From 203a801c3b59c9958882836138a006881903df30 Mon Sep 17 00:00:00 2001 From: Toon Dillen Date: Sun, 26 Apr 2020 15:50:54 +0200 Subject: [PATCH 001/161] Typo correction --- .../microsoft-defender-atp/onboarding-notification.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/onboarding-notification.md b/windows/security/threat-protection/microsoft-defender-atp/onboarding-notification.md index e403692a49..98d03e3cb6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/onboarding-notification.md +++ b/windows/security/threat-protection/microsoft-defender-atp/onboarding-notification.md @@ -22,7 +22,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -Create a notification rule so that when a local onboarding or offboardiing script is used, you'll be notified. +Create a notification rule so that when a local onboarding or offboarding script is used, you'll be notified. ## Before you begin You'll need to have access to: From 72aae74d2664d95305bdb3f90fb02d1196ea986b Mon Sep 17 00:00:00 2001 From: meziantou Date: Wed, 9 Dec 2020 20:26:28 -0500 Subject: [PATCH 002/161] Add background color --- .../images/2-dynamic-working.png | Bin 18568 -> 16572 bytes .../images/3-memory-sharing.png | Bin 20533 -> 19992 bytes .../images/4-integrated-kernal.png | Bin 50049 -> 54361 bytes .../images/5-wddm-gpu-virtualization.png | Bin 26778 -> 27840 bytes 4 files changed, 0 insertions(+), 0 deletions(-) diff --git a/windows/security/threat-protection/windows-sandbox/images/2-dynamic-working.png b/windows/security/threat-protection/windows-sandbox/images/2-dynamic-working.png index 8f94ffe3967133baa4ef0d2ac9358b7dc715f821..fd26c617e26ecc470ddddfb8434dd37af03016ca 100644 GIT binary patch literal 16572 zcmeIac{r4P`#*lQN`*>M*-{gwBubJ{Ng0KrA#00}G^QxBjHxK4L?hY4-6FTKWt+)5 z?UJpmF_?-*)`>C3tk?H_&8VLHd48YIKfiyz$MJps=s0q@uJe5^uk&>-?~ZOBvfeK< zf8~4#f@IJZdu<^|iV8t9pUs;Ep0vL^Z~%g4L5B_=F$X_F5C(!s5ClUg2tr{X6bVAX z5E_Ee7zj;*&@hCBAS?#Lk{~P$5g~|(fruoC2t#BDB4Z#j2_nM~4T5MGh(>~FFpvbn z7zidoFpP+VFer$Gf?yO1LZL7y6bXfbQD_K-#-Pw76dFchAruya!je!}7)69oL=1{Z zLJ?sU8A6dUC^88}hEX&KMZ=(IBoqw>+M!?!3MQdo7*P|#pdk_(g3%}ljl!T&Bs2;} zqaidJgGQ6kXc&!!&{zx_OG0B|G!a4*F=!$QO@z^82u;SI$s{xxM$;fP4TGkU&@>oW zjD|62n1qI5#B>OQg-BQk#-boB3WG(FuqYUdhOlT17EQvUVJsHHVlh}O35$iXLAyU5NRYL z4F-`R!WbejD^WW zh)l$gi6k-+CX*pD8AB$M$YhvIgUB=tnMNYhU=VFGj3L7$G7KYOhcGmVM1x=&3ZkJf zG!%)3f@x@ohQ`p)BpMo~VIdk8L&K72SeQnHXhaN+NTLy88X2OIF*GuXMuurLh(^QE zXe1g91_+|T7#d8X!7u_P2m?bTfGPkc7=?jRB!B=Aco>a=(IgNp5F{9jfw3guS>RBZ zh=GYD;00hjOvb=u63`eZ3ezw!jRd3vp)ibrVG{V;V2bZ1kO9)?EFAqINO1}BXNFgL z6UZ1y>H^xzT&i#3{22rq->(x`DaS*!I+53Iugtt(mcUk7(`x^`F~WJ&DVsr;6l;Dy&^#+L(LTD9(NTA$|Ecz~-}R>bGMncoW_)B&$uib^(iPaaGY|%A%V-E2(2qp>9@U5j+14Ue`6yRcZz^Hy{#}KKgL>Z6A0_>W^!V(%_$8;uZ|vQ`{=wuBYzN6oDQ4UA z08yA=f}yawk2&(GC2Iv69X-|&H&WN2d`T{ytQ^K=NbwtS`scj-8z~0Ic%v!IVp7Lb z=S8LjolfqU!1ZVByxNytpDVpYdFO7Mf1oo%ou1x~_uvtZK6M(_avv55`7f#?J)X@- zUqvug>Rd~}aq<~%wf#6MYiMhBr-nu&ofz3IXP>4{pzaq6gbk5?AYO(>f%>M7Uh`73vOVhOtfnx|Nlm>Gn?})A8%t})N1YY9l?40CPF)I~TyaZQ)98zb$XZpG^6b*Oj+cxO z(aw|Xj0YI%{S|uM@&mpuTkA)Umu-nwi=Opid)08a+ec-7&_4ONw9Hs)_Q?^^I~nWx zWM!XsX1!lWu8fs^Fj^xMJ&?~mp-!OJ?2Bl=I$}0NB@~u^KU+3_>1_9~RUQ{lPV(Dk z^rp)cy}-K0=#;@F+UUe7Ic7BanxL}ApV3P-9VXWYpDWT`WAjw!Sbeo#%0}EBZpDR= zeT~tT@q9DqHtii--&e=nkUOcO7_C&%5gPnMsH&r_G&ZBcc(a>BkQZv7L0GNa0xsWr z)9Rg*$%{i5d~+sjD-evm7Vh8hu!~ISJnJQY^!DcT>k&^>N@X^w1{a^C+4~$+&EM{b zH+)m3v@dhmzDFTO8}{UE9;x-C<^+WDDq0ovjIf!8jp>0Y&qE^x4Ie}q>kTQYVOh(Q zW_SzkqZc%F)1E9=Q<+yJHAh>l$FOqU&~k5Cph$yvEo+R%s2(x#c`m=<_}U^bspxfM zw?`%e?l*?AZ@Qz3t=n@XrIp(wDPx=ua!+-!(VMSDXsW6xJ38T|C0*bnbdE zjCSOG9yMvHr7OXCYG`5Z+rkssW*)6SJcbBr#v>-~_~j3BD2~3ka(y|EqJI!<3$32lq~*mFnsdP8vXr^3F33rFA6H&{ET$?2qzvvA{0a^#6s zK103)J!{MH%C4$y9BXfjXFck8uOX}9ryA}j_f>JmIgjI$RE{)}&xW+$b!Q7)Qkoa_ z`ZO?tG<$=x=Z=h;l?p2Lf9`N!D^ghFKXtY+?`xvn=!z88OrzsP8>(PpMRU;A-uz~vm4#eV_v3H(cAjSL_OCt~qOoO_eeKx|p4YDl@cqT#$9@hP*0@t+Zx}_n!laAi6x$KiO@SyxW0m5 z)cN4x6vbd_FwU+(ApE?W_MW2@L$+SzjxW|}_-X$#SpJ(L+(kSO2aT=|a_hv z`+Y}mqhp${zICsOq0MUg@qMynz-VpCF+rJeU#`r`n54VC=0$Fli!p546Wkeg(X%Zz z;hA37T}n-8g%dIR)@9wJ`g<*`HK22y%|J+EbkYifPV<-UwhoXYtD6SdljCYPo`4@o)wK;1k~DHLEQ{P>*{#>9H1{4U=g#Tv91js3XnRs;T*XFUZ^yfY7qdg{Ln z(I*3(HZ?uL*Q=`V%MWcJq`M8z912{Yleck4{AA5aDqEf<)x?NwEyvQozST`?OMb{QrlEe_4j)WTy5&b zaSpHgZL?nVv1?QDkqc6`pha#M>P=QILzfq)QyrvU2OH7aS29l-uk}B)OqD(mlV4vp za$wD{%DtVM-o@w7ElcU@*^**VG)`gr`6#a(-Qtn5{M2;=#m~M&-5a|cvd=Tlv%8}c zr0gc8uW@NnyZ5g=noNzZx_7deb?tE_m%n%;XEM9BjO~kyry3-^IaAj_U+MQIH)Ye` zDeU6zf%}R}Hk@*E4+sz{WI1lRd6M>`vUd~yM3v*y+@UzbQ}=VXJ6h?==ADeAg)rXE zODx}Hy0MRGw14$0M*DT6f|>Tc0m=zRiId};$;`SiUeDp0q9~=)D~;8z_cYLJDfq9a zkBQvwRRsoAbnI}av^3J^7#-Fkq>qPm%2xU1IPpR^3UyZ)l*f5{*(}J(+;}iRZ`%c@ zINb3d(YAEQ^n;gSA+|L`k-T1)8(>sp;j#Y=Jw{F zG{Q*b&mDyP*Ude;iN-%EI-jM@L?;}pU!`MLL~n5_#k-O#v+I*{>$ehmza(&ty6%8Cdp4%Dt6e#+76XL9$q*}u!KkxK?PCs)&wBO$%=c|wLrX({) ze*)XuQPjHqT#hMqu>S+Te9iHrp*TQ+fqt)j)E*4cTg_hexTEid#8Vyk49`*0R#Z;U z*SF0@GR3k}shrT>&u-L9@r>)2PQ`<*Jt98dYg^h!r z#^2_wSv`_TWA8q0>><2V=p|YdL-7l4$SrI&A)j9NBdE-b2+C!CjSQ|V zy9uAEx@1z7rhKbLH(AvqWxqmog()GwVV4)R9snSsZWvBfHLV_Lgn@ zwLzp$?!9PUSX!%s?C^wQeNhssO)5?z+27SJf&wZ6tE7|NE|-RKLQq;$Wxo zZw|tPY9FFsFw^bj`Xd2jcm-bC^3a!cFQ%Ba+5Yv}>b2D)BJ4;*EWNK|I4bVr~1t28j-)r%d?as8R1aoS-XLuKx@AzYGe41!fA?n9ejz!*;e$# zYbzbjn{2!#z#HWftev07mFBQA1dA>-(%)Hkn4Dr<@UKo3c6E#w2r5++#tj6IlsoS% z$L|=MQ%c3z5XpzZH^6EWK9nWTu}PvzU=O%k+xYx<5M}C zv;$9vrFX`33bzJIah0^jXDH%tTi_S((%h@!XsZ*Je-4x+(+08v_H7SmG8%``YGoak6ZFQ`fL5_+hka|Kha81)<)hwOe z$M^0tyX54TXn{X`J+&*^V*jNlRkN=wUJ-4f5!IsT@wvA0#)XLeg9nx_Ujnu%<8FID z1l{E=nR9(M*s)Z|-<`h~{51F1PquDPsv@rF&iH?R5943v2D>o@92Qg9pAU~sO^#jf zUDev?Q=4Y8BfI5TN43zXBb^%0%NIQ-gj!zTotd64Eo~``$A^~CtsT}q<&JGId!06T z(S8MN9cDlMft+X`pNBuo+N)ZRfxj{@b_oY^++8Ap0*(SGC_A={&dur(2F)wzvT(H+# zmPCt;0B`Q~7M61!>PBhsp5;_JK8$ce#UZi8%_}7Rt?W!T4(kd}Rc9VwUdF+FvSZL!ZiXk%q_OE%%&mcs zMXnp$2tGcK?1BgBD?8h$I+k8RP05*}dLC}^Q8+jEW}Yd|7_OR_>|FIsMB6Y(XYZi# zHwG*!5IH;Nzh@URM76Hqft3xDz!V_1b+6j}!^2INc@#2mX1}N(=q`2(_;_y)+-6@Md#>t1#_BC> z++rX)JBUH|k{D>8?Kr?)koCT9zu#)$O42~i1-+t41OqOFyxeX3xCR_i)3J>A2ZhdJ z&v=RIYsm9js3onh)+G?^n0x}f-rRG~)pI=5~kZ0Pn+ zX46;y6w*7-9KV;|L2(h5vxSY0ux?xrgaGI0M5E`{v0{JS82J(U51x-SbzG#8ft6J?sOxn7S#s=RYyPf_j+ z7A~LR2-gc6&EFuR=Ses2T)!+Si*O4B!>!&9_7qa)A+8oW4xCIXY0-Qf3L_6Dqj*T1 z5RW3iWjhY&9k4X_l)wSgE5KI@_)OEgND}WW$X-53?<8UGwW2t+k$YN31{C(}Q3rqo zDJJq-91kCbwO1o=oV`~&sF6YUE(+XuN#IbDDP0FV!2=3r5dcnpp)uRf;watSMN7|s z3LC0FTnHR+__qT9f=E91tfEc{4J^%tVzdpNWfpzj{g)^=m*n7q^Lp+yLSXufBYa$0Dk2NYtIBheI#X(*wP8Xoi;%VKi~U>;9uxU7jA2#?dzzGng%Y&fz}Zq-8 zyC8*4_W&%J&2t>_3;SWZzQ`7CTLePMZp+ykNH6K%d;uvwfU5TbYUD-!+=5T{+Opvu z5*+63#_S300HLA!?pYw%B@YNbt;zrv2zGo1 zIenHRiSZs(jOTDExrBiZ)VQhWvwcl!BxQoJa z;GG0DYB#?!4?;A3a!ys`E55fUK)1(;Sr zrLk0k-Vm^DE{N&(73m2a*N}zbwx<|t3>PO7LNNaJ$x~r}h+4aPYH21wj?xN1o0v+o z&qqyGUtIZC!qnfFr;qa!y?+;*R@oCi?93zecY#rlK(hDt`hVH>-T^v z257GB)0pAC*~`AYU{clQNmo{GLqdf4zG#~!-Jrlw?(HVP;66iN`q!9KtXvnGaYWj| zmY@=X{Lq*EI^3FRtG^!*u=uR|DLK+EQ^IM!R+#27)c+`T9unyLDVTf?zBE3zs$FdHDTOthY! z9cgNLS6otnSJ@2pieth@qG($rCQ|P*1yw#VCk{o`Aypr6LadPRK5sQI<~!ih{rMQU#WsIF}YJqeIhQqfQbfE&89N&zmnu_Z*OU^ zvz8u9NC)IJ`9baAf-}c#J-_p*=6gX7W%Twsg|7Wgw58$R=#c|w>a~I4dop>Hrjq4N zS_`GCN}567V*2(1kjHZtZ7Li8Rlbp8(=nx7!R+)0y%O`Zjc_x(3Dn5^2a)HJf_^Ds zo*uJ(lQFzPLP8Q&bcsASP)d>D<0Qbxqp`8JT@oXZw!~($wh8Ax2`MzQM?sIUbNzu($cFe69&+xDZHT)!S)BJbUgt;0LJ3tVs<-X49&nc4RX>NP3zkr-|3pkOw z#uzUrDRw)8=cyHLVuPRoZVfgx!9Bs{Hm?JC0OA~^!Uqa!tuyLAfYT7F(W&lFB^4Yw z#Sr-*{mbBI*BaThAfKdoK&a0}F3$Py`g3np{RzQG_0X2mU&kxDsz=0B`+_B`K zoZ1Kofv8`c7{ak2|C)G7%>u#2s2(&vHkp0I{}ib7ptzF*qQ6y2+zVP!K-)-vh7oyO zx#R9yEAC-IpD+>~!^-QgMJzP8neJxa9#iw+A&uQYNs} zjfb+tEOcI2N)C9}FKkTt)4n}AJ_r{+92JHD4*_0scIL(&`Wo={A8d&tlrt$$Bw+wS z9G+@<-Z_+S`>OyiQ+_3)t+h;&GZ#6aU*Xnti6S(m6p?voM@ymce;*BDPx^lkaI9tjy{|0>_=rM_7SwZm$ zzabPa{WM-7L@SqoKnQ8=km}+w0WlkELI$-WOO4UI8M0W6S$PGZJ5^MqgwWs^|7@Cwc zQ$7n)KyD!s>F_Vnu^+&nq+C9kfVAi(%hQ81ijl@3y`x!U(USQmz+@8K*lI<0Vgo#g zgO=87XNvbp-KQ&|R40{Jt+!k)ht!a!kq$6s4zxTHCYkQ0A#~p{_hqCZP>YFHSy#2sC$iO00O7~p6`z$iB${_6^yXoih`#az#({=}A z6RJwAA0yZT5w?;$k;Sv|DN2jqk-ZQZjGbL&S;h;y`IH~))oQ$viIvO^N#=35ex4#% zK%kvxLM`c)1hv5d>ID9T$W;UIm42h3{40;iYQKFgZe-7nR%&B6sMaeZBSwY%LpC_C z+^Nik018h1%pTx_lEH!R{S6l-(*_na!7m+-#6}T5AS38b7IT|1zHNSnM4Rq*0%Z>v zJr;&>p6>#X1XFGcmHwr|CAeBJJ?RR{J9tcHW8af+>4gX&or^$b{K@X9vAEe_7Zphk>**GG@d>S_} zl})FSIPz@-#XX?BfEC10JJsRqZY|OJ*Ww;rYC99(x`55xgAlVuGQoj4z$-G$n#$Y= zI^Fs$a9DY!PF1EAspta&#=Y(7?XqDhO)J$OE)tJlo7On6!;mfsaOxVJtH%yLxU4`HXxa-xreDqsW5AYu8 zyy*U`=4+3#I5xkxB>HmFu#nGuG={6Z<9Om~>>)5<=dWz1!livoo5^8e(PL3%NF`Tc zkbVtmv-BJ2g#0~l>)?Ii3KgJ%cuA0FYFZ&G2ecT;3sgtCI$({O-jr;Th59o19!PFX zIPSZX3bhiX=8k};MqdxL@}99sOXSUnLUv2?ea_o?xR0RYBAlb?u7NL7& znhbz9kZu@Q>}sqH_gPP)6(C(iDtMsQ!rTblh9nu6vq@@CBuK#PAl2LK7fP%J=d zZL2mdikoJsgKXw?W6aR>sRF)*jfz7ZC{=(OTF40m4HJx{rVp^#|>FbAVfsrt2nyzIOjNC3^fSB^VRvo{DmJXYx3uTR&_E_ z63D+Ln_xf)U^U8Vh@V{6M6s8ge5OLg=hZuYqhB|!JPdET4uG6J#_m6+yPH8hYedfp zg)iKnUO~Lmqy>uH+65yMmtLp!fO!-IwG(`A#P+HtY{?B}m9e~jb!=eW_I{dPu0_-d z_}xPdYsD!Cih_76jX3okx12vl*}i1NW~Ekr)musZY2B$wLsmYZzhg*C2iW*{;0hYF z5Y`8qSV?%19%3&G_c&8O&xjz&bwI10rX8}KV!tB>RLW83?6dKSuVRBj2(UbTteAMX zfwpj7Qswl4%jmG{0)TI1E1LXcO=nxL1%Y+K|8_#mY0Akgmh=X;5-0`9&oR!;a~- zCBp55YY{BDPrz9~>*NN@j6u`sr5~t*)Zk#lV_}|OWOmRHog|zFmY>KBCVwp=KL;-& z5soDiIFdpyUT2F-28&6hw=&C}F4(XCUFVRc8?tL+BoopbN9KQ-<}ESjoy7QT3QFy##OzUQ*GWkgNp`s6PVx299tmi!6WFa|6&= zgGs<7kkh#;Srg@wukG3WC>4WnR10W;nm5Hod{~c4)<8XAnmN`i4 z?H!x0gVfUyiw2D|rkBStjS+|fM@0VrlJyU$`X^sDHp+wqORjrDS}zF$Uq`E5o9^JF zS$}?_W#6o`6yMXd+4r*PG6rEwC42W}-145uUl&UHRicWo?_xl^2ev|P`gsI{uBpS4 z9vit$$rRt=gy_dOg8K|)s{DnepLZW1`_)%DY%=}VEmA~8FpUXzj$km@Q0Ii>Bl~a3 zcrEC)+q`gE1F)z-A~(W8ZUz3wOCJ}48xT;r4Y@>^M!%%>a}_^ER%+&=Jc{u5b<#DU zKXUQ&N47WvxyZbROcOgjJ;2zBlv^8%FOo&#HOC<=mE$-p2GHUqgIFr1eJ;4+%HQlG zQ4d*^edDpt&@@r^UP_kG5^F&zY1^AQ@&AFOb;xSyKkuqWIFh@nfA}6y763FDRS>$9 z2p0F%AAUiUp}Rpc8k04^+CHXFyq0Ko9605PTnr(d=07gi{@ok@@bo{tv1~|u=Z5So zd>#pY4P3vk>_CM9`hbB0p}IaMi0bq`6w<2v#=hh+hy;)!zH~%dRaWBfO*U8})XOiK zvam)9>4~=K*O7X^XAki2v_m{||EN99HrJI*=Y!G;mI~ljN&;1JZ}H<^nk1ON)CU_l z?L5*6Nx-v zOa$cv0;LaM_|ze++WawQU!aL;r0s7w@431#TNqF_;oGolt8ti;uV7swW-e^4K_Eat zuM+$^j}m&9MkMJV2EH!$rIEhsioM7_%H}5&=d-z$hns@>m@n`8Jv^RC=;bj}9{ z>=LOeXT`2+U4H3ujehKSvE75PDA!e;iMZ|0cil z1vns;ZfP$2b2kvSUeWTcCL-*kUbgN3BJ923e-wsXY|L0ikh^olBKFKev3#x>N%u=Q zFu-=xz5jglM3gJ7(Y}jRwO43_xaSkN?;n#^J?5 zYuit;y*uky;3Ucx*O6NO7h!s0VSgPuRu(qK5glVbeL+KXQ70Tr*L@gh_hM$8&&Q4& zx=E!A0UqgG{`U+J$Kc3_+BK>V;G0|uD$yl8&9hR}lrMcq1?Vy%D@~A=<^d;_8D48q zSqdI4TJmKrc*}&H!7Lh9WiHHBC&*c=x%&xg4}sT$TN1X{-dTu9y~J{3i3GH(iU;#v z_Pd%*-jP9`M$9&eR$2%iW#YjjS@39{^v@;WXRjf8%kyt$BGm_t8g_-8SRl+~Fm-`_ zv>bTHWbkkyClPt{Lp5i|91uS4UkBhdsD<-2+Q0aVUXuI~jP99P0X+G$fM?*4Xgw48 z%=1XzwH1g0k!^%y&neuEz#08!T>cPW)?|F&M+iB$?nBb#PVsZ~D~-MT<^l|fwc;FVr4^Y65d7{Sh@1)(S{$7K{lQC zT34|{6A|9;>`6ZXgm3j~H-fWHbzcA6s zotzwCUZ$(ax5)Je1fG2oDCJu(K%@sH#4eHsrYJe+^3xOn0=CYVe!{c>qLM#HS+>6c z-$lkkI)Flo6W6ow^espX6_V~xs32ixyAa~A%q-bXMEq{jTKxW5aXyFWN9(HkuLB)q z_5cG{0s{vdUS-FDFQ`CV${w1q9%gkH?l zRiHTg_Q4UOjXDEaiuB{Wa|<^eP;i8;E9&POIclgN21FO%3%AYW%pyL zYksx`u2{6>Rd`MOCHJ}384K)Vsb)W~=SxeEz3j7nzQOI%vbI>N`!0*i0Kg0Bl*q4` z&$~o-t}^Wm_q}Kgi zmst1F*V)IxceB-JY}{PBx_#D=$(YtraMbxeJ43qu*3GLDUE+Ma>u-gmg-dgdmcLbd zfhqV{pA#Ch1>ul^ruS)=^` literal 18568 zcmeHvc{r49|F@PqX(1{VAvZ0SXu(vrP>7Iy8B$c%F?aTCQ&Ng-2}MlyT}e#VX%i93 zo?)iNlCeydnPHfj_q^spJK`ZkM5)9y3RSz@A~MKBIfego}$C&&9R++4?o$NzZ$Ieel;RFB2V2u9DW>qu|3@Ck+D)F0Rs;jf)rm z0-r<9oi#fR{+2h1VZY+y^6%tQx93uI&w~3)C`~UPmt|NKBY{9p9{?WDe z;^NxD5B~M*ljkdmX~b8No4bGAS={X3 zu!mdaZ_FCv;l@=ljil>-|9$;mv-~$4{{Kz`+{Gr!W_0kS@ym_5N2hB1b0KK(Wo9l6 zA5dSk+ZniPdi0};Jkj}8W=j396M5H~PJXLA<>F-Q`_#yg%Gl!3SHL$d&Tc->AU~mvL~#CI`upHytt7F2 zBKT?;xrpr5uavc4PSxxlLC+h6z5J^WV@$Y-;H|Z~wTXG5!v^ zHtXAkw{42pe$V7UFVs(GQ8m`r;r(geU(ThOdqq>yepNSMTrkgwIxR7WW@`4Sy~TB^ z`wedlF8wvEKrw0~P~QjhhNltBf9x)@I^U*8-qGZD3_n7M@iS9)nqh$=`uzAxw2tK^~uvo30olEom=~GF*#bP5QP#s-dkr3e~&s8(mkwH`$f#qs(xzoxhm>Qh-`ApzLe zA^0FRIsLtT65|`WqhIOm#NQPNr{I}9)o0O+TX_}V3%6yp?D2V**174soL9uw=KZ_S zNyWX5svo+et8c#iELxg}qcKl=@goZBw2Yi}T#kx8^V#0g)yJPT;UCjkwum;ZxJ(Po zYLG@42{rSVmVOYKQvcAmW3Z+CYM*U1@?Dg9S>>H@*>+k0y}a<4lHWUaR$BazinQ-} zC<^h!oOgH$<6hk{d?t>U{fl{Vd3xrxxuFpyyL@?6zd7aTu}ae5j?93U!=<>E zf2!|Hv{;i=T=|MJL&PJB=Y;m6EXyy>&I|5OH1e#pQ_AQsJ2Uapi(ffXqMP{hlGntU z;sYLn)%3JrFR$@4^r&{?6~B&h1yiSS!-M&ATabnR*K;s#vIC#{%0-j1>z*G)H)s>i zBF>CQCAaLM717da5!8fmRI0w?0B?869+bSNj>mYoqS`=up<1SVE9GbLO+0eSWF&_Z zRExc*`)p;AK5ZgYwVUw^1|f$F!Z!*#A@%7F>W7HMqseC`ZusoBPwBTIRPrO;Bv^hV zrTk-+%y*d;`;|g{Ef>*bJ7JdwU)%n^1$v3OSAV*MLbrv-yKdie50bBr^jRy?0%b9d zj^+y4({|krg%xBA=b{PkvIErxty&Vq;UA`fO!SF;EQECcA$mfIDqqatr&ZSzXfJ86 zs!CrJ5RPIg#^%^|%l-bpx?htHKJNGRt;`R4)AF`K3`rLW+-DqozPQ6_&oNkda(H3I zw6=55bj4ZKgwVbp!ncRk`8+e!g;0yQZbM)-eIsEMe;C<9X_Z z$8Gi`U0-DAO4o*{&VHnm-?3_)N(}nL(84?IT63JHgrZlbTG25N)X+dzU9ENhi|;p_ z0zD}qCq1_DSx`lMDR$v?!EJZteO(IL^80LB1LBl!c9za&bvq0=oxSFOJW7;Pc95V; zA}OBLcT&S8XcI5WDe}pYFAK?$!k61T8~;WPuc;`>sI*Zg>*&_H9la}JLvDyhHn$;_ z9cAta7ZyvyDv5mNQH1?Y8wuVjZBnnV{^5nIqK zbhf~KwsvyPjUt~*pCINUBKuWFWvUDpcvHXSjBY^GPu;rQ@S(2Xe4LOx^v$UOHSxUg z#53M!I`$K$X4uZU^2b-*(YQc2N=)MBz=)&GE!q5pF^s8^``Y|UiXMWnYP8qebT>{U zPPouV=gSxGBJOdVn@q(I19!RNX z)7C@7-3L7AnW4UHV`9hd`$}&OsOwvyaS~5zJsk!vIEK}KmvDqteDf@#@_qf;- zD*Ly!98ic*evqgdo?4mP>(yS4Gdj^+;vn%t&}HnS<-)e?t%M0?pc`t^uF#k8AgG(V z^?(f$bg`nS}s$v0Qfl2Pbkdx(r-W?skVbCA3dX-==;_h@Fh zzJ2UpVoY8i5!K%>bXmuP8(BS0cqg&rnis05qQ#rwE{Dr5mM5+Y^dca~`w{2;BC-R! zVvJSHJkn;j+vNtMMm$XwGCws=Sk%gR9IPnz7k=zLF%jSTys&?Li)Y*CBxUNm8R>}u zH#dynY0FNJl;`R<$}H6AT5ZHqY2G5gOV@O~PE|D!3GNhS&!hd5%FV;wcW@eCEPX|7 zgvdJbZ5NW1>9q?t%cXsI61dt&|~5?zTv(CZw~9^r(JR)66K)t2+36D2ivn z;94PBPD%49dg5SYt6|AcLW*0VnuHtoW3aPv$5}g~-$$Zwj?>Lh0COA7Ov$Wy?zb zq5%Z=2H^(?7T5aK#j>Mr$i2Op8Zy-hpSDR64(!CXAqDh^Wmo6FYhe-K+ zhE!@z{5CFX?(|vNj`?#$-A(zHC)$IO>QvoaSJvu^*%n|pDfD=vmyv9T#I0V@NNsnS z$MEelPWvr^d8jTg!k^ZM#>3L}(x#DA|W zF){LaQ&}l;&gXG|?s)U}^hkgP`;eHj>Rwq?@RZUqrO344%n23I#9n1t6zQeCCk(Iimo^6c-_nEN2)yDN5i6ow!nAGxK3 zzr{t}}g>6g_p)|5OO26znkCx?pj&Tf<{VDspE0<#RM?eN@Km!0z&6 z-jZ(YI>d|aD_6tgOKOALt$h`_Evk9z`f~Hs@=-GVf&ia~aw!HCLzAk8w2qSwi+iFTQc2cE;WB3(oyrafTOK zP8osJscA9M`GOaD?1B5!PeC`DXc;QbC@XJY&(roDDx$U2ZMZJ+g)1JxKBvk{2Q0$n zBTC4;rIiD6p4C5*vMB~h{nJnCQz`mXDd= zfhykM%Ol;gRS~}K52~ZQ^D_a578Fc_4%R%8XeVNdbh#7 zBF#TVfjMDJK;{2bRw`6>7dCh5D_9s-UU+n-w>LZbrDGf+aOBJ6b4t-sgq9ww zA+=!I({1fO(eN>w_UZ(AhXYBPLFkc2K zAaY`|{}}C7N)6@fjA{Yd)V0mO%Ok6$fRG%Ncq_vVUBX?VvmD{k;ro0rL~E*2M4e+< z)!PbVA35a3vdI+6ucM|ijl${t$RVQVNZ+vmJ6fvG@Rcveb|<_`E2vg`*)PqTtjDQP z@9Gll)1Q|P~r=h$m2V$&*3xkh}nz|3ZC*lS?R8Joj zvs8?x--)oJMEbSTOK=fl=Cg^xrRDvJ!ERoZ!sr9Z&DvF8_y!P(+U^Os1%Q)-!xdhY z2N!6>-g4SdcRD}1EvQb%JXjCF5tO{$1MdgRWVhL&X8xJ&{!H|sO?*0`nl&yjcq@YF zkCbLaw~%=W+Fg&7QtC#@4e~geuXFvdZ*^l!?bF^A0?4M3QkfULI(tiV$#Q%pq(oX> z8Qf|ds7Oq5?(ls#(H~!N@3?Yl#?$^qxpSjWlkY~Wy7l-1{C^oZ z<6=4RD9}?vtee5u6oGp?;o?-YIodAW=a}@}>VnDMcx2c6 zzGOp~R#cYPXdCyb`DUfPxcKqQ-R;3$lhf9+6V4>V;+jIDtx%;Sswkp``qI23buhZz zScyKcAkyyZ6JuUZx1*+}gf}5i`wiGWrcQ`NI#lt$=;rI}YI1J0UPhi;o+vdd=u+V|y<`tMIsY z!h&O=N{!2SL`ggp^zs`Bs2*=B-vQt>waECAD*5sV-_P^rB;s}(lx4+uVF115<;bs{ zGk{UtXLzR+(=MMF(>>_bYFPAB#t+e!5t2Aj(z#*!eYd5E4LZ?JA7{)gYvn79$)lW8 zxA`<4Vmi}H)fy_!s8*}1vMwJH-X=29ro3BtcK~jp7}tvwd8p(`>O01|!{C0<@-{ui z$nR%?{oP<0^_v;|Xj=4l=RjIn|8~0};?Sp>M`%+cVtkA>y19k+$$U~iMk-pGQGvCg z?M_(`Dd_IgO;k02b(wBEFBB+)XpgHbrEG2*a4Ie@Ma;Bj$04UGw)iF1)?cYCbZ*U| zy*igkcbN-GON+GIQTv{nf^@%ir5lb$cPJVQ`>S``OzKY4`VP=QGi;0Een*g`Tef`9 z%SI3azN7x>wv8qfsSaHju(nursx&d?xLdso*@s= zN+Mc3Ek8dtn7EOCdaC2sgo^5pw{ihdV+dTo4Uv8TC8lg*)c0&?{9QzeEBe}a`}v`X za^vxW3Yu00;nKhtrRL1UNlCw=D5K=&xWZ0j(F$ol>3qzai!#zxJ<*rF#v%Yow(LKP zh%EPtJCU3kDAQy|KuL+7J5bSVcR3I+jN5{>d~fM9v$mV6f1dUr4!FAAb!j2SM|Zv$ z9(>mnf6%X|&Ebo5%z~?Be{WS&a3uLt=X$d5gNi1dx!KmCsV-Fus>k*gBWGOqz-csD ziqTX(SQ}3CtnRNw;BI;v`6Ojc$bhq){8F_jap_sC@qv`w5r>`f)0cM^pL?h5iMY6> z@>&~EyV*ZZ{>SLnR%gX-~2;oi^WD{OKKXH5j$yH_Qts`|ER2b`I{~k!ovk zql{L*d=0<4llwr2p>&77_E)q9um365x*EsWHKK9&RbcUTok8>~<#oru^3MzZzxTQt z6A~Qs%W@7;dqpT2>rEwjTj=qsN8_pon1VBSb#bN^i+cF`35R*d?Zfe}AEt$lBhGJE{h z#;`E!^*ov_!c%Qe)kj6%Y%I7*eVUEapt_y@MK@v``tBxyK80Z^QLPoCVh?Q;*T}mj zF~>TXbK)=N<_PIZW04G`BkB3FbU=8T|Y+&R?8c6x_ z*qO1foH4w^Q56zFPAT;kd`yXY(#rbCNCT&IU>N~LYxN!--G{eg_jHD>C6gS0!FBB1 z^-A@fCDms~(3+tS&g;(2&wzie=1q=0$wc0RzX>T6yC-YAfF_MK-_hB0K>YQcVF{hz z?+u{$*;@rPCt3WghsoOf0{5IbruwaVqmIWO%vOOg1x?MxNv6ai1(y%3{`&U6?=#kx zJsci3JFqYkgFywe_et*5U{)uQx6K;wNHG}~sLErtFe+m;b*;dB)aYetxulNnvl~m+ zFHz6s#7@fI<5CH+Tj~Pj?O$Pin8(F6mi$vD*u1j{igAvyV-0oJS1yn)Gy6?0fpb3B z@B`;^BxXHcahA8{o9AIH3LmoLfMzII5SVYMAqMuWmrIW%lVm^e=}b0wK2-Yh}~b3$wI!x4`~$brs6C8Ra|R%M*3Vpu3GK z6&CieE(z&K0uidDAbx{^dkCrAgEa-g{(+A<57~E%fC+>5EXO9FSNwM{(U@Zu5TnUr z0<>Aw*a9#s?4Gke8(hh#Pj$<&ry1Hg8+$Gb4eQbZr2ury4|)Sd-Gb$8&k2P=2}CTE zCuLf1V!VZKUA5wEa$|2g<_|w`mT$Ruoh`F6rJ=QmppoF>%w1iBQZ1^w3I- zGHsnbb@STkWhLtSCD$9XCt=8FUy%%C#qjO06Tw>r{t1PhDX-sgfLecKUE#+@;lsa} zDT@ac6eSf#7p!}*Ac~R^p-U!$qaugZa{qDX$JkFfAa)JU!3S(VYA(ZEwc;p)O+3_c zw~eOyo?&YxpzNz-sW7)~e6gb$xWUepJ;NT5Nbsip*c+EF1jD3<{PtC+-vJTRoP`zMVMgBxlz&TQ?;;+}kAe2)#1N-=A1_LoRqG_u6X8$Om zn{ZP15N!0kVsOw0CD^mFAI`L_=fP&9kQmK^0Q2vJ(;~w3 z6ILC=(o?Tr-KB>)`5WFkFX+x437!EuWN_+&cg_=WA9>cunaImvH@N}`pWbV}=^0HS zVWPKk%-Xvs<=iw7$+n7k)VCaJ2D-6A8+h#Psw)mDM*R&=4I0eDM7CfNcy*LPMfso67Z>|WdN~DdNjWzX*|*1;KXQxhE3#m#0>ml8 zZrmIemh^|;qNILK4=GFj!d9&K7ZfyoPZOs2Hy54EmxT1}ZtH zp~@B(pcN{~u`h_Hr(aAzDe$m&p$!Z&|0Ty-WB2Hh!qz^1!WwX!-lp(0ooU6I0g(*q z84QNhTWhTu6$y~jIZ)W!FXe2yx@;xaa_({PuxqXUHfFNUYyh7)l|AM7U#j;m{#&|

jkZX@6<1j!ur*O+}YpGyN2QcyURjrIgG2 z!Q{_{4aG^?j+`e>rvI46qbBN)0Glp|C)fYHRxXw4;>zcX!mO* z4Lzx$@rl3Q08F~iK%*`Em(I?=Ey7ICIAw>e)F0wz9!eG^wtf8FTFubyAdL(jg@*Xf zN95x)0-u3`DD>zEFDDyocL@yklpJJP1qegP0@aY-dojOqC3-svzjPKHwnx|8~f`#3_uVQ5yrC?BUibDQgR+* zX8-^ITL26rKt{6W5wsCpI<-M<@SOkHNjP*d`=RD+HU@Sqhy8%mwBjk{Aqe#khHEXI+QjyGJqvbD|v~zG^@0W|lzgg{hC- z4qs08#XfecD$E1{d$d;HA#giPY?P)NwstqDVqFXTf_7EY zOI*wp;$nJ&0w+rBkXr=)ImN8D97z)Y^0mC&Dkq2oig9SwH6;88l4eHiC)jSBGHz#o zJL@JL<~K02-Fhpmb=E-l)!luP!2DzL>mx^qOB51LG)eJv1SDj}HBiYSeI8sN)OP~* zdcY}0z@lEv$_INSy>p>z$N}e4`i`Tdoz+X5Gzz~41+7Q?+YGzmb<%pCW3EI{BOE9p zVWcXLTTsaZ+$C&nev)`Py|4T)7{6<+R|lYf_Swh^>k133;N|%`^);g@vDdeP(5$sw z9pE+0T(Jizh_wM2ZH~!-TLZ=<7AG5*eUdSJ5KHROX0_N>cHX7ke0mn`|WJ= zxt>@5gG=mhg?;{Q@~t7e$ilcKYw31gV%m~+h+jO$F*&DnoD%y+G%x#&Hu|2L*zm9^ z&JM#-fF10UTII8&*8O0jlu-r5)M0*Mr1d83k2O{w$MJ(p%vR`{gq3;^-CB2Noi9p5 z_mwfH2?%8Ji|#C6eD1g#>;UW;EFh4RwPXou!CD0cSJc78%~_jyR{9%kjk@WI#f?`B zrFg5uwt}g}2&L^YBmoZqojTTfzLG~v@hxHO#Ubd1BrbQhwaT331IHkNt@+%(wM-&6ThZbdVKCY%0D?W3cG2~KAXxqYe=d{)X=_iUm$EP)HU|)&B|}S40h_{uoG?KdeA2% zP};_4QEs~i+bCeR0NQ;{>FbsiZz=YDl#D5mPdsdOS(|u=)3Ztwu^;LwUqKfEF=nWr zE2``Dp7vK%WOs6a9JJXf0P$$Chtz`!HtRmuu^z|nfpCl3)FN8aiN6YWvgxXlAB{+D zRm*QHJr83_?=cX(;2_o_#143QHbCmFhZ+wk_$%6iwh1=pVSYFdM(vzq8L$NVG()u+ zN);g`b|w;%jeyG~IH_$IO<^DmZ8^9peQRw3q*xdU;{ov%!bcs6U{m({yKs|LEdDLr zkQLHN9f6J0zRk?#nF;&->qgv49O;;ra z?terMb3TS>Rj$a+VxiuFt{!w&4fgf17hG2q5M!SK(;S^HJe!1R=X=w$>=eeFeT!6W z_F}PWHru|t?J~zNXQ>j4j~VnftU6mP9`$IcaSSl0#h0kF=kfS<9Z~yC(D+l4qo!n% zc%X3L^F*lkXWHue=&_%SwP6GVvY?iRx&2g39;RVX~PaNBT!GXzUo|t*&h`!lZ zhGII$KeY5~JPm8eqy>DfdLaGrNTzwr^B~yP?R-=f_Aug+pHiVNA>w5)l1| zIWM}KB_ME#Q@Rg#MH<+3M%7dsc_}l0U@!?aYru$#Ly$n#%D=sq)PqHchmuHt!?TnVN&iSjlS%d=)aZxq8>4FY z0Y?S7Wu_H6Hr7Vi^7{Vca~${@Ey1QVk(f8BKGVEl;gS~-l5@4J#hsE?_qT!pK_m&o zx-ZEwr*_5_48+JHNEqUfRikTBzm zkLJ#{y;%!j4_H56E|F<7jZ46bTs)J;(FCrI?YumRS!F`Lq6grU_2(TrW?5FhXh(x( z0*`(XtOnzj`;TKibe}0iCDYET-`xf#9*R)6SDL@~Nq5v33B8YFy+)l9bq?zQOJ|in z+PKWgT0p{bS|f1!0F{KnV__SL9S2ATEC~9#5tR<3n|}crImKotp1t@4J~s!n%CRQA zJfpc*hlWTP4F5q`KsU*Ub>43oeoo8Q1I~~F^CDB(hf~ajLVsXq$Z1WHmq(eUCy!WF zb3z2*`ty(y%JH$0t!bl4t8VT+4k2ugUFfyp^Hd7!DUm-Ol^&OOoHO_+5PuCQY)$*G zza1bAI20{j?%OfHOa}b|=h&!IEdcjG83aqa*=+h(HoLd*;cpkqB|d5**#{NxY$Kkn zsE0BlL@rBMV7DEHb;KF$2_Uv-D~5gT==c>$j`egq$J@Xx>C9DT<;StSm5uVxyStXL z?1sk9d{DlylBYrf{a~zgR~UE#nxs@&U3tzDIpQlCFvE#;03Kkc(h#{l8+I=(2`tUe zU#wN@h<%PJx{1EBY&sBDx(G?oFEH5bhD&ivR?$w3J^$Q_ef~N9{>zbnb1ujZs?w|l zBfAtVPUnp7&ia&oyuefrVV*bfS9$#iiv6HLKx7&i^Bcc^g;arO7|%$Ux=R#{c{|9* zd>~`kS}A~S$twO!_Ru{P{K1x~oK5+KNd0yS1`<%V9%yMYqy)W#*&!0%@XDlV2kQWg z?E0HN`9bVCzxm8q{3CE^rzIF}(jQZ2qMaDsO(IKS4-80_8Etr~c#XX{uP$x>3R*fC z&MA)o7ITQV>6Su7nVM4ADUC_#NoRxi+Nn$E^TtH}oLcMT0L%_oNi(fCwHWq%N?8bK zbfIyDo$OI66FKu}-4g0?eC!d#oF`b;K8N@73Sn2eT5W)gayAQ$r9o3}iwT)zVqUyi z#skR5g)G%MjNse`C1;%A&+)Z{pZ6x-z z$dXwm>vN14EC8=dWTy>OMb<)Fbvtw_fPkoN680IaD2UlZQ%NC#$@zu01-A%)&a{aMmMX>p&fXMxWP8Woy+1^KNHDklU!a9?WmjKz3ZqVSXW4EtcJbhJOWz zsOa4*UJ^L~ywqdLxFJtk1-uH6-fXt#09E2{#V+OHnxXS}c93i^C_P=Agay!^sD>|S zQ&`FyFpnRI{U>*MYC4{hJZSk+iQL-%SZg{wA9R-(vz(9fT zgGSyLJ~R_zpBFsO z|4>2hiGZxmA)K+Uy3fib{e%RrTt+)iwH*O)=)I#^)}SIEBYgPzmN$$_wJtzs9z3?g zD@`=}Efv)Q^NWBlfq^uqoz6OOuBZp^lmp#qz%-^@`YclzYP&$}>G?eAwYjgX((&jE zn8zQ64(Mq+7#w1bbpb`&d2m4l_}+{=BHy@Ots~#QZVgB)_|ky{#^+EfQ2am*-FrNr zn;HK=QPSNd(3b(sUBIE@W@SQ9kObj{IrI`3ZQU429aD5SFyN0xJ2)IvQXSk_87WHc zEW)ri@dQ;`_j!SQU%CPz=`9gN5L*Dw&odVqrkToCZD?so9%vkNxC@;Pap7ec2(4w% z?^kzhV7NoI5aukLU7QCc8i3sfs9s*;;#bhAYg?Dm?>$8wduy3vblzm0(euywMxf)> zS$6tg%V6*UPC5d`lo@FAAb#ORrNmagO`@=krLF@vf|`*u$%#5Zm_Z{5R=80q*$gJy z_N3+9I&c(+to(=7GlwOo&gbc4h6}#xCL}}z9gOnmu&LM!xrrGbs=N6fpr(o z7{a~I|Lm;dy_J0BogypdTV%~xL(GGd2;}2z$09dJxIG9enZdw5|sL`v}@CdVzsf9Kta9auaF?J8Nh=eJ*3-bUo z%Y>yE0Fb39`A}$YpZE><703zD#eC&l5b7yPf`B&V$t-$HqILldm#;M#JWG~&`YjTICs z8>ndEF=SE-38(r)q{(I6Y&?p#U()dq59{Y&%XXJ zayuX1CgDz;(P>UO(3{6* zW!?UZ6A5q$4s3;j4gj?oeEk72SknM9Y3aVsHR4~Q899%fzqC{tq5InZ4CW6jk(nP7 zh8hB$sM5V4>7|f~wt;*I-=U7Yt=LCss+WWM59|iuVO3|Q?H_@y`qRO5DE@b7Kf&D3 z2s#2sDfLODL4wike}(oCcQ_x}aPpx65!c2Tpe%6=MKq;5;yCHxW5dF^!vs zLI!FcZg#i9PHn`AF7;B&x^fVH3F<&P0ZjqAay~C3yQp`m6f6@wjOJtPmja%4hJTJ? zn?78@;km&dhjQ-VZzjNz1hfO4ZSmgY9G@?lkhz}FM1o@mz8^3VDTfq>d%)IkaNU&< zX$ROcY>vQBjLJU{Whp3@ei#Gd086D{CA#6CLii(f8yIvn>kccAlRi`iT?~BK6eO+P z-PRnVicw={o^TbjU=PRqG@6N97_t0$tMBVk!@Ow}~mh{166;JiH(SZYa(=#1dXzsJ9)Yqy(BVg@bnvD)j<@ zsh0~{Gfi(%Enr2dZSoWrHD|v^?7@&8bM9Rw*Hv!r#2?-Jyrj%FavgA-0Ng}uP1*6s&su@|5PWD;k21qhMX&~}?FKAvXP zfm>t$yBZ!hix&+_$5@Rdgbq_!{%|Ae2`j1+d~$LFGq6Ko!5S)>vm6`)Z?{fn_-_me zkeZrzdvLEUSUJ5u7@$!mD=G;n1j+-XUzuX|e#wVm0Vu1`^2gv9c)Oe1A?cQ61!gfF zuTlrvgE-X(s^wuE<-n&e$?dSYmX(37W;xrvj)0_FlJ!{vUdnes4A=&s&fY&PWdMe= z`~Fbo->knRD=_}H>dBbjrd+mE&TQD)c%Y2cLwC#~lNy&L+7CHE_MWC@=v5%4oT!)> z;Sh5xYjNZUn*2T(C^Y$f?{UpHB8M7LFOOiJuA#Px>Di{mg6B=pa|7tP`*RU)=|V>q z^z^yL8QqtBK;oXW73!?pSDSVd_5!`_;x%}9aBueDzD2xdU=Nu{xm^RUs+36_T+f4e z3mz}b(2um#UAi5E)&S2b_V*HnF6Nnh^Na$@kW|%pco4w$-vaj&nuoGG zUj|8FNd5GE;IjT8Fv?u_>nhuf`^mo|pv6_-r(a&~2a=GE1-v<%qHnecEk?+F;1`&T z(C~OmH>h}fR=ND^E?|H<^kV@5k4W$oXHfCTMSU&w>|nltz$EkxvDrefN%SVP=?iGn zqtK@D_)6WOJ_fu(~QE~S(*BthgXM1R)P zeR&*wm+|9HIztvb>fop;3PPD0Hyc^Xd1lIaCI+5Od{Dygo^k<4|vR0arTcDqX~pLy}G-*xY{^X@lK0 zS3`;aTd<)nF zim!d=fsDVPsH@?BZ&e?Wl&#vtK&_bc2#IN&82B*<$5`Q6;!nq- z?`!7?TQyg=9%?+e;fIk5*RH~2S}fmN;O2CbXUe;`38fLHgJ>sk7YkIPS}NGqI|>_l{!n9W)gB^Uv0~ZXmd1#@Jw z|NGlD{`=cC{`=cC{xA9M8eG>G#4&5Q{z0&r6gD@PZ6F!OK+_8!Gx6j&I{)b!t`fhX*b=H?j8G|b^c$M=ChF&I1sL&snc zj5-FRj>o9eG3p2ghr!_R7#tmgLofskhJeQq=okWmp|f9Ya^gAnNKEb#=VDI$d2IQO9A_ad>qcT^)z0 z6ENxoygGrdPC(RY7oHpsOKBLp0V zfWs4TbOH_`5HJJ+ok1U!vErx6eu4MU^h zX*4>GhR_%o8Us&b&}j^W#=+1ycp8UJ;~>B@Gz3pW=rjaDU4+3iFmwh6VW?vm>Uf4a zouQ5}a2N&-&%n_cID|pKFbH@CfzBWx3>t<(!!u}f1`S~_FboEs!Jso32!n%RaPSNc zoxwqXw;2eYfzTNUg1Q}p=V0g@48l>zaMbY}bvj2K;ovYF9G-)tb8rZUfZ-7E90Hv~ zKsYoEhlc0S=o}itVPH56JcmK&Fc1z0!{OjL96E=C00eOmJO`n35Cnx129IFq0961? zh&moorvn54$0ImAf};a(0Vg2@JVKxY%L0QUG(1A111kXK5e6P%(1FB2P=td=ICL;O zm=rx**N1`#mp@_`ec7>u$K`frMBTn&gAjDi==VxL0S+}Tr>ZZj>sycL64 zjlu2Rb^Ka1KW3|c$2-C8jZXJoG%y=9&jcRsTD5VQ9Ecd|?+d26crKnD{DyrXG?;oR zfYA76tIL_7{nff^^|Pj&Dwk9pm|Nr?j5!%nxn8&&^M}I%!$0@k;bQ7{bzzpS@tR_@4=1ahS$hb&r$llvVIz+B*QLeFU+e10R`mxTjMzw#Gb4X-AsM zv>ii6RtK(XXuxCN-%Z_Qb@7Qx2eamY*K>$*`r412h=KecV_M!Z@%7lGLPIC=hnk^0 zdGE)in~S0LO9#DH4Bx+*G3Y{e*`m9uz4Ad)oatC0!i%!J{3>U#JKri_SmIi>$*y*5 zx*Chj%kh;tU5-$aD0{9JJsh$>8GPa%m-){A)pF;DIOJSp{TcSQ;b1P$$eOh|((%XC z4if1(u0wR$&pWuuOQvX3@cF`By(8CT)`on`v5vVzQvI$@krwe&W&VdNE6uA|WGj;w zMmEv-7q>dM^e;4y@0t_1De^8i!ip1V7r;7XQib(Z?qot|qVJk`Ud#+~D8D||(xNxk zViJ_ItI=WXN<&_G2`k~Nd4jHwaD&yAC$bLa)r??<{jLq~WE)$@OrH4B%?JyhnfxgC z?~EX>cK7rz-AOrdhpVT%>eM^;e(s{&RQtg4F@Ci0;SKz-t`3})(uW9=(L1!Wo28Sgf_xQdtep7qkTt%9T0r$(95y+c;}H0H04HWJPd-ORQFJZ$WNU`u^9#4U$I+V={q*GV5Nfms7ABw+LN8+ zNPlusyFfpCx#|1Rfi_7t$-DZ;sK)Hrjk?BXt8pQ!?@!LIoOhpBBVN^GnE6$w6G(Wq z0Z2HA?ebb_;$5PfuVj;36lWYr>vd9$GZG#=9nnUgX3t?Nm$9nKP7k&dbMyBsw?v?H*1I&4c@~iW^=eL=^FYoiBXzgV^m4MS9`(SJ^cx)0+h0kJHN14b zbDPig{!$|Mgql38NOaHKlAybg<+?6g%4vRT;q&B*^9I*a*@C`%+^9Kw+N6$43Q|XQ z>J5fLlAQU`u?GUwqHRY;we?5Xhy zRt`%$NR{7*eFs-vYZ%g~zXNskbajrpRgqS>5O;`R1ZDca;_ju3D zABqX(MpVWiYsD~@bQd~QC+?3~x^FkP?J#f5QqxRiG=a{aW5PT1lOqnwQ;L8}Ib zg5pP;o;|)YtH9>5U~7cKhq2Iteq~=r{mwD|v4lgitJDFLOC4RR%Fy|1?Y)bYSY$^* z_5PsydE3=kG39LxUB6UbxZnK9$H(XJL}R5DE~=v%O7N5wCg;3rV#~8^yWr5}?;h*; zOJfJ~6c?5r$~EDW?QUzICtzRxvP^QxSs9mI_-*j(Zn ztGrls1*!S)AP28wQSX1C2sj=nbunNYws^J_%1DT6HZKqzw1uVtn!{kb&`;?I=}DS>@PaX)tv^J7*(g2l|nND zUT^XzzA|fq{Oa1HFOaxnrC+@TB#-7si}~C=zH2$xRy1WFifbDl<5ON3FH(eMQME7U zyg9LU_>@t+rk>9X?GmW)>>7VIutN}e*80w)BZ4^}NglQL1hf6Gjf8yY9^>aGdAx`=rtLh?zisPTOICJ34U**AF$Vi3 z#sy2xrTuBv;W@sUdHcx2YUPf3=8yA;UESIxMAu8ft6J&b2!|a?6ul>|mpTU70JquYi3-`Cex&p*p{a^!Q=MjBqO^ib{-4)aI9c2RoVLD{bi7>yM`sS~Nbl7(5P) zH{2O}Hh}EwX=?0mqOad|8D}+jo@*<6wz=_bzHxkx}#Qef#coS73l3-Z~0V~h_ow)-3L^jiuGlg8AHjpN%F%p0`x-C3X;oj22SU7~^i z{OTs%gOVTfvP5s{vB7G_16|)%Z@$AdgU)0RP6z(>uN;dw>+)$OCE(4Fcezi)_wopd zVS!uU>}aH`*<}2XlNmw!P&aSYn@>JYK~S;mo=T;Cf_*GDhjlf=ujay`VrYm~CQTnQ z_ucp1Co$#NSq|evegI8rRmGJYqF?D(}sqLy?^~cQszKY?5}(kw;%>#J-3Z z#Gsqjt;%L%!7PJ!>#8oa1VhF8FxE=p@hPJ{Y{>M?vV%IT;otX5{G%U#ZDqe3x;Izh zgFK$6N8xQ_7w*dRoQCxw_G40wV=_69sZ)4UL#jUtcJ^=WzArWX%70lszkl6!|M}}G zuI;N`88ei#fEA)5;tegY+N;g=y&zFi58=k{THe|n)Z6;k(5UCD?*0zZ4}hcg`{&qK zwH`^HE1w<8BP$nP35$AGUAxmTHHcfK6PEExlmL%y1_yPUSi-4I=|MV$uQ?eyWnB-4 zyc4lcYftyF*jy{<@&eYb2TP8>T><7`{#VZSh6yx2k*b)`}ETz9Tj^t+bXMkz9l$ED% zFVYg0{N@naeE6MK&I)tN*SP`FbIo;|k2>FfzodMg`Pw(%lqJ=&fm6oAhDq8;>YF8%G$yHMfNVCouuNAX&QY-^Sq^4q-3e>^D+5D2e(Mu zF8TNe{xZvytV5T!XzGjdzO5}Q>G%je))c#)*p-}q!~R@}mK5r;t0?|-qNa4zDlhMw zUBwOlcewx^Ia|qXWGu#aNz~n!zKC&7{k9By)424uZF?`t>>8+=8CPJVtlvDgb}${J zi8dLL4>tL4VB4)2MU~b~R2Z1F)+^sgl?A@^a-Io%Xk4MT`m(9K1O;)H# z%UIBY{@t2p$r(1V{ZdZFfwxG3d1}_7o0JWgs6HLQN0+-LX2HH$K^!d6b-OS#)Z5uBfSn6z=l$y#sly?dwS03 zF*mJ6Kmi#L(e&{=W>@ z-ZgH)>0njsVB5*jDdXk_CRWVyC_X4>Dxq==b6xnIN{@EQf%=Pn&Kp!62PU&~i(K|^ zO&lagk&*QXom#IC^+o=@O0afrkZj_ES>I4IN{PeVgZJf3_jnj}>VI+YY9xhodDeuM z4<Y#PjeXQ_5V0&gLveZp&(%S#v;D1EU|NX>2VS`TnH)c@pcTM8y zDeCD)YS^TAemVgKz#Y^fP9^82iis_^%pZ(9`L78PC$-cp)kp^~0taiou|>!=r?+yK z8XraSmjT0Qxx-Rwx%`i6fT}+w(Bab=lZgEYbQ=G_KOcl(SQX00mWWl#Ho#8W{QYujBuZkhC|{{tG|_ z1!VV~a0Ia*hohL7F?wZI#khU$a=TdJ%cR7XkG$%MFhuRS@D~`&i&)L}M+E_B0$Jea z@Ly3dZrVw6?w|Z%BFN*rdJwy;#*0au1>~D5C~ug_zsUL=9poTR#!i z`leLvaq<4WiS(7X zN#*=dh}+z&!BJKY36b8=wR)v6YnWSY#dVGAyJefUfh!ZSQtYbO)XKOLY1ny0egkWJ z4#b3t6x!?mOnl9R*CabBr+Nu@3@=RS5!9norlS4fF- zT2BcjP(;gMIzryDvVfSR)=0hmzzxn*I{(DST2=GrJxKY3!U?zWmpTMI8sBW_w_s8O zzI9DFwV|bA#Dy;td1|oFe1wf|ID|QFWV0WQaz$eSXVDOFb}-&ExTxAV(kVF_@%Q(o z+pNCp4w8GBF4B^mb_{51+E_tV8CGx}U})$nA#(A%JoD^zpDrL4 za#6~Q7K(in)vSUVHLMWV1qK7tm|ui0Z|G9BPC@(|O^=B#;qV?py5IA<<(PPO-F)dA8Q)l-mw+`t{dol4e z+!m;je@0rQVf}2F?>-y3piP|5@X`i zGq%M*4AsaAH;9Raqo)U0dOo)=^|9)@a^cx*@}os8&vL3k4is?RXMN6x!AP*uiN8%9 z{Jfdu{aGDJ`JIhlE`=6&h-Epk1J=6iGro1}5DBpeZVN-b+|iNItGbrQTGE|M2T`|R zxQrUdW+(D&4cIS83uX>;Z^;XlrNr{ln_2N2MUE}QuaWwP{THoGBJYGtpro%^1&p`I zqYA41=p>pS1?xi(%;Zc1c9xo~pd%FM?bF55>n=c6y&gx+IE2%$HaC-ev7u%#nQ5M1 zbww*qPCDhXq|K?(As)`#Jc-&1BYs7>+SkA-(@)R*=sqLF)OcsLOA@%*5*pwxuG2?nTo0NpZnfK<*-yq0VgVVue+w z!C%3qD}io~?~BUy!5}FgFh#(Lav6%D16O;a+?4V?@*b1r%mO#{UcPP39EOgTs<*Bc z-MK0|B@Agz_+*rhD1u`}gF{%$F4@~CM8AE0K?BvCp_3eQbeQ{%nzR4}@D$Cja5#K; z3tQc{`)a6+Iig1!x!T2=!BKux74s%C!dp(t>ZmGc&5V|l^u+X)o-`M6?ejPc_~Y<@Rk{wG%a9wZEl0f&|%`fvju#dt-sz_a_(N zvD+J?J8@S9+*xU%FPNusIt>NsR}Yp`Gm-ttdtM`o6N(;y?IkO4zDDRiY0sq|LsUJ` zL9{Pt5;Dz0GSxzioa2*zM6Ua+izNh-KhJ z!%+I3>6WWStwFk^7g zavP4)oVw0BH2i#Dqh9nlLMI)U*C2*0LwZBLQMu=4_OV2ZL}te4-Xhiy;tka@!5w3H zTF-f4_@i=C58S2+&=u_CsHWRYOwXFS_q!{ZSCmDd2cjWPQY!tFwIna zE$h*3^Y7+nwck}ic(j0lSPiwL!KL=VVLID~x%cFSHX|Ao$&0m zx8aPw&7~4(WdC?NTyBV@YznA=rTgPyqpru*Fgd~H-ILS$;QZL>U6t|)B$%c$>IRm! z{IsPM+F&6ts+N(+@a=D%X0TCN1NC;0U2*KHlpYqybBT!4d2kEZsi~!E5l`9@inLbC zv}&{x)vEFF*p7 zpovK)T0#ljNe%mHNWDozhRK*`TwlJ7zc8Y>ewaJUeL0^6#*iwuqFKlN>L^GSI&ZJ{ zu>_o7gjC5`ua;B=A{5+DQ2>L@KPLQ9@T;#zhmjWSph1+VFS}7@IucS4{o)Mwc@=lb zM}kl4da$ee)KOVP*atBk>^H1eH3?y6B2_7{lpr`viI9-_OLI@38P6>%BVmL)KZ@Nq zmM-Rf!TPQuZb0Ni5?M_H^gin|=bXS!)ga3GHhkq$u87NVKazA2i7|WQR_-9Jt;&jc zpK*=Q(^PsPnDV)Dd_URz43<_`h*#v#bc*Ly_H;_eRGIxttIQxYqc-3wLj(jz2dY1+w{Z7j+96@wFJY_tp@Bfqy<<$kL5=F@x?Lz zy;vfZ_Q5GSb)09U`vda}IyU!m_T|?|pw{KHX=@RAlf^sksm`P10H{;680KJo-LLks zkY4e(^tzK8U;3`u$={lB>1KJhR)Ht_SktVZN04g*=SkDYRfpd~tr6*nlL6A=_}rq+ zkK&#>NbbH(o>X|4%X!kX?KLQKc=Jfgr;(Vau=HirwZ9-)G&hL6gP*7NO2l2?$4Xj4 zsw?kh>3qgnPlK7QBvD9bX+M`5H`)d^v($7~>9JXTjG@<~-2CuS@%PG~vEn?U5LH`CJi~T3MAvVIrwK zp8sIxQl{wQAK-W*iWNzY&6!`#H%Y71^IdK#h#y`wUuTwxD{5z#Ry&4a()_LiWheso zQ*ULW{I_0HN4aVV*#iFpSHyuF=p0{tAs??h%qCw42Mq~y%5peGzPK>12OjnO3wdW$ z&5gt6z)fB1^LY+k4wgsX5NpC1j#@_%N{oCgBOl3lVS07!MBw1M1Sy3=l`emDJ7fLk5P0-2IhPZf)@q$L2+g)$g^lJ>qfKW?zo>6Z%7vJF zpk<9}e*2^c`W;o*3hSs`0#pqje6m=`6~cKUDH-a#B$QK|j9Nuif@-Hu;fT9~T;Cb` z?qgykh6-a}dnD=*)zYeY-eczZ(ZQ z9RhA0$5krf@qFEmQHtuY7Ab?LUlz4`8nkRGwUmp>_dv1Q!5m+MIx(as;;6OE&Wkde z!)t0cW;;E}8BNDl>m|(e+QBZPnh6xb=MVU&VS}CI4mWuaVT6mVgJpge5+A-u5=u>S zeJh4?2g&+~RxjU$&$5cxg@>gwoYWRf8nFlOBLQOofmC? z-t<;Y#hPzEDWg8smHR2g*KnQzH4!PegtT(03Q*x}X^pE^l_$ZuI?HL$4f^J08pnE; z0?Tvc_dkNeX{dY`)*mt1&VeLQWvXi}CBaKBtjXua^nV10<72I4#GqdS!DkQf6@1NH z*PjbRVj&wS@DJo_-jKZ4NR1xUCG8y&-nQlN@)?4pG6{6iTVTy$ewUC3n((9SEjkI% z3AbeOi}30=BY{CrpZH*H4gz0cI>*Cf^^L_% z`>xt}a;dH2(CTGaQJ6W*%4M(eaD4zDhb zoJ4&NOE25)iyKyC&8L!cZb3WbHPqG%XWe_G)iGl7mFD`q3!kY7nM%TDd{B&bBi1>P zzgK3l2YvY34f1ZQSLwrEw_Q@A1-RpZd{t>ymF9RVq{mK* zcUpbDxh#r}ysP*jby z^+(tvazBaX9sPolR(_(5RL-Mp7sYXdG_&Enh*}9g?~AkJst=VUledU-WC^>w3xxQrhwgS#K2zeXOW>&Jt+86uG@BrOx&9=h#*zqoFI+ZRR`OLo7=99 zaT9TMT9DoKeuH$;-N!aO>hJxVUX)R7;GrC`I6je=oY^MiwkCb;jTJS013~T!18RJ5 z9!qG1HzT&h^E=6i{Td18&yQ|);p=hS4(C^lCbd|wvVHia zf;>;+tv(i59uM2g!bXd#X1nqFBv44|@Tp_0+B__U_5PWET&n1uNWeS4NkrR;#Jm7` z)}Fr_kn}9M&%Jg~^P1u+6Nd%tjoix;dA>;Q=EDa01JZA85??%)*#NiW$X3be*rlJd zDAZKGm1m06X;vJI%713)Kf+sqAf)5ewm~|#n(HsTnu~PG_%>-#qfN47a`>twAEv$A z3x*gtB5V(FqCJaafkIyQNW- z#I1i-tTVl)g~v+R`9*ZB%0qCt1&MwE8+pJ+l;9+jP32T3_pN^3hk}mGr9nx=SJua> z#r2=FDlbG(B*AHWVmkXOL6=~iB%lyM91XAEW=pWauSvB+n?~5z$CSFriLa(u*NKP~ zyF!FaEvAs06}N-^7eJQtkbrwoR@naF0!%J&wt(~G6mCfjC>TomtK;JOXPv+fwvU{+ zzkW9bD{p`HSwiHAMiCuDSCu9x6q^#<6lXa@ltv!r9^|16luD}-B8aWjVmE)lkSee3 z&0EGHo;CIf;z7%8onWcFyDp!Iz{CCR!jwGd$EdWuy<7h7x(}6NBInCRMFP=pFh%Z2 z-S$KHvfMd3q!ToE)-XrJ5WPvt4Fp$tL$#&VS*4ZdQ}e4nXGL^-T3l5a%6uRbaVql2 z+)|E!iM<95a;U`8xV$S=6NE2KoL^l>)f<)N!FweY=8h54A;}x(LN&i7;Ybw`p=4M= zEa#ab{1d7_@_kS$7?%AQ&c#+2MF^Pbd@7b&{pAzuo2Q6R60|Jj#q-W3z+{UGSM*v@ zDsPLbzi!izv_cHMkrlcg83)XCDTJ>CTj!I~`@>v1xIT8il!?Zo>et&el=Ey5^bY7Q zC#9lyK-hlCLbC560YXiaMXp6_KcHiA+tzBW&vB3Y;6<5B9{k1bk>({MDdgSHV&{Xq zz4j<*T&U-dy|(5_JPTbhNeM=1Rh)d0}-xRdo=Cb~(q z%S-=Y?U4yCOoj-h7p;gq8oAD&1p%pMn&OS-6>7H>l0- zdGdL79`|R>BK$4LO;UaIrh5Psc}%oTBTfyuq&`7fTA zk{UT)=jmdtb6AHXmeQQkK`Fzbj0#0mD(3(cpGt~#D5h^j@~d2={)1SN_O+WW(9gQY z!6vGG3gT38pG^hXgiHfnC?uC?7v*?L+HVx*SHByeycYCS#NKzi=NFVs)VO9Kh=^`B z%w6-S8eH)+T8WUm)7^_dOH+YOpfy+EJ$|1vP!&Vx4M6ktPW~`By{1WCWzEsNq+wu$ zb{*%S{UWpsB!)dlxjRuARhck3FMkA~>Nwtg73)}(v;M0l699uZu&xcbB#(w(n7QY` z^=M@|_4We6nL&mp*pb6E2PTVERSB@sOYGR%i2_rz1S-00I>3&lg6`C2P^ew*(&8R9 zde-`RqAUCIM1e;*QEdXA`v(=C`>}|Hn$^`96VaR9p);#-~RLO z%HU+huYW<(D;eowtUHq<2-%jida^K9PBnK1PO+(hIWBTh={?=*YjV;|VQd$Rc#_QI z`-g(sLY%W4Z8zu(xl*^dh+5DQ6cIp20DC!PLTKiNjL`tm*NbS?aw6P;?U+^LHQQGj zh-xo5K>hYX6X9=}jibQEa+wDYEp2TOL%;n}Wd;`~S$fB>Fy7bCVsgGZ)`+2yEGq}qZnvwv2cCo3^c%Jqt1%WAk`IZ+8`?#pn8K9ZqVl*nHzRq~1A zrv@Livbj6QtAn694vJeM??cm}@j4f5p8@KEXhAytDq5TTlE^kJLK8*ZL*&u-#0~tG z-EvWlHUKDEX-s_~XO>7Hy%f-<{f&!@ss;xNTcSy1qCpjBbcRhsC!}xb1ul`gug+&$WAA$|Ve zQHvH*>(^LYh#{3e7O$qYCE(B?&<`yR7p@a=p@a6bQc9+)Vg zdHmNLAS=mrd@FKqia7BL`oH~+A%KjOi8AzsPgIC_ZLk<^J`9S9h(U@)mJZ`Xa4a+T z+<48Nh7@>l5=Io9$6J`=Rr@}c_Z|E(SSpFt=8_Hg75_uYbuxWvK85r0ZkkfPKD#0* z2a|1LKX+S2&*vyRoYE{K=$V0C!LN@se->!3h{xM2|CEKn29?h-8C zzE`m~3q4p=fS%#LU;G~h!sUkjej%58?U_(~ zos2ozUwHZpAZo*rg4|dET5n`}af^s^e0}$2i2!k64q#Nc{9Uu(r~x)?jXN^Pqafal+pZ?Hq~ z9FUYk5R``J9wOFTohmb8*2xbsi&c1pf7`HpFKfrL)>at^xXf*uU%z#3UpZbmd@<2| zKodJ~#-z~p;0D|&P+$TN(c}gEtAo8QKGj;;qSVz${ujU&KvSw2Y>)19pk)6FJ-aNa zrxKYK&zQ&mvGsT}3cvyofryz7eXOiCY-SB8y0wr93wLT}eyG2NHURF*nELAZE$qRK zGKs?tnL%qITgSEehJY(dRJd^Cscpq4szIT>AJpPy?V|C-_uRZ^<5lew-(Vvacol7Q zL|q2mv~WDqGFY%~`sGL&Y04uC%*h_-S^%QeW_LOBtR~pByKM_dtt5`;OowHO4i9|Z zR8v)$*E>k=Lay~)dxX&FQi`^6dyeIn5|~K+6GZzxIt1*V6a0DJOnE9Nxr>QOnJCEu6hNy9)NG*4LZF4a9w6}1AO$amP&}7fU%_#@pKx> zUvhzs6uVf;D*(}EoI!BOa?v*g(V798b87&%WA;6;VULq(H0iL>rk`*8LNY-a zNHoWTPf@AfA|Exr{|R_1p~xdp7u*d}FlU_712|S7L%$9`hE%$Yb6xCr4gKVf0Y;X$ zKFan$N27h3zbR6HaMp;j)c(D>(N5RDJvZ>D#T#?Lpz3E_ALV9GR|VDwMbD!T#yb?= zD&qt>z@-9FlT{|<=EXcw2_%ej*seH!0BNoEbcQ2f0F85X*6J|ufRzXiRDmFoxUWNb za;Vc#MvXy5*9311WN(#U_+v|LlC2i1upTvNQYZ3{`#94KC5NFjnqXT9bi1bj=U4}u z1NFzLUb|4nT+uHyw{d1z@umq@-eF+9|IYOK7v|rjGGN`MOF84z9l%=zw+PL@09i`& z0H6?gFZ+dfg|h2z*-rA#{)_yR{5OEnN&XwyD}SLfq5LKZQ3K`G&A1ybV=AJ){V5$v z@mY{G!Fv1y5ZC@Y0c-y+JS!J)SOk^Ke|TZmRkYau<=o+&N`Qemj`x)rfVF|L>VO_V z7$ww3*NYE=oP?V0Ct(pKYTdz4a3)bSwkrX*g50orLTkVQLlyj+0|o+Vf}k`>G1GL# z0ZzsLYVJ>00HZT}5*&$$_0<1&urW@DoJ1YyRZcnuXc(UPBH@3DyGe#2iY+tHa@0i0 zc7VPIfO=y{%1eLvT3`S;qe|3_d2?o|b=kLKZ{IY&=^QsBVhwnF-TZK2ZIv<$s*OFa zUmVS{LN>lZ_6=O9Yi#Mfu-C9kZBaMt)W&u;Z}{w(vj_GI^NxwhHeTxc<;;_z0l(9i za_F0^*4+OwHgD76m%H)sEV~6ciudTqttG4dU4u6*p$}VqxnAb|)I9l#<;)M0&vq_9 zzpHEK;g|FA8>XFFz|u7fpN)^1`*yX5>g$@@^v^0ccFC$%;)16ZU?F7wXgErh^LG8rcT344tsA~FmuSr^LXOnzu$drC*HHH z82WsqTj}`ZBA;~DSWlZ=SG?i8_i;uV1~WSh{apYc*B1?Ii~mWku)nt4;YP+Eyh*p5 ziE4SgHvlxn(MO*&UjMC9A8Xzp15I$@8_V^0_Oc(CFJ9*~+LqjTvi4!`S1FMYt;Gh~{U;Q~2V@P)ZsEz^V{;rht zYErE}$1M)mQGt*5?g6$N7Z^Bn!!)f4fiHH?pK#UR(`{niu$|C#)A8=Or!zwP|A?^F ziVeTg2odX-|!wxojM_mVcY!qgnX2&Q10m~oOl#OitnzUy- z@JCpK#)4c=Olbe=AcrS@q74YrDjm zM~=AUw{rr3{k~$CRNXVBf~j20XQezsBgaMaQ44blc(T^*?hnV6|18!~fAV?VFglS# zlD4IpgC>w7IE@J$-s4K(xBe)dy=>+dC(c`ca>G`c+N^1{8T z0n6Sr?L*Y=|Dl7v*P-+qmjO(A=V_8-Gjv>`1%34%c$EWQ{lm$2prGOw&}&$t;TJUx zJaIU2KI`&7LftVBY$3IScg#%vj|I6Xg7EEi(93~pfSkczvU4KB0`Tb6l_BdBLtvCb z1V$M+_Q4WmyBR?J19>;h%6tAmVf);Lves`J5OVLnLwfftfF|lCxp{k%&i(`FZNbYUPA&m6e;w1RU)(k4Z{?;L-h76C4SW+E{h*u@g+^kslQj4f zar~LBtf$2@519J^Zf?qMbhQbSOj{GgzY4x2`^PA%$!CoP1$+R>)$6v=joVSfopG4T zopEXfST7VmtZH`?4b?_ILn)|DX>&kXczT|ks<1oh3&_=~Q%pLQ?gx}*rRSY+JHKS- z9d0A=`JB}rCe4rY_a}V`7$f|t!VNFd0KfmB=|VE+>)YKlEhf%s9-%I8Q~DfGrgx=C zG5V15js+}>%SDPSBTlOAO}*E4AJ|K|gE{Z=tS$4_+U&Q@UvGDFN-Ycn-ZE` z$_DRQ#XQIV*d^01(X+o?Ab7WIL5}5B&dn7Lk{!R#?O<+QYIfOrr2EgZ@Hh7A>c z``_W#+x95ABQ^Lkg}tedN&^q>rEi%v#90-wZin`>%?ol|u4elDI9qY$_r)E|eOEJ~ zY&<+Q;;_;k2ff;@5_eK9^JRed9j<<&7ety>=X&l=>)F4`!ZVX>nx~zR3{LyLN5=T% z&O1>r9h@du?I9oVdttiqu;LJBi>uCMQf|A_>=~i1g%^}9M{d1bz#@1KPq#9HjJyud zykorX@W#!z#vG>_$dR@OCU;i8Ut3HBUw87r1TJ7rNe(ERvU#^`X1d~9h4kNsRNn9W w&w&5f;Xioz|9o6v{*pXJ`v-6yaAUw&H99{>OV literal 20533 zcmeIacT|&G*Ds0{6$J}LMLzQ1Ovm)kNb9kCj-rDYT(BXcO6wlhN7-hv*16w?QUq?U|=YTVIn`+ z1K!=xR@YMo&qZ`%XrCDvyuT|z;5Q$A!GGFsVCS*R^V@}cZ>~Rhomn+f-hxf~&~)S& zduV(i#|f@`R_+XP4|8jVyn+(i^=VnjwSi!_=ZS|L5rpG7bzf_7)Dlx9^%qrj&E2`d`!z=NG)9WoW}7 z>%idkjlm+9;ik8~xs#OqEe4r~3<`Evq;4>{w=vvHXSnXlpcTmgsb!FU$aIjI!L6A= z_a%dVJcC0u!wnAx>tcpmfedC@47Y7-)t1LC2hsZ0BR?GJ-@vhp}scE9T_V|NAyjwAHH zJK8R+C@?T+?!A5UhMu?i;;2RpZ%h1#@kZ035N^M7J4RpbxrMqVG5omS-r>Qa?=m8_ zzZ4%A7aNw@hZQKhkZG{bQMkykjl3ytn*6!~dhY|G?&dn#-^htoSvV;0~@|e&2UQR%FZp#0s37+-iWk zv;xI^>v1f2Y=1p7b#2@xC);87WlY4eJOg8hdxO=S5(iK9^r=mO?mX!hZHS!vEbf~u z=BidQw_oS0@74$<2CKtMwY~x}S6hXht)@+GE82I$6BWpB=Cn!QhMp!`?&9x$_{m_m zmc3k26lKnQpXnvJM-<(T+kv4BDrbg$)(pKKCVILl!Sbg~lGRJJA3__f@{|@iig;>S zIThUurmi*LnST!F9{7@WhgFf|4vQ(}Ak%JylHe=<8g`Gs&Cz+M*Wzt_4w9Gf4~#sbFY1cZZ|U!?1MMkl8I%4$g$mm3eS4V2>H#FV1*gcH9?`!JozpOWa5T5Fb&pDBA3;Fb@ob^@T z;&T$eMcBJ(^YgrVQHNb)wZ%t@#;y4hG<%(#I@xs2h1tN-uJN1u@(VObW$&i)lpWc{ zZ20v0c8JBX$?=FPj>?_Axj?&X?tDe=tgNBA8UG-!>6tq_2!=nbRPr_(Eql1_K7||V z3qix!=BVTHaa<`omx>P?O9`u#X8s(@6<=A1u5Y^{?H1_H!Q~H`o@^XqJ8vFZ1K z%-0SJX)`aRFtc;>ku6!Z4CSB&uM4NzdUVt^;e1P({%1;G`$Yvw>*?*K1eP6B<8y#l z{(OInwaqzaDro44{G6a(z`3|nhMitovAHKZdB;mM2Tc}>6f2Jh37@)CIHLPSXMMN6 zEW6|2@)?-vQA;1uezOeWXBt1=Y3g4!{gQH4SNsdU$?_Y!|LCtXyx$91Z-vZ$Y%7!5 zywpAOh1hB4@vG2A#PgDu{P^7LVq%42e`&?#QdJ1zX-La{#BpR_a+^-)v%=ZygpZfb z<)V)f#9&T3t%RG0sZWV zr_Zh!dB6D;aaZ2#t{R)J_q5Xyxp;M;=BE0iAs4yt0!n^Sg?_Lhkesf2S#mM(&J?v72T8vvrsX>DJ8CKm4SwWeu z#NH)Kj9!PtRp^i2G}ct+TOkXr;e(C@*4M~vIVR18xm?+tcedTb2lRP&JD!UZM7W3& zpCjL)hq;PgoV^h_TsRd}#+&W?VGE01Y+{D3yz7Sr{z4;v`k9*nVy;ij+pu0&No)S! z;tv`wTb@={Y6z(loZGNJajWO>WyRCVrSI;3*FkbAD0~Yc&8&Y37&Lq*8WP}e$?goF zf~{;{s|GeX)lIPTtnTM_WFT8}kd06e}T1Uy9P&+}j}8r-DDT zwzlWg=Ny{iV~_BHOlXGR%vkV}_W7RpE+j7|_~is)vO)TO%&+Y02R8F2peHk&HDV8Y zBKbuk1kz>w9e7svwBW8Pj^2*__`LMP)YC53DqeO$PY)m)taAe) zhn!4%67Y;)>X5vGhO0L?n6sGM_}~_(m3UT<5WVu0;}Ls!u2^I|u7h_6@YJ7LBoc<-@FQwls3z&yB3_R4zZp4a}!2XGjF&7D_Du78rHBTX>2KHxp{WGedH;)m#cF-h+~W{Mk!I{$9E!8^r35yywWo8Gf3uAHXy}WZ~xoM007_l{q za$IK%Kp?+ce>m45xGel)_ORZ`p59iQlH3`!sqt*~`4VmJ`&Cxqq1i!(NUMsm>C!j7+iV0a6g#r9SiGyl7;aBda2De~zW#mx%=lE}Jj+PIP85>V*b- z*VW`nGnM#=!9Mr$hTmsrGn6Oc2f}k+;54Q#R+Y=d2ETvO-JUqp67TB;tPQUACm@FM z-s^f(+#>9W(d|~cNH%{V0ZsL~gEwcz9zZW;ebwvucMocNb*JL&DFNFWR_>QFh9Wn^ zk7**kuOBh;R_9h5$uKDRx&RrRyoJVz8YH=oIcV6fr1x?R12voo3FC!rT{KmLYqy6N0NFOmb!SBzj@ROx!92rPvm``1g)T z?0+K5&BBbX5_l#2pjP$`+TRCF1pBLRiB_#O_8`IcX#3 zGk;1XBBzl*ca-StRw|5aHQ9XqBv)PW^WsMxp98{+T~=xhdg39s0rAoG$>qc04FwWh zy!qSk(iMsrDAvy#ka@u(dWckx~ZJMz}>6|SELd_28^bx+;Z%WFKx#K!UqnN?@p zQQBgV!4$_L3~9G;KVy4`FM5Tf1h9p_b=M=_!DSyS%PnL`lWFc)>VcJ{q4xn-x^c64 zvRRvvb=61nl)c4g1+N&}U)tO?pBeC-Bit#DIf>_F+;VwYm_g}a?Uvc!7A8MD@k)~P zI>Y*X_{A!ndP&SIQ$)?mppGcpO5?(Z&&uJhKCb5N%twE3FS!Zk8MTMu<8SqjZ@IcZ z{9?{M!7S}zePzpj=Nw-DhLpUeq=J_RbOoKQ&Ix2sgg26pXjaZYT56c>u@NHa7>mbz zdO12RX7R=ndBnKKpwU*^BX2NBU<&P!jy{=t96Id8o$^k2(kfS6plb0Ymf)eErjy4u zJ|tFu?-}E(uFJ1N=6){B9RC3C(UZ(VD&f7obonEyorEJgBapi+v-UlE$ac(79%i1> z2KF~MNY+o*_Vw&X+$IOQl(NNTF1f~@eZyl~FSKTr<>B{JzK!E-{!k)+-mapwvl$Xe zS;yKfiOwXANtqx$LWpBbMDV+bb-Pe$V^8S|ENJ_OqWih{wB1+Ur4o+^DlaKw&#Iiu=o_B%9}9OtE{7hfKj{W!dpE87RQsRW=( z?uE4Iq?gBs04V?X4dumTo+ERWafaJyUa?$$Y}94-tkB?$&lJa3i0)9_7QEkpOiE7z zjeLtfx$@#-XY_%QqO%KUbM^H6Z<}trKK^w;)En(|M#Xb_d&@j5jSB`-VH}kU>TB9} zYTELI-ai)cHty%a>W`n^<9|j(vnGcz*mrqf@t|KWzM)??>mIvs1WL#8fRV8r#-?5K zgWnn3;Omi9iU+F-@3I#PvO^MLjLy7J)NNfnfE;#T?rJ-Br-FQQ-aUGaoHQ;7wzM|F zu#z2P%dO#8T$W6_{c(9pb*#`V@~=G6Rz;>QSc|PmpDQBo^l`eBQ)aX;zC^pN&G?s| zh%%*2JLsx@{ZU<^07l~mr|j!qtKQjVZ>%%?i{-@i`y_7mrg=nSru#Rw zMUX32rJ1EhHdH-=!vr#Gss;d61SG$C2`qgf>2UeqF3IcEdP>cdXnUO5ute3-9kQ3DLYBA{)N}G z(unx(%OQ#mm#QiB5Oo1PZ`1E@Xb=Z7jvlp^{PAh=0FhnjnXAH>ky={}lII+ zC4#9&?3dQ3TZT&$=jvZ9UV7Mf#*K3$)l*EN?b%b-Um$gO9 zykhME@{-`mv&Mq3Tf;ID(`)`%y-3EaTgxxrM%%3U5A-V8toqq{=$QMFvSLeUn+T7+wdjQZ(+YaKhUNUF0;PVz(6sTZ^ABd* zoi<=n`I_wYr)eTI9`h15R1AhGr-9Z@<}okjPN*MwMhh*QvmR%{)9|!$wiWJZMrt|b z+G=g^iir5#;&IS3in}YnSi}*Et$8j z!M?J{n}3&S4~G%S(3BW>~AKX4iV0{yQU&rD-{emVt2|<^M+ryi%9R)LQ&=x zSFxYvkg>3}2}v_Wf$H5CJ@!ZCN&XzaZsp|ReZ;(syLx?h;+))&e6JDO@fED^eEB=I z7mA7BK6D{icp59ht}x4qjKh_#qPqB+I!jdsYLCpf;BsX@|KlTStrH48E4?JUuWj%$$mn2dX+Ki1H_8!VM#u;yTQ^h6H*i|AdhI?7!4D? zallM5b1u(&5UlA=Te<|c6bu_ZIlJx>Qs>p}8=qth^Sb*E^+xc4=YW8|{M+#t) zeht?c9Xs7e&Q` zbtKvlL}JNr4*H3buNDmmD@|$Ym5e1C)J~yKe@RZ1oW~SaQ{|N|pp(!SXwwO%zpXGw zPHFYZFG2)`f!Qis5ueTvgl}s?nr2%%8jcjcs9wqG^a|##R`h3m>l*!mi~O&gI{xvZ zpR-{TdWF5_z37m0`M)g>7!&lm{h)Nz9*AP{sBq@!`)}vP^Hy9gpbL!_UN&0S^hgjT z;gk3N7GJ&6#4|PM@=){0KVEEU%&J7~z_!9hUP6?&6`cyZGUSZ3Or$INKZ0yS<^P67 zxD_`0ugf2>>)-!hTEJ5w!mLi~S*us36W+zSwc>9_PIiP_{vVqyZ`+;zVb8g!`;?j! z3JVuQ{;w|*VWyMhC^`JUIgG&nImoLuZzMZfIsXIwWBX8ul#;>o|9=+5MQkY0-*0e1 zOKQ&!5CLYd4F$SMIj{4*33>wn(yCH+OBHq>M8i*asdcomj4lL8s}e?e>eF9&)*Jc+ zgdfTUG|k)1`?AZX3N7T-i_FV3R4>nQ5ObYh!XPtTbL1M5HEAFwl;%%FM}s8gGB?NrL6ive35)$yUVGRpx%qxNopHZdHI*2EoqaVb zVS#QN-G_=RIB5H@XH*_g3v(1iL7W;nO+)p_d?!M2Yq*w)XPs;Cml&??5gNNj9Rr>2 z@e`rDjzSrA`W3?r}dAip9e9n*RIqFJHRRN4I?iXax6Ae zn1=ekB}g?EbI&(4Wg3H!C|eY=D97B%K59mnqPTKuE@AB^H6S{V`uVNei(WY(yNsU8 z&4D$Xg#x$y@T&5$RF|^B^I0v{=#FB^dX%)kVH@7XY>SsHcOU_@>H*cs4vpBKgE)dh z3=B?K`%R#&_7Vvv+BSDR6~1u?OE%HMX=5=I6aq$>m=-xXkI7$fDP1&xSDG4KWiEiF zzc1WUgGVRg>Ke0TJ3`W8zSM|jZUuX_SZD|r#N%FlUt`=0QiUQSJbNs|m$$kQhPLSY zxE$AVpW+u)r%|~`_9a0U3;j9X^V3iRTQW;eW2${aIj1nY3OtPqV8tcy*7bcW5HK0* z`qpI8M0n8_9139Q3Smj?koV7~O~OgiYeyH_kWS1R4(qV6W!6!=i&I^b1|E0A77bKQ zUfS}s;!290nj9Wym-{bNN^2?}#x!A6wM4308MUrC?E-qKENgspjC~%{-7~b!*c4_H zFgA&4>ZpX4Qv=8|hP#OTZ}jc$id=Y?)H)?B+3#(IFa+%A>XnAxu@sYDG+Y;t z+Y?UOGH58-#Ex#z(s>LM#4M%WgRb3})=G=f;d&dD0$8`h(iZzaiEz|dh6_~=<%q6* z7=$sS@92vWQ!DdFUi=%8FK_Swf<=T~Ui9Pm{8zdak{o%|ccls!E^-RYW87bFtsL%6 zEv$gfq`-KX$2}Mu0GUiHg0Tkm6@e8e&~3^}B%3(=X3d4sub&PgJ|e+>0ATLQ?>YRb zh2>jwB$`(U;S%=;Lbp6Y#LJs=%-W75V?FuL<$%t{*IYVRoIpgL=|C9M(sa{6{&?$d zIt&L)P_EBNM}3PmDL3hXOAOgh(|s%29O*_>tTTI3g=(mEQu9Ojz~mqPDInM=5(#3p ztzGNTuST@AzL70NOs=?O)hS`fHKv|}+;r<%mC6lQs8Ho{K5aXOIc;pLXaFIZLIoIT z=3c=qmi&3yg@D5WS|{$8anm`mqSjHkF5_|6I{(E-KdiWnui+YO<$$SfQ0w;oQRybx zZ(tsS9u@fu*B0vY2MlcqMELX;wi-8~nR8Jus1$5C77fDdkv2qnW6FXfEHrWrcWsI& z`Ipu|-lo=__^k?ukLf}e{ub}cic29K#u#ggUk%A7XiJr=UlH(@O~RY)ReG<{#<&$| zbjIk?n*~<-{8yF;Gbx0*tnMrYO3=jP8kS!CQNvd(=8j(|sSOy&+=}OwQy`6adlJJ0 z5a0kMN+M|fhdR?GZA#R_wW(&N5H#itu-$J{#dag&*O@`2F!>iPIF^q@|C=#EuG0;Z z1eqb2LvD~y{ckAzJptzf;8p?ZmF?-jMySjuh<}N97C{HyhZP(r;NKIW?pogo(#TYL z&iog&H_0jKH1nrxxT{_-VFG63Z7*O!B^pudHC`Iq=yy7|S|m!oLBp$(BfvAhhpB)D-Dz zUqEwA5Yp4deW`V%?bvdShUx=50{!R_3Ggeu;(|h8HJ)4AOS1IOSEfi&H-Oj%? zrbr$A;LGd$iCWii&R%sMGajk>v4!mC_b0l5V@-82*>C&Zw>6oozLWGdcxh=sZF1GY z5c@^2bpxe3_j{JiOZ74hkZhB?$SDA|+n%8uKrIBEMgT;D(4^-5A;qRnf!MYQP6s3(Z0OYRL8>>)9Z$YVb zJ5UJ2Vb#PJpAyNWXY&}75s_nWT%gnk-LB2NbPtsSI{Y27PzcUZLuy^h8aSwM^lk3% zJ4l3olq&=w##9M{)2=%LH>1@P+pD$-IGvt#{_QpI_ykW$4s>^wn_%Rp(slm4hJb;U)lt|^;HSp1jRr$Pa5|#EbTx@0@}!MpWj@4YMDtIt9RR}cSr&6S|IJ>A4T^#dkM&RkPvg8JKZf@$#PB$6J^-Thakn!2tFC;-L zsa|v7HN;M!*4KNZ+0i@{BIwKkHjJyQjF@_6+_xBo`U4qia`LjZ5}a3@Yn;zGa~woa z>q3Rk$f$~?uHcYk<5N71o`i{s>L>hbdo2|F=jPmMt|K?$ekW)fFKXR-A}V4qR>d%c zq+)FAI`W?FAg(dQc91(T#D!de5)CY)$_@1L_@5j*-Lyx9kO_k#_Khlz2psXP zN;gak=e+8GZHJvt^TCHLold@KFs{4e_{$3jfB{_Wa_C^<{wX zPYKi?_u%mP!B?$4}A4Jb({z5jqi%cP$%M)kSuZ&p;z;x(;9h0XpoK4GOq01`DL*AKDA8fosDR9GS?)A zwn4HuDgQva8v!FIEcI@lF}qiG-MYA<8{yZA?Jn*~fEi8@IB@a--Wwb3vsaYMuK!wu zPRniL^JQt3<5gy-Qwlw1j#`G^r*h6=SgvAnukk^>rV*~CL22f}YUX#8aH8!93+l{f z5C$F5n!M+o)>y#$ujQJ763MFcHJ7H^a~YFaF*^cJ8t~da`C+p$xtTM~AlV?V5Qt!N zEY|vI?9hhjT=NU8_LgbFViaiei7;wm77UnCfh6!XvZFZQRob4QMA}4C`s>@(b*Pig z^w2wu#}zBJ`VdoLQ#{;b#F$fEJA3ATwXQ)G-Y=s^6C%)iTx@_tjKAmh`Umx4R5Px?NsxkoE{ zbe42aHW0trkL#QtfBDw<^yS5kK9?~v(Vf&=5g53rEG4!>3$Gw}xzjfEB!aOU(K$mA z=^Hi#skGXBie#}xa)VDbD*U>2QAPI(B#P`8&qjp%w9CWRrV$H^F&k=PdDpFX;>-i^ zsq@zP%On*d+&}UDUR4F(6!?Sp%QF5s&Kpb1#0tJyWKR140+ZA}QzKcdP|~NIC&vOh6|Kuv&yhrM=xUtk*3bnF(GLw~jshVr~9^^PZ!>f^{QBzNJjrtLL zJ5m>l@22cI+ZR#IQeRiO%lkNDg0g}|A+lC*AY-BQiPTH!CBCTdGbh4VJM%Bo%on)w z$Y}93g-=1BKFV7hyg9AtG4UyxVPova7z(iqO;+E_3cH%%5IXHCyvtZ;Rb%*pG`g8g zy6sAqZ_}#GNnQY)wqj`bL`0~i6_txT_FesH)br%$Noo-Gu)r{x1?!%KuLwhjb_6fF zwsU^b4!53FNn95^ocw7BXF6`um;P*72H0q*JG~tUZ>D&%PL&HW%E}wJn@gUKTN5f* za>Q3tvt{h*j`M_8*%$ufe#e?*pUxjza-zt5By@JD9Yeo9kzfH!VXSw5@^v9_7E+Rt z#)H7fha5ZhZ9G)23H4(Idnk}fvY-;-+C?iko3)DdWEK*{>CEBe2+_#t@iKO|k!bWD zuM)F9^wpq8kUn1Clgv3sJx8u3!sj+67D<8U`2m$89dGq14TzDYQt&|-s|oc#$A zBE65JRS4RgP7%=L$oRw$veiN%T9-UxT^ThwDimvcx@~O#t6TaLaJ2AYP^$3Sf2er0 z(}SWJ6@|ww6nUfcH`D}3a_4RG(}kOkBj9T|?b5dKVULWm>*Aww5yuub^4N==$A6u9 zlk~XAcvgFY;7uf8sKj>6Jdfxn^1YNp1BWKy&tJicQ3)`+bc-t*G89rlcDlcV!fw;O z?-o*%Fbasf)KR$F@rSny-4k8?IfZ>La=@sv^OriZ)>1XH^RJ8ZAaDREaRm!rpORVX zjQ8E_n^5278Q|pD0EB)CoFc={;0`rFaXq6#Jvm(vqaadTp_LO8yD1C<*4N@VGmjal zlA=*H);Fv7lo_A)y%tbw--a-QABHmpui%Qz8nqFyLO-g|sJAec?Bi84qQwAQG*ny= zx#dJkt(Pk{E+xN9Ht*iqLj!q4qDa6I^RB`2beyg-jqb|! z+Oab>*)KHWTO?+k?&7UmVbqZX)@+?^3@^1S!aR!2nl5K5C1apR*g z>-vYD3??=&jyU6SCDf7(F+47drO-yW8?l%w;^#2rh4tG|(Ay#7T%*?B(MhRTH(S{N zS@8(a34($WU+S)hksGLw?hrHwW0(TgJ=s6bR;KtTLl-ANPVi}-rEz1CS=1zvL2$5t zlb}uL?#E)*L%(p#(43h>Bw|M z;jZjC3p<&|oEFI!w5X#!hlvDyDC#n#s6wPMYt5||HTU@9CX4alj**QErjSDul0?GD z6cL_oZJb`6;=JxuAFqK=y2(rHU?U?O>Vmvk)?Sm1^G)A+z~H1m&U z=!J2wx(2gC7;RRpUcRB-FvbE#*=U2`Zr?o?K*X|ouN+s1#!oMg;t*mQYbmM&aXdVf zHlvZQMLUY$hvsS@su`^);k;0~0&FcQ(0gzt5tW_?S;vh*srpvCZAOeZ7Zhw2BD}R?jmaqw?gml{2XOR`Dqu&Et{>1sib8uY2MfoRc$V)>xO^7%pxwGex8p;A(S5MuH&d-2MKlxstYz*dz~6^lt>7Yo5Dc*&;KH>Y+u*W zFAO>^pkXAe2<-sU3shBaQtRmFFz2!JrjYXP^n7#L()w9YIsrArTs%$oR@=#{6fD$T0-!fQOP z5>s9&h(J|#*S8`PU%-l?hGsj{6A+H3Cf7<5x2O>%kiE%1I30s1h|`xjYIe z!xy^WpIUo26~E{TEUC~ zTGJE~Er3(FIe&6sxHG4Z3Dg`nr!k3$c`)F;2ZiJnR}6zT0#Z3UDh@*myNt5oTVi65S%bMmZ3t;Dr>j-}B!EH*7a&Kap^H9+PT*3lPs# z3{I)KtaOGK>?r}qba1XogwiGap05`69Y%fgyJ}SZrh_Eqs}_aX*5D*&9#BUmbf;s4 zN%f$tBrI|Pi0hF=w9AD1Qv=$)He|tJLb@1cL2d>>I|>Yaew(#J%g7@CUlP%i7^km@ z5MZyD-ig}dE7+(xvfqm}oF*u#DS4OVpRCKefCe!0U?CEa`=#bF0{fx+ucY`>$q9tT z??4$oV!--JtJb!e@Bpf-n7K_g%6W)69h8Ywsdb>tIq(CE7&r~;b03hxpORrE3#qct z3-&Cp0DCD@113CaRVi69&fkkfTsd+PR z!w$go_rkU%5V18cBbxI~st_nu##>hhV{^N~Wj5|AU4oz1X*_ixhrbId3!Z^7!f7i& z3ojeja3-KH27qIH4=D0P<=au)+sB?Sbi*)}AXtFf5gxbpZ0@L6J+&@?ht3$_&uz+b zAh{=nTmuSzw-X6%;E{(-qAU9!j_8DjLSCs{b)D8GQ`l~B!~lT-Ob4OYbM;pinI*3Q zrY6E)T~qMpETvHg`3c=1NfF1yT-o&6uM~wLff8_iOcgLBGa$5D>p(cHCcJh8g+0E} z8`J=w;*L$i9pFsy;4Qs~h{_5$B-ynqxwR63Qfd9|ojGsS><6yWxHGmV61f5pQE;0y ztm;y@RfE!23%fHK#+Y&BuD|=e?<&fQAj5Vc;ZS1 z3W2=h3UE{9F%7#hw+K2B!pNjZHJO8S=Uv+*>>~hSw_;vP&fQZYY9wJUI&Oed#=_{1 zn*}NQ!aj+iW9u!D&8wU$_i`P#`qBm$yoOVm#597vh0;^J7k?MDo&aNtdr*Y}Gp!Wn zF`=N8W^cZ5@2c-Bm?SSvexjEd2p;cMN0n=&tkf9M*x{LLI6Bcnf_9EwN`e_Xn<}IvdMAakc-|Fzep06E+GAPNVr_65eV&W-gu6deF4GNxNnj) zaL4;v;i>oK96bG~BLkApA5PD3^RQt*O@12pjE>BybP&PZ>qt-A)6libr9|k!U9bZ{ zl7{NqeqWznMER6*HFq5uyq4Bp2P+{$rIc>`eC1T=l@1diRN94iY)Vdp82{Qc%`vpZ zeYaOM;nj)SP9DTgVRiq~!v3Wdm#J#6{RJ?qqAmm|xm=x>9^w|FRYEYfzbbh*KFnjF zkI8Ei`^Z95zj$uvIaP@zd#%+QXKEtZwN;f&^Z%PGq z{L#5UJWgp-bFl?P0ZApQ9Jr#(0^Kb18NeGp_L}DFRJqC`Gew*UiUV9a90tnwQ~(#q z%b?kY7i7&PR3XqT1@L%p5<~AW_pb@j0;4yfCNTblF8z9!8xTY|ve$1e! z2DCIaZ^G#fNWf)AwWytz1E;|=)F-ulAxFNQKlrW-_?|PJOECHFf1O+i??P`Piv53p zbC*D>-{F7ADXmqRp2nO>9>*dWZ)|D3u}>9o@~i52fi&o_0tv@GkgsK)Xkcux-Wpny zzJ?p4y%*h9({}F>u*4t$OPxZp@VP` z^Hb?fE_7p#b_-n#JZE!wyDtkU67x)v?{9fUzhk?J@rR#+05BhY0sZ$VPbYqW&FD2; z#UB>7o1(U11ndvSaHF|KUxM8K;MU{<7tp`a@&^{m080M~s%?b+K}6c`cK9E_wxKv0zPsljMxV-6If&9G614fAdV+S;<2%iE zcD;*@881R1+;&A`WF++j-m4uy7Uh2sTq8tr-Y1WJ%D8vNtTD-c62!h|g3Y*8URtxU zI3C>7D6vlvx?*7yf+vZ`zaq{=Ec<~>$Bi9~oy5FAZq&I?Vx%Heu*TkrXU(JJ!KqE=k`ZUqQbz|>zIdawX4o4cGw4$K~1e+=FUt+)(mvS_K7 z=sy645<>HuHEMqQ+Vatuy0{b_;C7gP5{gG z=YV(4u7DUV|C>|HqG0+%jC$3R<|;RE0=j9G(N$hhv{WFM`K@KNUdfgvYUjq6>2$m;fX}L2sY%g8=}hs@v3nA6K#o zPXS0lms;QX1x|od_*X;>oO)ht@GxBxOY1DP!D~R0O*pT-wXX$`q6h{qtv~t!xPxXP z1<}5G5isk399?7uKBKkKQ6QLnrg5cH)ex|M|>=s$o(GrIV!sGX9%@%#|AO zwq#5O%yz5`%q9*1aYKS;o5e(@N};n%r?LkF_e>DRo=*e0qyZRDC&Lunat=mf{P=*f z&+`LtJ-rWzLg2~{ZgSS@?jHe`FdK9(v6TyfRqb_YoNEra+E+$Te-eE zutm4We#7V=9{byXbZ%1&!X&M?_p!$jY;V;*-xkL|ITd5*KN(jUerf`~S8L!PAe`&@ zs`>~?DQ!9iZ+r28Y%m^vP0lPRP#m9e3Kji>QQj_m=LDSDWnfGxN3Cj?IKH8P^Rsdw z`QU5OK*){6$JlRQRm-L^n^t*ICnw-1J@$L=jq;but}vHymzOWB!7_IqN34OxFP|hn zX66xg2r#6*;0IrGgbEhkp=LkHD{cDAWp9r`N$|1>TlH>10Mps~!w~+oW(0GXawMkh z+xh#?ROCOfgjy-NUsc^EGe=)!#yo{YE^47(kr?To^Y;OS-#8VvY=)}J4=NYIGj85igFP72klDy_XPMRhP9Za2*x}XCK@4&Sj)3?6zU#IO!)a*`}nm9 zJL|VP=K@;?5fYBLVlSz`mf<-rP4|b=B;Ufn+DVt}K~H}?c>C(rX1Uj?43B)TzBRsu z|N55pwFh|j@H|ol9Vu=4b^q*~+^-$ii57cwgL$<^V{x9WJGV!oVVr04#No>eYN|_A z$X5lW$>?|YvN8@WEv*gfH@?W%x%Dr*3N+#W`BKm_m;9fCfG<{0zy(<6c1 z_`$)!Xl@(2mf*Vq#d_dg}S51ZS5>z+5(9S_xv|JN z@r;J@M5Ls;6HL{^cOCiq2L>$8PaT%_9Cd#5=?lxt6Ed@~#8nX;nYDZsgzmOfnhnQj zYs=2d%R9ZX;hG+&Z6z)){#srhoq~dblZ$I&`43*7OFFu*6KQGb?6EsR zqD?I=vjqHC(gH_zG$xmI!*1u4(@;?*kC`@lV=s-BF_JsX~hs5@Ncv0bZ!>r-5_2uMv&pZl@+MMzeb03s#XYp}4e zkkfMh+D7$(`g>hnSfuQIMGKcWGG2SUu`;t4`udLupQv8r;o-?1i;RkzON&w$ba3GM z%&37wL6Hb&EG)b`MfLdcjmPpiPglup88kID?e|CYX4cl6NmXo3($dn}y1PZCq;L$4 zjJiJCE%#q_tR~lR*}Hwbw`wQUnwydF>|kReG%hZn#Arxs^t(Y>#j>04&z}NE<0-2??J=@%?&)U1Xcepzs zjeqmzWmq!SUG7_Rtsy@0PA+9$wWoh?l$uQi!?k@kn<95RTh-V+oFc?mi}OvYs34J( zlhaMC7Z$d587(slfzzVm;<}UQvVVu_{(Xj0F=^=+j*i^c+;?Fcg?5|jRlEJK}&G!*Z4(@nbvB9I`xF-D;dk?4 za(Ov13Xg!mqjIBSHI|YaU#+&ONqC|7Cmag`ViOZJ!cUM;)$954vHl$jwYxHSqbru} z^6RM*J{}%YYHI2Zp&k#9OQ+{2n*hHtFs@v^s>DlwpNh&#IhXM4cu&aEk{RkzNZP9? zW!^&po0VHocbE+NAFPcOW3+})w89VYZryrsQKjK_b{q9ny9KLw!NI}d<;$1PgoUrf za+sNxK6&y42ZeX%&h=dRfWLn&<9QtjAQ-=X{i;9kt&2^d$I8ko6zZ+NKc@A{uj}>o z^+RXmw}^=D)6j@I2q>4C27UN|3Yd|gd;A!mhzP^Z&Mq6xO;Qqjc5d$Lz;bWO3*3M` zD2orJzX;38-F7_KFkz>EB_k7BgoEO?S@G)a?WGw@NJt2RkG6MmQaMx8XN?v0vChoP zYk`~&O-#f^ncLWiEOsZ5-X*7}p+W!h<%|AMUV@U7$Q4MdYq+>(MY&WS0Yr>QY*KkZ z!4w_)O2zNCu)8`W4M7~aKoc$|pRdkfR(n1 z)=Xo^-|&ah;);sV8H0w`adC-I1h;S7sF^tbiP5|A!QS597fv5C09jhzg~<8!5=hjF zDS_jiks_Ud;jyt-FJJmXf#j%A6A}3cS*(m|gH7d{B1^QJaw+5F=JuCLznLKQ5C;cm zc5RLR;;>a9XG5EnWC2nZAI`b3tW05lXKyc3n*Ru(by#?K8g#(frKLwCL82&Mc=3xD zFD$IBBcK?ZDY)4Z;Gc!E8xP-8&Xsp|aaove4<}rGC=q=R^?s_x1y)aunxC+nDj9yl z&#(TLE|S&g_s_MO9(~r1ogM+k{r!FB_icE^F3=*I>g%6#+ilPT5-D;zFujh6NdQR% z%OQdfyufU&Mq(0LOfc|HeC_lT)o;+sT#v!IW3BQl*eS070xaS$(9@zVyyl$ zGvsQcj&>F`hMZg&$mU}2Q6Y#=O)Y_$7Lecw`NM|~PZt>7>f1u^Me%~y6*?xB{6!NO- zYE4!W1mDq=oy`U?zE)QDXEzxI7}udyEuPj;pxHP*Gvhu#|DKG?GPQk9M^|@ty519t zM>Avr>AIMxFvk;0O0@f;fpvLmm3V}N-u0ds+P^YnmPSh+udS^Wyl*E6yu%`Thohwa zPgh*wyZTEI+ghiG+lmG6&}by0Q4q^bO-;{)0fhy_TO_NLnRX~6e z`d%w9FCX`dk`&(6NQV^N+S?P+(V-@|d9&;H9V~Qsb=}w)sV6$NV7_`a3gxuF2Hl%^ zY=1yn;G^%m={k4ue9okr{&G#(76^f27ig?909X6_Wpfk@FU_?Cd8VY?_r|&F4<)Bz za*|x&bnEgrsRaM9FoI$i2;D;aZLJ*T5=<%&$WiT|(MPtAReYcwDaYqO*VLp$ z;FV5WMMlP>Kyp43q=~$KjTcPD<-zZA{I2Het6%~$_k&1EKojI84ZQJ4g&RSRTbI&7r{*)S8qIZ`1}65!2tS;5OUag+Ti}> zX8;wa7Z-hC6IF+^0Z8LEG&CfcAV=|^tg-N(tQDKv*|ow|Z9`|B`Qo(k9E!cn>(?I; z#O_1kT40|DJCk|)*2`h%k0y`;WO1T_#O_bjDxL`!=yVeDUYzbg;1$~^0-z5L5jZCX zpgB=#*XoOZAKIUnNB|-7x*@U^qs__c^3}Y`*Q%<40Dm=mlb&zw>abULNlaX|&FT2$-_JUEtZQ@`SzzunT=>u}48Y z05BK^h4TmKANTIvoBoYGWB+Q_tjL^)E)N^sGoIf?SxZ~HD{C-TR#lZA8grB<2Clf4 zR`Q_9-<_SvtnAI2lZ}etSHi-jUz3vsVJ(kP@9RCTN}8&usWB|}Br4>+vazwToNvP) zsdcLzTtV6~m(5DV+E|%10Rh1S0fCE((YNaAPb@4fEce%xm|`TT`t6%beA^Z}qjJ@U z;Lg&V4mPyR%otaP^38Ug0osRs`7)`WX6XsoPfS800-}}8!Gtg~U!BwHPvBd5dAd&V zSFfnKxs_#QWn;(7o;x`Fc<|ssTaC-f{O9h zlo#p~$E1Cuv4c=^iD*h_5GjXvndyXZ_FxBe#L@YaGM5uu3rowe{q?aA#uF8C2uLZJRn8xJ_5OV->eKa`G%sak!yqJm+uw)9 z$CD}5x>lE0RQOj{S1S#EsegyZ$jFGiJ7evs>`~5bd@i^1Dy5Ig1_qe`wPYZ7=uq#Q z{cp>@etqxi)vK^K%af@`RLKH<$;nj9zjNcDO)8a}e^ttFfr!3_y2EA|;p>Ym1d1c| zqem}+oJFn&il%%w8IuQ=l%rPpd+iV|huLhB7ww+Q@h+1}RAM3{3ij)-ocsB!kdL^a zpvSM@zr|f$Yv`4Vgug529v&XH!TPjHH)B}zQXzpZJtJgLPW}Fnfk9H;Vc|A)xJRV_ zD#w)b8~9}aeeFP{=ste@sKp!u99kH<%zR$u20@831N5RuAgB157u`&n4Oe6`-~OHU z#1)s5iyUEs>XI41Iq9@nQl5U7MK{n=WBlE4f##*UTYK?Tn>LzM-EaWB5o~@mE}XRc33NHO@&I3!+>h)?v{e)`!k;F z4K(!TcTd{@YtHw*ptz0dPZqh+-r32*GX+JcxvNWZZGC-Vy=>|;ER=~D%W`9!%i(xA zz037Qken)q^N@c~P$a}NEhFPUX#t5Rk|x{kaxn2wM@L6@^Hn2X8(;uxT3WHJ?Cj?E z%amI-7`XIts~*0vgoIpcP2+2Vr1SIhZ8=KCO(P>CYZX8*A2C+%hBbHT zc><=5;d3elh)8<^t-J$b;XQQSAoL+X5|^Gi)Inq~i&Yif0RXtCf-^hEWkik*)6 zSr^At8^lDUk*lWW*TFeZ4t_vQy7B>e8SuWA>EjD+^RwDq%5u|{ot2fuY|qt$NhfJI z3*h#zoSmx%cO(+|)le^?gG4g^IXXH@md$MH>gqD&Sjz?)*`6Vja^*u6yyoI4;33s9 z#a`R}5Xde7VX8IGN=h~6GlCGjMOw|6`1oA5Ytdd_UcLZ`Mn2^LVMI_D5F-}SZpry$ z4jB)4?Vac#Iz2tZZj5azRQl5sRqPt=&5P|ggmKGWl)m@VgD7B@tA zPm_EIB<1L)lIUq~m+5w~Ip=WP)kk~BBrM?x%aI=`E1a$X^gt-Y=eiKD->((#*HeRQF;{~3HNC2|$+dffVde#zn=RU+~5df0~C)qc+1g5uqFbgee z&-O`yD*NCHoZ{swmmomssqLB~#MEsl8N>pvyyu%2=eWRObWa#GYRCX>(Vw23F=l?d2di5s5JX)wz?3Jh?A2O7V%S*T7|WH zaWTs;LpDJnp~%%Yjb5zSB>R;WC-HsyO$r(=AKThqu1!{x0x<>hjU^gH@^NFL@;){7 z)i>WH>ig4PF^vA|U04TckeEs9itWa@AG`pIf}hOY-JR27_6ji4ATO^g0S8|p7KW>x zI4W${{Q)g$t^CR)W;Z6rLcjc{CozQj)#qozd8>A|C1{t?>snheL_|d35Bm?rn?-h0^I*8B!GzO{0afTdyiAq8W>wsdF&+hO!ejl9S zl%Tl@9sC`03~+EioV(nLd;nE;(0)nB{@NP(m7~OBy)k|V3Zdc;OKPcj&aV>Ph+f$< zT&Ruq%Z-L({;6mRJ|HZQ?Ci%CHmm3;{lTo;aJ@1zGVZ{D7bY3m*$L4-(SR#+@L5bC z2jXqAv%CA2Mw$N6qo*oF6co6qXecU!b9@jDTYvu+DXIh3`t|EAst(F-?gr`Y+gG8d zLI(p$>y;9}R?{`m(&BmSaF&;sJN`l+BcO}K4B^`+hO7wv@+J8DcUGOV$!aH=H*Y-Q zuz}V;?raSr#YpM%wVQOn@WHvuOj_A#WqkBP%CakzabjA_fm}k3LkrOr`mMU`jzJDlDC+9Uk9p%pmdl98vUl%Sz|#dR@yS`uZi4)7E)xAmjr{dFUYK;Wt9d3kxmH7-0AcAGdL zImUBZTtecbzrP=f6FRI#)S)*UbisTLfz!QwHxa0zz^Ra51zh(IbYT1KW}@xiDrTAh zNDv*$ruHFrh4r!rP?tl%S{UxL8;)xgISL>6h%WOmV30kPhUj@gM-6 z$8Mu(w8V(%T^%aG1c5WqFSQ}JI)b?I&*DNta3@_)OsJoh$ExSIen7kYT1G~*v?@9I z66j-i_*br6se_WTat?+D>O)o*UFx@Q$-q5P9{`-b15Su2s@tpiwOVlD(R@zq=-4FI zH#F|z&r9EE7Rq}W7^dOW5b%FB+ z2m!W&g2DpttEeZ*r^VpW1*!LRMY*6pZMdajsu?ude0;Uic{{=6cfkmsu!Os1JZV*p7Fs0Pdx9 zFmdsVQ(m77huLHx6ejDnVSG^KpN*B8%&f0tgIoz3!zDNXBnDq2DbIiWa)c4IdjKt4 zTU*b70!Cas1&V^43W&+DxW?|ODGF#G9T|^i zfV?q-N~th>6xuHh3`C~|@^X)plNhoC`m0Y=6p?5Mc@WfmVAsk&(9l0XjyZ#p_d0tp zn$3t1ksP4pfxP|IYO(upDJ3Lgdcl!RHIXDs3{=dB)q%)CBFT|5GYSw}XBHMdLR0+; zcL>Y=0P;F4YzxF|?WNwYP!#fwn@CY&KbS2Wl^<@*R>TF-tvCX|nZ$gSX*Z z@^0hf<2kM|IeB^Vm)yNE>5aZCGeFZs`*o3M+*|AB2B@A0%9nWIPtXaN0Ntbs2K)M& zGJrmcs2Ehq5-*AG-VFke5!e#t)2FXTN+|;+LFERE3h)zHi4MNkAVq)a_u3cdTpa~z zUHp?vid+FSXz?`r#w)eI0dS%+-0qDPR0CjX#1+6oA>J3-FQQ0by-C2)^hb)QAuZ7G zWoYz&c6K%bNSL0T^#CEIIO{J6MspziA}0ih0f&t91E|-C2LbY2?bpdbXl@|+*LO13 z2Hxedt?TQ<2W)mYHg*2Z_ze{AC=J&;P;R1G^l;9hAkHi%y0w61_meKfETUve=J|8? zeyd$ui4S>DGyxKzE;cfi0s6)lX9^NQ)hx!`$qwPs>9_@YZryuk1X=L`dfct==+ZKG ziGy060{y2W@QcC)*qTZc`B_<*FM`S3#nS{q5Q)U~cx=E*!n^a61$92LcNqnDJPqL# z7>HGMwm;T!^ES-gB%S|x4?QPH{(!9osNb?*czAdUeb3LI!cdhE>D18waS7-?2f&To zelNup0Ln(yg-i1r?0Ey|yKXmOLj;!!-42wT_l1&BotOZ{7wf>uK$dukrnsx;n^_X> zJRTVvgU*9brPcRwM-*u}ps*tJMmDnl9zQ=hkapxIptZQFwFU$R3J>L}AxHyycXaMp zk9pSpp8n}E{lf!q!0-zJ81)&p$~6Lq*zxrun2P|N`if(z1~BW@4Mk-3$XkfaNI=Dgf1kCMODE^%k{lC4bZlO9F`&Vz{;U%4(tZ4Z?W_x?%U#0k^3jD318rB z_a-JLCejVS%7L>*eNZB50@WIXDZ%ss+G@v~gq;xE<6Q&Po*H&8P)F#l?jVjrb9w#t z?G-TFi%o!?4jK{zb_MnZH>dM+B>S#_D;ZeOZSC#P!D#R3=!jU|8=SM4x&~+tge-iZ zk}WHP+1ntZT*}DDn}XsB`HXPtD_TR~sRVdY%xEq6^l#&j z+W>QuVVVKzKx;?jV|-#_U*L9++&S^_L)rAY7LR`#9vhzHr%t$pOT# zDLmdPC{lD!$W(x610p>Ovl45O%Sl=LSK;o*wD@#G{m~Yd+&wTU|CImuLCMTa@XQ6b)|<}IXeW&|u)YfD|Jqb7 zg=oq)ZsJ;nCV4TKrYdh6KSxBoo2+t>cOpMNJbWZV3t*=BQ57CO(vX1yU%Pg#U}+t? zun)+>g1Pc@p1AzajE(7GNF(BC1oddB6oQ2ctYX@_^1tdT!t~t}Psd+?8Vr2*=ih?t zG5eW@tHobS^WLhd<^F6Q$W~wkOb>$EqcIJ&h&L)KMtjxA(ri_BAeNL6UsNO|p}+*K z)urA6>aW8z;;5!}x8`v625L{FP{Dfx{78-u$6qf0o}_@PF_^8;_?~$NE}VTeH}2D? z4^UvAXAf%q&QU_NfPYjGQ~?N2Iz{a&?)4=>me$s9>C$3j>k2hbxd9m$7jCnXV1vlx z4aO`XDTiqj5MoW{m@UYYIZ$dUtAid=C0{5bVRN`WXR*{v3EiDAj@_gIOfqD?MQi6z zSBK)TLjSTgu)n7<66|l<7nhbYc5Mw;xU+^Lx92IRwvkh}-F9sD|KDHK&B|XE}!o0I`C? z;{)>#)OC3<JRu}p=?P5iz+FdUx4eJ06g7wYwp z!?a8?fNA*v>g43)>Gky>75Xt-PFbxfj*2ee` z$hDNg+3=*Kd&m(YS^$ih{La_NR~3LhP++wvRkc5Al#!892c{0ahYiyOoT$K6PTbRQ$U`=q>U#yAeW(#!Id9^Z-j_#&L`_-Lu>UU@UAe{Gz(_64=_*g zX9~f>0)yc;Y#J_~JzLyuB{RLZNaq#U?%F_r5i$p}6T(-(-D&}C2svm#tMB@fMRXS( zFU}4^V`Kdx|LAb_$X#}2cGpI3-oAYs0sJ|Hyc1YBx3yAKRaLQLk^UZ){6j^< zj3Pth@pd@wakq=JXif_%#CJf*9fj*5u~Ap($(!GyFo5Uq4&hwYjwK^qk|321 ze$5BKJ`Kzg%p=eaR08WAAFHY<*)sqa1Eq=6<(L(YHuG()YOdzB2>2A8zr`0#kQ6Y3 zg=uj0R=jkxC)(fc*4P+YNK@)Nbki0_KgLL5>lh>e|BApTtOe3Ny z0ZGHWq$B4mySDEjl1zI*ia zSkMR^QW|-oPf(XA2a)qR)-^Ya+zBr)JW}Q5<3o_oDbOuMUV%>{U3YM+L{u#p2zo6z z1g!EJa3Rp)V73M*Wdo3h0<$Up;xo|X35Y3pY_V<-(%0Q!tU^J5gy|{pC1B~=i23}( zGHvk4iraSW8Ui+mh*B~#u0eNaCGCC!tAf0K-SUH6z_qHmKoMvSLKC;3)d-~zXu_Q# zEZp_t%nsgc4(9iace%gGXV3ik;|;#!kf0Ht+FL z3MWi#0#1FWr-uQz0yq>f1VR*HRk0(z3?N%HgVzcN$QHt>4$;n({E4h%M;3Y_I zAJ9=|z)n30nIc6WV($PhG&3`UhYypGR3INv#XkWA8%F&qsZT#g%G-t-`YjB)!^ezBh!_Lcml%& zaTB)^Ko*?>-4VO2891}8t?g5iAPzRC0}zsNQld~`>A;qs!=_>6c=C>1of18 zWD%R6pC4+)Y&8wadndBF_mT{B?NAe|pXExR|Z&Ip)+8w1XL z_a=?RGZ-@v4JON!m=zTM1G5r+pn?GaVCNdi1yBfW8~RKHX5QmHz-)+%ukNxZhiFIjm@15cB14Pt zE6Au9xLX3e&nT&mS$u(&CGxv``tk+m;lp&%%iIV}CuX_?uF&hux1cpRr$iP*m;vKO zM!7^NeL?#HoC4jDVS|YjYzGpMmUXMQN%z$XwXTAeW&!wUesK|k`YQ|p*hADY0o#Q^ z9bAxYiiop*gJgmDAc)N83>EPaJ-sj-2&kJ#6A}xjnOROxG~MMUhQS3GbP^N>(Uji1 zcxPv)5!NlEtc(e8mUpY}GGXh|?_5&kaGar-BX0v}25MbzmfT}xauVErv+tZ>e&PTm zUwNT^6Rh9(MZ5X#Nf=g*%<3%KzE zABWm>$+P~Q{L9oq!@h5lqyU?KCJImh*lz&kIr5UCnVA`KW7!J%rN`u;kK?<#x+1bF zY&L7$6MR4_US2Zbksc$?&!H}vRqqiZ(|jOwCY+Y9-si-Rgeenb0!G07->iHV_25e*`Mu{6{__I3s0^e%n% zx$*&ofle4dj<5l06$WmOFJJ*wKSJ zUfmO^ICe=?8^E{6kY0qF z1Bio<{2U*j5=O*3{=zxa=I?Z9fBW{W1E#qUJN=hoiSg+7_BDHeTX?9y{jV7P`t-kZ zCbEGB&=0B)0Dl4!5<0p_ap0p`CDqu_VrikDhhy;vT*im*_v?u7XC=7 zNgNO=v3Kv1U?6I~V)R&V5aw|G{QWBix{`QO;V?lgeh9ZHd0xvFBM}xFN(r(p45bY% z*}}CV_s0bem+*@huVCN;MkzT)yuraoW<@kyk3=8@sDJ$UA!%yHNi|{HX`N+7q$FR5{^&Xgrq81R)0Q5=?v;v&7d8mp*HdD%A zmqWB#0-t~x1H#qL&Q8z~WPl1!Eg9X!hq=hG)YJ!D)=QrNWxNy@?_le3Ndqo{>tQ4UchZ~)@&UpE6l0nRM`PvvIN)NFC-)iM!CVi zuKwfnMpl*z;)Q^Mg3$+;;xjbag>i*4Mrvx2u&}V4Jfh4V*y&B`$B$QI7puv0%1bpN zIO^cG{Xo{n(Qw|riqIbj>BjncG(hDb>3PU!Hv>upbsbly7L*gjJwnVwn1lqa)NvZ| zPhe6Qaelx_F5Us&nF6Z7A>2VBz--tw896yQF!BZ%K+(3@w*(kyRRPlgTYuurW&vU^ z{mQ&aBNcxQC|08D@pTx%=m;EA0P&_VfUyQqCP1dghH)YoyJDCIsKKJwjYw;VIR(;+ zSq1_U!)YWNAPEa#Q2o2%ASOg{Mpjk>SO=r?^UWxDR6!4ceDI-9N=+yH5fTZEwWOq^ zV{H=(qhhV=8AII28PMf=u!Oe9%xWoFS#QCc3PQnkJ=;?N(Y$_OVCP#_YcBZI^?V28 zo_ni9_wV1o3@974NQLmo#35#whdy1^xDW)$0%{r_4931172nmH2g$}}{31K^ZPw~> zAWThu1alQkul!1ED55YhR=KfG>Ma9iV&#Sl)P@Qu(i~jZ?Jw);Ev|0hFK%p1F7cVd z?qkP?T3Z)mkAm{^^9N_P^KAGEi;IPzM(6C4RS<$|pkqpC1lT-Qb*iqj^9CSNj)}_N z#>P2sN5!nc6;YpiKP;C5AG5IsnjvC+fdAp+%(rylO+{l54flR-*`Us=G1IqCG!<@~ znkd;&cuP0PrjY^^SzIBj`+rX&jpdTW79|&AsdAXpA3qw_?(O z=K_}3sL$E}RR(NF7}!LR4Wv9iA)zjt{u4Sn!GCQ?Z~~@RS8sr?1`z)q_@3R}-PbTN znMn^ApeVqzTriMYGPs&l{|*TzkVj$j^mKwSR41dZ9t@#T+^(MY7UXnlj~CSZ$yX^+*vsaUW($^< z2@CphE54vFrDVE6EPLK^~-y*)nZ)`lqPwCqr5tts<1VUvV&i&w{P*$e0-hb z^?zpp_>D-D4fvhE&+L^Z^Q;?rJ|_x(F8SbRnCN%v#KWzR!#`vAPBXpmv<}0XO7OIr z#%#)?oxZ4bb~jRw7g7BYe2!S(OinJ6E}9EDr?6~&+(+V?P#JDA+(3HiL`mfbzqQJk(_66>_-a~sat z=z#@;7oL!3>yWU)nIWc8V%@p{`ZKx8{b1arqdMc4R6oOnytsTGt==;JMizKXjFrW9 z$lc{L@WyAtA-bhh?R!P=z#4tia&Fz?!0TH-u|%Pc%UoUwrrg{u<$jb=*z4>w|_QiMut&xUgk%_bkdZpuy8_Y zL)8bmp5m!p;^M~dEBQ!b$1<|Y=C)60vkj7y4j-rs2#@6mD>FQ3`KZZ$XV@V%Lboz* zJkY*HhuX5GoL+V|`FJ)&7$S$`<*f2GN_58b$}cUYE^kMszLwgk45@rrl2F{et|)m& z5j#d$sr9B#g1-_)K=Q7Xia=Bun$s9sY&=E*56+yqLb3uwlXn+QH+w)vfmrolGD2L*rWRgj=@14BU`qE>B7gQ{W$N-1pEDO>1F!!V)S&yZxY5 z7>~%HS(oV`L!hK{;cH=9P>cM-+a;2>!$S#^@epKda}qh7#s)F+K+Ma{ksC~8XA+&BD$K? zI8*_0DEb)jsxx-wN|oNFUGU@J|5`FwKlC}F{jWoK-|9*J!S~LEKNGn=hpn-aNe03q zio-Tl@s*~E9Y=bBt-4G$KO+6`1bru||5+?=)g*hzs=zz5nc~Ae3?>!sFR$iy43=!r zcUw3u=W0c@4z(n_qh0+=wbSMAgrG*z~0JtR1NwOXlc4#-j5a@K+LsXdo%a!p`Eiv^Cu*kM3VR`24v6 zTS(5i?;xoii;Xop?)kL%U*>RhZdSNunSV0!a(1&)d+BAjwC{%ZfBVWeP(7FN(93b* z4;n6DY4fl2&nR#XJbq-2wJ{K&o_I4o-9PqokRmp1)5o3{a>tujGGKQP#8hukdf$%f z?8-~g;obj3DE~9zXOY8A9*2iu4xahxp_DRN4wXu0*OGdjeBwbyf z*SO%kSaj9dq@8{?r4fUh9@d5b@46Zn?PSzX@KyGwq^*qZgfd~ygw|*0oPCf>6g8dY z5W6No>S>5`6!Rn`3Z8vUS4invPfIQQ80O6`#m=K|;bgGCWNv^-lW-BhCPVY`JITwS zg0Q<3V#d)|FOxWmyoea|n!P<6`gATkPy>$L1FH7*2+5QsdjXGU*d}uBTWm$uZhj@&7jE zYx2w%XjtF2XtjA2Ex`4{QRAQ}h)24>#ckx74`ow96tUi1){S%=YhpF#w**5$wiwd6 zll;A!*O;i9M3s&@ng=kr12uD-9l|a@{4!(Smwm{J!DKA;<%AjPtzO7Z!ppclSr??MkqEvG>ZEw3@x9zFAaaPDvxmK?x#eN17rBGeV zo5`;$qrGgMNDYj~g4#a`mm4hI8ppZ~pD&d%!GtVftt%$B{Z2SDceV7zuh_e1c)@s= z9#~97iPNqAnA>I>FED;m{4lVgw;k2&{fFIkuZi?Mb@O)0W1^cn#aJW4`OouJT-zR5^=EGFd` z_#p4(Q+0`NkkdwTsxAh4b#VEWtKro4{iFIXwPgP$2&?SK2xS!6mh)AWpIqS~sb;N^ z8$awlvPq=Qs+7q+yDB0b@GZUhhTK9|hO2<%pj1|-2U(o^jh56;WIC(nH&XchImeVZ zd2d6Nx<~tWZKL)6sKfR|b%eqg1~(R^clFlOH$wzND1qn`k|F7--o@wFnPmC?E<5n< zE{D0}Xe(M)R_9E(`r2_&Oe=7x3d>unwjMZDt#Qk@yrNjsJvwct|HA$)k!sy(MpM^R znLn|ZCge|4NVTY@2=&t);z+pN#xtLLO$BU!n!dT?Xev6LW!r_5%W)v5 zZ>)CI5VA$U(yNK}NpSOXTm^?j@)SLNw$!m|T`KPbE5;uF$_iHS= zLepAgA~M%l(g<|L)4na-r247Nw4CB7P=}v2NY-A6MSF=LIbVXmD6jJXr7%_-V;D7&lGK(nw7^UK1tu6iq@vKe!yA38_8MY7ydmbh|rMPc?^KH2tv5^_&Z z3x|$sjk>8B`7Dwe2?VcEdf`#Mcdd=P+}u-?J#8>f&g00}L_-(-(>?q*rsh12svv)|*($=X0m?5;}>DmWM*plMN#iPG29m2chLX8KM0 z{YR&a4b5&=S|ZhLLEm#qXbDZ9=C|#CEcaZ@W-m(Uo&Vzf^<+2dr1r(+J5yJ74Gqqc zR|mK{eoXkMhbvaYjs?CNy!+@OQ?_g~><*!TRA8Y(os&01ifk@!9y*inqTgk@jw$-) z)8xI_7_sHrdz634ZgFp%tsR_}X?Wo@;!MN^YSZ*WF zey2|pZByq2vii3GSR-#Q*}biq0Slg<7njWWVQiG z^X(Geok`m#DoxrNo^@0eCU%sgY%pwj|LdkH zlV)MGBVRB}i{5rXzIvTBxq4U7D?Jty32!WO{C_s&`DH+^akAmzu*_p;ndAgyqb*0)Dn$>M|ozN6NQHC@;|n-M6EsVYq-$KiCkXcb9Fu4p!}oT zWO>x|UY6>Tf+y)ObAZWHn^6ZYP}2TAby-!J&crVoJql4>TFR!%=?6osrCYyv63v$z z3?xV*NA)a5;>Lz;%cCVvq|FP;2}BkjKIs>=9@blbm7~iN8hVi(HvD~&le{+M+h_UF zaegurDdzAwB~EG|mWP2$hyVBI(hzzp(?pyY{IFN8+B!8T)D0x-QqmD zseAH3=5q`=OvDSjw)oKGL}7p^XnGPiI+-%7c9~>cosh z()Elj7sZUyTRZQ^;S`q0_~<^hklyJZ zY)UY0$|zmCbA9LuSMjUCHY9#eHcHi{l{w0|?af*>G5rnojZG;TxPp0VY|$JH{GtOV zE+P$??kKXFUslm>q4L%?k22i-zv818HrtGoe|q;Li5y` zfly>8TvINZm`GGTHMDO#R9M;R_bB6&h7NyPt{jyA>e{VeC9=KqGx{!%OD6ZlmhAIA z?@FHACJNN#dR-o5a5l50Sq{C6n*rGPD?-G4pZ6^M-SVuhX;Szc-ySiZS8`&18YEr5 zGQM2>`TPEnb5)@MMNe&Q!VO)?cg;%SFa1KO#tlV>Iv2Np(%gSzIS?Hd=iRvQEhp>C zUS;s#E&=}5v>V?FE$ins1yp5`+9Mdq`=V1r>!R->{;!gCyhr_Tjb3qlrp3% z*_iY!UTkJI@TsoeLzlk%ipM~Z_V)Hbx|-cNg8$FS0}zK^2@!Om^NFGJMM;V;<^;;C z^C@<3=-#c7XOzmFD_OARu*(-{=^^~{lqJ_rf(<9deT~^uBIW0Fs$Ajuxj^?{mxNeWWb%MNHSR)n}EjV#}pfX>>aSPvXYP38t6sy zxXftU3%@Fe2>bY0EDn8st*X?zBIz_-Q2aq|@#g~$hAneKmuG4ihDxG_cjmNr6qchw9YSqA!CKYx7}8;k|a6vj^!I0Zc1F@jOrwn*gvup;PIOyM25GmS7VUcncN<)eA#O-aIGcbxcWT&6p;un)gy#46l~+g{=}-P7E5D(CEK z>M9luC(&88rC5bW_)pLGFW*vof(WA%qc@+)Sw9$+7`Kulj|!GMW?N@rxYUB3QZ)kO4#AfWZ zT%>@jp2*AUoXeS}`ZP~EY&-OH!_g!!m$eS0R0|N18q96PF(Nw#5|p0SHS+ib^Pk}D z8}g?cD&Cpaesr22Q=H}F8(o*_Ki_u44>yt2x>j2*sLJ}g`yU)qWudCc&aMI3a%)){ zLhT;zjMDE{q;K(%1(UC1zhhZGI*+F}~eRxtqyweLvTc#GQoSDU0VDBPH*fUYL(~v`^#}oinG81uTDeiNG5R zvi_L$h(0>DbIsz;>GValS2~8t%YVaf3D=}M+_`Aeb-d<{G?lVR(omV39((5YJk6w+ zIvd7#e)IC|d9F?b&uJ36^p@yj{u&OxggcpiOFWrcmrE1`{X7H)BCW7QcKfVcnf&)ctD+%&+`?VZ;ot7Idh4n~vm7Ow&t zt^@;ukxQGmLV>3&r}+t;nLy$2oZP>=|9D1U#GNY&T0!J3KNLmxe>O0un@UT{;)$&2 zz9aiC3@*K=&76={sTcN6-nx_yol{d zgb0|zUF?qUSVeO%ne&&PH@Z}elUlve3~6a2LY6qmoA24bVESz_+X_@mevekdI+5p7 zI`&RN{pL$}=%Rw|xY@g+l2meb>&VF!jj!}hSuS9^v?K*PeK^87=qo}B<~-K#f=*`Y zQm89>>ndNNZUFQ+c>caC<_HTj^X);{PAj zYap?FGipP{-C!+!!FK@qqjM!l(<9}!>zPi@)Kli4Q$_D)efNPwh&3(Iq{_o&?EY`F z`|&xX9H3wllx&_-eUyBnXL@rQpp-{Xf1jNHtTcBKtS|nB`x1C)n-*qn&#J0k1^2({ zDdoz4Ii)0PW(D>MzG$hh`-(I%aQ8Y6`~7L@%2_hd_@nV`0U!7ti2h_x2`zNFx9(kW zsw&Ee4ODBIR9$z8b5*?czSCqggU zPw7OtE}PSd^McO;T`zA(xg=h2o}v#eEduj|jS|-934C<^du*C|6s!gB)m%*J+-yIu z#n)5|U2Uw{AC+t%Lc%Hon<4os8i9IcLdnm;x8GO)G=9O9{+FA5l$KlS+P4<-?>4?G zhMmO|sgv~nkpFt%n$eg@J+PQDMXeDLcCyNefp{OcN64%Nr+4=l@|G?vuyQ^7dtLu> z<_|zkw>VvyE^J?4-e*nj_ws=jY@5!H_MlvuW>&p0aA4%G-5*a$hK?8f)Myb>(2 zRZ4?gy!x3U_(T#F#uEm!^y7S5$BoJ(nCrZ*k2m3%^m3q zP{i=?GqUBDv~5=-lBG+CeLd6iHkcz76W_EO*A{b8$Ebkn9$J(YCo)&+8=ssI-k2uUwZC4{9+KYgC6)mZsv9M*)HA& z1M?@~G^GBk%S-%|wD6>i2>l~Rt+GBnECs3hK_3Zoyk>a}Ic+X;jK|ze;?-RDAwg$| zQXaJ!XG%!O%DY2B-NWS%iq2wEv;o+n)Q_dW=cAjud7u?v?{j?0R>oLt^U+23XwAMo zR((?SgX+KrS{`s6^@##Zf!X;lfOam)|9`r}^O{PEW4}I6^-s20uXb!czil4aSdoZ% z?)N>@C=6_5o@v{4S_?`AYiNrw@ok-%=Y^4N{5^d#YD8TFwsD)Sn7RVkNhDFW-LP0m z3p^*I`+oTeD;cOLBfRRwnS;omBAGULK*SAUC5@Un3#PjVvT8Ay^SFn(sH{Z%b>?`q0&p6*>z&-qC%BwXqR zWux+AA_dVJ8x9{ZrR=vkI7zCR!{nkAK5Y-jb5+du5>;6-`V}N-L!=(JSM5OWEz_f@*$OG3SYf>Qj&DTCOLh6-8tdim zH77CPVL*@3^4dUA4NV0HKRoCS?Dpw&^~1AQRk-4i$s|SZL{1^vb=S^?*cA1}*-F2R z&cC4%yHne-`{rF)0n?UJQ9a+so{T!==B35W%tZnk&JwG2`k+Zw2LbLvAucM`cV&n9 zmU}QuAj|%nGHkiiGwsTRhP^28^3r<8nKdS^tPgE<>Y6^2m9Q*lRV!EC(bCtfJ{-LAGKvcdZkyFE=mc_b3ula zmOetf8xM&r=-(#>CF%Y-zVg>POIutbep`msnUAIKXfX0FbHbbl*Bo6xLR7U|7lUx3 zjgbPX^sAcD1L^=IC@haD*p_>sSq%+L((USA*PD4;){#;S?%~O*=Ayma9?rR@y3?|L7Hk#4}JAR;CA{BNE z2f*zA0l+>0j?}(JRKM;}Jn>Do>~ql_Z|Z92%GsIUhxadVsQy~(#DR&K!tWQhzm1DJ zWlgn@R;b#i8opHq0_Kxlo)p2r)ZAbuHisE^bjOTu#Pi1x?XUC6gp(ei@C<~pz1`7$ zzV%ccY4@x)j8oXpXuy;cC0(-nk4GF@%;D(M_L4FI+Z^78@O-WP!VfGK0+ zMLV2+3wNpZ{G0gRW@~)I&NQ?ICfVzpM3g0t9wHL6@0InRLrTa>xtcGXLBvWMm3}`uzdG?aH#ceuKMbl>krU9-!fjO;3Ltf}?pD8glO9jbjFJ*VdzK z3V*|XAMjpoHvs#tu(2XBWTuz0q+-s%G^Z!%w)lF}Jlcf%J$Q-&UvXgLg9`1Tt(d}l z7l8(=V}(IQYJT3++0zum7MGd4p!Hi0pj z5Vm~{x7f`v@FU9iDR}#aErw_6`y)3Bum;vMyB3^}gCY%w^^J`msi}%SJ|g(?TY-YVI0|2e+I_^m&V0}z!$?@L1)jy$TQzMFPzx}ZAawd` z zE7{TMua$Ta0E5Gp-UVL#SM!X(mu40$tFQJrP!w905km^5DHVSl-Ah0V?cK1gs)DNN zM)9RIe4T#}g+_&DWLJLa?;3tCd>$l|oS2IbW3*KQ*`s9wRVz;lqtUNO9pyp#DB7YqDGaDfSS|mzS(zG1O-B z6RIBwG@?Ndw+nIW@Ibdv`O_9e>+v)&GC$lmgw9j8-E)f^k2 z+eN!;sT z;@m}9nmIkP0G(N=O|pX2{pCX3t;w16{MmZ)e7y~3!}c$X@qhgt>iD6+*G?ra;J1|LqX(=29CZ~?D0o-4>mmejE&S7rPjBu3{lF-IFY_Zh`aM90 z2H@P;xw*zw$Q0@`cn6rwrM$&nvd>Wg2Pufe1~^FG2v!O00pOt}p^x(+`-Nc8QS~d> znr!WQ^^F3T^w5oABc}iK?MSaK~5{c_S$OQUt0ciH{F2JS$Fsm86@5{CU0C}Y+ z!u%eQ{&3XwO8E$oloPv!;Zv)^JBsFc@|$zub~hY&eWMU&sw ztaQ}2gTu^uF(%Z4U@*x^<06-<3o*3*;OPP6n#}E?09`U~Z8R_@k(*NZ!x!1NC@pfv zE&?GVD+&}b?Wu-(f2s~4f3WVaaRmz;_5D_Cr1EGpw8Z@oA`YuG4OXbYHJmY743SDJ zND$WDZX>t)bsOUk5&Ad8GqnO%3`~-avd0RxUMxz9Bi%lUE(95(L7-wE1D&EJ&6J&& z>$YZdHHr07yQBkL`Pc0Lfni*+>yfB>Kwk}T=a;L_{_Sr8h9v-q25{3{*`fdqLMbl> zkg)+2Q@a2H4eYU^U4W|{AN+MRDh-eO#n91yT^0_q@^?Wn^q%`Cl9!{08J?7?_w=0n!v5 zC8ftm@AjS&1=w#Ha8_5c)qg=km$IAhUX0{LzScS^@lJ<72POm^Gp{Z!9~^h~OK4zj zEhlfdIfE7gb122UU35j}?&oq%IAr9%ZR+*G*Ic~w?QB-I>*|h*=ogKTPdR+^*++V?^qUJxo>~8Mb=Se{yq-P!*oDu5PAjyH^S+R zv#!mbHvUVSW?dMz;v%0DTsQB>6oUP@?d(NSYJ69(!;3xcb=2`4$~4o1tUm*Y0e}=} z+7W>2(EJFw9xf~qkSJiHkMFr1 zvYy*xQss7ASvIyU6A`wmZKe3z5df^56KHZ!3g`4$E6`CdH5qf7aN%BUFBz@`nK>uM zEY)}j+B5P_lk>8#ipk!y&*Czl3NI;BL0U(gu)iufAOpUwTr7o=;J65w@ zI`mr>B@z}rj>i4dAOCDAZRl?IeSoC@@e&q;+MzaVKM0TFzq0yO(GY{W_M|^Kc3>s5 z@H=n^1cT&5gC-mL0y2+jCU>$n$exQ}FiFPIO!Nj#xzcTplH6xQ9Ej7E#`mUDIbA5J z5(f@V!io;hRXr+$nyWo*jDAtzi1z*w8z#l3BjtKy(wz9DSs6Jl-B}r$1 zo=!|6oQ52mwsQ^oW#Y_8n zVR&w%`kbZZ)t?eXog7Re)z5=(4X*`nlX@C$k$pCrx!*$;)7H#VL`@Xx)>31WdywkD zO7E=j>cpB+f~g&#@BUS_CtEHr3zeeE{5A2wQImFWvvNHh>y=RqxCJRMkGfkX7IrB` zKLC(_LVi2azMrgXwR3hRfS4&j@ku#Z*mefU>MYvj8GYXT0t@5S$YL9f98J5dF9De5 z8-RXZ?*-6taflXnCl(D!NG;|0j>Dvsd zE}MeqWmNx+L(pF^fLg#qhOOR2%B>Y4a}O0kBtHj@RPA*CH=q$u&t%Y649R~IU7n8c zc#Agtv$58US;ukenLanGXd1tq+?zHls8@Pg^tCycanL5|Pe5ac8&F^Z6pkLXT>#Rz zWs(%2(*5fe?1$+2u{l0-o&c3KhD6lGzdHuc#I}1!XYo61b`=cUJoZ0cNp}=z+_zO}dRsNMp zD4&Qy!sq-zP&DC+E>D=fxZ0HwcV=db4<4^igO&qq9#?sI`P~OjchM_+ezw%kXu((B z&1L`R(>iQrGl<`!>0j+$e3>dT;z&!Hw{zLUYP86HM=KZjR*{#d%0l9c~?e4%34p##)9%MPqD(I3fRKQ>l^TAw_T8JG7c1Nq%{jR@3@xeQW{ru7X; z;QvClF<)1viz+ivKRqZdBlt)67|=cZ0(6w!!ijvo&~uW1npB%0Y?eO%0Jx=cZ5C~o zpWmY=|08+1Tha7YvGDW<*)NNBR=-Uk33L$1SxCn=cKBOm&nZpv93|&1b}a5J8$$2t zLMl?V-UsU_YIipBXK+#rhK}wG&xNN5vW3<0BbUt+T7mC8u&U_HQTEcOUX9>r-k-Ge zJzA-u*cHB+##u`v^xrKAQP~nPe1e5omkB#?${P)=JrTp=CL(-gOQ+2?wQ^Qf$8`Cj zW2LlvV`D9|F=Hx=#k|#dQGIgp!dEG!cqKlnbx^t~autERH3JN8{Xai?$_1zT{OF=X zpRe373+FjrxKWi`3tZRyJ&y*)FRl0CN}=$NDrUcTE7evx5+iIDDe9d}XarSM`btgA z`jZpp=x<=K07Td>yXj`Vg5Awck^0ok&AQ;f4A7xUCz{i;J(%&Sz^o;I22Mt%6`7sA zS{twPSQaPKmshKx)Q;L6&7{<>^ zc{m9yZob3evte)BKR=&A{4IgImQ|;w`=N_-Qi?GJoi{ufv%0f&HAmLq!o5Re{a4mi z-;H04z7)?h@r#L9z4r5!>+l7Zx&|hL2pr zQTStgPoprsd?Aw%ukR%B0~nrd^2*tC63$Z*1ZyWA+E<8R%j)N1jSPQpBd8R`n|bMS zf!jvZm4R`tSd8XM>;j)nNub{ntf88&>@5}WR}#cJ)S zW7BCntsuH14}N^^*Rb=G5e3iXR`87V#f9B|oUg=EL9wmrLalgn>o&04fG^p3knlqC zSHJ|Rbhs_)8Ef#@(u=FM{ZWo2B{I^*O~yw&c*j82Y>CS2Kw1-A#%V{~s85#A0wvfD zo?UM4Y;SnP)(n=w@2gv4d(u*KKi8vQu?09%Ki6qp8soub@Nm?b=7*_6=LhH%Vh!5T zp~WT;Bb%jKt}SGD1GsH%@b)BlCU4}YjH4W+Y>)T#BN`qj7Jvq9V7Z-K=iULVkS7-5 zLkDrbCRDZp2H+$zrQ!vTCyiI5o+6cA)ChXGF)v9|vy#edHUo~hISQT5%Tv>6V`_28 z`G@fxhvT`t$rHqG{Hc}w?qIPtN8tD+1G$eU5?Ws5$_~OjV4lL@aem@&==O<+AM7O+ zbw1r(lu!o(&CBD2v@RpAJZ#s%leVH=^S7kr_s2}enKt_e^5MzjMytda`bro@isC9t zis1Bo-=Nb3d5--3n4v7=lJJnqa;Tt#GTbXZzAkFQ$s`-YA96{~CpNRUe)e@IV+wCz zNHEJdgzLG?(Q_k?t*aFcc=@3=Q4#;a3h>>>seSm-X@p}WlxUn(zPq71*|cXY&mCb) zljo{DfSfpb0QNi4`)hO1qH`?0pQ9*>uVvf_889?#?xz7wJBKq9C}Mf~%K7k&tQe6p zmr;t*SA*sl9aVg+uYB&0_H^$rQ{_jBIxlF?o!!OGF!{^$+vPu{gdtXIFm{?PMj)OqQm?9He- zs+YY~2Nh%otqFn`TnthrDt zW-?t*#Fa<6rKUm8w^T#Y=pdF9eDzVQE=|;Wl_58(&vXFRbnNA?yg-f#IK;Q+PUy}E zXB44WcESiR^2>X?1oW3;-X0jza!)VV{`Fq``vB%tnujm7yU4W=zrH{iJp^J9ENlHa z|H#GIwt;Lh%WC)&)@@71pL@{2;M$Y20b)Qpe>xIcBvPFhn#HR~w#fau!50D+)NY@X z{`7S*>l3jSJn#GPJNw;IZ605A`-kl&8)5a1A#$%c<#RIFQpBMn&?{zo^pHvw7nY3f zBKJZTLxg<>hR|>MFRar=08+-&LO`811xeskN&V#ko z#y%d#wFF{Q5k7w9=b>vIXpI%c)WbESUCW8h&w;+fG05-G%%d2MFi)#HOdi(DK1~iO z|1`t-@>oOQI54G;2qr$-XmT$#+2DwIT4KQDijLfmI{3#elX^lziCfR|{2X`j&_bdx zDYm{p~Ndg6V+k@MI&PU%|^2N$AN_qg>-xzTn541$J#!m*8MEjg~K^t}atng50 zb6kqCvkQ5RiI}8m&mm_hmTr>IJ`~X6h~;m7SCl2NEL5a2WVRN=fqm=SI-hm2T#Gw9 zFaA)SlWXOpKi?*>}_X;cElDt9)0}Dd{yqI%EC0zYrTj(=#~g@1p218 zaDRgZp+bBzoSv8mcMNvl>R>WyxhA~MkLuc*1AP<+D*!53(Pn&ELDx^mOO*xdVf_=p z8~NQb)GF_~a3uVP@$uU^$5V>!mcKkS4!Zn`5lHCjK&vsV9bI!Y{ zsrfuL270oO;CHINZqL{?r;+AjY+QS0n2R3hL^hsChP0pG9Q40)(*p-1$=C%Hws?|M%MARNg9UmWhhd*)VpJ+a0R z8o9L4{53rLKJ~RICw(BbSPem+GUabK3J9vG4{k z39!l*yUZ*UDcRc8FWQ-CL7_`a&C%gqgm%8mX2ePUSP4Lv958a<-Ti@^s{`K$I#J4? zbi=xU9K?xtb$YL*k^Xg|(xG!x`wV`)Q)BLxxYGDN_i~Lx*bkDtY#c?{;r9*lIBECv zbCH|01nA?A-Lf64MKcaQVXm^}~)mtY$& z=SKm$XQTMzcYbV&iakn&-iGb6C3L&98%lU+!~8X_J7VW~&dC@L�?NDzoB&y#)D z1v_pW0<$%XsgzENG@ZW9mOu{?@x%ON0P?Ll;XH@Le%#VW5FIxv+_HBa(`&lSEN^~% z7PjfIQi64KT$*+1!*vS$vyZUAOCLyNyr$#a5_l7cI7iD-niWnXJjPVsd4$HA_ZOT* zxI!&Mi`mF_Yk6ZT+7}{MLHzL!HCczxghEq=4wk&WGTjWzf}5HlwQ;;B z@dNZiin_|OFW__B+??At^b00DJBcyronz2?Oz$Fp62A*&H}aq7lmLJ3ap*1erfdp^ zIJDcKD6?G;E*e~k4pe*2^0T0!fK*UNQquNfPMjr;^XCx#l8L!|mz9A9~8?NF>WD7!u%>>HHH5I&%d`2>Xnk~oE=c=l!KL8O#8QcEm!3jV@F zRFEsYND5}0xpo2Ls{68J&$OPEDKziz(<5h)oJ{W)dyKeFZtY24WX)9Q+NHkK7@$zmeQ;`X4ON2O?g`it&UvyQFr|Ni zVND)C)S@qD;x&zRrXEskT(!_!AzV_zvG_?YN19c#CC?uiXW5fE*}?#@J*7NcVf8sy z^Y1Pj|PkI^ipkbe>&hjqC;=mLZCUg#E+2EFm}jP5NAZT+H|i?=+rI zJwX4Nh-6kvT(Fj(f}#mG!9X9p-%&@KB^TmZTew3cwj&p*(d?fqDBL`?{kc{%;^>7z z+wOCv#W1#sx5izWpQqxL6<{Cp*C$preV#3@IRnly_dIIi)#q-T;Ie zVIB!HYoxk3nF2Aow=KVvJ`_i$B#x?~^OpS|syXAY@FmB-~-5ZS@SsZ;l7i1kr z$*EH9sYT&kV=Wh*y?UyrRLe|&+LSO&c3p4m62%o~67Ad1G)TP{cS8pa&IgI~$C3vv zL!xlOd46ZKsJrF}yywo$an(vMYfntef(T4Uub*XA?1AsQ=Ymwl*uFlwP%_;PGFZfv zmte!KaSu)V<{(0!u57_(v=Dix&}{wec!b~}*Vnu%v2{P0VFXJD4W?p@&9rW#(VugEWkktv8otfitNKx1fbz9U34lj%dbQOVtQ89 z>oRDf71Xz}`q3P-sCM7vtk##bk8Sx%4<#lISFdEro05w-LZSIax%v7~P~j3@H}9mO z6>Tl6Xb;T%e(bEeG)|ZAzFE4jOzOZDc3!+ro;v)c%R}6ApXJ>9ThDtIV#jYv>V`{X z-C@ckW<6`lwd`P4VLD~WChPI#t=?VCAg~M4rI11%Rr=D&n@=ZlY^WJ@oD=L6wsqW& zd(HQ4c{KY2vDD?OS07waA@O~RX$$SGDaL%H0~Xgmv-SqqGOKZWKm8|0tv~rD`k3q$ zYQul@v>L#|Plvk=GRyd%U3!KC7Uz|U=-ac=r?FlH^PfKAG&nFgvZ~5&tP>n}1#`>D zhpyH@BLvDSiFk8dvz~31PXEzDXgMpEO~QFK%QPb{9Y;{Wms83j4!-G#R-(`-%(d+b z|7l-_7(Bi6li7GNHPs#Ck9oPLwg4cXmxWfp){0*ZUYzm!AVb`XO3QFE=rlWl=^-sl z_QPiitjNZ%4a~Ji7g)L6_dDd(ipnQ$+K+lA1lh&&Pr=F8uV#>G(V@k>`=c>z-zMTU z)88g#W5Vlr=NwdAW?N}#zsK)WF^qp3@o-udEVHEFJqNuH>w>>1r_~bZ$zl9K6NGX! zQ)pnr2D%%vXQ^>+&X2{-`*K)Ex&com>O!8$r#O&~`Szb~*RyEco!}usg=#^trNzPz z5&Xj;BX>>8;1f9k&5v*!Cb66Ph49^k4!j5|)cjmUo+7oZY(j9oEkhsh90$raM=~KI zb?B|tn(?65Kb-TR=u|b~eH+Gei`3yhJ0=Gdo`Rj;DTYt$>43df2gD=(yJ?r-&$mOe zQ(y|%Vus9}UbUM*MU5DR`mGKYd27nbMyz|S&`hCOOq-QV*B)}j`0Xeaxm%7M^%9zcHQ>iu+SCVbK^t~Vo&h1ar&pu@7n(N=5_=By=gPfw$2KK~=MSI)8N4efkK zmG7twW&;PGk%$(A4{bq@KT|x0ChhuCy0qS#s%!xiPFLVK+b1RQXGE=4h81y@ve9o) z5g6ir7lJvU+Dta6gE;1NemILq?6X_fyZ+9(oE@~61uqRMI*_0%q}9akdes$-rjC-( zbshcL@AUB6`%lwuVJNiZCZW!Tn=cueA`7)>;A<3-PdMH~fvaH3G#T4Vd3i^nl-O9I z5LB$ylSoAm%khnXX9n~9*%Pd+f2P0CYy>cT!xSKuEu?TNs z8b>Q1&VxJ?Pm*{=rtLb!y=Y#g<7qzsQPXCzlb)LZ2cNKww`EpUjPlRiuaMu!??bGA z=w@bT$KEX6qvXvEtnr`GgEl)#EPUzWdBQEWa}8J)>f;YeNYbXX>9T%+$VRox&4t}t zuXz0^7NY9&hnYgF!^;Nb;_=V6M>9c~!T$4Kjpg<*onD49GBI{X(m#MJ%AQeq+)uXq@Od-(`I^17zqJ*>p?vok4J0J8d(7bYC$|<=f(btc zO8lEfYh}4Wn>!0p8$OZ&xuY!`CjDRtzn#{x)lK7q!)-#?H%lZ4b=G&#(Q^R}$< zC_+WKuCqMSA_L=R7*tQSeHnraNVtA;$CdO~zux$v=0$losDEnxx|ergEuUgX*_IV~ zfsQpK==cYVZe5u7!!a+lSM5sDqOHb_u0(7-egOt1>A>o?GK7YU<~z);@g$QyaoL2= zv2%lr5Yh1(K+ghmW|6~VHtVs3`uq>zt6K{@^69|SY(n%rh80Ipzd5&2`;*tN@n0=l zP!B`T`@hwHxVo9CH*?@$rG8Ize00++0Aa8ljV|1PmH`&?J1{q+Jb`!a0&z{?ybX~R zPkY$?XdmpNxk@EGOmj>;xqnYcod@-Ej(vabNWbz!svks8&#Op>q-4RT7u76R!0o?& zlw6*`oHmZVW0588OCq`>jhKlhV-eK-eLasmuMTpwe_QMuE@dsM zcKJ;)V9*dq5pT18n050CuaKyX_t!(tfb2KS4Pae^$$l+T_|DYv*K{+0-bm#H`e{4g z4MeFm6Rx8RP9)1{C!?Rpf@D=Q3VkU24(pdpTuxJI6@HGCrsS?T_^6+^zYP;}=W*?lo61@^PQgFAb;@7d-0D5o2_byO|f!RS5hpa5?j zTC})rbtJ|r5Q%kRC?+NT7nPLn?wdU?UO>RDfwE%|T1uwaI(x5<73| z<_2PC_QFA<~P?dZtNb?2P;C$TD5kM@r_4`-p+( z;LdH4Gv8nBA2VbXUaSezA-te2;8v;#Iu#40SbSkyiEA=r)3Fd56x$;8J^Jo#zF~&> zD0*-H^@#iJ+Y+^xskogxkLg?0O#cR1^2zx07m1)}qptJv{RXWwb4DTG2*yiU;$_Hw zq-wRz84g*jG^Q%}o|s4P1Wq+(pP?G)@w9<=Ob15?1X4?xh{l$tdVVv{a_yYB%^&px z(+e}+nX5nzu5(nYUQP*=Yp!Z(W;^dQ=X27*;?d)c@%Kn~o>sRXbjPFCDlVWFQ(sIL zF=ZdUgxos8Yi{pesUDFF#wQTIR>(QNE}vXJUQz$8kNEb?rp_%(oP67y{PHCyJtl0M zzFxrKYOnV`T;qnECeQK}oBKB7O_HM2dmmO8S@ey&b^!WSm>X^#FLQH=9qsRnT0wZV zRu?B!@>=-zsO~jK#=SZ&l5%{rn-OO{YSlG1g=Lns9K!_=V(GQ`;aR^}x5nOl&Hs-C z-+AAsRG8o%!Y2iu`O@%EA3Wp-9^|HY_#JsCU9{KmL4wVP36IL@$4rBmfBeJUE2|I{ z5nea!_9q&8%KPuv)=XA&A*mjRVrakFSmws6>#ZW}T=M1NgPU*!)vouVu zYn98QNgjsZ`03jb3`CnWSYMj?fGmJKq?VGF4-h_z|5NYzfdB%oO?>`vMK)!)82Q8? zX=;{01b9)ZO$`fnz@r)vgI)!qppJ<6ti|!jws=@*r_1T9TMO~E1Pd}#bXf|xe!U7< zrTQ(fP9re?t!!!g5W$58p|+SJHWt6eArOjvvxH(n3bk^wmZkng*8HAe`FB?k%z8TN>^UIhm3);e4DNofe3r+d|!1L>*=Vn*R!a39+234ftl z^rjuqZI*`^p)ywB==*tkA3VV8ntAMARH*#Yz-~whiJIxhOHCRnG7zGExTl=)44fY> zi>d1bv~_U=t%rO>{I7~?PZs^NWI|DkYS`Bzq^L1)z5Q2sH%mzk3!DKM#aemT5yKIh zz};c@3Q%$MsGplbB;`&OX#&B)-SB?zZNdnt)vvxGXy-Ys%WnR2`%lC71b+S*46lT& zw8H8|R$e9bz;FqK2p#-M!llG>KAHCwT+Ohc@3^7HyIcMtF&x|o^`<{r@z2Un$KKc< zmdGZa7%WPaVO3Mt?}&HS;yB3hLyS+q)Ay3~7mBF{wSVN`$h07V7&OJ?kX)#5Pt(PO zWc(+V1~q#z^k9Z<4-rj=izRm#=a2}dsW}X;p_o%vIdnyUHZaA;{PCfj?Tx4}r1M z-*l6!@3T-)4XmavAwKAkxSd0%_KHq6r^*z8p$|e`K$*lRG~>DFi+@m`mI?z=6**w! zL^jL8EI49mt0JV1>U!dD`YoNx_m8Ye2k)Q6w11YB-DNVXxpsK?-RF7mv&iElYrFaQ zYN!!PP|(e@rn^pcbOMDhJJct54DpVKy*PFg0KdW`{;hZ?jMy%wB^~@@{x+|W_3k4F zq2=V8Gy)ig`CTbe@jT>nffzeIFJCn0oe(aGryF;UKhiA&gJW#iL*&XrB9}L^TYMPX zfNBwon_$b)_qS=ceQzMz^=YuhhqUKXU?p9r@PB4fFnkixNSI`#KSzikvd^h&O=@Hgwr`hQ|DH}4fx~U z1V5H0?zL*D2r7!_-=i#E@F~TIN!vG8D$$oHe?vuEJ-`v2X@Ntbdch0a6Owu!nWHc$!0V&$hmxnO@R^I}(Vh3$Rrxv`XzdS3Bkt+$hu z=Euld|3^_3XO0o%AQ|j_%o()eqIu8?<)An}bc#;*-n=<`m2zNHiKbP)JsfshyTPP+ z*pi;r@X)=&(zW6CUmiJZNVTkEjZGY9E~y{4-_-x*wa^cZ83_nA9P zX#xe;#JR6On{6*1SyCkg{%*5mdN5@p8TGUdhj>}O<>;g8ZeWZmd&>7W4^D98E1h0; zCP6C^!y>GhgO028<`(Rq& zXk4`+?>LtpYJUdqx{oq&hL)wbJOSTtxWbsS9L!NqX$fJ;pZT5iosNPI} z?$*5$^i~q*ls*$x~W|Zq9jB&8=~M#mvKmJ_c$qb zs2gcNr#@8O>Cc0#6Z-UjiHj6x8Zxdp+F2?!pInWYzv_vvR+Kjd%Fu7v6OR%=rmZa{`3R1V@ZzzO9pAU#U+Dm6vQ*l2V{8-cifo&#C0D=SEn1gNdd4)7!$s z&BaxdT-P-TU7*uaR-Vuaa~4dB>l{Ra0b}5olZOHU6UKlq3BRsbp^*x5qG2XzS^%$j zfXo4_*y(^fYatHYp-z3vb`$tbDaA&{JVUn|OrV6;&w6R;9VG6NZ&+wD^wU?3g~Ryw zRx9};T3+V>Y0)?etO~*CDinfQ=JBeHwF&FEOM1-eC-IQ))CDbwDO+j0qLc+dDm&Q_ z+}ez==-*HgdG;~6rp;k^HrTyHTX+^&kNSekm`4**2`qchnDz``olhivf{wyXC;moL z?S)hp7GFByZApQ)FBNAZ013Fl!!mWL+`Y^bNNM0Hbf?FUi3U^@U^eD$IjmdrB5_1v zd>oq%$_=~9E!&Ps-dEI#f_b;@j8p_Dw55{G>xgu%a)&!5kk=MU@nmJ)S%YVw!u0{P zcn0!4ilX5O;DP&8z|+N=6hUs#04r#zS;x&-!_5vkO;3PP;U>x5TQQO^5I*7_>5-hP zL)Zl=XfTZ$HdA}ZP~=AX5%z^TyfG8O2s^&0;cWDiUc5FZk7>P$6EhsaNv^pzkCgYM zdlN4&#cC723cCwDwOmUV`rnSohqX0}(UuG9Meawl3b@IecLtSN; zW)qtCP7^uw`&y@n%7NRf#3&v9tC1MZ!AVKGx@2J44X`?XP0+kXmorfT*hm2Ez0TI? zSjCgm5A%5U&WO|APdL5Ao9kN?`bt3s(v0htfW5C^{PppV=7+YkOC~D=Mxe7uxu6Sl z6TkZ1Rfqp9sL&rNU<7R@Js^I*ekG-zFG zV~DRyI_PLJ9G}CaAZ>EVAckkt3!04mg9YKUvV!y(d< zf!uF`4{+kk!SS$H`IT?tjBBpP3c6DRQ20zc2bF(|g^g0?xCwX-2bPIlJ}0cWB4Vof zVxlpdeuqaJX~GlQ8uOo?aRkKOAcpW&50so_fFGfCG8&sMqZ|s9!TT>Tk2a={^}+WS z%B21MD>dw!C%@BgR@7kpuE3s3lhdscVDCz&b1|?l>GJ9d*w8!(EF5^;fc4~w*ESWe ze26s;`=wOYY<<4wZS8?Z zr1_nfCY%88t>Z7W7}TfY=oSX=*L}za6Qjm76cCs6e|AjdYbvz+^~dta;@v;>K+V}U zaxFkB1H#fA&c{-l>`Ost)D((_ZAX2&BYO{8;7JWYn|E)f>Umgq2e8QHaZ?wtM&9Sj zDOWiiSbE_M==`h$8)p!1`Kqw3myD{Nk?{57lh~R12fswc5TN+f>AT!rwsWyxkdfU* zU~e7vk!f9I*f;SUc&u5Qvo9#TLr$g!e=EkP@T#`%-`8@5pRvP#{O}DW_EcpB)(@%} zwTp1(iV2@vIMC#^A!aIBZ?4QXG})!-si-D$fR!Q5z!v7ezXARSi%w;L+x{%D=NA)L zGw1cEg-K$tYu^nq=nk#$*#*s`AldnU@f$Lb9hw81&3`Wy;cFCAF?uJbn@$b5VhKwo zBq6BMoD>$$a&kb}ANuqKJBM38)F1xdDW(=e74h|sLJJdwu0%1tZO0w7#Y+#*kZEs< z?rwI3fWK{-L9rHW*n>oU!?oTnD{{N&$KWRXWI8?(hL%3ivm)T>Jka=iX(=7h>rVw1 zWcdSIkSc+NWRENI^w|g=7t;efIZoWZslqIKYGg2yxx9& zxFp2?zxK{LD(bC!_@iDE5D^p*0YM2t>23uH>5!08P(m6chSaOlA>E)LA|XgOsC15i zFpM-q2ty9t?;iEu=Xu}vpZDK)t>1U8yY6!M<~e)sv-dvd>C_#hxK($k77Kpc$|T2zdpCw?GIn z-?fT7(_vKj+{bgby_G(W_}U%6>kkd@K*s80Z$3kokzDEg_Hz;s$uA4p1`9ayB$bv{ z$H-W0gUNCFoFj>y&pJ`^&IjggHw+r)_BXq)O?%(oznAcV*`Vi2%GOV{7&}R|#VyKJ z?d~cs5y1`IWJU{zH9(0Z2}SIKC^^jl9zNuT4M6}IFctPo^px7@&%1~Msp<*~iyzRu zBI0ywDO8{mJXA!V0Imd7p@#zf3W|!NQ=?x2<*~6i+zz;bBfzy5hL&Pkcd9TTY=Z?* zI$*qRD=86wykC-SKScQQJVTs9Eei`v?>mLa$Q?Ri$Ct3JXTn~HE3p$eS}9QNzUZJv zp$`nmyAzOrCUUqU+d_`Krdt5;?;z2!Q` zRXXC0pv<*kfB&Q^=#*nnTRx~)PvELuU-muX%R;Y#sLc%oPuuDh*~@27%BF|!?{1P) z>y-{c;r>)PI^;_r$53YW1`IAVJ>WV=N7n@i^(KC_fm6?BXFRVTFo+_eqo-!+>FH4b zse^rM37MmSW7+OaJs?2KVe1k?_XdFg{TU#32DTlRz3&}>3>}%6h!c*9i1-Q^4$Fa0 zZ)X6Thb5rl0Y4;#IpGFWM1BD0>D}97!{uJ379QG}(833*q!iT6JUBs*(rp>FqkA{$ zeBlhKLYnC}p`M65lh&PBOr-E;ZftCofttZzjdyJE_NH9r%S2ocR@oIFC3u@6hSf84jnz>YWu+F(yjy(%QhC|gbgz0dLZ2(cU8!iEyAhKd44!VEScLqT~**!E-AmDKvP zJ6*5bo&lj>YCT?w%QFQ6@(^JDz*5EJ=H95?o~EJm*>iv$Lr8!`aVK_K50!^|ELNO^ z9w+_eSR z*?=JST@N?dROr6B*a?t80v8@kI84&K1imJ(^PCoN#$^Cj2!ywBz>qwcXb2#58nhB{ z;t7bGw(nV*)Bx@!FoXepQg2(v>%Hejcm%M>2!8-&?noAm1(FWZI|WEoPC$+{6-Y!b zR?L9!VGh7c!mg&Fpa)rcJ7`vo7tCI}#*Sy&>8R5FwuVXE3@>+{PF(YO8ZxD)7H{rK zYaI(}>=?_tIXnEGo4sriyW5z!Wifr;chg#V#*F02Q{I@iou7V8gcQ#~{BNe}-V$BqSt2OF#rQIiByq*@f=wPYB35F4*sR z<08Sp07{S7;@cH)eA+&!r(5)8Uw{rbg$5e}dpzW^R3oK_9|MdLGcZM16R8h|T}J`d zSr5QIxhj_hMESuE?q1!R*n)6GYujw1eDK+N^xTWOzT1ufgIV2bQM-NAt3c256drx1 zea?jMl0vY}9VHnNYRuq(mj#{2+5Ou_<1RvBNOleuiVL^Z$Cm3cc`k1 z<*=$cU@`xZcCh}ADfqKR`6r!M{U`3YoZJ@?yeh!+7wovGHN{L`xEL9p+&n&iH0i_^ zdj9cCea6o^MWcrn;1&~nJD`w*y*E~w0)+HxJG zhJI#1k3R!2G8f46B|+N`z;Y_VhGK}f$gau)d+sanV%wlk?f}e)z-uI2A|{q3NADH& zUb#J`09cLpVdt@!Wc%O8i3WHI*!)Dw>cC1&5Vv~4tY)n9-MOdt}4&b>XXqs1bb&}Amz-U(kvT38qN))>=gz+F< zKtRKSMG#6>0Wa}lP-7&;Yo}fziG+OPI@I99Qx6IT{6n6oSZg_n@KuEjpNuJVXpX(y zx_dmf_lq9-eAcr;L+z_HGniB~*IP>3#9`#YE%}UVeMB?0xZM=|YVf?Lz=A|Wy4_yG zbCGIJJ4?&!-~zw>@WFp?&$D)Cj-9}ow-%s5Ngh_uRJ#5>xG=pjXgA|aW4nA=bfw1? z3MA~o4+bun$HX)OxkE@`A&CLpcWr4jmELDBe9*Qk1b{m*^nhHQx+)jCcJ1R4$gB~N z<;#btj@4-gaG4kD4i6mBHxoOXq)EjapjA3xW3qU&r>7^d7au`!O^6Y}dH#g42D+L@ z7YPyjpq({T7oEyWJ=AZLc@lFT&B)(iR=PY)ROT*9yzN7BJ}quD|z7M#z#ou}P*SGZu->pIKS0YK} zT`1HH7>&Q$1SCVC1^{rufVdo!lUJGj)#(H&ox%9Zy&UZ$--^spXC#4JND7iybi@?Q z0>Btqn4%72+o$lkXMfaq2ofO4s&iNzt{v#Z2*`^(YVao$+h6O2+OH|Vu^|Napj|q) zkMBW%@N=kw7m%1UV06rZgHB*BYwpNYOGEl0t2gcI3##FK-dBw-8?>D!sBxtj+o9$L zyNeSp!n2t74C4Bk-B%>e6lJ*!e#1BkMa~?qlcV+?pBw+;Zb3mtmSqbu))X*ckF}Zk zZ}0Ac`i|+f8R$VY`PH@zyeOX@>tb>kj_j+3p)Sj~OBK)&X+Be%3#ERjLxO_@6tw*_ zI=&^~41NEu^(I$f6QU4c%d^CRKTvnD!w$mzOAZ{{Z>FR!5JnI_z9^Pd&j?B*x95N( zeg+{o!L?NfGF{Qm_8ksp_3`U6uQJE%qcn7rZWW08b>xcAis& z6GEPDnM9>Lx}l5^vgZq0qRgGDEvtLD`CLhZ{HubZf4aimYb4}pFoE%9%JE@QQsqeW z7XjqEDZl5-~Ee$4t3EL2fCw?CsJu@3r8IfJ_#+QkW7eO5lGB z5ymx;>ucAqxAO9KnH1PBl%O49C|m^w-0EiCVKTr913*vEfxZEjH(ivdUOIr3tYDq#oBcsB=!4~BpUCC=J?+UxZg+0Y$ zz2u4pTyG>c(zrw>8V3(9NFZ5aBz3E>S5RRzO4x=Eni~#6$(|d%XKd%t>Izn{jxtCM z0&{`H5TGDJlJn)@0*4^4h@fCB35@`d&*eZuo|(_Ce0@bE&i|er(3ZhrVWc2b8O6nG zxdQ%o6%-zVtD=-F5{=8N3I*L5d&e{kt{dQUqu_pAPk*Wrq8G@U5!@{lzU+#ID8#yH zjOPOaw`y*@hLCy6aon-O9vpVlI-kYKRbekyXUY`5k<-t;*MIily_r5{bO~`|k>g)q zUGT1j1QIws;u*PsaD;*Ss;FopcsJ6ci|e1M*J3WRtF!c+pVJr8^sro0*{Fi_!lKi&6|&!$w-s9BDb zU}xhHoN%q8ngz$2v7KteVmR1LDh0vvlJ+ zZ!oim<1a`h#z3UHa1vp5;1SQgEqu#@ONv>Zb9||CQ^dL98uz0V6^Ihs;RJBCd7-uw#GZE{Bot4j zmGn-6C_5i0lWqdGx$v3*w={>M868Q&k&r@0=IJAV|H=fB3jp{+AiYCQLD2xgJGHob zF-y2%_}8zuJItIatn}sO{mrL(10FpE7OHtPc~mr&C8jWA<}k<=mb}7DmZwd>ruVc< zRl$~)XE?O!!?vWUr*!b_zcTWd?{sKhRKS3&# zX!^3MmIPTmNNKxGMe9)Uni2c#p{FuacdG}a5Q;2MMjGJ@kNv4TA zz)d6!w1ngkSRtN=U%`)`Yk-J_P`$?ro%fg!axNKd+=f->E1!>%F0Y~_SE0wDAl2+( z87Dx1J=ePBat$gX06iVEw)WJ0?dPq{#o=v0umfOQ2oUxGYk^9a zh3v_aSVCuMgcRcOu&y$DxoDfc)P#?!qO^?eEUa05647Z^|9~qhG1^mv#mtnN*!PT} z+{;3yF3tB!<0WV#(;vl_O7T36PK%FY4V#i(M-*Uy6x#;}ryQ&UyiGOu$3rmsB7jrc z1HJ+wxuZG?0QqI`o0oxsyaEPp6-xHFODM|AKWKT)@X{~#;~5-8-C<(*Q!h@Cd^IZq zruAKWdoBW5oyEbh&f5$8>PE;~v}>x0zsk?&Y;0^KI9i!0?roY)GBRu^!&^N+Nca?} zZ|BJRWUaW#boq8$tQlb0JZy+ho%(FSmr_^7$Bx;0+(ysu&f~mUxhT96Fx`Y$&sG!Z})6 zLtA8V-;)doBf(z_0#8=Jc1RwWnvfia8e47x#Yf8*D{)jjk4{?XQ49$kd#)n0it_}2c#%J~Ffvs8xqiz~cb$;+2urr%ZS@j0F zNk4tc2erz+F1W<9Uv(CN5>^u*%SOHeMK#Kc5I#tHi$Q{hftNQD+#5pSGQh^x*4AF= zGNBW)zv8vC#sC>uz=WQ^aN!P=1FOJMMb*6Yf1SiW=AjTx_FI?>othjgCdMr z#w`F($MZZsBP=YOd%xsNX0HOwL!BZbVt4&W3v*=0PM#$si6GKGPfM!|i8vTya-Q-S zXQz0tGBWamRV^~xm5@j%@Tat;{kt(uvL0TNztdWPoI-0Q@Izpn()+vXu&qG%qjs)# zj`^&^W0TXw#P7gzn_nJ8qbZGzja8H9H5)ITJ0}G!dlk_bu=!wiGCvZrF-C7TzbhdU z9KWSpz82wEaQ|oxRkZvRBwIivy5^F|(eK)V7nYX7>gwvuFRsn*t+=D>d=7gz_!Bz` z=G*LE>JzcVPTx*5Y#@7{kZBUFsEe3su!d6XE7J!&7+g$FV2tu~UO@*QR?c<^w^BWp;?sg*5l_l5Ma`8pg zu-;EbX7cNleT>^d9p#Y5_B>4YP&E9+dd@R$zu3WQ$iFWf&PtUYLRBsl{70+=X7%cET``{2Z#TEvqNI zBw0Ayq&>w$o~<4R8!?iJyfqggxWE@eLB>AoriqX^&)}z4n9qZ6VGRNd#!Lf>L~Ns& z2k$J~?B|+|1HL@Su6-jTGe<@6n6ks`I=}Ys%TW*K7nMo>zWZI)>z&xxzAz0FRF0NU zBGb#sffVbJRU3XeW=4&&-}ca`X8*||T{n4=9xvyw&*wNHdbY!4=6Nd2Q_tL8-z@QU z+}gSnW9=51v{%!2IoV%+_-#XpzdV0nz^Nwdeu;9B6Ig=tVj==-J-U1B#4+np$rou6 z^Smjhu9HO$D8cffJ2x=PA{;uFBrWo@oK_c>+j>QflsTWa6d%(b(4iIRntbVTh4$7fCk{O$=~{7lUW_X!qDKr>VB*1nE8WKxV>w3m1kRc(L^nb6 z{TjypJgmPPixY|~m?-wzpf~I&$R$bH_(2=l%0A-b>lEX_XXO>$0Ix^+p9Xi1=$(Dg zSGwt-=?;5{?&_6p+a#%+tT?`_=i`g%N4Usc6eT?XM>#j!{*KHX#ed#W<%hF{fLu|( zR`yasF8{ocP|(NSgBSIBYFSP$ba8iVzdT<(tuFJfOXJ_JnoCNHu-3LYSkCRzt6Xs| zT}(U;3k-KC2g8aSaUL`0Q~c$V%{N>Se;N)<4f@j80~C^4*lJWf!ye~xgXK!QsA zb2#2o&pP+d-yYO=p@bbhOEPK6y91e9uc~;cs2q$q+T^I76R?smX<+%^TI?vuK_Kl( z@3rEP6Ig0;bW!Zky}aZYv6s{9a@vZXuv{wOKTn!rW%u!@aJl8+8_NhiW~hbzM+~9g zI9L<@?ewD!FH62I`w4riKa6$bz63&~{I3v^y|J9*=Tokk&h480HreI4(DHiv9(4qK zdC7}rM+D_q_fUuJl&(04x7U*0h7-$$N$t@+6> zUC&Bv;oRX%-V|P|*5RoiH)%rC40mkq(IvvU>HnVFBJ5ZZ)K-$5r@?uLu%_3-N%o)C z2Rr))X1M=+$EnvE`GU86SV_-QgUz%6%Ovox1j#)6UOw`!X)0K4(Z9&T?W;%H#X|!ML zUfyup7iB`aK#v&^@d*o>o!{(pMMtic?n%LJGMOIcs zRG#R;{l1Op%qOJi%bs zh*!M%_EDS%H)Gc6f9|1`UjE^1!yV^k7b-@L(`H4S7oA>b+VE_6DDE6p zu8Z_OoU%-P|5%&wC&imB`MJXf4i%=-oQZSE4+w_p_VHJKdetlZcp_5w(2@^6u!cNu z%|uIM_#fkuCEK`hgU3;TV0p7%4xgL}kFVSG+BSGg<-nFO zD8+0ZjkrW`0e&B+K4HghxLn@q?zN?m919M>rN)ft=Or8DpClpQNlh#B_tzpMxBnb7 z7U;LBZ6(L{v6eqGbiu76|M#oapUM;c$QWH*;3B;CeE}=hPEEO(!FeIJVi28(gg1X4 z37!YB)!j$Bns$B+jM3+QQmVSyldFn;=IjdU_HQ{|+s~Eoj(F3BN~8XtFC-&7a{oKM zf_o2_>Y(+8I950WdotEa?tozh#_buE{}}7fW+Y$CNI*X;%aCaaX<+pS|IsoLtC<6= z(vGJ?iML;!@sTgLDyBkd#SHTA*R7hAx!@RnnQwFD?S~g`9l+XK^-#<_EG8u?!i)>Y zMAFFIdRs@Co~_3Ls>|?Q=+8I5>-te~C=^-yVWh#?y}tA5lNxYRNbAaL@7HO9*)xE< zm6S;fDcC;{sNvY>WVnS)F%8l#eb`&d_uu`V6&W+MAr<0@+KI5gcrki(%x0a|wXelB zs0D*5$61Ba8RIOQWejfL?|I#u5^3yKZZO!~OrN9r0F0qV^87`~e!e;E0vDSW%2l%F z=ta|_AL7lS4SbJ6#=i#ZWdCwUfA`+!w;hk?g_g1Op+a48E0l>h1GYT>XHZx1kR1O;TzxfaanY8;kdG2mpa z>K*vMck~%<%xP{6YDitCnnR@cI7e(f$fXToY?*v%5=)PBy6+)Mob~XoLHl8etKAoe zlo_wjsl&%No~=@!Ls3XcMaj=SXpKo~axo|?IUA~(8L2>#Wtm{<72Z*t(mI(&S@W~F zbuF#NLNs~y&Y)#lK(fKLtNNu8%+97c%%*Zzk1oQ=^ng1qNH+bBAa zz~7h2#O=|N`L2IGyQx66@iy zZzDHKG!JzhY8tQS9f3zPPW%iopV*tKa zF$EgVM38YyAQ?FfvM9PgW;~~nm`2qdMmOwy`=+^4P*v;MTXbZ|_ScF0-_NyoN9pCd z62FnX7@L3Zqj`Q2`PPRRok9njw>QsJRN$?>E7Y20hRy_9ArQ|l{pb^-HmuloZ$>;* zw(@)n)iiceWh8Wv3|k8oDI&}h+G+;Sh~L#TU4#<~N1mTf{IYnUDyLZB=<#}_Yu{Pv zShcxB$+;PGSG4Gfvbc#$@TylBeO)9jNsH3&tA%Y>?D_~6ELzi4$A=?q^$E{JJPWfJ z&1=Td9(kas@$2T_228GZag;Ebk;XL5{c7+S-vGA{yY|HbD$(Zo!K0L!nVWsw7fRlj zpFki!ylrP!Ug`1lF?nC^`?ONPOJbUmxecfB_UiqF(mrmob7b8=gs4-gx7w*#4ReQ* zs1OM9PYN=(v{+Hhl=>IY`bmG@GBm}FS*2!u0q<_#JQ^f-c5lNs4C%FoX{ao+Vcii~ z%2JScHW={dXIUc&Sm_$u^C}rSbxgwR^_4!r`>) zTWd2WZ#Tzlj`7iWYX>BUthQ%o1m>n(Y zrSK?o?GtT?>HYSa=x{nezsaAqU-U2jvNC=Xw7}BA;QZo`{S2y~?r*9WEry-ynzo^s6 z?TJw%%btDB_Kk)SB zpMcw23wF)lS{GkHIWZ7me!hs)dv5c$p=+HbT6v*!sHuc9x`8@NEOFt*;Gs9Irn=Q{ zW08>TA==br3?e>ujH+gNm?~9F-N?0sq%rS#>c?NLZi(dJP_4cg*_%FvNp?DX6BITFPc*R&|!ap^6;KXP0pbvck${f8bk8=};sa`c5hR zw*17FG-Y0lxmU8^T%5oDt>5-|-_S3uuKm!U z-t3!3eu_&m)k zE_!j)W7`!w*HM9=$L{*DZ!B$V{HMk5-%knIe#O2Xdc+fvA0|N)+Y}aqhA%X6L!<1r z;^HeNSF0Fw0zFMNmGNH|o;-eh-RxpMvv&%|O;kTOS=rxztXG$z#Q9$$&&i1z`BZ+e zO7F>3KsT}?GvqYG*>{cp^McH;23aOEr1KFjs7>E}F2ZzV;QnuMFaEemzB0Repj=~$ z`244i=-m4))7gc#+7?p=IvPgcnZ_--J;qtO=KyuTWdaVvSv-t0sr-|!geG&y3q|gwCZ44jptaK zt9Du?U%~eJQ1m)QSBrW`(s}gnndGe_X-qA4)4K+9w|+F=)=oy|fShOsS4<>uyHtp8ON#=(VAVCAkNy6tE;~s&OLCF^ATz+p4cp(lc*g6yn-?G;uk!c3Y|ArV%^JWnJ=o)kz6Wqx`xq{F3+Rk0mw~L7Yul>SBca zUc6Af!yPWT?PYayz1hoZl>^mGV_p~EGT2utxQN+ppIYDhDpTz^5g(_oo46TS;4#*V z?i`G}+3+o|S)glhE3*34-I1c$(1ux}(TZCmGZPB|Sa=KEh>*QG&r-YH!L1HX6>U5? zn=YdT4kKPwbYY7d;dpBkyw+v$b-5|$>!WmjzA2%erdCLoMSM6_&DJoOV1A4XyhrO3`2EP^RGV&9OkaZuE;oeJ)T%^NZIJG!3E-q zO#QG8+ji0B`@^JK7tp*8dqYkEuGv$C7#RogDtrDFXP)q|#nNyYhZ+vMx1zqT65*_W z=Nl+aFIZFG*U3$(dMc!n373wdQB{28c1hc^N?rHx0@HYSsNsk; z_l^kZuRCPi_JIpcqS7?}%5NX6DU9z}Ag8>n`MeneH_f&wOX+Dg#ay{W5H&Q5O~KN_Hn_r}=C$O?*i$cYq- zB)6;UUbE(L8t*&cMXYF4D9}sE^|L|Ilv#^Ey;;=_IBzI7uM`=F%~k|OJ6W(Y!DC)+ z3j5_r2Qa!-&RtGWJm!F2hdV`Yr{!4@twL+>K7|5astMm_v%4+uhtVk;xSvT?tvugYS$F;%xY-n-M%Z zvTI*hZj=;=?h>PMT8-_Ww1IalT3yO*7yagBoK{{d;K5Lknem;Ta0B?KfpcxL&Apkb z>T~8zM*h5%huLC-m`(X#_rRw6oaZHqrrbKS-7iCCkSsW=7AWezs7Qg%o2oErsGAU~BX`I*jh?(Y!fKaCG3ZXuN{Q~w7@>k{ z7H%sghv$dreh;2eos%Zc{3gy!$dM{09+VkmH(H;jUG4Re*R zTw!E9^D19SBn`@fVgsFN<&Kj`{aNybKVLIJ52mQZ=XoqK<{g-;E|1R)+zSm z?uxyo4Jn>^*H?rK<2@;eTC2Bxr`M5AG&43#I>e6%?i8wtF7umnQpJSEQa+MOySD3lI`kulk6A> z)~spKxvu4th@HM>-?prPNOqoIUg@Ur=tkA~%^h3Iyf%I3TDWvVo0e>8B<2coe?um3 zZpY^O`W@q$FS;SFc1+ym`>PIDN$Iy1TBh+1Q!JaeIHx?)-p;KGQ0_{s2|q0zj^7hC zBkJyzI1gQYcVt4!Q8lmp;PR!2nNJ7Ep`t|*E4B^hji-DpK1Yl=B7;Jwhg+*}dPMqU zDoMBxZZ;2@7&F37LVIo$4p$Y@iktDO(u+S8}5!GG!Nn>jl>uQv^X zV3qj#`K4D?iH1VJhwVflKKo5*Gk~}v5bpwid7g-8TIz&g1A%zW_RFI~AT;j$@-z`r z*{r{EAPD&jzrq^?BI|d^g}8F>w}1FQH~F77fw<{^RhAvs#`|Rg_-u_?xkFVpv@$tfEUF$m6xz2T7SE7v#by)x8 z`ICu>iB(Tm)0BznG=_=k#NOF6jK8=P6OX)0=`vyH2_~jC{$TW?|H1YryTqlZTH|=Pxw8^cFNg8Y zjwQ%y>?eC8Kv>y(P@$E{-USw6)l}>L+1i27%y%u;OHbxb0y@jwYLBI+=@x*H!U7}_ zv?XwQ%I5wjf)W56QpEK;;0K2$JGFUezDv6->hdE56OivT)31}i<3S_iKtlw*7LUY{ z-WU}C4%MW|;>YCrnKVqGfsTq9>ot}VsLq}G<$+!zjdJx_|uc+Nqhz*HtTG2n3`Nar~@rq+ao%HPdcTQ4@3v{TAi1P{DjB1XDb z7AyF`Mq{XDx=Z`CKJnes<&Nd2a(44=PpF4HXVmZonT#*~= z?bM=b?bYYekqGjg*g-GKPe8RK_AjmIOR+P(bkCa_TwpBLx0bVx_ZU}PPP>jqMaG`0 z4GAL~kLI}dvLDcx_sJv=-1z%Wv2iZ}>j6`Z_zw;R#Yo&imVTe>;teFXc;gn1B957h z{ZOUdYeIWo=T#3}UAl7(`^ZA-<0Ak<0=6h$9AE6N9_eV(+bvyozc;UTgEV~xfRIW7 zn*>-2ZtV|=j|V8p&Y;|FWB&q_cqrcQwTQEZH`j(wYOo5TGOi-*_;YLpz0f;my=J`@ z3zZm$0!8@wV9`M|AM7h@rjK%+F3HLDUFkw^-%}N_tTwEQInD?5YDuKx1kvtp=oAA-GRN~)bYK+6K2-(f}e&^h++JwXQ66Ve zS^pj1TL#yzfa7(+CGhGQ(Q>$hUmT~hf1O^e2YgHT#!N zG)jqBOG&ik7A6s&Yp-Fmbk?aL{#|uI&NsA+HQrxgYRqo-JydWZsF;)sUTe%Dt*3J? zD4TA5kbUPFjAN4%(5RW@g42q3 z;1@`)m9sYHKb_Si7O&}zyIe;8h-tcx5vlkSt*cJWRY!}vYH*(~8AN?4^I`(#Xxm)J z@GACmkZ`DMs1}uGef5{It0RsxSO;sPd}ByK;e9+v*jQ#FsW~-?f8SyX$O%mm-A#rMlAZZ?c#ZOiHF|#5{&55UJd8ryzBeIK3pbc z8C;|-_IdF#$9Hhi-K&=acqJ^-q`$>byv4132Yq5Vi<*r0a`allOk%C|pgK=om7KZ* zKW3!HuMa~9j&k6N$O}nm*P5&S7%JPjeSb76tGNAqQrBmR4&uJ`TpHm<-E^_cP>g_n zgBFW=pXL{E5ouw_0cb&lzB@Y%HBS@!uGmSq0l*qOE&lbLe?jDzR3&Bybq`aWODbFV z*x>BjBU={Rlj$P>54(1mNTgln=n#(t>h#Sn?aA9)F63t;`-H;bS-=SB3%ucXyA?6{ zvS9Og>T|H5o($ZT}Vpp`IZBDP|MAC2v92EH|V2zngunFcV%soXH|fCS|7JY`02j>9{i}sCq6} z{YyqqkFuj&#{kvLNS;MDrdr0x!RoSlY)@Y$@lSQ+UEpqLV>T%wqS!dCP?2t!`gN=g zD^7yVff<++H#M~AV8Db48BW1jT94i`KWAQWyFRHfc*wC*l6>&GC#)x|>JO(GgUu3d{+Hyu6Beang%i z@70EtJVPvbICZhk#zBjmOw0U>leE7A&&Nt$B33F-td~D3B!)PM zl!S-SMb?Ecgn1~HG#3c0mBfbM(?rGAgYX6kyX%SYe;YBsqOoA}hnN1rG)^l2s za#>aq#MT^Ub4vJgfa}Z>RQWB+Xa5B7?5jJ*6WED6Kr!NGqBA_AZa_AYAoIO175$nG zD0Gveloj!b1w9y#&4rh6E9!o6wQ{DqB0X>?_?m8ALi+v%j!l`Qn)(2nSnk^upRWv`-7uAQa zB$y^Fyea*eq6Z399byO`RR*Ala2w>$YXFX~hTPg(NJD0z!jO8eOTe@yk_&kCdR%fL zA#w0p>!=QyYW~Yi#Oy_5G_;8J(kBea`NZi(9cnz#b1xs`2F6?&(J=X{KUV>Mwz$VE zxZndwBEY_YI1Pa7=2=wHbpYtYYCueuM!pwWCMyH{^nQ6~w0NE?aAx~CgR|6;Fo=>a z541^H&b&u4fm@+DprRghdg}>b4CL4>sX5WN=>>kd_^Z4swEl>-4L;j`fwT`BlFgX` z%Y|+Q+t_PCI>>!rvD?J(W}hdLdO1@!f_tyW3GuuMsZ0BCf$1^5zm2pn0gN5~kGsI!D9*W9$;1`v5+iT~U2fWGeqJ-1n?nUmt2HbBj zq%9k)p&ZXvy`j+`5V7!PzjYx7r@M|83_k;x!-8?0GGj3+XAP?lb;@4Xru0FigNv~V zlFdYZOMm07SLUVSIf9S)^;Ix?>{j)15SL+P-(}ef?mN`PIoaqi2(FnO-_Ej z!E>P3;>jhKOVrU-558CoXj1tT(J^Ky8{`{5aT^|ldaoW*9?oz6b>e2{1Vgm}4CQZp z&Xrt7zz~msuJG#No7uJ%91|O#NA1*QF9SafahT+Ssw~J?fR#y2UReoQrQ+E+D2`IX zbOz`H#v5UX(@m@(Ht)-sUtYo%bLI=zy)Fdnwmi|AtLrJ=PX54#<|6@ZN>7JN&)emL z77cgw@jZR}YN&cp>GN~J%5{Ci@@%fiJW~FjrILN;NiSY91j+pw@RSfX$P7OwvG4Bt zRK22p*dOwTW{d2Y9*_z431-71``>rp4Xy@O- z0FM@BT^c6d@oqp2*+a0#es8Y=53T3yDn451Ly&>4T4jjm>+%;V#rX~{Ss9OSEZUQS3E<` z4ehgjd6Et`iWsR&!G>7db4Salx%w1N%V^X&3xijz!#?Tv(*CqOqudynZagCfo%trnS z=9NUPLY1e6A|N|HplfEM)xH;zUl8J}e|FJJCgp8=rFpIFuZv7f%g=ePVSumRMG+x> zNHKA4^Y*hqUE#+vOL?yg#5E{)3-7AsnsXZK4faKwuh!){lyZ~@1Dl-%-HT!xhHw66 z2YRXf%{zI7x8h$6_b!dy9T`+Wb;jS#ETq{m8-231mQlDGoF8ooZCtJWy?j`)FCcCFj{F}lKE`aY5qeaGxyu!GP zv}rVgC?85W(4+#;Y7VlGkpfzY!~G5)jdBxe<~h*+0T8-CmhUZP5!UaK<)g-P3j?n# zpJI`)xSp(wk}P+B_ao<6_z&|bf7oiVQxu}U{`W{8#a0qnDp`ccmF~|5pMj=5b@q$} z#rc#?L5LdIY|8UqaDTJwytvwP+~oiJXO!Iq}|W z(`SwGwhOXLcCz(D-g|eLWv}&Pqj*wLucG416{^ArcUP`A@J*E1I2M~7r|qTfnA1o+NfJ zgA5(x|^3`E)U>g~sx-?NdQ0gvY zuI&lciiS$0*7&u%`xx()f))_?k|rGdyN||PHP}~|C%g2t+7Qqt){W6b4MOgMDCct-%+OTV)^@M6=oz%2&wZzhd7a)J)WV4?B+RD){fPL z00x!H1D;^A65_wPN7WCjfCX=1!ltZcFa9un-5Co1k@%b2B_lR}qVKHZ4W2w?0n&C@Nd5 zvlx)Sj5SU9X`X2k$1?O@V^s?-D`zwtUZ0{1vMQM4_zKfx_#&fgO3&O|zm zJV*0#yhMU%2x6ZW=^T#DWKAtojwU=5X9dw%q`9;)eSbpx;fn~1$OVlc;*$u5EN;XO znkDO3mpOEYAI~;QsQ7iQsOiwK>CX6BzOv7lXQ18mnA~YRs-R z3zZsy|0K>FR=7Cf1qmM#6zL|~Y#Jq#0<7nqON_1UXEMuU`f)WYldfYrZhP@E-av0zhL$r_# z>r$2|>8K}~LrFHtcW^m5hQ3EKCvu;er|Np=n>u$!>_evO=D8e0 z7YG=U_qUq15Ff01fF7RDV%S4k{!@JA^(h}cB~yrS@OVQ`M%b7(_fSr<*Xipg-omuT zDLhx}b+jw$+4$*~n3yP$rwXJ&l|M0qVN&%vxnYRU&YAfbN`6V0%VlM`rt>6qR(`C~ zz~yg=ZP<446!YN?-Q-Yey1KW;`0GE7zgtH?LJxXgDlsYv8mQo9Go-?4H-_SXdaM3r zZlx->MoW25AVNw?UEeoHY<%QYW`-=>|6=8cNokNJc(vEZr_^)t_&w^pjt!X<@LG8^ zf!S{a;}q|=%2V3?g@*{>1&i@;+l$`=T{E>q`vQ`JNc5uVBq27>Hn@hE(@-YgN-4XV zy9X|0maJ3ZB{PM0Ef)+H zj2285^c?BiF;L*O%# zcoTn7@021*E%9~vHn27QM;7ukDr@Z1jT!n}mS6PAox}b5;TPho(V7;k(fa9BUc-iYT|X^q z_7+?znB7;Iqxh@RZqy26wEaX~jcoq$`6Mwimql--RPawZU%qpv4<9VrTOp~&m47#U zyIcv32%2c7gN#oEnHLXOeow+tVpiV(`EOxF?1zwsf84KONz*9%iv1Zss4hI9DWfjo zFcfaaS^ML=FON8e#v}aEe7*#UjhDJouvv6W{i6N%_954LUd#1-jRsp$Jq-9RM(fUi z$*Qt8Q3!;~U2VvHmyN6ZM%+(7U&S0VF-G&~i27mdOUm>-=(_@m&|kOl$^p}?Eo){?~89b%c?#lR*F0MN}JJCi_|nd$%ef; znh70cL89q|Pi4RL^3g?xiDnITfTQ3@!&!Ah(x>4t(T50}(s zp;i5sz!`Yi4YHE;M-?Ndb5YVeWOD9O4ECJpyHz`8AviSFm)gE`^l{WQ?DyGtn^Zp+spow=4@TU# z?0)o9Y((GwV=swUxm8+nCSlgbr>gNYxN0uVPot`qj7k$j&+(*6a)8D3q`deh(9JnB z`zC;~@}Y-|ZPA|{Y&^>ALDX|VQJ|5h_#28nio|g%UxQ&DgyTFZ^13snp%@nCL;i`o z8vkeax%LH?{H>;(g4cX6VD3DCZyHRwtQ2|C!d~!hDGzP$OHxA39UMzl$`|s2Cn8RI zH8<|F4y<7XG~_!A(x*BMKbLnD*D znRn9S7X>PFqt9VIoXLiF2hv!yOo=yDx5j|n!`^j>@-TuPqec1uBk-c+@}wBSF`{*=y&|)P9cLa@#u~In@*hkMvld{7K;b$9L+r{9MqCE zJs8w_;qXmi{qXr<1p8KyFe-DijD&JTB+N6^Gi(OD7WuTYmeepn9lU#JN2h`{Bo;Lq zhGL|fa<}1>s|rR6b^F$|$R7$(h%!pkqRs2=TB2qF!{EFH77gkvgjC3?pMhm#!xs8Lw6P(7y(3!?GZ+Ygu|adfU!Tvoz zjq!`L49tEO&!3tlRF?)GAj%fK_b9Y~4cAt{qo$eu6w(^7=%sM_s3aP5W$2T-x=qV5 zgH6*G_a7YT;h&oup5A%j+lTn>Df`$YEl=TNywG$RZvmDz(GNuo#PlR*1uj|+F?5P;T{Bz!#W!@_tXHjdD?B&i22Qj;?hj>E z^B%?c4gxtO(U(ZRAwKz-^?nRAllzHYOAf&rWG)!aq4h}E}?VV4gahf*~lO1@&+ zkfbm`4X!ljp^Nj*MTYk=yLj@_8=Nl6v<$Ar=m(tp1HXh$GOf!o_<^Ec=x)Ab%I(dJ z#Q_0qNd4am9w=m?&n%JZc@73gOFl1A(tGC`%uvSS#fEFw^#qF=(_Z^{?*055QA$OC zZ1L#N38lk=>6Z*HGh&;kplPLj=Ie1!n!%of3R5FGs1&43?& z@p7Dle52HXH5Bxo4vF@KXBCAc_^y0BmmVrre}d^_2ntp_^_U2N`iO~3ZDnBYY8;od z68&Yjvc}h{3B2bvbkPCW1c9PjAs(4?b(F9%$q``jfw4Siv65M^9lDu@kiAerIFG%J z(Z>T5@(zbu#cE!~8e0|7D47f+=p5OZxH(J<7nnl7a&lkfQKwV)plp0AcH{IMQsF|` zW!79GRH9|Tb9VbH7UPf zxS-c-(b4Dgm;0mH2o-6C=Iwq1KYpqD&!u4k*5xJ({qFd;`a|?$(g_t&o*A(70UzWo z#ooL>Q-HkJx4m!8{b@{eH>^}r99&emhr6C1YfS#tA6_L{MLvT|UG&QjU9E5qBpc-2 zWnuc^@mm-?`rxfIUNVOTC+pgml)jgqg;&&bm3(rpKkuYk#2H55lCWSoFHxRQ&xKnm z+0duL`LLqKqdYc3{@d)Fq>`p$&IoCN54jr#NtV6(y}%Ch((lF$(I8!RDq9tM-`HPW zIjg5p+664rhBfYlEnt`KOn^sDRZDnDq!p|ND`dfZBMsND{cUOdzI?{?vVQgq09Wr% zb>)B4R*^nZ+NhO}!5`P=uAZO_7s0|}z@ViOSIC8!)m7BjRNNC3%j@bx#_?ZWhl>gS zo9%$_F}VEu2|1W+<2c^4OiYSgaaKjcZAnqsxVc+00%`dLn*Q!BYh#AWUgmx%K9eg2 zEyOrOxo0%XbTy?*ShjxSD?DpJx?X!pK@IN9(kdR-T%w=3`i1#=TA7f{1VN4bo%Hi5 z&ZX4B^_B%zoUOTa&9`W9lSK>7OS2&s81#1BoE7F1K@w-K)euALr(y(*5>|#EszJ7W z|AObRaQ@-}7)pEvviIFFuXSxw!LlXllJ?9-1>QuQ?b}XAj<4)#s-v%%tMsw9CS%f<`>XKJ!mWW50`gM{C zl!r?nn33q7J=2{B5-fPHk9Wc2r7RA?eRS0D>X^UvEd89`^Gs&O0cgrkgokhoG*EKP zXwAYM0_0_hg8p9YzrNNv|NrvorS=!k!4db}jt)L^g~p{RZ3|I8AP%)O)t(|Im?Wq4 z#3+#AW-@l1pCH*@+#tqtMc(2v+9z-=#5J{%P5yY;|C(b%P{Kd|&9UhD2IZxh+Oi0TPBJ9RI!*}$0+(AiJ3s7<`d=`+ zmp3rv7uNm=O_8o}UJ0+`gees*n05Bn&y5xrlT^(;7X$F+i)CAY5)pMs|8`_ikZR6`u(WGhcCCwB0NBw= ztD4lFTJ$U~Gj+h#Enwr$tg5>@UhsGD6t#9@Mx&!|u0Rc8{EVwC7T-b(&QD^^bEr%9lK+SOobIhP^q= zSnA>1#5ClS%iTK_*$kDo%l&(h=DV{$+p?-yd3WxO7pIGn5lT0(v8-y8dv?AE=85cq zchzqUu{r<-hYjCnSJk*3>DeV@r|uhAX^q8H?YUUD)=C*2223>71k3`=bPQ3>!+}G~ zuSK`b{=WL^IsKD&a9fc&e&{)!Jj_VTgj!9c=Wo z$xVmuvJPAF&_SUN=yl;CL}U2S!`OuuCY72dlDv@CX@QZYJtyRk#+FJo2Clb<^)xyb z_lr}{%$9R6Lsj*enAQau<@fUbW4Aq%$Tt8ZiWMkrn_9o;LVWn%93zs{mozXdKG2>5 zl%XnOuFZv-Y?>bJ5t`l|E=PK5Ni@c)C`^~niW}k{&<)Dm?mbigs%N+K9>K;y7tj%T zb1fm;-##7x_pLA)*Yuik=y5g7CGY?luw%2|A~aXWb;6$aT3v z-QMP>Bs0b1olkyvkEv?+g#|WO5;d+ClJ#L^?$;BRO?^@Hi%Pe#LW~hB*>{v*BPBD) zY$`Okhk{sAaf0t<95QZEfBGAXK?G`Y{P7?v!A$bKan^SG?w@f+E0P5o(wMvM?uiXbu`bs*}Tw!RxT&K z1fmsp1OtDH`1_8d-4h1ibO{*5agq3H$+KqAW02gTWA9*~44FCvD>|mlj5lT_jlbw} zfn@K}1{7I9Q$XXU?V*VfGj>;hYPa_0E%1|*OuHu;5PsSF+-tR;SyfJDsXce;`&yio zk+sRrFwtcy4qz0V=N2*+?f@7typ=h&^-^hYgs4*H`x~*%?kE^^5;G<>X z);-ORKiHW+1avmG-^@I6xa{sruJ_vkv$Y7qn)bZ5YIC`efW-4=S zGNiRoG)*53~xFnp_b1fkX%85e;re^oKB8aBcd@8uqv# z9yeyy2?i`>UOx(&UQs=!4U9Xj27>CKZ>j@{3bg`EOwZ5!=IoB@&L4@<3o5Fj4L^x` z#k?I|F3(bc^_`R{v&3!a=s`_1$FM_ZGJ9phEI_n}-WhTcFo3yi(OX%#lq+~nRpWMg1MC-5Sz7j+UG<5zkrhWvBp^{a>$wkPlUMM{^=bE-?=(k| zVQ13Hr{JE3g1ILPI|!ehL2nDo^39WZS{<`1SOx_vo+mLR*4t43csl*ZK)%J9RN+G< z`-j!&+0MZUEo|newl|vtlLCrzOLja?W48~d0)Ktg(^*q~W>`Jjo>Js1l`*xP+oY%M z7Wnda4|(v;c>q>^(r_&$;9;tmiol`T*JtB;BtkC$5M@ z7}bg!Y?Pa#c421y6bq>S^ep&hrgjGGMJ*$$mpi}PgC7%vs|% zn!JtZeegmzwd(423z^PL^E6LQTU$OzH4~G}yLYkKi~47y4VKIKpSOiL?I;}712$G) zEYs>hFZRer*6vdLi3S;U?^~y`@xKUkyL9+&%Ub=IuCv`5Ay3LV3)^wRiPq$qAdNGc zm>a^Z@r8WmcLM8Qp(_ybZ3bF0$9K}tbC8AY2Fha(v9ZiE>Na8@29J&Fd<@P;ha^c+ zUQ{0vPbNIyTX~&l`{C`z(A)lKK(=72eM;A(QXn`LScnm1;Ky^~;OA5NdHDP`sYAfK zv*Ko|@2#}pDO%n_hoq@qDT6Wu%q_-B0ctIQ&Ip$GgHagK@I%T$!yLoP zu|@1Hh@mEt)Kp1u;NJVw*1XqB>X2-CT<#4)L!m%^oo?F+_|L5zxt3qB+`~(*T3>Ka zVU%MeFdyP76?!Al*W}pfU#o4$H8+!w#)$FvLMo4!3iq1T&i=X)o{)8M*M7`SF-r8@ z%8t_ZMxbQN3`WQ<7`x?Ut*@hvE>pGHCC+ccBzAv%+C*fz3py6rA4?-dmi<8qcLFm< zY0a%Ylufz7J8oj}_4i=q!mppdD@Et}aFPvn2KMfzmuthhlDG93%sUrXT-$ zaTHWNh^q~2Q8R^J0`91$+Z}vP0D#KJ=liZghtcIBeraEvf-^q zUFax$pQnP+0{0qOsWjiE)m9?U>5N38kmC_8!N#PSD*>d`cQ2j;zkiW{sml*9-NxC| zWb+6*p1EM5x=vt^JfeeGb1KI@I!5+J7it91+X~e>mHk`o3fPgC-~K!5X=GjU z8n5NM3dxom4T$x{OVz@+m2|P4bp|#NifT3&XM)d@Uhm$DqTU!(q8d3( z9c=x$x!FANRBF{^69g?xrL%}UJr#obr>C;$Db$(Qw_!uQl{bW*32 zIpUuOs1wXw9npUYAnn=cS2x}dGZbMnpIute=ts47fo&lh7uBF$Sf)dskp_IGTZLHncOBbDSsaE7~ng71Ri_X~V|Ffthui5@?Ou+NyuCG&W zn3A#i#jEpGb`~D)$1Q5f@%w9;Vxv0i5uz6S&QG6a2Iw|Uvaf}J>!u@*8%g!jfl7BI z7WzplCabqD(^dwxk}VXLj@s6H6_vO5?cI}~lfyiYmzuKjc2pakRIgVL%4=_yg)Qf4 z#|8J)&#f_Lk=5IV-FnsBYRdo5>bVI?wvspWCVxaxp9^B zZ+Wt2=6(DGzY4aF8%leV^FhHkP9K2qq! zbJsRHFQH|(XQICN3DQFDp4-IJp2KBppKmA^-asYggN}DlL4k_n206Q@HOqb<4{tqY zW|T!6ok371ybN^RLhC0(Z26~te){adA$TrjxHm!nPDfYt?JEviV-}7qNm5n*3A(FM z#S1nTGENa0eDUu}+i%@nd%kmVleRaNE*OmOvT1E;G{ot*d!)r1My=z;o*zXKXVV=SUo*y-Fe5R)x%p zZVq~cjBIR0?S#14E7v9_j;pNOT%G?fW~zn$!{!@@ZQ9GA4 zp2W%4$(En#12K;9tRSy0`^_wWuJp|pmM)TZji1Y?G#w2S>WUx;EvNHN>P~gL#O`5$ zjVjLGhZ^d_%Q(7E-cmDDbvL=cVoonmzw}R1Sox^eh)*Z48&B0anGY35x0Yb3b+&t- zSf&n&$rA1>*WCoWtG9OtPX`-5Y?^=Nk6^!LTNgA3rYBO`L8ZC$!5HGaoa&LiB&3-z zG4u%*K0_ixyBj0lK(al%!{&4#-lQugyy~YY|IX<483vXr&&?ndZ^uCObu6#5!UbP0p4Czr@!qfVGAnb{$nsuK z(L6mn#0fTL>PY%Tji4N;9v@U&nV3B3$&l-{skGO6Y!z(v3Nwp%<}{2WtS z#%6#xs*y6{xew3KD0o2rXCfkex{&^MCYB1cA_?nSw`!Noh`5YyovHT~2ZE`Sdme#1 zEB41eh%C?DmVG7f+XK!oV6gog4fq6$)=V5lRXrl4~M>=9T?5#xnLVsjsb*dgYzWT1=>zhhN|kl zU!9L#4rg9p@>#ao@j`ciWCGDo8B^qVV`Gw{cRRmD0(dvJ6vd{ubB?9kE4EpVW-uwjLm zW?orNWg9>753I|*oww3~1dYF31EH-f#2l1dww*H4Z367bAqTaeSDoPUdv@T*#TQ4(2&!Ue*a>pFEhy`;jHJ9D2yXsGFFG%A4^kPE7aWcLU zAlI^|W*ce3Qad_;YkjZv?D#uN_Zq0oW&Q2d>=#E30Xt;>V@Y)8g#T3VJcU@gf~FV| zhg~;2WO=(+9k}a%ub59}g#-#Ktf@3QA@lDT{?;WJReILcUQ~*l3PTsnl`fZ9uLLzN zr=rECc1P-ijT!>zq7F&`>PLs8KqEiUR8A>H@s{olc6C@zbsWBZQ<@Y~jE9j4bEf{e>TK-=kb6SbmD_||JBw>*+LE%rTA@3eeSj|v=_d2SZH9s zU<#UCj^-BQ$JgNlFV{86)3%@w3995_%{OGRTensBS1o+>iQ7g^_n&oLws1jreUKlV zbfu5j6L)mXZ^`zSwDt)}Y!n&D7kh4O%g(#B{hLC63uO4=2z?oY77Un0V>76?G1%vY zyN9gI*@K&Z1n!(+G^FDl^Y6^nBy)!J^tequYvZ?be$d@!**O-Pv!GNxv&kxE8$6}i z>fDnbC-7e#2qV}!r81BDGV`-Hv;e!&PQQs6KrlSGskq~s@2|F3pG@3wJIMC9mDS>E zJ%HQX4WD07l?ytXU~Dgh3Fj&O3t;D(b+-*-si@bRZAz|sOrUSOyh4Qj3l`^oS)C`* zJ_ZbDkNJhzfA&`;^4VYKu#-9rpzh(B-(6;mX%z{^9&GZ|+Au@vz;WXATK8CUrJDNN zdcRf{ua(=-&#Bgu4SAkjLJM05k%t>sAO2Top&CvKJM1iUh>?GHmphi=QY;OXkP)s= z-E%3O5;szqnpA!RYgO6xVazHH6Pj>O?@q4t>XtZ|vJz+p?1mY0ZN9tH=x#VRQsp_; zp0YPczuX$R_AL7v>N=x}o7foyl6~3>;^ar(=~_K0+IyJaGwVCCvApiFqqs9)y?n^4 zIgUBpkI%ew%uRo5;-C`+y>mRcCT9~AIDIP5u`Wu&^yATg2i;RqY>>gmlhGt>2?mt6 zq;lL7a$tBjXh)WG)^ao!ZrER@SbhUN@k6vU(>J@K?_hahu}k{mqg!9Gt!+jx?)C<| zq?Fe9CE4Dm0oofes{f2sj!mJQbR|GTTMA2c7=KD=>Mdc1k(}P+0}ovoUO{E*)aK9i zooCwE0&HtM2g&|>m0fp!sldUIb8=wRq3e_X3=98J@FZ4)Z@V*XKkwuWAl6Zre7ZiY zSE4(B`DF}u41r@{-J<2LR}1gM`EqzN(a^g?0%cp{77j6smsC`@iJdvE`o0L}F!C03 zdT=U_2tWL1*(&rYK@+NBA&8&cQ-|h`q_3`yb7Qpmy}Eg+J7Dq_H~lOvZv`GGW(z-t zT%XL~$DdeLA4!}62koyIJsV#&VpIIlB^fzd&hwvX?0=Y-{CpPwlPX-S@s-wh*1y5rN@Q7c*c$V%>+p?wJ> zvvTa&W4{O{EY}R%N1k+DtIj{5QgF5oGOzhXFkcHx(DPx*Dn6XUhG5nY+uh&83b7SN zSKR(Nm`!gYUEPn%C<)wpu{n6Mx1k_9_%))^W4uSFrln||nr%^5 znXt$ja-IYPIo9qBYC-)x#_@578#%B33%zySjE;6Bi@HBeGWI&$ur8k8-AHeJ{U#$D z1OcV(SK*PJi{X z{PCto6Z$iFSIvgy+&(CCUt*HJ)uS`+bb{yK8}~n|Z2ZzY(Pja0G;-R^tX0&JPfpb_ zz)FkIu#I{0G&RU~kTZ`P=7$^xdACcTFqXK9>PaM zR+OGT8@O{@fwS9oS+p#(Nrvh(*eRsW=U2nH{CPKj{QX0J7k4qdC*=WsNKN9OE#xVi zQu)GYZ~TX?SjfVdDB}RjWz`2k3LnPMxGS7|kM-%t%BoALNN7_zBb$0Q9+OpHn~ocP zsq*>4vXhsqPtZ>NYkLAu&ZNH`IpxKl)}-V>Qv0eW75NZ4Hy3^LnUz*lO;$EYx%nE_ zjy}B#KeD|(*;1pSr`1-8Zj4K_!}~dqdE4FC85pxCws+5`Np*Q5habjh|bY{c2tTW4Cl_1idc62F>ngSXqDv17n3UJhO2l_3{NC0({b;~#Omd5KBPNX17;Trx@8RB-v5-u z=yV%Ctn@GcEWxnu5W!0a(H8OGMTKUXfn#?1@3EPLa0tt8!@gf%GQtdi8RkG0*70ad ziSGMtvx{I(SMdr?fE+M-M$eHQ=R}uMeeZ^iX~FSR9JVvFsP655zG}Qu`&Y zQ`Ld>b@s2K{);@x0n_Mw42+Stv@0sjG{z~Z-B@FUmqUL|K2^KddR7#Tq)(-BXI!}w zww_UM+tNUAQyziX0MHvnk7|v?7@xcS+dueQSWWYJ8um`+6(LChrrQ1D^h*CX`58y{ zg1PZEQxZ$*%vmJ|GmQvkkj#2%{n3*>0-AfuWWBb(YW&rDBi7hG&USjZRO8B6h z=wI(^T7n-6o%#px*o1NpvtBfRT=>CgE+w1!H~%J`7u(%Z)`27s`}TP&`sDf#z*L## z|Hsys$3wlh?>|pYIVDsoA)FG5ELpQxib|*)>sXR~8|#o|#!)9KTL>W}NtPMQSjI9l z*=1j6Y-40+23ckXWB9$D=RD6jo$v2&uh*E*`*XkV`?~M@x~>tdIc#wjoSd?$aZ2SJ zFH+H9C8P|V^q%XVr+4XWTv?;OCEhIQaZI{^G)nwUE({&OnZ4f1cMH`wa+f~;s#8F@ z#ozhbH(hV5-6;uEm!;|Hojl%=+>CpS2b~PA^i0^D#49Vdmv%0qLap$_weIuopab~Gdk@~EnRD#G-v9>D zo@`W;qp@>$_*H&>HBqW4bUG2HqeDocpIht*n`6|%hamFGqY*DJAx;y0HMfG?657|r zhH?-87pD9#oxD4j9nakV-!#U<&eB(}PZQUTk_^lSF87aP4`FTI`85t^OBRfMq$S#& zPRr&+coO~WB88i1Bl?hzj49sgyKXtR>ey{Yb5H$nZmDN|5Jh{qZ9-J^;2=yGJJndQ zX2K7)GNs%PoOTgkksP>9l(p|Q9Zs!Cij=YOY)SGAa`3(cJ@2WGqwz%gQdu zS{3t2)!P;jKASj`EBSI+FR{U#+ehIm_e@T-5f=Gs%l?Ju0^HQq{B<0OFj*1`4 zA1Y~i5Qb9zSRGvNJ}#_20p2`{N1^~{fji+XcyslsaEDQN$h-uqe?8Y-b76SlD?RV| zFaL=d#dDe*lhtA#)f<^>3-J#AiLRp|Yn`#P$9d@)PAk>{eQKhWOZ4fxOxY_fE0fzX z^}T6P9R_HY_A^~0m?-o12D-|QRs|8e~dO|;EdZz{#~<@_tTA3Q^eXq{aK ze^47|4(zzlRBMt1AmDO|hnA12uRl*gO;+#Ei1`loOQQ{?e)_Y6|0AO)s+6zu6c7uG zg0<&ePT9N-t=g4{`ez;BBQ47!%kN2p1~*|9!O#e*gO6=b~TT zKx|Dsxa8P-6wEs^=%oP94vWg?Vn9fiaO0JT9%EMq5%^aW6>^cnem_%#>B_W*t$lGx zUozsj{&(ndERQG{GTYfb;IM#KymU5kKnkxAm{5QbN`D-)Jp}vwdX7qJz@VOt>wp2Fp7Z=Qn#SVePuyl_HAej@9>Q5&XML-c-}uBxbXKRv{#pr8-Qme9;Q*`l|tJ{8@JF1lGr}n)P&7Sp-+`ac`)61^1PV{Sc^&L0Sc#L$x zZS1J#%`>K_OgmyPpx8UNs@qWG&2K8lgWA=1H>VmtmM2WbsC7|^MVVEPn~tFK^V0?x2TMyY7eBa zx)ydPoyfcP!lLv6F_cZZYy(wmLl8ZO7U{$l=_}~sv|4tkHA7ma5X(IsofgUHsCVLp zABXjR`T0MkZHZGY4Ku#8jB@P#V$#^MHPOUlMXpKL0957H;MI97$K7~q9{|*DdTVIW zOqj=PEj5F@121^9#<)%pt*ZUJPZ8==_IB1gM?LYRv+7TZw|1E;Y2=Xg=qdy&i23t) ziR0Ai_0lX~Fgdwk-9*D_e0m!(Yj8oc3yPh?-~ytrfJ6m`Lf|3&tyhxA)38G*gTd$) z>rgim)T74ok?@BuYN&s#DQW7C6ZJQAiJ^%1#w70-o!{-$ zC#lxp0@Q*5Sy$G1!-gSsQ9p#FZy|ZS3Fd&_8;zi?K=AjGp;1#SB${IVO`EX+kCLo1^aHg)kg}a`6@#GXS6mR=GW#!7MA${RW zCk^Ws)w{J{y0d|TWTI!?Q&66nAnFgxhaMHufHzp@GUn~~A9?-?%5#yKU*)6UNjS-W z`sU*icRJE3I4%+eCe6;a_A!E z7#!3y*d=>^sSEaH!3|v!sJYP60qM>!hVMw;KTq;U&D~8ClKp(4suetI*jGNM2*a+c zs9N)zDM220ny9xYt0%HO{adG_=F$T)z(hV~+8;;*yGQ|K4=zE~0n2K?yecTE`is~3 z-pPnTfzC*qSoLODL7kCs1xUolS0?#)S{BO%juX%Q?TLT$4aQYI`5H?%d_sB>SRWM~ zT)s3ixPKcrb~Iygif(ZriL8Ioo9cWegR9)zjuR=cLF_**;= z1Y`Y<+PRigRyfYXAcN`h=pNPi+&Nr}i&ZEc_m-UaO{}{WyO+YCD*?a z=((g{P{)ZM_KJVk=Fm$J136su7nBwkFVSH=m9v!lxK3`oim=WJBAb>)sdgjHE>>e! zq9EP5uUSvJs<9T_V#_9&*P)|l9>oZ%5iDz;lvFwDV`obPX8z2g7oTD>0P3#WQ2WnK zJ~#3Usv&!QzclGyx7@26ccQ ze$URdZJZ;bY(DJ^8EmxCfo_Nrl{Hq?EJ3y6{djFo+s-O+aJD59e`N)3TNt>e4+nQ1 z>wsYP7tv31I_;0b*t(Vz9%7)#Kg5VA9;ECe$WDa z{rWY`yO?wn_Hit9k2TwGsO1qOpxk9yRf-_$*IhQNXjb1#Y@JladbtWS2W}jD;r2r5 z1?BsE$bL$Fa14yj(R4*QwAvC(hmlE$%r zZQwO)Wqe-I@Q0~vM>0|DtzM{gm6dj=^W&DiF~zID)bS!%&#H3rZCfPL9=HevA&PeC z3$LQY-0pQ}IG43)lATANL~#8z01r2NiqWx*bc!^*T3CExOG?>Au=Vpv^bro0^A63hfUx}9gt%W(3rvu%KT|+>DE(4~Mx(7}{NN8CK772p zX~zmGeD&2vO1V44HoO1>HNOhii+p-1c_{bvQ{dlLcHJ^Uca9BQ%-Fv9CRijTMpmvg zQ$fxrc*U3A$+0MjlEm+f?@;ibMfld+D}E1aAQ>)CUVnZ zh@JponD2M0`{?kP-ZA0}w>T}Ot=IK^)83%%=z8HIErpuP(HDSZguH;i<=@~}p&>w6 z`0-VGwa43-v^e_v@=8cZbUb}}U>#MnEVsV4)gmw$ic zcdaJFQ|~4*Vt;7`sE-cO@W$%?je0gN`~-oMZW~fZKn~7UbEb6^AvQ&2HzF)-$tL$* z5q2yqn|!bhk-_Z^*Y18ZrHay~CTk8ADOkW<9Ws#~Ja5acqW3qR zfCaM;Okaq;aBD0dB1}iMr6m|OG{V3@`=F=P)zzy^S;cupA8Ie?daIxtPdhWEAXN=O z1VRc~pY5Cl2TGK;FSOVDYSfnX7o!o@FTgF^hhDiNSGpc;GVFS# zq}@~U=+wk|kS2p(_6!*Y;si(!C6) z{X*&3f-6di#jpB5GWXz7L7Abu+=*_#u}n$kJDuFK-lk)tUc>R@mxfzgJ1hH!oySAC zgBJ`q|C+@#o@i8@w3wdZtC>r_a1wLaO}q%3<{BeoSa1&2E@4F2U;aA_i$xja_$Faq zxk)~AL{w|fRpiM?niR_NN?SU|@X0raP)l0&@q^gCw~tn;Jd%n=?X5TSnT=6*3!b{j z4FBIVz%;_fQ93#XS#fdjBJBG^%u31@b;xCA|Iq^->hG-s))=jn+bCefUVMY^ereqT ziq|kIRgT=z8rV_08FRz8zN76L#TCZ%?b(aKE4PHeCoc!zA@OZ57e+_y78r6fFDt&T zs1ZQ=W-7_~3Mt3bx(f$?GvN5=gF8QMs*i7UT91q`Abl)f>)YRW*QQRY{!%2FdaE$o zUn*U(5hO^J?AZZi`v=3V&8gVV+>9UzSp)yiWy@qdzRFgcqECW)#&7`;Dr8DI>qm=w7UU3h_b)FrNW09oW2=x_gCkkS=}&u{E3K+3}J`JXHp} z5x+GVDRXFduU&?g#ywZUjq^J7N5mJzQnlQ3J^lLbgAD9(jQH(Oh@^1DndB zuoXyUg3;DifH5<}yIq5jw*{xJet!K9oL2@bKT+>|IVRTW|2zzv&bud$hzDz~%C<}P z^V0*e-pDsyt|J4Q_c)<^N~|8r-8sWrpMe`h6JmO^3~JZAX>n6PME2F2%bUH%W|9lf zKDlcw$0#?O5k1$DWy*a4yWe&fIe@+F-=a6&#L{VeQ#l((*VYNjRg0=fXH+Ib6O^nn zcfJAA|5D~^_4@2ba{+F3#_ZlmM4nnodW=R5(}*T)7A!tfu`?-5SF5C$(}!P5cUH58 zfqsMB+6r%V9$vi-a?#)B>wn~;5!)}VJh5FecXpff&C~*EOD9deH4unJNxE(QyxESo zb;K2pg0V*0AlO&o%b&QgQZKIDEF8u(QB|N}1!X1{fNq0pLL15dF=Vw8A-UQ+GUVk{ zGc8uWoe6mSV^mV#Osa}dei9L3!bRlgZe)9ml9qB{=jC(v)Hv|Fb-R2;YQDUoR)Z3h zk~vV2BCNPIix|HB61d{nfhSu&3*ECeGB|jATo1yKId)T6P)&sKI2*QnUqp1yE7)ah zpS|@T7TJHWsDIB-(OV7icz;l94#nQR(vlnzN%3AcQhw8+F#@|9Y26^Uw~o(=Bt>xW zp@%}|pLKT(f<;wkYjabfr|H`z>(m(uB-^F8+lck+!onx7#_=x~!CG#L$h*CVSux%k zM-=&Le@y55M?@xLx<&_EseUoWRhQ%qy6%+n5+bLHFmqXzPBJLQPtkxOC^t%0dy*LE zLqpKB77f-5vq$_xeTKvJX~H}~PFb!L6ZELO2muJ!oQ9m5AQl1lDuvwgd*v8@hPMKv z{+!o>Mf86_C%dzEr>zdfKydkz`-1|EiH-rcu(UnUrY)AfnvS9O)?-SX#}Al#Bcsgi zrOhhZc5f;PRX~wSOoQDqE3;9TI4xui{Kzxsnwq$j{@(mbUOr^0p<7Qm!QiKV1g4H< z!HI-8SekKO;6VPsPA0Z&oEq#{3AAY;#di{729oD=LyH5+zR+b4;e6|}0k_6k*;=2S z%VvY>lF6p&W2@gP3yqEku5~ykWUvANNU+lh>grq_KY09qJ2d{shbOD!BHhX-IX7zC z1M30FZg(}yrLyYl;zaG5|0{Eo;~;M)=f=FdD$`{Afi84q>w~0@F?7GFfQCB7v0l2X zhpeqztiQ7mb8uJm8tF^Oc)MfDJQ?0Er&br#y?o^8!Ia+OLwD8KerzB7k9enh^=Ij{ z7uxDLnix*a11?Om(hFACa-yHpx3?>mzZwr~&A^Epe4p9?Z91F}GjUyC22;5T2wLO)#Gb?Wibf za$yj;0ceOgbxYh3y;mY?z_Y3=D>a?fP(y}exITUup6s2uBfjJRJ#~6!W@*G_nwkRb zQ+<6UvNL|mW;nAgJ(ClX-(es+18U-($el}AYCkU@=f6`jNPW)f%&@o=cx3NKl7aHK z?TR14(TTaqpyV%tj40{>3R#lsFsh3d*bOm>6>ldX$wTk?@ScdrjYXidCUj|9z=vqX z96_|e;I4WaJ&T`{1Gnwp4({XBs-UX9ZV+9RFz5WDSE8~Cdja+L7(EY6ki{*$nMXGj zqfIO;G0Q)LH?OGUxa^hfkn3A0su;vL6?JcSNZ)KP;{m_)M{^9OLJs%AyfGtb_?EDZ zkHej&L#EyyIh5ZG^YPZW{Od%4)ti9p<$JT~p{e=O1$fVZA%t`5y9_SFPQ?)Pu`e2s0d6te{6KEP~-FR>9)fU0e+(!@L#vD2`YNbmJW5Kv_2 zjM1qDQD$bZRGlWL+AFIAr^p>t-l&Z+H@3{8tN$Gou}$(ne%VNCB3a9|)Z)Erd|DD5 z!WhF#@)Jab8{XKoURB^+K+Y#yotn>DxMAzkb`7vC-Vn)pV0{u%SuJFmvBnx&o7M(c z<^B5iJGz#pmRE)WR1(yY`Yio+^%iYb3bJH4*Y!0%k<#g=+XV;^cY}7{bV_k(V#v-~ zwHZVoLb*+3OlKiubNtKwxZLU82I~@|XP9v3sTY)|%36L>D~kzb?HM;Ld2W2j#GE27 z3=e}9i(6R9;)jkbz;vI@T7g^cmE5?j@O7d=M&At9vxQ9?jwldD`u3rP;qd3--Ofih zLaLpkdq26kF$Y(k3@p~bx*mz3*V9)o6dnH`_3>QNPvJ+l$UifS!q-RMs^IUON$&p5 zrvGyzEK)jx52=RdbAJ7OwD_0ffs4@}(d?(ip?@auUJSu@60BC;=^x>rWrMgf$9nZG z*ykE#Ld&#_)x=}n?QS%iJnui9%X@FH2HwUGVr)Ujkr0v%BjA@r)ui@sd<+J)xxpTM zr@>{HoD04a(6=l%(!N%;oZ%ZbU2NT6)$! ztXrUbho~_GpC3h=xDS^)K zVi(^M;51l5Hdy1)pSVT&)6V+N){ac{2 zx!}8VcIV5gQMZx&ro+^d>z}@ja40Znmm(}})ETDAE=wO7jn4;d_NtqA{hGAW3MvjY zmus$X@$Kik_MN<2o$S#l#`jloF8H+Ge4~Od(UBcgoKBj+PGEWo5W)PtBYw%@jpX|X zame&6qbi6yCd@h5rw0WidPf!)ftks!!=T0b_ef|OY2xdRc(t=@-E>CBru)}eNF|gM z$Zt&vK~!zzBK3=^Ls5V9`lb{c1Kh4K;Z~1x!HJLz-iE%L96$8Dlyn2jmB;pDPs-vl z*|W#r-Afq0MKS=xCiIHjLlm^xzU z&4%{n>y|4wCoQzK?fn*Q?d=)L7XI7GSP+B$?QzVLNf(N|69(%7y+dB90Hvd>x8Utt z7I`4pgRpW--vx9#gGcqv*mD`+xp~`7M>9(|vt8ZFw+K#JDNEKFGZKaAALk4qqvu1n zVLBNLOI|`ij-wMqn9`xVV@8=&U8474z)wZ=9`Y6xO6LY|L-SQp6AV-~cVmUS(H&z@ zo!MyiAw9e1E2h&V)^2UL(kQ-xHVa5T`D%2yU07UiL0zfuUWLZqfEeSeZRTZjM`6W% zCT{jtQ3hMCkl$=)%aDu=!nw~wreG~NIxdb`-77|f(KiJT|IqN#3_w#e^UlfMejigw zEB1M+4p>)PsWWvZMWCgs3L>9$&QPk)m**GC<>Z3LuRhgzb?wswv}w&@idN}REi1ig zmLW+T&Me!sbu0f!>mGeWxZ8f+D8prKBR6xypgJ#3}> zVy%pl$N1S$9;N*DiFo1AJXLHvkFbFF+-?KHc=b-ZL9W1pxiA=)7#xnup5ytkOPVsb zgwRk4C=DgqK!2Uwxv0}bLEEAir)#**q-;c|6>@d0Pd)5dodE$4;e!mj-x;o-PM}Ub z?{yereihU)y&RBC2>r-_BpPd>EO?b+yU~z}RQaTxYJC?{sn>SWMp(aCj=H9|7V}Lb zmp(2d1s)57Z>7eKFMNC=sQJ^6?|r2aHd;%H-gw6ahL$^Druo(4!LnOzxh*(ciWQi{ zGO`TKuYf9MUJ43rsB>aa9}9XXlexzJ)wNts#zW!$6PpVhgpr6Cfi^A3Ll_M%V>l)$ z1hJ@z^Ecut=wtpKmyy22`;Qs8VD4n~t>gv(?1Xe2TMz)5&jpGKW(xXGVxNofRA3HM zCXT|%*unitAkyJf=iP99tv*;x8XXX93EqvmDnK@AHX~N}%y)hB)#Cp2SJ@-4R13Ci zzg4a8xEtl!A#d{;e!lq&hH%hmTtCopO>3#Y#IChNb-1+y(YURyVGjn>UDo_SW$^dR zx0;C2tX=}Gau=B3j-5lKU_2`;hI6gpE4~F(^5mhCocy-h;QI^l&qhgo1Wosb+Y9A3 z2?cA1##HP#QaRK3)t}zE$EWDA9L|HPS|P#v(0fq)tMq4|l!YFZbp`co7jh{+3_j~F zL$dub6SQPupz!`-oglid3F=|?iQqi(jnG}pfK%iNoL9nN7N6oMc94d7H6S%Lmpkq* zEEiRH{TY4UdgHp2vbmKAAYu?>n2l6M-Fc?boR*2lkh?#hl}iQRP8L`u85BItYwtgV z3;h7+_rJW5?823EFB{f%74(-{AP@ZO$9V8;gtf=$^7EN zHs7H6D+X+?jXFT2=Z$17d89`oJY*x@k>}c$4UbygUu~*{R6t3tT2JwtK?~gwCMTRS zYPXlhcxzimA|V#lgu}dx)Mf>w&^%O8wLkeje-3~tSC11tkk#3XCVb`$a~RTzjps`9 zZ-6Jr2y2KB$GlwZsa-R9r2@s()S9%lC5#%T+TSc>3*b|+n>dw|C}5cbyB%a`>D*;j zI%ZkZE6iz%u&(@i*1BXsomDjgF_&C;Zd6er@z#3ygO_VKtB=)iCw4fUQZu)>2FWy&&wciNfyN?xFP!A$?D&ix%ZB>!+FGRlB!k4b%2! zKG}_uSr#Y7QpaZA`vxg`j?%s+FT-6rn)j)(!VWFy@%;OEb!cL_Thz~jN*skTM;GgVwKt9}W&jr~hEuz&2UW?aDqlbC(6&Y#JFnsm?PNM#vGV=I-JX|*xP7&X=#xbXaxO^7Kg zIh1U2MzpS~9pN>_kv^Kr7IS_>aqBPC=?@=!0(8Ltl~Up>a+FU_3mFu0Yb3U) z>*~feW-*l77rZ&`uKd6Xvi-(*D6?^BbvGIR);#Bwg+98MP&3Y=fT2jiy#} zCS}-^k8fBW)PN+q961bN{%07j*e-TZt%MySUQ&Po4(Gkn59W0c|FMz;zk#rQBD6y? zq5+qmKeC&pa`#h*O{l3^JubYB{y*Ks6i9q<$i&WEIo=INUnK? zZVz5gSM}6}?hz%qt}>FY>lCEzT=6Hxyq_^<=SQlN1m1qnF{bYg>)HK{#{p(h<-$!c z5Hw0vmvkHrGI~|#dd-MgV;GN~bL^aFGZY5(O(JG zC4`;ORlXyb1p48Eh|YY?r7FJJhLun#;`^Y?EVrA|NM^@;G0d&J%BR5*J=roin>M4@ zS)kh?Z-}(xa1(`3yh#LuIs9u``}!=pUX-wfpSq^3x<2Jy4RTL>+v8`we}u+OOXY6W z*47UANGtV?z;j#q$2Z4O?3ts?P_S}cJ;V&Csw;%xOSU^JH7#hBk;_kpRJ{fyv_Tua z8XBsK?@n}LgamDK!fhbR{uY6QjP#!4^ z=oe7eqrsRUszX|QR8Ql-i}?Q_>k+3()vAVbIzcT=(8qS40Y!PW_jOo}x;(Y9U|mQ4!SnJy z*Dr5i$RnR%(Cx8-t5wauS%CzcP7o9#A|L!ZF0Q}HaGmyJMS59+86Uj5)%?k1W*i+rFjo@YzA$!O3cR{V^h0OVa@ZvM@b0l>NgVvhW$GML)1m1L;Ajn z%?4cv@9@ADpu_#QJWk0booV&nn64~INYg4De}t&R$U2?5jJ6}f&)@sEMc zTxn66T%+?~RU-Dn^3@5dHF7OH%BmF6(7cpHG=@~B+G&0^OHLu}Aw*^tf%VV}>4oGa zbZ{C9322|DMXYYB=6jDyaUED|u0cQmVNMSw?1ONDCHFU7J>!^~vV*(C*F_L}%| z{g-Wg<^$nt-0GEc={4zut&T4rRf;|2pz5kUgR=6KPVbY$BL0#0u2~j*(*~%$(Cz82 zPCNCd;5?ZsExb$rAJBkjFst_oQ51dNkZ|TUkp5;%KJ4bx9Q$nin?Iilx&e4>bYnw0 zo+9i1qY$j&)!f9Emkam(ffDOoY|74F1$taV!?o3Sw??lQ#B@e?#IT|^3e}<$R0Z8+ zNay|$jW01Kk&_+NTwu?|7G9I7PXwdVY9@3Svd%rs$ zev?9V&(^0?bk-#`(sIuJF!>B(e?=J(Vi!oMf+K4mm$kOtPamN4ZZeGbZOuBiK*lkj>`~D*o(8;c|a`CO)Bzgq|q9jQc^~pJp|i7 za;H`+!h7EE8c4j$aGy@W@pGsyI!mXWR++OPmWhTnn>{$YT%!5oajaTe>NQt%T`HEy zV=!GpikHr>H?zfH=3^@Ho6EUNnR&gl{i5ypBeWp@5%Qj|?kn2QH9PccLg!Lahs6;s z>5;k?v%8YAezzTynz1q4%pY$SmaVaTF`X}6F1myIZGU?M#`irH$P%W!rx;*D11jJC zqi!L=esIjAthPeV`}(4YsIL)aAhKjMP2RfJzww>$sHSp`H4+Ko-u>dv9IHW5D#WEY za#$ythnUANgYZ&&U*O8P_@dG?6&70e&e*}a8tLuXdrQuWzyt{lTMd^#u zwPGUsOa9X=Oo+q4G!4ih%VxU5M9Dh~Pc;QK1XOR9b!{`oo%{qsHt{ukP1XlW-Wx+- z#l<1NMnI$dB}IO0|Ib8Hq70;>2!r1M;NU8*Sg^NW0G3m)H(H zYr)xSoM!JC0$?ki{>W<}ICMUAtx7*bNSLJ(G#L&SvV7nb2iAifkZ4lF#q&S*1Gm9o zqO5D-k^Sr&K=z8Q$PZR?AeP{5LgoUuL=%YaB>u!Iezrm@eAaeTi9B&<>4TazM~Cy$ zL8(%?5kL6jtxHzh(G|(p3Z47E9RpLosW9uG^*y633IhId1TQJsMWdtnl$~xcdvGi3 zFo;gJz3w{o&B^d8HN{q(;8N>0(w!0+n3O;yAY_ZdMjCi0=dyFF7&HVgE@ z4=lQF+w77knRNaar&3g^badzmI_)tJR2V-}WrQLrzjrYq#DC41!QK(0mC`*Acle@t zR_8gyGvvH(_RT>*j7Yf#YWR;=%Sf2)&?d zUa_4BmgYi%t5yNAPlD;&NJzG15z%AF9w)ooU}LzvdHd_W1Cwkj(s+byg$W`x>(4sr zA;v-)p2=XDbN<+X`J=!YnTNvlAP?Xgdx&|FkD1cYH!DpS1SS{FS+!+o+wjq{B>}mf=N1c)p*(4OW+p z^*Bl@Gi9fHw%b5uX?o|9a)rb@f185(yzWoD_kwA04Cv07$}UAX-3>I5_*#c=Z&IW< zKH*6DUTr_QrNt5UnCX_XNZt0Gg(b+Wp+=5zT|^6CV1j>4)yv1vgW4(<{j%axSbh^0 zo2~5?!%uPltShM)sQ)0B|c<{jS(sv0MMecnkx_}8y8uiQPnN- z4JN`~T~aIj9zL-p!oD?|-Bt%PFEe4ViA^$V!;O}rtVK(V^PeJ92aiem$)6W-dJ8KF zKw>{$|FN(JUjUVVxdO#De#KxRKf_*a=2%$Wm@;OeD(h)=#ZkWW$EUkLr_~B6gSMi6 zr%WH%C9d5S6C`~pN$9k?fR0x8C9ckhlXyaQO4d_7&OpW`+Rs3j9ghm*(t5{Vxp;8* zUdJAlLwhP(%-vHmcu1klKmD<(sA+<2J21@>2kC%z5@&oZcT`V6keN=Rd^b{M1l#J& z5CxXVOP?PCv6e{)-NSg9#}nm&=oeuF?tLwRI@?kaBiuHgUDaE8tC=C|4J*%l^&XSI z_Y@>XWWXZFwIzy5J~k;v@GT6pqV{{Z1m8Vd86@wISM0$_BHoJ45`?yf=b&v+v(Hmi zt)7)cp6Zh^_cjOhf7NX(zLYnMQRNc+092Z5=H|B+fz-HPuDRRU=RK>3_MuR2tF31$ zDKU3P9jCtJ8qD+kX_P^ViM5hkX|O^WVg*>w{e5x2befp@L{wx>bLtInj7e6oplje6 z#}`y$IWMQk1!$K=aC#4w1@1HKiYkwurPZ}fsZC?c$tsm&p7sQMj^84UTSEh|HGzS(kQN)r2?# zd)xusO2=Z%ft&*jrxLcO_2tf-Xp~eS8wIuO@uyTZAXnNH!{aJRbNoM4(Yw!@%A1S3 zIt1;?x^P6UkkO#Dwte^aUSvN9G zOjH)o#Hj<>+xkPgz=rp_#yxo-Z0L=ql07et7&$EuI{@O<*g5l=zrXG|c7hH_l^Kc_ z4jRI5zxb&IRsL8>U0!3L!&gZ8WwQcE^q!kc*rQY@LB9?M#x!=95J6Fb9`S8>Al`E% zcvX2ey9kFa>CY|-O^X{{$zgRZdasAgZPbqCU&yI~k;bOpKur@3B*{Rob||g#*A#|^ z@@zpPMF`V8^2S#CF=z#+3OVY-2*JcAXG9&2-e>V6)d>0?ljQD}0(ZEEb8v)llwCL& zVYQ9x*%Jm*MQ`ld9H>lOoaKY3sW5IR=8mIyGuhxnP zTc7QHIZw#Ws_=P>J(;x3ir%F&uganQn`@4-N`4nld=^Q4t06LXK(d=}!CWP5D+|bq z|9%$$i3Isn;i2t_>YS>GNC3t-P`^C+Hvz!If{o1t66dg2{b{K%3f42o106&<1l)3x zjrFDW$`+rO^b`F&btr#`UOHZ28vT1(eT$sdb~P4I{&I&y&jH7k>&J+HvL^h& zuOT^=RbN{B&Ld798fc|%gvX`$<^uE6i*AQC)^4=6%ll(#FYS0TgG5$6lM+#Yy70PNYj4c5)c)nxRIFC2fO3!=yI=Ody#>J!#^ttl@Y&is zYPpng@@*FZ{?*|!ltK6Qm;A`GisTzo8;i7LR>l*lZ(o6zh9We+x}sKAv*~impnJ_h zI^8}b5dH6*$W)<6__N>Rfe{TK61ifnL&u`lPdWH$_HSDw1V(%-N?uVG7ZmlIe<*@k3tzg(_o{>)USu>%ltg3bhY?$f7-% zAM7_`v7!TU&$^aL)Hl*Bn@jM}JCe#ebjH62-4SzBmTk*Q9uYFFg%Nm z!?1E*{TH*10>9{3>eON_80M!PEM37dQ+0*mWhqHXjqqXe-!c)Vkn4H0I29D?2TqYbR7|SMj&M+AbMl0qVBoaKthKA_ifDVF1wGA zaP?zS_@=8=xp)8UVu0gii-67N*hts1`Uta<$T)BCdtm`3J^4d84`ch#qaj*}gkf~q zU%WHe)rN3R4$C*0UiF6^8OtQLg`twE6*&m+V*e+7bY=MVZx|p6LYD4z=TC*6{LGMC z^vE-L&!^IG0C`Q`hs){1@*#9PYfC?k9xReIpl{$Q$-lR~b&>PjL$WiKx;m5RU?<5F zQ*6WWq+MDkZA?3Aqib>1(!GrO1T^gZz0Qd>-zvi;%=MxYJnxlOdX!CW*R0^=d3bm_ zH5g<4wHtkUY%`COrL8(lkQN8qny`%V(S5=#6`2J(rB5Fr z&m9Zi?fpb(@JFvKkh;5D7qsklA~=XBD`A@h!Sts^`398jX%1%P(v~=L=Gx`nt6;is zL)b*@(gi*K>Wl?rL{LSzZP(zho*}DEypEBlr4CT4VU*Kn9{#k*KDiAvaglK;%-d$^ zAB^d9I*#JeHIc7tRGgda(9k-(84wfmX3L_V(m@=hxK6D^j13#qDkV&9SM; zYlckNwad=^d5Liu$h14{t|2mtbI}@a4DEP{5odi~sJQf92ww11-=5F@cNYA69ebKy zvK;;<{4eIfLnF(8hi;Tk#Upn`MHo|GNH#ByFfE7XJVWu{yOvdAajWZ5w`@GeB?kl?yw}lCZFq61_U$^J?%%Zsrn? z$DDrt{COBm3R0nvEMp^NRsrN+>p&}{sKunBzmPe2r4=H$g`v2;U1k_wduy#-hK+YO zTQ^oI*DzBE(?hnwiBSX1A{}*`X0_mJ|VXZQaqAP8|;OI4Kw$eBE+%QZ;+33WU(0E$kIRB~w70>~-&v zzzhBW4bt>bi;V%s>6&-_U1b%k-Z7?62v}G3c!~i!q4OFV8uyiOAmr#L#zFxr=d)qbw7#eW^IQ=Xr3fkVXfbJ}h1gjn$z4yi?$P1E~M>g9}pUA2Ve_xAdZy zVpV3(`1XFdML&)IR(6Q&R)jq;dI^+*%&m!M+#`^k>v!(F3>>nJVBykzc2--`z(?m{ zn>@#!OhtzgXWX;xY+!@N^pWr|4C2Gs?dk;?ooYR96nXI^1dvh~kjyI#A42v#rM1?5bJuq&KK?T^mmF=RQyrOQYCB+;lE~VTxkeze9`f4?+g-6tU)M4 z<`7Qr-UT0>9I>)=yDCLFn#!%Q@fzExAcNoWS;tJpaNM3jcd1I=kNNCQ9VssW-)-OT zN`2>hgWDUMZG3Z=e@)(YyA1yA-Yx^r=8%WRwvp79F(SWwc@{X6XnH`ZE?w@|7LSoK z7qh_1Ae!rXyq@&oU@pdZa1r<{;i1m3T)P8Ng>lX7BlyM(@~NL>C%Z4(w2Z*!kx^=Th> z(u%JRkxno8my8RHrD zS4Jy~0=E}(iOvs@Q}a)2ft}v0fM=~O?t4AQET{6=ql}=%JfMWjE&)TENTyW9A}9Cr zLD8rEstjKdte(#V#}VsdxAFd$DQw}QoPx6FR}1Rnr;*Ud)i^#mv8Iq2FvgspcARZp z=sbWd)pJyo*M+}3ea6uqc$)Oe-Jx->XoF}5EBV;N4SKsgRjpg0RqT{Ob zcFzK1YIQiD%K3;@A;c4-#v~{~6E8tA35~{}E};g|x(+X3r`fRZvkIpxptbp9J&1jw zWnk|u-V_#-!CjdAv$V7{SD}%r-~1!Z^$vN*?hFk!ht!zdsl^gOKl!VoqN2Yf8gms` z*3t+Nw%DvSMgzCjQTIykspc=yj}yak)BRJoHu??I_QUx7Q4$d6v6T*AS|2#SGvZdn z`6e)aX}@T_?=TXasHUJe+(ib|?(!%K!v-FNty#>>flqVarP%Df8fwUw{##6HTRKJW zU>|i*%R2JQV&vu2=FIo3T~Ea?fO*-T0vNr!g=(A|DO;-DLpaf|N{Q5v^{Qg=IB46B zVS$1|gz%+{Db;k~)Hv9G6~O!@CvNNPajw*xdB(XWI*#;PV2fz|KH{d%oalDfvj1IE z^uqJl>eID=@drjqoG&O|=U-A*@OzqG$E8w2Ko()IKEr*aLb0V3=B!^` zZM$^MPXzXW1j0f5O|2aJjnj8weZ1t#Mu=1zsXVPo5cSnvK zK?nyxZoIFpRrk90(lb}l%*DlJ;w^l8M4c17>Qn}H}U zUifN=&G`OBUYlp`bj-c6NwJTW;;xCvE2aBJybrH>n38L&`TH(`(}Y4z6VZ)1IyM2jZ=Ri2dt#varDR#rh4KpgY^oaq zA9z_|Co!Di)jX7;9_Vu|Rs6z*pJH-+4Cb#4NLV^JT3cH`O0oD|&z>UY~)W%5lzS>VY3lszY3QhxjHny%KC-|8=)8lX|Pd!#<*Jk~dX z)s1l&ve_d!Ev)AlDN8dQ9LgX}1u(6XN3$$%Hyf|6zx)<$*w_+U>Te)S+*=b-)dvPYj^lf|8W3N0Dk%TQhIK*(G;DtY;irH$E1_)DwI&!;vy z>=JZ_x;b}#o2~iUp^~$35T2~y=#3<_E#_qVJn&W7Vc_>T-&~S#vJPdzf+^(Jn2IjT z_rzF%t{#Z%@ul!to1UO@=hOV>Zz7S38@gWY%lChEba}zOL@8V565YgT?R?jsD9T zVvCK*@GWh3bHI&AlffV#&HvlUU!?;PKEYG?wA^zdnELShi5nky{%}2Q06c6j1+lW` zChAy~@6gcO7z}i@!sGp*=|z4H2r^@kU*9gUI%~PLdNcW0PgC(tw2(5!p-dqD@Q48~ z$u%)4Gt)-IwNvchC}`&mBz7>zg6Vvb=jB=tQREQU*)zvZ291OI0lD_X(=bww9Z2m) zR{ZdLZ>KVzC}xfR_U(=g=h-9$kpURhkh|@E~kq`!=v0NCwGJr zgF(=ju9Oq4nOM>CXCkPE`UOiDzyCd!iZ?y^P4m{gT#AA;^vg8TcLZo1UFn`-+ltfo!K19t=C_l(>{RB zuHgMk&GdqD6}Up;z)7$F4iwkkZNq-iR1?|5GKwSkjnd#a3)L^o74(rN?O4@^RM#{iBl zOD0S&*Q{`<&sqhLPMw*vnDSrr%#HNB@abO4iJ|2lZEnu8F2eWoSq}o-a&szUkaO?7 z)d%Y#JQjD3sM7|F6s^-NJl$TL(7%y4wYOjxdgQ3@+SXj=C`92XIC)iT=kc+j?3D>I zT}^u5>Lu<|7cA+GlsnxTw4ljpC!GsY-aK8sZ4>d+-R!Yy-<~jCe(T=PfxoeF{k(DQ zVU;pSnO}PNT}!CV6^-R>YDnVh`K(eSZN$&zJ-bZup3n>V3&{emoJf;i)r##5Ro?;nK>!wMUVW6oXh)CiH6w@V1VhaQ3+2y}e^-us-wmRZ zqdN-Uv2|5#rDF}2s;|y$GkIq;HK{FgEe7Vw$VqhmzWR5EI_fY;mS&bqJj5{2nte7^c;ETZ37p&>^Xd@nmQ<61!T)RT+XI>2|NnJLP8XL_DUsx^t4q1eB@#*Q z$=zJiLd?=!8dgVT2q%h^QMydIgSKt9O4s`cdbcl$-a z(lEc^?RH*sx?8Q`bHZ1c9bV=il{v5 zlvT&FdM$29&&XikIWPYA`KFjkH*m&;Go>+aOhkkmFN?`aIr@3va5#}mgTE_o@M}sD zH4qVH*i$xk1P~36(e5x)X^-QpP96+yMLIE zkB|3FzMC1 z_z}VpR$kJsl^A+=jXPuqwBBHZ=CeDh;bgyHd1r;h7qtaR^ge!X=cMjzN=LsjyL>~!Rp*S8`N{-e znC78m&!U^ppXHxww{uZc#F<8SUe%O^LkZBI3rIJAG+$<;$rUXjnJvsLo?+8TE*iE{{iE@8iOpdkqx zK@HdvJM+i+aXne>IgIkv_OP+8a@fb}n(N25YslU?n6%-%{6RCE4Ymb6&wvhoetV}i z)o4~V)Fie$04J>c(7_otPJ%G6TgW1>MuC#_xH!d6l~kmnSW_zS59+2phI9Z zVu(ne0NPm{A1w4L9uUQT;*MB9ql1nED#c29pcnL|rS{tct!)Z}p)pfV(&i{SodrA28%+Wd3@p&j{7dj^A~?gupwC zvK&46n|eZ!=dT3^!xYb$6n6S@$7T|Yt4#?V_^IHl$b6=H}+f z6E-?hIEsA#32R$9chS@65+VJxUS+d%N86o=_ z8`Y(zW~AZnsf?GSm%#bupLZ*T5xtS1=`%gHk~l};_i$B6=MQ3{hf!(3|{tCMz>@B;{weKKs@L`G8F7>(MiNYTIrHyR>))zF@D~yp@XUD!WHUC-3RE<`7`5JN^LGsX zS|zJvzFgFJ@Rm2iFkd@hkma}5arC`}#o~J)CLTIo;Q{IHc%P2J{qp4j;B>o%G*4$n zolU*Z4#a$yU43Q#Nxm|d=O@Omt3X;#?2a>6si<%^$zFWB79ao_$q^ruWSu5? z*`ny0Th0-v6-2ck$H87~f^uHRve8wRu>q$$p66Y#;EF>|%c0f?-n*E8C;56ywvLz~ zfoy0FiY`W#B)~PBZ~cb^6+sHc5zBM7fW98j+b{Uo61qR_N7)w{xJN(ti95VjYn7El zO;^%Zo1aYbbM%F`l{?$dsw^%l16h#P@6falrH>S&f=nzYrr3GG4t8nn5Q1tH(g#5+ zWpBeASX>4LTAtD5{_sHc0a{K*FaZJ#;nZ;Lfr4h2s)jMqPM|a|sZi}QG@xns0BhS~V zZ{sL6M+9=88Yv}g2UU$fMT@8e|3{(qV}GOFot9Zq^eI!h-mm2Jz)+sD#bDJT5wHtv2 z3;*k}2)aX!CI_20_bQ$NA#-*v?P}17H5&FN9}vS*AW_BIPaf2%5m)?(IziXgh0ZMk zI=}@=1N|*SfMw>usw6FyDV#b48QBwWQY474zC8ZgMQ93PsEZg7UnsmBe zQ-x`u@83V_Gtr=Uy|ct9GOCy=K6ZFO@x)_eqXrm1bKSab9jk-dq5&S>uZR{aI>{@L0|EU1!tvNqh@p26M zM|USQzIySU0pi~MbBnLFBv&uT01}RWoHgFjCHtyYz9Pp7XnTb#`yuA!M8n6`n=(T4 z|E<9SK@pDmoo-0Gn>pgNMs0^p4piZuW$&ny1nkEk@iR-n$^(2P}D3Cw)tP(_Q*6i~$17szg-XS_5rs37)Jy#DH_25-}SSOIqE( z69f|9A%XDpLv0sUYEJ!7u$8o!HQ_ga%Kt#~xEQSl@h`;Jk9|(NY6YSUGfXpIamW{h z83{7vhs&0rYv_M?wHggz+cUWz4WWvw16bY(&y_O51RsH0$e*wZs z93aE%dY*TeDbR%@(1i>4xG>J!#ncM5p1A3sU5P$bZHHxSuw6hR2L%{J%bXA1{eNX< zV7Dgv&kiXi0yt}1;GXNL&9`V5_JJj>R=1v0*X@k0>i&070cm5qWXEr;kF*BADAS0GnLvq z5=N=8x9mpGX3@_``?800NECy&Wc<_vG}xSmLo8Ru$DD-v>VU1C(8#YeCl9$aE%~k5 zRXTk9?E9y1I9bHX1Kk&K%4;vzAj-P6>@gaeIXagG&nSLmRecHg>I;#eZticdE%@5E zM_#j2Z`5ts><1M)YtbMDe|Npw`h2&E$BUG_N4jcvZs~Fkt6aRNQd#C~qOjGg0r|KL z*5-P?j|xY71n{M~@lfZOka`a3;@(&7iEYp-@;)&TIV5akd+JWdlZVO3!m2v8+;B6x_YnAZ6L@G zFn;{x`+Sv(Z-a(6J{DJ?X?AulY4{#X69i4@FZ1Uo27xV$slg91AVr2)ffmS)mUYEa z1zcP;dT+^lbl-Xu#3)sp*xkAp4<^Wd4O0KG)N!I9Ig`m2v@?Z&H9lfRF33wv4OT49 zP*Sp85*XGu$u|nfF;E3N2xw#eVa?X!`R&C8l_6r6!(=@&9!3Wr0ePx?4%nZ3pRrol z6cVRkeHmE?(|47u$(LQg6%h4$azW<~4HXjpp1JF6SK2tcyHRiP=Ob?ekJBnuJkf`8( zus8UL*uSY6JdY&@MnkO@TnMon<`TLxQL^~)|EzQq4=(6RKcXtVtvKiu{N61^&YFJ~ zTyE?GZF;okUGrPv0(kEC&FJ{ zwf+josM~~9(8p=$e`OFt5J1^T>u&q0a#M&?O1;p1tEh8tI`EpavSIJI4SQ*ovK)mc z(^3k>O9TxL(URm;Bje_&swj&SFJA(lbI2WF80yg8%3jy>@GeI%`$Lm)izBFl1U=2Jrdh4ZdHHctHnzn?5JaVGtJz_^ zvwh20^|$Grs#dn>vRp$9KdecJUk zD)U6aTLeT9ph4Cm<6zEgE#3@zhk$FvYsh;mtH54$4zrM-R-ogmsZoOZXwZCekzyf6 z+o`=Bb0bA@fdZ+3c`;?cC_0!R{s|@omSvfW_pOYK{=(EVUQi2Jc| zpeciWCtY8w0Zq8z&z4wu*&C@=xT}p19GvC5GBEV*GJh2EknR-CFKq>3H<@&(_(h68=s0$T+=f){P{&o+r5dUe4A4!y+z zXd)>sR?Nl+G12>vXxMQBu$&L)OD^DjL9^Os9^?(-6X{L^>tEMk?Uqe*i2%_l}i#eUF#pier zG4(!7Qjh>kAh;KP=iCQ^z^uqcJV1uXqj$A(SgKVqXIj zSBKkY*lIA}+|;^CesnVi#^O2|I(2c3JGddX)01Na9oTxZc&fdJoa`%oLJ*DP2CIrc z=_$!=U5AXd#(eNzM;=O{&3@k0P@$2KOq1Sc1pX6`UPq3Pr_H`>b2diz@W$(K)-7(R z6Mm`Sjkl^}BON_(5Zl?8nQQ{G&7a$cYATVt4)a1WZqzD|a&9Lv!gkjL^0)V~jr>}C zZiMZsaYKl1?g>QH4Io!FUVov@DX83DEFSlsHcO^XJll)T^%djeY3<@8=;nKJ+1D%B zEsZ&J{Gfirl>L6h{FlxRWKKauA&0vz>^N*}YJdmxitgaSpr>D)Z>By9YV}NK&)GFh z%?azEyEd}k9Et2+viS}8$+NVR)x9z7q)P3V`?eQxz2=YP6B!-Q@cs^RO-ZsweC)(3 z`0SC$;Zl=p{aS51&Aa?X?vLe4<{?Fg=iJBFIk83LedDsw1IbfvZNYvmx3P1-ZKlfP zgbN8h^#MZ#35k_FQ$>3jP^Q^7VrzuJuMgNDM8T`jeus7Bmb)8+4bd+2h(^h6Lf*?E zOzOmA->aTdgp7U0M#e<&E;I0^<1YT0w*3BJ`CryLrj)}no%l`#TKTN<1IuJg8hlI0 z26D_)sMTxz+HK!HVFqMr;YyFNHh?ll*b+rSE_CNcEtgkqtJZ{KREw7g37x=IpHNN= z`k)(om!?mJ-_K_SnJ$yr1|}?Yu1l>rtJynX3}5z&iBU1z@4Jrt`~5L#vJ)W2ub)@;jWujsEl!()0Q!v6#-i zg)BlMuCOfP!mr>hALVh?%e_0;wdIoiT@_W+GZJ7*LI$6}Vm~!Dq^D%K@9k2Ad;*E0PB=8 z67xo6eP`FGyqmM@Km^foy7JwB<{<=x2cEnk|VSWRV5pb<;?>D@B zkFaB$o3GR?DZl@El61IUUklgpTKRW73`Gflewo$CAV$WNDMmE zp)#E_d!ZK@?lb3h_O(Ohx2XzQWcgktpj@V#3VZ-2UGS3-Tul`n#T7$I5L3Z#fsAO_K(%Lg(%Rbz35sJwpQyyi1V_Kx@L@Ox@np z^_oU*r%}so#J{a<)3L6B4)Rk`dl;qCI@JwZhte_BjGj3+zddu;%y~#_6XmtE%!jB} zX~-zO0n%!)%}nITKx&}TnK%AxX+2SLU-lR><8lTLVRhyVj3=YwUs$Ksk5)Qvsns7% zJurEzJFFz4cJpX#D0OL=3yBgPP1{jEa*Bff;=09#zH<>yZvy@Au>=U*qFT&iX5OLl z8ycokQ2TQCu_L)vgW}!p`d&l&?CP-^c)BwpAI06hL&YmeeZlia@fLU30Gqx-r1y6}cd>9dh zf#{HN2BrCBsYFQYs7>~C=L6OTWO#3JT{?Yd#-L4Z&k!`KpJr*h5`p9B*H>|7VhTFu zYS6pQ80yol^U;u29=wD)_OU~Se+C2bH=KUnoC`riG5VwPd-BVw8X>LINqs92xLP^$ z)?f?Bs@LjqA2LRn zydFoY?coZ4OVEE(-Z<|*-M4|M z-M4i2Dg>;EwGYb7yj1Pj1Bs#zMxjT&AMag-!0EmAz;}Q#DXsEjt21VI-{^7e=M_!# zU5>clRtqbgzB?E#mmIPDeUFuCPnX6k+Z!)$vUcrgo1&ZoG}>b<{(?K4^9Fvl%*`XS zpNC$LWRiRzOf$hX+#oeHZ&>arWz%I;-zlq9iHJmXH2EFL_(Fbp@XR~EBz=MwRjrYe z8(-aVZKosJF<6%rB8Gs$uylmc#wmjP<+3Ex9cqPy zfxMI(GhEtA@*KAb<0Y^v2O2`P`KjZiMarXHgc@K(Z!_%)XmjuEGH!qzd{2-kVtct|99?)wKjeiyAGrYQ zCj^51vH1?uo=xvq1UaU56>D04xG-C%7ACNWTILY{l-?_TlrN4{41_&B@h*xn2U!J5 z2f(UlTf%5qlWY9f-fG5siP*dxv@O1)heV8u7#%gN=eX?xfZ`A~0(-5|gB$YSCt&Tv zgE5eXeDsNIadQq@tYB_0(2hB4_w^3}B=>jjKoX=$zw#&05b?J)mz?;}+D+4hy0f*l z0NVhToV|6%^}U07vk~&cXQmJACBS`g!~6gYM38xekfx^+u=)gLBGz*%3)T>YGQRqH z-uYs+)<(L(Z}pEbMq^}XHmq@RU_8^M1W|i>_jpFGdQ+DJzGLnNPmzfI1BOzmnm&l{ zi0eK)d|A|CIcZn-&Zg!Ap zgN@li#6GL%z-&IXMoDF`R)G(M^dB6zVO7t#aT|eWXpNb=4In>Fkjb-gm(hVB@#TBQ z`lM(!DC)JQ-ldRMx`!-{dGf z?8gprNpb)T(S%5Imi}Z>BrZlv12~vFbFK)ZLT;Z|OxS(U0A_yo>W9?xO($4W3&<`s z0d97~!x34K*`W6fqe}|Ql0>F5q%Iyp$eJVS01dBZD<{@aPtt)INL|5 zgHM!cf&mK`2E6g2HnTh_NuBF}!oKwr1L^100(GovO2F&EQL>#tZ9y_kkkKfL=1wBE zY>aP?cT8bHOy32xQL^Fgc&);6Px-OO=v)YKjFSAJ!5#c=@#yd%rvT~67#aC;^ zP%k39s+7Vokl-j8=8@b8N-)l#Qf8_oF+$9U>Dr`|TeXpS^-eSYVoVXMl57Y(!7M%) z;j|-%HwnJ~bgaP8MvYZnj?NeKV~1Eg`!K2xmYE!JzXXR5Dy@pz1}9OxO7w|X_gaUM z^H|@jvy*yOkxw3GWAkZg>SZs~N7^3S>tO z2PhBYrbXhSR$F^$`j_f4O?&xf_znZ}N)STk$3}>3jWxjAXd!z0hgg;VF)WX>vEVa) zyeGg=KFC@_3u1kG(0+KwBiO2#7llzR9+FILXxvSpJ;I66>BkA!8lCaRgWN{v>?*qK zyD$PUZB!jA5@*N^9d?@XGWb_WND*u& z1h0Z!k>K@zfAPQa_+L2u|7H!9I;_%b{AB|BKc~R_a3aN(V+&3T-gG@4;xF-mdkKeD S;jan)YI)Gctk~51xBmkc!_Th( diff --git a/windows/security/threat-protection/windows-sandbox/images/5-wddm-gpu-virtualization.png b/windows/security/threat-protection/windows-sandbox/images/5-wddm-gpu-virtualization.png index ee8aa78bbcbc4db1024ce3e8d5c986a8ab5b00be..ff2190d062e9cf3e2c24d6161debcc57ff594a18 100644 GIT binary patch literal 27840 zcmeFZXH-*dyETdp3m`T?x&=k0O7EyB2nZ-$dhbnoM@2xXDor|wNDIA54Tyl$fRIoE zM5Pmo5CSA2$+?%$`|kan?~HMNoF9Aaea5#2Y78qYce%=(^Sai0^H@`b;S}2`8X6h~ z)ra@BX=sjR(9j&NIYA5F@z)=10soxzc=*(dhKA)F^yiR$&JS=F&2ev4jR(i)=}#SE zK7-A>jijNuM5B8DuC9OP+Dw?gjjbh>tTn+OUzyZ#FHJx(Q{YCp`PkjE0i(C7c{4P9 zLq@?8rOTQoeRh04i7($9`n)%DI$U6PR_t9*dRIwCNZ+{4gBg#Tnl~(zjnePbozx#V zu}ZI(UUiDqqG5?(E!*R@xHq3^vpq*{DsL?B9gyB@wD;UdYgAlP*mD%7?>qxW`1d%? zVXz5J?(dg-^IYbN3p8)&kW!wY|K}BrM{FhQ zzh3^lXes)ym+iOz9~Xmu({myNTB#OR67(4$&B@E#-u@+1c6g zsGdK6{#3+0pYpT%(P|`3nJiRy9Qz=g5U0bbEOF#5&$UF=bqw76{e@EzW7E?n$iTEm z%B0=(M4n^ecOP7N*Hv-_8U`$|v$NBV1_jRW@t2X2DJd?#sj4l-p)bWz?j-MQE)3U7 z?X?*j8~X%)0Y2F^_bi}wcGY~~+;_X02b=ja;o;$Gg`>pTy*B%{u)N0)jq6>C1G$Zg zZ>`I&Y0)W7(BFAq8%7Pq@9aF3+3ox^RT<#zJyy^4&t~yY=P5;r$;t7n2L60;{6a!c zsZm8;ogNtJd+)s&KWAUx`Vzbwob2mG^Tf-mrc6sxLBWl7LPtl3jhnj=(V#}p$XHrh zs@`i;{j+gv>lq%8@7>%3hU0*Y8uDOaIdQb|x{tSaQE{-ipu* zuVigc2j|zhV-(^N5^!B7!4g_Lt%|=gXjh}gbB<}eine=!t3S2*j*%vXwfvWdA+X@+ zE-M+2pEOrZ3|`#7Vu?L2DJjX9tkx?`kMrICWBDNeiE1_HH=2?TF*ayNXlVLhVKxnf zFN!JsByBWTSbZn8A7Q*8=es<7SyY(6i|rwa9D3~Viyl3ye*{Okx{bRc+0!8)TD zS@=h%r(uhWcIz|EV+V(T!h$4-I59))dE?E`Q=iWGYd+ScR=!1=%o13#$d61e>A5rYtQj?ISupJ^jbnSkmDa&+p|u?rll}3o8z+-$kPI@eLk02A=B)^Yj_Qt0?8Y z6@UpfXo`o7n}jt?g}S*lC24OyDQ^K60zVeQUvd>{eXTXsszPz?3wz#y!m*Vxa{ZQu;j!A&`B0bxd|8#xJI98y^g;JI>&PYQO z-y4!}m?kqLC#L~#uB@!ACWyvh+yy1Y#BA|I)&Vr9NHa3>5 zE_s`~I6B@=Wr(KiR4yg2wSZTu(JAS)e7sdzmh8=4tBS=XRi3-D;7~%S!29KxhFMsp>1=1lbV>A$Ykz!=}gf@N^_Nvrl#hUNIZo? z`G~F#7PT}F9$&Yfg9eL98T9>kzUu`55Sbf_c}X|T<@96mleYMsISG3ox5yul1f zzAR0383~qW$HY?1izCM`#3|EN$7)Ycv4nTz3ZR!)R&MtX zs1}ae`Cd^4Lo3(F(nfvknWWJ_ihXDa?D(5iRf!uae|aH3y`iB29lw(-lWb>Y_0{)N z<-}Pd=cfyrhi>}rAcRX~Wq^-4b?)7w`O+`b^_=22=GoTU+xzjVYiZg>$JFL6q++R$ zO%4Cm8!;NZ!_(6)f^#@Rbc&>+qB}dD_09cgK?9dt;o4Unz_`j97fXMu8TbDa=#P^*A|K>bpgy-ICe9n;K^)z9%u zAk>s(q8psn5BKy3o9`G;)2jf zOT?|{V>51>F$7y9r45ir(Di!QLnnDZC?9G6$j-qbR@iwWs`EkNmr5rP5Gp(~2kk(d zwhfvM#7~4DXKXTl3K_iNb=at}VPWfy-48y*SaqS+u@-ZersLRJj={k}%~Hqn2|a@p zlQs)s2P}dqqv_X1^QOe6%9VH3h2%Z3!kNmychT;Wo5qE2Z`kf_%q)_Ni;G_tpS(rZ zI``%kp$Rs6S=UJ7!YQVflxfVQOZ}QI2i*t?_4&=4ljsXfKdPvzz(XZmr*wUZDNcsw zTH-qT{0$+6DMZyDyX)vdQWwP>%YIZ;tju%9>^;FC^>Yq*R?niD>^JHT^>3Kbh0ro8B(=^ z_BO=(0gw^;a{V3t&Yh}pr*+cCM3vIa%#8S8nThI+3nELWh8VL(S8743taZn<9ZL<{ z?&Te?J@7>P^|``792}7({HjEgtm1tH7eTxN+ma@&7J9Mu0)u)+JyG9LLq?ML2+26c3s z&^U%*yiRk<*vtwspYZkdof@Jaij$hHvDfOz<>&qStCCg5*gS*B$H#{$(>2rG-+yA@ z1eoAJhR>%e_LM+Ov0f;7dylhW?*Ue%wY7B-(@0J2nHye>nf=Pi6U+-=|Fde?W$A3QRy$?hhg9u$W$y0!qU#H+bqdDjLN2+` zRxUGd&n-l-mNXqC&byB>8a5@p=4D}opJ)CE&zO>Mvgu3o)b z&xnbSkB=@SK|^o%v}1_#%70%o31byrM2u%zXKf;7exum5h43cj$^NZoXp3uwche9{ zHOUQcDGpT~TBsPLtq7}VyO1wUI~Jd=qhq*)sMpMUGPsiz3O5HCMy)`5b#t>pqoUfn z=k$1|9=2;kBrSHm6}!AF-02DSu(wxLLsQeq!lGSb-LC5FUQE||hNZ4 zhWX*QxI&`S!t6V`fV*77388_QXGJm*HfeS6gyERkV*+8&w- zU%F5H&*>KU!lHA1ANPz4gR+;`DIrOeOyg~#XOyRv$)83Yjn5dCC^|8$dW~Ao6Laz& ze+N^Lc^M3dkVII`IJV63Xl2jblc1nxfB@F7yme!&?ZZgIDte|63LZb7yPB;8dIn*N zlks6cf&YE3G=zmz<>z67*VXbj_rD%k zeTP>*xMo&i(CoJvTe4k-}I|dEDVF7X0#IbGB31#e-pY8>FG1U=%ykAgO zLPG!9(NgiBrHe0pNPC--o2hK#f|Dv&6XN1-raek0PaLeM!t$sgdozWA(d;U*5W`N; zhSz(}oHi)4EW(F;XS|cDKFr?;-<)UX;u0ja_+)g=rglxRoPYC5I-&?nHY^M-U7$LY zEgzI3w)fZWfh7*)JFR#d0j72>74WIm)z#`UW9+M4gd8q50K?|J3cmrJ?il^8i3tta982}JGibE) zA}@-x;ysm8!!L7$hQ9N4msKQ>()+Wgqe{)(9UO{E@UR7S5gA$8I07L6EmEx8cOv56 zqKHCH#j?ozSP&Mh0sFO(1xOpr4dIP|>U0Wjrt(i_o@$HTSHc@6Sb^ErZ0tAb8c6ZY^U*Ppi zS|0LP1+9Y^dczQcULce&dLmmIMjXaW6!xe$@w4>+!W>Zh$lQR|&{vE*gHN(~d3im^ zX=pp%mC~DvO%0Oc0!V#oc04mL?=qUSi4UYB&Mpu~yH>CFf+-*C7uXBog@>Z#I*FlL z0E^cfyJ4Prnb$7zccrkhvQ{CRC#XTU|2Us{Zh0|=TLOVVu#n$@dBy^?O1d-{lBb8W zQ{{d?Q8v&TqpT`V(wqDRlKhrfoWs}V&7kSWoSY; zl*2Rk=T|4wcuddSF)RZ;y>8uLV8mc!ps|YA62|i`z@o?$03M3ii%uHEA@ch-O zN=v0)5n$o~PQgYsWi{gB;@-!bUKGAae+$S878ZBF5-)mniAhMTHet&X5lf>)Jaz#` znBOBY0i_F#E)_+{)s+0h%LmsV?g1B3xpZbYl7ZcOXZZ<%916q{gK@JU*DgHpiWaj9 zKybXF;R4VJ_!A%6yl=~2E^wo9X@1Lp?8lFf{X+2IyZ!S*)U_JKEsoQC=iVf>(BuG# zMqNDyXcw9?D?H@wRQOoqQg$iOVPrSHbhgkKmA5>;@#!yVR|T-axuR7ch+|9HLFHzY z?bOn$swei@0iV+|GU~jRG=XfTN1mPUliQp2@__~!tWZ~5yBx{xcH_gip$zKypn1Is z+y^XJ)2~SO3nz|xPdOGkg8u>(yGS|AJ85leo|*=4bxqYdr*5?1G#^|!3m~67 zVLnj?Kc<63q4b9lW*a2U4T6rAyxwN$UNaLttPi}^625kqnM&G}(3hb*1q51n{&v0OFqb#Yjv3 zRc0s~!2%f=7~bo*ih8)Gss$@}~nl1Pg|tew>>iFtHAzoX+W5NtHqCEawD zl)^zMgQR-kv{PsMrW)LHCL;l{5)&8K11d?^{{ENUwaI)sp_XA6rNT_lXz;tSk&zBR zG04eahZ!O*FXGF;S*c!6oT_z9Bs7d;kvls;oHFNh)-wlkE+`-90G16HFOMSt^`UTh z8&hX>tv!MZkdi4b^#X0@5(Yr)9D#0S7j&}##2>)lw*BSQbwy!E!3DrDYmXI!v?l}7 zF{g7~Eui*bNIJJ|_6Wg%kv!%(_w-}>ArE6P7am6@KfvLN)MT>sfl3CIJUFpOVq;^6 z&6C7LMf2r@b^)g{`B4QEWR58Y-_ynv?yQghzDOqRp(#UgnkJ>->VhqQ?tu~M(GNWb zvFO*YUoU%bXrvPgi7aSqYkRqS4oG+@Ghn5fnwnBdoD453tEkW^uf+qPo25BktgOzL zF~}Udc$zjGFg);6e%&RCu?hKyN5uN8SH^{!9YF7UQo1A z?NK)Awz^%QeUmjZ4^S5HHzdg@2W+An+y^z^J^u|`?_z^7%f78)D;RYI;TyzjA79^F z$!duPM>HUU(&o+EqHRh}ZEP1WtCm=g!>25Vjb3HsxRLkQoi2Q^NecFroHAT5J+e~@Fm z9vB!nz*tjXFQK8OCCYgE7RY{f4y!lPU&S8Yb40ruYXWn|R`E3|+Wr|5j zIqbdwg02s7rEt7a*^s|f#HD^n9J}Rz;mv&)&PiZQ;-dCdfXv*u@B@%SASR*4B4#Q* zP;dEJKDhynH@IyoAOom30N)e>M@6^PH4;W;Wn{*H(BIL~QKBr`WSVUZQ8r^!n%>Y= z6M!fHCRuN{uhVe^BCwC2A4_I3ke~85HryaL2d2fw$yw&~=@ojR@iO&-jAk(~!gjUf z92Hkg+f1;VfQGtbvS#7nlff5v?f}XTs)NkQRi`)=f+ybEJcMu+J*X-I!qGXm^&x>< zA^3}xG{iijI+dk3Bmj&Z=uuHtjs+#88W>ROAk+)kf#Hws%Hanm@`YxP~ z8YEi-!XO-L?fM;yM~wm9I&xrPZtIKX#Yj+OaCVMC8G{NI0Guf>xdwn~)6p(&Ze}~{ zmV^wT=&wgf1H!&I2O>yGHNa4=1l?Pw7>;@$T}3N+O2*cHgXSqql)=Dcjo@rU^uJTIR#yaI5k;-+(%3zs_&L_RKHe0L?*Al>xkAT0ba=^wE{B{Wny{hWT{e(*yhP_=fJNyR&mB zMB+jDCY94+0R)2=R_ag81c2B+;Cc1kYl4&|ZnbXp^GM~;i#dFtYazdJ;g3qq^N-_l z4(55CoSa0oq5uT~rtjqDRxbeR1Nk7ZT@zyTh{2DAVmWHwyA)E#WH>dP#mZti|J@7V zT-x2;J>Y3?Z*O}s5_mFGOxM7|``%BW0-Vy)647T@V<*o;3VKz?7j`O+BL~s&)AkDMGJ=!{OLiS%LkFq^_^56#L&cY3Mh84bl<_&L2i+fs8W~j2kR> zhbX(D3n3s$9P>;hSsA!pVN*Z8!wYw3$wmZHEhmYe)%DD-1?{fA^L8@oZp9w*CEa_lIU)c36y%1Kiw(Kt)^Be_F7@2-r&tAX*n8ISz5YV%+#o+7S!e z-Z~%zp+0&B=-x`MCev1UN9KzwRxcWYV%)*H0-)OxJ+YY6@%{TE z(iur+s~r+IhHU|oorZ|&{8eqc5Y@RL^A$KG%5h_J(|qTzMc#%AT5w&MYtfH`Z-ieS z1s+pP2o~A8@4#RIfv9oK|8a;P#(rvZf|Gnkk<($+A zeW)=7vBY=LMrooYu&l&U43w+7dwQ-hWtU`H%llY@6ujcyR8kG%Hb?@{nk|JWsO$YKO@NK5$>bNC(ii_zXj^gCFsZM>gpY}90VBYz&b&`{?mfMeFKA30dnO7hqn&es-~KJN&~_`;xQ?FuSRO^nX3wEkaAV2 zOEFNpaRJoQB;7&q1L?UQkycf88}ccj_|r{6{Vk7$2w*cXlc*liv`0wXWndN2N6KJ? zCmVq`fP>ryoevPK9`!l4C2 z6=KxA%Va)|(>9_IZ;eogt^=1#h zF`(Y{xpCM$D{YxR@dnUYkZwU50xcB}fm!aR{TLn9!QbVF7F@dMGxtw?pegHZlh``N zRb}pW#{f`SStNty@40_YqR0tTK7v&EIb;h1NQhMe0= zru`Z<+Huoq$J~xKqn;e}SG8!nwGr%aQGNi?iloic@PWal$UAc-1JQ77OxN?NbJ%6S z)>Kf5e^7?e?vHcY^_MH3KWZ4DKPbkA9BN(LZPF(cuE?(QG@EigRuk~*W}ZXc+(d=U z#*t?Rw?X)ZswhupK>acE^ilRgoxU%4QyY0)ds#TY8!$c!tEwBK267gDTI}XN2-90z zTkjhV?wY!36j-h!fRxvhU%+AnE%_uP0u%s11p`ou=vfGP;deJN?h0*=qt{h@RLEt~ z?*;*UT^w4&5o$ppD;nGK=PTW!E*n6{;C+ybe03SI4-Tf6-$H|p7UuzZSkE+<59}^( zaqxY7#674pM2n@Q8>qROjz%8{yk4lP7bz?Zb)^pC+GyYOjZ}H?al~RB!M;LEC2G9Su7zoR(O!X1(r|h z1iD7fB*5yDor|D^8I8;F^Y*^Mm5_R{QHcUgBzgyy%K#V{b_Q0A_wRB2wE^t+`IHo9 zNW(MXmHaI!8R$=?kZrwSPDA&~#S=Vhcp)LXhmktqWpx#1ya_ai#rjTJb zNFkLdAT*WW2O1|FX8^P+#{wyLcL`E;+ZMO{W1;>c0Y0|4^nOtA``8bx z{u;OzP@Tp4Ptt~8L-V8RK{v<-FF*!*6_Coj51eymXlUrAEx@#{a7NnjZqQ}c;R)cH zUWhyRyfldI%KXfHMxm5?*rt*gTUmfH&8pCNBxrM^%bb6LqBvEB`iF+9mKsf-kU}V_y00;v@NNI7g<6R89 zTdKVeuqLSDH~LuvB730zurBKk`usp)qX{_4pbiio6#I(W@{Z%+Bt! zh2T;!IA<|pZ@aF(9(B+>12R!YVBw6WxTIu;$~}NPoy-(Lg%%4s$k5p}T!bpFGLRIN zjg2$T#&m%e9treo3Ds^;C>?QyQa4D*pxi*`hS~ zIR`v$QbO&^SXn_q!ThpiLq8vHvYH-$^H>?`>~F)#DKuI=G(q=jSkhg}>l4_A^FRzI zQEvF+KvGsY5K<0U03-o9<_m<>+qZ95<+>g!f}0rA(pU(1K-6xn-&_%%@U|JW4$gtV ztPHXr)Z^mwIPJ-Ix6~zCWr+$iKH|7V=tbTBn{?8sn@4$AL81vBnz~31h2Itt(XP@l z6TIl#+~Q=YHCVLJJ;vs&1d2xlMaGDGbhq-Sy~R)-QfzThRl;_!7xc1Jqdl8jJhh8; zyLMG4=sPQ^4`H^a82FrNrU9zlZUhC~Z*$Mk5@nL02j!8LmO-n4WFMb>Xz1)R;HMv& z@+ZoGmhjt~ohC&R^f9#?y~CKBJmf-7PCAxv;s`Dwj?SS;>=z7I_PoW|1f+-i*0-nc zK+tHJ?x>NL9vGE)R`uKSZ|;vFk+#`a-afjnu6dv9&3!Rx>EihK)97PJ;FkCD-da@| zYWR3Gw^*4G`V3Gl@t~nB=+`|M*Sm+`S{~a96jF>q6{8=Ezm=s4Fi2{vM>bGnhKJwo zZp@U9j69JCRmngy*1Q6!%z#GVLYI64^Z_mhO`&?Ga(NR?hO&T<0_CRwRIc&IBye%D zu^&cNVOjy=T!ympXq67Pe5y5(;65cbW!6_TOpp@)uuip0B4BY+HVe$5ELh1Ktu1OOuK-!Q` z4Bb*8k^+uBAg376x{k4}165 zJDc}}h!W2O^B4{d@jqZcoDvfmNvrzaav0c%Zg=i^n7(t!u&VXOPWu#RsWU$x$xnf{^mes-!?8#ws*={Ze|Lwg$KB;M)VS#V6|}%Y-wX~xP^|vv z)ql&yHh95e{(bexxR~RTZH3O_r1@C0OnbBv`{7KmHqf{~*)mIT%X{9>8Y%VZWo0w>bUjh`kzsNq5`1-~(d}g$%M%}-3{=x+$n$0v$-;?R zY*IUw0i;DZHMKiz`~55~)iiLWfW?Qb$HF8wG~PbBSRi@ZQi}w%it?v$LM9MtcOoJ)$w;O zYNNy@R*6GetD9|d*Hu@WSDIcb2Zt>2dJ|dgu^m-UjFqGU=U=-~C(Ou11FzMVb)48? zm@2SjR>xMc`M8vcNn)u*x~0qITY`c&d|euQwxELkpe!J|b3)#HtP|7J z@cHV);zB#01!uE7#?7hE`6}_tFUsV%BS8rzMDP)7Mm2DKVUj#T<={4b#OJ8v_^Ioegm8_~{C& zu^&EUVj4BnZ&rA`NBLT@gFFRetf0NKb4Hbj$Wbf{;U+&{PkP_R?w4%B)z9eqTH>g^ zgVH}s!$~i5sHEXar=4mbmI=+Hx)-)?(c#s2RZa1rAq;7t5LC*i@|ITNSqrHFUV3$2e7{$dJjk#qkt#dr7g^r68)*7PnqT#lTbr(d zc~C3#2ARS~%`I`|3|P75Q|E^4#1NYr%eWB-844}V85_+@++u&;WZ+j4HjocA2Ahae z*ahid_d~Wub1IQndGTYgkEw7o>K>in^7i-BrXlP2rk@(_Ba)Hu+&%Z^SMiin_t-x& zbbwuQJpuN~nJ!%OqW8-_HmvE3h*K>T4HFg9m>t!}O)Ds76C_Q4aEuggzR5^{ zF3=i=zDC@i-RtxE`i8iguPBbmXbtmfp7rSss1JPDqi~Bp=`D096 z^G-5iwq$Q+V*SrdhjuQ5UV_9cD+eWHJ`^4->iogZdH*TbTA@^M^6#5wvU__%|KrPP z)iY@ED&z~-JUxrQDOn=8(h#m0DnsIS3M9$;%on8Y{G2GFRh%s5K5)L5b3i()3g`6R z-bqv(oB#IZWrh%Paw(HnRh&_VfSj&btZxhOc*s3lr@`Gwjv*#+KUyhO@>~5;N_oWV zBBi<&M15j@u)`}x>g4`_|E>x=)O65&tRhUju>Y#8_t(h89q7W)(opw1k`zR@E$-&f z_SCg7nU#>K%7xhB3lMu^W)!C+QLOCfI!hiD`n zek@s=_X7=LB-=m#LS`gxHT)*Tm|o^-kp7w&8$u!R2M$iCGb2w)UXU+I%;3f$D?-AD z!pPizCqQCk5Gs0+6WTpl&e&xhE5c$mL&Q({qdrIXbIJ$aS0wKBK=Hbj>;pIOY_#e) zmcl#rR@OnunZ@-x=RcuGf?nokYuWUrcT^&xwlrLmD`a1`Pk}mJy*vl=;gfKoJRsUb zKIy&TY-au^6R(ydxj}%LdHs4o9BQTJ5Z#(I-COoW$`4lBiTECD^!mtqgrr1yVLtrc zaO7&ZL~Y>Tf1n)?1ap(U=v^IH_Pvs@{O&5T&)yvgKIDwEHDH!AUsKE3q)xc5Ha|;s zBM;+`CC289;2w@l*AQ`xA(^>05%~-P@>9dB_t=dB|BjviIK50UBW)IpgU@ql@rBkj zEDG*ZaWB>Msqjt0T!P#u5NnwR=thGFgYYV0+rIKr5+z{8nvHU}$t3Gz39bA0^ye^N zdXVd5qfOn)S&b`tZB zJ_%D%TW@4jyI#A(Dk}+!VU$`04~;~~>060)?!!GB2i5BY2xGXr`8Ry}s@gpca-eD0 z)@4;~jK=t6xl`lgM%BUddto}GItdfm&83?aP^k25iOZ~^{6xNw*Enr16ov{6*OVb# zz|VMR+2!ot?Z73(VhW+a=~Kj7^5Fj#d|ARZQ@Fx4^|NiI_FM}#5-yt+fn#0z|smaiw4K%G4D7IX66un0wk{drrS5ue& z9cHxTC`I(0!zgDzY{u~@4%e$oVi;D)7k3I|1MxcvVMTN1iz5XFZA$Kq2d?Ew=5fYhljUgrcJKC%3b0;aY-@4C!PryMb;x9TfET!OQM4leEqu`6WXj`+|Rd=C5D~xckOs^l$#Z@zZsu(0s5Z0_=}4eh9@6EIdhT;hJqS-h~RH#9ZmsM(s4rMaoM6 zee`PG5)`-J%H$hh$KmOqcdQ3HmqUdI_Aj`LnveEYNa^LU1`N~x@wRisE0nxeBSkhMy#{5d$Zz)Mk?@M*??AjLToT=kO_Q z#}`778JtLVLqW*?{$>&jTZ`e7`s`m9A8gNm$E@y1nwwUQT!TL=G$Rh0OxmIXG{=k; z2wIEBRpY_N4_ z+dM#PHiSbAtgeuvyr&|JceY1|$^(oUuxw2J2wtBjdmngKs$?rhW8lQDm#Yl?EdR-K zeC4IL8)S%IaZIVDw!^*LGuxE`=k{oZBGb+Rl$2@u3?s?}w zNG=4}D^1Qw2pvWg+pjP!nZu|DsqVLM+zA&<7sJd3ZsBKwynpZs4M)~c6Xslr_s~4W zR+S(C{pXN(g_n=^AF{+bM2nW|2Y^&Fc=OnnD;tEbSpcG!Ofw!@ntV{PEwY-V4+ge z`H6^taLq6r(x>EdWeec7AfN!#XrKC;d!GOJtHGF0mZteb0X0OA;SJ}bz_SF80#nle! z1h{30&JqP%4{8C4QpA*AMNk{E4_3>JmZYCh_%NGBGjZVjc>{Okv$!7Y-mG_l^TOe} z+<#A$=F1B((SLstFNIPXoo#24EW7X%tZk5aF_tSOo!7b zD1`F!@@BTFRyek5B+OK)>yTzkdp27%d2>kDRe!jL%9KHCI>(k^P)XiMXIna1=>Fqr zYTas2ltNuDtv}fKHqx&KCvv30hlIgF2=t&9Hb;+*V>+g#ie&$nnH(6*`?m}=9fSlTcN11$VQ}Ln<~rab^Kv0DBx%mSa__zjOF5;0_|6Q%WO}}Vo&@okg~tvEw@xD7v8gV zSP${6``OSv`IxyU_C=ysrRIc%MMPwxFUiFAofzskbgQ00VCNp)hfj{9Hujr16%Cj4 zPctit-kUr*2%{j!Su{@l-Y$BHq(BNdfCzp2L`ti}R_y)=ibdVD=bOh8K8m_m=9g3- zf70sLKre3rXP6T2J9u7VA7)sp79Vw1k%)WU#iC-e6I4)cH!b@#48$Vqw7a~*Z8qRu z;JmR1k1nJ=x_;%#!S`R^_Ss*GWk|S2V=Lea5-t;G{HA~9F$h;r7aqD8ZxFhp5U#1o ze566MBtn$8rygNux+*s*`vfLue+*k@dzh*)DiThsr_@t-gwW8hC8S4WF|# zDy0<_2`CimV?4M6&uwj@$~uYfFim{Ho@FJpi9;HaGZz|We2t&XKX&^2G!vT7@d*t0V zrW-#az^Tt)I{>3&cl+||OHUcNrasK@*|}R*AHidNY)e0k3@VEQ`qA!wL9}VI$WA$? zlJ$mh5BrRZF2uuj{92$BMAM;b%c7R;^3x&7D%U#BO`;@igvW)pZ|ZS=Mw}BU^E~fh z5dV9L3~-5{aOe!^c|(yB6VS(4UBBApu5rpkXMlI5>ho13*^vXiphDFB>MHaax+kH> zZyq{XnpFhE&&R7*Xrh6gbA#T17*1K=q^1irKX3evsNO;}xh>P)qZ+_btbQ`{MpUMq z#44GS8usT%p=PTh7vq<>6N+44JD3=*s$Gm^V98&T$0Xac zO7V}Dp~ZZbN0WlMjVA_PB{#b16stc!ng0jLP#}2d`IGA|v=_~H((;0ny|`t8bLY-4 zQuT}Zo^Lsm@(ZAQZXV_#=ohT%cd7*bNxc963Bzw~keTVr`}@`V9YM@YAwx;4(ffoj z({pGlY2`M&&FMmE#+T2!2H)torLWe{wurGg@u{1FhN<>fpAaV5J83Ff^<&3qqFR3^ zsaE}JA^P_>`czf^l9Ws|U2pVXjZk{FndrJjP%*n@8FAJAnYB;vRJOM1S+tuO8>xBw z+3Zq7cmMGq;<~wb;q_3D&W}aq1K%rY6=01Z*6g{ThN$U?+5bZi6p>$Hu!0tDnyMlQ6Q!^G>qvkozFjBBw zZJl-dvn8?dZ&9cL{<{(9ReWr(x9#OHci+^h-g@D_5l_W;0tE5n)hLMK;4Y5XV|2{l z${J>kRy~22oExuG>#Q41e*Ozvm- zO+8p%*hlQGullv-FWDM}p?3C{owZhE-Bq0Z4purz@zTfj!8{e(>Tk|cOS(Up=$&m0 zzRb06t71Z`TOx*p^<*3=*^^Nj580_3ax8z7P~jRqE|7IDvGlZ}Y*654-j{$6+)IrM z)jCAVAzYB(Cdc-d*lq5BT2(4P zZs1pc<@Z<_!3C#@$eCjfRHSf(zpOa}W$F(z$i5FAyN9dD#um3{b~(=Vik78hVtqJc?QEfkdR z|7_T$pP+>A@kis9P~8W_l0)30Mq`gTH-l{Fo@4QCj&N(ekZF<)>3Lx;%TQ^YIp^A& z&suI9LAVY1rH_QVt!~@Vc+z~W-|3DvF#K> za~c&x7N1SobJ@qbM2dLNt0=~cO+;6q%{HQCLy4uAEA&j$-hgL)T}JU|pHsKjRWa4D z#bj!RPmWA+f)FCS+(ycFO2`mOV=Y8vidkUFcQ+gqlejC%E3HwHE?5V5=>|a%AA^a% ztf}Fj!3>SfSEHfuqO@stag*4br8Juv`M#gU3avf^S@^Sl+d_JRcg^0LK(Kycd${^T zq~@U0=1bF);f>K(bNH9>E? znigVuyMXv7&TD9A?Rkbn#gegCc-s?w13TjN$poq3e20KW+3dhykL7AMAHz&#d?v(Q zXUCa<8%fm(vNO~rlczXK;;lHby;zG`0)ELFWD67F3JIUlotkN@5f|<;s6}?K| z0^Jr-Hajk-E$mqf_8@XUK|YGs^hraB$oUwy(vR0O-qhdCUTyt zG1yvebycmK!#N;+25z=i22Xao%?MveG5(D*c9*|da7frwB&{<)gDyg(mHUt|e;QUI zx#^Yl4|@fPkj39l7V{@F@{Yy__w6^^YjOXHBu@+t8E!QSgqZIQ35jt)F@CnKS|N18 z)1tkvwZX)<@8paW;=@x;of1AP+-&)K#gl8mm?Ik8NjkQ~xg34Jx+^nbN? z-9b%eYd@~LvUX9CAOc~NQOw#QKU);p!y7}z07Fhvg*C-3>@-bNI)5RW7I;VOW5@W{?Z6hc~AK#j4 z3()U8z=M?xL~7W5e0}S8S=hTKDaLN(j4ExghEd@g$o1w1ETHhY9ETGHjS7H((myNW$@3_vpyhl7tjks&v>Ic+392`9l8zC_k}C);J;O96)$Ow8%*3ma zk$PJGvor5B4+&bYylt4C+`J*^VILR~p0Z8TuTM3PXm|vY%o3Gdj6coXV#zIj7A`DJ zJ5n|?JxOH>SXVf>GcApEm?X)3KHl8RYU&FUE%QRlp}Fw_zE&E=xwQ;Dy!te4`)7^h zy-}7&KMGF8F&FbvXpkYLQK@ner)7B9-g1)@`XXeN@8_kLLkZhX^j@r6*>U?kOqe3Z zsInd+GCeV(B%)9DcN#puJ`|Q%brQW#z>&GofT9;x)tEruH3uJ=rFoMs%gR5B?Ix^s z7)P=aUR6M>H`Q06q#b1MUGDJiqeLOIrZnUuSaM*DFDLiz3eP#`nSup;T)^w4Y< z);B32F)d`RQ8;m$k_QGgm*aKL^`*bFWx1ypah(0bbdRs5Aa5wS-<_19q5b^ENg1+L zn`&sMCvHyPXq$54mXoTGeO1iG^K@jlXqI@ThlJ@tq8MHFqvWkdpM-6zyi2z zh`#C9XItsan5bE8YT+m8VMPPipu?h~o2>iJcOSuEeZD0|wLGMuFLUuyoAFPh+?r9c zg~9x~agE#ZG~_er^ZxiXF4*8JUB>*F=+MX<;$f1PcSZvo3(ik%*;1pBkCHb`@RhF( zsDFHie}@y$TZk8P-WlVN(1T~l0@w{=3GvTmFKMQ}7nis6y&S}?By}d+Fc@qX%0@B&ImsM)8_a(zgKNFzf6H+|r9(_) z5x|2=7P?(RdxJ)QkKIPU-f88l>+L=3^aycKRVnRw| z!+|_NU=IivyZ0UW2@TOv0f2`}TGT{vYdG~cAHc0)NknH4e5>j_C8E!T+&Yi|ratuB z8HLFwzm{^&Uygw45W|LB9SWYYy8<_cPPhHk$k&n+CR#)+Aw=P09ryFmC9cJR`lUmb zHC0#HAcI!*T?m@q|D?2+|GO+k zZ3&QBDcRYFfNjroPQ9?OP=UmrtE>q^mwq_?+959Zl7+>jbDlaqfP2dD_2>BW2Pg!&>J%TjVwl0OP;U7x&4jbph2VF6#gp>B8$o<;I`y<(TGyo)XePLSFas{cV>c|dIwF$ zxFh>3@ODbp&kQyUgiGhFiLW@Mweshi=|A6Wk6pVFuej@m@cgUo6jt3S?VV7Jl=hLr zGk`$+7FuytCHTEtpGvm3xBooEYYc#pv7Jb|lZj9TJ&VKP0Pz!37C}e`FwuK)bRDq& z9p7pc^ktSz16s@e!C33bp5j0b+ngFmVs-)z#&k?BQ5=zS7-gmbtc|hM>|0AQ%VfK? z49_CVQ_ERoGK;f;=p1#k9Lc1Gr=0+^bLl0}gr=b^zUcOHWu{@E+a*`%aHIAE74+t{ zN}$*m_4V~(VNTA@ck~lfbS*3_n3X`5RA@~v2Q{*WRH*_?&ZO_D?4;4QG@5v%^j}tvT)1^KLFs^lp%S=~}nn4@k2J!%uu`0bR3PWQN1h+HuxePIRKE8+V`` zhg>%p)SWjux383{nkak-2J3hSp`3lPKXI2ccOc5qEFIs9117F(K0fn3zzCr9fqv%U z!FyM=0BL`GL-(l`zCO^chxSnF)&;FWhYj*N@xJyD;c9?+BH2^hB-i?*fl4rA5SW{HrmQ! z(R74?)O@U`gHBf)AvQ^H5!F?GU{1q3G<2(9IJfmjC^cgjmH?|wc&E#+OCoVL7E+<^ zm=X!ZEbqVv0X2=Tb->K0w|Q6I{+be{^G(U%RCLc-?Z}0>3kKDYwX&XP+kwLE@CH>Q z&~%W{Pd<-*e*c4K3jz^6)%+HkIy5`jSONy{9$))mLJt--Px70v3_AXHWmsst%w1lFYz!41UwZ6td*Rc9NsK+N$`U!V6dEGVq$oC^8f+Lq6MwcoLpSSdy2uz zmcWkiDE}{y4q5aU^|;?LfV@>)}1y^U}R$Gg+0T>)O>>DUypz-;| zPc2=Qq<~&f$MoyXa&vAkfn}{9Syb2SA1ns{*Yv%elc4Gm*+Lvr%7a*^l633X#}eDw zj% zdAmuXl{*rC4tuxS&^IJ(!#|foN=WZ`&@vqAI`BvGaZcsr$VeDy>MyzNZEd@Nr3LGG z4^P_u=Bqh`PPr~jYF>ic2|%$<7R!-awzJAADoCc|{!4?gJnt1uwMs4BtBSy}4cnh9)kYK(_HKY3tn(88bt*gd@+Vm8fBD=pr` z&G(=iFh|k~`mz$IO@dm~<0C#-6MZ@^8d+KOO(lkhCzIc9Ek+6qo<MH1%SqzP>(y0z$h{9X@GrYw^YvX60$Nr)^k50i>ciE} zX;1dRf_p=;Edh6q1z`G7S4MfMM-R~Z?M3cFK*?bXOZbtj)e*`(8r}#M6a&pRYsjg% z_hQ@94CTgHz&fmb{d0G_oa^PXYtFqu7L(^U-EUi1Vc+nG^_stO2jJ+ZHYWfX2Eb`+ z#@aInd~yS<5`kY3HBsSUl*lTJMp)%6(jaDh$FGJnH9Y|Vi>3cy453N6^Mt;B)AOs? z9MbYa4Gb>(R?}vF*@y)9GO1?G*~WFWsOu~=FXg+DCZP440vshH1CEVxyx<@?MKIrW zfz9Ab!JB|_ut#}t8$ZZl*hO%(CexZT<~OXt6v(~No(UH!9Mpfj`!2s+B*P;}IRF9rt#n0Js*zIx6#ZOSXNF{Lo1}s8@bH0VlI6vV0(^WN<`C-kCv7@_ zJaMo(s*gcH1-@27AJD-Q;7Y2T1_ru-x;S`=EEcJAw)DK@7PV)PssL%6(wMgjmDPV2 zMTACNqxUosQptxy{8W}Mapoa;-$GqK+GqkC!)!M}nbX?cHp@ZqeRZhzT(XgfPj6S3 zK$OlGR(cV7?s)_7rDtX#im$Qq?K5lLivo2p>$1*V&ol5qJt4#h=tj@o_V-F+fbutgiZ(W5i{a{Y2uwl6+E+VuJU>(sZuWq61}7v~xc4?taaLr#hA?Z*RoR&8 zJw7Z2yB2sMEKT*|;L7{?jEo2q!}hQ&qQKpIzUN;r(*ceiKlVNYw#>kVHm2})Mrhhk z1u&QUf&5f3W?WTSSr<&7LexcYDn!;B5un(PG|I3oL9?O2u|?L0Tk=XhM&A+<4w;NO zsPv3WoTB~NME{|9@oe-<$lZX+H3(YveOJnQe_T195zVq-b5JrBRQ}K zm|s(&yq7KthcNY4s6#&JIMf(V7>vQyg41OeWnZp10&whznhZ&?SGJh-sUyFIFUQ2{z*Fg-yLFT`2Q94Fm4qG w6P!2oibq7o2SU4O^R+!)+%4=Fe9tP+`ZTq!>{l0lLK2+OH8_!T%;x960qWE(KL7v# literal 26778 zcmeFZcT`hb_bwdd2o{Q!E*um^k4O>ekf^ADNU8BueN3A_)*e+TFqTz3=&*-?`toe|%$ncYOC`3`fXz@3rQd^O?_j z*4%6F1bbTx$!!YTKp>E$mF1aBAkbzs2(+nUix_Yu{Ayn#@Ffy-$>KDqq)TZQ`0LX9J(B4U0<7DAJ>8yq`?qbw*Ww<@UARd+zvoD?TEEzi zq%E~)MA~Iue0aWh&&^uHEzO@=Gwx-$$vr2th<)A29Izm$-VQg-08h_$znXJqVruL# zi!~G`?G+LS_Qyeg0<8P%=l6j_8;1h!#1c0CknkLm5dQK0#{WSFvL2AKCSImpujNB# zO1sO0y3-7?fQ_Djt?!-Im}&WXGvuYsGv1W)AWm9-#{rPi*An#z{vn7Qbmjjh#| zc(e$}@VtUfOrYtU+8ey_&2R;tW4&uu!mtB*yM9#t42w^)8fTmF6$Q{t=^VAI=E#Za-*Y9Aw0pUpswBEPxHRRx(x4 zSJ6atvAaVY$f2p%`0}ENewxWHkkIy`|y{g?NQIxY7;ft(|ULn*-r5;m}up7urF<$ ziVP%`V_aCOk#!}cha6eB$1?2IUbE|?IKvKoezwU%nbFvEKWdfjJ0F}4Zt|H6h|mpE7TP1)VdPE;Aw*bYuFNEe-U*2#h+>Q9~1AMM8{^38vgr z1R+x{M!~nGK%rQ#nu=&Wi7hfng15p#+x>lr-D(r0Hv7BjGpG8h z33OHEqBWx_|NRpQm@vu*zj(-6dWoV}HRdXJ)T1X8i6OMGs(j?Gt(W)d`zCXgSO)}= zY6$RB#n4LO1;3ecIid||k#iuK-5pH?i=5NLml?@qaIO3t#!)-wBZwDcU!{{mJiSu=cXJXdE;iV1JD-3Jp!8@9 z4yTlyf!6xpczy<1M@JM?^1d`aM$UgK!B{P0+5GXK)P|NG9T-u68HGPVac~Z8deien z`aE@YRq`XLrMuC`a^zVF#(EZS%UnZoYUrF~r*qf+({++tYqi)(2j;Lg{OBDO$=K$| zm=A@@`uH>te!h|*nUoZEpK4{+bt!qXD)L>DI;C3uW4L=)O*`dc@&Xmyns%GXZ-KSI zrjR>ScR@RXGFxRp$u8F%MC2^UKCSj|t>-Fw^$8+Q#EfTb?FJwFfl&t_Mzzwj{4=F8 zykD22mYPn)6}r^OGen%!#FCb(`c2N^(xExMdi|YIpDeFK#%e61qfaq?2Z9S>ntmoO z$`ok&6pymP>_B!ANJ+YJeYXNJ%-!!^;*&f2sG|-+mhysR*G9U0ohq(-sUksu!t1Or z)uNWd+j!?mEpY$KK=@4geLQPsQe}5IRTX)m0ZY*yESF>CMvlIkvadIaYe%WXw6~@? zM{atk&R!FM+bL%$dcIxajZ3yrVrg$n8kB!iuI9@V`cau2O&Fd30Ic;K6w@qB-@UvG zDp36kJjMhZImO~-Yjdr%)9QFgQ@2n>hE$tKrS87$gKi;GC z>D;&us+2YC5KUR~JWFJ$jPs{Zzmi^5EPK47@vC?m9+p}D#E@MiN4)!O1a3*UebWDM zD@#JVNN%oBJ-4sWXGlpabzS3=6+d5r=p*%r`JjQ;+M-F=EDDnAs^6xKjn>}V{I)Rq z_H*f9n7e~VVlS{CM-rWC;E}JU^j(@iKBoBP!*0u(R|Q8%^t!(oEMPkq!Fb$MlP~~W#g~Vf><4+o9o5p9SKB^a}=nn3^%W!$I9m+ zp;C27Rm`uIlJ$77j5)U3QsFKh*+(3&4juE4vASU7+r?_4%}=XAvknl#equERjJ&G5 z0RlBU0gg{+U4k_iMSstbPGg8%A!!?_T%ymtSzop#z*Z%z7!@TX+cTfVL*eU9a`^=d zB(Yfb@CR7)x56p=3L{WgT;Qti7mi||X`)a*a?Ya&{@O$W ze&vLE*d&9FTPWA!4H+%-CsitTc`I-nFEHpPh&0nhFRlUnSdKKvGaVP7p#EJ5987<` zSUViN{jE1Kgb_BgzdXKWe~$x3_5$d=+uI@#wL?5T@U*R_ZLgJAmwtC-r&i(#PC>Ng z*b0rGYex^hjoi!9gOT*Vc4$#TD5=q);c6UQ^s_#D$2<0tw9a?y^s||wpJvkfZY>Sv z!>h8hv-}k?xX~w2x>ClL z#}iO-mK5k{>0{)fpb99#|J8zS1{E-7cLH8La>51kE&AHh+9btUEja}ai3?A1FWiwp zha40PC+Ya+aE6Qs^FLFtMoL{;iZsCIl&h8r7#9jjL~iU!^AvY0ZeeSq4FWlW7(3iz zf@3#?9a*|Lx{?gl_7#g+0uWM|g1Mb0JH_A)qU_Y6xO@HrSHjb>%b zk9ZQ_Ym2>O^VdJqJxGsFAm^#mX)QcEvpdG#zX&YTxHk9J$i2kA8}&Bxx~osC3A-W0 zBe4l=maI2z#bbvu#SSsGP*Q1@d{D*Y+lh+%C2-pijVT5xxw2{NW^Ht|j<>UA{j$71 zouibmpPr@W@@k=TN=@eRP&GSW!J8wh@S#i|)aK=~`T04A?x)hZ?mdHhyg~~*s6V|3 z77HSC7C7<0R{+$EWew|TcZ%1iU{~Q+?=s767$5FNivFx}5)ZdwV0DDQ_vnWRFb;9@V_7TuUb_^w=*7P52P ztM9}>`EzN32fx=;Un=7bD9Q7)TM(8WUIU|;l$1LbEKs*HdZ3(75IKnJb-mVwR~-jj z?1n%mk=`zwZ$wAf?KSV>3c@5)$BB!5p*o;Pus#9HXy=SZEP*YLN- z%^sKm8<7p*w*3<-;v><`suuz^LJ4*Z19NvNk42GAP3TW;LIvQ$S0h({QY*Kg+-`}H zJ!!+<9Zj?dn84jVv1;-j6p++gzwP}RRw0-;Z$aGa`dUDB<63unkn{tcByy?kHAna#eXzHK%_64lKCz+F zQsvU1ui8SdD@0(@Y^R1preLWoNA?Q3=_(rB{2ol2065GXJd=dghMYRQ7?ySAiSm6@ z7fwgqyTGPu5&zM1;4B(*XsVgB%$$w%Wr_sV(;E;{I@gonZLE>i*wfc@AYu*VV9QHT zWnv;H2U23SyvC-guyTi^=yR{knb@;aa{6&PsO%}8bwb2BemLIV1UKe_?|P1R2YY#w z4k4sw8J47O#T&;jOQWe)O$%pjH7*4L^n7C1_G=h*&XAX>6Fv=&{eEUdrb$ik`jO?R z>vafUk+l_Mc;VV*5g<8-F3d8~F9^Gl`#E6upJ#O?vfOVBapUh>E+-MlI(&$rHl~Ev zy7ep}M|T(R=6qg+^OxPB*?ZB6r`!-tmP8Md5_e%lf1)W=ZP80fRHriegFC_ragL^G zXJ&E@kNOR*tvWQdP2=A$@nV3!vtND_@V4P|g-gW{&BNQLH5f^)dc~12a-5c%J$;mY}McsCpYqH}&qxVZCcumGyc#b-$*h<$Wdnq~_|d zl2oW9!UIEqh4GYLswb0AP_P+8P|}XDbi;};A~katk5PgTg8Hk}q^T$Z);2rhZ4rX; z+MzIs)}E$r^d1kTM7HUHYFe+-c^2Gb(~Yw5O%HYNQMb|`cPBmEterD7ZiS<-j8~6a znfYnu{7l_y6x+O1<+A;pCb`PmOBcU#V2SQ{V%@Y(y}T9=!-pIQ#BlFy1u1Fj>3}XA zh_%&uZ{5_PYMwWwAK6svI-f_^)~ilbK3XEnb3g;gd+DD9%R?o(ku?J&mVLjxY8`$N z=;_Hdp)2Mg6LU0IYiRieYGTV@qS~lCn@5Mdt{W)lnMby(VKM!e+gKQ6D4x!o+%AwL6(Klw5qLF)4K+uZ~ovEW9J>pY?!#VU`7j!*ARuUQ!` zP%#M~S| z0th6g3oL(u&kgN=4*cVf|6Mq|h^#ScKZ|a`)wR3W?LxIT5e4E4f+OG3ZZ#vzML9tD}GvjXyT%Ty?{wQ|R zx(Yz%uMbZ-MSekNj*u`D&&S5qAQ7oF+f?QB@T?a$60r=0hf2zk99q zsa0pEj~(J|i=rW3jhxgj-szHHa90_z>qgxrGtu|uiCA{GUFu-ljL34LLEU$?z>iju zzAvEVz~{DWww7h+!_41VHaZ1rxc7{5`3GF?SI8NfFJ4sl zHo2NSX@d?|_QpExUP@V`#^94Uu2uKo1v$iQ)sQo{_INvunmk*u9Hh()7pxNX`R zr%5;Tu%W)=4rzG-Xw=ziRR#>3G-=>KXTJCYS?K*>T&YxJ5pPa-__XoJ7!qFVaX{s*a)$|P)*#6}Udf+aDLIVxm%uHky+2-HEEeNI)JHv3rImL~OR%ku z#1b@4XSJfGMhv5VfyAR`nZHtXk2BpI*H?aD7VK>H9LYcBqei|*@R@NG`@_z#9owDy zs6v~GpL&jr`VFSzXoEl3IMmtgXIOae4oOkZhCM8~^jxIl$($T0*$IsLj6ACEI<4H{ zZ&;l`iM(LG7OufSEu8T6-06PuiPVVPlS!}ieSM|%)0q3aA7teW^%D2T5>B)R=t;JZ z6COU6#!w~B`aOf_lZy`}Kz_+cPL!)HtcboGeZ7Ui&{f($c+j!%N;4>+Gn4t6t1&&Z zGx=AEFW_ZSZFmG^YJQ zt7hB5IXDl}6f=BY7pv?a(4u%!r)(jpuw{s&XdbO*6M21q(3qxn$-j*Yf0RA=$%FT) zHXM$zy`A_iiW#WmTNobEr{JX&YxubD-o6CbYJz+Ghm&fVi)#FA%#nRKnVq6_a%~I8 zSNXA)HG6^6kEp~K+`H0m&mShh?;KXShPSByeeLkQMj2*HIYv4K-A1N3G9YSlRT4V2 z1XQycd5aYk)g7>SAbV>{HL6Mts+*Z03u{Pf!s$$S8MQDa$}YS~7WwK}MaZ*dDkguy zx6!^^V&U^g*Sk+RKWy=tg$HGqv%+3;Ywq=#YAjl>XS(UOc1Vv$|NIPTwwI@=(|Mj` zvGYve6z8_JFY(qqPcntlHe|P7!&ymscIdWLv%838`iheT<6A)gc*(u1=SMw>Iz~c& zBFVnSyR)dzZ~+eu&ZKhp@hl_zZl)W?dXU!qv&u2J*}kVPK6t>FzmPvYycb6reA-fTOetB9%_syXT zUl_X2^9;uYY21Bbzx z#ktXjS%{~HcWn#&-hwVEUo9ZThnR>lfb_ctq~8-(EFt0wA053E8I6fX z?7{6D&e~f*x!SqACL0rwp%{gXv#cl`f+DU~x#=dRNatmW`|OF_6J2krH|WA}zmPyP zfROjEq75c5p8Rss;87D!mBG0&bU_n(GZPb~g!cqbjIl0iMVOr%cU-Ku1y3X|jELEK z(ETOY@P~LYM%W^?uJH)OGgIp{Y2rT3veD7UB*!EBQ_Uj-w-EpvSa-<_39_|Io>%$N zyHKrJm@26xtpQz-QXV%15v07gv<6t{hubt-gCU=%9d%yVl#b=0;?vGBI`T07x~sr~ z8gj0Tt(XKb%eiRm1!G6jLxZmU*6H}_hKW|W;ejm{fm1d?jXnb>0APQj$GPcRDWPU- zXRciV2s+F>%v&msCHac!0hY-rEN2;9k)Se2@f`7pN0nw__`u!%G5IhCwA3d}Iyz4? ztcfkBmr}hDnFgS5B}MuxI)T?lt)wA99gpV}K*<-us5>SH3~|vEe?$Fgi>1uEBL8?8 zlmBv|8c&9*u&*EGlT6#&$}-NziyG~F9r$yNx6DvUn-N8S8;m0Fz>djX@T~@nI5Xnk zQkJ16Fb{KS9ySMZPl{!9^f+XS1YUOsVE>ekq@W#?;=)CqVz&1DsuIX8gstxDUo)0-_v#qOw(>JX zCa)ML7lnkkWORC~z|=kE^((fpO9}WLudNY>#!I@*yApLWnQ+DeH6hPin0Bj*I=+Y6 zeLRSPDbhuu*&!IMLbwbnnzJ^*7y9rFmM+&ei7{(kdRQUa8(2=0jGvNkZs?jL(2fm0 zfHP2T52=+vLo0i0p64vh9B8HYTEcP)Jlb14$V8rQ`!bYIX zer&RwRb$6@?sI9X1%SFkJiypKEPLNmOjDf?=&7s+=39Wobnj})RKpbjeDTq^Si z>0|V?gpej$hrA4xy#AQv>@)Ty*WgqON3=TnO*xQwkjH+j%Ytr1Oqh24!3hte@ka%Yw4$@A9C3p3SX z##(J)@hAjjq*?`_&V1fE33NjD!}ECaehU=>D$iR{Vjo}&BqwhH^^1_GGVf2xUB};$ zNS#98Zy02@QiQ!RN+;x`?{g7MsdG-*MRD4=Bh`hMna_ zaUvXHPn%ebcphgXsK%TLW?nUAZeJAAMO(N zcA*kZYPc)}O(iAXjTx9o)fQw8o5xzQU80x(pUiBPODJqK%6fFVlai9a*$MSg0HQy^%8lSCrE{hCw50J=GjaR--sVmP z817081V=waQ9sF!SQ6d!SNW^n{H0jn_OYK2bUf$}LuIzb=a!{f|FV%M7`>kAWWBiN zl<-rTF*SeQ+Jz595oJH_9=?ipD8{ z&KKpDDBPrKOAPLiaT|X`Ub;h)6cEe&_qMH?!u?Da3n z7tqgZ__`zx4{=BZY^SQY{Do}qxxHGwz1`Tl*?ymhb^alotSu zxvVq)7t|nTzzIsH3u99 z7uwh@eld;>3q6SS_d3!1t^kuasV~6>l-UIJ=Z6R3cA5Z@pc=zDhm@ry z1%dGfd&lJxa+%(g8}Y5`EWq#j9qRWT&|cC5s- zV@^0#JGsH|z}L!N9VKsN2yl9QeIhAQ_I2PYqCbG5`x~GUptA>b$D@)$w0P(2`il$< zbERhMHiPcSmS*?W%ibUFizni}RZ`XjYOb$dmExlhpP^)Tmonx}L?h;Tk5nV?1xLja zlpZz8^#vFvv>9r4VC0?Ky zWe6zL8(SsN_X;e5#@=hQxqwi?3=VNbZN2BeeIMf7@0HhY4u~bZzmz{M1G@3NJgyn& z+OXiq_j#`&iDqDLf^|xcGbqNbO<4-n1o`^p$M@lEH(d$f1dX$iej=b)`HjwEE-P$& zzX+CwSQ$?tjj-B1KraWwNmjjqkT#WhK*WHoHZIWdjXmEA-Sg<))ji`C)a|0c*g>Gf zXYaU+#JFjiTCG27u^#`|QPA@zZo0yH3h2IYrv&iPe*S;Zf%jjcI!j#`XHgNu=kx1L z=ZLP=MxS35#O4paR!wosD2jcdB-{~XQCe)Y>&?NS+YK%$*N(?kllHzj7;s$zEi%(> zrGCjLnV+9V5M3HXy*=|sd)+3?eTCF*d9i0=Zw)H^b{D9G_CO<>)Gm1>k4&Aq?epZ! zvrMN%XGyCE7tQxKANP?wWiPRFh<2(x>Uos1znviiXu;Ai!f2MMGpRr%bCm)#Yc-o#8@_w1YS}{tTuLBW-R0gkWGyt z=z_^#k--^r_(4}!c@6-roYGS zqWPWI@<8JofQ>}_6vNv#FKWB^G|g5au(#dqi}>%G5~HBI`P&72$?UVEE4CN;E#)nn zzD%e*+i=DHJ2Pc~EBccZj5m_PgJ&Ap2NAh}+PoqXSeItIECPQiy=D6^i>7blNm8rJ z$-M?+Jm+rS!)9;tsq=PXf!W-Ig9`>@w!~7a7Pv2#HZVFJrpuYgc^a zXZ1%?v8)qApKugz^*GHxy!%%g2Ls%xY*j^UR;%`DP!W7}61-g@n(tro*#%+bt3bja z?wmN&Ijd|E=BzO9`{niWVxb;UtEarF|BoZD$;@w`<)wCnM;tV$ODmD_`IIZMW zte@?O*Y%QE{eF9|-j)6yf)yvJV_?S~FPB6E9snuF+bWM;(@kbutkhwEkq>0Th$3T+ zrc#aD7nfkP``>%Q+%5&4Il$Kw^krYgEpg~0_0g7r_?67fDVjbUeppjlWoa!nlAvD2 zwaSZ#@uB|i;rs(n<6vy5yq%a;!5ZLj>dE!pb+Hyd(*8(5IXq)eJ>>)47}p?b>Hf}}Tt z+P+Z2M=L9FPuG($C`q;z&Rp2X zXmLLM-=Xj6Qu6~^H&k{EuPB% z-We*JJE&1Y$;u z23)X99|y*;yoTAfWV{QfTsIA0j9Mh_9SN8GuTR1?556PXxxh(FTJaln<6HOGkJ{2A(C>z>WvtAQ5d zQ5R}~C$wRI)lDf_&CyHNUu%CzGYo-NP<=1^(49S0H)jXwbriAEZ+FBee{$LS2t9me&f0J3X^}X$4T@o{q*(;h!HoHO zSA>%;lv@DB){l)X0%dGWWC)#PTqs1_?R|Pz9Qu2>7tKR97O?r#TR=m0|6)Owv4=i8 z#h(X-VndorM(Gs9jg?z9jSK6>4VheLGBDx5w782wR>Xue&4MPaNcYYIL+q?W&XhevBR{O-?QuEX50bTttD!Uxb#ct-WNOKapXu)Gw5o`ngj9qpEg7V>` z&P^eY(_ZJ+zl@ziDg1GCW7TS=0(y^Fj|s^NzT_ZW*OuyD4a5_1iyV~-&3gFeoNXNX zDD7Tx%~*&tA)3gflwq6Tq*c zNEFUDXCmy-HWTvZ^+iln$BRRd)Eu=vYc|43qsREp>yp>G?7Y~y&%))nBSd=i$IMZd zoMt-*$eP28A#ECqiO|)Q6T#2JXk>|8gCFPd_+pd*b@1;zO`CqYp&n;M2jwe- zqIcK=ScC(CG+;MutB7!RsexMtvYG_=RN>@W42A_9 zJYYe=CPASEZ@z9}e}o%eaCC7=SU1QG0YZGyoC(DHsj&D^j_|9S#emAO{lk%uO! z+l=;xJAXi390k-BextDR*Ac8R-*1S{Wf9@k`S4ZV$YbGpi6pFLG}%&48&~dNE+D^8 zIxLJ$ooLOjCas8k$8RhO|Ju~Q>l}`+XjS35E~SJ9ETHr&5`+;BVz0;XTF9HcWqdxD zoW4M;`-)^!2I;FON=+(j`*^FGy@U<0)VPwy=+5h$4F|6TefYO|%WwjG#%DD; zNOJI=3Q0;SY6TqImG4|Ba$L!`b{CVF1bJe`&EiF;Ua>y@A+{US2*m z7qPl`ykyg;!)RcWFpq;+2U8b4CTwLPR`)5NgiH78m$7s43dRkubB#B0rkA-1H2+H4 zP*y#=fA@y92OmxeGj4j@@m*)-3Cldh{(mcX~s) z=l)Zb`oE$q_xtkC@%_(@D#uDJk7byX79RHRGSvK0c=TdMzJc9Pf7d@F`Z3RSy*fzx z_Y3IdO^pl3Gk(_MeO;HsWGZB8-MKyWI(P0aU7d2p94cs9NbmTR@dhY~c^3n-edx;E&Obpg6bw9TFZx z5*ONyB|*2|oii`kV<3?idqb|-^Tv7Lio!Ipa&2Yu&r?GbK%Z|uiameCPwt%L2W_Cz|Kx2S$o`Pei7V#=o3-z3iPiBHE4-O4 z7IWMwFZa?z#n_AH+DUG@+6QSTKu_8gB%fXy-7proiEzZ}mB@<=gSTHl8IS$Pw12$z z57z#-(%|Vsj?MnNe+chmu$gIRB!OF4mo0(pvX=ppaE_6dze#rIPNO0&!wS^)EXM;B z^Ue{-#4xk=v%porGuPhtd>gKxS)bNd7m-7slM&{#SWIkqMcbyWpviybJgDae@bLMq ziXRN{&#!+x@%9TysY<|B^VXS1`$M*Z0z!K;B|uq^oU15bz5r%jjz zIV?u(0vRg6yZl10>VlrA785}4hv$MqD=IQY42}Q(@cD*+oqeFV8#tR3^5g7le}DK6 z%*()}NFMY#b?`Rmg~X3vF?qz$jjLX0cs~*YeeU`3>+2cBkE5pE*}%~h%-H-}Ptee( z?jP2v7x#fq8Ucmz>;VZ-hT+D5><B|J06%4~|L$$p7%^gX!!GaOU3{!)cI zyxNgJx^X-AjWK8rcw>V7ZnGe>h!(99?93^x+qetQWX<&V{84=4?9EJIn+tF!_fGF> zz3Z9JTkKz4c>!T-?#%c_=5&mQ`^J?OmJwe(%s*&k?eD{%-V$&@c=}5(nIl?}zK5Sb zxO{Wnaf?WDf}8G1o8`{^lV?$qn=1kyUQpSt`d$Z^qF*QEIOR9al;_@%u}zuvQ2oj9 z5O7af?~88Y6QL2EACDY|Yy1wvx0K1hI27rb!gz^~{msenY$58wj<3%Fbl%Xe&2+6}yUAaf?;?B_&f#ciJ7_GEznG4}s!&jvk-rs1%`A%tmcStL!o z)Vrzi7?iDxtd1n&!438EpSz0}xgS~8eg~R&p_ZV?sn`K=a0qX%T5F9t2=h$%Pq0nT zFL&N5e4fMZ5rXEyu`F5sN6uBPXeQo4h1)-UwGQP9Z=Pdm@;c}6f<6o9(y&1z!p8^} zv~jsprVGCP{5ryK?c<}OIQ}{`Cyadw0P%Zy;AvU_h!Ia_GCG7B5&N4=7Y0tR+`S&0LUAP{(voNmswE8kwP!< z2>||%BHO3a1r=eXu6%We64|zJJmV#j^I>pd+=Uq9l31XX znespiO^-}X&z@k@1fn;*eL+XlaRhG`= zl%&brcc~dz{appQMYTmG(voGe%6g>^1@6j{Bng~4nhuP-+Ki-X5sBVpyyu9Y)>!ux ztDNqY2Ju|dJx`e~!D~?bhr(1IIvJ8=KbEKl0gt2rJKCoML3dtwkw-8&PTkkfj70gq z*y2?iPOa~2)@x8VJ$*r0@$h+(?Ox3G zrNKh|hV zG${o}ZatsJE}1OJCnZDE&f{#;a64{$Qo8?GV8BuBxu{|9MRT3)Uj0K&7^Uss#O>bk zKK{C4%4gf$=BfV6db1h+$vNz)N*C7)-O;xt&;TPyqdiihfRu%*=iFqf_g2~j?d;fH zlLEd8Y58prXKp>K5NuZoBh5Fcz-7DOC@WoWjvD{dDUyoE?L)W)6Bh<~1!s;Bj8s!z z!M@E$UXX%!+6JkNC{uOYS5L3~p0+G+%#oA)8?S$s*UU<(hH_@klg9g4?FO3u;J{Uv z&P?wHLd7-1%ZnU;a4jMwrKO>?p@h=75G*qu>Bi0x8l$6BjNS?LeX)n$dqbQuP!C)kH{(WKC*}CSwrfB3cA;^vr;aG ztYfEPiJ=(vk!p_V>PPuRa}0FrokJxU@>BB4^XjqCb?k^A=fw8)q3zQf{+(WYQ06n^ z`zPX90TPq(r^M8rU+3n1%H2L)qE6t3l4L4ewmXo1Ga3At;om@CnmIp0FWKx#fz`OM z9*6ZG@X*RiF{d||c-$CVcHV+E_xck^M@R5;87rM$nFurefJ0s3-;(mxd%nlA5Roe| z+%lh8o$x@ji8B=T;e4V8Y5((_C*~w~nUNe{%<^YcrK|qb#|*48tAXuwX~~Qim)3fq z8if?h;2L~s3`|aBf}M<06dHylrX7baFt&h$Y}Cr}de7#*yQ|s8$UlU)2jg zECOC>Bvc>WqeJJqub-5nmEUvPTNZF`k)N2J!`WV{D)VUBLW+U=O%V#2Xg3n*rPoA% z&0Lw@-O3+NU{M;WmuVd%G8N0RUQAj6M;7X%+49Qir%lZ31JzNAsR%t12@3{VfS#0&OyB?ZZY+^H3NRtuu55AY61)Iu% z=i-GjsAknM($kEYF%@j4ubp^Wrt1lwM?qHcd-%(0a_&1Vkvi4vi5hyl!7lpfB!|;v z4XHrH`BU6OIRc&;EiAS#go?t03O#$b|TU&}K@RdP03a^UeAy*q5vREHq(!f*0 zVWe5c4tmyfdI9F5CNG+?P>fIn1p(=Y@_JH}eVo3ek5tIK&D9e0vu+HcHW=@K8Qm=U1(u(1-jy*vc+_|mfJWF1fr1c5YS4*`XRTfou@bVKJv zImliUC{TbviMa`zW9|ZFKM=@K!bSu1qywl#g5JB|b{BaetXYCUGUmItZ&V>bpfb5k zN6_JPpyCLMY3=!^>3Z?w?I$lTMx;i+Xgpee3=~i;thj(ct+PL>Dla6wVL*b$j4%JF$k@kL3U|Yw zObN~2sCFE-xP}2T^@Zi1%PGLy8Qxa^sC(S9@)0KWo}z_$PcJ>ulTN(~KsJNUcKoYI zf(Kqe1d2KP@0!VvpRMt_nZlyUE#aFD0dg2m+PF3YSfGGF&pcbd40C5hUfdLJa0gje zWI*no(T7BW4g+r}1c;*7cM7GHLO>~l&TqUNv+M+#eZb--GfzAwbz>*L2Emj6Y3E;> z$QhZ22-pL!z$Oyb)`1gim~c)~&g z-3`2wP~=6xY>4n#2bmrhkVjd(X#zUza*YId zLkGEkqA|S% z!q-{E6byB$r~~hxeU~qG?vEmU zXYJp0(IT&}{Fm|c0o3r~k~a)M;|6-$<@D`3%H(6t|Ji0eUo7MEQ3Id>fEk{i_Yr2> z26R0s83YVxbb3&b{4MBn2+^emtHJ&#i!EF4^a58@5rz^tJ6HuaqnKz?Q7JYuq*>Cy zSJMo7U4}G4tXm!NaWEigj)J8hFQHG(nH}R!cyI@Tmh8IV*1msLHI` zAU1)*C9K?P-=LU8D0jRV)@C~z7lvhKqn#U_B@;U0dj%?3>2h23_B#O7X8+6BgC)@r&Tw~$7U}~-nBm189`@*l`F9;xWueha zgZduoi_Jx@D}NA{Bh0e23MeqZp_@86hJ82zxi`?V+lkklDE!qz%rf|m99N39jfQnb;B3e-%XVA z=Sr_axXqA8AQZC-y=_0Q&DtT?2diu92(YWA@C6?O=PWu4DPTDOpx#$q!d$~c5Io>N zZG-+UAX#FifXU9p`x8LS!PAVRIL1+0M{2cOP?jXTG-}L;78y5@9M(u3>kz9hN^`@JUzXOb)drvER{bZMRvLIxhe zWtq_=vG@)=ml`}sHj5=7fq{Q5(hzevv&T~ zhEVQOGpmUX2ZBCh0jVcDp!-J80maah1-&D{EbxOOXBG6J5tC2R$5wp+`k7FbcH#*U z=9$>c<8}+UgZy;~Z|j?Xb5Y2^um8H}tBABCe8ya5#5b^3w(;v`XAbZ#rI?rb|4Dn@ zfigCqg%b#;1Od==wx^}@{=YyX$&Fe0S1;%RFTQ0KXaN}fzy{{LclAKh7(|T?Ha=Rr z|C^9Tr+WQ>>HEqr|KXsF0%ocQ)pde>rvP8VJ2b3kLoX2z%{LBQ`p%A znX$jI7qjx#3kHiC8C@T&ac!FWwRB{j?Fp+{(t|Sfiik~%A?RcEfPVNdAkG?&4$2yq z05$!Ib*Q>%|Kx7KkK{iE%W1vL=sFOsBB2@x05eihZ%dk1M+mMpdj8Zr72eETJ*|Xv zeT48A3cK7~RwvXs|HV;nVhPfbJ@>CV0I&jL;&QkB;NL`UGJ~M9_Fi1yS!r>zR``cO zJ}~ANhyTQwLe^krbidU?c1MvbA^}WSu4iD_89{6wMZjCRWd-m!4acWBbVm+WRF{NV zE=Ex}ehZ~OmWs$mdKi)wR#U=B#H}S3S!*=~SG2PE3@yRkmDKdcn>1r#k~$cS1~hvn z!d}%q0&Wrgm74kUUXTW?saReOj<-;wDVW9ZXE!>Hm=Bip2Ep+={UG?d~fN{ z=s3ZB2Y2}u1nxs3jZW#)P^~k&R77_*)40YcB$pZ{g_dsmJ8#*l99e2Jzy_|kP*z-M zs7IC&ONr1%tVSJ|(cvKYuEKBrF`d+E+30NH*I_ty#V{P5gZ1ZKly~8OmlgzsEVat| zyQqT|)UpX<{|n{QwF$*l_eB18UO$wp6!aoTiGFG-eOp(V8@OBN8XbA_}@YC?+O1e$=y~K zaqTZz04P82zoz5=)M@{tn{$t8>Wbqy&M+|ujWZFA!|vg-W$HRc2FswLQ_^f?>cV1G zz=B=y0d0r1B5f~Kw@Kz>^)(5wfzyyJ=_tBNp%i*ma1{ZWnp@CPt590FP->~S59+<$ z?`kj|+y3*9W&N``=j36x#EB^qs>=XSOCVt4Hv zf<;|L`=o_2ki^%7@r9txK8roPO4W-}go>uI_uh3MUlQOKKstRREUW?itaQ3SZYLwR z@hj1+Q~LurRIfUtiQZdSA_aarJwm7O@afQGHu-5ulVYkQK)aL9h%>vxLUch=PnCb; zQ7$@(RdG;D$DWAw&0#eZ_FJqsTQ>B_?TOr;k{e>_kg;^kxWW1`#(KU%sqY_pM@852 zIFliEzCai6-_dG_YAZ+I1hx@SP(!pf4VXV_oSfFQ- zw}9{ob#V^+(NByVHZX>;^~VGc?Z1-Ck#U8VGJn&NH&Y+Xb_jw8;#zWHXlsFIxG_by zg67MTDZZ?LM?T05`7zoWEGD`CkEL`pn!d8gnKYu{Q0zpbUj0P1uVowi6+j}FT*y<5 zipV;`xUOCB_!gLgFBg?`;%LYhg1?kFbh3CP2~&D3r8b$tAv5_d2!e}5Ek*xgWM=imsqR{`eWj06YU60V?lZI4+n>63 zx}toGbOfKP+}nPb zHNe_p8ChGrne0>qSiR;?onpXGyhthQ*98~phR+_}z@#3QC1<^Cw@uP#Y=1_5-k5P31md=B-#LuvVu(^(uGPxK`VOaEE<~NQJwgBF&Z=(1}Ksq=0FZ5{xbOb z+Xim|>g|^pY#D|xh$Gul`4R%-inNt$=U_~z&O(dB|JE^>XsKErE8d0B(!m2K_f$I6 z##GTRu7YsFKF<`%$&;Gp6){=IcE1;~9o0 zqBvbovs^Y}ZbZx`Vt@e+iDzC~a;tLI6v|ZW?1OTjwwD0euvL?;aC3-C<~cX8xL86G zy&~;)-;H8}n25K!LI+q^o9#OuqCr}?E&}tvj9^nU-y>Zleq=HV=#JRM|b6Jgoe^}0#a<7Qo)CpoG zGxqwEa1n@P<~rmmb5cLvJet&KQagi9_YXvytQlrl&X`8IRU-dEQD3uwW~Fjd>XbI> z`n=7aAikUD*#y6o+;=_ffhC&G2g*u^%e3Bvd`M0|JL8j#%%~Os4@^pGt|8;%8cctW zP~Cx`n#TG1{dPeHz*V4F*A#t4ZT8PoyC05tM#n7KCny-aW5c^ zvFiq>``7Oal6XL;D#arubrXk(axBr=PGoqg{g?dL4jEJJ33c%LyPfX`3{;3+v42z6 z3;BI=IHY>;acV31+5Ak~YKUz-n&-b_H{C^`x^80pU{)*U2Q+CxP3ty(@wd}8GT5J= z{amHJJ>Ip~hyy(ub*sd-3rghIJkP@EHy#}=q*KJp`SNn4~C z=@w>7M`~4cSyypV2j)5^XvmR(%q!I93agmxh*MqkJyz}xxJT)b!%<}+6DMo3kum5V zUG9%MN@pBc*8JSBt-^1 Date: Thu, 10 Dec 2020 11:13:15 +0530 Subject: [PATCH 003/161] Update index.md updated per 4620497 --- windows/security/threat-protection/index.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/windows/security/threat-protection/index.md b/windows/security/threat-protection/index.md index 88ac6667fb..95b12af4bf 100644 --- a/windows/security/threat-protection/index.md +++ b/windows/security/threat-protection/index.md @@ -17,6 +17,10 @@ ms.topic: conceptual --- # Threat Protection +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) + [Microsoft Defender for Endpoint](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection) is a unified platform for preventative protection, post-breach detection, automated investigation, and response. Defender for Endpoint protects endpoints from cyber threats, detects advanced attacks and data breaches, automates security incidents, and improves security posture. > [!TIP] From 0ffaae4be566479e8a4b0ccd0e2ff6066a0f1bdc Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Thu, 10 Dec 2020 17:24:54 -0800 Subject: [PATCH 004/161] enterprise only --- windows/security/threat-protection/intelligence/criteria.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/intelligence/criteria.md b/windows/security/threat-protection/intelligence/criteria.md index 77a3c4e33d..277e105a69 100644 --- a/windows/security/threat-protection/intelligence/criteria.md +++ b/windows/security/threat-protection/intelligence/criteria.md @@ -171,7 +171,7 @@ Microsoft uses specific categories and the category definitions to classify soft * **Advertising software:** Software that displays advertisements or promotions, or prompts you to complete surveys for other products or services in software other than itself. This includes software that inserts advertisements to webpages. -* **Torrent software:** Software that is used to create or download torrents or other files specifically used with peer-to-peer file-sharing technologies. +* **Torrent software (Enterprise only):** Software that is used to create or download torrents or other files specifically used with peer-to-peer file-sharing technologies. * **Cryptomining software:** Software that uses your device resources to mine cryptocurrencies. From 735f6e91dc6d2ecef819fec41d5078cba1339326 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Mon, 14 Dec 2020 11:08:16 +0530 Subject: [PATCH 005/161] updated-4620497 updated for 4620497 --- windows/security/threat-protection/index.md | 1 + .../microsoft-defender-atp/access-mssp-portal.md | 4 ++++ .../microsoft-defender-atp/add-or-remove-machine-tags.md | 4 ++++ .../microsoft-defender-atp/advanced-features.md | 4 ++++ .../advanced-hunting-assignedipaddress-function.md | 2 +- .../microsoft-defender-atp/advanced-hunting-best-practices.md | 2 +- .../advanced-hunting-devicealertevents-table.md | 2 +- .../advanced-hunting-deviceevents-table.md | 2 +- .../advanced-hunting-devicefilecertificateinfo-table.md | 2 +- .../advanced-hunting-devicefileevents-table.md | 2 +- .../advanced-hunting-deviceimageloadevents-table.md | 2 +- .../advanced-hunting-deviceinfo-table.md | 2 +- .../advanced-hunting-devicelogonevents-table.md | 2 +- .../advanced-hunting-devicenetworkevents-table.md | 2 +- .../advanced-hunting-devicenetworkinfo-table.md | 2 +- .../advanced-hunting-deviceprocessevents-table.md | 4 ++-- .../advanced-hunting-deviceregistryevents-table.md | 2 +- ...ed-hunting-devicetvmsecureconfigurationassessment-table.md | 3 +-- ...-hunting-devicetvmsecureconfigurationassessmentkb-table.md | 2 +- ...hunting-devicetvmsoftwareinventoryvulnerabilities-table.md | 2 +- ...vanced-hunting-devicetvmsoftwarevulnerabilitieskb-table.md | 3 +-- .../microsoft-defender-atp/advanced-hunting-errors.md | 1 + .../microsoft-defender-atp/advanced-hunting-extend-data.md | 4 ++-- .../advanced-hunting-fileprofile-function.md | 4 ++-- .../microsoft-defender-atp/advanced-hunting-go-hunt.md | 4 +++- 25 files changed, 39 insertions(+), 25 deletions(-) diff --git a/windows/security/threat-protection/index.md b/windows/security/threat-protection/index.md index 95b12af4bf..ec71ea8492 100644 --- a/windows/security/threat-protection/index.md +++ b/windows/security/threat-protection/index.md @@ -17,6 +17,7 @@ ms.topic: conceptual --- # Threat Protection + **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/access-mssp-portal.md b/windows/security/threat-protection/microsoft-defender-atp/access-mssp-portal.md index ccf8b5f19e..fbf257989c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/access-mssp-portal.md +++ b/windows/security/threat-protection/microsoft-defender-atp/access-mssp-portal.md @@ -19,6 +19,10 @@ ms.topic: article # Access the Microsoft Defender Security Center MSSP customer portal +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) + [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md b/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md index 94849b6b18..82183d79a3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md +++ b/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md @@ -18,6 +18,10 @@ ms.topic: article # Add or Remove Machine Tags API +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) + [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md index 725daf0761..27f674d82f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md @@ -19,6 +19,10 @@ ms.topic: article # Configure advanced features in Defender for Endpoint +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) + [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-assignedipaddress-function.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-assignedipaddress-function.md index 46e60648d1..8d07705bea 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-assignedipaddress-function.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-assignedipaddress-function.md @@ -23,8 +23,8 @@ ms.date: 09/20/2020 [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Use the `AssignedIPAddresses()` function in your advanced hunting queries to quickly obtain the latest IP addresses that have been assigned to a device. If you specify a timestamp argument, this function obtains the most recent IP addresses at the specified time. diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-best-practices.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-best-practices.md index bd47d4a12b..26e5735a0e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-best-practices.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-best-practices.md @@ -22,8 +22,8 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-bestpractices-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicealertevents-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicealertevents-table.md index 51940745aa..6c928af6b0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicealertevents-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicealertevents-table.md @@ -24,8 +24,8 @@ ms.date: 01/22/2020 **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceevents-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceevents-table.md index 82be65bdc4..741d129b8c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceevents-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceevents-table.md @@ -23,8 +23,8 @@ ms.topic: article **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicefilecertificateinfo-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicefilecertificateinfo-table.md index 20c0ceb254..af0c2d9cc4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicefilecertificateinfo-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicefilecertificateinfo-table.md @@ -24,8 +24,8 @@ ms.date: 01/14/2020 **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicefileevents-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicefileevents-table.md index 2a453a4169..34fd946be3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicefileevents-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicefileevents-table.md @@ -23,8 +23,8 @@ ms.topic: article **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceimageloadevents-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceimageloadevents-table.md index a00c2ef094..42da736bbf 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceimageloadevents-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceimageloadevents-table.md @@ -23,8 +23,8 @@ ms.topic: article **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceinfo-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceinfo-table.md index 8c806a1b38..d89aa0e8b4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceinfo-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceinfo-table.md @@ -23,8 +23,8 @@ ms.topic: article **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicelogonevents-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicelogonevents-table.md index c04883052f..226606a824 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicelogonevents-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicelogonevents-table.md @@ -23,8 +23,8 @@ ms.topic: article **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicenetworkevents-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicenetworkevents-table.md index 467888a9d3..d9144c9385 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicenetworkevents-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicenetworkevents-table.md @@ -23,8 +23,8 @@ ms.topic: article **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicenetworkinfo-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicenetworkinfo-table.md index 48ae9ead1e..8a76da5bf0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicenetworkinfo-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicenetworkinfo-table.md @@ -23,8 +23,8 @@ ms.topic: article **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceprocessevents-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceprocessevents-table.md index 921304b30c..4675c8dc9c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceprocessevents-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceprocessevents-table.md @@ -23,8 +23,8 @@ ms.topic: article **Applies to:** - -- [Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceregistryevents-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceregistryevents-table.md index ec6f722e98..7f40b5a969 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceregistryevents-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceregistryevents-table.md @@ -23,8 +23,8 @@ ms.topic: article **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicetvmsecureconfigurationassessment-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicetvmsecureconfigurationassessment-table.md index bf6dc4404d..cd04c2eb82 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicetvmsecureconfigurationassessment-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicetvmsecureconfigurationassessment-table.md @@ -21,10 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicetvmsecureconfigurationassessmentkb-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicetvmsecureconfigurationassessmentkb-table.md index 317e6e26c6..d3b418fa4a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicetvmsecureconfigurationassessmentkb-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicetvmsecureconfigurationassessmentkb-table.md @@ -23,8 +23,8 @@ ms.topic: article **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicetvmsoftwareinventoryvulnerabilities-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicetvmsoftwareinventoryvulnerabilities-table.md index d61956dee5..0526794af5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicetvmsoftwareinventoryvulnerabilities-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicetvmsoftwareinventoryvulnerabilities-table.md @@ -23,8 +23,8 @@ ms.topic: article **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicetvmsoftwarevulnerabilitieskb-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicetvmsoftwarevulnerabilitieskb-table.md index 0779d7d929..402c38f55c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicetvmsoftwarevulnerabilitieskb-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicetvmsoftwarevulnerabilitieskb-table.md @@ -21,10 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-errors.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-errors.md index ab53ab3585..a488b05972 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-errors.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-errors.md @@ -23,6 +23,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhunting-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-extend-data.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-extend-data.md index 60566f53f5..30b940e472 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-extend-data.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-extend-data.md @@ -23,8 +23,8 @@ ms.date: 10/10/2020 [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] **Applies to:** - -- [Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) [Advanced hunting](advanced-hunting-overview.md) relies on data coming from across your organization. To get the most comprehensive data possible, ensure that you have the correct settings in the corresponding data sources. diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-fileprofile-function.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-fileprofile-function.md index 365f8ef6ba..4c377bed93 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-fileprofile-function.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-fileprofile-function.md @@ -21,8 +21,8 @@ ms.date: 09/20/2020 # FileProfile() **Applies to:** - -- [Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) The `FileProfile()` function is an enrichment function in [advanced hunting](advanced-hunting-overview.md) that adds the following data to files found by the query. diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-go-hunt.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-go-hunt.md index 9b8aed20bc..ea6c8de949 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-go-hunt.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-go-hunt.md @@ -23,7 +23,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -- [Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) With the *go hunt* action, you can quickly investigate events and various entity types using powerful query-based [advanced hunting](advanced-hunting-overview.md) capabilities. This action automatically runs an advanced hunting query to find relevant information about the selected event or entity. From ea87dac88efeb1b8cf703a200165745077f8b28c Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Mon, 14 Dec 2020 11:44:30 +0530 Subject: [PATCH 006/161] updated-4620497 updated task 4620497 --- .../microsoft-defender-atp/advanced-hunting-limits.md | 3 ++- .../microsoft-defender-atp/advanced-hunting-overview.md | 1 + .../advanced-hunting-query-language.md | 3 ++- .../microsoft-defender-atp/advanced-hunting-query-results.md | 2 +- .../advanced-hunting-schema-reference.md | 2 +- .../advanced-hunting-shared-queries.md | 2 +- .../microsoft-defender-atp/advanced-hunting-take-action.md | 1 + .../threat-protection/microsoft-defender-atp/alerts-queue.md | 4 ++-- .../threat-protection/microsoft-defender-atp/alerts.md | 5 +++-- .../microsoft-defender-atp/android-configure.md | 4 ++-- .../microsoft-defender-atp/android-intune.md | 5 ++--- .../microsoft-defender-atp/android-privacy.md | 4 ++-- .../microsoft-defender-atp/android-support-signin.md | 5 ++--- .../microsoft-defender-atp/android-terms.md | 4 ++-- .../threat-protection/microsoft-defender-atp/api-explorer.md | 2 +- .../microsoft-defender-atp/api-hello-world.md | 2 +- .../microsoft-defender-atp/api-microsoft-flow.md | 5 +++-- .../microsoft-defender-atp/api-portal-mapping.md | 3 +-- .../threat-protection/microsoft-defender-atp/api-power-bi.md | 5 +++-- .../threat-protection/microsoft-defender-atp/apis-intro.md | 1 - .../microsoft-defender-atp/assign-portal-access.md | 1 + .../microsoft-defender-atp/attack-simulations.md | 2 +- .../microsoft-defender-atp/attack-surface-reduction-faq.md | 5 ++--- .../microsoft-defender-atp/attack-surface-reduction.md | 4 ++-- .../microsoft-defender-atp/audit-windows-defender.md | 4 ++-- 25 files changed, 41 insertions(+), 38 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-limits.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-limits.md index 0516afc2f2..bcec8a9e90 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-limits.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-limits.md @@ -22,7 +22,8 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] **Applies to:** -- [Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhunting-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview.md index e42dbf4cf3..01a9a8a18d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview.md @@ -23,6 +23,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhunting-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-query-language.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-query-language.md index 76fd2bee7e..3a2d019674 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-query-language.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-query-language.md @@ -22,7 +22,8 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] **Applies to:** -- [Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) > Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhunting-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-query-results.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-query-results.md index 34db3e0745..26aac1951a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-query-results.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-query-results.md @@ -21,9 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhunting-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-schema-reference.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-schema-reference.md index a0988a90d0..dd4f3e9daa 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-schema-reference.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-schema-reference.md @@ -22,9 +22,9 @@ ms.date: 01/14/2020 [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-shared-queries.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-shared-queries.md index 0daf0cbfda..25d3f6f796 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-shared-queries.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-shared-queries.md @@ -21,9 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhunting-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-take-action.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-take-action.md index d535b139e2..305f3fd9fa 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-take-action.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-take-action.md @@ -22,6 +22,7 @@ ms.date: 09/20/2020 **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) > Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md b/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md index e403e8465c..a15bbb44d3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md +++ b/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md @@ -24,8 +24,8 @@ ms.date: 03/27/2020 **Applies to:** - -- [Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-alertsq-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/alerts.md b/windows/security/threat-protection/microsoft-defender-atp/alerts.md index eaa7c56c2f..72b1f1b8fc 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/alerts.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/android-configure.md b/windows/security/threat-protection/microsoft-defender-atp/android-configure.md index f9f5d899e6..7b866543f6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/android-configure.md +++ b/windows/security/threat-protection/microsoft-defender-atp/android-configure.md @@ -25,8 +25,8 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] **Applies to:** - -- [Microsoft Defender for Endpoint for Android](microsoft-defender-atp-android.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## Conditional Access with Defender for Endpoint for Android Microsoft Defender for Endpoint for Android along with Microsoft Intune and Azure Active diff --git a/windows/security/threat-protection/microsoft-defender-atp/android-intune.md b/windows/security/threat-protection/microsoft-defender-atp/android-intune.md index d899f7568a..fe5cae5c07 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/android-intune.md +++ b/windows/security/threat-protection/microsoft-defender-atp/android-intune.md @@ -24,10 +24,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - -- [Defender for Endpoint](microsoft-defender-atp-android.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) This topic describes deploying Defender for Endpoint for Android on Intune Company Portal enrolled devices. For more information about Intune device enrollment, see [Enroll your diff --git a/windows/security/threat-protection/microsoft-defender-atp/android-privacy.md b/windows/security/threat-protection/microsoft-defender-atp/android-privacy.md index 66ec2fa838..32be21bcc2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/android-privacy.md +++ b/windows/security/threat-protection/microsoft-defender-atp/android-privacy.md @@ -20,8 +20,8 @@ ms.topic: conceptual # Microsoft Defender for Endpoint for Android - Privacy information **Applies to:** - -- [Microsoft Defender for Endpoint for Android](microsoft-defender-atp-android.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Defender for Endpoint for Android collects information from your configured diff --git a/windows/security/threat-protection/microsoft-defender-atp/android-support-signin.md b/windows/security/threat-protection/microsoft-defender-atp/android-support-signin.md index 34959bf022..87afe6771a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/android-support-signin.md +++ b/windows/security/threat-protection/microsoft-defender-atp/android-support-signin.md @@ -24,10 +24,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - -- [Defender for Endpoint](microsoft-defender-atp-android.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) During onboarding, you might encounter sign in issues after the app is installed on your device. diff --git a/windows/security/threat-protection/microsoft-defender-atp/android-terms.md b/windows/security/threat-protection/microsoft-defender-atp/android-terms.md index d8dd335aff..5b9ded6806 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/android-terms.md +++ b/windows/security/threat-protection/microsoft-defender-atp/android-terms.md @@ -24,8 +24,8 @@ hideEdit: true [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] **Applies to:** - -- [Microsoft Defender for Endpoint](microsoft-defender-atp-android.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## MICROSOFT APPLICATION LICENSE TERMS: MICROSOFT DEFENDER FOR ENDPOINT diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md b/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md index c75879bafc..324bc45db7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md @@ -24,8 +24,8 @@ ms.topic: conceptual **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) The Microsoft Defender for Endpoint API Explorer is a tool that helps you explore various Defender for Endpoint APIs interactively. diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md b/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md index 0dfd7bfce2..82c94d8c28 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md @@ -22,7 +22,7 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) + - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md b/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md index 95525bbf97..d45668f5a3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md @@ -21,8 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md b/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md index 2170d310c0..ed503a7088 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md @@ -21,10 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-apiportalmapping-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md b/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md index 605b0f511a..6575464267 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md @@ -21,8 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/apis-intro.md b/windows/security/threat-protection/microsoft-defender-atp/apis-intro.md index c105db89bb..d1a2cd0254 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/apis-intro.md +++ b/windows/security/threat-protection/microsoft-defender-atp/apis-intro.md @@ -21,7 +21,6 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) diff --git a/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access.md b/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access.md index a8bf456da1..b8ebc6cdff 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access.md +++ b/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access.md @@ -27,6 +27,7 @@ ms.date: 11/28/2018 - Azure Active Directory - Office 365 - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/attack-simulations.md b/windows/security/threat-protection/microsoft-defender-atp/attack-simulations.md index 74cc0538fb..bbe7ac288a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/attack-simulations.md +++ b/windows/security/threat-protection/microsoft-defender-atp/attack-simulations.md @@ -24,8 +24,8 @@ ms.date: 11/20/2018 **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-attacksimulations-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction-faq.md b/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction-faq.md index 27c2c2db47..5d12d0551b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction-faq.md +++ b/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction-faq.md @@ -20,10 +20,9 @@ ms.custom: asr [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - -* [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## Is attack surface reduction (ASR) part of Windows? diff --git a/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction.md b/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction.md index f5e542e2f6..68c135ee98 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction.md +++ b/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction.md @@ -23,8 +23,8 @@ ms.date: 11/30/2020 **Applies to:** - -* [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## Overview diff --git a/windows/security/threat-protection/microsoft-defender-atp/audit-windows-defender.md b/windows/security/threat-protection/microsoft-defender-atp/audit-windows-defender.md index b442dcb82a..775a8cc01a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/audit-windows-defender.md +++ b/windows/security/threat-protection/microsoft-defender-atp/audit-windows-defender.md @@ -21,8 +21,8 @@ manager: dansimp **Applies to:** - -* [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) You can enable attack surface reduction rules, exploit protection, network protection, and controlled folder access in audit mode. Audit mode lets you see a record of what *would* have happened if you had enabled the feature. From 3dea206d17ceeec5c5b6ac752c605ebc4f4a0b1b Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Mon, 14 Dec 2020 12:50:52 +0530 Subject: [PATCH 007/161] updated-task-4620497 updated task 4620497 --- .../advanced-hunting-shared-queries.md | 2 +- .../microsoft-defender-atp/advanced-hunting-take-action.md | 1 + .../microsoft-defender-atp/alerts-queue.md | 4 ++-- .../threat-protection/microsoft-defender-atp/alerts.md | 5 +++-- .../microsoft-defender-atp/android-configure.md | 4 ++-- .../microsoft-defender-atp/android-intune.md | 5 ++--- .../microsoft-defender-atp/android-privacy.md | 4 ++-- .../microsoft-defender-atp/android-support-signin.md | 4 ++-- .../microsoft-defender-atp/android-terms.md | 4 ++-- .../microsoft-defender-atp/api-explorer.md | 3 +-- .../microsoft-defender-atp/api-hello-world.md | 5 +++-- .../microsoft-defender-atp/api-microsoft-flow.md | 5 +++-- .../microsoft-defender-atp/api-portal-mapping.md | 3 +-- .../microsoft-defender-atp/api-power-bi.md | 5 +++-- .../microsoft-defender-atp/api-terms-of-use.md | 3 +++ .../threat-protection/microsoft-defender-atp/apis-intro.md | 4 ++-- .../microsoft-defender-atp/assign-portal-access.md | 1 + .../microsoft-defender-atp/attack-simulations.md | 3 +-- .../microsoft-defender-atp/attack-surface-reduction-faq.md | 5 ++--- .../microsoft-defender-atp/attack-surface-reduction.md | 5 ++--- .../microsoft-defender-atp/audit-windows-defender.md | 5 ++--- .../auto-investigation-action-center.md | 3 +++ .../microsoft-defender-atp/automated-investigations.md | 7 +++---- .../microsoft-defender-atp/automation-levels.md | 4 ++++ .../microsoft-defender-atp/basic-permissions.md | 1 + 25 files changed, 52 insertions(+), 43 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-shared-queries.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-shared-queries.md index 0daf0cbfda..25d3f6f796 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-shared-queries.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-shared-queries.md @@ -21,9 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhunting-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-take-action.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-take-action.md index d535b139e2..305f3fd9fa 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-take-action.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-take-action.md @@ -22,6 +22,7 @@ ms.date: 09/20/2020 **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) > Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md b/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md index e403e8465c..a15bbb44d3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md +++ b/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md @@ -24,8 +24,8 @@ ms.date: 03/27/2020 **Applies to:** - -- [Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-alertsq-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/alerts.md b/windows/security/threat-protection/microsoft-defender-atp/alerts.md index eaa7c56c2f..72b1f1b8fc 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/alerts.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/android-configure.md b/windows/security/threat-protection/microsoft-defender-atp/android-configure.md index f9f5d899e6..7b866543f6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/android-configure.md +++ b/windows/security/threat-protection/microsoft-defender-atp/android-configure.md @@ -25,8 +25,8 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] **Applies to:** - -- [Microsoft Defender for Endpoint for Android](microsoft-defender-atp-android.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## Conditional Access with Defender for Endpoint for Android Microsoft Defender for Endpoint for Android along with Microsoft Intune and Azure Active diff --git a/windows/security/threat-protection/microsoft-defender-atp/android-intune.md b/windows/security/threat-protection/microsoft-defender-atp/android-intune.md index d899f7568a..fe5cae5c07 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/android-intune.md +++ b/windows/security/threat-protection/microsoft-defender-atp/android-intune.md @@ -24,10 +24,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - -- [Defender for Endpoint](microsoft-defender-atp-android.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) This topic describes deploying Defender for Endpoint for Android on Intune Company Portal enrolled devices. For more information about Intune device enrollment, see [Enroll your diff --git a/windows/security/threat-protection/microsoft-defender-atp/android-privacy.md b/windows/security/threat-protection/microsoft-defender-atp/android-privacy.md index 66ec2fa838..32be21bcc2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/android-privacy.md +++ b/windows/security/threat-protection/microsoft-defender-atp/android-privacy.md @@ -20,8 +20,8 @@ ms.topic: conceptual # Microsoft Defender for Endpoint for Android - Privacy information **Applies to:** - -- [Microsoft Defender for Endpoint for Android](microsoft-defender-atp-android.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Defender for Endpoint for Android collects information from your configured diff --git a/windows/security/threat-protection/microsoft-defender-atp/android-support-signin.md b/windows/security/threat-protection/microsoft-defender-atp/android-support-signin.md index 34959bf022..4b7d89d0aa 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/android-support-signin.md +++ b/windows/security/threat-protection/microsoft-defender-atp/android-support-signin.md @@ -26,8 +26,8 @@ ms.topic: conceptual **Applies to:** - -- [Defender for Endpoint](microsoft-defender-atp-android.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) During onboarding, you might encounter sign in issues after the app is installed on your device. diff --git a/windows/security/threat-protection/microsoft-defender-atp/android-terms.md b/windows/security/threat-protection/microsoft-defender-atp/android-terms.md index d8dd335aff..5b9ded6806 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/android-terms.md +++ b/windows/security/threat-protection/microsoft-defender-atp/android-terms.md @@ -24,8 +24,8 @@ hideEdit: true [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] **Applies to:** - -- [Microsoft Defender for Endpoint](microsoft-defender-atp-android.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## MICROSOFT APPLICATION LICENSE TERMS: MICROSOFT DEFENDER FOR ENDPOINT diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md b/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md index c75879bafc..5b1db3a730 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md @@ -22,10 +22,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) The Microsoft Defender for Endpoint API Explorer is a tool that helps you explore various Defender for Endpoint APIs interactively. diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md b/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md index 0dfd7bfce2..1cfe7b3511 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md @@ -21,8 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md b/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md index 95525bbf97..d45668f5a3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md @@ -21,8 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md b/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md index 2170d310c0..ed503a7088 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md @@ -21,10 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-apiportalmapping-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md b/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md index 605b0f511a..6575464267 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md @@ -21,8 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-terms-of-use.md b/windows/security/threat-protection/microsoft-defender-atp/api-terms-of-use.md index 9c8c96f2ea..78cdd47953 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-terms-of-use.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-terms-of-use.md @@ -20,6 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## APIs diff --git a/windows/security/threat-protection/microsoft-defender-atp/apis-intro.md b/windows/security/threat-protection/microsoft-defender-atp/apis-intro.md index c105db89bb..efa466e67c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/apis-intro.md +++ b/windows/security/threat-protection/microsoft-defender-atp/apis-intro.md @@ -21,9 +21,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** +**Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) > Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access.md b/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access.md index a8bf456da1..b8ebc6cdff 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access.md +++ b/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access.md @@ -27,6 +27,7 @@ ms.date: 11/28/2018 - Azure Active Directory - Office 365 - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/attack-simulations.md b/windows/security/threat-protection/microsoft-defender-atp/attack-simulations.md index 74cc0538fb..0d3c296111 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/attack-simulations.md +++ b/windows/security/threat-protection/microsoft-defender-atp/attack-simulations.md @@ -22,10 +22,9 @@ ms.date: 11/20/2018 [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-attacksimulations-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction-faq.md b/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction-faq.md index 27c2c2db47..5d12d0551b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction-faq.md +++ b/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction-faq.md @@ -20,10 +20,9 @@ ms.custom: asr [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - -* [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## Is attack surface reduction (ASR) part of Windows? diff --git a/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction.md b/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction.md index f5e542e2f6..e13e833985 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction.md +++ b/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction.md @@ -21,10 +21,9 @@ ms.date: 11/30/2020 [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - -* [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## Overview diff --git a/windows/security/threat-protection/microsoft-defender-atp/audit-windows-defender.md b/windows/security/threat-protection/microsoft-defender-atp/audit-windows-defender.md index b442dcb82a..e374abe630 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/audit-windows-defender.md +++ b/windows/security/threat-protection/microsoft-defender-atp/audit-windows-defender.md @@ -19,10 +19,9 @@ manager: dansimp [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - -* [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) You can enable attack surface reduction rules, exploit protection, network protection, and controlled folder access in audit mode. Audit mode lets you see a record of what *would* have happened if you had enabled the feature. diff --git a/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md b/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md index 0a77813dd2..f4e0f7e28e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md +++ b/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md @@ -24,6 +24,9 @@ ms.date: 09/24/2020 [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) During and after an automated investigation, certain remediation actions can be identified. Depending on the threat and how [Microsoft Defender for Endpoint](https://docs.microsoft.com/windows/security/threat-protection) is configured for your organization, some remediation actions are taken automatically. diff --git a/windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md b/windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md index fea480df60..70b3eb03b2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md +++ b/windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md @@ -27,10 +27,9 @@ ms.custom: AIR [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to** - -- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146806) - +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Your security operations team receives an alert whenever a malicious or suspicious artifact is detected by Microsoft Defender for Endpoint. Security operations teams face challenges in addressing the multitude of alerts that arise from the seemingly never-ending flow of threats. Microsoft Defender for Endpoint includes automated investigation and remediation (AIR) capabilities that can help your security operations team address threats more efficiently and effectively. Want to see how it works? Watch the following video: diff --git a/windows/security/threat-protection/microsoft-defender-atp/automation-levels.md b/windows/security/threat-protection/microsoft-defender-atp/automation-levels.md index 9fa9ebd762..cd0bb6f7e1 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/automation-levels.md +++ b/windows/security/threat-protection/microsoft-defender-atp/automation-levels.md @@ -25,6 +25,10 @@ ms.custom: AIR # Automation levels in automated investigation and remediation capabilities +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) + Automated investigation and remediation (AIR) capabilities in Microsoft Defender for Endpoint can be configured to one of several levels of automation. Your automation level affects whether remediation actions following AIR investigations are taken automatically or only upon approval. - *Full automation* (recommended) means remediation actions are taken automatically on artifacts determined to be malicious. - *Semi-automation* means some remediation actions are taken automatically, but other remediation actions await approval before being taken. (See the table in [Levels of automation](#levels-of-automation).) diff --git a/windows/security/threat-protection/microsoft-defender-atp/basic-permissions.md b/windows/security/threat-protection/microsoft-defender-atp/basic-permissions.md index fed2ad3911..fbbcf28bc8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/basic-permissions.md +++ b/windows/security/threat-protection/microsoft-defender-atp/basic-permissions.md @@ -25,6 +25,7 @@ ms.topic: article - Azure Active Directory - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-basicaccess-abovefoldlink) From 7608b62532913aef122d6082c143891a53a48e9c Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Mon, 14 Dec 2020 13:14:01 +0530 Subject: [PATCH 008/161] updated-4620497-batch4 updated --- .../behavioral-blocking-containment.md | 2 +- .../microsoft-defender-atp/check-sensor-status.md | 2 +- .../microsoft-defender-atp/client-behavioral-blocking.md | 2 +- .../microsoft-defender-atp/collect-investigation-package.md | 4 +++- .../threat-protection/microsoft-defender-atp/community.md | 1 + .../microsoft-defender-atp/conditional-access.md | 3 +-- .../microsoft-defender-atp/configure-arcsight.md | 3 +-- .../configure-attack-surface-reduction.md | 3 +++ .../configure-automated-investigations-remediation.md | 5 ++--- .../microsoft-defender-atp/configure-conditional-access.md | 1 + .../microsoft-defender-atp/configure-email-notifications.md | 2 +- .../microsoft-defender-atp/configure-endpoints-gp.md | 2 +- .../microsoft-defender-atp/configure-endpoints-mdm.md | 3 +-- .../configure-endpoints-non-windows.md | 1 + .../microsoft-defender-atp/configure-endpoints-sccm.md | 1 + .../microsoft-defender-atp/configure-endpoints-script.md | 5 +---- .../microsoft-defender-atp/configure-endpoints-vdi.md | 3 ++- .../microsoft-defender-atp/configure-endpoints.md | 4 +--- .../microsoft-defender-atp/configure-machines-asr.md | 5 ++--- .../microsoft-defender-atp/configure-machines-onboarding.md | 2 +- .../configure-machines-security-baseline.md | 2 +- .../microsoft-defender-atp/configure-machines.md | 4 ++-- .../configure-microsoft-threat-experts.md | 2 +- .../microsoft-defender-atp/configure-mssp-notifications.md | 3 +-- .../microsoft-defender-atp/configure-mssp-support.md | 3 +-- 25 files changed, 33 insertions(+), 35 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/behavioral-blocking-containment.md b/windows/security/threat-protection/microsoft-defender-atp/behavioral-blocking-containment.md index 05ec75c8d0..b9812f96f1 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/behavioral-blocking-containment.md +++ b/windows/security/threat-protection/microsoft-defender-atp/behavioral-blocking-containment.md @@ -26,8 +26,8 @@ ms.collection: **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## Overview diff --git a/windows/security/threat-protection/microsoft-defender-atp/check-sensor-status.md b/windows/security/threat-protection/microsoft-defender-atp/check-sensor-status.md index bbff2e68b9..8805dc3930 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/check-sensor-status.md +++ b/windows/security/threat-protection/microsoft-defender-atp/check-sensor-status.md @@ -22,9 +22,9 @@ ms.date: 04/24/2018 [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-checksensor-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/client-behavioral-blocking.md b/windows/security/threat-protection/microsoft-defender-atp/client-behavioral-blocking.md index ef5d153836..bc4df2fd36 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/client-behavioral-blocking.md +++ b/windows/security/threat-protection/microsoft-defender-atp/client-behavioral-blocking.md @@ -26,8 +26,8 @@ ms.collection: **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## Overview diff --git a/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package.md b/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package.md index 0d6949ea0b..7353a6bf79 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package.md +++ b/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package.md @@ -22,7 +22,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/community.md b/windows/security/threat-protection/microsoft-defender-atp/community.md index f68dcdeab3..133d2cab9b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/community.md +++ b/windows/security/threat-protection/microsoft-defender-atp/community.md @@ -26,6 +26,7 @@ ms.date: 04/24/2018 **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/conditional-access.md b/windows/security/threat-protection/microsoft-defender-atp/conditional-access.md index a0ace30f14..2547e77520 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/conditional-access.md +++ b/windows/security/threat-protection/microsoft-defender-atp/conditional-access.md @@ -24,8 +24,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - - +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-conditionalaccess-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight.md b/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight.md index aca0be0b19..026974fa1b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight.md @@ -21,10 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-attack-surface-reduction.md b/windows/security/threat-protection/microsoft-defender-atp/configure-attack-surface-reduction.md index 736ab0b846..c19655f2e1 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-attack-surface-reduction.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-attack-surface-reduction.md @@ -21,6 +21,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) You can configure attack surface reduction with a number of tools, including: diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-automated-investigations-remediation.md b/windows/security/threat-protection/microsoft-defender-atp/configure-automated-investigations-remediation.md index f8d91cd3e1..572a80986e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-automated-investigations-remediation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-automated-investigations-remediation.md @@ -24,10 +24,9 @@ ms.reviewer: ramarom, evaldm, isco, mabraitm, chriggs [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to** - +**Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) If your organization is using [Microsoft Defender for Endpoint](https://docs.microsoft.com/windows/security/threat-protection/) (Defender for Endpoint), [automated investigation and remediation capabilities](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/automated-investigations) can save your security operations team time and effort. As outlined in [this blog post](https://techcommunity.microsoft.com/t5/microsoft-defender-atp/enhance-your-soc-with-microsoft-defender-atp-automatic/ba-p/848946), these capabilities mimic the ideal steps that a security analyst takes to investigate and remediate threats. [Learn more about automated investigation and remediation](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/automated-investigations). diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access.md b/windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access.md index 206e5721b3..179220a82c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access.md @@ -23,6 +23,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) This section guides you through all the steps you need to take to properly implement Conditional Access. diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications.md b/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications.md index f7ccfe871b..359e660d49 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications.md @@ -21,9 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-emailconfig-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md index 5360517315..2f52e87c77 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md @@ -26,8 +26,8 @@ ms.date: 04/24/2018 **Applies to:** - Group Policy - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm.md index 0a97fbf1e3..7f93a3b0d0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm.md @@ -23,9 +23,8 @@ ms.topic: article **Applies to:** - - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-configureendpointsmdm-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-non-windows.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-non-windows.md index ba65815551..695326a404 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-non-windows.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-non-windows.md @@ -27,6 +27,7 @@ ms.topic: article - macOS - Linux - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-nonwindows-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md index 38ec7959c3..4f17253970 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md @@ -26,6 +26,7 @@ ms.date: 02/07/2020 **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Microsoft Endpoint Configuration Manager current branch - System Center 2012 R2 Configuration Manager diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script.md index acfdb668c7..d063e91f81 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script.md @@ -22,10 +22,7 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** - - -- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md index fc7c7e1d3c..c2143a8c0d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md @@ -24,7 +24,8 @@ ms.date: 04/16/2020 **Applies to:** -- Virtual desktop infrastructure (VDI) devices +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >[!WARNING] > Microsoft Defender for Endpoint support for Windows Virtual Desktop multi-user scenarios is currently in Preview and limited up to 25 concurrent sessions per host/VM. However single session scenarios on Windows Virtual Desktop are fully supported. diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints.md index 00ee7a17a2..e11efc3916 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints.md @@ -21,11 +21,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - [Microsoft 365 Endpoint data loss prevention (DLP)](/microsoft-365/compliance/endpoint-dlp-learn-about) Devices in your organization must be configured so that the Defender for Endpoint service can get sensor data from them. There are various methods and deployment tools that you can use to configure the devices in your organization. diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-machines-asr.md b/windows/security/threat-protection/microsoft-defender-atp/configure-machines-asr.md index 17e8cb3039..d5d5d57342 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-machines-asr.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-machines-asr.md @@ -21,10 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - -* [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) > Want to experience Defender for Endpoint? [Sign up for a free trial](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-onboardconfigure-abovefoldlink). diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-machines-onboarding.md b/windows/security/threat-protection/microsoft-defender-atp/configure-machines-onboarding.md index b207e1fb84..d5c84321a6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-machines-onboarding.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-machines-onboarding.md @@ -21,9 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-onboardconfigure-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-machines-security-baseline.md b/windows/security/threat-protection/microsoft-defender-atp/configure-machines-security-baseline.md index e110a3d518..c5ac3b1e85 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-machines-security-baseline.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-machines-security-baseline.md @@ -21,9 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-onboardconfigure-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-machines.md b/windows/security/threat-protection/microsoft-defender-atp/configure-machines.md index 9b830a3988..9f4ad2ec51 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-machines.md @@ -21,9 +21,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** -- [Microsoft Defender for Endpoint ](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-onboardconfigure-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md b/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md index 3ce240d781..c3033e6e9b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md @@ -25,8 +25,8 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## Before you begin > [!NOTE] diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-notifications.md b/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-notifications.md index e75588efda..20f4727023 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-notifications.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-notifications.md @@ -21,10 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-mssp-support-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md b/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md index dde5d47ec5..69475ea801 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md @@ -21,10 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-mssp-support-abovefoldlink) From 4e57cd34aad3413e52cf3b6491d747ed768929c1 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Mon, 14 Dec 2020 15:53:02 +0530 Subject: [PATCH 009/161] updated-4620497 updated --- .../microsoft-defender-atp/configure-proxy-internet.md | 5 ++--- .../microsoft-defender-atp/configure-server-endpoints.md | 1 + .../microsoft-defender-atp/configure-siem.md | 3 +-- .../microsoft-defender-atp/connected-applications.md | 1 + .../microsoft-defender-atp/contact-support.md | 3 ++- .../microsoft-defender-atp/controlled-folders.md | 3 +-- .../microsoft-defender-atp/create-alert-by-reference.md | 4 +++- .../microsoft-defender-atp/custom-detection-rules.md | 2 +- .../microsoft-defender-atp/custom-detections-manage.md | 1 + .../customize-attack-surface-reduction.md | 4 ++-- .../microsoft-defender-atp/customize-controlled-folders.md | 4 ++-- .../microsoft-defender-atp/customize-exploit-protection.md | 4 ++-- .../microsoft-defender-atp/data-retention-settings.md | 3 +-- .../microsoft-defender-atp/data-storage-privacy.md | 3 ++- .../microsoft-defender-atp/defender-compatibility.md | 7 ++----- .../microsoft-defender-atp/delete-ti-indicator-by-id.md | 5 +++-- .../microsoft-defender-atp/deployment-phases.md | 2 +- .../microsoft-defender-atp/deployment-rings.md | 2 ++ .../microsoft-defender-atp/deployment-strategy.md | 1 + .../microsoft-defender-atp/device-timeline-event-flag.md | 4 +++- .../microsoft-defender-atp/edr-in-block-mode.md | 3 +-- .../enable-attack-surface-reduction.md | 3 +++ .../microsoft-defender-atp/enable-controlled-folders.md | 4 ++-- .../microsoft-defender-atp/enable-exploit-protection.md | 5 ++--- .../microsoft-defender-atp/enable-network-protection.md | 5 ++--- 25 files changed, 44 insertions(+), 38 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md b/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md index 48fd0bee7d..29d8a51496 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md @@ -23,10 +23,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - -- [Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) > Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configureendpointsscript-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md b/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md index 6c6a1ea7cc..18fcfe65b1 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md @@ -31,6 +31,7 @@ ms.topic: article - Windows Server 2019 and later - Windows Server 2019 core edition - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) > Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-configserver-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-siem.md b/windows/security/threat-protection/microsoft-defender-atp/configure-siem.md index 62e2e5f5b1..02df3a13d3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-siem.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-siem.md @@ -21,10 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-configuresiem-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/connected-applications.md b/windows/security/threat-protection/microsoft-defender-atp/connected-applications.md index 99a86d51e7..6744927292 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/connected-applications.md +++ b/windows/security/threat-protection/microsoft-defender-atp/connected-applications.md @@ -24,6 +24,7 @@ ms.topic: conceptual **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Connected applications integrates with the Defender for Endpoint platform using APIs. diff --git a/windows/security/threat-protection/microsoft-defender-atp/contact-support.md b/windows/security/threat-protection/microsoft-defender-atp/contact-support.md index b8af068443..b323d8069b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/contact-support.md +++ b/windows/security/threat-protection/microsoft-defender-atp/contact-support.md @@ -23,7 +23,8 @@ ms.topic: conceptual **Applies to:** -- [Microsoft Defender for Endpoint](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Defender for Endpoint has recently upgraded the support process to offer a more modern and advanced support experience. diff --git a/windows/security/threat-protection/microsoft-defender-atp/controlled-folders.md b/windows/security/threat-protection/microsoft-defender-atp/controlled-folders.md index 272d1480ec..bdd720eab1 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/controlled-folders.md +++ b/windows/security/threat-protection/microsoft-defender-atp/controlled-folders.md @@ -21,10 +21,9 @@ ms.custom: asr [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## What is controlled folder access? diff --git a/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference.md b/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference.md index a5c286ef37..bf6f406639 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference.md +++ b/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference.md @@ -21,7 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules.md b/windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules.md index 17e23e40fc..f47b66c90f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules.md +++ b/windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules.md @@ -24,8 +24,8 @@ ms.date: 09/20/2020 [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Custom detection rules built from [advanced hunting](advanced-hunting-overview.md) queries let you proactively monitor various events and system states, including suspected breach activity and misconfigured devices. You can set them to run at regular intervals, generating alerts and taking response actions whenever there are matches. diff --git a/windows/security/threat-protection/microsoft-defender-atp/custom-detections-manage.md b/windows/security/threat-protection/microsoft-defender-atp/custom-detections-manage.md index ef5088e134..cd17efa6b8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/custom-detections-manage.md +++ b/windows/security/threat-protection/microsoft-defender-atp/custom-detections-manage.md @@ -25,6 +25,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Manage your existing [custom detection rules](custom-detection-rules.md) to ensure they are effectively finding threats and taking actions. Explore how to view the list of rules, check their previous runs, and review the alerts they have triggered. You can also run a rule on demand and modify it. diff --git a/windows/security/threat-protection/microsoft-defender-atp/customize-attack-surface-reduction.md b/windows/security/threat-protection/microsoft-defender-atp/customize-attack-surface-reduction.md index 81ede44b00..03a274b066 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/customize-attack-surface-reduction.md +++ b/windows/security/threat-protection/microsoft-defender-atp/customize-attack-surface-reduction.md @@ -20,8 +20,8 @@ manager: dansimp **Applies to:** - -* [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) > [!IMPORTANT] > Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. diff --git a/windows/security/threat-protection/microsoft-defender-atp/customize-controlled-folders.md b/windows/security/threat-protection/microsoft-defender-atp/customize-controlled-folders.md index 39b6cd2158..b6570ffae3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/customize-controlled-folders.md +++ b/windows/security/threat-protection/microsoft-defender-atp/customize-controlled-folders.md @@ -20,8 +20,8 @@ manager: dansimp **Applies to:** - -* [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. Controlled folder access is supported on Windows Server 2019 and Windows 10 clients. diff --git a/windows/security/threat-protection/microsoft-defender-atp/customize-exploit-protection.md b/windows/security/threat-protection/microsoft-defender-atp/customize-exploit-protection.md index 964158b256..fa16ddf58a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/customize-exploit-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/customize-exploit-protection.md @@ -20,8 +20,8 @@ manager: dansimp **Applies to:** - -* [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Exploit protection automatically applies a number of exploit mitigation techniques on both the operating system processes and on individual apps. diff --git a/windows/security/threat-protection/microsoft-defender-atp/data-retention-settings.md b/windows/security/threat-protection/microsoft-defender-atp/data-retention-settings.md index 7932cfb153..df983743ae 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/data-retention-settings.md +++ b/windows/security/threat-protection/microsoft-defender-atp/data-retention-settings.md @@ -22,9 +22,8 @@ ms.topic: conceptual **Applies to:** - - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-gensettings-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy.md b/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy.md index 953b74c139..0b69d38538 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy.md +++ b/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy.md @@ -23,7 +23,8 @@ ms.topic: conceptual **Applies to:** -- [Microsoft Defender for Endpoint](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/defender-compatibility.md b/windows/security/threat-protection/microsoft-defender-atp/defender-compatibility.md index f84762a3a0..28d34ad383 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/defender-compatibility.md +++ b/windows/security/threat-protection/microsoft-defender-atp/defender-compatibility.md @@ -24,12 +24,9 @@ ms.date: 04/24/2018 **Applies to:** - - -- Windows Defender - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - - +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +- Windows Defender >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-defendercompat-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id.md index 123ce4959e..4d1f037200 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md b/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md index 16e39faf4d..2c443f3d9e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md +++ b/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md @@ -25,7 +25,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Learn how to deploy Microsoft Defender for Endpoint so that your enterprise can take advantage of preventative protection, post-breach detection, automated investigation, and response. diff --git a/windows/security/threat-protection/microsoft-defender-atp/deployment-rings.md b/windows/security/threat-protection/microsoft-defender-atp/deployment-rings.md index 8ad96f8300..1c6eaca4d0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/deployment-rings.md +++ b/windows/security/threat-protection/microsoft-defender-atp/deployment-rings.md @@ -25,6 +25,8 @@ ms.topic: article **Applies to:** - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Deploying Microsoft Defender ATP can be done using a ring-based deployment approach. diff --git a/windows/security/threat-protection/microsoft-defender-atp/deployment-strategy.md b/windows/security/threat-protection/microsoft-defender-atp/deployment-strategy.md index fad489826a..0cb703372f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/deployment-strategy.md +++ b/windows/security/threat-protection/microsoft-defender-atp/deployment-strategy.md @@ -22,6 +22,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-secopsdashboard-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/device-timeline-event-flag.md b/windows/security/threat-protection/microsoft-defender-atp/device-timeline-event-flag.md index 8ab3495d50..67c3961a98 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/device-timeline-event-flag.md +++ b/windows/security/threat-protection/microsoft-defender-atp/device-timeline-event-flag.md @@ -20,7 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Event flags in the Defender for Endpoint device timeline help you filter and organize specific events when you're investigate potential attacks. diff --git a/windows/security/threat-protection/microsoft-defender-atp/edr-in-block-mode.md b/windows/security/threat-protection/microsoft-defender-atp/edr-in-block-mode.md index 0372ef6ab9..f190d344a8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/edr-in-block-mode.md +++ b/windows/security/threat-protection/microsoft-defender-atp/edr-in-block-mode.md @@ -25,10 +25,9 @@ ms.collection: [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## What is EDR in block mode? diff --git a/windows/security/threat-protection/microsoft-defender-atp/enable-attack-surface-reduction.md b/windows/security/threat-protection/microsoft-defender-atp/enable-attack-surface-reduction.md index 603f751bdd..9464fb22dd 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/enable-attack-surface-reduction.md +++ b/windows/security/threat-protection/microsoft-defender-atp/enable-attack-surface-reduction.md @@ -19,6 +19,9 @@ manager: dansimp [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) [Attack surface reduction rules](attack-surface-reduction.md) (ASR rules) help prevent actions that malware often abuses to compromise devices and networks. You can set ASR rules for devices running any of the following editions and versions of Windows: - Windows 10 Pro, [version 1709](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1709) or later diff --git a/windows/security/threat-protection/microsoft-defender-atp/enable-controlled-folders.md b/windows/security/threat-protection/microsoft-defender-atp/enable-controlled-folders.md index 8af897f9a0..1e040286f7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/enable-controlled-folders.md +++ b/windows/security/threat-protection/microsoft-defender-atp/enable-controlled-folders.md @@ -21,8 +21,8 @@ manager: dansimp **Applies to:** - -* [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) [Controlled folder access](controlled-folders.md) helps you protect valuable data from malicious apps and threats, such as ransomware. Controlled folder access is included with Windows 10 and Windows Server 2019. diff --git a/windows/security/threat-protection/microsoft-defender-atp/enable-exploit-protection.md b/windows/security/threat-protection/microsoft-defender-atp/enable-exploit-protection.md index 7b1c044a64..2e4c2b5cb0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/enable-exploit-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/enable-exploit-protection.md @@ -18,10 +18,9 @@ manager: dansimp [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - -* [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) [Exploit protection](exploit-protection.md) helps protect against malware that uses exploits to infect devices and spread. Exploit protection consists of a number of mitigations that can be applied to either the operating system or individual apps. diff --git a/windows/security/threat-protection/microsoft-defender-atp/enable-network-protection.md b/windows/security/threat-protection/microsoft-defender-atp/enable-network-protection.md index 4f9ad6dff7..41c19a2a84 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/enable-network-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/enable-network-protection.md @@ -18,10 +18,9 @@ manager: dansimp [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - -* [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) [Network protection](network-protection.md) helps to prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the internet. You can [audit network protection](evaluate-network-protection.md) in a test environment to view which apps would be blocked before you enable it. From aa6505c5669fb6aef0963c68c6b1173966078b5f Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Mon, 14 Dec 2020 23:15:33 +0530 Subject: [PATCH 010/161] update-4620497 updated --- .../microsoft-defender-atp/enable-siem-integration.md | 2 +- .../threat-protection/microsoft-defender-atp/evaluate-atp.md | 4 ++++ .../evaluate-attack-surface-reduction.md | 4 ++-- .../evaluate-controlled-folder-access.md | 5 ++--- .../microsoft-defender-atp/evaluate-exploit-protection.md | 5 ++--- .../microsoft-defender-atp/evaluate-network-protection.md | 5 ++--- .../microsoft-defender-atp/evaluation-lab.md | 1 + .../microsoft-defender-atp/event-error-codes.md | 3 +-- .../threat-protection/microsoft-defender-atp/event-views.md | 3 +-- .../microsoft-defender-atp/exploit-protection-reference.md | 2 +- .../microsoft-defender-atp/exploit-protection.md | 2 +- .../exposed-apis-create-app-nativeapp.md | 4 +++- .../exposed-apis-create-app-partners.md | 4 +++- .../microsoft-defender-atp/exposed-apis-create-app-webapp.md | 4 +++- .../exposed-apis-full-sample-powershell.md | 1 + .../microsoft-defender-atp/exposed-apis-list.md | 5 +++-- .../microsoft-defender-atp/exposed-apis-odata-samples.md | 2 +- .../microsoft-defender-atp/feedback-loop-blocking.md | 2 +- .../microsoft-defender-atp/fetch-alerts-mssp.md | 3 +-- .../threat-protection/microsoft-defender-atp/files.md | 5 +++-- .../microsoft-defender-atp/find-machine-info-by-ip.md | 3 +-- .../microsoft-defender-atp/find-machines-by-ip.md | 4 +++- .../microsoft-defender-atp/fix-unhealthy-sensors.md | 5 +++-- .../microsoft-defender-atp/get-alert-info-by-id.md | 4 +++- .../microsoft-defender-atp/get-alert-related-domain-info.md | 4 +++- 25 files changed, 50 insertions(+), 36 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration.md b/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration.md index c4e8e36cbe..acbd095de0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration.md @@ -21,9 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-enablesiem-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/evaluate-atp.md b/windows/security/threat-protection/microsoft-defender-atp/evaluate-atp.md index b80ba00b38..5c18b1f1f3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/evaluate-atp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/evaluate-atp.md @@ -22,6 +22,10 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) + [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) is a unified platform for preventative protection, post-breach detection, automated investigation, and response. diff --git a/windows/security/threat-protection/microsoft-defender-atp/evaluate-attack-surface-reduction.md b/windows/security/threat-protection/microsoft-defender-atp/evaluate-attack-surface-reduction.md index 4fdbaae9b9..b68960578e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/evaluate-attack-surface-reduction.md +++ b/windows/security/threat-protection/microsoft-defender-atp/evaluate-attack-surface-reduction.md @@ -20,8 +20,8 @@ manager: dansimp **Applies to:** - -* [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Attack surface reduction rules help prevent actions typically used by malware to compromise devices or networks. Set attack surface reduction rules for devices running any of the following editions and versions of Windows: diff --git a/windows/security/threat-protection/microsoft-defender-atp/evaluate-controlled-folder-access.md b/windows/security/threat-protection/microsoft-defender-atp/evaluate-controlled-folder-access.md index fb1a325c8e..80f5ef921b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/evaluate-controlled-folder-access.md +++ b/windows/security/threat-protection/microsoft-defender-atp/evaluate-controlled-folder-access.md @@ -18,10 +18,9 @@ manager: dansimp [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - -* [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) [Controlled folder access](controlled-folders.md) is a feature that helps protect your documents and files from modification by suspicious or malicious apps. Controlled folder access is supported on Windows Server 2019 and Windows 10 clients. diff --git a/windows/security/threat-protection/microsoft-defender-atp/evaluate-exploit-protection.md b/windows/security/threat-protection/microsoft-defender-atp/evaluate-exploit-protection.md index a6dcacc047..e3fe5e2405 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/evaluate-exploit-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/evaluate-exploit-protection.md @@ -20,10 +20,9 @@ manager: dansimp [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - -* [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) [Exploit protection](exploit-protection.md) helps protect devices from malware that uses exploits to spread and infect other devices. Mitigation can be applied to either the operating system or to an individual app. Many of the features that were part of the Enhanced Mitigation Experience Toolkit (EMET) are included in exploit protection. (The EMET has reached its end of support.) diff --git a/windows/security/threat-protection/microsoft-defender-atp/evaluate-network-protection.md b/windows/security/threat-protection/microsoft-defender-atp/evaluate-network-protection.md index 1da3fe309f..efd63bf88e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/evaluate-network-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/evaluate-network-protection.md @@ -18,10 +18,9 @@ manager: dansimp [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - -* [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) [Network protection](network-protection.md) helps prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet. diff --git a/windows/security/threat-protection/microsoft-defender-atp/evaluation-lab.md b/windows/security/threat-protection/microsoft-defender-atp/evaluation-lab.md index 64a0179395..cab8a166e5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/evaluation-lab.md +++ b/windows/security/threat-protection/microsoft-defender-atp/evaluation-lab.md @@ -24,6 +24,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Conducting a comprehensive security product evaluation can be a complex process requiring cumbersome environment and device configuration before an end-to-end attack simulation can actually be done. Adding to the complexity is the challenge of tracking where the simulation activities, alerts, and results are reflected during the evaluation. diff --git a/windows/security/threat-protection/microsoft-defender-atp/event-error-codes.md b/windows/security/threat-protection/microsoft-defender-atp/event-error-codes.md index a2b75300ee..b3abf41573 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/event-error-codes.md +++ b/windows/security/threat-protection/microsoft-defender-atp/event-error-codes.md @@ -25,10 +25,9 @@ ms.date: 05/21/2018 **Applies to:** - - Event Viewer - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) You can review event IDs in the [Event Viewer](https://msdn.microsoft.com/library/aa745633(v=bts.10).aspx) on individual devices. diff --git a/windows/security/threat-protection/microsoft-defender-atp/event-views.md b/windows/security/threat-protection/microsoft-defender-atp/event-views.md index 9edcad6d34..537ae66fba 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/event-views.md +++ b/windows/security/threat-protection/microsoft-defender-atp/event-views.md @@ -18,10 +18,9 @@ manager: dansimp [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Review attack surface reduction events in Event Viewer to monitor what rules or settings are working. You can also determine if any settings are too "noisy" or impacting your day to day workflow. diff --git a/windows/security/threat-protection/microsoft-defender-atp/exploit-protection-reference.md b/windows/security/threat-protection/microsoft-defender-atp/exploit-protection-reference.md index 99f4521685..c99763dbe5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exploit-protection-reference.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exploit-protection-reference.md @@ -23,8 +23,8 @@ ms.custom: asr **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Exploit protection provides advanced protections for applications that the IT Pro can apply after the developer has compiled and distributed the software. diff --git a/windows/security/threat-protection/microsoft-defender-atp/exploit-protection.md b/windows/security/threat-protection/microsoft-defender-atp/exploit-protection.md index b2ad6f832b..df8c81ac03 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exploit-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exploit-protection.md @@ -23,8 +23,8 @@ ms.custom: asr **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Exploit protection automatically applies a number of exploit mitigation techniques to operating system processes and apps. Exploit protection is supported beginning with Windows 10, version 1709 and Windows Server, version 1803. diff --git a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp.md index fb00021426..664047a980 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp.md @@ -22,7 +22,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-partners.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-partners.md index e2de608fbd..002f88d700 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-partners.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-partners.md @@ -22,7 +22,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) This page describes how to create an Azure Active Directory (Azure AD) application to get programmatic access to Microsoft Defender for Endpoint on behalf of your customers. diff --git a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-webapp.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-webapp.md index a7584847f9..be58ddf4f7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-webapp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-webapp.md @@ -22,7 +22,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-full-sample-powershell.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-full-sample-powershell.md index 31142c2936..9bbb48923a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-full-sample-powershell.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-full-sample-powershell.md @@ -24,6 +24,7 @@ ms.date: 09/24/2018 **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Full scenario using multiple APIs from Microsoft Defender for Endpoint. diff --git a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-list.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-list.md index 785ac39e0d..f2bdf9161e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-list.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-list.md @@ -21,8 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples.md index b4a487ffbe..149f11a777 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples.md @@ -23,8 +23,8 @@ ms.topic: article **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) If you are not familiar with OData queries, see: [OData V4 queries](https://www.odata.org/documentation/) diff --git a/windows/security/threat-protection/microsoft-defender-atp/feedback-loop-blocking.md b/windows/security/threat-protection/microsoft-defender-atp/feedback-loop-blocking.md index b5ac0c1ea5..196a3cbc5c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/feedback-loop-blocking.md +++ b/windows/security/threat-protection/microsoft-defender-atp/feedback-loop-blocking.md @@ -24,8 +24,8 @@ ms.collection: **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## Overview diff --git a/windows/security/threat-protection/microsoft-defender-atp/fetch-alerts-mssp.md b/windows/security/threat-protection/microsoft-defender-atp/fetch-alerts-mssp.md index a4f175566c..67ab98b39f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/fetch-alerts-mssp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/fetch-alerts-mssp.md @@ -21,10 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-mssp-support-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/files.md b/windows/security/threat-protection/microsoft-defender-atp/files.md index 6289c8645b..99f645027b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/files.md +++ b/windows/security/threat-protection/microsoft-defender-atp/files.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/find-machine-info-by-ip.md b/windows/security/threat-protection/microsoft-defender-atp/find-machine-info-by-ip.md index 0d640fa36f..dfaf917810 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/find-machine-info-by-ip.md +++ b/windows/security/threat-protection/microsoft-defender-atp/find-machine-info-by-ip.md @@ -20,10 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Find a device by internal IP. diff --git a/windows/security/threat-protection/microsoft-defender-atp/find-machines-by-ip.md b/windows/security/threat-protection/microsoft-defender-atp/find-machines-by-ip.md index 3db35c6164..7601f05097 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/find-machines-by-ip.md +++ b/windows/security/threat-protection/microsoft-defender-atp/find-machines-by-ip.md @@ -21,7 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/fix-unhealthy-sensors.md b/windows/security/threat-protection/microsoft-defender-atp/fix-unhealthy-sensors.md index ce92f63d99..50ab54a1ea 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/fix-unhealthy-sensors.md +++ b/windows/security/threat-protection/microsoft-defender-atp/fix-unhealthy-sensors.md @@ -22,8 +22,9 @@ ms.date: 11/06/2020 [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-fixsensor-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id.md index 07ac59b945..e0ca2e6ddc 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id.md @@ -21,7 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info.md index e9d18d97e7..8a9200d61e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info.md @@ -18,7 +18,9 @@ ms.topic: article # Get alert related domain information API -[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) **Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) From 8eb52d4c984f7d38640c4fc2d8628480bfaae6e5 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Tue, 15 Dec 2020 15:33:17 +0530 Subject: [PATCH 011/161] updated-4620497 updated --- .../microsoft-defender-atp/get-machine-by-id.md | 4 +++- .../get-machine-group-exposure-score.md | 5 +++-- .../microsoft-defender-atp/get-machine-log-on-users.md | 4 +++- .../microsoft-defender-atp/get-machine-related-alerts.md | 5 +++-- .../microsoft-defender-atp/get-machineaction-object.md | 5 +++-- .../microsoft-defender-atp/get-machineactions-collection.md | 5 +++-- .../microsoft-defender-atp/get-machinegroups-collection.md | 2 +- .../microsoft-defender-atp/get-machines-by-software.md | 3 +-- .../microsoft-defender-atp/get-machines-by-vulnerability.md | 2 +- .../threat-protection/microsoft-defender-atp/get-machines.md | 5 +++-- .../get-machinesecuritystates-collection.md | 2 +- .../microsoft-defender-atp/get-missing-kbs-machine.md | 5 +++-- .../microsoft-defender-atp/get-missing-kbs-software.md | 5 +++-- .../microsoft-defender-atp/get-package-sas-uri.md | 5 +++-- .../microsoft-defender-atp/get-recommendation-by-id.md | 4 +++- .../microsoft-defender-atp/get-recommendation-machines.md | 2 +- .../microsoft-defender-atp/get-recommendation-software.md | 2 +- .../get-recommendation-vulnerabilities.md | 2 +- .../microsoft-defender-atp/get-security-recommendations.md | 2 +- .../microsoft-defender-atp/get-software-by-id.md | 3 +-- .../microsoft-defender-atp/get-software-ver-distribution.md | 3 +-- .../threat-protection/microsoft-defender-atp/get-software.md | 5 +++-- .../get-started-partner-integration.md | 4 ++-- .../microsoft-defender-atp/get-ti-indicators-collection.md | 5 +++-- .../microsoft-defender-atp/get-user-information.md | 1 + 25 files changed, 52 insertions(+), 38 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md index 30fd9d4263..9e648b3be9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md @@ -21,7 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machine-group-exposure-score.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-group-exposure-score.md index 112ed575be..6b4d5f60fd 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machine-group-exposure-score.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machine-group-exposure-score.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users.md index 55bdffa21c..4c77e24fe8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users.md @@ -21,7 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md index 49e6162ab5..a057bf2c92 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object.md b/windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object.md index dc294c9002..cf8cfaad8d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection.md b/windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection.md index 026a5fe161..e4f2a768e1 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection.md b/windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection.md index 93f27a6093..9841f7c576 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection.md @@ -24,8 +24,8 @@ ms.date: 10/07/2018 **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Retrieves a collection of RBAC device groups. diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machines-by-software.md b/windows/security/threat-protection/microsoft-defender-atp/get-machines-by-software.md index 7490907216..62993cd270 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machines-by-software.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machines-by-software.md @@ -20,10 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) [!include[Prerelease information](../../includes/prerelease.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machines-by-vulnerability.md b/windows/security/threat-protection/microsoft-defender-atp/get-machines-by-vulnerability.md index bbd94f8b8d..7b710a1404 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machines-by-vulnerability.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machines-by-vulnerability.md @@ -21,8 +21,8 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) [!include[Prerelease information](../../includes/prerelease.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-machines.md index aef7e2789a..d51748fe3f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machines.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machinesecuritystates-collection.md b/windows/security/threat-protection/microsoft-defender-atp/get-machinesecuritystates-collection.md index aba82de482..280d18b74d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machinesecuritystates-collection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machinesecuritystates-collection.md @@ -23,8 +23,8 @@ ms.topic: article **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Retrieves a collection of devices security states. diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-missing-kbs-machine.md b/windows/security/threat-protection/microsoft-defender-atp/get-missing-kbs-machine.md index 52846f5bdf..a80f138899 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-missing-kbs-machine.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-missing-kbs-machine.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-missing-kbs-software.md b/windows/security/threat-protection/microsoft-defender-atp/get-missing-kbs-software.md index 21506f3767..6c0b32d5ce 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-missing-kbs-software.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-missing-kbs-software.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri.md b/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri.md index ffd04c4f62..0b97089136 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-by-id.md index 79fcaae0ff..dfae95f8ae 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-by-id.md @@ -20,7 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) [!include[Prerelease information](../../includes/prerelease.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-machines.md index 079ab2c449..cac55e2fd4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-machines.md @@ -21,8 +21,8 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) [!include[Prerelease information](../../includes/prerelease.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-software.md b/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-software.md index 0656c420e8..bc7bbbcec6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-software.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-software.md @@ -21,8 +21,8 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) [!include[Prerelease information](../../includes/prerelease.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-vulnerabilities.md b/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-vulnerabilities.md index 95b525bf6b..c8a141d029 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-vulnerabilities.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-vulnerabilities.md @@ -21,8 +21,8 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) [!include[Prerelease information](../../includes/prerelease.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-security-recommendations.md b/windows/security/threat-protection/microsoft-defender-atp/get-security-recommendations.md index 91a19e9c18..076be92fab 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-security-recommendations.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-security-recommendations.md @@ -21,8 +21,8 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) [!include[Prerelease information](../../includes/prerelease.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-software-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/get-software-by-id.md index 07550126c1..8401627e8b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-software-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-software-by-id.md @@ -20,10 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) [!include[Prerelease information](../../includes/prerelease.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-software-ver-distribution.md b/windows/security/threat-protection/microsoft-defender-atp/get-software-ver-distribution.md index 7ae8324de9..2fa4f7dc0a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-software-ver-distribution.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-software-ver-distribution.md @@ -20,10 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) [!include[Prerelease information](../../includes/prerelease.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-software.md b/windows/security/threat-protection/microsoft-defender-atp/get-software.md index 6a02de62a0..ea42920222 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-software.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-software.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-started-partner-integration.md b/windows/security/threat-protection/microsoft-defender-atp/get-started-partner-integration.md index 143d90bb1d..3e8c554d07 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-started-partner-integration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-started-partner-integration.md @@ -22,9 +22,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** +**Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) To become a Defender for Endpoint solution partner, you'll need to follow and complete the following steps. diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-ti-indicators-collection.md b/windows/security/threat-protection/microsoft-defender-atp/get-ti-indicators-collection.md index ea42bf22ac..98dd3048d2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-ti-indicators-collection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-ti-indicators-collection.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-user-information.md b/windows/security/threat-protection/microsoft-defender-atp/get-user-information.md index bc5b69d9cd..31718ea18c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-user-information.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-user-information.md @@ -22,6 +22,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Retrieve a User entity by key (user name). From a40b8a23a8bd7d1e9827a45ffbd7ccba810ad70c Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Tue, 15 Dec 2020 21:31:32 +0530 Subject: [PATCH 012/161] updated-4620497 updated --- .../microsoft-defender-atp/get-user-related-alerts.md | 5 +++-- .../microsoft-defender-atp/get-user-related-machines.md | 5 +++-- .../microsoft-defender-atp/get-vuln-by-software.md | 3 +-- .../microsoft-defender-atp/get-vulnerability-by-id.md | 1 + .../security/threat-protection/microsoft-defender-atp/gov.md | 1 + .../microsoft-defender-atp/grant-mssp-access.md | 3 +-- .../microsoft-defender-atp/helpful-resources.md | 1 + .../import-export-exploit-protection-emet-xml.md | 4 ++-- .../microsoft-defender-atp/indicator-certificates.md | 1 + .../microsoft-defender-atp/indicator-file.md | 1 + .../microsoft-defender-atp/indicator-ip-domain.md | 2 +- .../microsoft-defender-atp/indicator-manage.md | 1 + .../information-protection-in-windows-overview.md | 2 +- .../information-protection-investigation.md | 2 +- .../microsoft-defender-atp/initiate-autoir-investigation.md | 5 +++-- .../microsoft-defender-atp/investigate-alerts.md | 2 +- .../microsoft-defender-atp/investigate-behind-proxy.md | 2 +- .../microsoft-defender-atp/investigate-domain.md | 3 +-- .../microsoft-defender-atp/investigate-files.md | 2 +- .../microsoft-defender-atp/investigate-incidents.md | 1 + .../microsoft-defender-atp/investigate-ip.md | 2 +- .../microsoft-defender-atp/investigate-machines.md | 2 +- .../microsoft-defender-atp/investigate-user.md | 2 +- .../microsoft-defender-atp/investigation.md | 5 +++-- .../microsoft-defender-atp/ios-configure-features.md | 4 ++++ 25 files changed, 37 insertions(+), 25 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts.md index b6282b18f3..c33872be0e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines.md index 33fbf7f79a..55c5367cdf 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-vuln-by-software.md b/windows/security/threat-protection/microsoft-defender-atp/get-vuln-by-software.md index ac266cf40f..1b88d6ba58 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-vuln-by-software.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-vuln-by-software.md @@ -20,10 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) [!include[Prerelease information](../../includes/prerelease.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-vulnerability-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/get-vulnerability-by-id.md index 3e66207db5..ddfe9b7613 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-vulnerability-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-vulnerability-by-id.md @@ -22,6 +22,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) [!include[Prerelease information](../../includes/prerelease.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/gov.md b/windows/security/threat-protection/microsoft-defender-atp/gov.md index af348b95bc..ddeee9fffc 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/gov.md +++ b/windows/security/threat-protection/microsoft-defender-atp/gov.md @@ -24,6 +24,7 @@ ms.topic: conceptual **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Microsoft Defender for Endpoint for US Government Community Cloud High (GCC High) customers, built in the US Azure Government environment, uses the same underlying technologies as Defender for Endpoint in Azure Commercial. diff --git a/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md b/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md index f62c3b418f..131b074f3b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md +++ b/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md @@ -21,10 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-mssp-support-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/helpful-resources.md b/windows/security/threat-protection/microsoft-defender-atp/helpful-resources.md index adc3dd0a3b..e25dc5ca9d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/helpful-resources.md +++ b/windows/security/threat-protection/microsoft-defender-atp/helpful-resources.md @@ -24,6 +24,7 @@ ms.topic: conceptual **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Access helpful resources such as links to blogs and other resources related to Microsoft Defender for Endpoint. diff --git a/windows/security/threat-protection/microsoft-defender-atp/import-export-exploit-protection-emet-xml.md b/windows/security/threat-protection/microsoft-defender-atp/import-export-exploit-protection-emet-xml.md index f496d2d153..8647909960 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/import-export-exploit-protection-emet-xml.md +++ b/windows/security/threat-protection/microsoft-defender-atp/import-export-exploit-protection-emet-xml.md @@ -21,8 +21,8 @@ manager: dansimp **Applies to:** - -* [Microsoft Defender for Endpoint](microsoft-defender-advanced-threat-protection.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Exploit protection helps protect devices from malware that use exploits to spread and infect. It consists of a number of mitigations that can be applied at either the operating system level, or at the individual app level. diff --git a/windows/security/threat-protection/microsoft-defender-atp/indicator-certificates.md b/windows/security/threat-protection/microsoft-defender-atp/indicator-certificates.md index f0439ebf7f..71da3d2842 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/indicator-certificates.md +++ b/windows/security/threat-protection/microsoft-defender-atp/indicator-certificates.md @@ -25,6 +25,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automationexclusionlist-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/indicator-file.md b/windows/security/threat-protection/microsoft-defender-atp/indicator-file.md index 3e7b8c855d..ec6a1043c3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/indicator-file.md +++ b/windows/security/threat-protection/microsoft-defender-atp/indicator-file.md @@ -25,6 +25,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automationexclusionlist-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/indicator-ip-domain.md b/windows/security/threat-protection/microsoft-defender-atp/indicator-ip-domain.md index 800f2e0f16..3639845fad 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/indicator-ip-domain.md +++ b/windows/security/threat-protection/microsoft-defender-atp/indicator-ip-domain.md @@ -22,9 +22,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automationexclusionlist-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/indicator-manage.md b/windows/security/threat-protection/microsoft-defender-atp/indicator-manage.md index 569a727336..81c7f458a4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/indicator-manage.md +++ b/windows/security/threat-protection/microsoft-defender-atp/indicator-manage.md @@ -25,6 +25,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automationexclusionlist-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md b/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md index 74f53cc04c..31dcd3c313 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md @@ -23,8 +23,8 @@ ms.topic: conceptual **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) [!include[Prerelease information](../../includes/prerelease.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/information-protection-investigation.md b/windows/security/threat-protection/microsoft-defender-atp/information-protection-investigation.md index 30a7574c30..4c4156700e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/information-protection-investigation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/information-protection-investigation.md @@ -22,8 +22,8 @@ ms.topic: article **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) A typical advanced persistent threat lifecycle involves data exfiltration. In a security incident, it's important to have the ability to prioritize investigations where sensitive files may be jeopardy so that corporate data and information are protected. diff --git a/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md b/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md index 683be6e6bf..dbc21b4bd8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-alerts.md index e9ad5814eb..c4e01d5884 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-alerts.md @@ -26,8 +26,8 @@ ms.date: 04/24/2018 **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-behind-proxy.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-behind-proxy.md index 42e6837413..33186852c6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-behind-proxy.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-behind-proxy.md @@ -25,8 +25,8 @@ ms.topic: article **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigatemachines-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-domain.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-domain.md index bee61aaabc..a8dfc081a7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-domain.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-domain.md @@ -25,9 +25,8 @@ ms.date: 04/24/2018 **Applies to:** - - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-files.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-files.md index a9e415015a..3ca7969948 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-files.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-files.md @@ -26,8 +26,8 @@ ms.date: 04/24/2018 **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigatefiles-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-incidents.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-incidents.md index 003cb02227..1eb70e5f19 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-incidents.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-incidents.md @@ -26,6 +26,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Investigate incidents that affect your network, understand what they mean, and collate evidence to resolve them. diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-ip.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-ip.md index 3647ff20ed..0bdd9fb21d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-ip.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-ip.md @@ -26,8 +26,8 @@ ms.date: 04/24/2018 **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigateip-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-machines.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-machines.md index c08d0c02f2..a7c48aa610 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-machines.md @@ -25,8 +25,8 @@ ms.topic: article **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigatemachines-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-user.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-user.md index 292ee98eec..f2bfd13fa8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-user.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-user.md @@ -25,8 +25,8 @@ ms.date: 04/24/2018 **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigatgeuser-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigation.md b/windows/security/threat-protection/microsoft-defender-atp/investigation.md index 9a079ca9cb..aff16dc0e4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigation.md @@ -22,8 +22,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/ios-configure-features.md b/windows/security/threat-protection/microsoft-defender-atp/ios-configure-features.md index 6c50645b1f..daef5c685b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/ios-configure-features.md +++ b/windows/security/threat-protection/microsoft-defender-atp/ios-configure-features.md @@ -24,6 +24,10 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) + > [!NOTE] > Defender for Endpoint for iOS would use a VPN in order to provide the Web Protection feature. This is not a regular VPN and is a local/self-looping VPN that does not take traffic outside the device. From 7dbd48b899e1df8e4472527359c78e53ccd21da5 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Tue, 15 Dec 2020 22:21:52 +0530 Subject: [PATCH 013/161] updated-4620497 updated --- .../threat-protection/microsoft-defender-atp/ios-install.md | 4 ++++ .../threat-protection/microsoft-defender-atp/ios-privacy.md | 4 ++-- .../threat-protection/microsoft-defender-atp/ios-terms.md | 4 ++++ .../microsoft-defender-atp/isolate-machine.md | 4 +++- .../microsoft-defender-atp/linux-exclusions.md | 4 ++-- .../microsoft-defender-atp/linux-install-manually.md | 4 ++-- .../microsoft-defender-atp/linux-install-with-ansible.md | 4 ++-- .../microsoft-defender-atp/linux-install-with-puppet.md | 4 ++-- .../microsoft-defender-atp/linux-preferences.md | 4 ++-- .../microsoft-defender-atp/linux-privacy.md | 4 ++-- .../threat-protection/microsoft-defender-atp/linux-pua.md | 4 ++-- .../microsoft-defender-atp/linux-resources.md | 4 ++-- .../linux-static-proxy-configuration.md | 4 ++-- .../microsoft-defender-atp/linux-support-connectivity.md | 4 ++-- .../microsoft-defender-atp/linux-support-install.md | 4 ++-- .../microsoft-defender-atp/linux-support-perf.md | 4 ++-- .../microsoft-defender-atp/linux-updates.md | 4 ++-- .../microsoft-defender-atp/live-response-command-examples.md | 3 ++- .../microsoft-defender-atp/live-response.md | 3 +-- .../microsoft-defender-atp/mac-exclusions.md | 4 ++-- .../microsoft-defender-atp/mac-install-jamfpro-login.md | 5 ++--- .../microsoft-defender-atp/mac-install-manually.md | 4 ++-- .../microsoft-defender-atp/mac-install-with-jamf.md | 4 ++-- .../microsoft-defender-atp/mac-install-with-other-mdm.md | 4 ++-- .../microsoft-defender-atp/mac-jamfpro-device-groups.md | 5 ++--- .../microsoft-defender-atp/mac-jamfpro-enroll-devices.md | 4 ++-- 26 files changed, 56 insertions(+), 48 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/ios-install.md b/windows/security/threat-protection/microsoft-defender-atp/ios-install.md index 6f0005e8b9..855be33f20 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/ios-install.md +++ b/windows/security/threat-protection/microsoft-defender-atp/ios-install.md @@ -24,6 +24,10 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) + This topic describes deploying Defender for Endpoint for iOS on Intune Company Portal enrolled devices. For more information about Intune device enrollment, see [Enroll iOS/iPadOS devices in Intune](https://docs.microsoft.com/mem/intune/enrollment/ios-enroll). ## Before you begin diff --git a/windows/security/threat-protection/microsoft-defender-atp/ios-privacy.md b/windows/security/threat-protection/microsoft-defender-atp/ios-privacy.md index 361ee24da1..bea4f8b740 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/ios-privacy.md +++ b/windows/security/threat-protection/microsoft-defender-atp/ios-privacy.md @@ -23,8 +23,8 @@ ms.topic: conceptual # Privacy information - Microsoft Defender for Endpoint for iOS **Applies to:** - -- [Microsoft Defender for Endpoint](microsoft-defender-atp-ios.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) > [!NOTE] > Defender for Endpoint for iOS uses a VPN to provide the Web Protection feature. This is not a regular VPN and is a local or self-looping VPN that does not take traffic outside the device. **Microsoft or your organization, does not see your browsing activity.** diff --git a/windows/security/threat-protection/microsoft-defender-atp/ios-terms.md b/windows/security/threat-protection/microsoft-defender-atp/ios-terms.md index 997e5ed226..99c2a1585c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/ios-terms.md +++ b/windows/security/threat-protection/microsoft-defender-atp/ios-terms.md @@ -25,6 +25,10 @@ hideEdit: true [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) + ## MICROSOFT APPLICATION LICENSE TERMS: MICROSOFT DEFENDER FOR ENDPOINT diff --git a/windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md b/windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md index 98cfaa0d40..b6bf991bcf 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md +++ b/windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md @@ -21,7 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-exclusions.md b/windows/security/threat-protection/microsoft-defender-atp/linux-exclusions.md index e1e14ad345..2a939b7865 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-exclusions.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-exclusions.md @@ -25,8 +25,8 @@ ms.topic: conceptual **Applies to:** - -- [Microsoft Defender for Endpoint for Linux](microsoft-defender-atp-linux.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) This article provides information on how to define exclusions that apply to on-demand scans, and real-time protection and monitoring. diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-install-manually.md b/windows/security/threat-protection/microsoft-defender-atp/linux-install-manually.md index 0b7026d467..31cdf4d0ee 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-install-manually.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-install-manually.md @@ -26,8 +26,8 @@ ms.topic: conceptual **Applies to:** - -- [Microsoft Defender for Endpoint for Linux](microsoft-defender-atp-linux.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) This article describes how to deploy Microsoft Defender for Endpoint for Linux manually. A successful deployment requires the completion of all of the following tasks: diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-install-with-ansible.md b/windows/security/threat-protection/microsoft-defender-atp/linux-install-with-ansible.md index 35fe0795ab..d20dbb61df 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-install-with-ansible.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-install-with-ansible.md @@ -26,8 +26,8 @@ ms.topic: conceptual **Applies to:** - -- [Microsoft Defender for Endpoint for Linux](microsoft-defender-atp-linux.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) This article describes how to deploy Defender for Endpoint for Linux using Ansible. A successful deployment requires the completion of all of the following tasks: diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-install-with-puppet.md b/windows/security/threat-protection/microsoft-defender-atp/linux-install-with-puppet.md index 46100ac983..131154d289 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-install-with-puppet.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-install-with-puppet.md @@ -26,8 +26,8 @@ ms.topic: conceptual **Applies to:** - -- [Microsoft Defender for Endpoint for Linux](microsoft-defender-atp-linux.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) This article describes how to deploy Defender for Endpoint for Linux using Puppet. A successful deployment requires the completion of all of the following tasks: diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-preferences.md b/windows/security/threat-protection/microsoft-defender-atp/linux-preferences.md index 2ec4ae0d08..ec07346a41 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-preferences.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-preferences.md @@ -26,8 +26,8 @@ ms.topic: conceptual **Applies to:** - -- [Microsoft Defender for Endpoint for Linux](microsoft-defender-atp-linux.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >[!IMPORTANT] >This topic contains instructions for how to set preferences for Defender for Endpoint for Linux in enterprise environments. If you are interested in configuring the product on a device from the command-line, see [Resources](linux-resources.md#configure-from-the-command-line). diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-privacy.md b/windows/security/threat-protection/microsoft-defender-atp/linux-privacy.md index 28afe2d32b..c07a3578a6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-privacy.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-privacy.md @@ -23,8 +23,8 @@ ms.topic: conceptual **Applies to:** - -- [Microsoft Defender for Endpoint](microsoft-defender-atp-linux.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Microsoft is committed to providing you with the information and controls you need to make choices about how your data is collected and used when you’re using Defender for Endpoint for Linux. diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-pua.md b/windows/security/threat-protection/microsoft-defender-atp/linux-pua.md index ff2da099a2..68e7f23b4e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-pua.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-pua.md @@ -25,8 +25,8 @@ ms.topic: conceptual **Applies to:** - -- [Microsoft Defender for Endpoint for Linux](microsoft-defender-atp-linux.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) The potentially unwanted application (PUA) protection feature in Defender for Endpoint for Linux can detect and block PUA files on endpoints in your network. diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-resources.md b/windows/security/threat-protection/microsoft-defender-atp/linux-resources.md index 3b12f36855..73987788c9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-resources.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-resources.md @@ -26,8 +26,8 @@ ms.topic: conceptual **Applies to:** - -- [Microsoft Defender for Endpoint for Linux](microsoft-defender-atp-linux.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## Collect diagnostic information diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-static-proxy-configuration.md b/windows/security/threat-protection/microsoft-defender-atp/linux-static-proxy-configuration.md index 6f0bf1667a..5c05635456 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-static-proxy-configuration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-static-proxy-configuration.md @@ -26,8 +26,8 @@ ms.topic: conceptual **Applies to:** - -- [Microsoft Defender for Endpoint for Linux](microsoft-defender-atp-linux.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Microsoft Defender ATP can discover a proxy server using the ```HTTPS_PROXY``` environment variable. This setting must be configured **both** at installation time and after the product has been installed. diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-support-connectivity.md b/windows/security/threat-protection/microsoft-defender-atp/linux-support-connectivity.md index 74db615cdb..7ddf65b664 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-support-connectivity.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-support-connectivity.md @@ -26,8 +26,8 @@ ms.topic: conceptual **Applies to:** - -- [Microsoft Defender for Endpoint for Linux](microsoft-defender-atp-linux.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## Run the connectivity test diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-support-install.md b/windows/security/threat-protection/microsoft-defender-atp/linux-support-install.md index 9a2bf09a0d..31e67a513e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-support-install.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-support-install.md @@ -26,8 +26,8 @@ ms.topic: conceptual **Applies to:** - -- [Microsoft Defender for Endpoint for Linux](microsoft-defender-atp-linux.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## Verify if installation succeeded diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-support-perf.md b/windows/security/threat-protection/microsoft-defender-atp/linux-support-perf.md index e6585fc97f..cc909e9afa 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-support-perf.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-support-perf.md @@ -25,8 +25,8 @@ ms.topic: conceptual **Applies to:** - -- [Microsoft Defender for Endpoint for Linux](microsoft-defender-atp-linux.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) This article provides some general steps that can be used to narrow down performance issues related to Defender for Endpoint for Linux. diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-updates.md b/windows/security/threat-protection/microsoft-defender-atp/linux-updates.md index 7c9fe1e51e..de5f4532b8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-updates.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-updates.md @@ -26,8 +26,8 @@ ms.topic: conceptual **Applies to:** - -- [Microsoft Defender for Endpoint for Linux](microsoft-defender-atp-linux.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Microsoft regularly publishes software updates to improve performance, security, and to deliver new features. diff --git a/windows/security/threat-protection/microsoft-defender-atp/live-response-command-examples.md b/windows/security/threat-protection/microsoft-defender-atp/live-response-command-examples.md index 7c5bb16771..db9749d0f9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/live-response-command-examples.md +++ b/windows/security/threat-protection/microsoft-defender-atp/live-response-command-examples.md @@ -23,7 +23,8 @@ ms.topic: article **Applies to:** -- [Microsoft Defender for Endpoint](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Learn about common commands used in live response and see examples on how they are typically used. diff --git a/windows/security/threat-protection/microsoft-defender-atp/live-response.md b/windows/security/threat-protection/microsoft-defender-atp/live-response.md index 312550fb3f..0b5318d4af 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/live-response.md +++ b/windows/security/threat-protection/microsoft-defender-atp/live-response.md @@ -21,10 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Live response gives security operations teams instantaneous access to a device (also referred to as a machine) using a remote shell connection. This gives you the power to do in-depth investigative work and take immediate response actions to promptly contain identified threats—in real time. diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-exclusions.md b/windows/security/threat-protection/microsoft-defender-atp/mac-exclusions.md index 2e17fbc6fd..1a5a15f330 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-exclusions.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-exclusions.md @@ -25,8 +25,8 @@ ms.topic: conceptual **Applies to:** - -- [Microsoft Defender for Endpoint for Mac](microsoft-defender-atp-mac.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) This article provides information on how to define exclusions that apply to on-demand scans, and real-time protection and monitoring. diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-install-jamfpro-login.md b/windows/security/threat-protection/microsoft-defender-atp/mac-install-jamfpro-login.md index d1f6337306..27de5d44de 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-install-jamfpro-login.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-install-jamfpro-login.md @@ -23,10 +23,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - -- [Microsoft Defender for Endpoint for Mac](microsoft-defender-atp-mac.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) 1. Enter your credentials. diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-install-manually.md b/windows/security/threat-protection/microsoft-defender-atp/mac-install-manually.md index 7f15b5ad73..064657b978 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-install-manually.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-install-manually.md @@ -25,8 +25,8 @@ ms.topic: conceptual **Applies to:** - -- [Microsoft Defender for Endpoint for macOS](microsoft-defender-atp-mac.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) This topic describes how to deploy Microsoft Defender for Endpoint for macOS manually. A successful deployment requires the completion of all of the following steps: - [Download installation and onboarding packages](#download-installation-and-onboarding-packages) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-jamf.md b/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-jamf.md index fccf7ab83a..4d8f5b0a59 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-jamf.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-jamf.md @@ -25,8 +25,8 @@ ms.topic: conceptual **Applies to:** - -- [Microsoft Defender for Endpoint for Mac](microsoft-defender-atp-mac.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Learn how to deploy Microsoft Defender for Endpoint for macOS with Jamf Pro. diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-other-mdm.md b/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-other-mdm.md index 509a722b64..044e4550e7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-other-mdm.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-other-mdm.md @@ -25,8 +25,8 @@ ms.topic: conceptual **Applies to:** - -- [Microsoft Defender for Endpoint for Mac](microsoft-defender-atp-mac.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## Prerequisites and system requirements diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-jamfpro-device-groups.md b/windows/security/threat-protection/microsoft-defender-atp/mac-jamfpro-device-groups.md index d0bde6a3d1..327ec51d6f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-jamfpro-device-groups.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-jamfpro-device-groups.md @@ -23,10 +23,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - -- [Microsoft Defender for Endpoint for Mac](microsoft-defender-atp-mac.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Set up the device groups similar to Group policy organizational unite (OUs), Microsoft Endpoint Configuration Manager's device collection, and Intune's device groups. diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-jamfpro-enroll-devices.md b/windows/security/threat-protection/microsoft-defender-atp/mac-jamfpro-enroll-devices.md index d6954e0d90..7e2a462130 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-jamfpro-enroll-devices.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-jamfpro-enroll-devices.md @@ -25,8 +25,8 @@ ms.topic: conceptual **Applies to:** - -- [Microsoft Defender for Endpoint for Mac](microsoft-defender-atp-mac.md) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## Enroll macOS devices From 98d3fa51358879cbdacdea9b4bdafe8f580d261c Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Wed, 16 Dec 2020 15:34:13 +0530 Subject: [PATCH 014/161] updated-4620497 updated --- .../microsoft-defender-atp/raw-data-export-event-hub.md | 2 +- .../microsoft-defender-atp/raw-data-export-storage.md | 2 +- .../microsoft-defender-atp/raw-data-export.md | 3 +-- .../threat-protection/microsoft-defender-atp/rbac.md | 1 + .../microsoft-defender-atp/recommendation.md | 4 +++- .../microsoft-defender-atp/respond-file-alerts.md | 2 +- .../microsoft-defender-atp/respond-machine-alerts.md | 2 +- .../microsoft-defender-atp/restrict-code-execution.md | 5 +++-- .../microsoft-defender-atp/review-alerts.md | 2 +- .../microsoft-defender-atp/run-advanced-query-api.md | 5 +++-- .../run-advanced-query-sample-powershell.md | 1 + .../run-advanced-query-sample-python.md | 2 +- .../threat-protection/microsoft-defender-atp/run-av-scan.md | 5 +++-- .../microsoft-defender-atp/run-detection-test.md | 1 + .../threat-protection/microsoft-defender-atp/score.md | 4 +++- .../microsoft-defender-atp/security-operations-dashboard.md | 1 + .../microsoft-defender-atp/service-status.md | 1 + .../microsoft-defender-atp/set-device-value.md | 5 +++-- .../threat-protection/microsoft-defender-atp/software.md | 5 +++-- .../microsoft-defender-atp/stop-and-quarantine-file.md | 5 +++-- .../microsoft-defender-atp/supported-response-apis.md | 2 +- .../threat-analytics-analyst-reports.md | 2 ++ .../microsoft-defender-atp/threat-analytics.md | 1 + .../threat-and-vuln-mgt-event-timeline.md | 1 + .../microsoft-defender-atp/threat-indicator-concepts.md | 2 +- .../microsoft-defender-atp/threat-protection-integration.md | 2 +- 26 files changed, 43 insertions(+), 25 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/raw-data-export-event-hub.md b/windows/security/threat-protection/microsoft-defender-atp/raw-data-export-event-hub.md index d04e995194..da5a855d90 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/raw-data-export-event-hub.md +++ b/windows/security/threat-protection/microsoft-defender-atp/raw-data-export-event-hub.md @@ -23,8 +23,8 @@ ms.topic: article **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-configuresiem-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/raw-data-export-storage.md b/windows/security/threat-protection/microsoft-defender-atp/raw-data-export-storage.md index 8dae2a2358..6ae21ac206 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/raw-data-export-storage.md +++ b/windows/security/threat-protection/microsoft-defender-atp/raw-data-export-storage.md @@ -23,8 +23,8 @@ ms.topic: article **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-configuresiem-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/raw-data-export.md b/windows/security/threat-protection/microsoft-defender-atp/raw-data-export.md index d619e6803f..b9d7dfab14 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/raw-data-export.md +++ b/windows/security/threat-protection/microsoft-defender-atp/raw-data-export.md @@ -21,10 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-configuresiem-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/rbac.md b/windows/security/threat-protection/microsoft-defender-atp/rbac.md index 754b84fd55..e47350fff9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/rbac.md +++ b/windows/security/threat-protection/microsoft-defender-atp/rbac.md @@ -25,6 +25,7 @@ ms.topic: article - Azure Active Directory - Office 365 - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-rbac-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/recommendation.md b/windows/security/threat-protection/microsoft-defender-atp/recommendation.md index 4d71206462..a295402e97 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/recommendation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/recommendation.md @@ -21,7 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md index 354a099a61..b9e3f1547e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md @@ -23,8 +23,8 @@ ms.topic: article **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) [!include[Prerelease information](../../includes/prerelease.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts.md index 4bb5a90936..f26ce2ebc3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts.md @@ -21,9 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-respondmachine-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution.md b/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution.md index 414c106934..69fed7db3a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution.md +++ b/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md index d32c73580f..a59e5cda78 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md @@ -24,8 +24,8 @@ ms.date: 5/1/2020 **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-managealerts-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api.md b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api.md index ce6887fc58..e6c6954a3f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api.md +++ b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api.md @@ -21,8 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-powershell.md b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-powershell.md index cc1e69bc35..0f91e18e73 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-powershell.md +++ b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-powershell.md @@ -23,6 +23,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Run advanced queries using PowerShell, see [Advanced Hunting API](run-advanced-query-api.md). diff --git a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-python.md b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-python.md index c7d5c9e145..fe714301b5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-python.md +++ b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-python.md @@ -23,8 +23,8 @@ ms.topic: article **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Run advanced queries using Python, see [Advanced Hunting API](run-advanced-query-api.md). diff --git a/windows/security/threat-protection/microsoft-defender-atp/run-av-scan.md b/windows/security/threat-protection/microsoft-defender-atp/run-av-scan.md index 9525f7a282..be84de1b82 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/run-av-scan.md +++ b/windows/security/threat-protection/microsoft-defender-atp/run-av-scan.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/run-detection-test.md b/windows/security/threat-protection/microsoft-defender-atp/run-detection-test.md index 0ade180410..f37177fc33 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/run-detection-test.md +++ b/windows/security/threat-protection/microsoft-defender-atp/run-detection-test.md @@ -31,6 +31,7 @@ ms.topic: article - Windows Server, version 1803 - Windows Server, 2019 - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Run the following PowerShell script on a newly onboarded device to verify that it is properly reporting to the Defender for Endpoint service. diff --git a/windows/security/threat-protection/microsoft-defender-atp/score.md b/windows/security/threat-protection/microsoft-defender-atp/score.md index d911b24cb2..4807947a54 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/score.md +++ b/windows/security/threat-protection/microsoft-defender-atp/score.md @@ -21,7 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard.md b/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard.md index e0b381b7f9..a7ae6c2563 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard.md @@ -24,6 +24,7 @@ ms.topic: conceptual **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-secopsdashboard-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/service-status.md b/windows/security/threat-protection/microsoft-defender-atp/service-status.md index fb69f1e1c3..aa3d9f6079 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/service-status.md +++ b/windows/security/threat-protection/microsoft-defender-atp/service-status.md @@ -24,6 +24,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/set-device-value.md b/windows/security/threat-protection/microsoft-defender-atp/set-device-value.md index b2a76a6693..e58f039091 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/set-device-value.md +++ b/windows/security/threat-protection/microsoft-defender-atp/set-device-value.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/software.md b/windows/security/threat-protection/microsoft-defender-atp/software.md index 617a6c15ec..06db1a9495 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/software.md +++ b/windows/security/threat-protection/microsoft-defender-atp/software.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/stop-and-quarantine-file.md b/windows/security/threat-protection/microsoft-defender-atp/stop-and-quarantine-file.md index a91edcf37d..aa446e46d4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/stop-and-quarantine-file.md +++ b/windows/security/threat-protection/microsoft-defender-atp/stop-and-quarantine-file.md @@ -20,8 +20,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/supported-response-apis.md b/windows/security/threat-protection/microsoft-defender-atp/supported-response-apis.md index 96ca537f4d..f9a4e43fdb 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/supported-response-apis.md +++ b/windows/security/threat-protection/microsoft-defender-atp/supported-response-apis.md @@ -21,9 +21,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) > [!TIP] > Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-supported-response-apis-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-analytics-analyst-reports.md b/windows/security/threat-protection/microsoft-defender-atp/threat-analytics-analyst-reports.md index 30c8152b76..827b287561 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-analytics-analyst-reports.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-analytics-analyst-reports.md @@ -24,6 +24,8 @@ ms.topic: article **Applies to:** - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) Each [threat analytics report](threat-analytics.md) includes dynamic sections and a comprehensive written section called the _analyst report_. To access this section, open the report about the tracked threat and select the **Analyst report** tab. diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md b/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md index 5618f4c5a4..b89d527578 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md @@ -26,6 +26,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) With more sophisticated adversaries and new threats emerging frequently and prevalently, it's critical to be able to quickly: diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-event-timeline.md b/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-event-timeline.md index 32cb4825cb..8fc72f635f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-event-timeline.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-event-timeline.md @@ -25,6 +25,7 @@ ms.topic: conceptual **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-indicator-concepts.md b/windows/security/threat-protection/microsoft-defender-atp/threat-indicator-concepts.md index b59077b758..bea0024d32 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-indicator-concepts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-indicator-concepts.md @@ -21,9 +21,9 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-protection-integration.md b/windows/security/threat-protection/microsoft-defender-atp/threat-protection-integration.md index 133bcab341..68a8596c02 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-protection-integration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-protection-integration.md @@ -23,8 +23,8 @@ ms.topic: conceptual **Applies to:** - - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ## Integrate with other Microsoft solutions From 160a681717910a51c9720e9bb1421d97d897d72f Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Thomas=20Sj=C3=B6gren?= Date: Sat, 2 Jan 2021 22:19:46 +0100 Subject: [PATCH 015/161] format ansible code examples and add DNF/YUM key instructions MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Thomas Sjögren --- .../linux-install-with-ansible.md | 72 ++++++++++--------- 1 file changed, 39 insertions(+), 33 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-install-with-ansible.md b/windows/security/threat-protection/microsoft-defender-atp/linux-install-with-ansible.md index 35fe0795ab..4038766505 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-install-with-ansible.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-install-with-ansible.md @@ -14,9 +14,9 @@ author: dansimp ms.localizationpriority: medium manager: dansimp audience: ITPro -ms.collection: -- m365-security-compliance -- m365initiative-defender-endpoint +ms.collection: +- m365-security-compliance +- m365initiative-defender-endpoint ms.topic: conceptual --- @@ -140,28 +140,34 @@ Create a subtask or role files that contribute to an playbook or task. ```bash - name: Add Microsoft APT key - apt_key: - keyserver: https://packages.microsoft.com/ - id: BC528686B50D79E339D3721CEB3E94ADBE1229CF - when: ansible_os_family == "Debian" + apt_key: + keyserver: https://packages.microsoft.com/ + id: BC528686B50D79E339D3721CEB3E94ADBE1229CF + when: ansible_os_family == "Debian" - name: Add Microsoft apt repository for MDATP - apt_repository: - repo: deb [arch=arm64,armhf,amd64] https://packages.microsoft.com/[distro]/[version]/prod [channel] main - update_cache: yes - state: present - filename: microsoft-[channel].list - when: ansible_os_family == "Debian" + apt_repository: + repo: deb [arch=arm64,armhf,amd64] https://packages.microsoft.com/[distro]/[version]/prod [channel] main + update_cache: yes + state: present + filename: microsoft-[channel].list + when: ansible_os_family == "Debian" + + - name: Add Microsoft DNF/YUM key + rpm_key: + state: present + key: https://packages.microsoft.com/keys/microsoft.asc + when: ansible_os_family == "RedHat" - name: Add Microsoft yum repository for MDATP - yum_repository: - name: packages-microsoft-com-prod-[channel] - description: Microsoft Defender for Endpoint - file: microsoft-[channel] - baseurl: https://packages.microsoft.com/[distro]/[version]/[channel]/ - gpgcheck: yes - enabled: Yes - when: ansible_os_family == "RedHat" + yum_repository: + name: packages-microsoft-com-prod-[channel] + description: Microsoft Defender for Endpoint + file: microsoft-[channel] + baseurl: https://packages.microsoft.com/[distro]/[version]/[channel]/ + gpgcheck: yes + enabled: Yes + when: ansible_os_family == "RedHat" ``` - Create the Ansible install and uninstall YAML files. @@ -173,13 +179,13 @@ Create a subtask or role files that contribute to an playbook or task. ``` ```Output - hosts: servers - tasks: - - include: ../roles/onboarding_setup.yml - - include: ../roles/add_apt_repo.yml - - apt: - name: mdatp - state: latest - update_cache: yes + tasks: + - include: ../roles/onboarding_setup.yml + - include: ../roles/add_apt_repo.yml + - apt: + name: mdatp + state: latest + update_cache: yes ``` ```bash @@ -200,13 +206,13 @@ Create a subtask or role files that contribute to an playbook or task. ``` ```Output - hosts: servers - tasks: + tasks: - include: ../roles/onboarding_setup.yml - include: ../roles/add_yum_repo.yml - yum: - name: mdatp - state: latest - enablerepo: packages-microsoft-com-prod-[channel] + name: mdatp + state: latest + enablerepo: packages-microsoft-com-prod-[channel] ``` ```bash @@ -216,7 +222,7 @@ Create a subtask or role files that contribute to an playbook or task. - hosts: servers tasks: - yum: - name: mdatp + name: mdatp state: absent ``` From 91cdadf1abc31b19e326526883179da253b03b1e Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Mon, 4 Jan 2021 10:16:44 +0530 Subject: [PATCH 016/161] updated updated per review comments --- .../microsoft-defender-atp/add-or-remove-machine-tags.md | 5 +---- .../microsoft-defender-atp/advanced-features.md | 5 ----- .../advanced-hunting-assignedipaddress-function.md | 2 ++ .../advanced-hunting-devicealertevents-table.md | 1 - .../advanced-hunting-deviceevents-table.md | 1 - .../advanced-hunting-devicefilecertificateinfo-table.md | 1 - .../advanced-hunting-devicefileevents-table.md | 1 - .../advanced-hunting-deviceimageloadevents-table.md | 1 - .../advanced-hunting-deviceinfo-table.md | 1 - .../advanced-hunting-devicelogonevents-table.md | 1 - .../advanced-hunting-devicenetworkevents-table.md | 1 - .../advanced-hunting-devicenetworkinfo-table.md | 1 - .../advanced-hunting-deviceprocessevents-table.md | 1 - .../advanced-hunting-deviceregistryevents-table.md | 1 - ...hunting-devicetvmsecureconfigurationassessmentkb-table.md | 1 - ...unting-devicetvmsoftwareinventoryvulnerabilities-table.md | 2 -- .../microsoft-defender-atp/advanced-hunting-errors.md | 1 - .../advanced-hunting-fileprofile-function.md | 2 ++ .../microsoft-defender-atp/advanced-hunting-go-hunt.md | 2 ++ 19 files changed, 7 insertions(+), 24 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md b/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md index 82183d79a3..bfade0d940 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md +++ b/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags.md @@ -24,10 +24,7 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) ## API description diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md index 27f674d82f..65e46e78a2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md @@ -25,11 +25,6 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -**Applies to:** - -- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedfeats-abovefoldlink) Depending on the Microsoft security products that you use, some advanced features might be available for you to integrate Defender for Endpoint with. diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-assignedipaddress-function.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-assignedipaddress-function.md index 8d07705bea..81bc4f9c5f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-assignedipaddress-function.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-assignedipaddress-function.md @@ -22,6 +22,8 @@ ms.date: 09/20/2020 [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedfeats-abovefoldlink) + **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicealertevents-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicealertevents-table.md index 6c928af6b0..8f2831341f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicealertevents-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicealertevents-table.md @@ -22,7 +22,6 @@ ms.date: 01/22/2020 [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceevents-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceevents-table.md index 741d129b8c..ecc09ca6bf 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceevents-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceevents-table.md @@ -21,7 +21,6 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicefilecertificateinfo-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicefilecertificateinfo-table.md index af0c2d9cc4..0a9e1098a2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicefilecertificateinfo-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicefilecertificateinfo-table.md @@ -22,7 +22,6 @@ ms.date: 01/14/2020 [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicefileevents-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicefileevents-table.md index 34fd946be3..821b69559b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicefileevents-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicefileevents-table.md @@ -21,7 +21,6 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceimageloadevents-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceimageloadevents-table.md index 42da736bbf..4bfa9edeae 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceimageloadevents-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceimageloadevents-table.md @@ -21,7 +21,6 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceinfo-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceinfo-table.md index d89aa0e8b4..61cf365d1d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceinfo-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceinfo-table.md @@ -21,7 +21,6 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicelogonevents-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicelogonevents-table.md index 226606a824..7aca5e8d8e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicelogonevents-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicelogonevents-table.md @@ -21,7 +21,6 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicenetworkevents-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicenetworkevents-table.md index d9144c9385..c5794c8723 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicenetworkevents-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicenetworkevents-table.md @@ -21,7 +21,6 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicenetworkinfo-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicenetworkinfo-table.md index 8a76da5bf0..53631ceb9a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicenetworkinfo-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicenetworkinfo-table.md @@ -21,7 +21,6 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceprocessevents-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceprocessevents-table.md index 4675c8dc9c..60b6a449ea 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceprocessevents-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceprocessevents-table.md @@ -21,7 +21,6 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceregistryevents-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceregistryevents-table.md index 7f40b5a969..cfe59f3631 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceregistryevents-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceregistryevents-table.md @@ -21,7 +21,6 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicetvmsecureconfigurationassessmentkb-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicetvmsecureconfigurationassessmentkb-table.md index d3b418fa4a..69e456d0fb 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicetvmsecureconfigurationassessmentkb-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicetvmsecureconfigurationassessmentkb-table.md @@ -21,7 +21,6 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicetvmsoftwareinventoryvulnerabilities-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicetvmsoftwareinventoryvulnerabilities-table.md index 0526794af5..06171b38f3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicetvmsoftwareinventoryvulnerabilities-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicetvmsoftwareinventoryvulnerabilities-table.md @@ -21,14 +21,12 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink) - [!include[Prerelease information](../../includes/prerelease.md)] The `DeviceTvmSoftwareInventoryVulnerabilities` table in the advanced hunting schema contains the [Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md) inventory of software on your devices as well as any known vulnerabilities in these software products. This table also includes operating system information, CVE IDs, and vulnerability severity information. Use this reference to construct queries that return information from the table. diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-errors.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-errors.md index a488b05972..9fc16bdd07 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-errors.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-errors.md @@ -27,7 +27,6 @@ ms.topic: article >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhunting-abovefoldlink) - Advanced hunting displays errors to notify for syntax mistakes and whenever queries hit [predefined limits](advanced-hunting-limits.md). Refer to the table below for tips on how to resolve or avoid errors. | Error type | Cause | Resolution | Error message examples | diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-fileprofile-function.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-fileprofile-function.md index 4c377bed93..6834900a64 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-fileprofile-function.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-fileprofile-function.md @@ -24,6 +24,8 @@ ms.date: 09/20/2020 - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink) + The `FileProfile()` function is an enrichment function in [advanced hunting](advanced-hunting-overview.md) that adds the following data to files found by the query. Column | Data type | Description diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-go-hunt.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-go-hunt.md index ea6c8de949..f73f88a892 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-go-hunt.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-go-hunt.md @@ -27,6 +27,8 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink) + With the *go hunt* action, you can quickly investigate events and various entity types using powerful query-based [advanced hunting](advanced-hunting-overview.md) capabilities. This action automatically runs an advanced hunting query to find relevant information about the selected event or entity. The *go hunt* action is available in various sections of the security center whenever event or entity details are displayed. For example, you can use *go hunt* from the following sections: From 9bedecdec1b1c1d62b7c94829429524bcb710ad9 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Mon, 4 Jan 2021 11:04:50 +0530 Subject: [PATCH 017/161] updated updated to fix suggestions --- .../advanced-hunting-devicenetworkinfo-table.md | 4 ++-- .../alerts-queue-endpoint-detection-response.md | 7 ++++++- .../microsoft-defender-atp/alerts-queue.md | 1 - .../threat-protection/microsoft-defender-atp/alerts.md | 2 +- .../microsoft-defender-atp/android-configure.md | 2 ++ .../microsoft-defender-atp/android-intune.md | 2 ++ .../microsoft-defender-atp/android-privacy.md | 1 + .../microsoft-defender-atp/android-support-signin.md | 2 ++ .../microsoft-defender-atp/android-terms.md | 2 ++ .../microsoft-defender-atp/api-explorer.md | 2 ++ .../microsoft-defender-atp/api-hello-world.md | 7 ++++--- .../microsoft-defender-atp/api-microsoft-flow.md | 2 +- .../microsoft-defender-atp/api-power-bi.md | 2 +- .../microsoft-defender-atp/attack-simulations.md | 1 - .../microsoft-defender-atp/attack-surface-reduction-faq.md | 4 +++- .../microsoft-defender-atp/attack-surface-reduction.md | 3 ++- .../microsoft-defender-atp/audit-windows-defender.md | 3 ++- 17 files changed, 33 insertions(+), 14 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicenetworkinfo-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicenetworkinfo-table.md index 53631ceb9a..7537780e5d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicenetworkinfo-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicenetworkinfo-table.md @@ -39,8 +39,8 @@ For information on other tables in the advanced hunting schema, see [the advance | `ReportId` | long | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the `DeviceName` and `Timestamp` columns | | `NetworkAdapterName` | string | Name of the network adapter | | `MacAddress` | string | MAC address of the network adapter | -| `NetworkAdapterType` | string | Network adapter type. For the possible values, refer to [this enumeration](https://docs.microsoft.com/dotnet/api/system.net.networkinformation.networkinterfacetype?view=netframework-4.7.2) | -| `NetworkAdapterStatus` | string | Operational status of the network adapter. For the possible values, refer to [this enumeration](https://docs.microsoft.com/dotnet/api/system.net.networkinformation.operationalstatus?view=netframework-4.7.2) | +| `NetworkAdapterType` | string | Network adapter type. For the possible values, refer to [this enumeration](https://docs.microsoft.com/dotnet/api/system.net.networkinformation.networkinterfacetype?view=netframework-4.7.2&preserve-view=true) | +| `NetworkAdapterStatus` | string | Operational status of the network adapter. For the possible values, refer to [this enumeration](https://docs.microsoft.com/dotnet/api/system.net.networkinformation.operationalstatus?view=netframework-4.7.2&preserve-view=true) | | `TunnelType` | string | Tunneling protocol, if the interface is used for this purpose, for example 6to4, Teredo, ISATAP, PPTP, SSTP, and SSH | | `ConnectedNetworks` | string | Networks that the adapter is connected to. Each JSON array contains the network name, category (public, private or domain), a description, and a flag indicating if it's connected publicly to the internet | | `DnsAddresses` | string | DNS server addresses in JSON array format | diff --git a/windows/security/threat-protection/microsoft-defender-atp/alerts-queue-endpoint-detection-response.md b/windows/security/threat-protection/microsoft-defender-atp/alerts-queue-endpoint-detection-response.md index 5e96430994..b26a601758 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/alerts-queue-endpoint-detection-response.md +++ b/windows/security/threat-protection/microsoft-defender-atp/alerts-queue-endpoint-detection-response.md @@ -23,8 +23,13 @@ ms.date: 09/03/2018 [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -Learn how you can view and manage the queue so that you can effectively investigate threats seen on entities such as devices, files, or user accounts. +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + +Learn how you can view and manage the queue so that you can effectively investigate threats seen on entities such as devices, files, or user accounts. ## In this section Topic | Description diff --git a/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md b/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md index a15bbb44d3..c416b9b2be 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md +++ b/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md @@ -22,7 +22,6 @@ ms.date: 03/27/2020 [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/alerts.md b/windows/security/threat-protection/microsoft-defender-atp/alerts.md index 72b1f1b8fc..e8f76d7dfd 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/alerts.md @@ -24,7 +24,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) ## Methods diff --git a/windows/security/threat-protection/microsoft-defender-atp/android-configure.md b/windows/security/threat-protection/microsoft-defender-atp/android-configure.md index 7b866543f6..1f113325d4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/android-configure.md +++ b/windows/security/threat-protection/microsoft-defender-atp/android-configure.md @@ -28,6 +28,8 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + ## Conditional Access with Defender for Endpoint for Android Microsoft Defender for Endpoint for Android along with Microsoft Intune and Azure Active Directory enables enforcing Device compliance and Conditional Access policies diff --git a/windows/security/threat-protection/microsoft-defender-atp/android-intune.md b/windows/security/threat-protection/microsoft-defender-atp/android-intune.md index fe5cae5c07..0a91f454ae 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/android-intune.md +++ b/windows/security/threat-protection/microsoft-defender-atp/android-intune.md @@ -28,6 +28,8 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + This topic describes deploying Defender for Endpoint for Android on Intune Company Portal enrolled devices. For more information about Intune device enrollment, see [Enroll your device](https://docs.microsoft.com/mem/intune/user-help/enroll-device-android-company-portal). diff --git a/windows/security/threat-protection/microsoft-defender-atp/android-privacy.md b/windows/security/threat-protection/microsoft-defender-atp/android-privacy.md index 32be21bcc2..272a28c290 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/android-privacy.md +++ b/windows/security/threat-protection/microsoft-defender-atp/android-privacy.md @@ -23,6 +23,7 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) Defender for Endpoint for Android collects information from your configured Android devices and stores it in the same tenant where you have Defender for Endpoint. diff --git a/windows/security/threat-protection/microsoft-defender-atp/android-support-signin.md b/windows/security/threat-protection/microsoft-defender-atp/android-support-signin.md index 87afe6771a..5e22bf50f2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/android-support-signin.md +++ b/windows/security/threat-protection/microsoft-defender-atp/android-support-signin.md @@ -28,6 +28,8 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + During onboarding, you might encounter sign in issues after the app is installed on your device. This article provides solutions to address the sign on issues. diff --git a/windows/security/threat-protection/microsoft-defender-atp/android-terms.md b/windows/security/threat-protection/microsoft-defender-atp/android-terms.md index 5b9ded6806..db4736602c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/android-terms.md +++ b/windows/security/threat-protection/microsoft-defender-atp/android-terms.md @@ -27,6 +27,8 @@ hideEdit: true - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + ## MICROSOFT APPLICATION LICENSE TERMS: MICROSOFT DEFENDER FOR ENDPOINT These license terms ("Terms") are an agreement between Microsoft Corporation (or diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md b/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md index 324bc45db7..5948186482 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md @@ -27,6 +27,8 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + The Microsoft Defender for Endpoint API Explorer is a tool that helps you explore various Defender for Endpoint APIs interactively. The API Explorer makes it easy to construct and do API queries, test, and send requests for any available Defender for Endpoint API endpoint. Use the API Explorer to take actions or find data that might not yet be available through the user interface. diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md b/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md index 82c94d8c28..3f10452c44 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md @@ -21,10 +21,11 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - - -- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) ## Get Alerts using a simple PowerShell script diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md b/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md index d45668f5a3..45c2ecbc60 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md @@ -25,7 +25,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) Automating security procedures is a standard requirement for every modern Security Operations Center. The lack of professional cyber defenders forces SOC to work in the most efficient way and automation is a must. Microsoft Power Automate supports different connectors that were built exactly for that. You can build an end-to-end procedure automation within a few minutes. diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md b/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md index 6575464267..f63c76204b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md @@ -25,7 +25,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) In this section you will learn create a Power BI report on top of Defender for Endpoint APIs. diff --git a/windows/security/threat-protection/microsoft-defender-atp/attack-simulations.md b/windows/security/threat-protection/microsoft-defender-atp/attack-simulations.md index bbe7ac288a..0d3c296111 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/attack-simulations.md +++ b/windows/security/threat-protection/microsoft-defender-atp/attack-simulations.md @@ -22,7 +22,6 @@ ms.date: 11/20/2018 [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction-faq.md b/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction-faq.md index 5d12d0551b..10024fbd5c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction-faq.md +++ b/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction-faq.md @@ -24,6 +24,8 @@ ms.custom: asr - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink) + ## Is attack surface reduction (ASR) part of Windows? ASR was originally a feature of the suite of exploit guard features introduced as a major update to Microsoft Defender Antivirus, in Windows 10, version 1709. Microsoft Defender Antivirus is the native antimalware component of Windows. However, the full ASR feature-set is only available with a Windows enterprise license. Also note that ASR rule exclusions are managed separately from Microsoft Defender Antivirus exclusions. @@ -42,7 +44,7 @@ Yes. ASR is supported for Windows Enterprise E3 and above. All of the rules supported with E3 are also supported with E5. -E5 also added greater integration with Defender for Endpoint. With E5, you can [use Defender for Endpoint to monitor and review analytics](https://docs.microsoft.com/microsoft-365/security/mtp/monitor-devices?view=o365-worldwide#monitor-and-manage-asr-rule-deployment-and-detections) on alerts in real-time, fine-tune rule exclusions, configure ASR rules, and view lists of event reports. +E5 also added greater integration with Defender for Endpoint. With E5, you can [use Defender for Endpoint to monitor and review analytics](https://docs.microsoft.com/microsoft-365/security/mtp/monitor-devices?view=o365-worldwide&preserve-view=true#monitor-and-manage-asr-rule-deployment-and-detections) on alerts in real-time, fine-tune rule exclusions, configure ASR rules, and view lists of event reports. ## What are the currently supported ASR rules? diff --git a/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction.md b/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction.md index 68c135ee98..65a7798069 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction.md +++ b/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction.md @@ -21,11 +21,12 @@ ms.date: 11/30/2020 [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink) + ## Overview Your attack surface includes all the places where an attacker could compromise your organization's devices or networks. Reducing your attack surface means protecting your organization's devices and network, which leaves attackers with fewer ways to perform attacks. diff --git a/windows/security/threat-protection/microsoft-defender-atp/audit-windows-defender.md b/windows/security/threat-protection/microsoft-defender-atp/audit-windows-defender.md index 775a8cc01a..3f8cab4608 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/audit-windows-defender.md +++ b/windows/security/threat-protection/microsoft-defender-atp/audit-windows-defender.md @@ -19,11 +19,12 @@ manager: dansimp [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink) + You can enable attack surface reduction rules, exploit protection, network protection, and controlled folder access in audit mode. Audit mode lets you see a record of what *would* have happened if you had enabled the feature. You may want to enable audit mode when testing how the features will work in your organization. Ensure it doesn't affect your line-of-business apps, and get an idea of how many suspicious file modification attempts generally occur over a certain period of time. From a2a852831943588906769b1c671c4de4f10440cb Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Mon, 4 Jan 2021 12:31:06 +0530 Subject: [PATCH 018/161] updated to fix warnings --- .../microsoft-defender-atp/behavioral-blocking-containment.md | 3 ++- .../microsoft-defender-atp/client-behavioral-blocking.md | 3 ++- .../microsoft-defender-atp/collect-investigation-package.md | 1 - .../threat-protection/microsoft-defender-atp/common-errors.md | 2 ++ .../threat-protection/microsoft-defender-atp/community.md | 3 +-- .../microsoft-defender-atp/conditional-access.md | 1 - .../microsoft-defender-atp/configure-arcsight.md | 2 -- .../configure-attack-surface-reduction.md | 2 ++ .../configure-automated-investigations-remediation.md | 2 ++ .../microsoft-defender-atp/configure-conditional-access.md | 2 ++ .../microsoft-defender-atp/configure-email-notifications.md | 1 - .../microsoft-defender-atp/configure-endpoints-gp.md | 4 ---- .../microsoft-defender-atp/configure-endpoints-mdm.md | 1 - .../microsoft-defender-atp/configure-endpoints-sccm.md | 2 -- .../microsoft-defender-atp/configure-endpoints-script.md | 4 ---- .../microsoft-defender-atp/configure-endpoints-vdi.md | 3 ++- .../microsoft-defender-atp/configure-endpoints.md | 2 ++ .../configure-microsoft-threat-experts.md | 2 ++ .../microsoft-defender-atp/configure-mssp-support.md | 1 - 19 files changed, 19 insertions(+), 22 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/behavioral-blocking-containment.md b/windows/security/threat-protection/microsoft-defender-atp/behavioral-blocking-containment.md index b9812f96f1..3ec246620e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/behavioral-blocking-containment.md +++ b/windows/security/threat-protection/microsoft-defender-atp/behavioral-blocking-containment.md @@ -24,11 +24,12 @@ ms.collection: [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink) + ## Overview Today’s threat landscape is overrun by [fileless malware](https://docs.microsoft.com/windows/security/threat-protection/intelligence/fileless-threats) and that lives off the land, highly polymorphic threats that mutate faster than traditional solutions can keep up with, and human-operated attacks that adapt to what adversaries find on compromised devices. Traditional security solutions are not sufficient to stop such attacks; you need artificial intelligence (AI) and device learning (ML) backed capabilities, such as behavioral blocking and containment, included in [Defender for Endpoint](https://docs.microsoft.com/windows/security). diff --git a/windows/security/threat-protection/microsoft-defender-atp/client-behavioral-blocking.md b/windows/security/threat-protection/microsoft-defender-atp/client-behavioral-blocking.md index bc4df2fd36..966a58cfa5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/client-behavioral-blocking.md +++ b/windows/security/threat-protection/microsoft-defender-atp/client-behavioral-blocking.md @@ -24,11 +24,12 @@ ms.collection: [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink) + ## Overview Client behavioral blocking is a component of [behavioral blocking and containment capabilities](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/behavioral-blocking-containment) in Defender for Endpoint. As suspicious behaviors are detected on devices (also referred to as clients or endpoints), artifacts (such as files or applications) are blocked, checked, and remediated automatically. diff --git a/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package.md b/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package.md index 7353a6bf79..c9e7d04727 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package.md +++ b/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package.md @@ -21,7 +21,6 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/common-errors.md b/windows/security/threat-protection/microsoft-defender-atp/common-errors.md index c43240cb86..a6b9f38340 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/common-errors.md +++ b/windows/security/threat-protection/microsoft-defender-atp/common-errors.md @@ -20,6 +20,8 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] +>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink) + * The error codes listed in the following table may be returned by an operation on any of Microsoft Defender for Endpoint APIs. * Note that in addition to the error code, every error response contains an error message which can help resolving the problem. * Note that the message is a free text that can be changed. diff --git a/windows/security/threat-protection/microsoft-defender-atp/community.md b/windows/security/threat-protection/microsoft-defender-atp/community.md index 133d2cab9b..aca63dbec7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/community.md +++ b/windows/security/threat-protection/microsoft-defender-atp/community.md @@ -23,12 +23,11 @@ ms.date: 04/24/2018 [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - +>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink) The Defender for Endpoint Community Center is a place where community members can learn, collaborate, and share experiences about the product. diff --git a/windows/security/threat-protection/microsoft-defender-atp/conditional-access.md b/windows/security/threat-protection/microsoft-defender-atp/conditional-access.md index 2547e77520..3c7616a751 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/conditional-access.md +++ b/windows/security/threat-protection/microsoft-defender-atp/conditional-access.md @@ -21,7 +21,6 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight.md b/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight.md index 026974fa1b..337283c16d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight.md @@ -25,8 +25,6 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - - >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-configurearcsight-abovefoldlink) You'll need to install and configure some files and tools to use Micro Focus ArcSight so that it can pull Defender for Endpoint detections. diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-attack-surface-reduction.md b/windows/security/threat-protection/microsoft-defender-atp/configure-attack-surface-reduction.md index c19655f2e1..7c88e93210 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-attack-surface-reduction.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-attack-surface-reduction.md @@ -25,6 +25,8 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink) + You can configure attack surface reduction with a number of tools, including: * Microsoft Intune diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-automated-investigations-remediation.md b/windows/security/threat-protection/microsoft-defender-atp/configure-automated-investigations-remediation.md index 572a80986e..b44f840a87 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-automated-investigations-remediation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-automated-investigations-remediation.md @@ -28,6 +28,8 @@ ms.reviewer: ramarom, evaldm, isco, mabraitm, chriggs - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink) + If your organization is using [Microsoft Defender for Endpoint](https://docs.microsoft.com/windows/security/threat-protection/) (Defender for Endpoint), [automated investigation and remediation capabilities](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/automated-investigations) can save your security operations team time and effort. As outlined in [this blog post](https://techcommunity.microsoft.com/t5/microsoft-defender-atp/enhance-your-soc-with-microsoft-defender-atp-automatic/ba-p/848946), these capabilities mimic the ideal steps that a security analyst takes to investigate and remediate threats. [Learn more about automated investigation and remediation](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/automated-investigations). To configure automated investigation and remediation, [turn on the features](#turn-on-automated-investigation-and-remediation), and then [set up device groups](#set-up-device-groups). diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access.md b/windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access.md index 179220a82c..8bfd92faee 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access.md @@ -25,6 +25,8 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink) + This section guides you through all the steps you need to take to properly implement Conditional Access. ### Before you begin diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications.md b/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications.md index 359e660d49..b8dd4d9e71 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications.md @@ -25,7 +25,6 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-emailconfig-abovefoldlink) You can configure Defender for Endpoint to send email notifications to specified recipients for new alerts. This feature enables you to identify a group of individuals who will immediately be informed and can act on alerts based on their severity. diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md index 2f52e87c77..3df6762609 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md @@ -22,16 +22,12 @@ ms.date: 04/24/2018 [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - Group Policy - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - - - >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-configureendpointsgp-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm.md index 7f93a3b0d0..0bd6a48334 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm.md @@ -21,7 +21,6 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md index 4f17253970..90afcaf90c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md @@ -22,7 +22,6 @@ ms.date: 02/07/2020 [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) @@ -53,7 +52,6 @@ Starting in Configuration Manager version 2002, you can onboard the following op ### Onboard devices using System Center Configuration Manager - [![Image of the PDF showing the various deployment paths](images/onboard-config-mgr.png)](images/onboard-config-mgr.png#lightbox) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script.md index d063e91f81..8b0a6e9847 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script.md @@ -21,12 +21,8 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - - - >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-configureendpointsscript-abovefoldlink) You can also manually onboard individual devices to Defender for Endpoint. You might want to do this first when testing the service before you commit to onboarding all devices in your network. diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md index c2143a8c0d..ad52218ac7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md @@ -22,11 +22,12 @@ ms.date: 04/16/2020 [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink) + >[!WARNING] > Microsoft Defender for Endpoint support for Windows Virtual Desktop multi-user scenarios is currently in Preview and limited up to 25 concurrent sessions per host/VM. However single session scenarios on Windows Virtual Desktop are fully supported. diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints.md index e11efc3916..5b7651cff2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints.md @@ -26,6 +26,8 @@ ms.topic: conceptual - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - [Microsoft 365 Endpoint data loss prevention (DLP)](/microsoft-365/compliance/endpoint-dlp-learn-about) +>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink) + Devices in your organization must be configured so that the Defender for Endpoint service can get sensor data from them. There are various methods and deployment tools that you can use to configure the devices in your organization. The following deployment tools and methods are supported: diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md b/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md index c3033e6e9b..8fb0ce1dd0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts.md @@ -28,6 +28,8 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink) + ## Before you begin > [!NOTE] > Discuss the eligibility requirements with your Microsoft Technical Service provider and account team before you apply to the managed threat hunting service. diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md b/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md index 69475ea801..f82c9abd56 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md @@ -27,7 +27,6 @@ ms.topic: article >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-mssp-support-abovefoldlink) - [!include[Prerelease information](../../includes/prerelease.md)] You'll need to take the following configuration steps to enable the managed security service provider (MSSP) integration. From b8b2fe81654cc59043366341b1a1148f713a1294 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Mon, 4 Jan 2021 13:02:31 +0530 Subject: [PATCH 019/161] updated updated warnings --- .../microsoft-defender-atp/connected-applications.md | 1 + .../microsoft-defender-atp/contact-support.md | 2 ++ .../microsoft-defender-atp/controlled-folders.md | 2 ++ .../microsoft-defender-atp/custom-detection-rules.md | 2 ++ .../microsoft-defender-atp/custom-detections-manage.md | 2 ++ .../customize-attack-surface-reduction.md | 2 ++ .../microsoft-defender-atp/customize-controlled-folders.md | 2 ++ .../microsoft-defender-atp/customize-exploit-protection.md | 2 ++ .../microsoft-defender-atp/data-retention-settings.md | 1 - .../microsoft-defender-atp/data-storage-privacy.md | 3 +-- .../microsoft-defender-atp/defender-compatibility.md | 1 - .../microsoft-defender-atp/delete-ti-indicator-by-id.md | 2 +- .../microsoft-defender-atp/deployment-phases.md | 2 ++ .../microsoft-defender-atp/deployment-rings.md | 1 + .../microsoft-defender-atp/device-timeline-event-flag.md | 2 ++ .../microsoft-defender-atp/edr-in-block-mode.md | 2 ++ .../microsoft-defender-atp/enable-attack-surface-reduction.md | 2 ++ .../microsoft-defender-atp/enable-controlled-folders.md | 3 ++- .../microsoft-defender-atp/enable-exploit-protection.md | 2 ++ .../microsoft-defender-atp/enable-network-protection.md | 2 ++ 20 files changed, 32 insertions(+), 6 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/connected-applications.md b/windows/security/threat-protection/microsoft-defender-atp/connected-applications.md index 6744927292..4f45c8ee82 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/connected-applications.md +++ b/windows/security/threat-protection/microsoft-defender-atp/connected-applications.md @@ -26,6 +26,7 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink) Connected applications integrates with the Defender for Endpoint platform using APIs. diff --git a/windows/security/threat-protection/microsoft-defender-atp/contact-support.md b/windows/security/threat-protection/microsoft-defender-atp/contact-support.md index b323d8069b..618866e723 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/contact-support.md +++ b/windows/security/threat-protection/microsoft-defender-atp/contact-support.md @@ -26,6 +26,8 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink) + Defender for Endpoint has recently upgraded the support process to offer a more modern and advanced support experience. The new widget allows customers to: diff --git a/windows/security/threat-protection/microsoft-defender-atp/controlled-folders.md b/windows/security/threat-protection/microsoft-defender-atp/controlled-folders.md index bdd720eab1..0b7135bc43 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/controlled-folders.md +++ b/windows/security/threat-protection/microsoft-defender-atp/controlled-folders.md @@ -25,6 +25,8 @@ ms.custom: asr - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink) + ## What is controlled folder access? Controlled folder access helps you protect your valuable data from malicious apps and threats, like ransomware. Controlled folder access protects your data by checking apps against a list of known, trusted apps. Supported on Windows Server 2019 and Windows 10 clients, controlled folder access can be turned on using the Windows Security App or in Microsoft Endpoint Configuration Manager and Intune (for managed devices). diff --git a/windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules.md b/windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules.md index f47b66c90f..1a12b9f774 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules.md +++ b/windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules.md @@ -27,6 +27,8 @@ ms.date: 09/20/2020 - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink) + Custom detection rules built from [advanced hunting](advanced-hunting-overview.md) queries let you proactively monitor various events and system states, including suspected breach activity and misconfigured devices. You can set them to run at regular intervals, generating alerts and taking response actions whenever there are matches. Read this article to learn how to create new custom detection rules. Or [see viewing and managing existing rules](custom-detections-manage.md). diff --git a/windows/security/threat-protection/microsoft-defender-atp/custom-detections-manage.md b/windows/security/threat-protection/microsoft-defender-atp/custom-detections-manage.md index cd17efa6b8..8472b9d407 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/custom-detections-manage.md +++ b/windows/security/threat-protection/microsoft-defender-atp/custom-detections-manage.md @@ -27,6 +27,8 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink) + Manage your existing [custom detection rules](custom-detection-rules.md) to ensure they are effectively finding threats and taking actions. Explore how to view the list of rules, check their previous runs, and review the alerts they have triggered. You can also run a rule on demand and modify it. ## Required permissions diff --git a/windows/security/threat-protection/microsoft-defender-atp/customize-attack-surface-reduction.md b/windows/security/threat-protection/microsoft-defender-atp/customize-attack-surface-reduction.md index 03a274b066..c78ae8bbdd 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/customize-attack-surface-reduction.md +++ b/windows/security/threat-protection/microsoft-defender-atp/customize-attack-surface-reduction.md @@ -23,6 +23,8 @@ manager: dansimp - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink) + > [!IMPORTANT] > Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. diff --git a/windows/security/threat-protection/microsoft-defender-atp/customize-controlled-folders.md b/windows/security/threat-protection/microsoft-defender-atp/customize-controlled-folders.md index b6570ffae3..6aaa3cb25f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/customize-controlled-folders.md +++ b/windows/security/threat-protection/microsoft-defender-atp/customize-controlled-folders.md @@ -23,6 +23,8 @@ manager: dansimp - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink) + Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. Controlled folder access is supported on Windows Server 2019 and Windows 10 clients. This article describes how to customize the following settings of the controlled folder access feature with the Windows Security app, Group Policy, PowerShell, and mobile device management (MDM) configuration service providers (CSPs). diff --git a/windows/security/threat-protection/microsoft-defender-atp/customize-exploit-protection.md b/windows/security/threat-protection/microsoft-defender-atp/customize-exploit-protection.md index fa16ddf58a..3074177f5c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/customize-exploit-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/customize-exploit-protection.md @@ -23,6 +23,8 @@ manager: dansimp - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink) + Exploit protection automatically applies a number of exploit mitigation techniques on both the operating system processes and on individual apps. Configure these settings using the Windows Security app on an individual device. Then, export the configuration as an XML file so you can deploy to other devices. Use Group Policy to distribute the XML file to multiple devices at once. You can also configure the mitigations with PowerShell. diff --git a/windows/security/threat-protection/microsoft-defender-atp/data-retention-settings.md b/windows/security/threat-protection/microsoft-defender-atp/data-retention-settings.md index df983743ae..7e08211b85 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/data-retention-settings.md +++ b/windows/security/threat-protection/microsoft-defender-atp/data-retention-settings.md @@ -25,7 +25,6 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-gensettings-abovefoldlink) During the onboarding process, a wizard takes you through the data storage and retention settings of Defender for Endpoint. diff --git a/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy.md b/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy.md index 0b69d38538..c034eccfee 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy.md +++ b/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy.md @@ -21,12 +21,11 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - +>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink) This section covers some of the most frequently asked questions regarding privacy and data handling for Defender for Endpoint. > [!NOTE] diff --git a/windows/security/threat-protection/microsoft-defender-atp/defender-compatibility.md b/windows/security/threat-protection/microsoft-defender-atp/defender-compatibility.md index 28d34ad383..133552f4d9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/defender-compatibility.md +++ b/windows/security/threat-protection/microsoft-defender-atp/defender-compatibility.md @@ -22,7 +22,6 @@ ms.date: 04/24/2018 [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id.md index 4d1f037200..f2b626b001 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id.md @@ -24,7 +24,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) ## API description diff --git a/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md b/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md index 2c443f3d9e..8a3d50c989 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md +++ b/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md @@ -27,6 +27,8 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink) + Learn how to deploy Microsoft Defender for Endpoint so that your enterprise can take advantage of preventative protection, post-breach detection, automated investigation, and response. diff --git a/windows/security/threat-protection/microsoft-defender-atp/deployment-rings.md b/windows/security/threat-protection/microsoft-defender-atp/deployment-rings.md index 1c6eaca4d0..e6c3efe84f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/deployment-rings.md +++ b/windows/security/threat-protection/microsoft-defender-atp/deployment-rings.md @@ -28,6 +28,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink) Deploying Microsoft Defender ATP can be done using a ring-based deployment approach. diff --git a/windows/security/threat-protection/microsoft-defender-atp/device-timeline-event-flag.md b/windows/security/threat-protection/microsoft-defender-atp/device-timeline-event-flag.md index 67c3961a98..c63c41272e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/device-timeline-event-flag.md +++ b/windows/security/threat-protection/microsoft-defender-atp/device-timeline-event-flag.md @@ -24,6 +24,8 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink) + Event flags in the Defender for Endpoint device timeline help you filter and organize specific events when you're investigate potential attacks. The Defender for Endpoint device timeline provides a chronological view of the events and associated alerts observed on a device. This list of events provides full visibility into any events, files, and IP addresses observed on the device. The list can sometimes be lengthy. Device timeline event flags help you track events that could be related. diff --git a/windows/security/threat-protection/microsoft-defender-atp/edr-in-block-mode.md b/windows/security/threat-protection/microsoft-defender-atp/edr-in-block-mode.md index f190d344a8..02d9b7bad3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/edr-in-block-mode.md +++ b/windows/security/threat-protection/microsoft-defender-atp/edr-in-block-mode.md @@ -29,6 +29,8 @@ ms.collection: - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink) + ## What is EDR in block mode? When [endpoint detection and response](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/overview-endpoint-detection-response) (EDR) in block mode is turned on, Defender for Endpoint blocks malicious artifacts or behaviors that are observed through post-breach protection. EDR in block mode works behind the scenes to remediate malicious artifacts that are detected, post breach. diff --git a/windows/security/threat-protection/microsoft-defender-atp/enable-attack-surface-reduction.md b/windows/security/threat-protection/microsoft-defender-atp/enable-attack-surface-reduction.md index 9464fb22dd..efb01ac27a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/enable-attack-surface-reduction.md +++ b/windows/security/threat-protection/microsoft-defender-atp/enable-attack-surface-reduction.md @@ -23,6 +23,8 @@ manager: dansimp - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink) + [Attack surface reduction rules](attack-surface-reduction.md) (ASR rules) help prevent actions that malware often abuses to compromise devices and networks. You can set ASR rules for devices running any of the following editions and versions of Windows: - Windows 10 Pro, [version 1709](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1709) or later - Windows 10 Enterprise, [version 1709](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1709) or later diff --git a/windows/security/threat-protection/microsoft-defender-atp/enable-controlled-folders.md b/windows/security/threat-protection/microsoft-defender-atp/enable-controlled-folders.md index 1e040286f7..17267c1aba 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/enable-controlled-folders.md +++ b/windows/security/threat-protection/microsoft-defender-atp/enable-controlled-folders.md @@ -19,11 +19,12 @@ manager: dansimp [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink) + [Controlled folder access](controlled-folders.md) helps you protect valuable data from malicious apps and threats, such as ransomware. Controlled folder access is included with Windows 10 and Windows Server 2019. You can enable controlled folder access by using any of these methods: diff --git a/windows/security/threat-protection/microsoft-defender-atp/enable-exploit-protection.md b/windows/security/threat-protection/microsoft-defender-atp/enable-exploit-protection.md index 2e4c2b5cb0..8656a725ca 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/enable-exploit-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/enable-exploit-protection.md @@ -22,6 +22,8 @@ manager: dansimp - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink) + [Exploit protection](exploit-protection.md) helps protect against malware that uses exploits to infect devices and spread. Exploit protection consists of a number of mitigations that can be applied to either the operating system or individual apps. > [!IMPORTANT] diff --git a/windows/security/threat-protection/microsoft-defender-atp/enable-network-protection.md b/windows/security/threat-protection/microsoft-defender-atp/enable-network-protection.md index 41c19a2a84..f9243e9746 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/enable-network-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/enable-network-protection.md @@ -22,6 +22,8 @@ manager: dansimp - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink) + [Network protection](network-protection.md) helps to prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the internet. You can [audit network protection](evaluate-network-protection.md) in a test environment to view which apps would be blocked before you enable it. [Learn more about network filtering configuration options](https://docs.microsoft.com/mem/intune/protect/endpoint-protection-windows-10#network-filtering) From be0916e9e6037b96a59d06282e18d79cbbe217f8 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Mon, 4 Jan 2021 13:19:41 +0530 Subject: [PATCH 020/161] update updates to fix issues --- .../threat-protection/microsoft-defender-atp/contact-support.md | 2 +- .../microsoft-defender-atp/delete-ti-indicator-by-id.md | 1 - 2 files changed, 1 insertion(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/contact-support.md b/windows/security/threat-protection/microsoft-defender-atp/contact-support.md index 618866e723..e7d04897b7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/contact-support.md +++ b/windows/security/threat-protection/microsoft-defender-atp/contact-support.md @@ -42,7 +42,7 @@ At a minimum, you must have a Service Support Administrator **OR** Helpdesk Admi For more information on which roles have permission see, [Security Administrator permissions](https://docs.microsoft.com/azure/active-directory/users-groups-roles/directory-assign-admin-roles#security-administrator-permissions). Roles that include the action `microsoft.office365.supportTickets/allEntities/allTasks` can submit a case. -For general information on admin roles, see [About admin roles](https://docs.microsoft.com/microsoft-365/admin/add-users/about-admin-roles?view=o365-worldwide). +For general information on admin roles, see [About admin roles](https://docs.microsoft.com/microsoft-365/admin/add-users/about-admin-roles?view=o365-worldwide&preserve-view=true). ## Access the widget diff --git a/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id.md index f2b626b001..3420215a33 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id.md @@ -51,7 +51,6 @@ Delete https://api.securitycenter.windows.com/api/indicators/{id} [!include[Improve request performance](../../includes/improve-request-performance.md)] - ## Request headers Name | Type | Description From ec76dd6fdbe2e67d41d0bcf0f82d7bebb62bf429 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Mon, 4 Jan 2021 15:07:06 +0530 Subject: [PATCH 021/161] updated updated review comments --- .../microsoft-defender-atp/enable-siem-integration.md | 1 - .../threat-protection/microsoft-defender-atp/evaluate-atp.md | 1 + .../evaluate-attack-surface-reduction.md | 2 ++ .../evaluate-controlled-folder-access.md | 2 ++ .../microsoft-defender-atp/evaluate-exploit-protection.md | 2 ++ .../microsoft-defender-atp/evaluate-network-protection.md | 2 ++ .../microsoft-defender-atp/evaluation-lab.md | 2 ++ .../microsoft-defender-atp/event-error-codes.md | 2 ++ .../threat-protection/microsoft-defender-atp/event-views.md | 2 ++ .../microsoft-defender-atp/exploit-protection-reference.md | 2 ++ .../microsoft-defender-atp/exploit-protection.md | 2 ++ .../exposed-apis-create-app-nativeapp.md | 2 +- .../exposed-apis-create-app-partners.md | 2 +- .../exposed-apis-full-sample-powershell.md | 1 + .../microsoft-defender-atp/exposed-apis-odata-samples.md | 2 ++ .../microsoft-defender-atp/feedback-loop-blocking.md | 2 ++ .../microsoft-defender-atp/fetch-alerts-mssp.md | 1 - .../threat-protection/microsoft-defender-atp/files.md | 2 +- .../microsoft-defender-atp/find-machine-info-by-ip.md | 2 ++ .../microsoft-defender-atp/find-machines-by-ip.md | 2 +- .../microsoft-defender-atp/fix-unhealthy-sensors.md | 2 +- .../microsoft-defender-atp/get-alert-info-by-id.md | 2 +- .../microsoft-defender-atp/get-alert-related-domain-info.md | 5 +---- 23 files changed, 33 insertions(+), 12 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration.md b/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration.md index acbd095de0..7dbee74ef5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration.md @@ -25,7 +25,6 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - >Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-enablesiem-abovefoldlink) Enable security information and event management (SIEM) integration so you can pull detections from Microsoft Defender Security Center. Pull detections using your SIEM solution or by connecting directly to the detections REST API. diff --git a/windows/security/threat-protection/microsoft-defender-atp/evaluate-atp.md b/windows/security/threat-protection/microsoft-defender-atp/evaluate-atp.md index 5c18b1f1f3..4a3ffc7959 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/evaluate-atp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/evaluate-atp.md @@ -26,6 +26,7 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-enablesiem-abovefoldlink) [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) is a unified platform for preventative protection, post-breach detection, automated investigation, and response. diff --git a/windows/security/threat-protection/microsoft-defender-atp/evaluate-attack-surface-reduction.md b/windows/security/threat-protection/microsoft-defender-atp/evaluate-attack-surface-reduction.md index b68960578e..ad110f5b42 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/evaluate-attack-surface-reduction.md +++ b/windows/security/threat-protection/microsoft-defender-atp/evaluate-attack-surface-reduction.md @@ -23,6 +23,8 @@ manager: dansimp - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-enablesiem-abovefoldlink) + Attack surface reduction rules help prevent actions typically used by malware to compromise devices or networks. Set attack surface reduction rules for devices running any of the following editions and versions of Windows: - Windows 10 Pro, [version 1709](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1709) or later diff --git a/windows/security/threat-protection/microsoft-defender-atp/evaluate-controlled-folder-access.md b/windows/security/threat-protection/microsoft-defender-atp/evaluate-controlled-folder-access.md index 80f5ef921b..7448d401a2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/evaluate-controlled-folder-access.md +++ b/windows/security/threat-protection/microsoft-defender-atp/evaluate-controlled-folder-access.md @@ -22,6 +22,8 @@ manager: dansimp - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-enablesiem-abovefoldlink) + [Controlled folder access](controlled-folders.md) is a feature that helps protect your documents and files from modification by suspicious or malicious apps. Controlled folder access is supported on Windows Server 2019 and Windows 10 clients. It is especially useful in helping protect against [ransomware](https://www.microsoft.com/wdsi/threats/ransomware) that attempts to encrypt your files and hold them hostage. diff --git a/windows/security/threat-protection/microsoft-defender-atp/evaluate-exploit-protection.md b/windows/security/threat-protection/microsoft-defender-atp/evaluate-exploit-protection.md index e3fe5e2405..430aa6c987 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/evaluate-exploit-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/evaluate-exploit-protection.md @@ -24,6 +24,8 @@ manager: dansimp - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-enablesiem-abovefoldlink) + [Exploit protection](exploit-protection.md) helps protect devices from malware that uses exploits to spread and infect other devices. Mitigation can be applied to either the operating system or to an individual app. Many of the features that were part of the Enhanced Mitigation Experience Toolkit (EMET) are included in exploit protection. (The EMET has reached its end of support.) This article helps you enable exploit protection in audit mode and review related events in Event Viewer. You can enable audit mode to see how mitigation works for certain apps in a test environment. By auditing exploit protection, you can see what *would* have happened if you had enabled exploit protection in your production environment. This way, you can help ensure exploit protection doesn't adversely affect your line-of-business apps, and you can see which suspicious or malicious events occur. diff --git a/windows/security/threat-protection/microsoft-defender-atp/evaluate-network-protection.md b/windows/security/threat-protection/microsoft-defender-atp/evaluate-network-protection.md index efd63bf88e..d664c9d65c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/evaluate-network-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/evaluate-network-protection.md @@ -22,6 +22,8 @@ manager: dansimp - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-enablesiem-abovefoldlink) + [Network protection](network-protection.md) helps prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet. This article helps you evaluate network protection by enabling the feature and guiding you to a testing site. The sites in this evaluation article aren't malicious. They're specially created websites that pretend to be malicious. The site will replicate the behavior that would happen if a user visited a malicious site or domain. diff --git a/windows/security/threat-protection/microsoft-defender-atp/evaluation-lab.md b/windows/security/threat-protection/microsoft-defender-atp/evaluation-lab.md index cab8a166e5..f6a0e94621 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/evaluation-lab.md +++ b/windows/security/threat-protection/microsoft-defender-atp/evaluation-lab.md @@ -26,6 +26,8 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-enablesiem-abovefoldlink) + Conducting a comprehensive security product evaluation can be a complex process requiring cumbersome environment and device configuration before an end-to-end attack simulation can actually be done. Adding to the complexity is the challenge of tracking where the simulation activities, alerts, and results are reflected during the evaluation. The Microsoft Defender for Endpoint evaluation lab is designed to eliminate the complexities of device and environment configuration so that you can focus on evaluating the capabilities of the platform, running simulations, and seeing the prevention, detection, and remediation features in action. diff --git a/windows/security/threat-protection/microsoft-defender-atp/event-error-codes.md b/windows/security/threat-protection/microsoft-defender-atp/event-error-codes.md index b3abf41573..71c389b550 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/event-error-codes.md +++ b/windows/security/threat-protection/microsoft-defender-atp/event-error-codes.md @@ -29,6 +29,8 @@ ms.date: 05/21/2018 - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-enablesiem-abovefoldlink) + You can review event IDs in the [Event Viewer](https://msdn.microsoft.com/library/aa745633(v=bts.10).aspx) on individual devices. For example, if devices are not appearing in the **Devices list**, you might need to look for event IDs on the devices. You can then use this table to determine further troubleshooting steps. diff --git a/windows/security/threat-protection/microsoft-defender-atp/event-views.md b/windows/security/threat-protection/microsoft-defender-atp/event-views.md index 537ae66fba..de00168bc6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/event-views.md +++ b/windows/security/threat-protection/microsoft-defender-atp/event-views.md @@ -22,6 +22,8 @@ manager: dansimp - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-enablesiem-abovefoldlink) + Review attack surface reduction events in Event Viewer to monitor what rules or settings are working. You can also determine if any settings are too "noisy" or impacting your day to day workflow. Reviewing events is handy when you're evaluating the features. You can enable audit mode for features or settings, and then review what would have happened if they were fully enabled. diff --git a/windows/security/threat-protection/microsoft-defender-atp/exploit-protection-reference.md b/windows/security/threat-protection/microsoft-defender-atp/exploit-protection-reference.md index c99763dbe5..09dc0e1049 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exploit-protection-reference.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exploit-protection-reference.md @@ -26,6 +26,8 @@ ms.custom: asr - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-enablesiem-abovefoldlink) + Exploit protection provides advanced protections for applications that the IT Pro can apply after the developer has compiled and distributed the software. This article helps you understand how exploit protection works, both at the policy level and at the individual mitigation level, to help you successfully build and apply Exploit Protection policies. diff --git a/windows/security/threat-protection/microsoft-defender-atp/exploit-protection.md b/windows/security/threat-protection/microsoft-defender-atp/exploit-protection.md index df8c81ac03..7342529eb6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exploit-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exploit-protection.md @@ -26,6 +26,8 @@ ms.custom: asr - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-enablesiem-abovefoldlink) + Exploit protection automatically applies a number of exploit mitigation techniques to operating system processes and apps. Exploit protection is supported beginning with Windows 10, version 1709 and Windows Server, version 1803. > [!TIP] diff --git a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp.md index 664047a980..851186b813 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp.md @@ -26,7 +26,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) This page describes how to create an application to get programmatic access to Defender for Endpoint on behalf of a user. diff --git a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-partners.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-partners.md index 002f88d700..f974f8b0f9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-partners.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-partners.md @@ -26,7 +26,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) This page describes how to create an Azure Active Directory (Azure AD) application to get programmatic access to Microsoft Defender for Endpoint on behalf of your customers. diff --git a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-full-sample-powershell.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-full-sample-powershell.md index 9bbb48923a..7a52412464 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-full-sample-powershell.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-full-sample-powershell.md @@ -26,6 +26,7 @@ ms.date: 09/24/2018 - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-enablesiem-abovefoldlink) Full scenario using multiple APIs from Microsoft Defender for Endpoint. diff --git a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples.md index 149f11a777..04530f8707 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples.md @@ -26,6 +26,8 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-enablesiem-abovefoldlink) + If you are not familiar with OData queries, see: [OData V4 queries](https://www.odata.org/documentation/) Not all properties are filterable. diff --git a/windows/security/threat-protection/microsoft-defender-atp/feedback-loop-blocking.md b/windows/security/threat-protection/microsoft-defender-atp/feedback-loop-blocking.md index 196a3cbc5c..84cedc634f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/feedback-loop-blocking.md +++ b/windows/security/threat-protection/microsoft-defender-atp/feedback-loop-blocking.md @@ -27,6 +27,8 @@ ms.collection: - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-enablesiem-abovefoldlink) + ## Overview Feedback-loop blocking, also referred to as rapid protection, is a component of [behavioral blocking and containment capabilities](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/behavioral-blocking-containment) in [Microsoft Defender for Endpoint](https://docs.microsoft.com/windows/security/threat-protection/). With feedback-loop blocking, devices across your organization are better protected from attacks. diff --git a/windows/security/threat-protection/microsoft-defender-atp/fetch-alerts-mssp.md b/windows/security/threat-protection/microsoft-defender-atp/fetch-alerts-mssp.md index 67ab98b39f..24922ce390 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/fetch-alerts-mssp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/fetch-alerts-mssp.md @@ -27,7 +27,6 @@ ms.topic: article >Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-mssp-support-abovefoldlink) - >[!NOTE] >This action is taken by the MSSP. diff --git a/windows/security/threat-protection/microsoft-defender-atp/files.md b/windows/security/threat-protection/microsoft-defender-atp/files.md index 99f645027b..683d3376f5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/files.md +++ b/windows/security/threat-protection/microsoft-defender-atp/files.md @@ -24,7 +24,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) Represent a file entity in Defender for Endpoint. diff --git a/windows/security/threat-protection/microsoft-defender-atp/find-machine-info-by-ip.md b/windows/security/threat-protection/microsoft-defender-atp/find-machine-info-by-ip.md index dfaf917810..896d6a7dbb 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/find-machine-info-by-ip.md +++ b/windows/security/threat-protection/microsoft-defender-atp/find-machine-info-by-ip.md @@ -24,6 +24,8 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-enablesiem-abovefoldlink) + Find a device by internal IP. >[!NOTE] diff --git a/windows/security/threat-protection/microsoft-defender-atp/find-machines-by-ip.md b/windows/security/threat-protection/microsoft-defender-atp/find-machines-by-ip.md index 7601f05097..f90d8681f3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/find-machines-by-ip.md +++ b/windows/security/threat-protection/microsoft-defender-atp/find-machines-by-ip.md @@ -25,7 +25,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) ## API description diff --git a/windows/security/threat-protection/microsoft-defender-atp/fix-unhealthy-sensors.md b/windows/security/threat-protection/microsoft-defender-atp/fix-unhealthy-sensors.md index 50ab54a1ea..8ed4d94ac8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/fix-unhealthy-sensors.md +++ b/windows/security/threat-protection/microsoft-defender-atp/fix-unhealthy-sensors.md @@ -26,7 +26,7 @@ ms.date: 11/06/2020 - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-fixsensor-abovefoldlink) +> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-fixsensor-abovefoldlink) Devices that are categorized as misconfigured or inactive can be flagged due to varying causes. This section provides some explanations as to what might have caused a device to be categorized as inactive or misconfigured. diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id.md index e0ca2e6ddc..5f35bba3d0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id.md @@ -25,7 +25,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) ## API description diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info.md b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info.md index 8a9200d61e..369a953900 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info.md @@ -22,10 +22,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - -**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - -- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) ## API description From dc66dad90e65776186f5494a8707e3e80e91d419 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Tue, 5 Jan 2021 09:52:53 +0530 Subject: [PATCH 022/161] updated updated the review comments --- .../microsoft-defender-atp/get-machine-by-id.md | 2 +- .../microsoft-defender-atp/get-machine-group-exposure-score.md | 2 +- .../microsoft-defender-atp/get-machine-log-on-users.md | 2 +- .../microsoft-defender-atp/get-machine-related-alerts.md | 2 +- .../microsoft-defender-atp/get-machineaction-object.md | 2 +- .../microsoft-defender-atp/get-machineactions-collection.md | 2 +- .../microsoft-defender-atp/get-machinegroups-collection.md | 2 ++ .../microsoft-defender-atp/get-machines-by-software.md | 2 ++ .../microsoft-defender-atp/get-machines-by-vulnerability.md | 2 ++ .../threat-protection/microsoft-defender-atp/get-machines.md | 2 +- .../get-machinesecuritystates-collection.md | 2 ++ .../microsoft-defender-atp/get-missing-kbs-machine.md | 2 +- .../microsoft-defender-atp/get-missing-kbs-software.md | 2 +- .../microsoft-defender-atp/get-package-sas-uri.md | 2 +- .../microsoft-defender-atp/get-recommendation-by-id.md | 2 ++ .../microsoft-defender-atp/get-recommendation-machines.md | 2 ++ .../microsoft-defender-atp/get-recommendation-software.md | 2 ++ .../get-recommendation-vulnerabilities.md | 2 ++ .../microsoft-defender-atp/get-security-recommendations.md | 2 ++ .../microsoft-defender-atp/get-software-by-id.md | 2 ++ .../microsoft-defender-atp/get-software-ver-distribution.md | 2 ++ .../threat-protection/microsoft-defender-atp/get-software.md | 2 +- .../microsoft-defender-atp/get-started-partner-integration.md | 2 ++ .../microsoft-defender-atp/get-ti-indicators-collection.md | 2 +- .../microsoft-defender-atp/get-user-information.md | 2 +- 25 files changed, 37 insertions(+), 13 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md index 9e648b3be9..ae5234f88a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id.md @@ -25,7 +25,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) ## API description diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machine-group-exposure-score.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-group-exposure-score.md index 6b4d5f60fd..ad2292bc64 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machine-group-exposure-score.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machine-group-exposure-score.md @@ -24,7 +24,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Prerelease information](../../includes/prerelease.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users.md index 4c77e24fe8..ecb63d8f22 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users.md @@ -25,7 +25,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) ## API description diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md index a057bf2c92..080aab21f1 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts.md @@ -24,7 +24,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) ## API description diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object.md b/windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object.md index cf8cfaad8d..68cc769882 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object.md @@ -24,7 +24,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) ## API description diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection.md b/windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection.md index e4f2a768e1..b2d9e37c3a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection.md @@ -24,7 +24,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) ## API description diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection.md b/windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection.md index 9841f7c576..11d9337826 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection.md @@ -27,6 +27,8 @@ ms.date: 10/07/2018 - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + Retrieves a collection of RBAC device groups. ## Permissions diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machines-by-software.md b/windows/security/threat-protection/microsoft-defender-atp/get-machines-by-software.md index 62993cd270..88b4c2deeb 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machines-by-software.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machines-by-software.md @@ -24,6 +24,8 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + [!include[Prerelease information](../../includes/prerelease.md)] Retrieve a list of device references that has this software installed. diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machines-by-vulnerability.md b/windows/security/threat-protection/microsoft-defender-atp/get-machines-by-vulnerability.md index 7b710a1404..d78b7b04c0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machines-by-vulnerability.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machines-by-vulnerability.md @@ -24,6 +24,8 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + [!include[Prerelease information](../../includes/prerelease.md)] Retrieves a list of devices affected by a vulnerability. diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-machines.md index d51748fe3f..65fa1f1295 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machines.md @@ -24,7 +24,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) ## API description diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machinesecuritystates-collection.md b/windows/security/threat-protection/microsoft-defender-atp/get-machinesecuritystates-collection.md index 280d18b74d..efe08b231d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machinesecuritystates-collection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machinesecuritystates-collection.md @@ -26,6 +26,8 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + Retrieves a collection of devices security states. ## Permissions diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-missing-kbs-machine.md b/windows/security/threat-protection/microsoft-defender-atp/get-missing-kbs-machine.md index a80f138899..ae5c676460 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-missing-kbs-machine.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-missing-kbs-machine.md @@ -24,7 +24,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) Retrieves missing KBs (security updates) by device ID diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-missing-kbs-software.md b/windows/security/threat-protection/microsoft-defender-atp/get-missing-kbs-software.md index 6c0b32d5ce..faed6a6453 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-missing-kbs-software.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-missing-kbs-software.md @@ -24,7 +24,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) Retrieves missing KBs (security updates) by software ID diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri.md b/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri.md index 0b97089136..40c7f78439 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri.md @@ -24,7 +24,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) ## API description diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-by-id.md index dfae95f8ae..46d30a7fe8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-by-id.md @@ -24,6 +24,8 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + [!include[Prerelease information](../../includes/prerelease.md)] Retrieves a security recommendation by its ID. diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-machines.md index cac55e2fd4..3908a83394 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-machines.md @@ -24,6 +24,8 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + [!include[Prerelease information](../../includes/prerelease.md)] Retrieves a list of devices associated with the security recommendation. diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-software.md b/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-software.md index bc7bbbcec6..211e418bcf 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-software.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-software.md @@ -24,6 +24,8 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + [!include[Prerelease information](../../includes/prerelease.md)] Retrieves a security recommendation related to a specific software. diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-vulnerabilities.md b/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-vulnerabilities.md index c8a141d029..c6f395cbae 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-vulnerabilities.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-vulnerabilities.md @@ -24,6 +24,8 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + [!include[Prerelease information](../../includes/prerelease.md)] Retrieves a list of vulnerabilities associated with the security recommendation. diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-security-recommendations.md b/windows/security/threat-protection/microsoft-defender-atp/get-security-recommendations.md index 076be92fab..cb7694b856 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-security-recommendations.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-security-recommendations.md @@ -24,6 +24,8 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + [!include[Prerelease information](../../includes/prerelease.md)] Retrieves a collection of security recommendations related to a given device ID. diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-software-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/get-software-by-id.md index 8401627e8b..dd8a168f82 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-software-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-software-by-id.md @@ -24,6 +24,8 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + [!include[Prerelease information](../../includes/prerelease.md)] Retrieves software details by ID. diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-software-ver-distribution.md b/windows/security/threat-protection/microsoft-defender-atp/get-software-ver-distribution.md index 2fa4f7dc0a..6eafb52d5a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-software-ver-distribution.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-software-ver-distribution.md @@ -24,6 +24,8 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + [!include[Prerelease information](../../includes/prerelease.md)] Retrieves a list of your organization's software version distribution. diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-software.md b/windows/security/threat-protection/microsoft-defender-atp/get-software.md index ea42920222..5f5d47711a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-software.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-software.md @@ -24,7 +24,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) Retrieves the organization software inventory. diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-started-partner-integration.md b/windows/security/threat-protection/microsoft-defender-atp/get-started-partner-integration.md index 3e8c554d07..24ba05d923 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-started-partner-integration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-started-partner-integration.md @@ -26,6 +26,8 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + To become a Defender for Endpoint solution partner, you'll need to follow and complete the following steps. ## Step 1: Subscribe to a Microsoft Defender for Endpoint Developer license diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-ti-indicators-collection.md b/windows/security/threat-protection/microsoft-defender-atp/get-ti-indicators-collection.md index 98dd3048d2..815e65c9f4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-ti-indicators-collection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-ti-indicators-collection.md @@ -24,7 +24,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) ## API description diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-user-information.md b/windows/security/threat-protection/microsoft-defender-atp/get-user-information.md index 31718ea18c..79ad50ac44 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-user-information.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-user-information.md @@ -24,7 +24,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) Retrieve a User entity by key (user name). ## Permissions From f3c395e8717d482df82c4fcdb733dfa521d54320 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Tue, 5 Jan 2021 10:24:37 +0530 Subject: [PATCH 023/161] update updated review comments --- .../microsoft-defender-atp/get-user-related-alerts.md | 2 +- .../microsoft-defender-atp/get-user-related-machines.md | 2 +- .../microsoft-defender-atp/get-vuln-by-software.md | 2 ++ .../microsoft-defender-atp/get-vulnerability-by-id.md | 2 ++ .../security/threat-protection/microsoft-defender-atp/gov.md | 4 +++- .../microsoft-defender-atp/helpful-resources.md | 3 +++ .../import-export-exploit-protection-emet-xml.md | 3 +++ .../microsoft-defender-atp/indicator-certificates.md | 1 - .../information-protection-in-windows-overview.md | 4 +++- .../information-protection-investigation.md | 3 ++- .../microsoft-defender-atp/initiate-autoir-investigation.md | 2 +- .../microsoft-defender-atp/investigate-alerts.md | 3 --- .../microsoft-defender-atp/investigate-behind-proxy.md | 3 +-- .../microsoft-defender-atp/investigate-domain.md | 2 -- .../microsoft-defender-atp/investigate-files.md | 2 -- .../microsoft-defender-atp/investigate-incidents.md | 2 -- .../microsoft-defender-atp/investigate-user.md | 1 - .../threat-protection/microsoft-defender-atp/investigation.md | 2 +- .../microsoft-defender-atp/ios-configure-features.md | 2 ++ 19 files changed, 25 insertions(+), 20 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts.md index c33872be0e..58d18995b4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts.md @@ -24,7 +24,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) ## API description diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines.md index 55c5367cdf..3ccf556196 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines.md @@ -24,7 +24,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) ## API description diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-vuln-by-software.md b/windows/security/threat-protection/microsoft-defender-atp/get-vuln-by-software.md index 1b88d6ba58..ea02b86a98 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-vuln-by-software.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-vuln-by-software.md @@ -24,6 +24,8 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + [!include[Prerelease information](../../includes/prerelease.md)] Retrieve a list of vulnerabilities in the installed software. diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-vulnerability-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/get-vulnerability-by-id.md index ddfe9b7613..862097dae5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-vulnerability-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-vulnerability-by-id.md @@ -24,6 +24,8 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + [!include[Prerelease information](../../includes/prerelease.md)] Retrieves vulnerability information by its ID. diff --git a/windows/security/threat-protection/microsoft-defender-atp/gov.md b/windows/security/threat-protection/microsoft-defender-atp/gov.md index ddeee9fffc..3ea91ca854 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/gov.md +++ b/windows/security/threat-protection/microsoft-defender-atp/gov.md @@ -21,11 +21,13 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + + Microsoft Defender for Endpoint for US Government Community Cloud High (GCC High) customers, built in the US Azure Government environment, uses the same underlying technologies as Defender for Endpoint in Azure Commercial. This offering is currently available to US Office 365 GCC High customers and is based on the same prevention, detection, investigation, and remediation as the commercial version. However, there are some key differences in the availability of capabilities for this offering. diff --git a/windows/security/threat-protection/microsoft-defender-atp/helpful-resources.md b/windows/security/threat-protection/microsoft-defender-atp/helpful-resources.md index e25dc5ca9d..708b747a1f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/helpful-resources.md +++ b/windows/security/threat-protection/microsoft-defender-atp/helpful-resources.md @@ -26,6 +26,9 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + + Access helpful resources such as links to blogs and other resources related to Microsoft Defender for Endpoint. ## Endpoint protection platform diff --git a/windows/security/threat-protection/microsoft-defender-atp/import-export-exploit-protection-emet-xml.md b/windows/security/threat-protection/microsoft-defender-atp/import-export-exploit-protection-emet-xml.md index 8647909960..15c4791c20 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/import-export-exploit-protection-emet-xml.md +++ b/windows/security/threat-protection/microsoft-defender-atp/import-export-exploit-protection-emet-xml.md @@ -24,6 +24,9 @@ manager: dansimp - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + + Exploit protection helps protect devices from malware that use exploits to spread and infect. It consists of a number of mitigations that can be applied at either the operating system level, or at the individual app level. You use the Windows Security app or PowerShell to create a set of mitigations (known as a configuration). You can then export this configuration as an XML file and share it with multiple devices on your network. Then, they all have the same set of mitigation settings. diff --git a/windows/security/threat-protection/microsoft-defender-atp/indicator-certificates.md b/windows/security/threat-protection/microsoft-defender-atp/indicator-certificates.md index 71da3d2842..0f9d3c4068 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/indicator-certificates.md +++ b/windows/security/threat-protection/microsoft-defender-atp/indicator-certificates.md @@ -27,7 +27,6 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automationexclusionlist-abovefoldlink) You can create indicators for certificates. Some common use cases include: diff --git a/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md b/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md index 31dcd3c313..2ea94a2abc 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md @@ -21,11 +21,13 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + + [!include[Prerelease information](../../includes/prerelease.md)] Information protection is an integral part of Microsoft 365 Enterprise suite, providing intelligent protection to keep sensitive data secure while enabling productivity in the workplace. diff --git a/windows/security/threat-protection/microsoft-defender-atp/information-protection-investigation.md b/windows/security/threat-protection/microsoft-defender-atp/information-protection-investigation.md index 4c4156700e..3764eae6a9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/information-protection-investigation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/information-protection-investigation.md @@ -20,11 +20,12 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + A typical advanced persistent threat lifecycle involves data exfiltration. In a security incident, it's important to have the ability to prioritize investigations where sensitive files may be jeopardy so that corporate data and information are protected. Defender for Endpoint helps to make the prioritization of security incidents much simpler with the use of sensitivity labels. Sensitivity labels quickly identify incidents that may involve devices with sensitive information such as confidential information. diff --git a/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md b/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md index dbc21b4bd8..9b262ecab7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md @@ -24,7 +24,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) ## API description diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-alerts.md index c4e01d5884..141c3a7389 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-alerts.md @@ -24,13 +24,10 @@ ms.date: 04/24/2018 [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - - >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigatealerts-abovefoldlink) Investigate alerts that are affecting your network, understand what they mean, and how to resolve them. diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-behind-proxy.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-behind-proxy.md index 33186852c6..8cafe4809a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-behind-proxy.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-behind-proxy.md @@ -23,12 +23,11 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ->Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigatemachines-abovefoldlink) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigatemachines-abovefoldlink) Defender for Endpoint supports network connection monitoring from different levels of the network stack. A challenging case is when the network uses a forward proxy as a gateway to the Internet. diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-domain.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-domain.md index a8dfc081a7..20c5de9c96 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-domain.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-domain.md @@ -28,8 +28,6 @@ ms.date: 04/24/2018 - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - - >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigatedomain-abovefoldlink) Investigate a domain to see if devices and servers in your enterprise network have been communicating with a known malicious domain. diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-files.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-files.md index 3ca7969948..cf2e78566d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-files.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-files.md @@ -24,12 +24,10 @@ ms.date: 04/24/2018 [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigatefiles-abovefoldlink) Investigate the details of a file associated with a specific alert, behavior, or event to help determine if the file exhibits malicious activities, identify the attack motivation, and understand the potential scope of the breach. diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-incidents.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-incidents.md index 1eb70e5f19..58b08c56a8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-incidents.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-incidents.md @@ -23,12 +23,10 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - Investigate incidents that affect your network, understand what they mean, and collate evidence to resolve them. When you investigate an incident, you'll see: diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-user.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-user.md index f2bfd13fa8..3850381258 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-user.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-user.md @@ -23,7 +23,6 @@ ms.date: 04/24/2018 [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigation.md b/windows/security/threat-protection/microsoft-defender-atp/investigation.md index aff16dc0e4..2369330a21 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigation.md @@ -26,7 +26,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) Represent an Automated Investigation entity in Defender for Endpoint.
See [Overview of automated investigations](automated-investigations.md) for more information. diff --git a/windows/security/threat-protection/microsoft-defender-atp/ios-configure-features.md b/windows/security/threat-protection/microsoft-defender-atp/ios-configure-features.md index daef5c685b..f48b14c45b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/ios-configure-features.md +++ b/windows/security/threat-protection/microsoft-defender-atp/ios-configure-features.md @@ -28,6 +28,8 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + > [!NOTE] > Defender for Endpoint for iOS would use a VPN in order to provide the Web Protection feature. This is not a regular VPN and is a local/self-looping VPN that does not take traffic outside the device. From 2ecaf98d63d284fb283a5382f3115a761b20ffb0 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Tue, 5 Jan 2021 11:59:50 +0530 Subject: [PATCH 024/161] updated updated with review comments --- .../threat-protection/microsoft-defender-atp/ios-install.md | 2 ++ .../threat-protection/microsoft-defender-atp/ios-privacy.md | 2 ++ .../threat-protection/microsoft-defender-atp/ios-terms.md | 1 + .../microsoft-defender-atp/isolate-machine.md | 2 +- .../microsoft-defender-atp/linux-exclusions.md | 2 ++ .../microsoft-defender-atp/linux-install-manually.md | 2 ++ .../microsoft-defender-atp/linux-install-with-ansible.md | 2 ++ .../microsoft-defender-atp/linux-install-with-puppet.md | 2 ++ .../microsoft-defender-atp/linux-preferences.md | 2 ++ .../threat-protection/microsoft-defender-atp/linux-privacy.md | 3 ++- .../threat-protection/microsoft-defender-atp/linux-pua.md | 2 ++ .../microsoft-defender-atp/linux-resources.md | 2 ++ .../microsoft-defender-atp/linux-static-proxy-configuration.md | 2 ++ .../microsoft-defender-atp/linux-support-connectivity.md | 3 ++- .../microsoft-defender-atp/linux-support-install.md | 2 ++ .../microsoft-defender-atp/linux-support-perf.md | 2 +- .../threat-protection/microsoft-defender-atp/linux-updates.md | 2 ++ .../microsoft-defender-atp/live-response-command-examples.md | 1 + .../threat-protection/microsoft-defender-atp/live-response.md | 2 ++ .../threat-protection/microsoft-defender-atp/mac-exclusions.md | 2 ++ .../microsoft-defender-atp/mac-install-jamfpro-login.md | 2 ++ .../microsoft-defender-atp/mac-install-manually.md | 3 ++- .../microsoft-defender-atp/mac-install-with-jamf.md | 2 ++ .../microsoft-defender-atp/mac-install-with-other-mdm.md | 2 ++ .../microsoft-defender-atp/mac-jamfpro-device-groups.md | 2 ++ .../microsoft-defender-atp/mac-jamfpro-enroll-devices.md | 2 ++ 26 files changed, 48 insertions(+), 5 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/ios-install.md b/windows/security/threat-protection/microsoft-defender-atp/ios-install.md index 855be33f20..9388ff4180 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/ios-install.md +++ b/windows/security/threat-protection/microsoft-defender-atp/ios-install.md @@ -28,6 +28,8 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigateip-abovefoldlink) + This topic describes deploying Defender for Endpoint for iOS on Intune Company Portal enrolled devices. For more information about Intune device enrollment, see [Enroll iOS/iPadOS devices in Intune](https://docs.microsoft.com/mem/intune/enrollment/ios-enroll). ## Before you begin diff --git a/windows/security/threat-protection/microsoft-defender-atp/ios-privacy.md b/windows/security/threat-protection/microsoft-defender-atp/ios-privacy.md index bea4f8b740..34c65130f6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/ios-privacy.md +++ b/windows/security/threat-protection/microsoft-defender-atp/ios-privacy.md @@ -26,6 +26,8 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigateip-abovefoldlink) + > [!NOTE] > Defender for Endpoint for iOS uses a VPN to provide the Web Protection feature. This is not a regular VPN and is a local or self-looping VPN that does not take traffic outside the device. **Microsoft or your organization, does not see your browsing activity.** diff --git a/windows/security/threat-protection/microsoft-defender-atp/ios-terms.md b/windows/security/threat-protection/microsoft-defender-atp/ios-terms.md index 99c2a1585c..6b8e7708c1 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/ios-terms.md +++ b/windows/security/threat-protection/microsoft-defender-atp/ios-terms.md @@ -29,6 +29,7 @@ hideEdit: true - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigateip-abovefoldlink) ## MICROSOFT APPLICATION LICENSE TERMS: MICROSOFT DEFENDER FOR ENDPOINT diff --git a/windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md b/windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md index b6bf991bcf..095dee7934 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md +++ b/windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md @@ -25,7 +25,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) ## API description diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-exclusions.md b/windows/security/threat-protection/microsoft-defender-atp/linux-exclusions.md index 2a939b7865..4fe2444889 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-exclusions.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-exclusions.md @@ -28,6 +28,8 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigateip-abovefoldlink) + This article provides information on how to define exclusions that apply to on-demand scans, and real-time protection and monitoring. > [!IMPORTANT] diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-install-manually.md b/windows/security/threat-protection/microsoft-defender-atp/linux-install-manually.md index 31cdf4d0ee..da32e270cb 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-install-manually.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-install-manually.md @@ -29,6 +29,8 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigateip-abovefoldlink) + This article describes how to deploy Microsoft Defender for Endpoint for Linux manually. A successful deployment requires the completion of all of the following tasks: - [Configure the Linux software repository](#configure-the-linux-software-repository) diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-install-with-ansible.md b/windows/security/threat-protection/microsoft-defender-atp/linux-install-with-ansible.md index d20dbb61df..d117554ce3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-install-with-ansible.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-install-with-ansible.md @@ -29,6 +29,8 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigateip-abovefoldlink) + This article describes how to deploy Defender for Endpoint for Linux using Ansible. A successful deployment requires the completion of all of the following tasks: - [Download the onboarding package](#download-the-onboarding-package) diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-install-with-puppet.md b/windows/security/threat-protection/microsoft-defender-atp/linux-install-with-puppet.md index 131154d289..6b66fa8f75 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-install-with-puppet.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-install-with-puppet.md @@ -29,6 +29,8 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigateip-abovefoldlink) + This article describes how to deploy Defender for Endpoint for Linux using Puppet. A successful deployment requires the completion of all of the following tasks: - [Download the onboarding package](#download-the-onboarding-package) diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-preferences.md b/windows/security/threat-protection/microsoft-defender-atp/linux-preferences.md index ec07346a41..f63acb5d9d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-preferences.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-preferences.md @@ -29,6 +29,8 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigateip-abovefoldlink) + >[!IMPORTANT] >This topic contains instructions for how to set preferences for Defender for Endpoint for Linux in enterprise environments. If you are interested in configuring the product on a device from the command-line, see [Resources](linux-resources.md#configure-from-the-command-line). diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-privacy.md b/windows/security/threat-protection/microsoft-defender-atp/linux-privacy.md index c07a3578a6..a1933b9926 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-privacy.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-privacy.md @@ -21,11 +21,12 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigateip-abovefoldlink) + Microsoft is committed to providing you with the information and controls you need to make choices about how your data is collected and used when you’re using Defender for Endpoint for Linux. This topic describes the privacy controls available within the product, how to manage these controls with policy settings and more details on the data events that are collected. diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-pua.md b/windows/security/threat-protection/microsoft-defender-atp/linux-pua.md index 68e7f23b4e..d79ecb9600 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-pua.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-pua.md @@ -28,6 +28,8 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigateip-abovefoldlink) + The potentially unwanted application (PUA) protection feature in Defender for Endpoint for Linux can detect and block PUA files on endpoints in your network. These applications are not considered viruses, malware, or other types of threats, but might perform actions on endpoints that adversely affect their performance or use. PUA can also refer to applications that are considered to have poor reputation. diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-resources.md b/windows/security/threat-protection/microsoft-defender-atp/linux-resources.md index 73987788c9..05ed526260 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-resources.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-resources.md @@ -29,6 +29,8 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigateip-abovefoldlink) + ## Collect diagnostic information If you can reproduce a problem, first increase the logging level, run the system for some time, and then restore the logging level to the default. diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-static-proxy-configuration.md b/windows/security/threat-protection/microsoft-defender-atp/linux-static-proxy-configuration.md index 5c05635456..ca045ff430 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-static-proxy-configuration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-static-proxy-configuration.md @@ -29,6 +29,8 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigateip-abovefoldlink) + Microsoft Defender ATP can discover a proxy server using the ```HTTPS_PROXY``` environment variable. This setting must be configured **both** at installation time and after the product has been installed. ## Installation time configuration diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-support-connectivity.md b/windows/security/threat-protection/microsoft-defender-atp/linux-support-connectivity.md index 7ddf65b664..234df1548c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-support-connectivity.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-support-connectivity.md @@ -24,11 +24,12 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigateip-abovefoldlink) + ## Run the connectivity test To test if Defender for Endpoint for Linux can communicate to the cloud with the current network settings, run a connectivity test from the command line: diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-support-install.md b/windows/security/threat-protection/microsoft-defender-atp/linux-support-install.md index 31e67a513e..d04d723402 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-support-install.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-support-install.md @@ -29,6 +29,8 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigateip-abovefoldlink) + ## Verify if installation succeeded An error in installation may or may not result in a meaningful error message by the package manager. To verify if the installation succeeded, obtain and check the installation logs using: diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-support-perf.md b/windows/security/threat-protection/microsoft-defender-atp/linux-support-perf.md index cc909e9afa..498a5638d7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-support-perf.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-support-perf.md @@ -23,10 +23,10 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigateip-abovefoldlink) This article provides some general steps that can be used to narrow down performance issues related to Defender for Endpoint for Linux. diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-updates.md b/windows/security/threat-protection/microsoft-defender-atp/linux-updates.md index de5f4532b8..6dd62d7da1 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-updates.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-updates.md @@ -29,6 +29,8 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigateip-abovefoldlink) + Microsoft regularly publishes software updates to improve performance, security, and to deliver new features. > [!WARNING] diff --git a/windows/security/threat-protection/microsoft-defender-atp/live-response-command-examples.md b/windows/security/threat-protection/microsoft-defender-atp/live-response-command-examples.md index db9749d0f9..7883f6a03b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/live-response-command-examples.md +++ b/windows/security/threat-protection/microsoft-defender-atp/live-response-command-examples.md @@ -26,6 +26,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigateip-abovefoldlink) Learn about common commands used in live response and see examples on how they are typically used. diff --git a/windows/security/threat-protection/microsoft-defender-atp/live-response.md b/windows/security/threat-protection/microsoft-defender-atp/live-response.md index 0b5318d4af..7bfb93e10c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/live-response.md +++ b/windows/security/threat-protection/microsoft-defender-atp/live-response.md @@ -25,6 +25,8 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigateip-abovefoldlink) + Live response gives security operations teams instantaneous access to a device (also referred to as a machine) using a remote shell connection. This gives you the power to do in-depth investigative work and take immediate response actions to promptly contain identified threats—in real time. Live response is designed to enhance investigations by enabling your security operations team to collect forensic data, run scripts, send suspicious entities for analysis, remediate threats, and proactively hunt for emerging threats.

diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-exclusions.md b/windows/security/threat-protection/microsoft-defender-atp/mac-exclusions.md index 1a5a15f330..0d02fbc860 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-exclusions.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-exclusions.md @@ -28,6 +28,8 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigateip-abovefoldlink) + This article provides information on how to define exclusions that apply to on-demand scans, and real-time protection and monitoring. >[!IMPORTANT] diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-install-jamfpro-login.md b/windows/security/threat-protection/microsoft-defender-atp/mac-install-jamfpro-login.md index 27de5d44de..02768f9c9e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-install-jamfpro-login.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-install-jamfpro-login.md @@ -27,6 +27,8 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigateip-abovefoldlink) + 1. Enter your credentials. ![Image of Jamf Pro dashboard](images/jamf-pro-portal1.png) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-install-manually.md b/windows/security/threat-protection/microsoft-defender-atp/mac-install-manually.md index 064657b978..f61fab3284 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-install-manually.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-install-manually.md @@ -23,11 +23,12 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigateip-abovefoldlink) + This topic describes how to deploy Microsoft Defender for Endpoint for macOS manually. A successful deployment requires the completion of all of the following steps: - [Download installation and onboarding packages](#download-installation-and-onboarding-packages) - [Application installation (macOS 10.15 and older versions)](#application-installation-macos-1015-and-older-versions) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-jamf.md b/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-jamf.md index 4d8f5b0a59..9c62c93686 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-jamf.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-jamf.md @@ -28,6 +28,8 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigateip-abovefoldlink) + Learn how to deploy Microsoft Defender for Endpoint for macOS with Jamf Pro. > [!NOTE] diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-other-mdm.md b/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-other-mdm.md index 044e4550e7..1f89b974af 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-other-mdm.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-other-mdm.md @@ -27,6 +27,8 @@ ms.topic: conceptual **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) + +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigateip-abovefoldlink) ## Prerequisites and system requirements diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-jamfpro-device-groups.md b/windows/security/threat-protection/microsoft-defender-atp/mac-jamfpro-device-groups.md index 327ec51d6f..65d3c7e838 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-jamfpro-device-groups.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-jamfpro-device-groups.md @@ -27,6 +27,8 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigateip-abovefoldlink) + Set up the device groups similar to Group policy organizational unite (OUs), Microsoft Endpoint Configuration Manager's device collection, and Intune's device groups. 1. Navigate to **Static Computer Groups**. diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-jamfpro-enroll-devices.md b/windows/security/threat-protection/microsoft-defender-atp/mac-jamfpro-enroll-devices.md index 7e2a462130..ef622f9f2e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-jamfpro-enroll-devices.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-jamfpro-enroll-devices.md @@ -28,6 +28,8 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigateip-abovefoldlink) + ## Enroll macOS devices There are multiple methods of getting enrolled to JamF. From 9768adbcd092c9cbad56ddb02390f88d396f15e5 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Tue, 5 Jan 2021 16:20:46 +0530 Subject: [PATCH 025/161] updated updated per review comments --- .../microsoft-defender-atp/production-deployment.md | 2 ++ .../microsoft-defender-atp/pull-alerts-using-rest-api.md | 3 +-- .../microsoft-defender-atp/raw-data-export-event-hub.md | 2 +- .../microsoft-defender-atp/raw-data-export-storage.md | 2 +- .../microsoft-defender-atp/raw-data-export.md | 2 +- .../threat-protection/microsoft-defender-atp/rbac.md | 2 +- .../microsoft-defender-atp/recommendation.md | 2 +- .../microsoft-defender-atp/respond-file-alerts.md | 2 +- .../microsoft-defender-atp/restrict-code-execution.md | 2 +- .../microsoft-defender-atp/run-advanced-query-api.md | 2 +- .../run-advanced-query-sample-powershell.md | 1 + .../run-advanced-query-sample-python.md | 2 ++ .../threat-protection/microsoft-defender-atp/run-av-scan.md | 2 +- .../microsoft-defender-atp/run-detection-test.md | 1 + .../threat-protection/microsoft-defender-atp/score.md | 2 +- .../microsoft-defender-atp/set-device-value.md | 2 +- .../threat-protection/microsoft-defender-atp/software.md | 2 +- .../microsoft-defender-atp/stop-and-quarantine-file.md | 2 +- .../switch-to-microsoft-defender-migration.md | 6 ++++++ .../switch-to-microsoft-defender-onboard.md | 6 ++++++ .../switch-to-microsoft-defender-prepare.md | 6 ++++++ .../switch-to-microsoft-defender-setup.md | 6 ++++++ .../symantec-to-microsoft-defender-atp-migration.md | 5 +++++ .../symantec-to-microsoft-defender-atp-onboard.md | 6 ++++++ .../symantec-to-microsoft-defender-atp-prepare.md | 6 ++++++ .../symantec-to-microsoft-defender-atp-setup.md | 6 ++++++ .../threat-analytics-analyst-reports.md | 2 ++ .../microsoft-defender-atp/threat-analytics.md | 2 ++ .../microsoft-defender-atp/threat-protection-integration.md | 2 ++ 29 files changed, 73 insertions(+), 15 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md b/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md index 516c64e1b5..78efdd3b76 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md +++ b/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md @@ -27,7 +27,9 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) Deploying Defender for Endpoint is a three-phase process: diff --git a/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api.md b/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api.md index d656f995c8..e2b670a31e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api.md +++ b/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api.md @@ -24,8 +24,7 @@ ms.topic: article **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - - +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-pullalerts-abovefoldlink) diff --git a/windows/security/threat-protection/microsoft-defender-atp/raw-data-export-event-hub.md b/windows/security/threat-protection/microsoft-defender-atp/raw-data-export-event-hub.md index da5a855d90..151caefffb 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/raw-data-export-event-hub.md +++ b/windows/security/threat-protection/microsoft-defender-atp/raw-data-export-event-hub.md @@ -26,7 +26,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-configuresiem-abovefoldlink) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-configuresiem-abovefoldlink) ## Before you begin: diff --git a/windows/security/threat-protection/microsoft-defender-atp/raw-data-export-storage.md b/windows/security/threat-protection/microsoft-defender-atp/raw-data-export-storage.md index 6ae21ac206..b56e2f57db 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/raw-data-export-storage.md +++ b/windows/security/threat-protection/microsoft-defender-atp/raw-data-export-storage.md @@ -26,7 +26,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-configuresiem-abovefoldlink) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-configuresiem-abovefoldlink) ## Before you begin: diff --git a/windows/security/threat-protection/microsoft-defender-atp/raw-data-export.md b/windows/security/threat-protection/microsoft-defender-atp/raw-data-export.md index b9d7dfab14..825ffd35ab 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/raw-data-export.md +++ b/windows/security/threat-protection/microsoft-defender-atp/raw-data-export.md @@ -25,7 +25,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-configuresiem-abovefoldlink) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-configuresiem-abovefoldlink) ## Stream Advanced Hunting events to Event Hubs and/or Azure storage account. diff --git a/windows/security/threat-protection/microsoft-defender-atp/rbac.md b/windows/security/threat-protection/microsoft-defender-atp/rbac.md index e47350fff9..f7c1b197fa 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/rbac.md +++ b/windows/security/threat-protection/microsoft-defender-atp/rbac.md @@ -27,7 +27,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) ->Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-rbac-abovefoldlink) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-rbac-abovefoldlink) Using role-based access control (RBAC), you can create roles and groups within your security operations team to grant appropriate access to the portal. Based on the roles and groups you create, you have fine-grained control over what users with access to the portal can see and do. diff --git a/windows/security/threat-protection/microsoft-defender-atp/recommendation.md b/windows/security/threat-protection/microsoft-defender-atp/recommendation.md index a295402e97..58cf40fc12 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/recommendation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/recommendation.md @@ -25,7 +25,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Prerelease information](../../includes/prerelease.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md index b9e3f1547e..502574a0ba 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts.md @@ -28,7 +28,7 @@ ms.topic: article [!include[Prerelease information](../../includes/prerelease.md)] ->Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-responddile-abovefoldlink) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-responddile-abovefoldlink) Quickly respond to detected attacks by stopping and quarantining files or blocking a file. After taking action on files, you can check activity details in the Action center. diff --git a/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution.md b/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution.md index 69fed7db3a..c9b2b66b9b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution.md +++ b/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution.md @@ -24,7 +24,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) ## API description diff --git a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api.md b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api.md index e6c6954a3f..e145f07b00 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api.md +++ b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api.md @@ -25,7 +25,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) ## Limitations 1. You can only run a query on data from the last 30 days. diff --git a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-powershell.md b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-powershell.md index 0f91e18e73..c3b1201de7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-powershell.md +++ b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-powershell.md @@ -25,6 +25,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) Run advanced queries using PowerShell, see [Advanced Hunting API](run-advanced-query-api.md). diff --git a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-python.md b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-python.md index fe714301b5..caae76a814 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-python.md +++ b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-python.md @@ -26,6 +26,8 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + Run advanced queries using Python, see [Advanced Hunting API](run-advanced-query-api.md). In this section, we share Python samples to retrieve a token and use it to run a query. diff --git a/windows/security/threat-protection/microsoft-defender-atp/run-av-scan.md b/windows/security/threat-protection/microsoft-defender-atp/run-av-scan.md index be84de1b82..9ffb81dace 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/run-av-scan.md +++ b/windows/security/threat-protection/microsoft-defender-atp/run-av-scan.md @@ -24,7 +24,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) ## API description diff --git a/windows/security/threat-protection/microsoft-defender-atp/run-detection-test.md b/windows/security/threat-protection/microsoft-defender-atp/run-detection-test.md index f37177fc33..bc24ff55d7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/run-detection-test.md +++ b/windows/security/threat-protection/microsoft-defender-atp/run-detection-test.md @@ -33,6 +33,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) Run the following PowerShell script on a newly onboarded device to verify that it is properly reporting to the Defender for Endpoint service. diff --git a/windows/security/threat-protection/microsoft-defender-atp/score.md b/windows/security/threat-protection/microsoft-defender-atp/score.md index 4807947a54..acf522847d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/score.md +++ b/windows/security/threat-protection/microsoft-defender-atp/score.md @@ -25,7 +25,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Prerelease information](../../includes/prerelease.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/set-device-value.md b/windows/security/threat-protection/microsoft-defender-atp/set-device-value.md index e58f039091..2a64c61bba 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/set-device-value.md +++ b/windows/security/threat-protection/microsoft-defender-atp/set-device-value.md @@ -24,7 +24,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) ## API description diff --git a/windows/security/threat-protection/microsoft-defender-atp/software.md b/windows/security/threat-protection/microsoft-defender-atp/software.md index 06db1a9495..31304d6eb5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/software.md +++ b/windows/security/threat-protection/microsoft-defender-atp/software.md @@ -24,7 +24,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) [!include[Prerelease information](../../includes/prerelease.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/stop-and-quarantine-file.md b/windows/security/threat-protection/microsoft-defender-atp/stop-and-quarantine-file.md index aa446e46d4..04b2b48f48 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/stop-and-quarantine-file.md +++ b/windows/security/threat-protection/microsoft-defender-atp/stop-and-quarantine-file.md @@ -24,7 +24,7 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) ## API description diff --git a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-migration.md b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-migration.md index c9b60c2b17..1a6530cd00 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-migration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-migration.md @@ -25,6 +25,12 @@ ms.reviewer: jesquive, chventou, jonix, chriggs, owtho # Make the switch from a non-Microsoft endpoint solution to Microsoft Defender for Endpoint +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) + +> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + If you are planning to switch from a non-Microsoft endpoint protection solution to [Microsoft Defender for Endpoint](https://docs.microsoft.com/windows/security/threat-protection), and you're looking for help, you're in the right place. Use this article as a guide to plan your migration. > [!TIP] diff --git a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-onboard.md b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-onboard.md index 4852139083..823b011616 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-onboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-onboard.md @@ -25,6 +25,12 @@ ms.reviewer: jesquive, chventou, jonix, chriggs, owtho # Switch to Microsoft Defender for Endpoint - Phase 3: Onboard +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) + +> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + |[![Phase 1: Prepare](images/prepare.png)](switch-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](switch-to-microsoft-defender-prepare.md) |[![Phase 2: Set up](images/setup.png)](switch-to-microsoft-defender-setup.md)
[Phase 2: Set up](switch-to-microsoft-defender-setup.md) |![Phase 3: Onboard](images/onboard.png)
Phase 3: Onboard | |--|--|--| || |*You are here!* | diff --git a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-prepare.md b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-prepare.md index 1ee41dc125..6bee8b6fcf 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-prepare.md +++ b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-prepare.md @@ -25,6 +25,12 @@ ms.reviewer: jesquive, chventou, jonix, chriggs, owtho # Switch to Microsoft Defender for Endpoint - Phase 1: Prepare +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) + +> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + |![Phase 1: Prepare](images/prepare.png)
Phase 1: Prepare |[![Phase 2: Set up](images/setup.png)](switch-to-microsoft-defender-setup.md)
[Phase 2: Set up](switch-to-microsoft-defender-setup.md) |[![Phase 3: Onboard](images/onboard.png)](switch-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](switch-to-microsoft-defender-onboard.md) | |--|--|--| |*You are here!*| | | diff --git a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md index 28403de16e..77e365be29 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md +++ b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md @@ -25,6 +25,12 @@ ms.reviewer: jesquive, chventou, jonix, chriggs, owtho # Switch to Microsoft Defender for Endpoint - Phase 2: Setup +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) + +> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + |[![Phase 1: Prepare](images/prepare.png)](switch-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](switch-to-microsoft-defender-prepare.md) |![Phase 2: Set up](images/setup.png)
Phase 2: Set up |[![Phase 3: Onboard](images/onboard.png)](switch-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](switch-to-microsoft-defender-onboard.md) | |--|--|--| ||*You are here!* | | diff --git a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-migration.md b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-migration.md index 371f380e63..ffc55d285b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-migration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-migration.md @@ -26,6 +26,11 @@ ms.reviewer: depicker, yongrhee, chriggs # Migrate from Symantec to Microsoft Defender for Endpoint +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md index 5b6c7e813f..2d7fc2fa49 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md @@ -25,6 +25,12 @@ ms.reviewer: depicker, yongrhee, chriggs # Migrate from Symantec - Phase 3: Onboard to Microsoft Defender for Endpoint +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) + +> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-prepare.md b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-prepare.md index f4f06cbc7b..ebed1096cc 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-prepare.md +++ b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-prepare.md @@ -25,6 +25,12 @@ ms.reviewer: depicker, yongrhee, chriggs # Migrate from Symantec - Phase 1: Prepare for your migration +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) + +> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md index 53f1a5d9d1..677fdd3578 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md +++ b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md @@ -25,6 +25,12 @@ ms.reviewer: depicker, yongrhee, chriggs # Migrate from Symantec - Phase 2: Set up Microsoft Defender for Endpoint +**Applies to:** +- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) +- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) + +> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-analytics-analyst-reports.md b/windows/security/threat-protection/microsoft-defender-atp/threat-analytics-analyst-reports.md index 827b287561..3ab782e6bc 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-analytics-analyst-reports.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-analytics-analyst-reports.md @@ -27,6 +27,8 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + Each [threat analytics report](threat-analytics.md) includes dynamic sections and a comprehensive written section called the _analyst report_. To access this section, open the report about the tracked threat and select the **Analyst report** tab. ![Image of the analyst report section of a threat analytics report](images/ta-analyst-report-small.png) diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md b/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md index b89d527578..99a1049364 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md @@ -28,6 +28,8 @@ ms.topic: article - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + With more sophisticated adversaries and new threats emerging frequently and prevalently, it's critical to be able to quickly: - Assess the impact of new threats diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-protection-integration.md b/windows/security/threat-protection/microsoft-defender-atp/threat-protection-integration.md index 68a8596c02..ee522b299e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-protection-integration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-protection-integration.md @@ -26,6 +26,8 @@ ms.topic: conceptual - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) +> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) + ## Integrate with other Microsoft solutions Microsoft Defender for Endpoint directly integrates with various Microsoft solutions. From bc486b67f29f2fa7285a0f36c09cf429ce3b6519 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Tue, 5 Jan 2021 16:27:35 -0800 Subject: [PATCH 026/161] up score --- .../android-support-signin.md | 5 +- .../microsoft-defender-atp/common-errors.md | 6 +-- .../configure-attack-surface-reduction.md | 4 +- .../get-domain-related-alerts.md | 4 +- .../get-file-related-alerts.md | 8 +-- .../get-file-related-machines.md | 8 +-- .../microsoft-defender-atp/ios-terms.md | 49 +++++++++---------- .../partner-applications.md | 16 +++--- 8 files changed, 47 insertions(+), 53 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/android-support-signin.md b/windows/security/threat-protection/microsoft-defender-atp/android-support-signin.md index 34959bf022..3b6e8322ea 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/android-support-signin.md +++ b/windows/security/threat-protection/microsoft-defender-atp/android-support-signin.md @@ -31,7 +31,7 @@ ms.topic: conceptual During onboarding, you might encounter sign in issues after the app is installed on your device. -This article provides solutions to address the sign on issues. +This article provides solutions to address the sign-on issues. ## Sign in failed - unexpected error **Sign in failed:** *Unexpected error, try later* @@ -63,8 +63,7 @@ from Google Play Store and try again **Cause:** -You do not have Microsoft 365 license assigned, or your organization does not -have a license for Microsoft 365 Enterprise subscription. +You do not have Microsoft 365 license assigned, or your organization does not have a license for Microsoft 365 Enterprise subscription. **Solution:** diff --git a/windows/security/threat-protection/microsoft-defender-atp/common-errors.md b/windows/security/threat-protection/microsoft-defender-atp/common-errors.md index c43240cb86..77ea709f52 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/common-errors.md +++ b/windows/security/threat-protection/microsoft-defender-atp/common-errors.md @@ -21,9 +21,9 @@ ms.topic: article [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] * The error codes listed in the following table may be returned by an operation on any of Microsoft Defender for Endpoint APIs. -* Note that in addition to the error code, every error response contains an error message which can help resolving the problem. -* Note that the message is a free text that can be changed. -* At the bottom of the page you can find response examples. +* In addition to the error code, every error response contains an error message, which can help resolve the problem. +* The message is a free text that can be changed. +* At the bottom of the page, you can find response examples. Error code |HTTP status code |Message :---|:---|:--- diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-attack-surface-reduction.md b/windows/security/threat-protection/microsoft-defender-atp/configure-attack-surface-reduction.md index 736ab0b846..e12a5c23c2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-attack-surface-reduction.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-attack-surface-reduction.md @@ -1,6 +1,6 @@ --- title: Configure attack surface reduction -description: Use Microsoft Intune, Microsoft Endpoint Configuration Manager, Powershell cmdlets, and Group Policy to configure attack surface reduction. +description: Use Microsoft Intune, Microsoft Endpoint Configuration Manager, PowerShell cmdlets, and Group Policy to configure attack surface reduction. keywords: asr, attack surface reduction, windows defender, microsoft defender, antivirus, av search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -22,7 +22,7 @@ ms.topic: conceptual [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -You can configure attack surface reduction with a number of tools, including: +You can configure attack surface reduction with many tools, including: * Microsoft Intune * Microsoft Endpoint Configuration Manager diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md index 2ef6ab2307..a9d61d3418 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts.md @@ -1,5 +1,5 @@ --- -title: Get domain related alerts API +title: Get domain-related alerts API description: Learn how to use the Get domain related alerts API to retrieve alerts related to a given domain address in Microsoft Defender for Endpoint. keywords: apis, graph api, supported apis, get, domain, related, alerts search.product: eADQiWindows 10XVcnh @@ -16,7 +16,7 @@ ms.collection: M365-security-compliance ms.topic: article --- -# Get domain related alerts API +# Get domain-related alerts API [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-file-related-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/get-file-related-alerts.md index e9088291e8..78611c1902 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-file-related-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-file-related-alerts.md @@ -1,6 +1,6 @@ --- -title: Get file related alerts API -description: Learn how to use the Get file related alerts API to get a collection of alerts related to a given file hash in Microsoft Defender for Endpoint. +title: Get file-related alerts API +description: Learn how to use the Get file-related alerts API to get a collection of alerts related to a given file hash in Microsoft Defender for Endpoint. keywords: apis, graph api, supported apis, get, file, hash search.product: eADQiWindows 10XVcnh ms.prod: w10 @@ -16,7 +16,7 @@ ms.collection: M365-security-compliance ms.topic: article --- -# Get file related alerts API +# Get file-related alerts API [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] @@ -69,7 +69,7 @@ Authorization | String | Bearer {token}. **Required**. Empty ## Response -If successful and file exists - 200 OK with list of [alert](alerts.md) entities in the body. If file do not exist - 404 Not Found. +If successful and file exists - 200 OK with list of [alert](alerts.md) entities in the body. If file does not exist - 404 Not Found. ## Example diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-file-related-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-file-related-machines.md index 99313ac5c8..da6b2b71d7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-file-related-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-file-related-machines.md @@ -1,6 +1,6 @@ --- -title: Get file related machines API -description: Learn how to use the Get file related machines API to get a collection of machines related to a file hash in Microsoft Defender for Endpoint. +title: Get file-related machines API +description: Learn how to use the Get file-related machines API to get a collection of machines related to a file hash in Microsoft Defender for Endpoint. keywords: apis, graph api, supported apis, get, devices, hash search.product: eADQiWindows 10XVcnh ms.prod: w10 @@ -16,7 +16,7 @@ ms.collection: M365-security-compliance ms.topic: article --- -# Get file related machines API +# Get file-related machines API [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] @@ -69,7 +69,7 @@ Authorization | String | Bearer {token}. **Required**. Empty ## Response -If successful and file exists - 200 OK with list of [machine](machine.md) entities in the body. If file do not exist - 404 Not Found. +If successful and file exists - 200 OK with list of [machine](machine.md) entities in the body. If file does not exist - 404 Not Found. ## Example diff --git a/windows/security/threat-protection/microsoft-defender-atp/ios-terms.md b/windows/security/threat-protection/microsoft-defender-atp/ios-terms.md index 997e5ed226..87fc256054 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/ios-terms.md +++ b/windows/security/threat-protection/microsoft-defender-atp/ios-terms.md @@ -29,7 +29,7 @@ hideEdit: true ## MICROSOFT APPLICATION LICENSE TERMS: MICROSOFT DEFENDER FOR ENDPOINT These license terms ("Terms") are an agreement between Microsoft Corporation (or -based on where you live, one of its affiliates) and you. Please read them. They +based on where you live, one of its affiliates) and you. They apply to the application named above. These Terms also apply to any Microsoft - updates, @@ -51,21 +51,21 @@ DO NOT USE THE APPLICATION.** 1. **INSTALLATION AND USE RIGHTS.** 1. **Installation and Use.** You may install and use any number of copies - of this application on iOS enabled device or devices which you own + of this application on iOS enabled device or devices that you own or control. You may use this application with your company's valid subscription of Defender for Endpoint or - an online service that includes MDATP functionalities. + an online service that includes Microsoft Defender for Endpoint functionalities. - 2. **Updates.** Updates or upgrades to MDATP may be required for full + 2. **Updates.** Updates or upgrades to Microsoft Defender for Endpoint may be required for full functionality. Some functionality may not be available in all countries. - 3. **Third Party Programs.** The application may include third party + 3. **Third-Party Programs.** The application may include third-party programs that Microsoft, not the third party, licenses to you under this agreement. Notices, if any, for the third-party program are included for your information only. 2. **INTERNET ACCESS MAY BE REQUIRED.** You may incur charges related to - Internet access, data transfer and other services per the terms of the data + Internet access, data transfer, and other services per the terms of the data service plan and any other agreement you have with your network operator due to use of the application. You are solely responsible for any network operator charges. @@ -78,8 +78,7 @@ DO NOT USE THE APPLICATION.** operates as your consent to the transmission of standard device information (including but not limited to technical information about your device, system and application software, and peripherals) for - Internet-based or wireless services. If other terms are provided in - connection with your use of the services, those terms also apply. + Internet-based or wireless services. If other terms are provided with your use of the services, those terms also apply. - Data. Some online services require, or may be enhanced by, the installation of local software like this one. At your, or your @@ -91,21 +90,20 @@ DO NOT USE THE APPLICATION.** improve Microsoft products and services and enhance your experience. You may limit or control collection of some usage and performance data through your device settings. Doing so may disrupt your use of - certain features of the application. For additional information on - Microsoft's data collection and use, see the [Online Services + certain features of the application. For more information on Microsoft's data collection and use, see the [Online Services Terms](https://go.microsoft.com/fwlink/?linkid=2106777). 2. Misuse of Internet-based Services. You may not use any Internet-based service in any way that could harm it or impair anyone else's use of it or the wireless network. You may not use the service to try to gain - unauthorized access to any service, data, account or network by any + unauthorized access to any service, data, account, or network by any means. 4. **FEEDBACK.** If you give feedback about the application to Microsoft, you - give to Microsoft, without charge, the right to use, share and commercialize + give to Microsoft, without charge, the right to use, share, and commercialize your feedback in any way and for any purpose. You also give to third parties, without charge, any patent rights needed for their products, - technologies and services to use or interface with any specific parts of a + technologies, and services to use or interface with any specific parts of a Microsoft software or service that includes the feedback. You will not give feedback that is subject to a license that requires Microsoft to license its software or documentation to third parties because we include your feedback @@ -129,16 +127,14 @@ DO NOT USE THE APPLICATION.** - publish the application for others to copy; - - rent, lease or lend the application; or + - rent, lease, or lend the application; or - transfer the application or this agreement to any third party. 6. **EXPORT RESTRICTIONS.** The application is subject to United States export laws and regulations. You must comply with all domestic and international export laws and regulations that apply to the application. These laws - include restrictions on destinations, end users and end use. For additional - information, - see [www.microsoft.com/exporting](https://www.microsoft.com/exporting). + include restrictions on destinations, end users and end use. For more information, see [www.microsoft.com/exporting](https://www.microsoft.com/exporting). 7. **SUPPORT SERVICES.** Because this application is "as is," we may not provide support services for it. If you have any issues or questions about @@ -150,14 +146,13 @@ DO NOT USE THE APPLICATION.** 8. **APPLICATION STORE.** - 1. If you obtain the application through an application store (e.g., App - Store), please review the applicable application store terms to ensure + 1. If you obtain the application through an application store (for example, App + Store), review the applicable application store terms to ensure your download and use of the application complies with such terms. - Please note that these Terms are between you and Microsoft and not with + These terms are between you and Microsoft and not with the application store. - 2. The respective application store provider and its subsidiaries are third - party beneficiaries of these Terms, and upon your acceptance of these + 2. The respective application store provider and its subsidiaries are third-party beneficiaries of these Terms, and upon your acceptance of these Terms, the application store provider(s) will have the right to directly enforce and rely upon any provision of these Terms that grants them a benefit or rights. @@ -212,20 +207,20 @@ DO NOT USE THE APPLICATION.** This limitation applies to: - anything related to the application, services, content (including code) on - third party Internet sites, or third party programs; and + third-party Internet sites, or third-party programs; and -- claims for breach of contract, warranty, guarantee or condition; consumer +- claims for breach of contract, warranty, guarantee, or condition; consumer protection; deception; unfair competition; strict liability, negligence, - misrepresentation, omission, trespass or other tort; violation of statute or + misrepresentation, omission, trespass, or other tort; violation of statute or regulation; or unjust enrichment; all to the extent permitted by applicable law. It also applies even if: -a. Repair, replacement or refund for the application does not fully compensate +a. Repair, replacement, or refund for the application does not fully compensate you for any losses; or b. Covered Parties knew or should have known about the possibility of the damages. -The above limitation or exclusion may not apply to you because your country may not allow the exclusion or limitation of incidental, consequential or other damages. +The above limitation or exclusion may not apply to you because your country may not allow the exclusion or limitation of incidental, consequential, or other damages. diff --git a/windows/security/threat-protection/microsoft-defender-atp/partner-applications.md b/windows/security/threat-protection/microsoft-defender-atp/partner-applications.md index af671e6890..26d5318130 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/partner-applications.md +++ b/windows/security/threat-protection/microsoft-defender-atp/partner-applications.md @@ -54,7 +54,7 @@ Logo |Partner name | Description ![Image of Elastic security logo](images/elastic-security-logo.png) | [Elastic Security](https://go.microsoft.com/fwlink/?linkid=2139303) | Elastic Security is a free and open solution for preventing, detecting, and responding to threats ![Image of IBM QRadar logo](images/ibm-qradar-logo.png) | [IBM QRadar](https://go.microsoft.com/fwlink/?linkid=2113903) | Configure IBM QRadar to collect detections from Defender for Endpoint ![Image of Micro Focus ArcSight logo](images/arcsight-logo.png) | [Micro Focus ArcSight](https://go.microsoft.com/fwlink/?linkid=2113548) | Use Micro Focus ArcSight to pull Defender for Endpoint detections -![Image of RSA NetWitness logo](images/rsa-netwitness-logo.png) | [RSA NetWitness](https://go.microsoft.com/fwlink/?linkid=2118566) | Stream Defender for Endpoint Alerts to RSA NetWitness leveraging Microsoft Graph Security API +![Image of RSA NetWitness logo](images/rsa-netwitness-logo.png) | [RSA NetWitness](https://go.microsoft.com/fwlink/?linkid=2118566) | Stream Defender for Endpoint Alerts to RSA NetWitness using Microsoft Graph Security API ![Image of SafeBreach logo](images/safebreach-logo.png) | [SafeBreach](https://go.microsoft.com/fwlink/?linkid=2114114)| Gain visibility into Defender for Endpoint security events that are automatically correlated with SafeBreach simulations ![Image of Skybox Vulnerability Control logo](images/skybox-logo.png) | [Skybox Vulnerability Control](https://go.microsoft.com/fwlink/?linkid=2127467) | Skybox Vulnerability Control cuts through the noise of vulnerability management, correlating business, network, and threat context to uncover your riskiest vulnerabilities ![Image of Splunk logo](images/splunk-logo.png) | [Splunk](https://go.microsoft.com/fwlink/?linkid=2129805) | The Defender for Endpoint Add-on allows Splunk users to ingest all of the alerts and supporting information to their Splunk @@ -97,14 +97,14 @@ Logo |Partner name | Description Logo |Partner name | Description :---|:---|:--- ![Image of Bitdefender logo](images/bitdefender-logo.png)| [Bitdefender](https://go.microsoft.com/fwlink/?linkid=860032)| Bitdefender GravityZone is a layered next generation endpoint protection platform offering comprehensive protection against the full spectrum of sophisticated cyber threats -![Image of Better Mobile logo](images/bettermobile-logo.png) | [Better Mobile](https://go.microsoft.com/fwlink/?linkid=2086214)| AI based MTD solution to stop mobile threats & phishing. Private internet browsing to protect user privacy +![Image of Better Mobile logo](images/bettermobile-logo.png) | [Better Mobile](https://go.microsoft.com/fwlink/?linkid=2086214)| AI-based MTD solution to stop mobile threats & phishing. Private internet browsing to protect user privacy ![Image of Corrata logo](images/corrata-logo.png)| [Corrata](https://go.microsoft.com/fwlink/?linkid=2081148) | Mobile solution — Protect your mobile devices with granular visibility and control from Corrata ![Image of Lookout logo](images/lookout-logo.png)| [Lookout](https://go.microsoft.com/fwlink/?linkid=866935)| Get Lookout Mobile Threat Protection telemetry for Android and iOS mobile devices ![Image of Symantec Endpoint Protection Mobile logo](images/symantec-logo.png) | [Symantec Endpoint Protection Mobile](https://go.microsoft.com/fwlink/?linkid=2090992)| SEP Mobile helps businesses predict, detect, and prevent security threats and vulnerabilities on mobile devices ![Image of Zimperium logo](images/zimperium-logo.png)| [Zimperium](https://go.microsoft.com/fwlink/?linkid=2118044)|Extend your Defender for Endpoint to iOS and Android with Machine Learning-based Mobile Threat Defense -## Additional integrations +## Other integrations Logo |Partner name | Description :---|:---|:--- ![Image of Cyren Web Filter logo](images/cyren-logo.png)| [Cyren Web Filter](https://go.microsoft.com/fwlink/?linkid=2108221)| Enhance your Defender for Endpoint with advanced Web Filtering @@ -115,27 +115,27 @@ Logo |Partner name | Description ## SIEM integration -Defender for Endpoint supports SIEM integration through a variety of methods — specialized SIEM system interface with out of the box connectors, a generic alert API enabling custom implementations, and an action API enabling alert status management. For more information, see [Enable SIEM integration](enable-siem-integration.md). +Defender for Endpoint supports SIEM integration through various methods — specialized SIEM system interface with out of the box connectors, a generic alert API enabling custom implementations, and an action API enabling alert status management. For more information, see [Enable SIEM integration](enable-siem-integration.md). ## Ticketing and IT service management Ticketing solution integration helps to implement manual and automatic response processes. Defender for Endpoint can help to create tickets automatically when an alert is generated and resolve the alerts when tickets are closed using the alerts API. ## Security orchestration and automation response (SOAR) integration -Orchestration solutions can help build playbooks and integrate the rich data model and actions that Defender for Endpoint APIs expose to orchestrate responses, such as query for device data, trigger device isolation, block/allow, resolve alert and others. +Orchestration solutions can help build playbooks and integrate the rich data model and actions that Defender for Endpoint APIs exposes to orchestrate responses, such as query for device data, trigger device isolation, block/allow, resolve alert and others. ## External alert correlation and Automated investigation and remediation Defender for Endpoint offers unique automated investigation and remediation capabilities to drive incident response at scale. Integrating the automated investigation and response capability with other solutions such as IDS and firewalls help to address alerts and minimize the complexities surrounding network and device signal correlation, effectively streamlining the investigation and threat remediation actions on devices. -External alerts can be pushed into Defender for Endpoint and is presented side by side with additional device-based alerts from Defender for Endpoint. This view provides a full context of the alert — with the real process and the full story of attack. +External alerts can be pushed into Defender for Endpoint and is presented side by side with other device-based alerts from Defender for Endpoint. This view provides a full context of the alert — with the real process and the full story of attack. ## Indicators matching You can use threat-intelligence from providers and aggregators to maintain and use indicators of compromise (IOCs). -Defender for Endpoint allows you to integrate with such solutions and act on IoCs by correlating its rich telemetry and creating alerts when there's a match; leveraging prevention and automated response capabilities to block execution and take remediation actions when there's a match. +Defender for Endpoint allows you to integrate with such solutions and act on IoCs by correlating its rich telemetry and creating alerts when there's a match; applying prevention and automated response capabilities to block execution and take remediation actions when there's a match. Defender for Endpoint currently supports IOC matching and remediation for file and network indicators. Blocking is supported for file indicators. ## Support for non-Windows platforms -Defender for Endpoint provides a centralized security operations experience for Windows as well as non-Windows platforms, including mobile devices. You'll be able to see alerts from various supported operating systems (OS) in the portal and better protect your organization's network. +Defender for Endpoint provides a centralized security operations experience for Windows and non-Windows platforms, including mobile devices. You'll be able to see alerts from various supported operating systems (OS) in the portal and better protect your organization's network. From 6726c834ecf4c2c927cdd1536baf5afb5b15fa22 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Wed, 6 Jan 2021 10:53:41 +0530 Subject: [PATCH 027/161] fixedwarnings to fix warnings --- .../microsoft-defender-atp/attack-surface-reduction-faq.md | 2 +- .../microsoft-defender-atp/basic-permissions.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction-faq.md b/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction-faq.md index 5d12d0551b..1fe7d8786d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction-faq.md +++ b/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction-faq.md @@ -42,7 +42,7 @@ Yes. ASR is supported for Windows Enterprise E3 and above. All of the rules supported with E3 are also supported with E5. -E5 also added greater integration with Defender for Endpoint. With E5, you can [use Defender for Endpoint to monitor and review analytics](https://docs.microsoft.com/microsoft-365/security/mtp/monitor-devices?view=o365-worldwide#monitor-and-manage-asr-rule-deployment-and-detections) on alerts in real-time, fine-tune rule exclusions, configure ASR rules, and view lists of event reports. +E5 also added greater integration with Defender for Endpoint. With E5, you can [use Defender for Endpoint to monitor and review analytics](https://docs.microsoft.com/microsoft-365/security/mtp/monitor-devices?view=o365-worldwide&preserve-view=true#monitor-and-manage-asr-rule-deployment-and-detections) on alerts in real-time, fine-tune rule exclusions, configure ASR rules, and view lists of event reports. ## What are the currently supported ASR rules? diff --git a/windows/security/threat-protection/microsoft-defender-atp/basic-permissions.md b/windows/security/threat-protection/microsoft-defender-atp/basic-permissions.md index fbbcf28bc8..ead8dfe61c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/basic-permissions.md +++ b/windows/security/threat-protection/microsoft-defender-atp/basic-permissions.md @@ -48,7 +48,7 @@ You can assign users with one of the following levels of permissions: > [!NOTE] > You need to run the PowerShell cmdlets in an elevated command-line. -- Connect to your Azure Active Directory. For more information, see, [Connect-MsolService](https://msdn.microsoft.com/library/dn194123.aspx). +- Connect to your Azure Active Directory. For more information, see, [Connect-MsolService](https://docs.microsoft.com/powershell/module/msonline/connect-msolservice?view=azureadps-1.0&preserve-view=true). **Full access**
Users with full access can log in, view all system information and resolve alerts, submit files for deep analysis, and download the onboarding package. From 9ee6b5140aeb031a00ee6e5c8093cd33f3449b4e Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Wed, 6 Jan 2021 13:15:29 +0530 Subject: [PATCH 028/161] updated updated suggestion --- .../microsoft-defender-atp/get-machinegroups-collection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection.md b/windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection.md index b61bdd7e67..63620caae5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection.md @@ -18,7 +18,7 @@ ms.topic: article ms.date: 10/07/2018 --- -# Get KB collection API +# Get Machinegroups collection API [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] From 76da8e0c1dae6e5c1bd4e704450d7ed8c7a7114d Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Wed, 6 Jan 2021 14:28:34 +0530 Subject: [PATCH 029/161] updated to fix build issue --- .../microsoft-defender-atp/initiate-autoir-investigation.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md b/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md index 9b1af94e9e..0b1e10aa01 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md @@ -1,4 +1,4 @@ ---- +``--- title: Start Investigation API description: Use this API to start investigation on a device. keywords: apis, graph api, supported apis, investigation @@ -84,7 +84,7 @@ If successful, this method returns 201 - Created response code and [Investigatio Here is an example of the request. -``` +`` POST https://api.securitycenter.microsoft.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/startInvestigation Content-type: application/json { From cee4e4c66a323a53ea836fae3a12cd7bf8322051 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Wed, 6 Jan 2021 14:45:53 +0530 Subject: [PATCH 030/161] updated update --- .../microsoft-defender-atp/live-response-command-examples.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/live-response-command-examples.md b/windows/security/threat-protection/microsoft-defender-atp/live-response-command-examples.md index 7883f6a03b..af4511c386 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/live-response-command-examples.md +++ b/windows/security/threat-protection/microsoft-defender-atp/live-response-command-examples.md @@ -109,7 +109,7 @@ getfile c:\Users\user\Desktop\work.txt -auto > * Empty files > * Virtual files, or files that are not fully present locally > -> These file types **are** supported by [PowerShell](/powershell/scripting/overview?view=powershell-6/). +> These file types **are** supported by [PowerShell](/powershell/scripting/overview?view=powershell-6/?&preserve-view=true). > > Use PowerShell as an alternative, if you have problems using this command from within Live Response. From d46c32e7a403244b3e784c439b83ab30fd0c7548 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Wed, 6 Jan 2021 15:07:34 +0530 Subject: [PATCH 031/161] update to fix comments --- .../switch-to-microsoft-defender-onboard.md | 1 - .../switch-to-microsoft-defender-prepare.md | 1 - .../microsoft-defender-atp/switch-to-microsoft-defender-setup.md | 1 - 3 files changed, 3 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-onboard.md b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-onboard.md index e18d966b1a..e455b53fd6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-onboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-onboard.md @@ -32,7 +32,6 @@ ms.reviewer: jesquive, chventou, jonix, chriggs, owtho > Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) |[![Phase 1: Prepare](images/prepare.png)](switch-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](switch-to-microsoft-defender-prepare.md) |[![Phase 2: Set up](images/setup.png)](switch-to-microsoft-defender-setup.md)
[Phase 2: Set up](switch-to-microsoft-defender-setup.md) |![Phase 3: Onboard](images/onboard.png)
Phase 3: Onboard | -======= |[![Phase 1: Prepare](images/phase-diagrams/prepare.png)](switch-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](switch-to-microsoft-defender-prepare.md) |[![Phase 2: Set up](images/phase-diagrams/setup.png)](switch-to-microsoft-defender-setup.md)
[Phase 2: Set up](switch-to-microsoft-defender-setup.md) |![Phase 3: Onboard](images/phase-diagrams/onboard.png)
Phase 3: Onboard | |--|--|--| diff --git a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-prepare.md b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-prepare.md index 0e78d11ed1..68446bf5a4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-prepare.md +++ b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-prepare.md @@ -32,7 +32,6 @@ ms.reviewer: jesquive, chventou, jonix, chriggs, owtho > Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) |![Phase 1: Prepare](images/prepare.png)
Phase 1: Prepare |[![Phase 2: Set up](images/setup.png)](switch-to-microsoft-defender-setup.md)
[Phase 2: Set up](switch-to-microsoft-defender-setup.md) |[![Phase 3: Onboard](images/onboard.png)](switch-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](switch-to-microsoft-defender-onboard.md) | -======= |![Phase 1: Prepare](images/phase-diagrams/prepare.png)
Phase 1: Prepare |[![Phase 2: Set up](images/phase-diagrams/setup.png)](switch-to-microsoft-defender-setup.md)
[Phase 2: Set up](switch-to-microsoft-defender-setup.md) |[![Phase 3: Onboard](images/phase-diagrams/onboard.png)](switch-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](switch-to-microsoft-defender-onboard.md) | |--|--|--| diff --git a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md index bca83fab9d..e84108e0fb 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md +++ b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md @@ -32,7 +32,6 @@ ms.reviewer: jesquive, chventou, jonix, chriggs, owtho > Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) |[![Phase 1: Prepare](images/prepare.png)](switch-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](switch-to-microsoft-defender-prepare.md) |![Phase 2: Set up](images/setup.png)
Phase 2: Set up |[![Phase 3: Onboard](images/onboard.png)](switch-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](switch-to-microsoft-defender-onboard.md) | -======= |[![Phase 1: Prepare](images/phase-diagrams/prepare.png)](switch-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](switch-to-microsoft-defender-prepare.md) |![Phase 2: Set up](images/phase-diagrams/setup.png)
Phase 2: Set up |[![Phase 3: Onboard](images/phase-diagrams/onboard.png)](switch-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](switch-to-microsoft-defender-onboard.md) | |--|--|--| ||*You are here!* | | From 5a35d2f7e4b76d6f96ae2413710dab87bb34495b Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Wed, 13 Jan 2021 11:13:26 +0530 Subject: [PATCH 032/161] Fix-Suggestions To fix suggestions --- .../microsoft-defender-atp/android-intune.md | 24 +++++++++---------- .../microsoft-defender-atp/api-hello-world.md | 4 ++-- .../api-microsoft-flow.md | 12 +++++----- .../microsoft-defender-atp/api-power-bi.md | 4 ++-- 4 files changed, 22 insertions(+), 22 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/android-intune.md b/windows/security/threat-protection/microsoft-defender-atp/android-intune.md index 10b18e331f..3689cb1799 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/android-intune.md +++ b/windows/security/threat-protection/microsoft-defender-atp/android-intune.md @@ -53,7 +53,7 @@ Learn how to deploy Defender for Endpoint for Android on Intune Company Portal - center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Apps** \> **Android Apps** \> **Add \> Android store app** and choose **Select**. - ![Image of Microsoft Endpoint Manager Admin Center](images/mda-addandroidstoreapp.png) + ![Image of Microsoft Endpoint Manager Admin Center add android store application](images/mda-addandroidstoreapp.png) 2. On the **Add app** page and in the *App Information* section enter: @@ -65,7 +65,7 @@ center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Apps** \> Other fields are optional. Select **Next**. - ![Image of Microsoft Endpoint Manager Admin Center](images/mda-addappinfo.png) + ![Image of Microsoft Endpoint Manager Admin Center add app info](images/mda-addappinfo.png) 3. In the *Assignments* section, go to the **Required** section and select **Add group.** You can then choose the user group(s) that you would like to target Defender for Endpoint for Android app. Choose **Select** and then **Next**. @@ -73,14 +73,14 @@ center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Apps** \> >The selected user group should consist of Intune enrolled users. > [!div class="mx-imgBorder"] - > ![Image of Microsoft Endpoint Manager Admin Center](images/363bf30f7d69a94db578e8af0ddd044b.png) + > ![Image of the Microsoft Endpoint Manager Admin Center selected user groups](images/363bf30f7d69a94db578e8af0ddd044b.png) 4. In the **Review+Create** section, verify that all the information entered is correct and then select **Create**. In a few moments, the Defender for Endpoint app would be created successfully, and a notification would show up at the top-right corner of the page. - ![Image of Microsoft Endpoint Manager Admin Center](images/86cbe56f88bb6e93e9c63303397fc24f.png) + ![Image of Microsoft Endpoint Manager Admin Center notification of defender endpoint app](images/86cbe56f88bb6e93e9c63303397fc24f.png) 5. In the app information page that is displayed, in the **Monitor** section, @@ -88,7 +88,7 @@ select **Device install status** to verify that the device installation has completed successfully. > [!div class="mx-imgBorder"] - > ![Image of Microsoft Endpoint Manager Admin Center](images/513cf5d59eaaef5d2b5bc122715b5844.png) + > ![Image of Microsoft Endpoint Manager Admin Center device install](images/513cf5d59eaaef5d2b5bc122715b5844.png) ### Complete onboarding and check status @@ -125,14 +125,14 @@ center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Apps** \> **Android Apps** \> **Add** and select **Managed Google Play app**. > [!div class="mx-imgBorder"] - > ![Image of Microsoft Endpoint Manager admin center](images/579ff59f31f599414cedf63051628b2e.png) + > ![Image of Microsoft Endpoint Manager admin center managed google play](images/579ff59f31f599414cedf63051628b2e.png) 2. On your managed Google Play page that loads subsequently, go to the search box and lookup **Microsoft Defender.** Your search should display the Microsoft Defender for Endpoint app in your Managed Google Play. Click on the Microsoft Defender for Endpoint app from the Apps search result. - ![Image of Microsoft Endpoint Manager admin center](images/0f79cb37900b57c3e2bb0effad1c19cb.png) + ![Image of Microsoft Endpoint Manager admin center Apps search](images/0f79cb37900b57c3e2bb0effad1c19cb.png) 3. In the App description page that comes up next, you should be able to see app details on Defender for Endpoint. Review the information on the page and then @@ -182,7 +182,7 @@ Defender ATP should be visible in the apps list. 1. In the **Apps** page, go to **Policy > App configuration policies > Add > Managed devices**. - ![Image of Microsoft Endpoint Manager admin center](images/android-mem.png) + ![Image of Microsoft Endpoint Manager admin center android managed devices](images/android-mem.png) 1. In the **Create app configuration policy** page, enter the following details: @@ -202,19 +202,19 @@ Defender ATP should be visible in the apps list. Then select **OK**. > [!div class="mx-imgBorder"] - > ![Image of create app configuration policy](images/android-create-app-config.png) + > ![Image of android create app configuration policy](images/android-create-app-config.png) 1. You should now see both the permissions listed and now you can autogrant both by choosing autogrant in the **Permission state** drop-down and then select **Next**. > [!div class="mx-imgBorder"] - > ![Image of create app configuration policy](images/android-auto-grant.png) + > ![Image of android auto grant create app configuration policy](images/android-auto-grant.png) 1. In the **Assignments** page, select the user group to which this app config policy would be assigned to. Click **Select groups to include** and selecting the applicable group and then selecting **Next**. The group selected here is usually the same group to which you would assign Microsoft Defender for Endpoint Android app. > [!div class="mx-imgBorder"] - > ![Image of create app configuration policy](images/android-select-group.png) + > ![Image of the create app configuration policy](images/android-select-group.png) 1. In the **Review + Create** page that comes up next, review all the information and then select **Create**.
@@ -222,7 +222,7 @@ Defender ATP should be visible in the apps list. The app configuration policy for Defender for Endpoint autogranting the storage permission is now assigned to the selected user group. > [!div class="mx-imgBorder"] - > ![Image of create app configuration policy](images/android-review-create.png) + > ![Image of android review create app config policy](images/android-review-create.png) 10. Select **Microsoft Defender ATP** app in the list \> **Properties** \> diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md b/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md index 942ad1917f..39c9f3f162 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md @@ -58,11 +58,11 @@ For the Application registration stage, you must have a **Global administrator** - **Note**: WindowsDefenderATP does not appear in the original list. You need to start writing its name in the text box to see it appear. - ![Image of API access and API selection](images/add-permission.png) + ![Image of API access and API selection1](images/add-permission.png) - Choose **Application permissions** > **Alert.Read.All** > Click on **Add permissions** - ![Image of API access and API selection](images/application-permissions.png) + ![Image of API access and API selection2](images/application-permissions.png) **Important note**: You need to select the relevant permissions. 'Read All Alerts' is only an example! diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md b/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md index d8c489a6e9..f7cd6c85a0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md @@ -31,7 +31,7 @@ Automating security procedures is a standard requirement for every modern Securi Microsoft Defender API has an official Flow Connector with many capabilities. -![Image of edit credentials](images/api-flow-0.png) +![Image of edit credentials1](images/api-flow-0.png) ## Usage example @@ -41,15 +41,15 @@ The following example demonstrates how to create a Flow that is triggered any ti 2. Go to **My flows** > **New** > **Automated-from blank**. - ![Image of edit credentials](images/api-flow-1.png) + ![Image of edit credentials2](images/api-flow-1.png) 3. Choose a name for your Flow, search for "Microsoft Defender ATP Triggers" as the trigger, and then select the new Alerts trigger. - ![Image of edit credentials](images/api-flow-2.png) + ![Image of edit credentials3](images/api-flow-2.png) Now you have a Flow that is triggered every time a new Alert occurs. -![Image of edit credentials](images/api-flow-3.png) +![Image of edit credentials4](images/api-flow-3.png) All you need to do now is choose your next steps. For example, you can isolate the device if the Severity of the Alert is High and send an email about it. @@ -63,7 +63,7 @@ The Alert trigger provides only the Alert ID and the Machine ID. You can use the 3. Set the **Alert ID** from the last step as **Input**. - ![Image of edit credentials](images/api-flow-4.png) + ![Image of edit credentials5](images/api-flow-4.png) ### Isolate the device if the Alert's severity is High @@ -73,7 +73,7 @@ The Alert trigger provides only the Alert ID and the Machine ID. You can use the If yes, add the **Microsoft Defender ATP - Isolate machine** action with the Machine ID and a comment. - ![Image of edit credentials](images/api-flow-5.png) + ![Image of edit credentials6](images/api-flow-5.png) 3. Add a new step for emailing about the Alert and the Isolation. There are multiple email connectors that are very easy to use, such as Outlook or Gmail. diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md b/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md index 2e1a944c60..eb801bed22 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md @@ -96,13 +96,13 @@ The first example demonstrates how to connect Power BI to Advanced Hunting API a - Select **Organizational account** > **Sign in** - ![Image of set credentials](images/power-bi-set-credentials-organizational.png) + ![Image of set credentials1](images/power-bi-set-credentials-organizational.png) - Enter your credentials and wait to be signed in - Click **Connect** - ![Image of set credentials](images/power-bi-set-credentials-organizational-cont.png) + ![Image of set credentials2](images/power-bi-set-credentials-organizational-cont.png) - Now the results of your query will appear as table and you can start build visualizations on top of it! From 207a5dd086c777d4f7ecbe88b33b5eb942624b39 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Wed, 13 Jan 2021 11:26:11 +0530 Subject: [PATCH 033/161] fix-suggestions To fix suggestions --- .../microsoft-defender-atp/api-portal-mapping.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md b/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md index ed503a7088..a0a21d751b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md @@ -84,9 +84,9 @@ Field numbers match the numbers in the images below. ![Image of alert details pane with numbers](images/atp-siem-mapping13.png) -![Image of artifact timeline with numbers](images/atp-siem-mapping3.png) +![Image of artifact timeline with numbers1](images/atp-siem-mapping3.png) -![Image of artifact timeline with numbers](images/atp-siem-mapping4.png) +![Image of artifact timeline with numbers2](images/atp-siem-mapping4.png) ![Image machine view](images/atp-mapping6.png) From a6ef12bee7d3ae93dce2d15b21e6df84f519183e Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Wed, 13 Jan 2021 11:38:09 +0530 Subject: [PATCH 034/161] Fix-suggestions To fix suggestions --- .../microsoft-defender-atp/enable-siem-integration.md | 4 ++-- .../microsoft-defender-atp/evaluation-lab.md | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration.md b/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration.md index 7dbee74ef5..a32e1746cb 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration.md @@ -48,7 +48,7 @@ Enable security information and event management (SIEM) integration so you can p ## Enabling SIEM integration 1. In the navigation pane, select **Settings** > **SIEM**. - ![Image of SIEM integration from Settings menu](images/enable_siem.png) + ![Image of SIEM integration from Settings menu1](images/enable_siem.png) >[!TIP] >If you encounter an error when trying to enable the SIEM connector application, check the pop-up blocker settings of your browser. It might be blocking the new window being opened when you enable the capability. @@ -59,7 +59,7 @@ Enable security information and event management (SIEM) integration so you can p >The client secret is only displayed once. Make sure you keep a copy of it in a safe place.
- ![Image of SIEM integration from Settings menu](images/siem_details.png) + ![Image of SIEM integration from Settings menu2](images/siem_details.png) 3. Choose the SIEM type you use in your organization. diff --git a/windows/security/threat-protection/microsoft-defender-atp/evaluation-lab.md b/windows/security/threat-protection/microsoft-defender-atp/evaluation-lab.md index f6a0e94621..9d9fff2ed1 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/evaluation-lab.md +++ b/windows/security/threat-protection/microsoft-defender-atp/evaluation-lab.md @@ -248,10 +248,10 @@ You can conveniently run any available simulation right from the catalog. Each simulation comes with an in-depth description of the attack scenario and references such as the MITRE attack techniques used and sample Advanced hunting queries you run. **Examples:** -![Image of simulation description details](images/simulation-details-aiq.png) +![Image of simulation description details1](images/simulation-details-aiq.png) -![Image of simulation description details](images/simulation-details-sb.png) +![Image of simulation description details2](images/simulation-details-sb.png) ## Evaluation report From 3aaab802b03bb60311db8241f634e4c4f039d43d Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Wed, 13 Jan 2021 15:02:19 +0530 Subject: [PATCH 035/161] Fix suggestions To fix suggestions --- .../microsoft-defender-atp/grant-mssp-access.md | 2 +- .../microsoft-defender-atp/indicator-file.md | 2 +- .../microsoft-defender-atp/indicator-ip-domain.md | 2 +- .../microsoft-defender-atp/investigate-incidents.md | 4 ++-- 4 files changed, 5 insertions(+), 5 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md b/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md index 131b074f3b..c40e358467 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md +++ b/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md @@ -1,6 +1,6 @@ --- title: Grant access to managed security service provider (MSSP) -description: Take the necessary steps to configure the MSSP integration with Microsoft Defender ATP +description: Steps to configure the MSSP integration with Microsoft Defender ATP keywords: managed security service provider, mssp, configure, integration search.product: eADQiWindows 10XVcnh search.appverid: met150 diff --git a/windows/security/threat-protection/microsoft-defender-atp/indicator-file.md b/windows/security/threat-protection/microsoft-defender-atp/indicator-file.md index ec6a1043c3..a1b3238ad2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/indicator-file.md +++ b/windows/security/threat-protection/microsoft-defender-atp/indicator-file.md @@ -2,7 +2,7 @@ title: Create indicators for files ms.reviewer: description: Create indicators for a file hash that define the detection, prevention, and exclusion of entities. -keywords: file, hash, manage, allowed, blocked, whitelist, blacklist, block, clean, malicious, file hash, ip address, urls, domain +keywords: file, hash, manage, allowed, blocked, block, clean, malicious, file hash, ip address, urls, domain search.product: eADQiWindows 10XVcnh search.appverid: met150 ms.prod: w10 diff --git a/windows/security/threat-protection/microsoft-defender-atp/indicator-ip-domain.md b/windows/security/threat-protection/microsoft-defender-atp/indicator-ip-domain.md index 3639845fad..2b78474a59 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/indicator-ip-domain.md +++ b/windows/security/threat-protection/microsoft-defender-atp/indicator-ip-domain.md @@ -2,7 +2,7 @@ title: Create indicators for IPs and URLs/domains ms.reviewer: description: Create indicators for IPs and URLs/domains that define the detection, prevention, and exclusion of entities. -keywords: ip, url, domain, manage, allowed, blocked, whitelist, blacklist, block, clean, malicious, file hash, ip address, urls, domain +keywords: ip, url, domain, manage, allowed, blocked, block, clean, malicious, file hash, ip address, urls, domain search.product: eADQiWindows 10XVcnh search.appverid: met150 ms.prod: w10 diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-incidents.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-incidents.md index 58b08c56a8..f53cd5ce37 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-incidents.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-incidents.md @@ -40,7 +40,7 @@ When you investigate an incident, you'll see: ## Analyze incident details Click an incident to see the **Incident pane**. Select **Open incident page** to see the incident details and related information (alerts, devices, investigations, evidence, graph). -![Image of incident details](images/atp-incident-details.png) +![Image of incident details1](images/atp-incident-details.png) ### Alerts You can investigate the alerts and see how they were linked together in an incident. @@ -83,7 +83,7 @@ The **Graph** tells the story of the cybersecurity attack. For example, it shows You can click the circles on the incident graph to view the details of the malicious files, associated file detections, how many instances have there been worldwide, whether it’s been observed in your organization, if so, how many instances. -![Image of incident details](images/atp-incident-graph-details.png) +![Image of incident details2](images/atp-incident-graph-details.png) ## Related topics - [Incidents queue](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/view-incidents-queue) From 471b3f1d8ab617e669ec1eee491644010a88ebd2 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Wed, 13 Jan 2021 15:11:31 +0530 Subject: [PATCH 036/161] Update initiate-autoir-investigation.md to fix warnings --- .../microsoft-defender-atp/initiate-autoir-investigation.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md b/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md index 0b1e10aa01..b5ad0513a8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md @@ -1,4 +1,4 @@ -``--- +--- title: Start Investigation API description: Use this API to start investigation on a device. keywords: apis, graph api, supported apis, investigation @@ -15,7 +15,6 @@ audience: ITPro ms.collection: M365-security-compliance ms.topic: article --- - # Start Investigation API [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] From a6cd98cd97285f51c7b88adc6565380f8391f079 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Wed, 13 Jan 2021 15:42:48 +0530 Subject: [PATCH 037/161] fix-suggestions to fix suggestions --- .../microsoft-defender-atp/ios-install.md | 14 ++++----- .../mac-install-jamfpro-login.md | 6 ++-- .../mac-install-manually.md | 12 ++++---- .../mac-jamfpro-device-groups.md | 6 ++-- .../mac-jamfpro-enroll-devices.md | 30 +++++++++---------- 5 files changed, 34 insertions(+), 34 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/ios-install.md b/windows/security/threat-protection/microsoft-defender-atp/ios-install.md index 9388ff4180..fc8e5d2833 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/ios-install.md +++ b/windows/security/threat-protection/microsoft-defender-atp/ios-install.md @@ -50,7 +50,7 @@ Deploy Defender for Endpoint for iOS via Intune Company Portal. 1. In [Microsoft Endpoint manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** -> **iOS/iPadOS** -> **Add** -> **iOS store app** and click **Select**. > [!div class="mx-imgBorder"] - ![Image of Microsoft Endpoint Manager Admin Center](images/ios-deploy-1.png) + ![Image of Microsoft Endpoint Manager Admin Center1](images/ios-deploy-1.png) 1. On the Add app page, click on **Search the App Store** and type **Microsoft Defender ATP** in the search bar. In the search results section, click on *Microsoft Defender ATP* and click **Select**. @@ -62,14 +62,14 @@ Deploy Defender for Endpoint for iOS via Intune Company Portal. > The selected user group should consist of Intune enrolled users. > [!div class="mx-imgBorder"] - ![Image of Microsoft Endpoint Manager Admin Center](images/ios-deploy-2.png) + ![Image of Microsoft Endpoint Manager Admin Center2](images/ios-deploy-2.png) 1. In the *Review + Create* section, verify that all the information entered is correct and then select **Create**. In a few moments, the Defender for Endpoint app should be created successfully, and a notification should show up at the top-right corner of the page. 1. In the app information page that is displayed, in the **Monitor** section, select **Device install status** to verify that the device installation has completed successfully. > [!div class="mx-imgBorder"] - ![Image of Microsoft Endpoint Manager Admin Center](images/ios-deploy-3.png) + ![Image of Microsoft Endpoint Manager Admin Center3](images/ios-deploy-3.png) ## Complete onboarding and check status @@ -99,7 +99,7 @@ Intune allows you to configure the Defender for iOS app through an App Configura 1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and go to **Apps** > **App configuration policies** > **Add**. Click on **Managed devices**. > [!div class="mx-imgBorder"] - ![Image of Microsoft Endpoint Manager Admin Center](images/ios-deploy-4.png) + ![Image of Microsoft Endpoint Manager Admin Center4](images/ios-deploy-4.png) 1. In the *Create app configuration policy* page, provide the following information: - Policy Name @@ -107,7 +107,7 @@ Intune allows you to configure the Defender for iOS app through an App Configura - Targeted app: Select **Microsoft Defender ATP** from the list > [!div class="mx-imgBorder"] - ![Image of Microsoft Endpoint Manager Admin Center](images/ios-deploy-5.png) + ![Image of Microsoft Endpoint Manager Admin Center5](images/ios-deploy-5.png) 1. In the next screen, select **Use configuration designer** as the format. Specify the following property: - Configuration Key: issupervised @@ -115,7 +115,7 @@ Intune allows you to configure the Defender for iOS app through an App Configura - Configuration Value: {{issupervised}} > [!div class="mx-imgBorder"] - ![Image of Microsoft Endpoint Manager Admin Center](images/ios-deploy-6.png) + ![Image of Microsoft Endpoint Manager Admin Center6](images/ios-deploy-6.png) 1. Click **Next** to open the **Scope tags** page. Scope tags are optional. Click **Next** to continue. @@ -132,7 +132,7 @@ Intune allows you to configure the Defender for iOS app through an App Configura - Navigate to **Devices** -> **iOS/iPadOS** -> **Configuration profiles** -> **Create Profile** > [!div class="mx-imgBorder"] - ![Image of Microsoft Endpoint Manager Admin Center](images/ios-deploy-7.png) + ![Image of Microsoft Endpoint Manager Admin Center7](images/ios-deploy-7.png) - Provide a name of the profile. When prompted to import a Configuration profile file, select the one downloaded above. - In the **Assignment** section, select the device group to which you want to apply this profile. As a best practice, this should be applied to all managed iOS devices. Click **Next**. diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-install-jamfpro-login.md b/windows/security/threat-protection/microsoft-defender-atp/mac-install-jamfpro-login.md index 02768f9c9e..a824b0a844 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-install-jamfpro-login.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-install-jamfpro-login.md @@ -31,15 +31,15 @@ ms.topic: conceptual 1. Enter your credentials. - ![Image of Jamf Pro dashboard](images/jamf-pro-portal1.png) + ![Image of Jamf Pro dashboard1](images/jamf-pro-portal1.png) 2. Select **Computers**. - ![Image of Jamf Pro dashboard](images/jamf-pro-dashboard.png) + ![Image of Jamf Pro dashboard2](images/jamf-pro-dashboard.png) 3. You will see the settings that are available. - ![Image of Jamf Pro dashboard](images/jamfpro-settings.png) + ![Image of Jamf Pro dashboard3](images/jamfpro-settings.png) ## Next step diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-install-manually.md b/windows/security/threat-protection/microsoft-defender-atp/mac-install-manually.md index f61fab3284..79b637dd2f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-install-manually.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-install-manually.md @@ -58,16 +58,16 @@ To complete this process, you must have admin privileges on the device. 1. Navigate to the downloaded wdav.pkg in Finder and open it. - ![App install screenshot](../microsoft-defender-antivirus/images/MDATP-28-AppInstall.png) + ![App install screenshot1](../microsoft-defender-antivirus/images/MDATP-28-AppInstall.png) 2. Select **Continue**, agree with the License terms, and enter the password when prompted. - ![App install screenshot](../microsoft-defender-antivirus/images/MDATP-29-AppInstallLogin.png) + ![App install screenshot2](../microsoft-defender-antivirus/images/MDATP-29-AppInstallLogin.png) > [!IMPORTANT] > You will be prompted to allow a driver from Microsoft to be installed (either "System Extension Blocked" or "Installation is on hold" or both. The driver must be allowed to be installed. - ![App install screenshot](../microsoft-defender-antivirus/images/MDATP-30-SystemExtension.png) + ![App install screenshot3](../microsoft-defender-antivirus/images/MDATP-30-SystemExtension.png) 3. Select **Open Security Preferences** or **Open System Preferences > Security & Privacy**. Select **Allow**: @@ -87,7 +87,7 @@ To complete this process, you must have admin privileges on the device. 1. Navigate to the downloaded wdav.pkg in Finder and open it. - ![App install screenshot](images/big-sur-install-1.png) + ![App install screenshot4](images/big-sur-install-1.png) 2. Select **Continue**, agree with the License terms, and enter the password when prompted. @@ -97,13 +97,13 @@ To complete this process, you must have admin privileges on the device. 4. From the **Security & Privacy** window, select **Allow**. - ![System extension security preferences](images/big-sur-install-3.png) + ![System extension security preferences1](images/big-sur-install-3.png) 5. Repeat steps 3 & 4 for all system extensions distributed with Microsoft Defender for Endpoint for Mac. 6. As part of the Endpoint Detection and Response capabilities, Microsoft Defender for Endpoint for Mac inspects socket traffic and reports this information to the Microsoft Defender Security Center portal. When prompted to grant Microsoft Defender for Endpoint permissions to filter network traffic, select **Allow**. - ![System extension security preferences](images/big-sur-install-4.png) + ![System extension security preferences2](images/big-sur-install-4.png) 7. Open **System Preferences** > **Security & Privacy** and navigate to the **Privacy** tab. Grant **Full Disk Access** permission to **Microsoft Defender ATP** and **Microsoft Defender ATP Endpoint Security Extension**. diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-jamfpro-device-groups.md b/windows/security/threat-protection/microsoft-defender-atp/mac-jamfpro-device-groups.md index 65d3c7e838..d9fe83e432 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-jamfpro-device-groups.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-jamfpro-device-groups.md @@ -35,15 +35,15 @@ Set up the device groups similar to Group policy organizational unite (OUs), Mi 2. Select **New**. - ![Image of Jamf Pro](images/jamf-pro-static-group.png) + ![Image of Jamf Pro1](images/jamf-pro-static-group.png) 3. Provide a display name and select **Save**. - ![Image of Jamf Pro](images/jamfpro-machine-group.png) + ![Image of Jamf Pro2](images/jamfpro-machine-group.png) 4. Now you will see the **Contoso's Machine Group** under **Static Computer Groups**. - ![Image of Jamf Pro](images/contoso-machine-group.png) + ![Image of Jamf Pro3](images/contoso-machine-group.png) ## Next step - [Set up Microsoft Defender for Endpoint for macOS policies in Jamf Pro](mac-jamfpro-policies.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-jamfpro-enroll-devices.md b/windows/security/threat-protection/microsoft-defender-atp/mac-jamfpro-enroll-devices.md index ef622f9f2e..82d81d192f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-jamfpro-enroll-devices.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-jamfpro-enroll-devices.md @@ -46,7 +46,7 @@ For a complete list, see [About Computer Enrollment](https://docs.jamf.com/9.9/c 1. In the Jamf Pro dashboard, navigate to **Enrollment invitations**. - ![Image of configuration settings](images/a347307458d6a9bbfa88df7dbe15398f.png) + ![Image of configuration settings1](images/a347307458d6a9bbfa88df7dbe15398f.png) 2. Select **+ New**. @@ -54,29 +54,29 @@ For a complete list, see [About Computer Enrollment](https://docs.jamf.com/9.9/c 3. In **Specify Recipients for the Invitation** > under **Email Addresses** enter the e-mail address(es) of the recipients. - ![Image of configuration settings](images/718b9d609f9f77c8b13ba88c4c0abe5d.png) + ![Image of configuration settings2](images/718b9d609f9f77c8b13ba88c4c0abe5d.png) - ![Image of configuration settings](images/ae3597247b6bc7c5347cf56ab1e820c0.png) + ![Image of configuration settings3](images/ae3597247b6bc7c5347cf56ab1e820c0.png) For example: janedoe@contoso.com - ![Image of configuration settings](images/4922c0fcdde4c7f73242b13bf5e35c19.png) + ![Image of configuration settings4](images/4922c0fcdde4c7f73242b13bf5e35c19.png) 4. Configure the message for the invitation. - ![Image of configuration settings](images/ce580aec080512d44a37ff8e82e5c2ac.png) + ![Image of configuration settings5](images/ce580aec080512d44a37ff8e82e5c2ac.png) - ![Image of configuration settings](images/5856b765a6ce677caacb130ca36b1a62.png) + ![Image of configuration settings6](images/5856b765a6ce677caacb130ca36b1a62.png) - ![Image of configuration settings](images/3ced5383a6be788486d89d407d042f28.png) + ![Image of configuration settings7](images/3ced5383a6be788486d89d407d042f28.png) - ![Image of configuration settings](images/54be9c6ed5b24cebe628dc3cd9ca4089.png) + ![Image of configuration settings8](images/54be9c6ed5b24cebe628dc3cd9ca4089.png) ## Enrollment Method 2: Prestage Enrollments 1. In the Jamf Pro dashboard, navigate to **Prestage enrollments**. - ![Image of configuration settings](images/6fd0cb2bbb0e60a623829c91fd0826ab.png) + ![Image of configuration settings9](images/6fd0cb2bbb0e60a623829c91fd0826ab.png) 2. Follow the instructions in [Computer PreStage Enrollments](https://docs.jamf.com/9.9/casper-suite/administrator-guide/Computer_PreStage_Enrollments.html). @@ -84,24 +84,24 @@ For a complete list, see [About Computer Enrollment](https://docs.jamf.com/9.9/c 1. Select **Continue** and install the CA certificate from a **System Preferences** window. - ![Image of Jamf Pro enrollment](images/jamfpro-ca-certificate.png) + ![Image of Jamf Pro enrollment1](images/jamfpro-ca-certificate.png) 2. Once CA certificate is installed, return to the browser window and select **Continue** and install the MDM profile. - ![Image of Jamf Pro enrollment](images/jamfpro-install-mdm-profile.png) + ![Image of Jamf Pro enrollment2](images/jamfpro-install-mdm-profile.png) 3. Select **Allow** to downloads from JAMF. - ![Image of Jamf Pro enrollment](images/jamfpro-download.png) + ![Image of Jamf Pro enrollment3](images/jamfpro-download.png) 4. Select **Continue** to proceed with the MDM Profile installation. - ![Image of Jamf Pro enrollment](images/jamfpro-install-mdm.png) + ![Image of Jamf Pro enrollment4](images/jamfpro-install-mdm.png) 5. Select **Continue** to install the MDM Profile. - ![Image of Jamf Pro enrollment](images/jamfpro-mdm-unverified.png) + ![Image of Jamf Pro enrollment5](images/jamfpro-mdm-unverified.png) 6. Select **Continue** to complete the configuration. - ![Image of Jamf Pro enrollment](images/jamfpro-mdm-profile.png) + ![Image of Jamf Pro enrollment6](images/jamfpro-mdm-profile.png) From dede9e8e991fb423340a6d28cbd0eea99c5d619b Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Fri, 15 Jan 2021 11:15:38 +0530 Subject: [PATCH 038/161] fix-suggestions To fix suggestions --- .../microsoft-defender-atp/raw-data-export-event-hub.md | 4 ++-- .../microsoft-defender-atp/raw-data-export-storage.md | 6 +++--- .../microsoft-defender-atp/recommendation.md | 2 +- .../switch-to-microsoft-defender-onboard.md | 4 ++-- .../switch-to-microsoft-defender-prepare.md | 4 ++-- .../switch-to-microsoft-defender-setup.md | 4 ++-- 6 files changed, 12 insertions(+), 12 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/raw-data-export-event-hub.md b/windows/security/threat-protection/microsoft-defender-atp/raw-data-export-event-hub.md index 151caefffb..a4d24122f6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/raw-data-export-event-hub.md +++ b/windows/security/threat-protection/microsoft-defender-atp/raw-data-export-event-hub.md @@ -50,7 +50,7 @@ ms.topic: article In order to get your **Event Hubs resource ID**, go to your Azure Event Hubs namespace page on [Azure](https://ms.portal.azure.com/) > properties tab > copy the text under **Resource ID**: - ![Image of event hub resource Id](images/event-hub-resource-id.png) + ![Image of event hub resource Id1](images/event-hub-resource-id.png) 7. Choose the events you want to stream and click **Save**. @@ -94,7 +94,7 @@ To get the data types for event properties do the following: - Here is an example for Device Info event: - ![Image of event hub resource Id](images/machine-info-datatype-example.png) + ![Image of event hub resource Id2](images/machine-info-datatype-example.png) ## Related topics - [Overview of Advanced Hunting](advanced-hunting-overview.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/raw-data-export-storage.md b/windows/security/threat-protection/microsoft-defender-atp/raw-data-export-storage.md index b56e2f57db..0e9db11e6d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/raw-data-export-storage.md +++ b/windows/security/threat-protection/microsoft-defender-atp/raw-data-export-storage.md @@ -48,7 +48,7 @@ ms.topic: article 6. Type your **Storage Account Resource ID**. In order to get your **Storage Account Resource ID**, go to your Storage account page on [Azure portal](https://ms.portal.azure.com/) > properties tab > copy the text under **Storage account resource ID**: - ![Image of event hub resource ID](images/storage-account-resource-id.png) + ![Image of event hub resource ID1](images/storage-account-resource-id.png) 7. Choose the events you want to stream and click **Save**. @@ -56,7 +56,7 @@ ms.topic: article - A blob container will be created for each event type: - ![Image of event hub resource ID](images/storage-account-event-schema.png) + ![Image of event hub resource ID2](images/storage-account-event-schema.png) - The schema of each row in a blob is the following JSON: @@ -93,7 +93,7 @@ In order to get the data types for our events properties do the following: - Here is an example for Device Info event: - ![Image of event hub resource ID](images/machine-info-datatype-example.png) + ![Image of event hub resource ID3](images/machine-info-datatype-example.png) ## Related topics - [Overview of Advanced Hunting](advanced-hunting-overview.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/recommendation.md b/windows/security/threat-protection/microsoft-defender-atp/recommendation.md index a97235ea6c..e505cbc2dc 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/recommendation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/recommendation.md @@ -1,6 +1,6 @@ --- title: Recommendation methods and properties -description: Retrieves top recent alerts. +description: Retrieves the top recent alerts. keywords: apis, graph api, supported apis, get, alerts, recent search.product: eADQiWindows 10XVcnh ms.prod: w10 diff --git a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-onboard.md b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-onboard.md index e455b53fd6..56f9e212cc 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-onboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-onboard.md @@ -31,8 +31,8 @@ ms.reviewer: jesquive, chventou, jonix, chriggs, owtho > Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) -|[![Phase 1: Prepare](images/prepare.png)](switch-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](switch-to-microsoft-defender-prepare.md) |[![Phase 2: Set up](images/setup.png)](switch-to-microsoft-defender-setup.md)
[Phase 2: Set up](switch-to-microsoft-defender-setup.md) |![Phase 3: Onboard](images/onboard.png)
Phase 3: Onboard | -|[![Phase 1: Prepare](images/phase-diagrams/prepare.png)](switch-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](switch-to-microsoft-defender-prepare.md) |[![Phase 2: Set up](images/phase-diagrams/setup.png)](switch-to-microsoft-defender-setup.md)
[Phase 2: Set up](switch-to-microsoft-defender-setup.md) |![Phase 3: Onboard](images/phase-diagrams/onboard.png)
Phase 3: Onboard | +|[![Phase 1: Prepare](images/prepare.png)](switch-to-microsoft-defender-prepare.md)
[Phase 1: Prepare2](switch-to-microsoft-defender-prepare.md) |[![Phase 2: Set up](images/setup.png)](switch-to-microsoft-defender-setup.md)
[Phase 2: Set up2](switch-to-microsoft-defender-setup.md) |![Phase 3: Onboard1](images/onboard.png)
Phase 3: Onboard | +|[![Phase 1: Prepare3](images/phase-diagrams/prepare.png)](switch-to-microsoft-defender-prepare.md)
[Phase 1: Prepare4](switch-to-microsoft-defender-prepare.md) |[![Phase 2: Set up2](images/phase-diagrams/setup.png)](switch-to-microsoft-defender-setup.md)
[Phase 2: Set up](switch-to-microsoft-defender-setup.md) |![Phase 3: Onboard2](images/phase-diagrams/onboard.png)
Phase 3: Onboard | |--|--|--| || |*You are here!* | diff --git a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-prepare.md b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-prepare.md index 68446bf5a4..950bd360f8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-prepare.md +++ b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-prepare.md @@ -31,8 +31,8 @@ ms.reviewer: jesquive, chventou, jonix, chriggs, owtho > Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) -|![Phase 1: Prepare](images/prepare.png)
Phase 1: Prepare |[![Phase 2: Set up](images/setup.png)](switch-to-microsoft-defender-setup.md)
[Phase 2: Set up](switch-to-microsoft-defender-setup.md) |[![Phase 3: Onboard](images/onboard.png)](switch-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](switch-to-microsoft-defender-onboard.md) | -|![Phase 1: Prepare](images/phase-diagrams/prepare.png)
Phase 1: Prepare |[![Phase 2: Set up](images/phase-diagrams/setup.png)](switch-to-microsoft-defender-setup.md)
[Phase 2: Set up](switch-to-microsoft-defender-setup.md) |[![Phase 3: Onboard](images/phase-diagrams/onboard.png)](switch-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](switch-to-microsoft-defender-onboard.md) | +|![Phase 1: Prepare](images/prepare.png)
Phase 1: Prepare |[![Phase 2: Set up](images/setup.png)](switch-to-microsoft-defender-setup.md)
[Phase 2: Set up2](switch-to-microsoft-defender-setup.md) |[![Phase 3: Onboard](images/onboard.png)](switch-to-microsoft-defender-onboard.md)
[Phase 3: Onboard2](switch-to-microsoft-defender-onboard.md) | +|![Phase 1: Prepare2](images/phase-diagrams/prepare.png)
Phase 1: Prepare |[![Phase 2: Set up3](images/phase-diagrams/setup.png)](switch-to-microsoft-defender-setup.md)
[Phase 2: Set up4](switch-to-microsoft-defender-setup.md) |[![Phase 3: Onboard3](images/phase-diagrams/onboard.png)](switch-to-microsoft-defender-onboard.md)
[Phase 3: Onboard4](switch-to-microsoft-defender-onboard.md) | |--|--|--| |*You are here!*| | | diff --git a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md index e84108e0fb..36c381c841 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md +++ b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md @@ -31,8 +31,8 @@ ms.reviewer: jesquive, chventou, jonix, chriggs, owtho > Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) -|[![Phase 1: Prepare](images/prepare.png)](switch-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](switch-to-microsoft-defender-prepare.md) |![Phase 2: Set up](images/setup.png)
Phase 2: Set up |[![Phase 3: Onboard](images/onboard.png)](switch-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](switch-to-microsoft-defender-onboard.md) | -|[![Phase 1: Prepare](images/phase-diagrams/prepare.png)](switch-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](switch-to-microsoft-defender-prepare.md) |![Phase 2: Set up](images/phase-diagrams/setup.png)
Phase 2: Set up |[![Phase 3: Onboard](images/phase-diagrams/onboard.png)](switch-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](switch-to-microsoft-defender-onboard.md) | +|[![Phase 1: Prepare1](images/prepare.png)](switch-to-microsoft-defender-prepare.md)
[Phase 1: Prepare2](switch-to-microsoft-defender-prepare.md) |![Phase 2: Set up](images/setup.png)
Phase 2: Set up |[![Phase 3: Onboard1](images/onboard.png)](switch-to-microsoft-defender-onboard.md)
[Phase 3: Onboard2](switch-to-microsoft-defender-onboard.md) | +|[![Phase 1: Prepare3](images/phase-diagrams/prepare.png)](switch-to-microsoft-defender-prepare.md)
[Phase 1: Prepare4](switch-to-microsoft-defender-prepare.md) |![Phase 2: Set up2](images/phase-diagrams/setup.png)
Phase 2: Set up |[![Phase 3: Onboard3](images/phase-diagrams/onboard.png)](switch-to-microsoft-defender-onboard.md)
[Phase 3: Onboard4](switch-to-microsoft-defender-onboard.md) | |--|--|--| ||*You are here!* | | From 933b72f0906c77e17a6cc30a177bd68955d8ad84 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Fri, 15 Jan 2021 16:37:15 +0530 Subject: [PATCH 039/161] Update configure-mssp-support.md fix suggestions --- .../microsoft-defender-atp/configure-mssp-support.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md b/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md index f82c9abd56..2ccb094c18 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md @@ -1,6 +1,6 @@ --- title: Configure managed security service provider support -description: Take the necessary steps to configure the MSSP integration with Microsoft Defender ATP +description: Take the necessary steps to configure MSSP integration with Microsoft Defender ATP. keywords: managed security service provider, mssp, configure, integration search.product: eADQiWindows 10XVcnh search.appverid: met150 From 472b62781d3bd92a1275ec8ca9413f3d7c0ab404 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Fri, 15 Jan 2021 17:03:25 +0530 Subject: [PATCH 040/161] fix-suggestions To fix suggestions --- .../microsoft-defender-atp/android-intune.md | 24 +++++++++---------- .../microsoft-defender-atp/api-hello-world.md | 4 ++-- .../api-microsoft-flow.md | 12 +++++----- .../api-portal-mapping.md | 4 ++-- .../microsoft-defender-atp/api-power-bi.md | 6 ++--- 5 files changed, 25 insertions(+), 25 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/android-intune.md b/windows/security/threat-protection/microsoft-defender-atp/android-intune.md index 1937a2b7c8..7f56e16fcf 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/android-intune.md +++ b/windows/security/threat-protection/microsoft-defender-atp/android-intune.md @@ -51,7 +51,7 @@ Learn how to deploy Defender for Endpoint for Android on Intune Company Portal - center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Apps** \> **Android Apps** \> **Add \> Android store app** and choose **Select**. - ![Image of Microsoft Endpoint Manager Admin Center](images/mda-addandroidstoreapp.png) + ![Image of Microsoft Endpoint Manager Admin Center1](images/mda-addandroidstoreapp.png) 2. On the **Add app** page and in the *App Information* section enter: @@ -63,7 +63,7 @@ center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Apps** \> Other fields are optional. Select **Next**. - ![Image of Microsoft Endpoint Manager Admin Center](images/mda-addappinfo.png) + ![Image of Microsoft Endpoint Manager Admin Center2](images/mda-addappinfo.png) 3. In the *Assignments* section, go to the **Required** section and select **Add group.** You can then choose the user group(s) that you would like to target Defender for Endpoint for Android app. Choose **Select** and then **Next**. @@ -71,14 +71,14 @@ center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Apps** \> >The selected user group should consist of Intune enrolled users. > [!div class="mx-imgBorder"] - > ![Image of Microsoft Endpoint Manager Admin Center](images/363bf30f7d69a94db578e8af0ddd044b.png) + > ![Image of Microsoft Endpoint Manager Admin Center3](images/363bf30f7d69a94db578e8af0ddd044b.png) 4. In the **Review+Create** section, verify that all the information entered is correct and then select **Create**. In a few moments, the Defender for Endpoint app would be created successfully, and a notification would show up at the top-right corner of the page. - ![Image of Microsoft Endpoint Manager Admin Center](images/86cbe56f88bb6e93e9c63303397fc24f.png) + ![Image of Microsoft Endpoint Manager Admin Center4](images/86cbe56f88bb6e93e9c63303397fc24f.png) 5. In the app information page that is displayed, in the **Monitor** section, @@ -86,7 +86,7 @@ select **Device install status** to verify that the device installation has completed successfully. > [!div class="mx-imgBorder"] - > ![Image of Microsoft Endpoint Manager Admin Center](images/513cf5d59eaaef5d2b5bc122715b5844.png) + > ![Image of Microsoft Endpoint Manager Admin Center5](images/513cf5d59eaaef5d2b5bc122715b5844.png) ### Complete onboarding and check status @@ -123,14 +123,14 @@ center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Apps** \> **Android Apps** \> **Add** and select **Managed Google Play app**. > [!div class="mx-imgBorder"] - > ![Image of Microsoft Endpoint Manager admin center](images/579ff59f31f599414cedf63051628b2e.png) + > ![Image of Microsoft Endpoint Manager admin center6](images/579ff59f31f599414cedf63051628b2e.png) 2. On your managed Google Play page that loads subsequently, go to the search box and lookup **Microsoft Defender.** Your search should display the Microsoft Defender for Endpoint app in your Managed Google Play. Click on the Microsoft Defender for Endpoint app from the Apps search result. - ![Image of Microsoft Endpoint Manager admin center](images/0f79cb37900b57c3e2bb0effad1c19cb.png) + ![Image of Microsoft Endpoint Manager admin center7](images/0f79cb37900b57c3e2bb0effad1c19cb.png) 3. In the App description page that comes up next, you should be able to see app details on Defender for Endpoint. Review the information on the page and then @@ -180,7 +180,7 @@ Defender ATP should be visible in the apps list. 1. In the **Apps** page, go to **Policy > App configuration policies > Add > Managed devices**. - ![Image of Microsoft Endpoint Manager admin center](images/android-mem.png) + ![Image of Microsoft Endpoint Manager admin center8](images/android-mem.png) 1. In the **Create app configuration policy** page, enter the following details: @@ -200,19 +200,19 @@ Defender ATP should be visible in the apps list. Then select **OK**. > [!div class="mx-imgBorder"] - > ![Image of create app configuration policy](images/android-create-app-config.png) + > ![Image of create app configuration policy1](images/android-create-app-config.png) 1. You should now see both the permissions listed and now you can autogrant both by choosing autogrant in the **Permission state** drop-down and then select **Next**. > [!div class="mx-imgBorder"] - > ![Image of create app configuration policy](images/android-auto-grant.png) + > ![Image of create app configuration policy2](images/android-auto-grant.png) 1. In the **Assignments** page, select the user group to which this app config policy would be assigned to. Click **Select groups to include** and selecting the applicable group and then selecting **Next**. The group selected here is usually the same group to which you would assign Microsoft Defender for Endpoint Android app. > [!div class="mx-imgBorder"] - > ![Image of create app configuration policy](images/android-select-group.png) + > ![Image of create app configuration policy3](images/android-select-group.png) 1. In the **Review + Create** page that comes up next, review all the information and then select **Create**.
@@ -220,7 +220,7 @@ Defender ATP should be visible in the apps list. The app configuration policy for Defender for Endpoint autogranting the storage permission is now assigned to the selected user group. > [!div class="mx-imgBorder"] - > ![Image of create app configuration policy](images/android-review-create.png) + > ![Image of create app configuration policy4](images/android-review-create.png) 10. Select **Microsoft Defender ATP** app in the list \> **Properties** \> diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md b/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md index 5a8e56a963..b00bc7b148 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md @@ -58,11 +58,11 @@ For the Application registration stage, you must have a **Global administrator** - **Note**: WindowsDefenderATP does not appear in the original list. You need to start writing its name in the text box to see it appear. - ![Image of API access and API selection](images/add-permission.png) + ![Image of API access and API selection1](images/add-permission.png) - Choose **Application permissions** > **Alert.Read.All** > Click on **Add permissions** - ![Image of API access and API selection](images/application-permissions.png) + ![Image of API access and API selection2](images/application-permissions.png) **Important note**: You need to select the relevant permissions. 'Read All Alerts' is only an example! diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md b/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md index 54ffcf11fc..3b42fefc66 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md @@ -31,7 +31,7 @@ Automating security procedures is a standard requirement for every modern Securi Microsoft Defender API has an official Flow Connector with many capabilities. -![Image of edit credentials](images/api-flow-0.png) +![Image of edit credentials1](images/api-flow-0.png) ## Usage example @@ -41,15 +41,15 @@ The following example demonstrates how to create a Flow that is triggered any ti 2. Go to **My flows** > **New** > **Automated-from blank**. - ![Image of edit credentials](images/api-flow-1.png) + ![Image of edit credentials2](images/api-flow-1.png) 3. Choose a name for your Flow, search for "Microsoft Defender ATP Triggers" as the trigger, and then select the new Alerts trigger. - ![Image of edit credentials](images/api-flow-2.png) + ![Image of edit credentials3](images/api-flow-2.png) Now you have a Flow that is triggered every time a new Alert occurs. -![Image of edit credentials](images/api-flow-3.png) +![Image of edit credentials4](images/api-flow-3.png) All you need to do now is choose your next steps. For example, you can isolate the device if the Severity of the Alert is High and send an email about it. @@ -63,7 +63,7 @@ The Alert trigger provides only the Alert ID and the Machine ID. You can use the 3. Set the **Alert ID** from the last step as **Input**. - ![Image of edit credentials](images/api-flow-4.png) + ![Image of edit credentials5](images/api-flow-4.png) ### Isolate the device if the Alert's severity is High @@ -73,7 +73,7 @@ The Alert trigger provides only the Alert ID and the Machine ID. You can use the If yes, add the **Microsoft Defender ATP - Isolate machine** action with the Machine ID and a comment. - ![Image of edit credentials](images/api-flow-5.png) + ![Image of edit credentials6](images/api-flow-5.png) 3. Add a new step for emailing about the Alert and the Isolation. There are multiple email connectors that are very easy to use, such as Outlook or Gmail. diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md b/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md index ed503a7088..a0a21d751b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md @@ -84,9 +84,9 @@ Field numbers match the numbers in the images below. ![Image of alert details pane with numbers](images/atp-siem-mapping13.png) -![Image of artifact timeline with numbers](images/atp-siem-mapping3.png) +![Image of artifact timeline with numbers1](images/atp-siem-mapping3.png) -![Image of artifact timeline with numbers](images/atp-siem-mapping4.png) +![Image of artifact timeline with numbers2](images/atp-siem-mapping4.png) ![Image machine view](images/atp-mapping6.png) diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md b/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md index 2d20e0d495..851e5a59d7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md @@ -92,17 +92,17 @@ The first example demonstrates how to connect Power BI to Advanced Hunting API a - Click **Edit Credentials** - ![Image of edit credentials](images/power-bi-edit-credentials.png) + ![Image of edit credentials0](images/power-bi-edit-credentials.png) - Select **Organizational account** > **Sign in** - ![Image of set credentials](images/power-bi-set-credentials-organizational.png) + ![Image of set credentials1](images/power-bi-set-credentials-organizational.png) - Enter your credentials and wait to be signed in - Click **Connect** - ![Image of set credentials](images/power-bi-set-credentials-organizational-cont.png) + ![Image of set credentials2](images/power-bi-set-credentials-organizational-cont.png) - Now the results of your query will appear as table and you can start build visualizations on top of it! From 36befb036d9d0528d745ec958b753b600baf680e Mon Sep 17 00:00:00 2001 From: Asha Iyengar Date: Tue, 19 Jan 2021 20:03:37 +0530 Subject: [PATCH 041/161] Rectified the table issue --- .../microsoft-defender-atp/production-deployment.md | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md b/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md index 023e5c0b59..379f635e62 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md +++ b/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md @@ -248,6 +248,5 @@ You can find the Azure IP range on [Microsoft Azure Datacenter IP Ranges](https: > As a cloud-based solution, the IP address range can change. It's recommended you move to DNS resolving setting. ## Next step -||| -|:-------|:-----| -|![Phase 3: Onboard](images/onboard.png)
[Phase 3: Onboard](onboarding.md) | Onboard devices to the service so that the Microsoft Defender for Endpoint service can get sensor data from them. + +![**Phase 3: Onboard**](images/onboard.png)
[Phase 3: Onboard](onboarding.md): Onboard devices to the service so that the Microsoft Defender for Endpoint service can get sensor data from them. From 2356919bc80192a62ca2172ca69eb524d06916a2 Mon Sep 17 00:00:00 2001 From: nimishasatapathy <75668234+nimishasatapathy@users.noreply.github.com> Date: Wed, 20 Jan 2021 16:56:10 +0530 Subject: [PATCH 042/161] Updated4797351 --- .../mdm/policy-csp-localusersandgroups.md | 127 +++++++++++++++--- 1 file changed, 107 insertions(+), 20 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-localusersandgroups.md b/windows/client-management/mdm/policy-csp-localusersandgroups.md index 38ef9aa0b9..d898c1a985 100644 --- a/windows/client-management/mdm/policy-csp-localusersandgroups.md +++ b/windows/client-management/mdm/policy-csp-localusersandgroups.md @@ -82,7 +82,7 @@ Available in Windows 10, version 20H2. This policy setting allows IT admins to a > > Starting from Windows 10, version 20H2, it is recommended to use the LocalUsersandGroups policy instead of the RestrictedGroups policy. Applying both the policies to the same device is unsupported and may yield unpredictable results. -Here's an example of the policy definition XML for group configuration: +Here is an example of the policy definition XML for group configuration: ```xml @@ -104,7 +104,9 @@ where: - ``: Specifies the SID or name of the member to remove from the specified group. > [!NOTE] - > When specifying member names of domain accounts, use fully qualified account names where possible (for example, domain_name\user_name) instead of isolated names (for example, group_name). This way, you can avoid getting ambiguous results when users or groups with the same name exist in multiple domains and locally. See [LookupAccountNameA function](https://docs.microsoft.com/windows/win32/api/winbase/nf-winbase-lookupaccountnamea#remarks) for more information. + > When specifying member names of the user accounts, you must use following format – AzureAD/userUPN. For example, "AzureAD/user1@contoso.com" or "AzureAD/user2@contoso.co.uk". +For adding Azure AD groups, you need to specify the Azure AD Group SID. Azure AD group names are not supported with this policy. +for more information, see [LookupAccountNameA function](https://docs.microsoft.com/windows/win32/api/winbase/nf-winbase-lookupaccountnamea). See [Use custom settings for Windows 10 devices in Intune](https://docs.microsoft.com/mem/intune/configuration/custom-settings-windows-10) for information on how to create custom profiles. @@ -121,35 +123,51 @@ See [Use custom settings for Windows 10 devices in Intune](https://docs.microsof **Examples** -Example 1: Update action for adding and removing group members. +Example 1: AAD focused. -The following example shows how you can update a local group (**Backup Operators**)—add a domain group as a member using its name (**Contoso\ITAdmins**), add the built-in Administrators group using its [well known SID](https://docs.microsoft.com/windows/win32/secauthz/well-known-sids), add a AAD group by its SID (**S-1-12-1-111111111-22222222222-3333333333-4444444444**), and remove a local account (**Guest**). +The following example updates the built-in administrators group with AAD account "bob@contoso.com" and an Azure AD group with the SID **S-1-12-1-111111111-22222222222-3333333333-4444444444. On an AAD joined machines**. + +```xml + + + + + + + +``` + +Example 2: Replace / Restrict the built-in administrators group with an AAD user account. + +> [!NOTE] +> When using ‘R’ replace option to configure the built-in ‘Administrators’ group, it is required to always specify the administrator as a member + any other custom members. This is because the built-in administrator must always be a member of the administrators group. + +Example: +```xml + + + + + + + +``` +Example 3: Update action for adding and removing group members on a hybrid joined machine. + +The following example shows how you can update a local group (**Administrators**)—add an AD domain group as a member using its name (**Contoso\ITAdmins**), add a AAD group by its SID (**S-1-12-1-111111111-22222222222-3333333333-4444444444**), and remove a local account (**Guest**) if it exists. ```xml - + - ``` -Example 2: Restrict action for replacing the group membership. -The following example shows how you can restrict a local group (**Backup Operators**)—replace its membership with the built-in Administrators group using its [well known SID](https://docs.microsoft.com/windows/win32/secauthz/well-known-sids) and add a local account (**Guest**). - -```xml - - - - - - - -``` @@ -157,6 +175,16 @@ The following example shows how you can restrict a local group (**Backup Operato


+> [!NOTE] +> +When AAD group SID’s are added to local groups, during AAD account logon privileges are evaluated only for the following well-known groups on a Windows 10 device: + +- Administrators +- Users +- Guests +- Power Users +- Remote Desktop Users +- Remote Management Users ## FAQs This section provides answers to some common questions you might have about the LocalUsersAndGroups policy CSP. @@ -223,10 +251,69 @@ To troubleshoot Name/SID lookup APIs: ```cmd Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Lsa" -Name LspDbgInfoLevel -Value 0x0 -Type dword -Force ``` - +```xml + + + + + + + + + + + + Group Configuration Action + + + + + + + + Group Member to Add + + + + + + + + Group Member to Remove + + + + + + + + Group property to configure + + + + + + + + + + + + + + + + Local Group Configuration + + + + + + +``` Footnotes: -- 9 - Available in Windows 10, version 20H2. +Available in Windows 10, version 20H2 From 4cf8b27e76944c7e0ca7860bee687946e019e728 Mon Sep 17 00:00:00 2001 From: VLG17 <41186174+VLG17@users.noreply.github.com> Date: Thu, 21 Jan 2021 21:40:39 +0200 Subject: [PATCH 043/161] add info about IIS 7.0 and above https://github.com/MicrosoftDocs/windows-itpro-docs/issues/8881 --- .../impersonate-a-client-after-authentication.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md b/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md index 1d241529ee..893651d17e 100644 --- a/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md +++ b/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md @@ -105,6 +105,8 @@ On member servers, ensure that only the Administrators and Service groups (Local In most cases, this configuration has no impact. If you have installed optional components such as ASP.NET or IIS, you may need to assign the **Impersonate a client after authentication** user right to additional accounts that are required by those components, such as IUSR\_*<ComputerName>*, IIS\_WPG, ASP.NET, or IWAM\_*<ComputerName>*. +In IIS 7.0 and later, a built-in account (IUSR) replaces the IUSR_MachineName account. Additionally, a group that is named IIS_IUSRS replaces the IIS_WPG group. Because the IUSR account is a built-in account, the IUSR account no longer requires a password. The IUSR account resembles a network or local service account. More details [in this article](https://docs.microsoft.com/en-us/troubleshoot/iis/default-permissions-user-rights). + ## Related topics - [User Rights Assignment](user-rights-assignment.md) From 72432a8e3fa863b5926ba65e3a04bab9168c1a93 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Fri, 22 Jan 2021 11:14:17 +0530 Subject: [PATCH 044/161] Update microsoft-defender-antivirus-compatibility.md Updated topic per task 4800461 --- .../microsoft-defender-antivirus-compatibility.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md index bac2466090..0880c6973d 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md @@ -99,7 +99,7 @@ The table in this section summarizes the functionality and features that are ava - When Microsoft Defender Antivirus is disabled automatically, it can be re-enabled automatically if the protection offered by a non-Microsoft antivirus product expires or otherwise stops providing real-time protection from viruses, malware, or other threats. Automatic re-enabling helps to ensure that antivirus protection is maintained on your devices. It also allows you to enable [limited periodic scanning](limited-periodic-scanning-microsoft-defender-antivirus.md), which uses the Microsoft Defender Antivirus engine to periodically check for threats in addition to your main antivirus app. -- When Microsoft Defender Antivirus is in passive mode, you can still [manage updates for Microsoft Defender Antivirus](manage-updates-baselines-microsoft-defender-antivirus.md); however, you can't move Microsoft Defender Antivirus into active mode if your devices have an up-to-date, non-Microsoft antivirus product providing real-time protection from malware. +- When Microsoft Defender Antivirus is in passive mode, you can still [manage updates for Microsoft Defender Antivirus](manage-updates-baselines-microsoft-defender-antivirus.md); however, you can't move Microsoft Defender Antivirus into active mode if your devices have an up-to-date, non-Microsoft antivirus product providing real-time protection from malware. For optimal security layered defense, and detection efficacy please make sure to update the [Microsoft Defender Antivirus protection (Security intelligence update, Engine and Platform)](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/manage-updates-baselines-microsoft-defender-antivirus) even if Microsoft Defender Antivirus is running in passive mode. If you uninstall the non-Microsoft antivirus product, and use Microsoft Defender Antivirus to provide protection to your devices, Microsoft Defender Antivirus will return to its normal active mode automatically. From 2acd14c2fe5996de92e6c1d96054ba9d59375c34 Mon Sep 17 00:00:00 2001 From: Lovina Saldanha Date: Fri, 22 Jan 2021 11:26:11 +0530 Subject: [PATCH 045/161] Update microsoft-defender-antivirus-compatibility.md editorial changes --- .../microsoft-defender-antivirus-compatibility.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md index 0880c6973d..5cb7faf5e7 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md @@ -99,7 +99,7 @@ The table in this section summarizes the functionality and features that are ava - When Microsoft Defender Antivirus is disabled automatically, it can be re-enabled automatically if the protection offered by a non-Microsoft antivirus product expires or otherwise stops providing real-time protection from viruses, malware, or other threats. Automatic re-enabling helps to ensure that antivirus protection is maintained on your devices. It also allows you to enable [limited periodic scanning](limited-periodic-scanning-microsoft-defender-antivirus.md), which uses the Microsoft Defender Antivirus engine to periodically check for threats in addition to your main antivirus app. -- When Microsoft Defender Antivirus is in passive mode, you can still [manage updates for Microsoft Defender Antivirus](manage-updates-baselines-microsoft-defender-antivirus.md); however, you can't move Microsoft Defender Antivirus into active mode if your devices have an up-to-date, non-Microsoft antivirus product providing real-time protection from malware. For optimal security layered defense, and detection efficacy please make sure to update the [Microsoft Defender Antivirus protection (Security intelligence update, Engine and Platform)](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/manage-updates-baselines-microsoft-defender-antivirus) even if Microsoft Defender Antivirus is running in passive mode. +- When Microsoft Defender Antivirus is in passive mode, you can still [manage updates for Microsoft Defender Antivirus](manage-updates-baselines-microsoft-defender-antivirus.md); however, you can't move Microsoft Defender Antivirus into active mode if your devices have an up-to-date, non-Microsoft antivirus product providing real-time protection from malware. For optimal security layered defense and detection efficacy, please ensure that you update the [Microsoft Defender Antivirus protection (Security intelligence update, Engine and Platform)](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/manage-updates-baselines-microsoft-defender-antivirus) even if Microsoft Defender Antivirus is running in passive mode. If you uninstall the non-Microsoft antivirus product, and use Microsoft Defender Antivirus to provide protection to your devices, Microsoft Defender Antivirus will return to its normal active mode automatically. From d623b6c85877357e8c3489eef319d4ea993d8169 Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Sat, 23 Jan 2021 22:29:55 +0500 Subject: [PATCH 046/161] pointing to the Application proxy page Added a link so that users can directly get more information about the application proxy and how the application proxy works. Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/8988 --- .../hello-for-business/hello-hybrid-aadj-sso-cert.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-cert.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-cert.md index c5273dc500..df8163a715 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-cert.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-cert.md @@ -396,7 +396,7 @@ Certificate enrollment for Azure AD joined devices occurs over the Internet. As Ideally, you configure your Microsoft Intune SCEP certificate profile to use multiple external NDES URLs. This enables Microsoft Intune to round-robin load balance the certificate requests to identically configured NDES Servers (each NDES server can accommodate approximately 300 concurrent requests). Microsoft Intune sends these requests to Azure AD Application Proxies. -Azure AD Application proxies are serviced by lightweight Application Proxy Connector agents. These agents are installed on your on-premises, domain joined devices and make authenticated secure outbound connection to Azure, waiting to process requests from Azure AD Application Proxies. You can create connector groups in Azure Active Directory to assign specific connectors to service specific applications. +Azure AD Application proxies are serviced by lightweight Application Proxy Connector agents. See, [What is Application Proxy](https://docs.microsoft.com/azure/active-directory/manage-apps/application-proxy#what-is-application-proxy) for more details. These agents are installed on your on-premises, domain joined devices and make authenticated secure outbound connection to Azure, waiting to process requests from Azure AD Application Proxies. You can create connector groups in Azure Active Directory to assign specific connectors to service specific applications. Connector group automatically round-robin, load balance the Azure AD Application proxy requests to the connectors within the assigned connector group. This ensures Windows Hello for Business certificate requests have multiple dedicated Azure AD Application Proxy connectors exclusively available to satisfy enrollment requests. Load balancing the NDES servers and connectors should ensure users enroll their Windows Hello for Business certificates in a timely manner. From 8f8c04c0ea899c2f0115b9a33e72f36e10a7ce76 Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Sun, 24 Jan 2021 16:52:50 +0500 Subject: [PATCH 047/161] Update windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-cert.md Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- .../hello-for-business/hello-hybrid-aadj-sso-cert.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-cert.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-cert.md index df8163a715..1c550a85f6 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-cert.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-cert.md @@ -396,7 +396,7 @@ Certificate enrollment for Azure AD joined devices occurs over the Internet. As Ideally, you configure your Microsoft Intune SCEP certificate profile to use multiple external NDES URLs. This enables Microsoft Intune to round-robin load balance the certificate requests to identically configured NDES Servers (each NDES server can accommodate approximately 300 concurrent requests). Microsoft Intune sends these requests to Azure AD Application Proxies. -Azure AD Application proxies are serviced by lightweight Application Proxy Connector agents. See, [What is Application Proxy](https://docs.microsoft.com/azure/active-directory/manage-apps/application-proxy#what-is-application-proxy) for more details. These agents are installed on your on-premises, domain joined devices and make authenticated secure outbound connection to Azure, waiting to process requests from Azure AD Application Proxies. You can create connector groups in Azure Active Directory to assign specific connectors to service specific applications. +Azure AD Application proxies are serviced by lightweight Application Proxy Connector agents. See [What is Application Proxy](https://docs.microsoft.com/azure/active-directory/manage-apps/application-proxy#what-is-application-proxy) for more details. These agents are installed on your on-premises, domain joined devices and make authenticated secure outbound connection to Azure, waiting to process requests from Azure AD Application Proxies. You can create connector groups in Azure Active Directory to assign specific connectors to service specific applications. Connector group automatically round-robin, load balance the Azure AD Application proxy requests to the connectors within the assigned connector group. This ensures Windows Hello for Business certificate requests have multiple dedicated Azure AD Application Proxy connectors exclusively available to satisfy enrollment requests. Load balancing the NDES servers and connectors should ensure users enroll their Windows Hello for Business certificates in a timely manner. From 2770129c50ef8d2acf3eeb162938f616afbb3282 Mon Sep 17 00:00:00 2001 From: VLG17 <41186174+VLG17@users.noreply.github.com> Date: Mon, 25 Jan 2021 09:14:23 +0200 Subject: [PATCH 048/161] Update windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md Co-authored-by: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- .../impersonate-a-client-after-authentication.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md b/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md index 893651d17e..14ce26e99b 100644 --- a/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md +++ b/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md @@ -105,7 +105,7 @@ On member servers, ensure that only the Administrators and Service groups (Local In most cases, this configuration has no impact. If you have installed optional components such as ASP.NET or IIS, you may need to assign the **Impersonate a client after authentication** user right to additional accounts that are required by those components, such as IUSR\_*<ComputerName>*, IIS\_WPG, ASP.NET, or IWAM\_*<ComputerName>*. -In IIS 7.0 and later, a built-in account (IUSR) replaces the IUSR_MachineName account. Additionally, a group that is named IIS_IUSRS replaces the IIS_WPG group. Because the IUSR account is a built-in account, the IUSR account no longer requires a password. The IUSR account resembles a network or local service account. More details [in this article](https://docs.microsoft.com/en-us/troubleshoot/iis/default-permissions-user-rights). +In IIS 7.0 and later, a built-in account (IUSR) replaces the IUSR_MachineName account. Additionally, a group that is named IIS_IUSRS replaces the IIS_WPG group. Because the IUSR account is a built-in account, the IUSR account no longer requires a password. The IUSR account resembles a network or local service account. For more details, see [Default permissions and user rights for IIS 7.0 and later](https://docs.microsoft.com/en-us/troubleshoot/iis/default-permissions-user-rights). ## Related topics From f9428cbd5cf7917295207e3c69c9e0e563ec90df Mon Sep 17 00:00:00 2001 From: Nagappan Veerappan Date: Tue, 26 Jan 2021 10:22:17 -0800 Subject: [PATCH 049/161] Update hello-key-trust-adfs.md added Cname required for enterpriseregistration entry for on-prem ADFS device registration --- .../hello-for-business/hello-key-trust-adfs.md | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/windows/security/identity-protection/hello-for-business/hello-key-trust-adfs.md b/windows/security/identity-protection/hello-for-business/hello-key-trust-adfs.md index a908e96533..39091b5f6e 100644 --- a/windows/security/identity-protection/hello-for-business/hello-key-trust-adfs.md +++ b/windows/security/identity-protection/hello-for-business/hello-key-trust-adfs.md @@ -298,8 +298,14 @@ Sign-in the domain controller or administrative workstation with domain administ 3. In the navigation pane, select the node that has the name of your internal Active Directory domain name. 4. In the navigation pane, right-click the domain name node and click **New Host (A or AAAA)**. 5. In the **name** box, type the name of the federation service. In the **IP address** box, type the IP address of your federation server. Click **Add Host**. +6. Right-click the domain_name node, and then click New Alias (CNAME). +7. In the New Resource Record dialog box, type enterpriseregistration in the Alias name box. +8. In the fully qualified domain name (FQDN) of the target host box, type federation_service_farm_name.domain_name.com, and then click OK. 6. Close the DNS Management console +Note: if your forest has multiple UPN suffix. please make sure, you have enterpriseregistration.upnsuffix.com present for each suffix + + ## Configure the Intranet Zone to include the federation service The Windows Hello provisioning presents web pages from the federation service. Configuring the intranet zone to include the federation service enables the user to authenticate to the federation service using integrated authentication. Without this setting, the connection to the federation service during Windows Hello provisioning prompts the user for authentication. From 864b9835560f3a80f91c2410bea96e124df57dd3 Mon Sep 17 00:00:00 2001 From: Nagappan Veerappan Date: Tue, 26 Jan 2021 11:10:58 -0800 Subject: [PATCH 050/161] Lockscreen PIN reset limitations Lock screen PIN reset limitations --- .../hello-for-business/hello-feature-pin-reset.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md b/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md index b1fda98d52..e72d85ea29 100644 --- a/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md +++ b/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md @@ -109,6 +109,9 @@ On-premises deployments provide users with the ability to reset forgotten PINs e 3. Follow the instructions provided by the provisioning process 4. When finished, unlock your desktop using your newly created PIN. +you may find PIN reset only works from settings post login and This lock screen PIN reset will not work if you have any matching limitation of SSPR password reset from lock screen. refer the below doc +https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-sspr-windows#general-limitations + >[!NOTE] > Visit the [Windows Hello for Business Videos](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-videos.md) page and watch the [Windows Hello for Business forgotten PIN user experience](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-videos#windows-hello-for-business-forgotten-pin-user-experience) video. From fb39122a357fc459c0f5e7e6f2f3969ab327c81f Mon Sep 17 00:00:00 2001 From: Nagappan Veerappan Date: Tue, 26 Jan 2021 11:42:07 -0800 Subject: [PATCH 051/161] Update windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md accepted Co-authored-by: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- .../hello-for-business/hello-feature-pin-reset.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md b/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md index e72d85ea29..f9da23b2f5 100644 --- a/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md +++ b/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md @@ -112,7 +112,7 @@ On-premises deployments provide users with the ability to reset forgotten PINs e you may find PIN reset only works from settings post login and This lock screen PIN reset will not work if you have any matching limitation of SSPR password reset from lock screen. refer the below doc https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-sspr-windows#general-limitations ->[!NOTE] +> [!NOTE] > Visit the [Windows Hello for Business Videos](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-videos.md) page and watch the [Windows Hello for Business forgotten PIN user experience](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-videos#windows-hello-for-business-forgotten-pin-user-experience) video. ## Related topics From fb183c6d238679212756dc4aba96fb11836e4a03 Mon Sep 17 00:00:00 2001 From: Nagappan Veerappan Date: Tue, 26 Jan 2021 11:45:20 -0800 Subject: [PATCH 052/161] Update hello-feature-pin-reset.md corrected --- .../hello-for-business/hello-feature-pin-reset.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md b/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md index f9da23b2f5..a2bc31b02f 100644 --- a/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md +++ b/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md @@ -109,7 +109,7 @@ On-premises deployments provide users with the ability to reset forgotten PINs e 3. Follow the instructions provided by the provisioning process 4. When finished, unlock your desktop using your newly created PIN. -you may find PIN reset only works from settings post login and This lock screen PIN reset will not work if you have any matching limitation of SSPR password reset from lock screen. refer the below doc +you may find PIN reset only works from settings post login and "lock screen" PIN reset function will not work if you have any matching limitation of SSPR password reset from lock screen. refer the below doc https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-sspr-windows#general-limitations > [!NOTE] From 7223dc7c6ae30baf2b9615fce0ae10a4d11cf0c7 Mon Sep 17 00:00:00 2001 From: Nagappan Veerappan Date: Tue, 26 Jan 2021 14:47:28 -0800 Subject: [PATCH 053/161] Update windows/security/identity-protection/hello-for-business/hello-key-trust-adfs.md looks good Co-authored-by: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- .../hello-for-business/hello-key-trust-adfs.md | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-key-trust-adfs.md b/windows/security/identity-protection/hello-for-business/hello-key-trust-adfs.md index 39091b5f6e..ebef5484a7 100644 --- a/windows/security/identity-protection/hello-for-business/hello-key-trust-adfs.md +++ b/windows/security/identity-protection/hello-for-business/hello-key-trust-adfs.md @@ -303,8 +303,8 @@ Sign-in the domain controller or administrative workstation with domain administ 8. In the fully qualified domain name (FQDN) of the target host box, type federation_service_farm_name.domain_name.com, and then click OK. 6. Close the DNS Management console -Note: if your forest has multiple UPN suffix. please make sure, you have enterpriseregistration.upnsuffix.com present for each suffix - +> [!NOTE] +> If your forest has multiple UPN suffixes, please make sure that `enterpriseregistration.upnsuffix.com` is present for each suffix. ## Configure the Intranet Zone to include the federation service @@ -349,4 +349,3 @@ Before you continue with the deployment, validate your deployment progress by re 4. [Validate and Deploy Multifactor Authentication Services (MFA)](hello-key-trust-validate-deploy-mfa.md) 5. [Configure Windows Hello for Business Policy settings](hello-key-trust-policy-settings.md) - From 6b03f05ca81841c738b96c4b707a48e2a185c966 Mon Sep 17 00:00:00 2001 From: Nagappan Veerappan Date: Tue, 26 Jan 2021 14:47:59 -0800 Subject: [PATCH 054/161] Update windows/security/identity-protection/hello-for-business/hello-key-trust-adfs.md accepted Co-authored-by: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- .../hello-for-business/hello-key-trust-adfs.md | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-key-trust-adfs.md b/windows/security/identity-protection/hello-for-business/hello-key-trust-adfs.md index ebef5484a7..5eb6f6aa71 100644 --- a/windows/security/identity-protection/hello-for-business/hello-key-trust-adfs.md +++ b/windows/security/identity-protection/hello-for-business/hello-key-trust-adfs.md @@ -298,9 +298,9 @@ Sign-in the domain controller or administrative workstation with domain administ 3. In the navigation pane, select the node that has the name of your internal Active Directory domain name. 4. In the navigation pane, right-click the domain name node and click **New Host (A or AAAA)**. 5. In the **name** box, type the name of the federation service. In the **IP address** box, type the IP address of your federation server. Click **Add Host**. -6. Right-click the domain_name node, and then click New Alias (CNAME). -7. In the New Resource Record dialog box, type enterpriseregistration in the Alias name box. -8. In the fully qualified domain name (FQDN) of the target host box, type federation_service_farm_name.domain_name.com, and then click OK. +6. Right-click the `domain_name` node and select **New Alias (CNAME)**. +7. In the **New Resource Record** dialog box, type "enterpriseregistration" in the **Alias** name box. +8. In the **fully qualified domain name (FQDN)** of the target host box, type `federation_service_farm_name.domain_name.com`, and click OK. 6. Close the DNS Management console > [!NOTE] @@ -348,4 +348,3 @@ Before you continue with the deployment, validate your deployment progress by re 3. Prepare and Deploy Windows Server 2016 Active Directory Federation Services (*You are here*) 4. [Validate and Deploy Multifactor Authentication Services (MFA)](hello-key-trust-validate-deploy-mfa.md) 5. [Configure Windows Hello for Business Policy settings](hello-key-trust-policy-settings.md) - From ea70ba9c7695da1f92bb4527c9032dcb8f5c1a30 Mon Sep 17 00:00:00 2001 From: Nagappan Veerappan Date: Tue, 26 Jan 2021 14:58:21 -0800 Subject: [PATCH 055/161] Update windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md looks fine Co-authored-by: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- .../hello-for-business/hello-feature-pin-reset.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md b/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md index a2bc31b02f..bfee1d6776 100644 --- a/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md +++ b/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md @@ -109,8 +109,7 @@ On-premises deployments provide users with the ability to reset forgotten PINs e 3. Follow the instructions provided by the provisioning process 4. When finished, unlock your desktop using your newly created PIN. -you may find PIN reset only works from settings post login and "lock screen" PIN reset function will not work if you have any matching limitation of SSPR password reset from lock screen. refer the below doc -https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-sspr-windows#general-limitations +You may find that PIN reset from settings only works post login, and that the "lock screen" PIN reset function will not work if you have any matching limitation of SSPR password reset from lock screen. For more information, see [Enable Azure Active Directory self-service password reset at the Windows sign-in screen - **General limitations**](https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-sspr-windows#general-limitations). > [!NOTE] > Visit the [Windows Hello for Business Videos](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-videos.md) page and watch the [Windows Hello for Business forgotten PIN user experience](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-videos#windows-hello-for-business-forgotten-pin-user-experience) video. From b20b80b83bb4647d25fecf5b126055c5596a4806 Mon Sep 17 00:00:00 2001 From: Nagappan Veerappan Date: Tue, 26 Jan 2021 15:13:10 -0800 Subject: [PATCH 056/161] Update windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md looks good Co-authored-by: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- .../hello-for-business/hello-feature-pin-reset.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md b/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md index bfee1d6776..7e82ff0181 100644 --- a/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md +++ b/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md @@ -109,7 +109,7 @@ On-premises deployments provide users with the ability to reset forgotten PINs e 3. Follow the instructions provided by the provisioning process 4. When finished, unlock your desktop using your newly created PIN. -You may find that PIN reset from settings only works post login, and that the "lock screen" PIN reset function will not work if you have any matching limitation of SSPR password reset from lock screen. For more information, see [Enable Azure Active Directory self-service password reset at the Windows sign-in screen - **General limitations**](https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-sspr-windows#general-limitations). +You may find that PIN reset from settings only works post login, and that the "lock screen" PIN reset function will not work if you have any matching limitation of SSPR password reset from the lock screen. For more information, see [Enable Azure Active Directory self-service password reset at the Windows sign-in screen - **General limitations**](https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-sspr-windows#general-limitations). > [!NOTE] > Visit the [Windows Hello for Business Videos](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-videos.md) page and watch the [Windows Hello for Business forgotten PIN user experience](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-videos#windows-hello-for-business-forgotten-pin-user-experience) video. From dc4e543aceb17c20dc9ba5c820dc6966d1492564 Mon Sep 17 00:00:00 2001 From: Nagappan Veerappan Date: Wed, 27 Jan 2021 09:36:51 -0800 Subject: [PATCH 057/161] Update windows/security/identity-protection/hello-for-business/hello-key-trust-adfs.md number correction Co-authored-by: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- .../hello-for-business/hello-key-trust-adfs.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-key-trust-adfs.md b/windows/security/identity-protection/hello-for-business/hello-key-trust-adfs.md index 5eb6f6aa71..2a2c07e715 100644 --- a/windows/security/identity-protection/hello-for-business/hello-key-trust-adfs.md +++ b/windows/security/identity-protection/hello-for-business/hello-key-trust-adfs.md @@ -301,7 +301,7 @@ Sign-in the domain controller or administrative workstation with domain administ 6. Right-click the `domain_name` node and select **New Alias (CNAME)**. 7. In the **New Resource Record** dialog box, type "enterpriseregistration" in the **Alias** name box. 8. In the **fully qualified domain name (FQDN)** of the target host box, type `federation_service_farm_name.domain_name.com`, and click OK. -6. Close the DNS Management console +9. Close the DNS Management console. > [!NOTE] > If your forest has multiple UPN suffixes, please make sure that `enterpriseregistration.upnsuffix.com` is present for each suffix. From c58e0fc7489fe3351f1851f6e9e43519c890d028 Mon Sep 17 00:00:00 2001 From: Nagappan Veerappan Date: Wed, 27 Jan 2021 10:16:47 -0800 Subject: [PATCH 058/161] Update windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md accepted Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- .../hello-for-business/hello-feature-pin-reset.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md b/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md index 7e82ff0181..2a553e3421 100644 --- a/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md +++ b/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset.md @@ -109,7 +109,7 @@ On-premises deployments provide users with the ability to reset forgotten PINs e 3. Follow the instructions provided by the provisioning process 4. When finished, unlock your desktop using your newly created PIN. -You may find that PIN reset from settings only works post login, and that the "lock screen" PIN reset function will not work if you have any matching limitation of SSPR password reset from the lock screen. For more information, see [Enable Azure Active Directory self-service password reset at the Windows sign-in screen - **General limitations**](https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-sspr-windows#general-limitations). +You may find that PIN reset from settings only works post login, and that the "lock screen" PIN reset function will not work if you have any matching limitation of SSPR password reset from the lock screen. For more information, see [Enable Azure Active Directory self-service password reset at the Windows sign-in screen - **General limitations**](https://docs.microsoft.com/azure/active-directory/authentication/howto-sspr-windows#general-limitations). > [!NOTE] > Visit the [Windows Hello for Business Videos](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-videos.md) page and watch the [Windows Hello for Business forgotten PIN user experience](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-videos#windows-hello-for-business-forgotten-pin-user-experience) video. From 1741809281a26350598da038d85878d6ba283cfa Mon Sep 17 00:00:00 2001 From: Chad Simmons Date: Tue, 2 Feb 2021 12:04:49 -0600 Subject: [PATCH 059/161] update headers to support In This Article Update headers to support "In This Article" like newer documentation such as https://docs.microsoft.com/en-us/mem/intune/protect/security-baselines-configure --- .../mdm/policy-csp-deviceinstallation.md | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-deviceinstallation.md b/windows/client-management/mdm/policy-csp-deviceinstallation.md index 24c7b04cbf..16084a0b88 100644 --- a/windows/client-management/mdm/policy-csp-deviceinstallation.md +++ b/windows/client-management/mdm/policy-csp-deviceinstallation.md @@ -51,7 +51,7 @@ ms.localizationpriority: medium
-
**DeviceInstallation/AllowInstallationOfMatchingDeviceIDs** +## DeviceInstallation/AllowInstallationOfMatchingDeviceIDs @@ -165,7 +165,7 @@ To verify that the policy is applied, check C:\windows\INF\setupapi.dev.log and
-**DeviceInstallation/AllowInstallationOfMatchingDeviceInstanceIDs** +## DeviceInstallation/AllowInstallationOfMatchingDeviceInstanceIDs
@@ -272,7 +272,7 @@ To verify the policy is applied, check C:\windows\INF\setupapi.dev.log and see i
-**DeviceInstallation/AllowInstallationOfMatchingDeviceSetupClasses** +## DeviceInstallation/AllowInstallationOfMatchingDeviceSetupClasses
@@ -395,7 +395,7 @@ To verify that the policy is applied, check C:\windows\INF\setupapi.dev.log and
-**DeviceInstallation/PreventDeviceMetadataFromNetwork** +## DeviceInstallation/PreventDeviceMetadataFromNetwork
@@ -474,7 +474,7 @@ ADMX Info:
-**DeviceInstallation/PreventInstallationOfDevicesNotDescribedByOtherPolicySettings** +## DeviceInstallation/PreventInstallationOfDevicesNotDescribedByOtherPolicySettings
@@ -586,7 +586,7 @@ You can also block installation by using a custom profile in Intune.
-**DeviceInstallation/PreventInstallationOfMatchingDeviceIDs** +## DeviceInstallation/PreventInstallationOfMatchingDeviceIDs
@@ -703,7 +703,7 @@ For example, this custom profile blocks installation and usage of USB devices wi
-**DeviceInstallation/PreventInstallationOfMatchingDeviceInstanceIDs** +## DeviceInstallation/PreventInstallationOfMatchingDeviceInstanceIDs
@@ -830,7 +830,7 @@ with
-**DeviceInstallation/PreventInstallationOfMatchingDeviceSetupClasses** +## DeviceInstallation/PreventInstallationOfMatchingDeviceSetupClasses
From 25e9988e1786fa9f2fab2425f69956cd82fdbbfe Mon Sep 17 00:00:00 2001 From: Warren Williams Date: Thu, 4 Feb 2021 15:27:46 -0600 Subject: [PATCH 060/161] Update customize-and-export-start-layout.md Added text to cover a known issue with Office 2019. --- .../configuration/customize-and-export-start-layout.md | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/windows/configuration/customize-and-export-start-layout.md b/windows/configuration/customize-and-export-start-layout.md index ad794f7530..0453af5c1c 100644 --- a/windows/configuration/customize-and-export-start-layout.md +++ b/windows/configuration/customize-and-export-start-layout.md @@ -182,6 +182,16 @@ If the Start layout is applied by Group Policy or MDM, and the policy is removed 4. Save the file and apply using any of the deployment methods. +**Considerations for Office 2019 + +You may experience an issue with Office 2019 tiles being removed from Start when you upgrade Office 2019 if you manage the Office 2019 app tiles in a custom group on Start that only contains the Office 2019 app tiles. The Office 2019 group on Start will get removed when you upgrade is performed and the Office 2019 tiles will be placed in the next available group on Start. + +To avoid this problem, place another app tile in the Office 2019 group that will not be removed when Office 2019 is upgraded. For example: Notepad.exe or calc.exe in the group. + +This issue occurs because Office 2019 removes and reinstalls the apps when they are upgraded. Start will delete empty groups from the layout when it detects all apps for that group have been removed. Adding another app that will not be removed suring the upgrade will preserve the custom group and the new Office 2019 tiles will get added back to the correct group during the upgrade. + + + ## Related topics From ae0a344cee546c0d04da73c082d3c00e25fccffe Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Thu, 4 Feb 2021 14:59:22 -0800 Subject: [PATCH 061/161] Update customize-and-export-start-layout.md edited and simplified --- .../configuration/customize-and-export-start-layout.md | 9 ++------- 1 file changed, 2 insertions(+), 7 deletions(-) diff --git a/windows/configuration/customize-and-export-start-layout.md b/windows/configuration/customize-and-export-start-layout.md index 0453af5c1c..e0e64d6591 100644 --- a/windows/configuration/customize-and-export-start-layout.md +++ b/windows/configuration/customize-and-export-start-layout.md @@ -182,13 +182,8 @@ If the Start layout is applied by Group Policy or MDM, and the policy is removed 4. Save the file and apply using any of the deployment methods. -**Considerations for Office 2019 - -You may experience an issue with Office 2019 tiles being removed from Start when you upgrade Office 2019 if you manage the Office 2019 app tiles in a custom group on Start that only contains the Office 2019 app tiles. The Office 2019 group on Start will get removed when you upgrade is performed and the Office 2019 tiles will be placed in the next available group on Start. - -To avoid this problem, place another app tile in the Office 2019 group that will not be removed when Office 2019 is upgraded. For example: Notepad.exe or calc.exe in the group. - -This issue occurs because Office 2019 removes and reinstalls the apps when they are upgraded. Start will delete empty groups from the layout when it detects all apps for that group have been removed. Adding another app that will not be removed suring the upgrade will preserve the custom group and the new Office 2019 tiles will get added back to the correct group during the upgrade. +> [!NOTE] +> Office 2019 tiles might be removed removed from the Start menu when you upgrade Office 2019. This only occurs if Office 2019 app tiles are in a custom group on Start and only contains the Office 2019 app tiles. To avoid this problem, place another app tile in the Office 2019 group prior to the upgrade. For example: Notepad.exe or calc.exe in the group. This issue occurs because Office 2019 removes and reinstalls the apps when they are upgraded. Start removes empty groups when it detects that all apps for that group have been removed. From dfad633043036ab532071b2cb4587015100d97bf Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Thu, 4 Feb 2021 15:01:55 -0800 Subject: [PATCH 062/161] Update customize-and-export-start-layout.md --- windows/configuration/customize-and-export-start-layout.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/configuration/customize-and-export-start-layout.md b/windows/configuration/customize-and-export-start-layout.md index e0e64d6591..4eade94321 100644 --- a/windows/configuration/customize-and-export-start-layout.md +++ b/windows/configuration/customize-and-export-start-layout.md @@ -183,7 +183,7 @@ If the Start layout is applied by Group Policy or MDM, and the policy is removed 4. Save the file and apply using any of the deployment methods. > [!NOTE] -> Office 2019 tiles might be removed removed from the Start menu when you upgrade Office 2019. This only occurs if Office 2019 app tiles are in a custom group on Start and only contains the Office 2019 app tiles. To avoid this problem, place another app tile in the Office 2019 group prior to the upgrade. For example: Notepad.exe or calc.exe in the group. This issue occurs because Office 2019 removes and reinstalls the apps when they are upgraded. Start removes empty groups when it detects that all apps for that group have been removed. +> Office 2019 tiles might be removed from the Start menu when you upgrade Office 2019. This only occurs if Office 2019 app tiles are in a custom group in the Start menu and only contains the Office 2019 app tiles. To avoid this problem, place another app tile in the Office 2019 group prior to the upgrade. For example, add Notepad.exe or calc.exe to the group. This issue occurs because Office 2019 removes and reinstalls the apps when they are upgraded. Start removes empty groups when it detects that all apps for that group have been removed. From 4913a3e7034176890195fd9287808693af51d3dc Mon Sep 17 00:00:00 2001 From: Pierre Audonnet Date: Fri, 5 Feb 2021 10:25:56 -0500 Subject: [PATCH 063/161] Update remote-credential-guard.md /remtoteGuard does not require to be a member of the local admintrators group of the source computer nor the target computer. There used to be a bug which was corrected (discussed with Andrew Wiley from Enterprise & Security SWE R&D) However, it does require the user to have some RDP permissions at the remote computer level. So I updated the note to reflect the real requirements. --- windows/security/identity-protection/remote-credential-guard.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/remote-credential-guard.md b/windows/security/identity-protection/remote-credential-guard.md index 0637c997cc..aadf69b704 100644 --- a/windows/security/identity-protection/remote-credential-guard.md +++ b/windows/security/identity-protection/remote-credential-guard.md @@ -181,7 +181,7 @@ mstsc.exe /remoteGuard ``` > [!NOTE] -> The user must be part of administrators group. +> The user must be authorized to connect to the remote server using Remote Desktop Protocol. For example, by being a member of the Remote Desktop Users local group on the remote computer. ## Considerations when using Windows Defender Remote Credential Guard From deec393d77ea8696fe861b2313117f313499a1c5 Mon Sep 17 00:00:00 2001 From: Inanimis <32716793+Quod-Heros-Tempus@users.noreply.github.com> Date: Sat, 6 Feb 2021 01:35:10 -0600 Subject: [PATCH 064/161] Fixed typo come > some Fixed a typo on line 56, changing come > some. --- .../prepare-for-windows-deployment-with-mdt.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md b/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md index c4445493e4..09afd0edb5 100644 --- a/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md +++ b/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md @@ -53,7 +53,7 @@ Several client computers are referenced in this guide with hostnames of PC0001 t ### Storage requirements -MDT01 and HV01 should have the ability to store up to 200 GB of files on a data drive (D:). If you use a computer with a single system partition (C:) you will need to adjust come procedures in this guide to specify the C: drive instead of the D: drive. +MDT01 and HV01 should have the ability to store up to 200 GB of files on a data drive (D:). If you use a computer with a single system partition (C:) you will need to adjust some procedures in this guide to specify the C: drive instead of the D: drive. ### Hyper-V requirements @@ -259,4 +259,4 @@ When you have completed all the steps in this section to prepare for deployment, The following sample files are also available to help automate some MDT deployment tasks. This guide does not use these files, but they are made available here so that you can see how some tasks can be automated with Windows PowerShell. - [Gather.ps1](https://go.microsoft.com/fwlink/p/?LinkId=619361). This sample Windows PowerShell script performs the MDT Gather process in a simulated MDT environment. This allows you to test the MDT gather process and check to see if it is working correctly without performing a full Windows deployment. - [Set-OUPermissions.ps1](https://go.microsoft.com/fwlink/p/?LinkId=619362). This sample Windows PowerShell script creates a domain account and then configures OU permissions to allow the account to join machines to the domain in the specified OU. -- [MDTSample.zip](https://go.microsoft.com/fwlink/p/?LinkId=619363). This sample web service shows you how to configure a computer name dynamically using MDT. \ No newline at end of file +- [MDTSample.zip](https://go.microsoft.com/fwlink/p/?LinkId=619363). This sample web service shows you how to configure a computer name dynamically using MDT. From ff59e8594d342cb919547a8654f9737569321f56 Mon Sep 17 00:00:00 2001 From: Pierre Audonnet Date: Sat, 6 Feb 2021 14:22:59 -0500 Subject: [PATCH 065/161] Update windows/security/identity-protection/remote-credential-guard.md Improve readability. Co-authored-by: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- windows/security/identity-protection/remote-credential-guard.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/remote-credential-guard.md b/windows/security/identity-protection/remote-credential-guard.md index aadf69b704..d3fb9810b8 100644 --- a/windows/security/identity-protection/remote-credential-guard.md +++ b/windows/security/identity-protection/remote-credential-guard.md @@ -181,7 +181,7 @@ mstsc.exe /remoteGuard ``` > [!NOTE] -> The user must be authorized to connect to the remote server using Remote Desktop Protocol. For example, by being a member of the Remote Desktop Users local group on the remote computer. +> The user must be authorized to connect to the remote server using Remote Desktop Protocol, for example by being a member of the Remote Desktop Users local group on the remote computer. ## Considerations when using Windows Defender Remote Credential Guard From d70609adfaa24d0bcea63bc9b729457e911522b8 Mon Sep 17 00:00:00 2001 From: Inanimis <32716793+Quod-Heros-Tempus@users.noreply.github.com> Date: Sun, 7 Feb 2021 00:48:44 -0600 Subject: [PATCH 066/161] Update windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md Co-authored-by: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- .../prepare-for-windows-deployment-with-mdt.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md b/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md index 09afd0edb5..82f909de0b 100644 --- a/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md +++ b/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md @@ -53,7 +53,7 @@ Several client computers are referenced in this guide with hostnames of PC0001 t ### Storage requirements -MDT01 and HV01 should have the ability to store up to 200 GB of files on a data drive (D:). If you use a computer with a single system partition (C:) you will need to adjust some procedures in this guide to specify the C: drive instead of the D: drive. +MDT01 and HV01 should have the ability to store up to 200 GB of files on a data drive (D:). If you use a computer with a single system partition (C:), you will need to adjust some procedures in this guide to specify the C: drive instead of the D: drive. ### Hyper-V requirements From 61af14350a234fa0639ab2cbe0cdee48be60a71d Mon Sep 17 00:00:00 2001 From: Inanimis <32716793+Quod-Heros-Tempus@users.noreply.github.com> Date: Sun, 7 Feb 2021 00:48:51 -0600 Subject: [PATCH 067/161] Update windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md Co-authored-by: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- .../prepare-for-windows-deployment-with-mdt.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md b/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md index 82f909de0b..e2da8e687d 100644 --- a/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md +++ b/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md @@ -256,7 +256,7 @@ When you have completed all the steps in this section to prepare for deployment, **Sample files** -The following sample files are also available to help automate some MDT deployment tasks. This guide does not use these files, but they are made available here so that you can see how some tasks can be automated with Windows PowerShell. +The following sample files are also available to help automate some MDT deployment tasks. This guide does not use these files, but they are made available here so you can see how some tasks can be automated with Windows PowerShell. - [Gather.ps1](https://go.microsoft.com/fwlink/p/?LinkId=619361). This sample Windows PowerShell script performs the MDT Gather process in a simulated MDT environment. This allows you to test the MDT gather process and check to see if it is working correctly without performing a full Windows deployment. - [Set-OUPermissions.ps1](https://go.microsoft.com/fwlink/p/?LinkId=619362). This sample Windows PowerShell script creates a domain account and then configures OU permissions to allow the account to join machines to the domain in the specified OU. - [MDTSample.zip](https://go.microsoft.com/fwlink/p/?LinkId=619363). This sample web service shows you how to configure a computer name dynamically using MDT. From 51baad7ec46d7bce07a7347341e27891c5b529ec Mon Sep 17 00:00:00 2001 From: Bill Mcilhargey <19168174+computeronix@users.noreply.github.com> Date: Mon, 8 Feb 2021 11:58:20 -0500 Subject: [PATCH 068/161] note on per user licensing Add note on licensing for subscription activation; requires per user licensing and is not valid on per device based licenses --- windows/deployment/deploy-enterprise-licenses.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/deployment/deploy-enterprise-licenses.md b/windows/deployment/deploy-enterprise-licenses.md index d13e8feb57..2b174292d3 100644 --- a/windows/deployment/deploy-enterprise-licenses.md +++ b/windows/deployment/deploy-enterprise-licenses.md @@ -24,6 +24,7 @@ This topic describes how to deploy Windows 10 Enterprise E3 or E5 licenses with >* Windows 10 Enterprise Subscription Activation (EA or MPSA) requires Windows 10 Pro, version 1703 or later. >* Windows 10 Enterprise E3 in CSP requires Windows 10 Pro, version 1607 or later. >* Automatic, non-KMS activation requires Windows 10, version 1803 or later, on a device with a firmware-embedded activation key. +>* Requires Windows 10 Enterprise per user licensing, does not work on per device licensing. >[!IMPORTANT] >An issue has been identified where devices can lose activation status or be blocked from upgrading to Windows Enterprise if the device is not able to connect to Windows Update. A workaround is to ensure that devices do not have the REG_DWORD present HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\DoNotConnectToWindowsUpdateInternetLocations and set to 1. If this REG_DWORD is present, it must be set to 0. From e43717ce30ad2bc85620d281fc8a30cd9ab00f2c Mon Sep 17 00:00:00 2001 From: VLG17 <41186174+VLG17@users.noreply.github.com> Date: Tue, 9 Feb 2021 15:17:15 +0200 Subject: [PATCH 069/161] add note about premium connectors licensing https://github.com/MicrosoftDocs/windows-itpro-docs/issues/8616 --- .../microsoft-defender-atp/api-microsoft-flow.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md b/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md index 6daada5960..d59213e53b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md @@ -33,6 +33,9 @@ Microsoft Defender API has an official Flow Connector with many capabilities. ![Image of edit credentials](images/api-flow-0.png) +> [!NOTE] +> More details about premium connectors licensing prerequisites [here](https://docs.microsoft.com/en-us/power-automate/triggers-introduction#licensing-for-premium-connectors) + ## Usage example The following example demonstrates how to create a Flow that is triggered any time a new Alert occurs on your tenant. From 1afee0e2fcd0cd076ebe7f8abd0e31ec12c8add1 Mon Sep 17 00:00:00 2001 From: VLG17 <41186174+VLG17@users.noreply.github.com> Date: Wed, 10 Feb 2021 10:43:42 +0200 Subject: [PATCH 070/161] Update windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- .../impersonate-a-client-after-authentication.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md b/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md index 14ce26e99b..182a792244 100644 --- a/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md +++ b/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md @@ -105,7 +105,7 @@ On member servers, ensure that only the Administrators and Service groups (Local In most cases, this configuration has no impact. If you have installed optional components such as ASP.NET or IIS, you may need to assign the **Impersonate a client after authentication** user right to additional accounts that are required by those components, such as IUSR\_*<ComputerName>*, IIS\_WPG, ASP.NET, or IWAM\_*<ComputerName>*. -In IIS 7.0 and later, a built-in account (IUSR) replaces the IUSR_MachineName account. Additionally, a group that is named IIS_IUSRS replaces the IIS_WPG group. Because the IUSR account is a built-in account, the IUSR account no longer requires a password. The IUSR account resembles a network or local service account. For more details, see [Default permissions and user rights for IIS 7.0 and later](https://docs.microsoft.com/en-us/troubleshoot/iis/default-permissions-user-rights). +In IIS 7.0 and later, a built-in account (IUSR) replaces the IUSR_MachineName account. Additionally, a group that is named IIS_IUSRS replaces the IIS_WPG group. Because the IUSR account is a built-in account, the IUSR account no longer requires a password. The IUSR account resembles a network or local service account. For more details, see [Default permissions and user rights for IIS 7.0 and later](https://docs.microsoft.com/troubleshoot/iis/default-permissions-user-rights). ## Related topics From 5ed7fd9c2634305429fbafaf75b65df180d73154 Mon Sep 17 00:00:00 2001 From: VLG17 <41186174+VLG17@users.noreply.github.com> Date: Wed, 10 Feb 2021 10:44:15 +0200 Subject: [PATCH 071/161] Update windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- .../microsoft-defender-atp/api-microsoft-flow.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md b/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md index d59213e53b..ac1cc1109c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md @@ -34,7 +34,7 @@ Microsoft Defender API has an official Flow Connector with many capabilities. ![Image of edit credentials](images/api-flow-0.png) > [!NOTE] -> More details about premium connectors licensing prerequisites [here](https://docs.microsoft.com/en-us/power-automate/triggers-introduction#licensing-for-premium-connectors) +> For more details about premium connectors licensing prerequisites, see [Licensing for premium connectors](https://docs.microsoft.com/power-automate/triggers-introduction#licensing-for-premium-connectors). ## Usage example From 93e08dc071578b00235d49f7609b89d969b50607 Mon Sep 17 00:00:00 2001 From: Tina McNaboe <53281468+TinaMcN@users.noreply.github.com> Date: Wed, 10 Feb 2021 16:52:11 -0800 Subject: [PATCH 072/161] Update prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md tags are not valid in markdown and are probably leftover from migrating this content. This is causing a problem with the localized files. According to the markdown guidelines To format text as bold, enclose it in two asterisks This text is **bold**. https://review.docs.microsoft.com/en-us/help/contribute/markdown-reference?branch=master --- ...uch-installation-of-windows-10-with-configuration-manager.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md b/windows/deployment/deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md index 348d4fd07c..66c81b0a5b 100644 --- a/windows/deployment/deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md +++ b/windows/deployment/deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md @@ -77,7 +77,7 @@ ForEach($entry in $oulist){ } ``` -Next, copy the following list of OU names and paths into a text file and save it as C:\Setup\Scripts\oulist.txt +Next, copy the following list of OU names and paths into a text file and save it as **C:\Setup\Scripts\oulist.txt** ```text OUName,OUPath From d0b43483999f4d6f8f5c8d57bee3609f3f6ebc47 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Thu, 11 Feb 2021 14:15:03 +0530 Subject: [PATCH 073/161] removed invalid link added correct link as per the user report issue# 9106. so I removed invalid link and added correct link. **https://docs.microsoft.com/troubleshoot/windows-server/windows-security/enabling-smart-card-logon-third-party-certification-authorities** --- .../hello-for-business/hello-deployment-issues.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-deployment-issues.md b/windows/security/identity-protection/hello-for-business/hello-deployment-issues.md index 2c22e05685..178932ec34 100644 --- a/windows/security/identity-protection/hello-for-business/hello-deployment-issues.md +++ b/windows/security/identity-protection/hello-for-business/hello-deployment-issues.md @@ -55,7 +55,7 @@ Applies to: Windows Hello for Business uses smart card based authentication for many operations. Smart card has special guidelines when using a third-party CA for certificate issuance, some of which apply to the domain controllers. Not all Windows Hello for Business deployment types require these configurations. Accessing on-premises resources from an Azure AD Joined device does require special configuration when using a third-party CA to issue domain controller certificates. For more information, read [Guidelines for enabling smart card logon with third-party certification authorities]( -https://support.microsoft.com/topic/a34a400a-51d5-f2a1-c8c0-7a6c9c49cb78). +https://docs.microsoft.com/troubleshoot/windows-server/windows-security/enabling-smart-card-logon-third-party-certification-authorities). ### Identifying On-premises Resource Access Issues with Third-Party CAs From fcbf1cdc170855afd28bf3c0df7363e582f42ba0 Mon Sep 17 00:00:00 2001 From: Anders Ahl <58516456+GenerAhl@users.noreply.github.com> Date: Tue, 16 Feb 2021 19:07:08 +0100 Subject: [PATCH 074/161] Removing "Intune" from list of installation methods. Windows Server cannot be enrolled into Intune so calling out Intune as an installation mechanism is confusing. --- .../microsoft-defender-atp/configure-server-endpoints.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md b/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md index ebb9189935..bd3821562c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md @@ -157,7 +157,7 @@ You can onboard Windows Server (SAC) version 1803, Windows Server 2019, or Windo > [!NOTE] > - The Onboarding package for Windows Server 2019 through Microsoft Endpoint Manager currently ships a script. For more information on how to deploy scripts in Configuration Manager, see [Packages and programs in Configuration Manager](https://docs.microsoft.com/configmgr/apps/deploy-use/packages-and-programs). -> - A local script is suitable for a proof of concept but should not be used for production deployment. For a production deployment, we recommend using Group Policy, Microsoft Endpoint Configuration Manager, or Intune. +> - A local script is suitable for a proof of concept but should not be used for production deployment. For a production deployment, we recommend using Group Policy, or Microsoft Endpoint Configuration Manager. Support for Windows Server provides deeper insight into server activities, coverage for kernel and memory attack detection, and enables response actions. From 6767be310d6300de5ddf7ab5f11c3b10ec619305 Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Tue, 16 Feb 2021 11:40:28 -0800 Subject: [PATCH 075/161] Update ios-terms.md --- .../threat-protection/microsoft-defender-atp/ios-terms.md | 6 ------ 1 file changed, 6 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/ios-terms.md b/windows/security/threat-protection/microsoft-defender-atp/ios-terms.md index 3f8377cefd..91470a29b7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/ios-terms.md +++ b/windows/security/threat-protection/microsoft-defender-atp/ios-terms.md @@ -26,12 +26,6 @@ ms.technology: mde [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -**Applies to:** -- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) - -> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-investigateip-abovefoldlink) - ## MICROSOFT APPLICATION LICENSE TERMS: MICROSOFT DEFENDER FOR ENDPOINT These license terms ("Terms") are an agreement between Microsoft Corporation (or From 9dcef5091551fcbe64e0158a4c57c0cf8b8f1d20 Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Tue, 16 Feb 2021 11:49:32 -0800 Subject: [PATCH 076/161] Update ios-terms.md --- .../threat-protection/microsoft-defender-atp/ios-terms.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/microsoft-defender-atp/ios-terms.md b/windows/security/threat-protection/microsoft-defender-atp/ios-terms.md index 91470a29b7..aa2cb53ec8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/ios-terms.md +++ b/windows/security/threat-protection/microsoft-defender-atp/ios-terms.md @@ -26,6 +26,7 @@ ms.technology: mde [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] + ## MICROSOFT APPLICATION LICENSE TERMS: MICROSOFT DEFENDER FOR ENDPOINT These license terms ("Terms") are an agreement between Microsoft Corporation (or From 46d09cb951ca2cde417a9072cda57a6a7223c20e Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Tue, 16 Feb 2021 11:55:47 -0800 Subject: [PATCH 077/161] close bracket --- .../threat-protection/microsoft-defender-atp/isolate-machine.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md b/windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md index a052275ba6..a8a4b7a434 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md +++ b/windows/security/threat-protection/microsoft-defender-atp/isolate-machine.md @@ -31,7 +31,7 @@ ms.technology: mde [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] -[!include[Improve request performance](../../includes/improve-request-performance.md) +[!include[Improve request performance](../../includes/improve-request-performance.md)] ## API description From b6a539cc3c029b0ee98d39aa8c4bfca60e7ab9bf Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Tue, 16 Feb 2021 11:58:53 -0800 Subject: [PATCH 078/161] fix note indent --- .../threat-protection/microsoft-defender-atp/ios-install.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/ios-install.md b/windows/security/threat-protection/microsoft-defender-atp/ios-install.md index 3c76749068..d02a9b3d4a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/ios-install.md +++ b/windows/security/threat-protection/microsoft-defender-atp/ios-install.md @@ -94,8 +94,8 @@ The Microsoft Defender for Endpoint for iOS app has specialized ability on super Intune allows you to configure the Defender for iOS app through an App Configuration policy. - > [!NOTE] - > This app configuration policy for supervised devices is applicable only to managed devices and should be targeted for all managed iOS devices as a best practice. + > [!NOTE] + > This app configuration policy for supervised devices is applicable only to managed devices and should be targeted for all managed iOS devices as a best practice. 1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and go to **Apps** > **App configuration policies** > **Add**. Click on **Managed devices**. From b0f330630fc07549c6a0b3374911e53d9a910ec5 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Tue, 16 Feb 2021 12:18:53 -0800 Subject: [PATCH 079/161] add white shark image --- .../images/white-shark.png | Bin 0 -> 2874 bytes 1 file changed, 0 insertions(+), 0 deletions(-) create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/white-shark.png diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/white-shark.png b/windows/security/threat-protection/microsoft-defender-atp/images/white-shark.png new file mode 100644 index 0000000000000000000000000000000000000000..ac5c199599c4d6f797957412107f49d827e68269 GIT binary patch literal 2874 zcmbW3i93|t8^<3aGh|H^V;LES$`VOK*0BtlQr41W8Ai;QF_ux;mn1@@Vp7wHtQ8W% z$ZN?`S*C~~%P3nIk_!DEz1Qy_c(3c6=UnG=?&nFF|&KUy4nsHrPOetX+cvKnk&4c`&Dymp~{$!JM!V;P8q`ii?PL!dZWjg$uZWKsG{!+5f z#cfkX3O>*WIPyaj3XVXxN6rv&l(36rAK-k@pKWuYzmwyGy#g+RrevUoS#=Y{kZtUI zkxal7d;zBHbP~t}{{26M?BxS|{}VU&e=~DpV4x3y0<3l4ZUWiPZ8HZvCBO$L`qrlk z`pJ($n>vK&EzmC5?LH^p-o&p-SCZS4WvpJA@sv-hOc$A*f_>yRRSdmn5_Dt~_tB58 zTxzuUd%`dJa`Sn4w@C%3`s7@{dn3buXisZAy!n#-0p%k2)80;Z|MN~3mFn=%LjvEr zv42d@okg`@HhRN{`qI6)fit4%MCt4JLEwD59B+v&^6k}WQMLzep?Oxa6zUe)sm}5@ zfB@Yro}~=NL63i=IU+4}27(@$$Y=~5P)X*!qx@exOro{)2|GKx2PGv!i(^ec?g1tx ztj;r`p?Vb5`Mkg(&9_zv1YtqIEF=?nK&LAa z0*NCpwF!X&=GmDxwziWWUdSMxa3u{#gx<}4tnea}B@P`rxJn?y68{xgX64NzI zgoK3R+KRyKSF?0Yl%8ZC*6IQ03%5E-~iz{_@ zb=_B0T2&=kTU*<&(G9@vf~mj}+(d0h-TO!&mc{A8?E}RwEK2LeUI*G@=!csq6?K zJTU7Eqo(w3tu!s)jM_R{Op40Sja}qQSslS0JhiEfnV9&9?>Mok?!Wwj5t+~wSypb0 z;fs^OxSi(RdVx6Zzg$kl2;`vKXZtfangMU^+Qt%wQl3L*2J`O15^hZIELP@W#=L6v z`&4ysf|I+et4Lo&?IBhI(A~hMH0^yY{oS|au&yNDE8RZe;b{qA0m6yoQ6cRQ85a({ukwarybT zmaU!qq>h6Tr!=9!VJVe~-$bX+o~|-d-TfZThQb=R3&xX(PKv>BIrHSgxa$TY56M+p zdoD-nR9jtzl9d~g7-kN_Y9i(9w?+yWck7O}&(D@=ryMslgjKr)E6w!e9wo_T%Row4 z*9%YPw<*6sULS0ViW->cNoIg!kLv3U{A!Wcxl;zlQrGC$K7IOhr&UiT)jsu@YUX`I z>R~UrN4?i{eBT0qq5R1K=PaB@2L=WPp=dyK zTbt!eHo>hv^u*SDeIDA>l*ixSUlGDo<0N!*nwJT4STpE9y#{W)w$E(+8`jrdCu|)>`aX!aF@T?DT+p=-i9-9$8u0 zmY*wMIPW?GB_x_HPhi`JDt)1Vr(P};9)G6?mwE4=P3XcW3kaN1UCk}a$BlwWC)+BV#S4~+ryL8(F*LaI6M|Y{mDfPHC{E~F-cP}HVWJCQlKizXlS3Iy!Oyy&QK=$3r}*dj1|gu z4CvG;#&@uXH-G<#d(q$9%VP#Xp-_Oy=z%O!H%La`kv(_EPNl*H zSXy890+^sI4V|&o2uSROUCA*qJOeCNGoi*SC`e3N!wphb-Y@=)0j3dS453Dr&1QpJ z-qG1NR=P`*~@+1zw}Ar4`NT z%IWIz*Of7hSVfi^{#YEl3915#jRsfnsI2TzDF>m1QbDMwc=kU&@si9Dgoy}@5NfW- zQT}XQ)u&;VYIb(EK4~KUWSt!0dZm9wDp}O%^u9`1I|HVJ^PDlul1_+KG!f$~b*)tS z+Da$K0cT_f!ZeW@8i~yw=}j)?Bh}P+fQreC z#Wvoprtuvtd_Vwr#$(0;bEl_qlG4(@X|Vz=HSC4q8n3O5pQgdw9=NJ%`{I#forEK& zZk+N=N=ZawG2lJw^C#RMfjnO{owj4YzMTZW^1VGY&eFR-uR9$}T15H=2IBkrPJ>4o z5)0&X@!Lyggw%^}B3>JKi2 z>cd2q3~x?NJsD@}rm;PX=Q98RBhgJmT0%lX zOIJ7Exx#%M6yW^~<>~N3M@L8c3h(351G*@b;QcS0z4AA$(k7R~nIssvu|`o_H^6B1 zt3EqY7h>x!im!e4OnY^04fMid^-6Z1g~OV1+T^QIgz9xAODii58PAD%^5ZQSi*Pa`-leF&InG&C?&(*nUI5<1UeW6ktB^TNCVeTOXIpIMtf%{*22L>cpTje{i z6zIn)g6qCWp-7%BlbW2I^z-+RedC>(ud>>cI{EUw-h?jNBD3mQ0lJ{U>{ADe#p3$T z6k-d_iA2p06&Exs?pQwJ0cz8@vK^$nk0FT;Ig|R^xk#Ha$Q(!!h!eL?Bg#t5eJHyX z~0GY_N)hLvs9D7)j>8 zk0emZ|I%4cm6~k~J1S4rdfa?zM9!S{^jq5YQ)*q|n~l5qWlf*$M<;->z@p2|JYxR` D6Bsi3 literal 0 HcmV?d00001 From c383d608bbfddb4718d3ac383b8b20ed272d8dfe Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Tue, 16 Feb 2021 12:19:46 -0800 Subject: [PATCH 080/161] add line --- .../threat-protection/microsoft-defender-atp/mssp-list.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mssp-list.md b/windows/security/threat-protection/microsoft-defender-atp/mssp-list.md index d3a673d14b..d544ff9f9e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mssp-list.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mssp-list.md @@ -38,6 +38,7 @@ Logo |Partner name | Description ![Image of SecureWorks Managed Detection and Response Powered by Red Cloak logo](images/secureworks-logo.png)| [SecureWorks Managed Detection and Response Powered by Red Cloak](https://go.microsoft.com/fwlink/?linkid=2133634) | Secureworks combines threat intelligence and 20+ years of experience into SaaS and managed security solutions ![Image of sepagoSOC logo](images/sepago-logo.png)| [sepagoSOC](https://go.microsoft.com/fwlink/?linkid=2090491) | Ensure holistic security through sophisticated automated workflows in your zero trust environment ![Image of Trustwave Threat Detection & Response Services logo](images/trustwave-logo.png)| [Trustwave Threat Detection & Response Services](https://go.microsoft.com/fwlink/?linkid=2127542) | Threat Detection and Response services for Azure leveraging integrations with Sentinel and Defender for Endpoint +![Image of White Shark Managed Security Services]() ![Image of Wortell's cloud SOC logo](images/wortell-logo.png)| [Wortell's cloud SOC](https://go.microsoft.com/fwlink/?linkid=2108415) | 24x7 managed Defender for Endpoint service for monitoring & response ![Image of Zero Trust Analytics Platform (ZTAP) logo](images/ztap-logo.png)| [Zero Trust Analytics Platform (ZTAP)](https://go.microsoft.com/fwlink/?linkid=2090971) | Reduce your alerts by 99% and access a full range of security capabilities from mobile devices From c70d169ac3d7714f94bd58ec3bb6fe04b4165fa1 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Tue, 16 Feb 2021 12:21:51 -0800 Subject: [PATCH 081/161] add white shark --- .../threat-protection/microsoft-defender-atp/mssp-list.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mssp-list.md b/windows/security/threat-protection/microsoft-defender-atp/mssp-list.md index d544ff9f9e..fba0f03552 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mssp-list.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mssp-list.md @@ -38,7 +38,7 @@ Logo |Partner name | Description ![Image of SecureWorks Managed Detection and Response Powered by Red Cloak logo](images/secureworks-logo.png)| [SecureWorks Managed Detection and Response Powered by Red Cloak](https://go.microsoft.com/fwlink/?linkid=2133634) | Secureworks combines threat intelligence and 20+ years of experience into SaaS and managed security solutions ![Image of sepagoSOC logo](images/sepago-logo.png)| [sepagoSOC](https://go.microsoft.com/fwlink/?linkid=2090491) | Ensure holistic security through sophisticated automated workflows in your zero trust environment ![Image of Trustwave Threat Detection & Response Services logo](images/trustwave-logo.png)| [Trustwave Threat Detection & Response Services](https://go.microsoft.com/fwlink/?linkid=2127542) | Threat Detection and Response services for Azure leveraging integrations with Sentinel and Defender for Endpoint -![Image of White Shark Managed Security Services]() +![Image of White Shark Managed Security Services](images/white-shark.png)| [White Shark Managed Security Services](https://go.microsoft.com/fwlink/?linkid=2154210) |True expert approach to cyber security with transparent pricing on every platform, mobile included. ![Image of Wortell's cloud SOC logo](images/wortell-logo.png)| [Wortell's cloud SOC](https://go.microsoft.com/fwlink/?linkid=2108415) | 24x7 managed Defender for Endpoint service for monitoring & response ![Image of Zero Trust Analytics Platform (ZTAP) logo](images/ztap-logo.png)| [Zero Trust Analytics Platform (ZTAP)](https://go.microsoft.com/fwlink/?linkid=2090971) | Reduce your alerts by 99% and access a full range of security capabilities from mobile devices From fa8337bc64246e08f058e6c2059ed801f81f02ca Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Tue, 16 Feb 2021 12:37:07 -0800 Subject: [PATCH 082/161] add sentence --- .../threat-protection/microsoft-defender-atp/mssp-list.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mssp-list.md b/windows/security/threat-protection/microsoft-defender-atp/mssp-list.md index fba0f03552..46d7022fa6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mssp-list.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mssp-list.md @@ -24,6 +24,8 @@ ms.technology: mde - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037) +The following managed security service providers can be accessed through the portal. + Logo |Partner name | Description :---|:---|:--- ![Image of BDO Digital logo](images/bdo-logo.png)| [BDO Digital](https://go.microsoft.com/fwlink/?linkid=2090394) | BDO Digital's Managed Defense leverages best practice tools, AI, and in-house security experts for 24/7/365 identity protection From 7b7ea02457fa36af150114064a98c72849178e1e Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Tue, 16 Feb 2021 12:41:44 -0800 Subject: [PATCH 083/161] Update prevent-changes-to-security-settings-with-tamper-protection.md --- ...ecurity-settings-with-tamper-protection.md | 32 ++++++++----------- 1 file changed, 14 insertions(+), 18 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md index a4354b5403..a4354fac1c 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md @@ -14,7 +14,7 @@ audience: ITPro author: denisebmsft ms.author: deniseb ms.custom: nextgen -ms.date: 01/07/2021 +ms.date: 02/16/2021 ms.technology: mde --- @@ -93,32 +93,28 @@ If you are a home user, or you are not subject to settings managed by a security If you are part of your organization's security team, and your subscription includes [Intune](https://docs.microsoft.com/intune/fundamentals/what-is-intune), you can turn tamper protection on (or off) for your organization in the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com) portal. -You must have appropriate [permissions](../microsoft-defender-atp/assign-portal-access.md), such as global admin, security admin, or security operations, to perform the following task. +### Prerequisites -1. Make sure your organization meets all of the following requirements to use Intune to manage tamper protection: +Before you begin, make sure that all of the following requirements are met: - - Your organization uses [Intune to manage devices](https://docs.microsoft.com/intune/fundamentals/what-is-device-management). ([Intune licenses](https://docs.microsoft.com/intune/fundamentals/licenses) are required; Intune is included in Microsoft 365 E5.) - - Your Windows machines must be running Windows 10 OS [1709](https://docs.microsoft.com/windows/release-health/status-windows-10-1709), [1803](https://docs.microsoft.com/windows/release-health/status-windows-10-1803), [1809](https://docs.microsoft.com/windows/release-health/status-windows-10-1809-and-windows-server-2019) or later. (For more information about releases, see [Windows 10 release information](https://docs.microsoft.com/windows/release-health/release-information).) - - You must be using Windows security with [security intelligence](https://www.microsoft.com/wdsi/definitions) updated to version 1.287.60.0 (or above). - - Your machines must be using anti-malware platform version 4.18.1906.3 (or above) and anti-malware engine version 1.1.15500.X (or above). ([Manage Microsoft Defender Antivirus updates and apply baselines](manage-updates-baselines-microsoft-defender-antivirus.md).) +- You must have appropriate [permissions](../microsoft-defender-atp/assign-portal-access.md), such as global admin, security admin, or security operations. +- Your organization uses [Intune to manage devices](https://docs.microsoft.com/intune/fundamentals/what-is-device-management). ([Intune licenses](https://docs.microsoft.com/intune/fundamentals/licenses) are required; Intune is included in Microsoft 365 E5.) +- Your Windows machines must be running Windows 10 OS [1709](https://docs.microsoft.com/windows/release-health/status-windows-10-1709), [1803](https://docs.microsoft.com/windows/release-health/status-windows-10-1803), [1809](https://docs.microsoft.com/windows/release-health/status-windows-10-1809-and-windows-server-2019) or later. (For more information about releases, see [Windows 10 release information](https://docs.microsoft.com/windows/release-health/release-information).) +- You must be using Windows security with [security intelligence](https://www.microsoft.com/wdsi/definitions) updated to version 1.287.60.0 (or above). +- Your machines must be using anti-malware platform version 4.18.1906.3 (or above) and anti-malware engine version 1.1.15500.X (or above). ([Manage Microsoft Defender Antivirus updates and apply baselines](manage-updates-baselines-microsoft-defender-antivirus.md).) -2. Go to the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com) and sign in with your work or school account. +### Turn tamper protection on (or off) in Intune -3. Select **Devices** > **Configuration Profiles**. - -4. Create a profile that includes the following settings: +![Turn tamper protection on with Intune](images/turnontamperprotect-MEM.png) +1. Go to the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com) and sign in with your work or school account. +2. Select **Devices** > **Configuration Profiles**. +3. Create a profile that includes the following settings: - **Platform: Windows 10 and later** - - **Profile type: Endpoint protection** - - **Category: Microsoft Defender Security Center** - - **Tamper Protection: Enabled** - - ![Turn tamper protection on with Intune](images/turnontamperprotect-MEM.png) - -5. Assign the profile to one or more groups. +4. Assign the profile to one or more groups. ### Are you using Windows OS 1709, 1803, or 1809? From 9c48461d03c697318939897af63a04e0513f08f3 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Tue, 16 Feb 2021 12:44:51 -0800 Subject: [PATCH 084/161] Update prevent-changes-to-security-settings-with-tamper-protection.md --- ...s-to-security-settings-with-tamper-protection.md | 13 ++----------- 1 file changed, 2 insertions(+), 11 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md index a4354fac1c..ab3f0c575e 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md @@ -123,9 +123,7 @@ If you are using Windows 10 OS [1709](https://docs.microsoft.com/windows/release #### Use PowerShell to determine whether tamper protection is turned on 1. Open the Windows PowerShell app. - 2. Use the [Get-MpComputerStatus](https://docs.microsoft.com/powershell/module/defender/get-mpcomputerstatus?view=win10-ps&preserve-view=true) PowerShell cmdlet. - 3. In the list of results, look for `IsTamperProtected`. (A value of *true* means tamper protection is enabled.) ## Manage tamper protection with Configuration Manager, version 2006 @@ -135,24 +133,17 @@ If you are using Windows 10 OS [1709](https://docs.microsoft.com/windows/release If you're using [version 2006 of Configuration Manager](https://docs.microsoft.com/mem/configmgr/core/plan-design/changes/whats-new-in-version-2006), you can manage tamper protection settings on Windows 10, Windows Server 2016, and Windows Server 2019 by using a method called *tenant attach*. Tenant attach enables you to sync your on-premises-only Configuration Manager devices into the Microsoft Endpoint Manager admin center, and then deliver your endpoint security configuration policies to your on-premises collections & devices. +:::image type="content" source="images/win-security- exp-policy-endpt-security.png" alt-text="Windows security experience in Endpoint Manager"::: + 1. Set up tenant attach. See [Microsoft Endpoint Manager tenant attach: Device sync and device actions](https://docs.microsoft.com/mem/configmgr/tenant-attach/device-sync-actions). - 2. In the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Endpoint security** > **Antivirus**, and choose **+ Create Policy**.
- - In the **Platform** list, select **Windows 10 and Windows Server (ConfigMgr)**. - - In the **Profile** list, select **Windows Security experience (preview)**.
- - The following screenshot illustrates how to create your policy: - - :::image type="content" source="images/win-security- exp-policy-endpt-security.png" alt-text="Windows security experience in Endpoint Manager"::: - 3. Deploy the policy to your device collection. Need help? See the following resources: - [Settings for the Windows Security experience profile in Microsoft Intune](https://docs.microsoft.com/mem/intune/protect/antivirus-security-experience-windows-settings) - - [Tech Community Blog: Announcing Tamper Protection for Configuration Manager Tenant Attach clients](https://techcommunity.microsoft.com/t5/microsoft-endpoint-manager-blog/announcing-tamper-protection-for-configuration-manager-tenant/ba-p/1700246#.X3QLR5Ziqq8.linkedin) From afe522d54941bb0f10e0c0f52b3d90f2c95f4fed Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Tue, 16 Feb 2021 12:45:57 -0800 Subject: [PATCH 085/161] Update prevent-changes-to-security-settings-with-tamper-protection.md --- ...changes-to-security-settings-with-tamper-protection.md | 8 +++----- 1 file changed, 3 insertions(+), 5 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md index ab3f0c575e..503295678a 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md @@ -235,8 +235,6 @@ In addition, your security operations team can use hunting queries, such as the ## See also -[Help secure Windows PCs with Endpoint Protection for Microsoft Intune](https://docs.microsoft.com/intune/help-secure-windows-pcs-with-endpoint-protection-for-microsoft-intune) - -[Get an overview of Microsoft Defender for Endpoint](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp) - -[Better together: Microsoft Defender Antivirus and Microsoft Defender for Endpoint](why-use-microsoft-defender-antivirus.md) +- [Help secure Windows PCs with Endpoint Protection for Microsoft Intune](https://docs.microsoft.com/intune/help-secure-windows-pcs-with-endpoint-protection-for-microsoft-intune) +- [Get an overview of Microsoft Defender for Endpoint](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp) +- [Better together: Microsoft Defender Antivirus and Microsoft Defender for Endpoint](why-use-microsoft-defender-antivirus.md) From 4e58545358194d63602faa078fc5a4b9bf315fb6 Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Tue, 16 Feb 2021 12:58:48 -0800 Subject: [PATCH 086/161] Update delete-ti-indicator-by-id.md --- .../microsoft-defender-atp/delete-ti-indicator-by-id.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id.md index deac1f5953..82e098b761 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id.md @@ -29,7 +29,7 @@ ms.technology: mde [!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)] -[!include[Improve request performance](../../includes/improve-request-performance.md) +[!include[Improve request performance](../../includes/improve-request-performance.md)] ## API description From c40a2e7c61c5ed467a7398f8e45cc9eb763599b6 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Tue, 16 Feb 2021 13:07:50 -0800 Subject: [PATCH 087/161] Update prevent-changes-to-security-settings-with-tamper-protection.md --- ...ecurity-settings-with-tamper-protection.md | 20 +++++++++---------- 1 file changed, 9 insertions(+), 11 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md index 503295678a..80e3c1dda4 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md @@ -57,16 +57,15 @@ Tamper protection doesn't prevent you from viewing your security settings. And, ### What do you want to do? -1. Turn tamper protection on
- - [For an individual machine, use Windows Security](#turn-tamper-protection-on-or-off-for-an-individual-machine). - - [For your organization, use Intune](#turn-tamper-protection-on-or-off-for-your-organization-using-intune). - - [Use tenant attach with Configuration Manager, version 2006, for devices running Windows 10 or Windows Server 2019](#manage-tamper-protection-with-configuration-manager-version-2006) - -2. [View information about tampering attempts](#view-information-about-tampering-attempts). - -3. [Review your security recommendations](#review-your-security-recommendations). - -4. [Browse the frequently asked questions](#view-information-about-tampering-attempts). +| Task | Link | +|:---|:---| +| Turn tamper protection on for an individual device | [Use the Windows Security app](#turn-tamper-protection-on-or-off-for-an-individual-machine) | +| Turn tamper protection on for your organization | [Use Intune](#turn-tamper-protection-on-or-off-for-your-organization-using-intune) | +| Turn tamper protection on for devices running Windows 10 and Windows Server 2019 with Configuration Manager | [Use tenant attach with Configuration Manager, version 2006](#manage-tamper-protection-with-configuration-manager-version-2006) | +| Turn tamper protection on in the Microsoft Defender Security Center | | +| View details about tampering attempts on devices | [View information about tampering attempts](#view-information-about-tampering-attempts) | +| Review your security recommendations | [Review security recommendations](#review-your-security-recommendations) | +| Review the list of frequently asked questions (FAQs) | [Browse the FAQs](#view-information-about-tampering-attempts) | ## Turn tamper protection on (or off) for an individual machine @@ -146,7 +145,6 @@ Need help? See the following resources: - [Settings for the Windows Security experience profile in Microsoft Intune](https://docs.microsoft.com/mem/intune/protect/antivirus-security-experience-windows-settings) - [Tech Community Blog: Announcing Tamper Protection for Configuration Manager Tenant Attach clients](https://techcommunity.microsoft.com/t5/microsoft-endpoint-manager-blog/announcing-tamper-protection-for-configuration-manager-tenant/ba-p/1700246#.X3QLR5Ziqq8.linkedin) - ## View information about tampering attempts Tampering attempts typically indicate bigger cyberattacks. Bad actors try to change security settings as a way to persist and stay undetected. If you're part of your organization's security team, you can view information about such attempts, and then take appropriate actions to mitigate threats. From 57ceb89b659c50facec08994ad70fad60e063987 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Tue, 16 Feb 2021 13:16:38 -0800 Subject: [PATCH 088/161] Update defender-endpoint-false-positives-negatives.md --- .../defender-endpoint-false-positives-negatives.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/defender-endpoint-false-positives-negatives.md b/windows/security/threat-protection/microsoft-defender-atp/defender-endpoint-false-positives-negatives.md index 78039bd903..2016a7df22 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/defender-endpoint-false-positives-negatives.md +++ b/windows/security/threat-protection/microsoft-defender-atp/defender-endpoint-false-positives-negatives.md @@ -17,7 +17,9 @@ manager: dansimp audience: ITPro ms.collection: - m365-security-compliance -- m365initiative-defender-endpoint +- m365initiative-defender-endpoint +- m365solution-scenario +- m365scenario-fpfn ms.topic: conceptual ms.reviewer: ramarom, evaldm, isco, mabraitm, chriggs, yonghree, jcedola ms.custom: FPFN From e0527cc5f46137a319765b49e676fff1182eaf24 Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Tue, 16 Feb 2021 13:22:27 -0800 Subject: [PATCH 089/161] Update common-errors.md Acrolinx --- .../microsoft-defender-atp/common-errors.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/common-errors.md b/windows/security/threat-protection/microsoft-defender-atp/common-errors.md index 45c2995008..60e31e7900 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/common-errors.md +++ b/windows/security/threat-protection/microsoft-defender-atp/common-errors.md @@ -23,10 +23,10 @@ ms.technology: mde >Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink) -* The error codes listed in the following table may be returned by an operation on any of Microsoft Defender for Endpoint APIs. -* Note that in addition to the error code, every error response contains an error message which can help resolving the problem. +* The table below shows the error codes that may be returned by an operation from the Microsoft Defender for Endpoint APIs. +* In addition to the error code, every error response contains an error message that can help describe the problem. * Note that the message is a free text that can be changed. -* At the bottom of the page you can find response examples. +* At the bottom of the page, you can find response examples. Error code |HTTP status code |Message :---|:---|:--- @@ -48,14 +48,14 @@ DisabledFeature | Forbidden (403) | Tenant feature is not enabled. DisallowedOperation | Forbidden (403) | {the disallowed operation and the reason}. NotFound | Not Found (404) | General Not Found error message. ResourceNotFound | Not Found (404) | Resource {the requested resource} was not found. -InternalServerError | Internal Server Error (500) | (No error message, try retry the operation or contact us if it does not resolved) +InternalServerError | Internal Server Error (500) | (No error message, retry the operation) TooManyRequests | Too Many Requests (429) | Response will represent reaching quota limit either by number of requests or by CPU. ## Body parameters are case-sensitive The submitted body parameters are currently case-sensitive.
If you experience an **InvalidRequestBody** or **MissingRequiredParameter** errors, it might be caused from a wrong parameter capital or lower-case letter. -
We recommend that you go to the requested API documentation page and check that the submitted parameters match the relevant example. +
Review the API documentation page and check that the submitted parameters match the relevant example. ## Correlation request ID From 7d2f53ea71895b140402b3eeb140fede57c75897 Mon Sep 17 00:00:00 2001 From: jaimeo Date: Tue, 16 Feb 2021 14:25:54 -0700 Subject: [PATCH 090/161] retiring article about Win10 IoT Mobile --- .openpublishing.redirection.json | 5 ++ windows/deployment/update/index.md | 1 - windows/deployment/update/waas-branchcache.md | 1 - .../deployment/update/waas-configure-wufb.md | 3 +- .../update/waas-delivery-optimization.md | 1 - ...aas-deployment-rings-windows-10-updates.md | 3 +- .../deployment/update/waas-integrate-wufb.md | 3 +- .../update/waas-manage-updates-wsus.md | 3 +- .../deployment/update/waas-mobile-updates.md | 77 ------------------- .../waas-optimize-windows-10-updates.md | 3 +- windows/deployment/update/waas-overview.md | 4 +- windows/deployment/update/waas-quick-start.md | 3 +- windows/deployment/update/waas-restart.md | 1 - ...s-servicing-channels-windows-10-updates.md | 3 +- ...s-servicing-strategy-windows-10-updates.md | 3 +- windows/deployment/update/waas-wu-settings.md | 1 - .../deployment/update/waas-wufb-csp-mdm.md | 3 +- .../update/waas-wufb-group-policy.md | 1 - windows/deployment/update/waas-wufb-intune.md | 3 +- 19 files changed, 16 insertions(+), 106 deletions(-) delete mode 100644 windows/deployment/update/waas-mobile-updates.md diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index f072b252df..76f303dc00 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -16530,6 +16530,11 @@ "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/defender-endpoint-false-positives-negatives", "redirect_document_id": true }, + { + "source_path": "windows/deployment/update/waas-mobile-updates.md", + "redirect_url": "https://docs.microsoft.com/windows/deployment/update/waas-configure-wufb", + "redirect_document_id": true + }, { "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md", "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-asr", diff --git a/windows/deployment/update/index.md b/windows/deployment/update/index.md index 236fb16910..8a080c9bcd 100644 --- a/windows/deployment/update/index.md +++ b/windows/deployment/update/index.md @@ -38,7 +38,6 @@ Windows as a service provides a new way to think about building, deploying, and | [Assign devices to servicing branches for Windows 10 updates](https://docs.microsoft.com/windows/deployment/update/waas-servicing-channels-windows-10-updates) | Explains how to assign devices to the Semi-Annual Channel for feature and quality updates, and how to enroll devices in Windows Insider. | | [Monitor Windows Updates with Update Compliance](update-compliance-monitor.md) | Explains how to use Update Compliance to monitor and manage Windows Updates on devices in your organization. | | [Optimize update delivery for Windows 10 updates](waas-optimize-windows-10-updates.md) | Explains the benefits of using Delivery Optimization or BranchCache for update distribution. | -| [Deploy updates for Windows 10 Mobile Enterprise and Windows 10 IoT Mobile](waas-mobile-updates.md) | Explains updates for Windows 10 Mobile Enterprise and Windows 10 IoT Mobile. | | [Deploy updates using Windows Update for Business](waas-manage-updates-wufb.md) | Explains how to use Windows Update for Business to manage when devices receive updates directly from Windows Update. Includes walkthroughs for configuring Windows Update for Business using Group Policy and Microsoft Intune. | | [Deploy Windows 10 updates using Windows Server Update Services (WSUS)](waas-manage-updates-wsus.md) | Explains how to use WSUS to manage Windows 10 updates. | | [Deploy Windows 10 updates using Microsoft Endpoint Configuration Manager](waas-manage-updates-configuration-manager.md) | Explains how to use Configuration Manager to manage Windows 10 updates. | diff --git a/windows/deployment/update/waas-branchcache.md b/windows/deployment/update/waas-branchcache.md index 597bfadf2a..076590a90f 100644 --- a/windows/deployment/update/waas-branchcache.md +++ b/windows/deployment/update/waas-branchcache.md @@ -59,7 +59,6 @@ In addition to these steps, there is one requirement for WSUS to be able to use - [Assign devices to servicing channels for Windows 10 updates](waas-servicing-channels-windows-10-updates.md) - [Optimize update delivery for Windows 10 updates](waas-optimize-windows-10-updates.md) - [Configure Delivery Optimization for Windows 10 updates](waas-delivery-optimization.md) -- [Deploy updates for Windows 10 Mobile Enterprise and Windows 10 IoT Mobile](waas-mobile-updates.md) - [Deploy updates using Windows Update for Business](waas-manage-updates-wufb.md) - [Configure Windows Update for Business](waas-configure-wufb.md) - [Integrate Windows Update for Business with management solutions](waas-integrate-wufb.md) diff --git a/windows/deployment/update/waas-configure-wufb.md b/windows/deployment/update/waas-configure-wufb.md index 68b9bc63f3..319ff18112 100644 --- a/windows/deployment/update/waas-configure-wufb.md +++ b/windows/deployment/update/waas-configure-wufb.md @@ -30,7 +30,7 @@ You can use Group Policy or your mobile device management (MDM) service to confi > [!IMPORTANT] > Beginning with Windows 10, version 1903, organizations can use Windows Update for Business policies, regardless of the diagnostic data level chosen. If the diagnostic data level is set to **0 (Security)**, Windows Update for Business policies will still be honored. For instructions, see [Configure the operating system diagnostic data level](https://docs.microsoft.com/windows/configuration/configure-windows-diagnostic-data-in-your-organization#diagnostic-data-levels). -Some Windows Update for Business policies are not applicable or behave differently for devices running Windows 10 Mobile Enterprise. Specifically, policies pertaining to Feature Updates will not be applied to Windows 10 Mobile Enterprise. All Windows 10 Mobile updates are recognized as Quality Updates, and can only be deferred or paused using the Quality Update policy settings. Additional information is provided in this topic and in [Deploy updates for Windows 10 Mobile Enterprise and Windows 10 IoT Mobile](waas-mobile-updates.md). +Some Windows Update for Business policies are not applicable or behave differently for devices running Windows 10 Mobile Enterprise. Specifically, policies pertaining to Feature Updates will not be applied to Windows 10 Mobile Enterprise. All Windows 10 Mobile updates are recognized as Quality Updates, and can only be deferred or paused using the Quality Update policy settings. Additional information is provided in this topic. ## Start by grouping devices @@ -267,7 +267,6 @@ When a device running a newer version sees an update available on Windows Update - [Optimize update delivery for Windows 10 updates](waas-optimize-windows-10-updates.md) - [Configure Delivery Optimization for Windows 10 updates](waas-delivery-optimization.md) - [Configure BranchCache for Windows 10 updates](waas-branchcache.md) -- [Deploy updates for Windows 10 Mobile Enterprise and Windows 10 IoT Mobile](waas-mobile-updates.md) - [Deploy updates using Windows Update for Business](waas-manage-updates-wufb.md) - [Integrate Windows Update for Business with management solutions](waas-integrate-wufb.md) - [Walkthrough: use Group Policy to configure Windows Update for Business](waas-wufb-group-policy.md) diff --git a/windows/deployment/update/waas-delivery-optimization.md b/windows/deployment/update/waas-delivery-optimization.md index bbafcf8b44..a9ec6583a1 100644 --- a/windows/deployment/update/waas-delivery-optimization.md +++ b/windows/deployment/update/waas-delivery-optimization.md @@ -253,7 +253,6 @@ If you suspect this is the problem, check Delivery Optimization settings that co - [Assign devices to servicing channels for Windows 10 updates](waas-servicing-channels-windows-10-updates.md) - [Optimize update delivery for Windows 10 updates](waas-optimize-windows-10-updates.md) - [Configure BranchCache for Windows 10 updates](waas-branchcache.md) -- [Deploy updates for Windows 10 Mobile Enterprise and Windows 10 IoT Mobile](waas-mobile-updates.md) - [Deploy updates using Windows Update for Business](waas-manage-updates-wufb.md) - [Configure Windows Update for Business](waas-configure-wufb.md) - [Integrate Windows Update for Business with management solutions](waas-integrate-wufb.md) diff --git a/windows/deployment/update/waas-deployment-rings-windows-10-updates.md b/windows/deployment/update/waas-deployment-rings-windows-10-updates.md index 5888c1f3a1..8d11c16e25 100644 --- a/windows/deployment/update/waas-deployment-rings-windows-10-updates.md +++ b/windows/deployment/update/waas-deployment-rings-windows-10-updates.md @@ -60,8 +60,7 @@ As Table 1 shows, each combination of servicing channel and deployment group is ## Related topics -- [Update Windows 10 in the enterprise](index.md) -- [Deploy updates for Windows 10 Mobile Enterprise and Windows 10 IoT Mobile](waas-mobile-updates.md) +- [Update Windows 10 in the enterprise](index.md) - [Configure Delivery Optimization for Windows 10 updates](waas-delivery-optimization.md) - [Configure BranchCache for Windows 10 updates](waas-branchcache.md) - [Configure Windows Update for Business](waas-configure-wufb.md) diff --git a/windows/deployment/update/waas-integrate-wufb.md b/windows/deployment/update/waas-integrate-wufb.md index f473a704b2..b3fdbbb2d8 100644 --- a/windows/deployment/update/waas-integrate-wufb.md +++ b/windows/deployment/update/waas-integrate-wufb.md @@ -101,8 +101,7 @@ For more information, see [Integration with Windows Update for Business in Windo - [Assign devices to servicing channels for Windows 10 updates](waas-servicing-channels-windows-10-updates.md) - [Optimize update delivery for Windows 10 updates](waas-optimize-windows-10-updates.md) - [Configure Delivery Optimization for Windows 10 updates](waas-delivery-optimization.md) -- [Configure BranchCache for Windows 10 updates](waas-branchcache.md) -- [Deploy updates for Windows 10 Mobile Enterprise and Windows 10 IoT Mobile](waas-mobile-updates.md) +- [Configure BranchCache for Windows 10 updates](waas-branchcache.md) - [Deploy updates using Windows Update for Business](waas-manage-updates-wufb.md) - [Configure Windows Update for Business](waas-configure-wufb.md) - [Walkthrough: use Group Policy to configure Windows Update for Business](waas-wufb-group-policy.md) diff --git a/windows/deployment/update/waas-manage-updates-wsus.md b/windows/deployment/update/waas-manage-updates-wsus.md index 01bfeb4954..17a39a185f 100644 --- a/windows/deployment/update/waas-manage-updates-wsus.md +++ b/windows/deployment/update/waas-manage-updates-wsus.md @@ -350,8 +350,7 @@ Now that you have the **All Windows 10 Upgrades** view, complete the following s - [Assign devices to servicing channels for Windows 10 updates](waas-servicing-channels-windows-10-updates.md) - [Optimize update delivery for Windows 10 updates](waas-optimize-windows-10-updates.md) - [Configure Delivery Optimization for Windows 10 updates](waas-delivery-optimization.md) -- [Configure BranchCache for Windows 10 updates](waas-branchcache.md) -- [Deploy updates for Windows 10 Mobile Enterprise and Windows 10 IoT Mobile](waas-mobile-updates.md) +- [Configure BranchCache for Windows 10 updates](waas-branchcache.md) - [Deploy updates using Windows Update for Business](waas-manage-updates-wufb.md) - [Configure Windows Update for Business](waas-configure-wufb.md) - [Integrate Windows Update for Business with management solutions](waas-integrate-wufb.md) diff --git a/windows/deployment/update/waas-mobile-updates.md b/windows/deployment/update/waas-mobile-updates.md deleted file mode 100644 index abb64e0561..0000000000 --- a/windows/deployment/update/waas-mobile-updates.md +++ /dev/null @@ -1,77 +0,0 @@ ---- -title: Deploy updates to Windows 10 Mobile or Windows 10 IoT Mobile -description: Deploy updates to devices in your organization that are running Windows 10 Mobile Enterprise or Windows 10 IoT Mobile. -ms.prod: w10 -ms.mktglfcycl: manage -author: jaimeo -ms.localizationpriority: medium -ms.author: jaimeo -ms.reviewer: -manager: laurawi -ms.topic: article ---- - -# Deploy updates for Windows 10 Mobile Enterprise and Windows 10 IoT Mobile - - -**Applies to** - -- Windows 10 Mobile -- [Windows 10 IoT Mobile](https://www.microsoft.com/WindowsForBusiness/windows-iot) - -> **Looking for consumer information?** See [Windows Update: FAQ](https://support.microsoft.com/help/12373/windows-update-faq) - ->[!TIP] ->If you're not familiar with the Windows 10 servicing or release channels, read [Servicing channels](waas-overview.md#servicing-channels) first. - -Devices running Windows 10 Mobile and Windows 10 IoT Mobile receive updates from the Semi-annual Channel unless you [enroll the device in the Windows Insider Program](waas-servicing-channels-windows-10-updates.md#enroll-devices-in-the-windows-insider-program). - -[Learn how to upgrade Windows 10 Mobile to Windows 10 Mobile Enterprise](https://technet.microsoft.com/itpro/windows/deploy/windows-10-edition-upgrades) - - - -| Windows 10 edition | Semi-annual Channel | Insider Program | -| --- | --- | --- | --- | -| Mobile | ![no](images/crossmark.png) | ![yes](images/checkmark.png) | -| Mobile Enterprise | ![yes](images/checkmark.png) | ![yes](images/checkmark.png) | -| IoT Mobile | ![yes](images/checkmark.png) | ![yes](images/checkmark.png) | - - - -Configuration of Windows 10 Mobile and Windows 10 IoT Mobile devices is limited to the feature set pertaining to quality updates only. That is, Windows Mobile feature updates are categorized the same as quality updates, and can only be deferred by setting the quality update deferral period, for a maximum period of 30 days. You can use mobile device management (MDM) to manage updates for Windows 10 Mobile Enterprise and Windows 10 IoT Mobile. Updates cannot be managed for Windows 10 Mobile. - - -## Windows 10, version 1607 - -Only the following Windows Update for Business policies are supported for Windows 10 Mobile and Windows 10 IoT Mobile: - -- ../Vendor/MSFT/Policy/Config/Update/BranchReadinessLevel -- ../Vendor/MSFT/Policy/Config/Update/DeferQualityUpdatesInDays -- ../Vendor/MSFT/Policy/Config/Update/PauseQualityUpdates - - - - - - -## Related topics - -- [Update Windows 10 in the enterprise](index.md) -- [Overview of Windows as a service](waas-overview.md) -- [Prepare servicing strategy for Windows 10 updates](waas-servicing-strategy-windows-10-updates.md) -- [Build deployment rings for Windows 10 updates](waas-deployment-rings-windows-10-updates.md) -- [Assign devices to servicing channels for Windows 10 updates](waas-servicing-channels-windows-10-updates.md) -- [Optimize update delivery for Windows 10 updates](waas-optimize-windows-10-updates.md) -- [Configure Delivery Optimization for Windows 10 updates](waas-delivery-optimization.md) -- [Configure BranchCache for Windows 10 updates](waas-branchcache.md) -- [Deploy updates using Windows Update for Business](waas-manage-updates-wufb.md) -- [Configure Windows Update for Business](waas-configure-wufb.md) -- [Integrate Windows Update for Business with management solutions](waas-integrate-wufb.md) -- [Walkthrough: use Group Policy to configure Windows Update for Business](waas-wufb-group-policy.md) -- [Walkthrough: use Intune to configure Windows Update for Business](https://docs.microsoft.com/intune/windows-update-for-business-configure) -- [Deploy Windows 10 updates using Windows Server Update Services](waas-manage-updates-wsus.md) -- [Deploy Windows 10 updates using Microsoft Endpoint Configuration Manager](waas-manage-updates-configuration-manager.md) -- [Manage device restarts after updates](waas-restart.md) - - - diff --git a/windows/deployment/update/waas-optimize-windows-10-updates.md b/windows/deployment/update/waas-optimize-windows-10-updates.md index 0a81369222..6c8a01e901 100644 --- a/windows/deployment/update/waas-optimize-windows-10-updates.md +++ b/windows/deployment/update/waas-optimize-windows-10-updates.md @@ -98,8 +98,7 @@ At this point, the download is complete and the update is ready to be installed. ## Related topics -- [Update Windows 10 in the enterprise](index.md) -- [Deploy updates for Windows 10 Mobile Enterprise and Windows 10 IoT Mobile](waas-mobile-updates.md) +- [Update Windows 10 in the enterprise](index.md) - [Configure Delivery Optimization for Windows 10 updates](waas-delivery-optimization.md) - [Configure BranchCache for Windows 10 updates](waas-branchcache.md) - [Configure Windows Update for Business](waas-configure-wufb.md) diff --git a/windows/deployment/update/waas-overview.md b/windows/deployment/update/waas-overview.md index e7abdaa3eb..95c50f6094 100644 --- a/windows/deployment/update/waas-overview.md +++ b/windows/deployment/update/waas-overview.md @@ -18,7 +18,6 @@ ms.topic: article **Applies to** - Windows 10 -- Windows 10 IoT Mobile > **Looking for consumer information?** See [Windows Update: FAQ](https://support.microsoft.com/help/12373/windows-update-faq) @@ -197,8 +196,7 @@ With all these options, which an organization chooses depends on the resources, ## Related topics - [Update Windows 10 in the enterprise](index.md) -- [Quick guide to Windows as a service](waas-quick-start.md) -- [Deploy updates for Windows 10 Mobile Enterprise and Windows 10 IoT Mobile](waas-mobile-updates.md) +- [Quick guide to Windows as a service](waas-quick-start.md) - [Configure Delivery Optimization for Windows 10 updates](waas-delivery-optimization.md) - [Configure BranchCache for Windows 10 updates](waas-branchcache.md) - [Configure Windows Update for Business](waas-configure-wufb.md) diff --git a/windows/deployment/update/waas-quick-start.md b/windows/deployment/update/waas-quick-start.md index 7e0bf21538..65763f6ae5 100644 --- a/windows/deployment/update/waas-quick-start.md +++ b/windows/deployment/update/waas-quick-start.md @@ -67,8 +67,7 @@ See [Build deployment rings for Windows 10 updates](waas-deployment-rings-window ## Related topics -- [Update Windows 10 in the enterprise](index.md) -- [Deploy updates for Windows 10 Mobile Enterprise and Windows 10 IoT Mobile](waas-mobile-updates.md) +- [Update Windows 10 in the enterprise](index.md) - [Configure Delivery Optimization for Windows 10 updates](waas-delivery-optimization.md) - [Configure BranchCache for Windows 10 updates](waas-branchcache.md) - [Configure Windows Update for Business](waas-configure-wufb.md) diff --git a/windows/deployment/update/waas-restart.md b/windows/deployment/update/waas-restart.md index cf357be8c6..4094472fa0 100644 --- a/windows/deployment/update/waas-restart.md +++ b/windows/deployment/update/waas-restart.md @@ -200,7 +200,6 @@ There are three different registry combinations for controlling restart behavior - [Update Windows 10 in the enterprise](index.md) - [Overview of Windows as a service](waas-overview.md) -- [Manage updates for Windows 10 Mobile Enterprise and Windows 10 IoT Mobile](waas-mobile-updates.md) - [Configure Delivery Optimization for Windows 10 updates](waas-delivery-optimization.md) - [Configure BranchCache for Windows 10 updates](waas-branchcache.md) - [Configure Windows Update for Business](waas-configure-wufb.md) diff --git a/windows/deployment/update/waas-servicing-channels-windows-10-updates.md b/windows/deployment/update/waas-servicing-channels-windows-10-updates.md index 24625947f6..edcdf4d8a4 100644 --- a/windows/deployment/update/waas-servicing-channels-windows-10-updates.md +++ b/windows/deployment/update/waas-servicing-channels-windows-10-updates.md @@ -182,8 +182,7 @@ Administrators can disable the "Check for updates" option for users by enabling ## Related topics -- [Update Windows 10 in the enterprise](index.md) -- [Deploy updates for Windows 10 Mobile Enterprise and Windows 10 IoT Mobile](waas-mobile-updates.md) +- [Update Windows 10 in the enterprise](index.md) - [Configure Delivery Optimization for Windows 10 updates](waas-delivery-optimization.md) - [Configure BranchCache for Windows 10 updates](waas-branchcache.md) - [Configure Windows Update for Business](waas-configure-wufb.md) diff --git a/windows/deployment/update/waas-servicing-strategy-windows-10-updates.md b/windows/deployment/update/waas-servicing-strategy-windows-10-updates.md index 39038a810e..1b4d43cb1e 100644 --- a/windows/deployment/update/waas-servicing-strategy-windows-10-updates.md +++ b/windows/deployment/update/waas-servicing-strategy-windows-10-updates.md @@ -62,8 +62,7 @@ Each time Microsoft releases a Windows 10 feature update, the IT department shou ## Related topics -- [Update Windows 10 in the enterprise](index.md) -- [Deploy updates for Windows 10 Mobile Enterprise and Windows 10 IoT Mobile](waas-mobile-updates.md) +- [Update Windows 10 in the enterprise](index.md) - [Configure Delivery Optimization for Windows 10 updates](waas-delivery-optimization.md) - [Configure BranchCache for Windows 10 updates](waas-branchcache.md) - [Configure Windows Update for Business](waas-configure-wufb.md) diff --git a/windows/deployment/update/waas-wu-settings.md b/windows/deployment/update/waas-wu-settings.md index 9e013f0b94..5240b3cf66 100644 --- a/windows/deployment/update/waas-wu-settings.md +++ b/windows/deployment/update/waas-wu-settings.md @@ -252,7 +252,6 @@ HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\ - [Update Windows 10 in the enterprise](index.md) - [Overview of Windows as a service](waas-overview.md) -- [Manage updates for Windows 10 Mobile Enterprise and Windows 10 IoT Mobile](waas-mobile-updates.md) - [Configure Delivery Optimization for Windows 10 updates](waas-delivery-optimization.md) - [Configure BranchCache for Windows 10 updates](waas-branchcache.md) - [Configure Windows Update for Business](waas-configure-wufb.md) diff --git a/windows/deployment/update/waas-wufb-csp-mdm.md b/windows/deployment/update/waas-wufb-csp-mdm.md index 82617b0e13..07f5fbcc98 100644 --- a/windows/deployment/update/waas-wufb-csp-mdm.md +++ b/windows/deployment/update/waas-wufb-csp-mdm.md @@ -205,8 +205,7 @@ If you use Windows Server Update Server (WSUS), you can prevent users from scann - [Assign devices to servicing channels for Windows 10 updates](waas-servicing-channels-windows-10-updates.md) - [Optimize update delivery for Windows 10 updates](waas-optimize-windows-10-updates.md) - [Configure Delivery Optimization for Windows 10 updates](waas-delivery-optimization.md) -- [Configure BranchCache for Windows 10 updates](waas-branchcache.md) -- [Deploy updates for Windows 10 Mobile Enterprise and Windows 10 IoT Mobile](waas-mobile-updates.md) +- [Configure BranchCache for Windows 10 updates](waas-branchcache.md) - [Deploy updates using Windows Update for Business](waas-manage-updates-wufb.md) - [Configure Windows Update for Business](waas-configure-wufb.md) - [Integrate Windows Update for Business with management solutions](waas-integrate-wufb.md) diff --git a/windows/deployment/update/waas-wufb-group-policy.md b/windows/deployment/update/waas-wufb-group-policy.md index 5c22b5cd47..22086a9521 100644 --- a/windows/deployment/update/waas-wufb-group-policy.md +++ b/windows/deployment/update/waas-wufb-group-policy.md @@ -203,7 +203,6 @@ If you use Windows Server Update Server (WSUS), you can prevent users from scann - [Optimize update delivery for Windows 10 updates](waas-optimize-windows-10-updates.md) - [Configure Delivery Optimization for Windows 10 updates](waas-delivery-optimization.md) - [Configure BranchCache for Windows 10 updates](waas-branchcache.md) -- [Deploy updates for Windows 10 Mobile Enterprise and Windows 10 IoT Mobile](waas-mobile-updates.md) - [Deploy updates using Windows Update for Business](waas-manage-updates-wufb.md) - [Configure Windows Update for Business](waas-configure-wufb.md) - [Integrate Windows Update for Business with management solutions](waas-integrate-wufb.md) diff --git a/windows/deployment/update/waas-wufb-intune.md b/windows/deployment/update/waas-wufb-intune.md index 412541f1fd..84f56c8131 100644 --- a/windows/deployment/update/waas-wufb-intune.md +++ b/windows/deployment/update/waas-wufb-intune.md @@ -275,8 +275,7 @@ You have now configured the **Ring 4 Broad business users** deployment ring to r - [Assign devices to servicing channels for Windows 10 updates](waas-servicing-channels-windows-10-updates.md) - [Optimize update delivery for Windows 10 updates](waas-optimize-windows-10-updates.md) - [Configure Delivery Optimization for Windows 10 updates](waas-delivery-optimization.md) -- [Configure BranchCache for Windows 10 updates](waas-branchcache.md) -- [Deploy updates for Windows 10 Mobile Enterprise and Windows 10 IoT Mobile](waas-mobile-updates.md) +- [Configure BranchCache for Windows 10 updates](waas-branchcache.md) - [Deploy updates using Windows Update for Business](waas-manage-updates-wufb.md) - [Configure Windows Update for Business](waas-configure-wufb.md) - [Integrate Windows Update for Business with management solutions](waas-integrate-wufb.md) From d798d5e14653e3250317e585df8902644f9ac46d Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Tue, 16 Feb 2021 13:26:22 -0800 Subject: [PATCH 091/161] Create mde-turn-tamperprotect-on.png --- .../images/mde-turn-tamperprotect-on.png | Bin 0 -> 92380 bytes 1 file changed, 0 insertions(+), 0 deletions(-) create mode 100644 windows/security/threat-protection/microsoft-defender-antivirus/images/mde-turn-tamperprotect-on.png diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/images/mde-turn-tamperprotect-on.png b/windows/security/threat-protection/microsoft-defender-antivirus/images/mde-turn-tamperprotect-on.png new file mode 100644 index 0000000000000000000000000000000000000000..f7fa41a4acada208ac1c326dbce85ba34e3b14f4 GIT binary patch literal 92380 zcmce-Wo#Tx&@gCbX5N_Xm?36}W9B$!W@ct)W{N5Cnwgo|F|L_0W@fg}$&*)l_35Ph zb9W=Hc2r$c-BnXv)HUH><;0N@2oS))z>p;+M81K6L8^g)fq#aBd58QAUUhx{gSV4V zcLW2YIQa7e|4OlU{|i||P)B**p(uZ$4#xU_P(L`CTN{IY zx~=Ke4+k)R(3H%btc<~mPN%5Bz&?OU ziU=vWWgf4(IuXsTzFpi|sh-Uyl$(4iZ5mpwvD((589>wU`wW*SlpQDK6B~{RM;iAv zfzRp7Ap7>3XR2p%nZb?8O-<{PK&RmE2zc&`J+7~#|K3`eKX1Wi5?}O0Ru`sIs-S$X3?Fp(^>2>dvg#JN%2YWH_KcDxS0;CaB z{z2Trq3Hjk6LgLNul64r+$QD!qC%ku{|_Toq6_0622;Er<-d7!$iSult))!_;{T3t zf;3UpidqY=nXM(T9f;WaG7j@7~X8el%nS6RWC)kd3(&4^MLEG$bSCG%XAUblE_Sj7Q9Y!J-*mOFs zc9xY!M_j5DEbDfG`}G~Cca6mV@b_IBt%}IX`vsNn{vH;}C~EJ!<|%p4Iu_qj zu5hgPdN?M!MJGZ^+MJLXJqHnoMx+p#^ijGU^WSps4cbVm4kI`nrZBp#Rb`t$Xo2Ge zYz-qkauT+9n4ht3D_lc`K;_K$uPdQxj2=&M&RIGw3>Mc-aS0Ad}Jm z65B3x0XliU^yIwA=(OSUHI_To9)AX`_h*`8rZd|^)b6eR8aa~g_>GSJk0))nc4#`A zedkf)+BnthXYP()fcwq13#gZ6!V0BZ?{mDn3E%X|=VkZ(i<~W6OFdBM>#+P8?>Ht? zTTj_2*nrj(W;VWCQhp`h2q-N5`OK9{Z}MRH7&l~dH|KmNE}rl1($WbwcBiAY(4dBJ zND37ubD`YCV^n43u(`d3$fZRt`TQBvH@6pmf*+MXA}2pPm`QNBx3jG8`ciWx3D?=f zn)gWO-uL-FJlRODGdlF`5)tAP|M6N?!ULi}ZcR-_Tc%?#`P_*|;uFa|TR}JH`3B&O zOyVf_avx`DNy9F|WwYJzKW4*hu_|HdDL?qbzTRVvi{qaEvOP1ns=@cVi&;+NcE=*k zSJg-(3M${DGz zEzF^#aHXkkj`zA=<8{leZFYH_xw1K{`3X9lJgD1qo=}`Tx~Z!_`N?}d@w}5dkKyJq ze6Hkc^LT1|e;=ZX(RyN;`i zZ-$O%XiAkAjzF#7^)zRYY$hvq<1%?-%zviq0@+n^`~ebUplV~W(e0)9jkL@V^~%?Y zw{h*pQUzeaWy?UVIp-x)%$BMv;Kca8(+tEM=4YFeQf)TXMh+fIJs7z7{YLz65_#*? z?L3wEY+!fg8C%05mUnuX_(C&mvK%?Iz@d-{1{Y@VmIz~}PQmSJZ4bngU`_1L?sl_~ zRlU8MA44*RPHlU3x#k1%IS&r3t#j+jb^_Wh>Is@*|1+RrwoTIPs5l##-D%B&`oHU% z%hc=Qa9!5Nb?O{cIk>5LZzs}GQV|1LOKJR?4@1f zQ|w{)M3R)&J#{GSHTfD7m}e+-B=Y&m?>>;pBjsK^k!e#AQM5dmm>_`fF#R=@ifYvn zH8S>9(8qqT{J8yvsz4^Q>%Lo3r@Zq&AF=hz=>THRT%%LX#OH4BckIYEr(j2{DZo92 z1t1_=(iwmQo!Xw}%m08^Qj(kPnv*0~O3LGb*MSSgbf%z;njIN2_fuh9kOIYHl@S60 z>E3H;OtA#vFqlcyM0-q7H+nB{UUxIg^>rYDQ`hMJI^!WH=Pj=6JW}}kzxgw^6JX2O zATS26+B0@*UO>r2MKuZEjiE$CX-_S5JYVMfjxwA0_VTfzv7%9Q1v?QDzX_BASACb^ zzXQ zuUn=!MU^j__-P_`6~(p`?cG;sG|ni+W+BnOh{@3-_lqy8PC0{kD1(=a%h(Osv*lz- za8IvNomDP2VID{oDI zIa=FToX0`uxF!&zyoZS6e9;IIpFJO9@)=9ndaN~e8 z1tz%``z4-ccU*#?(M*HBU$!ebxp$p(8PvOPo|xmik0BfF%bzz2zJzC)!d6r{T5W6c zJsKJcI zIah13xr;-u?Lbzf#G?e&SoUDedi(fYrJ#_O3=${bIo{PJ*=O9|n|WE|6T`F1UiaGY zOUd8kZ&?$WoAF$ut4_`t6B)45{Wd2BwIdGQD{7{x>8%Hc0*&-WlSHrQtqwj{3v|!t zF)w-4A_ht;X|v3`K6^SXp0DAvyN8;KdOwWM97sG*Kk3LG#m4Hy0-vy=$GLnShT4(N zFK$6N|CvZF$vS9g=uW{aqpiO1H)nr+$zEDK?g*b3GWhFHTex^%ydLdrUb+LH4_`GU z;abkc3VysUjy8KBRCm1l)^m6`a>p4ZlKY#=bbk8NfQM28HgRTlN(j%&;2*Dn>0J8k z3a=WUNqIc6gcW-Z>X+aoe;G{mfkf^t?bPU@s89{A&xs)9?ilJcJ>jE>`|j=2@3rmZ zlOk5FC~3GOLA|vX^WbJ-!+0atrD7OG&IYa)VPiytsJ<7L1x79R=jE{=3c24);l+M{ zMW9$bmVVEnodE(ICEXj3&&`o8vjFAqPJxDh&VX)WcPwK*``%_x68*l4^FPRoZPOo#zXq&(p>-g|;IkrwoB;95@d_%ms*WqT238vf_2s5$ie? zMECC*jH*}ioO7%Y(&GkCt)?St}B9qy~_Fh)SAq>Uqfv&HuN#iQv_8B2&`xg!(A7Pd)xIQeiX&MgDKn z|L4f||Fe+!|8K(Yse(NhQEDm4moO$Fg(Rl-tikOI2kXCr=z|6yF{#zAco$IzRA{e% zNr|o-Z9`y(kdprOtXp(c;L>5XaM5Cc zvlhljbLH&p?3vyx3kx)kI)5VsFVWvr$fO6Ud5xK~f1ltF3oa>X(yEZwBL8Fe!)*T!MZa^+!^6Xz zF=ob|!%tH*xZQ2WjzK{1h&?O!camlCcY3;p1koWC6^w_6@8Oid)5PM53nm_(gqj-O zFI6SM|Hu*ko9SJMtG-BT5xGNN|K)k9X)^48h5C;7zg7MB5oT2;zfv-`#(|1gNTGd_3e6s&uMyp zBmr$T#YB!sP$ETnm*`*WnCaLLTc+5$wxim4&-+sGgzoz`h6f>|!E+c<G+lo>UcH;S^E=;X#FxA$_h($rO~=Qb`+M-;nT;Bni*hMt zi?Xp8Vz0-Rcsw7{9w7m>t=w^KNi+==>awKD>2}`h9AnfCwFcg#SuJn~CZopt zV7?Z2m8PmdL1E03;}vV;+mpmDph(BZ)CPO+Dd|Fly#pN>aw@eswK zrZDheetZDdPJOwktgN@-@EkdYjD;~%F&J=uf3zGfMI2VWhbRBs5C?dEpzVqA9>rwJ zHd;C6g**6YdQu8dSTotU0K^p9%zN^^48ZhEJ21Nt@5aCJ4>19>{a(*KULVEa$zcx6 z4@ktjuc7A3Rz*rNA{wsVNt$rR6zb?j#BMqO2>!g`ciqC?kFbfd=RMi~#0cRX4d#?$ zvl*YWKFq+WJE85X7B;pxzHHku0^&&istftr4W3yd(DzGw2k#kTGL+&yXL7x49n9YQ z+5AGg*cs!}8jWq+Il9Rx_{9t99yZv3NvD7JMRbEOs-ZoVW&Mp8alI`ETw&O2?{+zz zhcD4z@&(k0Q`6c+kZK@8&Q_1`-`Hu$VI73z~M$R2Qc3>egR!&`;A<4 zZyUZ%%}PsrVSVZ8g$p0uFhzZdKZ_;)9NV0_-$aw}cvH_2d~?-p=Ad_Q^0T-)G^mdv zm%Il)Tw*&ERd5X1@LQGUC{*Dto4y1V7%`>h{Y&Lr>RkiTUjp)ju}j zeLF>JgS4UQS%jNS++gJS@3^2BeMto=gND=uw*tKFZ3Q^r`QZ-OR4 zLn35<)gN=@SVCAl4(T1XAtv!!rHs1^?5P#lT)c9IF{uxPs7q@GUi+C(UMusuPp+1@fLl^ZxO1 zUST0@^lq(SWJ!quI{`c@syI+#^2oRf=dV`TF0{E{Ee`&Aez=<8=%rVy+HjZ=hr6I$ zwBjf!DKRrM`&{^R3}fE7Ec^L0n7O(6ejS0A*GosP#^2ZBRr{~{brt!~e*K@m=C8*5 zzg_+M->$r6L>rv6uTfF9FwrCuu~75IV-aD)bS4hX>O&XJeEgr?d@=i{w019LU0QQ_ z+bzeTtVUy99e9LsECTMUi%h=lot{oIL@XQ#cQvaMK>XKxX-T}hf-SmDr&7L_=HO0i z^ZdbMm~se${?_#`B?yIteWUFp99VZ%n?dQWD9)F@^L@-@YlD%ze|>UO+I1HC7cB=8 z?ANNF!O)i952{v{?vV4`HV1(L)6Hsi z4E4*?$mauj-`z@i!QNM%k(~yyQN~nE?ih_G{g*jmF@cGMTW1){N1M` z=gjfcqTJ|ifXvDaKaKNycQ|QIC*!S!&b=L^c8)LNyB6w#ACS=mHRYAbB^SEZZQB>? zo%=Lha$30GF5z`>(%%P&_CBUJvG9fg7|r!|;%%7CXv*r&LDi@7Wk;Js1+I%)CgfD? zaP76h<>Dnxx8J!bVCdG$&*oz?dKz^Kc@GF)O?B1|=0m_IT^yK#8T?0yl3`*L%hole z$E*0r>KMvA4zzDI`H(W45rwUI-QLDH?FUu$+x9}EWF~7p7bC6sR)o~HKG-x}@O-&p zjNquu@6P>sxq%K5GOlOP5RJO78AxZ$dZ)vNFzwzMak>;pRC3%kt01ReoP6PUW@6<4 z24=i0XtdZsb{%fm{8UhCwpgErx~3N9qlb7{ClmE5gf#riKgD3qrqXECnGN28f3$*t z8W^$*QtU|POgZf-xM%elKZ%lp&u!fWdm14;D6^zyHO1@b?!JG7^=pp_J}alNzC1w+ z|8%1~Zd~xQ0Zv$peSDjjYiXlrMWydTjFZjw1zbHIrfYOA_^hh5N7A57uwcVy-!IWP z`C9DVD6nr@F&b=Y(iQcDqO;i=T9o|y?y6&In;%)G;Mim%h0!YL6Cb-?`lF>iA-nX$W$ZwBM2yEs4rqkP4Vn4Dfq9DwS zDQ2u)S5$5wSbCRo%Wq#-Wqt>~l=bl`r9(n{=tD)ifIr%-tezKvc_8aBi9mJ`Gbf$S z3v5Q~Ba8K;(^i?dyYVKB77fwkIlqe4ncmEGb*7syc&B@7P<0}r-Kl%zY$&7EYYhj{ zCSXE9RD6a8A>oEz=bkj{qtcn?uL6rS{xjY@%h>bBslXtry@c#fVaMp(5;4;?76&L6 z^m?TlW3^`t`72umC;RV}YE3TXw)j+>6RJWzgv2WY^|#$pqQlz_8=j%73EwadYbZ(k z?jMKe&YV@pJF48p1DJq3K~2usW`9}Blxor6SM96DNskVgrnLUSSpgRQAV{eB?BYoA}sg-+N{C%Q$&8~f>uEmFdvb~r# zwAZQ<_&S8;Qii&_mT=_#r^nJF8d8@&3XGTWS=;@45LSn-MB=n$e+}ot0^Vp^rk>Qi zO}@zh@#uK?<*8@$x5d_CRc9nlt>?-wK(;MY)=c++%1Zchm@l$CF(iWHVb5nQJd9v) z6ap;Z>!iKmQviL>;9m@#O)1BEA6ENL=TSi$b(m=Q-AxCI!{dlRgJ&VK?Ew}yJBWfu z?wJ&=L1l>m({;4GWlFJ+lu!vQpe)H#fK6%5h6 zpR}>O&Ulfc{Y1R!80d)oB0%%8U3!qn!6W-{BxCX>(cEVr&1kw$mFabzgAz(ezA@P3 zPQ#$Hb@hiGQxNg47nbp+3d-U8lk68ZT)61N-)2hmOxLDyG34Yi+okN&E_(!&UW&1@ zvkZ*@@ZOE`2L`n-VbW#OhcI`A>vz|>7oWdWW#@hE_0@8|b_c?`sPQjon;vfGHN!t6 z`{3HVA71?E2Gowll$gQElMF!lq;Dk&u!gWGnuu}&Eb7_ifa5s8R z&ZIx<>6XT=0)Ncv+*e9L_q=$01v^GLX0%(fUhqUVLLw0tdUZ2de>L=ZSytaT95{5^ zbm0ag#|I{GxA{Vbl8dnx{s1t{wwmwTP?OR^WaLtQ*wWf(Hb>TT-BkI|GvVanCxtB= z8#qwG$iwb~8&WF2d1m?<+RB9uMILufhtsD+0O}#zoyn%mG^9gB2xvdKTG2a?=CdYf z#>uPW9WonAB-3WWvj}N;-n6<=wSC=W@7Wa-A;1&BW^Jw!2;aUMt{JQcAQvbkjGHdt z>td<|3{B1FY`moq^?fcm$;6>J!zR zpoXE}HyAl}HFNIk6Th>zbTVwb@$!U7!5AOSfUVt&#$D7oIDUWE)YrzoYT9IqjrQZ~WXOe6St6H*R zZgCC?GR&<{Og^uf)nEqh^DQpSD=RD5&9Q%5wIHRZP3{_SwxYK#C@l?c=eCQI4=}Ly%g`;vAoV2*_@TMu#W~HJ7(=2v5Q2d1O zLsb3Kcf1i&YPGD<^jD;aD^~FmU;F<-1r!B?>`>p=o*hN|M;wV+@HIE)9Nc<;@C|i*(#-e-kzF!mkRa)ZFMn3i1kgl%Am&dvc zJp2;aH??mt*SxERI`Ud?uYG-aEPI2ldW_nGHNATwG)hSR6nS}=KfpWFj1n-&z$YJr z;?uIj2Fwgj%UyGcd{f0=uRrcCbjyrMgMHwj3~%}X{S6Kx>3@0w*2BCyIO(!tb9@7+ zUtd|N$G~OUjaiccf+K7b))XE?dRxz6y`N3;ZZF3P&p=pwX`VKKv5w%_t9_vSBnDeb zhWMRue`;S6I|MQq0sW_=`;jx>!P29QG_UnfLE67iW8aVUrD?DBCImf&T>sQ*YZ>2b zcta+&3d+i&!orX|tETJU4qRH{;ov?nFd%2Cyj$&c(~2_&0Ljtr?cL$Nvs)Wsozi5B z@~ewB(p~JsU19jD3n!*d(UzVp6Ad%%SPo_5-QZgrI`YU}g~32!LyS4B?X;#NBiO>CJZLDz|B55DxCzj#Z zJZ8wjBae2%DlEIw^VG3&q@%sw1@I2s@-4gK=d&df6cx><-F1iJQ3=GR_fzjYq#QY? zZ~W0GIP5&WkJJO%9jT(dO-H9)<|^6;Q%36PxDsggVa_;D$`B9vGN0!2M7=n zW17?blR2()sk(H1({w+JFI-$cp_;^Psq2U$a)g|hm)%?Mr*F;AQdEI_A%A`wBhZZ+ zv?<6R7Q6SetJAfT*7&YDc^`_oTbggMXMmzPmCk9JwsKF^;e3jZ-jn@Z2j}!`ACY&> zYIus4-G#^9OcYbz+LpYlsC!3&+t@|Fu}Nrseg+$>Xq$-*7>4-hp_BKgBHB0Ko9tb2 zR;|Y}c+sx=lD+w5L{^k=afr!D^#Y4WPdc+%wZs-$V- zjtr^WV@OTU%53=ToNB@H+7K+Dtv{hX`I?76Pqro4y*4zPf5Sx@_npKZ6@#*T>S+UL zagj1nFv1qgH!#GsGJLb3P4B#D}n1z&;!{FTcagYDYHgl+F;P;>RQ(3_**#K z)YbEf+AhlD^&H)QMSHbN_D|Mq?$#ioOn3V_BK1K{KxJY5>d++N z*>1>+4o8J%e>|(NP6YgRH@CW#<|P3kijuyoDC=1_AOY98!dRN$*^hcnBXZpA1D7F; z<2Syx+fxG#9t{aRFLKwFxc*0E%LRwLfb7&<_l<6DHP`Z;lbzOmrA(wOJL-9PIsF^U zx4{lZK(0qA_uT#edM6B`ha+)cDeTT#+u0;Q0TE6N~1g3Gt4KXGgQ|oS{{(jbWLzgfz?G^}oaK<;z zR_XP5VDhbdO+_r-khSw^^=|P6wC?8X%@Vuf#-?c6dNJIQa$rt+EC`bEw8fYUd1<>H z*WZ1%5D4tm@1^tIE-%M^w#xl=u^l?pa_6(_duQ@`1{z${&X|}nI&*Ty+LF?np8)A{s6Nez@n1F3z*nB6yH4F+^FsiDvY8O*tl|5zqy{Nb>FjxiTW<$ z5XbrIeS72gmHk&L$>X}AwZVM1!<1OGFu%G)IAsKjFhVh>2TilRKW;~d zD`7>NevaEq?JUW%Xf$;U3-^WUeiEE_Cug)6xH#`J=P{Ynz6dL@V`II~^z=(VFneuq zZ&F8FO1%}8JhX4x#Q{L*O47XxGC+zje2yv&dkxSHl-&_8z7=6%{dBoCKWiq25_N9? zt@G{UO}@DKWFIRZp*bGCu|Eb}!k;wvbqxtiQ%LLYD;xiihsex!5EgD^wvZ+J)3@3X|Yj%GgQDBtMR3 zO(&a)od|&4`eL(`EanSnb)U7|h+=whJ~wXwGQ~=J#VhSfYA`fAFOX2qc(0q?-IK~H zyIDyiUh#qWS@`f85>X)yDU5M`lpX%h*8~+(x7#H~__1eFdv!Bc7p;*X%2bs0yZ69#bS7|Km1Y(6=Zg!1u^wN}-p4Yg{CgitYk zzd3H9qt~OYQ%<#0+upwM%V!B@b^C3HwDy?s)^==tyzGiL-PKkLUi#BYP?^R4_kaft zBOSTf?`R~1W8?KXW%_woHcoM2(581Dm3N0T1oVhuL zu0DT9#kpU8E{%uR%Y@U3eYNMZN)-7X+M4pX;@iqlpE!xJ+Gq5uoYl}?WSc_F*r_{F z)n#L4 z&F(uRY07Zy93(+m)Na!DcC~IkmgB4Fcq-PCL-iTx7-m(jXPSI~dH}k*Y=9y8HMe40 zNNmMiEvSD9DT5*#;b zKT4A5KQKEyK1;_9+S30lC!mT;J|7Q7OpJKHZiHYex zZ9}oB(9?hre6c;nvavB4vx;YkS;f(S$;OTaAXWk_{+i>bwhN(RcK)Tb<;APkX+b$G%t4p(LTWEKAS{f6(>;wyK?1(xX+S8jHKcx|VbV(RAXVUd z=>Uqzyk|sK>#r&rZKorQW=6p)r#Qv)3&h;kO|(*Zm9Lc)tcH(91}}AZQ35}XG)GpP zqHZ)14yr!BGnFi21?3+xVX1<5rFufD)?r$)rBPES}K3=#&h1z*i zt-6xH4Cw;@t;-+m^Ifi?Qe8|vFv~AUNT%I_-9I82a{10+Hru{V^8v198fGyJytb_GVD2gpA~9}dFZ$nZH#{ZE**|w z)w5+V9V6j$ z+|wwXHe|icnlg71BZH+#%uM*=5Y_XFssfti5ATX&v-IRrXbRvTl-Ea+HRvgm6glue zB}ge-jatNss2uj!{e8feb)|F1!gC&b1MRWUc*M*6^c5za=pgHwfWPqk% zchBHk>teGN17$hC$c~)R+$8u6(Q03Tck+Em;aBEXKZ)q*_KZ2Zrn2y`D3Hv=ME4Ju zTEj&GDNP2EJvqJIsv!9nmv6kKYHcov?c>Zy9=JaC-V8Dpw&a#7HU-rqa%K)BY=||J zyh}7InnAP1KPyVYgFuPl2i(Ks{KkDznO(}lijy0=3o-fcfkBL|(nr;?aq1cCg1p@C zechW*sVDh)W6`ZUP{}D@5emkrC`AJEH@Qk1PrJ9^j25EOks{6?W*!@o&WsfG(c4ML z4<1z6SV_aiTMUV4Y`dqdsL4E;fvmYtDk^npG6ihDJYf4sR8c(08{Jq$LSk~P!#sAg zCnkl>kYRmhtUr0r0)Mu&(yp}m8)A?3p)l$>=sYeWYL*m+)@<(}5qEm=C9}&{EUs3rsy8?m_Xm+Xm0FWkF#?_y5#wm%$04Ns z3jL>U6Nk$yI1m>tBVU++J9GRv!fi5#;h8lhjWL_W(5jTPCz`NBBBREP zj|1Xa1;0p78pHrPP*x)5Z)~U!RuK|q16V00L2DK9wHGuQ)9Dn2uR$!_1JQ9%O#%`hGtah^f zl)g>P%JqrF&=!+drF@WxI|-kSdeX%V(vx6mp;e!@Jf2&IBuD(mZd;^Rgny8KV3@Q7 zxvd(`Ym5dC<1sG|^tQMme?xq~r-k6f(|*CcFPN%qhGbMjRK4d%Az%GQ%ILYU>A9{R zR9v7WfuxWS$?D)-ZABA_qa(K`N;Z_0)q0hGdFw|z_ZBWUD?nC-qr&*2V}h%IRs@wX z7BqD4K3`4BY-onR&0LwbRB$Pvclt5QHK4M8dU|yD&?F&Lo`SO~IT%pZe+>Gej8*3W zS+Tp_c5%Vj1B=ZpAQ&2<9l5AwEc|J{#%+<~`P&t~AS-dALVvLZGXX!*LQPl?jzkQi zz!`DL49P-QORqN4a8B1o65L7yM@r`tX?+KNR1P!v+bv{UXEmIkcWFv>eN*U){Wddz z(a6*s)xs81THrCwLy;9)xM#82oF7?^Gdh%`x>jK#>45FPw#4)%#K0;>Ma8QL{&6o} zkOR^8y=fF@siboz=7+&NWtC7id>dXfXmVuWn zWo}>>zG)4HXVGz=A{qWlg2;V|;<7-kF*2nSE|jC>q{V6+6a^J1CpBZHb6ZjkJib^7 zD9B&LBx5y`rLh|G#S3W6$RCKFo?34JMd|GOkc_X>uv#n#FMfzSb6kNurJ2Qz**ZP| zRA*IE&Wgll-z|Mxkbx(?Vdy~Zt?ookad#;C_7v?>O^o4~Tvx;@b+S2|DViDo@Ia5p zq*JZw9f{nc@^@*M8naoI9+(}ruZj~T1&_Q!+YelY(ShQcW+zTpj{_f_ zBo$VYF=eV$C@ERe%G7jCcEsX-)L&kE=BEk2Kj}mvFzd|M(N2s-Ej_3FZU1&>*Gf>w z`;B=*wX2-`g{!9YyK{8T5R8t4aig9&8J_R9*=;iCS6dKTB2S90?C7C%u+XrU_lrzQ zg+NGxLKh@7Iuyj~B4(4d2U|WdPQ}NxvAWa#thT`mt}=w3Gd$*5QR*@2n9r+8U_DTDjvI$!;y?`PWu@_J6gQBh+DJ; z6bfD(h@YG+Ql%-s39_EiK*|#l$6PrS_7XuGL-u%niDpj*{1hUb;NNDufDDN(`k^)L z8luOH53+oc+jNE@r)tEBMGyi74gvVXxP<8}QO|zTO%9KvAj`@YPO9XP@d|{c^dz$9 znViRPrGzOh&ImKM7fI-G<#dHH=cMLavH9N-|!uH74GL7Vz= zsNU{~SYB`4bkpv}UT{^B^l?8*<4_uP+Ct`cfkN@V-v>=@X-mr?xiDi}dtU2Vmnd3E zk)sTnO5}bC`h%D8EPu{yuFs+Jtn0+wXbc;+42J5$_^062L7|1L9@l!0x|5!((Ia>g zCZ|v^C}F{7{IGA$8DgQxum4U=0r-K#*DEK6CdNGfKcghx?5I}QWpht0|c`{zkogOE`&Hd>5?ts(|>DbezD zHy~5EFcqtV9$EH=911<}msTDUU*F_yag<5VURk5y%sUcifxbQwOac?id|kZRWtB<7 zl>R)@VeiOL-0GjV6xmTj^6gR;(`Gcw&*+t@B8IL6Y3$AfEPJ0y%#y$o$n~e^WZ6}+ zdx{#T)}}t!e@a@W`i%k8B$ihL8=O6`t)wB`)c)hlc`xi6!s^G30W6-lV+G(oz}V!< z^2rRPx~5cG-cpz{W<$jx_vOHh1~{HDynjtILxQ+;su3Yi#b)}q|6wK z55P;7s?Kj@L*8PI%ONqL+5*Pj$`Tvr6RvM!)+M?4P`W2WpukN93a;p&G`wV%%y<{n zhhX%Zu_Tpx^n5n7)QsMtvRAF9VuT2oG55xHng|aM83^R2tOcG7Zm(;oM}1Bf-e0g* zC%7kzg3Mq?YrUCuD>6a@!K?fVb?@Dwk1)&10mH=c;wEoU-?SHrRwrdRCtb~jNm*QJ zghCq?El>I#nnId3q0LHBCX1wZ2ilO3J{OgSyGmPDi@kRxf69KfvS5Bpo3!jIzaZ7$ zuoEl1+k0N~s;55WF1g!&04bOXPW0c@;~{^qZG62?bHZ~*K<{`r^3KfGIuQ6B1pChD z#8!H0U%K8*&-eq$B`cuDn7&DW0H-keV)>&^MO(wE-XxKzhWq!*vBa`whGy%Nz3<#H zm$YVWYyC2RD}O7Y5DN#90~ZlTtGc#!i(de}S$X{&S$sO!x6md)Q3XUvgi*D+tV?D8 z9UVH{-TAp)tlLCR=Nw0$KM;BI+ufm!t4 zeAt2ZB%nsIQf#?~*Ls`+*qaZk6GX(ei(XWV`|?~q>~;>X+ly^>L&o|JnqWCxf*S0F z9cXo*dZ)zSXm^IFsTUpGuiD@2O*QEyk9qHhH|FDNpP)XzU!AI>@O?)r=~~w{oHnL7 zCh9P)FX0kDrp@Ch(4moGvW$;}@zE6m(8&@4C?tobFg+7K_)$oyl{X9m$V5}(-rGDi zghF*1ZvfyA)s#|(Y(G`~?EJ#!gob}&9!r63&bV(G5UVkWKIeC25h@Gj+uqZkwKt@e z%WktKbo-5&xO+in|6R|H|-=NkOl&c zYJ=0DQ6T=Ak~YB1!QuB1EvqaB^|)5grbL&)Gu3)nW#Kch6X<(3|1dQ?N*&OGCz@hx zWKL)4&qB3Z&6*E7K* z5;3?1PssR4a};4}+ikDHS-5|)FD}PG=97`vp}h9m)FxLdsvv@eUq?X4Gggb=ThBv0 zC;uo66t!J!P?l5(gGgDR9=Gu*CsD_O7Yi^m%ubMk2DhIU*Hhe0&r5X(^7|22Q+{SF z`GwHXm+Z%(6I?`8(a^pV!F4PSoCvoB4S}cvloJOV4|H5EjefityNt-p){=9WVZPjC zW*-Ue;5SYDTn5WM6OX^dP@owbbFBs_tUB#cm((OOG<5e<5Hgq2u* zrpMJ0g{!LL)06MuwdR>!HN{D_GBW{oyfHL>oCyB1qN8lQuRANQq=E$f!XVufVii@B zg#Ga~s^$URc5eY?Otxn*k|%6n#22Nh_cN>W;q+WA(Mj5{T$o7ny^Hb;6|^#{r~rr{ zI7A!-l*|pi8l24;_2X*zK8@Q;(-@s!AAKa=_LVzsb_HIqC)R-lB?$m8*M!EmeY}8i zvF_KzWBDm7y2cDa=j*Sx8==>+9Rr-}3nSAcHVJwC1`UEFBneoeXur#EZCX*wRU$uQ zsiWT;*?fj7U-J`!MH3V2(&MOJ@r>22^Wb)W#VQ_983@WM7J+(~!SiqKUn0He&v%1%H5;h-qz$_j{WvC4mR8%QxaQ#IpU0te~^PB@hToUoSjA1Fbmq3vw#?=E!~jG4aon(^JVK!ncYTX_m5m31RWYug z`RCXB_;Xs!aItuBQ5<-|rJP&|g=c@bVtjWAMDjYBvg*yOANAEaVPfEA6nzm<$gwpY z)gqdTY&xQ!OC^GY^>fMeByvAYk3ZL>-uF=$uoIR^kkuMu(iHc%IeQ3pfJj$jDRIfu zi%qCn2-I)f(*Z?=-V4G?L3sffRy{mA+C<|)YCZm+IH3K@ghkz`zVBzuIeb`0=w|+D zho%s2tXds7{uoN{(LOrLfJPRdK+on#f^KSn(XvnF(?2*lgfYGXY-_Q_WqScaxn5U> z6nO@#Hv*(hNRYaW#{Z`mpkNkl+p^IRM`? zZz|3nd8n_#e3bBF8i# z1WqAJN`Qhf$xHidhHX-9EMa0~N`!Y?C^*xJ*Ma#n&9j77GG%UVP}`=dhkka@6q^>G zm4T5_)X8eetjL82uG#`zyoy%OfEgw+n}Aogx&{pA&=Ac6Y1eRq#Bb0u22g)A9RK&u zjsQ>#+^s!Q#9)d>QhK0~FO(ClKmGTYRspGzA%vqNwwXECZPbrk-?Ys*2S|u>3K}{> zzg{bJ2KR_ipobZ{>XSv%S@v;fEhM7}^}m1m%U8pY(>Rf1Z0MCR+;6^{D<-GgE|qH@ zF-*z!B%P?Pb%D0$WT5y3O5N1Tf}~%kYk6;?N`Pay#y5E2kc4l!4$ZU$aZb!E!>;x; zBd?(v*7yBWB1aZzv7*zQ!M&@g8BVD(OI#Q4I6az6GjP+R^vGED-)0mMWqzjK@U)Cs zJx0{o`R>o?@NwZH4ZkD}g6xbei^bzbb8Di0YnvMM%kI8PXRc7P@pSYZI?+Y0qKa0&ar6Gai2BCpN`kKIL2TQ$ zGchN&Ik9cqxv`TQ+qP}rWMWQin_r$6-@AWwt<|f4RIRSAKDEz2yL3~AwJm`2%9+Pt z8CMNwoBHnT5;A}A5--rXd68ed)LPq+ zC{QApeq9*N1ju}pz=f1K2ta8iMMM3(U=mX&@!%&EINQ?q;1iTx;)dn|3{tUV7#v^U zB8ZZa#B%fEB}4g%l^Hgg&1ApF=Daz4yfHGPmz9=!Ga!p1*DOs84@2Ng)#x%RqJbBH z!sm}g3Xo?{1$Qg^4)!) zN~}SD#8~5^(%BH9nA($=ZJNm;;@9i(UlA->;X;J`pvmeDFKQPU6;%}`F5G^7RzpWq zg>-CjsrrEIRT>Dh#V<~il$AX(ij2=TN5s{Z!8Iu6EJ}r9wZeUQdHkt7bVtWS#1yB^ zrzJCwD+JX}kDO!pNdqa`X84pGY z|0o(-VpH_443aYr8&WAvRX(^ekk_#RcDCBp>9g-Q#bW>78Q17$rA9m9W>H;R;;{rA zBn+#@N!fv|2fA`MCxg#E9W}*9BKn`-bm>j}C!U9+D}D(B*gvAt-7IVf1vA_NTjbEr z>^0n4Gb`aal$AL``KbX(XLvV>vaNi?EU+-lPfJiIS!XnKWHV)X51T(%y~LRgGk2Pd zo{zw4k4T;hIb+TyMvC1v0fY8CqYRa6S;zEadlbC`uiE=nZ6$40q5!v>FLFqhr&xlz;n901Xf!8*yoq&^_4ICShUroDy4oQ#*zxiWHgj?^P#RMn;_83v0{p8D9I zZ3r(Fm!R22ai-?D76!b*%INy$vjL#8aJf#9?-JlEQf8-IDGbe*6umw0YQ38R_4e<^=}EiT#yugSmv_mi$Aa z;O6S9rIogZ=C+ByQ@8Ti`XuyylEbNi`B7wO%)MHIza@nj8g$UtJGFz>(k2#eOYGCK z(=cRy;cfyE+Qm#B@C4-Y_(X=fAe|9pcGg|uBVXr1wutF?%S4sY7^Zgw`cjRH3sK~K3~fHDS09qc_$b~e@j+zO`U z$w<1Rt4F|qa%2+&VuH@a_>y z->KD*c;*fa9e;(B36q$aCZ?v(T5n{FP>TAiu0FfD5|-&2-Xf1#fcdl1v%heEFHt|` zy1FVcPBVC(Y*%}OjDjyH{|yc!!^-?5TM#ox%u@}4tBhj(g6O!-1M9afSw&=EBWK|i z#AYc#=a~Tl_tL3mhd3jqtJBAo5Vh$M__wfub{CK#E~E9UuFrvn*6IjXvtaM+6i=!N zdHHTT)rgu-!f#xof}F3%|H_%3{r>z;=5^Wa10KO-*dJ@?^foa~Q=$_YMMtjqC6uXX zU;kQWZeeA>UXNqfm+u;fP_^Y^mY;Bc52#KpQ_nk1ABorBg+W}=3e~k0gq0yBq(vuX z9<&e+=+AdJ#1Q5RR&T#SGDQ>NWJ9f51-yTw@NnkQO`NazW8s<_8k# zS$tf~aL%%~TPNy3j-i_pOl5m4mq9y-C&fqZm5{Q|EUP`w4LFXMPN*^JH^!135DiHr z0iZIIb8eDl!Z!Y{k~1Ny_6$BT4NY2ca$;pxT~+n|spab2&hNGE^Pb;8%p` z_L~aL(9tpB`Psv{UGF_GjtshELrzfi|`sP)P7zLVCOeDWgvs%ZB=yH6C zE9)KQ7WzMHa~|-Lra(P)Bw1$$V(s~@PG}`dt{xFDk7&OqXYav~v)5aXk7I4U^OjO? zBZ-I$?ttB)~`aRF#iiTuR?cN*KBZg%hEc*W;IW@Rk|7#roADv_>;L`tzoc{;= zWa@l3ci|WYk<-cr!-J|dplBO5a#(=@s#CSl39XP+PlXqXh(*p7;|!$N>Y1F zo4wyI`w7I?H7NiO!I^3M?;!{}v`GvGe}+4KA|Z+ns#C*u>>E9zt+KAFyqo%$V-h}G zlx>_!T*$rKo++_3Nkpy?l74kf%)>Di(BgV6!6o##vU^5@EM+oS4@)l3l$B z4ATWldlzl+@i7lK3aM?xBJpOebk(fEh z9Tn+MetR>bQ$$uwgk|Tjv65lV)Wkj8&MFu?pEOxV=FA?@my4>ElE(sHv;SCXMar}S z%$%xc`ur8X5?Q*L_Jg%furh{Sd9z7G%$4S4%ki5#MSCgk3ekMBKgCYo!-oqEK{IG; z>$jIQPenSIqq3nUcJ+P%Zp#tY1{pgeWCj9MwSw>K&+!UR==6k9iTZc7T?eDQ)G$6) zvW__>-Vzeg_^&)Hu&n}1jLMv(82j>}dpT+Q>@W^Na z??G9W5Pt7%Ir`F*`-6a=ocv)4liqgtOX;RLTo*vRLL2*ICt~j+^ozs6%_w;t-C5i; ztmk%8?>HkEOjwm?0g~ZXfKI3=&~UB2p|0xdd)2bQ8YK#c z=L$rME3?bl`J~b|^mYjHP#kE}85^wjdeUbb{cxroABOmx>4Ns1>zoX<-V=-n*j%Lk zP~QK+5%zw@5Jk?`JnGlV@%vo{s%l_30F2MX#prEoK{`qHnfgm#xCz#!e_afWN(6sj_PymsEGO7mq)bdjk#;vpvm(?j$*VwQrhrvnM;)?n z?ny!Pa|p|W=7_1Ji~8^=RugtN4>W}NrAd8&T5NC`G3`)YHw=v;pRn{FEEso!* z+#5-0U#af+!)RwnT0WB86DjgeW3se)DCEOIAdA;Vjezz^@@T79QePb4K^-8R3T$6n zYE@t8zX^>83llMW1Vd2AF_lfrZkAhr5kX1jqB&W`Ca^X!=L_vOrdQ>tQPkBL$;A3? z;MvcpiLZ`j)7E$I)f7el3=L3pj6m3C8;fe(+#5cZdJ+Fwm}<(rb?=`yg~hT%U&|#e zx`E|cF*>`90yw6|S}y$e!Pu&;JJ2dmLdlVJBn-JE@DctpOzmu;Nwx;>KCJEjxk}$2 zI?UW5<&d7!Xx-it^HR<1d1`fpb&raRng6iJSbF4^n4J|iRVz6VMDxbH!by*V5r%W5 zy|5k80@8U$Zke!5yV7*fQfqTN|C#PNf^0*L)|O3{c|R4yd;-0#bCg$HkIqbtnmPa{ zaksQ}I6UQbR~0-qI^N$oC3T`lkYC)LwHc$B^7Fgt$SdG0Rn7rBiMYtR4ce8Ool{Yr zI$GzY-zNkeF2*IE3TtBL7u&=EuNiE&?8uDeNNLB$PmC#l6VL-CxzlN^urhKAiq5!w zbm29*7~p#6dVl+Rc4fAesTT7RH2$KDk;f^nL(;@EnLOMU>`sh7Fg@T!c5Ws^z$jt? zDUPKV1SdWN?%aM64;L56JYLoMCB$!X)6j<1?(c0k9tlCuYJ4DbOtjnA*zGI~In=Vj z7NF!6JRrDTs?Bn>OBvcSF!x!|@TAxm@x*TwtXCgXF!SKv4wEHsOcWL#S+qXDUMz7m z5Dh6Ft#;=k8QAE^`x?OH#mNXsBAc#ApAT@~%=l&TVapjNIi#EZlgP8G2=5d!l4bYx zqL7PBxnE(heCgUN904icI@zvU>3b^@cQC=P7pQQwFwcUf@~wx4S=@YIzBdK24i@ek zA;!%A+9T#8g^q3&eugAee69svivsW7*rFn04^GrVF-y!ly>bGct32JjtM;L~{d+HT zfR)xK%gX5h-C4uBp&fh9*~-}2p6q^}lE^e`OG6>`{!_|GN%`o!o-%MBEtCSC-ORUf zt39$peS}A*R^)-~$w3=s<-(2w2Db~o+zLBD+B)w}6izX>w)ruBu7y69(H{ut#VY+h zp+~SFX%o{TbrPeAa;%*N!rX&HClz*(oT;O^f3!kU-82mjq_;7K zu@OjknRPrX)=%z!z@RYLI>E&$sRb_nOll-Ipe$QXY!U1ap!u*H$WQ;ZQ2r-?*#}p^ zBGB0TrvjDq?bF*Sv%M4`z(XMK_RcBG4+LI7e-!hKa?G@G0!s}nga-A|t{7{s8*C91 zQ2xEgid~Zr-eQ`eQa3_}gP4#jfPQ}D8PXU6pKYGV;+DK64K|r{vOD?G;wxF-ZL7_n zBO8u8FQ9Jp>}2X0XyKfvu0J21xZKEqcoPkV9Rwkv)!^;xzT77xX_2eXIgFI?Mhi$e zC?osUur(L*{}g!Nd{)pTJN~?N{C40B(KA>`$RDi_rlTDV(DZ%zkR9cp-k&&(7q@I% zWNO;In_Wel^7$!()~q%u4xs`2f?Zl_EH!pm#W53)Vnwl&u{Rv#TCeMo#i2V^(shC{ za4MhTk2(iS%`jQGH|pTHV?zXxL6qBBcT4YrCcfAxCCi7BadBm8#4&cb;+LKHp}y%E z8A!%c-`G`cSbuXvwc&=AIyBR@hNy5ebNz5i3B0V%b)k@OW{t3VWZv{W#IwRjZ)CKh z+EA9V^(6?Czo1~|mRBD6mcb$ze4Qs$%!>ksLDl1w;d1yL!9=^P%MVts|NExrp-X>I zauT9vHcxZ$+J$|`{K$1=>hdWXP&3Bx7cHHusuG9Yc2i5YNPtm@*ZxMh0inx6R(S7@ zJ}znZx6ob^c$=TWV1R0Ej-xe+e>WAWRO9wL8Q6zn=ifp~w)UqQ%Gfq*418@8*4$o3 z`EDW1V$pJwT^U*!;hL3o_+-acoR%?Zp6mpw3$~X<>+^lqt&bo@Ue>hI9&D4fGmeei z9fI2WV9GI#b$xDSVG{4t@EN2cq{pcFCjSK{;V;b||H8)2AgR6r!_*tg`xu6F_R61h z-7Ik#nm)bs1@f9?p0e{%t&N8)nYG?F;5d79P)#*})@BDMhZnIgj`<->7yYT|TkJqA zRrYT?;J?~&EbtIXUd>uRK=g~Ku1?4Lye_Kfbkf^dC;2Ys1mSbuuNYMgKSmg{&AJKz zDP!M0Rwy=Wa11U(BF`q4l-yp4VFR*m$tXEeN9WiSsmBXP2IJLZ3{cFjBS{(}e~eLM z3#M&8Koob9e5{!Ix|SsW?J8ML+}W2?g{&t5d3^p%-*D)BIk7k!r@*Zcijr{N@XL82 zhsCV!9RK(WZ|kivoi3)|S(Y-E+h6Pzj!U@6)WOieGCx#1GNL~v8`^l>dHq8E$CYpV zAqI^O?Sh(YEl(U}pMFT7U2Zl*@QqY+%{o#DIxI&+8|)|U?Z96*>#5tmlwX~JDSe?V zo}}2F_YZ4>Az{>3nG|T6#cwY@dzC+v3a!584dyF|qt)G-!&HRVDTvKQj!5jM_uH-C z(C+#~5p8O%$7-7{D3(NUWFWQ-JKke|j z4S99e%W=tZT%AsRe?miU9b{E>994Pt{`CwlJ5Xy+A@R?7$QI-6H|wZUmli_yoFeS+WkAOcU(Fwc7Ee zVg(K8_wHGsMqA7LtG83Bw<9dF_M1aV%9F(|T0o*E@8-86kO2!8fu;?Zj2Nm`)pzkq zbUQ!TUGlAM6$88pKG{3OM^rG1eOU}l4h>gG>Zp}=4ksBB0Cb(me1m=3{iH}i>jVD2 zf*N`KDw}PpqG0@HxJ0fQ@1uM74Dm&??ol-*b4}ew##yBzw$pGKa zsF~AJ1W%|+xjO4vrwc>`)OnZGkmzrTPD1sOkMa7)1Lk#km9lf(2xcEQcq_5S#UUxD z&dyULW2)xK@F^vWn&EiFecJ^!ZvOq!m=ewB-Um2A@qwseRMV6Fo=@Kzq_NTV_Y$y1 zcQNO!s9KrQC%qF6B+Qr$W??vYcETC%K+dmp zZL{0?g*`!SL#pdtHZnEj%BbnYwe7u?9@$7U% z7;&|Qg$=KJ)GYOEXVbQZ-mb~^p@6%$fz0)c-<`%3O`iynrz{wW*iIUd5*o_$D{ebz z*uWnh4cb8M^b)rsMD0z7n0?dl%x9;M`MgC*!yO5rrbZC^Y_v9_9Uh}ARE3kvNH%tlZJ-t)_+pd8Fz+5<>umy)b{maDZt z@3C7{jm3C>km&)DkO`Ap);Feia1_OmbFkXT!hMMXDhe7c^&lSQPwxh6uZRIbiPU^H zPijFzKWamHV7~P;7yk>YWn@TV*UXb&TaB+vbWQ zi6aJXnHY-ngX5dvFFE4id931wikt+u=|toLGgqa^Dce3ij!~7_KEmv^AmyKBFMMyU z4sn9BA$$~J>+|BHqs{hgEg1(ZCREXW7ks=`p(1J!SnwKc2^nA#+K;tUhzbe$=2g&m z0!pJjA8((AOvH#oj5|~g))mId7a)^|u8*+2!c!ui?D$8&$vrKwF3{MAPZ*UWxj>5^ z`gg;Ic`Q2G0w3Fe1s7-mu{mW_dv~zE4&_8|kK4wSO zglz4{hH#N4Xgp5$;HW#c#xRy=dqeQgIhYL{*2)RhNf^ZxijuT=2B+F(!ONo`;!U<{ z?AV#K;XZw*-rWB~810AD9=Tw#e?vhQ4G0g^L<(=>O}G;Q_gE9xLn6XUxXNI&#$;6w zGke~m<^AKynyOJUxyA64DwrHxQ&CVcE=tSrF7^anFf6dpUy(HK?FWE2$l&`@H}8kj z9LZJ>|Kulk&afYMYB(J&Rl<*>r(MSLyhfAs&vQy0?_HJedi2liYocgz;7qGF-aF-t z=8Z&=JeBa=RT$BmgKD=;qe^iKP=7|MZ%Qn5)?cQMh5ZmAAqiA_Y^^ECLt6Zs_%_t?M`h#FzXzYEpU~$X-B958x2A9k z85uHB#Bf@FUc;dT2UTW|@vtR_lFuO}oH(reZa;wxBEKN1G*N`aO-gNY!`DQ>jJROrY#Dk%{WX#@_-1HtZO zHyRR~hLKSnkeHS^=AxNEI3c@$>z4+KBG`9wJTgNT!%Yg1gaL9#MV$IH{%^*CWDdGz zLqpK#baRxLa@ za9IiQ+U}DRP#&TE<|mN7&$!v)Pcp%4qy0?*4d1k2zwV}D$qIA?CR`tI)>Xo(yeA0y z({I~gw617tRc8eIy-P9Z0>m3vRMqx9cfkV0w^~CpPTa4Ej5MnmZT>x#j_}$8WDkPEGnibSkc7CkAMS4W*h|kp^otAsRhM(>wan& zmvTX{SDL+1$6ScfIixpyuc-Dh^QM1Bv*l^U*fXh?_wDE`4d2%Ld+(32J6I zu8_e;m)XSy*lWo`?n;q-&zson9cNcKoOAHXIs}q=_#^n2Dvx3ghik+S{IaQi?=Pjt z?(C_bOt*#A^mu*nnDxOmt=zIw9J;6wQa07KAytIAx5G>k5Cnd=XstB$P0QMoZ)cVC zlZHBiY?TSyh3vd*GRN#}7#GB}fnmV652(+hLea`1XgE&1E*2v7ucR^ueT`ht1*y@q zk(hCb|Ak9#lt0Fm^Gg@7PZO<(uU4;^XsYz%_Kh% zz~@rpA`EQerzJTq@_ymGVlbiTJGi3du;*0NV6bp-$wXBIgY^yE6@RbT@OLu;uW5a6 zpz}vFFmO!~bhfgRq3SI9OI0tyi6``ZPy&rj@gU_;<9@{cVy?m*!xXsk&!HL#AQmnn zV!xMou8^h+XV|cM{S*|QkzwsAiZa&#V1@*0Yf+F{2^NrV-!gHu#GvIwk#ovEUcp!? z>##M&etD7$B11zCh>#;$W1|&frDZ${>fchtqWZxT0!5sEyf|tE% zqjf`CW^$@vhKgKLL!a8X*Oa579Y^?1Zl142?mGS!%~TvaLu2(iX~;ay-dVaYp#WLf z;2N|Xff6HzR2zp?!?d^+Il>|DB+be%Ix@G8M{7W8#+WnG&OIap6_pTfW*f@>DF^9Y zRV(+Yz_D9FkRpzQbx)y?nJpqD#C`E>VO#;v!*BZj4<9C-L=-xtU;8_JI3=^3VWS^X ztXoRTqUj<@dzBd;jIE~GH)a%}Bs4TlGOUPNb{7+p_^PdXEDz@%n12f9+HFXAaq*d* zV5S|~Y0fouOtYewvm~DH^ZiYL^}k56@Gj=_w@ChHboBJ}HbiH}47p5tQifpvXi|l5-KdCi{Z(r@P09#?GMA`v z+%;6l5VKyn5$u_fmNK(Q|V4x6-{4R zJw4BjlFKRJX7=3*BFxZd-D6qE@q^e|3pGR(f!FCatx_#q?Ak_T)|@=BugZ*JLbn}K zeRSO?n^f{TDtZcejtcCZIMYIOFtoVTGQIa)x1h}k%WB7#&J>`}ByksCq<~T&GI%H+ zqhK6wZ@jh>(j*k9>| zkB!ub!%I6sSNRHxddJuTOfRS-a9^FTnRF1oO4U?J4{ubb~shcked2HOYr)Q}|D^ z>8p9JT+u)@3XjbjEHfCQj7vQvn$F$66{{s5agt*pN3GG)vVv*1lc_iuODe%N)GG#zw9+CfbF6OnAyi_*Ij;72|Fg42q7Cxn z?hi(XQS>0t#CN&w%Xw#rud9EHy>i=O@YZgI0yPWQc-^d+N+3BaGJ}L)KB@4GZRZ?% zulVS=v`t?7kSO#mvD2kfUpx-BFVp{b=7E7MzO>Sh5Ra9;gFPa~2m90ASGcFjKm2|H zQG3RYXNok0Dzh7`GJ^?17N$SiM_eqzS!o*=n{wUuzlh_}VltTeOd^Qum!>`ReG(5o z4VD`Tr2}{SQzNa{Un_q5Bwq7|*^SciS2hrmGSh<=Epdq^1vQmXDb)nL3DF5V-u1iS z?Uww-cB;f&E26Hp#F7pOXftS2_)f<7oKgW}vNo#t6+*Nt;BBoeERrmt4v=?y2PTFf z?9nL+!`ill;YEalH#OJPLe{q{BegT~Br-okax{s_$=@1Bh4tN8vQ`++T#|()`#a;~ zqCl&X`es00nP_Int7P3N(}?y}b!EKQ6Bt7W2G_|5CUcx#nz(~6w-dfwnGKe)GVaXB zyO#t<&24RG;Pj?%(%=sm9gJ1N^@8F&@D-O#H+i(YC4LV(2o7Fz!?`i}SW=W_B1sG=7vcQezUk6_#hG-2Q5`PuvdrX< zb3M=evvDSbFqBq6$T7mI))J@vJ-t*W#g5L3NHI@osfDpUg@maPGhmStLyG#$jMb8& zhY2<@mz=n7xHstQKZ{Fth?bBXFKe0)et7~h);2_@3I5}YdEaRmi@?-~#iE{+9?2EC ze(EnYJv2!44lhQ#(P4I1=a8JHr2vs^>*@W*&FI_Y^OB6CXw%ye7OW@2y)QgWio)^KJ7 zX3C^M(v;a|4F4OaU?-0b_5sI9)BxxletFlMrn$`%+ zfE_f$FXEhvG0Ts>srR~*v+~&AkltI3p3y)ptR?I*q+n&mC;dSUTyYOQbywh%81KH# z+)8};`@jQ#{Yyh@$?0gB!LSiW$*KMdp0}_)FS>3Yp2h8wL%LmD$w=X*L5wyPT~^MX0(1gv6xO-}S2E<{Pjv zDll_+ywP~q4Gh}Uqf)C%rGv658@PLytKx43Od-WjDw*x%&4j3b30V;<9v( z6&vTbI%8V2qgxUtF{1*AN$I1{GQBgQ>srMlPSWv*U z#xLg=7ryky$vbCg&RTr9i9VB-j_&X73^^g+t-Ru3|E+C(JQ(di@@zd%o7r=rqbJWq zC{PXV?UCKy-X8e^Rz6V4B>Qb!lvPxM&FBa zjX;45i5J1XH0J9$g1&+DyJE2D;ZIJE7(axi4z#n0h^=0T`?3UPxbR&pIXAibA8~>m z_kU{yl4p=`DQhx^jo>klORC-ZO7iF2wNP zPyY8+7o|M#znHE6uv=faNl-wi`#-$``u_o^8qt(pSnl0y5e|_^T!FIpuc~Vksi|v5sw>aB3sz)K+K2FQ@YF zXjI{bcMgVYm?ozLEjLTn(~pj?rr;Bd*#h_2Z?Jsc&MhemdIBm?Rd5b1<>*_=9xlQY zu`!^ zh+92le}@~!;**Xjrr^_R)YJ+q6p0FDI^B;PJTOH1;gFyN&gG<#>CtMa5mC$UxEg_wg$5 z?{({yf2mw=m>2EXraa$Z@O@$isUZBuj+5Gt93~rJ`f&{TDYH9!60-{`9bGIUapq8) zlb( z?gx1Ke%RxEb28*No5mx*Xn~?Jcg3*(m;9SkmqKQdN$!_H8)JG-nFFn){WUG!^-*9sogB_jI>!HBE9D(kk z*_%a_=vJ=j^Lm7Ym_Pex{IKYRK9h!M#oUCm?fN_8Yj$~A)_ZCbWZ!;I_2in24L-YV z?cab(G5sVcB2 z&IiF=&4z6|{=yJ$l^c_M%VpyFJGDG+*138GzVAdJYM%uu@W$+dS^Wf{HHsRl6z!I!wgg1wvAf%Cw0Pq&M)frb4%A_= zUJda+$|~?4Tn>d;4MV~zE#wCBU&$L?0VzXMl2aT~v5o1}PP{)w`EUG2PP!;k(^o~T z9iZd;G+7)tDmwUv0t4t(_l@lz<b9@6=7V3KeLgPLXXw>g^lSef&7-_73Rr4$Rj)!vtbqQ8;1w7>rFhv=$g^+x5; zmv^ws3B4SKHR3yNaX~vyi@vE*e#ZSWiLT!*34lAGcZZ1Ma&h zRXWHDZLTsSZ9Y~py|AR^fk4{fwXKyWxv!XIaNX%F0#U*15$AV<5S<11AK!Bl$r~7U z^e$`5Ur<_+%QX%9O&Ux;@!bTB`|2ZU%_0c>uFPIfj&+cb-&ke5j32T+!i?IOC+`

}xPrGj2qaA*kUSdYbhAFa;h)^iUY*da=YeP$#X zau|mF`(@O@O{xlx&Lq!Pl?ToDb#O2ZYtws%7lh%b-mUQXJ&>{*<#vO3?&K=-W9wd_v?Z{hle;uo2xo2u5yty{x1*dJLka4=lVm5dj3%O& z(k{Qq0BS^N@)7qUCWwxqs0Ek_A5|5^-jJG1(tn`+AG8C1n`21Dgy|T>IK7{#`mQOo zD24HOAAeE8?tB9P9vsVgDB|Im@i<>GAX#nvMYaa4*brXBWy61Fp?6^j7PfqlrhBO~ z4_)qzr^@fH^NS`SRqb;e)2q zV?*S|I?n5ZeP<&}h5wAmn0h;!QBN%G+<+>xAIP^Nf!mO@)id$8Tw?umX47j#G-U&_ zdrP}50uCHaLBZHu7_~iMn(Ht-n{JF$x}v3-|KYa!*6Y-)W^1i!OMA^q+qWZOB!yjy zbx}lCyd5`v)_Gnq(ZbwOPPDkxd*I{y{O?%P;d-)~;nkN97wU`m4X0_o!}VL99{c$S zPLJ9seFK13aku98ow5cZrHc5`3ghf02c{((d;p{KGDc+|C>ZF3t`X z-X~8eMe4PzTwL8Lx-|fze_ZL=^^kMApXudAH7RRZu2oCa-Tg{=e?hFUfz|MxlaD3p zV4tw*@iir^&8H)9OcYRBsU&w!J4`j>)KVT#o(j`6JQ*;*_PlMCtkw0sOAhis3I^Q9 zd%1ims_kdx4$bo}X&X`Y>ToVLOg;Tn*`bZo%X!vwVhS(F!-xGk?o}zDSp3JpoF^Od zv(XqIC5+D-CiR*nmP0ha*m@t(r!9)F@}Ge`WnC!L+)fO#HCWtHd6)3}#>icbyZiN| zQ2#)nX4=Kx28UfO6}jWXj-nxaE%(CEc?9>t5L7ch|FEm}U~FR_BX^DsY)Yeu-Yw3W zJpafc|EF{&e{E21PUE036px%PkwD+*jy{5F1_u9RSgY~?sH&zBjB%-fV42fa?`1J(T z1{P#;b!O>D`%CQ`85$z#y!}Erk12jI1!v8lv_5s&wA0i-9Gl0Z1?=`UJ!1b!)J#7s zHgev87k5}WJ|Y|r^OyQor8YBekAArjtK|7YCOSr3IlU6UAfNGz7eU}!Tgu~Lh4tz6 z0>t!BtU$3q$?EEvqD|-4Kgnpuv5*WiQOdY6FY|F#=Zw!c^!FM{tM&&&Y$}I#h02q< zIxy2!(R&XruK|C(@>E=GuuA^lAkb_jg-Xe#1fN+Xx1=aSk)w8XWB?jcYl}*qCPQ-5 zE#)@M@u;#*Y)1J;lwhOl_eOzgGa+BJMS0k&8jtTImilF5g6B5eA)@KL=ON2)DY&8# zVBtPyJt-sp#vD}>{lMsxhw~>4`UWZyw}n+k|D|^R+f)k>ie~%EPG~vFV6)s@{DG^i z%PY~rh1<&!RWUDj-pbwilUubwm&FNXWj!C3ROe66qQvCG@62VO$i{xlkrSX&&e`cz zO@J#*x~|gYy2=fwHYM|5aEx!V`OmKF7S7_juu?DHL`Dc^}0T}EyoP68{DG; z>Enx<2EOgyOP6LuY^LefgL6MA>e$2-C3#Cy){4WZbOBrQ{Z2fuO3y3zyA%wid=Bx5 z`C(QC{1bY}bU6%8nD-f{FOETOR(lMvFasLqcpN6Z@Mx?0U8@GNB5YkVICU zVg9nk;bc%?MUR1wWz#y@BuD8bpLrl?z}B=>&9ZaPx@r#`_YDaek&h!JXRaeMWTS~D5S!9gxgO6@XgH2^XCU$Wu@xc(%EP5H&mce%9Y_EyyZg+h7vrXXH zo5B7Yjeu)nvylk{BNZtb5mODPD+N^ji<@%2m&FG0Rq(Rp#1h*+2b zBoUkmyIC$f<1K(uWfS`x(^F#ya1X1XeXMUfF$};uPSrmj*_%s+%e7)*E`mttK8lTU zOBJ1U*hP!p>DLzhl=+(si{m~_0oFqsg;{C`RodI$oochl!qiw$)5LtZZ|9B8H&#$1 z{QI{=Vz^{&LmQX$m1Oqzlkw+GtF0X#^^9ysWUvsxCZvk$y5St!2uKH8K3UT>>ZXfh z9Au2Q_xE_Wl=9+w;LD79eZ9jwOw)$9s0fJVjw6KBdr2{xJ_VGXF>q*9+T@ioo>OCS zVi}|75|qnK|8nnSB2*n@oyiO-gD59t+;NF=xDBHpOtCSO-U%Cz@iXz~*lY(7n=zKi z5eVT_|2qki+-XLOOK%R@*)gOeCY&UoNoYY!Ovskj)TFM+%F(gS#A zL0Nf3=hd(C$LsOeYJZUTbx}bu6w6N+yDPPQQez{CnYVFTYv_B>+^UGgg#jG|s#s9= zR0i4Rv+l+EnZE*XF;q+`))#R2c$hD2(0GA!x!yigk23J@P|rZGJAlWodrUyLOMapf zsP}$Cea5be)pBlpGwxEZ<>`=|YRH2suG5kA9`=YtF>QbE>m<}Mok^<#RhrnQRg@MJp7(zi-LXNot~5xNG{T3C%4|00EJQg*NltXpC3_sK;8 zLlYG$h#?x^&a0~nI%GT}U8Hi_zviS4nMp`M0*A)9f!NCPvj&{m--e1{M^QMAyC$L$ z0yrpBaE%fLA<9gFr|2zdIoX5ActOP8h+LpYY#dFJWmZvlLyW#@=C2ce3`LW$l5{2~ zd4PKM1BqGI*gnQ=q8+Y@ScEaOJfV;enx^81$M{FXA(Q@RhN~CGzOwRK)@XV8z@u=5 zC~9opQUXJFwXk8WP+3M+_SKNI1lfEx$qh%O!yNkla&W6FTkdLkrb{Nnm}x_C3x+yk zrZQF5_idciUDumu#x9W^ahV^1V$#Dg8))Q%-wljgVpy3E$#iQdtLSnvpUhv%X%q}2 zsU{kKs3D-kDf9F8T~C7blaho>N)TzVi-@lg^#=x5$Pb+jGTodJ!Ot5FCJ_|QVnAwq zPfLp;88joNm<%_Q3<9CSMUvjhfH@thOV#1@;dEt)*SN6kJ0YW?ieFc6kda}HPCyly zcw-dJ-t2YJmo{R-d4i#_y||A@NYxE%D(n|tJ(S`Dk|?E$sHlTS4jZhrVKDSx7rp+j znO%vNBC~N1J{u6ohdI9OxK?u4ik;`ZdUeT6Kg|EC-kq&E8*cw6wv%x>$g|RiJ77EQ z_nb=Iz;Dx~U<@v;i=jP_8qRW<$c-f>>B|C=3uzt0>15#8h{cekYZKHGMk5nRygkB6 z3@V`G(z0WaA;g1SCKeHitw*?+AuVaAYHx5TP@O{fT1oFQJaXoeRI0*M zsi@DGrH&gk6*WHoe6AV%t*)cxw&k(JUP??D)!KSRQR)w`G3BO_wIT8xhvk7@;oHqC z)wMW4sYCORriqIOIx_{#l(LSN$Vy{AYU&xC2MN^T3(^2wcntYsl1N}k$w*(jV^ei< z2pNU~-qu8h-Y2f1aDn}CKNJkhj=C{_tBlZhu%u-2VRfI*yAVARp1~=v&nuebEWjVC zW^XF(o83g?P6ot=MArlsqwFMmgCk_v7dBl6nUQZIXEb|Fi<0Z282vT?YuYs_XEcGp ze2H9G3YkV_ua20pYm2}t-MhYD{iFkmC<)L@Gjl5&K|ITmZYsU}=9F`Wl;m1rHfw4T z^Yqqp?7)k2eMOu7wtkf;|2(p+iP%@BBy>~)WB~be;4vUXnTV4mbhcK4&Y=#g$(Oer zDk7pKQD0I}Ic+lI=j~(+*U>SdkdiGZC^EzVQyGD9EHB3+dDm>*tfM&)qQ}eMP4|`G zftUh?MQT|UPx5iY?YOaX(5~kSPVbZPlTc@j@#<9114z5|j^LIK!=;B4LD?Fo-t8E7 zJ$(Adt0sWHW^Zog&EI^2AEima5<;1mwe$0SiTbMyVt@be_w&KlMqv+USls62HR6Ia z@9hvHYCUg1;--7D{b^5$`MW`AFrhDcxZKX^^aTH-CDP<W5;0U{wz|g)V0|lUhIqz*!dQwS#_xisINGd-d1|a2TN%+TNJ3ZQ!-u|k;kycfV z{o!^zEAj9Ut-MAsBigmk#s*CW0DVBdUuc;s|{LrX{c$=&rZ;Poxy#yJxpg*0p3 zN)nL}IE^)UV~l&LV@2|L#MMmi>d=6X_IIz4;z~akfRGhgxb6&BL27Q)!0Eh)CH7tJ zBMHhMVuG~mzZ__=AQo$25kjvO5hLomw_)WZC`dYE55i(=FSumh z3LsV3rGqKZkd1EwLH^f2r-U?Wa=woK03)>&f>5D?8Vw}W{9`c082`jv<2i7^_<7QF z#D)VV*m98=N(FT!n^D$l5&pkgfD2R3n3pff?mCk3V zrVon|S4A{GvSFEcbQKEHP|5@L?_b_y;K@>g4Rx$k;{@Jwl;{4m{sdK)?|*v4MQ&c> z1EvfYC{SN0{cxC$ng|&((ZQR>!vB#<{~S6LWjmU+d(jaTR3ZD@4>Ms!cnMiBdgJ+) zp(lc0sLdEQ6B~$=oS*w8D7w$^Rz?$y@5>!&1${&ujU1{9#>JE2m#sZGkS#^!DjC5+ z`;NDR^xQ&tx>&@gvyAJCQbzhcbDp*}0}*=)iJsqb7xZU+?3=yr-~o8u;OrW$!PxKp3{DfIwP^GRbAs6hEp83mAiKEXcS9Hn&%lijLC02!8Erb zRMF+T9$y=L+V0v`=TyNR-T01xCF*MMxXAH}9*I|9%*^Gk&^zDGF1^fM-$^>=q$e*w z$;>HXtgQs=q=u-V_OV?tJh;p8pO{VIP! z%1#Xnc{S7Ayf|R?-|Hc8@@00DzxUZ7rBL>P}5q)1jYn5zzL9xcX(!-ouF77-sdkPa6q z0U5$T5AZCGzqfHRWC_S=c~U%cX$FHIL(jjKdLOD*b2zh{KjgCn8v-JUX^2CP6n)_&Na5PKjp@{=H`@dZdP&of_~jaMb|1tH=(Uryix6_$+YWvoK<%E;~jl_7w5*>Z+5nnimvFpKX(`v4c1WgcU)p;;BZkwBlM z(xC~MO7jt!Eo`E~?K{tFTjR#~cV2H_%;vGbN_c{fEx2#b^buCF-u#9Ra8i9T&M_9l z%>YQb@!oMlpF1Q#RHTnX8koW};!79VZD&gc@2-+ls9|&$hsQ@-kVO*Ww3YJslr&@g zuJDWqV!o@Qn^{UAF_i|SZ5f`deps^sbFqG6QLD~U(1vaCjV~E#1gcZb@8q$G!Hes* z%oJ$3yITRQrS1nxnZ2>l^i40y#DBt8WWS*ABHdUS+f0e6NFloCf`;0wm&vxK~yr&VDYcV&Gs770Tk1VT%4Po+(+No}j5aXNXHjos>5M6RNM5j^Z)x z&CL-qurLhd2mu#Kx^BsYI5eIWGApU{4c*|C^4j=S@a(?p{CnN@DgF`pgV+1BI5{|+ zdiUm8{ztc)&R?)t61>frjB-WcbD{}uZ|(@6x|ml)GK&$_`*7&wxvwPE0Ca%M_Wvo(4z&=rjFaJM}D9B3zJ zdFUk^ZwzklaetGkUP}?uHmBQLvF?oVtXtv?+I|a<TZFTpMws;I z#G&Z?PL`fW(e-u`>9mPSXaaP^;0zw4ogO;ZBJD;ix1ZjwZ3>#00Yul4@JxoyOtTA< zK=Xe9IC#6Q9N+7{b86sLyF_lhLnQ|S7>&@yQwkcBI5ZOiI;yPLhmNVKS*cwX3C)~n z3P}J)X?pnJ_o*^Ya~(#-45PyOSH{K|bPa6G94}{#cAw}j3bHr{3OU2lA9?Z3`gP4p zD;&Wayb?Bh2#d^EqymGT7T9)!S5G@n5$rg!k#RGD$1agkGWF-W&1I!LwxrQY$qDnrqC*- z3TWq%(o?&rsK(hxBku7cc(TplQj%~6x7b9`XLozo_ej21a>-~XdPJumZ%ON1Kex`n^Vot`|V^_btWMLBGNEabIZPSUq5Zhli! z)di@3U?^)iqN(goI`xGjsf{hRGwJRHfWA6kV9{I6S^A*y0wLo(O+)W+Xl#Ny5RAMgK84*^)ytX{}##!->O0 znDk6Mt2oDC^-)pUJ0c5PT>Z$&0^c@Gg63!}$C?y~;;-u2s#qWY8zCFYk9`0kcU)DN*WKe7A=qBx2G|Xq$Z{#fDynG(JbKC zk%85T`5o&I9F_@R-4Flx`wp|)*YLbvPA~x%(yJv)xpdH;{yG4@@$`$c*vOFQ|@$`dl3n^t>T`6zmuK72#B+k ztx#5L*sTq00p(ZID@-zmBMOgZsfg3a#9ZcfmIDdeD9kF^Ko&BlHP^@ zf+}6hD^>C+Ryk1l@ zMezBjdB_vv&b-?OZ!n0ZtQ8|8#KGkb?(@XOMF<5+8d@$$Xvu$RSP~%|(pJMY(e7)F z3yKZv3z00A8${(T7)m>yBUPKswB(^Zt-}!Sx2pFIyvU?Z?H!paAhJ{va@c2g^W~-B zG%t1XF9qmwTe&zCGa}Em1t7yoXei<$6XbEXDhpbDe&{GN6uX(^_6(hd$2>Pk=S6P2 zR_N1{#baaL<~zk58x2q(WhY1mS_WP6ayg`)1X}z+S+8R8C#)n6#Da*K!XM}2SF!mO z;KbN2n?b}RIbg2GrzlJ)p>Vc{Qf-AQ(~{U{G$JIJ~lDgzvrs|8$RPl0S~JP4C7}ZR6H0`Y=}iM5j$nQ zzZ?IX00)C^(c%*loh6{GAYrUYB<};XxI_;c#uq`Ibz?eKp>KyZ<(mNc`YvW&D#jsOpaD0u>Bau2iw9@;c<(PV>ePdkc z_)PDXn^*g!5|hb%|5)=%#d%fQ z?}NQg9oV~}XJqW1pGN^q6nni(0)@rJAv82J%;za1i*n?6_`Xrt?vw`IkKb;YLGM>| z=g%JKB>zEXeGQ)T`CjwMhW@jCC#i3c7vJ^@-q6fbuyje}CI#oeBw=hwDuL*^9xWoc z>l6w-x2LN!fM7$w(~NN7fPAH6Culc8NW~KoIZlpUZq-k0W-!xgZI`E2%$PsK~sek7bmAGi&%Rp;QKtu0vO`PZhM9bLi>f$dqWqcpujbm1jKfhB~#GQ z3S*IE@6-g|0jDEy(K-t@zaAe=nL;m`agT`n&x7w>%I}=_GlCrb|6ncuTMqxpnVLY#*BcnASt+WGyRB)$G}xltd(S682{tg%*JeqI z$^^NSefxLXPoSWXVDt(KZ?ph$8HT(1sg2X( z+O`Y=H}areW|qQ+jOCKlMn8t_QTq87nH$cK3;-g zuS7l%Gf)oBzBCT3U-sc%7GYn--hp`EUePSS>NCpM`-)mLD-+|GJd14Z(qQgYIBe)||MkuT@|7Sb}DMvkU=J;Gb!;hP_idUde2P<7@Df#FS$ z*Z%LW^PjHLtLO*IS79p%+CU(I&D#>vl9PQ;b7WRfogN1^#piR{jR3TYp3L%9{lNS3 z^QaA3vRm5u&0kPk1gX|53uoQz)4Tgw+{Z94J>)MaYB)b7p4UITO{heR+LcK1xi zae^oerP~&gnZaYe=k_Q%t-&^YaS~$%nmXwv^j_SCDVo8!eRPqYU$L6^k{N*LyorO^)~uFPgY+p#rQsTSQ^NDJ1^oLWk6L1Gix6SDjm;oh}X;16LLwdwMTH zI>i5YJ(2f|_5FB2RNHdvC!^lk+|z z<*)0v1UEXn_d_%9nut=CoA`7|?d{QvGnk5ZcN(r4g)uJp!NtOA+1VMc@aH`kurKUn zyA6H!hoSZTNjlBnW zaI%9dQ$2xOxyDikw$GHIy*s|3Ks}iAPL}tat}CTUgwpcP-T(%8eSE(m0m)fHzJvEK z4`Gr62X8-u!Kpv4cPAD@|M`UR|9#Cqqk*@0S0-`91XdoilQokuEN$@{b^oet7#^NS z3M$sk9q$;v&~mfLh(%BqjlK*o?yL$~_wh=#sy4J2>F3}Hj8&FYU}j!q&QW*baC-cK zNEx)#v^LLsK2#lUx-<~6FKj-I6@Xw2PD8^JScrp9GcK{vh?UZml{-#(o3q1v;~_Q^ zxhU`ZgqXF>4u{7hq*@U@B-4D7`P7#dlgDHx|7xqSz#Nz-aj<2(e(rvl0{MqyA&eAJaTY%8qve^n^KqiS zNBoRU^nVjaFhA=|!!Wl6Ef~pWqtcC`F#MfCUy?lT1~FQ_>YgQa>08htp=Rs9;~8$t z$Y2LkZbENin}(PPMIMrCM_YuF`EAYIL4xbI!kJ}dD6!olOn~EFO!Cc(F+V=Bv|I@k zznp;XdK-R(V9y2z+9FCrgcG%>*v)}EPq?U5pa2*K1&xF{AKRk;bxpe19ic}U;`u6h z1da5-pS7Stl&P$7gv)z3g|x0aBeZowfD&nOwAOK1tDx;JdQDKt%qfhy3MIdRZ^_>^ zH!TNug3^5yu?Xw?#f`k$wy;kLydzp3In`n6M71q5ea)y!efXg#V;&9pN*OoD_FGaM zDpSEoI>%{j=}^x!@a8SEnkm`Es(5Ugx;%F?@@~bR<&J>siVtnhSfQ&8E#}1rdhWBm z^VU1-u+3}cYdVMOD##egzJ7f?N+$yJsdIdF5~f83AsHcbTOTAbx=d2Xs;IP4!1*g? zL$nPB3z8O;o1tkM)zaw*=RHhn8l>gw+Xx*`s6kQUm|L30jkx+Pyo0IO@7q}fm8h8O ziWdmkaRF2m$=DgtQK*Bfjws(V4>;4brLm$G^Rh}4MA)hsTvJ$$3_hQf7JNRL#zbi@ z6cmN2&pWZ}CpP=eHrN<_Vy7d9$D_e%Ri}t{_;k!itJdciCUu^G4zJE&)Z~~*o+*2J zvfsvRu!&0+SJ|S;%EOn&EN*~P`-Ulf#cVQx)S@MuLwg6L&qTy3-O8TJYosLY{#GNB zlztA&t0sKQd6=gMqq-!AoA0@$ySifLbf$dq?RnLjjcv@T)+>OV-7yUq3P!1Ew$kVa zZ(x~P6)cH8!$lFMmGgeOQ($Tp}!(97{}+Y34b(gtB{Nua?8m@zL>+p8)VhjcS+7RCm~?>7Br| z7N4Eq;ZP9dl{x3GY7BHeFQoTP)k>~rV!#t#+$6%L7T5nKGiQ;28I)%CEZDo^amXkb z(qAkrISeM&Qc;C3gt@Ms103V~O1pFF=$ zvai2QIT@J(Xp}cC^*NZch=!(OQE8@~x-)_&5eq`4W%bzoMQW8aR))j1gzVk98RDQT zFdbLw2mE(2a_d~ugd@U6z``=QA{Zpg*J=FHFBR|*N3=K`EYV+IY^%1)OkF7g*M)|b z+ey%l+_A1ynRi5Fc50KCvuZq|-$!0xj@|z|E~*b-g7yfRx_uu}9K=gv+6MdTMQE<( z!LK_;0C&u5@#_SHY)VVapv^*uuhi2Z$D5@sCef;j{0*zp)I5yD=5WnOENXrc_@I8v z;s|kVi)yc|{}Z~DFj;y>SIZ?NB_jfj1ONqt5yh!0g~WZF%zrj>Usf0K`68TMg^A%T zx*mfn(}xzz_6ze-g;#NT5dUXv#sk|4*Mzeka{El17yv~^*V$hs9hRPaW^YqfVD`5y z{UFkUsr7oCLV3^4<7yM5uICSwJj(UU0t#;Tzk0E|6F>VXkmj&FAfa`u$T<~Ne^Q35 z=pdS-ZWNRk5 zyVLS3Bvt2>08A*haxD9i^wDEIgV|0|b7yLDst#AH@O&<%7rsXkq+CRdQ|!aRmhi3i z*g>i|Tiwb`6Az29rOQbNV?Rp28oC6pMj>Wesr0}yc?#Xn-Ho9N65<=XJGOPWg`eNB zWOrrC_SB|NBrj){6a}7!b12-VrMlr-uCimF3IrvH>N_>K1>`EZn{^G;M0hAAaSBi$ zRj+$y?C3K$J(y!lDbKXctVGGbHW+$b)+4p1`c`uQq5J8TXw&z-fyA=GD%>RI??s&E zKRK~C=B*M8V-oIgI`pb`R}Cb?Z=6y+{#jkPJLb7J0DEdyQDG@85)SqITxRvQG)zdxolmLE2grwl$u+Hg904S8P-sKI=v4=s|<&JIU$J4lhr^y?sV1Z&w zL)>Z4)?ROn%7A%j{*GHOZ)3{gHTZ5r?o8(SGJhnOG}d!E`&v+tTMg_%)6H{ZovEp98IeD{kyHU-WiCu6V~wh1jeU9ol(yd$~{BIDZB za+UycKwQ%|ceFB%!|4)%>ceFozVbtS3qcux@&uzssa1>Po`o)Jcc5ScMg*5yI+S@o z{wk1`-|2%=IXO{T-WZ6cw>@y=#`IE?7VQBK-G?*JA{Xm*{i8`A(M}v`h__(XsOfGuV#+AZHm}Vsd@{{SI{4^z{aXwm z!rK#@6Fs=JV^LstGt-*EtHrT3DHJHxaeXd32q<%JI5sh8NezFC5#R92aw1Vs{=8;H z=EY+Q(1Drc1hJ=!nw#SbWMxkC-}P1ucXiUYV(enUOFCD~^1JyKW|x`2r$NZn6?WBS z1>=H`M@AmyH)HC9_Qf`G^QdnN@mE6UaC5{WYP_1GzYw~}+8(U5Oz20F#g)vv(Zz|U zJ?N8cA!}7p5u2?==kU_UGSG~xZL&NygU#@~B$1>Z({5i0R%;ymD0gYeXC&Xq5=ik& z1%JQ^{pT!)ZZyV7c|}dLA@rxe4@>Phd5+!hhI_4!x&^Jc#qo^brakNEC1T)yvod#z zcd`jg+a!RFXaD+xjEtBBtO4C|O2GxX7E*6vV6x z+g@nzj_JjMkU9)|v2g=UHG(#C#0teB1XRPFZW)F|>R84Gr5zz992ls{3g_xOp!yA= zpBz3GSq{yL9nyMZ5fM-@70^Z7STf>Td0%l)!sMugbkj_oCj&@xQxfDsLWGKPcXdoj z$uycO+NVl|2$zA4$mJZsx5Uo-r?(Pknq9s6`r`-#1<<)cEO}LY#@g7qM5jw-FTLp@RohCJ{bSKef1j8?iPYbn|4&avM3Dk#-7a}GI+62@3-X(=z3&*Vl-j^Fqfc&<$n4~j})R1 zYyE(JyZv2)le%qRmKr-PKb~YRy=%nDDN0{OLEZE{fWr`(R{T6e!)crp7FGxCNi!!5 zcwjFw$wO*ZOfn*oWI*t%jyVCtJ6Xio7gK9pWt)1QC7j_!jAsFEf7dp{kiv=ugNhiy z5zuJ@*540UPQx7eSCOeun%?u5PKkv*no2c_gDK|1Ln83xU(Vf({l(h&757v! z?Zv>ovX`X!1goUmISDIi%JS?5vu}Gc*hmBeX;$T$WN0)@UR7Rl%{|dRNySzRYKMWw!{pcYZZbLy+219LOxuh zs8o$=-@7vWog}tdgc1bEW75H`?A;GIIYfdan*GEBWUPErwg+BhCg|8lXX<>-`~i*) zDY-9t+Y>;if5?jg8T9HN%JMxoZYJRplRr~YDE9@Z-zKMI!x8Hq`M7KhW8*RLB!;A? z0|6$3!XH6k&%{BvSH-w=4VuLO*~$s7L;YO@S6IZ4yJ$jAEMo85pBI&x6`I1MV*0+W zz#I)S5r&!dDvMmAp7Blp{o?jI!dUeTxwwf)-@2@-M}?$!HcV7w)8e62U1vlK7_wq# zG7Sc_P=;7VrOErUUr{}Qy7{Xm&2XKvg84Iuh=`)GOVY|Eki@XJ{7eUp`O?zSz|+K; z)bYUJpge{lq>8278BF?9lh-ypuBs=V;_Z zl{fe{rt>l0sbs{Qwz1Zwtb+@X4UsJTlOu4Hz1P`Xoj0;N@q&b^MrBJh@`s!-*BbP2 zY`89xSOTA_1m>0OR^E6&3RWxe+d3w6U+sqo@cI{Tccf^2l}s2fqJTWlMzkeMcuvn% zvcU9R&=hJ-qfdt2drthv(Hw*2Jc{wq_o{e@oRWpW6V(YP;CQ0veQ<`@AA$aq8Bc

sr0lO0+lp1WTY?@Y8AxS<D! z8FM`8q04PZI7qUqTv-lK(gkw~G*#kJ-Y*12ocZ3KJhi~vN$(`=elW!Kz~a>SoaeU)2@ zR3(Nt-(~NnOZV$glc*3736}g31*p6>_=ztPr+@;25VsEtrU;ZzH>BWlO_C-mY1F(Q zEdKQ_A|d>ebNCbDHOlq+O#zgq$CD1WnRf27@uoNEV_wY%4+XM7=E)3wh+fa)v2lsw#@wi`7GlXUD2(H)A|HNIw<}rY z&Kwros_LJkgBVLC@~p3wyT1hN{+&2)-`Oa>v&omMn7gc!J*cGKn}ak;J{aV|_WV&O z_BhoYeeL51E*-&&+~-Hg9Bqfy3zwoWdm?-GOrE(hA7|alCnAVo?ht*C8*l-W*ZnNY z3JGK`NHBo;;XhC#RD|Jpcur(tj77uJaM@g!Iz-IXS?JA*2<}3nor+W`=aU?9m zNZ}0ryT6Jl!c}u;k7ux?j~g-HEv@O;?79Z5@`s+^TYs_^f6Q3Ui~rd=62nU!-<&h6 zg}_THZq*WQme5jz(R8My(X9L<+Wpy1IQHCeHpP!Zk^l?de0a*%%4T;^=rlF0^YB|L z970^YF4EL#jS3&)=c^37MBG6X1AdOG1>0+P==lx7XgalentpWG^BFPQ=Kk$dci&|G zRE}b*IL&%rX&oqk)Qs^DGrsWCJ`V*58GIJr$je7pl$GIVW#m~SL=pMFTQPe1ru71n zNF>q>rP%CVKyt7KPZ~}ogw=gIgr%21w`{s5=jTW4sV1MxzBf}O+k_bZg}3wK_5@5( zAsfJnX#$G<48b&hh}`cyTDN#mAn8`aOMoP*PW0Y`#z(*jqjccH*ZuUZ2G4G}WFvj$ zb{DbOTMp4v{O07eIDZ9nKEcJDjlyyJRTGv$p~{m73RX}W|KSMF6DLvpwm=HYGnBe` zjO5{Zd|hiaGwW=xU;B7qxZyElxn$_rNragM^N?kX6Mm{*H-7zy4NNLDbUE6H28PQ(+kL7dvbAdjGsoNzwPK~ zbmsOCTSAv;6}PsD=)O(ieQ+8#Ll^M3ac~R_6$D{JcfOrrFc5}UE=d_TMk4v7hr7qG zmw(=(ZSWT=BBz|?<@yAUj0jME+kZG88KS&D3lS=^hZ2u2BU^_$8QpuSv7rbx245#6 z`(6>o9S5Ije7{(V)%F2E?qS~R|3(`uIF@zEHbm$lMvaP9&A*3C-q`OJj<_f|jH8|!i z09F@L0fymR$C%c;TM%#`qK*=k!I24_-}i235>X)n_Wl>&P4xZVLybHuwuYnm{CqIw zrCXPJ_eyVU$4+nJFie@o432X|x~@(J^)O_?={{;=x+~A@%9Tl}k4f2uW{$1Cf8fxC zal@fxDfwAq0SW$Gs_z_rnh#5#6~C5=FX?6wvW!%%RfQ>vW+9BKX8g;?DQx{iHqtQm z6O(VuAg-&&!m{1xexhRbIMLoDZRQ8G)0{cA=x&3rn)j2$%%|YOIeG3~Xe5m77uu!R!``q&f@}2gAhf zs*h~3IdNFfjKHCHPt+$&@bbBfU@iiX90@LT8QYa`2kce!2vP)8-a_BxZ%-V<;s6bA zo@0VM{U36lYuq3Ram%_}sL*kE`dVyKB#m4%XUy+;B`Q=J7OtiRmyneuf?o>fV~*g~ z@ouIHW@e_Egsg`jI3(h{&#KaiEG_$>xO6elxDiEgY{r9NT+g{Eh{P4$-4oVe()HEn zhN%u?ok}*ptyNIo`getbPNms$rkycV&FUKbJ&+AH)rL!3x=C%8k#}TYo+;`M0JTBE zpI|>NWjDoLmhh92+Lu!l4ML1iS~jw#O3u_PDL5Rf`Np%;`92CEf%twERWw9YLj#^j zM0jzL1WB=uAq1Sl0z==?5g6VCf~3P0y6~#;1dhnIAu7V)?I!#BClsR>4?EDV8C^{bC5{(gSL zRMw8P&$8!)nPGF`-~K&}+v#ZPwTJ=;Ao1VmF@h77)w2(ysTTK7E12l$deX8VATrZa z%hNx)V#SHE`|(ucv{I&=$7IsPNK>(G^F648f2u(_5{L5DaC{ydA9_02xk3jWSy%%| zC+~i6RiFi%sg7(WjoqrlQ~jm?yZ!Um<_}Gkgg<=$I&C8i++-(dE*#nhe|JtYg zdj-5cJ3GSg+9oV9oIEhn(@T>#LNr?>ZRU#f8m7e6g7r!vH$1}SO3~^MMXPu0#e3_L z8?2(DbPfLJ(j~8Ks#r+?C?CayR39Fb>`UC~L3uz9bBIk$4V6UGfG?A{bGPpw+QB+8 z(bvWAi~mXR_nw-~awdjkL_{(p%U&Nx$sf8{MUEYV-ztoZiwgeY9Y0aUrUZ%6p>@55 z={)cQ#Cj4&(V8@pldtWW+qDfDQIMdfsGf`uHGn1#LyxWS!KY+*cKFFSc1N0USFbN6 zRzkD`(g}#=q#t;C%5@(jw>P{g5w7CqMy9NpU1VbpmOm&aWdsiiCdSb;7KQ*&R%%*CEU3LPZDV97kIw?vPL_a{b(=Y&xPac#Wv$<@zM`}8B zIDO`YDT6q(0@E|tpt#H|>>dTHO+L1qhxb%WRf10Xz|D1ymscNjP0EN+j`w)iJ}>E?e+=Hzlmc%@u$dO=mv1*J0U;wd=6VtuTV8TZ^K-onj&@ z4m%AZ^@a{5`pZV|K1C3>G}SUO1!uJ}a+-m0Upi}_*dk4+O7EDgu6ov(9>&|VS$Fh% z;)gSBh;%5(u-8Nn0tIblX>VpQ%k0$VxVWV{$YL7Uf2lgb0DUVOF$R7SFaRaTypui!8jqF>Q7|IB+)kTb4ob>QE+o0G5tQ!_+>RnfNw6iJVyuj_9L zR~DX$3-Lu|;NC+?lxyAG9JzS&tfrQPmm42L7C48?Z~!NgArC}pD($WzsNi20>1bz0 z>?c{=z8;r`MU-_5ixyyGL()cGz8gYMlBBLEw`CM=fTXa=m~k=}NaE-pss&NK3mQ$% zHVrls#eG-8ki{8IB?pofdJdq%OK=JKmB2UsNwW!B&XRDY6*mdItaYxQUpoV&n>Wh` zjFyp6DfO(fsH-+0%$~X(st%#^A|W|>j?Zep79E#tqok9|O{5njug#si%D4f5Ts5!m zX=OXJx*|l+no6j~Sl?$OEk)W(ROw88>~Y@@IcvD^?bAo?$~?o#96V7Upshw}F)3W( z;6UxhOpj3OV64aMWTR&O80=8wG3?kb-UO%}gt%v87A%V(?)*bRfD^+NGoPYTW~Va4 zb(w#BOz~JWKp5l?s$yDKmvOugapsFzOcwu~5>;C%SkT>-5dI1`KZ%3w*Am;m?|dKe zOL=MCz|1+Wj|;cD(W8!fKIJ~alHF>Rx8PC zDoy@F`PU|B#hC2WqMEX}vK@UUN#ZY6>dv7gW%;Q_#M%gS%(>uK*v<)GW~ISu(6_hJ zn%l(imG4t~w`(pG6jZm5e-Azp5s|d4Y~IZK9d0*}*nl;CWNb_*U)6x#_l1KB1*Hp0 znDp%B&aKVk#P5}~s`|D|$o#JpdU!1=??}FggkBS~o7Y&1|6B%#!^(QU(iDisADWwA-cM>7f=n)*^j_QrQ>evxQ=(En@jgO zD52Uu=G*v*%k4|Gt4C4(J3XsK=}Q_PH9?5J%vFCV&J5k1*PB5KClP5-kRo3gre6Ow)9ml z91sf`vZGi=>Gbl7>~`X-Q!clA3mubq znY|Cp1NG^j<5<-*ZTAFk#Hzp6%jt?%+CS5kBkdaE z@IE&DiW@Av$F8tEI{QmthMgBSawJIESXw%e6w7e63!NjzVJ)nlNt9ntw?)7j|c`4C?X!QRuD zmNk1{25;m#C*z#{kippvJyRu6R8Gw-u#LYKui0cv>dmRpvdaDZS#=@C-bHujq>BBX zkgT0=%MAe$3GcF}^S!~=9d>9)yXf)-Z~<^UA2U3**krqln7f2uZX)*L0Zw;XX(!Rq znZ5`_n9kGl+THGnmi#UQP1*e}7=^O+1Bz_;diUO(TKPir(lG7dHxsw^b+n5rDv;kk z$=q}BJ;tu65>S$-S+PJsO^1GCWPQ|Veozb>1ix{m-iLMn^~S33!eV!8j8yp{gcO70 zmqGoeMpm%jyG;KpzFe;g0hry>MQh482D*c_kG>?C`h^-I-_JJjFD3cSi&@gj1PA)& z&Er&@_G|XnD^*zVf5k`NmoD-CM1?BdXRw8d4{FQZ5sBG3F8bcrQJ7{)Neo>E;FW|h z#H7Q=td}+wO|hMZRM*;w@SO`SS~3GWZvX*DL_~1?y4>Uf)6%+-lQ4q77EK8d^yN&72GPLo)co}K? z@ZGzk7KieTu$rLtd(i#`MB2}Ln^AzK`b_ao*qnXwxz1*{clr)kT*A3C3?6x3E~X^i zR*_3iRFOlNO({cy4yV{il;f+9Wt|R%Iat``YI%px1mP`__N+;NJkM;$Jly=Bk@5J-|AxCSyW4Qv+cI{D$T{v zh{LL|ouM-`{I0k!I`bi-m6@G38a(se6)!3#ogF^Sj!H{xjI9*{)-oem>3bT>7ht3x z9nLN7L!5W29o;1^>mErgF6DR&I67C^aa&&-JW^R#X zB+V{-w0uC?f@#D7YTfgT$9AEKp*@e3g)IX97Cl6@!}(sizKdHzMFUa@go)z>vIHzO z^)KaSw|!Px83Cx-H+Aw&W$b$Z*!22BN@Q_~{4Kq2OpK6WyJsnaH^PzHzg@iZ2&+ni zIlj?4e1OFgIZ+8bA0^<_9FW^=6}GxUXsWQGpBFz64_v=zH}$f;ne;lc0B9Jy*kFcO z;o-JNmv%vIc3<>qW!3EwfFtIAlhQ8$!lHQnEak}R~ zrqP;w#VIc51zwx=;eKvO%4z5DsmRdy084Ei??9%dfM}AJ|4l_h`R?QJ1Uz_R?g`CX zJ~5-GoTh;&b@41%y2>3eb|H+ck<*a}Hj);(VNW;m@NQ2RAXPpNx1i*ipT2yKjT8y+X4=qpKfM&F7}KtqTA;0%4$c}LrP<^`#hY22S48hk|Vab%XTaq_Rd zArd=&xXBwH&m2&WER)gh7*PAdVyNUeQZuTo`$3^*r#!<+|Cfd+y#>R(RYlrl><5lZ zK+0WRjU^buQLAq*6a&St5P^wVc_Nk%DPv--l5WqeauO5fCQpXedIyX==7cSM>2R_M zTYZ;~fI3?|4hvPyvMQyyRavPo2v#$=#kY`8yYWTgzEQ}e{|X$2^1@u|?5;rST(J*F zK30xd7{`!>sD}<69)m(sZ7K3yx&NRbT%YrfT2*%k+BPJG=b~nSfs?Om^mpaU)$y=A z+NSzr=RG{4{`Qy6^894E&G+e0S@$mqo7VJ=5OJavgTFA&d*mM2Fo@3f2|B`^$U7M& z`Mnt6oUB`9#FBWV=Mj|O?lk?P)}rH$!||q|>-Rwoli=j#9z2*n@LV5#ySidF9KBS( ztRwJ}lK3s-2!OYhBWZKFQ`O#^%v>7>G&?!!aV9R&)$FqWE8lX5J+tN^xqu#b)5~wM zNhQgoy?u=(UU+z6S!VUNlh7!(9t)~fiI3w5|uB_!leIX)i5 zA9o~b+dleJ^4q9j#+PYl`JIr@`M5aKNJ=*+P2<+x&0^WrY{iFm3``BDHfQJMWuEih zVg$)z{T-m_h(HRF>kQ^vmvc}7SKwFVV!xTC%2+-74!5u>G#J?%s{g$I3h^*kL(^)G z@K*X@W`$RJey%@nh`fH{>kvJRo5OYqqG;U+j2u_@1J}(KH?R2HJSMjMHExx$o+)jo z1*_W~DO+sd>yGU+=$pk`o1F!WxPOj1=W9t{&m)ZHef$wk15RXlarkiJ<#9Rg1j<$A z)M^v`PaA%q5gD8Ph14wDQOWCt)2PSm)8}jxZL>{XY*A>+;c-Ao_>GeML{kuMa`s!B zSl{RmBk%k~gI#8+I7+^1FMlC64Q7rt>Jhf|iD$SifK? zHh_fRKB}(Y=MSMqHuJYouAD!z#ipIjz-%>Xr{_{NcBfYeA{X@1Y&gU;^ZXXa3?8|T zUT8U-UemybKheLw1(6buaC^1I_ZaYJ(m4UCg-lM=DNdCuE@a&~jp;=N&ie`*4)X9fAW;8`;uj8R! zQMz5$>G1%)mX7u2Gt)t^%c3oql1wuwRf_q;@XDG3wNy*4Pg?g>1!I7@ynOurwvIPPZ0 zu$_NH3$TQaYF&^-wr~A`voeDEcO1JB+>k0u;`wh?!|-TFaeYLJ;u=k*yu45 zZg${m(ZcivsC9l@xVyUsTbDS_+Iog6lD)vJf$!0-CQZcFC327BS%wkE)t-GhX?8+g zj%+Rf=}nKvf3E1K7$LAaJt;|6nKvv^H6=Bj#D`#fCjoS{oa#i}-CrmOGW3)f#%Vyi zJO0~Q)r(=P`E_L3nge?|St`RJZL^A1bsXs|fHC53Y#CU5td2wAvs7_ z%a8#vhT|LiE+7pXF$-hI@2pVmuO~qXwT&11w2q+4xf)M^>YSOp9`%$dUn^z z-Hc3Qv5=_jpypqJ{NY@d0H+70be5Q?G!SUxzp0y=FP&jVp#Av$A zSQPw~!3?K>oCc((mg)_T)3{$ALdzAT9U3ShC|B1NoC<~t=71($Tf4kBVcvW%M~qEK zTO7NwrWgi}yPPF4@ct9}_J@xSQAyz)gaY3fG{K=NfsxYw$Rkvxag(_6{i7@R&6f7C{}cwAD?kWfze zx~;??#5G*S8RUfD7C!gRQ8{55Vo8hYSuu>wze^usJ(5JdQWJsft!qKB?%V%deHCWp zgx!8dtVAx@4&`(fvz{4MrbwGwyK*sTq7qP_FSmxEXmKZ9;GSCfjLSaGa?$sfxo6=L z^!mFcwl=yfpAwToloTNN{OTj#=aWvF17T-RVB?>fW`E_UOY$FDPOZJ+zTp=}m(m(R zwUwP@sNW?+P%vstV;Bfut|Vp7gYt<){GPodsp~Fwmh3s5x7q#8wy!WUVPkWm&5pW$ za^JX;kM11~V50r)m#GEby6shT4IbZ8&Lla^KH`XQE%fG5q%T3uP5+9)U7dhWFTPHl z$8af&isulB(ybP&Ts>u?Bnp;6IbRJLvn8u1&#rqaRtLc*<+*57qe#DIY)2XLl>X_} zH00=Hj6DO;*Hs&ipG4sM8e&xi_G+L1AF94FIW$F%NhPKo?ey{oO>mfG+kZbcte{1m&e z)xYi=bUveEa+PVpknnjI&fYI!5fW4L0Lbgf(yQ19mZPYhkW=RP}j;$|LTF2_gb>M*{EgmzIoF1gP0{TMWz#($#JXo_Z9JxcvH)*EkBD zj~l|Y&1%4Jx%UwD2Y#1SNNB)-fY{iRZuE2*GmdL``ech_!Fpx^IZDP-()Rramwr6T@K)W+6M0gOgYycQ^RHPJMQ8OQ8Mg@XH z#|jN!061uyu(}lF2SZrd*W|}Z@W@b*P%*!iERvSGWt^jvqOCsV8fcu3di{}BxRe7+ z#;fA|+NCgf`KgPYyc{sL{b`!u;I{`GUoes(zwh;j=EKh(Nz>mwmY9LyAZGY6ciSX- zL%gK>)C3z=R%%zWM?3M$7tBBdpJ}BiiEy%l6aX3CkE-_V8zYWSPp?31124>ePuyQr z;`@^yht(ns4$)A;-%7fc;b+5xqv0S?R&3$Pq4yOE(LP+NDwI+?{2cj*pYNapO3PJ&&kBcMW&sRVZj{v;;D zTeU=IAuCX}N%&DqO$zfECn;PYeEZ{vTo5XYKs#AjjFQ{SLp6Fp3i1pFA^Z8vJb*RRE0wM?~F(cgd z?zeYoqLyY~vJ9fkD~douLso7cibST;A}LVuMTo0~$bKyiG}F-Mv^Hv`oS5sN_Lnx1 zjN;g~5eT_NdVZ@|%wG)XbV$iv%w5{BL6%NLaRmqI1gSL?%??6Mb-i+m46#fRExP=D zdmT{@mr02EXj`Xa9qE(U-e@{2kV>2g9kE`>sE^u#QK5F;hQ)eOL$Z@KF6{WhWB3z7 z5)Gv@cgg1Bp$Q-!o=+iBA*xitrKnmUHZU_BtvI>)(q{shED@%oQ}h%j6c#jnGbV~U zmE}PBM^jm?F(VS+fHq@Uif%1TJ3bue{EY8`z=!LQGRuB^wJO(m8~rnMVghfg`^g3C zkwCJBb8odN=aAT$9G>>hn-I?mNjU}86js>*c=%DmbHZtFi*oG7u2&_&?0ZDskG!T1 zr3_0iEuQIl?Ic(KU86+2K~O45#?7M~MU*s9crt8bKOY}RP5T3ZHY=q=A1^t4j5Uyi z1jcuSd6R_Hg18NM&(6+?COy$-x2#MK^SC9hEt2@HN+WM}Aa~A^OB|U@k}Jk5>jgOe zL8hb!iTO{sR}i&HX7FSM?EO}-uvCm01waNd65KC55FXxI-Dk;(hA=V1#X8hp3J%%$ z;TG!SqYbyAstp+vI+FP-rI@o5Nd8m3IZ-V&Mmx5a=*mHYaG?Q|{Lx?JI>N&@D}AT* zBgGeAZ&pt2R9K8r8Iq7ZI=KYuADXwUf7A70st_bj>W7#JNwIV|HPMc>2(U*zWt*1+ zVb3&}`t#qMcjY_>&7pfqT-kI0nOu+hO|!g$Cc>QQ;WsfRQGbqSMy{aymSaM~l8*N5 z?gTG2-XD+_WEBN5jd5O9RW$`3o%2OdO6TviEnD#xqGn`S@RRF%-JQ=9GSmavPEYCLOJ)hUbtsr zKAO}KXr4V6*!1XZOl@7GBO^H{q-jh|F%n4SobJuZfd&0{h;eKkj6in08Cm16(4nb% ztJH?FKhr*l4m94SOj4VgP^`T8X5?BNtE__St_5j%Qyk5(ay7!PUV}1FFHHOLm;-tH zNwq1!x^c!Y+C+=)=|suZf^JIf%TSt^OoR+uTpPBiesKrmL5I= z)XRWr4-muHOUOr|fqWDNXlt68pHs?@ULFx$T1++C;&mU(GXe|W!jN?sDthocZ<$z_~RLw1mOVj6N%0rEJ#G!ZSZ%| zpvq9dK0^YbnY5{&9ipx|sa2@B4lkAVebo#P`{>EZ5(^zV+!Jg*mC$&#IE0DJDz#x)t#Y~l~+$tyJS@-n;^bS8| zqmz9-z+;LA5u#(~mX)Sl*`wYdA^ZdW*#A@mWfr9N`+wZjyPMA_8}z30{)pD9Ej$G3 zpX`ri84L}DQdba?ZYD`b&P%&C$Gm(vea$$rI!=?Q>NcE=4Gw}7d0eAHK}*R05@?NB zSLeM%8H!7gElL^5n-{N#=UJm~uBd=lnzWJ(EUEAV+Na~5TbKycnr+m~F0BMxUOO^x zPAzP(;)aAgN$_1UzFbww%?h-K%0PYjiAL-$=)_-?TN_;FFfO;S9tCgM(Cmp@bQ2dz8`AYe&}wM`DtP`k>tg5(gWrjXvc9I7k>wH+ ze!N8fH;`#q5M`@v;d}QB><>HGw)^`Xqmy#x^$np14+dE55oe>Lrgn{Kkte*A5E1&_$@OC36qh@}sG4xLc@fQJN(0PH^K?)0o4b?qlBs!~*Tb<( zO3SE=s-%P&l419JJkh8zx55GwA)e`NO2r$KlG({_u1jZS zNi5D;ROc}5em8!;VT;?JdX`T@7t|;Q?c}6kzK)+7Cr{aLFX7-GpL|RvG%07JPN5&9 z3b6C}3FJ#eB{K#`6~NWDN?l|%VGb0S7tQCFKR;LD{VGnx?UxB2W;~8th?F61np=VH zmLG-Dfaj9`PZbP1nuuLA6%`dRG*C^w1*Oqc<&RTBdb*5=FG0imrd*hblf@RiGie0r z!U14|1}PsE)uht2a1}KlwGR*8z662=XCQr_lA&KTlwu?+Qpb0Qdx7-F&p>@{AVAE- z$!jhgH6Ic}8I4VV`^?F5$>QitmxO^S1G!x)h0M~{oXjQ3wb3KN>k1II$*DF3Iaf)> zu()`K6l)^IL_#;~`}oXJ7hy_KW?5BHSQ3!9072!+z8sqy)nAM>tD_w>ohqViEQni% zJAeyhk@RzQLqhwNFlr)6*d$MwT2FMapDj0FgknO7aj>6cj5O!?%9-TMx*o+}$TKf3 z$=W9p`cAwJebwvOoUF)r8A_HUJW$ zIn}Mb!<(hVG|3d)PY(_^R?AcxkY5*nejT4-p5Kw5IQ4-FsSD>-9n3%l%bKSY{A7we z<%)eAYIb6Cf`emdaR^kbBcBat6wGQ&H9N7k#=VmmS#gWcQiwtpzOv{L%q)$2;BctO(e!n4cyPx!ga3bLI3Iqgwx9BIp`^MTL69LVtc+Af zBdvA+xMWU)AwqmPkZk+Ks-U~`jDBv<^klsJTHLnP-E_~L5;$waas<-5Rd7GxRxY62 zOdh)VLx`u-k(O9_HsS(YL2x85Rg=5daO^0K`Bs?$R3rjWupr*PaJw}jBKT-ZGtiUG zR+3`;l$sc!U>X*6?96&8MxxY2+{ZRehzFHU*~YiuSbxQWC~Sw9s^w#@l%L(=l3uG0 zI+I?Uajpow=yftlWF1wIC+lF&S}oRDlcbUwSrzT(i}`6f>{soa;0T!{kg(9Iwed`} z1d>O$JRfv$cDWfKm7@iz@QLX~X8deL9>&F(c?mt%iry)cd^A>qE%b6upyVraum;9r zWb-~#b24zF5k5(zTM}svsVj+v(h+JVhB#8o={bK@SjR^1ceMGh=950~y<_|R0$XLL zM&32E=ehrqT&Olq%_cmy+L(yvHjH5Ob$_Nj2fIn=oqS5(?ocTusJqzzCfh&80=d}f z`STUMFzf@pq=iqgD}FlRc}Id4D~rE}>u-xrO`m3l5%b8%2uxB^k|q0R=PZ*nnt4N7 zXD2_1Y~t%4_FG6vVBauF4bshffNvah_cie<{->Gj?I~-&;)gD-xC8$*(Qwb5QU7Os zghU`c(@S_cWD2EjtCvM`NzXL_jrU-$@0v@&xj1Zg6gcLV-(iKW>a`aA%f?lsxcz7q16!_sbzu}mCF>&gB7RSS$gnH|RQ zEkQRVlel7X zNXG;B^C=1se3zap@)MS+c0+e8$M28{7rs|-TYjsI*xar&VO-N&%C$`iS>3U^kWf4G zFVn~N=a??TcxuecYl^qJnrUT6M0TvV%%Ru=kq=n>Gxzjl+my}Q^5r|no-@7oA}=QP z^lTl5Y%!=tvg2~52g7V(< ze=uMQHVH!z-hEY=n@!OFAR?{cj5FnxYg9itrBoX7ZR|SWN2Ke$%DFlwepHXE#0Qt%Z1Ct!n0E9|NHSZdx~8D!3x7W zfyL%-@ulZ>h;DxvDq#_e6^%=tunISd<#+m4-$yWgafNlNZrt7znp5;OHDv&G?1 zkDq2zij8^TB6Lx~q7rDkK;;TI0gp%d-zX zY=rOJj9KKH**nQpa=<9nV9E}goa0+FHbmH!jR|2LTL{A7)< zRUe)!y*G+&xO+@RJZuG~eK}C6Q(SD1^Sx+Cfl}lckO5iG@13s0I7>KXtZ4kjc{Q%A zd2omQMB1gqxE|oNyDzPf?U_o@0+Ecc<7ml7fAua#0V*_t{Jq;pR-Y>jRv0d&*8SY8|i=7dFfSf;AzvTMXB{eTl(8<((!v;?N1W0@68PDdK@vy&QAodN$Z zJ?AWMQZ&`pcN`>iq;1(*N@$TM?EY`TMYXZy(;r_xcQUMgE^L@EME;ZR{rA(S`Mst& zibQ9^NkS|DMh^d@CUC3wmZ^L6^Ql+pDu*#lnZoq;tfI!wG=F+CO4ScjHZ%*TfyhsV z!0Uni4jhBfD=C)vjU(W$q)3YamjCAF@>Z)n;R$kmn9`a37+C6mI(@`jBWYKAHOHlB zjFNu@JhyCm+|Fguif9-hgP@h=v``QjF!cRYq(NmLz~mnx?)1ltnF?PM>J@sQ3^2E( zANcXBCuGI1S z9N@e^Vd!6LMJNnA)M{$ian&*rCivyOY2Ew;c-%8*oFD&3ayD};dOL9EcLST zEt0kO8;US~kiqS!T^svGZx$+M9KX)UFh%Uj%2_lTa3NsOBlw?S&BgU1(tK<*KmwKB zTJS853Tj#F>Unl>t?^@kYkmK$sycx);*3lkWii zxuf>wOEh4}PJ5yd%mrRB7>5o?cB1$UHNSMmR$7JX<(GEMkkR4~2d@yR=w!$!G_of{ zHknlS5T^8O{D7gyt?UDjkLAxWAXG{WF*%#>r_VM}>7IN0{lNu?oXkY+Tgkldj?dhba!BS$a+h$!IR@Y0{801uEds<%A6vN7K3C^*MpT01F~lnt^FCH0m#DoydDHWU zz3A6(BK}S^C*K+r{O0O$`x!Ux+{U^zQKWmz|9;?9nIkO%Vk{5YW;D!UK8Go7BJP%7l`SkO=6*b4U9y@;Zth;-iL%$v)x zR>L#~o}TzRJR&}enD$&TNtr~`aMpJ^93!Z_pz@Z@jWB|o-s>dAJr)M%dlABlH56kY z5)<)y$k%vHD(adlb4xXlOrqKp(Zh_kOT=0%4H>P#I+0HrbVFryON#P*i-@bb_{X*6 zO4i4ZQBtGYfuwAcLkKo$ovc4ERo?k5c%Wz?N`370+_nAy4C@}@-wkR9;pD`K)?%_{ zOOg}(Kf6ut?Bf!VK^r1*AA7>;yKTJ zi6WQRW2i7S+x)h5ZQ;c(IayV&a)N&di;IxS^9r_A4zJeYlW;#u;J4#-Q~4?6^GHZE z>_+tR$;ZaGUJFm}eF-KE27v2Tkoj3^F0Ii3z{d1A91<$o+|c{Ap-0#3;EcZRl*wHO z9IvyLoV3R9aWG;c5x(2gVQlhp{JTU$#W-xnNXQul9iCg6jj#B06uoIVSF3lXPY;xj04avcB~rPFki@-A;)_c zc8T)qs()_aM>E`5M{(O>1e5b+x;VF)kR)f1R6*K!Nw#MoC||o$=Ou(bWh(QFf!yPH z(w2I(z;e~v89v43@El(XDPaEZL_Kpf7iFo$AO$HRG8^~ecq~K{efK*X|8qn#JJE*t zo-2377-))F{k=(7Z^hjfHr56Z{Mfh9M&;^@-Q?VOhc+LQlmJZC=MI-Rv*(ry_oxI9y3Bu6zHDd-pB=HhDPhCfRX&?M=2o zO+^cQJW_U)X7jh?SbgbwPqIK35z*5CI=`!|Um8yAXKcy{;0%U^oeOH{ykBUkRAb9gLrYa&~$-qGrs8 zXKQ~5_Kx}u&+N*2J*md+o$&Xiun9c9(t6ozl8bu?PL&Y(d{?^lf8bCoumrNRH=;HI zzUnAC=WFl9h7nOLuTNj>WdZi9N?J>Qs<&(iJFS_KYpt>KarN}6z2OO7kA_LrPqJWV z<~R^I0vyK$a{ku6rYLzlQ9~rgaa3q1$M+HF&T5&1UaWhD&-P~gXZ`8Pn+kLHom=v|C%h2ha8rKm7riD3MaQ$793BZ zL_ZEE<=Lec4MLY=cZ=7!fx%4>4A&F!-UX!M+1)p}wp5&XR-yL`^+mIR2T+TtEtrhS zIKy}tE*Y*$Xldav)*#oc=XYCVzHxY!#A@Fud0QEG*rtA0u*`WYfjfZSlp_LjTqXi3u8^88t9{AX zHdd`~!+2y1M(>wdz9l-Lt3pTH>j${6v67aGm~Kc2(ts!8!^N7+_7w?Gv@TdF{62Wc zbqe*uja2t*f{IXv!RDanC$qCP-q*LDA{V$o5ndvJIREdhY5-h@g}J&*{f1!H$*`))54T*i7cDBbD( zz0C*(9$r*KnxQKuu4cM7(Nrx1(X1M?zme4V>HxH@VAw3Ll+*OsWLutHbeKl=dx*S$ zMin9<2W=E$%jUqK7(cKPT09|@$-ANe7b~>7ppE~I4M7=doKNil7Xa!Lr4x(D!l60L*iJ5D?eVi_ zcIk)gVA`mKv310eIa*d~zyzu-_;oM33xF^*3LgBYs5Fp9kxnYhwFPhPSe z>o+mN5Aq)yN7A%w7-KiPEFxdPzaYXhH-gQp`lGQ$hTpW*6?BF!HFH|8d(YBC^a!!% zjA5q9c6+3B`NYjEtqom^9$tf#6H?E1HbT7f8)T)EDUUgKX=LVkx*f3Xs;V+K15%BA z$ka2qs4dE{mnw1%C zyEaWw++38E4x}ozIT=(s!@y!Nu5SuV{}2xCI4#3V?P~-Cet@m5i$N6=^<5%^+k-Uh zOL^Oq4w^Oa6o?DBjtZD(MJ>&-0!Z$bVkn~0W{Ip%){ZP~iYzRnbD@Mk2R}rpkA@w- zIeYUq+*5I{&WQM&qfT))=1Ozgx+j-CD9}zd&&_&g_b&oL(ZKkurf{QImaz&QE1Qnr zbuTn27=?Mk;1kb5THmoe_cBwx!@ns(o1VF-HgYbp@!m?zR7n&k?7}!*&ET%B@lkIF zgwC#_NPYFs2poo+Th@}){Ddh+;N+8wZJwDC=*uhv@@AH*0v9xvSy3C~t56L#-@s!E z$QIBbcZTw8S88`0m_8g&t6B_(t6>7K4368U1_mJK=jTUmIsyz$w6T!Ff>Kj)OtnSS zx2vh^N%Th9+4Z^siDUx7JO!g8lK{T0Fe^MQPGl=9mXXld-3UrL^5nouNF7=Q$Jq*b6XZg{0QHU!|m`dk^)V@RdwKbhwRNEi;>2 z5D8HHo}XXI&PmD)Skd|{1$`1jn~`jB!Q;s#CeJYvQVgYqHu}D^0 zQJR!~MbU1W+rC5G#*R>$?sE6wjJmLv+j$RAu1HwY=9k!c?@>o9K%l=|XKOIWmYCp{ z6<&yu=&K;7DtSE=pN1y-b2-1Oj);ab>gPyEpIm*AIFA(qXI62wRp8wmn)6(ul%fK~ zl(BR58~aBsWIZ+mB{@Uv)fF{H02iVirFcsvm2Ga?y!!c5{mtm;7=U7H>i2JIC+XFv z%;ombA`oih<8wWlDH`VTOmi1T*@~f_XN2inWL{LCQZ%sq6H)VyI=bA!7Dxg^{Eax5 z^&E5pa_2U&R~Q=AYEH-Dd=SDY!P`ksIGB*26J(w+rYK#9$@Z;Hkk5GvB8k)kUHyFqk^3l?ALh+QX8#--eCvJijQ`l2pSNZ=oDEM(WhS*3N zE)g}ir6g#F2T|PH28>*qS%CNV%oF|G`rF6aqcS-8??2y&=fCVl3XVh~(s4@w{RsV3 zg>4=eX!Li z&GN+d+eY0KPtC-@{`7;5RoeVHEVgye z$dp-*{Wj8Y#6h^Z)tTVGQGJP~rlTe%wHZ7;S*0t?7^1-38stTE*;F1G*+;NqzLd&n z0D(&Q^{gO52ELzjDh*xqU89(7XsAgGdL}_(nGM(~zM_r_y?qHN{ZB_2^d+(0IsCp{ zOA4|i)XF}+?-V9?q?2V0FuDRWyFUr9dxbi1uRmBW zD(zZ%!-=O*LdTU;lLgH=AvsGrwVXtjl3XA0PVNX$Scrb^W)xvuCxlaMm4Eu;;Fo2L zgA;l!cqjFr7i*{gG!&`URGgG~ZDh1v+WzzG&??|vGqd`bG(eR1WCO-0;GNunhfR1X zUu{UoCw%p&$ZeaAUln&$_47(SpSStCX4@~Mqx3e6~OA`}fOnIg1Z^ys5RD6m9KV}W42n4=qU!w(f_zzUqaezddg(h7W zW#6uj&AZ=%9A>U|g=)(-2h;x+RkrbD{{XJ9=x#z6hbDGr3VFZTx5vGOYQ{C@uhE;x zUhGA5j44f!6o=OdUdhc5oZcrUCI-^?ydD)=rE?RIwPOA2ty1idz+{y%+A9=U{zx4% zU9={hgf4sjoq!VbIyD($JUb|w-}8O337CFKW$b>vhktsH?=hyB+ahd4R$$fC3_?|w zQr4hNyhN(kJXW)NXJPtzxikAZrX&~hoi019`$}BKcYCKK4B2_x4)@IaLQ~FSV_G$* z2i?sc$*nn=Sl|_}H(&8;ACF1svxK<*TuG3k!N(F&cd(`VLHiAJT1D9j!zM2}#LUvt zn8x?)M+eWg+^}tu=Yb4Q^UsM#ACn{zfY9Lwb8LRkqiT{`kdtRX`Vq1 zVPlvOd1LgVV1DC%09z~Lud#(xf2S+Z76g{1a;KqSZy63FgkFG^V~5Wt#YvUkZ{t6? z@t!_);Ce6ih0YF_=H& z)J4=zY)zOJM|QZBE{o)1X`;51whxYS5cDK2%A8IKg5bC`BZ%a3i1+iH z#=uD`u6Vp-Q${j^s0bR%c^8HdfY+Z z%$5^VTcfr^ZK%ULb&ex6eadkKPNn_9|HhB9Y1l)>fa`~3dY{@CRS{)7DUci5`KAt# zgSU-D94t0!SXDB`l|!G$RWR{J+L4K0t7a@ljQKG%|5H~urK&w@A=NU4{|2&ax^t|h zM}7J|PH1$k(^JkV=^eVCU7m&Z-?_vwsMQ#PUfM19-tdp>I80Q^b_^dNNxL)pU`524?1B@w*W7}D_aF@2q&$CczF9O!59 ze45jxaGmoRPlbkGR#_?0LQhXG=NHQp5Fc-!Ps_~9A#LOy8Jof=QDSNeML#~k%;73e z#!p62g4eqS-SeAJTVaT@WJZ)ytmZHNw&CCsu`ehsWepFt{mhzB|AWyP66)XCdZ)Zy z7=j))%v#B)5;#D9#_OH)6DRl6^&G;3{(tTg$&~-`3ET7cd zD=atPY4T1j-i&j3X*_ckpMe%+nkH2r7||ZrB3F4hnXKA3*U` zn$x3sf0a-1V!WQdyhsTE!J#X6(?nxZgQ%YUOAV8Tz^0PJG- zh(*iEQd9|!$%~cXr8J#W&4-bL4p&exwQq&)VMr{*L6+jQJwRYUL`0BJ8?Z1X<0fVvqc_!9)#q{K9pgO%+ z3L5S#BxVsvQQoCKUL|)Z_D!(_5*)a^QX~x5KvKd{^I_v8n6E*p^qpIjz!SV)B^X&1 zQ2opb2JZX}%vTOMz?nOAIe5A`$+~H@63k@d7S3=Y1_2VjH*>hX4hRu;Z2lk%s)mBK z;;obgRXRg5Ri!G#CHVnZ z$6C6ppJ_rNo&2Uu$gKu7z5x4GG~fFV2jIWZI2bu+9HJ7RT^t1fi@*^48A;VU6Nm#Z zq!k((px`qeibmP{{j)xY;ZEs$6djcQhRAZ@?X>i*9aQwQJ5!gS>uM}Rk`nW`qZk2F zf?{{~kwJe2&9C&r^l&&JP zbcz-J$j9h!#r_YpFHd!VsG0u{n1hApWB^W&$tz+3n7Top`271`txQlDsY8 zr}8fxdZhTLH(Q#Aui%}Y#)(}FYzs(VVUL%MRB|C%jNwk_H#am<6PubLp z{^!nMu74IB!HRB0>E1yr8(QbuP%zp6a5P6o`M-Csl8a%1d zLOI1&bX*D<9jNi~HQVL+ZA7Rh!$2KK(RKyB+S9(x81T2#xhu0}k7TuA7wBD1{nL9c zKmr>%Odm%}k$<|w1df*9 zp)LIBoXUu9ZX>AQp_R;n>KMJm4i|fl{Rk^&v5gb8W$x+2vSihk#n%HBXKl=Z)99h) zadnrzd~q8d*rVAM>zl}Uqqy?Mt6$-O@2+L!8~&$X^|aJ3d_p0xi={>lhutnLYEU{GCwu*<9_Fkh7huuo+i=Q^Dcdd<0O8!W}k$2L1}rmmHsgH1ypSo~z>I?0Unq z>%ZQ(J_^Dp^7<0BMxL?aR~|DEh-phNf3V#1%)tRo|MR+6m!a#ss69L%9_s1a zwGaN%ki4<5sX?e_)FC+ha~zf^6v|GmOMz8v)Zh_J9G1J z_&33y=bTUY!;(E}>GZwJkDH!`isAk_f;5I{Az2Twi65%`_g%#EWJO9UDI?jR-sz&} z{%={sE8RUAiMkHt)7F2RCWl$>aI@e4_FQ>K$r*d|H;+%*-CvYEZ?R>BYjsBZN?b~msv3h`5QCALQ!B?aIZY%D7x4$kTH^n?cdSEVIQJk9RcSn zbQ4^-oKMFrAMDqJ9cFTEKIv>}iHiy=gSFy9E*=sxvV}D?7}G`tz3JR~4?Bv2Rdd!s@g{xS=j}!^v7cMq zUx+?-;ilm__KFO@zZRAim;KF_cyJi`^_ou8`lq8VW=h*D{q=EMV{nGBU5EbtD}_Ha zo$I&*7>K+4I0SzSdZrh53zEHhIM#~}As`zgKGX(`jTW>FqN1z*Ztu7>mrwT=C&o~u zAH)|LefdjK%O7>ni?z~@5@EJsf6%b?=nD1lV_rST_Y(0 zx~0-Eu*9Ely`@FTyCY88EAm10o_*6m>a^FN^JDgxw$G~nuY-MHu=D72L|(T##m1gd z;ST-cd(=~gP!}SX63)fpuVH*xEGqPbrf3e2t?6{rRJ#ve!Y=Yk1!+Ix>7W0+<^r22 zUs5*hhuP%;(xy%D#I~SyF15+Y>tBgO*O|!*Vk6vmOfxE`hZgLrR+|1nA$oqIG!9rj z9bZ{sEiqY2Hw`xPgk`fu{|#a z*lm^=#fjlafPqknwh$1h@VhZrXvN@9!p)?zMmU_l*;<|Ob|GQwPNkGdY?R8{;`G`- zW9wSu@2{*T&+RgPT~zQ**jWKvEJnF>`|@><6FNbYoI3+Ao7L(6lRwt`-7|>;_*)!+x9q5F!(3FK#RU%I=i8Y-j3Js+!HkiTowXnJEjXT_=hG>Q?BN!3FRy)jnLpinB~5)!a@Zdef=InG{?*U8&*EMpsIL3B1v8Q zsJvCFqLU~WnH=NGFLiOU_*CiSO@#@NrNp@_z;$?^22M>XxttI*(4nOY1_XD*U`OmA zc|-Vv=b_}*^3RVmDPEdd{!J2lS}(mICV5bM8*IgUCZVs@s9|V47v1;=)^iLqq8rMoLb^ds= zIvXb*Du7OdhlF9+Pdw2<5skJ6%~!sq;XI%ipPnkCdNxyzf72-1I~#9-OOKz1+NRP~ z%*P6a?Jsb)v?2-$1Q3t#`q^NHQ4l(GEHKz2(YB@Fm@<^52YH;m_K&Ehu!56#0t$8* zB*x}5PV>#-^MlY^YTcFVoXI9ho3yO-fEfe^Rb50`D<&9Uoz-=#`b=HYpGNM+=k4bg zE`JHF-u|By9nuCLIQaR{Pul_an!fLRLIw6SV465qX``O!4t^ze_Q=+yS%&X>%g={| z=Nq@bH=k_LvQu4m$q$x!#y6f&JpRVs^k4c0ecn!gii0+`y2zHpFUZ-;<{bP|{0vl3 zM2!<_Otsto#QVIhFa(abX~cK>?!zmhEZxv=KfS2(w=|(aj2LK+nI0PWceUY3n&4R} z+Y=~5@n2t~#lG#*e7pqsB~c!#WViCb%kf3fSb1W7?IlBJ4Tr}*tpNpKeN&~j-wwE# z{F)xB9Q;nbAH+eR$I{&VYd`ars&|!{c4;|c3*Q;u!x+T| z_>cD;)9yyr8$!c_WjRj4&C$^%+;|H6u`?NuiT~9Czye<_=C2K8wAsr9>O=Mz<~=jv z%2ACblKUhSb6~|rIuR0tY3b6mMAbsD{6erQG?p_LGeiL_hT4;p3i%a-Hu(D(M;R0S=yXafN<7qmNg%j&_kMXjFmAg!_O?PyjHrt`Izj-`?N$EI4E1HgX3gsOm z%GK?7#;GEnZ&A;w$g5=#9e~^u%$k?-cDfr{s zeGEnc^}0TgCMl#HMOp{MFZ6f#X8wO`Y6H%UcdI5}Y2A@}MSF6qBH__>18 z4*|7PD7G?#5S6s)|M5P6(^Hn2%7j{zRyfG>Wa>1q&WV}!Q{HqgBPaPvqDz^+_u>Kd z)c@8dcw2m8ZvAPzs3(B0g6J)2y9f0jWZWA1Pqe&`zQzlKQ1}g{uOLymU15?s`|1x{&-vIZOLBv1s+Ggrd?P*k0 zIyG_dp}g#w7B$lKUgfJgF8vV!(wr6Rb~k__T2I?kfYaa65L_|krF!b)-}T$pkAFh@ zo`wL)70;cdvNv{{%)==~B_RR;cTtd){${-|_W0YX85-GnrL@Z}_Gv*IkLdoxe-aLk z=l?PN7_&@ztH~vP`}|ihwsCrv9WAql(KA^ZZJ-rXqqtQo<*fbWJRlXJF$cJkGBme< z1B2xBh;@xR8k%D7uNWmfmy>?6X z6Mp+h5vXDnBH9aHOZ6!wqE@r${h|F`u$mEFDpJz{DU5wvKu}thavqn`Aq)t^`0T6g?ey^hiu(f&IAR{qoWyUR&h_lsVQ_8+^D(AT(8 z*JYQEyNyl?gnV+wZ#Q({m9qyxf{XaJy<)ko@uH%SCrV0{3sd>E80}@v)mr2JZG*R+ zC0&QESbbE;oi4Z#5v`Q_?4@3CC5-1tmBqj-h0qQgSg~SK4uayooXMoPjbO#(-t@m` z-BkqK+Jmi_!V-PHZbKI*&JSmNV*TG0tliOK|Da%EHr*k*I^WC)@`4-GClxTl6Pfn) z0mEgZO>=vaGSwgJ*=Yj1%Rx5@$@!fkIJH@|PD(TCl@?Z2rOit!pu)vbuq*W+WJ#tb z7D&fEnoJ@&Ru`xBc4Hx(@l9Q2X51}Mn|{N$Hy@u8&?~j+&8|(g{G|Yt$7HCAQEPTZ zPl)%oa{5#DLn8DXccZO2x-io;o%RtJr6W_?6FYR^O{@D7J}pPSpg$RF=fiEd8A6aD zk-5Bk*3DqM?GfEe!zay?=J_sgwo)I&)+CRTrqHPgg+PMlkAhT>p?Cs@*_WWj()2+_EZ4dNg}H+1Ih9>1`DgFx(j`#&>(@}4gnf>cXxNU;rsi~RL!G#1yj`z`abBc+o$@T z+Gp>zKI@2fY~HOPlrAxsK-6Is(d|@7Mq?ObQ}*y7J8j(~)ap;gFITI8vhA?u2`&Y7 zOX5{=Y{U72^tM&_$cP!74dX$&bK-`x@hGa}o*t<&!(jR= z_sLRqP-L-+4+EhDpV*A1`UE$Z#O|*gE`+jowZGRGB}1i$s^aY>?2Sh9%NI*^8v92mt(9#S0LY&? znQD{S3SV0FwL9X7a%*b(@;6qHBHcp6F~%PlXcJTQ*b|Q!aXOof6rVy1x*vy(#v@K| z2cSDrU_UI`6c$y&-qT|3cYL~WjbGA*Nd%ivUoywYOwK!;j-;6reRyn$j(Xs4A_(HVBvnwl$>Wf1=bPzQVIZS~W*24e3XQ5B<;89H>lAcma0Q!yK;l7Pc^4L+Y z-S?ro8osJDoC+y;zmrt!lr{mP`Z(bi-8T?iSEnK7g_y-MF1%XU(Yg{1-odr5;t<+i zBTmcGs+NGWn4_F>~1&FqVS4(_B(#7uyzc>2lJM#Pn$KZ=-1*#J)n3(#R zJCq4M*K9RQuZR%^x)s02^$g@)zFoQ_LURf>`2 zb6qJ5n(eBB)b)quPY^}nfN_(P(sUK)7*wp~dy@b_+){)8kP(Cww*3BO0Q z@vyj!$qa76+IEh{$wEU`S*3A)V$H?Uug*zv2qP&wm?+(d zZ3D2jUs!U-=Y2<7*x(ttknPgFqhn)}6*2xzbVw|qX#A$yeK|_~mIzR2o{+Rr(0NAR zdQVbVDJ#H+jq}vZ@hzC+&YP zzf*lHqt#B%=+pboKYm(CVK2)rnSqAZd53g6&B1VJ4WOk-sOL*!YtOQ4Roc*LOZ-4i zWG^&Eb;N^?4@pUEuaXS)6q3ceNpZ#HoIaH{dqTWPZ`4WmL?rQBc)EvKJBQ57$RvB4 zZ*tbU#>yz;ix)1JYDtdc8T2wmdM8))2oMY|-R{&+cIwpx&G2!Pu(^90v>G_f{+XHb zD|NP!OAncB-SQZ$d&8a9BpF{r;!~3qoTPXTBQS5WSG$U*eRpthlSuh{=d>E8$lG2{ z2xq_^IhO9c@tK{$IHh6uhO0^w$yUHeU?)GPh^Qtbc1+l!p+HZK>v6hLA ziLfU$Hi3Qlp6xWwk_7T{>|By&L+(}~zuUQ>+&?6ztJ}0i*J5x*kvsvPXL`?Vfrlxl zjAASuv-@Px2GT!5GHE#*4q3wH!hSD=STyQh^BT8P4md_Prv^iKf4VI2;+VP_5koGt z-&K%*!KA`33Y$>URyTJ0F0*CpT<=Ts7xvFMmdy+IPvu;oP=X2pF;D66+3)jMWH#pa zlbT|E^a5b-KsTn;I*3&ZBf6RaZ+KDM-_u2~ll_#mu^URsoo$gd+RYnd?z&&(fMn5^ z$aM4jF-0y#y+3Gt#hy~ zW`#~8S@||fm`&*4V(-P;eH83}{~mK*e1>IBoRAQ*ewz$e(~fLP83-?k&P8gNNiC*p z2o{zUCdMa&?smIyC!9{8q@M*Vbaeuj?J-eMYW?@wqi3+@zKm~mcaheOWuVO1nrh9m z@%Pd|o>zjU1Q>)}qmAFi1a2)$5ATCI)0oHKLWR7sN-tIFvibidgsS*N=m2Po5;Jn- zZKFpHd%l&DHUtoYNXrWy_F{xWyvAw|f3P-}YbKJJ(-{$Qk$8o)Gef81;3rYkeFC=}2Yb#N0U~mv(NxuEB()VUeRI8V^K?5!E zo4P`%d-NYxJIn6i>b{__uTz+9gpU%zM2kLuuZG6CzK2qdigsPOnl*VZ_|;({M~o$9 zJ@!^Is$QpxoLe`5ZNnz$tJ>OfB7Xa%nn`m27kVljcmHmWh>*6T=TPi?)D#JFKDsQ; zgOhb+>;0E##N}EnG$UxDuQhg0W3|^3@KJM>)WSYLSHs3QX6FChacY>QR?;#Lg%qLx zy}uP7f#Cf8A`IQr)TB@6`F%bCpQrD`iqCd~(eKvrZw#4p2j6^3yE?7Fjx$)YBr!E! zLf4+9dXq&LM6&r~lmf#@+r8Fh*9*(m&Q@46j-k_)UZcTVRzZ%2mOo~Ofb|u%e{r2p zc5ulRFx7o0&V3Ntm28;ra_Y79Ddz;J7bEyJ@Fv+q)#*wm`es7QInz{Q6)OFW5=35Z zB9&+be8I|Mgc}@FkUr+`8RPWDsr;rC+YZjz)j)C8s($sM_8itqz^TNT5_dSL)#{C6#QxD z>gVR%tt$TWt+(W86G5!xgjZBPL?1cy>+Xb&uv|+u(`aJ$mP#C(_EG4wp${doy)Gya-Y1au z4yArtmse5I6y~!r(sq{$5GZ{}ZVt&H*l4IuvLG?@Q?-j9TGTJR|6^ zBXQeMnGZXds7RsgR&_)QoD0q2TEa*w#Jq$Tk0FwMs3s|^qkht444?||85#~#Wd$)f zCw8o<=n`cTSP`3?z8dB|OxZIhCgo4!;bZMPa+uX_Bf3w{`{a@(J`VMnkcfO0v^}(j z3=B|k@T8?QRuoTIPOdM=%byd_AVwgcjykpEht_c$7TQ_^;>VSr$F0c_;`2h2w6q~* zZM_)mlCPCyv|Qo(O<9_P>}Ird1mzgg-Qkh60WL6$I|1 z)-9iiU`R>LD!p+2IMVHB!F?#%WCEeRY~T+%TA`F|KMl{Vc5nS;`+53NfC7k3TyZhB;w(O40Kuhno z3WINAP85lu^Y?6}LHR%#rk0RzQAqIvMV(LPUM=1SrIkgd6QTfMlJDsaN+^3`S`@1@ z`|&(8^(d-14>6iX7YA1xA1c&Ri(@BrjLgj4JA2d9%4E`$kDcDIqQl3$g!? z-re}GKJnN4@PuG83!gcqZ{L~aj&$t}I&cPx+N(eJvi;kp7VPUi9J;Y)LZ=?7WSo68 z!(JIR0p96HeBGtj8ikCEp*Z4*L=W&yp_d8<>|n%1|a*hDB?!&6-cVaTfm5=O)oRSzPu zA7(&k<7)X>lMw2$XK_RG6&))ZLL`shh2@-j^60ZV_WebVWe}>Ev%9B!QdxCT&Jg|n zn#QwJJelkRSZN5^PXydzH`k1%PSvh&(@3h5Q~&&;;0=3Freozo=Ui9@8DZH1PFn5Oa+y!@GGe#D%wiqWlLGsUNrQqR-b600L53_Q50 z87Sr+qPH#8oo4H$r_HXI-i3=G_F*Fj{7v)w#Qjj@R?x)EA51(r1+)nuiHR-8=Q!4& z?5z1j@R?adK~m-z=G=OwsFxm<+?$CB^-3LsTQ*}r)Yc9C9a)vxZ-?Z`MOhSvBjy5N z&8obU9Fk)$Nlj8dzt71RML}bU1(X+!vLOIk<2WeXw!^X_c8y$1?KHO9tW*6z&Q zLeqsl>G?E+S(OrWh<@v$d+z&l6|3_#_=TCbsLfkf&B{J;GEdHACq{$awr-E$d3@mO zRWnDd!y78+Vx!}DP2;cwFCj6pw4*fEX0kQ#g_vao_afqXxbmA&$H)BDfO5L;N}7zW z@}6(J!!PmuZoaIdvd2bNURSFk2SJ;h{@~&6IrQD7r7kb zZ463T-Ib~@KY#En<}=%C8N0ZeljE>AP)bnS-l>Q-*QJn6hZDibT9r;;{q$2i@vA?K zrOtwnP&dBnt9ok~TZzQPc|T?f$j^_A2RpSgj)t9R$rf$puF*hMaT8Mzue!h?> zP=j}gsUn>I>B#o&)-jXhfd6%09<>DKf4?YpqR1>Z{f%ezpj*{^r|c0UHv95mdDhcz^Oby6jjzrwpj! z>gNi|5&Mi#roEM4eI!B=3?S|sDv?lExM}WWR!Jam#npmRMH;4Ohzy!?vX=*SomoSy z>a)x94oyp4^!sgUvHWt0L?$VA?y=cqAOJ{i);BHl8|1hkvaN|d4R!u6D_`3a^E&Z$ z)Gp*PvM`*5a%fFChHk(skmcvF4EI;SmtR6p0N0f(ms-TES)iK_w|ZQdkqe8Gkf-oB z_mhpsOt@5^Q@@e2(6TamHkN-w8Ggh{%lFks?ekWZ+5OpHP{qv{&3DZuz7yec;>F`^ z8!x&s@#A;g&&woJx^6xfWb4`9WSjC$=+!T4PPk$cELjF-boN@8)(&nYjT zLe!-W`GBYg2M2h_m~PkFgtHSc&{DG)4G@p9+&?WWVbb&MD5MA>Vw-KyI-CxBgTeHg zo%b9iB_rGNyh_6NWJ&W?A5q&1lCsc@yCdNs05x}N7c45ScWO(ii-j=$CfE26el`4*wCCiV;+vj!HLR8m8f@H;T+pHcM& z8Q)lB<9$4jyHJW-N)8C7#qZHh73VWI4y?M5LC(yIs$3NIggm2me0so)Yj_$@cA?4M z7uu{?$bVX-H8 z!{@F*>^=26Q-ZMMwJlE}PD-Z6~qrKx=adQ7n`Qq_~ zyea16NKc+ZbhCk|-Mm>DCPTc?FMs?ULBb+2%g9u{R!vV;&de52MkH%(Kr3VzP?4{C zb)9qxAHBdVwUX1$#lw&IAkC+@EM;TgXD-!0ts+Jl-!(hmE2GZC3u1(cgO3w{N(9m4 zNRXDte})ki%OnGp1S@lkq+X(CZ+RSJ_`S19kKJHoDJ%FnqG9e)I5|Q0Nch^iN0 z(j3tJwn^KOKzyvG-Bs36!9=SZ1EIqq{ND7I_wysNEOVPazQ!i7-SS8a`B@<`!R=$u zJJv;!(A*2jgrR5m#7WyRu4j}%Y&KgGJQ1D5|3U;L7*<^7+Pxs)OJOFP{kyfqjGyR5T2l zKcR&KYrE2mvDB00TfWOhZ;?1*sVm^@XYqS&V6b$8H^)r59&JNiLXI}*f3K*7he^}CGzw`o5!4hkC=m(%235DpRt2cLut>f|!Fi0a@M zxkyz)Lbq)#7l1wu0ZK@tz7`_v&rR=^$`Gc%!Avr*sJAW;pQ7((r@6Lhn0bTpSG3i^ z;EF^nCl1vKaU-@e*cZ_;JUR_TOjWK4?oVB{)2_+N7#chYDaj)J)r?QCetM++ABHlq zG}f<7J~uAtiMm2rQ$Hm_!&V<$u@_}8>q!4}Z{BmR_(iv*8UP64TA$fzw3Kx;gSSW_ zxKM~OMr=Mlv&!)s+U+v)IO>2l7(tXpRqdAvEY*+A=^V|79iGsU-|;gmJ$_4QK`V^u zq#jwP1CpTKtW|>#2R4n*99N{gd;~ZAB=t1Cg4SYZCmeWP$-NU>F%|$qbS(QG{!fPK zxqKXB#tfj3dXE44^R*~c*yML?6M;)iz73Gw(=+`O^U2D(l(qR-lj(`;N2*yymms>Z zOtw#Cv5-J7A=2~x{O0}hA-`*|5JT7s0ihwA2n9VRDLDA-IL{jrS9{4;A0zl1i()WX zN{>$(=64H-o-Ty-o*n$p}SW@7ii_+N5& zOiEFDke^hTuZ(FwC7b5vv_{AW$;!!#r;D>*UEl>)kCdde(wK|Ok6ut;4I#99S7S?F!zcxo(^P;vnDqon6= zKiNnf-=Z*NFi4>E^vAWV{&kSvL5CljR!*_W+ou+{ zKXivJo)F^Ak=&v-jnnOxL>B_V-gB+_M1oC|Z2{KmR}mQTI~RNU=$(N*;p;HoHOu|j zQ@$ClNTkGm?q%-tZ$r+*4XXYx^txAOC(NynujhuA+h?auD9y=xeSdFn@gJ_o3P_f! zvo$n)wWWx(FZZGdT_#;K-u%Q2T9GG|AJ zs7oC_JXG+7^XJ+b7wU@E?Twqvi%Y8WkjbgeG8VUvWu*( z7-z^Cd-4;t3#zz^BQz%d%xM9&x((V%k(R8*+sg3;&$;Dx!|IGHT(jS#i5xcTilL~k zjnX!XmvxzdhKVQ*|Lp;qyEGMaX%AS*+YJhEVRG&$1FC)UJ-*Vw1RzNE`>3b zb8c6R`w4`0eVOU8tJ4F;vswJA%K>;`c~Kj{E2$u4Ux|vk@85w4zTY=E^JYW|w(d&1 zFt(zP#5i{$Lrl%z>n#~?17h}!aYYvMHfTJp;nA@ajX$tTEqL{Vl+{&&1$TrF_{7`%wcv0ZFVTbe$F;DTsZk4lCK zDXN-+t+1QmybvVKRg=F=pI&@4zs2fgdnc!3nCqkS^S{~_jN0mShLDY-AekkPQgGUw zK;lOVB^XFnt5eG~c~vG8%=SL;L-9ebO$p4z4O8VAl!Zw`hd^5MzDX|+TyK!uuZ)6$ zAtp*z&HNtBd@EJ5vf3;oGg=zLYWg+Gr%#y4MMJg*?TLc$32gQVWxIcP>E+}hJJ#m+zlf+f zhGe2*x|Y4-@&1H=98QVW8QGTlB2&s2{hM+ZYQCi#=E}Pn(B{kvEL1y_qxSIFcRuq> zQ7iC0w@?D365I4<)}-8QS44#q3JYnIzA1ymBmg$^40j}U0CqZfUytCz#6fkOolVrui~DOcGZT5qGqTMqg1`ZD0E|*r?b*HP!fs&(6 z%il*D1TDj}Tm+GeEgYTB;pXfXq#D`NdU+M;mB1J$#tsNi-kaSMzgw^^yK_0 zfTr{3PWZL-lF{L;dZ@cr#(l+7jD-=`?mGS?I9Xnnso z)XeYYK`(Q@;~#N}-3Qqz4)ai`r?yjnu&}>#*zWT_^66#Kd!JGx;o~jqTWb2|YTLz- zioMs>@lF|?$DPu$=f(5-_Dt0K2yodX*MASV_OM^FNa{=8`IyC8eT&~|@^?!mb>wib zSD4JGOHC;Ww_>|l%dPq$%do)lah#CBC$wr!cOaqBZ*=dD!|%c0e)ksqLYKQ}xR)W2 zczAM+Y0Bwj)pNe^y(7xMr7>XMz!&Cu=GoIq7fD+4C6hal_~H5UMU-Kc<>bA;hceR@Hf~_}vS?Ne%VWsoSzL zpx^o-5fRo^@BTIJlp*TJ*YiY^R>h@jPABwZm6b)hEbd0v?A<$T<~rib7nkU(;<2QW zzj8buo3s??>z`J)O!xy^xAW*=MZ8|KQgN57L*`+hggb(7!E^%&W(mR0)>cW9#j za-019VP$>(ML?T5jAwE)7m_Q;wz4Q5gV45)T)IohIV_7QXUvV>9HR*hiovcF(xygZVqMX zh0qfj!aR3F2x2f5GWBB_T%p|xGFDE${LBOgHb@a=qH$hqAxJR?h=a`Qj=4aB36H!f zMqFZ!y9%-QAyA|Ri@}3durvckqh5ZURe_s+bcom7fW`1GqkmRhRPq$W3JarH?J5s}N4dX2oW+XTakXZWB{s zC(%{EBEt5kFeY+jYQ#h9h5RpCu5Fb(!c)@xnp#T^GWf}}ad>*r3#QWp@%cT0yXJoH zfaf{hmF}l|9?raA1j)j`8yy0JEhi5X+t;VWHWsViS&n5$zru0wV&&aKoZdwNk2U7U zTN_A~>T|5%x2YOm>wqWY$3&@b+HYgDH_@IeT22`oHntt*y6?S%l^4%V*LT!k&gFzu zTjD%?f!=<83(Zc0=V>RLhc)J&RAXInt?Mjl;9*vIqWg(`n>lw`{thw1r^3opD5izp zHw$D$m7baTj~Vn}_p(>0+dSz)!N~!P>EgZjg}1K^mR00W+6*Xcc6O zkwVuOpxH#srchCh3a!P}=*#PU=iuW7MA7$OoG{K=ZDpuB%4TDQ3JxwQj8uWbNbf7Iw8koUF10-vM@=7zsjLD)A(nH+tmIOaeA^z(1VxO4`cYg zCk?s}!O0o!F?^rvx2MDj9-rnWF*@Y3Hw@wQ1PZ^7z3vy=``w-Ec;;m|q~KCiX%Bj5 z0NI%Z_@-^8cmft}%`g7J-6<$qoViMVZM?$O)WOF%JjCq>h0{sSYdF?)>0p__`F9`20p z^yAuVDDg~c>Ql6bSYZl?+H%{$(>g;!g@lXjYfqi@S@%g*E$Iac=HKL0({-;X7v zK$xdGG=)PW=Uv55fZ!4(!)|7}E22AXx?%beav#13s5vso$`s2WMbagZZSE;6!e^xL zvcLB+m;q=oz?q=r#)LlQPtJQIMPK` zH=Z&~=^$$_5=k{$%%ieBiKMhe_w~VShDSh&lyUX4?D$ar-wK>|_wtwZ_0_dm={;*tN4v2A=kBuFp3PwRhIA8OiQ#Q!%y z}th0j@PF;5}870HEp)uZrnOb zf?~3^UpO5Mf+>Mp+bjwgm9n6!p{Hs4xonc6mgO+k!XAk}QJ@S~p%h_r5yemMp@NJg z^Q?ck|Hrhcw^&bVL}?r+TjDdM9%cR1%ig2Rf8ZR`-;1jKb12BZ&4KL1r-#`^54=s1Eo>yz)=!X5hqhIDi z{ko*y0b_l8t94y>p1BeF8;O1sh2O9fah`S~3W{VRdNKGW694Uj*0W?cm5jOmm$+YWqnc?9O?IbtQGC5_ zHAEjIQfFH|j!r>knO`?)X$xR!J-6OuvFL%Yt_X*lP$0NQt=&gbw2tZu0A1o|FLk4i=E`FD_1GQrnk?Zw+6Ghm!KzC=$o!4T`3H(KWr% z+!YK&B;DYknyoXM>cwhQ3q;}oqC$O7MH<;(j{p`HP&GU9UbNPcQeulZcq?9li-?Tp zFZRfmV*C|uV92V@Fw`TC-8q2D7l=N>0)Lgx)0m=60jsi!$1Xd~Mpww@J!KMk#i`xA zMN;$?}hUgvj&@Upqw56bb^Ya`AOgz(C!VC$$EmS z9dZs-T{<=>-hE(GvvnKV7ltsa$x#eTpMo_fjzgP%j~_uHcF*#!9BvDoyKlQN80Bne z0!R^TaLl!vtG;A*OK|4q_2p`^mV=s%`Wai#ocn>frL$ye`q^jB07C7_$&l%n&3e+Wue|>9hy7<*uaEJcaw`1KUH5#p z4e2{i>Q#4TMve2Y_LY4?zL)01UchTya9xHOR_@BbzxY4UW$8MYg^%Bg*ndHzG^^LAKa1%No8~afAmIL#y7DmbHK+fug1FCjX zrlJ=r_yR6Ec_g!c>+|A4qJo0zr`WRkhplNs!&wwebuKOqbXLhvvKk0d+7Z$G?<}d9 zFp>FzAAvuO!QQ%`#bCvLsA$4&I+q+?T<5^tpu=}vF~DkNj&WXNJ!~=$nn{2=3w_T+ zJ?3(pt~=*$CRXsF3Lves)IOdzC{dC9@X9dE&)T*1a1Iy>9&Grl-9gADn67q)l)^C7 zB)ZjcTUBp{WZ5KW6f=3BdVne_m?%72wfTS2@(FoW6UbtvX1d@SNUbQWqK)smLjXjA zF7@u%V6|XW)|e8nh~Y8nuA`EY@}Tf!ll=alTuT1LFhWc^{0sw;VP|Is`JBk%$uK0s zby3s$K-^jjwQNEdO8DglQV5+in|GHOmLj8|pznhq2$&;Et1(7#_A|YITBpCVKoJ6v zHg1s4My}C61G=W%ghz@k!*}-4RVk&fQ(yD$iO4UCKjZXD>H+)fjQN%@tiry>0k;DNYYWb8Or_Tznpf2f=y9pPgAqtw58Ux!FF_m{~|oEl-Ba zBeSmWqvz=_3`=TVKKcZ!2O!X{DobfuvZ~0+0Fco;#W@PvM0}Z#qANohd|cICoz=3mGbC z5uqkxa<8WX_yb9LpZ)D-IL+$z2zCkm`sDlh#MVJcm9aooTT`;AQh?p@y0K*%T8D+- zZEdINC?R^2uFhq*4GF$p-I5#g?rEcY9#nKg_2#SA0kY_5=x$qQRgAGTGF@xVL7>oF zTYc(u5cJAvzxLyp{mX%^|8B|4NlFY#lU^{3_Sr>-@5|n-`ys)P3C%|E5lEPasYw^T z+Gg0k%}^U+In}X_;qNS$K$A=Q7puW z%~X^0#K)CTS{L5YW!9;f^&*3e=D)gU>A$)sF{f>?d7%(F(>yw1Lc>TdMh?TPdmt z2uD6LPvlSCs*#1n#xQDo?rUY33lI9g4v#-Pwh9nv+CfrQ$F%Uwug9D_cmAyUj_c`fihMqxZ;dgw$>#gG(dCdw2wZ|pw>)+qr3}4>g zZ&_l{gs~=9ekgs0U-wU&wu2s`)rvPum2J01bWij4I81x*B2POrAA?a+#x(y&09KMU zfWx9#++tuUr`R)%3#CT@$Lcea!Aart#n5tMs^>HjPzyIPY{G<@fmAm-&&xT4VGQ_$=UlTmdhdsa*~aZMtH9i6}cJ-A2B@LA{@=>&YJ@*lUbl6l?@ zo`64Nxx=l$DCsog>rH#-{x3(h(Gf!qzet9n#Lh?A-R5`yXT$f?e45^?dYYo`G}5H; zSM+@_*eH50x9T;(n?+8i%?RG#;raj{^5Upt_; zyD<0ItW<$}**8=Bhx0*6{{7-{y_e4PW)GjI8|!-~7I??ruMa=ifByJ$=oB&m!?>Mm zrT{Bh!Zz4FGJ;Ode?68cW3aRjo9C|d$p(cas82MAd%3;G3n_^=vNxXCH=SAR z7cnAI@_#lanr|QMXm?dG|;c`47GueeyD`o9fuEiJLdDPxY$pEw8;M2WVNWaOjB z!2Yvg(-tLpd;%~2-@in-A!p`u@bN{GAx%tqz%jdFp^s+77PnkHy=V(UPZ-Z%6`h?$fmj+~M%k)@sXjJ8c;a+&M+bF=^bhKI74X2;Jt-F} zj9EBpt{8h}K90@#PCZ}Yo9Fk|6j>d|ZB6_%qL}#&iBD~$(!T}SqtE6i3pktaTZK2P z9Fi8Rzhf8I`Ctt*JxrM@T|knQE*I>kWx~0zP+$=l@Y@ZUq~pnMrqzAnptOel%8qjg zY&oni3C%#c{o6`k2eop2k{6S%5)ilUAG>U!+mlA&fjT$0?}O8Zomn!qk@?V>p~WHV zDYIP4dav5@_*bX?4}|kYIeYb_x8N<&4^lTqrK>+Xy77mt*(aU0<@<(C4J1#g7keh0 z&Hth{zhU!w^&@;Ie%zITi^J0i+JU6P+{%r|vivzlL;4~Ud!RID(x>v*z8NO2?qM8Z2JQ<@T5?Q|)515#~+l=EEM%T#lS>fBR@MRMCPd`p% z;lY!4I@la4lA*q3v4A$wD(+(sHcHHiF1#dHRjSmMSy?i??s>mf!m%K%-UncqhCYq5 zUd?U#O>O0;J54J%6`OICoVmYj3%{kOBQSZ^;$I$gJAJW0e(F7clGWT>cg7d=*X|pC zv*s^7#JU@?`cwv4@y1tsjlzF)Ou>~m1M;rD5?l|PrjwX&ts1^17n1wLg<14o-HrPX z&DF_-ieYM_P-Km{VJ25gNtmRCE?k6Z@vm)%%qZX~$-XMY{s%DnVVCH4Q$U{Mo&KBz ze%ZMmiTaQwB`lvxX=oIpd%z!>v{agM5LPc!3;FCJUUY9#cGOk~eErcS@sU~|yGnmO zhOM)rf7i86+jL*=ra2!S@P(awc&Nc)4^x=u;&W!)>F`>ito$!NW~3nh_ySU)z18aA zA(V`I{}&~=$j%WpAVna8%5j8j zTq|vq?CL{?-ZB}vY6AO?p=j4`wa15ar8@4Kgz#Aq){H4Z3MO(qCXz7fbSh0sW1fOp z-&ewXC($S=UQzRB0Zg4ckgXSxl$OiJQv#0NbNd<@7(DVd@dV2t4t~(A$D+dpwsRsp zDAk_sViXxz>113G9j-e&3ktvwq+}{l(__?6*c>Rv;dR& zs)Lc7fs<&^ywI}}!K(uYzsbMVks2D}uLcz?s38wTVzc&qJl!uvkC$=&K4%UeB&Tlt z1$@eXHbf{j8zGuN_)kXJ8wP{WF^iuuE4&!9b_Rxd2RePs!W}x6Ln2`#`_Szb_twv4 znh(BdGnT}iZmaLJ(aMvk?T^xo!sSi6?g0W1^sdyXehBDV6LTo*W%uHrTr2(WpzagN zg7Q}aU-YBxuJQTO;*2S3tNGNAjjj5RHeN;$vjLfJZ4mi-W_L{Uoin>$8WW^kI`pwq z0PaIBHXk0vaW#;fKI~()AaYsfiKEo&(V`%w(%bwlNxQ3>z!mt2|G$<_C+Yv#RHe_Y zo)IV3cgoXeFvGBoCK-SR-X{KuLsNSYYzDj3OC(4!4veiY6kqg1nNHTn-++pf<1KOR z*Z=sto3*t6n+>=&JJK4wsKP0=FAql4ilzb-^}eS{_U+Fv=m~c>SJ@F4T?pgGyS$z4 z0p7;DA&9#FQHVYaa=ZVt!jD5n6o`jA5=T4j$c=6XRYKd59)v^KSH|J&fCSN4y`^{^ z?xvsC(+Ryb#9RI&Mtxu-u>KeRAl)(%&#+K zrS3s#CZ6yLWt#JMLI$q1yEyaNZ(BLeEupWJP)O}|r!tN@g%XCVe`zS)(OnhAcT!TZ z-EUhrYfByuoNlml;>BnBNoIchEl-#;W}0T4`ry^|q^B!R;ld>~6P1;Kw_|(@(?C>{ zS84ZudnVl?L56^oBEs#Vw&leLPBS`z+wC0W7XM%#%lMlcz=*$R>uu7s#?v#9O~Nwa zM;9-)v^TM}o5= z>sR0SW%GK*$Ci{>DJw%KK9G@Ec_t1I!+rkT$kQ86*yE)*s@TEOTpDiu{pv-Di>hFY zZ!{B?+GjW8Tk`?-lvY=NrN+5Y`ZF_GX6nUeEexECiwO8({}Z-6vB~jWibDIVw?ez^ zxOR?OeZ5RZ5<_gK6Ae>aMuF|OH#Ennj$!>>@)y})bgVVYC)|7e@d#a#2HWDDUcVDp zz3;%RSPmnm0*=+t*x1St;za?XxQ#k3X0dUxV%8AE--klNcUEYtc!X}-2EQ`)Z)ZnHq-=_W(oBQg5375QFVk<4 z%ShDYifH)rac=p%q#jv@r!kvh?-#C4)IzTqJSk=_aaCtD>7efhOOh$E-%nzwjmGpJLs-zAE#W^2p*%yavt8lNR{TNEz>P zIc?bu&@xS0ge3K&PpuZH33=mLtH7BphWDENgUX9l_1~fJEtpIm&jjh#VSWlyCoS#$ zqeGtyjJo-K*;rmV-OsnWNxOvCZPG|VjhU1l(M$675>Rl+N2l9TZJxqe4#){SLwgzE z%OtvxGUqI>Awb5Gs{LHR{&G{_z6lkR1C8Z8oUWQ4S@0*uNWrG57j!$dx*R7clyZWD zJ*i1>bk;@v{icx%lgpCBPD%(5s#j8fRupar<%*N)uQXi}j_X^X*u-g`DW3#L3Mlo{ z<^IkzVieGYmtTEGZ}&l73gHKfCOE05i&41Z& zjZ0It%_SY@ZWJ5aXIt%jC$PTO0T-Kn0Kw7!S3&3*?M7zNvveC=}aSQ*;gb)`B4T*9k@LBXGTTwH)MV2&`ZqO`ICML?>CYAPpsbpv%E_Yt(vg6AmYlT*0j!C$XwKF00 zpEq1NqDna<75Q9V<0KZRWf~CojArL97YKPKg?mYI;D_L`^m{#q^yN`bh z67P79Yz;Fc6Tf@RZvOPpUrZ^9J1y@3{^<;I* zx+h_z2@#3tb3Cc7@8s{$m<7?0ELhE&s$;vX4Xq1)YX(Mt(j8HY|l94X4cA4@}F$%?N$>+#ci(N$VmSg}Sg!5ep>XluP14CnPEH z?i;Lkfv~V7Z196ua2L4dfyxd}P84UWtjxj^$zPED!(V6o51uDu_^9pagVzp+Pwe&W zXlk)OZu1R{G>7(dT)RHp=}-j^DJ*Q{@t5g$DC|RKnaf8)^|IC^K^lQHcfXmtA8>E>0FdFH6sta5pwo<6;TI zp<(4|u?hDqcgcaodsB%@bASDhYgb2Z&RZZJI+8x#D_O#8HM$-T?~ir1_F8!#>U4NH z_wL<%MxPxkPN9Sx4IXjf^dqkxJA5y{<1Ks4@Uy-b=V^5{xd|GROvx-a_#-8R2dyMJ z+9-IU+1D2wRqlLy`r^J!Dg!0nj6{mt+3BFyVNMb# zLMBO4&NojoU=9;}iLh`c7)Gmbm%9dzJn_A zI_14S`~x@LK&kMVwm5XiqI!9HDtyOtc6xR4Xv%J(W+PIv+Z0Opyz43I&?nf0Nu(|c z>NK^0ux0qMZ#U$5*7>Iae_B=$D^w=xi5PMuf&8SP8FUEP(4b&KHR)N)tUhx*~E;2nsZDuEC3@RM*3|I`KLoX%j= z(Nv%YHr*X@u?@Pvb)$}W+e)w2KP3}01oXXkQ#Ad#{(?NV?U_o_Vtx+U14 zcc+y5`Rd8&%0JoK>u0Hg#~rc(Hf67{30(+yvEYCP6z zlyCoT2f(Gicp?D=%N|0Z2>Jxh2L(K#Uy42xZLE4C7L-S|xUiK^5VTQu8kM86qw7s{ zFWR_1$&pZPONjLy(j9p>`Y!tuJKnR;_(gm3YHh=*5<6~mrCReo=-*$Rk(rdWPO7jU zZEbz1bKLBH_ptKRAepFu)9b{@=v4T#f=(8Th*HGEv2|3==JVzzg_dLpc62Gg$l^l4dE(m&!5#S#u zRTQ(ia%w72{a~TE9QA%Z!*z(A?&f6%jgMFuJ%m$aS9>*7_s3Af@V8k}{dpC?o3_sA z>5W~$U_+HfOEe<`I`)xA+!7EAjCWqv6)o=%3NHPQ{h>3n1KCm?Yx1&`me4-$5N`a#h!>MgT-opA&?J;oq*cBaa6b2RU}Cyh%NFj zmPZ6Ri_7P9t4ArY^p?X#nJD@NCJu(d?{g%Vo%|>=Is^Nn+VO;bQ!ySwf^)&)#6Y8^ z;++_k#38k&%nnk##C-9Z;m0+%`{Ff__gnE&M{g1doI_UEk=sSbvls4o&X=#mq|7t6 zJQfWgRj60KSMeJgwu6S%a;oB@Eap9x9Pq&E#s0OwOW(2wut$~NP;VAnu}sPt#2Nl@ zBp1($mq211TgL|81i;b}CY0;PuoTGGYRU3s5Av!EODI1gJL|PYv#~K2?|Q%`E)XVq z4P9+npaB+N46=-}!{kXtL2=YX^`Ha`7Fqgo^}M|56P>*t1#i7RA?dv_UbN~=&AAbRkscWi zXM4tpMUpBOADAYYbB~$gPm-Qm{u!|0lvcJB6VGxGdHhT2*OIEyU~|G(cKz?VN-`5( z*l8glO{o;z=`eAZrrXT{=CgH&os&W`LlJ20p7l#up!O{<+;wlZxH9PvaV~@Ac>KKm zFR5gzXD>|7T@libLlM$$2gvuj?q|frQvocYx88ODZwFBfJTw48j$NaK0X76eUJV&& zJ8Uu9SZ+O}Wzebh+@a$B==sA-$U(1Yk31n=mZub>Qi?{s1e1Z0!-hSYT!QzrtIK8^ z8j6g(;0&(L+{)oSv`1T@^NGl&@aE&i&+FMN?$Z27gNzxzcH;3&)s|`0x{|_EMtAfr zI}F+hC+lS(3^IvdW_P)J+Q+dL0#Ty=skg5tp4iX7xA8R&c^k~fg_#S|w)VCG6Kk$<&EgSVDw23-J z1w%<}e`0wu8?}Ua67g_!evppgCX1}f>MgZdVstUvT@#yLS+kk380swMhiJw?0x9hY zvsp{*sr#ZJadpoW3z{*5_Q+M9b!jI`<;S$rn&k(;LBjE&VUqmCLwSJ55;ehOGOGq( z&$E;AeY@>6wT3l!Q?nIT^{FJW@UrrsIRg+!;HMwWtmUq*mj5JiA+I)g4~S_UU$-+CY5~z4 z*qVdXaQyOexzG?a$cU?$GnAX90h;5B+P^Kw%nYQKE-SHT#2WpOexaxx@g<~IS{TxU z1^q>7fL~OBim9Tv31pnC*=wzjN+%HSIbXQpwP2 zpms++Z0Qn3iTXuJoT~=~fc=8nTGJ!1TgGg2hf4Hr?Xr2(XP>=XIkYE}c-AIXI)ldI zKXfK8r!qjTon-;-9~)nGAM8&~9ol{NpuJ21Hv#!8k^E9UaMR=Wh5sNC2kz6uNA30;ZzprzgHIFQ_81h zfK#qx0T9#(<-K@FC@$10wTl+h*|fAe30C`0Ru$!5S6c@x#HXF^#|v!8=oRu+BXN}) zeq4!V#wY7=d>Kj|&Ir|qi`NHO?|Hpl0DRG@DM<>(Dj7N|X&^Nw##-UhH+8Lqmxg=a zxA`9rMg9=-Gs(H1w#S%Humo%-Np?*;$Ic=-9xl>N8OX(@?KtLXTyeU-nfXO2QR3{j zYg$v`q7;8w)EP}n#%=-i&{bCelk6N6jatKeaeUvdMBjctI|(D_Q2E&UNcy^mGb$-n z6X;Ny3Al}@PoHM!nf9Tm>1nCG=%A*;SIgDP2EW4tDQ9y|Y2_46*E=G9hep_~Vl!i1 z@xS#mb=^I|c^tB6a)13AydK{Qv3Of)5`YIt00`Z6ie62mI9uw`5F-GTytE*;<+yRO z%<-tSfz-I}2muJm*RMgWtweKLnI^Xg8CJX4HPcGe#q`CH8Aary=+Kb%^iuNjZlt=k zHt5M5{_b}vX7eMfm2c{VS`Fg*d=dhw^l#NT^+pBxw^2)f51oiFCooJ488Nr0>@XIOK;=ST&5bU^;F0;WY$(96w z3OsOn-$`*N*g9zR%fSLoPnT*i^sGEbYa<9){*#BieU3kxZkUla|BINLq`in;9p|m~>(PBefF$*L;1&IWR+Rrw#A?OU3x-o6JB9!pcYXMJ#RpXYW$3cn^Ayte}fDJ64;9YWWs49 zD?iitSJ~W&?RpDK1;BNQCu>MTG#d66DniNKV)(^a*=AIYISyly3Nr~ki9t*>a1gce zEM;N;}%Y!No*VnDFylq0WNt zI+0N88L>Y%53OE#A2<$iad)kxzO;BwbF zfi^W$YKh!8GRuo!2#34A?rU#dXZCB4+GcV|GpVxOTCL1(dj%Dho!wT$$iVxteWnq9 z;R+(ZE;TmYje)u@TPW(p7A{Kp$MgoCnR4LM``X53^uMyTfbZm22qg}6zhHWjcKIGc zupgj9<3-m7%VkyA4=>+{Zg=tmu9tb%Aolu-ieHhT#^|;^-8&45&D8KeO39wW@s2e6 zmA7NI_TOOPiODw4t?G+Hl|-FPC*yke6S`%yW(1%hXmV*Vk=DGpwJKo<8rdGpfG4goISWtXUE5XmTjcbcSS|t^AtfdoC{=uhLIs`( z3M2+q$f!vX0g3(d_wRK{%Xpx@Fq}qa{QyhF(&YGn=tg?&Xbeqk$WCqV4 zpI@ZO(y>lz4Y@O@BV}1JihT9amPAmeu`ulb9=h&&Ueg_HMJG8)^pK|)u7hG5$4DoUJjcB|tr zv<_P^kibLWdl3n5ewh&eN@JN(<%E6;np@k5B8Jd zWV!1|xu|yrE0X!QPhd6y%}HdphuuI;=8nvTN`Xn?APDd+#Z}ztSUOJ*OgW#9I^vZf z-X@c?#-yiA+y=ByeiRn{&yi6Er5t8w=U))SO(FKk7J|-hk0FJ7qvO*mb zt&$ySjngED&$M1e`JETlHk(Mn=HLqp#dUNrCz1~)^{9jE=0kMxpaO_60*h{Cic=$| z`g7v0x{xBJX2!4SA?}&3`lT#3UDQ0^2%`eBL1PZcz>0)$@a>pm+l4>t)pbCyhmle2 zI2-J@#RWHbzQ2zY@eNE%^Yy^0U*bnSDd_r7!rEIPHa6xOts0vz zric)p4%Pd=L(1UB(}YdR_0y8~HLg$h@%P;tGUL&5EB;)4;_>gCX?`im{^`m#tr%;k zke!A8iJics4y8U|Q+7e-aMTy-Y^8&w(is5@6OnA0w8und&hpieg+YIf^-?Ud!yASyFKz)~0EHvf9o)b;YRduNPKE@%UTVg-9R zNq>a+^RtHDv`+}j`%7>15OR^{4_ELG$63&$is5g)741w~zDPoU1#xYE*l<9EzOXhC*W4#&$`OQ}S!CohDIC$c%=@VtURXFitY z#+1J6pu6l9Ci}K;)~FT%lt`Grch6H^a0Z7;-Z z5lf@lL5KFQmCZLh1t!3e`H}E*<_q$)es@jz=K!dv zLkR=ffpIY7s;6ba*)$GOkQN;HGh4lHAgV-k7wi{IrKeGSGS(+D_)yaN*%FVD~uN(4^UZv;3TH`O?jhHR-C!ufj@=?+kK1 zGD}lz<-F1(;8gbetFa~*z+~Q^pOo9v=M=?6Pw7s@1ad)Q!_5XD&og<_pe>3bwe*=| zmbKQx8qkOGZ4-OF&(*5WG{7oXCqF2AY+d0YU=c3u&2)Sp0tvC}{!(R@f3KKP54Wa@ zxom$VTYnBt+)zKhY@>m81P3qTLK@}@$I!9Z%VsH|pkpSud{)*OZ%L`;;ZhPMn zjA*H!hh_?g*$|m;mbZ6Le?OYC`e);VhDjs!mRr5fqR`0SWXms8#fmIQ7!1ROU&t8* z%p`w7nR5dK4XcVEAmFIvrNlM$IF6ZBgs%*M+whfcoO<1kq}$WR&k+{jD@+RzXZwM> zCm4ovWI5=C&%xQndLs+(;njt=SX!OgRu3G%Qd!|54CXXwaJ`J*_eLY29T!uOxoyd zxWN-?M!p-KZ8aYYBlNb@>-r_BsKmj}XmMoBz-9Mk;rq+McA#y8d-j5(58JR218a`e3=_US23p9?g@r$I)W8P>w&+Xnn_g7CYY%%f2a2S zg{sQMJcMRF`296=_sZn;M2EMI=41NnASo&7lkd%czLx_ZX8z_)?H(ALLLQKH2)euf zYt}9jT9-^ej;R*t2q!^7!r;oG1SgCsgJ9@>P6GY$s%l%J>p9_l^%9a2DkNDeZY50! zbCvt4l?{t0mO&=a2#=sO&^*f>Xok`xsxsLJFH;rf_%a%?HvZ;(6E1SxXnrWQs7X9J zpn)O*R1#TCIL1%Y$}Hj>xJ`15Z1-+z`}A>n&qzUEF@SJw&5*Us=@*9!%aa)y#M8xQ zv1{1=-hg!y>)#GVi)Etvyc?MDs4xebn1!UNN*Epz6ZR#j4bLu+@4YPAKN=b9U&@X} zvWJW^Pxce0=Ch(~GZYo6lC??((Ay2!jOm9#XQhk&dxC=OMp;rF@lv||JS+h%5ABOc zh){-Sq~x0FGM}MCHP4{oBE$s%fe-f4ih2x@(9k@>>%#Qc%)|9xTx&;gavDaY_-coMf2Es4#cj9d6(r&n=!G`zQ4oS{&6&(|<}} zKCqVU7bSQFy$(R&bv{iO$$vhEMudcVbav!c<{=p3em*+lkS}e*@Ayi|)CQ9(*3H;= z$I>C-z66vJFqoKHPFiX(vEI!Cw5z91fIqWXcIz@sFo4=@zoOtYiONo@igj>BFf-vZ z>RLleqkUsAHNXYp%4mFY9EH`A*1@?_>JYeD0xEYj$A`}PFL}z@43adpx8mlj1nb}# zH-9ae&;q|K3ZuS${L|(@a~eIMGaOsjJ3~{Zv+0_rRqy#X;=EVZV@Ft{6xBKNl`PIR zNu5h}cWP;A0p<4wUf(<6RI-f*2pQ@T#u4_|eZk|?3sb4sR3*aSv5A;`ATKf7JIYTX zoHHsxQ&bw+18msI3GCTt8ui4MMzX0iXJH7jp|vAht9t^S^bd%YH;6@5QvHPDGqJ0i zEiA;?10Ar&p|uwx5<&TkXt~zgGpp?aRO5udQ^@M!e<=*dYZKfd4SL+8rqHv{)%1zg z=0PF>t#E#N5`03NWiE`Qv@K@ZM!ug}7yL>b3mh+tD@MwfwvpvkXO$B`ip;5r<%c;AG@n>GaYtXWVJOa>-Gvv0q|Reic-+G zraZqv$)eyL?lPF7{GD-;FKI#$st&QoUIaHOIqK2X80%@9Tu@4Ci*advkw06xH2J|U z5o|&RvnV@bp_yUa@m(TBgMLe%kOD<HGyH1D+Y6EAFma&tcWsPpu>b2ZeW{9Tzk>R!1thSK-5`Z0UEAp3j;B# z=hj!X_hp}r?VaT#0`%|>`VeAl=ipnf7AJjU?aJi-vw26V09pRGdt!li)z+{#Wq+2b zXFADq>+X8Pfep~HIOI(OYysHnbKE+NM7^h<@DEU_keL2ryRg3T4&Xfa)-M$996xgT zz&aHk?i<;SkF&W$ySDk&1~r952a5E-Ps2#l1j)*bE!qIIp|fo({rw?nsT$;=L#J`v?tv?foY@^wov3&{R+Eoz2No@`W7>-*)T5ovMn44j9kh$%M0&1VO>x1Lzr;hsZ3jJSQZ zIg`A8pHpHRy-xAs36!@SarUC>nb};6;QrrA7nozedtX8b2QwMIVkdcR4wb|&*r1nWQF3pYB||7pwr|JLMploN59 USEXt82#Aj*FRd(9D`6V;Kc{HB1poj5 literal 0 HcmV?d00001 From 56a27bb8801ee0d1d728e9f7e508374b23b175be Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Tue, 16 Feb 2021 13:43:24 -0800 Subject: [PATCH 092/161] Basic Acrolinx corrections for spelling or terminology --- .../microsoft-defender-atp/get-vuln-by-software.md | 2 +- .../microsoft-defender-atp/get-vulnerability-by-id.md | 2 +- .../information-protection-in-windows-overview.md | 2 +- .../threat-protection/microsoft-defender-atp/investigation.md | 2 +- 4 files changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-vuln-by-software.md b/windows/security/threat-protection/microsoft-defender-atp/get-vuln-by-software.md index 4fc8f04d6d..a8bf3252ea 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-vuln-by-software.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-vuln-by-software.md @@ -59,7 +59,7 @@ GET /api/Software/{Id}/vulnerabilities Empty ## Response -If successful, this method returns 200 OK with a a list of vulnerabilities exposed by the specified software. +If successful, this method returns 200 OK with a list of vulnerabilities exposed by the specified software. ## Example diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-vulnerability-by-id.md b/windows/security/threat-protection/microsoft-defender-atp/get-vulnerability-by-id.md index e08c565ad1..5b09a4bb67 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-vulnerability-by-id.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-vulnerability-by-id.md @@ -1,5 +1,5 @@ --- -title: Get vulnerability by Id +title: Get vulnerability by ID description: Retrieves vulnerability information by its ID. keywords: apis, graph api, supported apis, get, vulnerability information, mdatp tvm api search.product: eADQiWindows 10XVcnh diff --git a/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md b/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md index 440ad1866e..baef9c8ecb 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md @@ -86,7 +86,7 @@ Data discovery based on Defender for Endpoint is also available in [Azure Log An For more information on Azure Information Protection analytics, see [Central reporting for Azure Information Protection](https://docs.microsoft.com/azure/information-protection/reports-aip). -Open Azure Log Analytics in Azure Portal and open a query builder (standard or classic). +Open Azure Log Analytics in Azure portal and open a query builder (standard or classic). To view Defender for Endpoint data, perform a query that contains: diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigation.md b/windows/security/threat-protection/microsoft-defender-atp/investigation.md index 0d9f7a0689..5db24608de 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigation.md @@ -50,7 +50,7 @@ Property | Type | Description id | String | Identity of the investigation entity. startTime | DateTime Nullable | The date and time when the investigation was created. endTime | DateTime Nullable | The date and time when the investigation was completed. -cancelledBy | String | The ID of the user/application that cancelled that investigation. +cancelledBy | String | The ID of the user/application that canceled that investigation. investigationState | Enum | The current state of the investigation. Possible values are: 'Unknown', 'Terminated', 'SuccessfullyRemediated', 'Benign', 'Failed', 'PartiallyRemediated', 'Running', 'PendingApproval', 'PendingResource', 'PartiallyInvestigated', 'TerminatedByUser', 'TerminatedBySystem', 'Queued', 'InnerFailure', 'PreexistingAlert', 'UnsupportedOs', 'UnsupportedAlertType', 'SuppressedAlert'. statusDetails | String | Additional information about the state of the investigation. machineId | String | The ID of the device on which the investigation is executed. From 17346a8d8f3fb5a5e93b56408e2d537ea5c2d241 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Tue, 16 Feb 2021 13:47:20 -0800 Subject: [PATCH 093/161] new link --- ...ck-potentially-unwanted-apps-microsoft-defender-antivirus.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md index f56820cf7f..173e44d6f2 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md @@ -178,7 +178,7 @@ See [Troubleshoot event IDs](troubleshoot-microsoft-defender-antivirus.md) for d Sometimes a file is erroneously blocked by PUA protection, or a feature of a PUA is required to complete a task. In these cases, a file can be allow-listed. -For more information, see [Recommended antivirus exclusions for Configuration Manager site servers, site systems, and clients](https://docs.microsoft.com/troubleshoot/mem/configmgr/recommended-antivirus-exclusions#exclusions). +For more information, see [Configure and validate exclusions based on file extension and folder location](configure-extension-file-exclusions-microsoft-defender-antivirus.md). ## See also From bfa803ec651e1e1252d34b2035a988a550b678a7 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Tue, 16 Feb 2021 13:48:18 -0800 Subject: [PATCH 094/161] Added automatic image borders --- .../microsoft-defender-atp/grant-mssp-access.md | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md b/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md index 554cfcb912..5a2af69aab 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md +++ b/windows/security/threat-protection/microsoft-defender-atp/grant-mssp-access.md @@ -101,7 +101,8 @@ To implement a multi-tenant delegated access solution, take the following steps: - Can only be requested by users in the MSSP SOC Tenant - Access auto expires after 365 days - ![Image of new access package](images/new-access-package.png) + > [!div class="mx-imgBorder"] + > ![Image of new access package](images/new-access-package.png) For more information, see [Create a new access package](https://docs.microsoft.com/azure/active-directory/governance/entitlement-management-access-package-create). @@ -110,8 +111,8 @@ To implement a multi-tenant delegated access solution, take the following steps: The My Access portal link is used by MSSP SOC analysts to request access via the access packages created. The link is durable, meaning the same link may be used over time for new analysts. The analyst request goes into a queue for approval by the **MSSP Analyst Approvers**. - - ![Image of access properties](images/access-properties.png) + > [!div class="mx-imgBorder"] + > ![Image of access properties](images/access-properties.png) The link is located on the overview page of each access package. From 701ca3f7993435a80b55ade8ab70620f241027dc Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Tue, 16 Feb 2021 13:50:08 -0800 Subject: [PATCH 095/161] Fix broken code block(s) --- .../microsoft-defender-atp/initiate-autoir-investigation.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md b/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md index 9e5c5c75a7..f36d4f2fd7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation.md @@ -85,7 +85,7 @@ If successful, this method returns 201 - Created response code and [Investigatio Here is an example of the request. -``https +```https POST https://api.securitycenter.microsoft.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/startInvestigation ``` From fa5b1cab2de7c5a8e9174e086d7a16dd2274b525 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Tue, 16 Feb 2021 13:55:05 -0800 Subject: [PATCH 096/161] Update prevent-changes-to-security-settings-with-tamper-protection.md --- ...ecurity-settings-with-tamper-protection.md | 65 +++++++++++++------ 1 file changed, 45 insertions(+), 20 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md index 80e3c1dda4..e86fd4caa0 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md @@ -27,10 +27,11 @@ ms.technology: mde - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -Tamper protection is available on devices running the following versions of Windows: - +Tamper protection, currently in [preview](../../includes/prerelease.md), is available on devices that are running one of the following versions of Windows: + - Windows 10 -- Windows Server 2016 and 2019 (if using tenant attach with [Configuration Manager, version 2006](#manage-tamper-protection-with-configuration-manager-version-2006)) +- Windows Server 2016 and 2019 (if you are using either [tenant attach with Configuration Manager, version 2006](#manage-tamper-protection-with-configuration-manager-version-2006) or + ## Overview @@ -49,7 +50,7 @@ With tamper protection, malicious apps are prevented from taking actions such as Tamper protection essentially locks Microsoft Defender Antivirus and prevents your security settings from being changed through apps and methods such as: -- Configuring settings in Registry Editor on your Windows machine +- Configuring settings in Registry Editor on your Windows device - Changing settings through PowerShell cmdlets - Editing or removing security settings through group policies @@ -57,12 +58,12 @@ Tamper protection doesn't prevent you from viewing your security settings. And, ### What do you want to do? -| Task | Link | +| To perform this task... | See this... | |:---|:---| | Turn tamper protection on for an individual device | [Use the Windows Security app](#turn-tamper-protection-on-or-off-for-an-individual-machine) | | Turn tamper protection on for your organization | [Use Intune](#turn-tamper-protection-on-or-off-for-your-organization-using-intune) | | Turn tamper protection on for devices running Windows 10 and Windows Server 2019 with Configuration Manager | [Use tenant attach with Configuration Manager, version 2006](#manage-tamper-protection-with-configuration-manager-version-2006) | -| Turn tamper protection on in the Microsoft Defender Security Center | | +| Turn tamper protection on in the Microsoft Defender Security Center |[Use the Microsoft Defender Security Center](#turn-tamper-protection-on-or-off-in-the-microsoft-defender-security-center) | | View details about tampering attempts on devices | [View information about tampering attempts](#view-information-about-tampering-attempts) | | Review your security recommendations | [Review security recommendations](#review-your-security-recommendations) | | Review the list of frequently asked questions (FAQs) | [Browse the FAQs](#view-information-about-tampering-attempts) | @@ -74,33 +75,29 @@ Tamper protection doesn't prevent you from viewing your security settings. And, > > To help ensure that tamper protection doesn’t interfere with third-party security products or enterprise installation scripts that modify these settings, go to **Windows Security** and update **Security intelligence** to version 1.287.60.0 or later. (See [Security intelligence updates](https://www.microsoft.com/wdsi/definitions).) > -> Once you’ve made this update, tamper protection will continue to protect your registry settings, and will also log attempts to modify them without returning errors. +> Once you’ve made this update, tamper protection continues to protect your registry settings, and logs attempts to modify them without returning errors. If you are a home user, or you are not subject to settings managed by a security team, you can use the Windows Security app to turn tamper protection on or off. You must have appropriate admin permissions on your machine to do change security settings, such as tamper protection. +Here's what you see in the Windows Security app: + +![Tamper protection turned on in Windows 10 Home](images/tamperprotectionturnedon.png) + 1. Click **Start**, and start typing *Security*. In the search results, select **Windows Security**. - 2. Select **Virus & threat protection** > **Virus & threat protection settings**. - 3. Set **Tamper Protection** to **On** or **Off**. - Here's what you see in the Windows Security app: - - ![Tamper protection turned on in Windows 10 Home](images/tamperprotectionturnedon.png) - ## Turn tamper protection on (or off) for your organization using Intune If you are part of your organization's security team, and your subscription includes [Intune](https://docs.microsoft.com/intune/fundamentals/what-is-intune), you can turn tamper protection on (or off) for your organization in the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com) portal. -### Prerequisites - -Before you begin, make sure that all of the following requirements are met: +### Prerequisites for managing tamper protection in Intune - You must have appropriate [permissions](../microsoft-defender-atp/assign-portal-access.md), such as global admin, security admin, or security operations. - Your organization uses [Intune to manage devices](https://docs.microsoft.com/intune/fundamentals/what-is-device-management). ([Intune licenses](https://docs.microsoft.com/intune/fundamentals/licenses) are required; Intune is included in Microsoft 365 E5.) -- Your Windows machines must be running Windows 10 OS [1709](https://docs.microsoft.com/windows/release-health/status-windows-10-1709), [1803](https://docs.microsoft.com/windows/release-health/status-windows-10-1803), [1809](https://docs.microsoft.com/windows/release-health/status-windows-10-1809-and-windows-server-2019) or later. (For more information about releases, see [Windows 10 release information](https://docs.microsoft.com/windows/release-health/release-information).) +- Your Windows devices must be running Windows 10 OS [1709](https://docs.microsoft.com/windows/release-health/status-windows-10-1709), [1803](https://docs.microsoft.com/windows/release-health/status-windows-10-1803), [1809](https://docs.microsoft.com/windows/release-health/status-windows-10-1809-and-windows-server-2019) or later. (For more information about releases, see [Windows 10 release information](https://docs.microsoft.com/windows/release-health/release-information).) - You must be using Windows security with [security intelligence](https://www.microsoft.com/wdsi/definitions) updated to version 1.287.60.0 (or above). -- Your machines must be using anti-malware platform version 4.18.1906.3 (or above) and anti-malware engine version 1.1.15500.X (or above). ([Manage Microsoft Defender Antivirus updates and apply baselines](manage-updates-baselines-microsoft-defender-antivirus.md).) +- Your devices must be using anti-malware platform version 4.18.1906.3 (or above) and anti-malware engine version 1.1.15500.X (or above). ([Manage Microsoft Defender Antivirus updates and apply baselines](manage-updates-baselines-microsoft-defender-antivirus.md).) ### Turn tamper protection on (or off) in Intune @@ -140,11 +137,39 @@ If you're using [version 2006 of Configuration Manager](https://docs.microsoft.c - In the **Profile** list, select **Windows Security experience (preview)**.
3. Deploy the policy to your device collection. -Need help? See the following resources: +### Need help with this? + +See the following resources: - [Settings for the Windows Security experience profile in Microsoft Intune](https://docs.microsoft.com/mem/intune/protect/antivirus-security-experience-windows-settings) - [Tech Community Blog: Announcing Tamper Protection for Configuration Manager Tenant Attach clients](https://techcommunity.microsoft.com/t5/microsoft-endpoint-manager-blog/announcing-tamper-protection-for-configuration-manager-tenant/ba-p/1700246#.X3QLR5Ziqq8.linkedin) +## Turn tamper protection on (or off) in the Microsoft Defender Security Center + +Currently in preview, tamper protection can be turned on or off in the Microsoft Defender Security Center ([https://securitycenter.windows.com](https://securitycenter.windows.com)). + +### Prerequisites for managing tamper protection in the Microsoft Defender Security Center + +- You must have appropriate [permissions](../microsoft-defender-atp/assign-portal-access.md), such as global admin, security admin, or security operations. +- Your Windows devices must be running one of the following versions of Windows: + - Windows 10 + - Windows Server 2019 + - Windows Server, version [1803](https://docs.microsoft.com/windows/release-health/status-windows-10-1803) or later + - [Windows Server 2016](/windows-server/get-started/whats-new-in-windows-server-2016) + - For more information about releases, see [Windows 10 release information](https://docs.microsoft.com/windows/release-health/release-information). +- Your devices must be onboarded to MIcrosoft Defender for Endpoint. +- Your devices must be using anti-malware platform version 4.18.2010.7 (or above) and anti-malware engine version 1.1.15500.X (or above). ([Manage Microsoft Defender Antivirus updates and apply baselines](manage-updates-baselines-microsoft-defender-antivirus.md).) +- Cloud Protection must be turned on. + + + +### Keep the following points in mind + +- When you use the Microsoft Defender Security Center to manage tamper protection, you do not have to use Intune or the tenant attach method. +- When you manage tamper protection in the Microsoft Defender Security Center, the setting is applied tenant wide, affecting all of your devices that are running Windows 10. To fine-tune tamper protection (such as having tamper protection on for some devices but off for others), use either [Intune](#turn-tamper-protection-on-or-off-for-your-organization-using-intune) or the [tenant attach method](#manage-tamper-protection-with-configuration-manager-version-2006). +- If you have a hybrid environment, tamper protection settings configured in Intune take precedence over settings configured in the Microsoft Defender Security Center. + + ## View information about tampering attempts Tampering attempts typically indicate bigger cyberattacks. Bad actors try to change security settings as a way to persist and stay undetected. If you're part of your organization's security team, you can view information about such attempts, and then take appropriate actions to mitigate threats. @@ -185,7 +210,7 @@ Devices that are onboarded to Microsoft Defender for Endpoint will have Microsof ### How can I turn tamper protection on/off? -If you are a home user, see [Turn tamper protection on (or off) for an individual machine](#turn-tamper-protection-on-or-off-for-an-individual-machine). +If you are a home user, see [Turn tamper protection on (or off) for an individual device](#turn-tamper-protection-on-or-off-for-an-individual-machine). If you are an organization using [Microsoft Defender for Endpoint](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp), you should be able to manage tamper protection in Intune similar to how you manage other endpoint protection features. See the following sections of this article: From c1045cc5b3f2c578eae8288bce7581af6a71e74e Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Tue, 16 Feb 2021 13:56:04 -0800 Subject: [PATCH 097/161] Update prevent-changes-to-security-settings-with-tamper-protection.md --- ...event-changes-to-security-settings-with-tamper-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md index e86fd4caa0..b0dc238061 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md @@ -153,7 +153,7 @@ Currently in preview, tamper protection can be turned on or off in the Microsoft - You must have appropriate [permissions](../microsoft-defender-atp/assign-portal-access.md), such as global admin, security admin, or security operations. - Your Windows devices must be running one of the following versions of Windows: - Windows 10 - - Windows Server 2019 + - [Windows Server 2019](/windows-server/get-started-19/whats-new-19) - Windows Server, version [1803](https://docs.microsoft.com/windows/release-health/status-windows-10-1803) or later - [Windows Server 2016](/windows-server/get-started/whats-new-in-windows-server-2016) - For more information about releases, see [Windows 10 release information](https://docs.microsoft.com/windows/release-health/release-information). From 474cba28ac7a2d80a50795e297f99427a65fe71b Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Tue, 16 Feb 2021 14:05:42 -0800 Subject: [PATCH 098/161] Update prevent-changes-to-security-settings-with-tamper-protection.md --- ...security-settings-with-tamper-protection.md | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md index b0dc238061..30bc6cd8a6 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md @@ -68,7 +68,7 @@ Tamper protection doesn't prevent you from viewing your security settings. And, | Review your security recommendations | [Review security recommendations](#review-your-security-recommendations) | | Review the list of frequently asked questions (FAQs) | [Browse the FAQs](#view-information-about-tampering-attempts) | -## Turn tamper protection on (or off) for an individual machine +## Manage tamper protection on an individual machine > [!NOTE] > Tamper protection blocks attempts to modify Microsoft Defender Antivirus settings through the registry. @@ -87,11 +87,11 @@ Here's what you see in the Windows Security app: 2. Select **Virus & threat protection** > **Virus & threat protection settings**. 3. Set **Tamper Protection** to **On** or **Off**. -## Turn tamper protection on (or off) for your organization using Intune +## Manage tamper protection for your organization using Intune If you are part of your organization's security team, and your subscription includes [Intune](https://docs.microsoft.com/intune/fundamentals/what-is-intune), you can turn tamper protection on (or off) for your organization in the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com) portal. -### Prerequisites for managing tamper protection in Intune +### Requirements for managing tamper protection in Intune - You must have appropriate [permissions](../microsoft-defender-atp/assign-portal-access.md), such as global admin, security admin, or security operations. - Your organization uses [Intune to manage devices](https://docs.microsoft.com/intune/fundamentals/what-is-device-management). ([Intune licenses](https://docs.microsoft.com/intune/fundamentals/licenses) are required; Intune is included in Microsoft 365 E5.) @@ -144,11 +144,11 @@ See the following resources: - [Settings for the Windows Security experience profile in Microsoft Intune](https://docs.microsoft.com/mem/intune/protect/antivirus-security-experience-windows-settings) - [Tech Community Blog: Announcing Tamper Protection for Configuration Manager Tenant Attach clients](https://techcommunity.microsoft.com/t5/microsoft-endpoint-manager-blog/announcing-tamper-protection-for-configuration-manager-tenant/ba-p/1700246#.X3QLR5Ziqq8.linkedin) -## Turn tamper protection on (or off) in the Microsoft Defender Security Center +## Manage tamper protection in the Microsoft Defender Security Center Currently in preview, tamper protection can be turned on or off in the Microsoft Defender Security Center ([https://securitycenter.windows.com](https://securitycenter.windows.com)). -### Prerequisites for managing tamper protection in the Microsoft Defender Security Center +### Requirements for managing tamper protection in the Microsoft Defender Security Center - You must have appropriate [permissions](../microsoft-defender-atp/assign-portal-access.md), such as global admin, security admin, or security operations. - Your Windows devices must be running one of the following versions of Windows: @@ -157,11 +157,11 @@ Currently in preview, tamper protection can be turned on or off in the Microsoft - Windows Server, version [1803](https://docs.microsoft.com/windows/release-health/status-windows-10-1803) or later - [Windows Server 2016](/windows-server/get-started/whats-new-in-windows-server-2016) - For more information about releases, see [Windows 10 release information](https://docs.microsoft.com/windows/release-health/release-information). -- Your devices must be onboarded to MIcrosoft Defender for Endpoint. -- Your devices must be using anti-malware platform version 4.18.2010.7 (or above) and anti-malware engine version 1.1.15500.X (or above). ([Manage Microsoft Defender Antivirus updates and apply baselines](manage-updates-baselines-microsoft-defender-antivirus.md).) -- Cloud Protection must be turned on. - +- Your devices must be [onboarded to MIcrosoft Defender for Endpoint](../microsoft-defender-atp/onboarding.md). +- Your devices must be using anti-malware platform version 4.18.2010.7 (or above) and anti-malware engine version 1.1.17600.5 (or above). ([Manage Microsoft Defender Antivirus updates and apply baselines](manage-updates-baselines-microsoft-defender-antivirus.md).) +- [Cloud-delivered protection must be turned on](enable-cloud-protection-microsoft-defender-antivirus.md). +### Turn tamper protection on (or off) in the Microsoft Defender Security Center ### Keep the following points in mind From 2bc1a7558788683356714a234e703909833c9ae6 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Tue, 16 Feb 2021 14:05:51 -0800 Subject: [PATCH 099/161] Acrolinx: "currenly", "Multilpe" --- .../microsoft-defender-atp/linux-support-perf.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-support-perf.md b/windows/security/threat-protection/microsoft-defender-atp/linux-support-perf.md index c1e093f243..9c286456bd 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-support-perf.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-support-perf.md @@ -35,7 +35,7 @@ Real-time protection (RTP) is a feature of Defender for Endpoint for Linux that Depending on the applications that you are running and your device characteristics, you may experience suboptimal performance when running Defender for Endpoint for Linux. In particular, applications or system processes that access many resources over a short timespan can lead to performance issues in Defender for Endpoint for Linux. -Before starting, **please make sure that other security products are not currenly running on the device**. Multilpe security products may conflict and impact the host performance. +Before starting, **please make sure that other security products are not currently running on the device**. Multiple security products may conflict and impact the host performance. The following steps can be used to troubleshoot and mitigate these issues: From 1d788d8bcf9dfa1fb22a8492889f41b604eee01e Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Tue, 16 Feb 2021 14:07:23 -0800 Subject: [PATCH 100/161] Acrolinx: "multi step" --- .../microsoft-defender-atp/mac-install-with-jamf.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-jamf.md b/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-jamf.md index 4d370ef168..9ca979d54b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-jamf.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-jamf.md @@ -36,7 +36,7 @@ Learn how to deploy Microsoft Defender for Endpoint for macOS with Jamf Pro. > [!NOTE] > If you are using macOS Catalina (10.15.4) or newer versions of macOS, see [New configuration profiles for macOS Catalina and newer versions of macOS](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/mac-sysext-policies). -This is a multi step process. You'll need to complete all of the following steps: +This is a multistep process. You'll need to complete all of the following steps: - [Login to the Jamf Portal](mac-install-jamfpro-login.md) - [Setup the Microsoft Defender for Endpoint for macOS device groups in Jamf Pro](mac-jamfpro-device-groups.md) From 364c64a8dd42e286d03c972119430d83c9a2876a Mon Sep 17 00:00:00 2001 From: jaimeo Date: Tue, 16 Feb 2021 15:07:38 -0700 Subject: [PATCH 101/161] cleaning up some stray Acrolinx items --- .../update/get-started-updates-channels-tools.md | 2 +- windows/deployment/update/waas-overview.md | 6 +++--- windows/deployment/update/waas-quick-start.md | 16 ++++++++-------- ...waas-servicing-channels-windows-10-updates.md | 14 +++++++------- ...waas-servicing-strategy-windows-10-updates.md | 14 +++++++------- windows/whats-new/ltsc/index.md | 6 +++--- 6 files changed, 29 insertions(+), 29 deletions(-) diff --git a/windows/deployment/update/get-started-updates-channels-tools.md b/windows/deployment/update/get-started-updates-channels-tools.md index 93b16449ff..cf55fbcec4 100644 --- a/windows/deployment/update/get-started-updates-channels-tools.md +++ b/windows/deployment/update/get-started-updates-channels-tools.md @@ -65,7 +65,7 @@ We recommend that you use the Windows Insider Release Preview channel for valida ### Long-term Servicing Channel -The **Long Term Servicing Channel** is designed to be used only for specialized devices (which typically don't run Office) such as those that control medical equipment or ATMs. Devices on this channel receive new feature releases every two to three years. LTSB releases service a special LTSB edition of Windows 10 and are only available through the [Microsoft Volume Licensing Center](https://www.microsoft.com/Licensing/servicecenter/default.aspx). +The **Long-Term Servicing Channel** is designed to be used only for specialized devices (which typically don't run Office) such as those that control medical equipment or ATMs. Devices on this channel receive new feature releases every two to three years. LTSB releases service a special LTSB edition of Windows 10 and are only available through the [Microsoft Volume Licensing Center](https://www.microsoft.com/Licensing/servicecenter/default.aspx). The Semi-Annual Channel is the default servicing channel for all Windows 10 devices except those with the LTSB edition installed. The following table shows the servicing channels available to each Windows 10 edition. diff --git a/windows/deployment/update/waas-overview.md b/windows/deployment/update/waas-overview.md index 95c50f6094..eee777b2ac 100644 --- a/windows/deployment/update/waas-overview.md +++ b/windows/deployment/update/waas-overview.md @@ -66,7 +66,7 @@ To align with this new update delivery model, Windows 10 has three servicing cha There are currently two release channels for Windows 10: - The **Semi-Annual Channel** receives feature updates twice per year. -- The **Long Term Servicing Channel**, which is designed to be used only for specialized devices (which typically don't run Office) such as those that control medical equipment or ATM machines, receives new feature releases every two to three years. +- The **Long-Term Servicing Channel**, which is designed to be used only for specialized devices (which typically don't run Office) such as those that control medical equipment or ATM machines, receives new feature releases every two to three years. >[!IMPORTANT] >With each Semi-Annual Channel release, we recommend beginning deployment right away to devices selected for early adoption (targeted validation) and ramp up to full deployment at your discretion. This will enable you to gain access to new features, experiences, and integrated security as soon as possible. The "Semi-Annual Channel (Targeted)" designation is no longer used. For more information, see the blog post [Windows 10 and the "disappearing" SAC-T](https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-10-and-the-disappearing-SAC-T/ba-p/199747). @@ -100,7 +100,7 @@ In Windows 10, rather than receiving several updates each month and trying to fi To align with the new method of delivering feature updates and quality updates in Windows 10, Microsoft introduced the concept of servicing channels to allow customers to designate how frequently their individual devices are updated. For example, an organization may have test devices that the IT department can update with new features as soon as possible, and then specialized devices that require a longer feature update cycle to ensure continuity. -With that in mind, Windows 10 offers three servicing channels. The [Windows Insider Program](#windows-insider) provides organizations with the opportunity to test and provide feedback on features that will be shipped in the next feature update. The [Semi-Annual Channel](#semi-annual-channel) provides new functionality with twice-per-year feature update releases. Organizations can choose when to deploy updates from the Semi-Annual Channel. The [Long Term Servicing Channel](#long-term-servicing-channel), which is designed to be used only for specialized devices (which typically don't run Office) such as those that control medical equipment or ATM machines, receives new feature releases every two to three years. For details about the versions in each servicing channel, see [Windows 10 release information](https://docs.microsoft.com/windows/release-health/release-information). +With that in mind, Windows 10 offers three servicing channels. The [Windows Insider Program](#windows-insider) provides organizations with the opportunity to test and provide feedback on features that will be shipped in the next feature update. The [Semi-Annual Channel](#semi-annual-channel) provides new functionality with twice-per-year feature update releases. Organizations can choose when to deploy updates from the Semi-Annual Channel. The [Long-Term Servicing Channel](#long-term-servicing-channel), which is designed to be used only for specialized devices (which typically don't run Office) such as those that control medical equipment or ATM machines, receives new feature releases every two to three years. For details about the versions in each servicing channel, see [Windows 10 release information](https://docs.microsoft.com/windows/release-health/release-information). The concept of servicing channels is new, but organizations can use the same management tools they used to manage updates and upgrades in previous versions of Windows. For more information about the servicing tool options for Windows 10 and their capabilities, see [Servicing tools](#servicing-tools). @@ -128,7 +128,7 @@ Organizations are expected to initiate targeted deployment on Semi-Annual Channe Specialized systems—such as devices that control medical equipment, point-of-sale systems, and ATMs—often require a longer servicing option because of their purpose. These devices typically perform a single important task and don’t need feature updates as frequently as other devices in the organization. It’s more important that these devices be kept as stable and secure as possible than up to date with user interface changes. The LTSC servicing model prevents Windows 10 Enterprise LTSB devices from receiving the usual feature updates and provides only quality updates to ensure that device security stays up to date. With this in mind, quality updates are still immediately available to Windows 10 Enterprise LTSB clients, but customers can choose to defer them by using one of the servicing tools mentioned in the section Servicing tools. > [!NOTE] -> Windows 10 Enterprise LTSB is a separate Long Term Servicing Channel version. +> Windows 10 Enterprise LTSB is a separate Long-Term Servicing Channel version. > > Long-term Servicing channel is not intended for deployment on most or all the devices in an organization; it should be used only for special-purpose devices. As a general guideline, a device with Microsoft Office installed is a general-purpose device, typically used by an information worker, and therefore it is better suited for the Semi-Annual servicing channel. diff --git a/windows/deployment/update/waas-quick-start.md b/windows/deployment/update/waas-quick-start.md index 65763f6ae5..4a021b02f7 100644 --- a/windows/deployment/update/waas-quick-start.md +++ b/windows/deployment/update/waas-quick-start.md @@ -24,12 +24,12 @@ Windows as a service is a new concept, introduced with the release of Windows 10 ## Definitions Some new terms have been introduced as part of Windows as a service, so you should know what these terms mean. -- **Feature updates** are released twice per year, around March and September. As the name suggests, these will add new features to Windows 10, delivered in bite-sized chunks compared to the previous practice of Windows releases every 3-5 years. +- **Feature updates** are released twice per year, around March and September. As the name suggests, these updates add new features to Windows 10, delivered in bite-sized chunks compared to the previous practice of Windows releases every 3-5 years. - **Quality updates** deliver both security and non-security fixes. They are typically released on the second Tuesday of each month, though they can be released at any time. Quality updates include security updates, critical updates, servicing stack updates, and driver updates. Quality updates are cumulative, so installing the latest quality update is sufficient to get all the available fixes for a specific Windows 10 feature update. The "servicing stack" is the code that installs other updates, so they are important to keep current. For more information, see [Servicing stack updates](servicing-stack-updates.md). -- **Insider Preview** builds are made available during the development of the features that will be shipped in the next feature update, enabling organizations to validate new features as well as compatibility with existing apps and infrastructure, providing feedback to Microsoft on any issues encountered. +- **Insider Preview** builds are made available during the development of the features that will be shipped in the next feature update, enabling organizations to validate new features and confirm compatibility with existing apps and infrastructure, providing feedback to Microsoft on any issues encountered. - **Servicing channels** allow organizations to choose when to deploy new features. - The **Semi-Annual Channel** receives feature updates twice per year. - - The **Long Term Servicing Channel**, which is designed to be used only for specialized devices (which typically don't run Office) such as those that control medical equipment or ATM machines, receives new feature releases every two to three years. + - The **Long-Term Servicing Channel**, which meant only for specialized devices (which typically don't run Office) such as those that control medical equipment or ATM machines, receives new feature releases every two to three years. - **Deployment rings** are groups of devices used to initially pilot, and then to broadly deploy, each feature update in an organization. See [Overview of Windows as a service](waas-overview.md) for more information. @@ -42,19 +42,19 @@ Windows 10 gains new functionality with twice-per-year feature update releases. All releases of Windows 10 have 18 months of servicing for all editions--these updates provide security and feature updates for the release. Customers running Enterprise and Education editions have an additional 12 months of servicing for specific Windows 10 releases, for a total of 30 months from initial release. These versions include Enterprise and Education editions for Windows 10, versions 1607 and later. Starting in October 2018, all Semi-Annual Channel releases in the September/October timeframe will also have the additional 12 months of servicing for a total of 30 months from the initial release. The Semi-Annual Channel versions released in March/April timeframe will continue to have an 18-month lifecycle. -Windows 10 Enterprise LTSB is a separate **Long Term Servicing Channel** version. Each release is supported for a total of 10 years (five years standard support, five years extended support). New releases are expected about every three years. +Windows 10 Enterprise LTSB is a separate **Long-Term Servicing Channel** version. Each release is supported for a total of 10 years (five years standard support, five years extended support). New releases are expected about every three years. -See [Assign devices to servicing channels for Windows 10 updates](waas-servicing-channels-windows-10-updates.md) for more information. +For more information, see [Assign devices to servicing channels for Windows 10 updates](waas-servicing-channels-windows-10-updates.md). ## Staying up to date -The process for keeping Windows 10 up to date involves deploying a feature update, at an appropriate time after its release. A variety of management and update tools such as Windows Update, Windows Update for Business, Windows Server Update Services, Microsoft Endpoint Configuration Manager, and third-party products) can be used to help with this process. [Upgrade Readiness](https://docs.microsoft.com/windows/deployment/upgrade/upgrade-readiness-get-started), a free tool to streamline Windows upgrade projects, is another important tool to help. +The process for keeping Windows 10 up to date involves deploying a feature update, at an appropriate time after its release. You can use various management and update tools such as Windows Update, Windows Update for Business, Windows Server Update Services, Microsoft Endpoint Configuration Manager, and non-Microsoft products) to help with this process. [Upgrade Readiness](https://docs.microsoft.com/windows/deployment/upgrade/upgrade-readiness-get-started), a free tool to streamline Windows upgrade projects, is another important tool to help. Because app compatibility, both for desktop apps and web apps, is outstanding with Windows 10, extensive advanced testing isn’t required. Instead, only business-critical apps need to be tested, with the remaining apps validated through a series of pilot deployment rings. Once these pilot deployments have validated most apps, broad deployment can begin. -This process repeats with each new feature update, twice per year. These are small deployment projects, compared to the big projects that were necessary with the old three-to-five-year Windows release cycles. +This process repeats with each new feature update, twice per year. These are small deployment projects, compared to the large projects that were necessary with the old three-to-five-year Windows release cycles. -Additional technologies such as BranchCache and Delivery Optimization, both peer-to-peer distribution tools, can help with the distribution of the feature update installation files. +Other technologies such as BranchCache and Delivery Optimization, both peer-to-peer distribution tools, can help with the distribution of the feature update installation files. See [Build deployment rings for Windows 10 updates](waas-deployment-rings-windows-10-updates.md) and [Optimize update delivery for Windows 10 updates](waas-optimize-windows-10-updates.md) for more information. diff --git a/windows/deployment/update/waas-servicing-channels-windows-10-updates.md b/windows/deployment/update/waas-servicing-channels-windows-10-updates.md index edcdf4d8a4..173deccbea 100644 --- a/windows/deployment/update/waas-servicing-channels-windows-10-updates.md +++ b/windows/deployment/update/waas-servicing-channels-windows-10-updates.md @@ -1,6 +1,6 @@ --- title: Assign devices to servicing channels for Windows 10 updates (Windows 10) -description: Learn how to assign devices to servicing channels for Windows 10 updates locally, by using Group Policy, and by using MDM . +description: Learn how to assign devices to servicing channels for Windows 10 updates locally, by using Group Policy, and by using MDM ms.prod: w10 ms.mktglfcycl: deploy author: jaimeo @@ -28,7 +28,7 @@ ms.custom: > >Due to [naming changes](waas-overview.md#naming-changes), older terms like CB and CBB might still be displayed in some of our products, such as in Group Policy. If you encounter these terms, "CB" refers to the Semi-Annual Channel (Targeted)--which is no longer used--while "CBB" refers to the Semi-Annual Channel. -The Semi-Annual Channel is the default servicing channel for all Windows 10 devices except those with the LTSB edition installed. The following table shows the servicing channels available to each Windows 10 edition. +The Semi-Annual Channel is the default servicing channel for all Windows 10 devices except devices with the LTSB edition installed. The following table shows the servicing channels available to each Windows 10 edition. | Windows 10 edition | Semi-Annual Channel | Long-Term Servicing Channel | Insider Program | | --- | --- | --- | --- | @@ -63,7 +63,7 @@ The Semi-Annual Channel is the default servicing channel for all Windows 10 devi Computer Configuration > Administrative Templates > Windows Components > Windows Update > Defer Windows Updates > **Select when Feature Updates are received** - enable policy and set branch readiness level to the Semi-Annual Channel -**To assign devices to to the Semi-Annual Channel by using MDM** +**To assign devices to the Semi-Annual Channel by using MDM** - In Windows 10, version 1607 and later releases: @@ -79,10 +79,10 @@ The Semi-Annual Channel is the default servicing channel for all Windows 10 devi ## Enroll devices in the Windows Insider Program -To get started with the Windows Insider Program for Business, you will need to follow a few simple steps: +To get started with the Windows Insider Program for Business, you will need to follow a few steps: 1. On the [Windows Insider](https://insider.windows.com) website, go to **For Business > Getting Started** to [register your organizational Azure AD account](https://insider.windows.com/insidersigninaad/). -2. **Register your domain**. Rather than have each user register individually for Insider Preview builds, administrators can simply [register their domain](https://insider.windows.com/for-business-organization-admin/) and control settings centrally.
**Note:** The signed-in user needs to be a **Global Administrator** of the Azure AD domain in order to be able to register the domain. +2. **Register your domain**. Rather than have each user register individually for Insider Preview builds, administrators can [register their domain](https://insider.windows.com/for-business-organization-admin/) and control settings centrally.
**Note:** The signed-in user needs to be a **Global Administrator** of the Azure AD domain in order to be able to register the domain. 3. Make sure the **Allow Telemetry** setting is set to **2** or higher. 4. Starting with Windows 10, version 1709, set policies to manage preview builds and their delivery: @@ -90,7 +90,7 @@ The **Manage preview builds** setting gives administrators control over enabling * Group Policy: **Computer Configuration/Administrative Templates/Windows Components/Windows Update/Windows Update for Business** - *Manage preview builds* * MDM: **Update/ManagePreviewBuilds** -The **Branch Readiness Level** settings allows you to choose between preview flight rings, and allows you to defer or pause the delivery of updates. +The **Branch Readiness Level** settings allow you to choose between preview flight rings, and allows you to defer or pause the delivery of updates. * Group Policy: **Computer Configuration/Administrative Templates/Windows Components/Windows Update/ Windows Update for Business** - *Select when Preview Builds and Feature Updates are received* * MDM: **Update/BranchReadinessLevel** @@ -164,7 +164,7 @@ During the life of a device, it might be necessary or desirable to switch betwee In Windows 10, administrators can control user access to Windows Update. -Administrators can disable the "Check for updates" option for users by enabling the Group Policy setting under **Computer Configuration\Administrative Templates\Windows Components\Windows update\Remove access to use all Windows update features** . Any background update scans, downloads and installations will continue to work as configured. We don't recomment this setting if you have configured the device to "notify" to download or install as this policy will prevent the user from being able to do so. +Administrators can disable the "Check for updates" option for users by enabling the Group Policy setting under **Computer Configuration\Administrative Templates\Windows Components\Windows update\Remove access to use all Windows update features**. Any background update scans, downloads, and installations will continue to work as configured. We don't recomment this setting if you have configured the device to "notify" to download or install as this policy will prevent the user from being able to do so. >[!NOTE] > Starting with Windows 10, any Group Policy user configuration settings for Windows Update are no longer supported. diff --git a/windows/deployment/update/waas-servicing-strategy-windows-10-updates.md b/windows/deployment/update/waas-servicing-strategy-windows-10-updates.md index 1b4d43cb1e..1edbd81af3 100644 --- a/windows/deployment/update/waas-servicing-strategy-windows-10-updates.md +++ b/windows/deployment/update/waas-servicing-strategy-windows-10-updates.md @@ -22,30 +22,30 @@ ms.collection: m365initiative-coredeploy > **Looking for consumer information?** See [Windows Update: FAQ](https://support.microsoft.com/help/12373/windows-update-faq) -In the past, traditional Windows deployments tended to be large, lengthy, and expensive. Windows 10 offers a new approach to deploying both quality and feature updates, making the process much simpler and therefore the planning much more straightforward. With Windows as a service, the methodology around updating Windows has completely changed, moving away from major upgrades every few years to iterative updates twice per year. Each iteration contains a smaller subset of changes so that they won’t seem like substantial differences, like they do today. This image illustrates the level of effort needed for traditional Windows deployments versus servicing Windows 10 and how it is now spread evenly over time versus spiking every few years. +In the past, traditional Windows deployments tended to be large, lengthy, and expensive. Windows 10 offers a new approach to deploying both quality and feature updates, making the process much simpler and therefore the planning much more straightforward. With Windows as a service, the methodology around updating Windows has changed, moving away from major upgrades every few years to iterative updates twice per year. Each iteration contains a smaller subset of changes so that they won’t seem like substantial differences, like they do today. This image illustrates the level of effort needed for traditional Windows deployments versus servicing Windows 10 and how it is now spread evenly over time versus spiking every few years. ![Compare traditional servicing to Windows 10](images/waas-strategy-fig1a.png) Windows 10 spreads the traditional deployment effort of a Windows upgrade, which typically occurred every few years, over smaller, continuous updates. With this change, you must approach the ongoing deployment and servicing of Windows differently. A strong Windows 10 deployment strategy begins with establishing a simple, repeatable process for testing and deploying each feature update. Here’s an example of what this process might look like: -- **Configure test devices.** Configure test devices in the Windows Insider Program so that Insiders can test feature updates before they’re available to the Semi-Annual Channel. Typically, this would be a small number of test devices that IT staff members use to evaluate pre-release builds of Windows. Microsoft provides current development builds to Windows Insider members approximately every week so that interested users can see the functionality Microsoft is adding. See the section Windows Insider for details on how to enroll in the Windows Insider Program on a Windows 10 device. +- **Configure test devices.** Configure test devices in the Windows Insider Program so that Insiders can test feature updates before they’re available to the Semi-Annual Channel. Typically, this population would be a few test devices that IT staff members use to evaluate pre-release builds of Windows. Microsoft provides current development builds to Windows Insider members approximately every week so that interested users can see the functionality Microsoft is adding. See the section Windows Insider for details on how to enroll in the Windows Insider Program on a Windows 10 device. - **Identify excluded devices.** For some organizations, special-purpose devices such as those used to control factory or medical equipment or run ATMs require a stricter, less frequent feature update cycle than the Semi-Annual Channel can offer. For those machines, you must install Windows 10 Enterprise LTSB to avoid feature updates for up to 10 years. Identify these devices, and separate them from the phased deployment and servicing cycles to help remove confusion for your administrators and ensure that devices are handled correctly. - **Recruit volunteers.** The purpose of testing a deployment is to receive feedback. One effective way to recruit pilot users is to request volunteers. When doing so, clearly state that you’re looking for feedback rather than people to just “try it out” and that there could be occasional issues involved with accepting feature updates right away. With Windows as a service, the expectation is that there should be few issues, but if an issue does arise, you want testers to let you know as soon as possible. When considering whom to recruit for pilot groups, be sure to include members who provide the broadest set of applications and devices to validate the largest number of apps and devices possible. -- **Update Group Policy.** Each feature update includes new group policies to manage new features. If you use Group Policy to manage devices, the Group Policy Admin for the Active Directory domain will need to download a .admx package and copy it to their [Central Store](https://support.microsoft.com/help/929841/how-to-create-the-central-store-for-group-policy-administrative-templa) (or to the [PolicyDefinitions](https://msdn.microsoft.com/library/bb530196.aspx) directory in the SYSVOL folder of a domain controller if not using a Central Store). Always manage new group polices from the version of Windows 10 they shipped with by using the Remote Server Administration Tools. The ADMX download package is created at the end of each development cycle and then posted for download. To find the ADMX download package for a given Windows build, search for “ADMX download for Windows build xxxx”. For details about Group Policy management, see [How to create and manage the Central Store for Group Policy Administrative Templates in Windows](https://support.microsoft.com/help/3087759/how-to-create-and-manage-the-central-store-for-group-policy-administra) +- **Update Group Policy.** Each feature update includes new group policies to manage new features. If you use Group Policy to manage devices, the Group Policy Admin for the Active Directory domain will need to download an .admx package and copy it to their [Central Store](https://support.microsoft.com/help/929841/how-to-create-the-central-store-for-group-policy-administrative-templa) (or to the [PolicyDefinitions](https://msdn.microsoft.com/library/bb530196.aspx) directory in the SYSVOL folder of a domain controller if not using a Central Store). Always manage new group policies from the version of Windows 10 they shipped with by using the Remote Server Administration Tools. The ADMX download package is created at the end of each development cycle and then posted for download. To find the ADMX download package for a given Windows build, search for “ADMX download for Windows build xxxx”. For details about Group Policy management, see [How to create and manage the Central Store for Group Policy Administrative Templates in Windows](https://support.microsoft.com/help/3087759/how-to-create-and-manage-the-central-store-for-group-policy-administra) - **Choose a servicing tool.** Decide which product you’ll use to manage the Windows updates in your environment. If you’re currently using Windows Server Update Services (WSUS) or Microsoft Endpoint Manager to manage your Windows updates, you can continue using those products to manage Windows 10 updates. Alternatively, you can use Windows Update for Business. In addition to which product you’ll use, consider how you’ll deliver the updates. With Windows 10, multiple peer-to-peer options are available to make update distribution faster. For a comparison of tools, see [Servicing tools](waas-overview.md#servicing-tools). -- **Prioritize applications.** First, create an application portfolio. This list should include everything installed in your organization and any webpages your organization hosts. Next, prioritize this list to identify those that are the most business critical. Because the expectation is that application compatibility with Windows 10 will be high, only the most business critical applications should be tested before the pilot phase; everything else can be tested afterwards. For more information about identifying compatibility issues withe applications, see [Manage Windows upgrades with Upgrade Analytics](../upgrade/manage-windows-upgrades-with-upgrade-readiness.md). +- **Prioritize applications.** First, create an application portfolio. This list should include everything installed in your organization and any webpages your organization hosts. Next, prioritize this list to identify those apps that are the most business critical. Because the expectation is that application compatibility with Windows 10 will be high, only the most business critical applications should be tested before the pilot phase; everything else can be tested afterwards. For more information about identifying compatibility issues withe applications, see [Manage Windows upgrades with Upgrade Analytics](../upgrade/manage-windows-upgrades-with-upgrade-readiness.md). > [!NOTE] > This strategy is applicable to approaching an environment in which Windows 10 already exists. For information about how to deploy or upgrade to Windows 10 where another version of Windows exists, see [Plan for Windows 10 deployment](../planning/index.md). > -> Windows 10 Enterprise LTSC is a separate Long Term Servicing Channel version. +> Windows 10 Enterprise LTSC is a separate Long-Term Servicing Channel version. Each time Microsoft releases a Windows 10 feature update, the IT department should use the following high-level process to help ensure that the broad deployment is successful: 1. **Validate compatibility of business critical apps.** Test your most important business-critical applications for compatibility with the new Windows 10 feature update running on your Windows Insider machines identified in the earlier “Configure test machines” step of the Predeployment strategy section. The list of applications involved in this validation process should be small because most applications can be tested during the pilot phase. For more information about device and application compatibility in Windows 10, see the section Compatibility. -2. **Target and react to feedback.** With Windows 10, Microsoft expects application and device compatibility to be high, but it’s still important to have targeted groups within both the IT department and business units to verify application compatibility for the remaining applications in your application portfolio. Because only the most business-critical applications are tested beforehand, this will represent the majority of application compatibility testing in your environment. This should not necessarily be a formal process but rather user validation through the use of a particular application. So, the next step is to deploy the feature update to early-adopting IT users and your targeted groups running in the Semi-Annual channel that you identified in the “Recruit volunteers” step of the Predeployment strategy section. Be sure to communicate clearly that you’re looking for feedback as soon as possible, and state exactly how users can submit feedback to you. Should an issue arise, have a remediation plan in place to address it. -3. **Deploy broadly.** Finally, focus on the large-scale deployment using deployment rings, like the ones discussed in Table 1. Build deployment rings that target groups of computers in your selected update-management product. To reduce risk as much as possible, construct your deployment rings in a way that splits individual departments into multiple rings. This way, if you were to encounter an issue, you don’t prevent any critical business from continuing. By using this method, each deployment ring reduces risk as more and more people have been updated in any particular department. +2. **Target and react to feedback.** With Windows 10, Microsoft expects application and device compatibility to be high, but it’s still important to have targeted groups within both the IT department and business units to verify application compatibility for the remaining applications in your application portfolio. Because only the most business-critical applications are tested beforehand, this activity will represent most of the application compatibility testing in your environment. It shouldn't necessarily be a formal process but rather user validation by using a particular application. So, the next step is to deploy the feature update to early-adopting IT users and your targeted groups running in the Semi-Annual channel that you identified in the “Recruit volunteers” step of the Predeployment strategy section. Be sure to communicate clearly that you’re looking for feedback as soon as possible, and state exactly how users can submit feedback to you. Should an issue arise, have a remediation plan in place to address it. +3. **Deploy broadly.** Finally, focus on the large-scale deployment using deployment rings, like the ones discussed in Table 1. Build deployment rings that target groups of computers in your selected update-management product. To reduce risk as much as possible, construct your deployment rings in a way that splits individual departments into multiple rings. This way, if you were to encounter an issue, you don’t prevent any critical business from continuing. By using this method, each deployment ring reduces risk as more people have been updated in any particular department. ## Steps to manage updates for Windows 10 diff --git a/windows/whats-new/ltsc/index.md b/windows/whats-new/ltsc/index.md index 61f137f85b..171020f940 100644 --- a/windows/whats-new/ltsc/index.md +++ b/windows/whats-new/ltsc/index.md @@ -26,7 +26,7 @@ This topic provides links to articles with information about what's new in each [What's New in Windows 10 Enterprise LTSC 2016](whats-new-windows-10-2016.md)
[What's New in Windows 10 Enterprise LTSC 2015](whats-new-windows-10-2015.md) -## The Long Term Servicing Channel (LTSC) +## The Long-Term Servicing Channel (LTSC) The following table summarizes equivalent feature update versions of Windows 10 LTSC and semi-annual channel (SAC) releases. @@ -37,12 +37,12 @@ The following table summarizes equivalent feature update versions of Windows 10 | Windows 10 Enterprise LTSC 2019 | Windows 10, Version 1809 | 11/13/2018 | >[!NOTE] ->The Long Term Servicing Channel was previously called the Long Term Servicing Branch (LTSB). All references to LTSB are changed in this article to LTSC for consistency, even though the name of previous versions might still be displayed as LTSB. +>The Long-Term Servicing Channel was previously called the Long-Term Servicing Branch (LTSB). All references to LTSB are changed in this article to LTSC for consistency, even though the name of previous versions might still be displayed as LTSB. With the LTSC servicing model, customers can delay receiving feature updates and instead only receive monthly quality updates on devices. Features from Windows 10 that could be updated with new functionality, including Cortana, Edge, and all in-box Universal Windows apps, are also not included. Feature updates are offered in new LTSC releases every 2–3 years instead of every 6 months, and organizations can choose to install them as in-place upgrades or even skip releases over a 10-year life cycle. Microsoft is committed to providing bug fixes and security patches for each LTSC release during this 10 year period. >[!IMPORTANT] ->The Long Term Servicing Channel is not intended for deployment on most or all the PCs in an organization. The LTSC edition of Windows 10 provides customers with access to a deployment option for their special-purpose devices and environments. These devices typically perform a single important task and don’t need feature updates as frequently as other devices in the organization. These devices are also typically not heavily dependent on support from external apps and tools. Since the feature set for LTSC does not change for the lifetime of the release, over time there might be some external tools that do not continue to provide legacy support. See [LTSC: What is it, and when it should be used](https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/LTSC-What-is-it-and-when-should-it-be-used/ba-p/293181). +>The Long-Term Servicing Channel is not intended for deployment on most or all the PCs in an organization. The LTSC edition of Windows 10 provides customers with access to a deployment option for their special-purpose devices and environments. These devices typically perform a single important task and don’t need feature updates as frequently as other devices in the organization. These devices are also typically not heavily dependent on support from external apps and tools. Since the feature set for LTSC does not change for the lifetime of the release, over time there might be some external tools that do not continue to provide legacy support. See [LTSC: What is it, and when it should be used](https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/LTSC-What-is-it-and-when-should-it-be-used/ba-p/293181). For detailed information about Windows 10 servicing, see [Overview of Windows as a service](/windows/deployment/update/waas-overview). From 47c15353a29452413985efd85f18a4e0d39f8b7b Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Tue, 16 Feb 2021 14:08:50 -0800 Subject: [PATCH 102/161] Acrolinx: "Microsoft Defender for Endpoint Endpoint Security Extension" --- .../microsoft-defender-atp/mac-install-with-other-mdm.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-other-mdm.md b/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-other-mdm.md index 6e46072d5b..1138236d4b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-other-mdm.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-other-mdm.md @@ -98,7 +98,7 @@ Grant Full Disk Access to the following components: - Identifier Type: Bundle ID - Code Requirement: identifier "com.microsoft.wdav" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /\* exists \*/ and certificate leaf[field.1.2.840.113635.100.6.1.13] /\* exists \*/ and certificate leaf[subject.OU] = UBF8T346G9 -- Microsoft Defender for Endpoint Endpoint Security Extension +- Microsoft Defender for Endpoint Security Extension - Identifier: `com.microsoft.wdav.epsext` - Identifier Type: Bundle ID - Code Requirement: identifier "com.microsoft.wdav.epsext" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = UBF8T346G9 From a981684a3a993332c4f105ee560c0f31a1e8363c Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Tue, 16 Feb 2021 14:09:24 -0800 Subject: [PATCH 103/161] Update prevent-changes-to-security-settings-with-tamper-protection.md --- ...-to-security-settings-with-tamper-protection.md | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md index 30bc6cd8a6..eea652a8e3 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md @@ -60,15 +60,15 @@ Tamper protection doesn't prevent you from viewing your security settings. And, | To perform this task... | See this... | |:---|:---| -| Turn tamper protection on for an individual device | [Use the Windows Security app](#turn-tamper-protection-on-or-off-for-an-individual-machine) | -| Turn tamper protection on for your organization | [Use Intune](#turn-tamper-protection-on-or-off-for-your-organization-using-intune) | -| Turn tamper protection on for devices running Windows 10 and Windows Server 2019 with Configuration Manager | [Use tenant attach with Configuration Manager, version 2006](#manage-tamper-protection-with-configuration-manager-version-2006) | -| Turn tamper protection on in the Microsoft Defender Security Center |[Use the Microsoft Defender Security Center](#turn-tamper-protection-on-or-off-in-the-microsoft-defender-security-center) | +| Turn tamper protection on for an individual device | [Use the Windows Security app](#manage-tamper-protection-on-an-individual-device) | +| Turn tamper protection on for your organization | [Use Intune](#manage-tamper-protection-for-your-organization-using-intune) | +| Turn tamper protection on for devices running Windows 10 and Windows Server 2019 with Configuration Manager | [Use tenant attach with Configuration Manager, version 2006](#manage-tamper-protection-for-your-organization-with-configuration-manager-version-2006) | +| Turn tamper protection on in the Microsoft Defender Security Center |[Use the Microsoft Defender Security Center](#manage-tamper-protection-for-your-organiztion-using-the-microsoft-defender-security-center) | | View details about tampering attempts on devices | [View information about tampering attempts](#view-information-about-tampering-attempts) | | Review your security recommendations | [Review security recommendations](#review-your-security-recommendations) | | Review the list of frequently asked questions (FAQs) | [Browse the FAQs](#view-information-about-tampering-attempts) | -## Manage tamper protection on an individual machine +## Manage tamper protection on an individual device > [!NOTE] > Tamper protection blocks attempts to modify Microsoft Defender Antivirus settings through the registry. @@ -122,7 +122,7 @@ If you are using Windows 10 OS [1709](https://docs.microsoft.com/windows/release 2. Use the [Get-MpComputerStatus](https://docs.microsoft.com/powershell/module/defender/get-mpcomputerstatus?view=win10-ps&preserve-view=true) PowerShell cmdlet. 3. In the list of results, look for `IsTamperProtected`. (A value of *true* means tamper protection is enabled.) -## Manage tamper protection with Configuration Manager, version 2006 +## Manage tamper protection for your organization with Configuration Manager, version 2006 > [!IMPORTANT] > The procedure can be used to extend tamper protection to devices running Windows 10 and Windows Server 2019. Make sure to review the prerequisites and other information in the resources mentioned in this procedure. @@ -144,7 +144,7 @@ See the following resources: - [Settings for the Windows Security experience profile in Microsoft Intune](https://docs.microsoft.com/mem/intune/protect/antivirus-security-experience-windows-settings) - [Tech Community Blog: Announcing Tamper Protection for Configuration Manager Tenant Attach clients](https://techcommunity.microsoft.com/t5/microsoft-endpoint-manager-blog/announcing-tamper-protection-for-configuration-manager-tenant/ba-p/1700246#.X3QLR5Ziqq8.linkedin) -## Manage tamper protection in the Microsoft Defender Security Center +## Manage tamper protection for your organization using the Microsoft Defender Security Center Currently in preview, tamper protection can be turned on or off in the Microsoft Defender Security Center ([https://securitycenter.windows.com](https://securitycenter.windows.com)). From 306bf2d93394b1cdc85e47e06c7bfaaaf0acd159 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Tue, 16 Feb 2021 14:11:27 -0800 Subject: [PATCH 104/161] Corrected incomplete coding of automatic image borders --- .../microsoft-defender-atp/ios-install.md | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/ios-install.md b/windows/security/threat-protection/microsoft-defender-atp/ios-install.md index d02a9b3d4a..d3614e3095 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/ios-install.md +++ b/windows/security/threat-protection/microsoft-defender-atp/ios-install.md @@ -51,7 +51,7 @@ Deploy Defender for Endpoint for iOS via Intune Company Portal. 1. In [Microsoft Endpoint manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** -> **iOS/iPadOS** -> **Add** -> **iOS store app** and click **Select**. > [!div class="mx-imgBorder"] - ![Image of Microsoft Endpoint Manager Admin Center1](images/ios-deploy-1.png) + > ![Image of Microsoft Endpoint Manager Admin Center1](images/ios-deploy-1.png) 1. On the Add app page, click on **Search the App Store** and type **Microsoft Defender ATP** in the search bar. In the search results section, click on *Microsoft Defender ATP* and click **Select**. @@ -63,14 +63,14 @@ Deploy Defender for Endpoint for iOS via Intune Company Portal. > The selected user group should consist of Intune enrolled users. > [!div class="mx-imgBorder"] - ![Image of Microsoft Endpoint Manager Admin Center2](images/ios-deploy-2.png) + > ![Image of Microsoft Endpoint Manager Admin Center2](images/ios-deploy-2.png) 1. In the *Review + Create* section, verify that all the information entered is correct and then select **Create**. In a few moments, the Defender for Endpoint app should be created successfully, and a notification should show up at the top-right corner of the page. 1. In the app information page that is displayed, in the **Monitor** section, select **Device install status** to verify that the device installation has completed successfully. > [!div class="mx-imgBorder"] - ![Image of Microsoft Endpoint Manager Admin Center3](images/ios-deploy-3.png) + > ![Image of Microsoft Endpoint Manager Admin Center3](images/ios-deploy-3.png) ## Complete onboarding and check status @@ -100,7 +100,7 @@ Intune allows you to configure the Defender for iOS app through an App Configura 1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and go to **Apps** > **App configuration policies** > **Add**. Click on **Managed devices**. > [!div class="mx-imgBorder"] - ![Image of Microsoft Endpoint Manager Admin Center4](images/ios-deploy-4.png) + > ![Image of Microsoft Endpoint Manager Admin Center4](images/ios-deploy-4.png) 1. In the *Create app configuration policy* page, provide the following information: - Policy Name @@ -108,7 +108,7 @@ Intune allows you to configure the Defender for iOS app through an App Configura - Targeted app: Select **Microsoft Defender ATP** from the list > [!div class="mx-imgBorder"] - ![Image of Microsoft Endpoint Manager Admin Center5](images/ios-deploy-5.png) + > ![Image of Microsoft Endpoint Manager Admin Center5](images/ios-deploy-5.png) 1. In the next screen, select **Use configuration designer** as the format. Specify the following property: - Configuration Key: issupervised @@ -116,7 +116,7 @@ Intune allows you to configure the Defender for iOS app through an App Configura - Configuration Value: {{issupervised}} > [!div class="mx-imgBorder"] - ![Image of Microsoft Endpoint Manager Admin Center6](images/ios-deploy-6.png) + > ![Image of Microsoft Endpoint Manager Admin Center6](images/ios-deploy-6.png) 1. Click **Next** to open the **Scope tags** page. Scope tags are optional. Click **Next** to continue. @@ -133,7 +133,7 @@ Intune allows you to configure the Defender for iOS app through an App Configura - Navigate to **Devices** -> **iOS/iPadOS** -> **Configuration profiles** -> **Create Profile** > [!div class="mx-imgBorder"] - ![Image of Microsoft Endpoint Manager Admin Center7](images/ios-deploy-7.png) + > ![Image of Microsoft Endpoint Manager Admin Center7](images/ios-deploy-7.png) - Provide a name of the profile. When prompted to import a Configuration profile file, select the one downloaded above. - In the **Assignment** section, select the device group to which you want to apply this profile. As a best practice, this should be applied to all managed iOS devices. Click **Next**. From d406fcec81e0845f74168ee7f6e6ab25655a5e9e Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Tue, 16 Feb 2021 14:12:35 -0800 Subject: [PATCH 105/161] Update prevent-changes-to-security-settings-with-tamper-protection.md --- ...to-security-settings-with-tamper-protection.md | 15 ++++++++------- 1 file changed, 8 insertions(+), 7 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md index eea652a8e3..3a0887b1d8 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md @@ -146,7 +146,11 @@ See the following resources: ## Manage tamper protection for your organization using the Microsoft Defender Security Center -Currently in preview, tamper protection can be turned on or off in the Microsoft Defender Security Center ([https://securitycenter.windows.com](https://securitycenter.windows.com)). +Currently in preview, tamper protection can be turned on or off in the Microsoft Defender Security Center ([https://securitycenter.windows.com](https://securitycenter.windows.com)). Here are a few points to keep in mind: + +- When you use the Microsoft Defender Security Center to manage tamper protection, you do not have to use Intune or the tenant attach method. +- When you manage tamper protection in the Microsoft Defender Security Center, the setting is applied tenant wide, affecting all of your devices that are running Windows 10. To fine-tune tamper protection (such as having tamper protection on for some devices but off for others), use either [Intune](#turn-tamper-protection-on-or-off-for-your-organization-using-intune) or the [tenant attach method](#manage-tamper-protection-with-configuration-manager-version-2006). +- If you have a hybrid environment, tamper protection settings configured in Intune take precedence over settings configured in the Microsoft Defender Security Center. ### Requirements for managing tamper protection in the Microsoft Defender Security Center @@ -163,12 +167,9 @@ Currently in preview, tamper protection can be turned on or off in the Microsoft ### Turn tamper protection on (or off) in the Microsoft Defender Security Center -### Keep the following points in mind - -- When you use the Microsoft Defender Security Center to manage tamper protection, you do not have to use Intune or the tenant attach method. -- When you manage tamper protection in the Microsoft Defender Security Center, the setting is applied tenant wide, affecting all of your devices that are running Windows 10. To fine-tune tamper protection (such as having tamper protection on for some devices but off for others), use either [Intune](#turn-tamper-protection-on-or-off-for-your-organization-using-intune) or the [tenant attach method](#manage-tamper-protection-with-configuration-manager-version-2006). -- If you have a hybrid environment, tamper protection settings configured in Intune take precedence over settings configured in the Microsoft Defender Security Center. - +1. Go to the Microsoft Defender Security Center ([https://securitycenter.windows.com](https://securitycenter.windows.com)) and sign in. +2. Choose **Settings**. +3. Go to **General** > **Advanced features**, and then turn tamper protection on. ## View information about tampering attempts From 7f6b04fc198cafc27f87a1aa6e13f749718763cf Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Tue, 16 Feb 2021 14:13:28 -0800 Subject: [PATCH 106/161] Update prevent-changes-to-security-settings-with-tamper-protection.md --- ...event-changes-to-security-settings-with-tamper-protection.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md index 3a0887b1d8..f0ba5681d4 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md @@ -167,6 +167,8 @@ Currently in preview, tamper protection can be turned on or off in the Microsoft ### Turn tamper protection on (or off) in the Microsoft Defender Security Center +:::image type="content" source="images/mde-turn-tamperprotect-on.png" alt-text="Turn tamper protection on in the Microsoft Defender Security Center"::: + 1. Go to the Microsoft Defender Security Center ([https://securitycenter.windows.com](https://securitycenter.windows.com)) and sign in. 2. Choose **Settings**. 3. Go to **General** > **Advanced features**, and then turn tamper protection on. From 559792bf2b305fda09b4e0fe67fa73feb204c934 Mon Sep 17 00:00:00 2001 From: jaimeo Date: Tue, 16 Feb 2021 15:14:10 -0700 Subject: [PATCH 107/161] more Acrolinx --- .../update/get-started-updates-channels-tools.md | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/windows/deployment/update/get-started-updates-channels-tools.md b/windows/deployment/update/get-started-updates-channels-tools.md index cf55fbcec4..4816c7e26e 100644 --- a/windows/deployment/update/get-started-updates-channels-tools.md +++ b/windows/deployment/update/get-started-updates-channels-tools.md @@ -28,19 +28,19 @@ version of the software. ## Types of updates -We include information here about a number of different update types you'll hear about, but the two overarching types which you have the most direct control over are *feature updates* and *quality updates*. +We include information here about many different update types you'll hear about, but the two overarching types that you have the most direct control over are *feature updates* and *quality updates*. - **Feature updates:** Released twice per year, during the first half and second half of each calendar year. Feature updates add new features and functionality to Windows 10. Because they are delivered frequently (rather than every 3-5 years), they are easier to manage. - **Quality updates:** Quality updates deliver both security and non-security fixes to Windows 10. Quality updates include security updates, critical updates, servicing stack updates, and driver updates. They are typically released on the second Tuesday of each month, though they can be released at any time. The second-Tuesday releases are the ones that focus on security updates. Quality updates are *cumulative*, so installing the latest quality update is sufficient to get all the available fixes for a specific Windows 10 feature update, including any out-of-band security fixes and any *servicing stack updates* that might have been released previously. - **Servicing stack updates:** The "servicing stack" is the code component that actually installs Windows updates. From time to time, the servicing stack itself needs to be updated in order to function smoothly. If you don't install the latest servicing stack update, there's a risk that your device can't be updated with the latest Microsoft security fixes. Servicing stack updates are not necessarily included in *every* monthly quality update, and occasionally are released out of band to address a late-breaking issue. Always install the latest available quality update to catch any servicing stack updates that might have been released. The servicing stack also contains the "component-based servicing stack" (CBS), which is a key underlying component for several elements of Windows deployment, such as DISM, SFC, changing Windows features or roles, and repairing components. The CBS is a small component that typically does not have updates released every month. You can find a list of servicing stack updates at [Latest servicing stack updates](https://portal.msrc.microsoft.com/security-guidance/advisory/ADV990001). For more detail about servicing stack updates, see [Servicing stack updates](servicing-stack-updates.md). -- **Driver updates**: These are updates to drivers applicable to your devices. Driver updates are turned off by default in Windows Server Update Services (WSUS), but for cloud-based update methods, you can control whether they are installed or not. -- **Microsoft product updates:** These are updates for other Microsoft products, such as Office. You can enable or disable Microsoft updates by using policies controlled by various servicing tools. +- **Driver updates**: These update drivers applicable to your devices. Driver updates are turned off by default in Windows Server Update Services (WSUS), but for cloud-based update methods, you can control whether they are installed or not. +- **Microsoft product updates:** These update other Microsoft products, such as Office. You can enable or disable Microsoft updates by using policies controlled by various servicing tools. ## Servicing channels -Windows 10 offers three servicing channels, each of which offers you a different level of flexibility with how and when updates are delivered to devices. Using the different servicing channels allows you to deploy Windows 10 "as a service" which conceives of deployment as a continual process of updates which roll out across the organization in waves. In this approach, an update is plugged into this process and while it runs, you monitor for anomalies, errors, or user impact and respond as issues arise--without interrupting the entire process. +Windows 10 offers three servicing channels, each of which offers you a different level of flexibility with how and when updates are delivered to devices. Using the different servicing channels allows you to deploy Windows 10 "as a service," which conceives of deployment as a continual process of updates that roll out across the organization in waves. In this approach, an update is plugged into this process and while it runs, you monitor for anomalies, errors, or user impact and respond as issues arise--without interrupting the entire process. The first step of controlling when and how devices install updates is assigning them to the appropriate servicing channel. You can assign devices to a particular channel with any of several tools, including Microsoft Endpoint Configuration Manager, Windows Server Update Services (WSUS), and Group Policy settings applied by any of several means. By dividing devices into different populations ("deployment groups" or "rings") you can use servicing channel assignment, followed by other management features such as update deferral policies, to create a phased deployment of any update that allows you to start with a limited pilot deployment for testing before moving to a broad deployment throughout your organization. @@ -54,7 +54,7 @@ In the Semi-annual Channel, feature updates are available as soon as Microsoft r ### Windows Insider Program for Business -Insider preview releases are made available during the development of the features that will be shipped in the next feature update, enabling organizations to validate new features as well as compatibility with existing apps and infrastructure, providing feedback to Microsoft on any issues encountered. There are actually three options within the Windows Insider Program for Business channel: +Insider preview releases are made available during the development of the features that will be shipped in the next feature update, enabling organizations to validate new features and compatibility with existing apps and infrastructure, providing feedback to Microsoft on any issues encountered. There are actually three options within the Windows Insider Program for Business channel: - Windows Insider Fast - Windows Insider Slow @@ -65,7 +65,7 @@ We recommend that you use the Windows Insider Release Preview channel for valida ### Long-term Servicing Channel -The **Long-Term Servicing Channel** is designed to be used only for specialized devices (which typically don't run Office) such as those that control medical equipment or ATMs. Devices on this channel receive new feature releases every two to three years. LTSB releases service a special LTSB edition of Windows 10 and are only available through the [Microsoft Volume Licensing Center](https://www.microsoft.com/Licensing/servicecenter/default.aspx). +The **Long-Term Servicing Channel** is designed to be used only for specialized devices (which typically don't run Office) such as ones that control medical equipment or ATMs. Devices on this channel receive new feature releases every two to three years. LTSB releases service a special LTSB edition of Windows 10 and are only available through the [Microsoft Volume Licensing Center](https://www.microsoft.com/Licensing/servicecenter/default.aspx). The Semi-Annual Channel is the default servicing channel for all Windows 10 devices except those with the LTSB edition installed. The following table shows the servicing channels available to each Windows 10 edition. @@ -85,7 +85,7 @@ The Semi-Annual Channel is the default servicing channel for all Windows 10 devi Windows Server Update Services (WSUS): you set up a WSUS server, which downloads updates in bulk from Microsoft. Your individual devices then connect to your server to install their updates from there. -You can set up, control, and manage the server and update process with a number of tools: +You can set up, control, and manage the server and update process with several tools: - A standalone Windows Server Update Services server operated directly - [Configuration Manager](deploy-updates-configmgr.md) @@ -95,7 +95,7 @@ For more information, see [Windows Server Update Services (WSUS)](https://docs.m ### Tools for cloud-based update delivery -Your individual devices connect to Microsoft endpoints directly to get the updates. The details of this process (how often devices download updates of various kinds, from which channels, deferrals, and details of the users' experience of installation) are set on devices either with Group Policy or MDM policies, which you can control with any of a number of tools: +Your individual devices connect to Microsoft endpoints directly to get the updates. The details of this process (how often devices download updates of various kinds, from which channels, deferrals, and details of the users' experience of installation) are set on devices either with Group Policy or MDM policies, which you can control with any of several tools: - [Group Policy Management Console](waas-wufb-group-policy.md) (Gpmc.msc) - [Microsoft Intune](waas-wufb-intune.md) From 0e3785b302793792da8bb93332f8c0fc5f31d64b Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Tue, 16 Feb 2021 14:16:23 -0800 Subject: [PATCH 108/161] Update prevent-changes-to-security-settings-with-tamper-protection.md --- ...nt-changes-to-security-settings-with-tamper-protection.md | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md index f0ba5681d4..bd83299fe9 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md @@ -30,8 +30,9 @@ ms.technology: mde Tamper protection, currently in [preview](../../includes/prerelease.md), is available on devices that are running one of the following versions of Windows: - Windows 10 -- Windows Server 2016 and 2019 (if you are using either [tenant attach with Configuration Manager, version 2006](#manage-tamper-protection-with-configuration-manager-version-2006) or - +- Windows Server 2019 +- Windows Server, version 1803 or later +- Windows Server 2016 ## Overview From 965daea537139eac62a4bcc867fce615de248687 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Tue, 16 Feb 2021 14:18:41 -0800 Subject: [PATCH 109/161] Update prevent-changes-to-security-settings-with-tamper-protection.md --- ...changes-to-security-settings-with-tamper-protection.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md index bd83299fe9..15726f51dd 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md @@ -78,13 +78,13 @@ Tamper protection doesn't prevent you from viewing your security settings. And, > > Once you’ve made this update, tamper protection continues to protect your registry settings, and logs attempts to modify them without returning errors. -If you are a home user, or you are not subject to settings managed by a security team, you can use the Windows Security app to turn tamper protection on or off. You must have appropriate admin permissions on your machine to do change security settings, such as tamper protection. +If you are a home user, or you are not subject to settings managed by a security team, you can use the Windows Security app to manage tamper protection. You must have appropriate admin permissions on your device to do change security settings, such as tamper protection. Here's what you see in the Windows Security app: ![Tamper protection turned on in Windows 10 Home](images/tamperprotectionturnedon.png) -1. Click **Start**, and start typing *Security*. In the search results, select **Windows Security**. +1. Select **Start**, and start typing *Security*. In the search results, select **Windows Security**. 2. Select **Virus & threat protection** > **Virus & threat protection settings**. 3. Set **Tamper Protection** to **On** or **Off**. @@ -162,7 +162,7 @@ Currently in preview, tamper protection can be turned on or off in the Microsoft - Windows Server, version [1803](https://docs.microsoft.com/windows/release-health/status-windows-10-1803) or later - [Windows Server 2016](/windows-server/get-started/whats-new-in-windows-server-2016) - For more information about releases, see [Windows 10 release information](https://docs.microsoft.com/windows/release-health/release-information). -- Your devices must be [onboarded to MIcrosoft Defender for Endpoint](../microsoft-defender-atp/onboarding.md). +- Your devices must be [onboarded to Microsoft Defender for Endpoint](../microsoft-defender-atp/onboarding.md). - Your devices must be using anti-malware platform version 4.18.2010.7 (or above) and anti-malware engine version 1.1.17600.5 (or above). ([Manage Microsoft Defender Antivirus updates and apply baselines](manage-updates-baselines-microsoft-defender-antivirus.md).) - [Cloud-delivered protection must be turned on](enable-cloud-protection-microsoft-defender-antivirus.md). @@ -254,7 +254,7 @@ If a device is off-boarded from Microsoft Defender for Endpoint, tamper protecti Yes. The alert is shown in [https://securitycenter.microsoft.com](https://securitycenter.microsoft.com) under **Alerts**. -In addition, your security operations team can use hunting queries, such as the following example: +Your security operations team can also use hunting queries, such as the following example: `DeviceAlertEvents | where Title == "Tamper Protection bypass"` From dd94f51d5145cd7bcdcbc0dbafdf77c29388960f Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Tue, 16 Feb 2021 14:19:18 -0800 Subject: [PATCH 110/161] Update prevent-changes-to-security-settings-with-tamper-protection.md --- ...event-changes-to-security-settings-with-tamper-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md index 15726f51dd..33f03234bc 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md @@ -55,7 +55,7 @@ Tamper protection essentially locks Microsoft Defender Antivirus and prevents yo - Changing settings through PowerShell cmdlets - Editing or removing security settings through group policies -Tamper protection doesn't prevent you from viewing your security settings. And, tamper protection doesn't affect how third-party antivirus apps register with the Windows Security app. If your organization is using Windows 10 Enterprise E5, individual users can't change the tamper protection setting; tamper protection is managed by your security team. +Tamper protection doesn't prevent you from viewing your security settings. And, tamper protection doesn't affect how third-party antivirus apps register with the Windows Security app. If your organization is using Windows 10 Enterprise E5, individual users can't change the tamper protection setting; in those cases, tamper protection is managed by your security team. ### What do you want to do? From 3cc65289ccf916bb3f89841f8383d4aa70cd5536 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Tue, 16 Feb 2021 14:21:11 -0800 Subject: [PATCH 111/161] Update prevent-changes-to-security-settings-with-tamper-protection.md --- ...event-changes-to-security-settings-with-tamper-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md index 33f03234bc..6bd4f7aacf 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md @@ -59,7 +59,7 @@ Tamper protection doesn't prevent you from viewing your security settings. And, ### What do you want to do? -| To perform this task... | See this... | +| To perform this task... | See this section... | |:---|:---| | Turn tamper protection on for an individual device | [Use the Windows Security app](#manage-tamper-protection-on-an-individual-device) | | Turn tamper protection on for your organization | [Use Intune](#manage-tamper-protection-for-your-organization-using-intune) | From 25bf8aa71757cffda2400c95de677f90e13e449e Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Tue, 16 Feb 2021 14:23:39 -0800 Subject: [PATCH 112/161] title changes --- ...-extension-file-exclusions-microsoft-defender-antivirus.md | 2 ++ ...-potentially-unwanted-apps-microsoft-defender-antivirus.md | 4 ++-- 2 files changed, 4 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/configure-extension-file-exclusions-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/configure-extension-file-exclusions-microsoft-defender-antivirus.md index 49091cb89b..54c891a786 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/configure-extension-file-exclusions-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/configure-extension-file-exclusions-microsoft-defender-antivirus.md @@ -31,6 +31,8 @@ ms.technology: mde You can exclude certain files from Microsoft Defender Antivirus scans by modifying exclusion lists. **Generally, you shouldn't need to apply exclusions**. Microsoft Defender Antivirus includes many automatic exclusions based on known operating system behaviors and typical management files, such as those used in enterprise management, database management, and other enterprise scenarios and situations. +**Note**: Exclusions apply to Potentially Unwanted Apps (PUA) detections as well. + > [!NOTE] > Automatic exclusions apply only to Windows Server 2016 and above. These exclusions are not visible in the Windows Security app and in PowerShell. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md index 173e44d6f2..c061f72dc6 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md @@ -151,7 +151,7 @@ Setting the value for this cmdlet to `Disabled` turns the feature off if it has See [Use PowerShell cmdlets to configure and run Microsoft Defender Antivirus](use-powershell-cmdlets-microsoft-defender-antivirus.md) and [Defender cmdlets](https://docs.microsoft.com/powershell/module/defender/index) for more information on how to use PowerShell with Microsoft Defender Antivirus. -### View PUA events +## View PUA events PUA events are reported in the Windows Event Viewer, but not in Microsoft Endpoint Manager or in Intune. You can also use the `Get-MpThreat` cmdlet to view threats that Microsoft Defender Antivirus handled. Here's an example: @@ -174,7 +174,7 @@ You can turn on email notifications to receive mail about PUA detections. See [Troubleshoot event IDs](troubleshoot-microsoft-defender-antivirus.md) for details on viewing Microsoft Defender Antivirus events. PUA events are recorded under event ID **1160**. -### Allow-listing apps +## Excluding files Sometimes a file is erroneously blocked by PUA protection, or a feature of a PUA is required to complete a task. In these cases, a file can be allow-listed. From dae577be97753903526b02baca883419a6fb7ea1 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Tue, 16 Feb 2021 14:26:06 -0800 Subject: [PATCH 113/161] remove duplicate description --- .../threat-protection/microsoft-defender-atp/manage-edr.md | 1 - 1 file changed, 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-edr.md b/windows/security/threat-protection/microsoft-defender-atp/manage-edr.md index 217dcdf4ea..d053e3cc3d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-edr.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-edr.md @@ -2,7 +2,6 @@ title: Manage endpoint detection and response capabilities description: Manage endpoint detection and response capabilities ms.reviewer: -description: Manage endpoint detection and response capabilities keywords: search.product: eADQiWindows 10XVcnh search.appverid: met150 From 34ae93709b8ec81bc424ec901acdd9ea724b63dc Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Tue, 16 Feb 2021 14:33:03 -0800 Subject: [PATCH 114/161] list --- ...ck-potentially-unwanted-apps-microsoft-defender-antivirus.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md index c061f72dc6..eedb6be8ae 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md @@ -176,7 +176,7 @@ See [Troubleshoot event IDs](troubleshoot-microsoft-defender-antivirus.md) for d ## Excluding files -Sometimes a file is erroneously blocked by PUA protection, or a feature of a PUA is required to complete a task. In these cases, a file can be allow-listed. +Sometimes a file is erroneously blocked by PUA protection, or a feature of a PUA is required to complete a task. In these cases, a file can be added to an exclusion list. For more information, see [Configure and validate exclusions based on file extension and folder location](configure-extension-file-exclusions-microsoft-defender-antivirus.md). From deb021f484c3c8172629251b15224c434d062e83 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Tue, 16 Feb 2021 14:46:23 -0800 Subject: [PATCH 115/161] Update prevent-changes-to-security-settings-with-tamper-protection.md --- ...revent-changes-to-security-settings-with-tamper-protection.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md index 6bd4f7aacf..7af80ebac0 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md @@ -152,6 +152,7 @@ Currently in preview, tamper protection can be turned on or off in the Microsoft - When you use the Microsoft Defender Security Center to manage tamper protection, you do not have to use Intune or the tenant attach method. - When you manage tamper protection in the Microsoft Defender Security Center, the setting is applied tenant wide, affecting all of your devices that are running Windows 10. To fine-tune tamper protection (such as having tamper protection on for some devices but off for others), use either [Intune](#turn-tamper-protection-on-or-off-for-your-organization-using-intune) or the [tenant attach method](#manage-tamper-protection-with-configuration-manager-version-2006). - If you have a hybrid environment, tamper protection settings configured in Intune take precedence over settings configured in the Microsoft Defender Security Center. +- Tamper protection is generally available; however, the ability to manage tamper protection in the Microsoft Defender Security Center is currently in preview. ### Requirements for managing tamper protection in the Microsoft Defender Security Center From 56d6db385321bc85936d0b7ccaa10578b2da45cf Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Tue, 16 Feb 2021 14:48:53 -0800 Subject: [PATCH 116/161] Update prevent-changes-to-security-settings-with-tamper-protection.md --- ...event-changes-to-security-settings-with-tamper-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md index 7af80ebac0..fd94f30cd5 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md @@ -130,7 +130,7 @@ If you are using Windows 10 OS [1709](https://docs.microsoft.com/windows/release If you're using [version 2006 of Configuration Manager](https://docs.microsoft.com/mem/configmgr/core/plan-design/changes/whats-new-in-version-2006), you can manage tamper protection settings on Windows 10, Windows Server 2016, and Windows Server 2019 by using a method called *tenant attach*. Tenant attach enables you to sync your on-premises-only Configuration Manager devices into the Microsoft Endpoint Manager admin center, and then deliver your endpoint security configuration policies to your on-premises collections & devices. -:::image type="content" source="images/win-security- exp-policy-endpt-security.png" alt-text="Windows security experience in Endpoint Manager"::: +![Windows security experience in Endpoint Manager](images/win-security- exp-policy-endpt-security.png) 1. Set up tenant attach. See [Microsoft Endpoint Manager tenant attach: Device sync and device actions](https://docs.microsoft.com/mem/configmgr/tenant-attach/device-sync-actions). 2. In the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Endpoint security** > **Antivirus**, and choose **+ Create Policy**.
From 8b1456745fff1102698c25621f3d0a6e5c5e44af Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Tue, 16 Feb 2021 14:49:30 -0800 Subject: [PATCH 117/161] Update prevent-changes-to-security-settings-with-tamper-protection.md --- ...event-changes-to-security-settings-with-tamper-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md index fd94f30cd5..4413ec0512 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md @@ -169,7 +169,7 @@ Currently in preview, tamper protection can be turned on or off in the Microsoft ### Turn tamper protection on (or off) in the Microsoft Defender Security Center -:::image type="content" source="images/mde-turn-tamperprotect-on.png" alt-text="Turn tamper protection on in the Microsoft Defender Security Center"::: +![Turn tamper protection on in the Microsoft Defender Security Center](images/mde-turn-tamperprotect-on.png) 1. Go to the Microsoft Defender Security Center ([https://securitycenter.windows.com](https://securitycenter.windows.com)) and sign in. 2. Choose **Settings**. From 08f27a0103193e83d893d4c39ea54ec5eae4f9b7 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Tue, 16 Feb 2021 14:54:03 -0800 Subject: [PATCH 118/161] Update prevent-changes-to-security-settings-with-tamper-protection.md --- ...changes-to-security-settings-with-tamper-protection.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md index 4413ec0512..37bd02f704 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md @@ -61,10 +61,10 @@ Tamper protection doesn't prevent you from viewing your security settings. And, | To perform this task... | See this section... | |:---|:---| -| Turn tamper protection on for an individual device | [Use the Windows Security app](#manage-tamper-protection-on-an-individual-device) | -| Turn tamper protection on for your organization | [Use Intune](#manage-tamper-protection-for-your-organization-using-intune) | -| Turn tamper protection on for devices running Windows 10 and Windows Server 2019 with Configuration Manager | [Use tenant attach with Configuration Manager, version 2006](#manage-tamper-protection-for-your-organization-with-configuration-manager-version-2006) | -| Turn tamper protection on in the Microsoft Defender Security Center |[Use the Microsoft Defender Security Center](#manage-tamper-protection-for-your-organiztion-using-the-microsoft-defender-security-center) | +| Turn tamper protection on (or off) for an individual device | [Manage tamper protection on an individual device](#manage-tamper-protection-on-an-individual-device) | +| Turn tamper protection on (or off) for all or part of your organization with Intune

Fine-tune tamper protection settings in your organization | [Manage tamper protection for your organization using Intune](#manage-tamper-protection-for-your-organization-using-intune) | +| Turn tamper protection on (or off) for your organization with Configuration Manager | [Manage tamper protection for your organization with Configuration Manager, version 2006](#manage-tamper-protection-for-your-organization-with-configuration-manager-version-2006) | +| Turn tamper protection on in the Microsoft Defender Security Center

Manage tamper protection across your tenant | [Manage tamper protection for your organization using the Microsoft Defender Security Center](#manage-tamper-protection-for-your-organization-using-the-microsoft-defender-security-center) | | View details about tampering attempts on devices | [View information about tampering attempts](#view-information-about-tampering-attempts) | | Review your security recommendations | [Review security recommendations](#review-your-security-recommendations) | | Review the list of frequently asked questions (FAQs) | [Browse the FAQs](#view-information-about-tampering-attempts) | From e288fe627d8513328338937d849a8a2b8ca6e5ef Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Tue, 16 Feb 2021 14:55:53 -0800 Subject: [PATCH 119/161] Update prevent-changes-to-security-settings-with-tamper-protection.md --- ...event-changes-to-security-settings-with-tamper-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md index 37bd02f704..3b250babb0 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md @@ -90,7 +90,7 @@ Here's what you see in the Windows Security app: ## Manage tamper protection for your organization using Intune -If you are part of your organization's security team, and your subscription includes [Intune](https://docs.microsoft.com/intune/fundamentals/what-is-intune), you can turn tamper protection on (or off) for your organization in the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com) portal. +If you are part of your organization's security team, and your subscription includes [Intune](https://docs.microsoft.com/intune/fundamentals/what-is-intune), you can turn tamper protection on (or off) for your organization in the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com) portal. Use Intune when you want to fine-tune tamper protection settings. For example, if you want to enable tamper protection on some devices, but not all, use Intune. ### Requirements for managing tamper protection in Intune From 9de13476ac5829b9b5f3508335e5b184edbaec2e Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Tue, 16 Feb 2021 15:03:33 -0800 Subject: [PATCH 120/161] Update prevent-changes-to-security-settings-with-tamper-protection.md --- ...event-changes-to-security-settings-with-tamper-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md index 3b250babb0..6316b81245 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md @@ -128,7 +128,7 @@ If you are using Windows 10 OS [1709](https://docs.microsoft.com/windows/release > [!IMPORTANT] > The procedure can be used to extend tamper protection to devices running Windows 10 and Windows Server 2019. Make sure to review the prerequisites and other information in the resources mentioned in this procedure. -If you're using [version 2006 of Configuration Manager](https://docs.microsoft.com/mem/configmgr/core/plan-design/changes/whats-new-in-version-2006), you can manage tamper protection settings on Windows 10, Windows Server 2016, and Windows Server 2019 by using a method called *tenant attach*. Tenant attach enables you to sync your on-premises-only Configuration Manager devices into the Microsoft Endpoint Manager admin center, and then deliver your endpoint security configuration policies to your on-premises collections & devices. +If you're using [version 2006 of Configuration Manager](https://docs.microsoft.com/mem/configmgr/core/plan-design/changes/whats-new-in-version-2006), you can manage tamper protection settings on Windows 10, Windows Server 2016, and Windows Server 2019 by using a method called *tenant attach*. Tenant attach enables you to sync your on-premises-only Configuration Manager devices into the Microsoft Endpoint Manager admin center, and then deliver endpoint security configuration policies to on-premises collections & devices. ![Windows security experience in Endpoint Manager](images/win-security- exp-policy-endpt-security.png) From a3590d136161155454798e9f62939f39379e4aa8 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Tue, 16 Feb 2021 16:07:27 -0800 Subject: [PATCH 121/161] updating note --- .../microsoft-defender-atp/tvm-security-recommendation.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation.md index 80a2a4dd6c..d343ad8424 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation.md @@ -105,7 +105,7 @@ From the flyout, you can choose any of the following options: - [**Exception options**](tvm-exception.md) - Submit an exception, provide justification, and set exception duration if you can't remediate the issue yet. >[!NOTE] ->When a change is made on a device, it typically takes two hours for the data to be reflected in the Microsoft Defender Security Center. However, it may sometimes take longer. +>When a software change is made on a device, it yypically takes 2 hours for the data to be reflected in the Microsoft Defender Security Center. Configuration changes can take 12 hours. However, it may sometimes take longer. ### Investigate changes in device exposure or impact From a4775e5bfbacebeb60949c7cd7350e1e4d5dcaa2 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Tue, 16 Feb 2021 16:08:37 -0800 Subject: [PATCH 122/161] grammar update --- .../microsoft-defender-atp/tvm-security-recommendation.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation.md index d343ad8424..2c151888d9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation.md @@ -105,7 +105,7 @@ From the flyout, you can choose any of the following options: - [**Exception options**](tvm-exception.md) - Submit an exception, provide justification, and set exception duration if you can't remediate the issue yet. >[!NOTE] ->When a software change is made on a device, it yypically takes 2 hours for the data to be reflected in the Microsoft Defender Security Center. Configuration changes can take 12 hours. However, it may sometimes take longer. +>When a software change is made on a device, it typically takes 2 hours for the data to be reflected in the security portal. Configuration changes can take 12 hours. However, it may sometimes take longer. ### Investigate changes in device exposure or impact From 66ae0a27c3ed996b6feb54abc10262478932860c Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Tue, 16 Feb 2021 18:10:48 -0800 Subject: [PATCH 123/161] Acrolinx: "engange" --- .../threat-protection/microsoft-defender-atp/community.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/community.md b/windows/security/threat-protection/microsoft-defender-atp/community.md index 5ac9580052..e8debb489b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/community.md +++ b/windows/security/threat-protection/microsoft-defender-atp/community.md @@ -1,6 +1,6 @@ --- title: Access the Microsoft Defender for Endpoint Community Center -description: Access the Microsoft Defender ATP Community Center to share experiences, engange, and learn about the product. +description: Access the Microsoft Defender ATP Community Center to share experiences, engage, and learn about the product. keywords: community, community center, tech community, conversation, announcements search.product: eADQiWindows 10XVcnh search.appverid: met150 From 114959efeea16f8b804631a302a70a849c810946 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Tue, 16 Feb 2021 18:12:19 -0800 Subject: [PATCH 124/161] Acrolinx: "Powershell" --- .../configure-attack-surface-reduction.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-attack-surface-reduction.md b/windows/security/threat-protection/microsoft-defender-atp/configure-attack-surface-reduction.md index 6b643c1ae3..767a807717 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-attack-surface-reduction.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-attack-surface-reduction.md @@ -1,6 +1,6 @@ --- title: Configure attack surface reduction -description: Use Microsoft Intune, Microsoft Endpoint Configuration Manager, Powershell cmdlets, and Group Policy to configure attack surface reduction. +description: Use Microsoft Intune, Microsoft Endpoint Configuration Manager, PowerShell cmdlets, and Group Policy to configure attack surface reduction. keywords: asr, attack surface reduction, windows defender, microsoft defender, antivirus, av search.product: eADQiWindows 10XVcnh search.appverid: met150 From 867d8bd2bc1613faf3da3023792fc446390ae108 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Tue, 16 Feb 2021 18:19:10 -0800 Subject: [PATCH 125/161] Various corrections to layout Second-level list items often do not correctly get a hanging indentation unless automatic number (1, 1, 1) is used. When a list is not sequential, it should use bullets not a number/letter sequence. --- .../configure-endpoints-gp.md | 49 ++++++++++--------- 1 file changed, 27 insertions(+), 22 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md index 5b9a8a4696..47651ed9e4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md @@ -34,7 +34,7 @@ ms.technology: mde > [!NOTE] > To use Group Policy (GP) updates to deploy the package, you must be on Windows Server 2008 R2 or later. - +> > For Windows Server 2019, you may need to replace NT AUTHORITY\Well-Known-System-Account with NT AUTHORITY\SYSTEM of the XML file that the Group Policy preference creates. ## Onboard devices using Group Policy @@ -48,13 +48,13 @@ Check out the [PDF](https://github.com/MicrosoftDocs/windows-itpro-docs/raw/publ 1. Open the GP configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from [Microsoft Defender Security Center](https://securitycenter.windows.com/): - a. In the navigation pane, select **Settings** > **Onboarding**. + 1. In the navigation pane, select **Settings** > **Onboarding**. - b. Select Windows 10 as the operating system. + 1. Select Windows 10 as the operating system. - c. In the **Deployment method** field, select **Group policy**. + 1. In the **Deployment method** field, select **Group policy**. - d. Click **Download package** and save the .zip file. + 1. Click **Download package** and save the .zip file. 2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the device. You should have a folder called *OptionalParamsPolicy* and the file *WindowsDefenderATPOnboardingScript.cmd*. @@ -84,16 +84,16 @@ You can use Group Policy (GP) to configure settings, such as settings for the sa 1. On your GP management device, copy the following files from the configuration package: - a. Copy _AtpConfiguration.admx_ into _C:\\Windows\\PolicyDefinitions_ + - Copy _AtpConfiguration.admx_ into _C:\\Windows\\PolicyDefinitions_ - b. Copy _AtpConfiguration.adml_ into _C:\\Windows\\PolicyDefinitions\\en-US_ + - Copy _AtpConfiguration.adml_ into _C:\\Windows\\PolicyDefinitions\\en-US_ If you are using a [Central Store for Group Policy Administrative Templates](https://support.microsoft.com/help/3087759/how-to-create-and-manage-the-central-store-for-group-policy-administra), copy the following files from the configuration package: - a. Copy _AtpConfiguration.admx_ into _\\\\\\\SysVol\\\\\Policies\\PolicyDefinitions_ + - Copy _AtpConfiguration.admx_ into _\\\\\\\SysVol\\\\\Policies\\PolicyDefinitions_ - b. Copy _AtpConfiguration.adml_ into _\\\\\\\SysVol\\\\\Policies\\PolicyDefinitions\\en-US_ + - Copy _AtpConfiguration.adml_ into _\\\\\\\SysVol\\\\\Policies\\PolicyDefinitions\\en-US_ 2. Open the [Group Policy Management Console](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/group-policy-and-group-policy-mgmt-console-ie11), right-click the GPO you want to configure and click **Edit**. @@ -123,13 +123,14 @@ Policy | Setting :---|:--- Enable\Disable Sample collection| Enabled - "Enable sample collection on machines" checked - +
**Policy location:** \Windows Components\Windows Defender Antivirus Policy | Setting :---|:--- Configure detection for potentially unwanted applications | Enabled, Block +
**Policy location:** \Windows Components\Windows Defender Antivirus\MAPS Policy | Setting @@ -137,6 +138,7 @@ Policy | Setting Join Microsoft MAPS | Enabled, Advanced MAPS Send file samples when further analysis is required | Enabled, Send safe samples +
**Policy location:** \Windows Components\Windows Defender Antivirus\Real-time Protection Policy | Setting @@ -146,7 +148,7 @@ Turn on behavior monitoring|Enabled Scan all downloaded files and attachments|Enabled Monitor file and program activity on your computer|Enabled - +
**Policy location:** \Windows Components\Windows Defender Antivirus\Scan These settings configure periodic scans of the endpoint. We recommend performing a weekly quick scan, performance permitting. @@ -156,19 +158,21 @@ Policy | Setting Check for the latest virus and spyware security intelligence before running a scheduled scan |Enabled - -**Policy location:** \Windows Components\Windows Defender Antivirus\Windows Defender Exploit Guard\Attack Surface Reduction +
**Policy location:** \Windows Components\Windows Defender Antivirus\Windows Defender Exploit Guard\Attack Surface Reduction Get the current list of attack surface reduction GUIDs from [Customize attack surface reduction rules](customize-attack-surface-reduction.md) 1. Open the **Configure Attack Surface Reduction** policy. -2. Select **Enabled**. -3. Select the **Show…** button. -4. Add each GUID in the **Value Name** field with a Value of 2. -This will set each up for audit only. +1. Select **Enabled**. -![Image of attack surface reduction configuration](images/asr-guid.png) +1. Select the **Show** button. + +1. Add each GUID in the **Value Name** field with a Value of 2. + + This will set each up for audit only. + + ![Image of attack surface reduction configuration](images/asr-guid.png) @@ -186,13 +190,13 @@ For security reasons, the package used to Offboard devices will expire 30 days a 1. Get the offboarding package from [Microsoft Defender Security Center](https://securitycenter.windows.com/): - a. In the navigation pane, select **Settings** > **Offboarding**. + 1. In the navigation pane, select **Settings** > **Offboarding**. - b. Select Windows 10 as the operating system. + 1. Select Windows 10 as the operating system. - c. In the **Deployment method** field, select **Group policy**. + 1. In the **Deployment method** field, select **Group policy**. - d. Click **Download package** and save the .zip file. + 1. Click **Download package** and save the .zip file. 2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the device. You should have a file named *WindowsDefenderATPOffboardingScript_valid_until_YYYY-MM-DD.cmd*. @@ -218,6 +222,7 @@ For security reasons, the package used to Offboard devices will expire 30 days a With Group Policy there isn’t an option to monitor deployment of policies on the devices. Monitoring can be done directly on the portal, or by using the different deployment tools. ## Monitor devices using the portal + 1. Go to [Microsoft Defender Security Center](https://securitycenter.windows.com/). 2. Click **Devices list**. 3. Verify that devices are appearing. From 93c3e44a70334e5da6deb0b422444f1e31677899 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Tue, 16 Feb 2021 18:22:26 -0800 Subject: [PATCH 126/161] Corrections for layout Second-level list items often do not have proper hanging indentation unless they use automatic numbering (1, 1, 1). --- .../configure-endpoints-mdm.md | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm.md index 829644772f..603253f4a4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm.md @@ -67,20 +67,20 @@ For security reasons, the package used to Offboard devices will expire 30 days a 1. Get the offboarding package from [Microsoft Defender Security Center](https://securitycenter.windows.com/): - a. In the navigation pane, select **Settings** > **Offboarding**. + 1. In the navigation pane, select **Settings** > **Offboarding**. - b. Select Windows 10 as the operating system. + 1. Select Windows 10 as the operating system. - c. In the **Deployment method** field, select **Mobile Device Management / Microsoft Intune**. + 1. In the **Deployment method** field, select **Mobile Device Management / Microsoft Intune**. - d. Click **Download package**, and save the .zip file. + 1. Click **Download package**, and save the .zip file. 2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the network administrators who will deploy the package. You should have a file named *WindowsDefenderATP_valid_until_YYYY-MM-DD.offboarding*. 3. Use the Microsoft Intune custom configuration policy to deploy the following supported OMA-URI settings. - OMA-URI: ./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/Offboarding - Date type: String + OMA-URI: ./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/Offboarding
+ Date type: String
Value: [Copy and paste the value from the content of the WindowsDefenderATP_valid_until_YYYY-MM-DD.offboarding file] For more information on Microsoft Intune policy settings see, [Windows 10 policy settings in Microsoft Intune](https://docs.microsoft.com/intune/deploy-use/windows-10-policy-settings-in-microsoft-intune). From baa217fc6cc9fce9ba5266eecbf9882c9945ae1e Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Tue, 16 Feb 2021 18:28:24 -0800 Subject: [PATCH 127/161] Corrections for layout, code block type Second-level list items often do not have proper hanging indentation unless they use automatic numbering (1, 1, 1). "Console" is a valid type for code blocks and the closest match available. --- .../configure-endpoints-sccm.md | 31 ++++++++++--------- 1 file changed, 17 insertions(+), 14 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md index b8d9793a7b..4d619ca79e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md @@ -67,13 +67,13 @@ Check out the [PDF](https://github.com/MicrosoftDocs/windows-itpro-docs/raw/publ 1. Open the Configuration Manager configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from [Microsoft Defender Security Center](https://securitycenter.windows.com/): - a. In the navigation pane, select **Settings** > **Onboarding**. + 1. In the navigation pane, select **Settings** > **Onboarding**. - b. Select Windows 10 as the operating system. + 1. Select Windows 10 as the operating system. - c. In the **Deployment method** field, select **System Center Configuration Manager 2012/2012 R2/1511/1602**. + 1. In the **Deployment method** field, select **System Center Configuration Manager 2012/2012 R2/1511/1602**. - d. Select **Download package**, and save the .zip file. + 1. Select **Download package**, and save the .zip file. 2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the network administrators who will deploy the package. You should have a file named *WindowsDefenderATPOnboardingScript.cmd*. @@ -107,11 +107,12 @@ This rule should be a *remediating* compliance rule configuration item that sets The configuration is set through the following registry key entry: -``` -Path: “HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection” +```console +Path: "HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection" Name: "AllowSampleCollection" Value: 0 or 1 ``` + Where:
Key type is a D-WORD.
Possible values are: @@ -175,13 +176,13 @@ If you use Microsoft Endpoint Manager current branch, see [Create an offboarding 1. Get the offboarding package from [Microsoft Defender Security Center](https://securitycenter.windows.com/): - a. In the navigation pane, select **Settings** > **Offboarding**. + 1. In the navigation pane, select **Settings** > **Offboarding**. - b. Select Windows 10 as the operating system. + 1. Select Windows 10 as the operating system. - c. In the **Deployment method** field, select **System Center Configuration Manager 2012/2012 R2/1511/1602**. + 1. In the **Deployment method** field, select **System Center Configuration Manager 2012/2012 R2/1511/1602**. - d. Select **Download package**, and save the .zip file. + 1. Select **Download package**, and save the .zip file. 2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the network administrators who will deploy the package. You should have a file named *WindowsDefenderATPOffboardingScript_valid_until_YYYY-MM-DD.cmd*. @@ -224,11 +225,13 @@ You can set a compliance rule for configuration item in System Center 2012 R2 Co This rule should be a *non-remediating* compliance rule configuration item that monitors the value of a registry key on targeted devices. Monitor the following registry key entry: + +```console +Path: "HKLM\SOFTWARE\Microsoft\Windows Advanced Threat Protection\Status" +Name: "OnboardingState" +Value: "1" ``` -Path: “HKLM\SOFTWARE\Microsoft\Windows Advanced Threat Protection\Status” -Name: “OnboardingState” -Value: “1” -``` + For more information, see [Introduction to compliance settings in System Center 2012 R2 Configuration Manager](https://docs.microsoft.com/previous-versions/system-center/system-center-2012-R2/gg682139\(v=technet.10\)). ## Related topics From 9492a8df26236e4a85421edc2dbbe14f4befdc8c Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Tue, 16 Feb 2021 19:26:21 -0800 Subject: [PATCH 128/161] Added automatic image border --- .../defender-endpoint-false-positives-negatives.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/defender-endpoint-false-positives-negatives.md b/windows/security/threat-protection/microsoft-defender-atp/defender-endpoint-false-positives-negatives.md index 2016a7df22..87dd461c37 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/defender-endpoint-false-positives-negatives.md +++ b/windows/security/threat-protection/microsoft-defender-atp/defender-endpoint-false-positives-negatives.md @@ -137,7 +137,8 @@ When you're done reviewing and undoing actions that were taken as a result of fa ### Remove a file from quarantine across multiple devices -![Quarantine file](images/autoir-quarantine-file-1.png) +> [!div class="mx-imgBorder"] +> ![Quarantine file](images/autoir-quarantine-file-1.png) 1. Go to the Action center ([https://securitycenter.windows.com/action-center](https://securitycenter.windows.com/action-center)) and sign in. 2. On the **History** tab, select a file that has the Action type **Quarantine file**. From caf10a62471ac084d217700bd80987f65f37e25e Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Tue, 16 Feb 2021 20:23:26 -0800 Subject: [PATCH 129/161] Update prevent-changes-to-security-settings-with-tamper-protection.md --- ...event-changes-to-security-settings-with-tamper-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md index 6316b81245..3298fb804c 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md @@ -27,7 +27,7 @@ ms.technology: mde - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -Tamper protection, currently in [preview](../../includes/prerelease.md), is available on devices that are running one of the following versions of Windows: +Tamper protection is available for devices that are running one of the following versions of Windows: - Windows 10 - Windows Server 2019 From 0b82029680deef6d2c8c7c10bc47a64af4b7db79 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Tue, 16 Feb 2021 20:25:55 -0800 Subject: [PATCH 130/161] Update prevent-changes-to-security-settings-with-tamper-protection.md --- ...event-changes-to-security-settings-with-tamper-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md index 3298fb804c..c1a9e12c1c 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md @@ -150,7 +150,7 @@ See the following resources: Currently in preview, tamper protection can be turned on or off in the Microsoft Defender Security Center ([https://securitycenter.windows.com](https://securitycenter.windows.com)). Here are a few points to keep in mind: - When you use the Microsoft Defender Security Center to manage tamper protection, you do not have to use Intune or the tenant attach method. -- When you manage tamper protection in the Microsoft Defender Security Center, the setting is applied tenant wide, affecting all of your devices that are running Windows 10. To fine-tune tamper protection (such as having tamper protection on for some devices but off for others), use either [Intune](#turn-tamper-protection-on-or-off-for-your-organization-using-intune) or the [tenant attach method](#manage-tamper-protection-with-configuration-manager-version-2006). +- When you manage tamper protection in the Microsoft Defender Security Center, the setting is applied tenant wide, affecting all of your devices that are running Windows 10. To fine-tune tamper protection (such as having tamper protection on for some devices but off for others), use either [Intune](#manage-tamper-protection-for-your-organization-using-intune) or [Configuration Manager with tenant attach](#manage-tamper-protection-for-your-organization-with-configuration-manager-version-2006). - If you have a hybrid environment, tamper protection settings configured in Intune take precedence over settings configured in the Microsoft Defender Security Center. - Tamper protection is generally available; however, the ability to manage tamper protection in the Microsoft Defender Security Center is currently in preview. From b41d244d949d8d9f716ae1c7c111b785cedc6979 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Tue, 16 Feb 2021 20:27:52 -0800 Subject: [PATCH 131/161] Update prevent-changes-to-security-settings-with-tamper-protection.md --- ...changes-to-security-settings-with-tamper-protection.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md index c1a9e12c1c..9226c5487c 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md @@ -215,13 +215,13 @@ Devices that are onboarded to Microsoft Defender for Endpoint will have Microsof ### How can I turn tamper protection on/off? -If you are a home user, see [Turn tamper protection on (or off) for an individual device](#turn-tamper-protection-on-or-off-for-an-individual-machine). +If you are a home user, see [Manage tamper protection on an individual device](#manage-tamper-protection-on-an-individual-device). If you are an organization using [Microsoft Defender for Endpoint](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp), you should be able to manage tamper protection in Intune similar to how you manage other endpoint protection features. See the following sections of this article: -- [Turn tamper protection on (or off) for your organization using Intune](#turn-tamper-protection-on-or-off-for-your-organization-using-intune) - -- [Manage tamper protection with Configuration Manager, version 2006](#manage-tamper-protection-with-configuration-manager-version-2006) +- [Manage tamper protection using Intune](#manage-tamper-protection-for-your-organization-using-intune) +- [Manage tamper protection using Configuration Manager, version 2006](#manage-tamper-protection-for-your-organization-with-configuration-manager-version-2006) +- [Manage tamper protection using the Microsoft Defender Security Center](#manage-tamper-protection-for-your-organization-using-the-microsoft-defender-security-center) (currently in preview) ### How does configuring tamper protection in Intune affect how I manage Microsoft Defender Antivirus through my group policy? From 731b63fb69058b8f51da086fdcda07a57c0228c6 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Tue, 16 Feb 2021 20:28:53 -0800 Subject: [PATCH 132/161] Update prevent-changes-to-security-settings-with-tamper-protection.md --- ...ent-changes-to-security-settings-with-tamper-protection.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md index 9226c5487c..e7286a1d8b 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md @@ -233,7 +233,9 @@ Configuring tamper protection in Intune or Microsoft Endpoint Manager can be tar ### Can I configure Tamper Protection in Microsoft Endpoint Configuration Manager? -If you are using tenant attach, you can use Microsoft Endpoint Configuration Manager. See [Manage tamper protection with Configuration Manager, version 2006](#manage-tamper-protection-with-configuration-manager-version-2006) and [Tech Community blog: Announcing Tamper Protection for Configuration Manager Tenant Attach clients](https://techcommunity.microsoft.com/t5/microsoft-endpoint-manager-blog/announcing-tamper-protection-for-configuration-manager-tenant/ba-p/1700246#.X3QLR5Ziqq8.linkedin). +If you are using tenant attach, you can use Microsoft Endpoint Configuration Manager. See the following resources: +- [Manage tamper protection for your organization with Configuration Manager, version 2006](#manage-tamper-protection-for-your-organization-with-configuration-manager-version-2006) +- [Tech Community blog: Announcing Tamper Protection for Configuration Manager Tenant Attach clients](https://techcommunity.microsoft.com/t5/microsoft-endpoint-manager-blog/announcing-tamper-protection-for-configuration-manager-tenant/ba-p/1700246#.X3QLR5Ziqq8.linkedin) ### I have the Windows E3 enrollment. Can I use configuring tamper protection in Intune? From 79cbd4d22784ef9266122e17285c49c83041592e Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Tue, 16 Feb 2021 20:30:29 -0800 Subject: [PATCH 133/161] Update whats-new-in-microsoft-defender-atp.md --- .../whats-new-in-microsoft-defender-atp.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md b/windows/security/threat-protection/microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md index a22485ff25..dbac12f064 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md @@ -24,7 +24,6 @@ ms.technology: mde [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - **Applies to:** - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) @@ -99,7 +98,7 @@ For more information preview features, see [Preview features](https://docs.micro ## September 2019 -- [Tamper Protection settings using Intune](../microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md#turn-tamper-protection-on-or-off-for-your-organization-using-intune)
You can now turn Tamper Protection on (or off) for your organization in the Microsoft 365 Device Management Portal (Intune). +- [Tamper protection settings using Intune](../microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md#manage-tamper-protection-for-your-organization-using-intune)
You can now turn Tamper Protection on (or off) for your organization in the Microsoft 365 Device Management Portal (Intune). - [Live response](live-response.md)
Get instantaneous access to a device using a remote shell connection. Do in-depth investigative work and take immediate response actions to promptly contain identified threats - real-time. From 9ea9db8bb205601ded7d3fa3e9dcbc9345b50351 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Tue, 16 Feb 2021 20:36:04 -0800 Subject: [PATCH 134/161] Update manage-edr.md --- .../threat-protection/microsoft-defender-atp/manage-edr.md | 1 - 1 file changed, 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-edr.md b/windows/security/threat-protection/microsoft-defender-atp/manage-edr.md index 217dcdf4ea..d053e3cc3d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-edr.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-edr.md @@ -2,7 +2,6 @@ title: Manage endpoint detection and response capabilities description: Manage endpoint detection and response capabilities ms.reviewer: -description: Manage endpoint detection and response capabilities keywords: search.product: eADQiWindows 10XVcnh search.appverid: met150 From 4366ccdbeae27075023ab2c4cda80c2c86ec7b70 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Tue, 16 Feb 2021 21:15:15 -0800 Subject: [PATCH 135/161] Added spacing --- .../microsoft-defender-atp/configure-endpoints-gp.md | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md index 47651ed9e4..166d6e77a5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md @@ -124,6 +124,7 @@ Policy | Setting Enable\Disable Sample collection| Enabled - "Enable sample collection on machines" checked
+ **Policy location:** \Windows Components\Windows Defender Antivirus Policy | Setting @@ -131,6 +132,7 @@ Policy | Setting Configure detection for potentially unwanted applications | Enabled, Block
+ **Policy location:** \Windows Components\Windows Defender Antivirus\MAPS Policy | Setting @@ -139,6 +141,7 @@ Join Microsoft MAPS | Enabled, Advanced MAPS Send file samples when further analysis is required | Enabled, Send safe samples
+ **Policy location:** \Windows Components\Windows Defender Antivirus\Real-time Protection Policy | Setting @@ -149,6 +152,7 @@ Scan all downloaded files and attachments|Enabled Monitor file and program activity on your computer|Enabled
+ **Policy location:** \Windows Components\Windows Defender Antivirus\Scan These settings configure periodic scans of the endpoint. We recommend performing a weekly quick scan, performance permitting. @@ -158,7 +162,9 @@ Policy | Setting Check for the latest virus and spyware security intelligence before running a scheduled scan |Enabled -
**Policy location:** \Windows Components\Windows Defender Antivirus\Windows Defender Exploit Guard\Attack Surface Reduction +
+ +**Policy location:** \Windows Components\Windows Defender Antivirus\Windows Defender Exploit Guard\Attack Surface Reduction Get the current list of attack surface reduction GUIDs from [Customize attack surface reduction rules](customize-attack-surface-reduction.md) From 3bd26ab1cdc5fca0ed93c721f5105586a4d11d92 Mon Sep 17 00:00:00 2001 From: Sunayana Singh <57405155+sunasing@users.noreply.github.com> Date: Wed, 17 Feb 2021 13:08:18 +0530 Subject: [PATCH 136/161] Updated a note on pre-requisites --- .../microsoft-defender-atp/microsoft-defender-atp-ios.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios.md index a1de0acb00..93f29b113b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios.md @@ -45,6 +45,7 @@ iOS devices along with other platforms. - Device(s) are [enrolled](https://docs.microsoft.com/mem/intune/user-help/enroll-your-device-in-intune-ios) via the Intune Company Portal app to enforce Intune device compliance policies. This requires the end user to be assigned a Microsoft Intune license. - Intune Company Portal app can be downloaded from the [Apple App Store](https://apps.apple.com/us/app/intune-company-portal/id719171358). + - Note that Apple does not allow redirecting users to download other apps from the app store and hence this step needs to be done by the user before onboarding to Microsoft Defender for Endpoint app. - For more information on how to assign licenses, see [Assign licenses to users](https://docs.microsoft.com/azure/active-directory/users-groups-roles/licensing-groups-assign). From d4051e408285dd7aae2046858c923d1b97fbc3b5 Mon Sep 17 00:00:00 2001 From: adirdidi <68847945+adirdidi@users.noreply.github.com> Date: Wed, 17 Feb 2021 12:52:14 +0200 Subject: [PATCH 137/161] Update gov.md "Management and APIs: Device health and compliance report" now available for GCC High & DoD. --- .../security/threat-protection/microsoft-defender-atp/gov.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/gov.md b/windows/security/threat-protection/microsoft-defender-atp/gov.md index e30f0defb0..555ab3ee79 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/gov.md +++ b/windows/security/threat-protection/microsoft-defender-atp/gov.md @@ -142,7 +142,7 @@ Automated investigation and remediation: Live response | ![Yes](../images/svg/ch Automated investigation and remediation: Response to Office 365 alerts | ![No](../images/svg/check-no.svg) On engineering backlog | ![No](../images/svg/check-no.svg) On engineering backlog | ![No](../images/svg/check-no.svg) On engineering backlog Email notifications | ![No](../images/svg/check-no.svg) Rolling out | ![No](../images/svg/check-no.svg) Rolling out | ![No](../images/svg/check-no.svg) Rolling out Evaluation lab | ![Yes](../images/svg/check-yes.svg) | ![Yes](../images/svg/check-yes.svg) | ![Yes](../images/svg/check-yes.svg) -Management and APIs: Device health and compliance report | ![Yes](../images/svg/check-yes.svg) | ![No](../images/svg/check-no.svg) Rolling out | ![No](../images/svg/check-no.svg) Rolling out +Management and APIs: Device health and compliance report | ![Yes](../images/svg/check-yes.svg) | ![Yes](../images/svg/check-yes.svg) | ![Yes](../images/svg/check-yes.svg) Management and APIs: Integration with third-party products | ![No](../images/svg/check-no.svg) In development | ![No](../images/svg/check-no.svg) In development | ![No](../images/svg/check-no.svg) In development Management and APIs: Streaming API | ![Yes](../images/svg/check-yes.svg) | ![No](../images/svg/check-no.svg) In development | ![No](../images/svg/check-no.svg) In development Management and APIs: Threat protection report | ![Yes](../images/svg/check-yes.svg) | ![Yes](../images/svg/check-yes.svg) | ![Yes](../images/svg/check-yes.svg) From d0c72008f0bbd1714e54cce822cf90c5c0656215 Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Wed, 17 Feb 2021 08:53:42 -0800 Subject: [PATCH 138/161] Update audit-windows-defender.md acrolinx --- .../audit-windows-defender.md | 20 +++++++++---------- 1 file changed, 9 insertions(+), 11 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/audit-windows-defender.md b/windows/security/threat-protection/microsoft-defender-atp/audit-windows-defender.md index 5a44e8a0c3..4b16ba2447 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/audit-windows-defender.md +++ b/windows/security/threat-protection/microsoft-defender-atp/audit-windows-defender.md @@ -1,6 +1,6 @@ --- -title: Test how Microsoft Defender ATP features work in audit mode -description: Audit mode lets you use the event log to see how Microsoft Defender ATP would protect your devices if it was enabled. +title: Test how Microsoft Defender for Endpoint features work in audit mode +description: Audit mode helps you see how Microsoft Defender for Endpoint would protect your devices if it was enabled. keywords: exploit guard, audit, auditing, mode, enabled, disabled, test, demo, evaluate, lab search.product: eADQiWindows 10XVcnh ms.prod: m365-security @@ -27,7 +27,7 @@ ms.technology: mde You can enable attack surface reduction rules, exploit protection, network protection, and controlled folder access in audit mode. Audit mode lets you see a record of what *would* have happened if you had enabled the feature. -You may want to enable audit mode when testing how the features will work in your organization. Ensure it doesn't affect your line-of-business apps, and get an idea of how many suspicious file modification attempts generally occur over a certain period of time. +You may want to enable audit mode when testing how the features will work in your organization. This will help make sure your line-of-business apps aren't affected. You can also get an idea of how many suspicious file modification attempts occur over a certain period of time. The features won't block or prevent apps, scripts, or files from being modified. However, the Windows Event Log will record events as if the features were fully enabled. With audit mode, you can review the event log to see what impact the feature would have had if it was enabled. @@ -35,19 +35,17 @@ To find the audited entries, go to **Applications and Services** > **Microsoft** You can use Defender for Endpoint to get greater details for each event, especially for investigating attack surface reduction rules. Using the Defender for Endpoint console lets you [investigate issues as part of the alert timeline and investigation scenarios](../microsoft-defender-atp/investigate-alerts.md). -This article provides links that describe how to enable the audit functionality for each feature and how to view events in the Windows Event Viewer. - You can use Group Policy, PowerShell, and configuration service providers (CSPs) to enable audit mode. >[!TIP] >You can also visit the Windows Defender Testground website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the features are working and see how they work. - Audit options | How to enable audit mode | How to view events --|-|- -Audit applies to all events | [Enable controlled folder access](enable-controlled-folders.md) | [Controlled folder access events](evaluate-controlled-folder-access.md#review-controlled-folder-access-events-in-windows-event-viewer) -Audit applies to individual rules | [Enable attack surface reduction rules](enable-attack-surface-reduction.md) | [Attack surface reduction rule events](evaluate-attack-surface-reduction.md#review-attack-surface-reduction-events-in-windows-event-viewer) -Audit applies to all events | [Enable network protection](enable-network-protection.md) | [Network protection events](evaluate-network-protection.md#review-network-protection-events-in-windows-event-viewer) -|Audit applies to individual mitigations | [Enable exploit protection](enable-exploit-protection.md) | [Exploit protection events](exploit-protection.md#review-exploit-protection-events-in-windows-event-viewer) + **Audit options** | **How to enable audit mode** | **How to view events** +|---------|---------|---------| +| Audit applies to all events | [Enable controlled folder access](enable-controlled-folders.md) | [Controlled folder access events](evaluate-controlled-folder-access.md#review-controlled-folder-access-events-in-windows-event-viewer) +| Audit applies to individual rules | [Enable attack surface reduction rules](enable-attack-surface-reduction.md) | [Attack surface reduction rule events](evaluate-attack-surface-reduction.md#review-attack-surface-reduction-events-in-windows-event-viewer) +| Audit applies to all events | [Enable network protection](enable-network-protection.md) | [Network protection events](evaluate-network-protection.md#review-network-protection-events-in-windows-event-viewer) +| Audit applies to individual mitigations | [Enable exploit protection](enable-exploit-protection.md) | [Exploit protection events](exploit-protection.md#review-exploit-protection-events-in-windows-event-viewer) ## Related topics From 8408fc55c8c1daca13b2df3506797d2f9964b22a Mon Sep 17 00:00:00 2001 From: Bill Mcilhargey <19168174+computeronix@users.noreply.github.com> Date: Wed, 17 Feb 2021 11:57:28 -0500 Subject: [PATCH 139/161] Update windows/deployment/deploy-enterprise-licenses.md Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- windows/deployment/deploy-enterprise-licenses.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/deploy-enterprise-licenses.md b/windows/deployment/deploy-enterprise-licenses.md index 2b174292d3..71c908be85 100644 --- a/windows/deployment/deploy-enterprise-licenses.md +++ b/windows/deployment/deploy-enterprise-licenses.md @@ -24,7 +24,7 @@ This topic describes how to deploy Windows 10 Enterprise E3 or E5 licenses with >* Windows 10 Enterprise Subscription Activation (EA or MPSA) requires Windows 10 Pro, version 1703 or later. >* Windows 10 Enterprise E3 in CSP requires Windows 10 Pro, version 1607 or later. >* Automatic, non-KMS activation requires Windows 10, version 1803 or later, on a device with a firmware-embedded activation key. ->* Requires Windows 10 Enterprise per user licensing, does not work on per device licensing. +>* Windows 10 Enterprise Subscription Activation requires Windows 10 Enterprise per user licensing; it does not work on per device based licensing. >[!IMPORTANT] >An issue has been identified where devices can lose activation status or be blocked from upgrading to Windows Enterprise if the device is not able to connect to Windows Update. A workaround is to ensure that devices do not have the REG_DWORD present HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\DoNotConnectToWindowsUpdateInternetLocations and set to 1. If this REG_DWORD is present, it must be set to 0. From f132d9a9356bdfb8f26b000ef537762d96eb10af Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Wed, 17 Feb 2021 09:14:26 -0800 Subject: [PATCH 140/161] Update android-support-signin.md acrolinx --- .../android-support-signin.md | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/android-support-signin.md b/windows/security/threat-protection/microsoft-defender-atp/android-support-signin.md index ae0ecfba8d..9ec3031858 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/android-support-signin.md +++ b/windows/security/threat-protection/microsoft-defender-atp/android-support-signin.md @@ -30,9 +30,9 @@ ms.technology: mde - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) - [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804) -During onboarding, you might encounter sign in issues after the app is installed on your device. +When onboarding a device, you might see sign in issues after the app is installed. -This article provides solutions to address the sign on issues. +This article provides solutions to help address sign in issues. ## Sign in failed - unexpected error **Sign in failed:** *Unexpected error, try later* @@ -71,22 +71,22 @@ have a license for Microsoft 365 Enterprise subscription. Contact your administrator for help. -## Phishing pages are not blocked on specific OEM devices +## Phishing pages aren't blocked on some OEM devices **Applies to:** Specific OEMs only - **Xiaomi** -Phishing and harmful web connection threats detected by Defender for Endpoint -for Android are not blocked on some Xiaomi devices. The following functionality does not work on these devices. +Phishing and harmful web threats that are detected by Defender for Endpoint +for Android are not blocked on some Xiaomi devices. The following functionality doesn't work on these devices. ![Image of site reported unsafe](images/0c04975c74746a5cdb085e1d9386e713.png) **Cause:** -Xiaomi devices introduced a new permission that prevents Defender for Endpoint -for Android app from displaying pop-up windows while running in the background. +Xiaomi devices include a new permission model. This prevents Defender for Endpoint +for Android from displaying pop-up windows while it runs in the background. Xiaomi devices permission: "Display pop-up windows while running in the background." From efc8cf2042ca607c6dc658c038b90d3a138152dd Mon Sep 17 00:00:00 2001 From: Tina Burden Date: Wed, 17 Feb 2021 11:21:01 -0800 Subject: [PATCH 141/161] pencil edit --- .../microsoft-defender-atp/onboarding-notification.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/onboarding-notification.md b/windows/security/threat-protection/microsoft-defender-atp/onboarding-notification.md index 4f37d44693..1cdfe2f6b4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/onboarding-notification.md +++ b/windows/security/threat-protection/microsoft-defender-atp/onboarding-notification.md @@ -72,7 +72,7 @@ You'll need to have access to: - Audience: `https://securitycenter.onmicrosoft.com/windowsatpservice\` - Client ID: Sign-in to https://portal.azure.com and navigate to **Azure Active Directory > App Registrations** and get the Client ID value. - Credential Type: Select "Secret". - - Secret: Sign-in to https://portal.azure.com and navigate tnd navigate to **Azure Active Directory > App Registrations** and get the Tenant ID value. + - Secret: Sign-in to https://portal.azure.com and navigate to **Azure Active Directory > App Registrations** and get the Tenant ID value. ![Image of the HTTP conditions](images/http-conditions.png) From 6a506a5f7fa1a7867ad1d22a97a34212baae1ef8 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Wed, 17 Feb 2021 11:32:50 -0800 Subject: [PATCH 142/161] Update prevent-changes-to-security-settings-with-tamper-protection.md --- ...nges-to-security-settings-with-tamper-protection.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md index e7286a1d8b..daa0a27d8a 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md @@ -14,7 +14,7 @@ audience: ITPro author: denisebmsft ms.author: deniseb ms.custom: nextgen -ms.date: 02/16/2021 +ms.date: 02/17/2021 ms.technology: mde --- @@ -62,9 +62,9 @@ Tamper protection doesn't prevent you from viewing your security settings. And, | To perform this task... | See this section... | |:---|:---| | Turn tamper protection on (or off) for an individual device | [Manage tamper protection on an individual device](#manage-tamper-protection-on-an-individual-device) | -| Turn tamper protection on (or off) for all or part of your organization with Intune

Fine-tune tamper protection settings in your organization | [Manage tamper protection for your organization using Intune](#manage-tamper-protection-for-your-organization-using-intune) | -| Turn tamper protection on (or off) for your organization with Configuration Manager | [Manage tamper protection for your organization with Configuration Manager, version 2006](#manage-tamper-protection-for-your-organization-with-configuration-manager-version-2006) | -| Turn tamper protection on in the Microsoft Defender Security Center

Manage tamper protection across your tenant | [Manage tamper protection for your organization using the Microsoft Defender Security Center](#manage-tamper-protection-for-your-organization-using-the-microsoft-defender-security-center) | +| Turn tamper protection on (or off) for all or part of your organization using Intune

Fine-tune tamper protection settings in your organization | [Manage tamper protection for your organization using Intune](#manage-tamper-protection-for-your-organization-using-intune) | +| Turn tamper protection on (or off) for your organization with Configuration Manager | [Manage tamper protection for your organization using tenant attach with Configuration Manager, version 2006](#manage-tamper-protection-for-your-organization-with-configuration-manager-version-2006) | +| Turn tamper protection on (or off) in the Microsoft Defender Security Center

Manage tamper protection across your tenant

(Currently in preview) | [Manage tamper protection for your organization using the Microsoft Defender Security Center](#manage-tamper-protection-for-your-organization-using-the-microsoft-defender-security-center) | | View details about tampering attempts on devices | [View information about tampering attempts](#view-information-about-tampering-attempts) | | Review your security recommendations | [Review security recommendations](#review-your-security-recommendations) | | Review the list of frequently asked questions (FAQs) | [Browse the FAQs](#view-information-about-tampering-attempts) | @@ -150,7 +150,7 @@ See the following resources: Currently in preview, tamper protection can be turned on or off in the Microsoft Defender Security Center ([https://securitycenter.windows.com](https://securitycenter.windows.com)). Here are a few points to keep in mind: - When you use the Microsoft Defender Security Center to manage tamper protection, you do not have to use Intune or the tenant attach method. -- When you manage tamper protection in the Microsoft Defender Security Center, the setting is applied tenant wide, affecting all of your devices that are running Windows 10. To fine-tune tamper protection (such as having tamper protection on for some devices but off for others), use either [Intune](#manage-tamper-protection-for-your-organization-using-intune) or [Configuration Manager with tenant attach](#manage-tamper-protection-for-your-organization-with-configuration-manager-version-2006). +- When you manage tamper protection in the Microsoft Defender Security Center, the setting is applied tenant wide, affecting all of your devices that are running Windows 10, Windows Server 2016, or Windows Server 2019. To fine-tune tamper protection (such as having tamper protection on for some devices but off for others), use either [Intune](#manage-tamper-protection-for-your-organization-using-intune) or [Configuration Manager with tenant attach](#manage-tamper-protection-for-your-organization-with-configuration-manager-version-2006). - If you have a hybrid environment, tamper protection settings configured in Intune take precedence over settings configured in the Microsoft Defender Security Center. - Tamper protection is generally available; however, the ability to manage tamper protection in the Microsoft Defender Security Center is currently in preview. From ba213643462761d70269982a8dcdd6c5c931c25c Mon Sep 17 00:00:00 2001 From: julihooper <65675989+julihooper@users.noreply.github.com> Date: Wed, 17 Feb 2021 13:10:40 -0800 Subject: [PATCH 143/161] Update defender-csp.md --- windows/client-management/mdm/defender-csp.md | 11 +++++++++++ 1 file changed, 11 insertions(+) diff --git a/windows/client-management/mdm/defender-csp.md b/windows/client-management/mdm/defender-csp.md index 37205534c5..b30f0e06e5 100644 --- a/windows/client-management/mdm/defender-csp.md +++ b/windows/client-management/mdm/defender-csp.md @@ -410,6 +410,17 @@ Valid values are: - 1 – Enable. - 0 (default) – Disable. +**Configuration/DisableCpuThrottleOnIdleScans**
+Indicates whether the CPU will be throttled for scheduled scans while the device is idle. This feature is enabled by default and will not throttle the CPU for scheduled scans performed when the device is otherwise idle, regardless of what ScanAvgCPULoadFactor is set to. For all other scheduled scans this flag will have no impact and normal throttling will occur. + +The data type is integer. + +Supported operations are Add, Delete, Get, Replace. + +Valid values are: +- 1 – Enable. +- 0 (default) – Disable. + **Configuration/EnableFileHashComputation** Enables or disables file hash computation feature. When this feature is enabled Windows defender will compute hashes for files it scans. From 9276f0533836103dd52ca2a343a568bbb4520487 Mon Sep 17 00:00:00 2001 From: Tina Burden Date: Wed, 17 Feb 2021 14:04:21 -0800 Subject: [PATCH 144/161] PR #4777 warning fixes --- .../mdm/policy-csp-deviceinstallation.md | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-deviceinstallation.md b/windows/client-management/mdm/policy-csp-deviceinstallation.md index 16084a0b88..ba86d69fad 100644 --- a/windows/client-management/mdm/policy-csp-deviceinstallation.md +++ b/windows/client-management/mdm/policy-csp-deviceinstallation.md @@ -22,28 +22,28 @@ ms.localizationpriority: medium

- DeviceInstallation/AllowInstallationOfMatchingDeviceIDs + DeviceInstallation/AllowInstallationOfMatchingDeviceIDs
- DeviceInstallation/AllowInstallationOfMatchingDeviceInstanceIDs + DeviceInstallation/AllowInstallationOfMatchingDeviceInstanceIDs
- DeviceInstallation/AllowInstallationOfMatchingDeviceSetupClasses + DeviceInstallation/AllowInstallationOfMatchingDeviceSetupClasses
- DeviceInstallation/PreventDeviceMetadataFromNetwork + DeviceInstallation/PreventDeviceMetadataFromNetwork
- DeviceInstallation/PreventInstallationOfDevicesNotDescribedByOtherPolicySettings + DeviceInstallation/PreventInstallationOfDevicesNotDescribedByOtherPolicySettings
- DeviceInstallation/PreventInstallationOfMatchingDeviceIDs + DeviceInstallation/PreventInstallationOfMatchingDeviceIDs
- DeviceInstallation/PreventInstallationOfMatchingDeviceInstanceIDs + DeviceInstallation/PreventInstallationOfMatchingDeviceInstanceIDs
- DeviceInstallation/PreventInstallationOfMatchingDeviceSetupClasses + DeviceInstallation/PreventInstallationOfMatchingDeviceSetupClasses
From c326abae4e0079e69261b42507db8abfa50096f4 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 17 Feb 2021 14:21:14 -0800 Subject: [PATCH 145/161] update note --- .../microsoft-defender-atp/minimum-requirements.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements.md b/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements.md index 2fef800643..13cbda189c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements.md +++ b/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements.md @@ -107,11 +107,11 @@ Devices on your network must be running one of these editions. The hardware requirements for Defender for Endpoint on devices are the same for the supported editions. > [!NOTE] -> Machines running mobile versions of Windows are not supported. +> Machines running mobile versions of Windows (such as Windows CE and Windows 10 Mobile) are not supported. > -> Virtual Machines running Windows 10 Enterprise 2016 LTSB (which is based on Windows 10, version 1607) may encounter performance issues if run on non-Microsoft virtualization platforms. +> Virtual Machines running Windows 10 Enterprise 2016 LTSB may encounter performance issues if run on non-Microsoft virtualization platforms. > -> For virtual environments, we recommend using Windows 10 Enterprise LTSC 2019 (which is based on Windows 10, version 1809) or later. +> For virtual environments, we recommend using Windows 10 Enterprise LTSC 2019 or later. ### Other supported operating systems From 19464d307109461dd7ff6e19dae17a0a4ace3f9a Mon Sep 17 00:00:00 2001 From: Tina Burden Date: Wed, 17 Feb 2021 14:23:11 -0800 Subject: [PATCH 146/161] PR #4777 warning fixes --- .../mdm/new-in-windows-mdm-enrollment-management.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index 15c29f831f..e6dc9c5ed6 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -49,7 +49,7 @@ For details about Microsoft mobile device management protocols for Windows 10 s | New or updated article | Description | |-----|-----| -|[Policy CSP](policy-configuration-service-provider.md) | Added the following new policies in Windows 10, version 1903:
- [DeliveryOptimization/DODelayCacheServerFallbackBackground](policy-csp-deliveryoptimization.md#deliveryoptimization-dodelaycacheserverfallbackbackground)
- [DeliveryOptimization/DODelayCacheServerFallbackForeground](policy-csp-deliveryoptimization.md#deliveryoptimization-dodelaycacheserverfallbackforeground)
- [DeviceHealthMonitoring/AllowDeviceHealthMonitoring](policy-csp-devicehealthmonitoring.md#devicehealthmonitoring-allowdevicehealthmonitoring)
- [DeviceHealthMonitoring/ConfigDeviceHealthMonitoringScope](policy-csp-devicehealthmonitoring.md#devicehealthmonitoring-configdevicehealthmonitoringscope)
- [DeviceHealthMonitoring/ConfigDeviceHealthMonitoringUploadDestination](policy-csp-devicehealthmonitoring.md#devicehealthmonitoring-configdevicehealthmonitoringuploaddestination)
- [DeviceInstallation/AllowInstallationOfMatchingDeviceInstanceIDs](policy-csp-deviceinstallation.md#deviceinstallation-allowinstallationofmatchingdeviceinstanceids)
- [DeviceInstallation/PreventInstallationOfMatchingDeviceInstanceIDs](policy-csp-deviceinstallation.md#deviceinstallation-preventinstallationofmatchingdeviceinstanceids)
- [Experience/ShowLockOnUserTile](policy-csp-experience.md#experience-showlockonusertile)
- [InternetExplorer/AllowEnhancedSuggestionsInAddressBar](policy-csp-internetexplorer.md#internetexplorer-allowenhancedsuggestionsinaddressbar)
- [InternetExplorer/DisableActiveXVersionListAutoDownload](policy-csp-internetexplorer.md#internetexplorer-disableactivexversionlistautodownload)
- [InternetExplorer/DisableCompatView](policy-csp-internetexplorer.md#internetexplorer-disablecompatview)
- [InternetExplorer/DisableFeedsBackgroundSync](policy-csp-internetexplorer.md#internetexplorer-disablefeedsbackgroundsync)
- [InternetExplorer/DisableGeolocation](policy-csp-internetexplorer.md#internetexplorer-disablegeolocation)
- [InternetExplorer/DisableWebAddressAutoComplete](policy-csp-internetexplorer.md#internetexplorer-disablewebaddressautocomplete)
- [InternetExplorer/NewTabDefaultPage](policy-csp-internetexplorer.md#internetexplorer-newtabdefaultpage)
- [Power/EnergySaverBatteryThresholdOnBattery](policy-csp-power.md#power-energysaverbatterythresholdonbattery)
- [Power/EnergySaverBatteryThresholdPluggedIn](policy-csp-power.md#power-energysaverbatterythresholdpluggedin)
- [Power/SelectLidCloseActionOnBattery](policy-csp-power.md#power-selectlidcloseactiononbattery)
- [Power/SelectLidCloseActionPluggedIn](policy-csp-power.md#power-selectlidcloseactionpluggedin)
- [Power/SelectPowerButtonActionOnBattery](policy-csp-power.md#power-selectpowerbuttonactiononbattery)
- [Power/SelectPowerButtonActionPluggedIn](policy-csp-power.md#power-selectpowerbuttonactionpluggedin)
- [Power/SelectSleepButtonActionOnBattery](policy-csp-power.md#power-selectsleepbuttonactiononbattery)
- [Power/SelectSleepButtonActionPluggedIn](policy-csp-power.md#power-selectsleepbuttonactionpluggedin)
- [Power/TurnOffHybridSleepOnBattery](policy-csp-power.md#power-turnoffhybridsleeponbattery)
- [Power/TurnOffHybridSleepPluggedIn](policy-csp-power.md#power-turnoffhybridsleeppluggedin)
- [Power/UnattendedSleepTimeoutOnBattery](policy-csp-power.md#power-unattendedsleeptimeoutonbattery)
- [Power/UnattendedSleepTimeoutPluggedIn](policy-csp-power.md#power-unattendedsleeptimeoutpluggedin)
- [Privacy/LetAppsActivateWithVoice](policy-csp-privacy.md#privacy-letappsactivatewithvoice)
- [Privacy/LetAppsActivateWithVoiceAboveLock](policy-csp-privacy.md#privacy-letappsactivatewithvoiceabovelock)
- [Search/AllowFindMyFiles](policy-csp-search.md#search-allowfindmyfiles)
- [ServiceControlManager/SvchostProcessMitigation](policy-csp-servicecontrolmanager.md#servicecontrolmanager-svchostprocessmitigation)
- [System/AllowCommercialDataPipeline](policy-csp-system.md#system-allowcommercialdatapipeline)
- [System/TurnOffFileHistory](policy-csp-system.md#system-turnofffilehistory)
- [TimeLanguageSettings/ConfigureTimeZone](policy-csp-timelanguagesettings.md#timelanguagesettings-configuretimezone)
- [Troubleshooting/AllowRecommendations](policy-csp-troubleshooting.md#troubleshooting-allowrecommendations)
- [Update/AutomaticMaintenanceWakeUp](policy-csp-update.md#update-automaticmaintenancewakeup)
- [Update/ConfigureDeadlineForFeatureUpdates](policy-csp-update.md#update-configuredeadlineforfeatureupdates)
- [Update/ConfigureDeadlineForQualityUpdates](policy-csp-update.md#update-configuredeadlineforqualityupdates)
- [Update/ConfigureDeadlineGracePeriod](policy-csp-update.md#update-configuredeadlinegraceperiod)
- [WindowsLogon/AllowAutomaticRestartSignOn](policy-csp-windowslogon.md#windowslogon-allowautomaticrestartsignon)
- [WindowsLogon/ConfigAutomaticRestartSignOn](policy-csp-windowslogon.md#windowslogon-configautomaticrestartsignon)
- [WindowsLogon/EnableFirstLogonAnimation](policy-csp-windowslogon.md#windowslogon-enablefirstlogonanimation)| +|[Policy CSP](policy-configuration-service-provider.md) | Added the following new policies in Windows 10, version 1903:
- [DeliveryOptimization/DODelayCacheServerFallbackBackground](policy-csp-deliveryoptimization.md#deliveryoptimization-dodelaycacheserverfallbackbackground)
- [DeliveryOptimization/DODelayCacheServerFallbackForeground](policy-csp-deliveryoptimization.md#deliveryoptimization-dodelaycacheserverfallbackforeground)
- [DeviceHealthMonitoring/AllowDeviceHealthMonitoring](policy-csp-devicehealthmonitoring.md#devicehealthmonitoring-allowdevicehealthmonitoring)
- [DeviceHealthMonitoring/ConfigDeviceHealthMonitoringScope](policy-csp-devicehealthmonitoring.md#devicehealthmonitoring-configdevicehealthmonitoringscope)
- [DeviceHealthMonitoring/ConfigDeviceHealthMonitoringUploadDestination](policy-csp-devicehealthmonitoring.md#devicehealthmonitoring-configdevicehealthmonitoringuploaddestination)
- [DeviceInstallation/AllowInstallationOfMatchingDeviceInstanceIDs](policy-csp-deviceinstallation.md#deviceinstallationallowinstallationofmatchingdeviceinstanceids)
- [DeviceInstallation/PreventInstallationOfMatchingDeviceInstanceIDs](policy-csp-deviceinstallation.md#deviceinstallationpreventinstallationofmatchingdeviceinstanceids)
- [Experience/ShowLockOnUserTile](policy-csp-experience.md#experience-showlockonusertile)
- [InternetExplorer/AllowEnhancedSuggestionsInAddressBar](policy-csp-internetexplorer.md#internetexplorer-allowenhancedsuggestionsinaddressbar)
- [InternetExplorer/DisableActiveXVersionListAutoDownload](policy-csp-internetexplorer.md#internetexplorer-disableactivexversionlistautodownload)
- [InternetExplorer/DisableCompatView](policy-csp-internetexplorer.md#internetexplorer-disablecompatview)
- [InternetExplorer/DisableFeedsBackgroundSync](policy-csp-internetexplorer.md#internetexplorer-disablefeedsbackgroundsync)
- [InternetExplorer/DisableGeolocation](policy-csp-internetexplorer.md#internetexplorer-disablegeolocation)
- [InternetExplorer/DisableWebAddressAutoComplete](policy-csp-internetexplorer.md#internetexplorer-disablewebaddressautocomplete)
- [InternetExplorer/NewTabDefaultPage](policy-csp-internetexplorer.md#internetexplorer-newtabdefaultpage)
- [Power/EnergySaverBatteryThresholdOnBattery](policy-csp-power.md#power-energysaverbatterythresholdonbattery)
- [Power/EnergySaverBatteryThresholdPluggedIn](policy-csp-power.md#power-energysaverbatterythresholdpluggedin)
- [Power/SelectLidCloseActionOnBattery](policy-csp-power.md#power-selectlidcloseactiononbattery)
- [Power/SelectLidCloseActionPluggedIn](policy-csp-power.md#power-selectlidcloseactionpluggedin)
- [Power/SelectPowerButtonActionOnBattery](policy-csp-power.md#power-selectpowerbuttonactiononbattery)
- [Power/SelectPowerButtonActionPluggedIn](policy-csp-power.md#power-selectpowerbuttonactionpluggedin)
- [Power/SelectSleepButtonActionOnBattery](policy-csp-power.md#power-selectsleepbuttonactiononbattery)
- [Power/SelectSleepButtonActionPluggedIn](policy-csp-power.md#power-selectsleepbuttonactionpluggedin)
- [Power/TurnOffHybridSleepOnBattery](policy-csp-power.md#power-turnoffhybridsleeponbattery)
- [Power/TurnOffHybridSleepPluggedIn](policy-csp-power.md#power-turnoffhybridsleeppluggedin)
- [Power/UnattendedSleepTimeoutOnBattery](policy-csp-power.md#power-unattendedsleeptimeoutonbattery)
- [Power/UnattendedSleepTimeoutPluggedIn](policy-csp-power.md#power-unattendedsleeptimeoutpluggedin)
- [Privacy/LetAppsActivateWithVoice](policy-csp-privacy.md#privacy-letappsactivatewithvoice)
- [Privacy/LetAppsActivateWithVoiceAboveLock](policy-csp-privacy.md#privacy-letappsactivatewithvoiceabovelock)
- [Search/AllowFindMyFiles](policy-csp-search.md#search-allowfindmyfiles)
- [ServiceControlManager/SvchostProcessMitigation](policy-csp-servicecontrolmanager.md#servicecontrolmanager-svchostprocessmitigation)
- [System/AllowCommercialDataPipeline](policy-csp-system.md#system-allowcommercialdatapipeline)
- [System/TurnOffFileHistory](policy-csp-system.md#system-turnofffilehistory)
- [TimeLanguageSettings/ConfigureTimeZone](policy-csp-timelanguagesettings.md#timelanguagesettings-configuretimezone)
- [Troubleshooting/AllowRecommendations](policy-csp-troubleshooting.md#troubleshooting-allowrecommendations)
- [Update/AutomaticMaintenanceWakeUp](policy-csp-update.md#update-automaticmaintenancewakeup)
- [Update/ConfigureDeadlineForFeatureUpdates](policy-csp-update.md#update-configuredeadlineforfeatureupdates)
- [Update/ConfigureDeadlineForQualityUpdates](policy-csp-update.md#update-configuredeadlineforqualityupdates)
- [Update/ConfigureDeadlineGracePeriod](policy-csp-update.md#update-configuredeadlinegraceperiod)
- [WindowsLogon/AllowAutomaticRestartSignOn](policy-csp-windowslogon.md#windowslogon-allowautomaticrestartsignon)
- [WindowsLogon/ConfigAutomaticRestartSignOn](policy-csp-windowslogon.md#windowslogon-configautomaticrestartsignon)
- [WindowsLogon/EnableFirstLogonAnimation](policy-csp-windowslogon.md#windowslogon-enablefirstlogonanimation)| | [Policy CSP - Audit](policy-csp-audit.md) | Added the new Audit policy CSP. | | [ApplicationControl CSP](applicationcontrol-csp.md) | Added the new CSP. | | [Defender CSP](defender-csp.md) | Added the following new nodes:
- Health/TamperProtectionEnabled
- Health/IsVirtualMachine
- Configuration
- Configuration/TamperProtection
- Configuration/EnableFileHashComputation | From 5641b13611a1ebedd24bf359aad85a2f826c2bc7 Mon Sep 17 00:00:00 2001 From: Tina Burden Date: Wed, 17 Feb 2021 14:28:31 -0800 Subject: [PATCH 147/161] PR #4777 warnings fixes --- .../mdm/policies-in-policy-csp-admx-backed.md | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/windows/client-management/mdm/policies-in-policy-csp-admx-backed.md b/windows/client-management/mdm/policies-in-policy-csp-admx-backed.md index c6e37891f5..a93f4e23d3 100644 --- a/windows/client-management/mdm/policies-in-policy-csp-admx-backed.md +++ b/windows/client-management/mdm/policies-in-policy-csp-admx-backed.md @@ -1392,12 +1392,12 @@ ms.date: 10/08/2020 - [DeliveryOptimization/DOSetHoursToLimitBackgroundDownloadBandwidth](./policy-csp-deliveryoptimization.md#deliveryoptimization-dosethourstolimitbackgrounddownloadbandwidth) - [DeliveryOptimization/DOSetHoursToLimitForegroundDownloadBandwidth](./policy-csp-deliveryoptimization.md#deliveryoptimization-dosethourstolimitforegrounddownloadbandwidth) - [Desktop/PreventUserRedirectionOfProfileFolders](./policy-csp-desktop.md#desktop-preventuserredirectionofprofilefolders) -- [DeviceInstallation/AllowInstallationOfMatchingDeviceIDs](./policy-csp-deviceinstallation.md#deviceinstallation-allowinstallationofmatchingdeviceids) -- [DeviceInstallation/AllowInstallationOfMatchingDeviceSetupClasses](./policy-csp-deviceinstallation.md#deviceinstallation-allowinstallationofmatchingdevicesetupclasses) -- [DeviceInstallation/PreventDeviceMetadataFromNetwork](./policy-csp-deviceinstallation.md#deviceinstallation-preventdevicemetadatafromnetwork) -- [DeviceInstallation/PreventInstallationOfDevicesNotDescribedByOtherPolicySettings](./policy-csp-deviceinstallation.md#deviceinstallation-preventinstallationofdevicesnotdescribedbyotherpolicysettings) -- [DeviceInstallation/PreventInstallationOfMatchingDeviceIDs](./policy-csp-deviceinstallation.md#deviceinstallation-preventinstallationofmatchingdeviceids) -- [DeviceInstallation/PreventInstallationOfMatchingDeviceSetupClasses](./policy-csp-deviceinstallation.md#deviceinstallation-preventinstallationofmatchingdevicesetupclasses) +- [DeviceInstallation/AllowInstallationOfMatchingDeviceIDs](./policy-csp-deviceinstallation.md#deviceinstallationallowinstallationofmatchingdeviceids) +- [DeviceInstallation/AllowInstallationOfMatchingDeviceSetupClasses](./policy-csp-deviceinstallation.md#deviceinstallationallowinstallationofmatchingdevicesetupclasses) +- [DeviceInstallation/PreventDeviceMetadataFromNetwork](./policy-csp-deviceinstallation.md#deviceinstallationpreventdevicemetadatafromnetwork) +- [DeviceInstallation/PreventInstallationOfDevicesNotDescribedByOtherPolicySettings](./policy-csp-deviceinstallation.md#deviceinstallationpreventinstallationofdevicesnotdescribedbyotherpolicysettings) +- [DeviceInstallation/PreventInstallationOfMatchingDeviceIDs](./policy-csp-deviceinstallation.md#deviceinstallationpreventinstallationofmatchingdeviceids) +- [DeviceInstallation/PreventInstallationOfMatchingDeviceSetupClasses](./policy-csp-deviceinstallation.md#deviceinstallationpreventinstallationofmatchingdevicesetupclasses) - [DeviceLock/PreventEnablingLockScreenCamera](./policy-csp-devicelock.md#devicelock-preventenablinglockscreencamera) - [DeviceLock/PreventLockScreenSlideShow](./policy-csp-devicelock.md#devicelock-preventlockscreenslideshow) - [ErrorReporting/CustomizeConsentSettings](./policy-csp-errorreporting.md#errorreporting-customizeconsentsettings) From 1246c1d01884c2dee8d4ea30f1a23137f92c5e2f Mon Sep 17 00:00:00 2001 From: Tina Burden Date: Wed, 17 Feb 2021 14:34:53 -0800 Subject: [PATCH 148/161] PR #4777 warnings fixes --- ...licies-in-policy-csp-supported-by-group-policy.md | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/windows/client-management/mdm/policies-in-policy-csp-supported-by-group-policy.md b/windows/client-management/mdm/policies-in-policy-csp-supported-by-group-policy.md index 82ebb94a80..e633560ef3 100644 --- a/windows/client-management/mdm/policies-in-policy-csp-supported-by-group-policy.md +++ b/windows/client-management/mdm/policies-in-policy-csp-supported-by-group-policy.md @@ -220,12 +220,12 @@ ms.date: 07/18/2019 - [DeviceGuard/EnableVirtualizationBasedSecurity](./policy-csp-deviceguard.md#deviceguard-enablevirtualizationbasedsecurity) - [DeviceGuard/LsaCfgFlags](./policy-csp-deviceguard.md#deviceguard-lsacfgflags) - [DeviceGuard/RequirePlatformSecurityFeatures](./policy-csp-deviceguard.md#deviceguard-requireplatformsecurityfeatures) -- [DeviceInstallation/AllowInstallationOfMatchingDeviceIDs](./policy-csp-deviceinstallation.md#deviceinstallation-allowinstallationofmatchingdeviceids) -- [DeviceInstallation/AllowInstallationOfMatchingDeviceSetupClasses](./policy-csp-deviceinstallation.md#deviceinstallation-allowinstallationofmatchingdevicesetupclasses) -- [DeviceInstallation/PreventDeviceMetadataFromNetwork](./policy-csp-deviceinstallation.md#deviceinstallation-preventdevicemetadatafromnetwork) -- [DeviceInstallation/PreventInstallationOfDevicesNotDescribedByOtherPolicySettings](./policy-csp-deviceinstallation.md#deviceinstallation-preventinstallationofdevicesnotdescribedbyotherpolicysettings) -- [DeviceInstallation/PreventInstallationOfMatchingDeviceIDs](./policy-csp-deviceinstallation.md#deviceinstallation-preventinstallationofmatchingdeviceids) -- [DeviceInstallation/PreventInstallationOfMatchingDeviceSetupClasses](./policy-csp-deviceinstallation.md#deviceinstallation-preventinstallationofmatchingdevicesetupclasses) +- [DeviceInstallation/AllowInstallationOfMatchingDeviceIDs](./policy-csp-deviceinstallation.md#deviceinstallationallowinstallationofmatchingdeviceids) +- [DeviceInstallation/AllowInstallationOfMatchingDeviceSetupClasses](./policy-csp-deviceinstallation.md#deviceinstallationallowinstallationofmatchingdevicesetupclasses) +- [DeviceInstallation/PreventDeviceMetadataFromNetwork](./policy-csp-deviceinstallation.md#deviceinstallationpreventdevicemetadatafromnetwork) +- [DeviceInstallation/PreventInstallationOfDevicesNotDescribedByOtherPolicySettings](./policy-csp-deviceinstallation.md#deviceinstallationpreventinstallationofdevicesnotdescribedbyotherpolicysettings) +- [DeviceInstallation/PreventInstallationOfMatchingDeviceIDs](./policy-csp-deviceinstallation.md#deviceinstallationpreventinstallationofmatchingdeviceids) +- [DeviceInstallation/PreventInstallationOfMatchingDeviceSetupClasses](./policy-csp-deviceinstallation.md#deviceinstallationpreventinstallationofmatchingdevicesetupclasses) - [DeviceLock/MinimumPasswordAge](./policy-csp-devicelock.md#devicelock-minimumpasswordage) - [DeviceLock/PreventEnablingLockScreenCamera](./policy-csp-devicelock.md#devicelock-preventenablinglockscreencamera) - [DeviceLock/PreventLockScreenSlideShow](./policy-csp-devicelock.md#devicelock-preventlockscreenslideshow) From ae0b4b5720810de6fb7f029f5fa7b7b5780e7646 Mon Sep 17 00:00:00 2001 From: Tina Burden Date: Wed, 17 Feb 2021 14:44:29 -0800 Subject: [PATCH 149/161] PR #4777 warnings fixes --- .../mdm/policy-configuration-service-provider.md | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index 70fdf7d6d4..5056143d53 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -5655,28 +5655,28 @@ The following diagram shows the Policy configuration service provider in tree fo
- DeviceInstallation/AllowInstallationOfMatchingDeviceIDs + DeviceInstallation/AllowInstallationOfMatchingDeviceIDs
- DeviceInstallation/AllowInstallationOfMatchingDeviceSetupClasses + DeviceInstallation/AllowInstallationOfMatchingDeviceSetupClasses
- DeviceInstallation/AllowInstallationOfMatchingDeviceInstanceIDs + DeviceInstallation/AllowInstallationOfMatchingDeviceInstanceIDs
- DeviceInstallation/PreventDeviceMetadataFromNetwork + DeviceInstallation/PreventDeviceMetadataFromNetwork
- DeviceInstallation/PreventInstallationOfDevicesNotDescribedByOtherPolicySettings + DeviceInstallation/PreventInstallationOfDevicesNotDescribedByOtherPolicySettings
- DeviceInstallation/PreventInstallationOfMatchingDeviceIDs + DeviceInstallation/PreventInstallationOfMatchingDeviceIDs
- DeviceInstallation/PreventInstallationOfMatchingDeviceInstanceIDs + DeviceInstallation/PreventInstallationOfMatchingDeviceInstanceIDs
- DeviceInstallation/PreventInstallationOfMatchingDeviceSetupClasses + DeviceInstallation/PreventInstallationOfMatchingDeviceSetupClasses
From 4d20ee8f677958c46e1194d1992fbfdb5fdfab2f Mon Sep 17 00:00:00 2001 From: Tina Burden Date: Wed, 17 Feb 2021 14:51:09 -0800 Subject: [PATCH 150/161] pencil edit --- .../microsoft-defender-atp/partner-applications.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/partner-applications.md b/windows/security/threat-protection/microsoft-defender-atp/partner-applications.md index f253842794..998b06013b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/partner-applications.md +++ b/windows/security/threat-protection/microsoft-defender-atp/partner-applications.md @@ -141,7 +141,7 @@ External alerts can be pushed to Defender for Endpoint. These alerts are shown s You can use threat-intelligence from providers and aggregators to maintain and use indicators of compromise (IOCs). -Defender for Endpoint allows you to integrate with these solutions and act on IoCs by correlating rich telemetry to create alerts. You can also useg prevention and automated response capabilities to block execution and take remediation actions when there's a match. +Defender for Endpoint allows you to integrate with these solutions and act on IoCs by correlating rich telemetry to create alerts. You can also use prevention and automated response capabilities to block execution and take remediation actions when there's a match. Defender for Endpoint currently supports IOC matching and remediation for file and network indicators. Blocking is supported for file indicators. From a8e0501663e1eac62d50b0159750aab1a21620d6 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 17 Feb 2021 15:00:33 -0800 Subject: [PATCH 151/161] remove note add commads --- .../configure-endpoints-vdi.md | 24 ++++++++++++------- 1 file changed, 16 insertions(+), 8 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md index 766b0d8fcf..1e4a2f4440 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md @@ -33,15 +33,8 @@ ms.technology: mde ## Onboard non-persistent virtual desktop infrastructure (VDI) devices -[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - - Defender for Endpoint supports non-persistent VDI session onboarding. ->[!Note] ->To onboard non-persistent VDI sessions, VDI devices must be Windows 10 or Windows Server 2019. -> ->While other Windows versions might work, only Windows 10 and Windows Server 2019 are supported. There might be associated challenges when onboarding VDIs. The following are typical challenges for this scenario: @@ -114,7 +107,22 @@ The following steps will guide you through onboarding VDI devices and will highl ## For downlevel SKUs -1. Set registry value 'HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection\DeviceTagging|VDI’ to “NonPersistent' + +> [!NOTE] +> The following registry is relevant only when the aim is to achieve a 'Single entry for each device'. + +1. Set registry value to: + + ```reg + [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection\DeviceTagging] + "VDI"="NonPersistent" + ``` + + or using command line: + + ``` + reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection\DeviceTagging" /v VDI /t REG_SZ /d "NonPersistent" /f + ``` 2. Follow the [server onboarding process](configure-server-endpoints.md#windows-server-2008-r2-sp1-windows-server-2012-r2-and-windows-server-2016). From 225530b21dd295641b81f51261a5a4541e0620cc Mon Sep 17 00:00:00 2001 From: Tina Burden Date: Wed, 17 Feb 2021 15:04:43 -0800 Subject: [PATCH 152/161] pencil edits --- .../mdm/policy-csp-localusersandgroups.md | 17 +++++++++-------- 1 file changed, 9 insertions(+), 8 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-localusersandgroups.md b/windows/client-management/mdm/policy-csp-localusersandgroups.md index d898c1a985..c320a8134e 100644 --- a/windows/client-management/mdm/policy-csp-localusersandgroups.md +++ b/windows/client-management/mdm/policy-csp-localusersandgroups.md @@ -177,14 +177,15 @@ The following example shows how you can update a local group (**Administrators** > [!NOTE] > -When AAD group SID’s are added to local groups, during AAD account logon privileges are evaluated only for the following well-known groups on a Windows 10 device: - -- Administrators -- Users -- Guests -- Power Users -- Remote Desktop Users -- Remote Management Users +> When AAD group SID’s are added to local groups, during AAD account logon privileges are evaluated only for the following well-known groups on a Windows 10 device: +> +> - Administrators +> - Users +> - Guests +> - Power Users +> - Remote Desktop Users +> - Remote Management Users + ## FAQs This section provides answers to some common questions you might have about the LocalUsersAndGroups policy CSP. From a285aebf7a99eb1dbfea4a7c4ed9ff9c21c69da8 Mon Sep 17 00:00:00 2001 From: Beth Woodbury <40870842+levinec@users.noreply.github.com> Date: Wed, 17 Feb 2021 15:14:05 -0800 Subject: [PATCH 153/161] Revert "Update defender-csp.md" --- windows/client-management/mdm/defender-csp.md | 11 ----------- 1 file changed, 11 deletions(-) diff --git a/windows/client-management/mdm/defender-csp.md b/windows/client-management/mdm/defender-csp.md index b30f0e06e5..37205534c5 100644 --- a/windows/client-management/mdm/defender-csp.md +++ b/windows/client-management/mdm/defender-csp.md @@ -410,17 +410,6 @@ Valid values are: - 1 – Enable. - 0 (default) – Disable. -**Configuration/DisableCpuThrottleOnIdleScans**
-Indicates whether the CPU will be throttled for scheduled scans while the device is idle. This feature is enabled by default and will not throttle the CPU for scheduled scans performed when the device is otherwise idle, regardless of what ScanAvgCPULoadFactor is set to. For all other scheduled scans this flag will have no impact and normal throttling will occur. - -The data type is integer. - -Supported operations are Add, Delete, Get, Replace. - -Valid values are: -- 1 – Enable. -- 0 (default) – Disable. - **Configuration/EnableFileHashComputation** Enables or disables file hash computation feature. When this feature is enabled Windows defender will compute hashes for files it scans. From 8a982c2744acf952a26ad9ca110529dbbf70f30e Mon Sep 17 00:00:00 2001 From: Beth Woodbury <40870842+levinec@users.noreply.github.com> Date: Wed, 17 Feb 2021 15:16:52 -0800 Subject: [PATCH 154/161] Update defender-csp.md --- windows/client-management/mdm/defender-csp.md | 11 +++++++++++ 1 file changed, 11 insertions(+) diff --git a/windows/client-management/mdm/defender-csp.md b/windows/client-management/mdm/defender-csp.md index 37205534c5..b14b5c6f3c 100644 --- a/windows/client-management/mdm/defender-csp.md +++ b/windows/client-management/mdm/defender-csp.md @@ -410,6 +410,17 @@ Valid values are: - 1 – Enable. - 0 (default) – Disable. +**Configuration/DisableCpuThrottleOnIdleScans**
+Indicates whether the CPU will be throttled for scheduled scans while the device is idle. This feature is enabled by default and will not throttle the CPU for scheduled scans performed when the device is otherwise idle, regardless of what ScanAvgCPULoadFactor is set to. For all other scheduled scans this flag will have no impact and normal throttling will occur. + +The data type is integer. + +Supported operations are Add, Delete, Get, Replace. + +Valid values are: +- 1 – Enable. +- 0 (default) – Disable. + **Configuration/EnableFileHashComputation** Enables or disables file hash computation feature. When this feature is enabled Windows defender will compute hashes for files it scans. From 17681f4d35dae428025d0dc6b066795835f233ce Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 17 Feb 2021 15:23:49 -0800 Subject: [PATCH 155/161] vdi note --- .../threat-protection/microsoft-defender-atp/machine-tags.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/machine-tags.md b/windows/security/threat-protection/microsoft-defender-atp/machine-tags.md index 1fabec8569..33158122e0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/machine-tags.md +++ b/windows/security/threat-protection/microsoft-defender-atp/machine-tags.md @@ -63,7 +63,7 @@ Tags are added to the device view and will also be reflected on the **Devices li >[!NOTE] > Filtering might not work on tag names that contain parenthesis.
-> Filtering will only find portal set tags. +> When you create a new tag, a list of existing tags are displayed. The list only shows tags created through the portal. Existing tags created from client devices will not be displayed. You can also delete tags from this view. From 067e2d38df55b414d2920b53a4ccbd2335772e72 Mon Sep 17 00:00:00 2001 From: Beth Woodbury <40870842+levinec@users.noreply.github.com> Date: Wed, 17 Feb 2021 15:28:27 -0800 Subject: [PATCH 156/161] Update defender-csp.md --- windows/client-management/mdm/defender-csp.md | 29 +++++++++++++++++++ 1 file changed, 29 insertions(+) diff --git a/windows/client-management/mdm/defender-csp.md b/windows/client-management/mdm/defender-csp.md index b14b5c6f3c..5ce73b24b6 100644 --- a/windows/client-management/mdm/defender-csp.md +++ b/windows/client-management/mdm/defender-csp.md @@ -421,6 +421,35 @@ Valid values are: - 1 – Enable. - 0 (default) – Disable. +**Configuration/MeteredConnectionUpdates**
+Allow managed devices to update through metered connections. Data charges may apply. + +The data type is integer. + +Supported operations are Add, Delete, Get, Replace. + +Valid values are: +- 1 – Enable. +- 0 (default) – Disable. + +**Configuration/AllowNetworkProtectionOnWinServer**
+This settings controls whether Network Protection is allowed to be configured into block or audit mode on Windows Server. If false, the value of EnableNetworkProtection will be ignored. + +The data type is integer. + +Supported operations are Add, Delete, Get, Replace. + +Valid values are: +- 1 – Enable. +- 0 (default) – Disable. + +**Configuration/ExclusionIpAddress**
+Allows an administrator to explicitly disable network packet inspection made by wdnisdrv on a particular set of IP addresses. + +The data type is string. + +Supported operations are Add, Delete, Get, Replace. + **Configuration/EnableFileHashComputation** Enables or disables file hash computation feature. When this feature is enabled Windows defender will compute hashes for files it scans. From 8bdeba8cf52c62db1ec15d0895ed382dd0cd77e8 Mon Sep 17 00:00:00 2001 From: Beth Woodbury <40870842+levinec@users.noreply.github.com> Date: Wed, 17 Feb 2021 15:34:21 -0800 Subject: [PATCH 157/161] Update defender-csp.md --- windows/client-management/mdm/defender-csp.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/defender-csp.md b/windows/client-management/mdm/defender-csp.md index 5ce73b24b6..040bf33710 100644 --- a/windows/client-management/mdm/defender-csp.md +++ b/windows/client-management/mdm/defender-csp.md @@ -432,7 +432,7 @@ Valid values are: - 1 – Enable. - 0 (default) – Disable. -**Configuration/AllowNetworkProtectionOnWinServer**
+**Configuration/AllowNetworkProtectionOnWinServer**
This settings controls whether Network Protection is allowed to be configured into block or audit mode on Windows Server. If false, the value of EnableNetworkProtection will be ignored. The data type is integer. From fd86e0e22bdb2ca350866afa13b2edac76527013 Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Wed, 17 Feb 2021 17:50:29 -0800 Subject: [PATCH 158/161] acrolinx --- .../evaluate-exploit-protection.md | 34 +++++++++---------- .../exposed-apis-odata-samples.md | 6 ++-- 2 files changed, 20 insertions(+), 20 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/evaluate-exploit-protection.md b/windows/security/threat-protection/microsoft-defender-atp/evaluate-exploit-protection.md index 906e5e1bc9..158be3a882 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/evaluate-exploit-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/evaluate-exploit-protection.md @@ -1,5 +1,5 @@ --- -title: See how exploit protection works in a demo +title: See how Exploit protection works in a demo description: See how exploit protection can prevent suspicious behaviors from occurring on specific apps. keywords: Exploit protection, exploits, kernel, events, evaluate, demo, try, mitigation search.product: eADQiWindows 10XVcnh @@ -30,29 +30,29 @@ ms.technology: mde [Exploit protection](exploit-protection.md) helps protect devices from malware that uses exploits to spread and infect other devices. Mitigation can be applied to either the operating system or to an individual app. Many of the features that were part of the Enhanced Mitigation Experience Toolkit (EMET) are included in exploit protection. (The EMET has reached its end of support.) -This article helps you enable exploit protection in audit mode and review related events in Event Viewer. You can enable audit mode to see how mitigation works for certain apps in a test environment. By auditing exploit protection, you can see what *would* have happened if you had enabled exploit protection in your production environment. This way, you can help ensure exploit protection doesn't adversely affect your line-of-business apps, and you can see which suspicious or malicious events occur. +Use exploit protection in audit mode to review related events in Event Viewer. By enabling audit mode, you'll see how mitigation works for certain apps in a test environment. Audit mode shows what *would* have happened if you enabled exploit protection in your production environment. This way, you can verify that exploit protection doesn't adversely affect your line-of-business apps, and see which suspicious or malicious events occur. > [!TIP] > You can also visit the Microsoft Defender Testground website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to see how exploit protection works. ## Enable exploit protection in audit mode -You can set mitigation in audit mode for specific programs either by using the Windows Security app or Windows PowerShell. +You can set mitigations in audit mode for specific programs by using the Windows Security app or Windows PowerShell. ### Windows Security app -1. Open the Windows Security app by selecting the shield icon in the task bar or searching the start menu for **Defender**. +1. Open the Windows Security app. Select the shield icon in the task bar or search the start menu for **Defender**. 2. Select the **App & browser control** tile (or the app icon on the left menu bar) and then select **Exploit protection**. 3. Go to **Program settings** and choose the app you want to apply protection to: 1. If the app you want to configure is already listed, select it and then select **Edit** - 2. If the app is not listed, at the top of the list select **Add program to customize** and then choose how you want to add the app. + 2. If the app is not listed at the top of the list select **Add program to customize**. Then, choose how you want to add the app. - Use **Add by program name** to have the mitigation applied to any running process with that name. Specify a file with an extension. You can enter a full path to limit the mitigation to only the app with that name in that location. - Use **Choose exact file path** to use a standard Windows Explorer file picker window to find and select the file you want. -4. After selecting the app, you'll see a list of all the mitigations that can be applied. Choosing **Audit** will apply the mitigation in audit mode only. You will be notified if you need to restart the process or app, or if you need to restart Windows. +4. After selecting the app, you'll see a list of all the mitigations that can be applied. Choosing **Audit** will apply the mitigation in audit mode only. You'll be notified if you need to restart the process, app, or Windows. 5. Repeat this procedure for all the apps and mitigations you want to configure. Select **Apply** when you're done setting up your configuration. @@ -67,7 +67,7 @@ Set-ProcessMitigation - - : * `-Name` to indicate the mitigations should be applied to a specific app. Specify the app's executable after this flag. * \: @@ -75,10 +75,10 @@ Where: * `-Disable` to disable the mitigation * \: * The mitigation's cmdlet as defined in the following table. Each mitigation is separated with a comma. - +``` |Mitigation | Audit mode cmdlet | |---|---| - |Arbitrary code guard (ACG) | `AuditDynamicCode` | + |Arbitrary Code Guard (ACG) | `AuditDynamicCode` | |Block low integrity images | `AuditImageLoad` |Block untrusted fonts | `AuditFont`, `FontAuditOnly` | |Code integrity guard | `AuditMicrosoftSigned`, `AuditStoreSigned` | @@ -91,20 +91,20 @@ For example, to enable Arbitrary Code Guard (ACG) in audit mode for an app named Set-ProcessMitigation -Name c:\apps\lob\tests\testing.exe -Enable AuditDynamicCode ``` -You can disable audit mode by replacing `-Enable` with `-Disable`. +You can disable **audit mode** by replacing `-Enable` with `-Disable`. ## Review exploit protection audit events To review which apps would have been blocked, open Event Viewer and filter for the following events in the Security-Mitigations log. -|Feature | Provider/source | Event ID | Description | +| Feature | Provider/source | Event ID | Description | |---|---|--|---| - |Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 1 | ACG audit | - |Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 3 | Do not allow child processes audit | - |Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 5 | Block low integrity images audit | - |Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 7 | Block remote images audit | - |Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 9 | Disable win32k system calls audit | - |Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 11 | Code integrity guard audit | + | Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 1 | ACG audit | + | Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 3 | Do not allow child processes audit | + | Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 5 | Block low integrity images audit | + | Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 7 | Block remote images audit | + | Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 9 | Disable win32k system calls audit | + | Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 11 | Code integrity guard audit | ## See also diff --git a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples.md index 35373d3517..1f9f6cb3b5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples.md @@ -36,13 +36,13 @@ If you are not familiar with OData queries, see: [OData V4 queries](https://www. Not all properties are filterable. -## Properties that supports $filter: - +## Properties that support $filter: +``` - [Alert](alerts.md): ```alertCreationTime```, ```lastUpdateTime```, ```incidentId```,```InvestigationId```, ```status```, ```severity``` and ```category```. - [Machine](machine.md): ```ComputerDnsName```, ```LastSeen```, ```HealthStatus```, ```OsPlatform```, ```RiskScore``` and ```RbacGroupId```. - [MachineAction](machineaction.md): ```Status```, ```MachineId```, ```Type```, ```Requestor``` and ```CreationDateTimeUtc```. - [Indicator](ti-indicator.md): ```indicatorValue```, ```indicatorType```, ```creationTimeDateTimeUtc```, ```createdBy```, ```severity ``` and ```action ```. - +``` ### Example 1 Get 10 latest Alerts with related Evidence: From 09e86a7cba8b8a94b0cfd64dccced33234a3472c Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Thu, 18 Feb 2021 08:10:59 -0800 Subject: [PATCH 159/161] Update Onboard-Windows-10-multi-session-device.md --- .../Onboard-Windows-10-multi-session-device.md | 8 +++----- 1 file changed, 3 insertions(+), 5 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md b/windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md index 94eacf9749..52f87cbe2a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md +++ b/windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md @@ -13,7 +13,7 @@ ms.topic: article author: dansimp ms.author: dansimp ms.custom: nextgen -ms.date: 02/04/2021 +ms.date: 02/18/2021 ms.reviewer: manager: dansimp ms.technology: mde @@ -31,13 +31,11 @@ Applies to: > [!IMPORTANT] > Welcome to Microsoft Defender for Endpoint, the new name for Microsoft Defender for Endpoint. Read more about this and other updates here. We'll be updating names in products and in the docs in the near future. -> [!WARNING] -> Microsoft Defender for Endpoint support for Windows Virtual Desktop multi-session scenarios is currently in Preview and limited up to 25 concurrent sessions per host/VM. However, single session scenarios on Windows Virtual Desktop are fully supported. - Microsoft Defender for Endpoint supports monitoring both VDI as well as Windows Virtual Desktop sessions. Depending on your organization's needs, you might need to implement VDI or Windows Virtual Desktop sessions to help your employees access corporate data and apps from an unmanaged device, remote location, or similar scenario. With Microsoft Defender for Endpoint, you can monitor these virtual machines for anomalous activity. ## Before you begin -Familiarize yourself with the [considerations for non-persistent VDI](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi#onboard-non-persistent-virtual-desktop-infrastructure-vdi-devices-1). Although [Windows Virtual Desktop](https://docs.microsoft.com/azure/virtual-desktop/overview) does not provide non-persistence options, it does provide ways to use a Windows image that can be used to provision new hosts and redeploy machines. This increases volatility in the environment, and thus impacts what entries are created and maintained in the Microsoft Defender Security Center ([https://securitycenter.windows.com](https://securitycenter.windows.com)), potentially reducing visibility for your security analysts. + +See [considerations for non-persistent VDI](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi#onboard-non-persistent-virtual-desktop-infrastructure-vdi-devices-1). Although [Windows Virtual Desktop](https://docs.microsoft.com/azure/virtual-desktop/overview) does not provide non-persistence options, it does provide ways to use a Windows image that can be used to provision new hosts and redeploy machines. This increases volatility in the environment, and thus impacts what entries are created and maintained in the Microsoft Defender Security Center ([https://securitycenter.windows.com](https://securitycenter.windows.com)), potentially reducing visibility for your security analysts. > [!NOTE] > Depending on your choice of onboarding method, devices can appear in Microsoft Defender Security Center as either: From ffc432125f80307af5de946cb0d34339d8eb104f Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Thu, 18 Feb 2021 08:16:14 -0800 Subject: [PATCH 160/161] Update Onboard-Windows-10-multi-session-device.md --- ...Onboard-Windows-10-multi-session-device.md | 22 +++++++++---------- 1 file changed, 10 insertions(+), 12 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md b/windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md index 52f87cbe2a..a2dfae78f4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md +++ b/windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md @@ -75,18 +75,16 @@ This scenario uses a centrally located script and runs it using a domain-based g #### Use Group Policy management console to run the script when the virtual machine starts 1. Open the Group Policy Management Console (GPMC), right-click the Group Policy Object (GPO) you want to configure and click **Edit**. -1. In the Group Policy Management Editor, go to **Computer configuration** \> **Preferences** \> **Control panel settings**. -1. Right-click **Scheduled tasks**, click **New**, and then click **Immediate Task** (At least Windows 7). -1. In the Task window that opens, go to the **General** tab. Under **Security options** click **Change User or Group** and type SYSTEM. Click **Check Names** and then click OK. NT AUTHORITY\SYSTEM appears as the user account the task will run as. -1. Select **Run whether user is logged on or not** and check the **Run with highest privileges** check box. -1. Go to the **Actions** tab and click **New**. Ensure that **Start a program** is selected in the Action field. -Enter the following: - -> Action = "Start a program"
-> Program/Script = C:\WINDOWS\system32\WindowsPowerShell\v1.0\powershell.exe
-> Add Arguments (optional) = -ExecutionPolicy Bypass -command "& \\Path\To\Onboard-NonPersistentMachine.ps1" - -Click **OK** and close any open GPMC windows. +2. In the Group Policy Management Editor, go to **Computer configuration** > **Preferences** > **Control panel settings**. +3. Right-click **Scheduled tasks**, click **New**, and then select **Immediate Task** (At least Windows 7). +4. In the Task window that opens, go to the **General** tab. Under **Security options** click **Change User or Group** and type SYSTEM. Click **Check Names** and then click OK. `NT AUTHORITY\SYSTEM` appears as the user account under which the task will run. +5. Select **Run whether user is logged on or not** and select the **Run with highest privileges** option. +6. Go to the **Actions** tab and select **New**. Confirm that **Start a program** is selected in the **Action** field. +7. Specify the following:
+ - Action = **Start a program** + - Program/Script = `C:\WINDOWS\system32\WindowsPowerShell\v1.0\powershell.exe` + - Add Arguments (optional) = `-ExecutionPolicy Bypass -command "& \\Path\To\Onboard-NonPersistentMachine.ps1"` +8. Select **OK** and close any open GPMC windows. ### Scenario 3: Onboarding using management tools From 3bb9208b7f20a411ea4a9dd18ac96f2ed3e266e4 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Thu, 18 Feb 2021 08:19:17 -0800 Subject: [PATCH 161/161] Update Onboard-Windows-10-multi-session-device.md --- .../Onboard-Windows-10-multi-session-device.md | 12 +++++------- 1 file changed, 5 insertions(+), 7 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md b/windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md index a2dfae78f4..6cfe7fc064 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md +++ b/windows/security/threat-protection/microsoft-defender-atp/Onboard-Windows-10-multi-session-device.md @@ -88,16 +88,14 @@ This scenario uses a centrally located script and runs it using a domain-based g ### Scenario 3: Onboarding using management tools -If you plan to manage your machines using a management tool, you can onboard devices with Microsoft Endpoint Configuration Manager. - -For more information, see: [Onboard Windows 10 devices using Configuration Manager](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm) - -> [!WARNING] -> If you plan to use [Attack Surface reduction Rules](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction), please note that rule “[Block process creations originating from PSExec and WMI commands](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction#block-process-creations-originating-from-psexec-and-wmi-commands)" should not be used as it is incompatible with management through Microsoft Endpoint Manager because this rule blocks WMI commands the Configuration Manager client uses to function correctly. - > [!TIP] > After onboarding the device, you can choose to run a detection test to verify that the device is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender for Endpoint device](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/run-detection-test). +If you plan to manage your machines using a management tool, you can onboard devices with Microsoft Endpoint Configuration Manager. For more information, see: [Onboard Windows 10 devices using Configuration Manager](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm) + +> [!WARNING] +> If you plan to use [Attack Surface reduction Rules](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction), the rule “[Block process creations originating from PSExec and WMI commands](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction#block-process-creations-originating-from-psexec-and-wmi-commands)" should not be used as it is incompatible with management through Microsoft Endpoint Manager because this rule blocks WMI commands the Configuration Manager client uses to function correctly. + ## Tagging your machines when building your image As part of your onboarding, you may want to consider setting a machine tag to be able to differentiate WVD machines more easily in the Microsoft Security Center. For more information, see