From 697bea624944a8cbeff0e8065b4599f8dcf3d719 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Thu, 11 Feb 2021 15:37:11 -0800 Subject: [PATCH 01/15] adding images to migration solutions --- .../images/mcafee-mde-migration.png | Bin 0 -> 23054 bytes .../images/nonms-mde-migration.png | Bin 0 -> 23342 bytes .../images/symantec-mde-migration.png | Bin 0 -> 23235 bytes .../mcafee-to-microsoft-defender-migration.md | 17 +++++++++-------- 4 files changed, 9 insertions(+), 8 deletions(-) create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/mcafee-mde-migration.png create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/nonms-mde-migration.png create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/symantec-mde-migration.png diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/mcafee-mde-migration.png b/windows/security/threat-protection/microsoft-defender-atp/images/mcafee-mde-migration.png new file mode 100644 index 0000000000000000000000000000000000000000..01fb4c8c220a73d3e9ac353d14a286a473c46b96 GIT binary patch literal 23054 zcmb@ucU+U}(YdIvES=_T~4(v%Veq&E>kA@ts(AcPJA zfly-zz4uPo2R!F|&)IiByZi3%_XkgsC&^uA?wPsfnhEcoJ(VZ_gZ>W^5)yKS$B)!V zNY0g#kevB-=`3)Ep1oWUcsK)BlYdB(-vyonUYxg(R+c6qDT=sqXmSB~ec9o$E}Vpf zqVeSK4BGyyDG7;ghQcFh4R@oZG2<}spvR2Qc$0Rh!G(HVX8uC=Ys{}+JP1ft^C61bjQJ0(Mi!N5 zcSTB3-=SZ5RwN{^=w{WRu>v~XpVnP%`=+ypY8-Nl1+<-ji8_?NG_2tpn|2oncsxv! zeLwFyoy%Y!`p|*!3m@H^9`d2+SfP%p%Hh)sbk#CTl$>u?gKy_8D}=uz1^0GDu-oeD zt7QEvXk9t`T9!`qGX?wH>b$$rF@}wi${<8eHUqGmYE%EIk%yz5_danh z$Tu^uz#BjxOjxV}E7(r;JcT%;*He9oNYF zxcIg1H9h!(qm%GaLn(8?Cb}}Er>d%-}(2Q7_eWLZpg|D>ww!>o|kbG{2hy-(=-h)*4# zy|LUtdAy;(O2W}hEX7Wwu6oz<9h+Ti1c)om;9>-*45Nid-P_2F82n$ zJLC==s@<7j=e~YBdXs(UrP|lik`d>GbRBoQ;k#ySaL>C`ER*Cy$V_ z%~0{Bm6ngg@s;S>;K(j@as^4UnZ%%F$TGW-yR}IJ9{s$9_h(n0Bq>}f&#RBur&uFprVbVNUr;S;z!APk{lKr3Tu*u z4>^zhADuXquuq(LXwB7FZWBQ20zvhsUgr7WB{cBfD`xOH;Nispeiubt;lASMn(%4* zYyIJ2lGFZKl2`RfE>NNrYODEmf#K(`A~}8sxPhrnzY4E9MM{W5V&lK*=#KD;JoM#PH#N+wloP z@Vm3?H$xK5QgD@goW><6;!H(}>J1@`=Q30NKD=Ny;+Xj5c*@UkkMj5^-0%2{hSWlP zH!30J`VHBe3)nW5sRT!7I2D4@dx=%Hv)Fg#z`nJ0&}JiL$9F1%$PRj}s-DMW>@MGh zqThJ&-X+UZJI;z1`06~4SmEMf4rai|f1mW#3sNc)aGJbuxyHr;thvx4+>h}8`;lgp0S65~A`or3j?VHj>A;+AngL@lAo`NnO8IKP^7~1@ zWo%d5ulzO9cRtxTdf8B!2i%S_=bx_#fp`;|6+!9x>emq22pW84cZ}4Tqt$#}w{8O> z(~(=8ue)||R3MXGp2l&wlCeL2x~k@-oT0P5)JPr%J`qL78lGl5rm5nZvGgMCL?Aqe zLsK@-aSOvCA}ooGjz^`s?%ARXU^gv`=oY%lSuN6(MvX?56! z)7WvJjhq`4U)53TK6F@5d;z(6%s7=+Z};)&o|}H-GQE-W9|cg1xLaJuna38y`E0-< zm*Lqn+4HE|?A>hh%2UH)XSfvFsS>Ig+1@dvM~#J7h90SN1eWfZj!Pc$4__hjGAW`| z`@M%Jk0YI5LK%H2R%W<}{URuiv4TWTsHw+(R^omp3T5Yh_vRp+I9?A*0Sv`d|QcSn+)caM@sJFWSpJ6EZY1I@t~C8*s- z3fkD$H?1CK!B#8*&xsp9^QE%|Ux^26g&$Of;DlT3`!)v!_|naBFVL!ZabanCyS>ZChc|(!fc9fF z|3*M&8cJ@oiI_d3f2cQZe7qs4a%+B)&S7|x-z9*s)?R!4#&Kt}+0CPzy2@!C;WDBZ zk1W>P8ZZ0hFeLicZg0m8O&&nq$h|4lws`NZsYQEd25ut8;#=ls^;>7RlS9|vkY*Sg z?ex)Shft@eueg5>(%RbRJ$$3lQG6;2lLgmFNjsDwD)1(Y@BYwQx>i=$bQ)7V@yi?UrC9kzL$)zH?&cDu79l@`m z!o4njJ880!YMZV{Y7nb(Mmw#7_6CCVfw6(>892mwy_bryHsjj-`@(rp8@p^*YPcB8<@@VSiLu{#(-sw5p|pgxO*rr1#GU=d{ZPj}aMp=n zyhitRsL0S+qiK1^UUxf~%n5$St=dyftllcJODlrj+uw@kgzaqIf8ME|h^Nq;3Dv)1 zpe0?#*B~fVdrPN(ID31`KDGKsoW`PwBLzgW4>h#C#-FfL$pHd*CB&3ukyDy9r9K8Open21>up>c2x`-hPbKew=Vx<2_DS;rE}i^yK3}!0G<- z(97`ez@#OyLwP!g9D@*ne$`%>$R_vq{#Dhp@%I80QgD5q@Cw_Y~eh>~5E8MJDhxM7&qMmwyJ>F1Px&^r`%o zLLI!F_x=FjNMijT4-OXme8oVr01o+1^Zj@Ycf5%@EZ{!Iqfl!r#~N|?y|QFG1#xd2$N*qPl12-NhuAq+VCtFnGU!TIrP4fS3=GsxWw6qi#v$f@d<6G$BE~uRV8G9`WSvq-V z(6KHc5_<02+1a&KZ+s_Zif;y{YN>|p$2SX;KHpvdbw)n!E6lKhlbB=fCn^^&mrCW_ z8RI2>&2p|Vl^6O&()?~jB_=&zuITxKxmCA0>hPm&(T09gMuMEj^M_zXTi zhX&Y}=yHNZY9#x|hfqFvh2!}ESPr06AaS9Idj+2vzz2 z)64;cyKW%)2hgl}S?I-A2m*5SWTr=cjceJQj1teq*EgGnvn(;|eGv>$he`K5ADt9Y z&)JqWOs*sU@3jh{PuBVg$onULzIZR;_@i8MKhJDThnq%$5)5^I0%4RgO;nly^V7Aj zomWY25&dA@;ZVDuCm*!*V(&+!eDk|881;#;fL&EjO_}M^U&BLxW;-NvwC6ZJhDvS) zC}1L{v-^VxCfU_hqxqC6dPa4#$bobNLOoo(HVXnTI+Z@41Mbi(+b+H)mNN8N_ORAP zCr8{QroS zhLTR=9vea)xIy9kHg;-K3i0hn?(k~tZFW4=*7?rioH|BO+_m5MQqewd!pu)Ld00TF z7!ndh$P^(5d#nUD>KMKv>tmVBOAJ@{QHd8XZ0g=B*4(}cS( z>D{ltd#nf93jwk8^C=W?9+;SdkwsJtdY(voktZ%Yu3ZpKMbN~n4vcFki zw253U{zIy2tkfpDl(MX;`B^v~yDe@)`HgR6to4mV4wW!r-T^E+GW1!Z>L#D2MQeR! zTqxRSQ8;7rd6qtK0v~V%sHPm}G_&Bb&A$Qz#f_>5ig5R1E2~u_r%jrHB`MiYZ(l;2 zEej()s^hVBz`l*2Ii zpLrTK8D2Pyu1;8V485#i=zeXT8iS0B4*p}ueMg;fU1e(fKwIJHTVC9YvbfZ>bI19= zO-;I@!STA0Ej1ZkMLdNejCJy-^Yi(h>=&?jVX%rzXOX?qdOo-tiid8;ZRz?#rIhOYk=Xgncw6i z#8vBJ#8y*a3cYw3+%<|zn!=;K3QNn)7?A@+kdeF_h@+euMt|U#ytKE^7ZG0T$&yY} zUsB6s2`%(Bz{I=0q}3t6EiAX}&Kl!}B;%G(Ue=&rdeInUim=kG!yAk%-rYE40doQz z+EG$Ai*$3?f*Pz=Z^zPyJm`bs`>4Ct=f=#wBWWU}e14GM5e|wXTrLvpP!G+sN}Uiw zyH?gr>rgaz<`#$uFX4Trn(KBic(D}Qr@5XwxNRPAO(0k8@YZ|5(77HVj)#oOq*;@7 z!y0!h7CYyu3VoTJ}@TU*nsev~L+kkyv9Da?Xo5JePrKbbM;1 zor~3HvwRa}gU91zpdHvo4gAPe)`v@$4j*Fl7=9k46u7q`Ouc8heIb1xFko|eO4@y`E9wj5tRO?YsqDXf0y9|U%Sk|X z)@7;g7W?bopKiYM5IMU4B^V$7r{Mn#GqaTm#_&-o2{JT{?cYIat?Sg$FoPpBzaSXZ za9sm6f5i*5&~K}+!0Y&guf3K>P1SR`J7v}4(S3Em-e;kb?;#y+y`T17%a2|=7);v{F74AHtWi9?nZB@T@fYz(u6r+H%WUPQ(ZoWA@QYV?5+=`ZKWSSJ~>uFz@Fk3iXfN)%tfR zYxs@x>pxcl?9-`x`Vyy!i^Ea-*DpEFYS7yry>E5^<1X5f zq3tk+PfQB3FPV6bpTZ5uF;h!PRsYe)5=53{?{I0(i(Kncsg=cX7$YqL)*tS(7$H3( zdv7?G-LcYs=r7GnP@=OQzRyD`*yQxYPd-m_l)sF&>x0RwV2Lay-G--DJuL;UIkZ+o zl9ysQXQB$N2ziFtoY*t?%7H{adMnWy+Tnv&e@03bsrNg1@)UsuIRbbL+8CsREGVpW zKb&LBQOy_eodDvXW=noj0-A`SAV+hMYbPCE07bMNpfw4}H&0GUJ|!L-{nln9N3kf| z-6tSQSkv0_t(H$Q-D1wdV2ursx&HcnD3sl|XuzNd$?Zpv^XJ)*RajG?g^gLj32sE~M3pQ+rU8D7uG1js;P+0Gc}CrIe#li#V}0@hLu=}jYCcxV zLd)yME;eQoE_fVQs{B4;U5}Jxc7D0tEzjyPy65a)c_uLne|_;Lg^|VD*YEWWCLd)+PT{PiEmH*faH7a z-y8fB1$)PU=Km7hZ#?^Ll;za(o^24+JP{uWJovXi_|ME*um3f(H!~&Gqkm&<0Ga-m zsq;ntiK|aB@c-q^%Qk*adlr2%BlEPy5U*9G|a+TgBIG9*w)QbykQ-kBb`)-2)yCm7{X$+>cAFuTw9`2<P)uT2FGF!xkbUd$h8)No*%TAg zQ}CpTi@~BsfZM4yN2SP-5%4u64^$Qx7e}k$=pQdo`}4?xCq#ypu=S&rv6_myx}`YM zCsCiM^ft35)_dd%#;@-xH+h`3ELy90GKO)QHDH?h@e(Ox*SGvI?FGT$q}1^$6+1e* z>EUK;YwP1P#!tDmzffRY>G0jy&Lq|>UwXdiZt4BN7GZ{5uC{sQ*w!Sw8Vg~ePC{Vp z_bZt38w@rWC)%mFGJzy&(Qc*_YnpvmV$r={TLU60@?I=f5NeGnV!0BzHI+qSRHR=% zt?jHnJQTu9?CHN2th}WfWZ6MhZzx^l$alImrqOB_#R=Qig#whF=%`}@s6*CPGR>kS zD+Dd9I{mZ6vMSr3=AlisLSB_&Qq1=aQ~mIV7B$ioHPzG5v}|v2tLGXv$?~TnC*>eM zsm;rle^cYOk}3k16aLbbDgnyZWBg|RojK?s18ZozayY9EoCO-BjWX9ThNvcUKGu8K z;If$o&BGa`eWg#b6-35h4Q&3@A*r>s^>ur7;DpCAW+y@HpG17P+{v4t`@sJ9(#5@Z z9pLa1qEPd>D7zziv*^!_aoW%QPGwBQj*rJC>(e=e{|LN7^Evw7J`H0=@ad_QnnzI_ z{rY}xNGsas+Fg54<4FnYm1L#Y&hp;I4Eqe%$-!jI4yI%pDEJQb+FtBTf@G3zv!BY^ zKg&K%M_-@YNY`<1-E2;^@57fOrjvsE115tiC)r}#PC%0R{P_a99uF+2vNCa#7!+3? z`vI@z+6Y$ka|x-iwT9;MJ#!%e2=O-u#bJx3ow!^ z2nGZx2x@!CN62o*-We;EcyQuGBm{rCJ^5dLU09kRKqtdf%h{rICsSW0-++pI}B;nv~yE+sy>)_b;wGhjXtB=lO;X*sSI- zRczQ6!M721vjwi#w{=F^e?fve2b@gF8>2espD9~ovvF!-BqQ&^5mN~12qo=ll2c!z z-tORiO!T4a(GpxvXy&pSmc5*_pQlgr7#8ult~596vKP-XyG@?@fyTtMlDgp>*SezO z7er$fQ0&q(p>(^5JXd9e_=o`MZ-+9Ey4Y*Fi6c6k5zOK2FHB}{6dW#TbqUT=6`^?_ z`flLTT&1K!k`MVy%DI}5R`@9~<@wUuTCt(v1^wW_fN5s$vf3ZKSKg%B^+&48%Z%k) z^jvmv@RKOSVq0VhcW_86y>30pe zJ+3-C!_-Z|J&Z3Fez}gNW1+9Y(RS4@jy+*XK0;+RK}|6t9nGf)U!9Us{KTZS8Iz95 zjb$9?dfEG&raKY<-;Aqq>xLjcQJ?1>qmAo~n$$;uGfao`Ld^wK)hL5m+LvbV~_6_yeh1W3pZMk_)Fib9&yp0f#ZiR5vm{F3gg?TjH^V zrOmD)`P!Fm<#&H{)O7UT!lIP&|`Ja_;GPV(7s$M^X=jn5d_I7ME z&Rt~kXE20*&OfF6I&`Q74_ZfC{@lqc-4Rkewmw=sV(9b`30MP&a{En4Ro!p0?*F;7 zP|)7X$O3>hhcE=d z1*QPyHQ=ej&_>CdleA4x6yO~$7T>km3Dr zBFyW-)V3LsH`U_Ag+ zjTvGE&s;*se~>s{xqQmM{ylrwh+bm?@ z^n}}yIM2y%uQ{K7%~MAbf;)_quU3$jcu%yj1&VvlU-mMMk!SLn`0;);dj?$7d<9K4 z3+&ctW8Ls>saz5AO2_;h_IGc?5I}*2XlM#b%`ZAX94hvKjq}L zN7oH0Sig%0!`w&*S2Cl6VGDeW{%e&fNvN|G@B;yAw`IyAr`2CQQXt?+NtyW*iJpig!K2@@;*3)tCM|MWAQrfu)uxQM-!joz%91{?^ z*QLK=slDjEyiZy}S@M0WDB60BL{|JM%Cw@@z*RwIq=$2qx<;ykN9?`Xpbfg!_oB*# zT$h|wgP`>1IzH0K=gW;i>)iBs$WF1Xn0rs@ftY|F+0z56Zz&~N7+ha{=S~R2qOO|6 z#eax?*grw4!Oj%(i+Y8JCttvb0ia=U7cOhZUk3g za1P#W^=RF?V=F?IeQRUUf{psvpImnCS+ic2i;`ZEK`0{rlR~S!HmEw!Xj9B(ki|fJ zdE@IG0g;m<4xR~iYhm0d9?6i%aqfB;>_GLj(qAxi-Kc~&2Mau{yVM$k)<1{C#{w(Do$<}1Y!MXg0UP%hu z?-T-HZ{DW0@+oi*>McEpH7sG^JfIVQ2co-4`Mg*9)~qyCE27Zw34IQqmJRu+&+Vj* zvP!NiR;KDID4nH8E8>}69-4~9O;3MmM@>61jnHpXyQMhWS@ElUVjn9pax8On2l-H- zS>}g&%==6vz;V4+^qPGSvd8;`U{l2*@)Rj*D^=5D&6m-w_)LRYGPtnwV~#K}Wy;=) znow@FGCF5WgX57F1i?^t30+0u!`#jOpr*9&<=I?HSHX!UzNTMs!e$IsM+D3tof2Er zbsHLzWl7krj*7RRt4293!)u<3LCUn-@{WWf9deCsEvfZhHFhr9=XW$*ubAG?qDuOb=^tyZqrFs^*trJZeJcFirwgpHw|beQ{D z3GejlKk?cuUMoT#9DhjqC~VudtuP%{^VIF;@QBhUc2KdAvKUCUps}dkFM`qI6EVp8 zQh{!5iI4zzaKA=pv4E4$4a5c>VabFhIj_QF#lo&4`rHsQ;WrUxF%F|oDI1E6$*TC| zYHy_tPrIi(96m5=d6QpJABD9Y`C8BA(P+P8o0%Gvs#?9UAQ-SRC4UgnlTbC0Wi=8s zG(Gc#vJ}fX_sOneKG^^+?j1E0zfs_%Xr#HckmkdnWc-w1{n?1Dm!_+EP`l*uRn^~% z)#h&~(ie5dCPRo6@7$CZ)oL4ivvOtf{0<|||3}#FJsF9BIo--r{-U7nl{sp43;6b_ z-j9GYem31eB@S?%b9 zb+3M$)>^#ZV3nx2Tg>Ww6JdM8d?bIG$Mvz@nw2umvoB{%XT(xJL?%oF$?DTmD$6t z!!{f6Oj5nYXlK<5eV3wyJL6Ujj$&{S;wNd{WwdY6s^`~g4gR|Gk%)_tA35<@9E0Z& zPDp{KWPbU5r$QWAGfRJ-zZ)TaD}Kfy%!uVb za5Q1VAazK4KhwSr==;lO!ef0#3XfPQb(z9LE1w*ciupqA1bcnBH{4sj?5`qz0%h=_ z_WA*{8=S}j(M6VqwaGRgRI%F8d-Qwyd*FovE4$k}W*x8}%lW_eYh-L3muZI`<2QQz z%tcDTLIHlI#(l=UGW)3{c>qB|`YK(RgE*g?`JE+|;uD5$@?xlrpNc~~kLaB>p%JkZ7`AKWC(KR2A57o?Icu|n`cwB^Uv56ff7>PqB z`TWKwc0Ms9%|YjtJo*MND1v0j{dk=^3NpVA(IU*$AU;A*fv`bYI5+9&Z*LEczYmUc zowRT~w=@sNZXBly?BL^>?_LNXINoIPK5pmXL>hamO7&j%y)gX?4|6mf2YONuZNd&| z!YaGh5u>g}2TX4hPK1*q2p%c*oS0b8(Jx2U@mxV`^Yf(@(rE)E`;g&h{K!~`Fjb9$ zw-+yXaN9}Mmw7lW%0B^UDxTSgcRF6G<1=Z_1!epy-GF|av;*keccdN6%y<7B%`p-_P z;XZhADVtO%=%x0|WxTsnj3GRC-7Y46N;H^C{xGRV0frH&ZwE~jEEVwaZzEL(8yw4N z_>i=bbWfqFfwvN}1cgG=tz?)b7QJd>?Uh6!o$2e=jX_!dmhq~}@jTrZ>f3Dp(w&$T zs|#YU>5wes_?4Ok9H{%!mnEh|Yf=iC6pI^QLPsMP6Jfac$uYwK0@irg8V|)?!Mi^) zhvMC-qh2LU{j5y1y%ch%l%*sK{xx#$V$HO$=>Zv%{NB9G9Y(D<$IdmrO6|iI)HY<& zKdAO+B};-_Ue>*!6OniTkQB{MS%1VCGX;u<^GNv1NpQm8Huk?)NdqXx>YET67D!kP zaslta&vzO2WF3H^*G0r8Rf-8*11kr7!-=MVSyNck{ z9uh+npWt5Dl!g1}i17%=(FfvA$_qXeP4|U$7lie zemX2sRp#*!nrdJ+2tFv)L*!X+gWejZ$>5?QI)^Cg;fJiDyC5cE?j*Zdx))UNzpC5b zH&1=0oU;1*xcnt_4RZlen9IF9lKJi#z+kFKjU6o>6S7~F?=F*4GDRz5e2_~8l5F%( z*}X#AC_3H`hjohOY~LvFy3*hn$JJU1c%;DyH-y+LhYr$pSAXWaynqLaN!B|6<0}l1yVu^=$z8p}3|_g@)%x}ytbsLR zhhF;gtA7&=0Ojz{tQ<%}y@)@#PxJi$J(*Co)*xs+6(m~UM*dIQ0a)NHIndVhuT1~H z-ig1FFY+(y;2J{k4v@wFgI@qh1E54I!|;DaYfPQ=Y-LISe8kD;|6(Wx!5I*s;|pLO z{^Cl2r~l;+Os#VIU(|^_wE6RCEcp*d0;G8o$Fny@-~Jcs<=hGR@Q-Dm&>{`mRq6ke zQ~_2><&JOEpplpI07HotJp=+V8}rzkic`**<6n5XTPLCGX5@~)fZJUx={_k!h5n~L zC6cpE`aISrV~7jjv25TPaOaBMjJu{|blw$pEtcj!dz%15H6-zDuZiE6 zWd@yEeZ1D_wzB-}Lp~+ZWpYO0{~K@j`!^$R97YGqtOxlP5ed@MXJ6G<`W$RyT8D;* zhlhqDv(G%|zls>C_TF1paYc79!_Ry>ymx2&aBpM%JVeBzJ9P};_kBpdbzDP?tmECS ztrxmxfohap^L50T%~lLjyYt@2@NlAEpBpPslro*Jb(#uUJV#=Va2SoHL=)=LOx6YQ zv=6%Dd8|{1?8a;FEJS}RVb7YuHwI6iuK|i#A}*b0X;wd8##aJurPU|JwdwO$j>8Xt zI#2qiHD zUa{TxQy7<2lIlcFsvSO+qvEPxNH(sOuFRxwM0k=ILPcgq#sGpjRbnCa+Lf+k5vnee z=rGi3N(F`Y(gcB1&+nBl%<{Y3LyJfn&rC(+n+`Ej6SyWE@> zv0#DuIy3Z(SR-ORLkwFz0|B={Cvgi2nQzwOmygDTRA@m)N_ZUEwCV)fim(T0k-pq^OwjnJ|{d zRqn640HZ)+B{lb7&Jb^Lf`MjY*J)r%y5qUbbf8?6bo8b1VvVgxO;~mp{hl7$RXUZt2t7H8)J2*@V<&yM&Sp=ePH+ zqMEx{!4;TrhehfMCQYaDK)Cvm<}Hidr6nWrfG`T>p{E(^9dq9t-f9`NCJ{)Gr3*cl zzQ;M{X4cm25)~D_%bSXf1tHeCUDdl^f5>y)=aA4emRS0=!MkaLwd^nDugFvr)f z+aID=fx*6+)cEc{L$+cBbv5C8-b|}#jII|WB09JwRM{@u;ScsDPepg0CxR? z&mf~Y0 zb|1qsq}}&=j;>gpYn|j`{goLCxHuCUEx$1hynTQd=?Xxvz|? zRwA1P{O5HQeK1P><{xksb_EfM_W(-~r9zZMJ2}*7E#}4{rDh-Xb!@%PVm}Pj@XMMa z8u&VzZ z_%MM=&Z9^rbfebMCNtY#x5xCuCc@v@Pa;A)^;YR1=_2=X!V2eLfia{#sX~f41zX@C z_1m(y+s)fDt*x<_EawbGHIB)Y70+rddNp(7-@s&~KJKsm(f<7s!(lz)+7IQeKxXUg zg89BLmZ?3;6&60zl=#X#x*(W~r&p`-Xis$SSFPyj!cY1ouU&M5CvM&Bn%XW3hpegeyq`CCU4D%8UeaXqM z{SP2YtQYN`}|I@`2}wEeY%EmNDW>PXbCnjvrG=t!1?w|;=-Q)0~ZYW4`k z5_`&~5IS9^w<^j-VEzckG{QC%$Y?i2q3J)r$S(c4U%5LgZsz*${kl=)l-!lro1n%R z>2J?u>gIH*K)x8O=FNTkwB9lG+I9K@1DAnfp5Ia;;mxkwTaINBzw;mvCS&}zq)~`n zZmg!hr&Xp!C=Yr(r|9-(m`v}~w=NBA+&q$kr=<&7n7G0x5so>$u!rp}PD`lA8J#)f5#JedbmUZxc{%@a@@JN@g+qPRgq0&6D_Jj}zu)VLG0N;5wp;<~9Ie0?C(fGt%fcWMC2+luf(t7)_SX z*e9SV6p?sKmm;cp^E*Y7bD9lJpontxd)~5(U-}a}V#iDOWT1BK!Gw*OZe!XpAa+=Nd%-!<7HrSE9AVl^}4t%jU+#;jGCB>7Bui-PnDyqD*g| zXQOc9r9(e`@M8&9gxBXyf7;m4FR>$fP^l6+t|FPMp5`+1hK4W`V`Wl~QP1*uu^)F9 zrzh_VPh7?P?1Lr6=0Rm`81WHE|7}SyXpQgwX5+x7PUTcX!oA5eZQUCJ9af%T|DTL6 zN9gTCmJ4Rqc;$Seuxe5te5TrBxR+bIb7o*EVamagMj1ct0iSfp)NQ9UL8&68_yPsm z@7zuRnlIW~B!AhPtSsFH2X{*)1g`R)85tR&;WJ>)dd}+V>bgl&G3R}#?^i$9{SD~4 zDaqc7`wlZ^23NQM{X}9l_ud(=v0r7j+PlI$4q&m_<^v!u;aHRR7-xaTJ($F(_cMA*j1w%!Y*f0K_`&-ty@!dAc@wN7>RKv0}na0N< zjpH>yJA@y{=0i#0FPZk1YaV2a`~d{5j_54_Iv%PYVmrvh=U~Mh>a~7OOdZL-cS+*G zaHE70YapK)AK$k4HB@4;Re~dM<_A8=ZAZb$l#+?pEE^{Ys|U+NVR~=O z?~~n5hd99pccJH&m-^@YCP?KO0xdnF5y&{ht7p21hZ{I|LMu}pXk4Ug9_a@s4A$3~ zd@5n0P-^ohrA(Ck{IljbC+IRWn9?M*PyPto_uO3A=Q~xQ7oPXM==hEAn`GqZ1a$p@ zIzyn;&Xyv_ZK*B7jxzJWQkIcd1mv24Nz=}??Oz#b+{?&Eu3oCx%E1_A^A$F_gX>VQ z+`XNPoqyonuO9bHk(-+jkrrA5JqItVcjHwOo_ikNo6J;<>u4Y$-n#FhjmCBR5yImN z4jZ~*rZjp1IDvBcmtsH0s!?O>ms$?wE5WlaT^QTqA~ z)yIzRI&j`1aQbc9?Z!f$zu_~eWacz88#KnnPT!+pCe7+rn5tTv9_k!NGm2#=89?e1 zE~7gqRV)%sfr$cDBrON?9hW$=tSv0$>yb_$9c)#0?Lq*VkLLQ$?IF{Sn?b(O_Qz%R z_VFJV^W&V+^7&>Himv6JKF^}VBqv?9-^xCo5y-n8s;a-}WsjcTTaDu~DL zk87&;=1C4XELn}Iru1cy-nr921k+pT!d<8B$%J40;tf!Je?AwMh1cfOLj9Q$nso}}PZ#H-+!Nul{5EQvSi zA~KziF6YcS4u$w_Y!0VJjg?UOCsE`bdJ3Tgkrj1bq-6tRyO$~hM}z~}=8vs~!Ku#o zZCw;A-_p75yep~lvsbsuP+mAr!r=HwS3Rl$RY0aRuv5QN$JUm1*qYW7w1(M8KscL3 zzw_H_juf3WW6PyTc?1$qr%XB5Y_-*8B9dehwr%4ymTu|M0JJ~6((OU*2!8b4!+P!t zSw4S5T%|l-h1`gaFl*eM-|Hw1u=#Qmo~pI@F|JW8OAdSA`Fh?|fDHQLP=HC0@V$lG zQk5u1Y^k_O0PG`Ys$tz$e*|uj9rVgh2e&^9sJ`Ra95*+;05?W$wvFugIS>(d=tz|M z$r_649zKXN609cgbX5i#>`Yu{Zw>#teB@X`2fD%8;Ysn5f4OKpU+g}w3hk-XDY;uN zeuUKniAymYLxXxBob9>RM8i%ahK^v0BPS@XCnz^tVQdt~ua`v;8%6KCmbYWFOrl?w zT}BECDIkk(0?joT8#~?Mu}^k`?U?&HV?05x1M5DwQ^`RudIDV!RfTmMb2F&5ASv0j z!=E+$M)fmsCq}rR6!F^Qd5OUXd7&~*VKWaqhv3|j_VKQXCj)tE@sHX^2rXFg=Qa)O zI%B&0G?W-#9?ibbV(&`O+s+?L=clY7nk}h7S40ohQ1|Ts`c!-3! zirtHlkAqPLBfyWtK5|N8iIY>@s7qz_Tah-vKNyL)hWK*w;|~%6pfj!SwA=HW#!0Ww z$-i|Oj}ePGX%eFXUQJWu-NAsxS2|6#0S?XY6Of)6qI?ZKf%g^%+9ovWb8R#>oSRmc zuOZ~kudgQDv$%C_uoh@m1X??z^MP)dimV%SV)2hIqiqxL2YlcpQ=U7O3GcclflkbQ zASYG{AY6-Y;oftL2YLx5y?37lodNn3-$|W|GuU~q_W5>DYo$n)4(ok>9=@!;W{t$j zzRK%}3`@T&irl@j(^uMKa`M)K7e-Y^0&V?wu%y6f2G!0A4fabPhpVZMgP+}t?!)GM>0MqZY&PHyhFeo@x7W?s()(MTVmTQM?aWrk%u zcm=QofPcNUUA_UdUba0x=^W*_J@2k#oEK#-J)0bU*IBU~Tx_dzNk3HA<(r1DE`;8^ zOtM6E5jWxtw3sgdnfrCG5nV&Wn8{<$0t!UE+@ZF)ni^Wn36c;_9vz%yT?Z-z4}j>1iDbKHVbpV= z?qGbFpd6cQ0;8iwELG7kMTBQ&I^MNIGxhN?G5S$_^KLyh--3TN>>B5MHa2!}wfK`K zMeQ`U7Kc& zP1QB&8v>!`ZKV^A{f>A4=8sRMOTjj}3^KimZ4R-0l0`PsPnzZuT)0Sm*ikH4o5onDGjs&ojD(7}Ynw{q@yf9{X>$YpPKj=@ekm-Wv<( zV{8>@C!=)<14EZNUvd;D+~0RP@r4wF~w zC)D-g#NophY|otnBvYu`^ul|mUf>GyQ|kvJ>OF!kEzM9;w#6t8CqWG5$Cth>O#uf?L;g}b4`@}j;lq1Z% zbl$b!cSx4(A3A1hC(}q-zT%M`%IE#@xlhT-O8l%CwEKgfmvH|y4o)#+bfy#iLXbN- z-F5v^*i)-sN?9MancM9vWkCSQOjdYyY^iqlGV|O?Zfchy_OFh1@b0MJ0hETtUGLL;qNV}X6VslC_fdV#qPX3Ds(ZW{eXg%UL6L??6Jb!rk__*TZ;R^op{D{3NB<9^)UK_~< zKiATXx&#x%0hnW>*Sg1-CB5h+hf@Rtv0Gv%lI5&m-u{-|G`H_p9Df|`#)%h*}p_dyUsj*F)GbL0PECTc16$1!d>8gMo!4%o^yRoek&AhhMC*8 z_gQRho!u&C%dKvqyW8V~RZ1|bb0$fe%rC8lZR;(N4CxNe$?MCK=?~HivR~gX~ou;cQEy)r``8D|bh( z1^%6ULEF~xgOFj-=$R#8N=|lLNwe_Uo15uK&@ZrFKZ2QXdvFm$*uHQxI;V6{Hv*fv z`bJ_%6|MAkB-QtF-z9cQ#i3J9d4>HosaM`)YNSj}g~C>HGZ>0)Dm#RklaRC%E$f|t zw*Zy47MP^xd-(MPDK|m^p{aSaO$GvJ{(Jp)rv628B)u9zhilW*w@_(Ix`!3%hi5q3 zB^JgkfIn|sJ5(Y}fwi}C-%u5bdP$IAk`1ikSlXoocCncbV9ShGnOF-j`k^G+5W_CX9XMC%K=ux?2cnU&+n8nTM6xc*IJH)ATJFZfCPX5r?$btl(tuF zVop72nPE=pH&q8yv736TkgJoYUnBWw*mW>l8df7{1&BZSonW&)P!8a?ebRii& zK)ocKaj{uT4vF2yaG9;DR!I$vxY-1S$ZKq!=RO3f1BKiPSe%%tQau>xmwo{xqIF*c z<1Y1AdDFYjbd?l`DGN!P8`aT)pP>~Z4pqYihHwaEhi@u05$xjJ5^S4zB>XWz4AVUw zxAT%}A=2}4$(DZ`7!i3@Iz95UT`H`hX0Z`HPa~14%TDWT3K07~uGdj&qH5-0+eGtH ztP>L_S;6^n#;ddR8jnX1a=OVe_sti9Z61(h7w^XjDy{ABx$ab#QRm_1CwQbNnxA^!R zVnm9OV~MSqnyR#OH;5McmZh`E4rv0Gh(iJGnZsvZWr4|yva*u413v7m8e8qf;`cZ< z;nac={RTr$$f8(_yc`0iqGBik>)LCH;b2ki%k#3NJlih(iAMT3mAN{}TxHOA8Dimo z<6;b8Y>>cHQ+!QvZOf9JN%D{nZ$T0NKmE|aP7V1t2lWiS`Im;>BPKaEmD*Lex%bl3 zj$Xg3;){@84)=6fe^OpnIhDd=o)>1;W3<|6HTw1$@Mynaq5k^RS4CN029R?!*Q#RC zJuN$53nB*s;0OxTFk+6K>RcOk6ROVvBdO1b>uR)Sy8@9JxWt=;LJp!=DFXm|oNH zc!^>jxn?xzLk3L#5-_5lzc=z@g&X@>lD7>hFxJ$dZB4gS2t{MI+CqXJbszMe03e zinzjgl7;0Pu0tUp!l*uF4jrtV($=xba2_rBGCTMxV$2H|S1wzwjCHpZVgd%c8u}%Gj)TG-h zyuHu;LIE%MeYB$$SGLp4;=21(+Tbl$qBI=*I7>+8-`GgD)7;z`WG&g=;>6X9mExG4 z)7vfAQ7#qVBF~JwrQJ95-7rAXX6H=4EAvm$=|{8@OtNntbJEIcxe*TYR%oMK^?q04 z3|_ar1C|W%7GV$MdZW8>ETaU;#IvrB* z{0BHlSTXw6ru$*$Kxwoxv17uq-c1xk_MF-HU;|R@m?DCwK}b#diz*b;f|AZ?s0LWVgqf@{A#&_Vr`xTPS<|-z2h9EWM^lqoBkUcQllBs#yAbF z1YiCJPnAKz(1~k(?gYzX*U^u=CJ(@w9{OQ`YSX;cF|@HESt4S7=Gm$-+rrYM9X7<; zeE8@{0wfLjb6im|DgFRt*cTvqL)p$X9`7Knke!9^vQ>cJJ}C`XMCDCR1W>>3h(V0h z1$P(Tp8zcLFjyqpFnS~Ns;$(3l-8X{Kc>;(#?6#25{4gOLDo%GpGzF|eGLubPyuH~2dzjG zTRU3R%YNziqdMm=wke16Yo$k1F@ZUit_4>VX$(8jx~P{c1}V z`0O+0cC%R`R^!$_(aY0}^&g?al+GWA(xfbkWQ6>d{B$B=Ms_BrX~lNff$N{8dru>f zB@^%1OtrsZmCxy^m&sL}IjQdBDb!f@7s}&jd~tMETR6JR4uI?nutkGjvTPdv2hutl zo_R@MuKNiemRoSjj13YwZASX)dV5kT4D;Zn0af+$m1pGhmoNka$zBh8Z1KE1A0P4p zT5H9I6Pj&!)@-$g*36e5-oDkj3l7nI;ChYZpt7^{@W=aYRR@N+hq~h!U$iGVKjk6> zj0>7BE+<3dy@*iF)+cj`cL64>OuE|tu^$l4KbGE1NZU6UOacF9wPNZ}4m z54|5lJNOFy2cL#)iP%!v83B}QAv&?r4R$|IALc!vxgAC7xwcX?e@>wxII+<*7~;{` zqQxDOLkB+#+NS@rZ^RbBm1Oas!kKs{80d)ylUqc5?G(GCEGe@`g89XtbOahkmCEV)5L9>F*B2Nrd405ZE|vOBy;nw>xZP8#`6o_V(c8jev?AoqE3p(WIU zQQ^jI;me{KA)ju)VeX5$oyeqdIen}8Xxa0mTiI1-&t*?@$Vb-WnwIoVwWhm{`)S5= zobQilb(snZfY}vqF2*s(BQWr9!8#q{9Pn2TLIOOWpJD`_X#-7x=X0fCSPC!yWf@+! z{Q)0GrKUwpM8tP5wV^QZt8iG`;%I57bCLVhb93YT8DRD2@rFToEL%>C5jzdL}$t5mC@cfiZe?2@nRUhi=$-8eL%~2Yz0ArwJ#;;f1lk zsl#!3YF~)`ZhEGQ<+F;`+1?y-l%jm>N4fa(T5-V{O#Ztdv=}g>Z-(AAa4D@Fs8ToaBnUGU|!Z)Vyug)rw!=m*!`Ni3<wR+@stmhW=Sy~yA*ljpuR}QOs_1i7ZungD^U_R|xaZ}|=KH5(cW}dZ% zUg~-Kjj<|om32{b`;EvPf4EChhVrH{L`T$Z0-|iQJ=pdVzxVZ>-lq_0_;!H-JMLnfFl`Z2ky_(Q#bx_`Zv12Ybj835> zpmND4iOcYS%UGQ9X+l|b;pjr%z&Y${K=g!M>3iD`hojzK^9cF&(fUr;BTV8R|5m;& z1eyJqWLvBCt*L)pgErId9zTY}+?)5%7~v$g{UN_nSj~w5J0UN5eAu($zCF0~vgMnv z)fXeB!l_bg6Nj`V7O;x$Zzkyw^Dp$jod*=)L`;s|m4LebwUs_M_Ns_J7kICpEPxz) zhq9{Ox>1(Eev=tEfG;iq*Np@f=#vBP=Os5KCkS|xs7m2arxQkvJ>Bs)lG(P5yB)*H zlj^_gD(-WRsQx>@1n4x?$a}Ruu1n*#vgXOEf7R^}z;!TIJ`BO1;v>niF`T?-E^9Xu zcw>^_Z+Kc)w}-EjIwlFi@Xex62~__gggxEEs-ODnVa^=;Hu?W&f7jF-i0814p91szi*0Oiab5Jbvo;Ba6)r>T;hM48Dos>mOb=xd-UXX zjE#8Z3B9Lz(l|hd*hoVCBOm5yqRgL<)Tk;?Z1N;l_8=~oBS?5?^Vr#;Z9_-Ufdp#W z_MJbEgfy;$G;VM47*G$b zr+SP0qIT5Ae%!9zUT2ept8Qt<%P|0Sdb4N|+%cZ9bleXPYaE;_5t#3rsi&J5kWbK= zbc6B2AO5u_b~E*4eqVhq8CSjQkn%${3{$?T?C*HOZj|Hy@#1NW&_cs91OLr)(6)~$@XvXx4jM%pU9SVwLd}P=UGCY zA6!D{bfH!XiYgO_y32Cy9TKg(jXIaPV?NO$LiEQeo)mlf9X{y^#>Dp`?+Ysq-mzre zQytMKe9h~GiEBr6vj1c&4K*>;nf;->alPj{awHhPEnZbqbP|xmI%z_NjY(l>*mxI4 zgGJ3deEg=T)y&7W|vXb z=G9Y#P`PlUV|4{jp$E36d1ZLq+QmBzP^Fh48CL$z2*tZ@_T|Y4s@oKI{ExeL)=9tb z;@vOoi{&YuI^px|71CETy9lC-Ut<%3ObNET)iPSui@aj~1x$%0fJLRx2RTa3MAZ@b z?jfP>X#JDO6TO_tnsoWrkL&hmu~UT%^jAmxxUNu5S5;rPo9$L&xlQGx*;`{}{b4vW zjg{y#m4uwEJR5{B%q~@mUmIU-yytLi&O=B9bMwo(c0K$Vz*}?? z3sZltBcNV6M{YIAVVCC_@LZ{@KYlM`a6ZkiZOs44LH@<@9kFDjdlGxOmYyk?4#90e zG3D`%lL9NFUM_+?alKjldU!f*i?ABIZdjrdm6hk0)Va!9R^r*|Bp_s=(VO0SBU-J{ zzm5IW_xSK!F>n%`>w==Lct#elzb0INDs88Y$K;if5{4c1WrMjhejN~7orx&C`V@<1 zu$IMT1l|+r6YbSU?r?5b*NpsYtM^-+rmsv}YHfa+Z(>!RaV1hLxlK|{q$^LWh`2Z2 zQu^%R(NugH%9=BZi5jAFeO3XX{}5GN{Vr=+C~BDQu`n)BVaPgF>yydhx&S(4ii&(Oq zgvMJ#`!c{s-Z|U0X``2yqs5OhZZJJ^=_2gfC(Q(L*WS!Kpy3lsZL#v?E;gUJe3%*U zI6f;GDSNsiBW-HQfsuAfESsPU>1>)RpJmjJJ*?2IgT0%~VA6&jCE$O4=1q-kEmE(^ zH0xe=$${q8Ef!bf7vMG=8n*}TL)e_)0=HAkBQK5l2VR_?P^drQ*T{z{TU9i+bol4*w}8arq?{Rz+>JT$JUh3JqNq` z$qe4Gt1a2g(D279UGjmMT}%fKw)~w{htuZeN6TT!{PrNpOBbo!QW^e%FtOj2Xy z{oRzP+urZuBKPv`(MvSrH%ZkGjWwvS8}F30#}LM@K5NU*j!_Y|JR~|6R}i!0=BG9h zu_I+#W)A0Cm%h!L62`+tN18pBR5LxW?-}z9CCYPO_g0)8_kIdR?Y0>n0f|ipf;$e& zkQjHxlQl+lbBg@%;)0RwO6E&cw_f-~Y+A&$iQhDS4Md^(I|-)*+omhRl`%e3#oof9s#hps|p9L(hTou;HeF zmOW@ELTdL4zul&Q`mQT~vOR`-S3b+{2X~Q?|9P_xbyx{|!p2W$Q62pC1Keh3xgVuQ zwtvxvw7oo^2qiY7JTuQp7#{iE@SqcOfJjGX& zz1f9>eYDugRFLo9P74JusBxfoxB2zqu4P9E;Jkjj_;7*qVFpN}Q?KJ3B4Hnq`lE|j z$CBdXPK%`?WQ^S9e+H{FdU3O3vR?9tX18v8{Z_B17SAEU?ZVU8jy>F7`bylt0@md3 zuoJpkI^lCT=^G2V549q+_wCe;>`TJR{}mJvvvDUsj$~`WC(a&6ykPUM=1r4!znodT zaLm8R0rBq?vl(5@R4WpO`C)=6D_vKc3Xvr-_@@X@=Cu4~BTv%X=YMv*N_PGHWKI{6 zTXNFbl6jx>&x=wBA#LiL7LcckP)DW>F_zO%q3wSy6Sw)J@BsLDUze!ub$by@9_1G*~wRNQmld`QxG@fx5j_fQ$`S*iR0#m=`7i{$I~B3-3VfDhYIgZd1={Lh`AR*q4Axq? zHQ~LU(B?kjsW`~m*P`h*a!v$|zUzHM3%{G)P93kMVGVAr?DIv>xs>hKB=+H=RtG{^ z5s z!{7G5)5Sg+O7U5!f7OUJK`p*zuOLgq(u|Fg)|FZy#cFr!UlB)wboA!65z;mmqH^PF z9itnKG#x)k)&TGFTXlJPd9A&HWY{+oA$YF5O2GFdQEMgG3pEGhEqa-7^|)Ue1x*b@ zjSQgB$(UGiJtJ{5(}s@&7dpi*LQ?Sq2PprDyu&&~&-Z8-j4uI5R?5>(r?$if# zYP&}7eg4JX0Ubh22WF@;{V7Km8drk*8Ngud;>$VMWsfNwFXjrZvWBS{b`(ed*6u4n zf_dBkbrf6+;-&{{lBz46LXYh1fGb9Ku?98J+$3`3`&Di|k=mSMj>AML&@Fma>xRO& zIDYSGx5M{%E_{j@H{qLta#6&V-!pe;Gr{zPBoSxH*n5vZVJMhCyX~4 zb{to!tXGj?YJewKMbJNg?U;KbYm>YG$zGNEcx273Y40v4K6 zRm!l!(L=4&h{{Cqn2SX9m`!f@!`T)-h<*NnEnT?$)B$O#$Ph{uCN4(J=KLj3(&bzK zp<1gM{Emo+NEmucHCr;x*4KQbL$%MbFDyuLTZjznx&~Hz!QD{Uokk<&DMN+jDQcmw z>FpgVGwT$@7!*XTT9rbX5VjmQHHz2YEb_)_N&Q^dvR&;2Ec~UC>Typ_f=xq~L|*o0 zwq7xz_b0>3ftP#GYt@4M3I0LhjBqo(rXyPc%h00c)~E_?lw)qN{Rop7GOQlObs3#_ zs)-`7x>ng~4;~k1ykV)71)RohW%?VSTgaOrWfI>e!y-KjEZp^z;|jBs$37kVd)p~U z>Nn*3sdB4zlft@`@`-TZD8_3>=8Ge)_mT7zw+V>DMMu6DyT_`*!n(`dxU8&4A7ii*V?hrjR*X?L^}h_@%1MBRswyi8fvgHSIDX)i*oi|wpv5{<(Q z3RYpVRcwc1sx|?i`^whBp)onPR|wO)7GBD*O2Z#H<4b_6slOCt+M0EJ#Xi2=`qSr~ z`m{@TZc$@pP)oB?ps_dO^Yh^$>ple#jffU1 zP5=^-ykMKkY(A@&0W*2;@8NnYQ7n*k_CzyhsI}JM2P=Ug_ons))&Z40tI2uk7SUgu z{Q)}_kFosa9*3}wEA*ddbH=rOkL@`v5oC!rVS2gSk*ebz#`*iNq!Q9$mSEJn5;818 z2RGXk>#G)QI~x4;@b$lW#t-uuCkq2A&5omv*F`l)BJ&fj4t|WK)r=n2rS5rDIxOQg zvNxpagLKuXh-l^0hFO~28f(YSEXi0lDwUZXv0eLboZAjQXZ*W>PpsbANx25nX#1^s ztSFX|?9At>a8m$92QP$U_$A9rTJRlYv^N^ z5d}SmS}Tu=Z5JRH_;reUrk)>V3{D@&n1HIqVhvV_mELcC()i&p-!>U&=OC&h*$rtma7 z^LA-)6(BW{idmcE_(#+s&osBm-tE2!CU4cl%rhu(7QgCE8VgTx7Ka+GwpbdmtS$xV zDxagH#Mbu~Jts&EA7~6x=QeJk&x(*YmDDB6vKVPm6bnTQG{A-038pe`C__w0Y>N#t z!?3{$*6Y);q^c&t=DF#qLGRs+%SSjY<&-t|cjx~0tQ#EHdXA>2r4&-^J8BiCt(N@N zftY%g8DT1Mx0y@U-F~3CN>TM*@s5+LT<afI1ykpbQbx^mw(;3lJ@QB7!>$^w=lB}PSetjWse(-u5AmLrLvL~4JD!i< z&Y5Lf=52tRyq_9wE{{?5P`VWRC9Xv=_Eguz_Nth#FCAhFsvB+I&Ik2%?Y#@Cn(a?J zx$)Mg_qq6i!j-BXCwe!nUqRg&$bj=l`7AG)MlY>IQFxRuXDCqd$7%)3&*|( zY8Khy(^#5@4o5We`7Ji&%MEK|tx)M%af2mFTS7U&_Lf)Lv}o5%+v{M(vdhfZ_Ib+A zKtX}KB|<*yVGUwx7@RZvsBS4A>u4>!&PZaXgyb*MTnbZ~#o#SEa#g*}R|c*k@HWS# zkBXoGI0q0*bpu=_Bv{qYzPY)ItMRe0iY_?TtG%F|gQ^(g zY=mD#v8%$E*|kn=N8V{G|I&5T`;yYdzJsOD))2S$tk~^vHxBLKbR_WY_CM@dntw^= zxrOu(nT$c^ot3?l$0CFRT{}?Sw;LzVgH;PN5;!^B$*`ppROvSytn|C0C{2{bvm7$8 zx#MPIg;_pdm+(LqjszjV`QJ_V^o`X+?mpmOO6S))Q5G96(M4?MIHkYNe{5;3 z`Y$an6-VfruUtXuwseDw#{)+=e)|ld7>YyQNa;%Fvp}Al0h<*a@Ib=z`8%I*`bImc z>NyJ11HDGuyoBz7vAIr?#l?fgc4rtpE6eh$UU!kc{R4$DzSe6yfE5f-6`D5xQ)vax z{P;2)()0H!=NjO7vtIWLiALexrk`L6H&b%N@Z3xtT zpH6+=M5t(mArRk$2{LWFaq+iDhqR>pJ0@MI$V~Bi zjC@J*Z^)FWz~wi>c=-=6{W4u-r|uT*A0S!ZIh+ZI_kY0g-$?fF^}{d4Y4!hseiy_6 zfb4S({ht8%KTtf8a>&0$ssDoCrLpE${(UK$8ROtT@%-63{}FXKKxs|C!{|RH`W1Kn zJE7$vzi{sQx{u3ZraSj#g9*Zq6c9VnOGB@@1WP|<&-r9`m01db>TAmgsAw#@dh>0r zWViHQQr6v7a~wJQOqA<fZSt6oqfFlE%2G{;aAH2L?B zBEfrm>yveU#|I-tmi`NNc6Q^nzGFkFGQOiai9tXnQRTjVa3?v|*kx|RW#wh%*A7dx za8dD1qbl=rk{@9CY!?rO@hJ7P76-A*>ZoYyOJe#M)#HI29rGIaRKtbI^djMiPN@_G z>l3kf!itvL)wK9;GyOKl`kfnd^Z*90C#pF;IlSa|B|1_J3^q$IEGgmit>o!@{sm64 zoD;GlOIYs9#WTm-6k_bV--7Rl4c89^ohvd&n_ssG)I3|Npx zNt4r8@Q6O_yLtCXvP)iv=H0L>;QaPy%YN!_&-6{QaB>VRhpm9)gSQvkW~<}p!k^%s z^zhz4zA6gyOn-I1p##2i;tMlo99Pf4IAvoXlD$ z^(>*~zN(%T3+|qdm$~W>F)b|lXsHE%XEqIL0Bj*wuJFvE&xYOzWsc+2Bf}&*m5kG; zDHr8-+MiVy>hIaXV1#P#xsHS|27!awLPOu30buh9?fe~>aM8!VX)pI)YkE@042FV( z6)ZHyAckYwMdKYWf>dFvC76wc3)1iDz@AXzngKpNduP3(+!{8|vNHpGaZN2*Vs>lI zeqW%3Q7Ki*)#Ra`)pGn&b|*%(?o&>0i}u)HZaS2;W=uDCPfQ0#VXRR>YbH8t;}i*| z8cke0_$QaN&cg#TbC!$7k z!`U)jbD-q5Zk`?Xwon%Tza(=HW`|o!-+gTq#kLld%4vLLCUw#&zT20!ILmZ)MqXYQ z+|ZeZeGETeW{;Eb-27|@Fz(8uUn2FI%0`aT4fc_ruT1N0L1)m9c!A@@9v{&Mu1PQY z2iwdz#>Aoy-c2VLD3!fATw&G@7S+08pVeP-H;i}Dw?yyPkvMPJmGs^NRq3)ARs6`H z&d)&ivx?Q4qxl7rurm`1{sEYfo}S+95M$({%30AiE~O9wbp6SLvs2JmSX9IzUM4in z{07(-B@W9?0jUzgvsTk0uN?rY<*ygER7 z=W(!Yot0PNwwf3Y@zw~z7tRT7x|nvYgYS?50f>mQDRlDOqLrzsX-aA<2T0%_R?Z@3 zpCs-)*PE_9ly6Ywxn)5RZP6NH?OR?MDT)&?LKe2XV>eg!$F6=~s?=PzCGQ|X6X23Y z3@ny$Y=OJ*m3WA4QJ}BTW*Flr*Rvh_A3nVY@w0iQ_b26fd94M+!YZk5WaUg+dx!qg zd6p@p)_ES`vd}Rn#XhT|AM<4%lWK%O86??ZK7=6)A3ihE({7A!{**SF%WS53X!f(z zOWH=pV%$tZ^T0kIjXGU6gje{!UFsZB{_Xc>(XWaVj>=?RPAJ5m>I9n`SgSl;-!dtY z8^a(6B3ZG5IU}D_4D%*z)Q19RoxV7|&FusNEMR-*MkgkaKXc;SL@c|$Jx<$7zx?VA zTsPsg0R#PRDeqcC{aV5nVULz9<+p|U>cy;MqAj#2U@k`Td%f}z$@c};fA8oudg7Z$ zU>~wt&#jDHF|gPzRkHy`olZ|^JKc_qBqDE!Y7|+LJCTc|ceOS(%Q1vz*)}+d_YdQS zMScmO;=VqC8y(%$VMCn;qd%5APQA_&_uQNT;(+~R?JDmr6Q`ulRbNuJT$HQ$cI=-H zEzepoYB^k$$F}h;Vl1#EzwDT}tfnT!2JQpF?SO?2Sv9I64F23(r&CVsvZ9RiZEIyycXub`&zOFBLGL;3it@Dnjo+_0Kzj^lCidbh8TR<$nSuV# zr*nvDuwrL1v}?k1p0)LT^z+1D@wJ2HY=QszxDTHk#BaT3uY>KZ>T2M#-J=LpT`eom zVi%Dh=uC|N*$@#gaPX`oWIpERKrL*QN=F36VMa*;sXN3Gh-*K78M? z?EZXx#BV|D-b;;5_5$+#Mc8!^P_~Va zm6qlCRlV&wtGPN*OhFVOEkJ_W18o2H`KkEcvHOrNRR%;Ow)*8u$8feAptLibIdQcC zZeQt08AFC$xc;9MPxsEB)nEVheR!u3NdQnxdB5iGzxnF^=1GLpwh8&NM-Ye3ukA35r*G%!B zkvrTysE?ixQ`LxL3a{9mktd}F$!PaS@@|!j?*NM1;Q&>A)|qSGiG5!6Q*ePx3_h-E zPYiQ)stb#d4{4cmmtL{o76ds%FL+rkOzk)IVA&)$qH_6~-e9Rmb*cgsEhU%jf`P#= zrrAPz4EVh`F5fD2YX9iHjhCd~@Sx0oiD*&vMhUR0$4vRCM48jdQ;{6r_lnE+pEc%OsIc9Bc z?%*I>@|N9S7`xn_#x(_+#toVMdu(zyd*-iQ;&X<$xjT9aBzy1;u1yQYBT(Z~6yr0y z#<^;1?uGE5KZY|S*xbZ2YGo}-h&d=Bpv+cu*7lUgtLBVWi(aIZP2&c!x=dXu+;4S% zOOZ_!MtxQYwMKnjIAbjY{}2}vh#z;E@)(>a^X=6Wst{_C)^lHYmxWFhpV(IF7aS>W zO{(oGdrM`f59|GsO%-ddECy{{4ZLjvOK~;mewQ_S@uFmY-s9ldv8Xbkn~q}M>A^JK zHls_2X|A-BhB(+(@yt~GHQ_=T()TZjrXV%ZsJ077#!pSzt1OmwiR;URBY!FjBn$dK z8rbb(U$Jo^R7OWtG~IWy4guQ0NJ zJOmBH3wLLXMMCks?H1QF^k}4p?Mm>=B51#s=XjH4dBvj#EKW=TS)NU$N-f1=*Bxj{ zVv<-xFlmG_^Sz&s$gp`F3zA=BOl*u2CYNj`tuIbN#0(%QqDr;k??Kg;**>bAphGen z0kz?AeIr-{yzj09E%7IouGvY|Xc2t5xpI{W)_F)aUc7^3sD(Pene{SU_Baa1Wjews zZKsTK)LZefhjP6$*MS|jN~Mv)r5Q{a0gdz;qy{`H*q+)i#CFtNSvS{n|M?+n&;7*- zWAzLTk$Xp?uD|-B#3T>6Kv8Ln@yqBFXsJuI=(t+w^w$n{1r?I-Kp09r~_4HUsRbDAE{K;5Vg?cuwirF6GH<5z3>#7?qU$or>3e#hn z?tU*ss15lZr zwa$u1#zbz?&uA2vnTM;a7ZBHe>2@OwystOj_3Q|hmY+mK46#%2{ipmDc@0VbDMdWvKo=iddhv5xtBV)6u zW}#)OC=~52Rc5grR)y~mCzFtRxKa1sGZ(aoxfnf@XlI$0Y!LZXAXu)3@pG$?f%0K6 z1--t4y+c-6zr{A@q%iByzm4h%B?<$J62kW{YJRM3zjoNf*B~U<6loUs`F#%TPpe5= zqVA9gJx@%AU7{-mG}_nnw&Yb6jk$B}RULD=9Xs1a29(nF3^%UL)+UPIji@e4b7*XM zR8TKT!g^fWi2Z?bqGjH+jqTo@U=TvSzvyFUMx!ujsMm&BtM6V`*J5I=6SSE)QU={s zG1r+vj%{5_*I%GCExr4QBs@Apa&Z~gd?m}|yun*X{fVW)+Grpg`X@-(^BIMX5 z)!sXtS2iNVyajf8#kySh^V?o8jSTh*fTI^$H7a9=`fuvpmwA-446}p9^Q$G_wa-D* zeB$gZ(uS9m96ku9MKl`NtY4~PTd&_|Txh-q<{Rp*T|-|g8evad<=;V$h8qsbf?ZG5 zE6%+&)+kjKwn&ml=IM85dY}w8%NylFegDu{*zQlm=J#1@in+n|>be~h6C!N)&eg-^ zH_M$FK!r}3zl)3ND1L{8J`lg%0l%#gWD4a3xr@AXTw##U52F)k%`BBLybY3l$AI}@ zn}@#XHU>taA5UzL`5NSHWT9*tlWZaZ@H`7r{o< z$xj>5qcqnGig|3G6i1#u`abc@p(i?X^CPZ4jcwp_oEHw)@AOggE|WskLOkt#f%{e~CEDc8bM zpZe=H%b(;r7kRJoOhs&ASDHIZ4I`kicjM<{ziHt;Iyd&|T$CE%$6eN|lGbPEodMyS z+t)5L&8ga9bL2--R`cyOSQgBGGcH@LREOTxmOsMf!6LLtb&Tg*-5i9#Ou3k_Zk4Xu zd$Y>cN3ZXh49CJUmI}idP(C+Yn={J!Iy4(b0fOyBc;&sf`=;AGFt|p~qyX6sn>q<~ zS9N+myyWrfaW%Efcu0Op?dxWkh<_eIw$E_$Z}sOpw3Thv9LFyI(*ADL$Q<^ud+{ij z^(Xr>n2UjtKsJ7(ZePn;%sj_ke28hEt zY<%9J7o|}%5Qw)&f9qfIi7?aZ6Xr_08P(~5#FY%OPUQ*XO`flqQ^WgDL$IOnu+;cao(&_z!~l<7vvxlKIz^d>+H;FhdlT0{ zX(43TusGkm_M2*Vja(u30`VhP_Kw>gZ^^Tnw#7_6_t$b(h8wj=JzQB+2Fx#m0?Qy^ z7?bWdj1w??^u$$G&{D~jvY+X)`5% z>@iMxxIOgqX*&6y%=<9FD`B@|V_&%LJ%a`rwqmgXo?1>hVudl=jD~j(P{`ar-e$wevD|x?f5+}ED0U?o1WGFH1TfyC8v87=(i8sWZ z^%I&oO@*Q-bM$H**X|{gK6iMz6&8hkJ%a z9MCPweqe=@3mkwL-(Ul8ad2$`fH^+fd!cvPaCBPr)s=S90{g zX3oI_d>}FY{+F%7m5lcwNKrZ3gmVoW#k!G7?gjC6KgKa2Cd^9qF`PcK)g=J!9xx`~ z6G6Y!X9|FG_GZ`Ooc2IRsj4Ug=iE*E==fQQ5PZmSEABJK8q~cRyl*>}(;jxb6#Wp= zWif?$OP;V6h=2Gf%9>fDh%p;{zPBM|ti;E>w;VB;Uv-Z* z0hqom9^atLGVKtUQ+#qn{Ft?qpC!t;-^NV^e8%#o({(^KW<#LEwwvo~H$d3kXTX@0 z&((&FKo$3fjT<-5iL|G|MaO70HLR2^RIyK_`>5PHVc+H`bND%y46@d=Q{kN(cgo$5 zzSZrO%>*E;dn&IpDdc5v1YbSlLx~QN$w^at9No4V+bV=)lZ$4HE|eH73;#l*f{X)3 zTiwio!oEfj-mw8ff%O|Oh?IkL(IR-gSP{P2{c(i048AWUQTK7yrdaJ#b8S5ba5--v z4ED^y`!368=k~59x-qV(6br7hQea@H>e~8#l>E(0v=1y^I!fg&1=LlU_U2bmS-a}P zn4Ydbb}d8x1+2&^>AZs8&TG-u6JJU+9m5$o+X=ARD+~^SPzPT z1LQun{;{ZtOfINyi1vNoiR`IoU#3TkEwqc8#l$$;E$4jlVCdT18yy$mGz{BfV zGv7yn8h|fPARZX@ac(T1D<>txdOIXEZm7^c0LlX1Z%u`7fcAhH`)Gh0I)o7K5!p9G zj!;cn#NK7B*@M4x`HqW2pmovLk1qU?kO!J}0PQg8v%DFYv8v(!o!NEEdIg;o5dc^E zclv!68qUfRp^o7xK!40j@0XVoGMWv(1U&vMIs9L8cfj=nb=g1N{#gOTvGd=^0qrh} zp#M_6=+LS7_#Y($AlD)}t6cn9SpWoS`!&tx9r*7x4501y6^IIdNC=u@43GoH(f%dK zua#~8y_|BU$p2UauubXHg)3(&_*35hhZ4(`+BT~HR4fd(O5RMf*~W_oicQ+8vp@+d zS5lyM|I_dGS6$hy3QB%zXNMvjL;ltb^XAs#b>FS$JH#=5?hSuB<4Mv-EX_& zUGl&^Y?4=gFuBLQeWDVmij&@JtA5?SQFzvRid%fu((QlZEH1O#pG>n}=eo=m^r_wZ zRAOWK=KsIK-PwfK*)4x-OG^Ve^KRJiYo_PwpNv;~Zndr0IXFyKxvK}0ysWtgTmaOt zWye`XUWZ>GYVZC$Tx8kZMlrsUB;jgfX{k6z^fHJ8d6nOBWp4Lh zXk>iq;odrmcm-f^8-wx{w|?I^HSME3*gMD{VD5w3DPfg+Yy6O#X8$vNAu@w`kbckIo%* z4#)6y+7j^^hQ8 zfhew%%Ap4B6Ay~kedlh&k&3;-b(vtQz>S`9eS_qitm`LF3aP?BMU3PDJ;ucvgM)x1 z$MGw`tm6TP-;1NnxE2Z5CCy#+5PmnpeyQtx!J-LaExm>YyY|^Y3XaSh?EL3aUONLi zxSS6=o9zNXH&j=f`Q(L&wa2uX-SFi^+4#A0`APRg`O^or@^!kzP*jF}x2&O(R(1ig zu^tVB&XOggDtWutQ}0KhGcJGB$bH*)xzi*lVi|MyWMo(m*ll1A5_jL{87I~N0v;&3 zA#MV*-J84q+5Jl!SHu!WCTrszT{tHi!J0eT|FLINCg-ZTxA$00seAA0Ph~cAaE=|K za{o({B9A5)zm}f#$^xFh*e>C&4XPbx-M>3HV4mYwJlHtQSU8rSJTYM5SfZ}2VIVu9 zC{^KQ+uaD?r1dOpZavy^Chuj@{Tqp)8t7-!HmHbKpQIhh297FG8I|`i0fuV>&a>ZjWYwS$-*NABR~^a2EV{0GaU^nO=(- zb4wf5^0jP&_OrF{SN7f!aXVqY0C)z0w#NHps3Hfk9G_nN8R`l#b zNMKac?=l9560$ASJ3r;vo}`A;Z)(73rQ1%f$^_0w7osT%5akvc->qBpT&7cO8aoAI zG=YTEw(KN9LnCrjBQZ1kh>Q5bX#Lu~t(Ri$AANuIO|zN4C=1Az9uHNfqI za^jVSIpD$ePI`$Ru+vCSf1u@~t-E<;du?=>$Kl3Co3{#UYWSt~5)O@)_oEniit@~B z>;(@z`uKO8-f1E1MM?|p#is?qZMZ?bDn1sA0ZK#d11$rinz#d#$i~77hiTKxn(Hm4 z=8b4%EUO||0nH4fa;fp7>Oj=n9Dabk!_4~4puyCw`y1;u=5L{b4zob3)9s^DODdry za&nCDZ8rfa%{F^|3y=>D-HA*)MKiFm9t$p#$PIq*QEC6EAYi5usA@QP&pmvdlmivi zv%UH32FQJ&-BG_b#j7yEyOLz~ngz5kz#GP)Bk{QJbBH|}E5yUGaF8qdc9`y98nH%(B~SWnwY1wG=T4@v^otdfhnULds0qb~xI zE4*v5>mfh`Q>0x_O!jCtjX{h3M(-}_JzuB~D`R*4-(EnW@*^%KomM+2t28!J?oIh~yOYhQD< z*~92UG)6p{vU>(U*e%8{&5(g`wdS-!Udum&92~b47kM4l_kE6<_9pqG3&oeXPNtPz zOCC5mpbmb*=rSY-yqtHH*;vOOGcN+!O~7Y3hwY1)Ra2I+8wvN_%j^O&?u+h5U3+Gm zq1e~1{Kj#7;IGC)Ns@u532Z*_uxtV3G29xNi0_M7)X{{E7G}#h)ugc!-ceu4&#*Gm zch;v%4Y9%-Zrv)V7?E1ao5rUvv{^t0(nGYpioZG8mJle&ctxr%>1i^e0N*&d<{goQ!g0g$t7N7C>8}d^_ z)&N&px)_W=i>TV1+6Nln^IUsCz(CdF8Vl(nr8p$Vbx^R@r+G97j^QnjkLeb-zi4T2 z5|a$Pk9e%87c0f&;w_Cpb1R05?)bi%29)yS6b8S!6AD>--%DfiJfBV1-gb7sL&2(v zM9wO~l^a#r)}{}W2sU9D_}=F`hRlOJ$W8gtIw0@Oj)?GJU_LOm z_2wIQn*GMKMKp``T(BsSMtn7+Db9-!dssGv-)Bw(-5iXm!l3nQeMV~bq2@A!t;2WY z7o?dR6(DPEvYu|HSJkDCdEOk`uZWFV0%HoC(jhPB8z#ogA=Ih6pEu|QCC;F%MgOtmTXH#Uo8f$qH<2TzC1^gC)=5{6FBVgvt`PT~o0D==v7_Osa zzRvD_!U&c)4ZjUg-f+53d#%#26wCNa>u@UUR7aug)4h(Y zRNn($wDd_$SwjLo*Js0Ff>45XNL*N{A}(^;Tf>#oSW~VU4G0nk;)ObF4?eSdGk1n( z2zdPECXntl-R1I0f1E)4hqHq%`s(=*YO`%D=|O$CRyW7WS4G(& zoX(q--A@J9XkJw33Vp)CB}f&Tut&mwamwTJX|F7eg;@gea0vj*N)3EEGF1d+Pp)j9 zp<3hf{CNlY&LSv3-<2F4fGJ!?J1B1@P`u;l zo6p@Gcfqe%>}DNyEpf%oi3v}YCri1`DOvpG#_zMKROJFSd3j)u8l67^IZV-=oANEZ8tWr8cDg&NpDTA zNaB15fGr;_L`Y7GAJ%gBo{P`A5NPTh^zvqnjSCBEb(GmGqHzhJ+(UeDyw)rBg*v_j z^wcQ1F!yY1#uB&#h4KNR@gnBjLPEC>9y?OFL{axHq{3?|h~XxKBo@IMP1UEonV{NY zGhnBz_C{Cf5Kg7bGB#_`S1wmw)akPl8o}=l(*6j^a#MvLts{0aNpUj!QU>fFQn0=}Wi&cfDu;8xQ zu3*ZFFe#$8nj}4&2g4%TkqanCa&57}_5lM|ikwct#hdW$e@@c$1+D-CxWvTokHhcp z2lIUh0S-ipxXE!@sW0FkJeQhbwO^?ii*F9?0u=(r&^Mw7~4GQgzW&FO}AfjXbVU6?iSLqa6BYVQj} zlz_^3>|*VDL!nYj)a$W?1r-?*q8AHf*v1Etl$UR+qx`Yrz&zXW;a)lmFd!MfFXGth zO2hT=txbG5Dmskw{?5nPSeN1W$I(8_It_lso$gky28rK1j4OKjOHLe<53Q>TVB6vH z_aG_tK@;S1ilV)SO`+wYKN z^Myn^akH@k+EVSJrO=N@nEbmPHsYA4Fxg=j6`*D?*NM91T{SX1{4S+l#b6`|nC)aT z&+iD!Ov))x=9mEOzV>^=Ug+SBnKzy!;tN_4x7FThSD0m5Rr^XZRdU-NShG_9hyiNB-BVr0Hv3J1$8J10|)_WBGP;4L|~*vh=2q_2_Z;{N+4he zBoK;cWzN0#xxdbRo_p`#{p{?uv-Y>v_r33W->*heHnE>V@w(tUC_AjTa@<_lxp{uj zen;9HSIhaSv{_sHq*5v4y$@D}5PsHu?v0=I)ZS=z#r^GGa)_lEztu9FrBg!A&&+GfzB~jVD`%9e_3~7DAeY{X_ zqZ}IJ(fG+I4KouNEMscHs@T9ELs;#Q?MFQGYRV`MKDETW_>kD9o6{-`^y!hee9k9G z+QYY3ithzQ{!pxw*%^P68=1Hsb?Q=i#QLotC)g>HNtazvhEuI5`vXY{uXu`!lQ*d1 z!ZV?N*WK3=#46$Ks#95w^zg-}l1`xl?e}U*?hWfQ=FFl*PuE^bPpO{00Se}|d=7!xM`_Z&)L`?KxZzc1yJbxv?|(rlK^cky=4x>++o@=csLnmik>*2i4%$(A;q&o4#^(zfk2Sn4nvvQkb(Q`|Msx-RE`taA_ zb7p0HW_BIP8wY_zJoeXl1QIhsUusH08x=X*6+0Nkt!-yR+u7Rf9BqZu#waDuXDRxL zPJDPk(5yCc_1WE6k-6!L#r$)K0FJM(#7^)|;c)_y#dxrehBsQwbxnOebSW^XHox<< z@Pw7&Q@5=@Y*usw8kt4|<4eO(jZuu;T$|Npz!gmpLY00N5e{gE3DitF) zAOmG2Am@!@=6chS>fG75;UaSZrFJE9wHJuyon7yLaYuG(-Z=8B(c9RDRu|i8PlE#b zonxjN2O_J_JCK~+V}wwh2-cGZ7>Y2XG#S3Yc$YkfRJ6?28en#2(}D+Was5|$zXcY! z*j#GuB~iDY5UsE|7Q8-bXiG*R!H#hkQ5fRzmg$J%Fijy3TYtNpGoGy-0?N@d_W9NI z^{G3soZc>q`}R9w+4r~2=z-badNNvlm@valA!JwN#LU#4;U^-)9m{c2H@G(xrCsWf z<4k;7{m`4Jj^cx9!p36tB?dq)_JHDql9|=7eQL3ne5=zj997?1Wvl1?RN*=5sUVkv z3R_gnJGOer75UB@!uPe3kDn(MkwF3NR1dGA;K4DRwNaz;IxLBJ+I~dduEh@nH5Xq_ zV_nrqkbb9ZgRnS2ty0y7e=3hjnNL+~)4&su8O013zx3n>YSG*h}cvRGB^TMxkX7>lu}P z()(2Yfz)|gNy0wjGXm~uiyF&duDee)@v#%u;EZe}EZ&S{YZq!NFF)zp%qhcXK(HeoU_QP~u461*0UFIGQ_aIayL=@tj_zU)nkDHsp>l!!Lni*W;F>M8mV50Ek zk&Eu}K9;c}ZqpT*2X$GfB!#i@B3SZE(%2|5H9IAVG?jkVyKdmZspNp73wknY&(K!2 z`cH!0;5y5Yhuz@wEYVvd#;V}$q3qe-lryLAH;K=H*jesNRRTaGIapO{ORePW4%hEH z*F2hU>7}W`!H6K%q7zk2ax56&d#PNc|PAXA885pwl zx2Zl=o9g$xa}K)n6!FjNYK;`)pU;fTWDg~X3-rIv2*8R?H3xk8kfCu%{Z9I?k(|$_ z!%ZeVpf=G+9n|4`5Rdxy1in2h8TG+F)ApKw&9iSqk`L-k3)FBRb$_&tnKJ`2UtNAo zjk=svrpXfVhhTHDCUCa$1LP>iUxz+0Al7?y=OmG4C6JkegW=JkRnxBoRv-@pLYJx&4?534G&Q5!D%y1}R%dEsfR9#F2?$4IJTMf5vnuln0* zh#iX~k#*cX8mmrW+Ip3Q5zDsuKfsx?K3`Hnzkf8lz3${BNhTKi^Z`?=C~#2 z@p=ja)ifc2-TWQghF#%@Ch_)uz6RbpL6mr9LApiZjoaOfpnYW&*j>=KtC|SLUs_s9 zKd=7syROdM6LG!tPPMB)YV|f-svDIj+`jjqw5{nk8>mNG{{xg=MT5F1fB*f_p4p!+ zK%7DIf=8$2wQR#S8MvxIw_SRQh2hYB*!fP$e?`<%6A;`n)pl~)eJXG^w zfqZ%b2IYo3M;{vNqRa+XVyjVMjr1Pnf-?m{aQOjI$X`xCW^Vj>ZDIIO9MrbT>C!p~ zN-eNe&^q2*AENz{_6q%Tjle=j%EJ4)_ZON{bgxO0LefJ zO={tMW0%4CgpfwxsI!X^K4^wOKs&5bQEt5cI{hY#md)xF^uV|lGZ)*+dDmLxMBAlQ zwMBh0{$i>ws?F2mX69(EYrwtwB-=QMw9GSg&EfAA9PYJrc^Zummuq7NhLVY6E+FHIFLMguVJk$GG%iV~9br|xs<0LEt~^P*J9VC^|UMXfB=!FC5Y zF1;IWY2xTa@Lv?24$~;pWB|4llvL_+R@9NDZi&jxmMl+Svm?Z3m5NdqklJ-E)R9FY zmkE`PBoDXCxyOu1BSM1_3%w)1J7up)Y1A)H()KYO38f)B9o4-};b9)S(}~O&po{-Q zgm_p~(kk%WV0MP9u!&3={6L;t)`2i`A43;jcR_B;DeD(40x*IO2z@kESa{PQmiDnpuOK~c^uoT%;lUJ}jYb`v4SEc0j z!TLvh-&0N<+PYqQatSn1JgV2h4js%6TM=-_yAk)dBoP$ld;3DKh53DvA7*ru^rM;G zEVall{ojUKldL?A-PcbtpFUM3A@a6Pw2;r2y`;})2r)jbJCQFg%uH_W)x}!KUfYM( z&F(Nj!;s`|vsbX+E%Cr)wY7gH^eudgj}RdM`0Q%8d>fzmHHgsHaSE>ky>c_%(!zY~ zKTDW77=^3S3Y;_H(s~9YyfNv7#pqucRnfe*3d|r`Nr~?p0`2Vq4MQ~n#WJc&BQFHw z7#h)rM|0t(Yn{>Q?2c`iXFiek=%QhgSy!Nb( z_KU;cZgYw>eP2v}PD`z{JxTaO(bY8|X~0+xZnuD!d2ZI0{!aOd3fyJp5+(r|Uo7Ud z;^C9>t)yspZsX;UC7}&LLw$W zmzI9r^QpX(?Z1lzD;~K06WRHi%U{LkpSmg*T<;GVXv?kVF?eHi?lipS`4VN%JO9~f zWl*5RBO;GWgCzrax=`@MUGj8mW;bm}A8qTD$j+Zq>QR)%U4~T1bmi{_J)Qxiy+{2Za34Oub3-}GNYB3wl z1Tc&4EVO_?8{o{wF@qYpd#LZwc;ug&0IMzm5PKFSHHK?Y^O$VeoB>mF(nlulCWY+F zE!?_A4Qy>0XS{FO+73Ph44HB=iTHq(xuJH+or3lVP3>qJmnD(+fiwHFz>oD8P=F9O zz(GMu!DRV1Ado>9#Kzo>T|!~x@`TdFXn7=)Bq?x|?$>=B`xx_i_6MBU7~|gD+L66^ z6?_kEm99Rj2s`9!U+KkkKDMC}WlqMXCZ$#n-*<@M89a~6Go%+Ark|o~qzXF4%7H8_ z*%+O)mp1hRtR7RTkQe=wBa++up`RlY0%}x$>QI=R*uS83+8m~otz7LFP==b{koi8kWnI1m+canMBC}VF3vqy|F<#ICdD< zy|z=KKmBuAO0=|j(O(LS6eSFj0@dyKgYoBWuqmLX3*2svCbDus3PqtxS+yXjAIi*x z>ZEv%snUMN86>oRyo&R`j+c7F`ci1TY;x}t$MMo;#$L2yo%C+t+=G}0_Db5)l(xH9 zyvc17TQyU)c^%#k&|1gVdmkQm?*mPRZ(Rq~{J3a*P#6O=8Xe6Z2)$XVWa&(n4r*b0{K<A$98oYGxY`|Cse=rnt zHNLc*zT9obH=GbFW-IbcvaU7);zdM+m;&gTcmWw@zh`$~g4bUNC_r3h+lJ=K26o&S zb|#<@f<+O1=ns~H@jAO)%o#10o6C*3jhEB literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/symantec-mde-migration.png b/windows/security/threat-protection/microsoft-defender-atp/images/symantec-mde-migration.png new file mode 100644 index 0000000000000000000000000000000000000000..5345928db98964ae59f7fc320d46d7de16f059c2 GIT binary patch literal 23235 zcmb@u2Ut^E*Di{p0wPTmDWM1o(u)v67Z4GoLkJxq6zRQpX(|vDq&F1^ok;JXAVj*- zJ3{Eag%a9b=>EQM@BcsN-gE!w_&f$!YpyZJ9COT3-Z55QtEtG7T&KN`hlfX^@bs|; z9v*%<9^R#2gqMLUwD&9dfghJ#G~{LQihDrIz#msErIn@e@JgbIPfV@?e-k-A)pfzc zBW=0(e+li7YlerXr=###TFcXDebO)zH0-zNH`NLwHon@Z%S86slbk8g^ijx1db1$$ z?@=!1(!w^6l$ZiXqysI3guc+hF^`xpqh<-i!c>MXmqy>8yG!C@!uw?OUgi~lrmJml zO{t$SKM-KCeoQ8(&MbsvR~LNv>B;-_-5r$6+2TOn#!9+>Uh$E?BNH@Dly`7)aI%SA z+k^3Nt*m$B62R?oI#C-K)I<#Yy5Ecd%KfVSFWC~-wFot(Y8N^-puBe0X@SaoEQX%M^bF4pPuDowAe3;5V)fbE~ z21B4EczAsHhS$+IudV88sSJbd(vy!u;c=lgG5Ek^7NWNiWb_gWi_(%xQ!W<{>6E-B14zkaj6m>m9;_UPU9-DK$jY61+kwk@N_=C6;JM5?F| zWsy^!vdIS@W2SW6^v&;a)`hXqf!Cm#5_ouDOjoralGXwVT;H#C4u@8!SUy%Aikh{U`Lq+iY)<%$7Pag?Q zDH&p~%z(2+DEDPa6WN4mh0Dih)d4Yvxr4x3xatw1a3Ukoks3QE&3KA_>N~25+Fm8J z?AJv7EcWJz{F1eB-`cZf$1Ez zYe-tQN!WWN{9~?^^tPX;tamMOgxNo43TSjt<4L zo#1^$y32-b%2p(=g<@7?S9I<_Oqw@aYV*d!3v3;(aZF_eGk)9K`EmQMn=Vo*S%+;B zOBucfz2;sQx7d@_|HCU>Si#;lsw?Sr(e5SvHCfpdHRE54HnmhWN3`Y_G={!977m?g zu+QG-y!jw@i;X0oKjMflMBD?qt$y^)_{OJDrxXun>Y;lLB_c@=4X6za*9_VTY)i;U z>|`36kfIa|u8gx~QH8-yA;=4+LWf!%xjwG{`k7fNS`haNrl+uDp`B2Eumbh6wWC4A zdX=eP-(4uny5>+sHe$+{Oh6CTWy*M8C}fvUfQP4}ly(CRoh`GDQ{ahrWT+VbO@i(fKP1xYxS{um}*YO>xi+Yza& zHde+0Y9E10nSo@9q;bURBwBvUZ=h-2I(M-Vu;A9Dg)(~R292h=@i*tXtHIKuHCvxe z-{T6udwqAvp%Cn86FE`g% zp=74g+SDO)g$^94_lFb(BImiz_bUL$&JslEeNkPv%e!XS^)I7D+Q7Bvfm0#yJ7JUa zEG)3^uFnAv1)D$nAT5t)$xS!d|Ei;?7Y(K!e%esY`(DT zOoV9QGmz~SW}KY% zo^_tro-m#rub!XvJ~-tv_S%nHd;3A{L94Uty5&v>q!u7U(C8l|lVpB$y4l1|U|d#I zHGMiLb(T=bazQJ0*P(M82A{f7+V*}bE~0|=dZ@;O^Zh2f@0^$=Li8;~IL%v`mzHNU zibD}HN!DIlBlkrPt-FkEns&myd=#6m&m_uNL4koCS{)9)b%UCnA#uMc3;ddWbG|1v z-9@X3yST4dAOk_FA)#ZSVkwbx_utfxF8C-43mAk{c}2yd8+bzC*R!E_L7ETxIq)@J z?H^Asy3(5?=cUdMOF_Ou7pp7e&z28$RQg!X0gN?&GcR@8JCo5RR^_!mE#8wtW$r!? zJKJiOYBV~NxqZf-IUG7n^A|}?F4oYKz1giYw68jzdE0#FIfmq7DM)}M?|(?vnm@Wu zR5|5;Al%sS&Miv~sn>YEqwjo@oo=}JObe&?pQRWnjlG4Jj7Im?$6-GKY0lH3vMyl(sW z(&fgd5ds)fMAfWnT1wOW;Zd7pd~pb7o|si^t*~$o+t1B8o?cf`l@}G18W&$%C_7liA0`+|5&b#jAGWEcN{a90JlyVx{J~jtis= zc-L+Okm=W0M_W&=>>Iq1ay!Gtc^rB~PQ?+0VY+X>ZWY_$wm>haWKQbem`Uv0mVs=z zv>OHbp6MK$*gi^fI$90j36Kh`WNhO6(qt8dOQ3UbqvTMQa_d1U926^YfjW)L?(F5w zDjU}v&04$|(jr8^N8D+4%6N8md9P*MVzR;cNDAkGI@ziuz5h&V!l>XZO365Qrmd#I z*4xlACu4nRMaZeu^<77Ar9;7;x}V4qwruuLv-qGFcb*?(i-SLJ8V>So*BpJ{r*d!#8DFR4D@J2H3vR8$Z|CKYzz!hSX&(!@H662LmH zrKgL6EH?@5(xW$Cr-}=&3TX_asDRVhD~#-`h|urBp^g)av&Mn9Vnt4ndIE2kQg_!U zA??JPz6yHVj5@`VQ9rjdUUYuBm~^JP+k+use$>yqt>=lE&zzP+13qcWyB4Pw{z495 zR{wFPCgpyV!0|)$i~=k`lC@V7n;s*9>MydWI6?MrAu`eIQA!_g5zkcjwl;k5U653? zJ*VJE^`YAmEiEt2i)ARNvg~#^uNZ#U zc1KKq0)o4Rs=r*EH7u9a9|dleWPcXmuRz)nv_BbrP;84@BAd8Jpt@_Kc>}%u_L+7H z!oiHonGFw+2<}`3oTRU1?lFo!MuLHYx*9rB-yCeQ22fIgKZ3%>Im%7xgK2Vs)65>sTzbq5a6Sg z_kH(C`}AfLqw$slJfl4U)Y*GoYttkuTzSxDK0KyqzCl-V7DM(_u%FMmpR#zgYo5t@RVp&s`}VWfW3+m`tx_94 zt3ANK{#*Wn{q1l%fNce>lor`pvPaNZ7^?`HN@m0Lfe zmh^c(>PlAyu3x@2?W7c(za6@MpQqqMIp8@uwwS+u(pI%HKI_KZIf{8BLWP(?_U#Fe zOP<}|Wk_fb1AI#rVCQL!2&sH{<%h!p8n#t=H|kKr>AEx2Jn=|gs);Ho_|(CLpVGVC z%x~^_S7)u{q^+vc`0Cr4luJk$BrGC(*#WGXQIWOx>B72e|BD{ibifg}2vv$io&Wt+ zxuoYa)Wr#xq%0aY8+px}ZvEREEXVVnM+?tAvaQ7K*PUWuy^_|5XO|9B1d zc;llM;`2k?R`1LPWC@y@^3 z-kvah?tjGQB@`=nNFe|a3TzrZ?0D~|_M6#K-sbIhgPpfJxSsXHF1-ji?R7A3c-1#$d~ZVjI7-QF8t{8*=%4FalVCQ`JKf2$^O4)w8RdUmW%hz z;qaE>&f49bPTu1Vn6V!;A7pG*`@I%^O)yShU%zyt{`~A1xdTj9x{(M*mUfdSdiiCK zQs&WC!tC6?6ecT{DGa6U`v_&%wQdf+--x$GU0eG?O^AM-;vpsCV;3&-bH3x4v2*(p z-clBt!N(TC{?<_m0#=d-)cHaW@my1h(4|+_Xl5YN5aa+cz`7{HF|xKK`g*g|OGl+V zV88HOK{M2VMHKL$lYjKDK^yIC8Sn3Zkb&^HR5@J%JYT~_9p3bZAd8umpg^1?me9yVyV|DeU)Pf^Wg9QR(z(_5w7S6rYL;cE0)D z=awE8blJ6e0Skyxz)Fyb=Gywg4fcQWr456bTRjfJd;>L?Jo5)rqKtJ61J1r@mR(1~ z)4yR`LoxCh#udl5&x)jL*6jME&AnMte#?Rdq}s92(HDf@X;V5hHP*4SGlnd5y)q0+ zs2PX66bZp#!pT6MOHaMKzm&+^85k*RGYZh)g4mS2!R$W@8NepEL}SS$&gQJkaE$=4Qn(~xeu z0?HOA4UdP|B+SmO(3FQif3ub14Vf~~1%LdhuSX*xhJd?tcZobv!5VZx^+*LRAof4) z9E2@Fe>R>kx|759SJ~I?YDG5%)BV?5?BiY9MmiE3D&RV%7pma#rDe*+P`Il2d=Dmh z0>m+Sh{QOJk93=xR#`1O=hJk%xta{OZ4W{!3S8MIdir=k!>ln^#a^wso1pfTf5g^m z*~P~?8l*JuD?0RqT&U~5P{u=L)+xau?Rd-E2(GwNk$R=VYVeAD!qxlHxGT#pAEg{2mCS6WlutcnEcvH5f_6kjz}Hq_RSpd{agVaDv*3D`FTkuMXyzkWqE{dIp4e6ZG8A> zdoQ?9qUbw&2V{DYxZKQw65~vD*JK+7po7QE6uO_Xlzn*4#$3LDNm;D~YBpr9{usol zO6>fSC41_OjZ;9AGuyNaV3&6BG00Sr;$o5gxa`+$MCg)+ft;CYfBn+=*T0YP#0X=9 zHTs$)9SAE|A$dhH)L6Hq+csOG2~=uQF_$JC zoc2R#TeD6vp?RHaz1hi*S=Z6cUiF#JJox*?mfWz7Z?SDgl_a!gIM zgn;iGN&QM-6m_0x`|8cZ6%Mc3`tIamC9RY+|0pS|ohybk_dW9rq=-xTJ?SS_W!kzL z#hDRQ?J7SY(?Hh#rUjj}%khquu^CsS>R!Zr?0gv`@Aq;qr9X~|^n+NN79D=hM~hwk zHARgirv?@&6{}CKSv@y z0w!2Nb%9GLbc5qJBbT*sT5^OP9Of{dcxlq!0J8sW<_EvgnSSj;wW!M)YL8nb>j@7q z>{?Z3d$$wIstrQf?*7(sk_VO*=)hTn8W~|29H2>-!6;|W3sdSsh-N)X zB3zPq(Ru0HK&6M@-*|pqINLEVLdK334QSKRKc5tr!^0m4Juvsh)T4TXnn4>uWaA||+ z1nltFRNjK85ve33c_py>uWRUk+vMuyFnH|A8n!L$JXJU5bWP!T-cx52r`D^F10*(( zbuyz>4+uJbj6lc1P*@$~M|k~7m1}p2&BjQ_>|^V>Ss`>~**KHLsXsIphx^<=&))1@ zEmHRAkAs;6(4J41U6dAvvHQpiPeb`|Umm5$U(z!t>cDQ~YOC;hPe_5sR>z6r=f19c z#`NyL#MBOZ95OW6`op3(Uo2Qq5to=z)!;oiRw zp6fl(cmZp(+|^Sqz^Z>~cA0UoFmY&$NvwPI$DDl7On|D1Y5{p%$+ z({cwYNzg9T{_l>-b;1=T!sAqtCgmY5NNe)2c>m*NL`a^SS^`?QlI4z$yyc5-nV zm5sk$^M%_raQW@jsH8wS(~nL*oQp(Pnh*N3IUO$i(!Rg^DPRT#z#o7H%0r&e|1lbS z_duNv!$;Gt)H5kD{TYKVplwT~j(^lNfozT&SrIos*SX{!`Nv&)QzFcT&h13bBV1WK zjU1(*>sn1Ji>Ae&jZ2aK44dx`(`-sG_^RT@tDky7caXX6E$3>LCDc+*7s!{A3XbF( zi$Aj054HWm`0YDag(k1+>AyrYJyU%>vp9;RaAvJk3hN{7KQ%hg3E7W`hm~dI6pJ!= zHFtfgTUt&AXkw}hgd=9;KZ_asmS{ha5fH`tS_eE=@o$EQY=%&?Ol;(cr&1qJQv$J# ze<+4{1O3>y*iB(zc>Hrg@eS>QZQ9q=uaryRW0Wll+3)8{-;g8da@6WdAPHu_y*kxO zGDfhlP3U~k>g>+4lH5+P=a~%Qu=dEKB7X+ev;YMCdbH4@;oe**d;a8>)O$PONLSN3 zMqsu^Kc>wuvQU|dJT3osJe}1mdavGUW3e}9)dMKx(#=y^oSd##&|RoW$Q~;QW->51 z_Jy{G=a_UqJY~H!FFw7p#!6$Yy3|y3nWuCzYEV$Fg3diy-)O|M3sw_%;o1HDm{iXp zE-n!50{$WkJ8N!PtJ??+2jJZJyol)#ZYQo093K=ZWsBN+Dh1}W_3dCWiXRsvIHNT0 z(Zw`Ig#9^_($mEv2)P`M;U~uA28M^LefbScBUQrK;%>m-9-=~aA zFUl=SQ?sF%7kM4&93vJqFu8%xiBYE9#}N;9xKgyj;@a3_NLnx5x%x+`)}kG4HP&|J z83ex$cz^L*;Q>FK^y_pxAEdGuDu1UsOhX3Eyl>cio0dfL;&jGVsTt3+2K5{D{3>?M z6%2=0jFFpiW_R5C^@nf>X8%7S=yT`f%Q-69#Ziq+kjc-cQWBQqb#lWmS_AI&!nEnv zh0wJT>Gf9EoB3xTa({)Nd?Lz04;8XETwIZ9asIbUePu)Kl6=P>e=qC%GH}63*C!>T z^iNVViGNwuf5)GI9>87c{~7K62@3xfYzqA&vi!dq{{9Ir{~i9afZ#6)(L~Ms*%y(- z52q0LfRnCVQe6}a6G(IA-zS^#`)}Xy?^PUf2oF&Fw#5I6i1DaM|LoLXr1755kpE-A z5`?GV%N2^hh2n>g7+3*M{f~)^=e7S9L;nfA|39S>7%Ka}P6M{S_OK=R`$q#=2rj(N z*%uE_bUDc~{m5<}$Y_u|p?8elx}gh`e`h{JX^ZJTJzB~8r5hn+&h53k6)3-Mm_N3_ zIF17iOXexvIHczb?yQ9)!Ex&c9dF%os_`vGVaY`r^M@T^p9)8hXO*zv&G_vL{rkUI zPkfXy+2C`~m;DS@Z14`-D_Q5ZI@B6*r#ryhk7_8M45VWe8>hgB&r@VOlu!Z#%mCgG z*@MmLCMQf=jmx6{N+Ak0UE_it&Jb~FgC&O+6&3j$Y#i|v4Yn+O!z}-}6dsD{j?2c6 zdyU))V)d8mx^$5}?)|8+8TP$Qs-y*MBJ1mpNf3${-=Y&ib9Y>t&5Dh4BfvXANls@!pEfhU5G!!Kjy^x8fd~_~?{o$zCf~AAtKd5y4SfIeoT!U=oSxUCD^|e0vm92uiOw) z9Ym9|aZj2~u;}KiazD$53FR8TE?eQ3(W&xb?M$(;f%fwN2_9Zx`pD$u>91fiC9eGf zRQ=AIx#=J!-s!WRG%?_xzt@L*mqkB5ap2$~E81HT3YyjevE9wFi{(a|zbd%9K!s*U z&~S|J^>yB*U+q9J{~T{@#;s%l$ciQw7?5p#6d>6{(T*+F{s^gkV$is^6Q# zI8pDVIcwK$gKDs#_5Bq>*(GNunX#yXWDP3Qqf5S(LhE_=J2GV;Ic2Qy2FTK`W@1!e zJYG4^z0oSwT6YktSx}_iUuvlC5u+Ao;8IU;p=x}IubXZ<*sQ$!wZA@|qmmZWo!6hE z8eR}j@cAz9D~iwT>|ygrMT*Lrd$cZD#t-AQwGB|S5NTTnvrB_2;AYa{oFVhE*@X?;NTLF~5kJ$~=Mq>3&;A2f|+->5ndqeifKEy@EDp0aI;QVZ8 zNc+?#lHlGXPN;)bA)FVr#O5;m;4N1)BUo(w78sMMcLTb^I53qZ42 zk_W%{=`8nLbPqUQX8Owea^Fv->>{atYa5yUbfe$Kgh+c$2LYom6SoF%qEN=cPPn~g zI$`^##B0xfA2b5xX-TL3wb9u)Ae1$Xp%PN|qCNg|fWFRmCfpw%s^1^8!OdQejUx~Q zo9K-x8|@TXW`2ed^Zr6FQ8@$nG@#mK8&eIO+m&+zd76v88BNaf9c^uGNe?ZvD(A*3 zYy?bM4!&0A`c2V`fyltmbs7p-lqIH$RhF;y-1?&yfzy|)to-~MS}k|l5P_N<2>h_9 zlr@j)D83`lI?-%8h~{r*DTN)T#C`VHvY#as8`in64i({ssqaiWDxq8!dkh-BfSJ3ctloX zd0`mQLn=!m{nb5WACrnzpKn+GR7G)RE&@1~3+KA1>M`HC>mFmiziE*T29RX6FEyRc zFdJ&A=9=ijXyF5v!K>Gl8_KH{TKfzA{05aoKPW#%>(XWB!5aL(q=7B}n8NY#aljyH zdhM_2>gJW#y_ex^t2XUrAn7O`>AUX2|Ze_>)Y`7`%` zqjCWI(QnAZ{*V1py76{PfBWv?P?3JA(dYz7=-q9&0so>oH^IR18l>Dv_<^>?o0QTH zTz-!d>`T%L*i+^1Jk1;)!&=wH9(rSu zH>Q!Ci{fRsdXmP>^E@JIjd)=#x!z^eqC=KHaPNHl13HxRruGfTga8g1Zr(w@WU@0ua=)7@fgKrxqq4azPHbxZ|DlK9?_`TDa>Kpz1m* z1L<+<=JyVEj1>JFN#Hq>|2{8(deT3JJOLa4dm48L21q?)0ha&Er2aeYZ01C{(}_fM?JY)h9%YH1o5XZ=9zCeE)sb1}>3POrT5vVE)&@npPsT4QFSk zO-iW%rA_BEg2?Q+_8!qB6Jc1_0{{lS7V(F9)21-YVzjvT;fS}kNcPSN3)xuJFhP2? z+PI*5(wD@)!MWzN!Z|<|Sz{jpPuN@WaJh(D+pY}qh#h~VpE|K=YHnrq!hg7B zLyn+@KLPq77{`DB`eIy{zA5M?y`~H&9fQ>c%d?5CnuSSt4MaLGg%n1aDOPc=z#)x} zS&35!#>xsZ$qMWE;SBFzUxMTj1x1>iXa=FOWF~tL3+&+x!F8{_Bl)#-D1-0PJB+Mz z4ui{@fDt79`v5nvdBb^*smO+W=RQk&{ZjVIPL|E$BCKs~Wea{4gq_)287OdXUj+P3TQ}18+f*&oJQK|6e zf;E3g`k>!aNDr`)Y<`FzYz^kIbnuBXw`b3gjlK(>{cP$jX8jy4IMHbi@MotA#ms!L z){uT}JBK~nWA32^-C^vFB)#GfpD|xq`f4bFXt{{hPYSriGtO^2q>Yn$L7UXEy zP)cZ`y~Nh@ia`Xbw;o3WkBTTFqu-`1>NLNBT%Z_drRkpvsh6f!b9M)HAQl`FCR zO+M+!b8erUN`o${D(7?;_c#qsYO!^+Tl=LqAx&}6&pT=-5O3Jm0xl=2YVBE!H@~dw zK3JL2_0W@i*aeKE03@>RCi3bE01J`P3mj?8dqZMV51$?on@&@^-C1(b0`&#f^?RC`N_jjiTn=pc46T5Cq35^ya9@9oE~DI<0vNLc%_CiKSs&U`b|~s$IT_cumO#T+Uos0_iyvNQr*lmlO9b) zwL*2(BvSNnt=2asycDZ;@{`RX=)a)u4bFor!Ch22Dzw6b2?R+|k|FSyuUz#HnQn6V zLnKW$UwNvI21vaks}X!nH%b5ETt!rmJ{H_rF1RdPAbWAi>cUBYa$5O?XWVX65UeL zi@Lj#RH#dcE>V8KGagz%Ya8qsuT|6`6Zaw|ISN2xucJSE@r+B8h5W4nnCqf`r zebxC6{4aTM3xX3XZH<{!%}&M75}=9qVCG_U>ucUO{P}OJv@$6pmi5Mj4HAC|IJ-P+ z$QH~@z(y-io@?3%j(uha^zxxfn#%2!@f)S8O3Wb2$0twS6=-Y5tpBDp4>>lzWCcI{ z5$ssVU{d#9OG~*>hpzfq4ZLXM1f|mIMaKJ=BtKS7?<=a$XB{;q*y2=htBEQiDQnG( zZBxe1OP6PP4RI8M-5oM}XCRLy=*DbC3&SxQddivBv=0VF4Etd`1)jftE)I$e*N;MG zAfpZMiPKEF!mhOkI`z4-`8Cv4Geha56Z9a(KsUvomC7=HcOm-0!_A$7w;F61=~<${ zf0zx`4c0sMtdIc~DyN#>5$=v(7k@xeri{?I>X% zUTmLmk1Ka^$IF$`fj(aC*rj&O+Bn$YJ$)I;rv;sMwswi!DrtiD`MhMG?su1IJ5`h% zKgE$FS`4i>Z`LtvemSIGYGnc!qO$!ajqh8ONeQOtuW)D6G!zEduAF5!;}3)>kAmA1 zomO1))ut`TxkuktSSQ;)ZXiYToJ)8fzQYj>lN*(JT6TVMG_ct;Eon-xp0JH{w5@wT zYuooFTGyUW2BOjn3K!6Z#6z2%#3TsO{`_;b)Y~z>)&-c*=52hhyTr9aI7QPcyE0t< zoO09TaGV~k_hYMK6q>v-ZgX8q#j^1?i;Y6yRjylaMeI-LZ*C@!WO;`F z5%pp8m2Pe=_)<2I6L620 zG0?ILj>l_$?wMEEhYYfj9@}tePpa+rJ7in5XT`{`XMY*|)p$sQt%8cr^@_sk7K?8h zH92+}P1vpuCbnK{S5|v%AcPnOkugdq+yfja~gx~`}v>j^RnL|9!S_Y^;cfsL5Zj|UX%4+5Yu}RE7-n4J3UnXzLyY(GYRf` z!V84ioB8gqnLb&kT$aC38Jl}_rGITa1>)4ST58rX7DQDkYV_eIDwyoxqfHU&xzjk% zka*Tx9_wF+;;azdd(}6ARX);gtZH(ejJz!j9al-V^DlIjkFbkjU2!jHYtNQ!A^6!x zqAc80;zK7vhL-GFHfLNjg@8NHV$IrQdHM!RCu@lsS&j9`s>zCzI-ti!3cbbXKPHy(I<6zDKyxzK1d(vs$qqqDz&-8?wirq1n5c|FHgp=wn(MrzT2heE>}o4^N4b=(W}iY&1VF^(jE_*?RHq3dcxSk zpUnoCUpih8zS}7g`b^?2lZKG)H^7!UL!O}i7V4G$nxQ`ZTlhEOIpgW(28|Ew`DeH$ zQY`Ys0f=dVYQx_nMS+6=)qf7GX$%1zj9yCd+VT985^cXl=K#m4fl*Iz%pJy zO?)|_5et;vT}}zn8{=W?WM1EKFATmx$8sjOTbv@&H}sRx&!%>ze@CL0yvKS8>Z!Sn zE1$y&(XpHx$8m8h;o@QM`CCfP@)yEp8za3UM<(NduosAAgu!65Ji7h;h&wm6Cds;V zH71)GdO&2tgI{xk9L4WkdH0nNjd7Nb?>l3nJ5RLz+3!a)>q&5uN`YX5&7tMj$R=wv zY}9x#=^_k9NZ}pZ>%YV9jhhK~Iic}N{sP6d-e2WkG|7ecm|n+5o$|_ztDEkT!g;w- z-_pH&gp8~#XH(~2?-eC)S1`j_K%1AO&46A}Obn*wv^e7aAa`VdQY9b2%o|7XnwS#- zW9Uh5>k(rpcrLsU6Ws?Gqo}9s%AlvmynF@d5Bwi8_mB94fAxI5q7?JOQ+6y8o$5lV8}{6{h-lsO98wz(YsUAI>!MvrnCX!A4or#XrfD+nmV zt*K-O!yf64xBz8YC0gOAk2^LkVaPNqYIT4U-YbnAc4UOi{W1`S1Tjfwx5%T`6T&wE zkMc5WOk@Qj^|}%5`JuFYx<*_fnD)4}WVmtC+@wSZX2fX4W(JZG>L~u#OkcWoUKn(P zue9D8d#l^euhr`sZ0JH)D$-)z^2!_brf$&u0@K@|m)hApB{}+V*Fn(!X_$J!@~e-( z$*YB6oZ5pO&a+B=&7C8&<$vU&%?c4%5|;c+vGc7mkaPnY$L?*N8AvK$4`5i_hT-Ih zhas4kD&g=94y<`&DLZj~P?nm<*hop7a?;>X3dzQG6aAEdafZQb%M+g;I(*;Yo_e6LKLKi3g1s;kjTzo!s=_rRc0drwWtD z4VPXevvW)tuzV1E2ZX22@Fl))nJ47>ya_LB2|3NfTqtcR{MfX2YQ4 zay>+m<+?C=9XML@K4VH5i7)0*j%r(2(pDSX&DGz^xuifRKOysGc zNMXyjxUPRuI(v4%z4{gq3Nl(E!~z|=2zK^gG6?|bb&VovksrcwA{z)N0K+mIZF6y7 zJRkyuV0+1=0Z5k<(f;b+_vImNSz9bjyHCj3nLxd_(PoeT10!4?2KCZOX9fNzr@lzO zLmeYYnL(K>Ko3<95Q_rFLi`}w=wtAI0Sy3n;n78c{!h~n6wPGmfo7?{Q$W}tegZ{K zpz8E*6asJp{|jHxEcD-S380w$cW?kmtM~!x{{=F*xT*$_{5#}uv2O9Bx!6)cwtr5I z1}6D$AV#JzAv%}kKZ^!n289`*+DHCR+~xXzTd(H^V}s1ay#EKNMkpYgzq1HHF-C@l zeg@mY^?yJosAdgNc3JIt#@k@Vq3omU(Y(11RI?^rdXGAOLsuYU-HA&Ns|&>}tTjh1 zP-B~cy8Ce!1zIAFrQJr{KPG1{id&XjlLE#7VtGpbGzsP?B5AR7c6uxzp>{OS8^8|0 zQrUu%Ym(y8f!p_YwoJOvr2|!Ls=P%3*MJ53dH!%jHi#! zaqv$7alj-eWUe(0OY5Xs+tqbalRJqXRcr#LWo#T+hmh zpA`R$6F{Ac_xsnA(pJ7)aj(HAMB8y|0XWUW{1*f7EDy^kP(amdldOlCGGTKnZK}W* zxxDovV5Dm`aJe~X?96E8P3sMGe`7{CLTZK7b>^3WZI#2cq#v%_M~(~PwxR_IQx-Uz z^_UXh!V;4)I-Fj@b;sSOBTD z;|rvz`={crzUib7&5iCUpSYnyqfWM|Vzv`98cNHK^EM?zNJ6%MP8jIY+^63>RVyKh z)T1lYZ^h;H`P6L@h|E-TH5 zojn9CzTG37LSi(?W~D3o!Zvt*-m`hgMXW+YxoH1xhD;O+dF!KQ;hX+}~=O(UZ59BAn0Yb{;0IFrjkleJ9xYmC%Y{Fv@H+XR#d^>g&cdQRWxSj zF0*^?JEifkiMp+?llZmcgtld~llXh=rDWdDH(u6?*{dsLGiE0`cD1c5xh8XZ@?}O6 z!2?&E)T3B>Px=O|Z{2WlAGvxviRunxK{!t-*?X;3bfNEy+tIy{LWU2n^`Y_Bxg+wL zBr!F~?n=>bi)fK;SeSl3hi*Ks*?v6A8iq}yuvGVAVGq%jnmk^35F2)52sC-w=mfm}Ctba(J zuG-cpFo)ryk=mQgh)RqM^-&sZF_Iu(IPc_iZuYbju_YyY;cM1E|G^Hw4u25eh&y~A z8_HCWhe{3_+uLzj#d)Ky%0lc59?n3-9uN%Mw6=NIc+0RQKPmPQ6q=#YkWlViZ@>}i z-VgiCdz3jcH5H#8)pd%h@NFlK8y)g)u;)AU?B~WhzlD<8KP)e?7x~2pUa2dps?-H{ z<@rhlISPw=@uW%o* z1XMUZZHqo#qSx$t>BTucHdaau{e9+r0~RUAEe-ZP--mZekuNk^3`!x+nv6VM_gb>( zuIL8i;ChVKTQXp|kvVe`SM;Gj-)CKFWnSKUfPn*E?!*pj@`7Ddhd)TZ(jD6SWz_#Y z6wxQR{BeBMDYBWcR?;R))I}}oTNBNVTMWF)u(o-V@c56>y`MiUx24zXGP zRKvrR4C!H5sFhW`ZT3lTY+IbIrRj7~C+^jL%9}WUY2sj4mBn7r>Ty%G?I8=>-i~Ps z71|3vt*D7#_CbNyie7Aa-y4Jyf0~Q(7=cZ2POG8}>n!4{?EOxTGU-?e0@fXhkBhKo z^;Hg%l>`w@Et9epm228-BA5!tuO%ND)lNM_=bwjM^WUf@01%(M->p{)a9dWiY=Zq* z-IP{fD{aDNbm*syb|UG#)o2H;HR!cn?S@KtY}7zmrYjS%n(HTl``HwqzUrIQB%D%Q z)N}jF)VJ-2;|87k_zKM?yRF@QEl5`0a7Q$hDweG*DCV!yuQr_I=L<(fg*&~Q8nYPX zE3i29&Nl8|0S@KNNTa~QfmZ$Q-sDKRZQ|f8od1_&zA(dQU~hA)T$S9MuaMeL^Sz?3 zuQ+cOu0G1#8}#t-mGnPh+Z>E75m|Y1Hv7!2;<2+s3U14e0x5dLd0+4u1O2!n?XnF* zHaN@azRmN2aWuG6P9Su{e)JkN)Ozi{bk=}UG&14N&6(;VnlQM>jr>djiNjecsImS& zI$Jj%p(>0tRktyCB{V3$MS|k2J9ASAu#eTL8 zg18jlf11b`S_1f;)gf+8%AIYL-)a;WO$r#O$a|cQxuE6bCI`3GU6l9kQV1(7uJDt{ zLNU40G4o7$N{nlt6{^~i4UMEumrlVVO|sIbmA`|<%&s=oB1Acig29);c(!cv$jdl`SI9zLNs z4A2KXm0(8rWbFl0$47+6j|1(zMTz5`R6(o z(%6+=!BMLABy2kfl1-b?qyL2n*U{&1-5ooMva z_ujwM8+tSjhmd9j2oTTcUv_tQ2l^mXmA*b++t^s)weLSV1mcoT#vtHT4-3sz-e7d& zBZ&R##$+AiTK7Hw)`Ulax%0e%o|e7o^ryx*>LM4LPon4%#?`K9m_|AgPR{ES9@jW`6;D#P^XqSk%-Nh;84 z2-V+q4PbBgtLY=i)a0a_^l+ag!O46&@&s2U+=L6RIxS^aMU4mcp_*p-0)~qXcTpim z-_Z*|pDnj!bkHgATHhP5l16WAe!y$S6q=wreoFCPuMc=PfC`AJC|)ca!Rg{kLWl;+ z;b(;6KuqM1^*KBoB!A_$ZHWka-7m##m*@-fXPg59xOyQLSqMW{F`r%{ZL9f*=_ zaBrV%oygp8lANzyFK{o}o^Lj@zZF$^^V~Zu4AUh$eVT-5&Nyz9qkPYJ z-tNOnzUr-MqO7|XHrm2u15*}AeOox%qL+q z0E0jeOOwjRkwF|;%GV#aUNl8I+zfK4|5lSQD&LU(b!5gfcR5N4Vh{dhJMlPi+nn`z z@7}Q2HDLGSy1(2?Z0Z;@aHeW}e%zi=DRmGPA$cZw7JH!7?P5879t=G;az1UDd>hGl z{8Ma3e=3kjG~lcr^gd1^z)wH9*B}s-D9IML*hXi`TNXX(p&?vj@6AGqNNLx!Of~~1 zYG%tQFM!p!Q}$QX)p1TkMbxS**?fgtALay@Xg8g##Q}16Yib`p2b4ouZC~h%*(A`- zbS9F?OxFhMv{aBg{7GeOUJ1P?ZAo%tI6yhSER`NtkdeiIjr67mQnD^zF?sNqw%Djh zEZ?cN%4F_j*d@PhG>UkA@SaIqAJ@ziy3t8Nq7e88wv{{RU1>^J^iWYWfF%6(tTjOB zDy2~Gz3o1-2Y4NeLAT4IJXfljhDN?Dx}+#Lm+&YAWM6|micH~7xmHljLz7R6e@!6~ zr&BPEwZ~nOc<>Kgeg&w!@YGb&diNlwR$=o}79kZ*9Z*8mXZZAU{Xt zP+sHnx&vPUf9z!1+A-&em-+M3#)F1UdhN44)pIRyBr3hvHH$b!>7)RL7XX3WR zH1_L~-xBBttU#EwbCmF})|gJpCqUmr*UPhp=u7jv^1{t11$@dq`G7t7ro2R7EUP){PQN&gS&@_2mGbviTrFp9Cr!pxIj`?c`?osbJ|J-tsCFj8Ks zcSiACTiW*Jd(-@;PlS(EgpDNub>MAsJ0Mt;&4NYR%a$2x1{XT% z(2KqTdp>HKw!>X(y;K&DzY_6qXw@wkIZp(97lMTPxye<4YS*2nT?_X@Tr=;SNxqTi z%+>bRo)S3PtmQDq*CMt=PiQs%=FZjMmt@_Nbr$U%G@tHH~`D6F#+>~|N9r~*i0D2F~< zn-|uvb=L>zpnarjCY4Fvc$awT!(vaP148G#$j1pv~dzi4_1y!sfDPWrnG2Knaq_d*ahZ>RgJ)%Y9~YXJ?V&rK*0 zXs6AohRy`u3?RkJ=@>1u1Y#jpZXogAx3=@*FxCd=%hj5CZW5wd9uge_-DEMZYykfj z2ROQ?nn16OzUG@qdZkYxm`bGszdHzJf%sb!U5_nyfX*8~dB_G^^ERQ|5JhTg1jRxNStDshwprb3ep2FpJxdIG}FIccHTdAn2 zv^YbBLpv=>X!!=(Ou8O?)HJIqKteGiMNS!R4Ti~{o z!5|>5j&8wO#|aY4U-hAk>g{Yk`jpci;a@W4C#4OXDRS!cmu@!j*)m=7(cx zFG-qh)b~v@#aM%%_K&o1Ssl4{%ZAQF;`@r)LreKd(6k@~is zuLO+WA4Kgv^Vs*EjG;HFPk%^ZG%J?dd3@~yk5A7Ktbe%K%txo)o2Hg^(t0Rxb~M`AN(&9#{N{NP)5Jy0d%wBO#B)yJm6~AkXd+b6A25SOrHVL~=V} zoe)~Vz->IVPVkppr<=l8c2dMHEy@03o0>6#=QDC;=3ZUQ7r`2`$1E1OY+dN{xVsz@R74({RN)ko%F#h)}mXx%W7AG7dK8Xh4N!>n8|^G};oYRYS!Z))o2H z7a9v5IUH82+||;EI4D`kN3%KU06Ee#x8jtdJ>^W4FydXb*B-bWxbsc_w7GTGO$^%B zO7FDv58~%-tCV&26%FxLKw6ani{uzveLfpA89e<&Fei8}Gnc*OevA57&}PFEDc>vA zRdF{4EpWWn5(-B&lgmHcjK?ifKJ6~f+YOiZd4KRU)?Ah=h11|0X=0Af!a|8%+1AZ_ zOZm67CD(J(tQh7S%#y+KH_sdI4o23+T>Mq0Uen&;)xwBT*S>>2<0&EIHHmT%6_BTD z==vRFkw(ny>WG;$MZNS}FRhqVP0w_y;y%dSW3cl9#oAR@c;d7sDs1LMEDXC~(z1nX z*=lTIHOibZK}r9d6P}c8$A|a@%xEIlqV1j@YM&~nSMeMnuk$NRhR%6YpTD%>#bExDXeg6QaAJQU8T9Y7MLSe> z2HpiuOtizzaXp0fdPdTWVnA`+2eG`SA)fF_Ko3@-;WyXGU{v^nwpfDpL9HKV20sly zMJJt);0rp23Tant?u|AkR%>LriEQ3?tQm|<<`+@r#Z^PIMpfz2l}K7adZjJ>m4!g> zhjemH2e|-nQ5%E^E(uwHlD<^CYAT~BGYi$-u}FKkR=60Y-o0dJS*uJ#zc=ViSC}kU z(|)R?uvC%phs*Ofua6o~q7@V$*od0Z44;WO*4KWs5CtW3yNm=w0Fha_pZAe5l#Osh4%LK147~%Z=hZI zspw6RKOWOH%GEx4I>51@7~vT;xvGrOI?!I#xc9603vKK?G9aL3)YY@szb8HYj$y4l z6P`>yV>2La-GGi2y#ZyU(XXmK6KRzfaJ$Ky1yoyqvGwx|P<8qt7lp?aOU)n=^^#&Y z5QoSl2R7AV%b2iI0QT0#qveeqFSE5tn@@7gP_GVRElu6FrK|z|{du29X0*|dmfjJKMoKXBb(QSMW{v+&VGUJQ&oz+p6o6rYL`KS&gdG1u8d3S>uD zzFjFXFsSKxNH<%yjT~06if$#?{9iX1jnV_ooot#`}{i&4!7^@MnQew~F ze{eb$9w1Y3;VwIsd?01D9c;So#Y&d4tXCGlV_VU-lFr2ek_y=enb_^o7IPGktd*2G zR}gUVfJGcD#A_&Uje!X0M^dma;6$mcO+_q|FfVu@|0J zanA}+p%MIvcL7k{{q-1$6ybtYsgmFt*1Y(Y#8I%_S87}J0XfQPXa5*6KW7eCSV?F) zNMp~HbRg-OvdP2Y1lP~g!}byFsSBWMmw|@3Q)uX2C;bB{%5J8KO;v!WvuHB5by^Ja z3Vn#I$D@r3qmQcfFXiqo3PJzgi3`MMR5 zm%}Ji+vQU!_e@ntFFv)Zr~NTKd~HArH#$IDG?h;~yZE^BrNSV^z`B|}@S5jAegJj6 zW9iFdQy$2VBW zoefb`CmbB~)5^F2p5qXlO?l?Rp*@=`?a-o?_%D~uA2O^v`Q`FoWWFqcc_&egwJC1( z@G^n1jDy%{jR(%Y`-LG&m?-D_t=GHnaAG1kdPd8J%Zn@iFL}4rK3*;Nwpg+*Q^nuO zw?6=RUk0MxgVM3q_5KSfNE}b7_FLW92QyxD|BA%7X2G@NB>4i_f&d5UZf?l?rr*I> z;7)}PcchjgDzmo7YSDYnn!C9A2lwm)ZhIu8<_%)g%$+LituAWFyHEfVZa8Zl zW$B#rNrq{>i&~jjezbw!TStS)aFHuh4s#?E3Ct@FN*ThjLpOv@J3}tZayaz=XNn~9 zMx>ua*w%;~>|TTPVs|^a@)3J^a;$+_Rn{{!y0*{R)3skgq0)$1mSIF6FYj`d1(Tlw zr??`#j`huCtYy7ioiB|2_?(*~AU3xwWcIhLq!xxTxzO(Q!PjtdCh(CrUK5VP@v4h@v=W zJwz&xaE(HF*=^>(#WgAgtv~HURH{=Dve;--`nDD3@ui^(nq7+$Ql-M)-k!3NuOS84 z_tM}K+YX*UefD!F5AQoh{*2K3A>^)?^X_4A&rs>8>R`urEpAc{lN4BIO&?;f6c&|0 z<01t^GE2PF+g(C#CJ^dtWVC-XN7c$&QXX0oMZVk_>!9rg-gVpnarhp8qT%|=YN^eB zaSMAa#;~DU@RY40#Z#(vVLK1RyJrWXC}ak40N3Qia)Mb32kMLuf4PNOjf?cKNuRM` z!l?t^A5%{sW$6>7mc+qwb%EOf3EUpYg`9UAtJujlY81}PL9yzCfAGQ@EH}&(blM8i z4D&}zo)|r9gMAv}nAe53@z8x*q1stes2*H+1-tSP=9%?th0cB~PCg5L9o3v;KAoo{ z3SV%NwGb^hHzEXyz()IMjaP<;UWl3iP|+a@%6Ofh7>KaRxR&OwCwtiMJndg!F#cw^ zIWN7~-rl6$-NR>0Syz*TcE!6 z!k6p9C(~SVS#x=t6=I=V(S(~|-5LJfmD&q3LbGqaMgq)3X^gwK#hUWcPmW)^Royzc zxo|su6i5pLLshEf$;xbFYfIFULQOpURA~)d5t?-rsNkSrnmmM1IM|#x2r*!BHeGRV zZGnknqWvhwW2H%U*G?!`)nA`KlME|+XOpNW>(F`sU-zc|aW2>fzS?MWpnt(Ptm|vB zodaPu_<(ld3B%$NR6n**KgYMb(74SMa@gs{$+%P8fCusC;K%YyI$M1;NROmyiN&Hd@T-z# z)a*38MmOX~qb{Y50UW~TxfI0I#HZ14hNxi7oF^F5DL5UJG;{Doa~L?Z(9QbBq9L>! z9lOOuqs@QL#LWcMuJ0e6#Nx}+)j=oPP6;r&@Y$kCe>xsDvAqc_lcC1f@y5$jJ$M#- z7S&{rTJm+7z=miZ2F+Ue6S+o4*#0Za`r*J4QMx76v5op?`=>zE2d5+_Gd+!Tg)ZVAmh*&T|yQ$rB$Lm20jS)J;?6j=KFmB`09q;k7a zH7%pO#8>1J$vdtXN{DxyAmp``&=FI@`Tji_0$ZHcup-kzbv`h49jlAYs<2kTTuIVm zQ1_#BTF2P*!>4(Iwm*(mT!%-hvd8_iHT#7(wGgI{+^*yvQHa)^sMEQMwJF7@#$m_& z2i{<-H}o3a^`1}*;coRoJsAh%k9`E_&h;@#Wh-^W?#8>_G-#)#En0U`bSID zgQE6Pu2|V1rwX0zSPYv;Co-H)M4kZN?Ds@N_$EsZzxHd}Y+*3R*qhpc_bj)Cn=FhB zh0Jj$P^8~bypwj`dG)<2M#m=xtgmmGw>NMmC&AqcwsK-YC<5__n(ZA3-|l|Ffn>p{ z30^CpmrcG1%zaP!PBJW#fa)vwWv4xgyK_Xct;$m7}IIM=VYSB zNMclH|4P80w3t1?$kce^%?18LusA{$yO#q+rA37MFb)tr-8cHT3jx|2Fvb7V#ZSdO z4jdLAKmY>AYXX45iO*YF*n)R&u}0hhwo_2KQ;jCBf~&5)xlhP)-dyTW5V>3i0QhR= z(u1Qb06D`mw1|&>J~6?#9Q=643oN^VikgLjbw*&92|YTjy?qt$EOyU4e%b}r1u@b$zgBVe{^S1ukv$z} literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md index 9f65ae6e85..d7431c8085 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md @@ -20,29 +20,30 @@ ms.collection: - m365solution-overview ms.topic: conceptual ms.custom: migrationguides -ms.date: 09/22/2020 +ms.date: 02/11/2021 ms.reviewer: jesquive, chventou, jonix, chriggs, owtho --- # Migrate from McAfee to Microsoft Defender for Endpoint -[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +If you are planning to switch from McAfee Endpoint Security (McAfee) to [Microsoft Defender for Endpoint](https://docs.microsoft.com/windows/security/threat-protection) (Microsoft Defender for Endpoint), you're in the right place. Use this article as a guide. -If you are planning to switch from McAfee Endpoint Security (McAfee) to [Microsoft Defender for Endpoint](https://docs.microsoft.com/windows/security/threat-protection) (Microsoft Defender for Endpoint), you're in the right place. Use this article as a guide to plan your migration. +:::image type="content" source="images/mcafee-mde-migration.png" alt-text="Overview of migrating from McAfee to Defender for Endpoint"::: + +During migration, you begin with McAfee in active mode, configure Defender for Endpoint in passive mode, onboard to Defender for Endpoint, set Microsoft Defender Antivirus to active mode, and remove McAfee. ## The migration process -When you switch from McAfee to Microsoft Defender for Endpoint, you follow a process that can be divided into three phases, as described in the following table: +When you switch from McAfee to Microsoft Defender for Endpoint, you follow a process that can be divided into three phases: Prepare, Setup, and Onboard. ![Migration phases - prepare setup onboard](images/phase-diagrams/migration-phases.png) - |Phase |Description | |--|--| -|[Prepare for your migration](mcafee-to-microsoft-defender-prepare.md) |During [the **Prepare** phase](mcafee-to-microsoft-defender-prepare.md), you update your organization's devices, get Microsoft Defender for Endpoint, plan your roles and permissions, and grant access to the Microsoft Defender Security Center. You also configure your device proxy and internet settings to enable communication between your organization's devices and Microsoft Defender for Endpoint. | -|[Set up Microsoft Defender for Endpoint](mcafee-to-microsoft-defender-setup.md) |During [the **Setup** phase](mcafee-to-microsoft-defender-setup.md), you enable Microsoft Defender Antivirus and make sure it's in passive mode, and you configure settings & exclusions for Microsoft Defender Antivirus, Microsoft Defender for Endpoint, and McAfee. You also create device groups, collections, and organizational units. Finally, you configure your antimalware policies and real-time protection settings.| -|[Onboard to Microsoft Defender for Endpoint](mcafee-to-microsoft-defender-onboard.md) |During [the **Onboard** phase](mcafee-to-microsoft-defender-onboard.md), you onboard your devices to Microsoft Defender for Endpoint and verify that those devices are communicating with Microsoft Defender for Endpoint. Last, you uninstall McAfee and make sure that protection through Microsoft Defender Antivirus & Microsoft Defender for Endpoint is in active mode. | +|[Prepare for your migration](mcafee-to-microsoft-defender-prepare.md) |During the [**Prepare**](mcafee-to-microsoft-defender-prepare.md) phase, you update your organization's devices, get Microsoft Defender for Endpoint, plan your roles and permissions, and grant access to the Microsoft Defender Security Center. You also configure your device proxy and internet settings to enable communication between your organization's devices and Microsoft Defender for Endpoint. | +|[Set up Microsoft Defender for Endpoint](mcafee-to-microsoft-defender-setup.md) |During the [**Setup**](mcafee-to-microsoft-defender-setup.md) phase, you enable Microsoft Defender Antivirus and make sure it's in passive mode, and you configure settings & exclusions for Microsoft Defender Antivirus, Microsoft Defender for Endpoint, and McAfee. You also create device groups, collections, and organizational units. Finally, you configure your antimalware policies and real-time protection settings.| +|[Onboard to Microsoft Defender for Endpoint](mcafee-to-microsoft-defender-onboard.md) |During the [**Onboard**](mcafee-to-microsoft-defender-onboard.md) phase, you onboard your devices to Microsoft Defender for Endpoint and verify that those devices are communicating with Microsoft Defender for Endpoint. Last, you uninstall McAfee and make sure that protection through Microsoft Defender Antivirus & Microsoft Defender for Endpoint is in active mode. | ## What's included in Microsoft Defender for Endpoint? From ebf0945bbecb9bc54d968e94f4f08cf1be12716c Mon Sep 17 00:00:00 2001 From: greg-lindsay Date: Thu, 11 Feb 2021 15:38:51 -0800 Subject: [PATCH 02/15] add n ote --- .../deploy-a-windows-10-image-using-mdt.md | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/windows/deployment/deploy-windows-mdt/deploy-a-windows-10-image-using-mdt.md b/windows/deployment/deploy-windows-mdt/deploy-a-windows-10-image-using-mdt.md index 5c8972471b..4887149cd2 100644 --- a/windows/deployment/deploy-windows-mdt/deploy-a-windows-10-image-using-mdt.md +++ b/windows/deployment/deploy-windows-mdt/deploy-a-windows-10-image-using-mdt.md @@ -361,6 +361,9 @@ In this section, you will learn how to configure the MDT Build Lab deployment sh ### Configure the rules +> [!NOTE] +> The following instructions assume the device is online. If you're offline you can remove SLShare variable. + On **MDT01**: 1. Right-click the **MDT Production** deployment share and select **Properties**. @@ -731,7 +734,7 @@ On **MDT01**: The ISO that you got when updating the offline media item can be burned to a DVD and used directly (it will be bootable), but it is often more efficient to use USB sticks instead since they are faster and can hold more data. (A dual-layer DVD is limited to 8.5 GB.) >[!TIP] ->In this example, the .wim file is 5.5 GB in size. However, bootable USB sticks are formatted with the FAT32 file system which limits file size to 4.0 GB. This means you must split the .wim file, which can be done using DISM:
 
Dism /Split-Image /ImageFile:D:\MDTOfflinemedia\Content\Deploy\Operating Systems\W10EX64RTM\REFW10X64-001.wim /SWMFile:E:\sources\install.swm /FileSize:3800.
 
Windows Setup automatically installs from this file, provided you name it install.swm. The file names for the next files include numbers, for example: install2.swm, install3.swm.
 
To enable split image in MDT, the Settings.xml file in your deployment share (ex: D:\MDTProduction\Control\Settings.xml) must have the **SkipWimSplit** value set to **False**. By default this value is set to True (\True\), so this must be changed and the offline media content updated. +>In this example, the .wim file is 5.5 GB in size. However, bootable USB sticks are formatted with the FAT32 file system which limits file size to 4.0 GB. You can place the image on a different drive (ex: E:\Deploy\Operating Systems\W10EX64RTM\REFW10X64-001.swm) and then modify E:\Deploy\Control\OperatingSystems.xml to point to it. Alternatively to keep using the USB you must split the .wim file, which can be done using DISM:
 
Dism /Split-Image /ImageFile:D:\MDTOfflinemedia\Content\Deploy\Operating Systems\W10EX64RTM\REFW10X64-001.wim /SWMFile:E:\sources\install.swm /FileSize:3800.
 
Windows Setup automatically installs from this file, provided you name it install.swm. The file names for the next files include numbers, for example: install2.swm, install3.swm.
 
To enable split image in MDT, the Settings.xml file in your deployment share (ex: D:\MDTProduction\Control\Settings.xml) must have the **SkipWimSplit** value set to **False**. By default this value is set to True (\True\), so this must be changed and the offline media content updated. Follow these steps to create a bootable USB stick from the offline media content: From c666bb1ba0cb2cfc0a7d3d7a09540232610f13d0 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Thu, 11 Feb 2021 15:43:59 -0800 Subject: [PATCH 03/15] migration guide updates --- .../mcafee-to-microsoft-defender-migration.md | 2 +- .../mcafee-to-microsoft-defender-onboard.md | 4 +--- .../mcafee-to-microsoft-defender-prepare.md | 5 +---- .../mcafee-to-microsoft-defender-setup.md | 5 +---- .../symantec-to-microsoft-defender-atp-migration.md | 2 +- 5 files changed, 5 insertions(+), 13 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md index d7431c8085..fda35b3de6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md @@ -31,7 +31,7 @@ If you are planning to switch from McAfee Endpoint Security (McAfee) to [Microso :::image type="content" source="images/mcafee-mde-migration.png" alt-text="Overview of migrating from McAfee to Defender for Endpoint"::: -During migration, you begin with McAfee in active mode, configure Defender for Endpoint in passive mode, onboard to Defender for Endpoint, set Microsoft Defender Antivirus to active mode, and remove McAfee. +When you make the switch from McAfee to Defender for Endpoint, you begin with your McAfee solution in active mode, configure Defender for Endpoint in passive mode, onboard to Defender for Endpoint, and then set Defender for Endpoint to active mode and remove McAfee. ## The migration process diff --git a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-onboard.md b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-onboard.md index f703c93219..053a70a737 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-onboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-onboard.md @@ -20,14 +20,12 @@ ms.collection: - m365solution-scenario ms.custom: migrationguides ms.topic: article -ms.date: 09/24/2020 +ms.date: 02/11/2021 ms.reviewer: jesquive, chventou, jonix, chriggs, owtho --- # Migrate from McAfee - Phase 3: Onboard to Microsoft Defender for Endpoint -[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - |[![Phase 1: Prepare](images/phase-diagrams/prepare.png)](mcafee-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](mcafee-to-microsoft-defender-prepare.md) |[![Phase 2: Set up](images/phase-diagrams/setup.png)](mcafee-to-microsoft-defender-setup.md)
[Phase 2: Set up](mcafee-to-microsoft-defender-setup.md) |![Phase 3: Onboard](images/phase-diagrams/onboard.png)
Phase 3: Onboard | |--|--|--| || |*You are here!* | diff --git a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-prepare.md b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-prepare.md index 0965e2f8ef..a11af93ccf 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-prepare.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-prepare.md @@ -20,15 +20,12 @@ ms.collection: - m365solution-scenario ms.topic: article ms.custom: migrationguides -ms.date: 09/22/2020 +ms.date: 02/11/2021 ms.reviewer: jesquive, chventou, jonix, chriggs, owtho --- # Migrate from McAfee - Phase 1: Prepare for your migration -[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - - |![Phase 1: Prepare](images/phase-diagrams/prepare.png)
Phase 1: Prepare |[![Phase 2: Set up](images/phase-diagrams/setup.png)](mcafee-to-microsoft-defender-setup.md)
[Phase 2: Set up](mcafee-to-microsoft-defender-setup.md) |[![Phase 3: Onboard](images/phase-diagrams/onboard.png)](mcafee-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](mcafee-to-microsoft-defender-onboard.md) | |--|--|--| |*You are here!*| | | diff --git a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-setup.md b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-setup.md index a35f4d1943..78a654099e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-setup.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-setup.md @@ -20,15 +20,12 @@ ms.collection: - m365solution-scenario ms.topic: article ms.custom: migrationguides -ms.date: 09/22/2020 +ms.date: 02/11/2021 ms.reviewer: jesquive, chventou, jonix, chriggs, owtho --- # Migrate from McAfee - Phase 2: Set up Microsoft Defender for Endpoint -[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - - |[![Phase 1: Prepare](images/phase-diagrams/prepare.png)](mcafee-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](mcafee-to-microsoft-defender-prepare.md) |![Phase 2: Set up](images/phase-diagrams/setup.png)
Phase 2: Set up |[![Phase 3: Onboard](images/phase-diagrams/onboard.png)](mcafee-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](mcafee-to-microsoft-defender-onboard.md) | |--|--|--| ||*You are here!* | | diff --git a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-migration.md b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-migration.md index 7f20e3e024..8c859f4f40 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-migration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-migration.md @@ -19,7 +19,7 @@ ms.collection: - m365solution-symantecmigrate - m365solution-overview ms.topic: conceptual -ms.date: 09/22/2020 +ms.date: 02/11/2021 ms.custom: migrationguides ms.reviewer: depicker, yongrhee, chriggs --- From c1f48269ffdee8568a9a65facbfe70211fa93eb2 Mon Sep 17 00:00:00 2001 From: greg-lindsay Date: Thu, 11 Feb 2021 15:44:16 -0800 Subject: [PATCH 04/15] modify note --- windows/deployment/vda-subscription-activation.md | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/windows/deployment/vda-subscription-activation.md b/windows/deployment/vda-subscription-activation.md index bc307dfc3a..4c302978f3 100644 --- a/windows/deployment/vda-subscription-activation.md +++ b/windows/deployment/vda-subscription-activation.md @@ -37,20 +37,23 @@ Deployment instructions are provided for the following scenarios: ## Activation ### Scenario 1 + - The VM is running Windows 10, version 1803 or later. - The VM is hosted in Azure or another [Qualified Multitenant Hoster](https://www.microsoft.com/en-us/CloudandHosting/licensing_sca.aspx) (QMTH). When a user with VDA rights signs in to the VM using their AAD credentials, the VM is automatically stepped-up to Enterprise and activated. There is no need to perform Windows 10 Pro activation. This eliminates the need to maintain KMS or MAK in the qualifying cloud infrastructure. ### Scenario 2 + - The Hyper-V host and the VM are both running Windows 10, version 1803 or later. [Inherited Activation](https://docs.microsoft.com/windows/deployment/windows-10-subscription-activation#inherited-activation) is enabled. All VMs created by a user with a Windows 10 E3 or E5 license are automatically activated independent of whether a user signs in with a local account or using an Azure Active Directory account. ### Scenario 3 + - The VM is running Windows 10, version 1703 or 1709, or the hoster is not an authorized [QMTH](https://www.microsoft.com/en-us/CloudandHosting/licensing_sca.aspx) partner. - In this scenario, the underlying Windows 10 Pro license must be activated prior to Subscription Activation of Windows 10 Enterprise. Activation is accomplished using a Windows 10 Pro Generic Volume License Key (GVLK) and a Volume License KMS activation server provided by the hoster. Alternatively, a KMS activation server on your corporate network can be used if you have configured a private connection, such as [ExpressRoute](https://azure.microsoft.com/services/expressroute/) or [VPN Gateway](https://azure.microsoft.com/services/vpn-gateway/). + In this scenario, the underlying Windows 10 Pro license must be activated prior to Subscription Activation of Windows 10 Enterprise. Activation is accomplished using a Windows 10 Pro Generic Volume License Key (GVLK) and a Volume License KMS activation server provided by the hoster. Alternatively, a KMS activation server can be used. KMS activation is provided for Azure VMs. For more information, see [Troubleshoot Azure Windows virtual machine activation problems](https://docs.microsoft.com/azure/virtual-machines/troubleshooting/troubleshoot-activation-problems). For examples of activation issues, see [Troubleshoot the user experience](https://docs.microsoft.com/windows/deployment/deploy-enterprise-licenses#troubleshoot-the-user-experience). From e698c55c932a6ca3e614f3cdcdf9aeeaf7ffe8a6 Mon Sep 17 00:00:00 2001 From: greg-lindsay Date: Thu, 11 Feb 2021 15:48:57 -0800 Subject: [PATCH 05/15] resolve useless warnings --- .../deploy-a-windows-10-image-using-mdt.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/windows/deployment/deploy-windows-mdt/deploy-a-windows-10-image-using-mdt.md b/windows/deployment/deploy-windows-mdt/deploy-a-windows-10-image-using-mdt.md index 4887149cd2..9596f65bb1 100644 --- a/windows/deployment/deploy-windows-mdt/deploy-a-windows-10-image-using-mdt.md +++ b/windows/deployment/deploy-windows-mdt/deploy-a-windows-10-image-using-mdt.md @@ -147,7 +147,7 @@ On **MDT01**: 9. On the **Destination** page, in the **Specify the name of the directory that should be created** text box, type **Install - Adobe Reader** and click **Next**. 10. On the **Command Details** page, in the **Command Line** text box, type **msiexec /i AcroRead.msi /q**, click **Next** twice, and then click **Finish**. -![acroread](../images/acroread.png) +![acroread image](../images/acroread.png) The Adobe Reader application added to the Deployment Workbench. @@ -267,7 +267,7 @@ On **MDT01**: For the ThinkStation P500 model, you use the Lenovo ThinkVantage Update Retriever software to download the drivers. With Update Retriever, you need to specify the correct Lenovo Machine Type for the actual hardware (the first four characters of the model name). As an example, the Lenovo ThinkStation P500 model has the 30A6003TUS model name, meaning the Machine Type is 30A6. -![ThinkStation](../images/thinkstation.png) +![ThinkStation image](../images/thinkstation.png) To get the updates, download the drivers from the Lenovo ThinkVantage Update Retriever using its export function. You can also download the drivers by searching PC Support on the [Lenovo website](https://go.microsoft.com/fwlink/p/?LinkId=619543). @@ -536,7 +536,7 @@ On **MDT01**: 1. Download MDOP 2015 and copy the DaRT 10 installer file to the D:\\Setup\\DaRT 10 folder on MDT01 (DaRT\\DaRT 10\\Installers\\\\\x64\\MSDaRT100.msi). 2. Install DaRT 10 (MSDaRT10.msi) using the default settings. - ![DaRT](../images/dart.png) + ![DaRT image](../images/dart.png) 2. Copy the two tools CAB files from **C:\\Program Files\\Microsoft DaRT\\v10** (**Toolsx86.cab** and **Toolsx64.cab**) to the production deployment share at **D:\\MDTProduction\\Tools\\x86** and **D:\\MDTProduction\\Tools\\x64**, respectively. 3. In the Deployment Workbench, right-click the **MDT Production** deployment share and select **Properties**. @@ -607,13 +607,13 @@ On **HV01**: 2. Installs the added application. 3. Updates the operating system via your local Windows Server Update Services (WSUS) server. -![pc0005](../images/pc0005-vm.png) +![pc0005 image](../images/pc0005-vm.png) ### Application installation Following OS installation, Microsoft Office 365 Pro Plus - x64 is installed automatically. - ![pc0005](../images/pc0005-vm-office.png) + ![pc0005 image](../images/pc0005-vm-office.png) ### Use the MDT monitoring feature From acb91d093aea1a48a41d3ece6d9a2b3605394069 Mon Sep 17 00:00:00 2001 From: greg-lindsay Date: Thu, 11 Feb 2021 15:53:25 -0800 Subject: [PATCH 06/15] fix typo --- windows/deployment/vda-subscription-activation.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/deployment/vda-subscription-activation.md b/windows/deployment/vda-subscription-activation.md index 4c302978f3..e7ec8ac329 100644 --- a/windows/deployment/vda-subscription-activation.md +++ b/windows/deployment/vda-subscription-activation.md @@ -32,7 +32,7 @@ Deployment instructions are provided for the following scenarios: - VMs must be running Windows 10 Pro, version 1703 (also known as the Creator's Update) or later. - VMs must be Active Directory-joined or Azure Active Directory (AAD)-joined. - VMs must be generation 1. -- VMs must hosted by a [Qualified Multitenant Hoster](https://www.microsoft.com/en-us/CloudandHosting/licensing_sca.aspx) (QMTH). +- VMs must be hosted by a [Qualified Multitenant Hoster](https://www.microsoft.com/en-us/CloudandHosting/licensing_sca.aspx) (QMTH). ## Activation @@ -72,7 +72,7 @@ For examples of activation issues, see [Troubleshoot the user experience](https: 6. Follow the instructions to use sysprep at [Steps to generalize a VHD](https://docs.microsoft.com/azure/virtual-machines/windows/prepare-for-upload-vhd-image#steps-to-generalize-a-vhd) and then start the VM again. 7. If you must activate Windows 10 Pro as described for [scenario 3](#scenario-3), complete the following steps to use Windows Configuration Designer and inject an activation key. Otherwise, skip to step 20. 8. [Install Windows Configuration Designer](/windows/configuration/provisioning-packages/provisioning-install-icd). -9. Open Windows Configuration Designer and click **Provison desktop services**. +9. Open Windows Configuration Designer and click **Provision desktop services**. 10. Under **Name**, type **Desktop AD Enrollment Pro GVLK**, click **Finish**, and then on the **Set up device** page enter a device name. - Note: You can use a different project name, but this name is also used with dism.exe in a subsequent step. 11. Under **Enter product key** type the Pro GVLK key: **W269N-WFGWX-YVC9B-4J6C9-T83GX**. @@ -114,7 +114,7 @@ For Azure AD-joined VMs, follow the same instructions (above) as for [Active Dir 3. On the Remote tab, choose **Allow remote connections to this computer** and then click **Select Users**. 4. Click **Add**, type **Authenticated users**, and then click **OK** three times. 5. [Install Windows Configuration Designer](/windows/configuration/provisioning-packages/provisioning-install-icd). -6. Open Windows Configuration Designer and click **Provison desktop services**. +6. Open Windows Configuration Designer and click **Provision desktop services**. 7. If you must activate Windows 10 Pro as described for [scenario 3](#scenario-3), complete the following steps. Otherwise, skip to step 8. 1. Under **Name**, type **Desktop Bulk Enrollment Token Pro GVLK**, click **Finish**, and then on the **Set up device** page enter a device name. 2. Under **Enter product key** type the Pro GVLK key: **W269N-WFGWX-YVC9B-4J6C9-T83GX**. From f851745efe1091314ea0ccbfe954634dd9ea82f7 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Thu, 11 Feb 2021 15:54:16 -0800 Subject: [PATCH 07/15] migration guide updates --- .../switch-to-microsoft-defender-migration.md | 2 +- .../symantec-to-microsoft-defender-atp-migration.md | 6 +++--- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-migration.md b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-migration.md index 1780f55497..801c19ac97 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-migration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-migration.md @@ -19,7 +19,7 @@ ms.collection: - m365solution-overview ms.topic: conceptual ms.custom: migrationguides -ms.date: 09/24/2020 +ms.date: 02/11/2021 ms.reviewer: jesquive, chventou, jonix, chriggs, owtho ms.technology: mde --- diff --git a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-migration.md b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-migration.md index 8c859f4f40..9c5fa1bbb5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-migration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-migration.md @@ -25,11 +25,11 @@ ms.reviewer: depicker, yongrhee, chriggs --- # Migrate from Symantec to Microsoft Defender for Endpoint +If you are planning to switch from Symantec Endpoint Protection (Symantec) to [Microsoft Defender for Endpoint](https://docs.microsoft.com/windows/security/threat-protection) (Microsoft Defender for Endpoint), you're in the right place. Use this article as a guide. -[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +:::image type="content" source="images/symantec-mde-migration.png" alt-text="Overview of migrating from Symantec to Defender for Endpoint"::: - -If you are planning to switch from Symantec Endpoint Protection (Symantec) to [Microsoft Defender for Endpoint](https://docs.microsoft.com/windows/security/threat-protection), you're in the right place. Use this article as a guide to plan your migration. +When you make the switch from Symantec to Defender for Endpoint, you begin with your Symantec solution in active mode, configure Defender for Endpoint in passive mode, onboard to Defender for Endpoint, and then set Defender for Endpoint to active mode and remove Symantec. ## The migration process From db019c874a5e6e2026e3996e83012f5feda1998e Mon Sep 17 00:00:00 2001 From: greg-lindsay Date: Thu, 11 Feb 2021 15:55:18 -0800 Subject: [PATCH 08/15] resolve useless warning --- .../deploy-windows-mdt/deploy-a-windows-10-image-using-mdt.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/deployment/deploy-windows-mdt/deploy-a-windows-10-image-using-mdt.md b/windows/deployment/deploy-windows-mdt/deploy-a-windows-10-image-using-mdt.md index 9596f65bb1..2779d317f6 100644 --- a/windows/deployment/deploy-windows-mdt/deploy-a-windows-10-image-using-mdt.md +++ b/windows/deployment/deploy-windows-mdt/deploy-a-windows-10-image-using-mdt.md @@ -607,13 +607,13 @@ On **HV01**: 2. Installs the added application. 3. Updates the operating system via your local Windows Server Update Services (WSUS) server. -![pc0005 image](../images/pc0005-vm.png) +![pc0005 image1](../images/pc0005-vm.png) ### Application installation Following OS installation, Microsoft Office 365 Pro Plus - x64 is installed automatically. - ![pc0005 image](../images/pc0005-vm-office.png) + ![pc0005 image2](../images/pc0005-vm-office.png) ### Use the MDT monitoring feature From ef590ec59ae91997b1a5d8ea97218f0c46e6a8a1 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Thu, 11 Feb 2021 15:55:32 -0800 Subject: [PATCH 09/15] migration guide updates --- .../symantec-to-microsoft-defender-atp-onboard.md | 5 +---- .../symantec-to-microsoft-defender-atp-prepare.md | 5 +---- .../symantec-to-microsoft-defender-atp-setup.md | 5 +---- 3 files changed, 3 insertions(+), 12 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md index 9ba924e18a..0dd5a3a140 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md @@ -18,16 +18,13 @@ ms.collection: - M365-security-compliance - m365solution-symantecmigrate ms.topic: article -ms.date: 09/24/2020 +ms.date: 02/11/2021 ms.custom: migrationguides ms.reviewer: depicker, yongrhee, chriggs --- # Migrate from Symantec - Phase 3: Onboard to Microsoft Defender for Endpoint -[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - - |[![Phase 1: Prepare](images/phase-diagrams/prepare.png)](symantec-to-microsoft-defender-atp-prepare.md)
[Phase 1: Prepare](symantec-to-microsoft-defender-atp-prepare.md) |[![Phase 2: Set up](images/phase-diagrams/setup.png)](symantec-to-microsoft-defender-atp-setup.md)
[Phase 2: Set up](symantec-to-microsoft-defender-atp-setup.md) |![Phase 3: Onboard](images/phase-diagrams/onboard.png)
Phase 3: Onboard | |--|--|--| || |*You are here!* | diff --git a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-prepare.md b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-prepare.md index c94db15f09..f89c89cdf9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-prepare.md +++ b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-prepare.md @@ -18,16 +18,13 @@ ms.collection: - M365-security-compliance - m365solution-symantecmigrate ms.topic: article -ms.date: 09/22/2020 +ms.date: 02/11/2021 ms.custom: migrationguides ms.reviewer: depicker, yongrhee, chriggs --- # Migrate from Symantec - Phase 1: Prepare for your migration -[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - - |![Phase 1: Prepare](images/phase-diagrams/prepare.png)
Phase 1: Prepare |[![Phase 2: Set up](images/phase-diagrams/setup.png)](symantec-to-microsoft-defender-atp-setup.md)
[Phase 2: Set up](symantec-to-microsoft-defender-atp-setup.md) |[![Phase 3: Onboard](images/phase-diagrams/onboard.png)](symantec-to-microsoft-defender-atp-onboard.md)
[Phase 3: Onboard](symantec-to-microsoft-defender-atp-onboard.md) | |--|--|--| |*You are here!*| | | diff --git a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md index c934d60427..daaff76020 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md +++ b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md @@ -18,16 +18,13 @@ ms.collection: - M365-security-compliance - m365solution-symantecmigrate ms.topic: article -ms.date: 11/30/2020 +ms.date: 02/11/2021 ms.custom: migrationguides ms.reviewer: depicker, yongrhee, chriggs --- # Migrate from Symantec - Phase 2: Set up Microsoft Defender for Endpoint -[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - - |[![Phase 1: Prepare](images/phase-diagrams/prepare.png)](symantec-to-microsoft-defender-atp-prepare.md)
[Phase 1: Prepare](symantec-to-microsoft-defender-atp-prepare.md) |![Phase 2: Set up](images/phase-diagrams/setup.png)
Phase 2: Set up |[![Phase 3: Onboard](images/phase-diagrams/onboard.png)](symantec-to-microsoft-defender-atp-onboard.md)
[Phase 3: Onboard](symantec-to-microsoft-defender-atp-onboard.md) | |--|--|--| ||*You are here!* | | From c37fcd76e87f3eeb69a3cd0bd5867b54503462d6 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Thu, 11 Feb 2021 16:05:42 -0800 Subject: [PATCH 10/15] migration guide updates --- .../switch-to-microsoft-defender-migration.md | 6 +- .../switch-to-microsoft-defender-onboard.md | 6 +- .../switch-to-microsoft-defender-setup.md | 71 ++++++------------- 3 files changed, 28 insertions(+), 55 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-migration.md b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-migration.md index 801c19ac97..9e6acab8df 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-migration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-migration.md @@ -26,7 +26,11 @@ ms.technology: mde # Make the switch from a non-Microsoft endpoint solution to Microsoft Defender for Endpoint -If you are planning to switch from a non-Microsoft endpoint protection solution to [Microsoft Defender for Endpoint](https://docs.microsoft.com/windows/security/threat-protection), and you're looking for help, you're in the right place. Use this article as a guide to plan your migration. +If you are planning to switch from a non-Microsoft endpoint protection solution to [Microsoft Defender for Endpoint](https://docs.microsoft.com/windows/security/threat-protection) (Defender for Endpoint), you're in the right place. Use this article as a guide. + +:::image type="content" source="images/nonms-mde-migration.png" alt-text="Overview of migrating to Defender for Endpoint"::: + +When you make the switch to Defender for Endpoint, you begin with your non-Microsoft solution in active mode, configure Defender for Endpoint in passive mode, onboard to Defender for Endpoint, and then set Defender for Endpoint to active mode and remove the non-Microsoft solution. > [!TIP] > - If you're currently using McAfee Endpoint Security (McAfee), see [Migrate from McAfee to Microsoft Defender for Endpoint](mcafee-to-microsoft-defender-migration.md). diff --git a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-onboard.md b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-onboard.md index 2a3c2f472f..a035ccb910 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-onboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-onboard.md @@ -19,7 +19,7 @@ ms.collection: - m365solution-migratetomdatp ms.custom: migrationguides ms.topic: article -ms.date: 09/24/2020 +ms.date: 02/11/2021 ms.reviewer: jesquive, chventou, jonix, chriggs, owtho --- @@ -40,11 +40,8 @@ ms.reviewer: jesquive, chventou, jonix, chriggs, owtho ## Onboard devices to Microsoft Defender for Endpoint 1. Go to the Microsoft Defender Security Center ([https://aka.ms/MDATPportal](https://aka.ms/MDATPportal)) and sign in. - 2. Choose **Settings** > **Device management** > **Onboarding**. - 3. In the **Select operating system to start onboarding process** list, select an operating system. - 4. Under **Deployment method**, select an option. Follow the links and prompts to onboard your organization's devices. Need help? See [Onboarding methods](#onboarding-methods) (in this article). ### Onboarding methods @@ -63,7 +60,6 @@ Deployment methods vary, depending on which operating system is selected. Refer To verify that your onboarded devices are properly connected to Microsoft Defender for Endpoint, you can run a detection test. - |Operating system |Guidance | |---------|---------| |- Windows 10
- Windows Server 2019
- Windows Server, version 1803
- Windows Server 2016
- Windows Server 2012 R2 |See [Run a detection test](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/run-detection-test).

Visit the Microsoft Defender for Endpoint demo scenarios site ([https://demo.wd.microsoft.com](https://demo.wd.microsoft.com)) and try one or more of the scenarios. For example, try the **Cloud-delivered protection** demo scenario. | diff --git a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md index dfe5a93228..dd119855e3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md +++ b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md @@ -19,7 +19,7 @@ ms.collection: - m365solution-migratetomdatp ms.topic: article ms.custom: migrationguides -ms.date: 09/22/2020 +ms.date: 02/11/2021 ms.reviewer: jesquive, chventou, jonix, chriggs, owtho --- @@ -55,17 +55,11 @@ This step of the migration process includes the following tasks: The [DisableAntiSpyware](https://docs.microsoft.com/windows-hardware/customize/desktop/unattend/security-malware-windows-defender-disableantispyware) registry key was used in the past to disable Microsoft Defender Antivirus, and deploy another antivirus product, such as McAfee. In general, you should not have this registry key on your Windows devices and endpoints; however, if you do have `DisableAntiSpyware` configured, here's how to set its value to false: 1. On your Windows Server device, open Registry Editor. - 2. Navigate to `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender`. - 3. In that folder, look for a DWORD entry called **DisableAntiSpyware**. - - If you do not see that entry, you're all set. - - If you do see **DisableAntiSpyware**, proceed to step 4. - 4. Right-click the DisableAntiSpyware DWORD, and then choose **Modify**. - 5. Set the value to `0`. (This sets the registry key's value to *false*.) > [!TIP] @@ -80,25 +74,19 @@ The [DisableAntiSpyware](https://docs.microsoft.com/windows-hardware/customize/d > - Windows Server 2016 1. As a local administrator on the endpoint or device, open Windows PowerShell. - -2. Run the following PowerShell cmdlets:
- +2. Run the following PowerShell cmdlets:
`Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender-Features`
- `Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender`
- > [!NOTE] > When using the DISM command within a task sequence running PS, the following path to cmd.exe is required. > Example:
> `c:\windows\sysnative\cmd.exe /c Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender-Features`
> `c:\windows\sysnative\cmd.exe /c Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender`
- 3. To verify Microsoft Defender Antivirus is running, use the following PowerShell cmdlet:
- `Get-Service -Name windefend` > [!TIP] -> Need help? See [Microsoft Defender Antivirus on Windows Server 2016 and 2019](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016). +> Need help? See [Microsoft Defender Antivirus on Windows Server](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016). ### Set Microsoft Defender Antivirus to passive mode on Windows Server @@ -106,11 +94,8 @@ Because your organization is still using your existing endpoint protection solut 1. Open Registry Editor, and then navigate to
`Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Windows Advanced Threat Protection`. - 2. Edit (or create) a DWORD entry called **ForceDefenderPassiveMode**, and specify the following settings: - - Set the DWORD's value to **1**. - - Under **Base**, select **Hexadecimal**. > [!NOTE] @@ -127,9 +112,9 @@ To enable Microsoft Defender Antivirus, we recommend using Intune. However, you |Method |What to do | |---------|---------| -|[Intune](https://docs.microsoft.com/mem/intune/fundamentals/tutorial-walkthrough-endpoint-manager)

**NOTE**: Intune is now Microsoft Endpoint Manager. |1. Go to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and sign in.

2. Select **Devices** > **Configuration profiles**, and then select the profile type you want to configure.
If you haven't yet created a **Device restrictions** profile type, or if you want to create a new one, see [Configure device restriction settings in Microsoft Intune](https://docs.microsoft.com/intune/device-restrictions-configure).

3. Select **Properties**, and then select **Configuration settings: Edit**.

4. Expand **Microsoft Defender Antivirus**.

5. Enable **Cloud-delivered protection**.

6. In the **Prompt users before sample submission** dropdown, select **Send all samples automatically**.

7. In the **Detect potentially unwanted applications** dropdown, select **Enable** or **Audit**.

8. Select **Review + save**, and then choose **Save**.

For more information about Intune device profiles, including how to create and configure their settings, see [What are Microsoft Intune device profiles?](https://docs.microsoft.com/intune/device-profiles).| -|Control Panel in Windows |Follow the guidance here: [Turn on Microsoft Defender Antivirus](https://docs.microsoft.com/mem/intune/user-help/turn-on-defender-windows).

**NOTE**: You might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus* in some versions of Windows. | -|[Advanced Group Policy Management](https://docs.microsoft.com/microsoft-desktop-optimization-pack/agpm/)
or
[Group Policy Management Console](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/use-group-policy-microsoft-defender-antivirus) |1. Go to `Computer configuration > Administrative templates > Windows components > Microsoft Defender Antivirus`.

2. Look for a policy called **Turn off Microsoft Defender Antivirus**.

3. Choose **Edit policy setting**, and make sure that policy is disabled. This enables Microsoft Defender Antivirus.

**NOTE**: You might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus* in some versions of Windows. | +|[Intune](https://docs.microsoft.com/mem/intune/fundamentals/tutorial-walkthrough-endpoint-manager)
**NOTE**: Intune is now Microsoft Endpoint Manager. |1. Go to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and sign in.
2. Select **Devices** > **Configuration profiles**, and then select the profile type you want to configure. If you haven't yet created a **Device restrictions** profile type, or if you want to create a new one, see [Configure device restriction settings in Microsoft Intune](https://docs.microsoft.com/intune/device-restrictions-configure).
3. Select **Properties**, and then select **Configuration settings: Edit**.
4. Expand **Microsoft Defender Antivirus**.
5. Enable **Cloud-delivered protection**.
6. In the **Prompt users before sample submission** dropdown, select **Send all samples automatically**.
7. In the **Detect potentially unwanted applications** dropdown, select **Enable** or **Audit**.
8. Select **Review + save**, and then choose **Save**.
**TIP**: For more information about Intune device profiles, including how to create and configure their settings, see [What are Microsoft Intune device profiles?](https://docs.microsoft.com/intune/device-profiles).| +|Control Panel in Windows |Follow the guidance here: [Turn on Microsoft Defender Antivirus](https://docs.microsoft.com/mem/intune/user-help/turn-on-defender-windows).
**NOTE**: You might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus* in some versions of Windows. | +|[Advanced Group Policy Management](https://docs.microsoft.com/microsoft-desktop-optimization-pack/agpm/)
or
[Group Policy Management Console](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/use-group-policy-microsoft-defender-antivirus) |1. Go to `Computer configuration > Administrative templates > Windows components > Microsoft Defender Antivirus`.
2. Look for a policy called **Turn off Microsoft Defender Antivirus**.
3. Choose **Edit policy setting**, and make sure that policy is disabled. This enables Microsoft Defender Antivirus.
**NOTE**: You might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus* in some versions of Windows. | ### Confirm that Microsoft Defender Antivirus is in passive mode @@ -137,8 +122,8 @@ Microsoft Defender Antivirus can run alongside your existing endpoint protection |Method |What to do | |---------|---------| -|Command Prompt |1. On a Windows device, open Command Prompt as an administrator.

2. Type `sc query windefend`, and then press Enter.

3. Review the results to confirm that Microsoft Defender Antivirus is running in passive mode. | -|PowerShell |1. On a Windows device, open Windows PowerShell as an administrator.

2. Run the [Get-MpComputerStatus](https://docs.microsoft.com/powershell/module/defender/Get-MpComputerStatus) cmdlet.

3. In the list of results, look for either **AMRunningMode: Passive Mode** or **AMRunningMode: SxS Passive Mode**. | +|Command Prompt |1. On a Windows device, open Command Prompt as an administrator.
2. Type `sc query windefend`, and then press Enter.
3. Review the results to confirm that Microsoft Defender Antivirus is running in passive mode. | +|PowerShell |1. On a Windows device, open Windows PowerShell as an administrator.
2. Run the [Get-MpComputerStatus](https://docs.microsoft.com/powershell/module/defender/Get-MpComputerStatus) cmdlet.
3. In the list of results, look for either **AMRunningMode: Passive Mode** or **AMRunningMode: SxS Passive Mode**. | > [!NOTE] > You might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus* in some versions of Windows. @@ -164,8 +149,8 @@ The specific exclusions to configure depend on which version of Windows your end |OS |Exclusions | |--|--| -|- Windows 10, [version 1803](https://docs.microsoft.com/windows/release-health/status-windows-10-1803) or later (See [Windows 10 release information](https://docs.microsoft.com/windows/release-health/release-information))
- Windows 10, version 1703 or [1709](https://docs.microsoft.com/windows/release-health/status-windows-10-1709) with [KB4493441](https://support.microsoft.com/help/4493441) installed
- [Windows Server 2019](https://docs.microsoft.com/windows/release-health/status-windows-10-1809-and-windows-server-2019)
- [Windows Server, version 1803](https://docs.microsoft.com/windows-server/get-started/whats-new-in-windows-server-1803) |`C:\Program Files\Windows Defender Advanced Threat Protection\MsSense.exe`

`C:\Program Files\Windows Defender Advanced Threat Protection\SenseCncProxy.exe`

`C:\Program Files\Windows Defender Advanced Threat Protection\SenseSampleUploader.exe`

`C:\Program Files\Windows Defender Advanced Threat Protection\SenseIR.exe`
| -|- [Windows 8.1](https://docs.microsoft.com/windows/release-health/status-windows-8.1-and-windows-server-2012-r2)
- [Windows 7](https://docs.microsoft.com/windows/release-health/status-windows-7-and-windows-server-2008-r2-sp1)
- [Windows Server 2016](https://docs.microsoft.com/windows/release-health/status-windows-10-1607-and-windows-server-2016)
- [Windows Server 2012 R2](https://docs.microsoft.com/windows/release-health/status-windows-8.1-and-windows-server-2012-r2)
- [Windows Server 2008 R2 SP1](https://docs.microsoft.com/windows/release-health/status-windows-7-and-windows-server-2008-r2-sp1) |`C:\Program Files\Microsoft Monitoring Agent\Agent\Health Service State\Monitoring Host Temporary Files 6\45\MsSenseS.exe`

**NOTE**: Where Monitoring Host Temporary Files 6\45 can be different numbered subfolders.

`C:\Program Files\Microsoft Monitoring Agent\Agent\AgentControlPanel.exe`

`C:\Program Files\Microsoft Monitoring Agent\Agent\HealthService.exe`

`C:\Program Files\Microsoft Monitoring Agent\Agent\HSLockdown.exe`

`C:\Program Files\Microsoft Monitoring Agent\Agent\MOMPerfSnapshotHelper.exe`

`C:\Program Files\Microsoft Monitoring Agent\Agent\MonitoringHost.exe`

`C:\Program Files\Microsoft Monitoring Agent\Agent\TestCloudConnection.exe` | +|- Windows 10, [version 1803](https://docs.microsoft.com/windows/release-health/status-windows-10-1803) or later (See [Windows 10 release information](https://docs.microsoft.com/windows/release-health/release-information))
- Windows 10, version 1703 or [1709](https://docs.microsoft.com/windows/release-health/status-windows-10-1709) with [KB4493441](https://support.microsoft.com/help/4493441) installed
- [Windows Server 2019](https://docs.microsoft.com/windows/release-health/status-windows-10-1809-and-windows-server-2019)
- [Windows Server, version 1803](https://docs.microsoft.com/windows-server/get-started/whats-new-in-windows-server-1803) |`C:\Program Files\Windows Defender Advanced Threat Protection\MsSense.exe`
`C:\Program Files\Windows Defender Advanced Threat Protection\SenseCncProxy.exe`
`C:\Program Files\Windows Defender Advanced Threat Protection\SenseSampleUploader.exe`
`C:\Program Files\Windows Defender Advanced Threat Protection\SenseIR.exe`
| +|- [Windows 8.1](https://docs.microsoft.com/windows/release-health/status-windows-8.1-and-windows-server-2012-r2)
- [Windows 7](https://docs.microsoft.com/windows/release-health/status-windows-7-and-windows-server-2008-r2-sp1)
- [Windows Server 2016](https://docs.microsoft.com/windows/release-health/status-windows-10-1607-and-windows-server-2016)
- [Windows Server 2012 R2](https://docs.microsoft.com/windows/release-health/status-windows-8.1-and-windows-server-2012-r2)
- [Windows Server 2008 R2 SP1](https://docs.microsoft.com/windows/release-health/status-windows-7-and-windows-server-2008-r2-sp1) |`C:\Program Files\Microsoft Monitoring Agent\Agent\Health Service State\Monitoring Host Temporary Files 6\45\MsSenseS.exe`
**NOTE**: Where Monitoring Host Temporary Files 6\45 can be different numbered subfolders.
`C:\Program Files\Microsoft Monitoring Agent\Agent\AgentControlPanel.exe`
`C:\Program Files\Microsoft Monitoring Agent\Agent\HealthService.exe`
`C:\Program Files\Microsoft Monitoring Agent\Agent\HSLockdown.exe`
`C:\Program Files\Microsoft Monitoring Agent\Agent\MOMPerfSnapshotHelper.exe`
`C:\Program Files\Microsoft Monitoring Agent\Agent\MonitoringHost.exe`
`C:\Program Files\Microsoft Monitoring Agent\Agent\TestCloudConnection.exe` | ## Add your existing solution to the exclusion list for Microsoft Defender Antivirus @@ -181,33 +166,27 @@ You can choose from several methods to add your exclusions to Microsoft Defender |Method | What to do| |--|--| -|[Intune](https://docs.microsoft.com/mem/intune/fundamentals/tutorial-walkthrough-endpoint-manager)

**NOTE**: Intune is now Microsoft Endpoint Manager. |1. Go to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and sign in.

2. Select **Devices** > **Configuration profiles**, and then select the profile that you want to configure.

3. Under **Manage**, select **Properties**.

4. Select **Configuration settings: Edit**.

5. Expand **Microsoft Defender Antivirus**, and then expand **Microsoft Defender Antivirus Exclusions**.

6. Specify the files and folders, extensions, and processes to exclude from Microsoft Defender Antivirus scans. For reference, see [Microsoft Defender Antivirus exclusions](https://docs.microsoft.com/mem/intune/configuration/device-restrictions-windows-10#microsoft-defender-antivirus-exclusions).

7. Choose **Review + save**, and then choose **Save**. | -|[Microsoft Endpoint Configuration Manager](https://docs.microsoft.com/mem/configmgr/) |1. Using the [Configuration Manager console](https://docs.microsoft.com/mem/configmgr/core/servers/manage/admin-console), go to **Assets and Compliance** > **Endpoint Protection** > **Antimalware Policies**, and then select the policy that you want to modify.

2. Specify exclusion settings for files and folders, extensions, and processes to exclude from Microsoft Defender Antivirus scans. | -|[Group Policy Object](https://docs.microsoft.com/previous-versions/windows/desktop/Policy/group-policy-objects) | 1. On your Group Policy management computer, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and click **Edit**.

2. In the **Group Policy Management Editor**, go to **Computer configuration** and click **Administrative templates**.

3. Expand the tree to **Windows components > Microsoft Defender Antivirus > Exclusions**.
**NOTE**: You might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus* in some versions of Windows.

4. Double-click the **Path Exclusions** setting and add the exclusions.
- Set the option to **Enabled**.
- Under the **Options** section, click **Show...**.
- Specify each folder on its own line under the **Value name** column.
- If you specify a file, make sure to enter a fully qualified path to the file, including the drive letter, folder path, filename, and extension. Enter **0** in the **Value** column.

5. Click **OK**.

6. Double-click the **Extension Exclusions** setting and add the exclusions.
- Set the option to **Enabled**.
- Under the **Options** section, click **Show...**.
- Enter each file extension on its own line under the **Value name** column. Enter **0** in the **Value** column.

7. Click **OK**. | -|Local group policy object |1. On the endpoint or device, open the Local Group Policy Editor.

2. Go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Exclusions**.
**NOTE**: You might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus* in some versions of Windows.

3. Specify your path and process exclusions. | -|Registry key |1. Export the following registry key: `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\exclusions`.

2. Import the registry key. Here are two examples:
- Local path: `regedit.exe /s c:\temp\ MDAV_Exclusion.reg`
- Network share: `regedit.exe /s \\FileServer\ShareName\MDAV_Exclusion.reg` | +|[Intune](https://docs.microsoft.com/mem/intune/fundamentals/tutorial-walkthrough-endpoint-manager)
**NOTE**: Intune is now Microsoft Endpoint Manager. |1. Go to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and sign in.
2. Select **Devices** > **Configuration profiles**, and then select the profile that you want to configure.
3. Under **Manage**, select **Properties**.
4. Select **Configuration settings: Edit**.
5. Expand **Microsoft Defender Antivirus**, and then expand **Microsoft Defender Antivirus Exclusions**.
6. Specify the files and folders, extensions, and processes to exclude from Microsoft Defender Antivirus scans. For reference, see [Microsoft Defender Antivirus exclusions](https://docs.microsoft.com/mem/intune/configuration/device-restrictions-windows-10#microsoft-defender-antivirus-exclusions).
7. Choose **Review + save**, and then choose **Save**. | +|[Microsoft Endpoint Configuration Manager](https://docs.microsoft.com/mem/configmgr/) |1. Using the [Configuration Manager console](https://docs.microsoft.com/mem/configmgr/core/servers/manage/admin-console), go to **Assets and Compliance** > **Endpoint Protection** > **Antimalware Policies**, and then select the policy that you want to modify.
2. Specify exclusion settings for files and folders, extensions, and processes to exclude from Microsoft Defender Antivirus scans. | +|[Group Policy Object](https://docs.microsoft.com/previous-versions/windows/desktop/Policy/group-policy-objects) | 1. On your Group Policy management computer, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and click **Edit**.
2. In the **Group Policy Management Editor**, go to **Computer configuration** and click **Administrative templates**.
3. Expand the tree to **Windows components > Microsoft Defender Antivirus > Exclusions**.
**NOTE**: You might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus* in some versions of Windows.
4. Double-click the **Path Exclusions** setting and add the exclusions.
- Set the option to **Enabled**.
- Under the **Options** section, click **Show...**.
- Specify each folder on its own line under the **Value name** column.
- If you specify a file, make sure to enter a fully qualified path to the file, including the drive letter, folder path, filename, and extension. Enter **0** in the **Value** column.
5. Click **OK**.
6. Double-click the **Extension Exclusions** setting and add the exclusions.
- Set the option to **Enabled**.
- Under the **Options** section, click **Show...**.
- Enter each file extension on its own line under the **Value name** column. Enter **0** in the **Value** column.
7. Click **OK**. | +|Local group policy object |1. On the endpoint or device, open the Local Group Policy Editor.
2. Go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Exclusions**.
**NOTE**: You might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus* in some versions of Windows.
3. Specify your path and process exclusions. | +|Registry key |1. Export the following registry key: `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\exclusions`.
2. Import the registry key. Here are two examples:
- Local path: `regedit.exe /s c:\temp\ MDAV_Exclusion.reg`
- Network share: `regedit.exe /s \\FileServer\ShareName\MDAV_Exclusion.reg` | ## Add your existing solution to the exclusion list for Microsoft Defender for Endpoint To add exclusions to Microsoft Defender for Endpoint, you create [indicators](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/manage-indicators#create-indicators-for-files). 1. Go to the Microsoft Defender Security Center ([https://aka.ms/MDATPportal](https://aka.ms/MDATPportal)) and sign in. - 2. In the navigation pane, choose **Settings** > **Rules** > **Indicators**. - 3. On the **File hashes** tab, choose **Add indicator**. - -3. On the **Indicator** tab, specify the following settings: +4. On the **Indicator** tab, specify the following settings: - File hash (Need help? See [Find a file hash using CMPivot](#find-a-file-hash-using-cmpivot) in this article.) - Under **Expires on (UTC)**, choose **Never**. - -4. On the **Action** tab, specify the following settings: +5. On the **Action** tab, specify the following settings: - **Response Action**: **Allow** - Title and description - -5. On the **Scope** tab, under **Device groups**, select either **All devices in my scope** or **Select from list**. - -6. On the **Summary** tab, review the settings, and then click **Save**. +6. On the **Scope** tab, under **Device groups**, select either **All devices in my scope** or **Select from list**. +7. On the **Summary** tab, review the settings, and then click **Save**. ### Find a file hash using CMPivot @@ -216,17 +195,11 @@ CMPivot is an in-console utility for Configuration Manager. CMPivot provides acc To use CMPivot to get your file hash, follow these steps: 1. Review the [prerequisites](https://docs.microsoft.com/mem/configmgr/core/servers/manage/cmpivot#prerequisites). - 2. [Start CMPivot](https://docs.microsoft.com/mem/configmgr/core/servers/manage/cmpivot#start-cmpivot). - 3. Connect to Configuration Manager (`SCCM_ServerName.DomainName.com`). - 4. Select the **Query** tab. - 5. In the **Device Collection** list, and choose **All Systems (default)**. - 6. In the query box, type the following query:
- ```kusto File(c:\\windows\\notepad.exe) | project Hash @@ -239,9 +212,9 @@ To use CMPivot to get your file hash, follow these steps: | Collection type | What to do | |--|--| -|[Device groups](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/machine-groups) (formerly called machine groups) enable your security operations team to configure security capabilities, such as automated investigation and remediation.

Device groups are also useful for assigning access to those devices so that your security operations team can take remediation actions if needed.

Device groups are created in the Microsoft Defender Security Center. |1. Go to the Microsoft Defender Security Center ([https://aka.ms/MDATPportal](https://aka.ms/MDATPportal)).

2. In the navigation pane on the left, choose **Settings** > **Permissions** > **Device groups**.

3. Choose **+ Add device group**.

4. Specify a name and description for the device group.

5. In the **Automation level** list, select an option. (We recommend **Full - remediate threats automatically**.) To learn more about the various automation levels, see [How threats are remediated](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/automated-investigations#how-threats-are-remediated).

6. Specify conditions for a matching rule to determine which devices belong to the device group. For example, you can choose a domain, OS versions, or even use [device tags](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/machine-tags).

7. On the **User access** tab, specify roles that should have access to the devices that are included in the device group.

8. Choose **Done**. | -|[Device collections](https://docs.microsoft.com/mem/configmgr/core/clients/manage/collections/introduction-to-collections) enable your security operations team to manage applications, deploy compliance settings, or install software updates on the devices in your organization.

Device collections are created by using [Configuration Manager](https://docs.microsoft.com/mem/configmgr/). |Follow the steps in [Create a collection](https://docs.microsoft.com/mem/configmgr/core/clients/manage/collections/create-collections#bkmk_create). | -|[Organizational units](https://docs.microsoft.com/azure/active-directory-domain-services/create-ou) enable you to logically group objects such as user accounts, service accounts, or computer accounts. You can then assign administrators to specific organizational units, and apply group policy to enforce targeted configuration settings.

Organizational units are defined in [Azure Active Directory Domain Services](https://docs.microsoft.com/azure/active-directory-domain-services). | Follow the steps in [Create an Organizational Unit in an Azure Active Directory Domain Services managed domain](https://docs.microsoft.com/azure/active-directory-domain-services/create-ou). | +|[Device groups](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/machine-groups) (formerly called machine groups) enable your security operations team to configure security capabilities, such as automated investigation and remediation.
Device groups are also useful for assigning access to those devices so that your security operations team can take remediation actions if needed.
Device groups are created in the Microsoft Defender Security Center. |1. Go to the Microsoft Defender Security Center ([https://aka.ms/MDATPportal](https://aka.ms/MDATPportal)).
2. In the navigation pane on the left, choose **Settings** > **Permissions** > **Device groups**.
3. Choose **+ Add device group**.
4. Specify a name and description for the device group.
5. In the **Automation level** list, select an option. (We recommend **Full - remediate threats automatically**.) To learn more about the various automation levels, see [How threats are remediated](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/automated-investigations#how-threats-are-remediated).
6. Specify conditions for a matching rule to determine which devices belong to the device group. For example, you can choose a domain, OS versions, or even use [device tags](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/machine-tags).
7. On the **User access** tab, specify roles that should have access to the devices that are included in the device group.
8. Choose **Done**. | +|[Device collections](https://docs.microsoft.com/mem/configmgr/core/clients/manage/collections/introduction-to-collections) enable your security operations team to manage applications, deploy compliance settings, or install software updates on the devices in your organization.
Device collections are created by using [Configuration Manager](https://docs.microsoft.com/mem/configmgr/). |Follow the steps in [Create a collection](https://docs.microsoft.com/mem/configmgr/core/clients/manage/collections/create-collections#bkmk_create). | +|[Organizational units](https://docs.microsoft.com/azure/active-directory-domain-services/create-ou) enable you to logically group objects such as user accounts, service accounts, or computer accounts. You can then assign administrators to specific organizational units, and apply group policy to enforce targeted configuration settings.
Organizational units are defined in [Azure Active Directory Domain Services](https://docs.microsoft.com/azure/active-directory-domain-services). | Follow the steps in [Create an Organizational Unit in an Azure Active Directory Domain Services managed domain](https://docs.microsoft.com/azure/active-directory-domain-services/create-ou). | ## Configure antimalware policies and real-time protection From d2c1149d25e73b797befdd5f3e9b7e97246858b8 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Thu, 11 Feb 2021 16:06:51 -0800 Subject: [PATCH 11/15] Update switch-to-microsoft-defender-prepare.md --- .../switch-to-microsoft-defender-prepare.md | 8 +------- 1 file changed, 1 insertion(+), 7 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-prepare.md b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-prepare.md index ab451608fc..f014d6735b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-prepare.md +++ b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-prepare.md @@ -19,7 +19,7 @@ ms.collection: - m365solution-migratetomdatp ms.topic: article ms.custom: migrationguides -ms.date: 09/22/2020 +ms.date: 02/11/2021 ms.reviewer: jesquive, chventou, jonix, chriggs, owtho --- @@ -65,11 +65,8 @@ Need help updating your organization's devices? See the following resources: Now that you've updated your organization's devices, the next step is to get Microsoft Defender for Endpoint, assign licenses, and make sure the service is provisioned. 1. Buy or try Microsoft Defender for Endpoint today. [Start a free trial or request a quote](https://aka.ms/mdatp). - 2. Verify that your licenses are properly provisioned. [Check your license state](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/production-deployment#check-license-state). - 3. As a global administrator or security administrator, set up your dedicated cloud instance of Microsoft Defender for Endpoint. See [Microsoft Defender for Endpoint setup: Tenant configuration](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/production-deployment#tenant-configuration). - 4. If endpoints (such as devices) in your organization use a proxy to access the internet, see [Microsoft Defender for Endpoint setup: Network configuration](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/production-deployment#network-configuration). At this point, you are ready to grant access to your security administrators and security operators who will use the Microsoft Defender Security Center ([https://aka.ms/MDATPportal](https://aka.ms/MDATPportal)). @@ -84,14 +81,11 @@ The Microsoft Defender Security Center ([https://aka.ms/MDATPportal](https://aka Permissions to the Microsoft Defender Security Center can be granted by using either basic permissions or role-based access control (RBAC). We recommend using RBAC so that you have more granular control over permissions. 1. Plan the roles and permissions for your security administrators and security operators. See [Role-based access control](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/prepare-deployment#role-based-access-control). - 2. Set up and configure RBAC. We recommend using [Intune](https://docs.microsoft.com/mem/intune/fundamentals/what-is-intune) to configure RBAC, especially if your organization is using a combination of Windows 10, macOS, iOS, and Android devices. See [setting up RBAC using Intune](https://docs.microsoft.com/mem/intune/fundamentals/role-based-access-control). - If your organization requires a method other than Intune, choose one of the following options: - [Configuration Manager](https://docs.microsoft.com/mem/configmgr/core/servers/deploy/configure/configure-role-based-administration) - [Advanced Group Policy Management](https://docs.microsoft.com/microsoft-desktop-optimization-pack/agpm) - [Windows Admin Center](https://docs.microsoft.com/windows-server/manage/windows-admin-center/overview) - 3. Grant access to the Microsoft Defender Security Center. (Need help? See [Manage portal access using RBAC](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/rbac)). ## Configure device proxy and internet connectivity settings From 55350263e366d8e735856dae0dbc74163e09bfc9 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Thu, 11 Feb 2021 16:09:44 -0800 Subject: [PATCH 12/15] migration guide updates --- .../switch-to-microsoft-defender-setup.md | 3 +-- .../symantec-to-microsoft-defender-atp-onboard.md | 13 +++---------- 2 files changed, 4 insertions(+), 12 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md index dd119855e3..1c9d5914a9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md +++ b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md @@ -200,6 +200,7 @@ To use CMPivot to get your file hash, follow these steps: 4. Select the **Query** tab. 5. In the **Device Collection** list, and choose **All Systems (default)**. 6. In the query box, type the following query:
+ ```kusto File(c:\\windows\\notepad.exe) | project Hash @@ -219,9 +220,7 @@ To use CMPivot to get your file hash, follow these steps: ## Configure antimalware policies and real-time protection Using Configuration Manager and your device collection(s), configure your antimalware policies. - - See [Create and deploy antimalware policies for Endpoint Protection in Configuration Manager](https://docs.microsoft.com/mem/configmgr/protect/deploy-use/endpoint-antimalware-policies). - - While you create and configure your antimalware policies, make sure to review the [real-time protection settings](https://docs.microsoft.com/mem/configmgr/protect/deploy-use/endpoint-antimalware-policies#real-time-protection-settings) and [enable block at first sight](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-block-at-first-sight-microsoft-defender-antivirus). > [!TIP] diff --git a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md index 0dd5a3a140..0a2b297d72 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md @@ -40,11 +40,8 @@ ms.reviewer: depicker, yongrhee, chriggs ## Onboard devices to Microsoft Defender for Endpoint 1. Go to the Microsoft Defender Security Center ([https://aka.ms/MDATPportal](https://aka.ms/MDATPportal)) and sign in. - 2. Choose **Settings** > **Device management** > **Onboarding**. - 3. In the **Select operating system to start onboarding process** list, select an operating system. - 4. Under **Deployment method**, select an option. Follow the links and prompts to onboard your organization's devices. Need help? See [Onboarding methods](#onboarding-methods) (in this article). ### Onboarding methods @@ -63,7 +60,6 @@ Deployment methods vary, depending on which operating system is selected. Refer To verify that your onboarded devices are properly connected to Microsoft Defender for Endpoint, you can run a detection test. - |Operating system |Guidance | |---------|---------| |- Windows 10
- Windows Server 2019
- Windows Server, version 1803
- Windows Server 2016
- Windows Server 2012 R2 |See [Run a detection test](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/run-detection-test).

Visit the Microsoft Defender for Endpoint demo scenarios site ([https://demo.wd.microsoft.com](https://demo.wd.microsoft.com)) and try one or more of the scenarios. For example, try the **Cloud-delivered protection** demo scenario. | @@ -75,12 +71,11 @@ To verify that your onboarded devices are properly connected to Microsoft Defend Now that you have onboarded your organization's devices to Microsoft Defender for Endpoint, your next step is to uninstall Symantec. 1. [Disable Tamper Protection](https://knowledge.broadcom.com/external/article?legacyId=tech192023) in Symantec. - -2. Delete the uninstall password for Symantec: +2. Delete the uninstall password for Symantec:
1. On your Windows devices, open Registry Editor as an administrator. 2. Go to `HKEY_LOCAL_MACHINE\SOFTWARE\Symantec\Symantec Endpoint Protection\SMC`. - 3. Look for an entry named **SmcInstData**. Right-click the item, and then choose **Delete**. - + 3. Look for an entry named **SmcInstData**. + 4. Right-click the item, and then choose **Delete**. 3. Remove Symantec from your devices. If you need help with this, see Broadcom's documentation. Here are a few Broadcom resources: - [Uninstall Symantec Endpoint Protection](https://knowledge.broadcom.com/external/article/156148/uninstall-symantec-endpoint-protection.html) - Windows devices: [Manually uninstall Endpoint Protection 14 clients on Windows](https://knowledge.broadcom.com/external/article?articleId=170040) @@ -99,7 +94,5 @@ To do this, visit the Microsoft Defender for Endpoint demo scenarios site ([http ## Next steps **Congratulations**! You have completed your [migration from Symantec to Microsoft Defender for Endpoint](symantec-to-microsoft-defender-atp-migration.md#the-migration-process)! - - [Visit your security operations dashboard](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard) in the Microsoft Defender Security Center ([https://aka.ms/MDATPportal](https://aka.ms/MDATPportal)). - - [Manage Microsoft Defender for Endpoint, post migration](manage-atp-post-migration.md). From 361766e55b3b0e19cc16b92a4de70e94a7385cf4 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Thu, 11 Feb 2021 16:11:14 -0800 Subject: [PATCH 13/15] Update symantec-to-microsoft-defender-atp-prepare.md --- .../symantec-to-microsoft-defender-atp-prepare.md | 11 ++--------- 1 file changed, 2 insertions(+), 9 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-prepare.md b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-prepare.md index f89c89cdf9..2b72584931 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-prepare.md +++ b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-prepare.md @@ -42,11 +42,8 @@ This migration phase includes the following steps: To get started, you must have Microsoft Defender for Endpoint, with licenses assigned and provisioned. 1. Buy or try Microsoft Defender for Endpoint today. [Visit Microsoft Defender for Endpoint to start a free trial or request a quote](https://aka.ms/mdatp). - 2. Verify that your licenses are properly provisioned. [Check your license state](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/production-deployment#check-license-state). - 3. As a global administrator or security administrator, set up your dedicated cloud instance of Microsoft Defender for Endpoint. See [Microsoft Defender for Endpoint setup: Tenant configuration](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/production-deployment#tenant-configuration). - 4. If endpoints (such as devices) in your organization use a proxy to access the internet, see [Microsoft Defender for Endpoint setup: Network configuration](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/production-deployment#network-configuration). At this point, you are ready to grant access to your security administrators and security operators who will use the Microsoft Defender Security Center ([https://aka.ms/MDATPportal](https://aka.ms/MDATPportal)). @@ -61,14 +58,11 @@ The Microsoft Defender Security Center ([https://aka.ms/MDATPportal](https://aka Permissions to the Microsoft Defender Security Center can be granted by using either basic permissions or role-based access control (RBAC). We recommend using RBAC so that you have more granular control over permissions. 1. Plan the roles and permissions for your security administrators and security operators. See [Role-based access control](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/prepare-deployment#role-based-access-control). - -2. Set up and configure RBAC. We recommend using [Intune](https://docs.microsoft.com/mem/intune/fundamentals/what-is-intune) to configure RBAC, especially if your organization is using a combination of Windows 10, macOS, iOS, and Android devices. See [setting up RBAC using Intune](https://docs.microsoft.com/mem/intune/fundamentals/role-based-access-control). - - If your organization requires a method other than Intune, choose one of the following options: +2. Set up and configure RBAC. We recommend using [Intune](https://docs.microsoft.com/mem/intune/fundamentals/what-is-intune) to configure RBAC, especially if your organization is using a combination of Windows 10, macOS, iOS, and Android devices. See [setting up RBAC using Intune](https://docs.microsoft.com/mem/intune/fundamentals/role-based-access-control).
+ If your organization requires a method other than Intune, choose one of the following options: - [Configuration Manager](https://docs.microsoft.com/mem/configmgr/core/servers/deploy/configure/configure-role-based-administration) - [Advanced Group Policy Management](https://docs.microsoft.com/microsoft-desktop-optimization-pack/agpm) - [Windows Admin Center](https://docs.microsoft.com/windows-server/manage/windows-admin-center/overview) - 3. Grant access to the Microsoft Defender Security Center. (Need help? See [Manage portal access using RBAC](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/rbac)). ## Configure device proxy and internet connectivity settings @@ -87,5 +81,4 @@ To enable communication between your devices and Microsoft Defender for Endpoint ## Next step **Congratulations**! You have completed the **Prepare** phase of [migrating from Symantec to Microsoft Defender for Endpoint](symantec-to-microsoft-defender-atp-migration.md#the-migration-process)! - - [Proceed to set up Microsoft Defender for Endpoint](symantec-to-microsoft-defender-atp-setup.md). From 50ed609ae5434bec0dbd2e016da7ed4371d35723 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Thu, 11 Feb 2021 16:14:25 -0800 Subject: [PATCH 14/15] Update symantec-to-microsoft-defender-atp-setup.md --- ...ymantec-to-microsoft-defender-atp-setup.md | 58 ++++++------------- 1 file changed, 19 insertions(+), 39 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md index daaff76020..9224748cb5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md +++ b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md @@ -60,9 +60,7 @@ Now that you're moving from Symantec to Microsoft Defender for Endpoint, you'll > Microsoft Defender Antivirus is built into Windows 10, but it might be disabled. In this case, proceed to [Enable Microsoft Defender Antivirus](#enable-microsoft-defender-antivirus). 1. As a local administrator on the endpoint or device, open Windows PowerShell. - 2. Run the following PowerShell cmdlets: - `Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender-Features`
`Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender` @@ -71,7 +69,6 @@ Now that you're moving from Symantec to Microsoft Defender for Endpoint, you'll > Example:
> `c:\windows\sysnative\cmd.exe /c Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender-Features`
> `c:\windows\sysnative\cmd.exe /c Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender`
- 3. To verify Microsoft Defender Antivirus is running, use the following PowerShell cmdlet:
`Get-Service -Name windefend` @@ -84,7 +81,6 @@ Because your organization is still using Symantec, you must set Microsoft Defend 1. Open Registry Editor, and then navigate to
`Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Windows Advanced Threat Protection`. - 2. Edit (or create) a DWORD entry called **ForceDefenderPassiveMode**, and specify the following settings: - Set the DWORD's value to **1**. - Under **Base**, select **Hexadecimal**. @@ -103,9 +99,9 @@ To enable Microsoft Defender Antivirus, we recommend using Intune. However, you |Method |What to do | |---------|---------| -|[Intune](https://docs.microsoft.com/mem/intune/fundamentals/tutorial-walkthrough-endpoint-manager)

**NOTE**: Intune is now Microsoft Endpoint Manager. |1. Go to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and sign in.

2. Select **Devices** > **Configuration profiles**, and then select the profile type you want to configure. If you haven't yet created a **Device restrictions** profile type, or if you want to create a new one, see [Configure device restriction settings in Microsoft Intune](https://docs.microsoft.com/intune/device-restrictions-configure).

3. Select **Properties**, and then select **Configuration settings: Edit**.

4. Expand **Microsoft Defender Antivirus**.

5. Enable **Cloud-delivered protection**.

6. In the **Prompt users before sample submission** dropdown, select **Send all samples automatically**.

7. In the **Detect potentially unwanted applications** dropdown, select **Enable** or **Audit**.

8. Select **Review + save**, and then choose **Save**.

For more information about Intune device profiles, including how to create and configure their settings, see [What are Microsoft Intune device profiles?](https://docs.microsoft.com/intune/device-profiles).| -|Control Panel in Windows |Follow the guidance here: [Turn on Microsoft Defender Antivirus](https://docs.microsoft.com/mem/intune/user-help/turn-on-defender-windows).

**NOTE**: You might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus* in some versions of Windows. | -|[Advanced Group Policy Management](https://docs.microsoft.com/microsoft-desktop-optimization-pack/agpm/)
or
[Group Policy Management Console](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/use-group-policy-microsoft-defender-antivirus) |1. Go to `Computer configuration > Administrative templates > Windows components > Microsoft Defender Antivirus`.

2. Look for a policy called **Turn off Microsoft Defender Antivirus**.

3. Choose **Edit policy setting**, and make sure that policy is disabled. This enables Microsoft Defender Antivirus.

**NOTE**: You might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus* in some versions of Windows. | +|[Intune](https://docs.microsoft.com/mem/intune/fundamentals/tutorial-walkthrough-endpoint-manager)
**NOTE**: Intune is now Microsoft Endpoint Manager. |1. Go to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and sign in.
2. Select **Devices** > **Configuration profiles**, and then select the profile type you want to configure. If you haven't yet created a **Device restrictions** profile type, or if you want to create a new one, see [Configure device restriction settings in Microsoft Intune](https://docs.microsoft.com/intune/device-restrictions-configure).
3. Select **Properties**, and then select **Configuration settings: Edit**.
4. Expand **Microsoft Defender Antivirus**.
5. Enable **Cloud-delivered protection**.
6. In the **Prompt users before sample submission** dropdown, select **Send all samples automatically**.
7. In the **Detect potentially unwanted applications** dropdown, select **Enable** or **Audit**.
8. Select **Review + save**, and then choose **Save**.
For more information about Intune device profiles, including how to create and configure their settings, see [What are Microsoft Intune device profiles?](https://docs.microsoft.com/intune/device-profiles).| +|Control Panel in Windows |Follow the guidance here: [Turn on Microsoft Defender Antivirus](https://docs.microsoft.com/mem/intune/user-help/turn-on-defender-windows).
**NOTE**: You might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus* in some versions of Windows. | +|[Advanced Group Policy Management](https://docs.microsoft.com/microsoft-desktop-optimization-pack/agpm/)
or
[Group Policy Management Console](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/use-group-policy-microsoft-defender-antivirus) |1. Go to `Computer configuration > Administrative templates > Windows components > Microsoft Defender Antivirus`.
2. Look for a policy called **Turn off Microsoft Defender Antivirus**.
3. Choose **Edit policy setting**, and make sure that policy is disabled. This enables Microsoft Defender Antivirus.
**NOTE**: You might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus* in some versions of Windows. | ### Verify that Microsoft Defender Antivirus is in passive mode @@ -113,8 +109,8 @@ Microsoft Defender Antivirus can run alongside Symantec if you set Microsoft Def |Method |What to do | |---------|---------| -|Command Prompt |1. On a Windows device, open Command Prompt as an administrator.

2. Type `sc query windefend`, and then press Enter.

3. Review the results to confirm that Microsoft Defender Antivirus is running in passive mode. | -|PowerShell |1. On a Windows device, open Windows PowerShell as an administrator.

2. Run the [Get-MpComputerStatus](https://docs.microsoft.com/powershell/module/defender/Get-MpComputerStatus) cmdlet.

3. In the list of results, look for either **AMRunningMode: Passive Mode** or **AMRunningMode: SxS Passive Mode**.| +|Command Prompt |1. On a Windows device, open Command Prompt as an administrator.
2. Type `sc query windefend`, and then press Enter.
3. Review the results to confirm that Microsoft Defender Antivirus is running in passive mode. | +|PowerShell |1. On a Windows device, open Windows PowerShell as an administrator.
2. Run the [Get-MpComputerStatus](https://docs.microsoft.com/powershell/module/defender/Get-MpComputerStatus) cmdlet.
3. In the list of results, look for either **AMRunningMode: Passive Mode** or **AMRunningMode: SxS Passive Mode**.| > [!NOTE] > You might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus* in some versions of Windows. @@ -135,8 +131,8 @@ This step of the setup process involves adding Microsoft Defender for Endpoint t |OS |Exclusions | |--|--| -|- Windows 10, [version 1803](https://docs.microsoft.com/windows/release-health/status-windows-10-1803) or later (See [Windows 10 release information](https://docs.microsoft.com/windows/release-health/release-information))
- Windows 10, version 1703 or [1709](https://docs.microsoft.com/windows/release-health/status-windows-10-1709) with [KB4493441](https://support.microsoft.com/help/4493441) installed
- [Windows Server 2019](https://docs.microsoft.com/windows/release-health/status-windows-10-1809-and-windows-server-2019)
- [Windows Server, version 1803](https://docs.microsoft.com/windows-server/get-started/whats-new-in-windows-server-1803) |`C:\Program Files\Windows Defender Advanced Threat Protection\MsSense.exe`

`C:\Program Files\Windows Defender Advanced Threat Protection\SenseCncProxy.exe`

`C:\Program Files\Windows Defender Advanced Threat Protection\SenseSampleUploader.exe`

`C:\Program Files\Windows Defender Advanced Threat Protection\SenseIR.exe`
| -|- [Windows 8.1](https://docs.microsoft.com/windows/release-health/status-windows-8.1-and-windows-server-2012-r2)
- [Windows 7](https://docs.microsoft.com/windows/release-health/status-windows-7-and-windows-server-2008-r2-sp1)
- [Windows Server 2016](https://docs.microsoft.com/windows/release-health/status-windows-10-1607-and-windows-server-2016)
- [Windows Server 2012 R2](https://docs.microsoft.com/windows/release-health/status-windows-8.1-and-windows-server-2012-r2)
- [Windows Server 2008 R2 SP1](https://docs.microsoft.com/windows/release-health/status-windows-7-and-windows-server-2008-r2-sp1) |`C:\Program Files\Microsoft Monitoring Agent\Agent\Health Service State\Monitoring Host Temporary Files 6\45\MsSenseS.exe`

**NOTE**: Where Monitoring Host Temporary Files 6\45 can be different numbered subfolders.

`C:\Program Files\Microsoft Monitoring Agent\Agent\AgentControlPanel.exe`

`C:\Program Files\Microsoft Monitoring Agent\Agent\HealthService.exe`

`C:\Program Files\Microsoft Monitoring Agent\Agent\HSLockdown.exe`

`C:\Program Files\Microsoft Monitoring Agent\Agent\MOMPerfSnapshotHelper.exe`

`C:\Program Files\Microsoft Monitoring Agent\Agent\MonitoringHost.exe`

`C:\Program Files\Microsoft Monitoring Agent\Agent\TestCloudConnection.exe` | +|- Windows 10, [version 1803](https://docs.microsoft.com/windows/release-health/status-windows-10-1803) or later (See [Windows 10 release information](https://docs.microsoft.com/windows/release-health/release-information))
- Windows 10, version 1703 or [1709](https://docs.microsoft.com/windows/release-health/status-windows-10-1709) with [KB4493441](https://support.microsoft.com/help/4493441) installed
- [Windows Server 2019](https://docs.microsoft.com/windows/release-health/status-windows-10-1809-and-windows-server-2019)
- [Windows Server, version 1803](https://docs.microsoft.com/windows-server/get-started/whats-new-in-windows-server-1803) |`C:\Program Files\Windows Defender Advanced Threat Protection\MsSense.exe`
`C:\Program Files\Windows Defender Advanced Threat Protection\SenseCncProxy.exe`
`C:\Program Files\Windows Defender Advanced Threat Protection\SenseSampleUploader.exe`
`C:\Program Files\Windows Defender Advanced Threat Protection\SenseIR.exe`
| +|- [Windows 8.1](https://docs.microsoft.com/windows/release-health/status-windows-8.1-and-windows-server-2012-r2)
- [Windows 7](https://docs.microsoft.com/windows/release-health/status-windows-7-and-windows-server-2008-r2-sp1)
- [Windows Server 2016](https://docs.microsoft.com/windows/release-health/status-windows-10-1607-and-windows-server-2016)
- [Windows Server 2012 R2](https://docs.microsoft.com/windows/release-health/status-windows-8.1-and-windows-server-2012-r2)
- [Windows Server 2008 R2 SP1](https://docs.microsoft.com/windows/release-health/status-windows-7-and-windows-server-2008-r2-sp1) |`C:\Program Files\Microsoft Monitoring Agent\Agent\Health Service State\Monitoring Host Temporary Files 6\45\MsSenseS.exe`
**NOTE**: Where Monitoring Host Temporary Files 6\45 can be different numbered subfolders.
`C:\Program Files\Microsoft Monitoring Agent\Agent\AgentControlPanel.exe`
`C:\Program Files\Microsoft Monitoring Agent\Agent\HealthService.exe`
`C:\Program Files\Microsoft Monitoring Agent\Agent\HSLockdown.exe`
`C:\Program Files\Microsoft Monitoring Agent\Agent\MOMPerfSnapshotHelper.exe`
`C:\Program Files\Microsoft Monitoring Agent\Agent\MonitoringHost.exe`
`C:\Program Files\Microsoft Monitoring Agent\Agent\TestCloudConnection.exe` | ## Add Symantec to the exclusion list for Microsoft Defender Antivirus @@ -155,35 +151,27 @@ You can choose from several methods to add your exclusions to Microsoft Defender |Method | What to do| |--|--| -|[Intune](https://docs.microsoft.com/mem/intune/fundamentals/tutorial-walkthrough-endpoint-manager)

**NOTE**: Intune is now Microsoft Endpoint Manager. |1. Go to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and sign in.

2. Select **Devices** > **Configuration profiles**, and then select the profile that you want to configure.

3. Under **Manage**, select **Properties**.

4. Select **Configuration settings: Edit**.

5. Expand **Microsoft Defender Antivirus**, and then expand **Microsoft Defender Antivirus Exclusions**.

6. Specify the files and folders, extensions, and processes to exclude from Microsoft Defender Antivirus scans. For reference, see [Microsoft Defender Antivirus exclusions](https://docs.microsoft.com/mem/intune/configuration/device-restrictions-windows-10#microsoft-defender-antivirus-exclusions).

7. Choose **Review + save**, and then choose **Save**. | -|[Microsoft Endpoint Configuration Manager](https://docs.microsoft.com/mem/configmgr/) |1. Using the [Configuration Manager console](https://docs.microsoft.com/mem/configmgr/core/servers/manage/admin-console), go to **Assets and Compliance** > **Endpoint Protection** > **Antimalware Policies**, and then select the policy that you want to modify.

2. Specify exclusion settings for files and folders, extensions, and processes to exclude from Microsoft Defender Antivirus scans. | -|[Group Policy Object](https://docs.microsoft.com/previous-versions/windows/desktop/Policy/group-policy-objects) | 1. On your Group Policy management computer, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and click **Edit**.

2. In the **Group Policy Management Editor**, go to **Computer configuration** and click **Administrative templates**.

3. Expand the tree to **Windows components > Microsoft Defender Antivirus > Exclusions**.
**NOTE**: You might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus* in some versions of Windows.

4. Double-click the **Path Exclusions** setting and add the exclusions.
- Set the option to **Enabled**.
- Under the **Options** section, click **Show...**.
- Specify each folder on its own line under the **Value name** column.
- If you specify a file, make sure to enter a fully qualified path to the file, including the drive letter, folder path, filename, and extension. Enter **0** in the **Value** column.

5. Click **OK**.

6. Double-click the **Extension Exclusions** setting and add the exclusions.
- Set the option to **Enabled**.
- Under the **Options** section, click **Show...**.
- Enter each file extension on its own line under the **Value name** column. Enter **0** in the **Value** column.

7. Click **OK**. | -|Local group policy object |1. On the endpoint or device, open the Local Group Policy Editor.

2. Go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Exclusions**.
**NOTE**: You might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus* in some versions of Windows.

3. Specify your path and process exclusions. | -|Registry key |1. Export the following registry key: `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\exclusions`.

2. Import the registry key. Here are two examples:
- Local path: `regedit.exe /s c:\temp\ MDAV_Exclusion.reg`
- Network share: `regedit.exe /s \\FileServer\ShareName\MDAV_Exclusion.reg` | +|[Intune](https://docs.microsoft.com/mem/intune/fundamentals/tutorial-walkthrough-endpoint-manager)
**NOTE**: Intune is now Microsoft Endpoint Manager. |1. Go to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and sign in.
2. Select **Devices** > **Configuration profiles**, and then select the profile that you want to configure.
3. Under **Manage**, select **Properties**.
4. Select **Configuration settings: Edit**.
5. Expand **Microsoft Defender Antivirus**, and then expand **Microsoft Defender Antivirus Exclusions**.
6. Specify the files and folders, extensions, and processes to exclude from Microsoft Defender Antivirus scans. For reference, see [Microsoft Defender Antivirus exclusions](https://docs.microsoft.com/mem/intune/configuration/device-restrictions-windows-10#microsoft-defender-antivirus-exclusions).
7. Choose **Review + save**, and then choose **Save**. | +|[Microsoft Endpoint Configuration Manager](https://docs.microsoft.com/mem/configmgr/) |1. Using the [Configuration Manager console](https://docs.microsoft.com/mem/configmgr/core/servers/manage/admin-console), go to **Assets and Compliance** > **Endpoint Protection** > **Antimalware Policies**, and then select the policy that you want to modify.
2. Specify exclusion settings for files and folders, extensions, and processes to exclude from Microsoft Defender Antivirus scans. | +|[Group Policy Object](https://docs.microsoft.com/previous-versions/windows/desktop/Policy/group-policy-objects) | 1. On your Group Policy management computer, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and click **Edit**.
2. In the **Group Policy Management Editor**, go to **Computer configuration** and click **Administrative templates**.
3. Expand the tree to **Windows components > Microsoft Defender Antivirus > Exclusions**.
**NOTE**: You might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus* in some versions of Windows.
4. Double-click the **Path Exclusions** setting and add the exclusions.
- Set the option to **Enabled**.
- Under the **Options** section, click **Show...**.
- Specify each folder on its own line under the **Value name** column.
- If you specify a file, make sure to enter a fully qualified path to the file, including the drive letter, folder path, filename, and extension. Enter **0** in the **Value** column.
5. Click **OK**.
6. Double-click the **Extension Exclusions** setting and add the exclusions.
- Set the option to **Enabled**.
- Under the **Options** section, click **Show...**.
- Enter each file extension on its own line under the **Value name** column. Enter **0** in the **Value** column.
7. Click **OK**. | +|Local group policy object |1. On the endpoint or device, open the Local Group Policy Editor.
2. Go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Exclusions**.
**NOTE**: You might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus* in some versions of Windows.
3. Specify your path and process exclusions. | +|Registry key |1. Export the following registry key: `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\exclusions`.
2. Import the registry key. Here are two examples:
- Local path: `regedit.exe /s c:\temp\ MDAV_Exclusion.reg`
- Network share: `regedit.exe /s \\FileServer\ShareName\MDAV_Exclusion.reg` | ## Add Symantec to the exclusion list for Microsoft Defender for Endpoint To add exclusions to Microsoft Defender for Endpoint, you create [indicators](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/manage-indicators#create-indicators-for-files). 1. Go to the Microsoft Defender Security Center ([https://aka.ms/MDATPportal](https://aka.ms/MDATPportal)) and sign in. - 2. In the navigation pane, choose **Settings** > **Rules** > **Indicators**. - 3. On the **File hashes** tab, choose **Add indicator**. - -3. On the **Indicator** tab, specify the following settings: - +4. On the **Indicator** tab, specify the following settings: - File hash (Need help? See [Find a file hash using CMPivot](#find-a-file-hash-using-cmpivot) in this article.) - Under **Expires on (UTC)**, choose **Never**. - -4. On the **Action** tab, specify the following settings: - +5. On the **Action** tab, specify the following settings: - **Response Action**: **Allow** - Title and description - -5. On the **Scope** tab, under **Device groups**, select either **All devices in my scope** or **Select from list**. - -6. On the **Summary** tab, review the settings, and then click **Save**. +6. On the **Scope** tab, under **Device groups**, select either **All devices in my scope** or **Select from list**. +7. On the **Summary** tab, review the settings, and then click **Save**. ### Find a file hash using CMPivot @@ -192,17 +180,11 @@ CMPivot is an in-console utility for Configuration Manager. CMPivot provides acc To use CMPivot to get your file hash, follow these steps: 1. Review the [prerequisites](https://docs.microsoft.com/mem/configmgr/core/servers/manage/cmpivot#prerequisites). - 2. [Start CMPivot](https://docs.microsoft.com/mem/configmgr/core/servers/manage/cmpivot#start-cmpivot). - 3. Connect to Configuration Manager (`SCCM_ServerName.DomainName.com`). - 4. Select the **Query** tab. - 5. In the **Device Collection** list, and choose **All Systems (default)**. - 6. In the query box, type the following query:
- ```kusto File(c:\\windows\\notepad.exe) | project Hash @@ -216,16 +198,15 @@ To use CMPivot to get your file hash, follow these steps: | Collection type | What to do | |--|--| -|[Device groups](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/machine-groups) (formerly called machine groups) enable your security operations team to configure security capabilities, such as automated investigation and remediation.

Device groups are also useful for assigning access to those devices so that your security operations team can take remediation actions if needed.

Device groups are created in the Microsoft Defender Security Center. |1. Go to the Microsoft Defender Security Center ([https://aka.ms/MDATPportal](https://aka.ms/MDATPportal)).

2. In the navigation pane on the left, choose **Settings** > **Permissions** > **Device groups**.

3. Choose **+ Add device group**.

4. Specify a name and description for the device group.

5. In the **Automation level** list, select an option. (We recommend **Full - remediate threats automatically**.) To learn more about the various automation levels, see [How threats are remediated](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/automated-investigations#how-threats-are-remediated).

6. Specify conditions for a matching rule to determine which devices belong to the device group. For example, you can choose a domain, OS versions, or even use [device tags](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/machine-tags).

7. On the **User access** tab, specify roles that should have access to the devices that are included in the device group.

8. Choose **Done**. | -|[Device collections](https://docs.microsoft.com/mem/configmgr/core/clients/manage/collections/introduction-to-collections) enable your security operations team to manage applications, deploy compliance settings, or install software updates on the devices in your organization.

Device collections are created by using [Configuration Manager](https://docs.microsoft.com/mem/configmgr/). |Follow the steps in [Create a collection](https://docs.microsoft.com/mem/configmgr/core/clients/manage/collections/create-collections#bkmk_create). | -|[Organizational units](https://docs.microsoft.com/azure/active-directory-domain-services/create-ou) enable you to logically group objects such as user accounts, service accounts, or computer accounts. You can then assign administrators to specific organizational units, and apply group policy to enforce targeted configuration settings.

Organizational units are defined in [Azure Active Directory Domain Services](https://docs.microsoft.com/azure/active-directory-domain-services). | Follow the steps in [Create an Organizational Unit in an Azure Active Directory Domain Services managed domain](https://docs.microsoft.com/azure/active-directory-domain-services/create-ou). | +|[Device groups](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/machine-groups) (formerly called machine groups) enable your security operations team to configure security capabilities, such as automated investigation and remediation.
Device groups are also useful for assigning access to those devices so that your security operations team can take remediation actions if needed.
Device groups are created in the Microsoft Defender Security Center. |1. Go to the Microsoft Defender Security Center ([https://aka.ms/MDATPportal](https://aka.ms/MDATPportal)).
2. In the navigation pane on the left, choose **Settings** > **Permissions** > **Device groups**.
3. Choose **+ Add device group**.
4. Specify a name and description for the device group.
5. In the **Automation level** list, select an option. (We recommend **Full - remediate threats automatically**.) To learn more about the various automation levels, see [How threats are remediated](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/automated-investigations#how-threats-are-remediated).
6. Specify conditions for a matching rule to determine which devices belong to the device group. For example, you can choose a domain, OS versions, or even use [device tags](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/machine-tags).
7. On the **User access** tab, specify roles that should have access to the devices that are included in the device group.
8. Choose **Done**. | +|[Device collections](https://docs.microsoft.com/mem/configmgr/core/clients/manage/collections/introduction-to-collections) enable your security operations team to manage applications, deploy compliance settings, or install software updates on the devices in your organization.
Device collections are created by using [Configuration Manager](https://docs.microsoft.com/mem/configmgr/). |Follow the steps in [Create a collection](https://docs.microsoft.com/mem/configmgr/core/clients/manage/collections/create-collections#bkmk_create). | +|[Organizational units](https://docs.microsoft.com/azure/active-directory-domain-services/create-ou) enable you to logically group objects such as user accounts, service accounts, or computer accounts. You can then assign administrators to specific organizational units, and apply group policy to enforce targeted configuration settings.
Organizational units are defined in [Azure Active Directory Domain Services](https://docs.microsoft.com/azure/active-directory-domain-services). | Follow the steps in [Create an Organizational Unit in an Azure Active Directory Domain Services managed domain](https://docs.microsoft.com/azure/active-directory-domain-services/create-ou). | ## Configure antimalware policies and real-time protection Using Configuration Manager and your device collection(s), configure your antimalware policies. - See [Create and deploy antimalware policies for Endpoint Protection in Configuration Manager](https://docs.microsoft.com/mem/configmgr/protect/deploy-use/endpoint-antimalware-policies). - - While you create and configure your antimalware policies, make sure to review the [real-time protection settings](https://docs.microsoft.com/mem/configmgr/protect/deploy-use/endpoint-antimalware-policies#real-time-protection-settings) and [enable block at first sight](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-block-at-first-sight-microsoft-defender-antivirus). > [!TIP] @@ -234,5 +215,4 @@ Using Configuration Manager and your device collection(s), configure your antima ## Next step **Congratulations**! You have completed the Setup phase of [migrating from Symantec to Microsoft Defender for Endpoint](symantec-to-microsoft-defender-atp-migration.md#the-migration-process)! - - [Proceed to Phase 3: Onboard to Microsoft Defender for Endpoint](symantec-to-microsoft-defender-atp-onboard.md) From 7c1a6c441612a0db8bfcbc90858af3527a533966 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Fri, 12 Feb 2021 08:57:19 -0800 Subject: [PATCH 15/15] add downlevel --- .../configure-endpoints-vdi.md | 12 ++++++++++++ 1 file changed, 12 insertions(+) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md index d0ec840095..bd29f01bd5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md @@ -26,6 +26,7 @@ ms.technology: mde **Applies to:** - Virtual desktop infrastructure (VDI) devices +- Windows 10, Windows Server 2019, Windows Server 2008R2/2012R2/2016 >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-configvdi-abovefoldlink) @@ -58,6 +59,9 @@ The following steps will guide you through onboarding VDI devices and will highl >[!WARNING] > For environments where there are low resource configurations, the VDI boot procedure might slow the Defender for Endpoint sensor onboarding. + +### For Windows 10 or Windows Server 2019 + 1. Open the VDI configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from [Microsoft Defender Security Center](https://securitycenter.windows.com/): 1. In the navigation pane, select **Settings** > **Onboarding**. @@ -108,6 +112,14 @@ The following steps will guide you through onboarding VDI devices and will highl 7. Use the search function by entering the device name and select **Device** as search type. + +## For downlevel SKUs +1. Set registry value 'HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection\DeviceTagging|VDI’ to “NonPersistent' + +2. Follow the [server onboarding process](configure-server-endpoints.md#windows-server-2008-r2-sp1-windows-server-2012-r2-and-windows-server-2016). + + + ## Updating non-persistent virtual desktop infrastructure (VDI) images As a best practice, we recommend using offline servicing tools to patch golden/master images.
For example, you can use the below commands to install an update while the image remains offline: