From afe2797f89cf063f9100042f2d72f2f708d3328a Mon Sep 17 00:00:00 2001 From: Laura Newsad Date: Thu, 18 Oct 2018 10:24:01 -0700 Subject: [PATCH 01/25] Update set-up-school-pcs-provisioning-package.md Spelling error --- education/windows/set-up-school-pcs-provisioning-package.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/education/windows/set-up-school-pcs-provisioning-package.md b/education/windows/set-up-school-pcs-provisioning-package.md index 817c97711f..a995eb5f41 100644 --- a/education/windows/set-up-school-pcs-provisioning-package.md +++ b/education/windows/set-up-school-pcs-provisioning-package.md @@ -111,7 +111,7 @@ Set up School PCs uses the Universal app install policy to install school-releva The time it takes to install a package on a device depends on the: * Strength of network connection -* Number of policies and apps withim the package +* Number of policies and apps within the package * Additional configurations made to the device Review the table below to estimate your expected provisioning time. A package that only applies Set Up School PC's default configurations will provision the fastest. A package that removes pre-installed apps, through CleanPC, will take much longer to provision. From 46865b02801f6994e9069d94ff2c7ed64ad85607 Mon Sep 17 00:00:00 2001 From: MikeBlodge Date: Thu, 18 Oct 2018 13:01:49 -0700 Subject: [PATCH 02/25] clarifying the switch motion graphic --- windows/deployment/s-mode.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/s-mode.md b/windows/deployment/s-mode.md index de261b876c..9e83c68e65 100644 --- a/windows/deployment/s-mode.md +++ b/windows/deployment/s-mode.md @@ -27,7 +27,7 @@ Start-ups are quick, and S mode is built to keep them that way. With Microsoft E **Choice and flexibility** -Save your files to your favorite cloud, like OneDrive or Dropbox, and access them from any device you choose. Browse the Microsoft Store for thousands of apps, and if you don’t find exactly what you want, you can easily [switch out of S mode](https://docs.microsoft.com/en-us/windows/deployment/windows-10-pro-in-s-mode) at any time and search the web for more choices. +Save your files to your favorite cloud, like OneDrive or Dropbox, and access them from any device you choose. Browse the Microsoft Store for thousands of apps, and if you don’t find exactly what you want, you can easily [switch out of S mode](https://docs.microsoft.com/en-us/windows/deployment/windows-10-pro-in-s-mode) to Home, Pro, or Enterprise at any time and search the web for more choices, as shown below. ![Switching out of S mode flow chart](images/s-mode-flow-chart.png) From 7e1f559b045de46b63211d23ba51d355100e27b5 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Thu, 18 Oct 2018 15:32:26 -0700 Subject: [PATCH 03/25] Update threat-protection-integration.md added a little info about Office 365 ATP and a link to that content --- .../windows-defender-atp/threat-protection-integration.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-atp/threat-protection-integration.md b/windows/security/threat-protection/windows-defender-atp/threat-protection-integration.md index f0210ed5ce..add6f459dd 100644 --- a/windows/security/threat-protection/windows-defender-atp/threat-protection-integration.md +++ b/windows/security/threat-protection/windows-defender-atp/threat-protection-integration.md @@ -31,7 +31,7 @@ Each layer in the threat protection stack plays a critical role in protecting cu Windows Defender ATP's dynamic machine risk score is integrated into the conditional access evaluation, ensuring that only secure devices have access to resources. ## Office 365 Advanced Threat Protection (Office 365 ATP) -The integration between Office 365 ATP and Windows Defender ATP enables security analysts to go upstream to investigate the entry point of an attack. Through threat intelligence sharing, attacks can be contained and blocked. +[Office 365 ATP](https://docs.microsoft.com/office365/securitycompliance/office-365-atp) helps protect your organization from malware in email messages or files through ATP Safe Links, ATP Safe Attachments, advanced Anti-Phishing, and spoof intelligence capabilities. The integration between Office 365 ATP and Windows Defender ATP enables security analysts to go upstream to investigate the entry point of an attack. Through threat intelligence sharing, attacks can be contained and blocked. ## Azure Advanced Threat Protection (Azure ATP) Suspicious activities are processes running under a user context. The integration between Windows Defender ATP and Azure ATP provides the flexibility of conducting cyber security investigation across activities and identities. From 7ba0484f81606e26b1412a3a8e3a04e2159cf309 Mon Sep 17 00:00:00 2001 From: Patti Short <35278231+shortpatti@users.noreply.github.com> Date: Fri, 19 Oct 2018 07:48:29 -0700 Subject: [PATCH 04/25] Update enterprise-mode-schema-version-1-guidance.md --- .../enterprise-mode-schema-version-1-guidance.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md index 154ad6670a..b4eca2a668 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md +++ b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md @@ -159,7 +159,7 @@ This table includes the attributes used by the Enterprise Mode schema. <exclude> -Specifies the domain or path that is excluded from getting the behavior applied. This attribute is supported on the <domain> and <path> elements. +Specifies the domain or path excluded from applying the behavior and is supported on the <domain> and <path> elements.

Example

 <emie>
@@ -230,4 +230,4 @@ If you want to target specific sites in your organization.
 |You can specify subdomains in the domain tag. |<docMode>
<domain docMode="5">contoso.com</domain>
<domain docMode="9">info.contoso.com</domain>
<docMode>
|
  • contoso.com uses document mode 5.
  • info.contoso.com uses document mode 9.
  • test.contoso.com also uses document mode 5.
| |You can specify exact URLs by listing the full path. |<emie>
<domain exclude="false">bing.com</domain>
<domain exclude="false" forceCompatView="true">contoso.com</domain>
<emie>
|
  • bing.com uses IE8 Enterprise Mode.
  • contoso.com uses IE7 Enterprise Mode.
| |You can nest paths underneath domains. |<emie>
<domain exclude="true">contoso.com
<path exclude="false">/about</path>
<path exclude="true">
/about/business</path>
</domain>
</emie>
|
  • contoso.com will use the default version of IE.
  • contoso.com/about and everything underneath that node will load in Enterprise Mode, except contoso.com/about/business, which will load in the default version of IE.
| -|You can’t add a path underneath a path. The file will still be parsed, but the sub-path will be ignored. |<emie>
<domain exclude="true">contoso.com
<path>/about
<path exclude="true">/business</path>
</path>
</domain>
</emie>
|
  • contoso.com will use the default version of IE.
  • contoso.com/about and everything underneath that node will load in Enterprise Mode, including contoso.com/about/business because the last rule is ignored.
| \ No newline at end of file +|You can’t add a path underneath a path. The file will still be parsed, but the sub-path will be ignored. |<emie>
<domain exclude="true">contoso.com
<path>/about
<path exclude="true">/business</path>
</path>
</domain>
</emie>
|
  • contoso.com will use the default version of IE.
  • contoso.com/about and everything underneath that node will load in Enterprise Mode, including contoso.com/about/business because the last rule is ignored.
| From fc4eec6439baf4918e95db9b81c74eb0dd20f8e1 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 19 Oct 2018 16:59:44 +0000 Subject: [PATCH 05/25] Merged PR 12225: Fix errors Somehow the entire doc got replaced. Fixing this, and some conflict errors --- .../windows-autopilot/existing-devices.md | 270 +++++++++++++++++- .../windows-autopilot/self-deploying.md | 5 - .../windows-autopilot/user-driven-aad.md | 4 - .../windows-autopilot/user-driven.md | 10 +- ...indows-autopilot-requirements-licensing.md | 8 +- .../windows-autopilot-requirements-network.md | 5 - .../windows-autopilot-reset-local.md | 5 - .../windows-autopilot-reset-remote.md | 5 - .../windows-autopilot-reset.md | 5 - .../windows-autopilot-scenarios.md | 5 - 10 files changed, 268 insertions(+), 54 deletions(-) diff --git a/windows/deployment/windows-autopilot/existing-devices.md b/windows/deployment/windows-autopilot/existing-devices.md index be48f47d26..6872ac6eaa 100644 --- a/windows/deployment/windows-autopilot/existing-devices.md +++ b/windows/deployment/windows-autopilot/existing-devices.md @@ -1,5 +1,5 @@ --- -title: Autopilot for existing devices +title: Windows Autopilot for existind devices description: Listing of Autopilot scenarios keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune ms.prod: w10 @@ -8,12 +8,272 @@ ms.localizationpriority: low ms.sitesec: library ms.pagetype: deploy author: greg-lindsay -ms.author: greglin -ms.date: 10/11/2018 +ms.author: greg-lindsay +ms.date: 10/19/2018 --- -# Autopilot for existing devices +# Windows Autopilot for existing devices **Applies to: Windows 10** -Placeholder. Content coming. \ No newline at end of file +Modern desktop management with Windows Autopilot enables you to easily deploy the latest version of Windows 10 to your existing devices. The apps you need for work can be automatically installed. Your work profile is synchronized, so you can resume working right away. + +This topic describes how to convert Windows 7 domain-joined computers to Azure Active Directory-joined computers running Windows 10 by using Windows Autopilot. + +## Prerequisites + +- System Center Configuration Manager Current Branch (1806) OR System Center Configuration Manager Technical Preview (1808) +- The [Windows ADK](https://developer.microsoft.com/en-us/windows/hardware/windows-assessment-deployment-kit) 1803 or later +- Assigned Microsoft Intune Licenses +- Azure Active Directory Premium +- Windows 10 version 1809 or later imported into Config Mgr as an Operating System Image + +## Procedures + +### Create the JSON file + +>[!TIP] +>To run the following commands on a computer running Windows Server 2012/2012 R2 or Windows 7/8.1, you must first download and install the [Windows Management Framework](https://www.microsoft.com/en-us/download/details.aspx?id=54616). + +1. On an Internet connected Windows PC or Server open an elevated Windows PowerShell command window +2. Enter the following lines to install the necessary modules + + #### Install required modules + + ``` + Install-PackageProvider -Name NuGet -MinimumVersion 2.8.5.201 -Force + Install-Module AzureAD -Force + Install-Module WindowsAutopilotIntune -Force + ``` + +3. Enter the following lines and provide Intune administrative credentials + - In the following command, replace the example user principal name for Azure authentication (admin@M365x373186.onmicrosoft.com) with your user account. Be sure that the user account you specify has sufficient administrative rights. + + ``` + Connect-AutopilotIntune -user admin@M365x373186.onmicrosoft.com + ``` + The password for your account will be requested using a standard Azure AD form. Type your password and then click **Sign in**. +
See the following example: + + ![Azure AD authentication](images/pwd.png) + + If this is the first time you’ve used the Intune Graph APIs, you’ll also be prompted to enable read and write permissions for Microsoft Intune PowerShell. To enable these permissions: + - Select **Consent on behalf or your organization** + - Click **Accept** + +4. Next, retrieve and display all the Autopilot profiles available in the specified Intune tenant in JSON format: + + #### Retrieve profiles in Autopilot for existing devices JSON format + + ``` + Get-AutopilotProfile | ConvertTo-AutopilotConfigurationJSON > + ``` + + See the following sample output: +
+    PS C:\> Get-AutopilotProfile | ConvertTo-AutopilotConfigurationJSON
+    {
+    "CloudAssignedTenantId":  "1537de22-988c-4e93-b8a5-83890f34a69b",
+    "Version":  2049,
+    "Comment_CloudAssignedOobeConfig":  "0x7FFFFFFF",
+    "Comment_Version":  "0x801",
+    "Comment_File":  "Profile Autopilot Profile",
+    "CloudAssignedAadServerData":  "{\"ZeroTouchConfig\":{\"CloudAssignedTenantUpn\":\"\",\"CloudAssignedTenantDomain\":\"M365x373186.onmicrosoft.com\"}}",
+    "CloudAssignedOobeConfig":  30,
+    "CloudAssignedDomainJoinMethod":  0,
+    "ZtdCorrelationId":  "7F9E6025-1E13-45F3-BF82-A3E8C5B59EAC",
+    "CloudAssignedLockdownConfig":  0,
+    "CloudAssignedTenantDomain":  "M365x373186.onmicrosoft.com"
+    }
+ + Each profile is encapsulated within braces **{ }**. In the previous example, a single profile is displayed. + +See the following table for a description of properties used in the JSON file. + + | Property | Description | + | --- | --- | + | Version (number, optional) | The version number that identifies the format of the JSON file. For Windows 10 1809, the version specified must be 2049. | + | CloudAssignedTenantId (guid, required) | The Azure Active Directory tenant ID that should be used. This is the GUID for the tenant, and can be found in properties of the tenant. The value should not include braces. | + | CloudAssignedTenantDomain (string, required) | The Azure Active Directory tenant name that should be used, e.g. tenant.onmicrosoft.com. | + | CloudAssignedOobeConfig (number, required) | This is a bitmap that shows which Autopilot settings were configured. Values include: SkipCortanaOptIn = 1, OobeUserNotLocalAdmin = 2, SkipExpressSettings = 4, SkipOemRegistration = 8, SkipEula = 16 + | CloudAssignedDomainJoinMethod (number, required) | This property should be set to 0 and specifies that the device should join Azure AD. | + | CloudAssignedForcedEnrollment (number, required) | Specifies that the device should require AAD Join and MDM enrollment.
0 = not required, 1 = required. | + | ZtdCorrelationId (guid, required) | A unique GUID (without braces) that will be provided to Intune as part of the registration process. ZtdCorrelationId will be included in enrollment message as “OfflineAutoPilotEnrollmentCorrelator”. This attribute will be present only if the enrollment is taking place on a device registered with Zero Touch Provisioning via offline registration.| + | CloudAssignedAadServerData (encoded JSON string, required) | An embedded JSON string used for branding. It requires AAD corp branding enabled.
Example value: "CloudAssignedAadServerData": "{\"ZeroTouchConfig\":{\"CloudAssignedTenantUpn\":\"\",\"CloudAssignedTenantDomain\":\"tenant.onmicrosoft.com\"}}"| + | CloudAssignedDeviceName (string, optional) | The name automatically assigned to the computer. This follows the naming pattern convention that can be configured in Intune as part of the Autopilot profile, or can specify an explicit name to use. | + +5. The Autopilot profile must be saved as a JSON file in ASCII or ANSI format. Windows PowerShell defaults to Unicode format, so if you attempt to redirect output of the commands to a file, you must also specify the file format. For example, to save the file in ASCII format using Windows PowerShell, you can create a directory (ex: c:\Autopilot) and save the profile as shown below: + + ``` + Get-AutopilotProfile | ConvertTo-AutopilotConfigurationJSON | Out-File c:\Autopilot\AutopilotConfigurationFile.json -Encoding ASCII + ``` + **IMPORTANT**: The file name must be named **AutopilotConfigurationFile.json** in addition to being encoded as ASCII or ANSI. + + If preferred, you can save the profile to a text file and edit in Notepad. In Notepad, when you choose **Save as** you must select Save as type: **All Files** and choose ANSI from the drop-down list next to **Encoding**. See the following example. + + ![Notepad JSON](images/notepad.png) + + After saving the file, move the file to a location suitable as an SCCM package source. + + >[!IMPORTANT] + >Multiple JSON profile files can be used, but each must be named **AutopilotConfigurationFile.json** in order for OOBE to follow the Autopilot experience. The file also must be encoded as ANSI. Saving the file with Unicode or UTF-8 encoding or saving it with a different file name will cause Windows 10 OOBE to not follow the Autopilot experience. + +### Create a package containing the JSON file + +1. In Configuration Manager, navigate to **\Software Library\Overview\Application Management\Packages** +2. On the ribbon, click **Create Package** +3. In the **Create Package and Program Wizard** enter the following **Package** and **Program Type** details:
+ - Name: **Autopilot for existing devices config** + - Select the **This package contains source files** checkbox + - Source folder: Click **Browse** and specify a UNC path containing the AutopilotConfigurationFile.json file. + - Click **OK** and then click **Next**. + - Program Type: **Do not create a program** +4. Click **Next** twice and then click **Close**. + +### Create a target collection + +>[!NOTE] +>You can also choose to reuse an existing collection + +1. Navigate to **\Assets and Compliance\Overview\Device Collections** +2. On the ribbon, click **Create** and then click **Create Device Collection** +3. In the **Create Device Collection Wizard** enter the following **General** details: + - Name: **Autopilot for existing devices collection** + - Comment: (optional) + - Limiting collection: Click **Browse** and select **All Systems** + + >[!NOTE] + >You can optionally choose to use an alternative collection for the limiting collection. The device to be upgraded must be running the ConfigMgr agent in the collection that you select. + +4. Click **Next**, then enter the following **Membership Rules** details: + - Click **Add Rule** and specify either a direct or query based collection rule to add the target test Windows 7 devices to the new collection. + - For example, if the hostname of the computer to be wiped and reloaded is PC-01 and you wish to use Name as the attribute, click **Add Rule > Direct Rule > (wizard opens) > Next** and then enter **PC-01** next to **Value**. Click **Next** and then choose **PC-01** under **Resources**. See the following examples. + + ![Named resource1](images/pc-01a.png) + ![Named resource2](images/pc-01b.png) + +5. Continue creating the device collection with the default settings: + - Use incremental updates for this collection: not selected + - Schedule a full update on this collection: default + - Click **Next** twice and then click **Close** + +### Create an Autopilot for existing devices Task Sequence + +>[!TIP] +>The next procedure requires a boot image for Windows 10 1803 or later. Review your available boot images in the Configuration Manager conole under **Software Library\Overview\Operating Systems\Boot images** and verify that the **OS Version** is 10.0.17134.1 (Windows 10 version 1803) or later. + +1. In the Configuration Manager console, navigate to **\Software Library\Overview\Operating Systems\Task Sequences** +2. On the Home ribbon, click **Create Task Sequence** +3. Select **Install an existing image package** and then click **Next** +4. In the Create Task Sequence Wizard enter the following details: + - Task sequence name: **Autopilot for existing devices** + - Boot Image: Click **Browse** and select a Windows 10 boot image (1803 or later) + - Click **Next**, and then on the Install Windows page click **Browse** and select a Windows 10 **Image package** and **Image Index**, version 1803 or later. + - Select the **Partition and format the target computer before installing the operating system** checkbox. + - Select or clear **Configure task sequence for use with Bitlocker** checkbox. This is optional. + - Product Key and Server licensing mode: Optionally enter a product key and server licencing mode. + - Randomly generate the local administrator password and disable the account on all support platforms (recommended): Optional. + - Enable the account and specify the local administrator password: Optional. + - Click **Next**, and then on the Configure Network page choose **Join a workgroup** and specify a name (ex: workgroup) next to **Workgroup**. + + >[!IMPORTANT] + >The Autopilot for existing devices task sequence will run the **Prepare Windows for capture** action which calls the System Preparation Tool (syeprep). This action will fail if the target machine is joined to a domain. + +5. Click **Next** and then click **Next** again to accept the default settings on the Install Configuration Manager page. +6. On the State Migration page, enter the following details: + - Clear the **Capture user settings and files** checkbox. + - Clear the **Capture network settings** checkbox. + - Clear the **Capture Microsoft Windows settings** checkbox. + - Click **Next**. + + >[!NOTE] + >The Autopilot for existing devices task sequence will result in an Azure Active Directory Domain (AAD) joined device. The User State Migration Toolkit (USMT) does not support AAD joined devices. + +7. On the Include Updates page, choose one of the three available options. This selection is optional. +8. On the Install applications page, add applications if desired. This is optional. +9. Click **Next**, confirm settings, click **Next** and then click **Close**. +10. Right click on the Autopilot for existing devices task sequence and click **Edit**. +11. In the Task Sequence Editor under the **Install Operating System** group, click the **Apply Windows Settings** action. +12. Click **Add** then click **New Group**. +13. Change the group **Name** from **New Group** to **Autopilot for existing devices config**. +14. Click **Add**, point to **General**, then click **Run Command Line**. +15. Verify that the **Run Command Line** step is nested under the **Autopilot for existing devices config** group. +16. Change the **Name** to **Apply Autopilot for existing devices config file** and paste the following into the **Command line** text box, and then click **Apply**: + ``` + cmd.exe /c xcopy AutopilotConfigurationFile.json %OSDTargetSystemDrive%\windows\provisioning\Autopilot\ /c + ``` + - **AutopilotConfigurationFile.json** must be the name of the JSON file present in the Autopilot for existing devices package created earlier. + +17. In the **Apply Autopilot for existing devices config file** step, select the **Package** checkbox and then click **Browse**. +18. Select the **Autopilot for existing devices config** package created earlier and click **OK**. An example is displayed at the end of this section. +19. Under the **Setup Operating System** group, click the **Setup Windows and Configuration Manager** task. +20. Click **Add** and then click **New Group**. +21. Change **Name** from **New Group** to **Prepare Device for Autopilot** +22. Verify that the **Prepare Device for Autopilot** group is the very last step in the task sequence. Use the **Move Down** button if necessary. +23. With the **Prepare device for Autopilot** group selected, click **Add**, point to **Images** and then click **Prepare ConfigMgr Client for Capture**. +24. Add a second step by clicking **Add**, pointing to **Images**, and clicking **Prepare Windows for Capture**. Use the following settings in this step: + - Automatically build mass storage driver list: **Not selected** + - Do not reset activation flag: **Not selected** + - Shutdown the computer after running this action: **Optional** + + ![Autopilot task sequence](images/ap-ts-1.png) + +25. Click **OK** to close the Task Sequence Editor. + +### Deploy Content to Distribution Points + +Next, ensure that all content required for the task sequence is deployed to distribution points. + +1. Right click on the **Autopilot for existing devices** task sequence and click **Distribute Content**. +2. Click **Next**, **Review the content to distribute** and then click **Next**. +3. On the Specify the content distribution page click **Add** to specify either a **Distribution Point** or **Distribution Point Group**. +4. On the a Add Distribution Points or Add Distribution Point Groups wizard specify content destinations that will allow the JSON file to be retrieved when the task sequence is run. +5. When you are finished specifying content distribution, click **Next** twice then click **Close**. + +### Deploy the OS with Autopilot Task Sequence + +1. Right click on the **Autopilot for existing devices** task sequence and then click **Deploy**. +2. In the Deploy Software Wizard enter the following **General** and **Deployment Settings** details: + - Task Sequence: **Autopilot for existing devices**. + - Collection: Click **Browse** and then select **Autopilot for existing devices collection** (or another collection you prefer). + - Click **Next** to specify **Deployment Settings**. + - Action: **Install**. + - Purpose: **Available**. You can optionally select **Required** instead of **Available**. This is not recommended during the test owing to the potential impact of inadvertent configurations. + - Make available to the following: **Only Configuration Manager Clients**. Note: Choose the option here that is relevant for the context of your test. If the target client does not have the Configuration Manager agent or Windows installed, you will need to select an option that includes PXE or Boot Media. + - Click **Next** to specify **Scheduling** details. + - Schedule when this deployment will become available: Optional + - Schedule when this deployment will expire: Optional + - Click **Next** to specify **User Experience** details. + - Show Task Sequence progress: Selected. + - Software Installation: Not selected. + - System restart (if required to complete the installation): Not selected. + - Commit changed at deadline or during a maintenance windows (requires restart): Optional. + - Allow task sequence to be run for client on the Internet: Optional + - Click **Next** to specify **Alerts** details. + - Create a deployment alert when the threshold is higher than the following: Optional. + - Click **Next** to specify **Distribution Points** details. + - Deployment options: **Download content locally when needed by the running task sequence**. + - When no local distribution point is available use a remote distribution point: Optional. + - Allow clients to use distribution points from the default site boundary group: Optional. + - Click **Next**, confirm settings, click **Next**, and then click **Close**. + +### Complete the client installation process + +1. Open the Software Center on the target Windows 7 client computer. You can do this by clicking Start and then typing **software** in the search box, or by typing the following at a Windows PowerShell or command prompt: + + ``` + C:\Windows\CCM\SCClient.exe + ``` + +2. In the software library, select **Autopilot for existing devices** and click **Install**. See the following example: + + ![Named resource2](images/sc.png) + ![Named resource2](images/sc1.png) + +The Task Sequence will download content, reboot, format the drives and install Windows 10. The device will then proceed to be prepared for Autopilot. Once the task sequence has completed the device will boot into OOBE and provide an Autopilot experience. + + + +### Register the device for Windows Autopilot + +Devices provisioned through Autopilot will only receive the guided OOBE Autopilot experience on first boot. There is currently no automatic registration into Windows Autopilot. Therefore, once updated to Windows 10, the device should be registered to ensure a continued Autopilot experience in the event of PC reset. \ No newline at end of file diff --git a/windows/deployment/windows-autopilot/self-deploying.md b/windows/deployment/windows-autopilot/self-deploying.md index 01d3e5e846..59087c0cd6 100644 --- a/windows/deployment/windows-autopilot/self-deploying.md +++ b/windows/deployment/windows-autopilot/self-deploying.md @@ -9,13 +9,8 @@ ms.sitesec: library ms.pagetype: ms.localizationpriority: medium author: greg-lindsay -<<<<<<< HEAD ms.author: greg-lindsay ms.date: 10/02/2018 -======= -ms.author: greglin -ms.date: 06/01/2018 ->>>>>>> 01422d156afc7ab2286b8769aee1c4c39351a5f6 --- # Windows Autopilot Self-Deploying mode (Preview) diff --git a/windows/deployment/windows-autopilot/user-driven-aad.md b/windows/deployment/windows-autopilot/user-driven-aad.md index accd62e4b6..6da9e99b33 100644 --- a/windows/deployment/windows-autopilot/user-driven-aad.md +++ b/windows/deployment/windows-autopilot/user-driven-aad.md @@ -16,8 +16,4 @@ ms.date: 10/02/2018 **Applies to: Windows 10** -<<<<<<< HEAD PLACEHOLDER. This topic is a placeholder for the AAD-specific instuctions currently in user-driven.md. -======= -Placeholder. Content coming. ->>>>>>> 01422d156afc7ab2286b8769aee1c4c39351a5f6 diff --git a/windows/deployment/windows-autopilot/user-driven.md b/windows/deployment/windows-autopilot/user-driven.md index 16e789f551..d12042b321 100644 --- a/windows/deployment/windows-autopilot/user-driven.md +++ b/windows/deployment/windows-autopilot/user-driven.md @@ -8,19 +8,11 @@ ms.localizationpriority: medium ms.sitesec: library ms.pagetype: deploy author: greg-lindsay -<<<<<<< HEAD +ms.date: 10/02/2018 ms.author: greg-lindsay ms.date: 10/02/2018 -======= -ms.author: greglin -ms.date: 06/01/2018 ->>>>>>> 01422d156afc7ab2286b8769aee1c4c39351a5f6 --- -# Windows Autopilot User-Driven Mode - -**Applies to: Windows 10 version 1703 and above** - Windows Autopilot user-driven mode is designed to enable new Windows 10 devices to be transformed from their initial state, directly from the factory, into a ready-to-use state without requiring that IT personnel ever touch the device. The process is designed to be simple so that anyone can complete it, enabling devices to be shipped or distributed to the end user directly with simple instructions: - Unbox the device, plug it in, and turn it on. diff --git a/windows/deployment/windows-autopilot/windows-autopilot-requirements-licensing.md b/windows/deployment/windows-autopilot/windows-autopilot-requirements-licensing.md index bb2dc47141..a9eb506a51 100644 --- a/windows/deployment/windows-autopilot/windows-autopilot-requirements-licensing.md +++ b/windows/deployment/windows-autopilot/windows-autopilot-requirements-licensing.md @@ -8,14 +8,10 @@ ms.localizationpriority: high ms.sitesec: library ms.pagetype: deploy author: greg-lindsay -<<<<<<< HEAD ms.author: greg-lindsay ms.date: 10/02/2018 -======= -ms.author: greglin -ms.date: 06/01/2018 ->>>>>>> 01422d156afc7ab2286b8769aee1c4c39351a5f6 ---- +ms.author: greg-lindsay +ms.date: 10/02/2018 # Windows Autopilot licensing requirements diff --git a/windows/deployment/windows-autopilot/windows-autopilot-requirements-network.md b/windows/deployment/windows-autopilot/windows-autopilot-requirements-network.md index 952a30d8a5..2344d56268 100644 --- a/windows/deployment/windows-autopilot/windows-autopilot-requirements-network.md +++ b/windows/deployment/windows-autopilot/windows-autopilot-requirements-network.md @@ -8,13 +8,8 @@ ms.localizationpriority: high ms.sitesec: library ms.pagetype: deploy author: greg-lindsay -<<<<<<< HEAD ms.author: greg-lindsay ms.date: 10/02/2018 -======= -ms.author: greglin -ms.date: 06/01/2018 ->>>>>>> 01422d156afc7ab2286b8769aee1c4c39351a5f6 --- # Windows Autopilot networking requirements diff --git a/windows/deployment/windows-autopilot/windows-autopilot-reset-local.md b/windows/deployment/windows-autopilot/windows-autopilot-reset-local.md index 49ead2803e..c97d79add8 100644 --- a/windows/deployment/windows-autopilot/windows-autopilot-reset-local.md +++ b/windows/deployment/windows-autopilot/windows-autopilot-reset-local.md @@ -9,13 +9,8 @@ ms.sitesec: library ms.pagetype: ms.localizationpriority: medium author: greg-lindsay -<<<<<<< HEAD ms.author: greg-lindsay ms.date: 10/02/2018 -======= -ms.author: greglin -ms.date: 06/01/2018 ->>>>>>> 01422d156afc7ab2286b8769aee1c4c39351a5f6 --- # Reset devices with local Windows Autopilot Reset diff --git a/windows/deployment/windows-autopilot/windows-autopilot-reset-remote.md b/windows/deployment/windows-autopilot/windows-autopilot-reset-remote.md index 6cc308819d..1f7cca216f 100644 --- a/windows/deployment/windows-autopilot/windows-autopilot-reset-remote.md +++ b/windows/deployment/windows-autopilot/windows-autopilot-reset-remote.md @@ -9,13 +9,8 @@ ms.sitesec: library ms.pagetype: ms.localizationpriority: medium author: greg-lindsay -<<<<<<< HEAD ms.author: greg-lindsay ms.date: 10/02/2018 -======= -ms.author: greglin -ms.date: 06/01/2018 ->>>>>>> 01422d156afc7ab2286b8769aee1c4c39351a5f6 --- # Reset devices with remote Windows Autopilot Reset (Preview) diff --git a/windows/deployment/windows-autopilot/windows-autopilot-reset.md b/windows/deployment/windows-autopilot/windows-autopilot-reset.md index e4a54425ee..9e83d32bbb 100644 --- a/windows/deployment/windows-autopilot/windows-autopilot-reset.md +++ b/windows/deployment/windows-autopilot/windows-autopilot-reset.md @@ -9,13 +9,8 @@ ms.sitesec: library ms.pagetype: ms.localizationpriority: medium author: greg-lindsay -<<<<<<< HEAD ms.author: greg-lindsay ms.date: 10/02/2018 -======= -ms.author: greglin -ms.date: 06/01/2018 ->>>>>>> 01422d156afc7ab2286b8769aee1c4c39351a5f6 --- # Windows Autopilot Reset diff --git a/windows/deployment/windows-autopilot/windows-autopilot-scenarios.md b/windows/deployment/windows-autopilot/windows-autopilot-scenarios.md index f9cb365d54..2b0a3d2ac3 100644 --- a/windows/deployment/windows-autopilot/windows-autopilot-scenarios.md +++ b/windows/deployment/windows-autopilot/windows-autopilot-scenarios.md @@ -8,13 +8,8 @@ ms.localizationpriority: medium ms.sitesec: library ms.pagetype: deploy author: greg-lindsay -<<<<<<< HEAD ms.author: greg-lindsay ms.date: 10/02/2018 -======= -ms.author: greglin -ms.date: 06/01/2018 ->>>>>>> 01422d156afc7ab2286b8769aee1c4c39351a5f6 --- # Windows Autopilot scenarios From 873f0718d213d4cd23128c221974d314ab2d987d Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Fri, 19 Oct 2018 13:47:28 -0700 Subject: [PATCH 06/25] clarify steps for powerbi settings --- .../images/atp-settings-powerbi.png | Bin 0 -> 78242 bytes ...ndows-defender-advanced-threat-protection.md | 8 ++++++-- 2 files changed, 6 insertions(+), 2 deletions(-) create mode 100644 windows/security/threat-protection/windows-defender-atp/images/atp-settings-powerbi.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-settings-powerbi.png b/windows/security/threat-protection/windows-defender-atp/images/atp-settings-powerbi.png new file mode 100644 index 0000000000000000000000000000000000000000..68d57863d921772913a89fc7f20eba5bc9d28d4a GIT binary patch literal 78242 zcmd43byQr-^Dl}72*Cm*NU-1`xH|-Q2of9ycXyW%+}$A%B)Gc_?l8E+;O_3c$@w16 z`Tp)(_pZ0@U$57iVW{1^yLMG|Rdx5LckowPF_bqS-atV?p-6}eD?mZPVL(B_{Co`$ zp=`hM6@>gjv=LXchk`=w`tyN~r$)tt5D^?CWJD0w-eA6?L%b@NT>6V7qUs>v=wM=P z2USoyBn}}VJ3vUnhW7e)rZx_y)>crMh{U82`kOy=A!{2~J5ys52dHASAub3N^)ITO zq3)lmA013B4WU@C(GVe55dU0Jv^H{Z*0nQ)(z1E}QyuBA#!c<@Ep#DO?V#$~sv{xf z*MG<=x^`BkR>n|mcw2!G8p40>ceK+tgt~n8+kdGhWNm3_XypKPHIx8^(BS`6Q!;h1 zFogPjG)@Tx^$|)!SU|}o?O@5<19bWHe2RCjZ(c<-#8#C|v@lDCgw7QEDNTV(QW*U* zJR+OxhvMGKEaxt}XSF1L0yDY1q7n{z7BSvJIb#)|b}o`l-`)Fpw#R+Joxi0n>;BTt z6+qVv0L`3Vy0m1J9X`&lKR%3oVrHK333@5wX)qun>xibc zCX4hf`roC2ip6RNO8BL0+~o^rzcdr1BoQq9QW3o%1|#^TIT8hOatx7|n{p&&K5#+( zTTyd+BzGO;b6l11oNdvRwzP3!bPw9LnzHghhSd!tCLPN{$@PTc`jwTHsqKY^hUy>A*WhzG?4<0;lgPjDzQMI} za4=MFyS_73q>?`Ay)#P8cYnYf6BA=r1H{t!=b=n>o}QkD(m1O|VuGL`j2Yiu>|Pu# zH7VblNBkqBXm~wc-S!}KQXEFTSG4NYzt7hlcSd~~^?P&-4Z9-CBXBO)bm)E%*jkSJYQC3vC5REKP89fFB#{Z@u5j9)0il z9uVfetLav+!ch5^1&}Rmpqd1?vwY!DS}3wRY_&@-wz+18mfVY zb6L7emd$wFesXf(9V~*59(}hC5nHSrpBlYAiE{6+NIuE^>5?Lv7wcK%nZNdTH^N5I zFOBHIvbi2y!Tp-A8ypmbgU4=#pOBD%LeTTRZqW`&F<-W%GA)2D^pE!YhJQggUDK%Y z#OL+}16I3G8F2O}=pfzcwYXhoyI&vGEH)vQSmS*;jzCpqw~i3e|5@%6ifu2>-w>G| zs93K#n8NLRB>m+J)IyzgS$UWn*>r=h1&=*?=caT7-DUB*J{-CsgN`_&z90e7Zr;}Q zXN~OGz7~r%oqFlD=`j=n`3l4zxi}0s*{{uZzFLWPve|8A`wk|H6`T`&gV;g=UIz5& zZN?k6MvTj{QXFlE5*I*O)BdM&GaI+Cw&QE`)Fgos5mr#Uz{d>akCdvT(DQuSN=jpU9xGZM^ z@Xn4sjbny%WW5-8cv2Q;aCGdIJq`Ohg!r7VkIi>>X7lBUtQvCHv>&&m$gZr#x{yI@ zDq;za4D-`jC_v4*t$upal5jTlDvP}-OLVzvCJk{`M)PMlWO!KYD^Ov5l=15dc-VkJ z`B!sFN+yhf_9!^W#)t%}*wIhP?B);b;Kd;z<-*nDznDVM0bKcsjq(?6%!s_aq_pX7 zKFnZqOljm5|1eZ$?JRqP$K^7}I?PjpD4@AI&fgJVloK}5_9I_>+OIt%Y7#rrrZYpG zk?x|FJcV^cfc_S}5nhazMyz$2x>uNJnee&ow|nktW_R)U%4ETvWUc1qUyQ4vfoB2^ z&}7F3qIK?S?=U*D-J2NojhWsFpSO>8|6o6A-)|au>jrDM9N_OYcut_G##~O2{y=0b z-{(|o4d^L$Z(5t(W{qIQ8(3(^Qu2&BEj_08{2jDKO*v>@ySUVS_)T?}(3Rm++1P2CrsmqICaoK0oG(dg9=) zg59mA-0b`LXoH6*4S{;KexHWeYvxXb^B-0bs!+yg&7xN|VqW&RSOayKO`|0A31z)p z6N~fpyax^DtFp5BTWk(-j@jnMXla%ydh&?~70H6L!Su;13n5ac_ctaAlm{j1nk~l~ zs=D4Yp&kU$!m?UDx*@$K)#eK!8fIhX+QP!62y9`EXXPGS)82(AL7e_ z@?E8ftjY|_gsrWui;Ih;trSU4L*Nd06`|_axQ8cSnV#>gTR}@mkjcw~MC9^r8)00# z9^b0=o=Togi}37BL>N0$DC(?s`FKC~of{Q4F#t@vDtRdH*36(0b>+@hw)+ihjn2<` zyxk%cj)&(fbWe}!a90cjWG{LbHPwNA zP19n2tD?exlwMQ(dq$~`ByV}){q{6k)svu@(NRcq={BO1n+2zCAW6_{ov*25LYS$N z%KJoSnhOnzMvC&aqXid6e8>pT^_>rO`X<%!5a(^1|X^#?2vfZ*3#G!&jjNc#2cR}CF6>~PV=`yV8!WDIqb^rnh+^J7U zvl!{(3G%l$C-F*ryy+;9##SGB_%8Rz+7j*iCBuvczdz-UIP2`FL1GY6}U$FWi#L)7vrzI_L^-Z z5(6;}9OOZEhkHWN--Ar;=X_S}$fO1>>6b|hcWz=^pzv|aE6FlGeGjl)O>6gA?eO}X zqE=&aG^OdqZVO02<%r8~R1?~>GP+0-tjUy+nw;`fvrAV&Z9{J}KZ|dW9DMZp)M_o| z6&b%+w|RVCI4>Y9JTzd0SVVLzzUSuck@5TIw$jxM&$uN#w|%pV-lHQ|mxJmj;N!J~ z$KlU{dtQ%nOa3ZpxD?lLZz;{+`9Kkigp*8xk*+|#j<_|nC)}mQKAwsUXPI~2&X0&p zOO1@MJ~nwg7?REBAD!S2?n;Ns9%>}aNmW#!})27bbS|6cqLt}ak=#6kb=Z9 z&wQq|W??LkN~V9iBiJl~-`3Y7W&GlU*OH5iOOgkG7bDyNApjFiwf;Km;9XFasJpHd zg)Ml*=rCAG`bslx2EiHW6Gv6xOyN>i3A2X2mtHNvek3!5glUUrE}X!GUxyBynnc}Y zG{C0kl`{BNPAtWs2NM@pLg|5M_C|VTaJ|!1_YB9Yx$*fGcS2Z>yE%2`hzJIxf`JEx z3_dR|lQRNkN1i6J8Djg0oMwJb2%+luNPJTc(UPqOflx$gTE zIhk}^Mw(pJCi@aVuc;QkDfE$?5=yGJ7+E1nvCZo}FWG~n!6;NG1MEy^kG%JEOTA}c zQe72FCqB2dzCLl;ybb6m+uEBCA{i^!_0;hd&t0fnsJlK|R}IuNqXW6z`p+7tqkAJ7 z`ZuPvM8lv=lFv*5RdeCCCj34P;A11(Ijx89L1DM_`b~AY-MR1dNJxWuq6JConp{0+ zfI9|fQg(Qv0coFGr^7kDKgaa-;V95?u5cRAfr*ei98kw2a)G6~->s=rpjm2vRw}JF zqEr|_l|Bg+7k@%jr>ln!^=&jR$F$w=lnf)uXn>Ey@Q*F3Yr!F#47XIWuU3|A(99-pwP z?roy}U}}CG9cHEi;#U#Z^ak!xB9$mjjTP?8S4hj-KboIJp&^kvw zxgz~$z+35u(|U)4)%wfjo@>Z9?8#kDa~-%fa@FeM>e-KYUmC{DYV2yXRzvV<|HE|| z1?Z=|Lq&C){)M$lYfkEXH_Spts0-H6$pC2LRV}$zkIgAE-k>8heoqfGHlwC& zBNxc&hSUQm!~5}1qL0hX-DE!76kTxHC2c-_lX5?+Qe9Y$5!|DffDsL)>h{&`O&4O= zNx6SBhu7;L-@rZ561N$lRY#|77(r-g#ZM1z1ovZ<_O!5CkgWBxdu9-&ZrdqF6KZ;? z=cM42GHjTp_L&=M+lW)R?1Q-Z_SFs6u|9a4wIh{dU2pBJ7d3DtK0`Lj!)NABb$xuf z&IEWhQcYMNvV)J52H!k<6m!sC7#S=Lm&WVbJn6SVb97q1@o;-iQ7V5rdQ2TU!~;45 zy6I}Y?QP_{s&{=)P}LI3dZeFtZi#Oc-@+X2&^BJXK80oo`Y5Qq8?2~JvrlLhZhz`p z=WI1x#U0yj3Kc3C%0C5eAOZjY+Wg9sc2udMWzom!(o4`Q5?}kMFB}F)ot8RP$~@hT z)%lxZ4bpJRKTUSoTt{5&$M(v3$jV)NFj+YKk^)1 zS&3Z#uy#+=;2&yy$E_(tYsN<$7b#ZP%XAA>rqwX5T|aldy1s*7+(Jl6*4On*G88(@ zPHuHyBHd){H+s1Gy$WC1c9Y-j{fNPv;+CXxQs4UWXNH^*Rx64hUPC)q31mbr;e6!V z>ze_dnUTRG6+Qc>Z^MM}u0$7^iOsOKY*O? zwnf8DCi_xD3O%=yj%o0wpi zqlVcj2OT&k-2R)W?C{IjLaF7mS<2#+zf>TR(WuZi$hq=S;t_WoEC(*vIYF z4HeO2Pp2>`I;~_)di0t1czHkgWD}cz6{~%9+znuBC_+kH^I91oQ?^7{Umk!-nOo7c zdi9figl)Jj`~8t$*~k*^jnJaZC?rSMsF5Yh+pvw^n*HYdyRwd8xItW7@(@)8_naJ~ zMdKVSHjf3IKZ&#L_!SR(tTi{CaP5YB&28GFcnw&(0t=wrzTZJz=1+M&yT;hDBX{hp zzq9cg&iJYls+49(p;1L!f@#GpvUx9fyGbmg&E;tI;OD9Zj~Z0{m}Sq@wdJzc8-Djb z?#47i!@#^BK!LV#QiFt|XV(P&QA8<>+ueTcX8EnborBEGpS{4&{;m&TF{!6nKzE&O z@}^3D1_KP*0uKfnA?16Gd1RKoG7dwi(uAJSp~VnC-l*6CU#4E^Cl5kjZicdNy%GrJ zPFXos>p$d(x&|wK>PG`zHq6(HzVVnk5^~&0m)gW1DNuL}_-QA+>+(MvB?TllUd;(~ zs%a_V#>yyRJui{wQYMa|>fQ9L>0b1p@T~H}yQ+R!ljE6t=9L^4OnPLEO#8DegL!%y4M)96hEnxN?` zHl;j3IUY;orj9jQHGCtqhT7F{+-OB9n0<>3qde|FIZy{t%kd&U+e8-tm`_PDT`+stprzP zxr;ye&;sn00fW5JW5MnQx_K{D3jJmTuchwfwM4?mMS+D?%6~L_51q+%o|rZz4@FBWV-9VYdSx7S-p8O>xT>u_she`$fXrXsxy;49o(g8 z+&5w!qLt5W`@6Cn*4e4@m#G(>=K(y}~ zI@Y7%lHD}c%4;!nk06|ksJ&v*;4g@p1otV_nzXN zDNUBC%1&)4_sMqj6JxHZB7Hj;Awj{UFc&C32#>FY^EG@=Ozt3z^lg)VOz`b~C8v@S zF5Tv5ZcxD)ibpO&uD?7i8vX>L*vHj6|0IjTlgqBW1W)FuCNA~1+t&%HZg=zeVpuw> zqsj7yb%unSz;DP6wDifKUdQe+Pa2}b&`lVpY9fY2t!>OX4JVA=wx&;SEF1a}I)`o5 zeBe;iLrGKFf5;|8VOJy+iUPD!Ih>R)I=?D1Dyn+Zls%jnrOq_e#gdaf^#BVsTbD2) z;-CziVCC`fTul6i*jz-4l}4%8P>?a3N@Zq*z?IkpJv@s_LZVP$R99VKBmp?EJnQ2I z;SPSR1ul=2u4IzuJ0o^qJ|k95dQYRk z90SwFYjC9f>QG42Zp%$0h(xb)$>$)JT2;9n`<$X~Y4neo6n1w5YB`&3F~j)Uo(ByE@^bxagHY7v3Y(IVd$#}N}P>}l2UNM z862d2(xHfS)k71VsiG{gfaYQ(9_->_4v2qOQluAX%-V`_pr(YIPGOLoR+ncGjn!lq zuk|r61qm0tYXJK$%C!(adB>Nayar1Ba-CH1d>4me9d2bbh0pL>hQB{?ieJIBKl5BV z6Lq#Ja`TsGet)G+-t~S{5K{`WwGM(th~RzSg(klUb<)ac<0mFiM6D`JGHYYIIWcoQ zEbHN|N|uH814T+RQ)jBBHZV~(;ccCL;cku%6}N;moWaX`drCH0lgsm%cYge-+0MSY(hA~OVe@ej%Bq4;Z*WIpvkkR z!s6bkHn2Gi2(pV%tLeBJayx2#OwPVeWPgXHbPVMWSAIy#QJZTe zw-KWG=1o>|`dAl{apiB>H|GioV>j>QxKrfC1xn{&i|s|IgTWmY><^~}w}s>=UBXRM zJt&J-B;)0kSH~0-zuu;zLWk9FJ89AkzAJZFy>b_QJK7#FXc~R6ocWE?R>?V~hd=tu zv${SfM zv`0F0J~*NoZ${hx?Pjh!wnbiq6NeLA!i-Dk>zfwU^LSHgMhgcqb!bG!qEN7@z(ihK z_jy-_blw_hSDK`Vv9wY|-Y_kaSHg~*=q`Dxpcp2jw)P7JC+lv)mch3Rp)|*c^;6t; z%Bm-?#tgv&z^@W^4Jk4F+sS;H=aIWWn~Nnr7v9>CZe}ZeCpHeX_m6JMS_5ll6BwGTko$+(ArZ>_n4^s=cp|$qRgRRU@BG*@0)bg-VSDPPBnDwb2{ph z!{RU4-Shm`6YN&lTW>8+!xR}#>uy*-Rr-}&#^el1uYx4F^8ztEH*BA3$0MCHe;@3c z<77=dmIt}SQq9a^^U~7ilwYUTN%3oDe`w_(XYCAlA}XUSFlq>ayJc=f7CHNbuTIZiLRUh{pwZHd@p8^sLt4c$vx(h z&4`p${51u30wUpM2!m0*~Jwe+h$K;`S1h&+OMet05j0QC)8jyG~vmsE1 zGW4EY_Q+1ZHZ>?o#K>ri^+Hm5yKWd9!@Q$yWq;K16QQLKbnn+J1^-`NYy5o z9|P^|vG#X19P_>pWQhrAT;3=l;aw|Oi$|Y_p4h$(+yvnErhA>C{R;OkKl=)AORm+V zH~>0R0YgHNz8A=<{yN#&kbG+r)0}Ebj>d=z9r4$x&81<=HVv1Xs-OUi`@TiY$~SyD zKtGfi-aINyEbd3Srn909$k=$8q~mx`FQ|9dP>xc^0(*8=&lN)+;QjCclyoJ6_)RXA z+lJJawtH^!pv`8D(tVXn=grWbUy%r0=#W9CK{vCf>M1e@Z>{gr;Im-<5$Jqsn`nHM zk(oDlo`#}46X{(S23t!`{8da0Up!p|?vKl>&0uqU+6s2^^a3sX{@45A$2H2zzUjdQ z(pPp}%QNuOs1cv6DE0UC>c2qA-sY>WEoA=W3NAM5KVA~rxuBtNFcSjGw|!Q{wugpE z>*KF^1%CP_rmV2svn#tYPcdepcqBNL>x>wYB6qwj(wPbiL|)5?z}g_t01WeYRo-rw zRfO$N5|#l=yR5G;r(`Q3_kctS{{C7^xdb=hI)81&AyNFn%_v(f zufrt}Zj8ttwpd;vWILPKWs_jbUlMa+CjXBc7$?1EKzjX3)Vn4XbZ=C-MrSSUTzoH&sY0A*;GVnG zf{X-Oy~aDJo0O-#q=$sLKa)QQFv@sV-nLYB7s{zLfE|S`@PY-%d?d6dfwfo9SWrC==jn z3EWSkC9VOqMLSuPd%wP$Hz|CtuESyLW0`16Q@TgeYZ!|*IzH1S3GBpKto7Pf_jGV(yNwP51M~W|%MZ??YmCHlKU>RKHU3gDxc;d9i37C-aXX^! zQg8w@>qj4-g27wMnNN$cwTwkMf!?~%_>b_lbU#*tRR9{;9nocYWWleac=a)R&)x)S zICF=8V9l2QB}&7s{AJ5`PUQ)($9fNy4A-lweD=IBgRT zgv_g@Kcga8fB3m4^cB~ersx3es10DD_ zzo=#P&RJH!k|UF5nT7QHeLM43zDZ4NJ+4k$kgrN3GG>*M&N_%USoe!Y*Tx(l+$ zDvG)qb^H<1&DZl&~7-*T?@LZ~XX^Ee#I$D`ZFZ*S&m2-wqsT!l`>5>`| zP6up{$}dOHJM(k6?``XcBVUn*mSw}Ij8|`HG;#0dKyh;@sZT^Fg9jP2*ktE}z(Ja| zN_|>Nh4#u}oPZ{cs1GgkCaraA!i7cj`tzJAss=_dWeK+oa3>CRSyWLOm33GuZAq9y zTNW!O2XfLUl@ye2aMyPT@gd$Ja;;3xz5%!8>J)^^I09+3a0)c+Bet>D*$ZO< zRSvwO8WzV*3XAZqodC{7aK*vg!sxRf3i2rwliu7{CTaa%2f<(GZJSnn_pV%6I?u-<*Fzv0jzWP}A(`42IDbh}2m0&`M%4`cX@Td)gcSrx4bP=EZXHd|eOkTc; zVm;-A(V3HLo%4Vfb!}Lv>@m`Ep|-+u;o0So812kkZRm@N9O3O9yp-jEW?y2o_sYRF zi&UMZ{=#_vsr{2*A3b(uRhE8{MGc97>DsddoK(i-VYsW23Ceak)!VPIN%DYQD zya}zh%f! ze`4UBDaQz=c#pCVCx%auwKAkVp#_5V{z!+WUSkF~wG-_;%!aldKk8yfleTkxgv+${ z3j)FTNWvBzM=xeO*uIp;(6I1Y8GjHa->cc3BCu;VsObJMNpuEF4PV2S-fy4;qbkID zovFPY*Ld)(g((!HfY8O|i`ho6AyzVO+q%88EgxkxVr%B!(G%Q&b-H7!%|O4>4{PGwjPmuQ`Q;EK$&u5S(?5(bq&o4S%fYmRptz-__0YP*=Zo@T@Mk% z^C#dx1qYWR7UM8Be+X^V@^&hFNSmStn(Q!`l~^+HMXO@J5L@?=tHt5`k-CYElNs{8y3&It*x)iAS_7X1I`)JA4or|T9Bqu z@s;vCw9D#^BURX+xA*oUSZ{08+n7-jgO|uXH&#NdAG06{|Lzfv z8#SH0XcUz_Gke|9%(DF!4B4cp$mSIOtfLzoo=)IIPM^B<&M2MSZd*+H%&EKcIsDC5 z+#rQX6s0pggqJ=kSeZE+IyQ|YZD`?j5N{s*v{9K7$bSR@VNCGzEJacc$hd# zK^rQ@GumIh)zI}uIa*I({ecIK#kW8Vb!VlG%f3w2Lmn0;@t}_NouETS3-M(RU!SEcm{gcLA zCX16STRaG|y(2e#;63r?{6X3ut`AT6_1vF=Wf9$)gvjX#*(0cYl? zbW?m-ha_J|rP?|!zZcJXFGz1LI=lNwGJpfT16j7&vOU|7P*5}YGj+b^y0zBhveF`z6R8 zKGt)c7=nT*_`Ck8x1v61+|5<=^!WfWbtVCtT+2dX!nB$Ux=Pif$aN30ei{OJU2!kA z9$lU6Q`=c)+kgYX&#B*GlA-H<%rdUCzaLwz#x*Ono?)m>L(1K^hOQ>?BK07-KQ)`3 zX`U=27^dIU)issSKET2nzI&DN#$aUhN_A^fUS}>YG~fArt1m{|ik%`g!gJTq^ZQ|U za4lY+>BZn;6s$(?LP>BKL1JK1)lhkUwMI^>#C{;qhvr=v(dZ&%oCv zp23)@KwW?(*APoX`s%Mno#ZQ|eQ%C$hf7X}^WBw(gVI(LqekfH%r0KHZ+U3m1fiss zl0k5(EMfd280c-u)f?hhfyyjj9GJ82NhM_MOJ{zYl^K{Es4gRN3wn&heP}>6Tz!7( z?Z_%+X^awnh-O&EHRn;f>S5ih3b(ko(-jKTg%>@nWrw~$x;|fASP0oB@=V=6I*#z{ zSWeAb67KS7z1>PRORxwmYaxf5Gv-uXkate>Ubj$&9@cQk(L!;$Kdb|PUNmaG)QF+O zNY)&0sE7iGyKClc+mg(Ek6U{-qR?iVcL@eh(5)pYK7gwO)Hr2?b80Q}elX_e^BUl< zJm*cGY8F7CaCr}=5KJjCkC(f6F8Oi;_6fIVabl3bxWjpcI-magIjeKCMn~xyc!k()n;cj>rGuM zee}(_sfTx|&O(9x;;oYi_ZEX=^3w@cG~Td61X*|+Nfl!0;k=$07Z4u)txKnjGCc_i zyB}vJ&mE-%2?UnAIQ!AdfVe;$Wux0|AVM45Ues9PGT{|fS_to z2qdZaA1^S8ydP|H4Tok(<%KuoHsKoCytA_W{sUBw#*_B);^TiffrVgre?f3CCYT;P5WP@b2NOp*W(@hezNMYtXN z5cvK9%l;|i;TL;Tp$LR7P!Ozh)nsB^To+}gN5?Vn*-Pf~_rDDHIT}1aJsyC8M34fH z@TuMs+c)8_Zp)PX0H!_u+?!TBS6^e$S0YpV1pl09vd`bw|v3G1N zI)PRr1(LEPh^ni906t!&&cy`w#EHLqK}t77ynpx31|oJY3Djxfb$H&!|F8=AUVQss z^`bxjmsUu=Df|n`7A~CZTUuHg9Tk|2pU9VEcX<65konISJKW{JJ^i0r$oaoPvHzFq z#N+=zvikq;j%0=u2Gfyl-Q)r4Nx79YS3|h{i+~}8wVBCKTN2;qIFi{=vA;UNVz zK4UbZ6^975&k(fv--Ve$j^wnp?q=g~xtc}F(DWd6wHE+{{Q5`FdhlBkWM1sC`4~fU zq+|bsC6g&gT==^b#QYaR|9>$DCJ=tGGu_6%h^MJ;!a(ILvoV>yH{<`>N3C6N{~WGH zm6DOaJ9U*3**_c@Wp^vToDmStkxYR&rI%9pKXl&DV^5}D_iNkI($pwn;EdD#1}fkF z|0Uw%3gG&r>JL1>(j$hRoSt;%jU*&hl518 zJJTkwOmj49JFvRQ_wVSo(o?s{CC&*%zuAEzOuIx}AjJ>|(dH!Auue};tFlp% z@v{eR)bo1Ot=4gI+@Q13d88m5W%P}I)T)z&#{w-7b6!wqTFE~e>%PISH(AOm<+e%WVx&Eso%nG4mcV@%2j6;S}bxn=0GlS znB{ovdq>j!TCwQq@tQRz)Xrp}RlVz<6AFKo=zYlHlS>-2U7#vvJVL@UPX*2FhK&va zy*FX7FBdOT3D=#&Ec$>uZl44d>TFX#N0tL!{orXCVIhs zvGko8nV_Ne+-)`*POI+b(O<7$d? zh@TXTy}lpBR~{mgmGCOH#0GezLK(azivB`TTYuN6>z%70H?Jp$2>`@Q_%s{n$>zm? zhoU1gWK|R1neQ4_%drxu4g4se4({_eQg(tMSz=Pt2K*NdvRmC#v1N@;bWd2M0U@v0 zT3M1s7GfKu<3Y)9Fxf`*_kcjsr&N*V$qM>R=}(g6d^dZa313ONp&PArv=k}JmmV*37rDTf zUVW-=i0?0wbo)3h3R46?B`xeu=ea(f^j8fO+oZQeS`Qno&X+VdjMaW$w_d4X2NLsvVo=dqMw;vq@D4L&FPzO? zpH-UFGt>Vz(Y{RoE%9P&)K1rPe&*fn$yaAm8EYB~m;yFT|Sy}{$gU@(TWPWV%Y$z|)a@-xtC!`LW=?R{ls`RKl0-LHsrnpcLj`EA|IFB`rtwzmYaDb4=FCVy6?RXko5>9!u-5o`##f( zQ;c|Ik@wO6O#qBvXQ%$|HZs}adXe2+!`*b4mHt!v$(yY&2UizME^P4QvZor!ocQby z^kMe?D?ArO&1&*+KKnT;ICELwH8>g5@qM<~TxKXd{&oiF&~f4x9H=cg*IRCEbgAv0 z%cv|=LzIW&3{|2ix@#KzdQ6%1W(d)@K7st0pS3O;_#e5rp-j_0r=}NK4}0LS6vV_U z;WyjVAoP)tPrGy`TJXjpR>Q0tY{ zS5OzFH*v2CRvl1RRz!}MzY+Ch75ML>wDg`~1El)++xLtE&mBZ0)L$O4AP!5TLAD+> zqd%lw|HgI|dCS}L`(jXh^Me8cpZEFRz+fWXdzh%kOG7tH%X-z}LFib{wlE7im}(0# zuz4Xk)p*%6P_#;Wb;7S7A33Aj4^Z7z1s39AJ)g6)mws{6L8g*q+A5m3JlEbFbCH{K z@8xr>00S|ZfmJ_;`m{Av0E-7jD*94oW?0SIYAm@izGGACqoMiy^8RC zF6h@eQ3Kr?MsYa2w^aRvzm*-?P)i=#FwtCkFs4pS^nlw-VFvraKXZQv}V$|o5a-wU+Z>S8s z7tc40s3r$JC68h7i*9m8sxwAW-f>a>S>GmOWd*+%V9;^QLK#F?mc=Z&*X6-|apDU8 z)}_Jj#yky#4X4_e+;YCH?1+`2yvVJ4UF1rLUN4;m{gac8{YEL~B};LX3GQ-xKiJb& z5Qf7Q?Mlsl>Moc(ygTM`y~-TsP8!DYVSVSB1r(q1X3STDxp&o4O?>Z)9f$pq`6{l& z&mkLlAGQ07P-k2tuW@ck0HL?1jnk=&RZ=uBKT$&3ZFL@_FLGnSIRfV!pjLC~)XVja z9|4}wmNpDgYLBs@9GfSnc2#l7~>Tiu^ugIk`tWN1oEt)Sm&ld!XA3PPobR`2rN(foLVlMEB5X9IUxKx_YKW20~` z@+ROpnDX}adHw62Hs8&HpNGMwcq;0ZCYN)-BvQi$w))ytB4_i08>Ac3@RiY}1=!FZvU^KOlPqI^6caMl9a&rInnmIPo|m7F`f1JBE4c1m)L&AS>yLjB&>uE10;%J#0UAH12T z<9?t@lFw)~Ex7FV3f-ZlFFvD>)pUFmI!K8oa`N|~$Jw0|->oroadC=vzX!JV069Al zk}%h{hNVB3Dg$2pe1VW8*}$dwj%EUulm2EM9;XXOaCI6!9k#WZo@scjn6byPYg{r2 zwWme^_V3jU^oCp3|C^c8|9%GiKc*P}`%~Dt6pqUFMbXV?M+Sr^hvHIASgNeFZubgS zSlHvTb~eMn%; z2qDY-PLBv0)3Vu86ZRh5p07bq2c3gNE#3Mp^J}V1rMNy)2HhUr&&J2g>)EB}yb-|Z zIF=9?s`CVONi|(l%!Y9|D&r{yc`0+VZ$oC`OP`#1ELCaq$7?%l5HC)WtAid&cQw{dzKaGuwlF0#A+aK4F++ z(?93Q(M^9RRf~stZ&>m*6u~wD4&}fzz2_s%3mnH^sX$At-(kc~*a8xHE>X{|xFh|J z7yVbS-Cg(6T^FZ~uqVnG&J4m*$O}bYB65(p1&cXkk^ELn`OWZk@meHWFSBRQ>&Ei* z2IoZ_#-N*ZZzHC=YirodQ=O+?4^MS=c;2aoRW*#4tRy@nvlvSly|L8(jB2+By@%YY2(Qs{&Y7UG@= zD4S(zfuHy(ONLLQzr5Z`i%#F*ja4+`+0$48xMKT+W?EhI5Om>!66h;A@R*s{UctM z=m2NSjM|K|%-9{KVtS&7OChHT-=a)L^y3!kVY)3oSAMyXC4adv1}`3wndu&QOg;ywmS9 zA3k@u0iwOZG+QA2&Yha|WNs$^E%)WktYj2W^goZ&HEqr1bZ{d@gRyr%AU1U14&Su3 z)ZT`GFU&in+Z??+m~X2;&ZkY}MS$jo6}rd)SskW!3VvA)2zm(V{wb0@Q8=cbr0y1U z9spWh^2cQC64Rz!W{CDbmfh~D4OG3KZA*eje+f>)WKMcm;y*wxS3P(x2TPCD(vO(d z9v6H_&uk%~>IigmcPac#`pJHg%Qu(>w1c-ZyejrpGK#E!y}#fO-}q&E(=~G%&AKFI z(s)83RO8X_nVg#EykZetKyxhT52yJVF#O6D>wYsyHqOuyq9MeE=KtsqGC(Cij?q3f zJ#t5S4U>pf)1E{cDP`*jal`i~#4AbXXci*Wr?Y}SeAR~eMKm0?!Rasfd zkUA`rj`HFhf{A5n$AuGU)H?92o7+dyxeH25;nQN-(mb!`ka3w_#r98jalVU&EPapF zn9t;m1pM8rt$=SAMO18TCuC8c@k4kR9(%;ag+m*zrsn@c-Cst<)pT2+a0mf{2MI0- z?(UidmjDUDHCW^B8X&uiX7La^1j{yY3WbF-7!8L{Ba33w3JEKLHy zeAO3t#%rB{TTm#k(?&1DNN(6jwmA70fDNd&9H*(bTb$_?E+KE359_k*r@F?r$U{>9 z5G?p*-1ukiAO&uOGHTRLXL>{xen>+8UDwOcJS1Fv*KZK~j?+oGRN%O&nhb6M6Uv2A zSu9jquru+?G%W5`6`|PLknDK(+VO){_Z8frRaUYLmqiiK&rPx9bZa9-q{-^bG_Kw? zPdndg;mR1Fxa@f{#LXfXcvr+te>QO7R3Wg}^jCiV*NqL6qn2X{j@FazU$c5OX6UqX zF|HEQBv?@t!hjeFevUa%GAob~4K$O7mzSFa%gn;!tQ(VaN?1H&G^ESecsQBe%-sAl z7m1iDRdQnD_pGeZcr5??AmB;$G-2&_jWW8C z63sqyF55D85ptY!7R#ApT_Y=}QC~K~->+2}ndc@i|751zweD!#K$5{H$jFz6;xn?( zb&|=i3lpMnkJ;uJsup$>vfYw4{2fkGJx3`7BO+_j^+is7pDQtYy1BXFAV^-VX~xy( zWP7Qhyfx=2L@^h$8Z23u{%~#oBh@f~oM~-kMQFD83n+cF7)M&=1qL0J)Nl$XGzgR9 zuRT9h)|w6CXM1j-16_a<8mv=m;j~~?bUHvATV*~>lw(fJrrinnTbhKQ2=K8@Wm_@; zU5zu!Yp0w81WiAn#{yh)$!*r)2_YfjpJq23fX)JrV3BZr5q8-zuAL`S?GF|9OI@7HmT{HpN~!EBL;)7jiym1n2T!~8PAdwpg}P~_;6krtNA!Z}writS zIopmZIxCJ;j*O17ma*F=>RM9jKFZSfd9@oL`=wls78Qv$_>jMD4)kgclbLiAR5pA% zOfhH2WQlm^Ffu74z~#_>3sgRcEn>{r4OjZKEJuwS_v&x4M2<%-7agSYV%v~@B7!#U zi%ZYeSCu~tPRSiG>s(XL6w7hGoetG%?wUoV)%G%5Q!d5aw1Qd)dx29g$=^dE~J@E}q{Ut8Z2B(@E67&^ERb4C<^UpzSEnD_K zP8@RN9aP>d<3@D5Ww;h5LB&1A)|4;e)R3_SJB5v<@JNH zmKbH36}RoARW&zg3dGoryv9Gs_c%eY<3O|R2!b~@`%ATtX^7MwaRTAl`2+UwgOl&9 z5Kn^YUoDok5jGByZjdtWdaVUiV)#%^9eQ)^)ZQ zfa5s?Yl8$WR~|Utg=fAYlo!KE9ks}bG|voh%3SseQfjOw8FC<~ zSR^m1mQaZGJG+9>4w4KlEG#;K^c^z~*xUz#-U0MVpp^P;aM-wi01a!cZYQjB-I0r) zHk_w)7P)mfin}s(%NBZt6G}=%sJ@r=1vuhBD_+=`GRV**1UU{Y!?ICmhWqH@5T*^V zsxU0B>oT^4x>Qq;J;@ZzY5_BXP)t%^!(e zm6#j&z#Dz0hU+B(4`;=hb|=hn%~AO^Z827OFk>W6fYz0Nac(-`u}&i7bWEcEar?bC!^ItguIUUk%xwaTlirqXfkaAw zP#{$hk9w;&MwoWSq%u~)9t`pjy`opBxNEuXewp+Inws$rweFT@OC;{A$WBmo1~*xm zp%>5>c~48B<}7F#rWm9O-{TLTuh`94=F5GgCqI;^lUC5d7mt!%;$+seKIr4755}xZ3*b_5ZvuK6f8kEuVdNf*G4f3d5_p$FG>yWt2q3QaJdN;<*ZhuUJt30L7=X)>%t zBiYUjNjg%Alha9~r7H3AG(9j0fk>v)l3Hd`HCv~)sSt5cTaAst#!{OhSo<6Q2|ee& zm|RhfP;C79f{nI$b>Bh3q*sMc4x_p?=QB48L2|!X4_-E=il|1z;A1q2%vt`bA2<=*lH4i@>>p!+3-`#wPD-pyup@Yta5tz6Lt2ezKQ zejRJj(zXQ6&f2*0%fD5;_9K?&y8`9he+ZnWECZ%2Z=>KsvloYHc*U9Rn6no;{rGp+ z_HX=qmT$#`!}f&96n8-sdDUnNN#v*Pb@PYh#mb}`tsv=NU=c~&>*uX1={jE?3r2OK z>n>uU*I1Xz1Z8())R=8KZJ7|Khrn*d2sm)@U|8bN!h!r8NHmTh=V>??DY9>)N#5Md z%v0iVC&NL=c}sq+@(dNZudnZuh6W0`(|!82~%knitM7MCSUI`oyz73*h%lkp;jgXt*+s zB|+Mn8&E-S7b&UN z(EyE^R*U_pGq99t)z?>0toLvna5I2s_FxaXkgR||jgj!gvz$`QRJiy>c+9gUd&g9h z;LAexud$-F7PjXbMMX{KPy<>cWOdpup3 zt+vO;?l|E_?&LF}LYdC$wplxBZGACtSq5!al{ic~hMbZM8bBWcU#eS9=-V zW+KXmX}>PFeyO2b1#v=oP1l@`{IW(#6Yv}<(Qj-So$)PKrbw^(6_k~?Is=j2bQy(( z(*Uu!J~muz1qWa;w6(J{QDd&e(Q)TIF*&(6RZQT}c9Gm4Lm(W85_7uay~eXJZ-}HI z-i)F*+SjCPu0w??m3^$GFczu;+Bd|VUc-8(TfRk#)tX6p_yaaZ#8PLM8}A#iedQnS z>LPwk){v~emlKMLo{;P(`tsAqWYDWBMQfYQ%aME)qiq(V-dfF(M7a zQLKH+^9wVYAybYiCx?6`XDagGqn@>>ek$#VEY2R;JYJ?0p573=*>>!j<0ymp!Npy_ zBWc?1YRdiV^9@m2=JLc+{9U@?Gg9a%B8Wo7u4R4$s{(;$ zs$Xtz9UCJ;L2-Hb>AUpW(cwGi63^_TlDu9oAYC>4|U!&zRn+GLd1*i%^4)@E-m`|<6w7U~;j9@6LT zL$WSL=ncm|$6_J(^Yalr#tsfB&Qa%8Tc7z!w7+u~j1ic8WhtukmKc6!YOC!}yL=ln zDomE2neFopo>t(QM=2^BDW%}-kb#X8o+wllgPR`fR@9Si+vapz>hlb=|-5gXRa|Jy3 z=0NzzBL+_U5H$EL=ReVD=%x{$h0!u-!51{3PUH9Jk8k!cKIWT=I&OX8{nhvbXOXsq zxO7f|##HgVwwH|EJ+n<78*mow)&pMVbL3ykDg@ZQ4!t~E=2-M&tILPvtO}&~J8rMQ zAub-|gS;eFghpm@@Gwjl! zE%tFB&;lCijWLfCS}PH$Jauu7Wh`jQ91_Lc4sM6jlk*e`wKk7WU#x{~$6{2gL)VnG zqt*LOMVi#+4!(9YXRTHX#{_M4@4N!LVe^ud<$uMr7MQ1Fsi5BeSmPw5Up}CW>Z>wu zn%&@dI~>+$-@Cj#Wn3lg6%hS1(|`YgjbQk$e`m#mZR`Uy)~q7gqr!f4<(9)%d}hz< zRhT@u@Br;8PvM$l_EKuJ*VF|prtd-sR+}||u40f8`#NE;R~VYv11JQNU7P{qIuMsx^9V=OZ|IZD zW4lXlU-uirWLv&GD31|YaK|O6DC(fgRLnfz`v4=)>pLPVvVOaJ`dfd`e0Fcv2kNw& zqIPmmewvEuwA3_ zWBa9={4mH>=lAWWvRXZ#{>0`wHgrzy6bmTyGCC>WOpZDq*BJJW=WX+^#Rm29uSos& zhfl$j*nK3PRkue8FU*$~ek4ey-@b*p+N2Q9iA#`uSXSTnppYrMTAFZ??`_2r?NH?|Zk_wbmFS$vy(}cS0aA zf6u9_iuX0F`YQohV}CU%f${W9?cxa#?{pUB`0v-={mGT8UOWWCDNhNX^>4(xs~rJt z^{d~{o81ojAMS6(*W$z!=Lr!sza6t_W1+l$vK743@fN2<%G7< zDEkwz3xQ#^s3WPw_8*_N%y01yzFBKYb$B)Qm|HQhwcIC+0gRa5sSO$INXV{eTC+cX z*oeI)715CHdS$&=kEs@9t^Y@&f&by^HTh9Rak|E{61&&dMz<^RoP6 z$*LxM`HAeE8~h=OHnf4aW6KzjT0GFJ%F9MK)Vck;kCwl===vVh*ThnKVq^En@`i7> z8I1$3(a4c2@!Ym6Y+O3~h8|^vKlyzX1qEm29CdD|?gr;xI@Z3N&2mu|S`B{*vv4^% zZ>gg#u1QUi%BCHwUh@somMJ_*P?C8KxP!bK76xi5F3dvtH4TniOVJcuDB{zxKLV4= z%r$)f&VlYhlI@zB{PQtu^sC*A!GreoE3tLT7Y!NFxuEXoPb!iZUdg8?672^WtCq)p zpZRtv$_b#2;pUiZw!QpEm7=(x52|Az$PdmF3SC!nPamOVkH)6IKy8j)V?SndXb5I% z2t%arUr_GMj|C*##1VY|>l)vP4F`Y>-NuKT17>FC^~*&EurU_^H;e*OZ%x2Kul?d8 zv0>Frp}6rpxmuGx3`j4NQVNGTkc)b;;4d}N0?qc>oh-uTwHWC%<~jkQ`0r_Hg9Ryu zx|OYA@}^GpApL!a4mm>9dH-sI5Ezv}=rz~*i{w0-6`d2c}%KXEG*m#K6g>{nXv|XgHtLSCyvX;~mq&;1C#<;|4XZK}yntkSOe}N~ zh2?;(g+aA4fC#uY9g`d;f>n@yTE0kcsFo843k|&%FNh!d^2+SHAJj-NTj9;puy&{Z ztm$eJX2v6bmoTk;zEaS*iN~n6L5t*w1Y-4Wxr2;|gIM z`1*kWU0MQ!JVdzX`JBPTW~_OrYbSmA_hl-r=gpCVa9Qr9!uNZF_@hjN`nNh!8~!i& zTBO8gbHCSepxI+BCSp}?4t;rDnR))=_E*JKqBo^n-2QS}I8!C*c;;htuVt6l&O@uxecFMOlJ3D`RrF`%jQhcPlQ z45h`U{wMErziZx{Ww3)k=$eJ+GrQ8y&{Mi%dacN=L`&2@v2Z(f=+=DEMWM|XzJl_^ zTenj2_AE<;I5%NhSt5P0p-c>aojhTj5k2s~m~(a{KB+o={furqUAU$uhS!tYA+vVT z8<)$?Bt?$w$H3Pvht|5PTKvec-b5P)`{USsk%QW>-md_tdsdqN50ERr{Of;F;V|ic zj{}(L|C?{705o}KR@r1`s4mfdc?`e`=jskz>TR`$hjakoTyQ7(e{u5UbV1plr_ks% zg#$W!Sh9R=58Cyr?ripi++YpArEZ(Xk;Pnok_e9?g-^$Y=@vm-65RD3AUe z4;1l*hV6(9`yVz%n7c{N5{D4+U?Kn>cYDYoaaw(f^SeE4wUF+qM&j}#wLh2gR+5$J zuGNhZMNiJ!L7OO(-j%RuL)+*^>{ShD6AUY{@?8IyA)*r?qmYLgUE@RY>4hJ!PhV)D zT~4rdB>-_A|#g-l-R^^mpU{(M?5QF~;zv$xO0 z!#M-_@m$wU0k7wEw#}g1gW*jSSW1L09zbb{ZX8ci z#7sb!bCE)mr9SXkb58hM=y?8bL|R+UsHJ1_zlNr(H{qHeLc6=@S^iT`yfen@wX^Bx z8JkEl+YZnX`ZA&AMkv@cXK?$KoZk`c36qwOaKjlLcRn$te{Tg}oja}03mmM3xGTaj zQzjoS@d4EgR%)1B6l!@{X@7r3qlP%0ygNNOP308L=*i)9iz#6Gi&YzQkvx3>(&_o! zW@41)=jTbVLjL7V!UhzW83LuPsX#X&iufPFaK!~z*^wLE)s~K1FWiD0+&(h8F!^op z9c0(*+|Qnk7<_Cxx&dm6MN&0y zB6?=7pn#4V90*Vk5Rhi+%g`RY$;1CJHo$*%+o$23t>c_(x|1O`Mao6+1Sv1uLnMFH zm`@EfZff6OZ9vepZzVm94}#v z@KhB1; z+w_V6y6wb(JHhV`?Q@|IDOp*E2o7G}1b|O*KVCV68#KBF4Gs-;+X^J4rR_}){jsP; zIrKg}O2<~y)+YHA#5GmFj5t%BZL65KWe^l3{<5^B4-o(ef`O5d^TFDHE5}D33lPZX zK}HYvAA@$tR%6mV<*y$nEL%}6{SEf=7&CA6+{6~UJX%?>AM1pmd7M@HR9NhGceP$z z=IM`H6T2KYl4kr2bDJpDdha=c{ZB3c=ihro_y8*P%2^`QlPJxnc40mvD^jNt(92hF-IYCmXe?<##P&sob>el!HhnW&-+uwPqGhDO$9R2ctJ6$vnN2Y3FewM0NebvPykpY(y#Ofzqn@pSsz>`OK;hFbiRH zB#Q=Y%AlP3;=6^FRWSraDdKvvMK3O%g+nRwZ0nzSX=}E^3zksUC2&T@QpmYE|B#nf zTZsGU?fPui$esF6`s+!})2<(wLicL{p4&0GVjF7ey*G;T@+SyUQPD+4`Q-F;GVbW+ zib;Sb%IPRAEd{y>$7N^a6d|TBf`&u!Lk~-I6;O344DzK!N{!4R)4OA-7KEp?{u8Qplu?bN&Ju(%Hzv!@OI^y&Z z%KVe<0{K!>4sQgVAkV#&Dr;~%m_a;S0r;-s;^J)k_VFmVR*qXx8rSD{Z#p^RqoT0b zh?Lsu8UOJ}uwhh-z^zEtnnXnhTeRfp>QF4Gp8jDGQgzQ9JzSynqWZO>q9PLqhXo+^ z|HY*y0ib>%bD>W(G&DX>{(^{f0mV#HP2`S1r~5HPSYaK_ggls1Hb2G`YUKU%&`()U zz4$5Kpd@~E|R8}mQORBh>-AE6ysdsd-9Uf zQa_2v-zt0n2FJ|7afv>c1`s0iX$1KAbG4vY=y9%8XpPU6ea@hUt$Fon2gzpx0j? zObJzh*aIN;Jezs-%4fn3qWwe~ll|suQ3IO&JIE%^?a@+p|+*KM-aMje* zBw>!pf9uTjx4REf^=3_~jRi9N>T@}!|GDY~JOkLk;bCGb&5{kM<+9#q3mb46vTp#> zWdU^c|1XaYBXPC+C!Gv0jv(v*5cc?S|KECJ@6Ib5j91$h*8r@x)xd{@X;>st7G$C} z;7q3bBeHJk=c*M!hv=;NeqM?Z{^F^7&H2S<3a`?&D zCyZ7ODIIUNWANqtG})B=%t8qS~!GFL`|ek0YE!odY@ z;@=#WD#I>gjGLF}cL;anaQ{`JG%W4G{?EhV-l7^YI${Pwksj`!90$Bke|imj#*ejx z-`Wvy3zU&mpI*H7zusn&3%JfsFC6=uqajbL4&-lb`->HVFj1!KiXYcyOB znPM$6R^V)&_+TCbEcc3go66AdIJq0F~}`o!Z_z1`zJn{>m7fw_KGW_}D*rx+@(msnWQ4zPIzBqOhS0 zP%oFw8PVf{a9pe~$pU+GbSaXmS@3&~`6WQuC^X9aPbKUJVN&V97yo3GqNRJziI)HR zw4QpwRTwz?hjBEksB7sSw*QAc^CxpCqZe8&l>qn2{z`?j5M1X4&99H`Kfl8Qk6iPZ z)nCTwSlI7D8^+k=2JTWSnYNC)?!|6LzR!e?bb0V1M%NA!D^p|U`Mw`4nadwY?XX)s zt=0HCXxwR8ufBba=0Toy%V0N!xl&yH^TZzY7C6!EXo4`tF_p5U>V5O&>Xx9>Gs6Cu zdCN{?7Uv^kIJ?=U0-U0uAr*w8Q`GLAFhLYUaZ}-sC}-(Tv{-A-^a@mHY3D^v%PJ}v zkWT;n0%6l8$!@;B1zRxvQ`eD$Eu_%4U*!85cQt-*N$#H73EBckxCU7s7Dz$4%Aq)3;4(4^vn|NZ0rNU&LQZ(#)>7|1kPk47dyd zVYhtCw;-OAVsIzLx~B_|2X4h^LhjY{Ie8}7w}W1ZSmm;rNZQHZZw{T+)BOeCr%cSu zpMiQ*UXnseA&H&XAl>u8lj#g?Pr*&T3B?Zo(jimuPv1@_b5lfUzr;X9x`4j_@-b<`e8N`5_T6e^BvbuX z{G5( zc88_RJ~p5w&?staI41hYVWIvVX*tH8hu8fGb-`k#FTaaY_*2bSuSm_>GDjLoM)u9Y zFGy=KHG8>>X}2p5jpxlRB-=|!t%!w1HlH2;_Urx*suJz^oYBO-?YqL!Z8Nh~84JkR zl&#^w&!*!ljwt+g9MI;~*w?ino|nUqvBbnLO$SGF`&wy2 zZsm$%E4uDFF-p8w2J8$}Hs9!HEZmT|aaP*i#PO;-yt=JW_O8E)-ySBeg3bFh-Nw6j zGJk*xYFX)njSvnCj$X0?9_E+%E~6Gi9O=WNn1zmya^!=xJ3f@b_C8)>w-T^XEUcCQ zvAyzkv-OP1Q}w7rMstCC(M#wuyHzX10f+TM}0)+R8KsQ;&xO?WZi3oQSKDjh-!K*_D;_ zOYsHN2RGoJquOj6;rGdZ-8NyLe=UmBc9^N7FoWtMc`9cABP zn@C_~N|VeGJS6H5aQd=W-{~4t!42<>VDVn@BsWkIeWOqQ%8AXd1@glc-qNbUpInWE z2KFVYETub&*CQpak17}$OOsy@U3Ih=nqEqEp}cSI+1WlmIrg}$hSX->irq(O77KFu z-x)X8&U;0*TkHVANvk24`rF?DnhZ$%WBk&v;vG3P^+~tEe)Md6IN&8xC9r~j%IB@7 zzGe35a>e3uJkI8J`l=4jI^#Q$B?-B}B++1BKLru1I~fXadbfQqD!?{zq~>kduIv}d ziwY#LSuF!XL^R0#?7g8u>Er-xHW@~qvza%~%S0{_m)L86u84d+;H56Y8qIeskFItD zBN$*(mmwPk0W6Ty~vzrBczDLA4=ZJ z3)SGdiRSV+L4Igz$HnD5$CxWD;I=%M&!+UktsG@BD;(TM_x&{LLo&SKta8O#=|VZ% z=pUJ5?wk{-Ef!bGyXysZxdU2NdsJvXQE4Y2C~<{X3rghn{poPNb;4L$+`cEg;`>KX zSzYs-u2$gw-7JjQ?`fu0u&m25KF~qL$RA`gN_I}G%(=IVK-VZ`lk((z=_T|Q_QOUa zwF$Ree>R8%mo19&uX;w(1m<{4ofm#|lp2= z47qR}BXcn7RhO@xL}@u-6QS{jnGW3^#^uM6rJw8A&oz_adp}X`HVbro9d}J+CB?ZH z#L4xCq^T&|vQITxJuY0hHaHW~9Q{&-tCe!L!$}Kz4Kg5N9WJ*aGz6RFa8DT zJHSXzO4{Bd+g+s>0fzFRpr?>4AhVACzu`9)s?;C8<>kob=H? zTlT3)4V9HbrKEPy??$EV2hrQ_u3Nk-^-ZGhlDSPUtrBfw*wcj^@o722F|WlEYe;Jm zzeEC8-VPrtJ19duS!PGpH6A%LjJm@fE3j#rXN;#hhr=YB6DC3~H_M$*Y#*N1gAGRB z7ykB!3Klr9*dgMvhucJJ$4s}2LU-?44y=Y#61{P|8i%@|{HLzB<*bgn=9_g_EPGsQ zub-BPIlW5AWMpLbme`@TAMw7$7dO8(o3%>`8%2v9%f%Oo8e5}FS2DtG87zQs4h0~NOl`yYek3tuP z7A~D{P;wAo><`C++RS}l^bs{@x)6Qx>$|k9skMHYquD>se?PMph+|3|U;J5XZ^3xg zTc@{~Qcj_@HDDk)a!*`zwpa=DMz{j@7M#rQdv2mK@I{Wj^2zsD>5mJc&((T8pv`J& zf)B~|r*eoJ_>}>5*-ux{^;x_p>z=`85E?tOYnRSaXWLAfjqVz()n>M;0KYju7IU13 zJ+73~n%t?>zEsh}neWv3CX@rKq0ob#V~&oRlGD_(isij{tXa&Nxm(&$8 zT6DMim5t{(lT?V~v-ofFyJrp@nSBI>M<;ze*-ai?JtGgMR23%EMM=GG@1Zkm#OTd* zQlk|geJk-tchiZi4fojW_mg_Z?da!xRkpQsYT85c4F$hBAc-FXkx)3aCNQpf6tdl8 zCuim3)$t->$hF7IDtc##1@OU%>!~_~P=o!l2%ru{&F*utFQcFk4ziUDIO@#vII#m@ zFCc&E^O<#ezZh-aS0kpeQRx9qAIS(Mx=@Ui0@m?(DW6#^mcSijQ?jqIo@JwE=Vd-Y=zueVpNh!(0 z8^X-Y@D#CS0((3MJFn!lgeBQXS`0rRe}a{*wNT^YSvO?4sibt`cHE^~$2XpA{P~=i zI4Lzw{mtP1=qLBqWdCq0SR+?>ANjH=lV-JVPYT~b=HRO< z%_~i(#5T6}**9~wQ;&4-_uq6fQ%9>W#+`N|KS%|96mel|f`~&*QMBN)Y&V+>?s<>T zSnnPDa#9{Ig&@RwBo1d(@Drs=t)93DE0S&_x|24=OqnXF*-;_B=;A*22vB0&CX3wk zh=#4iM94^Pm;bY08uf>))|QaIo*s@JVbv>+_LP$p&BrW;zb?fGq#KWw>otrqItl{N zan;)<1}w_8^UxtG2@EZOo(mY{<)Jjx{OpWo{ zC|g)C03T*|T*2lE+-?AP@GX3ySe^0mu#}QY{PpWD=&gX=LKWb*ojOOrDipxn08sY= zT_}RDuzh)vpuv|sV+SeD(BxqME>{eijZXh-@?<3TW8K#~(HyhE3hHnru~7IzwoHqm zj{b7BILOvF4k}qT9752vA2=9wMC2X56aKmV*&H03U+t>%1Lbg>5Lb?1fDeI##1*cg zZhd+Rm2a$|y2Ex{_ifW9$w=}GXpG7X#SYj~%X(%B{zk2iE=M#+zq^8ZQ(g=zwvas? zW2mDwS$$7x>wD_;bH(oEs?#qOVcepSo^j%kooIw>LSh$T3;iq4oze#cWwsadq{PzD ztviXm{_q+0?XK&E+Q%=6tL~=Gr$jSlD5eWEGlyR)8Zz#J@}a!v!n~g$6F8sSqXMU@ z1J*qrc~1MS$!!>S)N}e{-qzi+n-;RKM}XvMS=L$o zxU}jG`s3>`nM`SzKb_9B=m||&J

N8-pPV?X@!CZ47A`CDk73e{risz`QX{dc;IT zL^r>0kfG1ma)X=!4E*^#<@Idm|1bgr00t}0j&={`5Yt@hlDg84S@FWR;tQT=IzeEU z8Hpv7tecwhO@hem2r{}Jf~WEeWTw5X9*o%8R#xLgvpF~XJDi>z?vRcTJxjQV)VFR~rPFoXu)Rd&xx%5rax4_CHEeR}(HabmyaRvxt)8+h zo8lrAY4^$RrFWc03+wBFErGzBiFqB8?&O_P7MytLTZWv(pGXKw|Ca_i58v5sX5K+H z5|8YZtXBzhjuo|%x>BfX4&~)gz2BE4&IrU=z@WzO$*eA{O-NXoGyPdkvH~zW=j7W0 zo{6t|$6wG#8pD`=&_e0n?0KLm*!+>{HX!Yz+n}BdP_wgUk_qOy(-$5C`O!89D?S@$M_Ps{E%Z*tpNz z-;y3QXvuc0w=Y{!dn9HZSfD9;s|jkwPY_)uSI}JlM$s5CY)HtH$l?D@aoFfTA=!v{ z`s)GW^C3!#2lrfF zU8}l@0oUVcQl9tTuUX`}{9&4Toa*1Ms8icSv%hsy=>Ah@TNaj!*#nEWqfn4vFWG!W zrT%z_^HU3I0b@7lOK+H|sU0;xSAySGz>s0b4h4mFEPidYy5f)`?3cDNM|5`5<`iOB znN9*(cG4t3h^3UW+<7F9V%^1yjBj#uB@KK{8X+ACk zVf!e{JjMRki`{VeL^A_}sp8*4Wj+BE{8-b1f`an{;yK9Q6r@jDT4*C&SYxM801DzM zgVx~K7)}ej$3Z_3MGL$Fa~XF&f%G!i0}$k2!`9FJNC-`C8DH(}#6Q-v;L+?(mJvmL$3HU|O(K74?u^bPw zpfGtPMk**^3czz~vBotqhCH*D@Wylbey^!}PB%Q17l5TeDi}7EoK(iaM*!nuGP)Mx ztdx{4T3vqWj~`{4|A2U(ziLjoK8!8av91)~Y^2n@>LFLpzPZhwL}xGuZm_dU4}V~G zf*Ib>y$z81Xrwh4JS5EI;xAB4P=MI(sj5a2YmQaw zP0@=6A7)k5RVyLQGMv-R(7(`nwTEr9K&-()5h8_v2>@*-q~o&Ks1B z4?_PT6RUg?XFpae^_wOplV(Q6F`b3}hlHED$of1-X*N7MdZ92I;M=KfI}8-X0rhs< zus>bG{@;B*5?(<8S`+KJZedXoFF>mUP&NUB^7CI{fFSw{XWH9y00Ame=G)FBR;?N4 zSOC$?_MHOx#d#}H3?$U5K+7bRO|lQ)hOpa%5h>?uLvTG&K*auRm z`KLTDeQ2mX=jYbxA%lC0B}e!Z9v}A*$^#w5<+~NcmRyDRhIhq#q}}27ZHqM~r((`E z9osRVgZIY%gS+KCylY6LQ$${gs?7HZ)zUsWauE}|BIfbR8Ffk+7<{^!e_I`puIlt) z9KwD8`R;$eyJA6|kmtxGyV{b2E)<*S&0kXyqImz;gKpYw7qeVP%x@T(P;Z9n=hPyWo15o_^74j;qA+Y zeAeC3gRz?qQR+S?{z;yU(n=5a7)AI z)tzr_>9;sJzSzXk9BXf{6#X22dMv(V%TAHHZ1CW+b@Xs#zun_pmRDdYmwH1Rx30RR zbb9ibdtHr}s)@5%kEivb!&IC#tMcYH(IBDJ2%!y0*7z;f7v zh#_B!N9MQOwXQW@B5D`x0SCp^PYdmzL5ney+)-Sp_x9jeg>&wktF-s8p}C99qz--F zT9OokOCw)KvRy6E4z$`wyFDba+2&E~Ukqe{umF ztej3QsfMgN-Rn8F(zFUsCz=fQ+%!}da)?qNo*jo}JKq>m&|K#FD zw}g+~`Hixm=3EL7M@Vk_96MArhZ_$1c($#&i8az*>aEn-Xu$|x#w7%ay9V@#D5$D3 zN=QhY1-&nfC?B?fcb7(9TWZnsOWtkWHF_y+BrN>Nn>DUEqKx+W__<|X-q49>9)~>F zByyV-V=$*VRkfpJXW)Y+(QE{7LQ4Yoj{Om(#R*wLb>_=&37$8jqp-(yMoS{OcSRCQ zh&8&gY;m4l_YzIX;jfH4XFA(>VM=Qyk`-G4%T5n0XtmiKW}2tOW9I;qcuhCf;{3ux zg+%pFcwDe%xRJ=HUi@4&G3~?o>e5AzSrm}Z$=w&zN03)6B|J0Idv_IZ)i)VgkTAI_>Av?fILxe59(G>h3{B^NP(~aDTZW; z3GLZh#E#?%36qC1p6LS&Q2~u9#-%ZeQ&Ea!QeRFpd@*7R^A;Y8oBf-E6MqjIg9bwel%*8=7~d$ zJ3t@MeQ`}41GHH4=aMD@qma10djfm0`1gRF_~SqPZ2a4Y+9Ek2G{3f?EWg6)^>a0X!>`5QF9({u8@lw9h~^Js=e^~Ifsf9b zggd-$r$xRReqZzWXe*}E=sY0CQIM!Lz%yyym!2Yrn-ZT{`Fr5BuEZX+=6%b`*~r>% zaM}q$YrNZ0+hpXA0_b-9p-RSos^Ia-qs3%RKo1feNneMsmEktdLQ7|&fCNTB203Hc z|CY*EPc{bjR!o)9cP+VwN)&mowPTG+yYG&ZsVrGE?d!+JGoQSqnA{*?sTG8^{{ zl&+KgR}WR#itppA59R+WFrdOPN=~ogVbePs+#s8;!)kvs3tA$q+Ti?@v;>~^sI*PA z{a3(1{+{pMtMO&BQ`3k2S+eTo6Zkb^*v=M?I2WYL^g)7VKJcQ=sBCyJet6;Z`2Id! z1d|58d%KhI>b>p0EimW(ePwc)P|IUYli@K1+z9aGTt3iIO-insI%|PmobG4XP4$XN z{q4;Ec}=KsQ_*st&xHl*zwP~9doBC+UnzmOOB$bk;O;73kN5L0Q_;nxGcTbK42hp5W-z!SF z4ScIfR7)bT)oIb$OQ?GIvdYy=Wp7?m5ikXBktJ19JKV>rHxoqs=2R z{jZUnO(IT7!VNdTa7jSQqUi9kUksN}`hR=giC_2CDgH1MhsrP4I@wPz{?|y-GeUvV zIWu7x|M!w)^xw4?$xgX%{_iEaBmG{DPm(#kJYFt*^{>jpz~HN$KxvRoFRibSE^5>N zJq=+xn2%q}rdR!o%R*)!63YKEJVrG(-HbA{U#SSprvPB%|9M$?1BVrrmro)0Bae_P zi5xe{78L5`$@Xw(!mPyN7Ustz#vDjC>7VqL3ZWkO)t)Ns6(f6KQIrB$#OEKwJwjHN z!Ezr~d^R7y8ozk@Rsf0bjLCv_I-jUscb?p!IBL3uU5#CM`SQ6BwV3zOAzt5TZsAb% z48gWp!Jo-CJ$oU8?n?V(HTJ@~k7$vsu3Zx-R!lVHbZ5q&5(LkXCt*TvgU2tT@FWj?{{tti7(!1YT6Z!kY=X@PsXZ#d_0sqC2eoLxqrZ6WxoCT z+Ir*?UFxJaXW>RPU!t}`Bt&#J;Lqyk|GEa=1ttSNC)ZI1M%804=$=wm_o&TZNX6sA zc(g+Oo)Y7qp1QzS%HVWV>JzwjuP>D(jwOj2*l>FC1vuB24!^l?xQ})}o9~An#iBS3 z(?Ye5TQI(SlDJ>URdJ&>^>L{r4>4L6m2EgCt{jot9hm<;Tvk^wI;gEh*|YVb>3T8L zKxlb7FZnI`a9iE>xJSj~llP1*PLtDK&3-D95(=~KKP4vXdC$%$U_jF1ITl^pXYJN}b%YrvK&-`d%_>W|X{cYY!bRhwd{EGv!aYThTI zi3G2&9E8%k=D)OY&+5LPl>6IO;0}Td6PB%g&~znxfcr##@xF@ruzcPPBi7cs?_>4* z_cK{X`)~E2Q0~DdY3qkObQnQMzF$QyEyykW-L`L%DeI}Bo@bi(!)Vdi`Wu^=W=M)w zM=a|jyeggP{R}8#M;*%LHT7cIi)HY=9sZ>QwR`cc@A0=ys~p<@cJlbQpn_52@BA$) z>jfTTYcVz$a#;PCw<@KT*pT7zzN=ZZivGO{Dz=x4Qv&!GY4urV+&My%(Lt}9_8}e3 z9$0d;|5f4{mx-jsM{Ark5dVAreaHfycTtPCvEJYOZ z*`tHVe6*K(XzrewU~+_AWBmzF=F$F#MH|V*=#&-VJW;Aw^yh>_mIG!$|NaVZEHKfl z)U>L{nua#1dR%li)Ea0dV?9ZblS%Me=*qRAdBK}vP`+!Gg z&4-f$d>!|Z=dhnO^as#BoZtQ-6Wx|H)yDE1m%g4v$Vu}EvbvnZnR{DU?57(xgTKF% zlt2eu)De1v>phM7k0-nVOK+gS01wyzJYjd|vJ?SlOclBLe`tHlsJNP@Z4^r&!JXjl z8a%kW1%d>JpuyeUHMra0?iws;@Zj#QgS(u~bKiO1cYSAl=ilj-H7moOZQWhfT~}RI z^>MkVZ3ET+3=k}KvnH*oY(NI^pSIE~hHnZ=^QV&&?qDFz-WXawv{kEEbU&kK=_lso zacS$eeq`G5=xDw7T;>PH#$kZh&^vFz#8_M>)4ySKY&vV?-WZ4lr5Jy8b-y-j(nJp3 zPA^9=&g%?y`KC-qI6w7XFm>!t6V4zYvTy|4!LJhSS?h*Y=`HV!W8HLY1QQ0r>d^LaYLZsR7`ROHHf{Eu<>{I2P z$ZA})yn}_I)g^khu3o^dMKxo`^T$p=tm92H!9O}0V(!ruuFBJ{{Jlb9%YpM;^BI`t${pe17!N{^lW1zO|o8A=HSnVO$g2F;sF9sZLgR^eKj?eH6zj4zxZPb+Le%8+|P&bxj z&h;n0O#rG18ZNlIX^wDQ)WOW~b(9Rq+=y>A*NUQ^kkx+CoeLO;zRiv`fd2z}`A8Rr zXj-eTXZBs(aQLv7ntN5~nhJRRBR}>Hg%@OKu{fqV7?5bd97MePPUpf5M0NBB4)sfmXGVKd z?&@$fRYtS`RNb3Whi&Ei^FJ7a=UWp4$xm_u;oovE5oSee#`xq{saEK2%qXO=5^stckOI^#D>7~ z@a@1WL@8jP*cdW!fLd5{Vld*?vzXV~^ZbggbCZRxm-D$%GWJ2_!L{Jb-9MzLgE>Z0 z)IkY#d`)!pr$rCgBI=9sa0@($Me$> zIhP?Ur|UJApw`c|y;s|3FP_{QoA(RRy)gQGDOhAK*z87+9p?AtEDp_1K%!%f1Jpd? zw}G~w8cFHt0Vn1I3Rq2N{e#R;WzllG{h)T&b=ZI>-p>wdMr=_^Fi;NX#bqA1C*|wf zA{}8t6EIwYtTjnSmS3(z{w!7aJmeO1KNh{mr+zFLzWPJf6dpvF2{WeFT=#9W8G$bL3plU+sC ztjVAj*BCY-)+QRC>#hoZ40(wUdHFf9TbEOkqovGG&j-Ch5d>2iVp9*);Lbl3*9=?5 z5=}V&$#~>fKeCll!ZYh2;|0makt-)PNYVWACPz!aO(`WvC@$yw>%?vneaCEgBN7i6 z%?ZbaRlsr;^4JgO{RpE?>p72AmQ<;Ws#8gz+D+uX22WyOtCwS@S3R42Pxong6;D+3 zDIipo6cip7>+z?(;AN=so@lJy5v~g|dPiVx8QxuO0pm%Sw)4=jaHf4v$g}5t()Cd6 zV%mnJbYQh8O>;8S#;e*eYH!BS&>jznbtl2c>V|`rqsd>pO7$K<1es zh9^j^(L>F=hoeV|E?`=M%bPI8Uub{<<1Z&kt+o*Baj71eeqw-(3ulwEk|X+gJY)KD zxFZo!Y5kCUV^h+%thmiGs`X1u8mfINuI^R`@DVPfGbhNr} zSR^I%d9nfWS2(xorswzG^gLuwQ-e7 znSLo;x>B_`Z}Fk=#tj>=(ap;f=AN;l0G9=p1eMOfx-2x~G3L8Zp(z(^6sk?24w$Mx zIj)p+9WwR12Xc)FE3kzEP~nCoOT|ksUEh`^&6F%4%2Y?%3frt$T?MEy-*U`Zd||oq zri~9^7#2?{Tu5puiJlWsycb3tDYE6;{*Wh^*wQxP82b!HBn3VH5+y|)7wcDVK+pK0 z`=G66VICvSZ94S5#Lsjxkptj|gpxkbeJ=fWY+{_*$R?eN5yZ4H;oVfo3W6M0!onR4 zVKK`K5^&|NcDj^cic0#ih*Y|CQylq?xsQaRek#kssPR0hi#v2Tej@Sm%NusX6hLy> z?#0KFMPWhtZc^gMwudBQl)ghzvJgz0&fIc4{w~n7 zC?QQKJ%;V+H-{b8X^z}!^`(Imq#^gG-&_7N>~U#tgte@i`>S8c^MwRxKx!Z2!+wWp zm&iR8f%t`u{PrDoTwQc6vx2ZCoT}M|58baW)`|MG304VBKaG5X>g2}@c`qVLH_F~{ zr3DGK8Ujx7lyz3qc>bmKu_SEphl1v$$=JQGW)@M2BBd{nA>?%H)5|;)d-62R34>3S z1T+j|>&-SKgAC`Mq#QY7z(}|V2zJa#&q2Gm*Mb^anKkE(5;i`2DHY5m^?g@(fgKbj zyUrJ=N?z4%duS5^7RqQe*?MHC&3z{Ry&f zDyg3+md!*GM&4HDe!5S(hB*!=y*ERJ;l%oMux^P4$tL~stAp8J2~H=(+$HMw>)NRbRel8kG&$5NJ-6S2$ppvqwdBq8{v);LLJ zl!wmKFp+qWF#K9aG7uQi4njE)Tpfg%lhN-)A3N)W_(!X#8w$4a-=Ft_w;texxm&+X zB<(8pymyD7Hmm6*I){WKF`(%aHd+-O3uU_%M$P`ssI4Xl&eT^`BT{RYKmJtHa^L>B zlnDcJfwZV*UNL_W%@6qm18fG5KW*?ew=It1UNqXLgm|q8N#;0=5H2;1S2@d>!!V){ ze3P{B$5jiZ7<=qC;70!Z`;uj2moAeqhVR?>ZZbGiEww;5rGSvPb(kaL^%!_ln<^ zoah$(4r3Fk;N!v(a&7KimIT!qv16k$$~=WiHrb+;lOsqszn|mFrVztz3;M&cXoOnn zHbEae`V@R8i^oVS`7M$VEBjk^)xic5Y>o2tm3tu$e5Ajy;X`AH|Zy+CIT-+ zTFJcJyhRwncPy?q2eL%6;I8qLvwnoop#>`TCotgm|4;edBN>oqSs(?0K%B@v}@ zPl~Rcp^~b?S3u7o#-ghS1G#PL)5!nKE8ezkZ%*})gq_Vy##E7`?fd1@1@&lK%DlrP zgs^a@R)GSt@C9Eq8e0fwN6~&!KXR%&%|aiydr1R@@6=p@HsNB_X7zWZbbix9KoCm< z%*2x&)yVYjY*OMwx|HNzmdYqXP1;Ax_-;po^kt71{}o7Jb>n0ipw%h18{xn(W z&koN`q;AAGnaC{4Zd%nhH?&%bf3_2H3gy3poZTu)*<^J;RZHNJb*g_p*US30nVP z@EPr>L32I2&b0kEe6p5GAaUKhDnMOvkuK~8;Tv-4aouceEEgN$I{eQ zd}Chnq_#}HcOs&$E&0TJu4Qif{D(xFY9gdDBDyH*?x@`63(p@A4ZIVq7Ti4Bm`M^e z))ghVcb9-{fK}>LIN+nB|6^*73a4#^ZBJd=0+_INHQ_`M=ZDPC+$6!+-C(Vf!&%wz znD@@vxN^c@hO6B?&GH;x=sG0A*+N;(F7@+%Gn==K-H51&KFG>7TIeQ6fN0}P!cSWE zjdb5b4Ymovl-r}}9vaV9Ob1rglw-fDw9&@&v(5gSOJ|gMJAkD3jN}{gwn&x&?bwOu z{NjRj0xLszqSe#>o=fd(fz$;&$JjuZ*5?mv_6v%-9=0Q^Y|NF=uaE)A*Q_%_5`TUf zQBwl8&(TreLk(Np$vM~X4>23!2R}ns*Ev259C;){=5;jG@jzKdvAUMGs^^lltMvvx zffO+^zwuMFk_$Qz{~Y?f;u)sd2RFl7Rtm`N6XU*>>HLv&0uQo{3@;aBwjw4}R(nT1 zmr+QMMz=Pt+#Xz`J6o5^b)upU`WL^m@R3SiDCN`VR`vg4=HnF9bfG<6+ycE>&kg8wVBBy89d{f~&$CjOqIS$Z zxZIr;&C_k`7bp|=bAuI5vqO6v&vS|qII;QEewOieK$@DGFf+;mO33R2^$X1xi}96*HqVH05K06p zzt+EZ`bhwR0tZtC)X+#trDwOo-5BCEj~RGH9(BQa{< zIllUj=U#9A(4RaTVjPm(gPwo9yFf*F%i?^ZHF+#8Y&{T5VZLwAj3X*17uga$V(j0& zuGpxM#=%gI14I-D0R-}ZZhdXEBEl-6zgz&8ah7^>bMq=7GTL!9EbP5wS}gTc!xwe+ zqIT=vFiiD&^Mn>eL0Mg#P36&M5J=c_b-g=y{mfd9v*te$xVPmhx?r2SP2({@s~TCt3JjB{|*A+couN? zbZPW~(|m)QfL&|wgauXFt``P;)1srgJ0*#x8wPi}}e zv|Olrhlz=K&_3uMO~6yYlgPpk2wP3fM-^4olFDTutMpu(yYtswIR{(Re~=q8d?b;} z_fG^UO6H^PXbB&OU`@oI)qjNcIFdrO8sO-UhnMjaEJFf=4zn}}KhIy;<1u=16`U`m zPOKH3X_DuyNp-ar15c8|#fGezrL;j977DI66xTj)q-iK$iB9M1Q~)?#JXO0_7H@b7 z4->VcGmR*cQ_4jE=$Irfe}n+Md2>~M5Pdg_eY*RS9Q6zQL@2Y%8-ysag}eLsF8M{4 zA=BlE^EWpOo_2mN^EYD#S~v4tOZEz}j4!lCnJS;&n+Qz3Sne}*2XAH!jm$W;bJ67Y z0W%3G+4|X=-}RjQ`eeD3Zu3nZnjQp~%V{MY&@xgKpl+qqj?)j)1GkOUqigGM)Z4}?rOR04oFkke!hNRoZv`eF0Cr6qghSQF8Bev#=%^bk?esSaa)W_`#Dk8w z^8(MIvK%n9qT#!E@-lpmV%R5S1@x%VFr8|d;!u1o#e90CXc87tI)?x$ z#9HI8oyJZj24PNWrGG%Kb;qp9p!*GTN0{6(Gk*cJWh+NB@tNd?b^l4#XoJl&v|czv z4^m!XOh3y5rS@;V&qIiwsc*0c0P=026HQ*X6Eh#DbYW z5o6O@umEVDbAaXQ$@JXyHodBtM?D8G;>5mdCwKvNf!{n6ok~@Nx2gqY=C}xK7~UOt zJ|{l00*e*=Tq{+Kcw9{TgdvnL5=1Mq)G|gpz}?%2CNrDa3#le+vv4?-C%3$7YY*vcfdo_MYeP&|r+x;c#tvBmVvPZ-C)AlYp z8(7Xo$JiFnP>MxIL|3X&4b!55w!8iQf$Gea%DbY^{&q7Lq7NEE)$L{-bp$&|)2fwl zkq)Am?Vi4@OQr0m_CkZ@mDkd}4wBdTu%lhXG z|Ndyd2WiWEL8`(I_G-IB-Gix4OJ~%+f;QSOU37g=*K;bBUq9Q*BXX! zei9L5$KY3rl?7qxJgl9!2OExNQi5KRGZEo0#Y>lpacgg|{nf7ND((YcV0)1}EVp~h zG?C*O?x@%*IF(E0r)}v(kUo*&!-9Ikm{o8KyKC#cJyF1$)I(rT%eoVD&_JIu=qTQX1=@>H9D)m1ZHe=ywPT!V`lyXmB z^Xn~hj$cPGobBn_uewdL7MEsJIJIv5n0ADqZc1I1H;~(j9Bd&AXq-gCsPKbtAf@jzh!`DD z#sOfH;aN6*tDZz1(@)!K*2q%iPbrNNrWjk2T4}$d2HEKlEM|b6`T}k?q9z93AHdfj zMaq%g`ZbFCNLZCXU9&3Zg;PSbVK1Il|fJR4?cVbHCZ=VBH>i8GABXrb^z{u z#^M5qaHtc;$V*P@s6vu>@zkK4k@xQD0fp2Yha1)6kEt$O0YXY_l*k9{p^KN-W`Dd? z#e`IfVWsmC`J4ss5%g>&vqCxIP|v#Iqum(3%8t@_(NlVEp(uEaOuL? z&^)Ol!up-k8sz}KjcfZ-r)>3`9k@rG&fL~nw6-X@F{w}uO2Ief zac-xQAnvz^D?+20gmNkOio-KjlNsSl;J)imKW$3w_{R`>88WnQVU11(X7Oz68$9L8 zTmZ=un0dF9>=xRZ+N3i2)Q3M6hAk+?2WV(wU;_$Pmw@hH>51M%W`p_To7Lfgvz*VV zzYv0Y3kH$4o?SgC@gB0D`*69?#S7$``HPLNo*K?9vs>jzfjY(P+!vEBzd(9!kB9VLqs zMpGF-_W%+E^<#&zth98}Qf-5EQ5D#c1DUS^wihmTM!JEc4&kLRP`*v!zfe#i0N9(s z^g9asyK)rLL_0Vrh}BOpi)A)u9cJ%!T=20(g*~&Dh7Q7_R&1FZ_Tv2gupvhpzc((w zuVa(4?IRZy3qiE38vMWxpx*$n-k$!mnpuAssugksj=7OQwJw`x9K!$$7R$Va;*Mn* z&h%bMI*21zDQZ=j$hY_O*+=Gy_Dv_^Ps|qkAF+i_7pRI5FxG;znNxuvG@D@)Iu|}0 zbvDGj7G(TWQ-RVzBy~~}8ps%Fy!|TEC<+%AiAAabgV6Qv7QM8SPbwAG1ORAn5d%)y z5g$PkQ#3(FX+1sQM}fyD++ILiOMsf`H)ILbXv3B@2!N>Ux6zR@grScLOy&5@d-ILH zms-j2lv3)Fq6Kz}*zx9zIHsKVrQvyBn{^&D=mxZwk?T(QAHSpH{{7;iZFXalgO(Yu zH+pYc)SMH@yH)a~8TWgBBRWsej=t*~pBAJkr=1O|R8)tiHkcRd3F0FzT8fu~=s%QW zNctk*8Lh_2u^YukbDEhIq~T^9v$0%ny;B3S;{O~@Q2Yp^+NM$36A^zLFAUVSln0DJYI=d>1=3hO5&#u%c7NW_8*)xlkU+pMC+`a81>iZhO}+CVa^lX-G&&_yxY9icoMLU1%S2;$|NYlt&p{ zN0gR=7y5zrb%q-f4x*<3tMfCV90oNwMJu4>Elu(4!#p+vH3x^qH~QT=>f8_*xNRL6 zJkbyo;@@N!J57*+qRQ}pD3gx&kyEIRMa-z_CAo~H;^HOmlKVazIu47Gr7p&f8SMjj z&rR@}Kc3ZX6(by13A%}Pgi(w%cHe_V{pXcJIYyxw%j#??+49J`y?eekb%PaZj+{4G z@r5Yq)tA~&djKT4LVIh;F_o6+Y91SLhBGDw;4dXXJuHI{rekzgfUahfklI|@v|H2% zG>B2HzP4X6gu})PwD}JWjZ0DBHOtStjY}2O#qklln?&$Z@gU(Q+N}1K`|~L?cC8;> zCV7k>O%$!OO0#lRmx8}i6l-u{@D1gCn`nr3_sQ{RSw4+QQQLwbax}!-+M0J?o_nKb ztc~r2v6Exsfo&Hh{jLa5(ESXX?8gJ|1lxor;KaG5C?bPoyA+*%PW(jX*72OTvD>V+ z`cNg$I5gsVM9_?XLw%hNnX0)MV;JFBuJfs>7Mr?&6I zoyWGl`&PAQ(RiZlkmncP8Ff|0glOxT_}>zn$9?)9Q3MNz@~RdMualDk(8@RRS$)69 zIZ23^NY}GPzeAq?6p)CW7h%+3YPzX)tPexCGAb@Fp6LaapO z#P9JyTLmTgh_Bjk!P_yZ@^}s=34WlgzvSW?O}G<>!!YGV54_V% z09-dMv!N@lnw=$CnH^_&0#pXE&HF*ylsZ15^30Y+&^C3N(zsD(qGy?mWj!PorUWph z96Uzp&P*bNnVG@3O1SgMGrvV4I@#x*BUGHUYwxKEy#(F9aQ5p-_ibkNoh0q*s0^l} zlXHxqIhS1S1V>1jA0YTmvkfF8Sx(dwa7Q1{YID+1cq6jd$^(wxquoQScywzarD<*`XQ?enKZ?!0_!=%2)`Yz0ixrS7vN;>Xl(m z$mTMxkZ#UG>_;8+1-uIejMy7gA3R7z>5)|WxoIxORB=C~T=VyxPq9VE(F_={xI%|T zT*yP2PQ9gyc5^%skm&LKywt~eOP;oWRL~#z4{qYwZ9EJQ61|<^G+js6Oc`sUW#ygnYJ~>A? zKP0e9-u0a|+2YvTZi>v=i!*Mv0Ww3l;Lqo{%*E@#{JifZ=bkaK*Xt|s3HkWNTD}1% zJTztI*XQEv!z=^VEi_wJL%S=ZKYf-9u9R`jeAwuymGrkC)q@XqtK&U_Bu%W*B4+g- zSZ56n$+MkiNvJ*ZneN`k$AlHU>sz#ELCrdp5J5v#>ib3!Gk3Q6(s`X&Y9n!Mr$uCv zb(qxQ2bSlK%oy|3ZKP#IMZH3AB$$!pYfW{1n?H-)$B0DYwuWeq?)({zK9v`B{j8w+ z)Q85?~2Ls#n5V5P!q4nhHrwUe@_Kbbshj*v0byv~mt%^6Tn;PJX?h*Ke6>3bw~BYRFMC3w zqM_gN>pr*;z++i;;xT!_GCdp7>bRXe+@1xI?Lqty(5EawT8Ly?RSeNTjx6$K;Xy?~ zRcZlPM^C4XTx;W=0+?%!9cV5QUO+z==|hL{q{V>LgpXB3q%FnrwS+Cpb+Fo8UArn6!P1m}Dfv5) zl5vup<@$aJZ+r=>V@oGFV(-cbZBkf*ujDZ`c9;A{Fg>@E$ArM*xyNWzdU4!c-8(V? zqjB$kEcGBg%6JJ9ct}YZ0$4S`7Bx#SE40%o=Jj@WeGgAil$143b0d~IHoetnxLlLl zsl3n(B`5uv?%ZZ5QyzbYeAHMc2AViEIlRFcE~fvJ;et$>ZAEXF!;VD!4tR1*$ds#c zQRejd%=t&H36b6P?@Gjx?ir&2O>Y+uMgRfue>2mw-Hz;D0o(e(w#xzs4`ZYWdCfar z!P5_55&TvLc016@)s6rLQNmrQX%+vFyYcCAjbICBw@cQ9e}JW#i{AWR_~9A22S2WD zz3EZuEyWQlQF2(8%T<=pSsqktmK)&Tz>pZdJ==7@Um85;wAs?^uDahbY0qK+NqHl1S%yO8GvGsAnr!)3(&{s$b1bl{%v+8bWa zWSP_0b^9(=-K9cT>{kcJ+m_*Y4yGrpXGdk8KF^1astarHE`?nT>B`2L&74ZFcN83u zz(#YTWBS2|>5=I%Yan{_q0&2q4y+z7@Ms15e4hrZWcM{-mndscQW996C;>m|xBMD5 z;t)b6KTFlQ6wy43?-p;-M!Kaw7T0mFr{}+Vda!+mBP3NY0PJ1ug{qy$6M>)Sp3vVV|`6XCb%WDhnW14XMD_igE_2WM+KJ%z-0l(r`TcZbLL$GdlN-XSI z8lUyLfRPOq_I79j4QbMUY3Zn_N;|-cQDj=~4X69GA?M;U zDS_kKFa3De_$8U847KC-I>~mZ?OrMDpF07cY&M9a&m>=!UjED~W?6R=G~)M1%|`j$ ziTu}F1V7{|Nj~_g%jLNK!inwgpGgO^%Mv;MvcmxyfGhMLn+v zR$rnFJDwO8y7beR>fs@n&F>x5EjS_`W*V8#gYfRTh5x-+i#kh;q=PS4mBE{9-h0#G z!;Fy;)8{Af*^T#$^V02-J+*dC9ueqY?-nSWKqf7e5yE=Owa^T0+;l8AdLxnt%!~Zj z{W6{(6eyj8?dUU?Bw>hZ;-tHJsE1MM(?+=|=DfA_Gu8712Ky!t|b$;a1p zQ1R2C;n?+3$>aQ{!-VH=h47XDn<(INM|0NR-|z1mkim}HI9@mCcU6=Hm(TmV!UJI;@7Qe0NY9|EY&XT@6B6_n>dfX^UG2StS@r4~8#fP1D^I}8|M8##AB^v0$#o!ru=B|I zS`)*SR@YaoW1pX$o!va8a>RJj^1_9;z-W{sO^#rF&#u`4j2tN3(qJ-@n$HuY;Z7JW zF&osdG}k1z*lz1y6Kj#5_W?q+Og)EZ^;`eA)npWZI{SAlzhA_F`{`}k$lIi${B|q) zwAZxEyoAvea+a%kXfo6o6PA+=h3w|{mjRwJlDaE0|IX2GJ)#>B*l;j^R#uP-C*J`o z2gtIO+@mTdhj?&sP-Q+%3wSol02iF2qvOG~>%~q^TN@uGx4NPtMB!v{J0VgqDpD|z z_UN<+U12Y3d}SpHC^VzF4C}*qw|(YU86AvG7RZHvFlq#fG6JL6Y1Ie~apc5< zj}+Xp3>e@*KAyQI+uZxF)EHfLW|LFL3q2{ZE^HGgtd#e`g<88lyYU3AG)dMt8-_55C`DN}x+Iibn9VWo2I>G;{sX56Xl@b;f7H_D;-vK1O zE?I2TsWkh!*?v{7(?9jU9un~c3_)GJ{L|TR93*xy_6k)2uY>wNaH>b&-JQpHI623C zb*|dbQDE`d2}l_APSD{D>llh6M^Tc~K;Bi3TUFAWy z)Pezc`grj_oq6z(u(eR~rBttRQ7$gb6SLA|maFBXWn!)&Y!AHY3x~P zbHz5BkEhjaH|@tLEWv%dncbF^?Wqm||0o<%kOMH!e2$lYV%M6CMY(FHbSp}!0M2^3 z#wKZE6lU$^J9yn&C?rB&9OW5=J@jb6Unxf?pRc0!QxFis&%2cLbade#l#0v3$}DCH zYYPhA0xCy_E=VN`S~Skx*ptoaXfBz2y?$1wlrHevg;xqabie@cqqCH<;mP!m#4~F6 zRUR*g<9S_@VR&!i;e6GK$m#8+e(vM6>5lda0FDjC0PeT{w0L%UOTz4U(YX0m|G^EK zG*0WF$^C%Y!@!|!KRKOzXFv{$ii$!$Y!}3H;$eR*E-UMK#hh-KG-}8x-z7$@f@gan z1ht#zEz+D=a5`3_o9%Z?7J0x3-qK z_=JoHG01@K#d5diC$?{r~#~an$@UaCW`j+Y9Bz@Lomhd$X+P zU2TIu9ISWn3wV}kGh?PqT=2h-^5I7YYG@#1+44PS>qBA)(NiUl?L|ON%ZLcol9ULc z*IzC`gf+u6Q;2n2c!#Anyqdl$2*|4aPXi$gbcOV|E8Z-8oO4_GWzDkrPdf?mVd!df?1V8dy6&FUxJ%Kp-H1OM)ftF<0*aeVhcjP$JYaPoc}gc!J*Hj zXXve0J)G702JFvgjC59+e3<^=`?t@wdq%fq7a06}&PW915~q#2Zc2_W{9ZToz)tAz z`EP6JDbVbHgadBs;hU=U6!M>+I{edLd(mNFK%=Dt;0xl~xFsqagHir-3gdhKn(@8n zMDfRyX^%PDtp1thhbrq;{-ec4JRYwX3)dFBd+-=kCg?CUakF9^{l{3!qPvOnm{ z7t$s9&*Lw*7feo1Wk{y_Becl>9tZi7!;_)CgcwrMCqI@ij&Le`4Kh>9>^;+Ff&z!i z{?Eo;8v?ks2Z6xSCF8kCS*N&Kj+b(~PZsQso}D}o|6SFe$K${AU6gGNfD7*0`a7Zu z`>cP}5FPidKHpg$Jq`Wrj8C(Da#Y(0Q&{aD?Tblnu)uR#Qu43#o{gTd_}?NE7l;}P z@yEB*FHQgDMB#Kc(L=WR%1K?KVRIQfX``WXDasw38f0DZDTG8G^zRlK z6_H*;nq2y8;}b%7I}3cH>;tJ)%a#1ngFhk{sX}Oz^)@HVaa!r=b@sk`!!aiPfH5)f z>>75f{;HSsS$^y(rWW_2>FQR!Gy9=VxS{1k1sgs7WURJ55kscl|A|K&_nAO0<@kQ2 z8R~Am67eQ_9_3^f7$)kU6~f={FsWHu7nc5I%%@!>$KR0$Hk6~Ph8(FoZ21@~4Nwe2Xqwq9droy|U&SFUs>J0Q&vH;8jXL?t{ zMgDUbAyA#@KS~)C{^m8TGoIiELF8Ra6~{C;N`FM}(&otT;!w(^85Q|n5U64=q|dz| z+oT;+lY|N#Ow%<593H1=3qx(*MOW8-gaA@eCy&K&d6LQx6TM}l0Vkjt@Fht8kc~%= zW*{QlrE$#yPTwuif>=(ykjIF-Bz&SCDMcxsBBa7*-Hq;TKzxX)rNce6M~>=ollzEf z*atG{q1mGMR6`$95!I7CUq`^A|1zrWR_-(}D!3p0?QF2%c?@-~LtmiG9F4R0@0*CL zs##K!f@EerbM1Yj?B^0Up2fJrCF(<(}CTrKJUU*B#1?Ajemq+jO#nD%)k|T{?iFf*YKm2 z#e=`oaT2y%5Ml65?=xs&}e)3!GIhok2rkym91y=kkHDeip~Y_eMygkE>`EvOHRl>D!Wo_VU54xAl7I_DR)yDnPbCN z+L>64d{f9RJ8l{6bOLyZ)-m@q5|h?=m8lZqvU)iLr7;G{IIoVQME4aTGR%7ZvHxIR zK?bD;YWrgv`|EtOC*3g+g*O~lZ%XZ-bd`qmIan96Kv#?_{$IZGJ;Tay5UdhgsqJL> z$xZ})dl}l*Mng0qkz%@5WeoN+ctLa*zI`HR*a=cA!Jhm7lvip|{Lgkx!`@qtwLu@p zJW10Ki=`PXL`Qm)+=1+q9x~iJe5YL1cj;Me|5RSw3PllQJd?E-B~`TCv5oN6V27sl zeT>mrT;`26w|}CC+0{2o`ujVWxc<5VfV(!K6;#Y5of{TvR94qCh{Y{*YXINixTPO+ zk}hs=_|Yui$PC87+|!h@{;wFkdtJ1t!}))eD|nKQbaQ&sy6t>#bksj)LhE>VPJI&G zR(awL1!nXbw%ww4lQ1o!j@KKA?EK;n-<8U;R>8ek7C+n7t#aYNC$)z^I1}`l%Jzib z-MgaUIiE!9>R4Q7CPr6ho57emI*uV|4lWgR>EMNi2A!F9t=p&e|X@50YMg;+)cf5(Sf!H z>YOnCyCjnSf1pGEciiazJTjrt=Ee>fqrQsNQ@ag-)%5!R=~6Wl;*WoCbfDn>z~dtm z3E&q`=}Ae!6BD25zt+Jy{cOtu{rwH8G`-2=?HS(_foKDOZRT}|gy`4Kznc488S)Sl zMQ!!pXE%U)-=_~x)C>&AyKte5h#+d?Jc7T-XTm#fnVTEHHh`8NJ1>4BfO-{)aWUWg zk*8s+#%}P9;czmGdabdXcd*Fc1^ioB{s?prU_gcY!y=ambes>;6_uCw{sgzfLnMDR zdQa%KM^gXDjRL0!7`86Yce~XN`=9Z7oDh(Lp>-hxH?r3$ zbbMlB*Rj)PdE<((ni_V2Y>HoDrkgauyW%=Lq~K|F)k>YnNIXtZe!f^_enkZmgw0wf zB=5sfEtkz21OQto0(K_A`{h0DgoZGX&`ZtG1ZZ9W=lN~rZ0RBTc3X@jjAo;in7g~X z?1S+!fX%LlQf2BDb7{wNo&TFfrzQ|ciSYyAM??NVGgJ_GVzc1D1L%&K-p{TGcpL}{ zyk{^-_*~iUV+!8)%EMU#L;!8}X4Sjn-p$jKF9?|^>eW^UmZ0CwPV2R7+&s; z&$WBk9FM?Ve-90HgS~EemLGzU z2uh-^Cr2x}EasSb@3!I~^3M0EGF_nDZ%%rFnqE`0K*_Uey?b;bhgOntrUR+$9wukb8C3Nx0Mg6V4<8?hqSNV!EQd3h48W~aOxNc*5 z-0v5*OlbEaaxVG2!eBQGWg4}zi%)}U?Vtw@sj?5c9YEJY5>xsX;s6gCMI=yx2U+w* zQ4z&CZJe&M)eqqNdF=A6hR&;g{Tc>H6uVGS(;SDO3WvD31tSnlf;#KgpG)e0Et>8D1}KQOHT z<-JNC0OBtI-{_5`vb$W2aI&~x9|e$+{_U9}=VZwv*uGwg2mlQ`1rltW@ruVMuYx6r zQ96Mht#&yxSn{|SIlc3M$P?X(r%^sV)P2ECR3xq(@|DnLbOZagT`d^75wpgHm_QtYxd*-MUrsUt; z9;Bonfm|sNn+~61l9CEFdA|`i1EayTd8|0Qi$?W&bGy7<^{FMxZp@ z8lc8Jb;$GU>M#K8QF&MKuaN>8)+4orNaeI96jgeS8Mt3Km@Yl5uk<`_?XPjWGG7)3 z3gxkLc|A6@{0{BkRKnH-(4M&}eUUDuKtL0?+-)bF0dw_LO+w^}sbeweL`+Of)a`P5 zY$vEGDl6wUU;=>=fXa%GkI$P%`YT%$ecWiU*}xFL7M=v)u_B5cdZPFKP@e-tXkXOSRK&H&<6o84+U@77zT+b{C&XaHT6Lg zV<9_!d^uWn_fWoi68L|pd&{6Y+AUmgS*!AY>-1b3I4-1a}F+ z2?Td{myJy4ob%<(OwCl?y7$Me+kc>ILwE1D*SqXl>se<6+9e@!;@@?O1LZJl$f{|e zvC#M~viM#F=d<161QX1BU?5N@64NPC)1dCTi6KEpZ!>C8 zdpU!E?)U#3dGs{*q8l8{JYz(mN*+1u=|)R1i!~BB3qgJX=QJx2XY|m~dBj6rapR># z_x*o#S2!bFB0BBL^&Y0Xoew63;5~JR28PsQ8I7EO1VN5|9D(5zUZ|iiLG||OFn-+M z|5Bse7u`6y*u1kj^SJvph5g8cM+Xgh{PdE1s`TFWzh5Eq8%zX34mtd2#>cN?3X(2u zr9!{YEqdI({dcYV)h?=2%#2RDVl`<0{-cDV+T{Qn=?P2xsZN(!FGX@yjqKVLd-;CjvoBdR~~$HqTbowWEwgPqX~a78ySJHB)R zKcmToT56*HnS&{jMg)(|{uH28xtBw=tU_#jXRhA;)ojK)#|2|W%=!WFhyj6}Q0CP-1bpXRQ<~6MMajihkt;?T<{rT}(bSO#C zWdB*gG;s{qh(pR$o z(<<=)Upf9C^GSn(jqU!N@e+=*S>}yzu`X0`Mb|)Q`uSi=m@4xs)?Bn7bpMMJZ0$5u zW=W6sSc>;a9J5Qa7N^BOZ-v@cV${{umF*k#SM<>ByIg0)mPRck3?tRvZGndV4|z_j9edOAU3dK!eDgMpJ0I@6 z6h?C*JHdPi;sRL`^Bd=TU<0SC<3$30KclecO@jO*a|YC`ORAO0OZm6|s2NrD#9+}4 z9Tq=Z$_0uS+`6#Xo+XE=$xnmT4kwJLtU4jRHs3!#7wr!z3PfwdiF4YX@C@B7@et&P zjtvwIE}E^Wk8tqZ2OC@gVvZq(Y5Y1p@8k{m`7wFx?T5RwaGU#!y2ayH!+%vZ8~QK; zHburK5>0MK$aH&k*!$J$Ss^rY&CdIr_5y2juLAC z%&dBGw#q0jIyxGjS>D8iYRQrJ%Gdwn_TOC_!w%R0g9ZC~p<5U^qqNQyUJ(j^I`CXe z(fUo!ax776KJDEDx<;mLl>M>6F#d7k8VWX34E9#BD7CFZrIobVMAujEt(b$ZD0Ce6 zU{E`Eb}}i)KJ1=C$@`{6>|ZLoVn3zBi;`$(s=n~w{EL^f<&O4gW`~FM3l#TYjr4`? zY6*BSL)}qA-i-WYS}4l8M*O>Y@e|VCOrBz`WUDzUAqR*p4J9Nbq;^ibQa=KiaQG=& z$NjrL5Q0X&oB~=2fI;Vl;XgtF(B^Yzk#Y_ji3Q(3N*kD1{pbUkGOV}8;vz;ud| z)}%%U1PZ1cno8W+7Esdd0IZSO)5A4TsZb~41OoW;KXxhs3ikPU%JVE?M|lR9Pl5k) zmZn%$qeO<%+&h5){%lfq$~VJ;wqX8<%U$+0^JNUtsgi$-ld5{!Rd^rTG=)TW{u`h& zaMcu(lfZ_X+uEa-w%qw=YK+3wNyvQc_&VDp%~lPQP-vd~&RY%ecc%F~gV!hDcgg<* zUTkS2FJDHsdjO@5_fcCum8BbK{8;mBUH5EN)zYFTnY890bl#hwdb!!3E*gnt2c|6j ziAkFlV}K@Oz~dddK=%Y(SI}9J7ZA zOOWXV=y2fTz_P5ley2o)2A0{}2Mz(>Y#qh)VQP42sB3RB|7o!Zi0^^hL7H&5W%q6O z2I2<2S38Y%#5`O@c-kI2IRr_bzr?0EuE2jdcqVjG&??HUCP@FKY`RqeudfEP^>0&@ zC*vz&dc3}~ciWfG$Ov+_pjZ;l! z1VnFm3Wx{$fY8kx>K72Zk6cjMx>gQ_dMS88vRPCXu=@CmAHFBM{k5f$(B1p;dca5Hp?v@ zC?vSBfn!+$BhO>N`KQ4C$ zYA7%IKTZVJH_CX#a;9bq7!lo&Red+|ReOjCXZT)&-+;{0sxR3JsQ?o5GdH@!8@=^2 zJu??b^fCxOFb*Xm23YYQDa=pmp{*W=_&3AD!IZ#~&xs&UH0>CfAsHH-neLE;?4ghY zxs@f6EdFe)IEk1lGX9(R$9)blD>g~P8W{YLwY=sXQ+!lMf#?o`3SY!VIqP0hobrWs zQg&9I*f?~pypt;*E~l&@Hr|-v{SXqIQnCI*5wmVPyYu1aQ@~6G?o=eCdcd5p`;sLg z(CaX0^tM0JvFM!iJ)bIXumq+$@UJgCmQ)iQyqnFgM}qEa4bsh4Y9JXg(hc0EAd|3I zw#mFLc(dmy$oIs#l)%a!rODoBzF5p5^m3_R1my>q`|!fwiwp>%%R(?x$=)Z{)NP(Q7GVB%RHM=|VO$O=={^uxBAB&~SUVm3tMX8c{*a8Z<^ zmU4IhmCoHd)J*1RPxw6vhm%h5@iFTu!pk#0waRa9ePhOu8(qCpU_Nkc((Iu*h z(Ma9_vI;nrFli%rF1X*~oO0G|#yhZL6U;3wABr^O|G3V)D~tgqhd^!IP_Iq06f=BW zz?Be{Kr{NEI*?)W9>6�*Fe*uYrMF74I&yX`Gc|;OR=|M*Hrpc=Bq0aTB_yVbMr! z<(^!Q>b#603t9|`=iI6F&JvIZ-5-lv&wi(<4~-yP5kX1GaT*8%uZGbK;;>t#{|YZ@ ze3BV?f+P2{$9*tn=LxvN;JZzRnONT$9^XuHu?mX87knmn9%rVH27&Y=9G@i&2S2Jm z2ZNv7@n)JRBODScc zlpU9?eehu_9cS$eL{qOhTD1F`AxM(%da$PJFvzqEjXS1c(%besG?m_!yzyt|C!!47 z$?vPjcVL{be6SWB&+~DW&SAZAWDTCy`@si_2KDx_PqLDFs*4Vo0S?4yiduBStB+JG zt91kjLAjzEE;=#O)f?vE==29dE*t5y=LKv&uXd!%WUjX7fvt(IO&4ZzMx9tE*HGi1 zGYJ#snmrA^a4S!JvFS-nDp#p+G;~4T2Og3fxZuD@%dAOdyRP0|NWS#3VOyssov^NY zbcukxNh6+Y?0j%~lBKb_gVj~*(~HT*+4E58Qh4W+2Ww{PD~?88xWnHQh`YR!Ni~l- z?+Fb#$jJiuW6<}J8ojRhKhxux*g5c`J~SZZbFTzEJ(C}yIf(voX!GFH@qV1P&cd*-cFK+sR5VSYuP^qQ1^r|=jVKbeOBX0f^w#AYQ9bnKtNbvx_EWB)) z8pX3LAr6{ba}m2A&Y}T1u+$hiE<#k3B3Q`m$E%b z9tU*yLjKwu5tt7C2x-=5=Xhu!x}gEdn;!x<-{sBM1GmOi&bN8BJ7DC45LoB4n> z(Q~KH*KI0S1doST*Bp<((DOxf_%LC@;(F^}Ghf94P(?Og(?ZOJo62_gbB<6@LzU3l zxZhp4oiV8Z#>?Xf&hJG}%t$TPv!>OqbsFcCb+)z(Riu?bw$N)f96^lZhs|g0>>iEb ziT0pg={4J418<96WR~-2$*)b+%-Z&n7Sd$+?GRF~Xa7O5^ZE}B@MRCm(h*O>cktNg zZGN~~M1!U)A|ioL)5DC3ylm*tz)Y=Zqv)8R(EhIVO%9i3cif*YJr9W}G&z?$`t8Wd zdcvZTi@6WJ<2Kj)I05QcQ21kH!3l{}WycSzaoX8mn21XFFngu-(RvN4jCUjH&Z5ye zJUjYt*dNx0Q?!Q6qLJ!vf8hProyTgCJl%L3;|?x>|5qZ@)>~Gj;k^reNNVwx%sNfrcR54)@g98CmJtL2) z`o#!HREUU(VLsBpru^}Lp8-cCNUIF(eG|uLsr)~_p9(M~QN;648Uj=(m47Z0p^FLo zGh2uR$VyV#Z13zmF+W9VDwo-vekoeUTqP&C z{0rPKf(|8g8I`=qHy57n<=Ja94*y#OZN-~Afb$;8XC>XtMY~gB?drWd*}1g}#KLqc z_i*yD-m86t5nBkO_vfX#n8f>)-MCGX;lOiXf512_d^Nk;05y}FK`R~WJmr=Yv zM-vnfkKFP7Wxq2tKcvk&=#|rfV5IJyTHZDG#rYcUwe(m|-}8R)f?+T(bVG>G z%FM+6Sb7r2-op+b_>tsOY+RL?ZzmEWdGTizzZ{{cOY4uGHQbbcTyxcr@<1Uy#pzHV ztCN}j&`=);9xI=jg$0$!r})Z!ZS5Mt%;!$Jxhri-H?%vbd5wVsLEV>iMO5$X83;!J z%Mt!LOzl3Iv7u}VaopJ=mJTD2p2`4ic`pM-EGwsDVE1Jyq*IY1MpMKOH_9*rcW%Kq zLbvsha?A?7hg~{sUTm5|Xo@#iFttxmPvr(J{?bk;k3AK$DkC9n8h$Jb9OB~RCCFDV28r^xcoaN{-~Pa<-f|sim`r)Q(}QU%?7HC!qDhnhs&IQ1~erQZ&h1Q z<_)kRPxfy|+FKVXqC~_cw+kbw8{VU2r-PYS*ve0l#>hXoJ#tN)^GBn$Dhqrwz%p~S z2vbGEb38Gk*dFVH!GCij!iRBa7(nX9+Da~d;)6L&5rvJJ#CPG3mfM2FD-|h#^mBhk4--;BxFRCgn8+12QF;p~R!Y zS4;!>c+=+xes4G|)p;&X5HCe>K+Sm-t|}aLc)Fin4d6NS=6HDk932`PdrF`d<#WaB zd&XcK&<-C@4FBeuPhB32|tMc0+~ zYHu`WMtqhR0=@7B-vA@eza_F){(Q#r73b&X3(5)c*Q4oT5|IPO97Ba-Y01f5$DV^% z)%etrY+h5RXClkvn_XH0?=0sEm*)5kN&KrmYi5fYASa}3(MZ$ z0e&Ew!+3r6U~dq*SOBMYLbPh9LYGeW2P~~Gd1+0hHEL+=Gb{e%DAITws20KaY7fGB zouG#+Wxr!ORYr1tf`YLz%jUu8Uqu)fM+`F^S!>RWna@1YCm`T@(vx!aZKyyrvm~_-qwI}Ah#-hzM0Q4P!Emv zEBIfLLBh;5uo3Tv`W$*V-J2UpK8E9}vZ&XwZ$CyHzdwv>#5YGI|m36heLXeH}@|Fa^+@%r+$w($YSrE-EznV_#E8IW%dDrdT z?$zAKAqvRP8VTZ^S-?@_pH5RaLyu0DNdKk^y{7EGtbVwy{%|Jbdh&u&uKuymS3p4r zo4)Btfc)cj?4ZiAVQf*3A?$9j6$iL$v3MM+`tbP@X5xWZUjP#n`W4tgT}=p>F0&U+ zzwWS@+^()ivP+OFbjuW@y(R&hy9hE({KVUHbK zUjORiwfMcEx?``-I{E(s2+PnX#3p~)D;*8VP!c+?NIYk5UGblX$|H8oYSq5jj9UoE|Ntk~j1#~4)&=G;`pYI+H=7=O{ zscp?IW~s}CW{3~gZ((PPN%&yfHM@8hwW;||)GQk|@+q*vt%Q6xTJBB(h;~usU#H)c z&6%7`fxoitY)R*@HI}(F9(fQ}$R!DtsUAmh^&1o+YiN8byz4Eg0|6E$ZjDuwuZ6DJ z8?O2Ipzf?q6SiPOvz5Sf(8Ar&YJh;Ly< z`yu0|`@0@{&mtIp(q9^bb(WtHD;%-jm6AwO9~&5`e#K<0=q;HR^<^TC{}c2x%3cdL zytn1e_7A24`k~?7N}BKG(eSWs%wM=H|-Sm1w>CAMdkh&`FUx^{9vFt6n z+fRi!+wEuEc|{M~L`HIUUlQ6khH>^hp)C3BI$xctMzxcO^oV5o#TzuE;~P+W_+k`t zmYtccU`Dt5;Xb%Oqx-Fb37i7F5gh_fF?MlWPaL5hHYBrX$id%hY zugsFFdOVs|K7mEvAe-?-cl+ma@2R#DoOVL!g;^l%8Vl5dyjoMG=@?z6D^cg;_7aoD zt?=mC*cATfFwVWOKXcaoJnuOkZ6|*HzUpQoM0@FfGL!m>(FS>j zK>LiD4zT%K)a!zkJoQy*>%xD;?&+uHj>dKC3Q>XeYO35uQ?AiMjM&; z>H{81ol#HlwoE43`2g zLAs5@5=A7ZJ;fO~73$!}4J`s-KBD-e%^W;vbn;JtPkaj&FC2M;e*C}}^P=wtZ%}(T1chuPSS;JF|*Lb&+Rm?j!V(Fz_G4)UVm#;Yv z3%t(PbDjgytYc@1mN~a3MNG8@@fhPJXMNXVO?bO6XRJ_NS#zy5BmeCwP$c|AG5w$8|Aoe~el)_A zyXBU8s}?$4{}<&|i=+8pMAZLhAo zH8s>pufcW;`|npV==dT*dESV_;Cy?&NmaF~qa8+ac#sP@1=lqC``J6pRbt6W|0mxl zArT|oaKBCwpn^&b-wL^N5q#{$KvVgPT2Uj<76}~0_s0x8o@M_>zLw0l>Qxs1>GuRK_}v$c)|2p|Q>V5&W}H_j zjQm;KZ!JVIXH)t105|rIS<0|EFnBRYW)t1*@IcK#<{Cmr_!qGa&W?|)8$Q#9 znnSTxwG&j0DIkEpjeo$qpKI(xiktEc!!R?bvt(2S<8u11s%QOuYsDrr^1ymvJxy-* zq}@$>L-8UvnXM2oxb)t6aoC-)w7q$T&wMl`M|X6k%@l_D@BAIKGT_Eej}U}RyJ=F7 z#aO7~kf-NkK2mk8u!c1|f``SKo z+mpk2k}BN1^TlprH`V3Njn%o{i9!^wO3Wg4uH{ad6UJ4&O~H7uUkwknPmg!~J5wyyg>HYG_WJ7d9w!a??$6PdsjxvgawJJC#jqIjF*i z+&aEBPXS|_pCqYDVS<`?a%5t2wmxvBAaDKIi8)Q5iG9!>i*xg`GnXx#nsNavdRr%O zLQ=cNH3$}|I~aAgB0NVrBLLly(s2?> zHG<^kkMNq5e(yu~&ynAfelN)Z*=_{ldN!?$2UM+2gnur%ilFWRG&o8wT7@5|%0Wl; z?x0IGEi6}eKBDVG?BYEo$%L~!n31(YL;xam*7e84x2gYfKwgviT0&{!ZP#l1chhK) z$HV!Tvth*ly1aO(8L$p()j{E7b%{e)v$!oyqvj@M)+gt_Q1nsp(U(QojrN3@(JVlW z)x&u;-EBHm`0bRNF(2O68}m^>;c=ff;FKzFMn;U%1-tO6oF?FIF6wUiWweLp_89{n zgD@PrmG1&`9~yaeK6d%#Z8U(*Z=QiY%^(6Hd$S#QvyDy^UXFH)O@mE9=wf6~oj0O! z#+7gfHcwHIPf{FK%Qhquw2;VbEEW{%FC{2Cy!)}ooYD64tGcea&4EHS(~~bL7dNAC zd&LB^f{=P9G>%|Di}k^m-}I)wJQyn5Tw%#n7d}{Vzw`<$u))95ehH-}y|P0nNPrUC z<@KiMZwaw$;+T%hOQG^UFdCA{lCikD7BBOnkR{5S723-j^md_LVb~beF3*^M59e(k zdCYz+oiMIg|8W11*;bMAgKRG?kq0e1l3`fBrv01x$BKveOPmieBfWk z>?>1)pVH_Z9D)AX-74{4f%kOmjhYzUpZOcfZhL4Qj>!QNkzfu5uk z&<>~AJG~za;}Y1b8p-6*vEjaxtiM@v^<*rCHdD)ffS?k=a>W%no&6+65e8GBIoUz# zN6AyL^?-&9EmdZwaLk1Efge2=`$9Ek8&7j(GH|kT`}g$^E!m6kneo175?2iO&$&qk zm!={~MpGp=op-C?WIkiv&2#wJl$BfTHNLG#Z^ zq+D~Nw^z_$+YtzJD_wiA-IZle4Cw=u&Xse#T2%oesBe%WP4*#()Mr0~AxNYeWavlX z894%_E;v>eP`B|R*&Vk{G7e5Nurc1O(vo=QG-YH6OfdPSX7@iew)==bzgr2Tt~qcx z`}BRB;a$LK#MQk;_|p@zcWhE-Va?tx|~L_nT<4;OHxu+}o>UY(!C#w$yW7OpSdNWdgg_MQu`u ziJe59OK>K>(AsemGrTK9{<4!dWtw+{l8NOho8B+T)RwPUu5(Zxyg>Qh?}uIy=rpY( z*Z&=OIF-~y7bb3j65?!M-&Z&A?F!{9R;oIlPv>s9}viH<2mOryn(mY@$^5WVa&*~s9{i+nuRqfq0FW0XOC^%VCwpMoA z1D^bOQuzm_Duoj0(s}lrlc8-JXq)%QRQK7fNpDN6+dO2y<-G6b4UG?=?|do9d&2g4 zQKj@VQb&&-9E3{hC*q0EZt-gh=8MA`*Q|Mb)QvXzLFo9S@k*%6PZ^0kvc#GF@))}z z&PSvOcVxwi1<_BJjK2K5c+043UsJ&&uK`a&`StolmW98{CiJ$kR_8HzS-)Efyx_0z=iXCHp-m zIM9Q%7*`rc=2X#=q4Yz(XD~Eu5c|qmY;$q&G)sF``g%Dsa=@#KH}qMxW}ZDFW3&s5 z=pbM&hY-&_Q0s$a@bWW*k+eWlwtU^29xgNGq*EQ+#ym}o8w^nNn^d~uq! zN0iAAHJNljs>K(75q+Y5cCp%NyvFDb`)}X-)V!RWhYGn;_}{NDR`s*5y7hkxm z23ViPk|tg>__KIKml(uM+<_IGyHt_46f?sGQ@mO?K}=6j<98?Osy?TS=eKWMbep+; zQzEXEe5!>QF)grn-{!1+`*vz4dWUc+v6W?d#42rL=<*3+{M*J#R-{=uW*W36lQikA zW5I1j?k#_TU;3$_y7 zP_4`8F;Y05B2A0OFE1X4v+Hr-N1Fe1C-F*fM(n92MutHZ*E6C+V6DmAeen6(DR}yA zMyHg`nXIEW{fNu>EEF>>O|f>R#jPsikG`InCt9FNmB*?ypX5c;n6WUy zpS5&oN9ikLktW$f=Z;|XLtT&c5btnUMK`P)s&Re&be`*y6UH&HK749Pl18uNX|u^J^X=n^Q5kYbZ~q5ijD9=@{=fEB*EezQJq)sfgU z)1p1&$Y~Bpj$%n4N5_(UJi_aRWUyi2*YRPGZL5l#A^4K1bnnzcJ9p>*7?2o#E&)3s z^kEg-8GF8mGOLYXUh<=EOu+JNnuHLk1sbEYz?XrFDPupy7TCW!dLu!Qza>puh{E{6 z3c<7EiLYhOKazJBe#KwQ;RRpB1M4izL~Ib%53b1*g0$+0Avo(Zy2N{KW8fwDe4}*a zU4%JBG?kXuA4RYU@R$Id6Pc=ibP>@Q2tNWa>f^Ig4mkIGA9WIAGkF#I-8kdRZZ2{3*>_RO(v< z>ZF^eRzH*nW95Gy6P!ZgpilSayZBQa=XJsIhZY^COsC6g=j1pi&!jebDj;FFyz3gn zd6&xf^UQiaw!VO)uz`#p0y(0L)hKTQnUy=7lC;|k1t?ZGl>UIJCNEBoE{(l? zqfUd=a@%)tudy@<9p)vZGB2K};luG3RmCr_iY!wjC!*B|i(7G6#NOiJ(%XDZ^R97g zuG#0T{bKSHN_O9u-eZoV@s~cxxJY34M}*Cw-PJ*n7eUlx^s4S86zJC3mfg*jZr;r~ zy48)+pt!aB{WMS7^CV?qv6ts3PM-^Nkf|}J7SNg{RiulC)t=Hgvj?-hV}fH~w>QIQPu<_7Qq5k6ZYBo%HRWuri@B`I zr&PW{P@uQ_>`(%3hR1A=d*$HuS>fW6r5)@$_mU(+s9=w>`f9wigtI~@Jg zzi_j%jcTuSmmkGXcCq$p6lr*&|{QB!{wsns3_BO%CR)F!5zz!-T ztdMrW>K!>Q?V|LD9^RbxcLe$0ig@OP?FLtZsoh6y!X}W0TRF|Po{IHvqy;%{Fc>GB zy1uKw^z*(v;GE=eP_&Axi??Q$O*C4vAB`KfOlRC4FNOi7nu3=<-+%(2pCD!cGtzUe zX*s{w390Ae<+un22w?HrTW;l@ttl=lTn)IqeS z5xaJNTuLAkW6zie1@q_1+zfnk?=L;8AefGQ_Qa?5MFn)SpFF2LDfs>H+&?>@?pv}0 z=TW=UR3|h@HYHeRKRYCrd@A8%ubGS>>OQi2S*sOCh#H2<>U^{%M78xcE!R`f(B10A zP7d9Y51B;gy}}G0PXWhjCcmcFzcn1HOwNWGt}n8tK}HdOQ$Gax$N9^)Qc|u948lop$f^GCjtU2_MR0# z3hA~lBG2%XR)M4osaTZGBKyiM#aovc(FU=%h}0dY-;F~!hr3*hznw0dQV$t1by?z5 z>hxWb-L`A2KbKG8hb?P~jJ%RKG?NNnrYZ*eHHEH-czk_AKvFu^d^n09f|$3N+WVaw zYP~`szWMpOm*~+|JKLOl>5c`H_6JH|?_E_P-QC}82@B*efu`JZJ$(nzHacED4W2 zh_cd;&uWYmXk?aY)XH0S91Mm-F}I_I4g^Y+|5Us}P=W)2%3$%TIp$|Y3D?*@iYmtZ zKl$|lo4DK#!uQwEv*tyP{sJv+Zx#4;j9Y#_B;om<20x?KmIDnVlXT+x;6|>v9LfEu zqp!|LRuQ{IVTyvJWCmO`?V^4&1X8ELijj$BsWa0Jd9x{gu6t_y#`A!e2 zN1s!4FwaeEJPx%`iMfVeZifiq^Vo354gb9GgK%j$F9O(Y}ASy2V3sRA(|QS1i{awq(;InH=h4f2IQVvj$BpVJ{i7&#a(l$u zX(MXvUzu3$_!(Gi)u>)0_(IO2)oGabB3f(Loe)EBROXkrINymtwm&#dQ(Mn=bwOaS zyp6%2Jr`yEGg${2{P5Kra7;r_l;(N$iZq!MB zI9C-0R6PPqw#m+grHW%&-%7+qEBBV>h{{d{$OWsq^Xrgi4vVH$CM!6g-*hRGO>S)Y zd_y}1QIb9IGSCpT)-)S)deRUitkt1OJ-IJy~5V#o&^ZSR+-+oZ7( z^VjzjjT^4ttAP<(?#Bz<`~SBaCFgNtr;sh)fW7z9UI?xZ#C|sCgZ(WRX)E-a&;gn@ z?~Mos>XW%nFc@IAd$k{y4{!p&0v!^3{tsM0hZu)(7f6RC_1o0n*4Yv5y3EW>l#{lV zXM#^tGsN?!SXn@SBC*uEmRaMos*wz2b%(OSvBl@>h z3rn&eIGHRMC=H`T6nnX<=JEVaoQ&ry7ML5?G`q413&pQ)Ti7|reEL1M^~wf{CTh3E>=2S+-(I$hb z2MrqAo?;!OBml}l3V_5@B1WP>vZfc>z$`6)lF-D9WK(beDrqcK&Vh3&weYv=pR}OH zR;$Ua=BTyw(yz9me<>e=URCAYA#1OEsxLDpQ{DOr7)|Z_IbBgD<=4{d53NIJnoSZn z-F4m$C>-uOYuDpSnFyeA7N|n}A*1n=C3tZtV^<1&>xn6zPdlG;4?h+pHtJZ<$1GZ& zp!o>ZJ`ry4#hg4nY#avf`SBV+YA$r#%!{&;u0y^ix^+678!mZnAnS7&kobCsaSb0r zIL$55TG)hxs~C2)ir=5DkmMZ}x|tSR&WYeGago46L>1u&d7El`qKn1vWtL&3us z*LA}HddP2xku^*f!Oeyo)u*8PZ5ar}X-5ndxyUNuFL}cl&W!}+ZLxd=1;0)1|fRq6Bvu6So7pG zI_Hk3O$BJd#+QXfOR_})T2fbTGY)xdJJVII9_Te>V>Pt|ajt{LkR$6cTxDhUOAI>G38L9Wt!ehf| zUTBKr-B*o2LUXLMcG~^)VCpBf=B@0sy4vBYA0JJad|Kylz9Q;_D@8hBy0^v5;l1R>n>jgQ|OLNJdCmA02Q@SW4_f?uBLSVk+ExBX%+W2q@VEJK9|y zx&S6)Mq-Hcn2GaP1K~mm>3ppE=VmyUCWG)6w>#7o;ezC%t0ga)-VtQT&?45*2^N1O zyEn!8QQv4tMF_?B#rZKq~4T`UQDB$3)j7h(oyg zT#rG4X57|1ZeF<}aMyKvgN(maYn^1~F`H98SUFY~y~J;*sFAT>Q%`2iLGqpfyf-2I zuzKD&aPb)b1;l(?Z2ewVA%Sgt9RFbYVl^t9cJfVmHDQF^15=Rf%B)N6fr+Oj+*lbE`^HIa3(-um zt1c#EBjN9|8TbY1%|!SgANP%2!gncb&-s(#k+6sjWt+KqkJ?4oGUx)8H*l$k9p> z%C~hiYD?KgUJ|TI5$3Dl$Br!?^KP5jkW@P~W7pR8Sd(F-vK3S-tu=Di%M-c0oDPOm{W>OJR-8998UW zd%83bohAs&f;!xB{#bNx*h@t0tS3c?4su*G$o0q z4}3QNsdZN(yUSv?rT2WAR;R?Ea(ytrVq%y`I1_8WSNo7j``L9H7pjz-!o+nyoDJrA zYwGUN>4`TuFj^h{h8-7Nj&(!QI45@-Tmz#h$%>Pyu0KU)p*N91sCFN* zY<6oVla^Zi7GsS-)K_0aQkOs9s2_@wY-gszCHq5$7F-O8TPVsCDv%iAu`-6o;`l2Q zvj=PayO5n8J{~Gj{;Ul&0>FwG5JcKmTr4R4B}5@q@=$*Qa{7&z7>DxJ+0E zKlmB|j7&{q`_ub}YP?n64~J@eWiuQyG#vaW3c7fLY(BW61zCjt6?`dx&xzT`hoy^` zJM{(ATNXuA6Yj_Q$VvoL1JuQl;zX%nyj4}OXP!9&a0#m6k+jA^yg6~sZx++q#~qH;CU> zshtkHeV*;gpBOV)R4G}G@gxjJE~@)Ycg_1wusva1?!zGPshV&r{#%Z2Tm$Q*R~#E!dVn%U)bO<@kL&k*sL3PvDmeS)4*;r+HT3y z@E-{NG`rt|%7P7LV~TMOU14!|y+?&)7a73Qs6eHHTfj8LR-9bjZG14|9 zn*s!QjjQLgZQ`sr>YkK^MdOhAuBfB^X8;5^XUG_Vx9a0 zOL{fjoxIJD(w)GG!;ry{f;=N|Vuu+)1w9R6NR8!Nt@Cb&b|X6nMT!185x4DcdrQO~ zwfp+53uKLMm<&qM8szX=gA&``1>?R(VkgWaTAtbaLiXL<)s)tn^E)h%RW;yCM&J1) zUt?9-V`0;l^0~kVI&tZagwqiB9>1ygf3qgQSi_C$!b-08V ziZw!n6-3cBJNwDMM4!d<1=huX=;>?*N}%I+jHMCmsf*No7wfJw;%>Wo)^|T7S?b6 z2)~hckwRML06JH1vxbPX#QM_EhzI(#<;g&OyhG5-sN)>d)`a-f<^R>)bw)MaH2YXk zA5oFsK`Dx;C;}q=K|!h@AjO0x2mwOxk*Yq5^xm6DlM*qs2uPErvAN(V%UHsyr}OsH}7aG-X%nDc@8Uwc`fbL~3 zW@(ViM#S*!b2F{|0qDhcZpm{(+^w=Q#SBFhg>V;G=$(=i{c0yW+dsyBcsCn}Wp-|R z_}UA0ir@Fx6o2u`M2c{WA8DY`FD8UQS(~w-xyoh)#n05c!SrlwExe-Q6ct5(w>-94 zkm_z946c-6X04tBI&g^nWb0sbj&RF+F2N71m7TV114aGCp1Db7VKNMj3odUoj!EeD zKMhgpx|LWrDG&#)oIW?ooZrLv?V;~Y(geG#t^^Lbu?`oWPhu85$;QHQUY~vS>&s+` zo_`8mLZn#@e{cuFHhY_2E`7094j#t2Ys6KtXfm;_PsrFnqqk2>r>%! z2BITGd<)%JTSp6jw&`fHOb;!#3hM{&g0mjK_-!*z=n-LaDag-v&wpd>cOXRZ_F>-c zL`o6IKo2X^dFxZ3Zv}Oa+hqkWRUN;Xq?5uiA13r(bOx(x3U^G}(s&P7Nm^{EQSPfM zJbQ}-o@UP6QS8s-GFx<6*!sjz?iYm5K{+b7#i*}2UhFHjxIty~7FNWt+VD|OWPB!6FDY5={Z260na`(_9Wwzcl9 z4z+aMIef7EgUh7p;k%GE)wmOo*o4MwZ_&Nz`*)=aKF2M3u}F-~N2_Zr7RNeh&J($+ zgRa-O@*7_7>M-%N?d2z%pA~&PS$|wIgm?x>=;tPo!)|D)s*T@XaMY##yyHC;Qo-9Xq_`JI=}T zWa!sv-^s|NbIbRy+exM*L92FkD_3wN!PA$#9b#NA5uyV%_qH{IIR{;0#n~$NWIMOE zb+#4HFbvCDmXV}(XWpD=Fyu(9%#w0w)K9rDPid@NT&@k0Ky_^8*n3mGG(McoO{6T6 zR*|eE;ovifINJ6rAJK>DYsV%43L~Cj7t3CPnjWy<-c;IMTzjlQ)G=0<-=0>=t~r_m zpQc;&JmZSFFMfHo!>TCKXM*n`yjPH9?%WnEanUxXv1)mo^8-Doy>3SR7}JwIZ!NqR zRC+dnYLz~V>_WW9qEaueE>8?F_uQ6u+sO@*OsAVCX<*GbCF=?(%Y7mwOI-|>AVGdX zw^72TXu?%=U3Kchm>vYw*DDV)#xu%cCDR=2QVrW?leXiDQhJ?y=_Bd^-@6RZPbvir z5LX6McRx8m1Q>ebfd(Xn3K?8tBiHs;nG|&%@hU%@MH|v!Gk%jT?Xl$yO*s;wc1?`D zpi>g?s3%%GoO-)z@<^?*@0#DcxHnH-y#zi__}Ypj*fFW+gcvn7xo!qB&!)>URbs3p z8RizKUsBU_Z;YCZ;kw!WQfDVGrC>*|mY7f|H9UUn=oA^{Yw8K4s|dx{Z|AB5wrvf+ z!ZS&OQ;@5>QGh{gZrruM{i5=^2ls;%kTQHeGnd7L$3cBI6eayX-P5j?l1X zDR$OCj7M`i7WDrg`%dVTN}?gMd+nOh?9;khJ15ngu*O|^cRA|-YN<;qNF}lp+|8n1 zw7ttf?G~HbR5ZW4Y|rPy{q>lS!jjRiW^BMV6WQ~%!kne(wexG#^(fzORk;cpYaRHU ziqB>YNXwi7LWq|ZK19;4KaGa)TkY|uMX9h_LchG#g#QP*zU`@hiGvejp2(jvO zdv^{)Al7*U6Q>}MIN8+^B2?wP&|tm$oh{!`07?tFa)ZYHs3tOm1B#1f=Iw2j&j4^7=5d`j=COz^hlUYq%kQDD?6(wS!lX zcPCiDcl-1~2&Cx#Lo*TJ|B8R;zb*)UNIo2A2>@cge!V~80)D3D;p2O7i*E${?(6dt zR}uy@=U~~OQK{X_v}^br6r+-F9OaT7OxU%2wmd~1x%{stJY3R>Yxu*4NGw>2g$2|tB8+CKC z+A(pwGTUJwrJ$(j0;nLpYvW0yeM4ncUqBwd@L*u#BACN7+gkL zx*#Uz%>J8KV|aX-*_EQ{X-j^UVDsJG-Gr#K?jWHfQ4#>UWMpQFa(gi^;W7FN%o4;K zDz-vtx_mT{Na18yTS5Uyb6SE%gIgNO5gj(QXFa^VaXY#QM47yT0?DK6K>U?+CsVDuFtX8dccUUCS%l%aDxNP)!FTbx z24jC%*DRWUbYbJ?b0+1_^z^*E^Nk?4Epg%9I|(p)QlSU)-O{FtSYsir`a4&Ee^Hl# zp~MH2nO4*`=450HuFiJ#`I3)Tj3R#H$G1M7t$AnJ2n8ocSzdeJzCF^iIV$w0n=L|r z$I)MD_a>+5*$A|&m95|YC!+3iwY>C!5CUhQnS!bShS?7HW*Fp_>jS_K^Ruxk!CZEQ zn$?yUiLM7-`TN^h5#?t)!ObsUzH~lhA;xwC7A`ve>@J+q+sCIyWSoi(0||hOdOOG) zPmJ!~k>^Z2n4^|Y!kU3c!GxF8)EFOU5=g?560xKqpj~~;q5S;(JUl!%Fb_2@YTrEz za=exF_v^{X$jsHeD=E1Iaz093SzK6199@t>tODimQU+@fko7mz+tSjEtKQ6va}za) z7ZQhBgxI6+u6gn`6DmML&5wMH`^7>#qCo2Y12Sh8IpBr3|5<$dpSG~89t;r#VtVxd zSV0L-u-KGyu{#JSryH2lOiVqbHAjE{G3vzTD1qRnU?RrmsbqDF&vJ|rSfzbo6Dlje zGFZC;@S*(te4y0C01AcjE_Z=KNhU1kdTo=*$<)`^2kcTW-XmmdD7Un#%BZca&7N_6W##=ltLAsDt*Us% zC`d{Q`*zn!i^K29y;K}~{k|4jKeSf+F2r%_7<*)gw2X{sE;e;|=T!o3eB2S{-0@|Z z)&mw4I20rXxHWF1e6)0%b~^s2`IcX|<31eClK0U@o9U9Uxmc%aYd5zF8+6)cYCnM5 z^8USpT-*5iH4Xsw#A7lJH23{SU=GiR-@iU}`%)dSU8Uvaz?7PR$Ih6y8`k|$z{g9vMK<@W8pvNPVlgGJ#(J;bZ|7YY{4qK}ULC)zb z8&K+4`dlv$Jko0Dqm4R#geN;)3Amsk&4bUWcXo-Df!gyf-E&f>v#v>nHT=ZoX`yZz zm&2~cIy%o3ttXz8N$T|bklEqzIca2(JDZzp)Jyn_g)gOKc;K}97ui96Khj-Ld#yS4 zaZwety#gh@8ROzz3=7&AerO(0IY%c!5p^jz#69FqR%$@b64b{J>atvc8)y&U6_>^v zeWN=U!E+|xdC9KNbIi(LkQfp=4Ftd98wEV}4{UOUOrA|p2z+OwKRSc*P&Au&C}MZD z*^6deh0>c<5S?djR5+ikVvwMCcUOEkSzBE8uvVLVP_ucx`z7WF>?L`2sCB)av?D_q zVpj*2Z(Q-MMChaJVFE*Ae^;i|_88vLLFtWN#IE%eHygsO;mDi}xpu52>XpKqG3;e&tw)%Sy3 zA793k71y0>nS83-d1OA7H)1h2-g|MwgFju&@Q#s?;#fK-eO)`Dj37?IX{De}sJU>tyhPLXs`#UP~*Cl=0?|f;yCo1l@ zwANpJp*#2bvz{%dU5Pnp;Zy~jXCr+|N?)wmFO1;{kR?>~9}rf(zy4jAF){x{V$4*A z?#DOPS!zeE=#ImGG&SiiRs|P!^M6B?UCFI`IGa7scV<62d;Rs#cpF)j7dxxM zGQQr62!nbEC-OAF3hI{?FA2}wcvd-;x|Er}$de`T_?P`Z?chqzSu9Itr7Q%C)5`>Sg_OHd<`@lSYXyVc&=8w4iM zE+q1FBnkrg)yXACPmYPwEKN<~nj)V1JW^48Ma&bXp$sd_*H7XSURw$-G}RE9N8EFU zmAq8@;P2FwXB3Fb&rh*HM2K)dn)+76l3WaP|B>fjagDIZ`1)3V14%VDqfctzM89W~ z6k>+N35LsUOvhsLWN(z98@^B^kVkNsJX$GMj z7mIvaofm2l{%kIYh|*Dtz+@>v z<1OY^diM>`6(!*ILy=M@d=l{zg!fVIQXF(K!u>~9C}0-&r_N;~yDA;J!W}K{qj_$A zzOhGe3G&x39l!tP7xK7cE_t{|s&w4m>JV}?2kMhV7>%c&XiwTa;ph4w%!kV&@KIuh z3$M#%?O06GhnQM?kQ0=3uFSiqzTPvaMsK;dsVPt!7CYj&Ge>_WCTuEm%b?(8N_6d} zFw?Tul{6bgL3{+hPSI}sRq(xqC>&cXMauM>kO){`ee9hS<%p=Zl$wxCw-dPf`AE4K!m_EOqoZX^GSg*hEb#Ew1L>3!;JE-(OXc4PseRD_{jbJm zs4L!wAfY?|(J=6pU{i6>Fy#M7(5Pb`64D%~Y?aq@AXdu_42T33od#b7^UAtDfWb0@ zcV-1SU;jH6Zs8YZVYCL@H4r0$2SjMU3rb7H8$qId9svOfZ^wgL{)Qe6XQ)N4*{cgN zEA6fiJy}3uPFnnX9~sA?`dtVOZXMwlh(!ArxAT&AE3;W8*-n-KOjqSxeXyU~8m{Bc4uD*((wJy%L6$GXc9Vk$Hdz5D)YQ zNc0=vcxoqbi~Xiznv+E~HZ~l=HPfxN+`aNIU%q_I`gh#f!=!5S6okhMOd<5=A|+*I zi0LlIu(tZ3?b>~OfwX0?E1RnG(g6EbS%N~y?~mZ(S8-patPTrf<3UHx2}3g(XJ%TT zgY7AJ0FY_|mQ=+Mvc??Qu|BmNEIYT$X%z_4_ZbnNNeIM(L!Se_xSGA=^2gMUR>TKF Q_dn56*He3U+xpqR0OB{#5C8xG literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md index 269e894610..648703a4d8 100644 --- a/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md @@ -9,8 +9,10 @@ ms.sitesec: library ms.pagetype: security author: mjcaparas ms.localizationpriority: medium -ms.date: 04/24/2018 +ms.date: 10/19/2018 --- + + # Create and build Power BI reports using Windows Defender ATP data **Applies to:** @@ -122,7 +124,9 @@ You can create a custom dashboard in Power BI Desktop to create visualizations t ### Before you begin 1. Make sure you use Power BI Desktop June 2017 and above. [Download the latest version](https://powerbi.microsoft.com/en-us/desktop/). -2. In the navigation pane, select **Settings** > **Power BI reports**. +2. In Windows Defender Security Center navigation, select **Settings** > **Power BI reports**. + + ![Image of settings Power BI reports](images/atp-settings-powerbi.png) 3. Click **Download connector** to download the WDATPPowerBI.zip file and extract it. From 133b3d0e98f3b76b8a98f82158c38f2706c53ef2 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Fri, 19 Oct 2018 13:49:29 -0700 Subject: [PATCH 07/25] minor update --- ...werbi-reports-windows-defender-advanced-threat-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md index 648703a4d8..7ec82a7bcf 100644 --- a/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md @@ -124,7 +124,7 @@ You can create a custom dashboard in Power BI Desktop to create visualizations t ### Before you begin 1. Make sure you use Power BI Desktop June 2017 and above. [Download the latest version](https://powerbi.microsoft.com/en-us/desktop/). -2. In Windows Defender Security Center navigation, select **Settings** > **Power BI reports**. +2. In the Windows Defender Security Center navigation pane, select **Settings** > **Power BI reports**. ![Image of settings Power BI reports](images/atp-settings-powerbi.png) From ed6d9f68ea7bbbec4479f711f2cbe748242f9a74 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Fri, 19 Oct 2018 15:03:29 -0700 Subject: [PATCH 08/25] add metatag --- ...anced-features-windows-defender-advanced-threat-protection.md | 1 + ...best-practices-windows-defender-advanced-threat-protection.md | 1 + ...ting-reference-windows-defender-advanced-threat-protection.md | 1 + ...vanced-hunting-windows-defender-advanced-threat-protection.md | 1 + .../alerts-queue-endpoint-detection-response.md | 1 + .../alerts-queue-windows-defender-advanced-threat-protection.md | 1 + ...portal-mapping-windows-defender-advanced-threat-protection.md | 1 + ...-portal-access-windows-defender-advanced-threat-protection.md | 1 + ...ck-simulations-windows-defender-advanced-threat-protection.md | 1 + ...investigations-windows-defender-advanced-threat-protection.md | 1 + ...ic-permissions-windows-defender-advanced-threat-protection.md | 1 + .../block-file-windows-defender-advanced-threat-protection.md | 1 + ...-sensor-status-windows-defender-advanced-threat-protection.md | 1 + ...gation-package-windows-defender-advanced-threat-protection.md | 1 + .../community-windows-defender-advanced-threat-protection.md | 1 + ...itional-access-windows-defender-advanced-threat-protection.md | 1 + ...igure-arcsight-windows-defender-advanced-threat-protection.md | 1 + .../windows-defender-atp/configure-attack-surface-reduction.md | 1 + ...itional-access-windows-defender-advanced-threat-protection.md | 1 + ...-notifications-windows-defender-advanced-threat-protection.md | 1 + ...e-endpoints-gp-windows-defender-advanced-threat-protection.md | 1 + ...-endpoints-mdm-windows-defender-advanced-threat-protection.md | 1 + ...ts-non-windows-windows-defender-advanced-threat-protection.md | 1 + ...endpoints-sccm-windows-defender-advanced-threat-protection.md | 1 + ...dpoints-script-windows-defender-advanced-threat-protection.md | 1 + ...-endpoints-vdi-windows-defender-advanced-threat-protection.md | 1 + ...gure-endpoints-windows-defender-advanced-threat-protection.md | 1 + ...e-mssp-support-windows-defender-advanced-threat-protection.md | 1 + ...proxy-internet-windows-defender-advanced-threat-protection.md | 1 + ...rver-endpoints-windows-defender-advanced-threat-protection.md | 1 + ...configure-siem-windows-defender-advanced-threat-protection.md | 1 + ...nfigure-splunk-windows-defender-advanced-threat-protection.md | 1 + .../windows-defender-atp/custom-detection-rules.md | 1 + .../custom-ti-api-windows-defender-advanced-threat-protection.md | 1 + ...ntion-settings-windows-defender-advanced-threat-protection.md | 1 + ...torage-privacy-windows-defender-advanced-threat-protection.md | 1 + ...-compatibility-windows-defender-advanced-threat-protection.md | 1 + ...able-custom-ti-windows-defender-advanced-threat-protection.md | 1 + ...e-secure-score-windows-defender-advanced-threat-protection.md | 1 + ...em-integration-windows-defender-advanced-threat-protection.md | 1 + .../threat-protection/windows-defender-atp/evaluate-atp.md | 1 + ...nt-error-codes-windows-defender-advanced-threat-protection.md | 1 + ...ment-custom-ti-windows-defender-advanced-threat-protection.md | 1 + .../exposed-apis-windows-defender-advanced-threat-protection.md | 1 + ...ine-info-by-ip-windows-defender-advanced-threat-protection.md | 1 + ...ealhty-sensors-windows-defender-advanced-threat-protection.md | 1 + ...or-information-windows-defender-advanced-threat-protection.md | 1 + ...related-alerts-windows-defender-advanced-threat-protection.md | 1 + ...ert-info-by-id-windows-defender-advanced-threat-protection.md | 1 + ...ted-actor-info-windows-defender-advanced-threat-protection.md | 1 + ...ed-domain-info-windows-defender-advanced-threat-protection.md | 1 + ...ted-files-info-windows-defender-advanced-threat-protection.md | 1 + ...elated-ip-info-windows-defender-advanced-threat-protection.md | 1 + ...d-machine-info-windows-defender-advanced-threat-protection.md | 1 + ...ated-user-info-windows-defender-advanced-threat-protection.md | 1 + .../get-alerts-windows-defender-advanced-threat-protection.md | 1 + ...map-collection-windows-defender-advanced-threat-protection.md | 1 + ...related-alerts-windows-defender-advanced-threat-protection.md | 1 + ...lated-machines-windows-defender-advanced-threat-protection.md | 1 + ...ain-statistics-windows-defender-advanced-threat-protection.md | 1 + ...le-information-windows-defender-advanced-threat-protection.md | 1 + ...related-alerts-windows-defender-advanced-threat-protection.md | 1 + ...lated-machines-windows-defender-advanced-threat-protection.md | 1 + ...ile-statistics-windows-defender-advanced-threat-protection.md | 1 + ...ons-collection-windows-defender-advanced-threat-protection.md | 1 + ...eaction-object-windows-defender-advanced-threat-protection.md | 1 + ...ons-collection-windows-defender-advanced-threat-protection.md | 1 + ...related-alerts-windows-defender-advanced-threat-protection.md | 1 + ...lated-machines-windows-defender-advanced-threat-protection.md | 1 + ...-ip-statistics-windows-defender-advanced-threat-protection.md | 1 + ...nfo-collection-windows-defender-advanced-threat-protection.md | 1 + ...-machine-by-id-windows-defender-advanced-threat-protection.md | 1 + ...e-log-on-users-windows-defender-advanced-threat-protection.md | 1 + ...related-alerts-windows-defender-advanced-threat-protection.md | 1 + ...eaction-object-windows-defender-advanced-threat-protection.md | 1 + ...ons-collection-windows-defender-advanced-threat-protection.md | 1 + ...ups-collection-windows-defender-advanced-threat-protection.md | 1 + .../get-machines-windows-defender-advanced-threat-protection.md | 1 + ...tes-collection-windows-defender-advanced-threat-protection.md | 1 + ...ackage-sas-uri-windows-defender-advanced-threat-protection.md | 1 + .../threat-protection/windows-defender-atp/get-started.md | 1 + ...er-information-windows-defender-advanced-threat-protection.md | 1 + ...related-alerts-windows-defender-advanced-threat-protection.md | 1 + ...lated-machines-windows-defender-advanced-threat-protection.md | 1 + .../how-hardware-based-containers-help-protect-windows.md | 1 + ...stigate-alerts-windows-defender-advanced-threat-protection.md | 1 + ...stigate-domain-windows-defender-advanced-threat-protection.md | 1 + ...estigate-files-windows-defender-advanced-threat-protection.md | 1 + ...investigate-ip-windows-defender-advanced-threat-protection.md | 1 + ...igate-machines-windows-defender-advanced-threat-protection.md | 1 + ...vestigate-user-windows-defender-advanced-threat-protection.md | 1 + ...in-seen-in-org-windows-defender-advanced-threat-protection.md | 1 + ...is-ip-seen-org-windows-defender-advanced-threat-protection.md | 1 + ...solate-machine-windows-defender-advanced-threat-protection.md | 1 + .../licensing-windows-defender-advanced-threat-protection.md | 1 + ...machine-groups-windows-defender-advanced-threat-protection.md | 1 + .../machine-tags-windows-defender-advanced-threat-protection.md | 1 + ...-view-overview-windows-defender-advanced-threat-protection.md | 1 + .../manage-alerts-windows-defender-advanced-threat-protection.md | 1 + ...-investigation-windows-defender-advanced-threat-protection.md | 1 + ...d-blocked-list-windows-defender-advanced-threat-protection.md | 1 + ...n-file-uploads-windows-defender-advanced-threat-protection.md | 1 + ...der-exclusions-windows-defender-advanced-threat-protection.md | 1 + .../threat-protection/windows-defender-atp/manage-edr.md | 1 + ...pression-rules-windows-defender-advanced-threat-protection.md | 1 + .../threat-protection/windows-defender-atp/management-apis.md | 1 + .../windows-defender-atp/microsoft-cloud-app-security-config.md | 1 + .../microsoft-cloud-app-security-integration.md | 1 + ...m-requirements-windows-defender-advanced-threat-protection.md | 1 + .../mssp-support-windows-defender-advanced-threat-protection.md | 1 + ...board-machines-windows-defender-advanced-threat-protection.md | 1 + ...oard-configure-windows-defender-advanced-threat-protection.md | 1 + ...oard-downlevel-windows-defender-advanced-threat-protection.md | 1 + .../security/threat-protection/windows-defender-atp/onboard.md | 1 + .../windows-defender-atp/overview-attack-surface-reduction.md | 1 + .../windows-defender-atp/overview-custom-detections.md | 1 + .../windows-defender-atp/overview-endpoint-detection-response.md | 1 + .../windows-defender-atp/overview-hardware-based-isolation.md | 1 + ...erview-hunting-windows-defender-advanced-threat-protection.md | 1 + ...w-secure-score-windows-defender-advanced-threat-protection.md | 1 + .../security/threat-protection/windows-defender-atp/overview.md | 1 + ...ortal-overview-windows-defender-advanced-threat-protection.md | 1 + ...owerbi-reports-windows-defender-advanced-threat-protection.md | 1 + ...l-example-code-windows-defender-advanced-threat-protection.md | 1 + ...ferences-setup-windows-defender-advanced-threat-protection.md | 1 + ...eview-settings-windows-defender-advanced-threat-protection.md | 1 + .../preview-windows-defender-advanced-threat-protection.md | 1 + ...using-rest-api-windows-defender-advanced-threat-protection.md | 1 + ...n-example-code-windows-defender-advanced-threat-protection.md | 1 + .../rbac-windows-defender-advanced-threat-protection.md | 1 + ...request-sample-windows-defender-advanced-threat-protection.md | 1 + ...nd-file-alerts-windows-defender-advanced-threat-protection.md | 1 + ...machine-alerts-windows-defender-advanced-threat-protection.md | 1 + ...sponse-actions-windows-defender-advanced-threat-protection.md | 1 + ...code-execution-windows-defender-advanced-threat-protection.md | 1 + .../run-av-scan-windows-defender-advanced-threat-protection.md | 1 + ...detection-test-windows-defender-advanced-threat-protection.md | 1 + ...core-dashboard-windows-defender-advanced-threat-protection.md | 1 + ...ions-dashboard-windows-defender-advanced-threat-protection.md | 1 + ...service-status-windows-defender-advanced-threat-protection.md | 1 + ...uarantine-file-windows-defender-advanced-threat-protection.md | 1 + ...supported-apis-windows-defender-advanced-threat-protection.md | 1 + ...-response-apis-windows-defender-advanced-threat-protection.md | 1 + ...tics-dashboard-windows-defender-advanced-threat-protection.md | 1 + .../threat-protection/windows-defender-atp/threat-analytics.md | 1 + ...cator-concepts-windows-defender-advanced-threat-protection.md | 1 + .../windows-defender-atp/threat-protection-integration.md | 1 + .../time-settings-windows-defender-advanced-threat-protection.md | 1 + ...hoot-custom-ti-windows-defender-advanced-threat-protection.md | 1 + ...error-messages-windows-defender-advanced-threat-protection.md | 1 + ...oot-onboarding-windows-defender-advanced-threat-protection.md | 1 + ...ubleshoot-siem-windows-defender-advanced-threat-protection.md | 1 + .../threat-protection/windows-defender-atp/troubleshoot-wdatp.md | 1 + .../troubleshoot-windows-defender-advanced-threat-protection.md | 1 + .../unblock-file-windows-defender-advanced-threat-protection.md | 1 + ...solate-machine-windows-defender-advanced-threat-protection.md | 1 + ...code-execution-windows-defender-advanced-threat-protection.md | 1 + .../use-custom-ti-windows-defender-advanced-threat-protection.md | 1 + .../use-windows-defender-advanced-threat-protection.md | 1 + .../user-roles-windows-defender-advanced-threat-protection.md | 1 + .../windows-defender-advanced-threat-protection.md | 1 + .../windows-defender-atp/windows-defender-security-center-atp.md | 1 + 162 files changed, 162 insertions(+) diff --git a/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md index e8f8e79356..0e82c47568 100644 --- a/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Configure advanced features in Windows Defender ATP description: Turn on advanced features such as block file in Windows Defender Advanced Threat Protection. keywords: advanced features, settings, block file, automated investigation, auto-resolve, skype, azure atp, office 365, azure information protection, intune search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md index fd419d2f79..d215d46fec 100644 --- a/windows/security/threat-protection/windows-defender-atp/advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Advanced hunting best practices in Windows Defender ATP description: Learn about Advanced hunting best practices such as what filters and keywords to use to effectively query data. keywords: advanced hunting, best practices, keyword, filters, atp query, query atp data, intellisense, atp telemetry, events, events telemetry, azure log analytics search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/advanced-hunting-reference-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/advanced-hunting-reference-windows-defender-advanced-threat-protection.md index b594ad69f0..8a99a90642 100644 --- a/windows/security/threat-protection/windows-defender-atp/advanced-hunting-reference-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/advanced-hunting-reference-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Advanced hunting reference in Windows Defender ATP description: Learn about Advanced hunting table reference such as column name, data type, and description keywords: advanced hunting, atp query, query atp data, intellisense, atp telemetry, events, events telemetry, azure log analytics, column name, data type, description search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection.md index 3eb5787182..316fdb9dd1 100644 --- a/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Query data using Advanced hunting in Windows Defender ATP description: Learn about Advanced hunting in Windows Defender ATP and how to query ATP data. keywords: advanced hunting, atp query, query atp data, intellisense, atp telemetry, events, events telemetry, azure log analytics search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/alerts-queue-endpoint-detection-response.md b/windows/security/threat-protection/windows-defender-atp/alerts-queue-endpoint-detection-response.md index cce2d0c0a3..6ffa18b0b6 100644 --- a/windows/security/threat-protection/windows-defender-atp/alerts-queue-endpoint-detection-response.md +++ b/windows/security/threat-protection/windows-defender-atp/alerts-queue-endpoint-detection-response.md @@ -3,6 +3,7 @@ title: Alerts queue in Windows Defender Security Center description: View and manage the alerts surfaced in Windows Defender Security Center keywords: search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md index 526668ad8c..cc70b589cc 100644 --- a/windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: View and organize the Windows Defender ATP Alerts queue description: Learn about how the Windows Defender ATP alerts queues work, and how to sort and filter lists of alerts. keywords: alerts, queues, alerts queue, sort, order, filter, manage alerts, new, in progress, resolved, newest, time in queue, severity, time period search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md index ee57104d76..385dfdea3a 100644 --- a/windows/security/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Windows Defender ATP alert API fields description: Understand how the alert API fields map to the values in Windows Defender Security Center keywords: alerts, alert fields, fields, api, fields, pull alerts, rest api, request, response search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md index 68c07126d2..0bd1a15c11 100644 --- a/windows/security/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Assign user access to Windows Defender Security Center description: Assign read and write or read only access to the Windows Defender Advanced Threat Protection portal. keywords: assign user roles, assign read and write access, assign read only access, user, user roles, roles search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/attack-simulations-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/attack-simulations-windows-defender-advanced-threat-protection.md index 2dc0691f2a..ab1b1ae399 100644 --- a/windows/security/threat-protection/windows-defender-atp/attack-simulations-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/attack-simulations-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Experience Windows Defender ATP through simulated attacks description: Run the provided attack scenario simulations to experience how Windows Defender ATP can detect, investigate, and respond to breaches. keywords: wdatp, test, scenario, attack, simulation, simulated, diy, windows defender advanced threat protection search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md index a1c25550d8..e5750beb78 100644 --- a/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Use Automated investigations to investigate and remediate threats description: View the list of automated investigations, its status, detection source and other details. keywords: automated, investigation, detection, source, threat types, id, tags, machines, duration, filter export search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/basic-permissions-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/basic-permissions-windows-defender-advanced-threat-protection.md index 6c995b3429..9835695e87 100644 --- a/windows/security/threat-protection/windows-defender-atp/basic-permissions-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/basic-permissions-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Use basic permissions to access Windows Defender Security Center description: Assign read and write or read only access to the Windows Defender Advanced Threat Protection portal. keywords: assign user roles, assign read and write access, assign read only access, user, user roles, roles search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md index 933ac113b2..077304ed7f 100644 --- a/windows/security/threat-protection/windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Block file API description: Use this API to blocking files from being running in the organization. keywords: apis, graph api, supported apis, block file search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md index 5841eedc07..c2b79d845d 100644 --- a/windows/security/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Check the health state of the sensor in Windows Defender ATP description: Check the sensor health on machines to identify which ones are misconfigured, inactive, or are not reporting sensor data. keywords: sensor, sensor health, misconfigured, inactive, no sensor data, sensor data, impaired communications, communication search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection.md index 1d19deb5cb..278068d40a 100644 --- a/windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Collect investigation package API description: Use this API to create calls related to the collecting an investigation package from a machine. keywords: apis, graph api, supported apis, collect investigation package search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection.md index 295192756c..4221621c34 100644 --- a/windows/security/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Access the Windows Defender ATP Community Center description: Access the Windows Defender ATP Community Center to share experiences, engange, and learn about the product. keywords: community, community center, tech community, conversation, announcements search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md index 3ff19840f0..72d6473f97 100644 --- a/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Enable conditional access to better protect users, devices, and data description: Enable conditional access to prevent applications from running if a device is considered at risk and an application is determined to be non-compliant. keywords: conditional access, block applications, security level, intune, search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md index 922143b7f4..fabaf74f07 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Configure HP ArcSight to pull Windows Defender ATP alerts description: Configure HP ArcSight to receive and pull alerts from Windows Defender Security Center keywords: configure hp arcsight, security information and events management tools, arcsight search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/configure-attack-surface-reduction.md b/windows/security/threat-protection/windows-defender-atp/configure-attack-surface-reduction.md index f48dd12b3e..f32374ac18 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-attack-surface-reduction.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-attack-surface-reduction.md @@ -3,6 +3,7 @@ title: description: keywords: search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/configure-conditional-access-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-conditional-access-windows-defender-advanced-threat-protection.md index 7e52942346..a0cc6dab70 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-conditional-access-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-conditional-access-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Configure conditional access in Windows Defender ATP description: keywords: search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md index d7bbbb265b..16d4c73d26 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Configure alert notifications in Windows Defender ATP description: Send email notifications to specified recipients to receive new alerts based on severity with Windows Defender ATP on Windows 10 Enterprise, Pro, and Education editions. keywords: email notifications, configure alert notifications, windows defender atp notifications, windows defender atp alerts, windows 10 enterprise, windows 10 education search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md index 151cbd0b67..3ca88add4f 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Onboard Windows 10 machines using Group Policy to Windows Defender ATP description: Use Group Policy to deploy the configuration package on Windows 10 machines so that they are onboarded to the service. keywords: configure machines using group policy, machine management, configure Windows ATP machines, onboard Windows Defender Advanced Threat Protection machines, group policy search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md index c9a8e4b1b1..69c7fa6817 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Onboard Windows 10 machines using Mobile Device Management tools description: Use Mobile Device Management tools to deploy the configuration package on machines so that they are onboarded to the service. keywords: onboard machines using mdm, machine management, onboard Windows ATP machines, onboard Windows Defender Advanced Threat Protection machines, mdm search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md index a5c180ba64..e5fa2adf95 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Onboard non-Windows machines to the Windows Defender ATP service description: Configure non-Winodws machines so that they can send sensor data to the Windows Defender ATP service. keywords: onboard non-Windows machines, macos, linux, machine management, configure Windows ATP machines, configure Windows Defender Advanced Threat Protection machines search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md index 5832e6bc14..6758d81fd7 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Onboard Windows 10 machines using System Center Configuration Manager description: Use System Center Configuration Manager to deploy the configuration package on machines so that they are onboarded to the service. keywords: onboard machines using sccm, machine management, configure Windows ATP machines, configure Windows Defender Advanced Threat Protection machines, sccm search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md index ea54c42092..04ac622d7d 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Onboard Windows 10 machines using a local script description: Use a local script to deploy the configuration package on machines so that they are onboarded to the service. keywords: configure machines using a local script, machine management, configure Windows ATP machines, configure Windows Defender Advanced Threat Protection machines search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-vdi-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-vdi-windows-defender-advanced-threat-protection.md index 7f15b0fc5c..caa1e6b2b4 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-vdi-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-vdi-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Onboard non-persistent virtual desktop infrastructure (VDI) machines description: Deploy the configuration package on virtual desktop infrastructure (VDI) machine so that they are onboarded to Windows Defender ATP the service. keywords: configure virtual desktop infrastructure (VDI) machine, vdi, machine management, configure Windows ATP endpoints, configure Windows Defender Advanced Threat Protection endpoints search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md index 8b93f17477..8a41625b88 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Onboard Windows 10 machines on Windows Defender ATP description: Onboard Windows 10 machines so that they can send sensor data to the Windows Defender ATP sensor keywords: Onboard Windows 10 machines, group policy, system center configuration manager, mobile device management, local script, gp, sccm, mdm, intune search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md index 0672d19364..1dfed290f7 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Configure managed security service provider support description: Take the necessary steps to configure the MSSP integration with Windows Defender ATP keywords: managed security service provider, mssp, configure, integration search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md index 4456ba11e8..4b2c89021e 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Configure machine proxy and Internet connection settings description: Configure the Windows Defender ATP proxy and internet settings to enable communication with the cloud service. keywords: configure, proxy, internet, internet connectivity, settings, proxy settings, netsh, winhttp, proxy server search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md index 9f50187aab..736da12933 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Onboard servers to the Windows Defender ATP service description: Onboard servers so that they can send sensor data to the Windows Defender ATP sensor. keywords: onboard server, server, 2012r2, 2016, 2019, server onboarding, machine management, configure Windows ATP servers, onboard Windows Defender Advanced Threat Protection servers search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md index 5c36c805e4..84bdc39057 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Pull alerts to your SIEM tools from Windows Defender Advanced Threat Prot description: Learn how to use REST API and configure supported security information and events management tools to receive and pull alerts. keywords: configure siem, security information and events management tools, splunk, arcsight, custom indicators, rest api, alert definitions, indicators of compromise search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md index 03f3013863..b9cd80ca8b 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Configure Splunk to pull Windows Defender ATP alerts description: Configure Splunk to receive and pull alerts from Windows Defender Security Center. keywords: configure splunk, security information and events management tools, splunk search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/custom-detection-rules.md b/windows/security/threat-protection/windows-defender-atp/custom-detection-rules.md index e9d21b6f95..2d717ef457 100644 --- a/windows/security/threat-protection/windows-defender-atp/custom-detection-rules.md +++ b/windows/security/threat-protection/windows-defender-atp/custom-detection-rules.md @@ -3,6 +3,7 @@ title: Create custom detection rules in Windows Defender ATP description: Learn how to create custom detections rules based on advanced hunting queries keywords: create custom detections, detections, advanced hunting, hunt, detect, query search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md index 229300b01e..622309fb3f 100644 --- a/windows/security/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Create custom alerts using the threat intelligence API description: Create your custom alert definitions and indicators of compromise in Windows Defender ATP using the available APIs in Windows Enterprise, Education, and Pro editions. keywords: alert definitions, indicators of compromise, threat intelligence, custom threat intelligence, rest api, api search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection.md index b98dc92230..44863a8a91 100644 --- a/windows/security/threat-protection/windows-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Update data retention settings for Windows Defender Advanced Threat Prote description: Update data retention settings by selecting between 30 days to 180 days. keywords: data, storage, settings, retention, update search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md index 1efa791236..ca3fa2ed76 100644 --- a/windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Windows Defender ATP data storage and privacy description: Learn about how Windows Defender ATP handles privacy and data that it collects. keywords: Windows Defender ATP data storage and privacy, storage, privacy, licensing, geolocation, data retention, data search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md index 80d84f08c0..ece3b28679 100644 --- a/windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Windows Defender Antivirus compatibility with Windows Defender ATP description: Learn about how Windows Defender works with Windows Defender ATP and how it functions when a third-party antimalware client is used. keywords: windows defender compatibility, defender, windows defender atp search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md index 4896e983e7..1010fe1684 100644 --- a/windows/security/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Enable the custom threat intelligence API in Windows Defender ATP description: Learn how to setup the custom threat intelligence application in Windows Defender ATP to create custom threat intelligence (TI). keywords: enable custom threat intelligence application, custom ti application, application name, client id, authorization url, resource, client secret, access tokens search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection.md index 1afddb33b9..1e416dcaa7 100644 --- a/windows/security/threat-protection/windows-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Enable Secure Score in Windows Defender ATP description: Set the baselines for calculating the score of Windows Defender security controls on the Secure Score dashboard. keywords: enable secure score, baseline, calculation, analytics, score, secure score dashboard, dashboard search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md index eddf4c93c0..d160ae5c3a 100644 --- a/windows/security/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Enable SIEM integration in Windows Defender ATP description: Enable SIEM integration to receive alerts in your security information and event management (SIEM) solution. keywords: enable siem connector, siem, connector, security information and events search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/evaluate-atp.md b/windows/security/threat-protection/windows-defender-atp/evaluate-atp.md index 760908772b..439774a08a 100644 --- a/windows/security/threat-protection/windows-defender-atp/evaluate-atp.md +++ b/windows/security/threat-protection/windows-defender-atp/evaluate-atp.md @@ -3,6 +3,7 @@ title: Evaluate Windows Defender Advanced Threat Protection description: keywords: search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md index 03354b9f6a..4f2681cf36 100644 --- a/windows/security/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Review events and errors using Event Viewer description: Get descriptions and further troubleshooting steps (if required) for all events reported by the Windows Defender ATP service. keywords: troubleshoot, event viewer, log summary, failure code, failed, Windows Defender Advanced Threat Protection service, cannot start, broken, can't start search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md index 68a5bbfdf5..e0399dc1d9 100644 --- a/windows/security/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Experiment with custom threat intelligence alerts description: Use this end-to-end guide to start using the Windows Defender ATP threat intelligence API. keywords: alert definitions, indicators of compromise, threat intelligence, custom threat intelligence, rest api, api search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/exposed-apis-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/exposed-apis-windows-defender-advanced-threat-protection.md index 860ff1eee2..2a7197649c 100644 --- a/windows/security/threat-protection/windows-defender-atp/exposed-apis-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/exposed-apis-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Use the Windows Defender Advanced Threat Protection exposed APIs description: Use the exposed data and actions using a set of progammatic APIs that are part of the Microsoft Intelligence Security Graph. keywords: apis, graph api, supported apis, actor, alerts, machine, user, domain, ip, file search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md index 94cb8338ce..0f32d44dd4 100644 --- a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Find machine information by internal IP API description: Use this API to create calls related to finding a machine entry around a specific timestamp by internal IP. keywords: ip, apis, graph api, supported apis, find machine, machine information search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md index 1de9e6fc6b..dc57717e8d 100644 --- a/windows/security/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Fix unhealthy sensors in Windows Defender ATP description: Fix machine sensors that are reporting as misconfigured or inactive so that the service receives data from the machine. keywords: misconfigured, inactive, fix sensor, sensor health, no sensor data, sensor data, impaired communications, communication search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-actor-information-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-actor-information-windows-defender-advanced-threat-protection.md index 11933fc1f8..c7ad32d81d 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-actor-information-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-actor-information-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Get actor information API description: Retrieves an actor information report. keywords: apis, graph api, supported apis, get, actor, information search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-actor-related-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-actor-related-alerts-windows-defender-advanced-threat-protection.md index 7d607f80b0..54c1dd45ee 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-actor-related-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-actor-related-alerts-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Get actor related alerts API description: Retrieves all alerts related to a given actor. keywords: apis, graph api, supported apis, get, actor, related, alerts search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection.md index 7bd281c1c2..b57243b615 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Get alert information by ID API description: Retrieves an alert by its ID. keywords: apis, graph api, supported apis, get, alert, information, id search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-actor-info-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-related-actor-info-windows-defender-advanced-threat-protection.md index feb7c72977..e914d35ccb 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-alert-related-actor-info-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-alert-related-actor-info-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Get alert related actor information API description: Retrieves the actor information related to the specific alert. keywords: apis, graph api, supported apis, get, alert, actor, information, related search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection.md index 1dc2400622..bc89209fbe 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Get alert related domain information description: Retrieves all domains related to a specific alert. keywords: apis, graph api, supported apis, get alert information, alert information, related domain search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection.md index 692038dece..3efd2de78e 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Get alert related files information description: Retrieves all files related to a specific alert. keywords: apis, graph api, supported apis, get alert information, alert information, related files search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection.md index 13d6fa451e..3e296665a1 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Get alert related IP information description: Retrieves all IPs related to a specific alert. keywords: apis, graph api, supported apis, get alert information, alert information, related ip search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection.md index c65563b583..c5d77400aa 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Get alert related machine information description: Retrieves all machines related to a specific alert. keywords: apis, graph api, supported apis, get alert information, alert information, related machine search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection.md index 0ca328f129..6993fd471d 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Get alert related user information description: Retrieves the user associated to a specific alert. keywords: apis, graph api, supported apis, get, alert, information, related, user search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection.md index 91370e6ab4..200e9bcb18 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Get alerts API description: Retrieves top recent alerts. keywords: apis, graph api, supported apis, get, alerts, recent search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection-windows-defender-advanced-threat-protection.md index 9a0bbc0992..8b5aa9abb1 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Get CVE-KB map API description: Retrieves a map of CVE's to KB's. keywords: apis, graph api, supported apis, get, cve, kb search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection.md index edf69b8cc2..9ead2dbb39 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Get domain related alerts API description: Retrieves a collection of alerts related to a given domain address. keywords: apis, graph api, supported apis, get, domain, related, alerts search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection.md index 42274f276d..37f79cad7c 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Get domain related machines API description: Retrieves a collection of machines related to a given domain address. keywords: apis, graph api, supported apis, get, domain, related, machines search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection.md index a8d16cda6c..a3c16e6ca8 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Get domain statistics API description: Retrieves the prevalence for the given domain. keywords: apis, graph api, supported apis, get, domain, domain related machines search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection.md index 3a8aecdcdc..7584b147fb 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Get file information API description: Retrieves a file by identifier Sha1, Sha256, or MD5. keywords: apis, graph api, supported apis, get, file, information, sha1, sha256, md5 search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection.md index 3bc108f4c5..05c27cc3c8 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Get file related alerts API description: Retrieves a collection of alerts related to a given file hash. keywords: apis, graph api, supported apis, get, file, hash search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection.md index 46a55266b9..1fbbc3a108 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Get file related machines API description: Retrieves a collection of machines related to a given file hash. keywords: apis, graph api, supported apis, get, machines, hash search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection.md index 379a272b7f..097db254ff 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Get file statistics API description: Retrieves the prevalence for the given file. keywords: apis, graph api, supported apis, get, file, statistics search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-fileactions-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-fileactions-collection-windows-defender-advanced-threat-protection.md index 58ec0179eb..6b46d49d1c 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-fileactions-collection-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-fileactions-collection-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Get FileActions collection API description: Use this API to create calls related to get fileactions collection keywords: apis, graph api, supported apis, get, file, information, fileactions collection search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md index e30ca834b1..129a601d95 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Get FileMachineAction object API description: Use this API to create calls related to get machineaction object keywords: apis, graph api, supported apis, filemachineaction object search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection.md index 4f981ccd54..b22756a78b 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Get FileMachineActions collection API description: Use this API to create calls related to get filemachineactions collection keywords: apis, graph api, supported apis, filemachineactions collection search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection.md index b1ad30ecd5..fad5315c23 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Get IP related alerts API description: Retrieves a collection of alerts related to a given IP address. keywords: apis, graph api, supported apis, get, ip, related, alerts search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection.md index 1796c563b1..acbfa51a4a 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Get IP related machines API description: Retrieves a collection of machines related to a given IP address. keywords: apis, graph api, supported apis, get, ip, related, machines search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection.md index f04eee146e..5134bd1653 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Get IP statistics API description: Retrieves the prevalence for the given IP. keywords: apis, graph api, supported apis, get, ip, statistics, prevalence search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection-windows-defender-advanced-threat-protection.md index 1c1cdeda69..60756f6400 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Get KB collection API description: Retrieves a collection of KB's. keywords: apis, graph api, supported apis, get, kb search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection.md index cdb7691d99..d61e334add 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Get machine by ID API description: Retrieves a machine entity by ID. keywords: apis, graph api, supported apis, get, machines, entity, id search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection.md index f73f0600fd..4669b6ac62 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Get machine log on users API description: Retrieves a collection of logged on users. keywords: apis, graph api, supported apis, get, machine, log on, users search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection.md index 2cbf47c5da..9a01fc1a18 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Get machine related alerts API description: Retrieves a collection of alerts related to a given machine ID. keywords: apis, graph api, supported apis, get, machines, related, alerts search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection.md index 21214216c0..0628465533 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Get MachineAction object API description: Use this API to create calls related to get machineaction object keywords: apis, graph api, supported apis, machineaction object search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection.md index 4f8250057a..889383cdab 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Get MachineActions collection API description: Use this API to create calls related to get machineactions collection keywords: apis, graph api, supported apis, machineaction collection search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection-windows-defender-advanced-threat-protection.md index 2e2a0ae684..1d2ab14e01 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Get RBAC machine groups collection API description: Retrieves a collection of RBAC machine groups. keywords: apis, graph api, supported apis, get, RBAC, group search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection.md index 15f5915642..5fc127f082 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Get machines API description: Retrieves a collection of recently seen machines. keywords: apis, graph api, supported apis, get, machines search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection-windows-defender-advanced-threat-protection.md index 1402d68f04..1b3f4fe295 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Get machines security states collection API description: Retrieves a collection of machines security states. keywords: apis, graph api, supported apis, get, machine, security, state search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md index b000396208..b360312126 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Get package SAS URI API description: Use this API to get a URI that allows downloading an investigation package. keywords: apis, graph api, supported apis, get package, sas, uri search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-started.md b/windows/security/threat-protection/windows-defender-atp/get-started.md index 3018be7cef..0d0972f0bd 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-started.md +++ b/windows/security/threat-protection/windows-defender-atp/get-started.md @@ -3,6 +3,7 @@ title: Get started with Windows Defender Advanced Threat Protection description: Learn about the minimum requirements and initial steps you need to take to get started with Windows Defender ATP. keywords: get started, minimum requirements, setup, subscription, features, data storage, privacy, user access search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection.md index 44a41412fe..ac38166ec1 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Get user information API description: Retrieve a User entity by key such as user name or domain. keywords: apis, graph api, supported apis, get, user, user information search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection.md index 12c741d3fe..4283b6db69 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Get user related alerts API description: Retrieves a collection of alerts related to a given user ID. keywords: apis, graph api, supported apis, get, user, related, alerts search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection.md index 80a2b92234..4be3026444 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Get user related machines API description: Retrieves a collection of machines related to a given user ID. keywords: apis, graph api, supported apis, get, user, user related alerts search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/how-hardware-based-containers-help-protect-windows.md b/windows/security/threat-protection/windows-defender-atp/how-hardware-based-containers-help-protect-windows.md index 199ece9336..0f25416ca8 100644 --- a/windows/security/threat-protection/windows-defender-atp/how-hardware-based-containers-help-protect-windows.md +++ b/windows/security/threat-protection/windows-defender-atp/how-hardware-based-containers-help-protect-windows.md @@ -2,6 +2,7 @@ title: How hardware-based containers help protect Windows 10 (Windows 10) description: Windows 10 uses containers to isolate sensitive system services and data, enabling them to remain secure even when the operating system has been compromised. ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md index 3842b1c129..56ea8cdf4a 100644 --- a/windows/security/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Investigate Windows Defender Advanced Threat Protection alerts description: Use the investigation options to get details on alerts are affecting your network, what they mean, and how to resolve them. keywords: investigate, investigation, machines, machine, alerts queue, dashboard, IP address, file, submit, submissions, deep analysis, timeline, search, domain, URL, IP search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md index 6e47b6ddea..65acd1c33c 100644 --- a/windows/security/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Investigate Windows Defender Advanced Threat Protection domains description: Use the investigation options to see if machines and servers have been communicating with malicious domains. keywords: investigate domain, domain, malicious domain, windows defender atp, alert, URL search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md index 6640bb6e9f..d680bef4c2 100644 --- a/windows/security/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Investigate Windows Defender Advanced Threat Protection files description: Use the investigation options to get details on files associated with alerts, behaviours, or events. keywords: investigate, investigation, file, malicious activity, attack motivation, deep analysis, deep analysis report search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md index 29592bd0f8..44daae5c16 100644 --- a/windows/security/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Investigate an IP address associated with an alert description: Use the investigation options to examine possible communication between machines and external IP addresses. keywords: investigate, investigation, IP address, alert, windows defender atp, external IP search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md index 607b3d55e1..74a365a6b4 100644 --- a/windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Investigate machines in the Windows Defender ATP Machines list description: Investigate affected machines by reviewing alerts, network connection information, adding machine tags and groups, and checking the service health. keywords: machines, tags, groups, endpoint, alerts queue, alerts, machine name, domain, last seen, internal IP, active alerts, threat category, filter, sort, review alerts, network, connection, type, password stealer, ransomware, exploit, threat, low severity, service heatlh search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md index c7a8ba2be1..dcbc200193 100644 --- a/windows/security/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Investigate a user account in Windows Defender ATP description: Investigate a user account for potential compromised credentials or pivot on the associated user account during an investigation. keywords: investigate, account, user, user entity, alert, windows defender atp search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection.md index 3bda2052aa..892fc60bd3 100644 --- a/windows/security/threat-protection/windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Is domain seen in org API description: Use this API to create calls related to checking whether a domain was seen in the organization. keywords: apis, graph api, supported apis, domain, domain seen search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection.md index 0e5cdd372b..7b493211a5 100644 --- a/windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Is IP seen in org API description: Answers whether an IP was seen in the organization. keywords: apis, graph api, supported apis, is, ip, seen, org, organization search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md index 8a1af5560e..3ab7ab04d5 100644 --- a/windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Isolate machine API description: Use this API to create calls related isolating a machine. keywords: apis, graph api, supported apis, isolate machine search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection.md index c2460df138..002cb3f3e8 100644 --- a/windows/security/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Validate licensing provisioning and complete Windows Defender ATP set up description: Validating licensing provisioning, setting up initial preferences, and completing the user set up for Windows Defender Advanced Threat Protection portal. keywords: license, licensing, account, set up, validating licensing, windows defender atp search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/machine-groups-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/machine-groups-windows-defender-advanced-threat-protection.md index c32acad7cf..2210ccbf19 100644 --- a/windows/security/threat-protection/windows-defender-atp/machine-groups-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/machine-groups-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Create and manage machine groups in Windows Defender ATP description: Create machine groups and set automated remediation levels on them by confiring the rules that apply on the group keywords: machine groups, groups, remediation, level, rules, aad group, role, assign, rank search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/machine-tags-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/machine-tags-windows-defender-advanced-threat-protection.md index 09ba1f5325..b6fc180e59 100644 --- a/windows/security/threat-protection/windows-defender-atp/machine-tags-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/machine-tags-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Create and manage machine tags description: Use machine tags to group machines to capture context and enable dynamic list creation as part of an incident keywords: tags, machine tags, machine groups, groups, remediation, level, rules, aad group, role, assign, rank search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md index d75eefe80b..830fa8ab3c 100644 --- a/windows/security/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: View and organize the Windows Defender ATP machines list description: Learn about the available features that you can use from the Machines list such as sorting, filtering, and exporting the list to enhance investigations. keywords: sort, filter, export, csv, machine name, domain, last seen, internal IP, health state, active alerts, active malware detections, threat category, review alerts, network, connection, malware, type, password stealer, ransomware, exploit, threat, general malware, unwanted software search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md index 00142f3502..76a5039107 100644 --- a/windows/security/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Manage Windows Defender Advanced Threat Protection alerts description: Change the status of alerts, create suppression rules to hide alerts, submit comments, and review change history for individual alerts with the Manage Alert menu. keywords: manage alerts, manage, alerts, status, new, in progress, resolved, resolve alerts, suppress, supression, rules, context, history, comments, changes search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/manage-auto-investigation-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/manage-auto-investigation-windows-defender-advanced-threat-protection.md index a5df326a4d..357ef56c3f 100644 --- a/windows/security/threat-protection/windows-defender-atp/manage-auto-investigation-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/manage-auto-investigation-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Learn about the automated investigations dashboard in Windows Defender Se description: View the list of automated investigations, its status, detection source and other details. keywords: autoir, automated, investigation, detection, dashboard, source, threat types, id, tags, machines, duration, filter export search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md index 46adcfac19..bdecb21ec0 100644 --- a/windows/security/threat-protection/windows-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Manage automation allowed/blocked lists description: Create lists that control what items are automatically blocked or allowed during an automatic investigation. keywords: manage, automation, whitelist, blacklist, block, clean, malicious search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md index 9a359aaabc..c29f83b9b6 100644 --- a/windows/security/threat-protection/windows-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Manage automation file uploads description: Enable content analysis and configure the file extension and email attachment extensions that will be sumitted for analysis keywords: automation, file, uploads, content, analysis, file, extension, email, attachment search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md index d3ed61a295..7fa091f70d 100644 --- a/windows/security/threat-protection/windows-defender-atp/manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Manage automation folder exclusions description: Add automation folder exclusions to control the files that are excluded from an automated investigation. keywords: manage, automation, exclusion, whitelist, blacklist, block, clean, malicious search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/manage-edr.md b/windows/security/threat-protection/windows-defender-atp/manage-edr.md index 97ff8bd046..5252fa2868 100644 --- a/windows/security/threat-protection/windows-defender-atp/manage-edr.md +++ b/windows/security/threat-protection/windows-defender-atp/manage-edr.md @@ -3,6 +3,7 @@ title: Manage endpoint detection and response capabilities description: keywords: search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md index 1fa0357ade..15632e8fdf 100644 --- a/windows/security/threat-protection/windows-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Manage Windows Defender Advanced Threat Protection suppression rules description: Manage suppression rules keywords: manage suppression, rules, rule name, scope, action, alerts, turn on, turn off search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/management-apis.md b/windows/security/threat-protection/windows-defender-atp/management-apis.md index c7fc1c2b49..ca0c7f20f7 100644 --- a/windows/security/threat-protection/windows-defender-atp/management-apis.md +++ b/windows/security/threat-protection/windows-defender-atp/management-apis.md @@ -3,6 +3,7 @@ title: Overview of management and APIs description: keywords: search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-config.md b/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-config.md index b37cd582c8..01da764410 100644 --- a/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-config.md +++ b/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-config.md @@ -3,6 +3,7 @@ title: Configure Microsoft Cloud App Security integration description: Learn how to turn on the settings to enable the Windows Defender ATP integration with Microsoft Cloud App Security. keywords: cloud, app, security, settings, integration, discovery, report search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-integration.md b/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-integration.md index 51dfb9bf97..b47abbd464 100644 --- a/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-integration.md +++ b/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-integration.md @@ -3,6 +3,7 @@ title: Microsoft Cloud App Security integration overview description: keywords: search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md index 84f62905aa..db250caeda 100644 --- a/windows/security/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Minimum requirements for Windows Defender ATP description: Minimum network and data storage configuration, machine hardware and software requirements, and deployment channel requirements for Windows Defender ATP. keywords: minimum requirements, Windows Defender Advanced Threat Protection minimum requirements, network and data storage, machine configuration, deployment channel search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection.md index 0ec05caa9c..55ddba1528 100644 --- a/windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Managed security service provider (MSSP) support description: Understand how Windows Defender ATP integrates with managed security service providers (MSSP) keywords: mssp, integration, managed, security, service, provider search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/offboard-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/offboard-machines-windows-defender-advanced-threat-protection.md index af9a42584f..c5dbddb3a0 100644 --- a/windows/security/threat-protection/windows-defender-atp/offboard-machines-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/offboard-machines-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Offboard machines from the Windows Defender ATP service description: Onboard Windows 10 machines, servers, non-Windows machines from the Windows Defender ATP service keywords: offboarding, windows defender advanced threat protection offboarding, windows atp offboarding search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md index 6b4b9f699d..33b5461d23 100644 --- a/windows/security/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Onboard machines to the Windows Defender ATP service description: Onboard Windows 10 machines, servers, non-Windows machines and learn how to run a detection test. keywords: onboarding, windows defender advanced threat protection onboarding, windows atp onboarding, sccm, group policy, mdm, local script, detection test search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection.md index fc15466da7..4d48b928bd 100644 --- a/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Onboard previous versions of Windows on Windows Defender ATP description: Onboard supported previous versions of Windows machines so that they can send sensor data to the Windows Defender ATP sensor keywords: onboard, windows, 7, 81, oms, sp1, enterprise, pro, down level search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/onboard.md b/windows/security/threat-protection/windows-defender-atp/onboard.md index 0df14919d3..461847ca9e 100644 --- a/windows/security/threat-protection/windows-defender-atp/onboard.md +++ b/windows/security/threat-protection/windows-defender-atp/onboard.md @@ -3,6 +3,7 @@ title: Configure and manage Windows Defender ATP capabilities description: Configure and manage Windows Defender ATP capabilities such as attack surface reduction, next generation protection, and security controls keywords: configure, manage, capabilities, attack surface reduction, next generation protection, security controls, endpoint detection and response, auto investigation and remediation, security controls, controls search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/overview-attack-surface-reduction.md b/windows/security/threat-protection/windows-defender-atp/overview-attack-surface-reduction.md index 98d08c46d6..5d7e92ddb8 100644 --- a/windows/security/threat-protection/windows-defender-atp/overview-attack-surface-reduction.md +++ b/windows/security/threat-protection/windows-defender-atp/overview-attack-surface-reduction.md @@ -3,6 +3,7 @@ title: Overview of attack surface reduction description: Learn about the attack surface reduction capability in Windows Defender ATP keywords: search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/overview-custom-detections.md b/windows/security/threat-protection/windows-defender-atp/overview-custom-detections.md index 9b2912076d..64bf36aac0 100644 --- a/windows/security/threat-protection/windows-defender-atp/overview-custom-detections.md +++ b/windows/security/threat-protection/windows-defender-atp/overview-custom-detections.md @@ -3,6 +3,7 @@ title: Custom detections overview description: Understand how how you can leverage the power of advanced hunting to create custom detections keywords: custom detections, detections, advanced hunting, hunt, detect, query search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/overview-endpoint-detection-response.md b/windows/security/threat-protection/windows-defender-atp/overview-endpoint-detection-response.md index cb4d987703..ccc6ab2c87 100644 --- a/windows/security/threat-protection/windows-defender-atp/overview-endpoint-detection-response.md +++ b/windows/security/threat-protection/windows-defender-atp/overview-endpoint-detection-response.md @@ -3,6 +3,7 @@ title: Overview of endpoint detection and response capabilities description: Learn about the endpoint detection and response capabilities in Windows Defender ATP keywords: search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/overview-hardware-based-isolation.md b/windows/security/threat-protection/windows-defender-atp/overview-hardware-based-isolation.md index 9d8cdabaae..88596a6cef 100644 --- a/windows/security/threat-protection/windows-defender-atp/overview-hardware-based-isolation.md +++ b/windows/security/threat-protection/windows-defender-atp/overview-hardware-based-isolation.md @@ -1,6 +1,7 @@ --- title: Hardware-based isolation (Windows 10) description: Learn about how hardware-based isolation in Windows 10 helps to combat malware. +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md index b49b3ddd4e..76ba54657b 100644 --- a/windows/security/threat-protection/windows-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Overview of advanced hunting capabilities description: Hunt for possible threats accross your organization using a powerful search and query tool keywords: advanced hunting, hunting, search, query, tool, intellisense, telemetry search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md index fb129cb91b..5cd11935ed 100644 --- a/windows/security/threat-protection/windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Overview of Secure score in Windows Defender Security Center description: Expand your visibility into the overall security posture of your organization keywords: secure score, security controls, improvement opportunities, security score over time, score, posture, baseline search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/overview.md b/windows/security/threat-protection/windows-defender-atp/overview.md index df39986e0f..df560a652f 100644 --- a/windows/security/threat-protection/windows-defender-atp/overview.md +++ b/windows/security/threat-protection/windows-defender-atp/overview.md @@ -3,6 +3,7 @@ title: Overview of Windows Defender ATP description: keywords: search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md index aa1c10660e..1457a0d7dd 100644 --- a/windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Windows Defender Advanced Threat Protection portal overview description: Use Windows Defender Security Center to monitor your enterprise network and assist in responding to alerts to potential advanced persistent threat (APT) activity or data breaches. keywords: Windows Defender Security Center, portal, cybersecurity threat intelligence, dashboard, alerts queue, machines list, settings, machine management, advanced attacks search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md index 7ec82a7bcf..9cac40a33b 100644 --- a/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Create and build Power BI reports using Windows Defender ATP data description: Get security insights by creating and building Power BI dashboards using data from Windows Defender ATP and other data sources. keywords: settings, power bi, power bi service, power bi desktop, reports, dashboards, connectors , security insights, mashup search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md index 538450ea18..b61ff7d784 100644 --- a/windows/security/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: PowerShell code examples for the custom threat intelligence API description: Use PowerShell code to create custom threat intelligence using REST API. keywords: powershell, code examples, threat intelligence, custom threat intelligence, rest api, api search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md index 76c28f6e1f..828c4d45ac 100644 --- a/windows/security/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Configure Windows Defender Security Center settings description: Use the settings page to configure general settings, permissions, apis, and rules. keywords: settings, general settings, permissions, apis, rules search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md index a295925903..2e309e3b2e 100644 --- a/windows/security/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Turn on the preview experience in Windows Defender ATP description: Turn on the preview experience in Windows Defender Advanced Threat Protection to try upcoming features. keywords: advanced features, settings, block file search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md index 007a810594..4e70c6fe30 100644 --- a/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Windows Defender ATP preview features description: Learn how to access Windows Defender Advanced Threat Protection preview features. keywords: preview, preview experience, Windows Defender Advanced Threat Protection, features, updates search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md index 58f784e646..34c1292d77 100644 --- a/windows/security/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Pull Windows Defender ATP alerts using REST API description: Pull alerts from Windows Defender ATP REST API. keywords: alerts, pull alerts, rest api, request, response search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md index f84794a823..46742baa03 100644 --- a/windows/security/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Python code examples for the custom threat intelligence API description: Use Python code to create custom threat intelligence using REST API. keywords: python, code examples, threat intelligence, custom threat intelligence, rest api, api search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/rbac-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/rbac-windows-defender-advanced-threat-protection.md index 20e2299d14..5503cf2607 100644 --- a/windows/security/threat-protection/windows-defender-atp/rbac-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/rbac-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Use role-based access control to grant fine-grained access to Windows Def description: Create roles and groups within your security operations to grant access to the portal. keywords: rbac, role, based, access, control, groups, control, tier, aad search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/request-sample-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/request-sample-windows-defender-advanced-threat-protection.md index 5e12dabe3d..d9baf6c10d 100644 --- a/windows/security/threat-protection/windows-defender-atp/request-sample-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/request-sample-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Request sample API description: Use this API to create calls related to requesting a sample from a machine. keywords: apis, graph api, supported apis, request sample search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md index 148d0a9793..37af693216 100644 --- a/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Take response actions on a file in Windows Defender ATP description: Take response actions on file related alerts by stopping and quarantining a file or blocking a file and checking activity details. keywords: respond, stop and quarantine, block file, deep analysis search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md index 064fb37360..06a49fb0f5 100644 --- a/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Take response actions on a machine in Windows Defender ATP description: Take response actions on a machine such as isolating machines, collecting an investigation package, managing tags, running av scan, and restricting app execution. keywords: respond, isolate, isolate machine, collect investigation package, action center, restrict, manage tags, av scan, restrict app search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md index 5feacd51aa..565ee7cc61 100644 --- a/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Take response actions on files and machines in Windows Defender ATP description: Take response actions on files and machines by stopping and quarantining files, blocking a file, isolating machines, or collecting an investigation package. keywords: respond, stop and quarantine, block file, deep analysis, isolate machine, collect investigation package, action center search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection.md index 985a82d123..c3845d021a 100644 --- a/windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Restrict app execution API description: Use this API to create calls related to restricting an application from executing. keywords: apis, graph api, supported apis, collect investigation package search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection.md index 9132144898..52cab18906 100644 --- a/windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Run antivirus scan API description: Use this API to create calls related to running an antivirus scan on a machine. keywords: apis, graph api, supported apis, remove machine from isolation search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md index ad774f962c..ad6fbc2bec 100644 --- a/windows/security/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Run a detection test on a newly onboarded Windows Defender ATP machine description: Run the detection script on a newly onboarded machine to verify that it is properly onboarded to the Windows Defender ATP service. keywords: detection test, detection, powershell, script, verify, onboarding, windows defender advanced threat protection onboarding, clients, servers, test search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection.md index 48a0fcb12c..0cbf13fef4 100644 --- a/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Configure the security controls in Secure score description: Configure the security controls in Secure score keywords: secure score, dashboard, security recommendations, security control state, security score, score improvement, microsoft secure score, security controls, security control, improvement opportunities, edr, antivirus, av, os security updates search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection.md index 0fdb2ab3d7..907d6c7b27 100644 --- a/windows/security/threat-protection/windows-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Windows Defender Security Center Security operations dashboard description: Use the dashboard to identify machines at risk, keep track of the status of the service, and see statistics and information about machines and alerts. keywords: dashboard, alerts, new, in progress, resolved, risk, machines at risk, infections, reporting, statistics, charts, graphs, health, active malware detections, threat category, categories, password stealer, ransomware, exploit, threat, low severity, active malware search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection.md index 20028f9555..65de179e29 100644 --- a/windows/security/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Check the Windows Defender ATP service health description: Check Windows Defender ATP service health, see if the service is experiencing issues and review previous issues that have been resolved. keywords: dashboard, service, issues, service health, current status, status history, summary of impact, preliminary root cause, resolution, resolution time, expected resolution time search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/stop-quarantine-file-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/stop-quarantine-file-windows-defender-advanced-threat-protection.md index 2e4f1e0fd1..837e642aa1 100644 --- a/windows/security/threat-protection/windows-defender-atp/stop-quarantine-file-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/stop-quarantine-file-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Stop and quarantine file API description: Use this API to create calls related to stopping and quarantining a file. keywords: apis, graph api, supported apis, stop, quarantine, file search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/supported-apis-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/supported-apis-windows-defender-advanced-threat-protection.md index bc16fe2624..83fbe686fb 100644 --- a/windows/security/threat-protection/windows-defender-atp/supported-apis-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/supported-apis-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Supported Windows Defender Advanced Threat Protection query APIs description: Learn about the specific supported Windows Defender Advanced Threat Protection entities where you can create API calls to. keywords: apis, graph api, supported apis, actor, alerts, machine, user, domain, ip, file search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection.md index 2ee0df491f..fe228f3acc 100644 --- a/windows/security/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Supported Windows Defender Advanced Threat Protection response APIs description: Learn about the specific response related Windows Defender Advanced Threat Protection API calls. keywords: response apis, graph api, supported apis, actor, alerts, machine, user, domain, ip, file search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection.md index 4320d8ddca..321085bc62 100644 --- a/windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Threat analytics for Spectre and Meltdown description: Get a tailored organizational risk evaluation and actionable steps you can take to minimize risks in your organization. keywords: threat analytics, risk evaluation, OS mitigation, microcode mitigation, mitigation status search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/threat-analytics.md b/windows/security/threat-protection/windows-defender-atp/threat-analytics.md index cb47452b3c..3bde0d0f86 100644 --- a/windows/security/threat-protection/windows-defender-atp/threat-analytics.md +++ b/windows/security/threat-protection/windows-defender-atp/threat-analytics.md @@ -3,6 +3,7 @@ title: Windows Defender Advanced Threat Protection Threat analytics description: Get a tailored organizational risk evaluation and actionable steps you can take to minimize risks in your organization. keywords: threat analytics, risk evaluation, OS mitigation, microcode mitigation, mitigation status search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md index c189fa2336..3f5a0597bd 100644 --- a/windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Understand threat intelligence concepts in Windows Defender ATP description: Create custom threat alerts for your organization and learn the concepts around threat intelligence in Windows Defender Advanced Threat Protection. keywords: threat intelligence, alert definitions, indicators of compromise, ioc search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/threat-protection-integration.md b/windows/security/threat-protection/windows-defender-atp/threat-protection-integration.md index add6f459dd..4c9c126a2d 100644 --- a/windows/security/threat-protection/windows-defender-atp/threat-protection-integration.md +++ b/windows/security/threat-protection/windows-defender-atp/threat-protection-integration.md @@ -3,6 +3,7 @@ title: Windows Defender ATP in Microsoft Threat Protection description: Learn about the capabilities within the Microsoft Threat Protection keywords: microsoft threat protection, conditional access, office, advanced threat protection, azure atp, azure security center, microsoft cloud app security search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/time-settings-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/time-settings-windows-defender-advanced-threat-protection.md index 505296a18a..4dd9223f2d 100644 --- a/windows/security/threat-protection/windows-defender-atp/time-settings-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/time-settings-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Windows Defender Security Center time zone settings description: Use the menu to configure the time zone and view license information. keywords: settings, Windows Defender, cybersecurity threat intelligence, advanced threat protection, time zone, utc, local time, license search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md index d86deb3f28..813babce81 100644 --- a/windows/security/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Troubleshoot custom threat intelligence issues in Windows Defender ATP description: Troubleshoot issues that might arise when using the custom threat intelligence feature in Windows Defender ATP. keywords: troubleshoot, custom threat intelligence, custom ti, rest api, api, alert definitions, indicators of compromise search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md index 3310063e5a..bb2326d2d8 100644 --- a/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Troubleshoot onboarding issues and error messages description: Troubleshoot onboarding issues and error message while completing setup of Windows Defender Advanced Threat Protection. keywords: troubleshoot, troubleshooting, Azure Active Directory, onboarding, error message, error messages, windows defender atp search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md index 87d878f234..7f38e2545a 100644 --- a/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Troubleshoot Windows Defender ATP onboarding issues description: Troubleshoot issues that might arise during the onboarding of machines or to the Windows Defender ATP service. keywords: troubleshoot onboarding, onboarding issues, event viewer, data collection and preview builds, sensor data and diagnostics search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md index cd9048386c..2d4fc88758 100644 --- a/windows/security/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Troubleshoot SIEM tool integration issues in Windows Defender ATP description: Troubleshoot issues that might arise when using SIEM tools with Windows Defender ATP. keywords: troubleshoot, siem, client secret, secret search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/troubleshoot-wdatp.md b/windows/security/threat-protection/windows-defender-atp/troubleshoot-wdatp.md index 12f36df3a9..272709e22a 100644 --- a/windows/security/threat-protection/windows-defender-atp/troubleshoot-wdatp.md +++ b/windows/security/threat-protection/windows-defender-atp/troubleshoot-wdatp.md @@ -3,6 +3,7 @@ title: Troubleshoot Windows Defender Advanced Threat Protection capabilities description: Find solutions to issues on sensor state, service issues, or other Windows Defender ATP capabilities keywords: troubleshoot, sensor, state, service, issues, attack surface reduction, next generation protection search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/troubleshoot-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/troubleshoot-windows-defender-advanced-threat-protection.md index fc9f502186..2f5332e094 100644 --- a/windows/security/threat-protection/windows-defender-atp/troubleshoot-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/troubleshoot-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Troubleshoot Windows Defender Advanced Threat Protection service issues description: Find solutions and work arounds to known issues such as server errors when trying to access the service. keywords: troubleshoot Windows Defender Advanced Threat Protection, troubleshoot Windows ATP, server error, access denied, invalid credentials, no data, dashboard portal, whitelist, event viewer search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/unblock-file-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/unblock-file-windows-defender-advanced-threat-protection.md index 7ea3ec1258..c0abbe6cdd 100644 --- a/windows/security/threat-protection/windows-defender-atp/unblock-file-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/unblock-file-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Unblock file API description: Use this API to create calls related to allowing a file to be executed in the organization keywords: apis, graph api, supported apis, unblock file search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection.md index c0ef9d02f6..f7b0fe34b5 100644 --- a/windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Release machine from isolation API description: Use this API to create calls related to release a machine from isolation. keywords: apis, graph api, supported apis, remove machine from isolation search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection.md index 4c8788c337..393d41412f 100644 --- a/windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Remove app restriction API description: Use this API to create calls related to removing a restriction from applications from executing. keywords: apis, graph api, supported apis, remove machine from isolation search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md index c45ead9ecd..9a12d912f6 100644 --- a/windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Use the custom threat intelligence API to create custom alerts description: Use the threat intelligence API in Windows Defender Advanced Threat Protection to create custom alerts keywords: threat intelligence, alert definitions, indicators of compromise search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection.md index 9c74c8d5f5..f41440d094 100644 --- a/windows/security/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Overview of Windows Defender Security Center description: Learn about the features on Windows Defender Security Center, including how alerts work, and suggestions on how to investigate possible breaches and attacks. keywords: dashboard, alerts queue, manage alerts, investigation, investigate alerts, investigate machines, submit files, deep analysis, high, medium, low, severity, ioc, ioa search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/user-roles-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/user-roles-windows-defender-advanced-threat-protection.md index 122fd23da5..829e256921 100644 --- a/windows/security/threat-protection/windows-defender-atp/user-roles-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/user-roles-windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Create and manage roles for role-based access control description: Create roles and define the permissions assigned to the role as part of the role-based access control implimentation keywords: user roles, roles, access rbac search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection.md index 861c569fb3..b4a4da13ba 100644 --- a/windows/security/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection.md @@ -3,6 +3,7 @@ title: Windows Defender Advanced Threat Protection description: Windows Defender Advanced Threat Protection is an enterprise security platform that helps secops to prevent, detect, investigate, and respond to possible cybersecurity threats related to advanced persistent threats. keywords: introduction to Windows Defender Advanced Threat Protection, introduction to Windows Defender ATP, cybersecurity, advanced persistent threat, enterprise security, machine behavioral sensor, cloud security, analytics, threat intelligence search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-defender-atp/windows-defender-security-center-atp.md b/windows/security/threat-protection/windows-defender-atp/windows-defender-security-center-atp.md index ea7e9fd67b..9791947810 100644 --- a/windows/security/threat-protection/windows-defender-atp/windows-defender-security-center-atp.md +++ b/windows/security/threat-protection/windows-defender-atp/windows-defender-security-center-atp.md @@ -3,6 +3,7 @@ title: Windows Defender Security Center description: Windows Defender Security Center is the portal where you can access Windows Defender Advanced Threat Protection. keywords: windows, defender, security, center, defender, advanced, threat, protection search.product: eADQiWindows 10XVcnh +search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library From d8cdd96dfc6649e1e0b3ef1c5c3c83b1c6e793d4 Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Fri, 19 Oct 2018 19:09:46 -0400 Subject: [PATCH 09/25] typo: configurtion -> configuration --- windows/client-management/mdm/vpn-ddf-file.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/vpn-ddf-file.md b/windows/client-management/mdm/vpn-ddf-file.md index 51a11541d3..79be87ff7f 100644 --- a/windows/client-management/mdm/vpn-ddf-file.md +++ b/windows/client-management/mdm/vpn-ddf-file.md @@ -1384,7 +1384,7 @@ This topic shows the OMA DM device description framework (DDF) for the **VPN** c ## Related topics -[VPN configurtion service provider](vpn-csp.md) +[VPN configuration service provider](vpn-csp.md)   From c1806af6d135a63bc40fdc35cbcf1be234853d42 Mon Sep 17 00:00:00 2001 From: Liza Poggemeyer Date: Fri, 19 Oct 2018 23:54:46 +0000 Subject: [PATCH 10/25] Initialize open publishing repository: https://cpubwin.visualstudio.com/DefaultCollection/it-client/_git/it-client of branch master --- .gitattributes | 14 +++++++++ .openpublishing.publish.config.json | 24 ++++++++++++--- README.md | 3 ++ windows/license/TOC.yml | 2 ++ windows/license/breadcrumb/toc.yml | 3 ++ windows/license/docfx.json | 47 +++++++++++++++++++++++++++++ windows/license/index.md | 1 + 7 files changed, 90 insertions(+), 4 deletions(-) create mode 100644 .gitattributes create mode 100644 README.md create mode 100644 windows/license/TOC.yml create mode 100644 windows/license/breadcrumb/toc.yml create mode 100644 windows/license/docfx.json create mode 100644 windows/license/index.md diff --git a/.gitattributes b/.gitattributes new file mode 100644 index 0000000000..9fb85ec49f --- /dev/null +++ b/.gitattributes @@ -0,0 +1,14 @@ +# Set the default behavior, in case people don't have core.autocrlf set. +* text=auto + +# Explicitly declare text files you want to always be normalized and converted +# to native line endings on checkout. +*.c text +*.h text + +# Declare files that will always have CRLF line endings on checkout. +*.sln text eol=crlf + +# Denote all files that are truly binary and should not be modified. +*.png binary +*.jpg binary \ No newline at end of file diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index f9d982e542..9ea8c1f169 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -101,6 +101,22 @@ "moniker_groups": [], "version": 0 }, + { + "docset_name": "license", + "build_source_folder": "windows/license", + "build_output_subfolder": "license", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": false, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, { "docset_name": "mdop-VSTS", "build_source_folder": "mdop", @@ -511,11 +527,11 @@ ] }, "need_generate_pdf_url_template": true, - "need_generate_pdf": false, - "need_generate_intellisense": false, - "Targets": { + "targets": { "Pdf": { "template_folder": "_themes.pdf" } - } + }, + "need_generate_pdf": false, + "need_generate_intellisense": false } \ No newline at end of file diff --git a/README.md b/README.md new file mode 100644 index 0000000000..824a7c6d56 --- /dev/null +++ b/README.md @@ -0,0 +1,3 @@ +## Microsoft Open Source Code of Conduct +This project has adopted the [Microsoft Open Source Code of Conduct](https://opensource.microsoft.com/codeofconduct/). +For more information see the [Code of Conduct FAQ](https://opensource.microsoft.com/codeofconduct/faq/) or contact [opencode@microsoft.com](mailto:opencode@microsoft.com) with any additional questions or comments. \ No newline at end of file diff --git a/windows/license/TOC.yml b/windows/license/TOC.yml new file mode 100644 index 0000000000..b5ef71ac32 --- /dev/null +++ b/windows/license/TOC.yml @@ -0,0 +1,2 @@ +- name: Index + href: index.md \ No newline at end of file diff --git a/windows/license/breadcrumb/toc.yml b/windows/license/breadcrumb/toc.yml new file mode 100644 index 0000000000..61d8fca61e --- /dev/null +++ b/windows/license/breadcrumb/toc.yml @@ -0,0 +1,3 @@ +- name: Docs + tocHref: / + topicHref: / \ No newline at end of file diff --git a/windows/license/docfx.json b/windows/license/docfx.json new file mode 100644 index 0000000000..48d2f8a49d --- /dev/null +++ b/windows/license/docfx.json @@ -0,0 +1,47 @@ +{ + "build": { + "content": [ + { + "files": [ + "**/*.md", + "**/*.yml" + ], + "exclude": [ + "**/obj/**", + "**/includes/**", + "_themes/**", + "_themes.pdf/**", + "README.md", + "LICENSE", + "LICENSE-CODE", + "ThirdPartyNotices" + ] + } + ], + "resource": [ + { + "files": [ + "**/*.png", + "**/*.jpg" + ], + "exclude": [ + "**/obj/**", + "**/includes/**", + "_themes/**", + "_themes.pdf/**" + ] + } + ], + "overwrite": [], + "externalReference": [], + "globalMetadata": { + "breadcrumb_path": "/license/breadcrumb/toc.json", + "extendBreadcrumb": true, + "feedback_system": "None" + }, + "fileMetadata": {}, + "template": [], + "dest": "license", + "markdownEngineName": "markdig" + } +} \ No newline at end of file diff --git a/windows/license/index.md b/windows/license/index.md new file mode 100644 index 0000000000..8356233915 --- /dev/null +++ b/windows/license/index.md @@ -0,0 +1 @@ +# Welcome to license! \ No newline at end of file From 2d4568de55158c6ca5c57311089b634c3f139ce0 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Sun, 21 Oct 2018 17:06:04 +0000 Subject: [PATCH 11/25] Merged PR 12245: Add graphics, fix a typo, specify enrollment status page content expanded --- .../windows-autopilot/enrollment-status.md | 2 +- .../windows-autopilot/existing-devices.md | 51 +++++++++++------- .../windows-autopilot/images/up-1.PNG | Bin 0 -> 48240 bytes .../windows-autopilot/images/up-2.PNG | Bin 0 -> 24057 bytes .../windows-autopilot/images/up-3.PNG | Bin 0 -> 36215 bytes 5 files changed, 34 insertions(+), 19 deletions(-) create mode 100644 windows/deployment/windows-autopilot/images/up-1.PNG create mode 100644 windows/deployment/windows-autopilot/images/up-2.PNG create mode 100644 windows/deployment/windows-autopilot/images/up-3.PNG diff --git a/windows/deployment/windows-autopilot/enrollment-status.md b/windows/deployment/windows-autopilot/enrollment-status.md index 60a302f3e0..1e4210ada6 100644 --- a/windows/deployment/windows-autopilot/enrollment-status.md +++ b/windows/deployment/windows-autopilot/enrollment-status.md @@ -31,7 +31,7 @@ The Windows Autopilot Enrollment Status page displaying the status of the comple - Show custom error message when an error occurs. - Allow users to collect logs about installation errors. -## Installation progresss tracked +## Installation progress tracked The Enrollment Status page tracks a subset of the available MDM CSP policies that are delivered to the device as part of the complete device configuration process. The specific types of policies that are tracked include: diff --git a/windows/deployment/windows-autopilot/existing-devices.md b/windows/deployment/windows-autopilot/existing-devices.md index 6872ac6eaa..345d878ea7 100644 --- a/windows/deployment/windows-autopilot/existing-devices.md +++ b/windows/deployment/windows-autopilot/existing-devices.md @@ -24,12 +24,22 @@ This topic describes how to convert Windows 7 domain-joined computers to Azure A - System Center Configuration Manager Current Branch (1806) OR System Center Configuration Manager Technical Preview (1808) - The [Windows ADK](https://developer.microsoft.com/en-us/windows/hardware/windows-assessment-deployment-kit) 1803 or later + - Note: Config Mgr 1806 or later is required to [support](https://docs.microsoft.com/sccm/core/plan-design/configs/support-for-windows-10#windows-10-adk) the Windows ADK 1809. - Assigned Microsoft Intune Licenses - Azure Active Directory Premium - Windows 10 version 1809 or later imported into Config Mgr as an Operating System Image ## Procedures +### Configure the Enrollment Status Page (optional) + +If desired, you can set up an [enrollment status page](https://docs.microsoft.com/windows/deployment/windows-autopilot/enrollment-status) for Autopilot using Intune. + +To enable and configure the enrollment and status page: + +1. Open [Intune in the Azure portal](https://aka.ms/intuneportal). +2. [Set up an enrollment status page](https://docs.microsoft.com/intune/windows-enrollment-status). + ### Create the JSON file >[!TIP] @@ -66,36 +76,34 @@ This topic describes how to convert Windows 7 domain-joined computers to Azure A #### Retrieve profiles in Autopilot for existing devices JSON format ``` - Get-AutopilotProfile | ConvertTo-AutopilotConfigurationJSON > + Get-AutopilotProfile | ConvertTo-AutopilotConfigurationJSON ``` See the following sample output:

     PS C:\> Get-AutopilotProfile | ConvertTo-AutopilotConfigurationJSON
     {
-    "CloudAssignedTenantId":  "1537de22-988c-4e93-b8a5-83890f34a69b",
-    "Version":  2049,
-    "Comment_CloudAssignedOobeConfig":  "0x7FFFFFFF",
-    "Comment_Version":  "0x801",
-    "Comment_File":  "Profile Autopilot Profile",
-    "CloudAssignedAadServerData":  "{\"ZeroTouchConfig\":{\"CloudAssignedTenantUpn\":\"\",\"CloudAssignedTenantDomain\":\"M365x373186.onmicrosoft.com\"}}",
-    "CloudAssignedOobeConfig":  30,
-    "CloudAssignedDomainJoinMethod":  0,
-    "ZtdCorrelationId":  "7F9E6025-1E13-45F3-BF82-A3E8C5B59EAC",
-    "CloudAssignedLockdownConfig":  0,
-    "CloudAssignedTenantDomain":  "M365x373186.onmicrosoft.com"
+        "CloudAssignedTenantId":  "1537de22-988c-4e93-b8a5-83890f34a69b",
+        "CloudAssignedForcedEnrollment":  1,
+        "Version":  2049,
+        "Comment_File":  "Profile Autopilot Profile",
+        "CloudAssignedAadServerData":  "{\"ZeroTouchConfig\":{\"CloudAssignedTenantUpn\":\"\",\"ForcedEnrollment\":1,\"CloudAssignedTenantDomain\":\"M365x373186.onmicrosoft.com\"}}",
+        "CloudAssignedTenantDomain":  "M365x373186.onmicrosoft.com",
+        "CloudAssignedDomainJoinMethod":  0,
+        "CloudAssignedOobeConfig":  28,
+        "ZtdCorrelationId":  "7F9E6025-1E13-45F3-BF82-A3E8C5B59EAC"
     }
Each profile is encapsulated within braces **{ }**. In the previous example, a single profile is displayed. -See the following table for a description of properties used in the JSON file. + See the following table for a description of properties used in the JSON file. | Property | Description | | --- | --- | | Version (number, optional) | The version number that identifies the format of the JSON file. For Windows 10 1809, the version specified must be 2049. | | CloudAssignedTenantId (guid, required) | The Azure Active Directory tenant ID that should be used. This is the GUID for the tenant, and can be found in properties of the tenant. The value should not include braces. | | CloudAssignedTenantDomain (string, required) | The Azure Active Directory tenant name that should be used, e.g. tenant.onmicrosoft.com. | - | CloudAssignedOobeConfig (number, required) | This is a bitmap that shows which Autopilot settings were configured. Values include: SkipCortanaOptIn = 1, OobeUserNotLocalAdmin = 2, SkipExpressSettings = 4, SkipOemRegistration = 8, SkipEula = 16 + | CloudAssignedOobeConfig (number, required) | This is a bitmap that shows which Autopilot settings were configured. Values include: SkipCortanaOptIn = 1, OobeUserNotLocalAdmin = 2, SkipExpressSettings = 4, SkipOemRegistration = 8, SkipEula = 16 | | CloudAssignedDomainJoinMethod (number, required) | This property should be set to 0 and specifies that the device should join Azure AD. | | CloudAssignedForcedEnrollment (number, required) | Specifies that the device should require AAD Join and MDM enrollment.
0 = not required, 1 = required. | | ZtdCorrelationId (guid, required) | A unique GUID (without braces) that will be provided to Intune as part of the registration process. ZtdCorrelationId will be included in enrollment message as “OfflineAutoPilotEnrollmentCorrelator”. This attribute will be present only if the enrollment is taking place on a device registered with Zero Touch Provisioning via offline registration.| @@ -107,7 +115,7 @@ See the following table for a description of properties used in the JSON file. ``` Get-AutopilotProfile | ConvertTo-AutopilotConfigurationJSON | Out-File c:\Autopilot\AutopilotConfigurationFile.json -Encoding ASCII ``` - **IMPORTANT**: The file name must be named **AutopilotConfigurationFile.json** in addition to being encoded as ASCII or ANSI. + **IMPORTANT**: The file name must be named **AutopilotConfigurationFile.json** in addition to being encoded as ASCII/ANSI. If preferred, you can save the profile to a text file and edit in Notepad. In Notepad, when you choose **Save as** you must select Save as type: **All Files** and choose ANSI from the drop-down list next to **Encoding**. See the following example. @@ -116,7 +124,8 @@ See the following table for a description of properties used in the JSON file. After saving the file, move the file to a location suitable as an SCCM package source. >[!IMPORTANT] - >Multiple JSON profile files can be used, but each must be named **AutopilotConfigurationFile.json** in order for OOBE to follow the Autopilot experience. The file also must be encoded as ANSI. Saving the file with Unicode or UTF-8 encoding or saving it with a different file name will cause Windows 10 OOBE to not follow the Autopilot experience. + >Multiple JSON profile files can be used, but each must be named **AutopilotConfigurationFile.json** in order for OOBE to follow the Autopilot experience. The file also must be encoded as ANSI.

**Saving the file with Unicode or UTF-8 encoding or saving it with a different file name will cause Windows 10 OOBE to not follow the Autopilot experience**.
+ ### Create a package containing the JSON file @@ -130,6 +139,8 @@ See the following table for a description of properties used in the JSON file. - Program Type: **Do not create a program** 4. Click **Next** twice and then click **Close**. +**NOTE**: If you change user-driven Autopilot profile settings in Intune at a later date, you must also update the JSON file and redistribute the associated Config Mgr package. + ### Create a target collection >[!NOTE] @@ -272,8 +283,12 @@ Next, ensure that all content required for the task sequence is deployed to dist The Task Sequence will download content, reboot, format the drives and install Windows 10. The device will then proceed to be prepared for Autopilot. Once the task sequence has completed the device will boot into OOBE and provide an Autopilot experience. - +![refresh-1](images/up-1.png) +![refresh-2](images/up-2.png) +![refresh-3](images/up-3.png) ### Register the device for Windows Autopilot -Devices provisioned through Autopilot will only receive the guided OOBE Autopilot experience on first boot. There is currently no automatic registration into Windows Autopilot. Therefore, once updated to Windows 10, the device should be registered to ensure a continued Autopilot experience in the event of PC reset. \ No newline at end of file +Devices provisioned through Autopilot will only receive the guided OOBE Autopilot experience on first boot. There is currently no automatic registration into Windows Autopilot. Therefore, once updated to Windows 10, the device should be registered to ensure a continued Autopilot experience in the event of PC reset. + +For more information, see [Adding devices to Windows Autopilot](https://docs.microsoft.com/windows/deployment/windows-autopilot/add-devices). diff --git a/windows/deployment/windows-autopilot/images/up-1.PNG b/windows/deployment/windows-autopilot/images/up-1.PNG new file mode 100644 index 0000000000000000000000000000000000000000..c1284c53d28e2bafe15549a1738ce5eb3ab8c04a GIT binary patch literal 48240 zcmeFYWm_9<*EWn6D-yI&G`K^t7A=tA?(XjHQYh|FoKlLrB)GS@yKAvRa425nP0#y% z{>AlSwwYtHC3DQueeG){T18138q z=)lVnn>b&*_zfnaY4^Xnp z|93I>F+}0N&t$Owck6$W_|G{0XA}Q(h5xw%-X#Dp29>X5(4L?Y8nmUiC>WNcEcnkd zE&<Ah`nWJoaq%ZiL?exKIc|*GEQpEF| z61{U!Gr>z1PE~)9lj@^hR+SX|322xW66m^`bV#kEpu2uOWz_Gq=}|*`($Ah)Gb>_+ zCid(X$xj~@noEMVOBfPLoDRRqY&xYp**J*EGN$s!G#xJHY7w^ci_(Mzbf{1hNDM_v z^&7AS5;)qRxHUM(wn8h7TcWFF%jmGpY{{av%KI>hQMPNWdO*PCJ`GcHo5r2$_c?dl z1md_0N0%j%w~fb)H&i;zsfN2yCs-NiH0dd?lZ8~i zY*WSKRb~yzj@eAoG1VkjEQr*r8Y_n5NobM4wUN|_Ok^tli5k7%!{Z%geQGcTgx9HU z-bHGrdPPi;yN-TvDkE?*uH_*gc@t+V*5qc+qmLJ-ePFm-CXdW?Q?q4>ohJ42EvjSX zoAevPKYLS))gRK^WJQq6>zlwf3b(}z+s@&t83gOu*7&J6km5!Mo`<8ppq-nN%Yn9B7A&mBHqLTFp0%La@Ahj*Yb-7^r;f#E=e<>B zxz6wpNFSuQ80f7}Fm>)4VecRWka$2@2=YIjbf%FQVx-KStPmTml$rO1)Ctqd%+C7( z$~ag|-?AAO*(VWqGaXm--5>*efoB?cLNw%J^n%La7K}4qI8C{sjNj5zWg{8bh>|N_ z7Y6rMuuuDg2bYWaigff4)|u4$mK3Eu`a$z@jlW`0)fO#E>Jr9sbo@dJPB`eUqY?_L zF)c@3>52@5W$5Hr3XC{RBmi?ntn{{WF*6oTtcYN?)e=K3mFd0AsT1zuxj8Edr(DC^nm!=ztGO!Gkb%_e!mRJur!{X=Hy_=4gMo3D`qc!{|tjBmN560XOJiCti(gl8qgVsSmVZp^5nZ=`$J$q_}M1d)0{Nyc{Qmq9SP)tgy=6 z2JC26M9x8;3cgZgU)Wj3AxZR%X~!JV&>JDa5Z6pD*ekSs#n70TqeCs-E=9_i8>-R& z`t{#Svt^>`Cf`SorFU_%-XJsWK1ah9-mUS;xl%>nb4EVg0DSpcL>^SM;lm)IlUB?$cGHH(sfG3{Uyb6Fqphsju;@6| z#v}RDMYHoeM(=BxpE}g`x>|FEe(Hs!hs0R&F07vKozH;|(foJc-p78dIhaGoo*{zp zheY*FCU+O;C&!{wI8O95Ro1yvKG%7m7*!SZadO_5O)bdyv2L!;0>hFLKhN`+h{I#r z8=eg&zY&apqTY9FKfXL6Xs${O&wm&Knt{*LKt*YE4qyei7sXs^R!GcvOL|06pAH=o zGwmTU%SV0Ph-P>eM5QI`Oioe%%**ypE6bM=1aOl`uVZ`~jag{ef?qe!H| z8i}x|EB8aWvqP@h{t)nXh?C24Ci{9EI~F#@-7IIdCjn&DFJ&R&6Fk$w`tArM^~Q3N zK)=7shsWzGdb-e&aEjfe8=fJ*hr+IeM6D#u5#R_5`Z1>PAOQiS2~%;F0F1ME8Lyk- zY}0zlo+FjJAA{!wVv6M=oaNjYy5dX8uOx8%kh`1|XT#d|mLj46R!rn67`A|+xnv5~ zYmG^zC!tAtAp0|>m6*%5v5+0n=;0Szb73mKDibQ0dU2-Vz12Y1JK=YbcgL3I58T^I=s-iB?NG`=q|JbGIe+)D>{l$;CI5 zUzPeoV`fS|(pAGpk#o=E_+6hnSCGaE)?^>0*PLy|o9!gEReUigHXRNWEPymV`B!!!ma~?Zz=C;U7QJ>X9#g&BLIf5+#oX~qCscLk^^68TbTg5J-b{0P z%p>{i6pd6he0T|^Mf+b4ilGFucC{+(*E7(j4D+XWRQ~3aQ`w(C8}eF!*hm zZO7zY%$u)EwHyA0`?u?V{(Tf}p?g)KpG#fG^5UTv;xHyhY^BR9GNo8V7C$lzBe4SU z5l7oovX0F7RJE71sG?VYPRJPii~mDIb4){(Lk=I}aA@a8>dBRW&vEGG(YG|6LBvIZ zf5;YXn=RY+{~iM~51UR6(R51AJW3B>J%&wP=!MqstapxtIe8k0LM)v3!Y;s}5i?3< ztX0PcK{IY`Cr;phuJRAsTrtOeRi{~yTnqB~lEHNG#&A&}-wWj`w|M8UNGsiL@my(! zx8ieG1#E=;!I}ffqd#_uK8YWrh@ycxrS8zWUjQ-N{#9exN+3ML#{aYL2Xetr%hxu$ znik31u{=q+dew{Sb~VE+Drr@z%Hyei^o<8?Z=xQHQ7x38%x3|=`*u|f`HBG3ZiLb1 zzTEd7gV{(*su_@vM}%Jt zdg#4%!WKt`p#MT&u9%63wQWri>OU34PcZWfu-XY%m!ia>xb0f6@x?vD*aQ3yM&z}6 z=F<=czobw5WY>hvDw-wRz>#YrE*yi(mQF3g=E{*a74b#MiRkV}(o!85%*o82LCuJ{Qj`!RpS6~bcHmxbY0e83 zHPY{mhJ}YLYvVFDWe2XN@shuX=3zU`-Q&D-gZw%`{hZm9D4ML&U&m0}YP$+*^*)26 z>%ov9TmamTi97-e2h=g}ElV@2F=3~*>wWg|bR1u6_yH6Lsp!5$u1C6}717cD{fD;m zeV`MstSCq23Zo{2)MH*uB{Faky)0m&sVO=<)xz}1#$7m1qOq0xqNeki8m^A)Q)fFk ztwV)LL9WDwTzipO8e^#pDo73yVVFG(I=LVVC6wJq%DJ>B>htIUjd)IN@kiG=f>5!U zhMUOwqhXL^eQ2$|d9wfRCcLb`NUQ4(lP#pBAY&~R;gw&>E%@X~47IWQVkiMjir243 zgNv_E=kH1D3)$TXyyiJ0;Q2vH?E;F3LH7(r$Upf`rok<-yDE!KvBWnUGf^SK{WSbi zNKKp`^sBdtZK+9#tnS>e6;WWtSGZm{Qez~Pb`R?5C&89b2zyg0k9cSi!Q?!DnjC~{ zx;)*GM9o!gC&4GvInc@yD6bY|7%h?EFiU0!lI>T3aABaYUr*<}@k9#8U@%qa>~A-2 zi@~|b(@-!sN|Gewc*mfVDiG-c2N+mzgB@D==}$OB!IG4Z>X3zvVr+j zvPpp9D5S~{5KL4ms>sEuhC`a0j&Ms}XUU0cns87vmi1gtbCO(Cf+QtGuQSurY z;Z}K0gR{25@)cVkq4atRZ=w197oWC*aEjl_fS+F*MKl85)}Xj(n8}wHccW^^u7BW4+-;{}f_})MB2|YakPRMu!`v)l$cBoOHw39FscCHbRA>p#aV6c%ao)b>R?=f|Kyw*)G&vs~{S$4)ZXaX6}5V<<7nQ zg$AUJ3{)X{oaNCDwDP2}hn1^Dx3sZ6MG{oD<=swv*wSNF_@#}B^$AXH8Xo&Q&O{P2 zn-TCxJ5#E{Y!^$$BQRC{PTiC7QmHSGBbK-&*}yCA7q+UGo@ylVooB8M)@WH2m&S0Z zB?j^`7M%e#Cy=`EI>O!&%v+-897Kge^u1H}OopgXmk5~Rxhk?$xibnS@x7@#c=z$K z`rvop0fVgTmug=o88!NNdxe{J6T5URO(q8c+KWRbtq-{tyy2!xa?o5GZIg2y45qNd zyvRG1mYB}$p!>UC^=i5di5~#HtQDB`)ZZpKS$xQvw&b&=AR0(!T5xPu;dh-kHriv7 zx@}ARXJ(;rxkI(^Y!$GWHwpfLzpl6-p?xb;o@4>O7RLC#(+d9aC2-QX*h)TId|4Vo z4pjFtjm4{3;g@5^(glRpS(kIx=z*nh`ZdG_;DLory;3O8eLNpkIsS@F>m=lbvLdziIt}Vn5?S*WK^zTBQ5*oHGI18@-b6IMG($g0 zw)D|g`)CMD@rZ;#!GMq^!ZF;-%x{!YZ-rQV@{x7$d8r-K@+$>?%$Qm)qJxO~l7mut z>AnH-1mhekM-R!Dr$&=xesndb>x&;pOuK47?Q;2<84I|g|AEJZ|35T^1bl&E;QQ8j$Y zn2@RI>1_m0s95jF_JtMJ?L#5thhjb(vqjM{Dd2mw(HuZ8Etw@rlatKW;rFf7{b=`; zJ_Rr@F~Vm;?rXJetc~|xW*uuob2J_245ciR$jsr2?uD?YFP_AZH0Hl5_=HA97S@Xo zVR-@aJ2qGw0802H(nSFIlod5-(vPA;BzYq|!SpMFgsL^IrK5-s#g61Fb?B?@6u`_Q zyf!?<>O}jSsiYK_pr{)=WDfS-bC>rBv7rq%{g@HqsP!xn&c$?87-g{RNH?32i(Ta5 z)hLUd8N(zSWyye4pqlnF-gdIdp5f{=Q;=iB242Y5IF=l3@L@K&4jCu$-mAbL@E%6M z)%%^nYJaT`WptW66OS-0BhTtBF7rM}Ax^01G{-r+$54}GnDqyRLUe7m>u2^kz$T#_ zU&*N^pjFdi`n06(2bL;6fIKFfGKV-M!wYm3aURMNAblg^icce4rqur(S9xTf*eV%A zIPLbFPQk-H=TTmmm6Cs9C3D(*S#`JyQG-ERpMK@VCb>hSE+;gz*SoGPF1Z>7yU_Cs z_4LX#w6^d!8KY=0L))nw_4q%eX7`_uVibJeHAZ!NBM2-)S~9*P2G1g9$z;9PSL zwuOeG&*7S-ztO52G6YpS1a>m3Tkz7|^PX*K~NS3*RQ|G!)V&i>QC| z?vGke%ZGu>ZTzyKzVT4*!2xg&$iI!s5sp<0!~S`)*Y{WqEI~}zswSXZ6VTUYlZn2h z0^(7VQaL0zzA~j8KEya19g8Z-Y%Q-@RnV(g#TVzWLbDxXx*2o>v>#asa`$1WXphTe zvdEopg^OO6703b?WJx_W{DY=Hf1wIfXhYPp7E(*c46M$cFy~jB-ld8LvnRIE&2V2v z_XLoGd^?Zw0C%znX}WVgs>$?Jt=QLsv|>>&$Q z{*2;S1?01o6lOMwPPAYyuDvNK9D@3GGu*#9S{N|2qWr)v#L}e>#X6`U6xCb9VLNeA zX@tI+-Ti^VDx+T$WrJqf9aE9Ydg8Oh<(R+0Y$~1~^SdDG?~lmbg>vGQ)LP|@Su)w& zBI-jz#c@7TjDbCK!Xa7Fv!8yhho&W=kdFzK=3hNlHM>`;edL4&t3SdK0LIzXDhb?J z-Bdd19)=Z!l4|({2r&+0@%Xdl=87=QF{s}yhp9$icd;id9_0-STxd#I7*O?7_kGdA z#Ep^(p2wPwW@D2c`5pF~1_%sSwZ4CoQ}Ih(a&`%*4>l~u9(_yRu*^U5I~u5lDmxeD z@)KRUTt}nkKnHA@ayw{yCa3WuO<#c*lWLwx_jY;LMEdWvu*2ZpJm{YQQ4;>KnUoqo zViMF8%jGL!flkxdmdSYmd(pq}r`h~jgyR4FZ8V~w@78H7@16+eH=Afq!Zc{vLl|YD zS77xv%bX1xNR4dJ4?VDswxeN3T4^%iP1WZ@u(hc4`(jKsTEQ`r;;&jQ{)zKEQSk(RrLv2&Uh{sWuzpU!fDF7Wxm^_c~7UY-TWZ>Uc zOe7L>v(d9uAY946c}->hw|Lsj)69#ADSApN3oWW_3ODZKTm!8s`EbCOc8gm2`yV~Q zp4lA-YcB2;KtqQ$WcS%ZdXm?I^L>)Ph%H(7Icvn=O4Rs2_7|Vxk$<*(wd~Kv#_!WZ6`~?sc&4ObDTTXKCr7)G%O+q1oDf`0lWIsP z`L@mR)^Hd(T{Mcm?R@G%ojUmARiGXJMFL*nJ0QMy6DRBlzQ4=p!gh1obR}h~=6snl+GyA?GtJ=pB_pli^sws!}8>UGhQ@n1I%BIlD#LN%3 zEUU-s4D8tfztE+nBHSKE7(h)D4~0p41RWegCjhF}JyC7RYh$4?3BY){ib zVPa|W(ED6tGksEf()tdgZYDiJgtya1dLl07H3c?bcrrrMaa7s7XM!PMNRW?us3iX7 z(oM+A{oS43tXkY8n>5S8C(VhU1o<|x=v9?%E=NdXuiaZ}>oHyko;qaKkhu*lC#n)1 zQcDW(-_evmWy@&D<+7xt@_cX}UNa{eV42f+BhAPxDCAe>cp#*=$k!N@hqCP*(=q80 zlVE2&d27LX!s3|Y?dCFL>sp!p-49aw=LQ324_6G(CS%peMw{3( z)g+Pip6E-J-)XN@>W;<=OGn+5Rs*m;G!F~gDi3~joMuE90&zXK(8(3+Ng1WO>Jh~k zS<=a8d_4Vq!eLJ=o2*EX5*c^&RZXzgO`f6y)|h=KAV4kXZNrP1y4j88DIWcs9Qv ze^=-{ZbS#-qB=+dxG!Iu01APWz8cVBo9v{ zV)&gRw|?RTiujAwF%}g0U%F+M(mid>J+yd+T0ZTdxTp{b5Df}mf0U403y@<}(_wmr zqt_>i>ZVng(~wFua{kOxpPj^`p?+L6BpCX2ZZMA0n`)$H#L6|v??@f+<^66i0K>x3 z3X54F++#$--wxxndrwK&XM_Gt(*%M}xq~qF=cF!F_{;q{Xox|e47zXMG?kDKc4f*^ zP2&Twry(1Iv^e+Fx%0R4Bdye0>2VqphHDrAXSY$%cXR=%l_ljMvB{h78D@b79o~>G zi62GSTKKo?DOHZ4bX5}qT8T1q!`+yAxn$IzM7g;ts;x(#Mf>M<{?2D|SRPHZXle8G+M z-5l!A&Kd!p$^Maw%@+1xf4$`KCdmEJJIPr;?rSbj(6lT~(HVT;<3V^&jdb<6j`T+C zFfy~VMKetH7!qNYe&d((PSZ|oBsrM(lp$1-P)d2L1DY7f+tXT5D>a|5n^Wslr` z)edvGQIBa`$6N87>F3?Y+b`>PCfEZCvfO*dAvFbybK=q)mIUj+ZE(Z@o(6xCWA%Oc zN`D4q*z}J0t8;9O}54MNO>PP2gw;Vm1>EC!( z>6}UPz?+tRfBFnJbNt@wQ*RZh7hkH(P8rHd&cw~cPRQ-%G)aY>=?-ID7#BBla^3s-#EjU12$Q#O5#&E~<2|@X|KR zpnJDx-RYrl6M4$EZL1Pkq4Mk<+H0-8S}_{#de&N(&pFiEh8+_AevD$`?g1-IS}(T7 zW&4HS*}0P0$6lA!pGsS8)U&osZ$xI@#EVrn=IJ`BKVA3W{Q6CvJBZ5o<+Jexo)5k< zGQrH?zdfo97l=e|#No3CHbi8X?b;YOv-~zE@Lu(gr)Wo$}hSX7ejH)S_95iAoy|vSxO4jGuJsdK=~Oe#vNV zozI4^<8KfZL`NU)Pi-&zsr8>I=Zev5M%DcYA6VvvO=B9()=6|+3F*9tjWYVjMTy^-frTCQhAA?k!?{XVSu z(sf2Nk70#pM@IVFBK)|zA6Qb`qc=SLkjuJm$pJ$!aY>gm+C|d=J^|`k9jagqyqV@- ztKaZGKkqW7s7gzZM~!6LCM0ajp_KsVgjL6w^wtxf`g=5p^K(e*F0>4)7Aoh zoUq&cTJK1^_wFE>&Cj%OshUeAiFKmkh(0s=oKQ$5u`|*KJ;X&GMjmmok-)0r?WUzG zCcup#*+Fdx%ekk)k_A)pcmP(Wr}yk3L#~^y3@vo0MUFM=;+EP&b&Qs_7%F!pV zEwSyv&!XOQXz^CkP^usLS)m4i9siV+=JNE4^Jk;+JyAOD+qk$BV8)sC$^vgXU+5AiRqFhEBBd#*&pw^T8;MU10- zSCTv5f4Ufulyk+3D^a|f!Wudamkj7@ zo$Q*!WpJ40+UT9Ov*t3#$4i|D?PJI9oAyWp2}@JBI9sjcN)=Xn&E{NsydAM#Qh=yv zfZXT4U5S6a*jW%^-GC>JZB3ClV`n!04JTzbTc->hAemt~AJLGyaSINNLb)&M_g`+; z2M1x7lf1e*Csv1!t@mR=zXVzyQ&>$Cm$4laU%-8^&n`TLkp5HstyV0hzTndq67>?4 zC6mdMU)|>d3gj>B$MZoHl%(gD}+frg)&kaCp@=1Mgx%5eV(1g z1{#~!!n3|)m|QKi|MWeP6Na{s;;wZf2;t_1<#2XkDtBIyM>t>EE@9R5cTaW`5`dV_ z`0dn%1A3KRj$SBxzOUo@*M6cbLJx!uy`k7DOH6pKo;NR$Nn65$W)(@?d$oW zL-bxVb@MBNP%hu|G!{)D8oaIq9w0<-{3 zZ-bcg<(|x=Ni59Xxn?`bIglzRj^dLz_Vv>PKT=h2j!7Q;q4kJrTI})x1 z-Xs`UGMu)b3Lf8FE1Pe#2lwSYUkc*9w{lJ^=G*uzeRFtfw^{g4Fi0pp2@pj z#znaQ?s>hYgl!EU1%>@SCy(f$KU9y!=;xsTG9E7~1ButdIZWpW& za8Hui7(fsJi=yRf=|H#Kj69KoHzr(o_kf21h0LUa+2pPC&%9)ge0rCL848gpj+)(s zp4s6+Vrt}HME}j!aQmToYfDe}&bYX%*ImUMa{C>iDCj+E2JBmJ4&uB`1WCR?h7woN z-+mytxGSQ6Be>LG(9Gu0(%+;*;{2;EVe;2ko~}^t>RB%PoN=zUci7HsYdHGxUqiI_ zog*BfwZ8^F9BrYM24n4XT4uHm>%>*EnhnfiFTsACaJ9W4DdaUH^B?=5<2qhR2AtKg zL;h&vNc@ILpN|wl?k;a9`i+Eke)w5#*${Bb5a1Ze z-*Gk5b~n-e97nO=9i1WS59n&`b#d^#OkO&8cFkF{5_6|=xKX@U1F~iJlK6c5(?JQ zaN)8V<4RrCpHe*piLv!ql5B)JHZLP>#g*IKUwvCLc_wFD4-|^KWwkkR5SMHV%c;F% z9EjT_^x7v^xEV10G7aS4{Q7A-AI(f=)C^-Wy5y&>u^KUXJ}3KZ zMT#LLyhrf*tKktrdD^zk;m|tXGz5=9x3%4@UTkPO!lv(D9p4%nxGb9A&0oAV+e+cS zThq-jnLGyzdz_(E)z1#U-=CSixXRi$SuV?$ksVy&V<`sej2i?*y(jkOQQPEm0~by& zu&IYs9Ra03znU8;s)b83s-Td*4f^@XYgUt-c+z%2)OZPbl-SFxTcr7wu*qQ#0p#|1 z_1AT5cT^|;65$`OCt%ZCQKa4oj=sIY=hyOHFYmgHUj)5AoMY7q+zB@smm&r^(XB}b zhjw>=9Zbpyj*s0Wi~J&Rb9F{iIhweDG;=@N+!l zR@K(6+5WWR9l^wp^1KSO*z0C-mCaA(e@b?y9KmzMXb75E<7rk7E&EzaOOpkSfgdWm z!k7P8@9_8s6C;lRZ^XQrySffYmYnC>T5LPTexY^0N8hZ@i|g%v{2<)oBXr#9OTeI< z8|54ra|Vz?LrTi`vz(kG{s|jesL;M`G}J??>M9rx|iW zHQB#(gCwE7GVT`7v@l&(v~%*!3=mH}Ytt}qKfJG+7Xw@I<8gY`bksu-Vvv3Yx$#-WF_Ij@7)7H%yD=0`4(wcPLMVQ4iv>z?pew53oGXLaiTbU zH^Z#ST9z(f=0gL;p9GVJOMD6tjdaVW7?RP$=g?#~leI?_pOEZ!!!+_^N^hy{Ww9!b zyS9Nw7OLola_!5XX@TG9$oy4g+S5y}^|Lu~Q5CSGg9hcGAHM!77d5sd*wE?4Jn|EA<)a`P4{W}Oz z;(?41jE@6u{gPwJr(EaItZW^|9g_#BLh9U@uTX8N04l-Rs5&K2I$$7c6|? zn7uTyMh4uaG?V;T5QSGDqFsU@GAEssfckB#Sd*G4O3v84cok4RVCeTM{d0_NzV7lK zK2)$SMcIO+AevU-UZq3=Z5$Z$;`6j;)20aj0lRFZtSfP*B-uP^)JsudQlj9sK&Ej0 zEnt@qL*Ac9wL*}i@^4#uHz@&B;?B!swRHl_FJfdvgBNlfm7{yP`5J#X#Mi)6E+u&} zF8;v)XMPG?-bpa8Cd9%lt1YSFi1N@U8c*-aM^%{IuRM!YMDB%`&3LC9(qj8Y+UV+H zVVih_KfB8;<$&m>Gb}*(Ksz$%xn0!lw|#Hu+2Pk6g!F*GmP-uh34vd0!Nw6G-fJlB zG@N-m+3&-y0RMJ9C~Wt@cmp2@N=l5bnKZugZM@E)S!TWZ1E&7# zq7SAM!XcjDcb)LeFuhxErWxDcHPcyBd@b>S^Uq4u@j^P*6LNOuj15DFdBD`MNgAfY zoF3dl3Z&C54Ea6ko)EdUZ&XGnhXqP(DZ_v^lEV(uQSQH1qWMu;6o^gNn$rFv%WdUM zK`PNwaiCAqfADvNRxF*t4Jc%TRqhT6^lb@m2LBFhqFcCfV_dO8F1<+LjX3e!(zzM> zgq>I&EMzr~rUp4C9nBUu&(*al+|uU@hpLx8Nts*wqK^!L_?Q+m`^+B1Tn<+sA7O{9 zTo=_c)Ye6kEvuD-!5zX-*A_m+*-qFmNLCwO>$TG4gu-53%=*f--pSi}>0FQO2tP7L zPdpy+J$h1vguj{}PKkd!6d*6dn;IrIf)PwJn5trWDP!=-4>?T*PLu1i`pdve`cfkH znn({5bKOAXglE|BlI?co5cV;r*~+4_4`FhWDAGSZt?VNuw-?vM%OJZ5%H>m zP#O#wpNsct_(00dujC4p3bt3FEkWJEE3Q}D80KLHb?E!Ur?n`aq7J0N)j&>oEfv){ zD~i*+qMCAsK8OS9=mHErZKExn&hLY$ap5$^|H(|Z{3A#7M~-S!Bwa4r7O60X_1shX z@Z-)pze&m~DM13xr1Jueon&L8=KQ&3{AoM0N}u?Knh*TXhfYSRH53@se;;arx)Rd0 zs=~A#=GPSQ>RGu_L#;=3+8e{_JF&s3aUBDL5#9=^NnP@8kV-0f3UQoWA#t&D|Jy&V zne!1T=vJMarn=^|2~YQ=z@$9sTvGAhgjh4TG6U}DG>vqjqx$u1gtL2#S5EFjTI*~( zj7|duJ4A}w{yh5JioJc61Fj9FRWge(*>F$er=99(&cEpci`8xR9ZSbC?D~)z=mEd1 zb`|TlFruR^lJ@E`yFajTUIn%1mCN~s9H~Oj9QHgCzNg0nJm`tOO8|+{av~);kjfc@ z)YwAGEIX;|Uo)6hQd&(DPi_#(kd<(C*ef>nuD7iryM{X7GLZ3$kDy)=tKPv3fgl{> zha-1>n2d6CCE<~;w{6Q#Y-9Y3uh3hWmHc~&*Kvnqi%nKP7&`C65Wj>3skyX&L(!<# z{Qg;vT~_kOewN3Q%QkwLpIO_?Sw8aL)&e5hM1z4z*MAQEDIKJ{NI-z7SRXo|ZnOmt zO&~VB_oo%%g(qtbjnK9EhFF=K;f`asjnbN%vh2~=Zy zhAvhGXP9y==vYX@wPuSm3MaH@qfwx3^q~u3u}|#Gk;T3?-=tC(ONb~K^@-L7c*iZo zM3qJe=Zjb4^gH5b3Z`vD*q#G2C!tQ)JVl$xF}nMz&wI31QMnkfSU4*VeYfy2x!6pN zisVEKS%a1MvBCxn;cD90E-U}&ReUQS$uAM8re#7qHBAdx)*O{8N1986x62%1yv5oI z+Y3$NYmiqdTD&t=p_&P!Gl}V+8mwtqE!7ZNm89HrR1KpG_i#i2`*R|X{hqYESMbkEoR-*P7*2^t0Yw*o= z`^SKObejKD>))7_iCtQ#5+GI{lTQmJJ%*iNy1dC?u0*ds%s$!CdgQ0s{lUr%r2Hd4 zlIjeMEZUGJu<>J9k?x3MqjfuqJ)+=>@Rh0fQqpE!xFF zQ*V*zG^upt1g+Ic9@r}+M6d2a8K^p3iHm@W547+CX;1=^MIOc zGI^zonrxu0^=`IAec}b$TYxBYk-A_hK_pvGGd~+`Qov{GPy6@hj|fD7#&2hZEJ$@` zY#$*SA*==0VK_;D) zf{`zQPQi}>sLhR5DkKN$S5-c+CY#hHwn>IT7L7m{-?bN|Cv*>d8-O9;^F7@E2Bkz1 z6~_bMBbVST`ziDd=8o|6dm$7#l@uE$7qo$u z>CC6i8AczKwh=6(7I5ID%oZcV<$Mz>WEDSH zJ-gUDu0HUqn*eRQo738**PY1Vj}8`tfPg7PTS7i3>W=r9TwbyAC;mSke4Q(*`5ahV zyAmzqG{hbp{rN&=@0E5!rOA)4YjKYMbhA)42|qeDzp6U&F6dN~YVXr$vt@U{9HWFze2LC(>5lRbH}GGuQONCJ3e#4QEq1RQ?e9&H6`lqx0gxl z5E$?ZTOiU z`-j}sE#}RT427cjBz9!3Z&6I zg#(PJAooU}b*7(N!qlNu=6Gbt^YR zTw3ELAF#u6pe_#^v0Q&Y;Y|iF_s0=H@5q0DukY_s7PT}#1mtEuVgIVBP3L+-$1RP| zz?oOtSreh_9s$N}(1eTCYJZwl{ju+@_lYzQ+2~F!irE7B3Yg*EAtG|6MlZu|Y_ zS{I6P1k?p>8blrZP@P1vru&QU6OzubJBN5@b676%i$Je^rgD5RXaMk8-KscT=A=ei zH7xuuO0xT}wfj9vK4Y4C{_(J2d?uYE>df#8QNSFERv9mGwBW&UBPH=PV;&UOV|*p& z7o>{<>01N9>yq9tE#6_g6ry`20Qp9%T)x1W1yu%>|b{YQq3{$kwb9Ug&|766UXT1yymk(sqH zFkA_@f6Q9)t6({zzGKQj?IJ~je~DJzpdt;2o=Oj(J#m0r(ei6o@F#%fuZ~qV2VVjg z7%L^&KvgWj)AG^XnF=dI=l$hxyg^~ze#*CqjAvT~L^v#Jc^}CX_Qe@lUEj?5EoLWV zU)x};ota*za5iBsxun0DMFK5d19Ui;eW6Vi9vMwmKLtx z#8nKQ5BTI)E+d6MqiRQyKC?ultfWfn7 zlx_-CgU7O1DiH#cMODNHn)qO`ldbFTq5H<37q$K4OAb$jH|$|da)pFNuPtqrJKvX8 zdndlV(!irr=M;_0YS?JEB~|!(Yu4HKvYUy?!DnkeJ7E{C@4V$-Pc%DaEMzxPu2=0- z<5}A2&2uK;xMN`~%IIgx9<;LX@RX9$RQukIn|&f0FtZ3}!7VIh1}~Z>ev4!$5GH!J@NO zXAQ9-T16|lYP439m9oQ57sZ?On>LZF4Vd<$V57vJ*$Ix*^9`pak5C%7ka)FHS~CMs zl!gPrbfb9tXDHLojTUY^3}0z|sHZH3HrM=9)lpBQdRYelP^4c*L3qRNqOOeW0RMv! zhagLKjo%(<#{w@^(xT|r6B#R)h{RTN-Sxvj5xGUo2j*BuO8>xNMUJ4m)bPRI^IJUa zE152GpY**CK&?tM8NAuCIBrH#Gfer1@}{Wm$26R_i^CB8G&i|bI#$!Gs`}rRq4wZg zT(jt?qw%v&y%Z^jhcDiXlN+7k#IpOxX=_A4sB|Tv1~o%H};-p%*88!BOH9%Ku}`!aZ^QcW~Fn`&w*VKJB^-EqSh{nwViM zazNoIyns0 zmo5i`*D?fg!Gqm}Na(6r#i4PUGozOn`ACHssTSr&p{6W-SeZCmVy=m#v)Y+f6b2>m50K9CQi5U|<-s>!>T%cXQwH3LHRvcZ>7d;zJ5d=9> zH3q9S6ZO`NX`yrO9e-me8hwBT{3*+ATV=tK_xG+8c`;--SsF!+tI>AqI_q0?z@Tv% zNYuZr^2tjQm2K1mOLhz6+&ya76}8T?k)}f>74*Li?9$sFWR{Q``BIgz%EO28B)gv2 zkA>d#Q8Z5s9RFoB-QaOH-5PbD60Afuo$kF6!ihL3;<_j%sjJHD86DR*@hzuJlZ#Rt zCNNzJkt@g6giPFMy*_m|*LYD9773BiRgXWC`EtWIW@t`amxMCH$75_n8bC; z3bE_myU2V=^}CA%oWqsT_d8A`rNMmhthgRrLs&_qxxFMs@xN;($Qxg4wRl`< z+)*o0-7L&&r=4}BL$S>}r?D$5>`t4SDcZ@ll5yTJ6*7Oi8zBvq)th$;h< z#GYDpsO6=n=#xldKQ08B_T&6ER6tF6p6OP#Bg0wpV(SSXh1{PD9yk1Paj5S_cj)d# zaDcc{q-yoISJ|*_ZI&FGQEpme8{E-bU*tdm%pfcXaFD9N;zR-+c)_nbs8ySh%9LGu} zVq*86$xk(`Y8)=-?8H&Z`tySVwzUpq{k}9n-io39lZW;?FO6q#j%<|Cy1ims@Um2a zRxcyNV0MjQC6oM`BB|NS`ygmuL$C)9Z&mi`;4_r_8A`BMs!zlc%@l`xZ6zxR@yt8Q z7A|s-D)YMUe-;_hH!3&!2BovoK1xT&T#6$TtR)~bNa9D6IP6Ov5g_(8} zwLQg{=#E~sc*{{XD^*EPyr${?{{Rd@^S*!dAs|N#ybnJ=epkFSvy5#9NkUC&@o~}W zmCcjq-fZ#kU`G?iEtvqkISn&9`s0Pp?cs(c_+G_Kt*DkeQ7N>Ecy7iHn+(FIxA1Z9 zl)d4*l0o1|YTDIBX#dw+H>Q0eM6_B#3W0B}X?3NpDG{QoH+1PZTPHWC9rFMZ z&kx~Nd<1fZ;5s%O=~Ugajk4q$$^}FqU8&AkR>6`Il^%p5!Zk0=O7JU^l(wBCA*B=c zL(vQ5mvgF;9jh60)Nc~%t2b}W$pH(3Po>mN=aA3fq>oVZOD zxAof%6TLcQDgkD-`B+wR(d=0$NSK@`+=Dw_MnicBvh@ujT1Ci+5UlEapfTl(G>QZubl0c;z zFNZ4r+HdMF@*2w()49$jZTZVd243i!oBO0+mH44qy+ZH2D+MBCr7kAE__c`At;>YS zi)Ex-CCQ*9b=J}Bw1i1ZJvD4u1hY;R(TAR>pl(r(E)`NCl$M+;o)j<^@_NU;mP<>N zlu3npk7|pD`bFpi5aQjQp$v&&)i9Cpl~ADySq&?%Qb2XHwXDWPkoGX`WRf$!W}~wP zOc-_2Nx2#z79mDJnu)raqqrH8Z4|Eu8h%CMKs-eqeZMp*OUsTh4Q1gKPu7^)Oxg`dR04*(+&ZynS2q%SY>MiWoA2@Vq zh|diM8iNwX*3U&heNVNK{+$@+DrKhsI!^pG|G3P_ zy48uTSf(Dwy;u@Q+a)x0({1z~P(L#jAZj*H&9s5GtH@qWJKm4l{OuN{A$6B<`p9upehHg|x3!J6?3$;vtvL^|=|y9bhG|Pv zuAb@BYAyPlnD&a>xXZ-Nyf4M{yy>Nqxmb#>?##uN{1eirp+F|22JIB2i#C5|$R!p! zAJkkCf-l)akx!+t_fTM;esgh1{y7|)`5(U1coDvr`W<$d_bkSQ>m#g;g;N=aYU^;6 zmJh+G0h?i`t+&G_8?BGAW5!|dkdYWMVk9ah&rDwkOQIws51opj9ikB@E9Bp8kzZJq zZqSJ3NL)n%D-zjiiJ$Qofns~oaT+&i53$HSvP3lL=&y+tUmaWE1+$<4}>Za2_wEpHnESj&jcWhA_+MZgUs7=&NIL%Yj)p~2YB**F} zWi~_erhZX=@7J_$J>257qb0oJ`X%{kc*#E!p;5ieIn;8P_KVY4nQ2;Pzq`CzU(?Q- zzR4px*1Wa8TDRx|Ac@;;$+dm=W>Gsw<w2d#8^gB-#fetGZLMV_4Nsz8ukWM8TKG9A?E$&P{ zh&7ijJpQFJti}{}p8Z=K_}Z@6eeo&S&Oa9;{KxRv8wX?LxUI3(wiyf?6{7#33M!Sk zC>Q5q;)JQV?Uu=CZ};G&vap<-lq-!&P}Y^!qK;pMg^D%(tvwdXy_Q?&CTNFg{3NWp zNqDpRgSeSaQ?}}#m=RMZj;0;O(ayHEb2Y+6!|Sn$6Pc!~@l+`4l5A$=*M!%2IvN<4 z*BpzVrXgXpn3}f{!Rj9Sn@-;NskqY7NA*{cr|CrT)l6Mh zr>8g6Y5FQ2i~!Xs39{`P*;A7+iK(avbhOThD2X4B&}zpSR6QeBk`Y*an1GHz>IkZe zpJ*gC7K6rgbTu9&)I7BeD%Q&?c%u2!TK}YDPDZMuk?zP}1+v}`7aXpkeiFuvNSm~Knx2Pb zx`MeN(7LKgJgtwGp{rbSZ0auM(R@SC7r*HInebwora6~Ve)Ds>oO?A>cT-2HQ=E5_ zm+qT-=vLB*gl}ADu|Ufn`|Eqkq#>s5ph8;XCt=mh`Oy71e3Xa22ef|Cd&H4?Xx+?+ zbR19JHJ*v9?ix??HSHMXY1}p4ns~5#N=@SzU)zgo7x>R62!`V+WxsBH*Q0r()uyS1@Vv%a}d09gWiY>5X;CoZQfi zPU>ipxFx3ft4X+2;Gp0YQ4!UzH<;B+IsCvvyCl+FS%gxdYWhh{E?cmXDo1g(qg5dr z364n27?Bo>lcY1&Fly~qJIX=Xbj)R|2z_`+B;2C-y07hGeqvX#VmfQJC`^}st(%0) zh-j}XRS^~}EGvd+_DfM2q`;cL*4GGL9Z5I&s7UmTh5A@(af<}8rmtbNts<)xQ|2N= zgk(|Lzzaio;wDL$8#gU|6tC^U7I!1iG>$Z;ncM3G@O`PP>^ruIJXLlgA}eiDE@|7g za5;)-kEg4Mn{MNBM{{nIZPc#1joLV>UsA@T%uzkG2|bjYB2v09j#X)Mopz!(NoqUj zMNw7GrJM|tuACi{zg}RJ18GCk&e3^H%9G^RRlYc{Bu}#ycfClCkEcb)KB#u6SZy?-6Mn(=M8>);~&5 zp9-ht(KtO!7tQwmsKZo$;WGjZ1ZNw~aywsc}?OqjF)i~MwF9lM2-H!tyNKLkLkWY1SFuxn8$mfOox7YR@i%qUv|<4qlx>t+9kh13BHSG4 z%C4ro@yK{2x-@S|TTIIm)ltP{h=N=+?6Q6bnkrJibO&}EU&5je5x^qOHEmzpTI!;v zb@HTqZOsmBR77T!EX-^RvEKSV#*a^9V6g$|YC5VQGdMArfLxAm5TBp2-Un!@it!Zhy%BC!Dm~y*?JhB)( z2-q#>!7EA|ns$yxa7}$wRBAcmawTHR2utxZ<fJ z^xhQh7|d38Oy?eNKZr?O+p^KTY#DM{;FaQBJiE9Z&n};hvlhMzU4DPojAfWOVLslR zyc9S7X99ll*H%0~dpH`JnouqUXm2TCV80B?MNtEirizZ7*My)X;z-5J3i+*A-bBb% zC4TFo0Nd>dT>WDUmmKHg(7k+o{Xh%9{7w$n{m8~=#*|R*sGuZbMa7SQ|NDuDOTTDgTuJg4cb!$CZK5Jf zM>LHnly=>ErvNAKTE(UfB4~9QgqB0f?THvL;TJp1AvmYQNc%Ni;W`>w(#H6 zi#TSB3dRN*IGt&U8<;%Jdd^a275~~k+6HEdN+|V~c67{i6=_=ur>5y5$?P1Ucq6|MR~KF`~4Ko{jP(hE#hgWd1zRv zlL%lH=%%_V#5BIN0m^djCGX(_T^zVY3Ofy|qD?+4B{TIy{LDzQwt>Xa$C}I5%-xnW ztD2zJOU$&J6vWr{y0v|3-t#N_O!OI(dK-}}`)Yd8Q0r$#CDU66x(C}5vSmqy`IOtoBs>L*2`hLZO38! zdc#lWHoO%iH?Mp2z7z})8dmjHp+g*XX$-`s@I< zq?vA(V^R24TJlO+$T}jdv$kpatOQ7F$1UQ=m8%rJ5YV(+mxnlUTMNytISg2*1$&Pu z83FH^HQ++jRZGZA(7cqjt<}diyM_4P=RIUZLANe0Nj)s2&CmKG2vLT=yaY!Dl^Y_R z4$z=$HLD=2q|iCt#+g@GxPERY!m?x%rqNl*p{=thf;=?qRHsEr7Nu-nyM@8y3pnw> z0Q-$}rMx1JJ9N5%T#W1`4ZolsXWr!Em4zbUMU*>f5zu)H1xrL=se-f$Qb|*sP+zQ~ zD(#e(a%I{?fQs0*G9Gd{DO)i_p*=*=_Tb2sKuX$C*EMz}@PgS@TyU+0YbLtL=*lMY z#_gXkq287JMbKvpz%~aK@vVJrxXrD&_L?ew_EZ{~lw54-Ig>Z3FYTZ!t~g8OJtXJ8 zB9|n#q@79?gITY>{kRDsbf@Kx&0d4j3Ti zZs@3@EbozuD`H%VR+aK)L~S>@0qU|A=FJUo_SL}Cvodn=AQw&Yo@$VCrQ9|V<#H@- z(9$Ls3G!YTn6uC*0iHGE;b8tVd9yKFcpA0+OFF!QK-j#&EmRu zT`-87eiwB4)ohKwBInuC?>{PJLMV_4sU_0L@feC~jif{Q0H)8(dvwxhbcp!18h~GI z`E}eo_NUnG%_hA3Ob3>>me4e?4$W<4%$czmd+j*{CvN=`PWsexY_!w*Xc#<51f(rO zObVhaYiPP60Cb+Ljxw4NJrN(#Pw7(b74ok&UA@2;t*6rx((>0Kg4tP~MoVh}{Tr(o zE|q;{v5SK~Uxyd}0PHz3!1@OPFI-%~o&!Am<$U1r%YEE;Ch*8*1^jtiA45hhz@wLz z@Y2P=!@msh{9g*#Nd)nM#}zQ?uN91JwDJ4jhIsM9DxUm-j~6d!!=*cfm{niFK}V(W z+Mh#Qa$JCCE)4Pfc_B8;RdLjD4z4-SGjolrA_{fQ=5`UhpZSUip-O;nUS7tMd>#jj zAZ=Y(!j8Ll;JFKcBZk>XZPSJ)FSc>&=UnXED5@}*#plMfVype?@Z4oSt~wQX=wb^u zd^v}aL$WydTfpmo^zh(MT5#!4DtP)*4_muc4B1&OApRQSA3MssAW+31;&gd{A>-0` zW-P=VkEpFGB2=En@pk^lQ|{F1r9*%2h?3lgEa;6|tW_9YxyiyaOxP=Tjv- zf0d7GzY9$KZ3S0+!GXIpgKz&1c<~Y+H~y@OuWnI5upmTPE9vO(#{qxJg$mg{-q5sNLo7#NMX|7t2pP=7W$12aOWS|@%tk@{O^Ja z?)z>DBgVJl(~VhR5OC`5d0c*VJKi{1iZ;T>BbTJ{s+@;Me_6sae{RL@5^VlD9k}*) z^?2gvJ}x+^0nc8L!gHtSg-9fFJK8+d=koaJua@JXvprmVN(Ot67Y{FmVy28wA63Sq zzi7vqUoGO%%N-myW;ycm-h1SdDjq$|!SZ|&7hIIWv)?UZ<1O0o_$4;}xLpZuhmFfG zXvafRmV5rxfXBbtflX~6V|Hu9eHS$2tgi*Q`J8q{(@e<@YIE`EY+snbwJkuPwl& zS7&3+?73Lh+##ykN4hR;o^Ca4ogrvkXDk-A0tLUn8RgLtF%`!~44a>zBkRgnJH1{^ zcnFa(019w^mg5M5lH^aMYI)W zJ2>D+Ropu-kDd2-P%4Z-J97BX-#mQo&k|IG;TBuvv7{td106o>s*Cn?3YA$7KJ#NA z_s$uB?e}-F-k21AwTq93|8C*%A3FHqv(nZjON611Kc3r&FWe}3rhE}PftkPU7ai=n zy$Gx6WlXs>z?CnC*mnIqHtCl^^P;S|5NRvqFuyq`djXa`=i|ERQijDIE_B5Q{^J0A`e!!Y@UuAQ$STT9Qqp8DX18Y0q5@gc zOs74Zc#4bk!aDrmOb3VkE<|>;h2wU$arF~*=3?rGTSdsW4?xz+Va82)+|(iUniAkg zccgK~H!^5@A&mo14{_A39(LO+#35T2|L?EFpOnu?9Hzg3Sn&+EY7Ua_(5KFjd=updtNeH-SvA?8YXQ_BLZyJ3LQxkfyD zZ#_QygEGE*R~B=gZ^FOl>YLHWS&s*Bz5b}^O_@bY-V0US`1cA9IbT}Q?T>Y~0={u@ z4qKN?_`jd0apa#wJj=BPS}iPUldXtkeVWV;$A5r22+cY{u?Fv3{>qYWW_9tvbaVzgsW^f9?+ zS2V?k?O;{1EiP_>zd!v&JpATPnAbWQWsJkp;$TdelfkPZju$SP56`clv7sK>OcsTX z5|%D6A(Ivn+EKvVg$@=MhDJ-fsp))RGm%xwspYG+c(kb2%*{@sH1!F0fe5Vu7=io$ z=3s+Eia6$4$uCvLrdtG<(@%t;j=pI$oeSLFE_*gYJEb}ql?4@8<>hFR{OxRDe)bNe zrTkg#=&0&#gMpM^AAYU7I>*<7MlCOpf|lCQs`EwNBC<{q8A40M2VGsI1;~HwnR)?_{PvqbV?y^zo~))nkp#wFW?)SmQX5cW-6`=aN6|iEHroI z*NJ9@lSWypu(dSIi?4a;kQ4jX%!(Y9F>Ht>O(aj-d#KZ?C}}yb za?vqdO8ug$hAhjKTW5O(zGch%Qz|&eMvDky6}V1V!O(sMR9mu`wp<_Z5~8`o zhE?oDQ73!57E%=l<1^AoBIIA59UxWM65t7GN3UNAr=3>CuO72-(qhHHiX3j8YG16G@_c;y#Q{ZQ}5w}C|&sN;xGCulX6kb z^p~pz74;UDH|uQS6n5UXfRy+jvzw zlqz;Tz8?Gi6nLa1hl7s}u)bZCe!qZWITw3vqhDtZa>W#~D&{2FVn+pc1Uc+_fP+n% zJnX$qLFAi*c_P4^f|O@O7DMtWthb(ngEkE@?b#5eRK?6^Hb2vMN*K#Uz0~2kH-N!g z6mh^PAKPtQz#ao~m_Ad^ZBg6ImWz*!L~#-5MA($Hv$QwzX{`cYEM>6Mmw_#_865E$ zJuv}_3q`=Y{iXdxur8DEa+1BGi#jRy)R}Tlga_{Nu*1ndZkd_I=9B0~~r-fNx)4!Ps?y9S3-Fp5&yY`eDJ+wB%=r zP_C1U0ui*5M<@cnB=0|6$|75}F>_`UQtRjxnF=;oFTl2gL`S9a$od(G7M6>-D(1FG zA)5kxR@!{ruq+N7tEwxF=}UoDsqw5=0(|O38|Ocn!PLnfmiTg!A{TwrnzdFoX1tI` zP?U4-XN@cyDi;!Wza=tlP!XGN>SO(VEIj-R7o&1zyxMLdBVzrelP!Gd8XF6jlrV9E zjUS%iVC1|Kwm&4qRg=ruY=;m-b(%m)E|TQ*8*ywtFSIU8+9lpMbF|e>{%rH57frKJ zBc!iGflNpZ+DGV3Dyvc;_hz~R#k^&C-2VJVn7c$or%0Hp(5Tc4gY)| z_dGKOi#yiQ0m@#}(L4FgvRA6nR%RNmoRTyGEL$`kGs+n(6+tw*&PJxaf_ZZ*nA+lE z$9=MR@Mj}RL+32XRH$r++TZqo8gX}^duP?}oKFVQ1a}^Up2aO_P z7A^Ad@^TkB5sl3YfpS9*&98@;*b&8Z7kZdIKZTArTJibwJ27ro3lCgez}|yeMMeAQ zSnA-y%a`DRA4$`fY@|i3WwHhAw)qmg_N zk;cz{&+$;ahCYr!4j{`pgETySIt_uTH_ zN7poC?u;s4SQy|Nr<8GMzlyYV1#ZPhX}XUYB4qQ+9Gvy*cHA|q1y}yn!nX&sU7giBn!Hr2*D18g}}DP&5nya6kC;zb|FT<2iFV;gbb#WqgbHG_Z5E#kBQh4D9rUK{(tFF?*SZ3Ds7-HMxk5w({`gO;w!p*#LL{vl0KDmdDk%Psf5m zY20*X8-izSJigpV&i665!-EtbqvX8Jlk?XimkXUyJ z$z7k7+RsB@vD*6gVqGK2V$p?j^!-N&iLmzDbN?{jC!|kO=qzBw*unVAKX1Y08B5{V z7BZOtx8Iw?t#{QUr}HE}0(5}X6XEMRK1MYyl;Z+?T~bTezO`+%S4X40TxV9o=+SZM z#9ZBoW8&Q9tzNx#a^fC@73m1mBEY3j><0|0Nd8V4?XK*!)T2%WP?OYkSz5}l#5Rw! z_9a}H^P#`^2fl+s2B_CHY*Rj*OepRyI&^4U$mtShBHq#>PQtQFmdtdyu=a|B2G>GW+Af% ztDres#K>$t@*@71h{!04=xEG)7~oVJS4Pa+Q z5*Kt;hBC5p5#r>f4svdq?RKMK^3?`(l=M8yd62fK%gR>rY4vrh@(DNfZh-6gqFDx_A5U*4LiK{0&)Z8eI|e1 z-!_Ew4JeRFpC=K>7ha5Pxt?-qf4`$s2`6I3XxI9L$3;yNl@MDPe2-9 zgX!@~yD%$W8qS0e>k`)@ro`Q(VZ6mvHJ}+$iV_aRL-Wy6)YTg7I6ByJ`O+G!Q{?R z#Gk2#c*k`z8K{fwCUrNyTGc7iZ7_*w3(8;I z#%4dx*A_ol1a7~91zd1Z2J1<>3o-@N&1}H8eqmv%J_N)}gx9x-#FaQ^-CS)BIoDBJ zNM>@Z_0zP?zt$%{Bj)^>ipakPl|X_mULakVTa4M8`W1d(cTviWF}`QC%v$qEcx%F$vcZ zcA}b2A+scd{=-CnX`@!7wl(5P^N!QeWHk-rrw*E?cp=_e#=nO<{EGCgu zI4VZS8CQuSf)L0IZeUncT zsE?v;6Pi2rfQks@y?1WIk;luoL)kYM6N~dAkbg{pO!_w6-=>80b>#csbe!>4JN^~t z?X4LmfePr|KX5BYyqej-{R+Vs?jtQ%A zq;YEEm@;+c6S?aRKvDkUr}I~3UwfI%->O*T}RCMyQLsp5Lf!TK1^S(fN|NlD5fT{o}QY&6C_T@7T|5#iBIgef8J$ zb*m;9GA11@mO1}=J~R)F6QygG@Jre{PB)34lyz;l+Pbf3Nn0dsFHK@TPkP}Z|AY{M z0+|p&x>D0Is4zC2guZC6v62pE^;%8GpO}gUG41$zGxax*>Wzhj5qP>DnYydLm=Q}R zOdz63%m@()r_0KzAgYRA{HW>3#J#Nkvaj(H(In;34q8RE-b5HZ$V5d9kn&SV2Mur~ zyv{e(Igct<>r)NLS`B8Nu<5ilzE04Vt$83yQfE_6%_q)7!>XGpYvdL^YB_S($48qR z8KoY!ZpBTv{rx=hVGh2|r(PyObqPF8N8{)ma3kQNG&OB=!{SZ0l{k8n2eOc+g5)7CVTaFH-f%53VUCiOR4t)sS$Y0s#>rmk@rl6tF|sid(* z7eP{f-Is7C?W8?Sx_X|XvS>I*_Voc0<{=W2S4!H&_3}tboyu}-=E%!m-pRuW+~_?a zX_)s^mudTU=cjd!>KC0qJ$FXri+gmQ)Lq{b;!x4H)^if2rTa-8Ypv^jEc=#uKPL6m zt-6U{SxnAb^hj)9+=8xinv^d&pGkUatw}x2d5HIWv}L^2w$QD%z5WuTKgP(v`R>zc zFw%;I^l9|-KnM{;hKMDvu|SDCku}RAvDusT9$rl9qGBQv2`Xqb4HbFuXj>9a(lAet zQ$JIGZHGvp8Ijt3E@aiAOsqxpelk#f%$+3!XtLm7v)XkJzE#6Pk zO59AEUFk+~l5|aa@irP=P0|pdE^bCdb@|8X#`~uHv746H2wSaZ;%3r|&Q(`_U2#-M zi=PV8B%Eo-sEoRlpN>eIbmO`wX4*M!Yqjn)Wvjn5XdPug(DpI;N9R%NZ{Bm7wt0VR z-cg!nKenjsYq7=kP3l~`U)vVuJ3-so)0y!e%+w)i-spvpzKwi?5JC*nCnO`tIz!Y9 zq4d`ItY$N#l`1G}P2JzYR8(p>TScW2mikkV4U>nYZ-l22F|{WCrgQDZ z&*UNgRS{2#nY2Z)NP3YV)3PLCWM53(yUJ)fY~4np%9KM#XS>QOXGO)3iXw53EXg}c zD;W)q^3puiU*dL^Q_~hjAeKxUF=dji5mLsqyqb4+y1H-5X5vJ3=qigbZPQ4gMkZm! zbadB@@S5~&b0J{%jYWQ4!czTYt93W!jz{WE{wr8gRx>&*7Cl{2^U$`@eeu(LHN80f zNX+Us3ah3U0OsOEwn-cfucBGgwxynGTHolG1dXp@qxf3)XkYv^j>$*!)AyNdygu^vJpbaT8KVGarXm?_}0ksT7WI|%h z++!=6f2TK$>Cg4rSvb-;&}cN;+G+CLCtLl_)9*h0`qS^ih^`$%`WzfVCVie{1o^N3 zz6DcfH=9mEA2>0%DZu(ebx~kK2w8iX+w5b;A_uvY1qUG()%VAtr|1as)2JUfgd@nL zPeOrA`aE3%`Fat^vs&Qj^hrNNof}}?L2k50E+K@hg*cW7($3l_2|+dL;|alRkE zK!Hs9IGkcZNKEq6Vss}re_AAj^d0mYFPUPd!hn*P^mQnZ35kh1i0DH>c}xiDOPKFI zvFMTEu_GaU7z$)UV)Vmci!|m4G9jcdp`*p}t!Msh^DRgSp+F`iMxQ^Ry4YCkMhGE& zfoNbL`u^h=AR!dUgc!^SO58DYbrOUS(pN~PR&a_1AqEO$LSoDm3l+!lK5tSXg!C1n z=@t6j7i|gY>+o|xNDZcQ;1Kc$!m=H>x<(!$O6JiKe;K^1^^|5Z> zZ3tO9lBTAn$QtU*dZO^yRSLK_uJhx~?{>OTT-%?~3IhSC=tkUb=l>Dcb4xRTkU%uxiY1O1Wl)#*uiA9H-M+)Y;2$^#xaBT8EEJDkWhgoP;-J5z(1SOE__N z;xr8+3RB{iPNz&+72DNg5pdZ$%zXYf-1W>-bWFPwm;L)S*jY(a(@9JI8rI|=g-_CT zB+s5-1|rqPyX|oKL>Eoz-tT=?s&u~ggHbxoPH-A!t}wWBRU-F^v&ZL=M=m$F>=Tqo+Kox0mo>MMDh`bxZ1 zDvP!m_v4z|rXrJ1VYwC^sOIR^c_e@Ux(k~gv4l{pdEwh zAR?!gVu_%xR(vcQ_BGt{@WVKMoj38Dv+h8}E?~*>q6j7%oh{4J+1ZK(^Os}#1{)&}t3AzMtJ2L){V<&YOb?uRe=6rY{gRSr5Cq6t6w^ES`U5 z0v5JaM3iaaMD%sc!*kC)hi9Lgh|a)8Rs>tiw264;nP)Im)4X|j&Y_tcuz*B^ss)IM}zxe0v zQ*qyuPni+v7OBsiDKAUDFJMv0f?sUGg6VJI`RAX<^d%i4&g;=opF;EOH_`5Ak;?j5 zJb4zRHQ;7)XnXK{Z1eM3xbdO;asQ)##{Ul427iCP8O=+UVA|`?;rW+dL)mRaW4?+> z&p#*SdmWup-$Gj_md$w`6Q{QzC@qxywC)p7Kng+2RNVaUoAK0?X6$vyKFF8auw?#B zyzm@;Rnh}ArT!a}?%?fAm0ldz<-YJ_!t!*ran$yxa7|6ai35BvsgPfD4W&4M(I zl-ok%7Q)GdSU7(XroR3> z7LaDYiwcNjI*w(;!6i_jGHd_72aI>Ccbz0 zSye};Ui#mqcwo^cIBfrQfxtm9_euQa`Uf!k!5eV3za0+C-;3{k?<%}H?G>~S z-Vp8gUyeIoU4mlE1Uxgn4(UgKhSRQ|g(?5J6ce}G1#kT9Te#|#DVTBp)i~?1I(+{t z1M#(?JEP<1pJ2BE9;$(bbc2h>&;2!qf9n)Hde@UU?#tWaoFk6Kjju|)hpxu2Z>nNM z=?47rPxoWt)JJgcCC_2wT?S%7%P0(b`g{0A@n{@1{%-7a@Lf3K+XrEQ+k$^xa6Ps= z_H=w^!~TFf9$Rke;nfEo#4mqvA!hnZ@WPd6T_9AAB&~_)?iGSVyCi0t(#O#Z&!y^l4;rWN2Kzd*q zXB>Ja<}SV;XJ7du!l^gojO*v)_^<7UwCC}cYO+S7*WGQU0G?dPrd=I94$+a$;GcKi zh2cx*B3+k{LlV-r;1CBPF{*jBv(O#gyfY#q(=Hyk_zM_4dH}xl$R;@Jr+dQjUDW4w zPOODoz5yB6!MI(%iu2FE1eg5kSS)+#HKfPyjQ>0DVq9_CpHO+~8KAKqZmJ$zAAA}v zyW}dI_POoR`oxvECpZqb-+C!7J?m%;4ueQ&iCXVBvI$e~xD)rh{2ZS8&#k!Pzf*9) zZ!W+!*Zv!49JB*=`23e}?5TgmkG{ACvh5Ra$rBskwg>-;n;tt2PaXSL%o)82zH#P1 zaJdM?4HizvLac`?roM!uM^;euBo8}ihb_Y+uPl+P4Hvur{8y;I;#xd$)n(ZGcV}aaRYXwr zq|Dg~u*FWt;lf}30$Y#HB6Ry(#g~hHmP-Z7V5O; z$qhwLlMppp??yL$g_etaeO{!Sh(}8VYOw?JJ1XV_nl|%X1qss-zKTz8`5XNHtvB)7 z#A~rd&J}T8M00ypLl{cSmZMdUb*?ee8Km20VVQb#E=OTtBeL!QG^PqtppxvTq@*QG zdG19lDqCjmu#-+<&ZBo@V(XJQasQJrBR?4zUi~86K|?X5pU&%T$GrOf7?jUpz<@?M zu41v9#(+8(zF&rw`84+2@>e+ioSpE)gEHtW`KYEEvHQppF8s$MNagC0&jz^n>f2Da zpN-*?8a$7u$X6E4b~+ z+tB~An=l8P<69@*hvQFLfG_W~2?p%_V=N5s!JRwrg5!UG4@%_{+LuYYWgLljHYPsz zGUhFxj!S;Aj}%1ej)I)){*qTGT*=$yMaU-rmBRXdjh-N?m-mDa3S>fJq7EY3G23?` z2m&mcH&^7)c>MOleQ?$eo8y+sF7O}z8itM=gYzG0gI(>wvgI8jo&c}Zf!4NmEMMLx zGFTl7Sk~N**48!@3Th*$L8Dah-`$A&?!Oy% zym&pTzyAZK&3gg|tT!AZvR^>MnLoj&?N{*q12@O$ft%rpbq>KHn`f|Od8euC_M07# zEsov*Y{(*zr?mVD6$$5ym^<3uFI%sW>P8G{ z8iB#769-%Y?MNCMvS<@wYo~Ll&!t76mEmSGaR|}C zl8&45(AHX%FnQ#&x)MW(_SOzF+S$~QGU2LKz_lxA7jc)#Hy|x#nEc#rnAz5V1&`i{ zDSQ41=j=Wh?UevoU3#tS($+_3r;ofDH5I%PI;yrQixT=}l>9Vu>8RK93I*78S(H0E zPzh6#e;Vyl{)Waps-3MU80BsuSKk1uT0o&J4t8F`Ey1Zr{vJnN{6}otPt&U6nqQxR z*6mKicRxK&G7=G6wvbKx(gqd$=9>p1fBf}0b;l+YDk_;ZSx3^Xm%2rVW^(tETd?<0 zv+%(GPJ@n3S35gUcBCz{(Fzn&VrhR{s#QQq+OlWeJ!!`RvQ3SMT2X{}HI%D@mB2dsZC*v&|KBHu8W7SJsVHWPGRJF2ji$? zx7It7dTmE1mBq9tuYtSe@mMEIaZCCJT>@Dym{lO_h2MPn{@I%Xne=fekV&7Xhd^E^ z0@)IQ?1?}wuRejSs7OvbKp0d}ELK*NI8G3eoRYTis$GIt*Cw_?4_=KpPHN88ogDO5|H=XkiHHDG9iL4Z&V6^ zjkNG7ImnKatb;%ZA!{DG9HrXI1h39Pp4aAK#^uk|Yb5&J zG+@90)YsR;_j~_UEE32*-df^y3*?3YIQFL}Qy`N*4Fxjk^CSZKk1CL7EH(n!3&M95 z$l7V#e*5j%bB8UFw&JyZh4xB__Hu|34LxTtE$j%8OIc{jbazrEPdcMwfT4LCZcXsz z;-)vb4XW#Q)Z+z`#(rfz*KFMxZXeouJv+|1}?mT`F28&qT z@uEd=a<;jDCXn#qZ^z)Es}|wz$>py6zAyRxp_lwRB)^L#zaQ;=XFS`{+jmq|i_&S- zs;W_&+OsIFT2&QlR#AKJk)T#fttyI=qV^_YCq$LnwRh|tu@ZzNPx`+<&;2~Fp104N zJ1_D%zhCkj=Umsh&UL=$I@fo6wIO2lqY``tLTB@DQcznh zGRqecJP5`gVGihzrE6I*Q8a!bN}!~3^KQgYOvL?)d?@nmahaYh)I zAgh9Ev8z@IMiyz@GAknIxtQE-4ePvWqp$t9?3H8jznbs)TOp}#aV%H5g-4Hy-GY6I z6gSg7${(ouPA+H}?y$m@RN^tLM~;#+_ud6@>0b>bk@q|ta(Vi^*5u^0*O94BCAl^9 ze6I7v;Jlahe@y!|IXCi$RAkkhihZhb!+eG8`4w4rB#fSlo%zPA@vuB3Ls4Y%@n07A zxyY=YSGk^&VXFTWe*S}>lpm6!boD~FrZz^VQ{Rr%5?o;$tz1n0RxcMdX9XFXNr zJ5{_Qr_Wv5Hj4FC3@HZaf11=2Blvp{=vNdg8_PG)vJM9w7{XJT!T)J2t2gZS9@&QnitIP zXu2+wm9rP#c#;-vP$KB#U|=#|=4<7BxRQR2%b5|cG`_GP0-0Wb6h0$|3}ODG-7$eL zpQFhy11*FJ-fC(d43uTuqYc z#uk_L-OqlJQE;Ne@=GPwo-0+?Hx=n;F57IGy4ZWxqis43wMjrF{2F-9an>4$eEVUo zFuCvNa(+(ZBS(hYk|pXKEFhO3_=+Tm@Ya~tw0G0qVcTstW5PeBeDuE=7oS6ZnpWiH zT5(W^>z~=QvR}zg1NcgaFe>>{x`E0l%qmfw;mVLeyD3LWqnzJG z3>OOYL^56^Y}}u+@tUn+2*jZeU$V)rAuM3u3kVZQX?tVyDs zAz%JST)UonLbi2| ztp|(ajhm%rZxd&!R?hpPH02pWaW;*6e|V;RRt)}nx7i%(2KEOA-s;5?#DC^So)bN( zh@O4<`!VH-y4_ON>)Z`1Ul6Fsv}5_Hfc)IeZ)bEwT(|Z??}zZI_eFo7Ovf1pDO94D zQj2oZYU$e-qmLEflUL99hn?%lMt@!Htw=1kw&mO4(gZc8qngJ%IgQpt4gY`))2~Ln zlPhjuTpB@`e?pL!)cQ3ne;F%fW@a`EWtHqGyY*1`zLEUItly!ku5R&FQ=NlA9gl4M z8=;XT?GrQ9kVqC8-EYFX`S$~b+z$Y zyf2IGq1GwySV0To%Bv>c*3)!#@%JrND@_G8!@dyM0EpcSpK1-S5rlJDfui6b$-~s!r3+vZNxb&iGO9=P~Y!{u`)> zmoxqc6{ya|>nbrV?-|22s+MDC-8(+sRQKFkLm+qJ-u5PGEA&h_2j2S|LV_Hi5jx0d z1=olUFPfht)#RtC(fklA&vyDji2 zP7;deTa(A7%4YQYKkl+3h>L~*n}ZN@zlkk=GJS|Pr#$Dz9Dz~7>t=z8p59@4t2szt z@;=Xo<*f5+@n7b-Do88C7w=n;Q9Sh1vwwWL|1wlEe9V4fvoy-^mgr``*oeh+R}3*$ zul}j4`8yn6Gkv8~%$Cr0Fcz6r4JMJv7hpDGKT!bl{py$y#FhTgeHWL|Weo=>q2+!` z#79!gMO7mXlfD?n&d{Apt!>hWyxH(|Q3rlCOESJgp1Za>nl0wb)m9hYm`To4YB%_j z+HPY<&XkQhZ59VeI)R+lu3cSJ^S4#lV>pyunhinWciJmwl7{o#GKL|CDe{vC7&=af zNB4Nm19@T74%{xagSgZ4%be3D4~^r{Q){a`9%l@=2*Y^IkJ+!Uj6&cXlgfUS@D?op z)EU-un1Xe25i=j#B}$_2H0&Ii4$k8o1QquB}2N0Z`ydQJ-yj2 z@P(&lZj*h#LNtUT26S=*3YWcWq@@5!yj-$wBolD?iuBKwl4}$KmZ2f|BwsP-Ew=ug zwC)nbxd5+27g6 zc3(UD6j_D&^`?98WA$>!tq#S9>8it_SN&L&?me~)x@C>y|AX0)^}4vK6R<+B6S@|6 zN^D^0C@Es2BjptREg3a>$~Jo>+GTle8KXl+fI>F?#T)*1lD8_z4>oOSDuPIuYGQju zHTo)TFz6&CYY=YdQVr1Qr`W;-sLoTd<`XNa{;sZm9CGMv_fSWbxZ z|Lv{^zB5@b@^ohewYY#GP{w&tdhS|TA=j)H$l>e6kLN=q3CqC4z{p2T9vVS#tmtkl z20lglA?P`UKtvS|(g>hw#T}7Pb-v5qtYh?VKb#d?i{Ctr*YXx~A!q46-45w@hFlI^ zArt@9H7u#+F;Opkpn zTAyDhB+O|m?w21VlzqUv*NXR=n*er2p9vwWT@H7Q>4pvFFDtklUB!{zH@0J}wip7@ z>v~qFD4WmlTbY}8DcLN|8dVpwJWdTke!lMa%a5h$zK6L>zZ1vjYcSVB+jWPOW8aI$=jK2Ac4Ld^+w)p+ zwYxkfNDjxkJ^WBYjnLq|yJ z?XMezZ@?SnVyaSfA&u&qT=DdD_v&+3|0byFMjZUQi|Vqnv}7Q)qOW|1V>J0coqktv zva#jS>!Q8k1LJO+wLYCqom^}VUTEJTonNVS?J^09OBfjAN*{Otaev|kF?%VTZ?gIH zsFue8*8Mg=`Bl#gLHVP6v8P3kR__g0m){kRj}VtM(=70mop7yv>E*SFkxiar%tgmN zzre6Fz0Gf;l1yOcM?FzKWM%(gMcU_+J>Rujq&=^UP;*lMPCR;i5C?%oJ%+c4-h1X6 zj>a@Ikeo9TiTNj8;By@$f-k<)jhpr5^-EKanyPPvL;5E3MbJp^(w_D%vl2hLU8_V@ zR=3Nc9Z!YItc+=_^R0WBzk3`yo}Lw?KOl^)G5gGTo8Wte8@Ine-kq=`B3JYkX*MiQ zMa{j5`qiqTkD7i$`X;QOs8dZ^;KihsaQ2P+X&d`xBQ}j8?*TGsE%2k(HRunm!_&cf z|CLXC#27|LJUROtcTQy275J8a8gg_EBIGY+Osw%gzn7IGa0y)*YEzew3mct? zO-Rs#!k~GjEUy*BQ7qwB;2^OncaOJ)j-XGTycv@=B| z9t9;zUwv;LWr*;;d&Erw zz9h4|wult{m=tn%ko33an^=Gfom&%)6=5#9(btUUr_DNYUf{Cg;rVdW5>0Wn7i;IHWot#Y8cPTd+XJ!>%3jAquN%4;|R`b@T2shV(LjA3v zyz(=%0&{5VA*0Usnkk{CH7YJmsU{QqABHVII%rHxpyiP_ z)xG6KJ|B+w>3|NZP6@)gr^H7sKT1fvQ?01^se^VV&pkV9e!EnBnIj6>?q29fSOzZP#&E&- zg$elzJ>#i15SnIIR*XCIRuB()P02Xq-1%ck_nXX`l#pQ4`Z|J~buYhhkw@p7#cx9y z0?XQvc^C?$c?b%65c?{oaA`+d8T(#}&cYzS+JUA}_)+JrB_*ePSMmE5U*@|F5?=S&_~H&feEMeP_@ud!P1|RyQS2$)^Ty#>5FPu3KC;_N7Z&luhGIPxZ=IbR zc*ktrMk|MYr3ZS+pICtVt#!V;=GvLI#-r7 zsN5Gfm9JUpKSrxMhbbQQ=b%1!bY6K8+#98TWs~1lEX3nu6YZtX_mYvVff{rbk7&6# zshUTYTBSKh(*ry#2yBriKovkY@z~Zy?!b{8n)FUNEAm+CA0oLCL2J8Z{;-^rRxUfU zI%Fif(S0T$1Ra;vE_(L7UL``soM~}&6c;xCM#7M-Kd8-(-q2m~?kEg#1Hw5U{lPtJ zEzQSvMux@o`NpBiX%A#S`^ZgGdxKZ@yczW_vE$9xhu8aRb*K1497e_h5^T7W4rL$g zj_E5%TYOyh`a_DoCg;++!m!_c#PDGh7>U-*|DB7;!1ESA_gle+`_4Q|*QIf<4o zqj@Jg3}3CX<`dc|w^dG$`} zN(s=?L@?>7YZhtn;++__M#!X&yFq8?kKNU_@rdsro}Hy}_Irn?QE zFnN?AynS9fd4e<=JE>8D+M>XOTD-g^s-+FihfPZM1Szj{V@~iP^FxZD5_m4;2yqCv zJ3sVqh0BPJpDccwNi5%T5-lDs*nn&KNP7j6k-~STv3Ezf78QjRfbpp5Z+e6UGQ34ZSwzktvHk?Tvee~q#tE^*`fIB|I8?;0T!bN$NZ%F$fg5f>)eU zKEGCl!JOB!!gUGKI6N4=(!IOK9i?=v4<2%PgFTa0ygrEts3Hs_lx?g)rOt(nHdPpI zmDYEp_0EPs(2#p6W|t2GvkG|E310tOH;UiGE)wVX_73sz4Q#*z&dC#uvR6NGu0?^% zgfb@TgKN=f4H%*S*e=aQfscbUb>M-Nfauzji5SFc{ zuNLR9`TmA5Yb>qB^*qPf@ghd_a1>W2Orp}=kzw0#g1(~TFErJ&;o|_dAXmBmhE--^ zs+1}=-YRj!H8{kS2c@WVAq0(&(%vci4EcE-&~D@i&H|7>SFiSvzn?^g(U}*$A{>=! z{cVrgu9eB2_$nr+gOGF|LCDb+jY>JBB^E_3XWC_9`TE?9A)2DD`7ozZ>DQ8NTV;(F zAnWV{e2QI!7FEhJ@`;_It721$XlCW#>WnSupUZ8>){>yw_yMd`oaAgHxws3&QUE;a zulBV2GSffH6?NI1}*k-2d z_`3Lqz(bBy!_?#ysoM8Em}uF8CcT;BMvL@kBN*U)R;dF|53F7gz^>>64g1@jV7n+0 zS=vwDc`&zz+ODp?$_K1QGoN|7)?IyC3PcsOVr{%lA&0I(ojX}BE4}#UxsFRQNgVHg zxh{k`KYQ{!w;?O6+=>}*SJ&9c?Dm@hQ1?QAG^^F#A|Z^4;j{qyhrTtk zAUG5Q_bQ3&njY?2cAt*WSJ5L^$@H=|AZ~ z4PD>*17)Q)LVs^5;S56D!3`Vg&y0wZO&H%lGp6-~*rXpim=m~Xq+LY7I*~4gMF_X9 zY=MSQ`!t-OK;Lm9QlBIhd|KjevN7dJzJv#VpVB79q#SiyS4+*L@FoA(2y8oD(8RsE90qNzr1Vc&t^ZmK|u(9uQK>rdF&ncASmz$!b|{INaR!&t%? zBygVN0_6S;JK62bc0YZCo8UcabRRFYNV>2LI*26f<~PjTMuD=}Ei4Z|QL0#RbG`>B zNLYbv?IfVhQpXIpEkgzsqbhesFAywlY7=HKXm6%BQ=!FxoWle|`g}Cv<*7&6I4`8n zZ+bw0*e@}Ud}yvml(^*@>|eio8#T0adUL$p`stG^)$Rf$yDT6Ls6M`Sj?&9fD|@!f z+M3Tz&NcKzU3B^!<+(uVB{guHT4S4&Momw9WZyVW04tex_PhkJ8!_RELqSaIL(jT+ zf_>3IGspUJoSo)0|7B#YWxbGsz0n%ibi^{YOOPZt_Tt+S7KdW<^xkc00k$Xlvz
R{{@j;$d7EMe`U3LD12EXh5A(ZnVFZnTuee=GU(plGlR>>wzV{}h z5T$OuFHxQwHY+ zqUAFgduZ5+OAg z7UwGr3A_26k}Ykc^|S=q+>M$%k5u~KOD35y)4TA^4Y5#-ZY37Vu(qeP5@Dd*rb&ia zXB}bD*|Y$$%GzAtzL`A}aHldZH@xj6T&gdKbwwqdldY-QB%ra(E3uU$A-!&H#Hll) zCRFyhVcDI`XR%@6xrX_7iAtVh%4cWD$43?9S{{UCPyHZ=Nc`3I%HDWJXfFy3&N*$O zt>~uSfl!CBsQ*Xs^WDNw@cZVu-fbTTyXA1tZ!^ibVen#j_`IjtWJErGn&ao?*TMG( zkiI{fOncAYyCVeaV-^UR!kHp3bQERJ1GTjKu7KyX++YE};QRI5ICoC7`gBo_dTxzA z&9nB-dN+*#!iHu=k9YTp+!2FuE>CtC-CKs6Nff(Ty@-*Km3U-cOq;=a_;j~fKC)<% zEZ4dmHJ_2gf{mI$?_e6lwsCS=Nh&dX5!Q8tV+uW#I^RE^tdL?h8E1WCdM@$muCD)Q z?q|D#C`Bg~(saM2g@PNJ+f}=;p?x+4e5?t^+V`i6jBnT^oOWyt8)B_b=JgG4Nrbii zr}}r2)KO-f6Uq{=AS=ywQI)TcJY!|!b4)g7x5HqU{)}KFlyy6L%GF%!BK!@vfh?xH@Qc08X zhYdser55J!y6W?>yJ2_OVWvr)H`9m|KcEF69fJ&}I8qL$X?DYIc2R$9$Rh2w`Y+kF zpvC&X&GY{H)_iG#=V<%e3X{%edt7g<%~Wf0(fF^WE*ytq^h2|UZ?sP3B(1$IU&#Ix z8$+D!UNYhzJMwO%E}LqlCZ&k7=;%K+oK4=E4!T?SF;|b z&L#nDIFhEXl&25bsc|QjV2%$;VO;Nv+f?o`8_0^gHAoNGWxqu35R*@T|M?ionl7e` z>fG61Zh!d%*x1*nI7bS2{b+X_*7$O&YbmeoV!6E*=*kcRiCGQl)Lhbf^yX+))mN1T zhaM|Q^G$nkj%IohY%^TzSGzguxCBvM9kpXTyVfNtKIwmyNPLo;<=K zz4isL{kyV?{v1$^eU*PY=xlA+zD38UW??E}$rzM>jclvPEl0M-!_;!-N=4_Vz%(Nc za2>LnmUX5l!u4H6p6f}Ju1f(JDlaQ}`$oO~M0Yp8&nK{OkGKPIVlmT${3yL#cFlgx4NiHl;Td&{&e zp#RE$RkC-R%nZfqocL!+zSW2MlHGQ=1XS!iG&^c8XdVg2e&`$t`TfLI^d6|QFRNw(}sr1_@$G1xooL0hn3>23D^*VdzeX9s=U>cc684eFWYy^x&-qCW2-c0S zY-ZNacjBQJp?dBcm$d)Y6;e(OwgsMkotX$`_4D%WBpxTy?Iy=qHUP2F(_LdPoMYVX zX~|3UIq$4BOid!{9jaQ_of#EWG)<*W#x8*>Fhr+Rk!DzJql3O;-8<6xS=#j=cIR<+ z)-$kVmf<|dQq~v)!21(f(!m2LyR5KQ?=q)?$lboLTK97Jr%GwGQ|2sp+)do<(e5GD z&WVa4f78Agmv0-T0d*&@_%=O{fp5QZo1hmr&zhZfGYc5sSV_}3zhDCHj#`=4c+al@ zSA`)<;j?k3$*Ha5*C+w&cP)efZ#j$Oy3D9-wQeanH5X)An4}gP!CI;SpB={esHNl;4DNIx2-YZW|#dRSRs!{1ek?5cSlr zNUtWTlwR5vq|ElQy4UFwinwu2RU*?}$Hi}wgTG1lMZ1y;gKbWmn-BE|8Wqy|P3_)w zNu|xjahNY}&Gkyw8>B^faBzJ1ati-S3#V2l0Z3l~Z1h2Vlws31FCDCDEY*DK4hj_0 zr3aoUaF_zILZgP{tuy5lCJgYi*qGI38^oa%5Pg7Z9@m@@w^q~|_EIsfm zdQif*<18@aXXk5x7jspsxvtn><{mS20;&=^!lcju-h%&W4*ifh*JZvH34&Lz#l4Kk zHRng8MtoJ>h9RwwQaWrG2J*w+6tc7OM5QOM*{xg4(GpU2yc`6zo7(Z3;?&wWFtO(9m!yLAeC{{v*P15Nq8fB$VxKdG^rv5AVDOax=6qM6IeOWL_B~qv zR;+0Yt*9_$;qYj)s*@@RAchLyq!hb-$1sbnF!;Qb|MMBNFr_S}dL4eXq+4xXI5+U! zoLyJZ4moQ1XM7wiBdF)~HKz8GP3=Te-0&M7Q}t2k=VpP=DU0wU&|zt(&G&KAR75fU z2>8a19Q~ehS_VoNU_B)=fPM|dGN#QhWGp*59+md0K#Rd7aj8+{uRr};PXXV|F53bg ztAb3GAki`f9uyfd@N)C&*6o1jA}-&s<>~&eN#h*-uYDAt`{kbnxicHa1Oq%F#jwZy&FZ`{At z=}abSg>bdUy0~sFqFTW-JM+h6a4RREx|RUHAp{cHb@Ea5< zKiS>wN^bM~yE|v<#3V9dS$aVJqjv?)S32F>IW^njaqxFssA2akeKze*#c+1s2s_J#AZ=nzpN<7MMTZN2 z1;!b$W_FW5$9G7-r z2pg=<$>mBzeVbWZRcy|;)n7LfQdtRQI2LU|T3l2W>OJXVQUTW3xY}2s`ve#GiCV?3 z#ngfYxo{(?fjoWkxVjI#@>VmziS}#|m9|YK8YTSGV#mj_&Zc4#9dQ0RU1oO*DW@=@ z+~V5g+7TBWL`IJ~hbNsObqNeiNAWMSN?+W87Ws$1?4~6t2VMinLdhe|`w#N+{Mi#m zZt4u(oe%3hFwwn;^yZ;oJwBe61ugoob0B@_xT=vmR+VgLFJ*#n*ng)1UG~?dw zIi1O78hEpr`RRG+Hn%DGUZi0goyB8l_^?@^JOjXkdCT}3pdU~GkXqkC zjbowY7z%5B&ABFEp3jsM!o~!t5^1!~kzP@!LW%8h-yDlWRR6KXncW4nC*al_0046)DifY2-ih9aljyG)wf5}t<<3SG&(;F% z6*oMRiJqy+H8Z&LXLA@jNISz6y=1WxWb&+p*Q@?>ORox7@fiN6hZGf{T9|Bp&TiOE zifv;ojlVjuTmfYt6sfYmSA76oa{~i-|J>(OE6N0aCfA;_hyys6qe$ zR?zSY@D0>kA)pXgb|y1wOY%2+myYmD(K7451Tg3Rck3UTLl%-DBS0EJBaqz6N8#jg zaf**z0s!ul-8>JmEzRqen<=#a^)q$K7f&=PIf()=`SHJyoBzht-YOTD{Ss-`9`3vZ z@Tef4UZ-pbqy+5VCO?J6zvTMq@5uS=nXmpC$dkWm!J9EYk8we;p*w(G4hoibmv4m? z@}H$e3BeWT^-?u{uRa{O&cTFN&^+nV(mBRa9bZeYMvzx1u&$%G9>1%#QvS|iC3{~x zWcWL)ivM^3(emy!mD{4F&N?YjhEz-h4WR$=KeN4U)Y;In2ws`~K+0;q=nNLpii^#>x-olVYs{xSfTB;C*%;adE!|NZ zsFkSqD^b_3=piuEs)%a5E8+Ct?k=ju$~CDLpzUgKPSg`P?{p*XvM;$1b+pCpkxqu& zfOV6@ZsI0&03W5tk&%;JrR!=&mC)lII?)+wj-UbJZp@3>fHht1XRZv^95$mlcD^w0 z%d{-U;jV0c_0`mk1#492%Q6YGMPQq0##vWwCFZj1AC*dM=dhx`vXM#ySzPieCCZAn zK)+yIOeiUnK;8}K=r4Ryv5n8M-vJf|UL7t8{IJ07J6{`R=6oJsB{CZd-W5?OgY+Sr zhc+Xdg;}BqW0rvS)(7_~zg;&viaC?eb=h1h<&W{}7G~P5oTUchE(Utloil9H#*98% zat-R;Mo-CJb!X&_p4fVzjqY!P5eCcHo!6XVaqU~yW+OheIWXloifPi3&CZ50+e1H> zv%Gol$Z^pj^SH%c?>pee8#j3CJBLd>=mG zmD$=#Q%p}()LhZSrFsFQ0HEWC8qME3gSSvpzBbI;Y#E_1_ZeQLqkrOsX|NSP&)e*V+Fvk2bfgxiK zd-W2m{kiSp<8j~n^)5wVWNt@5Swp>8Ct?gWrJfVx(x#`LkR_yYtw*=)Q0VWO0q*tH zaY0Z*afnK1O@IeI8nd#;r{!=LwasQ;^)PaOM5X#C7(dca*`z!b0CG~Dh)M4a1v+W) zl0{?R8bR^xdapOvDNwrqiu9qFc@TePif?HCwwbb%S@0BYf47exAi(8jq}FaUe4X`k zY(UcSTk{wNqvAD_&VcDZ__{~C6_{W&SG^vdXxf=eJsM7JL*ifB;5U$=&hD-l9PnjQ zu{U~`L83c+rB32ED3My&$RL%ERN{uyM;9)&U*u7dJLy$W(rtz=C-&>;+}P^OWr}Kd z$H20JdebjT%)B&qvwzuAD;8#MY1mpJU_LXwb7N3BHbF^utImO?b2LT0+~ejOgQJc{ zr)B+#1xz@_5_xMm_EAeTsDPH0kI?QsfA8r@#XjhTCU9%H^+mR^`KaVSKiyvp@K{|{ za2&GJmuANS9jQgzbx@|e4FIS4IZZR9ZdM=Pf%*RJ3ULBW?7w0mZ#@Lc;@owkX#5N_ zr8AVXklE5s*iN@#X1BBI{UK%E%~!7^~t`l;*P`<86^23-$K|&;|8swL>%nbEO;6%1EcSF)@*C%SF~} zEW+jD!k@?~E@`?Q8z1Ov+)WU?Uen?T%GMnKN4K~JOz9H>Iu``@jlq_s8lnRSn-`KB z4h*q+siq0)D)t-ad2cJzh#tXB9!}WnfORJFe4#(-PeIT!m$tssk?K9u5YgbWSB!JL zK9sY&(CESHpG}A+>q9d;3{6H>#fS5&8xzsQM~=x97X&1QZ`*X z-8I+Nm1QgCTZNI=QgRWlj#I6TwUHgRjk?n#W+GzT$c&6VN9L2{VYNzYN&BH#(+VjE zxNeL!HDD2NpR9abv8GPsdx&jy4;jx6^iSYX3YeN0U4j zH<%I{b+lR~#WplODxuu{i9<(%Bf-CYgR=dC`#vRkJh@4p?*affxc=whf7;-G^x*$@ eUod=6;?&O#`k<_oo=xtS04)u@r8{SLw#V=H|7I`Oq^sZBR3CU4 zlH~a6`?Y^0-TuhEE85yC%W0qK{l!rj@a$}~0;idMk$Z;I?EWKhjMHfT&#nI%jsNkD z|CtW||KK3%B$kqW9I)@jtCSQAHb9&(thsJ9^RA~C@Jvgd6I%8!W2pZIuU=(PY*wdD zS7Ar$!=RghvRO5-5l>w0f(C6`Df8sYlT2Rt`Aovad%g3{tX5@ zuHxQW4ue*wj8>iU?s)fn733X%__bST`~mK>*9E|@B|Wnf&oKYI4^xHEPZ6!^RZ873 zT48P6$IBHUg0%}t@u`qb_v7|zD|e?t-@X#x$fXv$MTp_IERhI!=?h<0B5ZB^)k5uqpzJBSqe$~}h0nNJwL>94}3_uCdv^IbH^3OAy{3S13Lx$rw6WUxo6aa<7HcgpIX z#J2UpWlooEkaMLM0kb{X*N>(Di0ONkJGEO{;~c3v;XY}qtXv&*Ij%v@2k-W=#{vab zdhgbQm%{Vo8uXwNJ?@>S;|f!0yvw7;r3aa|cj%HBdGjh44>2HE;u2O7_Mr9Q#{{vd z`}g)8j{OnTtzoLHE`JQLUw51QD`-V9IUeqPUv@4G{SR9UMKmq$4MB^3k-%k4AB;9u)oB8Tdds<&MM2FCB)8P_L_X z_!PO}XH6CZk;C7k9{J+>hcDz?LEL~1qJ7-b;qeosiX+r(pK5Q==?!0}Zm8pYTFQS) z+0Q_qaaJj#bIC_$J?hSOE2=}TXNGqBe74GZ^=UPg=b{oQ7wYK7m^Ay|PnA}2x=?By zA=&((H2Mm>;#G7omM%<4A);f>pN*0r7L4z-RjawRhbqfmiGWW9xyv|+`?h@v`v)O@ z%Y(s@;8fZ>A_s6PR2WEg5LTq$^=%)Tzk9=|R3@%lh06kEaypn=9Gb&jP(hW9U>hfU zlI^~$g9o!b=04WO%--#d&D>5n3NDS4#5g)~kuX-jTZdM1*SMT3PgaKBs}hj|7B`Ca zrrXLr#2c(9$JGY)32;{47K`ak-|+K*DyhahcAqLOS=knN`Y`iFVK$rBX9i+hPLi-0 zefU;J(%E?oKdW1=(RY1H@|@h9-Pi5&Xi5P(c>yVNSDflyh+s;3YO8FtTmp*|>UJbG z;8YWuf6|ykOA*AXK{Jqgo$$QS4QVZ+eHoDIy>$@?*gX}IdWKZv>XcNTygWK^bc1<% zYx3?;hz2i|XlDSdmuqQoS`(TxCY^uBeyqcC5f+xe_NN$Si2M9Rp;1EPt;%^cCV~ z$Uk#EUfrbhIk=<=Lftwy-w<@F?(7WFMm@fMBI9kvG^dNp?!FMOrw-M4sB#Y%1a327 zRp;U1XO5p2N)6HfFjDBe7bFXq9oON6f)vB>ab=!*ARqpQeb%p|Rq!LR_oWaEr%>C! z%i;7FnGa?PiUsMeMUZ8Np}V!aFH_&YzGEc#GPm=juf=vdqaJ+}u)DwkKvfE*FX7ww zLkJqq4I|Q1iJx?r!r|v!;tHM@SZGVzVw0um`+tGf`=FmgM>=9wo^e6sZ+UoA&cZ+6 zS+=O!>9}USl$|A*oksyQhWYBlsI3 z%!-^>x`MuqtnGF+(R^p2%B+W8gQ3Czr>sA&(H-h+6N?x9ny~X$74GH+D(knxdsy(l zrvxpkc1lNt2OHJ>=n>Kg+2>>K6&(RU&za%?Rp;r+f2A1{dRJq9Zl#$OEB02C7ours zG3%nMJ8}@1u2H5}?N_8CH^2tSQSH|)`-c!FL^wp;Ic$h=lDihv|Ify zNb~6#z;554ZcF*+6dIYj`U)jT9cvL0_#@M5(FqM7@n>>5Uj`gh{nwDD_O!pDcOox)d(%g ztA52GuzHm1WaRLYD8~kqMNPmgNT1_~R`2^u(_2=vRVcJocWZEyv*N(;+Z?5N*(K1* zs&)8%0YDY@k3wz&ZAgA^!fr$OT-{CZfY5t~hJ(|zP>Ad5)N_~h*=o?7@u%KyI<@Qw zpjq{gf)B4J72QLzzqt|%#cmyXduUN+nok+I}s*-MbUYn-1paZGVq!#P9j{uY*7XjoDbR zOwDrlX~1mSAMQum!R7Ad%{7GacU~1zOk0wCc|L{!qZyv6rm(w)TdES4&U-Ve^v>l!i zJlqk*K^ulk6j`F>&FV7lu5R@49>rKXN;-u~GdN7a+=Bef)?q=kfofJ}pu<`z!2*U!74<2Sm~1 zcq?kWV8zHizsNk(gTTxK#=0pZF4O+4*Sc1IPru4N@f`mzCU^F3Yp927yYp~zD3#-G zPQ3fO)4>ftrvz`y2S&MdPKUo^hNv6FDeRiNw?e&{D0Xb{~OWiE_F zZO>SM6P}Waq=W4epR3Zx&W_YrkKp7fUp6bBg4OIpW3i?hU+%%l`Z>w&?neR7Qhu~Q zy?ddeVO1(CY%zU$>n!e!`2h4$_}oE+r3UL(inX=mWvM|W)|E0%S-#~JwQQoj8;U&Z zoDs?5QJrh`p|B@kt0MjE;f{y7Qcpxr^9PO6^?8Ue8f&GUT``t@p>h;cSPUK0f4!0} zxITP_W%TYRZnzViyxdB7z1kmkayd&9SF#|UgK8RZ7nqU-S84_1G-YL)Q8mHPpTC-z zyVYF`V_3O25@|J9feRr+^?8-US*)?WcFeq6AFq){(d^f_i_3uoxhA$bL)PZYUR;_4 zJ{PBo{an5-4nkSwIFllFPsDmQ9k9MV%4n1*^}KB=q&#z9HwRJlwp!Jy{A~6Ao^NT=^$8RZyJv5UoXlE5y=zotDCy?3mnWK zf~aLR{oPZ?1~2I+Keu`uCAD{x0H=AW{;JepW~dw?9Jb7nepen2)_BlR2-8rDlzHE= z3b1b>sAy?YZBU1of9b)HyPeXD#y#BO;xLXmDfC6O zzs^2T8X3G|-j1P#9ro2`@O_JwDm^UO(K|N!WuQYKe6d{W>5>I4;+vx)sxGUkEROg?OyiA4t*zi-i;C7fAU_KwR=ja-s>&e>PxxN>4J5K5yj&5 z;tM<~hU>i#T({-ya@X7O_Y(dk#zBUj|JZU7G_!X0b*3U z{&cBZk4iYbC_vyz3qqAPN)A4pK?i^5J}X)Al(sh@9z3byvGT2Tcxk5BK>70r!%@4x zaeu4PrDY8ZZ!?kYqgT&A(xz?(FXXYLqxA0H+pc?b_>0s#gxL|!>*@c5BJ?9{qO@H7 zxFK3bdqZ#9u)1AY!HGQ6_+pG?JYp#_i`AkIQx6L4lcnV$OeSpCHMgs=P21L#(3T2; z@X>>eoy8hMp^$oqI-l`gPtLSQT$MP6`X}X$QT3JVBGStOg7G z78$<$l`f#-3C&{m;`pT7rE1;i>YfD-vFmyA%`AIm-^}9Q4KF`#)IHuPIB$*q!W;gx zY(8k9D~r+k^Kb6o30YiBTYy+=yz=9|K1R=u~{*ot;h1P3KZ zF|vEBFbhdt>p~wRW*5Y(6?*$MdNGiw#L^1v6zgwibCgs(Y;-Z4fVF(xsA_yktrOgU zyxl{3DCK@wANg_PiXTD9FI;@(BVZK?>}eVQ^86wRcCz4YeO3*Hw! z9IhIW8x473g60rPvpcVI&y+=%wQa9XXYFDyfDDLD#gXd3*lt41i^IjuUqfKXqQjL5q@gZ4TbDhO2 z9X*E?Jbh$T@CTN!3y?tb@hJy3uACThhY?Fl`kq8Bhn1@#p=pof28P2Nn9k{DkL zi&v+s2TFQsQJB_O$ATEejMI|HgjP9kJ_CsfA2@-%tP;M|(nri=04ORI_g}Bqzy0m; zZshyxgwf0n@QN0Ey1@6tdJyqBeuZ?Ix-uFehgRbF27B&LtQLs+v_9avuLfU@hx3=J zLK6-Udl#70Tl2xKzBGlvBl|h0ozDR;mY$ zx2&wvOF8NIr^cr%*q(~9_@%%Eg;|cZZs$=>fh3noZlzq4IJW!Zw4GT+{gQVdAtm?B zF2|XTC8~3$qI1v8p6%sY(B(@m=AaeF&-rI=i+Ob*9_dBvnW?V0c%fsqt0<0?sw+4K37g_THe}8Qu2dPkber920d||(nMJ{gwk3LaqCdie?Pxvx$&#-v!J$mXDb_-1hk5;?+CW7=<;CHMxM;d_|uzDjsZ zQ`$O*a}yxJ3)@IlJEyfK`A)~6Q%^7bAFI9KSdB1XIjl3k`XtKo2Swt2zEh)p27ITw1mkAs&#RMNIMa^scZ)F_LvTJ zQnY~3Hf%5GBAv-!O;&SA^Oa3=AoY-XF$pp^W>_DBhOPk@1Pu?D#oXL%|HdAy@7)c5 zk}dmDR0Eq&bAd{GvBaI6cmD;h<;#TPs%~mF7AAYZ@RXfJ+_3S?#7oQvOvCGjBW0F@ z2Ymb*ftVuo?sIM}XF2eps4jUi;bVnY_1|j=mz3pBp%TFX`Y?z=U4v_P&#*QN+FQe4 z?!L$836#0P=UN)(Y}pt4o7iYuo${}4zPT7>??MHeD02$8O2%&XRsrKzZ zbo>zr=GHN|)IHr4;$+b64`zu!?StR;F?0g2rC7FE{BHE-Opk)q?p!G<+A{4g3E!)# zhzwnONh1n`b9wTS^T4G0;}z*qnWk_yarvhA0t0YQ8XY@S@MwG zblD_X+Ta);2KEuw9zS2GN-mP`rZsWVev~99g((HVxSq(~Nt=+X-NV`LI(XvX@tfAf zenf%JctSa@Ic6nGW@jDVe0%ulb_fM_I8mlHlXft`7r72xkp=cqVG;~9i(V2sPs=lt zfad)Pr04!vbW_|u7yRO5EnrH)Dvts-9)AmI9%N9Xitw)=jv~M&Ly$~kBBQ+~Xn}7* zwT2>2LQXzJYA=fV2JP5uzO%$goT}j1O{WCQkjW$M(>Qt$bu3!;WU!##DQ%9?IUOMCItj()%ccz_j#V*cQ-MMN$K!6fl5~lZwwi;>V(%TJ%mI`}Ml zsE?54r)(aWAe$=sb)I01$0dXlC9`Xvmk-V$FTyYGkuMK}Qmt_qGg9kOpOlo2!eOOM zBRE|yzKXxs7Hhv0y`^Mn<3xKrH<@mo<=Z_{~<51Fr$**$PqG!BQeZcGO=<|dP#=o$#4(2wyl)0R4x;5wGvb8ZH;xz?zgs$R% zqgWUatj!GH4^0t&!hpFcTUp!4$qZP)f*%r76p<)d5CTzpKA0Fw9GCp?Kx%emX@D1w z)b+^=TETBKJt>-jxuXL*%imyy(hWwAkyka;ri--FzGM}!UOm9Wq$q^++LqzXo*D3R z@RF`8*eRIRNjihyg6-7Mnt&LSDDXH$V?K6g%_KW$Q)zgbT|mXADbq8Xk`EXluetBT zH^um}VP}MB=_TISt!4NyKVN?$Zt&o&;K)jd+E-H4zO2_!?3dD}olBOabAPQLU!`eawf7oHU zvX)kmzWq4EueC0u;#EH_qq3Me@nKk?dfwJ#FWCe)KZbJ3l{a3PrvQ;4& zWG3HBd0dDlL|* z6UHB-V_Wm1$){xT_1W5=Y7xq(XT_&3Kc^3HwVXB#!5hkAwH|Tc`kGhmmuHHJz2os7q}K#bk5sP4?2tWJ5KibOuYQqSD6qfZE{ zR;8|1^<3W!WgQxA+E3JuEK-bu_mZ;+D66v4Ph2EBU;}s5zU}tobeFkN_JyRK!fQ&+ z)9jkE0Mqj-NTv)Gsq2yOl?5^LKUq-Kj<*^sI$_mi365v_d?Rf;l zI}63Mv1e?&{P?{934M%=7fX4-MPPjoZNcBR51y3KXx#Pd4t^bVWS0L|^lv<0vLgqz z{s$w5pmQ4wxfXiGh}LPWF~UehGg6eFUT_mX4%JgA^KZ0J`7YLNkb=DD`6WZl!*jpU z7~>S6%!0lvHho)CVXkgndB7%>B9^N7K$e~c!8%r)w99&Y<@H;U)q^m7$wbj^KxCfN z*XZA#!0yWP|EG6$X2K1N+V#WHzi05xMSSgWGn~JfP;=8gNVl+cRl3+z-{}E83`j{4=l$zit<&OCxM%-Rw-^VZ z$28`ucSirF9_OHr!%*NK9NtFHNKGzx6gs;+$dlp?wQ_`)41djzyC{#2;6gB%?~+DQ zhu2A-P8H!nvXRW`C(7@)W2EGGyvCAWo^G?){2adUYSq$Q$TaF!j%m(C z4zwe6XpA5ErE7K~sdgN=3G@u?4!sdUmeLTwc? zEj$Qk;*);&AEOQ~bKajXlhJ0ME$-HbsjQCRFnsdJQMLT0(dERM@w$L~#t`n*y5QzM zbHDyaMetga?m*?PZ1eRFh{*tE2?7d}O??$IzG%ZXY}b5(Yjy<-tWz-rd4aUfc}C_; z-EHBdnSDjcioRFupUP2gZo!=3^poYESU5I)uzaJe0*g9$EkGt{A+4 zv{47a<b)Eb>TMA+xWPe!E z_X$=kjT&*EM-b4}kH)kEn)3lq|6mu_w&9G_T&~wXMm?B?LaEpXE-3d^hRP;mw6T)0 zlkSoN5g7zI_K$hEczEyQ;%J+}y zUm+Xofo@{fvJ3~)41d%Xk!zUJWwetcfe5c5vLAUv$<(%lnFf@dy~sW6hwMA{Qg7{u z@;;oUuogY0Gd+_~6)^oTA@~g!N-6>YZyoj6`xG-q*C-?~4bA!g%CzaPye4xIw{o50 z#&W}@4l~t^=F11p!G>LaftzycYrC9Eq4~6ORI(CThe_I|X<+5UNllFCt<%)Q;U5*> zET*g*He6Sh&+oXe759viU51-;;;YkQEF#*s2l5LAUl~|gH~&DRAU+WnY=_H1laZ=M zc4n(J4=)sMG)))h(;Ra+185#F5Da))pLlGe@9DEd_bl8a-^{!fQ3yT8RWXi*j_+%D zXddACmQ=g)1>_Nx7rXW}tE#nLRpDu_>P3usu?d%ycXnk=oOckl&t=QXDT4TQlPIbR z;f>=%Juxr!mP%d5hlL>@VtySsjc<`x&MRd<1_rZWQW}A{+QS#aBkP9w{Du*J9(iu5 zTR-6z7_PqD;AHgQ+b&^Dpq7*jAjR%Zuyb|WQR`vIbboXXw<#|@e9#&xvwVMzyS2cy z5ITc)gQaJnb1L|;79PQI(h3YdDd{z($81Y-5GH;EqEP8PHEnK0rRo4f`($?)`3-Yy zMMlcFceHytl=N^eQ-Vo*V~+8do5Rz`KNH?=y^qiDWy<23kmZSnnF(OQNo~9zRTljt zp|(M^&C2)8q|$Uc-+p#llZ_0+X67g^h7Qs*n3;@3qOsDHZ96rL+^*e9V>Myrj%9{w z|8&s4C(MStfTbUF8NT2%5X|;q+vE_HPK>9K&(e(`Ql2dIm>2dZ~cHCsR$!kn0 z94u&VoCe-0ym5*e@d1|4vPctvRt}G$YLw^*J*LxJOIKFNTUb(rx)cnuQ+N}Do%+6H zC~hY~*w$T{Oe^dXpIpbqEb@vpzbDpLs>hKV&u5!BGP%?O2}21)X;+u7k{ z58tS3J~=6*r~Czkt^t}jbcBt19<kPxCL5FFlr$$93AH?ef@)QhX+#pT+lOHOM|Y~AO4i(eF6 zPBaw#Epv^2y)W`1sikdwK17Wb0Bq%}@|fJ>5-KziG#n}Kr{w&uDuPig4>2Y2J5>v`1AS$qTd;$*lLhC=Q&AB4c$I&Jwgoz`;1n%-{bK>Fg_vUn*;pag#ffh0RC7q01J+D~qVqJfNei*h1pi$QG*X^< zytx)XT0C|jL)M>%?Zxmtrp(WEE;Xraps7AW;HWYN#uUG$4!7&Q9zklr#;;H8uV77g zyu6x2`i2n%H&&sH6v3V4H*9Mm!V-GIVoH(gRIoGIwKFd+WBW#Y*h|~EuF=jB-)DsM zKo+@ki9~1>UiuVYh$5V0j&<%fF|E~Q2G&*FI^3?mshG@E=eM7J2zMV;9 zu;?_asqz{=>*JPb5{8Z|k7X~Wv9Yy(?^ki9sF^1D*7&O*J_71nHwMPR@Ko5<_1kCW z`ynCvM-^>J3qiogd?orMW(uD>Wr%QS_l-QsWdnS5Pq``_h@}fQP?)K$X<)zRtOB0Y z+(X!N8VvYZ&`zRhLmJ%4dr?Miy(7Mjb-Y0Em?-s=@Hye<_{=xdgZqLI&nNcedzboQt z30OZjziTG7|3sw5Z1Avb&1#h|?Fc_+_3He*@Th=LmgT(dzS!6!^Ypck5VWXwn^l3$ zX&|xCnZED0>+Hk3u@TQ1tX#%i=aY={z--HPkg;8 zzUH$GZBrzZ}oVYaR~U;ebo`6?7_#EA?q{_IC1?^4dO-@tklvCV3vb$1V_ zA2i}Z6)N6OE#gAZC&H<37`OiV`>IpZ{)ihh2i{ZbrO@~2@E8tP^xu4u|1Y3nHrMmF zh2WJ8{@1H-O;4=!s8CV2Rcy4zLWak0=`foIioFh|>SM(oOG$hK-MM0Ar5n#DQ(^7v zYr{|s&d}5<;8KJ&Mm23yT`;kjxdSftp`HQ%l%xjiD#pbK=)z}qJ;gox6)*gt5^hrN zLgj*~@eNe}*`Hd1`$8#rGvF+-h0-CevcRjMu3AO7tH1nTK(_y_@WS$2aKw}3$q*<}1n&#AC)+^y5` zimR$v3r`rM_ItI6jZ>}v9XizS9IxHCEuMV&4@GvRpJfp$k5)&!j@DsTU^@ALxozD; z>*0ss!`Csx7lDXdWzA#OO9%Bc@iSR+KQyl`bqb-q{LWa)G=(?iemdAHxX68*T&fMFLy3YZkO-w);Ba|`QRopGf!bn zEwEyMhp2&6y_qe83I5v;Wk|>nClREBaPOXnyXsT(ey?cqbG4+Lp0Bap**&D7Q_M zCz_U>)V5@REAqC@(`Nz!S_|2lM|Quz%yzVxdQI0EGm&_o z|KOhQx~*F{uLO~K&NPkpt`ZB>Pz*Vf*n(K6;XA5Ym1Bg>E@jp>_KcH~Z|hp}eM zPSRsay}u>&$a0tNu-ajYNf_x>RbEhu+KA|dlBsc*o#0a)VmAaUfreL6o1Jue9b&}H zug4X?aE02=<)GXySYs@Q%a%kvnBfs}-GmWjDJr~5T5demT$F}*3!miLigW&#QNqKxfd?v3V2x6A* zWP1DvR%PaB5GrJNk#Dpp(Ntt12!$7|oK_gas>LrJF514Q%QNKA|3DGJ++Z7w(^8Dt ze1CjMvGDD8lq}Xt$TPK^uvf;ug!<8`X(t~T?2Z-RZ~GGXlCW~*g`aKP_kpGT6cAWK z!?59Z*vh`X4+1!tCggt0r&m_#!$Ey1EDp2Y@Z@U12*c-L4q27_07n-5FsJrFu(t1A z2dToJHC;s545c-peD`_6N{oGqe31O>Ftb#a#LBJ9&;_!aX<(YR}SceF&Dy}g; zr6PtxYh-qe%~CLM?HEsWuAlRc6pQ_2NhOLwpg9Vn)RZII@GDVV{-EOlF5j>sjwS}U zN#aqz8QB8r*^jZb=byYcq0QAZNgsykD>Q-;j`PNm^g_>xvc zu|wU4g*9Pf9?;^rC@I`xTE~BO=ieVXz48(cv)-2WS!zfYd+ITP73`4$T9Qz+$Tc&u zRO#4@we|eOq&y^SZFPmu&mZkWt)^&Nq}%SKU0i=t9iTlNe|5&U*!E+P2jEI$+EzDk z_^cIQZ$(Y+W9JUqG5#-8+73H;n*9INP=s(z8WEw|J&|=SOLZ;t2}KQ^5Vq-9%~uwU zHLT^3s&_>m@%tIq)_K&x@gDM_Y`lsXg84$taOz88?aU3JRgTRi^a08CLA=}thusOC z4>4^aO6)P2l`ZK){hg|icdX8~ohfs2!tkx72g*6Hxq;{z{Y1l^2_;Qd)z-H(Y?ELh zaHRrF<8EKDXuY=b(nIE&-iYZt-+ekFj{NN?a1`h0<2>oE?vLO4accY0fw#&bz{_Y=1TGUMCBab3|-slzly5?4Gu1SMs6K3@zuC(YN}p zZ$g)aU0eusAb8y!dZ?w;DGC#rcu|{3;eoj)4x|s?!yY{MctG|@7{ntSy;y6F^J{P_ zuOPX9*akS^NZ!@M!-3f5Y|O%DnMj1`B5Svv)=0Gg50L7+wtF_QjWj(m0rr6|jl1p9 zHf!TKJKNrqMT?g%^ICt7MJQOSer=;(<)5s}NzPUyMwek$nlcEa?e&p#QD)_2Idmkx zl}6pSUvVRkoh|PZEGI0PrZtc+L1`Nr6z1;G^zuXWv;B0g1qf>bL7qDTUg`wWsu3g8 zPi@Si`i1#-S~dL~-8&6!V>lIr*4-K!?hdL)Zd)ttN@11*+?k}R=A%2WL4GiOotq3F z4Gy7~@;FuE{6@ji)?7Z~wzU`RIe&qI$|8T@)qaR}%aeNech#;ew3&D7ZF2N$HLF(R zh)f^(Y`PS0M~p>$c~aH0(cb6^wUhPzL^6}!IB_L2$E8QE_I*;C$K0@vb-kjQ55h7{ zwmDmEy#5itSH1(Ef2Zv%Td!e2XLFA4K+mRy719Jlfu}ovaJM>qqwJwh0gYwLH2kz| z1nCkmU5KhvJxXL0pOt>Ol69s4z7Qioz7CZhkHufK>t3w)(+C1B`ipz#gl7ho!Pd9M z!Ocq8_s0DAz#~2oc8-loAZdTEW)iz44P`ooC?QFIi4GEVCT8R4DZ) zS;2Q|0Sl?e%1>Dtc*9h1XOS@5o!xp-D*fiEiAx`q^ZEwm*BiG zm6N@_>08(M7F~(iWU7rFF!@O9)!>L@j5IYESYgTVwz`~>y8Ln{Epl)S<~ILi{HGlJ zIWeA0>Z?AWU>mynA>Z@cuz4-1fr)Wy@%he!pHW<6g>^GE;@17g)S+!S$j6O`r~uH zWc*>ccKvgp_VhWt-c%ext$Wx-6Jv*hn#BQ|Gav5 zCi;m7uv>1(x%_uUw^jY_oj0C>Y`uML4 z^!m!Vy}$2@ic!I4^sk)q`6&D8a|`Kw$<5dQo0A=@$(_pP5T^%qjiTLwG7?cnW+(Rl z?6)OvVRNSvIE4m@J;3fjSqW24Il_Nv+;CenUpMWr7-oBh3`0MB)2y z@SMuXvG+iaFfJ~ss*h=cw(VL)&)Pn$VFY^7I+NWzT)e&A)^{R|^?1!fuIcYhV;3ZS zU~Fb|>_p_RkbD0WeC|CsbNrrCYSkC+&8KzG>_L!1lFje5n1#Do^v8vaefBlkl80r( zF6U1#g(gO6H<3+I!(sU}&c_*x99B?qRtL@UrJ@c4zL=;i+=m42kdb}gL8*>M(G6SY z2J~)G*iNZ!Qp6rpLf#&O&tEpZJk)hdoa(lV^$<%I8Y?^HvNd^@S1LAX{wTDdi*8n)t}{Zlm49Z{dnQkDHyq>O8EW!D3v>U9PBAimi#UAr zF&}vxOUjH5I_yb>gwJ#e4E@XANxz94s8&AOqnuXlvnGu_2C&)rtGh+Of3Fa$R0Pr* z7&c+iP|GjHgGY{uNGIo@{I7p%7|ei)DJz2}`EK8vd-LT()srWi7pqyVWmR8PV(k3x z%JVMW=Z)9n?MDB)k|1@Z+q%|S11fqRt0c(eIl)`|K8qKPmAT~ZrhoA}k1fP(&NJb9 zBErBAp#PfXww-rydvNc~XNxb;^CO{k4q;!4>tRX)MG zV8ASXN*#H@q~3rSw$}~sIe|_VdTSHmyMI+M@IHryyF#vz!HZPWel6DDBw_2qoCTv2 z$b1p}a|uuMpZM5jil8^@L}wh#d>!&YCSf*#ZO+8TL-{PkxM+sG(C|k;$Ds=%R$lYQ z5mL%MoqooGeT-H!wSUwPjE1r9*=kdjyU60sDB$F8-yC-^LgF(l@omHvG_2A0 zX?i|h8;tvLPeaokK~P*Y&eHty`p4VRCoGwdv~7G02p3vl##qm;EKg)xX40GS*tH>J z$HYjhl(9spvZqTAhVd`oemmWg2UofI`yx@D%}PkKg!a_W#B61Xav+Ehw(C1A2QSj^ z0}2PL9OVWaN^|xxxy2qGVO&8cg$OYDVTyHy$e!~VyWJhC+rvZM^1Z_^(y|MSv+;Ut zl5ZhlXVRV>u`|}(^=_y_kY4uUP}Ncp6TkeaxOh2RPM?_ieRNNa?gXaoMXB7gsRn1O{G{z{=tV^^#n)0Kg zMQZOA)C)^VTO{nfdvB4On-nqujpEh_^@D8@WhjTgBuSAqt)!)Ictr*a9=tD%hwfIv zf(8}WS4O%_M)?GNkqRy3EI5F*}vq17;2oPBe+hn_{A^s=WFll%sC zk?$f4kCA)|;W7`k;Jq>7D{xC8}g4!E3D@Ik9*mCDXCQ^UjxTHg?RVazAIff#JtoWSgdtkr=ti-#~=&f;NKv z6=+fOZ%j?}DwbU;u=)KOq>;tUV15@0ckh;CK4zvdmxo4(a_4Zn-gD|#F%#|}nA6CI zHVciNU$+`|u*#S|b|sZ1Qnb8%4?DKqm0jAi9^r@+QhD$pLq2HXo~;05emp~Qe!T%U zz_PTxGWw0$H2BhXz2p}v5o4nfL<}_b!Z+Fx#mnb%VfQ+0gs`?E40=Rvv)ZRb4KOb()qsxodJ@UW3NRrr9*nDNj55d?V zBBNkm&UZMwiO(Beo6<^I;*?4}thUsN5n}cToh>u7>1a(pTCQX%IR26gr8Jp}EiZSy zVM-%mYE}d!KNm+|PEst@eH&YLJ^Mj;m|?3AubAfeo3Ym`Z>mLB`;`60W^D@jioQs_ zlVd%qutneJO~Fi`^Xr&5)Qg4PzWy0y=2qw(Hx5z;W+2NzoBlQiZYZlIo^GH!)1cEb z9hc`DejsGL`#71d?J*>@IZ@x1J{%K2Vmlbw#6pLNqofE&~@LIu;$HC6)R> z;{A9pR_}C78&W>r8%6loz^axfM)ve5{;Jn(}htX0w3EfF&S# z!V2Q@9H(Q;O=HH>ac4O@%_7@ z@20~S41+)KFDd!t=?75}ar`lx_Hl~@`Z7j{cSWh%t19%0Rl zP6!uXfYJvSBZSNH<-_cVLsdul27k=?3N-0|kfTIs2?hV=W>z%bjnc?{P1g)B2obD) z(T{lC$lP8=rd3Sn@~f*jDDDZa)|D4~E?s4LQd@Cem4{af_iZ<=glZmqE(3Y#5}q&! z2?CAv4kh2LzG{ftXjv&0HQ4A#0uSik=P|?uWC^mm%DRjlLMy;0s6Sw>5m0)c{hN=f zEQJ4T6UD5*p)f*WjzU4ZSG~jD+C}6( z3twxzj$oLxc$hs^4zXhsAq`2-U{T5BJE+@cU59S5di$<9_3g9-4LvK_;QbL0HNV-f zpnQj-PhLkS`d-Q^r{T(n>sf1+`2!7(h1;Daxoe_AgmGa~#J5vO&4uGI3l2|nvAMk5 zw9!5bY_+n^S}PJwz&~{CD>chv^H^GsOQsODyXcQfMna}^S!*gftj`DUe}tL$KRWU3 z@W{>-Rp|cFs>V3^CYz<4sHX0oo?D7qR_3g0uQ~RC7ra|*z3g1CN*9Oe2m78IYqaGX zZkM(E>{#-nEx8DxtgG0%Xy->rwYy#Ua47m|%(0um)tkJ^1Lk}CVyAJQrElW4o+l%v zQM}#XttKEDSO2y|7{~m0Uh*V=^7QK$b~geW_(0>*_^SLO4pZy^QGeJ)BhO$_<#v4f zn9%L}Y@2KgXVkV-f=vVl+ox;Jb?mAblpi{_78A?W<~`lHZEljv5{D>hQ z*}2p8VXJ1tCXs_iB`#nw*54k)b@F$bJHH@YmOTqy&JU)=Mo60N>jPZNvW? zBUn6gBN84HYuOf^0fIs%6qH;h5rRqM4n<$`wBWi4e)?L)wnOo??VU6$4*kGZ78rRpAp)? zO_vFg^)f@q@29)CS?!7QnCc*rFX<7inLkZec;VmK(Ies8wTcqKo7+lSQ0v zLm*@j+4VcSwpypif5RDPaoY6epiOR8=;S4u_LfQWkw|V%%J9G1x$x3!=4G*nb?*1Ad;k8{x6WV5%3j&~efQqa-p})Up5Je#zjp-`^*c0n4X2o6SA6T! zOtCi9mg4x7>-R9rl5G7s_N<$KsDaTNS`wA2vUv}*r2-U`DKi9wk8JUyE0t^<9I{E# z9Y4~H-!s4OYJG*q$X@uaeffv~5&b`QZI6U%9MT|clc)5y_FO*4$c0MjTz9 zf_CK^86~$ad~*hOnrR(leB8PuQ}yt$JWiR9v;>xyPFtXP6jI|C5DJvJsbFYzhId8X zXXkwxUr}3mM7oq^0fL9aTVAI*ud?6_yNImN-1Bfa?QA=*cY1b2A(cnOKght9i`3_m zAvvziZFJ#HNe$00XJ=++6en97UjbK>=B8bG)D2KoULhZ;+WvO>$Fu==gv9(_IU?yU z7y>QqPc&SEf4P@ik-A+PfoES?iHH!|Nd|>K((SKS~>j zJWj$Be4Fm!TJ?Bq@$Jt-YTpmPIYCq2mhU9=(F>i6(>#U-WcK>#+RHcuy0Vha7jpWt zy!=fO5fOmwGHA(lIMy!COG}>53Pf|L(@K%rcoX_?;=vMH$ zE$9K9ou$gIuUHyd5^OI_)3mp)J3QzVQ0dkYUyjA9 z+SESZVK+37^|QTfsBa>*@G1hH$R0Ni>yJuSlM$rrb@fsYF9U@Pd>T zJkolyrAV_HwliAe1W)uNV`(|g(nIltu_ALf4uLzVdyXV{93uWAK8V++s9VC9)67Zq zd;q&9<@j_iZGSF6YO~&S^O?81@$w0wwk#om1ft-E#+87|PtG3Odz zdn&aA?vCyQ16m~QmX}v~NFll72&Q+By4$+H_85K_8e7vblLgw%Y>ZhHdnENU@(c?MUXw3G(D{(-VL>~>gyNc zPk`D(s@PFc7qCCr+*1@K;kofMClFF~ob}8~yRZ0cQIZ28>Q|jNySouE2X8^ftP|aB z=H9G`2yL$gMiv#hE|NM6<9697kW*xJahJ4w*VnRCd=}!xb#?CE%)$%vHlHWX&&PTa zx}69vkNw)3yZJpZ?Su}D+UNTDpj-z6{UKjJS(Fy_Ng$4;S)1pirc-oPp;H3msA;1< zol0mv0QT`ez%OIPmnY}c5?s+vIHIwKq~)8gLh~U(WB@g;J`&yXrl_EqrA_3193S!7 zLE_1_ew0w6nZ~^lL2dtOu=Yb7L8<0N=+F=?haH{HrtXBym+5YPiH~$FJ1~zPs=NAH zuX*Zk2z4J!rc~G*B|%=9^F}W7V$wVL3d!IOTby#&}HaQYF@!Fk}` zNja7w^=f}PP9mrWmBnmT6CSzS`_}q{5W@C-1}xf=6W}5c)w!=2RxrMQ- zv(y9Mjf!v2T|t<&I%v5*s=b$Chq>2x-K=*zxpmk7rTLk^QNrDqDY9A=FUqS>F7qWa zBhMKPvAq@QK%Zm3?46tLY#VIJvasv)mnb_c{Us#5WT7K;0N?S&t7#?kg>=5QYk(x( zC|!Ts_KDiQy?$mCYNZX^|I2{9r$N>Ldo`Ca7x$#M?=vTu5_+(eEUm*l7fE>ZI7#KI zMSiV)xT-WJT>p<^&tGpgR;L9`Qt8Zcl2OjjOYoF7t~$JRB@&_9V$|z=zqUke->Pz> z#ZWD;wb3OP|5)$QlBDkaosOIFs1DxE;sTQXzvMiLj&PPtii-aPn3ub!wfg9#osG zq0?`)gR?_3^g^u=u0b{omz_E4PmH%(kE1y|kX`Wl!Ga~x$~EwgZekCAf_mszI|(e+IgGG)6@ zob}T<>q_#%yiK2-Cx6pq()28i;3U1x0QIoh($g7{8*ItM0g-a6%Cw0I&pHk z=<}(ecT}__-U# zmH%O$;B=ZiloD#lYB+zuUX6A^*iZa3b6?L^mi)Ito@tI&B9FMeWtiETExK z8=p-w>=Z@G8|nf@GMVDk(Uv5VxU5R?AVSS{yQ-sZdDtgtaQvXpCLjXUpc5hWy<%x_ ztZL(|A}nOwz9WI*HCueb@BUh&QrlNakvs4>ZPn1L2Q3>u9LYu;k9r|?jTXpR6BcBy zDr5VmoECABqpE}F_=>u&Ruh(NaGMi3#YTLy-rh!)Yw0uMJ0rqj)2R}i-$KJ#Es-A7 zAzS4>7H$N)aW_Axt0RmZ7eZ;9I_ezwk<+v}CZVxWmXEh_D9@z4_YFh?bnVjXL_c?U zCEB;S(iXb(DeMY1hv`j4olB~Frr@%Ql#9|bNUmtDsd$%JyLp-eb<7wwN?=5zJFua5 z(k32d=~bFI#>k-FzCFc7mwh_-3jimk>f8#n3KP2O?i4`8$MZ{+G-<01s>&lwqKj}g zJ4f-p>7@eS)mtYFU%^j2)c2$Kzm_w@Q3k_hP%1;ql@pOBlybwzHOOvCwUZ3L_^?yH zj=J5|ZRQtzv*tuYTG+;7rS!OVIdol8MAHYA>UZ3m@g3Le?c#@=Unc#!nXRP)XNIrA zU!Q}UsZbK=J(i<>H<>XhI?Caz$Hv#ptv&Lpb8}|uY#uR7xxxMj!sVsY;E%0kiq(>F z>!v|W{Tt|FfY`D;X7vHs<-UYUN9bNrfQOnTv?yidLZ{E?r(t;CQOENeIuNHIHQS4# zc2`af#+YgKwApqPQ}$6HIe&0>4Oc4WK!O$=a&4mVnP((*2LvDnB7&(lUlh}uak2A z%&n0%V_4iZAW$EG?`RHm7m8v6d)?Vvxd)KsniC&b7Mgd}d{6l({D89~zRThCUk+1f zZBrc$)P+*y0J_0y&r5+1jD?K_X{)xEH@z|bU^EtO`z|-VYGq-6(eLwRO%F=7fj2tnsi!LRi4br6*AwJl=Hlc5zLGs+ZsB8N(w1 zI_`w=*NYcFOc63tF3*^o@iIQ4GoE$&(u#?bx0Yq<^=k|jKL{Dj&>CJPK4oP!Fq!Em zZq}a0q^#ZrSHS+60yTwC#);kY2B`z;YB^O(2HQYVeLYi;dKQbWQCep6>%YBU@GzEx zt~uM-QuL#mNy6JN(FLh_|I|E22Xg(jgm!8E(o={WgmK;I~ZgA zsU!A1q}ZD9x8*q8P=ke@_0Z!Eh@-Q|_2172It}jq)HL){2$Ue*Z5XVEk`a|}F)eo(T-mog?jRv7_5mtV zYiS4sEIRWzgosuOoJ`CPF=#-eNx4Ag{Loo$U}%Aqw;GEUQwMMVa8RDQ-GtLCwEWSb z%+k-g^torrLdZqS!Jh_LP=)mCBw>>=8nl$?Qj+VUig=TG{o-x*f(UiXW>oS18pKqD z&*q}d;k!_cXDZuxzF5`4YKNU7GV!bw$< z!C(ky0PeLe>&O;33AyoY>fN=HX;`!VMLvNP=AG)oiBnA<;S){f*k<}AwW4P;SaC5q&2xPL73^W*1?o)tcai%xc(tFLl6m ziV!`pN0oEto1pW-#zjjfMcZ=#VVbYF?^jj>hpbXNr??xr0d?~)%mAZkG4*g5tP+#U z^%_`8BRiiXuQJD?in&T^-BD^H-&DUTj);jxPtjzuAdqr)xC1&eK z==~ej=8Z4%a&s}jX%UcvaRD8!*UBz<%ih5Y+DdK(9zJ)m{0*sC~^rG zUwWy%6CLr33}{z+EAH;0)W)5uC&xjyPr@ew-f{-r@JQ7?K%na1iFP(H!C#JT8n3MP z==3)8C;}=GGYrN;4Ow*^yYk)F(nEt%ZJIlmAGtw8mz8~@0Oc0R&7!*qJC}J~`jIWg z*q^_4IGZOfT=;IQ_UmQAmH&#z0AK?c@_*Mq06+e_(ulvB{#+>X|86#7;OG?Wqt(#8 z&BuY%D>hS4M@~`^o8!fPPGA5>h@r=x27ockK{Kxh?R(`sf~n6{E8DnJLC!R>P1K;^ zL6GhVpuJ+}9Z*4JpCBsxEnBhNok7ShFXD2{Ekp>c(qLBq0O0Yf94euiT8tM3v?P`{ z&2D&2WMois3kM(BB;SiF>KY&#gW3CCQVZ_7TzHYr?PG>srkQTUYF67FU03ih{x= z%9IbPll^~PwO08AIRYA#0yIh5aj1nbW^VTLjZsM7XSPyeT^~y=3R`R5aJ{fCsMXN} z4P*la4j)9tW_f55snpV?vmcu7O)Q6|JHNm^9v>KBg>Bf4X3l$o+M9sdt{7J{YeD~U zlMhCX+Dnaz*-cPk4EDSnWrgJCq- zQuuic4B9=^@;lthz{Pzy`d=#2e`#t1`#|qMTuA@toAiI&(>He3+c;QlECAjGWNc)9 K9eeG!*uMirJHVs> literal 0 HcmV?d00001 diff --git a/windows/deployment/windows-autopilot/images/up-3.PNG b/windows/deployment/windows-autopilot/images/up-3.PNG new file mode 100644 index 0000000000000000000000000000000000000000..8b1e356f92c2c04099809cd119a4f88852bd0c87 GIT binary patch literal 36215 zcmeFYWm8>EurP|d6D+tB++BjZvvIco!QI{6-JOlQLxA8G0vmS;&c)y%Bbt8KbRx}#K-q*0N+B0)evpvuZfs6jwLO?*~71h~(hFmBJr&j+N7nzR^1 z-3-z3X9MPksG=wYL}LQ-s|oC98_`il#{~ic?e~8bGK~R^5CS3&MOH#o!_)9=12*uB z1u5L+k5m5b`0fya_>ykIQbHIQnBNdMFwhz*Dj3j&wr3K<-$j!!QsIs-F5(&DtIyxw z!Dq}QyuWrLeKol^#YEJQ4p6jhebxNRsC$Ar}GK{=7^y*p$NdFHuMjXIZ!vx^n-N#`)Z2E_W zmC(zh(HVYvRAgl2QNLxX6@7s3$Akz_c~~Ri9z6Wh|D!7YbLexdoU8W_dt-Vkb)^k@ zj|l*D@s9Ui{e<=3Kc8e((m!xQ^xm)FECAJKwPyF>ivit~|4YG>T2p~$?b$gs1x0an z%%a2`YWw{XPi*8no0J0sa^LDF@H!iMqR9Z}JIIE$m+Gz$No~y=H-4ffqA4`jx0FI# zV`}zKdI3tqYCcME*>R6pMnY?lO6}svGaocK$pB$yKTAwTm-6{XHVQ3XuU_wd_}O-xB>YSPS@TMnJO4_Qn~mIr931EgGrtfxiG1@F-& z!{w{<+bB6Gk=-k@BjDYCayL021kK0S#Bz+yOkc+b&>*9=V|R9Ha-J=qh7F;PHS#Y= zNGvglt2JVgd@91v5R*XfaaMu zVlY`eW z;mMxs_3=5&zrrOU}yms#!y&D)28{)LZPL`;80lRkOCXS-zc?WRPCTczGFKQ~un5BWeyMqhAdbYHt6f(Sv{# z=CelZ1P3!<%S}$l3loI-NoyXe(v*q#h%%6{SY)w?BtU zw_HXbGv=4T={uM~tU7>~e?+{tHXYuZ5YSM@td(uE><%HX4y==;&DG-IK zRzV*tJM_8#P)Ed2=lMY&EFS-%B=Nx|-dI|!D~_D-q30*;b%Fa(uig)L zOFEPP-&Y9X#lu)a0a0bwm;ER}U8^5zG!(@QzYd&(M4A=wOjSghOm`E?6NS$+o)n}g zV^7Fb9jNFFy%$h--zkCgYX_Ii$e#-QAsV(nHYNjS@wZH@Y3*D}Qxi8fIV^JK$I(h_ zi8Ns6{Xj?pd1`YrAZLyYzIyRK#KHE{OFop9mz&NMTl7gwc&}Tn^&leQG9LLTEcL(g z=&?$)em!!kDri_-r8`6{{{V%hF$RyCCk0&hV|^0kO{4@rk;VicqB`@f22g(Usnp#Y z@qRD&1GedBqCAnW{do9)POR@D`q9#Ux|6^;?wvAncyAa$khZB86I&%xx zO^>|Hs!N}Z`idUwo?FZD{)cH=f4$nhyAeuoeVM6jpk2xIe?)z~h4eg3j|D$X zJsG_)+)f)Kk-}t}AH_?^OQ_6{hJq`XN)S&u0*#_4R0IwB&@|)^^Gt8Cyc*^|RgQTl zBU4*aCLbZKCa%l3qXKK=kD3Bf%HFsyqv+Cl-5|nzx6x?_cwSrgrzQF)83u);xY3IV zSFtb^JH1mOF!7?%S-J{HE34Xk&0Ft&_2ua%ODP%+k#XmH`c% zMR9eI?BMjft3p8<4LXI&b2&aDNrnstGh(IW*W$2S+)AS_`Ns3Z%10!8W%&sb?XL&p@=;8KOF2UW;|k3^_MF zyYN3e8!8s}2Z?4K*%&8g6d!(}aoAu)pXw+PbA$1wLNGciEwf3fwf_P(oLLj2tfRR= zYW9pUikyaXwTmwP+wHsS{*<9eRrgI3v4j}>>)qp}P$$dLL2v6Lm&gGt8TBfyaW{kZ zYF#nx@@ceSP~*Y6htm!EU;Snb@ryFqkYyk(1N52)>2Nei?`rQsU8M@FwVXkJ>d1F~ z^`V%x(s47L^!PT68;O{-R1t%id?fX|P{9?D*nnX*lHV!qq(K6*OAM@}^YSum@E&F2 zYiEVipuaem#<;Nh>b|3Eg;RKLxvs||N}|nX?~$#*a?nh?%O!DNbU&6{v5L4cnr1Q$p2cmXr^Mw zp;Uo=jh!P(H zDDNvWENA_y#S&=t!ee@6U1)fk6G+6@_;b>cBmo8eTZlc5S&&(G!^Iyq2S>gFT@jF> zZmU3>oJZN(58ySRL(QUkhIz6~Y^%(2C&}*Fqg00bnhpe zmzU7BHnf%b9;`v|*FZ^iwe6-hrVBdEX7AObZR1I!^MY(0bjZA}{yR{%AYl~R2n=OP zMP+m{X?(&L;K3H4<9__n{jw3DU+ui$lvfag$~9qe&O@NZ)VwM5SQ`pXnZSQPk$G=s~Qi5 zLofS&hl*Z#$Sq!!-Do7E#A}c!G|2-VEdp_MK?-7_q7#CYLCR}zeOD|I+tQB1y0N8O1xKg32N+((DTQ`&U${Be~vpyhZLC|jJ&E2Gxzv%z6=T{=v+RsdoE zmbv(k305Xg&zKJeK)CCPeDaU8$VkQSIW%s6dL?ld=yfp0k`EgGaop~gU8wuMeXXK2W@wnE(TeWTGDp-WU()^Vv|$;gJOvJMc(kn`bR0F z8^zVCSpa`{w6TS&u#m z*Ka*SL~}YP60SihJxDsRNY=CzL>nw76FY%w_2C=@iVrKZ0P| z3SEAbD0y-V@b}*Gmvea(nu5qHUmy1}Jw3c)J)OQteYi_OwS&#87^X zVW7ngD!aX#z+nr32JU-C8F|BuFN68&betGkwOxzT~;S?HQibARF)e&Y7st}yAT3M2KKC{RLuDxg&eIE?o_ z)n*OIYq#9$AR^T-L}FBz{s)_xA-SNf6Dt{6qdqJu#6gO!1XYI|R)v8XhBjHC5(B5 z90u}K^ZB*pKPMXKxB`MW5q{~N(*c&v_JyQ^AcWD7SoLN9IvMVi&#Z? zU0s=EsMH}~Bm~=I{HJKVN2>@GRr{F>p>TIuuzswzDl0ij)PT|%e=1T=k9llU@6f^E zRTes}>1(pt=H7RK#f7j40zc`yAQSuVGK;CPS$egPjnKWH$ui`rX681u$WYM0e$R7PQmx%7B1G!=U&F7saG32 z0i|0OGZh;CQwmWX*n|$MFLY`cVIK7(@wR*`S%BK)&Bu??QyD)&qA#HjqrI^~S5=jI z0r;Bm(gk|CNavkJ+Wotd8e448;cMj(Ox=U;n((&Sw;W%4TOk&=w?*(2;~WrvCoUNc z=(RS@_1t4Hq9okrBlrzam8$);eJaG3!*6E&xkEFh--}M`LWMVqBN;&h`cq^oYHn*7 zO`q@!Oll;(H{MVVZ&HSBTp zzhak{r7LMj#EEEeC{cYo1^*XAS49}Kv(>mQp0j~#;%|Cm3wc13OSoAyxLL_1Yj4<1FR zze^M~Z}4OBbMUk9qh#yqFE|TXw}Z6 z3XSzK*S&5Ot@Jq|asnPv09&h!qw%2@IXG_o9=~FkF>1ipe>GaHpk=jaHmTo3O9e17tCe*oZ9h)D{6tpHYF#)xLM^dh zf3=csQ>Qre?GTHEH=ILvi;|!(MPDR3{wf(iuL@;$yNjshO2NS4e$P9RwQ^IpNX^Iq zEjVozPWmt$+#Pk}3(3PC;GeAuLX~kV2U`De_Ht0cL+h)EvUmL45C1SAqpQaFLNUNz zg#WyJXsq4@OXzHNfaukG^e_0+<&-LAb8}qyKdSnIsu84634;$aWOd$CfTkI&s%`Ls zMw~;l_3@GqRozq_>BA>F3B~tO)G|bzn9|PB?bZ=x!quUDtdR=&>UC_EojQQ{!A z$s46=MjNi0d>>L9AGE>?g95WV5=!+y1 z;B`2-Nv~WHdB9`daDZ5rB-Yo4(NL#DUFpKPSPN2I)s9|>yi%V9bCjD{B3mcC`nX2& z>Lu31ieU)>-1kVHpWBVPXuDE(f@~bEOIuBl#@{mdz~UhVctGUrI{(HfghRbI7HloL z5>n@}5jPH9y*oC}`2|%tJXG)V_?OemFihVKl6%+Ij^j_$C?v}l_ zZYi@}W<=wY7%Q8ARRe^&4IF}kmXRRX{=(-Qmn1Wl)>9jk{ij&hR4@m|8fjIO0Y`bs zyIymmzi#+XuA*x#KMkV}C>lS0gbnPO?YeHGQ4b&LKl!!adJzJAK>90SyO&=#mg<7H zxA?xdlaMRueRjmgR~Og-Lc+vITLf2CZKx{OtEY4*T;jm&C1w4tMy$1MyGL{$S%(t*n^w`Pso0E zCzF5m%&t}iVM-x=gY_rNx1{YS*r}NlnU^ymM}V2I7kHrrWuCED(7TEUo+@aR;K!ex z=Elr9GT5t)&7rFjb_X|KAk+eE6hH2H6FM^JS6jhLaWESmI_et)DbotWn$~>`cb&?M zGPA7it!*6QkS^u@^4HYvbL=zrarWvBa05AG8}s73D{V3wE?6bgE3}pVRpI2Faqe5616kkAMmiZ4<+j>NLX-c;Y#&uu{AJm9*Kfdo zTnu>AN>k!qLzrg`viRz>cy8=ne_PgmTbR7J0TSoAb=NhFluDhQQ&+rX6ZXs2z(A@u z+RFZNSqGiS3H(FT&*3JC41X3LkkHceAtk`klF|&rK@U z86|b*a|LqBaWT^}|Dne^r#b&jCh}fHkPzm1(sr`PiiRVWqHX)zO7TWqJVmHHrAlC?m3Y*c^1Hk;`b^c}$3ABIen=Zs2X+8A| zAgoW`R(hDCh(@ej%ObQg&@53>Ym)h(+61T$sdBC?4Pg(SS418!=)Fht?(c``#MRN% z@wYQ*v7?<2BXsgz^KQ9#5xS>@GwNSOE;@l?B#kL?8jA!VRZd4Jb~h(lr}#a5^pLbz zpo?z7`^d<^ZF;^dqP#kzo(1h}T0DR~&OO;oXMs3YT#oEY#Rz=?Wdgw(OwW9ib@z&* zu2u~7X%WH$^`}ac!$m|(?{*mEYZCXP=ir&d40W>bwyGEekc3Pc=Kh*d)ASG%mUbMC z1kmo^7Q9V&bz%*3OYWSfodyfyIKk1wub+=c3F2yfQ?!D!?A1%^naDQ*nbGO>atLwt zap)vA)!s2@uR$E&1eZ+D0q%KFBElK3@m&3PM zQ{}gC$_k4-dr-_4| z*~WCc;id1(p--d#SeC-Gd+BAA(KZd3Ova1^Xd!2pE7{<* zSWS*opB~@7hv(`8;`BC~%XB>u7ftMauLiKZh{8u#C&Pj_@nU9@z1H#~D*^Dzt&ziR zPwH0-6tXKPC3d~;2`9VXLF+bL>sXrf8iSGCVM$Ha-wbt|W(D##rJrrOBFW5|^kb8% zIaFIDQ8id-2TsmdV34-D7;}5!0?x+MF-n1#uNLD*CAQVMLz!KQ8#WT&OYiaR=o9Rf z*{eNkqSNwXCmH~TZ#!pg5Qqx&>s5aC=mSFSizyw)zhkg*<^Cj*9n`Zus9V5JT<%MH znnp~u*|?-8)woD@>a%|N7TmWX4@J9V_K3dL6Lc!J#>@#*(eCiOnj@j``+;spZ+>Wv z{M%SuL5;__6{6X0B#|^pt3QA9I8Oz3dUDj!Ru!G|{e*u34IZG$fyJ{Y6mDm~iwnP* z4mRrUXNj5HO50(m2$-$Gaz^2`L5-PA+(M+FS)|M;Y}`ViQQJ_=!e+EkB^ITB0d`x* zre8p1yBv6=#RPL2P!LzYl%H${m{`!WL|g*~y`@*VT%D_;>$cX%J0mtJyt5?XrY;c^ z@zP1=+AZ!^q=OhoOZwZ43}Ez3FL!I*ELJ&V@!N^e?vBGh+$_)#^09P5*_EI7V6P-$_?{6CuAd7jTXDkoYx&wl#pt8l)u)u#G5g*N zrQob4*hJjykt?b)oE*u*JfHzGv?-bj3tYXbBt)Ou?1Fu9-iN8S{D~N7b|Y9>z+k=6 z8-0J(>`tM<)qMejQmu)=+e5&>u5RI*^*v1R2ZnvUIvOs4(`qzGttWRMbgon`~L%eR^pntzv#V_B=TsD(=${{86iW57BY`>BjOA$!JJV!r7>RaW!o zNG^fQIAGpj|BHR1BZfO1Sb3EiefLsDA(yck`1R&SsoVR|+m7&!8r6#YcNkYy=jxDk zGc{}XLf=AG1q|k%nwvBh*=Bz|$p4!f0uL8G^NuU2<+O6TF~xj-Kk8eazH3cRlMxML zq)+v@*}d1_}SNbqUFi43b`o84jw1nV3gIi zNS_mzE@I|na^OTe4cTlB%dN;#wEhBfv)il^!jIfp)chM}TwCj4Qj?RA|2oZR-N&w0 zf-X&G!&qJ$OvHgneH*(`OlrZF8+F%!!O4Q8>s}JJOvfFS7&TFZjNd!N;`7Xm{vKnn$p=}SpQJ$cgQ-D}(E)jrUmA3u6 zYn=+t-1Skr5r6{;@jM!aC*qB>&+s_BN=%&-?bffR+Qy1OQ+jXk*IyB|?MFm{a;Qjt zSvaXe+bb$Qor2%-pcP%zoMEdu@D$|O^qp}xNsh4UU5?<$X*92Jntt{5o=qw7b+iBf^m@k|^$-k*?AYBOZRgL=Y z$W^cs_@9Mluf~;WuAtGw7+K{5{pus-G~WJ>yEEcrMwUBEI$D7(&)6kpF6LJJf$9(A z>E~7gCA&z8Dyo*nbv$)na#(UKphwFdwKPiPYE%W%a@~On< z8C@MK(VjdI#yj~jP>O9dNp>F;OdaLgF}yhs04OLR0n{E2n{E2>0iC~k_iI4IZ`@NN zlmQcf)H?tkqC_fb#?$AGO{08Fup-Bw#}=J;dtu6!u{g+iNk&GYDv;MPTo^s#<^e7+mcpJ&O1lqK2@e7m#(CHwOc2@g z*>DSd-`LUKc%fcs^b2zyQSN(};0-9KJ+v89fM^EuUz;*M@r}$>#5<)xa_w5YSdfl3ZTrG0>sZdtg*dxTUa5&2 z#sH&Ik&aggIs%S(8Ix%*{2n2Ro=xcTZMBGG(jYZEv-vAFdI?Q}%32HRL>eTSonEyV zGbjl6wA{{#H4vy&W%2ZSD1(RqWJltw%Iq>1 z^4Dp?QBOB4)N4cKz_t73lajHQ#Ii9yqvZU!d9Z%i^mhur?WN_4K*1)t@r{_?4BgAB_;a{tFs048%N-)u_K48i3CCmflB1ynB1ZRs@(FK@d5G- zJbjCKKK0hw64kNn*>+kG%5N2XC!5>Ukn6g8hrU_@6E~9i!PTp2m#h8CtLHUl<%h9M zMEu)pt;`Pb`_Z%-K)PQy*F0e;R?AELLBtuMG}XexweviYGZW2ZN`a(WfdY|!0ziko zUG9LIb)szW!zrkEMnZ3)(F#GVXR(x4#A1BFl%=v2Q#gfUvaXfsLHMRV@ouAlDFAxE zn63Ym84nvy>kCEc!>tpa{aXak+W=U-SV=ZT_<(bA?}OdmD+K?uiQ@94I;7Fr96Ku_ zw!XI&f5)+k-@5a=iqY*f*wUk0l}qlPu&GhbVBv8K*|!)(j!jVM$15ojuqz*Y#JCkD z{%#I0F+fk7LL?8ld;nvS(X1LjN)>?W$S>3&PuBJoI`Jn`_>fhQ;`_gBfQ;skS_a29 zO-X#AtQ+b%nanGe?B@=?NpjkseDl(y#qP3vvej#{Ve$>V8Wr}E?u~95w8n^N44_~< zW~64l*4A5LH&via1>ujjO77ewt5W-gqz5!yykh@XiWYV`S@1<`ldx8o?9i|baIC?? zs`XK}tlInYG*h^JFU?S?8MB+GYK`XiHaCEwpx~=vL}>k2#KaQ0@@XlhbcKxi;bb$G zTh4F=L8?<#q^(UgZ9`7_(htR^Gl8XQOL?{q1HkOzp{J?{i$ObYv<&$EPP60u$>5&h zJMo@7`u$ll^5Qm3i@Ku0wTs`Gr_n&Us*|=*oo|`EPW&gFq(QV9 zWrezv_RE)6PGIhIr@t;9R$O2UVEXOFkh~fm4z6q3Tv8J$!78n(mjqs-7i!4P%y82& zh!)VdBk_4FdrRx)e(52%+3(eLV`DmVKng};C3L(trcWn^wn?uF{PjEgNJm$xK|W#I zJemse98`@JRyPX`J%lkQm0_6JQ~08QreF} z&lL+@bF!aRA=s;gY~&?CY{Sh>+ct(sLKhz~IoZ>?1~Mp~Z>z@kiMRdRx3^FkQd84q zRO9{p>U87I$DMjoR!njk@~l?;8E$!(>!CX1w%O8m^?stZ_av8&9Dk-EfD49;POXhZ z8t7wDeYaS>>FT!~eRU1E&h^VZe1br3`p_=fkSQ@s@I(Y;AgQp&o!$J6+ik@qYgSVl zD2k8ix922gPuBN5e>>n|Oj=pzEaW-CP4_D!77qwv^cmUZ`fD~g-99oVJiXPF;ZW7b zdNOjmprKP5aOGMa56D3s)vWHe4=s@#rPImxWps&$Z*O6ufBV5I%rWXS@QlZ<09vkI zTY|ONYd!4$wXaa9Tg{EoKFOVqyf5C=H#s}jK<}pdt1O<+4MjiHh6HO1rPds~tS0dR z9u!Lne#yN57E3Q4UbW*LBk3CQjJKr|Nf)r7BggOdv5PI;=s1Z8Lrt?iM{c32AU42~ zvp8gb*{&>H&oMdf_5x*_EWM#CS!fhN@vE^_+g`;k3^XY;+ks14Zo7(ncYFn{ctWY* zH*dJX$PecA61cl+0uIj$e|>NRZtd60-lAtbc@k-Nn}j{%Sl@QnQ%{)mzl{-Cc?yj#E z+>{Gd+`tKjaQAKA^v&pD#IA0z>^D9q8|xya*Cipx2U|G#tWhC89NLxij1cA@;_)^6zk6?@@4-g&TL^*9eGupLlS+tlRvh z+Ac$xUBqJ*4dp`xs*W6&BOe@{Y?DvVYDm#;t$(1|T&rf!zmbMwR;Pbz@VW6L9 z!R>A-J0}s=yEdlgZ*~ z;+He>M<=p#{b^4F5AKSY=zvIm@XeJPDSB=Hl8;H4Y(TbU*ea5c2)OQ*i#j^l5zwnL zCQJ-_z?Ba~R2yPiyjj(q9q_#J*^`LLU``>SXC#dtC` z<>+aEUq$S$*aE+g6Mk54D|X2{J?+oVOIY)bz+H1+zKZKlb%4@|^Dbbh#o4v;NoITX zZdA9Yfg3w*)qUXQO%9qsEnJT1Fr(IgS8D@FKCL2npeoPv78}v%3Uqm1!ZVb~q`LVr zgyJQDqv;ZuKkFU>{QmZuvej^$m|EoDAgZ?{Vx7ea?kbo+9zXQ7A%$IKHMu6LEb#HN zR6%cHp+L?!U6b+>Xx(UX-Y>2o@?N;z$lG%sY|^cm2lg!oYLf5t9Um0+t3%TB!8!zV zX{3KcH0p6irdXI2t8O?$FMC&db5sNp3te=>hE&5CPmGF~-K!#wAAT$k4_m#g1eR?n zj*6=%6sgoMF26kaRTlfpP>Q?9w#~Zow-P(=^Um7`&>U2n0O9V&RC}Jo&K{1gA74A~ zn{@n4o?eduzeG^iIT|=Fm@Izdk-o;3jc0V8J&}L&Qch!)Y$}*&O`V2)ko>8q&xG7gZ z2SW#|_6O_Z7o^5mwkEVbgc11)zk3jU$Jq4k!PEU+y%fyCSTH|+pJK+`VxgsQ1o%3t z`5y0(PO@NFuxfHp5s$r6(=hIQvd$HLBsKCGSi^;!nsQu|x4Hov9jfQ(3+88>P7m~H z)T+ysNtjtfQO$^rT5xM_qn@CIQd*&~=RRZHkp%@&Qd&yBM zkOxa7f+`-B{dk^Jadp#7{DESHS7M`!T8001#!D28_<&9n`T+h$N&B)OGC7mjq+AL; zY_pp}yGBl*$VMRp9AOi-e*aIciImE=e4JaO9Yfv7T>XXWcc8&d`S!hJ zh3ZxL{qnOl=@*yDHo2MZbMx04h+EHBNQE2c=bpHG_aPgVg5*N;+uL-h0IG z=`?Ejns`Mc)S-P$CXD=&e++A6ivMckDeri6?mfET?Jka@!pyoUh1KFknKH(&Bfd6x zJxieI{}8WD&ue_o%crx=xSHJpcaq~@-ikjqN%J8BIpzXZRkJkH_vDaSP1lG(hQdVk zZA^6a&@1*fLJL=?Ne7yEd`Zkx&*ntJDR@>H0x!nTmzD@>r+M^yPZ@lYivt89=$ipV zvpms5ZL&t&c?awYFKIGKIWf);cSE~HsHJCu^ZDs_!sf#U=vz@2MZXqi@t*of$rkWF z&}yU~@H8QvaM-|m(tlceY(rAmdjtAxp7(yJ?Ecehd}&>bl;+nJ5rVfKNp#r~(RZ#1 z*Bm7kiT$0=0v2a-!`E-H%sm=0`yNx|WrzuUF#Tan@w`+mW-UJ@@0&ONw5T#O1u2xNn4POcAg+CXj3$wTkCnb0K$X)9mc>YI5 zfbJiRO@CPfJhJc6a145=fL}EH&|Zb#1zNO7Kj2{}`JX8pr}Ub{W?wEw6CTn=GJn7s zKfXe-$Agc1oLvHyJcc-m(MbH>iF>O3^T22P`#WQzu1T9RPmTF7f0k6d)}utAvo&3Q zh(B>}u-$Z)(-noqDNJp-Vo8NShDGCwABb&|b@^`EuD@Lfo(VIF^7TLbx|>vx2Ej)d z@Acvw1Yw`HlS;23MX}mzM?Su%IO*Dn0Os>8Bqv`;Q|+_}RyUjTMo0zJcJ4h@ScM@$ zrWSfp)?4p^0>avnXMvX=^-`K3m5LSB8Z*6D_DWP6+`0Qq8i5y-dy*L`u|}~-v?q?( zg3Z1!2L+kIDanU37d!yH+*7I1h>OwCZierELb!a^+6^42Kq!H7Z7h08YeGDcPipNy zeED)u;FVwJt93Q1u?-4{L&ndcE>&tHE>%m3<`4Y_9T$%|Iu2tzt}O0SDt%vGmc1Eg zg;hPW62HF=cF*o*0kN28a|d@*XgHa%mdnUl@62R z{1rr_K*|$Cy6;ifWh(l_9(5?b?;}e`AM?y$JmI%<{-!3C=Q)#QzX<)(=(Bxn?Eos| zkv|BWjD*#wIag28N4!eRzgt-LpO*mfohS@gggm3AhYpfLZpd~k%%@A|(&0UoP$9*0 zg}D!09*%pa>#zIfw$sUO^TKfx;=~^t;E=<{lhvWC1d*t2t%-8w)vY2b|mdssKtkgR3XXO zcV>gP)E2}&uYyslr};fa7iaFR9Er~8Pw?5ib!M+Qv8BCmFswYci9=iNuUR;QqF}jl z?6R*KlJiZ&bFCI$PdR~(&B)#DX9Ej3Icz=~BvU$WFbK2Qf}HF|A*pc2wJRFNX~&clA&`^Z!Zbk8J*RQ zo`>WLI&_o87fp_hd*AvsWTuns@R9;?-LO@A^_^O()G_a(r76^|4JI00ZI^qIIk<_2 z2KFi%Y=#;y3y>UOi0d(M>yXQF=wB&~hrDx5$q%;~S1k{{mGsx2xQ?8+n~3)E|u^T|w^ zeJ6qXxf4=?0U}j*)9D8?j8XY_(Iuj_6CJIF->AZ~6P->F{0+KLITk0|bUO$LoK1i) z>PsiPzllQFSRSNm7pC!9y_xT;mM+tHX(H>OKZ7WipziEEK;bHH=5GE<#`JV62m7_F zjMW9t)97x48b*ui(=@L;l3dLyT&X8!mLM7qhr~N|yI4@hyapNHN4lFoJ<4*aFR1S? z<3aVDhL1u8y`Carp;4Q+Qf)+Rd6?SWx$lQ_l{Kg-e{1uaF>8_hM&n!`Bn`q_L!oD^ zZtFRTAZ5li2258yH)TtdRitZ8tNXduE~?k2d@a9^pf}fFBmmqI^DvnG*N zhAV1^403t*UrZlvKVR^_0uyreuDZXQ?S1Ir3cc^igo)Y__;LJc3qjEujb2Rvev1kS z$e-=s0s)ViUWV_x19~mkTE1=}hnb6jn6>=oH0)yfd)i7FxkS#F6TNIkQ%^FSW<``1 z!je~6PFjnJ_xhR^PNj)MfW&R|;to!)_2{iauP>nfx_3XHfjgDS%C^qf`trMe_txXG zl!{gweLSBnl@|p&Xs$S29!b$K6-?6)}M)BcLsT zkz%ppzk)@c=`yiD0fYTL?-qc%%j^7&^uGo`eXct0t^lvP%O?FuZle!Dzt@|or5?Y@ zTAUr0LnGb$o4k$i-Qt^vIFA|cLyxT4PcR!R{TbT@7aw`T{d?FOWdC2j2+scx`6608 z8OXeTa59rHe*qb=yneICPTdw?kFQ^OKLA6N$QG?ni{kvPN}4*0lLtxGxlIOj-c7kW zE8pu3p3CG@{39L+D2jhVex|w@^lHeUF+?5);K$^8)tiE+v=U!O8Su5wpiFecn)q0W zB$42}hxS2V(g89v&c(i`G}=OYs6^RUSn)Ofr0VvFy*&*zi<9_~9UU?-`XCdXuziG{ zs|$|I_wP*GR!q72JW#~)9E{j=twWzV5;wVW8Z6Bmm

g+y`aB7~7~5B;&qXyy=> z*cc>?JAdgNbpC=hswN>qWwu+&O2nFfG@i9l(|K-D6dH$m2nXo|^HD zIVe06j$Cyp!LlQ$DSztBe-xX>2sF5w%er>&2{A6GplAR?y5&g+mI7p+>~k2avm+X0 z_=^5^o~zX%4P9^6*i0y@X$Hn(ui-}o*oJQ&2>RyU6hj~r}FgM)qI_{bxhe@U@NLBkX# z3^IQKiJ_c7VMzRU5fyxT*#0T_5Yt-r2f{PRll@#rB{XCXhibJSPIr1J+?6F*EJ1Jj z7dO%v2HqLA%=%TOAowt{_xSYIr_J+*gHn}2eIWZ7Lm%88KomtjaNTy47+J$emfs=(ix?NfGLc2kAR{n#s&_tO?j}tE9uqS-0z$&_sqsf<^=x2`Z z2wzHAo%qFQ6`xsR&#umTb+$q&&2CD9)b5gMZ=>60j`q9lPtKp4SOS*)L9taK7)C1h zvX;yf4}H)CH|7FN-tYzP88MkDE1r+j6<7Wr^sAC#$QRYXCQyg{E4H*AweS$(?gK099YZ~!2>L?iz!W$#tq z<8%H*!vRc@Y^}HB^fNA^!Irer+RGL2hK}T`AR?jqeTiF0(xa<9^Je}vRklMxU@2}O5Up-0t7~HWMhrtpG{UFbmj0lzA7h+ixh>@~J333(%BRfiYjoa^@sSfW{B+Ix7 zc9b#De3(|4slj7Sekv`8EJsh%(CV&=Xksgdb+WOxFf+23D36Z^X0JQGvwB)v83 zT)Ar{1Lw>~insg+F@JAgvcM;)v%@3}Ge)9tQ{R zgIuWHY09cyi~lf6&Wm|r7hkxE1kG{z{EvxFr_0Vq#u(LoE zD|H7n0ne&8vSwAysE@tN%M7*Dyx_K%$Joje&yttLS?uJT~Gf=)&U zLeI?{f2sq((hs!UDUg zk=T08@vhazfEOuq7@QPEPb^a5R^om;;s`}>i!`e~LiEEga`Lq*E<|#QuKUlF$vM!p z@%O^HcuAL~-9zii%cqt&ESqW8amV&~dUEA3eQZYDlF%PGRb}c=fP=n3<1@W$rV|fu zNG`A+ayUKoB?vr78e9goPUNZznp$*Wo**p_S!0RRYx+ci| zYhon%w)p?B_fFAu#qGOjgT}V4#zvDgMjP9wh$7!eJ3FSZnP}~dMLKx1YsM5eomcoH zOdKeB+?UUmu70>KFNpCroH*!Qq2%;}_d!c!Mky$?@#+k9zID2$u&1_j=dG4T1pHT! z`(4j4WlgWBE2l)iHx80~RI4JHz|ufs9|)>8RpSXV7J|rdZHJ_vTWa8q!lg`k$GukW zhLk#D!w*CyWZ-Xd_OAD$+s1d67!=mfbP7*;KF@iQ?sbqWf~#|-NJ(#Ph^poA&_O%XUw@!k8mdH=;C@b5&8H90 zfp6_{#EhWW%uJs;7&Z20-4Viw`qjL?Q_8Bt!8g?x)C%vKJ05X{>PIgI2sJ$HFJv)W z0xRGhN0aRg(6E7ak;&<_NT-K^M-tX=c?RFKeBGptP_t!38ou4)QV|)QGIFPGMSH%J z?ddAD%b%7=pK3L;@ve2CPFr=M8-W_>kTWrqzragr5}hBdgiG?^wqE4)qr*eAI_dP$ z5vO=w+Ynbt9^Gfj?5tuQ4pjH1GgtO2gpWcJ>M%lHe_aLy^8d&+G|$oImQ+uAGyFrv z-a{spO-I_gAksNiZ%f|~GK%j0N$`D#t;;VE;xYIEo%MQyzr`-}%_HauWF~q_31Icn z`VgS#qAARz{7^UvQ^O0Vb!rcQU^LhL$%ou4KkvG`B1A^l2V=KYPi5G)rJpS_CK6*^ zWz#SNz!txH5cVMut={c`%(^)^&r1$4e0+A3PRwbw;s?C8pwCeG z1(Vxx^}bj|ldMn)Etw3~&JsvA++vmuYuN;YS#`NXSFVo@1YYIa>%ZemzF(ReU$E$} zBsiEqD}B1JO5D?aV?|T*4)7Hq^ye84$p6x652}rihc1>gBO648IZch3|v(zD@LjnDPb@F72qlBAq&U z?G{(_A+h>4h(sb7*s+WS1~vA6XvPPsjVUc3`r*NpBhy3WF%guIFvGnQyBE7@%kKmA z<@g*6E%2?3T-Qsw(i%9#&%+_ zRN@g}{f;>;EHy*dUvD%FY-3g@K~)4z-wB$+6ll}!$Z1ZWk($3r`^1Q4{p-gSn8z^1L@ zMbg!X@t=Rn_Zz%>Pm__=kKKYhe@)O?!y`g zCOH4Cm#1*&1d)#Xx4!-V<27K;8I+Hy)+^C9HEWCJIrCrH@)8skeKL*p)`z|4Cuw70 zrkRNn3E3@Z6BM=~0UqN^ii##<=qEi)(d(aafhcxF4CIUOLuaUjTEP&$-(4Aw!Wb{F zc2R>0<%I*sp`_Q7f@HkpzRSNW3Oj{e;O3nW2eGbkE6X#g5`$5m^xu2KZU}-HIuZhA z;;*(UAbN(XaTAUJeag~Y1a4VUBA{FB>G5_M&PIm+J355-z9Z-7=ddta?Y}Gvx7duy zqYDxXj9l7J=9;JXHE%4_A^+$UbYcjAmpf+Y_K#%UwF#|O-@auw4LyW~O@P#$b5t9v ziy-zFP~h;hRoZ*z*K$8IM$2#KAKUj|DxUI34Zeg^&5b`k-Z^mRF8rc$AzXj9 z4+4|X)jRY$P5x=1f*{$k!TZ`%Q7jLtBrH>{{<$wAFu~S6gX7}mg;B0cc$ePLcRgdN z4l3AZ&M~fpDp4){qD#>I9si~}Bjv``Z?;nPGv{q>)}$TD6XVK+rW{KE>z;5k(2;DwY|J87H4h0Oiy6 zhYLee_mxvqg)yWoadaokjq?%k?iBsI>16SPd`a;mNtw?}%0-m22^emSuWG9q10u;O z@}|*jh9C3;)OeEKy2OA1Wbwi2cS+2Z5LG zV9v`>UZ2rutwTRvg>F4m`970icFx9>_aoVcIu<(}1btT9^uwar0_1C!t*CIq!-1Jm z`9_onkkeoW;8N0b=H=Z*uYupyq31`@OdKkL&!s=O?O`r2h{zw%;uutGR5|8$LdG{! zT*i5>*D8M>&7$7uz}7_g0#>Z+fk($L*y^=0^cnUSD@-a`n7#&^6?^Bo1NFC^=GY1b z+-tQ44?Aoso23XDE!XYx-nquBkMCDDdV^z3M1f5f?}!?swcEoGlDyZv$H0ufu*oj} z@l&tpLo~w^XW*r5EzV6Jw&QO~Mb(|V$>f~={C@e6ZbD&a1<q3R@J_?JOyeJDwVk6y>Sq|rbKp1kE{wI-@*J*tMq2}_;{ z+W;n<_}O~?R<-imeJjxZWbCMg|5|I7IXFjh%%;U_%7%t-7rw*#C5 z(Wnhc;$!+j2r)V`QbaQ6B6VuJM3GziM6TtI`tmQ@MNRJD-ym znV~ck2xDB#>HTm3Azvh9$8M|o8Iad_d7e;;qb-1n3I*ZWaX|>I-~1vv_XeX`cwW1A zxY`14xC57~9vZ-%Z{` zIs`6Hc9N946e>#{@Gf(lV?OO3Jiyh5jXwkSfaH8~3A0~;ANd$PY2XZmQoo!oE>Uj6 z>soR-U-rE+cY+k9B*|6gTi4A6WDJ#ersoL8L5e2R2fYkc&kwD9yor>|-uWWfWx+&{ zA~1dMLC37GEAtMe3vg>_F~wIf=?LUmu7;yF4{YwJiEpLWN=+LLz|1lbYDZEcASIPLg*xl7Ukw&FU?w4a&(!2j<|S{ zI+5{9MC@AA&}=glJy84lZ)mU*^;p}+KNtb+xNQ?8&qF3g?lIYyMbyy1 zcs;<|3%3o?V42H6Mx$bl=u}37{B7zhRMR((A^cM|E(0?FYE(I9(Aw6^*!!(+q;Csm zo2wUE)CDmh%S8H;f>>he^x$&Dt-jWINt(~&qEfw5k$+^fsW{zelGy1=aU%(b#UZ&u zki+|JtP+Rc1ML3eovjQ3KVkxw^*FAz<=~$2@MX%Z#cLg>M94SG=3=MWkbG)TPv@LF zq;_&OhLPWEOMa5tUhjsii#ox2G1Cu9NMun4=h7Jr;qVVuWg9|oCGxj$LssvHcmBu2 z%4%kxX~T*~L!7qA_oHoGLb92%SYM#;8GfF7lhvX!qNucbtxG<_Y&C5}VzbSdP$Mw6NGsL7R5JcXhj2 zf>!Wi*&_Xgg6S~i`_0_|4AF<|u*7=ZzTXSW2D8ybHCcQBa-ib0>t4G1OALZ_Dl3=} z;t(kZCE@50e*||BME}KkQ~~z>_Hdlh@X`xR*YP7a68@;s^=XW~RKJ|V>B0fa>w?PR z?W6wbY9ngr==&2^)~gGbw+RlM*Rle^T08cGvZMa|+FVWDvuMUQUyRZhU*OS$gpmWF z!pIzk)vaiA@N?)E_Z5`xkuMWoq%H;UQ5R$RjR=cK0oxj3WFdVxg1l#MqtYQYpKawWd;X?*vHYNFy;N=K;1sLb5gSi&p!`>$KU6XGE$S(o$H$d`MQvnKbugzOOScW{DbNnaDb&o>cF5GJvs&m&q z66$IGI2C5gM;gA5?e-LRJ2av;KUTi5fitGANbGDcBmr+W@N(*oK;z#v-#fGVYy|F- zV)urWAn-g!8MKL+y6<4cS9L$ztvf?Ed4<9uQ*}0?W}e$!c+t~Ox14MpT=gDO$3C6E zxf?`NG{9dPkM){W6AU;J%M2w~^98~x>4qxJb1;zOBeo;=3?F0xBjWdSdzfrk_Dbx? z3JjjHUzjfqHtKR=&TXs)!_PR~2{>1sC*#BB0m-6Khvc!RFwN8$QFIG40L{FeY3oCD znks(UkYxi-J1tv}1NIbUn^oG#k9?x%<_KjGR18|RPvXdibZX)^WtQqxR5EV)7gMUs zH$RH2WMVsv(MKBXeu`u-2(763g@S_meD$baT-ZV}MeB7atLQ$olS8bn%p$5(j+JIP zK3K7FfYnp_f>NvEdfDwkmf!BDN9jH>K?=;T%v~u&F}X3=_lR^M>xpDF9-|gGtFjcs zEVc?kM&)@HKi|!h3y4HXs#FoITaQajdvSO@38MEbKIBB7 zK@N^{%UKr`mTWtu)ZDeIL;sl-)TS$z_y^a%(ZhM?VzZfmYyqKAItVqv6}tZuo71>3 zm7?ww)0!^kiKkyw{!6s}F=3{DP1z#N2ku9QTIH_Oh74jP4D)BtbQ~Cod4~bUxnYi_qkjrO6G=SgNK0>2_Y=S^{3EOnl9_ zXP##)`kFLdJYaG0{9iceVXc9LJlGP-cW!bPrvH8o{Q(R7Q*@?-!`WJ>nZ8lsqE z0aEEQtkH8-5wt%`xz9g1b9oS8#kS>(ev?QOwqnUi-}=ZfdodNIK}_Yju75Q}&ohD_ z{VXaI`PPE0n|a%A_ozqs>cThQh!c$`CLE_;4h?m|8+PHU9;ZwJ^}W!03k|G9lL{VC zPiG(q$asr5KO{7MYFODQ4jn$6QZ_e3~GAY)8n2^jKrf=6BB>P-We_&$X*dn zm-y6YUF6ghW0(-Qx_r+ znPA1XW^V9~((J>K?_;^Ti zzic*?QXD5RkeOAu;P9VG8JFK~JN8)Kgfhbp+-oz`s7v!anq0f7|0)8U11n>ASf1a} z{^$`PH%RxN^)KXHBsk#wDZ*?+d`E%D@`+@$x#)k{Sk0qCvE{Z_U9=XA!?Llr+!|G% zJ++uskmJdyS?;u|zm1op+^1b~cX}35uGacKpNqO&fgcl4Kleu9cxC&+HFaKE)iW`9 znfT!4ngU9#Ng|#H^r3w-Ln00!pVR9J?UZ)EIr>@me=R1zUKPNAzw?a# zm)n@|y)SzB3tQ!4*QHa%j4k2T5Es*!$VL%j!~M=;lrtd0B?OVWYT~ z`lio3s&p0arZkotBb-WG8w{jNrVr;LF2W@qfyMn=SSW#Aav1$H&5`rVg`hky1+s1Uq%(9}!v`(*k|* zbwqaFO)xf4`~f2#T`g)Yy2uFDxB(C1G5xR`9O$TTm>?92hj7H4=*m}KCo$AQ^<;udXe=uvhoDn^~VK5O%iAz>H(x_DN$vS65gNbD> z+pLHSys(=-&_&Ec2nc2ayG1eYG8-51S{m20ADAjVmE@FZXab4^5xpN(^~QV;O%v#S zpqHcZW15!DcF{%w?}569q4S;V{k8GHn%&|n_q(0%k`4(&*-va3bLowD>v6q`a1U-T zsPTF>W&A;hKMu7Q9uztpNNs7gU@^-Y#bk`+J65|8%9LqB?8tzI>(Kn0vU*{up}#KIgH#lX4$^7jI3@agJ|RtfU~tf?3NFD- z8ZL(GO^c?dmVIZ4bamqcpBwI(OmM-A8RjgJ&*kKtBML`8PpI)#MX_wEj!=(p_N*7o zH@iBSF`25>)<`&c1Ov$Fge{}ZBXVT-R%IK?mpgw+=opX6oPio%Y^8}+$H4l2s?Zz- zlv{hq`LX0k;{`0nd7CpH7{wu_#LrPl6s@#ww6khF3(u>|50aV{K51Lmv~zOCZ79)I zI8n=O7GI!R-(yn#tfQGUYiU57-UwmBi6pr6$K>j@S;~MOB?hYUE6Ie{6iHb>wEBZC zR9SLqSa_o5W)bYkv{;o_1}B&JJX4UP3vcddNn;5y1Rt|63$3*u80KiAP!v;q%?D7T zBLtE%&!fF=o$EAgp8bK%EI)o@;mY)vVlxh>qiDj6|ajRST6g>mGHUAv&*gyxz!V4m{Ftt6Dp<3)}|= z-p^MA&c4SM?2?y0R-7??E}omyShQzQ#%XI{#8hu!2dlsI4xR99=$Oa8=3Q6V~9oY0=N)}osy4$qmR2`t zQS9%6(~E)bthYCQ6clunU+)KUpox3lkom&aL9xXGAd36X*a{pb++RO!jX^%Nnlw$D z4;y+ZFlKwW)cN&F(q_Xx&njjq;{ZPvM9fO_mx}Wl#3?ZOVuAu9pauK{A z;-F6NU9C-I90K}ZK*6zoH)0d1pU>RS#$>W4Z%;SVqM`*%tixfwY>JmR*ZDnwYIkCj zw%mVlw9k8rG8FV&kgSeA5I@5Xe+7>F)4{9XlY(Mm@;C`cLt73IMW2r7|70K3P?P1o zI_ye1>dWTfgE&Li)RomuC8@~TyrCdOSl8_TpE3U5K!1P;N&okBqx?k3`fid3*Y{q~ z;IhTewi`R$-xIfD9dE8DC-<@!D9uM5ba4-yhPhSSos$(9QBgAoLHQ)-ZZ8LHSN$ z1quvikN)~KBqQq#1UkTvLHLpM3Z`4UF&f>ksEMOM@;^JGn)4pHDy$BkRrow$1~f{# zLsH=h*CsiU5!P%!lBIsJqMLlfN{xZ9(x$7UkYAzn2V(pbmRAN-jx#CM{0c=ir%l0* zh|GV7xc=k_MdWRP3&&L!lvdUXg^Id|4+7=HF+v0igEQYe*=viuPd4X z*jwg2hotnrEl9R@bLjX2$066KUj&yx(D1vLE8+5E_q{^kl~0U1YzNXR|FKZT@dnb{ z`El@pmU8fni?6v0xz_rxY~op{hX?D3!JX_uqo_TGXJzK)2OR&we9Nu-Brc=T;)gtU zRPu^4+>qDoM5F#wVsS%Y3-5Hb4x#tEqkwdGHELw4YHB6DSuZ!=x4dthkuMPCK@`U5 z|Fg(CvA7|IvIfIbcGE_igv{b47xx~U_S~QfGFD&9_$bz(uKswY&Yv-LBb#waQCE*| zYq4xT2w%JTU?JAuF$rx?f(y_xFKvUYoxL6C0en}uSy~$N~^!y**V|PR!23 zyoW5lbXl#Pxbo#>RI7I4KY6=)=KM}YP z>-itMH40s9yOJ#YqzWPutyY1bI&N>g{Ch%mus|XvFQNt#vai*WjcAc5fPYdgkZuhr z6zD%t^M^)0hlZ--ie}%BAEi;r)o|^-&s>Ka=8ktQV57?&VPjPTF(UaKIxR8KXHMvJ zJT?cb! zFq}_CTsVzKUHqPSG&oQda)akHNWq~aPK;kJ=0ziQJF%iS1#ur?DB&u8 zA{X)-Zn2sPDa98^qI!yDYr0>`=69Ui+{wF(`thDxoRUQxBlr!_)R{ynrxMd=`v=C~ zjHd3-YjHU2xCp@Zoz{D7IKL0_DEbOB!+nN0@-op6!>zpVAXIW2v4`I{{~5-Jy}<+e zC6NcW3Da1o8b`C9;mVsB7%x#_0Q(LmPN3I@+JCPyFio76V=?;m@Z(O(J?}`@*~1PA z!1qL-b*_cqEU-!_5P1ao5>U-7Py;r!Hjjk(;?jRfv`2yRV!BOD%ER{wM*apJ3=9i{ z76$=X5QWpqi1f05Cls&Rcsa1B;9g=Ov>1sM{5jR&x+RX(t)L@(`)y@LDyH@D zu)0BoHFrF__d2}tCW793C7x@>)AH)rCqmiZzqX*`Y+cByxvzAa(uN~KKLuM7c|G?AR( z7cDcD1Iv_lXqTP449afg{9Lth<)TiIH+&B!<@hg}w>N?DDypEit;2GV3+?E7eY z)jwOQB;_?Dfu?0wp#V~@Nu`=Q+Ub_FuVyuWsm=p0%0Pe~RuwA(w1HS@(OcwAUb_E_ zf3$2pHrdwS1!)U4xz?hXk|J3Y~B7XE8gnHQBR;2eG6CV0HDl>H1) zdL&5}eFbb#M$@-(?gbkWi|&G1$Vm^IY&_TJ^gE>F^KG=g+Gz3K8edyRiS@G41%*g?|q5B4to`>clHQ-OHj||h;=S%nQ zclRJf zp$hN>>g+Zc;o0AX1OsSZpMTFB3Xnn|dbtivJ~RSIhr`h~CWX)3%yCynV66ef%aX>P&gLmH--Di7B?p4>Gp}S%Qsn%P=3id~tOBNwFQUH|Dx? zS5Yq9$Y4_@BiARa$J>4RjETB_BLsQ`6RGrt91zGcg=R> z;OBO+A*bJuxu%fAj>hGjW1^zYV*k_=QjiAtsVd*Q0c+R$y@qqsKDa9#9HwOm^hFeK zN8r4#^I_vBoLHTI-XL>@6>Q|o@h5N*dKjb{NzwZ{Nk4x}Df-rV6x^R!LP9-BL5~(z zIHr6~=&@Npr^I!pvD=w}I>Tc%;;lhB zr^|i0m>iu*+@_gO7X3pBbtftW2wfk9m?R`&+2e1wehvhj1aP7O$10a==sIy2);-gO z8+m6ZF9G0aEgGdD1N`5bz3HgBjB-nTIv8%t2yp)ugG_{)KP|R-%l1w3R8}pUJ z!z7cG8}F4^{;lGz*DQ>`3fkkrB{bWuwVa4+mgeXh<)Rl|gOVMpmr6ZuayYJBAwvhK zpHi2_}O(t{xPK~(g={S5xQ2LC+=ARYbRZ{fdd@K<~P|NI<)%>Lu6JNUWL z)4%O#xNu^ONt*i~{HySxem9EOU-a&QpirPDV)*HBziH($t0)YXj_@TH_!{M${`g0d z`|;AVf&5_9>8SA?C}}Xk9SJb6COZ}KXh~xCZvY{ALDX=SNH!FvWoVjp($S(t2J`ta0T68_~Me@PJq2R;?(6N z)vW?3?RH*zZ_TkD2b0Z)VrAW}c5da|ko{UcIu2fEtlfD~<$RC?LCLF>bQIa_G;Gv) zRV8}R^s=Apy9MNu=Jhvu*JwS6e$jKb)G{tT%ejv^rEZK-_G>z&zJnL@oO#91To&ha zIUTMuen$uX?PTU6nJK`(m2zpX;2g~kCd+g1n`aiydMJg+Aq<)2aia8z)WqbwuL8>v z)WamCi4|jb<4MqW0bjtCo_8edhF>^z+bjs)?67oy>?Yg5$OW<}V*2E&kp;ItVHVu* zxfSwaA|QUA^4xTK^jw90JU^*5*Q6H=tVk=Jc>Itn_NDt)@^$F_61FWN>TW_LL{1F` zZ|wuB3(qN;z+d&v;v;H;VH92YlaJmLBzo5~&W6toE>-jgOWzDPBmpOTw(p zuT5!1l2d0@rt>P5fNdlCJe1kR?~=|{8wF&g7SHm`qKD}glC#{QCh~Wrjv8}rH>GXS z(8NiUGu4e=Y9Cc}S?95a%kWNnzEq;cD)rZ#7XCTJr1I#=rD}6XmCxIv(d(YXguy`K zg-a+8*{76tKiivReyD->d2tQ2S~0a2@Kkh-Eg;2}&^dEQkR{-+L0-8h4xv_aja{OT zAmJ68V;`kq9-bKcotQ}@qwXs#i^(b)-qqPfQfD=HTL>_a>ae=?B4wC6zUoqeiK! z3-o0Jh^9D1kc*f2|P(p#SnmnRWdsZ}P1bFmO!E#*c%z z`1XKd#c%bsH6QeSdC&4lPN4s6+~XrVXtj#_TAkK6RUQrPwMu%3Z#>vi>59`geyB%H zAW$JK@gp3J0Ux;ig!Os4Fc?>fQ%j-R5#hWVhJMjNOmaz*Z-D|lF+5}^+On61&??|A z2QgjwTl==gu3pZyCn{N8<5%uJYY}gSrMYx2@pQe-yDSYSDumE1v`38uxOpOrA zdslZKQLTabBYz@}$VF^!lhDT%KI>#SaaH*55&`)W0q-(UG^h zCTyk}Ou^?XH>jQ@z!inr5d7{9R@Yh?Xw~Qg{xtIDo81YHX*KC!}>0Y?igd+_wGaLZhkAtUZ#ql$;&0=S_NHsejd|iVmQ6q^kVO|19|!bUN|Nc z%0PZH2}X7!fT3NEyvY}v?@nEBb-k4wjRCsWQ>%_^pbWcyJe&;iBJsd$=RVp-zP1LI zj>|?QLPEDMvrr~1>`S;hP@!Vk0TM)PKl(^0(Gj|`jkFUZ6N;kT$v?z54-Zs(4_6Yi z9dha??#a|y&i6JzPGZ=AGx}|c^VJdM{A?A;B+p-l*L75^whg8oO79TlSs}N}2G+4) zOtN3*yjdN&Uk7lXE+zyLy23+oME0mj{ZXj0Wbs~L#wP3%h^m|0zLfT$*5x-IVDd3! zz9^RFyVXYvw-bmi=EAX;cq5Tc^+DSpb|Y0w^kc{ps1}r0RmuCniIL#6ZL(e`Q&DJV zt})TWl1_rbC{=+Q63gC7O)e(oEx{SVj2LQikwDQbV=be=`b-~ZuEhnXwO}I_1`Hdo z?-u=-Mz`-!*Wp`bfeNdLJjgzeF7ffxKV9h7pGea|8g6 zROH%W?#T^RiKu6q4uld%3O6cs8!omK(#+%`(qgJM{&H+AKw_03q1||6CaNM1wCI-Z z_3EYvmPYC;d+I|HmGAc;Z^-l=NFn7fh(Ju2DMP|>bwU_jl!RCayoM!HGm2Hp^0U4RxwV(^crbF(v9no6x`CJO2J2#XzuDMs;OM*XaBBa<1eQ7--80q1{o|PI4 zfQEjM2-H>p3}Fk-P361$?mDU0^5Bc1!R6Xs2|wCwD`!MkN5v4G1pB}j86DfQou4n@ z3)PyioW><_^S!X~y}lctj?S5qu_f75Sf-V)haeMGMM1z9>5m16z*zo)tzK0?cB1|W zSNYP@73H_tP6@p=TXqnl-4iU9ii(a!GWrD@2`o2^4g*%rUJSvrfi2K&tS5-cFDMG= zq#thKpDcba`W!hq?KjIE+|>5jCtdj$Ja;jt7szBeNt`wg{GAk-j^)YR>4eJT=eenj zDj|D6d5e##HBg+Q|O5UIOUiHuk?*EoUydn0Z8o1tw=EJ=uvZ_&Zwv| z6M^6I>xdYB#I_k-2(|EX+so*3D+MfUwH>Sbj1N5GcVy3Qd`icA0pz;A#wRXqD7HYP ziI82%*&pG7wURy*9??ek_s+&dYhi2(Tn5J7NHpjLbvguaN#%eaU`Os}L9mN;2AK2o zS)m*&uH;JuQGW{aV`po)>$vRtbIF(1myPEV`cT4Uk?+JB$Mzo08RRR>!RZYQ4%tfZ zk4r8K@mk84cMl;O%5@;6iaSGF>y!0o>hx-Fj1fSf?_du$zn))%qcyJg7_Y84B}xov z-{;E7P0rlMvg*O1_q}6aSNumzwkiBZ!~)kq$@d4b4#?+XflLU<-*b^Gh@qB!@)b0e zq7Vw0cm}sq?Nf}Xk~A8h=9PZi0~327+(5LZ0u=h^iJR5GP6cFa@^gesREsdidRcIs zKRzLxsN*?&hRYWWFvp=Vs?x0mUU#nooFWN$-#3ZvD0-7#CqlC1nK zE8FyM$ukv5(Mn@}F+wSoW-vQA-r;|>S)N0Dit7a0lPNkE!qd7k?4OO?Fm8canwW)jwJ96?3QVIEb*Rg^mWo)*pwGpBQ zeD%L#5{TKbPP|-epUmIPihA73ft&4u5K7XzTgpH)Rf&Of?bBm9J0R2wOv5`*SDyA% z@zU0ij|cwTz10rJqz@}W!QKC8D!rGO=fO#NorA`C9|F4HZc$Ia74mR@yFqmJezdA+ z9^8pw5)duNtCc@1|G=!%HkJB>WSts>THO^?yzY%9bB+V3^iu4=RU>3vh9AnQELNJA zs|?m4+BGh@?{g&8SGGwQugO>sto0!VdRbYUdt8usUu#Qz?`Dk_Z%S{*snlB;V(lq; z-V^@erBfCoInhLSulUll6ZdA=Jjz{{O(6=M9<#F`^k6jHAVM>9>gxSAK`v>3(09xi z^q}Vl-@ow=>2~XZhV0Y%TPrB5nD6h-#wlbnPi6>>IutX%o-5KYdHkk2Sk{YanVzx$ z+W8e2UOy9194tFPQF%WrlS-%g5e%OH6p37-^blhW&xj-}182FY+_x31qx`@Xhvg$u z!*U(V468KF z4g%UBk~RoxPuZjhzVzi`GmHl=2B8HJvuwU!rZSyW(eF z>KSd#mOz50&CNE7Y!BVxRrKq&p$yFM*ATWPwDVcCQV6;`3f0qupz@u5^YsR>GLEj# zd+^0Z@B7XT<{R))>FlDJO>0wB>rrA>lbcgRXEe(7$jeQoF=#gD!jo`4X*Qvo&S|Iw zmP50*55)*D z4*n*A*zW72Bz&(I(ok70^8vTQb3I)Og_~Q>5vjZmqtk^Q$6pBK={X{lpj5X3Z-tp6 z@M4dAi3K`9tvl*}PomU=PG!-+}4%Fr@fyejwlMvK+@<85U=(D;~ zi8#V(5utmQU+cPrx6})^Y|G8dB#?S;j3-~Fs-$eah{vxrD;7Kmt7ZR%z4JiTxGE+5 zLXA*NRGHM6Ku!qo1-#RfT|`lv?3gR58`hF{eUZr(6zHD#UK9??K_-})1tD{3{X=9U zUmW9C2YDR0oSd}y(}Wny%WuV$59{xI*!W>>{6F&j1o1q5lcNuipf}CCxr0~OSa`WU z=?Q3}1sSQ_%;G=1K23V3PM(RXPyZ=FGa9I)#E&Dy*+i6dG(l6&AvjLD*=!Cup_Fbz zQO%<*0~BnM+k6I@Rxij`Uy6 zMdOngrkZ3uAkDIS>Ka${d0hzRmN`P4#v!G($b~eJ(4xxj$N2$`UL?6~EMMoUBFWB! zaCl7Nw$twg^My;*+l2Z$;N}6^1e&c#JcU*}Nkbg+^~&6?)|!zn-PNM5N9p!bGsh)F zW52AmZz=fS7}n*efw22IISj)asicave&PnlX@=-U#DCG48b_LWL1W z1YVmEc@}!iZU)V8juW|D_lTrJ?QXm>?1;W989Gp62#Kh*lf%|R8IR8I?Xv(QsM%^6 zi`vRXHVM#IdoVpVr4!bPD_ih7nt@xp1iY=OBou3Iv^TDexSTUnI1$ij@452TT2(I^ zfi`$VWt7b40M42}HsCRh0X4nrGkg<)ki0dSWdePeNrY>j<-xgoj))Egj_l^zL)XCf zP-{Jg&*@uV8=%UaeoeKR_%u{xgz3N+8J_MY+JD9rJsMFl;A_Gvcgs$KtkOLbR{ePF zWfxVe3W`>V&>!v1hhgEawcNuR;5-cr^<<5hEM&z#n54nRVr%@<8U zKjEs9@N9x~(QBawp^f4*5UTH(Zc5P$siB#eMg|m$Z_8Ivc6$MdrS2xZ76r@32^j<( z{2%N^){}iPbTe0P2GFwS0#Vr5X8nZLJxPcb?mp>=JYcqCx>?~|s-{LRP4Hzce)OTQ z@yZMvA5SLVAT$xiol2Phwljty0&1xcx zZBL49NB5I3;gw=S+Coxf<_1Q%%fzP$Xn1w2Y-i6lXDf$iYjVJ86pQE$!&UmGzHwX* zDpl)G|D?xN8@W>2DP@W)t$SsHQK>JtB{q%oD827r77OGn{$?rPjHM()sXUDI%Y@^5 zwt_NsdEGUIsDHM02j%*Pc>v4MSbmpE1=fEb`!& zuS*1*Sb7YIQodxM2vokRuB?IfYqDCW^Vh8F?>HNiSP$sY=MqglmvpYV3bD!SqH~ z7XgV6@7Xp>p#Rv$?gsTYOYdZB{6<2R8LT;F@w04w4Jwz4r)t-^E=8LXLRM*pP+F}s zD~_!B4ys93Q0(K&@oF(`As!#e0WuGlPWf!BVkXj@hg#-!LVbS+a-**R$JmFu3F1df z*~W&pa+DJTz<7`*b?WB}&Tux3!ChGfACx!-T{;)DZbz?}gV-0|TtxAHZ~cGqabZI$))O>wj z2QXr5lWH#~Zz7;qJL}wR+~rO8`}41G#a4Mx!P|SI*H}$>xOK{>a`_28tmafS_FR58 zSr>}{y~q}lmZn_KmTm^le#sl+D6QBxm1zgY-msjDJ==vxs5J!AM5Xf-d4!giqAQXvv@}sS$_CiJv~l?F zoSX@-hjc`IyGNl#3>9Hxp6|2M8Ik;C8lKQkSgDER;i3i)S=tubI_gsMC;1BmmA{F@4d8*lWl@F`_ zS)60y3u3?1x#u^C-RkDJdS^VlnC7UPr2sRJ(J8maw{2jrq zoZ^>T$H2NP>x{YgxEwl&27~u|3{A=VZ>oNC@|doT#f3MLu$nW79JzRMFA|1z^QD^= z?@F~xD;`q+3hUe2aDUArN0%(?V_HXvGhF;Y)-I#c7}PyGs9a+%Go}w%tb7a49@(}% zg4VXgON`f9cUXmL#)?%*P2=M#zdWVCwPL!)%C=zA@gT=H`VWRGUHS- zx3KC*Rz^?yYDNB>{1(JXDP^ECkCefR30T?z*S2lRusw_L3t-KK8!wZo=VJXQ^mM!; z*R{0VOIs?4Jhfybr(8y7qOAw8sv|&c*!u@``KLPG&>!vBpaw$3NJ##Kk-&}+wL?IK zLUUR%!lfXMIp4MEa=|jjrmibb9GwQF?2pMoSpXU4AP5WRHXua5=qOHTfRm=9p z@q1m)TvTsHabe}iHL}7qnOdBsV?zB$$YA0A3a51EBZ?0;%71_sZGajPhfD$Aa?Aky zMu{01Vd3s@Kwq`xJ*`sSg<1{AUbpa4@EcJcr&nsTOVkCpE&TMn)I%qwxOv~V-X48XoDSa&lu0(v3N zV6&CjJ%nHda97)08gFhJ&iT6wfE}{6kUtBW>D}A6e5nyO&!D>ddMaI75KHoU&_6Lk z>&#hiskf<=`P_>F+e8%~tgS{OPeN$t+YQa|{4KIBm3q@vjEt8ABLIt68;b6S=tg+j z{6;N_52dg*OBj1-pE;)#nd-FGo535)zqR#hz%%KAbm8U7@6BJsl2v)ZlcC~1WgW{1 zlvDznZ8afD1JS3vK4kSL@JqyL)qz8~b|HVy#lN~~2vT>j#}8jBD7e(;)q*6n-8qZTZ7XGF$;n>g>5^2A3=icD*G;$ zLWzS^tn;D}_etv0DI;ddoEo@}CL4TA!gkbP8T%JW%1gfg(Hxd$G^+ILUS8b!TwP_} z6|Wi}FAE08=Qzj7FYl)do?`2z{{(ZD4q#vaGNxDmE50}88K;Bu+GzVENc9{Z4_e<( z-VEhA)q~o6MTy(Zz*E}UTqPnYVz2y0u=)6Qfz8mm270i{lvdzL;Hg{lt-7@{HVMfDP?=|e6?Vty+$8bug}2TEe<2ZIb(_{7PG zh#>`Bh(3I>MH~MCZu57o8tVI7gLCegh(&J&c2K@FbtBM-UM1_guXDG2+%4@K z%_;*eVfny)k+wn`N|xqCtM)5#{~u-?T_86Ir&=KYxd=ARmh3w*f(L)x$NAUBh&t?y`596&%) Date: Mon, 22 Oct 2018 14:27:59 +0100 Subject: [PATCH 12/25] Added pre-requisite regarding management by Intune Agents --- ...nroll-a-windows-10-device-automatically-using-group-policy.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md b/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md index 010ca41cad..a252c8664d 100644 --- a/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md +++ b/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md @@ -17,6 +17,7 @@ Requirements: - AD-joined PC running Windows 10, version 1709 - Enterprise has MDM service already configured - Enterprise AD must be registered with Azure AD +- Device should not already be enrolled in Intune using the classic agents (devices manged using agents will fail enrollment with error 0x80180026) > [!Tip] > [How to configure automatic registration of Windows domain-joined devices with Azure Active Directory](https://docs.microsoft.com/en-us/azure/active-directory/active-directory-conditional-access-automatic-device-registration-setup) From d9f50f3869a0c9ded315ebcbb4ab3ce726849ff5 Mon Sep 17 00:00:00 2001 From: Patti Short <35278231+shortpatti@users.noreply.github.com> Date: Mon, 22 Oct 2018 06:32:17 -0700 Subject: [PATCH 13/25] Update ieak-information-and-downloads.md --- .../ie11-ieak/ieak-information-and-downloads.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/browsers/internet-explorer/ie11-ieak/ieak-information-and-downloads.md b/browsers/internet-explorer/ie11-ieak/ieak-information-and-downloads.md index e6c5587108..73897c178a 100644 --- a/browsers/internet-explorer/ie11-ieak/ieak-information-and-downloads.md +++ b/browsers/internet-explorer/ie11-ieak/ieak-information-and-downloads.md @@ -2,10 +2,10 @@ ms.localizationpriority: medium ms.mktglfcycl: support ms.pagetype: security -description: The Internet Explorer Administration Kit (IEAK) simplifies the creation, deployment, and management of customized Internet Explorer packages. You can use the IEAK to configure the out-of-box Internet Explorer experience or to manage user settings after Internet Explorer deployment. +description: The Internet Explorer Administration Kit (IEAK) simplifies the creation, deployment, and management of customized Internet Explorer packages. Use the IEAK to configure the out-of-box Internet Explorer experience or to manage user settings after Internet Explorer deployment. author: shortpatti ms.author: pashort -ms.manager: elizapo +ms.manager: dougkim ms.prod: ie11 ms.assetid: title: Internet Explorer Administration Kit (IEAK) information and downloads From 0f06db30c0e893fcf2d1780f8bc7a986a31e4f09 Mon Sep 17 00:00:00 2001 From: Patti Short <35278231+shortpatti@users.noreply.github.com> Date: Mon, 22 Oct 2018 06:35:06 -0700 Subject: [PATCH 14/25] Update ieak-information-and-downloads.md --- .../ie11-ieak/ieak-information-and-downloads.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/browsers/internet-explorer/ie11-ieak/ieak-information-and-downloads.md b/browsers/internet-explorer/ie11-ieak/ieak-information-and-downloads.md index 73897c178a..0e0ea99ea5 100644 --- a/browsers/internet-explorer/ie11-ieak/ieak-information-and-downloads.md +++ b/browsers/internet-explorer/ie11-ieak/ieak-information-and-downloads.md @@ -15,8 +15,11 @@ ms.date: 05/10/2018 # Internet Explorer Administration Kit (IEAK) information and downloads +>Applies to: Windows 10 + The Internet Explorer Administration Kit (IEAK) simplifies the creation, deployment, and management of customized Internet Explorer packages. You can use the IEAK to configure the out-of-box Internet Explorer experience or to manage user settings after Internet Explorer deployment. To find more information on the IEAK, see [What IEAK can do for you](what-ieak-can-do-for-you.md). + ## Internet Explorer Administration Kit 11 (IEAK 11) [IEAK 11 documentation](index.md) From 192ad2d102868d4d7e701fa0d6410cc105b158cb Mon Sep 17 00:00:00 2001 From: Patti Short <35278231+shortpatti@users.noreply.github.com> Date: Mon, 22 Oct 2018 07:50:04 -0700 Subject: [PATCH 15/25] Update planning-for-mbam-25-groups-and-accounts.md --- mdop/mbam-v25/planning-for-mbam-25-groups-and-accounts.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/mdop/mbam-v25/planning-for-mbam-25-groups-and-accounts.md b/mdop/mbam-v25/planning-for-mbam-25-groups-and-accounts.md index 541ece0a38..e03e834e82 100644 --- a/mdop/mbam-v25/planning-for-mbam-25-groups-and-accounts.md +++ b/mdop/mbam-v25/planning-for-mbam-25-groups-and-accounts.md @@ -88,7 +88,7 @@ Create the following accounts for the Reports feature.

Reports read-only domain access group

Group

Reporting role domain group

-

Name of the domain group whose members have read-only access to the reports in the Administration and Monitoring Website.

+

Specifies the domain user group that has read-only access to the reports in the Administration and Monitoring Website. The group you specify must be the same group you specified for the Reports Read Only Access Group parameter when the web apps are enabled.

Compliance and Audit Database domain user account

From 4952043797241d857df9ab1789a7ba34c51fadd9 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 22 Oct 2018 09:11:17 -0700 Subject: [PATCH 16/25] add incidents --- windows/security/threat-protection/TOC.md | 5 +- .../windows-defender-atp/TOC.md | 4 + .../windows-defender-atp/incidents-queue.md | 35 +++++++++ ...ows-defender-advanced-threat-protection.md | 78 +++++++++++++++++++ ...ows-defender-advanced-threat-protection.md | 61 +++++++++++++++ .../view-incidents-queue.md | 74 ++++++++++++++++++ 6 files changed, 256 insertions(+), 1 deletion(-) create mode 100644 windows/security/threat-protection/windows-defender-atp/incidents-queue.md create mode 100644 windows/security/threat-protection/windows-defender-atp/investigate-incidents-windows-defender-advanced-threat-protection.md create mode 100644 windows/security/threat-protection/windows-defender-atp/manage-incidents-windows-defender-advanced-threat-protection.md create mode 100644 windows/security/threat-protection/windows-defender-atp/view-incidents-queue.md diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index 76837097e0..de283f400d 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -17,7 +17,10 @@ #### [Endpoint detection and response](windows-defender-atp/overview-endpoint-detection-response.md) ##### [Security operations dashboard](windows-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection.md) - +##### [Incidents queue](windows-defender-atp/incidents-queue.md) +###### [View and organize the Incidents queue](windows-defender-atp/view-incidents-queue.md) +###### [Manage incidents](windows-defender-atp/manage-incidents-windows-defender-advanced-threat-protection.md) +###### [Investigate incidents](windows-defender-atp/investigate-incidents-windows-defender-advanced-threat-protection.md) ##### Alerts queue diff --git a/windows/security/threat-protection/windows-defender-atp/TOC.md b/windows/security/threat-protection/windows-defender-atp/TOC.md index ee621938a2..643c99ddb2 100644 --- a/windows/security/threat-protection/windows-defender-atp/TOC.md +++ b/windows/security/threat-protection/windows-defender-atp/TOC.md @@ -17,6 +17,10 @@ +#### [Incidents queue](incidents-queue.md) +##### [View and organize the Incidents queue](view-incidents-queue.md) +##### [Manage incidents](manage-incidents-windows-defender-advanced-threat-protection.md) +##### [Investigate incidents](investigate-incidents-windows-defender-advanced-threat-protection.md) #### Alerts queue diff --git a/windows/security/threat-protection/windows-defender-atp/incidents-queue.md b/windows/security/threat-protection/windows-defender-atp/incidents-queue.md new file mode 100644 index 0000000000..783f74ac70 --- /dev/null +++ b/windows/security/threat-protection/windows-defender-atp/incidents-queue.md @@ -0,0 +1,35 @@ +--- +title: Incidents queue in Windows Defender ATP +description: +keywords: incidents, aggregate, investigations, queue, ttp +search.product: eADQiWindows 10XVcnh +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +ms.author: macapara +author: mjcaparas +ms.localizationpriority: medium +ms.date: 10/08/2018 +--- + +# Incidents queue in Windows Defender ATP +**Applies to:** +- Windows Defender Advanced Threat Protection (Windows Defender ATP) + +[!include[Prerelease information](prerelease.md)] + +When a cybersecurity threat is emerging, or a potential attacker is deploying its tactics, techniques/tools, and procedures (TTPs) on the network, Windows Defender ATP will quickly trigger alerts and launch matching automatic investigations. + +Windows Defender ATP applies correlation analytics and aggregates all related alerts and investigations into an incident. Doing so helps narrate a broader story of an attack, thus providing you with the right visuals (upgraded incident graph) and data representations to understand and deal with complex cross-entity threats to your organization's network. + + +## In this section + +Topic | Description +:---|:--- +[View and organize the Incidents queue](view-incidents-queue.md)| See the list of incidents and learn how to apply filters to limit the list and get a more focused view. +[Manage incidents](manage-incidents-windows-defender-advanced-threat-protection.md) | Learn how to manage incidents by assigning it, updating its status, or setting its classification and other actions. +[Investigate incidents](investigate-incidents-windows-defender-advanced-threat-protection.md)| See associated alerts, manage the incident, see alert metadata, and visualizations to help you investigate an incident. + + diff --git a/windows/security/threat-protection/windows-defender-atp/investigate-incidents-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/investigate-incidents-windows-defender-advanced-threat-protection.md new file mode 100644 index 0000000000..596bd63508 --- /dev/null +++ b/windows/security/threat-protection/windows-defender-atp/investigate-incidents-windows-defender-advanced-threat-protection.md @@ -0,0 +1,78 @@ +--- +title: Investigate incidents in Windows Defender ATP +description: See associated alerts, manage the incident, and see alert metadata to help you investigate an incident +keywords: investigate, incident, alerts, metadata, risk, detection source, affected machines, patterns, correlation +search.product: eADQiWindows 10XVcnh +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +ms.author: macapara +author: mjcaparas +ms.localizationpriority: medium +ms.date: 10/08/2018 +--- + +# Investigate incidents in Windows Defender ATP + +**Applies to:** +- Windows Defender Advanced Threat Protection (Windows Defender ATP) + +[!include[Prerelease information](prerelease.md)] + +Investigate incidents that affect your network, understand what they mean, and collate evidence to resolve them. + +## Analyze incident details +Click an incident to see the **Incident pane**. Select **Open incident page** to see the incident details and related information (alerts, machines, investigations, evidence, graph). + +![Image of incident details](images/atp-incident-details.png) + +### Alerts +You can investigate the alerts and see how they were linked together in an incident. +Alerts are grouped into incidents based on the following reasons: +- Automated investigation - The automated investigation triggered the linked alert while investigating the original alert +- File characteristics - The files associated with the alert have similar characteristics +- Manual association - A user manually linked the alerts +- Proximate time - The alerts were triggered on the same machine within a certain timeframe +- Same file - The files associated with the alert are exactly the same + +![Image of alerts tab in incident page showing the Linked by tool tip](images/atp-incidents-alerts-tooltip.png) + +![Image of alerts tab with incident details page showing the reasons the alerts were linked together in that incident](images/atp-incidents-alerts-reason.png) + +You can also manage an alert and see alert metadata along with other information. For more information, see [Investigate alerts](investigate-alerts-windows-defender-advanced-threat-protection.md). + +### Machines +You can also investigate the machines that are part of, or related to, a given incident. For more information, see [Investigate machines](investigate-machines-windows-defender-advanced-threat-protection.md). + +![Image of machines tab in incident details page](images/atp-incident-machine-tab.png) + +### Investigations +Select **Investigations** to see all the automatic investigations launched by the system in response to the incident alerts. + +![Image of investigations tab in incident details page](images/atp-incident-investigations-tab.png) + +## Going through the evidence +Windows Defender Advanced Threat Protection automatically investigates all the incidents' supported events and suspicious entities in the alerts, providing you with auto-response and information about the important files, processes, services, and more. This helps quickly detect and block potential threats in the incident. +Each of the analyzed entities will be marked as infected, remediated, or suspicious. + +![Image of evidence tab in incident details page](images/atp-incident-evidence-tab.png) + +## Visualizing associated cybersecurity threats +Windows Defender Advanced Threat Protection aggregates the threat information into an incident so you can see the patterns and correlations coming in from various data points. You can view such correlation through the incident graph. + +### Incident graph +The **Graph** tells the story of the cybersecurity attack. For example, it shows you what was the entry point, which indicator of compromise or activity was observed on which machine. etc. + +![Image of the incident graph](images/atp-incident-graph-tab.png) + +You can click the circles on the incident graph to view the details of the malicious files, associated file detections, how many instances has there been worldwide, whether it’s been observed in your organization, if so, how many instances. + +![Image of indcident details](images/atp-incident-graph-details.png) + +## Related topics +- [Incidents queue](incidents-queue.md) +- [View and organize the Incidents queue](view-incidents-queue.md) +- [Manage incidents](manage-incidents-windows-defender-advanced-threat-protection.md) + + diff --git a/windows/security/threat-protection/windows-defender-atp/manage-incidents-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/manage-incidents-windows-defender-advanced-threat-protection.md new file mode 100644 index 0000000000..2df623ec62 --- /dev/null +++ b/windows/security/threat-protection/windows-defender-atp/manage-incidents-windows-defender-advanced-threat-protection.md @@ -0,0 +1,61 @@ +--- +title: Manage Windows Defender ATP incidents +description: Manage incidents by assigning it, updating its status, or setting its classification. +keywords: incidents, manage, assign, status, classification, true alert, false alert +search.product: eADQiWindows 10XVcnh +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +ms.author: macapara +author: mjcaparas +ms.localizationpriority: medium +ms.date: 010/08/2018 +--- + +# Manage Windows Defender ATP incidents + +**Applies to:** +- Windows Defender Advanced Threat Protection (Windows Defender ATP) + +[!include[Prerelease information](prerelease.md)] + + +Managing incidents is an important part of every cybersecurity operation. You can manage incidents by selecting an incident from the **Incidents queue** or the **Incidents management pane**. You can assign incidents to yourself, change the status, classify, rename, or comment on them to keep track of their progress. + +![Image of the incidents management pane](images/atp-incidents-mgt-pane.png) + +Selecting an incident from the **Incidents queue** brings up the **Incident management pane** where you can open the incident page for details. + +![Image of incident detail page](images/atp-incident-details-page.png) + + +## Assign incidents +If an incident has not been assigned yet, you can select **Assign to me** to assign the incident to yourself. Doing so assumes ownership of not just the incident, but also all the alerts associated with it. + +## Change the incident status +You can categorize incidents (as **Active**, or **Resolved**) by changing their status as your investigation progresses. This helps you organize and manage how your team can respond to incidents. + +For example, your SoC analyst can review the urgent **Active** incidents for the day, and decide to assign them to himself for investigation. + +Alternatively, your SoC analyst might set the incident as **Resolved** if the incident has been remediated. + +## Classify the incident +You can choose not to set a classification, or decide to specify whether an incident is true or false. Doing so helps the team see patterns and learn from them. + +## Rename incident +By default, incidents are assigned with numbers. You can rename the incident if your organization uses a naming convention for easier cybersecurity threat identification. + +![Image of incident renaming](images/atp-rename-incident.png) + +## Add comments and view the history of an incident +You can add comments and view historical events about an incident to see previous changes made to it. + +Whenever a change or comment is made to an alert, it is recorded in the Comments and history section. + +Added comments instantly appear on the pane. + +## Related topics +- [Incidents queue](incidents-queue.md) +- [View and organize the Incidents queue](view-incidents-queue.md) +- [Investigate incidents](investigate-incidents-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/windows-defender-atp/view-incidents-queue.md b/windows/security/threat-protection/windows-defender-atp/view-incidents-queue.md new file mode 100644 index 0000000000..823c7f396e --- /dev/null +++ b/windows/security/threat-protection/windows-defender-atp/view-incidents-queue.md @@ -0,0 +1,74 @@ +--- +title: View and organize the Incidents queue +description: See the list of incidents and learn how to apply filters to limit the list and get a more focused view. +keywords: view, organize, incidents, aggregate, investigations, queue, ttp +search.product: eADQiWindows 10XVcnh +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +ms.author: macapara +author: mjcaparas +ms.localizationpriority: medium +ms.date: 10/08/2018 +--- + +# View and organize the Windows Defender Advanced Threat Protection Incidents queue +**Applies to:** +- Windows Defender Advanced Threat Protection (Windows Defender ATP) + +[!include[Prerelease information](prerelease.md)] + +The **Incidents queue** shows a collection of incidents that were flagged from machines in your network. It helps you sort through incidents to prioritize and create an informed cybersecurity response decision. + +By default, the queue displays incidents seen in the last 30 days, with the most recent incident showing at the top of the list, helping you see the most recent incidents first. + +There are several options you can choose from to customize the Incidents queue view. + +On the top navigation you can: +- Customize columns to add or remove columns +- Modify the number of items to view per page +- Select the items to show per page +- Batch-select the incidents to assign +- Navigate between pages +- Apply filters + +![Image of incidents queue](images/atp-incident-queue.png) + +## Sort and filter the incidents queue +You can apply the following filters to limit the list of incidents and get a more focused view. + +Incident severity | Description +:---|:--- +High
(Red) | Threats often associated with advanced persistent threats (APT). These incidents indicate a high risk due to the severity of damage they can inflict on machines. +Medium
(Orange) | Threats rarely observed in the organization, such as anomalous registry change, execution of suspicious files, and observed behaviors typical of attack stages. +Low
(Yellow) | Threats associated with prevalent malware and hack-tools that do not necessarily indicate an advanced threat targeting the organization. +Informational
(Grey) | Informational incidents are those that might not be considered harmful to the network but might be good to keep track of. + +### Category +Incidents are categorized based on the description of the stage by which the cybersecurity kill chain is in. This view helps the threat analyst to determine priority, urgency, and corresponding response strategy to deploy based on context. + +### Alerts +Indicates the number of alerts associated with or part of the incidents. + + +### Machines +You can limit to show only the machines at risk which are associated with incidents. + +### Users +You can limit to show only the users of the machines at risk which are associated with incidents. + +### Assigned to +You can choose to show between unassigned incidents or those which are assigned to you. + +### Status +You can choose to limit the list of incidents shown based on their status to see which ones are active or resolved + +### Classification +Use this filter to choose between focusing on incidents flagged as true or false incidents. + +## Related topics +- [Incidents queue](incidents-queue.md) +- [Manage incidents](manage-incidents-windows-defender-advanced-threat-protection.md) +- [Investigate incidents](investigate-incidents-windows-defender-advanced-threat-protection.md) + From ffa7e932d72515795fce5ef2c151f6e56c5c040f Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 22 Oct 2018 09:11:57 -0700 Subject: [PATCH 17/25] preview topic --- .../preview-windows-defender-advanced-threat-protection.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md index 007a810594..53f9b9de62 100644 --- a/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md @@ -41,6 +41,9 @@ The following features are included in the preview release: - [Threat analytics](threat-analytics.md)
Threat Analytics is a set of interactive reports published by the Windows Defender ATP research team as soon as emerging threats and outbreaks are identified. The reports help security operations teams assess impact on their environment and provides recommended actions to contain, increase organizational resilience, and prevent specific threats. +- [Incidents](incidents-queue.md)
+Windows Defender ATP applies correlation analytics and aggregates all related alerts and investigations into an incident. Doing so helps narrate a broader story of an attack, thus providing you with the right visuals (upgraded incident graph) and data representations to understand and deal with complex cross-entity threats to your organization's network. + - [Custom detection](overview-custom-detections.md)
With custom detections, you can create custom queries to monitor events for any kind of behavior such as suspicious or emerging threats. This can be done by leveraging the power of Advanced hunting through the creation of custom detection rules. From da526381cd6ad132b9d553a04d88fb54e9a28883 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Mon, 22 Oct 2018 10:52:04 -0700 Subject: [PATCH 18/25] edited brackets --- .../auditing/how-to-list-xml-elements-in-eventdata.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/auditing/how-to-list-xml-elements-in-eventdata.md b/windows/security/threat-protection/auditing/how-to-list-xml-elements-in-eventdata.md index dac39f14cd..e928396835 100644 --- a/windows/security/threat-protection/auditing/how-to-list-xml-elements-in-eventdata.md +++ b/windows/security/threat-protection/auditing/how-to-list-xml-elements-in-eventdata.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: tedhardyMSFT -ms.date: 10/18/2018 +ms.date: 10/22/2018 --- # How to get a list of XML data name elements in EventData @@ -85,9 +85,9 @@ PS C:\WINDOWS\system32> $SecEvents.events[100].Template ## Mapping data name elements to the names in an event description -You can use the