Martyav mdatp screenshot update (#540)
Extensively updated screenshots and articles about Microsoft Defender ATP to reflect the branding change from Windows Defender ATP. 212 files were changed, most of them .pngs in the directory, windows/security/threat-protection/microsoft-defender-atp/images This is a squash merge -- see the branch martyav-mdatp-screenshot-update for the full history of 81 separate commits.
@ -70,9 +70,6 @@
|
||||
###### [Remove file from blocked list](respond-file-alerts.md#remove-file-from-blocked-list)
|
||||
###### [Check activity details in Action center](respond-file-alerts.md#check-activity-details-in-action-center)
|
||||
###### [Deep analysis](respond-file-alerts.md#deep-analysis)
|
||||
###### [Submit files for analysis](respond-file-alerts.md#submit-files-for-analysis)
|
||||
###### [View deep analysis reports](respond-file-alerts.md#view-deep-analysis-reports)
|
||||
###### [Troubleshoot deep analysis](respond-file-alerts.md#troubleshoot-deep-analysis)
|
||||
|
||||
|
||||
##### [Investigate entities using Live response](live-response.md)
|
||||
|
@ -29,9 +29,11 @@ Depending on the Microsoft security products that you use, some advanced feature
|
||||
Use the following advanced features to get better protected from potentially malicious files and gain better insight during security investigations:
|
||||
|
||||
## Automated investigation
|
||||
|
||||
When you enable this feature, you'll be able to take advantage of the automated investigation and remediation features of the service. For more information, see [Automated investigations](automated-investigations.md).
|
||||
|
||||
## Live response
|
||||
|
||||
When you enable this feature, users with the appropriate permissions can initiate a live response session on machines.
|
||||
|
||||
For more information on role assignments see, [Create and manage roles](user-roles.md).
|
||||
@ -39,8 +41,8 @@ For more information on role assignments see, [Create and manage roles](user-rol
|
||||
## Live response unsigned script execution
|
||||
Enabling this feature allows you to run unsigned scripts in a live response session.
|
||||
|
||||
|
||||
## Auto-resolve remediated alerts
|
||||
|
||||
For tenants created on or after Windows 10, version 1809 the automated investigations capability is configured by default to resolve alerts where the automated analysis result status is "No threats found" or "Remediated". If you don’t want to have alerts auto-resolved, you’ll need to manually turn off the feature.
|
||||
|
||||
>[!TIP]
|
||||
@ -50,14 +52,28 @@ For tenants created on or after Windows 10, version 1809 the automated investiga
|
||||
> - The result of the auto-resolve action may influence the Machine risk level calculation which is based on the active alerts found on a machine.
|
||||
>- If a security operations analyst manually sets the status of an alert to "In progress" or "Resolved" the auto-resolve capability will not overwrite it.
|
||||
|
||||
|
||||
## Block file
|
||||
This feature is only available if your organization uses Windows Defender Antivirus as the active antimalware solution and that the cloud-based protection feature is enabled, see [Block files in your network](respond-file-alerts.md#block-files-in-your-network) for more details.
|
||||
|
||||
If your organization satisfies these conditions, the feature is enabled by default. This feature enables you to block potentially malicious files in your network. This operation will prevent it from being read, written, or executed on machines in your organization.
|
||||
Blocking is only available if your organization uses Windows Defender Antivirus as the active antimalware solution, and if the cloud-based protection feature is enabled.
|
||||
|
||||
This feature enables you to block potentially malicious files in your network. Blocking a file will prevent it from being read, written, or executed on machines in your organization.
|
||||
|
||||
To turn **Block or allow** files on:
|
||||
|
||||
1. In the navigation pane, select **Settings** > **Advanced features** > **Allow or block file**.
|
||||
|
||||
1. Toggle the setting between **On** and **Off**.
|
||||
|
||||

|
||||
|
||||
1. Select **Save preferences** at the bottom of the page.
|
||||
|
||||
Once you have enabled this feature, you can [block files](respond-file-alerts.md#allow-or-block-file) via the **Add Indicator** tab on a file's profile page.
|
||||
|
||||
## Show user details
|
||||
|
||||
When you enable this feature, you'll be able to see user details stored in Azure Active Directory including a user's picture, name, title, and department information when investigating user account entities. You can find user account information in the following views:
|
||||
|
||||
- Security operations dashboard
|
||||
- Alert queue
|
||||
- Machine details page
|
||||
@ -65,20 +81,21 @@ When you enable this feature, you'll be able to see user details stored in Azure
|
||||
For more information, see [Investigate a user account](investigate-user.md).
|
||||
|
||||
## Skype for Business integration
|
||||
|
||||
Enabling the Skype for Business integration gives you the ability to communicate with users using Skype for Business, email, or phone. This can be handy when you need to communicate with the user and mitigate risks.
|
||||
|
||||
>[!NOTE]
|
||||
> When a machine is being isolated from the network, there's a pop-up where you can choose to enable Outlook and Skype communications which allows communications to the user while they are disconnected from the network. This setting applies to Skype and Outlook communication when machines are in isolation mode.
|
||||
|
||||
|
||||
## Azure Advanced Threat Protection integration
|
||||
The integration with Azure Advanced Threat Protection allows you to pivot directly into another Microsoft Identity security product. Azure Advanced Threat Protection augments an investigation with additional insights about a suspected compromised account and related resources. By enabling this feature, you'll enrich the machine-based investigation capability by pivoting across the network from an identify point of view.
|
||||
|
||||
The integration with Azure Advanced Threat Protection allows you to pivot directly into another Microsoft Identity security product. Azure Advanced Threat Protection augments an investigation with additional insights about a suspected compromised account and related resources. By enabling this feature, you'll enrich the machine-based investigation capability by pivoting across the network from an identify point of view.
|
||||
|
||||
>[!NOTE]
|
||||
>You'll need to have the appropriate license to enable this feature.
|
||||
|
||||
### Enable the Microsoft Defender ATP integration from the Azure ATP portal
|
||||
|
||||
To receive contextual machine integration in Azure ATP, you'll also need to enable the feature in the Azure ATP portal.
|
||||
|
||||
1. Login to the [Azure portal](https://portal.atp.azure.com/) with a Global Administrator or Security Administrator role.
|
||||
@ -90,6 +107,7 @@ To receive contextual machine integration in Azure ATP, you'll also need to enab
|
||||
When you complete the integration steps on both portals, you'll be able to see relevant alerts in the machine details or user details page.
|
||||
|
||||
## Office 365 Threat Intelligence connection
|
||||
|
||||
This feature is only available if you have an active Office 365 E5 or the Threat Intelligence add-on. For more information, see the Office 365 Enterprise E5 product page.
|
||||
|
||||
When you enable this feature, you'll be able to incorporate data from Office 365 Advanced Threat Protection into Microsoft Defender Security Center to conduct a holistic security investigation across Office 365 mailboxes and Windows machines.
|
||||
@ -100,22 +118,25 @@ When you enable this feature, you'll be able to incorporate data from Office 365
|
||||
To receive contextual machine integration in Office 365 Threat Intelligence, you'll need to enable the Microsoft Defender ATP settings in the Security & Compliance dashboard. For more information, see [Office 365 Threat Intelligence overview](https://support.office.com/en-us/article/Office-365-Threat-Intelligence-overview-32405DA5-BEE1-4A4B-82E5-8399DF94C512).
|
||||
|
||||
## Microsoft Threat Experts
|
||||
|
||||
Out of the two Microsoft Threat Expert components, targeted attack notification is in general availability, while experts-on-demand capability is still in preview. You can only use the experts-on-demand capability if you have applied for preview and your application has been approved. You can receive targeted attack notifications from Microsoft Threat Experts through your Microsoft Defender ATP portal's alerts dashboard and via email if you configure it.
|
||||
|
||||
>[!NOTE]
|
||||
>The Microsoft Threat Experts capability in Microsoft Defender ATP is available with an E5 license for [Enterprise Mobility + Security](https://www.microsoft.com/cloud-platform/enterprise-mobility-security).
|
||||
|
||||
## Microsoft Cloud App Security
|
||||
|
||||
Enabling this setting forwards Microsoft Defender ATP signals to Microsoft Cloud App Security to provide deeper visibility into cloud application usage. Forwarded data is stored and processed in the same location as your Cloud App Security data.
|
||||
|
||||
>[!NOTE]
|
||||
>This feature is available with an E5 license for [Enterprise Mobility + Security](https://www.microsoft.com/cloud-platform/enterprise-mobility-security) on machines running Windows 10 version 1809 or later.
|
||||
|
||||
## Azure Information Protection
|
||||
|
||||
Turning this setting on forwards signals to Azure Information Protection, giving data owners and administrators visibility into protected data on onboarded machines and machine risk ratings.
|
||||
|
||||
|
||||
## Microsoft Intune connection
|
||||
|
||||
This feature is only available if you have an active Microsoft Intune (Intune) license.
|
||||
|
||||
When you enable this feature, you'll be able to share Microsoft Defender ATP device information to Intune and enhance policy enforcement.
|
||||
@ -123,18 +144,20 @@ When you enable this feature, you'll be able to share Microsoft Defender ATP dev
|
||||
>[!NOTE]
|
||||
>You'll need to enable the integration on both Intune and Microsoft Defender ATP to use this feature.
|
||||
|
||||
|
||||
## Preview features
|
||||
|
||||
Learn about new features in the Microsoft Defender ATP preview release and be among the first to try upcoming features by turning on the preview experience.
|
||||
|
||||
You'll have access to upcoming features which you can provide feedback on to help improve the overall experience before features are generally available.
|
||||
|
||||
## Enable advanced features
|
||||
|
||||
1. In the navigation pane, select **Preferences setup** > **Advanced features**.
|
||||
2. Select the advanced feature you want to configure and toggle the setting between **On** and **Off**.
|
||||
3. Click **Save preferences**.
|
||||
|
||||
## Related topics
|
||||
|
||||
- [Update data retention settings](data-retention-settings.md)
|
||||
- [Configure alert notifications](configure-email-notifications.md)
|
||||
- [Enable and create Power BI reports using Microsoft Defender ATP data](powerbi-reports.md)
|
||||
|
@ -23,7 +23,7 @@ ms.date: 08/15/2018
|
||||
>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhunting-abovefoldlink)
|
||||
|
||||
|
||||
To get you started in querying your data, you can use the basic or Advanced query examples that have some preloaded queries for you to understand the basic query syntax.
|
||||
To get you started in querying your data, you can use the Basic or Advanced query examples, which have some preloaded queries to help you understand the basic query syntax.
|
||||
|
||||

|
||||
|
||||
@ -151,6 +151,3 @@ Check out the [Advanced hunting repository](https://github.com/Microsoft/Windows
|
||||
## Related topic
|
||||
- [Advanced hunting reference](advanced-hunting-reference.md)
|
||||
- [Advanced hunting query language best practices](advanced-hunting-best-practices.md)
|
||||
|
||||
|
||||
|
||||
|
@ -93,6 +93,9 @@ You can choose to limit the list of alerts based on their status.
|
||||
### Investigation state
|
||||
Corresponds to the automated investigation state.
|
||||
|
||||
### Category
|
||||
You can choose to filter the queue to display specific types of malicious activity.
|
||||
|
||||
### Assigned to
|
||||
You can choose between showing alerts that are assigned to you or automation.
|
||||
|
||||
|
@ -39,19 +39,19 @@ Field numbers match the numbers in the images below.
|
||||
>
|
||||
> | Portal label | SIEM field name | ArcSight field | Example value | Description |
|
||||
> |------------------|---------------------------|---------------------|------------------------------------------------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
||||
> | 1 | AlertTitle | name | A dll was unexpectedly loaded into a high integrity process without a UAC prompt | Value available for every alert. |
|
||||
> | 2 | Severity | deviceSeverity | Medium | Value available for every alert. |
|
||||
> | 3 | Category | deviceEventCategory | Privilege Escalation | Value available for every alert. |
|
||||
> | 4 | Source | sourceServiceName | WindowsDefenderATP | Windows Defender Antivirus or Microsoft Defender ATP. Value available for every alert. |
|
||||
> | 5 | MachineName | sourceHostName | liz-bean | Value available for every alert. |
|
||||
> | 1 | AlertTitle | name | Windows Defender AV detected 'Mikatz' high-severity malware | Value available for every alert. |
|
||||
> | 2 | Severity | deviceSeverity | High | Value available for every alert. |
|
||||
> | 3 | Category | deviceEventCategory | Malware | Value available for every alert. |
|
||||
> | 4 | Detection source | sourceServiceName | Antivirus | Windows Defender Antivirus or Microsoft Defender ATP. Value available for every alert. |
|
||||
> | 5 | MachineName | sourceHostName | desktop-4a5ngd6 | Value available for every alert. |
|
||||
> | 6 | FileName | fileName | Robocopy.exe | Available for alerts associated with a file or process. |
|
||||
> | 7 | FilePath | filePath | C:\Windows\System32\Robocopy.exe | Available for alerts associated with a file or process. |
|
||||
> | 8 | UserDomain | sourceNtDomain | contoso | The domain of the user context running the activity, available for Microsoft Defender ATP behavioral based alerts. |
|
||||
> | 9 | UserName | sourceUserName | liz-bean | The user context running the activity, available for Microsoft Defender ATP behavioral based alerts. |
|
||||
> | 10 | Sha1 | fileHash | 5b4b3985339529be3151d331395f667e1d5b7f35 | Available for alerts associated with a file or process. |
|
||||
> | 11 | Md5 | deviceCustomString5 | 55394b85cb5edddff551f6f3faa9d8eb | Available for Windows Defender AV alerts. |
|
||||
> | 12 | Sha256 | deviceCustomString6 | 9987474deb9f457ece2a9533a08ec173a0986fa3aa6ac355eeba5b622e4a43f5 | Available for Windows Defender AV alerts. |
|
||||
> | 13 | ThreatName | eviceCustomString1 | Trojan:Win32/Skeeyah.A!bit | Available for Windows Defender AV alerts. |
|
||||
> | 8 | UserDomain | sourceNtDomain | CONTOSO | The domain of the user context running the activity, available for Microsoft Defender ATP behavioral based alerts. |
|
||||
> | 9 | UserName | sourceUserName | liz.bean | The user context running the activity, available for Microsoft Defender ATP behavioral based alerts. |
|
||||
> | 10 | Sha1 | fileHash | 3da065e07b990034e9db7842167f70b63aa5329 | Available for alerts associated with a file or process. |
|
||||
> | 11 | Sha256 | deviceCustomString6 | ebf54f745dc81e1958f75e4ca91dd0ab989fc9787bb6b0bf993e2f5 | Available for Windows Defender AV alerts. |
|
||||
> | 12 | Md5 | deviceCustomString5 | db979c04a99b96d370988325bb5a8b21 | Available for Windows Defender AV alerts. |
|
||||
> | 13 | ThreatName | deviceCustomString1 | HackTool:Win32/Mikatz!dha | Available for Windows Defender AV alerts. |
|
||||
> | 14 | IpAddress | sourceAddress | 218.90.204.141 | Available for alerts associated to network events. For example, 'Communication to a malicious network destination'. |
|
||||
> | 15 | Url | requestUrl | down.esales360.cn | Available for alerts associated to network events. For example, 'Communication to a malicious network destination'. |
|
||||
> | 16 | RemediationIsSuccess | deviceCustomNumber2 | TRUE | Available for Windows Defender AV alerts. ArcSight value is 1 when TRUE and 0 when FALSE. |
|
||||
@ -60,7 +60,7 @@ Field numbers match the numbers in the images below.
|
||||
> | 19 | LinkToWDATP | flexString1 | `https://securitycenter.windows.com/alert/636210704265059241_673569822` | Value available for every alert. |
|
||||
> | 20 | AlertTime | deviceReceiptTime | 2017-05-07T01:56:59.3191352Z | The time the activity relevant to the alert occurred. Value available for every alert. |
|
||||
> | 21 | MachineDomain | sourceDnsDomain | contoso.com | Domain name not relevant for AAD joined machines. Value available for every alert. |
|
||||
> | 22 | Actor | deviceCustomString4 | | Available for alerts related to a known actor group. |
|
||||
> | 22 | Actor | deviceCustomString4 | BORON | Available for alerts related to a known actor group. |
|
||||
> | 21+5 | ComputerDnsName | No mapping | liz-bean.contoso.com | The machine fully qualified domain name. Value available for every alert. |
|
||||
> | | LogOnUsers | sourceUserId | contoso\liz-bean; contoso\jay-hardee | The domain and user of the interactive logon user/s at the time of the event. Note: For machines on Windows 10 version 1607, the domain information will not be available. |
|
||||
> | | InternalIPv4List | No mapping | 192.168.1.7, 10.1.14.1 | List of IPV4 internal IPs for active network interfaces. |
|
||||
|
@ -25,7 +25,7 @@ ms.date: 04/24/2018
|
||||
|
||||
>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-checksensor-abovefoldlink)
|
||||
|
||||
The sensor health tile provides information on the individual machine’s ability to provide sensor data and communicate with the Microsoft Defender ATP service. It reports how many machines require attention and helps you identify problematic machines and take action to correct known issues.
|
||||
The sensor health tile is found on the Security Operations dashboard. This tile provides information on the individual machine’s ability to provide sensor data and communicate with the Microsoft Defender ATP service. It reports how many machines require attention and helps you identify problematic machines and take action to correct known issues.
|
||||
|
||||
There are two status indicators on the tile that provide information on the number of machines that are not reporting properly to the service:
|
||||
- **Misconfigured** - These machines might partially be reporting sensor data to the Microsoft Defender ATP service and might have configuration errors that need to be corrected.
|
||||
@ -44,7 +44,7 @@ You can filter the health state list by the following status:
|
||||
- **Inactive** - Machines that have stopped reporting to the Microsoft Defender ATP service.
|
||||
|
||||
|
||||
You can view the machine details when you click on a misconfigured or inactive machine. You’ll see more specific machine information when you click the information icon.
|
||||
You can view the machine details when you click on a misconfigured or inactive machine.
|
||||
|
||||

|
||||
|
||||
|
@ -69,7 +69,7 @@ You can create rules that determine the machines and alert severities to send em
|
||||
|
||||
Here's an example email notification:
|
||||
|
||||

|
||||

|
||||
|
||||
## Edit a notification rule
|
||||
1. Select the notification rule you'd like to edit.
|
||||
|
Before Width: | Height: | Size: 430 KiB |
Before Width: | Height: | Size: 81 KiB |
Before Width: | Height: | Size: 34 KiB After Width: | Height: | Size: 36 KiB |
Before Width: | Height: | Size: 53 KiB After Width: | Height: | Size: 36 KiB |
Before Width: | Height: | Size: 53 KiB After Width: | Height: | Size: 66 KiB |
Before Width: | Height: | Size: 201 KiB |
After Width: | Height: | Size: 25 KiB |
Before Width: | Height: | Size: 167 KiB After Width: | Height: | Size: 162 KiB |
Before Width: | Height: | Size: 14 KiB After Width: | Height: | Size: 12 KiB |
Before Width: | Height: | Size: 432 KiB After Width: | Height: | Size: 58 KiB |
Before Width: | Height: | Size: 185 KiB |
After Width: | Height: | Size: 29 KiB |
After Width: | Height: | Size: 28 KiB |
After Width: | Height: | Size: 148 KiB |
Before Width: | Height: | Size: 98 KiB After Width: | Height: | Size: 25 KiB |
Before Width: | Height: | Size: 104 KiB After Width: | Height: | Size: 137 KiB |
Before Width: | Height: | Size: 128 KiB |
Before Width: | Height: | Size: 59 KiB After Width: | Height: | Size: 36 KiB |
Before Width: | Height: | Size: 398 KiB After Width: | Height: | Size: 141 KiB |
Before Width: | Height: | Size: 66 KiB After Width: | Height: | Size: 54 KiB |
Before Width: | Height: | Size: 139 KiB |
Before Width: | Height: | Size: 85 KiB After Width: | Height: | Size: 71 KiB |
Before Width: | Height: | Size: 79 KiB After Width: | Height: | Size: 84 KiB |
Before Width: | Height: | Size: 136 KiB |
Before Width: | Height: | Size: 173 KiB |
Before Width: | Height: | Size: 101 KiB |
Before Width: | Height: | Size: 65 KiB |
Before Width: | Height: | Size: 129 KiB After Width: | Height: | Size: 75 KiB |
Before Width: | Height: | Size: 115 KiB After Width: | Height: | Size: 112 KiB |
Before Width: | Height: | Size: 62 KiB |
Before Width: | Height: | Size: 83 KiB |
Before Width: | Height: | Size: 99 KiB After Width: | Height: | Size: 113 KiB |
Before Width: | Height: | Size: 50 KiB |
Before Width: | Height: | Size: 90 KiB After Width: | Height: | Size: 147 KiB |
Before Width: | Height: | Size: 53 KiB After Width: | Height: | Size: 3.3 KiB |
Before Width: | Height: | Size: 32 KiB After Width: | Height: | Size: 34 KiB |
Before Width: | Height: | Size: 177 KiB |
Before Width: | Height: | Size: 180 KiB |
Before Width: | Height: | Size: 128 KiB |
Before Width: | Height: | Size: 39 KiB After Width: | Height: | Size: 38 KiB |
Before Width: | Height: | Size: 5.8 KiB After Width: | Height: | Size: 7.3 KiB |
Before Width: | Height: | Size: 76 KiB |
Before Width: | Height: | Size: 3.1 KiB After Width: | Height: | Size: 5.5 KiB |
Before Width: | Height: | Size: 599 KiB After Width: | Height: | Size: 98 KiB |
Before Width: | Height: | Size: 32 KiB After Width: | Height: | Size: 34 KiB |
After Width: | Height: | Size: 149 KiB |
After Width: | Height: | Size: 5.2 KiB |
After Width: | Height: | Size: 14 KiB |
After Width: | Height: | Size: 6.1 KiB |
After Width: | Height: | Size: 148 KiB |
After Width: | Height: | Size: 74 KiB |
Before Width: | Height: | Size: 189 KiB After Width: | Height: | Size: 59 KiB |
Before Width: | Height: | Size: 63 KiB After Width: | Height: | Size: 47 KiB |
Before Width: | Height: | Size: 74 KiB After Width: | Height: | Size: 144 KiB |
After Width: | Height: | Size: 6.8 KiB |
Before Width: | Height: | Size: 127 KiB After Width: | Height: | Size: 179 KiB |
Before Width: | Height: | Size: 126 KiB |
Before Width: | Height: | Size: 87 KiB |
Before Width: | Height: | Size: 76 KiB |
Before Width: | Height: | Size: 65 KiB After Width: | Height: | Size: 95 KiB |
Before Width: | Height: | Size: 48 KiB After Width: | Height: | Size: 126 KiB |
Before Width: | Height: | Size: 67 KiB After Width: | Height: | Size: 52 KiB |
Before Width: | Height: | Size: 28 KiB After Width: | Height: | Size: 24 KiB |
Before Width: | Height: | Size: 78 KiB After Width: | Height: | Size: 112 KiB |
Before Width: | Height: | Size: 78 KiB After Width: | Height: | Size: 95 KiB |
Before Width: | Height: | Size: 26 KiB After Width: | Height: | Size: 11 KiB |
Before Width: | Height: | Size: 54 KiB After Width: | Height: | Size: 43 KiB |
Before Width: | Height: | Size: 39 KiB After Width: | Height: | Size: 32 KiB |
Before Width: | Height: | Size: 64 KiB After Width: | Height: | Size: 75 KiB |
Before Width: | Height: | Size: 398 KiB After Width: | Height: | Size: 104 KiB |
Before Width: | Height: | Size: 80 KiB After Width: | Height: | Size: 117 KiB |
Before Width: | Height: | Size: 78 KiB |
Before Width: | Height: | Size: 97 KiB |
Before Width: | Height: | Size: 88 KiB |
Before Width: | Height: | Size: 66 KiB After Width: | Height: | Size: 151 KiB |
Before Width: | Height: | Size: 162 KiB |
Before Width: | Height: | Size: 53 KiB |
Before Width: | Height: | Size: 74 KiB |
Before Width: | Height: | Size: 65 KiB |
Before Width: | Height: | Size: 52 KiB |
Before Width: | Height: | Size: 164 KiB |
Before Width: | Height: | Size: 196 KiB |
Before Width: | Height: | Size: 116 KiB After Width: | Height: | Size: 65 KiB |
Before Width: | Height: | Size: 31 KiB After Width: | Height: | Size: 21 KiB |
Before Width: | Height: | Size: 112 KiB |
Before Width: | Height: | Size: 73 KiB |
Before Width: | Height: | Size: 66 KiB |
Before Width: | Height: | Size: 213 KiB After Width: | Height: | Size: 181 KiB |
Before Width: | Height: | Size: 71 KiB After Width: | Height: | Size: 63 KiB |
Before Width: | Height: | Size: 43 KiB After Width: | Height: | Size: 42 KiB |
Before Width: | Height: | Size: 148 KiB After Width: | Height: | Size: 31 KiB |
Before Width: | Height: | Size: 65 KiB |
Before Width: | Height: | Size: 126 KiB After Width: | Height: | Size: 45 KiB |