windows/security/threat-protection/auditing/audit-mpssvc-rule-level-policy-change.md @@ -3,14 +3,14 @@ title: Audit MPSSVC Rule-Level Policy Change (Windows 10) description: Audit MPSSVC Rule-Level Policy Change determines if audit events are generated when policy rules are altered for the Microsoft Protection Service (MPSSVC.exe). ms.assetid: 263461b3-c61c-4ec3-9dee-851164845019 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-network-policy-server.md b/windows/security/threat-protection/auditing/audit-network-policy-server.md index 97911ece3f..c141fc7bf1 100644 --- a/windows/security/threat-protection/auditing/audit-network-policy-server.md +++ b/windows/security/threat-protection/auditing/audit-network-policy-server.md @@ -3,14 +3,14 @@ title: Audit Network Policy Server (Windows 10) description: The policy setting, Audit Network Policy Server, determines if audit events are generated for RADIUS (IAS) and NAP activity on user access requests. ms.assetid: 43b2aea4-26df-46da-b761-2b30f51a80f7 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-non-sensitive-privilege-use.md b/windows/security/threat-protection/auditing/audit-non-sensitive-privilege-use.md index 67ef50a903..ead439de46 100644 --- a/windows/security/threat-protection/auditing/audit-non-sensitive-privilege-use.md +++ b/windows/security/threat-protection/auditing/audit-non-sensitive-privilege-use.md @@ -3,14 +3,14 @@ title: Audit Non-Sensitive Privilege Use (Windows 10) description: This article for the IT professional describes the Advanced Security Audit policy setting, Audit Non-Sensitive Privilege Use, which determines whether the operating system generates audit events when non-sensitive privileges (user rights) are used. ms.assetid: 8fd74783-1059-443e-aa86-566d78606627 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-other-account-logon-events.md b/windows/security/threat-protection/auditing/audit-other-account-logon-events.md index fa4413dbb7..afeebd6098 100644 --- a/windows/security/threat-protection/auditing/audit-other-account-logon-events.md +++ b/windows/security/threat-protection/auditing/audit-other-account-logon-events.md @@ -3,14 +3,14 @@ title: Audit Other Account Logon Events (Windows 10) description: The policy setting, Audit Other Account Logon Events allows you to audit events when generated by responses to credential requests for certain kinds of user logons. ms.assetid: c8c6bfe0-33d2-4600-bb1a-6afa840d75b3 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-other-account-management-events.md b/windows/security/threat-protection/auditing/audit-other-account-management-events.md index dfa2678034..1f3ac84620 100644 --- a/windows/security/threat-protection/auditing/audit-other-account-management-events.md +++ b/windows/security/threat-protection/auditing/audit-other-account-management-events.md @@ -3,14 +3,14 @@ title: Audit Other Account Management Events (Windows 10) description: The Advanced Security Audit policy setting, Audit Other Account Management Events, determines if user account management audit events are generated. ms.assetid: 4ce22eeb-a96f-4cf9-a46d-6642961a31d5 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-other-logonlogoff-events.md b/windows/security/threat-protection/auditing/audit-other-logonlogoff-events.md index 9314db237d..cfadd950fa 100644 --- a/windows/security/threat-protection/auditing/audit-other-logonlogoff-events.md +++ b/windows/security/threat-protection/auditing/audit-other-logonlogoff-events.md @@ -3,14 +3,14 @@ title: Audit Other Logon/Logoff Events (Windows 10) description: The Advanced Security Audit policy setting, Audit Other Logon/Logoff Events, determines if Windows generates audit events for other logon or logoff events. ms.assetid: 76d987cd-1917-4907-a739-dd642609a458 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-other-object-access-events.md b/windows/security/threat-protection/auditing/audit-other-object-access-events.md index 9131eff82e..287ef71e1d 100644 --- a/windows/security/threat-protection/auditing/audit-other-object-access-events.md +++ b/windows/security/threat-protection/auditing/audit-other-object-access-events.md @@ -3,14 +3,14 @@ title: Audit Other Object Access Events (Windows 10) description: The policy setting, Audit Other Object Access Events, determines if audit events are generated for the management of Task Scheduler jobs or COM+ objects. ms.assetid: b9774595-595d-4199-b0c5-8dbc12b6c8b2 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-other-policy-change-events.md b/windows/security/threat-protection/auditing/audit-other-policy-change-events.md index 9119efbc58..2ebaf41f93 100644 --- a/windows/security/threat-protection/auditing/audit-other-policy-change-events.md +++ b/windows/security/threat-protection/auditing/audit-other-policy-change-events.md @@ -3,14 +3,14 @@ title: Audit Other Policy Change Events (Windows 10) description: The policy setting, Audit Other Policy Change Events, determines if audit events are generated for security policy changes that are not otherwise audited. ms.assetid: 8618502e-c21c-41cc-8a49-3dc1eb359e60 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-other-privilege-use-events.md b/windows/security/threat-protection/auditing/audit-other-privilege-use-events.md index 46f053cae3..7ffd11fc64 100644 --- a/windows/security/threat-protection/auditing/audit-other-privilege-use-events.md +++ b/windows/security/threat-protection/auditing/audit-other-privilege-use-events.md @@ -3,14 +3,14 @@ title: Audit Other Privilege Use Events (Windows 10) description: Learn about the audit other privilege use events, an auditing subcategory that should not have any events in it but enables generation of event 4985(S). ms.assetid: 5f7f5b25-42a6-499f-8aa2-01ac79a2a63c ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-other-system-events.md b/windows/security/threat-protection/auditing/audit-other-system-events.md index 5d7042e1dc..dd61dda8ea 100644 --- a/windows/security/threat-protection/auditing/audit-other-system-events.md +++ b/windows/security/threat-protection/auditing/audit-other-system-events.md @@ -3,14 +3,14 @@ title: Audit Other System Events (Windows 10) description: The Advanced Security Audit policy setting, Audit Other System Events, determines if the operating system audits various system events. ms.assetid: 2401e4cc-d94e-41ec-82a7-e10914295f8b ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-pnp-activity.md b/windows/security/threat-protection/auditing/audit-pnp-activity.md index fa29bfac6d..bae8fa6df6 100644 --- a/windows/security/threat-protection/auditing/audit-pnp-activity.md +++ b/windows/security/threat-protection/auditing/audit-pnp-activity.md @@ -3,14 +3,14 @@ title: Audit PNP Activity (Windows 10) description: The advanced security audit policy setting, Audit PNP Activity, determines when plug and play detects an external device. ms.assetid: A3D87B3B-EBBE-442A-953B-9EB75A5F600E ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-process-creation.md b/windows/security/threat-protection/auditing/audit-process-creation.md index 538a1b7fa9..a2e6e0c9c6 100644 --- a/windows/security/threat-protection/auditing/audit-process-creation.md +++ b/windows/security/threat-protection/auditing/audit-process-creation.md @@ -3,14 +3,14 @@ title: Audit Process Creation (Windows 10) description: The Advanced Security Audit policy setting, Audit Process Creation, determines if audit events are generated when a process is created (starts). ms.assetid: 67e39fcd-ded6-45e8-b1b6-d411e4e93019 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 03/16/2022 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-process-termination.md b/windows/security/threat-protection/auditing/audit-process-termination.md index 72e92a74e0..584f8b8880 100644 --- a/windows/security/threat-protection/auditing/audit-process-termination.md +++ b/windows/security/threat-protection/auditing/audit-process-termination.md @@ -3,14 +3,14 @@ title: Audit Process Termination (Windows 10) description: The Advanced Security Audit policy setting, Audit Process Termination, determines if audit events are generated when an attempt is made to end a process. ms.assetid: 65d88e53-14aa-48a4-812b-557cebbf9e50 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-registry.md b/windows/security/threat-protection/auditing/audit-registry.md index a9559b8677..13960b7b4c 100644 --- a/windows/security/threat-protection/auditing/audit-registry.md +++ b/windows/security/threat-protection/auditing/audit-registry.md @@ -3,14 +3,14 @@ title: Audit Registry (Windows 10) description: The Advanced Security Audit policy setting, Audit Registry, determines if audit events are generated when users attempt to access registry objects. ms.assetid: 02bcc23b-4823-46ac-b822-67beedf56b32 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 01/05/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-removable-storage.md b/windows/security/threat-protection/auditing/audit-removable-storage.md index 1b527f37be..eae70e36ee 100644 --- a/windows/security/threat-protection/auditing/audit-removable-storage.md +++ b/windows/security/threat-protection/auditing/audit-removable-storage.md @@ -3,14 +3,14 @@ title: Audit Removable Storage (Windows 10) description: The Advanced Security Audit policy setting, Audit Removable Storage, determines when there is a read or a write to a removable drive. ms.assetid: 1746F7B3-8B41-4661-87D8-12F734AFFB26 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-rpc-events.md b/windows/security/threat-protection/auditing/audit-rpc-events.md index 087ff6ed52..0b881d3f43 100644 --- a/windows/security/threat-protection/auditing/audit-rpc-events.md +++ b/windows/security/threat-protection/auditing/audit-rpc-events.md @@ -3,14 +3,14 @@ title: Audit RPC Events (Windows 10) description: Audit RPC Events is an audit policy setting that determines if audit events are generated when inbound remote procedure call (RPC) connections are made. ms.assetid: 868aec2d-93b4-4bc8-a150-941f88838ba6 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-sam.md b/windows/security/threat-protection/auditing/audit-sam.md index 93c399ae54..4297c79c86 100644 --- a/windows/security/threat-protection/auditing/audit-sam.md +++ b/windows/security/threat-protection/auditing/audit-sam.md @@ -3,14 +3,14 @@ title: Audit SAM (Windows 10) description: The Advanced Security Audit policy setting, Audit SAM, enables you to audit events generated by attempts to access Security Account Manager (SAM) objects. ms.assetid: 1d00f955-383d-4c95-bbd1-fab4a991a46e ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-security-group-management.md b/windows/security/threat-protection/auditing/audit-security-group-management.md index db3bc5689b..5d21c7bd36 100644 --- a/windows/security/threat-protection/auditing/audit-security-group-management.md +++ b/windows/security/threat-protection/auditing/audit-security-group-management.md @@ -3,14 +3,14 @@ title: Audit Security Group Management (Windows 10) description: The policy setting, Audit Security Group Management, determines if audit events are generated when specific security group management tasks are performed. ms.assetid: ac2ee101-557b-4c84-b9fa-4fb23331f1aa ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-security-state-change.md b/windows/security/threat-protection/auditing/audit-security-state-change.md index 88a21e9a8b..7e25a9e858 100644 --- a/windows/security/threat-protection/auditing/audit-security-state-change.md +++ b/windows/security/threat-protection/auditing/audit-security-state-change.md @@ -3,14 +3,14 @@ title: Audit Security State Change (Windows 10) description: The policy setting, Audit Security State Change, which determines whether Windows generates audit events for changes in the security state of a system. ms.assetid: decb3218-a67d-4efa-afc0-337c79a89a2d ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-security-system-extension.md b/windows/security/threat-protection/auditing/audit-security-system-extension.md index 057d504bc1..f2a020e961 100644 --- a/windows/security/threat-protection/auditing/audit-security-system-extension.md +++ b/windows/security/threat-protection/auditing/audit-security-system-extension.md @@ -3,14 +3,14 @@ title: Audit Security System Extension (Windows 10) description: The Advanced Security Audit policy setting, Audit Security System Extension, determines if audit events related to security system extensions are generated. ms.assetid: 9f3c6bde-42b2-4a0a-b353-ed3106ebc005 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-sensitive-privilege-use.md b/windows/security/threat-protection/auditing/audit-sensitive-privilege-use.md index e54927afd1..3b87a0810f 100644 --- a/windows/security/threat-protection/auditing/audit-sensitive-privilege-use.md +++ b/windows/security/threat-protection/auditing/audit-sensitive-privilege-use.md @@ -3,14 +3,14 @@ title: Audit Sensitive Privilege Use (Windows 10) description: The policy setting, Audit Sensitive Privilege Use, determines if the operating system generates audit events when sensitive privileges (user rights) are used. ms.assetid: 915abf50-42d2-45f6-9fd1-e7bd201b193d ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-special-logon.md b/windows/security/threat-protection/auditing/audit-special-logon.md index 7cf389f177..ef4cf15494 100644 --- a/windows/security/threat-protection/auditing/audit-special-logon.md +++ b/windows/security/threat-protection/auditing/audit-special-logon.md @@ -3,14 +3,14 @@ title: Audit Special Logon (Windows 10) description: The Advanced Security Audit policy setting, Audit Special Logon, determines if audit events are generated under special sign in (or logon) circumstances. ms.assetid: e1501bac-1d09-4593-8ebb-f311231567d3 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-system-integrity.md b/windows/security/threat-protection/auditing/audit-system-integrity.md index e4b357fa00..59ddddcc56 100644 --- a/windows/security/threat-protection/auditing/audit-system-integrity.md +++ b/windows/security/threat-protection/auditing/audit-system-integrity.md @@ -3,14 +3,14 @@ title: Audit System Integrity (Windows 10) description: The policy setting, Audit System Integrity, determines if the operating system audits events that violate the integrity of the security subsystem. ms.assetid: 942a9a7f-fa31-4067-88c7-f73978bf2034 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-token-right-adjusted.md b/windows/security/threat-protection/auditing/audit-token-right-adjusted.md index 3d85c00f81..5eb81c872a 100644 --- a/windows/security/threat-protection/auditing/audit-token-right-adjusted.md +++ b/windows/security/threat-protection/auditing/audit-token-right-adjusted.md @@ -1,9 +1,9 @@ --- title: Audit Token Right Adjusted (Windows 10) description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Token Right Adjusted, which determines whether the operating system generates audit events when specific changes are made to the privileges of a token. -manager: dansimp -author: dansimp -ms.author: dansimp +manager: aaroncz +author: vinaypamnani-msft +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.technology: windows-sec diff --git a/windows/security/threat-protection/auditing/audit-user-account-management.md b/windows/security/threat-protection/auditing/audit-user-account-management.md index e958273064..e1460e7aa6 100644 --- a/windows/security/threat-protection/auditing/audit-user-account-management.md +++ b/windows/security/threat-protection/auditing/audit-user-account-management.md @@ -3,14 +3,14 @@ title: Audit User Account Management (Windows 10) description: Audit User Account Management is an audit policy setting that determines if the operating system generates audit events when certain tasks are performed. ms.assetid: f7e72998-3858-4197-a443-19586ecc4bfb ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/audit-user-device-claims.md b/windows/security/threat-protection/auditing/audit-user-device-claims.md index 9b92a3022e..adfe26b5d1 100644 --- a/windows/security/threat-protection/auditing/audit-user-device-claims.md +++ b/windows/security/threat-protection/auditing/audit-user-device-claims.md @@ -3,14 +3,14 @@ title: Audit User/Device Claims (Windows 10) description: Audit User/Device Claims is an audit policy setting that enables you to audit security events that are generated by user and device claims. ms.assetid: D3D2BFAF-F2C0-462A-9377-673DB49D5486 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/06/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/basic-audit-account-logon-events.md b/windows/security/threat-protection/auditing/basic-audit-account-logon-events.md index e8f37ef2fc..fd30c96538 100644 --- a/windows/security/threat-protection/auditing/basic-audit-account-logon-events.md +++ b/windows/security/threat-protection/auditing/basic-audit-account-logon-events.md @@ -3,14 +3,14 @@ title: Audit account logon events (Windows 10) description: Determines whether to audit each instance of a user logging on to or logging off from another device in which this device is used to validate the account. ms.assetid: 84B44181-E325-49A1-8398-AECC3CE0A516 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: none -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/auditing/basic-audit-account-management.md b/windows/security/threat-protection/auditing/basic-audit-account-management.md index 1656e7f0eb..5198cd91e7 100644 --- a/windows/security/threat-protection/auditing/basic-audit-account-management.md +++ b/windows/security/threat-protection/auditing/basic-audit-account-management.md @@ -3,14 +3,14 @@ title: Audit account management (Windows 10) description: Determines whether to audit each event of account management on a device. ms.assetid: 369197E1-7E0E-45A4-89EA-16D91EF01689 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: none -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/auditing/basic-audit-directory-service-access.md b/windows/security/threat-protection/auditing/basic-audit-directory-service-access.md index 37ea6c6cb7..6baff08ecd 100644 --- a/windows/security/threat-protection/auditing/basic-audit-directory-service-access.md +++ b/windows/security/threat-protection/auditing/basic-audit-directory-service-access.md @@ -3,14 +3,14 @@ title: Basic audit directory service access (Windows 10) description: Determines whether to audit the event of a user accessing an Active Directory object that has its own system access control list (SACL) specified. ms.assetid: 52F02EED-3CFE-4307-8D06-CF1E27693D09 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: none -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/auditing/basic-audit-logon-events.md b/windows/security/threat-protection/auditing/basic-audit-logon-events.md index c0be497365..414793c373 100644 --- a/windows/security/threat-protection/auditing/basic-audit-logon-events.md +++ b/windows/security/threat-protection/auditing/basic-audit-logon-events.md @@ -3,14 +3,14 @@ title: Audit logon events (Windows 10) description: Determines whether to audit each instance of a user logging on to or logging off from a device. ms.assetid: 78B5AFCB-0BBD-4C38-9FE9-6B4571B94A35 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: none -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/auditing/basic-audit-object-access.md b/windows/security/threat-protection/auditing/basic-audit-object-access.md index 713700f0c2..eea30b98ef 100644 --- a/windows/security/threat-protection/auditing/basic-audit-object-access.md +++ b/windows/security/threat-protection/auditing/basic-audit-object-access.md @@ -3,14 +3,14 @@ title: Audit object access (Windows 10) description: The policy setting, Audit object access, determines whether to audit the event generated when a user accesses an object that has its own SACL specified. ms.assetid: D15B6D67-7886-44C2-9972-3F192D5407EA ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: none -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/auditing/basic-audit-policy-change.md b/windows/security/threat-protection/auditing/basic-audit-policy-change.md index ab4eb9ba52..b96ea7b99e 100644 --- a/windows/security/threat-protection/auditing/basic-audit-policy-change.md +++ b/windows/security/threat-protection/auditing/basic-audit-policy-change.md @@ -3,14 +3,14 @@ title: Audit policy change (Windows 10) description: Determines whether to audit every incident of a change to user rights assignment policies, audit policies, or trust policies. ms.assetid: 1025A648-6B22-4C85-9F47-FE0897F1FA31 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: none -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/auditing/basic-audit-privilege-use.md b/windows/security/threat-protection/auditing/basic-audit-privilege-use.md index 9949cfab8d..a0d131b788 100644 --- a/windows/security/threat-protection/auditing/basic-audit-privilege-use.md +++ b/windows/security/threat-protection/auditing/basic-audit-privilege-use.md @@ -3,14 +3,14 @@ title: Audit privilege use (Windows 10) description: Determines whether to audit each instance of a user exercising a user right. ms.assetid: C5C6DAAF-8B58-4DFB-B1CE-F0675AE0E9F8 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: none -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/auditing/basic-audit-process-tracking.md b/windows/security/threat-protection/auditing/basic-audit-process-tracking.md index a1234e42c5..e1e8ec83dc 100644 --- a/windows/security/threat-protection/auditing/basic-audit-process-tracking.md +++ b/windows/security/threat-protection/auditing/basic-audit-process-tracking.md @@ -3,14 +3,14 @@ title: Audit process tracking (Windows 10) description: Determines whether to audit detailed tracking information for events such as program activation, process exit, handle duplication, and indirect object access. ms.assetid: 91AC5C1E-F4DA-4B16-BEE2-C92D66E4CEEA ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: none -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/auditing/basic-audit-system-events.md b/windows/security/threat-protection/auditing/basic-audit-system-events.md index 0f97e6acd1..0f47401092 100644 --- a/windows/security/threat-protection/auditing/basic-audit-system-events.md +++ b/windows/security/threat-protection/auditing/basic-audit-system-events.md @@ -3,14 +3,14 @@ title: Audit system events (Windows 10) description: Determines whether to audit when a user restarts or shuts down the computer or when an event occurs that affects either the system security or the security log. ms.assetid: BF27588C-2AA7-4365-A4BF-3BB377916447 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: none -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/auditing/basic-security-audit-policies.md b/windows/security/threat-protection/auditing/basic-security-audit-policies.md index 252459caae..ba11dec1f1 100644 --- a/windows/security/threat-protection/auditing/basic-security-audit-policies.md +++ b/windows/security/threat-protection/auditing/basic-security-audit-policies.md @@ -3,14 +3,14 @@ title: Basic security audit policies (Windows 10) description: Learn about basic security audit policies that specify the categories of security-related events that you want to audit for the needs of your organization. ms.assetid: 3B678568-7AD7-4734-9BB4-53CF5E04E1D3 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: none -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/auditing/basic-security-audit-policy-settings.md b/windows/security/threat-protection/auditing/basic-security-audit-policy-settings.md index 37f8dddc0f..306c7c8339 100644 --- a/windows/security/threat-protection/auditing/basic-security-audit-policy-settings.md +++ b/windows/security/threat-protection/auditing/basic-security-audit-policy-settings.md @@ -3,14 +3,14 @@ title: Basic security audit policy settings (Windows 10) description: Basic security audit policy settings are found under Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Audit Policy. ms.assetid: 31C2C453-2CFC-4D9E-BC88-8CE1C1A8F900 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: none -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/auditing/create-a-basic-audit-policy-settings-for-an-event-category.md b/windows/security/threat-protection/auditing/create-a-basic-audit-policy-settings-for-an-event-category.md index 45befb2420..af627fc630 100644 --- a/windows/security/threat-protection/auditing/create-a-basic-audit-policy-settings-for-an-event-category.md +++ b/windows/security/threat-protection/auditing/create-a-basic-audit-policy-settings-for-an-event-category.md @@ -3,14 +3,14 @@ title: Create a basic audit policy for an event category (Windows 10) description: By defining auditing settings for specific event categories, you can create an auditing policy that suits the security needs of your organization. ms.assetid: C9F52751-B40D-482E-BE9D-2C61098249D3 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: none -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/auditing/event-1100.md b/windows/security/threat-protection/auditing/event-1100.md index 1a67e3d958..32ae7fc631 100644 --- a/windows/security/threat-protection/auditing/event-1100.md +++ b/windows/security/threat-protection/auditing/event-1100.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-1102.md b/windows/security/threat-protection/auditing/event-1102.md index d21241558c..26db20429c 100644 --- a/windows/security/threat-protection/auditing/event-1102.md +++ b/windows/security/threat-protection/auditing/event-1102.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-1104.md b/windows/security/threat-protection/auditing/event-1104.md index 53c67d234b..2dc26ce28a 100644 --- a/windows/security/threat-protection/auditing/event-1104.md +++ b/windows/security/threat-protection/auditing/event-1104.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-1105.md b/windows/security/threat-protection/auditing/event-1105.md index ae939ee4ca..876b254fac 100644 --- a/windows/security/threat-protection/auditing/event-1105.md +++ b/windows/security/threat-protection/auditing/event-1105.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-1108.md b/windows/security/threat-protection/auditing/event-1108.md index 7e9e4a1dd4..b29bdbea27 100644 --- a/windows/security/threat-protection/auditing/event-1108.md +++ b/windows/security/threat-protection/auditing/event-1108.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4608.md b/windows/security/threat-protection/auditing/event-4608.md index 955c45883a..e461d3a1f0 100644 --- a/windows/security/threat-protection/auditing/event-4608.md +++ b/windows/security/threat-protection/auditing/event-4608.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4610.md b/windows/security/threat-protection/auditing/event-4610.md index 4248720724..a9256d7167 100644 --- a/windows/security/threat-protection/auditing/event-4610.md +++ b/windows/security/threat-protection/auditing/event-4610.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4611.md b/windows/security/threat-protection/auditing/event-4611.md index 503c8d0da2..ddfd12cebd 100644 --- a/windows/security/threat-protection/auditing/event-4611.md +++ b/windows/security/threat-protection/auditing/event-4611.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4612.md b/windows/security/threat-protection/auditing/event-4612.md index 151c9f9d71..1894b7e87a 100644 --- a/windows/security/threat-protection/auditing/event-4612.md +++ b/windows/security/threat-protection/auditing/event-4612.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4614.md b/windows/security/threat-protection/auditing/event-4614.md index 9b4a55bf5e..00aa2bf61d 100644 --- a/windows/security/threat-protection/auditing/event-4614.md +++ b/windows/security/threat-protection/auditing/event-4614.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4615.md b/windows/security/threat-protection/auditing/event-4615.md index ffcc91a1f2..a71a72d981 100644 --- a/windows/security/threat-protection/auditing/event-4615.md +++ b/windows/security/threat-protection/auditing/event-4615.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4616.md b/windows/security/threat-protection/auditing/event-4616.md index 34c71e2c56..62f402ee6c 100644 --- a/windows/security/threat-protection/auditing/event-4616.md +++ b/windows/security/threat-protection/auditing/event-4616.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4618.md b/windows/security/threat-protection/auditing/event-4618.md index f67334d36a..52790766da 100644 --- a/windows/security/threat-protection/auditing/event-4618.md +++ b/windows/security/threat-protection/auditing/event-4618.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4621.md b/windows/security/threat-protection/auditing/event-4621.md index e4188be9df..145a52481e 100644 --- a/windows/security/threat-protection/auditing/event-4621.md +++ b/windows/security/threat-protection/auditing/event-4621.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4622.md b/windows/security/threat-protection/auditing/event-4622.md index 150ef448af..d71804453a 100644 --- a/windows/security/threat-protection/auditing/event-4622.md +++ b/windows/security/threat-protection/auditing/event-4622.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4624.md b/windows/security/threat-protection/auditing/event-4624.md index 38faea78d6..af8492549e 100644 --- a/windows/security/threat-protection/auditing/event-4624.md +++ b/windows/security/threat-protection/auditing/event-4624.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4625.md b/windows/security/threat-protection/auditing/event-4625.md index 44603fc006..a8cf41f43c 100644 --- a/windows/security/threat-protection/auditing/event-4625.md +++ b/windows/security/threat-protection/auditing/event-4625.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 01/03/2022 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4626.md b/windows/security/threat-protection/auditing/event-4626.md index cc5ab9874a..40dda4fb91 100644 --- a/windows/security/threat-protection/auditing/event-4626.md +++ b/windows/security/threat-protection/auditing/event-4626.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4627.md b/windows/security/threat-protection/auditing/event-4627.md index b050838a58..2ced3b38aa 100644 --- a/windows/security/threat-protection/auditing/event-4627.md +++ b/windows/security/threat-protection/auditing/event-4627.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4634.md b/windows/security/threat-protection/auditing/event-4634.md index 27f923aeaa..3c9d5b5fcb 100644 --- a/windows/security/threat-protection/auditing/event-4634.md +++ b/windows/security/threat-protection/auditing/event-4634.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4647.md b/windows/security/threat-protection/auditing/event-4647.md index eabd7698b9..75ebc4000b 100644 --- a/windows/security/threat-protection/auditing/event-4647.md +++ b/windows/security/threat-protection/auditing/event-4647.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4648.md b/windows/security/threat-protection/auditing/event-4648.md index 04e69119ac..38f6872968 100644 --- a/windows/security/threat-protection/auditing/event-4648.md +++ b/windows/security/threat-protection/auditing/event-4648.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4649.md b/windows/security/threat-protection/auditing/event-4649.md index f3b32117be..eb4add10ec 100644 --- a/windows/security/threat-protection/auditing/event-4649.md +++ b/windows/security/threat-protection/auditing/event-4649.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4656.md b/windows/security/threat-protection/auditing/event-4656.md index 7f9dd2557b..e00a414562 100644 --- a/windows/security/threat-protection/auditing/event-4656.md +++ b/windows/security/threat-protection/auditing/event-4656.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4657.md b/windows/security/threat-protection/auditing/event-4657.md index 7c8a7b6c54..5d5f2aa622 100644 --- a/windows/security/threat-protection/auditing/event-4657.md +++ b/windows/security/threat-protection/auditing/event-4657.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4658.md b/windows/security/threat-protection/auditing/event-4658.md index 957b595d7d..2529318f4c 100644 --- a/windows/security/threat-protection/auditing/event-4658.md +++ b/windows/security/threat-protection/auditing/event-4658.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4660.md b/windows/security/threat-protection/auditing/event-4660.md index 7fa92fc68e..78d23e5710 100644 --- a/windows/security/threat-protection/auditing/event-4660.md +++ b/windows/security/threat-protection/auditing/event-4660.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4661.md b/windows/security/threat-protection/auditing/event-4661.md index a254ab803c..21aab6e49b 100644 --- a/windows/security/threat-protection/auditing/event-4661.md +++ b/windows/security/threat-protection/auditing/event-4661.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4662.md b/windows/security/threat-protection/auditing/event-4662.md index ab5968f778..46ca1c34bf 100644 --- a/windows/security/threat-protection/auditing/event-4662.md +++ b/windows/security/threat-protection/auditing/event-4662.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4663.md b/windows/security/threat-protection/auditing/event-4663.md index ada40db01d..b407e338d2 100644 --- a/windows/security/threat-protection/auditing/event-4663.md +++ b/windows/security/threat-protection/auditing/event-4663.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4664.md b/windows/security/threat-protection/auditing/event-4664.md index b6a2a10e16..c3c06a1bff 100644 --- a/windows/security/threat-protection/auditing/event-4664.md +++ b/windows/security/threat-protection/auditing/event-4664.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4670.md b/windows/security/threat-protection/auditing/event-4670.md index e0477b2e16..3c34a477b3 100644 --- a/windows/security/threat-protection/auditing/event-4670.md +++ b/windows/security/threat-protection/auditing/event-4670.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4671.md b/windows/security/threat-protection/auditing/event-4671.md index c1374cae22..b3d70bd49a 100644 --- a/windows/security/threat-protection/auditing/event-4671.md +++ b/windows/security/threat-protection/auditing/event-4671.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4672.md b/windows/security/threat-protection/auditing/event-4672.md index 863cb342a4..b1dcd19a2f 100644 --- a/windows/security/threat-protection/auditing/event-4672.md +++ b/windows/security/threat-protection/auditing/event-4672.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4673.md b/windows/security/threat-protection/auditing/event-4673.md index 4ee65904e9..816f3243d3 100644 --- a/windows/security/threat-protection/auditing/event-4673.md +++ b/windows/security/threat-protection/auditing/event-4673.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4674.md b/windows/security/threat-protection/auditing/event-4674.md index 038e21fa18..4811afdc89 100644 --- a/windows/security/threat-protection/auditing/event-4674.md +++ b/windows/security/threat-protection/auditing/event-4674.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4675.md b/windows/security/threat-protection/auditing/event-4675.md index 47a81b9444..c39393eaeb 100644 --- a/windows/security/threat-protection/auditing/event-4675.md +++ b/windows/security/threat-protection/auditing/event-4675.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4688.md b/windows/security/threat-protection/auditing/event-4688.md index 866d555375..9fb85668e9 100644 --- a/windows/security/threat-protection/auditing/event-4688.md +++ b/windows/security/threat-protection/auditing/event-4688.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 01/24/2022 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4689.md b/windows/security/threat-protection/auditing/event-4689.md index 3d50a5e80d..4ce41a0a7f 100644 --- a/windows/security/threat-protection/auditing/event-4689.md +++ b/windows/security/threat-protection/auditing/event-4689.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4690.md b/windows/security/threat-protection/auditing/event-4690.md index 84686b24aa..d199963bc4 100644 --- a/windows/security/threat-protection/auditing/event-4690.md +++ b/windows/security/threat-protection/auditing/event-4690.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4691.md b/windows/security/threat-protection/auditing/event-4691.md index c8ce062789..c4cabb426e 100644 --- a/windows/security/threat-protection/auditing/event-4691.md +++ b/windows/security/threat-protection/auditing/event-4691.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4692.md b/windows/security/threat-protection/auditing/event-4692.md index 639cac22bf..b4655573c6 100644 --- a/windows/security/threat-protection/auditing/event-4692.md +++ b/windows/security/threat-protection/auditing/event-4692.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4693.md b/windows/security/threat-protection/auditing/event-4693.md index e816c4c45b..604b596451 100644 --- a/windows/security/threat-protection/auditing/event-4693.md +++ b/windows/security/threat-protection/auditing/event-4693.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4694.md b/windows/security/threat-protection/auditing/event-4694.md index 1f64dc3491..0282e7d3b4 100644 --- a/windows/security/threat-protection/auditing/event-4694.md +++ b/windows/security/threat-protection/auditing/event-4694.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4695.md b/windows/security/threat-protection/auditing/event-4695.md index f4c77584c7..0a1c8102df 100644 --- a/windows/security/threat-protection/auditing/event-4695.md +++ b/windows/security/threat-protection/auditing/event-4695.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4696.md b/windows/security/threat-protection/auditing/event-4696.md index dd8e59af94..503e8c18b5 100644 --- a/windows/security/threat-protection/auditing/event-4696.md +++ b/windows/security/threat-protection/auditing/event-4696.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4697.md b/windows/security/threat-protection/auditing/event-4697.md index 32489e2c4d..6ca2ffe88c 100644 --- a/windows/security/threat-protection/auditing/event-4697.md +++ b/windows/security/threat-protection/auditing/event-4697.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4698.md b/windows/security/threat-protection/auditing/event-4698.md index 32adfda2d6..0e8b5ef51d 100644 --- a/windows/security/threat-protection/auditing/event-4698.md +++ b/windows/security/threat-protection/auditing/event-4698.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4699.md b/windows/security/threat-protection/auditing/event-4699.md index 4e94788e1f..a9d14b8c99 100644 --- a/windows/security/threat-protection/auditing/event-4699.md +++ b/windows/security/threat-protection/auditing/event-4699.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4700.md b/windows/security/threat-protection/auditing/event-4700.md index 9fb16aefd8..9846182ff5 100644 --- a/windows/security/threat-protection/auditing/event-4700.md +++ b/windows/security/threat-protection/auditing/event-4700.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4701.md b/windows/security/threat-protection/auditing/event-4701.md index f6c37f2fde..8efade99fd 100644 --- a/windows/security/threat-protection/auditing/event-4701.md +++ b/windows/security/threat-protection/auditing/event-4701.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4702.md b/windows/security/threat-protection/auditing/event-4702.md index e42e4e116b..7be335c868 100644 --- a/windows/security/threat-protection/auditing/event-4702.md +++ b/windows/security/threat-protection/auditing/event-4702.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4703.md b/windows/security/threat-protection/auditing/event-4703.md index 692ef083f0..b96826a470 100644 --- a/windows/security/threat-protection/auditing/event-4703.md +++ b/windows/security/threat-protection/auditing/event-4703.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4704.md b/windows/security/threat-protection/auditing/event-4704.md index 824a755e4b..461a643a95 100644 --- a/windows/security/threat-protection/auditing/event-4704.md +++ b/windows/security/threat-protection/auditing/event-4704.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4705.md b/windows/security/threat-protection/auditing/event-4705.md index 6738fed5c9..70cfbfdc90 100644 --- a/windows/security/threat-protection/auditing/event-4705.md +++ b/windows/security/threat-protection/auditing/event-4705.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4706.md b/windows/security/threat-protection/auditing/event-4706.md index cf21247125..bdbee520fb 100644 --- a/windows/security/threat-protection/auditing/event-4706.md +++ b/windows/security/threat-protection/auditing/event-4706.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4707.md b/windows/security/threat-protection/auditing/event-4707.md index 46cc4912f4..6cd9f771d0 100644 --- a/windows/security/threat-protection/auditing/event-4707.md +++ b/windows/security/threat-protection/auditing/event-4707.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4713.md b/windows/security/threat-protection/auditing/event-4713.md index 040a4757be..9940e66d35 100644 --- a/windows/security/threat-protection/auditing/event-4713.md +++ b/windows/security/threat-protection/auditing/event-4713.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4714.md b/windows/security/threat-protection/auditing/event-4714.md index 6ff804511a..38aad24335 100644 --- a/windows/security/threat-protection/auditing/event-4714.md +++ b/windows/security/threat-protection/auditing/event-4714.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4715.md b/windows/security/threat-protection/auditing/event-4715.md index 484f51c5ca..129d5815bb 100644 --- a/windows/security/threat-protection/auditing/event-4715.md +++ b/windows/security/threat-protection/auditing/event-4715.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4716.md b/windows/security/threat-protection/auditing/event-4716.md index 212334d05a..cd10d369cb 100644 --- a/windows/security/threat-protection/auditing/event-4716.md +++ b/windows/security/threat-protection/auditing/event-4716.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4717.md b/windows/security/threat-protection/auditing/event-4717.md index 22a4ae6f99..7f78cff24b 100644 --- a/windows/security/threat-protection/auditing/event-4717.md +++ b/windows/security/threat-protection/auditing/event-4717.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4718.md b/windows/security/threat-protection/auditing/event-4718.md index a6b2d122b0..244c704a46 100644 --- a/windows/security/threat-protection/auditing/event-4718.md +++ b/windows/security/threat-protection/auditing/event-4718.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4719.md b/windows/security/threat-protection/auditing/event-4719.md index b059b70570..7573462403 100644 --- a/windows/security/threat-protection/auditing/event-4719.md +++ b/windows/security/threat-protection/auditing/event-4719.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4720.md b/windows/security/threat-protection/auditing/event-4720.md index f825fb7830..92f0e29689 100644 --- a/windows/security/threat-protection/auditing/event-4720.md +++ b/windows/security/threat-protection/auditing/event-4720.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4722.md b/windows/security/threat-protection/auditing/event-4722.md index 6f79a8db9d..4c4760577c 100644 --- a/windows/security/threat-protection/auditing/event-4722.md +++ b/windows/security/threat-protection/auditing/event-4722.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4723.md b/windows/security/threat-protection/auditing/event-4723.md index 9c7be0c550..8f28c2cd9e 100644 --- a/windows/security/threat-protection/auditing/event-4723.md +++ b/windows/security/threat-protection/auditing/event-4723.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4724.md b/windows/security/threat-protection/auditing/event-4724.md index f6d92798fe..86ee75c102 100644 --- a/windows/security/threat-protection/auditing/event-4724.md +++ b/windows/security/threat-protection/auditing/event-4724.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4725.md b/windows/security/threat-protection/auditing/event-4725.md index 90c3413e42..bb763a6d94 100644 --- a/windows/security/threat-protection/auditing/event-4725.md +++ b/windows/security/threat-protection/auditing/event-4725.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4726.md b/windows/security/threat-protection/auditing/event-4726.md index a1b3aab4c7..3b94a9d932 100644 --- a/windows/security/threat-protection/auditing/event-4726.md +++ b/windows/security/threat-protection/auditing/event-4726.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4731.md b/windows/security/threat-protection/auditing/event-4731.md index 22c1e6eb40..14024e54dc 100644 --- a/windows/security/threat-protection/auditing/event-4731.md +++ b/windows/security/threat-protection/auditing/event-4731.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4732.md b/windows/security/threat-protection/auditing/event-4732.md index aa5565f35a..e664066bea 100644 --- a/windows/security/threat-protection/auditing/event-4732.md +++ b/windows/security/threat-protection/auditing/event-4732.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4733.md b/windows/security/threat-protection/auditing/event-4733.md index 083f18464e..aecd37a11c 100644 --- a/windows/security/threat-protection/auditing/event-4733.md +++ b/windows/security/threat-protection/auditing/event-4733.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4734.md b/windows/security/threat-protection/auditing/event-4734.md index f4780d9ea8..4c58d09b59 100644 --- a/windows/security/threat-protection/auditing/event-4734.md +++ b/windows/security/threat-protection/auditing/event-4734.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4735.md b/windows/security/threat-protection/auditing/event-4735.md index 2362e16e9c..ce3d862ef1 100644 --- a/windows/security/threat-protection/auditing/event-4735.md +++ b/windows/security/threat-protection/auditing/event-4735.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4738.md b/windows/security/threat-protection/auditing/event-4738.md index 39bbbe118d..0c8fb36711 100644 --- a/windows/security/threat-protection/auditing/event-4738.md +++ b/windows/security/threat-protection/auditing/event-4738.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4739.md b/windows/security/threat-protection/auditing/event-4739.md index 096dddc311..5f10b369d3 100644 --- a/windows/security/threat-protection/auditing/event-4739.md +++ b/windows/security/threat-protection/auditing/event-4739.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4740.md b/windows/security/threat-protection/auditing/event-4740.md index 8caa677a6c..4d0b0d8df2 100644 --- a/windows/security/threat-protection/auditing/event-4740.md +++ b/windows/security/threat-protection/auditing/event-4740.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4741.md b/windows/security/threat-protection/auditing/event-4741.md index 9575553088..70b34fee70 100644 --- a/windows/security/threat-protection/auditing/event-4741.md +++ b/windows/security/threat-protection/auditing/event-4741.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4742.md b/windows/security/threat-protection/auditing/event-4742.md index 714672c0cb..da608ef607 100644 --- a/windows/security/threat-protection/auditing/event-4742.md +++ b/windows/security/threat-protection/auditing/event-4742.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4743.md b/windows/security/threat-protection/auditing/event-4743.md index 56741dbe0a..e439cd89ae 100644 --- a/windows/security/threat-protection/auditing/event-4743.md +++ b/windows/security/threat-protection/auditing/event-4743.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4749.md b/windows/security/threat-protection/auditing/event-4749.md index 6a802579be..fd2d5944a0 100644 --- a/windows/security/threat-protection/auditing/event-4749.md +++ b/windows/security/threat-protection/auditing/event-4749.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4750.md b/windows/security/threat-protection/auditing/event-4750.md index 167d266933..f44abd9c34 100644 --- a/windows/security/threat-protection/auditing/event-4750.md +++ b/windows/security/threat-protection/auditing/event-4750.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4751.md b/windows/security/threat-protection/auditing/event-4751.md index 1680966da8..1f8e570ad1 100644 --- a/windows/security/threat-protection/auditing/event-4751.md +++ b/windows/security/threat-protection/auditing/event-4751.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4752.md b/windows/security/threat-protection/auditing/event-4752.md index 33b9da3ea2..dfb6e1ca78 100644 --- a/windows/security/threat-protection/auditing/event-4752.md +++ b/windows/security/threat-protection/auditing/event-4752.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4753.md b/windows/security/threat-protection/auditing/event-4753.md index 747fcbd8b4..d058d6c67b 100644 --- a/windows/security/threat-protection/auditing/event-4753.md +++ b/windows/security/threat-protection/auditing/event-4753.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4764.md b/windows/security/threat-protection/auditing/event-4764.md index 1d1a505b4d..1d1c326b32 100644 --- a/windows/security/threat-protection/auditing/event-4764.md +++ b/windows/security/threat-protection/auditing/event-4764.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4765.md b/windows/security/threat-protection/auditing/event-4765.md index f171b29603..975ba6c6fd 100644 --- a/windows/security/threat-protection/auditing/event-4765.md +++ b/windows/security/threat-protection/auditing/event-4765.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4766.md b/windows/security/threat-protection/auditing/event-4766.md index 9b0d0db5fe..f4c4c72b08 100644 --- a/windows/security/threat-protection/auditing/event-4766.md +++ b/windows/security/threat-protection/auditing/event-4766.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4767.md b/windows/security/threat-protection/auditing/event-4767.md index 916ad26f9d..15cbfe61f0 100644 --- a/windows/security/threat-protection/auditing/event-4767.md +++ b/windows/security/threat-protection/auditing/event-4767.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4768.md b/windows/security/threat-protection/auditing/event-4768.md index 6846561482..2504a29182 100644 --- a/windows/security/threat-protection/auditing/event-4768.md +++ b/windows/security/threat-protection/auditing/event-4768.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 10/20/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4769.md b/windows/security/threat-protection/auditing/event-4769.md index c3ad787f9e..b6d214a0e6 100644 --- a/windows/security/threat-protection/auditing/event-4769.md +++ b/windows/security/threat-protection/auditing/event-4769.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4770.md b/windows/security/threat-protection/auditing/event-4770.md index 40f752135e..ad500f9438 100644 --- a/windows/security/threat-protection/auditing/event-4770.md +++ b/windows/security/threat-protection/auditing/event-4770.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4771.md b/windows/security/threat-protection/auditing/event-4771.md index e2b66d8905..2bf678cb5f 100644 --- a/windows/security/threat-protection/auditing/event-4771.md +++ b/windows/security/threat-protection/auditing/event-4771.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4772.md b/windows/security/threat-protection/auditing/event-4772.md index 384ea2a5e0..b47920e1a2 100644 --- a/windows/security/threat-protection/auditing/event-4772.md +++ b/windows/security/threat-protection/auditing/event-4772.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4773.md b/windows/security/threat-protection/auditing/event-4773.md index 35ad7f2c6e..64b64b2a7f 100644 --- a/windows/security/threat-protection/auditing/event-4773.md +++ b/windows/security/threat-protection/auditing/event-4773.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4774.md b/windows/security/threat-protection/auditing/event-4774.md index d7e73812a8..d90262ba63 100644 --- a/windows/security/threat-protection/auditing/event-4774.md +++ b/windows/security/threat-protection/auditing/event-4774.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4775.md b/windows/security/threat-protection/auditing/event-4775.md index b635329953..f3e9fe6fb3 100644 --- a/windows/security/threat-protection/auditing/event-4775.md +++ b/windows/security/threat-protection/auditing/event-4775.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4776.md b/windows/security/threat-protection/auditing/event-4776.md index aa6c83a26f..70a1ddd981 100644 --- a/windows/security/threat-protection/auditing/event-4776.md +++ b/windows/security/threat-protection/auditing/event-4776.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/13/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4777.md b/windows/security/threat-protection/auditing/event-4777.md index 74b68ee4d4..2c4d16c520 100644 --- a/windows/security/threat-protection/auditing/event-4777.md +++ b/windows/security/threat-protection/auditing/event-4777.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4778.md b/windows/security/threat-protection/auditing/event-4778.md index 4d71f59a24..f0f007b611 100644 --- a/windows/security/threat-protection/auditing/event-4778.md +++ b/windows/security/threat-protection/auditing/event-4778.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4779.md b/windows/security/threat-protection/auditing/event-4779.md index 8a034ed3af..6968f7112c 100644 --- a/windows/security/threat-protection/auditing/event-4779.md +++ b/windows/security/threat-protection/auditing/event-4779.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4780.md b/windows/security/threat-protection/auditing/event-4780.md index eb96a39284..4cdb52c09c 100644 --- a/windows/security/threat-protection/auditing/event-4780.md +++ b/windows/security/threat-protection/auditing/event-4780.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4781.md b/windows/security/threat-protection/auditing/event-4781.md index a152d41ede..f983f65ab6 100644 --- a/windows/security/threat-protection/auditing/event-4781.md +++ b/windows/security/threat-protection/auditing/event-4781.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4782.md b/windows/security/threat-protection/auditing/event-4782.md index 1079ddc301..f99d8cfc38 100644 --- a/windows/security/threat-protection/auditing/event-4782.md +++ b/windows/security/threat-protection/auditing/event-4782.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4793.md b/windows/security/threat-protection/auditing/event-4793.md index 570ace947f..f09632d7ae 100644 --- a/windows/security/threat-protection/auditing/event-4793.md +++ b/windows/security/threat-protection/auditing/event-4793.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4794.md b/windows/security/threat-protection/auditing/event-4794.md index 8f88976a35..bce1242646 100644 --- a/windows/security/threat-protection/auditing/event-4794.md +++ b/windows/security/threat-protection/auditing/event-4794.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4798.md b/windows/security/threat-protection/auditing/event-4798.md index 7eeafac41c..675ac8ae63 100644 --- a/windows/security/threat-protection/auditing/event-4798.md +++ b/windows/security/threat-protection/auditing/event-4798.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4799.md b/windows/security/threat-protection/auditing/event-4799.md index 01a317bd52..0f06aa7f65 100644 --- a/windows/security/threat-protection/auditing/event-4799.md +++ b/windows/security/threat-protection/auditing/event-4799.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4800.md b/windows/security/threat-protection/auditing/event-4800.md index 2b875cfd5d..d39ab6fe19 100644 --- a/windows/security/threat-protection/auditing/event-4800.md +++ b/windows/security/threat-protection/auditing/event-4800.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4801.md b/windows/security/threat-protection/auditing/event-4801.md index 35ef598149..c90c8fdea3 100644 --- a/windows/security/threat-protection/auditing/event-4801.md +++ b/windows/security/threat-protection/auditing/event-4801.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4802.md b/windows/security/threat-protection/auditing/event-4802.md index e372d5b282..4c84f2bd52 100644 --- a/windows/security/threat-protection/auditing/event-4802.md +++ b/windows/security/threat-protection/auditing/event-4802.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4803.md b/windows/security/threat-protection/auditing/event-4803.md index 3c3e80c86e..5f1894a8cf 100644 --- a/windows/security/threat-protection/auditing/event-4803.md +++ b/windows/security/threat-protection/auditing/event-4803.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4816.md b/windows/security/threat-protection/auditing/event-4816.md index 93576951c1..1d6ad4ae29 100644 --- a/windows/security/threat-protection/auditing/event-4816.md +++ b/windows/security/threat-protection/auditing/event-4816.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4817.md b/windows/security/threat-protection/auditing/event-4817.md index 68708166d7..26a781d5fa 100644 --- a/windows/security/threat-protection/auditing/event-4817.md +++ b/windows/security/threat-protection/auditing/event-4817.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4818.md b/windows/security/threat-protection/auditing/event-4818.md index c1bd31d8f9..baf2779455 100644 --- a/windows/security/threat-protection/auditing/event-4818.md +++ b/windows/security/threat-protection/auditing/event-4818.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4819.md b/windows/security/threat-protection/auditing/event-4819.md index af81133616..4cbfab1be0 100644 --- a/windows/security/threat-protection/auditing/event-4819.md +++ b/windows/security/threat-protection/auditing/event-4819.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4826.md b/windows/security/threat-protection/auditing/event-4826.md index a5fc916065..220ee7a580 100644 --- a/windows/security/threat-protection/auditing/event-4826.md +++ b/windows/security/threat-protection/auditing/event-4826.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4864.md b/windows/security/threat-protection/auditing/event-4864.md index ea84a736a0..61eb307968 100644 --- a/windows/security/threat-protection/auditing/event-4864.md +++ b/windows/security/threat-protection/auditing/event-4864.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4865.md b/windows/security/threat-protection/auditing/event-4865.md index 5bb092d7a4..bf45074afb 100644 --- a/windows/security/threat-protection/auditing/event-4865.md +++ b/windows/security/threat-protection/auditing/event-4865.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4866.md b/windows/security/threat-protection/auditing/event-4866.md index b588e61bbc..9386b9cba4 100644 --- a/windows/security/threat-protection/auditing/event-4866.md +++ b/windows/security/threat-protection/auditing/event-4866.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4867.md b/windows/security/threat-protection/auditing/event-4867.md index c080741dd9..6873600fc5 100644 --- a/windows/security/threat-protection/auditing/event-4867.md +++ b/windows/security/threat-protection/auditing/event-4867.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4902.md b/windows/security/threat-protection/auditing/event-4902.md index 89eeb36eb6..c95d24be90 100644 --- a/windows/security/threat-protection/auditing/event-4902.md +++ b/windows/security/threat-protection/auditing/event-4902.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4904.md b/windows/security/threat-protection/auditing/event-4904.md index 658f0b2f7e..a7554ed6c4 100644 --- a/windows/security/threat-protection/auditing/event-4904.md +++ b/windows/security/threat-protection/auditing/event-4904.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/07/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4905.md b/windows/security/threat-protection/auditing/event-4905.md index a7fdfa4dfa..11a3bf597b 100644 --- a/windows/security/threat-protection/auditing/event-4905.md +++ b/windows/security/threat-protection/auditing/event-4905.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4906.md b/windows/security/threat-protection/auditing/event-4906.md index 676c32fbcc..70848c2c2f 100644 --- a/windows/security/threat-protection/auditing/event-4906.md +++ b/windows/security/threat-protection/auditing/event-4906.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4907.md b/windows/security/threat-protection/auditing/event-4907.md index f6c5ebea92..64869d1958 100644 --- a/windows/security/threat-protection/auditing/event-4907.md +++ b/windows/security/threat-protection/auditing/event-4907.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4908.md b/windows/security/threat-protection/auditing/event-4908.md index 5173543a28..62a8a1992e 100644 --- a/windows/security/threat-protection/auditing/event-4908.md +++ b/windows/security/threat-protection/auditing/event-4908.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4909.md b/windows/security/threat-protection/auditing/event-4909.md index f85c02b5ec..f7e426beac 100644 --- a/windows/security/threat-protection/auditing/event-4909.md +++ b/windows/security/threat-protection/auditing/event-4909.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4910.md b/windows/security/threat-protection/auditing/event-4910.md index 0cdca35e3e..8d9fb6ca5d 100644 --- a/windows/security/threat-protection/auditing/event-4910.md +++ b/windows/security/threat-protection/auditing/event-4910.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4911.md b/windows/security/threat-protection/auditing/event-4911.md index 4a2e0e7e1f..5a07d7a28b 100644 --- a/windows/security/threat-protection/auditing/event-4911.md +++ b/windows/security/threat-protection/auditing/event-4911.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4912.md b/windows/security/threat-protection/auditing/event-4912.md index a9a2a1d9b0..e3f2374f99 100644 --- a/windows/security/threat-protection/auditing/event-4912.md +++ b/windows/security/threat-protection/auditing/event-4912.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4913.md b/windows/security/threat-protection/auditing/event-4913.md index dc79e60f50..dcaf7ca359 100644 --- a/windows/security/threat-protection/auditing/event-4913.md +++ b/windows/security/threat-protection/auditing/event-4913.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4928.md b/windows/security/threat-protection/auditing/event-4928.md index 64481ef466..346beb3c4b 100644 --- a/windows/security/threat-protection/auditing/event-4928.md +++ b/windows/security/threat-protection/auditing/event-4928.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4929.md b/windows/security/threat-protection/auditing/event-4929.md index bd67b19fac..f3fe7007a4 100644 --- a/windows/security/threat-protection/auditing/event-4929.md +++ b/windows/security/threat-protection/auditing/event-4929.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4930.md b/windows/security/threat-protection/auditing/event-4930.md index c63813a961..05746193a7 100644 --- a/windows/security/threat-protection/auditing/event-4930.md +++ b/windows/security/threat-protection/auditing/event-4930.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4931.md b/windows/security/threat-protection/auditing/event-4931.md index 46b91b742c..a90d55c58a 100644 --- a/windows/security/threat-protection/auditing/event-4931.md +++ b/windows/security/threat-protection/auditing/event-4931.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4932.md b/windows/security/threat-protection/auditing/event-4932.md index b686a7b13c..553b1554ab 100644 --- a/windows/security/threat-protection/auditing/event-4932.md +++ b/windows/security/threat-protection/auditing/event-4932.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4933.md b/windows/security/threat-protection/auditing/event-4933.md index 7fb4991241..11c18320c3 100644 --- a/windows/security/threat-protection/auditing/event-4933.md +++ b/windows/security/threat-protection/auditing/event-4933.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4934.md b/windows/security/threat-protection/auditing/event-4934.md index 65521bb868..b44747fd69 100644 --- a/windows/security/threat-protection/auditing/event-4934.md +++ b/windows/security/threat-protection/auditing/event-4934.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4935.md b/windows/security/threat-protection/auditing/event-4935.md index c939bc09ed..570b01e598 100644 --- a/windows/security/threat-protection/auditing/event-4935.md +++ b/windows/security/threat-protection/auditing/event-4935.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4936.md b/windows/security/threat-protection/auditing/event-4936.md index 37b1c8ca83..3a7945bdd8 100644 --- a/windows/security/threat-protection/auditing/event-4936.md +++ b/windows/security/threat-protection/auditing/event-4936.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4937.md b/windows/security/threat-protection/auditing/event-4937.md index 9bdef69aa8..058fa49bc8 100644 --- a/windows/security/threat-protection/auditing/event-4937.md +++ b/windows/security/threat-protection/auditing/event-4937.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4944.md b/windows/security/threat-protection/auditing/event-4944.md index 34ca3f9e47..54a708cbbe 100644 --- a/windows/security/threat-protection/auditing/event-4944.md +++ b/windows/security/threat-protection/auditing/event-4944.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4945.md b/windows/security/threat-protection/auditing/event-4945.md index cc7ffb2eec..b987b1c9a4 100644 --- a/windows/security/threat-protection/auditing/event-4945.md +++ b/windows/security/threat-protection/auditing/event-4945.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4946.md b/windows/security/threat-protection/auditing/event-4946.md index 5a3a44929a..05a92b02dd 100644 --- a/windows/security/threat-protection/auditing/event-4946.md +++ b/windows/security/threat-protection/auditing/event-4946.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4947.md b/windows/security/threat-protection/auditing/event-4947.md index 7d09cf4d23..2ba20c744c 100644 --- a/windows/security/threat-protection/auditing/event-4947.md +++ b/windows/security/threat-protection/auditing/event-4947.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4948.md b/windows/security/threat-protection/auditing/event-4948.md index ecc34d3112..49a277cb7b 100644 --- a/windows/security/threat-protection/auditing/event-4948.md +++ b/windows/security/threat-protection/auditing/event-4948.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4949.md b/windows/security/threat-protection/auditing/event-4949.md index 617b780983..83050f4469 100644 --- a/windows/security/threat-protection/auditing/event-4949.md +++ b/windows/security/threat-protection/auditing/event-4949.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4950.md b/windows/security/threat-protection/auditing/event-4950.md index 8c7148eb98..9b94938a6b 100644 --- a/windows/security/threat-protection/auditing/event-4950.md +++ b/windows/security/threat-protection/auditing/event-4950.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4951.md b/windows/security/threat-protection/auditing/event-4951.md index 6f7ede1970..220d2954a4 100644 --- a/windows/security/threat-protection/auditing/event-4951.md +++ b/windows/security/threat-protection/auditing/event-4951.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4952.md b/windows/security/threat-protection/auditing/event-4952.md index 3c9322ae26..988c2fcd99 100644 --- a/windows/security/threat-protection/auditing/event-4952.md +++ b/windows/security/threat-protection/auditing/event-4952.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4953.md b/windows/security/threat-protection/auditing/event-4953.md index c327d3a349..a69ce28acc 100644 --- a/windows/security/threat-protection/auditing/event-4953.md +++ b/windows/security/threat-protection/auditing/event-4953.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4954.md b/windows/security/threat-protection/auditing/event-4954.md index 67a7f024aa..c2dedeab3b 100644 --- a/windows/security/threat-protection/auditing/event-4954.md +++ b/windows/security/threat-protection/auditing/event-4954.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4956.md b/windows/security/threat-protection/auditing/event-4956.md index bc90d17945..1ae59f02ad 100644 --- a/windows/security/threat-protection/auditing/event-4956.md +++ b/windows/security/threat-protection/auditing/event-4956.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4957.md b/windows/security/threat-protection/auditing/event-4957.md index 5abad05870..bb642deb1b 100644 --- a/windows/security/threat-protection/auditing/event-4957.md +++ b/windows/security/threat-protection/auditing/event-4957.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4958.md b/windows/security/threat-protection/auditing/event-4958.md index 4bd2da3a99..eeeab9b126 100644 --- a/windows/security/threat-protection/auditing/event-4958.md +++ b/windows/security/threat-protection/auditing/event-4958.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4964.md b/windows/security/threat-protection/auditing/event-4964.md index 6e7bc52761..4066f73396 100644 --- a/windows/security/threat-protection/auditing/event-4964.md +++ b/windows/security/threat-protection/auditing/event-4964.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-4985.md b/windows/security/threat-protection/auditing/event-4985.md index 2f0e374a30..225d1d08a8 100644 --- a/windows/security/threat-protection/auditing/event-4985.md +++ b/windows/security/threat-protection/auditing/event-4985.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5024.md b/windows/security/threat-protection/auditing/event-5024.md index 46c44da725..2c1c44e3fe 100644 --- a/windows/security/threat-protection/auditing/event-5024.md +++ b/windows/security/threat-protection/auditing/event-5024.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5025.md b/windows/security/threat-protection/auditing/event-5025.md index fbc702ac8e..e3fe8ec3be 100644 --- a/windows/security/threat-protection/auditing/event-5025.md +++ b/windows/security/threat-protection/auditing/event-5025.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5027.md b/windows/security/threat-protection/auditing/event-5027.md index 47a348cf77..1610a55ecb 100644 --- a/windows/security/threat-protection/auditing/event-5027.md +++ b/windows/security/threat-protection/auditing/event-5027.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5028.md b/windows/security/threat-protection/auditing/event-5028.md index 65d5204a98..6bafd59bdf 100644 --- a/windows/security/threat-protection/auditing/event-5028.md +++ b/windows/security/threat-protection/auditing/event-5028.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5029.md b/windows/security/threat-protection/auditing/event-5029.md index 89b6ca69bb..0374f795d3 100644 --- a/windows/security/threat-protection/auditing/event-5029.md +++ b/windows/security/threat-protection/auditing/event-5029.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5030.md b/windows/security/threat-protection/auditing/event-5030.md index 86502afb98..785312b335 100644 --- a/windows/security/threat-protection/auditing/event-5030.md +++ b/windows/security/threat-protection/auditing/event-5030.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5031.md b/windows/security/threat-protection/auditing/event-5031.md index 0e6d81e9ac..961e0a0e16 100644 --- a/windows/security/threat-protection/auditing/event-5031.md +++ b/windows/security/threat-protection/auditing/event-5031.md @@ -1,15 +1,15 @@ --- title: 5031(F) The Windows Firewall Service blocked an application from accepting incoming connections on the network. (Windows 10) ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa description: Describes security event 5031(F) The Windows Firewall Service blocked an application from accepting incoming connections on the network. ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5032.md b/windows/security/threat-protection/auditing/event-5032.md index c8b0bff151..810a8e3505 100644 --- a/windows/security/threat-protection/auditing/event-5032.md +++ b/windows/security/threat-protection/auditing/event-5032.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5033.md b/windows/security/threat-protection/auditing/event-5033.md index dfbbcae025..07c9814a3b 100644 --- a/windows/security/threat-protection/auditing/event-5033.md +++ b/windows/security/threat-protection/auditing/event-5033.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5034.md b/windows/security/threat-protection/auditing/event-5034.md index e0815c5bd1..24d743030c 100644 --- a/windows/security/threat-protection/auditing/event-5034.md +++ b/windows/security/threat-protection/auditing/event-5034.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5035.md b/windows/security/threat-protection/auditing/event-5035.md index c6a382c517..d7e93f5982 100644 --- a/windows/security/threat-protection/auditing/event-5035.md +++ b/windows/security/threat-protection/auditing/event-5035.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5037.md b/windows/security/threat-protection/auditing/event-5037.md index d3542cd1d7..4ab5e11cee 100644 --- a/windows/security/threat-protection/auditing/event-5037.md +++ b/windows/security/threat-protection/auditing/event-5037.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5038.md b/windows/security/threat-protection/auditing/event-5038.md index 60b2f51b2d..30c1790eb9 100644 --- a/windows/security/threat-protection/auditing/event-5038.md +++ b/windows/security/threat-protection/auditing/event-5038.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5039.md b/windows/security/threat-protection/auditing/event-5039.md index aec25c2291..accfc3ae8f 100644 --- a/windows/security/threat-protection/auditing/event-5039.md +++ b/windows/security/threat-protection/auditing/event-5039.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5051.md b/windows/security/threat-protection/auditing/event-5051.md index 530cebdbe3..bf06c3d611 100644 --- a/windows/security/threat-protection/auditing/event-5051.md +++ b/windows/security/threat-protection/auditing/event-5051.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5056.md b/windows/security/threat-protection/auditing/event-5056.md index b8d749b9fe..5059d50c64 100644 --- a/windows/security/threat-protection/auditing/event-5056.md +++ b/windows/security/threat-protection/auditing/event-5056.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5057.md b/windows/security/threat-protection/auditing/event-5057.md index 6f251535e5..04d22f10de 100644 --- a/windows/security/threat-protection/auditing/event-5057.md +++ b/windows/security/threat-protection/auditing/event-5057.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5058.md b/windows/security/threat-protection/auditing/event-5058.md index 42a31d7a3a..4d8c8989e1 100644 --- a/windows/security/threat-protection/auditing/event-5058.md +++ b/windows/security/threat-protection/auditing/event-5058.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5059.md b/windows/security/threat-protection/auditing/event-5059.md index 5beef1d24c..6c069ab814 100644 --- a/windows/security/threat-protection/auditing/event-5059.md +++ b/windows/security/threat-protection/auditing/event-5059.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5060.md b/windows/security/threat-protection/auditing/event-5060.md index b8f9fb0ef7..00c3fc26b4 100644 --- a/windows/security/threat-protection/auditing/event-5060.md +++ b/windows/security/threat-protection/auditing/event-5060.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5061.md b/windows/security/threat-protection/auditing/event-5061.md index 58bcd9848d..2b6cc4b64c 100644 --- a/windows/security/threat-protection/auditing/event-5061.md +++ b/windows/security/threat-protection/auditing/event-5061.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5062.md b/windows/security/threat-protection/auditing/event-5062.md index 3ac8412240..b038353b7d 100644 --- a/windows/security/threat-protection/auditing/event-5062.md +++ b/windows/security/threat-protection/auditing/event-5062.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5063.md b/windows/security/threat-protection/auditing/event-5063.md index ca597eccaf..52e68d3dbd 100644 --- a/windows/security/threat-protection/auditing/event-5063.md +++ b/windows/security/threat-protection/auditing/event-5063.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5064.md b/windows/security/threat-protection/auditing/event-5064.md index ae83f4488b..9dd6ca5e47 100644 --- a/windows/security/threat-protection/auditing/event-5064.md +++ b/windows/security/threat-protection/auditing/event-5064.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5065.md b/windows/security/threat-protection/auditing/event-5065.md index e382f07e2f..46772ff759 100644 --- a/windows/security/threat-protection/auditing/event-5065.md +++ b/windows/security/threat-protection/auditing/event-5065.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5066.md b/windows/security/threat-protection/auditing/event-5066.md index 6a40bb0b06..1a4dd7ae96 100644 --- a/windows/security/threat-protection/auditing/event-5066.md +++ b/windows/security/threat-protection/auditing/event-5066.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5067.md b/windows/security/threat-protection/auditing/event-5067.md index 02b76446df..01b6ce22cb 100644 --- a/windows/security/threat-protection/auditing/event-5067.md +++ b/windows/security/threat-protection/auditing/event-5067.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5068.md b/windows/security/threat-protection/auditing/event-5068.md index ed2e8582db..c365519a4c 100644 --- a/windows/security/threat-protection/auditing/event-5068.md +++ b/windows/security/threat-protection/auditing/event-5068.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5069.md b/windows/security/threat-protection/auditing/event-5069.md index fc14219958..68a9da47b3 100644 --- a/windows/security/threat-protection/auditing/event-5069.md +++ b/windows/security/threat-protection/auditing/event-5069.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5070.md b/windows/security/threat-protection/auditing/event-5070.md index f21b182de2..85ccd666f0 100644 --- a/windows/security/threat-protection/auditing/event-5070.md +++ b/windows/security/threat-protection/auditing/event-5070.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5136.md b/windows/security/threat-protection/auditing/event-5136.md index 26b6d241f5..d58033c0a7 100644 --- a/windows/security/threat-protection/auditing/event-5136.md +++ b/windows/security/threat-protection/auditing/event-5136.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5137.md b/windows/security/threat-protection/auditing/event-5137.md index 0a90a9f3a9..a0d084c4f8 100644 --- a/windows/security/threat-protection/auditing/event-5137.md +++ b/windows/security/threat-protection/auditing/event-5137.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5138.md b/windows/security/threat-protection/auditing/event-5138.md index 0757dcd92c..abb03c8027 100644 --- a/windows/security/threat-protection/auditing/event-5138.md +++ b/windows/security/threat-protection/auditing/event-5138.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5139.md b/windows/security/threat-protection/auditing/event-5139.md index eabd06efdf..ca0b1825f9 100644 --- a/windows/security/threat-protection/auditing/event-5139.md +++ b/windows/security/threat-protection/auditing/event-5139.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5140.md b/windows/security/threat-protection/auditing/event-5140.md index b5ae516ec7..ea890e4738 100644 --- a/windows/security/threat-protection/auditing/event-5140.md +++ b/windows/security/threat-protection/auditing/event-5140.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5141.md b/windows/security/threat-protection/auditing/event-5141.md index e63227b1ad..fbc9435158 100644 --- a/windows/security/threat-protection/auditing/event-5141.md +++ b/windows/security/threat-protection/auditing/event-5141.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5142.md b/windows/security/threat-protection/auditing/event-5142.md index 706a6ab1a0..74e31d363f 100644 --- a/windows/security/threat-protection/auditing/event-5142.md +++ b/windows/security/threat-protection/auditing/event-5142.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5143.md b/windows/security/threat-protection/auditing/event-5143.md index e533127f2a..e485322da4 100644 --- a/windows/security/threat-protection/auditing/event-5143.md +++ b/windows/security/threat-protection/auditing/event-5143.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5144.md b/windows/security/threat-protection/auditing/event-5144.md index c440efc29d..50f697a96f 100644 --- a/windows/security/threat-protection/auditing/event-5144.md +++ b/windows/security/threat-protection/auditing/event-5144.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5145.md b/windows/security/threat-protection/auditing/event-5145.md index 1368fde95e..782cdb4911 100644 --- a/windows/security/threat-protection/auditing/event-5145.md +++ b/windows/security/threat-protection/auditing/event-5145.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5148.md b/windows/security/threat-protection/auditing/event-5148.md index d8739009b8..109b4da544 100644 --- a/windows/security/threat-protection/auditing/event-5148.md +++ b/windows/security/threat-protection/auditing/event-5148.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5149.md b/windows/security/threat-protection/auditing/event-5149.md index 5cbafb7fe3..b94279645b 100644 --- a/windows/security/threat-protection/auditing/event-5149.md +++ b/windows/security/threat-protection/auditing/event-5149.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5150.md b/windows/security/threat-protection/auditing/event-5150.md index fd48f85788..23c35f76d7 100644 --- a/windows/security/threat-protection/auditing/event-5150.md +++ b/windows/security/threat-protection/auditing/event-5150.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5151.md b/windows/security/threat-protection/auditing/event-5151.md index ea0b6f1ba5..239d0556a2 100644 --- a/windows/security/threat-protection/auditing/event-5151.md +++ b/windows/security/threat-protection/auditing/event-5151.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5152.md b/windows/security/threat-protection/auditing/event-5152.md index 20bb33c8fc..7fd8072d96 100644 --- a/windows/security/threat-protection/auditing/event-5152.md +++ b/windows/security/threat-protection/auditing/event-5152.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5153.md b/windows/security/threat-protection/auditing/event-5153.md index f9e60da5a0..355b963812 100644 --- a/windows/security/threat-protection/auditing/event-5153.md +++ b/windows/security/threat-protection/auditing/event-5153.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5154.md b/windows/security/threat-protection/auditing/event-5154.md index 4b45c0c9cd..4ada326421 100644 --- a/windows/security/threat-protection/auditing/event-5154.md +++ b/windows/security/threat-protection/auditing/event-5154.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5155.md b/windows/security/threat-protection/auditing/event-5155.md index 06487ca949..b24e159daf 100644 --- a/windows/security/threat-protection/auditing/event-5155.md +++ b/windows/security/threat-protection/auditing/event-5155.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5156.md b/windows/security/threat-protection/auditing/event-5156.md index 4c668565fa..a22acae52c 100644 --- a/windows/security/threat-protection/auditing/event-5156.md +++ b/windows/security/threat-protection/auditing/event-5156.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5157.md b/windows/security/threat-protection/auditing/event-5157.md index 3569920d49..c555d5aa36 100644 --- a/windows/security/threat-protection/auditing/event-5157.md +++ b/windows/security/threat-protection/auditing/event-5157.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5158.md b/windows/security/threat-protection/auditing/event-5158.md index e2ecfbd040..1255e8d0bb 100644 --- a/windows/security/threat-protection/auditing/event-5158.md +++ b/windows/security/threat-protection/auditing/event-5158.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5159.md b/windows/security/threat-protection/auditing/event-5159.md index 61393ef168..bbd1141c71 100644 --- a/windows/security/threat-protection/auditing/event-5159.md +++ b/windows/security/threat-protection/auditing/event-5159.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5168.md b/windows/security/threat-protection/auditing/event-5168.md index 570974bec3..1b97127e7f 100644 --- a/windows/security/threat-protection/auditing/event-5168.md +++ b/windows/security/threat-protection/auditing/event-5168.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5376.md b/windows/security/threat-protection/auditing/event-5376.md index ef83094d63..eaa77a9e64 100644 --- a/windows/security/threat-protection/auditing/event-5376.md +++ b/windows/security/threat-protection/auditing/event-5376.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5377.md b/windows/security/threat-protection/auditing/event-5377.md index d6440e7a09..fd9c84db3a 100644 --- a/windows/security/threat-protection/auditing/event-5377.md +++ b/windows/security/threat-protection/auditing/event-5377.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5378.md b/windows/security/threat-protection/auditing/event-5378.md index e84e1932e0..d25246b249 100644 --- a/windows/security/threat-protection/auditing/event-5378.md +++ b/windows/security/threat-protection/auditing/event-5378.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5447.md b/windows/security/threat-protection/auditing/event-5447.md index e20265f6c6..801d206b0b 100644 --- a/windows/security/threat-protection/auditing/event-5447.md +++ b/windows/security/threat-protection/auditing/event-5447.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5632.md b/windows/security/threat-protection/auditing/event-5632.md index 7b2b12b6e5..d7765406fd 100644 --- a/windows/security/threat-protection/auditing/event-5632.md +++ b/windows/security/threat-protection/auditing/event-5632.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5633.md b/windows/security/threat-protection/auditing/event-5633.md index 773a459b03..e0591f9a05 100644 --- a/windows/security/threat-protection/auditing/event-5633.md +++ b/windows/security/threat-protection/auditing/event-5633.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5712.md b/windows/security/threat-protection/auditing/event-5712.md index f3b0737f54..dbafd70da3 100644 --- a/windows/security/threat-protection/auditing/event-5712.md +++ b/windows/security/threat-protection/auditing/event-5712.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5888.md b/windows/security/threat-protection/auditing/event-5888.md index 1f26806087..0ac72b6488 100644 --- a/windows/security/threat-protection/auditing/event-5888.md +++ b/windows/security/threat-protection/auditing/event-5888.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5889.md b/windows/security/threat-protection/auditing/event-5889.md index 5b2c268093..821162c968 100644 --- a/windows/security/threat-protection/auditing/event-5889.md +++ b/windows/security/threat-protection/auditing/event-5889.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-5890.md b/windows/security/threat-protection/auditing/event-5890.md index e79e3d6362..a59fadc788 100644 --- a/windows/security/threat-protection/auditing/event-5890.md +++ b/windows/security/threat-protection/auditing/event-5890.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-6144.md b/windows/security/threat-protection/auditing/event-6144.md index 0cc09756be..959f1b969c 100644 --- a/windows/security/threat-protection/auditing/event-6144.md +++ b/windows/security/threat-protection/auditing/event-6144.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-6145.md b/windows/security/threat-protection/auditing/event-6145.md index 3a84f0746a..266a490fdd 100644 --- a/windows/security/threat-protection/auditing/event-6145.md +++ b/windows/security/threat-protection/auditing/event-6145.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/08/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-6281.md b/windows/security/threat-protection/auditing/event-6281.md index 08849399ff..d6701e243e 100644 --- a/windows/security/threat-protection/auditing/event-6281.md +++ b/windows/security/threat-protection/auditing/event-6281.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/09/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-6400.md b/windows/security/threat-protection/auditing/event-6400.md index 4579bf3a3f..f3cc62235d 100644 --- a/windows/security/threat-protection/auditing/event-6400.md +++ b/windows/security/threat-protection/auditing/event-6400.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/09/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-6401.md b/windows/security/threat-protection/auditing/event-6401.md index b7e9be68fc..cdd2869db5 100644 --- a/windows/security/threat-protection/auditing/event-6401.md +++ b/windows/security/threat-protection/auditing/event-6401.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/09/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-6402.md b/windows/security/threat-protection/auditing/event-6402.md index 43c3c34353..5c2a2775b2 100644 --- a/windows/security/threat-protection/auditing/event-6402.md +++ b/windows/security/threat-protection/auditing/event-6402.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/09/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-6403.md b/windows/security/threat-protection/auditing/event-6403.md index d2fdd63838..3b5d284082 100644 --- a/windows/security/threat-protection/auditing/event-6403.md +++ b/windows/security/threat-protection/auditing/event-6403.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/09/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-6404.md b/windows/security/threat-protection/auditing/event-6404.md index 8398476eb6..ff6b32947a 100644 --- a/windows/security/threat-protection/auditing/event-6404.md +++ b/windows/security/threat-protection/auditing/event-6404.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/09/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-6405.md b/windows/security/threat-protection/auditing/event-6405.md index cd6d137b5a..f83340addb 100644 --- a/windows/security/threat-protection/auditing/event-6405.md +++ b/windows/security/threat-protection/auditing/event-6405.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/09/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-6406.md b/windows/security/threat-protection/auditing/event-6406.md index 49d868e4de..d6109b695e 100644 --- a/windows/security/threat-protection/auditing/event-6406.md +++ b/windows/security/threat-protection/auditing/event-6406.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/09/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-6407.md b/windows/security/threat-protection/auditing/event-6407.md index 791511b97c..ce5d5ebc3e 100644 --- a/windows/security/threat-protection/auditing/event-6407.md +++ b/windows/security/threat-protection/auditing/event-6407.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/09/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-6408.md b/windows/security/threat-protection/auditing/event-6408.md index 24596eef2a..6d0c126230 100644 --- a/windows/security/threat-protection/auditing/event-6408.md +++ b/windows/security/threat-protection/auditing/event-6408.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/09/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-6409.md b/windows/security/threat-protection/auditing/event-6409.md index 776b12553b..cae21e47a0 100644 --- a/windows/security/threat-protection/auditing/event-6409.md +++ b/windows/security/threat-protection/auditing/event-6409.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/09/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-6410.md b/windows/security/threat-protection/auditing/event-6410.md index 36e66234e1..bc36888be7 100644 --- a/windows/security/threat-protection/auditing/event-6410.md +++ b/windows/security/threat-protection/auditing/event-6410.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/09/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-6416.md b/windows/security/threat-protection/auditing/event-6416.md index 2fc25d6efc..b9f703c82a 100644 --- a/windows/security/threat-protection/auditing/event-6416.md +++ b/windows/security/threat-protection/auditing/event-6416.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/09/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-6419.md b/windows/security/threat-protection/auditing/event-6419.md index 3af676c307..0ee6db7f7a 100644 --- a/windows/security/threat-protection/auditing/event-6419.md +++ b/windows/security/threat-protection/auditing/event-6419.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/09/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-6420.md b/windows/security/threat-protection/auditing/event-6420.md index 62e0bb14da..b2f1f226a9 100644 --- a/windows/security/threat-protection/auditing/event-6420.md +++ b/windows/security/threat-protection/auditing/event-6420.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/09/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-6421.md b/windows/security/threat-protection/auditing/event-6421.md index 4be9a3ae41..7d66ba817d 100644 --- a/windows/security/threat-protection/auditing/event-6421.md +++ b/windows/security/threat-protection/auditing/event-6421.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/09/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-6422.md b/windows/security/threat-protection/auditing/event-6422.md index 1ef19e5f52..4c3fca7a7b 100644 --- a/windows/security/threat-protection/auditing/event-6422.md +++ b/windows/security/threat-protection/auditing/event-6422.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/09/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-6423.md b/windows/security/threat-protection/auditing/event-6423.md index cb4e2566fb..a10965291f 100644 --- a/windows/security/threat-protection/auditing/event-6423.md +++ b/windows/security/threat-protection/auditing/event-6423.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/09/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/event-6424.md b/windows/security/threat-protection/auditing/event-6424.md index 13af19c639..fa6239dca4 100644 --- a/windows/security/threat-protection/auditing/event-6424.md +++ b/windows/security/threat-protection/auditing/event-6424.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: none -author: dansimp +author: vinaypamnani-msft ms.date: 09/09/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/file-system-global-object-access-auditing.md b/windows/security/threat-protection/auditing/file-system-global-object-access-auditing.md index 605274b0a5..3461e567d2 100644 --- a/windows/security/threat-protection/auditing/file-system-global-object-access-auditing.md +++ b/windows/security/threat-protection/auditing/file-system-global-object-access-auditing.md @@ -3,14 +3,14 @@ title: File System (Global Object Access Auditing) (Windows 10) description: The policy setting, File System (Global Object Access Auditing), enables you to configure a global system access control list (SACL) for an entire computer. ms.assetid: 4f215d61-0e23-46e4-9e58-08511105d25b ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/auditing/how-to-list-xml-elements-in-eventdata.md b/windows/security/threat-protection/auditing/how-to-list-xml-elements-in-eventdata.md index b8cc2220c9..88c58add6a 100644 --- a/windows/security/threat-protection/auditing/how-to-list-xml-elements-in-eventdata.md +++ b/windows/security/threat-protection/auditing/how-to-list-xml-elements-in-eventdata.md @@ -6,11 +6,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp +author: vinaypamnani-msft ms.date: 09/09/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/monitor-central-access-policy-and-rule-definitions.md b/windows/security/threat-protection/auditing/monitor-central-access-policy-and-rule-definitions.md index 0d27bc3fda..5fbda0c290 100644 --- a/windows/security/threat-protection/auditing/monitor-central-access-policy-and-rule-definitions.md +++ b/windows/security/threat-protection/auditing/monitor-central-access-policy-and-rule-definitions.md @@ -3,14 +3,14 @@ title: Monitor central access policy and rule definitions (Windows 10) description: Learn how to use advanced security auditing options to monitor changes to central access policy and central access rule definitions. ms.assetid: 553f98a6-7606-4518-a3c5-347a33105130 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/auditing/monitor-claim-types.md b/windows/security/threat-protection/auditing/monitor-claim-types.md index 1a7fbfe2d2..7a1e32271c 100644 --- a/windows/security/threat-protection/auditing/monitor-claim-types.md +++ b/windows/security/threat-protection/auditing/monitor-claim-types.md @@ -3,14 +3,14 @@ title: Monitor claim types (Windows 10) description: Learn how to monitor changes to claim types that are associated with dynamic access control when you're using advanced security auditing options. ms.assetid: 426084da-4eef-44af-aeec-e7ab4d4e2439 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/auditing/monitor-resource-attribute-definitions.md b/windows/security/threat-protection/auditing/monitor-resource-attribute-definitions.md index c9c75a970e..a0514b7589 100644 --- a/windows/security/threat-protection/auditing/monitor-resource-attribute-definitions.md +++ b/windows/security/threat-protection/auditing/monitor-resource-attribute-definitions.md @@ -3,14 +3,14 @@ title: Monitor resource attribute definitions (Windows 10) description: Learn how to monitor changes to resource attribute definitions when you're using advanced security auditing options to monitor dynamic access control objects. ms.assetid: aace34b0-123a-4b83-9e09-f269220e79de ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/auditing/monitor-the-central-access-policies-associated-with-files-and-folders.md b/windows/security/threat-protection/auditing/monitor-the-central-access-policies-associated-with-files-and-folders.md index 83ab6f2561..03717667d5 100644 --- a/windows/security/threat-protection/auditing/monitor-the-central-access-policies-associated-with-files-and-folders.md +++ b/windows/security/threat-protection/auditing/monitor-the-central-access-policies-associated-with-files-and-folders.md @@ -3,14 +3,14 @@ title: Monitor central access policies for files or folders (Windows 10) description: Monitor changes to central access policies associated with files and folders, when using advanced security auditing options for dynamic access control objects. ms.assetid: 2ea8fc23-b3ac-432f-87b0-6a16506e8eed ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/auditing/monitor-the-central-access-policies-that-apply-on-a-file-server.md b/windows/security/threat-protection/auditing/monitor-the-central-access-policies-that-apply-on-a-file-server.md index 15c31fb0d2..c811249554 100644 --- a/windows/security/threat-protection/auditing/monitor-the-central-access-policies-that-apply-on-a-file-server.md +++ b/windows/security/threat-protection/auditing/monitor-the-central-access-policies-that-apply-on-a-file-server.md @@ -3,14 +3,14 @@ title: Monitor central access policies on a file server (Windows 10) description: Learn how to monitor changes to the central access policies that apply to a file server when using advanced security auditing options. ms.assetid: 126b051e-c20d-41f1-b42f-6cff24dcf20c ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/auditing/monitor-the-resource-attributes-on-files-and-folders.md b/windows/security/threat-protection/auditing/monitor-the-resource-attributes-on-files-and-folders.md index 73427802a4..a27bd7e737 100644 --- a/windows/security/threat-protection/auditing/monitor-the-resource-attributes-on-files-and-folders.md +++ b/windows/security/threat-protection/auditing/monitor-the-resource-attributes-on-files-and-folders.md @@ -3,14 +3,14 @@ title: Monitor the resource attributes on files and folders (Windows 10) description: Learn how to use advanced security auditing options to monitor attempts to change settings on the resource attributes of files. ms.assetid: 4944097b-320f-44c7-88ed-bf55946a358b ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/auditing/monitor-the-use-of-removable-storage-devices.md b/windows/security/threat-protection/auditing/monitor-the-use-of-removable-storage-devices.md index 054bdf5247..9698df21c7 100644 --- a/windows/security/threat-protection/auditing/monitor-the-use-of-removable-storage-devices.md +++ b/windows/security/threat-protection/auditing/monitor-the-use-of-removable-storage-devices.md @@ -3,14 +3,14 @@ title: Monitor the use of removable storage devices (Windows 10) description: Learn how advanced security auditing options can be used to monitor attempts to use removable storage devices to access network resources. ms.assetid: b0a9e4a5-b7ff-41c6-96ff-0228d4ba5da8 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/auditing/monitor-user-and-device-claims-during-sign-in.md b/windows/security/threat-protection/auditing/monitor-user-and-device-claims-during-sign-in.md index 759bc149b4..aecee98588 100644 --- a/windows/security/threat-protection/auditing/monitor-user-and-device-claims-during-sign-in.md +++ b/windows/security/threat-protection/auditing/monitor-user-and-device-claims-during-sign-in.md @@ -3,14 +3,14 @@ title: Monitor user and device claims during sign-in (Windows 10) description: Learn how to monitor user and device claims that are associated with a user’s security token. This advice assumes you have deployed Dynamic Access Control. ms.assetid: 71796ea9-5fe4-4183-8475-805c3c1f319f ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/auditing/other-events.md b/windows/security/threat-protection/auditing/other-events.md index 12044634fd..d9e2a09d85 100644 --- a/windows/security/threat-protection/auditing/other-events.md +++ b/windows/security/threat-protection/auditing/other-events.md @@ -6,11 +6,11 @@ ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: medium -author: dansimp +author: vinaypamnani-msft ms.date: 09/09/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/auditing/planning-and-deploying-advanced-security-audit-policies.md b/windows/security/threat-protection/auditing/planning-and-deploying-advanced-security-audit-policies.md index 08a07d6718..1d3ced24bf 100644 --- a/windows/security/threat-protection/auditing/planning-and-deploying-advanced-security-audit-policies.md +++ b/windows/security/threat-protection/auditing/planning-and-deploying-advanced-security-audit-policies.md @@ -3,14 +3,14 @@ title: Plan and deploy advanced security audit policies (Windows 10) description: Learn to deploy an effective security audit policy in a network that includes advanced security audit policies. ms.assetid: 7428e1db-aba8-407b-a39e-509671e5a442 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/auditing/registry-global-object-access-auditing.md b/windows/security/threat-protection/auditing/registry-global-object-access-auditing.md index cd2acc181e..eec3ad4eba 100644 --- a/windows/security/threat-protection/auditing/registry-global-object-access-auditing.md +++ b/windows/security/threat-protection/auditing/registry-global-object-access-auditing.md @@ -3,14 +3,14 @@ title: Registry (Global Object Access Auditing) (Windows 10) description: The Advanced Security Audit policy setting, Registry (Global Object Access Auditing), enables you to configure a global system access control list (SACL). ms.assetid: 953bb1c1-3f76-43be-ba17-4aed2304f578 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/auditing/security-auditing-overview.md b/windows/security/threat-protection/auditing/security-auditing-overview.md index 7d7e21c1f3..e24417cc1a 100644 --- a/windows/security/threat-protection/auditing/security-auditing-overview.md +++ b/windows/security/threat-protection/auditing/security-auditing-overview.md @@ -3,14 +3,14 @@ title: Security auditing (Windows 10) description: Learn about security auditing features in Windows, and how your organization can benefit from using them to make your network more secure and easily managed. ms.assetid: 2d9b8142-49bd-4a33-b246-3f0c2a5f32d4 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/auditing/using-advanced-security-auditing-options-to-monitor-dynamic-access-control-objects.md b/windows/security/threat-protection/auditing/using-advanced-security-auditing-options-to-monitor-dynamic-access-control-objects.md index e91e703325..0ca7de41af 100644 --- a/windows/security/threat-protection/auditing/using-advanced-security-auditing-options-to-monitor-dynamic-access-control-objects.md +++ b/windows/security/threat-protection/auditing/using-advanced-security-auditing-options-to-monitor-dynamic-access-control-objects.md @@ -3,14 +3,14 @@ title: Using advanced security auditing options to monitor dynamic access contro description: Domain admins can set up advanced security audit options in Windows 10 to target specific users, or monitor potentially significant activity on multiple devices ms.assetid: 0d2c28ea-bdaf-47fd-bca2-a07dce5fed37 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/auditing/view-the-security-event-log.md b/windows/security/threat-protection/auditing/view-the-security-event-log.md index e934463906..78ec8301ba 100644 --- a/windows/security/threat-protection/auditing/view-the-security-event-log.md +++ b/windows/security/threat-protection/auditing/view-the-security-event-log.md @@ -3,14 +3,14 @@ title: View the security event log (Windows 10) description: The security log records each event as defined by the audit policies you set on each object. ms.assetid: 20DD2ACD-241A-45C5-A92F-4BE0D9F198B9 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/auditing/which-editions-of-windows-support-advanced-audit-policy-configuration.md b/windows/security/threat-protection/auditing/which-editions-of-windows-support-advanced-audit-policy-configuration.md index b6c73ba668..90df2b5229 100644 --- a/windows/security/threat-protection/auditing/which-editions-of-windows-support-advanced-audit-policy-configuration.md +++ b/windows/security/threat-protection/auditing/which-editions-of-windows-support-advanced-audit-policy-configuration.md @@ -3,14 +3,14 @@ title: Which editions of Windows support advanced audit policy configuration (Wi description: This reference topic for the IT professional describes which versions of the Windows operating systems support advanced security auditing policies. ms.assetid: 87c71cc5-522d-4771-ac78-34a2a0825f31 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity.md b/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity.md index 90770727f0..8a30b38b55 100644 --- a/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity.md +++ b/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity.md @@ -4,9 +4,9 @@ description: This article explains the steps to opt in to using HVCI on Windows ms.prod: m365-security ms.mktglfcycl: deploy ms.localizationpriority: medium -ms.author: dansimp -author: dansimp -manager: dansimp +ms.author: vinpa +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md b/windows/security/threat-protection/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md index 7e6029430c..15d041a084 100644 --- a/windows/security/threat-protection/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md +++ b/windows/security/threat-protection/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md @@ -3,10 +3,10 @@ title: Windows Defender Application Control and virtualization-based code integr description: Hardware and software system integrity-hardening capabilities that can be deployed separately or in combination with Windows Defender Application Control (WDAC). ms.prod: m365-security ms.localizationpriority: medium -author: denisebmsft -ms.author: deniseb +author: vinaypamnani-msft +ms.author: vinpa ms.reviewer: -manager: dansimp +manager: aaroncz ms.custom: asr ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/device-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md b/windows/security/threat-protection/device-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md index 7a99baa345..7115e2659a 100644 --- a/windows/security/threat-protection/device-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md +++ b/windows/security/threat-protection/device-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md @@ -5,14 +5,14 @@ keywords: virtualization, security, malware ms.prod: m365-security ms.mktglfcycl: deploy ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 10/20/2017 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/microsoft-defender-application-guard/configure-md-app-guard.md b/windows/security/threat-protection/microsoft-defender-application-guard/configure-md-app-guard.md index 382528bfa0..5f58f733a3 100644 --- a/windows/security/threat-protection/microsoft-defender-application-guard/configure-md-app-guard.md +++ b/windows/security/threat-protection/microsoft-defender-application-guard/configure-md-app-guard.md @@ -6,11 +6,11 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: denisebmsft -ms.author: deniseb +author: vinaypamnani-msft +ms.author: vinpa ms.date: 08/22/2022 ms.reviewer: -manager: dansimp +manager: aaroncz ms.custom: sasr ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/microsoft-defender-application-guard/install-md-app-guard.md b/windows/security/threat-protection/microsoft-defender-application-guard/install-md-app-guard.md index 2994f3ab96..d2301744c2 100644 --- a/windows/security/threat-protection/microsoft-defender-application-guard/install-md-app-guard.md +++ b/windows/security/threat-protection/microsoft-defender-application-guard/install-md-app-guard.md @@ -6,11 +6,11 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: denisebmsft -ms.author: deniseb +author: vinaypamnani-msft +ms.author: vinpa ms.date: 09/09/2021 ms.reviewer: -manager: dansimp +manager: aaroncz ms.custom: asr ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-browser-extension.md b/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-browser-extension.md index ffd97aa5cd..3b7bfa1c85 100644 --- a/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-browser-extension.md +++ b/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-browser-extension.md @@ -3,11 +3,11 @@ title: Microsoft Defender Application Guard Extension description: Learn about the Microsoft Defender Application Guard browser extension, which extends Application Guard's protection to more web browsers. ms.prod: m365-security ms.localizationpriority: medium -author: aczechowski -ms.author: aaroncz +author: vinaypamnani-msft +ms.author: vinpa ms.date: 09/09/2021 ms.reviewer: -manager: dansimp +manager: aaroncz ms.custom: asr ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-overview.md b/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-overview.md index 879c15353b..67ec813080 100644 --- a/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-overview.md +++ b/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-overview.md @@ -6,11 +6,11 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: denisebmsft -ms.author: deniseb +author: vinaypamnani-msft +ms.author: vinpa ms.date: 09/09/2021 ms.reviewer: -manager: dansimp +manager: aaroncz ms.custom: asr ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/microsoft-defender-application-guard/reqs-md-app-guard.md b/windows/security/threat-protection/microsoft-defender-application-guard/reqs-md-app-guard.md index e02cee6ffc..e7ea108193 100644 --- a/windows/security/threat-protection/microsoft-defender-application-guard/reqs-md-app-guard.md +++ b/windows/security/threat-protection/microsoft-defender-application-guard/reqs-md-app-guard.md @@ -1,5 +1,5 @@ --- -title: System requirements for Microsoft Defender Application Guard +title: System requirements for Microsoft Defender Application Guard description: Learn about the system requirements for installing and running Microsoft Defender Application Guard. ms.prod: windows-client ms.technology: itpro-security diff --git a/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md b/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md index 39945ec254..7fb31c6a05 100644 --- a/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md +++ b/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md @@ -5,12 +5,12 @@ ms.prod: m365-security ms.mktglfcycl: explore ms.sitesec: library ms.pagetype: security -author: dansimp +author: vinaypamnani-msft ms.localizationpriority: medium ms.date: 09/28/2020 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- # Available Microsoft Defender SmartScreen Group Policy and mobile device management (MDM) settings diff --git a/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md b/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md index 59695ee06d..13b14919d3 100644 --- a/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md +++ b/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md @@ -2,11 +2,11 @@ title: Microsoft Defender SmartScreen overview description: Learn how Microsoft Defender SmartScreen protects against phishing or malware websites and applications, and the downloading of potentially malicious files. ms.prod: m365-security -author: dansimp -ms.author: dansimp +author: vinaypamnani-msft +ms.author: vinpa ms.localizationpriority: high ms.reviewer: -manager: dansimp +manager: aaroncz ms.technology: windows-sec adobe-target: true --- diff --git a/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-set-individual-device.md b/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-set-individual-device.md index a73abf03ff..3a941e8767 100644 --- a/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-set-individual-device.md +++ b/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-set-individual-device.md @@ -5,12 +5,12 @@ ms.prod: m365-security ms.mktglfcycl: explore ms.sitesec: library ms.pagetype: security -author: mjcaparas +author: vinaypamnani-msft ms.localizationpriority: medium ms.date: 10/13/2017 ms.reviewer: -manager: dansimp -ms.author: macapara +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/microsoft-defender-smartscreen/phishing-protection-microsoft-defender-smartscreen.md b/windows/security/threat-protection/microsoft-defender-smartscreen/phishing-protection-microsoft-defender-smartscreen.md index 6fe565bf48..cba7b837da 100644 --- a/windows/security/threat-protection/microsoft-defender-smartscreen/phishing-protection-microsoft-defender-smartscreen.md +++ b/windows/security/threat-protection/microsoft-defender-smartscreen/phishing-protection-microsoft-defender-smartscreen.md @@ -1,17 +1,17 @@ --- -title: Enhanced Phishing Protection in Microsoft Defender SmartScreen +title: Enhanced Phishing Protection in Microsoft Defender SmartScreen description: Learn how Enhanced Phishing Protection for Microsoft Defender SmartScreen helps protect Microsoft school or work passwords against phishing and unsafe usage on sites and apps. ms.prod: windows-client ms.technology: itpro-security -author: v-mathavale -ms.author: v-mathavale +author: vinaypamnani-msft +ms.author: vinpa ms.reviewer: paoloma manager: aaroncz ms.localizationpriority: medium ms.date: 06/21/2022 adobe-target: true -appliesto: -- ✅ Windows 11, version 22H2 +appliesto: + - ✅ Windows 11, version 22H2 --- # Enhanced Phishing Protection in Microsoft Defender SmartScreen diff --git a/windows/security/threat-protection/security-policy-settings/access-credential-manager-as-a-trusted-caller.md b/windows/security/threat-protection/security-policy-settings/access-credential-manager-as-a-trusted-caller.md index 3cf960a19f..6ea43e8325 100644 --- a/windows/security/threat-protection/security-policy-settings/access-credential-manager-as-a-trusted-caller.md +++ b/windows/security/threat-protection/security-policy-settings/access-credential-manager-as-a-trusted-caller.md @@ -3,14 +3,14 @@ title: Access Credential Manager as a trusted caller (Windows 10) description: Describes best practices, security considerations, and more for the security policy setting, Access Credential Manager as a trusted caller. ms.assetid: a51820d2-ca5b-47dd-8e9b-d7008603db88 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md b/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md index 1948922041..0fac123d6f 100644 --- a/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md +++ b/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md @@ -3,14 +3,14 @@ title: Access this computer from the network - security policy setting (Windows description: Describes the best practices, location, values, policy management, and security considerations for the Access this computer from the network security policy setting. ms.assetid: f6767bc2-83d1-45f1-847c-54f5362db022 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/account-lockout-duration.md b/windows/security/threat-protection/security-policy-settings/account-lockout-duration.md index 3aff3ac62f..dbd6162ac2 100644 --- a/windows/security/threat-protection/security-policy-settings/account-lockout-duration.md +++ b/windows/security/threat-protection/security-policy-settings/account-lockout-duration.md @@ -3,14 +3,14 @@ title: Account lockout duration (Windows 10) description: Describes the best practices, location, values, and security considerations for the Account lockout duration security policy setting. ms.assetid: a4167bf4-27c3-4a9b-8ef0-04e3c6ec3aa4 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/account-lockout-policy.md b/windows/security/threat-protection/security-policy-settings/account-lockout-policy.md index 4832fd093b..c0350d3075 100644 --- a/windows/security/threat-protection/security-policy-settings/account-lockout-policy.md +++ b/windows/security/threat-protection/security-policy-settings/account-lockout-policy.md @@ -3,14 +3,14 @@ title: Account Lockout Policy (Windows 10) description: Describes the Account Lockout Policy settings and links to information about each policy setting. ms.assetid: eb968c28-17c5-405f-b413-50728cb7b724 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/account-lockout-threshold.md b/windows/security/threat-protection/security-policy-settings/account-lockout-threshold.md index 7140cd3752..bd241b8876 100644 --- a/windows/security/threat-protection/security-policy-settings/account-lockout-threshold.md +++ b/windows/security/threat-protection/security-policy-settings/account-lockout-threshold.md @@ -3,14 +3,14 @@ title: Account lockout threshold (Windows 10) description: Describes the best practices, location, values, and security considerations for the Account lockout threshold security policy setting. ms.assetid: 4904bb40-a2bd-4fef-a102-260ba8d74e30 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/account-policies.md b/windows/security/threat-protection/security-policy-settings/account-policies.md index 6fe7c4fe77..0d1cd92673 100644 --- a/windows/security/threat-protection/security-policy-settings/account-policies.md +++ b/windows/security/threat-protection/security-policy-settings/account-policies.md @@ -3,14 +3,14 @@ title: Account Policies (Windows 10) description: An overview of account policies in Windows and provides links to policy descriptions. ms.assetid: 711b3797-b87a-4cd9-a2e3-1f8ef18688fb ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/accounts-administrator-account-status.md b/windows/security/threat-protection/security-policy-settings/accounts-administrator-account-status.md index 09a0d041d9..3e08153f37 100644 --- a/windows/security/threat-protection/security-policy-settings/accounts-administrator-account-status.md +++ b/windows/security/threat-protection/security-policy-settings/accounts-administrator-account-status.md @@ -3,14 +3,14 @@ title: Accounts Administrator account status (Windows 10) description: Describes the best practices, location, values, and security considerations for the Accounts Administrator account status security policy setting. ms.assetid: 71a3bd48-1014-49e0-a936-bfe9433af23e ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/accounts-block-microsoft-accounts.md b/windows/security/threat-protection/security-policy-settings/accounts-block-microsoft-accounts.md index 0712c6d50d..0abc2a1a06 100644 --- a/windows/security/threat-protection/security-policy-settings/accounts-block-microsoft-accounts.md +++ b/windows/security/threat-protection/security-policy-settings/accounts-block-microsoft-accounts.md @@ -3,14 +3,14 @@ title: Accounts Block Microsoft accounts (Windows 10) description: Describes the best practices, location, values, management, and security considerations for the Accounts Block Microsoft accounts security policy setting. ms.assetid: 94c76f45-057c-4d80-8d01-033cf28ef2f7 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/accounts-guest-account-status.md b/windows/security/threat-protection/security-policy-settings/accounts-guest-account-status.md index a08a78b36e..e64ce6491b 100644 --- a/windows/security/threat-protection/security-policy-settings/accounts-guest-account-status.md +++ b/windows/security/threat-protection/security-policy-settings/accounts-guest-account-status.md @@ -3,14 +3,14 @@ title: Accounts Guest account status - security policy setting (Windows 10) description: Describes the best practices, location, values, and security considerations for the Accounts Guest account status security policy setting. ms.assetid: 07e53fc5-b495-4d02-ab42-5b245d10d0ce ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only.md b/windows/security/threat-protection/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only.md index cde8f45d22..fca9fe1be6 100644 --- a/windows/security/threat-protection/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only.md +++ b/windows/security/threat-protection/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only.md @@ -3,14 +3,14 @@ title: Accounts Limit local account use of blank passwords (Windows 10) description: Learn best practices, security considerations, and more for the policy setting, Accounts Limit local account use of blank passwords to console logon only. ms.assetid: a1bfb58b-1ae8-4de9-832b-aa889a6e64bd ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/accounts-rename-administrator-account.md b/windows/security/threat-protection/security-policy-settings/accounts-rename-administrator-account.md index 4c849e7de5..2210355f3f 100644 --- a/windows/security/threat-protection/security-policy-settings/accounts-rename-administrator-account.md +++ b/windows/security/threat-protection/security-policy-settings/accounts-rename-administrator-account.md @@ -3,14 +3,14 @@ title: Accounts Rename administrator account (Windows 10) description: This security policy reference topic for the IT professional describes the best practices, location, values, and security considerations for this policy setting. ms.assetid: d21308eb-7c60-4e48-8747-62b8109844f9 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/accounts-rename-guest-account.md b/windows/security/threat-protection/security-policy-settings/accounts-rename-guest-account.md index 1162ff5210..0c34f2de74 100644 --- a/windows/security/threat-protection/security-policy-settings/accounts-rename-guest-account.md +++ b/windows/security/threat-protection/security-policy-settings/accounts-rename-guest-account.md @@ -3,14 +3,14 @@ title: Accounts Rename guest account - security policy setting (Windows 10) description: Describes the best practices, location, values, and security considerations for the Accounts Rename guest account security policy setting. ms.assetid: 9b8052b4-bbb9-4cc1-bfee-ce25390db707 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/act-as-part-of-the-operating-system.md b/windows/security/threat-protection/security-policy-settings/act-as-part-of-the-operating-system.md index 5850036933..a109715f3f 100644 --- a/windows/security/threat-protection/security-policy-settings/act-as-part-of-the-operating-system.md +++ b/windows/security/threat-protection/security-policy-settings/act-as-part-of-the-operating-system.md @@ -3,14 +3,14 @@ title: Act as part of the operating system (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Act as part of the operating system security policy setting. ms.assetid: c1b7e084-a9f7-4377-b678-07cc913c8b0c ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/add-workstations-to-domain.md b/windows/security/threat-protection/security-policy-settings/add-workstations-to-domain.md index 471d8a40ba..b0dd822377 100644 --- a/windows/security/threat-protection/security-policy-settings/add-workstations-to-domain.md +++ b/windows/security/threat-protection/security-policy-settings/add-workstations-to-domain.md @@ -3,14 +3,14 @@ title: Add workstations to domain (Windows 10) description: Describes the best practices, location, values, policy management and security considerations for the Add workstations to domain security policy setting. ms.assetid: b0c21af4-c928-4344-b1f1-58ef162ad0b3 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/adjust-memory-quotas-for-a-process.md b/windows/security/threat-protection/security-policy-settings/adjust-memory-quotas-for-a-process.md index c780868505..4a35f8c240 100644 --- a/windows/security/threat-protection/security-policy-settings/adjust-memory-quotas-for-a-process.md +++ b/windows/security/threat-protection/security-policy-settings/adjust-memory-quotas-for-a-process.md @@ -3,14 +3,14 @@ title: Adjust memory quotas for a process (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Adjust memory quotas for a process security policy setting. ms.assetid: 6754a2c8-6d07-4567-9af3-335fd8dd7626 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/administer-security-policy-settings.md b/windows/security/threat-protection/security-policy-settings/administer-security-policy-settings.md index f60583b08c..bf9dbc55ca 100644 --- a/windows/security/threat-protection/security-policy-settings/administer-security-policy-settings.md +++ b/windows/security/threat-protection/security-policy-settings/administer-security-policy-settings.md @@ -3,14 +3,14 @@ title: Administer security policy settings (Windows 10) description: This article discusses different methods to administer security policy settings on a local device or throughout a small- or medium-sized organization. ms.assetid: 7617d885-9d28-437a-9371-171197407599 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/allow-log-on-locally.md b/windows/security/threat-protection/security-policy-settings/allow-log-on-locally.md index 62863b9009..7e3064675c 100644 --- a/windows/security/threat-protection/security-policy-settings/allow-log-on-locally.md +++ b/windows/security/threat-protection/security-policy-settings/allow-log-on-locally.md @@ -3,14 +3,14 @@ title: Allow log on locally - security policy setting (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Allow log on locally security policy setting. ms.assetid: d9e5e1f3-3bff-4da7-a9a2-4bb3e0c79055 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/allow-log-on-through-remote-desktop-services.md b/windows/security/threat-protection/security-policy-settings/allow-log-on-through-remote-desktop-services.md index 595d9b29e8..d81c9b1da9 100644 --- a/windows/security/threat-protection/security-policy-settings/allow-log-on-through-remote-desktop-services.md +++ b/windows/security/threat-protection/security-policy-settings/allow-log-on-through-remote-desktop-services.md @@ -3,14 +3,14 @@ title: Allow log on through Remote Desktop Services (Windows 10) description: Best practices, location, values, policy management, and security considerations for the security policy setting. Allow a sign-in through Remote Desktop Services. ms.assetid: 6267c376-8199-4f2b-ae56-9c5424e76798 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/audit-audit-the-access-of-global-system-objects.md b/windows/security/threat-protection/security-policy-settings/audit-audit-the-access-of-global-system-objects.md index 912d844e7c..2a6e1051f4 100644 --- a/windows/security/threat-protection/security-policy-settings/audit-audit-the-access-of-global-system-objects.md +++ b/windows/security/threat-protection/security-policy-settings/audit-audit-the-access-of-global-system-objects.md @@ -3,14 +3,14 @@ title: Audit the access of global system objects (Windows 10) description: Describes the best practices, location, values, and security considerations for the audit of the access to global system objects security policy setting. ms.assetid: 20d40a79-ce89-45e6-9bb4-148f83958460 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/audit-audit-the-use-of-backup-and-restore-privilege.md b/windows/security/threat-protection/security-policy-settings/audit-audit-the-use-of-backup-and-restore-privilege.md index 6b5311ba25..4f266893ba 100644 --- a/windows/security/threat-protection/security-policy-settings/audit-audit-the-use-of-backup-and-restore-privilege.md +++ b/windows/security/threat-protection/security-policy-settings/audit-audit-the-use-of-backup-and-restore-privilege.md @@ -3,14 +3,14 @@ title: "Audit: Audit the use of Backup and Restore privilege (Windows 10)" description: "Describes the best practices, location, values, and security considerations for the 'Audit: Audit the use of Backup and Restore privilege' security policy setting." ms.assetid: f656a2bb-e8d6-447b-8902-53df3a7756c5 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override.md b/windows/security/threat-protection/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override.md index d4f0fd8113..90948e1b26 100644 --- a/windows/security/threat-protection/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override.md +++ b/windows/security/threat-protection/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override.md @@ -3,14 +3,14 @@ title: Audit Force audit policy subcategory settings (Windows Vista or later) to description: Learn more about the security policy setting, Audit Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings. ms.assetid: 8ddc06bc-b6d6-4bac-9051-e0d77035bd4e ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/audit-policy.md b/windows/security/threat-protection/security-policy-settings/audit-policy.md index 294edc4242..a3ff1d79b6 100644 --- a/windows/security/threat-protection/security-policy-settings/audit-policy.md +++ b/windows/security/threat-protection/security-policy-settings/audit-policy.md @@ -3,14 +3,14 @@ title: Audit Policy (Windows 10) description: Provides information about basic audit policies that are available in Windows and links to information about each setting. ms.assetid: 2e8ea400-e555-43e5-89d6-0898cb89da90 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits.md b/windows/security/threat-protection/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits.md index 867e169424..eda6402b3d 100644 --- a/windows/security/threat-protection/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits.md +++ b/windows/security/threat-protection/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits.md @@ -3,14 +3,14 @@ title: Audit Shut down system immediately if unable to log security audits (Wind description: Best practices, security considerations, and more for the security policy setting, Audit Shut down system immediately if unable to log security audits. ms.assetid: 2cd23cd9-0e44-4d0b-a1f1-39fc29303826 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/back-up-files-and-directories.md b/windows/security/threat-protection/security-policy-settings/back-up-files-and-directories.md index 2ecdea12d2..66717c1da1 100644 --- a/windows/security/threat-protection/security-policy-settings/back-up-files-and-directories.md +++ b/windows/security/threat-protection/security-policy-settings/back-up-files-and-directories.md @@ -3,14 +3,14 @@ title: Back up files and directories - security policy setting (Windows 10) description: Describes the recommended practices, location, values, policy management, and security considerations for the Back up files and directories security policy setting. ms.assetid: 1cd6bdd5-1501-41f4-98b9-acf29ac173ae ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/bypass-traverse-checking.md b/windows/security/threat-protection/security-policy-settings/bypass-traverse-checking.md index f41f877de5..586c03b891 100644 --- a/windows/security/threat-protection/security-policy-settings/bypass-traverse-checking.md +++ b/windows/security/threat-protection/security-policy-settings/bypass-traverse-checking.md @@ -3,14 +3,14 @@ title: Bypass traverse checking (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Bypass traverse checking security policy setting. ms.assetid: 1c828655-68d3-4140-aa0f-caa903a7087e ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/change-the-system-time.md b/windows/security/threat-protection/security-policy-settings/change-the-system-time.md index bd9df622f1..0a7342185d 100644 --- a/windows/security/threat-protection/security-policy-settings/change-the-system-time.md +++ b/windows/security/threat-protection/security-policy-settings/change-the-system-time.md @@ -3,14 +3,14 @@ title: Change the system time - security policy setting (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Change the system time security policy setting. ms.assetid: f2f6637d-acbc-4352-8ca3-ec563f918e65 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/change-the-time-zone.md b/windows/security/threat-protection/security-policy-settings/change-the-time-zone.md index ac2ad49a7c..d261e8a189 100644 --- a/windows/security/threat-protection/security-policy-settings/change-the-time-zone.md +++ b/windows/security/threat-protection/security-policy-settings/change-the-time-zone.md @@ -3,14 +3,14 @@ title: Change the time zone - security policy setting (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Change the time zone security policy setting. ms.assetid: 3b1afae4-68bb-472f-a43e-49e300d73e50 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/create-a-pagefile.md b/windows/security/threat-protection/security-policy-settings/create-a-pagefile.md index a5669229ef..1b893ba02e 100644 --- a/windows/security/threat-protection/security-policy-settings/create-a-pagefile.md +++ b/windows/security/threat-protection/security-policy-settings/create-a-pagefile.md @@ -3,14 +3,14 @@ title: Create a pagefile - security policy setting (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Create a pagefile security policy setting. ms.assetid: dc087897-459d-414b-abe0-cd86c8dccdea ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/create-a-token-object.md b/windows/security/threat-protection/security-policy-settings/create-a-token-object.md index 718a99a7bd..f4bfd202d5 100644 --- a/windows/security/threat-protection/security-policy-settings/create-a-token-object.md +++ b/windows/security/threat-protection/security-policy-settings/create-a-token-object.md @@ -3,14 +3,14 @@ title: Create a token object (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Create a token object security policy setting. ms.assetid: bfbf52fc-6ba4-442a-9df7-bd277e55729c ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/create-global-objects.md b/windows/security/threat-protection/security-policy-settings/create-global-objects.md index b4f0048aa0..c64126850b 100644 --- a/windows/security/threat-protection/security-policy-settings/create-global-objects.md +++ b/windows/security/threat-protection/security-policy-settings/create-global-objects.md @@ -3,14 +3,14 @@ title: Create global objects (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Create global objects security policy setting. ms.assetid: 9cb6247b-44fc-4815-86f2-cb59b6f0221e ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/create-permanent-shared-objects.md b/windows/security/threat-protection/security-policy-settings/create-permanent-shared-objects.md index a38990fd17..ef343b6609 100644 --- a/windows/security/threat-protection/security-policy-settings/create-permanent-shared-objects.md +++ b/windows/security/threat-protection/security-policy-settings/create-permanent-shared-objects.md @@ -3,14 +3,14 @@ title: Create permanent shared objects (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Create permanent shared objects security policy setting. ms.assetid: 6a58438d-65ca-4c4a-a584-450eed976649 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/create-symbolic-links.md b/windows/security/threat-protection/security-policy-settings/create-symbolic-links.md index 3302b6c613..140150a1d6 100644 --- a/windows/security/threat-protection/security-policy-settings/create-symbolic-links.md +++ b/windows/security/threat-protection/security-policy-settings/create-symbolic-links.md @@ -3,14 +3,14 @@ title: Create symbolic links (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Create symbolic links security policy setting. ms.assetid: 882922b9-0ff8-4ee9-8afc-4475515ee3fd ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax.md b/windows/security/threat-protection/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax.md index 22eda320a1..fe07eefc98 100644 --- a/windows/security/threat-protection/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax.md +++ b/windows/security/threat-protection/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax.md @@ -3,14 +3,14 @@ title: DCOM Machine Access Restrictions in Security Descriptor Definition Langua description: Learn about best practices and more for the syntax policy setting, DCOM Machine Access Restrictions in Security Descriptor Definition Language (SDDL). ms.assetid: 0fe3521a-5252-44df-8a47-8d92cf936e7c ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax.md b/windows/security/threat-protection/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax.md index e5bb3b3aec..f7385a700c 100644 --- a/windows/security/threat-protection/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax.md +++ b/windows/security/threat-protection/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax.md @@ -3,14 +3,14 @@ title: DCOM Machine Launch Restrictions in Security Descriptor Definition Langua description: Best practices and more for the security policy setting, DCOM Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax. ms.assetid: 4b95d45f-dd62-4c34-ba32-43954528dabe ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/debug-programs.md b/windows/security/threat-protection/security-policy-settings/debug-programs.md index 0e70455139..b78f2f99b9 100644 --- a/windows/security/threat-protection/security-policy-settings/debug-programs.md +++ b/windows/security/threat-protection/security-policy-settings/debug-programs.md @@ -3,14 +3,14 @@ title: Debug programs (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Debug programs security policy setting. ms.assetid: 594d9f2c-8ffc-444b-9522-75615ec87786 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/deny-access-to-this-computer-from-the-network.md b/windows/security/threat-protection/security-policy-settings/deny-access-to-this-computer-from-the-network.md index 4b02ab14cd..633559d07a 100644 --- a/windows/security/threat-protection/security-policy-settings/deny-access-to-this-computer-from-the-network.md +++ b/windows/security/threat-protection/security-policy-settings/deny-access-to-this-computer-from-the-network.md @@ -3,14 +3,14 @@ title: Deny access to this computer from the network (Windows 10) description: Best practices, location, values, policy management, and security considerations for the Deny access to this computer from the network security policy setting. ms.assetid: 935e9f89-951b-4163-b186-fc325682bb0b ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-batch-job.md b/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-batch-job.md index a1f85a8494..83b9ffcc3e 100644 --- a/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-batch-job.md +++ b/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-batch-job.md @@ -3,14 +3,14 @@ title: Deny log on as a batch job (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Deny log on as a batch job security policy setting. ms.assetid: 0ac36ebd-5e28-4b6a-9b4e-8924c6ecf44b ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service.md b/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service.md index 6085f264bd..04e7592155 100644 --- a/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service.md +++ b/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service.md @@ -3,14 +3,14 @@ title: Deny log on as a service (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Deny log on as a service security policy setting. ms.assetid: f1114964-df86-4278-9b11-e35c66949794 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/deny-log-on-locally.md b/windows/security/threat-protection/security-policy-settings/deny-log-on-locally.md index 7363da3bbc..232866497f 100644 --- a/windows/security/threat-protection/security-policy-settings/deny-log-on-locally.md +++ b/windows/security/threat-protection/security-policy-settings/deny-log-on-locally.md @@ -3,14 +3,14 @@ title: Deny log on locally (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Deny log on locally security policy setting. ms.assetid: 00150e88-ec9c-43e1-a70d-33bfe10434db ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/deny-log-on-through-remote-desktop-services.md b/windows/security/threat-protection/security-policy-settings/deny-log-on-through-remote-desktop-services.md index 288922a996..5f691c1bb7 100644 --- a/windows/security/threat-protection/security-policy-settings/deny-log-on-through-remote-desktop-services.md +++ b/windows/security/threat-protection/security-policy-settings/deny-log-on-through-remote-desktop-services.md @@ -3,14 +3,14 @@ title: Deny log on through Remote Desktop Services (Windows 10) description: Best practices, location, values, policy management, and security considerations for the security policy setting, Deny log on through Remote Desktop Services. ms.assetid: 84bbb807-287c-4acc-a094-cf0ffdcbca67 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/devices-allow-undock-without-having-to-log-on.md b/windows/security/threat-protection/security-policy-settings/devices-allow-undock-without-having-to-log-on.md index c0aaf647df..820ca786ef 100644 --- a/windows/security/threat-protection/security-policy-settings/devices-allow-undock-without-having-to-log-on.md +++ b/windows/security/threat-protection/security-policy-settings/devices-allow-undock-without-having-to-log-on.md @@ -3,14 +3,14 @@ title: Devices Allow undock without having to log on (Windows 10) description: Describes the best practices, location, values, and security considerations for the Devices Allow undock without having to sign in security policy setting. ms.assetid: 1d403f5d-ad41-4bb4-9f4a-0779c1c14b8c ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/devices-allowed-to-format-and-eject-removable-media.md b/windows/security/threat-protection/security-policy-settings/devices-allowed-to-format-and-eject-removable-media.md index 3acbde1af2..82450c1aff 100644 --- a/windows/security/threat-protection/security-policy-settings/devices-allowed-to-format-and-eject-removable-media.md +++ b/windows/security/threat-protection/security-policy-settings/devices-allowed-to-format-and-eject-removable-media.md @@ -3,14 +3,14 @@ title: Devices Allowed to format and eject removable media (Windows 10) description: Describes the best practices, location, values, and security considerations for the Devices Allowed to format and eject removable media security policy setting. ms.assetid: d1b42425-7244-4ab1-9d46-d68de823459c ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/devices-prevent-users-from-installing-printer-drivers.md b/windows/security/threat-protection/security-policy-settings/devices-prevent-users-from-installing-printer-drivers.md index baf3de195a..71ddf06e88 100644 --- a/windows/security/threat-protection/security-policy-settings/devices-prevent-users-from-installing-printer-drivers.md +++ b/windows/security/threat-protection/security-policy-settings/devices-prevent-users-from-installing-printer-drivers.md @@ -3,14 +3,14 @@ title: Devices Prevent users from installing printer drivers (Windows 10) description: Describes the best practices, location, values, and security considerations for the Devices Prevent users from installing printer drivers security policy setting. ms.assetid: ab70a122-f7f9-47e0-ad8c-541f30a27ec3 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only.md b/windows/security/threat-protection/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only.md index 18e750e462..1199db8f73 100644 --- a/windows/security/threat-protection/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only.md +++ b/windows/security/threat-protection/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only.md @@ -3,14 +3,14 @@ title: Restrict CD-ROM access to locally logged-on user (Windows 10) description: Describes the best practices, location, values, and security considerations for the Devices Restrict CD-ROM access to locally logged-on user only security policy setting. ms.assetid: 8b8f44bb-84ce-4f18-af30-ab89910e234d ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only.md b/windows/security/threat-protection/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only.md index cd1c68ffef..e094e004be 100644 --- a/windows/security/threat-protection/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only.md +++ b/windows/security/threat-protection/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only.md @@ -3,14 +3,14 @@ title: Devices Restrict floppy access to locally logged-on user only (Windows 10 description: Describes the best practices, location, values, and security considerations for the Devices Restrict floppy access to locally logged-on user only security policy setting. ms.assetid: 92997910-da95-4c03-ae6f-832915423898 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks.md b/windows/security/threat-protection/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks.md index e3159ed429..0b9b2e86d8 100644 --- a/windows/security/threat-protection/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks.md +++ b/windows/security/threat-protection/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks.md @@ -3,14 +3,14 @@ title: Domain controller Allow server operators to schedule tasks (Windows 10) description: Describes the best practices, location, values, and security considerations for the Domain controller Allow server operators to schedule tasks security policy setting. ms.assetid: 198b12a4-8a5d-48e8-a752-2073b8a2cb0d ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-signing-requirements.md b/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-signing-requirements.md index d9e51b120c..a402b89f29 100644 --- a/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-signing-requirements.md +++ b/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-signing-requirements.md @@ -3,14 +3,14 @@ title: Domain controller LDAP server signing requirements (Windows 10) description: Describes the best practices, location, values, and security considerations for the Domain controller LDAP server signing requirements security policy setting. ms.assetid: fe122179-7571-465b-98d0-b8ce0f224390 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/domain-controller-refuse-machine-account-password-changes.md b/windows/security/threat-protection/security-policy-settings/domain-controller-refuse-machine-account-password-changes.md index 4b6f851944..4988913c80 100644 --- a/windows/security/threat-protection/security-policy-settings/domain-controller-refuse-machine-account-password-changes.md +++ b/windows/security/threat-protection/security-policy-settings/domain-controller-refuse-machine-account-password-changes.md @@ -3,14 +3,14 @@ title: Refuse machine account password changes policy (Windows 10) description: Describes the best practices, location, values, and security considerations for the Domain controller Refuse machine account password changes security policy setting. ms.assetid: 5a7fa2e2-e1a8-4833-90f7-aa83e3b456a9 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md b/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md index f5fe43b200..7ab59f90c7 100644 --- a/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md +++ b/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md @@ -3,14 +3,14 @@ title: Domain member Digitally encrypt or sign secure channel data (always) (Win description: Best practices, location, values, and security considerations for the policy setting, Domain member Digitally encrypt or sign secure channel data (always). ms.assetid: 4480c7cb-adca-4f29-b4b8-06eb68d272bf ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible.md b/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible.md index 920aba71a4..a5deb16dfa 100644 --- a/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible.md +++ b/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible.md @@ -3,14 +3,14 @@ title: Domain member Digitally encrypt secure channel data (when possible) (Wind description: Best practices, security considerations, and more for the security policy setting, Domain member Digitally encrypt secure channel data (when possible). ms.assetid: 73e6023e-0af3-4531-8238-82f0f0e4965b ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible.md b/windows/security/threat-protection/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible.md index 2083e899a8..9f0484903a 100644 --- a/windows/security/threat-protection/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible.md +++ b/windows/security/threat-protection/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible.md @@ -3,14 +3,14 @@ title: Domain member Digitally sign secure channel data (when possible) (Windows description: Best practices, location, values, and security considerations for the security policy setting, Domain member Digitally sign secure channel data (when possible). ms.assetid: a643e491-4f45-40ea-b12c-4dbe47e54f34 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/domain-member-disable-machine-account-password-changes.md b/windows/security/threat-protection/security-policy-settings/domain-member-disable-machine-account-password-changes.md index 6127a9b87f..ff3d7fc58d 100644 --- a/windows/security/threat-protection/security-policy-settings/domain-member-disable-machine-account-password-changes.md +++ b/windows/security/threat-protection/security-policy-settings/domain-member-disable-machine-account-password-changes.md @@ -3,14 +3,14 @@ title: Domain member Disable machine account password changes (Windows 10) description: Describes the best practices, location, values, and security considerations for the Domain member Disable machine account password changes security policy setting. ms.assetid: 1f660300-a07a-4243-a09f-140aa1ab8867 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/domain-member-maximum-machine-account-password-age.md b/windows/security/threat-protection/security-policy-settings/domain-member-maximum-machine-account-password-age.md index 7eb431cb17..1fb5013c59 100644 --- a/windows/security/threat-protection/security-policy-settings/domain-member-maximum-machine-account-password-age.md +++ b/windows/security/threat-protection/security-policy-settings/domain-member-maximum-machine-account-password-age.md @@ -3,14 +3,14 @@ title: Domain member Maximum machine account password age (Windows 10) description: Describes the best practices, location, values, and security considerations for the Domain member Maximum machine account password age security policy setting. ms.assetid: 0ec6f7c1-4d82-4339-94c0-debb2d1ac109 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key.md b/windows/security/threat-protection/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key.md index 1d7f2049d2..826cd1491a 100644 --- a/windows/security/threat-protection/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key.md +++ b/windows/security/threat-protection/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key.md @@ -3,14 +3,14 @@ title: Domain member Require strong (Windows 2000 or later) session key (Windows description: Best practices, location, values, and security considerations for the security policy setting, Domain member Require strong (Windows 2000 or later) session key. ms.assetid: 5ab8993c-5086-4f09-bc88-1b27454526bd ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md b/windows/security/threat-protection/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md index 464033d694..409c82789e 100644 --- a/windows/security/threat-protection/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md +++ b/windows/security/threat-protection/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md @@ -3,14 +3,14 @@ title: Trust computer and user accounts for delegation (Windows 10) description: Learn about best practices, security considerations and more for the security policy setting, Enable computer and user accounts to be trusted for delegation. ms.assetid: 524062d4-1595-41f3-8ce1-9c85fd21497b ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/enforce-password-history.md b/windows/security/threat-protection/security-policy-settings/enforce-password-history.md index 97d3791815..3b83ba4ce9 100644 --- a/windows/security/threat-protection/security-policy-settings/enforce-password-history.md +++ b/windows/security/threat-protection/security-policy-settings/enforce-password-history.md @@ -3,14 +3,14 @@ title: Enforce password history (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Enforce password history security policy setting. ms.assetid: 8b2ab871-3e52-4dd1-9776-68bb1e935442 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/enforce-user-logon-restrictions.md b/windows/security/threat-protection/security-policy-settings/enforce-user-logon-restrictions.md index 5198399434..08549dca66 100644 --- a/windows/security/threat-protection/security-policy-settings/enforce-user-logon-restrictions.md +++ b/windows/security/threat-protection/security-policy-settings/enforce-user-logon-restrictions.md @@ -3,14 +3,14 @@ title: Enforce user logon restrictions (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Enforce user logon restrictions security policy setting. ms.assetid: 5891cb73-f1ec-48b9-b703-39249e48a29f ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/force-shutdown-from-a-remote-system.md b/windows/security/threat-protection/security-policy-settings/force-shutdown-from-a-remote-system.md index ed338300e8..7112c5f8f6 100644 --- a/windows/security/threat-protection/security-policy-settings/force-shutdown-from-a-remote-system.md +++ b/windows/security/threat-protection/security-policy-settings/force-shutdown-from-a-remote-system.md @@ -3,14 +3,14 @@ title: Force shutdown from a remote system (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Force shutdown from a remote system security policy setting. ms.assetid: 63129243-31ea-42a4-a598-c7064f48a3df ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/generate-security-audits.md b/windows/security/threat-protection/security-policy-settings/generate-security-audits.md index 4f81ddbe37..4ddfaade25 100644 --- a/windows/security/threat-protection/security-policy-settings/generate-security-audits.md +++ b/windows/security/threat-protection/security-policy-settings/generate-security-audits.md @@ -3,14 +3,14 @@ title: Generate security audits (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Generate security audits security policy setting. ms.assetid: c0e1cd80-840e-4c74-917c-5c2349de885f ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/how-to-configure-security-policy-settings.md b/windows/security/threat-protection/security-policy-settings/how-to-configure-security-policy-settings.md index 548dfc7385..32b837ab80 100644 --- a/windows/security/threat-protection/security-policy-settings/how-to-configure-security-policy-settings.md +++ b/windows/security/threat-protection/security-policy-settings/how-to-configure-security-policy-settings.md @@ -3,14 +3,14 @@ title: Configure security policy settings (Windows 10) description: Describes steps to configure a security policy setting on the local device, on a domain-joined device, and on a domain controller. ms.assetid: 63b0967b-a9fe-4d92-90af-67469ee20320 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md b/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md index b7503031b7..6fc793095f 100644 --- a/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md +++ b/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md @@ -3,14 +3,14 @@ title: Impersonate a client after authentication (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Impersonate a client after authentication security policy setting. ms.assetid: 4cd241e2-c680-4b43-8ed0-3b391925cec5 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/increase-a-process-working-set.md b/windows/security/threat-protection/security-policy-settings/increase-a-process-working-set.md index c9c6d11852..884e8527c5 100644 --- a/windows/security/threat-protection/security-policy-settings/increase-a-process-working-set.md +++ b/windows/security/threat-protection/security-policy-settings/increase-a-process-working-set.md @@ -3,14 +3,14 @@ title: Increase a process working set (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Increase a process working set security policy setting. ms.assetid: b742ad96-37f3-4686-b8f7-f2b48367105b ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority.md b/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority.md index e2e776a8be..d8ef40c099 100644 --- a/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority.md +++ b/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority.md @@ -3,14 +3,14 @@ title: Increase scheduling priority (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Increase scheduling priority security policy setting. ms.assetid: fbec5973-d35e-4797-9626-d0d56061527f ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked.md index a54c5e93d9..10adda3ec6 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked.md @@ -3,14 +3,14 @@ title: Interactive logon Display user information when the session is locked (Wi description: Best practices, security considerations, and more for the security policy setting, Interactive logon Display user information when the session is locked. ms.assetid: 9146aa3d-9b2f-47ba-ac03-ff43efb10530 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-display-last-user-name.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-display-last-user-name.md index 47bac4e4cc..f3e3631149 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-display-last-user-name.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-display-last-user-name.md @@ -6,14 +6,14 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 04/19/2017 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del.md index 0284f2bb14..9336ed0760 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del.md @@ -3,14 +3,14 @@ title: Interactive logon Do not require CTRL+ALT+DEL (Windows 10) description: Describes the best practices, location, values, and security considerations for the Interactive logon Do not require CTRL+ALT+DEL security policy setting. ms.assetid: 04e2c000-2eb2-4d4b-8179-1e2cb4793e18 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-dont-display-username-at-sign-in.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-dont-display-username-at-sign-in.md index 2fd2510de4..36113ea64a 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-dont-display-username-at-sign-in.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-dont-display-username-at-sign-in.md @@ -3,14 +3,14 @@ title: Interactive logon Don't display username at sign-in (Windows 10) description: Describes the best practices, location, values, and security considerations for the Interactive logon Don't display username at sign-in security policy setting. ms.assetid: 98b24b03-95fe-4edc-8e97-cbdaa8e314fd ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-account-lockout-threshold.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-account-lockout-threshold.md index 148956b0f3..2211994906 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-account-lockout-threshold.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-account-lockout-threshold.md @@ -3,14 +3,14 @@ title: Interactive logon Machine account lockout threshold (Windows 10) description: Best practices, location, values, management, and security considerations for the security policy setting, Interactive logon Machine account lockout threshold. ms.assetid: ebbd8e22-2611-4ebe-9db9-d49344e631e4 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-inactivity-limit.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-inactivity-limit.md index 01524c765c..b22b295c3c 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-inactivity-limit.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-inactivity-limit.md @@ -3,14 +3,14 @@ title: Interactive logon Machine inactivity limit (Windows 10) description: Describes the best practices, location, values, management, and security considerations for the Interactive logon Machine inactivity limit security policy setting. ms.assetid: 7065b4a9-0d52-41d5-afc4-5aedfc4162b5 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on.md index 09e60e2f2b..22f4339e23 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on.md @@ -2,15 +2,15 @@ title: Interactive Logon Message text (Windows 10) description: Learn about best practices, security considerations and more for the security policy setting, Interactive logon Message text for users attempting to log on. ms.assetid: fcfe8a6d-ca65-4403-b9e6-2fa017a31c2e -ms.reviewer: -ms.author: dansimp +ms.reviewer: +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on.md index b16fd3bff2..914b8c2c25 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on.md @@ -2,15 +2,15 @@ title: Interactive logon Message title for users attempting to log on (Windows 10) description: Best practices, security considerations, and more for the security policy setting, Interactive logon Message title for users attempting to log on. ms.assetid: f2596470-4cc0-4ef1-849c-bef9dc3533c6 -ms.reviewer: -ms.author: dansimp +ms.reviewer: +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md index 966a3f3c4e..5473abc9a3 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md @@ -3,14 +3,14 @@ title: Interactive logon Number of previous logons to cache (in case domain cont description: Best practices and more for the security policy setting, Interactive logon Number of previous logons to cache (in case domain controller is not available). ms.assetid: 660e925e-cc3e-4098-a41e-eb8db8062d8d ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration.md index 0194532533..3d028142ce 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration.md @@ -3,14 +3,14 @@ title: Interactive log-on prompt user to change password before expiration (Wind description: Best practices and security considerations for an interactive log-on prompt for users to change passwords before expiration. ms.assetid: 8fe94781-40f7-4fbe-8cfd-5e116e6833e9 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md index be5146c636..42800dc037 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md @@ -3,14 +3,14 @@ title: Interactive logon Require Domain Controller authentication to unlock work description: Best practices security considerations, and more for the policy setting, Interactive logon Require Domain Controller authentication to unlock workstation. ms.assetid: 97618ed3-e946-47db-a212-b5e7a4fc6ffc ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-require-smart-card.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-require-smart-card.md index 1ef1627762..1529d73e80 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-require-smart-card.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-require-smart-card.md @@ -3,14 +3,14 @@ title: Interactive logon Require smart card - security policy setting (Windows 1 description: Describes the best practices, location, values, policy management, and security considerations for the Interactive logon Require smart card security policy setting. ms.assetid: c6a8c040-cbc7-472d-8bc5-579ddf3cbd6c ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-smart-card-removal-behavior.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-smart-card-removal-behavior.md index 8b8a23f14d..961726b4de 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-smart-card-removal-behavior.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-smart-card-removal-behavior.md @@ -3,14 +3,14 @@ title: Interactive logon Smart card removal behavior (Windows 10) description: Best practices, location, values, policy management, and security considerations for the security policy setting, Interactive logon Smart card removal behavior. ms.assetid: 61487820-9d49-4979-b15d-c7e735999460 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/kerberos-policy.md b/windows/security/threat-protection/security-policy-settings/kerberos-policy.md index 959ced7fdc..f6c04fca1b 100644 --- a/windows/security/threat-protection/security-policy-settings/kerberos-policy.md +++ b/windows/security/threat-protection/security-policy-settings/kerberos-policy.md @@ -3,14 +3,14 @@ title: Kerberos Policy (Windows 10) description: Describes the Kerberos Policy settings and provides links to policy setting descriptions. ms.assetid: 94017dd9-b1a3-4624-af9f-b29161b4bf38 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/load-and-unload-device-drivers.md b/windows/security/threat-protection/security-policy-settings/load-and-unload-device-drivers.md index 9a7f5f87d4..97d055cf55 100644 --- a/windows/security/threat-protection/security-policy-settings/load-and-unload-device-drivers.md +++ b/windows/security/threat-protection/security-policy-settings/load-and-unload-device-drivers.md @@ -3,14 +3,14 @@ title: Load and unload device drivers (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Load and unload device drivers security policy setting. ms.assetid: 66262532-c610-470c-9792-35ff4389430f ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/lock-pages-in-memory.md b/windows/security/threat-protection/security-policy-settings/lock-pages-in-memory.md index 5aae309524..92592faa9d 100644 --- a/windows/security/threat-protection/security-policy-settings/lock-pages-in-memory.md +++ b/windows/security/threat-protection/security-policy-settings/lock-pages-in-memory.md @@ -3,14 +3,14 @@ title: Lock pages in memory (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Lock pages in memory security policy setting. ms.assetid: cc724979-aec0-496d-be4e-7009aef660a3 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/log-on-as-a-batch-job.md b/windows/security/threat-protection/security-policy-settings/log-on-as-a-batch-job.md index 39c6bc3b10..59bb347d10 100644 --- a/windows/security/threat-protection/security-policy-settings/log-on-as-a-batch-job.md +++ b/windows/security/threat-protection/security-policy-settings/log-on-as-a-batch-job.md @@ -3,14 +3,14 @@ title: Log on as a batch job (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Log on as a batch job security policy setting. ms.assetid: 4eaddb51-0a18-470e-9d3d-5e7cd7970b41 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/log-on-as-a-service.md b/windows/security/threat-protection/security-policy-settings/log-on-as-a-service.md index dbcb0f1907..fd8652edec 100644 --- a/windows/security/threat-protection/security-policy-settings/log-on-as-a-service.md +++ b/windows/security/threat-protection/security-policy-settings/log-on-as-a-service.md @@ -3,14 +3,14 @@ title: Log on as a service (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Log on as a service security policy setting. ms.assetid: acc9a9e0-fd88-4cda-ab54-503120ba1f42 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/manage-auditing-and-security-log.md b/windows/security/threat-protection/security-policy-settings/manage-auditing-and-security-log.md index 4566dfbf15..ae381f1c5c 100644 --- a/windows/security/threat-protection/security-policy-settings/manage-auditing-and-security-log.md +++ b/windows/security/threat-protection/security-policy-settings/manage-auditing-and-security-log.md @@ -3,14 +3,14 @@ title: Manage auditing and security log (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Manage auditing and security log security policy setting. ms.assetid: 4b946c0d-f904-43db-b2d5-7f0917575347 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-service-ticket.md b/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-service-ticket.md index 3dbb0c258d..e5e93da398 100644 --- a/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-service-ticket.md +++ b/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-service-ticket.md @@ -3,14 +3,14 @@ title: Maximum lifetime for service ticket (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Maximum lifetime for service ticket security policy setting. ms.assetid: 484bf05a-3858-47fc-bc02-6599ca860247 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket-renewal.md b/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket-renewal.md index 4807321a05..b54ebe667a 100644 --- a/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket-renewal.md +++ b/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket-renewal.md @@ -3,14 +3,14 @@ title: Maximum lifetime for user ticket renewal (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Maximum lifetime for user ticket renewal security policy setting. ms.assetid: f88cd819-3dd1-4e38-b560-13fe6881b609 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket.md b/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket.md index 53e36fa838..671cbcf232 100644 --- a/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket.md +++ b/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket.md @@ -3,14 +3,14 @@ title: Maximum lifetime for user ticket (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Maximum lifetime for user ticket policy setting. ms.assetid: bcb4ff59-334d-4c2f-99af-eca2b64011dc ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/maximum-password-age.md b/windows/security/threat-protection/security-policy-settings/maximum-password-age.md index e63f28edde..4b00614234 100644 --- a/windows/security/threat-protection/security-policy-settings/maximum-password-age.md +++ b/windows/security/threat-protection/security-policy-settings/maximum-password-age.md @@ -3,14 +3,14 @@ title: Maximum password age (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Maximum password age security policy setting. ms.assetid: 2d6e70e7-c8b0-44fb-8113-870c6120871d ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization.md b/windows/security/threat-protection/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization.md index e010602641..44ff70c70f 100644 --- a/windows/security/threat-protection/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization.md +++ b/windows/security/threat-protection/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization.md @@ -3,14 +3,14 @@ title: Maximum tolerance for computer clock synchronization (Windows 10) description: Best practices, location, values, policy management, and security considerations for the policy setting, Maximum tolerance for computer clock synchronization. ms.assetid: ba2cf59e-d69d-469e-95e3-8e6a0ba643af ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-client-digitally-sign-communications-always.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-client-digitally-sign-communications-always.md index d6c198624a..b8faf7de34 100644 --- a/windows/security/threat-protection/security-policy-settings/microsoft-network-client-digitally-sign-communications-always.md +++ b/windows/security/threat-protection/security-policy-settings/microsoft-network-client-digitally-sign-communications-always.md @@ -3,14 +3,14 @@ title: Microsoft network client Digitally sign communications (always) (Windows description: Best practices and security considerations for the Microsoft network client Digitally sign communications (always) security policy setting. ms.assetid: 4b7b0298-b130-40f8-960d-60418ba85f76 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp +author: vinaypamnani-msft ms.date: 06/28/2018 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md index c17a0e599f..317774daa8 100644 --- a/windows/security/threat-protection/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md +++ b/windows/security/threat-protection/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md @@ -3,14 +3,14 @@ title: Microsoft network client Send unencrypted password (Windows 10) description: Learn about best practices and more for the security policy setting, Microsoft network client Send unencrypted password to third-party SMB servers. ms.assetid: 97a76b93-afa7-4dd9-bb52-7c9e289b6017 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md index 5a14605d54..631e005c89 100644 --- a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md +++ b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md @@ -3,14 +3,14 @@ title: Microsoft network server Amount of idle time required before suspending s description: Best practices, security considerations, and more for the policy setting, Microsoft network server Amount of idle time required before suspending session. ms.assetid: 8227842a-569d-480f-b43c-43450bbaa722 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md index f4ddaa9d5a..1d42ace022 100644 --- a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md +++ b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md @@ -3,14 +3,14 @@ title: Microsoft network server Attempt S4U2Self (Windows 10) description: Learn about the security policy setting, Microsoft network server Attempt S4U2Self to obtain claim information. ms.assetid: e4508387-35ed-4a3f-a47c-27f8396adbba ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-always.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-always.md index 080f186f03..aea5f5263c 100644 --- a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-always.md +++ b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-always.md @@ -3,14 +3,14 @@ title: Microsoft network server Digitally sign communications (always) (Windows description: Best practices, security considerations, and more for the security policy setting, Microsoft network server Digitally sign communications (always). ms.assetid: 2007b622-7bc2-44e8-9cf1-d34b62117ea8 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md index 6b528db190..591bb159e2 100644 --- a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md +++ b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md @@ -3,14 +3,14 @@ title: Microsoft network server Disconnect clients when sign-in hours expire (Wi description: Best practices, location, values, and security considerations for the policy setting, Microsoft network server Disconnect clients when sign-in hours expire. ms.assetid: 48b5c424-9ba8-416d-be7d-ccaabb3f49af ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level.md index a403cf9029..b118a7eeec 100644 --- a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level.md +++ b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level.md @@ -3,14 +3,14 @@ title: Microsoft network server Server SPN target name validation level (Windows description: Best practices, security considerations, and more for the security policy setting, Microsoft network server Server SPN target name validation level. ms.assetid: 18337f78-eb45-42fd-bdbd-f8cd02c3e154 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/minimum-password-age.md b/windows/security/threat-protection/security-policy-settings/minimum-password-age.md index 97ae441bb7..6940cef652 100644 --- a/windows/security/threat-protection/security-policy-settings/minimum-password-age.md +++ b/windows/security/threat-protection/security-policy-settings/minimum-password-age.md @@ -3,14 +3,14 @@ title: Minimum password age (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Minimum password age security policy setting. ms.assetid: 91915cb2-1b3f-4fb7-afa0-d03df95e8161 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp +author: vinaypamnani-msft ms.date: 11/13/2018 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/security-policy-settings/minimum-password-length.md b/windows/security/threat-protection/security-policy-settings/minimum-password-length.md index 79aad414c3..c3dbc74508 100644 --- a/windows/security/threat-protection/security-policy-settings/minimum-password-length.md +++ b/windows/security/threat-protection/security-policy-settings/minimum-password-length.md @@ -3,14 +3,14 @@ title: Minimum password length (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Minimum password length security policy setting. ms.assetid: 3d22eb9a-859a-4b6f-82f5-c270c427e17e ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/modify-an-object-label.md b/windows/security/threat-protection/security-policy-settings/modify-an-object-label.md index 373887c79e..64c9cfb91b 100644 --- a/windows/security/threat-protection/security-policy-settings/modify-an-object-label.md +++ b/windows/security/threat-protection/security-policy-settings/modify-an-object-label.md @@ -3,14 +3,14 @@ title: Modify an object label (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Modify an object label security policy setting. ms.assetid: 3e5a97dd-d363-43a8-ae80-452e866ebfd5 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/modify-firmware-environment-values.md b/windows/security/threat-protection/security-policy-settings/modify-firmware-environment-values.md index 8d28849453..b319cb227f 100644 --- a/windows/security/threat-protection/security-policy-settings/modify-firmware-environment-values.md +++ b/windows/security/threat-protection/security-policy-settings/modify-firmware-environment-values.md @@ -3,14 +3,14 @@ title: Modify firmware environment values (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Modify firmware environment values security policy setting. ms.assetid: 80bad5c4-d9eb-4e3a-a5dc-dcb742b83fca ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation.md b/windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation.md index 3749e86521..9acd59baf4 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation.md @@ -3,14 +3,14 @@ title: Network access Allow anonymous SID/Name translation (Windows 10) description: Best practices, location, values, policy management and security considerations for the policy setting, Network access Allow anonymous SID/Name translation. ms.assetid: 0144477f-22a6-4d06-b70a-9c9c2196e99e ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares.md b/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares.md index 6bad2976ca..f8d6d03178 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares.md @@ -3,14 +3,14 @@ title: Network access Do not allow anonymous enumeration (Windows 10) description: Learn about best practices and more for the security policy setting, Network access Do not allow anonymous enumeration of SAM accounts and shares. ms.assetid: 3686788d-4cc7-4222-9163-cbc7c3362d73 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md b/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md index a6c761b102..8737293037 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md @@ -3,14 +3,14 @@ title: Network access Do not allow anonymous enumeration of SAM accounts (Window description: Describes the best practices, location, values, and security considerations for the Network access Do not allow anonymous enumeration of SAM accounts security policy setting. ms.assetid: 6ee25b33-ad43-4097-b031-7be680f64c7c ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md b/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md index 51152ae5b7..ee94547a38 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md @@ -3,14 +3,14 @@ title: Network access Do not allow storage of passwords and credentials for netw description: Learn about best practices and more for the security policy setting, Network access Do not allow storage of passwords and credentials for network authentication ms.assetid: b9b64360-36ea-40fa-b795-2d6558c46563 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users.md b/windows/security/threat-protection/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users.md index 5984f7aa39..8930ccddc2 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users.md @@ -3,14 +3,14 @@ title: Let Everyone permissions apply to anonymous users (Windows 10) description: Learn about best practices, security considerations and more for the security policy setting, Network access Let Everyone permissions apply to anonymous users. ms.assetid: cdbc5159-9173-497e-b46b-7325f4256353 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously.md b/windows/security/threat-protection/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously.md index ee23e0432c..e316bde487 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously.md @@ -3,14 +3,14 @@ title: Network access Named Pipes that can be accessed anonymously (Windows 10) description: Describes best practices, security considerations and more for the security policy setting, Network access Named Pipes that can be accessed anonymously. ms.assetid: 8897d2a4-813e-4d2b-8518-fcee71e1cf2c ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md b/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md index 7a130c03eb..9710006303 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md @@ -3,14 +3,14 @@ title: Network access Remotely accessible registry paths and subpaths (Windows 1 description: Describes best practices, location, values, and security considerations for the policy setting, Network access Remotely accessible registry paths and subpaths. ms.assetid: 3fcbbf70-a002-4f85-8e86-8dabad21928e ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths.md b/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths.md index 746ada8c10..190f14dfa2 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths.md @@ -3,14 +3,14 @@ title: Network access Remotely accessible registry paths (Windows 10) description: Best practices, location, values, policy management and security considerations for the policy setting, Network access Remotely accessible registry paths. ms.assetid: 977f86ea-864f-4f1b-9756-22220efce0bd ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares.md b/windows/security/threat-protection/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares.md index 9bc2a12af5..283e9519f7 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares.md @@ -3,14 +3,14 @@ title: Network access Restrict anonymous access to Named Pipes and Shares (Windo description: Best practices, security considerations, and more for the security policy setting, Network access Restrict anonymous access to Named Pipes and Shares. ms.assetid: e66cd708-7322-4d49-9b57-1bf8ec7a4c10 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls.md b/windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls.md index 9e277a9551..17b298bf43 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls.md @@ -5,10 +5,10 @@ ms.prod: m365-security ms.technology: windows-sec ms.localizationpriority: medium ms.date: 09/17/2018 -author: dansimp -ms.author: dansimp +author: vinaypamnani-msft +ms.author: vinpa ms.reviewer: -manager: dansimp +manager: aaroncz --- # Network access: Restrict clients allowed to make remote calls to SAM diff --git a/windows/security/threat-protection/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md b/windows/security/threat-protection/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md index 8886a5ba0a..341a3da763 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md @@ -3,14 +3,14 @@ title: Network access Shares that can be accessed anonymously (Windows 10) description: Learn about best practices, security considerations, and more for the security policy setting, Network access Shares that can be accessed anonymously. ms.assetid: f3e4b919-8279-4972-b415-5f815e2f0a1a ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md b/windows/security/threat-protection/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md index c13b8ecea9..1e23f27004 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md @@ -3,14 +3,14 @@ title: Network access Sharing and security model for local accounts (Windows 10) description: Best practices, security considerations, and more for the security policy setting, Network access Sharing and security model for local accounts. ms.assetid: 0b3d703c-ea27-488f-8f59-b345af75b994 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/network-list-manager-policies.md b/windows/security/threat-protection/security-policy-settings/network-list-manager-policies.md index 619b009548..95477f334c 100644 --- a/windows/security/threat-protection/security-policy-settings/network-list-manager-policies.md +++ b/windows/security/threat-protection/security-policy-settings/network-list-manager-policies.md @@ -3,14 +3,14 @@ title: Network List Manager policies (Windows 10) description: Network List Manager policies are security settings that configure different aspects of how networks are listed and displayed on one device or on many devices. ms.assetid: bd8109d4-b07c-4beb-a9a6-affae2ba2fda ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md b/windows/security/threat-protection/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md index 2b7a73365a..050b097f0d 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md @@ -3,14 +3,14 @@ title: "Network security: Allow Local System to use computer identity for NTLM ( description: Location, values, policy management, and security considerations for the policy setting, Network security Allow Local System to use computer identity for NTLM. ms.assetid: c46a658d-b7a4-4139-b7ea-b9268c240053 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/network-security-allow-localsystem-null-session-fallback.md b/windows/security/threat-protection/security-policy-settings/network-security-allow-localsystem-null-session-fallback.md index 271d990f14..1ed0dc313e 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-allow-localsystem-null-session-fallback.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-allow-localsystem-null-session-fallback.md @@ -3,14 +3,14 @@ title: Network security Allow LocalSystem NULL session fallback (Windows 10) description: Describes the best practices, location, values, and security considerations for the Network security Allow LocalSystem NULL session fallback security policy setting. ms.assetid: 5b72edaa-bec7-4572-b6f0-648fc38f5395 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md b/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md index 093d8db29f..32d31c4fd9 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md @@ -3,14 +3,14 @@ title: Network security Allow PKU2U authentication requests to this computer to description: Best practices for the Network Security Allow PKU2U authentication requests to this computer to use online identities security setting. ms.assetid: e04a854e-d94d-4306-9fb3-56e9bd7bb926 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md b/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md index afe9be35da..52e8eb78fa 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md @@ -3,14 +3,14 @@ title: Network security Configure encryption types allowed for Kerberos description: Best practices, location, values and security considerations for the policy setting, Network security Configure encryption types allowed for Kerberos Win7 only. ms.assetid: 303d32cc-415b-44ba-96c0-133934046ece ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md b/windows/security/threat-protection/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md index e0ecaddc05..017c6efed4 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md @@ -3,14 +3,14 @@ title: Network security Do not store LAN Manager hash value on next password cha description: Best practices, security considerations, and more for the security policy setting, Network security Do not store LAN Manager hash value on next password change. ms.assetid: 6452b268-e5ba-4889-9d38-db28f919af51 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/network-security-force-logoff-when-logon-hours-expire.md b/windows/security/threat-protection/security-policy-settings/network-security-force-logoff-when-logon-hours-expire.md index 3bc3ec584c..8a8e65589d 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-force-logoff-when-logon-hours-expire.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-force-logoff-when-logon-hours-expire.md @@ -3,14 +3,14 @@ title: Network security Force logoff when logon hours expire (Windows 10) description: Best practices, location, values, policy management, and security considerations for the policy setting, Network security Force logoff when logon hours expire. ms.assetid: 64d5dde4-58e4-4217-b2c4-73bd554ec926 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level.md b/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level.md index 1841669403..290d68e275 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level.md @@ -3,14 +3,14 @@ title: Network security LAN Manager authentication level (Windows 10) description: Best practices, location, values, policy management and security considerations for the policy setting, Network security LAN Manager authentication level. ms.assetid: bbe1a98c-420a-41e7-9d3c-3a2fe0f1843e ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements.md b/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements.md index 1f59bd9111..649f86484d 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements.md @@ -3,14 +3,14 @@ title: Network security LDAP client signing requirements (Windows 10) description: Best practices, location, values, policy management and security considerations for the policy setting, Network security LDAP client signing requirements. ms.assetid: 38b35489-eb5b-4035-bc87-df63de50509c ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md b/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md index 1ab941f6ae..499f48df37 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md @@ -3,14 +3,14 @@ title: Network security Minimum session security for NTLM SSP based (including s description: Best practices and more for the security policy setting, Network security Minimum session security for NTLM SSP based (including secure RPC) clients. ms.assetid: 89903de8-23d0-4e0f-9bef-c00cb7aebf00 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md b/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md index 026f314358..fc3ecf9874 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md @@ -3,14 +3,14 @@ title: Network security Minimum session security for NTLM SSP based (including s description: Best practices and security considerations for the policy setting, Network security Minimum session security for NTLM SSP based (including secure RPC) servers. ms.assetid: c6a60c1b-bc8d-4d02-9481-f847a411b4fc ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md index 828f91f36b..af088813c3 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md @@ -3,14 +3,14 @@ title: Network security Restrict NTLM Add remote server exceptions for NTLM auth description: Best practices, security considerations, and more for the policy setting, Network security Restrict NTLM Add remote server exceptions for NTLM authentication. ms.assetid: 9b017399-0a54-4580-bfae-614c2beda3a1 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md index 41ca2e0bee..3da17e661a 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md @@ -3,14 +3,14 @@ title: Network security Restrict NTLM Add server exceptions in this domain (Wind description: Best practices, security considerations, and more for the security policy setting, Network security Restrict NTLM Add server exceptions in this domain. ms.assetid: 2f981b68-6aa7-4dd9-b53d-d88551277cc0 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md index d1310a007d..121bd4e52c 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md @@ -3,14 +3,14 @@ title: Network security Restrict NTLM Audit incoming NTLM traffic (Windows 10) description: Best practices, security considerations and more for the security policy setting, Network Security Restrict NTLM Audit incoming NTLM traffic. ms.assetid: 37e380c2-22e1-44cd-9993-e12815b845cf ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md index 9132d60c97..f616cf866d 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md @@ -3,14 +3,14 @@ title: Network security Restrict NTLM Audit NTLM authentication in this domain ( description: Best practices, security considerations, and more for the security policy setting, Network Security Restrict NTLM Audit NTLM authentication in this domain. ms.assetid: 33183ef9-53b5-4258-8605-73dc46335e6e ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic.md index 2bb128f669..cd6e29ccca 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic.md @@ -3,14 +3,14 @@ title: Network security Restrict NTLM Incoming NTLM traffic (Windows 10) description: Best practices, security considerations, and more for the security policy setting, Network Security Restrict NTLM Incoming NTLM traffic. ms.assetid: c0eff7d3-ed59-4004-908a-2205295fefb8 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md index 2589d1f95d..ec2ca5785a 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md @@ -3,14 +3,14 @@ title: Network security Restrict NTLM in this domain (Windows 10) description: Learn about best practices, security considerations and more for the security policy setting, Network Security Restrict NTLM NTLM authentication in this domain. ms.assetid: 4c7884e9-cc11-4402-96b6-89c77dc908f8 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md index 57d8b13de1..f63a2f7737 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md @@ -3,14 +3,14 @@ title: Network security Restrict NTLM Outgoing traffic (Windows 10) description: Learn about best practices, security considerations and more for the policy setting, Network Security Restrict NTLM Outgoing NTLM traffic to remote servers. ms.assetid: 63437a90-764b-4f06-aed8-a4a26cf81bd1 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/password-must-meet-complexity-requirements.md b/windows/security/threat-protection/security-policy-settings/password-must-meet-complexity-requirements.md index 5bcf16ede3..b5e775ba1a 100644 --- a/windows/security/threat-protection/security-policy-settings/password-must-meet-complexity-requirements.md +++ b/windows/security/threat-protection/security-policy-settings/password-must-meet-complexity-requirements.md @@ -3,14 +3,14 @@ title: Password must meet complexity requirements (Windows 10) description: Describes the best practices, location, values, and security considerations for the Password must meet complexity requirements security policy setting. ms.assetid: 94482ae3-9dda-42df-9782-2f66196e6afe ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/password-policy.md b/windows/security/threat-protection/security-policy-settings/password-policy.md index 11d69785c6..aa39b49609 100644 --- a/windows/security/threat-protection/security-policy-settings/password-policy.md +++ b/windows/security/threat-protection/security-policy-settings/password-policy.md @@ -3,14 +3,14 @@ title: Password Policy (Windows 10) description: An overview of password policies for Windows and links to information for each policy setting. ms.assetid: aec1220d-a875-4575-9050-f02f9c54a3b6 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/perform-volume-maintenance-tasks.md b/windows/security/threat-protection/security-policy-settings/perform-volume-maintenance-tasks.md index fb0e337c6b..e393a2ba86 100644 --- a/windows/security/threat-protection/security-policy-settings/perform-volume-maintenance-tasks.md +++ b/windows/security/threat-protection/security-policy-settings/perform-volume-maintenance-tasks.md @@ -3,14 +3,14 @@ title: Perform volume maintenance tasks (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Perform volume maintenance tasks security policy setting. ms.assetid: b6990813-3898-43e2-8221-c9c06d893244 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/profile-single-process.md b/windows/security/threat-protection/security-policy-settings/profile-single-process.md index c0fb47def4..628658209d 100644 --- a/windows/security/threat-protection/security-policy-settings/profile-single-process.md +++ b/windows/security/threat-protection/security-policy-settings/profile-single-process.md @@ -3,14 +3,14 @@ title: Profile single process (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Profile single process security policy setting. ms.assetid: c0963de4-4f5e-430e-bfcd-dfd68e66a075 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/profile-system-performance.md b/windows/security/threat-protection/security-policy-settings/profile-system-performance.md index 8eeabdcf30..9f76b3d698 100644 --- a/windows/security/threat-protection/security-policy-settings/profile-system-performance.md +++ b/windows/security/threat-protection/security-policy-settings/profile-system-performance.md @@ -3,14 +3,14 @@ title: Profile system performance (Windows 10) description: Best practices, location, values, policy management, and security considerations for the security policy setting, Profile system performance. ms.assetid: ffabc3c5-9206-4105-94ea-84f597a54b2e ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/recovery-console-allow-automatic-administrative-logon.md b/windows/security/threat-protection/security-policy-settings/recovery-console-allow-automatic-administrative-logon.md index ce9ada3153..a1e2ab6949 100644 --- a/windows/security/threat-protection/security-policy-settings/recovery-console-allow-automatic-administrative-logon.md +++ b/windows/security/threat-protection/security-policy-settings/recovery-console-allow-automatic-administrative-logon.md @@ -3,14 +3,14 @@ title: Recovery console Allow automatic administrative logon (Windows 10) description: Best practices, location, values, policy management, and security considerations for the policy setting, Recovery console Allow automatic administrative logon. ms.assetid: be2498fc-48f4-43f3-ad09-74664e45e596 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md b/windows/security/threat-protection/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md index 9c9c56c5db..8e34bd2995 100644 --- a/windows/security/threat-protection/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md +++ b/windows/security/threat-protection/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md @@ -3,14 +3,14 @@ title: Recovery console Allow floppy copy and access to all drives and folders ( description: Best practices, security considerations, and more for the policy setting, Recovery console Allow floppy copy and access to all drives and folders. ms.assetid: a5b4ac0c-f33d-42b5-a866-72afa7cbd0bd ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/remove-computer-from-docking-station.md b/windows/security/threat-protection/security-policy-settings/remove-computer-from-docking-station.md index b42bad16dd..dafe4d5d59 100644 --- a/windows/security/threat-protection/security-policy-settings/remove-computer-from-docking-station.md +++ b/windows/security/threat-protection/security-policy-settings/remove-computer-from-docking-station.md @@ -3,14 +3,14 @@ title: Remove computer from docking station - security policy setting (Windows 1 description: Describes the best practices, location, values, policy management, and security considerations for the Remove computer from docking station security policy setting. ms.assetid: 229a385a-a862-4973-899a-413b1b5b6c30 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/replace-a-process-level-token.md b/windows/security/threat-protection/security-policy-settings/replace-a-process-level-token.md index dd1696b067..c40121b387 100644 --- a/windows/security/threat-protection/security-policy-settings/replace-a-process-level-token.md +++ b/windows/security/threat-protection/security-policy-settings/replace-a-process-level-token.md @@ -3,14 +3,14 @@ title: Replace a process level token (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Replace a process level token security policy setting. ms.assetid: 5add02db-6339-489e-ba21-ccc3ccbe8745 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/reset-account-lockout-counter-after.md b/windows/security/threat-protection/security-policy-settings/reset-account-lockout-counter-after.md index 51f96f1875..e2f943cd55 100644 --- a/windows/security/threat-protection/security-policy-settings/reset-account-lockout-counter-after.md +++ b/windows/security/threat-protection/security-policy-settings/reset-account-lockout-counter-after.md @@ -3,14 +3,14 @@ title: Reset account lockout counter after (Windows 10) description: Describes the best practices, location, values, and security considerations for the Reset account lockout counter after security policy setting. ms.assetid: d5ccf6dd-5ba7-44a9-8e0b-c478d8b1442c ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/restore-files-and-directories.md b/windows/security/threat-protection/security-policy-settings/restore-files-and-directories.md index 08c30303cf..5e3f6b9386 100644 --- a/windows/security/threat-protection/security-policy-settings/restore-files-and-directories.md +++ b/windows/security/threat-protection/security-policy-settings/restore-files-and-directories.md @@ -3,14 +3,14 @@ title: Restore files and directories - security policy setting (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Restore files and directories security policy setting. ms.assetid: c673c0fa-6f49-4edd-8c1f-c5e8513f701d ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/secpol-advanced-security-audit-policy-settings.md b/windows/security/threat-protection/security-policy-settings/secpol-advanced-security-audit-policy-settings.md index 9d439eb3b6..7dc532fd31 100644 --- a/windows/security/threat-protection/security-policy-settings/secpol-advanced-security-audit-policy-settings.md +++ b/windows/security/threat-protection/security-policy-settings/secpol-advanced-security-audit-policy-settings.md @@ -3,14 +3,14 @@ title: Advanced security audit policy settings in brief (Windows 10) description: Provides information about the advanced security audit policy settings that are available in Windows and the audit events that they generate. ms.assetid: 6BF9A642-DBC3-4101-94A3-B2316C553CE3 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/security-options.md b/windows/security/threat-protection/security-policy-settings/security-options.md index f7a90a01c0..00441e06c4 100644 --- a/windows/security/threat-protection/security-policy-settings/security-options.md +++ b/windows/security/threat-protection/security-policy-settings/security-options.md @@ -3,14 +3,14 @@ title: Security Options (Windows 10) description: Introduction to the Security Options settings of the local security policies plus links to more information. ms.assetid: 405ea253-8116-4e57-b08e-14a8dcdca92b ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp +author: vinaypamnani-msft ms.date: 06/28/2018 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/security-policy-settings/security-policy-settings-reference.md b/windows/security/threat-protection/security-policy-settings/security-policy-settings-reference.md index 012a47736e..bfca76513d 100644 --- a/windows/security/threat-protection/security-policy-settings/security-policy-settings-reference.md +++ b/windows/security/threat-protection/security-policy-settings/security-policy-settings-reference.md @@ -3,14 +3,14 @@ title: Security policy settings reference (Windows 10) description: This reference of security settings provides information about how to implement and manage security policies, including setting options and security considerations. ms.assetid: ef5a4579-15a8-4507-9a43-b7ccddcb0ed1 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/security-policy-settings.md b/windows/security/threat-protection/security-policy-settings/security-policy-settings.md index b7c8b59b5f..e694d0e097 100644 --- a/windows/security/threat-protection/security-policy-settings/security-policy-settings.md +++ b/windows/security/threat-protection/security-policy-settings/security-policy-settings.md @@ -3,14 +3,14 @@ title: Security policy settings (Windows 10) description: This reference topic describes the common scenarios, architecture, and processes for security settings. ms.assetid: e7ac5204-7f6c-4708-a9f6-6af712ca43b9 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/shut-down-the-system.md b/windows/security/threat-protection/security-policy-settings/shut-down-the-system.md index 597fe3f069..465e04c8e5 100644 --- a/windows/security/threat-protection/security-policy-settings/shut-down-the-system.md +++ b/windows/security/threat-protection/security-policy-settings/shut-down-the-system.md @@ -3,14 +3,14 @@ title: Shut down the system - security policy setting (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Shut down the system security policy setting. ms.assetid: c8e8f890-153a-401e-a957-ba6a130304bf ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md b/windows/security/threat-protection/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md index f80dd3b8cf..06fb947134 100644 --- a/windows/security/threat-protection/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md +++ b/windows/security/threat-protection/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md @@ -3,14 +3,14 @@ title: Shutdown Allow system to be shut down without having to log on (Windows 1 description: Best practices, security considerations, and more for the security policy setting Shutdown Allow system to be shut down without having to log on. ms.assetid: f3964767-5377-4416-8eb3-e14d553a7315 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/shutdown-clear-virtual-memory-pagefile.md b/windows/security/threat-protection/security-policy-settings/shutdown-clear-virtual-memory-pagefile.md index 185bbf975e..188c435f4f 100644 --- a/windows/security/threat-protection/security-policy-settings/shutdown-clear-virtual-memory-pagefile.md +++ b/windows/security/threat-protection/security-policy-settings/shutdown-clear-virtual-memory-pagefile.md @@ -3,14 +3,14 @@ title: Shutdown Clear virtual memory pagefile (Windows 10) description: Describes the best practices, location, values, policy management and security considerations for the Shutdown Clear virtual memory pagefile security policy setting. ms.assetid: 31400078-6c56-4891-a6df-6dfb403c4bc9 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-client-digitally-sign-communications-always.md b/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-client-digitally-sign-communications-always.md index b720770fd9..460941fd81 100644 --- a/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-client-digitally-sign-communications-always.md +++ b/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-client-digitally-sign-communications-always.md @@ -3,14 +3,14 @@ title: Always sign SMBv1 network client communications (Windows 10) description: Learn about best practices, security considerations and more for the security policy setting, Microsoft network client Digitally sign communications (always). ms.assetid: 4b7b0298-b130-40f8-960d-60418ba85f76 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-client-digitally-sign-communications-if-server-agrees.md b/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-client-digitally-sign-communications-if-server-agrees.md index b912861503..6125397053 100644 --- a/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-client-digitally-sign-communications-if-server-agrees.md +++ b/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-client-digitally-sign-communications-if-server-agrees.md @@ -3,14 +3,14 @@ title: SMBv1 Microsoft network client Digitally sign communications (if server a description: Best practices, location, values, and security considerations for the policy setting, Microsoft network client Digitally sign communications (if server agrees). ms.assetid: e553f700-aae5-425c-8650-f251c90ba5dd ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-server-digitally-sign-communications-always.md b/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-server-digitally-sign-communications-always.md index 49782f3f58..b261da96b1 100644 --- a/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-server-digitally-sign-communications-always.md +++ b/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-server-digitally-sign-communications-always.md @@ -3,14 +3,14 @@ title: SMB v1 Microsoft network server Digitally sign communications (always) (W description: Best practices, security considerations, and more for the security policy setting, Microsoft network server Digitally sign communications (always). ms.assetid: 2007b622-7bc2-44e8-9cf1-d34b62117ea8 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-server-digitally-sign-communications-if-client-agrees.md b/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-server-digitally-sign-communications-if-client-agrees.md index 75a325c3b4..d10e1c5531 100644 --- a/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-server-digitally-sign-communications-if-client-agrees.md +++ b/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-server-digitally-sign-communications-if-client-agrees.md @@ -3,14 +3,14 @@ title: SMBv1 Microsoft network server Digitally sign communications (if client a description: Best practices, security considerations and more for the security policy setting, Microsoft network server Digitally sign communications (if client agrees). ms.assetid: c92b2e3d-1dbf-4337-a145-b17a585f4fc1 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/store-passwords-using-reversible-encryption.md b/windows/security/threat-protection/security-policy-settings/store-passwords-using-reversible-encryption.md index 316d4868dd..207e07ea6f 100644 --- a/windows/security/threat-protection/security-policy-settings/store-passwords-using-reversible-encryption.md +++ b/windows/security/threat-protection/security-policy-settings/store-passwords-using-reversible-encryption.md @@ -3,14 +3,14 @@ title: Store passwords using reversible encryption (Windows 10) description: Describes the best practices, location, values, and security considerations for the Store passwords using reversible encryption security policy setting. ms.assetid: 57f958c2-f1e9-48bf-871b-0a9b3299e238 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/synchronize-directory-service-data.md b/windows/security/threat-protection/security-policy-settings/synchronize-directory-service-data.md index e6e95159e1..75c07aa23f 100644 --- a/windows/security/threat-protection/security-policy-settings/synchronize-directory-service-data.md +++ b/windows/security/threat-protection/security-policy-settings/synchronize-directory-service-data.md @@ -3,14 +3,14 @@ title: Synchronize directory service data (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Synchronize directory service data security policy setting. ms.assetid: 97b0aaa4-674f-40f4-8974-b4bfb12c232c ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md b/windows/security/threat-protection/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md index 7e0e17cc6d..8e7bbc95a5 100644 --- a/windows/security/threat-protection/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md +++ b/windows/security/threat-protection/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md @@ -3,14 +3,14 @@ title: System cryptography Force strong key protection for user keys stored on t description: Best practices, security considerations, and more for the policy setting, System cryptography Force strong key protection for user keys stored on the computer. ms.assetid: 8cbff267-881e-4bf6-920d-b583a5ff7de0 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md b/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md index e38443c02b..384b7464ec 100644 --- a/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md +++ b/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md @@ -3,14 +3,14 @@ title: System cryptography Use FIPS compliant algorithms for encryption, hashing description: Best practices, security considerations, and more for the policy setting System cryptography Use FIPS compliant algorithms for encryption, hashing, and signing ms.assetid: 83988865-dc0f-45eb-90d1-ee33495eb045 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems.md b/windows/security/threat-protection/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems.md index 9c7c2c4433..9c4cd9c338 100644 --- a/windows/security/threat-protection/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems.md +++ b/windows/security/threat-protection/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems.md @@ -3,14 +3,14 @@ title: System objects Require case insensitivity for non-Windows subsystems (Win description: Best practices, security considerations and more for the security policy setting, System objects Require case insensitivity for non-Windows subsystems. ms.assetid: 340d6769-8f33-4067-8470-1458978d1522 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects.md b/windows/security/threat-protection/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects.md index 71e2fa8221..bba4ab0d9b 100644 --- a/windows/security/threat-protection/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects.md +++ b/windows/security/threat-protection/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects.md @@ -3,14 +3,14 @@ title: System objects Strengthen default permissions of internal system objects description: Best practices and more for the security policy setting, System objects Strengthen default permissions of internal system objects (for example, Symbolic Links). ms.assetid: 3a592097-9cf5-4fd0-a504-7cbfab050bb6 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/system-settings-optional-subsystems.md b/windows/security/threat-protection/security-policy-settings/system-settings-optional-subsystems.md index 8db727008d..a36f304e17 100644 --- a/windows/security/threat-protection/security-policy-settings/system-settings-optional-subsystems.md +++ b/windows/security/threat-protection/security-policy-settings/system-settings-optional-subsystems.md @@ -3,14 +3,14 @@ title: System settings Optional subsystems (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the System settings Optional subsystems security policy setting. ms.assetid: 5cb6519a-4f84-4b45-8072-e2aa8a72fb78 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md b/windows/security/threat-protection/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md index e58a8d0925..6e85e42483 100644 --- a/windows/security/threat-protection/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md +++ b/windows/security/threat-protection/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md @@ -3,14 +3,14 @@ title: System settings Use certificate rules on Windows executables for Software description: Best practices and more for the security policy setting, System settings Use certificate rules on Windows executables for Software Restriction Policies. ms.assetid: 2380d93b-b553-4e56-a0c0-d1ef740d089c ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/take-ownership-of-files-or-other-objects.md b/windows/security/threat-protection/security-policy-settings/take-ownership-of-files-or-other-objects.md index b3272708b2..e2f1047e2a 100644 --- a/windows/security/threat-protection/security-policy-settings/take-ownership-of-files-or-other-objects.md +++ b/windows/security/threat-protection/security-policy-settings/take-ownership-of-files-or-other-objects.md @@ -3,14 +3,14 @@ title: Take ownership of files or other objects (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Take ownership of files or other objects security policy setting. ms.assetid: cb8595d1-74cc-4176-bb15-d97663eebb2d ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md b/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md index d6d32d8a08..01a701fa23 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md @@ -3,14 +3,14 @@ title: User Account Control Admin Approval Mode for the Built-in Administrator a description: Best practices, security considerations, and more for the policy setting, User Account Control Admin Approval Mode for the Built-in Administrator account. ms.assetid: d465fc27-1cd2-498b-9cf6-7ad2276e5998 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md b/windows/security/threat-protection/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md index 4ade31f9ed..3c9892061b 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md @@ -3,14 +3,14 @@ title: User Account Control Allow UIAccess applications to prompt for elevation description: Best practices and more for the policy setting, User Account Control Allow UIAccess applications to prompt for elevation without using the secure desktop. ms.assetid: fce20472-3c93-449d-b520-13c4c74a9892 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md b/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md index 06252b3d4a..b72a730982 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md @@ -3,14 +3,14 @@ title: User Account Control Behavior of the elevation prompt for administrators description: Best practices and more for the security policy setting, User Account Control Behavior of the elevation prompt for administrators in Admin Approval Mode. ms.assetid: 46a3c3a2-1d2e-4a6f-b5e6-29f9592f535d ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md b/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md index dcc2829197..4e9e8b0579 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md @@ -3,14 +3,14 @@ title: Behavior of the elevation prompt for standard users (Windows 10) description: Learn about best practices, security considerations, and more for the policy setting, User Account Control Behavior of the elevation prompt for standard users. ms.assetid: 1eae7def-8f6c-43b6-9474-23911fdc01ba ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation.md b/windows/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation.md index 53b87039e9..516b0424de 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation.md @@ -3,14 +3,14 @@ title: User Account Control Detect application installations and prompt for elev description: Learn about best practices and more for the security policy setting, User Account Control Detect application installations and prompt for elevation. ms.assetid: 3f8cb170-ba77-4c9f-abb3-c3ed1ef264fc ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md b/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md index 0f83be229f..25867ee997 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md @@ -3,14 +3,14 @@ title: User Account Control Only elevate executables that are signed and validat description: Best practices, security considerations, and more for the security policy setting, User Account Control Only elevate executables that are signed and validated. ms.assetid: 64950a95-6985-4db6-9905-1db18557352d ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md b/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md index 2c36882505..6ac53e9a3c 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md @@ -3,14 +3,14 @@ title: Only elevate UIAccess app installed in secure location (Windows 10) description: Learn about best practices and more for the policy setting, User Account Control Only elevate UIAccess applications that are installed in secure locations. ms.assetid: 4333409e-a5be-4f2f-8808-618f53abd22c ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode.md b/windows/security/threat-protection/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode.md index 3d53a0a2f4..23869703bb 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode.md @@ -3,14 +3,14 @@ title: UAC Run all administrators in Admin Approval Mode (Windows 10) description: Learn about best practices, security considerations and more for the security policy setting, User Account Control Run all administrators in Admin Approval Mode. ms.assetid: b838c561-7bfc-41ef-a7a5-55857259c7bf ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md b/windows/security/threat-protection/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md index 15ef6860e1..ebfed79966 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md @@ -3,14 +3,14 @@ title: User Account Control Switch to the secure desktop when prompting for elev description: Best practices, security considerations, and more for the policy setting, User Account Control Switch to the secure desktop when prompting for elevation. ms.assetid: 77a067db-c70d-4b02-9861-027503311b8b ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md b/windows/security/threat-protection/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md index 97de8498ea..20f35bb912 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md @@ -3,14 +3,14 @@ title: User Account Control Virtualize file and registry write failures to per-u description: Best practices, security considerations and more for the policy setting, User Account Control Virtualize file and registry write failures to per-user locations. ms.assetid: a7b47420-cc41-4b1c-b03e-f67a05221261 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/security-policy-settings/user-rights-assignment.md b/windows/security/threat-protection/security-policy-settings/user-rights-assignment.md index e2a05656b9..db266406f6 100644 --- a/windows/security/threat-protection/security-policy-settings/user-rights-assignment.md +++ b/windows/security/threat-protection/security-policy-settings/user-rights-assignment.md @@ -3,14 +3,14 @@ title: User Rights Assignment (Windows 10) description: Provides an overview and links to information about the User Rights Assignment security policy settings user rights that are available in Windows. ms.assetid: 99340252-60be-4c79-b0a5-56fbe1a9b0c5 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/AppIdTagging/debugging-operational-guide-appid-tagging-policies.md b/windows/security/threat-protection/windows-defender-application-control/AppIdTagging/debugging-operational-guide-appid-tagging-policies.md index 7b909e6fb0..cdf0f0ff3b 100644 --- a/windows/security/threat-protection/windows-defender-application-control/AppIdTagging/debugging-operational-guide-appid-tagging-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/AppIdTagging/debugging-operational-guide-appid-tagging-policies.md @@ -12,8 +12,8 @@ audience: ITPro ms.collection: M365-security-compliance author: jgeurten ms.reviewer: jsuther1974 -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.date: 04/29/2022 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-application-control/AppIdTagging/deploy-appid-tagging-policies.md b/windows/security/threat-protection/windows-defender-application-control/AppIdTagging/deploy-appid-tagging-policies.md index 90233a51ac..e248c9e0b0 100644 --- a/windows/security/threat-protection/windows-defender-application-control/AppIdTagging/deploy-appid-tagging-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/AppIdTagging/deploy-appid-tagging-policies.md @@ -6,8 +6,8 @@ ms.localizationpriority: medium ms.collection: M365-security-compliance author: jgeurten ms.reviewer: jsuther1974 -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.date: 04/29/2022 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-application-control/AppIdTagging/design-create-appid-tagging-policies.md b/windows/security/threat-protection/windows-defender-application-control/AppIdTagging/design-create-appid-tagging-policies.md index f89802b9f4..d6009f347f 100644 --- a/windows/security/threat-protection/windows-defender-application-control/AppIdTagging/design-create-appid-tagging-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/AppIdTagging/design-create-appid-tagging-policies.md @@ -12,8 +12,8 @@ audience: ITPro ms.collection: M365-security-compliance author: jgeurten ms.reviewer: jsuther1974 -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.date: 04/29/2022 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-application-control/AppIdTagging/windows-defender-application-control-appid-tagging-guide.md b/windows/security/threat-protection/windows-defender-application-control/AppIdTagging/windows-defender-application-control-appid-tagging-guide.md index 3dca939ef9..2e2b7b42ff 100644 --- a/windows/security/threat-protection/windows-defender-application-control/AppIdTagging/windows-defender-application-control-appid-tagging-guide.md +++ b/windows/security/threat-protection/windows-defender-application-control/AppIdTagging/windows-defender-application-control-appid-tagging-guide.md @@ -12,8 +12,8 @@ audience: ITPro ms.collection: M365-security-compliance author: jgeurten ms.reviewer: jsuther1974 -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.date: 04/27/2022 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-application-control/LOB-win32-apps-on-s.md b/windows/security/threat-protection/windows-defender-application-control/LOB-win32-apps-on-s.md index fe15669214..51c7297d9b 100644 --- a/windows/security/threat-protection/windows-defender-application-control/LOB-win32-apps-on-s.md +++ b/windows/security/threat-protection/windows-defender-application-control/LOB-win32-apps-on-s.md @@ -12,8 +12,8 @@ audience: ITPro ms.collection: M365-security-compliance author: jsuther1974 ms.reviewer: isbrahm -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.date: 10/30/2019 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-application-control/allow-com-object-registration-in-windows-defender-application-control-policy.md b/windows/security/threat-protection/windows-defender-application-control/allow-com-object-registration-in-windows-defender-application-control-policy.md index 11e582e4d8..ea7572399f 100644 --- a/windows/security/threat-protection/windows-defender-application-control/allow-com-object-registration-in-windows-defender-application-control-policy.md +++ b/windows/security/threat-protection/windows-defender-application-control/allow-com-object-registration-in-windows-defender-application-control-policy.md @@ -10,10 +10,10 @@ ms.pagetype: security ms.localizationpriority: medium audience: ITPro ms.collection: M365-security-compliance -author: dansimp +author: vinaypamnani-msft ms.reviewer: isbrahm -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set.md b/windows/security/threat-protection/windows-defender-application-control/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set.md index 5a985252e9..6c0f8cb8ce 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set.md @@ -3,14 +3,14 @@ title: Add rules for packaged apps to existing AppLocker rule-set (Windows) description: This topic for IT professionals describes how to update your existing AppLocker policies for packaged apps using the Remote Server Administration Toolkit (RSAT). ms.assetid: 758c2a9f-c2a3-418c-83bc-fd335a94097f ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/administer-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/administer-applocker.md index 3c1120b48b..b9b2bad633 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/administer-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/administer-applocker.md @@ -3,14 +3,14 @@ title: Administer AppLocker (Windows) description: This topic for IT professionals provides links to specific procedures to use when administering AppLocker policies. ms.assetid: 511a3b6a-175f-4d6d-a6e0-c1780c02e818 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-architecture-and-components.md b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-architecture-and-components.md index 6dbbe7b0fe..7e986fb781 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-architecture-and-components.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-architecture-and-components.md @@ -3,14 +3,14 @@ title: AppLocker architecture and components (Windows) description: This topic for IT professional describes AppLocker’s basic architecture and its major components. ms.assetid: efdd8494-553c-443f-bd5f-c8976535135a ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-functions.md b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-functions.md index aa517a5505..1b538c2c51 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-functions.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-functions.md @@ -3,14 +3,14 @@ title: AppLocker functions (Windows) description: This article for the IT professional lists the functions and security levels for the Software Restriction Policies (SRP) and AppLocker features. ms.assetid: bf704198-9e74-4731-8c5a-ee0512df34d2 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-overview.md b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-overview.md index 4e4e13c016..4f3cd306be 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-overview.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-overview.md @@ -3,14 +3,14 @@ title: AppLocker (Windows) description: This topic provides a description of AppLocker and can help you decide if your organization can benefit from deploying AppLocker application control policies. ms.assetid: 94b57864-2112-43b6-96fb-2863c985dc9a ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-deployment-guide.md b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-deployment-guide.md index a7af9ef942..34ee97d75b 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-deployment-guide.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-deployment-guide.md @@ -3,14 +3,14 @@ title: AppLocker deployment guide (Windows) description: This topic for IT professionals introduces the concepts and describes the steps required to deploy AppLocker policies. ms.assetid: 38632795-be13-46b0-a7af-487a4340bea1 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-design-guide.md b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-design-guide.md index 2c023e6bc0..6a92928800 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-design-guide.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-design-guide.md @@ -3,14 +3,14 @@ title: AppLocker design guide (Windows) description: This topic for the IT professional introduces the design and planning steps required to deploy application control policies by using AppLocker. ms.assetid: 1c8e4a7b-3164-4eb4-9277-11b1d5a09c7b ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policy-use-scenarios.md b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policy-use-scenarios.md index 77d166aedc..f5868aae15 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policy-use-scenarios.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policy-use-scenarios.md @@ -3,14 +3,14 @@ title: AppLocker policy use scenarios (Windows) description: This topic for the IT professional lists the various application control scenarios in which AppLocker policies can be effectively implemented. ms.assetid: 33f71578-89f0-4063-ac04-cf4f4ca5c31f ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-processes-and-interactions.md b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-processes-and-interactions.md index 34ff057457..7836f6cb61 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-processes-and-interactions.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-processes-and-interactions.md @@ -3,14 +3,14 @@ title: AppLocker processes and interactions (Windows) description: This topic for the IT professional describes the process dependencies and interactions when AppLocker evaluates and enforces rules. ms.assetid: 0beec616-6040-4be7-8703-b6c919755d8e ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-settings.md b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-settings.md index 85ecf639ea..2b4b803773 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-settings.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-settings.md @@ -3,14 +3,14 @@ title: AppLocker settings (Windows) description: This topic for the IT professional lists the settings used by AppLocker. ms.assetid: 9cb4aa19-77c0-4415-9968-bd07dab86839 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-technical-reference.md b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-technical-reference.md index 7dc333ae22..c437de9b47 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-technical-reference.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-technical-reference.md @@ -3,14 +3,14 @@ title: AppLocker technical reference (Windows) description: This overview topic for IT professionals provides links to the topics in the technical reference. ms.assetid: 2b2678f8-c46b-4e1d-b8c5-037c0be255ab ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-audit-only.md b/windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-audit-only.md index 8dbd16c51c..43bf3a0b1b 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-audit-only.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-audit-only.md @@ -3,14 +3,14 @@ title: Configure an AppLocker policy for audit only (Windows) description: This topic for IT professionals describes how to set AppLocker policies to Audit only within your IT environment by using AppLocker. ms.assetid: 10bc87d5-cc7f-4500-b7b3-9006e50afa50 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-enforce-rules.md b/windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-enforce-rules.md index 81a1e43bb4..1190773b0d 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-enforce-rules.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-enforce-rules.md @@ -3,14 +3,14 @@ title: Configure an AppLocker policy for enforce rules (Windows) description: This topic for IT professionals describes the steps to enable the AppLocker policy enforcement setting. ms.assetid: 5dbbb290-a5ae-4f88-82b3-21e95972e66c ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/configure-exceptions-for-an-applocker-rule.md b/windows/security/threat-protection/windows-defender-application-control/applocker/configure-exceptions-for-an-applocker-rule.md index 1eba7b9033..a4175fe3fb 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/configure-exceptions-for-an-applocker-rule.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/configure-exceptions-for-an-applocker-rule.md @@ -3,14 +3,14 @@ title: Add exceptions for an AppLocker rule (Windows) description: This topic for IT professionals describes the steps to specify which apps can or cannot run as exceptions to an AppLocker rule. ms.assetid: d15c9d84-c14b-488d-9f48-bf31ff7ff0c5 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-appLocker-reference-device.md b/windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-appLocker-reference-device.md index 1f7b314f14..fa0f8111b2 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-appLocker-reference-device.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-appLocker-reference-device.md @@ -3,14 +3,14 @@ title: Configure the AppLocker reference device (Windows) description: This topic for the IT professional describes the steps to create an AppLocker policy platform structure on a reference computer. ms.assetid: 034bd367-146d-4956-873c-e1e09e6fefee ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-application-identity-service.md b/windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-application-identity-service.md index 4db27c8710..f2281e9d24 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-application-identity-service.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-application-identity-service.md @@ -3,14 +3,14 @@ title: Configure the Application Identity service (Windows) description: This topic for IT professionals shows how to configure the Application Identity service to start automatically or manually. ms.assetid: dc469599-37fd-448b-b23e-5b8e4f17e561 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-for-packaged-apps.md b/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-for-packaged-apps.md index 3bc3d41f7e..5ac6b88d03 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-for-packaged-apps.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-for-packaged-apps.md @@ -3,14 +3,14 @@ title: Create a rule for packaged apps (Windows) description: This article for IT professionals shows how to create an AppLocker rule for packaged apps with a publisher condition. ms.assetid: e4ffd400-7860-47b3-9118-0e6853c3dfa0 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-file-hash-condition.md b/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-file-hash-condition.md index 0f78585339..0c5c51431d 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-file-hash-condition.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-file-hash-condition.md @@ -3,14 +3,14 @@ title: Create a rule that uses a file hash condition (Windows) description: This topic for IT professionals shows how to create an AppLocker rule with a file hash condition. ms.assetid: eb3b3524-1b3b-4979-ba5a-0a0b1280c5c7 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-path-condition.md b/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-path-condition.md index f935341e92..f594af17a2 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-path-condition.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-path-condition.md @@ -3,14 +3,14 @@ title: Create a rule that uses a path condition (Windows) description: This topic for IT professionals shows how to create an AppLocker rule with a path condition. ms.assetid: 9b2093f5-5976-45fa-90c3-da1e0e845d95 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-publisher-condition.md b/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-publisher-condition.md index 60623baeae..f94bd92046 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-publisher-condition.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-publisher-condition.md @@ -3,14 +3,14 @@ title: Create a rule that uses a publisher condition (Windows) description: This topic for IT professionals shows how to create an AppLocker rule with a publisher condition. ms.assetid: 345ad45f-2bc1-4c4c-946f-17804e29f55b ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/create-applocker-default-rules.md b/windows/security/threat-protection/windows-defender-application-control/applocker/create-applocker-default-rules.md index d130fe7233..b5ec324e43 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/create-applocker-default-rules.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/create-applocker-default-rules.md @@ -3,14 +3,14 @@ title: Create AppLocker default rules (Windows) description: This topic for IT professionals describes the steps to create a standard set of AppLocker rules that will allow Windows system files to run. ms.assetid: 21e9dc68-a6f4-4ebe-ac28-4c66a7ab6e18 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/create-list-of-applications-deployed-to-each-business-group.md b/windows/security/threat-protection/windows-defender-application-control/applocker/create-list-of-applications-deployed-to-each-business-group.md index 4b22dedc36..fd7ef676ab 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/create-list-of-applications-deployed-to-each-business-group.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/create-list-of-applications-deployed-to-each-business-group.md @@ -3,14 +3,14 @@ title: Create a list of apps deployed to each business group (Windows) description: This topic describes the process of gathering app usage requirements from each business group to implement application control policies by using AppLocker. ms.assetid: d713aa07-d732-4bdc-8656-ba616d779321 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-policies.md b/windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-policies.md index 8a5e46aee1..e54769e466 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-policies.md @@ -3,14 +3,14 @@ title: Create Your AppLocker policies (Windows) description: This overview topic for the IT professional describes the steps to create an AppLocker policy and prepare it for deployment. ms.assetid: d339dee2-4da2-4d4a-b46e-f1dfb7cb4bf0 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-rules.md b/windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-rules.md index 8efbf0415b..40fd630f9e 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-rules.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-rules.md @@ -3,14 +3,14 @@ title: Create Your AppLocker rules (Windows) description: This topic for the IT professional describes what you need to know about AppLocker rules and the methods that you can to create rules. ms.assetid: b684a3a5-929c-4f70-8742-04088022f232 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/delete-an-applocker-rule.md b/windows/security/threat-protection/windows-defender-application-control/applocker/delete-an-applocker-rule.md index 6247e45693..93b5bfcce1 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/delete-an-applocker-rule.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/delete-an-applocker-rule.md @@ -3,14 +3,14 @@ title: Delete an AppLocker rule (Windows) description: This article for IT professionals describes the steps to delete an AppLocker rule. ms.assetid: 382b4be3-0df9-4308-89b2-dcf9df351eb5 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting.md b/windows/security/threat-protection/windows-defender-application-control/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting.md index fc69f58037..d110f3dbab 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting.md @@ -3,14 +3,14 @@ title: Deploy AppLocker policies by using the enforce rules setting (Windows) description: This topic for IT professionals describes the steps to deploy AppLocker policies by using the enforcement setting method. ms.assetid: fd3a3d25-ff3b-4060-8390-6262a90749ba ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/deploy-the-applocker-policy-into-production.md b/windows/security/threat-protection/windows-defender-application-control/applocker/deploy-the-applocker-policy-into-production.md index 3c3692819b..374248651d 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/deploy-the-applocker-policy-into-production.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/deploy-the-applocker-policy-into-production.md @@ -3,14 +3,14 @@ title: Deploy the AppLocker policy into production (Windows) description: This topic for the IT professional describes the tasks that should be completed before you deploy AppLocker application control settings. ms.assetid: ebbb1907-92dc-499e-8cee-8e637483c9ae ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/determine-group-policy-structure-and-rule-enforcement.md b/windows/security/threat-protection/windows-defender-application-control/applocker/determine-group-policy-structure-and-rule-enforcement.md index 13836e63df..f45c9348b4 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/determine-group-policy-structure-and-rule-enforcement.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/determine-group-policy-structure-and-rule-enforcement.md @@ -3,14 +3,14 @@ title: Determine the Group Policy structure and rule enforcement (Windows) description: This overview topic describes the process to follow when you're planning to deploy AppLocker rules. ms.assetid: f435fcbe-c7ac-4ef0-9702-729aab64163f ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer.md b/windows/security/threat-protection/windows-defender-application-control/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer.md index e8313de0e1..becadb7f0a 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer.md @@ -3,14 +3,14 @@ title: Find digitally signed apps on a reference device (Windows) description: This topic for the IT professional describes how to use AppLocker logs and tools to determine which applications are digitally signed. ms.assetid: 24609a6b-fdcb-4083-b234-73e23ff8bcb8 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/determine-your-application-control-objectives.md b/windows/security/threat-protection/windows-defender-application-control/applocker/determine-your-application-control-objectives.md index 1136c55fd2..ab778e7e27 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/determine-your-application-control-objectives.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/determine-your-application-control-objectives.md @@ -3,14 +3,14 @@ title: Determine your application control objectives (Windows) description: Determine which applications to control and how to control them by comparing Software Restriction Policies (SRP) and AppLocker. ms.assetid: 0e84003e-6095-46fb-8c4e-2065869bb53b ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application.md b/windows/security/threat-protection/windows-defender-application-control/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application.md index 542a15ced2..ed21869880 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application.md @@ -3,14 +3,14 @@ title: Display a custom URL message when users try to run a blocked app (Windows description: This topic for IT professionals describes the steps for displaying a customized message to users when an AppLocker policy denies access to an app. ms.assetid: 9a2534a5-d1fa-48a9-93c6-989d4857cf85 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.pagetype: security ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/dll-rules-in-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/dll-rules-in-applocker.md index 6921eeb8f7..87c6472d4b 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/dll-rules-in-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/dll-rules-in-applocker.md @@ -3,14 +3,14 @@ title: DLL rules in AppLocker (Windows) description: This topic describes the file formats and available default rules for the DLL rule collection. ms.assetid: a083fd08-c07e-4534-b0e7-1e15d932ce8f ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/document-group-policy-structure-and-applocker-rule-enforcement.md b/windows/security/threat-protection/windows-defender-application-control/applocker/document-group-policy-structure-and-applocker-rule-enforcement.md index 24d9b339a4..076ca5099e 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/document-group-policy-structure-and-applocker-rule-enforcement.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/document-group-policy-structure-and-applocker-rule-enforcement.md @@ -3,13 +3,13 @@ title: Document Group Policy structure & AppLocker rule enforcement (Windows) description: This planning topic describes what you need to investigate, determine, and record in your application control policies plan when you use AppLocker. ms.assetid: 389ffa8e-11fc-49ff-b0b1-89553e6fb6e5 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/document-your-application-list.md b/windows/security/threat-protection/windows-defender-application-control/applocker/document-your-application-list.md index 5f360731db..313d459533 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/document-your-application-list.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/document-your-application-list.md @@ -3,14 +3,14 @@ title: Document your app list (Windows) description: This planning topic describes the app information that you should document when you create a list of apps for AppLocker policies. ms.assetid: b155284b-f75d-4405-aecf-b74221622dc0 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/document-your-applocker-rules.md b/windows/security/threat-protection/windows-defender-application-control/applocker/document-your-applocker-rules.md index 151e00dc31..8108aba233 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/document-your-applocker-rules.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/document-your-applocker-rules.md @@ -3,14 +3,14 @@ title: Document your AppLocker rules (Windows) description: Learn how to document your AppLocker rules and associate rule conditions with files, permissions, rule source, and implementation. ms.assetid: 91a198ce-104a-45ff-b49b-487fb40cd2dd ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/edit-an-applocker-policy.md b/windows/security/threat-protection/windows-defender-application-control/applocker/edit-an-applocker-policy.md index d23ab33e4b..cbee3198d1 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/edit-an-applocker-policy.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/edit-an-applocker-policy.md @@ -3,14 +3,14 @@ title: Edit an AppLocker policy (Windows) description: This topic for IT professionals describes the steps required to modify an AppLocker policy. ms.assetid: dbc72d1f-3fe0-46c2-aeeb-96621fce7637 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/edit-applocker-rules.md b/windows/security/threat-protection/windows-defender-application-control/applocker/edit-applocker-rules.md index 742bb76aa9..012250699e 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/edit-applocker-rules.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/edit-applocker-rules.md @@ -3,14 +3,14 @@ title: Edit AppLocker rules (Windows) description: This topic for IT professionals describes the steps to edit a publisher rule, path rule, and file hash rule in AppLocker. ms.assetid: 80016cda-b915-46a0-83c6-5e6b0b958e32 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/enable-the-dll-rule-collection.md b/windows/security/threat-protection/windows-defender-application-control/applocker/enable-the-dll-rule-collection.md index 81877d328c..342ef58154 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/enable-the-dll-rule-collection.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/enable-the-dll-rule-collection.md @@ -3,14 +3,14 @@ title: Enable the DLL rule collection (Windows) description: This topic for IT professionals describes the steps to enable the DLL rule collection feature for AppLocker. ms.assetid: 88ef9561-6eb2-491a-803a-b8cdbfebae27 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/enforce-applocker-rules.md b/windows/security/threat-protection/windows-defender-application-control/applocker/enforce-applocker-rules.md index 67fa92f12c..2d5dcfa991 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/enforce-applocker-rules.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/enforce-applocker-rules.md @@ -3,14 +3,14 @@ title: Enforce AppLocker rules (Windows) description: This topic for IT professionals describes how to enforce application control rules by using AppLocker. ms.assetid: e1528b7b-77f2-4419-8e27-c9cc3721d96d ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/executable-rules-in-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/executable-rules-in-applocker.md index b8a51feeed..e693b917b0 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/executable-rules-in-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/executable-rules-in-applocker.md @@ -3,14 +3,14 @@ title: Executable rules in AppLocker (Windows) description: This topic describes the file formats and available default rules for the executable rule collection. ms.assetid: 65e62f90-6caa-48f8-836a-91f8ac9018ee ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-from-a-gpo.md b/windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-from-a-gpo.md index aa08b6fce3..1a8ecaf384 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-from-a-gpo.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-from-a-gpo.md @@ -3,14 +3,14 @@ title: Export an AppLocker policy from a GPO (Windows) description: This topic for IT professionals describes the steps to export an AppLocker policy from a Group Policy Object (GPO) so that it can be modified. ms.assetid: 7db59719-a8be-418b-bbfd-22cf2176c9c0 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-to-an-xml-file.md b/windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-to-an-xml-file.md index 25c099d3c3..b6f0fcba38 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-to-an-xml-file.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-to-an-xml-file.md @@ -3,14 +3,14 @@ title: Export an AppLocker policy to an XML file (Windows) description: This topic for IT professionals describes the steps to export an AppLocker policy to an XML file for review or testing. ms.assetid: 979bd23f-6815-478b-a6a4-a25239cb1080 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/how-applocker-works-techref.md b/windows/security/threat-protection/windows-defender-application-control/applocker/how-applocker-works-techref.md index bcccdec697..5852b201e6 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/how-applocker-works-techref.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/how-applocker-works-techref.md @@ -3,14 +3,14 @@ title: How AppLocker works (Windows) description: This topic for the IT professional provides links to topics about AppLocker architecture and components, processes and interactions, rules and policies. ms.assetid: 24bb1d73-0ff5-4af7-8b8a-2fa44d4ddbcd ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-from-another-computer.md b/windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-from-another-computer.md index 5901726822..afedd848c3 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-from-another-computer.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-from-another-computer.md @@ -3,14 +3,14 @@ title: Import an AppLocker policy from another computer (Windows) description: This topic for IT professionals describes how to import an AppLocker policy. ms.assetid: b48cb2b2-8ef8-4cc0-89bd-309d0b1832f6 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-into-a-gpo.md b/windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-into-a-gpo.md index 9853f4b41f..d215c84407 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-into-a-gpo.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-into-a-gpo.md @@ -3,14 +3,14 @@ title: Import an AppLocker policy into a GPO (Windows) description: This topic for IT professionals describes the steps to import an AppLocker policy into a Group Policy Object (GPO). ms.assetid: 0629ce44-f5e2-48a8-ba47-06544c73261f ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/maintain-applocker-policies.md b/windows/security/threat-protection/windows-defender-application-control/applocker/maintain-applocker-policies.md index 97c6d66e6c..2e3059c857 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/maintain-applocker-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/maintain-applocker-policies.md @@ -3,14 +3,14 @@ title: Maintain AppLocker policies (Windows) description: Learn how to maintain rules within AppLocker policies. View common AppLocker maintenance scenarios and see the methods to use to maintain AppLocker policies. ms.assetid: b4fbfdfe-ef3d-49e0-a390-f2dfe74602bc ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/manage-packaged-apps-with-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/manage-packaged-apps-with-applocker.md index 477f41380a..04206c6d54 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/manage-packaged-apps-with-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/manage-packaged-apps-with-applocker.md @@ -3,14 +3,14 @@ title: Manage packaged apps with AppLocker (Windows) description: Learn concepts and lists procedures to help you manage packaged apps with AppLocker as part of your overall application control strategy. ms.assetid: 6d0c99e7-0284-4547-a30a-0685a9916650 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-by-using-set-applockerpolicy.md b/windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-by-using-set-applockerpolicy.md index 6d553816d9..85cc225094 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-by-using-set-applockerpolicy.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-by-using-set-applockerpolicy.md @@ -3,14 +3,14 @@ title: Merge AppLocker policies by using Set-ApplockerPolicy (Windows) description: This topic for IT professionals describes the steps to merge AppLocker policies by using Windows PowerShell. ms.assetid: f1c7d5c0-463e-4fe2-a410-844a404f18d0 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-manually.md b/windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-manually.md index de6eab6cab..fd45a8a42c 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-manually.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-manually.md @@ -3,14 +3,14 @@ title: Merge AppLocker policies manually (Windows) description: This topic for IT professionals describes the steps to manually merge AppLocker policies to update the Group Policy Object (GPO). ms.assetid: 3605f293-e5f2-481d-8efd-775f9f23c30f ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/monitor-application-usage-with-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/monitor-application-usage-with-applocker.md index 2a7f113724..a9092f169c 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/monitor-application-usage-with-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/monitor-application-usage-with-applocker.md @@ -3,14 +3,14 @@ title: Monitor app usage with AppLocker (Windows) description: This topic for IT professionals describes how to monitor app usage when AppLocker policies are applied. ms.assetid: 0516da6e-ebe4-45b4-a97b-31daba96d1cf ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/optimize-applocker-performance.md b/windows/security/threat-protection/windows-defender-application-control/applocker/optimize-applocker-performance.md index e1bfa2e4a6..f481f86ce2 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/optimize-applocker-performance.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/optimize-applocker-performance.md @@ -3,14 +3,14 @@ title: Optimize AppLocker performance (Windows) description: This topic for IT professionals describes how to optimize AppLocker policy enforcement. ms.assetid: a20efa20-bc98-40fe-bd81-28ec4905e0f6 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker.md index 0ee1ed1988..25c01eb30d 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker.md @@ -3,14 +3,14 @@ title: Packaged apps and packaged app installer rules in AppLocker (Windows) description: This topic explains the AppLocker rule collection for packaged app installers and packaged apps. ms.assetid: 8fd44d08-a0c2-4c5b-a91f-5cb9989f971d ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/plan-for-applocker-policy-management.md b/windows/security/threat-protection/windows-defender-application-control/applocker/plan-for-applocker-policy-management.md index 65214802ff..3106e7eb8c 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/plan-for-applocker-policy-management.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/plan-for-applocker-policy-management.md @@ -3,14 +3,14 @@ title: Plan for AppLocker policy management (Windows) description: This topic describes the decisions you need to make to establish the processes for managing and maintaining AppLocker policies. ms.assetid: dccc196f-6ae0-4ae4-853a-a3312b18751b ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/refresh-an-applocker-policy.md b/windows/security/threat-protection/windows-defender-application-control/applocker/refresh-an-applocker-policy.md index 9d554232ef..a0be9442c5 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/refresh-an-applocker-policy.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/refresh-an-applocker-policy.md @@ -3,14 +3,14 @@ title: Refresh an AppLocker policy (Windows) description: This topic for IT professionals describes the steps to force an update for an AppLocker policy. ms.assetid: 3f24fcbc-3926-46b9-a1a2-dd036edab8a9 ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-for-deploying-applocker-policies.md b/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-for-deploying-applocker-policies.md index 4b22f44415..c3de7dcc3e 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-for-deploying-applocker-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-for-deploying-applocker-policies.md @@ -3,14 +3,14 @@ title: Requirements for deploying AppLocker policies (Windows) description: This deployment topic for the IT professional lists the requirements that you need to consider before you deploy AppLocker policies. ms.assetid: 3e55bda2-3cd7-42c7-bad3-c7dfbe193d48 ms.reviewer: -ms.author: macapara +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: mjcaparas -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-to-use-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-to-use-applocker.md index 023753c944..2053dc727e 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-to-use-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-to-use-applocker.md @@ -3,14 +3,14 @@ title: Requirements to use AppLocker (Windows) description: This topic for the IT professional lists software requirements to use AppLocker on the supported Windows operating systems. ms.assetid: dc380535-071e-4794-8f9d-e5d1858156f0 ms.reviewer: -ms.author: macapara +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: mjcaparas -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/run-the-automatically-generate-rules-wizard.md b/windows/security/threat-protection/windows-defender-application-control/applocker/run-the-automatically-generate-rules-wizard.md index 807313b37d..6fd6a3a17a 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/run-the-automatically-generate-rules-wizard.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/run-the-automatically-generate-rules-wizard.md @@ -3,14 +3,14 @@ title: Run the Automatically Generate Rules wizard (Windows) description: This topic for IT professionals describes steps to run the wizard to create AppLocker rules on a reference device. ms.assetid: 8cad1e14-d5b2-437c-8f88-70cffd7b3d8e ms.reviewer: -ms.author: macapara +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: mjcaparas -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/script-rules-in-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/script-rules-in-applocker.md index b7d7521a48..f73f481981 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/script-rules-in-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/script-rules-in-applocker.md @@ -3,14 +3,14 @@ title: Script rules in AppLocker (Windows) description: This article describes the file formats and available default rules for the script rule collection. ms.assetid: fee24ca4-935a-4c5e-8a92-8cf1d134d35f ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/security-considerations-for-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/security-considerations-for-applocker.md index 8aebe54030..4ac9ca4172 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/security-considerations-for-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/security-considerations-for-applocker.md @@ -3,14 +3,14 @@ title: Security considerations for AppLocker (Windows) description: This topic for the IT professional describes the security considerations you need to address when implementing AppLocker. ms.assetid: 354a5abb-7b31-4bea-a442-aa9666117625 ms.reviewer: -ms.author: macapara +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: mjcaparas -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/select-types-of-rules-to-create.md b/windows/security/threat-protection/windows-defender-application-control/applocker/select-types-of-rules-to-create.md index a8f29966da..93a5f15fbe 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/select-types-of-rules-to-create.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/select-types-of-rules-to-create.md @@ -3,14 +3,14 @@ title: Select the types of rules to create (Windows) description: This topic lists resources you can use when selecting your application control policy rules by using AppLocker. ms.assetid: 14751169-0ed1-47cc-822c-8c01a7477784 ms.reviewer: -ms.author: macapara +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: mjcaparas -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/test-an-applocker-policy-by-using-test-applockerpolicy.md b/windows/security/threat-protection/windows-defender-application-control/applocker/test-an-applocker-policy-by-using-test-applockerpolicy.md index af4f2f86cc..c253a8cd0d 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/test-an-applocker-policy-by-using-test-applockerpolicy.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/test-an-applocker-policy-by-using-test-applockerpolicy.md @@ -3,14 +3,14 @@ title: Test an AppLocker policy by using Test-AppLockerPolicy (Windows) description: This topic for IT professionals describes the steps to test an AppLocker policy prior to importing it into a Group Policy Object (GPO) or another computer. ms.assetid: 048bfa38-6825-4a9a-ab20-776cf79f402a ms.reviewer: -ms.author: macapara +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: mjcaparas -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/test-and-update-an-applocker-policy.md b/windows/security/threat-protection/windows-defender-application-control/applocker/test-and-update-an-applocker-policy.md index 7767e8d4db..20c8807049 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/test-and-update-an-applocker-policy.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/test-and-update-an-applocker-policy.md @@ -3,14 +3,14 @@ title: Test and update an AppLocker policy (Windows) description: This topic discusses the steps required to test an AppLocker policy prior to deployment. ms.assetid: 7d53cbef-078c-4d20-8b00-e821e33b6ea1 ms.reviewer: -ms.author: macapara +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: mjcaparas -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/tools-to-use-with-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/tools-to-use-with-applocker.md index fd88f08362..26aa252ce6 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/tools-to-use-with-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/tools-to-use-with-applocker.md @@ -3,14 +3,14 @@ title: Tools to use with AppLocker (Windows) description: This topic for the IT professional describes the tools available to create and administer AppLocker policies. ms.assetid: db2b7cb3-7643-4be5-84eb-46ba551e1ad1 ms.reviewer: -ms.author: macapara +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: mjcaparas -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-enforcement-settings.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-enforcement-settings.md index 005c1ddcc2..34a4113aa1 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-enforcement-settings.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-enforcement-settings.md @@ -3,14 +3,14 @@ title: Understand AppLocker enforcement settings (Windows) description: This topic describes the AppLocker enforcement settings for rule collections. ms.assetid: 48773007-a343-40bf-8961-b3ff0a450d7e ms.reviewer: -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-policy-design-decisions.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-policy-design-decisions.md index fb22ebb52e..b9bd16f418 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-policy-design-decisions.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-policy-design-decisions.md @@ -3,14 +3,14 @@ title: Understand AppLocker policy design decisions (Windows) description: Review some common considerations while you're planning to use AppLocker to deploy application control policies within a Windows environment. ms.assetid: 3475def8-949a-4b51-b480-dc88b5c1e6e6 ms.reviewer: -ms.author: macapara +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: mjcaparas -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md index e7a565430e..3604d9fa73 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md @@ -3,14 +3,14 @@ title: Understand AppLocker rules and enforcement setting inheritance in Group P description: This topic for the IT professional describes how application control policies configured in AppLocker are applied through Group Policy. ms.assetid: c1c5a3d3-540a-4698-83b5-0dab5d27d871 ms.reviewer: -ms.author: macapara +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: mjcaparas -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understand-the-applocker-policy-deployment-process.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understand-the-applocker-policy-deployment-process.md index b0c0834967..2f4ad091be 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understand-the-applocker-policy-deployment-process.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understand-the-applocker-policy-deployment-process.md @@ -3,14 +3,14 @@ title: Understand the AppLocker policy deployment process (Windows) description: This planning and deployment topic for the IT professional describes the process for using AppLocker when deploying application control policies. ms.assetid: 4cfd95c1-fbd3-41fa-8efc-d23c1ea6fb16 ms.reviewer: -ms.author: macapara +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: mjcaparas -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-allow-and-deny-actions-on-rules.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-allow-and-deny-actions-on-rules.md index 3fe3cbccdc..8cb3dbb534 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-allow-and-deny-actions-on-rules.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-allow-and-deny-actions-on-rules.md @@ -3,14 +3,14 @@ title: Understanding AppLocker allow and deny actions on rules (Windows) description: This topic explains the differences between allow and deny actions on AppLocker rules. ms.assetid: ea0370fa-2086-46b5-a0a4-4a7ead8cbed9 ms.reviewer: -ms.author: macapara +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: mjcaparas -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-default-rules.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-default-rules.md index 8c640a6c94..ba9d28442d 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-default-rules.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-default-rules.md @@ -3,14 +3,14 @@ title: Understanding AppLocker default rules (Windows) description: This topic for IT professional describes the set of rules that can be used to ensure that required Windows system files are allowed to run when the policy is applied. ms.assetid: bdb03d71-05b7-41fb-96e3-a289ce1866e1 ms.reviewer: -ms.author: macapara +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: mjcaparas -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-behavior.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-behavior.md index 5afe6be646..9aa30d5871 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-behavior.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-behavior.md @@ -3,14 +3,14 @@ title: Understanding AppLocker rule behavior (Windows) description: This topic describes how AppLocker rules are enforced by using the allow and deny options in AppLocker. ms.assetid: 3e2738a3-8041-4095-8a84-45c1894c97d0 ms.reviewer: -ms.author: macapara +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: mjcaparas -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-collections.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-collections.md index 23dd648c32..41c8ce1282 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-collections.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-collections.md @@ -3,14 +3,14 @@ title: Understanding AppLocker rule collections (Windows) description: This topic explains the five different types of AppLocker rules used to enforce AppLocker policies. ms.assetid: 03c05466-4fb3-4880-8d3c-0f6f59fc5579 ms.reviewer: -ms.author: macapara +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: mjcaparas -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-condition-types.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-condition-types.md index b56ba6c88d..f6ad12a085 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-condition-types.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-condition-types.md @@ -3,14 +3,14 @@ title: Understanding AppLocker rule condition types (Windows) description: This topic for the IT professional describes the three types of AppLocker rule conditions. ms.assetid: c21af67f-60a1-4f7d-952c-a6f769c74729 ms.reviewer: -ms.author: macapara +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: mjcaparas -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-exceptions.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-exceptions.md index d4eab6bcf6..08ec6175fd 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-exceptions.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-exceptions.md @@ -3,14 +3,14 @@ title: Understanding AppLocker rule exceptions (Windows) description: This topic describes the result of applying AppLocker rule exceptions to rule collections. ms.assetid: e6bb349f-ee60-4c8d-91cd-6442f2d0eb9c ms.reviewer: -ms.author: macapara +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: mjcaparas -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-file-hash-rule-condition-in-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-file-hash-rule-condition-in-applocker.md index 9e63783239..309413ceee 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-file-hash-rule-condition-in-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-file-hash-rule-condition-in-applocker.md @@ -3,14 +3,14 @@ title: Understanding the file hash rule condition in AppLocker (Windows) description: This topic explains the AppLocker file hash rule condition, the advantages and disadvantages, and how it's applied. ms.assetid: 4c6d9af4-2b1a-40f4-8758-1a6f9f147756 ms.reviewer: -ms.author: macapara +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: mjcaparas -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-path-rule-condition-in-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-path-rule-condition-in-applocker.md index e47540ebc1..12c2b4fe3a 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-path-rule-condition-in-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-path-rule-condition-in-applocker.md @@ -3,14 +3,14 @@ title: Understanding the path rule condition in AppLocker (Windows) description: This topic explains the AppLocker path rule condition, the advantages and disadvantages, and how it's applied. ms.assetid: 3fa54ded-4466-4f72-bea4-2612031cad43 ms.reviewer: -ms.author: macapara +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: mjcaparas -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-publisher-rule-condition-in-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-publisher-rule-condition-in-applocker.md index 22ab048b3b..a9ded601fa 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-publisher-rule-condition-in-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-publisher-rule-condition-in-applocker.md @@ -3,14 +3,14 @@ title: Understanding the publisher rule condition in AppLocker (Windows) description: This topic explains the AppLocker publisher rule condition, what controls are available, and how it's applied. ms.assetid: df61ed8f-a97e-4644-9d0a-2169f18c1c4f ms.reviewer: -ms.author: macapara +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: mjcaparas -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies.md b/windows/security/threat-protection/windows-defender-application-control/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies.md index a5ef9054dc..0c36d76a1f 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies.md @@ -2,14 +2,14 @@ title: Use a reference device to create and maintain AppLocker policies (Windows) description: This topic for the IT professional describes the steps to create and maintain AppLocker policies by using a reference computer. ms.assetid: 10c3597f-f44c-4c8e-8fe5-105d4ac016a6 -ms.author: macapara +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: mjcaparas -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain.md b/windows/security/threat-protection/windows-defender-application-control/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain.md index 37a691a28f..33fd27fc50 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain.md @@ -3,14 +3,14 @@ title: Use AppLocker and Software Restriction Policies in the same domain (Windo description: This topic for IT professionals describes concepts and procedures to help you manage your application control strategy using Software Restriction Policies and AppLocker. ms.assetid: 2b7e0cec-df62-49d6-a2b7-6b8e30180943 ms.reviewer: -ms.author: macapara +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: mjcaparas -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/use-the-applocker-windows-powershell-cmdlets.md b/windows/security/threat-protection/windows-defender-application-control/applocker/use-the-applocker-windows-powershell-cmdlets.md index 2751109b02..89de902770 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/use-the-applocker-windows-powershell-cmdlets.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/use-the-applocker-windows-powershell-cmdlets.md @@ -3,14 +3,14 @@ title: Use the AppLocker Windows PowerShell cmdlets (Windows) description: This topic for IT professionals describes how each AppLocker Windows PowerShell cmdlet can help you administer your AppLocker application control policies. ms.assetid: 374e029c-5c0a-44ab-a57a-2a9dd17dc57d ms.reviewer: -ms.author: macapara +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: mjcaparas -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/using-event-viewer-with-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/using-event-viewer-with-applocker.md index 59111cd93d..19458879ae 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/using-event-viewer-with-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/using-event-viewer-with-applocker.md @@ -3,14 +3,14 @@ title: Using Event Viewer with AppLocker (Windows) description: This topic lists AppLocker events and describes how to use Event Viewer with AppLocker. ms.assetid: 109abb10-78b1-4c29-a576-e5a17dfeb916 ms.reviewer: -ms.author: macapara +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: mjcaparas -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/using-software-restriction-policies-and-applocker-policies.md b/windows/security/threat-protection/windows-defender-application-control/applocker/using-software-restriction-policies-and-applocker-policies.md index 96c1644d3a..e066f48a28 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/using-software-restriction-policies-and-applocker-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/using-software-restriction-policies-and-applocker-policies.md @@ -3,14 +3,14 @@ title: Use Software Restriction Policies and AppLocker policies (Windows) description: This topic for the IT professional describes how to use Software Restriction Policies (SRP) and AppLocker policies in the same Windows deployment. ms.assetid: c3366be7-e632-4add-bd10-9df088f74c6d ms.reviewer: -ms.author: macapara +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: mjcaparas -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/what-is-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/what-is-applocker.md index dc46fa241d..32770dbace 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/what-is-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/what-is-applocker.md @@ -3,14 +3,14 @@ title: What Is AppLocker (Windows) description: This topic for the IT professional describes what AppLocker is and how its features differ from Software Restriction Policies. ms.assetid: 44a8a2bb-0f83-4f95-828e-1f364fb65869 ms.reviewer: -ms.author: macapara +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: mjcaparas -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/windows-installer-rules-in-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/windows-installer-rules-in-applocker.md index fcc0f3b253..38655935cf 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/windows-installer-rules-in-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/windows-installer-rules-in-applocker.md @@ -3,14 +3,14 @@ title: Windows Installer rules in AppLocker (Windows) description: This topic describes the file formats and available default rules for the Windows Installer rule collection. ms.assetid: 3fecde5b-88b3-4040-81fa-a2d36d052ec9 ms.reviewer: -ms.author: macapara +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: mjcaparas -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/working-with-applocker-policies.md b/windows/security/threat-protection/windows-defender-application-control/applocker/working-with-applocker-policies.md index 211cdb2e62..79ed0dd7e7 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/working-with-applocker-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/working-with-applocker-policies.md @@ -3,14 +3,14 @@ title: Working with AppLocker policies (Windows) description: This topic for IT professionals provides links to procedural topics about creating, maintaining, and testing AppLocker policies. ms.assetid: 7062d2e0-9cbb-4cb8-aa8c-b24945c3771d ms.reviewer: -ms.author: macapara +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: mjcaparas -manager: dansimp +author: vinaypamnani-msft +manager: aaroncz audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/working-with-applocker-rules.md b/windows/security/threat-protection/windows-defender-application-control/applocker/working-with-applocker-rules.md index 4ad45cf9e0..d7a8d5162f 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/working-with-applocker-rules.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/working-with-applocker-rules.md @@ -3,13 +3,13 @@ title: Working with AppLocker rules (Windows) description: This topic for IT professionals describes AppLocker rule types and how to work with them for your application control policies. ms.assetid: 3966b35b-f2da-4371-8b5f-aec031db6bc9 ms.reviewer: -manager: dansimp -ms.author: macapara +manager: aaroncz +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: dansimp +author: vinaypamnani-msft ms.localizationpriority: medium msauthor: v-anbic ms.date: 08/27/2018 diff --git a/windows/security/threat-protection/windows-defender-application-control/audit-and-enforce-windows-defender-application-control-policies.md b/windows/security/threat-protection/windows-defender-application-control/audit-and-enforce-windows-defender-application-control-policies.md index cc3b1b631b..4e2278d047 100644 --- a/windows/security/threat-protection/windows-defender-application-control/audit-and-enforce-windows-defender-application-control-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/audit-and-enforce-windows-defender-application-control-policies.md @@ -12,8 +12,8 @@ audience: ITPro ms.collection: M365-security-compliance author: jsuther1974 ms.reviewer: jogeurte -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.date: 05/03/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-application-control/audit-windows-defender-application-control-policies.md b/windows/security/threat-protection/windows-defender-application-control/audit-windows-defender-application-control-policies.md index ca600a98a7..5af247add0 100644 --- a/windows/security/threat-protection/windows-defender-application-control/audit-windows-defender-application-control-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/audit-windows-defender-application-control-policies.md @@ -12,8 +12,8 @@ audience: ITPro ms.collection: M365-security-compliance author: jsuther1974 ms.reviewer: jogeurte -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.date: 05/03/2018 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-application-control/configure-authorized-apps-deployed-with-a-managed-installer.md b/windows/security/threat-protection/windows-defender-application-control/configure-authorized-apps-deployed-with-a-managed-installer.md index cb5391c9a3..01ab300700 100644 --- a/windows/security/threat-protection/windows-defender-application-control/configure-authorized-apps-deployed-with-a-managed-installer.md +++ b/windows/security/threat-protection/windows-defender-application-control/configure-authorized-apps-deployed-with-a-managed-installer.md @@ -12,8 +12,8 @@ audience: ITPro ms.collection: M365-security-compliance author: jsuther1974 ms.reviewer: jogeurte -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.date: 08/26/2022 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-application-control/configure-wdac-managed-installer.md b/windows/security/threat-protection/windows-defender-application-control/configure-wdac-managed-installer.md index 63d3ee3fe4..f3f83d27d4 100644 --- a/windows/security/threat-protection/windows-defender-application-control/configure-wdac-managed-installer.md +++ b/windows/security/threat-protection/windows-defender-application-control/configure-wdac-managed-installer.md @@ -12,8 +12,8 @@ audience: ITPro ms.collection: M365-security-compliance author: jsuther1974 ms.reviewer: isbrahm -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.date: 08/14/2020 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-application-control/create-code-signing-cert-for-windows-defender-application-control.md b/windows/security/threat-protection/windows-defender-application-control/create-code-signing-cert-for-windows-defender-application-control.md index 024c53413c..4e4f1658bb 100644 --- a/windows/security/threat-protection/windows-defender-application-control/create-code-signing-cert-for-windows-defender-application-control.md +++ b/windows/security/threat-protection/windows-defender-application-control/create-code-signing-cert-for-windows-defender-application-control.md @@ -12,8 +12,8 @@ audience: ITPro ms.collection: M365-security-compliance author: jsuther1974 ms.reviewer: isbrahm -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.date: 02/28/2018 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-application-control/create-initial-default-policy.md b/windows/security/threat-protection/windows-defender-application-control/create-initial-default-policy.md index f9b070ff3b..eefa0fddb5 100644 --- a/windows/security/threat-protection/windows-defender-application-control/create-initial-default-policy.md +++ b/windows/security/threat-protection/windows-defender-application-control/create-initial-default-policy.md @@ -12,8 +12,8 @@ audience: ITPro ms.collection: M365-security-compliance author: jsuther1974 ms.reviewer: jogeurte -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.date: 08/08/2022 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-application-control/create-wdac-deny-policy.md b/windows/security/threat-protection/windows-defender-application-control/create-wdac-deny-policy.md index b81414e10f..914f3e69f5 100644 --- a/windows/security/threat-protection/windows-defender-application-control/create-wdac-deny-policy.md +++ b/windows/security/threat-protection/windows-defender-application-control/create-wdac-deny-policy.md @@ -12,8 +12,8 @@ audience: ITPro ms.collection: M365-security-compliance author: jgeurten ms.reviewer: jsuther1974 -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-application-control/create-wdac-policy-for-fully-managed-devices.md b/windows/security/threat-protection/windows-defender-application-control/create-wdac-policy-for-fully-managed-devices.md index baee8a7e94..9871b7cbf5 100644 --- a/windows/security/threat-protection/windows-defender-application-control/create-wdac-policy-for-fully-managed-devices.md +++ b/windows/security/threat-protection/windows-defender-application-control/create-wdac-policy-for-fully-managed-devices.md @@ -13,8 +13,8 @@ audience: ITPro ms.collection: M365-security-compliance author: jsuther1974 ms.reviewer: isbrahm -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.date: 11/20/2019 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-application-control/deploy-catalog-files-to-support-windows-defender-application-control.md b/windows/security/threat-protection/windows-defender-application-control/deploy-catalog-files-to-support-windows-defender-application-control.md index cfea5dc30f..f6314a8424 100644 --- a/windows/security/threat-protection/windows-defender-application-control/deploy-catalog-files-to-support-windows-defender-application-control.md +++ b/windows/security/threat-protection/windows-defender-application-control/deploy-catalog-files-to-support-windows-defender-application-control.md @@ -12,8 +12,8 @@ audience: ITPro ms.collection: M365-security-compliance author: jsuther1974 ms.reviewer: jgeurten -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.date: 02/28/2018 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies.md b/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies.md index b3cffd3fb8..d4dc55b27e 100644 --- a/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies.md @@ -12,8 +12,8 @@ audience: ITPro ms.collection: M365-security-compliance author: jsuther1974 ms.reviewer: jogeurte -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.date: 07/19/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-application-control/deployment/deploy-wdac-policies-with-memcm.md b/windows/security/threat-protection/windows-defender-application-control/deployment/deploy-wdac-policies-with-memcm.md index 287aba1869..feb0895f8a 100644 --- a/windows/security/threat-protection/windows-defender-application-control/deployment/deploy-wdac-policies-with-memcm.md +++ b/windows/security/threat-protection/windows-defender-application-control/deployment/deploy-wdac-policies-with-memcm.md @@ -7,7 +7,7 @@ ms.collection: M365-security-compliance author: jgeurten ms.reviewer: aaroncz ms.author: jogeurte -manager: jsuther +manager: aaroncz ms.date: 06/27/2022 ms.topic: how-to ms.localizationpriority: medium diff --git a/windows/security/threat-protection/windows-defender-application-control/deployment/deploy-wdac-policies-with-script.md b/windows/security/threat-protection/windows-defender-application-control/deployment/deploy-wdac-policies-with-script.md index 28a74c5e9f..aa1ac5a9ad 100644 --- a/windows/security/threat-protection/windows-defender-application-control/deployment/deploy-wdac-policies-with-script.md +++ b/windows/security/threat-protection/windows-defender-application-control/deployment/deploy-wdac-policies-with-script.md @@ -9,7 +9,7 @@ author: jsuther1974 ms.reviewer: jogeurte ms.author: jogeurte ms.manager: jsuther -manager: dansimp +manager: aaroncz ms.date: 03/08/2022 ms.technology: windows-sec ms.topic: article diff --git a/windows/security/threat-protection/windows-defender-application-control/deployment/deploy-windows-defender-application-control-policies-using-group-policy.md b/windows/security/threat-protection/windows-defender-application-control/deployment/deploy-windows-defender-application-control-policies-using-group-policy.md index 5fd44350ee..bd7dcfac4f 100644 --- a/windows/security/threat-protection/windows-defender-application-control/deployment/deploy-windows-defender-application-control-policies-using-group-policy.md +++ b/windows/security/threat-protection/windows-defender-application-control/deployment/deploy-windows-defender-application-control-policies-using-group-policy.md @@ -12,8 +12,8 @@ audience: ITPro ms.collection: M365-security-compliance author: jsuther1974 ms.reviewer: jogeurte -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.date: 06/27/2022 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-application-control/disable-windows-defender-application-control-policies.md b/windows/security/threat-protection/windows-defender-application-control/disable-windows-defender-application-control-policies.md index 0c7726f27d..fc09a71c05 100644 --- a/windows/security/threat-protection/windows-defender-application-control/disable-windows-defender-application-control-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/disable-windows-defender-application-control-policies.md @@ -12,8 +12,8 @@ audience: ITPro ms.collection: M365-security-compliance author: jsuther1974 ms.reviewer: isbrahm -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.date: 05/03/2018 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-application-control/enforce-windows-defender-application-control-policies.md b/windows/security/threat-protection/windows-defender-application-control/enforce-windows-defender-application-control-policies.md index 1628e2a60c..da83fa7b8e 100644 --- a/windows/security/threat-protection/windows-defender-application-control/enforce-windows-defender-application-control-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/enforce-windows-defender-application-control-policies.md @@ -9,7 +9,7 @@ author: jsuther1974 ms.reviewer: jogeurte ms.author: jogeurte ms.manager: jsuther -manager: dansimp +manager: aaroncz ms.date: 04/22/2021 ms.technology: windows-sec ms.topic: article diff --git a/windows/security/threat-protection/windows-defender-application-control/event-id-explanations.md b/windows/security/threat-protection/windows-defender-application-control/event-id-explanations.md index ef245ab5bf..f4a34af223 100644 --- a/windows/security/threat-protection/windows-defender-application-control/event-id-explanations.md +++ b/windows/security/threat-protection/windows-defender-application-control/event-id-explanations.md @@ -7,8 +7,8 @@ ms.localizationpriority: medium ms.collection: M365-security-compliance author: jsuther1974 ms.reviewer: jogeurte -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.date: 06/27/2022 ms.topic: reference --- diff --git a/windows/security/threat-protection/windows-defender-application-control/event-tag-explanations.md b/windows/security/threat-protection/windows-defender-application-control/event-tag-explanations.md index c20f083f00..c14d69350c 100644 --- a/windows/security/threat-protection/windows-defender-application-control/event-tag-explanations.md +++ b/windows/security/threat-protection/windows-defender-application-control/event-tag-explanations.md @@ -12,8 +12,8 @@ audience: ITPro ms.collection: M365-security-compliance author: jsuther1974 ms.reviewer: isbrahm -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.date: 07/13/2021 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-application-control/example-wdac-base-policies.md b/windows/security/threat-protection/windows-defender-application-control/example-wdac-base-policies.md index cd504ed4ee..f5d4aaa3cd 100644 --- a/windows/security/threat-protection/windows-defender-application-control/example-wdac-base-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/example-wdac-base-policies.md @@ -13,8 +13,8 @@ audience: ITPro ms.collection: M365-security-compliance author: jsuther1974 ms.reviewer: jogeurte -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.date: 08/05/2022 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-application-control/feature-availability.md b/windows/security/threat-protection/windows-defender-application-control/feature-availability.md index 751028a760..06470901cd 100644 --- a/windows/security/threat-protection/windows-defender-application-control/feature-availability.md +++ b/windows/security/threat-protection/windows-defender-application-control/feature-availability.md @@ -1,5 +1,5 @@ --- -title: Windows Defender Application Control feature availability +title: Windows Defender Application Control feature availability description: Compare Windows Defender Application Control (WDAC) and AppLocker feature availability. ms.prod: m365-security ms.technology: windows-sec @@ -8,7 +8,7 @@ ms.collection: M365-security-compliance author: jgeurten ms.reviewer: aaroncz ms.author: jogeurte -manager: jsuther +manager: aaroncz ms.date: 06/27/2022 ms.custom: asr ms.topic: overview diff --git a/windows/security/threat-protection/windows-defender-application-control/manage-packaged-apps-with-windows-defender-application-control.md b/windows/security/threat-protection/windows-defender-application-control/manage-packaged-apps-with-windows-defender-application-control.md index c309371277..72d6dc93df 100644 --- a/windows/security/threat-protection/windows-defender-application-control/manage-packaged-apps-with-windows-defender-application-control.md +++ b/windows/security/threat-protection/windows-defender-application-control/manage-packaged-apps-with-windows-defender-application-control.md @@ -12,8 +12,8 @@ audience: ITPro ms.collection: M365-security-compliance author: jsuther1974 ms.reviewer: isbrahm -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.date: 05/29/2020 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-application-control/merge-windows-defender-application-control-policies.md b/windows/security/threat-protection/windows-defender-application-control/merge-windows-defender-application-control-policies.md index 3c6789e089..f31db0823f 100644 --- a/windows/security/threat-protection/windows-defender-application-control/merge-windows-defender-application-control-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/merge-windows-defender-application-control-policies.md @@ -1,6 +1,6 @@ --- title: Merge Windows Defender Application Control policies (WDAC) (Windows) -description: Learn how to merge WDAC policies as part of your policy lifecycle management. +description: Learn how to merge WDAC policies as part of your policy lifecycle management. keywords: security, malware ms.prod: m365-security audience: ITPro @@ -9,7 +9,7 @@ author: jsuther1974 ms.reviewer: jogeurte ms.author: jogeurte ms.manager: jsuther -manager: dansimp +manager: aaroncz ms.date: 04/22/2021 ms.technology: windows-sec ms.topic: article diff --git a/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules.md b/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules.md index 6382926723..570d88a692 100644 --- a/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules.md +++ b/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules.md @@ -1,7 +1,7 @@ --- title: Microsoft recommended driver block rules (Windows) description: View a list of recommended block rules to block vulnerable third-party drivers discovered by Microsoft and the security research community. -keywords: security, malware, kernel mode, driver +keywords: security, malware, kernel mode, driver ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.prod: m365-security ms.mktglfcycl: deploy @@ -12,8 +12,8 @@ audience: ITPro ms.collection: M365-security-compliance author: jgeurten ms.reviewer: isbrahm -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz --- # Microsoft recommended driver block rules diff --git a/windows/security/threat-protection/windows-defender-application-control/operations/known-issues.md b/windows/security/threat-protection/windows-defender-application-control/operations/known-issues.md index dfddeebe3f..51b8d2f3a5 100644 --- a/windows/security/threat-protection/windows-defender-application-control/operations/known-issues.md +++ b/windows/security/threat-protection/windows-defender-application-control/operations/known-issues.md @@ -9,7 +9,7 @@ author: jsuther1974 ms.reviewer: jogeurte ms.author: jogeurte ms.manager: jsuther -manager: dansimp +manager: aaroncz ms.date: 07/01/2022 ms.technology: windows-sec ms.topic: article diff --git a/windows/security/threat-protection/windows-defender-application-control/plan-windows-defender-application-control-management.md b/windows/security/threat-protection/windows-defender-application-control/plan-windows-defender-application-control-management.md index 6691993b1b..2d2b9d73a8 100644 --- a/windows/security/threat-protection/windows-defender-application-control/plan-windows-defender-application-control-management.md +++ b/windows/security/threat-protection/windows-defender-application-control/plan-windows-defender-application-control-management.md @@ -12,8 +12,8 @@ audience: ITPro ms.collection: M365-security-compliance author: jsuther1974 ms.reviewer: isbrahm -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.date: 02/21/2018 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-application-control/querying-application-control-events-centrally-using-advanced-hunting.md b/windows/security/threat-protection/windows-defender-application-control/querying-application-control-events-centrally-using-advanced-hunting.md index fcf1dd7a24..8111aec72f 100644 --- a/windows/security/threat-protection/windows-defender-application-control/querying-application-control-events-centrally-using-advanced-hunting.md +++ b/windows/security/threat-protection/windows-defender-application-control/querying-application-control-events-centrally-using-advanced-hunting.md @@ -12,8 +12,8 @@ audience: ITPro ms.collection: M365-security-compliance author: jsuther1974 ms.reviewer: isbrahm -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.date: 03/01/2022 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md b/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md index 45ffe31061..dc1754d95c 100644 --- a/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md +++ b/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md @@ -12,8 +12,8 @@ audience: ITPro ms.collection: M365-security-compliance author: jgeurten ms.reviewer: jsuther1974 -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.date: 08/29/2022 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-application-control/types-of-devices.md b/windows/security/threat-protection/windows-defender-application-control/types-of-devices.md index 287c4058d0..7cb6570d5a 100644 --- a/windows/security/threat-protection/windows-defender-application-control/types-of-devices.md +++ b/windows/security/threat-protection/windows-defender-application-control/types-of-devices.md @@ -12,8 +12,8 @@ audience: ITPro ms.collection: M365-security-compliance author: jsuther1974 ms.reviewer: isbrahm -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.date: 03/01/2018 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-application-control/understand-windows-defender-application-control-policy-design-decisions.md b/windows/security/threat-protection/windows-defender-application-control/understand-windows-defender-application-control-policy-design-decisions.md index 406209261e..c58a7cb649 100644 --- a/windows/security/threat-protection/windows-defender-application-control/understand-windows-defender-application-control-policy-design-decisions.md +++ b/windows/security/threat-protection/windows-defender-application-control/understand-windows-defender-application-control-policy-design-decisions.md @@ -3,7 +3,7 @@ title: Understand Windows Defender Application Control policy design decisions description: Understand Windows Defender Application Control policy design decisions. keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb -manager: dansimp +manager: aaroncz ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library @@ -13,7 +13,7 @@ audience: ITPro ms.collection: M365-security-compliance author: jsuther1974 ms.reviewer: isbrahm -ms.author: dansimp +ms.author: vinpa ms.date: 02/08/2018 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-application-control/use-code-signing-to-simplify-application-control-for-classic-windows-applications.md b/windows/security/threat-protection/windows-defender-application-control/use-code-signing-to-simplify-application-control-for-classic-windows-applications.md index b84336abab..f708b2ccfb 100644 --- a/windows/security/threat-protection/windows-defender-application-control/use-code-signing-to-simplify-application-control-for-classic-windows-applications.md +++ b/windows/security/threat-protection/windows-defender-application-control/use-code-signing-to-simplify-application-control-for-classic-windows-applications.md @@ -12,8 +12,8 @@ audience: ITPro ms.collection: M365-security-compliance author: jsuther1974 ms.reviewer: isbrahm -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.date: 05/03/2018 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-application-control/use-device-guard-signing-portal-in-microsoft-store-for-business.md b/windows/security/threat-protection/windows-defender-application-control/use-device-guard-signing-portal-in-microsoft-store-for-business.md index 5956abbc56..ba4c665c5b 100644 --- a/windows/security/threat-protection/windows-defender-application-control/use-device-guard-signing-portal-in-microsoft-store-for-business.md +++ b/windows/security/threat-protection/windows-defender-application-control/use-device-guard-signing-portal-in-microsoft-store-for-business.md @@ -3,7 +3,7 @@ title: Use the Device Guard Signing Portal in the Microsoft Store for Business description: You can sign code integrity policies with the Device Guard signing portal to prevent them from being tampered with after they're deployed. keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb -ms.author: dansimp +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library @@ -13,7 +13,7 @@ audience: ITPro ms.collection: M365-security-compliance author: jsuther1974 ms.reviewer: isbrahm -manager: dansimp +manager: aaroncz ms.date: 02/19/2019 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-application-control/use-signed-policies-to-protect-windows-defender-application-control-against-tampering.md b/windows/security/threat-protection/windows-defender-application-control/use-signed-policies-to-protect-windows-defender-application-control-against-tampering.md index 07f86d0c75..bf52be862f 100644 --- a/windows/security/threat-protection/windows-defender-application-control/use-signed-policies-to-protect-windows-defender-application-control-against-tampering.md +++ b/windows/security/threat-protection/windows-defender-application-control/use-signed-policies-to-protect-windows-defender-application-control-against-tampering.md @@ -12,8 +12,8 @@ audience: ITPro ms.collection: M365-security-compliance author: jsuther1974 ms.reviewer: jogeurte -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.date: 08/15/2022 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-policy-to-control-specific-plug-ins-add-ins-and-modules.md b/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-policy-to-control-specific-plug-ins-add-ins-and-modules.md index b3e830a04b..89d432372f 100644 --- a/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-policy-to-control-specific-plug-ins-add-ins-and-modules.md +++ b/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-policy-to-control-specific-plug-ins-add-ins-and-modules.md @@ -3,8 +3,8 @@ title: Use a Windows Defender Application Control policy to control specific plu description: WDAC policies can be used not only to control applications, but also to control whether specific plug-ins, add-ins, and modules can run from specific apps. keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-dynamic-code-security.md b/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-dynamic-code-security.md index 4256d0a041..5d5f0d73f7 100644 --- a/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-dynamic-code-security.md +++ b/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-dynamic-code-security.md @@ -12,8 +12,8 @@ audience: ITPro ms.collection: M365-security-compliance author: jsuther1974 ms.reviewer: jogeurte -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.date: 08/10/2022 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-intelligent-security-graph.md b/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-intelligent-security-graph.md index e430a2a554..8dc6b58351 100644 --- a/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-intelligent-security-graph.md +++ b/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-intelligent-security-graph.md @@ -12,8 +12,8 @@ audience: ITPro ms.collection: M365-security-compliance author: jsuther1974 ms.reviewer: isbrahm -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-application-control/wdac-and-applocker-overview.md b/windows/security/threat-protection/windows-defender-application-control/wdac-and-applocker-overview.md index 696ab59fea..46065ed6cb 100644 --- a/windows/security/threat-protection/windows-defender-application-control/wdac-and-applocker-overview.md +++ b/windows/security/threat-protection/windows-defender-application-control/wdac-and-applocker-overview.md @@ -10,10 +10,10 @@ ms.pagetype: security ms.localizationpriority: medium audience: ITPro ms.collection: M365-security-compliance -author: denisebmsft +author: vinaypamnani-msft ms.reviewer: isbrahm -ms.author: deniseb -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.date: 09/30/2020 ms.custom: asr ms.technology: windows-sec diff --git a/windows/security/threat-protection/windows-defender-application-control/wdac-wizard-create-base-policy.md b/windows/security/threat-protection/windows-defender-application-control/wdac-wizard-create-base-policy.md index e1353dfcf7..df2a6bc8c3 100644 --- a/windows/security/threat-protection/windows-defender-application-control/wdac-wizard-create-base-policy.md +++ b/windows/security/threat-protection/windows-defender-application-control/wdac-wizard-create-base-policy.md @@ -12,8 +12,8 @@ audience: ITPro ms.collection: M365-security-compliance author: jgeurten ms.reviewer: isbrahm -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.topic: conceptual ms.date: 10/14/2020 ms.technology: windows-sec diff --git a/windows/security/threat-protection/windows-defender-application-control/wdac-wizard-create-supplemental-policy.md b/windows/security/threat-protection/windows-defender-application-control/wdac-wizard-create-supplemental-policy.md index 65a4c8ef77..7cac9d5ed3 100644 --- a/windows/security/threat-protection/windows-defender-application-control/wdac-wizard-create-supplemental-policy.md +++ b/windows/security/threat-protection/windows-defender-application-control/wdac-wizard-create-supplemental-policy.md @@ -12,8 +12,8 @@ audience: ITPro ms.collection: M365-security-compliance author: jgeurten ms.reviewer: isbrahm -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.topic: conceptual ms.date: 10/14/2020 ms.technology: windows-sec diff --git a/windows/security/threat-protection/windows-defender-application-control/wdac-wizard-editing-policy.md b/windows/security/threat-protection/windows-defender-application-control/wdac-wizard-editing-policy.md index 5a109b3b15..3bbfc39b1c 100644 --- a/windows/security/threat-protection/windows-defender-application-control/wdac-wizard-editing-policy.md +++ b/windows/security/threat-protection/windows-defender-application-control/wdac-wizard-editing-policy.md @@ -12,8 +12,8 @@ audience: ITPro ms.collection: M365-security-compliance author: jgeurten ms.reviewer: isbrahm -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.topic: conceptual ms.date: 10/14/2020 ms.technology: windows-sec diff --git a/windows/security/threat-protection/windows-defender-application-control/wdac-wizard-merging-policies.md b/windows/security/threat-protection/windows-defender-application-control/wdac-wizard-merging-policies.md index 172bcc1cf7..6eab848632 100644 --- a/windows/security/threat-protection/windows-defender-application-control/wdac-wizard-merging-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/wdac-wizard-merging-policies.md @@ -12,8 +12,8 @@ audience: ITPro ms.collection: M365-security-compliance author: jgeurten ms.reviewer: isbrahm -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.topic: conceptual ms.date: 10/14/2020 ms.technology: windows-sec diff --git a/windows/security/threat-protection/windows-defender-application-control/wdac-wizard.md b/windows/security/threat-protection/windows-defender-application-control/wdac-wizard.md index 2510df6b70..95a29f34dd 100644 --- a/windows/security/threat-protection/windows-defender-application-control/wdac-wizard.md +++ b/windows/security/threat-protection/windows-defender-application-control/wdac-wizard.md @@ -7,8 +7,8 @@ ms.localizationpriority: medium ms.collection: M365-security-compliance author: jgeurten ms.reviewer: isbrahm -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.topic: conceptual ms.date: 05/24/2022 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-deployment-guide.md b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-deployment-guide.md index e993bb919d..2ce61c38c1 100644 --- a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-deployment-guide.md +++ b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-deployment-guide.md @@ -8,7 +8,7 @@ ms.collection: M365-security-compliance author: jgeurten ms.reviewer: aaroncz ms.author: jogeurte -manager: jsuther +manager: aaroncz ms.date: 06/27/2022 ms.topic: overview --- diff --git a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-design-guide.md b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-design-guide.md index 05fbd4e9b6..7fae51569d 100644 --- a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-design-guide.md +++ b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-design-guide.md @@ -12,8 +12,8 @@ audience: ITPro ms.collection: M365-security-compliance author: jsuther1974 ms.reviewer: isbrahm -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.topic: conceptual ms.date: 02/20/2018 ms.technology: windows-sec diff --git a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-operational-guide.md b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-operational-guide.md index 9a160774c9..8057453ab4 100644 --- a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-operational-guide.md +++ b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-operational-guide.md @@ -12,8 +12,8 @@ audience: ITPro ms.collection: M365-security-compliance author: jsuther1974 ms.reviewer: isbrahm -ms.author: dansimp -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.date: 03/16/2020 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control.md b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control.md index 012e954059..55c1309a6c 100644 --- a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control.md +++ b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control.md @@ -10,10 +10,10 @@ ms.pagetype: security ms.localizationpriority: medium audience: ITPro ms.collection: M365-security-compliance -author: denisebmsft +author: vinaypamnani-msft ms.reviewer: isbrahm -ms.author: deniseb -manager: dansimp +ms.author: vinpa +manager: aaroncz ms.date: 05/26/2020 ms.custom: asr ms.technology: windows-sec diff --git a/windows/security/threat-protection/windows-defender-security-center/wdsc-account-protection.md b/windows/security/threat-protection/windows-defender-security-center/wdsc-account-protection.md index 203ac733d5..afa4f4d5f6 100644 --- a/windows/security/threat-protection/windows-defender-security-center/wdsc-account-protection.md +++ b/windows/security/threat-protection/windows-defender-security-center/wdsc-account-protection.md @@ -8,11 +8,11 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -ms.author: dansimp -ms.date: +author: vinaypamnani-msft +ms.author: vinpa +ms.date: ms.reviewer: -manager: dansimp +manager: aaroncz ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-security-center/wdsc-app-browser-control.md b/windows/security/threat-protection/windows-defender-security-center/wdsc-app-browser-control.md index e3814dc5d2..a5967f6c83 100644 --- a/windows/security/threat-protection/windows-defender-security-center/wdsc-app-browser-control.md +++ b/windows/security/threat-protection/windows-defender-security-center/wdsc-app-browser-control.md @@ -9,11 +9,11 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium audience: ITPro -author: dansimp -ms.author: dansimp +author: vinaypamnani-msft +ms.author: vinpa ms.date: ms.reviewer: -manager: dansimp +manager: aaroncz ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-security-center/wdsc-customize-contact-information.md b/windows/security/threat-protection/windows-defender-security-center/wdsc-customize-contact-information.md index 2f252dac4f..3205a64589 100644 --- a/windows/security/threat-protection/windows-defender-security-center/wdsc-customize-contact-information.md +++ b/windows/security/threat-protection/windows-defender-security-center/wdsc-customize-contact-information.md @@ -8,11 +8,11 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -ms.author: dansimp +author: vinaypamnani-msft +ms.author: vinpa ms.date: ms.reviewer: -manager: dansimp +manager: aaroncz ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-security-center/wdsc-device-performance-health.md b/windows/security/threat-protection/windows-defender-security-center/wdsc-device-performance-health.md index a4136a591a..a962210468 100644 --- a/windows/security/threat-protection/windows-defender-security-center/wdsc-device-performance-health.md +++ b/windows/security/threat-protection/windows-defender-security-center/wdsc-device-performance-health.md @@ -8,11 +8,11 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -ms.author: dansimp +author: vinaypamnani-msft +ms.author: vinpa ms.date: ms.reviewer: -manager: dansimp +manager: aaroncz ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-security-center/wdsc-device-security.md b/windows/security/threat-protection/windows-defender-security-center/wdsc-device-security.md index 66b2b79227..85d6fb7d55 100644 --- a/windows/security/threat-protection/windows-defender-security-center/wdsc-device-security.md +++ b/windows/security/threat-protection/windows-defender-security-center/wdsc-device-security.md @@ -8,11 +8,11 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -ms.author: dansimp +author: vinaypamnani-msft +ms.author: vinpa ms.date: ms.reviewer: -manager: dansimp +manager: aaroncz ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-security-center/wdsc-family-options.md b/windows/security/threat-protection/windows-defender-security-center/wdsc-family-options.md index 8f9528db75..1254b36895 100644 --- a/windows/security/threat-protection/windows-defender-security-center/wdsc-family-options.md +++ b/windows/security/threat-protection/windows-defender-security-center/wdsc-family-options.md @@ -8,11 +8,11 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -ms.author: dansimp +author: vinaypamnani-msft +ms.author: vinpa ms.date: ms.reviewer: -manager: dansimp +manager: aaroncz ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-security-center/wdsc-firewall-network-protection.md b/windows/security/threat-protection/windows-defender-security-center/wdsc-firewall-network-protection.md index b0d7e2beea..ded2f50dd3 100644 --- a/windows/security/threat-protection/windows-defender-security-center/wdsc-firewall-network-protection.md +++ b/windows/security/threat-protection/windows-defender-security-center/wdsc-firewall-network-protection.md @@ -7,11 +7,11 @@ ms.prod: m365-security ms.mktglfcycl: manage ms.sitesec: library ms.localizationpriority: medium -author: dansimp -ms.author: dansimp -ms.date: +author: vinaypamnani-msft +ms.author: vinpa +ms.date: ms.reviewer: -manager: dansimp +manager: aaroncz ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-security-center/wdsc-hide-notifications.md b/windows/security/threat-protection/windows-defender-security-center/wdsc-hide-notifications.md index c684f86a90..f9af03851a 100644 --- a/windows/security/threat-protection/windows-defender-security-center/wdsc-hide-notifications.md +++ b/windows/security/threat-protection/windows-defender-security-center/wdsc-hide-notifications.md @@ -8,11 +8,11 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -ms.author: dansimp +author: vinaypamnani-msft +ms.author: vinpa ms.date: ms.reviewer: -manager: dansimp +manager: aaroncz ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-security-center/wdsc-virus-threat-protection.md b/windows/security/threat-protection/windows-defender-security-center/wdsc-virus-threat-protection.md index cade645c59..afbbb0ed13 100644 --- a/windows/security/threat-protection/windows-defender-security-center/wdsc-virus-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-security-center/wdsc-virus-threat-protection.md @@ -8,10 +8,10 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -ms.author: dansimp +author: vinaypamnani-msft +ms.author: vinpa ms.reviewer: -manager: dansimp +manager: aaroncz ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-security-center/wdsc-windows-10-in-s-mode.md b/windows/security/threat-protection/windows-defender-security-center/wdsc-windows-10-in-s-mode.md index 2b298178cb..c981e1284a 100644 --- a/windows/security/threat-protection/windows-defender-security-center/wdsc-windows-10-in-s-mode.md +++ b/windows/security/threat-protection/windows-defender-security-center/wdsc-windows-10-in-s-mode.md @@ -8,11 +8,11 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp -ms.author: dansimp +author: vinaypamnani-msft +ms.author: vinpa ms.date: 04/30/2018 ms.reviewer: -manager: dansimp +manager: aaroncz ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-security-center/windows-defender-security-center.md b/windows/security/threat-protection/windows-defender-security-center/windows-defender-security-center.md index 218c4f941f..2660a6688b 100644 --- a/windows/security/threat-protection/windows-defender-security-center/windows-defender-security-center.md +++ b/windows/security/threat-protection/windows-defender-security-center/windows-defender-security-center.md @@ -4,10 +4,10 @@ description: The Windows Security app brings together common Windows security fe search.product: eADQiWindows 10XVcnh ms.prod: m365-security ms.localizationpriority: medium -author: dansimp -ms.author: dansimp +author: vinaypamnani-msft +ms.author: vinpa ms.reviewer: -manager: dansimp +manager: aaroncz ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-system-guard/how-hardware-based-root-of-trust-helps-protect-windows.md b/windows/security/threat-protection/windows-defender-system-guard/how-hardware-based-root-of-trust-helps-protect-windows.md index 1c50e07a18..5b34d730d4 100644 --- a/windows/security/threat-protection/windows-defender-system-guard/how-hardware-based-root-of-trust-helps-protect-windows.md +++ b/windows/security/threat-protection/windows-defender-system-guard/how-hardware-based-root-of-trust-helps-protect-windows.md @@ -3,15 +3,15 @@ title: How a Windows Defender System Guard helps protect Windows 10 description: Windows Defender System Guard reorganizes the existing Windows 10 system integrity features under one roof. Learn how it works. ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa search.appverid: met150 ms.prod: m365-security ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp +author: vinaypamnani-msft ms.date: 03/01/2019 ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md b/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md index e3cc007d51..9e835c880f 100644 --- a/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md +++ b/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md @@ -7,11 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: dansimp +author: vinaypamnani-msft ms.date: 11/30/2021 ms.reviewer: -manager: dansimp -ms.author: dansimp +manager: aaroncz +ms.author: vinpa ms.technology: windows-sec --- diff --git a/windows/security/threat-protection/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone.md b/windows/security/threat-protection/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone.md index b663f72d19..3d7b87469b 100644 --- a/windows/security/threat-protection/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone.md +++ b/windows/security/threat-protection/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Add Production Devices to the Membership Group for a Zone diff --git a/windows/security/threat-protection/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone.md b/windows/security/threat-protection/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone.md index 9f5d3bac7c..912e1fa2d0 100644 --- a/windows/security/threat-protection/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone.md +++ b/windows/security/threat-protection/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Add Test Devices to the Membership Group for a Zone diff --git a/windows/security/threat-protection/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md b/windows/security/threat-protection/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md index 180ebf61e7..c7f24b1c8b 100644 --- a/windows/security/threat-protection/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md +++ b/windows/security/threat-protection/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Appendix A: Sample GPO Template Files for Settings Used in this Guide diff --git a/windows/security/threat-protection/windows-firewall/assign-security-group-filters-to-the-gpo.md b/windows/security/threat-protection/windows-firewall/assign-security-group-filters-to-the-gpo.md index 88a28959fc..6624b87ab4 100644 --- a/windows/security/threat-protection/windows-firewall/assign-security-group-filters-to-the-gpo.md +++ b/windows/security/threat-protection/windows-firewall/assign-security-group-filters-to-the-gpo.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Assign Security Group Filters to the GPO diff --git a/windows/security/threat-protection/windows-firewall/basic-firewall-policy-design.md b/windows/security/threat-protection/windows-firewall/basic-firewall-policy-design.md index 68b7ae50a0..601d8b57a2 100644 --- a/windows/security/threat-protection/windows-firewall/basic-firewall-policy-design.md +++ b/windows/security/threat-protection/windows-firewall/basic-firewall-policy-design.md @@ -15,12 +15,12 @@ audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Basic Firewall Policy Design diff --git a/windows/security/threat-protection/windows-firewall/best-practices-configuring.md b/windows/security/threat-protection/windows-firewall/best-practices-configuring.md index db778a73a8..aaba567e0b 100644 --- a/windows/security/threat-protection/windows-firewall/best-practices-configuring.md +++ b/windows/security/threat-protection/windows-firewall/best-practices-configuring.md @@ -14,12 +14,12 @@ audience: ITPro ms.collection: M365-security-compliance ms.topic: article ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Best practices for configuring Windows Defender Firewall diff --git a/windows/security/threat-protection/windows-firewall/boundary-zone-gpos.md b/windows/security/threat-protection/windows-firewall/boundary-zone-gpos.md index 77da6ba1be..62c002d8a3 100644 --- a/windows/security/threat-protection/windows-firewall/boundary-zone-gpos.md +++ b/windows/security/threat-protection/windows-firewall/boundary-zone-gpos.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Boundary Zone GPOs diff --git a/windows/security/threat-protection/windows-firewall/boundary-zone.md b/windows/security/threat-protection/windows-firewall/boundary-zone.md index d8077459ac..b9e4dd126b 100644 --- a/windows/security/threat-protection/windows-firewall/boundary-zone.md +++ b/windows/security/threat-protection/windows-firewall/boundary-zone.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Boundary Zone diff --git a/windows/security/threat-protection/windows-firewall/certificate-based-isolation-policy-design-example.md b/windows/security/threat-protection/windows-firewall/certificate-based-isolation-policy-design-example.md index 02c88fdfb7..f9b3e0f409 100644 --- a/windows/security/threat-protection/windows-firewall/certificate-based-isolation-policy-design-example.md +++ b/windows/security/threat-protection/windows-firewall/certificate-based-isolation-policy-design-example.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Certificate-based Isolation Policy Design Example diff --git a/windows/security/threat-protection/windows-firewall/certificate-based-isolation-policy-design.md b/windows/security/threat-protection/windows-firewall/certificate-based-isolation-policy-design.md index c21f3ae251..356c10b95d 100644 --- a/windows/security/threat-protection/windows-firewall/certificate-based-isolation-policy-design.md +++ b/windows/security/threat-protection/windows-firewall/certificate-based-isolation-policy-design.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Certificate-based isolation policy design diff --git a/windows/security/threat-protection/windows-firewall/change-rules-from-request-to-require-mode.md b/windows/security/threat-protection/windows-firewall/change-rules-from-request-to-require-mode.md index effdd2a70c..843c8f137e 100644 --- a/windows/security/threat-protection/windows-firewall/change-rules-from-request-to-require-mode.md +++ b/windows/security/threat-protection/windows-firewall/change-rules-from-request-to-require-mode.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Change Rules from Request to Require Mode diff --git a/windows/security/threat-protection/windows-firewall/checklist-configuring-basic-firewall-settings.md b/windows/security/threat-protection/windows-firewall/checklist-configuring-basic-firewall-settings.md index d3356b14f3..d2a0485b0d 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-configuring-basic-firewall-settings.md +++ b/windows/security/threat-protection/windows-firewall/checklist-configuring-basic-firewall-settings.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Checklist: Configuring Basic Firewall Settings diff --git a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone.md b/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone.md index 176d8f4536..a364018452 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone.md +++ b/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Checklist: Configuring Rules for an Isolated Server Zone diff --git a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md b/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md index e546b37adf..04cbb1130e 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md +++ b/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Checklist: Configuring Rules for Servers in a Standalone Isolated Server Zone diff --git a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-boundary-zone.md b/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-boundary-zone.md index 55e7e19754..17ed3a9528 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-boundary-zone.md +++ b/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-boundary-zone.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Checklist: Configuring Rules for the Boundary Zone diff --git a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-encryption-zone.md b/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-encryption-zone.md index 5d0a18a69f..57ae807cc2 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-encryption-zone.md +++ b/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-encryption-zone.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Checklist: Configuring Rules for the Encryption Zone diff --git a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-isolated-domain.md b/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-isolated-domain.md index 648850a336..9fb6e3cb73 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-isolated-domain.md +++ b/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-isolated-domain.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Checklist: Configuring Rules for the Isolated Domain diff --git a/windows/security/threat-protection/windows-firewall/checklist-creating-group-policy-objects.md b/windows/security/threat-protection/windows-firewall/checklist-creating-group-policy-objects.md index 6168d455d3..4e3125ebdc 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-creating-group-policy-objects.md +++ b/windows/security/threat-protection/windows-firewall/checklist-creating-group-policy-objects.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Checklist: Creating Group Policy Objects diff --git a/windows/security/threat-protection/windows-firewall/checklist-creating-inbound-firewall-rules.md b/windows/security/threat-protection/windows-firewall/checklist-creating-inbound-firewall-rules.md index 57a25a4b6c..7a5ac77508 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-creating-inbound-firewall-rules.md +++ b/windows/security/threat-protection/windows-firewall/checklist-creating-inbound-firewall-rules.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Checklist: Creating Inbound Firewall Rules diff --git a/windows/security/threat-protection/windows-firewall/checklist-creating-outbound-firewall-rules.md b/windows/security/threat-protection/windows-firewall/checklist-creating-outbound-firewall-rules.md index 879c1a55b6..f0e2b093f1 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-creating-outbound-firewall-rules.md +++ b/windows/security/threat-protection/windows-firewall/checklist-creating-outbound-firewall-rules.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Checklist: Creating Outbound Firewall Rules diff --git a/windows/security/threat-protection/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md b/windows/security/threat-protection/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md index 9094725eda..991962bcd4 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md +++ b/windows/security/threat-protection/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Checklist: Creating Rules for Clients of a Standalone Isolated Server Zone diff --git a/windows/security/threat-protection/windows-firewall/checklist-implementing-a-basic-firewall-policy-design.md b/windows/security/threat-protection/windows-firewall/checklist-implementing-a-basic-firewall-policy-design.md index 6a5f00771e..1476c38297 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-implementing-a-basic-firewall-policy-design.md +++ b/windows/security/threat-protection/windows-firewall/checklist-implementing-a-basic-firewall-policy-design.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Checklist: Implementing a Basic Firewall Policy Design diff --git a/windows/security/threat-protection/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design.md b/windows/security/threat-protection/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design.md index ce48d49c77..6364c0305a 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design.md +++ b/windows/security/threat-protection/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Checklist: Implementing a Certificate-based Isolation Policy Design diff --git a/windows/security/threat-protection/windows-firewall/checklist-implementing-a-domain-isolation-policy-design.md b/windows/security/threat-protection/windows-firewall/checklist-implementing-a-domain-isolation-policy-design.md index 6061bc86b5..eb350bd760 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-implementing-a-domain-isolation-policy-design.md +++ b/windows/security/threat-protection/windows-firewall/checklist-implementing-a-domain-isolation-policy-design.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Checklist: Implementing a Domain Isolation Policy Design diff --git a/windows/security/threat-protection/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design.md b/windows/security/threat-protection/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design.md index 87364021d1..d3789892cc 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design.md +++ b/windows/security/threat-protection/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Checklist: Implementing a Standalone Server Isolation Policy Design diff --git a/windows/security/threat-protection/windows-firewall/configure-authentication-methods.md b/windows/security/threat-protection/windows-firewall/configure-authentication-methods.md index 7f45ce6466..1d473ddc4d 100644 --- a/windows/security/threat-protection/windows-firewall/configure-authentication-methods.md +++ b/windows/security/threat-protection/windows-firewall/configure-authentication-methods.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Configure Authentication Methods diff --git a/windows/security/threat-protection/windows-firewall/configure-data-protection-quick-mode-settings.md b/windows/security/threat-protection/windows-firewall/configure-data-protection-quick-mode-settings.md index f839c60899..50d6e880b1 100644 --- a/windows/security/threat-protection/windows-firewall/configure-data-protection-quick-mode-settings.md +++ b/windows/security/threat-protection/windows-firewall/configure-data-protection-quick-mode-settings.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Configure Data Protection (Quick Mode) Settings diff --git a/windows/security/threat-protection/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates.md b/windows/security/threat-protection/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates.md index feb3b8e3a2..d346745243 100644 --- a/windows/security/threat-protection/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates.md +++ b/windows/security/threat-protection/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Configure Group Policy to Autoenroll and Deploy Certificates diff --git a/windows/security/threat-protection/windows-firewall/configure-key-exchange-main-mode-settings.md b/windows/security/threat-protection/windows-firewall/configure-key-exchange-main-mode-settings.md index dd062985fe..9fd555af79 100644 --- a/windows/security/threat-protection/windows-firewall/configure-key-exchange-main-mode-settings.md +++ b/windows/security/threat-protection/windows-firewall/configure-key-exchange-main-mode-settings.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Configure Key Exchange (Main Mode) Settings diff --git a/windows/security/threat-protection/windows-firewall/configure-the-rules-to-require-encryption.md b/windows/security/threat-protection/windows-firewall/configure-the-rules-to-require-encryption.md index 2a9fedfb36..aac4b877fc 100644 --- a/windows/security/threat-protection/windows-firewall/configure-the-rules-to-require-encryption.md +++ b/windows/security/threat-protection/windows-firewall/configure-the-rules-to-require-encryption.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Configure the Rules to Require Encryption diff --git a/windows/security/threat-protection/windows-firewall/configure-the-windows-firewall-log.md b/windows/security/threat-protection/windows-firewall/configure-the-windows-firewall-log.md index acae2a5eb6..bd46701603 100644 --- a/windows/security/threat-protection/windows-firewall/configure-the-windows-firewall-log.md +++ b/windows/security/threat-protection/windows-firewall/configure-the-windows-firewall-log.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Configure the Windows Defender Firewall with Advanced Security Log diff --git a/windows/security/threat-protection/windows-firewall/configure-the-workstation-authentication-certificate-template.md b/windows/security/threat-protection/windows-firewall/configure-the-workstation-authentication-certificate-template.md index 7f4b8057f3..647bf70abd 100644 --- a/windows/security/threat-protection/windows-firewall/configure-the-workstation-authentication-certificate-template.md +++ b/windows/security/threat-protection/windows-firewall/configure-the-workstation-authentication-certificate-template.md @@ -13,12 +13,12 @@ ms.localizationpriority: medium author: paolomatarazzo ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Configure the Workstation Authentication Certificate Template diff --git a/windows/security/threat-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md b/windows/security/threat-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md index 81905439d5..3e389bd53d 100644 --- a/windows/security/threat-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md +++ b/windows/security/threat-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Configure Windows Defender Firewall with Advanced Security to Suppress Notifications When a Program Is Blocked diff --git a/windows/security/threat-protection/windows-firewall/confirm-that-certificates-are-deployed-correctly.md b/windows/security/threat-protection/windows-firewall/confirm-that-certificates-are-deployed-correctly.md index e23f800b1e..6c36b36cad 100644 --- a/windows/security/threat-protection/windows-firewall/confirm-that-certificates-are-deployed-correctly.md +++ b/windows/security/threat-protection/windows-firewall/confirm-that-certificates-are-deployed-correctly.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Confirm That Certificates Are Deployed Correctly diff --git a/windows/security/threat-protection/windows-firewall/copy-a-gpo-to-create-a-new-gpo.md b/windows/security/threat-protection/windows-firewall/copy-a-gpo-to-create-a-new-gpo.md index 603fb772d6..34416f5d1a 100644 --- a/windows/security/threat-protection/windows-firewall/copy-a-gpo-to-create-a-new-gpo.md +++ b/windows/security/threat-protection/windows-firewall/copy-a-gpo-to-create-a-new-gpo.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Copy a GPO to Create a New GPO diff --git a/windows/security/threat-protection/windows-firewall/create-a-group-account-in-active-directory.md b/windows/security/threat-protection/windows-firewall/create-a-group-account-in-active-directory.md index f3f7a3bb1b..f5c4208826 100644 --- a/windows/security/threat-protection/windows-firewall/create-a-group-account-in-active-directory.md +++ b/windows/security/threat-protection/windows-firewall/create-a-group-account-in-active-directory.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Create a Group Account in Active Directory diff --git a/windows/security/threat-protection/windows-firewall/create-a-group-policy-object.md b/windows/security/threat-protection/windows-firewall/create-a-group-policy-object.md index 8926c70552..d6e785f222 100644 --- a/windows/security/threat-protection/windows-firewall/create-a-group-policy-object.md +++ b/windows/security/threat-protection/windows-firewall/create-a-group-policy-object.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Create a Group Policy Object diff --git a/windows/security/threat-protection/windows-firewall/create-an-authentication-exemption-list-rule.md b/windows/security/threat-protection/windows-firewall/create-an-authentication-exemption-list-rule.md index a2ad8d6f6c..8fddd4cea9 100644 --- a/windows/security/threat-protection/windows-firewall/create-an-authentication-exemption-list-rule.md +++ b/windows/security/threat-protection/windows-firewall/create-an-authentication-exemption-list-rule.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Create an Authentication Exemption List Rule diff --git a/windows/security/threat-protection/windows-firewall/create-an-authentication-request-rule.md b/windows/security/threat-protection/windows-firewall/create-an-authentication-request-rule.md index 99d3d07f46..526644fd38 100644 --- a/windows/security/threat-protection/windows-firewall/create-an-authentication-request-rule.md +++ b/windows/security/threat-protection/windows-firewall/create-an-authentication-request-rule.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Create an Authentication Request Rule diff --git a/windows/security/threat-protection/windows-firewall/create-an-inbound-icmp-rule.md b/windows/security/threat-protection/windows-firewall/create-an-inbound-icmp-rule.md index 76b063f72d..b86d4c572d 100644 --- a/windows/security/threat-protection/windows-firewall/create-an-inbound-icmp-rule.md +++ b/windows/security/threat-protection/windows-firewall/create-an-inbound-icmp-rule.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Create an Inbound ICMP Rule diff --git a/windows/security/threat-protection/windows-firewall/create-an-inbound-port-rule.md b/windows/security/threat-protection/windows-firewall/create-an-inbound-port-rule.md index 56a7c6808c..ee346607bc 100644 --- a/windows/security/threat-protection/windows-firewall/create-an-inbound-port-rule.md +++ b/windows/security/threat-protection/windows-firewall/create-an-inbound-port-rule.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Create an Inbound Port Rule diff --git a/windows/security/threat-protection/windows-firewall/create-an-inbound-program-or-service-rule.md b/windows/security/threat-protection/windows-firewall/create-an-inbound-program-or-service-rule.md index 1d6f3352d0..206586bc34 100644 --- a/windows/security/threat-protection/windows-firewall/create-an-inbound-program-or-service-rule.md +++ b/windows/security/threat-protection/windows-firewall/create-an-inbound-program-or-service-rule.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Create an Inbound Program or Service Rule diff --git a/windows/security/threat-protection/windows-firewall/create-an-outbound-port-rule.md b/windows/security/threat-protection/windows-firewall/create-an-outbound-port-rule.md index 9c6df54f31..897e13bfc7 100644 --- a/windows/security/threat-protection/windows-firewall/create-an-outbound-port-rule.md +++ b/windows/security/threat-protection/windows-firewall/create-an-outbound-port-rule.md @@ -16,12 +16,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Create an Outbound Port Rule diff --git a/windows/security/threat-protection/windows-firewall/create-an-outbound-program-or-service-rule.md b/windows/security/threat-protection/windows-firewall/create-an-outbound-program-or-service-rule.md index 79eb7dda0d..4097123344 100644 --- a/windows/security/threat-protection/windows-firewall/create-an-outbound-program-or-service-rule.md +++ b/windows/security/threat-protection/windows-firewall/create-an-outbound-program-or-service-rule.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Create an Outbound Program or Service Rule diff --git a/windows/security/threat-protection/windows-firewall/create-inbound-rules-to-support-rpc.md b/windows/security/threat-protection/windows-firewall/create-inbound-rules-to-support-rpc.md index 2fec297236..3bd92a1dc9 100644 --- a/windows/security/threat-protection/windows-firewall/create-inbound-rules-to-support-rpc.md +++ b/windows/security/threat-protection/windows-firewall/create-inbound-rules-to-support-rpc.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Create Inbound Rules to Support RPC diff --git a/windows/security/threat-protection/windows-firewall/create-windows-firewall-rules-in-intune.md b/windows/security/threat-protection/windows-firewall/create-windows-firewall-rules-in-intune.md index 3b6a633dbf..0b68a6e222 100644 --- a/windows/security/threat-protection/windows-firewall/create-windows-firewall-rules-in-intune.md +++ b/windows/security/threat-protection/windows-firewall/create-windows-firewall-rules-in-intune.md @@ -10,12 +10,12 @@ manager: aaroncz ms.collection: M365-security-compliance ms.topic: conceptual ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Create Windows Firewall rules in Intune diff --git a/windows/security/threat-protection/windows-firewall/create-wmi-filters-for-the-gpo.md b/windows/security/threat-protection/windows-firewall/create-wmi-filters-for-the-gpo.md index 2bdb97ef09..d75ebd5a78 100644 --- a/windows/security/threat-protection/windows-firewall/create-wmi-filters-for-the-gpo.md +++ b/windows/security/threat-protection/windows-firewall/create-wmi-filters-for-the-gpo.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Create WMI Filters for the GPO diff --git a/windows/security/threat-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy.md b/windows/security/threat-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy.md index 0b2d46c86c..a09c2d52f1 100644 --- a/windows/security/threat-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy.md +++ b/windows/security/threat-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Designing a Windows Defender Firewall with Advanced Security Strategy diff --git a/windows/security/threat-protection/windows-firewall/determining-the-trusted-state-of-your-devices.md b/windows/security/threat-protection/windows-firewall/determining-the-trusted-state-of-your-devices.md index 7cc8bd8b35..6e3c8737e3 100644 --- a/windows/security/threat-protection/windows-firewall/determining-the-trusted-state-of-your-devices.md +++ b/windows/security/threat-protection/windows-firewall/determining-the-trusted-state-of-your-devices.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Determining the Trusted State of Your Devices diff --git a/windows/security/threat-protection/windows-firewall/documenting-the-zones.md b/windows/security/threat-protection/windows-firewall/documenting-the-zones.md index 95dc6e163c..e28ab99f06 100644 --- a/windows/security/threat-protection/windows-firewall/documenting-the-zones.md +++ b/windows/security/threat-protection/windows-firewall/documenting-the-zones.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Documenting the Zones diff --git a/windows/security/threat-protection/windows-firewall/domain-isolation-policy-design-example.md b/windows/security/threat-protection/windows-firewall/domain-isolation-policy-design-example.md index 82b302fd7b..0c969c9b5f 100644 --- a/windows/security/threat-protection/windows-firewall/domain-isolation-policy-design-example.md +++ b/windows/security/threat-protection/windows-firewall/domain-isolation-policy-design-example.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Domain Isolation Policy Design Example diff --git a/windows/security/threat-protection/windows-firewall/domain-isolation-policy-design.md b/windows/security/threat-protection/windows-firewall/domain-isolation-policy-design.md index 340f62976e..91e38bd34f 100644 --- a/windows/security/threat-protection/windows-firewall/domain-isolation-policy-design.md +++ b/windows/security/threat-protection/windows-firewall/domain-isolation-policy-design.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Domain Isolation Policy Design diff --git a/windows/security/threat-protection/windows-firewall/enable-predefined-inbound-rules.md b/windows/security/threat-protection/windows-firewall/enable-predefined-inbound-rules.md index 123058b8dd..6d3dcdfa6d 100644 --- a/windows/security/threat-protection/windows-firewall/enable-predefined-inbound-rules.md +++ b/windows/security/threat-protection/windows-firewall/enable-predefined-inbound-rules.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Enable Predefined Inbound Rules diff --git a/windows/security/threat-protection/windows-firewall/enable-predefined-outbound-rules.md b/windows/security/threat-protection/windows-firewall/enable-predefined-outbound-rules.md index 000488608e..c244fb2eab 100644 --- a/windows/security/threat-protection/windows-firewall/enable-predefined-outbound-rules.md +++ b/windows/security/threat-protection/windows-firewall/enable-predefined-outbound-rules.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/07/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Enable Predefined Outbound Rules diff --git a/windows/security/threat-protection/windows-firewall/encryption-zone-gpos.md b/windows/security/threat-protection/windows-firewall/encryption-zone-gpos.md index bcca4ec64f..df4ef1a7d4 100644 --- a/windows/security/threat-protection/windows-firewall/encryption-zone-gpos.md +++ b/windows/security/threat-protection/windows-firewall/encryption-zone-gpos.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Encryption Zone GPOs diff --git a/windows/security/threat-protection/windows-firewall/encryption-zone.md b/windows/security/threat-protection/windows-firewall/encryption-zone.md index 7038a7f49d..2269ca6e98 100644 --- a/windows/security/threat-protection/windows-firewall/encryption-zone.md +++ b/windows/security/threat-protection/windows-firewall/encryption-zone.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Encryption Zone diff --git a/windows/security/threat-protection/windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples.md b/windows/security/threat-protection/windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples.md index 3096a8342b..0c72496402 100644 --- a/windows/security/threat-protection/windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples.md +++ b/windows/security/threat-protection/windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Evaluating Windows Defender Firewall with Advanced Security Design Examples diff --git a/windows/security/threat-protection/windows-firewall/exempt-icmp-from-authentication.md b/windows/security/threat-protection/windows-firewall/exempt-icmp-from-authentication.md index d6de9a861d..194b00eec8 100644 --- a/windows/security/threat-protection/windows-firewall/exempt-icmp-from-authentication.md +++ b/windows/security/threat-protection/windows-firewall/exempt-icmp-from-authentication.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Exempt ICMP from Authentication diff --git a/windows/security/threat-protection/windows-firewall/exemption-list.md b/windows/security/threat-protection/windows-firewall/exemption-list.md index ac27c34d95..51b2aec7a3 100644 --- a/windows/security/threat-protection/windows-firewall/exemption-list.md +++ b/windows/security/threat-protection/windows-firewall/exemption-list.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Exemption List diff --git a/windows/security/threat-protection/windows-firewall/filter-origin-documentation.md b/windows/security/threat-protection/windows-firewall/filter-origin-documentation.md index f13a1094ec..620fae301e 100644 --- a/windows/security/threat-protection/windows-firewall/filter-origin-documentation.md +++ b/windows/security/threat-protection/windows-firewall/filter-origin-documentation.md @@ -12,12 +12,12 @@ ms.collection: - m365-initiative-windows-security ms.topic: troubleshooting ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Filter origin audit log improvements diff --git a/windows/security/threat-protection/windows-firewall/firewall-gpos.md b/windows/security/threat-protection/windows-firewall/firewall-gpos.md index 80b417b9a0..e4ef35dea9 100644 --- a/windows/security/threat-protection/windows-firewall/firewall-gpos.md +++ b/windows/security/threat-protection/windows-firewall/firewall-gpos.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Firewall GPOs diff --git a/windows/security/threat-protection/windows-firewall/firewall-policy-design-example.md b/windows/security/threat-protection/windows-firewall/firewall-policy-design-example.md index d52cb81f95..189be188ac 100644 --- a/windows/security/threat-protection/windows-firewall/firewall-policy-design-example.md +++ b/windows/security/threat-protection/windows-firewall/firewall-policy-design-example.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Basic Firewall Policy Design Example diff --git a/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md b/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md index 9d3ccfc6b4..7cee2d2297 100644 --- a/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md +++ b/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md @@ -12,12 +12,12 @@ ms.collection: - m365-initiative-windows-security ms.topic: troubleshooting ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Troubleshooting Windows Firewall settings after a Windows upgrade diff --git a/windows/security/threat-protection/windows-firewall/gathering-information-about-your-active-directory-deployment.md b/windows/security/threat-protection/windows-firewall/gathering-information-about-your-active-directory-deployment.md index 8725d0c4ed..53d336899b 100644 --- a/windows/security/threat-protection/windows-firewall/gathering-information-about-your-active-directory-deployment.md +++ b/windows/security/threat-protection/windows-firewall/gathering-information-about-your-active-directory-deployment.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Gathering Information about Your Active Directory Deployment diff --git a/windows/security/threat-protection/windows-firewall/gathering-information-about-your-current-network-infrastructure.md b/windows/security/threat-protection/windows-firewall/gathering-information-about-your-current-network-infrastructure.md index bfe7c5a55b..539efaed2b 100644 --- a/windows/security/threat-protection/windows-firewall/gathering-information-about-your-current-network-infrastructure.md +++ b/windows/security/threat-protection/windows-firewall/gathering-information-about-your-current-network-infrastructure.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Gathering Information about Your Current Network Infrastructure diff --git a/windows/security/threat-protection/windows-firewall/gathering-information-about-your-devices.md b/windows/security/threat-protection/windows-firewall/gathering-information-about-your-devices.md index eb25dfbbce..c67a8a360d 100644 --- a/windows/security/threat-protection/windows-firewall/gathering-information-about-your-devices.md +++ b/windows/security/threat-protection/windows-firewall/gathering-information-about-your-devices.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Gathering Information about Your Devices diff --git a/windows/security/threat-protection/windows-firewall/gathering-other-relevant-information.md b/windows/security/threat-protection/windows-firewall/gathering-other-relevant-information.md index 27ebec7226..07b32875e4 100644 --- a/windows/security/threat-protection/windows-firewall/gathering-other-relevant-information.md +++ b/windows/security/threat-protection/windows-firewall/gathering-other-relevant-information.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Gathering Other Relevant Information diff --git a/windows/security/threat-protection/windows-firewall/gathering-the-information-you-need.md b/windows/security/threat-protection/windows-firewall/gathering-the-information-you-need.md index 5f8c2be8fe..eb85318064 100644 --- a/windows/security/threat-protection/windows-firewall/gathering-the-information-you-need.md +++ b/windows/security/threat-protection/windows-firewall/gathering-the-information-you-need.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Gathering the Information You Need diff --git a/windows/security/threat-protection/windows-firewall/gpo-domiso-boundary.md b/windows/security/threat-protection/windows-firewall/gpo-domiso-boundary.md index a9b3bb3f08..e7c72f07ba 100644 --- a/windows/security/threat-protection/windows-firewall/gpo-domiso-boundary.md +++ b/windows/security/threat-protection/windows-firewall/gpo-domiso-boundary.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # GPO\_DOMISO\_Boundary diff --git a/windows/security/threat-protection/windows-firewall/gpo-domiso-encryption.md b/windows/security/threat-protection/windows-firewall/gpo-domiso-encryption.md index 9849e51f4d..bf21796c6c 100644 --- a/windows/security/threat-protection/windows-firewall/gpo-domiso-encryption.md +++ b/windows/security/threat-protection/windows-firewall/gpo-domiso-encryption.md @@ -11,12 +11,12 @@ ms.prod: m365-security ms.localizationpriority: medium ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # GPO\_DOMISO\_Encryption\_WS2008 diff --git a/windows/security/threat-protection/windows-firewall/gpo-domiso-firewall.md b/windows/security/threat-protection/windows-firewall/gpo-domiso-firewall.md index c50f026cc3..8d8d945cf8 100644 --- a/windows/security/threat-protection/windows-firewall/gpo-domiso-firewall.md +++ b/windows/security/threat-protection/windows-firewall/gpo-domiso-firewall.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # GPO\_DOMISO\_Firewall diff --git a/windows/security/threat-protection/windows-firewall/gpo-domiso-isolateddomain-clients.md b/windows/security/threat-protection/windows-firewall/gpo-domiso-isolateddomain-clients.md index 40f53282db..aca4b854b7 100644 --- a/windows/security/threat-protection/windows-firewall/gpo-domiso-isolateddomain-clients.md +++ b/windows/security/threat-protection/windows-firewall/gpo-domiso-isolateddomain-clients.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # GPO\_DOMISO\_IsolatedDomain\_Clients diff --git a/windows/security/threat-protection/windows-firewall/gpo-domiso-isolateddomain-servers.md b/windows/security/threat-protection/windows-firewall/gpo-domiso-isolateddomain-servers.md index cd7824dccc..077e1c50be 100644 --- a/windows/security/threat-protection/windows-firewall/gpo-domiso-isolateddomain-servers.md +++ b/windows/security/threat-protection/windows-firewall/gpo-domiso-isolateddomain-servers.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # GPO\_DOMISO\_IsolatedDomain\_Servers diff --git a/windows/security/threat-protection/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md b/windows/security/threat-protection/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md index 393ecebb5b..a67543dbe0 100644 --- a/windows/security/threat-protection/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md +++ b/windows/security/threat-protection/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Identifying Windows Defender Firewall with Advanced Security implementation goals diff --git a/windows/security/threat-protection/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan.md b/windows/security/threat-protection/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan.md index 663cee3cb9..b926a5bb42 100644 --- a/windows/security/threat-protection/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan.md +++ b/windows/security/threat-protection/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Implementing Your Windows Defender Firewall with Advanced Security Design Plan diff --git a/windows/security/threat-protection/windows-firewall/isolated-domain-gpos.md b/windows/security/threat-protection/windows-firewall/isolated-domain-gpos.md index d15da4ef92..609821853b 100644 --- a/windows/security/threat-protection/windows-firewall/isolated-domain-gpos.md +++ b/windows/security/threat-protection/windows-firewall/isolated-domain-gpos.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Isolated Domain GPOs diff --git a/windows/security/threat-protection/windows-firewall/isolated-domain.md b/windows/security/threat-protection/windows-firewall/isolated-domain.md index 16663963fe..aa1531e17c 100644 --- a/windows/security/threat-protection/windows-firewall/isolated-domain.md +++ b/windows/security/threat-protection/windows-firewall/isolated-domain.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Isolated Domain diff --git a/windows/security/threat-protection/windows-firewall/isolating-apps-on-your-network.md b/windows/security/threat-protection/windows-firewall/isolating-apps-on-your-network.md index 4da13f6712..de2b87956e 100644 --- a/windows/security/threat-protection/windows-firewall/isolating-apps-on-your-network.md +++ b/windows/security/threat-protection/windows-firewall/isolating-apps-on-your-network.md @@ -11,12 +11,12 @@ ms.date: 09/08/2021 ms.reviewer: jekrynit ms.author: paoloma ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Isolating Microsoft Store Apps on Your Network diff --git a/windows/security/threat-protection/windows-firewall/link-the-gpo-to-the-domain.md b/windows/security/threat-protection/windows-firewall/link-the-gpo-to-the-domain.md index 50361255a5..b795a08520 100644 --- a/windows/security/threat-protection/windows-firewall/link-the-gpo-to-the-domain.md +++ b/windows/security/threat-protection/windows-firewall/link-the-gpo-to-the-domain.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Link the GPO to the Domain diff --git a/windows/security/threat-protection/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md b/windows/security/threat-protection/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md index b729a362be..329d380327 100644 --- a/windows/security/threat-protection/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md +++ b/windows/security/threat-protection/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Mapping your implementation goals to a Windows Firewall with Advanced Security design diff --git a/windows/security/threat-protection/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md b/windows/security/threat-protection/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md index ce5e5032ad..5277aa77c2 100644 --- a/windows/security/threat-protection/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md +++ b/windows/security/threat-protection/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Modify GPO Filters to Apply to a Different Zone or Version of Windows diff --git a/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies.md b/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies.md index 2a59a2ec1e..11cda0416a 100644 --- a/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies.md +++ b/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Open the Group Policy Management Console to IP Security Policies diff --git a/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md b/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md index fbbda89fb9..43d09d117d 100644 --- a/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md +++ b/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Group Policy Management of Windows Firewall with Advanced Security diff --git a/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall.md b/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall.md index 548d290e41..fedbf805e2 100644 --- a/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall.md +++ b/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Group Policy Management of Windows Defender Firewall diff --git a/windows/security/threat-protection/windows-firewall/open-windows-firewall-with-advanced-security.md b/windows/security/threat-protection/windows-firewall/open-windows-firewall-with-advanced-security.md index 7d3b9aafd8..e20243511e 100644 --- a/windows/security/threat-protection/windows-firewall/open-windows-firewall-with-advanced-security.md +++ b/windows/security/threat-protection/windows-firewall/open-windows-firewall-with-advanced-security.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Open Windows Defender Firewall with Advanced Security diff --git a/windows/security/threat-protection/windows-firewall/planning-certificate-based-authentication.md b/windows/security/threat-protection/windows-firewall/planning-certificate-based-authentication.md index 6ed68f701c..ccdd9b55ac 100644 --- a/windows/security/threat-protection/windows-firewall/planning-certificate-based-authentication.md +++ b/windows/security/threat-protection/windows-firewall/planning-certificate-based-authentication.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Planning Certificate-based Authentication diff --git a/windows/security/threat-protection/windows-firewall/planning-domain-isolation-zones.md b/windows/security/threat-protection/windows-firewall/planning-domain-isolation-zones.md index 0edcdd46c3..aeeca7ddb6 100644 --- a/windows/security/threat-protection/windows-firewall/planning-domain-isolation-zones.md +++ b/windows/security/threat-protection/windows-firewall/planning-domain-isolation-zones.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Planning Domain Isolation Zones diff --git a/windows/security/threat-protection/windows-firewall/planning-gpo-deployment.md b/windows/security/threat-protection/windows-firewall/planning-gpo-deployment.md index 12a6970f24..9a503da0b3 100644 --- a/windows/security/threat-protection/windows-firewall/planning-gpo-deployment.md +++ b/windows/security/threat-protection/windows-firewall/planning-gpo-deployment.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Planning GPO Deployment diff --git a/windows/security/threat-protection/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones.md b/windows/security/threat-protection/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones.md index a63f2b239f..3a300f7eaf 100644 --- a/windows/security/threat-protection/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones.md +++ b/windows/security/threat-protection/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Planning Group Policy Deployment for Your Isolation Zones diff --git a/windows/security/threat-protection/windows-firewall/planning-isolation-groups-for-the-zones.md b/windows/security/threat-protection/windows-firewall/planning-isolation-groups-for-the-zones.md index ee193d5c3d..6df1ae0d34 100644 --- a/windows/security/threat-protection/windows-firewall/planning-isolation-groups-for-the-zones.md +++ b/windows/security/threat-protection/windows-firewall/planning-isolation-groups-for-the-zones.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Planning Isolation Groups for the Zones diff --git a/windows/security/threat-protection/windows-firewall/planning-network-access-groups.md b/windows/security/threat-protection/windows-firewall/planning-network-access-groups.md index ebc3e779ce..16f08b9ba6 100644 --- a/windows/security/threat-protection/windows-firewall/planning-network-access-groups.md +++ b/windows/security/threat-protection/windows-firewall/planning-network-access-groups.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Planning Network Access Groups diff --git a/windows/security/threat-protection/windows-firewall/planning-server-isolation-zones.md b/windows/security/threat-protection/windows-firewall/planning-server-isolation-zones.md index 6cdcc36dc6..0ab07e8cad 100644 --- a/windows/security/threat-protection/windows-firewall/planning-server-isolation-zones.md +++ b/windows/security/threat-protection/windows-firewall/planning-server-isolation-zones.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Planning Server Isolation Zones diff --git a/windows/security/threat-protection/windows-firewall/planning-settings-for-a-basic-firewall-policy.md b/windows/security/threat-protection/windows-firewall/planning-settings-for-a-basic-firewall-policy.md index f4bcdca804..79ca26d813 100644 --- a/windows/security/threat-protection/windows-firewall/planning-settings-for-a-basic-firewall-policy.md +++ b/windows/security/threat-protection/windows-firewall/planning-settings-for-a-basic-firewall-policy.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Planning Settings for a Basic Firewall Policy diff --git a/windows/security/threat-protection/windows-firewall/planning-the-gpos.md b/windows/security/threat-protection/windows-firewall/planning-the-gpos.md index 1a921ebe00..c57943a952 100644 --- a/windows/security/threat-protection/windows-firewall/planning-the-gpos.md +++ b/windows/security/threat-protection/windows-firewall/planning-the-gpos.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Planning the GPOs diff --git a/windows/security/threat-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security.md b/windows/security/threat-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security.md index 1411d23007..5160cfd7df 100644 --- a/windows/security/threat-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security.md +++ b/windows/security/threat-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Planning to Deploy Windows Defender Firewall with Advanced Security diff --git a/windows/security/threat-protection/windows-firewall/planning-your-windows-firewall-with-advanced-security-design.md b/windows/security/threat-protection/windows-firewall/planning-your-windows-firewall-with-advanced-security-design.md index 9d104e67c2..224a496c8f 100644 --- a/windows/security/threat-protection/windows-firewall/planning-your-windows-firewall-with-advanced-security-design.md +++ b/windows/security/threat-protection/windows-firewall/planning-your-windows-firewall-with-advanced-security-design.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Planning Your Windows Defender Firewall with Advanced Security Design diff --git a/windows/security/threat-protection/windows-firewall/procedures-used-in-this-guide.md b/windows/security/threat-protection/windows-firewall/procedures-used-in-this-guide.md index b12f025700..8910afd625 100644 --- a/windows/security/threat-protection/windows-firewall/procedures-used-in-this-guide.md +++ b/windows/security/threat-protection/windows-firewall/procedures-used-in-this-guide.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Procedures Used in This Guide diff --git a/windows/security/threat-protection/windows-firewall/protect-devices-from-unwanted-network-traffic.md b/windows/security/threat-protection/windows-firewall/protect-devices-from-unwanted-network-traffic.md index e143a06c23..d7b7a4c84c 100644 --- a/windows/security/threat-protection/windows-firewall/protect-devices-from-unwanted-network-traffic.md +++ b/windows/security/threat-protection/windows-firewall/protect-devices-from-unwanted-network-traffic.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 01/18/2022 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Protect devices from unwanted network traffic diff --git a/windows/security/threat-protection/windows-firewall/quarantine.md b/windows/security/threat-protection/windows-firewall/quarantine.md index c914408573..95854461d4 100644 --- a/windows/security/threat-protection/windows-firewall/quarantine.md +++ b/windows/security/threat-protection/windows-firewall/quarantine.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Quarantine behavior diff --git a/windows/security/threat-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources.md b/windows/security/threat-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources.md index eda42f13e6..00c99caff9 100644 --- a/windows/security/threat-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources.md +++ b/windows/security/threat-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Require Encryption When Accessing Sensitive Network Resources diff --git a/windows/security/threat-protection/windows-firewall/restrict-access-to-only-specified-users-or-devices.md b/windows/security/threat-protection/windows-firewall/restrict-access-to-only-specified-users-or-devices.md index 1b7a5eef66..3b0c932630 100644 --- a/windows/security/threat-protection/windows-firewall/restrict-access-to-only-specified-users-or-devices.md +++ b/windows/security/threat-protection/windows-firewall/restrict-access-to-only-specified-users-or-devices.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Restrict Access to Only Specified Users or Computers diff --git a/windows/security/threat-protection/windows-firewall/restrict-access-to-only-trusted-devices.md b/windows/security/threat-protection/windows-firewall/restrict-access-to-only-trusted-devices.md index 83e9ef9191..bf59103872 100644 --- a/windows/security/threat-protection/windows-firewall/restrict-access-to-only-trusted-devices.md +++ b/windows/security/threat-protection/windows-firewall/restrict-access-to-only-trusted-devices.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Restrict access to only trusted devices diff --git a/windows/security/threat-protection/windows-firewall/restrict-server-access-to-members-of-a-group-only.md b/windows/security/threat-protection/windows-firewall/restrict-server-access-to-members-of-a-group-only.md index ccd8c1f678..eb310d4c41 100644 --- a/windows/security/threat-protection/windows-firewall/restrict-server-access-to-members-of-a-group-only.md +++ b/windows/security/threat-protection/windows-firewall/restrict-server-access-to-members-of-a-group-only.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Restrict Server Access to Members of a Group Only diff --git a/windows/security/threat-protection/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2.md b/windows/security/threat-protection/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2.md index 5de4aeebab..f24b7476bd 100644 --- a/windows/security/threat-protection/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2.md +++ b/windows/security/threat-protection/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2.md @@ -11,12 +11,12 @@ ms.date: 09/08/2021 ms.reviewer: jekrynit ms.author: paoloma ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Securing End-to-End IPsec connections by using IKEv2 diff --git a/windows/security/threat-protection/windows-firewall/server-isolation-gpos.md b/windows/security/threat-protection/windows-firewall/server-isolation-gpos.md index 15f710e53b..f4c6d9fed8 100644 --- a/windows/security/threat-protection/windows-firewall/server-isolation-gpos.md +++ b/windows/security/threat-protection/windows-firewall/server-isolation-gpos.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Server Isolation GPOs diff --git a/windows/security/threat-protection/windows-firewall/server-isolation-policy-design-example.md b/windows/security/threat-protection/windows-firewall/server-isolation-policy-design-example.md index f920003a00..ec95c37ee0 100644 --- a/windows/security/threat-protection/windows-firewall/server-isolation-policy-design-example.md +++ b/windows/security/threat-protection/windows-firewall/server-isolation-policy-design-example.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Server Isolation Policy Design Example diff --git a/windows/security/threat-protection/windows-firewall/server-isolation-policy-design.md b/windows/security/threat-protection/windows-firewall/server-isolation-policy-design.md index 5dc27f7b43..4ad3aebbe7 100644 --- a/windows/security/threat-protection/windows-firewall/server-isolation-policy-design.md +++ b/windows/security/threat-protection/windows-firewall/server-isolation-policy-design.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Server Isolation Policy Design diff --git a/windows/security/threat-protection/windows-firewall/troubleshooting-uwp-firewall.md b/windows/security/threat-protection/windows-firewall/troubleshooting-uwp-firewall.md index 9796a30b9e..f06ed29108 100644 --- a/windows/security/threat-protection/windows-firewall/troubleshooting-uwp-firewall.md +++ b/windows/security/threat-protection/windows-firewall/troubleshooting-uwp-firewall.md @@ -12,12 +12,12 @@ ms.collection: - m365-initiative-windows-security ms.topic: troubleshooting ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Troubleshooting UWP App Connectivity Issues diff --git a/windows/security/threat-protection/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior.md b/windows/security/threat-protection/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior.md index 72d9d7fa43..5735661582 100644 --- a/windows/security/threat-protection/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior.md +++ b/windows/security/threat-protection/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Turn on Windows Defender Firewall with Advanced Security and Configure Default Behavior diff --git a/windows/security/threat-protection/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process.md b/windows/security/threat-protection/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process.md index e924d932ea..dea520028b 100644 --- a/windows/security/threat-protection/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process.md +++ b/windows/security/threat-protection/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process.md @@ -11,12 +11,12 @@ ms.date: 09/08/2021 ms.reviewer: jekrynit ms.author: paoloma ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Understanding the Windows Defender Firewall with Advanced Security Design Process diff --git a/windows/security/threat-protection/windows-firewall/verify-that-network-traffic-is-authenticated.md b/windows/security/threat-protection/windows-firewall/verify-that-network-traffic-is-authenticated.md index 9359451826..70a5c87532 100644 --- a/windows/security/threat-protection/windows-firewall/verify-that-network-traffic-is-authenticated.md +++ b/windows/security/threat-protection/windows-firewall/verify-that-network-traffic-is-authenticated.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Verify That Network Traffic Is Authenticated diff --git a/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell.md b/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell.md index 14a6de27f4..0aa360a552 100644 --- a/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell.md +++ b/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell.md @@ -11,12 +11,12 @@ ms.date: 09/08/2021 ms.reviewer: jekrynit ms.author: paoloma ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Windows Defender Firewall with Advanced Security Administration with Windows PowerShell diff --git a/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide.md b/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide.md index b2d5a9b049..99eb44ac9d 100644 --- a/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide.md +++ b/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Windows Defender Firewall with Advanced Security deployment overview diff --git a/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-design-guide.md b/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-design-guide.md index b23f7bc963..a0d78a1a59 100644 --- a/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-design-guide.md +++ b/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-design-guide.md @@ -11,12 +11,12 @@ ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 09/08/2021 ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Windows Defender Firewall with Advanced Security design guide diff --git a/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security.md b/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security.md index dc08cf7455..aa7a327952 100644 --- a/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security.md +++ b/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security.md @@ -12,12 +12,12 @@ ms.date: 09/08/2021 ms.reviewer: jekrynit ms.custom: asr ms.technology: windows-sec -appliesto: -- ✅ Windows 10 -- ✅ Windows 11 -- ✅ Windows Server 2016 -- ✅ Windows Server 2019 -- ✅ Windows Server 2022 +appliesto: + - ✅ Windows 10 + - ✅ Windows 11 + - ✅ Windows Server 2016 + - ✅ Windows Server 2019 + - ✅ Windows Server 2022 --- # Windows Defender Firewall with Advanced Security diff --git a/windows/security/threat-protection/windows-sandbox/windows-sandbox-architecture.md b/windows/security/threat-protection/windows-sandbox/windows-sandbox-architecture.md index 7d809b3599..31a7fcd852 100644 --- a/windows/security/threat-protection/windows-sandbox/windows-sandbox-architecture.md +++ b/windows/security/threat-protection/windows-sandbox/windows-sandbox-architecture.md @@ -2,9 +2,9 @@ title: Windows Sandbox architecture description: Windows Sandbox architecture ms.prod: m365-security -author: dansimp -ms.author: dansimp -manager: dansimp +author: vinaypamnani-msft +ms.author: vinpa +manager: aaroncz ms.collection: ms.topic: article ms.localizationpriority: diff --git a/windows/security/threat-protection/windows-sandbox/windows-sandbox-configure-using-wsb-file.md b/windows/security/threat-protection/windows-sandbox/windows-sandbox-configure-using-wsb-file.md index c4b16514e9..c85e770b80 100644 --- a/windows/security/threat-protection/windows-sandbox/windows-sandbox-configure-using-wsb-file.md +++ b/windows/security/threat-protection/windows-sandbox/windows-sandbox-configure-using-wsb-file.md @@ -2,9 +2,9 @@ title: Windows Sandbox configuration description: Windows Sandbox configuration ms.prod: m365-security -author: dansimp -ms.author: dansimp -manager: dansimp +author: vinaypamnani-msft +ms.author: vinpa +manager: aaroncz ms.collection: ms.topic: article ms.localizationpriority: medium diff --git a/windows/security/threat-protection/windows-sandbox/windows-sandbox-overview.md b/windows/security/threat-protection/windows-sandbox/windows-sandbox-overview.md index 5325926107..a1b72463ad 100644 --- a/windows/security/threat-protection/windows-sandbox/windows-sandbox-overview.md +++ b/windows/security/threat-protection/windows-sandbox/windows-sandbox-overview.md @@ -2,9 +2,9 @@ title: Windows Sandbox description: Windows Sandbox overview ms.prod: m365-security -author: dansimp -ms.author: dansimp -manager: dansimp +author: vinaypamnani-msft +ms.author: vinpa +manager: aaroncz ms.collection: ms.topic: article ms.localizationpriority: diff --git a/windows/security/threat-protection/windows-security-configuration-framework/get-support-for-security-baselines.md b/windows/security/threat-protection/windows-security-configuration-framework/get-support-for-security-baselines.md index 8963229d82..1e396d55eb 100644 --- a/windows/security/threat-protection/windows-security-configuration-framework/get-support-for-security-baselines.md +++ b/windows/security/threat-protection/windows-security-configuration-framework/get-support-for-security-baselines.md @@ -3,9 +3,9 @@ title: Get support for security baselines description: Find answers to frequently asked question on how to get support for baselines, the Security Compliance Toolkit (SCT), and related topics. ms.prod: m365-security ms.localizationpriority: medium -ms.author: dansimp -author: dansimp -manager: dansimp +ms.author: vinpa +author: vinaypamnani-msft +manager: aaroncz ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 02/14/2022 diff --git a/windows/security/threat-protection/windows-security-configuration-framework/security-compliance-toolkit-10.md b/windows/security/threat-protection/windows-security-configuration-framework/security-compliance-toolkit-10.md index 92875c810d..3fb82ea906 100644 --- a/windows/security/threat-protection/windows-security-configuration-framework/security-compliance-toolkit-10.md +++ b/windows/security/threat-protection/windows-security-configuration-framework/security-compliance-toolkit-10.md @@ -3,9 +3,9 @@ title: Microsoft Security Compliance Toolkit 1.0 Guide description: This article describes how to use Security Compliance Toolkit 1.0 in your organization ms.prod: m365-security ms.localizationpriority: medium -ms.author: dansimp -author: dansimp -manager: dansimp +ms.author: vinpa +author: vinaypamnani-msft +manager: aaroncz ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 02/14/2022 diff --git a/windows/security/threat-protection/windows-security-configuration-framework/windows-security-baselines.md b/windows/security/threat-protection/windows-security-configuration-framework/windows-security-baselines.md index ec95bffc72..20a7602001 100644 --- a/windows/security/threat-protection/windows-security-configuration-framework/windows-security-baselines.md +++ b/windows/security/threat-protection/windows-security-configuration-framework/windows-security-baselines.md @@ -3,9 +3,9 @@ title: Security baselines guide description: Learn how to use security baselines in your organization. ms.prod: m365-security ms.localizationpriority: medium -ms.author: dansimp -author: dansimp -manager: dansimp +ms.author: vinpa +author: vinaypamnani-msft +manager: aaroncz ms.collection: M365-security-compliance ms.topic: conceptual ms.date: 01/26/2022 From 8d942997f2f3f62a76a14d2937a51dfa84826b5a Mon Sep 17 00:00:00 2001 From: Liz Long <104389055+lizgt2000@users.noreply.github.com> Date: Wed, 28 Sep 2022 11:08:05 -0400 Subject: [PATCH 095/341] first draft for review --- .../olympia/olympia-enrollment-guidelines.md | 147 ++++-------------- 1 file changed, 27 insertions(+), 120 deletions(-) diff --git a/windows/deployment/update/olympia/olympia-enrollment-guidelines.md b/windows/deployment/update/olympia/olympia-enrollment-guidelines.md index a10b3e8bbf..e23cf20969 100644 --- a/windows/deployment/update/olympia/olympia-enrollment-guidelines.md +++ b/windows/deployment/update/olympia/olympia-enrollment-guidelines.md @@ -1,138 +1,45 @@ --- -title: Olympia Corp enrollment guidelines -description: Learn about the Olympia Corp enrollment and setting up an Azure Active Directory-REGISTERED Windows client device or an Azure Active Directory-JOINED Windows client device. -ms.author: aaroncz +title: Olympia Corp retirement +description: Learn about the retirement of Olympia Corp and how to back up your data prior to October 31, 2022. +ms.author: lizlong ms.topic: article -ms.prod: w10 -ms.technology: windows -author: aczechowski +ms.prod: windows-client +ms.technology: itpro-update +author: lizgt2000 ms.reviewer: -manager: dougeby +manager: aaroncz ms.custom: seo-marvel-apr2020 --- -# Olympia Corp - +# Olympia Corp Retirement + **Applies to** - Windows 10 - Windows 11 -## What is Windows Insider Lab for Enterprise and Olympia Corp? +## Retirement of Olympia Corp -Windows Insider Lab for Enterprise is intended for Windows Insiders who want to try new experimental and pre-release enterprise privacy and security features. To get the complete experience of these enterprise features, Olympia Corp, a virtual corporation has been set up to reflect the IT infrastructure of real world business. Selected customers are invited to join Olympia Corp and try these features. +Olympia Corp, a virtual corporation was set up to reflect the IT infrastructure of real world businesses. +Olympia will be formally retired on October 31, 2022. We'll begin unassigning Olympia licenses and deleting the Olympia feedback path on Feedback Hub. +Olympia Corp will no longer be a part of Windows Insider Lab for Enterprise. -As an Olympia user, you will have an opportunity to: +> [!WARNING] +> To prevent data loss, Olympia participants need to complete the following: -- Use various enterprise features like Windows Information Protection (WIP), Microsoft Defender for Office 365, Windows Defender Application Guard (WDAG), and Application Virtualization (APP-V). -- Learn how Microsoft is preparing for GDPR, as well as enabling enterprise customers to prepare for their own readiness. -- Validate and test pre-release software in your environment. -- Provide feedback. -- Interact with engineering team members through a variety of communication channels. +- If you're using the provided Olympia licenses, make a back up of any data as you'll lose data once we unassign the licenses. ->[!Note] ->Enterprise features might have reduced or different security, privacy, accessibility, availability, and reliability standards relative to commercially provided services and software. We may change or discontinue any of the enterprise features at any time without notice. +- Please remove your device from Olympia before October 31, 2022. +- To remove account from AAD, follow steps mentioned below: -For more information about Olympia Corp, see [https://olympia.windows.com/Info/FAQ](https://olympia.windows.com/Info/FAQ). +1. Open the Settings app. +1. Go to Accounts > Access work or school. +1. Select the connected account that you want to remove > Disconnect. +1. To confirm device removal, select Yes. -To request an Olympia Corp account, fill out the survey at [https://aka.ms/RegisterOlympia](https://aka.ms/RegisterOlympia). +- After removing your account from Olympia, login to your device using your local account. -## Enrollment guidelines - -Welcome to Olympia Corp. Here are the steps needed to enroll. - -As part of Windows Insider Lab for Enterprise, you can upgrade to Windows client Enterprise from Windows client Pro. This upgrade is optional. Since certain features such as Windows Defender Application Guard are only available on Windows client Enterprise, we recommend you to upgrade. - -Choose one of the following two enrollment options: - -- To set up an Azure Active Directory-registered device, [follow these steps](#enrollment-keep-current-edition). In this case, you log onto the device by using an existing (non-Olympia) account. - -- If you are running Windows client Pro, we recommend that you upgrade to Windows client Enterprise by following these steps to [set up an Azure Active Directory-joined device](#enrollment-upgrade-to-enterprise). In this case, you will be able to log on to the device with your Olympia account. - - - -### Set up an Azure Active Directory-REGISTERED Windows client device - -This is the Bring Your Own Device (BYOD) method--your device will receive Olympia policies and features, but a new account will not be created. See [Azure AD register FAQ](/azure/active-directory/devices/faq) for additional information. - -1. Go to **Start > Settings > Accounts > Access work or school**. To see this setting, you need to have administrator rights to your device (see [local administrator](https://support.microsoft.com/windows/create-a-local-user-or-administrator-account-in-windows-20de74e0-ac7f-3502-a866-32915af2a34d)). - - ![Settings -> Accounts.](images/1-1.png) - -2. If you are already connected to a domain, select the existing account and then select **Disconnect**. Select **Restart Later**. - -3. Select **Connect** and enter your **Olympia corporate account** (for example, username@olympia.windows.com). Select **Next**. - - ![Entering account information when setting up a work or school account.](images/1-3.png) - -4. Enter the temporary password that was sent to you. Select **Sign in**. Follow the instructions to set a new password. - - > [!NOTE] - > Passwords should contain 8-16 characters, including at least one special character or number. - - ![Update your password.](images/1-4.png) - -5. Read the **Terms and Conditions**. Select **Accept** to participate in the program. - -6. If this is the first time you are logging in, fill in the additional information to help you retrieve your account details. - -7. Create a PIN for signing into your Olympia corporate account. - -8. Go to **Start > Settings > Update & Security > Windows Insider Program**. Select on the current Windows Insider account, and select **Change**. Sign in with your **Olympia corporate account**. - - > [!NOTE] - > To complete this step, you will need to register your account with the [Windows Insider Program for Business](https://insider.windows.com/ForBusiness). - -9. Open the **Feedback Hub**, and sign in with your **Olympia corporate account**. - - - -### Set up Azure Active Directory-JOINED Windows client device - -- This method will upgrade your Windows client Pro license to Enterprise and create a new account. See [Azure AD joined devices](/azure/active-directory/devices/concept-azure-ad-join) for more information. - - > [!NOTE] - > Make sure that you save your Pro license key before upgrading to the Enterprise edition. If the device gets disconnected from Olympia, you can use the Pro key to reactivate the license manually in the unlikely event that the license fails to downgrade back to Pro automatically. To reactivate manually, see [Upgrade by manually entering a product key](../../upgrade/windows-10-edition-upgrades.md#upgrade-by-manually-entering-a-product-key). - -1. Go to **Start > Settings > Accounts > Access work or school**. To see this setting, you need to have administrator rights to your device (see [local administrator](https://support.microsoft.com/windows/create-a-local-user-or-administrator-account-in-windows-20de74e0-ac7f-3502-a866-32915af2a34d)). - - ![Settings -> Accounts.](images/1-1.png) - -2. If you are already connected to a domain, select the existing account and then select **Disconnect**. Select **Restart Later**. - -3. Select **Connect**, then select **Join this device to Azure Active Directory**. - - ![Joining device to Azure AD.](images/2-3.png) - -4. Enter your **Olympia corporate account** (e.g., username@olympia.windows.com). Select **Next**. - - ![Set up a work or school account.](images/2-4.png) - -5. Enter the temporary password that was sent to you. Select **Sign in**. Follow the instructions to set a new password. - - > [!NOTE] - > Passwords should contain 8-16 characters, including at least one special character or number. - - ![Entering temporary password.](images/2-5.png) - -6. When asked to make sure this is your organization, verify that the information is correct. If so, select **Join**. - -7. If this is the first time you are signing in, fill in the additional information to help you retrieve your account details. - -8. Create a PIN for signing into your Olympia corporate account. - -9. When asked to make sure this is your organization, verify that the information is correct. If so, select **Join**. - -10. Restart your device. - -11. In the sign-in screen, choose **Other User** and sign in with your **Olympia corporate account**. Your device will upgrade to Windows client Enterprise. - -12. Go to **Start > Settings > Update & Security > Windows Insider Program**. Select on the current Windows Insider account, and select **Change**. Sign in with your **Olympia corporate account**. - - > [!NOTE] - > To complete this step, you will need to register your account with the [Windows Insider Program for Business](https://insider.windows.com/ForBusiness). - -13. Open the **Feedback Hub**, and sign in with your **Olympia corporate account**. - ->[!NOTE] -> Your Windows client Enterprise license won't be renewed if your device isn't connected to Olympia. +- If you are looking for another program to join, the program we recommend is the Windows Insider Program for Business. Follow the instructions below to register: +[Register for the Windows 10 Insider Program for Business](/windows-insider/business/register) + +Thank you for your participation in Olympia and email Windows Insider Lab for Enterprise [olympia@microsoft.com](mailto:olympia@microsoft.com) with any questions. From cb199289cb91637e2d30bfc3a646798cb6031657 Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Wed, 28 Sep 2022 12:05:49 -0400 Subject: [PATCH 096/341] Updated single PC article --- .../images/takeatest/desktop-shortcuts.png | Bin 0 -> 211950 bytes .../i4e_takeatestprofile_accountsummary.PNG | Bin 102652 -> 0 bytes .../i4e_takeatestprofile_addnewprofile.PNG | Bin 66411 -> 0 bytes ...keatestprofile_changegroup_selectgroup.PNG | Bin 99448 -> 0 bytes ...eatestprofile_groupassignment_selected.PNG | Bin 101519 -> 0 bytes ...tprofile_groups_changegroupassignments.PNG | Bin 99581 -> 0 bytes .../i4e_takeatestprofile_newtestaccount.PNG | Bin 143652 -> 0 bytes .../login-screen-take-a-test-single-pc.png | Bin 0 -> 594557 bytes ...gs-accounts-choose-take-a-test-account.png | Bin 0 -> 85436 bytes ...gs-accounts-create-take-a-test-account.png | Bin 0 -> 95295 bytes ...gs-accounts-set-up-take-a-test-account.png | Bin 0 -> 86543 bytes ...ettingsapp_setupaccount_addtestaccount.PNG | Bin 45018 -> 0 bytes ...tat_settingsapp_setuptesttakingaccount.PNG | Bin 67475 -> 0 bytes ...ettingsapp_setuptesttakingaccount_1703.PNG | Bin 48786 -> 0 bytes ...pp_workorschoolaccess_setuptestaccount.PNG | Bin 69573 -> 0 bytes education/windows/take-a-test-single-pc.md | 132 +++++++----------- .../configure-device-settings.md | 2 +- .../mdm/secureassessment-csp.md | 2 +- 18 files changed, 53 insertions(+), 83 deletions(-) create mode 100644 education/windows/images/takeatest/desktop-shortcuts.png delete mode 100644 education/windows/images/takeatest/i4e_takeatestprofile_accountsummary.PNG delete mode 100644 education/windows/images/takeatest/i4e_takeatestprofile_addnewprofile.PNG delete mode 100644 education/windows/images/takeatest/i4e_takeatestprofile_changegroup_selectgroup.PNG delete mode 100644 education/windows/images/takeatest/i4e_takeatestprofile_groupassignment_selected.PNG delete mode 100644 education/windows/images/takeatest/i4e_takeatestprofile_groups_changegroupassignments.PNG delete mode 100644 education/windows/images/takeatest/i4e_takeatestprofile_newtestaccount.PNG create mode 100644 education/windows/images/takeatest/login-screen-take-a-test-single-pc.png create mode 100644 education/windows/images/takeatest/settings-accounts-choose-take-a-test-account.png create mode 100644 education/windows/images/takeatest/settings-accounts-create-take-a-test-account.png create mode 100644 education/windows/images/takeatest/settings-accounts-set-up-take-a-test-account.png delete mode 100644 education/windows/images/takeatest/tat_settingsapp_setupaccount_addtestaccount.PNG delete mode 100644 education/windows/images/takeatest/tat_settingsapp_setuptesttakingaccount.PNG delete mode 100644 education/windows/images/takeatest/tat_settingsapp_setuptesttakingaccount_1703.PNG delete mode 100644 education/windows/images/takeatest/tat_settingsapp_workorschoolaccess_setuptestaccount.PNG diff --git a/education/windows/images/takeatest/desktop-shortcuts.png b/education/windows/images/takeatest/desktop-shortcuts.png new file mode 100644 index 0000000000000000000000000000000000000000..fa246eb1516c09dcdbcf371f6d441f54d22b36dc GIT binary patch literal 211950 zcmXtA1yoeu*Bu&^5=3c4x_P53z>7kdAzeEMCW zGP;Hnp)-0Pdm9_5m-=Yb)Q!djc8kzj5uaW0$jvPa6sL(hdaEBGk$X2&Qt1_Rc=5~( zaj-@742SmcF;!dOe&wzW-1_r;?)A$xam1IM3vHQxs7ABD^fZAfHJy8_6BO9!4|QW< z2q)w?kgMouhIH|F%t7siR%Jdqn{;h!AxuG4#kM_9*J)Lo0<~@5LpqMI_qestN}@%5TN-jhet~w`*ZjvQYeW+;+VeE*~HEFniR2bKtR z^Khz{rBL;Q-}e{BnC`iJ!kNP=5h0Cd#pyn5)_I_-WY|aN6Wd3`kMn5O%En$l7Sxn07z>4wpH#yDW2GJTWn#dfYFb z`<&^hQ`3>A5&cYtFQ}oh^t&Al%3!z79p`b8kX8ogKcEIG50|NLjS8OK#e36G)hqrY z%;(XFpFP~UHXP48fGcr-Ks6nLL;f5#zE3ypC_8Zgj}uIJ)U zDqtr;Mv=)X^X*QB)7LNXS7LLSZM)rd;4~fRXK^huh-9Ex*KYiIi0+BL?M&i*dgkGf zELnw)h!%#gqnHhhQs+fS%vSkysi3E)qc-e9nNoa8C)GVZzI=Mb_`%TaX*DL^RODFO zt+VOYx4jlnNs0;>nwNDYJ+sB~>rSa{Om2v)qLy*?VR>q_6_jV@0u5vLttgXeI0x7z zD-Q(BR))R@HLq1L z?wk24R7+`ni2IEdOD36+^#J!@+FnwgRxT4wjgJ{#;nO04Y45`HC+Q9X^0ncrGRZC& z7v7f6V7KvDuz;PGU;EwfK9d=E*Pvm@1>r~BsfYVcm%aL|Lyte~f*3X(1z z79i`6W=ca~uYb+vmF+Xm_l8Zm%&@A&atIGgP6(Zv8$!(PF0lVL!+tIl^Qyhy=P~)( zE!(Wj(f<2z!DeGK*W?XQ#fm_+At0eph$*-3X=$UXIOZS!2`C>X8-!D&>srF+p_bQq z@!&o~KPN=D%Ti_my3brSRCFt%L@Bd|E%2DL-lsoP4+Y12J<8#HgyT7Z#8H$v#O?j` zp&?U7oc2DM#^#d(o0m}E_f^**aYmEmTJPvK8)I_IN?)7|v&Ef@!*SK4oC`eLksyq;&2{Sx{eBYWY29gbl>7hNRMi z{9zaVOa5ax7vBiw6SkP&YAh6XrC%6hwpq^jLJ8R7wwP4N5+yptCp1t-a<=O{DVGlm zTFRAi2cGF8X#|2#gyHs|OK4K$-}+Rbq(#MGs({~GK;COKylNOCJS;rXL{ zGDMf_t0wF!Ov$g!Xp=^P>*sg!j$#v_4z9--AQic zcKdJ9^?^_0sSPDE{ou0>XU{KgPDO&e9eF|CabYWh2R@&i11EyChi_B2s~tUq*o@+1 ztwRQx-;&ZCUHpdJk0A~e&?|C^cZy^{&M){5W)FrtLN5uSy!$?^1mHgzVkxt#9xQg_5ys0!FWWq1nzXf@r#)X9|k>Rlm^UbcEK+ntDJM)p9~pNP0hbvMHjzKjQw z!d80CF5X|GC%+2}&dN7s%@t6k zh|HH&Kcm`>V!*%$7Xr~(ioD3`w3KHGHOjQxmA36l}^@B00oI%$-y|u-Q5~?C!Dpfk*MRq>ZqMUV9mK@_S zsBdN@^v82Bo&}{P`fl_}x{(XcyEH9OsjBKcR$5^bSM1$a*JTVAvt*v+Eo$(ZbB1zO zQpWVeIjNF;U}!U_E#AKLM{}cOl`MRxMv$UGy9iNa62}+stb6!E>7-Kt=!m~;ImS;^hD~DmpOY-T>3Ka_j053fon73SE2~9K=YjS?=Merh7!{?KY?Pc+>thhHzuYi!2 z&yo(Oan47Cm7<<4#t`UN$-Ct9ZL6DbF{Q(&MddV{rQ!^KuEGfuP*%@W%MhYP6ke0d z$~keivlG%~=*{`qZ>U{!nvxQU!7knKo~!4!%)!>GFYSaJV6On(+yHDT;tXN@gmM^O z5}swH(NYBrCJ}wBU~BMTN~1NA5KK6W&r1|pi57|S=MM_X`a!ne+50RC#pF;v=XRa0 zAyu?6+J_<&4Ts#GfsXi?&;CL%J~w#c{7I}wPUyUjgP2*F2^MP_N7=5Us+;J__;>k= zlji3ecgKalm-KYxB^0eWAgyB}k9-kN%0;rvt@qsDz8#bLgi5j!%ttS$$V5*cPD{(t zqibS>S{`{zzyiSOdp|D1+=5PDC_Gum2k66{P*IXn+Q-bB7?V*#qslf(&;~t3yGNq_ zzU%oqL$tHq(_A9{m*eJ1aNWKiUOQSHf(|}%9D^#?HmaXn- zoa_mfSO7xt2c(8JTk=SoX}$tYt}0Ht%eF9NMkj{Fg!MxzA^Vdev_-+;7FVxR@)xIP zg7IgntRiV?`A}q032Ui!FwhIp!x=61cSkt2v9WEtx$Tnl$PzF$zs{+w091nca7iQk zbq3ZP{%CRe=hP7i2COEU^@3MQ2_jd?A;NJK(XVVjk*zkT@6^jZKJ#A&`t%H5JS|JL zS+@MBK!v88VG~}wb3ZFj1=dl@Sb!X?KuP2M$gaAHcpXzd5{%JIk-hF%{^ zR^;B{e3LJl3QNe%Bvcca?E=G!qc2IZOt3TMEVB-lF7C*_6ZXQg(&PxtQoJ2=ch8bnuyWC5}!AKzA?VM?@N{zDD6XjFl|- zBJf?`mISn8A~pxyj8T)<1h}3-?^Y6$i%J`U$QAelG7%puiBDc?joJDY>7RQ8k|N7F zwM;5E@J0q9C2O^!E09HMQ&VtI+SZ7^x$uA>XYaRn5R;M%D7dwhutBXZ&?zl7pzWI~ zWe9>fasOsEp%`>4`{nSQ8q_ttB%8An@7A)NB``W_XtKi>T#?erRkgJt=MM3!_-#S_Ep}T?kTP=E&C&Wb>x0kf?0lT z|K)iPGNGPrjGxk-fddWDfbU4CFzIpoO0l#f__`WOLBd71LA7^}+H;|0uoI!N?PVpX&hqvvU^3}cxg)jskpbk3gnY`#>CEdf4wl>*mq z*r(*14XLjQc9LKQ=S!;eU)pn=kLF|P43iz*HX8z9)X@@i1b(aP`6fow_=^{dtPqIi z%uh{bF(~MLvmF_XbZEi_efsrs0glUJcvrP5CWZb(yGCZz(?7E1;d6=}}&W~+i?U)b457X7f zpVI>U9%s6?LAx82q$PzQLblds2-oqQJDXV!8r&s2NT)ex;JaSJPQlybAD17aEqrwc zzB?!SH1AYw-o7j9t}64G;nZo>SC;wHG%-9;Q#e(lv7mg|o;i2+!rq(&P`pdu+R9J} za3>A^`Lhtk*D+!7(EbsV-kKE?`Bf);-qc}D@~M0Bt5o(VExb}xOw1Q5_h%~6Rx9MK zd^i=0K$6~3S@KA$89SU`nc_CniPyvhPj>Ww;s!DcyGsp&b3Jj(L@;!wu|o$rpdy!) zbbK3FBkftn!B@+VS`%i5U971d4~7?Y2+t}FctDb3!<}0j^|qRxbOAHL1S>|X4(rz> zv3QFT6~r#fe1S^#j=YxN=xnKH0BlL(BG7S+j%1uldDX0Fq4)zqdEA(e<}rpGY}Q{1 z#{?KxV3%HXL&42mLXn=sd%6S91$80pK1zhZ#HF0Mc5|E21M8`7mU(u~MDl*3Q`L$% zMiHV${_G1D?knKK)p4hLiDgZRCw%8=Ejpr~0cVNs{zScKm@39~#8ddazR<6nk<7d4 zsYCy5^^Wd&DSyhf<%HkkeyWwxb;RBsigT8mrj^RjIUd%lJ7B2voY#|3g^f8&2?BAw z4(nR=y9c!htZecUT9^AuXSiWMkG|D596UJGlyNe&B|%;L@ui%~$yYVF|II*}=*fAB zPQtg39gjL)fqUO!Vjr6jtd4cp7eEoKF@}P>w~n{(5^#JF?-6z0>fgkxjsD>6x8kdP z+SLSPge0>6=y*#DA=Vhvqt9974Wn@onN08g?UZ+offwX^6x`j{#t>&hTcfF>gvTr` zleUY`Ll5W+p5X(a*0l=14<0@ze9oNMKG$RuFBuQpYFFB6z~4#)K{Z;_94GIm=i&q_ z)ocBs^IAP<@5<^Rw1ie~a;@bdHH+*gJMpXsT-3FPT99Pt#SlG-d7x|rwaJ(cJMn7fzPd$RW@VVL>kb_H+|iv*8AJ~bU#0bJM`-CtKaEy zy)SVq?9Eddd!r5p$+WA3y<%1fwZ18z8qirb0n3T20ftAnv^l^A(6+(Fmh3z>-e^nx_!!7;;}!c3k2iWUVJtY#7dcInA_Fi`_Z=ux_4s-7i1MOD)64UJ!)Vi;k1foGwHv(`cH5#niV9jfC#n=_TU1y|}!c>Rp;bre-rOh~z#6 zn`u@f+fg;Adj8S$E-dqLh43+Y5ru2Ra`l%9ql>@MbcGg=`m6zCe4Gv0%9j1=*BhpA zDS6bX1n%$!HT^@PNKOmvzH&k|LJ@9}qAf*Pxbc(_ghBOe&Z9!~;tUP-1m4o!Nfr`= zLdp&3=HMQ`l20~cUA@GZJqCBZK9aR_ zR!5;YFJ3$|yF}>KLy`LNc}32mq3kRE4MfK5ZMn%Yg>IXv(7_jbrkSZ9S-g1^B%f;0 zm8c>oM@`wtU*XkVmvQ2<8yWQ4toai<`FoRkIZ|T)%GtfvFX>)NKZ&M$p^QuQiG4{& zzEA5b+bm8sJubG}7nC|f6b^>dfZb~)&dt?qWKYOSKb(IU)r zS^g1)j8fp78^8xFYGN!NKPQvm?4vBco8cKxl+e@_edZk?yJ=$xECi)r zDo~SgOdk-1=Tojj9jqgNwA%JAf zwt~<%lu}xL-isLIVWuO{j}k40DAy^&F~0uW*(-r8!<{j2ZkZYAuDV$P`?J5TIl6^y z(nDr9$kxvSx(PgS#KauTYx6fo8@eN+Ad@OYROIHQ-82MBlua@q-mUJFEBl)v&gh?i zh)iqeDNA%!qyzzKKvSJU6j~7!KqPH9I4JQM13>A@prrVUa`soz@0~d zNsq2z&Hw(?ZG9+uQQAB%_HsI#h(_r7J`pORlrmrv*B!@PmdpTLuyv{19U@G%lPFj8 znn%RZ{GgXe1P=$VHX{|?JnsW3_M1*tg5lFFQ!A@#Zd0FMbh9Hrt{|`ETY9tux~wah zVegWmuU_YWB-wZ<#$F;+Kp3q>E>SaKUe)f|(9Bb9$%`CkHgzd2r7CLKaF*2_&l^%r z#x52r5Vhi8CZlr-tC(9TZhcfFZtZryelm)ZFa;&-Y(_JI zI!?r_X%)Ziz+5FXuSseGw6*%h+fxr?Is;|`7x@$R-KlnA!p2mDvEP5^iS|{BPw3%F zsgM#);-Q%Ar}OgNyO;Fq6!E9RPrvl@jL^H&z6uu>06r(e1hAkto@5SygM>rdn&QCV z+rg^q^?lu^nuiI@KQN*ah+0vS+kMLi-Ejy1e1>*9;-pq?)TrOYI;y!zR4fL9wMBxH zNb?rn@*a^^?fOdF?BKuCmj(r>B$et12grNJX}!;UQIqoxcXDl+A>hDL80Xbbp5%fi z)vgiW9m_|b3V#NUMK60#tJo>iEvGe8_|F*~N$K;d+&08j`1ppLttqTT-a*pmrN_6^ z>MC*tLrHbh4*7EN-i$R;r7|eyFX9Qm0n&@wmks#k*B>jacyJ4LXh&M#&-<9}C4H87 z=%~aC^j?+pUhYz+x$e@s`dRMOWfD)@1zlo!+@HXd7+=GOPF$Ct;U|F`JE=adZOK1@ z+m~Dj7YL)kulAbm)kkirj-^OVA$}>Z7GXWrEsqyQpu3jcshn~u!mLG;NqEt&haCfs zpW4^J0FRUC*(`rZ0?ie4;-qB)e)}f??w)pGJh@u0H4e^!_Y~w9PhYg;O*}O)5*JxH zq^+>&eFb3<2B{HwEW3(dHg|%LgDB+#{9T$K=-&(;mODuavJ&PKBMZ(eZV~(S%9Wy2 zE3=N}Zc8|S_aus1FCh^TY9yytNcT6+v!jrf$UIhnSf@RCyi;yJ8`%Bl49cge_J}gl zD_*fO*2?p<6!iT2Egs4$`mk(hbyaOU&qx@1qehW^$J&*JBU8gU$Ym?r!`#rLte$wd z#8a}1_!)_`(X|TeN|KdFfC_W9ox1t#AKN%TJ5p3)H!9K`r}s`iFHav{j{j_;H&?=u z73@OE00QbJPnYRWW10Bdo%>K7-nS5DdTQ{OOPc-)q;bT~E9@!N;kHTdL#1aK$}Z}S zRY`ZIo&L?n$vVTMmFkVVEjuT!y`WyZGn>RlkToc%TI*OOp40dwD|B{_y4S}}FtEQy zJkXCRv2M4Kq@mR#$6bY{#y@Xr z#tW1;bszIL(n=QI6-k`?s@dyHqZKYUF=9r1jdIM?N%A<&0?8E^1<(^2@Y8ea|M{6B z@+$c7qYmb(XF~s)gx;8|(+e-ex$Uy9$sT{yrZ98iMMvm_kV~KtVb0tCX8EA z+|jT&D)-K=WLfvw5B5vrl9&OcQ^Db}+jVq6X*jd`E3ZWI@*6eag1#m&`nlTYub z(hZc*uAgEdua-JYVEV`czubz~bM<~dGKZ!4D>tU`K7ZK9L zVm5)xdXwo?%(?JckLs9f@AE$#=KP?=V{#Eg;3rOhL`I+uOH;nwy$QbQ{C^BWozN_N@|8?GhhBY7Gswvq7A?BK5SkU zd(15@un&>y*Y*3BA7TP*uWXVqHACe}tk+3Y8RD`idL9KhxL!?aB?<+k;7hG9j$QGr zk*r{@RvYC5KX#sT;o($#6i5{A@SxLOYLV|7(wOOK9Tz;7{BLltUGt6h$YygbrVpi; zwMN*Tcw57rNM{8j#<1;6iY=s-K~ZsL-)K1b{nG6w0i;3>JE-nye4iNBFLgz5ZP!~l zs0`*9T+W|FCo=xTS%(2bA~K|u(fDM0gE4=m003^0;e><$K^b+aqIhnESY5Kr;c6p3hW2-~=P|!1<^DU$ruoLM z$SSS`oA#Q72ID<^i&mYZcqc-x+H)k4`?{hYLVURJy~o9KX$S~tS>PJ7{$=3%RA4d; z=`%fdLn&#kEi7?Fp8H|$)DDIzT2j@_-YK-y=bb8{wK6y`I zQZcCIp%G;5^s)kpa3@A189 zv95WkU(Ll+%r@|fAk%YsB1`>%A1vM0evm!K8=$C7B4n?``Tmm4s7Ql_ZZ2{8bF0l~l?#=ei z*=Lff#l0TCqS@^)+r;^1^@Pj7SvQ29@o`wy&Eb z96Z>vPq1yTj8ZVU?MvMfH2rKP$jUsYJQMqyyrgf&1b^Mtx7{#$SlExJ{ljgj%hSr@ zl&0ym{C1U-y&vF{1T>ct3ca@W+05l_U7~a#>HaaRG&atkW!}0u!;#h?jxMn8(=eUx z|9=*sR>1wx&S*|VVk67+K3jgEpm*DBPD}^?rX>JgiYjTP+}h4Mi}l|ywdO+6uM&;) z_-#{HY;QuuTzyy7*{h%EFqIHlpXi#*`R06(2sUDS=Z07u+nb^c$1qny%dp0DU~B!; z3eZwH7eO&H9sZFl6xvWW^OJSw)xTtqS)s`H>@c|KUM%1pj}vh^uqIh&cRkSsciYV< z2p6DrXn&~G?pe*Akgn31oJZ)$s5C{7?Y03IIha(k4O*48_DtqL!ItF^Q`pmjrd&QId!|`hLf2zpc_XJ&R^f-vr`y^ks;*}Z9j}PaM7}jo&!>& zZ@+vVUr@O+*ca_)W^EE5sHUM|>FL?Hb7Ep*vVVN+)DrUJ$Bz&~ROH8Khpm~J=exVR zMh~kiE7=A)|5>N}$AgNOm$y`hHE!fnMr36rr@Mzok-;11)=K1!UaYLFzyzb9sXuaZ z6r7!%%dFh|0%I>0=2&8@QKp*xl3K<47BLDkCD~-y>7K^Dn|ey?&yTAn@;ExGQyp~e zl&r$w?%`EX2YhN`vWw=T?kiLYNBSs;?Td}4&05*eST zeYqr-Pj^NSo5_Wt9^Gu!1dyZi32~Je#z`wJxZe9vrMY0e;A+_>qI92>HfV8WNM$z+ zC1KMuH#Z05-t;q7TY};ut(X`YKOYpOZGJVoe|>elLSZiq;Qj6QaJy%TY{sTv*}pmP zwZ?Tv1s4~0eVDDP{{aCPpH9&J;N&z88%+6|L(CimlK0%J=c!FIC-%_5IElMY%ideD zhA$fioC7Z?+OIoK28z`(9dZYdI0<~X$lXeQr;gm{h)$N4!3zI#PREDyQyDxF{zClI zr+~^zglOEjMBwz9f2Tkp#HN9!YEQo;w{-IhO2pX2goZ(MT#bluARr~WBe<9!x8zXo zJ!H>wWbr{wW#5Qqa)G#IRJsQA{8kfjohpQ$kzj`7Pt^5#O7KY;DlEc0- zmC^Vlqo9E<7H!rdHFMp0_O<6B(0wrNy}12SEhID>#KXH%`o2+U+X`OGY%?RaB_ff( zO=e@{Loq}7TLaGcA1~M-k>4n-3)tV^mohUm8)i5!dC$3}=Il$%r`C77mmAOJzwuP) z{TZ>+5UYjA5(xzjgf! zxy`R!gEu$ceIgoSXXxW15ccE|t8(KeeEs(>5hv#ktLqF+UaMrP0sqy(h62}?Z-Sj?vEGmH zwfKv1QG$4hJ7#L{brkjo$C1BM@F4k)wejklpsIlEi-a=xNr;jhQA zRd&xGbqT-&mRFlZX-xh!H5?-#}2%z%iWlH zr%_Sj^P4tmeK*s25J`j7en&j_(~=0{Mu&w^SpxBy26p)M325zpY;8SJm9xhML>0A$ zIQE)v_u<8-6atulT}C*X)_>E*%XxVT4h{}}-bvB_aJD(%4Q^YF@PNz>mndxs6V@;|>E2#0zPu$hKhq!4fjP9}Q#g1x&p;;9yAT0s1m%HPo+-t8+&##~HDuJPZ{hJW^7 z$;p2vlUG+q{I}`NjnE5rgW%Ow(`1#R@~^3WhFF~97aDwC9@w;~vmW`DkpPVAMK1Se5Mnt65;#g?P#u~Tma$z2cNrx5|=T4@Ot~jc;9zL z>gcLK7|@`$-=EmR*O$Dmu8x$9tf#*pU8P7{Jl*GN!Dg%DB!J7;*B41l(GL#~z8S>C z#Ld^MerHIaZ(>Q_pj;g-gk?Il4(a>2n}DW@RL{5`&$;HCUFiPa;`5zi(4}HC5>{tO z-_ukDK<&>`o7x$^i_jw3BLC>}`dV<=Si7~jxcKu)$MvSF*&R`3*Ml#m&}YC)6L+nE zQC;n{(G9vL*5zGW+qQ02EzzfUW2#23WI8ay;>v=f+`_}pd*j*2GHlS~MD^EC*`i(_ zK72q87CwD2w8@S@7G^Od+mMoyc1Pk-RGasp{tfMm2>upWr1ak zVXHff1mZwr>o0k5G%cgjqMITP^|xSELE=swFg;v6JZbEZuUws^QBYofs{I*7i~+VRicp@K?64NqQaNF|7`VvN6%?u(6ol3sXnWJR*LLgg;Y+2&(r(W%=CBn^#wf;K5B$s3tmJmTW9IXTowil^Cw^4pxv7%GAfEkSU6hyS2&V9Es#Vy-{ee_6ZGJN z6rs96Jqu*BpNHXpUCvxa^LPWg>3!K5Y?I?N*qD@LHB7d zMKL)}!(#Y^|9P;s^EE{=-OHT#YVl%^NgN`J8- zx9vWK{VuLL(IL09k)f}<>2y^)ZJqZ0KrUupIDE2c*Fv{l}|efwX4v=pgGM(QZgfM+`-j1{}o zowo6RGSa&3>@3R#uGu}FG!q%lF2mfkg%no9g9TJoDyMs}9tq!*E~ z?86rwJ#(W)zq`9T-F(?4G@u=kc4-f@#lqNHq;BJ@#r|AIt<&I&TduD5&BC?)ir47T zPs2>o_ilLqfX&jvdBICT+V{UNKltM&Sz33B?*v}9Zrhjyy84$tT(7!9-iC+=Aof|( z{t)LKB@FOmzf1{nWdIrJh_5p|gv7DTI;w8F@GKSMM{u5A&{)~&>R$@tBtG&6$ggV~ze6;a| zB!QVPQMbKhB$mXzuY=H@z4sIAc+INrvJ?~Z(aL;AkOEJws`-;T(g06vx@;*8Gcr;G zN3*%RbJ4T0i;2Fp+~?hqUYnWV>=@ZjH;zC-iO7ljE%LvE%#m0dXy9;TYw&VEPf{!b zIo*8WLoM*Zark9A&OV%WEuz(N|IbKUCCe8+Rbo0%E*Z!^ImNZiJnq6|N@QS3jA`A6 z%#mJX>4TJvjRYGD9KrMF;>(B)0`p&_y&cA5JH<%zv;q*FO;t6D2mLps;YGWC$hfjx zgC7NiC1Rp$wD^`9J+PM=EBoo=2K(J)=ZlR;_~#PzoXuJm+w?$uyWE`t*b@#UgvLP; zOlKy2Cxo}G#pe*)u?rp39tUlVc?+%Hc6~mh> zFB9Ym?I*fH6T*05fMAeIU(sVk8%UA1|JCYk^wZCGPk1X7yRJFJyzb4+p|WP(juSe5 z&D4Q!9?s%(`vzzbJUN4QSphpmLT=sn`+H!s;A^qT2tyt2M(E3VKC!r=6r0VHiQ8#k z(1)mKy`wAI)5*;;RNJ9&LzI335U;R?hUj4?FhO2RWR3 zb-nJ%B7^D)Y;vw%1G+2yoO*R7mz?mOtL^Z7;rG|Qu+0TJj>9|Cl}(PIcwbF=7foB! zy7d8_Kr&jYrX+nMSsbBC<6Pa<&TkbE{#mat7q!CZvcXoeDrHeFeS6worjr_E84^xD zDKu9HZB$KKi>&_^J+$~hK-?-2Z~V=daHk7gaC0~tSw&dd3fq;|RGsQ{EV$M)dy)Kc zJ*U$e=RJ7Xj#L4Gd@gFQSu*>O1Gw>o(yx5nkCxM4b5jP;eDS_q>U_5QxEQq)W{(1(n|Q>3yd9RfU%3uM z0SMjB21R3a20jZsRicqNUzyk{x_-cWn8qar;r7+AOUb^ryHRPC5`3d54}&PLzzxYW2s|j%%q&oBuF5o8 zd?bD#8WI%B6?h&+y3jzCw6zO-NRsp+C1`h`i(75Qk?k^xOXGkGRNfC0HgbqyGErU9 zz4u$lp1-*Fe5>}Y!9R@qY*W^S5Pwj#60UK7*h#acpGFnW4}=aH^N*C-lK10ey7a{P zowaPyM|#CszHlS;+kH8IxkQydsP{f-HtlS5j@F^=p{q{aZ(VqV*{>+iz>Gpn@@ zPYvU%D2hO~MzDdc|E;;5$4pc$Ts$+V@ZEpi4$qKvSyhbh-@aj1xKfh=Wee$JU&6S0 zd!jn9xmwrTNEZZgqJ=4M`WU|*Ertx?xV@bjI-}V*%+%j7Ioa=>x^5@7Ke-WHK8s@F z7A`@X) zI3J1EvDW;aBTwaB*PLv?jWs}ul>xDCEHu8$5?ol?D(g2*oAr1>-Med|4&EigA-c{j z#DF}F*o;2Rx8LBybS$g_iS%cgDW3|Hzk_VgMl@Qru5H>HA{HOq?r>s2#Q#$6jZV;( z7VKPprxDN4v)Yc#vO#Y$BEX8Bf_pMTo&9~wv#72@nr<$a5h%m*Wy8cqSNx-KI|R>c zuusyPaO{=-1pSquRJOTz08|j zs%XTw3Je7D3V;^hW=mYAMOP!^B^Tp!T$$>N&oF%To%`>!q&{G@PDZcJQq(x~*j-*; zx$L@^U5E%RS>zVo8g;51{9DI`FA)aXsOuzypz9R_Ig%+x% zM*NK*9I|*L*Ow_gwf24pFUZX=2!U{Z(Hne`OYCyVZEQ;SPY|0p5>jg;56B&!Ex$nT z?oi2nnyo~(kRLCjOG2{PxoWBqy6StDOSwf|>F@pOBRB#$4F zwfGrU+12QJe(+&~PCKao56~_ekd1vw&l1xKZv2oF;d$Z#K3<|pPJS~jvh^_h0+Rbr zVKE0#sS|9A2UwMpz7Jb9;;s{;`TU-z`Ng|g<>K;?jhs%`0H1E$&WsMZw2kcC8~d!z z4@{jt4?d;smnjC4&6p5^g)bz)IrIP2UV&PN8XTqE7AJr1oF5cIGFzKcLuvhLZjr4) zSji4CN`7A<|HB^TL)9nmtbB##twXJJ&#E4gOepRYe5x|1_i7clt{vQ}6qeqU_A#)5ZHLcunP0<6_az*(?4%$UpTOY8w#wgqkV3L9pP|ck7QO za}VGGg!V8@{Sm$yV~9S~clV+SOkA_IeKgCTt#Wv6DEiCMsrU|F+9d z_G!?<&*h*b!cY|D|4ex;-_UP|Dsc>?glM5an5g4IbVWI&anP5ZAtmo@?weGCN@?eJ z&N^JmJ~&U6P86~_y`vOE&a18G8;LJ>$MF555Gnpj} zw6eotUo!*0IUAGI>T@Hff7dei#?`1K7k7*6+4tgNBq***$9`;Dv+w=I45RS~AmJ`G za&S4;nC%k!pLM7)&#G)+Si7E!VN)55K``5fj1%bWG*e>Y;R`=}e#YcPX1>m0ivAB( zQ-mJptae<6;z53xdf88Qn?S5+qJQXle(7mlD{D1<{Rh1-%&J-K!#R%T{J#gwBx(}9 zs3Sol)FE5HZ<*RUsUSU?WscInxB6C#EL#AFYrNsX{mx4e&A-7?+6U%LIphQ^=h{*P36{r4 z;9NRg9(j{;cN9jUeX6V~6jjGm>nbYvxpxtCnjVGZ)IT?7z)4w@e%cA*VZs3xf(ou;Y~v7FQqSM@Q|VMye*Z>tS$LJFEUrRi;tACpYUXqSA$rK zILE^Hqj_W!DMjmr*E4qIdpWD}mNH=JMJ^>wRuIx+)>t-2!Em{b_IAeq`qm2RNBEDL z0xRy-b!Zf(ESs$(LUdJhO$m}S+S4SJeabVrUq00ZMegFE{3~+YE|^3eqQ`RMulaFB z;QGPcWgBNLz9@t#q|bmQ&oy|63bX;E8iuvFixFdjV?4UXkNY0?e#PXRYuv&Mg_d&c zK|??9UA{@G{#W4(6PpM1JybG7`afDx<+^0}vzDQv>#=avN_@#zfs>r_sUJG+Xdm?E zYgaGa33kDft{eYJgJk|Tn;Gs2o9%cN9+VW1ZO6C$eDh;dInO06#fo)bNE!_jx_ra! zS~;Gke#-xryuq=&PPzPq@z!;5`&fEh_?lY%VHla&-2R`EzTQF}b*T-6roq8#uj+)G$ zP6YE|;D2C4&fo8c?i}ay*`&;MFK(9Y_Y|lKczl!vG&#D@7{Y(c69}i6QgFRaX?&Nr z{fAL}nB3>v+^6<9Ne{b!b06j|q|BhMj+tX&FB8KjUcVW1Q2RZ`B4y4m#w%6mxi6FQ zN^f!Ji<|Yo**mgR$#YUZ^cWgNW#6{m_#(w63j3{2oJ%X{Ote-hAT{ldx*r>#r)xfJH6zvHsKp34cY-D5RA4k7)Yj~aZYOSwCcN5Cu1 zY~)j>#cbiX)66ZE2NkziK>@Emt;~;=?FleO6XySX5^jTrZ(t@pLQ}($T)y-4Y*G3G z$U5dt%k*E+?6xmQ4+KVkuGmygj5OHrk33TJf_$CApM8!f_WxMj`F(6DYXEp>+nG~k zdjWelBB=CW>P#hCWJO_s=&6uA%XXO}cvwAX6MQ?-{l5DgUF|WssY5{fZZ-DR11$>a zs8-rir!6&?ehQD_5o+hfCYvSolB3q3;J;lXm9HyxmDBe;GZM8iA;>gtIK3NWnmBJ1 z55%-_!Y?l4Q>cVpx6cNU8!-Lz%AeAyUtekmx>*~9}=bt8=s!%Z^Ze>lgh(fgY^&Yc!u4PC8P?I| z*E(-KW$B8~6g-d7fVfKiY`{Brnke4YdP@_*jfLH~yxKl^{jZwm-+#5&^DAl5 znL@tz;WA`mo+3@+ngqJ~uJdDSe+8NvnN0M0u!k{*R7b6~-3LhUkJ$3*L(6PCdF<49 zy+USR+k;+3t1M-u@#rFyHtAEYnvBXi@}>R(N$0t|-|jeTXR?wxi~)hBMKc)fD( zJ@-6kJ@4~=&aIeL`n~hEAlKATbp55?oJ*bpY}5|xdno3WyJO=R8)fTjR@=Ji6P${YiA?e_dVs}KB-e(lj-x{8b%D615s8)6~(r(Y!V^@n{u!& zUcph;{A#ePDZR$eUi(Lb0n%+Ja+bCzXyvqt=t%1^rC*I>-aP4}%B4Hh;95}pZs*wW zKf73cQN#3rCB1P(?!FdA>mTAUKef%iRz1xh;S^l|8IgZu*@`Qc8EVkIA+^&tQrpJb zvT>@&`_5%N?I!0VDjxf&NV^~Z;57r3M9msa|LvPme?s)3Iw_xtK3X^)S?(M3W$flUJ3Tg6{L7PA^u2;nuv0ez&(BcYV;%W?im#1 zBj}~IjJ{4kbc#q4kCSjSj1NBfHeLU3Z+mDWuJ!5b1U*#GlH6q*vVbyXcR~LM`b>Jy zH?_f^`ul7bQTN%%cI|735;vBc`JeFCeQL+4C@jtjVP$x|l)SWQ>SHyT++``Fry#R~ z1hfb4lpif<^>OZF;vFCT+gOs$D^&}qR`Z3PbKj5AqtfX+dx|^C6idnF_n4nZCTGf$ ztWm!-h`AnQX<>E6cdm$FpFwpmiV8()UFlmDHqS@^(AUH{Gs0?Xe9dcpFcokCVKf35 z+C6yt;ZQ@|%?B{Kf!E0dc2%DOWp!yQ9;FT8PHLLDjYWQNqbbe1vEy;5UGH(3OQN$t znRRjv(JD9qM{nE!J|4cv2|J0v|6l`CmVDQ9vpRueH09`z5-DCSFUqV#>qPy4jD*t? zxRmGM7DUS&(*5LY1yc=>aN&PHPeTfq?khbJFD+k7+LOdD8^^xWR8D)uI-)ihkVW%Z z4O8(tyHWO`eR1&m7SE}rJWigiEhdnpR-K?I{#=K>H>BFYtX4BR=(tcBSRnMz6^6m* z5;Sfv%B{CH*YY0guv{5ARSMA40Cbj4l^UtL9v4|Y6<}74Fr2E*Q0{#@hkUC#^oeH2 z0)M)+za1uim8N`+F@H{L9u106UJBtDFTG%vc<=GDH&*UG#qLZ_EL4x68xH#d$sTUeDeQqCjHl%Z`;gYlPsj!#xXXTyM_otS! zpvBa;g==lS#9?(1PB;5m;U9U8?~=azT|d?InfcvFc3kJxY6&}cvTvE}r%9PVo#J=4 zhnSV8jVuUT8TMfT`(ksz@6ItJ@ixV!wN;az2J$vcb7{5@pxh+{Z<3cy0|hUtt?kDB z9eTX34KY@4zLRbHQM!tzz(einu@%H|JUTbQ#t4QPa3tju<<=mtq&$8))6j8hIzQ}K z<{{=5ocmmt*QS5>uW~*_54l7uF;f%_YZE`cWM@;-hCN`HZEC&AtE&sK;roQ{xkRkF z+uoh}-&f-@9T9H0t@8RY>x_${fxAxl7hkG}h=wN9-O+5YVJ)ZrCoF~zFdHpwH_Ci`Tw6{0(f?x5mTf#p@SiCHB?}ZM|g8vJ2k+b)W#Lv3{1)s9z?HK8iY`CV@7};%yNzl1Dj= zr=g9McK`WUPR8_?DV-fNIjvMCbj+9-ZS2a&54LW$vE}1;yqXy-3x5al!LEwtgB>{T zo726#5bkY#N!(Vb^mq;Yen&Nm_B3&sF*qPqL2pG}yS)?4uQaNCcq}nS5FJhmXrqIg z3XkMQd}*p-Ew@3~NrgMr&6ZB#M%iO6E@d`Mx2?rIJx!92EobET(lMGq0F=739bn!? z3D$8)a!dJ;4xt=^KVGND`=Io2!Luub5uYm#E-6h?Y4_WJMXO3yU)uwI$b&K}wj_vXR&SEW!`@SOx@* zh829z_Dg0X&pzA@tJns+UDA!ZzhRy`uJsnfv!xdL-`aWT?=woL;eufTadC=DCU5EH zq&%)dNG#Jwd|gRi6ZO1$->WP9etKNfjepwHI}b6xN3hb2bUHsSwJN8(mG)IlAePrP z?eSux{o$3X)DbaX?l*>B&A7Gpw(_U*WgvA>6i%C8Vt+oN*++B7|b#poU`cru6bEH%980f*7swpOm zN`5zZAbTOO@UU4y0PaQ0G5F^IGIVi5{*#OQ*T*LE zgC9+z9!Whc&;88+dA@c)(<<9$`Za}INf1EPN7P+zZYKd8@1FU%Y6Y}w^W0VVRJY`& z?_JS8zL$?u&P*I<9mQ{B@=RPvtxE9V!>_pW0C+SY6KH#%73{kg5qW3naPf4xH-=6| z0l}m!#AZ+uJ)=v0TCX42dFN61`p63QWW}dKXT-+Z%deXCs?(W6tRq5JFOcamtHu2D z@8hrz4eW>Ju_r{ z%QKCGsRx`FyH8p8UZSRptP=e$*=gq_s=ZM3gnr0IR|y^+n=I7K0CQ|Vm(J_$q-X`J zxRTgkt7|>HOuBNtUtTEiRPg)52Q%yEtOzVCiu-pch&bZn=zijSs-;wCk?5@l(V4Fw z%ome#>6+|)?+st}wC)x=Fcev!9RYY{rG+yuaewe>{+ol$$w6&DgUf6kcS}mU4+S5x2&NfPD(F7 z9BTfEpie$Uu&(V~@8yAh5T;u4xDeDBpWj6lsM}3c%G=6)`^CJbMWNEQv2ffg)0gyR zXQoZk;1?lY%YAgX=cfXRwO3qpE|Ye33T|UwBY1F-t+YtI3M;`RtCx)q?rEXcO`&raL=I4yqYfITPMwZ8trU*Yw z6*L_G)ozSk9;-Al=H70J27`;J_UImgS<^=kvuH)cp(k}mf;9hO^XQ?!5LtT&IT~C| z!E{)qUWpqJXPy>@DxgWHQa5 zl4I(@qfw8#`@DFS%59_Tg2FNlXZy68#iju~{%)6Je8VC#L$g{40#$sKn85qY>;V!-@^iuCls%UI`-?QTt zM3vx!Rr}Q}zm5ru)I;=?t+`uyX7cGe{LU!pOZM8aaJaoJUCr_mZ~Y9_n$!CZ@NXOU z=FO3bR&~w~o(eq<){eRIwHhdD3T`Pe1{!hGyGCgc-GA&EO{3M1sRnr_Y8sr1LEIVl zPEYf|rcp>V{V%3nJ1wI|RH?N$efpIvM zr&RDIs7-%&vS2FB#VI)8DV4C{k|iL_NVAv0{iy_&P|)_3L^`k{AdXr}VC@Tm(+Ys` zRjK{vDh!bf{!QOyryVX^*xPDmF5_5xMZTpuDq~zvxsqI$1S_9nyy*uRd{pOvJeBfy ze2bp_cig#x$=h+tEr$#PYK3hq5=A~FAUR_9_HUu@ z9IU2GAsAw!AP7S`MW^13bYPK@0h={yTJKWw>8Mls%9^oOMUK<`~+6d9W+H;8IwQrn6YmZ%3Si~(XWUFzA^L+4poJ4%n2@6 z9ebYa?rb~!5qGwW5}3^JYQZ$RE*h0uMxfc3$n>jR_H&hj*y95aH7IRW=j$q;ovSqW z>3dT9#ZURiOEJBP8}m6HE^6aGwkYahmu-PwR>{9sUw5(HI64Gr`1sMY42JI-#(LPc zw^Agv;`24TPj+o*jr>4ylWkw(48=g}I`~NFHgkz=5`z31am-py{I8n2{L~IkS96eo zGsnGqfnk%Khd>ZJ%bwq0Gu8Ln- zPHF1v;E${*q}5du;iQjnWRw-%V}8ehr2mS5aigEZN&jN0c8Q0^G_RWrW z=H4|=f39z>aTAM~KvZ=Vp`(Sux~GA={2cRv$`lS} zGI{%*{9KIuxaDs2QTuiQE}C|}yJ3C}WtDAj)U`_yghKlC6=u%6=(fLZ4c6inC1-D%Qr$v7Ft#JVF_bsEq!Lhz=D!Ib$IXthHDKvWP zmO$W0naaxO;dal(g6|%4A(sm@2s{F9ZmP$4$0W>@e*3G+vEa@2je#)a14xJW$r7K& z!RJg&9Y!00X^&#TSjA|o1BA6gc08$f(e9E&hq52zkD*&R$`nenF-I&nvO_3houEP_e$`O8F=7+J2D&2`6Hols!<35^4BsrYb z_r$7lU_I?%XdHssMhm?bKcaQi*uQtMz(r$wOt0PKLt`Ahdl(j8OQRIcy&w69-YVhh zQHY1Og~hHhU%OzRXhFglSJ26UU|0HK{$C3(wc^PXFaCmf2Ut#(imoQP9gnMx@WwW_kgBG;n`%X-OJZP<#3*Fv=h^IH7`b+VR3!hfTZk^)286oGA z-ida6u;N_!96k4fwLReK7G-+dWEY_;`1&5TC!bP7>Dcz`h6s#&FvTurT&j%Wit?Jt ztMGctcH#L(_o6-N>P0na3Kr%yFbT__j=hiMi%DyE2KSj4cV4 z{_lVM!U222ktmg)rmD5l{^;7%kK)2F&kY|w;`s%>cKiM}$hC#-e|e_OtMk{CeB^tN z`&!0a#x{q)YY=PS+q7;8|NQmJD2NE_d}mH`e7JkCh)}B`m3ve_9pj^E71N3Rv#yH- zoFsT_hjR;k;HI<1|H!v>K5oU^9^i$+jE*fH!dhV{1aOP_xpdIS$e(g5Pan}(CBFJ| z7r)k3-QuAb9zH;2%DIr{MeK-eei$OZ(2s*xV|OV;-3CCnr^;e(^ebVZaP4}uzxXk> z1ng{uwVa+-sEvCAFt-qcopEiwpY}$+4xU#zsODbycu#3c z+EeokC4^ghRVsRB2Yz^haX&#^y?XHH2eV)mzjjEJYbcO)n#22~axDA9g`AZ+akS?NYGlg>?R|o(M^;5j z>Ag~ESE=Nri74Rvp6d{r+BI^j4X?wM*j#!kVa4YwliQ-b`e?bO%;0d(62E-`0gr+v z1Ci>@375K4*2Q*u@7703fadaX_k+Vsg$JRx|ceX$O zqh)PegCRSp+=li=HiP?yl7kH|!J}-4pc&H5{AerFp6**}FuD7f(zqKV355clmE0bj zNR^10siMoSY<8#H{6}%2$*2!3ciB_l5W2+!oD?~L%o!tDg!m&MOIV%$9r4wV<&T1M zgZ*1W2IJW6>h*K~;RBz;eyA5&pJ8(!9PqZc^3Z@!GjVWloz#Znw^Qwd^Y^vAH_8Kz zAhs7ChL(&b-gwWD#+IOyATuR{?it^+KXPSWc&&;B%H2T{fTCn1oNaXidogEIu$%D+X?u9!Y) z9wPdnEJ~VSv)_L0E=IEvCr^*C-mbJ65^V-YW#+=m&w5pnLMX%%^X5v0T{`>Z)oT0nhx#p(uSX`jsIR9mA+yZ-L~J=D2$R*;>T0&XMZ|f)Z4y?!A5Q9 z;QSi3iungZ@?4ioC(%3L0xNP$o{>F}Ulq|R5B_?qYjk$c1I(djaS|^SWSiwa zWi;~z>L5IO%jRa`s4vtIhJXkUy(^69 z7)6Qj7Rbr1wYa3G5Np03;GSeMN>}LcpS_F%_-ZXa1t-o}1mcro#!P2yX5uLU@w;E1 z?Th4m+a8RFRwuw9$Hw6%ig>Kg1o3eDl$^5XViWsf_LHw|4rHch*%HD9_jciY-cW6%ewXmWD+t+i&SYTNGFQSB$B>S>xyp%mrL zdrfzEDXVV*3VgYO3W3p@Ot*;c!^FKEJEn)>eP;$gpAcLo1~%0gP5JlHo(r|UFTl-* zY6ms=)syFkH6qD%-c-tG<=4*X))TKoKv>iM2-^l6CjG)3U1GEmqTt16HT2~9M@T}gUTR6rrfc40SXb}N z(BpQ>?)Z(j&AG&;b<~aQrD%no`f8Lb$0=2{cd3Tf`wLMH;FBlHnMzRI_WrW;+eF@? zsL_J$|7P3bLfWS15M)b2noqaCe~e(1mz#~*ySu~xn!{!vYO zG}7nvbqX_rXOX6TE-hllyJMzF$mgKJA#?eu9fi^~*T)DWoiQJB=02vPKR~XA95tpr zj`QgIl5kquy;(xs7``c5gDg}i-|lOnF1fe!BVrG5Ab76Lyg%YZL`SF{h;#jbwT2X( zKJ3uA8C3F=Q@!W%lU@ZE^NS~)%K$b}#fT8TrG;2IWbmWiy_>^e=Wn|l*?{SN)uHr+IpQg#9KZ>pxEy(1&{cPoiC zCGDC$61jqYQS84RN&etbEstea75YkwpXa{AY10Iu=Zr8s3!!DqW%aw{go`+$+Rm{J4h9=s;pNw z)>2uojRGIHiXQ#sF|N@H;K%L%QVJRAu2S>)jm(kjnrXA#xE&rh88@g;`)2R+bjKwH z#|6LzKViROTt_uqevjR0hQHq==kHYa#6;3q=bbM(wdAw(iN`5nqK9F?p_I?%HT0_NfpD`tri} zgbAvKM-|5ZU6Cd+;ImlcQNhuqGAKrV?~yjMufqntbcYKwY25eL0=9Z|{HM(kB%6R! z#M6$|1K4&MjHbFzJM*{QLSUEWdy-szc;31e4!;GNAh}1Pc=?X*;jnv zs$#=r5eJf6pWFXKUkhsbiI~ka@;lO@{{Vu?O(lcrAeCWw=I|(O^dB=}T#0Mv6{gnZ zHWINl8fw-KaTaovY_5XP9?ESZ|M{gebnfdcAjEmRh&}=kYDVEpw~%`oqW3hdI5%)q zV!RGdH3KvD!|9uholI%_ekVI~+NbtTxiP@_PDBUs1DeNep7kMcY{Hn)f_dq%@6Wp1 zbkd=v`0E%em!4;S*6DL0mezpBrnOa-n?zL~%(LiAtoJvJH+oE6ZvE9r+5qa6`d~+o zMt3%muVh3kux`6%4bM{1ZxYP*QPB=MnnzIfL@0VvE}ur@GC2CHg`0vI%bljr9aH{^ z7<%yUVDsD!W0d*6g2m~=$7cVYD!#4N`osH@Rk~&m@8G0y%ohre*}q$)tOqB^Jqw>p zqc%Fp*h^NIc~dMTSJ`a~UgUz-{&6A=k}2TnlP@w3>AHl;;lym@82Yl+P@|DBi#4L` z(m}sPZB7lS@_H^p>tBJvfU^I-4CbUxf7G)UsMzN7=CcBTWhaI2Ol8kGj>a45Q~+P5 zhO55L2i%+9=qZ|v%gA167MRqD1?4-S*Y4Gk)f|)Y?}!(cu2HUvM9=2mRo z24M;l7EB$}1zN*MIcOexsV8DI*LT&|DZwpZzJdTv@Mo3w+7q&O*&*0n`Jd^77TE@M zIxJr(f4a@=eO{x|{X+eO?V9o7C((J=BFb?*yn188p$S zwL7kk3m|m~-A=H_1CN&I1++oY1K7(x@13XcC=^)xSjUa`<*EB-i*R)LPkb;)-$@0k z-scay`M%w~JGo)r{ zcl%#zuJt@y+8^{Jag5d={G5+fUSL zjp@AyJXNVa7LM-#dGJ^9zXvp`ZIX7g?X%6R@9HG4?6i$g#K>@Adaog}MnC3HNu_D4 zNHXBx16igC@Ri-75buJ7sgLmQ*j1}95lzXqRzYy$GKWbF6pVL3B z&0x*gxf^6~YLlbGmhPLKpsArxCE((5z)@j3#{+NXeB34~%X%f=GVwbgRJ(UIeFzxp zf_6}-T#C{tmQsJrB%io^<1_*k$3Yn`jz0gKYPT~qICX3Q9hA3-6XZEK5-d>xhNnkI zcQy*xY03IekEKl`7nO#j6V|!AS2q_2?)?;v-{v8HH;%2Z#Re-)9Ebb*Jx3|cT5>`F zt!=tCQT`#}_8Hcn^0{)>_HxMGrC*QZK3b!jJnwZ{{`I*@O2cp{uyQjMc>-9D0KZ``CkFo-6UU*ae-icrht-B++J{Vt~te9MTpE~^WWK+-l_Wa8xVAVw6 z(X*cwv-U3I?zOK8_r2OV$JIV{9n?v5{X~*Q5@CYHDXtZ5`?YX*R2zz~0+brpvGdJ~ z>sx=o;jP3%d-=jl2?$02qNljtae6rX&9@6zfKD87h%>7$W{>EDc*QEGEq8;C7XV5Hpp| ziJf5KQx{5+;Cy*bHZaVwl;Lq8cTZ{pTZrSCMsI-dzUMX+od06zl@LKDPC?USyq`^#qy{}m5po;oQuMU{S{-R-RXQ1 z1D?+6X0^ln)+Ienj zcH_ZfRH*Qk*gY9s$Eb<}gh1-s$-u9`>NHW7&Ch2FFdNRKo3-C6eJ#Hsy>floa8tN? zCPOH$boQ`TEhF)8t#%WSxtCO`s@?(EITCTDI#yC&iu1(3GIvsar`NH+Z3myk#4CDy`pN#bt!L zl~}}bcDd0BRt_ZHulJgN$cj6l`@x*#pm%Q zh69a%2r6ofnYF{=Li;Mo%~5}CF6CB*kNS$oiWoWTYr5F{!vWeo`1`RhOq*o6ijknS zp!nm`rK&p*YCol*9MoGk*G>R@9V{O$H$>E@HThXx}Pit_8nlD4N&@rJOFnCgmBqF9bgJq?#19T3Oe z@JIxz$m9gwT_t?jR(M>jHs zS{R_eTN_AwmSKn7Cm(Q0CyXdNf=B_Ox5Q&)K}UQ`c9Ps^55BOZ>6FEM&sq%Hh4qzD z^l9EeR}Xh9%aOV!yJbCGoi~(g*&iNfI<&yf^LA=rAJnz7Zc7kvR3&zaVaa=z* zu|4i*TYbWQrC)m1hwiff(jQFusbhq?fN+_=PH~&f&C<2f?rDgi`&-bTn6;z&Ps8Qj zS={hJyL|A_CRosYOMc+iv>y8i@v_zIBc+2}^|?MyN8&9orW^&I@dbsvg*y;L=wdRX z4l)l$;n6g10G0%6^+_S_Z2LY*yDY zUPpze6p{TbMkorlv#ri2nqU)RK;#g7HbOdL;9-d2K8{U*gVoSi5yqc3iy1A0RUS@$ z;{>!#mIKfSLr$Ck3n9p>Y!jcT@TLXyS*_AToM>z`EO zX|DqF8vJq#vA5*4)9xHyVSJ<_c`ubZGNUWxDbK5*6v^Frx+I1Qw&$VUF~yl+WW23G zlMmkP_gxzF;f>17uQd5s{5Wu$$o{QBJG8bT%;l(@7?ue|1f@-&eED(LkH>~o20?se!^eyt^b%GWrn=z+pVYZ}kT zzHS-gQx1Eo`t-sG!nnkIcAZ9B=EyDt0NDviI1T?JGa0HD7q4$~*qwKLmu<`3;*rE# zpBBs!rfarG9X8bxcq2VwY(DblIle8XPR5ZRrNrf(DO|MHYTlEpy|l~0T4*JEsCkL- zOj|NSu=(>cZZ7Z$7SnWtO1a&V?AbkJ(XSOGmVFzBUiK0AoCWwMCiU2-IC<&vNnVY>M!#7T~2^g$-6 z6*@P#D|2XUk9Xl)y}MCiEfSE?om`?2JT4guYm~;48+dK$XzjIr@%gbj5 zZt+x;`11QTV3rGX9r!Dz$#x7nS$3{mPhX2~^{GXgl4a&>_*;7gDaM~T#;pbybf>rW z5q~6c2@Bfa=JX#jKZzA?UXKf(LMZ&=7qcyF64XlOqeoVHm0N6N0?XEdT0j!O_nF{- zUh|@^^7iqa7%_=EZ{D_G?rhU|^yl7}oW8IBK!Ev-o|DLq3Tyh^g8!BhzBE0%+@=?0 zwrZB9;P+o+Shx(iye52n{T}J4PiBWI2W~Tg&A>L|Afg&RB;x$B=)kOPIvjvLWhPA ze+gLy&qnNDwu&0;6y3E% zz_5&#M^*q@sBqi5wZ`$pWdVCFYEy$5Zh1hFX^WQ}1_fvj^<83Zt{Us-k2D7SYK1|y z>V?~a*Xm!dDKKr_?ZK-0#mwq(dXtA6PU{7UPaXeFZgEt+pX+Joa=Mz+bu&gjwF7!pug%jR{1W8sq1(3XWXzm+Bo9$S=5c3UZIomOb> zZk*1^A#jJf{AeX(t7APVEx?@Fky-q4(=6DkPGmX}sJx-5?l(mIb>Pt+&ORP8-43p6 zEdS~bfCDbp8H4RlS znpCc&%+{lPnw@(F`3}{e*-`-w>9)nZt{euda6O{;7}$|YPuI=gwE`cdT5cV~+Vc60 z!3Eq7+Zem>tqar)XFch#yfW&zu;F<0#0Z8)>I)MFA`z;_>*a;Ft*7iKTAA9W0NR^Z zrW#TdCH-8r z`nJ_$z5mXdl#QwZNTRU}lA;UJa}Gg|1o$l!-%xWd4H`Tgy0az;&ir4|QPsL&+!%d$ z>1@oM`Sr=b#-lt*5UH@rUCZWAIK-Mszj)&sZ=ESa6`!|9y*KdZ++KtRhGkwAnlFjET8=S=pRp%S#|1|P6$;1*<-tU05v z$`-sm`BL?Mt`su;IgSuKaOEaP@#?+neke2LBG#R8Y{k-c(;C4dq2duuP;I+->***{ zSBRLXMJ^`XLuL2Fg*ZgDiisGt`G2PB4ES{f%H?}r7m^FeBh+PW;}LvmN5x|n*(5&u z{#6VW>sVEumtEBva~?C>u;jAN2Oa$<6920D>u>!-%%-=xH8YFu_LTFw$Hd0c2Kf|a z<5iNs&TySUH}%WHuZ@6kTkRB=*$zfoVbeVOrQ;z*mbTuQ&n4$Td5j6a7%glkv)h*? zjc$9jRsctnL*BYqdR4ePug91(o@pwn>CfDY+&k`BcT?=tYd3Gn?Ed2_^A7}Cw{%Zp z*y?V*{JEQIjhzXypr|SN%;?1(Y8F)GM$HT!l zu{FFG>hC%YBuF`FD&2K1sGF#1a(G(k%CI|s?GkwkQjRhrcvuy0uJM_(zXA@}nkd3v z1MRFg1KaIj)>#?b+2i}CXGPgdXz^Ht07c`-SFexV98q%9X`_G>uR1s830+J*? znP>f5a=z_s^K=#DIH)A5GTq(fX~u%0K!pi?VDp6FQO&|;O z)Z?70oxsOuVe*TQvjcvekBs@DZZXg^$*S+;TNQ|$5~-CBy#I@~U+;UK@`~L@v$<>A z%>Je+H}u|oe)Gck4IKW4C5a|0{!CcMMeC2}MsCy9P!DP$Y=%%%Z+Uz)bAGx?| z^INcLbx;@!?{9y=b{KWwRL_(|3I155q#wH*C=bP~C5CifHkHeJV)6*Bd$BXRM3R%2) zqG!*#LB{Ra(@#<-Oo=guY%MNI?>?%;PfGyNYfAFqq~%2oVCsCN!IH*s1oa@bh)>6$ z#9Ix|iYpBY>f_5A@5M+zm8z*oSwYy=r$|n+f@Mr6tb6%1WkwsjIY`>+V*&4XZYCCa>5EP zrO;g6(1P11)CHkA5Z^~`ht7rPsrzZh8$QzT$FWB?wlpg|53I5fazeIchD&;0At^r# z*#dI}6d|})>!gR zg68&e@^@%Yj^@ydoPOm;0SC>Xu7QFf=lRX#$al>JVDS?o&Tk263>MWsNrH+UL9y?2 zAq!1tvP!Ks+3_Gn*UTaGD7NK*Q=3^MC-Y?U2??%!bRqeq9nwkam=$i!;I<3B9y%9t zHuuAX%7J4TLbxSWmj>N*9K9WgkHenqJ1%{XJ`g-!sd8C879zPioa9TkY-^tMU)?dk zednuOMR#%W*cU-eDS6sZJ(lP;(&O;gLtU-PY3~Y;kjsG=&T!=M4udqPIbJ&EPDk_0 z?z<^N?`8P~sr>@`>z-lZ@*-~Yces&5Ax~-tF0{d+lYDQkNr^1 z^KSj`q4sND8bNo9b%jz$s0UDJN<;w$tMVteDSk&K?H1K3a%E(IzC+R7%&^1jTF0I6 z?HBhX^O|s`E$fyt%Pz1mX-lnTiK<9UY$Uo6zc8RIwKEC>u{cIg$A=A%$t;`h9^-HL-w*qBz<LRrSX(i z2DYs(n$inGR-Qlk1aJy=0i-7;URXHK9iS@P-Y|%&iV&0uCqx{uoz2~kiXG+D?3EMh z*+rAJe2Sp!LnwffVCd@Ruw;I;O0zbqiXhYFN(_HBw=I% z7wc^g{_s~V7k;qT+*WOi9EDFTg&c1pVc6m6q!Kt$IGhjFis92Dc3N(^)~g0iCq|Nr z{i^!}kMNmCbi%D0T$@MD%2cJPB^P36zOQ+mZODfo{e~X=o{F7`*l^r(<_HX1RS7-b zY$p9lPhObz(;OaB&L46S+VMSJ@-rTP#F+41mfqz$_PdjI;hH-WZC{y+I8o zA2c}&B)8>X`k#JN^xWO+7{3g%VOdo&$E^$pFESfHJ^vQezaqXcY2d^^!ICt_@aPrq zqhGYcJ~uV0P2DB8vm`A-bH;7znjTb14H+1A!GSk@7dj=hdHLOa#C9o0506Un-Cb_~ zQK@T{SmDmh(vHf30nek4ttPCf>BAnq^aBuDYkv0S90(~9g9E({yd?!0x-Jx~nhaiM zZlF$CqjM8#*|0F0IlgQ(L%b|B@qDOR8?l-$b$4R%Hvk?$)o#P?_@UT&yjKLK0F&3S zA(@v2;%eXDF?U!L7}m^&&j_7azC3O@z>u)h-`B4-ys~9_W?8o#ig&_R-|1&pY;LQ@1ngsA$nTbcvfHBV_QXEtX8?I zN4L!LNbibK2XgRhO@4Ly^P%Btx9al(K<5m0Nq>C!;D2^k>ghT)xJJ6GTVi0W$sksh z3NF`t*BmH^<8;RwHG;j&OlPZ+x491Q&tuIgMTV8z<8PW_GpHimH9%{@!iU+KU5XH3K{ zUFA7n(5rea1Uy2`I<-=9swi*8l67UR+qVj(qb7_KO0(Jfm^+DM)oJ(cAy=P zhHa?hO0;=_`gRp$sbo{5=hJoJ#gYON^Gq1U!z#*cxewW%FB!cM)v~TlIWK%Tz}$cZ z(4gm$j@w>ZyAzVCL8!QcGRWbXk~t#H0>B@EZ%xFJlAEU-RKm|PtFmfsdmKf}kfTWn z6qOmUCJOD)KDIFv(${?EYGOTj%@B=bP7-i&u6%>23F^Gq5XnCu$syZyv@pN%m?!<~0nzL^OUr(kL#|ju6z#UH!pKD#N?kXdU zUrJ}o@p7^6d1{pNlvCf|@ehNzfBcUpMU`bmJj+M2=*kb<_Z>bp z55;eoaaVjFxj<9Lz+0|p>1LM4KS$>{6yyUn4;a@(ByE6}MbW#!E0s0jH&?>On6H@WHdB7EuxKJpydi%7#DRM%r(|Xh}BI3 zc6Miulh687D@j96@*XunG)FJv!=@bby1acGK1f2sFP|(#6m)i8*Ohb`(?3^5;inEY z+R=;_n%pP5r>m@|&Ku-p1A=|C3A*b}w8{9J| zcKX=+!!e-^FA#QDz6MDPg2cjgKk?`=Xt7+no+YWW(&94A%bMcx$;xT6YtnSk2b3Q7 z-&rige13+Wqu%oBhwS`#vCIL6OldFk%Ck9HU2kMjATZZ=rx=vcZdU~ta!uXJx=bz? z>V!SB50L6>boV03B=WddOZLq;kmL5wX-qHc_NdiyduQN?R%me=9 z{cTA1GRQ;qU&-D2(x>e{?{DS*gX7j&l@SB;7hM-*S?lh6+4X#k^!fBWeg!0J?cpo$ z|Ix~|&7a2d(ZhZ@r?A-hkqYxbC!XQ*v$|cHGd$b6w4ebpV9{i)-Bp0{Mxw9vec#=uf%!uuNtIpGm;~O!z-_zXp{NpY1`mQsV z@qF7*FjsucWH+xn%Y)R0m-|&041%+E@089gWqk?FRZC73i*cLiMC!3teczIIQ_rM( zcI=PnkocnWo78=iqagI#G8l>s&YAG5sQlVi|D9X=|A@NEs3_O2O{b)Ew{&->bTf2! zcQ*)vlysLg4BZ`4N(&4~BQ{E^1f?jl{K&A z>rvzHeFlbmkc)4BRb+MQ>f^5W&vnRu6*Ij-HhkIVuJHeJYZo7{$dHFvpR0U>&rQ94 zaZ<93Edczqn&o&qW>`OPeL?Gw1rTJn0vEDp@*5BpAN#&uPgGAtyw*z zwvPH{L*yw|kNrRveb9IAo{k%`*cQLqjUewnr}fd+m%)|`gQ7zZKe3P1JJ0-A|5aY) zb0gqRGJ1)U?lF!lME<5kElJYKaK@`xAHiTnzk@8!{ax+!flaW;_9N)TiA;CH)LYby z_tNyet5$mDW!ig@1Ww)ldzcTYhDX-%@#;27dkh|4t3e0+<<39a8W6Q18gI5>IM39k zeC3iDwkTH7#*381r~=L%=)}V8<*Z7lvk)tQCK*=uo#)eHR4wm66wGqG29nP0q-(0W z+Tl5{BT^3d$rgqVMzd_5^Ly}frIS==#4m+g)UuDiw@X3fRbv2t_ZA@jrrGx|Cso!J%)uRhH9n_uWmdANTKhj-3|;EY8L@*D%T) zem3X4G#eoI8qIC%s#PvULI!;7=Ts}?i!PoJpzEtP0v-Wt*Tw$1JqZn?EsjMTX~Bt2 zi;QzEM|{1gM)Bk8+b%}JD+03fdv`)-IU*mDcX`%N1y{d+y>=R%;dxrB89A!Fn9l2q z>RgNvS>ZmJs|6dlsTyhku~Y9_GjyF=)^i zFJI~KefG9K0SClCIzFx02z+nKvv08D$^+jF0KnCgkIMqvO+l`m9`9Y|)s`C;hkFmf z8$F|;!js$V#mF6sbni)9rnlShQydd7xSKv=Smv}}rHsBLRH^5*q$f^AQyBP(j+{eTpGD)SKh!!|pN`Yv zGDyGjW)ANdo(hF20fF>w3DU2^f@r4>kxOw75t&~0kU?1#ZEP@aaO^Ck)yCQ7{aN$);PsDcjO&ffleVv$ zf1LsmE=Ie2(VpVgYzDoau2$?*_TtOT!43t^SVBC;qj24a&LNmxwUSH%+CrSded^Y& zOs=CGW@(vjHjQ%`VXnLIcMR`nug5N7I@4FwwLiql~^FqO=+awRe8E(6iik}KAihiV6`{VNZIh=rQ;07Id39SZpy*8u*nL;CZflHBOk4^+mJI_y`SCP8siP-LV)$IUfu-e};CZVbRoY6>bVxCE9G`kr4(h2wx8WDsG+m4qXKTkj@5OI=b0Ioqin|D-Epw%$)S~@$4XaW z_tyvetWb4hf$x=FPz!QMj;kKIZ`%YWdSji&s`I)d=P>+!>T+to)92&izlDpczR4uE zt$94%5#Z;kGFUVK>8Ax6k;ezwwU~eT%h{gag|%Y~^@-T8)9&o9weQP3I0hw4PZ>9h zs2XS;--U(W+L^X&{^XVYA>*jN(|fIKT?E4wD?=jFKWp^PF45aIiXYzULhyP60ZnB^ z&AF5O=ehs&wTqjODwtY~$v7<$mjs(0BIg zE-d!uwDE=Jert)DnYF2z8&Y%f#wYF_NTo~cZpMcTQMh#3cT&gkDEuk6x1b0Is9j%Xt}!ckvv3AY2RomS+Y zNcL=y(%);wTiT{Uaq~??LHG|c+SfZql8u?w;+bu8RrfYt4rRRLi;3M5 z8a{x<#y3nZF;=gq7B3gcpV6kCjtksI#a`e;euq5s7Bt|0Jz4a4KIyvc_$Tl}bp?Bb z65=HU3*lEo=Z-VW{P~E8pU^n7`xPKGIYX3;MN#t;A*hc;|_%u>efQuWjR<_2}=vUX=*ZUyy z{(11<+J`CTNp2pU%Dltb$7dsb-j-IhLR_i!Kf zx27xjnJjqpLKeXnB&SAxp`{(sSLt{RE>3DRn?3I;f0yHTfjuX|4%<^&PKz&v9^>k1 zY{yuZH>mLGvMCG3q;Kk*SAe6x7&p5<&O4`%){F zjWkwvufy6DC=$U}f+L_^`oRc91bV$14@BA8cN!H|YF2vAlOet`ca>-8=2OxMC9ob$-tYyGCdEHBFJxD7CJHMRZWr0?YfoV)Ug+F<(3 z@~;p5R5kHMI6*D%Zr%o6Fbe(#r<hQb{~j7!{bA&-U-U4j?ED<#O5bZiT76{~2M=wa8PaqDR#Q5jiU zYBZnD<+m?fDLNt z1WZ~Qga*Q#0g8l+NGb;dN-egWlO^v0qHv$+%nsvY-o7OAWBVK;ChEGde>IP_5 zyIFe+a_*V;%cB8Js|BV1tv2+Wme60F3(QW^*8>k3&}PwS;WgPSg`ymU>sZ_MgTfU* zR8S_uQ6sCV#5EG`CStxD(RNIoY{>F8*C|v=LTrQ0X&6M|O7pLy>hkJl#DPnERvM_k z$l1AY0o}@r(*1qX>gU%y97ovsL@5Q{w31n+E!y(qu%_wOHIR8{SZ?P-pOP}M-hm3l z&DGEorSogx#&DvI!qRH6Ki$H?YnLJ$;ZljH?fvrn;r9h~phr}7RBMfH^b40secL}^P1yQIAvhhel_cka`8`%NRFs8} zUH>M@Ku0GSCP7Uoq0kRJZ?A8`qZ;;cD#)&nQMZXG>)>o{ZF#NXnYZh^If=muH83)j zYS9;}2E&$MQRd2H?)7M82|(O(*(nkQX>pEU(Yc-5;?IV3AJw+HG%y;s02WJ7s)0vM zsI9j$lgsN|DwChPbRb0zevpkjo3)F&DWl#!-It<=GYUs9p89F^gBLBt9%@FO|Illx zt@`Gb#;ALY?_)j8`%Y8bv}NGkT9YYPv|;Lkf!6^^&oRup#DJf<#~oA>EEl3Y1uy-B zxGVhFDP)XBn2Tur6h+|r`lQ4371V0T8>(`D7&Ym~?isxw^=35kQSa!x1{VS&( zCcsRICijTEz0pB>Gu@4{Gly59I#vB4w#Ka<7eRzUa zpe5zx3=18xSbf6_tmyc8$FPzLD5>alv%V1~DVk`aVR# zANq*gGDx}TTF&E`u1rpJPR-|P34;InKX1p9$4qA9X4EnQQ>Sd!YB#N%pqYR)4auzD zR-(@$LCf~Bx&k)71qeE*tR=B}ezMa2h{ZUPR&8NUn_<^1=*+$->d=gOwMkroP^j{q z?RW<@ukl`dMx$M%RvMKfRZ7*uaFhC=eMjapk>eYK=ba_~M?U23zk{k83j~-_$_hKj z!nFdpFpcVspg|8}w^QT5Vfa~;icb(ZNz^TLe7_`zU(ZRMNj-vvNUuW{VCocm4TmiT zTdTVQY!kQq;{7PLCl_*Mx4`_7Tw?67WC*5gay|nlQ`-M+GvBwn$5zu3gZc4|F)ComAVc? zSmL|w3M?U%G2KZ*_~7LupTL`=Hr@}+`8>)uNB95M3R~9tV}!U0d1)yPz1h8AF3W35P+ z8$A$?^{asFj-l1B^B)N4JcwjyR@Gy@R@S6qi@zmO^W5Tg>sRKl|81`$v7@uS&QN2? z?c@_`dAWV?3todHzH3GpMJM;(;2{xkU~#P{!O2My4JuDy!K6i2#x-6|OtGBzFEFBd zjLaH_g)?FPx>z?$UvR8pN#30$s#_OMXm8B0_5C0t+N5>+;cNNE<0laebSB-I_6=th ze{gRz89N&K6R6M! z4Jh28pgrJWFbTyq4BE%A&_rwiSI0k?;uv*7_F)Cit;8kq5`f2__8WSwOU@=AR$(@b zulNj~6#}|iYYign`fd~x!Y&f zIn^7l*N;x#&(@$bW-ouX>&xM}^(%hejeks_^aulTKD|3XhBdP1*qx)c3rG&O9t0*$ zgnJVeOL5uDdFvkfj>gUjvS33VoBHPc4$6@H*TeT&9ZP--V>!7?(VtMTu9{*~+ZJ8P z0(qpobvSEETTDOju#7B?KXny^+NFmrm@UeYdcNjayy?0v0JSRt;z9DC$5j1a-~DKB zGz9|R-pszR*J4;fgEK@i{@P`+CIuF)mF0dJbmmGC9U!Kf&&n$+NFR9JqRV8ZVnjP~ z5RN5D5y5@H&?;{J^Zsp&;%<{KMfok?!KmlF8AoXRU z7G7hcLj3$P%S+APnl{UKd;ZnhQTsl9B17c~Idj#m_)u!^H2q5caMhHe**;mw)FWEm zcxrSUYviPNscmyX3mGi+dA1JaoXL7QC838UIaP50!a89%tf)MHQOC!gXX6$~ZKqGl zjO<_2>DJh;L^6sgGqkb-*|RjE?}esU#cds&Eg>Z!Jh;e7^%iJZ^O4&FWZ$I-+rHu! z$23uoD=hyD%BB^2EE2vo8D;?2p0Fw*wC&~y8cnmQ8UU}KGj8r&+h65bV{|h8j7fh8 zCb%7Jk6WRMcdI)~JG`k0{>utw0O-L0RZ7O=dHGUoajSQsw$}smRh?kNlNLMD(1*sr zDS>l4UVCf`WXv3_>dP)dd7{syxkE#E^j*=Dm<^35{7rU_wCJ%hX#uZ5zuIeD5s^Kd z;BlY?c=7RNg342lj0lI z%|AZs@G}ZsYz};36=7`)Hk8(f8ap+fN@jBa3vyznI{Lv^J^ADk z!s_6UobV9k7Oz1;xeR(A9l|y>72r{Sm%sLjPUtDUNc@^PdKw2nAA5DD_BEX7QWUNqQXx z*daG10h(%;5$PuQR&&`bDyAF`Vh$P{sLzT_=<|*Cz-Ll#^dlM?k`}HQp|L0qvdC(m zpAOIcWg8^iYbLfYzP7&Aqf9NDE=M{EN04^Hn~h!H7L*woQo&8bTlkbNBczH&kJa_{ zmzLnkbq?3ofB;}!*KFCzvWHWrj)_mHNl$mMP5^6(?8^D&2$riddcT0qBb3YiSNjb? zl8`!o@;YdIVh0bX1BK6d>*OC6CY?53&0eW_fMr_R^j6%LoyoZpmCk(Hc9W`3bB@XycG(Lu>se zXmKXhf5S8TwzitNS$~YbLa$5-C+m((n;E^=&Z@%*yvE=WT*;0R)$18uuYvC`5smH{*vH3IXT04reJRHazkEv9>fP2bL_ zs4y%v{=Zs)<__d8yEz&doZC_f#u#Vj{Z$JO( zhm+#eJ)AgXiktw&3Zr;btN+|{(}hx{FQwLUT9-EJ5Tc#&(+!i|+@?kBE%;N7_!bJp zBN3O23oTa)Q??dp(KjDQQOl%N`w4iN?KF9@rs3|JRM`sy8LKA1L{Z%@C{lP3;X7oP zY_|PFlW)zLp9-6y!6Kd?i=(EjKZdpuWDN0J*!xHs?#Um=Dd@SqmidBl|OfkjBa-gO>^RJ%EBztleF4MP#_HLmeE#s zZOJlj0zjh-9xAm7`ndB0y_I7Uwz-0$R#Oh|_}fzS#cDC4sv$kuQHEp>>?)7XcYn3Z zNNKkdjtCA)f^6{0eW1hjQR)YEUJ4prEgctJ9YulbpS8n9xgK3o@4jfHfZkkfGPWHe zLIyj8bD8%W^dqvL(IXT`7w@CeP^uhtJ#c>`a-Eo%Qop&%)l=o?*QCfS-bBqzYruTV zaktty_tadFsq0msH#B#+%^81@^#C3jX~A&LAq-H_e9mms4TCHUu(Xfor00!?v;_Xh z{L4E8bHL0CdO%>~#NA|B&$?xh2)F1$yP#sh&$Y}X?C(@VvQ zZ29q(H;dK%I@wNUW9LUxL9X+^H0`va+!WSz#6iW{aJ!cY{M}?yq$?~gz+k2>t(8f; zo^Zj{6fw)YXPE7GNW!m3O@#;WwzY$5<$PXFtFhb68)dGkBl;yb;hK(MPYoXM8>2K^ z7wEnna*O*6F?IEN;gUa^(tIH~IBT;nat!OHbc|}59*)jVzfgx2ly$wACub;@%JnQ$ zTVu$78yq&d<&(770u8e(6WbV@`HLz%GiREmMOFod z4%!URVu&dWjM>!yxVCDX&hs%x#j}I-ACZkF?k8sTYbYm~(V&@229~%Tcv!F!btzgC zt%2rtYXC)u#Yfe75 z0ybwx4wD?cQ37CnpmWzv(BitylRgO0WnUuz?$oN`dUc3YSz& zi{wxtL3Ozsz;!w)o|EG#oxF>*IOm>s9f|tAtkt!1l*mwbjkEQB+!Yj2?esGPv|+Wj zUH#ZOM&d2ejH@=1Mp3<^v%}c8?r8BllviyXu2W>WiAPJ`md#?aLq2J z&cPjH>ncv7_FiV9_SkBXmdmm=tq3)QTrfrqfmV#3D0uHyog&%D2@rWHBN^(eK{M_9Z@24_ z2Al-sRmb$=UWjI}2&dabMcbEZGXQudT1Z>U0$z_p8iciNxw zd0j#?RzG~6wT2jv1qx3ZbUn`60%v(bBU>$rNf7%gg ztYBp$m!V8Bl{^PF##9XhA?uWqUaQjEHTOi%$Qd)?1Si#jO*EcFwrI(F(F=^-Q~FXl zq&J#7EkRb+NqXgS1dGi+wJAJBsKBW->y^m)BS+RCJjWw9kH18Ryt5WWn9*fINkpsL z-o}Mork$TVOLvMmD-l&YjguHa%M6Kg%N7&KXj!QQ0JJB*$1d6%Q^eL;Yd`4>D5=G% z#7QSvw(K|H3G8Fz!PdatXvhL3ZP2iNLZ$Zlih}HFhD)_Bw>$Sy7nKoh6S}@G=^W0Y z6%JoW}V?$@h7a zl`V+j;wLfr?&iz5Qch^1yW(~SyZ(qF*cF-@wVkn;(7s-ZC$wq7XG)>Eho179JqUpy zCc8$0?*QMS8RoODm&&lr21kd&!Hdp80+!*6FI(4Z?4HDm@&9;a+qBFBzEtqT_o>t} z=z~qBQzgjQ>8u#@lQ&KC4kajZ-v;Cc2(+4ha8ICrQY0MR+^JX$)!jcbr6p#DVs_|w z7R;02l#tp9<~*GiMAEFEY3tFLPL%m|=1$w?v}nldrtWcSAzLk|lT$41Y`l{JZVqzN z-xvnYxq(9DNdI>V;P=%)<3i=Jc_QhE+M{;AreDB~-?)Jnug^mDtmWsZdg?N<(fY<< z1c}CayPttER>+1%kqSohNVMhvo)suhD*BknL?;*=@gEcfXpc>>#(f*^+Y4~bNTudT zR~^aeJ?MA=WKMlfO0}LrJAud!H)jnyF8F%2POn z@qabgHowg$+PoatGR(%PO5|*P>wxp=b@!YopLfU6nA}!uT9ZX(v%hC8>+iR;Id3%J zD~78VN>XwN6~vVlu$YSHm>baxQi61p_up`HAN!my8_Sx9Q+XuSFOfO_965fExmOJn zZiNcdFsU614x8rU^Pn-iW-Kuh$`Qc87?0gy%;6H6^83{{{oip6RpA=8EEu6_!r=s! zxv}fHw|^Pky>kgnrX$7V!M)%x#h$^8Q4`oXV4KW!m#O+9+p;cdn)Z@7407C9u1r=^ zgaa1Y+lE^vBGC|`b6+k`{A`NWpWv-4rIom<4>ygtOiWsHVCYW^SZi;aVmhAy=SDTD z>t5&iTrcgh4FG`lZ8eV<5(Brd!o6bu342FvoEJ2gRIH0#26i+j^4A_VCX=hO6(w~# z?Fa=X+yYN}e#`U+@2bS?4AO3Ot1la+vgwlYJEm*jCCB>x0 z+q8t}@46r74AquksKOeKnZBY-18j&dwg8K{w-Hr5wvPEA{@s7Hp&!)NpsggHukFZIWL3r$&#sLb?H^&6ca63CX=GZ*k(d;MW< zObSYI`N=lbqtAaNa3cYm>;1;b<4$_k8}$^VjS#mtAnR=TK;L~`5DfoTkgiO+bZ=I3 z?f`#fV$0!%wdSQXCR4SKPo| zx#!ARGXJQgZ}A1JCC94q8_EiZDhD;RU#Vn&>_J2P#azVwd3nT7rv>BJROzsFcP7l2y;{(KD8O zp^SmMC;h;XxsITp4{3u7eNQIl5b*?aKdo&%llHwF^-al&USb*hAJA%vke*iv|DKWR zzREk>fhE6#a)ET^+hto{DM0viYQc;S4pkRVjls?7yObv-z< z&;OnbkNOxc5lW&kMG1w0fn>%W-@Z!=^A+5crZ`sbK!y4{0)*seF-~RQN01+}_?pE^hR)|M?}_pbl;L%rLpgxN$nqm5II(gUr^FGdP3^~;Pm z{~QE!W(dc+Sp#monJf!tb2r5JdhbTI;+rey1bJ9CUH6ZDuK~foWkXW?p2qtuLqaxW zKyOX0o1MnRo(9Fv$zKLTHZ=<#aGX|*Z|eUDj|FFRRWiKlB!=dI^gd>CxIH3@OYk-t z*;2f;U^t=f*ul$=EhzMN}vcJHXZ9$Yv`PJ=13IMqDa(l|ICr{Yc_`6WQ(04XaEm`T+_cd|?r1Lm&+Jj(FUoe6Q`g`|_?tmt zjk*juPo6CfA;{RQJ3`>W#$B86)PE-B@G96=CsAyrRERhHGoJWK?GkImQ`Y%%KF z#Axiseqd=(aYWDId9G|mkI}T9m{7R|L%J{V5XcEjCAVp}Wb}#~{FN8QBiOlakMTHV zE?3CLYn5-!wH@X02jmWV(@|niX4XwhRv6pMg^)#Jc{8S{9M73U}Rrm9om27c-Te{oA z!=#KIn}N;jW>NpHyRqGvtkW(1@TXc%pme^*dc$t zAZHW#u-|zx##Gmi8w!zcT)NmaWF_RCZ<;OQ?<7&aNV_xIEnMD_`u_fv1E;KO-xM7a zic|!wtD~A-f%%;dTih%4$-HGgjKMma+6J20(gB7`Je?Wtp^tV(Z}a-YP;f>KjFR|} z+7V_0HZpK9)4zryR}UK4v{^MNHErM_@cWx#OWv*{xhxhK?`*%iXK>q)0H3AGII?1V zF7BYZ)n=uJ_zx@3ZRc0nd_L2Jd;}`iVPsw#msqExzK4DVSl4fi)-@p(kHWCOp#;)+de$f zObP3t28o`mw!=tGGQn_-D)3aG-bi-DuTbv^s|zxI!Y#y?)!~s%NaMQ7HH!@RpTXu| z%mXA9D6rVV7lrF3>~q6J&z=tEkZtU0Q!CM8?W-v#V&j#BR3Df7=W*h+CcAC)*c^US z5sxzEz?CZtf@adB%u1fHMe8K!$Vh$0*|%*ZU|I?nr%A7vzocJDtHEr94{OTfj`{>E ziwi&E^yX+kDI%(Yut6?qTeV+Z1{j+lxYDe$x|7sk79z*LW(2`x=PoaEsGwB54Ot&f zWlvl#{I&%f+n=NK2${(zT=y?XdohlBiLuf9_%!-HAKjeUO&`cS9#fySMPBTpe!qN_ z#qwKZ@%VYRSU;7mg=t{uJY2-IEOsm``dy&cEo=D7rMtVm;^g7HM`S3EkVs5tkAmotXn1x-9^U3xHY%B=3Xh7dHhaG* zBN4!4#8jcWt$8b+tu&^(;L$!#c4o1*CZf}~^%^H6(-BKSi7wKYo885`n9+hlWfN;z zs)npWWN9KesgglVX<~8PvF^G|IFio3gs-dIKF)cFLMYd+K_3IBSQ172+oBOUIvsLR z`VN0NvO(12D)ESkYnc`}Oa}MqTDg5(-%w z%6=H2OOVR;lJUOcTBP2%RA`9-2JoEV;F6K;Q|XsijU@NSiqXQ-#cj|69#J?YzB}2+ zcjl2p55QPg`c4?1+&_9*0V4q5ft|);Kwd0Fo853ue>hC}8$kbgH^k%N>E%Rkd6UV4 zfV#WCuvESM=^dH1&uro{Y<(*EzQ*2{tR!uul-QzDXH0IOZqDK0H_@u+K{at&+2-D0 z7xEN@lw+(Mb>{uA1R8xWAEsLEWmu~PGsaqjIBK^)g8-PdY*p?5|AQVpx`2IsPfOA^ z_Mp096itQW<9_1xa|ETg=A||7}ti%fQs^5{obB6zS^(|Rh(I4Ca@1~!H%SIg@SaQq zv1<js2=Tql<>iCa}Bx#bR>x9uf_CWL5A-r$29@I(-^4l(t9vI8l=^ zzn_}Bhv5lOWuS%oN$OmFXwA1K5d>-l9X6 z*oV#PrSuq-#`I>BT7YBTBNm)Fb4*%cY=+rXRy}Qjb9#j{9(M)D+1g&!428?rz&RRN z(mOL&PnkmhQy~uOgD|G88f4$M7-?-x)Bw_wtio33A7#n6QBC}l2&nDfYKaehYg!_4 zuq|x|D7W!JRrZ!ir5^geWGg&XWns~nqR8F&p&>|o8AM8s1Tl7(VIDBED~2tewg`7~ z(L!;|zaYfRg@;9Q!sy+I>Nc>c$Qr%cPt3_AfJM6GL--F~Jj||>-OLXBn=bA;<;ObQ zR>}4L6A%)c0QMBB@MQS+SmKZK4jixyk;Ox{=HggHRC5gb5acH))|B+EqUS6{RP;yW zaSzWV$5bLqdhZtYwzgzQoGV*P6;q@Z0UC+GE9Ib69|B-$6;e|zxW4wwRWgVIV=`-z zdbvta`iftLvYaw+$r-E3tU{0Gd_Si@1Q_aF6h(g9zG-WJDtm6T6${K?@gZ~i+*XGX zZ*sBj7jL)r@Xqema@7C&Lgafd|0zL2=W*4pcKliMwg5|1yvKz4?LnEx6&3&4Gnmi% zKWDz9*3zIOlmZe*Q$|o(DkSVP??lgv3pp$;WnsQKJsW)M6ERBG`JD-o)Er9!>C5+4 z=pA~k21ocrDGR+R65et6IyfX~tC_}$2nxx>Xd=%t>9_hYXnNJkjLkGe$hHwQUujhQ zuGfujR{Bp*aY|{w&D8$fT&)DtmnDExNAuX~W?}JT!}H3~0V}o9qW@zZM_2$K&v;Qe zuF2fxUN|CfrbS+>6cb{-`KL5$@ zlAxKoFR{~k2CH}VP=A{+xP@`0C(S>-u_h=6{CE_6{3qfEbJ}Hptb1Or+pR3m|2lCu zUoJWf7JI!%^wxk#p$93)WOCH-gUYv}O8L4@gbxdEV44{k=9K(h=A$VYyAQsP-uJ!U zasFUN&0EF|TR`H$zQ!C<-~bYR(px{9N20_D17Jm<(`L?8Bw~9~DVej@gFekx%^+lQ zerZbY3SfEosk|>vi^=l)N0px;$`Ed`AjXt6x&e3%V=VVhBLXycyt!Q)@B{IZN;Q8_ z<3}EF)Gv<@-%Z6B0s}RX9jUXt`G-*ii0M+0RYk6G&VtSY{6>Y=!?G^kgYks~#f5Q)#kq62%i>(L%Ae;gSsd89$0A9ydJwzn6~MEagui`S4Gx{Q8%dRB~wMP#b2 zk7PycrSf~y!UxTE)B&9XgXH!U3};{9=|fRY7HnQ*8S z4M+(vrg6>cq1Yl-G$+w!Q3RWXPD>pezkWoK?~$AIPFF9Zexon`@kYx1y&E|#N+LXf zVSM^i6(@g9wq+Pk^vATPQbaALG3gNI^5Q*1ET;>%7C{Lpdcx6Sugfe9L^PRV!e?-Wo=BBe1BW4$C zPd4gyO*!zW9VSJn6JB!4rCsE*Te{);e+F<#$#-M|7%cLc6Sdj{TwDfpcrf3$CJpi% zx(KMM=zrK-4yZP6Rp?cB?4a9-9X>Ivp1mn_&qfKrAMhh9aN@s-l>xC{5*T`0N&Zoi z9V*Ai$LI5!su#s#55<9CpJ4Eq)ywqjy_hrXCWPN738onXa=J8ptMFOI!Fp;ul5cER zu!=eCV3z6f1ApUjpbWssN8KEDUR^ChA!!F{%IuXAbLEWp*4)78*T7l&ZcNOW^UQE} z)RZVtCF3Z;_?)eSKSlYx4+7T^dw=bI?gyA2H~FuDhZl`?YYd}4bf8IssE$TFEhPd_ z+rA5ktoYU@5N^m%;8!b8%R0GSZ=?Zgvg0OZGKkh^&NMEB+!e;EZvPS77!7K`#_P-N z)dbfxb5L#7(*^k}$Ln^;6UK6DPXv}A-Rj%ikxZt&6D{|$OgUAJUi-pr$TY`g(NJ$ zAdhfQAD%7F7>lG|6@dGsux=Es@V;OfsNU?2w1@ zkg=<2v1uF8t1KpRxjz9fb27XZ^t?u}>{v@OcEu#mqh#T(2aBc4R`xTZWFyE9E?u7%_gW1P*LlGhKSTbJG=b<$n# zRo4c2DReTz-rELMqt^rd$2xfva_o9*Lw{R66L0EA@sRqIKZp%YFu zKgz26_4y3EWK&@D(0wHM@>}&a6`UWCpc=UKR_AW@}XuXq?>M`R46FBa!*2&J9; zQEg2RJv>9@Zte=+WA%S!6;ekUHU%mDc=3{)A>q+~#5#d>a2G4i%1HuD$L#59L1PXh z(ZHpNH;T`MRusYsMyM3R-lVv;@uVW4h9{2+bINWS`#5b?ne=@&h2MPZX(Liz!x)0i zdL(OQAi3CP_GS^D5D-u;|Db^_r#3lV_FU7&ULBpxwxbyKC3dtNsTwFf?Qd3t%Me8X zTAdp^%RtI3ERy49_GD_COqbLP;oQ6ZuNL4Rfjd-_0sY|x2N{rR(4nUA>(dqFx&`h3 z%9`>uEBv@-DG{Y$Hs7wy$Lcv@mjahTC3%E4@+?z%WOZ8_*@B{&A-Xyp1C}+=?Zf8$ zKoUQ=kzY+Mh(XClNgywEL z=ba2k0>D~^p1*hWZuxp2J#eWc>b?@x;n0FCjJ2#}jDz9Qtrh^o#g@*y_tOrM-%NMr zG1c8K5fy!e02G*GS896h&RVTsEn3KP3Yh+I->}=`jnn#7{_VNT>q*~k!zkHyB);(` zMBn?|U5UMVKp@4>t5aoipe4rF-p3Fc`EXsu^tB_~8kWL)LVc$5xl^cfnil z?jSynJyh>6;@+@#`M%*Muh%Bvrh;c?L_|d56$nNukX-SA+INl`cx*u~bmim<`F3k8 zB{o33MmiH++ezaXIy`bqo+y3q^x1*Sn#=d{JF*Z*efcK>oKINF!=e|k{10UEno#B5ydRxH-fOKR0PVb#Q99jCiu{=+$gqED}=W;BgJiW5zciuGE*y^ z1eHgQ_{5PQwyi8iYnio{erEKLWeg9}2|WdIO&1o5M=4r(hqnCQMH zd-u&yHmU9~DEJvWjEV{_F0boHczI zMUrLM2NgB%&}cb0jioZz5{5m%reF+E8EI5GXl=qOS{3*p{2f{-CX@5_o?|*H>`|j|&w@J@TIkP5$ zZXi^Q!i4F&ap-HMsZ}Z0%nyFB6Fm>ZIM3U-&r>`}5CIrzd6A6z)$gOq$R|khu!P&u zlL1lnC8#L_iWKP8i)2*m`)QDTZqYN>SAQkt@FmW3IC*DfeW@BMyRj*j!;@0xAcQeX zN3q78UQ`P*1trp9N{TaQR49~5V+jJh>Ch^u>lPxY9Kt z2}ljbmY@gO9@r`k@?|mX$`BQr<3yWg-sFN|$>31L>OUSO{#d!#v)#*8$jfx#O;bUs z(@N=df!`kCKg5dPxQp*O7tB)feK;t;-$WE^*U)lWS@c&0D=Zn0i^k4_!lnWuSPnkxMCOmB{ z@Hsb~3MNV}`CFLGG7b_a>7>LJz4Cx75J(IMXJiUa}jo9d%v!~AS@I@lBCZbjmTwa zWpBB8JTQnwv|y2oaf?wWM6f?ibs9Ui05HUHnXM%7)2Q}QlDDwlgh6yE3E1&|Ush~v z`t@o0Dr-8>x|F4#Yg%~l^XuK`D@dT>wmpLOhn<3tM}y;h`X1L5$6KAo|4=bM;8ftR z*|GgfndPT9n~hO{T-*mNu)7h+<4rmh_uE-u6-xO?fsk&S?MSVLm1K;H3NRqVAF5*0 zmUgZ6w{RNyV&0zj4VpcY+DYw^3Nfo_u z_s7DphJ6k?w)o>BJwbd!?la#}p=ge&pqEphK4Pq27_a9T|3}kR2F0N?+k^l?f-D}~ z-QC^Y-Q5Wu+}+*X-Q7ZPcemia1b28#?)#?rLlsNaPEYr=oO8zQkZWtC=aKE*v@ELn z^x>w2Z-VaSH{IXM7@wE?U?9jn5A`Zr-fuPg_Ri%L++Je>S zevsA`*FBVObAxO)cGO`Ws()5GO1P5MY4_2xbkRv9kVJe-u9*fZQVCjye81FznX2x^ zMv@RQY@FG_M{oO%cnT1)j3roj+A2NaK!TuIyTJ((uV1kG&57mv^<3Dsnl@rHze0Wg z*ddkA`ZiW~zb-wei4Kb;G?ik@4TVHfqo>fvc{Z0plR!3^284WG=rA|& zlZCWUrKVf;D8fwO^q%v^z72v7B}Y5Bs9f9^QGLDueLeQ2h}Tyy;AWSH?Rie&d5rf> z0r&m7<4ei=P0qvN`%6xP`rNk8g**C3OF*@{qTKUDDQD;LFvnG40d(p<4~^IRTDE;t zCRK}PggA}R`Ic@3Z$6@1;S8oypc)`Be3{4nc4YGgiYB26!K@^)k5(#MPO+;$@TLt7 zG<*OBIW&uHMKGa(MXPuV&kN)ABN+lA`j~A#vGQ57fshT=l_{_qI;_=nRf9nbG>4@C z&j_$NjjX>*H0{^zHdD=xi_acyT?+#fs$r!OHuDjBw7jULU`P0dl)d%8(vUHO_dn-@ zODnPhFdl*WZMCTU7;Pq z+5n|*m|Ax&ALHO^Jibe0KKm6R^^qaoI|lE!L!a!N$F!X7jPB!%=o>pQrd_$WJ-MI2 zw!?>hGG6=71s};#b5>nV*?#RzUy4pa#C!??ICby27%rt_x2KX^`Z8>*B9Yw4Z=gYB z1NP8o+lcSU-~S zw=UG#OZ2T->P}358Gw@E>+K5_h1Jta>iSZOJ=larQW2 ze)q@s&y3jF#d~MxyLaRpntBq02@wt62__tFqri^5Yv_Wh0 zkGV;n{is3y4&^-rhURA6PDG4Z((KdlJH%^Hk(A%R;+F|v6ROhi-7<#4MIGATp4en< z9XPAtGln(|?qsUOeiGf&cgb0)Bmv4E#UmN(Hd^LpZ*KE;a9_51sU4v}K`wjm2r6sf#~(~+7m74oL&U#i+6Q7e?wJ_2 zNu@!kpSN^H3qc8=LLKM6ua83-G==6_)MTvTHYBFZS+n4)R*p5H?P3xtS@m0&dL=v3 z#4yd>02(#qt8lBp0`K&%?LT5trsF|E&I|Dr&pr10CEuIa+d|KinpMj4@(}MJ-P;b` z)o)lj?LS8!e`#Zy`VI%S?*PC1;;3WC@pq73uvw`=I1+Bo;uml#R3-qkRAb984Yk6r zmyq8HQSI=l=6iz4%z&GFZM=D?0hEM;K!s*spT9m5eb{(>ZH@l`#i|Hq8eL_R3^i<3 z3UjPf@%QKVC=G(YcxfsYEvM{NJ6_m)g9VJbbk#`ZgXg%8&(XgvgvWP*7cxUD)Ds)u zH6p38Yr4xX5^Tp5<_4nY-cBwDP^Es)-U}x8koDrJEdt@pIp`hsk$Mh%pysDgI%d`yyUK4KoNp+ z+@)#Xp5F3zwOC;i+V3)r_cC&tx3j=fD$YA&%R@(05DH%|UEOE)WD=CHuX!fOWtI<| zp-v5kirU*n0=T%OQ_JVOnQ2j?_X*RJ;H-~%MfJ>zya*$gOJd_Rcrr-05f+dLE8&@N zZn~j-XJWh)^`46Kc0g6#-y?L;J#6NOSs3pOoq)8A0w!3M#W3!rROirF zdC$h8Ae_4p*zaqZ4-F?H&D<*=hD~fP7!Yq|B3{O0Vj5_yj%QH-9szn%a2&Pi1T6mW zVgyAYFV0t(z!E>5kU^gyz8{Jr4*3Nx3ZKy+`OgA8u<)1dx`=bIrC26Rp@Qx{!%57| zSmwR~hXTS_TA`zr-mjj|tR@55fmPw^w?5)Fc)JOr*E=4H&T+y}42Xhg znh5R9dK|-@P?69hk-5!IXC9ZVMQ?_4H7i)wu$uX#LgyVY)dYzB;td|mdrpzQh<*6# zUlX%7j`1TkF$n{uEZ+)+z5Gq%7>Wq3v3e8lfZhrL*B%;B6TfMaQ!OXYO5=(nn+L+7 zBFtBSX9MX4ve#R?!^>^AOD~BkT*{52+0}Y3bsH)^YOsC-f+`vqcUzzlKeic{IK?H% zeg2MtkS?W^TTfM6t3G#PJ~v`7qctxuJ}*N)nH9tz&0<*t>U2ZN5w7ukQwmaufXtGR zVWhSw{!qbN%C5GKFRu4j*t5a8RAb1$ktB*jp(D~B@+Qw!<(vFDTN05DFw3E+{NPOt z1+&|sM{)_o$~WzjP%x*V)l&|KOwsWpb$#F~W*iioCDomqQ=Df?(YH_CyRk3v{-UXN zZ`6q@{Fy9JhcV*BbQ(2>qlRqj5o@);N>?tf}2OObm@+X^o@!@_j8gG-1!%)Q>>yymiouG zG6b0i2d>(oQ5D^+Y~&;zEhG+1$1~!6Vm2{A!cio0I^xqmQ%BPdpa}3e#uuENMI_N4 zFl=DfPMyF2SH`*vS%BRkPj_v+u)f(`XK0C=wp9gMR+}a1oq2kw9O>3&ZoL4y+IPfPY(m=h$T!H!(h-m`6Nw zCg%C=@L(}{6BF8$`*%5O?d4pmCLc;6vXQXXWPW4)xx(3(kxxlTDhm#k!rd2jTg~Bf z1yW#85I39hgl;8+gX;w^n(dd*%=m^SXz!WVyR$(md>oU}*GTN>1*&v}insaTYchvh zgYxdsUCb`a^(;T-MYqGk4M=9`QS4QUitm&*YbcI{)>u@uMdXniLu;FCsHQ0CGnx=9 z<&IP2xwS-~(D;=AFa*iB{um0xY8^GMU`-Fn>HFfcUxX|W?i`-HLZ#D(Wxp}cq(Tye z(*uaqzm|>7TM8T#=YbcG_x7HZBT zT?Hr_HQ0c#TcGKfoA)l8cfhgJs5PsRon1`gdiNlxzot>#65qgmUsfYTLD^*PHx%A8 zR5O$YC?6z>;TDYa3k0*b^*XgG^IddDgGJ_67-LWzmESAB(_oaM*~7#lO-`Vek-!)s zzw=pOL?8wyW?f%fD`;3-`70|bU{kW5a~dvc2OBZ;xBQ2t!7XC}>Qw$kl#TUcUFYgd ze#o;H^&5M2J^nJ}ARzQqa1=tPe8-IBmT#+QRBGRO5N@x8x^ne_W;}2a63eWTCg`<9 za88XLGz)(U?=Tu{V!&d)1S(CX3nK3nHWn!pDOZblbvDWUf$GxdUo1jcpO#c6nmC#oSy7~Ru9~HuVB^A^)>tGgxu=i zq()j%a=pvrzCPrm&8|&xaLCFcWLFj}T~}8z*T^YWlML3@AA%$@UAVp;C2iOz?f5Bf zpw}{Y^74>Sb>Y((M6G_CsZ>@?)Kg79h2T49T6`s>*8Zhs94s@GhsUUHM(awyqUU#M zE_E%UgClL!ONTX)KMX0jb?xEKu9%B7yP0$qR3|nE)G;##3Jqopz>(?h-*~YXg$rIJ zBqrLy<(G~a#3Q(6D!5|@OMB*u_)*rMu6WvKa9Ab!Nw;(o90)$;O35o;xf&*HEu};1 zy@-m`=eGOsBVSE4nIbJ`$)+;@CKe?HV{^e3RTNZ;Xkt=qiE-A!Yjgj*|J{qk1LsAi zfI@I+p8p7OPM}ic^dJ`Afio~tc&eRFByyUhJd`pK)@0?P;;wA6^M}quM)D1ucjyiqLW% zj&$B1wVRJS5ABR%6U{7K(7BaYhrf*(ZYw4Tm6c&rv>&+gL*suY`o_1s-!LCycR+H= zeh7mT1`rY>hAk_sE-b*3x#hIEK=y+y2#dqeM{-Q}{x%vF;#%JmNuq2fzA9$+RpXa5 z(_K5OT>*&VQl~9lui`5(OIV*wu1ND%GH{3@L&B-_>;%=I%|8kiIFhK@VwHLDxsB1V zv<%3S-`L|2RPT9qs!7zol^O{f5PcU>#-`y29?wG12cpxT(H|$O1A=+>dhw9SE+td0iG5BCL}M*uS4qE#Ik?x0E3$AW|KcO?5XCoodAb2+08k zNP!Y4E`~xxgUrm*#A;ZPiiBDn$%&fMTJ35Vgv9ytmO-Q7BFZ6z%ISz!j>={G=1cl* za#A{a=Rbh0>grd10N4R76mpT=@l{U>%o;vUpGM&wNGkMZma_X>#zL@S#lgAT!^qH^ zU4_QTB9z~h7Q}AKw_w^til-3DPlBqBu&MhI+(I{&e8u+WmR>bI`iou;^%tW%uKJf3 zomI9Fph@jVFAp?%Hp!IK8&IThtbK8JL{yK~$KlN>iY{X*LS#IX#=-=U5@Mq?sg8UW za!dia}YVpY$E3uYq4u-+t7)q>)ua<@Zy+HpKQ7 zWu$!^GHk^mK{gJ{{(EDbM#f@BL^O}{T1o<^PhxY?`wpH>SDm;shMB_pN$sw8yvve% zTeXfs-PAtGz_$oR@4a42PJiEWl&K`bKS_{6

    ih#e%~vn@@Nr`sqr4ie55ZaY6}+ z{VjC$B9jHK;(Q*M$~~s)6$aUG;I^iQ{;`D5gLtlkEA+lFOVAAr<5JWxC)I z&jj)dC8(g%LOUhmo8YiMRcpmz2ZBx7X+U$2h#lI7h1wP`3RdLw3R) zZ%OQ7y-0s0pnzlAjF;0{I%{Tect(FZjll*}I7(hfnI_S#DthsoV--J*BRBp61iz?J ziowJQKq__082iM&&{_+fP$Eb*h!`#~)H0)JeKn*(Mccw)fkQ6Yhdp{s1<}FAhVsr( z`R2-d8l->Y;~KI&Lj4I7`cyF|7&rW}35uCe_;b65@aoGKtFXaHthrx89ZI&cSj7y4 zBegD&I$yuiq-!d!5m*cgaRH=gbe0Sy!W4&F#o3fm>0{G(=$L(+XoC zq)_32==385S`3K>Rz9fXafJc&n1eKlS%^@OlKDLjwCnrnYi75T`~K73NB}2Z2d-); z&YE+(_kZj}4jwz7=e3WPq?_$|&)uq(m?rSWZ1fW@5=8zUC6ldp% zaAJ6gr3ufNm5K!r&vUH^Hbj7vN2U$fUFA5viI7B^GGlVfrw!Wb;e>yJJ)5R!^A-Uo z8@01$znXn=q6~YLw`Z0)|rul)lrX&>?9O$$W?PS$H-@5#U^P4anv?DLG49 z7fp@9$cj*{@-CZ=sBN2`??mnWBZiDlXh^Z++6)0|w)&0?Cvrbypl}6TsyikPZ$3M3 z53$iKt5!-|(4SUmF4Y~2d2Jj@Ww(5Ua>r=y*PFSQKL~I5dbcWi1JZFh0Hu(mJz6#;h3~7zhaBj;Nd8G zp^h)@uS*ge-;O!+zsFG*iqh~FYFdLSPUxx4E8c0d2vuUu;tE3%K8o?~n=hQ83Q?4* zw9u5zmUPqESOK(bLXpn5YIdwy8OgI52B=g{f=t!Lp86x&FY0|Qkfb_Kf4@~5&DZg# zzFH6N#y(P=Y7^V)8hK{a7XFB=0&^PB>A4Dqp{mxnPWd&zhDGgOzt-sqV{^AbJnP1+^8Ws388Q>p&6H`a@7z-K|V(b>nQwT6i8sFNZ*|Fpn8m`~qZsOxy2UqlUszt(C7p;PzsMHd6T$6Y z_x73cN;Yl^RIFt^)h?ZQq=)-fbSaWk!$d7)h)Ok;Ex(b=2rQma*G8F3ACksQ9*Y-&S>k0E$Aw4}U}W#;IyL9ro^UeO~Od z-44P%rw?GQy4A=2S>1u1pWg3=NftmCP7Yq zC&)69*>8bZdZw|=?fv#E9}#l7n0#eGw*S9upAHG}Lj z-s-T;b`5(5O0Ww-fwITY<;S9wT6v%gd`@tXGlJChR9Dtn z_O1djw{7_Yv#t%^uwuQ>a%f}cfyH-4#5WsJLD%zgHQ4-blfCXVydOe*e#$CWrLLs? zZ21^xswJe`my#oa6^94y)6b+(w zZnGOAybkR5%@}$mgXpndX@>C`EqPfIK`{Gsc1LNeWZ!uCXp~rC;dJ>L74O{-JEzpGh5Y%bkYir`mn1FwMfdxJA z0tyx(kKGr~yukG~ru&s8uZ^WkA-)@-PgnyBAFvg(Y`0*%r#!qJknz@L5A~jAQyzxJ zcz=U9WXsx@}SL(>%MG(V&*Vf8dOhc|`jWkN~brqa+$FsAX zvOHl82yJYgB(;BQGy)P~p+AMeo}UPg>$7ISJK7gMvPm;YiGP1EW+W&Iw3JPoYMw)+ z)+hLp8!V15YCsrgjw1lqND{jYEoph5$Mt6s^!%V!$NK69L3(ec$X)lRd-z(~eK4i; zde?9hfn-*{rWGPo5{r|H_b>>s&y7@ADqiAnGXz}*!Pb;sp^+~jDdxyrxs1D= zQG@hp0eNGym&@XwwfwaU5p>l$fhOTlcB=2B?^)=SGDWlccTI46uus}Ou&-uaoto6< z6Kr`f0|d-Y#j*A3xZ&b45C=fckIHN*neQQhuXXe2~V;^n70NnY8Ow z3K33jk$9r`5Hm)UQ@`yXmfhCgObD)tVc5#4-p-#SIzdL4d_c#S{?$xbeGO%}Pnwip zNolrUS3w2b6I0?+{MIK(KRav_&9r-Jor&_&vB#ck?@F{XgMbHC7=9hxZ@UrVZVh^y zs+CTS3`_UIg2x;;f=}yAd1nQ?nY$6m@bR`{Yxs@2+=8-}B|G&bkR)ek#vb zq+_Nghi<%huQi*ud8FOD6JmWSqSpL}_=flk;(=a$z`R4Dwyt@$`ix?DSnnU#w%%Mm z4ETv@mk951IJ5O>FG21KgirnpO5|QWUzdDd71ux^neiP2Ad&MvZSjuid8+8)ypZ{* zWtt;ZdU*>fUpV}eatXgPk`9f96)9eDq?mmSMw$VU$jPAk49Q|#c8|yeZrb;Z8l(H zx2AE^gTk;O_Gzl6Yjsz#j<#e>3=oeYajlciDo_$01j$rj#U&h=YJ>|dqmKl3-g~M~ zGZPs`4k8F>aly5?VA@JU*dWvbc|GX7(q3Kg6r~DioFp?=u@`HE0xR*mex--IhHIdz zIdU7`BGSaK#`_#gc!7#=<_cb=w0F>xStF-GQ;&&n1GlVEuD9YTL!DtNY>3efK#|(= z9BYQS`g37ksxsUfM)clvy^_rg)#sX!{$BYmQ39=|D#RAZfAETE%4#srdsiQ}7{0fM z^}~zpBGO-Udc$$>GY<=BVJRn&6!EwA1!Q9VUwdR}&@om7JN;}Rd>b)8l;0nTNE8!^a`#0I$!ym$ zNm3IC?iC~q0+B3Bm|OHZX<+pMqk`gm0s5i}ioFz|iFooC4NeFZTHYxfrp(Er8c2tx z>~a*jqK2|MKp7`NU@D_u$FP#!X&#PyCw|c*eqK*0w@GNN(diYNsQ?w~Bvhm`=Ei<- zLPFmT)P*fRlPi(#&()irz@6nwn+XRz8$;xxL1Vy0n-cIv7&G9nFfjotqBF>TGc)MA z?MLo)5EiJg#m5}MP`E=thc%zO>Jr*xt!P0lRg@o6+x%SoiFTX0(6SJopCmjPU=YA2 zPb&U3=1<*JwSkwarHAxs?hXfm+W96GC1_Qn>%Cp2xLr@M0RY|~!?LdkxRuuL|8PaG z>r>mnmj%67&(~N3F#mQ+#ic5SD?e}%Zcfh0%dGC&Ktxf(^*wZXsd9+ z?}cZ_^r3S#P^&adGQGd_&ZI8NtDpk#MyvY%+qLUoT6SFnSazL$9oM^jZ@ZnK+MjCe zeWT~u_2p&iog0*)@b!bF7UDqL{{E!*9s!DDTZdyHYdN!Y<%8A^#K2ElEkc2@XM$0O zh{JNiKF?*pRMgS|Z`wg|^Di=3xpE4=FsUX&%>V|i&}n?Z@pF0&ARQ&qRbtWBNxG{a zF|JE3EFv8mI0Z+_-V4c$K5NXfcR(92UBnF2ZkHrb)v(EsO7d%yY`hM7n^q}TZPE4( z)QN12A9-kg;kcW6{}X&m_VY8BQ;1ybVoAgAI5Tu;>~W$H3yrIZsx_n*3!y4<%5{yABu4R6X1;WfAuuEE2d9_cILjK` zb1SJV**1_*4_3^2C3t_WQA5dEox0gm#4Nxjt3V#0814k%1csIfpvu9h$no-xh^f>` z_qpGt*a-ge-=0PE*JtovM~i%)|=5J0m`qNbOh90dJ3!hj_Sa z>6!RY6Yze&_sMD5bU)=x|L+6-`Q+?N*HNv9##2TjN9Jq3$Olyn5lTTnVlk;b*R(gV{&$UrKU;ov;D+(^8*64^8a-5& zSOl6Pee%Po!?-?C`sLtIK5rQO;~aadhnO@Dm2b|uW=^SQ4DI)%D0H~$y~guKrcprL z-i2J*PbG`7T~F-f?&fpp(3C529z2$=;~y*Dw&-O(T^m;YH{oa6=miQzKUmEfn{y)00(<()tIKRAlJWQgaR!4p<+{+N``U$4NXIHRdA8MRfui*Xy1Ebv@;sbA_+I(f$a!7ocJS zwPCl$N+p_Nsbc0VtL;#-7y72;55+>Tt9x6%Q7sqhK#9InXV*SuI zOpVZzxTT?KByF8An{@IQ77HsmkifI8KZ~G;906}PIy*B)m|D~Q@V5|_fTlulr@FnG z9g3AiF*$-4`_QpqjJb;7JQ^XkgR$oda;OOOGyEg$bL|&to(hDymLaAVyMw#Ml$NXR zwtHTh%x-JC4jSm5Ybstfm70{EcQ%q<%@+J+OEG&G1b0m^Rt}dp^cIL^@%S1a+?HON zEjo$M=eS{L05(h+s;n%IS#aU_p6E7xLMT6SI9lXLG-$ZFjg0l4Yu-Je6{5@b$h+%7 zv)ae0Q|6}Xyj|4t+=kWrQ-Jq+6xM&T^}4Zj8ARuq7hjJ0vA&FIGrSf(R%ZNh!zIh7 za-8-1hVxh_xP$RYup&$jih{7|l#l=%4R$$8I*ef_?>o1ANLzVftT#ZS`O{u=tbUSFbT=uhG~{rx7j=gL%d-U}dbWJJaf|{oI{T zN*kn*bQ!u7vCX{JSFT?5vzUECXl~p-i6B#tMFRNTZN|z)9LQhrncL8dnEWg_7{lW! zpkzIr^4=Es1B6FK4x{J#h08Z+DmMd+)p7TC)(5aiN%CXGxvbQXJj3i!%k8R??pte1 zK{h`9u_Yth@cMqIcZXY}*kvsFKy_YQ_$_$otFO&l_t2`n?9O#z^h-NRUEi;-jgZqyHnx4szi|iWMaiObp`tQ{1(xT+dkSr$Uo)olg3_j-U zKn|$baon$G>ybj7(#d?C&l_qLv>0mlu#v7p)!mHeepW zzeSMcXyz01jDTBtUu&Xvc`ejg1Ljq|eCN*fjiF`K;96 z#hEexrE4C=+g)jaBR0)`>NLNEo|4p6~@7i;Ikmwd1vn- zHxZff2gd(9xJg3@Z+{T3{`3Zzsd{hSzwCpQpW0$N91r2~-XDe@KbY$GKJWKA$Eizt zK3N}>yih0*=iBFZUkJjKj@`ekxFWnM_C4{~Vqx(|VyPs4Sn;6JO=hd51r0uPzA#gI zu|#&op17J*qMph3H-wB=W#sP}C*;IG9wX9>elRHqZBiEvBMDsdk|GY@g?2Z-G6i7Z zz`@b`99%z{$y9fTm-br@_#SRoRmezf-M5ORi&_YNSv1-Js1M0P(R1xA3cGCuWSlkm z0sr8%7nCq>Zby(c;#yG8iVJi9t{gH78A@EIq>x9wM>@_an=@#taPlmam9M|i{S?zi zG)bIPWbGpa)kFUC#L1pZ)D%wfZ339gDpw&gDSm<_G_)J^YC=kPbOXSp#J zL5>Ew0`ggiDBS+HvWQ&XO8)|MXZ!=G;!xqe43pz-xWeP}9tXt??`k94t?mgBFVLR% z^;quOYwO-?sJZ9$ZjIaXAr=%}a2ufhHSIpw4eMEaj|qI+GX-KPmOlS%F&49cjm?Ne zMnc5`X}7RDBylI8lXF-`MJo&S`GQaes`P|$UYCa?l98^mmoWu~V@k3P2BTzFzLyx# zs(ALbXnZ6Oy=1^18iQh1etm|ZUk?c{E~$+{6s=B7xP}JoStG8c#9o$;D(@Lo1hP=A z9=Apt>#T`4U?{DYAcFbN(V42V8Rh>lTBW~@UIK3I-wD_Dkx}DzONHWi)CIKW-iEG$ zjmPU*MT%ET2}NX(2sTw>?9$c+O)%4MK(A^?s_dIsAho!de8S>Wm%fK2ctc@fT8-c({2$Wd1Qa)aPIDa zKX!pu%xo9GfjCEj-hePBp(X(n|90f(?2Ti1ugHGd9U%C^*_>tC-hyoG zYd>gS+aBGA9?>>Fhgq%Zd+jOwaeMMDirV7L(3~%|VEg{_Q_+u4;jJV#iCpEM8={M|tTTz$@J%&U zhH<6-3*&{jJfT0IGl}P zFc|K{&(fOVTJAN0KoE+}MxEO&Bw#2ewf}oZgwT;`;4)Fv>{N$vsk^4dEPe0zk$c~` zIrAUl7?mIML`5Zum9j;iMiMh^CtB^qCG!NvlTBxa@tr!+6apd9>%mB)yarAayC!t{ zm+U&vI8s?49buT!HdMKl!>EMN`Ab(d`y5*=-|EqD1Eou;q0f9SO$Fp$9b#sF(`P?+ zC%x`~J$QF^0c_K~I}&o{F4Ob_I-wD%^BV?&Yt7@?+(kB6E*X2MjiInlB7CJ)|DrZ! zH8Pvs=H3Sq|D*IC2Z@Mn8?E8-dJcaGa$O%}*j**ncm~yY?o)+AeVqD{EG}2oyVs9? zr#DD^;ycrBgx(9GTn=wn_1r&u{uEFE*8=`_$4!{1%Op!FqK~a1pdJt#D^x6aJPG}j zw1<@15JY{764xlxAgJ<-xXcs+%@N@JwddV+)AL&9 z4W#P!*_Y1eam@4WI%jC(vF81@$KiCbD#@t(xuYjz%KNUNl}qns2c3hRy){~??872I z1#;7r*ljjR;WeSeBrF%>^(;fBMH2o{4%73&8b`&uxg-3^cC0L<8~6GvfFt8>G>Zgj|76!rL5l z77SZ{GC3Q4>&1%OkbL{ndFX0Me#gHbgm+Xf_upBc z3~}NYDshPpqJRE^o*qcFprc|62-uE!&n*a7t@X;v8dC2g@J^u9Zj-b@l?C?dL>t{gTYE6i-koFHj*P z0W`YYH7aM+;A5Yj0XNy4iW^B>$tM`4@^AqWUVs2^Eb30 z__g~37`(e9{v`tA8jjfQhw6H!de*0ZiEA~$!^7i)i2rBF8#D=>ym*;3TFc>f`;GTH zgLet)sQ(4Msp)L8rq+Fh%KQE}_2usz-|O6ZtG$uQ^M@QD=tJH%_-Y6U2ss;J|6P9a zKV0V(k;)iXaL9s24@$&InJGZe+o0ceDlj$>lgl+B{|^fQB_nT|MPSH$4lcD)o<=U6 zo*XcM4J~K}fD2CpILz7%jeM_GWVDLQJfxg>DbTQtADb(1@J>B6jFCy&*UI*g{VY9DFEQ6ck3 z#yhR+_*KR?WVPs)&{m- zv#;3Q&+wc+qt&jBHi0Vub!qFQ@2!Y59ECqg6(b0kKLxx?u6r*ADWk@R*On^8oV&hE z8|3(z^R!v1)6F?IVQIg2s=kzAAbZsZy>LPA{tcE{lhw-N45QxI%W~gzkX?P(hD9XG zf9!qwDGWsfdt0>P_Ah7f_ za`v%)?(O~T^Y^RIFHjq=cd7fXDar&Sule!?#0x*9XYxKU^A3J}eN8&Yd-?PA@mBBM zc|7v{k?;NR&y3!``_QsrPn3eVyuCVbk1S)B1oV(2&Hy$-MFWxE*iS>Zw?YlJ?zJ`&=|Jg6VTZfewV-8<1=M=UdLPJllfh2IVyd)iG+DvY0f6*4PQ9_ zFpe@a1D^-7PibgSRC_w4-RQnh)@gpu%v|F!>0hfPrv)d47jTl-ODCo*b;O7A-yW~C z^;`ANm`m>HK*n8PEjT{BiFpfpJMv|nTv3P>neue`1uj;vIkgd%EqrMkHtx_uAcR+- zw#WW>$BjEuR6on=0yCsMClzf?Bufa9BNF25p0+kJ=VUp=wKzA*aZ1-T(sILT5Uuw-`p-{`g$7;fN};|tV}X{1pD|`BO%>T-ZK)fS zs^PTh#(pV%Y?{6E!v_`ZP!nWV3l_^_dm6+)0hYz)de@^$oebLc& zS8R}S2-OxDQMnv%e%@sq*AR;o#+C5Jf z)_G9P-k9Imq^TUT9#6&N6)65LwA^$-=uuwvf}@T=XMOTJiaRFGT|_?oDqXd^={@#} zg>2iL8!<$k%}qRskg8rtva%iB3|nIQ(!R+?vrAAdM;5A!P1C zKzSWhFc&MRgstuVL&owfUVOp`_s1Nef2(04>a>z7xZdBx|E{`)Ujbhc%+q(3!XG^+ zKMwc51K#s?%anB6RO1!3_1v}9H~ui7_aag}cRYGmZ1EGM5CA%19~NTZ7Zvd6(>C|Q zO+D-&{6qB4#x(Xw0nU^vP5SuP7?&Q@`lVWA0A!rbT5}yq8O{?-!11hnGnch2f}*e* zWTe(zhpNXG8``tqQPZCpIOJ@pX8*2I_k=s7VS~|9{Wms@WX!gPv=q%uNof7(IXfAm z1NpG&IPiWWwf4}F{pa}0NJpTz>@GzSg1v0!)GtukWE$*tMJ7YVGa^<$-_f1UJm`%0 za+;laI-OsRUG*a>22~b*L+{>;2bOkq+xD8H`^0?_M#8zKX}8j33=#wtHyZQm3+_!$ z`h4F{)p^HdMJk)nLNCEV~Hg(xHlMfdx}MnQ@WSrXc)pekIQ$vSwIWy-H+ zor4cbYR@DpnE;-NYs=UHHIar*QH*I}V}~Yc(6J{@3N41qp(WHIf1zNpG|nh$D~(19$w?G%!C;G$Zt) z#fBCvi2u;0av03+A-*%`c93d)y7nH%OH-vH3F-M1-{}u7GqRJteeo|gDA=QUo@#CF zw15V@594OMeIL|a+>dM-H1Pi$;`0#l0#abP4jO$a@p&Qxk(In-3JQom0AuNEEq2#M zbY5W~)rGBXt*xg;)Et5TYDeF>gQ*?j4(233L>de+r}k%lQ+VPEQoxuKC(gkSkza)I z`CpALrIQpKj3kOfAp1ORx@7Xx#Ayx%BxkFEq2G5nOge}Kmpl`FHNnwMX6{qDk{$F_ ztb4E1VbumssG=iCYdEpCON5qv+`Dc5hN5H+dfaJl5894(bp>OsBE#d&@_2>(xCtb6 z`N=1i4jolIS$@jN$xn|6N$&lk4@bE0u=}TFM29H~3cH=p*;k}`a|6I+k#n8&?AyZ%ExVLE!w#=6TsDr_m zqu8zi?2Ry|YX}1AUhsrexn=wc1resSlL4uuE2zR#HR$>O&L8+YsPe;my8tD?9}+LS z6?(6fF}OVKH+u)5@Cw-j5=NQ0cmrNs>1^HVynNh$I^2~XDQ}EHEicm)cF-P2-Tq@- zHB?lvc{j~lxlt%ozcJ17-b6w%&U`6HGv5kQa_Kh-+zJsOi*U(kC=|}Zai2D=7p-u` z-f$lSh&_YI_?;?#islcL*GYpE-)F=8Rc`nB1o=Bx9u(dY_64-ak9qho8_wLqtHx?wVhs+;hm#qcsT4V~x)WijES04+EOdR7OMY?C1N}08T1eOIKU|3%U8^ zMhhw3HzecLwDH3mZlJot2ZUPiD%$@SD>|{sf9LOTl_&qcjQD!YUkH!pSf6j5RH?7y z=b;$KSs01Ih*+2)s>Dnyvh0jKU|BuxOarS&?NMsWGng=CDWS>o1M9#%T30!QckP#m zr#NBuq`gJNL%v~Fg72>7wi=U?RQO%a|dmB!@QYk z0E+j%2L&&gWMo|T1!9=ApzzLTHqHHjdtiMH&*g~G%U?jk0HBw%pR+PYi21Ltd4igs zgU^wFg`w*3ZxRj-#^RFbvPxN-3vKHlc5d(P^23YN$+_>DrUSWHC>d1XXGgWSi&A$c z5|l#*{om08qeGW=QE@yRfzxjH3Roe%m5plAS$7iK?_>s<8}`!6(KTD7B3Bl9SBm1# zEY8*zMhY3ppA{L??0m!WDO1U`U`B%XppG{ujqKOR{h1m#qMEUJA6W^NTwHnrx=*2{ z0rvSK-$=wqZ;uA~*WHsV+(}ikjK3f{9Rr-uihg{!zQ{mBe*->W3T))RxxfWWtB0b) z$<_7GW~S^O)E(Qb76rvCtI_Nca?}Ri$I5gD3r$m4A?(#@`U?+40cCrpVafTuJWP7y z2Rq}6beqlLz|w;$sYyb734GD?F$jrfa1sU7pWz1(hLMQH;^twr!Yzd^I1^DZIu*$5 z*%f~>CU*?l!{l*%Hl4;x{gF>Q&iKAgW~d!B?!uNE-tvTAbIX$fVu0DWF7|hKq_sas zca8|&4<>2xIvoS(J-&sAHHOGtt`Hz`^>h8D6_M^htctZ8k?Pk8tzJgF>(MRqS3ijr zu2oXC&TjE{UJ1*zdB2v!rY+IF`9G$vF|f{U+cs%zr?G9@c4KSDwr%X#PGcvHZ8f%S zCym{_oOA9y?|whl|2_Ab8gr~M;YV^OgA!5fvSTLj^JotAZyvo;DgdY3#id%)-7}bv2YNYkh%eSdJ>;uazV{$%_wprrLa5lKn-TAIR%#Y;gJd$HSGY{+xfgHl= z{ghcAdS6s8X-ZC3nWBhq&-^7!fc2BUrj?MY&=<%zAVp)^?;-$+%wwF&N>)z1iArSV zChO8*Bh!F@oM!>L%XfR}f4QyCnSXFN;ghd$Jjev;1d=G50VASB3rTY5)I>B-3P(hQ z^Xs+ZSCrac#npel>nz0q8WE+E#-C63zxoa3IWmrHL}11gELF)Q&R)W)k+9GzitvU_ zqbQQ}d9}dBM^_Fy6zd4pW8y&~GyP!?kqU&`8#7qMLYAQ7%z|jh)bug(ugiZkuP3Fx z%R$teup^D&r^yx{5&&G{#R3sb zW$|tyXUm6ZbGI38c{0tt5jC)k zkwZfl8&O+sgflgW;p!s`8}7{EQODjn$gBCJyxMs?V>ck~O}y+>1QT)(KqIP@GLan# zV7w_{%JhLTF_~4|2|VUE9jRQ8uCz@_CeQfN)W*%jACy|O^*6xuH|$qh$_Y;aZ9|{Y z{j~|QI;H?eIRnTFsXI9b{AP&;eqyBA z8u|>3JL;n)c+}H=E?z@vhA=0WL3K##($)HcCT747C8hvP=GVo^<}r)T_iOKFvOd8@ zX-&TB40KqpnD4B@*{rojp&etmOB>VVHRJg~Fs_70SwvE=oXQuhp9vXPLKj*t(L-ab z@aN3-H@-BcOrJ~(BUy4AX{{pEhOo^~&O=@p`>(EkVk*N$rNQ^z&5!?yK6H9AT4AZixw46PaU&BgC9aYAajug?tPR2U0lk|Yns?+fR)!&MCM*t7-qd@ne!t*-i+vL=}HFbeh z7H*>@kG`YZu$x@WQOmTqmUWxFyRY)Cm=o57K#tIMJBtsgbV#5;Sv5a~#hNFVM{->y zJ^t-^uLJQVa_Tu^WuSW^gf=Sol~NsBLUYVq0F4c-1hBc5Lsj z=HlU+%S)}k4WHmQN4D(WdGDWNP$u-=W1q^_v7hNgj-UK!PZFs~E@fzLuIR!aA)oP6 z??+n^CXQ8IX13PZI*GO0WkCp;r%4ZY4XZL2IGDxxR(YiBP*pl`>V@=GDA`9AbtDNr zKmFL5N%j|vG7{(|A3z?+q-Z8^=l#@}>3rpl`UxMxM=YQFS7*+Y7go9uxAse}Ou#EO z@$krZpr^?^7~*NkO8J=$zw}&W@80*y%W<;}No8;RUfZ9dNZcMOb`q$dx<}%#%|oF3 zD*gwLy}6GWI!B8)F1ZZ-;cW>Ex3WpKl2!yVIgj^bsN`(CXxpp;3L$?e2`j&*;<5}55I(N@=1n9%lI-)inIY#npkF*u=Q+0pl(18>L zei;%6n#}dtki)2w*}IBmAuZhU2CafgqMTxwfkFA<>swYH z?_b?cy6!Q&fL{UKJ?-Gsc(ark@DdTah)}(-E9xmxeW8r*2@iTbRZl-Ln5hU38J&HZ zm9F8l9`U3*EjtzR!}JiX>Be&eB}D~j`2TkGUci#ih+(^XyV z+GO#1cybTP=c~og$(-&(=Ho+3#IlFY52x$y7kV0U7-z)LdIo6y? zJ9rvKZthd}PBmdv1s9sM#A%^JI$h+h9f8(g;wL^W3Si)z=v_$mu>_{`gQateP*&iV z^G84H4c@pBtXvSz9VHPMHmF)Pc!J87)Lb?u6N-mVhMVL6I?EX7b$EL|m*)Z%bl~u_ zdSsgllGHx6=6+EjSN>tEUKFz8AX{RF(9c$QQB$Rq6!-UVvpmfFf&rxjVsoMi9My;v z)glx}C7MCJ{6mjQsBBJoiP)ce@Vn9l{SoB8LgeN<<{1zsshc;gHfa|%5>d7&-#be! z7jLhkBH-O!Jmw6akE!GFRbn_Ztd z+$aVp>`)IC3>^IL_%=Ao25e_G>)-K)sdl{alYK5{TSWKd_ljwY zQ@kPALWaJYYT ziA6KI3NV<$XJZ=sK6a3P4@*i}EP$^>X%}j_8~aN*6O?S2n}h)+dU! z09ILYVaG{#^sjF8Kc9O!b&WzF4dtFrwWR6D{A~eK#C(% z&-bZkR*glH!yw&VPvWv(YC;K3>5*8WoSK*peL7`KMJ3Vv48q<}r}_DDL*E?uZJHQo$9KXe@;q#^=InIYnwik(v>RGF zEew`jTB(hs0T8{qQ4r{$GA0}ZSq+3w3!DEy2gj}qTMinG!I{J8Ab?bkf=clS{mt6mRw2-8~z0!5c~=5 zW6gLThT$2c-^o3IGr2}+-{)*IA$A;Od_%e=v~xe7h2Y2vPb+xUDuiG(45Ic&h}p9#w^_qTO<3f!7R*J`fh^0#OpXH zWq8J};cDX+Ot&gYE+q~mBOMi7*GBG zX0iU$EnHg~d@m)Y0WFS}3gwvW=a?Ev7PcL|mb}il=L=Z1f8<4+Y)op+Mb}>}WJ&f$ zV19vJIh7ZOQSA?VVa<&+ZoFt(r&pigQOQF5yv4C1KosUoTEwX`4nbM`)Q!Lh(M>n6 z(N5ivez#-%&&APOc^Jz1Wt1XM-GWVDkSNKgauVMwshC#cIw)-fv|pR40&+uU?=%fg z0<@{=D*#5?!AwGJe>^;jr$#RgP^BeB;F#bAyKqUd;cmmj0|ZruC07vXdh%l>w{~sCJ_cNbl@%jyko+sR~rgYcs zEtWVI7Le6xjHkUK`?w9rw=2v+Rik30jL(s=a>koS{GhYNq2BXTSuV;A_!|uS&w&Zj z?`_38#s!S47>|~l&6%L20EQb+Es%ZulwYpK6p%Myqm*L1#y9-!tV?YO-jiBbZmP{A zX3i`@oHL>;qgO*!w+z|WtbwdjbP5DYSL&fI_IKArU1&2lhm>Y zcaUo~ES_W9+k>A`F%AJIWJv)X3?VL6F_lIlPy6aPoE}5F1@4@6`=W4Lut|2<{t)x8DA;I@*Ofg z!?}|y?h(^Syo&xzx!S0eZHW|1APFuCkjGnSV4Qx$Q(|Us%cInT8zFICtolP96|O$B zUvfG)-9cF^5md`#Dz$?x9A-&u-~KIvW#{;MX}NttI1R9YHb*7bE`gRd5&PXnDVttY z>4pn)`V{8-=QY2c1-QATK70S^$h?*|}ClJ+O?$xd838M#wjI?wOg<_*AH+mIH{{Csi9m+pBZXLp-W~uaI6i`uq#{jjY>y z^-0T`xVemZ%G9poR?Ylf);BYMuSTcfXbdX7nV^H+_gktr>xMYJSs=-Q9q z0VX4l>O3#kHgm<%LaTI-OifQ%6Wlg{_utYz09Nct^+oX99kFX}#_QcLtLdZCM_ybt z3p0(>GL|A$74Qx?$u#1!Bw*r7^c9H^R2G881Ji)Kfaz^HpuF44%8H>~TTlah!<=VA9++Z7CvEitvvHYwo>LXAB%}z@{YK!aARr4C3D5C`uCMg8DegD8y1ZLFI?Fw0%P7Y4jXe;6Nh#iMDG-fI zd(#w4+t<?CVzeseyUEFb^tdBfmXY= z#BQoo^$I!N7YY`(^V)gRe_>#fW#nKBMA|DzW$1p3>_Xc}1`Dlgm}DAeL0D`&@**2&{8%1uZu=DW$BQZZ|{3l?$q7Uvby52d^i~ z<6bt7szN2*wiJ|3DMF45^*7|Fa7E;DKbEDl6_{`TFBjmG(v|e>fiuk|jhe^nbpSuq zPi0>Miz#8KiQ4HeqJp0I+xgTV+P_}5y5AiuW;5!76wguprEl8%Ip)i8Q~sOHKp!$U zJm7$G3h;2ZZa@2_CI|`IU?54{C?`g(`3>xAjUxZ&n>-UVBY7RN!2QT9Rs0_s?JK2S z!g!cliwTsgOU4aL7LXdXcno~Co=Q*mV)H*30t20+ZX1pOh{`Y#Ddccc!2|Fd=7mQO zwqw~A{iOVczQ5x}cH@w|#<}CZFoj8&?NVZ(NJ)n!Oa;ZMlp8iy5ufc(SsZ!kIAqK> zj>XuZ4sBM1oXZ`xxo$LRuv1d#ZxOM)7dKVm3E1wObgzs&fEo>+6)Ou|@zq{ljTgQEfXvf@HgnwuI|p%bkIeOJbx=l<+8CZ7a(2FT6ciyCYL7 zm0z#s_^9x9VF`(yKT$mWb!ea5J^|)ts}z;8{0Oj%0t%WhH!kW#DL)a38!{vn-6Fd$ zetzq@>EP2hxHfiR?6LyRy0q|TK$|uj_RtMiFrXJJf>rh&gNU&iKwyJUVG&0oG*gV{ z`r@$|Io2E59kJzKG70bsXJ+rWp2`z=5l*whw-~v`|M~G(LA2|!_t)6!IYj>n{4Wa0 z?bG!hw`LpI=M$8_H7WmAp~&R00UdReW}$IcklJxEvd$|yWcZN` z+xC@S?%uWti8ch32i}=s%w7uR1l*UL}NNvokAHwcm@Bl6xS zBgn!=K8sHn)5)8u9|M*bJ2@hL8R3x2O3*NY@g!5?CBAuC~1_W7TyLNleQgLMg#Rp0BvZ2lF8@gc ze#-{fs+xmU8XaMSG!z{+`M~B0#xr)ZYSiC3KNaRLh90KhHKxT{%IC|tKLmfvgY@xZScev4B-eV{h zzNskaKrW-s)Su$|wm81S`_vxt9+A0j%%QimzXOj$Ly`(P9jKVy>tYtl@AbbxGf(_012`^XE0n!)Y+6|_1qf*d%%&AKS$_k{(rm~kb~=Bp6Si+IB0spv^e&MxX;KiWNn zweb1TI8T3jjucBT{6M1Ce1RFFDmV+MOy|aXF>NS+4tFZ5gu~1{b{UYIeei^Y9wMpmj#bc0d14^}}Db1v? z&b|$lv`lE=Le>8`zv#Dh5{U19hjSBg2_({Rrv2sBh4_!fueW=@`ktivM)-YPeeiwm zx$@JFSa8Zms`&Uzm=~Yd{X43<>ZdDp6e20ahZ~yMI(6~;;C5YQIwtQ=o#GrWHrY~q zcl|bRECL+bER(8iQc)l$iZP%}xGlNM0b?RNU2?{{%vD~foLs6g_k1K?gVb51zV_Jp z%VYYJ7?dYn@ZDC7YU*^xMtS420y?kKn(U8;g3Bh-2>61ZiJ~7R?ZRoGoI4FyAijtr zzJM#7X`%{IkhxRCj5|Di6dS3nxv%HmE&nmI9usqjj|+ErH=CKY?Y4yw($L85U&K?C zI7$CRrMj@7A(f4rg&rTE+S|?Bhe^+Sd||H=P?%0)(oj0XG@w+B5{8ZMlLv>K30kJjd9o_n zt4obGjQD>6Inf_=)R=^(M9XQ_31%w_&CFIdJlSr| zblKpf!mr)Tw@y2#_bt{bOeY;6l2zfrQiW`BpnT;*H7(|alw z1GR%Eww@;dT~F5W)??mnvu;j09CagnCS4YrR2*==vXyIZC$L=~X71)c6f=$EV^<0( zn?yf3BkrV7Y;~BIp_1S4CX<_xY^)m9SEn{ELoWe)!jwS!7*h9ci09T;@+lukz~Rd` z)7c`H&V##r?tu*?QL<3xQORE%9Yoko^y4XR&=3)IdLz`-F6?K!Oxop- zL|qj(s0$lcx8n0l1;OG7)@%k1+{uVr@Y@0`Y8!Hi&R(ht>U z1PYY6^IFSN(hArG0CBYjrjxrLxu68Z9tm7!gBFys%<1{G<%2REjQZeBX;wmy z2}8Cu_>Y5(wnCv5_~V{6(b7ZzBwD`c<^jMlTWP%rv|K6s}{@5=ld*7 z1bO}lF)H->x=lK}0i?n-r$kl%%O|R%EEWhT2ZL@AO_1kXF!{+vt0(Ws<-yJ=RpdGA zW=6xn5SzVIsF#9p#%t_IjDQMGB}Bxnt5YZxl(eH~6Y%I{y*Y=+=>uC!cF$`Vmc8*x zs2seHy2^^GqD?LbYh&;zo{6>2+job6Oj~UKv9e3$gYpxQf?}Q?aA!as!Fhkj6ESE= zNKzxqo<9O6n3&JDQjgJS0cJ6SOOImADhSy_th-gUEFMmpt3ENw8?%j4ABk>FrVZ9v(c_~lRBa4g2S*h=d?NOAk4V6fPEc=3qz-x>ZthTbI$ zjXGQtD}q^rZV)c6mdLlI%iMD^prTe|is7pEj8M~|^P-&vI1gw>^q?0639oxf1!iyY z)bO^x5H}w1x|2mLQ~=6qUdY?!AKofmuyX3=%XaDASzX=8*Ozkv8zK!nqAw(cl%Qlt za`lpp6Q{frCRKoQkh-$3NUa^PPCGxUU#@u?zv`@YSQMSm9_Ua^3RCAEA)uqGI39|? z-)+teOPVV!cX<>hf2kF!67h+-ha6Y|QH&AHzSPgNz|J^Ha;*zvMV-dzLqM`8C#1vI zVwEM5&4VumLpvC9Mocq(ZY)u+KQKdO{M}V@=K0c9az#s{6XH8VblGAOQc3{};x=4W za@JP#va&boDwfXPK6b^2Qvs?lL&3I?wZScU|s z1VR?FWw}LM`%}caoZM)9Q|LGN=u)>(A5P8NqNs{r1${cnJXQk}xc*@<)0QXy8>JFhjst3yXKelXW zs`ns$^eVm{2(f`kIKYE}M>vsAF6TC^XF%+>OH8}C6I|2hQ_7i#`xMrPmy_p8#%jpd zD@!iUMJ4ABf34rNh{=2QB)!p)FD#4%MUmGB=P?>1e6`AX4!5@3CQiN8>@>a|M2|(j zBH3monr?t!{FE7p6}J}?ky(R6fpa5?1aT6LA;i9(=JL!)$ZG{N*Aiyw6#)Ww^Mo3} zZ3IDyM^agTp(T^k=%UB(s%BiuEs$?TNuz?=pvHBoK;$Dm)X#E5elQp@Gc)lJTTT49 zs@*(!#lQabW*#~y+VkKO>%zyx4NQAecY%78{8Jh1*qgj94 zT5oIec(qk7_O#7Ype0R-=4iO4fHpVjRAg^J6ZOT2_|F6$UBkQ4!!1gidXsh?jSSo@ zjKEGQq70R8eoFl2rHR_tJ`}~S6niU9wG@V+5}C4BQF;#jZnlG}Dovsm&IwZV`8aQv zP8KktW3X$8$Iy^QT2ol#8I%m|U^Vj$a9Mm3T;eW4>wqU*ig)B(gALGmr|?b^Zfmrp#XhG#O~s)#2vk%D1^PO8PRyMsjt1DzlFxuj)jsC&{v>@}S(%vJD^s zDHz5HW61#ngOXQXy>NgB3VF*F*>Ulp6(a2HZzLGmT?&?~-+16CSb4rORaCEZ8$c2@ zR#@<~JvV#YU1o_b)w*e?pErybpuGC7#r_YXsCeDiUuQwI?_t2&0rE&2Sxb7Wg3I7E zm^C_Wze)@T0+Ol~wwNr8 z{Oboa{iMR@ujx=M6EzU z$I)Wv)WLc4o}T9veb&&%z$qU-`c$u|PG?;fo8sM>?YhL^1Gfg*oL2Yt1UncB)9+Ws z<2Pt5f@=rC31rktlpku3Aq|w;?0!ovN3E^Hu=jjFZ_!Q#=iZ3J&g=Ho<;tt;l z$qD~qxWd;)-zL4pji{NlLJX74YcsOIdhfE-@Vi-2rva&96%)PkF4_Kqe0M?Ym*+qO zwP>UDS8xR}rZec&;5)uykzJW`FgnDd=;03#Wl#<}>eYiA#=be!=e1n#*N5ogD}ire zAdVik@(QtV0=~cR?y?0gBDQ|L4GDf6_)Xu>Ktg~92ofSefq@200fj@zb+o?uz_Tqh zrl?qcw|M1=C^C+b&*rKE=b{qZXML@rS1n;a>NelM43ug8R7Cw^v+D_b3L}=3)yoF$ zI6Tq71t=}H`&SS>FZ31%xD8}#gRp|^)BQIP4=;aH|~p+7a2)$UZ(rK z>G6^bUkB&Pmtp~2U2Qgw5Kdb);_v9j-b0Q|${#@;o^Hx9$FD%h5An3onMh(UykW}C z-g}|hV@U0w#&3EhR1K9!FWV!bp1kVDBQo>GWh5}foeEdgxymWi+>Gt?a#9d3S^`YT zG&sx3ReP-{9(2(8HaWAA?C{xm^*S^^Y>X+nPdQxW;ijOZ31uof)8sN?9^6reQ%A|pZI`-s;71k=mA#V#}H`JVFnM)kzGVD-wb-JkF0wll zba#FWTuFi!wX%+TaltiVUwPj-_T!Dk*+rbl)UJ*TH?dKXT{$EgF70vGSUooNgrWDX zHyUpqPHEnc`Qy1#9~UFn*e1~jQyG^3G_iS9cjW}M>!^_tQ5=*v!7FS3@O>LELDN0h z%QI#G^TU^*4I(3Q(Y-c12zR6gD>oK}BvePRC2Vc#hsmRch&uR&HRii7J-HYf znYpUzl=Tu5MTUF&U5-N;o z%$m!JBDi=Zsq8dHw=5ljx=GBc6}rxabj`BTPTgFxJen4$YWo*{K_yYIgga79Su`#( z@3(G!_uPN2B)DzVV?w86sWU`Y$}&h|8{0lWt6{>GqS&hZb2ldcUM%nVl1AG)? ztJl|#ms#B_BtL}O)(&$1cy0BcKARazPBXPBj@2}(TQHauNc7`bY^;dJiH#-Y>@jxb z1|rTi`2H`-)(Byb3n>egTkD(8`o%5wz-Cv$Nxl9JmQBo>*%3c+D-`M}vFNNYEwyrE z%dw_qMgCa4?<$pDZO!+}G`D{<7vL; zA?(I9p?y>TiSFO()rk1RJyq{p{*+WjN=|j^$g(P5Cb!AamUC3{ZA&nFF`8y#KQSgY z{?ozJry5Qtexjc`?ZK(n+5m2He6Z7b(mu%w1aGW6e#M97%9b(xF}~lzRB&v*h7Wx; zm89K7zV1y_#h=p7q zR5P_d9h(bn>J4XXN6u9~cB*0F>)uW!Hw-HE_ZlIs7tkOeIN}J1eF9y)jQoGX5Gaf! z@kdMz)V4h6@X7i}MkP5fV9$ocpvhCEqAG$}^t_U)tw<}B0X|h{2>Ret_J1Ems)sP=< zer3_ebPMa~)Kg&1p2cc`EObBg{qa@5q`+7pn$9l#^xN-#2ThTD4(m^1g?TO?O-IK zS`;e9!A2UIh2%(QsI^R7M2*H@%3$ArlpdPV6_>7iEc< zRc3?>v9#~EGjUPyYY$(`fZ_U>LT6*+VQ0kn7K%XqBw~feJC^7r(3{DZ_+dO{>uWZQ zgxsL=0>nB5DW<-p!|zoSE)(p7st|iGhKsWf-mSxsR?|SAs+>mj9zK_K8SbgHn)Ira z+#s)2u7&RQwX^D4_lP~pDdkt%rdvvBi)50^(1Y4>eDdG&Qc`hxNTI7y*!T<(ci~A^ z0QN-(9lGldkny8)BAHV6lBl|6T#x7W z-HzbGvUU2>@7{>5MoVkyx#=nFV)N^NZ78@+zPPu8moHl#QT0%Z22baQ!%wBgV3@Ku z9-sa=-#lHM>{79}*aSZ2XA-3@Wf%estOalCkk)>jX{lLq3kzGanc)5Ya$(Z(}? zJy5P`bhId}T=rw7!A+`?e$6+;zH=K~XFd)%S-r6HiZ@Y2<8jiVE!n%VvGCyYvys_j z<+AnW*6lk5+0W`L3m#))70vi?GbdlIq_oRG95_7`L9!s@$=Z*=L~5c83#qE#QRd|~ zIAd)Q2H8Fe$x*A7-&~wTE0K!pE8V(iE1Wj!F_#UT`cqQXkq1%^$mY@O>n3K(q3HK5 zNYuu>^3tNh;V6wXue7S$t@x(YAEN)Y9pP`}-&&hTS~Hgo@h$19jxMVjVMlJFv{y(~ zsAX+hhCnu%9a$Od%hF0%WQSQcqeYyjQqsf54n_jxRNId*VzpGv`>LYh0H20*VE>N) zwj@3ij!Xi+Rir9qVR_;aeM!m>vz^~wkJl(o3{P}Z(^f|gh?`?F_eBR#XDbETmdi)Y zLTV{sj~(h2HkglI?=ExYtaO{5bQW{IJcotq@{{6|WE}$WNPNV*;n+{%ENH}wc!j|? zHS?_#p}ke1Z&O6yqW9^+N+;^$P)FKKq@5;aTM(~>!{vh=$+jDPvldXt>_48{l8ls9 zXWM>05uj>$Tf{q-eiK$+PKm>C@B?b2{nZ})2G6%TDp=YD^;{DX84cz2uf(8D?MQ*pen@kbP^gzyC^ z?|7TO7rQVWjGbGruroWc*6Gm+=%@poer%#{$yd48y)l<@tg7G4wdod)oIuw<%PQ8d z@XT4W*g$yhmTl=0-?_OzPNTY{S;zH3G25cjtzQ9w$~|qUzt8OGU3`+ zo*KQ};KPnK#mgsrnw69^PnEA*q;HeK=$z=8>tmV9DrQ4MwYREMfFG?E=7{6H=F;J% zf`~0ipePudG+uZliNkAk3WI$D;+RH%a!e|Bacrt--KW^|w$7#(*Y@}Ni`rRE9`<^< zQgik$+gR{L@Ib>XtVT|nr~>|-3G63bi_B?)9E4XMH@Nj3u-5G9@&U_Y12Vw zr=!cLAfptiR%(q#5oI!Yz5r)J62N8O6QrQ##P+3kvI39 zh7dGW*{~@m=&{Yaek$40U7&A~)K=+LhcsI?qQr@}EZ!z(xR2JJ8tNrCs6j1`bZb=V zh%9;9L!_poV$eN6ECAIwA1mSi4J-ju5N;Ie!YnpTbUq3Ty>@VJz%M3E-;j#UKTtrH zhcazwP54iA)sWleaQ1PsXY&6vRYzm#7G>;1FFHm`V)eITe&s3w;?cTT$XL@A5aEzYuFl}Yva#bj8UcEBCT@;=5 zz*~Y%qaRH9u3h@kbTBy|AMd??rikPPDo>bx9%>#I9qOTsq{c>2bVRvH1YN%xFMGf- z^7_&`v*5vw4&Vy7z+&J*ZssC+J;l00VYiK!&P?+ z=*bxvJLP7=2SS;#s8r1_mi2QPaxd^>#bUTz&3laDj(&%&Hr{;Wg;K&8ybf^#hRYJ9 z-@@SZLeUlKF7a&LVd3-qEcqzP;{2x7?~N#MdI z_%2WQl`Io*O{!X(@Ow0}-wL)m70(NH;OB`^v#;-ZXQ``|_E?+vI`x`|82fel61P1{-_2jmU|E7#br9?eD}fu(IUnI z9+Q>%d!R=_cT)TD^3CEAJnapCh$p1n>kiK`5>w4YFlwRK(Vpa#7YI4SJlpjVs}FZ# zQ>%f6AZ`sfvBA%*yV>1TyZKcuA~z?<%g6XC;3+Ul_j>Yi{B8LUcvrh)X7U(^J+Q;ok<4>y zZ4QM)POgfyw)KZr(&q(oYU7GQuhW8|%5012s)#*feO;~-I;9rSqAJm*G#hKrV;u|B zRBb0;S!+ut{gj#tRdF>L+sVmom+v^gVXwM!$}!cQLelm67sq(oHy>%hS#>uj<7Z~r zr@3uPUamyRsRo773hN6&1er!ju_JR6Q;a#3QmMyv0%E$Hxqfr4c~K%whGPeq*GHj> zs9alQ9fz+CXx~vor33XKK(^n*=d_=Gs(lG)?!6_TEiw@kpzxGl=CIF|M%JiRy9(f# z^!D|gY{u?lk#P>Sp9z#o^2!>}BVCT^g;+!$uAZ^~{&u^{DEZW>$*{Jpm1_wj~p z)Us)py>8L`6FyxNEmJFZX+3FBZGJ%nx{gpP9WUvy=v0YUnj+Z@zA+Ug(7{#j(8+Z8 z#aHrH;IorBz{#JBsJa{rUC!|iI=y-DtdvwOd-S`u(cNV5=ygK>|LTGO<}gw6P#$B~ zHU4KEy7}8MRcwXJLUbnAC>8}#x^9#u#--4o(EkyoWZNbL&ki6Wfv z15lWE5U8k#eW1~=kvkxV^2af#&IZV@mK?p3sdPT1^Q&!MU8mkdLDzho&Q1MRtTC^X zn=ePzh>My3Ey#P!LeVu(T%lZJ4J;UDR7RHa2D@zPI+`YFa_`s}GgN%=idK~xF}F5sW0tBmEHFoHc%xP|ragGf zN08*z^bVsVH{kL)Nq65Qp@U7=?Eg)}kzr8x6A5KMKG9@6xEi&sOX7r)fuA#S7jB$Q zr4FMgEobtc$|TtuR3N3Rh9ZW?Z)0wH* z9kstpk;NOaLrk@#f~o5&{SawvX~z)ePem-{lFZ=?J_}3MLf>z*HN^Rz+KHWmF?i@e+!Zq0}0^7+NW(Pc|YVL#cnqgka!a{c85^$)ef^sqgl!G#630B%lRJ`3sh%07n0C&<;-{JCFd0}<~0sQ zb3diKbY%f9dGKvSSxv*u^cG%E+98Jw&^6kwa5ZK1!HBeD`YA{1xf4!kV zo;k)p#S*XnNbFTk$Zs^GlqZ5VSV)5lDe`UeGa`hVP*4!LNHajj#RFhJSBP**H@mxw zH-vMlLp8soeMFFR#H}0QOV~78GufVg5h; z^M&Kg-WbWI*m?12ZMgDj=!uTDR79^)6PcPC2knd-x!h`Jga}%~TazjH;nqMmYpohH zQUS7<7wLIMnT4G2rl=#+6{PB%@>tu|`u|_qV-_rHsVezMo{%9qosG+qtdTAJ8*hB<+7nY>2-k!yP#vm z66gvUx&uiZaULgn@g^{6b4Ub*4Bzser&++RyzMO(Qgqr{sY zP_^M;=&NteyKK)}wr;DBCs3uo$8WdL$m{~tel(Hkp&v_n9Jv*zvRa@{GQ>)oGg*_~p{A0);W}jxH*H|$dD=mrtu4LkzsVBHTRQx8zy1@vrywppMYGZEJ3d=(7vGd0ovyOkEDWPE>PkwQ ziK;$(if7@%1d+!vZ6sAI2L>zC4q3B-EX;3)xSg_7C5IC(o}Ztl=`XI;io?>zG;aiw##cX5cicVpYpVSBOJxf#B1#eAw>c^mV5;Y_WyGuc}?N>5*u zG65mo0gT_t@klZVsPeezSWl4&D7XInaLu-UTp38&D)%$<$hGg#TkPa7VYt`Pbph#3?pCRQG{Xlh$jR5>u?SU4r~K&h(fKC;XVV%zIF?cdO$x zjUgJ;Uy$i58)92#t!_WxlLl(6uUgxxrSg7bqgrsbJtOj|=&p#5hL%82P*SP3v!4uT zmT)VM^0I{{NR{abkCpZRW6de;y2EPP< zx~by+3hlo*28?@RcW6*NYVx^ZNvbt@b-4{%?2@S$ujh8}&gv{M-AW$2K+D{Z(P1-h z5rY}?&V7`cJ-Zq$TYo`v|x`28Dk0|?5s=5GVoN{4GuDe{+%kT5fOivht zj%lh&FM6^2enI0fCgEha!Cb5O4zm70>|^sfxpv1ZcIE~65aD0|zV7xbyoF!jkL2JT+BIs3d6&TsLf?7Itk7g13 zW0&+AP~m=}A{H4g6~#{_h5PtMzxUB|cHLYL3N`Bv-!FvX;T)_Ioe4gJun-mR7OP$S z;z6H6G*NCPc1AWedGMee98b$#TJ?WSy;VRPY_J7bqy<_E#ogWAt+=}rq@Rm4r?I8Z3l+>)I zTNYsoD`dI`%@1$|9~M1ca3s0Q_pQmtu2cdQ(W~Si4`Muy0EW5Hra2LLIxFWF3Bz)L zZN?I#`xi)Nop;41#04^fFsisult3JD_PH+}( z;{hNL)qd41ebI7j_-`DD0F=@%D8DPLT*L`e?5Ow|8{8Re!i5N7D2~42^P(7)Snagpt};Leo49#SqZ51*qosz`wLDl5h-WY5uY&%O zZX;hN+srX4Ul{U0)?TR)vh#}T*qhOL{^>RJYdf*~M)pUXAOHT-1-2b`G;zvmqF<{N zj*IB|;G5aPKISYX@i(#UZh&xNt&=7J)Xu;t9dS;}=t?CReF&5vhUpKf!$XMRh%esB zs*@mtr7KGKmbJ8X)m7EK7NGMiAePk{6)7qA;ktw@QPJ^0^fQE}0edR=w-?@A7Os(C#x1SQT>WV-wLDr1cq2z%lHmIGHp$aX?=CX3=!t%Wto#P{P@qX;2rLBEz z7;@QLoC&z~_d26bIl58NKR$l&r1)%bw5A9%L0M=d&VEMBaP|E6V@YZXhRV?Mfji@9 zf8Q6FWE3>AJ%!t-&v>-L6+{vHc?nGsI)9##QfrhqWR~1as>jhLZp2p=5KlWl04ZA( zI0yvj9b0Xc(f$=!xkwmRpq;8b^Y1$`M}J^{hny>?Gn)yavzSU&Y59tQcJ!ik;4KNI z%aJ^N@@QMh^_zQJn*^Bgph4flXfS1P^(v0}gT`mFX2iRCRh{%>!rWXD+Yx1nZqNn{ zxmH^vgHQwsI-_*j0h07C*bg2Rd%*+kTAv@YwsHaU3EwjkNFd}X+v#!xGg}l}zY1R% zf)x&jM+Y~$!ZDDw_>=en+e{0nR*=N7anM(nrELZT4*=5$HAB0-lB%ybqaymO+@qoQ z892ian{m!vW}yz#lzD`QjsP-06i^sn8cEG57IUD-`3LMecbZN$R&Nvf?c`xFeX}Oc zS_^o@9=t=ovl#h<_i#QrK_1=H14sq)esWQk<=JKFHXm_?&UAp{CS&jL@+qb8{C1e} z`TMO(f_lAl)pF(z=U0Y_2#)(;cJ@s#YZosN5goN~TG!TrgxLMVZ^2^WlteD zq@Pe%haAfdy<7&Zo)+UkuiteYa#R-;>!U06jx3 zJcbEgln6M)*^!#jV_Fn~)y?2(JKIvj<5%`M zo$!fJh-5-tkrFofQe))a3u<1nzR|TK zT>ZY1LErgE;u;1rd$hU&0KwCUGJq<7xTJhrfM&4Wi+zmm#f^)Fu=JDw4_}{OiH=rUomqQk#LE zLBapvbtkogwcjUQnRM*8ezxo3T$4(Qet>|zBprVYMS<>yYSp))Ax>eF2L_HF(nLH^ z9_^tyW2%Nq*0xlFM*kbvNw2PuvX9HSN5;}oMHJWZ!>`{t`E`oA4L(n%d!GaS zK%HlTf-)_HP(uunkofoPQ zcDC1s;4S-Iz4%Jw$1$LuKG}=lE|lCJ=+DfCHppXmmc8`XZ31i;gYd>Q5vL1-O8_RuSNTzm)Wx!MI}#R-Hm869I&X zS0%A)exXdkwURwGqH{D5O9G89z&0T)D?CV20Fp(ir61YelxaUF4O=fck7m12yAheB z3+C+e?`&-RI8+Z;TXu9K37%~;Cp*`crqz1g{eq^CUfidA=|sqP9RVWs4fTjH`*M@P zR23|fibJg`P;_XZR{Kb5!qwYy$`To8zWe2+Hb}hO@&`4`F!g$Ceq1n-*m;OavZA!> zEui7(L?QeU{ql_OFUzYi)giFa++oFKwrI(1#<#=qDTQ|R6#4|LcC$#96p*WFP!h-r zS{R%$Rjnc}-*d!lxqk0bAv-HY3Ky|tO4nMZyd<26^;Q1EZlvy{(BD~hoXqEMENvp6 zO`wV&{<%n(WuRuK8aCx2*C<+9oOKQkTDSGxYp(x`m+*@b7NFv_FlrBz;oj06-ZEH* z$#l4oBd^6?o?sF$|Aw#-@o$~kHy8q5;^ZxH4=ulS^E)eIuv6lTp(CaQTU3ed)BW|} z*#O0Nv4@yh4;`h!Z&b#p3LxS1r~*5Vt;_lDokID?nrA5JRp>}31z7wp<;s`2eot@7 z(1jR!`bY>VZarJlW+cB}=`QzNtDB5A`NXi1zqOVoZ_uRLw-Z#hXY?&$sP^91=O`XJ=U z)xOI_|9D+5NXtYRSl&{=oVb$DyHC#1=p7!UQU0blloY@pMxRX^!N%^mpDdnx?v&MM z8+q00*6}kpP^H|@Szpa>)wfMRR$!T9AzLI@$?QIW?z{h2n;K$8xD?AGi%e;{)g*pP zimK0a^up5C31IF-Q?-=TkF%Gi_7g7SkLU}W9w`K6PwpaDa-X#&PZ|O=gaD5}59UreiOx=|dpW?D#kZ@Hdw9M3LWLGRInpPq9jU??;43{r@zh%p zma0|ggX(p1dJu~k!!Bw{D|<}HRw<=g>b^RVWKp5`C+{B>ORhJjlFb&?l;$Ur3+qq6 z$-|23RP|PFkiL^R=$Dpkf zL6lN3K=;&H4`xRaBeSY^ro?ED;M_ICe~e%p0M1DPA%?#g>UE`-d5M!c7y@#YkkLsnP6k{&3%KLg8Jy^>L*T6mf}Mi596eu+YfrS*EiQlt_JC`_y}9qW>JA# zb1+0=%Eq!-WQv{X30h-kQTD>aE*@=d)s2iKb4wySH>m$y0q4)k89ssXX5~&3B$B9$ z6**0V;ZKHxX^5gk2_w9&B4z=>{Ewm*_f|!oCs~Y(I__{tgO}7`;dY_Mu*!4V^@=p9 zyFXV8kmZj&b4qLH!>$nsD)grBaQ`hU)i)c_%MLIe<1oxk_vtXe8i70Cd3}Op?QWux ziSf#b8k}uGGK?* zQIU5n+fB~l4ZUr}y8Z#z3Y}N-+{elG9k89}hw((&`bVc%w)x7L`{$u1&9j+@H4}_q zIyXqz77pr%p{l)Tsv*W^qao=R=S3yTM5jcjQs{%+Cc@b2PHncWayTyco+i@PC4U2(sN>WmP9Ar#UM*=u%+F z1DdCxLIcciYks5$U1y!IF?%$(&h2&FPu5Oj6XizZcj;Gl^Nu*F*8wMI*6+`;;ddfj zF%}F+Joz+|vk*`ca7R5SW6sv3LwbHv3b{%@_))$|>6ROWFaFl^!;KsYRdp6A5f15bBu7u)JwUhmK9m=5(H@?cGZ&9W89 zZ#PcA4YSUM2Noo>5clE@D5Rn!srZSS{faAfH(bNC*vzyW=cKD9Ra`1BAF&e%{?9^R z?xLD3tmga0C-AOVg1sz)QSm}xJgQbf-rO&VnW{lHg%(=B3=1e`G)n4jDvo7&O{rR@ zK&Xrqve{drliQx|%PD$)J8As5P(90Dly|DV!_A%rw(3{Yk&FjF_*TO@p4?49Xo^-)GDp(h{1|v{T3u*xdlIiix5~a6YQ6hCiW$}3JfGhVx z2n_j78JjiJA+oZ6-AjpCs%+Pa9`_7~>f}#a;Q)zejpsrO!~*^p4Q7X4^0_-B-j)Oq z=wZ&hfspovi)zVEv_lz7sdBEM)7wBqwh6aq-;ChP!QC{GjCzP{L0qxnorY49y@wgO zdJ$UbONOhgG#l)}6whv4A|CKSqe7%Qvj1^jIoE-X=5`6DxTLbD zTq{WL9*Ik(rI6og=r#+-Pjo?^D@?QC3s7@_#yYl4#fM55TYHB5l!}> z37KEs1yN=XW*&2RwUq4pFn7B|`m|yPyrAo=d39jf%Z;5azt*Thvow5^9-){O(1s1J zw2?)JM`f=O8?iF;6$S^wwT4qdru5{@_!YblG(vo#mC}8`eP9pdKgjt1X&>-{J+RmT zErom&%0*jIf6vqUgH-juBH`<|3Yisv;R_dsL^4Ti?7Jun&-{@0>`T+l6R7<$*Z<1} zKq@KR9dA; z#Ll{H?jis_n?@-*pUH20H%?{LLY&s~MB?7K`K~@dLNEN_&{@&fcRgXn7=@d72V>H` z5#&{L_p<hez!I*uh2UgZle z^XFOP-R;4cKQdRBUsw6Z*{55TYaQpqR&17_8a4BaPQ{ZeZLdJ%vnrYaw+ymn;x$3b zOmDZHW;jU605!{jF>Ali=Eh$qLE>(kh(_6yV?^n5rz_EGxjHqZwFTH;^=K9ofV2u) z314sSBCi_yM1T8#jjyL{*4Xs95yaB*5xl)>bnyEYd3_Lv6R|naly`*J5#OtMK5tWt zd}*$+eTmnvJR&CnC@xzRWm`CY;NABmF->p(m`OA3spOZOx?c3O)%pc25{T>@`FnS7 z)&;HeuDK&^8T`@?5v&#a7|k1IGM%cMIWtHiLhN;S@@}zvJMzn_zmiJ!@U`Lb7Ln zT;Qzn-fNOS)Z}o?wImvt8Y)3kP&wFdC6+}>#$cuzp>PHXT2ob)pqiyavarB4H84## z%XVX@ z`0g2@h6jGUCL)a4zktW(#^2=%%q|H}%0M)LQUlr-LMlw0Wk(J9y^C`ULxnWA-CJ9$ z#!ZX9VR2`lJ^xka=S&=Jr7Sv5TmUu|^ZFhDy-|O9#q!_q?HGx_-KkIc2N`+({wyUg6V(Ta>-i%3lmX{QX=kC=-Rqd(BbzdnO?NQ-)56h z_LDM^!Q1K|HDw0Pxv&+{e-Q;X7iEU`ZuKw37t;vRyJhw68}5e?<6qzVZ%6EnAHYs| zvpc$o0uFj#{D2L>Qz{O{nGD4N&jsOK4AA+G=lY~u7X}^G=<1r~4YtT7_yWA-5pLwE z{-#u-bgtGTayj;btRuTX=X^JF5dLzceSFcoKHNA!lXHoKlKqb8ny5_RR{**op`z@k@W%b*7 zm8S}8SFYMCxyzH{fV+n&%YoI)EMJ?xLm`iLUx_}PI_uWhO&N4n%eqV3>t~qS(V49> zLz|z(8km%MxXcKJXgjCnJud_q-Vj{|-4TAAz!l_V(bE5m1`P#TbYq}Ji$yzGY(d7H zO1piMikb9CzuR=Qkb7kHDcpk(<3G}h?ZuSFEqb%q+l_f>wo81CNU6@5uWn7BigZ2} zct8n)5k0qc$%JKSOSZmwYw`jMr(I-5=FziwV*M>)-7>R@bvm0PKRqV6WXD>;4=yDT z18T}Q5-Od%IzA#I)of%O5TlC|%Vhk>nc{doYkVy}^WV!md)v3U@KD2+;(37gVihDf z<#)r5rc|pN?ft5H!$f>L#Gu*L?n;@iYhGd}b$INY9HWpeCYLSLYQqH1if>(VbXZ}0 zeBkFg`+HjeDbb8(u<4xVFyAk}F>e6(Cj;q}eSwY4vZukD?KP#!i}i+QOBq(&xf6wO z?p@DO8U~Phq)3OuMahvv|3;qg;HZ@b8@mnF6kEt{`=#D9P~x1c^=JEY$_ROY!fG*h z?pnjj&BMZ`kP=G2N=I`gq8c@3o8Z|ZR8UBWJV!-U&7YRCoMBvLcHEwli}WY2Nq{!Z zrZY&d;vKT|utbn$mVP^+9llt>4-}Jl)GPHbu=yDBYHkOR=S%9>)DV|%5s$dpYD=F^ z_lI5KYRJ>E^3oHPuw8Y&T+sx6f}>()yUboW#E>wVSQ)Khe&fUzlgQOt4z3CrX-3iA?| z(&OrS-K|E0-Lt`;A`g@ihi1i9@TtvCj{v=v1J@IuZlhoQ#~baD2!HOmj`(PO^cq@S z{#gwFr@QW4BW1yBAy-rxo=FmtLGHKxv;ut=riBCjLq-KHSB&De0h-9U^gO!O72i1+ zc})KisP=yQ?Lyj<8aGIx+6M>XcOeAa*?J&6n`!L2mo!O3M(I;gcl3mp(aqyA-G2voqxZYA=EW|MJuBd(Th8HfQ)R z2Iag)ii0>+XNkm}RQ&|;);dt1u5`BdUBhE2qy?P#vCd+T zn@dmP@^S56NNbJ-tnUPqYrqkM`4V*un3D;=-Y>9mwufF{zn85y^bmDA$lNK*0YjF{ zU#BnI2khnzE>(PGL(dn-FN-$r9CX(JDNecQT8HqG_mkF|=?w#Q%HdhjB_%K}(sd;z zer8TV6c&aDvuN=sW@aB>9VibaDvPOIKTLG>CpOu062`u8{Fhdq-WzLjJ}mPJDKf#< zQGWFE_7;;+p;HZH8Oyyy*RMJ5;h^vD^m~m~QjTkvpq~rUe)I%0a#jsY$Z@_hoU03J zt>Hsy_X2!;g?h0J;zawxyeJd*uYZd8MLm@OH{ZUgS2$%L?f>-W!qvowKM&Ld_HhQ?Yj>RD=_FHe%P&_<6#>qgH`M_|J}q)3nuJZ(M+TNMb=$)6KO(Xz}4x1P&?* zTJdNib1-kR+;8T`Kh#Fqb4*Je*CzjW+VUwe_#|84l73S~Ra0st4by9WW(H&Sa;N^K z$mD8L0UtrF-?Jv%R^Nq03}bX1?*c|~+`%YT;iDFe2ZL73Pt;IU#qtlUBoW5>!C#8b z`KT%M0<&f|c>DyPyZv9iHjg&CQVX#CrK^A5zPzR7$OqYTwQj-wGc2M3&v{Moqgr97m*PKS`&WTXhl*;k;` z8CKHohnTF&2nUgT&GZz&{f0eVhsb&*$0J_f9bKy zQko#Lor;IEC4TJg>H=Zmb0OHL&#gr(t4Q&XS*|jj6RnJ#ipy!_6NRSd%p@k5T&!fh z=ZD;G?kg{OjuT;W9d4>$<$iDHr{;&eFbLw&E7o^eFbI!B(#`tE_st~H88{mM?atSy zadH23s41$fD2nTrjy#$zA$2;x9wB7~XhRZylxD`t;k43FEL-w65usb5i8=Lb=-n&v z#7xbyO%51PbeQrj`&s?8%A+&?`9!4l$~#8yX7w?Do(LJ+yrSaMc;y)t>PiIg$>_8> zWphWDnM4oVzoWHe*~CDORIx$TgJ=OKM(!q*P3_pd>?oBK^*xqDi^`@NF|Ag=0dGnp zdc0d`i<~Q5|GMbER_ywfschwH<}VMXgA9MmEZhF?5i=(ZER>Z6_iZq!)&5ZIpB-!j=@szd(KPGHuC zczDSqSDsKLRmcBcVR3V2NiZn0F$VWAqIpXgTmIdNlZW$oRDshzzl55iAq2+M3upVC z@ND`5TH64g_1mKCh;9ZTY|b3LcK=@y*Jbpc`Ikd4K{Dc>Q7gjxi!B6;e%iRHPp3ta zKfOQe)tjpopjx6S{QMS%l&`4Kpt8Xp3+U^<43pbEN`>eCH6&AJIhZWo%x2ckQ|7U5 zH)Y52G(pWjRw(OJ;BTz3$mOX`c1{z#k3p4#A?t)%4Mx>nIKR}`Om8^sY4M3**wo@soh zc%d-5s0(HE*aW93Rl%y>&VC$^Io|QKLk)Bq9N(zqq52mj)adxOMO{zesnnc0yhcGA zIS_d=*J?LYbgQ_;6MATIe~de~y}{*Ho}OLryA%TmIxz^cq0nfj(*(;UU#cb__C?@K zXugA>IBmp=bX@I>z})N2mdl0i!&qkBa$z`%Cu)IzRuwES z>NV!9A|XSE6*EK^-ndllrZ9gat+dvWsJ7YpdWX93`R#DChU`@Owmw?UQVRjgPg4HJ zQfka(lg;7|N`O2}kz&Y3VI_m9unS5VOLz<(ng8C}EAONmo)a!{F0Y`^jw^q~_`!6& zry}POap$#`*)cHXx%RM0V~(W}wn-8BL&1wWX-HE(yUAaLFV;mOk}@mt7;vv%f>Th6 z*N16}kEPQjs9z6`FTb)Ga5KS!1rjhPC=kPNx5ePBVA;yHlgeetC<^kaMjx;|k9y@i zXck)-!sm{1IR$~u5-_4ob21^#28_&!Vas|!*WFj4!tF1<+#q%;ia^EC+i!Q1TP zBk7c>xnSVG?aIG_>~p^u-x8B0EfG~ILY}fGp`rd)y46|_T~|>UEXT2UXS*u!p8-jK zOHwd?0{o6Gl3e4OiVb5$hRYwGVck@WqAa^4#>poJ!@9jKsyVPEr*nOgAunY#t6;2n zZwU-!uOvB0nDU4j)`8~+wdUt_4RrsHk9zBVsD7}SN-Ek!Nr*IYyRV6it0h}3@LqR4 zycb!^ojmQ$^Ix|?-xp}1|2$@I9zy$xvYTlhUNgoWVhI@;jr5cnwI;wEaH@L3P-tAm zp`NaoVGA7^xm>(&SF3K;?}U~!V}Yn}9y=1;z`Z_5_6x9WK?*)fh(1fuiWAt=X6{rb zqw7B@4QEE;Js>Zc&fz==JlPW(i0;5?(4jxtuk1;Yo8uhr0koi8=AXeRCwW z_u}2K&hS*uF-5|5vEObVEI1tKHMQYS(3Uws-zJDGa&E)AR#LQBp~|Ke&fHhnaSf}B zx$|QLjc03VX7J(>6{VBtKqK!+g~LqYyHZ~X%1JBW`1dzW-#bh zUG9sUymNg>Ytok^>=&QZ+(F-uBl1hB9L7s{U_kF)yW4W@i^9cWD%98Bx3O}@#qsFL zA^1h4@#&-`_l#_2w)AQ(#iv3E>8t#5aa?V(BbEoTe^e8aQOEW7`S^jKg<7k42%ci) z9kpYPB|?dIQm`z#)a~_D|A9kzVHzLNj8hlby;~pvAgGxguFFw)bpNu2aH?c)t@=(k z(rNMTl^D$B^i`f28LjGO>_kyb!ba)J$nN9c;OMoqZjMf0A?IV!L33rz5W!yuO1Yz5 z$^)5tFl}1x_@4e*_vZPU(e|YRO-ZAknpB5eQ6$=~C~c)8Q+}e5UXWfX|3jLoKszmz3sk`l{~9_lw=DM(>8s37V{6c+P=-qJ`LXxLkEC z!n7tDWe8}bL^%_>rMg)Gth$UW)^hx%V21kWyb&9S{oEX!BXOB03Q6mWb_#Oyii6Z0 zFfcXHH9+i3Xxi*C#VBrMOW`v}5}%v9|Zr*+x-2T@K z_5^Z@&LkO|s{t#a#%z^FWfDgYOk{y7Ly&<1=}QwI054L}Z*Z2p7T~#3Q+Q^(%a)+-4Wo@75dS5VF?i7Fryzg6QQYa*@wK~`>%do^$H42G!81D1`6=If zF*);;-SESbLln&S;IPJ3cvaRbzKscXh8%gacMW9JK` zV9aq_hoj|yL@&-e_+4uHEFra z%e>u!$v^jh4Wz`gm7pDJ(x{hW>hQ^e>dSX_J>TsNfnhsQ$dMctz433vaN^jKRBie$(N9gG|U?8U@;PQnbhirkAEApLW0)!D5(wa9j zVmPKo8}YSDZoc@P+rmla_<735@pfMi%Mq==4m&9tZK2n#C3aN@j8Kc3TS3j#Rjwt} z@yk1#L`H|QmUf)8g3@{PQL-`RdcnpS7d@zI)x6!}@B0?-=Q#O4`h1_2px+4}gUE|u zC%RNL))SmCBr>x@l?xBsJF5SWh2ov8p4`vwniJWvIe4UaoX4Lo21t;5RGfSEeI<%C zL{k+5ejlk+E%(LbyFvQ527JYMxHmkO{$n6$%?~7y_-LE-~SacKIBb^Er@4Ec1uxbDJHqI z$BPn!ynF;S6F!d@*^-uID{`O5pEbp0Jl}n)8DRS-Co9U28@giA?^TTIjA*UZJ*03tK8IIzzAC>=94H^h zqB-rv@$+jk(ycfcIibH?2gSlgkg0`DR#Oi+Bd6*MN+Az_wng%KhgBD%6{(oH=V;AD z1~Kn+_EATGO|yrj@Vmv!_Z^fc*=1`e?wTuhtPRdcnd#Aq9|h~0`Bov2l1I(l0E`CO z2mE5|+N2U95Oc07QLUFy`dnOCT8$oqjynQw@Il(sEy+um4JQ;uwT=5NhSaYa4Hb70 zDe_zl{O0`LHUg{;4%U-GHI5bI%Z60|;_4dG`No~9s>l0>+tVcBQel=%Ak|Eue$3h8 z03=eiC2Wg(Q?1PnnU#g)tyTB>ay$4YX5+<6tl|_@{r8iMm_F;H>WC8LK$F_Mv8}IH z^xt3i#E#2EA}?w*V8pd;B*$O6`{i4X*FH*?5=~1ef>H^_G?m)n-9#+OB=pJO|Ec?j zan}s%FH}^jnuh2d>jdNhY*RoFn6*6WTT#rt{EBQA{NR3Jl8mg}HW|eF>wCoj&^LQz z*Z~%!-xuM;ebRBZPpuPAugC2+iCZ%6#rIiTC~;_b>AIQ*1`um2Z(9$pTIwaPg_qYg zwg#I5h#lvlru>RQdNNw~r**$^KSzYHZ|wG7v5fx1`M9D1?+^pVuW`=2lnK|qJSxmr z$NZ~ayo45Vz1;mUbNpD&m+U>XfJ#S>2jPSW`jA*8c?$a?ik7g= z%3nkY&Io4U`B+}VD_@7kgg^$1L}@%e}os=e1qdxcNE zP`4Tw=a=|NR&Sq{Qrd4k6*o7gwor+ZVn`TFpesvlkpP2EXQ(q&$RA&Xc#~e(?X^rT zMtvkV!bgQgTexIqQgZLB%V97ARn0=oHrjX&ov&ce=mldhtqijmxRod-m}kJcVCp+3 zeza7<)SY*!9(}^++)*JOe2rxDKW1M*{8B^ISp81$SnfSJwnZ@zGj>wVM1_i10b7kd zq-sr7j&GhP>RX0U0fv$vJ*Y~tJt|l%P4ymJNYey}F>&aMo^v7>7zw(g_x64o_V)<~ z6R7$`PmIvm7~XV@S*&{aMx#zlzi%RJ!(^h5tNhzbB);0SlOwaa`9z2W^MEDFpWs?Z zw)H4fh;|v)LS_)F`$r#%+_M26EBz})(*|=GQY9vWS-p^wg*P;iu>S9nH!$?Bk&vTV zF`~w60pR+Vp!)p`zsR;OP`iM!?2*&Kq1u1ok@Zt&Ev;8elF5*7jPCZepRdfS^l!h? zZx3vIZa&2<((zqRYE>pzkGzubanWBWRN=(5EBkk&ysa2Rb?A)BDvuPrZQB3GUjLuj zE|Tc3N;6w}H&uT$FC?Zz`WGd2G&LKv0i)&pw?uPv`EIA5Jh;NyVFcA(;8(qU7QP-e zJR5QURYPMPn9dj&SoW)xf&2vgO*xwmf9^< z_y#2nYh`F*F-&eE#!GBgujqnWw(Nthp0lvMNru&aw;j1H@2MH^hn(r18bB}dj@oS& zmWTz?1J2RbX0{?RB|iv7fOQxhEP8RBNEYm&VIEo89$_E(EH$*(fnS);euieaIECr_ z|L^C2K1v2TE%~3njR_@--;~OrX|#SBviPn|Sw%)8w&vnn-&dS(U_U;gBt1doz_Pq3 z1E9UImp67}pWQFB6~1a|OYCQA$7M0pC)G1WLe?*|)jmEoow_UcQ8B(TSS}iie=v8^ zrt@}}){yxz_%VC}ce)E~+;eE% zQoIqMejTOsoD7WSyPlDq`~=44$yzz-f@}Bj`-zY_E(nREjIgmDsbfup@2Se96lN=6PW(n4#|fl zUolPH3Lt0FY0AzK*O(r5s1M%{v?&bbUXy2-A%QWDwT+=o1)_4X_=J}^5PasG>@C0W zv{YeEMP?wn&lltR@B$+ddA9xjM6oLgbeBD zpEr%MWcw?c5wFaGt_CB>)1iWUrjh9-bN+H&e*1pQ?)oCvN1lU^JUbKkp)77ra;bw~ zhUikkxzigd&8yVQ8w>aN6BLy(dhbFKK5nawKXWtl{J-($|9vl!vR0hFqxw^_)Shhm z-KzCP*l6x`$mF&Sz}v^?Cm#={vEMWZAQ6c{P6;uq!KhghaiL$%X%kH8nKrHDqH;0d zq#KFP>qtXDLt#L*9zrij0P-2BBaG;-23ew0LRjw#L=9T)KVTqKj#jsCCD_@|xcDxk zMw-C&&3AiGbs;Kse}`*LZ+DqUH+v>n206a%bcp^gt{V=W-7GjMp3xIUfm?%Y-RlQ( zK3cVYCFvN^g^yZ(+#+)6FTxBLSu}N=*y6Yg`Tyktq)=;>7(wlH%SNbm+?Yr-HJ<)5 zPcAj^7!w9{sE;V|<>Wpv`X68D7~(cL{Pk^ZzM_Acy%fwJ@{@XA z!saXEf3zm8yM<<_*mn_hJei{6Rh( z5KS?hb7rXj1@3O&ocO!CtUX(d?zmkDH289XLkn;PD(No!IXu+#i3~nK!r2*JhzwDd zeJJ|%uc4`}YEZqUnOls+K!FJ{44oJ~Cd@}Nd9)Bp^$H(J872<`!&i*MF3Ln=&0!FY zO?&*sp}r7ymoR3o*m;}0zVGPB!r zdmCJ?=WORPvlUxz%8@G{u*M4x(;xYa^}sm#-VplYL(B=90ARn6N{JWEZhwG{Q%i`I z$fe9c4$ef<*AEl4k~#+XuB#|P8*2JwVjVb;J(c7jSb3HAcQR*+1^WK(? zZ--l%0%avuNC_xH5Z)&p|1kV@G9=fSFF!Y-?I;_vSfRAEHp_d{!-5eq5k-{TS( zyJ5$-3`P9V?7d%|W4~r?sCgU*O{phw*vnJ;d+#LT`?{?obmP4?9Mmp8+t%ncNAZ4T zY3{Ky|L{@pY_>WTAIRqGCEw1gm+~h5L$xE;qrr_{2S=JoL7NA-I=rFU+l#+x5y@&) ztI^KikDQlJeV=aW;#XLIj@gf-MgP9XIN~QB4rP_ip4MKqY(IUuCjv*8jBht_ z$cdMc+inWUcJ;__$~BLtK0SixeRza4c;JjoMVP*b8eBaD>fc=bUa8EpQ^I~ed<#L|(d_R5r zOqPYNy>WsYA-k(BB7q#He1X9u*t+vd9i@v1q>*^zfef76hE;yC>jD0Y^4@832dSgg z)-&uDL0@F(G%Z0KQE*$l9=8x<@E^no=|vlZxU0~ZHZGU|&)KNeZC8C9Dq<#iCY|fGR`pdxC~w<%lny`FjYXKb zKFbK1Zr=ARI%yNM2`U3cFW9oSJa!l1cnBeB>1r0!kQ7s%Rq;>qZAVXf18k$n)r(=$ z@Krh9SIEQ1yl(8cL5H(0g%*`c+Ihv$0`5BgarBCkgX+IrpK7FINk)J0%s*DPjf6gE z&~@1olJ1JfenpUqkJV1bjQ0+4Yn=Np`eObv_K=a}M0kvK$sQ z4PU!Z9BZK=9ZQEANKvA1e#~X}M{I0M`42r!dGg-@#P(;^H`j&XEy(IW5%Hxuc15|k zwVUI*q=AeD&*>7;5`a21iKVOmxUU-+mG@y+zf;E?z1 zX1J-0^INV6NNS&>u6}y9KI1&<4!5_+k`Cn zxSu!0YkERE6`5}%-%M$gV()%&>Onb82SOJBqRpoLxv9^T9Kn;yMK?aTRklEx)q=N6 zvG(fN4QiY=>i5ZcX%3LJ!#@$0CgJX26mI$L?e7ALZAXZX4Ib%c!>>R_=_kW}hddF- zl+eR>9WMy)K40~l2k6|gdmKDd;r&o+Iaz@u8n2}KISmgRmQTtjYWr6lrc^iQ`qqy@ z#MvlS2GL117ICDA^q=s{R|4q;V-6q7Luc-C_3BOksdYk_ShAUJv{6Ez%Dc zSOa}Fn&N+`p&w(rB8O<^tRBk5$yS$x-&4%Gc-cGbEfrm_FdkcCHWW6<_!Vma&4l7sMB;&UUBil`7jFPgs&WU zRHfhYkTtZfTGqqtnRH(}v;oMX5zz;eto_{@(SPk^~Nfg`-fBbvw97 z5Ql?ub)(wAUXTP2E5{o$&;1wQ@57I-OQ}0*ga#3yoh)MY{39)R&5-T|`wzeMN-SsU#m6;QY^{v02?w)zp2{f9j?c*iks;Y#IZw{t|ApHUq_V9Gf&5R%6d$HIk zWaxU7o!}3;uo|7YXv$%M;eVByRt?Cuu;0dCywlkP#`PghVj4&W2%sj!-GJh+i1CE( zr2#00A4mvsLiMx2VrWLb_(8|T-)}p}7s*DhePh;_j)2E5685_;tIbbS4aDTw{^8=# zJ?yYpuX2FfkVc4eC%hiqsP6;9*P)LAYQyL%8WbrUJ;K#4G*zADTeJUMgd{^<3>?N9 zLqX=MZ(zsD!P!fIVF~4L_TDbk9*xhKE513w9l$ zDP&(2DYj?6qUK^~pd^j%Lsu6CnQH@G2#4j}1SZ;GZ@WU?S1r85<%DIsql4^ zZ{;dxzDi1pMCXJZ4#@nJz#+d+FM1pfb`eATj%;SM!AEA*6-cg!DJjYdrq-BPC-M}d zBxRRWwRtu`t8OM(cT#byJ_2C1$mMkzJJOEpL)D`}u6}Lsl!IiBdRa?F9KgEBnV=pg zKhj3Kp6yfKA7wtqhe{$IWw|doDZtrPK|hgBja3hS)B(dtj2o%@m&+{vRYxxjE#HZ> zD2-P24=1e3w$N}wz>v&;$;fk&aWDH&Ju72Yn87^3x*q0tSW&2^bv(?t>58IG{XTNmkd)!YCovZvGL`Ime3#!YC~D|V&706K&< zPY13=k^i|EC+)-rE2r{KT9D%B<~PX&8Pv6xD%((o%~LLxO82{$4BqSVIU!e@!8P({ zzC3{*LIpU`PdCKxYw<#2IvX_8>)GWN|Nd`6Uum;kHDNUEJssZDUdUifXC^9f56_dFEw~|DsaJa!~6jXc^|i?pdjGGtS-{ z80@N~I4H;hPn#9OH0672%ZAERCclK`(?&FX*_pHj&3tt%nfcmjSiR7eH}kpk{)Ipb z7Dk2PYDTqCi@TWJv>uCD4>(G=``cjxc*ZfmEG+FKqglmRQaMxO{BWV}b4qs@Iww+c z^PHcd-Ta6k5@*C7>)U?j>Z8OtSlwsp?0P2J`-vCk6N4*OIR4)=qpK@N*>M2#^q_Sz zqQ#&!0@yOhPZ0-Lcr;Xy5c2hP44(v}WraM`#-~%XKTp5;MsF!4D!9A7U;?};WmCwCOgCF^YdP=!y~RDp`kIciyjxic>VlPYf7hIu+jM<5EFTk^I4+tm8b z+2LBuSEKo=miC$74aJ|6E?Z(UiI8LK;h}}I?}LT|zc9oLEOy1L5s_!RKx?zg%q^fL z&tSrb`%A)l7bF_;B{)ku4qo_tlaZABi<4td@dq8X7p-|Ub--r>5}OQYn%DJ(;49sc zEs2=O_cw0agp?!2t^`d;KgTWgG2>;wM;2rfjm1#`o>m+eEij$ojtRD)0sGu||nd;5-;L)?c4-gT!~ zR|;dM{RK%p!J>jA%rgqV26Bf=To#J08>+&fzlg%*^zb|yk&|-cO+gv8YQx}>-{zQ| zMrkbZ$$5;ahR0l)koN&tBuAW2<8XOvb?YpfS+Qrl)uWexG6`Rd&OTjLnDDyKs=hS1 zY`cUfC`%$g&pzI}GxoGrm0-sFZrWb#-}~pJ*K}8BVraBPRd~e~Zl?^P=3~K0BU!Iw zkPjX#XnwUa_uQy-s;G$cMNW=is76sB2{)kp((fxIeAP;fok?k832if|9W z9@R{DpEl{;sKC5*IKM!NFwRD3eRJJ}-p8zkdJLtsNAexsj!XX^ykW&L2DT`e!SvQU z!$8x=1iL)@;{QKPePvjj>&|s)DTM-s!QEYpySwY)Qrva$;?Cgi?(S~IWsu@tio3hN zoa_6}-sjiz|IU+SWhE=Y2KA!T;T9z@|4d>bH*p_w^w!BJE0n5%or{%52jUloR*>h} z#17Fo9(Cw9z?L5hPka)1J*PGNJ}lmJ=?3?fe(fh!m!1~Ty^eP#0&Mm^wehsz)zYwG zD4B#TxID{=SX^)W9ZQdXD{}IX*KrMnY3jqhUE!#34GZ_~d*F0rKb=~e46KKzyZ&7n zGl%`>Zokb8y*uD)?|Kh&aSr|9hIa6XW4nV`1N$+LQ*T9*3%kJco+YFR2$C<9^VfK& zH*SU&wLC1-j{NfBnTlBp{M%9)ddY;^r&Sl>uY~kcU2Vcg&7@BW>&tFs$44vfEc)?Q zHzMuL-TnIkA&R%{Nnv9ff=FXlHvf-9{|`K2%)rgF%>0scIEMqJ7$oOv))29wqie@R z9hsZCX{#$Af0`zfz5JR`jkB$I%P0ZCt6ne}4MErWJcWXvlLTP$e%j)I{S@y{q&%-( zri`vGq+71y{1x5JM?TeupS7Fp?(oU1f*_HY5VUUaj9gd~SuBOoQy>zMLlJl^`DcqE z^o#7z-iK=JUYrFskv5V@?cffRRsDK!Z@q)e{?7t|zG>{m&(qam7YLi+SI-~;9y6aN z!)JH7u4n9W#H!ibey5=CNjhp7bOS=^<+u&QRVt`e8cyX}E{bh6+Aj!bcIDvlk0*X8 zNhjfi0Um7Q_O*R~dC1{9OvvZNM9RhF%U9i&^GVhD13BFnV1L}PRsa0U&R=kK1G;j! z_42^njv2agLQ?t%qnPu$RdK^rVw+(}1ZUhIj87IiB&_IU30yRlcr2%oc;Ca3K>O`~ zDL!n7ke`CKlmJ$5R4yQ+4;l=KQ9d88fIcRhWK)q?+I&>m`rKGlZu(8G8CM@C8bz&} zz1esRl%GOn`nxsX&`C+ADinL<2M-o;m4?2j!e4BQD=-8fVJqqC2ST4h#S{9AWr!25 zb-U0b%jP3?KLHYc-M5N`^*V2d;Fsr&lcR;>KRR))cCZnm*^XKn$E7-xTI`XIzP=hj z=9Awz`^Z>|+sa0k!fYeOI}TLiRd|^qB?HICDgwzWX(_RV6;_Uv;AEjEudDLzqSZh8 zXpU3>0Q8U|rffq{+P{@ebsY8AA2dB?n*L`KF{so$3oD2W!pwq+L-OvFq$(py=>5eo z${WEY9;5Wzb@t`TGccmx@qj(k!B?P-0dC~DL}!SwK}y+=VoOnMYKITJ)DAbvn_6Bq zHIG%jkYut&-d)R~5Usrs2H@*&2%|t8;idEB+VRaTk{5W(;5e~*C0RQw&%#r>tsc+RTfgJ+0oci43SRXoE4q;_5g_UCrs{8e*U@-q@K`w zduc9e<3>T}<>AhHh<4gVf#41r;&kZ55Q5 z?DDz! ze_d1|RRyF4AO`;>X$eR{J5dUJ`JTsgei-dT(Yiq#Cn3@eo)V7W}UGYxM5+AHXl!ulVq>_7@qi z&s?G*yuIAhZ?|8%o;I`>Z5KPd$8RR9r52Lk4+sQ9F_~5V;3qK_Bv$MzhfLZoP70@{ z#s&j`u*AQsxu?BFQ=paGxrn&k7^+pse3O106LAy9>xi^EKad5|-E?~Ow``trG`;a} zZW%3HsNQQ-@98c)#q7!Hw=`G?FG-=Zc}+v^8*uu69)Fqu@{@!*-r4m>A- zvexoB?7IPg8d1Qk)fLT`sSpcVJ+Y-cfNEbV+8XIr1zMn=z85HXnE+iRz>qq5Orx5< zUd+Lr`*gNCF=T9nFtheiO(f%Idci8_axH%9QI&I!YM(gzMY-h$OR_3!ynn?aQwyXl zolm8XeDJR9@cqlTi;q$TXD~@|(mML-=w(UnhVNC@-EUJ<8G>si6w^O=082f5Wo4TXB%wNeo- zQye6hUE%Y%5Kb!|d-dz~U{vksA1c}XlQ;A~4K0VwQONfoMF(-yI-`ym@Eo@;+e&UC zP?IvnjRO#y?aZ@8<&H9Ur^GI%mxqK|$0*9%Bz6wGkzEthwPHRA8PM!HPiEZo>U+L@ zY=m+kwfteHhEbtCxD{zLmKYWpJ=m@``-irot6Jrz3;#ijZLmFR|D4Rr<7Cbq|&XN_{}ba*HyPRBY8l2TixKw$X?^W;*KSHE#SCY}>veraIA%{{lm1 zYD^zP@&pBQv_J176@lqg4wQ=R(m>6wc6&Wa{{F3I{nripLiM`6^8<@TGrfA8eT{4r zew;G(6VmSxSSpKEmMGFA@6W@}%SF3D@K`{FJaz?2xYb;_H^t8cG0l5sj=znIe|YW>Slgg->Qcn|4& zg9aht-)cETneasVtpaGkCCjU2`tPgw0|l0Am(4xD7X&jhN+-{SH%}j)n@n#ofJCS% z18{p(0GfrABVZu}c)mauL(bweJ^Lh==j-Y>+3c!^D)la(*1XBoi$}IPH9egUhAfghqBxSx8raHzKAP@6&}uR_ZVFg7Ksy2%^OkO#3TKQ#Z-kU4$vw6baa} zpNBN)!)_?gDfVQcppX?zS=z*=@k5OK+Nz97S(UcXi@&|2O^!2iQSP_DXC=97PrThb zcWp@eCyB8N!$u%IB=~VN`Il#`)-I_{dzrz1VDFSUuO`?ip_SK%xy+a)&V)T3F_=Y* z;u_ybJ~VhmY;K@I3iE2koreTkkYY;M*j7Ah4VE!ps8e*c^#vvOx2x`n`0c8N7a8YL2I_$Lgt`ap_k(yc zNul|Tr9kWm>G=}CFmSS*{6=|NMxuNn;ZZQuN_+)$k*)rGkp0T@b}8^0X2yM)?d{f6 z?c*%8h`XZhv%PuDg>x6kU`SJ-gw1X@oM-H}x9%v6JU4590s6F2hgeGV&azjLuJfW8)v{gr ziPRVG$s5~nDSC){&n5Ao?TGFbd1h0tGLBX`5&TdY9$d{(R#F72sLZE|<(98Rg@Gkk zeXf%Z>m*ot@=da#AD2=Bo^_)0Sey;2EIchwr!NRjG;H$zTBOBza5Uow{Ef%gA2#nS zU`ahe5vHKSs{|G8^Ex6D3ES^mqa*}I)I$Z=gXZ6M?A%^2wO{WQ-hL6j9thmu>N7rs zW3Hc{ToH81IO$Scv(b`MF+o3K*#o8ty`!y4a;X6DwcAByo6rT_L{4VIOC0tWv=elo zUHK6qK+Q6pmB8N>#D#?g>#C}y(<*FNo=bb(D=o_~LFckEsn)VxqAUQd{2FshfQKB1 zv!HZU(bajlrekx}-Tae_zH7&zg)Ic5iym|{Ti0AKJMmd(O3YgHUqt9>6DoNyL&7Wp z)xt$hUR7PabauCWTtc(ONm4ejie{LqF5rYKAy>ZJnju};Rf#bNZWmFM1yhf%#o$zM zv$Ycp#$xX6>F{dj*HK57lx`3Q{$N&aOuZ}K(2X=k!cY?chhCzyR<)hAJWmf4 z|J3i687EGKi8}C$>!jHnC=CND%~`Pul4~plCzklujejWHt}#4I1$J*f=w|}vF*_cI zd^T>nU;Iu8Z#&!?bKja}vIO9HeO@!duRs%Oe7Xw&9{QE2+yYSr_P3lC8kApsU;|0x zR&n5g>VDfdL=djv?>fee%9wBvgZI53{GB8DD9d6Mr?QIwi{SE^R9}>Xz+VfplP|;K z@}H>9cz5F3wMakr(rtds!u)tWweIGHy#vYhMAbY|Hs^pjG?93a^3B9cAj#znDbLa7 z@O-XXf5{R6Q*%Be6TQ~#5O~0Ihz&Qh$U?RtD_cX!blE;`f2jRDMpru{+vgExt>;#v z8k@ke|Ad1JV2%o5*eLU)D%H2Ci29{7$t3Lf-0~;`EI2c(%b4H4*HTp0QVhV8SH&Vv zB_tkSb75Olu79y+R$NJ67=A#_&M3Y5xWhzYz((AcWY-mb4d4d$OXKAvG3)$r?8X7% z=V7JY)XYRGjOs=nP!iBp{6U}f@HlEt&i9tCy&&%0D~(%0YK)Fn>QJz`(!JZtoz(7{ z4`HWif4H}Bc&-`l>j#yRpR2GCmgfUUbmm$QR61FK^K|h<@FhQPq^Avjp>rQdwL|GV zybi5jtkvsZOkQ+f4XwXrRgf~87e)_f>Riy9+c+$_B=-qF zXwm^Hm2uhOSX-$Oi6%td()L!4(5d)gRbucnKXwa7HEu8tMhO@1H!@qro zas!tlHP;eR@;%WA{N0JNvqjrxG7e$Phl4p+vPrT|oxjOAk<^k3js zT4^d4J|$_%Tx8h53OC;h>`#W7sN!dqWWMhsUMfG=2_PY*{o=3^(lq{lqZ+j?xx|v_+#-5u0=u0@iEON?~l4) zx-~kVg9V;v)-NoZ_teeyj6q`wSGEH;>GXDbFR7U8ynDs!Z$c5h?t~gQe!%LApM^)H zC?6%og#mqJzG1nCV#mtFkvuWJR)VlZwJrSQf7yl_&F!FoVr(Qg^I~DOt6*_5m{7ic zSltjE*mcjRlT9p5hu)~texz;a6*=tLAwLH!$tV0i@5%27+ZkBw$tje)#h2vD_4)(E zq4l_f4-mT9*U;~Yy2ky`7c?|=Sl1LiJaTzQ8)~WjSH6EkznZd%xVA~FBMuYqZ!nXw zo#m8;oyx;Pp$<`AICGn=j=G~kSIe6rlstiPNeb(?F4K)4d8wd^x33ef%ts#^%Wf>G zPhvZevt&1_!X5QCKZXS@h)3A)O=*{pVNR2uk}`vWr8cL{Gm9YdZ0FGPi;s?tjbX# ztRv(KGud6dY<1xKZD-6%){iR!X6r*=RKp7MF*`zEREA57$>2Edx$J1F4UW|Nxeu~b z0BARem$YEhcfgY&7nZG;SlU96Vh)OCcX4~)nK7^aff&@_;*4-JK4w96R;xXdM4t>W zlX(74;YoZ;;0^Xoo7s@gew><<1p8)cvL@CIc&E)cm-lrsOjP4Y`~5UTQA0YaJX7JL zE#8r<;IC$7X|I(>yAm0Z%!+9B0D0N9A6<3WRAY)Gc5`s%{>uPoktkjNs4Gp38;Q*J zek@fp^_WZDj)Lin=b~6`x%-|?7hJvdwAYQ_+hDyW&!kCB9XW?bj(nIggSt8BLGJlh zo(zo*2GH1xP%(TX<-f_vY}L;qz?whLr4ckHqTaqg<*#dOlj%m5S0ZYOFiLRpuiNeE>17L&y<=Ig$svD9{*mW%XkXZtehbeeSh;~Cwp!1I=kU1P}{w59}Baz$w%4|9OK^$R7PPVG^eeznD zW9Vz>&N~Wo#WT|gZQGHNmKlaII08M{tZkWryT>Np=DVVZ{a8}$d8VFkN6EYbXXj3GgrBzYXTftQ z#OhCDsv+ZbPOmDH7yKb94~6h0%@%DF<3RgrkF%l???+;aKo;9Q3O9Y0kXaiywu;rHpDt=alQW9b# zq9}n=4D8X70AZ542xlXE zkk}WrWT;5cN#0@Od#S=Z{u6JDp~&st~$h0P>-gIvAN&{^s{iwpVxWEOpF(zUX14`6zps!HfHk_Z^dj6YigM0R*T<0%UI!Sy&#R4!-;&q|&!q`;dJniV z>RqmMKUi6xbiBU2k=flr16?e(Q^jYARd6var~+C|5c2hdaG@Y3D?9v%vvi5yCI_5T zkA7ekB!qTLsfXSxVe{nphtAwU!HwlvMeKmp9{|DSh&UZ>S`bHN$Rw%wA8SE`WM3HY z3J_Y=J^>#fEJ{uyq=aa`|GP!ph|KATq++lOT&@eyAWsN3z>*X+#FiedEy*kUw72e? zJgB*+Vqdnhp_YkKlV*kglg8hYrupGAj`dWkFZjhpd-Ln9cCdkO!o^ysTNW-Kx@K)Z z3a9vc5sy%LG=u@+Doc2cWy9$?{Ar#BP!Wd`Lh|=^MhU0I0Bi8*W@g~Z%w0wX{MMQf zuP%I@q2G-ca$i1*i{#e*yhBu%h9^z*?TzSrjpr8Oms9NOQbC2c__cqB6~0i2$itev zrmhZifxNuz2>>dJ%esSaZ?^`V50r$RCqBuVpXB zT9)jKChWXlP%gijkV#5pHNXRvnPW6?@Zj-;k*v_Nte7;tNNg^s6aM;8dny~;>`FcE zbO_COXC4a9-?wx$XRhrGrZ#jmk$u}cVhLugTRT+*8m-kblr9KAB00uSOqlFl z=N?PVpVd+133HZWfFlHQ)I5}Y6o2GA`}w<24|KcEV7ugX zxriJQfF?N+TR9AzMkq2jOhLlw5J4n9v5WaaGQtA#lr7>iFr<8<+18&priVO<5t5rbXX8^Lm%!e@3>FH}%oZ--ouM_e5x} z6e`{4RJK}JAMed=o3+)-m2CwO)r7-fv6N;}kM<@Pi~MZZz3&yew{{*rSHHdzJ{+vS z;?HS4W)p|znwr1&9d;gdozvwDVe=YiI-v#6nGDR)k1^s>{jCltsF)E`pi+-tKZXMG zXIHWMfUs;bYGWgu?c-#<{(Er`)SJ*Fp=cLM=!VFKs)m@MN(Zb7Imdsdu)+Xj2@8fA z0NR0l|4rtY5PB)1T()(#zqulhAl_?pOt@MJLnJL`oq&Y<5Ajvo6Ufpk4255-*&K7e zmR~VNM75CWqO%pULdDZCBr(?Zv*he95{Z3?m8>zonN3 zu#a2blQb@D(?7`iv#jBX=gQqJ*k{njb1rrqs%suolrL~~r>~tbkI0*Kq3&m8@fZ1n zhutkRIihC1Pz}7H$*=6N??yQj+IOA_Q%Ca~7s{d}+#7W2M!X9(sS)$(FrmugVKY`%xcm`ht9XWr#l0MtfR%LrZ2wyh{@6kuEm_QVROPZqnOHZLrU|eWSVK%FzO#8q< zcM8d0bGyuMt=2lyOM;w9)3zN!S5&$>IW#5kOEPfoE|e~yk5rqrRix?*d4AZZsXYb) zoLvegOKC_rmSL@Bc}n|FSuIihRiyp0I$}Bq=n}#JUoq%G=830UHWI%GLt+wLiQ|cw zSA;gU{%>=kmLXCF;rI+tnDl;|(+1G1c-2+FyMy|Y{+yZ5?E$Eo-_G8MjSAUk)A|=^ zP-I>{rim`$_^bG^xxHFh0{8);w&d?RHaGtSh|NR{jJ0e5Zw!c{AVODn)8fbK+0qI7 zF}wEdiq*93uPcoSc$VSPggu44VmNt*j~#m`W{LwlT#RZN2C{`*z(^|lJ^P7J^yZ6A z|6V6{cjv)>N#j8k6YNy=(H+$CIj|Rw%&{KA^YvLZ7D%`~i%>*}QiQTI z6_9>nKB#?mZE6`wOiYPy-fk3R)oBtIn_gsg*pGEc5p;FM;?KFTA~T_O-rjwW?gyyl z+kNM|^|tmcNvlQ-f2K?AQsdka|^sm-8hA#$MI?*~|A^Lj@K}mF&(*0)0LJ0oc znmq%fzWngzPzA=l(g-&?kC9qm8H zT`hm^@zfUk^+BqZ>H8=Q5+FV_B(y)PMho=`w68ueSMD$UWsN06@lW_em@2juoZ|p6TzKT(#@A-xb_&YBQv$S$0JU zP>m`3H5kxRRCv1vlypRm2KbV}F$dCzv!U>`kxl<#EAcH_150UolI`VZxB7Jq!0sqr2j=W~AtRv(^_ zzp+_0UYJ-!60&{$Yuo6ioGh?Qz}m&0q;8uaa(A`V$N_JIzPEpNsclbLp3C&TC@=-N zP()U;NMm2K`#FpMIwM>E{P69C=k;ce@ZrXNQZwS1ohK`^a`*It)9ph{oDq$3mC;&T_9-F5=i}VLlsKjP&P5=ceqhrD3_Y0jKUSKc^;deNYyVBw5>3zxKU$O{3xI$5c5}LrV`eZ(o3}h0NPk8{PzI?w3=(Az> zp_XoAMzDFo5%=TG*MkYBPVwHaC*X4QM3IrcgeNeOUYhCBb&~Xhd{~n`&Eybf&9az7 z*{9Sk3=H#>>}}=lXG<2^3ggvfG!`QN{W`k*j_53L(I<<1=bwfBgdD?c6kXQi(JjGcq{Z)XGrx8e1U8buDlT~M18{1|sLgG*)wu`KX!NH>U*IZb3;wBa zJo#i{i0E>`DbMBt06r&w!rBDrFsA7AT zBCsY=m9u*Ih01DTaCs4ZFtzmSdZKz+QU^?%Dhm47iDAN^l!C18~yP@@#U#!yqXfJVJ(nzcVx&kZt-w=#$Y7>al4 zn1w|#whc`}WwtX?L>X-}R#KV{&i+47RNXYjx3#XdPODTNJke7IWFAYUm!eBxrDm=nb@nmSHGZHBiA;_L298*vr)iZQmmK z0>25e za%C&~v;H+ADTb0E=O?n`7&vGn#0tTGddX@aTtwnoR=4|y=)X@(fu3-{a&To}tX?Vx zEC>#kOFn!kOTW>GxI$%Epay>!#hdC!X6%%(ue=B}nOL+qa0a{+H+4(LF%EtDFT1Y& zHIxylBj-l(rVbr_`k}NpG7;z+m#yiOjLlC%L36mmyPbKvL#TY|Igd^?`OVUH53(7f zSntAAEuOcf@x4(p(Rn28P8`-79re370q&wr3Lt4bGNLH>{D8e~5*x1Oas1BniSB$x z0Os|Y@J)Uhd;MlF!aXEBaZn95Mk%v@eo0*WQlZmYU)3^hmza2VkJ*I}0r|#xwIfb# zfi_BJgq(h;2H`ry==(>G{L1il7p?K!_zokEu?!cIW-?eY&PWJe{4oC)I$$%c{B0~5 z+#Ehi0&>D{F(=*63&@Jj!m!&hl1b+;=u)4c2SmtRXnQRYy^wMlh09$^U_`l93piy9 zIgJsAo~evX+ECmT25aNXe!AYGuz1m1I%5!K?XhX)F&xF{lqpuR9SR9C?*@nF(qgGHweP~9yI{12OVE4*;bs#;4j!nlR}e52gmp6FgMs1f{h;j2EV+VbssbK z{?iC zzdXO0osFk$OU7A^E6lC(kudvd{WPdAUu-TP>FVepNk(hEVtsqF$=WqBHVsTj-Ow7Z zqWRD&7TBJC$eWTHB4ND!kqC8IbZNnVB4T_&@~+NEB6|0Q*3zO&kTzb0-K4_boT%-1 ze7=>;^`r{i#VSujei@YxSkt7JFP0Bg@%$hq*UhTGhXkd57v0~d@Abl^ z-*J5YimpsU2YNa&tZ}q1>q@}mX|{`hJogMWRXpn(`qT7q;eNggY!4DxLsfimG6(;( zN4a$6ngnqi=dPZ{nfhr-nLM(O%W@e-Jn+@D9&iwNf=?gJ5;ykrBT#7wvE=tsBl~fPMj+tjxjc6RlzX=YWukJdQRPqPIU4X_oUcmel4%(Xg>Vv9!HEAUwn zS@AKF`hTb-4{uU9FVJ0%3VjPN5;uJC8p`;c2D$l6Zq9Or&hm0fP+wxlMMLaf>?*&0 z{mS6<6Yw!BvoWi?L~eyFRuzv{9!N5gV#?qpNLCQ6|A)ko72^tX?VMBA-xZAUA&ko~ z=b-xRz3lm~>3CIi0=?VCMBTi+#hqk=acHBao{kiUnAIRD%BDtxop*Z?3v0+q6eal|(@$KE>5ETHL4Uuv zR-C$QSK-r`v?Dd29;&^#GYPC5@({DNvRn=P{z2S=YO$P-P!nd~M?}lnw(vg2mGtHmn8|TqPnJEC` ztsmV+{j~HI!#F3?oet2(;Ie71hd~CwX(DH2K|8RX9W}zss-dmaz>i@7#=_$l;^NtC zL>(LAwlFU9M0tI>bk1kOcV4$iDllZmBrc8*b-BDNT6WupiDujN$v(Gg;!x(F?nlOPaU*imF70@wA< zK#@f0MQrHLuzAo9{$zb|yMV@@W#8n)i=LxnJPQAgAneEsTsu+1E1E3c(uqtqcfWka z)&qI8<*XyP53mEdigxw_xdm3kMl2zXregx2+q@3~%x8=hqbHPiyP2{9uOdT>jd$xR z_WVs*E8M|e2n1HzwkkV>+?V&ccN01ZgR=*M2dEcXEOWg0|i69Cy;GI2X z)$GTtDwRRaUXiozHEXHeK@VKHoJNJqlOG}5U+K7H;fT0XeXKZ%3OY7z5yps?*)?x< zNbqWG#hvk@P@mBnN)-}?sc|Xd|<_b+UiP9yA$4ecUSh1Vwzk-R0^kt z`m2YoHN^|X2A8!!TvHyJ&;bq32E))O%GO?#ppnDie;ku$Gq|LvXiARg8!3(7yM-sJ z=8+SqMrOAPYA$Z_Lnx1dTj#q|xV9mnk2K z=!Jk*_PwelF2d&0r28=`&-Zmhhs;?5-em6QJraKuq=r2$dD(LBY+5Fpd?LKsPvRV8 z6XcE=P(Y>Ui}QpGeSTC2;|!w^yVtl_GK{D_J5E9mm@`eb8q1Hm?Z!@Kc)@fv)Jkcp zO6vs^K`msR3WB_0PSXTZjA7wV#b7Ski_F z-^dN=#Qhd9(#i@%J3_`G({!DQFwa7!S}EOL4B!PFTE>6S|Hl()CKE>rNJ;~}v6K_m zkOVr#{ioAW*OWaouvZluIR-uxMEnj^eI-OjBbLM=-3-V5?<@d3ZTrQh^Ob(o0jgtw zk;p*kCS7vzhYAjL=;-Hh*Y3hO0>Y+-GWQOPgxIY=oNG5OO0#D!JKo2uQ`xj<^cDOj zx#!e&E5*IV-Vt^y0#Nf_+sWN8!HfzD50gHR-S-Cy>sOlQutK%o#vA_bj({c`5mabT z*Hakmh_i zZG32xHliDsU)=Tu!o`UFMHa>|_d>~r1eX@x!@e&+((Tzynj9F)l&km$c_iMM=s|HJ zd2LRDk2mOy0h^n21-UA)4Bv}*CzRrkl_49NBD_!r1^S;<_N^)*hEfvil2P2zIGk}73mW$&*W{}XE- z+!aNEq(kd)I=Z^Gdes(vG^w(eEhpZ@3hS*O-#j&M8grKGRO`pp%iVekX|&{&*fK9e0EF?+UfyItfh3EPma|xp$<~`{ko) z7~z@CToKPywE|&jaXJ5{L==?RzQ>5`h8+zk`Zw3-l!s$jJW{wa@E%o&lODu1r=QxG zqy8Q(J?2}?)`I{7F9*8_T0c|t!ISF$#D$bu<0UL3OSSD8*lqo0Cxpz%YAd$aiU!E>th~NU$^>Ttq zhat=&&TWyieoTK*(M>)4v;CYeN-tt&_PMs05!e}ZlAi6vUzv`hEZG~Yo z1hIPq+q(BI3B18qdp`qk(XBEVB-_r7Qa&-|1tx@OiL&CUi_nF6jijc$DHaa`xpr7M zblYSEcwD~Of-1Yl*Off%qNs)i*0%m^Ic_cc;C&E@T@_NYj}FD>{A&b;tHFy#mMla+ zKt!H3U>$3USRr_qXjL)nV?fZb?H$2Lh|_kpRY6T681TkZB;#L&8rK%3J|2!mRAzP?^+8WaKc8r&LAmrmTOccM7x>oE%2{lIQ#D9np{*LkDOv!>ffM3eTH9!*ez+>2GH3#zOpqQW-D=fY zNr_Yh#Je1N0tyV~=-sdSqQ7Tdo!Gs>M_!vV^}ET6r!+6#S&b+2=PW+jN7nGm?GEit z1S;8uYXzmw)M7s z_?+R;zH=qkS7!BH-1At8UcR3!P{`s|HLwB2oc@6%!%?WQMQud0V$m3}GYcUm|Fi8Q zYOK)?Y`xBGJ5G|&sGG9_c1_lmq**j5)OtDTS%Wt$vDG$!I>0&0NJ797T(`ZQ6ri zt_AjSzB7HUzioHTjb|O10$qH}Vy1{)yV%VK!CmR5Y+uM^zx|lZ>-gz->t7rkdq*Gi z@0%x5N{{f9(}>`;v~(DEF1_F3Bj>0Xz3?FUDUQDw8NFvpcH{16h7%3}^sumv$Kk0{ zmRfvI3$Zdf)Z2;5r}7j0^#mC7OQyXaP^Trc{Y84ZRaG6l>Qmyv86hxl=yCRv9m;;Y z>V|A^qk=M>g)%9``r4ZPg!N^4=d0@e6Jluo+Q*q-HY@L!^;cYhSAjRi_uarew(=2v zgP#%UDdm2RS=8lFWZ`GX+j=zcypaUE364aT_s2C)%eePC*xGcF4=wAhoz>6$1UoSn zqOHZtrx89K-$)so+<}r=RB#*;cXrLLD)NdDdwE;cWJrs>7k4!!%pKi348Hp_IldNy zmIuJ61MqF}D%)fvwL?wXgEivG08Ki$HI!u&uvrWSB9ytqRHxfT15B%n$j|id8Kc(z zr)hmL%71fMaYU%>magmGp`~0z>>qrKkNMgcq-*Wb z!yVZ3?@LO5o;FR&HeuIpduC?AQjP9jf`MDln-KEsO2JJ*d&)q;h)G(bMn@k4QH{coDI%oj96CMG`_ddG^}|&px-_+f(EOHgppIUa%!|V+ z!on=N-UsJmNl%Ml`o!?``#%+{vi`I@op;Y{-(22wr4enP#%gz6ey*J)(vcJm(d2qM zIvORtNKVWxnTG#nrDspvEp~iS#5l>4-VE{E7`I}_-22_oP)w`FC{WD9XQGqMgkV+i zp7O|-GfCD^I-szpillaM^ge!=zBY8~qeBq}vvRHur4yXtr?=i~X0$!Llp+3jc%+Co zw`o1@_WV<<;Y(($E&XaTnpE=dTboJ4`cWYp8RJR3UJVfvQ62uEDY3)>loq|>v}W0J zM66m6mNrX`iRWA|iN}$u)sGa%8kqO(y3DN zczx~m8M64&x04oMC1x!P45qOIYTP%Owm*qIbgn%jWw}@HbiOa>B3|eXlX9jQDT5tU_to;iSc=p>dV|>^ke2aCc-zbm&Jbzcw z56l0)oie;>fR8!qQ`zre7{{xkg7}@`4^maYhJ@AiUEhuu5>^4AYgk!`yo_^^^Lp}& ziQZX++v4>hI|XAgL_TG#+G75Ph^;W2_|RZh3;yD*_NGTTBSuBnD~>Lm;?a4F$)fFV z7b#A6p?cndM?Z0%JTixwPN7*PB}FmbQ_7LHttA5vX#ZNC%}L0t-Dp2ncu#FV(`9b^ z9o>=Fa#l6VF0Y{+b$*4OGvjr)`MF5*Jp1iB`uSm;OF!GGLTd=Y;}b4P6!J28}KW zMom`0rjVg6{GG%-sxp2`Z`%6$ODUTnN1I~+x zi__1KwAOnG)MLFLL5E;6YG!r$a{gM}T4Af>46=n=qejuf!O0MG3N_`TA*$}q_>x$< zk%)Ojx1{m(L4RW<`d~ZL>kS?FUsf`4RN~#uRTJy4Waf|9YDEWkE^fV2;PbhoKMzCS zLSFCqd4B3aTA0l$i^hPYCBNAaSIRk@3?R)u4^|kKl6ZjOmC1qSb}CvzOn+D+^Cg69c%e6h}F@yf8^#GEEML-rZ20 zWYLA})=WoNk0~pw*7G9nb|5^VksF~#qnA^-*>{%=t|E>E>YQm!RVBId8h=rSCuI$b za^+-v-RiD|GHe19D7r(vN6Eq1$5!dHxAs5T$!zkw=(26kz(DqQR|HBA0`eqN<$9=D zUL1L{xi6z*jbHf(K9s;pzb4lM!$lg6t1yHu9Ct`<%mEfEOcwUS_Gpy0)f!n?J~t=o z4RsXICO@6Sz%?3l{BG_B===hB0z5;9Dwu~^>5!{Z!pXaxDr{0lxggU?xONz6n}ymX zYb+b%xkgFF33hc>o4*S_FF)BKQ8(Fd{YT|&j7jvAHW1FJ;SYacR?(FDbnP8hohNG# zvluq76i=GDC{GtMi{Aw?4Sk+p?ZI-k@|(2X>xA8UMyej@eyC;GaP+{a96xiSrAnHlN$J)w z!tLCmm6mSj4-ZT(k)6BLRbtb79>&7|lvbs@@2j;4B^VeOe671u(`?Wd_Q#E~9~L!I z;0iR&=TfzuU+rF(GL3-99HP8zbC;6H#H_-2U(RFgx*x!d0#?|;0yBrd%wvlzl;ocB znsL<#W%VDB^A1HKtOU^CJ=b!_;6e3DHQM1MFE@@w-Vq~wukPx(=>vi~F2B!(zfJe< z=BEG5j{m?2oKg3H`F;3**i0Df@3=;(t6neR--|1rxH4m zzu2J8w7B6z{P%hA;{(Lbpu3lj#-i3d*{ABMq+C2dwiIgie(H4Dla|Y~8o@=cJ-|xY zKPHtjb^_@{uu8S^5adz20-ItfphZ7|nFfd58ck6pTH4+Zfds~52F^eoiEnb|7)3KE z#JGeZgALoX?HrOOn%0Zb8@490koot{?aVK66^16O@warpRh}5C{|^G)i!8g`I$E%9 z))vQQS`&lP+4_;eYK9`aRxdcJ#~8nWQkM@6D_`~+TLNTcg}Gfo=saAY z+~;Sfx7&YXWN|dRABUOQHNny{EKbqruN85gq$lkJQ()Lj?GdjX8`00|q)Ac>C*Yuc zWbmwUTab97_-6xSy#HhBE4boXmu(X)5Fl7^m*DPh!7aGEySoN=cW5BEyVFSUpp68l zaks`@9{1h5_c>#%AFxJ^`ex0tS@VDv=$_}t6r6yK!G^+{kND8rmNDpBjOj7`r*j42 zsu~AZ8}>#wQeU>$#z6YqK0u~h6%0E26Vna#zBCpzDan+3+q8Zusq|jG*FwA%+IyJodBa zErt>j;$%eN-UVNnr`!->N#ILJGC|eIDwNqOb=J^n;Ew*Bt*aW$4`|b>7&`$q;xy$6 z7T&R4^d>W~L7grGPB=&ZJ$cXD8IzW4B38feZ?X*r1!&$n!mY33j>JTwiaGH#@q=*P z5MCmkd%yEjx01!qh8-`a6kuDqk+xfvI_;-%Chnsh=eO+F2<3-nOBTg5#2b-c$U$Fz zAJAKICt?8?oo{D(S~w3d>tSipX3?T2aauECJ+r-+Jt#bieEgO9Z{6z= za=&BS2qWJ2gqIwwerV7O`Fv#R`8k0*08dpK;vSjN2-YP<*JQ-fT!-v`v-}*#OmMNP zI5wMR>2z9w%Fknn5`S#UoI5$(8|!?###^iPFN)-{?Wbdlalt94=I?Hv_}bP8vI!GL z(yp?(8%YsCcHL>b`1ABp;925PrfsEW(2wDiM<2!C9h#SVdFJ`)^JdrzVo81LYLrlODy8;yfAxnS$h zTPn0p65NmK6ul8wSgw>>+z>EWN7>G*mw%Da@*8uPMb#aG06GM*^ zbl=43{l`!|78Vu{T;O&E5AkRZ!YX0hiJpV&ASKQ^_ruc78pEP~Pw^^Cq zgo@a!X|dgBwQzY+!xK?Mi`nVr>c)`Mg}Nwn9S~{;EbrgD&q28MaaztCob0xR7&HZd zEpwP=-A9rTRgGL(tSDrc&&eY??Lg1;Qg=pmBZE#~*-yuO{2nK6JeRA_^#q-1m&(NI z{On6$&r&xX^jaO{!!W+M#lf(fgKIxiD;aLTOqf~AsV@g3h^is}2h)^>xuFW5QYjhU z7GM63#Z<_lIM_OK*j@8$k}?gMc`5TQj$T-RPwsH(LW+ir7kk+13Y#e2*pd z8Wu@kd)O90dUoruj5;z2sYCz7u!tYgoS{}**R6cbf2G=k z?tH=v%yBwRhc(Dfavv6K`frUhlrA+DX4`mvwI8V{&ZX3Ak4qHmU?zc!pSG2#7JNU4 zprU#_j&WEE^gQj^_;P>m`c8)d03L1 z*Y%_J96%hE3Qd7y9X`ejXa6g;-z*D%+IN=~pP8qco|d~@Y3{C`*?Ug3n|gvVKBE`U z1NX{69CCA~vV6kAb@@;IQWJJz3vJ$B* z&WS$zN1CjHg~l{Nr4ED1>73VS43*T#4dl*X>(tS_UK4*xI#(sySdsqHRsI8#}d0LX)i~#vDu%W{nOJqX0z?9`0@V ztaLG{6OGm197ECh}Fi^7e5l}C; z=Z)rmKW+s@PhhRvdS0lZv+o#~kkkEc~qx%aaM(;KP94;N-@rOz>q;07`qS~%w=>}Bh4+313XJ9R5B-)nxH z>~a1e>%$=zNtM879v(08)u5W`_$7if{Accm&~H?)kB8m1AFVJkgB4gjm_-Wqzi1`8 zUdqA|ka^iH12zduO9@It#x3!536nvNz`iDW8((jq(mouN6 zzKS_gHz`aUM3diy%>?jl5eVLTd;LgcfjqtNJ-=9<{7$?Z?Y)9p5UlinZe*qdqD1i_ ziBBnTkkZ_#r*Ox?*G+{@8$InIubigMo`&t#21M4vZUqVdvP<(+v~{G2LxnC08+-Kt zMVrhiyZ_+fy3$&-dNXeqGQKkL(Tn+ScngIasxL)kKxf!3x5kT)91keDXabg=sE$lq zi*vidld+S9peiciO=q4T!K9|lP%hP}W@$|nLW@}iv)V4u<8MZ%kB-f~D^r_dvfp(q z#%?-~9yi%Jut@-GDc>9LGE=3ra%)2>%jUb@u+>0~;UiEe3Ms0P1=^$FN;j3*C98opp$MzE2Xbf5Le41ZW*M2fBkxwu_v--YGjzhv|*?j70+Y$ zw1~CebU36dMw;K5HYi;fuY7;1m#}6BhB9Q7`L26 z-oDSP1o=PgeC)SI;48za?(4JWo>#fuk%%wb{6Ftog6zERw^m0!^P#cyDCtcdG%?as zOkGcUcAI;;Me5mFde@O|nGCE(;Dl{*pP@}R(R-}uEyAvvX|FS;tcc*P8V#Ihtj(6V zU$Pg#ppE;<0F9A)!Aw)&sy z5g(Ch-?kEDbTMS;7JNgPyV5P&XA&kCD6#kbXBHr93x+^9L>&fSvSojN;1u&iC6kb( z&?jwKUUz(9%*by6RG=b-_U4DDJ*$aXek=8j>Xe3}!=;f}piBK@cjbRDKsA??ktE-U z{d*8mtu8-p&16TksS>74VFfsYE4H3sN_RSAXr6ZDyr5`n`qxNh3ZQnVL}+`r@8KBY zALtyIWfsWUHA3N#ZX*-uQrQ(M1cd@F+$}K^z%{zTi6^b%ck8{aZ-wNizvO30ft$|m z^dKv~f*h8kn{#RYaKWK4yh^TothshL`UV^60<3s3H0iUBwzR=_?6YbmgCCf3HV3EZ z3l!qSGIoAwNMq>X6ykag=rUt3!*x(j(ekkJxkXa(^5!L(+&z88X4Z53qF4R2e_zM` zws;}?P{`$?Q~p-Jz8?NWKWxvrlQdDVaOpVeLKaj`LMinj^(X!Y8iX8s{S9C6+Bb}h ziGcSbo?@^>BDI$3`XE8do|=_-k(Ty)PAR(dhI1pGn}gSXIVBPL^XZL1&z!Sbg`mcU0VmNm8Hblyx=-tuT zhWgP{wJZ*~i1+d__TH;+go)cp^rPmnUwTX;9|OdLp6c+I zPd=cm7Xg_LWePugK?BLcMiYhR?HgX9q%NSWWd#dB35pUK$6i%^oT#ewu@{xP^fTv( z{YlqGhprqVODtKi&y6j-92U0a+N{gFsWm0f=K3&q5(k)AocNNw?|l7YqIGGs)fIPa zH_QfE;}A?CvAkkU3SQXjMY!5aRzO>v-JUkKW=|cv2g41_KG>-)>Q>|42R8Fj7545I zl~39uESK1)$F zN@RTJ4=gEtIetg|w1;c4uxY6U841kb+@l^o5&e{MLOFvOPp}x<>MeE?%vPQUW*?5e z%RQW_N$>8Pi^i~UY|tWSsamQsYh;miSaA-@e4yX}C8=)cJGOS&wUz4|S$`;Y@CaOH zXgxXay+Rq+YgDo7z6=BH#lxD18%6#6lV$PBn1N_+GAakFO~4PE?J%#Q`??gta>)wL zB$fK|YUNR5b_Z=y!5rEy+A{LFOs>W-{kWKMb_L=V@*ncI8>tLu%r)|vt4&>YqIBmX zsRI2vqD?zw?pae71#!tBHwv|g^fqxUn(g&|0>Qv<`e$t~nVrk%o^x!A{A-mt*n=xK zdnf_L*^u@}Bo$MY;LXg-s9WyV1Mf2t_^^nvy~1TW8f=>yF%`+ITeVqWakU3EFTlz@ zO@J>c@q@8{$4c(Y4>x%GaT9CD5lA z95zcAt9IJ}X=`eN+041#pmBZF)o(clNhCVmlE*ig#~REP&J_w8aX$)G6e{)_QpxH{ zq~}TbY?5(uWpo-c7~~!V!q*pU@OA#pO=&@~l&Au+-s`Dk1r;TGQw6KkRcY({@xipQ z@3S0^Uj8EmRuBCi2D9vb)?Wz;>`?dc!l)nPcd7yfHrrF4fjF!#BUnyu zxr5#ryF6yIJ9*|$lK0wiM-2Oa!3Yr7l(qPNezi7#{5)f*aYuQmW?^dyb1Ml9LmW6! zc-L6x=A}CS8}fWRWzKl+DUzflS3MXF&_o>pe~!Tfu0SqfWew{@cUrFbxH6RcicaX< zf09(+Y1BHLkK(}!YCb*$OdGOHsjU8JDLGc9OWYG1Fd^ORb=rVB++i#5mmN5o5!78RTLEKjZ|XITyoYuP*iNR2mE6C_ zJpLY?Z+5K*aW}oMBi*%E=XyNP#(uV3dz+6Av?l&#ZYMCU$!g6Q*QSqB| zA8JWKmuh^0pOgz0=UV_dtujW1abq=nJRGETB>JM=M)N>}>#6|n;9Q6EX`=|um_-~G z7TsCf6mz2nZl%HK{sex+G;mhMCxuDp`gMei4Lu7)ApVsayi8%FTxJNC< zKr{q?NvzO}lZqi%s5nkY#dg08YTNG@0*aTacpjqH`(zEhK1ZjK^r1?Qi%cYDWEpLu z4qha5Cqxx!-Nb*$GS}XJV{uw=YyX$ftLE}zh116cX^DM{U3Zd4vr$Q_pe&61qd-nQ z=l_jq4j?hBDf5k_piNASA6H8Z4KbwdH;&W0&f*{H$vU2GQ?C)Op64I~zgzV6?gAwd zdUT2n&ZN(HIn-&xzr%K0bjT#dHgSiIPrh)(v|k*Q!Fz`@d#^k?EQk5U9g2F`&JsD4 z8g|8pU6YD$NqSWIkJntJmJSZbxpB9=l9{J%1&u^zP?d?oBV{v?_KlTn4`^>Kg}u)4 z__z1AqQ$4d%;Bg&lP$LMMYeYW`I%-fH_sx&otJ2#iV2=65PNAV&1g*}mEc0S(sk6U z>rU|SrvJ)~0o3ymL|v6#=rv?ue(q!^`s8*6Tj@cyJI(dNj3MveWPQI0TPWGx*{|hl z?Ko^4CjT`0M0~WOJ{e5FPt~10e!X->+diTp_`}May$f&q_x&D+PPjO5^yvJvI^wcA zPDHy&+Q#%Hs|rcHjdQd161vii^eRL%b9G2f?>|j1Pvu> zXlVg_XXqS4A*lD|e9A)euYPsZKi}n$*CJKd-#)w_b4say50cvdU7hGW?0|N z7TTGv(Fk+CA(s*vvN=9H#+)u;@`{<_B-LdBJANoEcZDfF_4G`5T(#g9s#^C{eq<^r z+HRve8+DJNnTHj}w}g-2F2pB7PR$U^1`;bAkM%ho$vFUR=Q|nF)D9GH&1QHUP=!@U z4pKOLV!X_cU8}AQy&BCPMJn#=tJG-}W<0uouYslmCd7rt06CEQ3Ur2sCEK=>fSu!H zkd@#Q(&^U%QOg;hzjX)fhjBj~`x(q`xFzU^!6`GQ)uxcNm)8ME=D);h7sDc8z+-_g zaMjoQGG7W$CF)>0YJ~k(jUV4c44J$jMM8st6lPV@cJ*>D`rG>R9=2wWxIoE8_1;B> zSCWd^-l%KIGpAF#imso*8Nr>Pp4I;JJ*x4s4q_$BF0Zd8)v+%yx3TQ8UN1*TawgP+ zszOE?0{_KUQV^0>)k&&vx7gWj-1$CoPVt2tJsIf8SRr_SYnFf3p>qSrKm56^Am1b= zvGPXPcB9DV7jhfE$;rC}5IP#g9mA^D!#5f)Ei=aT5f4zXG*`8bK5+L!r*e^mi& zF3O94+DndtDpM7NXLd^m>JWy1)qp5coVnQ2X;Of`nf*3E1#3ocsD*EB% z1`nmtgmNAR>C93e*YJp;ZrJItt{ND8@Hyz~7iT5=CzQR~*_%EFQ5W7(4=x>A-fBdZ zg3^(ulTNSNxY^!dxbI@PvtJ@%fruZ=q<YkLk3myC6QJsQ*QhpO!E zWfHg`wpTje8sP5bMd=#M)_k)t1i7@ul(ju6_Eu+&uWPjwWH(^m;Y)iafYKgxF|EB&a^e- z1c||Km8TfwFsEM2S{KPV{~}B3h-};9!D7bMmUR_&Z!fTI#joS&d6~cl(C4%X?wd|; zw0zs!)2;|4{Y;dEP_Ah>*HAuh7lmKui*uW0AjC>MUjL{Ww5ccWQla=@<#J%-o6TyO zzC<;l6uvRVOV3{?9D!}a=`gvJtM^T5jsPO*Dwh{sWFMeXa+GVrrnj5?2Pqq(C#xo2tdJRfH2s1lh7N+_Z!*%z6p`thgn7l5Q!(=a{cnll0M* z#c+fra9Z|Bw<|{LZhY%`?QNRQ!rRXq1|BtOeu9qOSozLpFarGM;c zIw{IeRFC>EWV`=sSFf{^ld^~OE!7+~iN_jmrihXYra@O$m&(0i{c-A~G!-#b?0yb1 zba*^Ps4eDOe08eH^_Ls2fe9NtonSpD&HQ&{)iD{Det%*9J6vrP^W@ zzZro3PkSL;H3DH@UuZF%(98Yj^)ILlZV&im8Tq-4om(tCpO*5_mUz_f2LF1z_;9;c z>f5A+nAOivb7iu-l$67O$xu<%$cDTfTl#-5FlF!j`fBmD^nF`RJInCn5*81_v^tE{ z`fdY}{l5K*J%}fVIIeJ_a_7-vZ+N3TowkgYMWTxRL$*Ne=j{Aan-o&KV`2l+{LQgJ zC@eatv{9w6a!3(vI@S_?LHS4*F!2^DyIH-A z6aq69q);Y zpJ{NmNAcN}y!$m57o~z?&!}WaEV*VwM=KF33!y~qw~s8-$K|~G#6G|;={_soYsLL9 ze!0L?fvXpxme+nE!ZEXtv!Q>@`-(pM5oom#R{unTMnnOGeKBzGx_XS+tQa1Oh=m@I zVwRkkwM{;CR^7||b-3WX89#eVNtJ&(|Atk1UgtEYFu*Wok=5ivcf1%Gp9XHs(yQL( ze!bpHQY!`2Xa~^_{l>{D+3EL$(MZT)&S51S00OX2^?1hb2jKF%ak~`HUrr#g4?% z@N$8v5sgW;+&6;mb&-Vg)I{cCOJK!b2akO0A6>S$XI!3|CKUxEMfKJX{{3I`W1ES8 z={w$aFMc-hif!na8lAZNtT1LK_h zB@q$8jxohI(R42~RZMG^P40j+cjTEz$)Q z!&0s*9Innk3TRnUQ4cO49#%EisOxXrPuZbtG+Sowl~@<^dl+!yUy-%`atuHh!nPFl z&qqvaamp0R+joB}m&P=iv;}+UMcL@zIeml(?o*3@?tBqHDS-^sllx_x+zRFeP{%O{ zfq$k-e8n{at~I<~#lH^>E}v=C=@p_UNI1gahZx~Zl{IOR{J0P}EVZDjkM@0>P5cje zv5-cSlWnOmH^L;5a;{XUQTv4Quy6WzM%ocm-s$6q_d!O~pwIoc1d-VEI@{R>enZNw z?{i~Fr0?5+G>jlhCZ$pJL0C6&W+ZX5XT#xL_c;8U3d1LVU)13v7c`CixZk6tfqN=E zeow23C!(ro6rvG*%22W>A@V!#v1Mhfa>t&Ke45Ohd@BvQ0cGsm0ZpKkYuO+C#OHhu zZmP=kp0sg_2Hr)U$y{6w^M{UX)D-;%rJZuKYEy8E>atgLV5KK?P(MnciU{oC3JW(J zD@V<`>Z>cMtJ!|z$lr0f!niTLlw~0P6K~6HuS#y?|x9$Lsu~vU}33mPE%%)$}|NTa^t$LBJ67SJzDvSK)YCaR|OqCUCs9$ecu)Lr=Py;KK46Wxht=E zql{~hfuwF8=3c7v>upd(SI~+=`_9wjOftSJY)*PMixe2K^d%4k9x0fV?{u-lI=hV{ z4J+B*%G5YGi}gU9x)`a=7s%@{EVi3L;|toOAo)EA+7ujflE^}Yaa()_VrjJbvVZZw z5QWo?y3wUR_C8pCPmq8QF1&UfQ1AU@;qdhQ-Ek368F6HcHb-HbjsL<;LPr0ML*3_w zc>OARFlo;e7L0D}PE$$NtJJufQFUVc3JSW55&5sV`1shz*Lyc69knPvHS_J~oW+he ze<_v^9YUPx5fP+Wxei%z3ZV-^ejw@N=hwTQp&>*CtSGxDg1m}08|UhhJqEsQ+Aqds z_?{UpFBw$FEXLFj-L+gS#ZNIPgYS#rSh)o*H#G07!sctcx|m98Xn1HtS9FgW`?jE3 zk`lSE_=Lo37TCmxKHq^R&23Q0-5hrc3fk!(R=Z*F{Mx z4BM4b4M~v0p5IQotkTJsoJt-t^gKw?Mrj$vqsYV~zm`|)6#Qj~0&9C~SM#tLm``S+ zT)lw+vv{!->T2rdLqUTtSrg$tgpMRX;Rn*{iv&znVLpUE-N43OFBtg5il2=%e%oS} zA5ub;R~Adz(FfEmS*IMmX2jokdSGp;bg$NEE%^8n2uTdl>b^9rXAF<>>iQ$IUY<84 zodZN<3+pCXM^Y(M<#HRZ5GQ*cvmk)nzB~K`1ZvCKB)#8{sj@r^Ul(Sa8oI`4KZ&5i z{Qr+%C+x_F5JrVz4@X2c9<@pzf_*iuZ3_0Vvp`xMygGe>d6v z-+9)vPpEF|8)rOu9er?A3c%etxz7_Ho_s zy(<+tILJdajM2apn5c3SWk{!)>K3j$SE&*FL-O5#1n!?JQ4W`Vkv<*Ngh`;(KLdG5 zApPBUkf%R>{F0{=-1Wd_XZ14O0Uue{?&{E9b?cUK%H&#`;S;S*$F7$SN=6S|MOWA}Tn){9W7BHm0qNq7^UnK<^>big{d?S5ljzSGa62!vvlm%G z*VD7dB?=zQ_lIL!YYR+^iE=7wj{R|4 z*vQJhq6I8tr8{zd%-Ps;wJ+nX{@&BM1AdoTeqYpNc!Rf$uP?gBP{cln`co^V^_?zu zjtr3mKInhH^l?XVa^(tH+3~#ORcTd`vC(ElnMhUg6B&$3=jMGlTuJ2-^+CX23RS!g z`=N_N7Qc12%ofiehqYHep|`}#N}(s3(=CA(ZWC`;F^gYvj?OeU;WszG=%f-o5=9gU zB^;!PYCyH|Wj?lD`|m0pu{U8#fWDSAM~~Y>IS=fdR&r=a;jvxqdj8}ZK4B%79rwe4 zpAwgSo(2KKxo-hR1-{d;V#z6t&TYb`Jl`$_oja$=!zm9dgi}n-*-m>mPL?4*opjXu z3Wh`w9(Z#hAn?-4qhzJKaRO!FN~)O6u#0y# z5!E^4sWPzIyCv)aq_y{Xh{EDuangX+_HKS>6-bkRy-#)@J$)EF2(w#XzO;eryPR<$ zx{zM8lRfr*RNz#&>ohFelD#BhJ)|_s*M0s%T zUu$DW*;*?c9eV=Vy~Sx#vqn3#ZhkHte6SA5LtfCP*_3mXZIX|Us5@cGWS8}SXv~{t zrCI{Cpm}?k9@I8;)U9@`T{d$c0QJ}Pny7GHHu*x9C=iIR2BOO^JBEz z`Qp1!3qo&;g65fc2Kq0j1R@0~f^4#@+_Ag;aS$lc){`lM$6UbN%XOx0ImEirXU&Mb z(9H>$WkxfUf7#64o-`l&oXhP; zrV+T~yG>_Co2`zSzNK%uGcb|R?ORWbmnT3VggGa%wS#THw8-!I} z*b-8$WL5x&8}x5)zScIS@FTAIUtuOg0!F4S3`lrpzpk*SHAhv%0sm$M%6oYH9}>g# zM)zy!9V5qNt5g#;E=^fKFDpvWkg-?bsMlx>MzvWF?U>5sVbkvu-(N&YLMb`GW zwG6i&LoOiM1|SlBa9dcijk|4$7_BOH-DipKoJMO1SH&*vKOdl28QPNcoS44M00_B6 znrS>veSNc(yq&x+W_+y*88**mry02*q{HKGD_ff~xQp!$XL0%ZkcRm@>Fo2>>4?kQ z^*6%FNkg9S)#;)Ticr;oIez$U4kFTjp7Tbrve>L>#nxeklbTz}7ZA#9wyJ=;Z%&Q! z_SG-xVxiH7yhK#hd^??v*PvCujdu++;PZ};gQagIyC{=BVf`d&VkB2J$SpoE%dX4h z31Y~_#jEbH8d0lQjFS72Rzo0c#Vc*HEM(ONx@7AT(8hdfB-3x9l_(B+2E#_9q-##X zNBPu1{p~29?kIXI!B~4eiCuxW4UY(oA6dTO5hGD_wxIRn6rM_9hQ1mXr*eghHv7S= zUWG{K0>r{KK4R^`ichJ2+j9fdb+-&>6bM&c^ZS7^{ZP?>=14ShISC(?0 zvJRksNmkSQpyHnx-{}~leW8i?3RCmmn~K+~?UwMXf=^?MrLMu%m6j&?)^JUqw(si% z6L2w>$9%~6n>Q=6L6eb32IEhA$|#Bnu&~f&<>HZru#W4{Czzy5prtf|!SnN%303gk zM^^RVg#i_CY#VxFpYD&XYoxoB+1w;7aD6(9kaeq@xBaWOBpxh7JE`x2we&~J zlZlWjc3V=EjzN1r(Js=v{Yisd<0G?HbQEQR?H|?Zi_evvbH|P9;oD|i)ecx?C_FTR z1K2~F++F^np=#a`?GP*(EtwH`^bWIdPUKuRhQ5`6C$8?Reqs@2DTWyecB&?#*+oa) zbsLWV3mGKvxnHZ(2Y8)}DWjx#BWfx-qM&{@Pgyr~XEB0k3f_k@7}bfm5SS-H>xn>F z|BEZ8hr@J-y0L)Lxi5(=`o!8V()imz(9QO(PhK*cs|Nj+EUE^?+7rkG5;VEtA=CvW zrg!_bkkhnQ_B#|{(`C{%AF3XU9{2qXA;-A1?Y(^YHg+XTp)-Bb5d)mN4D6g-BG4#a zSU@BX{BdUS(jzm0uIG2qN|hv<0ITcP# zS>~k?zEQjc^6P5+LdiI5dFFOBCr-}hcsKIv#fo)qtRkRHtENN!m~WA)-hgM?X7blfjE+|HR-eluPJAz;cab`RhUjufWUl=~G)J z`oH|BEaK}`iZZxDpZtSrO9@c0+u@fq1Hw1pG-nj;wfQ)c(D|TKf8N^##AP5xf>)Jw z37w`n12^{QD9dZ1ArE-qi9ZxK7alYHl;JB!djFB2l1XO~$n+jAu^D{@J#;_NQ7!LG z;mEPcAyeW`cKgLMK5hlL4tqmi&FJ~>c!INR9%`S$>bO$S_~#IITgJMq9xor4Y07UD zbW5Ttksk5|&VsV@DWZ}XsF7v!rtT0gb^mNJOUorqMHIMR=b|AEI@WH{;)ccDu%vBPQrJX&FgDKHBq&wK`k=ohcl$rXhXW30%vM4w02};9i-);=k7+h@;CC^^&hJ@p*plqCGgm+Z|4F8R z%WqzSIn`M>cuP3&+AGob|+cd^AXs)@&a(8wT&T*d;z|Lnc9G-0p z4K%@;0JR+*a<@fp0c~TqxY6-+PBwqUIV@(Hb{^2N2umkIOsozj8MQiv`u7Rv?{)wq z`gq^GFqH-gFFMipYLr7eeWFx=fTY%?FDt#P3lmR_Cg=;w3Z&(XOm?mstM(wd84WOs5g5Qm}&gp<5P&jx9B`g}?=YTvlGZ1B!28+xGrC!%7< zKJIZ`$f%}*g%rnCD0SQ8u+ZB*vJTP4yd+mzT){EjeEaD_PkR3Qe8cSXiTv1L;fmrv z?t@4`st7q3CPOW&?DSMkjy zCiUE?c)g36lI(5@@Y>zYJnecypE=F;_~sp($Mt%KC;!$rx_g*ZPTc9|nET*1amA%x#!7&_(^)@k>K@Beb#_`3;QYnl(|N*u-`*hcMMIL5)b9vCZSRN2#CL zXgN}2uB&Z#fr>jSpI_^L;D!5RIdo($3d zAVe`k(yqbiXl4a{VmcHEM*>|qN5!5dgpAtahJ^!+NZW)2L%QIzY^qZrSbT*k4TY}9 zN4wTK!0OuVZF^(%wc_Ce=c?Vr`&xG=R*DN~w-ut|s6^yRj%YphA3q}T z+_dE?S$40mehO+t2CqHiCAj0%;fg-qVA@mv)2|_j4Fx8z|p4*LgF>*_{ z`IAj+O?=eh>f7bFLc8`uN%!UYdAv7TbpBD>iA8%vM;<=57rUvmUaXNl&4LYU-^JOY z4bjgb0#nka0y!fdUopJYin#)Mp6o+`6wmXF$==CxW^) z;O%TT(Cac1sNJSY*1)e0+0X?N2}N5u4rKYz^36zeSoLr5|ak`D!qj`Qi_gra?IqZQQ_L zc@r19GH=y%y9cr9$@UP1iYu3Q!P_yFyAW0(D*I$A?>|oqIFy43?VF$7c*?Xee(uA{ z&;G=T?zT8AM$&5%$u{xkV#JDDikY?Aa%DA|q1H-UbQV!@vGJ|5oR2dWOma6mjak>k z=J5sGZI;-*H^UxkfZmK7xT=^bw4$|*0r+TmW4fII!*?LiD87Q=yD(0ZG-(yw|FO^W z0w=I@SwnwLM=lWwmyB&4Kq&U`X0&Wx{LaPG8b$FO`KwSeBfLhHT%vt9gLA%AAAW;b(rX ztRS^aVUR^HlImBxctxkQXk4&a$+1rYmNfDaE|;b1MOGp2&Y!bYxKC9pq)Nyda>Iz(^7yk5?tz0!@GnW(wE`53OS`2*n_ve?K`H9qpIQO3TwHtbchC z6m@&K%tJB$h?~g;D17*4c};Q_X_iL0MoVDUE57{VxaSeGw3^KIybaZXUzTi-4|fhVXL37&Y81ld-Vs;h2%6ONNY2)jis9^1y<@@GP2iF%;;Ka=xBQmqS}z!}X2cPjg<|RIP~fne4lB zA!_P059JL7uAu;g{&VTm0uiY2{`1S|nB44BS&O zt?};7CxfQv%e$VPvctO7#G~en>P~gP!?*gQ@(ZgG3%*7h2ut3AoJ(=aZA;(yyu@;` zZ2*0k**Xr>j&bdwVQb(1KYiZG@*bCjhEj`L}Cx_d7W}SrV)?IsCX& z?w1cT!)>|A#BCWqw^Z3!p}HTL+L0d03)T}oesmK3lO|O({ir@&N0e#5f>61w6M}FR zW2sXzA>O76Bky)?|0~FwY$e1t(;rUOCi7;}rN-6okyK;bA4r@{M_S)@Kd&BBn=M(!lTEt z)!SRbwT3kzlh#w(`wwbh>Nln*7+sldW{|*e?B&^s0QTD>6Cjr;n1D3aAKk$4-=tB0 zKJlkG$3#Q-9>%oxsymy@}Lr-n2LM???5?6oQs9iWtwK3Ylwc+Zp zs_){=Jo2*VbSd<@hKTsm^ZpR}n0);$3*-(Mz0hA^Ib{U@6@*od7HfX|u#ohE-h4QS zwsdF7iD#7|L&m`N;2V}RQ74$*@Masqrz~DOM`O4u-Nl-sj41vKFW1NN%Y)*2#q?i+ zALzif+8Pag;GA%9$}=tDqHZ0y!T zZ4XK>b{u@@I_rLl!j0r`D(J(@BwZ{$fLT3#<7n7_3n4#SFF{o|+MK5%|ccf!RXJPm4*eMS3bE%ADe((1uBTr^N6a}>WY6;f%P+WPr(!R$zc9yc= zRk^IcvtS6J0%F$3l1X_X|F%W)opzGjl4mnB7WH^Xoqk-fZ(u}%i@up}mR1m2w{|tc( zX|%eM%MMKQV{l4?XZocHLhIuStVeMOt!>_(49xHRxGlexBgT5FRwp>(rhufRWrTJe zGM@j@d?TdqckYg3`3LbxJOfV_a^@F!zvrceOsP7t7l%Y91QsEmG3Vv}JBywiMYysHb1?Jr_nnh~o6KDexxv8c z1--4>RoKczn3YwEIIuW#*Vw)-|Ly*G8~gj^DRfl%HloIZ-}J%etTJ@(MVJc1T-mS+ z3slLjHnnIIHFYI8bN##Wl&TyxvEGDK?bk_;PT#uRnhL)8!s_G&{#olTeTHzQ+_;p< zq!p?=Fm9Xksgq0kV)z#N{EV0!3?z2CnnDhoy1sN9W3Ss96 zD<=^Cyr6LHK3H){*QomhzPnlI8!S>aD`!+P1CHgx~~s5AN0d z4#6FQyG!8?6(}fN3%Q(g&sux`-!~uTyLe$|n%c1~yng7Nw_TB7gzo1;saLvPE=y+;eMXB%?lOSpT_rb8Sfu#w9w zmhkJ0ZaBCxhA$@U`iRn*Klc}{B@#4Ck2xO-ok-vc>&~&F0aEa!8%f{;Ivdv+m$J_xk$bIE43`lrc~7YVEGi7n-6!x{x(;YWo^p(zx9(-Tq_3eSkc0)YT)f%J?Bkt3o1>{r z_%31VrYiN=<#p15O4tk_y_K;`_IbVoh{U(>O#mBB>9%ZE9f50r0#cv z1GuF-=F92tOP-A_Mpub8qWeop^zz`)m>h;KK~xu6PtOk|i+AT$GsM(-;4IY7xm%t^5XSl+Rp+Xhm%cvUbYg)wvEew2uajE5g-D{XFvBHj5|KSy3O-$rGk%lYuE2hDaj$S_#74dda=!wAM+m3$?>DWe<+3r_Cy11lym<6yt<1f> zKYF;;dH<)5OGO^6Rj*OirgyUx`b!++1G!eEv7{3NAcBsHIvI9?gSr9;$tS&}>3v{x zq~^d$Kli@26f?45W?|vu8puP;nK05YF;s`PNG6Iu&5x*QdBq3UN6E=H0 z5e~iE)0l0>Tezw$z|y6CWX+NG-Q|j@uZ+V{!N@r4x#F&7Eqr~1rOy^;kGN59)Y+k3 zgmj$%gONY#JH4&_aYqL7Bu3?kTi&D7s_E+E=>xo;cxHNMJiRqV22)?n!Ex-B)Fy}4 zxzYHYa6JYbt6-IO%Qn5AX+~kKd~NT2c%y?|#L`pdnV)?(GMKbQ$PT!A$d_y>CpX@? z9e_O2>sj^)^AF$=q=Egh)O>T!S^)@4`g&zcz+pb$k`Y4RgwW#y(WkZKA^Gf6S4Dd@e^()ZsQ6!T#FMPvd^3!NkX~ zUU*_k`o2p^@H8Yq`~KK{{kKKemP321?wz=E@1b|psB@pByiMuN|rdd1y` zf}UHoUeTUa||}Qv-mqG`Iu1PD%$EJgm-5 zqs}6-l}fEKQn9;&Whs9|%KUeRMYel?)v0j_!4XfJ?tz3Tuf-?8y*09ns^tmA+5P?r z*8EVQSN-DBrsIeaOV za~yXOE(4`?U54{WGp*(9^jOTX*c1;PqmL6$+>(zwn{q*0&MGU~Mo1G9wN!E8$2mke z-pWlLmtuPQcg2z>@buk%7oXskGM*J6@IS+{0Pr9u!SfO78Frb)dlJ7KQU%PT{~Oq; z$-=(_yuw$FF1IzEs47IuTg0(h=&aCERkcqCd}$&V34!;$SDWghS5UX)m3t;7L>}gu z(Z)3jq4c%FSBN5PJjV#ywK0xk-^Z+lXc5172?}#*gA`X9iX{2w!=n)9-EVMR{aXH5 z%BwLwdX6Kw6=~1KJDf6@YJN75>Oa{v?}%H!sg0kjN9(Aw`*kp|k+XZHQF!7`#Ggin z;pYUG?i(8&MS)k#L_SP@f6&NhiJYHHGFP1DU_-<0q1J}1LOK8iX=Xz$#=}RjZ30q zVT-Fl#f}x1=;til1E2S3w)a_HALKhww|~N_rmkIwn38MSP8y{hu2~>I-DmW!{ zg|F&MCPT4xV$XD{Wa8GJ^>6!P{JzE@A}hIOWHP!j_=n(NzTN`AuSgpwbRo#{XPGTr%R1z82W1_lmX?-%)ZhymOy6KZx zJ!z|%*2i)&-dISM($y(74*yN?f4ANTGGR^nRdTv52mke*BSBH?q?|G*-gEmkjUw$i zA@Je*(Rt5qTP6jcHsF9>#UaDjzp0i!lzdI>7#RvAHwu_!CO%YOW<=RtNZreibgFV- zx6zMpBKsDxn)GfJrf_7^WsS1l@RV>^xc!OwKaP)wbud*rIPRZ?%Yl-E&vRadHfKj#n%bfb<#^jttUplhXF0PKqo-}neVivsUPx)g?-BvE8&LWP z^uORGn*TJ<3Dxhfxrrmfb6gN#-NNNjY<$_MJ-(ZQls-C&w7#?=SV(QM82%>0ulmOt zbQuf-CJL1>(CPqjpeQHoV%atUM`4k}y}j7g_mQuc5s^LAfM=nORefs4Ad)(25=_Gv zEV~!qMYw^Jn?oT|^O}6p^^PI&sq2z@M}biDTTCDws--(`p2DT~%&D1@aBrw&gd6_V zTEPjgFk&%|T$)8Y7tDZR=`IR3VJ0msA<2Mr+d_l$x-H;Ynps=-Z7c6t*z*T0@T{f= z0vGQO+!uOmY8CC)8nh4QEnXT4#AZMUHFc)jVmlq&(>Tlk?C9NcL)|ot=bn-I|L}Pft+Mz)FzQ9 z(Vvssvi~Cl--zzt<>jR{rVxq_Sw!qEFXkHc`9WG_hbQnl{}?yDi%;!0{%A3LMUO}I zxRhY_68%VDNu~CP>y(#qQR6jN?SlX6@|>6sGD)0s3Kf>K9BrWnyEU?sAX_gl@aoLh zZEnG0WQvUNFz~CaHdD#EQ5IFZ`k|Jw`(FmnRPN1uc6b{Bn1g~FNbRtFrzg{&7BrvR zV)t&Zc6pgik3Yf$;;XO3`k%lkJ+;@#q@)6wn%CM$k}Pt>TZcNr8Q+`Gl-h~Zr1~cAV{yz39lKXJwGUP z_cnvqUVL0%Q4R@a>00oI?u;0E0>mV`2?fHI&ceScj}@4=&+y(Os7JKDIp~40$G~Y* zRV{>sHAHR+CPO5Rb?PtN?a@jn*#t#n<#g!3$eRi|a}yg}lk|igODEr62QhcIil+pS$AesKFv*8|_awS<{;J=m5La$bgi1T@_T#UoShmu7LIA zBW9k`TB+X0HIJhDxz3;|mP!}#+3(Ahi(N}sN0i7n@riwM&mkWx;}!IoT}!Vgt8tYi zcx~b{ti|_<^U|9N@#HYze0(?zPOMbqr7FfXO}mLYGb!B#-TkOmyB;)P(2~DTh#IsK zB##{l>wPPBum^}c&u}V=gV_&@zO<#|g+3^K{s#wBnVT_uLU^a9FM)L}P?coj$ffKE z7(QrJPkTwC6cTy8irju)J-_O<{BeYDn5@GeNv+0pg~#8)tQd)C!~#|bXV4b+x6YIt z^YS+#5u4lqpg{`Srw83-Qg&ZPJpbNpzsC@am}^ze)g)Qc?I8b|T+kIRss2Mx?MIEr z&R0u$>8jeV97Xo)^O3ea7G~qw$85=;-#c?g4>9!JexH7)C~(1G820Py&Kn&($*l2k zO7COh|7`N|(N`w%rC|GwExt87J{^)$Cc;UrtsI+8y`!phBGc7O@Nu_-DrVMd6s+^! z*M8WR$vzien?F~b(;RObh3CY+S|IA-7msys5SWmy`$#Kgf(Jlhg9Pn6`mUW3%D|l! zJ!PWZ(|-^UgTnXgoq5~%H#hq`L2-n>=?vZSmnE%`y_%lp+8Emh2YHzrQtCPQ`^QdNHHqb5TP}CrD@Vd!WhYZ~Pd)PMw zh@Quj@km0FUSoA1N|(pMO@AoltUQ7Aq_H~kyPk8jglt`Z2;Or=1D@ct|poa=vezB?DeP=?eldSef30_c-GX;ox zM2dU()v85EVHvw|GW#tPIV+GGPwV=%{lO*9<2Z=TtQkK7^?NWo-nQ}Md^^?K%nKi& zKn9PyLxARIogfZ9o_vww_IY(@kTulYQ(l$^SV$i0*mshBV#~{Q(S#SDCQ0=*2IYWZkYw1i}kxO_MqKhV%KxNuRrB+Tw<4UNZ5& z<#0dwZtDE)aQ8yY6VuqdeKv&dNe|8bYAY`lPpdQ2AG*blqqdf>NO(xg<*v_Yn^sl8 z;Q75^1E%@Jg4iWZdyHQnzl-Wxdr01`FI6CCzz<-&bNI5pu(}LtH3+15{sIn#9+_Y0POBZt|)`Z3PYr}W zSwAP@NRQFJ_)X6Z)<=nDTTA}oFeC0pD8#3#OFyF;_3KPrrPiZi*sDB;XWhQlT@83) zt~>K}@aoCXxu&oDH`TFI!tSuv-P5BsSYSgCA0MxCgEYMrpjajU3I+rYq~J?ez=0Au z3tGE;0^zFw*K9@9`ADd94qG{WM^wbd|x^ut3Us!^r>NWzm6DeecihEg1jh`esmhWIw#P) zSOhuI?rFePrby|`@8S8UZlupAcape{DDpZ`H|^me+{0i(SLKov9F^?d*4KnWb|3DD zN7@sz+iSS>-G8DurffnE$cpg8CwF#9KVPwXnEtDm@5EHveEwkT!ymShJhd#V&xhEA*%a17Seat?XoU$lB5WilC9M4 z;FG7Qd3qTwRP<>5=8sBQ2#T<2Lfpn?6DU=OZ}dU@W}w$Y5aaB6!e#AaYTb_rgVyw> zT&z!ZkA>uI@XS%u#4~aWISr$(T_85s2AX)n5;8L0I6^Tf^hIP`af9!&-3e(FI&6&& zkyWTvO52(y#18BSaj;rOS=wO@|DqryY4jv`dZ;lOSs8XwgTFZPE`ekBJsi9FuaNE8 zH7dt=f~Ob`iQFE7HZ{2$d2zLO#6QposQ1AYIMspnqjf$~QN66)D|(N2t0B?Zp8jul zcSJKlGH8H!XT#ZA9eJ>K?Nu^4{ZEc9LRrH1e^ggb!^L$wpShfX*|Hkda?x~V#MOVj z3((1YRzI8WDLUwlwb`_=HXvt}KqB%X0%Nwcw9cf0FN@CD89h7IAw9#Y>oaFr;EwzE z#mr~^?h9_~3mZoqe%WfbkOm=UcQl_5Nwi17?dC!9{mDtkHd*R9ljNQUx+C9C_#E_< zvd#IO30x;XqnBJ3km>PxxGm+$d>w8r{l&Vvw04_<@sUZpBO%^q_-s?W`h zh*YmjHQd{~$f=wM#vUq=&vkrZRxrqvE6kp%mmJf$wTt9)(7f2#{m|86VBCH&Y`%)4 zDiZc`p(1GU_^5atVDMQNA*BU_4yGi<%OW;B7BKHs1lNGgQdc6W%}mRG)wb3CNaNkdU9LXc19v2Co1Q?1+T^;iF%F76As6s#^;wjmmk zO|1WqGFau*XGzRSjpCg(?LMC}O$_lo8^7I)Tx?Q^;{5Dz={{_r`&F49t}UR*D(a+M zEAcV(SBI=!f?`V;@&BZpX1_6dDxeGJE6HBx4Rvx{*?pWKId)|_zE=&ZtR@QjeJqyB zWNPzlz0qa6-%i|hXSX!6N7u4yn08!5tBNkVp`uDe(OxYcXc)tq8BM$0xxf1O`>!tb zVaA}wuT)rE82vr!HZQ)#V$LRv3dIJGEp~jQvi)8_B6dPO@;@#V-iX4cJf$XnX~?V( zHSj@v>*bE{2`nV?c6|S^Ao7gvamiJ~GN-9Aw#J)%P^R$AaFBI`n%DsUesB0 z)Q5IZX4Y&ef}>l%Dv*)o=mwZxJpH@Ndryx?ZdLG6hCz5AN>jj{MpfaIlV!$Y{Vxfl}Sc=O?Z3B&uB22 zzgH-3b08YEU9xzmF=2%#Nr1CAy3KmjfLZbf2_0lb!+XztjN(~PSCVl%pFZBoUAT$2 z5^qdTdLzEpZ`W|t*>c~9C&?>wdfNJysq5}$hsWMQnE8ADPc>{Fs;fsupgcK``bKQ6 z@z1HzQk_o=i_1EiH0}FIDo^~w{9E)JMocuTnpeGgPt&(;ir}+{<|ND}6b2bMMuvaN zLpxMoxQsP5Wh=h%^Bo%ZKIOZ;Xg?3sy+!7~-h>{Xem?ezkEdp|lU*iJXRyp%^Wudk zN$&1H8NtvriZ*%FyS74g_XT5iPsSFHCpK}ydUKZvbPfXL2Z^2(JO(D0bt}oWhe@9yf0mR3qWQQvBJS(Dqge>omI6149HT?MaG3qT-3vw|64i z7__ha5yCZ9wsH1~=7Hc*Cu>3cKE!GXbLqZ$H5em788eAHQszg^6wq#Rw@YN~5y`iF zD|u022*HC<#$C@}I^(g>GMeIF-FgK?DGfCBXucAYFUVU8G`cgXn7n3ZuE1Dr~+O7jE*s0pIRC{m$Rjp?BxNE7(Jd z-?rT%3gMRD&Kgm$$0OEnX=m5_Ds~CNu*aPRMwxPyigR>mJl$JVf^S@^ci#wXmr`L{DqOMR^D)K?EPfb}ufhGmxNnE7bM<%e#BZ$j1X>KE+Y z<;~^J@@T`o7Wxt#VgxCD5V`)@O0%%z(qpTU6^kl;5pB$F$r;8mS%M4Wq>9!wi!8w28{TkZ_>y&!}DjnN4SFQLkM`T)d|K021c^8@Up~`0c*?4wDuFBvf zf96~QyQ`hMxyk#+jQ1T5pT(+*^wRcIx{U6hbXA7Bsfuove_zBK-Mqhh4Ui?JCJ{zA0oH?X?fGE|`6(Buu_FZ33 z?6SDGJ$Px|!ZjfF(6N!uY5VoMnJgT#?D*AhgVFXzShpL5c(N#^t(9e%3RVtEf*Hit zaMtcRpCFz|;geO@fW|CnB{>%0qw{N@Ad%w)9{J~WcPu!kjh^=L!6=S!! z1tP7jdBucBOl88?8~P_s1k+ngE5DIH-%>=6_XM3ucFn!>k%^OwUg;P@7&3 zzL09e_Uu98<$r9r5zVnzFsG6pqmEGzaOQ1+__Mh7AaHh;h6 zcL3?UtYo&?VEdDam%}f%Xi!t_`PuxeF+c8~54GVi%`%zijGVFVGIuAx!(jQPqqu;E zMp%eXf_*>d9b%aj9<;w`^a<*{W{)|6orBBa><+fin3o)@I;?9t4 zhp-&BIGd&hW?JeNW-gO%^t{cUj(&~-hbOVKxU-sjPFnfLPpwbhYDB+%CcjSwXg-fC zhTobK^XZ&r0hjlgC1`#B)yV7;KL5N0r{Tc2&bNNl-oVMz)9r`7Hc5kw*_~z6<^9q~ zuv4**0U=DnL^4kuVqThiBPqAU5*e0`W}jSpAp36P7<$Rdu8X+Yo&R~GE@O^+@l9esoS2x}aO0H*0rhT=B0C@ecw85>$4LyGf ze7q*TXni{d-dwl(UFyc%BVpj*8xTSevrNG*(j0pA1_1T=7S^`H4;mr)|OtDpGCjp{X+X+Y0fzL)>BKXJZzk zInd3?@qfBJn@29fYAr#|?4t8q4z-A1w~TYxyY@mE{%x!SOdcNcZSy%iX1_fnmAZ^g zS}M$^IIPay8&-TsF@u+{AiGcLTBKQq%Lm;$Uhszgeu`>5|J3Uulr{H7p=7t*CR2`l z#&TsShguwrJcB>cj##2mR#~V=@QStT(F*UTzWPQMzoh(Fe7k6N;yyv>qM7gVc1lbr znc|7P*le3yauX=?RWkgRqd^mnTa22FS6r@#lfNSjGW z(7hv;b#tFuy$|;ZQ8laz5!XDyP7XPbB=?)W4Cr4QEK_J?8t;PU9`WvFGj5#*_|y8? zr*;9Z9L=^LS|)m0jRo9{QTECre?1Eo27hVP;KVbXpV0cCNYCLeY)Kkv3;q_v^2mFc{cF&mw#U8n~Hx=qa6y<%$a@$ zASCYF3{PzF42uspe$N6;Bed!clf75x`X9yp=*|RcCBh$&h75QlM#=4-5`?G%8D4CO22=$doSNwk>u*7aHQDcdwJF^x zsdRM^R_A{Xs}JcYUF1dh?ZLCRFp(o|lj>&toi*!TNO2+My4 zj~HWA+DqYAZzregY5d>NRJ7M-OW`Y8+sxgPRXme<9~Z%634Q*6^Jd3<V8)5eX&K7UGM%p!a~y|Y}$Ia^JbX5Sn2AWOBH{poXT{EX-UQ~jsY9O{28 z{|?oaRqw;co`1v0s_1??-aL*GZQ z(X75`9gsZ5W-Vl0giJ^i zhNh8s)$e1fAY0c-VGHT}U|_6vy6tMiK8x=9D9jd)Ca95DZ{nQLK+cuH;IHIg1vVRN zRlOA0KB{Dur2EC6ni5Umb+zf<7ks_A+pHB>Vy+*AS#$rX^;qalXSBpK`Ig$ptfEzL z8(h#*i^J@-Sf3a;yR?(3l<4_Q(h{X5f#pfy_DgqMrUi%PJY$N~AljF&P?YdN zr!|$}?o51iFz|1mP+Dy4WOnPa{#QRs8~m!yh=|Sz2rxfCq>M^~tj0DD?{gb$x_#Xp z^}JE-LM0AMusrW@DbRi>J8cU$OkcWsy7;6jEYsaX3kjHpYsUQQGrl}ti_d* zwRl4YyEu<=XxfaAkxbrs&dwJ@P@zLJ?-simpIxb1MkKr$>eh|iHf7^WQO}{CiLfN( zT}^I7jU|0=igU(zk7uGrxd25=A8#!t@zuaZCpCmw!pU|AD?J?&GNJlC>+2+G0 zJPy54$(QTVnF$%gH56J_U3wCY7D(8Ux)pj)!6nxzd*#e5rt0F6IvNU?ookx3b7#YS z)fAc$BfjiQo)Fpkj?Lf1pl`2u-%i+e?Xqbyq9*c%h@O7aANg(Jtd+b)$tudrzX8F9u|y9psp}c zjKUKk_bUaaWHBdlXOikiC7o3Ac(a{AQM6$LQT&0^1S85xD-;U8C+9zx^1rvU9~b8A zagU;$=Qn&j1|^vkB*`cMZ8_qnpV0S5#tpD_!ZesYt^Hh$Q8y!5t@Le8MbfLf^)A~? zU{bheJ=U~m0~){_vlLf+^|p*uMdB{b>`}Hk20y^@VB9F`@X(#6qC|iy3?xHR+XIMHGhf z7ox2I-886 zFbDI%vG8~AU)&}C9TC0n2?sL3y&v%wH6eN{9a9}rTKa9P(dC^H&k7D3Cw&+}*Xd{aj& z6lsDMAKAY&P|>N^(9BOI#dCSGsI*t4`Tn;~b2#7<{os(=NcyK20N&d#8HNe27CbXu zRDfTH(mIayCl(k&arw?=lH@M)(pHe2>t=6?2C{(Kv8%VR$+I*>=lRY$RXml_JuJcc zNC&4`d~`bdS#b@QvCM`Py*ewZ`V&g!u*F|88V&XPmfdq#6D~@p?I!%9^f(^>ivH_< zGFc|!(NEG^2?NW6q7aVQUr_;uF=h3^Fk(^lgS4M>u)qGP#t$tR3;#J(8$bil?aAI@ zl^to~kzxHGtMspVa-ZGfCQsDXwDI~Xk3}1Jo-r?RU^E~Z68#pMkT^6Trzm8l7Jm)y|cg;76?T>8FL1ot|!e)d|w`52Yq51e+;zg)rBs~I?G|6@6op7!)gH&Wu(muy8_xx^h5zGEKV^l!^XgXR zK=ue_(6C?8ZQ?ve6*It9QWmB02G;%ie}6KE1I4^G+#=3#&?@)trF!f-H#kiDyZ9}) z@SE`D;0a;;<^20{o7>zHh~hyPEgy?qbookYe-`!Xmodu^63F7{$LUJhAIVo+_D#i_ zhrsn9hHxRH?xc`CU_GO#Sga%86-~n{>LkISS|ciC z3nOJx5WI`-%A2(jsA5nhiw(EOHgOkA#n-GBHK<$7|KBIfLqwi5B94;kadR82S;b)~ zNMmVsi@ndi`U6`%ZIAaJNomkrQ@pX_XSpts)vD<9VE3l$N}A%*G1VL7uFTE9^D@>x zAFN*+I4bdH;lH7$b{h`CvXCaY zOH1IPyCr#t%VI8`!GT{((CJmqcMqvU^3psgWy&2kj2Bz4&!ot%-t!cMG&mg4Q_yvL z7ACGH|BpCqeWisVXO45eLhQlka3C}isOR5*EC|}>?rt+D{}tA_#Tcc{ONSV3V!dRd z8N&533RYEhNtUoe=+QdJflh0Lcbf7~qp1Rx$ixfrUAbx5B)nbn#0=K0>%Jy>*9^wY z4E%kw;7kMV}CM1sWVxeK8Hc2VfC#+`V&r3?9!(Ya+YIwST+g9)In~F{2{LGRDjQ76ZXLMso~E(8fSb zMJv*TXHxfT`Q%n$dOEeg#ruyXVlp~+MlW4*+4HK)&69a^3X5RBkwJ0>Tm(Fv+;a_Q zE-%GVn&T^Q)o0kc&VOFrsjS@zjgXZb_XrA68<(=)zOMf^N_kn-2JDpLtHW8R#p_p% zbF*GIl?cQ%)q`_(CmZ$*&@O{8{GtlIZmXeE@Tkxvc-fSrf>OQc4ayfz?NJtD(3a4w zOs?&~|7CGFwhW*zZD8`3Ormkqi66jwXqPRGNf+3=Er~w>moTl!b!IS-i^t8;;_do} zOs#4X@vI(&p~INr6eelSvuSTfx!aK zuM+Th6M)=etKk@|vu;|!iIc^2;*p0f?Odywq^*1#vs>ymd+Z(l3`+M3IdW|zXD{F{ z2U_H5!#+BaO}pRxzsRTs;%s&6GlkBYqt(#eOh}s>GwAdDoCH3?!5`OVM3dJ{1q)GH z^K;d#2_CJud+62)ESDU@>;IYAGdXGb**z0ne_hKX{q1S*7l0GVoTJRpd4^i$<*O#a zwe!#|;IZ0=E1$BS{C!z2xoT*n8dRj31*9^3ck)c3;lF<79jj(TQ>i22Ty4!xOfuK* z+uOCI-;J{koo#3det&wmSu&^kdI5xqDUO*pV~DCiB8jkHIXFnu22oWMWDHv0nyPz{ zBJw_C_%t8SW-g$O(E4@y%f|cK%_JSxe0%Ukm^u5N(1&&D!^q}iCx+w2p#JTaQi7$e0c5$H3D^P{B=DZenn=eEaN%aI}CsCDN? zE&a!T{SPp8%2YV>8{Kd)0*CFjB>&{;yROtS=Bbq*P^jKQ6Tp93i+U$+wam(~BUV8O zAO6$7v%$iPt=y<h&Yzx<=OOD#o`97q+;UeRq11rE))ZG^Zr)SIMduV5 zDNs)R4X_2o%JiMx8i%g%Q9lILpRCgLKYYWeoe9DHmbF`kEpYgf1sXwIZc%Ech91PC zL9zSg(7YU7seC(#5IyoqG!;r&LKjWdejYkf{m$oi_WuS4|5yi}4@rmQazDgV1&6pbvA_uWOOvOH=k#HMC7@cks73_Bq)kyI^zD->P`XT}V6=No!OU2=v$Nh54T zj@1k2K+p<$c{rx5)T(m^mAqK633UdZ=;snjj0;Bi!juy>(+bRTT9?qixRPC1H{;$Zb)FeK;c7d3pTN`DWdFn(RM~(w(qOQ&XuZr( zjS{6pb$5>{yX0o2wIHk2BTQQFQ_TZ0kDA?m0q|Av54SJXd#EN*Db=kX;Z$lk2K%=- zjf^;8EN5ro&NAqHb2E_>w1r~x{7ke~q3f?Vl7N_D>8L@8`GGpE1DhI}Xp2defejGE z70HjY8URwLp8o$su>U>feMPB)kC@gLAB&d)8myYZvFQof7v_$8Z2>LyPl!(0vdi&p ziS|Vw!g#yzjdlmIb2^~b7d5hxEz~p@XYJk@$It{Oj&r{?$gF5(7UtG0F8^$bv_ETo zvqVQvpF(NkP^{RgJm5uHr6Lw`wX*yQ&Hj-p?WhrD)u^40&F8ZbK<#y1VqCat4Y!5x z_xg=O9UO{;a~dNe@)VQ_3WXU~1qok*Y^~K1E0HR+Bg#;3kMw_i`@5gUg|=dj89_;| zY`m^q52^6HT;QKhe>)Qi2)r7L*G%Y^X}EOKc@o?A-EvxkBw!czR=ahc!V#&VG%GoM zy@V}{uA{J0b9y@nEkT?biav4)vsOT<;jGfoPyVpq#NUTZr0stEvqe?jt-5IvG#EfH z)#ART&`7{y{xcr@^A5SJ@kb%|TPqM|R-vb~{E2l9Xd9?M+lGC_>&F9cenqeuZfTMmNhtUVdo+%&8VY(bM@tX#<~*YoCtLk$V^%*$|XvoEWl38<==2D z1O8o)>gzsm`%G;+IZrw6G*7h@D5MjgY)FmPSSwFWE^ymb1F(PC_gM~8v@k%Vv1ePq zY4<2gglhCGP`51D7(8e?RWl3z-D z`O2Z2kC(!i|Dw)7RKf{@V^Cw(&5UpL-oG0BB{}-IDiZVQ5?Y;6D}x)0;G%-H@Z(Pm zE)^DoA*%E{?wAN;;AwZ@kGxkzWdJbLD_rXLUzz^vEIe)r`^Y{On57^INybu5YWi}R z!RlEP5UYkkwNFAco|?s7YHI(hC1aO&NDy$6)I-JVH94D9uj?A8dU+rdOzWaJu}VP=AUAmT0G zb0LzgK$&t1Q+0Jmf;~M1#gHYs-oh~Ea{_xcFZOE8F@q` z0Plsxx5gGyYX?vueQXZ_(}`EDm$Q1f-| z%^3nHrCED;J+q4b>!CB4+oUkeGfK!op|oLcNt>kA?(RHtQ^Wnf9c-bJY@QQ&t88qo z)aD{4(xor|`B-GPH4sEGJ&jezkaZO7E40&B@lBmA&G$q)}~V zK}?wEpmp5Z10_2hnCt4_tKXn*0-dl!m3w{G?A>)Rw0qs_%FJZsQQNuoxM<}vt$JWi z9!z>FFy9mDcHe6H2}|i>&-t+zEn?>Qtp6u@w}3IF^f3N3b`BQJAX=Lzka@!FhbxRH zN!QR&Y3W^jFXVvZbq^x4;~03wMu?4L1#B~ms#H6$`kP0Z|JuDh&H)rOA_@a7M0gq0 zf1vRy!aE=Lz;PLgpPl*v$m==kMW_q`XOccGj_9J1@)Eg6qyF?|plcvl};?G^NtZ#tV=CZWtiZhra z6op^~yy_{o`Pyq^)8V1w{E3Ku1`y^x8MK?x;bO=e;Y7<~DJa5D(-Cs!=r3}yR!dkh zFh>%N61y0caB^`(R~&@rq^3eH;moW0M+HIROf7MbH~^`di{>i{DF z)9(5=+Z?ivdy!^bp;TX5Egow$gZPrOt`hDW{F92m2M}KpqG-n_1Az+%xJ>Rfky!uG z`TEeISGTi~3=8X}nnXZ( z1!B>H0?M>=mAt^gvCdv`!53_1P(-MT$((8ZkCk6!g;~UMQt}p+^um~*E2B-J$;V1^ z$uoaracJlz)zdI`dM;wnpRuWl{Bq!46crWZEvO(Y?0bBq>wRMAogQc<6~(I5jH?^~ zK_UI=%nqN_ZD?a@tf zm8jKqrPkqa<;t-g3YkVJ+V0C-;x`da>} z0CA8XLp*f&3qd&s6Gl`yo!lTL=Fui$3n$hlxu$E6c`~M{uk4_LZE1w{gi5Wxz#G$D z^Y+3czk^Cds2gtY59h{~dw#R$9gcIMI(^v{&$D`at2GkEuW|EM``7Blm8;AC`<%ts z=-A>@WzS7A$|ri#!*<*Z)6>(|W`D4Q?}tl`_7NkUr`|3cUo+~Si%{DFjjg%UId>7o z!gM5-oNwI}H3v!?6eBdLeY zz8UkA4NdhmTl!ed?jy6Go~ZKEeN7biF@m_Wkmzzr2~}803^aPdjl39qPJS-g9xorC zxwFgg&>=yZyl|k;m}l=B&-2cC0MrB~IB(lr9j>zD=->c)?m)QQUkXzcwzzmg7^+KF zS}I%q*t#w;*XnN|=r-&6`uc!kFcpi+3)S;HM|CODOxIg5X zLet6FqzaAHaR|u;ajdeNj_$04DpXEft9I~185q!5u92J5j1Mh3FL3s;WJyR#k(=k< z?-*uzp_7IFv2EVlyF$peT{^twof>%cyc5mU&H@Jnc5r@f5jqy~c7ACKd>Eh+p-+tt{34lpqbbdmTXr zo5bl&un&LBEu@1rAb&(mOTa-T0W-)<_s=%!t6_FBZw0@7A6Dw$9(w}Z zhQ9Ny*#SX!go_MlrayEgSjEa!*>Gr(3Zc0*6AQIabL#T8iwE#5VJuuN>I`gP_RK`AfbsiyRuhgT1c3aq)_d-#|W}b zgi7XvYqpo!B+b<@e9kMfWfq{f0)YMj#{E41~MbMzR5VQBRx(CP$cG7Ne7v$6p9uRGQXS=sM z?#r4|O-5t&OHm*GTC*YMrO zu5h9)Ub+25H%~r^eX8MZ_HC)H9nAIV*-Vp_E`(iZ;{Vgo?Zagqr4jNg3rLyrEAf|{ zhB+qT$*hWQF(Pu+RMwQGxP1Xd-mt~u&jX9SXEgKrac;i!NFnqH8LbX>UMYcT7v8A@ zL(l&Yw?Ih0z2RB{%sZUqpL2-I>2?mBL%iQ2*BpWq2T?gYJEJTXoS)wXDOgoCQZD$1 z$4~gycfZR|KKYDVjRmfos4I(t!u#B2^u(g4C*&rHNcz=}B8HcAe^T^rhgC=lzw`p$ zQzl?b0V761PK{WE^}$)~J~1w~n+K?xz`d`zURv(y#~Ad*RYw?C~S z(ko7Jljm`Xh;+`S?X2`n#5H72wmWXadm-=pj=*%zEqA2 zT&*ym@V>9du(k3owK3CU@vSmoDgM?3UrW+=>RXpgi*+P!`#^0Oc1j&;mRb-h$8u3} ze&#W4C{H}gvLwdH=IWC3vzq_qfBIM4JAuLi_a8jq>hdu~x!f5#yl#Qtj2X|19UH5+ zolqTj{$?bk<*jK36-&z=T~?%(MZwY)gt(!pYMkb!v#MKd+IYsb?etHnSi5UR>DWiE z!uGrCj&VHc)e;8#!afFv2(`&{=yd~xSBvK%1h2dAr-y7j4#U~nHybW5r&0Pv?E=o_ zK?j&6<(y+dk(V#jRwjAFHG|-NWx|=F?NXs@?jK)rQmOnI6PoxBl;MKX)riF;aa< zAXf*<-d>ri9l4g$EDTLVbW3Fi@1rP}#28s^Dx8#j@P(h}%fI+l-h2N`G^?7}G}M(M z<{%n%sEAESUUbnn=`bB62^mx@`tvSf0#UBK~^pEuXgk znq%&7pQAsvy|lh+)NJ zVKHK=M9ZcCTr%fmnS5-GoJ3+C6c0(eZAYb%?eehud!fZOmJRzw7a!s6lDghdZ?1@8jTkgdWK%^}R}D>Y)IkUlq6v{mw2<4P zn7?nkraqY1pL!;vEywM#e2w<|nw6^26h$(zsx%~0wTgj_1~yI2)n>(}t_T`4DK??5 zgq|GSLn1mGY}1oghe*fC^Nj8vk+Lmm*OGi>60B8@!nTsKEe6SaK|xWJEEY?OV!>j0 z%4)TtibnLtx4!#5zW293!kwIOe&;T=8dX){%OyooBApta{pp{|o2{kvhI5itwmyZ0 zr*IB0uw0%J>WaH}@1^TRC>AGNt^>9_<8cW5$M1ZbKl|?YDDK@wRM?myu3*#DoGwn1 zVwPUz+ov^6ESmVe>Adc_S`ro6qgWjgspED)@+uKX#J3b4Ulw`keVTxIa(TgLpMA#F z)fE86qQr}%4h_lf&~Bf!ukWKV`zQ_VO0J=@+7C=p42jfs>c)%jKAUG}XLuO>$!G}MTuF=MNk7~{}Kar?Syo!Y)KH6&HX9nWLPRgwLQ z*7o}G{~-*Cwc+*qwx{Ab6#ua}_SyHP=_c{O&+aVX%OH+lcV3FMZGg)QmQxqfM2TK; zvP5G^v?ed_Hx`nVstpUKY~I}{ei06`)2+>8%(tk`lbR7Y3h`?wE^2eraGB3J}ZIzfl5qRp8y2`*6o+eh*%?e+h;!o}n zD$k~>`0_7(kw-uGHpEZCK4!J~A%*{(&FT~GofX&$Xh~IT)v&!vJCDS17HJoHwl-?J z{1^JA-oQ|yZ9#D!q9k#t6Y$;vo+=bPZSGRs{S}rEzX@l*NfqB^U6nLJ@V+G06*LVR zLPwZsjGaAIHA`yM*eeoYn|K&2R$IaZBB&&_n+gyU5t*Mkk_MoPQ8kem;QbFi;A_A7 z>zvtJ*MRzu!|PPp)qxuP2R9q)0=kr+#qPNw3HW9oIva*1=@5vVytjpSQNt3t55joqo3oS{qx`F z{rB!tF4lz26SQ8_G!>z#6RElmtTvG*I%;)96{04Eb+n|i*AyFO5ldTGN9XpFN20l{ zYZbfQ#6c#-vVCQ>B=C=#+YC*8j-+5stMd}E+mot|M%GPDz^G&3Vzc66y-F(kRsrZ; zw}idRx4hjg?Vlpu2I@b_>d>v@Er~TeH@dI23pzCp>+iFCpX*eWxb!ngM;WBOy{~X3 z-g)ldy-yRBljRvzhy-6yg_>`D=P&uekNzGO3u;SC)_u9ayE5g0>L6T~2*Lpg=lT@o zXQCrUw}{C$xdWA?%gRshgoQJFDJ;w6l-0b0qNFj;MuqSE-H-V9|KGQ$N=F?PTP$hR zh!$BamMI>~qN6r`NF^?-g&C)5F2hdd001BWNkln2cD6&Dv5TwY!hO%b1*HfapWzPv9wTdG5JW4-Y zdbMGBc1j(ZopHf5IXvUG;(7VQpVoK0qgZWmTS=Ii2tEv#dv4wgiN@LD1aFEpX@Hie zqtStL1=t=$--K9gTi(45`)F`}9q~CP5XTMezHkqf(|uu#zHtdX&;BPFC8;(Kg70a(KMKML{S8fGl#h%DVG$`OuITkMW`v6wz4;c*6~Qf zv4q^AGX0`R(3gqlA#JCKpJPbXW76^>FeG5Fi}O%AZ<|{tRNpG7{vU;^2s`PgI%&a%ap`a=>(X)zoY0kdN`TKv!^8W8}Q9tBzQIR~rAlpy)1l4P?eo)R zu)ij9oeR-}1gRaq_BwKPC!gDW**z~Jorwh0a3#)KES)B*$9=eQJ)O$1w50Z!Hfs;rcw~EV z=-8q2`}&B-v}^mq?EYoq*frr!<>^#;+9H2P4gwFw*S7(K@MWsaO@yV(ihRuu{h|oT zM6|=GX{=!>k)T(6{p%m`&2RoX?|tDui$$QWE@-L?VqH_$HC0u!x~f^N1Jwp%EHGWr z#AJ&)su3l(XR@1~)Gmz`>%EzU@o_UFw$5iw5*Zs4DT@igESUmOB`5@qG^W%Rsbi$p z$VLMV%2iWwxmmNSE21OW2{n4Bveq zAZy2jZVPA0X;$GEEEWrjVu6`(|K3~FQ3)n&V&pHr{{#N=`+rL%9=BLxYD7siY0-`m zbC`z+-}}*z__zPz zKXD0IxuC(JYKUJ@AQVM`i`l$Dn+F3TH4R{QiPa&wYHSOFhUanFq3faX^4_s?_Dvv? z9EueM&U;*0bau{H)rL<${e-8N7c?;-g~u>r45dz2 z*e>xpKoeAe>WlWM5LQx>*5*QJ4KRmMA-Yt)HFcK`C`*# z(fIm9#OU5<8ihF~m#5Ihaf50)PE(3!O08&nwx{+F4{EPR8~KL5MOrd;gS48ty=8JM-K1q=*`(VM&$1iW zPMFVp|MB-pKc>aZMh?41-7sT|K-rG|Fsa(>7!HI#fnj>a1L!V{iFR@_je}!jf~XDW zIs#(~TVY~Zdb{U3m%jtu(WHd2?D;z)1Qnzx(m+Bh0)cnmy2Dq0yJ{0~%|zCCxIKn(V5^&bDe|7-M>`fMqj2 zI!aeZ3~N?(jZ~mmI%haEJ8M}k&iK;L{URTI^sAgL?{RgpCe%XVmS}A>8%67YMWxx) zndA$Ex=G8?V4@3pDw#MP6RZ8T`^l*Oc-%R6O!-VZyUssuvOiYY zww~07ZAiK%DeGEdby+UCb9%=6@4e6cyAL=iPgt)vteuY zsw5_bV@FbD@?6I0ZOPtTA7L{NtsK+v!^e~xT(Cv0E0<#ao|>zrO4 zepmZQ)zu&OIAR+n5g6-`#-0Uc=ubdI2g?`}w%I_OB( z@tCRockB|N9l<5r&aS%qtS59udhhM+^{v{|xAs*fk*SVt0=5mWC>ES7PFXI~a{g$J zVtK-oCl_4R8-DQPpYW}}{3}ASz>1QMf-g^46rLE94ce2Ur0i^ZrlsSp&DQq6%a?5P zwP?vyFF4;nrx!~r;T`Ed=keZAIFI+qmS|D>pJ|P37TRaUtcYQvIeo4lvrZ7F?ehNat!HVixJ&@Iwpa54n4~%# zm^f(d#ky@X12%{U5hzN0QR0gNd`edck*m#`rxzD|_V{zwbp?`^>uWo1_6|e_YY=)O zxIHo~qt?BXRQm;&osL1#P819soOKFh+e&v!%zBsX;+~$~p}_FV2ogCtyF*hePd@vY zJE!ocfBbb$%QbJGor4NqAX4V2XX6 z(AQSbXFM}n69AIQ7N?P=FNm8Bv8j_{%{gM+US>7*u8%#|cGRYbSJ>@Hw*PHMX-wj_ zguoQBI7Mg`)lvG<9ho5Gzx}=uP9^N6b!>qQ{ZOEvCY{eMIAoxm`Ql(L33MdMcbl<4z0dv}Q$)bNukJq5;91*+Lt(#Y zbOYxDaobi8CoQ$NJdh|)PN=PBb-BiujxT)h9$)&>JNO3%s~>>;n2XE5;dI%c%@y82 zFDgzKKuvl@CjGa{V)llebXh40?U2Of^4g{^d&?#%L^va@T31x1^rR<)t}S7K7By1ZOkq$>w4720}G zPlLwPr`lFm?zbzt4^#ayL@_;FuWvGrI7F5XgP9`Q_l0q&jI^ZXp)d}GXOb1{0}^;I zfjc@ktOqUmy%WaJHtvvMWxL#w?@q+(FnxpTrs5$xE;GZ-qh`cxcUCQcTeDag|Kq>; zV}9c|KICLsA#7;s6|t!($u^fa#^qJbx~i#aO-uhRnHUMCXtETYO|PW3Ud@qAu1vLS z19kfzC3_-O$&*^zO(fAOUUi#sklH;$)|uw1n%B(47*$w9D;Vr%)|%+y1;bOcRafT|wbW z%5uR;xx|;J6lZ6A{P`0i!jC`xlt2H@_h`i9Pfl4k4SumCm?0rjI8WjGZ%N_vQuZN9 zJR+8d%j&n)sxCXO5}eO@J+x^mNfCK^x?o*xIJt9&S_*1BPwSfh^4;(AU;pX{+;ZMe9+&skB2gNJm40Xcg<0m+2_~t+PO+NbSd%S(-sGdHiaFNC72{9_D(EiWRD+mvVK(%{ou@(`(YVCf4&z2U*V z`^nRA+kwf0H&2?uQVqHDFeY02j;!1I=#NQKLF6zo({@g#I=I~jY6#gSV)hZKht5x3 zH^g=KOp%+D;YmASWUJ%a{)@ER+a2!y`t9_L|EJQhl@{A2M{i259DDzvF!x@6ApKK> z+c>=Et!vl4!|{OaS;K$U`)?Bd&N-6pdb6Z2!cu*;yrjp>(5!+`1SbWC5Kt%oD6Vl+IEKBOT z?#gf-YSek0FHv(ejpy|2K9}n!eCbOc@Zif2(Wie2_9GhoA>KVjn=1x!;~HQ(d_|K)fC*lkL6?6e~TU zwOjx9kz|sc_bExW>ztz~3L1^nbxk1-?>(xp*;Fjc1@FH7E{`5P;_jXM$!2ZcP_5JQ z|JW$8QM5^e>=2sVj%TGRArq>aNwMUl3Q|$Gwrsc0mkVvmr}491?|e$!E;--z6Uob2 znP|K6zIJ&!tqf|3!HF|D{#HRdOw_O$9zD}UJJa4Xyk^+G>R9nSp;Fx`8-wt=H8%(P zb4b6u)^gn)mZMHt+D+XINNdqfk=j2)>!fb*{CVo9OSh36MET_8NTU*B?~FD%bxLU{ zeCh|F5Mqtl75DCX{^h^?J%0J454d~Ruy8@BSJbOD8jNbyP_LD$GB#_dnlxD(O=v<= zho&ddeo88rAxCn66E&vP=DcvEGSmJuBA~ncw0_*uHHVNU=roxSQB|S|brT6uQJ>5m zR8d(sHMJ<8J$=Gey&)tcoT=|4J=xZMe_Ntb>C~Xbh%^-G6@s05G}}rYE{S)}^&Z%> zlCW2B_RFzb!p=KKk&m|om`Hm(hb`@L?l$gpeIX7dsSB6OC8x_XmWxw-d4ew%JiSPE z%fIti-{Zf0``fId!QzB<6OtJKq_cUNVgm16rzCF2e`9;For1Q_yEdR_sEP&u>096CKmXV7Aj>mW>zZuO+M1de%+ttkg*Ms%r)izVB7 z)^@~Qk%$byOo)~Ur}*qXt9ta_vu=bJ{a$WL+`sJfjKh>YaZC-yr>+^^e{cXlxPB_k zefv|S)^*QxQ|!bouv{*wLW9+T7%dGjeRjp>gmqmJ@DwMfJh}Ls-}>!;%!5aF;OP%= z{&Pb37_rAVyTs8X(-RRax+DWJPp9N;2^oWS>Hm)L{JU+D5Xnk9Q^O|m7sI5{JP$gh6w*ZATGKaclI!X{F!8bWOt4Y39b ziR80jXh=#`i;)-`f@LRFnMfU~RVVGLVxwo6CiM=L*U7SXfOtJrpAKywsv}e9VvLv= zWtlu7Z#En7j+2uUEJT_nqH3I-ob%3GZ}ZOE?{ao>j+i4)#0l1asc8U7P+|QK5r+qjykWKmVye3rRvW8yXx5CvVX|Lq?4_>Run}dv|=PiWqGn>v)RzZh7bZp;eZVf z-#z1B|LZ^E=e~5#{kuX{eM;D@un4hghz*1a)+?oM9983Knt~u{vL~44RWmW$NtR^) z(%SaPXxG?mwF~2RW8Z#E)=?y;hPkUN+A8EBn0BVp%t@N;P@^$r6B{n;4V${6i6N1> z&LzdFZIe_jMb?{KNn( z-T2th=4v`Fh)WcN#enxdrQandPOk9ylM|vi9&a`*?my)J`pWWW4|CEc>72;fSScPaOCDc*N^Gup^ym)%{lEGH?wlxv)_Bv-JQ?Eha6xBIlh-#c-iO##4Kw~APu@oY$hW9m>W#9<+DdUA?)4&77`8;EJyutAdhTe8pCDhfJcjQ&H??@z^< z{{7U+aoX5Vehx{ymIxXCkFVdizx51z3j3HO+(+IH37K{o$?(`Xef!e#A{&S6$l_tT zhPXZr?T2@K-7s&q!<%~L$B?gMj5`B|25~P6JL!5!@f?q7#dk_)>Im+~aLH%7(3wLe zEkDa+>$IKNpe}43s*Daq(!U28rL}J#hH}kom8zqo!^^kdO&iyQqHOY>!=9;IGGS)| zVo!RF-Iq?*^t!rmordJ$lyqv0L6_b_mw?o3crUT$Vye`Ej~D<-K>_<-K>` z=j`O17?fsRu~}`1b);#UL}Ev}yo@oeG*VGanvPVB9od#u*J7B)uCgUk6?W~CjtEuJ z9n%G4^iEE_ea5ef!<#z3oJQ6H>KLYuiRo+$*E|WTLEWE!iK1 zKT?!#6SIa%GCk7TaBjnlt!lLkciVPqx73~Oc+IqLwemYlek-%WFozRz8Cz{OIsFYq zX@q#ihhKT0KmC*6;bj7oDRDDZ{L?6?ze;{ zdF<;l{VgpaD?4Tg+VUW|Oi1_Ky~C`VLG_`Tvc-;5jnq0-V%bS}nf4L9Qm5%Ox_6leb>CF-hdYwt} z+^V#FvVSX%!U?dUSe&p~*VOBplV#06|Ks1`gGXmb^*LVqJcth3@1i%i`;B-VIMx)} z3mnUjG1W&IkEegy@w$lA{o~c+uy2ZbuZ`6fx9!DFkw-tv=<*}?9z;B7N<=hl$sz@Si1Z<2c%QC*x2f zsNu{}l#67WGlX;xj(}1YLS3!+@T(v4!B^jh`tQMghOT~y#*aasAXX<^VJ3*WL`vp| z);!Sf;?_0|`4ZVCL&ijoYQDyjJ-?(tN|TbNMx%~q@iv>2FH*eqbxt4s7Hj>0izg+* z0%tXZm{yL|5oy4MOrVJpW56tSPM#7`8oOsmO7qw&y}JAzl6|czH0}@(MNv{!HEJGL zEQwM0z2Er*9=-PgA`7mbY&w!xOo&aSTGupHKomk<5t~3=S2Up_#wICNLr6>iu}MO; zTk1a|R(F27YXV@ayc{4-r;bhS-}Jugh}H4FNKysXb&c~-mL)-9y_39^kXcp(7Hht>MF9jYFJ%H znozKAjDSNmEwfj3*)&D!TWeO%n@KWMV0p6G5((Vduij}R=#Gusmi{<>*w!j#lfx`E zh$taMf*6%5RSaxG;G)@ZQLR~r8k3$>byHZ038u}G>TNCwJHc#TO-&HT?CDf5NxE z`&WFn+Tc#lkmZ6{Hyv3UgHjf~Jx$+{ylLEL;@Me7KYE@mwW{={57Mzj5{q+5^|)B3 z$yMj^-qScoV+ECW{OxB?`M3Y!&-jPOmy~xO5M4_Db(NQnhd{o1HLD&k95$&1yxg zFZq}M?eFrNzxpMtd5qUOm2hJ)(bq5icjofc%8Vi2l(FhD_-T5Un_yO~zTxOP_w4~S z3g;-DN9$IpYG8^;>V!Z~u8M2@1NInx{M!!o6mgc0y%>^YidY=RKL~I#EmQZ5&$ruC z>Dm`RH%$L{dmQI6X_>n3x;PGX=${q);y858P4}-0?`H`&eQqOngv@n=>~^BS0Z|QS zy?T|dNN<AAaQ# zR{ap+W32fJ8h?z_$3!+s<)dUT5IKT$0Cm0U)GRAJlwL{O@)qX00X@*W3(dz`yRDjs zZKlvziTMXS)%Pji`a@3N{{~m#T`pG+$AVa;2rUL;U15#l>Jk(hZ3xt$AuZc)m8sce zPfM<7>!3<|^2IFKT}{c;e!n9gVkR4s4brL(l*=VWx#V}h@%ub{_kE&xRu?N=ERu4z ziG-@5T5o8ofCWpo3PT`-rdLr~`X#!rUA8_T1Y440M68Z~y%JXreiN@F?BtsEV~T*= z-k(;)PnF-PEEP~D001BWNkl0&*ZnhDjG4D8DF-e-v0^;ong=-TqXxBoV1BPRPP?fc7$ zEVr9?+il3SI%$7f^8d51nM=Yi+X-2p`8QAc;N?}Nwiki?RUzu<7V|NJ{H*HjRZQNFWr2S9TAeH#C=zBb!G1}!-4BXjBOe$Gj%?!P`|>HDqO zk2J8YyDdX8QII64-BDxI)+BcDju-0M;zNMA<~!g1D&P9nm$-eyvZy;AK6o4GNIsH$ z#pZm{+8(Y@DOrb__mon;x%&3Mt+taHNYM7}mTi${8>_}u3RYc( ztBhLsG=Ot>F@(D2%}3|_pMUyi-0uQ%bV`dMM6W&q%ytgbcP>mXJkUc;W0mz|v&~`k zIgm@-YidsKSAWb|t@{A5G6btQwlc$J+egJ>tO1<1nJZAW!nleQS}ryh+`E6DhY#(wK^{2QlRwANBB5 zIj_1(_^6fl{S0MCDW#+@G7KV#WwQX(v#^L@2a|AP^ktKb4s_O9%)n08&Q2G*lY-%~ z>q?AG!wx`|!%)-=Cdad2XmCv_-`wKh5KNeZGy9Hl4Ujl(+qtq_24{BCy8`66tR7c6 z_g=ywn6wWpJ?U~>2C+Zv@Ob62*^vqTLR%N+A|m~S z>`8~K0>KY6T&GO$SKMLztHP$TI2;}?{ZApQtNXs}+k6M`bXFQ|Ao(fdem(7@ zx}-lmUR>wg?y*b2*@3cYP+ATxk+Vf)~hw`c}MJ` znm|ZK9aUv}stT@Ef>}sJlclB=VS|~J0s7VIZrLZMQ3mSj*A2t>^t64p$KRjvd)nUn z%5mBCb7}2MYmPVJROPc%ZrAjP(6%yYLQ ziEauIE#q>^$MV>)Pm+D`Hul?IqU9 zP_wEknx>&?)Irtq1V7;Udpvo-T?sarGqnJwHe%1M%%nzEU-<(c^i29;TeDS-~Ky4f9oC` zpFq{HZacuTtSw1Go}&sTY1vE$)1scUvZwp)dd(O|aXMK3F$LQb3E?3`HIwgCh+cxp zeZL2>&MGK%>Xa*HiPVP=?{ojbyLj)_iB(W1hy|+ZIA3tBnWUd)^PM|3JU9F+d&r|t zGmfh#1XEd>s#3EJjp4zgyPTijC00M;p-hyl)0dM(&tkFA7iEZjhb;qSKhHKsccmt24dV`v zKQ35>t35P_;Nl_BI9LAZxqa6wnB1R#PV69r-B+F`Jvbh!^K{`eE$frYcP`D#7Acpd zJ(thEyq-kZS(rW1)E_UrmpY2k$;ws&Z}LQDNjE)dw+?)`+DmT>cBW-4ec~Ery+S>& z0{r%+GZ#-KnxwZ$xAUA_Tggg8-`u^h9 zgpLI#CpT!0PWi?+zs=3t&*GD1-L?2mII50m&o@Y0YYyrgbTQzg zN_j=uN>{Q2MvBzsR9e-H;`N|pDBV{2)ZqKv^Ev9j6V>N^eQ|%B%fZ*MT+=vWB1wWS z|z-sIzP|H|428iYUZ5>mk*|c{0X_ihdH&{eQQqf`!b?vxu;|BlXKm1ER^~q;h zE%6G}~BBX-?vue*6e25k&|Xl@^yoNa*owN+TrLM9+n9d9+^fsBQ5AQmK8; zEW-(GM6*1_hs3&zth&To_uu0CKlur7KX}06#tl5#?rYs(oyE8;DJhZ4 zRti-S3<+Bbk_#=?VkE=hiLK5lgsghIs$;NfoWnYoL2yHbV5^GOd+t3r?G3=kyep>Zq*UjV9N8j3iMNrcTRwZ#&C_^Pzo2sU+Ym9*JA}JZ3f9?+d?tl6^ zuRd3EVk4WCXR%zUeRUHwJyF!;1jM9lH+(yf{ihrbv5bEzVP{?bgxCEabodyoe#C=u zKulOFDx(Y4qpE?n)dgdkOr-62pf;1q>1DfL!@(NR!S}#3Fb7KyLB}F}SMr#`%Q?t7 zjXU>y{&>0+fL;fXK1rB*-F#sTRENKx1YDh_IsAQ{bUx?-^D;ndg~8Ez4k8=d7@UI zE-T+Y2z0e-q`v)3Ufga~d^HT6aP8!k4lmBH68ed;Z0-9MS8A5Bo*u(gjb37?J-&p{ z#t6pKrO3(cQ$GKN*Knr^(m8(fOU};zmRm<1=VxzmCI2ju01|lYH1KjY|bul-Vl8tbe`CGx~`+$T&UwDWALd}2UW=vByR6< zDcb~;_TY2^MABd$GCXe0_Gz1a*QfdCqyN57!tcuP%aopSDOjBz>&>rNtImKzU{Ni2 z=GHSj|A`lP_U1E?o&9v{mei>$^XMbq>wOEc%dlL*P$a4|Dxw0YzInD~EYEu{EjjpY z@^fg)@yU78`1;G9^Wi&tcz^m&$-p;1Ps7iBFn0HTjIX=Q48ZR7SIJ{Hq$?_;?uDuc zq_3{hmz1Hz{yu^1#F1nuLz7A!ll#Y9x-oAg<@7~JK4F}~te8ALY_Lu^JvrvqtyBK! z-~Jx2fAS7Tjc2odz-n_3i2+HG^}3^L9qWsLu?<}UA3&1OMN}0#c|;PVts1>CW(1_C zW(u^wtBEq*_Z`=zj2H6~?_02%Qr?r2ye}mXBobo6OC+X58xyTW*1qFxeZeMqOy#KS z8c3LwX5qX^I;K|D?h?5NRf7qM5&de-R?XiEYH9#&|Dt}~J9ouEO)utm*@%Fv@{Ka2=pL^%$9NoG_D?+_k z(8bWhxrnf+YN~1h5;IsEKxNS~NG_ME`{%JB+e#F$Z}+5y5*;+qS&<=9{e6 z7upwb#FR2jcZ3))4rE&HK|i#89tx4IE#P}=roxy>e=6n0sPk&$@_XIrMvpCK2ej^$ zF;p0qRmHNYsH}qFwmZYbGye5=zr%~qE^z6b6g`zwEuRnr);Wqj@BCmfbnf_1J$%#w z;`Yx07U776pdhGpxQ~a(M?Y{PKOaEXK@E(EH!EJRk*HjCaw3gg$= z>aecC$E3EPY$Aknni^aM$*V&egFv?BSIS-%9fLbQDnpzg*dg523GcQYB*P%kZlY2+ z>iom>*9`Ah2CD^*^#D=EeP&RG(!9Nm(k!@BB+AN7F30Rdf~&OSzCP2B3;l0BHjO)d zhW9|YiLPj4 zwqcgAy(CFY0x9-mzS{iM1yHevXGB$MS3csF$ExP60ZDIS+Fx;M z&xq?Y7S_^r0TZE0U{U~4DGU)5;+bp{u4nV5Wa^zaB?Ht1z~HEoMN-f>PVhhs;Bb(P zLV##lrDN9hYt(msm*W?{$tu1^XpiYy!32+SH7U0Ec8&9*-8%)uM^aEboF<}@iP=%r zESMbpw&ebt6k^!{q^uA&q3ah%$vBdAoSkp@+!ua}Z+_#u1TSnZ63IK2oDC7v1zZri z^_mm{zHRBc4c>b~3d9t$v}(YoNKBC^VQV`ztNuz1qjJxcU-II1s`jgQWgco;83Opp z^E2F_EAVbQc<*`s80AxxfJ=HNkAFhhv?+A~g(E-@b+CpmdG+j`5{r7tbDwyDmtTC9 z8_QE9!utFI-v&afc2q;FCKh6hm zYRwo^8Wdt#qv^!k*gESdW>yK|GB-=!`xzJ4?&&&;jn z<_ELKrt1SU?rS<{xdK@4(;E(q^w;n9Yw~BBEw6~E*;MPX8)Z5wsOoR; z)J#Mj>N$rH)jUTjZ!)B;hOKLaju=}OiwLIWv!8p7Kl;Ppx zO#qaQobtX3qVE%n%_d1oyBNec0*OtGcoO$lXWTn`NK3@l>P9}MpwgfDu`kbd4@C>e z60$e+flXC2aKe<~RRLE+NNTmSDa?`rA#>cEwy{p1C#&zJ8r$1e%`%m$9*@Nt*L!id z#_4-BSZ?0Bq2@?LI6A#WQ!f$gXpV03*1Hc_oZR5&fB#GV>tFpfk2W3k@u`|ZsA{4F zg|^mUjNrs#Qr6Np6OyD{500TVBAR22Ykk#_IEEk^))-&Nv#kppwLiGt?4Ux{5BfY^YebkNBhSeul4o z?u1*%iFO@GM!;3t{#Hl@#+yKKTvav$Mp{E3QZUo^!zA?cj(z7p1VDU16oOLp9uio5o88pv+v;_mN3nJxo22-~9P>g*dzUi-^8}_FVT~BwZgzvh#5V zutU$=hxsf%De2aO_wzlce!cwOkDxGZ{&^{Cq?r8t_Y=ts<7~`OE>W!c?GM-AWgd>_ za|=sDfds>Bwoo;%-M27yuwd&qR))Lble8Zv%t40hhC>@0PdZq}j%<3#)spv~GFS>& zc#j2`I@!`ScD_GJJ*0Q4W^Rnb*h*Ch$qq4U%Vx8oIX>ZhbI#&)$>)FTlQgF-r2C}s zCd9WP+{307h{De#x?ED=s5Lbr&v`FsH+7& z7*^de?c!DHXWziyeuFiiX45W^P=Q2+gvpaagb=Y&fdMh8gC_zetNU-IP@@9J@^7Fr zUtqbB1ftGFOp**Ub!#HVNK;jKfzC&~2+h%w&wb&ueEBP1CniTsf%ry)+jU^0U=$-sW5+52(U+CA-G z2IXmv5fY2maDvN@Ac`zUZN8y1)U z?Y@`BAe>R$7=;k@eUOYLq{zB!X=5N(hIrxj;t0rN>80*5_+( z+_=H%=}k!Bss;7(h`SHYplbO3kN=Jz{p{zQuQ!-xiMR@k#Y>_x)hr;kLmQ-atmd!n zXK+RZbZp)x*Ude(OTKNBt?K_!GSoRoT{#+5^3x~SILpRZ{_gHw{^Y;>1zlAUY^`w4 zI2>8OQcxIe3|3seIpb$*cu(ggQ58~32E^0yZT}QPmbOo3YtvNWcf#a0RH*=?AQatb z##Nl0p3=p@X1&2V!@AvY_wHTJFIEbH2jhXtLFLL=(}O#)TOozMZe%cM3}jp6C9UC1 zy+~6R+rK5G?C`2M`qH9rowHd3DRk6z%~91Lslx~~b;VDA_IG^m+rP=zzVsTmPlV8| zv@FgNLc*9tRW%CyDetMWh8UVl`0(NC$Km7fq{BzfdDRCUp7!<;QM)`vz@V;cT>zx{ z0c)&Mu&d_352)^ySS{tyNF%^GE3I_^p3lcW4B3X~<|f~LUV}J8I65ZAHH4=NQ6EWp|_E@ubkuhk5oiO`UP80 znFiMtDUGX#_jeLh$_x8I@sk7YPx)Qnf{z2xW8ZZJMqjC&MqpvsM`Y&sV1b(#sm1AQ zoXCbrmc&k3D$`nva~0A{7^#%2F#^qkwO_NmvEMpT+Z^5&xuiO%BxtA z1qBxrunL}p-vsK#66Y#nGQ9r!C;95vz768otRoU21$C4pT_koM-+H3=bnTiD0$uQQ zz8ip5ulFgJHKxc|3bja<&BN4PusXJ}I)$9mkR;@1eP&KD_(Xnx?5)tRzyn#Yf9ZlIV5 zh)L8GfYDY8DXJ}KNwg`jx$rzZd!&$+l+}_|UU4g7I)QJD0c!s_Sqn{_PW51tu?^MU z7AKRq1yBw>v>UQL)h+x}QCGkzP(@T4lMKKl2se*za8w_0v^b(!9MOizqw_V%)%@*G zf5Bh>_($A7U$Zzl#T$zc9@{L&Qn!P$YWY=L&}B$!d$?F^#-dKF$SU}`j#W0RQ;Xn? zrePdpQ=J&6W(^jurl}k1$`M^fhoKY8-~aM0{`mj?&$Kbn2Ei?~Y(f^e>F}aYo7H1R7#;~l_((dy3HqIn|{pR2C+rRY^|K|69hnMaM$ORz;T=w<6TC?`h{J zABXohyx05xB-VQGcbKc=Qzfx_l~5+OAJyL)TvhDf??Ki8C$h zRl(F{@wRoj9$=lO`(9x4(-hvXGWY4uEh77Glf`zD?KbrwX0PI&J)Bo&7cV~PdRzs3 zJkAEehtW?&9$yl6F0IFjKYe!0fpdq_n$~0AwNo%K3_}T^lz&TJ2bS2r-QcXnI+wwc zs+F7U$YSjyF?K9(G<^E=FLURmV@U51+F#@STbOhoD`z;_fCM$$ku`=>O1-+J!U;3@ z%%v)TMN0oS3M>`zV#N?85I`3j7F;sDL~9aQr6pbSD%CSzW_kM!QvDe&Hb-pM8MtNW zSfFa~E%*pY)&C_0h(SFVCn1&iLo+x<>34j7phhTLKMz^qW zD9JhpO|)KSr!R?Y7stDOw4Ap)eR9|@ue$ND51z?Dty=r$dp4FvB=KHLA#iN#9wx-B0CPK=EJ@= znqEALH<)W2gw|$w$#C9sy)x}9=VjOIJHJ2u!+`d>pNH}q{moo6>hsg%fR0&|PR|zX zYvXPmSH&$@MeW)K5t`+ai}e~2;q>$-ZQEw3x@6NnWU)xxzE$xb|Kq>qwO5{@sy)F! z(FSuws5{`=)`PHx9;xB*nL(Wz$_0chQxx{Za1c8My7?;(<57lGO zUjdBb)QOd~7AHobD)i2*iZm!z^Q)?gx~^GdCrBRf$&i{Q@4S1DKmN~u%EQ$K8?h{o zPigZwD|T82eVXRhlLfSn?&l0t9RlN#RIMGv9XYB}U|YT`ShgflB3^zQXK_`9tt(tr zadxr7INeZw`|Y>6d+*(>Yp?46y}3NI-FQi6yS^*+7=HG3E5{^*?mX=`6dS*KFIA;g z;juzh)r`m^7UBdXVQqyo&|s(x)JAYFYF{*oyLW%hQ6v2OfAbAqd#<5dzl*Vns;UrC z+p$Gp!+Sq#qxj?S{)CU>y7{9X_VKXC?)4vKxOts$l?DEX8LX(mY6+3bIjk9|5`xa; z%s`ExTvvwQOW^5cKy?Z%`!Je(4*=sNnQh62mtF!BWdL9Y`ON{nKJURbQ-C=KGOq$y zHO_w6dX=yr`0kct?)+StuG43)13|9>d-vtDue?`H59BxY&agpsIm$*@Hd z0kuo0cferk1*?tc_~tWw^7YT~>Cb%;Xjna1VX2S~BqmZ9h+QOf0pA9?ZbRriJ{DW5 zeygS~fl#DsC1l7t26aWEtT@jqutd-8s{N}oqd7^{e(5;rtNCaTJ$J`ZZ7+6?Ps3qY z7D}%L($*!9xW((QzRt~?x2eRjdT_z!VuQnxVx+xjHSG{{ z+p46h8eYk5W>c@$JyIYyf|M0-2Tp4G*DE>;halnCCj*>s$*)~q)jJ|?;#_>c%5wYjK1*BF~A$!%n$2g2mv(%XRE z+DP3CR+CW^CFNKulB?UXqd?S@5}`i_L4-~cJ_g$0@gz1Ouxd9vT%GZ#T`Q2Z7E`&c zSql-hcUs1nA&e@Y0~lH$Xzw^`PFi&cB=eeV1W+gQKs}~VwX$sOcJ_Z-Zs#1vxeV=e zz2vHfMYCX8FF9G<;Q06iOvAbj1Po_g$4`FoOMdW^pK#s<%<&1{IX0UO$vT>ldJ53Tp+;3U1Ir=hlv%0Q)-{K0^&3`UK8Vk<+_G%TA1jjKo)*2y5tC2v1G%q6^%ifw{T5;ji{*m#dX1}^t^bBelk0q~|1nzc4)0T` zZ*isNWY8}s_GgpT&4u1~h}b?~y+){wp|OU>LhUTIHQ2^*|Nc857yK{({tx)fD<`Cj zw`p=;aL&+mx>?&a4bExb-3@cb3O)`WhkralL>>>UewZ-v!v>k}H9YC^7sKc&L>7x< zh-#bA<=xFJ(v-CZ%wT|iGGKKY?+}>043Z7OVgJ6Iq`40OPUDquIiMWpJ9pi|{H@us zGdOqMFzf@lhv4aDVGeL#1!g`@e*0khRe|_8js58l(|la$dEGF~XS@)4%7am03v2La6F-1K<)Jr9*; zpu|kP>A7L(RbK~tOa-cv)ER>a>d4ACtW(L3Hh9+2YmPjf~WBShm^-3fw#b%@di6pDgz=q)OcfLVeeTs*h1?|S+L~W2sXo*=;HHA(kRAcBRRVAu3IF&X{r2JiqEkZFW z`J3$!Qa&Y1u@*_z0^)k7S3)$7APK4kU;N@%`1EIggVaH{UgKEcHxY^I89a3n-*qZc zn?JoTU^VoTs!2i*SoL@8ZK@VOI$9<6HD&yDT{O9ek9=hhT zezQM~-LZ2TZ|>Z_vPdq!Wao<|?p!%a{GGAanC+%if9+6Wb+D0P#(9)~);e0h;iNjH zsvPHM52%B1<8;BI34G(5U*cc>%Wtu)1Jfu8+9bw5%>77wf>L^@LS*I7JE=m3U{yw7HHyOBAPEuEOVN8#>C{aK zTGq<4UUl4i^nkN&gKKKFNjq5|6nm!DnEV`$`}Y*44ORPxP<1MS+NWD!6BFpV^9NOi zS-oA$0obzztm67H*HslwwczOJgrnw&rdm?f3(nRZ9!sh!e*Ck)<1c^kHzZdJQfVs<$WFZ zd>_`o?{gXEyOFf*)}%t-W6qli*>-(+plRFthL0brUA;F;lm1-af=UPP5D8E4{D8ko$$1k=YtB@2CE-+ zu=$TE6uT=%Acny5REBBe+ z%h|C%J#DK=Li1l*hrmOJlVNj(S27uPJ|CCObap@XD3cJW^Jw(Z%>!yB(b+0by+Ds ztT0`KKE3aq;>mg#F8e(^KCRbodZTB?=y@r#;sZDA{hHK_079>(ymh={G7K_UBtcB- zX4us=QIgucGl^;eFTMH<&wb$qxc^fw*1zERXvM|)S2T8oO&hFiwhp=azimI4$)^Up zl~k7UJ3Agq#e70UOz|$QHdPTvN|7Knp}I+1zk<8@4dlj`*|<-0)}FH2BoGfYkP^P@ zAhe{Q604*%R{xIyld}45+De=iHG6eGCK{)dPm-GQ$x^M!W=MzH6)cLtB8KJ3O@8~! zU*qNHUxjFh0lZJ7O^2f*v{3AH>(Jw5|fpHxM?c;YUSss)b3UNTkh za+ zP43)zj!%5z6Wlz#P3R)+x}{rph)+bHdh-g#7-ICA9tx=e^%PHrOd<+W2OzV&6JwdP zv4yH>yiJxj%m>fop7z?;#=>sAVLB#1eER|Tp6ln5oXKCo*930PNN!CfO{buACl51$ zwlY57f0_ZDF7T4=?>Mk&JIYJOad-Ovmg~$z)&3eimU25}8TQGwhSC-EFWa^RutKw_ zc<}Hp%Vop!FWlzg{kK^x41f5Cf55lC@y|Is|23|$tS=to+chZ#ERKiwAJMjsO&9T< zsL2pf^8zs$k~np$CV2z1@0zB6o)w%-CDhenAEJ`@q^Z55=NUfQ*fCx)`W zlms;;Bf8P!jnKwON5V_wV%_rS;+%8ek_^;!MM|-6U)AojYMLgmo65_@nIZ)V#;Vk4 zWsEuyl;R**`Z&7A(&wWp-r}vvu6gpcMyID%WFQHvlBq>nHM2=vZ_88vTmgz%qOdZK z%GET@l9S~L$Mq45=7?r-%)N&zq-xlt$Pa$>V}AIvUl46gYHED4SmRVJ-588maxSN#<~nr)wz>8nO6x`YqFEA%2789n#B=ywLqLDCFp>M zKJv%^>y%VjXxxl}eDYYkKtwr*729w7!#Oo?|N+~=*kZxJPNbaX`9uJIwTTrTl! z$A=L-&O?Ch*RR_(efeG>FUC;r9Ax{!xDnLHI8wf*{9znb%F?;H54cLG9Mo<>V=D+X z>(wKIzsHxq_!8gy_CF(Z?{E}@-jAU325aly#;S;#4ms?@;bW&&ABT^AurmHFc^&kz z0gOw+)4QP8U9-FW8+^+8Q_hmqIc_wsSWV~`UFGBgpnZF^;ZUSK<3xgY`x#?iIEsT*5o3k7x9I9u z@khVG?H9krD!jz``jky)bunyEweGG%x)zB6n^c-K#Rw96m`V&J5)2$wDL4oU^~h!b zlE&%3#|+)r+Vd13n}`K#NmTsKSKi>0pZy~3{d3l-R;9j;LPNpMCZdy!z^E93LN(Ho|(fCTu*Lb%v>f>q6-A=C!JM7gg@w*%=XW!%czh z*c@|5AJ-|3p>R(Nuhs^;Z4&!U-r=>|dEmSa!+mi4xUfARZo z@VU>uMBBZ?@lj&Eeu(cb*sM1g9I-X5SBdq;}oZ9qmeTS>- z{ykNIp|dudGDyAT;|RDFuvkFa0NRyM;#ETcH<3`aM$^&%wl-I%X^+eX44|Gfx;(Fp zQz_Nvh~@H_Wpl)`Sz>L?stuexbDMV`t@z6y{E#31>=y)MF-NC#A!4eEM22Tc@X52N z)s#T-!y$vZ4<&MkFtSL{7I;_SUuA4xFIB4tDQfl3<~FKnss(kmz*H5{KoG+Q%U}GD zAMm4p_y-({05O`l*rulBa@5UXP zuGm6VwaJSyBU603(NN*C=?QCflfXJK&S7msyIzypHLt&XlmGc&zriPN1pLJ#s``}8 zDpD^OG)+TQRVsyROmA1!TKl0(tbQCm4j)Fi6s&%b(BUe1y;l&jGf8@n^}B4cca?MR zCBzuBk?Oo_Sl9T~hT2-Z4}JAa9#pO5omSBoLqfL3vrD{TdCmCTFesfLd!?P8?~#6z zQ9Qkm^K}}&H0GjQ1|O#{-)a0q;BgLC9t!33T)*6R?Hp`ARNl+VxW8=k^}H%L8K!ZS zxQF6gb#Z*1bjzgSQ2LiGz~=h&+_}%i*@pLdX3QHdT+98X?<3pA{t7qKN0XijRLeeo8re(95N{v%R+o6xqUc?-Kl{=sO1Mami z(E6LCOJ_Z`l;ya>r~Gr!Y? z2)3eYTdJm^3yEmdnauHxQ@;7l@ABM>pQbxolaeJxFwv5t&~DV0YG^xr>uEO|qVGsq ziZ=Ox51x>GZ%;L*EM1wlb&jL9iYM-R2AlIs%ih*+FYAHOCpjNwnI2I235oN z@7!}UEz?f=#t=dv<-Eiil5ACxt*Hpnb9!{jtFOM!%P+o6T`y?YE#V^K*B~Ydh z_RbHi8KkwjnOCHe&hS%;wc-A~CK;ZlEXCS}fOU=pbV)~W zaTOs2Ho=pe;e36;{f7^DxH>10u$9fgbUUULXb3uvRZ^UHrY(qK8)x7BFOr-Cr}X`` z1!lPcL=};29za1|W$e~ot2KR3=pk6%kaV`9vX;u#NQ7m5%#D*72C=9_F{f}=)3XzfU@06R&;R>ZKVt1_s-sixovqXc>~evR zLe(r(gJS>+T`B89X-N9=mpSqXk`B%%1grRa6pw7O$ktV!SD1dhO!>WmF@zMUmPeX) z<*1hny5PB3ui5yHpZw&E<~5j;LR0u%9Z!=hQ>Y(w2FNNpl?Yi=CD|MtKB5vRvzq}5$&2VK`u zEsuesnGt)SDk4->MF`>GJt}c$xx)L*ogQ~B_oTzV^>x2)8LZI`g+ol?NtEw#(|ND= z@%_m6{k-=j-%G*jAwcn@!w2y|T{rCOu#c0@ldqfFQ&nT>7GrcLS?zI^7ke6c8ypVQ zGV&Zg-Vqzdoqiu3JJ3f**O!Utflhr@U^veI^7#AWO~KKVfSK0`S82b?^1RBxHwTL! zr!G%wuzsAd7qne+-G@Dy{ACoUe_v02&xd&+vkOrVlrKXMi3wvZwRK=Ck{DtTa0XL5 z&Nt_{+E6#bORqk|E5Gp?tbPgcEhM~!Nsln;9Fta<)R8p}DW+8smDt=mC!6o2Durir z{Mdsy)l$^94J!xgEuE!@FL6S-=KN!J3QDtM;mSu;{trZ1(2X>ZjvG? zdXn!TJAjhl)plwMS>iNqB~=HoatJRMbwk^(38Lz#Bwgs^1c{Dzv%xrrk3wA?(X}nN z?mW*|zxH*Wf9ZAnT8Q2dy^w+dA65N-?TKB)x1Fl}cOBk$#MG)ZjrWAu5mF?I5R)HC zq4r>~0IVLYP9)5R@MHop=N1YxcPyVD_r;VqVy6->+it(-d6@aWuPh=$OzP1%iF!0v zhhz%6V-VJxHP1YAhgV*Fh3D=(hqV>mMaTMLjo)}oFeIO{jaol2nII~mnxU$ip2+Q+ zL7en@Mf;w^I0FEO6P9#v{&V^B&lYM951HXyZI3GaB%iAuA0JbRY~*mgB$)Z-ElU7HR>W1=3jt(wY-V%_-2Do-=H1tODCl(X|dR zvbk!l-T7?{*~yPl$HP`j>5M{EXB-yC?c2Apra=-c7Dot{^}53}3x59gU4HoUpYiiI ze~lMtPEQHW;#2G$M;3r)tidIH&p4%c*$>BzRHrFUiS+u)y1ow14b=Zj-JHcZFxFwM zqpoV|dPz!&8#iuYs+u5ab}e;)XN24632@rwsM?btOzl(@g2W<^Ve$TM~W8M z{8)O`^~rAe89~))TVc%B$zI;{F-GT63iz#V)O4PzO58d*#fQkPJ2!ara825*dFBTE zyFd62&)uw%=y6sEL8$7Q)<^2Yme@WHR}6>W!PmRC9DCYW+FbZ3tl1tXT-g-BlLCw% z_3*TH1l=LcS{Rv=mfd7ybn>Qy>~wb|_16#6Is{W^cUPuy7`IXHiBsokc`Y#i(3j(L z5ODaJBah2HNoQEzLr`&={=T{o)4Xaq_vJe**Yxa{HE3ZD!E5GqF_;-MJ3H~iid zCatll0}g149upiAJv_=*%0L0TjPBzR2BPO7q#q9UP6mgGvkZPhVUEsM4k zg1*Bl*E?nb@G&4jyXjagPdR(E;)PdU=WAd81}CRCK^j6AkYF&uf=|RQsDx_U5j&61 zo_d4d5Mqaqk(fdTs)>*iQ8Gl8YQv z7cvD*{oMMbR(o`goo#E^U2p=6zd&6_ z&K~?49ya-3VRlShwIkL@|T}(I_yDsFOh%mN8417V{O9=cY*C4<+$a zB8kS|1*zNjhDw8L*NG{QHTgVARBAY>E?h+IYbfu*X? zTe4|OjB#1g&|;+6D|Ixs;pF5Nm0NOre1qlUn25o5fwhmEU99=5zxf;f;od#Y+m_|Y zDN8SDOtURpUk_{5v6eA7eFJAFRf4giwp$01x&`Lh z%2GE=nr6XKy~Nf_unij@iOZTF{QMXEU;p(lxz~DRc|8Jm_wV_%-`##52w%A!UCf}RENMOk2%4N%MDB~>4W`P)VV=g5goIT>5 zci!UB*&_w8MxUR4EHr7Gj@7#KeM!b+=BV#7h2UfW?0{U?zEi2BDxks@*c@4Lw9EaV zwuTrwZr{Ak>f)SRx1Ob2tqGfRoL%#sZ-14qef2fc`b`=uIF>{S1Oj&9)RvN{iJ)=F z9vZhJ-Q@hdM&3WQaOj=AkC9v!|JrMe_c1&TW%w|{W7}Arg)IL>!biERMF0RG07*na zRQnAJu3Qd^44U*ii@oY^3jKf#GtiXXMgQ=#eBTE_x5q94Z-aEE=MF)<{;SMG%VF;O z(i!DBkQ^A7VL$ZTm*%J(W`7^JYCqWrBj?T^0-~3tbEte*Ez7<%E`zrFj$aDEt~kEz z1IPRNuf{2W=xSwozr$tuU*~+0RviYDRMpU$w4I<1phH>6zF)!U!}3_y9s((I$NTYN zPhT9v$M-kv>w{W``SE62k7*d*yQ`LA?sIy6U;Ozr4KYLo^wtnVAjE_rVyvZVYA*a5 zc>Q|rp7vpn2Pl#LUo6*e1-bv7g>Jdn_QUJxOd(Vqr--T^@8nGGBJ9U zRE?=cVv9)vDX0W%iYmpGf&zzuq-v1>9l{0?!M7?wTGzFDx{eypIY$(zs)h>Kw1H23 z<_moBx4+8m=U;{xd3bk4WtNzr_d%g*N4Mz+T}uc7@70!S7u8vns;cMDqsf6If33$P6p{2+C?b}&s(4>B8W}Bx!|2( zE_qJ-`OMXwM?Fs1_xumXr|T@_4vxiF$amlQ%hK38{+anc)Q8a?^1O8R=yM8Ir)iJ! zP6LVE*k7;XmCozCuH)!<$-R4bSspbkmWH-n<0|2Nb)T>P&gc2=_rAgFuf2rG1)*IN z!-^QzbnTiLBW>&1Y!Y2-=sLj%OAw=wPE;y&J2vI|8^Fa*^k_^Q zn+(~0H#^6(Ja<37Y#ml<{D{!`h*Xx8j5<9OAv#0r1CKTroNX>tI#bkCL;<5fFK9A? zo@}A#aKnA)Z;vG8I1VGIxO2TQwx2r4yN9mX;gy!xQdvvwYL4n7>RRoRE{|`pJU*rE zB5Uudng#Ey?(-M_{V)0D*+XJou{gZ}uA&RNnNw9Z=am$FN@*MVyn6}Eq21AuMD6~% zYh2X?QAeoiWXn3Js!E+@)eYj*q0^&H#8(wRd+Qzk)1Ur7JoFKBa!N=ltvb99W%1XS zS?HyJch;+yNUZjC*;AisJu$^u)wXQ_qzDLQ$yH}8xGLKswRrF8yyv3baQEIj+<$N% z+tkFAFgs9nyMfgYGY8h;qd24TgNXW5al^G{wx^0Qy`-v2tC|eiEw!<@4EK*umW1fJ zaePAb9TyjmkhI~AuY8u@{rYDiJ;3`F$IFJUOH_*^+Sp=kZjXP&;j;DT2eo9p&N}(J zYxwswT;6_9M>(H#_}F>XCE+6hj?=Caszl!5E4lzCt9_97mPEEMlfiX!pVRN-u;=)` z1-!{+5z&{#4A?3!jeV(4;pQ~nKFD_n0?xwNnKb7h<{bFl2Nrko7)NQvPLwWBz zHf@W2WtzsjbkSpWui2OGp?HVF;|{)0(+g&QDAGpPA7{!l)PILwI<-KOVuE98gA~*g z?c)HoVVK^(L$wfjf59!VV-mr_cDxy!f7*M+bccW6bI#1T@VEeb4nR$hPtQlu#SLN* zDqIa1M?j^$V(=Ijc=^?5dGRxMz&*e}`URFVLi-kuM;O^)By0t23s^OFR0j3EmhHnP zi^$eGrLK8$y~XzR&q9dAEbU~dakfFkun9H3I%Oj-aeU|79Nl??hv8+;Hpe7!gsx>F zR_&&SiWHLCQjH!HTViZ+DZ|C6$0a6`1SG2Z_uS@1`74g9oUx=3)!u1HxTeOq3M+;- z2wf09^{LPE^>2Qc=I93PS&MZIh6d?O_C_D^T}#`x__kH`{}AYW2CT8o>gsC$v)BR+ zlC~gl06kKXzAci%Mc#5CO;_U1^^3lad)}jm`rs(^wlVGAcvFBn2g>%vPucWB@n#%C zz&XdAJ9l{PwNG;E^cK-a)@N(AS=%L&htT>gq2x&!sz*_qa>*3gR0XPu0?h`_r_A69 zpM$7D((ar|CR+Y4sH8ue zI=}z>U*YJ;Ksra_hV}VFoJ}-M!`%lfBsp52=vvf4RfH}kRpkejPaiz@BBdPp9aA(F z%5l*?obvoacU*>>Ga1CjJQVj5tXnD7(O;HGO_F+`DzbG{)k%bq=n%Xlx+JW9$Ju(# z{j)QCis07}-Sy6fEXjp-u^hlBzm4cLnGPTS?U1eaiZ22usWF zqVf-0lK>;2m;Z{2ePtb$anx1CQGLYm@l6)Z5zX=hS2sM`w5m$)YJU35U-Cb`|3iND z?maj@!qk<%b5p{(il(Ymg0kIE*EJS}&c+J)?WxX|jM26m!aBy#vDk*S#;OT`UiIJQ zci^H)yM9}8ocDRpTh-lrpUcbugUbLQ2vDLxlazQ7Z;(ieWJFQR ziS3m?G+&Z2utRWFdH!Zr=7c7v+2ZP&c< z#v7ckE@&1Dx{#a~QXEGy0<7b-=gEpP9xMQKIzAkqGYso@%Od6_{spRroWCgKm943M z*4PB`t7I29#z?)ioISjcwr70h_g>{k-}^GPc}VCUaB{jJMnl_177IgdgwAcTW-)0I z581vg+dpw;^+_1QuPbD?QL1-_MZLALWE0SkYbvK^t ze9oi*7zXxp-^bUOg2F@Kbb8JdIHHG@t9!5~zr5!5tM0?qX&T1o?5E{0Ts>44hxQ$W zCzqsW8m@x8mqFj_fYHmsCi;fq3h3W zj~K)nf(Xv1I$Tv1K14RI!)xU9=_77Ev*hL1UI4vMxcCLNJ>%m1=hS8cvITW{;48ae z)uirtQ0?JUKR}L(VAG%;D4Sun3uYT=YG>a297acJO-MZtbKE|zDv-_6b@kr!KC)|E1RFY#(9%}K?5s-F_vS#xHkgaTJ?gxY zby_Y%yQl<`iZ*C+@U!t9U5t1GTkm*qanAYbf;M{82)0U)FNBn*;`k@ZNL9+PT>l`9 z8-?liIb~!IOBrCPoot&z*Xh!8W0G>PHq`)CmnR%8PpF#(_0ch_wj)sC1pdn}f64#- zSN|{XKD^J#t)~dq;zB@U=xsx*rZ%OrLPhE8jntq?V%o#Uu|m~|;VQ*yf2=X7=V=Va zBzxtHrlP4EYTG0muXV${)ta>i{^`H?7d+@Xd}Fc4C%DaqIs;mA`Kd^+z7!on=>oeE zqDl9)sQu?aDzdLeotgl+47`^3RI`25a!*Y~UDs4ijZ~Jc>oCS}adE+$Z@Ht~d8!EVW6H+**sVk&}}X z9^8AE=vKV?%5DDSdtc%Cr!AY+87Iq%w)0pl_0fXXJDNr6dnF0iCoJfL4p)uG)0pnj z$Lybk4<=k2tp28g)VU7dbl-;=#sd!31XPSIc1;CLJ|^3Xk>bIzoXpkc0Or1r%Vqjd zm-tl&1M=4yypQARFEs(5d-r3~iNETe90HA(Z9kM>RZTW>%6Vnm?gfW!W4Hr*V0-TR zSEci^W1bYQmTl8(?LG_FgOi8A?RA0Tq4wuGkKpv&kHT|X!g!FC!l4=80TNvu-|jsd z59)xO&h(Rp{pWgj|1`CGW&b|CR}R;&k4~6jUz!Ei4`VjqB3x z_VKZ5lRC!Z)3W#wX}u$$ERUBw_rh~L|JsYty-C>K1wCWk{*t45gKr;zP0K)&j~_*X zfvlYB^N@^&Bhiq(n$V9Nq#D7MLFLtN5ePmhz^twDYVb~z=i8GP@wdKC_3XFU#^*Rc zvj`2=8#)J#ZP<2e@E#vpG%Ho{9fTH%o}e}XgAlWFwE%~N)+8oXYVQOpJ86js8Ui*% zs01zEkBwp7wfGoW9Npm6S6|~BuYVWfg02l1scE~w(ejk-`G(kfV%O4cw;8B*c<<=k z7VkT{;L}p|{6~mA80jI&4p`lFpc8`I0VPGr)+<+M0M%UmJwy-F{T-<%3%H#gSL~Il z*{SDqHZs%k>3ab?bNdy=Vw0jbMvjkU!}W%<&5AZS)S7I+Qj;3bnBGBQ zQG?okyt50=)C|f}JK8=6P{rj$EI`G3?q#gsw$~dV@Qy- zX_|B|rRS&^lWdu)sS+$S^w4<>RR{1m^cTmUm5}V18jGzf>bjz-YL2R!+SVvS7Xs(q z1#J}myMOvWvauDes&N=h6zatZq9H4Z6-cW$K(p;ul5JH$WKg!Iep7P(WhUGEbYB66 z$K_w3ql{ql(0>?#Nn@z$hPtl78iGc)+buo@-g@UP?%jVkU)SKfj(S-WbK6*;>W%38|m3rBS8yPPz+PvW*LmX^9w;x-`O(nxAk!ZjvMKMC{UG8j7M57XnP$IZoY z9Uk&Yc(QP4lzAms{U{DlKa6k)7JaBe4I(;PLbD5@RMLYvbX$k;sIwb~AMknA<=i=a zvd3VujN3=?s-~q=#imo~z>MRKqjZh@6Wqpt zA-8{tU$=3_MC<&G2h>`Y`xsQGC)R>^Cwf+7-R4n2r=L# zvOHPv%$=J&|JmnY^$Rc$&~T6K_6?TJ7NcwGTJb(3+LD!+;uewQIE9$TTncH)DZ_7) z5^4-=($}(LBT^ZIci9b!U7~u-CN8l@FHqh3eNJEe4iDNFz%2m7detSb#uzs1HR>I~ zZ&BY8{1y`e5<3VkIa-N<5C^Clqwkmar~8xOUddn_DOsaNtawDKv^+n8Q=#nw%j288 z{OafU`ZvFW#s$F}hz8#!$6lMWHDTKkwk@IUaBZ8^s-eUAj<#!Yu1)H%k!@AN06NmX z(1X>qeHX0mIiHE6I-t^njH~N!0ieZL$*xPi0SL|y68debJLxMm{SbK6$??;DTh|dZ za(a5o3wK`Pr8_TiygbFVj<5}EHyzPyHUr@aAtrmeJ`kKo>X_Yq`y_y?*-oP7HarqCc8CMaeS-F7cVKoosGRPbd%s@RCz$qqG@GHA z?w@P-#skemgUKmyJ`7a%&);)AHK{id-2tTICHyHr31VqX&qZ;RU?K#z~{g8JX=6};dE(3OL|2Wuc2=rii5iWl%~2n*kCTo)AT!xww3lHj3;#Z z<6}~PYl6`p#l=Y5Ikd4jjXbr zI4SoMMs{m+Ic7@Te>Y@hE2H~2bzW8SQJR7YR88M2rodK#SXQ?n$&RWB$>c$esgwO! zAC+y_ff0W3i#NFc;Jvg`G`9uSqUzf#8Kq@clCs;cE{>}*lh4pJ-LD-7VY!`3sI=Tq zLB$fSP#jm4_lby5X{v*@2$e{3LT2Ig^q8}YGuG=fj_be=fAEL=-shjAy|{~LhkAnx zfurMN>P5qPb?NxmOpj|)uRua~`x=iav;I-APjHx=w&`BYp5$(}Sk zPQ1Hd=lx90^+VrKUNZq7RQdU!SX<$oN5x>ILe(MGVom8}q_=+>&ZNe?OtgzNJ9?$@ zY+XwC^m77Od#CLC4MCYXF59OwFgUXrhu;MKO1(g%CZ9+Jbt7w48?+kQnk3>r{W! zwf8%O31X&n1Z2lU`&^Jb=$NlxVHD^7F?M8suz;#^o#7cBx~SuO)GNZJ!1D}r%5RBj z`PulI6T7o=t&YLSg?*o|-1$A2@6ljmZ%4*)_sP!fWxC$@Iz!xj`RZ`h zR7S;qW@^()+o+P3W2Pl#nmk5FA=Ozyf>K2=K?!P5lhg}lQSC{3BDG*8vUMG{5)2--5Td7bEw(uYyMU(Q)4%n*y#9wjfLP(3 z;L{pjtc%1>iQ6rq>*(5+;98vT2+`w1w*48h!pvvKTAG&WMtoL@6<`|rIwAS_(x_(YtUDg!$R$vjCcMY~L&kbk1RO z15t^=*yL;kv8=Zno_*#yUViD*+p zr{&b4K+^<1Q$Hr`zSc&7kD^X2nUqK*VkAF1jIndXNP=Oa`8YLc!Xx)RijCN55Oewc z=-(rg38usE&M^6%%bf##j05rQ-B04|d!uZNd3kqcFMYikYRe>DrT&z*vZO?I_YaEG z{dA4(rbgWd*P(BN;{ap(35P5U(3FOl6Qdf_eUq5)XMv6R{c0*Y-(l+tmB@O%X0bE` zU32T`m~VdLYkc!-U*PE*hW6|Y#BY-GJm>K~(rzQ$PT90d+ZkM_a6Yx1(L{m@F($9& zN=Pf$kUqVdC$XS^8|3GF{0!#_*xW{-At|?2l1e+*>!_MckBJ~YEBND};*Oe@`bSOU zld5Wn`8o9wq_TL4Y`iC0*!qsM)tY;&Ra$zzs1ak*xdnP6y$K|1EhYok1fz!fQ-Vb@ z1Wg{=lMPQ(%wb|hQ{O0;la(r6qYOh7Dg>)S1sTwh)q`dEeXgI9RE(9e)Yf7!)MBY@ zgH)DVx1Q$c=!D8PnEHrlYg!lChQNdMhX45E|HMzBe-&p215-4jI@TLU`K5B9UvGr{kYO( zMewe2)%38@nz{$CQxgp2x@t{@DRz0K6o!=79bzp(gnGG5HdQwpTIXq&HGluNKViLH zB_~yqU?n7*!Ud8J&yO$`aflh7E=vLR+2(f!s5aL}BgyPSn#`nkSY?s)uC|~?a3(`l zV=)S~5td>Q=eV(GFhN;Vsg9nU9CQETKJDg=+HU!8|LY&}wJ*KQ`MrCbHsEumko1Db zZCe(mBKm+x#8yS%G#2wWOxj?S10=i6*wC-j2|05t<#EPSubz`~<7Y?rAM4(+=# z4-A!aPmLg{;~&w3%9!axB9m?7^u;_gzjOUZe6aRrmSlHdAsLUNAhC3uBak}Tzz$%hxMjyO zR;`YmJwzBB3Or)ouFlWyb{RJmqwS{5z)ZppR4t!6`Fz6krtqsX#(yZS1+X4c3?Di_ zLFod0%;dPV-3SElQO!#&ZJn0xhupch6&I@&&FKw9B3rlSi?6-L?aw~T_U?~aH0Nl% zi*OI4=NMWvx-{t(1zTqLG)+2<(;%aJTkucGLL{}l-X(`Y#UW#F+Z2O(A$kyNaB;y( zZxW7vi{_cH<4?cBD!hbu3xcoGOk?n9^l0c%?}*N!u0vx2t?C_`)t>`c&0sQvREd(} z%1X~-_YR5p*7Z;Y5!Ra(i@HhauNr)eIPdw&@BaZ`{?_-|JlIkji+2z@k9HAtJ}Fc; zTYR_0J4e?gXH_nSw5;8=_>jERC%~FOYH>)FlxG>d9BeSzYHnAqJE{#1l*)s;4(yAVqmOQYYqoh6Cl2r)En@rg|-USLUk@%lb#{NsPn2?*Aw{+*HmXzjroWOVHdY5qg`dL7>yf+3JFOXXmu8>zyr? z@-%s1Gqq)!b`GGffZn3~E9aKKJvHj+SUdS$98Vd|&Zmkp)d*q}WVN<9r^+f-V-x(- z6klx{ntI92r*6^uKwT|3xp9Nl#^G9rQ^UJw=lqAi{xNUgzt1`Zu!46Gtt9oNNs7fX z<{1OVl4rxNVwHTX&G|{?HcXWF`9ntP+FfT)T5Q8shGtQ5)YR#oi$QG7dFwb2@X!C^ zFL-y;vXP3IZNXZSsUI7``)WXTN{OZY)Nq?Sg>zCObrJ zo;Q|cJGQFvA#ikj15;J3w;R+XlNxXS{O4S(S1BLRD}s}m9d`1uCrFZgs45~@O=I3( zkaXZ&$-Vbt%0Q*qRn^|Mut=JPRsu`0*a+4Ni`u6C299=fhQvA58Co^!0|w z^NiwDg;@B_-b`b@UO8WtgMKHbuz3nguLD5mAnWw|PWfB{J}(2ea|5D7+ve`^^th|S zlS0`k{QW3G-Y1uSeq$)&_thf^TPP3)~n>CW{QDAS#0RG?;!pR{2I{~)FB!Z*OmlUQ(Gz-wuY1j zDO{oq^r85+N-OKr4}ox}N%Y}9&Bz@eHJ z{>L7yWmTl^s{P7@OW$3Q!9h`<{vP6u%OK8{$$0+|2Yo-T?{CbR9M~=0y>h)g90rt^ zZ9jB>r}s0;)#n`AS76<4Y7bACC2$(^{VKEbrZWi$!Dj=IdYOJKz2qcb>gL^ef!lF_#&RK0YU=3AO_0PJs2}$)! zsK+p^2U8i2G8U6e;OYp@mE*=x)ns{x$?bJbQbwO*SyW4o zk55@Hmsnf#!ZUX;RmFpg6@dz^8-Di7xA@B+|Cl%5dyi-=X0d>(Mq;2gmI{-tK201l zkv=W9hpgq=DStx_F(ehFl(c1=ubNgq8XX*iVGJq;j7>H=tBTrKj_QWWRM>h+py7e@ zTtwl2`M3X?zrXu7t+B9J(%1^8iiVg>He}xvS2>Xyz~sIoDoB&2$c!m~kxkg4>`ia0 zG#!)7D3rRLCO`+XNFsuBj+?ii##A*I>ot+2w!U}o9&f+>Ha-R*j_jXiGj@{VF5}F8 zqCbBMBwM!y0+)K3Kl^^K*gh?3o8rcokforgeJ#Y21hMcqo5Y zmB)4VU3UMTBs>b}e?PB#-SEK!)$z92E5CLi2xMD-XN2O;}y2V6?MxU0G76&OYgSiY?6IdE$ zP)hYR83NjzPJyU2Jyi7x_T~YtjWv-P=Nme6i*Vyr7Pr5G-1=Qs@j1Fp1zj4H-~$?B zTISugMAxCgqdp*bqW2Iz5`0<)ry(zeP0Q!Ub^;O2@G>hHZJ_Ns3_@cK-Z@;`VXXzR zL=if#939`}%U}H_pZ)xoAsRG9T<1V5qEmbu@Lh-BcDQzv6skT$)ox4Ib@;4M^}b6s zRSCVitOq0`dx@$_42Kk}16VC}W*&T9UO&g%XY1e<&)i%+-l@N(ZPNj&mQ<-KRbJwm zK#xIvYWtqO{T!eE^sC&w@f0G$_I%BHy~S@m>J{I4+_ptTlFi4Mmi{X)4W3DWTBNLm z85|!KSh@%8=E`T!@znftdYv#me?E?@@7Gn6V~_KmnyouCs|Fqgu8z$B4BO_<*S?{>e{x z@8LQ2=m={n#MY=lZIg{#9TT{o_6ll zWZ$JQb_`X=%m2+dZrj)A0zwg+)vE?uS6E3aPCD<2C@y&3dG9^me)}DQMyySfB&BcK zPblQ;X$+IPH{?ktpGgfo*qH5)Gm>oz=SdurU@DqqqCmu8Oq$`f1PFqWfEA&!6-!%V ztsn+YZr-5lI@aq8yg%dXzxP@G;SavSN#j{Re8A16LE{!tpH?PG5;Ya2J-L>rdLJj# zZl8pYQg}Z&*Hv+R*yE$C!iSZ<-#D=P>jYIH5!N*8#ZL(trO8;x-(^S$4!cFHe3e~|0;p$TzHae zKgzj}1OCcDNiwi11JA0qd1iYUG)~QA!0`MXx=I;zK6Z$^F!!qb^!K_X_Tb@<*5%u~ zZv0^D)1$tHB$v}Lz#qbO!N+uaQWzCDFx&^D^h-s9i`2y#MvRC+Rn;g4r^>2ZQytg5 z`a5@c`cucKdyBTaOI_Wk-MmQ^))+RJ=#l8sii48YSqzJ~#ktX_p-sctMC`80r` zfLK+m3OGU45p1zL23Bi~8hkwF%sqv<{ktrm{~Gbe?{ML7v0fQWd(5&r#&sLiw?yZO z8LX;LCIKY)1XzP722Th{4mP$C8hvsN8Dn;06g`p9E4wOdQ4NHsY+Z)2V$%{mYdPOI z>Z23>@H;=?g_k}<+$yF5zYWyYl5P|5&f{7~yV>HpEpFS=ZCiYB399-wD^?RU?LyZp zQi0y4>YzGH5QI2|sB?cq-MMc2^C<1qo{h|DT`nMN47^5g%k)d}$9WjyY+FxVEwETt zt2MQ4xbxggy!_(JJbU{&oC|C>+oV+OTvGRWk8>Sf({lW%o~SN;%INx%(w`h{7FA${+F z|K84|d%CZbF@qj-2N=Sr9T_R{ck{Fhcf&NE?D|#XG`{j|r1osEF`7(oBxP*q&q)B+ zkdS-@5dsmh22%-99acMDeDM~4{DW`u)h~UH5YE|Nyosn!rbS}QX5+9_XskFpTjPS@ zRS3c0HKGwhG{lh8EGDZ(vr08eZc9^LEv5@}>|n2lr+z4}koHT4u4G46F(y0fs?wVj zh~x6=m9J?2%sbBHxqQzgKpiY?G^)D0-1pevJ? zJd9yzImhHrYXniv&O8T*Dkj;nEDnSO>6dF4pjzU!)*vRC%&{ifw5*KKm;^i<(UcLt)4 z!DF!j+uOvQ0j?pR8~t<)hfum9*-`Di9(SN@W7I z7#7wf$ZskZiz61xW9~n^kH(HyUV4gu^rP?a;_aIC`MaDh1uKEo>H(*xr^z{&&4@^o zVmSg*-mjmiRXI(@R6L!E`yWlxytG zyM(LCXHLnmcaA<`IbQ>;Ob@>d49=Zb(w&wf4a+p<@-vNdx^Hj0%)`(A*qQjQ0-V#l z?Cd*GUY9}Ey*Os#KXmMM;p=5-dYo|8H69o6K56(MUkr~@w&M^PfM@xC8UQ9|O;I9E z)8zWdEJXY;UeX`NOZE^1`Y66B_R_is39bfOJK!N_vN+92a9#WSt18ykC_)G%H#1@g zV({LxaUJH!^4b?);pTG|b$5xphsL|Cw{LLVIAS=*5>sb9#KEsxB)@2=$C?K^subP9arG8Ao>U@2=Mm;^SZEoLOeVwLhnjTf{^V2JZa}Y6XHXDpu zj*d=v@%fke^rv6pWO+jL!gl3ow+`2O2%2rycEsQi5khd;(T*n&^MJOrtdiAv1)gPl zsA%p7WV@B6E{~m9L58C9OV{Uq&-NLvDCeu%)cyU}Z$sveK2%Q*?khI0AK~0NFgo2g zfYI`OzV7VBKLcoY;vHX$2*vpm+J7dH=|_`8+B>(32&%q+N4J|Twu+n{8NT@Wf511t z_78aF<)@K&4&50?wdel*dqk&zq3ax7+Yy5hv`+RRW5fr==j$Z+p8#7N165@=tvUk2 zx~oPVLsiY~TYAoRZ8LjK4(y73)u6lWNKwQm695@Pk)Btdq3XsZ8>>v0SU;o|T@i#yHDXl2g@d=v{ zlC5hIB&$b_G2qjL&(bdFNPu;k|6Z{=0~dGxOi|b-_*#jfNg2zK(jZkuRX5ai&7xUQ zHw|@FBUnsx%!P|=)bMA2@vr&2ckkkw1!8I*xR#^(IGGNL8A6MsIs(~2)4s}h{Jn1` z<{)XN*##2!c3>x;<$F=A_Hkw?YsG*{Z|B!m6?M~4H8q=dOTApM-fX!0)|U6ia)3+DA&;5O(Wl$w_~0_QM=h&U4?xr^#PLlF0*;pKXfWTv!;x!U(kpwldU5 zOKe^7?)`UJukQ1O*Iwoy{_!_>;dVo4-(zVVm4V<}sw(+vNsg^Qiap^^!YARQ9e$(0 z>NJc&*T*%a&JjpuX}x39wj9+J-n%q|cc5V`lU`D$X;WUO^I*Ro@?&KTU+70$18}jX>jb5dgkcnl9zt_IZkeR;G7WOrR#n{aCfQX3<({z zy402yhNJ*yXg`a_XkrvMSKGWHIsGUg(Bx&<>B%2^mlZ-(y0}1_7hw5Cnisyy%6^7b z_cZISf?%mlL#Il+U2!a)=(fq0X(-OBvg0T3vbr`w$>iWFtGvr{SLh)Fsu&HR$y`8j zZbemtLeNMTBCgxuyyvNBUgQtI{|~wK^d02*Caku27g$tB_%_n5TU_VyU7+hW__j+9 zn7R(<+XVfB!$p^Esb&}=kx24PpVF3>>1tBZ6$PtiM_Xf1GOiy5tRAX6sV%>%g}5A; zmHT&D{k#mUhN39c-M z^gztuDH8CxtsSj$0d%~aU554+O4~4MW6QHOR+%1zh(o-y6V?4}@bvw2c(NtMGnr^N zmxIh*Gg61&MYE9dioV9UtPaJ0SzSn(n$*|6|5;R3yXOvy<7{iS)W066j^KFSu8i*O zj>6R>=VCIBztln7-{(-`QBN{yQqt(D>yBGD8@~LzpX2-A{W{OyUeK-IL){h$Ywo{y zKRXSytX7VT^_I33Vl+6fX*qDzYy!Yco&hsBq07%n-^R!C!qU|CXBBGd(~iF9zo>(4 z)!omOmpB}n?5^f}(nnd~tAf*PM-{~*$;p<23!aP3nzPNCHh8EkniX@JCom+BDI}L` zc{U1M+XJX$K#C-lY5{Ep)=j`_vQ?V7RSzm<=XZ(6iXvjDB`G~?NpNyu8mv^*Rl}k= zN;XxGP7+kD8=?wbh-{ql&b|Bm^-q4n&)#|iZv?4ow%%i#1u8;SHOb+qCS|Eu!4xm_ zA}E$hvVGO^ne$r}+o=UMjv!;L)h`1w2cSgV1fBaE$Z>y8?z#9}Hl>dVP+(O5R^!o(?DE%#*%O&KkZ7n5wQ zj?Em5;VQ=Vc2~z^(F8+N9g6~$sc4!7rm}RwbFo^nI6mV3{rmjl7r!71ES5{W_YebG zRGX5@ZQN3eNUwUH3kPAp2*tK)c1_lQ3JC&>NfUflBdA3sECFx`S>J! zbi#)ri1{S!hu>JRdZ@AcxP_oebxBONVLI=)aeRYq=cvV|ev|CaJN2&?vyWacgGJMF zlS_^n1HMQ8eGPawJ@?S}>3Nqyzw4Ycg_qN`Uk6McigOOi9*W~S*SjiQ2a-;Yy9(}J zwe9@~*NyjA`J$O?Qy%r&kDb=ZlF*)0iGW0e!IqOnsH`9|3{;Kocbn34c+JZ{Vcs7V z?qAhD{JMs#z{aDLxfF*~&`)^v;8y@ObWw4Ur0l3FTy!`exq0K5=U%wMtrw1gcWE!) zpljcvt{!0R8jUMVhPH*@7Y5f)jtIkwic$R=XF;-)7bw6#MO65JC!~RUuwa*TRCM-v zs++&d;`X=L)W5~XJ&W@TOsv5NoO1;AESH9`+7ewy3`L=u)Ts%qc4_Iqh90&`+=UF0 zWb>8ivg56Y$q>_MKul7Zg{VX)-x9Pe1b_#w=OAdro6(tTeRi4pGBq zwZS<@be^v3XxlB$C8(NIs*Wxc7?_o0XtJ-`n*u0aiU&nq4`0TLyBR1s2Uh3m+@Ub{ z9-9M&hoIct=iK+XzZ4AX&6cO1dWPS6^);S-=6M#)5pC;OuQx;=h%P4QIbBk!BFS!^ zh|u|fwL-)vo0BBI--`wvh(4DPolX9BRd!X151rkWr1U^&(U_@#?4UAaR3s7sPJO#pXViKw~Uz=Xr2;M%#g!Bf99>wvKvnLf3T!RR*e)-i?Wk z`bnP0P*_2f7)EW`0h1u5{n%Bsriq!@gJyQx8AfGU99P8{lcU7EEuyr+qt@Wn^YHwf z`xj?yy+f_RRu&gxuTq8d4v2Z>jWs5N#eFbUU{w#;MoPh6$vFNu0;|$PvWW_G;W(ie;50R~NtUAyAi{bX(Mdw1%LLx|2cp2#v5!aL7D}vPtWDi(J_AOvDv{?QYtH& z$DCfXd4SO~br7&l^C1INy)6IC)QurtL(mM&b6u*MnyRVs8rg1J7RN{Y>=!@hy?YO^ zO^t>?*L6r`5wU6fJbK6Vl@68q=6u24|h4x#tptN_rNoq?Hq@ zsjp;m{j^r7s$|Zpsaf=Q?Nh3G;AO`meL^ zv9B!<6zVED#aJF4vD&Oznu_D2Wmeym&S#pfHC7vgc%JG=fWNk?nn3Yvv4IA$wt=A z0cbeQ_m$7d6rRd>z`6UGuD_qConv$W6?^;G-8UCxbb*roDWIMkAV2E%@indrk2AQu z&cLvQ$AztPdFqvu2huc~;&EE9xIe`h{@i4Ts^(=t!(eghd0Mi0W$!(e6=L)liJYDu zqjB3S)>M;{wU4WhXHv)W&p4`!xp~=1=UiQyE1v>{`z3fK-qQTcC`QM1?W$SyQhpF; z>yMRPmCvE}{E)C(iY>Wup2qt}-%DBTT%+%J$DK*4Y3Zw`<>&0=J)OsH3ik3bm$&k} z%I#ZOLLOBRvB~ybR7}+nBmt$Mf!4P)#}&`K^fXU>>IB-K67((-?@`MG@b3W^G`WqB zJ|#`k%O@>K&G$q}ny>Ud?AW9v4tD!cMI*`9Ae!vIDR>1e1XE*tMdyy$RxhA8zJR~| zI&$kvJbZYJ_Z4)KO%VtZBDjaNVS{l2^?~R-K6J@uYVgDiStVw*S4@s+qV$V>lOvVR zQRRnBHDEMBO^E?9$=QX)64LOS^R4IkmtN)@uYZTzcV0%j2G@bL4bDZPPs`HV?H2Eo z1Er9`YS*>2Zrd;YFU$LbhU8c&!;4~T6$UkJ*f9|>Ea_E0|K1wv%wY&x>fxbnb8u}R z;`yCp4gtAoeC02Mvhqawy!B974bMG$hgV*Cl^36X8TFC#hZh8|Xoz&#L6ycx$bc!t zkiogn&c8INe@%u0QHM5AN`8v^aZq;_9FQEE#ho^?p9D*d0hhL6rGJ1jDdv=hczOFb zw#}N#Z0~?+j63~@y>@#tfj2(3KYsKa@1Cza#{j)2_3^Pg@v&cz#_NYvwYRT37e^R7 zxSEM8;&=AXJGhpiM_!Rq1xCnv}J-tT>u zANVTMyTy6%!O{g~+qSq^p><8`Lt6f?B%7xU6Cue& z!sy+uq;_j3{V`7%1VY?h;-9RYjNgl}W2ZIdx*gLPWPqpiDp`OKlDBmQy5JKutZOuQ z*6oI14V&$ji}i|!>x&+=nyOCT>Z@{}65bKXOUlP}aP+-brsfJb{@nvsP0CZlNaSsZb6dV`4JV$%_gu-ZC) zcK2=m&42uV@M4goBSIdF2{zl@tgw>o@z%y-E0gQAQZ-FVx5>6t%>a;d49T9X$tuQY@&6_uAou{d4>gEWw6f5BU47i>gO z+hD7PDnz`GSOd1MlXFS5PpcR~O&U{Kv4bt!nLi){VY3HL#Tc|Wq#Bihm_em$Ow~hH zW0Gl%Vk=%ML97Ka*s4ZESRNk{P|hBlQ!f|%{FlGr-u?Tmw(H);Z08;7Jyp~6rZ0M! zE2b}d4Kdm8E#f6jiuOKFc|2_qG`AOuq}4e_dUGK%QmP{Cm@`QAE>c$swx28)n4qX> zh;>7(YK-x$@84yy==jG!`UAf4mCxYY`z&jZ7@-S3IVa20+-j5EWD(QboKAB#v0pJX ze&T)=;mUFKW5)61X?g#+&Yallx@kGY&OQk4^s5X{DvbKD!0i($R^RU%_v=s*e$~NN z6?alJ25{mR1o-H;!OZ@+FTB*btqfK7)l2((=CG zK?BKNXHlGaiv7;FdFKT#6`J!l= zpEg0tplE=mt~hFrST+kPu^cUqdHSj6Ft+CCV_Fp)O6vk!WBF%){^$Jc!HQKBVg_?2N`k-$8d8EqglMFnI5kH4iI*~l*-Pgn z4~IU@2&|TTO+RC)o9T=+_B94ERT3sO6%pmu&6{jp$Hi(zwP<+j?%TZc?z?PV2PF=P zz1SvAnvK$~88eQzP42joB<`|rF#B`f}$KmIm<`1`+uZr-7)J;ucJoE38@yS$d7#xLm9C>UbDa;TK& zC*hOuL4^-`eD*)7_H>fqtLKX&q2(i_L=?9ZoH zlJ)7`&1}DI4up=&YYztR9kUN>=fLn~(Dkx3Ob5LCVEXEN`ltZ)QI4Mj6v8t+m27eBGTsJ*B`8{{94-IyQbJF*HMdogeR_3oAG6zb0d)CZR7TTaO2d9dn=lv3Jr}@WlfBKH z53dm)BSBL~zS9mWSZ^NE91E|$`XZ;dEu8<97~X+!7pw0gaf8Ga659c$_P%)%ERC4n zSxRq$Ku7N=@`{RRvSF{}7z9Yb6VRBfC#oh@MX<+g!zo&Qiu$Q9v$*|7xau`7whh}Z z&{T?OhkAj|Ls+41jkq-$x};vrDo^z;!-2H)TQnvU0X=*e93&OMV6g;s7@L>%`7{uT zDtI42D!_90-TS=s>Sy_b@Baz6pM8cb)8pr{>OeeYywJp2gO7^zT zeHLZr6mYfe1^^LD2!XEkR8_;BXJ6n`pZYX6PM#tLc(^)av)baj41_{*F6O-_W;pG$ z^RY+-0#UMxPqI=qT{#Wda~5{I$WNEH_g`aS7ekpHoYlUn!I|1fHIp))gSY)l62|Sx zfr+u5_zvc2{+vVY|Dj_NtRBAad`^zL@)*^$0&1#g9oLzhpQ1`l?b0Z1>_YPL8B07l z{&Wpxwb`U)>RKhWbaVssXc|z*W_3Yb2SRtwXFmNrKm5^m`Rs3fn#Ceu;ug0#quXvN z4O_bnY&IROQ`$~&QE|c021zRkkfhc}F{4!`iXtO>&q~N0oRKp-9pET{hC!*?FYk}p zBCBezWG%q7s8ORrj4A%1422M33|tYDY)fmZ^G*~eN*5zBDCe6kXX_2?&S9(UWuEkY zD0V~9VP)X}2^DsYH4ViCCj5z>gEVjHLP0CCU}CWcyO`iKm67I!~gfwpAi=g-WWo*_iAm0$;wQF z8T!5mh5?`=W(UL>c9p88EbW)1v`uzY(@GCZvZI>*OtPtpVys0h7;CBOnrgA2u9qAy zj{%EQLlnzJ=UCzRm;dJ9^7n7Q!#NEsj;JKP<0UGKswR@0JE=`jwWOCmU1?eQV1slQ zqR#z|VQB%XG6Ac0;;@PWq}9+vRVixMa!keP=_y<9*=)B+WqI%ZJ>GizZ8ntAs^ZU)@gpm^|h2mF;_5@P3iHZ?MeNf?a7)^S>zs+bCKhwp^gse zHoWls9qyl>bMyHZ>0;pB2k#R61%L9rFY*0veU1}*feR~)t#KiuqZNzeCH%~-s7JlVWq_*(6j8EbFE2|ohG^0<$9oUo;nq`2 ze(SZDSl&>ydm9(dh~Yh|a36^)jJDa%D5+PT%#8w);h7l?{x!FgB^~KA*;6%$nzX7~ z6l0Sj%x5(g`54sTmUTw`@EzzCg)WlS^rC3utQ!lpKPlJO{M{g0!E_JhHX}GNP-1jm+G1^gecg>f{XJl zFMs;C`Qe}bW144PjF))u%GCta^hV2TNdTC6o#W2m!YwURnHsH&ILbRO_0c=O%&`1gPLm%MfF9`(s7F|Y1UV6e*2bR-~%nwRhoj;Yj)fa=&* z>?EJP9nx$9X>eY(>$obZ{0mqW>Uu%bG%T7WRo!5k1tFSbh5}fr@IU{nf6dSCzKyS! zNZnwXB_@LJT>t(tl3;P{Vesz#uw1QFolEylzOxyJvh;s?{CK=$sw$NodCoR}ua^sK zm6r6MuU9~1z1i^dU;KitOSV+2s_Gp1nROr>J zL3N@~ov3&fd*+g#A8qubu&JKy*MKm6WTS;~sl!?!p+Uf`o2 zR$mm=X=#Vcqm|p|0#(iUm`{|dABiv>*L>W@y&t#qUN?N~!0K;WxUAyk?h{RA@y=0; zaCCgk+1>YeaCXM6lVfT-ykJ6k=}|frdEUM6qs%X@xolf+BCv1l=K(8bn0?&^hm+qE z063`a2F2$byq&^G^lCUcPUkcf1#FILZWZ69>78Ep(D4O)9}0WtPxj5_fBJoT%ilLYrkeGF~u7x`m!uAcHrc0f`7U2pRIr4m1hf`H&SJhipJ9T#b&htKR+uo()UbCrkt2rE?ah3a4+vVSn zvinW;uZdL1PR6M4$-3;rTzxF$vE88=pn*wl!s zRp!j?V!?59=$NIz?Zw5fq1^$n`_Pn8s)jR>?_HX&R)vPp#5sRB?x1n8@nnDViz8^? zR~3h|29zS3(y9xfIFjIqzc7En;Y-L}ZI}D20v{l`6P6#zn(m zYJ@cdQPMlp8s7@R#y(IrK2TLj$e^4LPjSxAlyLsE!iOd<`FNqV4;^9?`Cfp51{Dy6 znxT;z$1Qye=biUn3bT)ZDpzbf^xf#ke$7tyX;>)oPV$wL+~{A&RR>D}b2T zMtFr3m3eZ-mYG1HAAgzh$<1aT2hr7MMTvyCW^61&s>9V0g(2; zv&u)R{{2rS-;?$eE*CXs$3FQ!*sTNB2D!yV-Gs}4+8uz5QK6dq`9$6yTza6Bd-F{L zg8cKIe^+!Wf89x*&W&-beW2ClS#XyN83Et!D!*NJm}y(?M=o2IyeT}*9-qy|-SBTJ zdyWEXkxBYCDvCv4Sr|tZs!^F@!4c?)OaAn|y#4LVfC?@iPQJ=06JcUYwHi?=SE-aE zs*&%hYAnPN#AxF54>~xE^({xNvq>-NWQJDq?>YaK_FT`uPvnDBn%+a4^T(t~hD2I@ zYMS0Zd{?pLGeuHmXYe!Pd|M4auGku^bJUz8a=zzuC5jms8Djt705xL?lTa1#{i#(_ zWtg;-N#9p|HD*(wnhRDN7Hi6djSUr@xyw|tJEzmEwey#0r3jr5R*Qk}0U9JBWT-TS zAfymzLKV`XN^}%E>6tZ~uFf7hJG%*sB_bD4jbcWsF{R#Kp5F2+e)jBh7_D&~CH9Yu z(9<{DFYuTT5p(}JMb?5KzhILO4#S4c~*$K!w?2>k+8 zg^*%cqNCVBq2vR{a?R4!+sjDJvUj-54<6gh_Fem_5P~k^Q~?uPjCBpKmC`O*v?_Uz z%T<)7;WeuD@qDXrH6NUgs#t9blbdfd|J*s3EbbJB1ci{WSj6doz5V-rTfIt+-)w!6 zN~MA>_;@5T^*+p6DU@?)=O74hHrZ#gu_uqo)-BMQP0ga0L_ zfyh{9&FN#;?$;=WZ=%rCi%u%j{O3jsTKlOrL0TC!`j^{8_yZWPU4S+!>}wI+rF&k~aeXDRYe_pBPpG_=OZ54c`&sXcfwDt4fE;ya& z^D|y>Ihj!Q_58fmc5j4mwdDul^uwTX;DXlMrymIME2%4`=qMFXI`;w7KYtwIGg&d<~D%^}%Xx9j5kKY;i98;#S-9R34J^64UQ$u!ff zpBH`(BbwM2iQ`VJ>!zmXGi%|Q(0dA1wU~i&H`Q7|L5E-swMrQqRd7)S8&#oJBaXo( z3qLt)aVGZDXRSpgy-JlczLLu()!dk*GBK(AO15_{31zj$7>jidRY(?@i6c-U$1Qye z?>hH<3UiKPc+UXELJ!u4LFS|YsbH!#;!2fjtwOb0^%a&?AF4)C6>DQ39$MdT z)rTN)(kqpQ#j0?+DQIn6&AT~RYMx@>yg!W>tU6b}eye}~;{|&8#g`@%tfr5pR;!>? zKu`B97A!c91;;L;yL%RK)lx3kC=ZPI=PvSnb8TEBj%(nOYG@l{iLuyZp(CAzZArm( zOMV=7)Xzr;fK5GAo8Dv(_WfeK>$eS1CwSYQ$z+ z4py5g+_S0vwkb$%^@U&D#wHc3aqhOQ_3aZ3j>yIsrLdu>gLN;{(KUu;(LK>t+Mbo$i94qYN&n4Sx^B5 z6;KL83SlRG-E#?aiSDjmx_W2fER<^z##tig7>Q#ZfBbQ_?$}AyIgC=o1cbdkRE)`b z$SRdoaVj4cs|hD@ExU4VL+i!qN7-#qu5EQ z)Iku2xS&X>SYY2sjs9B9{SQ6D_Sg2JI=To8B}U>H9VlXB{BsoqzN!|8N!lww7B;4j zQB!}cS(w)%P;CxN^Py@QtR^=;`nvgw(d2%twKyG62tx{`B0;f0Y#bxyVNi+#g9E($ z^2?OVBLu}T=?RrAQvz=>62HbWf$;h9DnQI+u+#EtJT& zsAzZ|aD-Y>3apmkN>B)Vb!t%be=xSm zu~ssKtjIyx+oM0n4;afkZJ!jG6j5cf8MMGxc%JxL{Q@Qp*2g^F4X|Uxd55 zyBHZ5;J|?clnOYqsdaV`qg3*iuGFY7Wvu&Zbvl1O{R?^em*r6*SK3=O4el5n z7LFO%HC4Vg{475X>S57XT=JV=xzYcKTZKf;mp2ERG>xNqyLRJk^&GUiPOJMHD@Y=WfS&Pf^;fPX-LZOiLS4}T(b=`@K1sLmZ z1EcrXQIDhfHFGU4%NwskD?LCR<0i-j9?2NmU#In0>OE9jU*68dD`AsGrEL4xWio+B z^Uu=v&>--YQBHvhv|laV#ON@fySIxImM$U)%Me6RtPu_DM(cfac2#keL2v=i;0xWX zCR@cN_aM`KFx$r*1U>^uTL7Z0U-&|0;e}t6#wG;@8|n$nj~noeqk$@RI)k;Sx;39#wM%9 zH%_gM$`yiwrWzTX4sZ&FYc;}-ZjL=}2`m5L4=Hucr8-ohqoW7nfXZNvS%q#!_74$P z%0#s)m5L8l(<%Q^6cNP{k%^PVs_K=hX{ee8Al6!JoCZwkl-?vrviNDrSs0wYIHUjl zx7tU>3s$p#I}_L^$Jg#S$H?bbkqo3>6*K7N} zkoE9ry?q)?Hs3~btAJLo;i&7hxPGf}v)%Q^x-9*k9{)LO8n$hvpKFI{~HSQA0h zKcGl2(xr+8kd6pa1Qeu*bP{@%9=h}zrK$*6Xd+dlB@`iqE}@Ea1rkc=2%$&~y@c=3 z*Z2GW|2)s#bJ@GSo86n8`OWOy4u23zqi}QHJjdjth1J{rR1)inY6O z)A#ESKDO`?!=WDWJ`XYUvg#e*sFPx^z>RX98`MvS*1!a$FB>e(?4zWCMM&67i<6aQGVpFU7w3xs|#)DW*#zu)Ex!) z5)Cfq8?c|Lg*;EddUR>(q;MCypQn~TeDGsLgX2Ga7IX7UR%v&@&Bo0klO%{`*FoWMD5n& zAHG_UtE5`NT-3c1QH_mj>GN|lu<4DAZnfUDw2O2k8R;UYK-)!a?1#u=RYmdpu zIqnWZZQe|+bCaMS59m&M#fX}$B2`xtPs4^E=9$b(Sw za;CISk8F{+_G0mvU1;f}^X3oE7X_(@xky@Gj`hbvN$xyM39MHW{jiK-9{eF(owc%{ z9&FZ<^n4~O`!0;X{4b8id6IBYzWt$yk=QC~&VSB+rE~uqM zefmqhX2+2W>r>b83ClN^;-6psbOHM^&(b$VtvUH+?A{>-ooH*_Ro2&+x+c?ty)?Jw z`6x(045PPF!)wVhwOn>ZI74>}A1RYEnP{3|wSOf#tSv8zcBvPxCUzBk-)h-hub0Go@tN)_P=HJ0!faBE^7+1kTW$<_APy_KTvXI~ zqne@Q@k}Q9xj#Bu=Tob3ZM2r0UsqdmUQWiiFYU{7#T=&#AQ>w5w!$E71Og>&vFlTV_|kE zy4T?fE7MnY)3x@#8r+idP?gZ`RDCaRnJCpsWwdIG>~1ob3Vt97g~!`M@cVA^3sl4w z+YDpB6uO`RG`Oyf$huC3E0Glv>1?2fPK9&Yo^t7kfqNe$r-CS7369fB$OIA@iZD8h z>oYGX$6Rs+3F^f&AvG93+{mc9oI=mV@?u_QHDpEH=6!JkM(l;-BjqkP2z0L*0o^Ce z6?B7Ap->HMX%)<<4_wc8#zLbwA=MT1@t!eX&8F?|lfAbuUwXeDhH(neNm`WJAeC3I zx;#$#NXY)}>CMR~s9g+#?TdSii*XcW7Unv$7u0=DlaT$gEBO;V#LujYBQZ)gGJwRY zF+!B6#6jtLtfBdKx%UGq-cKa}CSJ&rfdA0Xu}Dfv>V%}?_Dja(L5Il6d-xt}{PvWB z3>Uq>-wesLSPcW3+){%rCdw$^{mv=5#SjX6=ix=`g;CCC2v0riMj#D{L0Qn+`Mroi zI+ef$CSJ<;0=><+66QEw+uSJHI1^@u+$;W@-7{CG&$<{JZ;QWP{e7wMrSOt~vTM9V zjQCFHhi~KdNA+s(t08pSk#>`z?Rm^)+6yiXE~m?OWn}P2d9k5I>7ivMo~#F*JS+lC zaTlXWDi9CRY;m4-U;MB}5Wa#uPw8aMjzoFtmnB^+X|L>*8g7;z><-~YUR^z&FW1?x zv*(Q8Xps|gG^pE>jaD*JnXP>GAx2t4hwRPC<(wjBRZ>#YahD^D)EmKczE%MKWcs-1Q-B)RL zeJwlDcKMtPwuMa|35vguqLsI!?s&50MQ4{}Q0zO3W%xsR)wLGb-zJjaCNAq2k88P# z{4Gh)P@j7H{{QKN+5gh@r|yeK?`**TxBYy#?oC|yPmN)BF7JB^_H|ItXk1TBI&4l{ zfGf}Up+;}(yM=do$1?edxcqz%P0f{?e_BE-MPU>TRF$xstSfInJta>5{xeUQl+z@( zg4UG_W0FDY$~7%RGqrmkZS7&{UnfQDdg|XVcPBx~+H3}u`P1(^cdSHAEO+o59;H1t zv8Ek{wl)=keA8MR;==6kOB-PuAs;430=|Ef%rYo`n5##05~04le_{+nFZ9boknFZH z$k%2RC#DIdtsokFi#+T+s1E+-}p&S!#KfWnM7Ld z{{BW7Z9bJ@@HCmLF*AV>bl@P;Di?_k&nAsCl$dFr4R|Un5a*pv-f4IpwLpqzfa5aS z$2uHhcfJ3-*~YgTUj)y2@`{kOB1r1n5fS>AAeie>5ybluu^l_C{syR&thCDohdRFM zf8;)Kpe-HddL3yNg-O55bLN;LV%|U35jTc(WgSpB=0p*8%g0bqrMnYe7jW5U+#Zcv zYDcs_yDNdYE)8DDNe4rR5xep!K=%+==uC9Uo+Yq!64a6i^Vrw127N=PGOx`&Mb z3$j*D{?rb&F%>d)&?jGkdD?q&77S)A5Z5%Au6nf9kb#9T2Ywl+34y=&5*Q@xe} zlO5woS42bE*GqDniRgr zF~Qb}lwP4ay`zN$3^HOahnTrmrH~?k9%xhqT0gsLeI_SlRKga3MY@hu2H_o#j*gZ9 zJFo=NFLx~h&7U3m4&V>n2=rZ4tRKN?Pqu^kvN?)|ug@(;i zCG|K22L~ViLL1l6fbq8D$;MV)?{yWs62o_{EAH0~c(2#tZhKBOx^OuO9qRctrV#aE z@5ELZt_@Rp<}?IIH`%}F693Su8 zDZd15eiGK2lql<2Idss_&>)NNl{`EgfGTQVX8=U3AvHC%mHOTD!@uK8wA!TXP+DdzP7klU&S2zqJMRhrSHYwt-Wr zKt8!HK3~$aJSdIuy!)UaM-6;8;j$G0ZKQS-s~1f>Tw=#dem}A`*Fwv|I(lWDSW}&K zDSXu};?spE8Bzkq7tA}-*$QbYyqT)zv-8TgmItS`57YRsmpUUc27<}8D=@gsc~1es zh~XxkfL?mCcnE}kC1+YSg&wXpWr~!yW>4W)F&7~hh<=Mczr(^p}$Dre9a z$l9GdmGQLVW17P$sf8ojSQ2~N)#3V(LI+$*Dw~|1YN}%%r7C&V*&t=oMitD0zuf`W zKqjz5JNQ*2&yuu{y!Ljj;3#E3=;wngc6Rt?Fg+)MtaZ8UekI1OZ}NQwh;!f>u%e&gcI1)hUuTkfuwM=EHn zN5fiXO)N3N50+yEpmF}D5 zbHf&^bwdz~=9F5gsn$VPaGaf@Ciiu9b+K#X%)VJqyKmjw9X52EZVF3ROXG>`Apzks ztRHsCYPC`7m*qmFLdr7xxZ6w=ObSz6s2?FT4TqRMNgG#Hlk0N;(+`6o~T=*q2 zJ5U7~D^rDLp8gCI=2lh2r(*B*Pqb4$Cl(}kv(FFF z;4%ZYe&BM^sST<&4=?D5I^o4-g)(uf@<4a%w}2XhD-`Q$_N&JGYn;OF9H9_0Sj_CH!O$~gMTFGID_glpu&Xn< zD%L0qNES7=p#2<B?g*bEXw6e`0&g zBeFa@7@OVh%eC18M5i6{C4{qGGJaf|zPi38dbbMR~ z_+{xJT0N;^1299Sy^2Kdjj#KTxq=7Wm8C!@W;yhvcuxi4xQ0*TuE+j`=4lm`Id|MC z-q3+9?LHD|L=2Y{LKGgl(}D{N(+5|VmH?Gi?T#Jyki<-)He0ElS(7{0U$I-w72Lfl zXPrN8@nPJe#f;8`gS9L@3pY9#oDTJghQR%a<5Q2XqKDhScXuB+w)@|0VBh=vjQ$g8CEt^7(Yd+mQg0OBn90_~6iqZcB7p{W@)&s$cudzv4u*0oBev z5)n=1-T!kMl|9*DJr6)gm+>dRo43ZCvPo^a-rXF!(>kFsXa(zc$gT2|rm*0M99pEr zeB1QfX$224l+;@YJp*FbOwFGeDH!9aEDmq&66E+Oz#<;(5$LxqX9EtDkT2c*+}Fc#{H|aQPAV{Rtns znu(`W{25*(`35fmn4S*2Q3$Y3x*{JtqfL-@}seZD1iEOba%Zn zHP@$dktC~Ll)et+Qum@LHSZzam7xCpTVsCyBWi)p8+hltMAfgKuz{GJsHFuNvFtuO zoT95=A>EzW{(vSt7kA*y^WUNQ2DwIXeLz0}*=B-%y;Tp~Z%r3CTidIh@mp1Trpol51+2ruZo@nzFchh+41x= z{f~t60p~DQ>F_?BdhYwpe>~)$3v;Igm%5h)u?Fzd}`mFe8|};Y+4xw2tlv$Z)x4e#nKl`>h2>CLltZsK%VGjSK>D` zwY=hf7~9OPa;S7ZsyG``FAjccnJ>&9cWrG1vg%G;U{Yw5l&LanPUKulMAoKaL(N2a z5_+sCD5awQvs`U=lQ1pr9P|9P=Aj<5c}p?5lbxpRTRLuJdeH32Icv4GwNca2CDxxT z7iKTMRp*{9_~`MZEr#YEV9yUR7Eu8(|MrMAGz_aJl}z}3v|6q-7l{sqVgT6o0f;4n z+71DsaV4l5k;f(1&PCGIHPgXUQK@xZzI1!rMRg1f9tQN=QpvRKZEK z_g%7%w3Rr{+=Yx!S}3BPFP`FcXOSz4;j*=vr*HE=!I^G(`TppW;8Nehby~E)>Srtr zEwOX)AoT)tKEi*^EJ2A7ICZ)nfUs@5q$9U{Lr3Y<7qBFR!GQC@`y#f^2NzX++)SqE zrI))>Vu~28bf5yTcHm@<#AO$#(bbP-+2PQ=F(<^zuxHq+Ilz<^vp74`x~Df+N6K+8 z`Loh~$ee?N?qnhB0Tp`n{~~ZC6LU!AVHI@#TcP3wbS{7NkeT&RU^ zI%t~E*|u2S&fw$a<>jtwxDou`(Nf+-D88=|5T8U$ajL-~A%y|YUWVqw{FbYNfs}!T zru92fF^ce8I5!nE%qQV%$bLfonu}>@4<-_A*0&j%%39&Ev2fDe*g*!zJV(l`nzMf{ z%#`SAwTNj}%ecGx2$K~^*15l~E)iBrMA)vf;tsEPt(u4IF)M|*hLwYvD*R3cLbB#r zF(9fh9FWFgb2~-&vD)w*PJK1b&-0l_{I|R~}F{oa~ z;|82gk9JRH$dqP!B?s(VB1ofbHJDUmLtg_!Jwf=~lzAmo2H0{o%2?fwC%SPgBHc|J zqZN_o!yFAaMueXR83YsLu>`IET6wH6 zxgjCYwaN-+X2@jUw66({S{|@a;=jqfb(&R@GNkF$biz> zJ#Wqn^cRW0v2`!p20kpi88G49StVw(P&mjx@V->ceis1G=-BsT15ZUR4C0sFWqN=N zXhTDC{q?~@&mbamQ*Q$hH-oA8#?-%)4Byexjs$kTWM1({;kgZnsh}x}0u&v#TtctXY@cBPikR6YVC6lP3flyI>QDZ zoFvlGoAbavaaNDU4^b`%3(y?!ktqe)-rZ;-oIPE6Cu{Na+Y=qda8aTQZQ%9E#&{mZ zt!oc*4hmPNdaejf-C3B=EHNuh$*jg06oY8zozLBNo@f|&0(y38x&hvFC+?S971mKa zvH5k^P?~?T`y|p#^ia8M!_!B}#asCxspx>yjF==pj=IB&Ab4xQeZIw{v!W zah2SpF;D`R72<(`{!Wlzp8;mL><6+G+_2RmaEr_`FEl$3-y(p%;l_D$-(eu1I>Ee< zGVW`SzP!Q@9c8|(@P3V8fq^Z8F1nf7u3iAAR>?QZ3bVsoKZEbTMqJjZ`^?-tOa>=1 z&XxqSUtQ*aD!xn76mqMe!v2hdQRg~mjPscH3|Nh}4P;HP9kys4hsu2e5y1T|KK0PFw%e#=w*I37iQO8JmyCw@vK4yl*d{^03CArK?Dsz2y?ZW+2p~ zY=!TwO0;ypj2nU`j@0piew$L^J5NX#IE`Z4eOMS8Paa=gtC4Gp>$hkvG|tp1rq=@6 zq?ylfj>#UUie~O8+XKn(GQ7WCDQf#cXGG51{uXyUeMU&~xO*8Oo`%YtVk`L3KYt(< z*xjc{Q>7?^myRpxW4&`}p#+d%nB%=&iXDq-4c z{cM*UOjZ!UjkHTK7;U)VPW}4r1OEV~gCC?lb&E<_{u;{QXX4c7dfpK18^yYl| zPeX>B3#h$d#!$ z{Vx9wAU^i2AnO^l@xYmT(rOl;$Yq01pwypMcEbr%9{V%UHpXavOHoYFbM2RR;5D}N zWhfMpUwjh{JNHA(k0u-z)F2jd*U$32sy~KV? zZ<6wqKd2ds3Z&>^*%<_QbH&mcjrb=yCl-#h;?IRUc%;==YD zT~9Oq5c!{-#G}6|6)jlaC{r~3Ks{T->y^>eR2a4eZ_KD$a7d+)FOnQmy$y`c^)v~}JAA=LWw#{D( zjML%v_V(KW*Ury-lmB&316Swh3FwKYE^ln`zxw1|qclIj*^$sSty|2Yb3C+F6Zh!_ zfe;S3f}@pfw*zjR*OllypVE<^i2O^SGUpXFHMJrmI3uNTp<%9G4oL7P8trG&`G=67 z3IE^R&!a)g`+sTtbDo#)KWgA#S=x=i((mtCz?bxnprqX?(o2D|DIx-Xk5qLYmMPmr F{15KR`g;HX literal 0 HcmV?d00001 diff --git a/education/windows/images/takeatest/i4e_takeatestprofile_accountsummary.PNG b/education/windows/images/takeatest/i4e_takeatestprofile_accountsummary.PNG deleted file mode 100644 index e8feb9b5d773a5a2e76cf67860e16604c5c3d146..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 102652 zcmcGVbx<8m*WiP@yIcqm+}+(na1HJd+}+&?!QCymySuyV<>C_DZFy?HJn#4IpIf_C zQ#E(`PWSYjKHYQrcg_h{kds7$$A|y)=@XK)l$g?|PmoTZK7p;mLVuJPkP^jyoWLBF zBtF*z2w!Xfkl+ z$x$lxGJD74@_oW_zuxZ|h)hld`AWj%==;BLxgWFDYgRa9;5D49|ECE^;bGD+QOW-l z1WAUNC2(cP6%-efv9r?~$;bpQSah(i?Vb<1Q@*P-Z`hFQA?!^JxwO3!&jemKXwXSX zOSgEE0SJ+Y^eO|}9mrt=KL6LzOV%S7;S>oq5Q#0Ex!QmRz=A9Jlsp#Q7aF@$OfI9( zlKSU)RpB#TWK*d3UIc)<#c@w$t|&T=%+nsBB7@TOx4?lo|{bwUGK~O{Fx9`XEsUV`X}STYPmQ?z`1s3c^i+- z7l!Y-NbXEiqsfAMR6q?MYc#pf^Sm9YLoSp#Uof;MXQ=$V$e`b>57YZ~@>dsp>`-9+ zjgv~5Ce|89)ewyLmZXvri(0uxG`HZSat0SkZcl^{Yggv)@g0NAcX;EF7;shpIq<{{ zFsw5V*`5mv=T66W^z{*|5rsC@3&>z4nb*2VrdRlrIQWJ!gji-+w@+2S|4KLDq6>*v z!is}Hlg&0FE*oj!#I`d~JTh6NcuqK9tKh}RjVwN7mMw8zG%&5D{9x+#@xiE^$eZ^`V zI}x&qgij+!+@X6O@5K4>)CyK7ZJ{T6^Ix{lF~q1MTPymLuT*{z_#{1?EP>GqW*C@1gc>$0GK`shTKvPDr; zt9|e7u9P+r6JAV){ku}zB_?~DLmlioVWsC%cExEg>%RPf@KWFy zng$2&dZ#i<#M;@Yl#H`+v0m{S0%rrplK)@%_HKbqeG89>=uPj??Hgts1Qrj-pb=q* z{M^>xYsf1pks4UJyeg~8Hw<<#U%HbXuz4)ozIFeaOqJU{+2DPmwmXuJuwc31HwWyk z1L*Zf>a>E^&P}O#*liaPy9k%73QARS!4W+=^4_z9_1G=ftHGeXUch*q&te!m31KQE zLYYSA%-Lw<0F{v`DdvQHUXamgjs2AyZOkUKkmRq~3qUjg&*}IG^mEyez3HS{Gx2r%jO2VXK)zO8X= zHAXhJJpTdBUyAJ6_r*6s6UM4OT4u_0g|5Nb8VhqpB>1VHJ04e01@RQ97r!T)!qu=+ z!X{dBik0n0D^|H6&6jOKR%r5ve+@p=rYJ_{bqu(|?7=XJ?7dLuc3w`6FXPf|G>^eX zI>~dX&@>m}3|gG9B)jp?iU3^RWbU2HIK{rW@N&yvD?TbkNYv^ zVx?AW!aSx4$7Doe*~~$Qs~zhbx{oFoj`PXl&#ZATzH)+lhLI9rYIn{S99v*-{~B0Jjg{Fgm;@`0=S zpADmvFfQvC-%vKqilcp9!pESU?F7Dba1u1FH3U)6C+^H}$4uF?dKRxIB+*FQ(>$15 z)r4}0a}dJ}--D32&Xd!rzd~akO8GaLb80kj^vC>(^6J1RJsekbbN{NWFVIfi3JH6a z%*mu{s)I|@6tOzeUXGIob1yv4v>M_SHY^72RdnElN0N;xKqT>Z2=$K8LNaa z0pKToKIgxEv-t!j?Ek1zkmF_6ed$rI;;g*I19x=;SCQi}n-zXGlHWbrKzou|^7&Y| zPaZhkADlloPjavKx!1;Yx}lu;-zcH;JM7W=@wLzz4Huj<6=)&vPUsPG=etovXti(= zB2#8CpkyRDVIIvBI1b$kYg_OHw;Z;o&+Bv7%U`-_W<3*mxRo%x)M~FYzAAXPismcU z3kmF6-Q#y=bAvfM?2E*aJ{ma9wRjd>D|uhkpi7*kWN4s!L*GhvG>aARdb=xYY1A_x zviM+2ER=*T6RuqJEGaV=DLdjS&l*ss(k&f1QOl7{>9Ft@B*D1wT;9#&;Vzd@7}lBP zdyK@wMnfg8x%9=dK9Ny#N2diJ4-^wG!C1Pvrf9)o{Qdm8DJ*BX?Sv26AI*}NnA?N)WfQ1$15U|nk>0Y8aJz2CBi{XQsd0RP{&NpMs;P(YH8B6G? z9YClt-J3eRH_%IwHKo&QL6>jzgqEK#k4&mq+j(`}ROSuaMN zP!hn)7x?JdNx3$cZ-v<9vDj%%@GX-CE*Kt5%+QeZ$(s+=wsTYY@o6C&D9`1@A{^4T z^b@JFnNWp=WnHwc4=WR*a+r(fV3_G4I?hgF=;DRQ0t%2}|G15uE1`Y_j2S^_T9LB% z9%LA}4~dHkvt!}l4#v(3Tek}i655;T!AMn(J4cQT8vOxMn~)ls#E6C4lp0OHjvbY_ zIwIs{`BSTT)Ljw6NrjUUd?VyRGoOUIjF9Lzq@S}X?Vv(2I!77GA#aDOa%v20UzRqA z2&U!W9hp(~;RZ$(*3v$%Cn`c~M))}3_o_{b9Imdw>hMDtXsIh@DyDJ^@Y)0z0@a*~ z+5^TDlB*anbxOw-TY$*$Bg26tfOcUO$#MwLQe+wJ7p)Mw)pdgz6&TE6=Q4PI&fX=C zdiMzx3f-UKh+gvF1e(9$yIFC3jSsyEo0z8k{rU6}zI&|d-hO6Xg_8lI9VozEP{qp! zO%ob?r4OJY?nu2Eg{WGDPh^PLF{w{huOdkmcqN8KiYkH}Pk(}XLdo#U9I{^S+{N(X zvqRmtz3s&%iU=5p$ThCX8^+l4A2{=$OGDQB%0tM3;8dVhBeIgCUfdVWg-NXlP9C`* zs#vB(i08v+L#Zmu6_G?0qa+^rS*rv>txH+bOlUeT8u#vq5|_ygt5SzQrV0jW&~K`% zM-`wWGKh*vFLxAyB@)$xT(%LxX2caSgH)zc(;F6}LPB>BI-IV7z*nOV(v~38e)E}( z!8)$v?Zl5Y&_fh$In~SG8%|bWZo;3j=Z@nyWB8?vT2!yn96+jAi#bB~9kRxNrl9D1 zT!$U?e5C^JoEm+vybLyIsKv4RF$hMt7;AEuZM0ifXDyH~I6|=%eVBj%xoH4CT{W;h zID*Qc#i+N0f1s4?uQ3?dha6clOx3T~R`fFS;&U=yvOx2Nf`WvC=PD*1G}Vm^$aTlyOywdW<&2M3?sA`E|_EKb+nb#yeQ3ZFeo;U+pVIxx;D zoB0_gWt<|xy}aJxP4O|3kVltgA55|#+ur?3iL2~R_~l`una>h~L4Gwr>x@^_`2@cn zX=r=4f22C3py%#^pt;!!#^!EZT;d)hjJOFK&Kh6nEd8#a_Dj#EBXcFHHw6 z)KL>r@)jQ0^PC=N$Cbd|eUL&MzYY7S@T z)(q^foq$obPf6-1JI9XX)Yh<-(RxubbDX_dl!O-ECIuZVfj9Rfx$O)n*^%=eCb@FO zy{qxSA8Z)OL-fHFj~d!pjcDpV%aF0`8!jqXF%a~CoPvBX2*8mPiH^8G!(fiXe2Cs8K0ID&YQ2tD>*t2OMcI&W|7n?6! z=jjVyVR{I=URT6&0#*Ifz8M{09UCB^6H*$OuUKR)D>f6XbyTW8!{dp0>bfzkGCj>* zCmdVP^#`LMwvM~;&w3buOt7cyj38IZNzSXr6d>UHM(yP0!{Sm!5S`beN~Ko?bydP{ zetC0UveZJ~`Dj83ji)MgolN^ZGL2rKXOvv@LZz*^+H?bbe$-OpEJn0u`?=<0rjudI z;m2hB_<_>l68qPReeVJ`K@(xVi*)&7`&2}lIQ!l@XYl%>l_fKZzj-|-2r6_vjgCE7 z?1+tL@xzR%m5U7F@Y1rn?-&{;E~P^wJ;3s}I*S%FY@p(!|020S1HQP`?68_m(jd^o zz=YZJo^NBAf@Y{Gj>r~o_ryv=#hBBWKcPj=T3TS#p5yN z`+W+hK;9bn;6)25dlaN?dn0jyg)^(!1*av>zD~O-Ua4EvlYov0n!FsoHP-2m5=4mI zL~@3wHmZ9zHp!{|A|e}76!9E31m|1}6~+*q0B_OXu?fj7N$) zR}^pGp^BH1>=m8?I3Zbk5v^Ww!-kV@Y6sDc3PDs|@{Q}M3*Vi`&KlqwZn;Bqw{iMi zUSJh;@nUgWCW;KN+QwZEd>wx5flOHlwksQQt;YEp8ljh7L;i`H=1UVz`0!M=NDMMk z&OW2?27-k(mNO4l*YAE-t7cGL;7B68vkJ<(*BMqpdKH<=1;X$`14bT0KhQMM%4yTr zpR0r+V|uy#Mf#n$#45Z1;;5&VuJocFFQ{yaJ($;?xVCEsmD|%NtfY?GE~GS9=?9Qb zU+iJrXLzNE#sMh}QMU2d$Am#AO2moNu^?Hiolqz|mu$Q*Q(SFSfC&Xtv&c|cEy*v{ zMzdohjIlf`6LGwt+&!Fu<=(>g3#(K6(#eKAf^{r%mgC`~nJZ1Y@Y@^w{&A`ld5z3; zPIdWfz3>j`EO&>?7anVwxbZF$WxCu^y?s58xUsN)D01PndPPTyb6Hxd zDbLp%yr`>vck|hD%GLIF4ke2_p{8c4<%CE{sKA-PVB$NWIU@c`rB~r*!WB6BF|EWA z)B8SY6DmDx($;1lu`(h?P+@BoNoRlA;e{sLO*wj`Vl+>#@|@D)O%E2`+XDe%mk)%a zz-g2LB_j!yexgIw5JI$~OxFOj&nzofjVXH)(GKlsG@Kx!(3*NEnc*&cy&%h{1zk6+ zjqIu@b%v$x(qaI+hIXpgv^V$5vdPQua;yHQXvC;*&IrD-YOlC^Dxuw)L%I1e4RXeS~zc9IGv5Xzai<&gmM$093 zv&KEBR2sf$w-AJdQu{P=Vo zPBuN|jli9B7Rc+$(G0)rKdmHXp^7Oi*co#QvFUd?FBcSL6=@{{icrM#u6b#{Ium6LKysY7 zf+J*=7Q$I@11ymO6mxP(Aiw@bw^1O^%a1Q?)^Hm!)WfefvbZSO0e|`tgYGK8t|zJ7 zz7Ykvjz(XwKj%!U68<3=({E3KHyeR<%Tt-w=7ZEpON`j_V|c?&d?rP`cyz(y6|6NA zH7xr&efA8`?dj?V#N4wt<|Ea!2@ZqA__ekawDv8oRN14U;H~o|T(6UqL>_dGu?s&tMv{fJC8&LJAB+8^+84ZJuPN3Dt%Tdq#*pn-?88 zcSKW9M)soqLUYshN+-0g1;(^EOcP8a6KkFf(%_2aShdTd)-dr-z*v9w`1PJE$^&~v zj%lp0UJg{JRx3EKj|U3py=`|(e0a*TFTO6{@xaxH&d&*Je}-XL`dcI;1=w-057k@a znq@2D_8?SaB#u>5hso2Z%f%E-IKIH&sXF&#rogsWC9D2%!(0N&Ljzd%h2JhIQt=_z zK<7KKvcfeuq<5$5AqIT{Lw5jPEVI#Bld((T?0c-x(Fv`l>3V4++!0fr zF}ciYCKJ<1M?lu#CSWb0!Rn3fMN_p09BSL4CDGdj{W6N6i*+d0;Tyr4jaQc0jWOlg z(`jm*tLYUVyl;(YXg{|STKn0T_1xSGd|8FdCvK~@>vGHnXx%qM^kiA_XH9R4Q1P7G zaaIklHlLE5W0`}THuUoH*B$m^A(O~rw}h%OiQ4R)Ju7|2MQog*ilIIEf( z#La3{H$!O(`Qc^=US}y{-SCg?=LXlfG7nWFPThh(CinYA8oyc;{|-u?%Bp^DJsvcLTNYl&!sW$1VgX_-R!5 zu#}m<$9VW;A|V?rjdtYT?$G!*X4jCv*%c;i06QWRU=@ms49JcrjlG~O^(DtqDDfA> z5pj8cVJ?E*k8Za9SlzJQ7ZQaZ)F^k%<|S7NtvS)Fg9O{-iWfY<8MU3JIn-8bmZP-H zHW|;DI#Z>GOdt3@xMOl&~%~heXtA&T>u}CD;!;l zDg_c`73ne5axvasrv$M-r9QwGVUtx7Bw(4p=k){h}JK?QJ3U#Jh zQ5~59pO2LpiXk3lmU?H;ukzI%zm_N$Ga_p{3Xe@@Z3z$PiLQyhZlCJ&DdzKJm2BWT z;|l~6bN(6N?DNR;3JzH&*g)U%xpU%~B!px>I&sQXtbyltI&Vp2 zcMPNAA@u=&Mj^dqU6+dyg8TP%a_wn#VR5e_6X6eJ9IN@QKgHy#P?H)eb_$)@OO^h= z8&2{}0|(vq>)4w)ete=)DG$Kjk~Fwn?w3i)>d_r)k43;&u(V+b0Q#br08 z`xUQ@*>*T)4@wLUktY_6I!ou=t|Q6LvF(aAs9P~;SgE!ilDqMGl}(_Nc4@wzl4a4S zl%?5IEmK3M*E1Q0iPq{=EXPUi0AEv8rQ&G>T?gM?oa_|OxCmoyXD+HKGuM9 zl+x0!TKN4A0{zVbwsuYfZ7G`$;5TQ2-ReeL!etB{H9i|&n30Q0uD4XRzbd!- zvCMq#rj7!xxQ%i;mu?6%b-#CodWOlF^~X3{S2x`_ogS`Z$!a$APLho&6pNS< z^6`VKj=|*TZ~`Rb#|xg=*B1x#HfiY<*y$jVN7aQ3Lr8|h!ouu=X0Xvl=hATjBB)|G zE%+XiEQ|Li0nM9bOuvP(RBRhRrCYoPbVf>&jNk^LvL5wufZ8XV@O2rJZU0L56tPh6JJOP88|G9RjxZRal3ea1-I6gbrmD<}WvTct`G{*fk6d z4#k1EqlzRo^NL%#OpgZO6DC*C;`sL5$85YGmW=GDa{YiGO=OHDV(bda#vT`ccCn@+ z#>qOL$4dOY(B0PYoTst^KU$tS^fkFRXau*cG;)D7!Bs#x3ST{ZD@2W1_=jfA(U8=cgMNExc`4gM6QY&p2xifZ;vlh5GntI6VLh>z1*6lb|ciD{%F&LgfVuMn!+uBuk zo(?S}J2YD41u69EPo6}T=v7>YTSH%Z^-{V2ZpGN8Y4&|J&;$05N2Iiw&_!;;A*ViK zC3Ib#cx*ie%%$cSPIc}#ym`+ZI6A^>>LkEc&o$+?ep{JE7I zpKdL6MDES>x_4gfVHdcV?)rSVT*#pe!f`HcyL&Y9Sa-%l1|Iaco%;8y4d&Z6E(h8{ zB|7;W-&RvKu0UU+0Gv=yt@jIIHNNjQY0Qw;V~NN01}oG{8Stnhay#z&g<3ru4n&BQ&Am_;BTq#cXjyH& zy)L)85@(%U&^6kug~-Do32pMZCr%~karvTYHCic~b~S4=M7?;WT=A$_Sm0mnPDa}n z$rii499&3-E}e3_9in!oKGAok@(Gtlx^A8X#tIPmQO6G&%{?t>TwcpBOLbw5stZl< z+}0Q!FgUqAQM1`BfBMHkw!N)i$QK(yqnB$Ks}OH|SUl7{^T?}R_A5+VCtbt{F|=b6 zU)!6E(47D)h=vc}PBVvk1MXmxAZU7pk<{?gqQrqehJbiNQgfAJ7k>u9!VI4+$wBIj z6RGKH4UPZRIwhu6-`yQj>BXe)YB8PSj8E8=iWx=Vb4zfJ=5BS+gT?ivW* zXCA(khQOWL6F*+Fw6CiriWBsT$&r=WjxK?ctaIINodGvso!w?Psnx7#0=he}GYG_E zaBo^cy;iuD%&JHMJfWMeipUHf*&rDo;fEKYr1`gmES&HiZmFO?*4#fX34d1BhcDGE z4{deZEIU$pxylu=EQ7{~zllue&BE$nfme~__dLilTfh7$DMRjWLDBU;?nN_x{&4hF zJnA1Y;le#mT)5fh2p!;Gcw|)Ht;AX`P9co8R1s-0TS4J=jAidce)@ zADh>I6OMbTlQ|rF`sFg58oyX3@xeKt$u?`wgr!vJ1zxtJEy|I_Dez$*r^o*^8vblv z*$OVSCeaO6Bv;}IkRqj8cO^<0YC4`~l!D!mBu#<5l^8H&Y035pGX$mJu zOvlb(M6xJ^F1&&IHaqUX?ex24-Sis+@;xHrx*|zXm_$mKXA9rZn=EfrjxT=r$UY!ueREB*cQ$C@KHyd1+;W&_g{{TyR?QY+>JF}6sZDKln zCg8QZd;n)z9>_nAek4eKNhC?Wdc2x5o7^5vq#dQzok-&ttRKO+GgV0f=5Zqj9hR-L5?8YhGcq=9ep@QsvVH6x)n!6IcW?8TC}YVoq5Zx_aQ8}Gq$ zc*Q+TQ4d*+6NnLm^j*V33!RIbcK^iiT8)$3MHsBLH@wXM!z}SUnk2zkY}!3W$RXei z_U(pVj7UmsC%y_e8#`q8W7o5~dGhm}jLYWFxbZ>G#P=nqE(pBGoE^#zCs-UD>%Ky6 zE$MwV?W{H|8v?x5bcxSH_q4e&)Zt}DYQUZTsvW^@LgT#@%AK7~i6$GKb4L z5kbGQ!oK@r-cj=GTshH<^`kZGh((8mcc8X<2VQ-5Ib>PgD4Qw?Ky*@R@^FhX)ysC* zm}gR0MKnXsS0f}kT|ne8D>s~sfs5Y!R5y~t*0d^gK%Jo{J&Qk%Xa9qBYj50Oe%eu+ z2dBSw{N8S#Nt6HE$L9CL_IjgP5*t<2V^4dWJI2H|ZguoOj-nGhRR3r<&r5dy+s92X ztVi3f`%E6>-Vy?*;|9x*#wxlkc{fhpmz}~Dr0lm5tdij$uIJ%o2GHF3>FL!{Fqh-s z$>3(U+-YzyUOgp|V}Gq?KGO=&6j&i*bU8x~?Tg9Hjuu-h=Ao*y>&#+_-l>-;Ym}$$ zVstr*xjvZMS`xlwdeBofT&q=!#t#b*A2cfbn&;itNTrbTY0!tAsLo7I^0C(BBbFe7 zB{or5+bSdP{WXId1!3ybPO7AAT0_7buzw-aY`SnRGU5fm>uPxUi@e$83_k*sIx2O` zC-D20tmsy(z+i%HQJ?L7@f^mI~_QB#X_o)cqO zqR4L?Yu}}p;HyXINlu#w7>#awYChMQ0$yDY7M7fcl3(&}!DfNO7h}5pQ~TF6hOF7k zGJ|^y#3VD=qN{zslbjs!AHdT%yjH!BKY!tO{f(glPB{5Hx~gw?8+J&3~7fH#-rEcodV1X4;X7CO7BV zr9HI0sthenev11dpDgjHQ(UY3y4(VQ@0L~*=yEA+bAaAV5y3n202{>Xu&!?4#Y3b8i7FId8;)V_=W&duA`q=vAEMhho|{EO{TrD@ z7sA3jz!@I|Oy#oeT0!9VY>!IkwC&li2CX17Zo7yC>^vxZPXB(*JBgVzv=%r%ec8wA zyzD>QFc#^S3vwK#RkdCf{3n`6|NT#<+i8tb3bP|e(YI$cdy1O&t@u>MBAE1CP^cMo z4YIu80`ht1ZPC?`yDsjEVGSt@i%2S4wY%jYPD>1-Aas6@*yX!as9;v^br>=r~e6XjFCr{2VI@?Kh+rx5Fcb6 z{Snr8KM$CFC{DHi{(3t?h0H8a#MM4^#m!i0^!^+&nno+|3J$u!Y4*wIT*8B*;xU7y z{h`6QC@MYWpD?+FOc%SRB#nU^s&E5490+=H)=%Kbk$rSflb8mqv`f|gXR@NcndwuC zIXJL<#b%5FheFVQj7S`9Wxw}mIQFSV+$0*z?WM zA5QewCXHEoZKfV>?gg!ZkAN?xb#Q8BiKpYfn-!oX5~|^-`udya)t29eg=5bkc#$Lu z8XkO3+x3Sffmq6a1^D9r5PSQ6Q#{BTkL83qrapXSN2$&cJA^~}?=8lvZ`P9V|NQ-b z^On9CHpLj!Bh+?o#v7NC11GoLX=zdY{bDB0t}>b|N^@tU+_CIPBS&h@31ojqBIsRj zSiLfc4uvsnTufXXxLBd(d!$}DtMtpjnJdw|X$&e+Q}oK+fCdXOH}?Y=Cpe}Wn8_*l zqaQx&n$fwPd7p+rdysEzMbh&l{ZLE4O684RlkK80XVWIWv4oXys|JhB3mG~K7|Rck zE9>c4+N&i2s=;Rvu`i%Bz%eRRFn^|F!}S0ZUJiKRE~gsFH|5)JFP3kH|7u^_sw zcF&m%rQOrAfp(_{>f9)fXvEY?JYLlhl8y!&{(?==DG|zY!r#s@;J+|&+xBA&Odg`zv9sq{!aLjoZegHXb3@IrUdK@$gpB#)zVV2PA zS8~){r#FZO+P@=zu_a=92>U&&%Q7Tp2o$o48Khrn~+ApK&R$?c;F+pc1QN<2e&_~g9pWV?MEPR;Q5CfpQhYYlY zm>acH)%%o*UzguqVncVHY84f=$$bWM!KWfF&7)!2kMw2bgw|}6a?=Y4q z-u|yf#C_fFJyhRour)ick$J>VMe^}&LE3h(^D2_sHYj_-0lA8+)XF}Xf0oGi?qqK? z+W|;1a^lxbMM5|L@K}0)oGOz@9P-A`0j^)KsK;H)#0Pz%xnv|Z7OY)#?1^J~*{(~@ zgDp|1YX469?->7k_@jMd*#XicrBYwNhNwdk)JYutJ%ltAHol_0l-#_@7h7Z?{cbhcVmGah<%Ysig zC4h`77Pntayu0MG8`#WSxwC7(^7B{k6M3H;Wd{R{(hosyYAm&ZR8a87AHPM+sFW0q z{$F%}47)2j{8$2)Vwl10izu%=GX2k~`#*8TB&I8RODSGKsCZT(5t&S#URWxl?{=%d z;!JBm+es~M#kXPwd%t5mZch`6(SW%;%_VaAMj%v-qR=6An86$-@no(_fM{~90YNOvt+;ZeZ*ia(XiujxbvL1ExHh@2-MOcLbegVGshWByJgyOw`emgXKeC1 z0{~dafk^=4RD9{biyR5Uan+MQomafc zk2dSO_=d}VX4#DBWbXR=XOogEUGYoOH-g|5OAh_9rjDPiBGGJZ_~Kef{fn8jOh%_% zbSuqZ`EC6E&{HUVX4a12!J0qrRpZ^gR-MgKnP9wDZup_zch# z)jQo}CJ;4~8#v~!WA-%`jj$08w#hb{s+3K+zBT`r@`$l8MB1*-NuX3OY%b^opN1VS zvFE|4{}#(SQ{=?8iPwM@36mO^v46KG?Z#it)%${!UhVKA6UOEl zx6hQP9g4Qx;7#2L;3cBvwCUf*xgwjO8KXw{FE#$@?EWPbnb)LTjg}6j#U7us%9TV8 z0Q3b*gyxyDeqlOwp8qiqA5E|%z7aDvW4e7p^=k|wnML*^65E*Z*qJECo-q`(fiKGp z8a7E_*nn_+Ug%4wPs>w0aVc4PG7;lr1-Hc>MTumcp2-Q2DDFu-6U^z0pO`5yu~eZ^ z1q@va#3rYy2Cn%q4vlsIzY7~Ek~2H2F%rHUlB?LhVIHfM1~(M88irY+bkd>9oG+D40tlVmnBc1tvOy0z7kC}S%=>jF@`P}E12%C`zKy_Y&&WEOv;MT zTGA6sW9Bm9pJvC7I-lf^SVp318p7^(sUyF(Hi_m_W(!AB++IF~ z@gFi@5~#??_b%yZ>Hh%|EH^rVTPUa5myKU6`xgkAAp;#&<2t%AQn(8Vu$^rpH7l}2 zI-acU+Xo47)yqD&w;&ii4Baw!ip$J<)&h<>z0i%4bOTpPF8|ei;b9NHU!tLUM-K-3 zPTx|QVj62u+PyiQSv1*gq1*UDb$tOp6M?CWNe?m)j|XQ=*i@m=&X)ON+W7jD2s-8k zSHBbbGGiR3ZU-}R7cRboG*es_z$$P`m>Uroycgl(InE>vE#Q$W_56kP$Uy_T_SN4Z zHYt@#b1qx$tme>P98_a1ZjbY9_DGxeZt^q~Y*IQCIvX*M7%I(?S!T!&pO+PO+K;&L5;&y3hmYTu8-v3YYyN(Qi{EFhiseN-ZL80+gK%2xQC`ZoG@62E-Q?dijGi$fo1gkwhCI7YCL>71B=40pMSV0P5(VY@nt|teCTE7*Kfa8b zwE_Jn(88Al&jZdqU3)JAk;T$)NAtS(MEpuPAgXN^Sm^ZHQBTwvy0^{xa;S5HDfPjK zbjO$W9dbr#F%r18WFHVa+UiAh194oMPCm>A_;vw#IHaHVP~%$F@MTGK-N%V#Oh3NS zf8J$oMz6}>Isqx{f*7lfRtTdGb>W(93wy>U2?pZw0@Cz=PtmND5Xdr}?(k-er#**0 z=Q~HH)|U$cfV?P+lKB_K%X~ZDo!q%&=_35Z=x%IF_}M6lL$_S>Ol;wB8?IQ0R*^3g z@o|j2u?fMy&J(Fc_mr@T-NZc&Zl}g-evLMm-l9hls-T5c2HiM@UdUA)ne(|oH`1j> z$FAat8U_Sw{*4faBssZ~LI!l`#&&d__VtK{5?ib_y??6I4xiHS6+^9MdRficun>-C zOxhW^u~n#6U{3fwi(Az$NX*di?)-%v@tEMjPZe+a};?Sl|H?RpFA~E9>UFiuoZS0_3H;8LN8h@1Rs_6EC-#K^jQw9@AlsD~E zlYQMWXq4OQZTKL`=sd3>!|~?u!>uaTRgM#w3c0|COps!uzO>Wx)0edS^laa6~6u^PeT>O zjwJQjJ2F?F6~r14q&8|H^Cf-b6tnfBC9_@igw~2g(QvH0SDgD4bL^nn??I|gfErk3 z&*Xdu{)ZEbe@%#YcB043z>gfBqa&0qZXIJq_}=$VFNK96SbnmO@?;D9LG zfpTSBwm!l4tTE9Z>_zk~;bxjkBK4~w2~M=L@$veT*(lB>&5ow6`rGI2f}gY*#$GyL zOVNWT2o?<{Jbq8z5>#89Nu2UHV`w(uyR;$LxZ>|4xr3dT^F*%>q?5L#kM6~j{54m9 zF1UROl`~XAU#!v$5x?#n>J431qtgj1UTYx9pWcuE0{a~%A8i_HoMFyFHHG&C8($7T zNIji>=tR`a(BPcK3tBT8o+cXF6xU#$=fWhk_!2Z>@!-CQI!~Q5^klm^&EfcldLmqHP}0@`WY#ARIi!sxw~nO z1f6oz%8S#YW;>WluV*+K4ZYm#gX~dX8X02ksee{k@lbCM6*Rct`)i`?LipL#e900O zy770&?KAdvIX7&js;6JA&V@)Qvbkml+fA4Kv3aQvTS5Fe69x^|6whp5msRv8VN?f( z-q22p%W}01b}L(HNZQoxz#_TP_G=|^XP0@Qhq9$26;Kt$$MhHW$qyIW!LrTfc_LayjoKT5+UbJ(>wW&;nCQ zup`Om%71o2f23=LrDSk5dJ;_P$SM)?dI2(4Z!s7=uX1fVB8H2)qU`x8NJ!>mGSlx# zCrZWb!r(nQZ6tqD0LIK1gG(J)Rc7_Nn*>x02|($i=bWcmeE*XP5TU2lLcfe zibm-4AyYwt&49fp!@OrZ+lTvOC%NwcxP!-q*V1z`Lq-bE)#{2Nr^l(VK}G51R?0^b z78x^CG$9#h_>nEP(3|c8n z@~BX%$(=BX6|f|0>+g%CN^_8d6<6Ky>G^NZ?( zU?4FTR<1x+&+ zK$OYY$*5^cnB>HzqM0Ha(zfF!jS@KkPs!N%?fZ{DYNSxd=-=$nL68Jk z#nDTkkm$*kql~2E&voDYMw3kQpWys2m&pD8Y+o+_O!}j$I{@!=XS^sbW5OC|^{!>M zc*Ew#?va9(TOJ5yqly~v&BD#SWMe00nlUe1+i!I+zP zbRQBdhuPC<>t8(=!3M<<@>mI7dvM{IZUyG&y)SF*rD6tLs9(x+JN<>%sF1*}UNUYc zbaadw%M*z&B4edFQd=M|2`#x{7 zkR>RfdV`X(^1vbX8_R!3MK8XfxTR@>;>rB(!A9KmUcK=DqoLZpvIPs`9~eeje>YJd zOa(YavWfMVt^7l|=tBNmwU2^Y+?{E(|Ga_lu;KqmOob$gBtiZknC$;U1OH$uPw(e| zpX8SwtgUt`DwvgnL!uSvf`y-7luH(VN9na9d$;}lI=(=B^la#AFY<=}-&J}AgSebNh!U@p+uX4eSFLR_qY7$}Z$O9V zU5=0ntOq34Kn4P4&Il~df5`!OE>6fJk~DNaJ!9_7)vEVF^e*IUUCuNy!w`Es_eWEF zQ^Ef;H1Du1yt@BQg zyl_sW*WwV9lzbNPiS*k0`d>YG0}zem=5smn)z9d^=juzw)Rul^gS?pVm53gE#7d1O zG3p6?q!a6ve1^RjsZb;1=EnPQ819WF-v_^8|BEVnyZSy9nXeQs46hM>a{f#6a*gPr z`NjFonVCeDV&DcRO(5DLedNzhAC7rw$3bb~hxmUU@ZlSjl9d&&F&ywB`N;Ssf`fx= zwgZBH6dxcw(*LVyLB64qnxdi6W=&(kR2}dO4k39Ge-zAtgP?jncFAF#H4wLGP9O|X z6M~(mdH$AQ_nuw1Y2DV!DKh8Y5%1&YY9Bcm!pW^7N5$s3Th7VJ3lGfKOq9av3;7;z zb<`l3K1X6o@1y`mcZR`tAw{3SE-T-A>oeh#bDvf|^QUs~~ zpDI9MCUI6*-6Z%LJ?aliVbnL`%i%~;-VGbfa26x0x}AqSY5Rl`?5MW}gzd6@@;|GC z?6m&ob=Wp8`+R=P6O%uicT5zE)nwU9^k9%q7Q`ENc)k>B5|5XP#;qF%iD6gzML>yQ z@xLB@WM&pG8&RcE9-rGESF=i*h;_1HDG24G7k^OX-oW0b-SIacs`vnV;od~h~| zDTzAdsw^gB0k8XJ#R7d_5?Zk9L@vPV`?9(b*8@}`+Sh%~;mmRZTDwqN! zSw7~Uwe@X?*MLG}IsBjW_!j|Vg@y?*#1YA7pZp=P`YDK;u_XJqIFj#EI53Shr-Eb$ z2Kui@ckj%5S}_2U493KR$-ez6Ka;rAjy->W=K6P6ejBNKPIz#cNaNG3;4K9cokLee z?i|jlY(NRZnd_*`t)BlK_n+6#E3(v^_z|4<%=!-0`T`?b5?V6ZeY^hK?Jbq>l}|Y= z^^9UXvq@SAFA8WHvac$lk7qfJ`k*U+r`NXImv`v`(3N0 zmsECL&-txSWjVEjDSkRCZ=A&aaCedqRRl?*x5V0?mNjvQv6ivDVy<3-D~IHbe&|&) ze<=UZqcU>lcmePFXc`YkGJ#97cQ(55#7`xpVH8x0#1>g@i|GB_T7U)e0h5DI<*r68x)n3bW304=g(_ z{`9LhH<&;}M}L>`W&-FTzCs?vml&v$Jf7E9ka#@Zcd>kPZ;sJvfa7cXtc!?iM^~qru(X zLI^G$+@0XiSmTX5L*AJ?_kNg9^9RnUQ>SFtuDzZWBx9D#Equum33(hZql0YU}-CE+F`QDfU+CpWrkhU#h4-7UBaY zj+A@-EsF_j?_Bo+fYWdXLz8{qSC7m~T-i}rJ;6lWhI|1=6HAe_Ij7;8 z?$H#M`R}ckezUJx=>RG%YeHM3?MDqi!?lEnDc69FF&w;czUvN}3p=eTm1D4PtoLfkOC|M=T$_Ys$|+ zd78G97by;%h3mcOpO%k3{`@)1Z44y4DQ?pCBPYnk3M8q{{45HNLNXawLvE@d__jOh z$0TTos5Hm=y)U;TLXFS1;0vA}1Gb`-zRql=BBk;n4#uq?PQ_e#!QyKGW)$4zl#-Yj zeDrrHxC8rD;3FP7^lh#+i}!~Z9LQy)kc-E0k~4YQ;~EC}@N+^aR(yFc_qyxjVkN=lLgnTCKO?vp7PQrvS=f<#Rwc+aTNwQp`i z3f2sX4qa66SLKGbiATCc>y1=OQc%SPb}4f@N%zn3F>N%-^AbCJBZjEcjM#k-X}y&y z`~lT;iNnuVO&I=s28yygQRAukpWha^07~v{Qlib0J|fZC`%Z7trEsRl$w?{;B~7(w z9#Ds#6YVmJVr`;O)BvH7I>$+NeB{oled#LEG?s(|gnCm|Uk z>vOd`l>7TW_Tf|f8cx{>_pz@!D8)50l5}C7m~d!G4hH3l#44G!+Zg+PjEQQIak-y# zE<+$iwzXf?jnv1HlTVoDFa?nGRP;QG&$r3%G&$lf5`c2@7^}i9^Ne`LE zAUDWJGGtdTK@i0F8up>cOgM-u+g9NEexEraEoQLK1z}@ZapE6T%ad>g%u};WvbI4Y5DdaO%Ax*LMmxUeVgOHu_-0NcD{wsjQJ?VMVdZwGdA%(x1^r`gl z3;qED%KlQd*bcqe`N)(rcA{F=mP2W)S=jKDvm*oNLPAg+sF5>#IqF(KmG5iW*tj#W zn2Wp2;6PR4xU}JCLAy`lN_f%UkK33|-gvhP8UFq$ch|6*mfLP0Q)x}6zGX?53&-O7 zd>1{L7q5ev%HOP0EpY1BDsB_>k_{Eglk7EtHe{W`ZOSc&Y6eF|9u<=A*`R|bk_ymn zk(^}(gi?Lo`dLtB0tw$*UtWB$Sw`4M6{{7Cz^LS&LdZo~z>U(orF=!m`XPOLyOjSS z-i*7DpH<=}*1igND!W%d`I_IJi?rW1`Nq0JixPS+XwOb6>8_n!lN#$cQQ)#uc!o^} zSg`##9eE0p^;PQ-7QMSJ;ir>aQ07YU1P(RC2S3TaQBqxVFRPAI29&}&BA0uych)=J ztpe%&nOj9_lntBdSUKk=BHR?t+;!s29P-bOig1n4W9gX)o1kzE7l%aS3Gzf1U5_mP!&$Bq|sqjBLOP;|0HPI z(Y2AQsq~?$eZQj-H0}Jbm+!MAXB~?-A7Zvl_vBl|xGpt5&0YIAMP4`ldW?Lg-~gU~ zBz-!u$~>y+b-FFMa3l8J4xBpFEl@eNDP@f7+54_(MpA5bcK3E%l)1pr{L?&iJLzzYr zvQcmh%h9@Wjv=Ha7`Mn=^Wd6T6y*vrDuP%*xFfcHUx89ruL_!H)>`n|X=migDvI$l zHL(h>!$xMLE1ToNn@gfLWKCjnvv(ltLYl4qAh1{E4I!_q9jh>D{g-qJKbJeN_AmZ* zhYz^P?WC4GrrpWZX+m3=?Ux6}M}qF?5TG}qkWXMRfY7T*9O1wl^19(tA_sNhba78aIDUoEjVN*K0>PaDWn63U675%-#SPWxA4YHm1$$RCT13c}Zx< zg$Prq5q98rr1~c^Nq1dcxC)G}#q?QFsFEJJiw>i;Q;;Q@C>stn%T{|>mkMzJ0_PYL6&T*SE=?jgiF%gNIUGq zcdAb@m2Z;CpMWjW{R}C^0!`e9EfGuZ0!;(l6_q|_h&2W6cZRK50e?k3OKa$JrTJgx zOhp2xO}U5`-05E&We6s8_a*)9knNA&=!qj61Xhf!72SNPcv($;p>H^&EO+>vAQ~8E zmR-`SBkg|2U+n#3`+j7T%3r+9@ucLJu1Npm9@T^E(y6@n8a*TQXVAHcQJ?IzEBcPs zw{88x&utP9a?;mDvPFznI)3Mv>Z?{<&ckX>DnA0tg{<7<(acrM9cKa#;}h9W|%pz*UCKwkV5g~u6Uz| z4Z^oiiUmuj-T5MyzA~g#GBzU=0~GEFA)Vq6f6KdK3Le2_6vV3QdgA^}QRhY?pgzy? zXIj-ZsI{IU{GyWoCgXG$Hq@iEiYjDzSNw#mC?e|eCF*im249ns#~={znZDRnP3V*y zpssJZLTIh$5^}%ZA^D5y0=HF*sqizO5=V++KkRl1=E)nJJENqgv$o??>_IGX{7k*W znQ<@beSn=p7qgsZ3B@aJ)fZcM=9vv2f_q}hI;du8dRSP&@s`Be1CyMpEd{$VgP7n2 zCA^jL_(8>;&Od5~j%R6UQ~(`{R|V|>vO7~^_5 z3*~gva=X&~G!*8?j4k^EGE@37+rOOC4DoSN`>jIqtpjT7248Lp^&}H7cqe~M`ztK` zp|_c+bc@aSt@yYgIEPwRB~(^>*3m0&-xR*2C4OI>cdwEl>?(cwE19r%uPNky#>6Jc zs4T~*+!^TT5G5|7!5UFG%Il5^H#`7ZKRNo8Hu)r$z#w$aju zL*&Gkh|^T{5;miU*No%i%*tW?O}EwTGp%-iK<8WB-WdLERL)PsRcfSs?4myVR_fQ5 zYjnZ4p$0?4(f2-6QCPy^9#}R)Dk=AHNbqBMS9()v zkF36q!a4TH-nwnWAFW;C3fqujrp}|X#_GB!5A=^%b2(Lp5qq0DJDm!8UDZ!oO*=6T zMSiQmX&{9yw%>gaj6~IL^TAh~egoh3+0@cZbi1FvYKbgzfJ9y7FluvfxdCV)e;WJU ze`d;Z%^QOZhScA#@peGdAnad_FA~>EC$s`eAn`RiZ>+qzM zre-&&#%x6IDWL%lrJ{nXYp08hf=MAS@F&3Q!hBi-Vxl*vNkrD&P+7&vw?KnmiiW)@J>_6`HmF{bVY)LzoiO|>XeO017SRgU0gCJXm}*BeD6Z= zA}pJl$C|Mf?k%+rNX3gI<$;MvW5-iPFfm(lr&KDP!_`WFNGvxCK{KI#7J?B!JYgUU zo-o29k-8hD1p5&d`$l5q3=D15$Kztysl5@PT7Gl~`HJVf>ai@gQsi8dc3odc;5E*@sgtW?r@YhuUmjQ)OlAd%_hNZ#S76MgcH zKY0z$d=lC3@OKu{4m?PA_#zJ?Ut}jZBNj{9jy|xZ#4zR{bzk3WGECfcx6&kY-;@cH znM#o~$)u}wqbL8SnnUUO!2=p@|8|L8%Kt$m+z7Se210d;5(NYev&Xn8P_^(#V?7)t zNs}oK>|8(!e$k0u5i9tYvCUcH4^N1l>(#mTl7ZZoBwVy7>@R&&w&Vv9MvFT6(lB7| zKix~O4=+DRoL#XZC31QL`-%lC<8khBhinHF@$SuajMV&dN&{9BFa2XM&Vq};y!=|J z07c{qf#E{*Vy$~>aTlLNm5iimL8U9tv>bQl+jb=-Ls_<*;lG*pWArwsGP7P}r^wf8 zzGTG#QyKRs1DB(lS0P^4#3T#PZu+d3z*})|lrlwHwMWcZ;6r@X4>xT^3iGNB6@-F2tnxWg%jqEGR27Bwr z+&mv2R^&;w_Ak@mkJ`1DBL=~>*4V48KB^tZ#U8g=(|e_zq~iBG1;_BKKo-){fHQQ7 zYa`Pl)AuP5rXhJM(PgNiGU&u{6}rUGmVI90x~{C3RbpH9zB!E5sBcrkC#CSS-4}l- z#+$pmgJ03`vk<}lSx{bPcAd+D1Wu5OMW>}7J01_516vgLI*VH~75(oB41i6Ga6?xT=3DkC#Sng8kyazBe4F{$d&mQ<+hY2Z zvGwLG!&+a)&vDx_H0p#02ah#wtE=wg2l4aMOSpRjr6<=<#kHbW8`PWTzYCT5JB{q} zY@P88qATggE2+9T4U#-s7qyGm1ilsf1ujZ0pkAd6>%R-k{+HYdxplP0#uRXJDB?SV zYLMuC2qK+@JIbzjyI-DOD15<4VLbFF)7}OB~(a%T?l&i-< zlC>J7jIwKPNn=h7Fxs)zI-R3BL|JC!ydp3v`cAr{(w5C%jKvHW^wU6Y zjMfo<pTr|~=er4f?g_M73twkI~m6Z*P^s4Iik0-xC^S9bMUT@g4_`*Ya z%vGA}NEl*qEL<7pPX&VxxNX3$8*dy4>BBzFf(Tdy;%FHXcOnr-AHO0w81hBE3N*ia zO4Vm*M& zxHn_@?YILtywR}z&ct!MN8xCdFgOP+KtYP7-{H`YOWi=xuF66+P8@_2eUopT?y}+B zMs6l^+b?@FX24aqySz8S_00mzlGY2=jK%cJK{@>iOZEy#5osZu@n3bkxW~*LJ)qZr%#c+!W%jwoqHHBUzGU+m`7_P5-!k0yzL{CjRCw- zDVLKoFbXtFFm>ob9y3u|Qu&dfPB1_wY8uZdSLO$NX{iFeqDcCzzLV^pr}2YHDRJ5A z;y!w@&z=j6(ZEw<)_;TlDv`YeFLvAT71tvZKF{6ou`&yOjamFggCpurbHqQWQPtuG zalela{4UXS*C_7KmBbDfHCRR5-Kn2&yf(N#&&b(o%OSn7gZ$t1bM3*gGZ# zM$Ia@WD@>}Go-k(%w>*i zIm+hJ>M-pI4p`{A0r|hz$8k&tWB(hpSIZzW}{o#&%=IUMcCE49gB& zks_LBMOsw4djBQdWmT}d$d(8zR(k37e(R8p#DG>ork}W#MO>OzvE))?Jj)#B_-4qB zRL;KolJBL(_m5g08~)rfbL+{9zGYR{w6>ePwM(C}&VFazq>*O;U7#a86d=(yTjD3U zOQmeVD)PeEIDjV|Ks-WOjGoXwRuxfe$g1YU{B-^YzrXK(svnCpuHR|7ZieZvR_&2l z5lfVxx?>nrSmoD;IW^`ypwVb&XMu>fa_Yoy0;}9gA)(l369eAB#K!L@aA9(l7N2OC~~u?q!LT&UjzPhG>QQo-(i{`bM-cfEg2B$}zXj171LXtG~x zLY^INf80v%@3Z*OOa)VrjOV>9sqrd3%mlQ=1RW}xt|fRKwf%?^B~dh8ENPUkZ{u)i z#s1!p7gInzQW#K8t6aSBhE$KA6nBjwMhB(+cfbJy+CY=&z`Q-|N((8!nX1qu1S#zf z%=YC&m9z`*yR4I-al3D8WojSKCiijd&&F9lJOXkHLZcBYKJ^ zbD7bT=BswIHQLBc$d285LqKEb0se2Ndm1!L+mJooUp>i@VejNUeN!aG5k7Fw1tIq& z?^Ob8zJ$a*P1Tx8T-phuPE3=3@#c7|^N!HNVeQ-W6@Q^$A48d5GmVQ*jp@}K9T)Rn z?}5UAa+4+kc>vG6_eb%{g5>RC;g!)BjFMPDuoCjsz^x+{i+=MkV!PZj#Ubo2Yid_k|IDG5H}8#=E`sWeE*fGW}bFQuC(6Q$|kp zc0$S=8(YX(F=b(&aJV)YXOWTuAK#W=l$acI6K+8qyAKrxisiJdF)YC;(S+7cl-VkS zpC&OgX?^Q@e)NZ!Z!uubW6zw@T}L-iiz-!5K)&T#laC|E<y>_UHoH95WTFl}H+irb6y*>Z`T&*fS22IC1n%4n z6Z6w#3p0t}`0dOmV4=upnpO}>2+xViaD?iF=Z@~|0r{ztU;~HOOuPv4wBX!qf_9cs znW$y9j8FA`OM45wCt*=b-xj)+tMY)q$LIo;^M9QyOSJzY@Df%d3IG)*V^8>K6DYYW z`HZ(?l0pPSzTy7NwM7LabrzN}*&(`cBR8(RMxS^9X+=Y<(hK_w6(BjpMSv(_B~I3V z>Xf1);tT(NcRvul@VrZ|A<*xQ!Ch0M+jKeNKxt>+eGU0t^WqZL2j_b6UDR`@IgICGdFrcyIeyU8TqARSAMIWq`xWC%iK42stzEnKbGo;@|r3l zjpP{>FMAt8k6!vYd8kXhX-NJPE&UU{X4b(q4fOhGqT8z?b1jUHN$shD(hhG%@w}&oUcWbJ8*_Qn@pV6q zReDVt1iv!=>=i)Qd5rc>aiNq0963BRPJTkEJ8a3QbA|$ab`HNParK;5Ye^~-bS;bP zgp`|RMVyj0gC@w%81Vufh|h5LdRoBefRK)89U7{DX7Em-!Q;3&6ty8}i ziDNbk4N#`D?xKw6zG;Q|2cN@|k}iD$DTfxZ+ZFv|midFuYZdNzihR<=uE0CHo!tvG zT^0ScKN+%fKYY2HihsfiG-GtqxG16ItLjp1N~XDZ8pHOSqhpxx^7)>YYTiD*9A)`* zdl-72BYHDN;1)oTa{Oj4BCrq9!|h=~2qHFHdi}fuf2_8?u^o2XDZN7{eX~T2XNd>J zlievFe4@{je=Q*j7J6jsmXZC4>rr6Le<`pV%n`x>cEV^%aumh-GC&a5r5CRu z?koWw)ICV7)w37<QwX7y1C#%af;?ZswThVUpD@X&S!z);8 z{=)fWR+E=9`V-AD&F9x7s;mqk5jQE`&yDbyE|c;8K75Cky!}_iq3Xq&^IV+~bP?UZnJo%tx49Hc_Ift|bMit;rmzx3B4Am# zKDhJS|Fs5Wp9ipTs{{*{n$u^OOHoKR4Hi&_0^9)tu+!t@}z{l?Px zh5rVVXhe$MPtu$mh*{;`k3sS-=uDT79WLlmR}5qI1|=(~VRFwi*@NF#^Dc5Q6}``& zH3&n9!wpy@msMRCoxEp7+;>`yG+Gs3Zy~1B%A1l-3zw?>ZU|z&%-6sW|;Sd=#R=%OU<7QQq4qpao1W^|)xS(YQqSeJuId|%Y*FdbgP>6oo z8Mqk!g?fG>(t8+U6Oe=6UTgxajP4FOdTa&G7*Q~QKWxt2;R780H_7Rf-jVLjCFrHD~z2}PbU}SHcQ8$_FB_(UQ zPlPDB-Vza5|K+V_dPqzm!>kHE3uO$%m12+=wyGf&OVPWdG0<$a}M}HH4MU- z)tQ~=EOV?bJ_k^kI>M9WyX72m%xZNy$(AOkU*>Ny9)=wi{?3%XYfRy|A110;J`)k5 zs|hn3%lG@-kmLQ0CoVB7t6N64G1v{_?nq2l`kN_v^RcXxP=&}sV53CkRTV`RHi9I6%tra0cNk3rc8NTo^ZT6T zv@Km}?32bvzVqgxvNak0&s*2mVEZrL$)&%Dr0w~0$0rKcxv2_qb0M(@G48v6ZP?Wv zNUn+r%f|_oSFG`F_?yrLB5wsBQkU)W1Esr2W^&Bba6`#IPW7Up zFoTRGKa#no=?UJC;@$zBpnG-$5?h&PyMvL!vX2?CCegiH{HC?!f%goK*oL^#8|*>n z_j#zdQJ1-L%YRnzK=<26v4z44y1LYhyyJduLs6g|vx+0<6ANJ*Du4|~VmkJ$|8F1){wJV~&|d(l)# zl(+-sKfriTT=Dvav1;1*s2=cEGq2SI#tL{_%7q_Okp;?bJGUbUNwCp)E%@Txi~;sD z<-%*vl~vP~!>=DEvqq}$u9N(&KSyesV2=WZ9E4>rwy#ZO-_zcOl-p6tO$()7 zLZue+UOx77x(rV}+2e-Q7JK+*9OR>1aXJ96C$5WI(?s3-Z!#oiOKVjEp`y;77i9PF zwVtm9Yh6Sd_0u~DWZu}Jw9KeePXVE{*{4z1ak7q~?hmR<1k=LnYp0lj&|&Aj#&w4M zSG7zN@y_!hjMun{cfX}PI7)Jwp(zgI4UgUD(sL$_!^>CjjMH+pQ^h44v`N|fR)c}i z4H;KZv9dvgM$kbbd`+Yw1<3AW+_M=VA6>L88_wR4%h`3+gsc;FWSx?DCt_`ZgoC;1?g<`_ zvz~@5L(VIe_nRK%eB6NWJhrsK`}$&<9x=+dwYnj7XKY?a1g(mrQ6}5lz)aUbHE$ES zW|4v1w!8!d*$Mzl>__&^p0ii=hpoI>?c!iOXLnI?z^O9W?i@6Tw7L1){g8mgpf%KG z$799H$-b9LY&`fy zrFGeF)Wxf?{kHOpAZ2(gQ2)W#wx&d%T4qw_lVEJI>-3JodaNOXF(P4{~N#A8wcXue)UZXVN z*R9Nv^{F{Y*lhFy@wGNm@yIPt>XVQqeb)7pk?s~N9=*?nX}tLqUyezS$tz@&dzBvd zQ1QVc3hc8+ZW=K%4pKH(AmT5bMW4f&urdb6T%o`1?_8e9_1BUXkq$XH8(sAtbIErpy5Lxwsl+)?Hcg1*& zEQB9@N1x4xNU5$HN1#RwJh)TerchvKTSgF_GD4*Z1U!Eq|F#SA4_nrUN--^9_rVUK zd9JAH9|I(4;|`(@Ge!p7PbbuZb`o>+EwC)o`OzS(@52&5K8CRslT6D5gn%K2Y3{6)Owt$m&4Z zo0DR8TZ%^B2J#l~C`Dg14T_sK@ThotcNAM`1EluLb&WynMTE5vuhrP2XAVq*7iorIvdpZ1^QUEk+n0>wuNO% zwQ2ctd+%^OPi8tF@yp}|aidS~SQ0%m$0a8D3~j%&PxBc<=wi2E+&%8&R{(_v{i0>{ z&wW#4{G3dgzj%i;Cmv3FRy?~3I`z^5NOFgqGF$`q9s=ZdZG5drULSp}18?Wj-CT&{c>Z$sZqi_SWZhIF>!V94?lbYT>OU-m=j{N1 zKjx)A@eZeFGidK|k23=0nd8}2-k2DeKEu&|nmY0j1U|L~+uD@T> zhL}QP+UCv5n6|Y33=Z<@XJTw3bc+OZ^*XjYWsGv%^0MW2^FETKDQyTtlrs4Ql_f3U z!F-0hKVyK38+?I=F~HT1-VcFZ#vd?+&SAk-31(@DIHR^Lk2IJNpvB^u>7&WxA!xu% z_!@$ZoeWLI`3{VGc?1`koVc&CMwk>PV(fKrf3sHKb$%2!-MAXsK}XJ^Fug|U^eE4L zoc)%VTiW@Da|Zq)HunMQ#o95L_EA#O*_$JZSqYbr z_2*QyEp%dlOlPE!)S=CG^KnX7KN?q3;4@o4SwO89Mi?O~LX=wIEqzKHI4Idh9Zf&< za=O;C{oC(QUyd*GH+1L>n=@mqCcyTOmfX&}|AcfmA!OJ$B;*&k(aqf#>0r*%s|ciU zlyLLcG%5tR2ef!JNryb}&^Q6#VT~|>U=izb7Q0R_&bz)@RlKF8l9I;CM; z3XGEm3evCvz+FKcL@#%vcV@eW&W|vTh&!G@!=O9!elni;?w`-DH)y7hn?WX_4WE(2 zF60q+^mn<^x7Mkb1IN1pYayeXLD17M;CNvXY+$IJ{c&VGMVNn70Cp~%Fs#senHDD1j`*geABGr(-L>6gj#&I2 zCqoX@t6zib|G5D+0t$*#F>anFVd#;qblx0hzI?tpYt7Ug?o&fP9-4iu3;c8M|{ z5~KDaP%g+31jl~*%(mDKIev+r*)lPf>U%OwxHSrWKuo>4A?5Ome93+a-w~?fjDR)I z1;ZI1&Hn|_$N*BV!LgPij9>}#|zxQ zU;A${(lg*ya%1NGarTw1(rX0zzbdB9bx{K8{~^Eme<+yp8B`mpUOn>6yuA`kvlT&w zC>{@DuYExquT}G3lAm=^jl0ODSBXl4;46>s?-B3i2$s=z^0zOD0TGIp2Ih9{B5?mh zz=Eg|+Zy}YphuriARhzjY^OHEwv>UbhudTQQ8b}2Y=88wm$W%BR}n_B7JM}m{KA$s~(?vUth#OB10 zh|tiy2ESkWx1gRt?f0Qw=pPr(y>$LP|5@RL*KLt}w?|1`ohmUYX%pu4awghmy_f** zVs-N)aJQNJa&7nb9T8Db=$|h~OO1rr_7e~&%3 z$C5}wP%aC9BGsA95ZL`~1z3*fh|dkDC_hCGz_g*NX~L#7{R(LqA%@tol8~g=G!9^e ztnYR3ya>L&{JHXstaKau^|f#yKCkPR{|u+lz|1yD{>NeUy1$6ono1#g>o1iA0zsJR?X7Qh19Y<&x`XXfKoPKAO#0r_&Q8k>nr@R%t z%N+AOS>I{)5kgBhH?!+Z3M7H^zIz>Y|M&k4X3$|}$J~75=5;>D`|;QgzwB`mIsW@1NmZ`Wy;zRq3HPcEN~WJ$E8J>~sEfKa*|6<_Oh&og;Shs%NYK zKJy+dR3l}My+#u!D7lTrCFFd3_^;%wpE|~nn~fKHDa4&q7wv?MjNKVVOnPequYgjf zo8XbXI=z1eS8mam9??jeC|!FmJiPAhAE*Dql}4ER8aM0Fvz8Ww@VftZvndW;EW@!T z1~+Tf3_5)@oLe8)DpmZR%deFR%p$k;=OONY`upiPJy`VHLoeMJJD)s|19ThkNSf{X z?vkY5k>Z7# zaFb~J3Qd&IZZQ5#Fs2ucP$>z{Ob!R;xLz`1=@Bz5oJM5({xW&iaxA#GC1Y!oBC1I3 z`t5f#szRiaCx(wVg+OmT<#jPbpSD;D5Uak9nEucB{okJx`a zD%nB;5sqcX%B8ZHZj^$j8gy_;`Tf+>H^H?UI?S3ydQ4VpKiT`^o=JHe*Tf$74F7~{ z02ynIkCy}AB8RNe9y?6q;!e7bqot){isqu);(YxqMq(DekO&WAd7CfE%v4VAWE*U9 zRzk5_89pp7apsdZ9Zt@bcKM5jvS&A3vM^ZFGW74hglq$XVM@esxu}=++nsF@7gc`W zhB5-Kx2TxmN!z+I1S2y@QsjT)RRTcZ;O*dJ*u}PG{X-+++4IdpzD8f3D0sjrV9#Mi zoiF~!L9nbdsN4h%GYIZu5e+p0G53mk^GBX{cpsx?54G5>M+~#F&OY7C3&+}pyA_4~ z`Q({~`YM@S)ORSm1ptcp3>E_$&$gC3sF_@-3hfKNg4#;2ReLJuDHp56 zeQbyYXDtk^-r<>jiDJOYWx4-I0U+L(`-09zFXN;NFb83VjaWp4Ee-k72C&5tr*gOs zmQRW8Tz^}S;|vS!ty+kee6j!i@_LyNd^SO8`)^S&!vt)e1`m)ng#V+fof(M`LC-?y zO;xtVyf#}bVSgYRDQs&eVIxqne0ZdK%TwVGm^5kf7NLkJjE!!uZjeFP5AD$>28LgL zEo#S*K2h(E8+~WMAA#IokqnCsDVEOALWRo~Cknz9D}yvkLpZrn)#gw7s}w<$bL9g9 zt{x^HFM?&lUiiNPKI2!WGWTXwx7Ax&;gDYuPudE`Ip~E+Txf1w@ML~ko%(3o%-mm* zyRbFb8ma7^v^hQ79d6`dI@dtG*kncOLQ_(3tkvl3^;b!|Igl`1Lr%ORd*n2%Z>xXc zwBs9zT<4#N3)KY5&&ba8ACLaFkihtbT(*xR5FS!Zb|&QN?T4tiTv|5JqI!SYFSFS# z`BfRV5=&v*i5WC~RO-B^w)v8I*4s8y_tlJ^%g7aeSx-~K#Re_s6!^aFmC|sl#_l`9 z;J1swC}9e!^V)*&?7UN^4+g)t1eE%Ed12iNIx>A+oQ{!({Bd z_}2U{ojR7RB+dJ>mnS9+M-7CKQfBbV=ENt8wP3WX3}fj0v3AE-YL8mdxFrcS zXUZ}r$(o`%?0(a}s6O6SN50lnWIL?p_JaS&?N$B2Q#nFBd~=!NJi@NYEchp@YBWYXy|p{)7%6BM*@iFRbz zPxUvVI%4o+77F8Sx;sK*8Jb|)V8Z-bPMq52@kn(N{1HFg-1ZrGp#cE+@{ZNCclk=W z>P_gfmR?QJ_-5L5KgJ#I9YYafb zfXxxb#k?8vrB~+*iCjVG)Z1!J^dvsSd{Ny1H4KL~Kz?;51$3F3w-QV8m)?NW))se# zrOihN3XffOMgBP z2OAd#ZF{|1FvGrFoY#@9#)+5WCNTDX#}o+cZ_4X0+jQ@)M7n0y3E$58dp5GE_npB; zOgdD{`{_Tb@dkdu-A$k_v;I#+1wEnI=C#9U5K2H41z2h;d+q5=et<>0!HrM;vi*nF zum4QhTUJ-gqFw~j95|QDednU05{7}Bhr{Hxyn%{2+o`$$|KHxuAA(C6Dy=ra)?TrI z$~nnQe1fIhT7!RH)7sh}<{cNy+C3kA&u*dDv5dSPTU2q`f>In=$w9a^c~mPu%ir0= z1Z4$cpQsN+S^zt3%#a`3t1I4RYmldKH+L^yR}DyoR-z zm$G5v=0S{CXoAUv0)gslZ>@yrqa2RHoJrh@K*YKXcmlm{c>A8HcPf_(^`EA;gJs3d zUBW1(O^vUDymA1L@P(aFJxDmGd~UtPyHZLShY++Mc$~-qUGEIesEOxlB5yQl#4B%j zstI$xUH#zW8rlgP%Z@^1`IypIrJ_P)Aiez;SQIr}`05T+n!hNh!dPhaI>&@}?w@hI zk^1$Pn^coWe#}S$W}E8Vbnj}FJrbP+JW(Z3LB{O;smopSQLg(3gyO?g7fY43HQT&D znZKdUHwS;9L`$?3>?9s4jXn-aZENnS!wRc+7&U&ZW5)z_s3SX&_=<6{WvH>+?zhn` z-iwc(sNgL)tcdveF$v%AV`lwrMZNxXnlJTAm*N+W`VI;goab~g$v&fnWMnE=7u!ry{`!e;ZH*;c8^XRA zYC1DdUgbvev&!I2s_HkI>Q;)cH(aDM=_XYEKaa*J)QPiIL0tm*4Cp=n0&YyN z&y~=4tTmQxGHoxQj2qcp<*Zv_&o}&;P-Vt-75MDMJ3Dzlz@`q6+Vc-~z~yzPiX0b$^?Du_gW42~4FxB2xtt z@5sn%2hU13{M%OZAI&S*Q97(A)!)^&U;jE!tzUnzO$|rJD7_{VOWCb88EG}w?y$k3 z=~_f3>mZD2_F?HQQ7|gFi8983rlVt}VlMnz>COY_Ik`DWjd~X%bvC9Mx4L0GDCvJQ za10%CC1vecCv29x?me;3tUG#ozj)IJpVjEa_H_g+%V-hq!qED=L#4*x+@>5UumL_c zW=5s)LN+wa3`2dEA2*nVOyc>6L0#p&@sV~L>2kB8*#4NKlkqyKy0`QDoZ~KphieCM zC<0{Cxm)n}PhHZdoi{AnfJx}3beq?E0Z>-hfL(97f7eE@yTDu_0Z$;`ckx%0anM!l_#cTpJn07QdRj*5kXfQ;x=mrJN>-)Z`lHql|e1nzM zwS)efWN%2KOjVGO3&$KbHBsu9Pef`oN%A)qxhy7O5_y0^P*3U#tZZRII2YJ?^AwPfq^zHO1 zp8sGHX%y8@jg~K&okAeY&bH>*rNpR_`~;ya^O?bp5oZZqkY z(?dTKNYuh#qDxqW)oh(`Kvwe`(|!e!uU`uq`sJ*o*<|rpqd@oV5n^Fzo2zSNUq`M1 zlh!X@_YKUQn;qUJkuJe#!R)=T|G=CXEp;ca;%I zX3w-|5)M=-=>`#*(VbqwtQH}eauupz(vN7`(Z|pCK(nU3Eaw=Fwi=z%Zj|Zt%!~M0+&!z)>XOl#VEvttffbBk;E=qyX8+!cgxxb z>l})<_LWqD3TcH_9ne+PNY5A$-bb0TebTNCnXw4#v!FFlQ1;C_t8jbEK~iS#Js+2i zT&r$4&9^A;zT=)K&sdBZq@%=f43&0$RiCx2$CF1 zXZbnPpQ1M~OzO$byLV_z+w~QklteU?s<~OY8ExWS#eIKOf#P3*l#@p{>$T{) zV`q`=l@k#A#cV)j@lJ-sXutL-V~J!HXrvfkL0FRExY50x>Sy`w=Pl)8`vb-iF|JrO zE&B$f)|o}h+wXcw?d_E4U4v;~cy$8LV(JEt%%T9geVaeLfALMdv8pBFUGJ$9@jXvX zm?LXN@`ASjR(1p&^ZD(#xdM~r=RDhHEvNn!9Q4$H(5%igp!n{@k3(qs@0V^0H~(V7 z^S!YUGD{_JXl?1&v-pX#l}07g%RTWE-h>tpC&aUhj{w5o`W58Phw<;JA za;(H-avQ2L=NMrtE#jGH3D6grO*FI4%z$;KF#E6|leH(Zc!*q2v;e zOwe+`gy+#5+tZ>-Y8&_a2H12!m$QkZdyE^7GnY+%J4U1IRtAR9hpg}7igQ|?VU93L z!aQVJYeK=Kwb`R)iTK7)kWjkm(BU{(&XDa_T|cqJ_nT<~>0PFehnDpn2U^uWa$7Z* z&@sc)Ra|(NB%c^bVl<=Q&>iE^EQ_F}C$GqMU)mGC9df-o+s$@0076&2CI7+=z-a~#jp>q(WPk~RB{4BE{mhXIKPp*h5kz~j z#5owDAW3`F;ic-PIdFUqEh|Hi3JGU|kXG0tNu;l5fFbD9#n+LY7pfNy!(zcGJw7xf zs3j8MPqARhbIvHaO4&L#GsMWL^^8*o3Gm%a86GJ&@+mRV#8XQ=5&sQ>~hk~ruya*VRd zQy3#;9EBWIdQ*X07ftqnwkyJ}sSt-6BEU{Ya1btpVPnoLq;bVzTAR?p(jrgl2}0yF zMNmfiy8q9dNl-@3_Nv?dDD+Hfw^*&?i#Dw)H<2%}&GxdGYJk<5tHj$Fb)?vQ;?`^T z!PTr?4cO)7{IVj~>4=(Et2dZZIq$&9ppU4eq5#f_(o8s*?cY(B^x9I=Q$g}@oyd$1 z6=jhwpha_BL;)H8#2}jX*#~W$&_LjN6`Jh+esEo$6^jSQ-fR$iG`M1O+5d&HU0yjI z{oLhClJVWMM;Ki=cI{Y!0H?ZCE~ z@zUyJ`!t4s%7og}1Cjfi!zLZeCgXV0*{_d0wacl|O!#bH47xvg*t9u5QnC)0PIH_Z z7GJ3w@Y1u1Dl1@(=X3;E|5E;xC=BXJ2W9elu(bE!amSF=IKJ0wCGgtY9gL9sAKz+T zK2G+f^ZH|Yb>8u0aoug!qpCMMNq=W{*gMhw9_?b-*?FfwbcU(|=y##z)8P76zdn%c z-ce}KWma}$YW~vpj3gm3yTH*xv~)`t=$>O2F#Wra^-+s29%sui)j|r$y~Cw1E2;dqEII^u{b6Ge?%}NrI@Y>pW3JSy zKsh+oV*Qbm`191>Rz>K4^Y49;F_hg z$h&SlsxLc7%=LGxcv8zk(>08jD`D_!x$K2;QrN>~G^Y2EtN4CxOMLV)!D0!6SKN=t z@#-J>#$BldJ!b_Cc})h#gPkh5;&Wjvsp2kZA=Z?f8v8P$g%TJO-pe_m0eW*r5U zXij|9-AqE-ge98;f%lHNm-95UP`q%6e(6o}$Q)pyA3oWmFF0$v1W5VA)f{IqG7F}~PINR6EOXvdE_j$zGyLNoynjARKRU_#T-!ZZ~MzxPz8wx%ztX-``RB`qA_zLF}WN$v&KmDEQaxl#>|M-varQf<=n=6yrBhyeY zpED_f!GTt3|5M-Tl+%tMOy&*svO6nsLGj1gVs*~R1|Zd}^)!^qtZkgVvVP#=%W)nA z6?fAgw{mRo&j|R~ZHw0*U4=imJlH!=d5&>Jw+tsTxiYk672bF*KP3A4EHho;z!pL- z=ZHhEhXos{DRv0RcHEH13Ueuo#IhfkjkT$76EOb}M72Fx_5M5BMe3>kQLA1Mx9@B2 z@P0N^pQ$LQyb=9r+^pYkG4aRw+RP8)py6XqMY7q`nN=4w)X@|+*A*SwY zo~mqqm};Uq>AwEr_|^*(di`7eQ9es>avD;>mo!TUK)<8Usa*1C67+4yYk-vD?{#DF zbm(#X8LDKsyH|n18TrZb&yUM&a2^E&=0avDzGOZj>%7PiaQb_jh0 zn6`bJzrI=*x*3Hz?_4GpMbG=5#mxnA3h5|%-LkScjwitE~g%z1uXu}aaZkjednPLB}HHh}( zt_Aj{T?5%KDz^>zYyldllkjB1xnyxY93Pj5I)jqc|4i*?Ha@r=s%SM@kr>P~4_iBr zZw;)>*Oe?-*yQ`9#rYBeAEP$^Se_T?#LA~PJK^Rq+7(*&7LQu&0gIS~QTI>zFUC|v zO?G?n9xVSd7q!nVaQ_rFTeE|tZc>d-pYG$kpR=y=BYW%f0Ec{AjDfb+enS;0$5UrR zE-33B&_lCS2d`(X7T3Sxw7Ra$N8b;$L)w$rAFBN>gkCBBvgn4~UW-UyvLmOWdLttz z>6#oL<<_~)3E?cTBSG(zgnzD8H<;gjNsg&8DvjFbm}x_9t@q3&Asf$$86%?YtMj1u zYfph*4MUe+{<3(n*;Gt0R}VFv-25+^>1NL#eP_0X2$RWU2-^7%2J}7o4Uax?aXESA zp~$b+$@4Wb{`_d1-MPVq!?8@~<=0&M@G1Abb?S6{#GB&U%Ng6@*#euJn4stl7Gm*k zLY{w=L~e%g2Cfe~kfopKcJLBew%$cml30re(q5qgGttcdwrzou(TU}F>jgYNOnUhK z=;6X@J4EBn2lv*7E!$%gN5pGKF+2kupXxv&if)rkk*>vQi#G1*l;`^#R`w*Nj}tSq zd0~v?Ek|^A(Mq-%lW^@QZ0}qp=!2t6>l(N@&2w}5&e5_C#VorA?3Fd#HkR|X;d3H3 zM`IomM2#fByrSv+v<-Eq3~2ybH=SS5aGS!&rDUY3C`S)6tF6SO6nS8_`FIRRVjjcMjQ8MKjM^NrW_pg|Y+D1( za_#!_i*qS!FKLaV+*)(=;+wvnuLsP4D$d|`Rw6c?lb{iUzcj4}A1VAZ` zPlXK4>epx62_7P_X@|dRoPH+MK5ZiuLpZl#)hb=S&N5<3$}%R8ln$OM1RUS^ov_Uj zpMQ;%*0B=cg00vtjubfIL*epjXBa2j4%~QAY z_S9~rsRSmvtMm8q7G5T@8*;}|fHiOI*65q-!QTcF0JnWOg>Fq>iUSd>Rdb;GH?mG{ zFaAVl4e3P!-l}puK0UM|YIWg6<~Og>-#sJIGEre;nc}A{l1W`SG0%3rnK=Ra=7D$m zR$vo_a1#EhZXhP#K@RGg`Y3+ajjRuhmai!sHC!J4F7U;NFBb31OsURjtP0QBDfF(2NObrv;G6WwH0`D zknm%GU z&-QC{YE0DVe2QzQ_LA$jMIfU}R{$0qQ>sc%EKxUKd1>lq2Y;p!qXyYJ8$pB@jT41? z`S6tMB$v;dsd$$D6YAcJ6Xu|9XKeF&XVigfga~W4m^6(_tfmj#PFt2-fl9LJfsb1W876=mhu{ zN$MYSJ<~^KGTs^L(eUcb=kq`SDRGFZNMWM4hFim~#b-33Z?^p0$>l@;`y?mka(}w~ zHF{EdpkU(Rr&f#U$5dARuo?UwNkSEXM^IYkuIJ%=3Wp#I*l_2oLBuvN>04zm<6^}u zXI#MoVzSMpShb^?VRf)u4vAKaiKrO~L+H3GSHM`zLSi+$`RW4 z>sc*ygL+gpAbP%7{PNx8ocTjh+fTkXLs8z9RmdlMYi;WcZ4e2^{lAYW-@WepRYQjZ z@#GhI(LCQCx3=t2McSlarit&Jof@`rtGe?h6L+_KJ~w=+?tf6Nr;qsDY?&f0&i>-kVmsc4@Fl^}6a+A0;**>o!9CeXA>d6xTtZx)p(bAvn(gE8g*B0v}hB-ncn zp2G`!go$OaAPjrt>HO)83anvuKog3})oqqd!V`sTlA&q&Dxg;H!LqJ%QMg~H(qkIN zk#NEntf-vUZ9P02M^9~X4PAAI4uT7x9eG!RjK5n^w)%{27pjB%9U`y53ETTSBDs=v z@A@!svSO9@gGI5~Q;J3P+Q-TSP1_V%8sZ)f+x(qZ^OC_|$}fF}U6LyvIm6f%?M0Wu zz)!&;aiWcgd=0Kl2HM+&--my<1Qg9(s1M>yK9Kf39h<5^g{*c*4d*j@;8uW8K2g)s z3bo(r?L;9r;L%f5ORdonw6emARV&2ma9=HeZHh({U`cc2L&CbHinQKMOL@Pw%~^#g zXCjAAFF;GpP}MhF`#lD4)E%7YiDGoT24pxWGCszKPu^(tIi$z6q^ zwvXCAxy?|f(Dwm%H=G_!`6`pmbXCG@)E9EgeyEqntv9$Zm}dJ1eHt%^jfWfNkPB6o zDJc~4wtw+#r*_8-NA7MrAj(Y|H4fW5rym7|zXw-*j&q4zCTKWe&(dGb7wsYRepSzN z6QQELGYDe;!6$hQXxt~0-h(0>d|pQV(Q)r^QI4c6Z>X5wOvK2IC`_46o74t>_ld5y z&!{J?NVPqLa<(jJ=y08fMi9)7a%~?1OA_{o0Ehu(x8KU_5yNWD0@Lk7rt=p2OUoscITM^dgFmwoK-A|JC)%q^P;B=`-MX5phfRd&^Aeo8$XuV zHUMAe9)_TWPIXot$tJr6X9sNwi!_LRO54rtbpb_)HY7~CkG{n^TeM{rR3?|1o3PLy zZIW`rvSaU!H^?GpU|!li1lnpkTvl(E?{p5IyEAQ>;c;KqS< zg(Ta#r*}F#O|5Ri>PE$n@cSQ4@yjbPW;SJUn*jvS=DSRZ)LC7+qVX7fhI4T^CyBip zrCQG34B&k76SYg{~=j95rNBOE1WtAo-`BziJ^Ha?srPXBE= zyWhNxR@zI@7vuLK&c9UJowJk)ZpG3@ph%f~W#4$<@rRu=F6NW0D`HHv@kPE_(N~!twpX~{%U?*$ryqYR?pek#RF+_{o!l-ZTG^nIw zSL693TnD@O@AH9?eK|bzjQ9|V*73$|y z>WoZCZa-oS{}{+Lf0|Qm@X^J2^Cc2UQwpKKk0uc9#N>7|+pO>RQ{yhk2`3 zz8E9h@KEQDt#2mPzsKjWX_w=&r|W~OLadlv3XrcWFElGc)yW(;F@-dGVD4#q^yKed zuc(AO$$B~PTF}K5@UGGeN_rs?5sa}$moCH;q0G>y`#=)xGYu(c$16k zT-Q-Lxg{Q)OCGQ}i62SwZ23^)AH4n=URU-3zP@2V@6YU6}cQS~bmkIDn0^;3$>@L=4e z=PoV^n{DGQzfgzpQY?RfONuOTtjcThkwk0;$<{%93L%^|x zy@VGX7k{j))+&upFmu=YG^dZDd3Jvf61M#b-GGu$v8h>W03PA!*`8f=o;*fv$jN`= zv(H&Mn5^Np`d0f?>e?ew9vGDbr>53YK7?q_>rQWRWLF5Q%vv+KkYp4YE0v6(F8EW- zdTzP&4sW=_DlZNcqCK0SV~$ThmH^@bjo?_dwev5BvLhD^JReuzCQ8t>{2V#_eS0S+ zA5~eIq)%P=N;UXaZ>8%f;?7H_R{jG6kCY}d4y|T97E89T%_%3J7Di-pSfFOCL4%r`k;-l>gy5Gsr6N0~H}|7R*?)ES)uhS4o%vq+B0htM+hn zy;IL9pfVM~W{hcU6Q%yG1;lW)N->j?0_3@19kv2&@5Of5^@G3a1sh0}U>&+ml>@mW zt=~h`O>JD8z0*zXA$-LwE96Zdo`m8@a@b-#uz3 z;AFfYSS)sAouvR+@uU;i@Wq8bYklZ+tIGR0ZR1)EWZkkgw=L-L@QDD}XODpa4EzQR zIY;&zC{0rJY?CaZZ!^c8$LiF)@{gj3Lh1|UHuZ3C(vDIu< z*phMimu_mW_bcqg^8R}NzgMjymTw5(`=c%N8`z=jPi3$7Bpr_Wh#o|`V!*oi1-2b_ ze8=z)XW4;!GTgHj-w@}1xJ#8n{lav(NBU;p4YMD8t6C`U6|%M#LpvtB zwKBu&;dhOKhiV(TmPtlweOf{v{}(=uM{!WacW=v66@ye?B(m>S!02*OEZJ_2)N>_< zPq32Hi&Yf9M@$rw(LiE>W0M4#%X2*!huH|3{z*i4Qpp zvr6tF?TRRj&{bA}M%<0jFmXx4INzdI$Z`l<9w6>#T(jJy6iwFI_)LRSS6JsEQzdbo(rODxxj zHCM#C{dwRkKyH*`6mFSA2#ouW$3u0|>=lRt9tbg;pM*CW>mO{xF7SO0<)KANfirve zekgWl6GCs6Ad%!(JJ!3fnMZLUYeAi2TvmmBx*~kL;xdaS49qX|A0GI{$?i02PrzpZ zhbDsfgj^7drCf97@J6miy%)0i&>;QbdP9Kn>WV|lvKWC7`b-w}r9O{s)SPFmw>N^b z?tN5=`B0N=HBBT~*&msu;s$JsuQ_FFlJ1@!lYnrAE@mV*yNvb&72hTE6DrAXv)K#YO>OgB81d15^M1jxprz|*|G^KGlLVkG;zHwvF6G$2PVzcj#Q^9zpDRl znq=E4WN6*AWR8JfnwWD)#i8#JuJkz!!WDNbA*w%jNqFyV`}?kW6WBj1?7$t-MCqn3m#VpT<#Z0V9p)etehS4`*k<~zdu9HGk; zP9Hr0-eE(%22z&<26gMTz$M(Bvc9_#aD_?5EXizRC;0J`uyBoZuu z+u-n+fdmse$D3Yd2+tAARs@A8AT%Y^&I6^3Eiay>>{)NL00So8;lVh4zVly+ z>gnExD$2vQA3Y=FZtt0)eLxENzT60-XsCGZKxW+MCA{*N23_ zI1Y=UFD{2X7!mqS7oQVQ5LaDPBe%J@Zle#_rI$%;6CI=+vCIky0s9tJWYgIBbHjy7 zcA6p5d^Jj_y!WL98lBu(9c)sk(PqTCi^v^YE&~;By8~`hmspqOv-0V;aEtWw7KZ`@ zk5zaCQUs`ko++jgi zGiBkI(458YldroJn(K6iCL<|>1d;eEuRzDBC>%tQPaO#yP_=6?edNDE66HZr9r#;b zOMim60e;YuCDS-IMF|!6j$magc4=_tE*||cIZx8i)cthv zz6B^_tAd4YakK>48#bAKP(wiVzAw%pZlqO7#W|cVc`Pd1-r0-Y4c3*=EyCiN5Q-2# zrlShxK#{4`aq*+7cRn){QZL8g)t0weY$Aq+Q%Rg*(ly8(F0j?io2C&1>@RD1GGY$J z*cxHG&>K&w&04tDJ*>+#_F=O>wPwhjmIvhcKwDI`d7h9fi(UkC`@wNl$E&zaC%>gh zWob%p>x7O<|DpW6z#mP>g{JmMROq#6T&B-XQcxTrh$t|@(di>=n%<6&%Bh2Kd&6vX zqZ{JsOh+u^a7q^RZ#-e6+K=4{|<+Y=YTx3rzIZ>7{&jFOJe2mB~czVukQ zHj$7Dn5b)EX|14>ky9V+uazwELCWJ6*wJtEb--a*smNI4*iUl_q6vTmw2oJ;y1eVx zD{dG_XiaA%9{yMgIsNNlsTNHnCc%>Ig@>0U&sj9JdG5~4p!&;C=8u<2Y(kyGT%J+{ ze8~?;ODpw|z(GJl!iwR2hQo@z@p3twMKh5>5%=I5W57l(#yi7Io636>LRtMpwhuoy z5R9eHp64S`#)Y|XZLP_S$Q1Dx_six@OL@9CFGDPAWsNnz_x+COb>bSh^XOM^*HKm9Io zAc%>&v73|)$*Vlo%kFUNnpmig*0QorEHuy zz&wW2=gs`6Ga554V)#LFHf}(lM8`Qku@<*6yauRrL)nLnzL89EoX2 z@i6Yku0sCyBn3TTJ7MOyMLeaUcu_>Hc&ssQJWC2Mjt)uI31(^ZqqmkO_piOAHS)xYxPEHZA0KD|{DsR}Cy{2B7V2Xm?&- z2%8yrZtixKr~UzCTT{bImaD8+9;W`_%e?N0TN}$Jp2jLXWq;_G#qWp1OBur+B1``L z496ju5Od1w;MR;`fnJd|Q|L5qnQ3HLX* zO>AuTQlVS<4tuy@$xbt zl{7fax!?A%o7QqLT~D&a!xlce#_E4S07<0m)nY9FNWwSh-jn#-_wPJZtC^0bW_qiR zqQ`7oXUJFgjr}n{%_qBJAQK>ytei7?7^#Q!1L4GyEydK;u|KDZN_?yy0`cn;ZQH#~ zrLQp}Q&OU;9_j%_MByL(yF$Uo{@@hCRgR-9c*b1?P+f0_mLCU{cj}n*mt#qk=buDS zk>4Z)LSbviPlmT2Q0t5&O!zX_?(JR>ctHab_>$wk0n0Sr-}+E z+Z#ygw;&48cm^puqft5^?RZ?hh%|h&i;Bf<*zBJkKWONSe5wW%suyR0W|N%Fukx>9 ze35x%!xqgag(TCnNWzIZI_Sadjr#bVq3NvQoQ}@dZ7Z5*@6ln zs5w+hu}v53(i@wFbO=$O`nD1fLZ|7HIX{<6Kb-2`125!*P8hcOP00Yo8W|h+2Q*C) zU;5OoTS^T>n5q!2ZbKJYM7G+?rP|tPxi3yONjecZdXE73KRIc`2aWO`V=kW_p$~i# z!Nb~t0h+Z&P6`21HMBxL#GnVuq+Ud;vVOy@=~qokRvMx0QnARQvv}uxe;7QMZbPmA z&m>VClxZ;9EHvS^p09vMfY6w%vCn!3T9v!m1jdpdn{^NyBYgHi>j3UwpX$=bjFTkL zwiCS>zN%Kz`+mbTOYqA%JP)TI@JzmXa4*FKTBT&=E0D6)XbzBXsV^#mtMLd(M67V+ z6G(AsHmcLN#Tf2NFYagF>n{lQu^lsaniumZOzS|`Q33A5Q*V@Gcdu*uOeD(S72|An zxc^zFe^n}&eLc)y3S#oprYu4XYVouAm|S$Kv(_%11*TE1H6Q6|6Pxq&xmnJd=4x2#@oJz`OgnP1qW^KkC|2P}} z9gn1sM?tZDMq;VV8FjAPIxaR45<1=&L?%2ovEV0HOk7+VShD|p_uo7A{y=U}mXe}= zx;vo_mmS#I|I3oV=eX6{E%ATP{8uvBwkweZxT+XqRfwOL1UtJrHx3UkwebX;7E(Eo z`osef5b9V0DS+&Cj_CiG;{O}}JiZGT0983x)ZEZ}xa;};^655H)K!jYFl$8hfsQ%6 z*jr^|=`pFz=a4vdf-Kes$b9twzZ(Vo!Xh3Xrt&MJ%9u~k&DC}A0a4vyV*}`o;Bek2 zi9*T))z{bOB)>1(PfP-*^hoPbXARX~q9Geu^_ak_Z+3#*(#v0rwO7X;5)wi#H-L*- zjxS4qiG>r=+e?m#7iNKNgnJl)@hn9U-C~)13-NQK0zRJ*k>UkmTnd6>5s^aIjEJDj zK(P&>uy9nfj>Olsl1O0%J{MOeEH3LJ!|ieZH}88r{rD=nHM|5HM_WP68JycEKb@zq z!UPPsnBsp~NOZP2CNOEDF>I`~`@*A>3WX?_1~)d&kSPk=NPu$DOY{X1TBTVgji(9Q zJgtmcv>=7Cu+<=@@AC-<@nYdFgq#~&Z|hSn@2Dqjok)aw)ssE#pnQFS4GS&Gn@nNo zsm5X8c&ILWss)HY1Zi^&H{nbJ1n8>p}+>P!p3*=nba8(uH_#ReeSoi!Dl3M9R9QjobUb~OHThMT|7Ps zp=hp=*aJ~WF8W3oZxfT?Pf$VxJ!^^#XrFFq>2p&)woc6xc-Ux95)4rL7~(%>Qf$yQlO zl&s3(^8M00;aMWjD?EwiQp-BK8I&T|D5<+o((zQW@QO0fHxbi?di7bV;qCcGp$!(Q zjJQv8BKaF2wX+}~xgiBa6BT1@{@}1t-F$)|*BcEU11>{EZDFS!uGSkSc^Ph)| z(f%J<73`Lq%&*-w$RV}QCZkhIgsFj$mtNgT)DSPKH93eY5{SZ?MQM+FaeJtWCNpXi zFE*IU451tXxqj?8k{LDh{$Trqj(hi9HG!ZMn{S=70_oxgk;7|glWs(Ur^Uy0ROEzH^92@ z(vjDJQ5nFQS0^6I#1^=;4Ntk8!hPVigX3b=GX8%O2zf($&pS~tBq=&EQJOVIds&a5 z=*a%_q>`&_T;!l>=$vs_ zKft8I1u4!Ctyu=POD)hL33e)>cB)W|$Hg!H15u60VE>UPCZ;XOlmGuw43LX;RKp!f zIw2t_;SSgSR9iuZ&1qa5R;>@7*E=ES$GqvH-eJCMM3AL0t=13>tB?vQ?Z-r?;75`t68ugE2YnVhtL=|sk%`P&`qK?2aKC7}M;P;`&fn@EY(v8RWH+BH<;X}=m ztzZ@Q-C6AwA%D_|+$yo&$JYfH19)>y5-uIoSpW;lL~OoQ{_a7`8#C!jdstVn6;Lmm z)C1FQAO%9CU9|e8v$L5@dWJ6e7fcy$0LM~f^dtPnO`#wkdj)Yx+(9&Z6ubblZj|># zE^usv9_73hStt8%4(0#L4y2#|Gg!~dEgA`EgT;B9$tq3#_S^of4E0kAvi%8W7X$z; zE-q;xLLsL7;jbYmde@69mv9=c4}FYu9vvMLEd5GD4lrCI==28d)iq#( zz=io540%}3ghpYIF1=^g@%~-JvjcWfQlYHs$)8?*(k9Xt4j7|f;=lAS4nngkGq#LB ziW?zA0%^Cp(DBxA7MBHyf2~{kJFTJ8WImc}IIA$b^%AxB$gp;U56u%g@l$xvxTqu- z)a#$E*=>e44hq60RuKAx%2>|$i|Rjt;W`?`e-P$?&3=z;yEN=H`}c3BFZd+nZSSAQ zEo-v%i;|1gFr~;#9T#%=_2ZzB%%Yn$O1ssWY;T=Jr&#|5?w$Pf_oV;3KDQ_I>h4&t*F3L_+Gzw|38)D?6ot zWUhyd>&auoiGG{@u|R(`(VBd`gFF=yj{IXN-<7%{j#2t~C}bp1(Y=ojOihM6NLj!) zqWHbja;U3z|D2<-Ajm|*lHj@gYtSF<`}KAAdV=SWLI;`gkl7$Hj%<|2xBoNtkKMq3 za~Gab#Gn5B??)h!_5J@MY;}V*;ou}Xwhh-1;SE8`rSp%mx$PnQKrio+9+V_l^WafF z5{v#{Vw~e}nU{=9-7){^r^lNAp86OTVk~~1bFkJ$G-TIpjQ;F*(NhO^+7Z{gHcW9B z?~g9iMaXn^z;PCVDUJlIA%onq9wqZGEAveHpXM07M?n^VT#mMG4;ko9Qp>(|9$uOb z;|aCE3xY1ZL!R%?w#HArJzjpJ(>`0&ZOl(No{!tEbh(qM_yz+L^6?(ldg26e{N6tr zz%Eu>jZQ(5Ya9lhh>fS_JpK2J&_cI#N#vX_hC-4?9xw*N?NqVeAlZo*DSD%5lmV)B zi-B7=nS+@Qk4vF|*f)10F5u2rVYiB}TDdcbDV<;G5a~IBy4Prae#KPEi>u@lu{E;=Hyn`2^ zf{rgETupYIC~T;`NxqzuCF1I%Yo4fr_$bmdZwf|ujwCBLL`$zL_{*{DeRq!fm+F8f~{h?49^&}-(tik*efKzHs$)tRdw}Ob(2iBINPISwh%t!y+nrH>Hw#T z@!8>5z%lS|lNE{{p2t`<2E`+9BtpKxe#=m(RduTqihA~p`pX*9SGyyQ%RtO|a5VyQ ztI@KgaM&8ph9U?y%1)+mSc&RoR7|T5v8z_b1hpCgsvniWfdL@+89Iswm<-yV*Yz6p zu<6$pg?dnif95+IyHHhuc64NFApIDInw;ryQ*q>L2x*OdSI&8k1 zvZ*2*Hue6JgcoDgs|s{ye{01=P*?->#2tqHwJkNe{_#uh%pIpomO0$LxG#OOi?sc< zg+Oq>X}B^8nZx(VZs$}4(4{jk7I!(L+W*W-J7$31=FvL?#wM*1c$`+Rn02_m2n&x= zt}5R=+KWU;!aIGwmmUrTt5PbFyRix)xHdqQ8S+5)qYCWQOyQ(3?w6RpBiC)Dev~Wv zN|}+By~bE=E)o4r>c^n{r+78`jjAu?5<6OrvpTbic@jo#AFZJS1%5SKBx}XI5jM#g zeFE+wV`t4FwONzLQE155*TA_jdh1bcgOlZ5lq;pd$vRxuU$%NVv3;ONwJWRvNO+4vHZmF1?G6{0 zYnAr|9n)*fLFL!KB8R6^Ri?j*&5Jh5X0X|;#SO3+jmMRF?fIo%2PFVo4qFoIE zxd(k$K{@bcKvJ?l_`Dw^VRJuAk73B<#-r=NG6Gep6G-f6s|0VJjrFT3z`uwvZjjZV z8muLy=a`*xf%81`$mtD&9`G~-@##>jZLTq4`+1uUG}AL>rSPbM{-=8&DifGaP}anF zkoDE!4kM}(Nrx`wz{`hJz8UHKRx)|Z10ORNq+XyZ&azebpfB{*0n4BJ$3(PYeu&Nq z1P=R?0i9#bySJ#EUZKw59K!W?;^ht^Ki0#94mo*hg&#z&6{$f_kFX~~gfJ2i(n&pH-{YBiSlOeAcoK5j}ERC!`h+!$4@8*uuKWrj|4Qw8b()GGl7@`~=($!%NS z_5@Wskc}_$&yECbW;`rg;zjx4fpL!N)E(abNQWd`#!4t1N2zug9mR=q=_fhtu+=G( zIcrj<|CGu#|A5u>r%`|Wm?$K=p})fcaJQ2p3IZ-wYY5O*s9+)$UAl`nRYpY*-&@+3 zLPZ|6(2&@RXDuymWLjIaFu~jS8{WFA@2DttdW2(N_N31RTsb^{8xRb7zSmXC8OKr} zw6d;+9zv_her(RfLN9TXUJmP_R4w(Yy}pg3teGPAAmb(L1geEU9uuG&&8tyOr<4U; z5pq&lr=pCgx8hyV@S2X$$`6QbR)LuO!>ms4LQMBeKP6PW3Tj8Y&HTl z0^g32TTuqN3Sg;oRZF4Hh-y_w22;&qc93i)N_d+f0kINKyOm?&C<1W1CNhqe`j z3CVDz1IUqS#zX@WGz-o=Yg+jQ{ce_m#MB6fa6EEge_Tex@D}2BKr^cz;K)@rZW*M* z=8QAWj^~N%)Sv3eRl)o(v?UAm2BMe@6IjaB2U>HuUJJ~!rohISRSnFpg5%j|p;8WP z+C0lQSn;ZLU>jN-uj)d7{;b?Mu^HUej&h)rN93)qJ%HZYZAJ#^7P3Y!r}gs6yI5p3 z=IutZq;~>^kW9-0yEEqt4Rfz1rL^;1z43eG^8+NZz;nxZdnXkErEiF-iaJzYiUB+& zgs}$+0`U6az2^+o+Ft7{L42g*Fj8w+4dpElZ(`-05ebI3$fn<1%M*o|mc`D~?NRz# zl)yi~?7m9jDJa)a>d{P#&ok64W^dv2%n3|Qb@aeSwX91KqbKaWr^OGvF!6~x3$kjj z#53iZ9N;7%h02?TygletdDlp;tNCK?KS8WG-N=zv)^#PvoZjy74*=yZR4 zudnPu;DKO7?Eau&3}UR0*p`@P^`uy!fINr8Kf~3km_-~bgYB2l9Nu>Zm{<1Vq2DrG z%PKevZ&NIyeT{nCyk&@EG|1ukdoVr4zj0B}CeS$f!zK<-6=d_WZ##1Nb=ddjh0_j1 z)k-gW6m({}~IzziF7-qz)uii+9`#86f7kl%swSp@}%hhY9HUc$XMjF0F68^ESnfaGud>`UZhf% zA}OaKfct{Z(p$s(Q;lViziK@f!xrvanjzTGE;sU*`dweewd{D!@?=F2QL1Zoq;s5p zz=6$ymnlwx**$o`wRNK$K`IDIa;i~NI}2byf_}{=)#&8t=)TWKERcpDvs65|wGI#F zmI(gCTMKSJphr2%fkGDK8aN!T8PTqW)^V#r$8TP|*RjPD~tYknuTu zI6FHV$rbGp-nq^*z6u8zMUzxH5hO!ZXziJQYoxd5ie~&K#pQz}e=FOgrNv^#e{;kp z32qt1xE;N}C!uE77IZ%rB@J zkZPI15}fQAWX)Vk-M%cj%t|3ja4n?1BiXn!t2W#qSRGcMzi_!R-iJY4&RkQiYdqk;*o+*oH;tJY?5# zHPS0ojSkD4EPiKyp*|DE4qR+9@3H&Gh@Q3%FNjn8HnQOeC;w9)ci8w_1;jsqAHfe( zyeWv|+>J-Q<5QC^8E)@|2)Fcby8>twFK_H~;j0zvSrd0+GYIg=9NbQU(2zsbT;yNInTIyFhuKTa ze4`1w&`On0WE{$NeRD~SMN=qHYDpire;xT*=ryxGp{|E+WOk1TSTX3OrpnHhP+^>! z266}>(VB2kG6#H)`vt19tT|Lfso*`}P@@I+FgE24^jg|UNL>apvNaXU_oyGi@44InM0BBc6q!}zOdOfeawun zbSzrKF;Fgr=?m>7#T9p6Tx=LWBUA$1qPYpAOb;UzNrV$d-JNv^film{ps=h1H4yVuVek?G$){Lxxh8Fa6XHsM*ihb;kGJLo$ zyJ6R)E%0Nq-5V@P5=IqOn}1#Jo8IopQgS97VAvqNIeSWOF<0kmF(67EknUOo%H<+) zy3dR)UY<9(>-J6OYs51!PnyEAPswI$6yuUj>dx&x?@+iWKx%L1-wUOt7@dj z9CkopbM9ia+A7$_t5?Ecej;u5)uSR{?_Xa<_o^G>eiH2JEsuJ;xcnmaenB&9nY6VT z0S5j3xTf5jbj+4OX)Djipn-tI(f^hB`DofQq_Uid_Nw0|RZ`i)2xbgU%5afIhKgAL zzs*AQZ7v()=`kj)JMk4NP~Os2d;RC@ruU4m6Jslp&vx~b$R=^5Kgw@ zx4T%e2{u5I&Fj2o1pSgga`QYma^Pm9+?x}HPD*Xyx8gr0H;I*XokFqobMgh+8KfY? za*@O~PjVAA^D1jYc+R1*A)u+`Tbr0sJfV1kSbO4U2a7kakb{B$A8B716xSAX8v+D( zcNhrn7TgDScMtCF1eZYr!Ce9b*Wf<5y9I(f1P}fuH}`(;`}wL~6*WH&)EwdL-rZ}h zUM+6PMNZEt77g5^eP7p56?@P!K3!vK-$1W{Q9juz(tWmRrS}!F6;#uGvPeEtWUBH%Ov2u4|At32F#$nT?$JEB znT_&?;F$1gdkdv2J^Qt(6A-!poyRvYoJTKw}0)!v_hGfg^;7^fmuz{I^a;X-RMzl>KgaqPpv#*z||+Gy;QpF@#rGwDWRSTS&M zOdg5qlV@KxRmUj$*|vD-_Rw*ik-;D1jT|{g>E;eS)3gh~wQlka(pX>P90w2|$^5De$JgkF5)zqOId%H;zuGLICS4NZ7 zl}DLc7lzG(^(S2W6#yp{_P0sgz|s(cxJWBO0<8Z{$FO>IS`BG9NyA$xWyV||&dMT@ zkdcv5$z;LfF&i}T3N*Zmr||pUoejWr%=4@7x zosDvOMhq-XT;`wsBZSAgK35CxM4P;{{Yoe&i%;u|e*yi~DutW8l=~%0Vq#zf5zdzb z)COXPQn*0au8{&QE`SeAyw<}(Cpz`AuY6R$tt2e=ivPvggymhO}qw!NeO!W46x-Igy`j_5Rtk5P6lvQFQqLMM*Va5jx2 z$j2#_5*h#>%PMl53|ql5E~`4DO5GI(y$Z1 z?e;`GHy}ia?jS8@`j?D0Vg&c1RHs0r$*>`w)(1tApl0g}<#}RHLlkgtPVvR+3|^#B zC*MR>286*IDctG|8EX8%fr!G@BW2keRf5LW?t?IA;1Bb4zJsk|-$lU5L$sjTka6#6 z^p8TTlhg=s&>w{br>Lmt_4354PG4n$kRi~$x=NJJkrY# zrpP+pj+LXS>Ye0xKVqp6HII@t<>ZOh?lX%8YBL948?3{R8lciF#CH!NH!7>R(a%hb zMCjVyIBDwD9$W(L9Mn+w6$scYB$Vdjy+Rk%Xv`*~9-TZFmL>h!Tg&O6WkS5X^!DNb=5~X-1y`~{g^8aqj{-r6e-tAtt zblxVJMUPM>i8^fAG}Bywj~=nnc0uGT@*$i3t^Pq_VewGC^Ofd(Dx-%`x2dE^8tgGM z@nH7hIIGF5El;{w;@7*k6%)Q>EmyhyRW-Fs>w>}$EC|4Giw-9XJGSP%gZLKTJBq7t zSz5tMdd|c8t%cg%1C{R-RbBA?g@f@4`7@+hguZCS<*(5t?>?N(y@G!0i|#8(a4L4e zf4VjM2q9V#bPl}utyOq*^nHiO#Df*<%!gUMFU{?iYM>@2CT^Kt?XP_Vqj8y{FSZ9M z85ze&NB)gmM)6(m53bLI;X$d)5ukdIU3&(T#UrVRl{Bq|d}ipkFZ2cKVI%Mu$5c-| z{Jj49V;E_Ly+5a&0264Vahkk{CS7c#S?E!C%;Ol&wSp^}S)a}_B`NO1l9n!ZaM;!9 zL*Tl!B>SpA>h&AA4I^ugT%3KWsdvsdwVBZPWdhPInqtuP9ZG{l3S1%HiZfgzPlp+xMf2l(HQW5xAi~w`5I4PCd zVGs(rN2a9S(Ob$~9b1>%HX6c2=9xC?!XqGr=spj2;xJlpWNq~W-_pF#5%fj@DWbe* zWR)yWpcjV>eNQB#sq*Ywn4Yh_m!#(*F#LJjhX?OI8W&}|NI5@}f$uZ{D-J$MPxj&AHC;?Kl zSaIgwN{Ppjd!DSsib94CY~OTL3?M@UUfj2V6s>7R_x~C<0D~gZ)By17N zq9vgBd+3PoIdw@u|C6H z!u-LTt@82>x|RBWBW@ZQQPV#Pio-hDoP>@3NdHEhr?$Ueey=5B8fREN_^GE0;*MlNYmm=p*y)GTm;wCv zRC^n6f0-V%c-i7$&GMl5cr-vk!OzVzRHKc>G)%qY~4eUN8wkQ&aAPcImPkI{v_cA^IWuqXyWqnqh1+I%irOJ)m zUlj;J(KsX0plo8^x?Vf>AuV%R7e;3r) zT?D;DuteWU7r|bHWSM%tSzGR@Ekt4@>~(#Rh)w>PO2!oJo-e_5I}IRXXLU;-(i6%2 z!*}y{6o-?ubK<6(e&55*R4Wk6+Wv};En=%lmyyToH*GW?!&@aKCAyb1c}W6CNV4nv zaILe}>`s)*Y$Tq=BSfpwj<4HvN(IjT`4io4tqvu?@d=`72x|9s=`pR9l}p#^tX3(O z6vRj+7*x#ZZN167*aFKzN-1g$RP~sPmSoUBgs9GZPzAB%E*{CC~exKR+W+j%^ z;2XZfdS?jNG56Md`C?6^Erib=Gm1IVU@&{_>4S)NV+FRdeDBEm+hOILA14eLb!riL z>nwp!UKcyaM!CTfWSFUc7kwI8W?;Wq1mP5Q62kQK^vqm#r_G;eG`9FD6c4l*o!h9wG&$X*$Fdab4gY%6J=qnWY}Y)1(5y-j~h3Cch)lQJ3U-*CF_ zm$6P14{#J%`@!ll=fvr7jb$;B6OVj2V>*z$!De;@qh6^BmGpH&q81RQ(rHJh&S->7 zveK0DHdYVWa*S%|kLSR}3{D!KHRC`mLC~H8p~>>)yz)|nJ=@aV%}3sqp9CIDe^OBjz=L^a1`ejh14TfIlv7y-bdp zfMv@w@%l=3b(uEi9|V1mrYUYCkrz8O#_OVPs z5~RI}eu!{`&FCp^;aIplNFgoeoi+Elc1!`()8K~AD{-NfQ>Fyvq79df>%*k{$RgM# zanXX+#VivN?B&RFIXEdbQc>-T`;6;q5RlNMDvvZ+y^P6tpAKC&xI*VmzlhfleNJBg zz^pj&%jr%;LLG*4OTR(D`|_z!JXzi%DeEvAk|v7eqn{IYWI3z>)=l_mvX``IxV23@ zw6C-)e_dPz2a4n^ol$|yN)KqMWYf@Pzl;k{mE_rT&W$gFWe`bUX4P-Ggn2N$i+16yr0Qfdl+@j|}gpgL(YJ&GS7n9^Yl!mPpw5p}(5Tn>|)nX7u z>i0G)p1_t;aZ|-3#^prL9EO;$p+njHT>6c#F{M}(e7Iydc8~_9JYa!aOTzm`{({ag zrDp5^)uQR&a3ru0Iqo^e<+E6)`G{6o*zl}{+3LVNtzkQS2GZF1RBMhfoU_EBIs?1$A$4)XxUPWEsJ6!M7dP9qwgDuv?_1=-T1o7?z)h)Bmf>zVf< zv(IqN`1mkk^9$M^Kwz8VG9#RshBdp|5huO0(_@-bag&`Zaz-9_S2Qvy$!%Uc0Zr)r zxP`t$l2PZ^MqSQ!`^V{*Irx&}{Eay(n!!|nsyAv9d?8Cqfd)%c)H4u2eQvZN(n(fM zTbh;+mE`T0R}F#NdGW%4#qRHEF*VfEVNt7EW+HT+W7!Qz7M?V11r~`$>Lkw771Ucr zGn__WfmtbA-v{6+1tlM35=^ey(!MU^EGiyi*3wr3#!ZbtTmvt-SiRfD5b208e?xEi)cl}JeI)y)4%*U|#vqGOg_UK??1vQt@%Os1c7 zcmglj_gM6i9a&hG6W-6>K++wP+iSX8L7DiP0_h8O7n^zEM;Cn3pYiK(%)Mq;Z``t* ziOw7*ln*(b+%JPNxe+z@d7QLB&tf^7?#;5C-vl>{IK@v1(Y}=qdOh_9d&wkq4=TWd z=m@Jxg$6SZAo>v}h*x`)c>E#o=N&CHp@v;d{Y%-;d@3@;s!w#p@i}1>GT+RnbYkI= zy<(gSk+7)+-7b;<`Q`7v4!vprg%l#YjqK=2(#xnQy;CKsF2S1fn{bo*cG>j?+atyy zHY{_3l2i3P;dm2j6a^o$H3+%4fo~bTBms{4dub%_ZtZ6k7bQSHwx|rVSEn#k2!IU* z*?y}oMZQs87fGMMHb%0~P2xeBs7$r=<5;tiv(n1CS*SbRU50Y4 zpiyX|^}DO~B9jOR%)|Sh#{W!E=Fzf?8|Q#CwjQ3*Cc}(m4TDo1ya`n`tY-lr7v#Sx zMm$jDDPl9xH@^G8lG_-;j(qj{vpWdd$~&E!YCpk0sUUlS)`z8-B{wsyYZr{ zZA>sIPXY8*IuUTcaXBq%sxI#w5{exiAMR1M`#7?f8!;oM$xiiEdeexJif1`oJ-v7y znZmNg=UK9-o{l+(*8*#q3AZKth;F3{`wJt=v-?l{6<`98PQgrZskcJ)ca%4An3{gF zV){E88r7Q({>eWvx8ZnFsOsNhc|+KU>L8&j_@%?Qz~+mr*UbptF}FkSnc(BPB8Hq= zEqAFA9!kKsh)>;b#xlF`2bHpe%R%K&d@@FG!eI(iEpHZY{HHJOvVS?bVxZVUN2~M1 za@A-5+Ui9Rh&Dn58Y}`ldjm>4j*;JeQTf?lY{}Euinh>!9|JwRW&COqX#PzDCqH{N zucx3g&HbF$a1h}M;&X0bje_fKb~@foym!wJ1!8ZQ%t0eP`ddQPu;2xOH`rF z%(cWKvfUrSIeKqk8RHAvwx~zevH)3$p+RqXgtJOpBm+GTeT3T=U$dv5@4Q?f{(Myj zkIbDP)C(6ZJo`$E(>=fEZnvnQ$&m}wcyEda7 zaqalJa5k^nm51vHQ;Zn4&Ti{}#U>$xu>>U{@k+&Z&!T}PkreHFbzfxVU}EvAvRfoy zw5t$T{&M151sZVJep{4!0DS4#bT6d#g~Y5^1U^|97#P{ntOs`+@sioj4^M}_L7}Pp zEJpdNjVsN8$B4bXy(fB|X#bVT_jkX5P59Sb>;|n3POk2v5Jh?dtI1mon=jP+u$TMd zIqfaAHb35RIzA(lAAY9QCeK}ajVJo4DM83(^~3hXkusa00c?-Z;pI>saFf4k4z?J{0>6 z6tp?nPb*8N@lk9mh@;WgRtDAFt%^&b?_#$K?GAlt(_IlUlg}aaj=W zZDVrGz85Zk5{g7c0~YbTn6|~0s#RiZt}7Qvfnd_OPb}9Wr_45YnDJW~w<^=1ZLxa` z2n+2O26-s1wS(xbp5^$Ht5%_$i8%X0XBHESMUb33 z8ZXrL=dCsZ*mY@^L!WST^PIQ$@auUgB(FzeBWvDFUqyxLjJQB-h7K@rnG^{~-oJRq zfH?^BU6L%863B&*zAD7z^hx~;r$9E#e2Izew4UNnpn8{F7JsxWXS}4#(#$uE4dI3T zw5Dp5Gnk@?)Y^GiOPMDr>FB`^#T-scGJLnYzJ0XdBD8rsIe@9s>i0}T~c zn@e&jKc(c;CYX{*vcA$>m(7`7c0Ep(D`S29!wB^7y z&>TP&X*tj*g}bAe0gHwJby430Xl(TlowTr{7BE)4TVk%{w*B6xu3t3&&p?8LiFu`(P zq&hR6f6~uTDZ*H;=;YTGPv+nk2S1SFMDfGzQBJKwhod7cka>mW zXCrNUmrB?B5{636sGq)*kbnVoO>Sa-AnPpz^q*TvNW%75!3W!}t(kU7OB{n+ux0Z6 z&BDM(NDSj%1@YMT=TO;0-@j**INRG)HlsRc0%a-oW%F%utYf%!f1X^!`0FhI*G=s= zbqiSnjhJS~wDsD=q(b4~Bl=cHxleuN zM-)8eWYFp?UCjXYgw`A!Q^Ra?p~IG^eDXv!M%^3ldR&D#aGb8 zFN_^BtmezWaTlv*W~g=9m1Q&%LMvQg2~q0Em-cWb`nt{t(z69osHF%jHQBR!IFg2& zrAKTTpX(2074qL!SbtKK8|>D0M$~Ma3=sp%nXVKSS+O3G1_$r=umq4H)2g8O)2IW} z8{E`@4-J4W{Vehh9J=JGs3(`{$YZp4$)XXQam2mQD;5r?QxS2hC_Je1QYQg!?_pcx zza`S2&%MVzM+H4aMfzg*=y`5?uWa4BIjyRnQ~8B1-Qz^$|wN-b}FfaS174Teznu)mb*4E7-d?e z+4Y7!rvtTTdX!@5GdFB|ES}R#j*Na6X3h}|yiXkokwZsNNj<6}A5-vp=(fA@n`5P2DOLK+zRm)rBjk6!xfiHBIdrT3G>Df+Ji|+(}c%qk|OBNVc^$w*mzfV!b zj~3j|>BctgZ@KD}HsGV-oUAhakw4q)awBBe-XwCr!#%O?9V*?3IPepGt;+`i4U*Y{ zh^o=M{2X8mctTRcD`-{7;odUaN!-9um1mXIbsTT!LWP8NoUT@w+I^>1^_uj}iY2){@QdQ2ZIot`CSo9sL_g8UDqnoHWOeTMpQWO>^7#F_XYO*e_krH!f;Q85i7QnT%Z z025{FpB3|weaNh7nck1eQ)hnXZ^C%TfGXhy+!$T=DW)|Lt2_(uW+j^?yh?dcmwu^8n)&PXerr~lm<5Q4{ID4XOMeoy#^2H1#$ zcr{Rz^fDeiaVU4z-Td7M#^NWnFx=pel+~c0)J)@`8)dX&0GS3Ln#oO7g?lbgqngd7%=_0|6Vs3g4Mg@Z~Z=$nhY(djxVl^dp@ z*R;7@zkl1a*7DSL<3sWU zR>{QD;!7Z8@My(GGcb7{-WUF=<4+$ygrNArW_qp7sM|i)DTy*k%V|50TkU7GD*nlu zW8XN$N`I}>70>sU1hP1NktMf{92!37)qh-73=Q>5&okr9Fs{`;u?>uYbg5~#yM_6m z9=mSs5M=SWPITUSAKdsnR#!_IE29&Ba16QpVw-OVK025wto9$}&uDyr-KC$G7$-Brz69`^$|b(M|yRsuy2hYbAemB8Z_S!{Au*9d3{Uzf+A}9duT(sRg6pJ#U?L?HdkHJ_l79cYI^tu zA0k%hckqpPwB@khvrDGe(hy+a+W1=Lzke3kA{3pT%cj%hg0k0-IddSCAo9yGH|1VYMFznI8$A&U%52MlHB^WCAr2OP#nD!=Djki!mn@6>p~;l@`zZ zfBl@Md|cVjpSOX8Inno3yK?xv7VQl&_rxxHL*bA%d&pUZLLTnKHgbNP*yc)s=^IbG zI!Wh#Bf}&2uV-i01m0x^j0?8>5$LQ+asw>js?hK;j7gz>(- zGx~Ut7r@hONu!!(&a{a06R&(H@%M3;+KV9o zbJW7te^m%BDT(lp7p8$Ahhd;E_0=6pR#y1I;$kPZ++q^i5P6sX=|*4YGu*G$=BUf> z5dJO6>%+9`)%#GGh&;)gk)=j^=-cxZ$P7x!O~^8K(S!8l6?-Y(EIM4Y+v~RJcOtza zI{URdYt9it1_jB6UE1HfU`_^0CVyX=YMg32lFReV1c8vS5yK$r+^m1?#2Ar-dFpnvo$|N%P5+B3vJAd-`LdqmRPv!m0 z@OQk;zUNT7->rh7;o^tfkKmOf7|p`3FF~}87>}s2}rB^4e)?MNZn`Vdj29lXFr8pJfhJPDl>bUfA0G07e+Fz9)X7K!r=I- zC!6(%8?j&jCX=pb_klB(`L^$RZ}DwMP#7rXkH+biE6*j?=W_IS@?pJQHjS^|-ODrF zCCILJ=8Mzr5f_2S_5f21J_qSGjRKG@(Lq+Y)(-r~yZ|;NJWk@y@cE;*yv0}!%cM$? zgm;UgCN36rS6j}onq`4kx~$b=Z6|4LHd7U-QDMNq#t z;;Wf2Yp>rHARZ1556_)qYslie!cg;8p*8g&h0H6D`ZWaaY>#WrEoA-VD4oJt=FgBI z>_|%Y4ZO3cVpjYSMu+tJghP3~4e*{Jukb+r@a7yO9IE1WT_*pfQd``u*=I?d;_7i| zdV9tu?DD}Z;fw0|OURDUxWo(LHTU$VUb*B-sw>~&OAYpz&YW5IBy#7Mr}y{Z2DR^o ztQmHL`mJujuOW=dniaYrcOvdlCwhL)iUMm;u1cYz_*&p^MXz?}(F)Wji*yM5VkO1(|@T}x5kRj=k6fb&)a2L{F9%zE2Yeq1cWk_S|s&1U!QJFSFqrf zsPHcLxRi4m_lZ4~N`UQ#j0NJat<~!4alzL~J9xS~6xJ4U{Kzmb@hmyMxesYtAAP5j z)A&$a=#Qe^VFBHAzQz=|(cw$Ru|L*#wa>zOc1IV9zFVVqX9$mil!QxXDdGLzB>d>} z$o%neo#)<(x3`^qYvge=^N2Wsb6_f?9;}v@Rw9|~laMuGG|19@ZpBvlvBmNMk=U% z9|Kg=qaba{wO|`vPk3}FC@A*VQfBvLjo_oAEdUwy(p5Z6oRL&)lIB|o)%aN~F~nF! zF+BDO1rCkm%kGyW95}a)V=g=9<4b2O>QUB?o=*;fk0uZXlHKv(o|=%$mZ_=?Ge^Lm zdJ%!XFAOYXj^etrR1%StBjk(P6-OFBuIHJTLc7Q*0fwj(2f_S7mpLPW@>cMe1|PoY z(I?gBKQMd+YBzrSvRfahC~!sPgiLf<)v1)iNH3$O~(@bI`Pm`B^NU&NEDyz z)-yE917ZG#-{Um#?#uc)*)|xIYBkmHMgH!mNg>2n*9rrUM9(N$gT70BgAYO>RWm87 z2q%h^##}hK{*q62^)Z^|Qoy#y0O-!KK-3jU?i7OM?nLdQZD~{WRF}%gkz3YJcF9{ zDtR7^%MFEyK{tQr|L{6}lyn0K5pzR)K5Q%Wxyd4KPrEDmzXL5VOZ`D8HcKAoTE5O9etg?7@*V3dP>OItGbzbdh?K9nsl~G%@di7zDjS$eHsu36l!-AS8`7Jh+ON?C%M+{PSn;^ zB^C7cek$ZnPp}EDKU`*%D8`FZvsGcKwGxb0ztYmb7@Bem#%~7b6Bl@GD!s^lu6d zrLhTyzdTe?oc&BYXg>YXLh$J6DEiJ>!F8V{Wz+YL1Uq|*X$I3OlC}f|XePw1lp`cn zzNfG&RGGmw@F~CVqt{Dsu>`^D`zwC?qvT&`@Dj5rT|>u0%rlq-I28Q;Ze7xL-p_ln zCtk|ShPCEG+;;2KXF;a{Mx8Ds44T#8I`9>%cdz42Moiv*%*b1V)eCXosb=tGU5NPB zMgxJXxpyXqDV>;|H_#MD!p_erg0@wrF825|7Gw0R%KeeE-~44_i1%CHMc3lDEBhns-zGfk2vJM86dqEU84EOAJ--lEBD z>#h|OUtetmu6#BRY8Vn8_F^pwM8z38ZH&F>4by0=*{5<*G2>3wq&K30lii|Vn>y@b zH%C-!btp^l!t3SjJNnpRGS2?Q*SoMu4HbF>hv~)Vc^<1ViVFaa?6_EA>qt&>WKl|K zB0t_d^L^s+JK<3zUS^oBvppBedP#fpfKloy2^q@;bTxmHiX%;$yi=Se2>dmrSv{7; z4)sU01PZt;YI>^B?u-!(7w*$c8&NL}3i16u+{&ra` zh|K0eE{e&c<%=q5fvuVq0V!;wRCC1 zWRhrPF$1wjAod0^UB4eK{z~f{Baa?k4FQiQO1WH0Lf_RL9&XO!nn+rQex*&h4`8Ru ztW9R{*3()(Di>&D_#O;8J3C8mQAKSanj_(|d;x?4*VHf>3?y^_P#IMl15%_X+6j}{ zLR%!FcWG6YkXa}*cgQ;29;eGn?JRghE_EJ1!oQ#YTvC3nHQBZpGip{J5Owd(;3C>d zFe~scabTxY$E8-nr<|301;-LeH9=40@W;C|q)PXEi}o5oJzu5U&a?EL&$wZa%Oz~= z&N@u0wO#eO2=E2K_AMoJx7#h#6R)(9fcD1wzcMwkiz+{tK`boXXZTC?!Gv`VGU@EF z3(FDO%(``N@t6%0y}dTKKGM}B4%NBb@X_^8`Bxe?vcE&V*El0f@-0xPaqF>5cNl5A z$+WwRTvwrrsW51Sd6pnqoEAEQ-@zf9N>2?7x!<qzP! zG`iA}fKe^X^#e*xFRwJ@jSl;eCx|0r{gV+4iOu!Q<@>lA2s{9B&)_Q8O3ChpxDQcS z-kwC_v5@L#Wt-C+ryVqCeACuElQPmhp8JOSVOr#UoyB-?cejW)BiH3H=W{Bm!ETzX z3$+!_c_D36$cs6 z%2AXQIGoXUv71IHGl$?T5-Vi0qejyMUM2`b#7Wo;L&A}mAYT3m{qo65SK7stMCL!Q2+yno ztA3_dpa)Y2^YI5!kUe-sp`*CkU}I6~|G*-t!w|PO8jV^Q&osW1$};@!u#9{vvHiO5 zVeoT%JEW%O?%7|tmDaHJt}@^(5`vT%|4x9~LbQ8v7aF|IJwae~RqNm?@T(#;5>h-d=*fZQC-tOSZb%F$C_9q(e{UbR~D0iJ7Jh+hLF#D5mjR zc4AAKdp)?#d_Vzf6gg4!$8J-OpANn_U>!izX7p9FRDA~-xRC>HZB6Geg(>4iU8mSH zHx2e?L}Gi}rzmJjXwHgBewv0|0hE=cE1pNp{Bl&+l^7)Tw`^PAjJ~Hd@I@*p8`m)A z!U)Dw?I=Gq*{xD^QD=fV7QYssj{X`}+m|3UmojYQQaaP;1@g);jyz#a-%oXXkOx&o zoly$f%6z60yJO}?%7Td4WHEXYyHE+|swpe&4?6e9v(-q+NHOR})#FZ<&GqKk+(L3v z(-vqGRTA;%CN}`xB`mWrQ3_xXP5}QLlTpsvrLCZQ`^~$;2Hkvt zAHF}yCn8(-UCRs#zX>$Wvyh+@6WYjq_o^C#dOF7{F&!TPU*^mR^1JR4@3CkDazZ8w z3fpo12wDa&QCs)Tdlq%)KF+nEpggzdD@w&@cZ*Ng9?vzVV!Kptv@-!2>g?LE%MB6G zkOFNfaEWAJ;fA(MkMW9RvsHCR)A}!{Fx6guwB5adj)+T`WSL*xVUeUfD@jeoJ6fos zhzB9KKM3}7tZd@xc{8b#laUJg07ex}RJ166o+ltO^hB9O8Zcw0nL-#4U%B zQsualwgIlcbcn2lZq%d{XY?)-{$7wb5i$=f20~#VB`y33V!`yT}Cyt2QcIUUUG3%l7VJ1Nw z?)mYydq6?27(7+Xuvly?_opY~%)w#Hzqqf07pZ8d#(a~wB{r1Gg->B?l;yN->(^$X zYUxUcrEs0)DE$hO^KL*akWdCbc6`B}fA?`h^okl~=Sn_-%WhGTTQt5OWU)me2{7)^ z<#O679Tx)~t+*9T1l%7rmby+1`(y|?6v?K)Wy;`6e4KiIN#n4z@vYEp6YZp7HtGz2 z6R0OBuGwm@%lV}%>AjLHO=8!F$o9kej`}Bs2J3lwLtne2`LeJmH4ABs6h`L0lN+-K zH|yyNXYu4>MN3>ly{Jq?5GCa2fi0KvoH`asqLk0h2&yX>< z&KENp75eq0A4ir5R~jXt-FFTyX0|>x$@TjJi~Sax8@0#k%tS3N@2~d3V`W&Z?pxYf zLLP5I;I0$Ji4Qu=aUU_R9RSCvX;U@C>|}ShxBXANvnrLc#b|u*=Mq}nZqrVFC#Lgq zIlj~kAvU}}-?2!4-VSw1IZMq!^qUNT9(3)&`zH*X?tJ41#w zFRm4A4lYe1R6~FBCgG=ygs8d^+-UXXPKE1%R0Wi&ShZgS!3X!~(!}3v#7xjfZ>-%{ z?mC5RI9Jf(3MHv|9ZpwT1oy^sqLb-92Ra4PDh++;*H4V!L9)Df(owxGWT|%E8USB) z9n_?DV)Ivpt#F%XV-OJ*(2&GNyEa;_9GnVK0eC{uN8pZR2~A0a-5(g`Gue=k_T>9M z2?_oL5DxaYYRFCH1=wRV8!DcOX9?6PA!eo5?LuZ|4Q^avV9;ICf4tneZM-`_Y|Co; zkxI+kKfo9v*I+XZ<7%k@?!Pc|dYLoXnMfCpwvWPkUq?pqTLO#O@Ts}kcY|A>S!af- z084`mw!gll4sEi)ck@#yHYS>x*vHh%+kNTZJ{cH=)nr^)8X0mUWutfy0|%|AKKxv(|a`F&uF&ZDs1EuRw$yZk7zoWUGsLwI}3n~-$c8-_TvA5rl-K`cxT zY_!v1?Y6JxgayiKCX4r$R^=ZRo1JBbnrzFN|ZCP9ZR_{9wBx zaS@juUh@f$U4VM0JnC%qgdnNLZqv@qYE?2^jaS%X#vxqsv~SgQ>`W%5~9G{h9`lhg9RL(I(^&w=f)S^VUn z?-B@DON(}p7M@b{>koVUkuy>Nhod>VicLj^% z-^Xn>?+~wI9_tjg{z{EAfHVlwZ(zj|F8Jz^A`G&83p_9oQ(iZpNLG1iGO5Nh6PZL7 z+)ro!+Sl8{p+$q^v_esz$$Rugfi-GL~L6k2SxKdQg!Z;PZ9J zlujks^ImFE{)Xm@V`~mY$is-G#abFhv+ot)GnMz^x=E){Zk2!6TXi1kWn%sZE$iD% z1}W5g*icf!KU~v2<f+J^>E&iSX1-mRae5Pt_O8Xz)J{|HFlLg~ zVG8!P+oiAA)IqfUXKy%l>Zs1|J(qodCY(5%IE#eH1W>N!o)o~ zMXRtN^SmU$m)y3DaChgz65o>PimTrriR899$#CnMiM4DW2n;Lck=Rsd;l}=87Tn0a zIT~p^CWH5#SjEv#=C7#tjX8W5)rR*48m^ee)MhtFv8v5ZJ0=ic$y(L{WM>A=%8==R zuES+7PZT$QZV(Qp&>;h>s2Bo@d%-h%m`dP0zCl(}8NA!n-c zNB!R#5?T-<`gSgQ{#e421!W|ekvYPp|03?{w#742jEZ;$&l>JpfcG*X@_rS{{VgR> zm-2*!DVqMPw8XtNHc9gs0msmzBni7uxJ*L+W+Ium&>-7{`||_JvWXJo5qzCu`}?hY z0h;5Wn8R7)wbD%&e1J}RvFsPjvoi-5X`*>&^>c6&d|vg5dKCzVj%smuaI7RtV^%QU z`v(vSFIn?bazHC;25gLl1Hcyf+rD`RfG-1^CW@jqmkiF^Ww$%!l+$g*VqS7Tk6=eO zl`#lj#li|+t%bd~#_URWEWJ%cmoL#u?xpphT^(22t;kpU-o7oQ7Tr4Do5hN3u!98%6}v*8?o)3=ev(SK|6$D*shInvTAvCEa5HhPCtLHj`o@Bqn%Z*<)nQt zv<}qtAQS-w#S7oodl2~`x^d+Je4w2+onZBjS7ziPOe$kCvtcKFL<`R^|7TrYD)3kN zL(DWzck1Y<;~|>$C@H0^P{ZW+j%1GMMsbf!=N*FfY{yY)Q?9b&!Nd^5#cPKNnkq0` zJ;jgeQLXCHOAM^&ap$V&U0J#5`JOE>Ls290{HvqkV+V zTL!o8qfx(_BXm-G5FHGbYBF7;MCo^TGftbIWP)4AzhSqSaLQ^Ia;pAD$uC-LLx zGYCCOFjBdkQE*k-v_4Yow{W;mO_YY5I!Kh_Z zMbc=bQ+V^`nxc?0qSoXTu^+^M*xmv7_@|Z?4kn!4A)<`>kr5_@Nri(_``g3SCYVnr zE{;RAPqx%d+^EUd<1_}+^)gbszQdZ#CmiQb97~9)O^m_|=TPN9Yt+Pvh|R3* z6-(b_-3pvIQLD8fIot^9EX9Hp%1Hr^Lu7FGP~ViRkP&ehKo7CH(jbBdKG{V!>nE!@ zER!9ti_JnQ7wtFhk+ut^^hCoutW9qBHZz=S7vK+HVWEoCtFosmA?S@$gfF*siYCa>X#* z3*eyK-P|pCELXHoawM+gga`cTGif~*b`qp(LKf?yJxo?wSZ?R{XTRM3TRD;4P;)#R z^x0IcBR{OUyy9?M`BJ-BVs7|*P;!czG9F`^(uw6N?o}&Y_>#9=!)tLYv5%-?`!JfK z*yExZz0~#Y7vhU5!xns~AW@eCc~}f?rvutVBdlFK{pcjd_g23tP~0g&q=d|AERM_v zoK1cSi`&x4Ji^7GGtW_r*hDsQJ{{b{_0LB5E9a>TOdq}952j|f-K2=a3Ry&{)Qag; z7_><6IZ_{E*5v@mP#bO4lirGq`4w9pFXlr}SD8U(O?zNoROy(w{xZ-j%C5*5@}}Vh zl$cm0-_6loUS9V{%|hnA3`O+sAeim4)yia0C3;O<4sGmYMrYY*l`892VZ|w;qBxS5 zzpZ1<&nM*6C;y5wJUD`ia!O!k9D>%z`tw@^fNB zEru8xq*M3|64AD*m>D5!p!xDTUt!{}-|nQ7QG}e+M&`RP*(gHk95krY*jTvft6}qd zq-Z?XITQKo%&SjteBLLw?h2AJzY-ToQ?HZ8eX)gb_F7tp)pk6N3R1bW zDvI+%fOWm&>a=ed=R@uMQ60^ldRMDVZa10JNQEA0gzEE=x;C3{r(5UeIf_(DJA!rT zAG1~!B>cwZPG8Rg9vdGUPk!O-e$5@9b-z92UAhxP+-WikL@~R%>xgOifyN#dZyG3sifVsyari+vnkK(4B{J%4Lc`-{0`suz zBIni0#50ju2NhO_R_#@MN|hK=8yVpZB@q+kPHw&Qfv~72l#zkxQV2LfZJDrJ(cNUE z`lzI$QkN91CbFtzxR2I}(tAaxkYj>Y74Gpi8oSrOt2Okjd-l9UM}04OHa2vSP>weA zbm>%lWM_)~qUa4Vey>|=_qMvlD4c)6kSG3_%uJ$JOm~;%o&m|Ac5|t)u(6e0rL)Kb zI=%tFHs*hOmc#K52fd2#=7aXX0AZfIfsdoI!O`9qTccMV7d#Xaeuji9>g&wesh1`? zjxQ7TtR6!?NY~tj2w6Dkx}iClqJeP&18ji> zkgzCG5ygU6`+=711264d)^D7hp2u{b$Fc)qIro`@#OpHi>PWEzMFW33%%}_KTV$O> z9BC`%vE9|w0nLzEB`I#w@SEy?pKV7yzF*BVyX~}#hkx9bP8@uipV)2RJ!%PTbZp@- zim|7`!8B7Zb^CI7zZdVuC6#ddF+^hH`?qtG80n-9+b~ez=g;F&QT4{ohJoDyuLwUJ zKbjLr6pL(pAGPD?H}*2(eOlWgOJqg+hgruT2Tyy!o0cYr>xUBZzb1_OZKm3I0M%BKyzQ6@z zG(cl19SQoh;(Yre1@$8!y3o?n>2h4B+9r9c2}F$Hx>YtA+g+&xIYxw-k~adJ?egd+g)CcDa{@1NrZ~G<*e8MV?StpnHL_3e)hpbvKk`%y=fsJbq#^b7hxmUdmTp9|sIB^A(vNlXXg0n6`i^J3@1Nrd9Sgd>>&i6<(VSuL}`t9EYnUx@ax#s)lq} zgv^*3lkyn7!n_>1mQ!gi%)Fh3csZQRnvs^N)0vvAwke4!Z7kwQl76TNUZ06(MXA|m zL?#60ZsD~;9+`etJ_LlT$ims5^S|)HMMZ3Ky}DoM+zp*vIV3kvLJ@HnOB7nW+h3IJ zxFY-M18|V=dJvd7>!cTKV*l>ii940@Nt>WwcKnpz$pPa<)GMc^opb5pdUf`?qC7eV zMe4IpwuJ(J|EKl@nm0J=9muke7$*cw%U&T=@yUUXOa8VtIfu(?WGJ&juv~Pf5H*mP z|M#jRwcXVTetgEQ>PxH}tdyyu+xV=u|A|m-ZdX(gENv1C`)ASvr*9R(Rb8}O4_^I4 zpOEvaGTj>3L9{Wwf0z;tIMjNMwWZd=pI8Pp-VsE-^HUDT;9KKWHKrBjXI( zv!T8vDsIh&(=G|N2^9B3Cb5qo33<6=^Rle>$86+~QBCp)LjJ$XN??3NX#(YE$k`)> z+G#)M;xT42OT_Gqo$A@mxTXKneT(C?oC4f2iQWqDM5E)wdbkmosRR@N+uMq3lVmTE zA?5-O(yE_{x9*5fxQ+W8id|5jt)c090`rm*>1- zPEY3hBygjTA3ZeSO3u~K!@Mqo4ofiDfcYhUaDtzE(7AHPw1yBTu_9E?K0v&7^bOF= zFzVjwhd*lx7Qf$|dO6ua&88QGl|!)1N{k>}an*+DrG#kzX~9ULW{lxZZmIWoBi0^> zcLG~ASbmW-uMt6`=FOEXk;zFWv;RW%YXxmgmqfbUr^srhRK!qvP3H7F^~DMft5>C) zauTd-GALC9174nM;OtF=E`x$Sg@)mSYe%q^dLskPBx6K&Z>dzs@AUe;3x7Uq(VML4 z|MQsuLphl^uz}%bHO|%8oz3mvn42iV6Q9%4H^ynXNl_m1a^*aYP=*1)>qyQd2`S|L zh&Jc59|}$(0(#LtMaina`y-&R9E5>g>wZ@0dzZ#-hkQ%b+`eoAnh35#e!4m+bZ&)L zMkqu0VL9Ee{)NrYNWU-X+aX#w)~w90^7?)L_QZQNcj4?qh$S=i|Z3-niG zObX7#fw3WBXNzZP?UsBeS3o^?j6kZC1GHi(nuRF3uD=W>s7&b|UUFSb8l^_wG4}zt zIX#|1Qpu*{?IL!WUUuin<_bZlKobrAJ^qpwqXp+|kh@b)fr_fsejrQH7|ow1QL>B= zt+pSYY3nm7dI_bJUoD|o27BeD*RcCl^y!yC{03vY=|HQQvVTMw7BEn45#Lr{+QiNa zddJ(^-?H}IN+0EC-`=-;6$!7WFCD)V{!`-aonH)vp!6tc$ff5N>zDa#Y*7jc5#17S z^&J8udUSOUG(bf|k4k}LH4E5I8%-yN)J4t;^>3xQGqX` z#-fb107du>C9}H<@!@7A(#6K!7)TB@6Dak>ev(p<&7$J>nOuUa_)S6bJSGw|N@Ic7 z3@6^T*OJ7o#BMI1f#roC#RMWj@)i5RTH)sgw?_sh-Oi6djwize zl(iIaaG~=2r)?Jq)kcjfsETjFcWD3Rzs|3uLQwqCODZXS-Ol4Apb-FdtFG76Nryk< zOuIK>u5jSLqP!8)9-aF4HWANi8bo2K@+Xw zBke9fsxABcSVV{^EB;2#ZpqLjej}|oM@?v(lD;p$iq*yPq>wk(VuRJ8m75jqy()ff zech=vCA(9zEmBF2Dvnt8L%%-rGF|^^#}*Uu*?j&iYhIM|Xpu1f1mAC_K@B!nQksj_ za!`P~yC;Q`j85Tc+S!<03c`7%=u;^~Vo!{*e#0Bjve=)iQ2h{$h zF$16rlfRJsGv{zA>PW*xq{+fT;k;E5)}mO3G==*X%%9oAJ-fd3SW7gLUUC>7E;1^% zkKQzjgG%1=##=jYd~M$7@W*eB5+-oEu2qvH)(^cr^CW1R(02|!rQc3XkZxn8-{Vy4D0MO}0GFubAalm+ z+i*Q8-_A(kbiDdmC>jA&^0CHA*xkFDSQE8}b3sPA45IzvFUf-9WVkD88@cYMcvEOM zHWQhR;dX6jo|n7nu$7)rKCdCv&ij{fy21s#i-$8E{XqL*>6)-6)!+d8W8av1kkIQ_^g>m$`HTTC*9%Xf8V&5%p6+_{H;>$=w4n*J*L49Ynlu}13er`vN`Ok@ zYsI2|EMGGAm2Qw%bYzH=7tLz6Z-5?SPH*w&!|~YW{TBL5tLNZ(dXw=PG-Iv?O|GCT zzKS$8)229|?<-M%UfPAfA2#lJxTLp(NXor#5J@V@_SoDC-Z^#{<@4D9vl(+YRy_Ac zhN4w&3Con1cMz-rJJNNJB(c0HpyK57*eZ2vR07&6ZS78I0W2DZTKz7TfsoKp=f8i^ ziTK=h?Dx||xCWa6pXqgmUm!Xl5|^~n#sfewin#)z0JLR$EY*{E4e$_*)>kb$E=dL* z^E!<20hW1|8Z~0&ZZ5mFOque z;4+nimEK5X=m|N8-R1#}2=f^R24-0jqG~kubxS`jf6?*9e2MTfbF0KQ#`~TA7;B;Ou-FCO{Ibb3Vd@o{}Xx`YQ95G))R`IZUy*=gyxFUI}I3vQ8 z6+|i`C%6C%AFlJ9Bi@wX=Ohd%7Jkhr-KuSHaDINbrp*1t%em}AyV}Y`0bdlycA++N zvpMhX84Ku~mcEr0ic4VtxSCRWAwPb!w+PGsY_xJMD|tse4TBEwKc7)a{w%K3Qcy@_ zurlD@tX4?r=H|M&1R}WVcZCx2I!<&8IA6sHDJjt9&Z1xAJ;{0>P4ajAO8ycuP8)8} z6);EgPpr+hK?*p_@#1OB$FtA@TdRxzc$hPt(KoK|i?xXpThO1?mfrGAG;Q)Y4T<#= z3v?5(_MK8ijF9S#iha|IM^#HX0vy2D_D>EH7!$%s_WHa^QCjzt!0u z`+8US>9K!Q#cWuwd^AjA6DbqQa;Dji-Fzw=(_Q9?(ptjNYeO$&Ton0dh7JL5x2Fh1x=K)-4ZRnhkHICM7?+bnp45QcXQu&~U}D71qTQgis8lNW zEqjt!BnshW*FEuhktP#a^tknSMhf}bkE6Qn?26wMKJq4`8U=U)JB~Ne_UI|g4M4$2 z>jW4>4wfwok!aD&{nB;$XauUcxF)7WKiCU;qz`oU>_#~Jyu@SOsxOooaf{inLem78eCxT>BwE!!1 z!VA8$m#P~qO!Rb|bw3!9mBj7*E$&c-&4|Pf-CH^dZbnicF+G}gI^QG*j#j0}^POB( z`Jbp43ktq7Fq6fguY^{K&29%T`-ed>(dT>~!f7d;l^)ApCfKGumZba4L82A^2Ghw0 zc&qu^RIC)bp49SbAI6WjCxUP=J)gP0QeQjsF+!Zph3r`qkDJbB^C%twi&)U zpFSb;<3sP7gwX}^I<6%@zhWQ!5ENXgZpf(94F$}r6B~iU33A~kx6 zS^hVQjt*_;ncj8JCN5S*#4~Xx-E!z46g?OalV2v(MYVYB({=S2- z#Q?D9(BmO^PsrL1`j;g6$BsHYr7TCgzq$)6k8Fbb-M==6SgVU+>t@=uw6_Hqu3;Su z_*}-X`PNBz*hfebmsDZ|3`JVog?f5Sqxn%}e_y7VCWL{|;sKCw@Yd~RNU9ukUX!5T z*3#5&Wz(;nvKhXy2mfx<7=DHfKu^9zIc-VtplCdT;aXmpY z*MH*mMw7_%{8&4?k}bmIUNrk`Af9fHVrb$6FcudH03B)CNXh}b&u=y^$3JMqEALFT zYTeU=4S)+T6^C^o5-G{M!Mu;j`Ijq52&dTr3opYpZQh$@3Fp172?8^ zUwP1FKzusrLt(8WiKM7`f-fPf9WFoV1P+19zqFvU67cIHnypnQ{5qNcP*c^r+1zt} zSN|TAMxSc3pr7M}l^SUtZxZe&I_tmGbY6&rni%ynTs{-rq9&NU@WpDbGaO6D>VdG# zaq9v6AF8-n-$4JeY00q42OA0oY6~cOsp1u$GUxD$_lm6T%GBl*GhvMupc4OSN#0Fc zza?manP<@asdQ^&*1wdj-C>j0E^|7gXIJjpbLShHv!yHh^JKk@l0l0h5#aX4bm!8} zWeaE^xH)X#*z0nq?pgr5q$pfo76uJE+G(X}MZ34jXf7R2jk@^{!0eFTzwr0X|3vRC zD+2jQE|xrmX#^-Z#M2-LrfeBVCR_FlUeDLK!ZxE>_>RTQ1JFD4({|5+-HP16$&VHH zLF5%`T>>!CZf?i3B%9y&9dxu$xMhCjpNeC3b%*ZF;Qmtp}8c zPB&B)(`wEw1!Bqlxlu57?%$X7_yWqr_s>#LJUfzdu>fi3x;7AzC+^}l(dxLiw7mWLN4rhJ7 zft7B}^{E8>CN1Ut&~bZkjk^7!SK7{t)FO?X?oOcfv57BiPo$d|H|g_75V?- zNu%cAkcc6mX@ZXi$;^w(IiKE0_qg7Z$6&LXA~s|4D(WY%M~-H)))8^ETAl|Wku2d( z=l3LSVkIgO@kegy$tv>&yrfN{9#P2`Z7vYgAMK20+?EXFii8hrQ3H~tE7oKt9gO8l zTJh1f`O}(%bbw`e&@9mHb1S#r3;1hHXVdVP+N~Mouoyqm<|)Q->Tp`7JPX1hA~(G^ ziXT!Y_nCA^^kNQ=vR*w)PWcvy1d@mMX1ng0tq#)PWP{QYP49Zv*?r$6REFcS=w>Bw zxXj%pL(t%ndpbR(w{h%eid<2<1Fm7D5O6^r$uje{uVLf^GGp7Hkf^FsffA?b>~9@a z^P9W76p9&1XVmYD)?`ECAtE6)dcEks^jdrcq2hBb1jj?Fa;mWC(|+^S>+U*<#V%9S zjLH(_@>@a#6!2khZUS($?h2t{$S7x;8HS38jfYns6exQ~##!{Fo!lFpd~)b~UGp zWFI}QaB^27wF8Na$z-^**7R9fS9o>xuigDI$W+X6GU*mmkfCz;0GM#$$1D^m)#2J}e}wg4*Jy(+V~{Xx*< zg^KSmcQByx;nC|Gv{sH1LkRN&1(yhW%=1ieB&luvmk_ z8!eKkZNKnS$ubK(a7~yiq);hR&1PWDS^g3~OrcJqSA$8O>Qc>;O{KwBVDEW&ho>q{ zN`0HD_aqK*$;~16*Y);K2CJ~G)TO>udii)$s1$?P@Zx3#4z-fonwuS0bX!U3jLZ<^ zX8&+&cJ(v7QKFA*B55I@@8Nk{zaMX&(Fk4vw%y@TlTbD{pfhXZh9fLjTw-+^O+0C+ zi-laVbLi7-vF$U<%A_KoDCqA@mse>w4nV@=kcddOm|6I2yHj5an0jN6KSdQwA()K* z6v1P+D|}ed(j88k;Q$;jc%olQM~}T#tsabgJt6RbPDBtd)q}!lAE6e};1olkJw2IK ztJ`rRx60bPy1L|n9*pf>da_X~e>^QcB%QKT znFbTT>k~}|ietU;1xd}-*VKx>_w zCwld{YeBom0h7h3D`6aaVuI)Ltvg_C^_LRb;+m)@%kE?x$4>={PC9AnHx86^vMF)5 zNZ*HthO!}r+^>8xC3Nm;S#@9GMMSL4wI4;mL$kb=C=X9hfJxtI_yAo)q?kijeG(e* z0$9ZE)7J&s#}Nn`qI}2)o|oNMe%T+jTjxO$x5rtY3LsG0q@PRNu6#pVsOH>no}4cKh=PN4CYdJ}WC zekjn}{b|Jv7{?VL2SAWZjsCcD^hSe2OEh_%_Zi#sQGLpV|pI34Q`;( zCbLD74u>!z(Br*iV#qk|-TW~RMWA8e@~MVjG_F}rl(D#a0Z2w_!hI-<%(VB@;NMQu z{EB)w1{HnHu&8ZxqbF$e3oHih4^u2GfN?yR$nzTjWyHI%X9X_$#0-rP1;$wh`zZl$ z1>?w4rAE)!+_$8i@^J$cQLXo| z5Q?*%7MyMezafD%NXE#w#Y2mqZhDE$$i z_1G-_*zq5nK5JGRCQ3kGQQH6E;s`?z*6eC!-nC_6sCq&nV(3zjwgI4@j3zl(`Pl+y z2`~6XL^%hl3rAHne9lKm!wCg(+~c;QcE9f%bC#mO+iYfcLb)Q>lpGdQbVfNO{!eDh zG2HDwrvfi7&*OGtM7Fc;>F0<<;XLClw5dUT8ckT~W(2W~0ld*z^Q-VMq5Y=dw@0UxuY z4r{*#`@$^4?yY`@4>1qD{ik4ql&ztUyY5bnZK(#^VdAeoCOh}r7A?Plu+O}$e`=#S zRPOPCzLO~C(ixQA_Rz%m@fRvGkZRqCe=uCPw*_zQE(QKgLdqB{C@OW*P^XF(ACn4S z2>Q_jFr6_U-!QN}M6Bn=ZRy_hql_eCM5niwV3CQ*tG$xlx8_??{cS9{&S-o<`n zonDVIFI{A8g>2nwud~=P&Ch$IgK2-sB2q50K?KqbEV zOYVfT()UlaTDeMvSg>d4$`2*CIt&vv!}nDe-P}OH0JM2_Msx1ruJ)+PIJN068+DSO zF~M6d#Of^E)2%x0zD^56i32$kBj}=0XyW;W+`3f4-fql8JCN}*1@(tRBB4#C6R z1DA|&xS`jjw+r_ibf!&>$av^r0036TDqWFogHAa1!FItd{UPG)!ItX@3zXwQu?|Ce zwQfYrln_4l9|Z>-w<4GM7fzm;265}O{TP>Dqc0@7wFbGdu-Pft(CXsx-1sD)Zmtk} z$r5C`S;pn7o1f`Uy)F3YzN@O+V1JCo%2+&|wb;!i6-{272uZuoK45W^>ZmQA{iLoN zeIZR0ID5=+_930pS5pUq`2-+joJq!Us@2AIAg1zZqH9J4Ng`!2G1!8nVskz3hyd(I z0?e(=#NmDPnah5_)3V?W6*afT7P4D`W=L<%&FMvDms zNPY2_WxuDBa3XVk^^<5P4K&Xg4DzCfBqoLnP!JW2Fm4^XW40m)GzJYx+~|Yk7WF3l zUL_V;oe9VFW|-Dh{z*=^#W9Y%IG$F)F2UgurYu@{FLe2|%uhegwa6hPk< zPe=AjlLN0xfEKZzZNFD4?sR}H68Pq8vqDMWYyKVP7I+6}0E+wHp@R=2@V|FKAkBzi zl>fbpo}6y-|NrA60yFH{3RgvQhiC)@cbOyrSlfk|;{T2(F9xIckU&8b^rASqG6_3< zB7hPSK7_bOCPEHjQ+7I?%jXV*N%J|lq@+Z@;6P0l0he2sP`}q}VO9=QAnD}9rmwG$ zhK6Qr4gAc1KX{W=?WqB!vqj4iMQ$T<>19hsvrJ!QcF4+B-TM zB_c(#OYbQe-J(Q9HUBquuYw|-5;9O68jM;J03~~;dA%^QDV5XZ@rgp_?&NAShm&^p z+b76Sa8Pe5!H`tg_Gc?PiS&`2dZ$6!gB{$v_w-V+4>Xh*#RKR#B-f&Ar2jYaV9`r( za01wBFr#Lr!TgbdpBYAmMXMFd!+s?yPmgzWL%?jlxlOJ=EnXzdB@FFCN`2wM-GAJ))ELz|qN4CF97JN15 zp{)bFC0^I~d_UTGT%LErr{;(|59kJukjI~FmIS-{#H%FDLAk5>6&M_q06y14^{ys) zB{s$jF;7Ju%lhx%0|Z|}m2k{(kVU?tqeN+A?<*^Xlcf*#P1Ylt1CQe+%>sV5svtQF z4Gs*UMHf7b1tbAqXIHtKCc{qs^<}v-oUX@XvpqaFpWTTL zVxiR&=e=Jl`k|b1RdHU|SM+ko*}>a=&rV(wLTR3XQRR+}rsKKn2f~e{9%svmm^m~* z!NXxt1|RcIp=9DU;kl8JNbUC$MFT%nKLb>rMO zEI_p>oDH^L$kzEv#h-Oj!6koWPXrnXyB0o!ibhz`Q!j85^0^xVrVXJS4Z`WSrH%C$ zk)q-@ji>+bF}?Bjb1O7s!&4ThpkmOfw6kW{+Tr8pe?2m>v_+iXfOCcFQ3-d;b}6=s zPQf#5Ce6JI44-%AsSx>s{A~|aa$xmQ*#ouS>W*k9hNoDrMf!negOjUL19KatyuYj< zgW{=05GM~sd}fZDPUV}B!0GMJt5f-8%Fj%yX%z|i!gED#zof0!OZgQ=;YXhM^S~}Q zkml1m@VgV<dqsT9Q!8PU#s!OVM&i|6 zL)to`A*Qm3G*cBcb8Z<0CFe1pywSf#-8sg?dMl`p^8S*hLOK3 zma9md+<6rpUeMu9(3jYsDJbFyEC@3OXo0EK^jBv*usbI(?Dn&;h5$-xahoN>TbHTj z894tE4@&t$Ll2+kE^n4y#&QnnWe(*D^6(q?) z3&PTR@kyCJmloAmagxppv;Li|#2rOTLsS7egN(>8s*rg?w2ut-eXvX$J&C?Z!rNie zM$y5zGrhZAY){KVX<~TX>`SF}nl!}!b>d)Z<^^|>)}(2hA`p`O_rMso#4!HCie23W z12+HoNknp;>j{Q8U$L!H;M8vhH6no)nvhR^_#vUY8i4zIDdqg=$MXBt%7tpywGz zu6Focx*y}<2?lTgouKUOe+7El{wC=5CrrSx7wF#*$z{@(;}}8o*NJy z{{P+GJ7>VN+Hz&msh_P{p<=LFOB59sGrV%)vz4$2}f26}nreTbBwSx>wg%JE;fp0lz{7~pInkUMtYR($W zOpEb%(;+hJqD3}S01_}FgzNKPnf&boSvc!4jb)H5x8()pgc6?^sQvvtvn5-^v}nA; zNwji+I^F%8Ouj|)LoScReq)$!MGgX~0%lrwW6K!_doQp67RAFl8QhC=w>FiKDT7(m z(vtfD9o-+pG>)@pJ*e;X`RC9wyl^iuT_{odfppbN4zNW?D8H{8SQv(>RP!EKn@8>g zTF{MwRbVdH1Ux}`U*}c0>e&o?;iaB=YG%sRe7ggPDavUTzQUZVS1K2Kk)52LCegI; zMj#QIEernd7P|v(u`%<(e1F(_0Hne%Y|)RZ-DZQY$!zpeHS!f(zFyPYT(-cF=uV{9L8b& zd22eR)Bg-XuAg~C`RYOYPUjDWHAF*ILt%Z;%S=hyU+y1@>J3N$*izl z#zo_~jMMtIw#d9Z;#&Qlh*|9KCR5$vvI+`epB|OeFQQ25TU%RaVi4rR;}@hgpWvLG zFWK;rXBb!fZw?w>09Nk~G6iJ`&|yOqaD(E|P@e0`{#)b5He{d$OfQTtz3yJ19X5W% z&djixPiB#LyFB+PJvNz%24k8TjUR0KO%x*6u;M^YC!-%X2^G9XnH< z$effZ`uJ#`S?&31^mz|~6qvc6@Q|)LvMVmw$&~W-fsRCgJ~(}*K7bgD6(`8=&AU+b z`rP&3V%VzaSjFC>CrELQqnYM>PMLnv_Mh0(AY87+9weV2~pTJ#e8Oo^EJpNM5TL#1kyG zU3gykBrBV=a&d8!WOg1EwEx+v0_o5`?ey`XwB-Z{aiXH=yn#?eGcgzi+`Au$|G(Wd zm~>kV;@@fgJN|#gA=I|OSpeS-gf~=3Frj6)_w&{>SjovM8I{xJh9z}CuNv#@r(@t! z?RZB=wz~`bdlSPwjdLz_-|FOU<90;?7R`s3rZ>H3Lv762U5WYzV^nJ$hMt~~TJ&myXUEPA@8WB$vTOyNKqTcb{CEId5U_z@l z+Gf0!QL`#`5R_*ZxY2-Fu3TheZxKMOpnhj&Yxc}Clig+<-S`UAXk$5k!{2!7zv6i! zeP^cwE;J;TkJX8|IZS)kD)K#lTWWP}>rhGVb%O6kMjVOJI96^|MFy}97$Vtz;Omv( zsOV@ZaN*U#nj@NAMorwpslXPX6dHdcEHXAmyE_vkYrA|HQ{%D*OLvgmsubH{>-RdV zwW1R95S;!vjJeC}ECFT9;c+^o*a0FQisBvMo&$znkk#mi^dGKDX0_hCt9iy{gTwMU znFh;e>E9Ka_?YFB^^?#iC#U~p82}H`Y&s#n{b3FszYz|wXY~zpPc-&m+;Y6w;F1>eBG$g z@B(%lEqcrEK6Y#EFu+bHZ3WM?!tsrnY-<+ zGDbM>Yw0N1?{C~qGZ|ax5@edN2`+O*5^V>d-f%_QfGnGC=O*8IYEH}I`EUo#C z$>0aVye)4UYN&W(xl%!~StO6uN`v5+DV-0vTDTnv6)vBm5;LcbdQtk4&1hBXR9tm_ zaroV!&RB7|7^Ym~vh=O5L+CV_XUutDJxEV|Sl4W&>3b zUc9*RX2sh7GA3iBkU;iA&cn}j@8_xSJsN3&vGrp(9#oIEF`0*hPGpZD54qR52T;4b zUlS5{3nl=B3_!F_MmiF5PhrsMMyK|jN|9ta5@bMOvtY}ViOr>3^J2|`pDfzjt1qM8 zbh6O`4NwPCuT#8yyna6P5m$l^DDG-BZD+bHc~4e54IQ?BgJ0)?TX@s-*=NXsya27n_q2oMGRz|`8=5Yr zXlJ`YFW%x9snz%+@b(Cw-%eJwHvjz`G!&@_!(wb=qD=0U)t_c^>3HJAiwn4p$j3Xd@(yJ>%u42dv-1)#_&PCrdhtwwYPPYYVJPSKoy1|0+ zN;v2^+~sEHnEfy5)E5d{-_#VEn3xFUsnInAq!6$NN7=XQJ>SKNgxv4|vYO-{F6)_6 z75_M5Uig2yY)CrKw{JE2GH!DWnp_{UIn09qrVcRuMli2<6iRe({Bu?TTGC(uP-?dE zW;~h8W9T7|F%dmuzK{!TwOUW|kG}&;hNHnXqL@2a_-1OnXY^eYbU~3|2E?P#)=vQh?IoR}{R~ojPCtG2{<5$4x_rE@)ru*Zh84M4)H@38h z1HfwFia`OpT=OI>d~EuWV|u+#EX`US*2OBrn#L2BjFo9zAn_+#AVNG_E)Sb}wXqWA zgvFx%Apr#?gOd8c2}W-B*yv)hSKx&Zltn3#+gKKwR53?S>cBgSnoJ5K_^DSMtL(bA zwst(yB*S&CoO0c0s|ft(@6%9Ih9<=m5g@wV+}a8W3i|NB@D->Ykgn~@`32*cnwsu7 zLhb+hn!q`NI?(`~GTsJ_zehz=>;*0c7`~Ko(gR(yPX8|TzvJmygkc7qJf4mpH6U z1u=DXEQ$>vGxwtk?r9Y%+W9YmUC> zm02A#r4ciLMi@TICoCkix@qbarzna0bFA-7X`nE%Y*B`iLmF8NSH@~1wjC+i(Rg$N zfl?PMC>|VkAUINQw++!P+x$N7@jY$E^=K!vz|2J248NySX z0IGn|{sSTj?)#869;OjJaK0AZH6OmovsQDpLFu3*U`p@f-_#RY01(@BX+|7KgAfC) zk&$72eXY3O1JR09tBPV122&$Zlar=UkrCR9rvDzoCB}q)$_!HHM=bUp_yfn3g2BAS@ zQpQ<0?%4fsnoS;-KY;EShgi8ul>o0uYP6COuB9cIg#`s!w^fRH8n)u$mIy=}w*7Er z?}fGrC(Jdf_Jf>2gFfNoGLh5f6Q%k0b%>2tx>%$suoqz}x_G*6u_3dlSe?{CQ{=^D z9%*NjmT>{=2Ma`tpz=WP--zRgY7%s3!tj|ZH;i*=@l`ldU(SDz<_j|3Xt8c9dPz4Q z{6@2g#g^VnW6Oe>lqH7=CAdHlDY{d>SYU%qY67*R{)sT&#s5`8=X=t%PUYuhj? zCQXs&eeD6b2l0*=u66ahK2pfbVi#T|H^I`S01X zs0LGFlLj0F`KW6%)gyG1dE6iHOIV7RMlZ9pdSQr)Z|GLs(Ky;8$Q8FEIv8mOJ|H8c zzrmt9hA8Hma}Nb19OX4kDI)FjeF%^#d-n|9tg zgh+d`L6`76>CaP!JR{wR`HLvy#P$G#u|;ZpUTfb@@;xHTWNWD7;5I7I@1vQn(r~9E z}kJ&8|Wox0*deoqrd37y!i2DC6 zqrBG#VjV;!Nr!P;$U&Qow8mR0_tx4K0DYQ)qzJGIBNlolIy`*;MA;3G{Q96gVjRLy zf}lu0*C!f?p2ku>(BCl7aNB`-V*kP5KnkCMU*M1UZe=i-2Ssw>e4rC2K1t9Q#_Riy zEE~g$vMoC4En02uRK2Hj5b|oF^DhKF3qsR;xblF*$_JC@ttvl^{+W9 zOuo!~bgpw>Mx!Z$rIPP{5y!na;LQ5at*BNNwlsw1c`ex#X<8ds*M8&sPH`DK%n3Z(15%BSanXHE?!X?;6sL>{vnI?*LN6+iD z{x56?f!;Mpi4R8EXa!)>88v?vKQ?V{?NF^OR_i6Qi^j7Hwd{ zC&fOhu;Y^DyGEjkoXFz$z=HATg|2El8JO2IEwn%%&Vn_MI9Rrb3Lp3Q0E6Wfk?@*h zx|7@El>}$S)bm5#CSHGXl4|4`!meok0G*IDwzPfFitXpv8YaEnZM}O;U;eG$MH4-> zzFKZy4cy-aCEv?6&jB{OVN<)cURc&sB9kiB0jn5kyW&P{^gS!Caei7dm9#(IGG$D( z--A*TBtzHQ-5i^z)CrGN6M*?0+Bo2Ym6U+xOu*lZA4cRGq)LtuibSada?{;!@2 z4qOD1R}^W{@$pjNpC6d=MOS7KKvGgbAd`1>w`h9LpGG^~Aq9=Ny&xWf;Q#aV)Zoi3d8Qd z6xed=WA&>8jogZWc-idF^**WWQ!7I}9;e_QqI!OoO{y)9g^`0xNM$-2=?H=726no2 zGpH$t+&C4=NVD}g$&0s2UI&r(NR$DdlA($QZQ($QFLuij_{^_GbHamVi^&zd9vCoK zj6qok6YYEYh$YgW#ln#UER=$ln(|6GS63%DGhLLOv;w?3mP=mKepPJv!|nab4cX<^ zCC4^J$4rO#f2#ZHpeo-uUl9dV8tDeL&iyIUF#Qc9=9A*8$E zJ_mohcV~BY@64^a_x-~WbY3`bexFZb;qLYn7eupKzj@rOUV&2Qr6m5Z7mD~j3EX5z z&BliD_}N-7r284bplN2MB(Mm)$Dab;Uv1$)EbrF_#C% z#I$OPy;JpW6r%4C=UT6xb8!*8picOmM1fLieDFE^U3d`gx*fEFxYBU&kDrz`(V5y%A0GDG=>vefQGD4Z0DFOy6!Yj!l|C$L!Rj z?7^>Sg3Q#f0NWqW5G#Tfo{U>*@&*wRbYWrI?OpQvb@7Sju#qbn3mMv1`OiF$bdTR7 zA47je2tB`MH~zFV4X^1*{B$y`A?lYxXfN9C_X&PV{jx>j&vo|5L*G*oS)kvB)$9!= z`=SwDZm5Y!rVq)gd{IACD)#J>5`2>k(65i?7P8NE3WOwlx-wx|ifs|tzUv|Tb@!Np z>^WNa1i~asT1_?P=sG$P5i%|=E~rIRRfkPkK^qR|U~)j-PKL}rdyo4=6hJQkhw`r_ z=3DA2cnNyhJaH#pQ2&WBa!L?#N1#_J{ItJsyV|GqAT5o=n_vTpVvG$>y1W7-HTn@2 zGQ>+fnXIQ7qw3hrmp#K@IqP$Oe&EnIP)r}tA5~ra?sX{N5kxk3U!z^$Y z?{6Gn{R`!X`xo7yprjaW)S>}Oyw0Bw#Uv%Ok74+5WHGp8#=&Z^_Uo$eT)%y88YIeE61fW}G zby9avH#r}*g!RfrXuQi6*Bm<{fWs6gT&ZR$DZQs9U0fb5uMEyUd*;qC`}+05Z)nk^ zz5AX!7C}fJ2n*H#gctZ#6u{XAAhCD}*WE9rwtf{L3&fX*O#PHeH88Mmw6bPJi=znl z%VbFWKpvY-cZ9XUvPK<6Rw~hYv4S7Atnh88o%OF+q3&!GmIHAwoB@$Up~%zrE5M^* zubpLFGEzCneeN|Uw%VtF6c|b5D^n)9&_NZmqXeXgqOye^N@1z2_%PyZ7FA2O-qdWa z)m^2uP5(rFb%-=5wrGMvWq~4r-@D=-bfmbV$xv+-@JYUesM}UpO>a z!7iap@6Ufvd*(oFewSQaQn2pVOTGHA>!Lp*I*XEnAe?BHI#{MmR8y1aXU=jM({6&59srj}cY~o(L!DwBTLUA#w@m0MHqEfF{6CZ*#4=E|42EjR2nOSg)(DD zhwDpLko0+;EloKI15_z4Y5wB#S@K0}_1-#jEzUX-?;SuC0J!NC0;u6zcY?8KK2R#4 zdIP3btkyM0$_Hqcv($bCm`+p@mo7HL5Spwv2bCk6j`rV{rxH{X!rFFvs1UeuoJW2V zBC}V6u_G4#1wRkZ_lXId$+E>R0O+C(^ksxHjeSsVv9IUlRu3-JxB1BpHPRq>x zR1R{P^FCJWR}YF@gPXv$#}b7^7)hx5NfMb{Jng^y+W(+oG?nJ&H3(XKwRKV$qwD*> z+u^6Cr`vmbdw(8oW*@x`{V76aNcE!y5$y||f?F6VKPEFXv#pau?0ohv!;aa{>@O?J zL9%(~00K{6K#XV6iq)!a{J2Y2x3abtpzi~>KbW{O{|)k1jJp_!_+-hvwWk=?DQdNV zWIcvK;hmab)3zWq7V?a@5WYxmOl52|)=;sm?14GpfvC zavmO41RPKW^H<9OP^Kwp2<))~w*T~z`$OodBeI(SCMM=8C7Ya$*$w!L*wGDM3e4=d zbtyM1OI}@g^lTLs5c}Y^h8o6y7FeV4t6A`=U4Euht}a=s75cQ=uh1Xc=ZMbHAUlaA zti+Ks*k5LU5*)(ux^1;}{&{VkPx+7tgZ^Y=2EW06EoK=1&%aEa@qYmR)FMbi*8