From 1eef3bb47641c1bf714ede773351ad122f3017f5 Mon Sep 17 00:00:00 2001 From: Anca-Ioana Martin <48067601+ancmarti@users.noreply.github.com> Date: Fri, 17 Jan 2020 13:23:24 +0200 Subject: [PATCH 01/92] Documenting known-issue with MSA service --- windows/client-management/mdm/policy-csp-accounts.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/windows/client-management/mdm/policy-csp-accounts.md b/windows/client-management/mdm/policy-csp-accounts.md index e978cc82da..f097cc7b37 100644 --- a/windows/client-management/mdm/policy-csp-accounts.md +++ b/windows/client-management/mdm/policy-csp-accounts.md @@ -232,6 +232,9 @@ Added in Windows 10, version 1703. Allows IT Admins the ability to disable the " > [!NOTE] > If the MSA service is disabled, Windows Update will no longer offer feature updates to devices running Windows 10 1709 or higher. See [Feature updates are not being offered while other updates are](https://docs.microsoft.com/windows/deployment/update/windows-update-troubleshooting#feature-updates-are-not-being-offered-while-other-updates-are). +> [!NOTE] +> If the MSA service is disabled, the Subscription Activation feature will not work properly and your users will not be able to “step-up” from Windows 10 Pro to Windows 10 Enterprise, because the MSA ticket for license authentication cannot be generated. The machine will remain on Windows 10 Pro and no error will be displayed in the Activation Settings app. + The following list shows the supported values: From 030bc3a9e46f37175011f057453dccdb334ad4c9 Mon Sep 17 00:00:00 2001 From: VLG17 <41186174+VLG17@users.noreply.github.com> Date: Wed, 22 Jan 2020 10:38:32 +0200 Subject: [PATCH 02/92] remove incorrect info and add note about expected behavior https://github.com/MicrosoftDocs/windows-itpro-docs/issues/5432 --- ...-a-windows-10-device-automatically-using-group-policy.md | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md b/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md index ac08247a1f..ee0d0066a0 100644 --- a/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md +++ b/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md @@ -49,10 +49,14 @@ The following steps demonstrate required settings using the Intune service: ![Intune license verification](images/auto-enrollment-intune-license-verification.png) 2. Verify that auto-enrollment is activated for those users who are going to enroll the devices into Intune. For additional details, see [Azure AD and Microsoft Intune: Automatic MDM enrollment in the new Portal](https://docs.microsoft.com/windows/client-management/mdm/azure-ad-and-microsoft-intune-automatic-mdm-enrollment-in-the-new-portal). -Also verify that the **MAM user scope** is set to **None**. Otherwise, it will have precedence over the MDM scope that will lead to issues. ![Auto-enrollment activation verification](images/auto-enrollment-activation-verification.png) +> [!IMPORTANT] +> For BYOD devices, the MAM user scope takes precedence if both MAM user scope and MDM user scope (automatic MDM enrollment) are enabled for all users (or the same groups of users). The device will use Windows Information Protection (WIP) Policies (if you configured them) rather than being MDM enrolled. + +> For corporate devices, the MDM user scope takes precedence if both scopes are enabled. The devices get MDM enrolled. + 3. Verify that the device OS version is Windows 10, version 1709 or later. 4. Auto-enrollment into Intune via Group Policy is valid only for devices which are hybrid Azure AD joined. This means that the device must be joined into both local Active Directory and Azure Active Directory. To verify that the device is hybrid Azure AD joined, run `dsregcmd /status` from the command line. From af19fef290abb8455cb09412a2c2fb019b73ca37 Mon Sep 17 00:00:00 2001 From: illfated Date: Thu, 30 Jan 2020 01:56:40 +0100 Subject: [PATCH 03/92] MSD-ATP/Deployment: improve grammar & readability Description: As pointed out in issue ticket #5949 (Typos in the Adoption section), this document needs some proofreading for grammar & semantics. Thanks to chhatley for opening the issue ticket. Changes proposed: - add some commas for grammar & readability - rearrange a couple of sentences for readability - add the missing newline at the end of the document issue ticket closure or reference: Closes #5949 --- .../prepare-deployment.md | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/prepare-deployment.md b/windows/security/threat-protection/microsoft-defender-atp/prepare-deployment.md index 60c0833058..2fc67b8211 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/prepare-deployment.md +++ b/windows/security/threat-protection/microsoft-defender-atp/prepare-deployment.md @@ -138,16 +138,16 @@ structure required for your environment. ## Adoption Order -In many cases organizations will have existing endpoint security products in -place. The bare minimum every organization should have is an antivirus solution. But in some cases an organization might also already implanted an EDR solution. -Historically, replacing any security solution was time intensive and difficult -to achieve due to the tight hooks into the application layer and infrastructure +In many cases, organizations will have existing endpoint security products in +place. The bare minimum every organization should have is an antivirus solution. But in some cases, an organization might also have implanted an EDR solution already. +Historically, replacing any security solution used to be time intensive and difficult +to achieve, due to the tight hooks into the application layer and infrastructure dependencies. However, because Microsoft Defender ATP is built into the -operating system, replacing third-party solutions is easy to achieve. +operating system, replacing third-party solutions is now easy to achieve. -Choose which component of Microsoft Defender ATP to be used and remove the ones -that do not apply. The table below indicates the Microsoft recommendation on the -order on how the endpoint security suite should be enabled. +Choose the component of Microsoft Defender ATP to be used and remove the ones +that do not apply. The table below indicates the order Microsoft recommends for +how the endpoint security suite should be enabled. | Component | Description | Adoption Order Rank | |-----------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|---------------------| @@ -159,4 +159,4 @@ order on how the endpoint security suite should be enabled. | Microsoft Threat Experts (MTE) | Microsoft Threat Experts is a managed hunting service that provides Security Operation Centers (SOCs) with expert level monitoring and analysis to help them ensure that critical threats in their unique environments don't get missed. [Learn more.](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts) | Not applicable | ## Related topic -- [Production deployment](production-deployment.md) \ No newline at end of file +- [Production deployment](production-deployment.md) From eecb5b2b3a855bea3720228a5b5151616ab761bf Mon Sep 17 00:00:00 2001 From: Jonathan Gregson Date: Sat, 1 Feb 2020 04:34:45 +0000 Subject: [PATCH 04/92] Added exploit protection setting requirements. --- .../windows-defender-application-guard/reqs-wd-app-guard.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md index c8d5d6ec1c..e1712b8679 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md @@ -42,3 +42,4 @@ Your environment needs the following software to run Windows Defender Applicatio |Operating system|Windows 10 Enterprise edition, version 1709 or higher
Windows 10 Professional edition, version 1803 or higher
Windows 10 Professional for Workstations edition, version 1803 or higher
Windows 10 Professional Education edition version 1803 or higher
Windows 10 Education edition, version 1903 or higher
Professional editions are only supported for non-managed devices; Intune or any other 3rd party mobile device management (MDM) solutions are not supported with WDAG for Professional editions. | |Browser|Microsoft Edge and Internet Explorer| |Management system
(only for managed devices)|[Microsoft Intune](https://docs.microsoft.com/intune/)

**-OR-**

[Microsoft Endpoint Configuration Manager](https://docs.microsoft.com/configmgr/)

**-OR-**

[Group Policy](https://technet.microsoft.com/library/cc753298(v=ws.11).aspx)

**-OR-**

Your current company-wide 3rd party mobile device management (MDM) solution. For info about 3rd party MDM solutions, see the documentation that came with your product.| +|Windows Defender Exploit Protection settings|Control Flow Guard (CFG) must be set to "Use default (On)" or "Off by default". If set to "On by default", Windows Defender Application Guard will not launch.

Randomize memory allocations (Bottom-up ASLR) must be set to "Use default (On)" or "Off by default". If set to "On by default", the `vmmem` process will have high CPU utilization while a Windows Defender Application Guard window is open.| From bc64f15c61559f0bd2f4b5966de7f87b89658334 Mon Sep 17 00:00:00 2001 From: Jonathan Gregson Date: Sat, 1 Feb 2020 21:05:14 -0800 Subject: [PATCH 05/92] Updated exploit protection settings Clarified where the settings can be changed and verified. --- .../windows-defender-application-guard/reqs-wd-app-guard.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md index e1712b8679..33b3e98451 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md @@ -42,4 +42,4 @@ Your environment needs the following software to run Windows Defender Applicatio |Operating system|Windows 10 Enterprise edition, version 1709 or higher
Windows 10 Professional edition, version 1803 or higher
Windows 10 Professional for Workstations edition, version 1803 or higher
Windows 10 Professional Education edition version 1803 or higher
Windows 10 Education edition, version 1903 or higher
Professional editions are only supported for non-managed devices; Intune or any other 3rd party mobile device management (MDM) solutions are not supported with WDAG for Professional editions. | |Browser|Microsoft Edge and Internet Explorer| |Management system
(only for managed devices)|[Microsoft Intune](https://docs.microsoft.com/intune/)

**-OR-**

[Microsoft Endpoint Configuration Manager](https://docs.microsoft.com/configmgr/)

**-OR-**

[Group Policy](https://technet.microsoft.com/library/cc753298(v=ws.11).aspx)

**-OR-**

Your current company-wide 3rd party mobile device management (MDM) solution. For info about 3rd party MDM solutions, see the documentation that came with your product.| -|Windows Defender Exploit Protection settings|Control Flow Guard (CFG) must be set to "Use default (On)" or "Off by default". If set to "On by default", Windows Defender Application Guard will not launch.

Randomize memory allocations (Bottom-up ASLR) must be set to "Use default (On)" or "Off by default". If set to "On by default", the `vmmem` process will have high CPU utilization while a Windows Defender Application Guard window is open.| +|Windows Defender Exploit Protection settings|The following settings should be configured or verified in the **Windows Security** app under **App & browser control** > **Exploit Protection** > **System Settings**.

**Control Flow Guard (CFG)** must be set to "Use default (On)" or "Off by default". If set to "On by default", Windows Defender Application Guard will not launch.

**Randomize memory allocations (Bottom-up ASLR)** must be set to "Use default (On)" or "Off by default". If set to "On by default", the `Vmmem` process will have high CPU utilization while a Windows Defender Application Guard window is open.| From cf67f940e726851e59710ecb505de60b8aa500e9 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Tue, 4 Feb 2020 09:33:28 +0500 Subject: [PATCH 06/92] Delete config-mgr-semm-fig3.png --- devices/surface/images/config-mgr-semm-fig3.png | Bin 31171 -> 0 bytes 1 file changed, 0 insertions(+), 0 deletions(-) delete mode 100644 devices/surface/images/config-mgr-semm-fig3.png diff --git a/devices/surface/images/config-mgr-semm-fig3.png b/devices/surface/images/config-mgr-semm-fig3.png deleted file mode 100644 index c844b6053171b4d1d7b55659dbf08e3a0ccae3ec..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 31171 zcmce7c|6o@+qVdbEGa4>DpK~cZ%L7CMcEl^vW$Ia$Wlm%$vT)8OR{fcH+C_h>%QOnexB#^zMuE~!{=va&gD42=dpax<2ZjY4|O$8oxE_8ii+x# z=KZ_+R8-U+lt23ubW~Kw+WOvJru=ZsOJCy-RZ0KFCCZ264yrn;R8-{&jQiHKl+O(A z_f5R0sF*tr|BfZ!VCJHt3NY5ZtNPgA64#_xdZo_?YJv(!`t`gx!5~t9<;)gsEqkpE zBlV+ibJUgRv{_=<6wk>VS3SOVV-uCjksa2p&OJ0syO5yd zYS8Qy@SQ8+7`514>hSxw_}X!NVITyPS~%gtk$T7WSICx($}1XUjtk*p!Aq4R z`A?y7Sz5v68K8xlxs3&}nWylzVKS8LTe;8r^Ics8J?Rtu8dy&`EL+@Pqh*%6b#%7a zzOK1=LAC0|q#Qct4OY6(jJ|3Lr}#GAZQ}~4!Lr*kDISya+Le)9!2@zY)Mje#l@0Gp zw0~8grdvCqEAKy$t<-SRJG6#Q&-)r(fof1nVPA`|ExFNh=M&HBXJ_$g6u4he>iqt* z9T`VCi6N5G(yRp+(+t~R0`#R6*1nBaAy;2oDtp^VD2@JAP#6FWt|&?QL1VMo(|9tZ zu(m{bqeo=v$*&PYPJAx;Ng}dH<%ig8DPvf=-*G0(7RE@w_ZS$Ro0t5yAYD&b=Uhqs zfJCBHPlAB5AIpf2?DW+&J`A%H47G-W%QRjat@-XLm=%y}2Sd$J;qD-^ynmIPdOE}A za%x5*L#ClF!Bp_Vf}`d5MXA-NuoD$EpH?}3xXr!`O$xoq7)l?tCG3*0*Lp>SqgsD! zD{=u37yH_H+3HvP^VTCw&K-T2&57^>x}3@;4d#n6l2-YRNq#P|BPg%To<{OcXI8*E zva$tNztqUWt;paCvJ#uIbbeV4sk{-tV`lVtgn zCkI|0gRKqH6uD%VW@9Ft_cg3n*OBPb!adw%(V9RASIrbCv`>Ob(*JbI+kpIcJJsD! z2%k3}XCA^r*<={q+NV+;4JS*0o@!Kjs_ToN;o~m8?C^Hk9VlS5u{k@OIf5Sedq0mw zP&VWUNtTdb5ie<~Dy969yts`Tw7g|@>J7xYpLH0ae_-ECvX$(r4eQ)T1~e&=ny&lB z=P79CW_wr5lbTG44Ek=fzFGTHdaK4G4H_6fU=m>G@+Exfo$M+uQXAB6aaY-g1b%P|@d@;PZPIXJrrhNek9Sn7LO7V&a(-0@k{z8)44Q0()KVUYxTOUs6-}W= zTVwgcf{|z5BoI6sx`&IWC~Dp49P#%p|EK-8@{Cv{6@fTGh?U^m?YZ-~UqqP!_I~No zuR{|0JByRpsw8={%Co@I^}=@EEAZWZe2?DAIl!sCAH;Qb zv*kg8I`hrd+a)2hR~mmtq#$`}Y4pw(JYFFSDBV}h_Hf`mca5bv0ny1Xib?lhm+(*L z>)S?#L``m66x~B)xpXbHScFf61VvObiuhGf1psHC|*-f42xwcE~UMp zM6j$X4mm-NP#z}p5qcsvMsi$&cR^+MjC*0mPp)}gKh@Zvm4Q99;y>5JN=K2(X?E9L zc93GM7&{t@C9{|}uh?eQU%IK=JXM}zX^2)i{*as}LW+_sJpg$)m|v*fs%3=08M$Qx zK7xg5NtXe1dK>dC;db8xAN26Hd!5X5U7_G7Cdh*Vv`i4uj;LKWCD2}yB&-U z2ihu407}&J8x#zX9%jZ)=QR-#?>>g!*WxBvIRrfO!uj#To?i6+Evwpm{r7XV;AiGv zz>*a@2vgGOtR&7mPL`Y?c3u*fJYf;l^vd-WbY_BwG^)um&;6^MMRjqmVxqs?rBC)J z9gW|mVj2gPHq4naq~g}eUyl!MwNIA2w%kHrKAB?FhuG;#yQ^$E0}$O$GYnVP;={ly zMutMd09NZ}GR@MhD>cd%jNR z;j~?6Uxrfv51f6cqG-*ltG@Sa^YnTQ%Xke~H=FZ7?_g2oQ}bRz=-M(*?ZFE%khG`+ z^guUDaG-c>tE4eWOg3Qbd6pGHO&=ntyqZJgJix4dh7+&{!O37|-50Lq01JzY^4^VMQ%wT+13X~U}WyLdBDYZn!1L?}y{9ymwpe-k&bwXhY z9ikmT?S5GWwKlFkFCc-14EY9uc=JmjRhM=i`_?VF@UF*Pe_t%R^UQT`WdiV%{(*xm zMyLH7Gnkn!N|Qd~X0N6Uo|o1f(z9OG?YEW#1|;V2`T@fOO#;^wc5^i@xrY4mIpHyg z>E`LJY#KqYM{k_FOM2hAF!5vj9I(#3%YIGMk2wb{F0!)Djme2{Y^TU&J=i+ClI2af zMOUYGhb$Yt#>up_7tBN5X;OW%BmZ`!3O{-=^Sjutm|Av9qKY`0fw@OaiT2JLl?Rc# z3!9lT1NLZ^(~ermSd{tkxou;C;pCyom*|Q8TAmHy!5sKXoAgr6wh`e9E+(NUABY{# z+t%2yHFLjpjhpFkT@G)-y5x>7UAGxy#+iY5UCoJ^8BIZmkzv6K0+@C2<)@4dM) zVa&ZZc!YwH!~d&OU+DMqBWIpE24G#aCgpa zaptj`H>q=Ic?rA~RL{w6NiKYgd+%*zN0}<{*iQL1Bo{6xVrV`NFE_5RG}rBH+}oWL z%yNU}i!ewxj_G0GqNn5@`H2bvttQ#*B^R988ZpdAfGP1H2=8W$*@W zwH^M#QA2xwzT4wh;#z<~9a;>9@2%g~K@R!yth#+}Aog_=#=ml5y~Is(+Ygrtr4g7u zn=UiD_*~QP-U3Act3ivz09z1q+L3sF{cKeQX4Xxhw4=&x;NR>bT%_!j=Rvw9>nLOA zhO~^13Z3K)5n{`$eV4ssS0ATi zsZF0!>Ak0c1y@-zS0MZ$&BIWn@k_-$hL0{oP<y|2Jxi)wYsx@G2G>|Oj7(W741;rh`UF(OhN0&I=Vc8a*2kpD z#M|1x1vBTJ`ok*!GNMdx0C^*I6Qzy}J!_?wWYhd^83HAcXKdKdP>JDAnFyicP#eDF=DJapo_t6qcZgO>Gr z$NV*#`-hMTy@IXX(w>m=Mok&Q`9Wa0c^0$sI=02w)ubC7SO|U%j#IO3 zM}LD6cX17m&bNt{MhAH}s8EAl(f;%m=$;kF2k-#PrfV?V2LrA>3zArN|L1(MneI{* z6g>1%J{0XosALrk{b{T&iVa|D+31Y_Qa= z%}GKPD5nZ$;|LX=Yk|Kfrt zmEHLojE|By!QElKc(Vd7?31(vhRjJ8VcXx?pXUwE0<^FZS<8I7qOLC}sv@2N?1lC! zijcjI_;Rt`PuO8#9<$~c=v06y{l%_T2AMnFl9@@}pV)&%UE5mi+an`X4}}*0Vf9d5 z?gzRiPMmwCoEsC_o@c*3?hA3pZc$qVn53KEi5{y(%NsXmmSu{}$7(ES1(+ZuEjf{& zKhoQ5cqT$7bhKrJ;lalnE>?EKh9YC#S`eIO_>AP{vwDM)KbB>XQ~mQ?8-tKzENa>U zQ!5L~d7QBg(c?{x(*ij@T+$&&y|^+4UBhi=dYEp(uH7vAo}mQ$nCWgg%a9s-^q;uJ zzhL@;fj***vVx^sKNdFa_ZKcr!ng1^D#yC2KT6=w}vbQ}SUe#lM?K)K2vRw5xf&Qk>%Sn~pFTSJ;!azpln$1bQ z5I@!$S`@l69%Ba~Qi<>FS3-KEr)4Zsx2seryP}cLK>s&&nM$4q zO@uhP1X0#LzSPI%pehi#bMm8s4HA3n$4fG!j`pfAm`jAquc@;E1d*}qe=0L#1N-!} z)o2yc08ht=aK*}ay~M=<0~gDtzMb#wv~TY5dbJQ&S?1i@-q{%wM5`TbCf z47emlurR3^u1PuX553sWy`HKP-lNBakALGYcXbyfBAu$;VI*4f#n;gQmS0sqB?#0Q zL%`p3+sw#9BbwNCzbQy;rEVwa042-Ow>j8#Lyn8E&;Ag-_|wYq!}Owkg)G~K{@A=* zzM6%krc`NjCcn=GKwoN%|4l8jO*ylK!jFym%uBWqcR#-Z=;4rmt#$D^gWuJKxJ@~$ zHj9{m`C#TWcca5eX#}Q{(`5Sp`=4bz<{>Yct@35uG6#;auRi$t8=uAL0ov{#lyT2t zA|sY0{{fhQd0@pG#kx=F2er}3GK$L}AkYw1G-0!0$VIaFJd7iS`1BsiGk)`j^q2X< zGj2p7Hn1k2-_PZ{;Hs%BCa53I!cAAMT#_;B%9*--o;)owcM6jl3w=+seP zg&zx*0m14SQ@9&i>F$!}ACq`!%4L7Fb)5Fz$X#L+u(*HU61caDoN!?S*_oNYtf)Bi zP&TwE>gigf0{x+?9_=yx(4kpUWOwLWfZtr|XgEyv;0X<5kg8vNzX%wt`ixLHP)$bE zrLC#ZGM!;-85bp6Fw-2EJPK%vL$L6+NwTI+>`?N29gSmagTCpFa|hcIE;rs`;=PSCePGx;?4juOh9R=&9F;ysOA72m30_E!B6JrFx4>#>3LH@++!<+){#!g%nA~5zr`7r&E z>tgJtlVIs9dWar1T{{~C(Ur> z5r3{?Z?jOZ^>*sWazC!Ke=xW{Ds+DMxi%drds?t?-$st8sL%)Y?Bt@((!-V*L9C~Xc>6`Wc~HA|~5%y3UQHad{zP9<^}Q2v9r{xjbA>eeQxkZTE)Xlx4F zwSqPsbC*>R%*@c1?;8T>i5Nj2Z=5jffeffwHXGbsyPl3JnJbM)kEyM5YEKx2tVmLl zx;W{B!24^GiMixmwSBimA;5A9;6hKu*Hi$1?#BDLOc*Ezd58P}_9A2~ARy?Y$kI^Y z5KEsKEwr|8%V;f=&Ber|w-lbjCq_so!7$Yc1>`3n4c)C6AD3WYR+1<(WuDJbNt8mx zD!kgJQK)W)osrUz>i$ZVG4SF+? zB80C{KEhv)FEs(Tupv>}j<4}IxiZW*e;UgY5;*OW47!4{RCrB#jb9r783NqC8E1b1 zY%DM)M7*pFk-sz1$TGP0cwoUe{zVqMtMJ&5!7HYtG^RD_^irdOA)enN09y=8vJ+mQ z_4+4ivh^kGcY~{4OB-{lp-Y5}i@^s3$Z(CLn1$L<{Rh2kT-`$GPG2?C?z@O#Or@Su zie!AD_h3ixl9q9v{Gjxb!}OXtYJB`(mwleXS45GGwx72$+?PtPhC)bMSmTb#Y`(V2 zdtGib5>J>j+_wipO?vH5?y*lV@J1MC8t?H*Cvl)BlNu2`Tu_lzM5g?YNCRDo0^jfA z>E7e_(*3lPBLt>wBP?J6-H#~~9J%A2oA7O^S}V#-uRYtWQ-PGB19fY+?s+w`t2W?BO+7mAO-fW1`TG{xjkoRDKfs=fv$zsg!K}T*Aa{g|##1GN2Lt(Ss)t>)j z_(LM|r)m5*mh*3a=8~Y)2SRU!EXk1l-}tVOPiWV&&2zUHv_?jVG}4TBfhUHR`(pD~ zr4vfnS9L6V#qimR0hUUj#KAR`Vre#fVq2`7cv<|1`fEQbCClUJSp@p0Btv8gyQ=_L zTfq1}B9i?IX|s9cj&zC*`|x>EiOVbgSXOgLB#woW-OLXQL=9x|Q->VBt91DVB~4U} z^*V7#<_Vc#I3uo`!tgz6w6ZLf&84&5P3(02_a0C>A0?J?^Qhv(Lel4EQXHzZnY@lj zQ%C2;MQ2(Z3=0aiBr1D+fT4Ti@r?=EfwNtlF%du6TzUw-9>)xuuNIsl9MfEX9Xw^E~ z<2R3=zx8Z7BiBGOcqER>lYRvZe>F9Cv%p2f)8uQT{Evvusr9J=)5Vu} zJMiBY@wmoqXRKN!6hbl?S;9$Vph~!KU)36tEK73YM+AVu%Y^p&;q-0m^P5#`Fdj`A z;(=y$FG&}P2yv1hu_cxZ)try$lQ;>w)^&W=+*nEBT9N@@BD-+b2`s_R`~~=qZjzoM zf^g*xSZ{xE&+aXI{&oy@DaVQ80b!Q&saPEZZrg?{$#plk9v$g6%-xGB@!JXDdEsag z`_-2>Gh_jjC1QlMJ@cmCb#e2l!gsNe(mlkt?d@IQcJ6A_n;}^C{qG04+aj(vNx}s4 z?T?Q{t#+Eeb0P(w-?YN7TuP*&I(O4>fK`qv?c#rW)Nv~YZ5OqPyJQM1=KIZ@G#p?) zEmxOyI|X8P;WPw!Qo2TBMa@m?+~w*oN>iOd@JI;p?F;Mi0NkT{x|%yCxnO{+r^r3s z7bV(A`NwFqx@-;8th$xpT8T-H%->~i008#?))igEbyDHRU2^{ogHQ1m=kLOFu% zm2&2#nc4%9o^>w5opfwbOCiV873kY;mysURLuXwBX~9`Qc)G z@8xDJbBoCg{57WbZ)O*x5T8z1X@73Sj93%#qTMRfEbft`W zf6TtE#M31L?<` zi;W2_eEG#X)n;aYx>J>ZXCZ*xbr1swS^aJz;JG(Sr|Ne3jTy(B*)U!Q$IjYfivFs0 zb6!o{oh9aO}}a;Qh{NHJ{MRPoQN_`>dx* zgay2@MtOYP*b3MKI0=C_$eN<>5cVKDBb$PiwZQGId-tREIrR!Dc@iVNY>Ff9&sK+X zuA%M%G~q&6MQS(rnL>wd4bSUOtqXQuh|J&4A@+#wZNJXq7rbFDq(?t~NDU%?xX@BXX7SLrCZeZ)lp8699k)-H3H9^H{6cGO z(ApcI**J4IjQu_Pfy@B(3hGVB1w`%%@mDA!r|SN#EbLlL4dB&CWyIZ8(@*!9+tpov zLnb461l6G@mn+Kt>!C0^@Wh2_o3s`hDo6ph>FE*RgwFP6RJ^79bx)Z+MA(a9lXs}k z3u4?Wv?RM7h?@mit@@jr=4R@tjlj05KJ%Yq%_mr$gA-YoqpyZTo5{aehj!Y!veOA% z#9Dg@XwsqBhhzTnYJ#v2l%sO%>WR_m#=W3EiYL-Wqai~hlGF01;ZmBYyiu`e(S5OG z$)wmho4YLv0mYZTFhE^t0#1Z~+G7c5%s@SzOnq!-@cqqxL#Ixo)V;x1rrOScImv1R zHw5A(K>Wr78^hZ*`|Xn3)4S0z*K$D*d;)wXr8{#Pr=eA(_w_8i{JCPV@`eU+*Ra7q zM7WQh>=BF3KCxf-%HmbP=1xX=ps!6Lgd_T*G~H%NyGh6Ic4}zf=fBnO5FtKKh1=*d zEeSWW<)Q1Ugz3XcZx+fiBIm$z6~UWqw22v^XEI7j3(?bJ3@HN^;o5m55R)--TRmPtI27C z^SvJj=Mni*rP>I|bNqhOe~!fO$F0}}E!;Tm0NR%ejL7Q!3)oBi^zID)N6`P}0dcd3 zHxkU&_m5d!G*+UZf5~RSM98xg(A>Y|H=+PuV*{x)7AvFiMx`^-uvF}+9CM59_8FL> z?+CmS$GjrqwjIRT)ZKxIDm=nHqJ)2Ed!+EKwBQut($i9>b>uI~Ayy=@GGr+-#HfkH zI@+lRk^&+gSeOc+$37UP^z4=EO~@=X1z9u&Wf6JagfxQi6}rwLOM=wIZHv$Ic*I-Y zoy!KLsYECexQnhT8Qa68MOK&*9R^_~lH8=(&xigTce|tL)Bv1|__0aU<%33opXxVD zx*~DlWo63{O(T`(xE6p|)~c@$qvdDRCi)kY|Cz-Rt4yhcmw`{KA0P7Y`4}{wf*pB8^w~=aX$nH~od8 zLZpvzf*_&Zw8T@sr1V3n;?$*VDn7m7p?2m$>0$tH{5!pf7+`%!pYpXnAjH>g(UJEl z;z?Et%qCQOqH1+TOSa%iiw&x+9_^fNEV?^J%mM+YeWy=$5PU6(SYs^}Y~ZH!)rCcm zS0U0_h;fk1TQK2kh$hk!j`N?G2aHuuMQ6VDE7GXJjYkp2PXtUaXcGHup#;uFEo0P0 z9k|YW|4) zAcK{%SBsNM3+BhhH@Bo3LU6op+~SxmX~sIi`zf9W-}HNb;yBB*xA66ZY%nFHG1^{m zWKtMpt?O=Go_NHc>Kgu4CcF34yFH#P)2~hv+AfjKPf%W0?1w;V5QvQ}=(3eUQiGmb z|4AWG`)G5`GwZZ!`(3M=mtT~a4_Q>5v$Yv|djb^iG*oy}!Uf9bnGkX0wIq)n`J}N8E|N4Qw>Ur*^wXLLH{_#SGyZ;hm{vL4fr|Z^0Ye9RSsIF$>^jdv0Cf1_Y zTX2Jg>_hstQEvWdtkwHd{`UbMobQqYO5*1Vsu~ImY1r@^nXaDJ=ulpNiamF65*|;S z-toU9Q! zqPjYam-iXLcuo|1m$Z+HE!AcZ!9wt<-qWL|+W|uZ(g*cAkbWePxNM6p1=*!$ zhnUJW>8*ZDP<|DRF9bBL645Ip13nd4A?5?%`%c*~aj5DwELR!06Dt+Wlp#1@ZrWcM z@X3r|;##wmh4+01@BagtRTk_wT}Xnkk*?B|0zHM3P*&{@o$|;elB-H~zQ-lqxu_nC zTg=@GurXG`ig;2{*>+O`9X%EJFy8&~sG+G_jizwe=a8ix>sF_X*u6s_P+1;lF+} z$~f)`6v6%FH%SSz!~8Nq8;YXPe!>o3Q#9yW^u?CTb6MU|8+O}O>HRkO)SeG?uX~!j z#svm%TK=p#nI>GErqtuM0O`xV)`lI7XEj0kGJ=gLi;$AT+G8YO_>Uw=TI;iJQ=|)gG*e?va)$ z70&Y5MHVXelfDe*geENAfJPaCVxy>+bL!I0>-~B@G#ksO)7OG!c#ppM-9)Lf(VjZnI`_k*9~Z zbu5GP?wM2Spv#O$q=BAIR_8EB5(hjudb(M$gaI zLR1LFPU{*6)r7WGWk}@p6Qhe8`Y*IPH7?(>5N)2`GLZOO5bvfh*1C+i;Xtmnjz;OA7)ay*~=w-$C;((oB&;ENl=IG8C_vi|G^B-m=?k&TEQ z!`WIrt)?!(;Hj`1L{`ub{qtxox*P5s$6X1=VFn(1!z-0OmUmwivgQ`!^=DVM-*A*8 z1>I#r*QGU_xWb0+0}FL){pmPsL)QUhQPG3t(u14SezYzh-Y-Cd`c5nXvpD#YyidRH z3p||_2X#$V@hd(E3DZ*Mf6HGxSh}G%T*2aA$HebWMP)!0Mqy9kEyr5yR4KbwaqIXh z{6OWPf}l}KzDPC8&vvRZ19rAGAc2OCs`mH;rNgb2d>i=ku){Sx(_!a_%jc;nmim79 z=5b~!0kr~$6O>HPOZ@>>S*kRq+-yFI9-RNHGZLSewR5@4bd=v)TI#U$Sr>Um(3t+S)ri@UB+AwgC4HjpyH1+cvK7ADxR zxJ{o&+P{IEV=6KfL7!UaW8THir<~(%nTp)Kg-yrQ=blnBskZEa_bF2@sRiLC3l$IGKRBPkt(KkAil?}oO2;0b(s(1J!oZVaSVZNeC#1qT`9mKCDFV@xsDrNyxlP{{5@q9f8Qjkgx+;bQ?_W$5K!qhp=VMujM|O9 zeYdq7S0rtJ;X4@LGe7oBAs-toVm4;51=#ll`6yV|T_5U=_k@uoi|wgi<_%Z2AKY!y zVYkpVo{(mNk_m!C>h7aHZ^8U=eb6VlEy?!4rqO}y`$$}_^c5hfs-$Aoo;5QI#2j5V z)sMV4ip^gse4R`%g9e;w^Eso3jNiR_kjdLs`{OcF$D$JRc~zsxY!H^M{qf*^zwv<6 z`I?E4N$=AV$b_eI+%%#b=2I?hxx$1Ztj8r_=AvGo)3^Ig-cuka-|ZWqWk2?c|1Iyh zv4(s2ZnC2Y??iNpqF>RvcKPm9)nh->rJk@y$h+<`*0}feL2o)O?khc(`QV=vkJY5& zY!y3c{)HW2vUWNC+)JSL-M$YCS(SGR9GZ@cDziQsp7r&icmKl2`eB zhbvY!iRPoBhV72(r|@SZch24u5tHK9j(kWfy70ntM<%xRRC^iO@D(J@um5Cj_Nkq# zYOMEURNm>0a1RYxjYx;O=0)QK)V(yzZq*xvfw%Z0fpcDNcl9>JnG~{)Fq&|u_Oo88 zAzpiS-4`gJeC}n|Xrq_mp@BOeYcE^RI2xDFUBur{kETWT*C7)BrL|*)-4DraS*jSI z{=(I_f$GQq#~$L}DoABE_1K1CvGkm6FNw2jD~Kjl?UC=;&~sj_W@`|3x+WB}twe@3 z6|W=547v1OjV2m#nCihLVf zun*8(JNRzk?M+KMCF?5Y^+N0yYHPjE>eCYd%V(GO>_KKg&49C&=BX!MA@duDy|2{d zes>mzf-cx=PeVNW0)ZjsPM|OX&Mq&z{cPm z7}QnwxEiOPo=1!6GA@p$&qMmucP~Mii~0C&WaE- zeYZ`Zg^tR!fQ@l>?e&X<@QY_<8)k|W-Xcil_^$m%UP<3LlIVUekB*p9`4B1DUcLMB z9tJ^!S-(D5UbL+ikE}P*oqV(1xLywW4FUP8TK4X$H0Ocolxo^1M830`;L6Z=d3WJX zIZZ9o10@CXSt=@Z_5V7~{6mXsB^zZr0T*UM7!G5Rh}HPj@e*)T+|C*baO=brLra;K z`0*0W0teFZ{;6Xsc<9f=77wX+t{h13?Qw+?-&}GRybUa`)rz68;nt!7*Hx@yb?1tJ zsN2)n+M+(fH0tqtyRVe|D~n%jBd$5=dZ(+azLGtu`b99Vn_pWV|DBQ{T~&_U(#C$l zx|)rD0?LL3T}aj2+{je?+!FIjBfKT%OQ)b`ByfYqg_O8+rbDlfJ<5cm0{F=P1d`E% z{btDZaGRtOtPx|genK>$@aO#y)(7Pc#1-4#WS>AH>kuZ;yRFL!fvG4zqo8qo$8P%y zx~U+$*&ompkUf|rhD04+R|`1!5Xgp5EY4O*#PN~P0TyHBOdPFO`OF~Q`zu7Yeat)9 zRp!%Kv>q`wv(a~iM8CgADTg(fp;_Kod|=mLGa`s;2OJ z$6p&Jj~1b_RUUClcx&xhlD=1o@uy@+W9rEx4v_K>>OHY_Hp7Uk! zjc(CQ*Xl-!{b!#g;vc$0^O}v4o4oOdlGNddr~|SkYpuYaU+5fnN#%1#Qap;@?1tF+ zt(|-Wfe8=^@^B9yMy8V@zfw)j4^46W$h{e8KY7p zwqK6~twfAI83U}?I@ar16czV($tDvoBgAz*pl#A1Dyo+)+>}^AqIIn<3JsS^g*ts* zsGiNm+_KEeTzOAsc&tX%$SyOk&Xkn)gX?{ z!cl_~emVj&?yax7K`Cxn@$>V4?NPzxFL;rx`&MnWdnCsSDVIjEMM&n9Wj&udAG#Z~ zCBYA$yKo*5A)TXXmX&<&Bq4lJO-s+3Hb#>_X;f1z0P!U7L$ui{wPV_Tt#W4CG_CH3 z^ec9!I~|)3)Cf^$_J*-sNHm0Z^hQsvXg(-0w~C!souqvpxv0}|R(Q=85_-CVKb*-i zi{`U~na|66wwX423lY@%P`5$)aD0>J4cgV!5;^G;Q_>VaxFzUxy58rEl%`e(j0tQW z8m&Uxu^fE``pM$p?pg3PLDOr6-(QQ`HmP5;k-Kqmq6k20C)8%&llW4kuFCIZ^XQ7r z!Cfmb;3LnFLyz04?JLFN@vEU=Uh)WVk&wHZb{1@()hX-P^b|V3ZLT4gH|AnE`*^D8 z%h3k=R*0QXVGn$q^xS$8CK-O?R2Y)NwZIHh!!2cAT-0OG-;`u!N`M;1a^yRX6wQ_W z7}EYo`Xe_}cPb34M{!bzI_Ro4OQ2AtL++A=WUVD166k8m=+ehaRQ}Yj|F_L4+RJ;w z9Q-%Q5v;YqLt1Y7FN=EFg3qS}_Yztrg&LEv`P`e+f6#z_p#AY~XPTYA7V;qMH#C1V zKGK*Y!q5-ow<6x2%{W@-C3gDR)4vwhs`dZVIe|j&R!+ZmcGvksoIf0L({Wch$jH*3 zOWg#lxp*`q`^0z3+lnUR4nG!@?SUr00>1R9Pfi+=NqNm>#l_36zJSyOP~X{_+;T?> z(mBJGA#CO%cGzWK97Zqd88F-)cPXs!b0_}+%)LAs(JsO`Mba^CNUzQ>@A=(+CiFwU z+t>)fx4DPi!@%2u_E-1|F;iB7xY<=Tc{YDozpud3tVK>BLA{)O2FMes`;O_ybvJvxCHZTeDcW)v zr{H!c=5j-`oxDHJag0S!Juod9>w79RXf}!U;k;9INxMEF7IN{0efeN8TU8oIYY)^KdHKGhyC@ed_uc-bN)bVv(T1(;i|&QfYLx&M&~itPV@?ia)^GE&XIJJhHb z($0jY!WqmKHnlVsh>RX6Ocg6k4Wqm`S)&z_p5GXVm(G^~X1``}D`c?@F_M29x-*Gd zr0d?MDak%k+{vP)F^$!cppgQLqpiN+L1;cb#g+T-MeQ6E6?82!Pbvn#pLW$-btuOH9vUt zjxYx5#lr*7AJ(y*AH^eQa+}ASQ$zI0xF{W>so{4YhXVtYO2;+P6c(g@(4F1`^fdPA zg!v2-K4z_AlU1i==2mngRR`Z*eRNv61Cb(a^qd=9I<6b~DkkmIFCjB(LBV%;gkVl) z?Q(u|#;DH?cm0Lrv+q8<&Z*Y>F0xLA3;j6 zKM746^#KFoV`@TuPBGIkK~FPjjJn&v@drbp_aXn&P+REu9f}&h&(S=-ThY zf0`77zA^1axNkU_>e{IW=f)HCh6z_fI7yG)s~X=67d;tmf5c; zJ!$D8`0hi}BD<_aOY`;Sz`;t)b)bST6WzsjbvVt&+*TUTo=4;3Bj56@5{P;d z*n<}mTq&vVa<^Ie*{-|Zi>W`Ec}eWT*cL%LAF)l0?@>Nz##fh{N-xKV>A11i@&LEb z!<|3=Rw?B6^a=CV(sm!ZdNMW^34_=-f?{7s*$oAjaKVQ8FLuLMW@}zya$SBUh51SFo>(bO?%`6aGaC}w~q;WiCb6m@GQ48w5W;9oe@2-2rTM+B}*P$g(6Q`~_ zBkbqO8GMRT9GPy3!Fczvworsq^Jt~q>eyk*z?=~X!y!f8CDUsTu9$QNE2Yon3)50%1g@8oinIO#l{Hge6kh7V89KXrQf3(MaL<{wsuW^q*p`1>KnJ^2lfUBji3TO z^7FV5eeOO|MKh#+sD457V5PdhR;1=E1c+R@bw0itO6B2+kjS=&IL}4Ce zV*q{kqh%A7u)@%R{DkxgtI+3-I%HJ>?IUEn#lF&PAIP%1j6GduZB~|YSb8{%j+)yz zm%3%Uj&b5nC7g-C@tzP28_Ku%;;9T!hhGbRZ>gEjo0Xu(G{O1d*fN7VUkR}z8?c&~zKOZLz&wafo8 zJeT>b=!<57x%|*x8)MGR1@4O)zj@d8_(Gq8Z2VE|XjB+DrW^BHp8wk<=07_w6Nj*N zO0p@UDR^&ii)}4&3;!POBekUQiF*6 z&i+KN(YT}t@ph=fUVhXXo9b<;x0gpLd{#N$(6w6{5Dgv5)9J>+KzPSt__v_-NS2J=nDH9iIR;menkc8R$`%l%s@PYNvO*>|6MnFS{@jI~ zFuyJE3)d+3-Hy7aUi-CtG5ZzWUZ2fKMy)+`v0zxi*yt0z59Ydv-a*($pJ9Br_e|8K z<1kcp=(`oaGt5E_-GIo4o73BygQISslmL)dc=5;Cd>mx!I?;KeZ=7Bt#Z#cPNCVLo zY>l(bBs{5fEABQMycc9P|BUFitwXuF7~S9c z?dj*CE!1}9Pp^rDVp2R#4pa^bpE*MRc-?}48=AZz1E1h`&F52B({26$#u#r`dp+v- z^tA`oX6|=E=n+-se)&;4Ia@xLQd^a!dM@#QUaG=Yrejthc#bXuSQR(3)~Nf z63v+^shGbIfyh0w%|s;SoypG$%7knDzI_7`l>-d1KD5%LsVxhrT%O8`9+7fm1FC3~ zeJq6s_fc=@KCZ_&Z~v0-Aap8U-mUtzvL=(!QqK+7CP*_@c9b~&$pAS3D%zB>X>eA& z3LuIiVc8L*qwz=we4;eMp;UxRxuRH(UZ3(xC-E7<4s>*pmMXMc}-rG0Y@rrnb8#)q97Z~@37VUg;e~wZD~lk@{sO4o37kn z`l@iGuj`7n3!Br@0}RfDQQTQj0(1%%JZ)&4ptV@{>^t25Y1(>RK&xJtS_+|{lynWN zL;4no2=RM{Lgxd8isuUiKbQE0kRfR2gGs^%JbJNMYMG&`|CnY}E)I-O#EhQnZhTym z15`>Rj0?iMlqW+tK%&HQDd}>hd`elOjB?DS0MN2I8_&nsTPOZ~{_1JkmL6WNqe}ro zl-Ma2c6fvK@Z|kJ=cAN!{L8Fvw51uP=uJt{9G>ebpSy0j7jDhlkQfkGDV2f%mmKPv zJ)k8DN*lK>DB={`X`$;=*-Sq7QVN(!J+`a*>ofV7HzCoNLuI{Z&s4WVgu#4MqiZpq zdgMYl-aR#&%(`(4kg_AQv~)&h$B{&NReMZ=2?;#P?KQkUp-U?kYf4hv%oNizc!M{c zJ$c}zqNLh)GV`nyMD)d)t3)A(AB%^=OKY4!Tiz#&E~(l}`s;OOdjkVoms5(! zB6%b5up%I;HY<9OslDI!#1xg)IbR-17^S*+NGt!jB?oS zXf?x0dZ%TU4j(bzZn5DLiTTO3L3cFfam-#HIi0Mj{WYNY`)>iR!2P$9p!-gvnxfty zpcE1ZhyzIKpOcFJN2&84@%VqUM*6?o(BQj}WYDoRKdJG=7Xj4WM)(fvhiO3R1Q^FH z&>aP_zx`pLeZ6k7aZHnHk*fRRP(Wh{|HYjC&S9FOiVr%?h za;kCaKKno#X?q}`J;St=%L7ktH|Odeb}TGDxvTYXSPKFm8D!pgWpW8Ch>u_LEjPJ@ z_~rLqPL%cYE9NURywkj8a|?iXY_%Yj)k}B+;6S}lsqg!1^bXFy%o3(8GDO6C|MrK! zTgd+FMe0s?yAE_=gRlU;S&03e=ZZ|`XLf?#?s&L<^bi<0#_X;33^5AvYGoXbU(7oT zuB2_PT?hQS_=JoY@Wbbh%-TnLyJ`g^a42b|tp)*Kozhs%MJ+{iB?%+i}v*V zcdmw2QOmLwZv&dKH>I2w8$2=N#8f~&sT;h42=tuxQ^C$oiG|MiT#!*!RCv2d6a(^+ z!OIXHE9Z(2y$FHWrswYpiJwLeAZtH%c3agkp+u;FJIAjacy)x?n@;Uu9lz{qdmx<) zwWfrZ`lkHyN{zjc$;^d1*Lj4P_|LBc-T(So+54t?&OpBXqzFtAq> zH{f;QSVU1Un`x!JtyDl@y%8e7&(ag(EaA7*A6dY9Rnvpl3qObqzIT=Y zrUsC)vs0{N_tsim%esw8I=R-#(aV*k7k;#tJLG7e{X^2CcW9_z`O%wMq%7eOuynvb zmG@CiJAfGi1m-d8uex=9r0k6|B)b&ZH2V%O#ia32+UZOyPc%ba3gUlc)PovRz;hMN zO9=Y(upnB#UJ5jD1Q@~e2N=MHPHiDFN~m0M^}PoRX}G1JT!A4a?aJ(6A|}xQHK zJ1Q+rW0gPyk-~X+9A0{Ad9&fNb6=^d_xZ%r%N?#WdoL!$z!N+Wg16I6w#$LhmS58E zhlrn|n%K{kxbsT~OPE^sklDR|K#=|&^7*Y9NRk}h0)*W) z{G?!fU^=k^m@=T}KvS6qz#btd0ryzAUH~|gHe~Q70JHEtFCiJPWlgdV=>k-Dtr=r@ z0|tk9g%W^y&b>qreLE{Pe}(buY7s%DL?92s-b*%{nJ(`l`9A1;DC|+?O;hEz`369k zIakR6*osagb1|)Jo|{?Ya~A;`JbCU{l-KAe4-%=Y-bv&H*nMQoVsM5n@Nru{32UCx z4@=475YwXA7D@_>>!x&v_e|{KQQr6Au+)PB?_7oEiZV;=#)|5#At#N2_Zpu9PGd65 z3kbL_ySvuLD|E4@1kX=(gWunEeb?OJVt}^2^0Q z=kqhQEm|Sp>kIs|mRl|G-8Y!sFvXPAGn-gz4OwO~Vy=MUTU#fEAC~PIpnZSW z$OXhJPXOESg@)|nzk)85&zQCm*v$enAu<4#nF;kI-gLFEXi}J=;_I2 zax5?9#8!W5PIP^PJ=c>QQWAIEq|sz$x2mTFJBWcocLR=Z<0jUuW67x%naDqkrNNQ<)q7df zu-{j7O5ZH%pLJilCf-FnX^>e`a-k{?gTj z?7$K*cc~R>v5w)N&lqd-OL9^019QqR7{_prX|Vb8iXw(qg%dn#*4H9({)?5)m9AjP zjHbeuld+5RV>Le(W}jr&faF_?f5qv~ zj&v8f0;u$)QNHp1);b_I_!_Mkm{KLg5#jwGP6?IP0x622uY)N@1BePx;Wl|#FV-gs zmNI|$cJtualx%~Q%)AdAvdh22)G@|ohC(s<%|FUU`>9cP=k3hXtdSL3`NJmrQ{0sU zUe&J~$9pPiuih8-)V(NIO95=7OOPGobeRJ;AbW}NsyF(~r-vgYvUw%xjtDQur2Y~O z%u;qtJ_QKclFScB1kF?i9t*Oqdc(0ygQN3Wo*nB`wn&)6{^n<#%`?pkhVP%WHWI5B z#b|;GXpT0>FD7PEhd$fHZ#8%K#$EO^l#7I2cAyqjIk8mUA;r~$W<#0^SNmezHD-~R z?QZRZCDa_@gVUbUD%>}%uPQ&fh2ynGfFBt~oR*O#0Q(v(hl-56;_&?LGy%e>FN<0I zDov-=GItc+4+o;524|O!r=#c#$+qxm&sq0hF6c&hF60B+Ec^D*naZFY7GVmtD5acG zN%0H#L62BFN@?pZoS!|eXk-J}(NU|cN0yE1qiJqBP{Mpd3U82dR>)q#mMLcK=c`jsasaYxV=p> z(N*G$mWbK`^$lL=+)+(&ugwGTn2o+|QmpkHMt~70S+?-}30-1>+Lc%$+O=Mi)j05C z|21*7tAmlx;gn)^s0Rt%v@?$cXJvhI87iBaY}3^o1cw)0j8iyK#>IYf?IsjDYAC@? z5#t>v$m+t~z@!0lR4Xinq`RKFBl_1j2cT2z=c1mNWKmqQvUylJpKYIaUPSA)X=`&i zr3bu~AYc1#NKZZD`~jG0WuXdVcL;3%Zbb6jrh}DyE#=7hME4cHqw)OWLxjkN4g*!6 zNN(|L_14gxofHl1O4{7@=~MHyJ81=u6@A6Oj|&VGYToqgyjGU71qArgo1L|i-rK%; ziOCHvmZQf7fU~+_CgZOpQ~U0qUWgDu=qRZ~R7i=luI>16N)!~@_SGE{`j2>^HT4iE z0C=IxJvxYWO?C}$!_eYF&z8#uI7N61B^TQ?WhuX}0Gu2Y!`Pv{&Z3_-Q^;nAffKXLfc6fSfeZRcjBNAKIi)&Rd! z%U+4OKPf&eqYLXSZ z@1PGuhszyL-hS=IssO0reehbP&b_Q!730k$78>TenizU90)opIt|e-Q>B+4JtkL~V ztdEHIyr7HRsEH2C^_6u?m*5>w{9ne#=Br`84niFBBkJ`+Kooq&t~*bX6c}i&qqGuK zm}!{=fu${Y!<16gg&yj=?dqAyeIdXxI66gRE1gTJRP=C8K~HT`VchR6^Q~!fRb$)9 zI(0jb?*{Pv-D zZe3EWyoLuw8)ZjCtePDUF_yl*!tUI~DRmDnt-l5lcNu&?bs3757Cl!p^r;$(FMIR&H9N@7H*msW zZm;#h@X`@uulHhwqGmkGzE{BL+@Ki>38Y#rM4h9kv>m5A%Unb6VFEkfq?Ch4cj4Cs zPaqjIH$1W;zPo*FqXY%_6ihB24xZ0_!7t|qAd{9fUMCE?F;ecmb@2>|1h@gnq(bn+ zQsx&g+RcwIxRb6(#VweWNN6VoY2xA8R8Q)!R3<^L%}j6lF<2wK3|+QNLiR3I{_VTO zF5G?q*^L|IanISq|6{6Y%2H<1Fva^$axld$;cHREX9b~OISL5U#RW5y9R(H-2z{&eMgRyBc!JZPV*>zN*8I@q*|kt08qkP$ zYeDZf$^SnFfS2+2_m?dg8Gg967AE`WcjwZ!<=jb@t$h7|{XvRV4$SPWf9geZj)&=W z{eux*pvpWN$UlsIFWzz3-H%`*Xk|_7Cmg)EOX3`@}hL)(*m}Q7f=d;yNF7rSEqj9LI(f<|Y(5m$V-H ze(;tA%Xg)(d1Rq~NPM_|sAKWVYIgY{k==IHSsdR3XWfUyDp$1f#C_*Vwo*Nr-nkVr z-`(vrzk5QMy<+GiI(~@0L}k*J!`Ld}00#du08z{x1JKR&<$Mv1YvH;I#oY#t$F?eb zc!z9LjUdk0iKK=O1+8prcf;Ep*cO%-l#}9sF6tqdJ_jaX%96oWZkYSRId6w|G&cjh z5#8hGi~-hk{ghg}%v%)A3_^OIpU|vKLIrIRow;h*5C>C&Gw%Pv6r)vz*D4}!vyV2TT zrKDi!mG71-TFh8Rb1jo7Oo{saNNdfG6vKKe*udGd9Timpg2nH1S9yGgvmv+bssecw z{zdfC#VQ={80z?ndF;1v3Y@Yuf#pr}Dp0GY-96-3h9AbQ>iM2$M~C+T)>R(bN^top{+<|b|6?Pt%0urVEe z?3EGBXKW4{V?WnHEdghHIUqE%WAKT~Wt=5uZlmKOHhOkNP0*MKVSm?s^) z!hZ&?WFu#qxOdE|z2waqI{P3v_jcwn3yR|vn$#~Cp=+-NnU?aR8~q#~7GaCq=?AZfKELb_)V#^g)E?|y$=5at+5+Egp>N^r z^X1!vSwm5|n968g43E81!ZYvmZzp_FyO#{|Yw0S9T_gdKTe*h$YL|4Xop*@Rssnez z&9jZV&t$@mp~>!I`YM4AME!6Q$ydZMarc5j-cY?Wp^``9zJ3dg1dX{_H~=~Kga7Sh z=RcPe$j}8Y*x$3Wtd>AAILp0 z?V^)S`M3-6c5{ycd#oWu8wa|}1PMI~fQ?2xKwX6jAvh^t+A#zij${-J@2McCJ}O{F zPkHDQN2r`;zcFN2|A)3<^5pYXxh0**sj&04KL*hJ2-b^|8Mcve+AC4A^^b)+Nz}!C zRe1?tO>Z6GH3rV5Hji|0dlott@0@&_jLKs@@NKhXh_{3LA>adL7J`A-;h-G!Wtu0> zuzs%$Czrzv9tarjE#ECTUVj!i#9>c5*YC>3?R5X~CBNi41d#Bbh)OklBE`$g0*`c^ zUF@ai>pOEKi(}ww1!O<_c#86;+4D`$7Kc|h_TsVmDKI(%(jT*wPuWm18ol7e9JdQFYWF#oyVpmlh-VbhFxxnZO8${Uhr~ zwma}{-_0-GLzD(IbZpzDN9?L=XSBrCoxJBdp@ow_!Y7ZI~eO{wA1#s?Sd^t-9~<%GAU`1_Qm^IdC_(V1T$ zf}^9kqpl^H&g^5=yBJ1P zkiA`^*b{rn(B7+2-R4-0ruPmnyGu%jk#hGXZ-`>n9_X8Os;zcxVO;Oe7Vx-6hypc!2{oT{!!RNUxXY%<MbH*6YsO+OL0Sj-PEw1{|`HojPHwr(+rb?(8K1bCMH<* zAjn4)+mS$^3{heKp3&qd1Md=;tDKE`M<7rFt}ji`9KP>lo$UVEWeRZIYtsS1jPae% zLaS8O9XAv)kUsnGBdQM0+03_)aC=XyOa4_t0T`@egc}#X)i{Ok>XR zp<&6d7u~{70cj+a|5%f3aP7MWc_Sh0Ff0H-{mVar_BZDNpjEo#U&(L*V)w69%i^}x z0+?YN&#vG!$K+e_hBZR;_qjJbMLEg~ z2XGdU>FI;86j3*XfDI=uEiL6X-$-5<-#lW~WTTy||8cY<7;l%KdJLrMglke%IIfuf zG-G##{UYPc@lT5AQek;em^n{oF1zpuA&Ufkdr#e|tq5`~%BsVcl4n&8?c5$1f$!F- z18!C7qt?G#{S6s3wuG0cgKmuLt3IEB+TyihUH5QM5-zMH0&~+q&o&W^S>Alr=?zej zLhJ;5@@lzVy^e*9>uO;8_G0Lzn2=d*XHF#m(Gz%pYS3@>@8UdKPD8abv^3~M#{TMF z!ZGq3Y7E|OmJ~ajil=hpvYuIY&UI&%c-v(=GLP?)?5Q(!*qO*A=?IKUSDNuZz2>mN zc=bpLpE}RX&pAbX&o4=%Alq84JOz-!tN`8|Zm=w~&tXO-0n*sc)32|ciQ`dX?lmAF z#3X(YV-WfrchSqRAZ3U;j<)&KPEUb9XIjM_??=%vK@SAvd9o=psxXFzUfk$~w+rzA zqnU-|2Y;hth_hXHR0a?VqjNH<^Ob^k;ANOpM~``MEuDx|P}y-Z;PP1c&BB-D%@R%p z_$PCBM<3}l2Ii*+e-pi94N>}CQ;Xe0*U)gFQ~bgE~Js!|OyjCQs6qeS^&F zrzWu%ngd$`15=rPRUfGg%P;;>&6AfXnxh^D(IM%}lxc0_Pt?L#+#*}-sPfO@2QPfz z+dp&QPLJ@mDE8#)%B0Hl&fK8}ovEot{;V{Mg}Ay+Ms$Sgd4+HV+L<2g`V!Q>c&7^G zW^9wCfcoVzgMGekl1$fVyH9uQCOHspIUq8=F%!s7DT3np0~3myUuVL~5Mvsw1^An8 zC_-JD$ehTbn)Cfm?H9uwdQKq_rDp5+nDUL~$>k6L?-i8Vl%?;M8 z^{! zrH_V&RlYvBZ}#1lmW3i`Xe?KBvhC{2%5!cP1V*k1_2Ju+XGhB>Pzu{(l`d=%y2+D}Z^)}9HjGN3&6KhKWJ6+s$bdhm^aLVgUxM$)kPnU;1r zyQ|fmJ4O@z?q^w=fP>Ow^Q+MToYk%+KlkF8db#@XF1*jU(~X~2EEvUaOJC92=m8uP z*e${O#c~|II)^4AfGZLFIbC&tYeL)$WOb-!OvTZ%y;5^D80gxv_;4>dJS|5o4WP3M{6RJ%f25D5-* zusWEaiaXWy9D10NYHcwcG!d5-mn55wh$*``O6?d-Re%W11}3lmwa{$X&6Ixq$up?L zHPQA^miwn}@pGFxr#|yO0+lkVr+qK-5q+IS=uabRj1KuO79t~3lD<5o+5x9cKVyTJ z!$V{q7Y{vr7`G6J^+JlCIB2=c!QbM=toDh$a-Ei~X&H*GW;SHrQ|XsJEOJ6@sN8NW zmqQ?^GlUVGa~fgd;se875U*JCy?Ks7xSk&E&I)!r)+P{%99W~Gh<3gkNE1dFX&zU{~!kav%=Wl^ET53nG@frfhLLD?_xN}!# z`>xLf#rLJmCs$h37g*wx5$4j(hd5or_)%4udIqYzccsD5+MxblE-t;3#$OZ&n5(!` zw3E+_x(`4dZNU0pKmN-6niUxWxmW$-cC;3s8s-ieqqUa30sGX!Sc3$O!2|Zl=D4ld}~CD#$|iW4|m)$A$D=i^y1En ztNvdVeBzKbt}QEsdO8I`$!Ab|jxIhYak}U^tj352=5s?k=lSs#5_E#7%D+z|#wDn6 zyk6HE>e@3u;f|0`?&P@zoMvB2@1y}o5XEX9UtFP~fF6%9b8+MBL|RX6Zt(*U#Yo!>Kv|S-$ZEay^NnYdP1h5_y53uf(MujOF&8bkRKBh8y5X?Na@bfb(w3ty(f^=8iH0V4xicg05o(_#lp zs+3Tx_G{t;q_FT4YlIqyJ_}PhTZ&kLGS>-RPdXdgRs*x=n?SN`zs&T(EYv*)yW=wu9|E-q|68#MkS>9LnkH zs3Pn+=sHK)zjOu62~aZ7TFd`?ofFPV#`zz-o-1oYdF(Mjog_(49-k`s9}OJ=7y56< z^Z!jh|M%#5|4ZGf4ioT$abLIGuK!~iFdcd#{RQ8ClxqOCz~x^ufK$tix16Obe^T2V zCnjX>*zXX<)R@ZXS_r9z125!oGV?5V?d0ZT!rJ&pif#*0Ramq4Sk(ni3Vug^tP8E% zQ(G0VQX9RP7s&r(-tdrJz3=UxjnOiy>uk0bZ`#%_JkWh4++^b(73u!?sf`#25(=2A zO=RGDVNl$cjhK8eTO&88D5qmHPo5w7Ws@9AhOYYPGBbD!yMW9&3qP$}e=0UvG~#rI z8)vL%P6Z}pO3J?fjZ`}Ze{Gpo?aq&T1n|9bVAhW4&9u1<&QHj&+ewp)(&9f}YEY7O ztZL$6+frGIveT((-H7wWecRz9^<;7r^0PJJExIDj1rN>s&moCnw%-_s^_HwrGG#Zw zdcVum#%vcdElUsnk`elKD)!##^%8P>Caq_G6ls7L`L7hre`by6Hey!$<^js^gH;bn xpf8Y!3MNrDeN!sw2R)=z`M(fK*Df<&36aPEqmQ1-dMa%4>uHNqq?6ae{ts>maYg_D From a71f28d3ea3b6ef5f9a81e6210c91b6ee895a5f9 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Tue, 4 Feb 2020 09:33:55 +0500 Subject: [PATCH 07/92] Add files via upload --- devices/surface/images/config-mgr-semm-fig3.png | Bin 0 -> 26287 bytes 1 file changed, 0 insertions(+), 0 deletions(-) create mode 100644 devices/surface/images/config-mgr-semm-fig3.png diff --git a/devices/surface/images/config-mgr-semm-fig3.png b/devices/surface/images/config-mgr-semm-fig3.png new file mode 100644 index 0000000000000000000000000000000000000000..e6993595523d0b945a176b775b41da2ca084145c GIT binary patch literal 26287 zcmce;cR*8Hw=WtiDpK4CC{;v3WmA+UB@|H-PM6?5TeO~v9(74h#}Pm~9&xwRgIc@p(D z(!*k!L54)pv4mAz#2O6?Q~+-Nj)$eOda$lyZ|*N!_wDbF0XG!99%Z z3YvDX2cw|j5EATQufZq&ASiJ+Cvr=3!0TXmUk9<>63{$CJ8gLs0MJtMUJRL=3!5(E zn5jr-8crY3dkG^s`^!1*V6qWqNX@G`bgN}=OEcbMr97sYQH2L86*co%f zD>q+84TDcydW+xP1ZB~`A6VUD45bo$RRsE@glj4EI%c_T6axmjM5+Nk4=NPX%F1uHO4kN%o7LMFU?1;_N(p?4|vksDn$1vy=7b}RgpGJ8h#dQ zjok)sudl5oOzlM&MiHdZ1|}Kd)?5eF-cx-5?qDZGpcWCl9*fLzh0 zppq}k>^Z0+JlhD_o=YQ4Oh#>q1}+lzp{auH)Xf5BM>))$mT*wyTE6mpDm!~DAGyb~ z2iXd!XE#3b6cl*7K7~u+xYGG9#`LgeY0kk*NeVj>lb^syjEo3>rezc{CraWmI;hCj z*bh+MHac(x>Rkj@yv{c`3wnR?{7~{ErjS!NUGuDij@9WN^ zO3#0PSY5L>kdgKI{PpRB#%t^0I%o~2{_O+GR?>u6a)SkqG#Gvl$uB*Rb)%^9hRI0P zAB$dj5cVN&;`wx3)RQaIC|y~h>SG9`!P;XGA*dsc;|>$IKTPD0b?QM0H>>_;lfla^ zdGKsAb^@4tBa%`+W>yCzVItRrk!G=|(z4#dy<~3)lsi?^!k-K4bwBFf9)DyuGl$+> z#oW3P7hw=h9d}3#j#6*q^f32i15BRdZy%TXfc53(U-ii6=fph6qsv77Ya3|Gf=VBD z`Qz;%Ni}rKRxz}4RrA6h$qh9mWL3OT{Hh<6AQrS5yv5tJS=>qc4lEgp+Q`HUE^CLc z!I)k_ZNoVSbWvr}ful8n!avVwIDI@8R2wA|u|59iCAl2_vEkUy67P0CeJ8!;3~eK! z=y$u+H_Wj?BC!I5LI(xOUEr)kIXCaI`9x$s#6BZM>2VctPF-##t8K5k`!1ZwApu`a zZ~@nIGuY3=WKEt`&-RDyaAl7xEAe=P3&?=>TuILMo_&Y@J%}c=HY`f)!Cv9d>V>^+ zuD+8_f|Erb)k~v%_fof~Mg}<}ToJ;6>C=LobAXkn4kK&A3cyI3d7Z&@SnZnEY+k=Vt?Fv>!EjD; zB*oHm$JU>j*nB`nM|A^DroMdy%7sv-qgfZ{mZB-=E-_lLi1lzT2&dNH2 zAA22ykN7orEupc?3G6^rQUk>8{pd8v|pSAd?F~r)Q4GqK20d zGG3W)SQEHewudcUV=h`!LYO7Z4p$HIp$FM*2Z;=y(*VFF!4-lb__*Tku^m=aY}``X zW?N@PN#CV&U96|4+}c8{_;m7L50V*KjYtMgbDR*lWQ6;JwU36r90FZuZ!6^BgYAtJ zVsE4-HaIoo7y!_2u{-efK+<4--5Gfpf$#mR2>h>O^Z);M%xRZ=g1%S|4i3J&uDoXP zbddNW3@TYiT?;>`h)m0*1(FMdm50v@w5ak+DX7A-E?Pmbc8XUX% z%65Fg!((OOm5tq-vHXqS@qD8m7e}V;8l}yqeg~Jp#(5W7u=V}Y77K=1D4Ug3(m8-< zQKa@X(Z#^aIKppj0uSHF^hX5WzFr*KVt2uxJpO{7E^=16lB>JQb8fwak56};m+2~6 z3%2r5@wt~CrPTgHrqz zTwr)wFeg_kjZg9JUhsn(E$wP?KX+@;`g&oTLFa9I8(Tr4r@17%u|0%@i6pdMuCOvtx56)oF=6v@_^|DjOiWT8-w|c?U#x zTj3_1s}xe2#eWg>w-*}Qb~-Ry!y-uUHfQ6hp!PY!D6f zZp~Vvd~=UizTyr?{btYOV$_j8tO`{*$a>ib^?P00c?x?b+&x}1ppi(tfDQH_`fOF? z@FQ188?R%%GV1**L-dQ0!Ql&2gw$tbOYh+aVIK>qC5!3ry;5^I7v5h4a5n~M+rdeN zwZLF@b^)?Kp%o$W#>2j0ZE6-m)E+jqY65rONOnF!DZN70=p10fd~6i^r9gSZW0{TK zy7-VV4ifrH7Y)_H1_*2nb?9P4Q>R)a6`ziV$sow;!= z(6C)Eb+Y?*zNC4X&zt;dAcKA&r#>L!gxA9c2i<4&d0dCyS~~ac?$W)>(6CoYuPH+ zE6Ga$5FDpU?W+GC-ZbGpvi>PFQJL^FAQkt;B^I%&H+Vcp1FyV0(^;ZZ*}*nPDIA4R zT;Lq##)ejp%2oMNo~pU1kL;Jy(sX$#WnJv)_bD;u--!#$qhawA^rg#<@m{gy6^7v1 zd}+@LHCVE_HuS+1^=uZ;8b;MdM<+m6G040x;^e0(83UD%U}sXBiC?e9DD(7^QYlcX zzBYMG1m9)`LQ%Z=0T?l&YUb3fTgBZS9ziEMr3RT13iA;%vAtA@9ZldIR|f{N8EjQ@ z|NctEt&RqrM41+juQ7t(5*s)kU6VAqa!?vxpe)v{@s{}c%HYQ1&N0%!=glfmk<9{$ zoW+jys(T&mbMfP3p`hW)==Mz79H_*+_tT<~fP|LH0`WJ)+u(=z5NjD1G}!;1tc1}> z=<9Om1H~nzDP7Xu*}@cR;q4|>3M^|XD);73;NUBdum`kL$G5-di?%T^Z)<&O#@w*0 z{sHa6PoSBckKFozE6=w-O(h1OjE>t(Td?)18j~`j5jxleS>d(XY5OpOD_jbjI}FNV zF}DGL=(Cq!u>$e;OaJQzxkdLy80+L-P-f8ELXE#8e*urAVWSEFVEoQgQ%AElyniq` zY+*Sv=C*k+D0*1)pw*UD1AC}%4ah5U&0R2Lfsy|>!Q4GIzj7WT*vFza!+%SL!TEW( z5}ohfoS4k|941>f4O_Q@+8oY6?T7CyE|Q}D^Zt!JQA?PQ5zR$PWFe$xKUk*BZ5g6 ziQ0dbwmgCZ6K2EJ9+Py4t?B5mw)&Nnk}5luG7I=AfR;FvSXw-7S5vTUQ@-Wv`Brz4 zPw_U6_w+MXStjBtJhnaCPgIjHT3x*689d@vf)ZEab z1IC9xYYa*-WV81eak9ep^AW+eDv080pW$WeER7GS@p6@V-c8}rJfIKuCx*NtmXX6$ z1+-7RI_Yi8+ip#Xs_tO_W!El0o@XMsUICie{uZO#Vh6EEB?o0pERcK>{q-F~t_WP6 z+&rI{ZPEYgJ%^EJPmlYSe7cax`mvgy#=egTxuU)YVCA`;nJ*h0WfH`q*gvcJ*TnS@6Rs@f(3NWNPqPq8y6R91 zc-UUSb_Z*(9%9^^Fq+B+z^H1^G$bF%tUsY`_h2|Wjz8sBuV)?`d#i_`cuOm9$lc-g zY6*k$%9@F2D^mpwP6qkrW)R_r@(M4G2VSv(TM8V}eJmy4>`N*02W$JfK~Xa9t`h}b zcD;Ly!AJF_ok=xl?^-ukElZ!A$9fYux}u|V{Y1WM3ksN;$ho zl(j9IGIS%oCsAC7bsNYCRD&M_+*sf1bukT<6gSQAbrtwj)C!$uCGI4J^Jn#@paVVQ zsL?V`x?C*Bn{QiHtxt8(`J9*nN-g; zMYI|lpq=l`QF!IqnF{hQ+xk*~XZFRCO&Y-)pp^f7rsFuaGuTSC(BI zZRcy1kbUri&{*LDXVzaUD2<=KUpp7Y-y8!dh%f<>mj$DnvTv$!BsamN-*fDx$0v!Z zeM>AHf5Wimj=H^Fq5O3cRy&(Fb}1hx^8guWObmZenfKKu0py3B4t{QJJY-EtT}fmU z007j6l}^vC7(u<~v}3dVAT3Sny8G?E!jt%>pQs9`vY#w=Ma--RWG|@MbBqHJE$otU z-0ype?^ia$1gIHD#5Nw*=WOHXxfEMn1-MexLq7}8hSsKY z_0Q-YXqnXM^_Z}hd%54Unl(IY9IC(o%qiHUIbt8iIbTjf#`i6hQh2N4i# z@3d2INy-?KvV0KISp-r+5Xl1L-@cVJ>#L}!RR{=})pu4PUf!`#^usK0Q26YEb!uMv zS9XQnzSrwW%t=CC!|4Yj@eNF-rDPa8DNJ(lEy=QuOa7{eWs+C<%mruSB8R5s4Vb%H z$on_M^FYYRJSUk|Z9V;tm4Yzr&PzjGj$`i)YY#O2*_ZQkUU0}6CYWm1412f`PvSu+ z&BJOjs)AS1Ik*H{hwzAs)bp>vwh;Pfw54g-r8>f>^X4DURDP8r-;2R*AC&FlPaE7# zxCk(=SLG^haDVD!5{t55wg9Nfny!05;8Y>O2dwE?o!;MOD z6WvncOsn8zuw;4TDrxEaHKC9a%X*i)y>a{s5tER@@qU!e1q}(?r^Ag{xSApIom6Qc z=a;3g`Vs7xmz+IsCyC(DE|lb?9N+hkss=kpYrcnW7a*8NM@aK0LfR&-Hh@=1<@#YC z8=W^DS_W_8G@Vv+dES9$m6y#fSY3u;ngUh55FhTra9G~nb)5^Yly)gUdX>QP=r zjvnv*(2O@}8N&lh#cB=K7TR|579B-B-uF}E6u8oYBG-TEm1W#Wa)Yyv3t!PT;LsJj{PIJ65Y{@8spsx^f&>St4~ILeKZprg;Fk=XDG7 zjH#Wd9$1jJ_my35*=Z#B%=;fcsZ_fZHBlGV3I8y`cic}5cuW9fWx7*alk01gaS(lH z78|K3`pWR{Tp4&vGtq(TN*SM7!sm7uoGuX|G9zO96_I>eC)#jf{%ercm{sJpTX%V* z{;c;X=7#L3pYo1zbZYxGn=*(0?q3FE%lNps5B?L~}v90Al@ zpf3%zW;Zz zAL2GQfV#X_$2+A{9@wv)l68>NcZq?mwpx68|D!C>4usv)34U1|-7oy8Y4dWBY^HeB zP3^aPCksdNOgyS(li(}>^NmtChtEi{2zqgh?#R#`(k|TVS*Vfspe83tn!0v-)e88b z@9P;oy@TyRw5{AR4YL}(8A_K4km;P8YM!GU1C;36$2O*XR59@QE*e&oh!~V;g!F`8 z%JN^fN5$G~M+$aP)iHEP%&Y*tlE5i;Z;F z=pzu(Hy$LM)vW*PdquELpnbZCdj7|3e~MIqofD`j)J&M(VY_P8muzWAqXd{|D|@># z1^>MJ5~w;i-c62jA1!3NOfp)qUo(6YU>qoe8dFa16@q>cfy3N)^_FgDir8i7E!`Za zEOpt7-jgiT$M&?f^%d~z-7ZRb!RQt-tE)uWX)0OikH`Q3Mkw)w$Q`P)>`-&JX%4uh ze{lQ*+3EJ5S=XD-HK(k^cl>qIb2mVuUM|OMYan{U^tjH3XM`Qclp!Xw0BwnL2mwUf z>czr7UU{-QtiCw@U=FgmOAx306@t^*79ps z^{!>D29xAuasO=pAuaxYK{|7g;-i4-cUianz75VAPJIt8*@l~)o-^jfp9SPL5E*Tr z{Rd;k8Vf1DlHts)9LZOmS#Gl5mU5!-(nkPF^J#9`Vz01Ah`e2XM*o>M8(022b*;Uy zzv8v{*Wrk_l`bLE0szh)X=M2I_#UrRgz_3m{DT7 zce*|L>7qC)Z_-+LlNpq8+?6Yh5}&kl!O+hBD88XXgZex03aW1zm`Bm0zxTHEiSmn? zm%gDsCL+_#1J@L<$@U96U3_n;U-&INGD7q!{b=-EQ51ib13E|zp^%$qWc22CRphE2 zH~Q9>CRSc+yti_;HhwCJ)LMYGd|x&$u_A)rBx9R}(}$=u(h3U-kvZ7BC91JdgZX~9 z@ikM^+9M;NWz*_}1xEAF29YjIdkOg)(-S@aJ$Qh}nsR_4!kS=+&CCDe}uxb%)qBbVCEilaS(91hq&$DY#+FRU_UB7quen=~kkFi-gvkhEt6ZYcPQh0Px|(bWcZT$m z%NIp*@Y}XVMq#NNul@%md|D#AX@JT?%@o|u_SpO_e^yIr!}*|F}G(1Y$7JotFAHhwIHG*+0) zCi8M4e@QVC45O~7%uw+5r5Z8vH3{Tp;+W2e0amq+K7DU+iXu@haLuxA5Y;sNLLW?& zYf{EuRIY{~;=$B8MKS?BJILQfmNfvDEBJcbp$$`(-yN%V8i@uk9rtyZkc`bGzP`v2 z?qkJ;`PF^3K5~e&R-;l`laV=voZ)I}+g|yk5jy?CD?zi;ttDlZn-N@-Dg zvvsuNNW}K@RLWccnQ2UZH2iQF;r^`!uCVJ-n~)m3x(;TF@({Tf=+eFM=8P0N2G# z8C_`P7c3ucYoaWFsnxN# zZt-yzmc%9xZYpnXo)jCOI6_V>MXlV+B86WYm2Y~@c&yGn`o8lSAyGoK4wq3M z<+GS5{rSFSt?iHfVPB7+R=vW2&HW3lRU*^Hk+QiroXZPlfQ^tQ9=B^ z?LH2EyYA6=85!N#~nWXBz4I~K1}RFLO*dmJyyKh4$~%Q5*Y?tTE-~boJ)=xaoo56Yt&iC4WZ#CaVfA?4zXaya4g<>zjrKybKVSU$NHSKaVac#+X>ctK z)f+iQU_N(B8=U^R%#(g`Co@j88WG^|VKNV!gV2=0IBd_pYTR8Zhj8=LP2cf4|{?BOcHb2NMK?z53i?-!^j3nt93v95uA3K?FwUf@L< zk+Q)@iPdG%pjT9}n&oCH9#OwMj>-c1v);g>re5`Fh}qt{YaJQY|C$nbQMtmQw@3UK ztX@O5owGjw=xrW%176noOXbg*+`dkWj^!QVH-sO-Ct-WS_6w@``Bq%bUiufGaV|tc9Dc))3Wiir;$`+F+{0Hf+4IiQ0i+|7WFeLEx$pXLFJ)T5yg%B$tdVR zvyP2XI*YJ`*KsD(z{TH!Uy}@Wp@vd+Ns`|k>gIW2Z3ce3aIK&3?>+uXPBhQ)U#f}O zi2(PUBwDX#7O7}*JmWl)`$?MoI%7D^Y+)h)l_i<{h+? zySLI-L@7WA4SLtY2-1SJ{KLyL9ftOwUx%N)PbH5tp8oDsZN}@n(dj|n2Pd-5L=CY8 zuT89a!C(;Nt$cRN*ifEJ-X53a%HJ;SH>hFx@FAv*{>5Jag*)>alT3Igc zA0Pd7B>Lo67Z#O!7Z$haY$LShcm2D%paK~Wdu{=r4l`#_Z;GNFQmPS~={>3BR%f(5 z(OgF9=)+=4o}oQLZeHVQYBD-fm;j>yz$&nEHd^Hx>Q^`;{WNiC)y&PQ<#;7m>6Rxx z$p%CknK!+Sk;1?jS^Va&cn$3Jw@YxrcoBMX{+aaB)z+=iJSF%AKHGz?t@UA|u)u|jD^rRMn3@WC)T{V=~Zte6Vf?qBsdkv)> zMXWyQ6Un~7pa;sGs&kbk+AZl2MdeKF@LUKB z5V8m-oag&(A|G`!2uw8o-Kkof)#LuQMod;g90zRH0EZ zwLrJ{_}Dxk#AeN7Gd_V4sJ6ZGhj=I$^4QQ4wm3FXcOS~xxa*Jbd%bki4kB*FiH29p zBC|(k*C``EKF>G2A&Rb+R({F8el}pbWop@gn7k54^wDU@?j?QjF#nFrqmzYv0aY$wbObE zZJDm*xn^CKW>DELFjC{hzcM)N?*A;hy>fPv%Yr869sekn zYql{@4~t!J1>U2{6<*}qimloIDq6jp<)bZ&{knM%5v4SISP4Ys!WXLI;-0+w5+Umq zPE)Zz8#TvYnJ^)nr#wWueyf)pb~<19BWO6cC#b^M7&(-#MJfTlcl<2(sd!wdIw~iH z!*SRHrji1bKgN`M@&x~Ij+o;slK3KCvGW_yt08sh(WBcwY1`$N$zJRWNP*Rxm0z=6 zhSN-z_pLlO0ldeL2t5}fRx-8iXt{f>Lv`W;s1iz3ceP)zuej<*Uy#8HK17_~(^7t( z&cD(`xu@^wyPtbqSs?l9+qHMKK}|)8lJ>Gr29<2Gy;}{EHw=bdzINg7N~wF>Cy%mm z-5?n8g+1%e(D&tklj&(Ytguv^y~M4i&D|&r3>%}TYH?EPT)31TNDHXQOS}`Ac(JE| z5f%VZRuckft(3Fw&sYq5DF1$*Qz*^-Wz?q*D(G2fiPANqd6o2ecZ^6n0Bt1{E$PIE;{s4Y+MdD?YW9RoGZeqdCGeGh4=H8Vy_56XwGL= z9e8&WGvDZ$Fix7?jOU`WIB*@FD^g-Gq*X^4gJ;-z+lfo?Ma$&VJp9i~QKNp?y?Ce= z!uhY0#n*|;e5h;C$V`RM=-VTJ_pIY+c&VK^a_h3}ds3KoWq{eJv0SF-S_1oOC~2g< zn%queXPiCFrKIp>BHuDl56Z}sQ=7zQ$3S6w!+kB3Qn@-;sQVkJwNekKRN2mvlY-G6 zA-^MULl3Mr7=9_V*%jO)zFyI)KaZckO0#?^BH`N#`tsYzFDc^5D77f`-CWtgpl%C&EUyf*TSuyDO6YUwkS2D-y$D*Uu#!q_7 z3(RQ8#dQ%_is1pI*k^Ir?F4oUZf0WGzzima8x9WY^d$(3MYAY^Yxy-XjoE%{V(}_# zZueM(^@oC*LkSd6Fd9wk%KLZ-*LP@jU_RF1lQ-@#PwW1NJpC`tg8yC;{Oe-jf7d$( z3F>>Z*uRaCk0Kh#GRkZZBn>lvZVhX$r2rh=!gd!@ann6O=FWWBVwzhk?eV1{w-iWI zlPSv@X>>?e2s*`9zcbX5{-5gw#>a|{a)J*L@bke#iX~U~%MrmNLd4gXI04ZDx5Kte zXb|qk69*@kwJHy(e`E0xt@i*<%HaxXah!O5xb3^Yw-t}>wD{MIjpx4?h}Li`Vl6nN zNkvQ5Z|+5Q6f>0Ny;MW>%OY16l~y-;MbYxZ>hlQLQ9q6UQCf~?eTOIO&jNQ>UeUAK zBhgcH5xjb*<_<-R5>swgRnPkGe{%M^P^Bej622YN0&ldvxw7AN%CoO+^3b?sEVz%6 z?VFXGd&)KwpbmKH&@Ir+V#D!8mHsqfz{gqbmHF$<1ZcM>O48*LvZh$6-|Ynt=l+ zrJ}O0$2T@Y+UKG*)so;fI&i{cf8V6OS)tUy%|I@sfgoK}CsHv;q(71K#aSO$cF2v*7X(%k7gfJu}7qvWeDD=*LHNA z!LZcyKgsVhfOQ&yf+B79*Kf4^AkC_gH~GR&&J&NbTxa9E9dUfSS$>fP3mk=<)HL%_ zw{Vum@59pgnda%x*+Yfo#q+lv!4h}Xg}l-E8})v19)jPOk4bdd26tBU(}QNCPnV?( zz9~nK`QeL1QOR5LQwXSCzvVYXs3FNjIAQr6NmKAFZpuGa3(`%{xP~q0KOVmu(H%NR zyeq^8`2K}uE|?V?|8DHrc)!xioITPrv_TT$q@8b{N9MZ&jBvlkUj=$xHAo4opA>Na+-zTeSiBvZ@nxC4z-V?^X3&2yvWBQR&W z?Cf#An$A)941r$x#x3$p-yVp;bEs?%}_nwln-^?)t zhIJn_os0TCO3luq#GA3}UzynZph}MAaEUFA6c%(?gQzJ*4xT6V;h;l>4MnGVY@A8v z3$b;qgFem#Xq0{BjRG7{bHeQnH1~N}=EeqD)~kK9Tr=VUM8S4O{oxJjE&i(WeJynY z8N@QXKjqgJ3jU1DTV!Lt&R_#vYWXKVykZkH=Jjbm@lVXS0mNt>Iu(CLKU3vp(aeJX zx6E?nljDzf`_}CJ0+xZhT+~DF%Lf+vi%=9KQNx zH4qBWI&s_&lj0+TkO+#pOPhQN)hv;ukx?3uFjHEa#qu#G7}w~BY&KvfJUij7WdiWc z(HNDM_Es%Bb)DaF<@Zef$t9V}!McEFSmB5^fcHslp@uv-WeUDJ!l)6Qqm?kkMaKrw zec|r-*3t|b-phaDX9O21Rv9u@rM#LQ4BWU21(O zX*`ln4hh^MKaN-uHtWF}_z*%!6Ct4ScM`Q=-)g)P{Ssrh6mMY6n z^G;jab+-4TBOi|$(ufmYgt2#y1W=o!s4F&uMs%_~qPDU_%xMa)e>2s`c_iu{>?9?@ zgJyfsUDuCw>Dy}9m2G|;D8&2<2iF;_1=G2NZB4KeW6q5I4Ao)2oR+yQ!H4Yd7K4DR z=j$nggpq>~T0+UyVC33}D6+X4KjcDMoEm)u?+rsTSCB6nI7A^&A`UQinhq$mT}CMR zafw1S*^_D1wzl{Xx07&?l6_m@22y#D^DP;=87m>6aOBPD^%M{ykDe2#lW&BF3BppS zCAd}(jr~<=+Ubx4>nK#er48Ny=uHiQDIX_s_2Oyg;P~-EZ`thL<4U4_E-%8YR-0%b zNX|X{%^*r&6z2F_zg}0;jx-L1Xgh$iL+=yz`tBWwy@Y+{Y6#KiHlY+x z8r0%|u3XpqYk^|H5g&T5qPq|@k_P>HcAz&TBQV04OA=4uMH%`SXjgN|mNYxX+>nPH zEfb_=1j_2XI?dPS@7GbW6)SCIiZgF&rR!Hek;gdpJRM<+JvR9u!ve|#GmWvh00N^K z%?Y1+nQQRv@~*)cnQg#>nvqoeYd=jZfWSin3tBX^EmR!=sPSqGt>)(5ACR`8>h!l1 zFN@S`&eGJ?_lGP8*qqk`i=$A@gmS0i7hGNbXXw>8l4%Vf#>2+=h1ieT)izV#Yp&Lt zv1XAQ)Oq|dgwWU|V$53;^vqPWwTU})N4(94x4&gcqt=Cc;P`Wt>r~yzr6`@z6`J8V zN4w!Y?s&EDFFa|j&i5N8a0>mj&w;Sw#jDb3L9~djQS5cY6Ku>IBh3td=ka{3HU-Sb);*%bhd#h^q1 zTT-tNH_=yZ!?4}~2jW~Uf()K1h1*314H4@aILqbz`&fmsV92!R2CVXny3@#hNGf3s zNIjA^BcxfvmN?{an^7;=3~zA|ZI-PA&kCh63Q8eQ7)QL7lSRB|WR-GnSns~&P)-Gn zdePKP4hUx+k;s-o8$FCE_~aRIvk;aiP>0rwQ-h1u%Wwg>XNG<9ioUYom*DkAjK2L! z1AFsqN&%G8A*uWfmdpX*_xX+I(kPYm^sBX~>^}xLFZPdzi5Yx@)fu4lzYAcE{Ur_RoyvEmuG^S zx;SUg4@mK^^vm>&4GMmevIIR5enhiYXmu;f#Wa$i^xr7UA`NF+{1vu$c3?}qdn{I3Hna4vi*zK=t!b;8~el1>_7-V@W+};Tf z(MHq?it`wC+e}S zq$#j{>#co!j5{t^SkD1e7;Gi_mAbVps_Fr^^G0S}82&^>nT; zB&J5?C`)}Z1U>k zCxA9uxy*T<2J63*`W?kyVJI|FG68*khEJl1bddWUql<9nXs*B@#C*jKnG3gTAaBmEKSwo(l4WQH7ktsP|agJmF|7DSLI ztv^pJgeHp6#B7bbHEeVPy)h^LP%60~a&6EH`BItXhw81a8Q$vYn^a`T`x98=(NtF>hIO(+*rN-wZk60?I?EY+O}sJ*Q&2@EA`Lg z0NyL(QjI6yecAjp+WBdS=)n3-Lf;ky#4cq z^1Y+)t;WguZjM%oi&@j`H=bxlcni<@1Sgbcgw9vlWj`)`&+^E>L~bNBMPKu2@x<0; z7BFAx%`6cUw11A&!9IZ@`8)b8ime$Rr+5UULYWCSpDW81SESdGH@XrxP( zegWw%6iyjAij%7;Ha2SdnLNkI9ig9TaW(w9WX0)>b~?sMl;^?;9WOtYG19#a5k^RohS+W`x}g-y_&?!K%u~+^$ox4XpF8_Q zjAJtQvdsH+jVl8g>uEPxh2meYgKD>u`)W<=b$&-yk{(4SJe&@uYJ7E1e}i?WY}WCu z03TchyJ>8b8}5;LY6;azOWoLFP1}Jwqu$>ooA~%=2`5!`6&0rPo*RT1n3uq3Ir8}~ zZ~R0+wp4f&0^Q4=UXXd}q^B*uu-E~|&3jTeH~yRu+)y>)3|={12< zapz;Vewv*MT&cS~QMp>v{qq>tknWJqC`o$H=3PI3B>0Lw-RGvsD6=O2T$dQsM)&Cx zF=e5V!sQNml1|dq6}Tl7W+WHr1ii2#cbD7vWt_q^Uv^^zMnn{1rLf9@KK@6igoTuH zrd#O3qCwC~hMy^};{3v6?|2d64eCOls6P_U4fXbO;e~%hcmBe;oi7ckMI5<4o%o@S z;7c!5la)}(c#_fiLhQikqAnV&{YBwH;^H21qtUP_6W4^GzX|D-J#VbN59bHN%-gezEVkg8tPWqe>uySh6r~TvIPO>SK4KpFkA(enn8ix6 zf|!2E`L3IpEJpAD)M?Ig2U|#vVW%q=f3kecBu{q@%hrT%<_TGcEj!VBw63584?nPh z7rw59YQ}q1MR12==sqr8G$JpOq*>^+MKG^MZiu8F3#$L8m*rQH&X3_AtPUT6$+_7v zzIT}ySrl22wt&E71!w(Xdjz&Q0;}IY-`qg^;0ktxFV$JtRmBtpvbu7TE0K~_g^z{V zA2s{9=6B{c?Xv7gB7Yl_?I3m@BCsU$Rspwh<)T*V#wR8D|=G+d7rXH+dTWXu9ZMXwZ>yyN-L(&5RjCF zmW}91MbsB^Ud!Koe+@d-EYGAKF~cu&|kVB zYhqdFW@q)sS!-FO?FoS1-@J80iyC*AJ$m#`ybbsT-|Ft6Co3nZu z$Qk*y9xeJRh^uUPmEgWCxP1&U-k%P#`sr@z?!b;}&Qy9bU1Jlp-S?I1;2xlj7RdtL z^jPYxhte8TVnOh~$wyHi92xBP`I0PBR^cpk^rTlL02Ar~M0^kh+&Fbq`RMJHyDg0IX}JArYb}&? zdyy;oVb%Si=C-7t{VA-UX<)f{vxP>DBM~%%)ogXI!)U5%Gd?<6+~I@vTB@uDMo+U@ z)-xkipRs&LtVSf;s{+;M+MQa;qqyBfO;5$?WVF-;dK)lhqqcv)LWoLRDJv|y&_u(l zu^7M&F{8&}3Uc1}jp=qX?tx1|eaVxoPTG60JJJGa8J{N8kg_l~xkj${Y=WOEGV%FE z>yS4Cps^;LuxG&A#{o1<)|}fzfVUQRBkLO_OCW#y6Ti&rr|JML-rR|o8Yc$Y+AkN)9h-~(P+J}Nw?1Q`jmpE9b;(W+VN1U`mj#V@klT<}*hFQ@_9jo?=bdeS|zW5E{+YnOi4G~$buogZO zMrmcWwFoR-XKnM)dySRE&u`D1K=BF}3bHhlKmLP2^zSOp=l%VezkB`ufhVlC|8D5T zuQT%f@M*hJ%j{LjL-gc+H#z2ZoEa-*++x-F|Mj8o|5YF@S^jumGn`(-?}mF)`nRQL zwCUN#m&4W(Ek{CIgpW+t@Sg<#fI?7cGm@%3-9ljaD6>{1dTVKz)c*X~-f9SvWI8&z zd3Yp%49n}U=Cl7-w=DiAk*SFoen2On(MV>{!d7Sm>*q$Oqj*{ytu#MhM{|QmGcN=| zvInsmc>oV1{(Io3EWd6E-6{fwZ``Y_tSm($9gtKnah;zPB7w&zx?KFJksVwHVMD+qoiIBU>(D+MLrwn&+-tTgbz>?`syEyGESQ^Sri;vog58EEOk2AfM(Ysh#nsRP%@Lfr_^hCGCinF*t zJt(6_IN|h$Qdm`!u98pCz1`Jdvj5x1O=e`!TZaFj&zoVG3rWdu6CRp z@UYG!c@V2|9>mKa1kcAcJ5byI1!VM|e9dY*>6$f>{`0T0@(;3@__RCoyuqi$ZHh5_ zDPvxWbzEk_KbR8-S+5!l^g>EFGFZOI)u4Nnbu3nJ;`C-S zrRlXz5@ZPS!F98z;jQF!1IZ=D&e=krflf~0K}b6?Yz&%D4xS&&d+M-3IeQl-4k6q` zgSx4Isr7tOZ6SX{-`Ca`e%lwYbY(ya`zz?cqBXKbe^=WkPk1qzeImX=3ViU8@;2M7 z6KnLFVi#zCHLI86KZT zo7w$)^L%)GfA!YO|JL1kMm4!@dmlw%TM+kF1c4Ad3T!}NBTc%9C`F1?Aruj%lYkI< zh>8k=5^17@D!l~|5=tm4AkupR0fK;6uL?ZDvW`joKH#wj-q`DL(L(h(BUpKVu)S-XZPZqQI>Y&k?UY)M^{Ad5)T^2#J}yyiSXIy1mem`|Of9 z>4WfcwP>YBsG%7sOJ(WsaY)aqMwQ;sOeuJ7>aM-^XI1YJk6fLLB6BhYplM9fH8*8S z)zN1ivQe1N)xKs6{EK>hWQx5{75iMJ}b+Ee1Mx?v^?9Fvsq5jIb? z2_`g#dFk`7u_yO4P&mi;(_E4%rSote4V2GJHUh!vmEyfu-kOxVtY}=hpW|bOBXW35 z+kg!XcU69A20_Z(iAd9sw|L7q(#5XrQ_WZdlZZ#HC*@<3Iej+A1JcQ%>xNYcod-+b zfWX>URUVo>8gwZXd@I(@ot8HEW}9Ouq{i4+2WDynXjqntg8r`2X@Cb!80Eo($k|0V zcU@V^ZNQ_m8S&Gjb7SpmLZW#o%gZ`N`uf(25tx$E-M9VGv{FZSp}J0KLLC0;6dM;p3manY<`#aEU#dkE*I-Y=~`PPK+M z3e;${r~ZtR9ks>bx<09lWffX$kQBipg%<*|cus;!15Rpr3u>UsXUw;EjOaV?*1WTD zlqaNoKdZd~YFeilPiiy`;n!Jk)T74EhH|!J4X`wxPaxBEVN6AZStE0|k@hxjL`@Nf zcn6F3J*diOT{Bw*7vf}o4R-y4?nG;~2-nBY|ON@2(ft!eAApO2QC#q2>|rnw_~ zcfVAAFyoi6kbkY$*->vUmxO4+#(RC8$66JrEBU>8I5?HkoH*IDqfhE3%glhC3K_<} zb(tQT48FMbmmV~ChY3AknWj|ZiiSM?wme*?$Zg=t%w`l1b`zYt12WR6hdpC~Maj^p zLLv92cfKk$WEK>NOG!yBFsP&CjU7s9h#QdM&8iwny;nZSF&HOdk(mYq;V$i=a@dJW z)cvzsoA~{6E)hp=*NR_q&_(%mv{JKLIh6YZp0lg-^WiQYMaaT*edvbyNxZr>h-Y(l zciJQbjV07o?$ZRyM@JXT$;`J93rI7F_-o0AKhKLh`;J4>^oFt@iUl9{dVTy2x!ubH zJr%7B8Mm*>KuhxSQ*_Z>hP40(Xin78L63gBZuufBOWyW*m3Vf@=geHTu+0l)p{lRE z1-=#a4($wGkxFD`m|G0-$nSZ!%B!t!OpFvtVOFLE+0zDQF>PjsyLrK&t1pSR8J+a> z!8D%H5q)=*{G6)ELp&RotHHq%0RpR^$*E`V(}<}3VbsI*9%$Fxpqg9;maFj_RjK7X zR{}oWL(*#}&_qc=Q;Ex;`Y@L2qr&nY$qEU)9Zai~Gx-s-HzL)+;f7LYyh{sS6lZyS z&>E{RjRW0Ae)+z{>98Wz6P6W?Pm&VZ&Gc*#pKXm9`^??PFU0L$95a`D0i(`#O?|M0 zWi($G4ZzD^$a$O-@OR#67d1gy^*)^ANk+dv>@NMvIel^E8AUaB*!pm+)a|Ll3YEBxvx z`(};|LJz#t8&Qd5hGDC!D4b#6IqTZGN9FO|v*ke@?|T%AYLuN9sTMH6)MTe2Tx|*9 z87{mYdTD5Pi)ZtELSx&$=lh$5bE(A!mfgg2`iK&Ii|PyC2oS3r0$m@+dL$7k3@aqv zYA1=g=CCM+TobGR$MYA?JFEvU69~ETo(Jf)*)Bil-kHeZC|>UxgeUzVepWzBYB7Fi zi&eZhfB~?BxLy~jAPNDs%u0n6kyN}k_;Bv{o1W7zV!cc9+$vOuFxYBnwdk8eK>2jA z!p$^6Y3$@HG56McC=UBY$Q;d`EX_4hRoKAge_iQdO_#SUtrBQZqI6ZY2<}n(=;Rm_ zc#~at>QQtJfi}2Z)Dl+1`1yS3Sas&xbIgy-l8GHD+C-Uf7Z5R}=|`^BLzG!=gs%-? z>@TLIMusM>t<5A*uoU0qst#$GuW#w`k?8)e2OUOZt#zWOQ0|V7=626RKWlWJ<&P-S zKGUbtLa55NFUmx``)I(ZI-uRC^wMvai&u?#s+(HxB+-dZ`K)2fSa~#pTk+*>26_0+ zt0{ps2=r-*apJQ_cGBs}Ny-qT`;c4hegz`LSc^f+Oph;e4wc5R_z!#1Qbx87+qSL( zX8wJ3Bb#-q{zMM!)hZo|U5&{0i5VS~W-cgttyK_N#=Qw^aVnzlnMcQEd9qOjqh5>A%T6~- zTyCcUt|N{K@>9gHmzaw!XfN}n)5S?zfDawJiy}}y?i}CcBL?~*pA6#){M3x{yZO~c zj;;?R86MLE4sxx%8f&o1=D>R1msWo1i?#c49G#8!4GIIIw>m@bL#kY}e+Y_TEyfgn zo$m{DO;?Y_*|C5_jB&LK4n4oVh6AIPfIl>|^wuX{jgL_doi}%=K9PNMPSGEsl{1aP zIgzFV`URT?%Q^)ApoBy`Fsl2j3W{wf8evV* z1#PHFJSySr$5{&>z`>TmLgCZJgK0Auz`&C~t1gDId#aM4>YQ-^9H`>~6NupTE~WZy zhpp!hD+gS=+v&_8n!|3zMId#A)Ngai%2Zx_x%oG$X~<^wi%z91GSGUL3|{wHipWAF zV*Y}6j8%!#Aaj+{J!ronSFqGY6~!fuchrcDm1~z^x2^T)wabd)Vi+&apogf|V~c{R zGLkxwvzLC@aUlk{f*tQ$3|qC}Vszb$s&U4_0WpH00-}Si-fOCdum|=@gQ2#SFaDV^B zO(b)(ejDgt-fZ0KXeykn6N`g<`Loezo%$DSlXW3fuf%iLN5`hNM9|gWrz3)Kg^}62@1jM=;+OcqcJ>oOSntJYx9+UO zzZXyvWZyzB-g_s!+S12^DJ4~Pm79&s{he~~Zn@{dh}7Vh`AYPF4Q4W`%h^Z*(tJW7HSTX7=(A0lgL3s+F4h^Z87*zB@CT^bjjU~OV z3D?r$LgmFO+I>RXPYPr5-9yYH)&oFkuWUb=LQ27i^8Q?1XuNJZpU>_b7omyiB>a>`Q1BREsLL<*{0 zR%ACGFPFR--1VrP&Y@kR%yV58FRgL}k}$D{K0(+ugOZQD{);M=p@hj7vH9~E}#&&tjKWLZu z-<4NUAj9<5TsqxSop?9K*eO2Azc^ZC_9&v#MbJDR3W{pBaC|?JugnQxo z%P&=n4ieA5KW)TbB5e$b@W+qbm`uatQZTg-9MCHM=>zr^(4Nl6m|;Y<0vnq-CE8){ z16uOb_b&^tF$|y{-=b^YU1DPG$=|c)Ki?IDIal$7ViE zRe-N{lvgb?i4OrAcMpeny0 zHo8k)3g@!#b!k_Y%dL}iso(n@=phXPTG~?k-rIi&)uwEQ5b8GS-qzo^sJrR6n3*w$ z`F(sPc!BYae4L2%x1PqAF2JGD>};Nh@IJ+Al&u$R2JM;#YlZJs`iGi?KZs`_lv z)|&@%v?C-&7!|nDl#|LJc&x)*sbHcJ?GB{dD>eZ-;z(NWf5I+dO-n?|M{cq9J0Qr# z$~F|{_&EO1uM*a)UjUAtCk7NC2|Y6y?68@-hiZD8m*PG zKj{!W2?&Kw-82@&-ORrQsP{dE{+Uf`qL^;f0`e70>psNx-N>Uk58yTc8HWG#pA@A3 z1W>fc?X8^Kh=TC8&Q4@~v_8zr9&f6msEYR) zCi8r!-q#1c6lwMU2AS;NfBu_f-sZcy$>6*$k7hy^*?kQ6S$0XeBsf)??OGFukGjeg zLdl-Kk1j4a$cA6_KH)?85@Bo2YrKJKY!!p6-7s`lFO;k*&9`h3`S^Ltej%=iNu4=W zZy%W!g`#>k8YnK{OH*GR3w4G|1Ppa?n$Ai=P{n^7nk4(G1hx$_+wTnR4j%esL?~-2 z05)#_#*9f1snGMJ(lEe2dctqrO<7z%g{{#MP!p0m;?bs}nsY)f_M0aQVWyTJ4wZc) zLF1tG1^O3dd7ox`9PBm*><|EhlVPk}yazw-ZG*6m$sVC0oBP3Y(d zeSg^EU?r!~b{NLg0M#WAJn07|4*4uqtN7-1rXBv%=82;Ec2G=bq|8u;V5i&UW=9x| zZ3ogebACzfoabc zKw=oHWHnvoH@^Vsz3dn}Z#eaKWZ>0d4A6v|J~;q=$IJvBIi>Zg52?uaqAojp?n~24 zQKsHPozjD=(le*dmf#6KWKUnq)l?JFt<_dR_~>h|TvAU?xJp%(9_ND&MpEgyr-fmu z_4UR3yrif_+6gd3K4XE{5I*N8t84qd?^!Oa(@P3rD;SvD(X zfWS3~MJ_$=RdsrCp-J@8n383+-UOrj+55e@@rWS68=)C!vHcMCyd1JSoh97!oZYLo z45{n~OOAEc#3f1E;;KRoOL?c_Ezfvw9coiJ^GgY*$)uAc*X3Q*`#rIJa?XgEGF-^` zlxhErVg4<{m~vaZs$?lz>iQE3*|*jvu1){W+twrgqNm3^7E28Do+z{3yU4E+DS5J> zyOcX8SUcTrQV1&x4|zYpM=zMZ;QrSph z?lhZ;tBg3=VjIAtmVx4059qYM%0l=(h#9# zc!hK24i7-cvm8mQj9&>S{{SgSkEW_Cr!%8%s_W zJdWL#1|dgE^7G<+Yt&hOM1Kx}PYBbUFLX*RG%txme*MO!Hz$I&x6TA(_D|GmC=_$r z@)tU>SBp7wY?$`W5*vjPkD?FPfF1*jvy8nirwv)3?c$(P&}tVY#77w9CDF&CbAEl! zrJ+%?QEabb{q1#OeNJh&ZcmuB;1Nwsyy&|uYmac&i}&m47G0Nd6!t!8EGJ}$J~Lr) zhi`MuM}5^6-*An4Y<5_Y_*f&kH&O=d0KPAEvZB_px2?C9ZjVobt0hl-96j3~A7WW` z5x6pa>h2vXC#JFeP;UL|KWn#6>9aC0+F-C& z`S5|zRz64V+YM)Vi4Z59Xz=a=efLN0*viDTG5XD(_4sthY`Ga zeJ&7vk@et{sPqKp3Et1WXzH=#e((N)6Wk{|qNl$+0T-@)T1l|yf7f?L3%%R8`XL^r ziOEa1v(e-wBO+(sWdye~gW~9qmTIE2L+0c+j;tvX|DCEF=(um9(wIFeOoLSDG05a6 znEe1Ucotln6UcJq=4sHytDcptZ1*6^9-CcT|D-wx^b+6x_Ajo*Q$U`))-}v2P)6@p z8-843MdK9sDbV0Q{a*r0{+}ij<_zxd%o5FzRy2^o%diJ)v@wdI&l32Pi~x%ynz1_k qUu;ZZ%dVvv!PkM8e><|kHh&F Date: Tue, 4 Feb 2020 09:52:50 +0500 Subject: [PATCH 08/92] Update use-system-center-configuration-manager-to-manage-devices-with-semm.md --- ...enter-configuration-manager-to-manage-devices-with-semm.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/devices/surface/use-system-center-configuration-manager-to-manage-devices-with-semm.md b/devices/surface/use-system-center-configuration-manager-to-manage-devices-with-semm.md index 0cf1ab9bda..a538d33d5d 100644 --- a/devices/surface/use-system-center-configuration-manager-to-manage-devices-with-semm.md +++ b/devices/surface/use-system-center-configuration-manager-to-manage-devices-with-semm.md @@ -480,10 +480,10 @@ To add the SEMM Configuration Manager scripts to Configuration Manager as an app - Select **Registry** from the **Setting Type** drop-down menu. - Select **HKEY_LOCAL_MACHINE** from the **Hive** drop-down menu. - Enter **SOFTWARE\Microsoft\Surface\SEMM** in the **Key** field. - - Enter **Enabled_Version1000** in the **Value** field. + - Enter **CertName** in the **Value** field. - Select **String** from the **Data Type** drop-down menu. - Select the **This registry setting must satisfy the following rule to indicate the presence of this application** button. - - Enter **1** in the **Value** field. + - Enter the name of the certificate you entered in the line 58 of the script in the **Value** field. - Select **OK** to close the **Detection Rule** window. ![Use a registry key to identify devices enrolled in SEMM](images/config-mgr-semm-fig3.png "Use a registry key to identify devices enrolled in SEMM") From c9dc1362f848945420b1051785590387809fb54b Mon Sep 17 00:00:00 2001 From: sckissel <32919113+sckissel@users.noreply.github.com> Date: Tue, 4 Feb 2020 10:14:07 -0600 Subject: [PATCH 09/92] Update policy-csp-system.md Added integer values for "Allow Device Name in Diagnostic Data" --- windows/client-management/mdm/policy-csp-system.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/windows/client-management/mdm/policy-csp-system.md b/windows/client-management/mdm/policy-csp-system.md index ff54e474bf..7cb986c7fd 100644 --- a/windows/client-management/mdm/policy-csp-system.md +++ b/windows/client-management/mdm/policy-csp-system.md @@ -307,6 +307,10 @@ ADMX Info: +The following list shows the supported values: + +- 0 (default) – Disabled. +- 1 – Allowed. From 1de3c8783505882afa145edac0325d0c3ad126ee Mon Sep 17 00:00:00 2001 From: sckissel <32919113+sckissel@users.noreply.github.com> Date: Tue, 4 Feb 2020 11:59:48 -0600 Subject: [PATCH 10/92] Update dmclient-csp.md Changed AZure to Azure under AADSendDeviceToken --- windows/client-management/mdm/dmclient-csp.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/dmclient-csp.md b/windows/client-management/mdm/dmclient-csp.md index 4767766c8c..d1203b326a 100644 --- a/windows/client-management/mdm/dmclient-csp.md +++ b/windows/client-management/mdm/dmclient-csp.md @@ -260,7 +260,7 @@ Optional. Number of days after last sucessful sync to unenroll. Supported operations are Add, Delete, Get, and Replace. Value type is integer. **Provider/*ProviderID*/AADSendDeviceToken** -Device. Added in Windows 10 version 1803. For AZure AD backed enrollments, this will cause the client to send a Device Token if the User Token can not be obtained. +Device. Added in Windows 10 version 1803. For Azure AD backed enrollments, this will cause the client to send a Device Token if the User Token can not be obtained. Supported operations are Add, Delete, Get, and Replace. Value type is bool. From b74d17a6df3f870192ab5e2b246ea9c2c256ca78 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Wed, 5 Feb 2020 09:07:27 +0500 Subject: [PATCH 11/92] Update devices/surface/use-system-center-configuration-manager-to-manage-devices-with-semm.md Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- ...-center-configuration-manager-to-manage-devices-with-semm.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface/use-system-center-configuration-manager-to-manage-devices-with-semm.md b/devices/surface/use-system-center-configuration-manager-to-manage-devices-with-semm.md index a538d33d5d..fd310cf7c7 100644 --- a/devices/surface/use-system-center-configuration-manager-to-manage-devices-with-semm.md +++ b/devices/surface/use-system-center-configuration-manager-to-manage-devices-with-semm.md @@ -483,7 +483,7 @@ To add the SEMM Configuration Manager scripts to Configuration Manager as an app - Enter **CertName** in the **Value** field. - Select **String** from the **Data Type** drop-down menu. - Select the **This registry setting must satisfy the following rule to indicate the presence of this application** button. - - Enter the name of the certificate you entered in the line 58 of the script in the **Value** field. + - Enter the name of the certificate you entered in line 58 of the script in the **Value** field. - Select **OK** to close the **Detection Rule** window. ![Use a registry key to identify devices enrolled in SEMM](images/config-mgr-semm-fig3.png "Use a registry key to identify devices enrolled in SEMM") From 98c405796d99600c6fedb587a48d3b1368c2fe2e Mon Sep 17 00:00:00 2001 From: VLG17 <41186174+VLG17@users.noreply.github.com> Date: Wed, 5 Feb 2020 15:02:00 +0200 Subject: [PATCH 12/92] Add segment related to enabling network protection https://github.com/MicrosoftDocs/windows-itpro-docs/issues/5793 --- .../microsoft-defender-atp/network-protection.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/network-protection.md b/windows/security/threat-protection/microsoft-defender-atp/network-protection.md index 3c6f9f6bc7..92abdc1744 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/network-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/network-protection.md @@ -29,7 +29,9 @@ Network protection helps reduce the attack surface of your devices from Internet Network protection expands the scope of [Windows Defender SmartScreen](../windows-defender-smartscreen/windows-defender-smartscreen-overview.md) to block all outbound HTTP(s) traffic that attempts to connect to low-reputation sources (based on the domain or hostname). -Network protection is supported beginning with Windows 10, version 1709. +Network protection is supported beginning with Windows 10, version 1709. + +More details on how to enable network protection: [Enable network protection](enable-network-protection.md) | Use Group Policy, PowerShell, or MDM CSPs to enable and manage network protection in your network. > [!TIP] > You can visit the Windows Defender Testground website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the feature is working and see how it works. From e400c1ee47a5d4bf50c815349618464a29435c6d Mon Sep 17 00:00:00 2001 From: Charles Milette Date: Thu, 6 Feb 2020 08:54:48 -0500 Subject: [PATCH 13/92] Update notice about MBEC support This updates the document with findings from #3997, and makes the text clearer. --- ...-virtualization-based-protection-of-code-integrity.md | 9 +++------ 1 file changed, 3 insertions(+), 6 deletions(-) diff --git a/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity.md b/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity.md index 1edd7842a6..7619e56909 100644 --- a/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity.md +++ b/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity.md @@ -26,15 +26,12 @@ This can cause devices or software to malfunction and in rare cases may result i If this happens, see [Troubleshooting](#troubleshooting) for remediation steps. >[!NOTE] ->HVCI works with modern 7th gen CPUs or higher and its equivalent on AMD. CPU new feature is required *Mode based execution control (MBE) Virtualization*. AMD CPUs do not have MBE. - ->[!TIP] -> "The Secure Kernel relies on the Mode-Based Execution Control (MBEC) feature, if present in hardware, which enhances the SLAT with a user/kernel executable bit, or the hypervisor’s software emulation of this feature, called Restricted User Mode (RUM)." Mark Russinovich and Alex Ionescu. Windows Internals 7th Edition book +>Because it makes use of *Mode Based Execution Control*, HVCI works better with Intel Kaby Lake or AMD Zen 2 CPUs and newer. Processors without MBEC will rely on an emulation of this feature, called *Restricted User Mode*, which has a bigger impact on performance. ## HVCI Features -* HVCI protects modification of the Code Flow Guard (CFG) bitmap. -* HVCI also ensure your other Truslets, like Credential Guard have a valid certificate. +* HVCI protects modification of the Control Flow Guard (CFG) bitmap. +* HVCI also ensure your other Truslets, like Credential Guard, have a valid certificate. * Modern device drivers must also have an EV (Extended Validation) certificate and should support HVCI. ## How to turn on HVCI in Windows 10 From c3578a29207033685c76d6f785de7b9909cc6d9e Mon Sep 17 00:00:00 2001 From: Daniel Olim <49715300+daniel-microsoft@users.noreply.github.com> Date: Thu, 6 Feb 2020 15:25:21 +0000 Subject: [PATCH 14/92] Update white-glove.md Need to be clear that it is either LOB or Win32, not both. --- windows/deployment/windows-autopilot/white-glove.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/windows-autopilot/white-glove.md b/windows/deployment/windows-autopilot/white-glove.md index 9fd9e87869..a0bef4bb0b 100644 --- a/windows/deployment/windows-autopilot/white-glove.md +++ b/windows/deployment/windows-autopilot/white-glove.md @@ -59,7 +59,7 @@ To enable white glove deployment, an additional Autopilot profile setting must b ![allow white glove](images/allow-white-glove-oobe.png) -The Windows Autopilot for white glove deployment pre-provisioning process will apply all device-targeted policies from Intune. That includes certificates, security templates, settings, apps, and more – anything targeting the device. Additionally, any apps (Win32 or LOB) that are configured to install in the device context and targeted to the user that has been pre-assigned to the Autopilot device will also be installed. +The Windows Autopilot for white glove deployment pre-provisioning process will apply all device-targeted policies from Intune. That includes certificates, security templates, settings, apps, and more – anything targeting the device. Additionally, any apps (Win32 or LOB) that are configured to install in the device context and targeted to the user that has been pre-assigned to the Autopilot device will also be installed. Please make sure not to target both win32 and LOB apps to the same device. >[!NOTE] >Other user-targeted policies will not apply until the user signs into the device. To verify these behaviors, be sure to create appropriate apps and policies targeted to devices and users. From 5d90460ce71112d8bf814a4b96a2bfb99a870974 Mon Sep 17 00:00:00 2001 From: isbrahm <43386070+isbrahm@users.noreply.github.com> Date: Thu, 6 Feb 2020 21:10:44 -0500 Subject: [PATCH 15/92] WDAC cmdlets are available on all SKUs for 1903+ builds The SKU check which restricted WDAC cmdlets --- .../windows-defender-application-control.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control.md b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control.md index ba4929c2f6..e336068fb0 100644 --- a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control.md +++ b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control.md @@ -58,7 +58,7 @@ WDAC policies apply to the managed computer as a whole and affects all users of ### WDAC System Requirements -WDAC policies can only be created on computers beginning with Windows 10 Enterprise or Windows Server 2016 and above. +WDAC policies can only be created on computers running Windows 10 build 1903+ on any SKU, pre-1903 Windows 10 Enterprise, or Windows Server 2016 and above. They can be applied to computers running any edition of Windows 10 or Windows Server 2016 and optionally managed via Mobile Device Management (MDM), such as Microsoft Intune. Group Policy can also be used to deploy WDAC policies to Windows 10 Enterprise edition or Windows Server 2016 and above. From 3a7fb4d80cb6bc7298b98e4c03ddcba35ad6e62b Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Fri, 7 Feb 2020 11:28:26 +0500 Subject: [PATCH 16/92] Minor correction The last sentence removed as it was making no sense. Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/5874 --- devices/hololens/hololens-recovery.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/devices/hololens/hololens-recovery.md b/devices/hololens/hololens-recovery.md index b2e0d48bc7..7833886901 100644 --- a/devices/hololens/hololens-recovery.md +++ b/devices/hololens/hololens-recovery.md @@ -110,8 +110,8 @@ The Advanced Recovery Companion is a new app in Microsoft Store restore the oper >In the event that a HoloLens 2 gets into a state where Advanced Recovery Companion cannot recognize the device, and it does not boot, try forcing the device into Flashing Mode and recovering it with Advanced Recovery Companion: 1. Connect the HoloLens 2 to a PC with Advanced Recovery Companion installed. -1. Press and hold the **Volume Up and Power buttons** until the device reboots. Release the Power button, but continue to hold the Volume Up button until the third LED is lit. It will the the only lit LED. - 1. The device should be visible in **Device Manager** as a **Microsoft HoloLens Recovery** device: +1. Press and hold the **Volume Up and Power buttons** until the device reboots. Release the Power button, but continue to hold the Volume Up button until the third LED is lit. +1. The device should be visible in **Device Manager** as a **Microsoft HoloLens Recovery** device: 1. Launch Advanced Recovery Companion, and follow the on-screen prompts to reflash the OS to the HoloLens 2. ### HoloLens (1st gen) From 102979dd9bf51de0b20ab0fcc1a472f2e07b11dd Mon Sep 17 00:00:00 2001 From: VLG17 <41186174+VLG17@users.noreply.github.com> Date: Fri, 7 Feb 2020 15:12:39 +0200 Subject: [PATCH 17/92] Preffered should be TPM 2.0, not firmware https://github.com/MicrosoftDocs/windows-itpro-docs/issues/5853 --- .../credential-guard/credential-guard-requirements.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/credential-guard/credential-guard-requirements.md b/windows/security/identity-protection/credential-guard/credential-guard-requirements.md index d0124ff8cf..3fb77b5244 100644 --- a/windows/security/identity-protection/credential-guard/credential-guard-requirements.md +++ b/windows/security/identity-protection/credential-guard/credential-guard-requirements.md @@ -31,7 +31,7 @@ For Windows Defender Credential Guard to provide protection, the computers you a To provide basic protections against OS level attempts to read Credential Manager domain credentials, NTLM and Kerberos derived credentials, Windows Defender Credential Guard uses: - Support for Virtualization-based security (required) - Secure boot (required) -- TPM 1.2 or 2.0, either discrete or firmware (preferred - provides binding to hardware) +- TPM 1.2 or 2.0 (preferred - provides binding to hardware), either discrete or firmware - UEFI lock (preferred - prevents attacker from disabling with a simple registry key change) The Virtualization-based security requires: From 201dbc6404b502b6c62e54b9a0dfe9230c81cfe0 Mon Sep 17 00:00:00 2001 From: Aaron Czechowski Date: Fri, 7 Feb 2020 10:26:09 -0800 Subject: [PATCH 18/92] revise ConfigMgr FAQ --- .../identity-protection/hello-for-business/hello-faq.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-faq.md b/windows/security/identity-protection/hello-for-business/hello-faq.md index 57b0ea0add..f7dcaffc22 100644 --- a/windows/security/identity-protection/hello-for-business/hello-faq.md +++ b/windows/security/identity-protection/hello-for-business/hello-faq.md @@ -31,7 +31,7 @@ Microsoft is committed to its vision of a world without passwords. We rec RDP currently does not support key based authentication and does not support self signed certificates. RDP with Windows Hello for Business is currently only supported with certificate based deployments. ## Can I deploy Windows Hello for Business using Microsoft Endpoint Configuration Manager? -Windows Hello for Business deployments using Configuration Manager need to move to the hybrid deployment model that uses Active Directory Federation Services. Deployments using Configuration Manager will no longer be supported after November 2018. +Windows Hello for Business deployments using Configuration Manager should use the hybrid deployment model that uses Active Directory Federation Services. Starting in Configuration Manager version 1910, certificate-based authentication with Windows Hello for Business settings isn't supported. Key-based authentication is still valid with Configuration Manager. For more information, see [Windows Hello for Business settings in Configuration Manager](https://docs.microsoft.com/configmgr/protect/deploy-use/windows-hello-for-business-settings). ## How many users can enroll for Windows Hello for Business on a single Windows 10 computer? The maximum number of supported enrollments on a single Windows 10 computer is 10. That enables 10 users to each enroll their face and up to 10 fingerprints. While we support 10 enrollments, we will strongly encourage the use of Windows Hello security keys for the shared computer scenario when they become available. From bbc69a2a89bf6f5a44282b58133046acfc42a801 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Fri, 7 Feb 2020 16:27:12 -0800 Subject: [PATCH 19/92] update icons --- windows/security/threat-protection/index.md | 11 +++++------ .../microsoft-defender-atp/images/AIR.png | Bin 0 -> 2290 bytes .../microsoft-defender-atp/images/ASR.png | Bin 0 -> 1544 bytes .../microsoft-defender-atp/images/EDR.png | Bin 0 -> 1589 bytes .../microsoft-defender-atp/images/MTE.png | Bin 0 -> 2120 bytes .../microsoft-defender-atp/images/NGP.png | 0 .../images/TVM_icon.png | Bin 1060 -> 1060 bytes 7 files changed, 5 insertions(+), 6 deletions(-) create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/AIR.png create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/ASR.png create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/EDR.png create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/MTE.png create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/NGP.png diff --git a/windows/security/threat-protection/index.md b/windows/security/threat-protection/index.md index 014429c82a..6e17affb80 100644 --- a/windows/security/threat-protection/index.md +++ b/windows/security/threat-protection/index.md @@ -23,12 +23,11 @@ ms.topic: conceptual - - - - - - + + + + + - @@ -137,6 +137,9 @@ This table provides info about the most common problems you might encounter whil > [!NOTE] > When corporate data is written to disk, WIP uses the Windows-provided Encrypting File System (EFS) to protect it and associate it with your enterprise identity. One caveat to keep in mind is that the Preview Pane in File Explorer will not work for encrypted files. +> [!NOTE] +> Chromium-based versions of Microsoft Edge (versions since 79) don't fully support WIP yet. The functionality could be partially enabled by going to page **edge://flags/#edge-dataprotection** and setting the **Windows Information Protection** flag to **enabled**. + > [!NOTE] > Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Contributing to our content](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md). From b24c33be48d8be92f7b486a1bbf4bb49aca85b9f Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Mon, 10 Feb 2020 09:40:32 +0500 Subject: [PATCH 23/92] Update windows/security/information-protection/windows-information-protection/limitations-with-wip.md Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- .../windows-information-protection/limitations-with-wip.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/windows/security/information-protection/windows-information-protection/limitations-with-wip.md b/windows/security/information-protection/windows-information-protection/limitations-with-wip.md index 5bae273ed2..8b5a188647 100644 --- a/windows/security/information-protection/windows-information-protection/limitations-with-wip.md +++ b/windows/security/information-protection/windows-information-protection/limitations-with-wip.md @@ -138,8 +138,7 @@ This table provides info about the most common problems you might encounter whil > When corporate data is written to disk, WIP uses the Windows-provided Encrypting File System (EFS) to protect it and associate it with your enterprise identity. One caveat to keep in mind is that the Preview Pane in File Explorer will not work for encrypted files. > [!NOTE] -> Chromium-based versions of Microsoft Edge (versions since 79) don't fully support WIP yet. The functionality could be partially enabled by going to page **edge://flags/#edge-dataprotection** and setting the **Windows Information Protection** flag to **enabled**. +> Chromium-based versions of Microsoft Edge (versions since 79) don't fully support WIP yet. The functionality could be partially enabled by going to the local page **edge://flags/#edge-dataprotection** and setting the **Windows Information Protection** flag to **enabled**. > [!NOTE] > Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Contributing to our content](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md). - From e1313224be82bf6bbd7ae8854dddc04b78eac24d Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Mon, 10 Feb 2020 14:20:52 +0500 Subject: [PATCH 24/92] Update apply-hotfix-for-mbam-25-sp1.md --- mdop/mbam-v25/apply-hotfix-for-mbam-25-sp1.md | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/mdop/mbam-v25/apply-hotfix-for-mbam-25-sp1.md b/mdop/mbam-v25/apply-hotfix-for-mbam-25-sp1.md index 3ed2c2c111..6cea5686e6 100644 --- a/mdop/mbam-v25/apply-hotfix-for-mbam-25-sp1.md +++ b/mdop/mbam-v25/apply-hotfix-for-mbam-25-sp1.md @@ -19,7 +19,10 @@ author: shortpatti This topic describes the process for applying the hotfixes for Microsoft BitLocker Administration and Monitoring (MBAM) Server 2.5 SP1 ### Before you begin, download the latest hotfix of Microsoft BitLocker Administration and Monitoring (MBAM) Server 2.5 SP1 -[Desktop Optimization Pack](https://www.microsoft.com/download/details.aspx?id=58345) +[Desktop Optimization Pack](https://www.microsoft.com/download/details.aspx?id=57157) + +> [!NOTE] +> For more information about the hotfix releases, see [MBAM version chart](https://docs.microsoft.com/archive/blogs/dubaisec/mbam-version-chart). #### Steps to update the MBAM Server for existing MBAM environment 1. Remove MBAM server feature (do this by opening the MBAM Server Configuration Tool, then selecting Remove Features). From 6744f7592a2497ff66be12e4670008743d852cda Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Mon, 10 Feb 2020 09:16:25 -0800 Subject: [PATCH 25/92] Formatting fixes --- devices/surface-hub/surface-hub-2s-recover-reset.md | 2 ++ devices/surface/windows-autopilot-and-surface-devices.md | 3 +++ 2 files changed, 5 insertions(+) diff --git a/devices/surface-hub/surface-hub-2s-recover-reset.md b/devices/surface-hub/surface-hub-2s-recover-reset.md index af763b9e26..1f0e98f92b 100644 --- a/devices/surface-hub/surface-hub-2s-recover-reset.md +++ b/devices/surface-hub/surface-hub-2s-recover-reset.md @@ -23,8 +23,10 @@ To begin, sign in to Surface Hub 2S with admin credentials, open the **Settings* 1. To reset the device, select **Get Started**. 2. When the **Ready to reset this device** window appears, select **Reset**. + >[!NOTE] >Surface Hub 2S reinstalls the operating system from the recovery partition. This may take up to one hour to complete. + 3. To reconfigure the device, run the first-time Setup program. 4. If you manage the device using Microsoft Intune or another mobile device management solution, retire and delete the previous record, and then re-enroll the new device. For more information, see [Remove devices by using wipe, retire, or manually unenrolling the device](https://docs.microsoft.com/intune/devices-wipe). diff --git a/devices/surface/windows-autopilot-and-surface-devices.md b/devices/surface/windows-autopilot-and-surface-devices.md index 1c8eaa3c06..2ad84a094e 100644 --- a/devices/surface/windows-autopilot-and-surface-devices.md +++ b/devices/surface/windows-autopilot-and-surface-devices.md @@ -25,11 +25,13 @@ Windows Autopilot-registered devices are identified over the Internet at first s You can register Surface devices at the time of purchase from a Surface partner that's enabled for Windows Autopilot. These partners can ship new devices directly to your users. The devices will be automatically enrolled and configured when they are first turned on. This process eliminates reimaging during deployment, which lets you implement new, agile methods of device management and distribution. ## Modern management + Autopilot is the recommended deployment option for Surface devices, including Surface Pro 7, Surface Laptop 3, and Surface Pro X, which is specifically designed for deployment through Autopilot. It's best to enroll your Surface devices with the help of a Microsoft Cloud Solution Provider. This step allows you to manage UEFI firmware settings on Surface directly from Intune. It eliminates the need to physically touch devices for certificate management. See [Intune management of Surface UEFI settings](surface-manage-dfci-guide.md) for details. ## Windows version considerations + Broad deployment of Surface devices through Windows Autopilot, including enrollment by Surface partners at the time of purchase, requires Windows 10 Version 1709 (Fall Creators Update) or later. These Windows versions support a 4,000-byte (4k) hash value that uniquely identifies devices for Windows Autopilot, which is necessary for deployments at scale. All new Surface devices, including Surface Pro 7, Surface Pro X, and Surface Laptop 3, ship with Windows 10 Version 1903 or later. @@ -53,6 +55,7 @@ Surface partners that are enabled for Windows Autopilot include: - [Techdata](https://www.techdata.com/) ## Learn more + For more information about Windows Autopilot, see: - [Overview of Windows Autopilot](https://docs.microsoft.com/windows/deployment/windows-autopilot/windows-10-autopilot) - [Windows Autopilot requirements](https://docs.microsoft.com/windows/deployment/windows-autopilot/windows-autopilot-requirements) \ No newline at end of file From 73167238d27234c8f2114e53e8dfeedbe7b7f165 Mon Sep 17 00:00:00 2001 From: isbrahm <43386070+isbrahm@users.noreply.github.com> Date: Mon, 10 Feb 2020 10:50:02 -0800 Subject: [PATCH 26/92] Further clarify SKU availability and deployment --- .../windows-defender-application-control.md | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control.md b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control.md index e336068fb0..b3b52de9b2 100644 --- a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control.md +++ b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control.md @@ -46,7 +46,7 @@ Windows 10 includes two technologies that can be used for application control de Windows Defender Application Control (WDAC) was introduced with Windows 10 and allows organizations to control what drivers and applications are allowed to run on their Windows 10 clients. WDAC was designed as a security feature under the [servicing criteria](https://www.microsoft.com/msrc/windows-security-servicing-criteria) defined by the Microsoft Security Response Center (MSRC). > [!NOTE] -> Prior to Windows 10, version 1709, Windows Defender Application Control was known as configurable code integrity policies. +> Prior to Windows 10, version 1709, Windows Defender Application Control was known as configurable code integrity (CCI) policies. WDAC policies apply to the managed computer as a whole and affects all users of the device. WDAC rules can be defined based on: - Attributes of the codesigning certificate(s) used to sign an app and its binaries; @@ -59,8 +59,7 @@ WDAC policies apply to the managed computer as a whole and affects all users of ### WDAC System Requirements WDAC policies can only be created on computers running Windows 10 build 1903+ on any SKU, pre-1903 Windows 10 Enterprise, or Windows Server 2016 and above. -They can be applied to computers running any edition of Windows 10 or Windows Server 2016 and optionally managed via Mobile Device Management (MDM), such as Microsoft Intune. -Group Policy can also be used to deploy WDAC policies to Windows 10 Enterprise edition or Windows Server 2016 and above. +WDAC policies can be applied to computers running any edition of Windows 10 or Windows Server 2016 via a Mobile Device Management (MDM) solution like Intune, a management interface like Configuration Manager, or a scripthost like PowerShell. Group Policy can also be used to deploy WDAC policies to Windows 10 Enterprise edition or Windows Server 2016 and above, but cannot deploy policies to machines running non-Enterprise SKUs of Windows 10. ## AppLocker From ce9f4e29512c0e8a266327cdc3de1bf0e406ab4c Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 10 Feb 2020 12:54:48 -0800 Subject: [PATCH 27/92] new icons --- .../security/threat-protection/images/AIR.png | Bin 0 -> 2290 bytes .../security/threat-protection/images/ASR.png | Bin 0 -> 1544 bytes .../security/threat-protection/images/EDR.png | Bin 0 -> 1589 bytes .../security/threat-protection/images/MTE.png | Bin 0 -> 2120 bytes .../security/threat-protection/images/NGP.png | 0 5 files changed, 0 insertions(+), 0 deletions(-) create mode 100644 windows/security/threat-protection/images/AIR.png create mode 100644 windows/security/threat-protection/images/ASR.png create mode 100644 windows/security/threat-protection/images/EDR.png create mode 100644 windows/security/threat-protection/images/MTE.png create mode 100644 windows/security/threat-protection/images/NGP.png diff --git a/windows/security/threat-protection/images/AIR.png b/windows/security/threat-protection/images/AIR.png new file mode 100644 index 0000000000000000000000000000000000000000..985e3e44296b98bf3d0853334e2fdc847a1b9bf0 GIT binary patch literal 2290 zcmXw)3pms58^?dj%dDS6qQ=l@Ayob`?IOylw&V~Z)#T9FG8;2YIlNYA%W?kr&q9br zMHKQX^3EX^tGp`7p?5{S(wxuo|LK4IpX<7x`?@~&_j#`8zMlKJAGVvz2}QUj8~^}C zJkG%#@^+gB+XBrLi@X-dDTLvCA^>39j!lyR@^2v^D9^w#;+4F;Yg$5J3B|G)K-^gtpozj1Bi|1x`8Xeg1&02W^6Ze}XCDf1*VC`91yk2eO; zx@UL?TTfEr1W^FqaC<48VkNH2-%PHak3JA))9tAHJB&Ckp)FUk=CTV24y5i7G*)BU2E zz>MJJ+>^1ih{zw-peS=H=(-^Z9{@^13>VD*JImgEYHpy<~evr=YwXp2QlU99OwM9^;d1Wo0EU zIy&;|mERLf3HeSRnTy`Fb7z>=VcseJWUa{~6DJi1S65e4ggL)Q&IrTpn0QyckCR_i zlt<*DZV-rQe1Ol}FZ3k4;y!^Zvg`vwlZ86v>MHK-ePbSK!S_cTIH(M$$hJzR9rU(W zzq>aAY$d%Ei(Oq@#%5z!C^xk;BUutGB6&SN0jm{dS#X8&$}x~kW}~}2jfjVMreL2b ztJdFSrxT4PZHyQX(|Q-gKCX#GA~SX$jbHe#0UX;1Qg_UfJn87@2*Z9~T*aiiVHEM) zfSUK&2Ckg;lD|)3NJHu@6ad89Ttusqsnn`UTBNyqg&LkaK#Ag;VN^^+C5DBu3Wv^|0J#3oRnY4nn34jhgO>^D46Q=Y4cX8J2N2MV*q0>gtBGCNLHNkn(%K(7!P(3tVUv zis77*(hbQIG#>bUCLo7=cOwE6Vzttno0~lZE|YVATJU=&qvW?F2Gk%jIs;?8J;GoxD~hJiCycdNt)nkq z;2f3sVNFA&rKQ^1+Mw`jLo1*O3g_nLKqV!w!R?*XSy@ma32X1WAm`qU#x$3e5lJN6 z`RME}#_|mDX1gAzM8}Nr+U?eSnNwaRoYGKSUvHtxo;p(9sY)=%rd!3YG0#kk-!m81 zr@z;CR8>_$m&fs~1LqD@9z)&sT?$SRtxtdYAh`H|u->O9-)tRqT5W!H{ffSWmEvhN zZKV?-A@@!$U;G(3?|tzz3JGsjIY?F3j3tXeL;MLLitqBexM1d|22c&_l1+n(i=fx}1FBX(BWqRwgkQ>DFeTI8Yu z3Mm%+poFpz+IMiTz8RRa+#7B&EuP;!a_)MVY(U#9g~5UvFL21Z76r4LEqSA!O6kkL z@Tq07Db>*SQPEO*V;GF}BY|*5+LvH!2!^}g?wM(q*D-D$&)DHuQ;CZ=ek_&)h33w* z_$~P6pFRuo@D|@K(w|ZO*RscIzbnVL0B8->I}7@Mi!z>8sta)%kAzb+I!hv0B$L)(>ylwN+eOv6!7c(Uxx(h^fY`*nZ}3k1RcoYJ?(Pj{RDbv*=|ZU#oIE=-=t&>=5X zQyZG@-3zI9YBUk4Yj~9>`XfZO>Ro<_WE2d~ZJ-X77#bCcz16E078j+Onw*lm=x^Q8 z-Z^Wj$4hI@rjA2>%hQVsV})53K&5oKP7mg8l;h>)^^v+bH8tg{Ef5HHA7T2{{Tyrz z&9#A^6wfTUyD6});%lspEBDeNo`Z@*+O<5Q27uy}9I}DV4QD{3+FTzP9qZvI*~th^ z%jgq}t9!C=P@0aB{pxbuF0|umkx114wo`5DNW$kASx_UEM*113ve|3}SzD;tAH48n zbavS@{X!&94lp${+mUwMsm#4jAqvJK*lD!4z)De3aeaOL%({M>iw`X!@Kq2$lu(5a5SNvgW(!U}-Z?+%8 zVwsa4FncXkWs6fyJHrh*A10#;Vg?_W{`}^omv!6FC{HxW=mvno@tnguLqkL5jE3@3 za4eKV>1!U3*JFV0zPU@#rvXpuW}feP-x=(mWM>=msuVi_<>h90>3-2ro6Q@y%#&rR z?6!eN!9&!=pX7mP%?)j>=Cva@?49t;Fq{PS3E831`ti(#eK(=69l$%fI8@pBvHlBl CBq+TA literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/images/ASR.png b/windows/security/threat-protection/images/ASR.png new file mode 100644 index 0000000000000000000000000000000000000000..bf649e87ec76d53d39bfc5e9e7b17b4362600569 GIT binary patch literal 1544 zcmY+E2{7AP9LN98#GTb+|Egm|Evh!6m)1Ip#F@G)jv^6JR}+m;T}+(OII8PxQ)DSC zvY|y=rHh0*YC~34Y^b)XdMssHC97My|8!?}X5Y;3{boMj?|W~4@4fl4e7sz>)c2?Z z0HEdWhVg^4lRV&x(426zst-zPiEhD30HCo$9tr@v8iXK>?tT&rd!Yyib}MQwoIddd zVT0(7$@Ca14QOr^xj{&i4j~LViA0M{q{mVzzz#L!K8UN!xidBK0xkAT3?1O>h-@IL z{e{xVM7hf%VThOaI!Osb|lUDRf{%R4K1iRc;H2r6-U9?#e?` z08pNE$2bPWWW8mJJrB8p!qzcy{D z&&R{E=lj=f;k=9W`P_+sPYQJx4NpyEOMVNAJ*+>rGX4SGy?WFt-jA`|TWV>X5X~go zuZa$c%dTRJtWrPc)ffmCxViHt73jwey3A`IoY2ZmFaSV1IB?vI%^Hh~i)(6Xy0lVK zQrK)Zdi=XLtv6k44IFH2Y;0|D#=2d%Ct~O{8jVO4{shAZIhPu{mzp(pt@X6EeZ|6< zo0~_rfkSsYJF5_-vpEO&S%~L4<$m!OEOu+;542m5iu6cTRaKh@PvC=cNQSw5aCUZ9 zLqo%$1V-ZX;tUa>o?h4F&SxR<%PTA6V`Hp(H@NSq+r7O{mc$TqrEm7*9-2UR>K88XoQmry_ff zvmB{bxTnv~IZxi=@pzror@Kc0?MNThXaw3y#Hlw!Sz78dv%Wp3Ij|~&DP}!>Qr)3? zqLO;WD7U(%W^myhpU}kP4KJM2QzgBuk1TrAJwA}likc%{s3U@#kLMm>$&sl&;T*B4 zyY9VRK$M+QX6w>sN_ajRflhs;Z)ayWH#aBnwBT46do)}8dVb^83$OK%-Uq68VGa$} z!~8n`jYTn|vhd0i+|f?)TWfM@CS&i`U61`{k8JX?%yJ^`Y-gpL-cVJ_OP6itKa0~u zT|@5S<4peS({C$2{R7wG^f#K;&HwvH1)eVSQ2~MQqAzC%P&tDr;XX(IqKoo}kATli zb}i}%C^Xxe-oLzM)lS&3RZdg!fntSj6@rKzrX%Zfjj;Z;u3 z&q=re@ZW1QG6K9ZXO5&ANr@m+p>lyTa=d?}!bM?kqE={;R4Oei+u>g7a|sZnOAfbm zbab?}z3UoE&tFDEcPti*H?y#mmS8R~E-7iPtf-YBCBE*ieGtXhV0k-qmITLu%(1b7 zwGr)opr%A3dGBe6qGa{-*o956u9v-fWCwQTEiElgPfuU+W>i8o1_lQ9&!dsKX?N1X z_a88#V6IP0O`XE}BAl+`hE`>q+S)jF^x5nFs(V!43YW$Rct!K{O7+2@(9lARQ8lu{ zBN-ZWIu3`6I`VVC$Tgh?SJv}_{L9(X9*!V%lBcJqiE~<7+WGU=eR`uI_y|Ve=2TPf za6x9fPmHUKlt7`NP^i&%k>1SA%*T%(flNR4ypocz)ku$zKd@JO?YoTt^C?Jw z`cxc0mbjuSZRw3VsK>&M9BUd7T3K! literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/images/EDR.png b/windows/security/threat-protection/images/EDR.png new file mode 100644 index 0000000000000000000000000000000000000000..8c750dee42d30ddfec3de18c93b744645f462904 GIT binary patch literal 1589 zcmXxkdpy%?90%}cuG`8bQ=H|Vh|pGXTDc|HqOvA;C02g54Kq1(I=Pigi6+IGmxEE$ zP`Q`u- zRTue!E68?|-BqrvAYwcN;{aHJk}nuwFm+|9O7rq@Qyo`;1D(xVj6(u$5;Hi9Eyt|h0CH;(9~L=D`U8v{llpgh;j_H zt`%j-O!dF>@ze++SdgZP|Bvm8CXRGVpTUNr+03 zFb;VK`{{LX-@kK`koh8BYI*pD-wf7VKxomSS8j<|t$Z6a-P*D1ktQk!i{)R)%G!7S z1yrVi9!s;25-GM3j9!y6`F4hl*;Wd4=hiu(kcOWmmo5o#j+YBk$tj|c4Xl#uR0@v! z=^l46q1)kldfdey8bUEFvy|oQeR*qk7Tq1|+q1z;J@Xv1p#XbwcJQD1`T2)eEYmf4 zg%G32I=f8U&b9kq#~4H+*(ZLC?9L2SeLFC4YH234X}||=VRQ>({Ke(6*%m^r9QR$N zn#m8h*IS*(zwPOv^G)~ImA#mJ{yb0czWg$!nLS``kei#6Qz7*>)w+Onxii#YujxYY z^V230i4|P#8CCTBA55$ne{+QQ%lfIQDShR=j~mISl9ILyT`a1rtA&sgu;Md{ieN^3 zs>!7%3yoIj^gP0p&r1%QjZjihPS-hGBPNr{Y&|@q&WP;GUi=O{y2FvQNSt*-Qr<}u zdhg(RlsiQ>1&*=r*4t&*p^Mig4PW!Rp=1P{f$;0+mNQNerrQbrECuwm6HEgo7J~Z% zz10T%wpsUJY0nS}5v2u(83R~*uL$X98L85hdjO5dKTV4;IPNapxL6neATIYRZdJEM z&ZaYmn2ey%{$ah%%hMIejEA@~tYMSmG8x9GAJlFNMr)L?`;CAF){QY$O3Z&eF?o#Kp`|A zsMYbGb~5wtJ8m=P`T8njV~ySH%?}!_1I2ZhGGRrnq5z_Q7;c8Cs24Qy6W8!HVjHqn zDZg#>Q0N?Y;nga0g^F0$G3q4DTRj;J9kQPf`eAHd7HJYT_BG&pe<{)Pk@d^P{+nTr z5|qKH6y7)7`mGelx#Mw>?Zk~8CFOXKr1vyA^N)+4{FtM2`v!zbqfayZPUvW|+i=@D zD&le!H-*=(iKnNP_NS`@f?rO@m_#B$p-|Uss!v#L+N7Gc zvmJwUTox)5{2ItRbXTftXdG*-g-r9G9>(0QuV+==Z(d^w0t$-Zx%`1f_+E-F%O!ekR> lH~O)wS9#$ENE;=E6|e3e{8?~4Q8pccm)l;~8kfVV{{kkr({KO) literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/images/MTE.png b/windows/security/threat-protection/images/MTE.png new file mode 100644 index 0000000000000000000000000000000000000000..1d5693a399b2a145e5c2d0bc3818dbd3c6dbaa41 GIT binary patch literal 2120 zcmV-O2)Fl%P)p2ml%(0x@Df00007bVXQnL3MO!Z*l;suFOaP000bh zMObu1WpiV4X>fFDZ*Bk+2_Yi@000VfMObu0Z*X~XX=iA30IUzpIsgCw4s=CWbVG7w zVRUJ4ZXk4NZDjy8_YVmG000SeMObuGZ)S9NVRB^vU2y+80000BbVXQnL}_zlY+-3_ zWpV(wz_gD5000PdMObuKVRCM1Zf5|%8|H@q000McMObuGZ*_8GWdQa6gX;hQ00?wN zSad^gZEa<4bO83umcIZ100wkLSaeirbZlh+sP57y000LQNkl?x|6_+fY5B%JzvyEDI; z&+g1`X1=oo5#j$|!ftnZR8wdettfcN)-wPpU+1r-L?!O>bj1IM~@yoapHs^Jguqd z5Myp`?$V`8oO6%I)3h)mRw|W5B60fk>3YB}<>d7&EiEOJNknXg0RRXgfk0qpX6DM3 zD-N1#MYb^v!$_r4rfJ&EMT(-_x^*j)$=GeN71_qPdGqGd(vsKfwOf%8;`Mr`rlwR? zwOhBT>|yA-e*5-q2Mm@(Q7jgVckbMAR=t7jVdQeTVzDTS&Q}{rlCs&X{N)oLz-JRy61 zYS+QN?FN8746oPAId|KnAjq=pGRTuLZIup(!!9wb{Yz(Or<)*KWe=mTug_(BjInSy zyvrD|SgfO?gE8i~J;N~K@wm00Z=>vC_Pv2#>Sq;w0>N!Ff2WK^yuEbd-L=2>+9>5 zfj}ws`~8tfWN>gW9*^&UXVnIbO=+5@swyH%k|fLW)AK>Ls+}0SsP>qj>+9>KQmI@n zYnsM6mn2D1l#Y&$P$;xBE~qPv<>h6|_AC~Qnx;Lzk_dtziefMrj7FpJc>KVD1C4pg z8W#xoJr2jA!$FnH<9XUT=dH0})kKwR{~#QM$Xk zj~zR}T%a<>&tgJL% z@+<~H5Qc|`qtR$@Pfxfj4Dea`4UK>N@3mh{u4eN!kSWkDajMMgr{5n7{ov)$aMagk zjJdhFWHQMZYsK?qjLEWm?%cUe+PM`yov;1b|&Er}+K*_b*<&NC;`sx3#3Isw~SFK3)Ce_2RvfVN@6(f=2+QnITOH zC?e;0?QZ#6W&>n;Fe1IUU;foMqmk|Ewv-uGS67qCBmmeo+N>|}$=!11zg2@F_$eqN zNG+!$fq;)fKm-A17q!3qYpqz@ep}ra|HpVB%( znqy2)Pv>$upRc89jKjM6~ipyLLMW$m_&vf|1E&*4EY>ToDmMOw%+B z698n1v;~C{Qg2!{!eETe%*@zIO`9Tw7=}@)Q~+Rqr_=@v4k4e=?ce@|Ho{n5UM>_0 z&aMG049jvJdA=QoK9k40Jpu3b9d3k?&*x3kbaQ%MTwDZzS7UxLK%w5aZc!$_G3c-N zuo1??hY#HxeMC`w@ZbR=#=_Do1Afq4xTYLIrtf^Iqu%qny+lN3lY3Lvjg0j{e)v+z z)z{GY>v3hM{${c6xHnDHI$OK(o@=#QI-Ndq=FGQ_1PA-&xdjdC4DKdE_~~n14W8G< zK*U%q=JH;~vKMq+_jo+#$9vxXUCs$cm3<`o!ut@)E!-j zuwj1pwXToeZS`_%*X*_{vz7P$G`~_ZpF9bg2paofyywC}ZYkq_UB{^XTLtHf6AviZpoKm5n)g~^r0WgSHFMj~+jRPRgsZC^L<2@khW yVZWJLJ=p7ccf{ch?ViAJug}Tv#LqDHlKux>r6IrAf$NI^0000 Date: Mon, 10 Feb 2020 13:09:15 -0800 Subject: [PATCH 28/92] ngp icon --- .../microsoft-defender-atp/images/NGP.png | Bin 0 -> 1707 bytes ...rosoft-defender-advanced-threat-protection.md | 9 ++++----- 2 files changed, 4 insertions(+), 5 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/NGP.png b/windows/security/threat-protection/microsoft-defender-atp/images/NGP.png index e69de29bb2d1d6434b8b29ae775ad8c2e48c5391..9aca3db5177663d84279a1cc2b2d186a0a72aa8a 100644 GIT binary patch literal 1707 zcmYk+c~H|w6bJAh0Zf8~P$dFEB~j#xoFZVba)nc_1~8mrh(SVgU=pQBkQ;;wNVy?F zQ*8tTQ~?Q>6ewDt2!ud6M2jM#SnxnDq0q!mXZpwPoB6!&?##~4yi6Z27nl-K2><|? zn=1}4tq!sU0ZDhNW$`c40*!VJWC6g=-LfSIlyNnr2xhx^I)Pt;ln@Y$+nZr~zK~M@ z+x`MOlEDP3YWrQKq|BBQj?5x4DbZ{SgAVM5q7O=4N#>4>=vXG@TqGN)hWBHos`5pd zWTGsJVpC{j;OHtGD(ygJ9bZNSJBG+41EJB|viQy~ms40IDp49`0-}zFTq#3jOdvAp z6#6-!L+e$B)WH9qzrZAsf#vO#xBtZ)88jN1&IVTci)1g|A&dD@*it%1;21Alm(E4e73VUH;K;V`HoHMz_zr~@CTth6Kh$2=q=>$6=* zKsd*T5{^rO@4{IiQR#`4?nt|kD|Jr%uk>&5&ln7u^WqmD%&h^2m7k1RU;#Gl)dz0e z7Goe`Yjy)lQkK`A8nx^|s!`N-Wmzaeosem%2eKU;E>kuqF)k9rLZwTYMij$8&;2L+4}9o zA%0iquSNiHGZg^P3dfUr>|X+VtxHQEd|rEWX;7G*6!ddRt6cN2^~7yXgGoyS;nVFI z1D}q8P}GpEj*2C94c)Tr6aHKwY$Lx_vV&__A>H4o7j&IIe=UD**$D*Oi8qg55LPUf3?m4+%MrQU!kgbH z8m9GhKC(AwZ2xph6>?ky>qW+5CBhhB7h(PdCZuh!xAhn^zObRrAhN<4FF4s)VegUN zlcc8#(NWQ{ok#~PRV)F36z_K5M35+Fuw2|!zg>g0uy$xOZZ9^6oJxn81^x@cdK5wb! za_R0h0{4x~j6PhYva)W1`r%%p4cQSq@!1OBI-_}-_~Zva&-4c6LjN5oq3JFE{0D-r z`D7#yCgxgRaGs6lQNr(t&K6`tj~PyNi7TiZ49$FPVu|&5;4q`6){|ssH+EFC@2d7< zpQ`vS$*l0`(|}zoSzs@6yKRxhRNPlxb!=RZSErW#D7 ztP=OobK&0H7|-GTi=8Vy zsQc%f@Q*u~((9^wNuk%L!?)3CxQiO=Q(Qlf84J%~JsEdOm}<$F2wo zBcyj~_^m|v4)JZewN5IsTw(=d#b~~U)nmwu`IMRXY%FNxx+z!ujHg*$eeGIr`L{of zpwYhtOXSlnH3iROpxT2qx_fWD>=d0foM>KV37-Z<&HZ^s5Y1CP-_8m{m>X8_bGxIg z6ue=#TSKPWB6`Iq8@X&X} zhhh&lMYau2fth7Z_q|}MH|{T3gtW!Ju_wDq$VZY*p1!f7xz!%*NBGLqwL~12mCiuF zGEU$V@V2^dPyK52{yjak-xm!N;=B<0N4V3HJKgzk?b_Zv`D#3@T&s(pk|LBP0}9X8#?mFwB)Z3z~RQCP>zv;x-pU6y}s<5 z_fS+0ci+xx)1UXPWxbasb~nGCo&dEsgu&LsZ>!4C4y literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md index 34a417fdef..f2891d5f18 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md @@ -48,11 +48,10 @@ Microsoft Defender ATP uses the following combination of technology built into W

Threat & Vulnerability Management

Attack surface reduction

Next generation protection

Endpoint detection and response

Automated investigation and remediation

Secure score

Microsoft Threat Experts

Attack surface reduction

Next generation protection

Endpoint detection and response

Automated investigation and remediation

Microsoft Threat Experts
diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/AIR.png b/windows/security/threat-protection/microsoft-defender-atp/images/AIR.png new file mode 100644 index 0000000000000000000000000000000000000000..985e3e44296b98bf3d0853334e2fdc847a1b9bf0 GIT binary patch literal 2290 zcmXw)3pms58^?dj%dDS6qQ=l@Ayob`?IOylw&V~Z)#T9FG8;2YIlNYA%W?kr&q9br zMHKQX^3EX^tGp`7p?5{S(wxuo|LK4IpX<7x`?@~&_j#`8zMlKJAGVvz2}QUj8~^}C zJkG%#@^+gB+XBrLi@X-dDTLvCA^>39j!lyR@^2v^D9^w#;+4F;Yg$5J3B|G)K-^gtpozj1Bi|1x`8Xeg1&02W^6Ze}XCDf1*VC`91yk2eO; zx@UL?TTfEr1W^FqaC<48VkNH2-%PHak3JA))9tAHJB&Ckp)FUk=CTV24y5i7G*)BU2E zz>MJJ+>^1ih{zw-peS=H=(-^Z9{@^13>VD*JImgEYHpy<~evr=YwXp2QlU99OwM9^;d1Wo0EU zIy&;|mERLf3HeSRnTy`Fb7z>=VcseJWUa{~6DJi1S65e4ggL)Q&IrTpn0QyckCR_i zlt<*DZV-rQe1Ol}FZ3k4;y!^Zvg`vwlZ86v>MHK-ePbSK!S_cTIH(M$$hJzR9rU(W zzq>aAY$d%Ei(Oq@#%5z!C^xk;BUutGB6&SN0jm{dS#X8&$}x~kW}~}2jfjVMreL2b ztJdFSrxT4PZHyQX(|Q-gKCX#GA~SX$jbHe#0UX;1Qg_UfJn87@2*Z9~T*aiiVHEM) zfSUK&2Ckg;lD|)3NJHu@6ad89Ttusqsnn`UTBNyqg&LkaK#Ag;VN^^+C5DBu3Wv^|0J#3oRnY4nn34jhgO>^D46Q=Y4cX8J2N2MV*q0>gtBGCNLHNkn(%K(7!P(3tVUv zis77*(hbQIG#>bUCLo7=cOwE6Vzttno0~lZE|YVATJU=&qvW?F2Gk%jIs;?8J;GoxD~hJiCycdNt)nkq z;2f3sVNFA&rKQ^1+Mw`jLo1*O3g_nLKqV!w!R?*XSy@ma32X1WAm`qU#x$3e5lJN6 z`RME}#_|mDX1gAzM8}Nr+U?eSnNwaRoYGKSUvHtxo;p(9sY)=%rd!3YG0#kk-!m81 zr@z;CR8>_$m&fs~1LqD@9z)&sT?$SRtxtdYAh`H|u->O9-)tRqT5W!H{ffSWmEvhN zZKV?-A@@!$U;G(3?|tzz3JGsjIY?F3j3tXeL;MLLitqBexM1d|22c&_l1+n(i=fx}1FBX(BWqRwgkQ>DFeTI8Yu z3Mm%+poFpz+IMiTz8RRa+#7B&EuP;!a_)MVY(U#9g~5UvFL21Z76r4LEqSA!O6kkL z@Tq07Db>*SQPEO*V;GF}BY|*5+LvH!2!^}g?wM(q*D-D$&)DHuQ;CZ=ek_&)h33w* z_$~P6pFRuo@D|@K(w|ZO*RscIzbnVL0B8->I}7@Mi!z>8sta)%kAzb+I!hv0B$L)(>ylwN+eOv6!7c(Uxx(h^fY`*nZ}3k1RcoYJ?(Pj{RDbv*=|ZU#oIE=-=t&>=5X zQyZG@-3zI9YBUk4Yj~9>`XfZO>Ro<_WE2d~ZJ-X77#bCcz16E078j+Onw*lm=x^Q8 z-Z^Wj$4hI@rjA2>%hQVsV})53K&5oKP7mg8l;h>)^^v+bH8tg{Ef5HHA7T2{{Tyrz z&9#A^6wfTUyD6});%lspEBDeNo`Z@*+O<5Q27uy}9I}DV4QD{3+FTzP9qZvI*~th^ z%jgq}t9!C=P@0aB{pxbuF0|umkx114wo`5DNW$kASx_UEM*113ve|3}SzD;tAH48n zbavS@{X!&94lp${+mUwMsm#4jAqvJK*lD!4z)De3aeaOL%({M>iw`X!@Kq2$lu(5a5SNvgW(!U}-Z?+%8 zVwsa4FncXkWs6fyJHrh*A10#;Vg?_W{`}^omv!6FC{HxW=mvno@tnguLqkL5jE3@3 za4eKV>1!U3*JFV0zPU@#rvXpuW}feP-x=(mWM>=msuVi_<>h90>3-2ro6Q@y%#&rR z?6!eN!9&!=pX7mP%?)j>=Cva@?49t;Fq{PS3E831`ti(#eK(=69l$%fI8@pBvHlBl CBq+TA literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/ASR.png b/windows/security/threat-protection/microsoft-defender-atp/images/ASR.png new file mode 100644 index 0000000000000000000000000000000000000000..bf649e87ec76d53d39bfc5e9e7b17b4362600569 GIT binary patch literal 1544 zcmY+E2{7AP9LN98#GTb+|Egm|Evh!6m)1Ip#F@G)jv^6JR}+m;T}+(OII8PxQ)DSC zvY|y=rHh0*YC~34Y^b)XdMssHC97My|8!?}X5Y;3{boMj?|W~4@4fl4e7sz>)c2?Z z0HEdWhVg^4lRV&x(426zst-zPiEhD30HCo$9tr@v8iXK>?tT&rd!Yyib}MQwoIddd zVT0(7$@Ca14QOr^xj{&i4j~LViA0M{q{mVzzz#L!K8UN!xidBK0xkAT3?1O>h-@IL z{e{xVM7hf%VThOaI!Osb|lUDRf{%R4K1iRc;H2r6-U9?#e?` z08pNE$2bPWWW8mJJrB8p!qzcy{D z&&R{E=lj=f;k=9W`P_+sPYQJx4NpyEOMVNAJ*+>rGX4SGy?WFt-jA`|TWV>X5X~go zuZa$c%dTRJtWrPc)ffmCxViHt73jwey3A`IoY2ZmFaSV1IB?vI%^Hh~i)(6Xy0lVK zQrK)Zdi=XLtv6k44IFH2Y;0|D#=2d%Ct~O{8jVO4{shAZIhPu{mzp(pt@X6EeZ|6< zo0~_rfkSsYJF5_-vpEO&S%~L4<$m!OEOu+;542m5iu6cTRaKh@PvC=cNQSw5aCUZ9 zLqo%$1V-ZX;tUa>o?h4F&SxR<%PTA6V`Hp(H@NSq+r7O{mc$TqrEm7*9-2UR>K88XoQmry_ff zvmB{bxTnv~IZxi=@pzror@Kc0?MNThXaw3y#Hlw!Sz78dv%Wp3Ij|~&DP}!>Qr)3? zqLO;WD7U(%W^myhpU}kP4KJM2QzgBuk1TrAJwA}likc%{s3U@#kLMm>$&sl&;T*B4 zyY9VRK$M+QX6w>sN_ajRflhs;Z)ayWH#aBnwBT46do)}8dVb^83$OK%-Uq68VGa$} z!~8n`jYTn|vhd0i+|f?)TWfM@CS&i`U61`{k8JX?%yJ^`Y-gpL-cVJ_OP6itKa0~u zT|@5S<4peS({C$2{R7wG^f#K;&HwvH1)eVSQ2~MQqAzC%P&tDr;XX(IqKoo}kATli zb}i}%C^Xxe-oLzM)lS&3RZdg!fntSj6@rKzrX%Zfjj;Z;u3 z&q=re@ZW1QG6K9ZXO5&ANr@m+p>lyTa=d?}!bM?kqE={;R4Oei+u>g7a|sZnOAfbm zbab?}z3UoE&tFDEcPti*H?y#mmS8R~E-7iPtf-YBCBE*ieGtXhV0k-qmITLu%(1b7 zwGr)opr%A3dGBe6qGa{-*o956u9v-fWCwQTEiElgPfuU+W>i8o1_lQ9&!dsKX?N1X z_a88#V6IP0O`XE}BAl+`hE`>q+S)jF^x5nFs(V!43YW$Rct!K{O7+2@(9lARQ8lu{ zBN-ZWIu3`6I`VVC$Tgh?SJv}_{L9(X9*!V%lBcJqiE~<7+WGU=eR`uI_y|Ve=2TPf za6x9fPmHUKlt7`NP^i&%k>1SA%*T%(flNR4ypocz)ku$zKd@JO?YoTt^C?Jw z`cxc0mbjuSZRw3VsK>&M9BUd7T3K! literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/EDR.png b/windows/security/threat-protection/microsoft-defender-atp/images/EDR.png new file mode 100644 index 0000000000000000000000000000000000000000..8c750dee42d30ddfec3de18c93b744645f462904 GIT binary patch literal 1589 zcmXxkdpy%?90%}cuG`8bQ=H|Vh|pGXTDc|HqOvA;C02g54Kq1(I=Pigi6+IGmxEE$ zP`Q`u- zRTue!E68?|-BqrvAYwcN;{aHJk}nuwFm+|9O7rq@Qyo`;1D(xVj6(u$5;Hi9Eyt|h0CH;(9~L=D`U8v{llpgh;j_H zt`%j-O!dF>@ze++SdgZP|Bvm8CXRGVpTUNr+03 zFb;VK`{{LX-@kK`koh8BYI*pD-wf7VKxomSS8j<|t$Z6a-P*D1ktQk!i{)R)%G!7S z1yrVi9!s;25-GM3j9!y6`F4hl*;Wd4=hiu(kcOWmmo5o#j+YBk$tj|c4Xl#uR0@v! z=^l46q1)kldfdey8bUEFvy|oQeR*qk7Tq1|+q1z;J@Xv1p#XbwcJQD1`T2)eEYmf4 zg%G32I=f8U&b9kq#~4H+*(ZLC?9L2SeLFC4YH234X}||=VRQ>({Ke(6*%m^r9QR$N zn#m8h*IS*(zwPOv^G)~ImA#mJ{yb0czWg$!nLS``kei#6Qz7*>)w+Onxii#YujxYY z^V230i4|P#8CCTBA55$ne{+QQ%lfIQDShR=j~mISl9ILyT`a1rtA&sgu;Md{ieN^3 zs>!7%3yoIj^gP0p&r1%QjZjihPS-hGBPNr{Y&|@q&WP;GUi=O{y2FvQNSt*-Qr<}u zdhg(RlsiQ>1&*=r*4t&*p^Mig4PW!Rp=1P{f$;0+mNQNerrQbrECuwm6HEgo7J~Z% zz10T%wpsUJY0nS}5v2u(83R~*uL$X98L85hdjO5dKTV4;IPNapxL6neATIYRZdJEM z&ZaYmn2ey%{$ah%%hMIejEA@~tYMSmG8x9GAJlFNMr)L?`;CAF){QY$O3Z&eF?o#Kp`|A zsMYbGb~5wtJ8m=P`T8njV~ySH%?}!_1I2ZhGGRrnq5z_Q7;c8Cs24Qy6W8!HVjHqn zDZg#>Q0N?Y;nga0g^F0$G3q4DTRj;J9kQPf`eAHd7HJYT_BG&pe<{)Pk@d^P{+nTr z5|qKH6y7)7`mGelx#Mw>?Zk~8CFOXKr1vyA^N)+4{FtM2`v!zbqfayZPUvW|+i=@D zD&le!H-*=(iKnNP_NS`@f?rO@m_#B$p-|Uss!v#L+N7Gc zvmJwUTox)5{2ItRbXTftXdG*-g-r9G9>(0QuV+==Z(d^w0t$-Zx%`1f_+E-F%O!ekR> lH~O)wS9#$ENE;=E6|e3e{8?~4Q8pccm)l;~8kfVV{{kkr({KO) literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/MTE.png b/windows/security/threat-protection/microsoft-defender-atp/images/MTE.png new file mode 100644 index 0000000000000000000000000000000000000000..1d5693a399b2a145e5c2d0bc3818dbd3c6dbaa41 GIT binary patch literal 2120 zcmV-O2)Fl%P)p2ml%(0x@Df00007bVXQnL3MO!Z*l;suFOaP000bh zMObu1WpiV4X>fFDZ*Bk+2_Yi@000VfMObu0Z*X~XX=iA30IUzpIsgCw4s=CWbVG7w zVRUJ4ZXk4NZDjy8_YVmG000SeMObuGZ)S9NVRB^vU2y+80000BbVXQnL}_zlY+-3_ zWpV(wz_gD5000PdMObuKVRCM1Zf5|%8|H@q000McMObuGZ*_8GWdQa6gX;hQ00?wN zSad^gZEa<4bO83umcIZ100wkLSaeirbZlh+sP57y000LQNkl?x|6_+fY5B%JzvyEDI; z&+g1`X1=oo5#j$|!ftnZR8wdettfcN)-wPpU+1r-L?!O>bj1IM~@yoapHs^Jguqd z5Myp`?$V`8oO6%I)3h)mRw|W5B60fk>3YB}<>d7&EiEOJNknXg0RRXgfk0qpX6DM3 zD-N1#MYb^v!$_r4rfJ&EMT(-_x^*j)$=GeN71_qPdGqGd(vsKfwOf%8;`Mr`rlwR? zwOhBT>|yA-e*5-q2Mm@(Q7jgVckbMAR=t7jVdQeTVzDTS&Q}{rlCs&X{N)oLz-JRy61 zYS+QN?FN8746oPAId|KnAjq=pGRTuLZIup(!!9wb{Yz(Or<)*KWe=mTug_(BjInSy zyvrD|SgfO?gE8i~J;N~K@wm00Z=>vC_Pv2#>Sq;w0>N!Ff2WK^yuEbd-L=2>+9>5 zfj}ws`~8tfWN>gW9*^&UXVnIbO=+5@swyH%k|fLW)AK>Ls+}0SsP>qj>+9>KQmI@n zYnsM6mn2D1l#Y&$P$;xBE~qPv<>h6|_AC~Qnx;Lzk_dtziefMrj7FpJc>KVD1C4pg z8W#xoJr2jA!$FnH<9XUT=dH0})kKwR{~#QM$Xk zj~zR}T%a<>&tgJL% z@+<~H5Qc|`qtR$@Pfxfj4Dea`4UK>N@3mh{u4eN!kSWkDajMMgr{5n7{ov)$aMagk zjJdhFWHQMZYsK?qjLEWm?%cUe+PM`yov;1b|&Er}+K*_b*<&NC;`sx3#3Isw~SFK3)Ce_2RvfVN@6(f=2+QnITOH zC?e;0?QZ#6W&>n;Fe1IUU;foMqmk|Ewv-uGS67qCBmmeo+N>|}$=!11zg2@F_$eqN zNG+!$fq;)fKm-A17q!3qYpqz@ep}ra|HpVB%( znqy2)Pv>$upRc89jKjM6~ipyLLMW$m_&vf|1E&*4EY>ToDmMOw%+B z698n1v;~C{Qg2!{!eETe%*@zIO`9Tw7=}@)Q~+Rqr_=@v4k4e=?ce@|Ho{n5UM>_0 z&aMG049jvJdA=QoK9k40Jpu3b9d3k?&*x3kbaQ%MTwDZzS7UxLK%w5aZc!$_G3c-N zuo1??hY#HxeMC`w@ZbR=#=_Do1Afq4xTYLIrtf^Iqu%qny+lN3lY3Lvjg0j{e)v+z z)z{GY>v3hM{${c6xHnDHI$OK(o@=#QI-Ndq=FGQ_1PA-&xdjdC4DKdE_~~n14W8G< zK*U%q=JH;~vKMq+_jo+#$9vxXUCs$cm3<`o!ut@)E!-j zuwj1pwXToeZS`_%*X*_{vz7P$G`~_ZpF9bg2paofyywC}ZYkq_UB{^XTLtHf6AviZpoKm5n)g~^r0WgSHFMj~+jRPRgsZC^L<2@khW yVZWJLJ=p7ccf{ch?ViAJug}Tv#LqDHlKux>r6IrAf$NI^00001^`jg2pIqX From cd1b6b8b3de0f909c7039aad33697863685475f4 Mon Sep 17 00:00:00 2001 From: illfated Date: Sat, 8 Feb 2020 17:27:43 +0100 Subject: [PATCH 20/92] Local Accounts/Administrator account: 20016 typo Description: As pointed out in issue ticket #6017 (Double 0 typo), Windows Server 2016 contains a double 0 typo which needs correction. Thanks to vainkop for making us aware of this typo issue. Proposed change: - Remove the extra 0 to spell Windows Server 2016 correctly. issue ticket closure or reference: Closes #6017 --- .../identity-protection/access-control/local-accounts.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/access-control/local-accounts.md b/windows/security/identity-protection/access-control/local-accounts.md index 33ef3a0add..2c744d7f98 100644 --- a/windows/security/identity-protection/access-control/local-accounts.md +++ b/windows/security/identity-protection/access-control/local-accounts.md @@ -73,7 +73,7 @@ The Administrator account has full control of the files, directories, services, The default Administrator account cannot be deleted or locked out, but it can be renamed or disabled. -In Windows 10 and Windows Server 20016, Windows setup disables the built-in Administrator account and creates another local account that is a member of the Administrators group. Members of the Administrators groups can run apps with elevated permissions without using the **Run as Administrator** option. Fast User Switching is more secure than using Runas or different-user elevation. +In Windows 10 and Windows Server 2016, Windows setup disables the built-in Administrator account and creates another local account that is a member of the Administrators group. Members of the Administrators groups can run apps with elevated permissions without using the **Run as Administrator** option. Fast User Switching is more secure than using Runas or different-user elevation. **Account group membership** From 9fe837fe56a829cce5a65f4d15d7326a61f71c48 Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Sun, 9 Feb 2020 09:30:46 +0500 Subject: [PATCH 21/92] Update devices/hololens/hololens-recovery.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- devices/hololens/hololens-recovery.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/hololens/hololens-recovery.md b/devices/hololens/hololens-recovery.md index 7833886901..c873f08b58 100644 --- a/devices/hololens/hololens-recovery.md +++ b/devices/hololens/hololens-recovery.md @@ -111,7 +111,7 @@ The Advanced Recovery Companion is a new app in Microsoft Store restore the oper 1. Connect the HoloLens 2 to a PC with Advanced Recovery Companion installed. 1. Press and hold the **Volume Up and Power buttons** until the device reboots. Release the Power button, but continue to hold the Volume Up button until the third LED is lit. -1. The device should be visible in **Device Manager** as a **Microsoft HoloLens Recovery** device: +1. The device should be visible in **Device Manager** as a **Microsoft HoloLens Recovery** device. 1. Launch Advanced Recovery Companion, and follow the on-screen prompts to reflash the OS to the HoloLens 2. ### HoloLens (1st gen) From e66fc3fcaaf3cacdd1bbba7231bdd891b2cc4a6a Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Sun, 9 Feb 2020 19:45:18 +0500 Subject: [PATCH 22/92] Update limitations-with-wip.md --- .../windows-information-protection/limitations-with-wip.md | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/windows/security/information-protection/windows-information-protection/limitations-with-wip.md b/windows/security/information-protection/windows-information-protection/limitations-with-wip.md index ff92a6c111..5bae273ed2 100644 --- a/windows/security/information-protection/windows-information-protection/limitations-with-wip.md +++ b/windows/security/information-protection/windows-information-protection/limitations-with-wip.md @@ -115,7 +115,7 @@ This table provides info about the most common problems you might encounter whil WIP isn’t turned on for employees in your organization. Error code 0x807c0008 will result if WIP is deployed by using Microsoft Endpoint Configuration Manager.Don’t set the MakeFolderAvailableOfflineDisabled option to False for any of the specified folders.

If you currently use redirected folders, we recommend that you migrate to a file synchronization solution that supports WIP, such as Work Folders or OneDrive for Business. Additionally, if you apply redirected folders after WIP is already in place, you might be unable to open your files offline. For more info about these potential access errors, see Can't open files offline when you use Offline Files and Windows Information Protection. +
Don’t set the MakeFolderAvailableOfflineDisabled option to False for any of the specified folders. You can configure this parameter, as described here.

If you currently use redirected folders, we recommend that you migrate to a file synchronization solution that supports WIP, such as Work Folders or OneDrive for Business. Additionally, if you apply redirected folders after WIP is already in place, you might be unable to open your files offline. For more info about these potential access errors, see Can't open files offline when you use Offline Files and Windows Information Protection.
- - - - - + + + + From dabbf0001c0c874620342e2d99c7771447f16c0f Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 10 Feb 2020 13:21:55 -0800 Subject: [PATCH 29/92] ngp --- .../security/threat-protection/images/NGP.png | Bin 0 -> 1707 bytes 1 file changed, 0 insertions(+), 0 deletions(-) diff --git a/windows/security/threat-protection/images/NGP.png b/windows/security/threat-protection/images/NGP.png index e69de29bb2d1d6434b8b29ae775ad8c2e48c5391..9aca3db5177663d84279a1cc2b2d186a0a72aa8a 100644 GIT binary patch literal 1707 zcmYk+c~H|w6bJAh0Zf8~P$dFEB~j#xoFZVba)nc_1~8mrh(SVgU=pQBkQ;;wNVy?F zQ*8tTQ~?Q>6ewDt2!ud6M2jM#SnxnDq0q!mXZpwPoB6!&?##~4yi6Z27nl-K2><|? zn=1}4tq!sU0ZDhNW$`c40*!VJWC6g=-LfSIlyNnr2xhx^I)Pt;ln@Y$+nZr~zK~M@ z+x`MOlEDP3YWrQKq|BBQj?5x4DbZ{SgAVM5q7O=4N#>4>=vXG@TqGN)hWBHos`5pd zWTGsJVpC{j;OHtGD(ygJ9bZNSJBG+41EJB|viQy~ms40IDp49`0-}zFTq#3jOdvAp z6#6-!L+e$B)WH9qzrZAsf#vO#xBtZ)88jN1&IVTci)1g|A&dD@*it%1;21Alm(E4e73VUH;K;V`HoHMz_zr~@CTth6Kh$2=q=>$6=* zKsd*T5{^rO@4{IiQR#`4?nt|kD|Jr%uk>&5&ln7u^WqmD%&h^2m7k1RU;#Gl)dz0e z7Goe`Yjy)lQkK`A8nx^|s!`N-Wmzaeosem%2eKU;E>kuqF)k9rLZwTYMij$8&;2L+4}9o zA%0iquSNiHGZg^P3dfUr>|X+VtxHQEd|rEWX;7G*6!ddRt6cN2^~7yXgGoyS;nVFI z1D}q8P}GpEj*2C94c)Tr6aHKwY$Lx_vV&__A>H4o7j&IIe=UD**$D*Oi8qg55LPUf3?m4+%MrQU!kgbH z8m9GhKC(AwZ2xph6>?ky>qW+5CBhhB7h(PdCZuh!xAhn^zObRrAhN<4FF4s)VegUN zlcc8#(NWQ{ok#~PRV)F36z_K5M35+Fuw2|!zg>g0uy$xOZZ9^6oJxn81^x@cdK5wb! za_R0h0{4x~j6PhYva)W1`r%%p4cQSq@!1OBI-_}-_~Zva&-4c6LjN5oq3JFE{0D-r z`D7#yCgxgRaGs6lQNr(t&K6`tj~PyNi7TiZ49$FPVu|&5;4q`6){|ssH+EFC@2d7< zpQ`vS$*l0`(|}zoSzs@6yKRxhRNPlxb!=RZSErW#D7 ztP=OobK&0H7|-GTi=8Vy zsQc%f@Q*u~((9^wNuk%L!?)3CxQiO=Q(Qlf84J%~JsEdOm}<$F2wo zBcyj~_^m|v4)JZewN5IsTw(=d#b~~U)nmwu`IMRXY%FNxx+z!ujHg*$eeGIr`L{of zpwYhtOXSlnH3iROpxT2qx_fWD>=d0foM>KV37-Z<&HZ^s5Y1CP-_8m{m>X8_bGxIg z6ue=#TSKPWB6`Iq8@X&X} zhhh&lMYau2fth7Z_q|}MH|{T3gtW!Ju_wDq$VZY*p1!f7xz!%*NBGLqwL~12mCiuF zGEU$V@V2^dPyK52{yjak-xm!N;=B<0N4V3HJKgzk?b_Zv`D#3@T&s(pk|LBP0}9X8#?mFwB)Z3z~RQCP>zv;x-pU6y}s<5 z_fS+0ci+xx)1UXPWxbasb~nGCo&dEsgu&LsZ>!4C4y literal 0 HcmV?d00001 From a158871f50d326d6c174e965bcd0cefc50913ac6 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 10 Feb 2020 16:41:11 -0800 Subject: [PATCH 30/92] update casing --- .../threat-protection/images/AR_icon.png | Bin 1937 -> 0 bytes .../threat-protection/images/ASR_icon.png | Bin 2483 -> 0 bytes .../threat-protection/images/EDR_icon.png | Bin 2826 -> 0 bytes .../threat-protection/images/MTE_icon.png | Bin 2609 -> 0 bytes .../threat-protection/images/NGP_icon.png | Bin 2034 -> 0 bytes .../images/{AIR.png => air-icon.png} | Bin .../images/{ASR.png => asr-icon.png} | Bin .../images/{EDR.png => edr-icon.png} | Bin .../images/{MTE.png => mte-icon.png} | Bin .../images/{NGP.png => ngp-icon.png} | Bin windows/security/threat-protection/index.md | 10 +++++----- .../microsoft-defender-atp/images/ASR_icon.png | Bin 2483 -> 0 bytes .../microsoft-defender-atp/images/EDR_icon.jpg | Bin 3278 -> 0 bytes .../microsoft-defender-atp/images/EDR_icon.png | Bin 2826 -> 0 bytes .../microsoft-defender-atp/images/MTE_icon.jpg | Bin 2209 -> 0 bytes .../microsoft-defender-atp/images/MTE_icon.png | Bin 2609 -> 0 bytes .../microsoft-defender-atp/images/NGP_icon.jpg | Bin 2897 -> 0 bytes .../microsoft-defender-atp/images/NGP_icon.png | Bin 2034 -> 0 bytes .../images/{AIR.png => air-icon.png} | Bin .../images/{ASR.png => asr-icon.png} | Bin .../images/{EDR.png => edr-icon.png} | Bin .../images/{MTE.png => mte-icon.png} | Bin .../images/{NGP.png => ngp-icon.png} | Bin ...rosoft-defender-advanced-threat-protection.md | 10 +++++----- 24 files changed, 10 insertions(+), 10 deletions(-) delete mode 100644 windows/security/threat-protection/images/AR_icon.png delete mode 100644 windows/security/threat-protection/images/ASR_icon.png delete mode 100644 windows/security/threat-protection/images/EDR_icon.png delete mode 100644 windows/security/threat-protection/images/MTE_icon.png delete mode 100644 windows/security/threat-protection/images/NGP_icon.png rename windows/security/threat-protection/images/{AIR.png => air-icon.png} (100%) rename windows/security/threat-protection/images/{ASR.png => asr-icon.png} (100%) rename windows/security/threat-protection/images/{EDR.png => edr-icon.png} (100%) rename windows/security/threat-protection/images/{MTE.png => mte-icon.png} (100%) rename windows/security/threat-protection/images/{NGP.png => ngp-icon.png} (100%) delete mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/ASR_icon.png delete mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/EDR_icon.jpg delete mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/EDR_icon.png delete mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/MTE_icon.jpg delete mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/MTE_icon.png delete mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/NGP_icon.jpg delete mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/NGP_icon.png rename windows/security/threat-protection/microsoft-defender-atp/images/{AIR.png => air-icon.png} (100%) rename windows/security/threat-protection/microsoft-defender-atp/images/{ASR.png => asr-icon.png} (100%) rename windows/security/threat-protection/microsoft-defender-atp/images/{EDR.png => edr-icon.png} (100%) rename windows/security/threat-protection/microsoft-defender-atp/images/{MTE.png => mte-icon.png} (100%) rename windows/security/threat-protection/microsoft-defender-atp/images/{NGP.png => ngp-icon.png} (100%) diff --git a/windows/security/threat-protection/images/AR_icon.png b/windows/security/threat-protection/images/AR_icon.png deleted file mode 100644 index fa8836ea1f49f7e9518c1e5cf4af72883b071d73..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1937 zcmZwIc{~&T9|!O`$}N6It{gQv@|EkGt8bYj<}A16%y-#xY_>Tob4!FATgQ^3NsHtd zb4^*4?~E+e<17gJChVa^)=BF6wM zI35c}q5-w_3}*pJV+G^@!$hDFC@caQ3s8{IJ|b|*J-0`qlF^7rI2Q2q0K;0KvcD7! z3*W11VG%Jf!0#IeBm^6Yy^S~WA~rD`4Fd$DcK7O1zaB?mBBH|uRWzWrr@2VL;(P2L zj*dmdMgn@&W^)B5_MiLl=m;2KZ8vlNzcqVgObjd*3s`61X#(57SMxz&qhWx@izB)M z2!c3(eUga$yROKI_lo^E-ipo}JelsIS_v^`R?b~)Cyqw9|I>XpR*GS93u&G&^dqo+ zj^t=@Pbi~0Hmpd22G5_FuP}nM@pdphX!U{*t|u*K<Y zC4J0R4KCCCKk=FJf!d-J6?50#XFxgAg#W>wJnZ4=X=QC~=PQ5nM6PgU0jr;5!dY%> ziGyY*q^2@=c2144{Z4OsjX@o3XWLFQ1;l8#QR2Fc8`Y?m=17S37OM3i2c7I@0ztmLa3&QMGGa{lnv^ zr!C*Mu7-3bfoW4T%!gFUl!x zQb||qbdnaY(1&afXh6rO_dgY4TWg?4FLlb(;~0OMY8OV7fHq%y=7~o}Mvl`6H&cL) zotHOcr#8N-qd^cmpraW$)@pI06?tsSqVLnzsh_F$UxcO28x`5&ud2c7xSu~~_4eAo zGzPhQHyVa8sRkaMN;Isms%-KIa>&DI4~Xt#zqiAiTxT|^ z`=Uij)TOTx_gCp*vyUIYWQ8zS`Re{!p_qHDuCy^sS#ND`D2_d=d3vku43YuSZe8l{ zx`xChf``sExSMOGJ?dO3P)21@aKb`m1Q8qCcJYhm>+fZ zsEQ=&ubYg_23bZ^9T|QG{!7veNlHg1i5k}F z7e!B2Z7Zj2FR{{$O_G>{9I7xurL+6igw+F-mL%@<`sR|SHyzQ#_)U319^Xf?AkFf7b4RNBl#)BoGfTB^~)*`Al<9s0P`-@`uz zkT7vl>4weu(xv=?374&CxUvS0eyLmign@e7^AT#e~bgio)L8=hm)2i>f6%=@N!GBjv1xIIMA>742{oSgO;vBaZY(%S z6Vup~HOLRC{GK|;=`ZsC$^uYYTa!0ebjF}eCexYq?S)?y*`SbPtWlJ_vuy>Idl%b* zebD&iUpd;jxw%9lv6zII*9jo|Yz}s%(uNinjXWz(h8rszj`oiXyTAhbxLg=-Dy@U; zA~nC3BE3KJj6663zB|NLf3F4?sY^dGtonar4%f>0OQ#czMtpyd4E5De7?{3`}rnZv9}TxRuBdN0HQY5 z76_g?@xn$(fVZ0ME9~(Ebj=z?0szE14&u-w9Wg~76eQcgEd}R+#{~?f(7%oH|3sEZ zvRODeAS4V>`mEQQheXIcWZ_G~hT*S~@gczgX^^Tqj|(4gSje@TVR-)lGN3}d*O*7e ze$p^s?*pp}8Bg>DK(@p|ybS0d;}qgYzTq9_3-G+Qe_%iIvpAlFC3y3!VSt9V`cxhk zI>2t;VZr!de?Xh!LOhQN{&#D!)rzvQFmsN0yg~~~l3~e5|3Nj{g8KIpLu53wir({~DTH*I$~X{c88nogN%xup zQe@BG_Y!e0!JEVJ&f4{RgSP^~$RkgYwr2X#!mfO=S3cFYy_&w!p9jsNZtr08D{<`Q zRc}9CzdYR5_;Pncf6LnKnXQ(!%jQBc_f9gQ&C&f*DRxIfaqbV)hs}>uW#^dn5?1uM z-}Jy8>3G%uPc1F-lPz4OKLa&DM^WbKk&%`Q+{@Ir_}r~B#LLiA?J?^_{bI7onS`jg zGXh;EA|g7@+;ykP8LOD$Esd-Z+7h)psV_wuyvsqJtIEU2C5eTdf1=5kXtmHHY1ZN> z$rJtvPpIy5H|EQUOy4e!?DfaiU&k5?RR?uo&oamOaeTE7evAP?s$Ej87fzF%Iss4Z zu7C&LzIL)xIR#S3w$mAXTc$b)ey*JC7XYjUVlH}fK1&3xCY;q@RbBq_!+OP)nvm4@ zw~N+h9+B17Xds3ORHqGz+|={Th|tLaz$MO*&$YB>asCjm_QIuw?!9CpwmQneifMEh z5mD4+$#OSmAu<^0w#3IJ_N3ZVFc@~s+B=KSm8g=)muTUH@Lj9X7t}4xHesfY*w1}2 zSGgZ*TrGvhtwL#DlWS)(uJ_=a&1l*K2!+qbfXxQaevpe!30_DU0jqF zrnP*4TeDNhn1VuMUVmAainVtMfi^O zYx<0KXa-B0byxJIZjINmybdo`?5VY%qRzF>oW3;5iS!+tR`lQabnJw*nLPY!FM7j- zl%GO&4{`u3fx7JEu9E?O={zm~K1yk0|}ln%V8hJ)Q{%VTo8J9cYB=`WPX zF;A^;Z>?%N*riGvNalmub*G7+N(}??b^#0*135jeIC}s0I!nLSG@6-XgCn+A4z6M& zWvio3carCq((b9uWnRKuxsTSnZZ z{`m&x%-w?Y-y!Z4#c1@fjElHRj_VKg}SCaTTD+eRwxxG?~ zTTsJXpw13@j+d16ll9a>@y+Q{ zoDUl$lUuw1GOCn z@h^9pUGyO=0vj9_XfobvQD4NDz3S|$Y<;%B3k_Bu8M*$-Nzl1{#GBvbMRn%4>@IHI zbjtwaTkh!N=7)V%1*O7t5wTxG{<>*9f4!zTP`}xv4TgQqxI`{@aPc?48O@e^r1x~f zjVx-Zw+39N} zKCoYAU&qyTGm0t&w>~(^7=IWVclwz8o1neiA~a4cp%Hb<;dm?N>=3kky(s3wpWriC zGPRMJ`m7kWGbfXRv0gB(NE>SmicTHP@R@+V8zpvr6zsZ>gq{@0@rp22ey6O7T~=Cn zvD5{Tr|dQ66tLg56?_`kb`4K_8l0Ddvbgzv7vdxHVeCrAN%armht_`=EL~ zvBZ!V-zSJoSG4^g?e&AaBh2Bo)e`9rF50~R9&Mn&MW2;R*~tO>nd1LmLg;7(MRpUH>t z4wOYrimUN`BxhnjS>&ocOii*j=|oW!XWjv{EgOn>bY)+nO8by%qnK(cyMM zOwX9}fVQ#4K!x7usGsyRgkCr?f5X<~SL2Q%x|G3wofx$IUU>#0T&4WnUn4yv449?! zI`%reg`9YmBM$T`+}l)7CKw_67j?7>R4F}nuF+_p_OHOaY!m@~vP6fgKs7W%Jn|W) zJzu^s>C-FlA*a?bQT?Q(oN2Zc>*E`tPJU>f*G1h-(7*tlvkprpoPXcenUkdI{4nW7 zv)WmIi!|QjL^aYM7`ELz+KgC$Pgh>%ygx6xyZG8~s8Rtdu!C}y_p`CgE`dY3-#u~b zdD$J3Y7ol3oVezYsHYjYuXG->bHBI6d`3}gx$|FV_rHvF=3PMK)$ek!&vx#-zX`y` L(%#~kxmWBz^|G3< diff --git a/windows/security/threat-protection/images/EDR_icon.png b/windows/security/threat-protection/images/EDR_icon.png deleted file mode 100644 index f2622cbc2bc011758fc1f687cdb004d508a6f666..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 2826 zcmZ{mc{CJUAIB$4W6;PL%Dyi#mV{7*s2L0jA;v?9VQga?Mnnk>k}XtI_H9s>Vel}@ zPPUq|uQ3XPJc)>RJnwn`e9!s)?)RL}?{n|{@1C1zWpVu!rw}Iq062w!8{cFmlGzB3 zlgt&DT~W*oPypN^2mkK_n}MSFS$14ujrx=afGmts9!k5!3a zw66z1^A`_@IRPC{to`o>hq+=s0H}bYW1Z{Y!_h%*7+0o>1vF6Wo-i@TF}8EX`l0cYg@h%>(fB=)vm$w5$HUz8-$TfSrM?HYPiHtl6N0F&=O1M<*B$*3GX}@5+RiZc`f-V&KO}X0DmziHhF=#q*B5YCX(cvaF0H5 zp>#X?t@{)Di|yvwUoSWI2PsCT=gNF6ZkFrCSmu8pjw}U#i2uJ)oJaG%S7M82;ZxK} zJ51{AJual&hRfvZveT!^V3uBW#TpYr!THxhUWL%|5TNR|zvgnnup-)8gNgGHdJuRo zpRju0imCw>Dp0HhB@;iZeF^IrYl4}>&)DYFmfn4~xH&Erjla}SY=!v~`z~lP?gOCn zf7phu%NMWQcU1_6Y3`ZhlU6@>H#TWLEK?>e*|JYG3ld76xQDML-vIB>dzVFdGUQqm zl;jK_sB2%wk-5NLxh^O|?+0PNsR)y_!Mkql%WW>hreKl3t-jJevJ=;Y-DXEb9=Pqu z*w+SV#sG)dF+it;hqhJTgw41rZM!Otk=8L8{h{;zGp`Znbe@H*h?AM69ZBvW$YWdX zRrQRYpLA^0H?tSl;c%e<3XM2@a*^aZlNFReer5Y><)RvmGB+FbE^bb?iMNu3Kk{9I z13FOAXHE$9+rc>hf#T?%1x(jn1-g|2g-H0uS$aaHgB=Ex@p@#WOB&7iWS{fdA?p(& z4!Th6c`sLLtX`|HxJYvLJ$nsaETWCdIz*)ZlNwh6!d#D-xv+IvhG_EbG5wCAe*~vX zxy0Xrz-yS3*D${=&hWBmum_{=FLfHBcxmys-pHKk5~FDFc-)jSZ|&r*pF9mftVqQoUw-E-Y7$-5|1YIk0`0tx1S#_eJxf?cY+_ zH~7MHvU`&|-ZlR2F4fA@8Rasz&H%M8JLC|k!lv2fQDH0e37T=(m%2_s6<>}WX)pI)yc%;+gxWTXIbI=wqC#$Vu z2jdB%cd@Msm3&D%S|8drJ<>Mm-@>*kmW75|_RB(U?2Yn+v|u?z9Pxwh0fWZvPaMSS zSY(p8z1eeFwPR=aT|>jVK$g8f3m?*-Ea4b%fytr;$Ux;v8*8lGW?JBE4QdpW>DZL+ z)aupbxZ?>EyQ0yTBiY}-qjc8HDtug+qb^mYWx^tXa&br0fJ*a`iuAh&4S77N13CO{ zk@cq=OH8!+ngzKU508^Ilo(zpHq|a1oMw@6X@((Jr)ng7`!e*`rGb|8z4vYE+@~_a z24cCw&zO#W={4)ILOfEuP;U@ARGN4Ce7~ioIvz(h=6&OXN<#VMe>}ucoXw`{QJ+k&gqgC6F zLGc!^cL~_o;-+Q!p?RBYBO*^))d%38b7sVj6ewxgRjF!9K|=YQ- zbfY^#?M;TqF{5X{^ez#cM(sop3Waa#HO&1>--l*2F z1UEV-QE<>hK18NB+msGT&vsxHK4H*(Cw=LZt~~Iuv(tWK2a>`twOeZMCYoQwjKM)O3k9$5K3=F zcTmO)v&dR01>Lj<@?APBfUGZla6iPz*~5TT-3#8^tIsZ6{xPb?D#&FnE}J237&BNT zCrVI?7qAyBs)!Z-+-?6hR;Bh7+Eaq_^hK+$o=4h41*+im z-U%_aD|zq;#O5Op$fmM%o5brMf02QY#Q_QOs$Q!N$WSK3fX`Y&mQe!JrC}T z?oH&dTnS%hiPqQd!;Spp;ihIiG>=316p$?J$UYVdn=0KjrT1&!6ABa|Q)X7RGEYmLUZFs?tz6Q?rb)gmj!xi`Z>2dYxZ!lHY(2p3ld*H78#=dpoMUt-uF5f>%Tu+Z0BkfT57)XMQLu{$ZC{XK|U^OX3(`0*; zp=Hy)J{{=%UEFgh??!-A^`x#tc`P)RbwdE>Gbb|Cl3ui7J~D}{=d@cfeIq;V>&jpt zEzH~$X)Vt66Zps%`#Ucd>kluV{b(k}KJ1j}W44yaa4GV|fHFj~N{~?zf20^w8Khl7 zb6N|zxf;bk-zu6+LTk0)q1IwgxH1YmZf*LNv5ov{a7sI$yy5hbS~;CajcLDpm5<8k zUyQ^%=GvHV3nf?=DT=+35U|6J@HZC7ck1b#liD^+V%N4mZ`*E%heU3dL!YLyuzNx}u9_x{d( zo5P2aGs5H+6wR`nVXA=0ca6J*x1I{~&82;dqs*f+m9`2@o^^whw}xX3!LL+s&+qHU zf1v)T>QePlZ}c={ot;R#;}EC3Mk)1H{R=)vDbR`9dM7c|_Oi2Psc5=>Ed@UINoZmJ ziw4%(F0%cv{j%@EN^_zkf4+CR9>1$|2}?y1zqw1y$SwAB(M{5QVGSkY6z|_}XN^j~ z4+942B4SrAcS)=A1g^NB`1Zq)lwK35217f#W3T(CHRIDrFXwNK7?sJrMtaR|1s?AH z=D^Pgxw(w}sDYok!<#9(e!i8g(;KpyZ(M=UxS9{v*lzy|yBf+o2D*WYl^G?{O7*|W$^Od8$>dPk@ nL320#c#M^6K?OwJCu1%BC0>iQRHm|;|XFenc+i11-R z8$dJ|0I4Ir?a)r17$*;R&@CAJ9>A%txtfP(0NTkBg#ne(4=4bX?q7;VBCe%e7$-L* zNcxB#26$lC9%By&j2{Ax1ikRQx|UP_8{Em;&J_Vj(V$PQwFv-*UgPHow7ZkLBdC>a zEec?e|BUxR+aW;*SK*}p%G5mE+>q`V(BVMp7l2V-%S@awu1HYv)(9UE>s&`&)x9n2-JRb$K3f1H4!?FF&0A2l)0vFbq zA$d-ws19D@RAC2cs7I(L-iCawCiMh1-x&_<+248cutY8vyA)Sl=GcIBtvJ{5u2Ot9 zo>%()`9Y~Ob@|7&h^nNh+0f;o=+^XXXl(EQGtmKNx3Rfe6_aZGkw#P?IM_(nmB^bl z$YDCFX}d&D+>{{_iM1BO)0;8~mbV`@UE)$0`FZNC;)9g+tIXb+2*4xKF_QGL>0{P% zQ1b5w3T$j_wM4fRBQ-Bh9&O#|WjT}5XKU;0UhIyHgX|g6&>t9uvJW3dP*OXJ9&#qz z<2Aol8CD44b%jJkBqSx1eT}tv58yK!n9qR+0&$vl27d%x2}Cle)$8)J#!)s~)0a!v z)YK5_{7j7E+8Y}itr~sfGz)Mkj2&W{BKJ9T)AmXV6$?udUpkHrsVcay<|3BJUIah3=C|3 zS~1DyGBrotAqEW#EiV^7y$G>g?S|jRF^aVo+9PDjXcOKavM(un)=ol)Nnx5+ofe7!s)Q=8gNt<6E!7V5^~ zNOQAPyoC~k#|xN~Dw6y);++h=F2C0czh9LuTHJIBzTSstc1r*U>qcaX>FVs~h%y0B z*9{H~&=~b08kAvgIbH}c^D|LJ9cUr$;>3F<42**?-9=}{! zTN^=Y0IM=!m1)92qf&%%XRV?m)jrrbx_)49Pa+jbOP|mUr%`*CGUhDJ%*-6$c`Ewr zxEODQjk`NtC?0>iVRmb0Ws?h44(nj(uPz>U2F{x!`p?F^Xm$ao^7`O28Q|i$dU!0K zT^g)JVUs5U{cRmtC{KcNEy^_ujpQZv=R$aW%V1x(kDR1fUESRN+VtHxIs>bEPHwAH zd-Zsw=jIj}5f=vCZ>05(g#>>dXaomun#-0 zi08w<{@xCW*L|~)&tB3B!KuNV3=^RpiDEQSq)rqxt4O}7Sxn#$%8!$L+~oIG@7UOq z(#t4fUNd3V}i(oiUP6<{)pgbwbFOhgR$z5c4&ZOtc8Qd1~ac+~*IE3ytnjre4%4 zb-kSQJ?SF)9glvbb9tbwny(t3aWlKm(f{z4d`mz}r(-Ib>4$xzeTlctCnD0tC1!9? zuVGe1mypCfvN$)Z%HQh4UV?XW-rqNK=MZH&x2x%?m~-1Z6MRtCG!LP*2SdpMxsp70 z{2xEdst9Um71U??T=^|gIvHj{fW|Tpm6nzQZ)j1t)bOp#O1lhY(los^Ra{-sRBuS^ zCpMWc!4uw`v6}NIh&0fBA3=Y0Kf7CM<2;*`=&6QZ5ua$IYKCj+qel;Rf|GXt7Y~Z&922yl~n7y}ma>$pwpzT`= z4pK$(e}ojnvywhfpoVXf2nE@5&2tAVzm!8bd&cB4U_VtrWWJh9>9?3zcqm5xoOj~N zGklVf`Sa1v?B}|7DR+gT@xo#>Y6>}Y2o_!ugB!ZA67#MgQ`(S32hlNBCZSXbMU$b} zpW{^&hk?zD(nP61n|y>wsejpz@T5I4Qya6e_xkceX}sJ(5i}8%bEZ7OjdmrzErb~I z2$K(%xu6l^QR23?@VeFuQCi*;7@pT)N4stLiFj9O6Dva)b-#SBvh*o+Torgr-?(ts z5b7*{+#VK%e4W^xgVr}3y3^!e*J|taGiP%OiVeDs$i}1(90D}F0`T-vJ({9ua6hwSw84gv15IcmMgSZ zur4UHvRtU1fL95Xd=|s`vIKpyyR`6ihI5gsszRLGO8NQ1fv9Ofkn-g#N_k&$GLBM< zrVv8kDj!ui_?s&CDJy)@CE=HV3nRSbxV?3k+=QRq^(hl)8G z5N*mPbjtvJUf${tEA&oP zf~gi=XUF0|#OB2L7f!o1vTRK?(-&O3TomhR>@8=1-?3JZ?5a&Z*Gq*wvgyncd=YXv zA>+|h6UVT#cOo&5b;yi)pFJk=JAH~u=%8t<=zMcHoM&DxjT0N?Wxyea1K~z~gU!%J oKui|64#9@&Kb14vlH`~Uy| diff --git a/windows/security/threat-protection/images/NGP_icon.png b/windows/security/threat-protection/images/NGP_icon.png deleted file mode 100644 index 6066f305a2bb1f4be5794ebfd3e6b2b6f0d36fb5..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 2034 zcmajgS5(u<9tZHhN-?1tr3eua2m*pqM2ezRX(AA+(o2LuAdmzJ1Sz{56p%zps8SZB zsY?}z6hovLA?hLuNQ<<1DG@0W%E|`sxo`K}`!F--_nGg^yv&?QvAx3A`A!o7|fw^jqf1lgv6l`Ks9^l z3>P}B%#5Azk5&rZQBc>D2~_RY&gl-XOUD+4(H&=RV3HZhRd|S$H5&}Lf7ZM4Qx~hxrp0d-0Xj$a-2AGul$6-9vhWj(qYg| zA~G%unEGAGe5FyPMhnGnZ| zb|uxTuWG>Oi}I^H?sT0HZ4b^9cfDe5A3zhLbElZ48Qs>YFqd;(nK)iom12lz3Ht}pbvEr-F zu#(|1!-sw-<=z6BwBl@ISGWQ)_)V`W8Nck2UXC8ld$fgbTEyJx`_dZ7+Fsvoo0c_S z7mXWnPG2BZ6rag2h{P`j0t*1_YpCLb?K^f0F8NE7JJ3h%< z!xkV0l4(^DfwM6jMI}Loh@M&|f{C;-b@XvS0%cc2e54MyFYnNXTxz0+p;VL0pv^Y^ zND&yLKV!l}qyCjr#LX$6kvED>&gKx7p-bd$bQa|_B~-(_+eOadHyms{S1FsvHtCJJ zWES>Z?!v@?uFP$y$lG^%YV<`(b(hp3&4#?;{NkvF$yHKHd{OYjRHV8<5`aw^+n$_OWRJ0=$H?i5(|pp>(ZL>8%fCz9!a5N_zF01D}iY8b9#KM|h$iY}MKA zdcT_cD`Ub*Lti7a7oJBDMiE=${gdY>UGTSNO`dGjenei}>?Ic)XrxHz^lT5dgTGet z-8gDyAQO_)w>=kROiyA3AI_=_H-`#dQ3Om*{#LI8dxa^k0 z3^{+J@j{?aJH*xcNA0_{FAV*@dvJAhp?%6wM^i8qRCPu=NJ{VA20{oyhmn(R`DHEK zepU~88QjU|D}FT1%x^SBQB^LpI>EB+uzU*m{{JeNB~gFQcB5l_b+}&}U}b*8tk%Tm Gw|@ZWrl=AC diff --git a/windows/security/threat-protection/images/AIR.png b/windows/security/threat-protection/images/air-icon.png similarity index 100% rename from windows/security/threat-protection/images/AIR.png rename to windows/security/threat-protection/images/air-icon.png diff --git a/windows/security/threat-protection/images/ASR.png b/windows/security/threat-protection/images/asr-icon.png similarity index 100% rename from windows/security/threat-protection/images/ASR.png rename to windows/security/threat-protection/images/asr-icon.png diff --git a/windows/security/threat-protection/images/EDR.png b/windows/security/threat-protection/images/edr-icon.png similarity index 100% rename from windows/security/threat-protection/images/EDR.png rename to windows/security/threat-protection/images/edr-icon.png diff --git a/windows/security/threat-protection/images/MTE.png b/windows/security/threat-protection/images/mte-icon.png similarity index 100% rename from windows/security/threat-protection/images/MTE.png rename to windows/security/threat-protection/images/mte-icon.png diff --git a/windows/security/threat-protection/images/NGP.png b/windows/security/threat-protection/images/ngp-icon.png similarity index 100% rename from windows/security/threat-protection/images/NGP.png rename to windows/security/threat-protection/images/ngp-icon.png diff --git a/windows/security/threat-protection/index.md b/windows/security/threat-protection/index.md index 6e17affb80..16ddcac988 100644 --- a/windows/security/threat-protection/index.md +++ b/windows/security/threat-protection/index.md @@ -23,11 +23,11 @@ ms.topic: conceptual

Threat & Vulnerability Management

Attack surface reduction

Next generation protection

Endpoint detection and response

Automated investigation and remediation

Secure score

Attack surface reduction

Next generation protection

Endpoint detection and response

Automated investigation and remediation

Microsoft Threat Experts
- - - - - + + + + + -

Threat & Vulnerability Management

Attack surface reduction

Next generation protection

Endpoint detection and response

Automated investigation and remediation

Microsoft Threat Experts

Attack surface reduction

Next generation protection

Endpoint detection and response

Automated investigation and remediation

Microsoft Threat Experts
diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/ASR_icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/ASR_icon.png deleted file mode 100644 index dd521d492a3bae932f0402886468149589862363..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 2483 zcmZvedpHyNAIH~no7{zvTczMtpyd4E5De7?{3`}rnZv9}TxRuBdN0HQY5 z76_g?@xn$(fVZ0ME9~(Ebj=z?0szE14&u-w9Wg~76eQcgEd}R+#{~?f(7%oH|3sEZ zvRODeAS4V>`mEQQheXIcWZ_G~hT*S~@gczgX^^Tqj|(4gSje@TVR-)lGN3}d*O*7e ze$p^s?*pp}8Bg>DK(@p|ybS0d;}qgYzTq9_3-G+Qe_%iIvpAlFC3y3!VSt9V`cxhk zI>2t;VZr!de?Xh!LOhQN{&#D!)rzvQFmsN0yg~~~l3~e5|3Nj{g8KIpLu53wir({~DTH*I$~X{c88nogN%xup zQe@BG_Y!e0!JEVJ&f4{RgSP^~$RkgYwr2X#!mfO=S3cFYy_&w!p9jsNZtr08D{<`Q zRc}9CzdYR5_;Pncf6LnKnXQ(!%jQBc_f9gQ&C&f*DRxIfaqbV)hs}>uW#^dn5?1uM z-}Jy8>3G%uPc1F-lPz4OKLa&DM^WbKk&%`Q+{@Ir_}r~B#LLiA?J?^_{bI7onS`jg zGXh;EA|g7@+;ykP8LOD$Esd-Z+7h)psV_wuyvsqJtIEU2C5eTdf1=5kXtmHHY1ZN> z$rJtvPpIy5H|EQUOy4e!?DfaiU&k5?RR?uo&oamOaeTE7evAP?s$Ej87fzF%Iss4Z zu7C&LzIL)xIR#S3w$mAXTc$b)ey*JC7XYjUVlH}fK1&3xCY;q@RbBq_!+OP)nvm4@ zw~N+h9+B17Xds3ORHqGz+|={Th|tLaz$MO*&$YB>asCjm_QIuw?!9CpwmQneifMEh z5mD4+$#OSmAu<^0w#3IJ_N3ZVFc@~s+B=KSm8g=)muTUH@Lj9X7t}4xHesfY*w1}2 zSGgZ*TrGvhtwL#DlWS)(uJ_=a&1l*K2!+qbfXxQaevpe!30_DU0jqF zrnP*4TeDNhn1VuMUVmAainVtMfi^O zYx<0KXa-B0byxJIZjINmybdo`?5VY%qRzF>oW3;5iS!+tR`lQabnJw*nLPY!FM7j- zl%GO&4{`u3fx7JEu9E?O={zm~K1yk0|}ln%V8hJ)Q{%VTo8J9cYB=`WPX zF;A^;Z>?%N*riGvNalmub*G7+N(}??b^#0*135jeIC}s0I!nLSG@6-XgCn+A4z6M& zWvio3carCq((b9uWnRKuxsTSnZZ z{`m&x%-w?Y-y!Z4#c1@fjElHRj_VKg}SCaTTD+eRwxxG?~ zTTsJXpw13@j+d16ll9a>@y+Q{ zoDUl$lUuw1GOCn z@h^9pUGyO=0vj9_XfobvQD4NDz3S|$Y<;%B3k_Bu8M*$-Nzl1{#GBvbMRn%4>@IHI zbjtwaTkh!N=7)V%1*O7t5wTxG{<>*9f4!zTP`}xv4TgQqxI`{@aPc?48O@e^r1x~f zjVx-Zw+39N} zKCoYAU&qyTGm0t&w>~(^7=IWVclwz8o1neiA~a4cp%Hb<;dm?N>=3kky(s3wpWriC zGPRMJ`m7kWGbfXRv0gB(NE>SmicTHP@R@+V8zpvr6zsZ>gq{@0@rp22ey6O7T~=Cn zvD5{Tr|dQ66tLg56?_`kb`4K_8l0Ddvbgzv7vdxHVeCrAN%armht_`=EL~ zvBZ!V-zSJoSG4^g?e&AaBh2Bo)e`9rF50~R9&Mn&MW2;R*~tO>nd1LmLg;7(MRpUH>t z4wOYrimUN`BxhnjS>&ocOii*j=|oW!XWjv{EgOn>bY)+nO8by%qnK(cyMM zOwX9}fVQ#4K!x7usGsyRgkCr?f5X<~SL2Q%x|G3wofx$IUU>#0T&4WnUn4yv449?! zI`%reg`9YmBM$T`+}l)7CKw_67j?7>R4F}nuF+_p_OHOaY!m@~vP6fgKs7W%Jn|W) zJzu^s>C-FlA*a?bQT?Q(oN2Zc>*E`tPJU>f*G1h-(7*tlvkprpoPXcenUkdI{4nW7 zv)WmIi!|QjL^aYM7`ELz+KgC$Pgh>%ygx6xyZG8~s8Rtdu!C}y_p`CgE`dY3-#u~b zdD$J3Y7ol3oVezYsHYjYuXG->bHBI6d`3}gx$|FV_rHvF=3PMK)$ek!&vx#-zX`y` L(%#~kxmWBz^|G3< diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/EDR_icon.jpg b/windows/security/threat-protection/microsoft-defender-atp/images/EDR_icon.jpg deleted file mode 100644 index ed71564e87e16e1dd8ee48512b71868ea75ea062..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 3278 zcmbW3c|6oxAIHxalfjgT#O;>L$kswqU1Ba}EnIu$GLy?M!{|q z17iaK;d~klm4gsW~ zkT49u|Im2tAL_q}y8#~z4(H>CBM|)jyk+n_4e*O1#C}lI-Lc2ws(`Gw`0@L(=}0-f zk_HLO?q#(4HJ@NXp}ms(q@?8!DJUu_pU^mY>hzDAXV2*y7#bOySXtZH+FiVK+38p3 z>n^Tt?!LGE{O{Ziz=ec92n+wm!-zOid;&S~wAD?Q{RY*w^ui$*Jj?*}0Wf#u}5gzQNuU($+?vx8n`nheSYMa-pE_oGf+$y&$@9xOv$scv zWA%E*9~2Zz+FCX}eed%ki&%e2mg`4ZmCD|#F7c#fjBn%|Yi*WV`>xEyGGa+eiLld< zq3v{TfGz3%OzH6A<-@@Z02Q5XVn@-?S!|* zRJz8|dADQMOl+c)M`cI--&b&^rb;Dymg)*GSv# zF3m~xNLTM@q=(##C=;{kM2oOQtBZ^ zkw0ju_pTL1CDq1-zBcj{C+>moPh0;Ol=d(x&GN>y@@mfk=T^qxYj)TBNOLuoi ziFjXrZm+|@Wa2Od0&QmFh8wL(*^{-guUwO+T*tmBpd{aWC6`Pd^)fo$I$nF1`O45B zWnQ^0*TAwuzUWVBvtFTY0s$day5g&xCDHTDeLghP7%r% zM1Q$_4@{7@=)pA!Nuz_W3JSQB=G>o{sWwq2baLd@8U)zt!B;6Uf!+=L1b#0dms?=DGdVHa_XkGO1Knv5zDQ$hQLRu!4L=pr1KOv9;)kBFjWSF{WI!x zu5Nq|y|EkPbp0OwTn`BX=|bBgvcv_3Lq4^6Hw5Gu?^o4zBQt(##vE3Vqx{Y7mM zSj=gf?xj9(xV5Cqy#WCa9YRrs4!ZXFWqD?=?P@D|rFHboD^(kP?jiI_eTRVW{o&$* zQ)Xf**CsyR(pM?pRKX=%2IrmbiI2ZFU}oAc-?!b;&pp^nc_?d&F;0~t56J%xt@=PhU+`<{5A(INq< z*qf(J8nz^PV$m#Ynib=WsVglxLD@S8k>w;#emZDRZBGwz$dQ`C2(OLj-VGi(=syy) zxFG69WsAlTG{&aNw8>)lY1d=PGziFFV6Em8Xp+0SYDU_4u17k7Ct?#1=05lqTCkt? zcSfCneKl1M+%KZ~a>ICBEJvyHO3Q>(|3zAQa1-9LMg^ZdfE~kOUi(eOPLF#*z&>3Q z<4%i?Cl@UBvrh(D9X5wkEcqTs*~Bl~#E%AR?Kap+C{K#BjI4H_T{pi@FzSi)jw?0$ z;D6(`p|#vBR?yI8d0da%)62Cl_;NZrS}ja{zlr9WR?2qY5UI;~ z&OyZ^)MbUDj0-GHw$)tlzdp}10$-{3FSXCJgj0Y=rp1ifwBmu!3`35{)>Iu$u_gPa zgbM^5Cpg?j2n-VFEpM-H>{xn~L7ktlIc$E`{37j`-|U0tbQN>iN6%vN#c|3q))w<+ z27xqfY4PIjiF65xz}i9259NdG(u^`(JcFZ*zvMf1{q$sT_+gDgd3w<#_Wicz9fEP{l*7Hd{S0#x zRRV+S!YQB?%+w6%RG+)pD+}_U0Zpg?*%|-m17$fGa1Y#+kIAqnt0EJNs9{ zfkdeW2;^p7S=9+#S%1^4H$V=3VnrtR;X-;Ta+UOJ`=du&we0A}7y8}8o3*qvEx1+; z?)u0ON9SsM8E!-4`ReoPfX4PM>K*6NsBA%7{@q@>JU5iyGG!XRUCb2w?Eq;sI^51t z!LO=nr)N$G>4$x8-W)YJO&b+@%h9_kY=F%nIHRO*&kopB8)gMfLZFq-A?HxWA$MldyZnRH#C)UYsDcp=nc0Wi!gq<-&L7 z{tzgXbbf^~$}tm{$+I+3d)!8}uPgHZ<;5ete>utT#~0CBxzmWpG;QVRvd;IAre(%D zw>8Y*#2Qs@*8PZeuYjjFzkjy9iG4SmNAz1;>kBy2DJ(^{Xm<489>PwYH-JD*_2vv` zxJ6?O8^Rj!6@KJQUbVp-R!Wn>?foK=rOk@T)!faTxyE?X=h%sSdYVb9z`UbbF#A}p zjO8aMlyriuY|!NqRD}+f&sz7L3#{AvkMv}O@&P~r0RT>eT|i>>Rym#N>5so=ta3!G Ue^-|3-#OA>Z}@laC<68W6M9K0hyVZp diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/EDR_icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/EDR_icon.png deleted file mode 100644 index f2622cbc2bc011758fc1f687cdb004d508a6f666..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 2826 zcmZ{mc{CJUAIB$4W6;PL%Dyi#mV{7*s2L0jA;v?9VQga?Mnnk>k}XtI_H9s>Vel}@ zPPUq|uQ3XPJc)>RJnwn`e9!s)?)RL}?{n|{@1C1zWpVu!rw}Iq062w!8{cFmlGzB3 zlgt&DT~W*oPypN^2mkK_n}MSFS$14ujrx=afGmts9!k5!3a zw66z1^A`_@IRPC{to`o>hq+=s0H}bYW1Z{Y!_h%*7+0o>1vF6Wo-i@TF}8EX`l0cYg@h%>(fB=)vm$w5$HUz8-$TfSrM?HYPiHtl6N0F&=O1M<*B$*3GX}@5+RiZc`f-V&KO}X0DmziHhF=#q*B5YCX(cvaF0H5 zp>#X?t@{)Di|yvwUoSWI2PsCT=gNF6ZkFrCSmu8pjw}U#i2uJ)oJaG%S7M82;ZxK} zJ51{AJual&hRfvZveT!^V3uBW#TpYr!THxhUWL%|5TNR|zvgnnup-)8gNgGHdJuRo zpRju0imCw>Dp0HhB@;iZeF^IrYl4}>&)DYFmfn4~xH&Erjla}SY=!v~`z~lP?gOCn zf7phu%NMWQcU1_6Y3`ZhlU6@>H#TWLEK?>e*|JYG3ld76xQDML-vIB>dzVFdGUQqm zl;jK_sB2%wk-5NLxh^O|?+0PNsR)y_!Mkql%WW>hreKl3t-jJevJ=;Y-DXEb9=Pqu z*w+SV#sG)dF+it;hqhJTgw41rZM!Otk=8L8{h{;zGp`Znbe@H*h?AM69ZBvW$YWdX zRrQRYpLA^0H?tSl;c%e<3XM2@a*^aZlNFReer5Y><)RvmGB+FbE^bb?iMNu3Kk{9I z13FOAXHE$9+rc>hf#T?%1x(jn1-g|2g-H0uS$aaHgB=Ex@p@#WOB&7iWS{fdA?p(& z4!Th6c`sLLtX`|HxJYvLJ$nsaETWCdIz*)ZlNwh6!d#D-xv+IvhG_EbG5wCAe*~vX zxy0Xrz-yS3*D${=&hWBmum_{=FLfHBcxmys-pHKk5~FDFc-)jSZ|&r*pF9mftVqQoUw-E-Y7$-5|1YIk0`0tx1S#_eJxf?cY+_ zH~7MHvU`&|-ZlR2F4fA@8Rasz&H%M8JLC|k!lv2fQDH0e37T=(m%2_s6<>}WX)pI)yc%;+gxWTXIbI=wqC#$Vu z2jdB%cd@Msm3&D%S|8drJ<>Mm-@>*kmW75|_RB(U?2Yn+v|u?z9Pxwh0fWZvPaMSS zSY(p8z1eeFwPR=aT|>jVK$g8f3m?*-Ea4b%fytr;$Ux;v8*8lGW?JBE4QdpW>DZL+ z)aupbxZ?>EyQ0yTBiY}-qjc8HDtug+qb^mYWx^tXa&br0fJ*a`iuAh&4S77N13CO{ zk@cq=OH8!+ngzKU508^Ilo(zpHq|a1oMw@6X@((Jr)ng7`!e*`rGb|8z4vYE+@~_a z24cCw&zO#W={4)ILOfEuP;U@ARGN4Ce7~ioIvz(h=6&OXN<#VMe>}ucoXw`{QJ+k&gqgC6F zLGc!^cL~_o;-+Q!p?RBYBO*^))d%38b7sVj6ewxgRjF!9K|=YQ- zbfY^#?M;TqF{5X{^ez#cM(sop3Waa#HO&1>--l*2F z1UEV-QE<>hK18NB+msGT&vsxHK4H*(Cw=LZt~~Iuv(tWK2a>`twOeZMCYoQwjKM)O3k9$5K3=F zcTmO)v&dR01>Lj<@?APBfUGZla6iPz*~5TT-3#8^tIsZ6{xPb?D#&FnE}J237&BNT zCrVI?7qAyBs)!Z-+-?6hR;Bh7+Eaq_^hK+$o=4h41*+im z-U%_aD|zq;#O5Op$fmM%o5brMf02QY#Q_QOs$Q!N$WSK3fX`Y&mQe!JrC}T z?oH&dTnS%hiPqQd!;Spp;ihIiG>=316p$?J$UYVdn=0KjrT1&!6ABa|Q)X7RGEYmLUZFs?tz6Q?rb)gmj!xi`Z>2dYxZ!lHY(2p3ld*H78#=dpoMUt-uF5f>%Tu+Z0BkfT57)XMQLu{$ZC{XK|U^OX3(`0*; zp=Hy)J{{=%UEFgh??!-A^`x#tc`P)RbwdE>Gbb|Cl3ui7J~D}{=d@cfeIq;V>&jpt zEzH~$X)Vt66Zps%`#Ucd>kluV{b(k}KJ1j}W44yaa4GV|fHFj~N{~?zf20^w8Khl7 zb6N|zxf;bk-zu6+LTk0)q1IwgxH1YmZf*LNv5ov{a7sI$yy5hbS~;CajcLDpm5<8k zUyQ^%=GvHV3nf?=DT=+35U|6J@HZC7ck1b#liD^+V%N4mZ`*E%heU3dL!YLyuzNx}u9_x{d( zo5P2aGs5H+6wR`nVXA=0ca6J*x1I{~&82;dqs*f+m9`2@o^^whw}xX3!LL+s&+qHU zf1v)T>QePlZ}c={ot;R#;}EC3Mk)1H{R=)vDbR`9dM7c|_Oi2Psc5=>Ed@UINoZmJ ziw4%(F0%cv{j%@EN^_zkf4+CR9>1$|2}?y1zqw1y$SwAB(M{5QVGSkY6z|_}XN^j~ z4+942B4SrAcS)=A1g^NB`1Zq)lwK35217f#W3T(CHRIDrFXwNK7?sJrMtaR|1s?AH z=D^Pgxw(w}sDYok!<#9(e!i8g(;KpyZ(M=UxS9{v*lzy|yBf+o2D*WYl^G?{O7*|W$^Od8$>dPk@ nL3%;wIx)8aa*{W zOX60xp&HbE$7D^pWGVY@tTXeD>f^ol{p;<0&gY!-IiKg8=X{^%Jm(R13VXo@3lnn_ z0EyZ;Q3FB&ARRR}Jfd{U)y4g?x0kn@hpV5G`DK@#N_Lt%cWVOSdk_VXNF)Y{!J*MO z92SekN#aBz`5giwF&J^Q_?iJpocMPg{d$Y=1(Xi}goM5b_$H7Tj6kB$7_7Ji1mLea z(fC#S7v%;Z2Enix0!AVc2$7kqA{{^wkVIuoLzL9<^XM%;(tEC@;7)DZ zd%>5672mi?cC(y{Dp^fkLrZ(#ejVKdMn{ZIOwG(KPM)&0vv)Y{=yK8ZA8zg*o__uT zfz+TY!I4qdqhoHw#-*mEXWY!Zm6e^(DEQ^x{Ra;VOCOg#DX;kb>9e}}7cXD28ycJ5 zwzRgjcXYn%`qShQAESz z=<_~OTlQSTNFPqgD`8=`?maOjbHSG@zHyt@N0sR{>Mzj$8#C?yf?j7{M;6us0tUDP zFBlTh6CjuX3A+FehC~aP04QK(XM{LV1G!?~JE1D$iJ87K_NnHz($Jd^i}z%6ywqIT zzJd69TKH}?G1*Fof8RhUhz`wl0=O=QO1WJK#TB2Z>E1?CBK?X=5y*{C# zz8%JoRQEN6Qwc0Kb&|dij1O%_?-y-yZeh}GZkf@k47}~cp(@sxJKUP`B2K~DHbQAR zvLP4!-=AZT!UN7XjZp%1-+z*-mr9t@wb~H14Tb(r}i(bpYh#I zmT;%kLd@p|9>o#ViQ=;TU02mW5$>wP{G37~kHo)R28~RcC>tk+jR3|FN)4J@_uz{^ zkmSoUs@a7MBlU598`W zt<&ST;n(HLv!qJ)Bxy>qKKWI|uI9hT2Qv8KPez~GxOo!vsX>Rl2rVa>^JEqI58$j! z=c@G2VXUECXf>AaE~Yd8ypuyLVL!spq9U{y(=VUU<!|rUk9)^s7UqmQx>kSFNUR>iD6eXhtpL#D~~ zYd5avGU(j6kvV&_Xn;AAoc_|ybAPm?lMv{oRWu!-=cGh#`SO7bj4zi)9n+^pku&CDme+gy4Z9rP$#Jsl z%*~#w^pv6BI0|)>*V~WiZq|L9+Cgs_97g2f3&1lKB{D5ZViPqMBJ^Gh;85e&or$|#rfA6}mmQ0-jY>C{P z5$t;&d0Qaoj(6nzK>su|lSAq5U0xAAYr)aw+af%N?BOxGAQK)QS)JqKzWuV9OT&M> znXw3ujU`z}gu!AF8eiTybg;-#UcNEcyEi3bSt^5aL#bnQ(J}6cT!6g;v${Pzk;5)I zbw|8So${FMZP^`$3JAD;O+*>e!IIQ|(-C~_qs&I+!uC3oRT`5&?<{|})k5pRj)_lv zV(H3+pnq&e!zQ~pELLro-4eaqb%AcwQBU{%_W90**J-;A3Bdw47ZwnTD5gSCod`%% ziKmw-{5f|Z1W}$Gt`JNz3>1x~O=}&ZJiB}!YZ+`Geoeen0B=6%7ftGB4M|=Nvq?DB z)28uU{UECR8Tkf}ACcfq3 zQkz(|rcYnl>6+cC;6JnETmn{%@AIGN#5cq(I%e6glDliIvuSyxR; zu9x$740ZD{a5NFDCcfU^qKD@hFq<@kV&aQ6-g5Pc<1(du=Nz|Douda>+(gV=TlGvx z4fo16f9*QzU+WHJfH629*`T+<{r$O_Lm|@(b&YT}BVTpUtE{}9h7Y_!MW>#mQDXGb z?+2F(OY`CbFPU)|GnwAbm5ZVE>ePU#OICx(XS2!S+6!l=ySLUabPaMk$MW6Mf7oZj zCF!Uh4mx)5Gu<$IIlD8?!9B#W)I$G2#n3bQ4pY26f#Pbh<2BQmWZ%48R4YJMOeM(Y z5dUmIXYJG>jhWs(9N9zbHdFXSLyI`XZq4Uqg*9u?> diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/MTE_icon.png b/windows/security/threat-protection/microsoft-defender-atp/images/MTE_icon.png deleted file mode 100644 index d5b9b4808649a7213ba8e2d3f17d93d18f4b8f7a..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 2609 zcmZvecR1Wx7srPTGoweu3WC`v(R&R-bcv`DEn+Z?&KPwNqr_T0jNUdvj1n~xHM-Ta z`Wn4PCVKR?Kl?uK^ZxVxaqoGa&-vbS&u!20#c#M^6K?OwJCu1%BC0>iQRHm|;|XFenc+i11-R z8$dJ|0I4Ir?a)r17$*;R&@CAJ9>A%txtfP(0NTkBg#ne(4=4bX?q7;VBCe%e7$-L* zNcxB#26$lC9%By&j2{Ax1ikRQx|UP_8{Em;&J_Vj(V$PQwFv-*UgPHow7ZkLBdC>a zEec?e|BUxR+aW;*SK*}p%G5mE+>q`V(BVMp7l2V-%S@awu1HYv)(9UE>s&`&)x9n2-JRb$K3f1H4!?FF&0A2l)0vFbq zA$d-ws19D@RAC2cs7I(L-iCawCiMh1-x&_<+248cutY8vyA)Sl=GcIBtvJ{5u2Ot9 zo>%()`9Y~Ob@|7&h^nNh+0f;o=+^XXXl(EQGtmKNx3Rfe6_aZGkw#P?IM_(nmB^bl z$YDCFX}d&D+>{{_iM1BO)0;8~mbV`@UE)$0`FZNC;)9g+tIXb+2*4xKF_QGL>0{P% zQ1b5w3T$j_wM4fRBQ-Bh9&O#|WjT}5XKU;0UhIyHgX|g6&>t9uvJW3dP*OXJ9&#qz z<2Aol8CD44b%jJkBqSx1eT}tv58yK!n9qR+0&$vl27d%x2}Cle)$8)J#!)s~)0a!v z)YK5_{7j7E+8Y}itr~sfGz)Mkj2&W{BKJ9T)AmXV6$?udUpkHrsVcay<|3BJUIah3=C|3 zS~1DyGBrotAqEW#EiV^7y$G>g?S|jRF^aVo+9PDjXcOKavM(un)=ol)Nnx5+ofe7!s)Q=8gNt<6E!7V5^~ zNOQAPyoC~k#|xN~Dw6y);++h=F2C0czh9LuTHJIBzTSstc1r*U>qcaX>FVs~h%y0B z*9{H~&=~b08kAvgIbH}c^D|LJ9cUr$;>3F<42**?-9=}{! zTN^=Y0IM=!m1)92qf&%%XRV?m)jrrbx_)49Pa+jbOP|mUr%`*CGUhDJ%*-6$c`Ewr zxEODQjk`NtC?0>iVRmb0Ws?h44(nj(uPz>U2F{x!`p?F^Xm$ao^7`O28Q|i$dU!0K zT^g)JVUs5U{cRmtC{KcNEy^_ujpQZv=R$aW%V1x(kDR1fUESRN+VtHxIs>bEPHwAH zd-Zsw=jIj}5f=vCZ>05(g#>>dXaomun#-0 zi08w<{@xCW*L|~)&tB3B!KuNV3=^RpiDEQSq)rqxt4O}7Sxn#$%8!$L+~oIG@7UOq z(#t4fUNd3V}i(oiUP6<{)pgbwbFOhgR$z5c4&ZOtc8Qd1~ac+~*IE3ytnjre4%4 zb-kSQJ?SF)9glvbb9tbwny(t3aWlKm(f{z4d`mz}r(-Ib>4$xzeTlctCnD0tC1!9? zuVGe1mypCfvN$)Z%HQh4UV?XW-rqNK=MZH&x2x%?m~-1Z6MRtCG!LP*2SdpMxsp70 z{2xEdst9Um71U??T=^|gIvHj{fW|Tpm6nzQZ)j1t)bOp#O1lhY(los^Ra{-sRBuS^ zCpMWc!4uw`v6}NIh&0fBA3=Y0Kf7CM<2;*`=&6QZ5ua$IYKCj+qel;Rf|GXt7Y~Z&922yl~n7y}ma>$pwpzT`= z4pK$(e}ojnvywhfpoVXf2nE@5&2tAVzm!8bd&cB4U_VtrWWJh9>9?3zcqm5xoOj~N zGklVf`Sa1v?B}|7DR+gT@xo#>Y6>}Y2o_!ugB!ZA67#MgQ`(S32hlNBCZSXbMU$b} zpW{^&hk?zD(nP61n|y>wsejpz@T5I4Qya6e_xkceX}sJ(5i}8%bEZ7OjdmrzErb~I z2$K(%xu6l^QR23?@VeFuQCi*;7@pT)N4stLiFj9O6Dva)b-#SBvh*o+Torgr-?(ts z5b7*{+#VK%e4W^xgVr}3y3^!e*J|taGiP%OiVeDs$i}1(90D}F0`T-vJ({9ua6hwSw84gv15IcmMgSZ zur4UHvRtU1fL95Xd=|s`vIKpyyR`6ihI5gsszRLGO8NQ1fv9Ofkn-g#N_k&$GLBM< zrVv8kDj!ui_?s&CDJy)@CE=HV3nRSbxV?3k+=QRq^(hl)8G z5N*mPbjtvJUf${tEA&oP zf~gi=XUF0|#OB2L7f!o1vTRK?(-&O3TomhR>@8=1-?3JZ?5a&Z*Gq*wvgyncd=YXv zA>+|h6UVT#cOo&5b;yi)pFJk=JAH~u=%8t<=zMcHoM&DxjT0N?Wxyea1K~z~gU!%J oKui|64#9@&Kb14vlH`~Uy| diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/NGP_icon.jpg b/windows/security/threat-protection/microsoft-defender-atp/images/NGP_icon.jpg deleted file mode 100644 index d089da249321b0833f313fabab4317c62a8da63a..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 2897 zcmbVNcU05K7M>776Gfzns8Ina3M>)?mL@1<15ykn76d`vh?KA(AT?5?2rLg!P>O{j z(xpff5=8?7ibQ&c1q1?w7D@==_oBOR-@fzydHe31nS17ZGxvVqnYlAiFEk2vn;2t^ z0gThGa2kNN0rISo!I?wW*RS4iC%6*u&ey#TVcf4OAF@?d{y`N$10WnA5C}d5pCB)< zpddd#zu-Rxe+|PeEb4C zU;zF*#um%BVSchVl!DOYD{0Cwo**UO^G1eo{kI>&Me)jEvDgVN9&7ZESJpFI>EO?fTF7 z8_qYqZh8Co-uCkk3%?r?85MmmG3ow;@hgU>-dYvkrN?&qJ|02O5gHJt6>+#oII%l;xec)*`;r+zmxvoIEVgUr2pjn zCuQgj5at6m01Jn4*bBqp!Z4^G2*P2U30xTH1D5g~0U!^aa{af1t66my-m+d%nfi6e z!fXykSjR1>u34Jh!al?8X5MJP2AdLaWz6(dmoM*%Z+65=q`hK`FHB%-mTXh-`$Y!r zWK@Uc9>Fm++|hTn5O0{|3e;(j`Xm){ z^&_YfcdHy{M_qq==%QWEMq0&j9u=-*(ZBfwdb00kDPDxTKPq$8UlV1lyT|_ zZ4EI7>cmCSBE|X6AktoTD{jSSSP0nqGKM%+|=zOW* z1LfhiOj5i-yH81WxU`9)=x912-Hc1&6Eew6YjXk$Yh(<0W7T4K+NVYKE zK_i)1H%^{i*dDRoJo}kF0Ed7*d94KvAA^9{O+Cq!k1y|MCM8FcZaiU6=-?~IA`U#n zy^3l$M`=o~unLl?NMsPRYU%M3LNP^QDe97_TFR^hjckMOd)$+~<@U;ZN8SKN1OonC z2ZD3#vQ*k7N)n3_%(Ta7M#UX<4#P6PcgQo z4X3e(-Ww+xlab#xqIx+?AbWX`A*q9laZq|c_H@?fo@HEdXXd)Il1fnjbbz(m@smey z#wqCe**7aWg1 zz%~0eI|#EpcIsfrV%4_sC4Clw6Q~0hnMSO!fk2f$V?v0a0D+(!2yl>@nkQFqlTEb4 zrx3vLc8*}G?((i8yeIGYj(c+r+D`JME@#f78{?FMu~}tCK5<5H!;|c&kK~jbyjM?# z_(9^`$m#@Vn7pR&4a7SYc zbx#WlZ-iN=#bAGpL-pj#=E#gIrIs`BZTsSSLT%ak*NB>ilZiEX23`9wj z5NJ95Z&eJT$mX$6#`6m(DTR6au9J01+PeeWxa2iNb{Uq+2^jP6bKhH1lZeeS!#3K4 zcMf$rC2shWJ%#cs*#QTK?OuA{{IOcmDlD}8ej4lYo~hL7g(~x@m$+6WRuovmP9e3o zoEEdthkD#n*4@Rm@9+*0Y7>z^?=>XW@%Z-)U8}C>>7?n}4C-{#^_3iQSjZh2j{7e* zT3ysuVCvo{`Kw&=)j3G|xY7Q%%U~km%t|d~?{WHD8?;QRCJ0FMP`q@`9P5L*Olo#V zrKiT)4EUJ74nSVtka%~xVbjj1n73bsJvTuNB1dZOKQgBG^zkawTwiRpW%&gOL4WI~ zOxExTF1pjeHV=0u$FVws3AxP|4#fGP^S?{oefc6KKxCjT^QUZVap4I*T>}W{c#C@OpHW$5iq>6HD~cI-;RJ41czL93Msr z&PW*_kBdBBm`@3yF0dyjC)>B0kav=K?5M9ZM`~F_Zzgk9XS@F0d)=_#&|4vax}3)n z4S_QkdRnhPS7sk6rlXwfmD zu+XFXDe05F$Z=^YwDnZY_^8*}W*d@(Ap3Kb>{?w)O7PV1q@PQctL@syYO{v=TL!-qpGqJ7qjuNC2wCMLHAVv}lJjAN(xI%9Ir z$%z+s^fId&i2}-~vYu2;ml)T?_SNLW%}nA{Cah__$zw2;HMol)P?>YDLar>Cno_b{ zweIg4D6TD^A=T9|>@n0dkM3ZmjL+8iHrA@sOP}BN|I#9nN+{iJE%cg|rbCy5otl!3 zDtxIvGd6oQ-zG6OsCc1-jB|&8w4JxWgXvM{b20bplbhY>*paG_^K~MN4I}R;1ofR& z8c(^h3N4?k8Nj{PhSA6d9xr=iZS}{Bj2HHzwGcqn2dK!d=mzex5md_WuAnit&u{t$ z6DIuY1F4K>oLBVwHTdq}He&pWK&}`_()_kC`q8<*<x3A`A!o7|fw^jqf1lgv6l`Ks9^l z3>P}B%#5Azk5&rZQBc>D2~_RY&gl-XOUD+4(H&=RV3HZhRd|S$H5&}Lf7ZM4Qx~hxrp0d-0Xj$a-2AGul$6-9vhWj(qYg| zA~G%unEGAGe5FyPMhnGnZ| zb|uxTuWG>Oi}I^H?sT0HZ4b^9cfDe5A3zhLbElZ48Qs>YFqd;(nK)iom12lz3Ht}pbvEr-F zu#(|1!-sw-<=z6BwBl@ISGWQ)_)V`W8Nck2UXC8ld$fgbTEyJx`_dZ7+Fsvoo0c_S z7mXWnPG2BZ6rag2h{P`j0t*1_YpCLb?K^f0F8NE7JJ3h%< z!xkV0l4(^DfwM6jMI}Loh@M&|f{C;-b@XvS0%cc2e54MyFYnNXTxz0+p;VL0pv^Y^ zND&yLKV!l}qyCjr#LX$6kvED>&gKx7p-bd$bQa|_B~-(_+eOadHyms{S1FsvHtCJJ zWES>Z?!v@?uFP$y$lG^%YV<`(b(hp3&4#?;{NkvF$yHKHd{OYjRHV8<5`aw^+n$_OWRJ0=$H?i5(|pp>(ZL>8%fCz9!a5N_zF01D}iY8b9#KM|h$iY}MKA zdcT_cD`Ub*Lti7a7oJBDMiE=${gdY>UGTSNO`dGjenei}>?Ic)XrxHz^lT5dgTGet z-8gDyAQO_)w>=kROiyA3AI_=_H-`#dQ3Om*{#LI8dxa^k0 z3^{+J@j{?aJH*xcNA0_{FAV*@dvJAhp?%6wM^i8qRCPu=NJ{VA20{oyhmn(R`DHEK zepU~88QjU|D}FT1%x^SBQB^LpI>EB+uzU*m{{JeNB~gFQcB5l_b+}&}U}b*8tk%Tm Gw|@ZWrl=AC diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/AIR.png b/windows/security/threat-protection/microsoft-defender-atp/images/air-icon.png similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/images/AIR.png rename to windows/security/threat-protection/microsoft-defender-atp/images/air-icon.png diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/ASR.png b/windows/security/threat-protection/microsoft-defender-atp/images/asr-icon.png similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/images/ASR.png rename to windows/security/threat-protection/microsoft-defender-atp/images/asr-icon.png diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/EDR.png b/windows/security/threat-protection/microsoft-defender-atp/images/edr-icon.png similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/images/EDR.png rename to windows/security/threat-protection/microsoft-defender-atp/images/edr-icon.png diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/MTE.png b/windows/security/threat-protection/microsoft-defender-atp/images/mte-icon.png similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/images/MTE.png rename to windows/security/threat-protection/microsoft-defender-atp/images/mte-icon.png diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/NGP.png b/windows/security/threat-protection/microsoft-defender-atp/images/ngp-icon.png similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/images/NGP.png rename to windows/security/threat-protection/microsoft-defender-atp/images/ngp-icon.png diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md index f2891d5f18..84492e0423 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md @@ -48,11 +48,11 @@ Microsoft Defender ATP uses the following combination of technology built into W - - - - - + + + + + -

Threat & Vulnerability Management

Attack surface reduction

Next generation protection

Endpoint detection and response

Automated investigation and remediation

Microsoft Threat Experts

Attack surface reduction

Next generation protection

Endpoint detection and response

Automated investigation and remediation

Microsoft Threat Experts
From 379323220866d8285963519e076f4aa8cb074be7 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Tue, 11 Feb 2020 12:41:22 +0500 Subject: [PATCH 31/92] Update mdop/mbam-v25/apply-hotfix-for-mbam-25-sp1.md Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- mdop/mbam-v25/apply-hotfix-for-mbam-25-sp1.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/mdop/mbam-v25/apply-hotfix-for-mbam-25-sp1.md b/mdop/mbam-v25/apply-hotfix-for-mbam-25-sp1.md index 6cea5686e6..cd77d39b06 100644 --- a/mdop/mbam-v25/apply-hotfix-for-mbam-25-sp1.md +++ b/mdop/mbam-v25/apply-hotfix-for-mbam-25-sp1.md @@ -22,7 +22,7 @@ This topic describes the process for applying the hotfixes for Microsoft BitLock [Desktop Optimization Pack](https://www.microsoft.com/download/details.aspx?id=57157) > [!NOTE] -> For more information about the hotfix releases, see [MBAM version chart](https://docs.microsoft.com/archive/blogs/dubaisec/mbam-version-chart). +> For more information about the hotfix releases, see the [MBAM version chart](https://docs.microsoft.com/archive/blogs/dubaisec/mbam-version-chart). #### Steps to update the MBAM Server for existing MBAM environment 1. Remove MBAM server feature (do this by opening the MBAM Server Configuration Tool, then selecting Remove Features). From f4be2a3c0a467cd90bc7535ce50aa649c83a2b39 Mon Sep 17 00:00:00 2001 From: Nikita Potapenko Date: Tue, 11 Feb 2020 10:02:05 +0200 Subject: [PATCH 32/92] Fix typo --- .../windows-defender-application-guard/faq-wd-app-guard.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md index 0684b674b2..1e8839b354 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md @@ -83,7 +83,7 @@ To trust a subdomain, you must precede your domain with two dots, for example: ` ### Are there differences between using Application Guard on Windows Pro vs Windows Enterprise? -When using Windows Pro and Windows Enterprise, you will have access to using Application Guard's Standalone Mode. However, when using Enterprise you will have access to Application Guard's Enterprise-Managed Mode. This mode has some extra features that the Standalone Mode does not. For more information, see [Prepare to install Windows Defender Application Guard](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard). +When using Windows Pro or Windows Enterprise, you will have access to using Application Guard's Standalone Mode. However, when using Enterprise you will have access to Application Guard's Enterprise-Managed Mode. This mode has some extra features that the Standalone Mode does not. For more information, see [Prepare to install Windows Defender Application Guard](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard). ### Is there a size limit to the domain lists that I need to configure? From 07a78b14da48a0a21a59f1232e094908a1453ce3 Mon Sep 17 00:00:00 2001 From: pradeepgpatil <60000981+pradeepgpatil@users.noreply.github.com> Date: Tue, 11 Feb 2020 19:39:34 +0530 Subject: [PATCH 33/92] Update connect-to-remote-aadj-pc.md --- windows/client-management/connect-to-remote-aadj-pc.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/connect-to-remote-aadj-pc.md b/windows/client-management/connect-to-remote-aadj-pc.md index a7c0f2f152..3afcb4da3f 100644 --- a/windows/client-management/connect-to-remote-aadj-pc.md +++ b/windows/client-management/connect-to-remote-aadj-pc.md @@ -65,7 +65,7 @@ Ensure [Remote Credential Guard](/windows/access-protection/remote-credential-gu ## Supported configurations -In organizations that have integrated Active Directory and Azure AD, you can connect from a domain-joined PC to an Azure AD-joined PC using: +In organizations that have integrated Active Directory and Azure AD, you can connect from a Hybrid-joined PC to an Azure AD-joined PC using: - Password - Smartcards From 9112c9e7c13ab7cda5f07e768e8c22c550ce9c40 Mon Sep 17 00:00:00 2001 From: John Liu <49762389+ShenLanJohn@users.noreply.github.com> Date: Tue, 11 Feb 2020 10:06:53 -0800 Subject: [PATCH 34/92] CAT Auto Pulish for Windows Release Messages - 20200211095635 (#2031) * completion of initial incorp * incorp feedback * connecting to TOC * added update catalog search results image * correcting spelling and some other Acrolinx items * small tweaks * 1 * more tweaks * still more tweaks * adding co-author * fixed missing topic link and some formatting issues * CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20200211090157 (#2030) Co-authored-by: Direesh Kumar Kandakatla Co-authored-by: Jaime Ondrusek Co-authored-by: Ben Co-authored-by: jcaparas Co-authored-by: Tina Burden Co-authored-by: Direesh Kumar Kandakatla --- windows/deployment/TOC.md | 1 + .../update/images/update-catalog.png | Bin 0 -> 154719 bytes .../deployment/update/media-dynamic-update.md | 453 ++++++++++++++++++ .../update/waas-wufb-group-policy.md | 6 +- .../resolved-issues-windows-10-1507.yml | 2 - .../resolved-issues-windows-10-1607.yml | 2 - .../resolved-issues-windows-10-1709.yml | 2 - .../resolved-issues-windows-10-1803.yml | 2 - ...indows-10-1809-and-windows-server-2019.yml | 2 - .../resolved-issues-windows-10-1903.yml | 2 - ...ndows-7-and-windows-server-2008-r2-sp1.yml | 2 - ...windows-8.1-and-windows-server-2012-r2.yml | 2 - ...esolved-issues-windows-server-2008-sp2.yml | 2 - .../resolved-issues-windows-server-2012.yml | 2 - .../status-windows-10-1507.yml | 8 +- ...indows-10-1607-and-windows-server-2016.yml | 8 +- .../status-windows-10-1709.yml | 8 +- .../status-windows-10-1803.yml | 8 +- ...indows-10-1809-and-windows-server-2019.yml | 8 +- .../status-windows-10-1903.yml | 8 +- .../status-windows-10-1909.yml | 8 +- ...ndows-7-and-windows-server-2008-r2-sp1.yml | 8 +- ...windows-8.1-and-windows-server-2012-r2.yml | 8 +- .../status-windows-server-2008-sp2.yml | 8 +- .../status-windows-server-2012.yml | 8 +- .../windows-message-center.yml | 10 +- .../includes/improve-request-performance.md | 6 +- windows/security/threat-protection/TOC.md | 2 +- .../create-alert-by-reference.md | 29 +- .../exposed-apis-create-app-partners.md | 1 - .../get-recommendation-machines.md | 2 +- .../microsoft-defender-atp/oldTOC.txt | 2 +- .../run-advanced-query-api.md | 75 +-- 33 files changed, 568 insertions(+), 127 deletions(-) create mode 100644 windows/deployment/update/images/update-catalog.png create mode 100644 windows/deployment/update/media-dynamic-update.md diff --git a/windows/deployment/TOC.md b/windows/deployment/TOC.md index ef3757e12b..84bd681996 100644 --- a/windows/deployment/TOC.md +++ b/windows/deployment/TOC.md @@ -253,6 +253,7 @@ ##### [Update Compliance Perspectives](update/update-compliance-perspectives.md) ### Best practices #### [Best practices for feature updates on mission-critical devices](update/feature-update-mission-critical.md) +#### [Update Windows 10 media with Dynamic Update](update/media-dynamic-update.md) #### [Deploy feature updates during maintenance windows](update/feature-update-maintenance-window.md) #### [Deploy feature updates for user-initiated installations](update/feature-update-user-install.md) #### [Conclusion](update/feature-update-conclusion.md) diff --git a/windows/deployment/update/images/update-catalog.png b/windows/deployment/update/images/update-catalog.png new file mode 100644 index 0000000000000000000000000000000000000000..e199b3a23a2ce5e0b07478f0e2da166d40c71834 GIT binary patch literal 154719 zcmY(qWmH_zvMr3e1Pe}ZhoHgT-Q8UpcL@Y{*WfPQxHJyI-KCLWf#5U*2u*_J4h~yMQC1rc4)FvI4n7bK;q8l;`|Qoz4c=Q@ zK^m@cp5pB71<655O$rXKB^C483i<6F-9ypH8x9U<PWShsH6x>PS#A0;BrY1n zS$Jx%`Ec2JA+8gO^t^25c-{AVLVAR9!0%QLJJ5T-qU#4D%xDBnI8XJL^VEMrCxdKu zw~@bd{4YFXza9yR-m>7l6eel2*W@reR$({;3nO%vf3XHt^>rwZ)oSZ_Dto0z1;ogR z4%G|qnrl-7S#-3fvu*n#Oe@OXfqgRa)z_C;obi>U80t*oS^dEBxg-94>-(>z{9ox{ zM69y`VDgW=OTt-DsunJ4&6q4usXl?$X^)7WRw9qBE^6{)+~&4j$HP}BBBx5p-Y3CX z@84_wNnEOl^fC#K#Z1P>QxIg3Z@ROI?FN3B@jCmckj_bAga7;|spA4M7RkDgh>kba z@C~~@1t%*`zBMpMPlkdWp!_-~_PlLBVp?q*6JQ7sZqPnX3X$tUeph46MDEfCek}Xs zt@wSVE(N<))l7Cxv7l;!; zNYoID5#bwSi5)#}fxP&qPIsuLHAebJQ~A4YHvU3X-L_nKekdD1v~I1pUbp4l*Sc(G zS2m&t7I(FZEO4c`5=*HNICUC60J?;*K;i_~#NaTsPb}?LJlryhr{g z+{v<0jdX(GLi#cI38i=m$CUI#g<4FK|A{ZB6aht=|Ez50xb??wVAGit(wrrRv`sAO zkqj-WQlnE!0mxO_N)6iSApS~Ljuu^`5d9>H@$ryt{h$o*4$Xv-x_CV@>ugX=DMK2+ zZA6ALGNiF8U6&A4-Lf_b-~-HKBz;)_F7DP+qC-BjCfcezx|m>y6V5f69@UjlDop@6 zui$Z&t-&GX|DkR+xk1Wr($fGlkF8p;IfsuLbF(O5*>)sl@Kt>`$16L-zA3EGHoxM6 ziSfIWqXBIOAYI#*ifgPrfhn~E4yr#X>78TFdN}hwR>J}b zL%*@}XgVY<{T!h%DcSyz-Xp_fpn8ga+fUUpL3bM@N0qt=Jr*f4jWs*{4HE0;ap+uJ z9^u2{V_`b~dFOj;+mDsjgWJlf7MdZfbf5$G{d!L?kv1js=ahzYRwxFNQn@^ZLKxdx z`IvKa7Clv&GDQ>N7+X|g@IEr8pjDsguP~lh+EP<4T;{`tvaDNsyknIvZ|1Q=qpWfm zp>%87eb_SuN!eV5f}xWkw3@-QIxu%d?WV9=ut!#Ctt-x}-0CJEK89b-p%I|>u$C|W7S*<}!2kousWy;P; zY+cQgW8{~)YkPuvs^eX)*8tHIjv1-I6dASo>3Q{x#yq=Yw0it_g~}u}J*)2N?@OfZ z1;fHNhVBThyLO-aO;p7`?O$}fmbx-ulAxOeZ5MH;&VH~Be5{3pW`xAJl#~hElg%TFekr@BDCP?d`zgBd2Toe>ZVKaShz>mzoyOG3uHwfMZzu*j&qAg3l4>5>ODZ5$% zT`ng8sg+L(Um}b-0TFF*pCN2C6eM@!OjC(LZ72&QWMq{CDqG=e!oPz%2rz%YU^494 z7M$hHb5zKX#pCCfngO$msN{KDgSMa6#ipl~jV^4}Q$ zK#Q8fM??kS5M9#u%h%HxWXhVX3u`*8@+E5RVKuS=mjjJ=brEwwJ*-5CO{IiNXbyj} znKt!my7a0tK*~hXrFLn)zDPuoAh$|Kl2sgGIgJWmZBi8Fin6>NmLc!451PKQ!0;6g zDQ5?!ineUmBTT4vc;v^Mcw6!A)rO@%A|eqn^KnZXcAtC;lEw6GQg^m5cpieGFXks< z>&rHsuEDy+U@WGP?E7|@>yV_#&u zLm9man z6Z!rMn{~_UxGWx#V~qvIe8%mH=6oV_T)sD>2dqAE$zGI1F&YOVfjpvVH=?ojKUSn6 z&CoaZ;ii9!g43r)+QnDK_U|SuOX$@d+pLNxYP76Lvm@Ip9`0oFtfwCkOSY+kJ5rTw zt>=Jew&S2>&*J)^xs4&Tj_?(gkbi*~JWJd$Puwv}%y-?AwkMct@=eA3Wjn9OXz;A( z@5()<5cp2W_pXM-yTTk2{c)_)^OLKcStz$(6^9n?eV zpJSm%Pn)fHc4SSaEgwoWZ?J0E$N zSr3>{-ztrXcW*Fdqw4h-)(m`iIpy((v%3c8JyGUJ)z~dsU3hK;Q^G=P>;`w1uGb!- zu|mvTVN3ECw*B7W=Z2*{2g$Fxl&V%1F1PHTf{9H&-@LadUn_CMgrh@E!EwT^e6W0y z2>-a2GI+}fuc{Gore5mA%Vjc7=B8&M%)u59@xqWFQ`Q>Vcr{%)Z&puwRgzu zig%Qb5gGnJaTEMwFdnj8=x0jR36hj#$4_5Snyivm%!|`ztUjpB!Vm&$OO4EgP3TP9 z{iM}eGlIXWfA>XQU$3HSpO8PBl~zlIrZ!#|F&R{|jO~+9ol*^CVqw;`)2T4l8|I?` z{3-_d6MKsQ)VAM?6hU3^{?fOmN#p6WM6eo3Hej6n=B}WM3$7now7b0ICJ*MQ7Ow*? zSd;!TjP38h>jWgG{>zMaST1vDh`{W7_NdOD?g^wRhV z(E`^Vu5hrT^y)RPt1}Q@Nq4)zEKyB;P`ZK_r=F7Nq2JaY

9FSe6$)w7|=L2j;p7 zDTW9km-?w{V;}17kjU{$YvF5H}p+p||6W((VS%(W4@zQeMgs`rbI0_M1@gdX}VOk(1)(iBAYcn$8Ca zJ=`oY96_yKG(nt(5YN<#cH}I&)xQ#-sX%xC2XV$x2#z!g&NK-zF%qjVTN=^RN&!$+ z@PMkS!%9;Dq(EtP6t*L6ZD3`!qOKP8C{a9Hf}NhAP?@Q@Sp`ET_NucQwvtMz@4KlW z1f{vsi+mPmGC8B~r9`W7dUB%PEE*cxQ^rNADV<6`PgD?b0m#rHJW#CkFP|DY-7=AX z=B;h2nBIM_Saz9vZ)S&U*FB{0SJ&U+QQOgCP0SM&4&WX@eboy|fhozA<=bmb7OlWJ zPw>e}$StX9`)2y=bS*A7U}KS0gcyIbIPgOgr7Bzh2z#^*j}zVCxbefJ&-*og`OR*9LBw7AznUwY9qNEN zYX$tEa#@;TYu)8fFLZQ0m@+bQeU=J3!@;yP&46T-2opTS+^D)1xSAG^5|kZdO4HP+ zpLxb8UzDvZz_&(b$R`$A-%#eX|0fj*99DVE_qEG~*yNO8@;Ru*fDV0njax>cq`Pfz zYsmq6*#f5;;&)LxBYx?b6yPG`HWP+u*z39IdfJxvNI9RL_N88cOZ<|YbPW;kz}~#A zlHBN$DY3g>5+u8sH^j#lAkjrNeRYCor|_51^PwuNtKuqDLeIWsiOAiDLDO@O+#H2e z!=6gdPZy#@sdI`!YS?R)076w=`JKt}$h^1QfR5!Sk4iXDIte9uLbTS9e2=E`LK82* zdh=URG!o%N(R+g0jMQmy)cCiVD4=APm-+^a?;;q`MQ1Bj$Z1rsH+n(%6>I}}B@e8f zx3TmBQn6!kP?Nr-(2-GId!S#hFHl(LJNB zKcj2<>G7MZ)PGt8{00-TqKqvEDq5^~hx&86c6SlLjk6J+P9E$!PL*4=cTIxRJz-sZ!)ypIz=3FPQ!=x0 z(T*FvefZM2CLKi7!Tksw!VHPf z@b&+af2468FVgPk-#3*l*+3a)--!rN2r06T3gj7FP0u#6p1?vMj^Q5)t&*US&*@L1q3K<2zPZXy$(4XejW9DlQSAWFrC zXe`x#<>N&QDI%Jtg$%S?YzC&=!AU$b*Y?v#N?F3En)N^Y;X?&`8F3xPL_ zTzufEqQ2vKTG$#Azw?hhz{!z32nScZ-EAGAEA%g_ataxx1$4?N`B^*8*P0IX8boN* zGTiYCA8&(>!oSXbpIG%@R}y`mZ{Fq~J1Ye0r2hC@<{X%GNc!`85Lxz$Z-$@}*IXLM z>QoNE?!UYD;{VybrLxKsY|dO)NxsaDpuG$K!)a8t6yM=lGs-=_D4+ ztQ>^7xh(NSWI=h=us0gnm32##`-oR3WWYTAW0g35%lRh^f8d3E#+dWch3`C&lW1?w z-JkofcsM;h5vpBAn&I1GAy8-;GN(H0rK_v0T9f(+D{z1s;bw?xFPb6#g2wCv`eADm z4?RRnr9C2ynB!kzibdSYygu>LE9H)blvC|UIdHR@pfL&595{XEH7a%QVN!Mak!0Jz zuv2^tiH;=NI9k~p*nVsqbDt*4Aa-?kIN?*MvFJ>R^_W}R_L?0oTF-?zQvzQQm)51*s$2jBufwTBU0ex2B{OQp$EnpE zy*?z5W(F>-b;KOxG5S^G>tiSvV4|K9@xO71n}ArQEg#)FploEp;;=vZ6Q8QtkG2`c z!wvtDNuN0`K&VXDRBJMp21cu7l-}NFXs$!gc=RjonhUV!NY}qL8_*yB#nh2mQ)!wH zp-nnQFL3>Dea|RMG12X5mwi zKoINC0cW|dm6Y_L*vUt{1gozuaf?YU!aD8^EwP~M#!f6RguCh?QahiBqe7SHGw!?` z%RV8#39K4JE7{GmCYe9!>=G!pA;ePaJPBMVc(S=va4^~ZXkIusX6$_=-V%H04WkA{ zUWil6Znwbw@>KxO8=_r98V#W`6zTSUA7(64Dlee4sHUxVxR$^j5!$FNltS#^c^XT& z>)9<)ixHJQ(7d`f*MgI&ODFhh$?sp9|G{gDr=R9)`RkkhHuwLV@T1!vWxJ7LaPDn*(>k^8p)J3l6Tc?Rn&yhV z^LJtGb75Ddrl~eH=fY8Ti6fiXuDtMY`M|pN14?Az*DB!}F2V$Q!SH(BTF%_B%F#La z#f{1!r_)tW3f5wUp@;ZDbG!vMqCY;;xd{$O$}hAlabR!eQQs(~VQQu0@{16c2i-cG zm|9Y&=DE&*L$wa%7`qfJja3l>-($}do6*(Y{SOrUV~=*lp+=7S_-gHc?Y9u_7Psh} z=ogER<=Vo;0DE`$FOXLy|1YxJLW&Oht6T7sl4$DCc` zb&?%^<7;IuQ=@$M?5mkiJ&bnYQhSSzKDN}0dl#qY-q`abLB~S7N;u`0y%4IYQV5RO z=Wq4?O{H-?)K5ERf6fkyE}8=g-N5gzXH4bA%4q)_vSOP$@r1iTMs+;tUP`0Yil}mVlPk(|!~1 zy(qRhwXgAPZ41qIBum;o__A!9@vLhmhK5m-)@7(>p*^wM>e#BaDhr1+ip3DfIk8e- zM6NxDX4tl8pnk1=zo36-uM{Ddk90hB+2+SCgVF{QqZ0n`pIm=t4Q>skkhBmTg2O&M znA$Q^U$c7q8d@mp{NaEpkx8?lhJ&J3S3r;X;)dre38;RPpPvN>^c|>f{`(!F>jT`ZUdh9dqRZCTWK zJgdfy3zetbfS~%@I3+@^xMx-?OR)oN5A7Bx#~J@w9Jeem$%Bn&C$qL3&-25h+cK&)zY1`| zDjUfFZSnFmAZjY1rU2n3>;0PW*k1D54IuK5nY1X4!;h;U`Aza42>9hIs)OB|_>-i8 zoO}|_aDD-&OX+n^ykvi;ibzkq7#ALXlNYYrz7l3;w%HKx*boIVk2egCF4StUe3x~< zM&?|VVaVAa&NNJvIPH0xK!zP&TbTh~B~wE-H%ihes?*HQuDhu@%1SkC7a(I%K*C09 z1DP_5n6C#mbL4--Be-{U=~X6epBj-)N!+y7<(*?}oMXEEGZxCb&f(&FYbeez(RBDE z5*@DIXhM@*D-tX$+zVYU{We9#P!L<^;vL}7x>Zo`IjckA-7pYP7u+}{ymtPz$rlIQ zV-vGWWy4;N0R#1hyIMp|Q_Xml8(BhoX<$!~fs+f(&ER$Vxc}Y!<|H_z-Aq@#o6uL? zItj4EHcpp>9_zb@w|P_ClMG})Vq1MpqvJah_=jhM1PJ|)&yJNGUoD!f?oiq`xo%K! zzHf`NRlTur%3KinGk;t(jgU3er2V zh1ImaDh)DH{Ekz?!O@Ba47zJ^zI=8L1!JRrtU?2RDFsZwSx4dH7bl3HWD~-)iCbAm zw0(0;@xW~qyTUdaMZPi1LJPRF0>&sNqHXtssV`^8k{uj9U`DPN?P z!HnnPxSuHplR4o3?65@?>%r^77{Y2DNaePBX|IsqaCz_L?ppsdx@RmTh4sn2i?aEx za}7fk{Y3KV5o6QK@=oAN+WpEy^FevlPACkoTE4Xg1X$$5VYR~_ASe~A7P6!y_3M5H zGcl}Hnb{ehg&wu08z!9RBk>Bq%F+8Q3#s$yXKLzXD*~>#ibafvipFmye)TOmzY>}i zT2As1Iwh2=E?IT1YD_*-{Rhvd{6`FfBkMWjtG#q2!*Zl5t4GvvS0|*-H($*cT}Lt5 zv9@oG%4Yq~GR=l{Akw3*3a)y*i(de!|NJz*usVU8HC=n8&8jXxJ`Io5B#nTo+F!4Q@Gr0jo+TV1^vRH)jx-T?^Ps3x(qLh9Rf1%Uv>K>mdKPl|LCZ_>XK`o zZ?NLNGkPTiT!%wmn_DHOn>t_&=1A(Zzw7EL@g8Dh!=95NZePpJPS6u}?Y)~u*B#>S zeUU0+Bz1|B&ZW7t1!x~|S1)?eZ}AEP5IzU`X$WKSv2o7;c@hNAh>!Qbc z7D`b#RAz|ijgzw+;v5Ja+P;daWmHeM5$ffOa|_4VW>GNmy@=irvg?1(Y|L6f9NrKJmDSRd{2i4cgVdO)COb{8 zlG2ejzPfyE+8P|7NmKveXP35;QC>S1(}V#C1X|Uj=Z`P118QeyvnI@dqiBWh-}N5f z=j4B8$*!f-@zEnn$mg{VD(-58Y-}I=yb;a#lo(Zhyq+&iUT@r?F?D~@WsbdGx8D^l zDxvW{17MBfYY)hg(=4+n;QD4T%0L%D}qwNvvjrZ`S*K(2^1;vn7!`oAvUznE$ zA7E*eLwYyxRk=q<{ao_CgNGA2+UVj;z9fK~u2@9&@hlWJ`yak6ZfSXblgOBLcZEK_ z0V3PEcWMMbHmn~TX=G|uh~sKy%pN^d&#+nhLO34XTCLwPQ4FIq-ITKwI+hm-APpwQ zDBY$TuW@M!N1fbfx1oCUX;JvsC-EBN{4NqRAIW3He1Ce&Zq_!Q_EEz5{AuWalArWZ zw6^s_&9(hlp_CV7;S)oGF~Q(^ICq$RcLXN6$6_-{AvX&4+f ztJ#=JBnBFYW|2md0n?-uoEZi_w3Y3P&;(NJvVhpK{_q$XwRDkaGO~?L&4iEY5Zacv zf>iZ2nOT_i*9!5McAY?hu|`_8<>|?~`RR&hr3R<@Y}gGP12B1!ShxLmSrmN{Ce_)x z{>@ur4N!5M?<00Xn=ZMMBx&)8&czDrj@s!y!iB@yw08&Ch`J+^k-$VKrc#esLTGCJ zcP5O$i&^fBvd*DS#RvA~z8m2$tt?+%aH@@^ok%=!=}i!o^qEKEL!Iki!od=>7s1<| zuXndPh z$P-u*wOr||abozxLsP20NeP$^U4KM{a7LkX*weznj3nC# zUMaE!S4K!kWzH{+@yhPf%jH)BA*cV<6~a)Noc>b{gg&Dr?bl~O<3ESN<~kHH8+q}| zev5>W`eb~ErRfWr^hRXM1|a?P1|9Y_7MgoFqPK;)#%i}8BE2Fq>cKiS%AuXdm&5s}rf~b#9z3FJ$RT-L9QKV2oyTJJRE=65KW_Cd)PS%`4wsb;*BiX*nzOa&D z`Lu$MBOgu(BpmC6>ZlD!P6>IF?aOsk=hi4G`ohiZoEk1Iv+K4Nri@N>>px@HEN@KT zb$TGEHl~hwdPjwJ^OU=HoOvyGm)9`7cFV~ zYJkfMT&S!A4hc01&s89Q3Fd}mWvG`(RHXr^k5r00bfoGoN9%@9p=!CmL!8Z@Y79jr zTAypdsJw$)-`{yE=zM=L5m~13Ew(E9#}6^DDyF}viBAxZsa82BPk*Z5v5>sP1dedK za+TxWPi>F5tT-muHkpcsGe4mfi%7nI;ByY%;@B|-XtZ^tGM|rl$NqX=;@R~e_3tv~ z+jTLtB|8QVgPy zP+Bc*u17OMtg=89kGX(xclW3JZ$zK8C;WysXVWb4`y%U-sUOG37>VA|L=FsVvXs$| z)a#D%cCGoQR5wU9H-g{J+LQFloft_BE7jjmt;+j(otshQWKP{SZxqA)h!ytrF^X9G zOuy)p4W6NT#7yzL*cweB?F#DvFKEts;$sH1_3Bl5O)S{k9yeSB|l| zt6SHp|IkpsAVF~cRDuy%eOLH98`XxCOxoYC* zFdW)$BD}0?q$U`N*hAlD92S;~k|K^5>OA`!Dc#8)vkBgsn^K2`jA*=sP96FKNPT5; zy;!OdJKfX#4Y#uZgqi$73_R;MQm8Hkc)!<*a!xkUwYA%_Wp4=oxLay$KiOuh)FGcH zq{-d@4@t=+_;u@CNNB*xxj^vq1pV$7DbOLn!Rv1~@<9Z?oKhKre?l;fgzcKJcR#7L z*-%S=MQd&m!i7bzjM^ZpE;esPaddY_)as>%IJCH7>14U-oaZOJB4yW`=h9htLZC9t z6KGhKl+U1U7C)L^@s*XAe%|RlCZWz)4|ktk<*cx&3l%4SioQvWV`H@NwRMGiF?`le zr{Y~rT(RI7aT6|mJ_2TPnXQfB8lf_Otad}0kBK1S_RG4-Q*rAT5I8YdpMD4MZFh@i z2#f9O-;x#>29$4;Yk_N4PsL`Ak~{C43KbScAAFt!wYLz_Rp~M>bxU$Oy%`aP;Zh1`9ekptaCTApqqrP z))(Iltp5eUpTjq?+v$olH3UZQ3Jyw%I9y}rypp+Ovh6RjX6DF9{vyKQRLyKnG6f-a z^Vrbmykez;)NVtv*oS9+sK)upJdUAT zft-IM4Gn0qYOS=va4#DB?!b2Gt(RgH;hnOd&(LKbH!oBUNcm|_J<6mZVS4c4D?tALRrU3Dnk_W6_@n7)O{_g!P*)nCgZJrx0X%wAmIG z>6Lo;bl5Da-i!hNM-_x46Ifh?2Phyyk>{G9SRAA3kew`1e5b4Ip~}G%tZ67Mu6oCY zI^B@9V&4XLnUlT6y@_{%sc&?&7okDFG$A|z1yryM<^(sz*Vl=zuy%#IElYYzXmZkI zDY2=H9@#Co@)+F+dBUgNo0`8mxm`J_yKxG9hnYm}yYkb~s4J^6+F36rb=1~a9vva{^sgBBHYaM@ zbZzHYu6rh`>1_!;6$OHCiF$mZX~zB+JSU+-aJEK7`4;Du^?ohOYQ=Cad~(joL-~qJ z*U`i#n(I5nR`jE;`cx0F&Tq27AH47$Wt!9 zeDA_E zDXW%tq^4nb0MjW5?U5{^ShJ!I2+?0Z1u3D>jw#YcRFw_PZ)iGDb2WhRJDc_CghsTF zd0(O<;t|GvI~`3bt^FjuAKeUrq$C78o!A0B@ePCjUQcepm+ul0QeR}e>YWXeNj^Wd z!N|lelZ~qi>-AMN?^lrIJ{XBf>SF69^g37euN|0+HhnYZ(&Hebo3Ux2M8rQS9ba#P zJ%A!ZyuOr7uCaNH{(;pFk`f6@n-*ADrrykIRWI$i;dGc-bD_AO+AvQzwHo!Xo3mMf zbn3a@)K=cOp?|LplTa@?YZ|2QO5mM!I<@*e+e9?PQh8V#vs%H|o5X%~d% zxx)_(xczcBq$Q?oNmh^a^Xd8$Q0m~=OpJJ#IKD5ruyI;C<8tSKhXPS&`8TOytZA_G-u|c@X)N-me;x91=c=2(?7xoc0($MBP!P! zp|Sb7BO=1M`RvJQkLg=yUpa6`xwKBafk77Aji8=fc1OaZROMHeEF5K52SA~ zuE}p6->)I$$DRW;*qoEh@Ce4<)ar7SJ>8p!CqX zaPjC)i_0YRORF+ETCbS!u0#r}bdKRR%zZcr3NJMnL?7e={G$jsbxD4cQCjx467!TqnXt(` zVm<@)I%j#CrV1~F_hMMQrtr->zZZ#!h&){FAga_`9wq8u?e=5l(9u<7X6ghBNR&kA z_h6o^X9YD0byVF9Q~f}_{S)mFJ@z-^fM9mznpZru;C5-~k?uoBvG};CcTzT{;It^B zV7zf}*BhD9q@HENFX70}%>{al-7X_2Nrku9s+uVA=}a+tHH2&JO;w%$X;RCoAU{x3R?G2OKMJPk$>~Ha;v^y zSgcY3xALPHvM##hDKr$(8qs33@khAahYSk8yV^nj6^aR9LgR_ro8PJn1ma7@?0oZe zddc7D(j8T$;eD`%yc*ptZj!wXR1Z7Bu*se|H`H^FlX=R0Hp8K5;)d;k5c1FeVq;^O z7#RmKy1IiW94sWO5Ss!*L*#%DqRp_CzCPaPa^B|^_YBaVos|=J^L`Ic?F!LX^%dX< z2NQ1RF@=*zvT<Nr z+_w#Rq=mn(SM;vk4XAB+qWiI`0M&^Vw3&$BsTnmBib$te`sEb(rPzyv$bWRJCP9QT zL1a9gJ`cUm7sGy1u=y1kRt!@P5Ni?&bS>TDe zKoOX)7PsJMJy^TiL!gkI&46nDuX1CQh9bOaE@<|;@fV#}JNZ;5cHcAZPi0lUMS}@e z+t%`pBHXH_h4ib6+25;yH#!C-j&D!#RYWz*(X@Wzqzje$`KyQ_ZtaJ0ZZzCa@C~`i z)mj{1=k(BN`{%B%arpWrx`-hFnkKhDetN**&?;sbK>di`JEZx<&>8&6A--^KN z9y)U6^`G%R<6S$N%^)`@&2C8$Qwf{=clZTqf$@u2Lk;UG*(_!eE=k!H%3h z#qBKWDGi@sjo=RsMdI_b61$-XM`RIRpNTf_V9zA~#I|lSFWYJak%jt(Da?mFAwbht z;E0R%#3fJb!rUfsns>VOGpP{|pWk0t(NSfmvfMZjq_X;lmE%OW?U!TGnP$VaBH+>^ zcmWl<^P!~|$1^w;?J))8DK-94JppxIF;)wJO6VAq=wmY$bCWTTPOoI|wXn6+=T{CW zzBDR*Bz6p!3*s^-SA{zd2P{4&17Bbb>BV+b6s?pku*M_UDGzTeQcgr;RflCqFr}!AgHZ1( zzM(U&U7BQY&s=Ujrfs`X0CG;g`O(JvbJ4_-c9@tQYMQXUrf1XAJRE3Mhf7JGUyHri zvDp+}!^i56XkuF!!99BY!x2*w$Xt?L9oP-K4VJgCOnr)CW@Bz+VfnNU-(L*t^BXZhEN=}0U9Rm||2pR` zg8RX4LxDf1S-Box=$v*+it1Q}vf2(=Onn z;94jwAovyC?^Q|t$_a9#-D`D)@(gr2*-Zv|nhxZL@up3;NAdWo#kXQK)pO?N{vfm? zte|c(^8?NKg8EMgznqe|?;pY%Q#W@$cn62KmSkZSru{xrL|vFxz*wVmzynCsk-|@# z+ZPVzG2R>lF)nnovCoo&Bp^5qJH2orVuVeY3}nMokBc&p`6Ld{o;Ux>6@&S8Blzw~ ze^gB6^3NLP{*Jplq8;%=)AVC*pjp8bz;XquHG0X=Ul(y@r}ZyrVk2RzEe)x4>2zT)5cS15{5O#! zA4oQ5o9ELy6ol+}IW`3T1fiE&+k>E+_9;Ngmr+pLhosCLH8Dpijf0z(*FSoW)8?uD zNj1$sF{$t}$em0{cyo;nAhX+u5-dJ6cBF*HcoouGR8E&wuTSs4OREJ(R_8I#W1w_2 zMK+B>zw;jEBIUEE6u@tpO_>}_d_q;=Wa$DrE5*>p@cvwSx0nJVylDjM(4S$zdH_fi zPyIrN7;0%WO0BZ1TXLlM&7YNGnAK%udk<2Kdu^#&{3dSS@SyqBOc>?<2G28ADFVqe zQ+m>Hy)6;XOYJzFv|)+FIN@l9&^mLEG0`H!b`aO;O9)c5AOdbGR4R!9Ur-z}g0 zd!@Oxe`A6xfc2q=CZL5kZfvXNHk$LBKj2$Hs9M>bPgE0&X`S@NRyZApkb?0%g{#P` zvKrXM*44p*t)&n7w_n${7e#2E4fLM@n6!c0`q=+$$1|%@afsv=I0CSYGixY|9g28 zZ?D9`1LY6jZ|l2vG~cc(z5dh(RVwmkG*JixNrcNN#H*<0mXeC0vfAIFD{Co2Uuh1_ zsf8VGQb-HE-)o+kQ~y20p2PyqEn)FyIH6TvAWRuYJ-#Vp9c)(-yLReaaz)*(IJ>Wq z_qxv;+QI(SyI-u1S^r47Jw)@~|G;Vk#IJ#WXt>#Za<6yW$yYZ`lWT1#b6GD2KmDk$ zeH+X}JN^nUNJqMM^mwPZs{2`Y@K=C`*hpqFLJA#ZR`2Pxphc$8!?lKuu;qr zr~LF7cWy8kEHfjSm08{;uc zbMr7WN4dV7Z%F&n5R*xxQo31Trlllp`3p!!FNR_$5?(Sa6|9~Er($0fww+nlh$QP@ImueFF}Hflgxo>Fi1L$5p6~9nNSm2-XUuRpzuh^tKF{wh0S?OjBT+6NJ3V| z8U~xgH9jJ=#OQ>!OYx%~3^+impuje@o5Q3r8#JNh_`aM`t?7fC7^DEIH!m*7{}Ker zL%%|t5omWZ*EWu^69tppJNv<@a;5(5-4@#R`sqTCp9(cLsRn_v`81*k#x)y(i=jW5N4SD}94&@-6{+@j{od?p2b>jYcJ{tTr&a>Eb_Q+)Ly(cGdN2R`u zU*Ylm_wgLZFPQsYvGE?+f;pw4drJMzcGMJ&|GGh=nwv}Vyo=&fBNnGwVv|KdpAQHA zUQ+Z5cxYA}u)q`Pz0nnr#5-o0vOo#E-|HC|a^My#9XrGl6BdQCN%uQ2lvRODogw zotO9f+!Upmhg-xQ-ABdLjIw`aWD1;JCoo9kYSAlNY-ps&$nk@!k%7HE>U(nk{L<>i z!E(T7Cu?XkhXP~L-)fYoTCiCMG4EqUfw1{9gRn!MeBgu3q!vIA+0Cy%sPP<}@1DunKUzG^ZoFaJ*Gm5} zBYdZAXVTXtW`t7TPx%^Fu$SZJX@-U6Ef_MN4L00Xx3owMlwH~z*FQ##s0(#x+x zDjL3n(K*pN?6ujPz7pU}W4AeJC1E**aH<<-3v!?fFw~di_i9>~ME?*^OEb!gZ5u zYG~qcKbNk1y}YlwGr`Pl!e#n+E0YJYv=@+JEOL!#ftdl^?-}1tOAsKu4Gq>uzSkw} ziB5(2r#+o%x7+tfxyHRrnOBZSRqvuYYh}H0_Y0jz;L~nZ)x|#C$7FWTzh)e;=52}M zt%wqw9z^Xcb7OUrS*w)*X95>FHonK5Zg2k8?|W_-=sTH*b?f_fljhz2-d4^nO2V?* zvx|0TL7ONt9kXd4`Qvy4W}?l1rFQwRl$y}0h}%v2k=W(hhTCHHG!^bWObyHQgg8_N zcV`q?Iu)A<(yyCr(^tW z%oSh>Rl6yN$QlKM@=K}}+py0Ws;%T4&2+j1dZ3x>lE%8AH^xW&VIQONDbf45IZIckfQBkI~B#KUvf5-$Q4|JFaG z$>a{H{q76Pk(yFT{cj?KzCU1i<@tqgkKixQ+`I4< zK8jNJ{k_os>R%X!n;-8C|6WdC?`YMa5v;-Fp`&TfRNaoW$VTwR zvDi9FJP7$SmVkhOZ}_J3oe$Wqho-L`juYAMDk*tXshXu+Km>PSQlL}x|0C-yqoRDH zwr>ytX(w4;UYo2K!T4tj;YlVTk1zFulWG{#lVb8M=s zV&bY&rPQ7dwOneJVQX#&!s5WfLZ=6iHRsG?@qKZ3<6kb{y!jkWbgpUW=!quaR(1qZ z_gY@z^WtVTnN_gvhjg7VCw~^Txv6Plp`zZg(~17IpJNh1qGOcv-mH@@rnF47dN+5T zC^J>Z*Vs~19m|yc0`;~sFj$ne#j^KjU(Ky!h>!n|Nlc7owS$;X^|k)2je7d{%&Yiu z_D%VL%bGv@W^ekx+c=c$Cn{>C+w~ETc?%Gkd0cR5C$mN~>3U%`dD%B-CC|mVn3}Bq z{*!i?YS?ZUMG5v}lsG-t&3ZawLQ~^E{5H(Td#xSHF#+L9x2uv%yxY3oo9Nvjl+7!N zo=us&487Qxb_S3r>sIZE&&Xn?aArg8k-x6asS{r-hY*}8SBF*}ZRk3$Hf1z~tDd=6 zJ>>Kt31EObJ6EbMxjC0AWhDL$Q)W0l>1d%cVHd(EZ3jp`=to&4dQUV{zT<68r zx;;slD$P3)CZ+({C%F!&>yz_0wwq=IBbBv*9WoTz*{*`|Ql+L?*#!abXqVc`xY4uS zoH{)5WF86Q2xTJlCa_kyte{xx`{HVM0@Y5?pZ!0o22$4QETcGt4lwK?^FRzTA{Cgwkf^WS7Mll#0b-rs!m)SP zOnrL%X&nvrupWb$`{Hk zy{yU_pD?%k{ym9KORRu>y|P!=&Bg8VVzJ}bGVsl`q<~3UxCQak`S&^5#>xRR z_;Qb*-4zJjD>?1-mu~d>t@~q?k%mu9bsceIr_a;&W<~C6Wcxz5`@jLn9gd$bT523* zlZUC9#Lxv1<@M5C1)6ttUK|@Z;HDjbq5Nv2j%mPls*hLb_ADNsfYF zF{y{Oar>rE;-9B5SUszn@L05!Z@uFfdlkcE)sFH5pzXERPY^pMec+b+`9|xTZF_@d z{HLsHh}x{_2*LEg>Z;z&o>Gc-SNeB9(K>_YnFHMHW7d}P=ZZ5_0UI})tcQD&>k5N28qF3p8%zeKTnKgQ7q%Y^3Cx`E2ek0< z(Z#L#ITgs${M2m|w>%9~eD$N^tEGowyPh98$g6_C|I%y)>#o*`U)SDZB!L5f#ULEP zGxA;D^_b@QADtVmT*oM@Rxv!@H7{rJ62mY2x+|Ry;ZD#l+Eq6aZrzb@rkYWGI=Jk* zz3P+$v{^i+%qI1uy<`q+t?xdu#UKp*gOrmB79UP|@Av7ZzD%6@x^!AnWyL7eAJM&j z?5I*TyG%p4tlhQ2u-*Yf@Gw-y(KNFXW^I=l(jGj#=Y53_88N6rik|+D)QZC(i`Vq^ z=Bm2u{Uf7e$40MAOOw>a1(CH2hF&66A#i@DeZL!7*6A)CygiW)MlI;vuuzb%A5QpR zfZXqe4NM);OX*UO(2I8plQRjEcFjGCyzg$#0fN&q2|{a~_x-=Y|i=8TvB#;z=yul`v{MeZ1FA9zY8#;2$JV;1J!?qoQAr{1};J*klv{)A6e8u?O;%wF!d2rhX*B? zDqy90Lb)-}l)3V#w5XOLH7?{8Mq%QcBDo|Xj#oDYlc>7L2kwCKk+Bk_te^HLbLT(1 zHYJ~V`cRQ|BB4faGEKwT8~wdq^76wO1x6;O0w=JFi(6b)+k$-QR(!8s2dt7GG>Y>{ zpcKRrtgbjQpkOKMDX4@vne1OQB8cohsDc-AZJg%Tzus ztk*%te~^&rZ%&D1%a%jbrxGpniBT=ky9=v+cDb;UTM}2+_Eb}A2YmO-?UGxJx~gb0 z?DO_HHFhd&&9gZeyh58`hPOWLpPgQt@xGy|Mr;BkL&EX_p7NOyZ+xMVTQ$+cQh1hr zqG_O^dPW6#t!v?jk)e$(mB(uwxBGNA$^pyERe98}=?!e!MEvZr>k++hYnv&-GXKm~ z&~HX#yt*RgM@#R6xxOw2zsW7XDl-nlIEO2i@}190|A1qk8QrNlxPew1WV{9pBSB^R zkY|@dR!8*n63QnT{f0^HtOmP9g+8DFP7>6eevL=S)z7R7O;w%pA!SxqV%oZ!KG&>Q zPc5F}$)~*?o?bDy?b}oRu~qzPU@~{`MzKbOt2rDe5|lqRUawj=%QgIzpVtJ--^^_4 zu+I_#S5#j3A^v(s+>iVh3Ur*LvS`j6Gt1IZ?_~jlt;KL}VAIq#*#%oyF>nCnGhU9Q z`G8}J$69Lo-tPvr1BICWZ%ECD zr5Ia-azQsU-X-+8+C`&4vr?pMP*myNJ-P_T=WD4PwT z-edOxXf_%#b=Z0OH`=J&+oB^V*%~1(Vn>n+t>$#4$^F-*= zeDp1VDbE*vfJPJ&PiE21iW$<4nvU{d==07&Q*{M67 z=exnzxB2K*QS*=9eNVS?0e=Xj3MKFQyZuXW2p4unXu46#>wOIk573|9TG`Ym4~wY2 zt8EPv^H;wEI8CbAqrBZbPTxFgL`;=oqE9J-K2K49KEn<{z>TB!b``E!R8=5i3%2ZC zQ|oTI$O_Cnsm80v(YR;qzLD}{G2L^0wNxT}iSpNAiU-6a-sJxm|EY(%`M)3C{9^{W0`ZPp#3lb*f2;9r{NyV<5> z3w^*_{?;km$ey$$`!UcZ-p05?P_=hr9?%1Aah!29J_dtaoa+73G=VNrCRyL?g5$ylr9V&xuaaU{t0cP8HRBQoQTmn3V4UFBz~He(Ow$!#Y?ncGCg z8nvJTV|A07p7?<|NKsPAcOYmw+E< zFlz_P6KtS)f#SkUC&EZGVyjb(wEs#}hwJ&D{JaGK!`_>xly8-0ZdQI6{k^(7J|9{>VS(P`SCK)d7y#-VwuF6v zSMTu_rkYABd=A{aD5g}?L99{j^M0rWBPilkg^uJW!Rok{uTb6 z1)`hZfTh3QmdL*w1Y*oO_Fev_em|yeE;V6iu^D^=>%OnSQX_Py9O1!+sNMhWcKsOK zwtAl^(3>9=l?82E)112g$?@oQ>)IXOWER#wk#(v!qQ{>FEAO`{%gIn3Ai zWRq+K(D+_U(f{gvesV=xy6S5n5k@Bo7|jEbk&V9Qh*aZsS@%WDPvKhLBuoO`eZoL~DrZa4#Z?e6-_o z&V1|9AcR~aO25p{oIPBcDxM50wY}Zs7g49oS=a1_*;T3inQ>;C3be4aUIt%r~0 zNdvyRGF~Vs{SR*la71}zmu=UAQNwF>QM_NS?IX{6K5@u?SI5NPsdQu8ifSRB;V%|; zgVgIL-6Y`ZE5Q-gtXKACUk{s`TIZfBy?*~2bIOg14xokHGJG!PtA`IEj1$7+CpN#D zJgp5^l~?k<30f6^ybI4RO`+d!^ymT=ZSl+wYF@c$bd^J7Dn{}h&r7l-N8Xr^w&KBN zr5og$#)at5nhkweW`!#GG19p5>j{m^M(XCT_9XXXCyQZ3VoPttB9>|RxOca$BSHEc z!!fLsm!x9n+k-Q@Z2kpW5)wE$$hFJC%olO&EOj?G%^{pbq7I{PyT`BM3xvn=a#0X3rGaxYkPxv}-b)QBRuGDjECpRPeIFG2D?k=?hG? z0$BY%BRp*ASlesICT(0 zLH4>uVp9Z9`g1%eLsosPzm6d1$OMz^$^QadTsaLtx5>~6GXlhdjv&7`Jb6v*l6a^D zYePgkbHRO1vHKud;J13jkVhDKBVs-2zrh|F2cpJ;dIUlcl@6mSWW?~|+}TT{uKR~8 zK&LEOkgmTA(&Zf;jqjyX(Ka|q^3%gel(}F5c^Kt~>6skwiihme?has7Job>ib0Nbm zqrsgjOYoIn%I&_osCBQb%G@ZkygOi@R=Vc%RIkkQE1k1OcK=?fmf5uA;G05nn@ASN z`vmj*mUMFf61srS_paJtN&GGqjIeE@bzO+>g4cHQ{=w!ZVqjmNn#yhm&8}bXc5kY| z$3LtA5V1TYq@RH690`94Xw&8R?r+-EGA_b~pdj@i>fvlWFYR1(daal9mx&E0(IA-R z?6Kbu0`xVX$LRnuefhx&nes;}ujb{`-Z5$an~4?kAY_8{_YnNGv#qJlt7lB~MnATW z(6{62=Ki}ASJHkr`KarTZ-?(r$MO5Cyj^-O7Udz?!RUOjVYtWsvLWP&)aAPQbT4;I zZg?{d>Ufy&l;HEgr%)U-d_(u{tdmgRUm5??h~VSlIj^*SKG+(JNf&M5GyfyviAkaE zN^iC+RzyX`Rf_WEEC?XWjQqlzYiP)pE81siD2W1=TBm3HPv!Q3(c#r`o_d+^TD8^~ z@xa@e;}HLiFv`9D`$DBv4|HE_>)MTan-tjVkMP?4YBW6YVuO{}wAJGP3aZv|J9_~P zKL53J!pP&(7IN#?HXgFWqyFBWX_|YjKRs`zZNGQMEX%aReShdiGxXFduk)DY;^${l z=)Efq(sp-+W^8x2hUFUXl{yJn#TE4fWL*ESda^1CnY80q%s2#HcOvbaf9g{!67X+c zk9_XGL0sqcHaO8sfYfaFwscO?PfkFq3LhdBq$l(~s;ZAZY69dp85%r?K;Yhue$ z$a=DE2s?u~@B}K-6}bB_GJ}>y3t2ik^9cH3Is?ryBOkl11%`EgNU#y?MoC zrd_lXOYg_^c83$==SDPt5b}G(Rj%1%M-OJLQti_m^2%q%`RT`EELyVl2jBBxAM0SZ4qk-bMK$PS33NpKDiOxn?hw&;LozUh>s9` zD=Z6y)sm3|&;@PnYKEZDSA9ab54T-^WWzu|WDbCbkRd|LWvpoOX zDLfy@iJLVI5dCO&2PV$6XJ|rjsYN>*=HmiPI`p{J(@zDdJ~pVdABW}7b!DpWfkfE} z5U)$UN>tJ(7ASmsZK&@GF`-pnsj?S21LjGr$t_04M6!af=(B3A7FmS(YeQW9pX(~O-|4qZ5ErOetPdmBgEh; z_DqW&#T_v2+D8^Yh-t4L&WtVhws+sY=T-@5lP1KtpK1fb$cA@igsl8Ntlw%yQPh}z zW?)M`lvDKy7s6JbrMu5rDU0vFPs?Q;yEDJ-@prN{(>eQnWnMiC{o4#-4n}})B={W$ ziH3te(0=t7w+lYgegCM6#dDY}PeRC-&frcTJemhptXLO2w-OS*>u6!LJCWSsKe1Co z?|zgd{=;lJUOg9#-lvkB{+^nZ9DJT57J4kMhnT;5L&Hl_$DJP-K{Pc00KlWWC96yq z4KJy?Zund%QeRuvaqja;CH1DH%giq&tW%gSEzuSPA&1$ysg>e%DyEn38!P`jr`qsL z+?-9@VVAnU7zUfIq<(#pSikVyUFxee?eU7ZG{@~IuoMOio$bDsMqlXX2ke!fpkQbu z6RI2iH(5gZ-qUj3xM$Q>R|CjIM;G(Hj=t)*Lsu(yQ!&hndOR}-%dh7!57ar z0VfdYv(Ky2o#W1Az4;+S%sKj}DfzoPl3uaQ2MR$aOKr(H^Lf_Wljr9NAo|8veK9jA zne8dpc>T&wpDV%B?s0=_`HCA`Is7&7gJ9{70JG9ZV6!9NjlT?q=eotVBE>!mZht7Qf56rL4g=q?N9N7< zI5w||nC@n=x7nVq(#SZqb@|HMW)BVPMST1+GWq*AuJdzECZ%~?t)eJpe$t>5J+x0L zZ;~?^J8=K?X3y3_4QNPkyoRR?F#B{RLuRNnD{oTxt5%gk1hsF$adn~ay9(acH{r3L ze38FP3)$tb*q%v7A>fx$W3Jmq4!O3OCE_%8&GL}r*DFo#wn1##E;$wO9JXw&)yioe z{k?Q!VanY@PFV`@ERcrx(W_+n-)C-126r2*i||kzdydu7=--!$VmC9ZN6E5XFTLg9 zaMD4({`@Ci&J$B=u2q_uuXyrSv0zYygO>B@8PCU1k%0!)!P?MVc+L0(hm$EiP;~0| zEMrc-nej<<_|HSBtWU8lxy8~MbRx1;)p&`$80$m3q_|gN@jHr@(1sX&k^Y4z`?Wuf zwyJ8l>v~r@+0tzteC&&Cy6}Ag1&Xp&7>s32M#T3$C!g?_DwKU)ZNPD9n{OQ>j;rnD#8t8vdz^-!ndy$6lS1Cw-HT!`mf`XQ?sn zjKWJPf&Q>$cfv;TT*bYi?$yY_>bpEITaka#$IgG!M>n@@=|z3_=xzdYJp#7&CI5c; zEmy3-w?ouT?b^pMJl_$G`%%CHr<6Y_8!ToF+yCZ@&z zGTYlT)%><>51i}2obG(QLhpn|qzB7H!nqVeTyJYh>BXv^y@lS0tc_@^=gL&C{+-Nc z_-nd+P}Y6Z*Vxu0-#mdv*arV)e&u7Lg*r}T(!x-=0XKZ8EK+wz3h1^Ay`&_D8;9aH zw+Z2n)>+DC>QW0ye{um$DywijeYpvjESTCj$@#Nkem{FKeXHsk-A*-nvu{gk^s&c3 z>UJx%R&om4FGW}SYF}C!@BooZ(fxP!WMh*hOqLyW-VJ6|g$;oCB(AF6GD_C(2G&tC zLKCN=Uu8Vu9o<%aOnA2(=yM$2@%P=LlVT=HkUpm?=VAiE@{05||9Yu6%byWPOwGM9 zVKIft;`qw2o-w{Lbu?1p^xf9&VZe!uzB*dt`)OakgmUx1X6#{yZ=J!73XubBd)qSc zgNKt7bL!}i*(DFIWJ4pco3AC%y0B~LM$UJ7dG_+c`&d4rK5s^DLGF`7zzmBA+9|IE zBHmNf(XCI#VEmy;H_P1d57T6giwapDXB{d-($C(BGt;asCDWN@srxNlnN9m+>Q#5% zxp2f@ZOyA!Y(mP)mD@s#ki{5_F-VTH4Sx0^)A zGd$PMD{9_euk|ZvS+}s(7Jt6h(rS{SI2e?63a73JOy35P?qsi*tB^?kj51v^|2hC7$c>UAIc;UoEfyH}& z5|%lbTIx#Z;K$#avHn$`WuXPr*EAcHc5yFLD2X>LY|^0NUD*I{-cr7Uz=P67ii=QC zSyouNjd_FTwbm0gB)XtLv?j0n2hq5uV~l6KZ?qHk2(Y{3^X||yv0IFM?YRD)Z09zd zh;UdZ)1kpg@-6=lwvG8mKG7Y<%c8Yw?cV#4)l1^zmqET9^ON!O&oE4M)g9P+xKMF# zS!!e`cwi(*sd zw%UMfVQkG38}Sg3$uyxFHD}URpM(ne7jz_W0d4}0r|;_m^!Lt>mdXhL3|F2F$B33% zcw4oSiBX*TVrBrgte!X~0#&&6#F^{A{&T?wCxFa7y6(l^3K2~X)ro+mUZGCe(Ffhg zt8Nr@*onX9!4!4nZJ#I#E{)umMn@9h14GIps%t7_6Od@sj&krtI?3CoGfR9~g}1@? zvwXCT>$Z=t~s1&aBgki1Kh3B z(>#vy^q;9j=cA9LQQkR92I%YLhRodD-AS@BGwZ%Zq*}=3VuBcdF&mH@U}`4d?{BMe zx=6Of4-By7OhS*jpwiK(-R`^W(dRjvu2)~<^DJ(cPS7p20hjsUTg>g$-yhA%k`ZJd zuW~&qy3YCQ=0f^50eu-6^aM<#@dUJEi=IVaqVGj&I{$R+n-Fd2lvM)mnb7^g*KRc* z=B^vdmgz0>fysxW=)In0PtsGt#w1H~R3#sBgeee~?rY?8=0-+4`gy-O4gu{3N2&K= zl-lPf{?gV)Y=_nWOQ45rH0~w_HG<&wheeUpH?edZ*`pYp9#s@-La$U#rQxcmzco zIirl6t+*1Mc?BfoVRWWo*MobW?5+FW&!R2dj0~z}$=a8?Y2AHSJbZkEIyLBp;hJ`h z``a6km7lMtr={2Jroo+e{Lk*o!rN~Op6keIk{mZTUs+bWpkupbp|-tr!mf2m>dnil z@G!)J>$SGioI6EdIYbDW*gIH4-KdL>aTsnCLvq68(7*M>r~(rI_(tvchwTNWF_ycr z`BTvBr}0g_GR;%1T7JOHzASsvEH9s&KC8_A0C*hu`qa}7R#p;b%YwA^NKQJ7X#^UN zTo^}P7{_pD=b^$6CucrgP)!Qz?*6*|t)EO&TgK;P%j?7rsrA95sibeDnv$4k`GC8% z*7D2@s$>oZH~9wMjK=K@QSWP1@Mbv1{wOH@mIR`tVHb7btu=Lyw=ycGwGr-*F3E0( zyc}B|%NAW|cAlKbO~(^d{ZQ4#nt~@|O(yd!aHMq6fyM_FBbwH$YywUM*GWoru(?iY z9}|J%aU%lr98B%PePLIAHW277FAMMLFSFJ>@oo{x?x7a7^vW^<=!nCFRrsgQq3<4i zCaTpgWuncqmFZnGKE*+j;4VqV>`kurWd@{{g1LTx6KrcfPFWwqXO>0Jq%~P%(&}Mv z=aFGas+cQKC}PE^%sypq*bxA`cYr)Q{FGTtuWax*FV_Iv>9#p~ILHm8dEKaN=)$7s z5-EHT3L>K{N%pX}(O)VtjAW6euwGnKMiMQ|0!15+M6nO%kF>S3-Db5?Ib_Lya16yQ z_Fa~c_$+AMMymw&zV@-ayiYUBDSu-1t4Jl>Res+8RhyUlP2a@8-_qDrj-*<B(Q(T1Dq;p!wA}LFtJ_MOx4A`oKK{^m z9v`lKHm=M%5vBDyhYnOFsX3R#Ls=tU)=W7js#PhPv;=%V>kvbK;I=XR3D%wXpZwC@ z1?o3U%Zu0st;y zTf1>S>ptSWSD#cjKw012?0lQOH;AQ9-DH2nl1mNIXDRd9FC%>$qLx4xM;n}zQ)dpc zE_ydX?~i6kR18@XMcXVZE4i8B@O-Tf-LM1T{(_KlG|RT_6)l%v6tH8-F0HlhOd6eh+gKI(#g?%g~% zRMsuD<)-I@_~cbKNt@c-*q0pX680bomymc97lb1>7Y=t*K*y;hdOi))T9NCIW&k0# zI?ii9ZH(nRZ~H!vvd_!{CZ5zg+psBd^NaIrTJvl}b7WfJ;FRFTwZ^M+K+Mo4hevd3 zgJ)JgHyM{98Fy&pjTVO6*~Jl0j+oDG zKNJb1*c01kh1q9`DqfalGaJf`@n*KmWbLWX2H3ynpQW039VXeIi2)~&KUNXJO{%*q zmtOi4Gn+%ivMe$4TA^-o!C)`48MiLnIluU=jpAN-8m%3SS%`aZw44y8lj&EXBV|~c zgQ2uhdT7fmRnAd9hIy1bcFG7FJ%7r(L6#o*p4++@Hzz2kDQ5pqDinvS#oWO&h9@YL z^?5@C%VfsN;l798HCy)pIR&8qldX;&Q8OKKoYcJX#iPJg^3A0p3FV)l{`D%d*9SNg zM#0Pm&)zvP%%sJK`oW%R3V%q)Of%MWy&gvJC_k~T^r4jy4cmY2DwKLp{5GSoK(?7^ z^K0oYOi{+rztkwBX6J{p;epaeJmE8}Yge_3l+3S9Wn8%SMbE?cSzKul#M(`w49$iID+aWGC-ujJT;)R7pm~ zZsc)%EE|Jr`;v4-%)i%BgFr&W@%ZEz!+MeEoX~5uLRmT z;4;0(ULp*!}8v#`ZL~bkV`e>671@R2g^3;r`+0z$G#24=uQ?c;iU|4S&K3|9bU7;IVO2doc1{!d)S=(6@-VJeCUnzri_!se^Pw`rD zS3OSP3|5FieDC${qoB9(Hr_-H(KYMRzrK0nS+BzlZX^h=J9{w+TXpr5RPF@`mb+>#82hrr|YfZ}7c4WUWK?v0i_lAfnOhrTmiK*4ic}eOCwS z9=?No`*OmV6o8IAKBF8hbDNVMo0ZBfM$IS=Ca7`cixuB2wN36TsZP-><^3Y>R^CoM zJ>(#S;LqQCD<;}`_ zJg0BSr4=85zZrr_5pG;D(#Qa%SsBG%F^r}r>~IegidgP@Y!BW>Q6LTMhvmx2v8nQZA2|}(9ll$W?AOhWaDBW z;dv1dDd8@y(%g>*dz?dtO2a%${IYYZC!GEz4)nEoKOt)5O|xU_Jch#6#S50%2e-#rP?f)&L@O;o6e`n64}6v z0WJ4RJ<=JWaP<&W37$%V8v_WON3=BL42zzdGJn0`?#ve_=mJB>oG7Z(oV zXY1WcUuzDiJh6bFxc{35h8h9vh^JmQ@@$GJe&Lr*w>9<{GnuWJtFO7t6^-B%^W#-w zp@`Jy_~VGt!o9lKV|9*d zK|o_Vy8WsAZY-=U(t&5zI7<)U(B($~bSoyNlHG*347|OhN52T$g<45mYI4m(0kR4B zM}LwFjHfTh(rX83_H`J{v>laUhBV6yqyZPEn6+E`!B?^~SJG+s8+F8|#gv3S+ZMh` zH#@Wwv$(hU)U@VrX#52g?s(;m`hZ2hGMIE4*V%CMD&4Sv!BHE2nL9z5J956MTS0Mq zfw^$(PR*krBGM&za4joV6*8>(RH5q63$J7Tvb#qucTc-R8xzmG+{n^V=JcB*W5|YNantC=W?$r^rzJYDx&hgOqg4O3Vf zzofTJaf+^woq@!Ea92?8^7{Vrs8}gUm_Ws8UE8Y;96UZO>6ME77*cQ&$_2mxLyxc? z)OpFRXjb5IQa!cqc7gdHw|LckeLtzTC1$~DI=Kcy2o@ZVKb-LvhjhHPVpV%R;7+$y z1{H!9I!*srH|_3AW>I@k=+a+>T=-w>o539cUJjke32No%{1;-~G^gJ@jR5_@W|36e zVrGw-rzW6fSdWnx&Q!i7cEjJcZZ^HTbGx_IfgT=B-Q6d*m#`QbK9hEjvkUA_$b6-~ zc9d^P?=tNY#=!m+0>W8;06{UL0VhP@tHM9^39R3llbGmJrGnm}cI@Z1+o0?hAocut zY5fh~QjOrBntJ198Y!{;O%Ty2$bN+hpI%2Os9Wyg76wI8``xtr$2;qF5W?>S5C`_o z4sFH9=$yY|16CLT1MmlspcMQ;m@u{ zY|JX$i2~%6(iI7)^QxdR0=$IxKq)ycLs|a4Az{G-b1&>%k>J{eJIWBeb=gs~qX*+B zoPZ=cA%*%$tPqfBFL7pWVP-1DJXM|77i=#7I4{DwvSaE|flh}9wK+Z9L)<&t)C~eM zC01Vx54VlJ?bMjXiB?_8>#RktP~$a_rZ7Br?~&YUGU*iB1UO*V_1-@nh+Ufq{2wOABQz=w4$Rt~#G^)BnG7Da4|1?|eO#Nk+KeA@9 zD#v!v>N$2`Fbe#TW64Hj{C_0@u;S>N5O3^Y^3_od2pth=)l?fg9p$Qc>gV`M3lUPT zh0Jv}jY~4_cfLk<|E#xb&|I0z;83@dNd{Np4$-=EdG5QaF7)l?kxU6+pc(GJ=ewXa zf?Kj?`N%XCuyCC=kFzfE3&WADLUu4c>P9C%H2`RM^^hfuF-n*FY&G4M2dpMc9R>$M zt{pS?e6oMaX{c&_kDnLmRy)Sk;XZq$%nkM3^edJNsiRCi$#T#qs#6KZkb? zI^&9oNXy#p$oeYjtb8N#EZ!%^dg`q3FA=`>CcNdr=llvU8I8~E?THV)r|9dvsB~5| z5AO-E4&nZoK=Ung0T^6%>V0lpSF;st#(;s_pM1n)HfO&qp{$HNCXuwHg7~Y0s z=rpFA(S0%Z{74X;_Yq0TAf#0^U`2(3Nc3KpR1MF^)q5ZBF@6uD|RS!;J zp#IXw6b6pFmAnS#0|5-?ML6VB7PI%H-Vr7oEi@2s|MS=n0|NCM$87b9eF>4$V`Jb< zk3BZ(@W`7g94cpQEVHC*w z^LW=Zl%xmBOmYi1a-xaqmLV?z?z$%FWQoZtY{3(*-;6SYrD6 z<>(E+T;4xjFnMYh7R+_13^ZbE6eumdM4A^I2B zE*v{qfYzFHrK$1$YGQ2LkM3#cJ2a3yooEqXfAi~Z(*Mgz(DPfALK0H|kG!CjRYJao zL}IbuR_yJF$%J;>VKBh<<}>&h=UHuv`Y@3_(_CGU;m2U`GrRU9`7al&FR{2V$70f4 zYqfS}MPr2)-g4OKvVhq#(!Kl;@MEn7vADU)l9^{2U;#slPeU>G4}5p;ewgfsB;q7? z%cpz?SX-pS$-S8yGT(j1JW`zqHJtMC9_KX5EzpM?8?yL6=}Fo${c*d6wE-tK&)HO; zD|(pZ`RJ10eea`1fTZCG&S>7xiy>?f*3_qJ|HMrrtm)jyD!`r{0yokr&mp(iz-9#N zf_O>n+q*+KH_OMsTF9~Com@CY^px0D}{cTfE00)bREJ=`^PHPCr>XB zU58<*9niM5jhV2jOKn+|N==i6v)wV3&9q2STi8B}%`|9WL6h;!GiALPMAN9n3M;43 zYw%&(hiZj8b&SRv-qr5@&nyGa0VeJlUe^BgbU+N z-yDMM>%Y!>Rd(xyAqlnd^Zso6oGJIa^k=2BZK16EoyvT!*OKmfmrvq#`znV=4%cd& zeX4)o2gF^n7BSqunL)jaBjLCkV;SbQ`o&ky`xI#FvyLhIb@zkIUbxl?{B;(3e0BP5 zoZ~ndN?O&m&ry5zwELvhV&kjp=?}X{5zE&7A6gl_lwVB~(>N$h9Slz$ut$?nvNC9w zXvNIzloe4n^rp|pr!6o`4pKR)*d zy9ZiUITykyQ{vF@j$nY{i?+%Z6{W^{NwL_7MtDGz(VNAh<9VOq)S7}JI*q$`f-Ws{ ztJSXWt>XFX5RwDU&)1(kUi|XF_=5%R*YIYJDZ*-GP=VxtV1(h2g|Py0kMR3tmBc3& zFeu!}lTY)tOxj@iZ_fs+sL~J9)bW0K)DSTZi{`pGx-xO=`Kk*sK zES<)mOr0aFm{G2aWo^D^4B4si>hyQ4ULB z!Zh>2x3RbEH(9~l?x@bX?WKE&(5veGhgG6nQ1e<3DSd0-dMJXT7xhvD;Xr5bASyW1 zDwsNA*%Wiw{UIo?z>VC9=MFHYCi!Wp@?ReWHC7UcZq*;*t3~6fN6j1~-adz8cKDHB z31GQ;%dN1F#m>sC{KGVi31hYTg91shR&qCT{N+}#bzB1YZ1Hd-)@B}NAbWnj`F?rL z=&|r}f*=GO&vEx4#4#VgA^t&1u45j~C?@_bvqTQeuYssyGirKuexldl#ov#-gh{w^7{t;9je}aAd`jpJ3 zNfuL0uQ?Nfm?4wLv4U{|X$N4?QOA+6B+CK6A%@ZZpvp9_U{u@cj7g=60lN_q%=F*w zD2bN#hWO|)Fa7Sks5^z=3mKJ^W& z=Y#++(78;}<;yk*t%Ui@s6}#G2UtRWiezT-{pY+}c6o?7l~Ise(#5ly-HD1J+ZeH0 zz4p9Hepz5`eb_FMuAbE@9%k(XU@(epq+ko>)x~6R*IU}-|Ef?DC_MmwH^@NHg7Xid ztmZEVH8NUE9zbi77T4|NX|_if>3i2IH^N*!s{g z4K_w*-7*UAKR7%hOIdwQR$!oM{_TZVl6{)p*W;Tv700?zMXXcL6iI7^>Mj!uvl|kh z9!Ehf`+&O+L0%$MsyQ`=LM*U8DL^F;+G8MDL+lF+ z7>^~**xZDmypd|*Uc74;uU_Q=+eiqAPmAS9=RnW_Mn&-Ce;|U}MEG_q@v}7Q^Dlj2 z6Q8Gxwie5ueT-lmdtH%k$iV&JB5S<95Rs=3NG4p)8EPwV=X)wa#IQD~_K&Z|kcaF3 z+@7Gcr+tP7U3KtxkR(sO%U|=zL}Q6&2ZCE7#0|>d&(zC|ptghAMU1ydKMugJM__sa z^l8R}gYR6(&Ci@FNh7+Fx$9>!?rHli$eOv?9CxfU*{_tHbk^_R^aj>cnJ zM%E-4brO!j9kZgK%L2XzP@xZoLCybq{GIIF3UeejIKKZzt-5x&J@!(bk1c>>C~Jzt zECnlK*aHln-YmK{c;r{K&*68g3^HDPSQ_5zB0f_uCy)g2>{~{iVF|7yf3RA^B=)Z~ zN$dPD@R~S|Od#@w^@55-(XkjyZkNhyGd3LMMLOyzP(tE-|0n$xsOY2WRcbxoqEU;M z@nu%`_o1yP-rn`h#KU$i@`#jNmxHaom5iPspsm*z>sae(fw;mamUSbKt7apB^8yV4 z87zhckqdSW)D|!*LyCWk&M@FLa7f4yiLeLzQ`aKa4Cor+Gvf@X+GAKWK)ZWXs5;8& z$n8o#4xRMEXXz=}G0MrP{dKjezSqG}&-FVjFk)j2y^)R1{1}D(T6Jb(^3*!;v;pd^ z2nVw?IJw4FI<=?z%~L?>QtwQ~W|B_*`KNi`reKzV1bb*9{?g8?U(BoTSLAUDOPD(Z zg2&GtefKX?)67${&3>+c5R#a;UhQi^`M*^bEr$X8ilsBb(u#Y%JutggWNQHvK}$a^ z#wwnlMzX_&ccB~d0&_ccVDOlZA>wfB-0gp7VO=@3yg?P`bMU~bVvR4RcJIJDF)L`7 z>J8Lh5Bro~yjWNzt>HCBKO?C8uHloH>~YTmpcLCqiMZl;dVzd;;OW1D9zR8Cc$6H- zM@d!;QJWziLkg6%C~U@7n3(oJbqk%#MY%2pG=9K;4p4_S7QHEGU>UjKi} zeIY<72;ZQTLnYzhuc)^V-6hIMHL@`JJH~LT46!@c<@yBEIXL`RAx72~V^kabvH!jt zlEA5Q^KmB?D&hXZb{S@qiEn{g7#yl9lsXMNy5kq2e<_#A5!X~Zq^0me_V1&J9?ZtN z*mddxwZco~?PU!=$lH=+=)%`DU0w|@q*Ad><_q&Tr?4;yv6|Ae{X*fl!QAx{pCQ+C;&)S@;kHVEV6&Rw!rz1e$lYfcrGQU& z`C~J2@2%hnDiU;p*~wRhxuc|?wla{kFm3m{VtQXO-HIP%BrW@#_~$7{ zY3&)m4t5roN>bco`53FSXQtrysq7<3V*iV_#THjG6^kHdc5m=H^N^Kbif6&;hxw4& zwF~KRz{gaxc3<}scDSdyL?jC;9Rsz7+gAvzKFPwNSjzvN%L_YDl6YuUZHyBJNc?Q7 z6SCF@tuS}ik+m+1Y{WL~UQe1+Je7zj&Zn%p)S?0fYm};%__WJl6zyki_CRiMKEe% zP@w+Gstd$#t>&T&2jBUsdx74MiQ4-KaSINqdwXaDv#+4*F(SDLti6SrZRj-_T$B0k zdRX#+Bo;(-z&3fnu0(7Z(l8n2w#|a&k~fse_*Z>(%me>1!^Oi#CNIQkuw=GI;s@31 zWSXZEVHa3QPVrXR;Rd0#QQfQ+ab7MU*>yQYcVw25F|OGE_t+6**{#bM<5x-IGl06pHRtf4%T~Ce zxLKbYSjN8hmuqE*b{y$L0eWJk)HSqE@3}BMX)GlS5b+G~u-Z`Kf@`>Q^mX6NlJOd=Z_??Y*o9LdXokk&=J))bGuF*coUx$4|Q zzuY~)+!znPWj4;^;|u@qAqBw?C>EXb*`a%g z=ZiMvhU+Cm!p2TH*vHm`SRoiRI4%^sW3*-s7Ia$&O4ziT-A#%ToUzDkt$hbEFaJ|^ za0?2>Hnos}#XEEfWCD0x6@GwupC1XTw~Vj8^7K^BS^cDt@Q94OLVt@b#R z$HiPf3IiBmyUfa4Zo`KE_+je>5w}0xqWul`ck(b>Jk360+5~L4nNuz6oJ?%nwrxyo+nE>>+qP{x znb@|Cj+3{abDs0>eXG9u{&e;3s;=&Pt-aT}7WTSOS`EF;5|6{|FMmbTF4)2YCqF0s zCyVu+&-@ZtDOysm0T3-+307qV{BJh9yMI$483J(MkuR+F&uWOL4)%B@7Ux<%%W?i(@4je26zU*e5cE!cBjPUR_&L;e?C10w1h3% z#ch9;?ha%E?g9^(3@+t!5_w#700)e#s3U{&**m;h1HSL(=RN4L+ayVcx8Wx7fcZar zPZde@dw=K?({n~v^-J$~v@btBn)W$=f1u~XYrK8hbE8Mv6wxJq8@ zBEJF#vk`AtFF&~o;i#^@r8EA#I(9AqS=f~3Ci4fPt*19Zx6*6XWGo<-DD6fCd|P;` zvpQoD{0|qaHYXl_2DyQWB^}+zp-2Con|Kf%MAo~qB2v8v^94chk6c~^DgMsMr z-JYrhdFfHbliXO8-pvT?1oa|=N<0y?2@XUBMv-hsqU;W!V!^$T-Jd)da4dCFvz*B(;qhebbVbPZ zl7`C4&o%ru3q6KPjwYX_z~>-yn}GY+@GXmf`rLgF^Gkf>Y^&1r(4lZh$CohS319Wi zGwBY!^Rr0m{5~oAI6OOra!Xx8U=@hpfP&eyo8gZmna6dnF;U-`wSW7?Rtum5L3(=I z1^7BYyE;R-scZlT=7Nf@A^($OEn@;=xz}zCw;C3Ca0NH<$1YPpmJiU5Vm+H|u`(uk zRjiVyH&2rhwA}I94D`U~SNGr_zv!tUN825pQ$mxvRG8q9W0JpzN|JmGrIOV^Bp44iD;-+whAgzNOPEF-1CJG3f!QbT`@b*eIgLSABSpBeW zh%xcpIWMgzcGrH$HqB}g+^zbBBPVbDn7goxiKKE2+V#^g0PRY5_^1@)mKQMJ1=G(FwcRvvf8BlDaQ#}O+83h7co znM!eY#tA3F>F56K<4n7mEH6o>j=e23cMRmGE*>nB z4SeCM56l`U*?3M;?9sS~0wcjIguQAYYz|KU1r+`e7m2nQzn*0(2++p71-5oLl+VHW z1K)c+ewqV$truj&Dl_~mg{fo{de?yA$1>qeo4qrI2;BhlXp_~|_Ng5Jv# z?sD*t`4UQeU#*Y#J=O@aO~3YZ_IE>?sTlWZ8aPWdT}zjqwUSO>9M`26g{SEz+ zz>@GzxHY=voN{-8WrA&+@3=t)0({?F{5GPa!LT+_-B=_c@xI?BqD6mevzuCo1A8iAe-Ibe20=(vKr} zdw*FMdlFp6Jk zih%w&iq%}~pqnslqT~)TI5~F(ADIg%WKp@EQDl^rKyRy9DDTa)eNAtjh7=pe798D6 zJOtB{k}4y=+|6&mi}PNQTbqTC3l+RgR6qwO5%NDy2m>An^YduJz3voRr*eeo?;emx zlORSQw3hEQxtw}4nHxplfa8eW#%&L!{M(baA*k_6J#)c+Tc*zYFG(3(9@=$_a=7Q0 zJv`2(6L<^wzNX&15rlVt#qD$uIQluuys!M)MT{9I;IH;PBl#jPIppUocoD6;O(S~j zL6_Jrv2Z|PQzSM#Ib>COL@qy*?YwV_=$(L=KPQ=9Kj_s)`=XbeQZG%`SHi1N?yOPP zwVTz2vg*2C@<3$r@9;uo<0rZ5fWBf-Ek6HV@`l-R4AJuh(ess9$`4gM4hQts*>UiP ziEc7`TqQTdrynXmRfu~1xlojAE>`{q z2;$;ddKTd`1k;cQR9@$2RnCBr-B|W==mqBn?VuU?JHAk4ia`Iw`j#jqCOt@uG|M2u zp+STTHjaP{m-0PC>IF#g%Av~n(-|*GD0Xxgebq-OL*C%=wn{I16?`YX zQ>P#l{N$mQd*cEDv0-2nMnLEytc*LOvD#E*6^G@DE2%{7G>_VwB^YBO7DyHK&uD06 zL2VwEzaJ3br}*Gch zey991ZM$XPWAM+X?c=W<;oT?x9bN~S*FfQX0=%TJlc3i!<++?pwU6h-GYm8C9NGo` zgc|oc8Hd;fonE5^mJ82LyROXdmUfdRGFU{I5PsmiMW?{*l}Y`>FKzRYLK@c|lqGdOZE!oSB4sJrmG zhW34qJE)5pj3J2Q@l|=)$6cN0oFmAI{~!_nSb#p9o+{0up5t>;doM_+;^*G{+-pnL zPgX{pO^;@mMqoeDC&%$qJai94fY<~m6@8+|e~9K^qdPv!O5NCqJrVgs-N)D962Xb#E*BmgwSI~P`rM9&8`>b zW7L70jCcuZ!r(8z5FUCDKnq5`|A)yWtzLcqrv%=H3(8r4Kn%7VUOBbbk?~85Ud2Zr)VN(I=`(;k^BTrcb)cHT@$klQvOzqfJLn?pr9`<*s!8# zwS9d~@#gJ=^i9Ky(ymks_m_4)ikX0c>y3=w%J#y+29P~4_u|VB@Cn`>y}tD%`r&cy zv*nTFHQn}>*)hGjO3OV2>?R2};tt=}+xwwi9bdUcs+1@ajz$UC^1AMN`sc;X@o~#b z9~Lo{kTN13b*$NXtWRH`){p@c&L5P4-{6-iVYxQ+*jBpEDx_q&d0;tjcY9K*xm`G& zO*oBh1dVMpjZHL#Ei}C)0<9%HtvM{6`A9ilg)1D8lv*M7_crn^CfpHsu(^-dIb!6C`jh-Ss|T5j zUbB2(wQgxHN^i$>COKa0o~l(QP1PmKw6DbgeAvrwWX-*7wI8Zl*qVt1%3Av=S{68) zdum)q1l!&#CA;<#$Frr?!m~Ew`D-zuEjgpuF_qbkkyl(;%U*2NPq>Vm-NYMtmIQ6F zOsKQiG5Z;`HESFJIZY%-O+-$BNo zzcplVGg;!yTdvR4Kc*kq6m^Fto~a4dw~(kdk|nl~BsL8uv5%;+j3ly(r?818v52Fw zilMOvW3UU3;j68nDXpL=&A_O7DF||_U1~HL0W}4bwT#D}d+Fuv&o?6=1GXob?+%h% zFZHePNR&Fg*cSlEj8z2(;&8pAHL#;4_J(*#Z}K^rfa+> zITFg=o{R|@$W`*|*;*sb&ecLlR#QmT)=}3&O*u)wZ}jJSzuigCj^eGT!F}8eVBlAk zzE~q3tPSrf@d8EBX`Jo|>MPw~-Xhb1^IK6O;dx`+#3}fQQ5jmeMZNun(CcVZW}Ox1 z{<0IfjZ>bhcuc9@bVjEl1AHBQW*xOiP~Z0CNx==NqgWYwK|{PfHJ)=lo?|tZV?7S}2p9Fe zGUbQ1j%1%>T}D6YCbO;N3#5`L%9hEoo&4RzknYCUqlfg@h4iJuh~$IvVxK~l0r}G9 z4AhAXl<{=J+aiS;cF`18u_P9;AM7GYEI|1yF2JdBCtl=z`{Sj;ooxl&>VbU*449Mq zrvc^$TjweJzD}hp6>3shr(Wk1t$y5zpCb*yJ#Aar zYtz*`WlNa%`t9Of-poTj{=ar2=5)_Kz1#MJsXg@2Y3dTse#Ch*@enuG^W?R$_z{&Yi_4M4;!fsqBeJ)Xwoq5WjaagFR1m6chc>x}J{2ER zn!h{|+uxO#>b8x3B~dobtv>l>vl#v0Ng039QSPH%pE4=57`>9F??x-)iMOZ3&`_}^ z*>#o4{B4zdHLJdu(93K!i-|mo>8C=Id}vZM`SMfo!h*>HTj3JRNXjC4;xh6Ax!O;Z z@v{Uf9A!W$U}bN()v$E=d_ejv*O=U#$Q+v5@;kNlcUtrBl-3A>)W)vMP4uA{Hv=IOFE*o@%So!u z)I^H(c4zFp?dT1f-2kU+Yf^Q^V}<*bnlOhp{}RhXzU-sfXH`z?g7@CK^zvy1HTIV` z^SO+1fQ!=0&~pT8o(BO(%Yt<&8%}8TE301ES*`TN4eeF)^c5%itZ!YygzD&PN|8>R ztApz-WzoKZvHW6r6xo73XaB)kocsX0dSQC>J9N#jDHdG@3FUCK_LmpU^@~|*P1I#a zGHWL?y8~I_i#xLmm|_XrA5$ANLL6w*T+aU^P z-wjPSS^dmzU$e(tlq$JRI0=bLduvKtTR1seIH@RF z87q2;AfuftG_eEEKqxwkI7UrZGG`4R)oFOsf-pr;$4wZ=`TNPSE zF=~bH0p~99KAu?+6@Zas?lqo&l@&*BTRgm0{Jc5-)Ru1PM|C$>7B+Eglw~8-g{V~o zkzDWGJBmu-4yLE%9;}+}&&l(0+aW24igG4#tnbYgQWTPY6nAW=;=8N)l_!1K7go&} zS6Aoppc)!K?S01w80Xwkd&jLCp#!Ck zNW+{E*@E4?(2JzZlG;LX$bhkNcSLpkfPI>5b$3^&upY;M)Rp^9V0(twt?kbMv&CB^ zc@^`pbpv_zv7Dg9t}n6O9GxGGp+3W(Anv}Zd`;jiI&%9ErY?8>>bFO({v-|Xh8$kc zP1b9KF5ec*ZR(9N*_0^Ch@AnmKIi$4))4g z>cUdO+FHueQg#l%VSX<<8b9j#Fx2E}X!@O?qdLIp|6LQ^&N18=C_apH*J2^pFRfO` z`<3!TI-S^;?&E~Kr6B|Bm|VYd9?xFh`CAvr?qv3j?#a8bFHDVz@IQ1zi@!(PmR5g# ztC*Ab!RB)<^PcXo)5-@ndHF8p9cd^$=J}5cf3lkOukktOQ0c1LvdCoLTXN%Wc(Rnf znj3tMg{99U+Z=be8-`PG7C!!MY*R}!?Tla(nlEFK3K8f_#16hteVR;y4ru1J<1x@A z)yeY^L(G&osVFGLN=%zLEm*D}ws9gOoIH6yDJw4nD}&X-O-l`3;tMn}@jO_eljrg^{LU@re3l$k&V5m)+c{_W#f+biLuXdl*@LI zJc0dtE?aRLNnaC5SrbNA5kXZILs=73Wgb;w{X2&d{ZCy`SPZRI6s27RU2uFCau;=R zD`8_T7e^0OXDeTMC2MCXGfNGBbtP+AJ9V)!MSUxKek1XB%cs5Y-prxgjiy>KF%d$Q zOWekG-kdt1A})Y=2#qHG=8f4S#(z*#A5S#TZN@Z;-ZK+mIfu({7sZ~J_Qd&l$VhR- zmShFLLH>I+@`?mE^R}ZiW_isj&*w8-{C)qx> z$dsQ*lv+ekRfN;kgbu2)#mDoucM>+^mH|>7g_=@WMU#mZ@fGJVl@xGv6i`){e&{aY zByL{fZ{uaI;;OEoW^y7WZlbEqq3b~KlYca%2;DW$L;$?;RW9>9;7WI%{vVdf*Nx&b znD}%WFT(vie!DF;w*tDl#E4$^j{~PG@k5wbu$T3rKHcHRuJQ(oh+$Dv}l!NJ?BZ~I8*Jx&E|HbaVBXssWP;$ z@Q#XC=Cj3PLs@D(iQ~epEsd>vNy^e@EzrINUO%0OteOj{nh&8bi4jEJMp-X^obr2@M11ca0QR3|))2M&FMBRYN zY0$CrWH}u&D(m^`f8<@yP~Y#Q zAKdOlLAHPJ>^&b5&f(2^D~U9z$)@x?bw7eNbKGvG^B!owxuhn&)}whIc=^q4m+WWX zbx;J`MxQzTH89lQ(#fUMAl9j*E%&nYxma{1d|VE0y9nh2L~2XQY&GkZ*gX3x_o4># zDWJ6CzuTiBg?G0cX=+c6zLE#xc*%*q5FlL$!cTi*H~dIC_Y-oPW5Cz>{+w{3Z~M^X z?>7YX?YJ}IQEyWcKufFm5&gdIc@vv`1CZM3Q~Dlzp1uJN{ak4HcT{|P^Pc}$1=p;r`s}ED2Ai!O zUzy}^q!2jN_>QtJ^JTD5~U-P66GyZGV~(6!=W=$m$o}aSGOCZB+ACNC?<}h_|H{!z^dvQ zQi<_kRpBh27%r-~F7Wc1GP$nOu#R$wPQu%U(%Xkqdwlu25p{b%Oh&;tcYgUAF;zNI zg;qZGdj9vZXbPJ!D$DO<)PJa~qG~W7W%0Yw`F5~*&#<{K(3p47SdVZy_mH=7GPm&* zR?rog&|ij#iYtA3GaV3*Z84*IRAB zU9$EB=QZE@*D-}&;jbAnzzhq@JopeNM^*+@BP-8giw~YJUI}!@^ zaW@BF>rne%d#=8*Q}NeUe9m-#)&StIxmkP;z{);Wx&X@4A@ZAN{4Oc(2kXu&H81u8%xG8Qf!Z;_je@(rRGs%KBFkl?Q_QoQg_fZRb6pi{(<6e5(Lvl0 z<*q1>?LJ<^yfzR*<*xCYSWjK|SFWq5>IIIM#%YM!cy9L@VP?_ia zj^!VNRiDHuXNa5S{DGdE1pwIT_CUSI(9SbNFLv+K`G+F?`ILYldqhi44PTu<96PrawwtsT-MChdcu|4R0r{8_G7Ke zTeY5>1YW>D2+r-y1*Me}!6!3b?B`Ut@RVfW)NLRg5DDI48 zH$v`%`ZdFyzEt-~%B%F*(%vsROBEQ7dOe9y9s^Wgvgf~B=rFo%626*c`?%F%x4P6G zvTbg?mLvIVsh=k)k7K=737^UbwjK#O)O;?~JZ5mp0bEK=#Jg9U_M;`c(mlh(pMS)` z)1w6!@i#n~3NM{CM#gFZ3CNcvMBI7C;0OP#%Vq&< zleAAUCUB6zbd?au0h*dUal4@y4)UlrvgkKsxM3AIk_Bgyg~p+z77>hPQZ<&Mg$EK< zM3JP27ZcYu(w4SC7Y=bZF3~5B5rnM>eAg&!*C>1!{~Tmuy4k?)GG4{Qz&_D}tyS2( z7js4Kg>$dqxBpkPG*2M?h6{kLm5$-s#kidduT7CN z?sTMk8&Za@(UtI<;KI3k9fBLxUgEUVqjF#8y2i`cc(QT&v`qQf{ks9qo*?HgrjJ0) zd8zHWP_dUQ{#asLl;fr1d!_c&=Cz4|6w@A>Ih@$#&W#{&p$o*ATTuy5Ski!jMb4jA#Q^>^a9&+-1C>6`*|RB zhjd^$e$$lr>miNHQ2Mv?J8!E4hO5QXj@a4F=7x;m3hD|eV%!S(AAt*$P)S=7I6+(# zaa%IDYeNElV*-A20)7xYc0vbYgjfxVjgd^0VO&Emo_MZ6C+>oXj)V$GCF%}TX>C+$ z&w=|qzqh}mOXtX0fL~n*yWr7^fzfe+?8pNEMI!(*G5bJhR{pDx5*M*F)Nhz!US{=h zeKo_-Bf&a^U~b2t1E#?H6*tsW@WW?cu=+fK?O}dc80SGf_CflDUD!pBCAO_JXOtQ^ zioeL&rwWyJ`v{Ai0peV!zU@VGx_L_S!3ZH%Fq@=lkPdSBLbjx{(B{z!#n(Hr0&Wty zn^D`te9=hfw`d(4XMZ%tA2F#wKeW(X=+%iSkw}(^%TkCbkj`&x(tIh6tx_WUGDt9f zv*G(0(ETUD-N&=VbNk-cdW<0UzN@e|A%3sNm43Tdm&%VD<2f*V>e!j0Ew@Hkve2V5 z>2s+wb=)Eq?YWToP|baz<wbjPQUTi3nCRPSpBoMM2cmfI|NNX@ z{*1avyB`UI^cmmy$I{$$WKIk`g~M~?LfwmJe{#QOBP4y$RZ|wWZVz)pOL~_WQ!&EJ zZ>9yBZEO@=AUmjhPkeTDXvC>g*cLWHB;^}o^E}69gpzk;b&Nca8a&!Zoc#80>M(=+ z1Z;rK``Lmd?-rh9@Tl4d0}a!I=&Pg6=lPPM}_m2dP6e6c*_}NqM-V(7*VL zzEEOZ1mV}~eB9W`b>|*W)miS>ZRfule9rKoAf3K0swDo4Ll|PP4Q#dS9!+ZDoatq7Nm+H8JDUs>NE0B#qYnOhT1(Zcdbq?hI*)@1Dt+gEMM_| zL---Q@Qe@|k&leEzOsfti*|6d0Qe9CTUed#9HNtWh#{5$CN zYx?+$it=t5(eNyqJ9N>7oP}F@OC|kflWyBlkIlrV5V|AvN=E{c4LkazS>-ma_;qAo z*|1XgH=Z7NcLop7GrsAX-{MCSJ=G9$D5Zl&Lj&f7!2+tw)qc#@*w+jKVWO0ALaop>PsZjaeL zt1?$YrOQce`TNYAS-E8}bJK*O(&ZRa^9KHfqW7`bmk7plbe~tN@me#EG>kGSf&J3m z00jl5ApaT&Fmxm;P-*jbv2<;NJqi$Q>)-KKU)6Sy%8>3#uz?acKg8c!P{!tGgD9{V z#3y|^y1}TnN8`bgF>8zbiJ6Gxg$5fA{o&a?82q!T8154VO2Kp(C$UiyRru}#%znW_ z&muO^Kzgf0{U`=`u^yRbW*YoKCxeKr@spkTMQfa$@}Nct#2uy=IpbRQnFn0gaCdB% zRIE){T?!H$HSL4S-LrjkGB_9nakT}ue|`Y=wij#nbeGWj8&Y|IfNAlydwfb%r7s-g zjs&POSSt$ZN4Cem`_=>Ed97Tx58y3$^7fnNF}8S1mtWU1ZYIyOr8Hj|8!1Y zaj1vp(JMX6#YDYnUc`UE*!5Aq(HVjDsb-q_;lWF)@lDX6uzsjuAkwHpsr*D6?MjSG zpP#>jgJD2xKkbBwSY?<7G|}_zH}Z|M3UV&vbHPBtU)_mFh4TK`xBd%Z14DcCd8foQ z)vLkDwZUWo(J|+#Ir*M?7sJL7xyEaeIXOcD1oD|DVI?1?D zWuzY^();1@9-rjvp$$A?*5j6XQRk;td}EZ9wpWs@Ml{8^3Y_V*Y@p&$qW71wY@B0N zfwnN>k$i0u6n1rs88ob_#;Y3mH_z|V*Bf;%=(#gV+Frqw^5VM}{FdBuj@JOJCYEme zc1j&yS%cjE8(i>&8p=Bk=UGY*e?;?%dwBT30yK1N68jd^5U_%Vle|Fcna1O9+WK8r z1X~=#i}N09vP^K}upWBOKZxjWD0o#~bk?-;d;Bc*L{me3%)$TAg^nw2Yol3x9Imb` z(WXPzwpNxG{#@5aW&}k5@L^R|m_{e+Cm^~1of=txEKZQWMZ&SCym#PRuJ#J`?4=_rtK38?q{GTmDHfqP(YV1S8^>|2t^hUHj}DYHPfg3FuCL}L~vleq5C&*<-) z0K6T8bE2DwtWR@Md>>sSIGP^l9X27mi<4&PE9;t`5~*)&tYZB#$+RxBkL97XFJd)! zia13En92t#4!Ybd54)X~2`{%Y>RVO^u3{Gj zhyWS;eUJi60%Z`&22JZZMcR)rRsXTs`EO*P5fBop3Ku97F2<(VBZJ9cb&&QiYY_$& z=X&3q#27S@eUAza|BZFfZ@vVM57bT*%L5D$b6$eRh z#$j+R3t;54ge9I(RL@8R5~+T7UuY8H?^)OwXF%+zB_q=|HmCaD`pe4cu~pjh>4z|Q zbMZt?w##HtQK43pBhQsueH*8?mCv4~V~=3x>b2{hggcH|>B{jW`j;!AL3E-Xr;$1X zjj1$^N^(HO9Kr&LMo#!uK29SDO{3WchYx3aGNu2Ra{8*o>{**sqJHxrjglQkoCc^{ zUn3y_)?@+pcM?;W<-w#pl)!8hRwODU3O5+osA!?QCb#M6Dyvp+UR`4pi?F>U?GuG7 zr$!n|Oq%blre3^WgQH1cuNw-b1JE_~v=K6MgNdwN#s?h^$AJ!O9PJXb&%GT&R(T{?>hrT}OJ2O=(o0Q=ILDDuqM|FrcL&SR=CCF`1$tB)gCWb3_Ejf>)olxR1 zp36Vv{U6-H)YopJeg^eZ5&2M5_FiL%H=GTNbuDo|Mah{*ED>rk{h4w7C_eR=GoL^= zpX5KKCb-zWl2Ku$4g$Ph#HMRuvFT0WVlS2q{R1|G0XI%dJ;11<q-lY3HymlGV;uv4qe7T!x#6vHu0eQpc!vxKYc%U%S=9Gdb7{v!{Gc+pWvm( z&yXk%t;$%)KK9aM78Xl6A-ozYw2*) zu-=_aUJx>}%C#gIeQIiRBz0Q(Uc~QX`*ZX&%nU2IA6=DvNL-{uT>RV1Gvv@>)%=jZ zRF>>L`~!T%gNs{Zw}Czb?e~u<>Ga3+!~$6F5dyV%2LE5|1<)e z!}EQNScRoJ>mOkcDjMb9KH_q*Zq9lmkOq?vBTyYC&XL&r7xemW09b^3dqi4%L&YI~ z`q&oqp-so{H?>Xjr-jUk1}45X?jg)QwM+~X1>Yy(wystX|HW{~d*>CdzixoQ(r<3? zQ!nKKN_ZFa-V+rKc>j&aWAa?=iplx@ecMFm711-FHE(UvxjX!CGD~4=HlNef(OFY( zX16B3L5w;F_sS59GPjhGHG=*GHnL5fJE{}TrmQG}_*CdJGepK^wAu(g$Du0?bct9A zY8HZCO!+ycnOv2WTFQv<6oFer8G%ktbaRLMVvC8S@h|%(G*Bek#x^}}4}huKI+&lQ zBiHOK+0Pa;`_lfach&36zIy-tW8H*vF%M?xe)!kek-Gb-TU4Ih>Tnlc53cT<@@kki z`%QAYRN~SwK&$&Ct)01xW9!oAq)AQU)~(6eL;LS>=DEDi{fy*Lt>3tEnoz0_Q{&0p zb5%8KBdkoOTKBj%^shYw+vk zn+WBuRKWvM%`fkbx)O(IHEdg#bDAmRnwq*7ixYrb+KTgU$X6KAdO(&|=I4mAv8uAM zKFpR0Gw(As%HLc0y+&%$aiaIm!&+*E=YPYJKR@GUDxmC0ooORL5(i-Uo|?6;jO<%@Y3tFUgtylpT2E)*PT_59;XTy%oG6N2(rYWb9vjScN|+!Oz(BpkK3G$M92p1-ogh&Z}ru|C#B(IOlNVP$8pzI9^MSU z)9F1)W`s!ENkG>&OA-_kF8VGO7|0=VIR(<=K3Eu^P-+JXvauac>%h@rYVLuPsY5kU z%0jfBJ3&{AR~d#<5GfGA#EfI2fE0zLU)i~B^>}zxzNR-hIa14)fwNrMf}UC2*f++D zgl4B6V6HlDYN%f=#?%x66w)kfm*Smg0czF_vFzJ8?&pnWV@DE_VUMyc@!xXu{|EBfTeLk7&DOa&g7NCYEZ|xJ~1(HyC!N?5*95hs~j=m zP!dmypGter<+9jij8IE%sWX)&d4&PITB6qm(!^!c$aFVZRyrkHAb^0*fIFGnBphV< z)Zuxl1)zB43T9)*H1r#+$P_!QSE|u&8)>Z40`V#wp1)GDcj@^0#@%yaK?f2^s~MeA z*&v3dQ|6i5(0|;Xa9>q%Y|Si&Rs0ul5{Qw9vMhO&!D}tQ&hhf{4AHux|0q$4l@Cg% zFT9KSqO|X9cD1N1E~gc|JWUlWB{(c=CEl~f3Q~N|bQ!&F{LtvG-|Q-bl|x{C*J_Tg z+Eh!%Hb0Bv=S;hEJoT;rzj)N+;909YD`u%FvOsUC=wr1}DRgOA!s6_p#ii?ZhL+w1 z-Aq?7y1Kt=p1*i_{bI5Sr-kiX21)@8$dqHx@~v>3%|*5MG%TC1OGYn*j5Rb;<%9dG zUL)eAehNc^O-$?Y-#N9APQ1#lh%%u+CXJ*6ud%vUsS=hV6{VEaMt#Rs!Vws$KLo3f ztE`rlo=O4u`Xv)rFX!H@sTbo7oaPyl(DramfKZ+Fj*;i2PCjjpb%kit9z0%Fy zSWZ+1=8~|j?xaSk#nsRa-Mh*h70rz%5E?$G+x@eW&H_}sjYkmNE4chP3jFddwJ%!b zNDL_@dz*6l;g{O`{>>WauySL8LF>Fo$fN+}hPMo<5uqKg#GX*Ll z_L|CfSLxdCcSe&lDgj#^bN*Zv=DS=@5Ob>cw4!OYjW_ydNB!isipgbQPYGkg1|de5 zbS>$!WLwm3Bo+)Z$!@&WX`szPXc5`t_-rXd zuFI=|%#b`-jWDufhQ3WH}wLD%w58f%HeN0!}LKLoUNBWFVr5rLLdFo~)JC z`Gg!}m2&_#i}J$zf&Wozq8)C@Hf8RWR5j%wKd znb4u-46BxzG$zTJ8aOOJwkGa0kNfs)3C$CN15Gpd3lm8IeDt)}*^AyU$&=SvzY+*P zNp*1STb46-hg3T$Q4d|&MqqhHTJbN=Yt`wLzc$8HNAcov;`5*y;-l+Gt6nFzj#hex z!~RStfnNs_@rqyw2WByY4)Zd~c!I)_TPhUCST8PrVVC`a6<$s1m?1fx4g1ntiLEB9H zKFh5rsew3bS_tCG=J#gH%gLvChz>EKjzJ_~a(=2fO*x2tn` zi;VLhXLC$?odql~*JMSUZy1(>I<*t`UJf_;@0Cy5uj3$Sg2Ob&W*=Hx?Pnz-9UUJi z^Ncq$lu?_I!lQeXWlyp50H^A<{veYV|Apm&Evqj1d>T_F++Za&VfkK@1)#nN_%`?h zY+PiBHX~t#ZgqrJ8qIS?8_oCA-{v$VUC5&6b1H@J^pX`F*{pJ-AtK$-4v*JysK!QE z7sup2PWFgqfGOVRqd~d3Ex~_H-Tv^#td2MTFVO$%>qVFwH>i{K+w^qqCB!MuY0XRK z{Y0)TxShmhBV`|cicog6aWVno+(`XRlJ&s@g?T*r?5?99`bs$FZevSD*1zeiV;nfV zW=V^RNr&&(>ZYg6V#3#$bm?^gW93%g9eCVMRAdM?MRYHm+MMU;N?i>di-{(#2eFnH z>R%TM^D85eVX#rpu)sv+EixB(VI`XqnmDVWx*ID}6=sXmd9yBr?#_vLb#+l+mx2V! zS;GJLcg&soK8Wo7OeqN-*?MdLUx=^dO}jY7Jm*fPr<_Q7YT@%*aaPElYmD*s6>xpa zGkxxoyq{yCo>QXtc0b&IRv(4qwiRS^F-SGZs zQsI|_iK&{P=iv$NNF&RPda8Q7_MDpL{0hfp@vJ$#i!3~?vzd|=h$WBXqGL*`!R zYmq8sM^R;+Nz{Y_6;wL+cm+Ae%=*luN_Vhu5z7+$@*n8aLB&KDDIW((FyMd|I| ztsP|ioDD40HTfojQ%NA>bH=|EMNJ)iL|wE+KQ6$OxwmF@R=GNQ!G+i=nu<8dYdU=m z>M1%XcuOcMydA?$g!n@TXJ;Y&1&!R;7Ly(o@@!3E;iZXnS3Qc-+KQ3_y*Z@vs_2td zU0tTf+KBemX?t_~&?4X`q@B<`Y`P{;(ntG$q@_xuw!IvtwUL^9SW^+$zle?B8T%?~ zn!2v7}Xl(x-QtZ$N>C(`a&%xW$ncv(|>0q6lmw|mU zWv8KGmXSQ-30vV6!VYTV(pH>bXC^ATsYP9Lagmt}(_~=c*j`^t!P-$-Xc9<8R#Kf8 z1<8ZZ)m+F#+(A*`Zk`_Sqjeq=hmyU@u64vTQT6bk1x`T)_krb1%*4S&%~jV!*Gp9P zcqSx7u0W;#0b??Y267^5HCmGEQUAva;&$IGxmljd>Ol^AH)=vc$1e zJJtBzc__JtKU0f_wvG-nrCG$}1aX$;>Nl*S0w)<_Y2y{ca!Q{2Bd(&d`XVpTWHz23 z@{RvCe8D|?mg~wNA0Zk&~Q{K}7Pg zUvOHz7-yvnHbO+8gIo$A5bJQ z1!$NH+youN+4=hoxE@?3&>)8^!Fb{$%$$m(R zaeODbp~mUqsFG;*xxY!?Y*lC&Unv#PG!RLom=g+ucd=??gCAIGtg6czoYT^V#g@S! z_jC1=>U)XMC8FT?sIZ)sG!S5zGwh59bf{?=tQhneh;;%$llYy#|8WNO3?P=b&aZWb ztHUD0|4}9qu=U=WMW0HAAAu!CF`p|9F762jFx^w7Zh5wa1aT}%8z5hLDj1@rz@+j+ z-{~EF0l_O>?IL2(_e{mqXch|3?q`Hn8HJyw0QT702_}ISC&SZ6jKU#eNCI?_|7KSV z2NT1ffmcGGTxJ?u{?>e-d{2eOfm8)>Y4(1N#}; z%!2Kyd`2LvL02PViwVQ~nb&7&ZY!wsjdrE;f}X1= znHhQ6I^mK!wQSiNHg8_*1UIQ=p9+mu{EGkg^X4zi%PkfPP3ji3HG1|FIUJEHam$~U z_17g|4H^e25^Vj z2T`MWY@PS+f9T&UaZj*4ZSeY=a~&(&5$K1rIl`3U`xE0DI&yI2m<(&g(7!Xlrs&T9 z!nppy^}><=M~wm_c!krL$UP+g^>u((J3`~8OTYeCfY90h?;k>6j!*xG`+*Dl|CEes zO#Xk%{eKnZ{WGs#D^n3jqftLRf3@+@n(w+~kOePzpzOx=D`k9X>v7kvWtD+JWrm99 zREYS2aQGv(?_b^=nEoD-SLmwbC(H(6so$MGvdjSk8t{V^B33Y)bLb2B07=R0L>OIary!mz5P(PqLg$?>tGtBMG>pN$0Zp}aE(w%0 z-=Bg)ek)(HR{Ah9VdOap5#KH`x2A*}KRms@Elu+_6kDf!^G&4YXdEut@V$T#d#gPAqzp|aW~_l;pDYe!Cmr*@n=~N@r?WPG`#I8` z!*)xAA9Hh#^|BM>zN2RmskrH1Ov`a^83f-*Mv=h4h(V>K;b8B;HL6WR#-o& z-WT=K*qm+h#mK07!99+We*%%%^d|4B;bvHx?ias0nI=RIURZd+qPQ%vuzDtjn2}LM z`jJFBVlijxr;*f*Pr_d!vnS81#Y!J;Fz ze|kcM0_#sH7PhjW8^w(NH#WIrq==^qs$8;hSX+aifB+Y#CU{z_M%@bQR~UH^SY*77 zpeb7B0J54&I1^xLK>m4b(z1yuKXk&#L+~}mHBp{LVkfQ-z&0c{ zz8VGS@To{~R>k9ulqK6>zi+`*fe91w;WMPJWr8V{_p0P|+H{ z#WmD_1~tG@lF$4Y@la$pRmU+z6T01x6Iw49V+td8|0kK5dnv1lYn7?(R36KnRVG)5 zm|4la2j#y811Ms4<8D}vUyn`VE^AsVR~f zTc^s%*zkopCWM=-L!gUdbq_x;FTBF2I`7Z(A1NHC2$Z1d<+~=+t{#!$ z{c*k0p)RMENvINOeQ{#_a%r+%Mw_E$Ul|=59(Sm8r>_z{QY-A#I4p_XG>d3Bv__&| zO}d;czj1jUqC-ltGQsF#fnGm&(5lvlO&KqEAwwmgQWlxGg13j*dS}52S3Zx$2-WMs z1+6)vN1({|yP}9EqNlW(_5AHHv0UO%wVhN|%7FM?iDF=wm;6iDq})(Lzet@}DKC+5 zjwKXoTmw2J1`#5CU=&M#$X-k_u@GB9s5pQ8qwoF?u@TGa3db%P90RC3ax*+-0E&aN z_W5Aq)gFF(UZR!LthXR&P>()uzh`|BK=1f$k~8UA-Zl?nA9%}}`? z4~@BND~yL6(E3Y5yf;ZBz$=ue)zms~K3+*RA* z;t9SIa0OMu2*u}&v)^cnp+PVa;Si+syPo13602BMAv_-d_fe;hFDvkUM{N9rV@uI( z)u^N~g@)+V(@T6Aot|R`0GxXIx+dO;6OIyRz*ZCBtN=NApq?e10b|H^uj`oqD#cH^|Zu9n7hdOai}C>;uH+qV6(Eb>rmz)Kji!) zI{c?Mo|$($V_9c zlWJc+(%I5WzXdS@r?OByBr9YdDO?LKyQY@x;Ne&l?0#Y&=cu1M<$gE-G5A zT&XOUhgH8+%#WPWaX-juy{^NvdYxwP9{_k6D*g;~?5{$;p*Hny;^ycBrN~H5MnteS zjB<6rt2D`j(5vsYSrY5g0jhO>%tOZmQ#9<^DEr)_K0e8Sg zT>lV>5Y(MI*K{aTmcyBuHJe(B}gFPfqgO{s*WrHv0aOecKr~p+fj1JxKXXTx0CE^ddu(Eh3Vd zV;(3#z`oL>(|qq{+EFt)L+(Qmlro5`g3W$pv;ImH4%iEhLnGloO3+Kl_CCGe>54Cg z`2pEWC;E{Y5Ga?9t=lIZs1u{J_ycwnMxTIO!?O_~|F(&rpFcKs3dzBdFD!W2r8DWB z#zdl7gEA1;kSpS7y;aLs_cn?|Q}E*;?i%=#)A>3As?CjM*3}8>f8`_<2JPnG8@G`9 z-2$z4a0K!^z!^C}>$%O{mbn|O>RRnNFKfLbPwmaVZ&}x4EeZuE5ad}SpFo(A5!G^ ztl0qC+qyf~ZY2+m;1{jq3!z9LpSWrrUu-`ER@3*x<9fY03nEwuBf8$B1AQOgDAkCu zFm;Mb8z$wWxt6x3J6&2>b{mx1!4!i$SRo3|=qcr%7ngM|HV57=RMOXrw##9{RMCL_ zr3utbA&8O8JHM>U+MSMvwTAIa!yD=c42(}vv1fZqN!EULLsn3w` z;pLo>G@B0uw2=`J^f~Fta?a)voj)SYUZjH}4CS$jPAw5Ez4P};hp4KOEgP?n zF`?C&<|=)DEp~zZRGde7+A0#O$z#FEzWfNNC)Ad6PlTfCxXN*$)%5)yq~O+zW$PW1 zYbcz(v5B)QFum>A=5h7bDkA)Jcnptb2>5iF7YV7$%Ky9mQ-~Qogyuk{1i_ zrRsWz!junrls#E4i2~!IA!SvpU1?`)tEX#$aG=_@ld9~ix`aApO8Ls0PdzA}GTFqr zVhp9_8#0q<(t(VWXOE+~)wQd~)kEO*%Cm-e zAO&iCTye;FiKXcqa4+GvXD(Q^TeLauybv;9Rst6i)wh}H7R+M655hOd-1}Z*OvOF7 zN)U|D1TyOU%}ysNV4_ZX>NyUFdPw(+cf2%BAaq{R0v|?96i@XtNpCT1O25#C!6k&P zl7XSHf~9o>kHz#Roi4mIxA4Jy==t|V>9$0UUEr`xDAUQFB%D{k>uGRm&Wi=`2ife@ zq2w!*P;4mAw~K5CW-hset^5yQBJYfGqu||i;>XN!`Z-1&ND|5bs?5RFS4&U@0q%N|{^G#i7sp z^GXiRY{_7jr*+a=6tqI<%U)C$hftKMF`c?|V;JI#42Psz37I-#ujJ~tB1}tNo$Cyx z(avLoh?iBq+=wfJXd=}SxrFGuA1odRq~!Qm|-jraA(QSY?TqpyhGu;p%#8)tx&s|8G`J zzCR^As$QYFt3EP|tym=i-v-}&DiQ1S$zdGz&=R0l@LS(edj9X`)i7cJ!!&^ZNN*v zD+|yh|EktTAf!WcXt1n}y60L(KcRXCY<0I) zmxvS=HM%A!YzUH(Yx+_V{k|ykXc_8i??~`#H-&_NTOxzoT(k*cEamG~(!+IbVQ&uV z5sp(X^MK{#Ars;9G_nj@QV?AI?Ye7C_a{@{O&;k#3gQg}&4_+1 z&4AUiQ#r#d)gi1Ix^f}+RcNf)4$?4qhz+nwJ*E<3k((~x0Lh&_8cR--9cTY}X`QtZ! z?;1;KR60%cQ0EQ{u^-0zT$nBc73Q8sou59fU3?BN-H9SDm_M+v66tjv%{ao7K2x9B zwmr`9z~=XP)GI8K@sWbFu8C3-8`9uP0(B9!I?n3S`I-#;>(9D3>W|k=;emO0K(TK| zWYEHi9^Q4K!iXeF7pDjwAk@^daE z$s4|$IPbQ(cfQ?w8l%DPN`|&QjC`((`06?dW@}!sbYXN=ag{V zb2*4koaip>!lnsKthJ~sYTRe+mWbv=hLy25yPeG>&9{%cjgF=htH|yTMPMtip*cnD z2=Zb`aL!}rzjx!7utgu^LW<6OD`Xs8SY)p8u+!>NTxck=<_Tq2S^72<7K`Gu!{i%c zb0EhQP5AoK;ghCRk9VXG*~p9&y=I7-IJS2m>eAj+(cu(b{2JA2wta-4D~1N6VS2!* z1>`k(J7f)ft^If%f!)D}gD@nwMF0(3!S9&7{^@<)32au%S+?U2s$cbcSrG;9e0cob zvkR<^ny*n}%K@#Bemt9qdhJgQnl%R-`8AGdUI5lPXL@woAX|JA(RyxrKQ3)lM1awG zBq?12d(XY^Cp#baTbb<|`sl^?Bh?+)^{^EN94JKed0(q6+hAM22dRGIK3Bf;*iPx~ zj@*WKMyH$fqn?#J?(TLNIe`maL}r8xvH5%=CNYXTBm7YNaW|pU6O;R6kRHKze4?<( zMsGMZpVzY?VkI{^Nvvk}F&PfV!3P50byY=dOJw^0UqZEJKL`G2J_`^ zBk?VWadqf9B;fdlJzZ!c2$}TFtfAK?hKkis&roX9hsTMyL7Fi=+2s5GMpXb=f?X16 zVec!e66O<{o4JF<#7Y-HFE0Y?8v=ssyEdMlHaBJ3P;lN_h!nL*HddazU47$&Tq27xft5r=lCh)+V1u`J z0=#<-nC;02<6Zrz(1Ow~-)m}0>gmbZVnRbfVNX{KR&A?mQ#DkFg8oJgahNnZtaA(Y z2ty@O%tACH*fNP#@C?o&C^{I8a_+tn06HXyKg&B}Z82 zu|cFGM$9Q(s|hg_N|8yYClNvlkw{Nq_Xk4;kuTY%ha;e-6%o|=mbaj%huR~d(OBnx zY~{@%_?!we=}lh}K)fjlVXO8VrUeYSUon zsh|kFk2U^oBsos`y)?!Noj0H9O~HrCIcS@VlZ0MBJ`j$p4jFSoozgcz|8Wrtki!>B zl`Ep=u!U0BP4`HYgla5l=X8*aO*&Ci=eF$^sK7DA|6OLP>5EFm8jJCU!CJ+*AIpNf zQ)R>f!GmUf`OEZQtYHTqxyQH+hI686Z*Q-9YO1{abg`-FtRtmjJ*;AVWISVJJ4 zaNzPe63?_r@N|uoU&gVdPD`tKN~>9kt{J*%ZFS zbS6fm%1@jOTfU;Rf&)%koLIbIf?hl}eLM`G9O{}XXL`?oSMc3%<^#FK( zsmZS2YH51oq3l1iutn(r2M4C-E1D+E;v#v51?Mq|{f(&Z9pJVwX2D3u2MzvdM)*E5iSjM*>LF_4nNDAR!0K6+xQACRKqv{V`W5_C0vW?a5Tr zqN5dPM*i#`kK^d%iNzIM2_EG5DJ=!i!nLe&@EWeQmh49;q7@X8TKp}OD1xw#t!nf& zbCepBinf0Y4^GXhfj*U#p5TwKdD}7f7$dW~Mg)!Nm3*n$9(GeF<%Z#{C!)^?vxCvXCX}?`z(K2lsos5_+cyN zgz1L%?vVa>Mm+Kjo?ejH6={^6m}1?_KYn??{fT%xYNze7J&t2S2LGh1e7EH1P?0^h za%CiOhZX{fn)dFIZE@%BRucx-eqE3CucHtRqp3kZD#hpe{v-UyxZ1ttiB{Y{{@I<3 z{~HJQ&Y~C`Oxbh(mFPpZ?;VMdlA9Ir@@KvH-6a)f13VX9H z{mS{ClzHg$Pi&nheuJU)}t;8%UVcgerqn)1wDr$2SfDU8zr1_v7-u-_O-l zYmK)3dJMYE1I~o?cgR(6`C`mwOjbe6g*X`fS)&%NB&)3>f+7Zan6bq%)pZ=n^h(Za^qgC0*_f^0$uAn|3zL0)7_HHqgCMAl!cYV%EAnsoot@;I*6ec?=3ylE^gEv>9{ z@Wdo+k=Y!LT3=n|wL$T36BR zfEWs;&35wKe{kZ<+d!3=n7Cp$?`+U~{zckjcYPhvn}BY!-fS=oC1cL^=N44b#SISv z@i$jrcpk^Ny7-5do}K_(+fM>{^XuEUUIgjHULf4);o1625SpE(T2pIl;{B%`|NnGW zQGd*+Wdrz4NELsPz*53{MMg$Cph-2`VAs^v4q*0i_N#!aV-_O)D7dw?m7Sg4nYmgg zyeF-_7#0?`yK8pxY&O{}vGnVBeXJm;g4jd8GjpdH+;qz|V}~y4&HL?-&J&{vit-(z zOVc<6*O+iBrQoTDkjL?f;|?cOOR(k7M1bjh)Fi6*hE-X^} z6+*g&tV zT()${mL2|+nRT{eF|TkR{n*83_4@AA9i;i1^H8{~ef(G}VFczh=TA)qM7Jv-uKm^6}(`rv}JobaKomD-VD6@0*)@iIx&g)a4|6{V} zSsH|+Wha%TV!lozUXy?=9Hm~i8Oq|hyH7XdSN#}i=*`llLE?^b02k>7D&CsnnMv;Z z!_3w=JR>HmB}=~%O^6wY%uS>bfuwNdd^ZnbxF#Xe%P$mFARYFaZ;7>h7Lx4~GNg*Q z=Hu6`@M(9M2inH_*rWBxGE(&rai7eCm9)vGApn+LI7#4AST~v1Y_7nbgifj zoqc01qzqWpAX(go>k_6OtwHc7)(Wq230iLdKp8Dn%eObtlkP^naEn13L@qmDn6Q0I z9;4@{emJCtHm@cGcE=GCZ(0t%il$0{a_x|$Lyu|cg|t=5}#Zm|j^hZ1p@>1xrDvu>RW zvp95*P7dl#!6JFC%fsC%^0butuuT1FL`Y z`tnvTe+J9_yo7ui6y7N1_<9TrHVSkVKgG%2KF5yP!bxAvLrD~b75=#V7C4a?B(@*1 z#ayUAxr(>fS0929%b0Wl^lrh3x~{cNQN74;H>MPo!& z2Ynv#)Y}UvtI}3ZD~}ht-gARPc~KYPwqw-%w_ZRPxrE@fRz*&pk;zEAk62!NXYquI zR6FjE*m&OyBK%LVwG!kX01s{^Io+H(&FgbJ&6e43xqXCmL~jyHJxy&8DtSv73n)7+ z{k9L*dFH5pHlG0#XePipjb7ikx0z{^v5f7kib+?ed}y*P`OEA>hhXb&_T~F*eVnQ@ z#A5Yw)zMwjDG#oHM!&LBwe(8~Shljd8b#o5iF9!oFP(h#jt%SULAJ$lT#x7En1dly zjDE6owRS&GWw23%HgqP7W0!n##)WE=ezGD{h`J5kCN)=k2K+UOJaxT7^q%COJ~n%| z81ekY^vSOFs(1brU6ku$f@XP^@VB6|T{q>`fFS8*urTWS`+LC2tnH$_=2ts2kNUAS zO}YUrb^fYq+0m(D!9TQd2th6aJ69b`q0zy^Q$$=+G$yEz-|9Mc309Ot2$R?1wQ;Mn zUEz{x9*#B-W)EKc+GiAcy-rt?oA7BIzSDU^o(7N+jo&r&x-BdPYQz2vN$x*pHEL*2 z>FjI9gTcoyaV@%2QvJ2%&z7Wt^%Fv(fHrLX581S^<7$gDXRSqAyOd( zdmj7L8I79d?2*1dasdv|)`{}PlBH^NO9a*Zj!CmA(gHrG_M9<9Imx!eok}Lqyj<3l zu5C1nXGeTY-sgkLV?eg#Ji#pOk)3A_Bt4asEYK0pr zIBF{%o5&7TucIujfQ5GoIrKbF7Kp9?A+BY%T3J=}27XNyGPRh)$;^G5v>X%3U>%OEa zb&@ZjpVKR&C}fszD9sw<*RsE8YAW2RD}*d^ejwG~$&2{9dNxu6>7 zxG1lQS{TdHMVCI`g9GYb@vM4v$c*K;ataI;&B$hl)pb0F9Sq?ZiH#Hg_BVhszL`AS zM3&R)YFk^o4d6Vej9hq;yzFZ=^K&t+3IDz>S0_it)g4HPF3^tMi6s{tGJSALC`8HW z5_Yz*IcUB>RQthgqcvIe$p8H48Yqym+L536%Wu6qk=f9BH1O$iBK57itHxO1;XCzG zUOG$L!}`K?r%lP0-%~PfVMZH4BFV1=&kS-bEk_=M+7-+SeJiL6fj^Axl$zE35l(ds z)!%LG*UW?FKmYQYEBk5qP+^#<*zIEh*O3<$CgDJ-${u$2!=yY+0xw&)nzuIDs9n9q zo+lkZv*2M6>O1N+r^s=q8aEuQg%WaoJ2oQwUi? zNE4+?3PXi-`5kpz!^c!RzyEcG=Wd*bn>+sglRTeL5ap+|h=(Rl`fU_sh-YD56{)+$ zfybP2!td#J-`R~tSYR^?rYe3f^!i+?+ZsKUyK~@Df`VCiaeA8{B~ybo zqJPuN)FCsV4tlb6+LXL8Zql5?9ve}YOcFAEN_v%5gaVG5hUl}nKY{~NmE%UwYEOE9 z0$1i#o#x6ZM$KZAitqJ4q*fWq zL}krosXoNkG$cHd??M?0+_=3&5a9&KqjK>$q z&t?ZPHI(6|UyWb3qW(7Bb^Bh~`+l8^!xDoW9n-B`x$wtY@YJj&$CssPOAc;=SaEXN3~<(y4y~iV zCGwT=k!A)M4;=;{hhrwfpmhWE?r(-wM$;(5FZa1Zzzg8sE%2gp=KVSF^@)_&gHA6V ziWw^dhrgM1;abJ&T-6>4i(pWFcR1P#tB;`4c5+PdK^S<}`}Tr%+sILj3ej&FJk|N} zm}ru%q5uHtX^PIeMi17$zMh(heq59ne9zZz$M6Q&e7py~%>;^GZjG{qR9Cc`1YC{b zqHQvmh!1{M{uqlh2ChZdl75Pq@O&UphYT?kR}>CZ0#6tg7L*rBdC)1yOepnuDFWPk zvTn-Mp~44lOlAn9rCYy5pIB9Tz3)!)Q*&QPRj2{;j2cdF)QE3TLZ(AKZ?Avip=V*S zAFK~=|5hz3-AX?rgnz-}g(z?Vod*y{7d-whbsA!oK+}FX44N(D=ALDwPVm=4T4tsf z>MUD*_*;s*m;b_B)~sJREOse3Gjp<`KO+EqZ|wDXe3}utKb6Z2fF#;OHhQ_+%6)qY z4T<+Bh}M2o8sFRCq+{nNLS0M+Z;$EJ9d~~8gQMN?NlAOBz4$8p?OntR=c0zq#|Am; zf5Uf<#g3=?X%M8q;9&k$NtJGUE6#xWIc5Cev0dx&dpM^y>dB{24~E8q=!dy_M)<}( zw9u9)Q$9p@7Oh`eBzRxC5r7#f`Hc0X7jwYC8Us(z>x>Mbx^C*YyjU4WL&`Lms zD)bHsJeq98^FNPoj*pK|Pb+sDqn%famBE-&9z8RM2Z@wP#_Cr~Q=^Y6o!wG}M;v?^ zF+Yn=#W*WD?FQzycL2qg94u#0Qr6z@LZNrJ2)fe-@DxBd)i$WooK3GSo1+Hglzl?q z-u!eyKP3C{WFLH*W5<;0P$s_?rR`SBe}w};w)Rb=B88nGW%q=uU{yu5bVNxwzf6k- z+mIjy(p0%xcW|!o1Y$$P%6^3knVXSpRYF^~=7W8t_%7>Q-rX4u{oU}^qD^%3;fKuf&D{ls z5?z+F{C7StCij?u14K&SuA1}}bPP3eAi zu#VckiJB-sKVymQK0VUy>Bs@C-69!N??+pdli&v4ms}^1(1k*!t=4|M86Wsn*3(1c zA+L(jpAej54rzkgXTO))4_l6~vY)x;f>}&CdH+La?%)nE`}dhcYbt$u8VywR1C`4> zMY3R>pccjV?KIV~<6%C`!g%a<;&oW|9IE9DrA}Iq$K->&hPx=Z7dW60d+d0@!YUdPgGER=n=DIlq z9^AB-TG@Ukx1ka+m^T2Z@&N=O^#aG@a(vDk%f9FQXqGBfzmCELbI`fUuu5d!j||U1~i8-ap;~16~d^L_4+WnHHl`Ie)x$S->UrDLQ}ROXp_(i=>M| zc7@uGm$GK~*@xaaX#zvRtz!FA>+k1^Vc>dWsyc0}7ss?$k*}%?aNYd0TmfIgFF0%B zNVT0|LG$Wb$W@x&e$Dz%bzFe|jriKl%Lq;KL{Yu1CpAXM8hllmd3;wCmXt>A2Pc4rkPWL#7Ng!nYDm`<3)oUX2;Vz zTOAdd?~Zl%TGzj<)+KcuER=#L&?`HD$>T7+(JV&NQpan9BFz?tS1vjS4?ET@!ReE% zB7)w`r3IbcHZFE~f0v7oor`B!l(30D;(ABW>Q*}Cg;lbnPFBr7y>#Weebv{kM)3e{ zIrL~zN@QEH(*~UHv~`dTqkgj z>$sTh=ZUa&Lrfkvoj6^nmJ_Kxm`;N+U?k+ab?a}(Ojn2kmY4>DhD6G>8O$7;;e`ox zRW*oxnSJ~7&|RsMmTz*smTyB}>+PRHSl^$=OkSS@yZ1TAQ=9>sp&K2Ka>04qho?Jl z0Gr;|OIJ})>c@RECVM-*h#l}Nl6tIs{kjpp{r>9o;$8X9iHP!}Y;y8aodyPi)i+F_ z27V@2xpno+gNm`&yE=O|{lblP$jn-RW#Wb?@AlGsC-o74dRVYKlf&lcnU8CUYguov z$nJ>J%snME3T-x&M5*0olR~f1mD>CUZ!+QCsa@dRI+?*E= zW4g6=-8CBQO9>Tc59v4OSVKdCvxuhTok{N6OV;I=(;00_nj5gK?M!4_#p1YP}$-!L4LKx~$j%~c!}QcAQDp|eas zkzKnTQ?*mHm>o!K2^JD|n%>y8_G0$u0WB5gWS?}}glIEqRK8&3qE>7s*(LkslRyNx z12Ruh$n#OwE?#W^)n*;xEh(l?ff`_7icOU2cFJEvbkDw>*8p=cMG(E zZx^vYin1s;e4!-#}kIx@VD;#4-USZiVz!wo$$d7-$&mGdQ*SP~X!_OfP-#%Xps zDQY`z*M<|^x9k(6qm>rve3~SM65U@e(_RXwR#c#78?*b^((NAHG(qZGzu%6-OY`6x z|3)wD4l2%>D;UqB1U4;~j9n>Zs?+FG{nTzfFEyVwM!YW03*mK0oF?`pJaBk+^TK~L zsRf01HGo&mIujFu;OM&%`xMgCPUb<99~ca1|^$k?xIgGD!DIHt}}1sUt@T5 zjI!-@IxA8TU>oh=w}DeCfsc>*oWg!}dSC^5KIcdWEXNjKA<)Hjz}tOpHXtljWy*r9 zm}s2PJgO*cnC5!1VA4A*?2q}ZEvOPFWa`+7S&`NGn`%9zNAyJEc6Z64el5iDBz~fD_u_le8G-t$rd}sCb zvdyAD+aEUz;&;(k;a0&^p8zx@oJ^Y8p!P0Y=P(_m1}=L_|01^8-Kke82t2Fn?zi%# zslELE@!y%XIMtB$rBm^|?>@J$OVKUUYVM8Vk-vw1((J&%pJ%`McPvCLe}CvM8FBb% z*lTv8NM-J%i{m2<5%T##U$$84<%yJpH=%4wpF?SE=Vsbx*4(auvy#M#F;3^~33_8} z#8N+#*FB5MN~ioQ=Wf8ZUafpdO8o7*11o83+zsE`AG8^-6z25RLHLiGVH=)hZQeHy zUwj&;{a{Z~L7PO5F0S}X_uHt<^J)j)djp#_afGM*N3}Fkn46Sx&5DWfaeadgOAhL) zk)NWZ+aYN}={adA90ZF{y7@qtc1f1M4L}UQYM!$5;&_p|NG>bwcDoaYoVVjISt+4a zghdR<=qb!7Y?tzgVT>_s7s$9jM^RK9A!##a99|Stk80*DsjN~e_E6c<`HK-=LO9@* zjp@N^lzWK7`mg}AhGz_FL~}^#bch!295JfYi6J7K@F{FYEEf?^K|!`RRr-%exm^tTw5P zA}Ebnhr4xytUYJ(bIp?}cizZ2CN#SqwBfyv$E?$x9c#JX`+bBWMh5zq`kjq$$Je=! zpXz!a57#hD30B;@diai0ML;(dg|5FRQhVRZow++Z7av2P&U0(n@+xJ&Cqh1SB z#<_2&?jLud#rc`nM8FCB^NG}He)y8AF{$L^8b1Iqop76lmL<#Y5(V@nQf?C?i9Em4587PKKhEDQ@tvUx9Hs!xDp>Nn}-qjh~_z$4H~;C2Qt5vRJ)2>Caxn zns_>-k#gcTnJIf4MYSTuas8U(FI_ni_ezcEHba_B)&v4-C=x;%og!&7J|Z6ZzMhI< zYZq#lBS-g+iO`9b$Ca;f#(cho$xc~}Ev}tve3G}o6VZU%`q)A4Ob26j4TH=`+$s}+ zZ{sg7*n+e(S6b!2ktz=^H~me(Q%`+8Y$WnTJ^ZAhp57!_Km0XMeweao*+Ggn*{%_AEU3W zcR(Abvx`PG`vmRYATg_fNyAfwvp$x>!;bj`1jGkGPV$T9aNW!nDLGhTF0HRdrg)x< zi)(plNdkWJr_oPUhBdtN>noD{C@d&CrZ$T52>#`r4eloLgs4!8(1>~WiL0}!fRRSM!|G5J^_sAWfav;?W**u$Y5IfIrBX^LeKp+a8J(oQ_lZSehrtBz&o zKu4Y!`@w1ks>+W-!+K5Z&uQ#UORw!QhT%@{=9b7z;^6K$uiXIK zVI5^fb#-Vq#v0{TJ#NZljdD<^oUyHD*Nsb`5(iuEjZA9TU(lCBLPhC#RoWz6*YtXFm3j@Yo8%8?% zTU(kq)Snr+bUYrs_)W2%!100=I+(8TY&K-LMp6=$vN=2g!pyUC!aQgvaTO62s+7Xk zj>u>6GGbM>9?2Tb$^(wJXx5-uY=0Tlsk|S|xKa4|s`ARt1-v8^mhyPAbW)0?`LX1xgh5(Yt4|+C6qiZV(G|NeuOZoDQS?8avZeK+EOzQw=XZ4#ba!i1FULPT z-oloclrIkbp>=dpA2P>39XpP;I=du=gt871r%FH<<+EfzO=76V;!$gY4U$74L`8!Q zGebd)gz4Db6%PiR!ST5QRIG6M(PLS_S@O}}&!s|uZ7kD8dhfbm*H8*C1!)qTWbv=+ z@@5t~d1a;&OQ%f?Ubx2yRET(S!(<`*knz7>y%`$6u!it@r_6(Lc!Km@A9;x;5m?|3Kc()XW$SS^-Z2s1Fwjv$uu1K=dYi) z1ts#*G-N`f%Zg#ax8Kwpq)N#tsiqY+M_OAS-9GR1nNr=1FR!c&D$CWb1U~6JR#xC# z03zmT1(?kVkMN8`v!TMI`ed#%*D4)GDM=wilB1MmzyXumflpE|65P5849N`OoPUp} z<#K#3DS55&=3oyOA;;=Nnj+2JRNO2iZ>y*2;NvGkO$F=5_J)Rr%1R{rsz2S^0|1HO zPg;Vp(i#lO8$D>lc~w8neSP=QxxB2*WEN*DHR8ju91=ia_4xx_J5(Im?do)7cz(k8x5ZM`*t%wooB4^5KJGs}JTx~q z|KFC5`xC;^+SJrkU9D6&Cv^3IQ$iZ`kd~GWnW*zbT1M$1o2JuNNbIdF)c|NX;1 z#je)*qj09r*8ZiT5#joWSMwj9℘1fx;eV!59AN>i=ENe<#4|^}VenMfz1s@CgAd(g^wH_*&j@GnMtFO*^~C%C0Czx$zXR?XOy{=iYZyGk zeP$B|+MBf7C*4Wq-;ZV|1!_20~SL|3!e^<_b-K>4D zMPh;1eNO`5g}sj}`S4Q=@7t!muTV3YY7OB5O(zg{&+rzx8gy|`tTxj@{lt$)4@J)8`&$F-cj|eAGMKcdvpC8@7J{ zd+b#^DPP2ETXAtij@dKTN#kQoBwvjS&NNr@hf5SQCiGv zqqDXFgP!TV*OQjlQ5U-1I})Ep&Jr`fa?sg#Xq;44N^Vicuv7flji`aFRTTgB%(Ow6 zrCSX1BJt4Bt^|Ip6y6>3*KZf zs-c^;dL(O_qC~#%bTBqDsXB#Zc15bQ05Wo;2_0*^Q??pJbf4fZ_mZ_W1xm7xIGhXu zGYL-#kAmkV;~Qxn&8laS$FDT?d=R-zI03bGIHZxmXVFV4sB&~BbQH?k&beSg7z`-c zTg`m|J!0syn-?++%s*N9FeF(>u*6_BhM#2l?8b!t8f24$n@NeCHrX4<3l1kHWb+=yT%MQd_jH48>(L1Q>G-7{oljTo_^QX*&T;dL>gNi|fcL?YoX=q+VY zsw=5H6kz)T8DRQ|1IX)6dJ;+AF|&ofL`lu+@=RD*B8D>tkuV~v`)1nU_1K9%3Jj{J zc8qx^PF;-{@-11F!2u_8**|d5Iezq7>~JL=$?NTtn6xvkgJ*rFYnP;O%cwUI1x0?V zL?nQyX**}Pn2g)A_|RVu1DQ2l&0{wcM(opP>etYCKo85rO!soB4<8`Z2R3ZjzS2<7 z1Au6>Dd+kpr@r{;y$?V6BByf;wlI^)Xw>UrTifc6K3@wvAI;MA{NjcPhNksIpRYl$ zR)c+sL9f+nbwno&H*`9<1)D3}XOPwT{33M;g}UQQIc(S-H-k4SSiv#h7Em(5QcZe% z-yuUptQX7Wd_s9EJBPeF_&~@_%^a;lN=jRs(A&T;0)w`%lagONk=MuK!7OWJCGov! zROmAI6$}-RiHT`p6c;fJFj6PBQW}>_GA1UVLItMT!qN18A>6}WU-V8{gmM##NA#f; zHfD^Yt`#0?kQXNRCeI-8M0(uI_IuxBd)I5vK9s6Ef|47oywIr)=pgcPav zJB}ni(BWp3N5R(Rk_Ea7`R)Wlf7RlJ;5d{IsPCW}ynQ_BB0SU^GY6YF&~fKFp#7JY zRE4sc_42A!2J(=V`*qo+POPDnN$YdQhqlOxY4mZ2L7zRV;W?cnF~g`ZNsUh0w&X;% z=Xm14y&i-SG3mwK?JEV1Q|ZMNLh7Q;=aeZ(An<1MEi^7j-6)H((qPR>3mVk@&c-0fYUpCqm~aHb4}w}4II6N z;SfH)1rwkXR~3vl(*>jHgIQB57+_&yHl$$V_P|l57^@r_B*tpSy^DYDk$@e8JJ3iH zIk|09flW*n;S0S9Pt!)ryn8@P`U24=uwldY6=or32n^j-H(qclUnUx*PA^_xB)$&2 z-4>0gCGpbJb4tsZ(6ueYVE}T@=`KS@8f9&f&lIddmuY7j0vk4L*dG76_FaQrA(R~K z){&eA6>oi|D03akA*gGlgJY3BgrbMKb7Cp4kp{)QS-zeTHnmA4N-;7OQA?BUk!Ylu z)#94Ou@Te(3-YtZ#@EoSyFnmsFPP|;q5Vju>4Y^&qeD=|8;x2Rn{+KKb77=!F>#L6 z?vj@B=w(1u* z;#A8du7Hs>z2+M+Vw1Ss+&UODL=+>7o0d6zK4#3h5{?3l>+|a!6X=49CRWO(p~J%2 zq)*L?WNXxb*kP;0iFP_F8nVU_A8@QS8Pd5eogwSyJ1zHDip4@HE2s&#RQ#qaK!t;w13 zPaCmLT_lDA08mzQ8>l@cqa|~@i+8YL!*;ik&prurQ{x?y=+LE7YIIt39{}9B_PNrm z8`lndl}z-e=go=u?GbPM=qLaAJ<_Jor*g4s$M*P}Kx&v;RZgv8z8%JwXdffPi$;4k> z%ud@NCNY6zcp?M}M8c%wi`h+dw4sw%rS#@3KrN=}$?J8$qjeEQ7P%yf9nGVY^IXro!{;+KWfR8tG8S_m=kB z6mHN&(*DxHPvYiydJ9l1#x~`Y$>ke`vr|G1e{R+xa%!Bf2QqO={bc?ae`8BjRXkX* zgz}HFX4K7gkA0f9!jsA;J4QmXS4QaS`PKQTu(=Ij-sl>#^B!+rlSnm4ml8KKS$;-; z*^E-VG9TZ|S{j>-Xc7X-dR!faV+N}ADX+9Gpc91#);m=(R~hWMkltnF&aVfrbgIF1Erp?UdXH$@tHWEWujk3RDIDZR{%;-0= zXBGrTO8aDPzj&1^tSua?7?$eg8!j%L8DnbUIwiMstY}oS#Zsu?KxAnqAs$99kBjPw z9N?^TCG8Ev(S`7?tnNta`XXX#nkuX*>$k5*U;U7e#*)oJyU8dkpPwhH70|2OOZz_d z?DenQfFl*{*koiYTZ5+Pbd&W{jXl)%s^PRgl-R9-p_`ElD`;?pids%#r^E7@(!&8| zbw*!&3wN0(>FOMd&t#~9sxi9#R_4kKL!p8-gcva}+DBtL+0^+3>(Wi2k)`LfUCP{A zq$ql72QF2@G%M39#~bK+NyljJG`jS#J(vj4!Pu~2+co0rH6UBc&TH5C;srU|4dGymBSGX@0nOmJK@+ z4Rx}!Z?q@U&MvKa!2(Qep-<+bn>RuEidM0Y!E^m$VbM*It4^PpqN~Os-1(xkXgoB@pSI|Ab27(w=aK2E@4wbLi-N5 z4)mdbPZt7dRrp9B@>b^7jzo+i z*Lu}J&Y~FzMOB5fi$K?rI^464GPFH=y#0rnA2LO?0J9EmnwKiap=vjpO@oDl^;BZN zkrA6VwZddKrq7WcfVX+6aGn7*pNyLoJ$NB{;9akwA+`=E)*@1tQNgh30nzQB28~{e z8u}uj*S!}N9l4H5vo?FIjtxw*ruNwe3NbToF|RZZr>{zAeNzQBEHqb3s8V7GWm#{U ztQ-4AL!HP33%Z+fqX}2cBHMF&9=q2P%GU$z(qlMNVxQNtqRGPR&==Zx69( zZ6gV@GU?n#eccw4t1tnw&Ge{c7MERIvAVj+$m?A!N}6ZLq$ADqqY`y{QIB&0g^d=Y z-!`I{EbPT?)ee@HgX`C!o`nge&dlfMY!QPJ@{0@O;_yU9n@GK|lG(zNSTuDJ?O%k9 zT#gwz>fYwtDpm+7k;$`Y6^mAqmECo#hRY|^KWAkjH;<_nQcBzD#B4aQ2!z$SlheR3 zlr>a4gVN65SV~J+K?|#h6|7`)Fi@FgWu$61O;wI&kHD&;o@gD{?g$#7`1RCrfG{tmXu6bRXW)t6ZfZ& zb`Yb@?SepMqwh=aIp8{qX7O~wi1dNHd320SKq(C$E9)8!FWwTE&BH}~QN1#gPCM2< z_OVaj!HDS@Aw)-^;>M$*g z)U>dxwWx8cG&%$MKoYMzJSw0P-TJ^v*_CUxA^=2rY1xH!=*zsd;w!iM#InB1822R9 zEt?D|9-wMTarn<)z3}UQdE#PHJ8WznVL$)=RQr9@e>BOp+W?^H_cQ@G&PUG|p;*v? zM6XBg*!J1;VlRuugq{T2*)o}odKBQ1uBWhNepeG2MA_>N#Lr>wF^iG7B;>7mj}Z@7 z-I+3?FNJ?$OtA2geV0#4=ndxH897sGp^40N@k4|rvG8<2Y5_8+`rtiRX`%>C`@%dB za45}{Jy5bOY&GD?Ewugq-zG3UOsQ#X%@`aON9RZda`Qgzy^lvxwUg3CytLKQy@h7L z31OmR&~mb8hS7YaWhke=WQh<{P~l81=QY#0grYSFsF;p!Q*p3NxEFiCq8bd23%*vvsiNqQ7CBah7P~nONsrHij z6_v6geW;BXHteW&(o{_e{Y6Z&32Ga1hsvj6bv1Pr4CGS?Kj~I@`pgQ8S`;-++(7`? zT(>G%q=}d%5d)p*M#E3b9UY|V%!1|6G$iBzlM<0PGl9e@IXO!hQ8Mbq*;6$vV3F51 zPSh+CMQSok6bv2&(X3^23*cZ082U3ud(e_2AlO{aPhCSfzeBaNDk|pZ(SCLY96PCr z>$tuiTe`Bkwr-oXAVUQztFIU?A4ivpSbuL=>7U3bAuc(o=M>8JqLCI@hO&+DvSo^d z@Z|G~b0&tgvcB~30SYl?PIwca#?k6go6xad)H;+6B_nmjaw92kHQaZsq+<9)*obxX z@Ja8^&jW{xh{WBl2H%B|2_>9&*7fhsps>*2z9(DI*KcGKgZ9-5%KR8BVx*fM)1-f& zMt;Lt!P(q@E)$*&h4e;Kx04MwiJL7f zubp^NwD1$E{ynYcj#Ci<9!Z0F_>Pi>WXjH|ZkH33E<4`v&pmsc+g`iJ-(lZfR|N+V zJu~ukzHx^ebHBI!D&sHJDRWpHWnsnBCd2B&RCOD=az7&T1%?vFuuNuw zql3Xvgbd9xnE)6A48T$ik56{3s@Hi&c%nVY`!<2axX#m$t{FnYA6L~*%ys}pO-T7THR8%I6zY5)sL3h zSQKgH13{xm-OUzurOlfGUr?MmGN=LCxoP*v@vN4u${{u}RlMD$t@lq}iX5#RVHf9* zUQ3@@g1aonmW+1m{DsC5W_0>U#sIueSQb0_U6Yo}N2zt$J#WR#GG&~as9vvDR&U$X zSZ$qR8dB5{Td zT3+51@rbEzx^2igX1;P{D=Bw4uS2K<+R?OL*IH^$)qH620^IgcW@SeGYjmB|}?jrGx1eBIr{Q)Ze*5%(a`z3~F2RdLoB}9Qx9Q zm}#Z~Xf{`p(r2?;=_3Hwn zEde#Pd17^4%U;QDT|(dd+%qji3eC)kQL5}4zxoD6rC-jkS`omMm{6@2brmIh`$wcw z$=Z$nqYn*zBrP^PEIi1^JE>b)MN3<~6TDFFIuYEI*#BLpHVuXU46FQ}y z*SWaCAYRr0*nVS7;9p7~J?Mf-nz$UZnKIxNsXIk#>T2;2Qb zT#AWKeu3ey@IN>l+^t(m2nWs&)F)2R6w$ zWv+kx_4UwNc#)dCf1a`kBlynWA%m)h7S{hYF?11gyuyyW1n+>zG_-gh?I&&sCRX9Z zR9i@BP*`YaP``Gw{aFS)zjJLowR`K81?XJ^o3Hc*F3CQ;|47;h~J4hVp1ZxG%( ziMYN4GZ-!1GqNR)25RC3*296Rnq!%_HakA~&maBxcW=J--bb%J|H=#R1!a$G*96)b znqpN3;Qg4Z)Gg4Ji$V)WVw|J@|JnNs@J6mRT^K#jz5l)cJ?H#$X7-sgd-iMyGjp=T z%pK}Z(%eZiGc%d(HZwCbGfI{$S+d2FC0n)(0$a>fcYUj5w;O`HJ4t8j?P|Gd)q-#F zyS`dr6==OOvr8~x<|w^WCPJbn6h;E|iO8lz;}uFIr?=j{vBEy7GO$!m#G+=sUXjAY zQJC2icElKwHMPsjhtN$!leTd?VJ3_hm)y1_VML~J4BxcKa?sFX%0d-6Ze7-nE4s%i z<&K7y2``li!b|uG9k6te(CC_Ld1neo_y$ZMaS^sptA|GPM!0p4v&A6=+`#4uu@U=m zjeuUKS;U;0My^44$0$`6kC~|)Gni;O$2e2cX;jy(Lk*&ULP>Gk=-`Cj=&=c@lMoQ$;E1Q_Gtd~Qg%cc&m#|nx z+-U`PV;||2UMk?mG>neGP+-1Jx}Bm>1%Q z=~^rJX9`5rVMUEdYjJqYV`Cu&C_1BUv>7$bly`C4g|UrtIf{a9wxUT8RLF~|mGVGt zUsx`+vQmKKLD;Cwk)Q(prE&>wAUsOh4F8IBBvmF31!HV*%#KG^?kS19Yfy`sAYq+T zQaF0TVde;?6_{0OM-@~UUAZR2V@ZYF(6Vvf*u=mjB&cV4wxW_3P|Q#2#cFv3^(>9A z)<8RN8)1w~kf%;VOPBCM0WYdXacygFR4Zwil0u8?(iS!fE|!TZA*zdXM{whw5Kr{; zef!K4P6w||6kH|<&J)s6+PbuT11fN1Hg>f0FBWhkT4s<<%baG2IScVJYKj{K0R{ZD zj%mz{>?4CyV;U%o7A@Gp*@MHuKOUWd&sV7+-%-dWTD>T!kekw@oWUk8lPaa07f>VX zR>HGRIG$L-39A|zfZ17#n`wuPJBgQNAUC?AW?@i1FS$)I4e4(a4NQ&ub``?3&897D zlS@&P?Xd}ZWz;DozI%LNG&Y}`NX46Mx?!J6$@0&7ujegC7fIIjy|4=_>=lZALqfpLt}u@U1p||4$jnE9BEe9w zz8M7`fE&zU$crUHQG*v#{T;c{gAk(2?Ib^lW6nUzIa{^<>vT4HhH^F6{N9Ji9m z_-amiGEeusZl@Ipy{2Hv`OIS6AlvN7H;@2}FxGpikK7Ix{3cV*7YRRp0H~;;lyXaQ zq7ScLvtiHvG*E1q#`+n(BHUPN`1OsjcPrsibVcm_BDHgTZltqGh^w)@JNe|gRqHmT z&}InzRNcQqp>|LAq?`!e^VvP0=8{`3Xln!4zWMd% zJGXwe^n(;GGP!xo;l}_aJsOvhtqs|5cyOaAJ9FlEL?bANoOY+Y>>$j5=Tt3G~y$%cK~KU(`)DbV;|Bymxz*3Qzi6xPA~o5supr73g$%FjPpf4D~G8JZ-val!y-~Fu(nZv8auYE?}g==4f@QVVQ z|5`k6%lG$6M+;2+I#`sGC~>~WBC>FGqFo1jkO1WM1vkw%Y;Q}{c@ z#=Ly~4GR9dC0HaV3Wl@>-hO{_+)Ut*t&KHV8=?o%oo6^^#j;PoINSlo{Df1PXF6e| z`aM&}Q6Goic^eMxE)n1lC_f8iPidcQ$WQCek9jy5G=#)#L&T0t*~940Ivv0KrCM@y zgX{T3^`67sKBA&(4f$qcf(Qrx)AIhOgJf6Q=0iJ*_(%>I7wWo~T*|5)19RWl;0k!% zKzoSG6{#(+wK z;H0z`M5p!>gmK!8Pi|AQat=IOO%S~8TLMzs(a3Ucw0X;h;BkVmaO-lK>QndcsuY7) zoY26t2Qq+AT8DP6J3at)>$i|F^YD7G3S=n!d{H|M66fYkG{IGz;3maHY)*!nN!@o( za5EYof&ebs7n?7XGY#mDTfKdIGz@Q05k$WpJNLq)n~sO95g^{`g*rc-yLn$|$nieZ zu2H^BDJg`hx~8ht_oTpwpkJcNN36Y#r5li&=wmnS8a4EfIfq3pOaHR;Ov4m?MAa@M z##yOPtUeq^H#KFRd*IFw_Qah3;E6{zhcY@_V;@;lFl4kRp8oQMHxE{g5tM=*&mOLh zKl|nXbLX?iQ*yq1;y>@)Q`jvYKfn97%{9abEA7qqpZ;`D(C(G5-tm4mRjE9&YTHvE z9XuKt_vwp&d?{HhpONqT{FA5N-F!4H`klZ1`=)P;PO8+rxyTb{Lh zJaA%>(|18wC`6YV46i7cFmm>Zg7`IQ|9k2kXvutUVfhK^`Bm0Y2Tu9}MM{lW5r#9@a+4l2*o7QxNaA@M{8_&4eoN!jk{`(_imh zRVKtAfqY2~($K>1j-jG%&)t1IF*gYA2&;}+wCr>zgo#oN{mLu0Z7CT+iE1`O7hZMr zL~ch_%92pbHV9+y!E?Cz!(1h(A~Gcx$OiEu_Pxg zA-Jw7W7}i*zWQamOp|r$tN;El|2w!5G`5o7;;;k;_@(ao^1WyOc*i53T%w>Sj}!WC zZR5Vp1zaQt$foUjFD$Kg!b2##Lj%k5V^;m^|NPhOF;!UGYah@FD1Bax9E_HuGRWs<5oN8Wmz$=wN&ymNTs-0U4fo2+O4~7RGgmF7zQ?W$U$P-u03OV`N9x;~_hlUqUj6U?@*hz>Wu-}`As!O1nxZ~B#7~X_m0;JkoVB~Nb}wZiXzv4N$T=8zm*S79{vDg)3Gw| zK60$`=%#vD3Pso$r*=dXWb8cHgA$$kSx9U)O6Qs8gD2vrkoWUl%}s^Nt>MwHLe96!1NYwb>e(?g?5v1d_19$w;s%Cx zJhUgeQxz>=d82QxiN!R|X!fCZ@P2aQi!%YUFZVqzb?S~(?1`vILKcnR*kAGb0 z@iZ+7Yw4GFB)?D~H8y6Z1Z09Ti5hZW87x{w;*lfU zbI@2~`0O3GeUi>qj@Mpz<*%#zu^!n-O684Nyt=Bwk8=LV4v4X6Hcsv7YSRaIid@v{Xi-e5!Y-n&9kSASj2y&u14 zK#%mRLDE#8ed^C|UKH90dc^&!lkt%)s?v;J8~@8^yQ2H?|=RC{rBD;(u6nE z_(iI=+wHAq=(1V*+?#g|YO`6klKzIb{_Be^B~y8Wsx&rHSr>Wt$9oRd3bwDjYL)O2!WMx!5pU9{3_H4iXvwUYx?(s+O_`m<>AMW_qKmYm8U}0{4;F~Kx zKi1_bVO!6gy6c@tK?&ECJ$Q|fH|WY^>9Yp4jl;IETb;FEp-lb9;J#Wt3A)VhQsRCO zkmY|&AW*)dAW^)0A!BVTHX-G?;-f4AGG9<^&nr+DX^uhNdpVI%dXW}PMB1QCix^q50{BXOH4dfhbWACJU64 z_0ps4xfh*&5CZ8KZPe7&3efxJ*3=29-FGST- zYAJnbCl6Keq_WPyQ+eKDQm8ue)1ffJ2{gT663u2?}hns;q3#w(%a6&K?oS`nR*H=KFo>1Xf1?SH)T z=-HZgS&Ec(V;3gq7D)bG8%+&6r+Uo0r6vmmqd-DhONs zz~hhJ^?x4Q9NdVg$WY8(5p)|tD5Fj+{lEVDz)Md*e(!@1y>_MvGUcC2o!_la9LD!xa)(@r6GS{E~`AHfYMOK{8D91Y(<8nCIQIQ-E zgI82>JZ66Jxl>eB+F&w?Yic-o*Yn3~$sNr`V)muhEY`KdEtK8L-CIh;ST{`Q>(6}i z$p8Ao!+Y~H_U>Et zAGzz_ANwSr0eJ9@)0UC3o^1&ZI)}&A+U}rN_LSj8WOy$zY4K+--+$*LPwgqp3A%_! z*Vx!G+Z+548Zxm`&xSWhCvul1_6^N2OSbOoM2SxQEHplwkE*$~Hu~j_buiWM7xyq{!s}HR#J#gUD|2W!{GpIfmc=CZgt>sfhPUgu!@6LM7iU5W1jVNs-z4~uQ1jDoycWJDTV2gtwczwpD4p9*rusGA>O6aL)myPDfI zF2XuNIsD=3(1bNCP-77Tv5%(+RFjRhmp-k)tX-V=M9h$CvOQ)0@hJG#j(GgxFE&?- zriUs*_l5v%M;Jcz?a`(wtDM^y_Vvknu5et{b|I$t($2FiVC0~sR%f4h|EXQomc*kM;j@CZ zYtOEnDVtT;o^m{9oEX3G?dJ1rnBg-&#wPo8Y4&|flT2jC+m`UzzOWwTi#Y$=Phx=% z5k$xF6%obVl$?*(7m||~_(5+SPOH-(K{$UGet3}yctlUyY28y-Ml*_7v{BVWHsNe4~HFToTwwR zRqx+XhBwWHfN||}kDcH9M!_$(V)9y$tbL@gIC=%i+WD~$M)L{dP+5M!E<9iGjbu-gKE*8O*nX46PKO1BlWD~@l*>SWIS}6}f+wj1pA(LiG(uH@JzzvYyT(@`c ziXNDr<ugkW50!2JNDS4l1=l3-?10Wj|HwL zE-Oti$-(>20bd8t?98E&i@Ds;Qu&na2Gz+Q1FvzgO+ICI3M7+MIGBj=SX9ZivT?IZ zAs7uW6@(PYJVQ=+;_y;Lq>wfQ5DrMM>1|V~{v^@?oZ zJj6);!QjBoNo(=yx8GX6_Vkty-(LI45jsK84}KBVWJGMARTH}9AZ*!fZCbrDe%xx| zHpFf`+=UF1w(NcRldslp-*vW(j~;y=7G2{NYgRqGbj#j-tCzg;T5>iT0T5<>;i{+C zoDST+Y4wWLpJXvd36E~@^Dm$Oa_zQ@kz3xre?xSGa)Pqq^A|tcc=F&^uP;4tyayV~f1h^Du5^M_HR0&mqGC{v(6u=Mzz2LulVt=fA!VUwcB=XSo8IP)43AVm!=+C`u3VH zHm&;X=wS+0y2B(IYvH=(**u`0UUgsMnJ>Otv1!-Q)g_Zq`+lwDAz8a1KmEe861?3H zJLth6#)OnwaylKV1$u30S-b9)Pu83`uzdb!d{sPclgFZ+7snmyqMY9X268$2YHW3Kb`y@Bw(&Ybtr`|m};+Ie?( z+_DW#=q+>Y%8#G@aNVBm8$LX;egMx@`UQ#~$=b8|wp`xLyR11pXCX&+;K=EBmaTtl z`8R+6aR1J{k>W`rXV_jOHHN3|`1?D{mtAU4l@LV&Th5^TOibvhUZPSqe(XehaJ#ld zW(hBA*_b0K8Y6OATh?T;QU^6bS(lEtm`W8yMpf=-%fEVk-SJC9MCqhECAVz(C(B;` zvM{uRu`Y?3IYJZZkjC+*mJm7NqEDqJf1C!XKmy54xQv*cfZ8c|>^_=TBAqrC(-xJy~?Xp`+OFEXNNV?g>r-JDWC5}J(@0dP! zs(eQoUKOL9ObzP{@1Cjb7-Qp|1r;1YKy2Tta7vB{>bONFJs8-N!B#}3^u*UqAsbRE zyPTrPE$4(}vPV!0Y?n7Tj#l(YW7B$5n)OH=9&^07W1^lu7LnY3I7c|tJ``OyhMO}# zZ};OyfF#1ssU8+bJPW0oa2vU-icTnwP{!sYjWUDHIz1)sA?uh?+9*^3iMC0G%frrG z2<>1`@P?H}APh1|cSJ~NcxWVDbg|JGlg&fTK z03})@t{<60Vvti|dI}Q)!{giG3@fs@la*A#$V!Thjt&h7E*Zjn-i4>~P8DZFe0Uy4 z9xktWa*#QJHv%HJ3Q+mbo>Ds9O>-R&x{Q7ux3&joqBG1$oasG_BLVHqLcjth+2Lx)P?dkjM5qjnmS>aVWJ2 z6L|-N22qiQlt2|t-cpnpekn5MQg~oWe)|L@imI_XE+`}=7oSN5qhIvbJ;_2<1Zt#L z&#x~C3IWkwRo@ms13j~&It}}1UQ*9)g3`CKH zsGRU3KT+%|G(@wJD3%hXBd+YLWxJ7AuE3EYu>T%dJGY%(UNr@`i)IU=o9_?x3JYHR zxz8~dSH&p8t4?6`J7KA+rd(`?4$&@TgAE_vG^d$F`a-nSkqs5;86kzgVAIKQ! zf{o?P`8CWGnOa&!jjB=te{q{io0ymIIr+TY?o_4~hhpbZ#jyb`33ND5(>Nio&%@{E z`zBa=4LYMjG#*jGDipzhWTK67v6Wr<+yfHI#loP^yB(~=v=Ro zk)+WF6axrcFDTr+y&ByB?L%hB9X4N#YrUE`0UmX=Z9l#nBx~m-=EiMq!zxe0Wf;la zwXX*{kn7KG2Q!a}Ua;$QH`Y(14h!t*~eipxU4kJG5v zsqxt&*AvXB7&U)iRaz+f==TRE|KHFJS#AuxHnVCJG*x7J`~o?H>f@rO?0PAJSHJo0 z7lSlIudXX3GW>z$zi~hrS%+A=#FZm<-sH=X$unng@x?J`3hWE!S$t$-%HZ3wNfVJH zlW)lqxpL7f#JNQdWSA|mWg=RPw!oUfH6d?d>>>HtWxoU zuH8M!WgiV5Y?q?g5MIY@WlDb)a9Dy6iS`r;r7Yre}AH z61B^9we*!C)Nf+h5)_=-+Fjk3S|>Pku<>;JtgMf->U8^t*kL~MbXF0P*7xzL?k!nZ zlTX%Ct2`{8r9iE^$6V1quqmvktYLcoI39Cp4fSN_9HAYHNau_j!Ma{Nl2JX`f&;I}Z^}qkG|8+2j<|bTSaesgCp1WROcZ3QJ zusHpl*Y5bkf4%f+G;Ck8xNzPaTv`56nOIc*p#+h42$u_~50~%Ze4=^yY5^24ruBeof+KM z1kIdFF{2-pP9}wQ*H1gOQeMbKHY}L|Xe%ytCs4Ff^>k8XM|Ss|xShGVNQy*sNk_H@ z^j6@x;HYGis+yuYx%8msV>N0t0;nzQJ~ON}cMS$)OUbX`xIe|~ zL=~bn`F!}8PFPy1x*y)rmCw^6S>W@#$I?{M^~#Cf4Z%I(4N5q9)2^>=Vi%z(_YdY# z)mYV!niKSErQ~%6SEx}J4&K}5;wtF5n6(=O{Ed+V)JZeHkH7U|PZ!KkpGgkv-W)sB zG-5a5j$F$aM7>j(CQTErJB?|Z)3!Bj+qP}np0;hN zE*J0I7n744_piN_OYuViohPX;2C0l&&bQN#dB#jE+{Vx0pMFK*ex)&Rff2d70xwC> ztIvry+n&46s#iGy6j22^riHIHSoU-7!`=E_3ZjEU!%>ut>6)&=lX6rQ)ee~bc5cP* zX8K(k1{T!hMaS!_dD?!~Wm@R^%O)kyAt(+RBGjY?gqK#&)dzlAbs!mZb>&8PYSzRS!=0aB0R;-(1Ml<@0&Rb&dq|B+3~7{kWGQbwV_k#cSz-P$P|+YYxd*h4tr;! zm07j~*v;Ab(}yXk;Cp841{fopCR`qdo`_8#N4ZnVB6Fwv2 zV{66;1NLGHRw#2ObE1w8wPKsiI8;j>D8{91u}Ab zJ-A*t?v_}%oP8@l#emy5?QX3UYT=#U8>x;XBS1>>{IS7>_a{{4pd6r(_^9x|0jbGe z)N^15r`2C#aX|KOG;?<`{hC>0f;`CrLT99;)I6Ku&k<6K>|72Q@w^E1%ep_Tcg6L6 zdR5iwyhp;afBE>Kdw2oemAMU6)bzaVP1JOMZ79aziCH_J5^HvQ+{=mC`9%F;?#>nc z9rN*%m-FR_ZAjYR-#2PuuylpyJiUE2{ChlLXeCw51XnR%-ytKv+d$0NMdyhC!5%Nb zOS0)+AHzVef-Q3nM0-9|Az^iS>+LR3S(u&8gDOga72rCH&v|)fzC=DIMaE`Z1P##< z#yu%MgED)v-wGshGwB42ErGe`o*AINcm#=(Tvb%a3S$d-tZ8M$)Qs}LIv}NLEez9z z)$p{%@+PjPCg27!qt>!>^Sitk=#oCL0+&6O83xm?rmZ#@ZK??YYBx-84S&|$QJiQW z2`j;r)X^|cNh~Q)^+quK_i=v5iYP<4yV_~M08Ul0@Di0AWp99XhTMo072F1sZzxh)p%+^~_Z|5m)GA0DiW;unky3_;WYI4FE_Q0sPLhxG_GNQLlG1 z`Ns)&M|g3(FmW_C-U>L&`Q!Gou*Bc3mH_mN!!Flvdm99lf2J80czIO_FD2K}6E&f- z!uT_9zSiv>lqb3i`b_m3tgR=;-woA4^Q2;A#wY@q7f?NQSI35+wd}$DeIXQQzLX_b zj(hzNuv#_4@O(C$@PSWyY!(lP9Wi{VEmcpoc<<7)n>4wFJWRIe7;Cat=m-qcd(>u@J(BWB-&G|Z73o}f|yUzJJtHmt*X2t(VH=S-aC5#4<^48W^!`#}Z z3OD5BlNJ_`5uJqGfhSOjF3sjAP>ql+_=DZJ&=p74cSk5esLHS0+yBkrG_Inv_Pv$* zZj0<=mItxw{3JXbUR=&uC=mdGYtX{RW^AP^dKZJri6PtmH}V9i6_B7jdVq`K;)$zc z&cAj7GX)*yNKckJ@+<7q-d!vp5m-D#K>E5xdCMkV%Uq^npthdp$f2HlQWWdoM)C!N+voHAu5US)yEpZb# zyqt`^rl~VCFJ*LF7p0JG0L=grEON8zb7|rlPj&FP>Vy++;^dn;a<=r|{B&wmEqByP zDXXl87HwACkfO6AbNwr<#pt2Fp>v}eCgI|idX_q*q<$P1%hgHd{6&))EJ(jPr7ZVf zLs2@pkzGE-2LzQY@v;CzZOSTlG&p-=E|&zp(yOECsC_?R zkCKecg4-o-fy-8)e!|RU0?0f5DO^?{`Vm~Uqew@VKj(hv4)$hsde}8}cVj<`>OTv4 zGhp$pSi`{_6;$QtYwgP2GeudRj0(|-&CuuPmZg}r!7$7pyGP@9!)R&4^i{v^s&?QO zm6R4GhE3Tixm@QMhRmoiV*8CGDsroetBcD!BUo*oHAFenEhH+=DBN`2c#WTb;^$8c zsQl!>7pHXhrP-kwi$u3u+DBD8fWP={%cPX30KBfhJ{S~q4e_(-hdlqq$Mj`8%AM?` z#*~XBvhQDVmREOoB=4fvckCbh6I7Mjz9iBJ?%OObJS@164W)UV?ZzY-Pv?G_o{l(LfVr355WH`z7xPN(D%bB( zOOt8+=db)q984K6n!rFj`vi~I+q?CO3py@;WUKmLIqVy!5rm%6Xak_=+ru~a)o5M> z-n}jNH8)spPoG1+vr*SRTWg)K2C*(^I&s~35l#-w`Z@>T?Z2VB$?(uTg*95w?CT(3 zAxL=whQ10iCWe24 z7x=ieEV|)J93{{m=+;eKw%Pw~(tobo4UNk-IKHj?pAoERrTYAZ96z#jJY@_2*NJil z*Q{me;xgkYP@v>~krO|h|Nnjb9DTsVwm*%Ij?xdo8edve3EGl^0klXH2vDG2|DPrQ zJAZ`tmmlBk=4MsqkHc(6ggrN{$Yu~2IwJoLGA^v%G-&|*FOdAtr2oFMIln7Vqo>4W zWwCM?HdZkhTtY&`q-W3~0?B`U!(jX$)Bn%OF93Yg(ZRvNjT`sN-nCE9(f>yB|N0)` zjSk{A`l#IezoY%%B|Zf|58GSi`YkTSV*2U<2_wz@U^>QU`Rf0_E(DJk3%b(VOQM9) zy=HGqRl5bu^1C`V7D83*whM`-Q;2oj@)l}i-Y{YNy!Wi!?Ni0TUD>=7Otq)e+~HdV z>7WHsej{oXp> zch=nb~o!&c~0K)v-AuCc1Ct z50^7=z_2cCdmwaD28{o5I+=7VpSciBtUO+r4(!*d#|3tmSnfEp+k+XnY2k)mJP({Z z=MulQ33yz{WDT8u^vOZ6LG&`)!a7IE5MyAJj_ljHbJ3;@y@B-SkG59lF!N&I#;k+6 z?@!=_EafqCQq#8PfEN~Cqd`ltaq%+P#jG1QwRbZ{bYtnTQgTJq&s?T6vQtO@X76H& z5R8!65nx!$(nuHxq@hNeI=@Yog1e6yO}hR!5{fiGPva41qsME6f8nE=6`g73hH{Pa9#KuH7m%$Ha4r?;9L$0KHx zMw!xS6e%%MnlWySa)AQnF^o~e&4SPn4_l;2ltS6E8Ja?P;Dk+PgAPILJ7&Up-?@v1 zEnocW&+FJjw{cgw8NrEAVMWMP=xxrookFoe0rG(Fm|u6FXRVuQ-6dDzhqiS(hqc7) zj>8|M*s!{JQTlMv7EL$Pf=wPvWv#cDfcRZk8^RjsJv zO<$oLxU^icSkd`-7kp~n@>daxQBdcRlaPmSlriuaZx;#Gl$9=SUleYB4ry`1eotQR zr3PMEV1P_^>M*i@dk+twjXs)L50s3YzBUDpBI)a}I@^gf(Xs{kQxgIX6#xEr$wDWj zOK>;@`(kP?ye+KRH`l*(PAicZ8FD^}#JSr~)w!4qaOzkcwLiBWUUHn(Xq7k zA5vg+oOs&#NX$N7ok%Q&0`#CrX3ujTpfT&_4Y?XN6@Z?qQ24gcU_Kd6!bBdV80uJI zFoh7NK4b7Glvq(X@K>~W@XuDK0xy|+K*$%Gtf-GaWQWVdgzVSu)A}_`b?rZzKjQyh zjb4+#?^D+Cyk5H3zwgHmJLW~LdtYY%ZXIJu=qYJ&z4R>TyXMx`A%p^RVw0;WO^=B( zMG6a|fn&lAtp3hF8f4Z`i1XgdARR>wLH-2cw+|C7g8#I@dbXw5$u~9IZq&XGDN&8_ zV^`}x4G0JF5aI*Uh#VaOgv-*RqDuA+hAW0x8F$(&R7x2(zRr&y3eD#M0eSEZAQ|P` z0-PAg1pOigtbF^!oF(7v0?hHMbiXVFbZy-q<_qbK^co6Y3~Y}@V@JDS4~r$Y)DXW^ z>cG-g?SaieO=hc%eM9>Y@PN0Mi|x03Qqglnc?+1sqyW)t}9_UmE)D)DhL!}?N2YbKCqMj zgPCNa0-eUL;CfM2N#F!h4m(O-KgdVm=fFPzVJbIgIECuSb&=;_3hwl|j!=9ebx;=Ve_ja=`Zo*{5mlqOhmPT<^{ITZKiBvG287=3CLmm7O`FPhTaffz z!c5*Z_z)CRi4m6D^s4l*UuI}c={kS)B;^KW(+>jlJ>tz+!CA|4{n z`{gZ5(NtzLfeUmfK#$DV<4XY=6Z*vSnY$}2OiE7f~R_iqBs8bm5dJRaBR+YVTW9(3RRNuR3NLkL0NZ^rULQZhC(sf_Eat;{1i&4zhkk(FjayYz?D#jrndYZVa%7q$6~kxaRK((UG-6(ym5N z`J?EX0#Q6^lVQMBuZ5sOSsY0u4?A_Z*mV3h??JjdRzPKm{u>qgE|o7`ev4mj7?A0| z)dF%Nj6$3$I-O9G47q=11iTYrb2ylp$*8`?Es*7J^y@tV*&cO3Y1T8EB$!e1yi}gc ziPxLS`XBctF?GWy7q>p6WC;_}v=M*P-;m!baf`Y|%!R zq8QJ|;mkY)#&d#+>&3~!ljCPamA8f2M>uL|E0Kg&d8-89kyz0zHD$ycvA{`Yns=Oi{O4!J zsU)v6i7{NzIrh|DWn8M~0gj2$Hf7PF)LP)N2r5&l-E>imE8{{L!EGZr4HG{%PYs8s z<9Fde`E4inK3#8*>y_5>;2J%c4B6mWQk%X;ilY((HB!HJ=%5uSr!ZHRupoD!wJ-n` zXWv{Awy8u*YlA+*N(Ix4DgVnbD2eDX%{xd7n+)EI?-va{#oH7R?axRY`CkAMi3M-P zAg1B*a8;7n!msma*m&+RaV|JiVMX-Q;w8mcgE-b>=PVcck-IY{ff(nIY*ZNLQ;FJarqB?cnmSr&98u+G>x8Q;ne?S%s zc}R}bWt4?K@x28m^~zDb?KN3-Mo)7Dh6CetoiBQuVKb(UlKUGBBLx&?86Bf>pagCo zom7XaHd`}-3yN`ZuFgVg*g~I4MY1-V&*j`eZrEa=Ez+9pw+*!4J@rqS9a!}fp6AG3 zwCm27ZKzCP1?dSk91BP~mTjU=CS~67+qzMhJcptXtS3CbKd-4` zh#T{2wLnO2-+Mk?W^P?R4tw{58S+L~@wNz=kYt#P?$)P{p%~)VW+%3gWe;zaP1+)L zh;I?#uJz&F&cX=c1X#c)BKAZar&=4)*w zwM@W7DIhdk&PHXgOGo*u>!^8NAI9{ZOj}m9*(@P0TkVnoDM{F|OBARsPZZQgc^}Gj zonLPw6&1mxrlKBegRMn#ijsydHfzmvA$f!sic52x@^!0m3zULk=gUj)KasKrI{z<8U z$>R_fK`xkGD{waqXCsL0gw*Akp<4_mOxh2f-5?k|6GqRu7ub_0a)!mWrp@q1O9j!} ziYh|vD59KcBL#f$mx@ENm07`@NM@SS1@w>so7{_rkcA8qUi3DxRoIZcvz;yRx{6~j zEWrR~kWcCmj=4bv;v;yY7D9WIg&0=b8U16G+ZkckK-F-G_21yru1rL?N@xB`7OZ>! zpyrBtDb4BUl`r^vxE7UzHknNFewUsW12lK$jh2)fE1>l8JmNt6m{ncm5s3tC6 znfxm1J*^ZK0gGu@CQrKzd1@7SKco|G$+6-JX)sBuq=Y&4*T7iS!hnrfh+`FEvc3S!!Ics z2Nz#{4N(n)jTZuKYFGHwNJqDWi2dbouvMI?B$T$tSKR9hF-9vg#6ypu2a*vSAp-*I z19NU;`qR^SnPbPvPSL@`iVDV*K4dg3-oWBZ32V(XP)W3+lHf#b;ks*sP!x!$PLXx! zbuJ$xjD7l|Mty_7=wk2`nHeB2dWlTokBuUMyGTvJQXi~eKM&;;ila&B)fS@Fn+xj& z=SGuFkKtWzrf>sZX5*S~#&5HM?2Ty{n}yQXIarPyWbZ=^Xu}XK%f>IbwI*jS|Ab9l zh+7K9(K8P^SwURSn4^P_IA>oCw@Yn+BrNq&W|33w+VTDAw_ZLze!7Y*3P}!=Yv#lV z(3e(J5fkMs2ws|{rJXKDF{s!V1OXRh^V&&}Q$cmw4U3KbTv~t%aH&nkj3pU8#SWu7 zk*wk~8dAepc43Q7TjyjCO2r90%{_h^e4L>mGwx6baZYdZuaC}}+t@prOFgI_xEu{5 zs)br_Z_X^yVr^;7W?Iy7j__By==LN)*l+ynTO zS-lDEGk zDmK05Nlo-}`NfvA$v3s-ScnrIiJYK5xYnZDtNM#|8UHyO5I47$-ejS?ieLn5d3?l( z2rJ0UdF|sOC}A?XW^8)}Da(HuDJ_SWm6YwZ`w>U9%RQ?7J@=lY?!)ueUuK;{_v!Zj zG&p(lSi{v>;}(76aGuYCb0$($?5#R`78L>q4ocd%XAsGJw>JEl;{20gTR20YOD^ns zY&nJ}Jq*m&YQ8x9=Yn!RwoD@H-E}3U=kezEe7%mV%^8JR+?@LonSX;^A%li~O6`d1 z$@}u%UH@eODM)SPY8+&YW>hSM2dTatU2x=I>X^UHqbgI0gNKyIH7>b+_NN=OK znma&SGsFET!V{l&5v7`=?R#c$Gq$AL)sl}H)nZCZz5TVt3f{jrgST0GH2{BxC>f>e zyB8omLK~R9^?taO`==z!)k;?=byhGHleOz(7LEyjK1CN|hRRGLeB1f#Wv(F)pk!9y zO}tr!1-EtoqY{S~IyEe{QE|8^`UAGhWOqMtI;&k65?_0K`NYGHu|bN7*)uyREX0LX z*P#$i8iKA%wcNr~iG`KM1WE{<&6x{_-FZHdlB)!lx7ja!BLQ%*ZM@#+&hz!~tD z`SXMw{}Na2kHA~S<;Lw&yeuzg%4%P6am|(zvvlaha_8N2ha_uDIFtW|GgXAVV1bOx z_T$jjW}oRa3S9YSbK28J?PTUbRtFsVLxFur7sZPWujTW;O33;?4nq2g0hQsP%RL>+ zc)#;fMUMR^jI51VE3e(0kjYai)rZ35K_tH|Y4v|8%^vyXXmZXsXUX9iV>xK|T*53Q zyZU(1e;fHWxxV;jKK@N{KSj*mm>z1+D7JRnaaYW9ldX$Spye{GG%=C+Uf#*^eGHV~ z!Sn0N9tZ##Thjw)nF^r-<;VR?E@f}3j&dKU6BzNHzn0gcpKPylYsAo0acU-wQ)N!1 zg!|Hw7v1Ust{f!)bl`JjrAgQqDZx%+9-#npm3du$H17=uj-?e)=MzA`BiIXCkEO`e zlF*(D?YRaotb}o~9y>wGyh*S@1{YG|53YqodUIhm1y-~3kUTJu#V=1sFUIr)RAo+# z^2!9~(*SP=ezaVx_=EY*r-H~QMVlKMqZ~^uV~s8F zl35upjnP=#im4X`u1(dL$>(~}ON0nI9tJ8Wq;Kgmg5i``hR2UGl7q1WNRU@8(J_sL z8lqIT#5DYV6{qL_OY)Dn?H7L)5|1+y;mp$EO+}cVOMl#?$wYhA^3gay9cD*x%B~~Y z;k-tf8CiqG<<0jnLQ>RW&q&B32oTuoze9@7tNt340ih>^s*aOow|?A>$`P)mLxHp9 z&~a^5D9XWtj?nKnn=B0vw`PYAfB~IpjLk@^vO66yfD$IOGD*uEm%&Csq_q&yg~_Jo zr8o>8f+kSo62PwraFmkQx-h&f@b3Izaj!9}FSe)+v(7e#4Plnm;HMtZqbX<<-v1k| z#kSpWgtTvl&D^5F=I@A2XvqYdsIVpn$s{It?*_~OWMXnRpZ4h@XiHg?nt22S6i?LE zHqLYwz4PUPQtik>-b`eG09B|$5*>++y>qKzc}R|w!0eqiK(3n^Io*fKpXh8qu%SL$ zoS_^uc4mmphV4jckecRFoycjh(}=6CD=;=1v#AKZ7=`(1RiY9lf1u#?V`9AhJEW~si?klM^nWR z5s5zxSL5bltb(E_~e zTql{u5Tupb_=O#V4|)z?f-(=GdfY7=tqin)ZUicvX&v&$q}t&yHQ$o`Qp36pc|atB z{W4Zftkj&2paK*VbIywjYOVdE=7;_vvet zsYdMP+#;u;v6yWpr`(wRfVujlG`L*Z6SQ{~%xH44)P7OUfvf{9o3O)-7Ir_+% z-u{t0$renhpxB~4kNRShl5Dry$9p{vJ2%ZgcyCkJ1)(|Lu*4y_&LBeZL8SGk%s+l}shS)ju_>U=E5E|&1pv{h0gns?t3Og zct2E3&}Fzzb7|HGSgc&XNJ5wBQ~tzLEK0hL|*rdLYK+}ZmhJ>BV+ zi;msbkFRjcxZ-_vQ%4PDlu+vSUQLP8uO(w+kD9GdPP^ulyKrEflEr~D`x`q)3w%f4 znYib1j;!YEa+_tOnFvEu@M_$j^i@^wved8thWqXB_M_J0Rka0M8v~Fy<8}gk1ng+b&3VAg2l~H((^G5)DU8kpj_blN6CE&v zHKEB=NRsa2sL@%+rmP$XX^b!m5c{OvXB|)nhR=n}j|0iPdl?Kar!cCy;Pvzy_S zSw@6Ub7R3Ah*&5`H)gS84vej{ez_tIopjy^_k5FU4Vc5GxmAz&(}qg`W;91vf~LqS zMtGmvGN$^{T^Q_4+|h5YJ@v`x|Q-JGV2uVITkt-q%a>MY9>z|=|) zhhQYuggD{fXh(i!Y04%sJK3EuEV4=&fz|QvOQ(7`fNKCmMheXg_hwV4h>CBJ!i^OJ zyBQ*Bg$~AzCoS~`VFRu^!@IrmQfAG@q1Xf(2zZNf=)tmxuc|^05mKFJ-3lj5!(T>clUod7D%!DHq?}v* zum>RR#;5=mH-Kim=+7M#&IO)RUUp_mT3`mHR-wXxo5CWC9RC<6zE7<{FCO(5sPju=A61ov(J z_~R5fU^I}>xAefcZX?KyopG1bqR7vlJX1fvt&k=e!d0<)XM71WVR3QOR{Olv!}17$#-FB!533 zL8jp59}|@*s5|6K!3*K?6{cchVtl1H>AjV13?vz|E|NNNq8;dZxDdGVaRU0B>MlC=^*FBy)UevHS-P7={I9cv{vQ;3^R)d@@`R)UduD zBD{l_OJamrPE|?FvTtcPH|a1lUrWOJbI0v^_@=vPM3aX@bPR{VgBtBNQNFx!>N3H5d@M{2m@XeK03x3 z1-tcEgNoc)+d2GY*>MzX3t47yu4w8;wdHD4l}7olf+NVYFw@OoKv!Gd;lo+&K$D!& zB$~il>uZ(hwwRGXc>I`9y^F+yw>{He6cZ7V!6ZNHjN+pYqEod`@#$EMnvFK}8B1_r zwxyTl;ZV4wl+>i8lE9Y7W)pPMg1mrckM}DPt_kDDH!m-Sp+ZVeZ&8V?RqCr%``u9= zrdHFO?VpJWeL9xK7#kkc7S=la#bjEu`tK_7k^SPzi%(OV* za3xq{pl_cLg!cUt#ISx1!=O&fZFw=0lCg9rkt%ACf=-9ydfAuI9tC5Rx#lG+;&!zOF~l7LVND_p2uIZ3gJaMQEabeT+F2 z4Q*k5jRP_r3Np;#dyZArqa>P9iD|cIwzYi1uo5QtqSgpgRJ#RZ)UpCBmi=+=z(m+1 zfCe)Q{0YO~Q z_2nut5h%?4*}oz+St5X)^HuxJGxVUeUFISsnXJ+E1f7U7UGR|)gz@Pg$@(3$UJHz|kxg*d6+}+ODnrXIT-S zX^dG#WMa11uDusRS%{NE+og;oj-EZ>4XlLe>*1HmXIi=fg|pN?c1{~pbd9}QDYJHo zp)q4%^^F#t$|}~v_?!P}uJ9g;Q=vU~=r^j#tT~)PeUb;YaxX5cgz2PPdqd4KJ*7v_ z7?O+`4nw=1DsdA$=|D$$yr!#ijCthrRk>fSM%&cs71b4#wVVtFY~$Wm3sLZJlcD-? z2Q(SiG~(EFL{^jocwUMYgdv={cAzmWPcvt5c{**x|3k#Tcpl{+$7DpyA2GH7^JOI;mQW{ zfB|!bGLBxzVLQNdl%P7KOp4MENFFZHt;QBYF~uWVi7M@Mv~*ef{jl z`)%&jT(T>x@c?AG>R8LDE?AJTLq&~#ImEfNKKcki!5jt*Sa{A5p`tp9gS0trl}fN; zdSqUoTFRUvG^VsPzm=$4g+wu{Li_35SZHrXg@EU}h?iGlBhT7!s8t5GF}(F;03kbo z_fG;RLuqYO(&N<#^4O#b*&beId^H=T`m7H@EQf@)>sa^*F89{tZ~e#q2D;7Xp&(*C z|4@+-oFAkUpcB_Y=7m=t{pX9mmL%S2FOH?|VZH(v-U4fD_MVaqr znkY>&!P&#mD^+8=0k2}abG4G*P-8*hJz;rb$3IXK8_z5J0Q^+Z?r-`Ggic})S%1YR4Y>wEd zy@LZInjTxjv09@@P3MQEdlGJq0`mPj=i`pH`rE$2mMa~!*+MKzue%1uM@Lfov$rTt zSM-A55G=>|{dJK!zP zk2yD%gGn>x={8o0%s`s&poO4IxyRvhN0~0ou(OA=DNowuXQ|N>`*j}ohX4*HmhG2k zYt95s66A~V2p~_@-MJOM)uE_uu!6Y=XHt_xMqOc)g2Gzqu%Y?9<&V~XL@Bwc9=W~i z!Hl%ZPxQfo{lTRzzzOXlr6pIJsZ2~|MZ;comr;)7SsT(+Dx^_FnABsu&HCaNBa4NJ z6B)DoDtW{MREg^Ll6Y(0^#Q?mR;5=5s#Lt}6SoLYSBa73GNhtgsy$h2DYE_@c<_4hk;UI0ZqL1fGH(_o^*|5va3703!MH z6gb=rW6^BJjVN7*%vg#1JNO_6BWTRRVs++$B8Adiqm8`lB|VihDKg+$!=%-#DZ?Ht(!%(gi*zm>oe%HyJbJe3SGK$lDUwSjsa=t(9Zgki~Wy@#%`)mKwb<_7c=limI zrDx1G2Y+xOIS;bIE;`j7ai0TRR{yB1Yaf$LRUg@mi^wBIZ@xe4cGOuXZk)6HF;XKG zgOfl7S>RM`$M5}lk)3R5I1l4EFe|m*12N`UMkAOEhk?kibhB_MqLmZM+ijkf5wQVI zaJ8IM#Uyf^NoHC)f?7i4t1*ev0W@fZTinzvE(Osgor$rZHg?( zu)Injg9h2|I!PIHi`Z}mxKaatgybsyi#3F?Gnnr$**D%_Lz)hMe2F{$mN!913n zw;xg4$yIDAK*F?fUx;Q7O~0WPm7Y~}@nyS^dKOjkPE&DiW1U$7V|&6MwFHA4bIN#N z0zxZ6Yk^?UI&y1m25ae6Jv+1t4~Q|tGaAG_YltdqCVi4(^*bG%^Hy|w28ohD_^gcX z5;HqXvF&UaS}dpLdtf%{D!@Y&{pY!V8VyqIaorlYet_iHa_yFL5D^2i&;|=@8YcfI zN2L5*Km4WgiM0)CLIZ7}M{#VH77IhUz-N6Gb3{9tB0isVl?Y;-h&HmsX3}8s-g44n z@ao}wEbfQ;cPyd&*Znb65d)GZbTOqi?@G zd4 zXb1$8xnCbEW7qp=&ZYKY{Ne^?qq$Wv#Z}OM%!HZ%Jc>%(!3_r0t^e9NGMkA+El4`w z#N8dMfG1J!a+S{3~ExaNo=eA%J>gTgDc^#Fr;0dSIJLKAZiq~ zkz{r8wp?q?0<{cxQxmTuiYq1b&?S4b!fDyu%3K9E^gjQnYxTkPS{S=P+!CXsOdbR| zt+D1M3bp|Q;ley9L$#G63f%Ofu?7mGrm+jn`~h^xD(e9l(mkNY_cy8J4% zVr1g4KxtsESLof84n~*dpr4l&9#-a~5EB2Jgx>XFhg!`M3Zi0NnK5f|vRI#RaONO< zIc)H8XwppTaT(yc@xC~eIKTSh^Shj9db!gOp6g?gF^1QrOcHbpiN!=kU4k5%kYTNr zupVSXeegDfx9!_6M0YhqmNcF&o$a?9>h`i&ZeX6Lvt+Mo&Bp!WM9H64qh8C&wd1$^ zEuX_6bX}i4KTlP%-hP>W>yV8!+8B=S@s`>SCLUq0LWbTy&i zn~c@5_(AFlAM@MaUz0@7zFurP5P-v_C?)GPJ6gNvebR#o7i^+pm)gar)8%+v1rrr$ znB2U*pN=0iJ@eeG-plqh_8=&t{9-RMF86q~q~ra334pI=LxJ$)R~cvAcHe&;!EL>+ z_-xCKzn!%G{YJ#+Lo)xIv-vRn`6C;-mN9ZdPSki&pDqBkEGp$BIwFsMHoUvxO!s*! zlx7y5jkpaBTNb8VdmjLf>-KPJ_*j6uB=^$by8XK9mmtcTa#w1C)kmql0&F__ zjtStCW5n>(@qWq!&-Sq&DHBiBtKFp;r#StZ3IQ)Z!t7_+czoEW+qivv;(C!{(?)&+ zEXZ=d-b_@uCdPll7Y2vB5btGI}qa`R)%z8Yj0y0E}ht|S+=`Nb-11u zOm(>as2B0k`?I`5+QzS0a70IUPjPUTAqIMzr&WhuE^jo_H48dKw^vt_GaJEIq9Cskc92uwECw0wNKNvDsvc<6e6`H0Hnn=`TkE@Wv>_|5i= zFuV89+t-&nwjs3B*>a_rsa}51sl@wD91=6FPeRA>yo^Lypa4*|16@~`h3A7cN5QNC z>eb1aO!}C>7&g=muOc`#Bp=5d`UPEbV`3qpvKL)azA<>vcKB{cDPO}zGy1J3NV#{K zzC3HqPvE!iqC`|Kj4*$Y@a_se(1`E74{q5{(ktQXV6(xLo4?nW;Wm!sVzRUp032R< zb3)f`!!`=3-@ezsH1pNd+*~kMvYCGbRXc5PuxChCe!wEY-%)#J#`cFjt5m3uYMZ5o zSvN3Ai5&Yb;@!2z(4W^)S(ju9wU;j`>HR80J=gX~Fy+z%Y_`=&FKBM)%#iY_pR@jPjeJ$7F*AI^ir_fk z>-!-$%5o+B?rI)*j@#kTGq2B0jcYY|T5P#=9QZQN-Hmt675nYi!1t~58oBMb2wv9@ zgwr`HJqz zvuC^;OJ?0~!mqQRG(qYqyS1AE>dPOZ&waBSS#vjl5+K=HhwL>7q4tkg56G>@Hag69 z-{>Lb0gd#RPtULJ)HN$>bDY|P$@9BYa0E1kflFbNQH0kBT>f9wK)^48B0!qmKP)k? zuUCiM)n7y7=&w|MMjB$ii4S&Ki0(0rz@G&B@O-x<`=|F9i`YCrG+?y!RN>c9VuBz6 z)>fF8Npz41R{%{K3begC%)#}Zc_H*1Xa~8RuGMZO2}HzXp70U$X>gF*=#{Vw8i=qj z588sAf0v9o$>Fx`O z?{Tt;4{>)i?|0u$AaNqpU;9*Qg`fI)``rZ39lZ?qrpoo-q8HR0l&FUlGXxIDjKXDp z@NI3BcYju&Up?8}A>3V^XvY zGGsikkX8h3UVz`spxXpQZXjUy40IgErwj;l{ksEU(rh$N8yBeCXaokJ9SGB+z5B!9 zSb2dY>zoQUCCD;l>CbpDwM=Z%I|qdQ#%alLusg5fg$1upf-@&R1RA)kZRzn3UU86W z1IPGzYA-BuWJL9LE`rK$7 zziFlQq^HJ$X!y5@kAHW+o-lG^wz37tF@jWTE4DFJFtF_2he|&pyL9RXRePv=(M;Nt zcmT`d7VplzOws9=#y9OtODP(`QrcAT4p`-xv~ss{H`5Ct zyz3Q=vE9whS9jaH@91I68Zxo+xier9Ojba8ST63o5D^yWJwkRSq8DBMz6A(cgYwV3 zKgDc|q|A#(U$=S-63u1S@1-e^NHPWLmA-|&XLGL8#)O_q751@jIh)&lKQ7)N5FKB( zY_DrePqLA^bl&Sq?hPf%D@NS>@WMBiDCb@7tO)e!dBdCNw!rS*Yjk~jp0?o{9gI`N zz!$W9lFU50+A(l=;Gc?NzJJQQVy**4x#hIxfE6v#rVQSG@79wC88DN27yA9wk(vD~ z2mLe;_q;A5!*x3nvd8iG)yI7OB!W@|&sqHd$rvO0pB$9+5O+dZv_+C*{ zl+?5wbmeQ|%d(~ZulEPbx2dVR`MqtkEi}*un!|;?sj0&IZR@)A{aljGqvfCNJusdD z)3UzaJ9}8~{K|T5Fm+g8W!xCt@@;wgbeERD+eQs1ubt!dJQ4!GbnE*6adnSDvTaeD zsCU`6t9IG8cGP*Ozk= zk=NrE9u1tdK~l(%HjkFis|3&dGRm)k6q}!gE4ZJt=8YRjR1{>8u7>xA1g-3Qy@?Inh@p{CQBHoh_uW(3!6QKWZ6HgB%v3sg68IPPYHm3r0Q>; zO#p);JX@(|JI$T>vMVTXR&!YSTzJxI7}O38x1(>u8sVf-*>hL{OrV0hKZLa3_C{d- zP$*uzZ6@vqiQl}udK_u!i2Z2eyVaOLD5c`P$~-_!0V zv5MjV=G;Y+-o1PuFYwt(+oA-+C5Pb6Rt;mtv$bG5>YGvQwTA<l4>Ku33seRJ~R8RBvvWR-oG@k%vweGXK{YdN zxtW!FCy$D)J?iM(aP1t4(eggbNB0MihRc|s;BdDc$7p2Cn=Xt1%KR3n+dSh(rFoxA zaMVu=jV(Tj{9yjz~%Gq=X<~k?#d`l@^QWM(tH&X zZKjq~*qz}Shq}L|GxsDw!?lnH_v^GgWq4U-D$+6A-B5y!N}Tw(yj$90CdBPZVY1#z zrlfDPC4;vv%kYXFTjAI93x;9GHX$$AOXBVMbTfSjvKMyb>)XkByS$2sLs zc6jx48L98tc^Qt*r^1L+%DLY?sPS|bR;0cBewuafm{$jI zFEG&!WM!d&M_6YsQ!KhtWR7ri7n|c`T4SarPxg^vDcwQzDIWRS^MgHr6KLbUT%Jn8 zSjDqj0}!Sd1=g7BNiV^akydH9m{%vTuT5rJ8_YD`9g{e{CS>S0o9TvwcHnRx)w4(8 z#t?e<5#1fQK-FVzC|*A2Z*Ka3ZdUet6F-u&mT%!>;UAbjz~j}#bd;~|lZIHUPtWeY z`+aL9@yB6?f4zwA&dbQ&Do3)4it}32zq;pyok8$y^G!&&Y9*8Bi9!*dc1%>SROKLw z`}EG!!qW0=B*kXEdcNEr)FmCYnKzB(A>bJzflp!47usKhrzHOKSOJXI^g2pd<*vT z?i8L*$5ge|bd>=W)HFo!Ax$+A!iU7Z++Jqe(fK6l#j=w=(P4(Rk~!dj3IkL1b~@03 z=Xst@n)Ci(W#j1{m(9s{Xm=F^I5k%=^LdJd;=h0fuJ0cXw`4cb~1(~knVE!X8P{LjpskUxHHhNa@ z-jA)DsE#IbAjb;xZ*=5Ynh?Li@%xDH&WCr?gHJ5`4$+?F@Q1wF9Q^MA)E%TC3y3h= z%PsT)%b$}>_neiJkY`_|C{A4Gbqk=cTLLjxqTga@z5gTT_l9=XVFZG(a^84pX}+A7QgXT)JP+a| zY&CnJ^t#9Qh7!SPSlgCoRhCZB0OOTLBUZu66KPZl!p+Ir9%sXzLKUt=?#ESUAw2Hh zm)?d#RGW^{&Lw!h?1`z8ft2#uY>w9TSB(MI><*5qqusg^(NGcAWqnGnVB1-1!7kax ziekDstg?|C-cKnGE6|Ak0K@`!tG?cK08qI7qEg`!km@=SE!;$z9D0}KHtLhVU8ZMz zL&!BBSt~gnnlz99RvU4|D4!d1^^cp@@9ed7>|eQbufnX`dh2OwawlCbfS1H4-!9b?Pjr92SIqFd9SUBI8hU&l z7v*?=KiwbU^}JZ?Ysf4OHBckL)82{*L2?$#);+SD`P39DXI>A6U z1&5Fhq{~VcWgQGzbicl4aCaO?ysufBvRU6+;=WpksN)`%6tm{4mD(Xb$8{>`c-^1X z*Ytd!FUTY#)9FISxus%$E<@Gej>YvN5mC@2D@&V$C4{ZS%iJCGY$dQ+F)s~UeY_UL z@O;=`T+wV*{K z!EofO?~R{qIJ`z{##OlXN1S?~&O~J*i)XHJiR49=qCfa1AjqKn-RC!n+tgt2*Is)t zyv97N8rC4HH*&~wGuSq#mg5ycj)G4**w)OZ7C9`JMTAk$R~1f-ZndvYz7p1U0~AT_ zm9Br*aDu~#Z*tgB8&Xn`O`wzLrl_?T(B`@TA;}HE>db30ps5a*BMNp8pBZmhRF?DC z$jff$dWU%80@LaJBt#wHj$PcqANZK2iM~~muJ-JHCuZnF_SX@uNfky+gE9w29CSCJ zCB)Y<7i{J(o+l9ohT_*Naw&R`_Ii?}7xtfC4w3U6!a_m95&DbnbP(4#Qb`3}v>UK0 zrKXlxPe8~Z7M9oNJzpAZAU5^6m%ubzLZxWP04P4DDwPDzT-p$om{8U0@(OJ%8w}V4 ztcPJ)2ijuwApJXXeByV>tN0bQwpZ6pUZC*A*|Qo83AKQFRqYH@&Csz9Ns$dD9I>sn zr4^?nEj9+_QvlI@0%Vbr^qWHkwBAj5nIH1@49IBubet+-+6yNlK=y1T&qPHy83Qd^S@%;3!f=gye>|b4)4F$Kb@bk06RxXe_ zdfYw)T>9i=WTj_n_I`guznE{7PUT@QFeMcdd4)Pf9PF;wNloY!Gd?HR(Z7qqqbRp( zfJMf8;`c5Fw`xC|jI13*E)L=zt=8PO52?_Qc^p=D-<$LlkF2q#(RH}O9~hw8XFh@C z)igrK&BKZ8F=iv%TV~7g!wuBQ2G`NS)V>B|9Ts{Mh|IRX9;hqfqI3+C#~O?XC1@ND zz^9;XO(u77IJG%bErzy{qZ<>yP-QeR6gyvHmSaCif~8+jqr*eBW*(uysp%oRjnncq zx+Ru1HF~s#ZdK=M4l{J*G93plhR_thi%K)cT+*nxt9+C1#5&{EO9iehtJm zlzHahX7QW&*>gOWy59qFDDzC>UES9IJo|f%lfe2xCj_etoR#6Bap^Vp1 zV`sBOd2L(v7X0YFwseIuDYm@dg^C9}hQ#!Eo@xMKOI41NMA?#=;drkpq-UiK&(pYMm7rJ| zd2>8h>P0F}OYHrY!pj}E8c-govgD#SR3O81zlv1yAc9~eZ?E3Gl&Ey`G0;O*qr3k0 zR*~cRS#~6L%bps$G_15Zkf*fWw*N)D>9vw|Aw9fDO>HZ~wUB~zZ$H3gk&J|GfjGCjqKa7eupNTu_Ix(wMCjbl zh}pD1-SfTCv(ro*89w~6z--g`xad_w#Tg?LWw-rmbL#zRj<3eaO2cW)UAjX5Kgi{> z1pKq#>3iSe=hMb-TwGnz-C>vpFzN1Yhs(~#y@j0F+lI_v3DoyFn;q}nIZ|y8N-UJ< zvg6v7pBbI+*OiT#OrFq-Q-_+jPNUWh z)SjCBSudWt+AR~tIUzti_#K{bqkW$=MXMx$o+s%(ZMB3X4E#Kr^jVlZ$#LU^w*1)| zjt?f*pXj|DKs()ZxGg}2{4Y@CF^9peeJ#i@Qpdg8uh?(|xrO{=2S8@PVXZScjfFF%B0lx#up<3*SEkEr9D#@d3gHFNQ`;}YF(nggW>nbG6 z&K6n?e=HHl3St19IQ#|6Lc~R zYZm(bCPh)RG|jZ%v&omZ|7wzTG)+>gQASyKNt+>XA&t{53G4GO_M^yfBs7iRwB;F4lNo}BJc$<^ONSXJ8@KP6 zoU3BVN#(1ymkeo?6Nn9>)H#jn7`3y;_t2d(G83fxMC&Py9+0n2eyKJ+Ku^a%>l* z`Ek|&1_};zAZD?V0O>@7{-+IvzwdVsyBP!nzrLsT4qz0C{*}Aj_;D4TMYz}FjSH6x zO$H^dbzAF8oGba>Df{~rD^|G2aG)26$BoA=6$}bcL!iLL`Q;dIo4HR!u&u4Y3l0~$ zYW^K!07eZ6$|5ZE-2F68=;*1O{lPL`m|2O$@ZsUuRF5LUJs{)HoL`^k+>YIzaM)c( z^v;yOs-6YrB5MQm_XS>$x@xd{uyXn1@ZcbM@zcA8Yp~>nt~bcFFE_3mC2`}9;3^Y_ zTbB;-{BoAL7*Z?vm16JEb!#?x0vK~u_#l$igun-@cD|=`A)}jZC4rY~D$!K*+Ud9- zAVTb3(Dc#;(Pm&fS2d$uFGERe;Yb8`AP;W_J(&xl{C2smd%&!9<6r(OeZ!ZP=vDBV z0`8ittA<1?ghggFjvkui4w&NP&Tr7y%^J#x+~zU4fs1p?3tnMH!~z44X{Y7Tr^9vW zMEP46&Bl7)8h-Lq7F4DNe<;-xg)?sP$ylx8`1S7yZn_t_%|URh9OTFO=)s2(>}

xz2qYOpQm8UWf_|oP;~VgrQOTd$;O{q?M|@W_o3%KLNjzY9+QiZT7je^b%I3 ze)6&&NcRXcp9#tSgBC)}8Ra?cIqQ0-v^Ohf8@zJiG}BYb^ZV~KGV33xO73S>d@A{d z0h3|~?6g^AGPUN*R5+Zt;p?l3iLj(KSkgD8fl3*Hc`0Wak&iBZNo$r+`8J^dY zpXM6R(Oh(JFCu&NuH~jq+}K5?Xixb?(9M*P%t#`fP}*JdpgNgh{2cgW3${g+8|Wtd z^DAQ}9$Sn|ZT)h+4duc0rmnf)yX1QHPEEj zQE0dAc7R+yM@;4zf%SBoi?U$?ap=fQ@LWHyKXBde*F3&IX={9NXai+!&L<6dy~T8w zulI{udsn;PARQgP{pWP2sB<0FH~KL7Ibc# zBtg>VmxjOJd#M)+T}?BQ1sDg0oLE}mv2Ble+~B9xvxYFHh}Dw!Vx(S6o&eG6SW%P}h(Sxk zhF;E7rKy~~OPBaX-h=-&9PHOCABC1C0bLNDZRDHoXrI1*TFO}R4z5S^(4BXvrJRp2 z2dDYR08&l6?Q* z6y^{Ty}79DM@byw!B#_WSY;PVf7!U-dbN4jY)yF&JtYh^mhhqp_iJLW-(ktaJMa>@$c_{+0~7Y^anZQ-6ENrbnBi)$Rq@l- zC|9cHL1rnm8*;R93K5<(#c>pUj5Qa>pCwDbCWH0s*kX`Nc1_42?6ekK4ZGY0=~Isx zkety&f9kGI*O8I6FDEwwi+sHgCRzf@wGTrYl@(kk_b>5P4JnOwPprx}S%r#(8L)xi z@huTvw&kD~tNQ~N@cOi@3vnLLVo+_||n1Cz-%Ju<2Hym3NOqz;P( zpnb@_31~ezrZ(mrb;Ybwwk0MSE+ENifRockf(yAJ(Dmcn~M1 zlP}io^`$_#rboE1-{V^jQla>>vdNXSw#Uz1LStd|-J`m=?0D(2nN{iKHpU3``LQ;e z78>uVZQ9ZjO1&l~EpgI_LOQ!vV}Rb}rLmY}m16GGs?os607lqU{dxU&4ec{>r0+F` zO@L9-e8>P~Av;ceDYCdIoViSw0pj%?qhdS!vUR%1VcArDr#qiKyUaNWi3QmQqpK2O zuo#Dn3ovo97gLk?D&rAfWfw_P1!%jS)b`MJv)p1br-r%5%VQ}-6Ge-B{1)Nl=w4KB zZNMikJ1*XM;Mk+Kg1gxbJLDz7z^J805|Prh8l^Z#@}PaW`|$Lj!o^#zIw>cdfP{~G z3*?)gicGTNL_No7S{x5*56yKkk&MNuHc+)lIXD;i5kAbG5M7FooJ---^)9n zs~uw@7S-n4FrkG^2uK$D*HN9zNYOfPSI3)$EpE3i=6l=IBULXCh z>8Ome(&|}xnVxp{x3S*c*9Qx{4&LN_oJ!8y&yoshu%gVLa~p}je6+mFNUfhqF$wO* zOP>KZ)o+eFaRy*7!iI_DdHQdpqo3Zp#2VU2UyEleylbBLm-}lrJ8I4O=+Tc%FF4xW z4_{6t2{SkwPfvTaoR7eL5nSE(0asuH{?Qj$l*1mG2_Z?YO~KE?e2!6Mc@kzMElGP43k&R2m4+;% z!wD52dP;;{2EDCe>`r_MWESXgmZUbKm`ViFrKrv_t>7gNnrzfyOJP=l%#3D&T`eL6 zIcF=XI7ka_N}r?RVrZA>KpZHQFAWX$9}av+H;CiLs^*>2ODrmj1W2Zv;%9>TSEBk& zbZJ!}VO+Q&6H(Y$!$|`Ns6;7B>}smS;S^|1qmrtUH5>UiWoRHuk>SPv-U4)6Ov@+U z_Ouf82?JTVi6p8~wab&_?lQd%4_T(?+*~E}awz7xW*HGRNG8wH0?!~E2npJ-%TP%X zK7W1E8L%~;R+#Og5q(+#s4Z;XY>Ab@fW(j$fnZtXAbwWKufS4Uap(d#J@@uAixA}XN8!L5wu z8yU>qdq#FLvVngVm&q_13FaB=8-=g7AP>4mr|saK7)fmwM=7?#8EMCCf!F`*}KRXI@}0mz&t~Vgi+2thcY*QXVnHjskPfGu6-k zgXi8?e!2I0esBT-%hd*dGx#QXr+f(=yJ|R!xG-LM5=+X7Og;5WIJU5blXbWH{FtTM zgx}#Mkg?hRkqIQoscG;+`fW@W1<2sb<4wUSpc4hsQ3Y;Sqhi1OaLS?qD5ld@$gwYD zZlG7oO(tKrM~cu}1II=G>fd z6dVFe?8k&>;~R>)KpNXZ+f#=)9tzC;L^*VUO*La0H^rnlJz;GT4{t)l(UuH{AXCauI#Wx)P>ZO7Lmo*o-hONAu4+Y9K*SyS}q zM7e4gwOC4V(uCQcK1APEdK1q-ibm-E$T&9=4aHT}V5YN2jPMpp>RQ>?^ay*T7Gc znxVBHxQ#eVv)K>)9R+(V1=f{1%ffnDzmCTHSHbR6qrYKSPLrh@$gxI zS628C=e;%YU5SDsvYx}MKg5yWUJ-zKmnYSQi;%7W~+LEbv!ZRK%lV-%Txpf0+vElKgloVv}#A-|2ObYNKl?iZNy(5 zhq05S|D;(N$iey9n;4U;X*{>GCYH%{2Ok)%kEwtaYX|k)z?Y2Z9dG})4me(Gj!u>Y zKAXC|`ezGdHo*eaY2&AX7(AF7Fc^rh1E&8NeozAhil)Z6dM|ZkiD0Iur$7JyW4_*>nxlsGcXxNi#Ux9aLMHc`LtQoP-iQ`08(V^2 z0#GRf^ytv$P3r$6@%|q^_>&5sqiW?MA|j$>iKOf8H`iwR@H-Ao|4Q3mRBQqn5+u+k zIP(8c!@tk>3G_=53kqw?Po738?^9fREj=Zub^y6SSI7zVR4kSLe=6~RFYRt3Kr;#x z50AI36QYuv@k52(Xzc&K#a~ig1>foF&d%=tVTpU>KDAXju^C}U(rGwg7ES731Cfb9 zqif(Eq&;I)eq)JX*6uJ~sdR7>Kpb41kn|xOB0O7G00%W(BZ%Jg0PsP)yHgDfeIh*! z&+56cOK+A_2zmLT56?w_9}Rqo)Zl%gF^BZyApXeDxJ29%4rYubW&Z%j!lH#S>x831 zi?Vxxc8jomBk}5h(p2!OZ(H~d_42$zkJef%?tlFLZUJuXG$W)(x}ez#Kg0>ywq8Ok zQeMsnYX0Z@^Je{j9Oj#PLMOBrEvkZ4YekO8a4*H!;;r zO=sdG78T1evmvCE5T7m7zhv3ko{{9e*E6oBRlC3UOYr0#SAzQL7i1H;* zS~(lcQP|ryiRR;pEXl@!FVKKr=T`kkop0vVHxnS~nj5AK*O?wyIfjeL=y%ph{A!Vf zG-4FpJFukrd5>4&=;{;(&Apllb%Q{oLBi+EVUW1DDNhbB*1v_j@~L(j3vitU)V8<} zK&>BaJ+h>b&`XGi1R}}w1oHBy&V}~8$@2?KSFUz-Pao(H2GoV2x#!KCtGH@4a?eUK z(IYZLRIr+tp1MmIIw*r{;>q#yv(UV5>>pvsZ&tNWHFWYc#`LU;k6EP|puD4o^cn6EWl@lhC+eBh5s3GgxoD~N0`Cz;A@{*-?)b>4AsLc7 za4|nudFQtPyEp%>6_@@17l+h~ouBh@90J!w6o z0pxZE4oecn6*6aE$m>q5DbL^~o_0V=ok7AV3 zF%mTm>i-b?tLGP7DcS{D!K6oll?*``L}qbRZ5t%cj-YY!k68lbY?>j06T1vZpu~oe}138MkeJhH=n;O_KCP6dAtPZ25$6;Do`O%X~RPKZE_eKhBPJ}BS8Or^)3Mxh+C77Riv*k@TK$z z2+R<{lB7uc=b|mS!CcTes)#U%3&TEc<_67OUxTI63`3CyN$J=@lOb=F6<5*5h}zLN zxL@l2>VO%ta#d?#a>W*b?LW7M8=X$gdLYuGY-Fc42^|*9ZcOAw!dF~sAt|Rm-Un%| zpWkL8gX6ih$Hc&RQEYXv4Jr7or!)_nS;~-2Vp(?xqn@NK;eh zGj~l_q**I`P7P9ID!!mSa(BMGa##(=K@jYK$k$81-_)-FnajOMP6Ykk9Ml4f)K!6F znM@y3o79zEL5_w>`gHt+FFF^r|IGgat+ekKo|Wi}VDBiP1prGHp2 z@sn7Ach_Mly+X5~{ymT_2TU9-VP^hU&}-l@<=#KAv0IL2W3>J!H8$3DMG+!CIUyPE z-w%X9OF>wQ63XH4*Ee%p_Z*h^&m2qn2Xfp@q@DVQ+&zas-nR3A z|7mxwcDgAnlOR=F-<?XdaTRG;G;0`y8As@1{+VGh3Y23;~!#E;;Mk=x+vv zlb)~->wYz=kTIZ<4fL0wUu*FB_nDnG>4abTC z8}RvgUEiLTNyoEsEyKKfx9CYlm37xY&qh(?6h3Y_Miv9vloA(O_C@b{O%hhuqrY;F z?4*UUXxY3(grrfqIcsCRfzfC&&%;dQi{*2PuiIS^0$}l+{o;$-{X=FL;A|USTscb& zkVgv_ef+Unvy17xGz1132TSjYQhxj&zv!|e&w z5(z<$MS96YJRV`*bVj;5o;r54kkTp$+g=3KH;Q?(f&6}SQBHMQYS;;DrCcfhPNFI* zGRR2#(f!5(I0M@Ag9+%>FF@nnnKwCvm;bOo|MzF08ti_c(uj!t>v0bNJ&AKS0_!?7 z@k#`)^7DSF2}|FcgRy%{jo0in+Wlb0W$SGh3F1ngZ?BkH=wQ@KV=3+>nd|NO;wIAu z*Cma}OeEQQqxm}uW~4lDcAph^C*jEC%6oJF*0pOu-hp*wapFOTb@%)rjUxp5)6T_E z@iKATcB1|_gNc9PydTosb_3cy8^NA2LF9H3h`%GW2`jC4y(CY~DcqeL%pXjEvMo%^ zDvuiT>rzq-;zg08MB7~98Lp@$VPVHAvf1xbxyZ@7xkDLQjUbc)4^!9A852eLu_3i7 zV0f9qy-b#^B(*He2pqhBojrB4Y_YvWf99E3G?q|6oTSJSo{J?zksW8gG;mr$&7L}s z7Uqlx4i9)TE$!+fLlzla&st?XHY7ExY81~9DUhv%HOxQhQiUvzlz|3z`eI!xV2EjO zJ&tH<45v@ZmE${=jxK?d-J)FLdLkQm1(n0a?XL&mR(s~}a8zmfmmFP@!#Lk6aU6N9 zLZGp}i{M5!pqSLiXjp9VRTN#>dKehv^4#7L^MdK9oXUL4dPvi*w1AhSP0>2X93y-p z3#7e(asmYz7IBEW_(GI|>Ja}Ila8z^^~nP8P!tlGj^zAaEH=Ad&hL=xB(Sj9?Y)OW z5DRkzQVzTS7d`8+lSut!peqxRQ*1P|g2R3u5XQb)T_qbH%$Q=DQDf}C=qY1MD;$~= zNs{6wk=Z-ZDOMFc--I#FrqCu49pkG3c8pxT;I^mRX`WT#s1o%svAa0?vDBeC)P+_W zEp_RnEI3mxIi7-*@qmF+$3(~Vv(VLNLHa|Edr$RIshLcC%Y&1BH7a6YHdd0T7>sNp z&Be%UAfts*Q5xMGal`{nfBOT2D}(TT{rDy%^)Xi~ZraMs4E150Z08HGH3X>yW!qi! zO1;FEGG>F#hP?nZiNL)wZh9ep2tyLo4O9I@xeeKLbrFGmFf#F1NIg6(i6{d*a0eHA z8UC8S6l_zj5bvpjH1>cvvqto`Uj!f^KRxE#*frP;-Z@RqB} z`CN+ZEERPn7)HZEA&r+tHE^?|Yev!srP1EAz;tQRA*~Xc?2X&Yfe%Cuxh)HrHcF^; z!~gI})Zkyw%n*wNW^hrerxVFx`tHqw|D;LFbf zQSg3tXu3D{6eFt7R-)edvO%Tjx)OI9o#8+XBvAeDm<(F1qE~wmq6jer*Vy_9y~T@b zrLpslE4{*++M*6mA)^Ki^0=#BMrNL)S_qq*6eQQnfc#3oWbrr$WSNnwm~~pZWK=WQ}6oSUt!7sw|0Gh+qKfIO84&ihM=VhkwVEhlu_X+7V`-Y2T*lT80&$ zZzDMf#zt4i^jVd_d68IBX#r~>Lf9F{W97#qsIEX^g>+u3#?uFd(@r^Eb6C~xu!Xxe2@Lm=jV+zcl^{`ObZJr|7}yD7VmZJ;MQS=*^ex4HtQD+OB_R5w zgea!IJF@lO)~PZ?P@-Gk{_&$R_QzFJA*Y&7*MIDl!EjKAkKlwMPfl;ZdP~eNw;A|$ z+_)_!of+A^OQY?pM@b8#9&p(Pe6R(TmU_;ltc0GiC$}8MCK(d${0{6m(5V;IC~zQz z%hs}}im(Y5%0*X?ipP(1NlMGmsF^hS(c&>!^JQ%F-I%E({=%@%U#@oWGBzuPi_j`d z4<1Am#y}m`s%t9!LM)N?N**W6XH=Q+CZX1DRUBg0@`eQ%zVJe7A@FELUctRBI%M=9*k|grkkWKHnr*g2Xt0uNrqbk{PN}4=K!X$dO ze`pGd&$Ugx;EYwVbc8O?cKG;IewCLW(K`2d;4g1;8^)S#?qj3~x;@a8s2&Mz<&2A! zVh656EGjb`Akubb`9(BdGIkCFf9YGi${k@YARROmuJW8bbjK|pTTN$#8fzK|^V6TS zmC*}jPb^9gt_Q$dsO+Ry;yh4u7FpDm!Zo78f-OH_9>+6!!~=&OQy2hwd>H$E`_c!b zC`+8Lcj2a>C58-_HDCa7=Xwrr(Y(zqP{2Xu(MxITJO5=5UbAR;K6V^tHjN|h;*ZB1 z>hG}7eK%T39C=i@GsJ}Y4cz5-Ayqb`BnnS|eSY+_OD#UYmFn(I^hHsSF!n*(DAb$V zkpWq{5u_!g;$x9I9S0<5GJN=%+4kvevD>`pul2ck*}Ca^$=+dS9}{yx9NCIC;FPu` zwYwy$wxhL=uu@BoaKGu2L-zQ6(6$HI92NllpE*%~UDAKPr#P!N#;Ap4<3iFzYU0Op zgtjiu&d0nB4U99B)6?(NAWxI%G|*+Lgb144Wt~aHbmhhj|FNbWkC34#bvpI z;vvIARO9^eg|gjgCNxCz>WZ>ipo3JK{#ed;vmQ$SjyXQc$>W?%vtun7NE62%TaC0f z$GHhH6_((&}Jsxurjsk@d7eYcje`|R>hY$k$` zAPYGF?XD~RRrv$|rZNZ{^Do!x(4H9q9Q_~|xQ!$-C86zl$>boYHo6{zl=D0=&>NrP zT9dilUUsVN>I7KhZEfSo>mMcWyb`Fk zx%i|ZZvW=d>rTfH3*B@$OxuX~Zf5RsIN9D_=)q zy1sE;S<+^PHGBdfGw^0z3acAFAyd!?ZZM@_ZhuIlKRp>Naug-imLb)P>=voc9~r&$ zxchaJOL3jNP(_bPJm}s`lE+>~o%>v18%f;5yVDt5PoBul-V3(dxtU#)$zRd=jBfN5 zq?OsA$Mr`8oi3Ih1d!c;y!fP3VDn>`p@s86^(i)P?VhQtk zqkD*_;pOCdrgQTL^Ce%l(MVT8qZ-#j*@W9{ad=YZ)<)H*7ot_R~G2#Xd6 zrBC^kQ+1DWE__--ax#^IfooOjvbNvD1&(D)K}uvW`3M7QvX!PwRPdA8#^=>_Iiht# zTm|&WV`aVl4ZD-2=xQEnQ!`$?!5!W2=b^L3xLA96wE1~3Y1vBHj0i`)JnCaK&UpU1 zY}VQK_|ap|#jF@N!dDoi2&Bd@)Lr7(6OwCnM z)3DVy;H>o3JjCb)gT_jQ@rKzVeO8j_<57%|Sad;*P$$iGqx(w>9ry^n`{I_V44;zs z7Ld5kQHt~>ooWe>+c(rjWE-3)`LR zdrfTh;ISvE%1eBvD4hVR2~{qcIac>b+H1s`E-D{b+`FWqpC2V6z1!no9VjilE+lr^ch8SVtRQ3mlI5L?}e59 zwzKoI_IvK=F8PDnbCIy|ujvH_LukQy?~u7*n1ks|fsAwIYkz3qXkWUIDrVznT7kC5 zUGJYMK2d}8UTOXBXH3Z$e%vK6zUEyd#&m!!Pg6^zzMUw+W{n+tx_Us8uF2Yqz`|$} zQVdZh?&Q3}tzmKXo6P!a^i82#8&!mya05nZ4fJ3|(85k5#Tb+>Be zLcZTNyD$hRJya7+83}6>LozwfB}UP7geiS2^(isY;Gdivi%Yb6iGpeMaHIq-h*6s~ z5;l2t6?6mK-lXjN0P7@4?D7!Tb%uOvd*p(S$SR@Up{kpO&N^AQzAU>Sh3q}+pPWF* znbJr7QUpqWK6*t<_2krEmaewdNrI8$WJ}_J%T@q%&3BK-eOwv1Y5{xDAa#*Gb}eKs zdEH;Lp&zjWV^O>9Xc}=u@5`2PdbokD{5e3I%g@uRHq2)|P6E5EM{-v1D*xGd{2`YN z_Aon58F5|fMspMc+^C3$#QURt4(HVOSmnW*1P#Qw`+y^`BZ06Mbui04YZt6KhL?lp zu3qlV*xra(#fyBZ=378la;WxlOra}+^o*xG{moj*^Ue2ZVVJlRam*?o-G!qh>F|NG zMDMe`tq1x$45=VJnFHyHYV?ujd0R`*sx$gyyyl}5f|w8k=^hd(&pRllK`U+!;Ggm?m(kIM z)mEgHNOLHUeoAG>9+!=fxB!;3P6<;Y;HZw9S67$nQ1s&k7M_nTyshVij-O9E&@GuN zw#SHpDF!q-$M*o%?6r+t;^1_CpC=(_%keOcpZEKYn(c=ko3@7=v%lT$46Zv`8|Rxy z?PalEGuvJtGS(ee%~5CRdRZOhwAXhbH{WwsF5izKGPoB@QKn((kAyKhUq74g(|IjF z?+r2c!+gAcRo#=L6+%r>C3W+{nFuQ7>s8y7hxupi<<9W$O|;%RVa#$FBuiyRk)6RH zZ0@+Hc?Cd!Ca^53w2r!;XIp{>=CT%4fJQjFHJfT$b>IqP{R({hGcG&j9|+>R0BUi(()Nw382iFgl8yo`Z&TDMmTbl;-6C_6&8j+iHc~bVg(gU(Qr;JF z@>CR+({OZ8ofN%XD`)42hFl1ZW@*8$b5dM41&6Gy(l(_AK3Vb@r+8{N;TobA1fL0x zs+5qQSwJAix!Cb{Co$k-3T{GDZc;mxC(gyetjFS^-tc*l>Yb?DxuXs~!*QavJpM>b zyFeta6&X-^JjUKZnRsDBsxa#WW#`XkwusTg1M6sSeB}AlXH)At;l5`^IAS)8G$q93 zR813pZeQ8)v*FS?^iXF;H6&R;*Knb#C@nZNCZCF)^dW6;Xg{#6ObqNms(s+4=-j3W z58<8@j_Ag@r6*2?^vdA+Qovf{TzA;9^Too3qSrE-t5iP1K#7Vtclu0fLpNx)AwUyHVtMysMRKu5Sw6h-Cjhj!b{9AV{$3~e zJ+LI%t6tiY(u_!lG-Dw6JXbe6*;jY^sZJxZpL_oA83SYjWpAv$@exONh{7^~~kKFWt9#h^@ChLZ1&g9~MPgsCA}!RWmvn}lBU zNHhy_YhI@@;i*ezMY!%1% zW#pfMs@+LlmsVa1g@HNa^z-CP7ZQ9ch9sh z(8rBkDvv_g@yLe}QIxri<4@fAS}(Xl>0dnk$Okdi0@{YZBsa*XG73)r^|Q<@3VpMTwO=ieiJaoelDnp0SN1zew#TCxo>ag|9{(n}j&ak&kLGgN zhO1)^e!wLN-j>t#OmY3WXZp;9xGXaXO-x~h+#Ahb)b^(T{hk-!Pf6bU?A?z9H36;Q z6SeMt_RVKEY&#Hl=K06hSEy{xF-pW6>oF^u^Oa z8x!*l=RT{|%=N_|_~QL-n>StP*FfD(w$U4;?(50=odTV~;%d`ML8uHhu8Y#!t`ej*8sz;;$Y(-T-j|>1W zymK+@-rM-m_FX}>Ku&>91GLc4ad68esyzp`#LB#v?|c48LhOzWPrmV7BpozXTKXq{ ze(P_aZ3~Ux@%pd!r#H_Kgr;`i+3@%ydpfLyTv?ci>1l6!Y%ExTk(~s1td(4odQyf##qQ6Sa}=J@DEGNeR23x%<(uP6LwV z^wQj%qIPiHtL!{^i@kx>ogrE-v zBDHwfRs#I4at>_5I(!`PuG||GYa3)*06)qrF~# z8+WNpxKwfNDA1P)?e(0tzy0jpJ@xZ7Vnd18+uB)t-+WO!B{^2_#ZRr~!DU8XJ(ddeog#Zwbkh8y5eV%y+ItPLYQJ)T6l2khfpKLZXKF7ojwBq7 zQ-}+Wl?!D{!j9cL8+mypsrwq>B0|i>hcZX>`ktaKPn_?9=Sa6a5hpe*4%NpTjD_Ea zCy245>%OR!%?{T^?T#EmE`;d#mUGR+Lv0x+D<+rv+e(Ap-qNFxGZdE>rF3l#?;NN{w2Q^jRnn z%gU|$vdRa2u7LwD?ks^V?r>&!^qGDrZ|noR_iuggulK(6VgwN3;;@%KjR8u?%j?|t z;s?cWke%`B=FD-MRneDoG*(9V+O}^>=D>P1(9n`IWENZZ?yi(vqS~hjLS6Rp>qpT? zehJE%PvWZjR2>&S4@VP>h>`GTj;2(@%v=y;f42RjXYP7>``K=g$cdagaz^bS$dtY7 zesuqHI}Ysr@P)g6v9Sy!^4q`ghH;aEoQtv08PS}7CM7o`Hnu4LJRgoejV8us_VM8R zH2&$H$XB1b^ACUB8FFyL>-oZY@6>qh*$_B#j>@ECwBfZEqdS`6-8WhNR&;p@db|Ww zd*-^bCq-vk3P22oT1nOZ7 zZ+bimzIf&0R+U85!1~4yGE7>yd&l~h?|J&IlbtZ5JXd*sj}JZXnvIW28{ngELEv6Q ze;oWH$Fk7_eG<^kwMdQpUFpP3UslNJ4$#~G`|-x1QBLKq1AV~Sq4oQ>zk4XEC^N0B zU`wqO-rUz=h73^ct=y%8Ayd({BOiqCtYmgPf9rcYYPF?8eSwT9FW+<9+uP1`EgaZ< z`>R=#H7cT{^!RNX51s3AWt8oB;b_ybbGe6;Do%#&x%2(Hbn4Xc@RRrM@2H(33UZGB zWM@J0fO5x{J3ne6;t#*{>ZX`98BxjPZT#rhA7=|b+q~|N*v{hJh3I3@*1$pK_em(}q8UzNFT4S4&Kis;fr*q0o zXh%9f{NzYR;f8ATY8x~0*O?=8n%36z*V|E3B`bU=kvE|ps5%-7$I;>WgQxbli^qoh zv(CeX_}swBO5MM$K`|#7%nLo4+$vTuI&pvmZdUc!TkRM76i(KciMOOe?v zlYU~NcE^!^(B1<#UF$2+buH~lPnS=aQTEt7-%M_-(@Y4X|8hQ;#ieDR*dLNo2f7K& z=-XpCF2X+%9Cz})xOy?Ir?rQnm^2{if^q!-tL5*itt2I)rfBzpSQcFB#xHA6_~LKv z;6~eUKD$j0XNv*L+)H{vdk00s$#_1Bp_(6JpAI;?vd-Jzr_{B`N+5%*-x5vH~ic{QgZj^;BarffsyTMmGJm4o_rMpX%{ zM_jzp&mYTyvwGmie6KM`)m}7gDYye)jgx23@Jl*D4!*`}r4sv$vsi zf;fNRnV&pSUSV+^c=LCUe3+Q2APSo^?|*XrM<;mI{OISiH~nC z6}SlRd&-(H0#wV*qmRPB_=d*aFOJWSNR zb>>(OXGTjc*!*}LY@Fem5zvpi^7Fr^P^M;e_6gdS7yiB>ori|x^fvmb z$%@ZEEruJ!XvK-x1p2h}%&)ccSG;z4}O|O(-^(8E&E^JvpW-Hi)T3h z!~3?kYK-uB-IcfS|fX&fqi@Xa_7vAK5duDyFJfgTXV z-+8o3;U^5OXO8VY)BxW$T+&~x8!)~WUZ=}xbq6xb?{!+q8uV-6_c*Qg8?F8%-^F$^ zK6&xrsfr0dUI}MG6R_7fopgXqR9KB#7onRro@O|m`|W0NxtuuSgM(@@{aBQ zVpj!}!``c@+Tr5V;LmVsXmVOT95n#p&r(XFpKga0qP=0;=3*Wi4!A_M4_>$@3eGta z#y$7r|K3ptJuouY@8|*7i1F^33(*~N>-0!w$e&L4!xw$7gQoF%{H;7=q109^xn>kw z3dNo(0qwQ>@B97_e|hU&cYXgqfAz$c`V2WyKH@57%Qn9IqyPA?@7?+8kr0}{del=$ z>wkaUqaRiJd!_~N{_)J7(wW97^YMt_hmQ`_Xo;fI3wIo@Ol7F|9eVVGQb+T&?ewX4 zZ~xhU{m*UpZY;LeX|2Hrcii*8{?~usc6e*h*}Hbsm(36vB~g$4=9d5b;gR)6Houvx zsgyek#g`d*l~^LN6-cb@;+t8uqr1y3>f)8xOu@IzoPpJCL5v=+&keZzgxBZwxu8p6 z7x)85L8%QK^>}Sy%chH~W|g3?b$ZD0a>IOn&cJJ7j8B7U{qyj44U}^bK0Ft$?nZ_K zj+pdTz0E@^XP@tq=)kVm=l6Kfod^fxA<-ddC-AxY5k35|jmAU_O)gn0o0*Yt0YqY& z!u=#+Xw2m3sqKH_1a)h4&#pYx5|jxbSnzACNa;LZXMheyLtbS2%OQ*pgQ(>ru#;}L zSY=GrzSzNX_#B+@c-)3rZG8phLY@i_e5OQxzK(!xOp8dNjrXW z+r9VS`HP@>3A{N78#5&@_AC=dA+LJjY$JSdZ zy#g+S3d^{<;n?3E{^30j??dxjNNEq18>Mp*&RL@czd`_LX z`$AnyFU&%5!95Q?_Fg9FUCf-{{@M?3z5Q1YK6Hv)hzj4|UkP%il6N>IKjDi`SY&;K z$EeKSwyPgpPQTL)7vS``T(0G+9<(wZutPYOsCk=D^f`eiJ5c<<2RTsWck1Tm=5**Q z3Ggbr;4!%7Al&u3;jSCBDCp?507wsvT2=Y(a}WOXXTN&x&1NT|ZA!^(X@_q(z(e-2 z+(UQ%=m$T2`FQq>k8n>`M4apc_Y_*8$k_hbJAb_6?gt)u;Er2=yWtoTnu4^aAHD0Y zN1w?QfwMu23B$07D_$>w3qgX?+H&gC-~9MT_dXoSUws4K03e@cX zWeh1hKOqEaVjsM*41WcRwC-FDag z4?g@tAzBLSy4>3V)eh9N)Ol?=;wn{milvSsiK9^BELC_*Wv(KLvqbJKQ@V@9juM5h zRPF{IibvewXo(D%s-~tYTU_E8PGYEFXQ?B&DSmYkCTPSvx zDt%=r3J`Cp%vmIHl_`DXxz~;*QfGnG(Jpq~^s0Thn_pUozHfw7a-fb}2HL&E0&>Ik`&~tLR!8_$p>ouYCiuPv}^LF@cRS&(3exgoGIMoqF!{bJH2pz}3zySSm z@MEKv#_rk*=K%Px!xQL>fKeIc)q4-YrLX@TmwmnNAXU3Kr7-D>u7GMcDRX!18Gyq+ zD@%^T8WL8kplu>s1+STtyXE8n6siG94iqhvXp2Qf#ii(j&2ASs8aM>-B~u=+HOO{r zo=>MYqJ`NnCI70s{A1 zbL4BcN1Tu=j^9kuGx%LTYjv1#ca{4}6r{^FW3kMYCv$d4ZhF=3;&%)CYURzs(F?`0 z0aTCJXXh)chA)&!lemkh8}F726k#Reh@PnhV4BaxZj+oV94_T8qMo#GmNj~zT;AO~ z64o?SE`yaWnoQ!P_tN(lYmgtp>$ZsKnn^ScNEjEZ__GGPnbRr@E|OFW7N*9gA};i7 z%O1`a89{WsA;q~uQDpnH5t!q2O^r{Dj4l-9iQ1=~{<*2R3P}-d9(E3V=H`BRNU0=q zV2-T+P=%l^PvMUPD}0vHuAzi(QA3V!a0WIJgvV0Z#);wsBRs9e^e!cwPe|D2Iy+?b zdF%?-B2@a5@`w|ZGj*~OuE7isqp!fa^(l?)Vw5y;yk=1{T2>~9pIZRiG{*WkUMR=` z2^z8^v}G6ij};FmbxbPZ8PF;;^VrQ|bHkfJXWv?t!5kciDOlU>z`*#20fY_wHc?>5 z=UpCYggamp-X7$GbW5EsJ&Jy=r6g7X4HVqgoL2tSh&@U#jS zLx6Xw=Jv;_9 za8>cijT`pwudl1$e~JRCa9Kv^-VfGq*mbBMG%+TA@%rCC`NwD1mC)h5a%IEzkKX_L z;lxrE9ISEiE*#(V@ut&J@FPy3cNn;|*8=diK!q)E2Y{cI*kI9t7j^8+dwN2nA3K$J|(N^;IM>jIrY+nn&itA$Fph`d=>Lcy> zk~mi~7gipm2apD`I$623uV;RPTBn(3DjxL~jruUJ3JX=9HimdNb2O^+8QbBg&>C5(k7w_VmFZlTWiOULqy zhUhZ4X;iu?f?h(MY;WRz5yhxiLopg?^Q?>ArJTKCj0z8mB+LzsglLoDt4)0iLg6LBO7<*%lj#Uv&pQu zN<~Ar;#>kHcgo@84abyA@+nhILyNEp0CyPpomcEE7@mcrEw-*^$^+Z`I!4fER)Ix6 zTU#CF#W3!fS&e~=j zeg5%3A30i>9(`)V=4a{_2||&u``y ztvg_N(-xy+?~`v&t%q5`xYaw~v}93yg0 z)M$#fcet9G$cH1&tv!MrDV)uxy7Lqs*X-!=A%-qY93IL0;- zqLJ2p%j8ppl1hjD71E551SS^`6s3BlCgH3L{UnPwS(FS4)1|2M^7!Y zpcTFTN7hgCb47(5at#cpQno9JJA^tDV0XHcl|#j<9Rp)6z>R#_usp`U9)M~EzaCLa zVagYMuwwOqUejp)HmKS?%masy91_CGmDb^wb0>0{oa)T%;z3wp+I20b-aFX~TN!z5 z@Wv;edi3`{e*nIXX)Y@(uS82GRc-#oFCO^IoA15*=uiIN7x!i9N9rH?^Pg&_;HWz; zSQs}KJRYCf;=#OHTr$FW(W$8^GYd;Mv1%Xg8LF?JhCpcQxm3N=WOl(XToH>^QEbs7n#b-~Os?gWqj~LcJQ`?OPvGrR zLOS$r`6yvrV)cwrIFp_Iqe$BmKC`tpwRdmnxRLNN^XScEPQqvJucoGOEMB*3(dxB> zvrXon3T8j7!S!{?T+Sq@eBG2@_8A%+H*tFB8!~B|Q>Acj3h2#)-)Y6?rILA2!TT*G z&D>0dUe&@lUObM5b1YRI+*kp60eqOZzHp?wpzp;~l+Drf_s;aZda6HWkQ|FaszEdy z-8i~PDr=`9t)5eY7Vuh8?PcYPX|M%+6QpW)v6{G5ZS(Lj`7mCut*K&n%oD_%>PV9^ z&?i7$f~j^^4jrp@42;zPN)A3T5A1yhSecQ7am_&vL(jD5M+POp*N8zayEGj4*>)yS z=Dj<^i$ccWahtd=?|fucMNv*+74qdWQqy-ts?5rWunXHNr~E!)`H{QeYUT5Jamm?m zL49xe=J#U;l!nDctzpsbcEKjdu4_L3$P<4HCSUCQw;JTez`$6654A6;DJe7Bn_0Dw z^wLg+3i~v6sZtypH#}~zlot1$Y@A)POlMwbPvy7>uVY+kR%j=(61i-RuCIy~UOzQ4 zYZ8td%|2qD%05#lADS|aPzCGH4OF1%+Hg9G$13MYN|`3vl!@NL-chdxPIBe&nIIN- z7*1$$8%)w^i-|wG*=omfB)^It{%XgT}>YI#|ga3qa2M?Ix+rC|j5;OlQ>bEZ`8#BUUGTTxok|f4xPz48i3Km=m>%Ns8SNF3k%x2Pw@L9-4UC%!ps-?IEs~=`SE|}g zcJCF^V1du_3W~0|YDaInyC-E+9TmgjWvp!pyzUt|7O|unPl#u3N|9D}4$~GqcHKlu z9D7qdGlyer| zO*ouFid+bn!m==%6(c$~2wpOztQa@BWTWTe8QW5L6(exiA5O}Fk(m2ZS*=>I0o#u3bfHmb-u!pxLaStRj_qI;M#nWLXKvRw4(H^lG2y}~D5thK&7RStB>Cu^J z{N8P8XDSECg?7+cCe6&?;0#)fmKg6Bf&jlr9;zRP2_dYrWd+D~1w|uJ8lTKl0lbU&(4_=2U=&(b#Zi%kLg}^e-v7<$K!U z%At07-LAj=@^}SYm~Y_xi%&lN$44LhIH5`JpRfMl#Xmj#)N2PSpf^0yj)C!Si%G=D~PEQh-4t)90ArL7UEV+xe;YXdwLxCfKh`|1`U$mt1 zMZ=)uMfe?KygB&cDByv#$L|N;z_}nKGUPQM+yF@?mwy8hz@sR!t9<|?$*4(yixM~i zolBk)NXSa61J(kc0S`_%+ukOV%unlJ&*hQ`FfcGM{{7(hdE73C6T<67-xyu&+!K;? z0lxh2wm6sHH1N9JP6zOYS}IU;`n}*R;NbCiT%;er$K`aOMK?i{1cP%p$Q3-jF0k!% zUe^x*U|?X}cpz1KN=nL{)@XAQYqa+o-ngp$I>GN6mubb*aEi@W4TW4aT zu!(_zfq?;m8at0^d}e+czTJguNem2(tA}f=+6#+H<#MRn;Xw1h0$`S*G3x7)9QX;8 zz~+qxa6RFuJO%~^2F90xY$`A?FfgtrylAd=YHI3LSM6{>Iy)y{CWCLhgP6cC1_lNO z1_lNO1_s7I0CKE7K0a=C;i{^3qs0Zf109_`V)3xaWYTK2It&a93=9km3=9m6e+WQM z8;!>5>T0dtYIXS6Xzw-rR;u0Y_7MywXJ}|>a&mGU0|NsC0|NsC0|Vn9#n{-GMx*KI z=+GPOmaC}R$r&=4S-B%4Qm}z%$Y5Y#U|?WiU|?YU!ysqK#KgqRE-YQa3>k;-3b|y3 zpSmw9DO3DQy^V^2fq{X6fq{X6@g0DC8#OI0ZEn$Ia}#T{_Zog{)&3oQWeEcV0|NsC z0|Nu&Ukc<{J6!ouhgCZU1_lNO1_lNO#tn&o71iz!eBAWn=R%Q-3x4b~-~a$p>skI9 zC_vzQsH?vhx&rheQgAwX)Vus;P%?^DL0&urJYW4(23Bnk>|F+s#*1;HRn))H0{`k9 z__iPuyE^$_1z^dFG2rU2WHN9CSH$o8W-~~iR|O!bi&q(a_I2gTt^h=~$^m5imF5z9 zVs&X)R|aU+s#t&lAa5_aEZeyp_R8mb*BS;th3oz&@@n}zxT`{dDZ(FN#K5>>_|bPy z;nz&p)Q>)&JMi7pW%w_1`7-!@Ue`ZTtzcka{7d6sW~}{U_^>_%dlxG_GHxV9R#la& zr1xdU`Qbs*5gfa6+kw)#<_WzBhklm8WApzL>z43D$rR^&h|X(sX*&`bb}Lfy>Q>Zd2F z>L*NK|Er%*=tsu7R5q~jl|HTj=v4olK%ULgfi3hFhoPlfus=hP$JRp^G8sNIzh`U$ ze$UsB?g+E6WnAM#N%?A!h8btnO^up)w10(`lK%AL6U}Y2^Dq*q%BN`Jy(!$(fw?7k zknp+ZOAC0rbB5bwX5?VyG>8wU@)A3zV78)sL*e*MGwRSdey!99eSNFKM;3{N>7)|g zfgEA066Q9_BHM7Mj4}=jGX@66*TV0GZJo6{{`k7TJon}YAN9ey0NtDD{+yts>}XMf z4fv1@xlB@1wl^yRE?)(&UD9!i0fV}N2dEer82>i7=~X+@&Tfrzw6R%DQ|R*ZXn8yn z;deIHF;CZziv+@xkpd-9V|Ht8F>~*Q_NeBmIjBqAJyn$L`N|QQEGU{q)j++5BpxY7 z^|h(AZ02-xpD;8{q;V74@wp!E98EG`Sv$BVL4xEal5{R@NqAopeV!`O^|tbMM{|cv zF!X;MAokT+<#bJqFV5PKWvkr-o;2yFSTe8)R&y$}Xd) zHBWXkCgM}+{R_|w4Bzi$lni7_fkl2;6qb~mlK4}OD~io&F{+eC)Is^mJXs5$m)XGC z719-2EEc0YvMA&`;20AIJOHkzF$`uOB9!^x*b-KpuPjUaxn_>H&wK zE0BhEm%;2>a-d-vU>uxU<26~`4iJ>rYqPp7p38E~<2Bn{X1fO+A&*WMM(|Z&6B_Lm zRI_WjOE5s657=k7xXiAL<1`+ZTL&7G+0pG45{=alQm|xk>Mb58GRdG4or)JP!s+H< z&u6i_^k#7S^2rD~9`F5{39tc@>UDc9R+rfpXi#7@KA+v;aRTGewRX$KOX_5DD1m45 z&J0GCvbwckdm$r-Gc<{wegIz}(cq8AYqhyAJ|pn@>^7Ix;nxhX;*mV{`+W|l8)ObD zQz&sDI(WJ-a1v-BfgL^{2nUp6_*LE&_}ohdiYc>6w7}HYZi&7D{Kq7V5BibcVVDMmKzr055`@G{AAu0Px=e%FMEZ6BP;Y z&kZlGW2l~6+%>y$J4sIP(A&n-VJ|CIS16!!VA#W&`)uPww7U7q~{T|zrZhn4#(dvMq zx{V#t4-}yh`9PzAfpOEqvN_O zF*)H#FalV(()^YQsM<}VX`yT$Qi0PQ{Ig{$Ba$`b%=d*pKG5+dxanjMaC6(CwgXkK zbxDigHA?<2t z%cp;IuJ4Of0T-$}Qff{Wgz}VN171Y$P!+p|XY~4fjH>?FdU5E5f#=ULdetx+jGD0v zLEW!~Fmj7%AC}0pHqYXaXnj0qcf>$g&%Dh(mmS~x!hz0h*%Arpp)9Dw^O&E-uuhc9 z;Xp9xbb#Oa@dMF4f7sV^v{daN78~*hKRQSKFuXU53M8LIPM~h%ET%;hr&8IU?%L7`$~lplixKl99F0%%-W(FW=h`B!LZ)9V?|mRjhWHR z`r_EYM^WsY(!qEJob{pM$d86~zZXi~kRY1&I|Sg0G(golTE{q72ii)Xh$m_2QcKyA zJ?H!152x3U!mJ^$5cxAB6T}pZ!cB=Zs!=tCW`axzh70q@;3kr^Zv9+sCYJ+8$@GOu zEQZEGIIKMttWELsBLz|wxCExr$T&`1GCizA#$$^1o*Z~5gh@4dv?^&{8XQb>h^4#Y z2HrVO*&NSiz#?O8%jHznu(!lhJ_w~ZXn+flzu-4;J9x&Ysw#(vp#^ZP{a~I%HMdY* z&mSCf`GPYBtA(bgm%I}_%*b*j&?i~$?KT36S~oe zsKLJn_kWha>Vc0I49)56tbFR$bb*kZWkVRs6KPH00(#APIn2Sag-!}DDUNj@g7RK4 zt#KO0r=SWlx@I{Iykg#0&$hzAz#!$gSCf$wwx{^{}G z-MR5>?+ggT+!}FD0aoo8H#tDzRZcqwgeHmz^D1yqWa=GS8lU$kCZ){Z#Ot+_p<8Ss z8t*`<%1-#_W#YU{6)98<3~qQg)KCB>t~9T8Viw79RwE^-SWT6yi!*!9*3O!(rXl`x z19eJb@XyhP@_Mysny`b{$1QF{6BP;HXgxDW3PmvNARv&corT<>_Op#A7D*=6>hgF2 z5NSS^Frj@?>zs-?(RY>$1h63{lUg+l?Q%HGOyxp#89k~*V@p*`C>K-a=rn9{zZ z9x8rrPG7djPb@Ch7V)?~V!oac***=WS^%U4lX)R4W9=SZC98%HtoFAgb{(jILq9IQ z=t7B1Z+5n3_lFI^cxQU~?<5MQUBEc+lxk7P9Qi1jIWXrTjPj_A5qQlEQ-{(hQ9UzK z*?eYN_whd1MF8D9@N1U~Kdheyf4eFvajj@RwtKE5oYrS^Pg0o2<7E@j3BKKkw5hct zmsZ6wYWadZ{-Q=WoYy=%Cz2JlY7F37jS55a)j%o7Ms`NBL4)TR%o->h^O%PvQK`dd zgkDz?(HqON5t_*}N%T$~OyL}pv#VM)GdxmUH0~h`CB@WJ7sP&#wXIuFL?2Bo9Ly5I zD}e^y13=m2pOy$>k!tr#q)82`Y4l)aLLe&28;9Kza#b9!gWX2Y81fK{qkAew6lOOw zx951{f@pFfKe;!uY2Iv9pFcm)39Mh7j?bW!tH~)p{@Ib?tZWVVdoqIFJ_)mMRy-V? zBr_2%T6X{X>`^b_SFyPV^2eZWwB`?4VBO4H={iw=+c9nBwsE_JCND8v7%D)c{Z?ubr;`VSwXwRK zz9(05B7X2xg?fQls*PkTf#CF-OWL?eA}Fs%>ZrvsKcUlAmxxB3=ISiAcnnV2aJb0# zC&~PrtBmEUJcRgt`W65HTti7jK~x7$3h^szIJLYbm)FaxqzwXb38z5Jrf2d*n$h}H z8ORt52*9k~QYD$RIH$Oh@I=9xV)mz@4EB`6tCNSNN?=E2LX(;^xI0sHCYyh#WTXm+ zPhb~{(kd2wST{vDmO2NeoiIIcTxp8RP94^c4G3!LVQ&biQgDErKcu6J%Lm6AGl%## zpM7$^rJ9*rE$O0bfj6U47*RAqnCDCDge=%EAjW&y8N4|ON7UE}MWoZ^Ut+UUg@*ZI z6{8vUK%8!`!#GhJAz3ib=hcY^XsTwRrl&&4n$WZAhvk0nC{3D_$4_n>pM=sqkU{9z zKeMdb38nmagB-m~>`@6s`Ne7|j6LMb48BpGsJK-vW{q?V%sUBleH`U*f#`VF(9v9e zrP%J!jz(ul(b&ALpCXPd6lb(eX$jxFT%2DpX_!;@a3{4MwEoJ{Vpj#9;dBq?u$U5P zjaD^MlA-|D1oRLrFCq0-w zbi7odM02mM-F*y#_IWQ(IP!ViD-X21Zn!F^|C<*b1tF|i&+{J!T*&XDS_0O%oG#b$ z1h-{CiAKWd@?3-2$8cWVB`XbG0+iZS8TNHc#0GFho-nQy=p_(hK07vccPy-=p%PWeHW@7lxcUMP=itpZn=OvJOGCrd_Ip8-V1>n4c@fCBP{=` zt@L|+&}_KI<)t?cxUZ1QsuhbtHiBp_dhobGaLeJ}pnxlrT?YeEW{}qcVmTMlHCl0B zb&UYv9L`G%3`~6T zN40CcT_IIk@05+0HTaZQY_@9NH{~Gajs9zzQV{sK&cjyT%&Hv~KcAE>X=gztgVucn zDrr75k5L9IQgd-ErDF=}A-Kbn=C^9l+o-@IQeiGe<+D2EXuuN~2`VAzrVLKtPXagd zVo5f=Pz}R$%0wZpnl(+c&!KD1U_#7=L2 z!C=~;;nFSxfTug7_cR+l74Ya1k|=dDV6?X>r$2;?q^nF4QXrjLT&zu`w`gH%4K&e5 z8N(BcW7$E2Ot9~sjm~BCO}Gf%NLV_&QpBR>d^($|f$h=7TN_U=Cq0Rpq=Dhp}#GB|<`r(h8dK^rZ-9p(@@M~X08I!hSspcCbuh)QA(qKjZ1 zRb?az<%G2-mDxWE%Qnmi(rn#qO_QXcoE<3!5xW`HjDj9e*Aa^%-mYYcYGg8}V>Gv8 zEGDUcZ@!!fAIgvy|GMG2M)nmziem*J{TH*~Ycc~Cqrm3P20!R$->kNOmmu#!ePh(? zf7?(8XYCOVt9^(vN-R?1k}lN3r)z|)a{JCEaKlb##AH^W7ir{W+YStxeUzN_AMUC} z56wWG)|dYIACq7`CO!3TczhM8D|(~vDZFuJ$Sm7%(U!H!?~)R9xyj)0rDY85fChKf zZF8xg%fq-q01UffZMzI#Vd-^C0O(Zo3rzBPw{*reGJB2al+OB8Q_9%=yIy(u&6nPM z(!<#h!T2zm zk;&J>K+sSg=og}wJ^iCi%+I5#pT*L0dIL)qPBc+dsO0STRq!kp26w&_&EA{HdOwO$ z$koAKVdNae>AG zBFb;ht))kCp)wq<=+6=R2(7NFfK3Gs*0F@}fzQL}dvnABsM!Lq!KcWraDIe$;Mm|NiJYA5f!A{+vt~29WZ?BM=Gjc@ zrt>s9e9cjte5PYZfqcwPOb_xmMf9(aVr)y{527jkl*s%bh}jJC#jFU56T+u9Mtx}!^~1!WBN=?5(LOI9 zPEU}7pyVy=&C!Ej#4>iq(>tKzHZ>&BJCSN%Pz-0p%iz@^RXfU0_n4-nR3Jdc>eS+s zCkD4B(l*DlyGKBQ_0M%O-UsC~k{Q(ndP;!)t!oB`1I$Kt6J~R3KD8Ap z2Ct66|16UBc^rLPBE5kRr1(-*6g{BYeW)MhT#SzD&Xn04)`^p$)b1%i;hibZWNZ#$ zZcgMfjp$}VcglR@V2KnC$AevPU%;_2GP-L57_{Fs)?c=X1M?S_7gqWw^%`LP4q*8bV4BaW-8zN zuwDu(F<6j2qVNqb-u2)go^PIlnFBqb9?&8+?%5}Q|HnT)`oP^UoGa#|UhAqCcLU*~ zUow`!5wwF4*j;g3-arM!JJwnewx<^s5I5Pi1OPk05A462IqC6zYTy9lwTO;awbRjn z1bQ-d(Jz9}3p3S1J5$p?fJT5l%W z`D5P2+8uv>urriEc8F}$+_FbQB1ot868g^ z59?vCVvOx_QV|~0vq-`tGJXy-QmF{T^cG3>6{c3Nc$?cM&60ZvWkoJ_mBLxv_={46 zPfIkGHi?mjP^nVZrpFT|YqWT#G{>3pi6E5EN;zl-2hW)@ElOUuh^*hIpWQ4Q&sj19 z3Qhv?bH$pDEWWb2cEHF#3YdZ*q}H&QRo&*Lxfc=o9^UXV-j2)FIjvPDQimGMz~P%z zyY!M}R`ASzWwyV0%cKm1ERGPpyX1*587mxTU^ozdmIrJV{AG=rT%)A|x!y8%)L_t7 z1n)6buZ@~WRi2|L*o04kxzBmC7T466v{A_O7(c7Q8bP;tM<|;^uoUQ$wv3ZiH^som zz&xgSwxXbfSu?HSls4-?ZbHWcLEuXt5T_U4{kbe!6f16|b`AM{!ws)8P%q8|%0t2) znxHOIrszgtnv4d)?f|+wZkWm(g#(mt zUU&)07SO2_eE`^5mT8O}J0o`EBNcy{s1L38HL`5#tnm_SIB8bw+p!`M2Wxqb*15|X zsJe|8IH$$=(pSX!Y9Rf5+v(-@r=8rp=FFDz8c4JyA8)7=aKv30UXoi8b-)t>+wGQs zjZj&2GaR=&D3)i)GuExU-gkbt6vsI@uw_Jx8L2~G%_jmsywHObLK~sKFVibrG_3K_ z;fOL=>i+zwZ8SF~w9@i`TSwns8eV_f%}a0eaZ+U_bapFTgSc%uw4I<0786?2wU5EQ~+xpWq4g%g~JA^$>`~|EfbiP{9_A_raWk`$=@`78ge~0 ziBFLtv?EgzZTP`_!PX;I-7GyL)`8P&hEc<&`;75#6q}NIYlR1I%fW1nQ6ENJ>mff!r?PQ#_p z3>l>K-z6IxN?GAcnFQ@`1%jA6ms>TY&t$<>W-?rlMS4H3IprIkT4a}eZ{LT$BYU!0 zftcl+6G)Ljmf71nL;|y4pg5Rgd#><$Q0l@Qt$Zd^0uNuE?CBMlRnM&H=#Icx$dQ-ZbCz7I`g4u z16*9B zyJgSr9z)JzXBz>JA3^DdDgo(mrR}Y^d9qi7t=;zMp7vlGi@>oe#>x+`3P4hz-rkvT zTYNM9t9pXvR%%#^L4&P>r*d}+LC5^v4}lxIoARn#aG*f7O|65gGTG)sfr9w~8)`0e z8DLF>)4vxzLwsurhGbCOq$Kovf3U<7PJsUC>o{O z@;4TV!YH>nn#=bbIk*dD;{TxnEEEfRqXW#p@sa*sx9)fz)5K4fNBejfre=xf-LWsb zPip6E28;)tN^Dl-zi;>U;w`sP*+VPI_jB;n0PZ7f3W{BxgdQoFE<~9bES@MOrQmlz zk52=#dmd8%vS6QMBy3#G(s1IfeEWh!ovFpB&6$0hly(lchsPA8*K~k1*&3nlV&Z5Z%KM4@K!;eF{hCnzy*z7v9p~ld(QUk z3Eobxs~Uj~bGIpJ*~3(l@p@X?BgB|>Xfohh3))IlP99H&M}dzS-s=8EUNeB3=jH3?xKX>8Tr>$$o4x4N8MJ*PSN?w z02m}bMf#SSuibBSFT-JBegJ{5AIx6e6z0WiIeKGu%KrHSXyp9S&$e}lrSpvV0rVAp z4LL~BEnHPC;lIE`n9n?HnM^J+0J=OIy|Y+tjb43VX(zHg4mwTQ zkLn#(bv)@@^(>g^%$E|belNiMIb5G0EVQ4M?fCG$@~kil80NoT_Vr1dr$~cZ^;}C< z5n66N^T*UhI9Y5s#Q*BqXggIhY}?{*;gg}TM+y6V`8fc-)Bn8P%Fp+8YEG}X@Uh6? zd+icpVKytOto@C@$+!R3yD0UZ(X($3`zQa#YyrVQZO0;|s%OcQD8{F5Bfm*GOPTk4 zDUNVR9 z5H9h6gO`krezC3u7L8P#4q*uHh zfZS$Ok9gnq2`^ta0DNNl{@R3TA$rFg%>`0$R>7qsjMoZIGO%XdL!*3NHfJr<6^QGf zgbcokKXl2U*39N9tKRRkLisoveLhG9$)mD2k}3ED`XIDNDfa(aAByuc{X zVcJ#w9Ne_&eblnFxsfvDchd1ng4G#@_z6dWU%Au06azvY+AiAfv~bd=w5%_1)BEMZ z%l(z}=lF8nnp3M<@;Cx9tF&@#(+f+9hi~(D=#wvUmTp43p(&bI#id7NeV&y05&Z%j z!-5WX`29lPBZkhJB)_Mt@19qlQ;EXv=}Fn=!degIS|VlR){9ADp=Vk#&BoVQ6l5O+ znJ1z5#jhlyk{|CEbnwXNiKw=Oa3>02`1~G6Gz(D}xh2o{6>YE%#kbyTm+$qN!(1=7 znwohqLw{WOT<6-Fx>R>^M#*MQuz%;>vH9FD>4rqs{~YS7y_sME?eG5H-W|qgpp2>? z9$)weR>7kj3y4|Ax_dZm>e zm4s$OP~o>HH2w@Zn-AfrdwBNblLo7Mq1XQ0^o-nQ+|2B7Rw?S%n%Qz07DJO5L7Jow zur8xaUygR|5<8BqJ{6L!Uxo4!zWp?1bG2}~yFI@cfvDSFZd9GR?_C+%&(J|JiV%x{ zEX9|A8QqB-C;AR=DMWWV4Lj`mEkzoxe%T6n&ivsxIuCZaNew{0cR$4wl*)Xit*9R{ zC_MMwx9zEpGwRod;_MBID)+1}re*h9vc%nrOaX?*e|!eGKD|Nlx4m{iW<~ke!M%Py ztEY{cDBd69!4X0LUwKjIroiu!hXRAJ7->9R(g-6GcSlz~9TaD%OlxA%c%8Z0=4|?P zo!{Y$FTDTlNiE_(4-qFZ^CVouk%w$UlXRRvpKZ>Rt>X7;MEp}dGtOO$<}y8OO8BzN zP(?UgMIW_scYmR2sYkUnAxAmr3O;Y;{#)2Jbl8tsgnU8;2YK^X;2C1KAqGyv=e4E0 z)(+keY@Lf#M(4G|T7Q{)qoIl&W&ABM$b*TPLq3@X(GarW3~Z3KJY>xH(wP)mKMRHk zpK^j|l)&Dz;;ps{1qfXO`xx|K+t0N|-ngT^JeQ6aCG^+q9ajY)@rBBY7@wCM>x1h_ zT(6xMHNJJM6543$W8sE~sWL;1q(Ok&=bo(WeYUC180u6d$~!^o$6`S2Fa?eW%j6L` z=4ycYE-vgEK8Xkmg*-wJVM;X4huX=XS{l-4G;}4o(8rXTgYw%ANDqJZ8&g1s`xHQD z<$5NR^8tJI>;Vt7_)+Cjp(nQFcr^~O*Hwj?JFD#>lMa1OB%_6vSbom#u(GKU-!^^u z?gZcV(0p{@m%H_IX1Yw)MJ7K`E)OyDuT47fYo}z zw0^0&1GVXyy1V|RAvV-|pS#W*x_sRY3JK~njd603qD7wT9b9q^HNmu%4ZPY%jttT@ zjvSY+uQzF541*X%A3!9(9$ctDbc_?o=YmrSKnlh?#Uj8jJO~1zyI{q_57KmSvg~jQ zSow>UB{xeJTaP|qqQid|Vp#|DSJxCoaGk-}We`Es0_TJ*%-CYg17s4}LmQOk-DJo9 zY|Uxmc7451penNS=X0p%)YaSjjqFn<8VVSLnJN4{D3_qCzS&Q!3~AoqE|`;C=d+cO zdm{-hpJBy^PVli0Y;~Dl{vhTs?7X`rC~=q^fxPT*2SEYJ_J~aCO=ozFGYDuYVXqce z-jb%LmiQVhz_$T*Gh5>pCD`oaO}<|D-8p+he4cw3sMJy2lr)FY)q$b5jvIjLl=H6HvD@$KOzrd3<65|VsH1lrK&Q#Y5M zeCyagd_*M$fBI!F;L(XnsM zL^gT;I+1zB=mAY)a5m;z1uKq*8Z7-6vD3@y&R&C{!FjCk=rRmVDJ(@MD5Kq0R&|3% zUd!%vk$0eEeny-7@;%$1YU1Vo)7jHN`In{c%!O;0b8YF#2|NE=?hq{V?XhIn*9oUO zpm^^Eli!1XO|Xe->+M2TM@&w6>|CVxpQs;nb(rA7X#MYm;7w8z z!*xvY-9ITT#OE@g6D!+W`uD(F&$iX%Em?shB?YUDD?N2E3l;Be;ZtXOY6J?w)0_b_$oFz? z-sW4zF=P!DF$)<8@Ys2==2(Q+7s zC2nJ6gUjOwR{};3%$DIK7F*R_*IIJfJH2RdhG3e*5kvG{ee#nnZNomIy-ypYB57Hw7dMa zD|)VBB0L#PtMq|{TJyxG4#)qQ8y&;vRShz_Q}xo?%MV0|Gm=^yJxVKjwE&bNBJX+t z%*Ol&r?nuKJ=h_1oaFgzc8>Hi8Zr~c(((O`|NV2&g(E66;pwH*XW3L2GhG>kfAsiN z+Ve8cgJZeV#Qez;xN2x?lm$bgVj$j9w5COFw`A9q|D%rZYy0u{rRRH?=cU`eD#MU& zHdmP_FDKo_)Ym6u6QA7@1EJ@U-h@F?+VEAG=Vh2~XPogFz@Y2B`$*Tw9H(gF_as5P zsi$XD7S$;CeL_VGb$yL>`juDS^jvPD_v=YQSNqfD+ST(5%TeNjV=E}2!*lKHV+TJ5 z@AYkK>+Ph7mG$nI*>Rlb)mvB7#y8cT9pFRn-Y&62g{Et=uWS(3uR&B(ACbv^qsE&j-Oj-|I=<;cub;I3ZC^| zbqcW(apzWQTEC^svj$kC2job=&vJbSVLg=357tR78iydzMe8)79om~kgu0h0u%qMq zs}Wz(X|g0c{EuU7ZP8SivIdH>s|lpnH&aN- z8Fr_3Nk{dX#3dO-GKB`a_vxdY6vR$cAy3R^IE#@YZ;0S$HKceLk6mjDr;>+i-js?_? z1CDhqp`vHa_lpTOlXs=s^f$Ujqlh+P2FmXRQ5Jh+V4^I~iDem*y&UR8vh?$ZZ-{*-7{`R{Z)x4ckq-%K`xEXGBhu6@i zE#I$9{`ZG1zO$6Rx8>sEkMk&ePyWt5-_JAlbeX3!fBq^y{i%xYX~CewRqyjgn0K01 zRDK6e`1L%*|2}s&)m6jFSq5yB$9ZoN@(uyXil#p ziIoC8L3l$Qeg+dWv%T<$Oc2p}dhX6fD}5ZHa&0MW$0~Q6PP?zSX1%kJ6|V1pcHrv1 zZO_nhiO2&7JQ?VDO{zJ@J?5#0d8tkFJlz&E$LSk+9H2`LR_$_x<}#mGq`gfaKX3J- zyVdm;2YJ=<_V_(hioL|*Zf3rRb_=wt_32aheIIgY>}B+D?xuP@50hcved_C>2e9FD z73li;4k_E|lLj$MGo}7C-|_Vl5lR?CAmEBJTM!-M&0T6_#^_#a@^tp~0Qd&#d*%e& zy^gy=Dm0Xh{y_QM3}O~adre0RQCLiLuO-w1COi$=$A2BD;Q#2Gi|K0QCFvlbcXL)A zS{-??$oP0utjptM()iovi&S!glzR6o(>m)&wn~r{))R=EvF-`6 zepq4iCs|ft-JykL7D&hvr~6i>;z%!Gl)aNH{I2Pb7gjVu@EkKbjI^AC_Mq&vOh}$nB;rq8&aXc%!Bo|D%^e+GKS81hQ zzb^3-g)3YZ4PY2sM~tvGsl4IB0tHNm$hkg3o4xK^)g?u9zK5=qqDukPPy-eFo2e6^ zEW6>yZ4vNs9GB(D)EKS|#!nW$SWK?9?&4yQ2~lj4Cn~NSJ9b|IWA2XncLzPu&SRna z5#l5m0V;*uyP?k*5;%5^Bp83Ch}3H_m&*feOJ;d~W=HBYH|AP%4A-pa&98hWWkBI{ zdg&{tKrvxRc9Fm$P-2y@qGS@Yr^t<-T?=*k;&>8&7>N^l?0y8zqij|DIVEjY&Cc6A z2D9Rq`10Vuj(G8|lc%;F*z98Z2-b9umwmHd`mRHBluFf-d66?C%IbZ8B6F<*8~B~M zwas@Rj(W}2k)1`^6RgI1Ei1oJWFV{kl}Cp-lDD2q0(mN=(!V1=ydzN z587d4KeH{`3e@I?qx_{*h}lV+Bj=W}!5H&NFLt`?nrel(MzK zzirBN(b8Gc1$S8e79NDMx?8WdWrvRoImnPP*V!e*g$7Q(swsDlsS{`a4O~ZF!e$-w z!p;e-*d>p|agMG2*VYez_%*C;T$EnRLQ@}?d`t{Vc6WDBmQ>8LvC$uA`Z4kEi)*3)|E5xs-dMp7WCl_5#}YnC|>(vszaraSfCa37b{Txd%cNfzb^f)ueSyD)kd}#gxDo zfnk7C*<&EEM-$f;`C&``$6ywb%x9pu%B)|WW0zVrQ0$`s#%;7fMcWvp@78D%VFbO* zB|V{8C~XF&L9St}D%1kg3APny9;G8Ekd+@n)rEAOf+dE3WArb6s*pAEP9|W%rPieN z0D`4?=)DtqL<-e0joX;q^7l}FWmHjSyrn_<^T9Q29+<-M<0RYajmrHhHyYgJ3N-0y zO!uJlPwU#YOvU&YmB;bv`~fQs+Q>6R>omRbfYW7erjF@vkOLNz(8l>qS`7j+iiYCLG)z}Pa} zP0bAjIrlJOD%mx?`6xbu*m*MfMNo$vI5Zjo+Pb*nG`r)qL*t^&xXpe#fjMP=CPHXj zY4?q5ITOrMKQ**9;UZ~z55Vn`#?X@{s~*4*=n22lJZSBP%c;gzJs!KoflGxeWfVV? zYAPKdeYQ8_^X)z`&Cn61n;|FPFxY^qwtAnsc*PdzW$2_<=izBYvR9=?*YQ0edcf82 zX1EKBULk)-jBqPEQ*A#ED1y+J5-TvMTg#gJZvB*N^9=>n(t z_%(BI_c3w%U`XVr7?Tw$U42f6vBSWzm;}t1+YibpE?x?Je&^P^KsOx{NlO4=(i)kZ z^#`fL$_Eavew}JjBLOv9QQD7P^&QmU`plZ~9{DD34>BH2(dd~Ih!@TdjfACTd3wI2sda32wGp5ecQ zwb4an9&2wHu!%+9z7@Txtb(scIz|?3Rkp7Ny;!jBLtyLzqhvEhqWE`FSaJB>=- z9U6R!PAF$yN*~`4T_sZQ=+oi6Gdt!mHnUiRE5zXU1Cvp)R-FBkjraPz$Bxk9di;@+ zmLe@vzB#B1rJ3E{{7!#Vvl6Z{&J7^jdL-Ma5{x{ zzKLdO85SUY0*aOt2ZY}gB0sf9&2)`aTgaK*wxJ{a=m4;_G~8ms!iezJdFKj=($!0~ z=|r}X&>m!%ri_X}VZLk!!EpV?OmrQ7US9f`5fK)1v4u?*#FS$p)&5>|k;5Mp?XbZ; z9Y;A{lqS@D>gai9LNw!uS3z97ncRMd$Zs2LCctHm)YsYn1QN06+;$UuSLJVL`mYRQ zeT{xs_`Ch01`pG{?~Wtj5Ejkqu;%u9(K{X-%4f=3+Lxi;4UeKLJ+SAs6(PN z1}S&Yw)Bz!c$CD4LdbYUz5x)ETlaiXTNE85uB34eRqSIUsY66S>0|= z<#MW(nx&h;G)CNq*6IdnP|(&A*ihl&J5a(5tsZk@u`WMx$?{p{)kGg!qV0|OjYJ@< zK+^;_5eqFv73|Ei&ZxkVeoDE)b)nbyM~&rsu}z@&Kd!**q+tDvGs|~G+p3nz%hIP7+Pa4v>Ih`TSgp4J6$xKhd ztC%=7(UvNS-j5E@Qk(=JO*^5+gEI$&j;>jjSnc&^V>8Rpn;M3d^ETbBkOopZxC1h; zyt&O7lfa7_-*}FdljY5|&X)JfnQ1U8@WAoXnhOHCmbKhw*e8$XS03V#>vGtWdb9&> zxPPM!M3pkR!MQUsu(8^&O@k=9^qEPF47l2uR9g&ntHA<>PJY>jc>TV9Tc=^g9At&C z@cvWN8h>9$ZudeYXO6=vqRA$|t(n1HcPc#ND4w3Ug6_iCR$rS_i4c8_B$H75U{^id zsRY3N{5(02zukA#yplpg>K78U(o*1*d#xOuAjFd$9-bPTqNB}@lKM{G(y+9@-yGU{ zt_Ny##MHGL_+}711t3o3%80kLD7UF@$|A}rMFv`@P;jS_PGi;GzR`F07+NY?$x@`_ znNet6o;))`I9nA`C#VonG|>E%(hx?p1%PLr!@L~cC7wdxXCd+Ql;Wt!Z_}&={bg`# zQUkWosxjc;37Enh@5wP&a!n%(PxT@gx=c=-9t-MT;Z+mnodL33>Xtm9Q1m3OKo7~Q ziqyX^@h5n^cV&*w7PMm6(Zm9XMdv!s2&<&pFW$hKgFH9b_bRLl#Owz!9?kW6IBqxn zusVo})ce6>pP%I3=)Br$q$-15P?ufS4OOB-6Xnx;)zH_k{t8p<9w^DzyOFd4Aa_Qc ze5os`H$mq)tOgy^4q#KUI3WAuQX1GCqPj9#r5 zi#-duMp17Rm7+RWj-2zr`41e(=Z647BWifN>tkmk58SB`dzaf)UK^}+wog93m&Mg! zvbbE41w1Ow}m(bhJ8lf20g3AS;16eU47}12sc{CQAAZ=3r&=6)% z5}Ie9@0(N!m{qJI^YGyuMP<94l_ay4$#By<4h_U$6oQx5*&H`H3L)RjlL{0&A7GVnr*R?%0zlx!ZADb* z*aJ6N8$FbP|4bBlYr$A%h*rED98lcDKB>^>xZEQhpUhNjIpThCcykjw?f=vZu@!?F zou;2FB_ZO3m*TI3Jj)!yhmg~bKRKGy$F7n|GJ=`&!QECL)Tb1`_B86g3MuHVE`+IH z2fuhnWjC=<(3nB|2zN~6mYSHOR@1{myX9PX^3o zRezf&OTU6Nkz1OXAu|a3EqEC$zey*TIqBYl@2Wiqp3z)B<;*7c zQWLfG&!9=5ucV3$jr$1;v?D16Hd`$EM(C(-fYzb@%( z)vJwy9GD%xED?N-;qt#6;7=Vn#vYBtTUTv;1Oh$}ceWGP18)Q}${g8w-T+%)H<^@^ z86I4O;r4Vi7Yp3BE6MC&X@2!luInyKvcA{8S)7`s57I|pFH8JiI~}q%!v=w;Y}H&` z|KJJ`stm3+L?ox*TF;+BC#nWX5Q$UE_cl~l&a5jZsP~*D zq#Kq>z1SOIE87{3UE&k{X3a#VgYR>#y?%m*fg_tO=Dq3WKJ;~WHxpl1<*f>$9Y4%O zFvZy>fI!X~Pt34>s=BDY5hL4$rpvfj-D^?gX@OIA_T5A$DJBaGw(TF@5<7ui>fU08 zSvR+w(`~oIeW6sy5C?rF)a``=t4$SFf?KM{Wut80$D4E~_laDhg|>E4T|R8H$p@ZAeeu4-{Y zRF599;!uB=`8KNqSpZ*046Rnd`QSE4>kI|&oiDv3A6N`{8-l3)(M0;kr79Dp06Us_ zwDd{c!z0kvfA7;*;#6CFJrWJIf^sh*_*5MY;;RV~t`0^a{|DCN+}ogh0Uk{5!1)ex z-4$s8dD2Zv`5kj%Vd+A0)I09+Gk$x@<`IF?$Nl~N;IfL<9mU?-TZu5RP8{2&HT-`b z`LCZZBrCRO9b*rVRuy0HEm7^dFV=dlccSK!zb`xbVQS0)VgI$4DLXYDk_4J^1i(at zif7eMliURvzD@5z-#51B-_{P}$xS47VhX3tq^SHkh zAN4syv>VMBnO=V}cwQqs`Pp?u^kpETXsh`4^nF4Zu5T#S%J~ z0=086-%_G!>*SR({^U_N{=x=;iXG!%+t757U!kS=q)I+_$vLc=U&O0xCkLkBTYLV$S{e;S-4P|?re`gPmB`sz+6x1fDG z?pn+0^MihSPS$M$%st#R>Bu*pp4kovuyp_?bgF>ZeJH@34a~Rg{xDM}O)0k^R_>Y2 z8-$tGv^bT7ln=Fhu8k4wFLf6{2Eh!-H$6!6&*KBh$9Dr#yQxkif&(C$O`u~I@8Rpx zJk$4{LAG9SnbnR(YDqdFFLC*h0t<9%Yrl;|)DFgxHE*1MNdYckP977$w|`L3#eP|? zZ&W)0du>>siI8JBjV(3*d(QdbZi1vK^qMEa&nwM0&MPUi6h;cDfm+v`gPz(})K}GX zHns+qsDZ)PPe~(DfERQ&b_P;wfJxWF)*oi8v%x^R8H(Crg=6GpENSR2&5xxzfPA3H zIqOvU`UL$xl3w*ohvf=rTxX*sG?E6=wIGP#&UF?5w?j9Ahr&xWPDfW+auTe|-Y5%j ze#>69lfHLqTvTFzU=;O3tU4paF7H4QGW2us4_GV0M@M8Hq9yuE1-bbAuJM|=ZLo5* z{PU!I12&Osxo$E_GBJSyv4-eq7{iM%J4%4ryF108x~L+jGp8}3KrIMnGXK!kVO}6Y zm!!HqXvrL)6ppT8wjNFaVZ1F#w#v-AS+LXdnOsw)mDk`kuT1# z64lZbCt4Bg!2(R0%PY)RGECLjio|{)tOW_>Y9)MS=le(J%1p`AVP}F-d1A_{KLT<6 zLx}DbNH_P##y`(R* zF+VG%r5i0hPHjZZqE?ZRP|=ihc5#pp-{QIE>9e657ej>QRpy6zgsKaPLqpY7o>Pm% z1t{>sIJco%P?(YXsNOQE~#;=42by4@(p{4KUlO17Sc)TZC3|RuL8S*3{H= zG*(0;gfZ_04thIf+<`c85Z@l#H9R;@Sr)bdLX^QwJlm5xoqk4P6kunQGLF&|WX{Cg z69T5U)pcqK%3pEOH{1{FQy2CiiWle-9x5HCvdy|j5)S@-7pg@BEkik-+fTxJrzB+~ zX{u_kV<9Tee{9V;zb->xvMTs&G|xxLI1Ey0YZV3*bWxWlP7yRznOsf9j0y)oeB&pc zkIiUK5JP6|E9T;9Ybzq7rNQY4@wl4dUk=(ey(TePF0G-*Zs%l70loU60MMa?+Wfhu zgQH6Uau{G)pRoq~DhN5Qk3Y(x!vXU1=HLU;Z9xB*T^7XOaAVAAf9yTdg=m7`*}}m5 zDbJxn6oQ!b$aX;l^h|>XL5Az77h&cTUc6M-n-MV;dV?O`3E^S8`l&VBLb1T~Lm+`d z^uvyNxDcJ+Q4ax!v2uP&bD%C#oMj15AclHbzIn3p+o|I4#et#V+n)ph9*PAb>GM&QkQkv?Z=o6ARCe=<86t0HnLhYl!| z{6tUCrv$~U&>TC4+PostMjqHyNFzOSj?D`6hX}hyQdU0*T`Q)!Q;csp%b}B(pf~^g zD?R286C$N(Qe$F+Wj9|q7!-9jml%+~gbW+dH7I&#JN&i?s3#4JCrFz=?=~)hLmFke zLT!PaZ#iQ}8WYSp(K*ph1~lL`e`B$QNf?IUENZQ9U%>($!2h zaeKE4lx3g47L*aw;lSBSfe|7gM$AAQAW#gz&AU{J-3OY$%R10tKv>W`!fV6dLVPs# z-zpS5GEYYs&WH^DzbfP}f@Hadm#5*t%Qp_X)RqOJbNH~JnO$y)A`z_pb>)as?y$0I zQJA+SP6e_Nkm3w^NTiMGg;a0pLo%TqK+s3MIFiiBsrG&BqD2-m5=m{^k(xyStr%$1=bo9+gv{vAtn{cTcGb-<(u zRz7(MXyHt9SloSBgF6o&WSXw7Z2x%@JjVo8=1^Un|E;xt`e(v)JXIj@LKmyDf*wC8 z9QO~ynx4EF=(KcD13!C*g8+CUo_<>S6pUr8KV2878A6k1K06IXS3yg;Ib0Zox}}$> zrmecv5Q*UR=oweDVz>HKC5P+hdRX@SB=Qk$Q*CL^4|?VTm0cHUXqa5t3}^)SXj_6n z!&?eL&&d-no_lH^JVhdcGm*s!K|7SODcsZjyW@ z^hFnp-XMOH2C|O#_7|MHj{3vabwKK~3!d0nUfZsR^OVS(Y^cI7+ zz?UDW8aa;&u14YL_zZ{b9mV6Eg&U+BSCZrB(b43Uw$a`$=lp4v&l@5u{gy0!&IvS) zcvY^u?TK8@HWZxU^j0L|y6wSuj}&dY6WjV1|fAvO~WgK9%cmLKrv4SJbe zuZN|a63thN=?)rqRXq%X2p#J03uS7w7gRM=@lX+0uu%I|0TvC98q%}4NT20@9hpov zqzx55S!qD>w`n>l#p}{YO~^{n-cTnG%;Uph!3G^OM9F`)$)kJ&y3LfnC%e2&2uW+u zYfsA8iobb3OTV?9Eya^6LFY$pSnIPfnzV9Q5PURJP%^cI;Rzf|Ue3`8pdXH)OlhjO z|K%_=^a&Ea-645yk%3F)N8E`Z=R=uW-%5dnUeOkQs-{TkW65TDfK1#D%EBdN?J|9W z58C|4c-&@P0}kj;N)t?DD58zTZZF^YxRpC1KhxiiCIcrgrN62~l_dqAFK__9Jo5?T zc6*y^r7Dc&oct&}1nh4_mIg2vV>RIcq_%EsUZ8P#R1auXD9i2&h27EuIzne_)mb1F zff!mf{QfGfb916ewVy(vrbQJxvmZm!trEyV!`-|v{;~Z^EHhR3qx{bbrDKRyj}(maMe$SJn;+g@y=!3(TaW>Mw#{oC}Q5UVhwG`NH)q8LuKJO_)KvW#VOM4);OU zVrWZ+RMG{VZdQz$g~3O;zwOF)d;b+7ze{Y+vS;J(u^uT4|Gj*8_4i<1X-L%J5Q49# zy${mxHjv+xmseZomPBe@ttL6Ghb~=r7gtv1ELp`@k<^t}L&dQK94YmiEWwvO?Bx~~ z-`QK+t->i?_%vA-vlb;26Po>~Fj;{zs3$A)G)hdyoay}aY_<{%A4we=hf1hGQPV~z zsX{5&s6A5DCy}Jm%ULxp8Cgy^8(2N~cGpV-9wII%?*xM{-SG4Zgaa{WhGcEe8DEi z2s}6m$U9(vem1~Efpb|QElZRM1&ortAuY!RnUB1JzQG{!I@&0hY+($;A426(mC{Jz zyk9~3{vVnax)5@JG%qQC9lyPd>j zCb#2j|H}3=N^!bBLBYXb6IG_Dw(@NY2u!S>jf;JM&pdFr+hdrzii$@`J zQ}9Mw`Yc2*JDW&RGGeJfq)se}5i}KwP8G>h|4Q~Y%bN`4PdjHKJ9+0{8hg{v<8T!e z>}8Q`#MUtrB}ojqOsZX#ZMpT;{@+@&`}1U374mOKFVIJmi|~KF`^^O9qLEU$Da&cA zFr=u;W+OB?OVtdlL(F_Q1Z1fRfLvgtZjL5lFKHMq4;?RT!h8p?0YlVoaE! zkeJ~+v@I~>AdenmLD$Xfk(~4Xt#=4czh3Q8CwAi4Fg^gE`}S{UjKp4BC$Bdt_CXhckNI>{OL zL?t#aqo7OaTBYU{^vGCaj=%HCR|=oNOfG+@s3o(-@MEes9+qa8VVsSleK2l;DSZ)*Aeg;|A1M3cIXJh0$ zk2ECYp3bjA+jaQ;%sfG;*yoCjm=7uEdM*Xl-$xr_7k?)REp8&q!*vl8ZKa7v32$3g zXn>YMaey!x9)<}l^Dic}tQs%Q2R#@X{{t5h85S-b3D*|8NXs}LrD8OczcdpfDjg&| zr-bEALdM6*M?uD1neC{+-&0ynmE^C3yMwtTf)+;io&OY`jNCgI6N7*l5g8K^#Y3q6 zD+xyP6!Mu=G&ScCTvXF03JV9iH8}-iw@UTG#)iAA(;VZ6eW+`BN)p+8DFj%7^W3$3 z@R%e+;o=ms;!l13h57*=0%cwc2b9N?mBjN;SyWCy#yK5|#vt~)wpsC-Md<{ZAh#O#qEPh80Hmd@$_Z{_qZsElvq&~)XDOvlRWrA9qYpAV?V%yqR1r`u`Rnl z{}+~`pAJ%7bU$0MiGZpszhV|etmnqN%jL@W4p)}U6%kK%6EtdZ6)m!~R4+T4KudwM z?bCEcQGmPjwD+pWq11_INw4hYtH( zT0SzJ8V#d%u-TfnNpXxRVQ> z@)hI}5`qeHQCKc$Q>H8V&wp(%j#nMf<$b6h;9I@)n^~I6yN4>#XDg*(T>Ie!uMQvG zpzs|T{C2K^>x>tDp7vUZ8|{aK!GqR8ayi&nDVqU~>64(2vIyqZX<}fUQej`sO4~$G zVwldd8?9ZUvyqr<5U27Id3-ZSHA6f@>Nl!xW8Jl=KEPJ$h2vt3`XtGk@G5=TiG6A&$*t}yO|9V!8{ z`eFx-G34bc?f@R&)jzAJpcQDKpq!rOFRI~Rm_z<+$sCRgL+*kEYs~2X1j7wH@<;rc z@?j9q(kP=K9mqmrC_l4Z4kt8^F&lFmCkewqMs|Y~sWjslBRjQh(r0MMtznD-bNy;g zb6$-!@d46raLWPc)b2w;@65MKj86Dtc8_xfBlbdd(VUPFihOX91j(ZlQ%H)=a`z zcFB336i>4~fw5g+x7r$>NlhZD?v(vi42#gvoq=%=eP z`9hc+*n!C}?AhK7^Ao9dOKUcxnvb4+c}$%ZgSiY)gr;KB_+!Y;?Sh%E@8h0qorW`H zW~U2M`EbA+!rWNJ+Mg?y@x<16Fmgm1 zSFfA|g~MS1s=a>BEG%Uf&~)%V@}hb8Gn$+lA%BT5QCWK`;KVa8r91mn4Voe2m=@NRWTm8MCFIud;V7Kng$6_k zuWP6_DtQ3Tav82n3@_~mF_|a(Q%=_|5k5*?6PjXrlTL)ry=%{7kL5W3WB}IvmDdqfGkVAs*yzuk!#pR_*k;!F4bA&_R zR~B2shw^tx)*KfVm!4ag5*-nhR0*WYd}mf@Oi~qle3V|BP#^-QvkDVKlT&gF@=_C1 z>v%wEjpoLe4XS{$@~fy7snwGU!lL+s1~pJ-Q2e+=oz(@^94MjS(+tmecX~*^L@RI1 zENz_h5`v;*1p+AITrQ~Eb(HkTT9FO`4s?$|xu)tIUi# zUcm91wY_C=r9;qc9W^VWO5g$A27bk32nm$ZP4Gqi6$xcbgYZuH}w1TSqjGUtC!lHVS(QoC~M@L1)X69#Q=XQ<} zE>(Yiey#|13V`Ca^~atIF78Dd-l}X$I}?+dk(rTR)G)LN>}XAlPE5`&FUd&{j|y+n z5XPRUs7i_!q{|0vAq(->t9F-ofFE+65nL@knbRLpJYy%kyk=HzsRpTb&tP6pju>vS zyQo{w^EI$IyM|f^cZKs#S8xv=Ys=%BybgVJde6qJ;S(96P8GC!wv)amiAM+J62t<^ z_HvA0tJ=X4-<(45$ze(^Q#-#f5f?FVAenzKi=V<=B4#II3%Lw9m*1}ua?hp8pdc0v zpD&Y60M)LY$cf{~Esowc-tIhUVlF#v7^-%c8@^Awq#g+lrJl+Y9m?PaRmtE=oR-m` zXqFN#;tK9fa-|^k$*|r-*}@CyeJA6&Oq+j4P;8(glRl7oN^E)Etz2;<}~pI9HySIGgzDB zs41o5qX~@DpxX;mcuDSIVq#)qVq$&`Z-GOA9_x&l+D~N-Qm8V$6)MC)QwkR~_n8-D z!(1AZ!(y?hOo>Kk2kOH#E~ZggA{Cr?-~&1dt_b1LPL0i3;8GZ_r5O>AHOSx&&%zep zx!f>&y*}f-Mx%$y#<8?$vRc9EPMcmcy5Jyu`pKDDJ=B?Q!x)Fb9At>bbuO!Za#Cw` z0T}`Gg4LiLVo@0^wnPhdoz_Jemq{I@@y7K~auPnfR>@?rX!Ieq9xk8ZcG_mulLol( zB4N{NhFA>Q0$fZUSmJg=A?#aJ@;J;vDo?6_0RrepYtS!D%$q>y9;->tp;Ni4aavJKqsZ>`=;t&uNZ~mQ(_?ecHn)9ILSsp$XVeNA zYmi3ch~~g?I9&%^M{unzQ_2|=$VL#HYe^{|U$lFT<6;JjMH}SGrpy zN->?r9ulZ$muBY7gnMabN@sF>=~#Q{m#TIrze`wBBpVo;YogCh!hVgWbN4 zJ=PBHYd>kE6`AYN&KfjJ@W#@Q>$*_VXyaDGi^t=0qhY`Rfc9MT%=+Rn2tUvPKz)#o=-a3(A_=&G13)5N{NyN*Q_XDug`T!FmNFD;y!QzmkFhJ*$k4T zY8T}Nl_`Ly%f{Ndt(>yDX=pO+{P^HyMNyK%6b6UVj&ccF1y3h4iv+Y27#7$AfjC`; zrc6q%6y)66p<m%PuUfe?i?y3*FSTU08`! z7lI25Mcld2lG2r6NJ2t9XXbw8CRQOul5ieBp7(2J?wyz5$$h?<#^69E^A)k26z?X# zvWcMDzwPhZ!w-dOck(3tQt}(wlk>PV)^83^w)i9n4-B?Hz$^R+A%qa(pEUdjBrl{K zaB(~VRF`#?10Z=>EhIY|AwAtZnN0s;Mj-bx)&OW|gZ*FgHyn6TLiZ=lu z$CE9sJcP}k5#tO?=joEgktn3pSzI$GVZv4KnbvdLR>pyCC@A~Xj&$E`$PVluFmz^&QY_)hf`Ca z!~nj=shzit1;XO&(*=U)gRgb>dpsCMxrBirn( z)Y3AN_G@ueUCWGZ>(-3~GO@fzF)y}_jbmmk$8K5FjmysbuYbEltMrl+LI@#V6sh*- zQ*UrCEw0&I27zHBPc>xi$X7qE<02LI@$m3(*+zu{I%u5JCtc n#Nr~=E`$(52qDB`Ga5etu*2orp*1~f00000NkvXXu0mjf?jx^p literal 0 HcmV?d00001 diff --git a/windows/deployment/update/media-dynamic-update.md b/windows/deployment/update/media-dynamic-update.md new file mode 100644 index 0000000000..6f79f71c7e --- /dev/null +++ b/windows/deployment/update/media-dynamic-update.md @@ -0,0 +1,453 @@ +--- +title: Update Windows 10 media with Dynamic Update +description: Learn how to deploy feature updates to your mission critical devices +ms.prod: w10 +ms.mktglfcycl: manage +audience: itpro +itproauthor: jaimeo +author: SteveDiAcetis +ms.localizationpriority: medium +ms.author: jaimeo +ms.reviewer: +manager: laurawi +ms.collection: M365-modern-desktop +ms.topic: article +--- + +# Update Windows 10 media with Dynamic Update + +**Applies to**: Windows 10 + +This topic explains how to acquire and apply Dynamic Update packages to existing Windows 10 images prior to deployment and includes Windows PowerShell scripts you can use to automate this process. + +Volume-licensed media is available for each release of Windows 10 in the Volume Licensing Service Center (VLSC) and other relevant channels such as Windows Update for Business, Windows Server Update Services (WSUS), and Visual Studio Subscriptions. You can use Dynamic Update to ensure that Windows 10 devices have the latest feature update packages as part of an in-place upgrade while preserving language pack and Features on Demand (FODs) that might have been previously installed. Dynamic Update also eliminates the need to install a separate quality update as part of the in-place upgrade process. + +## Dynamic Update + +Whenever installation of a feature update starts (whether from media or an environment connected to Windows Update), *Dynamic Update* is one of the first steps. Windows 10 Setup contacts a Microsoft endpoint to fetch Dynamic Update packages, and then applies those updates to your operating system installation media. The update packages includes the following kinds of updates: + +- Updates to Setup.exe binaries or other files that Setup uses for feature updates +- Updates for the "safe operating system" (SafeOS) that is used for the Windows recovery environment +- Updates to the servicing stack necessary to complete the feature update (see [Servicing stack updates](servicing-stack-updates.md) for more information) +- The latest cumulative (quality) update +- Updates to applicable drivers already published by manufacturers specifically intended for Dynamic Update + +Dynamic Update preserves language pack and Features on Demand packages by reacquiring them. + +Devices must be able to connect to the internet to obtain Dynamic Updates. In some environments, it's not an option to obtain Dynamic Updates. You can still do a media-based feature update by acquiring Dynamic Update packages and applying it to the image prior to starting Setup on the device. + +## Acquire Dynamic Update packages + +You can obtain Dynamic Update packages from the [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Home.aspx). At that site, use the search bar in the upper right to find the Dynamic Update packages for a particular release. For example, you could enter *1809 Dynamic Update x64*, which would return results like this: + +![Table with columns labeled Title, Products, Classification, Last Updated, Version, and Size and four rows listing various dynamic updates and associated KB articles](images/update-catalog.png) + +The various Dynamic Update packages might not all be present in the results from a single search, so you might have to search with different keywords to find all of the s. And you'll need to check various parts of the results to be sure you've identified the needed files. This table shows in bold the key items to search for or look for in the results. For example, to find the relevant "Setup Dynamic Update," you'll have to check the detailed description for the download by selecting the link in the **Title** column of the search results. + + +|To find this Dynamic Update packages, search for or check the results here--> |Title |Product |Description (select the **Title** link to see **Details**) | +|---------|---------|---------|---------| +|Safe OS Dynamic Update | 2019-08 Dynamic Update... | Windows 10 Dynamic Update,Windows **Safe OS Dynamic Update** | ComponentUpdate: | +|Setup Dynamic Update | 2019-08 Dynamic Update... | Windows 10 Dynamic Update | **SetupUpdate** | +|Latest cumulative update | 2019-08 **Cumulative Update for Windows 10** | Windows 10 | Install this update to resolve issues in Windows... | +|Servicing stack Dynamic Update | 2019-09 **Servicing Stack Update for Windows 10** | Windows 10... | Install this update to resolve issues in Windows... | + +If you want to customize the image with additional languages or Features on Demand, download supplemental media ISO files from the [Volume Licensing Service Center](https://www.microsoft.com/licensing/servicecenter/default.aspx). For example, since Dynamic Update will be disabled for your devices, and if users require specific Features on Demand, you can preinstall these into the image. + +## Update Windows 10 installation media + +Properly updating the installation media involves a large number of actions operating on several different targets (image files). Some actions are repeated on different targets. The target images files include: + +- Windows Preinstallation Environment (WinPE): a small operating system used to install, deploy, and repair Windows operating systems +- Windows Recovery Environment (WinRE): repairs common causes of unbootable operating systems. WinRE is based on WinPE and can be customized with additional drivers, languages, optional packages, and other troubleshooting or diagnostic tools. +- Windows operating system: one or more editions of Windows 10 stored in \sources\install.wim +- Windows installation media: the complete collection of files and folders in the Windows 10 installation media. For example, \sources folder, \boot folder, Setup.exe, and so on. + +This table shows the correct sequence for applying the various tasks to the files. For example, the full sequence starts with adding the servicing stack update to WinRE (1) and concludes with adding the Dynamic Update for Setup to the new media (26). + +|Task |WinRE (winre.wim) |WinPE (boot.wim) |Operating system (install.wim) | New media | +|---------|---------|---------|---------|------| +|Add servicing stack Dynamic Update | 1 | 9 | 18 | +|Add language pack | 2 | 10 | 19 | +|Add localized optional packages | 3 | 11 | | +|Add font support | 4 | 12 | | +|Add text-to-speech | 5 | 13 | | +|Update Lang.ini | | 14 | | +|Add Features on Demand | | | 20 | +|Add Safe OS Dynamic Update | 6 | | | +|Add Setup Dynamic Update | | | | 26 +|Add latest cumulative update | | 15 | 21 | +|Clean up the image | 7 | 16 | 22 | +|Add Optional Components | | | 23 | +|Add .Net and .Net cumulative updates | | | 24 | +|Export image | 8 | 17 | 25 | + +### Multiple Windows editions + +The main operating system file (install.wim) contains multiple editions of Windows 10. It’s possible that only an update for a given edition is required to deploy it, based on the index. Or, it might be that all editions need an update. Further, ensure that languages are installed before Features on Demand, and the latest cumulative update is always applied last. + +### Additional languages and features + +You don't have to add more languages and features to the image to accomplish the updates, but it's an opportunity to customize the image with more languages, Optional Components, and Features on Demand beyond what is in your starting image. To do this, it's important to make these changes in the correct order: first apply servicing stack updates, followed by language additions, then by feature additions, and finally the latest cumulative update. The provided sample script installs a second language (in this case Japanese (ja-JP)). Since this language is backed by an lp.cab, there's no need to add a Language Experience Pack. Japanese is added to both the main operating system and to the recovery environment to allow the user to see the recovery screens in Japanese. This includes adding localized versions of the packages currently installed in the recovery image. + +Optional Components, along with the .Net feature, can be installed offline, however doing so creates pending operations that require the device to restart. As a result, the call to perform image cleanup would fail. There are two options to avoid this. One option is to skip the image cleanup step, though that will result in a larger install.wim. Another option is to install the .Net and Optional Components in a step after cleanup but before export. This is the option in the sample script. By doing this, you will have to start with the original install.wim (with no pending actions) when you maintain or update the image the next time (for example, the next month). + +## Windows PowerShell scripts to apply Dynamic Updates to an existing image + +These examples are for illustration only, and therefore lack error handling. The script assumes that the following packages is stored locally in this folder structure: + + +|Folder |Description | +|---------|---------| +|C:\mediaRefresh | Parent folder that contains the PowerShell script | +|C:\mediaRefresh\oldMedia | Folder that contains the original media that will be refreshed. For example, contains Setup.exe, and \sources folder. | +|C:\mediaRefresh\newMedia | Folder that will contain the updated media. It is copied from \oldMedia, then used as the target for all update and cleanup operations. | + +### Get started + +The script starts by declaring global variables and creating folders to use for mounting images. Then, make a copy of the original media, from \oldMedia to \newMedia, keeping the original media in case there is a script error and it's necessary to start over from a known state. Also, it will provide a comparison of old versus new media to evaluate changes. To ensure that the new media updates, make sure they are not read-only. + +``` +function Get-TS { return "{0:HH:mm:ss}" -f (Get-Date) } + +Write-Host "$(Get-TS): Starting media refresh" + +# Declare media for FOD and LPs +$FOD_ISO_PATH = "C:\mediaRefresh\packages\FOD-PACKAGES_OEM_PT1_amd64fre_MULTI.iso" +$LP_ISO_PATH = "C:\mediaRefresh\packages\CLIENTLANGPACKDVD_OEM_MULTI.iso" + +# Declare language for showcasing adding optional localized components +$LANG = "ja-jp" +$LANG_FONT_CAPABILITY = "jpan" + +# Declare Dynamic Update packages +$LCU_PATH = “C:\mediaRefresh\packages\LCU.msu” +$SSU_PATH = “C:\mediaRefresh\packages\SSU_DU.msu” +$SETUP_DU_PATH = "C:\mediaRefresh\packages\Setup_DU.cab" +$SAFE_OS_DU_PATH = “C:\mediaRefresh\packages\SafeOS_DU.cab” +$DOTNET_CU_PATH = "C:\mediaRefresh\packages\DotNet_CU.msu” + +# Declare folders for mounted images and temp files +$WORKING_PATH = "C:\mediaRefresh\temp" +$MEDIA_OLD_PATH = "C:\mediaRefresh\oldMedia" +$MEDIA_NEW_PATH = "C:\mediaRefresh\newMedia" +$MAIN_OS_MOUNT = $WORKING_PATH + "\MainOSMount” +$WINRE_MOUNT = $WORKING_PATH + "\WinREMount” +$WINPE_MOUNT = $WORKING_PATH + "\WinPEMount” + +# Mount the language pack ISO +Write-Host "$(Get-TS): Mounting LP ISO" +$LP_ISO_DRIVE_LETTER = (Mount-DiskImage -ImagePath $LP_ISO_PATH -ErrorAction stop | Get-Volume).DriveLetter + +# Declare language related cabs +$WINPE_OC_PATH = Join-Path $LP_ISO_DRIVE_LETTER":" -ChildPath "Windows Preinstallation Environment" | Join-Path -ChildPath "x64" | Join-Path -ChildPath "WinPE_OCs" +$WINPE_OC_LANG_PATH = Join-Path $WINPE_OC_PATH $LANG +$WINPE_OC_LANG_CABS = Get-ChildItem $WINPE_OC_LANG_PATH -name +$WINPE_OC_LP_PATH = Join-Path $WINPE_OC_LANG_PATH "lp.cab" +$WINPE_FONT_SUPPORT_PATH = Join-Path $WINPE_OC_PATH "WinPE-FontSupport-$LANG.cab" +$WINPE_SPEECH_TTS_PATH = Join-Path $WINPE_OC_PATH "WinPE-Speech-TTS.cab" +$WINPE_SPEECH_TTS_LANG_PATH = Join-Path $WINPE_OC_PATH "WinPE-Speech-TTS-$LANG.cab" +$OS_LP_PATH = $LP_ISO_DRIVE_LETTER + ":\x64\langpacks\" + "Microsoft-Windows-Client-Language-Pack_x64_" + $LANG + ".cab" + +# Mount the Features on Demand ISO +Write-Host "$(Get-TS): Mounting FOD ISO" +$FOD_ISO_DRIVE_LETTER = (Mount-DiskImage -ImagePath $FOD_ISO_PATH -ErrorAction stop | Get-Volume).DriveLetter +$FOD_PATH = $FOD_ISO_DRIVE_LETTER + ":\" + +# Create folders for mounting images and storing temporary files +New-Item -ItemType directory -Path $WORKING_PATH -ErrorAction Stop | Out-Null +New-Item -ItemType directory -Path $MAIN_OS_MOUNT -ErrorAction stop | Out-Null +New-Item -ItemType directory -Path $WINRE_MOUNT -ErrorAction stop | Out-Null +New-Item -ItemType directory -Path $WINPE_MOUNT -ErrorAction stop | Out-Null + +# Keep the original media, make a copy of it for the new, updateed media. +Write-Host "$(Get-TS): Copying original media to new media path" +Copy-Item -Path $MEDIA_OLD_PATH“\*” -Destination $MEDIA_NEW_PATH -Force -Recurse -ErrorAction stop | Out-Null +Get-ChildItem -Path $MEDIA_NEW_PATH -Recurse | Where-Object { -not $_.PSIsContainer -and $_.IsReadOnly } | ForEach-Object { $_.IsReadOnly = $false } +``` +### Update WinRE + +The script assumes that only a single edition is being updated, indicated by Index = 1 (Windows 10 Education Edition). Then the script mounts the image, saves Winre.wim to the working folder, and mounts it. It then applies servicing stack Dynamic Update, since its s are used for updating other s. Since the script is optionally adding Japanese, it adds the language pack to the image, and installs the Japanese versions of all optional packages already installed in Winre.wim. Then, it applies the Safe OS Dynamic Update package. + +It finishes by cleaning and exporting the image to reduce the image size. + +> [!NOTE] +> Skip adding the latest cumulative update to Winre.wim because it contains unnecessary s in the recovery environment. The s that are updated and applicable are contained in the safe operating system Dynamic Update package. This also helps to keep the image small. + +``` +# Mount the main operating system, used throughout the script +Write-Host "$(Get-TS): Mounting main OS" +Mount-WindowsImage -ImagePath $MEDIA_NEW_PATH"\sources\install.wim” -Index 1 -Path $MAIN_OS_MOUNT -ErrorAction stop| Out-Null + +# +# update Windows Recovery Environment (WinRE) +# +Copy-Item -Path $MAIN_OS_MOUNT"\windows\system32\recovery\winre.wim” -Destination $WORKING_PATH"\winre.wim” -Force -Recurse -ErrorAction stop | Out-Null +Write-Host "$(Get-TS): Mounting WinRE" +Mount-WindowsImage -ImagePath $WORKING_PATH"\winre.wim” -Index 1 -Path $WINRE_MOUNT -ErrorAction stop | Out-Null + +# Add servicing stack update +Write-Host "$(Get-TS): Adding package $SSU_PATH" +Add-WindowsPackage -Path $WINRE_MOUNT -PackagePath $SSU_PATH -ErrorAction stop | Out-Null + +# +# Optional: Add the language to recovery environment +# +# Install lp.cab cab +Write-Host "$(Get-TS): Adding package $WINPE_OC_LP_PATH" +Add-WindowsPackage -Path $WINRE_MOUNT -PackagePath $WINPE_OC_LP_PATH -ErrorAction stop | Out-Null + +# Install language cabs for each optional package installed +$WINRE_INSTALLED_OC = Get-WindowsPackage -Path $WINRE_MOUNT +Foreach ($PACKAGE in $WINRE_INSTALLED_OC) { + + if ( ($PACKAGE.PackageState -eq "Installed") ` + -and ($PACKAGE.PackageName.startsWith("WinPE-")) ` + -and ($PACKAGE.ReleaseType -eq "FeaturePack") ) { + + $INDEX = $PACKAGE.PackageName.IndexOf("-Package") + if ($INDEX -ge 0) { + $OC_CAB = $PACKAGE.PackageName.Substring(0, $INDEX) + "_" + $LANG + ".cab" + if ($WINPE_OC_LANG_CABS.Contains($OC_CAB)) { + $OC_CAB_PATH = Join-Path $WINPE_OC_LANG_PATH $OC_CAB + Write-Host "$(Get-TS): Adding package $OC_CAB_PATH" + Add-WindowsPackage -Path $WINRE_MOUNT -PackagePath $OC_CAB_PATH -ErrorAction stop | Out-Null + } + } + } +} + +# Add font support for the new language +if ( (Test-Path -Path $WINPE_FONT_SUPPORT_PATH) ) { + Write-Host "$(Get-TS): Adding package $WINPE_FONT_SUPPORT_PATH" + Add-WindowsPackage -Path $WINRE_MOUNT -PackagePath $WINPE_FONT_SUPPORT_PATH -ErrorAction stop | Out-Null +} + +# Add TTS support for the new language +if (Test-Path -Path $WINPE_SPEECH_TTS_PATH) { + if ( (Test-Path -Path $WINPE_SPEECH_TTS_LANG_PATH) ) { + + Write-Host "$(Get-TS): Adding package $WINPE_SPEECH_TTS_PATH" + Add-WindowsPackage -Path $WINRE_MOUNT -PackagePath $WINPE_SPEECH_TTS_PATH -ErrorAction stop | Out-Null + + Write-Host "$(Get-TS): Adding package $WINPE_SPEECH_TTS_LANG_PATH" + Add-WindowsPackage -Path $WINRE_MOUNT -PackagePath $WINPE_SPEECH_TTS_LANG_PATH -ErrorAction stop | Out-Null + } +} + +# Add Safe OS +Write-Host "$(Get-TS): Adding package $SAFE_OS_DU_PATH" +Add-WindowsPackage -Path $WINRE_MOUNT -PackagePath $SAFE_OS_DU_PATH -ErrorAction stop | Out-Null + +# Perform image cleanup +Write-Host "$(Get-TS): Performing image cleanup on WinRE" +DISM /image:$WINRE_MOUNT /cleanup-image /StartComponentCleanup | Out-Null + +# Dismount +Dismount-WindowsImage -Path $WINRE_MOUNT -Save -ErrorAction stop | Out-Null + +# Export +Write-Host "$(Get-TS): Exporting image to $WORKING_PATH\winre2.wim” +Export-WindowsImage -SourceImagePath $WORKING_PATH"\winre.wim” -SourceIndex 1 -DestinationImagePath $WORKING_PATH"\winre2.wim” -ErrorAction stop | Out-Null +Move-Item -Path $WORKING_PATH"\winre2.wim” -Destination $WORKING_PATH"\winre.wim” -Force -ErrorAction stop | Out-Null +``` +### Update WinPE + +This script is similar to the one that updates WinRE, but instead it mounts Boot.wim, applies the packages with the latest cumulative update last, and saves. It repeats this for all images inside of Boot.wim, typically two images. It starts by applying the servicing stack Dynamic Update. Since the script is customizing this media with Japanese, it installs the language pack from the WinPE folder on the language pack ISO. Additionally, add font support and text to speech (TTS) support. Since the script is adding a new language, it rebuilds lang.ini, used to identify languages installed in the image. Finally, it cleans and exports Boot.wim, and copies it back to the new media. + +``` +# +# update Windows Preinstallation Environment (WinPE) +# + +# Get the list of images contained within WinPE +$WINPE_IMAGES = Get-WindowsImage -ImagePath $MEDIA_NEW_PATH“\sources\boot.wim” + +Foreach ($IMAGE in $WINPE_IMAGES) { + + # update WinPE + Write-Host "$(Get-TS): Mounting WinPE" + Mount-WindowsImage -ImagePath $MEDIA_NEW_PATH“\sources\boot.wim” -Index $IMAGE.ImageIndex -Path $WINPE_MOUNT -ErrorAction stop | Out-Null + + # Add SSU + Write-Host "$(Get-TS): Adding package $SSU_PATH" + Add-WindowsPackage -Path $WINPE_MOUNT -PackagePath $SSU_PATH -ErrorAction stop | Out-Null + + # Install lp.cab cab + Write-Host "$(Get-TS): Adding package $WINPE_OC_LP_PATH" + Add-WindowsPackage -Path $WINPE_MOUNT -PackagePath $WINPE_OC_LP_PATH -ErrorAction stop | Out-Null + + # Install language cabs for each optional package installed + $WINPE_INSTALLED_OC = Get-WindowsPackage -Path $WINPE_MOUNT + Foreach ($PACKAGE in $WINPE_INSTALLED_OC) { + + if ( ($PACKAGE.PackageState -eq "Installed") ` + -and ($PACKAGE.PackageName.startsWith("WinPE-")) ` + -and ($PACKAGE.ReleaseType -eq "FeaturePack") ) { + + $INDEX = $PACKAGE.PackageName.IndexOf("-Package") + if ($INDEX -ge 0) { + + $OC_CAB = $PACKAGE.PackageName.Substring(0, $INDEX) + "_" + $LANG + ".cab" + if ($WINPE_OC_LANG_CABS.Contains($OC_CAB)) { + $OC_CAB_PATH = Join-Path $WINPE_OC_LANG_PATH $OC_CAB + Write-Host "$(Get-TS): Adding package $OC_CAB_PATH" + Add-WindowsPackage -Path $WINPE_MOUNT -PackagePath $OC_CAB_PATH -ErrorAction stop | Out-Null + } + } + } + } + + # Add font support for the new language + if ( (Test-Path -Path $WINPE_FONT_SUPPORT_PATH) ) { + Write-Host "$(Get-TS): Adding package $WINPE_FONT_SUPPORT_PATH" + Add-WindowsPackage -Path $WINPE_MOUNT -PackagePath $WINPE_FONT_SUPPORT_PATH -ErrorAction stop | Out-Null + } + + # Add TTS support for the new language + if (Test-Path -Path $WINPE_SPEECH_TTS_PATH) { + if ( (Test-Path -Path $WINPE_SPEECH_TTS_LANG_PATH) ) { + + Write-Host "$(Get-TS): Adding package $WINPE_SPEECH_TTS_PATH" + Add-WindowsPackage -Path $WINPE_MOUNT -PackagePath $WINPE_SPEECH_TTS_PATH -ErrorAction stop | Out-Null + + Write-Host "$(Get-TS): Adding package $WINPE_SPEECH_TTS_LANG_PATH" + Add-WindowsPackage -Path $WINPE_MOUNT -PackagePath $WINPE_SPEECH_TTS_LANG_PATH -ErrorAction stop | Out-Null + } + } + + # Generates a new Lang.ini file which is used to define the language packs inside the image + if ( (Test-Path -Path $WINPE_MOUNT"\sources\lang.ini") ) { + Write-Host "$(Get-TS): Updating lang.ini" + DISM /image:$WINPE_MOUNT /Gen-LangINI /distribution:$WINPE_MOUNT | Out-Null + } + + # Add latest cumulative update + Write-Host "$(Get-TS): Adding package $LCU_PATH" + Add-WindowsPackage -Path $WINPE_MOUNT -PackagePath $LCU_PATH -ErrorAction stop | Out-Null + + # Perform image cleanup + Write-Host "$(Get-TS): Performing image cleanup on WinPE" + DISM /image:$WINPE_MOUNT /cleanup-image /StartComponentCleanup | Out-Null + + # Dismount + Dismount-WindowsImage -Path $WINPE_MOUNT -Save -ErrorAction stop | Out-Null + + #Export WinPE + Write-Host "$(Get-TS): Exporting image to $WORKING_PATH\boot2.wim” + Export-WindowsImage -SourceImagePath $MEDIA_NEW_PATH“\sources\boot.wim” -SourceIndex $IMAGE.ImageIndex -DestinationImagePath $WORKING_PATH"\boot2.wim" -ErrorAction stop | Out-Null + +} + +Move-Item -Path $WORKING_PATH"\boot2.wim" -Destination $MEDIA_NEW_PATH“\sources\boot.wim” -Force -ErrorAction stop | Out-Null +``` +### Update the main operating system + +For this next phase, there is no need to mount the main operating system, since it was already mounted in the previous scripts. This script starts by applying the servicing stack Dynamic Update. Then, it adds Japanese language support and then the Japanese language features. Unlike the Dynamic Update packages, it leverages `Add-WindowsCapability` to add these features. For a full list of such features, and their associated capability name, see [Available Features on Demand](https://docs.microsoft.com/windows-hardware/manufacture/desktop/features-on-demand-non-language-fod). + +Now is the time to enable other Optional Components or add other Features on Demand. If such a feature has an associated cumulative update (for example, .Net), this is the time to apply those. The script then proceeds with applying the latest cumulative update. Finally, the script cleans and exports the image. + +You can install Optional Components, along with the .Net feature, offline, but that will require the device to be restarted. This is why the script installs .Net and Optional Components after cleanup and before export. + +``` +# +# update Main OS +# + +# Add servicing stack update +Write-Host "$(Get-TS): Adding package $SSU_PATH" +Add-WindowsPackage -Path $MAIN_OS_MOUNT -PackagePath $SSU_PATH -ErrorAction stop | Out-Null + +# Optional: Add language to main OS +Write-Host "$(Get-TS): Adding package $OS_LP_PATH" +Add-WindowsPackage -Path $MAIN_OS_MOUNT -PackagePath $OS_LP_PATH -ErrorAction stop | Out-Null + +# Optional: Add a Features on Demand to the image +Write-Host "$(Get-TS): Adding language FOD: Language.Fonts.Jpan~~~und-JPAN~0.0.1.0" +Add-WindowsCapability -Name "Language.Fonts.$LANG_FONT_CAPABILITY~~~und-$LANG_FONT_CAPABILITY~0.0.1.0" -Path $MAIN_OS_MOUNT -Source $FOD_PATH -ErrorAction stop | Out-Null + +Write-Host "$(Get-TS): Adding language FOD: Language.Basic~~~$LANG~0.0.1.0" +Add-WindowsCapability -Name "Language.Basic~~~$LANG~0.0.1.0" -Path $MAIN_OS_MOUNT -Source $FOD_PATH -ErrorAction stop | Out-Null + +Write-Host "$(Get-TS): Adding language FOD: Language.OCR~~~$LANG~0.0.1.0" +Add-WindowsCapability -Name "Language.OCR~~~$LANG~0.0.1.0" -Path $MAIN_OS_MOUNT -Source $FOD_PATH -ErrorAction stop | Out-Null + +Write-Host "$(Get-TS): Adding language FOD: Language.Handwriting~~~$LANG~0.0.1.0" +Add-WindowsCapability -Name "Language.Handwriting~~~$LANG~0.0.1.0" -Path $MAIN_OS_MOUNT -Source $FOD_PATH -ErrorAction stop | Out-Null + +Write-Host "$(Get-TS): Adding language FOD: Language.TextToSpeech~~~$LANG~0.0.1.0" +Add-WindowsCapability -Name "Language.TextToSpeech~~~$LANG~0.0.1.0" -Path $MAIN_OS_MOUNT -Source $FOD_PATH -ErrorAction stop | Out-Null + +Write-Host "$(Get-TS): Adding language FOD:Language.Speech~~~$LANG~0.0.1.0" +Add-WindowsCapability -Name "Language.Speech~~~$LANG~0.0.1.0" -Path $MAIN_OS_MOUNT -Source $FOD_PATH -ErrorAction stop | Out-Null + +# Note: If I wanted to enable additional Features on Demand, I'd add these here. + +# Add latest cumulative update +Write-Host "$(Get-TS): Adding package $LCU_PATH" +Add-WindowsPackage -Path $MAIN_OS_MOUNT -PackagePath $LCU_PATH -ErrorAction stop | Out-Null + +# Copy our updated recovery image from earlier into the main OS +# Note: If I were updating more than 1 edition, I'd want to copy the same recovery image file +# into each edition to enable single instancing +Copy-Item -Path $WORKING_PATH"\winre.wim” -Destination $MAIN_OS_MOUNT"\windows\system32\recovery\winre.wim” -Force -Recurse -ErrorAction stop | Out-Null + +# Perform image cleanup +Write-Host "$(Get-TS): Performing image cleanup on main OS" +DISM /image:$MAIN_OS_MOUNT /cleanup-image /StartComponentCleanup | Out-Null + +# +# Note: If I wanted to enable additional Optional Components, I'd add these here. +# In addition, we'll add .Net 3.5 here as well. Both .Net and Optional Components might require +# the image to be booted, and thus if we tried to cleanup after installation, it would fail. +# + +Write-Host "$(Get-TS): Adding NetFX3~~~~" +Add-WindowsCapability -Name "NetFX3~~~~" -Path $MAIN_OS_MOUNT -Source $FOD_PATH -ErrorAction stop | Out-Null + +# Add .Net Cumulative Update +Write-Host "$(Get-TS): Adding package $DOTNET_CU_PATH" +Add-WindowsPackage -Path $MAIN_OS_MOUNT -PackagePath $DOTNET_CU_PATH -ErrorAction stop | Out-Null + +# Dismount +Dismount-WindowsImage -Path $MAIN_OS_MOUNT -Save -ErrorAction stop | Out-Null + +# Export +Write-Host "$(Get-TS): Exporting image to $WORKING_PATH\install2.wim” +Export-WindowsImage -SourceImagePath $MEDIA_NEW_PATH“\sources\install.wim” -SourceIndex 1 -DestinationImagePath $WORKING_PATH"\install2.wim” -ErrorAction stop | Out-Null +Move-Item -Path $WORKING_PATH"\install2.wim” -Destination $MEDIA_NEW_PATH“\sources\install.wim” -Force -ErrorAction stop | Out-Null +``` + +### Update remaining media files + +This part of the script updates the Setup files. It simply copies the individual files in the Setup Dynamic Update package to the new media. This step brings an updated Setup.exe as needed, along with the latest compatibility database, and replacement component manifests. + +``` +# +# update remaining files on media +# + +# Add Setup DU by copy the files from the package into the newMedia +Write-Host "$(Get-TS): Adding package $SETUP_DU_PATH" +cmd.exe /c $env:SystemRoot\System32\expand.exe $SETUP_DU_PATH -F:* $MEDIA_NEW_PATH"\sources" | Out-Null +``` +### Finish up + +As a last step, the script removes the working folder of temporary files, and unmounts our language pack and Features on Demand ISOs. + +``` +# +# Perform final cleanup +# + +# Remove our working folder +Remove-Item -Path $WORKING_PATH -Recurse -Force -ErrorAction stop | Out-Null + +# Dismount ISO images +Write-Host "$(Get-TS): Dismounting ISO images" +Dismount-DiskImage -ImagePath $LP_ISO_PATH -ErrorAction stop | Out-Null +Dismount-DiskImage -ImagePath $FOD_ISO_PATH -ErrorAction stop | Out-Null + +Write-Host "$(Get-TS): Media refresh completed!" +``` + diff --git a/windows/deployment/update/waas-wufb-group-policy.md b/windows/deployment/update/waas-wufb-group-policy.md index 5119f6f5be..e571a94f62 100644 --- a/windows/deployment/update/waas-wufb-group-policy.md +++ b/windows/deployment/update/waas-wufb-group-policy.md @@ -23,7 +23,7 @@ ms.topic: article ## Overview -You can use Group Policy through the Group Policy Management Console (GPMC) to control how Windows Update for Business works. You should consider and devise a deployment strategy for updates before you make changes to the Windows Update for Business settings. See +You can use Group Policy through the Group Policy Management Console (GPMC) to control how Windows Update for Business works. You should consider and devise a deployment strategy for updates before you make changes to the Windows Update for Business settings. See [Prepare servicing strategy for Windows 10 updates](waas-servicing-strategy-windows-10-updates.md) for more information. An IT administrator can set policies for Windows Update for Business by using Group Policy, or they can be set locally (per device). All of the relevant policies are under the path **Computer configuration > Administrative Templates > Windows Components > Windows Update**. @@ -42,10 +42,10 @@ Follow these steps on a device running the Remote Server Administration Tools or ### Set up a ring 1. Start Group Policy Management Console (gpmc.msc). -2. Expand **Forest > Domains > *\*. +2. Expand **Forest > Domains > *\**. 3. Right-click *\* and select **Create a GPO in this domain and link it here**. 4. In the **New GPO** dialog box, enter *Windows Update for Business - Group 1* as the name of the new Group Policy Object. -5. Right-click the **Windows Update for Business - Group 1" object, and then select **Edit**. +5. Right-click the **"Windows Update for Business - Group 1"** object, and then select **Edit**. 6. In the Group Policy Management Editor, go to **Computer Configuration > Policies > Administrative Templates > Windows Components > Windows Update**. You are now ready to start assigning policies to this ring (group) of devices. diff --git a/windows/release-information/resolved-issues-windows-10-1507.yml b/windows/release-information/resolved-issues-windows-10-1507.yml index 1469d2dcf0..1edda2c7ba 100644 --- a/windows/release-information/resolved-issues-windows-10-1507.yml +++ b/windows/release-information/resolved-issues-windows-10-1507.yml @@ -34,7 +34,6 @@ sections: -
SummaryOriginating updateStatusDate resolved
Intermittent issues when printing
The print spooler service may intermittently have issues completing a print job and results print job failure.

See details >
OS Build 10240.18334

September 23, 2019
KB4522009
Resolved
KB4520011
October 08, 2019
10:00 AM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications made using VB6, macros using VBA, and VBScript may stop responding and you may receive an error.

See details >
OS Build 10240.18305

August 13, 2019
KB4512497
Resolved
KB4517276
August 17, 2019
02:00 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on certain Windows devices.

See details >
OS Build 10240.18244

June 11, 2019
KB4503291
Resolved External
August 09, 2019
07:03 PM PT
" @@ -60,6 +59,5 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512497, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4517276. This ‘optional’ update is available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4517276 and install. For instructions, see Update Windows 10.

Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

Back to top
OS Build 10240.18305

August 13, 2019
KB4512497
Resolved
KB4517276
Resolved:
August 17, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503291) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to top
OS Build 10240.18244

June 11, 2019
KB4503291
Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1607.yml b/windows/release-information/resolved-issues-windows-10-1607.yml index 829cea21b4..343f302b6c 100644 --- a/windows/release-information/resolved-issues-windows-10-1607.yml +++ b/windows/release-information/resolved-issues-windows-10-1607.yml @@ -40,7 +40,6 @@ sections:
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using PXE images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 14393.3025

June 11, 2019
KB4503267
Resolved
KB4512495
August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications made using VB6, macros using VBA, and VBScript may stop responding and you may receive an error.

See details >
OS Build 14393.3144

August 13, 2019
KB4512517
Resolved
KB4512495
August 17, 2019
02:00 PM PT
Internet Explorer 11 and apps using the WebBrowser control may fail to render
JavaScript may fail to render as expected in IE11 and in apps using JavaScript or the WebBrowser control.

See details >
OS Build 14393.3085

July 09, 2019
KB4507460
Resolved
KB4512517
August 13, 2019
10:00 AM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on certain Windows devices.

See details >
OS Build 14393.3025

June 11, 2019
KB4503267
Resolved External
August 09, 2019
07:03 PM PT
" @@ -68,7 +67,6 @@ sections: -
DetailsOriginating updateStatusHistory
Apps and scripts using the NetQueryDisplayInformation API may fail with error
 Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data, often 50 or 100 entries. When requesting additional pages you may receive the error, “1359: an internal error occurred.”

Affected platforms:
  • Server: Windows Server 2019; Windows Server 2016
Resolution: This issue was resolved in KB4516044.

Back to top
OS Build 14393.3053

June 18, 2019
KB4503294
Resolved
KB4516044
Resolved:
September 10, 2019
10:00 AM PT

Opened:
August 01, 2019
05:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512517, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4512495. This ‘optional’ update is available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4512495 and install. For instructions, see Update Windows 10.

Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

Back to top
OS Build 14393.3144

August 13, 2019
KB4512517
Resolved
KB4512495
Resolved:
August 17, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503267) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to top
OS Build 14393.3025

June 11, 2019
KB4503267
Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1709.yml b/windows/release-information/resolved-issues-windows-10-1709.yml index 82bf0df89e..3141761298 100644 --- a/windows/release-information/resolved-issues-windows-10-1709.yml +++ b/windows/release-information/resolved-issues-windows-10-1709.yml @@ -38,7 +38,6 @@ sections:
Domain connected devices that use MIT Kerberos realms will not start up
Devices may not start after updating when connected to a domain that is configured to use MIT Kerberos realms.

See details >
OS Build 16299.1296

July 16, 2019
KB4507465
Resolved
KB4512516
August 13, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using PXE images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >
OS Build 16299.1217

June 11, 2019
KB4503284
Resolved
KB4512494
August 16, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications made using VB6, macros using VBA, and VBScript may stop responding and you may receive an error.

See details >
OS Build 16299.1331

August 13, 2019
KB4512516
Resolved
KB4512494
August 16, 2019
02:00 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on certain Windows devices.

See details >
OS Build 16299.1217

June 11, 2019
KB4503284
Resolved External
August 09, 2019
07:03 PM PT
" @@ -74,7 +73,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512516, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4512494. The ‘optional’ update will be available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4512494 and install. For instructions, see Update Windows 10.

Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

Back to top
OS Build 16299.1331

August 13, 2019
KB4512516
Resolved
KB4512494
Resolved:
August 16, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503284) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to top
OS Build 16299.1217

June 11, 2019
KB4503284
Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1803.yml b/windows/release-information/resolved-issues-windows-10-1803.yml index bdf3c62854..37a0f56eab 100644 --- a/windows/release-information/resolved-issues-windows-10-1803.yml +++ b/windows/release-information/resolved-issues-windows-10-1803.yml @@ -41,7 +41,6 @@ sections:
Notification issue: \"Your device is missing important security and quality fixes.\"
Some users may have incorrectly received the notification \"Your device is missing important security and quality fixes.\"

See details >N/A

Resolved
September 03, 2019
12:32 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using PXE images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >OS Build 17134.829

June 11, 2019
KB4503286Resolved
KB4512509August 19, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications made using VB6, macros using VBA, and VBScript may stop responding and you may receive an error.

See details >OS Build 17134.950

August 13, 2019
KB4512501Resolved
KB4512509August 19, 2019
02:00 PM PT -
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on certain Windows devices.

See details >OS Build 17134.829

June 11, 2019
KB4503286Resolved External
August 09, 2019
07:03 PM PT " @@ -79,7 +78,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512501, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4512509. The ‘optional’ update will be available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4512509 and install. For instructions, see Update Windows 10.

Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

Back to top
OS Build 17134.950

August 13, 2019
KB4512501
Resolved
KB4512509
Resolved:
August 19, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503286) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to top
OS Build 17134.829

June 11, 2019
KB4503286
Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index d113831f80..fe9b47b46b 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -42,7 +42,6 @@ sections:
Domain connected devices that use MIT Kerberos realms will not start up
Devices may not start after updating when connected to a domain that is configured to use MIT Kerberos realms.

See details >OS Build 17763.652

July 22, 2019
KB4505658Resolved
KB4511553August 13, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using PXE images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >OS Build 17763.557

June 11, 2019
KB4503327Resolved
KB4512534August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications made using VB6, macros using VBA, and VBScript may stop responding and you may receive an error.

See details >OS Build 17763.678

August 13, 2019
KB4511553Resolved
KB4512534August 17, 2019
02:00 PM PT -
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on certain Windows devices.

See details >OS Build 17763.557

June 11, 2019
KB4503327Resolved External
August 09, 2019
07:03 PM PT " @@ -81,7 +80,6 @@ sections: -
DetailsOriginating updateStatusHistory
Apps and scripts using the NetQueryDisplayInformation API may fail with error
 Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data, often 50 or 100 entries. When requesting additional pages you may receive the error, “1359: an internal error occurred.”

Affected platforms:
  • Server: Windows Server 2019; Windows Server 2016
Resolution: This issue was resolved in KB4516077.

Back to top
OS Build 17763.55

October 09, 2018
KB4464330
Resolved
KB4516077
Resolved:
September 24, 2019
10:00 AM PT

Opened:
August 01, 2019
05:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4511553, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4512534. This ‘optional’ update is available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4512534 and install. For instructions, see Update Windows 10.

Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

Back to top
OS Build 17763.678

August 13, 2019
KB4511553
Resolved
KB4512534
Resolved:
August 17, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503327) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to top
OS Build 17763.557

June 11, 2019
KB4503327
Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1903.yml b/windows/release-information/resolved-issues-windows-10-1903.yml index 0554cb4e28..a5729004b1 100644 --- a/windows/release-information/resolved-issues-windows-10-1903.yml +++ b/windows/release-information/resolved-issues-windows-10-1903.yml @@ -52,7 +52,6 @@ sections:
Initiating a Remote Desktop connection may result in black screen
When initiating a Remote Desktop connection to devices with some older GPU drivers, you may receive a black screen.

See details >OS Build 18362.145

May 29, 2019
KB4497935Resolved
KB4512941August 30, 2019
10:00 AM PT
Windows Sandbox may fail to start with error code “0x80070002”
Windows Sandbox may fail to start on devices in which the operating system language was changed between updates.

See details >OS Build 18362.116

May 21, 2019
KB4505057Resolved
KB4512941August 30, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using PXE images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >OS Build 18362.175

June 11, 2019
KB4503293Resolved
KB4512941August 30, 2019
10:00 AM PT -
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on certain Windows devices.

See details >OS Build 18362.175

June 11, 2019
KB4503293Resolved External
August 09, 2019
07:03 PM PT " @@ -95,7 +94,6 @@ sections: -
DetailsOriginating updateStatusHistory
Updates may fail to install and you may receive Error 0x80073701
Installation of updates may fail and you may receive the error message, \"Updates Failed, There were problems installing some updates, but we'll try again later\" or \"Error 0x80073701\" on the Windows Update dialog or within Update history.

Affected platforms:
  • Client: Windows 10, version 1903
  • Server: Windows Server, version 1903
Resolution: This issue has been resolved for most users. If you are still having issues, please see KB4528159.

Back to top
OS Build 18362.145

May 29, 2019
KB4497935
Resolved
Resolved:
November 12, 2019
08:11 AM PT

Opened:
August 16, 2019
01:41 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512508, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4512941. The ‘optional’ update is available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4512941 and install. For instructions, see Update Windows 10.

Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

Back to top
OS Build 18362.295

August 13, 2019
KB4512508
Resolved
KB4512941
Resolved:
August 30, 2019
10:00 AM PT

Opened:
August 14, 2019
03:34 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503293) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to top
OS Build 18362.175

June 11, 2019
KB4503293
Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml index bcbaa365e9..76a98fa268 100644 --- a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml @@ -40,7 +40,6 @@ sections:
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using PXE images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >June 11, 2019
KB4503292Resolved
KB4512514August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications made using VB6, macros using VBA, and VBScript may stop responding and you may receive an error.

See details >August 13, 2019
KB4512506Resolved
KB4517297August 16, 2019
02:00 PM PT
System may be unresponsive after restart with certain McAfee antivirus products
Devices running certain McAfee Endpoint security applications may be slow or unresponsive at startup.

See details >April 09, 2019
KB4493472Resolved External
August 13, 2019
06:59 PM PT -
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on certain Windows devices.

See details >June 11, 2019
KB4503292Resolved External
August 09, 2019
07:03 PM PT " @@ -86,7 +85,6 @@ sections: -
DetailsOriginating updateStatusHistory
Windows updates that are SHA-2 signed may not be offered for Symantec and Norton AV
Symantec identified the potential for a negative interaction that may occur after Windows Updates code signed with SHA-2 only certificates are installed on devices with Symantec or Norton antivirus programs installed. The software may not correctly identify files included in the update as code signed by Microsoft, putting the device at risk for a delayed or incomplete update.

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1
Resolution: The safeguard hold has been removed. Symantec has completed its evaluation of the impact of this update and future updates to Windows 7/Windows 2008 R2 and has determined that there is no increased risk of a false positive detection for all in-field versions of Symantec Endpoint Protection and Norton antivirus programs. See the Symantec support article for additional detail and please reach out to Symantec or Norton support if you encounter any issues.

Back to top
August 13, 2019
KB4512506
Resolved External
Last updated:
August 27, 2019
02:29 PM PT

Opened:
August 13, 2019
10:05 AM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512506, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4517297. The ‘optional’ update is now available on Microsoft Update Catalog and Windows Server Update Services (WSUS).

Back to top
August 13, 2019
KB4512506
Resolved
KB4517297
Resolved:
August 16, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503292) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to top
June 11, 2019
KB4503292
Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml index d7ed2c1633..14837c1dae 100644 --- a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml @@ -38,7 +38,6 @@ sections:
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using PXE images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >June 11, 2019
KB4503276Resolved
KB4512478August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications made using VB6, macros using VBA, and VBScript may stop responding and you may receive an error.

See details >August 13, 2019
KB4512488Resolved
KB4517298August 16, 2019
02:00 PM PT
System may be unresponsive after restart with certain McAfee antivirus products
Devices running certain McAfee Endpoint security applications may be slow or unresponsive at startup.

See details >April 09, 2019
KB4493446Resolved External
August 13, 2019
06:59 PM PT -
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on certain Windows devices.

See details >June 11, 2019
KB4503276Resolved External
August 09, 2019
07:03 PM PT " @@ -74,7 +73,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512488, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4517298. The ‘optional’ update is now available on Microsoft Update Catalog and Windows Server Update Services (WSUS).

Back to top
August 13, 2019
KB4512488
Resolved
KB4517298
Resolved:
August 16, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503276) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to top
June 11, 2019
KB4503276
Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml index 8f891fdf1a..475eb994f9 100644 --- a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml +++ b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml @@ -37,7 +37,6 @@ sections:
Intermittent issues when printing
The print spooler service may intermittently have issues completing a print job and results print job failure.

See details >September 24, 2019
KB4516030Resolved
KB4520002October 08, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using PXE images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >June 11, 2019
KB4503273Resolved
KB4512499August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications made using VB6, macros using VBA, and VBScript may stop responding and you may receive an error.

See details >August 13, 2019
KB4512476Resolved
KB4517301August 16, 2019
02:00 PM PT -
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on certain Windows devices.

See details >June 11, 2019
KB4503273Resolved External
August 09, 2019
07:03 PM PT " @@ -73,7 +72,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512476, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4517301. The ‘optional’ update is now available on Microsoft Update Catalog and Windows Server Update Services (WSUS).

Back to top
August 13, 2019
KB4512476
Resolved
KB4517301
Resolved:
August 16, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503273) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to top
June 11, 2019
KB4503273
Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-server-2012.yml b/windows/release-information/resolved-issues-windows-server-2012.yml index c2bef06cf8..fe6611a3e4 100644 --- a/windows/release-information/resolved-issues-windows-server-2012.yml +++ b/windows/release-information/resolved-issues-windows-server-2012.yml @@ -36,7 +36,6 @@ sections:
Intermittent issues when printing
The print spooler service may intermittently have issues completing a print job and results print job failure.

See details >September 24, 2019
KB4516069Resolved
KB4520007October 08, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using PXE images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >June 11, 2019
KB4503285Resolved
KB4512512August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications made using VB6, macros using VBA, and VBScript may stop responding and you may receive an error.

See details >August 13, 2019
KB4512518Resolved
KB4517302August 16, 2019
02:00 PM PT -
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on MacOS when trying to access network shares via CIFS or SMBv1 on certain Windows devices.

See details >June 11, 2019
KB4503285Resolved External
August 09, 2019
07:03 PM PT " @@ -71,7 +70,6 @@ sections: text: " -
DetailsOriginating updateStatusHistory
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
After installing KB4512518, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4517302. The ‘optional’ update is now available on Microsoft Update Catalog and Windows Server Update Services (WSUS).

Back to top
August 13, 2019
KB4512518
Resolved
KB4517302
Resolved:
August 16, 2019
02:00 PM PT

Opened:
August 14, 2019
03:34 PM PT
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devices
You may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 (KB4503285) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: For guidance on this issue, see the Apple support article If your Mac can't use NTLM to connect to a Windows server. There is no update for Windows needed for this issue.

Back to top
June 11, 2019
KB4503285
Resolved External
Last updated:
August 09, 2019
07:03 PM PT

Opened:
August 09, 2019
04:25 PM PT
" diff --git a/windows/release-information/status-windows-10-1507.yml b/windows/release-information/status-windows-10-1507.yml index 9891ddf467..df76e08bd1 100644 --- a/windows/release-information/status-windows-10-1507.yml +++ b/windows/release-information/status-windows-10-1507.yml @@ -29,11 +29,11 @@ sections: columns: 3 items: - - href: https://www.microsoft.com/en-us/microsoft-365/blog/2020/01/14/windows-7-support-ends-today-and-windows-10-is-better-than-ever/ - html: Find out what you need to know > + - href: https://aka.ms/Windows7ESU + html: Stay protected with Extended Security Updates > image: - src: https://docs.microsoft.com/media/common/i_alert.svg - title: Windows 7 has reached end of support + src: https://docs.microsoft.com/media/common/i_subscription.svg + title: Still have devices running Windows 7 in your enterprise? - href: https://aka.ms/1909mechanics html: Explore the improvements > image: diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index 4a3d572494..349276ccd7 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -29,11 +29,11 @@ sections: columns: 3 items: - - href: https://www.microsoft.com/en-us/microsoft-365/blog/2020/01/14/windows-7-support-ends-today-and-windows-10-is-better-than-ever/ - html: Find out what you need to know > + - href: https://aka.ms/Windows7ESU + html: Stay protected with Extended Security Updates > image: - src: https://docs.microsoft.com/media/common/i_alert.svg - title: Windows 7 has reached end of support + src: https://docs.microsoft.com/media/common/i_subscription.svg + title: Still have devices running Windows 7 in your enterprise? - href: https://aka.ms/1909mechanics html: Explore the improvements > image: diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index 47169eb98d..68f5967f84 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -29,11 +29,11 @@ sections: columns: 3 items: - - href: https://www.microsoft.com/en-us/microsoft-365/blog/2020/01/14/windows-7-support-ends-today-and-windows-10-is-better-than-ever/ - html: Find out what you need to know > + - href: https://aka.ms/Windows7ESU + html: Stay protected with Extended Security Updates > image: - src: https://docs.microsoft.com/media/common/i_alert.svg - title: Windows 7 has reached end of support + src: https://docs.microsoft.com/media/common/i_subscription.svg + title: Still have devices running Windows 7 in your enterprise? - href: https://aka.ms/1909mechanics html: Explore the improvements > image: diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index 9f10885c6c..d5408f495b 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -33,11 +33,11 @@ sections: columns: 3 items: - - href: https://www.microsoft.com/en-us/microsoft-365/blog/2020/01/14/windows-7-support-ends-today-and-windows-10-is-better-than-ever/ - html: Find out what you need to know > + - href: https://aka.ms/Windows7ESU + html: Stay protected with Extended Security Updates > image: - src: https://docs.microsoft.com/media/common/i_alert.svg - title: Windows 7 has reached end of support + src: https://docs.microsoft.com/media/common/i_subscription.svg + title: Still have devices running Windows 7 in your enterprise? - href: https://aka.ms/1909mechanics html: Explore the improvements > image: diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index 2e9516660f..7beb2e9c30 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -33,11 +33,11 @@ sections: columns: 3 items: - - href: https://www.microsoft.com/en-us/microsoft-365/blog/2020/01/14/windows-7-support-ends-today-and-windows-10-is-better-than-ever/ - html: Find out what you need to know > + - href: https://aka.ms/Windows7ESU + html: Stay protected with Extended Security Updates > image: - src: https://docs.microsoft.com/media/common/i_alert.svg - title: Windows 7 has reached end of support + src: https://docs.microsoft.com/media/common/i_subscription.svg + title: Still have devices running Windows 7 in your enterprise? - href: https://aka.ms/1909mechanics html: Explore the improvements > image: diff --git a/windows/release-information/status-windows-10-1903.yml b/windows/release-information/status-windows-10-1903.yml index b1bf959c78..c37a9ca547 100644 --- a/windows/release-information/status-windows-10-1903.yml +++ b/windows/release-information/status-windows-10-1903.yml @@ -33,11 +33,11 @@ sections: columns: 3 items: - - href: https://www.microsoft.com/en-us/microsoft-365/blog/2020/01/14/windows-7-support-ends-today-and-windows-10-is-better-than-ever/ - html: Find out what you need to know > + - href: https://aka.ms/Windows7ESU + html: Stay protected with Extended Security Updates > image: - src: https://docs.microsoft.com/media/common/i_alert.svg - title: Windows 7 has reached end of support + src: https://docs.microsoft.com/media/common/i_subscription.svg + title: Still have devices running Windows 7 in your enterprise? - href: https://aka.ms/1909mechanics html: Explore the improvements > image: diff --git a/windows/release-information/status-windows-10-1909.yml b/windows/release-information/status-windows-10-1909.yml index 36288e57f2..5d5aa24d52 100644 --- a/windows/release-information/status-windows-10-1909.yml +++ b/windows/release-information/status-windows-10-1909.yml @@ -33,11 +33,11 @@ sections: columns: 3 items: - - href: https://www.microsoft.com/en-us/microsoft-365/blog/2020/01/14/windows-7-support-ends-today-and-windows-10-is-better-than-ever/ - html: Find out what you need to know > + - href: https://aka.ms/Windows7ESU + html: Stay protected with Extended Security Updates > image: - src: https://docs.microsoft.com/media/common/i_alert.svg - title: Windows 7 has reached end of support + src: https://docs.microsoft.com/media/common/i_subscription.svg + title: Still have devices running Windows 7 in your enterprise? - href: https://aka.ms/1909mechanics html: Explore the improvements > image: diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index b801c81883..594303eec5 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -29,11 +29,11 @@ sections: columns: 3 items: - - href: https://www.microsoft.com/en-us/microsoft-365/blog/2020/01/14/windows-7-support-ends-today-and-windows-10-is-better-than-ever/ - html: Find out what you need to know > + - href: https://aka.ms/Windows7ESU + html: Stay protected with Extended Security Updates > image: - src: https://docs.microsoft.com/media/common/i_alert.svg - title: Windows 7 has reached end of support + src: https://docs.microsoft.com/media/common/i_subscription.svg + title: Still have devices running Windows 7 in your enterprise? - href: https://aka.ms/1909mechanics html: Explore the improvements > image: diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index 388b55fa0a..596f76e9d2 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -29,11 +29,11 @@ sections: columns: 3 items: - - href: https://www.microsoft.com/en-us/microsoft-365/blog/2020/01/14/windows-7-support-ends-today-and-windows-10-is-better-than-ever/ - html: Find out what you need to know > + - href: https://aka.ms/Windows7ESU + html: Stay protected with Extended Security Updates > image: - src: https://docs.microsoft.com/media/common/i_alert.svg - title: Windows 7 has reached end of support + src: https://docs.microsoft.com/media/common/i_subscription.svg + title: Still have devices running Windows 7 in your enterprise? - href: https://aka.ms/1909mechanics html: Explore the improvements > image: diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml index 2ea115dab7..122a392439 100644 --- a/windows/release-information/status-windows-server-2008-sp2.yml +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -29,11 +29,11 @@ sections: columns: 3 items: - - href: https://www.microsoft.com/en-us/microsoft-365/blog/2020/01/14/windows-7-support-ends-today-and-windows-10-is-better-than-ever/ - html: Find out what you need to know > + - href: https://aka.ms/Windows7ESU + html: Stay protected with Extended Security Updates > image: - src: https://docs.microsoft.com/media/common/i_alert.svg - title: Windows 7 has reached end of support + src: https://docs.microsoft.com/media/common/i_subscription.svg + title: Still have devices running Windows 7 in your enterprise? - href: https://aka.ms/1909mechanics html: Explore the improvements > image: diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml index 96c3cad5e2..c83ea0923f 100644 --- a/windows/release-information/status-windows-server-2012.yml +++ b/windows/release-information/status-windows-server-2012.yml @@ -29,11 +29,11 @@ sections: columns: 3 items: - - href: https://www.microsoft.com/en-us/microsoft-365/blog/2020/01/14/windows-7-support-ends-today-and-windows-10-is-better-than-ever/ - html: Find out what you need to know > + - href: https://aka.ms/Windows7ESU + html: Stay protected with Extended Security Updates > image: - src: https://docs.microsoft.com/media/common/i_alert.svg - title: Windows 7 has reached end of support + src: https://docs.microsoft.com/media/common/i_subscription.svg + title: Still have devices running Windows 7 in your enterprise? - href: https://aka.ms/1909mechanics html: Explore the improvements > image: diff --git a/windows/release-information/windows-message-center.yml b/windows/release-information/windows-message-center.yml index 1b87554500..1177033b2d 100644 --- a/windows/release-information/windows-message-center.yml +++ b/windows/release-information/windows-message-center.yml @@ -23,11 +23,11 @@ sections: columns: 2 items: - - href: https://www.microsoft.com/en-us/microsoft-365/blog/2020/01/14/windows-7-support-ends-today-and-windows-10-is-better-than-ever/ - html: Find out what you need to know > + - href: https://aka.ms/Windows7ESU + html: Stay protected with Extended Security Updates > image: - src: https://docs.microsoft.com/media/common/i_alert.svg - title: Windows 7 has reached end of support + src: https://docs.microsoft.com/media/common/i_subscription.svg + title: Still have devices running Windows 7 in your enterprise? - href: https://aka.ms/1909mechanics html: Explore the improvements > image: @@ -50,6 +50,8 @@ sections: text: " + + diff --git a/windows/security/includes/improve-request-performance.md b/windows/security/includes/improve-request-performance.md index ddff438e13..c2499cf092 100644 --- a/windows/security/includes/improve-request-performance.md +++ b/windows/security/includes/improve-request-performance.md @@ -18,6 +18,6 @@ ms.topic: article >[!NOTE] >For better performance, you can use server closer to your geo location: -> - api-us.securitycenter.windows.com -> - api-eu.securitycenter.windows.com -> - api-uk.securitycenter.windows.com +> - api-us.securitycenter.microsoft.com +> - api-eu.securitycenter.microsoft.com +> - api-uk.securitycenter.microsoft.com diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index e108eeae6b..41c9c858e4 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -373,7 +373,7 @@ ###### [Troubleshoot subscription and portal access issues](microsoft-defender-atp/troubleshoot-onboarding-error-messages.md) #### [Microsoft Defender ATP API]() -##### [Get started with Microsoft Defender ATP APIs]() +##### [Get started]() ###### [Microsoft Defender ATP API license and terms](microsoft-defender-atp/api-terms-of-use.md) ###### [Access the Microsoft Defender ATP APIs](microsoft-defender-atp/apis-intro.md) ###### [Hello World](microsoft-defender-atp/api-hello-world.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference.md b/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference.md index 2e5c7cec45..0a85cb240c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference.md +++ b/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference.md @@ -24,8 +24,9 @@ ms.topic: article ## API description -Creates new [Alert](alerts.md). -
Microsoft Defender ATP Event is a required parameter for the alert creation. +Creates new [Alert](alerts.md) on top of **Event**. +
**Microsoft Defender ATP Event** is required for the alert creation. +
You will need to supply 3 parameters from the Event in the request: **Event Time**, **Machine ID** and **Report ID**. See example below.
You can use an event found in Advanced Hunting API or Portal.
If there existing an open alert on the same Machine with the same Title, the new created alert will be merged with it.
An automatic investigation starts automatically on alerts created via the API. @@ -68,13 +69,13 @@ In the request body, supply the following values (all are required): Property | Type | Description :---|:---|:--- +eventTime | DateTime(UTC) | The precise time of the event as string, as obtained from advanced hunting. e.g. ```2018-08-03T16:45:21.7115183Z``` **Required**. +reportId | String | The reportId of the event, as obtained from advanced hunting. **Required**. machineId | String | Id of the machine on which the event was identified. **Required**. severity | String | Severity of the alert. The property values are: 'Low', 'Medium' and 'High'. **Required**. title | String | Title for the alert. **Required**. description | String | Description of the alert. **Required**. recommendedAction| String | Action that is recommended to be taken by security officer when analyzing the alert. **Required**. -eventTime | DateTime(UTC) | The time of the event, as obtained from the advanced query. **Required**. -reportId | String | The reportId, as obtained from the advanced query. **Required**. category| String | Category of the alert. The property values are: "General", "CommandAndControl", "Collection", "CredentialAccess", "DefenseEvasion", "Discovery", "Exfiltration", "Exploit", "Execution", "InitialAccess", "LateralMovement", "Malware", "Persistence", "PrivilegeEscalation", "Ransomware", "SuspiciousActivity" **Required**. ## Response @@ -91,16 +92,16 @@ Here is an example of the request. ``` POST https://api.securitycenter.windows.com/api/alerts/CreateAlertByReference -Content-Length: application/json - +``` +```json { - "machineId": "1e5bc9d7e413ddd7902c2932e418702b84d0cc07", - "severity": "Low", - "title": "test alert", - "description": "test alert", - "recommendedAction": "test alert", - "eventTime": "2018-08-03T16:45:21.7115183Z", - "reportId": "20776", - "category": "None" + "machineId": "1e5bc9d7e413ddd7902c2932e418702b84d0cc07", + "severity": "Low", + "title": "example", + "description": "example alert", + "recommendedAction": "nothing", + "eventTime": "2018-08-03T16:45:21.7115183Z", + "reportId": "20776", + "category": "Exploit" } ``` diff --git a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-partners.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-partners.md index 549743f14c..5f6f4ad48c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-partners.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-partners.md @@ -34,7 +34,6 @@ In general, you’ll need to take the following steps to use the APIs: - Use the token to access Microsoft Defender ATP API. The following steps with guide you how to create an AAD application, get an access token to Microsoft Defender ATP and validate the token. -
**To become an official partner of Microsoft Defender ATP and appear in our partner page, you will provide us with your application identifier.** ## Create the multi-tenant app diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-machines.md b/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-machines.md index 1343ebbc71..449efaf986 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-recommendation-machines.md @@ -73,7 +73,7 @@ Here is an example of the response. "id": "e058770379bc199a9c179ce52a23e16fd44fd2ee", "computerDnsName": "niw_pc", "osPlatform": "Windows10", - "rbacGroupId": 2154 + "rbacGroupName": "GroupTwo" } ... ] diff --git a/windows/security/threat-protection/microsoft-defender-atp/oldTOC.txt b/windows/security/threat-protection/microsoft-defender-atp/oldTOC.txt index 2e2b69385b..a65e4c2dbb 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/oldTOC.txt +++ b/windows/security/threat-protection/microsoft-defender-atp/oldTOC.txt @@ -336,7 +336,7 @@ ##### [Understand Microsoft Defender ATP APIs](use-apis.md) ##### [Microsoft Defender ATP API license and terms](api-terms-of-use.md) -##### [Get started with Microsoft Defender ATP APIs]() +##### [Get started]() ###### [Introduction](apis-intro.md) ###### [Hello World](api-hello-world.md) ###### [Get access with application context](exposed-apis-create-app-webapp.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api.md b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api.md index 540c957c3f..19ccd7e62c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api.md +++ b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api.md @@ -71,21 +71,18 @@ Request Here is an example of the request. ->[!NOTE] ->For better performance, you can use server closer to your geo location: -> - api-us.securitycenter.windows.com -> - api-eu.securitycenter.windows.com -> - api-uk.securitycenter.windows.com +[!include[Improve request performance](../../includes/improve-request-performance.md)] + ``` POST https://api.securitycenter.windows.com/api/advancedqueries/run Content-type: application/json { - "Query":"ProcessCreationEvents -| where InitiatingProcessFileName =~ \"powershell.exe\" -| where ProcessCommandLine contains \"appdata\" -| project EventTime, FileName, InitiatingProcessFileName -| limit 2" + "Query":"DeviceProcessEvents + | where InitiatingProcessFileName =~ 'powershell.exe' + | where ProcessCommandLine contains 'appdata' + | project Timestamp, FileName, InitiatingProcessFileName, DeviceId + | limit 2" } ``` @@ -96,32 +93,40 @@ Here is an example of the response. >[!NOTE] >The response object shown here may be truncated for brevity. All of the properties will be returned from an actual call. -``` -HTTP/1.1 200 OK -Content-Type: application/json​ +```json { - "Schema": [{ - "Name": "EventTime", - "Type": "DateTime" - }, - { - "Name": "FileName", - "Type": "String" - }, - { - "Name": "InitiatingProcessFileName", - "Type": "String" - }], - "Results": [{ - "EventTime": "2018-07-09T07:16:26.8017265", - "FileName": "csc.exe", - "InitiatingProcessFileName": "powershell.exe" - }, - { - "EventTime": "2018-07-08T19:00:02.7798905", - "FileName": "gpresult.exe", - "InitiatingProcessFileName": "powershell.exe" - }] + "Schema": [ + { + "Name": "Timestamp", + "Type": "DateTime" + }, + { + "Name": "FileName", + "Type": "String" + }, + { + "Name": "InitiatingProcessFileName", + "Type": "String" + }, + { + "Name": "DeviceId", + "Type": "String" + } + ], + "Results": [ + { + "Timestamp": "2020-02-05T01:10:26.2648757Z", + "FileName": "csc.exe", + "InitiatingProcessFileName": "powershell.exe", + "DeviceId": "10cbf9182d4e95660362f65cfa67c7731f62fdb3" + }, + { + "Timestamp": "2020-02-05T01:10:26.5614772Z", + "FileName": "csc.exe", + "InitiatingProcessFileName": "powershell.exe", + "DeviceId": "10cbf9182d4e95660362f65cfa67c7731f62fdb3" + } + ] } ``` From 811e8be792d843b2fc74fbd47e48d735ca242262 Mon Sep 17 00:00:00 2001 From: lomayor Date: Tue, 11 Feb 2020 12:53:18 -0800 Subject: [PATCH 35/92] Videos for TA and AH --- .../microsoft-defender-atp/advanced-hunting-overview.md | 5 ++++- .../microsoft-defender-atp/threat-analytics.md | 5 +++++ 2 files changed, 9 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview.md index 73a0af658e..1b97d7c5d9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview.md @@ -29,8 +29,11 @@ Advanced hunting is a query-based threat-hunting tool that lets you explore up t You can use the same threat-hunting queries to build custom detection rules. These rules run automatically to check for and respond to various events and system states, including suspected breach activity and misconfigured machines. ## Get started with advanced hunting +Watch this video for a quick overview of advanced hunting and a short tutorial that will get you started fast. -We recommend going through several steps to quickly get up and running with advanced hunting. +>[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4bGqo] + +You can also go through each of the following steps to ramp up your advanced hunting knowledge. | Learning goal | Description | Resource | |--|--|--| diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md b/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md index a1c5557fed..7abe5c6fc7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md @@ -26,6 +26,11 @@ Cyberthreats are emerging more frequently and prevalently. It is critical for or Threat analytics is a set of reports published by Microsoft security researchers as soon as emerging threats and outbreaks are identified. The reports help you assess the impact of threats to your environment and identify actions that can contain them. +Watch this short video to quickly understand how threat analytics can help you track the latest threats and stop them. + +>[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4bw1f] + + ## View the threat analytics dashboard The threat analytics dashboard is a great jump off point for getting to the reports that are most relevant to your organization. It provides several overviews about the threats covered in the reports: From db8d4d2b16d29345cdf86b5a0da0de508979a7f9 Mon Sep 17 00:00:00 2001 From: lomayor Date: Tue, 11 Feb 2020 13:46:07 -0800 Subject: [PATCH 36/92] breaks --- .../microsoft-defender-atp/advanced-hunting-overview.md | 4 ++-- .../microsoft-defender-atp/threat-analytics.md | 5 ++--- 2 files changed, 4 insertions(+), 5 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview.md index 1b97d7c5d9..94c471fbd7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview.md @@ -29,8 +29,8 @@ Advanced hunting is a query-based threat-hunting tool that lets you explore up t You can use the same threat-hunting queries to build custom detection rules. These rules run automatically to check for and respond to various events and system states, including suspected breach activity and misconfigured machines. ## Get started with advanced hunting -Watch this video for a quick overview of advanced hunting and a short tutorial that will get you started fast. - +Watch this video for a quick overview of advanced hunting and a short tutorial that will get you started fast. + >[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4bGqo] You can also go through each of the following steps to ramp up your advanced hunting knowledge. diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md b/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md index 7abe5c6fc7..d3d5a49d80 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md @@ -26,11 +26,10 @@ Cyberthreats are emerging more frequently and prevalently. It is critical for or Threat analytics is a set of reports published by Microsoft security researchers as soon as emerging threats and outbreaks are identified. The reports help you assess the impact of threats to your environment and identify actions that can contain them. -Watch this short video to quickly understand how threat analytics can help you track the latest threats and stop them. - +Watch this short video to quickly understand how threat analytics can help you track the latest threats and stop them. + >[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4bw1f] - ## View the threat analytics dashboard The threat analytics dashboard is a great jump off point for getting to the reports that are most relevant to your organization. It provides several overviews about the threats covered in the reports: From fbd6ebccca8e121d031c63962d69e5d46221e9bd Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Tue, 11 Feb 2020 14:58:17 -0800 Subject: [PATCH 37/92] Added video link --- .../microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md b/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md index 3da4badfe6..41e41d783f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md +++ b/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md @@ -27,6 +27,8 @@ Effectively identifying, assessing, and remediating endpoint weaknesses is pivot It helps organizations discover vulnerabilities and misconfigurations in real-time, based on sensors, without the need of agents or periodic scans. It prioritizes vulnerabilities based on the threat landscape, detections in your organization, sensitive information on vulnerable devices, and business context. +[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4mLsn] + ## Next-generation capabilities Threat & Vulnerability Management is built-in, real-time, cloud-powered, fully integrated with Microsoft endpoint security stack, the Microsoft Intelligent Security Graph, and the application analytics knowledgebase. From 068720b138a79f6d3c525c8c21bee80b49bbe2aa Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Tue, 11 Feb 2020 15:08:43 -0800 Subject: [PATCH 38/92] Added blog ref --- .../microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md b/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md index 41e41d783f..54b425ff8c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md +++ b/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md @@ -77,3 +77,4 @@ Microsoft Defender ATP’s Threat & Vulnerability Management allows security adm - [Software APIs](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/software) - [Machine APIs](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/machine) - [Recommendation APIs](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/vulnerability) +- [BLOG: Microsoft’s Threat & Vulnerability Management now helps thousands of customers to discover, prioritize, and remediate vulnerabilities in real time](https://www.microsoft.com/security/blog/2019/07/02/microsofts-threat-vulnerability-management-now-helps-thousands-of-customers-to-discover-prioritize-and-remediate-vulnerabilities-in-real-time/) From 1e6c939968d1a7b0997a50204144d6cdb8658e08 Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Tue, 11 Feb 2020 15:14:28 -0800 Subject: [PATCH 39/92] Update next-gen-threat-and-vuln-mgt.md --- .../microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md b/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md index 54b425ff8c..12272ac0e8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md +++ b/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md @@ -27,6 +27,7 @@ Effectively identifying, assessing, and remediating endpoint weaknesses is pivot It helps organizations discover vulnerabilities and misconfigurations in real-time, based on sensors, without the need of agents or periodic scans. It prioritizes vulnerabilities based on the threat landscape, detections in your organization, sensitive information on vulnerable devices, and business context. +Watch this video for a quick overview of Threat & Vulnerability Management. [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4mLsn] ## Next-generation capabilities From 22fb445694b1fa2aa1c8b1437bbee4a396e803c3 Mon Sep 17 00:00:00 2001 From: lomayor Date: Tue, 11 Feb 2020 15:17:42 -0800 Subject: [PATCH 40/92] breaks --- .../microsoft-defender-atp/advanced-hunting-overview.md | 4 ++-- .../microsoft-defender-atp/threat-analytics.md | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview.md index 94c471fbd7..587366afe0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview.md @@ -29,8 +29,8 @@ Advanced hunting is a query-based threat-hunting tool that lets you explore up t You can use the same threat-hunting queries to build custom detection rules. These rules run automatically to check for and respond to various events and system states, including suspected breach activity and misconfigured machines. ## Get started with advanced hunting -Watch this video for a quick overview of advanced hunting and a short tutorial that will get you started fast. - +Watch this video for a quick overview of advanced hunting and a short tutorial that will get you started fast. +
>[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4bGqo] You can also go through each of the following steps to ramp up your advanced hunting knowledge. diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md b/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md index d3d5a49d80..8709092d9c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md @@ -26,8 +26,8 @@ Cyberthreats are emerging more frequently and prevalently. It is critical for or Threat analytics is a set of reports published by Microsoft security researchers as soon as emerging threats and outbreaks are identified. The reports help you assess the impact of threats to your environment and identify actions that can contain them. -Watch this short video to quickly understand how threat analytics can help you track the latest threats and stop them. - +Watch this short video to quickly understand how threat analytics can help you track the latest threats and stop them. +
>[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4bw1f] ## View the threat analytics dashboard From ee87de19b0bd2c72205a3ee7c473c4cd810e032d Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Tue, 11 Feb 2020 15:18:37 -0800 Subject: [PATCH 41/92] Added MDATP API video ref --- .../microsoft-defender-atp/management-apis.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/windows/security/threat-protection/microsoft-defender-atp/management-apis.md b/windows/security/threat-protection/microsoft-defender-atp/management-apis.md index f42404e0ac..e25d5e8634 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/management-apis.md +++ b/windows/security/threat-protection/microsoft-defender-atp/management-apis.md @@ -54,6 +54,9 @@ The Microsoft Defender ATP APIs can be grouped into three: Microsoft Defender ATP offers a layered API model exposing data and capabilities in a structured, clear and easy to use model, exposed through a standard Azure AD-based authentication and authorization model allowing access in context of users or SaaS applications. The API model was designed to expose entities and capabilities in a consistent form. +Watch this video for a quick overview of Microsoft Defender ATP's APIs. +[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4d73M] + The **Investigation API** exposes the richness of Microsoft Defender ATP - exposing calculated or 'profiled' entities (for example, machine, user, and file) and discrete events (for example, process creation and file creation) which typically describes a behavior related to an entity, enabling access to data via investigation interfaces allowing a query-based access to data. For more information see, [Supported APIs](exposed-apis-list.md). The **Response API** exposes the ability to take actions in the service and on devices, enabling customers to ingest indicators, manage settings, alert status, as well as take response actions on devices programmatically such as isolate machines from the network, quarantine files, and others. From f87e7a9505b72ead1f10b5bcc72386f0b1b99a28 Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Tue, 11 Feb 2020 15:19:11 -0800 Subject: [PATCH 42/92] Update management-apis.md --- .../threat-protection/microsoft-defender-atp/management-apis.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/management-apis.md b/windows/security/threat-protection/microsoft-defender-atp/management-apis.md index e25d5e8634..2634614f1b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/management-apis.md +++ b/windows/security/threat-protection/microsoft-defender-atp/management-apis.md @@ -55,7 +55,7 @@ The Microsoft Defender ATP APIs can be grouped into three: Microsoft Defender ATP offers a layered API model exposing data and capabilities in a structured, clear and easy to use model, exposed through a standard Azure AD-based authentication and authorization model allowing access in context of users or SaaS applications. The API model was designed to expose entities and capabilities in a consistent form. Watch this video for a quick overview of Microsoft Defender ATP's APIs. -[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4d73M] +>[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4d73M] The **Investigation API** exposes the richness of Microsoft Defender ATP - exposing calculated or 'profiled' entities (for example, machine, user, and file) and discrete events (for example, process creation and file creation) which typically describes a behavior related to an entity, enabling access to data via investigation interfaces allowing a query-based access to data. For more information see, [Supported APIs](exposed-apis-list.md). From f8b45a50cecf90a87865b6955d434e5e86937e0c Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Tue, 11 Feb 2020 15:21:44 -0800 Subject: [PATCH 43/92] Added API video link --- .../threat-protection/microsoft-defender-atp/apis-intro.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/windows/security/threat-protection/microsoft-defender-atp/apis-intro.md b/windows/security/threat-protection/microsoft-defender-atp/apis-intro.md index 589b46db48..1c6f356099 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/apis-intro.md +++ b/windows/security/threat-protection/microsoft-defender-atp/apis-intro.md @@ -26,6 +26,9 @@ ms.topic: conceptual Microsoft Defender ATP exposes much of its data and actions through a set of programmatic APIs. Those APIs will enable you to automate workflows and innovate based on Microsoft Defender ATP capabilities. The API access requires OAuth2.0 authentication. For more information, see [OAuth 2.0 Authorization Code Flow](https://docs.microsoft.com/azure/active-directory/develop/active-directory-v2-protocols-oauth-code). +Watch this video for a quick overview of Microsoft Defender ATP's APIs. +>[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4d73M] + In general, you’ll need to take the following steps to use the APIs: - Create an AAD application - Get an access token using this application From e8284a4eec8dc60530252a3ac318b0f9616b3778 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Tue, 11 Feb 2020 15:22:00 -0800 Subject: [PATCH 44/92] Acrolinx: Corrected 3 spelling errors --- windows/client-management/mdm/dmclient-csp.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/client-management/mdm/dmclient-csp.md b/windows/client-management/mdm/dmclient-csp.md index d1203b326a..b4183451fc 100644 --- a/windows/client-management/mdm/dmclient-csp.md +++ b/windows/client-management/mdm/dmclient-csp.md @@ -132,7 +132,7 @@ Optional. The character string that allows the user experience to include a cust Supported operations are Get, Replace, and Delete. **Provider/*ProviderID*/RequireMessageSigning** -Boolean type. Primarly used for SSL bridging mode where firewalls and proxies are deployed and where device client identity is required. When enabled, every SyncML message from the device will carry an additional HTTP header named MDM-Signature. This header contains BASE64-encoded Cryptographic Message Syntax using a Detached Signature of the complete SyncML message SHA-2 (inclusive of the SyncHdr and SyncBody). Signing is performed using the private key of the management session certificate that was enrolled as part of the enrollment process. The device public key and PKCS9 UTC signing time stamp are included as part of the authenticated attributes in the signature. +Boolean type. Primarily used for SSL bridging mode where firewalls and proxies are deployed and where device client identity is required. When enabled, every SyncML message from the device will carry an additional HTTP header named MDM-Signature. This header contains BASE64-encoded Cryptographic Message Syntax using a Detached Signature of the complete SyncML message SHA-2 (inclusive of the SyncHdr and SyncBody). Signing is performed using the private key of the management session certificate that was enrolled as part of the enrollment process. The device public key and PKCS9 UTC signing time stamp are included as part of the authenticated attributes in the signature. Default value is false, where the device management client does not include authentication information in the management session HTTP header. Optionally set to true, where the client authentication information is provided in the management session HTTP header. @@ -255,7 +255,7 @@ Optional. Added in Windows 10, version 1703. Specify the Discovery server URL o Supported operations are Add, Delete, Get, and Replace. Value type is string. **Provider/*ProviderID*/NumberOfDaysAfterLostContactToUnenroll** -Optional. Number of days after last sucessful sync to unenroll. +Optional. Number of days after last successful sync to unenroll. Supported operations are Add, Delete, Get, and Replace. Value type is integer. @@ -552,7 +552,7 @@ Optional. Boolean value that allows the IT admin to require the device to start Supported operations are Add, Get, and Replace. **Provider/*ProviderID*/Push** -Optional. Not configurable during WAP Provisioining XML. If removed, DM sessions triggered by Push will no longer be supported. +Optional. Not configurable during WAP Provisioning XML. If removed, DM sessions triggered by Push will no longer be supported. Supported operations are Add and Delete. From 111a7fdb8ab9f6baaf5e1be95d48450e8930bf39 Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Tue, 11 Feb 2020 15:22:34 -0800 Subject: [PATCH 45/92] Update next-gen-threat-and-vuln-mgt.md --- .../microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md b/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md index 12272ac0e8..972fd91c1d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md +++ b/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md @@ -28,7 +28,7 @@ Effectively identifying, assessing, and remediating endpoint weaknesses is pivot It helps organizations discover vulnerabilities and misconfigurations in real-time, based on sensors, without the need of agents or periodic scans. It prioritizes vulnerabilities based on the threat landscape, detections in your organization, sensitive information on vulnerable devices, and business context. Watch this video for a quick overview of Threat & Vulnerability Management. -[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4mLsn] +>[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4mLsn] ## Next-generation capabilities Threat & Vulnerability Management is built-in, real-time, cloud-powered, fully integrated with Microsoft endpoint security stack, the Microsoft Intelligent Security Graph, and the application analytics knowledgebase. From 81c6d7cd103a1c7fa8fa07ebdc1658da915e23dd Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Tue, 11 Feb 2020 15:23:34 -0800 Subject: [PATCH 46/92] Capitalized "azure" --- ...roll-a-windows-10-device-automatically-using-group-policy.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md b/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md index ee0d0066a0..4ced3aefe8 100644 --- a/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md +++ b/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md @@ -66,7 +66,7 @@ The following steps demonstrate required settings using the Intune service: Additionally, verify that the SSO State section displays **AzureAdPrt** as **YES**. - ![Auto-enrollment azure AD prt verification](images/auto-enrollment-azureadprt-verification.png) + ![Auto-enrollment Azure AD prt verification](images/auto-enrollment-azureadprt-verification.png) This information can also be found on the Azure AD device list. From 2343f446ad755b56842cb614f8c1b64fe7feaab0 Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Tue, 11 Feb 2020 15:27:05 -0800 Subject: [PATCH 47/92] Update next-gen-threat-and-vuln-mgt.md --- .../microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md b/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md index 972fd91c1d..21237ae67a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md +++ b/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md @@ -27,7 +27,8 @@ Effectively identifying, assessing, and remediating endpoint weaknesses is pivot It helps organizations discover vulnerabilities and misconfigurations in real-time, based on sensors, without the need of agents or periodic scans. It prioritizes vulnerabilities based on the threat landscape, detections in your organization, sensitive information on vulnerable devices, and business context. -Watch this video for a quick overview of Threat & Vulnerability Management. +Watch this video for a quick overview of Threat & Vulnerability Management. +
>[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4mLsn] ## Next-generation capabilities From 89b4c225751d3cdafd7efe4a871345d4105184b7 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Tue, 11 Feb 2020 15:27:16 -0800 Subject: [PATCH 48/92] Update prevent-changes-to-security-settings-with-tamper-protection.md --- ...t-changes-to-security-settings-with-tamper-protection.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md b/windows/security/threat-protection/windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md index b5d731b602..3dd89a2653 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md +++ b/windows/security/threat-protection/windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md @@ -91,7 +91,7 @@ You must have appropriate [permissions](../microsoft-defender-atp/assign-portal- - Your organization must have [Microsoft Defender ATP E5](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp) (this is included in [Microsoft 365 E5](https://docs.microsoft.com/microsoft-365/enterprise/microsoft-365-overview)). - Your organization uses [Intune to manage devices](https://docs.microsoft.com/intune/fundamentals/what-is-device-management). ([Intune licenses](https://docs.microsoft.com/intune/fundamentals/licenses) are required; this is included in Microsoft 365 E5.) - - Your Windows machines must be running Windows OS [1709](https://docs.microsoft.com/windows/release-information/status-windows-10-1709), [1803](https://docs.microsoft.com/windows/release-information/status-windows-10-1803), [1809](https://docs.microsoft.com/windows/release-information/status-windows-10-1809-and-windows-server-2019) or later. (See [Windows 10 release information](https://docs.microsoft.com/windows/release-information/) for more details about releases.) + - Your Windows machines must be running Windows 10 OS [1709](https://docs.microsoft.com/windows/release-information/status-windows-10-1709), [1803](https://docs.microsoft.com/windows/release-information/status-windows-10-1803), [1809](https://docs.microsoft.com/windows/release-information/status-windows-10-1809-and-windows-server-2019) or later. (See [Windows 10 release information](https://docs.microsoft.com/windows/release-information/) for more details about releases.) - You must be using Windows security with [security intelligence](https://www.microsoft.com/wdsi/definitions) updated to version 1.287.60.0 (or above). - Your machines must be using anti-malware platform version 4.18.1906.3 (or above) and anti-malware engine version 1.1.15500.X (or above). ([Manage Windows Defender Antivirus updates and apply baselines](manage-updates-baselines-windows-defender-antivirus.md).) @@ -119,7 +119,7 @@ Here's what you see in the Windows Security app: ### Are you using Windows OS 1709, 1803, or 1809? -If you are using Windows OS [1709](https://docs.microsoft.com/windows/release-information/status-windows-10-1709), [1803](https://docs.microsoft.com/windows/release-information/status-windows-10-1803), or [1809](https://docs.microsoft.com/windows/release-information/status-windows-10-1809-and-windows-server-2019), you won't see **Tamper Protection** in the Windows Security app. In this case, you can use PowerShell to determine whether tamper protection is enabled. +If you are using Windows 10 OS [1709](https://docs.microsoft.com/windows/release-information/status-windows-10-1709), [1803](https://docs.microsoft.com/windows/release-information/status-windows-10-1803), or [1809](https://docs.microsoft.com/windows/release-information/status-windows-10-1809-and-windows-server-2019), you won't see **Tamper Protection** in the Windows Security app. In this case, you can use PowerShell to determine whether tamper protection is enabled. #### Use PowerShell to determine whether tamper protection is turned on @@ -155,7 +155,7 @@ To learn more about Threat & Vulnerability Management, see [Threat & Vulnerabili ### To which Windows OS versions is configuring tamper protection is applicable? -Windows OS [1709](https://docs.microsoft.com/windows/release-information/status-windows-10-1709), [1803](https://docs.microsoft.com/windows/release-information/status-windows-10-1803), [1809](https://docs.microsoft.com/windows/release-information/status-windows-10-1809-and-windows-server-2019), or later together with [Microsoft Defender Advanced Threat Protection E5](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp). +Windows 10 OS [1709](https://docs.microsoft.com/windows/release-information/status-windows-10-1709), [1803](https://docs.microsoft.com/windows/release-information/status-windows-10-1803), [1809](https://docs.microsoft.com/windows/release-information/status-windows-10-1809-and-windows-server-2019), or later together with [Microsoft Defender Advanced Threat Protection E5](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp). ### Is configuring tamper protection in Intune supported on servers? From 6299241f5f2a5023a5a5ed83ef41d3ba0903ca32 Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Tue, 11 Feb 2020 15:27:40 -0800 Subject: [PATCH 49/92] Update next-gen-threat-and-vuln-mgt.md --- .../microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md b/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md index 21237ae67a..09dea1ee83 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md +++ b/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md @@ -28,7 +28,7 @@ Effectively identifying, assessing, and remediating endpoint weaknesses is pivot It helps organizations discover vulnerabilities and misconfigurations in real-time, based on sensors, without the need of agents or periodic scans. It prioritizes vulnerabilities based on the threat landscape, detections in your organization, sensitive information on vulnerable devices, and business context. Watch this video for a quick overview of Threat & Vulnerability Management. -
+ >[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4mLsn] ## Next-generation capabilities From 1b1b898839bf8a53c0810d6a0b5b12be15f43e0c Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Tue, 11 Feb 2020 16:17:43 -0800 Subject: [PATCH 50/92] Update reqs-wd-app-guard.md --- .../windows-defender-application-guard/reqs-wd-app-guard.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md index 33b3e98451..5c81b7eb36 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md @@ -8,7 +8,7 @@ ms.pagetype: security ms.localizationpriority: medium author: denisebmsft ms.author: deniseb -ms.date: 11/09/2017 +ms.date: 02/11/2020 ms.reviewer: manager: dansimp ms.custom: asr @@ -42,4 +42,4 @@ Your environment needs the following software to run Windows Defender Applicatio |Operating system|Windows 10 Enterprise edition, version 1709 or higher
Windows 10 Professional edition, version 1803 or higher
Windows 10 Professional for Workstations edition, version 1803 or higher
Windows 10 Professional Education edition version 1803 or higher
Windows 10 Education edition, version 1903 or higher
Professional editions are only supported for non-managed devices; Intune or any other 3rd party mobile device management (MDM) solutions are not supported with WDAG for Professional editions. | |Browser|Microsoft Edge and Internet Explorer| |Management system
(only for managed devices)|[Microsoft Intune](https://docs.microsoft.com/intune/)

**-OR-**

[Microsoft Endpoint Configuration Manager](https://docs.microsoft.com/configmgr/)

**-OR-**

[Group Policy](https://technet.microsoft.com/library/cc753298(v=ws.11).aspx)

**-OR-**

Your current company-wide 3rd party mobile device management (MDM) solution. For info about 3rd party MDM solutions, see the documentation that came with your product.| -|Windows Defender Exploit Protection settings|The following settings should be configured or verified in the **Windows Security** app under **App & browser control** > **Exploit Protection** > **System Settings**.

**Control Flow Guard (CFG)** must be set to "Use default (On)" or "Off by default". If set to "On by default", Windows Defender Application Guard will not launch.

**Randomize memory allocations (Bottom-up ASLR)** must be set to "Use default (On)" or "Off by default". If set to "On by default", the `Vmmem` process will have high CPU utilization while a Windows Defender Application Guard window is open.| +|Windows Defender Exploit Protection settings|The following settings should be configured or verified in the **Windows Security** app under **App & browser control** > **Exploit protection** > **Exploit protection settings** > **System Settings**.

**Control flow guard (CFG)** must be set to **Use default (On)** or **Off by default**. If set to **On by default**, [Windows Defender Application Guard](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-guard) will not launch.

**Randomize memory allocations (Bottom-up ASLR)** must be set to **Use default (On)** or **Off by default**. If set to "On by default", the `Vmmem` process will have high CPU utilization while a Windows Defender Application Guard window is open.| From b7fb5242b49de26d6e77b9502ee4e0ceccdf5b13 Mon Sep 17 00:00:00 2001 From: Thomas Date: Tue, 11 Feb 2020 17:21:42 -0800 Subject: [PATCH 51/92] Update usmt-identify-users.md Trying to resolve issue where the note is not rendering properly --- windows/deployment/usmt/usmt-identify-users.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/usmt/usmt-identify-users.md b/windows/deployment/usmt/usmt-identify-users.md index ba68d36951..6f39e5eebe 100644 --- a/windows/deployment/usmt/usmt-identify-users.md +++ b/windows/deployment/usmt/usmt-identify-users.md @@ -46,7 +46,7 @@ USMT provides several options to migrate multiple users on a single computer. Th - [Specifying users.](#bkmk-8) You can specify which users to migrate with the **/all**, **/ui**, **/uel**, and **/ue** options with both the ScanState and LoadState command-line tools. - >[!IMPORTANT]   + >[!IMPORTANT] >The **/uel** option excludes users based on the **LastModified** date of the Ntuser.dat file. The **/uel** option is not valid in offline migrations. - [Moving users to another domain.](#bkmk-8) You can move user accounts to another domain using the **/md** option with the LoadState command-line tool. From 05e01cf792e134f30312403e571380a3ce4793a1 Mon Sep 17 00:00:00 2001 From: lomayor Date: Tue, 11 Feb 2020 17:54:48 -0800 Subject: [PATCH 52/92] break --- .../microsoft-defender-atp/advanced-hunting-overview.md | 2 +- .../microsoft-defender-atp/threat-analytics.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview.md index 587366afe0..e1afb98f0b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview.md @@ -30,7 +30,7 @@ You can use the same threat-hunting queries to build custom detection rules. The ## Get started with advanced hunting Watch this video for a quick overview of advanced hunting and a short tutorial that will get you started fast. -
+

>[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4bGqo] You can also go through each of the following steps to ramp up your advanced hunting knowledge. diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md b/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md index 8709092d9c..680d1d2df2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md @@ -27,7 +27,7 @@ Cyberthreats are emerging more frequently and prevalently. It is critical for or Threat analytics is a set of reports published by Microsoft security researchers as soon as emerging threats and outbreaks are identified. The reports help you assess the impact of threats to your environment and identify actions that can contain them. Watch this short video to quickly understand how threat analytics can help you track the latest threats and stop them. -
+

>[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4bw1f] ## View the threat analytics dashboard From 921ea7c83aaaf7a83b2dbf533ea003d329d85e22 Mon Sep 17 00:00:00 2001 From: lomayor Date: Tue, 11 Feb 2020 18:57:42 -0800 Subject: [PATCH 53/92] breaks --- .../microsoft-defender-atp/advanced-hunting-overview.md | 3 ++- .../microsoft-defender-atp/threat-analytics.md | 3 ++- 2 files changed, 4 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview.md index e1afb98f0b..5e5df96421 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview.md @@ -31,7 +31,8 @@ You can use the same threat-hunting queries to build custom detection rules. The ## Get started with advanced hunting Watch this video for a quick overview of advanced hunting and a short tutorial that will get you started fast.

->[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4bGqo] + +> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4bGqo] You can also go through each of the following steps to ramp up your advanced hunting knowledge. diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md b/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md index 680d1d2df2..2ade5dcf42 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-analytics.md @@ -28,7 +28,8 @@ Threat analytics is a set of reports published by Microsoft security researchers Watch this short video to quickly understand how threat analytics can help you track the latest threats and stop them.

->[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4bw1f] + +> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4bw1f] ## View the threat analytics dashboard From 5caf324852b49486a3f78677bb4fee8d28917440 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Wed, 12 Feb 2020 13:05:26 +0500 Subject: [PATCH 54/92] Update enlightened-microsoft-apps-and-wip.md --- .../enlightened-microsoft-apps-and-wip.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md b/windows/security/information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md index aaf98a84f7..8879dec483 100644 --- a/windows/security/information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md +++ b/windows/security/information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md @@ -73,8 +73,8 @@ Microsoft has made a concerted effort to enlighten several of our more popular a - Microsoft Remote Desktop ->[!NOTE] ->Microsoft Visio and Microsoft Project are not enlightended apps and need to be exempted from WIP policy. If they are allowed, there is a risk of data loss. For example, if a device is workplace-joined and managed and the user leaves the company, metadata files that the apps rely on remain encrypted and the apps stop functioining. +> [!NOTE] +> Microsoft Visio, Microsoft Office Access and Microsoft Project are not enlightended apps and need to be exempted from WIP policy. If they are allowed, there is a risk of data loss. For example, if a device is workplace-joined and managed and the user leaves the company, metadata files that the apps rely on remain encrypted and the apps stop functioining. ## List of WIP-work only apps from Microsoft Microsoft still has apps that are unenlightened, but which have been tested and deemed safe for use in an enterprise with WIP and MAM solutions. From f26e378cfc3e6e792914b599a1e6ec6de01a9f83 Mon Sep 17 00:00:00 2001 From: Manuel Hauch Date: Wed, 12 Feb 2020 10:23:24 +0100 Subject: [PATCH 55/92] Remove Windows Server 2016 There is no Windows Server 2016, version 1803. It only exists Windows Server 2016 and Windows Server, Version 1803. Since 2016 doesn't come with Exploit Protection remove it to reduce confusion. --- .../microsoft-defender-atp/exploit-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/exploit-protection.md b/windows/security/threat-protection/microsoft-defender-atp/exploit-protection.md index c0073ce75e..c3858eade6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exploit-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exploit-protection.md @@ -24,7 +24,7 @@ ms.custom: asr - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -Exploit protection automatically applies a number of exploit mitigation techniques to operating system processes and apps. Exploit protection is supported beginning with Windows 10, version 1709 and Windows Server 2016, version 1803. +Exploit protection automatically applies a number of exploit mitigation techniques to operating system processes and apps. Exploit protection is supported beginning with Windows 10, version 1709 and Windows Server, version 1803. > [!TIP] > You can visit the Windows Defender Testground website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the feature is working and see how it works. From 6cb823e00216a746e5af3ea7cfa5f4e84d2b4c6d Mon Sep 17 00:00:00 2001 From: Manuel Hauch Date: Wed, 12 Feb 2020 10:25:34 +0100 Subject: [PATCH 56/92] Update exploit-protection.md Again remove 2016 for clarification. --- .../microsoft-defender-atp/exploit-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/exploit-protection.md b/windows/security/threat-protection/microsoft-defender-atp/exploit-protection.md index c0073ce75e..d09f11e9d2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exploit-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exploit-protection.md @@ -93,7 +93,7 @@ Win32K | 260 | Untrusted Font ## Mitigation comparison -The mitigations available in EMET are included natively in Windows 10 (starting with version 1709) and Windows Server 2016 (starting with version 1803), under [Exploit protection](exploit-protection.md). +The mitigations available in EMET are included natively in Windows 10 (starting with version 1709) and Windows Server (starting with version 1803), under [Exploit protection](exploit-protection.md). The table in this section indicates the availability and support of native mitigations between EMET and exploit protection. From f58b879ea896f40dac9add5958d5f73d662588ef Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Wed, 12 Feb 2020 14:47:00 +0500 Subject: [PATCH 57/92] Update interactive-logon-smart-card-removal-behavior.md --- .../interactive-logon-smart-card-removal-behavior.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-smart-card-removal-behavior.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-smart-card-removal-behavior.md index c9c8515fe5..a20693d19b 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-smart-card-removal-behavior.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-smart-card-removal-behavior.md @@ -32,6 +32,9 @@ If smart cards are used for authentication, the device should automatically lock If you select **Force Logoff** in the property sheet for this policy setting, the user is automatically logged off when the smart card is removed. Users will have to reinsert their smart cards and reenter their PINs when they return to their workstations. +> [!NOTE] +> This policy depends on **Smart Card Removal Policy** service. The service must be running for the policy to take effect, so it is recommended to set the startup type of the service to **Automatic**. + ### Possible values - No Action From a557c146d1c48ba3fbd9d50e95a51cbcf443d28e Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Wed, 12 Feb 2020 20:39:54 +0530 Subject: [PATCH 58/92] i updated the sentences for the enabling of PUA as per the user request #5970 @BR77BE i updated content by removing and added sentences --- ...potentially-unwanted-apps-windows-defender-antivirus.md | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md index fc883cd71d..7639442d84 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md @@ -45,11 +45,12 @@ The next major version of Microsoft Edge, which is Chromium-based, blocks potent #### Enable PUA protection in Chromium-based Microsoft Edge -Although potentially unwanted application protection in Microsoft Edge (Chromium-based) is turned off by default, it can easily be turned on from within the browser. +Although potentially unwanted application protection in Microsoft Edge (Chromium-based) version 80.0.361.50 is turned off by default, it can easily be turned on from within the browser. -1. From the tool bar, select **Settings and more** > **Settings**. +1. From the three dots, select **Settings**. 2. Select **Privacy and services**. -3. Under the **Services** section, you can toggle **Potentially unwanted app blocking** on or off. +3. Under the **Services** section, you can toggle **Block potentially unwanted apps**. +4. Slide **ON**. > [!TIP] > If you are running Microsoft Edge (Chromium-based), you can safely explore the URL-blocking feature of PUA protection by testing it out on one of our Windows Defender SmartScreen [demo pages](https://demo.smartscreen.msft.net/). From b972cc41447245110410a979e0f3f13ec91dc82b Mon Sep 17 00:00:00 2001 From: amirsc3 <42802974+amirsc3@users.noreply.github.com> Date: Wed, 12 Feb 2020 18:34:33 +0200 Subject: [PATCH 59/92] Update troubleshoot-onboarding-error-messages.md Typo in document --- .../troubleshoot-onboarding-error-messages.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages.md index e49cc30afe..56a0d71130 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages.md +++ b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages.md @@ -73,7 +73,7 @@ You'll need to whitelist the `securitycenter.windows.com` and all sub-domains un ## Portal communication issues -If you encounter issues with accessing the portal, missing data, or restricted access to portions of the portal, you'll need to verify that the following URLs are whitelisted and open for communciation. +If you encounter issues with accessing the portal, missing data, or restricted access to portions of the portal, you'll need to verify that the following URLs are whitelisted and open for communication. - `*.blob.core.windows.net crl.microsoft.com` @@ -89,4 +89,4 @@ crl.microsoft.com` ## Related topics -- [Validate licensing provisioning and complete setup for Microsoft Defender ATP](licensing.md) \ No newline at end of file +- [Validate licensing provisioning and complete setup for Microsoft Defender ATP](licensing.md) From fe247eb5e61ad81db495d85cb7dec03a548433ce Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Wed, 12 Feb 2020 09:06:35 -0800 Subject: [PATCH 60/92] Update detect-block-potentially-unwanted-apps-windows-defender-antivirus.md --- ...tentially-unwanted-apps-windows-defender-antivirus.md | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md index 7639442d84..3fb436099a 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md @@ -13,7 +13,7 @@ author: denisebmsft ms.author: deniseb ms.custom: nextgen audience: ITPro -ms.date: 01/06/2020 +ms.date: 02/12/2020 ms.reviewer: manager: dansimp --- @@ -45,12 +45,11 @@ The next major version of Microsoft Edge, which is Chromium-based, blocks potent #### Enable PUA protection in Chromium-based Microsoft Edge -Although potentially unwanted application protection in Microsoft Edge (Chromium-based) version 80.0.361.50 is turned off by default, it can easily be turned on from within the browser. +Although potentially unwanted application protection in Microsoft Edge (Chromium-based, version 80.0.361.50) is turned off by default, it can easily be turned on from within the browser. -1. From the three dots, select **Settings**. +1. Select the ellipses, and then choose **Settings**. 2. Select **Privacy and services**. -3. Under the **Services** section, you can toggle **Block potentially unwanted apps**. -4. Slide **ON**. +3. Under the **Services** section, turn on **Block potentially unwanted apps**. > [!TIP] > If you are running Microsoft Edge (Chromium-based), you can safely explore the URL-blocking feature of PUA protection by testing it out on one of our Windows Defender SmartScreen [demo pages](https://demo.smartscreen.msft.net/). From d444b5ea81aff753af679c39190d7caf071a7d3f Mon Sep 17 00:00:00 2001 From: Tina Burden Date: Wed, 12 Feb 2020 10:01:43 -0800 Subject: [PATCH 61/92] pencil edit --- windows/deployment/usmt/usmt-identify-users.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/deployment/usmt/usmt-identify-users.md b/windows/deployment/usmt/usmt-identify-users.md index 9de4030607..95fd442bb7 100644 --- a/windows/deployment/usmt/usmt-identify-users.md +++ b/windows/deployment/usmt/usmt-identify-users.md @@ -11,6 +11,7 @@ ms.sitesec: library audience: itpro author: greg-lindsay ms.topic: article +ms.localizationpriority: medium --- # Identify Users From 61ba7451d698681a0d306da36c2b2b59c52b86b2 Mon Sep 17 00:00:00 2001 From: Tina Burden Date: Wed, 12 Feb 2020 10:10:15 -0800 Subject: [PATCH 62/92] pencil edit --- windows/deployment/usmt/usmt-identify-users.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/deployment/usmt/usmt-identify-users.md b/windows/deployment/usmt/usmt-identify-users.md index 95fd442bb7..dbd1036415 100644 --- a/windows/deployment/usmt/usmt-identify-users.md +++ b/windows/deployment/usmt/usmt-identify-users.md @@ -47,8 +47,8 @@ USMT provides several options to migrate multiple users on a single computer. Th - [Specifying users.](#bkmk-8) You can specify which users to migrate with the **/all**, **/ui**, **/uel**, and **/ue** options with both the ScanState and LoadState command-line tools. - >[!IMPORTANT]   - >The **/uel** option excludes users based on the **LastModified** date of the Ntuser.dat file. The **/uel** option is not valid in offline migrations. + >[!IMPORTANT]   + >The **/uel** option excludes users based on the **LastModified** date of the Ntuser.dat file. The **/uel** option is not valid in offline migrations. - [Moving users to another domain.](#bkmk-8) You can move user accounts to another domain using the **/md** option with the LoadState command-line tool. From fa1b8000c82aa0dace3b08a0b59f29ceea13a4fd Mon Sep 17 00:00:00 2001 From: Tina Burden Date: Wed, 12 Feb 2020 10:19:30 -0800 Subject: [PATCH 63/92] pencil edit --- windows/deployment/usmt/usmt-identify-users.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/deployment/usmt/usmt-identify-users.md b/windows/deployment/usmt/usmt-identify-users.md index dbd1036415..95fd442bb7 100644 --- a/windows/deployment/usmt/usmt-identify-users.md +++ b/windows/deployment/usmt/usmt-identify-users.md @@ -47,8 +47,8 @@ USMT provides several options to migrate multiple users on a single computer. Th - [Specifying users.](#bkmk-8) You can specify which users to migrate with the **/all**, **/ui**, **/uel**, and **/ue** options with both the ScanState and LoadState command-line tools. - >[!IMPORTANT]   - >The **/uel** option excludes users based on the **LastModified** date of the Ntuser.dat file. The **/uel** option is not valid in offline migrations. + >[!IMPORTANT]   + >The **/uel** option excludes users based on the **LastModified** date of the Ntuser.dat file. The **/uel** option is not valid in offline migrations. - [Moving users to another domain.](#bkmk-8) You can move user accounts to another domain using the **/md** option with the LoadState command-line tool. From ae8c76618128a69a1a4414eb97379ca7fd63d053 Mon Sep 17 00:00:00 2001 From: Thomas Raya Date: Wed, 12 Feb 2020 10:46:33 -0800 Subject: [PATCH 64/92] remove extra spaces extra spaces to the right of the note in line 50 are causing the note to not render properly. --- windows/deployment/usmt/usmt-identify-users.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/usmt/usmt-identify-users.md b/windows/deployment/usmt/usmt-identify-users.md index 95fd442bb7..b58c711dbf 100644 --- a/windows/deployment/usmt/usmt-identify-users.md +++ b/windows/deployment/usmt/usmt-identify-users.md @@ -47,7 +47,7 @@ USMT provides several options to migrate multiple users on a single computer. Th - [Specifying users.](#bkmk-8) You can specify which users to migrate with the **/all**, **/ui**, **/uel**, and **/ue** options with both the ScanState and LoadState command-line tools. - >[!IMPORTANT]   + >[!IMPORTANT] >The **/uel** option excludes users based on the **LastModified** date of the Ntuser.dat file. The **/uel** option is not valid in offline migrations. - [Moving users to another domain.](#bkmk-8) You can move user accounts to another domain using the **/md** option with the LoadState command-line tool. From f6f97495c50d254b3ce3d44bba66e73b1a247d6e Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Wed, 12 Feb 2020 12:11:41 -0800 Subject: [PATCH 65/92] deprecating Cortana at work --- .../configuration/cortana-at-work/cortana-at-work-powerbi.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/windows/configuration/cortana-at-work/cortana-at-work-powerbi.md b/windows/configuration/cortana-at-work/cortana-at-work-powerbi.md index 8ca269aefe..8ac11aab48 100644 --- a/windows/configuration/cortana-at-work/cortana-at-work-powerbi.md +++ b/windows/configuration/cortana-at-work/cortana-at-work-powerbi.md @@ -18,6 +18,9 @@ manager: dansimp - Windows 10, version 1703 - Windows 10 Mobile, version 1703 +>[IMPORTANT] +>Cortana for Power BI is deprecated and will not be available in future releases. This topic is provided as a reference for previous versions only. + Integration between Cortana and Power BI shows how Cortana can work with custom business analytics solutions to enable you to get answers directly from your key business data, including introducing new features that let you create custom Cortana “answers” using the full capabilities of Power BI Desktop. >[!Note] From 935c2927ebd46ab92086b98d689624fcd5e41559 Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Wed, 12 Feb 2020 12:35:17 -0800 Subject: [PATCH 66/92] fix note bug --- .../configuration/cortana-at-work/cortana-at-work-powerbi.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/configuration/cortana-at-work/cortana-at-work-powerbi.md b/windows/configuration/cortana-at-work/cortana-at-work-powerbi.md index 8ac11aab48..2673b1c378 100644 --- a/windows/configuration/cortana-at-work/cortana-at-work-powerbi.md +++ b/windows/configuration/cortana-at-work/cortana-at-work-powerbi.md @@ -18,7 +18,7 @@ manager: dansimp - Windows 10, version 1703 - Windows 10 Mobile, version 1703 ->[IMPORTANT] +>[!IMPORTANT] >Cortana for Power BI is deprecated and will not be available in future releases. This topic is provided as a reference for previous versions only. Integration between Cortana and Power BI shows how Cortana can work with custom business analytics solutions to enable you to get answers directly from your key business data, including introducing new features that let you create custom Cortana “answers” using the full capabilities of Power BI Desktop. From 377edbf4a083322728339a60ed41f679945ac1ad Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Wed, 12 Feb 2020 12:44:29 -0800 Subject: [PATCH 67/92] added sentence --- .../microsoft-defender-atp/web-content-filtering.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/web-content-filtering.md b/windows/security/threat-protection/microsoft-defender-atp/web-content-filtering.md index 5a60f9e9ae..14439573d7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/web-content-filtering.md +++ b/windows/security/threat-protection/microsoft-defender-atp/web-content-filtering.md @@ -26,7 +26,7 @@ ms.topic: article Web content filtering is part of [Web protection](web-protection-overview.md) in Microsoft Defender ATP. It enables your organization to track and regulate access to websites based on their content categories. Many of these websites, while not malicious, might be problematic due to compliance regulations, bandwidth usage, or other concerns. -You can configure policies across your machine groups to block certain categories, effectively preventing users within specified machine groups from accessing URLs within that category. If a category is not blocked, all your users will be able to access the URLs without disruption. However, web content filtering will continue to gather access statistics that you can use to understand web usage and inform future policy decisions. +You can configure policies across your machine groups to block certain categories, effectively preventing users within specified machine groups from accessing URLs within that category. If a category is not blocked, all your users will be able to access the URLs without disruption. However, web content filtering will continue to gather access statistics that you can use to understand web usage and inform future policy decisions. If an element on the page you’re viewing is making calls to a resource which is blocked, you will see a block notification. Web content filtering is available on most major web browsers, with blocks performed by SmartScreen (Edge) and Network Protection (Internet Explorer, Chrome, Firefox, and all other browsers). See the prerequisites section for more information about browser support. From 1acffcf1844c0586f8bf44ffbde9911852e46829 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Wed, 12 Feb 2020 13:28:31 -0800 Subject: [PATCH 68/92] Changes to try to fix indentation Also, labeled code blocks --- ...nfiguration-manager-to-manage-devices-with-semm.md | 11 +++++------ 1 file changed, 5 insertions(+), 6 deletions(-) diff --git a/devices/surface/use-system-center-configuration-manager-to-manage-devices-with-semm.md b/devices/surface/use-system-center-configuration-manager-to-manage-devices-with-semm.md index fd310cf7c7..d05bd975ad 100644 --- a/devices/surface/use-system-center-configuration-manager-to-manage-devices-with-semm.md +++ b/devices/surface/use-system-center-configuration-manager-to-manage-devices-with-semm.md @@ -75,7 +75,6 @@ To create a new application and deploy it to a collection that contains your Sur * **Import Information** – The Create Application Wizard will parse the .msi file and read the **Application Name** and **Product Code**. SurfaceUEFIManagerSetup.msi should be listed as the only file under the line **Content Files**, as shown in Figure 1. Select **Next** to proceed. - ![Information from Surface UEFI Manager setup is automatically parsed](images/config-mgr-semm-fig1.png "Information from Surface UEFI Manager setup is automatically parsed") *Figure 1. Information from Microsoft Surface UEFI Manager setup is automatically parsed* @@ -107,7 +106,7 @@ The sample scripts include examples of how to set Surface UEFI settings and how The first region of the script that you need to modify is the portion that specifies and loads the SEMM certificate, and also indicates SurfaceUEFIManager version, and the names for the SEMM configuration package and SEMM reset package. The certificate name and SurfaceUEFIManager version are specified on lines 56 through 73 in the ConfigureSEMM.ps1 script. - ``` + ```powershell 56 $WorkingDirPath = split-path -parent $MyInvocation.MyCommand.Definition 57 $packageRoot = "$WorkingDirPath\Config" 58 $certName = "FabrikamSEMMSample.pfx" @@ -137,7 +136,7 @@ On line 73, replace the value of the **$password** variable, from **1234** to th > [!Note] > The last two characters of the certificate thumbprint are required to enroll a device in SEMM. This script will display these digits to the user, which allows the user or technician to record these digits before the system reboots to enroll the device in SEMM. The script uses the following code, found on lines 150-155, to accomplish this. -``` +```powershell 150 # Device owners will need the last two characters of the thumbprint to accept SEMM ownership. 151 # For convenience we get the thumbprint here and present to the user. 152 $pw = ConvertTo-SecureString $password -AsPlainText -Force @@ -163,7 +162,7 @@ Administrators with access to the certificate file (.pfx) can read the thumbprin The first region of the script where you will specify the configuration for Surface UEFI is the **Configure Permissions** region. This region begins at line 210 in the sample script with the comment **# Configure Permissions** and continues to line 247. The following code fragment first sets permissions to all Surface UEFI settings so that they may be modified by SEMM only, then adds explicit permissions to allow the local user to modify the Surface UEFI password, TPM, and front and rear cameras. -``` +```powershell 210 # Configure Permissions 211 foreach ($uefiV2 IN $surfaceDevices.Values) { 212 if ($uefiV2.SurfaceUefiFamily -eq $Device.Model) { @@ -215,7 +214,7 @@ You can find information about the available settings names and IDs for Surface The second region of the script where you will specify the configuration for Surface UEFI is the **Configure Settings** region of the ConfigureSEMM.ps1 script, which configures whether each setting is enabled or disabled. The sample script includes instructions to set all settings to their default values. The script then provides explicit instructions to disable IPv6 for PXE Boot and to leave the Surface UEFI Administrator password unchanged. You can find this region beginning with the **# Configure Settings** comment at line 291 through line 335 in the sample script. The region appears as follows. -``` +```powershell 291 # Configure Settings 292 foreach ($uefiV2 IN $surfaceDevices.Values) { 293 if ($uefiV2.SurfaceUefiFamily -eq $Device.Model) { @@ -277,7 +276,7 @@ To identify enrolled systems for Configuration Manager, the ConfigureSEMM.ps1 sc The following code fragment, found on lines 380-477, is used to write these registry keys. -``` +```powershell 380 # For Endpoint Configuration Manager or other management solutions that wish to know what version is applied, tattoo the LSV and current DateTime (in UTC) to the registry: 381 $UTCDate = (Get-Date).ToUniversalTime().ToString() 382 $certIssuer = $certPrint.Issuer From 6e3a4b1002811cdf86ef6ae6e6d83e015ca27a07 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Wed, 12 Feb 2020 13:35:12 -0800 Subject: [PATCH 69/92] Added missing end punctuation --- .../credential-guard/credential-guard-requirements.md | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/windows/security/identity-protection/credential-guard/credential-guard-requirements.md b/windows/security/identity-protection/credential-guard/credential-guard-requirements.md index 3fb77b5244..5aef81711f 100644 --- a/windows/security/identity-protection/credential-guard/credential-guard-requirements.md +++ b/windows/security/identity-protection/credential-guard/credential-guard-requirements.md @@ -48,9 +48,9 @@ Credential Guard can protect secrets in a Hyper-V virtual machine, just as it wo - The Hyper-V host must have an IOMMU, and run at least Windows Server 2016 or Windows 10 version 1607. - The Hyper-V virtual machine must be Generation 2, have an enabled virtual TPM, and be running at least Windows Server 2016 or Windows 10. -For information about other host platforms, see [Enabling Windows Server 2016 and Hyper-V virtualization based security features on other platforms](https://blogs.technet.microsoft.com/windowsserver/2016/09/29/enabling-windows-server-2016-and-hyper-v-virtualization-based-security-features-on-other-platforms/) +For information about other host platforms, see [Enabling Windows Server 2016 and Hyper-V virtualization based security features on other platforms](https://blogs.technet.microsoft.com/windowsserver/2016/09/29/enabling-windows-server-2016-and-hyper-v-virtualization-based-security-features-on-other-platforms/). -For information about Windows Defender Remote Credential Guard hardware and software requirements, see [Windows Defender Remote Credential Guard requirements](https://docs.microsoft.com/windows/access-protection/remote-credential-guard#hardware-and-software-requirements) +For information about Windows Defender Remote Credential Guard hardware and software requirements, see [Windows Defender Remote Credential Guard requirements](https://docs.microsoft.com/windows/access-protection/remote-credential-guard#hardware-and-software-requirements). ## Application requirements @@ -85,8 +85,9 @@ Computers that meet additional qualifications can provide additional protections The following tables describe baseline protections, plus protections for improved security that are associated with hardware and firmware options available in 2015, 2016, and 2017. > [!NOTE] -> Beginning with Windows 10, version 1607, Trusted Platform Module (TPM 2.0) must be enabled by default on new shipping computers.
-> If you are an OEM, see [PC OEM requirements for Windows Defender Device Guard and Windows Defender Credential Guard](https://msdn.microsoft.com/library/windows/hardware/mt767514.aspx).
+> Beginning with Windows 10, version 1607, Trusted Platform Module (TPM 2.0) must be enabled by default on new shipping computers. +> +> If you are an OEM, see [PC OEM requirements for Windows Defender Device Guard and Windows Defender Credential Guard](https://msdn.microsoft.com/library/windows/hardware/mt767514.aspx). ### Baseline protections From cc88b4b1550fe0f85f43672ec547f9b55529c971 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Wed, 12 Feb 2020 13:40:41 -0800 Subject: [PATCH 70/92] Added end punctuation and a space --- .../hello-for-business/hello-faq.md | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-faq.md b/windows/security/identity-protection/hello-for-business/hello-faq.md index f7dcaffc22..07be2bbf3d 100644 --- a/windows/security/identity-protection/hello-for-business/hello-faq.md +++ b/windows/security/identity-protection/hello-for-business/hello-faq.md @@ -51,7 +51,7 @@ It is currently possible to set a convenience PIN on Azure Active Directory Join No. Windows 10 currently only supports one Windows Hello for Business camera and does not fluidly switch to an external camera when the computer is docked with the lid closed. The product group is aware of this and is investigating this topic further. ## What is the password-less strategy? -Watch Principal Program Manager Karanbir Singh's Ignite 2017 presentation **Microsoft's guide for going password-less** +Watch Principal Program Manager Karanbir Singh's Ignite 2017 presentation **Microsoft's guide for going password-less**. [Microsoft's password-less strategy](hello-videos.md#microsofts-passwordless-strategy) @@ -93,7 +93,7 @@ The **key trust** model authenticates to Active Directory using a raw key. Wind The **certificate trust** model authenticates to Active Directory using a certificate. Because this authentication uses a certificate, domain controllers running previous versions of Windows Server can authenticate the user. Therefore, you need to issue certificates to your end users, but you do not need Windows Server 2016 domain controllers. The certificate used in certificate trust uses the TPM protected private key to request a certificate from your enterprise's issuing certificate authority. ## Do I need Windows Server 2016 domain controllers? -There are many deployment options from which to choose. Some of those options require an adequate number of Windows Server 2016 domain controllers in the site where you have deployed Windows Hello for Business. There are other deployment options that use existing Windows Server 2008 R2 or later domain controllers. Choose the deployment option that best suits your environment +There are many deployment options from which to choose. Some of those options require an adequate number of Windows Server 2016 domain controllers in the site where you have deployed Windows Hello for Business. There are other deployment options that use existing Windows Server 2008 R2 or later domain controllers. Choose the deployment option that best suits your environment. ## What attributes are synchronized by Azure AD Connect with Windows Hello for Business? Review [Azure AD Connect sync: Attributes synchronized to Azure Active Directory](https://docs.microsoft.com/azure/active-directory/connect/active-directory-aadconnectsync-attributes-synchronized) for a list of attributes that are sync based on scenarios. The base scenarios that include Windows Hello for Business are [Windows 10](https://docs.microsoft.com/azure/active-directory/connect/active-directory-aadconnectsync-attributes-synchronized#windows-10) scenario and the [Device writeback](https://docs.microsoft.com/azure/active-directory/connect/active-directory-aadconnectsync-attributes-synchronized#device-writeback) scenario. Your environment may include additional attributes. @@ -111,7 +111,7 @@ Starting in Windows 10, version 1709, you can use multi-factor unlock to require Windows Hello represents the biometric framework provided in Windows 10. Windows Hello enables users to use biometrics to sign into their devices by securely storing their user name and password and releasing it for authentication when the user successfully identifies themselves using biometrics. Windows Hello for Business uses asymmetric keys protected by the device's security module that requires a user gesture (PIN or biometrics) to authenticate. ## Why can't I enroll biometrics for my local built-in Administrator? -Windows 10 does not allow the local administrator to enroll biometric gestures(face or fingerprint). +Windows 10 does not allow the local administrator to enroll biometric gestures (face or fingerprint). ## I have extended Active Directory to Azure Active Directory. Can I use the on-premises deployment model? No. If your organization is federated or using on-line services, such as Azure AD Connect, Office 365, or OneDrive, then you must use a hybrid deployment model. On-premises deployments are exclusive to organization who need more time before moving to the cloud and exclusively use Active Directory. @@ -144,7 +144,7 @@ The smart card emulation feature of Windows Hello for Business verifies the PIN No. The movement away from passwords is accomplished by gradually reducing the use of the password. In the occurrence where you cannot authenticate with biometrics, you need a fall back mechanism that is not a password. The PIN is the fall back mechanism. Disabling or hiding the PIN credential provider disabled the use of biometrics. ## How are keys protected? -Wherever possible, Windows Hello for Business takes advantage of trusted platform module (TPM) 2.0 hardware to generate and protect keys. However, Windows Hello and Windows Hello for Business does not require a TPM. Administrators can choose to allow key operations in software +Wherever possible, Windows Hello for Business takes advantage of trusted platform module (TPM) 2.0 hardware to generate and protect keys. However, Windows Hello and Windows Hello for Business does not require a TPM. Administrators can choose to allow key operations in software. Whenever possible, Microsoft strongly recommends the use of TPM hardware. The TPM protects against a variety of known and potential attacks, including PIN brute-force attacks. The TPM provides an additional layer of protection after an account lockout, too. When the TPM has locked the key material, the user will have to reset the PIN (which means he or she will have to use MFA to re-authenticate to the IDP before the IDP allows him or her to re-register). @@ -155,7 +155,7 @@ Yes. You can use the on-premises Windows Hello for Business deployment and comb Yes, if you are federated hybrid deployment, you can use any third-party that provides an Active Directory Federation Services (AD FS) multi-factor authentication adapter. A list of third-party MFA adapters can be found [here](https://docs.microsoft.com/windows-server/identity/ad-fs/operations/configure-additional-authentication-methods-for-ad-fs#microsoft-and-third-party-additional-authentication-methods). ## Does Windows Hello for Business work with third party federation servers? -Windows Hello for Business can work with any third-party federation servers that support the protocols used during provisioning experience. Interested third-parties can inquiry at [whfbfeedback@microsoft.com](mailto:whfbfeedback@microsoft.com?subject=collaboration) +Windows Hello for Business can work with any third-party federation servers that support the protocols used during provisioning experience. Interested third-parties can inquiry at [whfbfeedback@microsoft.com](mailto:whfbfeedback@microsoft.com?subject=collaboration). | Protocol | Description | | :---: | :--- | @@ -165,5 +165,5 @@ Windows Hello for Business can work with any third-party federation servers that | [[MS-OIDCE]: OpenID Connect 1.0 Protocol Extensions](https://msdn.microsoft.com/library/mt766592.aspx) | Specifies the OpenID Connect 1.0 Protocol Extensions. These extensions define additional claims to carry information about the end user, including the user principal name, a locally unique identifier, a time for password expiration, and a URL for password change. These extensions also define additional provider meta-data that enable the discovery of the issuer of access tokens and give additional information about provider capabilities. | ## Does Windows Hello for Business work with Mac and Linux clients? -Windows Hello for Business is a feature of Windows 10. At this time, Microsoft is not developing clients for other platforms. However, Microsoft is open to third parties who are interested in moving these platforms away from passwords. Interested third parties can get more information by emailing [whfbfeedback@microsoft.com](mailto:whfbfeedback@microsoft.com?subject=collaboration) +Windows Hello for Business is a feature of Windows 10. At this time, Microsoft is not developing clients for other platforms. However, Microsoft is open to third parties who are interested in moving these platforms away from passwords. Interested third parties can get more information by emailing [whfbfeedback@microsoft.com](mailto:whfbfeedback@microsoft.com?subject=collaboration). From 73a73ed73b2f46a7fcc5c71465eb0e1dfdee1a35 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Wed, 12 Feb 2020 13:57:54 -0800 Subject: [PATCH 71/92] Changing the spacing to try to get Figure 1 to be indented --- ...ter-configuration-manager-to-manage-devices-with-semm.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/devices/surface/use-system-center-configuration-manager-to-manage-devices-with-semm.md b/devices/surface/use-system-center-configuration-manager-to-manage-devices-with-semm.md index d05bd975ad..ff4453524b 100644 --- a/devices/surface/use-system-center-configuration-manager-to-manage-devices-with-semm.md +++ b/devices/surface/use-system-center-configuration-manager-to-manage-devices-with-semm.md @@ -75,9 +75,9 @@ To create a new application and deploy it to a collection that contains your Sur * **Import Information** – The Create Application Wizard will parse the .msi file and read the **Application Name** and **Product Code**. SurfaceUEFIManagerSetup.msi should be listed as the only file under the line **Content Files**, as shown in Figure 1. Select **Next** to proceed. - ![Information from Surface UEFI Manager setup is automatically parsed](images/config-mgr-semm-fig1.png "Information from Surface UEFI Manager setup is automatically parsed") - - *Figure 1. Information from Microsoft Surface UEFI Manager setup is automatically parsed* + ![Information from Surface UEFI Manager setup is automatically parsed](images/config-mgr-semm-fig1.png "Information from Surface UEFI Manager setup is automatically parsed") + + *Figure 1. Information from Microsoft Surface UEFI Manager setup is automatically parsed* * **General Information** – You can modify the name of the application and information about the publisher and version, or add comments on this page. The installation command for Microsoft Surface UEFI Manager is displayed in the Installation Program field. The default installation behavior of Install for system will allow Microsoft Surface UEFI Manager to install the required assemblies for SEMM even if a user is not logged on to the Surface device. Select **Next** to proceed. * **Summary** – The information that was parsed in the **Import Information** step and your selections from the **General Information** step is displayed on this page. Select **Next** to confirm your selections and create the application. From abef2c300f627534c4e48470341ed630eb70d34b Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Wed, 12 Feb 2020 14:08:14 -0800 Subject: [PATCH 72/92] Inserted blank line between "To connect your account to Windows" and Step a. These were run together in a single paragraph before this change. --- windows/configuration/cortana-at-work/cortana-at-work-powerbi.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/configuration/cortana-at-work/cortana-at-work-powerbi.md b/windows/configuration/cortana-at-work/cortana-at-work-powerbi.md index 2673b1c378..1239cdfc7a 100644 --- a/windows/configuration/cortana-at-work/cortana-at-work-powerbi.md +++ b/windows/configuration/cortana-at-work/cortana-at-work-powerbi.md @@ -38,6 +38,7 @@ To use this walkthrough, you’ll need: - **Azure Active Directory (Azure AD)/Work or School account**. You can use the account that you created for Office 365, or you can create a new one while you’re establishing your Power BI account. If you choose to use Azure AD, you must connect your Azure AD account to your Windows account. **To connect your account to Windows** + a. Open **Windows Settings**, click **Accounts**, click **Access work or school**, and then in the **Connect to work or school** section, click **Connect**. b. Follow the instructions to add your Azure Active Directory (Azure AD) account to Windows. From 5ea1674764967cb083c5a04581e05f174c22204e Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Wed, 12 Feb 2020 14:41:10 -0800 Subject: [PATCH 73/92] Trying more indentation in source of Figure 1 --- ...enter-configuration-manager-to-manage-devices-with-semm.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/devices/surface/use-system-center-configuration-manager-to-manage-devices-with-semm.md b/devices/surface/use-system-center-configuration-manager-to-manage-devices-with-semm.md index ff4453524b..1ac8eb8aa2 100644 --- a/devices/surface/use-system-center-configuration-manager-to-manage-devices-with-semm.md +++ b/devices/surface/use-system-center-configuration-manager-to-manage-devices-with-semm.md @@ -75,9 +75,9 @@ To create a new application and deploy it to a collection that contains your Sur * **Import Information** – The Create Application Wizard will parse the .msi file and read the **Application Name** and **Product Code**. SurfaceUEFIManagerSetup.msi should be listed as the only file under the line **Content Files**, as shown in Figure 1. Select **Next** to proceed. - ![Information from Surface UEFI Manager setup is automatically parsed](images/config-mgr-semm-fig1.png "Information from Surface UEFI Manager setup is automatically parsed") + ![Information from Surface UEFI Manager setup is automatically parsed](images/config-mgr-semm-fig1.png "Information from Surface UEFI Manager setup is automatically parsed") - *Figure 1. Information from Microsoft Surface UEFI Manager setup is automatically parsed* + *Figure 1. Information from Microsoft Surface UEFI Manager setup is automatically parsed* * **General Information** – You can modify the name of the application and information about the publisher and version, or add comments on this page. The installation command for Microsoft Surface UEFI Manager is displayed in the Installation Program field. The default installation behavior of Install for system will allow Microsoft Surface UEFI Manager to install the required assemblies for SEMM even if a user is not logged on to the Surface device. Select **Next** to proceed. * **Summary** – The information that was parsed in the **Import Information** step and your selections from the **General Information** step is displayed on this page. Select **Next** to confirm your selections and create the application. From 0d82b2f4180e710434ec10fde9d75b5e38dc552e Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Wed, 12 Feb 2020 15:19:42 -0800 Subject: [PATCH 74/92] Update network-protection.md --- .../microsoft-defender-atp/network-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/network-protection.md b/windows/security/threat-protection/microsoft-defender-atp/network-protection.md index 92abdc1744..64488a550e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/network-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/network-protection.md @@ -31,7 +31,7 @@ Network protection expands the scope of [Windows Defender SmartScreen](../window Network protection is supported beginning with Windows 10, version 1709. -More details on how to enable network protection: [Enable network protection](enable-network-protection.md) | Use Group Policy, PowerShell, or MDM CSPs to enable and manage network protection in your network. +For more details about how to enable network protection, see [Enable network protection](enable-network-protection.md). Use Group Policy, PowerShell, or MDM CSPs to enable and manage network protection in your network. > [!TIP] > You can visit the Windows Defender Testground website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the feature is working and see how it works. From d8ab722b14415fa741561f6269cff80f5def67af Mon Sep 17 00:00:00 2001 From: Karl Wester-Ebbinghaus <45657752+Karl-WE@users.noreply.github.com> Date: Thu, 13 Feb 2020 00:38:11 +0100 Subject: [PATCH 75/92] Update install-vamt.md outdated information on ADK download and missing reference that using an external full SQL Server works very well, too. Users should be advised to minimize the amount of localDB / Express as they do not get patched most of all times via WU / WSUS / MEM etc. --- .../deployment/volume-activation/install-vamt.md | 15 ++++++++++----- 1 file changed, 10 insertions(+), 5 deletions(-) diff --git a/windows/deployment/volume-activation/install-vamt.md b/windows/deployment/volume-activation/install-vamt.md index 9a229185cc..86f5ade189 100644 --- a/windows/deployment/volume-activation/install-vamt.md +++ b/windows/deployment/volume-activation/install-vamt.md @@ -9,7 +9,8 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: activation -audience: itpro author: greg-lindsay +audience: itpro +author: greg-lindsay ms.localizationpriority: medium ms.date: 03/11/2019 ms.topic: article @@ -34,8 +35,9 @@ You install VAMT as part of the Windows Assessment and Deployment Kit (ADK) for - [Windows Server with Desktop Experience](https://docs.microsoft.com/windows-server/get-started/getting-started-with-server-with-desktop-experience), with internet access and all updates applied - [Windows 10, version 1809 ADK](https://go.microsoft.com/fwlink/?linkid=2026036) - [SQL Server 2017 Express](https://www.microsoft.com/sql-server/sql-server-editions-express) +- alternatively any full SQL instance e.g. SQL Server 2014 or newer incl. CU / SP -### Install SQL Server 2017 Express +### Install SQL Server 2017 Express / alternatively use any Full SQL instance e.g. SQL Server 2014 or newer 1. Download and open the [SQL Server 2017 Express](https://www.microsoft.com/sql-server/sql-server-editions-express) package. 2. Select **Basic**. @@ -46,20 +48,23 @@ You install VAMT as part of the Windows Assessment and Deployment Kit (ADK) for ### Install VAMT using the ADK -1. Download and open the [Windows 10, version 1809 ADK](https://go.microsoft.com/fwlink/?linkid=2026036) package. +1. Download and open the [Windows 10, version 1903 ADK](https://go.microsoft.com/fwlink/?linkid=2086042) package. +Reminder: There won't be new ADK release for 1909. 2. Enter an install location or use the default path, and then select **Next**. 3. Select a privacy setting, and then select **Next**. 4. Accept the license terms. 5. On the **Select the features you want to install** page, select **Volume Activation Management Tool (VAMT)**, and then select **Install**. (You can select additional features to install as well.) 6. On the completion page, select **Close**. -### Configure VAMT to connect to SQL Server 2017 Express +### Configure VAMT to connect to SQL Server 2017 Express or full SQL Server 1. Open **Volume Active Management Tool 3.1** from the Start menu. -2. Enter the server instance name and a name for the database, select **Connect**, and then select **Yes** to create the database. See the following image for an example. +2. Enter the server instance name (for a remote SQL use the FQDN) and a name for the database, select **Connect**, and then select **Yes** to create the database. See the following image for an example for SQL. ![Server name is .\SQLEXPRESS and database name is VAMT](images/vamt-db.png) +for remote SQL Server use +servername.yourdomain.com From 749f1874204e9c222a792695ffe542cacfd34c66 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Wed, 12 Feb 2020 15:55:57 -0800 Subject: [PATCH 76/92] Update configure-block-at-first-sight-windows-defender-antivirus.md --- ...lock-at-first-sight-windows-defender-antivirus.md | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md index c5ea9149b8..af838d196f 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md @@ -50,7 +50,7 @@ Block at first sight requires a number of settings to be configured correctly or ### Confirm block at first sight is enabled with Intune -1. In Intune, navigate to **Device configuration - Profiles > *Profile name* > Device restrictions > Windows Defender Antivirus**. +1. In Intune, navigate to **Device configuration - Profiles** > *Profile name* > **Device restrictions** > **Windows Defender Antivirus**. > [!NOTE] > The profile you select must be a Device Restriction profile type, not an Endpoint Protection profile type. @@ -119,19 +119,19 @@ If you had to change any of the settings, you should re-deploy the Group Policy ### Confirm block at first sight is enabled with the Windows Security app -You can confirm that block at first sight is enabled in Windows Settings. +You can confirm that block at first sight is enabled in your Windows security settings. -Block at first sight is automatically enabled as long as **Cloud-based protection** and **Automatic sample submission** are both turned on. +Block at first sight is automatically enabled as long as **Cloud-delivered protection** and **Automatic sample submission** are both turned on. ### Confirm Block at First Sight is enabled on individual clients -1. Open the Windows Security app by clicking the shield icon in the task bar. +1. Open the Windows Security app. -2. Click the **Virus & threat protection** tile (or the shield icon on the left menu bar) and then click **Manage Settings** under **Virus & threat protection settings**: +2. Select **Virus & threat protection**, and then, under **Virus & threat protection settings**, select **Manage Settings**. ![Screenshot of the Virus & threat protection settings label in the Windows Security app](images/defender/wdav-protection-settings-wdsc.png) -3. Confirm that **Cloud-based Protection** and **Automatic sample submission** are switched to **On**. +3. Confirm that **Cloud-delivered protection** and **Automatic sample submission** are both turned on. > [!NOTE] > If the prerequisite settings are configured and deployed using Group Policy, the settings described in this section will be greyed-out and unavailable for use on individual endpoints. Changes made through a Group Policy Object must first be deployed to individual endpoints before the setting will be updated in Windows Settings. From 7699c929067a1205dd447c3a7a50b79c601c9d25 Mon Sep 17 00:00:00 2001 From: John Liu <49762389+ShenLanJohn@users.noreply.github.com> Date: Wed, 12 Feb 2020 17:07:20 -0800 Subject: [PATCH 77/92] CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20200212154746 (#2053) Co-authored-by: Direesh Kumar Kandakatla --- ...sues-windows-7-and-windows-server-2008-r2-sp1.yml | 12 +++++++++++- ...issues-windows-8.1-and-windows-server-2012-r2.yml | 2 +- .../resolved-issues-windows-server-2008-sp2.yml | 12 +++++++++++- .../resolved-issues-windows-server-2012.yml | 2 +- ...atus-windows-7-and-windows-server-2008-r2-sp1.yml | 10 ++++++++++ .../status-windows-server-2008-sp2.yml | 10 ++++++++++ 6 files changed, 44 insertions(+), 4 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml index 76a98fa268..cf77e81898 100644 --- a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml @@ -32,6 +32,7 @@ sections: - type: markdown text: "
MessageDate
Take action: February 2020 security update available for all supported versions of Windows
The February 2020 security update release, referred to as our “B” release, is now available for Windows 10, version 1909 and all supported versions of Windows. We recommend that you install these updates promptly. For more information on the different types of monthly quality updates, see our Windows 10 update servicing cadence primer. To be informed about the latest updates and releases, follow us on Twitter @WindowsUpdate.
February 11, 2020
08:00 AM PT
Take action: ESU security updates available for Windows 7 SP1, Windows Server 2008 R2 SP1 and Windows Server 2008 SP2
Windows 7 SP1, Windows Server 2008 R2 SP1, and Windows Server 2008 SP2 reached end of support on January 14, 2020. For customers who have purchased Extended Security Updates (ESU), the first monthly ESU security updates are now available. If your organization has not yet been able to complete your transition to Windows 10, Windows Server 2016, or Windows Server 2019 and want to continue to receive security updates for your current version of Windows, you will need to purchase Extended Security Updates. For information on how to do so, please see How to get Extended Security Updates for eligible Windows devices, Windows 7 ESU frequently ask questions, and Windows Server 2008 R2 SP1 and Windows Server 2008 SP2 ESU frequently asked questions.

We recommend ESU customers review the applicable KB article below for prerequisites and other important information you will need to deploy these updates.

The following updates were released today for Windows Server 2008 SP2:
The following updates were released today for Windows 7 SP1 and Windows Server 2008 R2 SP1:
February 11, 2020
08:00 AM PT
Resolved: Windows Search shows blank box
We are aware of a temporary server-side issue causing Windows search to show a blank box. This issue has been resolved for most users and in some cases, you might need to restart your device. We are working diligently to fully resolve the issue and will provide an update once resolved. 

This issue was resolved at 12:00 PM PST. If you are still experiencing issues, please restart your device. In rare cases, you may need to manually end the SearchUI.exe or SearchApp.exe process via Task Manager. (To locate these processes, select CTRL + Shift + Esc then select the Details tab.)
February 05, 2020
12:00 PM PT
January 2020 Windows 10, version 1909 \"D\" optional release is available.
The January 2020 optional monthly “D” release for Windows 10, version 1909 and Windows 10, version 1903 is now available. For more information on the different types of monthly quality updates, see our Windows 10 update servicing cadence primer. Follow @WindowsUpdate for the latest on the availability of this release.
January 28, 2020
08:00 AM PT
January 2020 Windows \"C\" optional release is available.
The January 2020 optional monthly “C” release for all supported versions of Windows is now available. For more information on the different types of monthly quality updates, see our Windows 10 update servicing cadence primer. Follow @WindowsUpdate for the latest on the availability of this release.
January 23, 2020
12:00 PM PT
+ @@ -50,6 +51,15 @@ sections:
" +- title: February 2020 +- items: + - type: markdown + text: " +
SummaryOriginating updateStatusDate resolved
After installing an update and restarting, you might receive an error
You might receive the error, “Failure to configure Windows updates. Reverting Changes.” or \"Failed\" in Update History.

See details >
February 11, 2020
KB4537820
Resolved
February 12, 2020
03:47 PM PT
Custom wallpaper displays as black
Using a custom image set to \"Stretch\" might not display as expected.

See details >
January 14, 2020
KB4534310
Resolved
KB4539601
February 07, 2020
10:00 AM PT
MSRT might fail to install and be re-offered from Windows Update or WSUS
The November 2019 update for Windows Malicious Software Removal Tool (MSRT) might fail to install from WU/WSUS.

See details >

Resolved
January 23, 2020
02:08 PM PT
Intermittent issues when printing
The print spooler service may intermittently have issues completing a print job and results print job failure.

See details >
September 24, 2019
KB4516048
Resolved
KB4519976
October 08, 2019
10:00 AM PT
+ +
DetailsOriginating updateStatusHistory
After installing an update and restarting, you might receive an error
After installing KB4537820 and restarting your device, you might receive the error, “Failure to configure Windows updates. Reverting Changes. Do not turn off your computer,” and the update might show as Failed in Update History.

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This is expected in the following circumstances:
  • If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see KB4497181.
  • If you do not have an ESU MAK add-on key installed and activated. 
If you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this blog post. For information on the prerequisites, see the \"How to get this update\" section of this article.

Back to top
February 11, 2020
KB4537820
Resolved
Resolved:
February 12, 2020
03:47 PM PT

Opened:
February 12, 2020
03:47 PM PT
+ " + - title: January 2020 - items: - type: markdown @@ -73,7 +83,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Intermittent issues when printing
Applications and printer drivers that leverage the Windows Javascript engine (jscript.dll) for processing print jobs might experience one or more of the following symptoms:
  • Applications interacting with the V4 printer driver might close or error when printing. Issues might only be encountered when printing but might also be encountered at any time the app is running, depending on when the app interacts with the print driver.
  • The printer spooler service (spoolsv.exe) might close or error in jscript.dll with exception code 0xc0000005 causing the print jobs to stop processing. Only part of the print job might print and the rest might be canceled or error.
Note This issue also affects the Internet Explorer Cumulative Update KB4522007, release September 23, 2019.

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4519976. If you are using Security Only updates, see KB4519974 for resolving KB for your platform.

Back to top
September 24, 2019
KB4516048
Resolved
KB4519976
Resolved:
October 08, 2019
10:00 AM PT

Opened:
September 30, 2019
06:26 PM PT
Intermittent issues when printing
Applications and printer drivers that leverage the Windows Javascript engine (jscript.dll) for processing print jobs might experience one or more of the following symptoms:
  • Applications interacting with the V4 printer driver might close or error when printing. Issues might only be encountered when printing but might also be encountered at any time the app is running, depending on when the app interacts with the print driver.
  • The printer spooler service (spoolsv.exe) might close or error in jscript.dll with exception code 0xc0000005 causing the print jobs to stop processing. Only part of the print job might print and the rest might be canceled or error.
Note This issue also affects the Internet Explorer Cumulative Update KB4522007, release September 23, 2019.

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4519976. If you are using Security Only updates, see KB4519974 for resolving KB for your platform.

Back to top
September 24, 2019
KB4516048
Resolved
KB4519976
Resolved:
October 08, 2019
10:00 AM PT

Opened:
September 30, 2019
06:26 PM PT
You may receive an error when opening or using the Toshiba Qosmio AV Center
After installing KB4512506, you may receive an error when opening or using the Toshiba Qosmio AV Center. You may also receive an error in Event Log related to cryptnet.dll.

Affected platforms:
  • Client: Windows 7 SP1
Resolution: This issue was resolved in KB4516048.

Back to top
August 13, 2019
KB4512506
Resolved
KB4516048
Resolved:
September 24, 2019
10:00 AM PT

Opened:
September 10, 2019
09:48 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml index 14837c1dae..3ad99d98ca 100644 --- a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml @@ -62,7 +62,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Intermittent issues when printing
Applications and printer drivers that leverage the Windows Javascript engine (jscript.dll) for processing print jobs might experience one or more of the following symptoms:
  • Applications interacting with the V4 printer driver might close or error when printing. Issues might only be encountered when printing but might also be encountered at any time the app is running, depending on when the app interacts with the print driver.
  • The printer spooler service (spoolsv.exe) might close or error in jscript.dll with exception code 0xc0000005 causing the print jobs to stop processing. Only part of the print job might print and the rest might be canceled or error.
Note This issue also affects the Internet Explorer Cumulative Update KB4522007, release September 23, 2019.

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4520005. If you are using Security Only updates, see KB4519974 for resolving KB for your platform.

Back to top
September 24, 2019
KB4516041
Resolved
KB4520005
Resolved:
October 08, 2019
10:00 AM PT

Opened:
September 30, 2019
06:26 PM PT
Intermittent issues when printing
Applications and printer drivers that leverage the Windows Javascript engine (jscript.dll) for processing print jobs might experience one or more of the following symptoms:
  • Applications interacting with the V4 printer driver might close or error when printing. Issues might only be encountered when printing but might also be encountered at any time the app is running, depending on when the app interacts with the print driver.
  • The printer spooler service (spoolsv.exe) might close or error in jscript.dll with exception code 0xc0000005 causing the print jobs to stop processing. Only part of the print job might print and the rest might be canceled or error.
Note This issue also affects the Internet Explorer Cumulative Update KB4522007, release September 23, 2019.

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4520005. If you are using Security Only updates, see KB4519974 for resolving KB for your platform.

Back to top
September 24, 2019
KB4516041
Resolved
KB4520005
Resolved:
October 08, 2019
10:00 AM PT

Opened:
September 30, 2019
06:26 PM PT
Windows RT 8.1 devices may have issues opening Internet Explorer 11
On Windows 8.1 RT devices, Internet Explorer 11 may not open and you may receive the error, \"C:\\Program Files\\Internet Explorer\\iexplore.exe: A certificate was explicitly revoked by its issuer.\"


Affected platforms:
  • Client: Windows RT 8.1
Resolution: This issue was resolved in KB4516041.

Back to top
September 10, 2019
KB4516067
Resolved
KB4516041
Resolved:
September 24, 2019
10:00 AM PT

Opened:
September 13, 2019
05:25 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml index 475eb994f9..81e984e8c7 100644 --- a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml +++ b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml @@ -32,6 +32,7 @@ sections: - type: markdown text: " + @@ -47,6 +48,15 @@ sections:
" +- title: February 2020 +- items: + - type: markdown + text: " +
SummaryOriginating updateStatusDate resolved
After installing an update and restarting, you might receive an error
You might receive the error, “Failure to configure Windows updates. Reverting Changes.” or \"Failed\" in Update History.

See details >
February 11, 2020
KB4537810
Resolved
February 12, 2020
03:47 PM PT
MSRT might fail to install and be re-offered from Windows Update or WSUS
The November 2019 update for Windows Malicious Software Removal Tool (MSRT) might fail to install from WU/WSUS.

See details >

Resolved
January 23, 2020
02:08 PM PT
Issues manually installing updates by double-clicking the .msu file
You may encounter issues manually installing updates by double-clicking the .msu file and may receive an error.

See details >
September 10, 2019
KB4474419
Resolved
KB4474419
September 23, 2019
10:00 AM PT
Intermittent issues when printing
The print spooler service may intermittently have issues completing a print job and results print job failure.

See details >
September 24, 2019
KB4516030
Resolved
KB4520002
October 08, 2019
10:00 AM PT
+ +
DetailsOriginating updateStatusHistory
After installing an update and restarting, you might receive an error
After installing KB4537810 and restarting your device, you might receive the error, “Failure to configure Windows updates. Reverting Changes. Do not turn off your computer,” and the update might show as Failed in Update History.

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This is expected in the following circumstances:
  • If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see KB4497181.
  • If you do not have an ESU MAK add-on key installed and activated. 
If you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this blog post. For information on the prerequisites, see the \"How to get this update\" section of this article.

Back to top
February 11, 2020
KB4537810
Resolved
Resolved:
February 12, 2020
03:47 PM PT

Opened:
February 12, 2020
03:47 PM PT
+ " + - title: November 2019 - items: - type: markdown @@ -62,7 +72,7 @@ sections: text: " - +
DetailsOriginating updateStatusHistory
Issues manually installing updates by double-clicking the .msu file
After installing the SHA-2 update (KB4474419) released on September 10, 2019, you may encounter issues manually installing updates by double-clicking on the .msu file and may receive the error, \"Installer encountered an error: 0x80073afc. The resource loader failed to find MUI file.\"

Affected platforms:
  • Server: Windows Server 2008 SP2
Workaround: Open a command prompt and use the following command (replacing <msu location> with the actual location and filename of the update): wusa.exe <msu location> /quiet

Resolution: This issue is resolved in KB4474419 released October 8, 2019. It will install automatically from Windows Update and Windows Server Update Services (WSUS). If you need to install this update manually, you will need to use the workaround above.

Note If you previously installed KB4474419 released September 23, 2019, then you already have the latest version of this update and do not need to reinstall.

Back to top
September 10, 2019
KB4474419
Resolved
KB4474419
Resolved:
September 23, 2019
10:00 AM PT

Opened:
September 20, 2019
04:57 PM PT
Intermittent issues when printing
Applications and printer drivers that leverage the Windows Javascript engine (jscript.dll) for processing print jobs might experience one or more of the following symptoms:
  • Applications interacting with the V4 printer driver might close or error when printing. Issues might only be encountered when printing but might also be encountered at any time the app is running, depending on when the app interacts with the print driver.
  • The printer spooler service (spoolsv.exe) might close or error in jscript.dll with exception code 0xc0000005 causing the print jobs to stop processing. Only part of the print job might print and the rest might be canceled or error.
Note This issue also affects the Internet Explorer Cumulative Update KB4522007, release September 23, 2019.

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4520002. If you are using Security Only updates, see KB4519974 for resolving KB for your platform.

Back to top
September 24, 2019
KB4516030
Resolved
KB4520002
Resolved:
October 08, 2019
10:00 AM PT

Opened:
September 30, 2019
06:26 PM PT
Intermittent issues when printing
Applications and printer drivers that leverage the Windows Javascript engine (jscript.dll) for processing print jobs might experience one or more of the following symptoms:
  • Applications interacting with the V4 printer driver might close or error when printing. Issues might only be encountered when printing but might also be encountered at any time the app is running, depending on when the app interacts with the print driver.
  • The printer spooler service (spoolsv.exe) might close or error in jscript.dll with exception code 0xc0000005 causing the print jobs to stop processing. Only part of the print job might print and the rest might be canceled or error.
Note This issue also affects the Internet Explorer Cumulative Update KB4522007, release September 23, 2019.

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4520002. If you are using Security Only updates, see KB4519974 for resolving KB for your platform.

Back to top
September 24, 2019
KB4516030
Resolved
KB4520002
Resolved:
October 08, 2019
10:00 AM PT

Opened:
September 30, 2019
06:26 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-server-2012.yml b/windows/release-information/resolved-issues-windows-server-2012.yml index fe6611a3e4..a3edb4121f 100644 --- a/windows/release-information/resolved-issues-windows-server-2012.yml +++ b/windows/release-information/resolved-issues-windows-server-2012.yml @@ -60,7 +60,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Intermittent issues when printing
Applications and printer drivers that leverage the Windows Javascript engine (jscript.dll) for processing print jobs might experience one or more of the following symptoms:
  • Applications interacting with the V4 printer driver might close or error when printing. Issues might only be encountered when printing but might also be encountered at any time the app is running, depending on when the app interacts with the print driver.
  • The printer spooler service (spoolsv.exe) might close or error in jscript.dll with exception code 0xc0000005 causing the print jobs to stop processing. Only part of the print job might print and the rest might be canceled or error.
Note This issue also affects the Internet Explorer Cumulative Update KB4522007, release September 23, 2019.

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4520007. If you are using Security Only updates, see KB4519974 for resolving KB for your platform.

Back to top
September 24, 2019
KB4516069
Resolved
KB4520007
Resolved:
October 08, 2019
10:00 AM PT

Opened:
September 30, 2019
06:26 PM PT
Intermittent issues when printing
Applications and printer drivers that leverage the Windows Javascript engine (jscript.dll) for processing print jobs might experience one or more of the following symptoms:
  • Applications interacting with the V4 printer driver might close or error when printing. Issues might only be encountered when printing but might also be encountered at any time the app is running, depending on when the app interacts with the print driver.
  • The printer spooler service (spoolsv.exe) might close or error in jscript.dll with exception code 0xc0000005 causing the print jobs to stop processing. Only part of the print job might print and the rest might be canceled or error.
Note This issue also affects the Internet Explorer Cumulative Update KB4522007, release September 23, 2019.

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4520007. If you are using Security Only updates, see KB4519974 for resolving KB for your platform.

Back to top
September 24, 2019
KB4516069
Resolved
KB4520007
Resolved:
October 08, 2019
10:00 AM PT

Opened:
September 30, 2019
06:26 PM PT
" diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index 594303eec5..133fd7bacf 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -60,6 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ @@ -74,6 +75,15 @@ sections:
" +- title: February 2020 +- items: + - type: markdown + text: " +
SummaryOriginating updateStatusLast updated
After installing an update and restarting, you might receive an error
You might receive the error, “Failure to configure Windows updates. Reverting Changes.” or \"Failed\" in Update History.

See details >
February 11, 2020
KB4537820
Resolved
February 12, 2020
03:47 PM PT
Custom wallpaper displays as black
Using a custom image set to \"Stretch\" might not display as expected.

See details >
January 14, 2020
KB4534310
Resolved
KB4539601
February 07, 2020
10:00 AM PT
MSRT might fail to install and be re-offered from Windows Update or WSUS
The November 2019 update for Windows Malicious Software Removal Tool (MSRT) might fail to install from WU/WSUS.

See details >

Resolved
January 23, 2020
02:08 PM PT
TLS connections might fail or timeout
Transport Layer Security (TLS) connections might fail or timeout when connecting or attempting a resumption.

See details >
October 08, 2019
KB4519976
Mitigated External
November 05, 2019
03:36 PM PT
+ +
DetailsOriginating updateStatusHistory
After installing an update and restarting, you might receive an error
After installing KB4537820 and restarting your device, you might receive the error, “Failure to configure Windows updates. Reverting Changes. Do not turn off your computer,” and the update might show as Failed in Update History.

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This is expected in the following circumstances:
  • If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see KB4497181.
  • If you do not have an ESU MAK add-on key installed and activated. 
If you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this blog post. For information on the prerequisites, see the \"How to get this update\" section of this article.

Back to top
February 11, 2020
KB4537820
Resolved
Resolved:
February 12, 2020
03:47 PM PT

Opened:
February 12, 2020
03:47 PM PT
+ " + - title: January 2020 - items: - type: markdown diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml index 122a392439..afe60f1877 100644 --- a/windows/release-information/status-windows-server-2008-sp2.yml +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -60,6 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+
SummaryOriginating updateStatusLast updated
After installing an update and restarting, you might receive an error
You might receive the error, “Failure to configure Windows updates. Reverting Changes.” or \"Failed\" in Update History.

See details >
February 11, 2020
KB4537810
Resolved
February 12, 2020
03:47 PM PT
MSRT might fail to install and be re-offered from Windows Update or WSUS
The November 2019 update for Windows Malicious Software Removal Tool (MSRT) might fail to install from WU/WSUS.

See details >

Resolved
January 23, 2020
02:08 PM PT
TLS connections might fail or timeout
Transport Layer Security (TLS) connections might fail or timeout when connecting or attempting a resumption.

See details >
October 08, 2019
KB4520002
Mitigated External
November 05, 2019
03:36 PM PT
@@ -72,6 +73,15 @@ sections:
" +- title: February 2020 +- items: + - type: markdown + text: " + + +
DetailsOriginating updateStatusHistory
After installing an update and restarting, you might receive an error
After installing KB4537810 and restarting your device, you might receive the error, “Failure to configure Windows updates. Reverting Changes. Do not turn off your computer,” and the update might show as Failed in Update History.

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This is expected in the following circumstances:
  • If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see KB4497181.
  • If you do not have an ESU MAK add-on key installed and activated. 
If you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this blog post. For information on the prerequisites, see the \"How to get this update\" section of this article.

Back to top
February 11, 2020
KB4537810
Resolved
Resolved:
February 12, 2020
03:47 PM PT

Opened:
February 12, 2020
03:47 PM PT
+ " + - title: November 2019 - items: - type: markdown From cef33a867cb3620d814ea69f220cfa7d19264643 Mon Sep 17 00:00:00 2001 From: John Liu <49762389+ShenLanJohn@users.noreply.github.com> Date: Wed, 12 Feb 2020 17:27:24 -0800 Subject: [PATCH 78/92] CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20200212154746 (#2053) (#2054) Co-authored-by: Direesh Kumar Kandakatla Co-authored-by: Direesh Kumar Kandakatla --- ...sues-windows-7-and-windows-server-2008-r2-sp1.yml | 12 +++++++++++- ...issues-windows-8.1-and-windows-server-2012-r2.yml | 2 +- .../resolved-issues-windows-server-2008-sp2.yml | 12 +++++++++++- .../resolved-issues-windows-server-2012.yml | 2 +- ...atus-windows-7-and-windows-server-2008-r2-sp1.yml | 10 ++++++++++ .../status-windows-server-2008-sp2.yml | 10 ++++++++++ 6 files changed, 44 insertions(+), 4 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml index 76a98fa268..cf77e81898 100644 --- a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml @@ -32,6 +32,7 @@ sections: - type: markdown text: " + @@ -50,6 +51,15 @@ sections:
" +- title: February 2020 +- items: + - type: markdown + text: " +
SummaryOriginating updateStatusDate resolved
After installing an update and restarting, you might receive an error
You might receive the error, “Failure to configure Windows updates. Reverting Changes.” or \"Failed\" in Update History.

See details >
February 11, 2020
KB4537820
Resolved
February 12, 2020
03:47 PM PT
Custom wallpaper displays as black
Using a custom image set to \"Stretch\" might not display as expected.

See details >
January 14, 2020
KB4534310
Resolved
KB4539601
February 07, 2020
10:00 AM PT
MSRT might fail to install and be re-offered from Windows Update or WSUS
The November 2019 update for Windows Malicious Software Removal Tool (MSRT) might fail to install from WU/WSUS.

See details >

Resolved
January 23, 2020
02:08 PM PT
Intermittent issues when printing
The print spooler service may intermittently have issues completing a print job and results print job failure.

See details >
September 24, 2019
KB4516048
Resolved
KB4519976
October 08, 2019
10:00 AM PT
+ +
DetailsOriginating updateStatusHistory
After installing an update and restarting, you might receive an error
After installing KB4537820 and restarting your device, you might receive the error, “Failure to configure Windows updates. Reverting Changes. Do not turn off your computer,” and the update might show as Failed in Update History.

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This is expected in the following circumstances:
  • If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see KB4497181.
  • If you do not have an ESU MAK add-on key installed and activated. 
If you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this blog post. For information on the prerequisites, see the \"How to get this update\" section of this article.

Back to top
February 11, 2020
KB4537820
Resolved
Resolved:
February 12, 2020
03:47 PM PT

Opened:
February 12, 2020
03:47 PM PT
+ " + - title: January 2020 - items: - type: markdown @@ -73,7 +83,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Intermittent issues when printing
Applications and printer drivers that leverage the Windows Javascript engine (jscript.dll) for processing print jobs might experience one or more of the following symptoms:
  • Applications interacting with the V4 printer driver might close or error when printing. Issues might only be encountered when printing but might also be encountered at any time the app is running, depending on when the app interacts with the print driver.
  • The printer spooler service (spoolsv.exe) might close or error in jscript.dll with exception code 0xc0000005 causing the print jobs to stop processing. Only part of the print job might print and the rest might be canceled or error.
Note This issue also affects the Internet Explorer Cumulative Update KB4522007, release September 23, 2019.

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4519976. If you are using Security Only updates, see KB4519974 for resolving KB for your platform.

Back to top
September 24, 2019
KB4516048
Resolved
KB4519976
Resolved:
October 08, 2019
10:00 AM PT

Opened:
September 30, 2019
06:26 PM PT
Intermittent issues when printing
Applications and printer drivers that leverage the Windows Javascript engine (jscript.dll) for processing print jobs might experience one or more of the following symptoms:
  • Applications interacting with the V4 printer driver might close or error when printing. Issues might only be encountered when printing but might also be encountered at any time the app is running, depending on when the app interacts with the print driver.
  • The printer spooler service (spoolsv.exe) might close or error in jscript.dll with exception code 0xc0000005 causing the print jobs to stop processing. Only part of the print job might print and the rest might be canceled or error.
Note This issue also affects the Internet Explorer Cumulative Update KB4522007, release September 23, 2019.

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4519976. If you are using Security Only updates, see KB4519974 for resolving KB for your platform.

Back to top
September 24, 2019
KB4516048
Resolved
KB4519976
Resolved:
October 08, 2019
10:00 AM PT

Opened:
September 30, 2019
06:26 PM PT
You may receive an error when opening or using the Toshiba Qosmio AV Center
After installing KB4512506, you may receive an error when opening or using the Toshiba Qosmio AV Center. You may also receive an error in Event Log related to cryptnet.dll.

Affected platforms:
  • Client: Windows 7 SP1
Resolution: This issue was resolved in KB4516048.

Back to top
August 13, 2019
KB4512506
Resolved
KB4516048
Resolved:
September 24, 2019
10:00 AM PT

Opened:
September 10, 2019
09:48 AM PT
" diff --git a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml index 14837c1dae..3ad99d98ca 100644 --- a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml @@ -62,7 +62,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Intermittent issues when printing
Applications and printer drivers that leverage the Windows Javascript engine (jscript.dll) for processing print jobs might experience one or more of the following symptoms:
  • Applications interacting with the V4 printer driver might close or error when printing. Issues might only be encountered when printing but might also be encountered at any time the app is running, depending on when the app interacts with the print driver.
  • The printer spooler service (spoolsv.exe) might close or error in jscript.dll with exception code 0xc0000005 causing the print jobs to stop processing. Only part of the print job might print and the rest might be canceled or error.
Note This issue also affects the Internet Explorer Cumulative Update KB4522007, release September 23, 2019.

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4520005. If you are using Security Only updates, see KB4519974 for resolving KB for your platform.

Back to top
September 24, 2019
KB4516041
Resolved
KB4520005
Resolved:
October 08, 2019
10:00 AM PT

Opened:
September 30, 2019
06:26 PM PT
Intermittent issues when printing
Applications and printer drivers that leverage the Windows Javascript engine (jscript.dll) for processing print jobs might experience one or more of the following symptoms:
  • Applications interacting with the V4 printer driver might close or error when printing. Issues might only be encountered when printing but might also be encountered at any time the app is running, depending on when the app interacts with the print driver.
  • The printer spooler service (spoolsv.exe) might close or error in jscript.dll with exception code 0xc0000005 causing the print jobs to stop processing. Only part of the print job might print and the rest might be canceled or error.
Note This issue also affects the Internet Explorer Cumulative Update KB4522007, release September 23, 2019.

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4520005. If you are using Security Only updates, see KB4519974 for resolving KB for your platform.

Back to top
September 24, 2019
KB4516041
Resolved
KB4520005
Resolved:
October 08, 2019
10:00 AM PT

Opened:
September 30, 2019
06:26 PM PT
Windows RT 8.1 devices may have issues opening Internet Explorer 11
On Windows 8.1 RT devices, Internet Explorer 11 may not open and you may receive the error, \"C:\\Program Files\\Internet Explorer\\iexplore.exe: A certificate was explicitly revoked by its issuer.\"


Affected platforms:
  • Client: Windows RT 8.1
Resolution: This issue was resolved in KB4516041.

Back to top
September 10, 2019
KB4516067
Resolved
KB4516041
Resolved:
September 24, 2019
10:00 AM PT

Opened:
September 13, 2019
05:25 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml index 475eb994f9..81e984e8c7 100644 --- a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml +++ b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml @@ -32,6 +32,7 @@ sections: - type: markdown text: " + @@ -47,6 +48,15 @@ sections:
" +- title: February 2020 +- items: + - type: markdown + text: " +
SummaryOriginating updateStatusDate resolved
After installing an update and restarting, you might receive an error
You might receive the error, “Failure to configure Windows updates. Reverting Changes.” or \"Failed\" in Update History.

See details >
February 11, 2020
KB4537810
Resolved
February 12, 2020
03:47 PM PT
MSRT might fail to install and be re-offered from Windows Update or WSUS
The November 2019 update for Windows Malicious Software Removal Tool (MSRT) might fail to install from WU/WSUS.

See details >

Resolved
January 23, 2020
02:08 PM PT
Issues manually installing updates by double-clicking the .msu file
You may encounter issues manually installing updates by double-clicking the .msu file and may receive an error.

See details >
September 10, 2019
KB4474419
Resolved
KB4474419
September 23, 2019
10:00 AM PT
Intermittent issues when printing
The print spooler service may intermittently have issues completing a print job and results print job failure.

See details >
September 24, 2019
KB4516030
Resolved
KB4520002
October 08, 2019
10:00 AM PT
+ +
DetailsOriginating updateStatusHistory
After installing an update and restarting, you might receive an error
After installing KB4537810 and restarting your device, you might receive the error, “Failure to configure Windows updates. Reverting Changes. Do not turn off your computer,” and the update might show as Failed in Update History.

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This is expected in the following circumstances:
  • If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see KB4497181.
  • If you do not have an ESU MAK add-on key installed and activated. 
If you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this blog post. For information on the prerequisites, see the \"How to get this update\" section of this article.

Back to top
February 11, 2020
KB4537810
Resolved
Resolved:
February 12, 2020
03:47 PM PT

Opened:
February 12, 2020
03:47 PM PT
+ " + - title: November 2019 - items: - type: markdown @@ -62,7 +72,7 @@ sections: text: " - +
DetailsOriginating updateStatusHistory
Issues manually installing updates by double-clicking the .msu file
After installing the SHA-2 update (KB4474419) released on September 10, 2019, you may encounter issues manually installing updates by double-clicking on the .msu file and may receive the error, \"Installer encountered an error: 0x80073afc. The resource loader failed to find MUI file.\"

Affected platforms:
  • Server: Windows Server 2008 SP2
Workaround: Open a command prompt and use the following command (replacing <msu location> with the actual location and filename of the update): wusa.exe <msu location> /quiet

Resolution: This issue is resolved in KB4474419 released October 8, 2019. It will install automatically from Windows Update and Windows Server Update Services (WSUS). If you need to install this update manually, you will need to use the workaround above.

Note If you previously installed KB4474419 released September 23, 2019, then you already have the latest version of this update and do not need to reinstall.

Back to top
September 10, 2019
KB4474419
Resolved
KB4474419
Resolved:
September 23, 2019
10:00 AM PT

Opened:
September 20, 2019
04:57 PM PT
Intermittent issues when printing
Applications and printer drivers that leverage the Windows Javascript engine (jscript.dll) for processing print jobs might experience one or more of the following symptoms:
  • Applications interacting with the V4 printer driver might close or error when printing. Issues might only be encountered when printing but might also be encountered at any time the app is running, depending on when the app interacts with the print driver.
  • The printer spooler service (spoolsv.exe) might close or error in jscript.dll with exception code 0xc0000005 causing the print jobs to stop processing. Only part of the print job might print and the rest might be canceled or error.
Note This issue also affects the Internet Explorer Cumulative Update KB4522007, release September 23, 2019.

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4520002. If you are using Security Only updates, see KB4519974 for resolving KB for your platform.

Back to top
September 24, 2019
KB4516030
Resolved
KB4520002
Resolved:
October 08, 2019
10:00 AM PT

Opened:
September 30, 2019
06:26 PM PT
Intermittent issues when printing
Applications and printer drivers that leverage the Windows Javascript engine (jscript.dll) for processing print jobs might experience one or more of the following symptoms:
  • Applications interacting with the V4 printer driver might close or error when printing. Issues might only be encountered when printing but might also be encountered at any time the app is running, depending on when the app interacts with the print driver.
  • The printer spooler service (spoolsv.exe) might close or error in jscript.dll with exception code 0xc0000005 causing the print jobs to stop processing. Only part of the print job might print and the rest might be canceled or error.
Note This issue also affects the Internet Explorer Cumulative Update KB4522007, release September 23, 2019.

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4520002. If you are using Security Only updates, see KB4519974 for resolving KB for your platform.

Back to top
September 24, 2019
KB4516030
Resolved
KB4520002
Resolved:
October 08, 2019
10:00 AM PT

Opened:
September 30, 2019
06:26 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-server-2012.yml b/windows/release-information/resolved-issues-windows-server-2012.yml index fe6611a3e4..a3edb4121f 100644 --- a/windows/release-information/resolved-issues-windows-server-2012.yml +++ b/windows/release-information/resolved-issues-windows-server-2012.yml @@ -60,7 +60,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
Intermittent issues when printing
Applications and printer drivers that leverage the Windows Javascript engine (jscript.dll) for processing print jobs might experience one or more of the following symptoms:
  • Applications interacting with the V4 printer driver might close or error when printing. Issues might only be encountered when printing but might also be encountered at any time the app is running, depending on when the app interacts with the print driver.
  • The printer spooler service (spoolsv.exe) might close or error in jscript.dll with exception code 0xc0000005 causing the print jobs to stop processing. Only part of the print job might print and the rest might be canceled or error.
Note This issue also affects the Internet Explorer Cumulative Update KB4522007, release September 23, 2019.

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4520007. If you are using Security Only updates, see KB4519974 for resolving KB for your platform.

Back to top
September 24, 2019
KB4516069
Resolved
KB4520007
Resolved:
October 08, 2019
10:00 AM PT

Opened:
September 30, 2019
06:26 PM PT
Intermittent issues when printing
Applications and printer drivers that leverage the Windows Javascript engine (jscript.dll) for processing print jobs might experience one or more of the following symptoms:
  • Applications interacting with the V4 printer driver might close or error when printing. Issues might only be encountered when printing but might also be encountered at any time the app is running, depending on when the app interacts with the print driver.
  • The printer spooler service (spoolsv.exe) might close or error in jscript.dll with exception code 0xc0000005 causing the print jobs to stop processing. Only part of the print job might print and the rest might be canceled or error.
Note This issue also affects the Internet Explorer Cumulative Update KB4522007, release September 23, 2019.

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4520007. If you are using Security Only updates, see KB4519974 for resolving KB for your platform.

Back to top
September 24, 2019
KB4516069
Resolved
KB4520007
Resolved:
October 08, 2019
10:00 AM PT

Opened:
September 30, 2019
06:26 PM PT
" diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index 594303eec5..133fd7bacf 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -60,6 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ @@ -74,6 +75,15 @@ sections:
" +- title: February 2020 +- items: + - type: markdown + text: " +
SummaryOriginating updateStatusLast updated
After installing an update and restarting, you might receive an error
You might receive the error, “Failure to configure Windows updates. Reverting Changes.” or \"Failed\" in Update History.

See details >
February 11, 2020
KB4537820
Resolved
February 12, 2020
03:47 PM PT
Custom wallpaper displays as black
Using a custom image set to \"Stretch\" might not display as expected.

See details >
January 14, 2020
KB4534310
Resolved
KB4539601
February 07, 2020
10:00 AM PT
MSRT might fail to install and be re-offered from Windows Update or WSUS
The November 2019 update for Windows Malicious Software Removal Tool (MSRT) might fail to install from WU/WSUS.

See details >

Resolved
January 23, 2020
02:08 PM PT
TLS connections might fail or timeout
Transport Layer Security (TLS) connections might fail or timeout when connecting or attempting a resumption.

See details >
October 08, 2019
KB4519976
Mitigated External
November 05, 2019
03:36 PM PT
+ +
DetailsOriginating updateStatusHistory
After installing an update and restarting, you might receive an error
After installing KB4537820 and restarting your device, you might receive the error, “Failure to configure Windows updates. Reverting Changes. Do not turn off your computer,” and the update might show as Failed in Update History.

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This is expected in the following circumstances:
  • If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see KB4497181.
  • If you do not have an ESU MAK add-on key installed and activated. 
If you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this blog post. For information on the prerequisites, see the \"How to get this update\" section of this article.

Back to top
February 11, 2020
KB4537820
Resolved
Resolved:
February 12, 2020
03:47 PM PT

Opened:
February 12, 2020
03:47 PM PT
+ " + - title: January 2020 - items: - type: markdown diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml index 122a392439..afe60f1877 100644 --- a/windows/release-information/status-windows-server-2008-sp2.yml +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -60,6 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+
SummaryOriginating updateStatusLast updated
After installing an update and restarting, you might receive an error
You might receive the error, “Failure to configure Windows updates. Reverting Changes.” or \"Failed\" in Update History.

See details >
February 11, 2020
KB4537810
Resolved
February 12, 2020
03:47 PM PT
MSRT might fail to install and be re-offered from Windows Update or WSUS
The November 2019 update for Windows Malicious Software Removal Tool (MSRT) might fail to install from WU/WSUS.

See details >

Resolved
January 23, 2020
02:08 PM PT
TLS connections might fail or timeout
Transport Layer Security (TLS) connections might fail or timeout when connecting or attempting a resumption.

See details >
October 08, 2019
KB4520002
Mitigated External
November 05, 2019
03:36 PM PT
@@ -72,6 +73,15 @@ sections:
" +- title: February 2020 +- items: + - type: markdown + text: " + + +
DetailsOriginating updateStatusHistory
After installing an update and restarting, you might receive an error
After installing KB4537810 and restarting your device, you might receive the error, “Failure to configure Windows updates. Reverting Changes. Do not turn off your computer,” and the update might show as Failed in Update History.

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This is expected in the following circumstances:
  • If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see KB4497181.
  • If you do not have an ESU MAK add-on key installed and activated. 
If you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this blog post. For information on the prerequisites, see the \"How to get this update\" section of this article.

Back to top
February 11, 2020
KB4537810
Resolved
Resolved:
February 12, 2020
03:47 PM PT

Opened:
February 12, 2020
03:47 PM PT
+ " + - title: November 2019 - items: - type: markdown From d575aa834c31b03b43b6ce12f6736af5e2251003 Mon Sep 17 00:00:00 2001 From: Ashley Date: Thu, 13 Feb 2020 10:21:45 +0000 Subject: [PATCH 79/92] Fix typo in 'firmware' --- devices/surface/surface-dock-firmware-update.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface/surface-dock-firmware-update.md b/devices/surface/surface-dock-firmware-update.md index ad38fb9081..aac758fa29 100644 --- a/devices/surface/surface-dock-firmware-update.md +++ b/devices/surface/surface-dock-firmware-update.md @@ -21,7 +21,7 @@ Microsoft Surface Dock Firmware Update supersedes the earlier Microsoft Surface > [!IMPORTANT] >Microsoft periodically releases new versions of Surface Dock Firmware Update. The MSI file is not self-updating. If you have deployed the MSI to Surface devices and a new version of the firmware is released, you will need to deploy the new version. -## Monitor the Surface Dock Firmare Update +## Monitor the Surface Dock Firmware Update This section is optional and provides an overview of how to monitor installation of the firmware update. When you are ready to install the update, see [Install the Surface Dock Firmware Update](#install-the-surface-dock-firmware-update) below. For more detailed information about monitoring the update process, see the following sections in this article: - [How to verify completion of firmware update](#how-to-verify-completion-of-the-firmware-update) From c08f3ac58b346138263c595139363ec2eae49412 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Thu, 13 Feb 2020 09:56:58 -0800 Subject: [PATCH 80/92] Update configure-local-policy-overrides-windows-defender-antivirus.md https://github.com/MicrosoftDocs/windows-itpro-docs/issues/5597 --- ...e-local-policy-overrides-windows-defender-antivirus.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus.md index fa061b9284..59f19f11c9 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus.md @@ -12,7 +12,7 @@ ms.localizationpriority: medium author: denisebmsft ms.author: deniseb ms.custom: nextgen -ms.date: 09/03/2018 +ms.date: 02/13/2020 ms.reviewer: manager: dansimp --- @@ -47,7 +47,7 @@ To configure these settings: 5. Deploy the Group Policy Object as usual. -Location | Setting | Configuration topic +Location | Setting | Article ---|---|---|--- MAPS | Configure local setting override for reporting to Microsoft MAPS | [Enable cloud-delivered protection](enable-cloud-protection-windows-defender-antivirus.md) Quarantine | Configure local setting override for the removal of items from Quarantine folder | [Configure remediation for scans](configure-remediation-windows-defender-antivirus.md) @@ -67,13 +67,13 @@ Scan | Configure local setting override for the scan type to use for a scheduled ## Configure how locally and globally defined threat remediation and exclusions lists are merged -You can also configure how locally defined lists are combined or merged with globally defined lists. This setting applies to [exclusion lists](configure-exclusions-windows-defender-antivirus.md) and [specified remediation lists](configure-remediation-windows-defender-antivirus.md). +You can also configure how locally defined lists are combined or merged with globally defined lists. This setting applies to [exclusion lists](configure-exclusions-windows-defender-antivirus.md), [specified remediation lists](configure-remediation-windows-defender-antivirus.md), and [attack surface reduction](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction). By default, lists that have been configured in local group policy and the Windows Security app are merged with lists that are defined by the appropriate Group Policy Object that you have deployed on your network. Where there are conflicts, the globally-defined list takes precedence. You can disable this setting to ensure that only globally-defined lists (such as those from any deployed GPOs) are used. -**Use Group Policy to disable local list merging:** +### Use Group Policy to disable local list merging 1. On your Group Policy management computer, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and click **Edit**. From c9e64100a631876bfe00f214834d9ba7204150e1 Mon Sep 17 00:00:00 2001 From: jaimeo Date: Thu, 13 Feb 2020 12:39:53 -0800 Subject: [PATCH 81/92] rewording note about 30-month support window --- windows/deployment/update/waas-overview.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/update/waas-overview.md b/windows/deployment/update/waas-overview.md index 812e47c937..cd447823e3 100644 --- a/windows/deployment/update/waas-overview.md +++ b/windows/deployment/update/waas-overview.md @@ -118,7 +118,7 @@ When Microsoft officially releases a feature update for Windows 10, it is made a Organizations are expected to initiate targeted deployment on Semi-Annual Channel releases. All customers, independent software vendors (ISVs), and partners should use this time for testing and piloting within their environments. After 2-4 months, we will transition to broad deployment and encourage customers and partners to expand and accelerate the deployment of the release. For customers using Windows Update for Business, the Semi-Annual Channel provides three months of additional total deployment time before being required to update to the next release. > [!NOTE] -> All releases of Windows 10 have 18 months of servicing for all editions--these updates provide security and feature updates for the release. Customers running Enterprise and Education editions have an additional 12 months of servicing for specific Windows 10 releases, for a total of 30 months from initial release. These versions include Enterprise and Education editions for Windows 10, versions 1607 and later. Starting in October 2018, all Semi-Annual Channel releases in the September/October timeframe will also have the additional 12 months of servicing for a total of 30 months from the initial release. The Semi-Annual Channel versions released in March/April timeframe will continue to have an 18-month lifecycle. +> All releases of Windows 10 have **18 months of servicing for all editions**--these updates provide security and feature updates for the release. However, fall releases of the **Enterprise and Education editions** will have an **additional 12 months of servicing for specific Windows 10 releases, for a total of 30 months from initial release**. This extended servicing window applies to Enterprise and Education editions starting with Windows 10, version 1607. > > > [!NOTE] From 77154dfab60f08a30c48cad270b7bf93eaf25679 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Thu, 13 Feb 2020 14:40:12 -0800 Subject: [PATCH 82/92] Update windows-autopilot-and-surface-devices.md --- devices/surface/windows-autopilot-and-surface-devices.md | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-) diff --git a/devices/surface/windows-autopilot-and-surface-devices.md b/devices/surface/windows-autopilot-and-surface-devices.md index 2ad84a094e..3de0dd3ef5 100644 --- a/devices/surface/windows-autopilot-and-surface-devices.md +++ b/devices/surface/windows-autopilot-and-surface-devices.md @@ -13,7 +13,7 @@ ms.author: dansimp ms.topic: article ms.localizationpriority: medium ms.audience: itpro -ms.date: 02/06/2020 +ms.date: 02/13/2020 --- # Windows Autopilot and Surface devices @@ -36,6 +36,13 @@ Broad deployment of Surface devices through Windows Autopilot, including enrollm These Windows versions support a 4,000-byte (4k) hash value that uniquely identifies devices for Windows Autopilot, which is necessary for deployments at scale. All new Surface devices, including Surface Pro 7, Surface Pro X, and Surface Laptop 3, ship with Windows 10 Version 1903 or later. +## Exchange experience on Surface devices in need of repair + +When receiving an exchange service order directly from a customer, Microsoft automatically checks for Windows Autopilot service enrollment and then deregisters the device from the customer’s tenant. Upon shipping back to the customer, Microsoft ensures the replacement device is enrolled into Windows Autopilot. + +> [!NOTE] +> When customers use a Partner to return devices, the Partner is responsible for managing the exchange process including deregistering and enrolling devices into Windows Autopilot. + ## Surface partners enabled for Windows Autopilot Select Surface partners can enroll Surface devices in Windows Autopilot for you at the time of purchase. They can also ship enrolled devices directly to your users. The devices can be configured entirely through a zero-touch process by using Windows Autopilot, Azure AD, and mobile device management. From 5571c2ddfe852324fbb55b005097d481b8fa74f7 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Thu, 13 Feb 2020 14:57:20 -0800 Subject: [PATCH 83/92] Update windows-autopilot-and-surface-devices.md --- devices/surface/windows-autopilot-and-surface-devices.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/devices/surface/windows-autopilot-and-surface-devices.md b/devices/surface/windows-autopilot-and-surface-devices.md index 3de0dd3ef5..add490a9a7 100644 --- a/devices/surface/windows-autopilot-and-surface-devices.md +++ b/devices/surface/windows-autopilot-and-surface-devices.md @@ -36,9 +36,9 @@ Broad deployment of Surface devices through Windows Autopilot, including enrollm These Windows versions support a 4,000-byte (4k) hash value that uniquely identifies devices for Windows Autopilot, which is necessary for deployments at scale. All new Surface devices, including Surface Pro 7, Surface Pro X, and Surface Laptop 3, ship with Windows 10 Version 1903 or later. -## Exchange experience on Surface devices in need of repair +## Exchange experience on Surface devices in need of repair or replacement -When receiving an exchange service order directly from a customer, Microsoft automatically checks for Windows Autopilot service enrollment and then deregisters the device from the customer’s tenant. Upon shipping back to the customer, Microsoft ensures the replacement device is enrolled into Windows Autopilot. +Microsoft automatically checks every Surface for Autopilot enrollment and will deregister the device from the customer’s tenant. Microsoft ensures the replacement device is enrolled into Windows Autopilot once a replacement is shipped back to the customer. This service is available on all device exchange service orders directly with Microsoft. > [!NOTE] > When customers use a Partner to return devices, the Partner is responsible for managing the exchange process including deregistering and enrolling devices into Windows Autopilot. From 64abfb29cf40c3dcee8268ba64df4d8dbe0e8f93 Mon Sep 17 00:00:00 2001 From: John Liu <49762389+ShenLanJohn@users.noreply.github.com> Date: Thu, 13 Feb 2020 17:07:00 -0800 Subject: [PATCH 84/92] CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20200213163023 (#2059) Co-authored-by: Direesh Kumar Kandakatla --- .../release-information/resolved-issues-windows-10-1607.yml | 5 ----- .../release-information/resolved-issues-windows-10-1709.yml | 3 --- .../release-information/resolved-issues-windows-10-1803.yml | 3 --- ...solved-issues-windows-10-1809-and-windows-server-2019.yml | 3 --- ...olved-issues-windows-7-and-windows-server-2008-r2-sp1.yml | 4 ++-- .../resolved-issues-windows-server-2008-sp2.yml | 4 ++-- .../status-windows-7-and-windows-server-2008-r2-sp1.yml | 4 ++-- .../release-information/status-windows-server-2008-sp2.yml | 4 ++-- windows/release-information/windows-message-center.yml | 4 +--- 9 files changed, 9 insertions(+), 25 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1607.yml b/windows/release-information/resolved-issues-windows-10-1607.yml index 343f302b6c..cabf372d2e 100644 --- a/windows/release-information/resolved-issues-windows-10-1607.yml +++ b/windows/release-information/resolved-issues-windows-10-1607.yml @@ -36,10 +36,8 @@ sections:
Intermittent issues when printing
The print spooler service may intermittently have issues completing a print job and results print job failure.

See details >OS Build 14393.3206

September 23, 2019
KB4522010Resolved
KB4519998October 08, 2019
10:00 AM PT
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.

See details >OS Build 14393.3204

September 10, 2019
KB4516044Resolved
September 17, 2019
04:47 PM PT
Apps and scripts using the NetQueryDisplayInformation API may fail with error
Applications and scripts that call NetQueryDisplayInformation may fail to return results after the first page of data.

See details >OS Build 14393.3053

June 18, 2019
KB4503294Resolved
KB4516044September 10, 2019
10:00 AM PT -
Domain connected devices that use MIT Kerberos realms will not start up
Devices may not start after updating when connected to a domain that is configured to use MIT Kerberos realms.

See details >OS Build 14393.3115

July 16, 2019
KB4507459Resolved
KB4512517August 13, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using PXE images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >OS Build 14393.3025

June 11, 2019
KB4503267Resolved
KB4512495August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications made using VB6, macros using VBA, and VBScript may stop responding and you may receive an error.

See details >OS Build 14393.3144

August 13, 2019
KB4512517Resolved
KB4512495August 17, 2019
02:00 PM PT -
Internet Explorer 11 and apps using the WebBrowser control may fail to render
JavaScript may fail to render as expected in IE11 and in apps using JavaScript or the WebBrowser control.

See details >OS Build 14393.3085

July 09, 2019
KB4507460Resolved
KB4512517August 13, 2019
10:00 AM PT " @@ -75,10 +73,7 @@ sections: - type: markdown text: " - -
DetailsOriginating updateStatusHistory
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4507459. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
-

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512517 and the safeguard hold has been removed. Please note, it can take up to 48 hours before you can update to offered Windows 10, version 1903 or Windows Server, version 1903.

Back to top
OS Build 14393.3115

July 16, 2019
KB4507459
Resolved
KB4512517
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503267 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512495.

Back to top
OS Build 14393.3025

June 11, 2019
KB4503267
Resolved
KB4512495
Resolved:
August 17, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT
Internet Explorer 11 and apps using the WebBrowser control may fail to render
Internet Explorer 11 may fail to render some JavaScript after installing KB4507460. You may also have issues with apps using JavaScript or the WebBrowser control, such as the present PowerPoint feature of Skype Meeting Broadcast.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server 2016
Resolution: This issue was resolved in KB4512517.

Back to top
OS Build 14393.3085

July 09, 2019
KB4507460
Resolved
KB4512517
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 26, 2019
04:58 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1709.yml b/windows/release-information/resolved-issues-windows-10-1709.yml index 3141761298..669db319e1 100644 --- a/windows/release-information/resolved-issues-windows-10-1709.yml +++ b/windows/release-information/resolved-issues-windows-10-1709.yml @@ -35,7 +35,6 @@ sections:
Unable to create local users in Chinese, Japanese and Korean during device setup
You might be unable to create users in Chinese, Japanese and Korean using Input Method Editor (IME) during OOBE.

See details >OS Build 16299.1387

September 10, 2019
KB4516066Resolved
KB4534318January 23, 2020
02:00 PM PT
Intermittent issues when printing
The print spooler service may intermittently have issues completing a print job and results print job failure.

See details >OS Build 16299.1392

September 23, 2019
KB4522012Resolved
KB4520004October 08, 2019
10:00 AM PT
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.

See details >OS Build 16299.1387

September 10, 2019
KB4516066Resolved
September 19, 2019
04:08 PM PT -
Domain connected devices that use MIT Kerberos realms will not start up
Devices may not start after updating when connected to a domain that is configured to use MIT Kerberos realms.

See details >OS Build 16299.1296

July 16, 2019
KB4507465Resolved
KB4512516August 13, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using PXE images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >OS Build 16299.1217

June 11, 2019
KB4503284Resolved
KB4512494August 16, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications made using VB6, macros using VBA, and VBScript may stop responding and you may receive an error.

See details >OS Build 16299.1331

August 13, 2019
KB4512516Resolved
KB4512494August 16, 2019
02:00 PM PT @@ -81,8 +80,6 @@ sections: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4507465. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
-

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512516 and the safeguard hold has been removed. Please note, it can take up to 48 hours before you can update to offered Windows 10, version 1903 or Windows Server, version 1903.

Back to top
OS Build 16299.1296

July 16, 2019
KB4507465
Resolved
KB4512516
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503284 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512494.

Back to top
OS Build 16299.1217

June 11, 2019
KB4503284
Resolved
KB4512494
Resolved:
August 16, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1803.yml b/windows/release-information/resolved-issues-windows-10-1803.yml index 37a0f56eab..c5f045f610 100644 --- a/windows/release-information/resolved-issues-windows-10-1803.yml +++ b/windows/release-information/resolved-issues-windows-10-1803.yml @@ -37,7 +37,6 @@ sections:
Startup to a black screen after installing updates
Your device may startup to a black screen during the first logon after installing updates.

See details >OS Build 17134.829

June 11, 2019
KB4503286Resolved
KB4519978October 15, 2019
10:00 AM PT
Intermittent issues when printing
The print spooler service may intermittently have issues completing a print job and results print job failure.

See details >OS Build 17134.1009

September 23, 2019
KB4522014Resolved
KB4520008October 08, 2019
10:00 AM PT
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.

See details >OS Build 17134.1006

September 10, 2019
KB4516058Resolved
September 19, 2019
04:08 PM PT -
Domain connected devices that use MIT Kerberos realms will not start up
Devices may not start after updating when connected to a domain that is configured to use MIT Kerberos realms.

See details >OS Build 17134.915

July 16, 2019
KB4507466Resolved
KB4512501August 13, 2019
10:00 AM PT
Notification issue: \"Your device is missing important security and quality fixes.\"
Some users may have incorrectly received the notification \"Your device is missing important security and quality fixes.\"

See details >N/A

Resolved
September 03, 2019
12:32 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using PXE images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >OS Build 17134.829

June 11, 2019
KB4503286Resolved
KB4512509August 19, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications made using VB6, macros using VBA, and VBScript may stop responding and you may receive an error.

See details >OS Build 17134.950

August 13, 2019
KB4512501Resolved
KB4512509August 19, 2019
02:00 PM PT @@ -86,8 +85,6 @@ sections: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4507466. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
-

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512501 and the safeguard hold has been removed. Please note, it can take up to 48 hours before you can update to offered Windows 10, version 1903 or Windows Server, version 1903.

Back to top
OS Build 17134.915

July 16, 2019
KB4507466
Resolved
KB4512501
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503286 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512509.

Back to top
OS Build 17134.829

June 11, 2019
KB4503286
Resolved
KB4512509
Resolved:
August 19, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index fe9b47b46b..727b436221 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -39,7 +39,6 @@ sections:
Intermittent issues when printing
The print spooler service may intermittently have issues completing a print job and results print job failure.

See details >OS Build 17763.740

September 23, 2019
KB4522015Resolved
KB4519338October 08, 2019
10:00 AM PT
Apps and scripts using the NetQueryDisplayInformation API may fail with error
Applications and scripts that call NetQueryDisplayInformation may fail to return results after the first page of data.

See details >OS Build 17763.55

October 09, 2018
KB4464330Resolved
KB4516077September 24, 2019
10:00 AM PT
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.

See details >OS Build 17763.737

September 10, 2019
KB4512578Resolved
September 19, 2019
04:08 PM PT -
Domain connected devices that use MIT Kerberos realms will not start up
Devices may not start after updating when connected to a domain that is configured to use MIT Kerberos realms.

See details >OS Build 17763.652

July 22, 2019
KB4505658Resolved
KB4511553August 13, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using PXE images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >OS Build 17763.557

June 11, 2019
KB4503327Resolved
KB4512534August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications made using VB6, macros using VBA, and VBScript may stop responding and you may receive an error.

See details >OS Build 17763.678

August 13, 2019
KB4511553Resolved
KB4512534August 17, 2019
02:00 PM PT @@ -88,8 +87,6 @@ sections: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4505658. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
-

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4511553 and the safeguard hold has been removed. Please note, it can take up to 48 hours before you can update to offered Windows 10, version 1903 or Windows Server, version 1903.

Back to top
OS Build 17763.652

July 22, 2019
KB4505658
Resolved
KB4511553
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503327 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512534.

Back to top
OS Build 17763.557

June 11, 2019
KB4503327
Resolved
KB4512534
Resolved:
August 17, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml index cf77e81898..8ae49f0e18 100644 --- a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml @@ -32,7 +32,7 @@ sections: - type: markdown text: " - + @@ -56,7 +56,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusDate resolved
After installing an update and restarting, you might receive an error
You might receive the error, “Failure to configure Windows updates. Reverting Changes.” or \"Failed\" in Update History.

See details >
February 11, 2020
KB4537820
Resolved
February 12, 2020
03:47 PM PT
After installing an update and restarting, you might receive an error
You might receive the error, “Failure to configure Windows updates. Reverting Changes.” or \"Failed\" in Update History.

See details >
February 11, 2020
KB4537820
Resolved
February 12, 2020
05:37 PM PT
Custom wallpaper displays as black
Using a custom image set to \"Stretch\" might not display as expected.

See details >
January 14, 2020
KB4534310
Resolved
KB4539601
February 07, 2020
10:00 AM PT
MSRT might fail to install and be re-offered from Windows Update or WSUS
The November 2019 update for Windows Malicious Software Removal Tool (MSRT) might fail to install from WU/WSUS.

See details >

Resolved
January 23, 2020
02:08 PM PT
Intermittent issues when printing
The print spooler service may intermittently have issues completing a print job and results print job failure.

See details >
September 24, 2019
KB4516048
Resolved
KB4519976
October 08, 2019
10:00 AM PT
- +
DetailsOriginating updateStatusHistory
After installing an update and restarting, you might receive an error
After installing KB4537820 and restarting your device, you might receive the error, “Failure to configure Windows updates. Reverting Changes. Do not turn off your computer,” and the update might show as Failed in Update History.

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This is expected in the following circumstances:
  • If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see KB4497181.
  • If you do not have an ESU MAK add-on key installed and activated. 
If you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this blog post. For information on the prerequisites, see the \"How to get this update\" section of this article.

Back to top
February 11, 2020
KB4537820
Resolved
Resolved:
February 12, 2020
03:47 PM PT

Opened:
February 12, 2020
03:47 PM PT
After installing an update and restarting, you might receive an error
After installing KB4537820 and restarting your device, you might receive the error, “Failure to configure Windows updates. Reverting Changes. Do not turn off your computer,” and the update might show as Failed in Update History.

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This is expected in the following circumstances:
  • If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see KB4497181.
  • If you do not have an ESU MAK add-on key installed and activated. 
If you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this blog post. For information on the prerequisites, see the \"How to get this update\" section of this article.

Back to top
February 11, 2020
KB4537820
Resolved
Resolved:
February 12, 2020
05:37 PM PT

Opened:
February 12, 2020
03:47 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml index 81e984e8c7..a86f0270a1 100644 --- a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml +++ b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml @@ -32,7 +32,7 @@ sections: - type: markdown text: " - + @@ -53,7 +53,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusDate resolved
After installing an update and restarting, you might receive an error
You might receive the error, “Failure to configure Windows updates. Reverting Changes.” or \"Failed\" in Update History.

See details >
February 11, 2020
KB4537810
Resolved
February 12, 2020
03:47 PM PT
After installing an update and restarting, you might receive an error
You might receive the error, “Failure to configure Windows updates. Reverting Changes.” or \"Failed\" in Update History.

See details >
February 11, 2020
KB4537810
Resolved
February 12, 2020
05:37 PM PT
MSRT might fail to install and be re-offered from Windows Update or WSUS
The November 2019 update for Windows Malicious Software Removal Tool (MSRT) might fail to install from WU/WSUS.

See details >

Resolved
January 23, 2020
02:08 PM PT
Issues manually installing updates by double-clicking the .msu file
You may encounter issues manually installing updates by double-clicking the .msu file and may receive an error.

See details >
September 10, 2019
KB4474419
Resolved
KB4474419
September 23, 2019
10:00 AM PT
Intermittent issues when printing
The print spooler service may intermittently have issues completing a print job and results print job failure.

See details >
September 24, 2019
KB4516030
Resolved
KB4520002
October 08, 2019
10:00 AM PT
- +
DetailsOriginating updateStatusHistory
After installing an update and restarting, you might receive an error
After installing KB4537810 and restarting your device, you might receive the error, “Failure to configure Windows updates. Reverting Changes. Do not turn off your computer,” and the update might show as Failed in Update History.

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This is expected in the following circumstances:
  • If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see KB4497181.
  • If you do not have an ESU MAK add-on key installed and activated. 
If you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this blog post. For information on the prerequisites, see the \"How to get this update\" section of this article.

Back to top
February 11, 2020
KB4537810
Resolved
Resolved:
February 12, 2020
03:47 PM PT

Opened:
February 12, 2020
03:47 PM PT
After installing an update and restarting, you might receive an error
After installing KB4537810 and restarting your device, you might receive the error, “Failure to configure Windows updates. Reverting Changes. Do not turn off your computer,” and the update might show as Failed in Update History.

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This is expected in the following circumstances:
  • If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see KB4497181.
  • If you do not have an ESU MAK add-on key installed and activated. 
If you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this blog post. For information on the prerequisites, see the \"How to get this update\" section of this article.

Back to top
February 11, 2020
KB4537810
Resolved
Resolved:
February 12, 2020
05:37 PM PT

Opened:
February 12, 2020
03:47 PM PT
" diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index 133fd7bacf..d47c63c516 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -60,7 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- + @@ -80,7 +80,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
After installing an update and restarting, you might receive an error
You might receive the error, “Failure to configure Windows updates. Reverting Changes.” or \"Failed\" in Update History.

See details >
February 11, 2020
KB4537820
Resolved
February 12, 2020
03:47 PM PT
After installing an update and restarting, you might receive an error
You might receive the error, “Failure to configure Windows updates. Reverting Changes.” or \"Failed\" in Update History.

See details >
February 11, 2020
KB4537820
Resolved
February 12, 2020
05:37 PM PT
Custom wallpaper displays as black
Using a custom image set to \"Stretch\" might not display as expected.

See details >
January 14, 2020
KB4534310
Resolved
KB4539601
February 07, 2020
10:00 AM PT
MSRT might fail to install and be re-offered from Windows Update or WSUS
The November 2019 update for Windows Malicious Software Removal Tool (MSRT) might fail to install from WU/WSUS.

See details >

Resolved
January 23, 2020
02:08 PM PT
TLS connections might fail or timeout
Transport Layer Security (TLS) connections might fail or timeout when connecting or attempting a resumption.

See details >
October 08, 2019
KB4519976
Mitigated External
November 05, 2019
03:36 PM PT
- +
DetailsOriginating updateStatusHistory
After installing an update and restarting, you might receive an error
After installing KB4537820 and restarting your device, you might receive the error, “Failure to configure Windows updates. Reverting Changes. Do not turn off your computer,” and the update might show as Failed in Update History.

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This is expected in the following circumstances:
  • If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see KB4497181.
  • If you do not have an ESU MAK add-on key installed and activated. 
If you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this blog post. For information on the prerequisites, see the \"How to get this update\" section of this article.

Back to top
February 11, 2020
KB4537820
Resolved
Resolved:
February 12, 2020
03:47 PM PT

Opened:
February 12, 2020
03:47 PM PT
After installing an update and restarting, you might receive an error
After installing KB4537820 and restarting your device, you might receive the error, “Failure to configure Windows updates. Reverting Changes. Do not turn off your computer,” and the update might show as Failed in Update History.

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This is expected in the following circumstances:
  • If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see KB4497181.
  • If you do not have an ESU MAK add-on key installed and activated. 
If you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this blog post. For information on the prerequisites, see the \"How to get this update\" section of this article.

Back to top
February 11, 2020
KB4537820
Resolved
Resolved:
February 12, 2020
05:37 PM PT

Opened:
February 12, 2020
03:47 PM PT
" diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml index afe60f1877..44b16a1a5e 100644 --- a/windows/release-information/status-windows-server-2008-sp2.yml +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -60,7 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- +
SummaryOriginating updateStatusLast updated
After installing an update and restarting, you might receive an error
You might receive the error, “Failure to configure Windows updates. Reverting Changes.” or \"Failed\" in Update History.

See details >
February 11, 2020
KB4537810
Resolved
February 12, 2020
03:47 PM PT
After installing an update and restarting, you might receive an error
You might receive the error, “Failure to configure Windows updates. Reverting Changes.” or \"Failed\" in Update History.

See details >
February 11, 2020
KB4537810
Resolved
February 12, 2020
05:37 PM PT
MSRT might fail to install and be re-offered from Windows Update or WSUS
The November 2019 update for Windows Malicious Software Removal Tool (MSRT) might fail to install from WU/WSUS.

See details >

Resolved
January 23, 2020
02:08 PM PT
TLS connections might fail or timeout
Transport Layer Security (TLS) connections might fail or timeout when connecting or attempting a resumption.

See details >
October 08, 2019
KB4520002
Mitigated External
November 05, 2019
03:36 PM PT
@@ -78,7 +78,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
After installing an update and restarting, you might receive an error
After installing KB4537810 and restarting your device, you might receive the error, “Failure to configure Windows updates. Reverting Changes. Do not turn off your computer,” and the update might show as Failed in Update History.

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This is expected in the following circumstances:
  • If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see KB4497181.
  • If you do not have an ESU MAK add-on key installed and activated. 
If you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this blog post. For information on the prerequisites, see the \"How to get this update\" section of this article.

Back to top
February 11, 2020
KB4537810
Resolved
Resolved:
February 12, 2020
03:47 PM PT

Opened:
February 12, 2020
03:47 PM PT
After installing an update and restarting, you might receive an error
After installing KB4537810 and restarting your device, you might receive the error, “Failure to configure Windows updates. Reverting Changes. Do not turn off your computer,” and the update might show as Failed in Update History.

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This is expected in the following circumstances:
  • If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see KB4497181.
  • If you do not have an ESU MAK add-on key installed and activated. 
If you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this blog post. For information on the prerequisites, see the \"How to get this update\" section of this article.

Back to top
February 11, 2020
KB4537810
Resolved
Resolved:
February 12, 2020
05:37 PM PT

Opened:
February 12, 2020
03:47 PM PT
" diff --git a/windows/release-information/windows-message-center.yml b/windows/release-information/windows-message-center.yml index 1177033b2d..2bc18cf098 100644 --- a/windows/release-information/windows-message-center.yml +++ b/windows/release-information/windows-message-center.yml @@ -50,6 +50,7 @@ sections: text: " + @@ -83,10 +84,7 @@ sections: - - -
MessageDate
Compatibility issue with some Windows Server container images
If you are encountering issues with Windows Server container images, please see KB4542617.
February 13, 2020
03:21 PM PT
Take action: February 2020 security update available for all supported versions of Windows
The February 2020 security update release, referred to as our “B” release, is now available for Windows 10, version 1909 and all supported versions of Windows. We recommend that you install these updates promptly. For more information on the different types of monthly quality updates, see our Windows 10 update servicing cadence primer. To be informed about the latest updates and releases, follow us on Twitter @WindowsUpdate.
February 11, 2020
08:00 AM PT
Take action: ESU security updates available for Windows 7 SP1, Windows Server 2008 R2 SP1 and Windows Server 2008 SP2
Windows 7 SP1, Windows Server 2008 R2 SP1, and Windows Server 2008 SP2 reached end of support on January 14, 2020. For customers who have purchased Extended Security Updates (ESU), the first monthly ESU security updates are now available. If your organization has not yet been able to complete your transition to Windows 10, Windows Server 2016, or Windows Server 2019 and want to continue to receive security updates for your current version of Windows, you will need to purchase Extended Security Updates. For information on how to do so, please see How to get Extended Security Updates for eligible Windows devices, Windows 7 ESU frequently ask questions, and Windows Server 2008 R2 SP1 and Windows Server 2008 SP2 ESU frequently asked questions.

We recommend ESU customers review the applicable KB article below for prerequisites and other important information you will need to deploy these updates.

The following updates were released today for Windows Server 2008 SP2:
The following updates were released today for Windows 7 SP1 and Windows Server 2008 R2 SP1:
February 11, 2020
08:00 AM PT
Resolved: Windows Search shows blank box
We are aware of a temporary server-side issue causing Windows search to show a blank box. This issue has been resolved for most users and in some cases, you might need to restart your device. We are working diligently to fully resolve the issue and will provide an update once resolved. 

This issue was resolved at 12:00 PM PST. If you are still experiencing issues, please restart your device. In rare cases, you may need to manually end the SearchUI.exe or SearchApp.exe process via Task Manager. (To locate these processes, select CTRL + Shift + Esc then select the Details tab.)
February 05, 2020
12:00 PM PT
Take action: SHA-2 code signing support guidance for Windows 7 SP1 and Windows Server 2008 RS2 SP1
Windows 7 SP1 and Windows Server 2008 R2 SP1 update signatures are now SHA-2 based signatures and requires that SHA-2 support to be installed. For important customer guidance on installation and troubleshooting tips, please read the knowledge base article 2019 SHA-2 Code Signing Support requirement for Windows and WSUS.
August 23, 2019
03:35 PM PT
Take action: Windows 10, version 1703 (the Windows 10 Creators Update) reaches end of life on October 9, 2019
The Enterprise and Education editions of Windows 10, version 1703 (the Windows 10 Creators Update) will reach end of life on October 9, 2019. The Home, Pro, Pro for Workstations, and IoT Core editions reached end of service on October 8, 2018.

There is no extended support available for any edition of Windows 10, version 1703. Therefore, it will no longer be supported after October 9, 2019 and will not receive monthly security and quality updates containing protections from the latest security threats.

To continue receiving security and quality updates, Microsoft recommends that you update your devices to the latest version of Windows 10. For more information on end of service dates and currently supported versions of Windows 10, see the Windows lifecycle fact sheet.
August 23, 2019
02:17 PM PT
Resolved: Delays starting Internet Explorer 11
On August 16, 2019 at 7:16 AM a server required for downloading the Internet Explorer 11 (IE11) startup page, went down. As a result of the server outage, IE 11 became unresponsive for some customers who had not yet installed the August 2019 security updates. Customers who had the August 2019 security update installed were not affected. In order to ensure your devices remain in a serviced and secure state, we recommend you install the latest monthly update.

This issue was resolved on the server side at 1:00 pm PST. 
August 16, 2019
04:00 PM PT
August 2019 security update now available for Windows 10, version 1903 and all supported versions of Windows
The August 2019 security update release, referred to as our “B” release, is now available for Windows 10, version 1903 and all supported versions of Windows. A “B” release is the primary, regular update event for each month and is the only regular release that contains security fixes. As a result, we recommend that you install these updates promptly. For more information on the different types of monthly quality updates, see our Windows 10 update servicing cadence primer. To be informed about the latest updates and releases, follow us on Twitter @WindowsUpdate.
August 13, 2019
10:00 AM PT
Advisory: Bluetooth encryption key size vulnerability disclosed (CVE-2019-9506)
On August 13, 2019, Microsoft released security updates to address a Bluetooth key length encryption vulnerability. To exploit this vulnerability, an attacker would need specialized hardware and would be limited by the signal range of the Bluetooth devices in use. For more information about this industry-wide issue, see CVE-2019-9506 | Bluetooth Encryption Key Size Vulnerability in the Microsoft Security Update Guide and important guidance for IT pros in KB4514157. (Note: we are documenting this vulnerability together with guidance for IT admins as part of a coordinated industry disclosure effort.)
August 13, 2019
10:00 AM PT
Advisory: Windows Advanced Local Procedure Call Elevation of Privilege vulnerability disclosed (CVE-2019-1162)
On August 13, 2019, Google Project Zero (GPZ) disclosed an Elevation of Privilege (EoP) vulnerability in how Windows handles calls to Advanced Local Procedure Call (ALPC) that affects Windows operating systems, versions 8.1 and higher. An attacker must already have code execution on the target system to leverage these vulnerabilities. Microsoft released security updates on August 13, 2019 that partially address this issue. Other items disclosed by GPZ require more time to address and we are working to release a resolution in mid-September. For more information, see CVE-2019-1162 | Windows ALPC Elevation of Privilege Vulnerability
August 13, 2019
10:00 AM PT
Take action: Windows 10, version 1803 (the April 2018 Update) reaches end of service on November 12, 2019
Windows 10, version 1803 (the April 2018 Update) will reach end of service on November 12, 2019 for Home and Pro editions. We will begin updating devices running Windows 10, version 1803 to Windows 10, version 1903 (the May 2019 Update) starting July 16, 2019 to help ensure that these devices remain in a serviced and secure state. For more information, see the Windows 10, version 1903 section of the Windows release health dashboard.
August 13, 2019
10:00 AM PT
Windows 10, version 1903 rollout begins
The Windows 10 May 2019 Update (Windows 10, version 1903) is available today to commercial customers via Windows Server Update Services (WSUS), Windows Update for Business, and the Volume Licensing Service Center (VLSC)—and to end users who manually select “Check for updates.” We are slowly throttling up availability while we carefully monitor data and feedback.
May 21, 2019
10:00 AM PT
" From 3c6a26a6a2464bb5b42a9ee5e90c7cbf7cca7f57 Mon Sep 17 00:00:00 2001 From: John Liu <49762389+ShenLanJohn@users.noreply.github.com> Date: Thu, 13 Feb 2020 17:27:20 -0800 Subject: [PATCH 85/92] CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20200213163023 (#2059) (#2060) Co-authored-by: Direesh Kumar Kandakatla Co-authored-by: Direesh Kumar Kandakatla --- .../release-information/resolved-issues-windows-10-1607.yml | 5 ----- .../release-information/resolved-issues-windows-10-1709.yml | 3 --- .../release-information/resolved-issues-windows-10-1803.yml | 3 --- ...solved-issues-windows-10-1809-and-windows-server-2019.yml | 3 --- ...olved-issues-windows-7-and-windows-server-2008-r2-sp1.yml | 4 ++-- .../resolved-issues-windows-server-2008-sp2.yml | 4 ++-- .../status-windows-7-and-windows-server-2008-r2-sp1.yml | 4 ++-- .../release-information/status-windows-server-2008-sp2.yml | 4 ++-- windows/release-information/windows-message-center.yml | 4 +--- 9 files changed, 9 insertions(+), 25 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1607.yml b/windows/release-information/resolved-issues-windows-10-1607.yml index 343f302b6c..cabf372d2e 100644 --- a/windows/release-information/resolved-issues-windows-10-1607.yml +++ b/windows/release-information/resolved-issues-windows-10-1607.yml @@ -36,10 +36,8 @@ sections:
Intermittent issues when printing
The print spooler service may intermittently have issues completing a print job and results print job failure.

See details >OS Build 14393.3206

September 23, 2019
KB4522010Resolved
KB4519998October 08, 2019
10:00 AM PT
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.

See details >OS Build 14393.3204

September 10, 2019
KB4516044Resolved
September 17, 2019
04:47 PM PT
Apps and scripts using the NetQueryDisplayInformation API may fail with error
Applications and scripts that call NetQueryDisplayInformation may fail to return results after the first page of data.

See details >OS Build 14393.3053

June 18, 2019
KB4503294Resolved
KB4516044September 10, 2019
10:00 AM PT -
Domain connected devices that use MIT Kerberos realms will not start up
Devices may not start after updating when connected to a domain that is configured to use MIT Kerberos realms.

See details >OS Build 14393.3115

July 16, 2019
KB4507459Resolved
KB4512517August 13, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using PXE images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >OS Build 14393.3025

June 11, 2019
KB4503267Resolved
KB4512495August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications made using VB6, macros using VBA, and VBScript may stop responding and you may receive an error.

See details >OS Build 14393.3144

August 13, 2019
KB4512517Resolved
KB4512495August 17, 2019
02:00 PM PT -
Internet Explorer 11 and apps using the WebBrowser control may fail to render
JavaScript may fail to render as expected in IE11 and in apps using JavaScript or the WebBrowser control.

See details >OS Build 14393.3085

July 09, 2019
KB4507460Resolved
KB4512517August 13, 2019
10:00 AM PT " @@ -75,10 +73,7 @@ sections: - type: markdown text: " - -
DetailsOriginating updateStatusHistory
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4507459. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
-

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512517 and the safeguard hold has been removed. Please note, it can take up to 48 hours before you can update to offered Windows 10, version 1903 or Windows Server, version 1903.

Back to top
OS Build 14393.3115

July 16, 2019
KB4507459
Resolved
KB4512517
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503267 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512495.

Back to top
OS Build 14393.3025

June 11, 2019
KB4503267
Resolved
KB4512495
Resolved:
August 17, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT
Internet Explorer 11 and apps using the WebBrowser control may fail to render
Internet Explorer 11 may fail to render some JavaScript after installing KB4507460. You may also have issues with apps using JavaScript or the WebBrowser control, such as the present PowerPoint feature of Skype Meeting Broadcast.

Affected platforms:
  • Client: Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server 2016
Resolution: This issue was resolved in KB4512517.

Back to top
OS Build 14393.3085

July 09, 2019
KB4507460
Resolved
KB4512517
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 26, 2019
04:58 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1709.yml b/windows/release-information/resolved-issues-windows-10-1709.yml index 3141761298..669db319e1 100644 --- a/windows/release-information/resolved-issues-windows-10-1709.yml +++ b/windows/release-information/resolved-issues-windows-10-1709.yml @@ -35,7 +35,6 @@ sections:
Unable to create local users in Chinese, Japanese and Korean during device setup
You might be unable to create users in Chinese, Japanese and Korean using Input Method Editor (IME) during OOBE.

See details >OS Build 16299.1387

September 10, 2019
KB4516066Resolved
KB4534318January 23, 2020
02:00 PM PT
Intermittent issues when printing
The print spooler service may intermittently have issues completing a print job and results print job failure.

See details >OS Build 16299.1392

September 23, 2019
KB4522012Resolved
KB4520004October 08, 2019
10:00 AM PT
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.

See details >OS Build 16299.1387

September 10, 2019
KB4516066Resolved
September 19, 2019
04:08 PM PT -
Domain connected devices that use MIT Kerberos realms will not start up
Devices may not start after updating when connected to a domain that is configured to use MIT Kerberos realms.

See details >OS Build 16299.1296

July 16, 2019
KB4507465Resolved
KB4512516August 13, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using PXE images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >OS Build 16299.1217

June 11, 2019
KB4503284Resolved
KB4512494August 16, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications made using VB6, macros using VBA, and VBScript may stop responding and you may receive an error.

See details >OS Build 16299.1331

August 13, 2019
KB4512516Resolved
KB4512494August 16, 2019
02:00 PM PT @@ -81,8 +80,6 @@ sections: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4507465. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
-

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512516 and the safeguard hold has been removed. Please note, it can take up to 48 hours before you can update to offered Windows 10, version 1903 or Windows Server, version 1903.

Back to top
OS Build 16299.1296

July 16, 2019
KB4507465
Resolved
KB4512516
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503284 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512494.

Back to top
OS Build 16299.1217

June 11, 2019
KB4503284
Resolved
KB4512494
Resolved:
August 16, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1803.yml b/windows/release-information/resolved-issues-windows-10-1803.yml index 37a0f56eab..c5f045f610 100644 --- a/windows/release-information/resolved-issues-windows-10-1803.yml +++ b/windows/release-information/resolved-issues-windows-10-1803.yml @@ -37,7 +37,6 @@ sections:
Startup to a black screen after installing updates
Your device may startup to a black screen during the first logon after installing updates.

See details >OS Build 17134.829

June 11, 2019
KB4503286Resolved
KB4519978October 15, 2019
10:00 AM PT
Intermittent issues when printing
The print spooler service may intermittently have issues completing a print job and results print job failure.

See details >OS Build 17134.1009

September 23, 2019
KB4522014Resolved
KB4520008October 08, 2019
10:00 AM PT
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.

See details >OS Build 17134.1006

September 10, 2019
KB4516058Resolved
September 19, 2019
04:08 PM PT -
Domain connected devices that use MIT Kerberos realms will not start up
Devices may not start after updating when connected to a domain that is configured to use MIT Kerberos realms.

See details >OS Build 17134.915

July 16, 2019
KB4507466Resolved
KB4512501August 13, 2019
10:00 AM PT
Notification issue: \"Your device is missing important security and quality fixes.\"
Some users may have incorrectly received the notification \"Your device is missing important security and quality fixes.\"

See details >N/A

Resolved
September 03, 2019
12:32 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using PXE images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >OS Build 17134.829

June 11, 2019
KB4503286Resolved
KB4512509August 19, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications made using VB6, macros using VBA, and VBScript may stop responding and you may receive an error.

See details >OS Build 17134.950

August 13, 2019
KB4512501Resolved
KB4512509August 19, 2019
02:00 PM PT @@ -86,8 +85,6 @@ sections: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4507466. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
-

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512501 and the safeguard hold has been removed. Please note, it can take up to 48 hours before you can update to offered Windows 10, version 1903 or Windows Server, version 1903.

Back to top
OS Build 17134.915

July 16, 2019
KB4507466
Resolved
KB4512501
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503286 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512509.

Back to top
OS Build 17134.829

June 11, 2019
KB4503286
Resolved
KB4512509
Resolved:
August 19, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index fe9b47b46b..727b436221 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -39,7 +39,6 @@ sections:
Intermittent issues when printing
The print spooler service may intermittently have issues completing a print job and results print job failure.

See details >OS Build 17763.740

September 23, 2019
KB4522015Resolved
KB4519338October 08, 2019
10:00 AM PT
Apps and scripts using the NetQueryDisplayInformation API may fail with error
Applications and scripts that call NetQueryDisplayInformation may fail to return results after the first page of data.

See details >OS Build 17763.55

October 09, 2018
KB4464330Resolved
KB4516077September 24, 2019
10:00 AM PT
IME may become unresponsive or have High CPU usage
Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.

See details >OS Build 17763.737

September 10, 2019
KB4512578Resolved
September 19, 2019
04:08 PM PT -
Domain connected devices that use MIT Kerberos realms will not start up
Devices may not start after updating when connected to a domain that is configured to use MIT Kerberos realms.

See details >OS Build 17763.652

July 22, 2019
KB4505658Resolved
KB4511553August 13, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using PXE images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >OS Build 17763.557

June 11, 2019
KB4503327Resolved
KB4512534August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications made using VB6, macros using VBA, and VBScript may stop responding and you may receive an error.

See details >OS Build 17763.678

August 13, 2019
KB4511553Resolved
KB4512534August 17, 2019
02:00 PM PT @@ -88,8 +87,6 @@ sections: - type: markdown text: " -
DetailsOriginating updateStatusHistory
Domain connected devices that use MIT Kerberos realms will not start up
Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4505658. Devices that are domain controllers or domain members are both affected.

To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.

Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists:
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
-

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4511553 and the safeguard hold has been removed. Please note, it can take up to 48 hours before you can update to offered Windows 10, version 1903 or Windows Server, version 1903.

Back to top
OS Build 17763.652

July 22, 2019
KB4505658
Resolved
KB4511553
Resolved:
August 13, 2019
10:00 AM PT

Opened:
July 25, 2019
06:10 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503327 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512534.

Back to top
OS Build 17763.557

June 11, 2019
KB4503327
Resolved
KB4512534
Resolved:
August 17, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml index cf77e81898..8ae49f0e18 100644 --- a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml @@ -32,7 +32,7 @@ sections: - type: markdown text: " - + @@ -56,7 +56,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusDate resolved
After installing an update and restarting, you might receive an error
You might receive the error, “Failure to configure Windows updates. Reverting Changes.” or \"Failed\" in Update History.

See details >
February 11, 2020
KB4537820
Resolved
February 12, 2020
03:47 PM PT
After installing an update and restarting, you might receive an error
You might receive the error, “Failure to configure Windows updates. Reverting Changes.” or \"Failed\" in Update History.

See details >
February 11, 2020
KB4537820
Resolved
February 12, 2020
05:37 PM PT
Custom wallpaper displays as black
Using a custom image set to \"Stretch\" might not display as expected.

See details >
January 14, 2020
KB4534310
Resolved
KB4539601
February 07, 2020
10:00 AM PT
MSRT might fail to install and be re-offered from Windows Update or WSUS
The November 2019 update for Windows Malicious Software Removal Tool (MSRT) might fail to install from WU/WSUS.

See details >

Resolved
January 23, 2020
02:08 PM PT
Intermittent issues when printing
The print spooler service may intermittently have issues completing a print job and results print job failure.

See details >
September 24, 2019
KB4516048
Resolved
KB4519976
October 08, 2019
10:00 AM PT
- +
DetailsOriginating updateStatusHistory
After installing an update and restarting, you might receive an error
After installing KB4537820 and restarting your device, you might receive the error, “Failure to configure Windows updates. Reverting Changes. Do not turn off your computer,” and the update might show as Failed in Update History.

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This is expected in the following circumstances:
  • If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see KB4497181.
  • If you do not have an ESU MAK add-on key installed and activated. 
If you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this blog post. For information on the prerequisites, see the \"How to get this update\" section of this article.

Back to top
February 11, 2020
KB4537820
Resolved
Resolved:
February 12, 2020
03:47 PM PT

Opened:
February 12, 2020
03:47 PM PT
After installing an update and restarting, you might receive an error
After installing KB4537820 and restarting your device, you might receive the error, “Failure to configure Windows updates. Reverting Changes. Do not turn off your computer,” and the update might show as Failed in Update History.

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This is expected in the following circumstances:
  • If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see KB4497181.
  • If you do not have an ESU MAK add-on key installed and activated. 
If you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this blog post. For information on the prerequisites, see the \"How to get this update\" section of this article.

Back to top
February 11, 2020
KB4537820
Resolved
Resolved:
February 12, 2020
05:37 PM PT

Opened:
February 12, 2020
03:47 PM PT
" diff --git a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml index 81e984e8c7..a86f0270a1 100644 --- a/windows/release-information/resolved-issues-windows-server-2008-sp2.yml +++ b/windows/release-information/resolved-issues-windows-server-2008-sp2.yml @@ -32,7 +32,7 @@ sections: - type: markdown text: " - + @@ -53,7 +53,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusDate resolved
After installing an update and restarting, you might receive an error
You might receive the error, “Failure to configure Windows updates. Reverting Changes.” or \"Failed\" in Update History.

See details >
February 11, 2020
KB4537810
Resolved
February 12, 2020
03:47 PM PT
After installing an update and restarting, you might receive an error
You might receive the error, “Failure to configure Windows updates. Reverting Changes.” or \"Failed\" in Update History.

See details >
February 11, 2020
KB4537810
Resolved
February 12, 2020
05:37 PM PT
MSRT might fail to install and be re-offered from Windows Update or WSUS
The November 2019 update for Windows Malicious Software Removal Tool (MSRT) might fail to install from WU/WSUS.

See details >

Resolved
January 23, 2020
02:08 PM PT
Issues manually installing updates by double-clicking the .msu file
You may encounter issues manually installing updates by double-clicking the .msu file and may receive an error.

See details >
September 10, 2019
KB4474419
Resolved
KB4474419
September 23, 2019
10:00 AM PT
Intermittent issues when printing
The print spooler service may intermittently have issues completing a print job and results print job failure.

See details >
September 24, 2019
KB4516030
Resolved
KB4520002
October 08, 2019
10:00 AM PT
- +
DetailsOriginating updateStatusHistory
After installing an update and restarting, you might receive an error
After installing KB4537810 and restarting your device, you might receive the error, “Failure to configure Windows updates. Reverting Changes. Do not turn off your computer,” and the update might show as Failed in Update History.

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This is expected in the following circumstances:
  • If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see KB4497181.
  • If you do not have an ESU MAK add-on key installed and activated. 
If you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this blog post. For information on the prerequisites, see the \"How to get this update\" section of this article.

Back to top
February 11, 2020
KB4537810
Resolved
Resolved:
February 12, 2020
03:47 PM PT

Opened:
February 12, 2020
03:47 PM PT
After installing an update and restarting, you might receive an error
After installing KB4537810 and restarting your device, you might receive the error, “Failure to configure Windows updates. Reverting Changes. Do not turn off your computer,” and the update might show as Failed in Update History.

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This is expected in the following circumstances:
  • If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see KB4497181.
  • If you do not have an ESU MAK add-on key installed and activated. 
If you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this blog post. For information on the prerequisites, see the \"How to get this update\" section of this article.

Back to top
February 11, 2020
KB4537810
Resolved
Resolved:
February 12, 2020
05:37 PM PT

Opened:
February 12, 2020
03:47 PM PT
" diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index 133fd7bacf..d47c63c516 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -60,7 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- + @@ -80,7 +80,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
After installing an update and restarting, you might receive an error
You might receive the error, “Failure to configure Windows updates. Reverting Changes.” or \"Failed\" in Update History.

See details >
February 11, 2020
KB4537820
Resolved
February 12, 2020
03:47 PM PT
After installing an update and restarting, you might receive an error
You might receive the error, “Failure to configure Windows updates. Reverting Changes.” or \"Failed\" in Update History.

See details >
February 11, 2020
KB4537820
Resolved
February 12, 2020
05:37 PM PT
Custom wallpaper displays as black
Using a custom image set to \"Stretch\" might not display as expected.

See details >
January 14, 2020
KB4534310
Resolved
KB4539601
February 07, 2020
10:00 AM PT
MSRT might fail to install and be re-offered from Windows Update or WSUS
The November 2019 update for Windows Malicious Software Removal Tool (MSRT) might fail to install from WU/WSUS.

See details >

Resolved
January 23, 2020
02:08 PM PT
TLS connections might fail or timeout
Transport Layer Security (TLS) connections might fail or timeout when connecting or attempting a resumption.

See details >
October 08, 2019
KB4519976
Mitigated External
November 05, 2019
03:36 PM PT
- +
DetailsOriginating updateStatusHistory
After installing an update and restarting, you might receive an error
After installing KB4537820 and restarting your device, you might receive the error, “Failure to configure Windows updates. Reverting Changes. Do not turn off your computer,” and the update might show as Failed in Update History.

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This is expected in the following circumstances:
  • If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see KB4497181.
  • If you do not have an ESU MAK add-on key installed and activated. 
If you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this blog post. For information on the prerequisites, see the \"How to get this update\" section of this article.

Back to top
February 11, 2020
KB4537820
Resolved
Resolved:
February 12, 2020
03:47 PM PT

Opened:
February 12, 2020
03:47 PM PT
After installing an update and restarting, you might receive an error
After installing KB4537820 and restarting your device, you might receive the error, “Failure to configure Windows updates. Reverting Changes. Do not turn off your computer,” and the update might show as Failed in Update History.

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This is expected in the following circumstances:
  • If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see KB4497181.
  • If you do not have an ESU MAK add-on key installed and activated. 
If you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this blog post. For information on the prerequisites, see the \"How to get this update\" section of this article.

Back to top
February 11, 2020
KB4537820
Resolved
Resolved:
February 12, 2020
05:37 PM PT

Opened:
February 12, 2020
03:47 PM PT
" diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml index afe60f1877..44b16a1a5e 100644 --- a/windows/release-information/status-windows-server-2008-sp2.yml +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -60,7 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

- +
SummaryOriginating updateStatusLast updated
After installing an update and restarting, you might receive an error
You might receive the error, “Failure to configure Windows updates. Reverting Changes.” or \"Failed\" in Update History.

See details >
February 11, 2020
KB4537810
Resolved
February 12, 2020
03:47 PM PT
After installing an update and restarting, you might receive an error
You might receive the error, “Failure to configure Windows updates. Reverting Changes.” or \"Failed\" in Update History.

See details >
February 11, 2020
KB4537810
Resolved
February 12, 2020
05:37 PM PT
MSRT might fail to install and be re-offered from Windows Update or WSUS
The November 2019 update for Windows Malicious Software Removal Tool (MSRT) might fail to install from WU/WSUS.

See details >

Resolved
January 23, 2020
02:08 PM PT
TLS connections might fail or timeout
Transport Layer Security (TLS) connections might fail or timeout when connecting or attempting a resumption.

See details >
October 08, 2019
KB4520002
Mitigated External
November 05, 2019
03:36 PM PT
@@ -78,7 +78,7 @@ sections: - type: markdown text: " - +
DetailsOriginating updateStatusHistory
After installing an update and restarting, you might receive an error
After installing KB4537810 and restarting your device, you might receive the error, “Failure to configure Windows updates. Reverting Changes. Do not turn off your computer,” and the update might show as Failed in Update History.

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This is expected in the following circumstances:
  • If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see KB4497181.
  • If you do not have an ESU MAK add-on key installed and activated. 
If you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this blog post. For information on the prerequisites, see the \"How to get this update\" section of this article.

Back to top
February 11, 2020
KB4537810
Resolved
Resolved:
February 12, 2020
03:47 PM PT

Opened:
February 12, 2020
03:47 PM PT
After installing an update and restarting, you might receive an error
After installing KB4537810 and restarting your device, you might receive the error, “Failure to configure Windows updates. Reverting Changes. Do not turn off your computer,” and the update might show as Failed in Update History.

Affected platforms:
  • Client: Windows 7 SP1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This is expected in the following circumstances:
  • If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see KB4497181.
  • If you do not have an ESU MAK add-on key installed and activated. 
If you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this blog post. For information on the prerequisites, see the \"How to get this update\" section of this article.

Back to top
February 11, 2020
KB4537810
Resolved
Resolved:
February 12, 2020
05:37 PM PT

Opened:
February 12, 2020
03:47 PM PT
" diff --git a/windows/release-information/windows-message-center.yml b/windows/release-information/windows-message-center.yml index 1177033b2d..2bc18cf098 100644 --- a/windows/release-information/windows-message-center.yml +++ b/windows/release-information/windows-message-center.yml @@ -50,6 +50,7 @@ sections: text: " + @@ -83,10 +84,7 @@ sections: - - -
MessageDate
Compatibility issue with some Windows Server container images
If you are encountering issues with Windows Server container images, please see KB4542617.
February 13, 2020
03:21 PM PT
Take action: February 2020 security update available for all supported versions of Windows
The February 2020 security update release, referred to as our “B” release, is now available for Windows 10, version 1909 and all supported versions of Windows. We recommend that you install these updates promptly. For more information on the different types of monthly quality updates, see our Windows 10 update servicing cadence primer. To be informed about the latest updates and releases, follow us on Twitter @WindowsUpdate.
February 11, 2020
08:00 AM PT
Take action: ESU security updates available for Windows 7 SP1, Windows Server 2008 R2 SP1 and Windows Server 2008 SP2
Windows 7 SP1, Windows Server 2008 R2 SP1, and Windows Server 2008 SP2 reached end of support on January 14, 2020. For customers who have purchased Extended Security Updates (ESU), the first monthly ESU security updates are now available. If your organization has not yet been able to complete your transition to Windows 10, Windows Server 2016, or Windows Server 2019 and want to continue to receive security updates for your current version of Windows, you will need to purchase Extended Security Updates. For information on how to do so, please see How to get Extended Security Updates for eligible Windows devices, Windows 7 ESU frequently ask questions, and Windows Server 2008 R2 SP1 and Windows Server 2008 SP2 ESU frequently asked questions.

We recommend ESU customers review the applicable KB article below for prerequisites and other important information you will need to deploy these updates.

The following updates were released today for Windows Server 2008 SP2:
The following updates were released today for Windows 7 SP1 and Windows Server 2008 R2 SP1:
February 11, 2020
08:00 AM PT
Resolved: Windows Search shows blank box
We are aware of a temporary server-side issue causing Windows search to show a blank box. This issue has been resolved for most users and in some cases, you might need to restart your device. We are working diligently to fully resolve the issue and will provide an update once resolved. 

This issue was resolved at 12:00 PM PST. If you are still experiencing issues, please restart your device. In rare cases, you may need to manually end the SearchUI.exe or SearchApp.exe process via Task Manager. (To locate these processes, select CTRL + Shift + Esc then select the Details tab.)
February 05, 2020
12:00 PM PT
Take action: SHA-2 code signing support guidance for Windows 7 SP1 and Windows Server 2008 RS2 SP1
Windows 7 SP1 and Windows Server 2008 R2 SP1 update signatures are now SHA-2 based signatures and requires that SHA-2 support to be installed. For important customer guidance on installation and troubleshooting tips, please read the knowledge base article 2019 SHA-2 Code Signing Support requirement for Windows and WSUS.
August 23, 2019
03:35 PM PT
Take action: Windows 10, version 1703 (the Windows 10 Creators Update) reaches end of life on October 9, 2019
The Enterprise and Education editions of Windows 10, version 1703 (the Windows 10 Creators Update) will reach end of life on October 9, 2019. The Home, Pro, Pro for Workstations, and IoT Core editions reached end of service on October 8, 2018.

There is no extended support available for any edition of Windows 10, version 1703. Therefore, it will no longer be supported after October 9, 2019 and will not receive monthly security and quality updates containing protections from the latest security threats.

To continue receiving security and quality updates, Microsoft recommends that you update your devices to the latest version of Windows 10. For more information on end of service dates and currently supported versions of Windows 10, see the Windows lifecycle fact sheet.
August 23, 2019
02:17 PM PT
Resolved: Delays starting Internet Explorer 11
On August 16, 2019 at 7:16 AM a server required for downloading the Internet Explorer 11 (IE11) startup page, went down. As a result of the server outage, IE 11 became unresponsive for some customers who had not yet installed the August 2019 security updates. Customers who had the August 2019 security update installed were not affected. In order to ensure your devices remain in a serviced and secure state, we recommend you install the latest monthly update.

This issue was resolved on the server side at 1:00 pm PST. 
August 16, 2019
04:00 PM PT
August 2019 security update now available for Windows 10, version 1903 and all supported versions of Windows
The August 2019 security update release, referred to as our “B” release, is now available for Windows 10, version 1903 and all supported versions of Windows. A “B” release is the primary, regular update event for each month and is the only regular release that contains security fixes. As a result, we recommend that you install these updates promptly. For more information on the different types of monthly quality updates, see our Windows 10 update servicing cadence primer. To be informed about the latest updates and releases, follow us on Twitter @WindowsUpdate.
August 13, 2019
10:00 AM PT
Advisory: Bluetooth encryption key size vulnerability disclosed (CVE-2019-9506)
On August 13, 2019, Microsoft released security updates to address a Bluetooth key length encryption vulnerability. To exploit this vulnerability, an attacker would need specialized hardware and would be limited by the signal range of the Bluetooth devices in use. For more information about this industry-wide issue, see CVE-2019-9506 | Bluetooth Encryption Key Size Vulnerability in the Microsoft Security Update Guide and important guidance for IT pros in KB4514157. (Note: we are documenting this vulnerability together with guidance for IT admins as part of a coordinated industry disclosure effort.)
August 13, 2019
10:00 AM PT
Advisory: Windows Advanced Local Procedure Call Elevation of Privilege vulnerability disclosed (CVE-2019-1162)
On August 13, 2019, Google Project Zero (GPZ) disclosed an Elevation of Privilege (EoP) vulnerability in how Windows handles calls to Advanced Local Procedure Call (ALPC) that affects Windows operating systems, versions 8.1 and higher. An attacker must already have code execution on the target system to leverage these vulnerabilities. Microsoft released security updates on August 13, 2019 that partially address this issue. Other items disclosed by GPZ require more time to address and we are working to release a resolution in mid-September. For more information, see CVE-2019-1162 | Windows ALPC Elevation of Privilege Vulnerability
August 13, 2019
10:00 AM PT
Take action: Windows 10, version 1803 (the April 2018 Update) reaches end of service on November 12, 2019
Windows 10, version 1803 (the April 2018 Update) will reach end of service on November 12, 2019 for Home and Pro editions. We will begin updating devices running Windows 10, version 1803 to Windows 10, version 1903 (the May 2019 Update) starting July 16, 2019 to help ensure that these devices remain in a serviced and secure state. For more information, see the Windows 10, version 1903 section of the Windows release health dashboard.
August 13, 2019
10:00 AM PT
Windows 10, version 1903 rollout begins
The Windows 10 May 2019 Update (Windows 10, version 1903) is available today to commercial customers via Windows Server Update Services (WSUS), Windows Update for Business, and the Volume Licensing Service Center (VLSC)—and to end users who manually select “Check for updates.” We are slowly throttling up availability while we carefully monitor data and feedback.
May 21, 2019
10:00 AM PT
" From 1a30e39d415d7147c3fa55dad8673d1086427a37 Mon Sep 17 00:00:00 2001 From: lomayor Date: Fri, 14 Feb 2020 13:08:01 -0800 Subject: [PATCH 86/92] Update advanced-hunting-tvm-softwareinventory-table.md --- .../advanced-hunting-tvm-softwareinventory-table.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-softwareinventory-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-softwareinventory-table.md index 5323e67ad0..0dcf6e3af5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-softwareinventory-table.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-softwareinventory-table.md @@ -40,7 +40,7 @@ For information on other tables in the advanced hunting schema, see [the advance | `OSPlatform` | string | Platform of the operating system running on the machine. This indicates specific operating systems, including variations within the same family, such as Windows 10 and Windows 7. | | `OSVersion` | string | Version of the operating system running on the machine | | `OSArchitecture` | string | Architecture of the operating system running on the machine | -| `SoftwareVendor` | string | Severity level assigned to the security vulnerability based on the CVSS score and dynamic factors influenced by the threat landscape | +| `SoftwareVendor` | string | Name of the software vendor | | `SoftwareName` | string | Name of the software product | | `SoftwareVersion` | string | Version number of the software product | | `CveId` | string | Unique identifier assigned to the security vulnerability under the Common Vulnerabilities and Exposures (CVE) system | From 9361ee3332dc2ab77980257b1a19b1390889cf21 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Fri, 14 Feb 2020 13:59:07 -0800 Subject: [PATCH 87/92] Update windows-autopilot-and-surface-devices.md Updates link --- devices/surface/windows-autopilot-and-surface-devices.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface/windows-autopilot-and-surface-devices.md b/devices/surface/windows-autopilot-and-surface-devices.md index add490a9a7..26885dc588 100644 --- a/devices/surface/windows-autopilot-and-surface-devices.md +++ b/devices/surface/windows-autopilot-and-surface-devices.md @@ -51,7 +51,7 @@ Surface partners that are enabled for Windows Autopilot include: - [ALSO](https://www.also.com/ec/cms5/de_1010/1010_anbieter/microsoft/windows-autopilot/index.jsp) - [Atea](https://www.atea.com/) -- [Bechtle](https://www.bechtle.com/backend/cms/marken/microsoft/microsoft-windows-autopilot) +- [Bechtle](https://www.bechtle.com/marken/microsoft/microsoft-windows-autopilot) - [Cancom](https://www.cancom.de/) - [CDW](https://www.cdw.com/) - [Computacenter](https://www.computacenter.com/uk) From 229067a1fb79b40b3d4f23d3439b4782f8f563ec Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Fri, 14 Feb 2020 13:59:42 -0800 Subject: [PATCH 88/92] Update windows-autopilot-and-surface-devices.md Updates link --- devices/surface/windows-autopilot-and-surface-devices.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface/windows-autopilot-and-surface-devices.md b/devices/surface/windows-autopilot-and-surface-devices.md index 26885dc588..1fbdba19cf 100644 --- a/devices/surface/windows-autopilot-and-surface-devices.md +++ b/devices/surface/windows-autopilot-and-surface-devices.md @@ -13,7 +13,7 @@ ms.author: dansimp ms.topic: article ms.localizationpriority: medium ms.audience: itpro -ms.date: 02/13/2020 +ms.date: 02/14/2020 --- # Windows Autopilot and Surface devices From c63997c6c4bc953ba572cc7c078859c74665097c Mon Sep 17 00:00:00 2001 From: martyav Date: Fri, 14 Feb 2020 17:11:20 -0500 Subject: [PATCH 89/92] links changed + linting I altered the links to point directly to the page they were being redirected to I also did a light copyedit, including linting text editor warnings away --- ...owershell-cmdlets-windows-defender-antivirus.md | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md index 80c59d0658..fc575f7bf8 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md @@ -23,26 +23,25 @@ manager: dansimp - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -You can use PowerShell to perform various functions in Windows Defender. Similar to the command prompt or command line, PowerShell is a task-based command-line shell and scripting language designed especially for system administration, and you can read more about it at the [PowerShell hub on MSDN](https://msdn.microsoft.com/powershell/mt173057.aspx). +You can use PowerShell to perform various functions in Windows Defender. Similar to the command prompt or command line, PowerShell is a task-based command-line shell and scripting language designed especially for system administration. You can read more about it at the [PowerShell hub on MSDN](https://docs.microsoft.com/previous-versions/msdn10/mt173057(v=msdn.10)). -For a list of the cmdlets and their functions and available parameters, see the [Defender cmdlets](https://technet.microsoft.com/library/dn433280.aspx) topic. +For a list of the cmdlets and their functions and available parameters, see the [Defender cmdlets](https://docs.microsoft.com/powershell/module/defender) topic. -PowerShell cmdlets are most useful in Windows Server environments that don't rely on a graphical user interface (GUI) to configure software. +PowerShell cmdlets are most useful in Windows Server environments that don't rely on a graphical user interface (GUI) to configure software. > [!NOTE] > PowerShell cmdlets should not be used as a replacement for a full network policy management infrastructure, such as [Microsoft Endpoint Configuration Manager](https://docs.microsoft.com/configmgr), [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), or [Windows Defender Antivirus Group Policy ADMX templates](https://support.microsoft.com/kb/927367). -Changes made with PowerShell will affect local settings on the endpoint where the changes are deployed or made. This means that deployments of policy with Group Policy, Microsoft Endpoint Configuration Manager, or Microsoft Intune can overwrite changes made with PowerShell. +Changes made with PowerShell will affect local settings on the endpoint where the changes are deployed or made. This means that deployments of policy with Group Policy, Microsoft Endpoint Configuration Manager, or Microsoft Intune can overwrite changes made with PowerShell. You can [configure which settings can be overridden locally with local policy overrides](configure-local-policy-overrides-windows-defender-antivirus.md). PowerShell is typically installed under the folder _%SystemRoot%\system32\WindowsPowerShell_. - ## Use Windows Defender Antivirus PowerShell cmdlets -1. Click **Start**, type **powershell**, and press **Enter**. -2. Click **Windows PowerShell** to open the interface. +1. On the Windows taskbar, select **Start**, type **powershell**, and press **Enter**. +2. Select **Windows PowerShell** to open the interface. 3. Enter the command and parameters. > [!NOTE] @@ -53,6 +52,7 @@ To open online help for any of the cmdlets type the following: ```PowerShell Get-Help -Online ``` + Omit the `-online` parameter to get locally cached help. ## Related topics From 1a3974c4e5373de6b282e661a011d144c6d371a1 Mon Sep 17 00:00:00 2001 From: martyav Date: Fri, 14 Feb 2020 17:50:36 -0500 Subject: [PATCH 90/92] updated instructions --- .../use-powershell-cmdlets-windows-defender-antivirus.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md index fc575f7bf8..8631d5a627 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md @@ -40,9 +40,9 @@ PowerShell is typically installed under the folder _%SystemRoot%\system32\Window ## Use Windows Defender Antivirus PowerShell cmdlets -1. On the Windows taskbar, select **Start**, type **powershell**, and press **Enter**. -2. Select **Windows PowerShell** to open the interface. -3. Enter the command and parameters. +1. In the Windows search bar, type **powershell**. +2. Select **Windows PowerShell** from the results to open the interface. +3. Enter the PowerShell command and any parameters. > [!NOTE] > You may need to open an administrator-level version of PowerShell. Right-click the item in the Start menu, click **Run as administrator** and click **Yes** at the permissions prompt. From dd3b5c24fa9b821cb7bf4393d22363e218a38e39 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Fri, 14 Feb 2020 16:27:34 -0800 Subject: [PATCH 91/92] Added missing Security policies to Policy index --- .../policy-configuration-service-provider.md | 17 +++++++++++++++++ 1 file changed, 17 insertions(+) diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index 6e8652ff9c..7c7c9321d0 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -3328,6 +3328,23 @@ The following diagram shows the Policy configuration service provider in tree fo
Storage/AllowDiskHealthModelUpdates
+
+ Storage/AllowStorageSenseGlobal +
+
+ Storage/AllowStorageSenseTemporaryFilesCleanup +
+
+ Storage/ConfigStorageSenseCloudContentDehydrationThreshold +
+
+ Storage/ConfigStorageSenseDownloadsCleanupThreshold +
+
+ Storage/ConfigStorageSenseGlobalCadence +
+
+ Storage/ConfigStorageSenseRecycleBinCleanupThreshold
Storage/EnhancedStorageDevices
From 05621390194d824aa75958cb040d5f173dad850d Mon Sep 17 00:00:00 2001 From: John Liu <49762389+ShenLanJohn@users.noreply.github.com> Date: Sat, 15 Feb 2020 00:51:42 -0800 Subject: [PATCH 92/92] CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20200215000333 (#2070) Co-authored-by: Direesh Kumar Kandakatla --- ...sues-windows-7-and-windows-server-2008-r2-sp1.yml | 10 ---------- ...issues-windows-8.1-and-windows-server-2012-r2.yml | 10 ---------- .../release-information/status-windows-10-1507.yml | 10 ++++++++++ ...tatus-windows-10-1607-and-windows-server-2016.yml | 12 ++++++++++++ .../release-information/status-windows-10-1709.yml | 12 ++++++++++++ .../release-information/status-windows-10-1803.yml | 12 ++++++++++++ ...tatus-windows-10-1809-and-windows-server-2019.yml | 12 ++++++++++++ .../release-information/status-windows-10-1903.yml | 12 ++++++++++++ .../release-information/status-windows-10-1909.yml | 12 ++++++++++++ ...status-windows-8.1-and-windows-server-2012-r2.yml | 10 ++++++++++ .../status-windows-server-2012.yml | 10 ++++++++++ 11 files changed, 102 insertions(+), 20 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml index 8ae49f0e18..1a52dc5fb6 100644 --- a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml @@ -40,7 +40,6 @@ sections:
Windows updates that are SHA-2 signed may not be offered for Symantec and Norton AV
Windows updates that are SHA-2 signed are not available with Symantec or Norton antivirus program installed

See details >August 13, 2019
KB4512506Resolved External
August 27, 2019
02:29 PM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using PXE images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >June 11, 2019
KB4503292Resolved
KB4512514August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications made using VB6, macros using VBA, and VBScript may stop responding and you may receive an error.

See details >August 13, 2019
KB4512506Resolved
KB4517297August 16, 2019
02:00 PM PT -
System may be unresponsive after restart with certain McAfee antivirus products
Devices running certain McAfee Endpoint security applications may be slow or unresponsive at startup.

See details >April 09, 2019
KB4493472Resolved External
August 13, 2019
06:59 PM PT " @@ -106,12 +105,3 @@ sections:
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503292 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512514.

Back to topJune 11, 2019
KB4503292Resolved
KB4512514Resolved:
August 17, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT " - -- title: April 2019 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
System may be unresponsive after restart with certain McAfee antivirus products
Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update. 

Affected platforms:
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue has been resolved. McAfee has released an automatic update to address this issue. Guidance for McAfee customers can be found in the following McAfee support articles: 

Back to top
April 09, 2019
KB4493472
Resolved External
Last updated:
August 13, 2019
06:59 PM PT

Opened:
April 09, 2019
10:00 AM PT
- " diff --git a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml index 3ad99d98ca..44809071a4 100644 --- a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml @@ -37,7 +37,6 @@ sections:
Windows RT 8.1 devices may have issues opening Internet Explorer 11
On Windows RT 8.1 devices, Internet Explorer 11 may not open and you may receive an error.

See details >September 10, 2019
KB4516067Resolved
KB4516041September 24, 2019
10:00 AM PT
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using PXE images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

See details >June 11, 2019
KB4503276Resolved
KB4512478August 17, 2019
02:00 PM PT
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
Applications made using VB6, macros using VBA, and VBScript may stop responding and you may receive an error.

See details >August 13, 2019
KB4512488Resolved
KB4517298August 16, 2019
02:00 PM PT -
System may be unresponsive after restart with certain McAfee antivirus products
Devices running certain McAfee Endpoint security applications may be slow or unresponsive at startup.

See details >April 09, 2019
KB4493446Resolved External
August 13, 2019
06:59 PM PT " @@ -84,12 +83,3 @@ sections:
Devices starting using PXE from a WDS or SCCM servers may fail to start
Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503276 on a WDS server.

Affected platforms:
  • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512478.

Back to topJune 11, 2019
KB4503276Resolved
KB4512478Resolved:
August 17, 2019
02:00 PM PT

Opened:
July 10, 2019
02:51 PM PT " - -- title: April 2019 -- items: - - type: markdown - text: " - - -
DetailsOriginating updateStatusHistory
System may be unresponsive after restart with certain McAfee antivirus products
Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update. 

Affected platforms:
  • Client: Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue has been resolved. McAfee has released an automatic update to address this issue. Guidance for McAfee customers can be found in the following McAfee support articles:  

Back to top
April 09, 2019
KB4493446
Resolved External
Last updated:
August 13, 2019
06:59 PM PT

Opened:
April 09, 2019
10:00 AM PT
- " diff --git a/windows/release-information/status-windows-10-1507.yml b/windows/release-information/status-windows-10-1507.yml index df76e08bd1..3846d88d01 100644 --- a/windows/release-information/status-windows-10-1507.yml +++ b/windows/release-information/status-windows-10-1507.yml @@ -60,6 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+
SummaryOriginating updateStatusLast updated
You might encounter issues with KB4502496
You might encounter issues trying to install or after installing KB4502496

See details >
N/A
February 11, 2019
KB4502496
Mitigated
February 15, 2020
12:02 AM PT
TLS connections might fail or timeout
Transport Layer Security (TLS) connections might fail or timeout when connecting or attempting a resumption.

See details >
OS Build 10240.18368

October 08, 2019
KB4520011
Mitigated External
November 05, 2019
03:36 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Operations performed on files or folders on a CSV may fail with the error: STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5).

See details >
OS Build 10240.18094

January 08, 2019
KB4480962
Mitigated
April 25, 2019
02:00 PM PT
@@ -72,6 +73,15 @@ sections:
" +- title: February 2020 +- items: + - type: markdown + text: " + + +
DetailsOriginating updateStatusHistory
You might encounter issues with KB4502496
You might encounter issues trying to install or after installing KB4502496.

Affected platforms:
  • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1
  • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To help a sub-set of affected devices, the standalone security update (KB4502496) has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Updates (LCUs), Monthly Rollups or Security Only updates.

If this update is installed and you are experiencing issues, you can uninstall this update.
  1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
  2. On the Settings/View update history dialog window, Select Uninstall Updates.
  3. On the Installed Updates dialog window, find and select KB4502496 and select the Uninstall button.
  4. Restart your device.
 
Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

Back to top
N/A
February 11, 2019
KB4502496
Mitigated
Last updated:
February 15, 2020
12:02 AM PT

Opened:
February 15, 2020
12:02 AM PT
+ " + - title: November 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index 349276ccd7..0fcc5e9d8c 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -60,6 +60,8 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ + @@ -74,6 +76,16 @@ sections:
" +- title: February 2020 +- items: + - type: markdown + text: " +
SummaryOriginating updateStatusLast updated
“Reset this PC” feature might fail
“Reset this PC” feature is also called “Push Button Reset” or PBR.

See details >
N/A
February 11, 2019
KB4524244
Mitigated
February 15, 2020
12:02 AM PT
You might encounter issues with KB4524244
You might encounter issues trying to install or after installing KB4524244

See details >
N/A
February 11, 2019
KB4524244
Mitigated
February 15, 2020
12:02 AM PT
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

See details >
OS Build 14393.2608

November 13, 2018
KB4467691
Resolved External
January 23, 2020
02:08 PM PT
TLS connections might fail or timeout
Transport Layer Security (TLS) connections might fail or timeout when connecting or attempting a resumption.

See details >
OS Build 14393.3274

October 08, 2019
KB4519998
Mitigated External
November 05, 2019
03:36 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Operations performed on files or folders on a CSV may fail with the error: STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5).

See details >
OS Build 14393.2724

January 08, 2019
KB4480961
Mitigated
April 25, 2019
02:00 PM PT
+ + +
DetailsOriginating updateStatusHistory
“Reset this PC” feature might fail
Using the “Reset this PC” feature, also called “Push Button Reset” or PBR, might fail. You might restart into recovery with “Choose an option” at the top of the screen with various options or you might restart to your desktop and receive the error “There was a problem resetting your PC”.

Affected platforms:
  • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Workaround: The standalone security update, KB4524244 has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Update (LCU), Monthly Rollup or Security Only update.

If you have installed this update and are experiencing this issue, the following steps should allow you to reset your device:
  1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
  2. On the Settings/View update history dialog window, Select Uninstall Updates.
  3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
  4. Restart your device.
  5. Upon restart use the “Reset this PC” feature and you should not encounter this issue.

Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

Back to top
N/A
February 11, 2019
KB4524244
Mitigated
Last updated:
February 15, 2020
12:02 AM PT

Opened:
February 15, 2020
12:02 AM PT
You might encounter issues with KB4524244
You might encounter issues trying to install or after installing KB4524244.

Affected platforms:
  • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1
  • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To help a sub-set of affected devices, the standalone security update (KB4524244) has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Updates (LCUs), Monthly Rollups or Security Only updates.

If this update is installed and you are experiencing issues, you can uninstall this update.
  1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
  2. On the Settings/View update history dialog window, Select Uninstall Updates.
  3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
  4. Restart your device.
 
Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

Back to top
N/A
February 11, 2019
KB4524244
Mitigated
Last updated:
February 15, 2020
12:02 AM PT

Opened:
February 15, 2020
12:02 AM PT
+ " + - title: November 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index 68f5967f84..bb6904a30e 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -60,6 +60,8 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ + @@ -73,6 +75,16 @@ sections:
" +- title: February 2020 +- items: + - type: markdown + text: " +
SummaryOriginating updateStatusLast updated
“Reset this PC” feature might fail
“Reset this PC” feature is also called “Push Button Reset” or PBR.

See details >
N/A
February 11, 2019
KB4524244
Mitigated
February 15, 2020
12:02 AM PT
You might encounter issues with KB4524244
You might encounter issues trying to install or after installing KB4524244

See details >
N/A
February 11, 2019
KB4524244
Mitigated
February 15, 2020
12:02 AM PT
Unable to create local users in Chinese, Japanese and Korean during device setup
You might be unable to create users in Chinese, Japanese and Korean using Input Method Editor (IME) during OOBE.

See details >
OS Build 16299.1387

September 10, 2019
KB4516066
Resolved
KB4534318
January 23, 2020
02:00 PM PT
TLS connections might fail or timeout
Transport Layer Security (TLS) connections might fail or timeout when connecting or attempting a resumption.

See details >
OS Build 16299.1451

October 08, 2019
KB4520004
Mitigated External
November 05, 2019
03:36 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Operations performed on files or folders on a CSV may fail with the error: STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5).

See details >
OS Build 16299.904

January 08, 2019
KB4480978
Mitigated
April 25, 2019
02:00 PM PT
+ + +
DetailsOriginating updateStatusHistory
“Reset this PC” feature might fail
Using the “Reset this PC” feature, also called “Push Button Reset” or PBR, might fail. You might restart into recovery with “Choose an option” at the top of the screen with various options or you might restart to your desktop and receive the error “There was a problem resetting your PC”.

Affected platforms:
  • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Workaround: The standalone security update, KB4524244 has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Update (LCU), Monthly Rollup or Security Only update.

If you have installed this update and are experiencing this issue, the following steps should allow you to reset your device:
  1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
  2. On the Settings/View update history dialog window, Select Uninstall Updates.
  3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
  4. Restart your device.
  5. Upon restart use the “Reset this PC” feature and you should not encounter this issue.

Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

Back to top
N/A
February 11, 2019
KB4524244
Mitigated
Last updated:
February 15, 2020
12:02 AM PT

Opened:
February 15, 2020
12:02 AM PT
You might encounter issues with KB4524244
You might encounter issues trying to install or after installing KB4524244.

Affected platforms:
  • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1
  • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To help a sub-set of affected devices, the standalone security update (KB4524244) has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Updates (LCUs), Monthly Rollups or Security Only updates.

If this update is installed and you are experiencing issues, you can uninstall this update.
  1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
  2. On the Settings/View update history dialog window, Select Uninstall Updates.
  3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
  4. Restart your device.
 
Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

Back to top
N/A
February 11, 2019
KB4524244
Mitigated
Last updated:
February 15, 2020
12:02 AM PT

Opened:
February 15, 2020
12:02 AM PT
+ " + - title: November 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index d5408f495b..42a74822e9 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -64,6 +64,8 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ + @@ -77,6 +79,16 @@ sections:
" +- title: February 2020 +- items: + - type: markdown + text: " +
SummaryOriginating updateStatusLast updated
“Reset this PC” feature might fail
“Reset this PC” feature is also called “Push Button Reset” or PBR.

See details >
N/A
February 11, 2019
KB4524244
Mitigated
February 15, 2020
12:02 AM PT
You might encounter issues with KB4524244
You might encounter issues trying to install or after installing KB4524244

See details >
N/A
February 11, 2019
KB4524244
Mitigated
February 15, 2020
12:02 AM PT
Unable to create local users in Chinese, Japanese and Korean during device setup
You might be unable to create users in Chinese, Japanese and Korean using Input Method Editor (IME) during OOBE.

See details >
OS Build 17134.1006

September 10, 2019
KB4516058
Resolved
KB4534308
January 23, 2020
02:00 PM PT
TLS connections might fail or timeout
Transport Layer Security (TLS) connections might fail or timeout when connecting or attempting a resumption.

See details >
OS Build 17134.1069

October 08, 2019
KB4520008
Mitigated External
November 05, 2019
03:36 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Operations performed on files or folders on a CSV may fail with the error: STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5).

See details >
OS Build 17134.523

January 08, 2019
KB4480966
Mitigated
April 25, 2019
02:00 PM PT
+ + +
DetailsOriginating updateStatusHistory
“Reset this PC” feature might fail
Using the “Reset this PC” feature, also called “Push Button Reset” or PBR, might fail. You might restart into recovery with “Choose an option” at the top of the screen with various options or you might restart to your desktop and receive the error “There was a problem resetting your PC”.

Affected platforms:
  • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Workaround: The standalone security update, KB4524244 has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Update (LCU), Monthly Rollup or Security Only update.

If you have installed this update and are experiencing this issue, the following steps should allow you to reset your device:
  1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
  2. On the Settings/View update history dialog window, Select Uninstall Updates.
  3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
  4. Restart your device.
  5. Upon restart use the “Reset this PC” feature and you should not encounter this issue.

Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

Back to top
N/A
February 11, 2019
KB4524244
Mitigated
Last updated:
February 15, 2020
12:02 AM PT

Opened:
February 15, 2020
12:02 AM PT
You might encounter issues with KB4524244
You might encounter issues trying to install or after installing KB4524244.

Affected platforms:
  • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1
  • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To help a sub-set of affected devices, the standalone security update (KB4524244) has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Updates (LCUs), Monthly Rollups or Security Only updates.

If this update is installed and you are experiencing issues, you can uninstall this update.
  1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
  2. On the Settings/View update history dialog window, Select Uninstall Updates.
  3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
  4. Restart your device.
 
Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

Back to top
N/A
February 11, 2019
KB4524244
Mitigated
Last updated:
February 15, 2020
12:02 AM PT

Opened:
February 15, 2020
12:02 AM PT
+ " + - title: November 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index 7beb2e9c30..a6c69b9a7e 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -64,6 +64,8 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ + @@ -78,6 +80,16 @@ sections:
" +- title: February 2020 +- items: + - type: markdown + text: " +
SummaryOriginating updateStatusLast updated
“Reset this PC” feature might fail
“Reset this PC” feature is also called “Push Button Reset” or PBR.

See details >
N/A
February 11, 2019
KB4524244
Mitigated
February 15, 2020
12:02 AM PT
You might encounter issues with KB4524244
You might encounter issues trying to install or after installing KB4524244

See details >
N/A
February 11, 2019
KB4524244
Mitigated
February 15, 2020
12:02 AM PT
Unable to create local users in Chinese, Japanese and Korean during device setup
You might be unable to create users in Chinese, Japanese and Korean using Input Method Editor (IME) during OOBE.

See details >
OS Build 17763.737

September 10, 2019
KB4512578
Resolved
KB4534321
January 23, 2020
02:00 PM PT
TLS connections might fail or timeout
Transport Layer Security (TLS) connections might fail or timeout when connecting or attempting a resumption.

See details >
OS Build 17763.805

October 08, 2019
KB4519338
Mitigated External
November 05, 2019
03:36 PM PT
Devices with some Asian language packs installed may receive an error
Devices with Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_FOUND.\"

See details >
OS Build 17763.437

April 09, 2019
KB4493509
Mitigated
May 03, 2019
10:59 AM PT
+ + +
DetailsOriginating updateStatusHistory
“Reset this PC” feature might fail
Using the “Reset this PC” feature, also called “Push Button Reset” or PBR, might fail. You might restart into recovery with “Choose an option” at the top of the screen with various options or you might restart to your desktop and receive the error “There was a problem resetting your PC”.

Affected platforms:
  • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Workaround: The standalone security update, KB4524244 has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Update (LCU), Monthly Rollup or Security Only update.

If you have installed this update and are experiencing this issue, the following steps should allow you to reset your device:
  1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
  2. On the Settings/View update history dialog window, Select Uninstall Updates.
  3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
  4. Restart your device.
  5. Upon restart use the “Reset this PC” feature and you should not encounter this issue.

Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

Back to top
N/A
February 11, 2019
KB4524244
Mitigated
Last updated:
February 15, 2020
12:02 AM PT

Opened:
February 15, 2020
12:02 AM PT
You might encounter issues with KB4524244
You might encounter issues trying to install or after installing KB4524244.

Affected platforms:
  • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1
  • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To help a sub-set of affected devices, the standalone security update (KB4524244) has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Updates (LCUs), Monthly Rollups or Security Only updates.

If this update is installed and you are experiencing issues, you can uninstall this update.
  1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
  2. On the Settings/View update history dialog window, Select Uninstall Updates.
  3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
  4. Restart your device.
 
Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

Back to top
N/A
February 11, 2019
KB4524244
Mitigated
Last updated:
February 15, 2020
12:02 AM PT

Opened:
February 15, 2020
12:02 AM PT
+ " + - title: November 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-10-1903.yml b/windows/release-information/status-windows-10-1903.yml index c37a9ca547..cb7133af96 100644 --- a/windows/release-information/status-windows-10-1903.yml +++ b/windows/release-information/status-windows-10-1903.yml @@ -64,6 +64,8 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ +
SummaryOriginating updateStatusLast updated
“Reset this PC” feature might fail
“Reset this PC” feature is also called “Push Button Reset” or PBR.

See details >
N/A
February 11, 2019
KB4524244
Mitigated
February 15, 2020
12:02 AM PT
You might encounter issues with KB4524244
You might encounter issues trying to install or after installing KB4524244

See details >
N/A
February 11, 2019
KB4524244
Mitigated
February 15, 2020
12:02 AM PT
Issues with some older versions of Avast and AVG anti-virus products
Microsoft and Avast has identified compatibility issues with some versions of Avast and AVG Antivirus.

See details >
N/A

Mitigated External
November 25, 2019
05:25 PM PT
TLS connections might fail or timeout
Transport Layer Security (TLS) connections might fail or timeout when connecting or attempting a resumption.

See details >
OS Build 18362.418

October 08, 2019
KB4517389
Mitigated External
November 05, 2019
03:36 PM PT
@@ -76,6 +78,16 @@ sections:
" +- title: February 2020 +- items: + - type: markdown + text: " + + + +
DetailsOriginating updateStatusHistory
“Reset this PC” feature might fail
Using the “Reset this PC” feature, also called “Push Button Reset” or PBR, might fail. You might restart into recovery with “Choose an option” at the top of the screen with various options or you might restart to your desktop and receive the error “There was a problem resetting your PC”.

Affected platforms:
  • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Workaround: The standalone security update, KB4524244 has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Update (LCU), Monthly Rollup or Security Only update.

If you have installed this update and are experiencing this issue, the following steps should allow you to reset your device:
  1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
  2. On the Settings/View update history dialog window, Select Uninstall Updates.
  3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
  4. Restart your device.
  5. Upon restart use the “Reset this PC” feature and you should not encounter this issue.

Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

Back to top
N/A
February 11, 2019
KB4524244
Mitigated
Last updated:
February 15, 2020
12:02 AM PT

Opened:
February 15, 2020
12:02 AM PT
You might encounter issues with KB4524244
You might encounter issues trying to install or after installing KB4524244.

Affected platforms:
  • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1
  • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To help a sub-set of affected devices, the standalone security update (KB4524244) has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Updates (LCUs), Monthly Rollups or Security Only updates.

If this update is installed and you are experiencing issues, you can uninstall this update.
  1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
  2. On the Settings/View update history dialog window, Select Uninstall Updates.
  3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
  4. Restart your device.
 
Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

Back to top
N/A
February 11, 2019
KB4524244
Mitigated
Last updated:
February 15, 2020
12:02 AM PT

Opened:
February 15, 2020
12:02 AM PT
+ " + - title: November 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-10-1909.yml b/windows/release-information/status-windows-10-1909.yml index 5d5aa24d52..631a1ea8d9 100644 --- a/windows/release-information/status-windows-10-1909.yml +++ b/windows/release-information/status-windows-10-1909.yml @@ -64,6 +64,8 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ +
SummaryOriginating updateStatusLast updated
“Reset this PC” feature might fail
“Reset this PC” feature is also called “Push Button Reset” or PBR.

See details >
N/A
February 11, 2019
KB4524244
Mitigated
February 15, 2020
12:02 AM PT
You might encounter issues with KB4524244
You might encounter issues trying to install or after installing KB4524244

See details >
N/A
February 11, 2019
KB4524244
Mitigated
February 15, 2020
12:02 AM PT
Issues with some older versions of Avast and AVG anti-virus products
Microsoft and Avast has identified compatibility issues with some versions of Avast and AVG Antivirus.

See details >
N/A

Mitigated External
November 25, 2019
05:25 PM PT
" @@ -75,6 +77,16 @@ sections:
" +- title: February 2020 +- items: + - type: markdown + text: " + + + +
DetailsOriginating updateStatusHistory
“Reset this PC” feature might fail
Using the “Reset this PC” feature, also called “Push Button Reset” or PBR, might fail. You might restart into recovery with “Choose an option” at the top of the screen with various options or you might restart to your desktop and receive the error “There was a problem resetting your PC”.

Affected platforms:
  • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
  • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Workaround: The standalone security update, KB4524244 has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Update (LCU), Monthly Rollup or Security Only update.

If you have installed this update and are experiencing this issue, the following steps should allow you to reset your device:
  1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
  2. On the Settings/View update history dialog window, Select Uninstall Updates.
  3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
  4. Restart your device.
  5. Upon restart use the “Reset this PC” feature and you should not encounter this issue.

Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

Back to top
N/A
February 11, 2019
KB4524244
Mitigated
Last updated:
February 15, 2020
12:02 AM PT

Opened:
February 15, 2020
12:02 AM PT
You might encounter issues with KB4524244
You might encounter issues trying to install or after installing KB4524244.

Affected platforms:
  • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1
  • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To help a sub-set of affected devices, the standalone security update (KB4524244) has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Updates (LCUs), Monthly Rollups or Security Only updates.

If this update is installed and you are experiencing issues, you can uninstall this update.
  1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
  2. On the Settings/View update history dialog window, Select Uninstall Updates.
  3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
  4. Restart your device.
 
Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

Back to top
N/A
February 11, 2019
KB4524244
Mitigated
Last updated:
February 15, 2020
12:02 AM PT

Opened:
February 15, 2020
12:02 AM PT
+ " + - title: November 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index 596f76e9d2..8a62e5b48c 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -60,6 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ @@ -73,6 +74,15 @@ sections:
" +- title: February 2020 +- items: + - type: markdown + text: " +
SummaryOriginating updateStatusLast updated
You might encounter issues with KB4502496
You might encounter issues trying to install or after installing KB4502496

See details >
February 11, 2020
KB4502496
Mitigated
February 15, 2020
12:02 AM PT
TLS connections might fail or timeout
Transport Layer Security (TLS) connections might fail or timeout when connecting or attempting a resumption.

See details >
October 08, 2019
KB4520005
Mitigated External
November 05, 2019
03:36 PM PT
Japanese IME doesn't show the new Japanese Era name as a text input option
With previous dictionary updates installed, the Japanese IME doesn't show the new Japanese Era name as an input option.

See details >
April 25, 2019
KB4493443
Mitigated
May 15, 2019
05:53 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Operations performed on files or folders on a CSV may fail with the error: STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5).

See details >
January 08, 2019
KB4480963
Mitigated
April 25, 2019
02:00 PM PT
+ +
DetailsOriginating updateStatusHistory
You might encounter issues with KB4502496
You might encounter issues trying to install or after installing KB4502496.

Affected platforms:
  • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1
  • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To help a sub-set of affected devices, the standalone security update (KB4502496) has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Updates (LCUs), Monthly Rollups or Security Only updates.

If this update is installed and you are experiencing issues, you can uninstall this update.
  1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
  2. On the Settings/View update history dialog window, Select Uninstall Updates.
  3. On the Installed Updates dialog window, find and select KB4502496 and select the Uninstall button.
  4. Restart your device.
 
Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

Back to top
February 11, 2020
KB4502496
Mitigated
Last updated:
February 15, 2020
12:02 AM PT

Opened:
February 15, 2020
12:02 AM PT
+ " + - title: November 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml index c83ea0923f..95f21c394f 100644 --- a/windows/release-information/status-windows-server-2012.yml +++ b/windows/release-information/status-windows-server-2012.yml @@ -60,6 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ @@ -73,6 +74,15 @@ sections:
" +- title: February 2020 +- items: + - type: markdown + text: " +
SummaryOriginating updateStatusLast updated
You might encounter issues with KB4502496
You might encounter issues trying to install or after installing KB4502496

See details >
February 11, 2020
KB4502496
Mitigated
February 15, 2020
12:02 AM PT
TLS connections might fail or timeout
Transport Layer Security (TLS) connections might fail or timeout when connecting or attempting a resumption.

See details >
October 08, 2019
KB4520007
Mitigated External
November 05, 2019
03:36 PM PT
Japanese IME doesn't show the new Japanese Era name as a text input option
With previous dictionary updates installed, the Japanese IME doesn't show the new Japanese Era name as an input option.

See details >
April 25, 2019
KB4493462
Mitigated
May 15, 2019
05:53 PM PT
Certain operations performed on a Cluster Shared Volume may fail
Operations performed on files or folders on a CSV may fail with the error: STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5).

See details >
January 08, 2019
KB4480975
Mitigated
April 25, 2019
02:00 PM PT
+ +
DetailsOriginating updateStatusHistory
You might encounter issues with KB4502496
You might encounter issues trying to install or after installing KB4502496.

Affected platforms:
  • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1
  • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Workaround: To help a sub-set of affected devices, the standalone security update (KB4502496) has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Updates (LCUs), Monthly Rollups or Security Only updates.

If this update is installed and you are experiencing issues, you can uninstall this update.
  1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
  2. On the Settings/View update history dialog window, Select Uninstall Updates.
  3. On the Installed Updates dialog window, find and select KB4502496 and select the Uninstall button.
  4. Restart your device.
 
Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

Back to top
February 11, 2020
KB4502496
Mitigated
Last updated:
February 15, 2020
12:02 AM PT

Opened:
February 15, 2020
12:02 AM PT
+ " + - title: November 2019 - items: - type: markdown