From cddd395e18d814b0c94773afcaf480330da77d05 Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Thu, 19 Jan 2017 13:15:45 -0800 Subject: [PATCH 001/108] add art --- windows/deploy/images/multi-target.png | Bin 0 -> 37274 bytes windows/deploy/provisioning-multivariant.md | 2 ++ 2 files changed, 2 insertions(+) create mode 100644 windows/deploy/images/multi-target.png diff --git a/windows/deploy/images/multi-target.png b/windows/deploy/images/multi-target.png new file mode 100644 index 0000000000000000000000000000000000000000..a288129e1d7d4f016d0b3344072e85e619d3ef10 GIT binary patch literal 37274 zcmcG#Wl&sE_wEUS;7-uSU4uh_0158yPH=*|dvJFrSa5fOySqb>(2Z-Ojo!}t{^!oj z{WM=@Rkc-h_t|y!K5MV_JiimEtSE(!LW}|f1A{IjEv^a!^UfLiz5)pW`pmdl_zHc2 zby1ZPg{he)If8zGxBRN`6$Yk09`)JeJ@hlOqqL3-3=GELzXxn8GX?+#CXr1>{HwaB z;aTo`V*?Q6Ex%1}fkq*V*Nu-sb@NXcmoeOMATs;P_VB65Tm4H5$1tz)sBuiez@Gx; zpC69TojhjVAfFHNfOovsHr5VF_o%J+`#JZW?qmV1g=&--|5w0aBnCMk{!fI%B3O>{ zfBJ8rDSr~1?)z_;1ojg-|L>oCm`-qU{BIEcbPUT0`ELxs{NMtT{7)b-VnHg~@caBT#Qop$SbegxyQpjL^!YTjndh+3nE(>jmY58#-S7HI zO%jHXL)nT6yU<^IK%PO{C`Esf$bq=mIL_jrox_U79`tiX@?_g`YC7cEZ=3XNf373Rw!R^RGiW+>9&xMMGM~wsX7V`vHea5 zBkCw%?klf{C$xF?yIr@L%2oDQb%g|C+KdiwGrh*Z@vSJJ%pnlYwv-43i+#6eq5QOB z3b}BL;&KYNbklOFZ0)u?2P2IT;M+0bMzdsDvg38}Sr-x*9EhkF(g$ubWl9OQfbQ5{>!+Z?ZCfWHNh1c8Q#* zoaV4w(&?Pp8!(Bcxjt=&mtWmZsa=D%F9;?=P-W%sO$Mh(lc}}^{bEvNWlEfZlF{MT?&22}&~n%5;((R!pl`OlyAR`b5D+4*RFXf>{6h zte<=lu4BvI5Kos}--Z%J{1ZzBnW8`Rsv~Z~(Y#CJI9*!$3*TgYDFRz^g#^|7ou@w$ zn#oiO#QTlOoX>X`(U+`kv$0gK(p~nJ zC5<`1bTx9W#3QsIb|?Bc%_V}@qfnlnF0UAqvIy;*H~R|sZlaGuEf>nj#?Kr+j5_3R zFuXl&(m_C60MIsS)Y)rPAp&G*0RRlh-!{w7Hd?h^VYj8Q?WB&O?uLYNz7KdhdYBqf z0+7&QDiY-6zpbfs3(5{8fMPmnh|)7D1{P2HrB4{EF>72bbrq8&Mz-_~x(o&t$oa~w z_g|1it-79hIYmMm^mKnulwfLo@IkolGgX_K1t5J1{L1$_lIetj@q{TX(%oJ$Zgx8b ztMjt=R@3^lgnkD0FzP~5bN;byV* zh+P+cEU?zDN=PST#%;tg_qFIGQWf9#t|-O)DD^#`L_k;}szO&DGn7gB0@6!Pxnt<~ z2U1IK{KcW%HZf@(pNQ-8*0Gcx35mB@51}(mNTEdLdvJ&hl8^@xTSWX;S zuy$A&lipbt6ARJt&_)^57?oQ=&GOtQvc{<5VJRJkY=+dC7<>mAK|spIGwRn?5T?GEyf2Q;3K-E!9<5v;!2>es?x>ijsNOiWlDC z*uFF6^4RNyYXn9KrcX#9TCPbp>~upUz=u*L!wG86IH3NJ26GF;!mXY2R9K@yb7bS!8T2Vof@e}IW@7HVZ zN2(Q~(^AaHq7-?&5YSOM z{Bwegl;oH}eGg5ur=+vBylA<}6!Z!cNSkhsj)!bF+)_1sDc0);-Ml0Fx38yT=ndtC zV`x-npLk_7Wn)M*7XiLq4VO+V<->>^osLd~@w_s*KUe6pV0C;2e6mE}$@zbX=5%B5+7 zk=ZCUwk$Jvrda@AE{~>cbG&fCy|c_p2h4d%dC=q9fHSc7*^CER$Xbgi!hrXopJxO( z7L3jVjxOb075XyB&P=QM>bqtJQNDP29h&;p~}qLFOx2oKe}wG=+#1;#KHadvX#Vou~$A4 zvkFvd;c-f-4mmjvlAGg&2wn>4a%kN~c_LpWD}LH)?Mmc7>{!PPJzBg-^|{W2Pzmn7vHrYA-hcoTjX_#66%UdJ?V z52y7OKPh4pbi1zu21B_a)7FsVGN}q`eNzM?Y-W6sKc4*zF5l7#ma>bUH|L#`hX|dN z%FzNG3}Qh+7$)$bUyUQ9$V?L}DcocEMr%w;eySh$xNw2cN+p$={+He&IiyY84c6ru zCTv&rCA&QkFrGDueU99;hKf=)%?>%9Qo)csEF!FDd3{JaPB2|0Ea}P9)3-;s;*kQ4 zOCZMAxfYlgNOOmtjCx?E%ccPo(hU7?qaHhy)&&)?W)r=+Mr5*wTpa~h%I~C zV&xP&=Y5IgkSdO2z#rVK$r)|%bX+Xv=2=7m0x)Y5FN7O3$#k^8ZQekNTuxsx$&Kih zJ~E~9Ey6tZnVu~6TBmO|ebS@+{i{udXf9jdJC_){>hgI%KvQpx?dat~xKqL%eC5Rqr~k*st2opmicnj}*MS8hw)5N)WyfX{9E2mu9 z;3b?Ctkk;Lo6=ZvOyGd?9dx5I7_vzjWcC0R4-<-ECti2)_fN;OvTzlJS^6SmhMHdF1N*vSd!&(VjYV7^cMZ{YmJ@lXHAvB)J#Nr)}y4CiO!GaAP_hd)Keb(v!X_2Vslxo z5q!G`=l~M9Za_OsllZ<)u6^pKJ=oD)BsV6aTy3pmyC1;X3QKP^6@GR~u0AtnPG;@p zm(#J>v}Cs0glh=V*6e9iuz>X(_o(Mh@89a6&ITO$(uD27Q+U97Rh2_yInS13xz=>B zTXRE8@f?-QDd(51L&AU?`1Uh^N!OSo_^K7x1Rk*qI}43G$I3|EGP|YkJEF@&T;Aza z8SuZQU^ZeIp#Jj!-@o90d<*O*h37*0{EhcQZV>#;eeqhHI3l<-h zEFK>|+}GAV6{dn<~lC>AZRPXulUNu8WI;N_8BC#jxlWK$I1>b&De^&+V(FV5OalWr_s2;q|aV%6u zL*+EGpDr`wcm9?&1$sZa@e$ttTSjW-0BL2zbn^CAsc0-`LX9F{13(NJ&L)P~G;miB zNTb8K6lO&vId7@q9&kRY?=oBanQDZ}jS)F-FV?<5+ssTFbT+eP-sX{nQD$e;T+Sm@ z3PO_P0e9wGQ0!aMtmaOEw(|0pCC}*hRU0{%X2mph&C5dS!AD&N_z>>sR?DIFE$Q6wy4 zh|Uc^X&$~`c92#Urc%v!q)86c2?#!#OJ1Fmr$5VCNoShQ za)c~?ZY?4!Z|Cjs^^v;=TKdH|tLAbZ_poXkOi)E50Z>*E9&L-gM~r`p18dqX+x6X_ zR3WFN6TrVc9~1Qq*GSs-pyRgx65|!uPM@Bjh5ud+a$63^35o<*jIpLGq><xkQVMyIHQ!|9+#gExSeGneN^AUhx_7Ylh1#>T1O7P3{1s zO*);QUA?X2ocTI+Ni%G$q!+fsG9oT<%Siun@Qj@|i^#q{`6Zf?9qW+vC0p81qRX=G zeQVOItitNmyW}l2ImB?|(0SLlujRxJ$W5(Z|4Qy}ZI91ZIX?c8z&%5owrb~hDh z=nHw*+O7K&VMrDNeqlb#{?p#$`)1RAzLg5TMbrWeTws{0+!tn9JPCbnKj6nU{N54E z7j;Alx zDg_*$??-4qTdL;0M}v6H2yS5&Vh(1qop{47NM|^Qe13}A_nBE*0BId4)sZ5OI`lp2 z>cz&hRN0Alw`{2A$h~z>n%xt;9*td|To}>juUxQgwT_?TBE$I~jpi-i-Py%dDI3#p z#sgNdYW+W}RRgwWD_X&1muzP=Z!t8kBP~h^H7k3a+?0S~OFEx0GHRCTGM7X2r|ASW zVj7k$Tng8;s(}=x0M#0VCC$v98c9ujK509->@7=SQ9kU8h#U@2?eo}`;hH@b$A=yQ zzKseEy50tLKQ|dutxz;TY2mc#ufZ}+RJUu7E^h~gM-x?M6IVbt`XcPUJZk8%U0LAU z?YFXeJhY^s`T<;b?Ev!0daLiZ`wLF41jD~l`-EOB@+5WTE0<{7)N4_4aR?633HaQG z&(*!20I!ZH*pl5LhON-9Gy@JY%s)dfPiiqdIg`I-ykMAyx44n0@hUB*R~Li!d>Xkl zhetq`VvdUDe+}&*A!-2muttqBg*O9-Xogk650}0QE}`QuNJK&`iWTY>)NE_1fvIn3 z8#s}Bdx*G!wXw6XlROB}6gr=PnW`9ZeHV1X$mlHiE9AZ1BaDP~R)@unTukwxk4qHcs)7wzdaoyEB0ZD5AlfkcM@D=DRm z&B00#(#kIsw*Itae9L#izStH*OUcsE3XYF|I=cuvYn)3z=Zg0Hpw*SQ`Wf6fEW&EzVe`cWmHb19!e zi2k=-1OOq|!AIqnk3Z=j7Mmn|>=u>2>-ntUGnUGeFE=X(JM5boxjMG|L1j%6@w05{ zsMp{Tn{jh?gxSb|c|oBapQZc)Q%{An+K8URC8!XWmtsHZGo7;w7O{-0_w)4jZlO0e z!>;jncgh4}D%GLmk+<1*pjQh!{y~F4y!Mum##iZHn=tllsiojC(GaO?S)iBF>OkBh85ivze5+7SzTUcqA;dG*q|^$7EivNw z#G(#EBy&fBf!|DRSn4+e$jNGUjlh%mnMU-0tIycVHgIl1ww~_d6_%3?S~xS|f^oSy z_SaT%`B@+7%X^D1pdwU1ZVsKPn%cVn>TfoH4RZ~ZkTV9yrQLQ;YWiu-B>#&h4(EMa zhdDxo4>J@O?B3pR)O46^EQ#Jcp4zT=v*{L@XgzQ1)^rO!C0b#~$vCJO77U9|g=a1qcwD;q+^m~8mr79JzV<3(ySY0~x=E1<1U z@H;QZuuDqFLP1f4B!@!V|15;|A;cfD5peUtuE8qnN~^T9r$&_wQYUYyugS>9!rF>galoAXb{vd+OjQ4^ zK#dc}6o|>@kmj+ht_M5;lmel80FNS6f&2s+AKOzmrpapEPZ!S=?-;kyv-JQwAQR{WnrV_uHDK<=}-=t*>+qN2_>QoWPe)uJp|r*wApw%A5I<_RnRR> z{$;u9FMCmay&vIv8~v`mp9Blv69#Q@=V=#(7w#8kt%!e$?^*Gj^D&yzrQoMeq2#Al zEU7&H`WVz9U7KW{J*&T3jGLa-(V2h@iKU3!*LVJ=4|oY%>8UL`-k4MsWgQac=^h>E zfVQ5xCRIaKe#2sC4}1R@yNBu5JfT76HTvBk< zlUDwmdyDMYY>O6mlZ=Lt8yI}~<4;|&6;$+Ako~S}yTodV+n|bSVPv>!JkXaS=S`In z(DN+{UFsQ}8B4cX=ArcS)bUf{1hhndGuDbb{A*QJPMs_-?4a(2=(`r2L(Mcae1^DR zDy?W!MZ}RK9r7WYOF%}mqDmAWj6_alL2FZoSEetPr~5(990vhgaus+A-@Y5PWU&Yd z!{t0*%p3rAm`aXSGBepNc%spbQ#k)H8C5?2lp6bNsIf@{m;fm7{WN6=X((qaVlfRH zs>IDJn+^zPSz9-L33@0jNc*B?MR@L4rsC>)oei^8A%oR2q zVr;7saO{)VxSdlzE9tyz4%Z@ka-#}39S??-!!$`ee-tIAxbyJsYmtv@49X6t8+>)HF>liX# z&X`pD)^P7x%g+J6zc7Bj(mRg+g_*@r{mF3^K(XFa_|tG1A+8l{PPNm@Kg1Mr0Nq2A zans85Z-Dxx=yFsG9P`o>=0I;)$t;V#gP{}xlEwPtvc|)hT!c}Ac4^{$YKNLj{NQ@L zh&K|>ggMgv>H42%YqTKUa8(^mWlNAM>O4ZyhQt1pU4^ZxpV~(@*2)G_9IPJyyuO{J zDC^Wp!n%4+#={4(ar?8w1c_{$R*t_g_p_#pum_JkJi?WW%0)R38AyV+{m|j-aB2al z%AeZNh@!Li%QnoU~jcTWM3KLbk#u&&Vw$%}7i zW(7?xDoFT+*TQr-a#mCBkEvbGHbr>Rwv@Nbj$pkW%{e+FEkhD0q7G5>j4%0C$_ZSk z9x$rq*sZww&HYSLr`}Bc!`a|rK&oj*`Nj#g+iXpl-2Mh36B5RprJ-Jggq1m@hi9oP zK3)H;C-?V+F0aEa1(zTk&JSMZV41f&bCDjugtYIYEjyjk6Xl88w zRUQ7IrY{-eQzSCC-Zs$s1Hyvq@dYa=L(W!$z5@a3F+n#?L)(Dq1qGoAxtc<$Eu)Jw zhY^b_7UApNR*uz(>)n-TwMd3|ZbQF!Gw`>l)32Eeo&5bIe~q@A&T7yxFbY;J#VVgr zEGD^ICloAWQ$vQmrHVXRZ>Sss`4Rb`5@OoWMTFBmukoW!5e`VoGCo~vk$JDGt82{x zjg%xI{~IcA-iuY`v!8znO~puS(cO=U+2izcJ?lBO!g$Y3DMk5IHqry+?}&)uuLCt` z)#s=b1CbR9Q!)u}9_OLG8cLcbXkLd+E~Q3#I_5>VPqJZZh$Q#qIsC);GCB9@LoFOn zTTJNG3?L;#4u)Q!bnY;2Iz~kT89#KZ8?8?e(z%0 z)Lv-z{APp<^Q9|GSI~UxK|Py#l;2y(%i%XFw1Sq7laEh!GgnYuX*y%KQ$ivTJ0A~V z;S!5`xz`f!fWpJxF|F7!=Hz0mJIp_`>ET;u{In*HalQ&*NZOK(Kk@KzGV6 zOgIsdAQLsz1L8#*vAQ+4I%BcoqbE=xPBcCUb*Q#IU+?vlf?Axj!#}x!FjM`~S9ioz zO=kupo~GUX-4_1ji_ww&?5|tge|={ygbBs{h@2?&(b{MJG;gAP+D;Js=hK43|M}cE zeEo9?aHFy*$*oeBty$nO_O61lm-qXys`LR7t`5QOPth0dno^&{?5#}mrxQ2QdzGW( z!27i(X5h0K^9>_OlAotr`zojC#z+tsQ3RYzXCm+6h&_Pm3N$4jzSD_J98@l1>w#R} zzjFVD0R#9q$ZvoCdHpPa7@phrlLttGfRB-%KqsXzKQqY9Z{ge_KP7{<=>*Lc&^Sbg z8u>`5n~wbq8xfH2^zkj|X)`&wME@Gye=!SydicgJoc}RjNk|aL?mX)U0=C!^H?~=@ z1TARgduddDje*hcfF7#)#ZxQa`p;^F1+n}aSA*bwzPX*D{XXB>VQ=c?l_%J08B`=8 zoV>h?j&3?D4<=ATL#Q)(ZZyiJmbtR8A5b2ITHq(L$L4-s*SrAYb0bH2jcjoV2^lFw zsRq|O2tZs?(*8c1>)QYJ)Iv}ivMN*V{%bpK9&>QJ(~s_qOvo$404n1V>Xtd!B(|XtfO=v+5NPqBX_a?@UD9R?btzPPSoz^+jNrjQbpU>d^e0pd3 zd}Ru`>CcWm(kg4@b7wnV={J}aO$0l-uCyb z?u7hl4`L2M7uypOu#FcY#w0zJBr!&67*L=+^>AFabrZ|>(>mg_WPx%3r>JP?pbH1< z#UpfCG|^Ag_GSG#3>YS`R8FUUBUnP)Pd@n!&;#_nH!A)#_m_Qj2aP|x?u(pHIC^;l z5&QP3E%a>e)U^h_Sg5t+}Gk%6*6EPWIAR4 ze}X0^K@P8$&Ht?B_A8@GAnJWhLO`bh*8gi=V&OAX+oj^XTpCp6XAQUXlKvMk3E%q9 zX$$Nja&%3(KjVe}4~gJ-2>8!ZZ))+7Mg_b(33q6vtoskkAhr!1yO_4|9aJ7Oc8&5+ z0`)$BAQJp6>^SmY^re6gIyy?0%iM+G)!{giPcBu@H)?yp=k~QA!T%v*y88aV!ZH2t zwgb$nNmZwZdu>sCFP{7Vk74(wRamU)uCeIdG`1J&jGySi{ckE`fQ-ob?Cgw+G{gt- zH6j8jGTP~`CLF`s?u;C6VjJxf9TU`3-VEzC32EW=)c5j>=(AE45yQ4)RhU0gq{S5E z=HYqo&tF!-ZosiRH#>{1sa`IYA zaI#_FL8;7opGKZZ##hW+W^ZMm4p1UwT#)<)U-Kyx*WTMUcd@le4v6K(3G+O5h`vod z|E&tO)T2-aB$-i?&2O)_*Qm=h9=&};gelo)t1lrMMc;`q zrgv1pNw>rIsO^;lO2z=*ylbV&UhCA+`9}^yNS9*mz?IkZqm!M*P`1ahzZq&Y2yg*6 zZ<71aSQ^2P_+IDV5#eiY;wbGGpgquk0!{z_T=D<2lHmTKRY<7Mhdn1iLCo633!w(h z?yDV}_P4IW|9h#-vW4kONtG(ZZD(RKe?Z&|R@R)i-Jb6I-C?0r-(97$oXWd)zdkR? zSZ4c=^${^Ips=%Ime`mcsV_Y1t{$Uew>Jb1r*r{WKWfS%3`@FJ&=uH~aiM0Lx zzR%dsQfc+1Qu9duE+v~!cu61`{i!X?7WD-^O2ed<$tIy}RGJ9Qr*}RVot3oZVlxOb zhEwn+VZCBoZJP-Caf^dXYCZ7_k=Qf+rQPP%#e=n#^Vts=mzhIn#P8&~Q#0@?d03(G z0nzodmv|wXQXEGCvQA^GhMvzsOV2GJ{;D}u0|!t|!XeG;Gt9s6WV8?(l+00cjB(nI(xb`&wX7g z7Z0z6O_q3?*SN}MeX%z4epcE)`VdB$vlaHBx6f>ih4tpa!l;q)(HeB0^TJ~QLW!LT ztsq2B;A@u=IopW7;BO`(y~>-8Z%i8m))Yt@#ouDVbSRWO!rs40fdzBB znt+7|0E21KV&y<8bceX&$osruaHG*G1nb+~7^c6d^dV^b_YXV?^y8pqH)NLC&3!MV z$|!)Dfpw9@rt`ucEpLOEu)fwuIh1TWq}WCtBLfx2Y^JPcxPB3;aQ3{UWEu~Behpzi zXrXnh7)b-qSdXt^@3KVwaAyr+dMEP#1}_J{W+Ibrs@_0ZE!~$N#Db>k zK`fifv;qFjU$zYN?0iL28orX||H!sU&8NQA4Ud_KN%yJAvo96z?E1C-;Op_&SG!@C zu9U(?DxxdAs?Ch&v-WA2{gbtBm|3a2U?IkC2))QhE(6?CmS*PIzAWLMYDVjX$p`ny z`1oYZ6wFe47@5EN`&`kW zhJOCtrvA#`qrIWW##(L1sgYY%t-;!0xPd-nGHBrJnD%@e9BDDhA&cLY9f##sX?LDb z+RdpqohPKfrEOsMH8U?~^^b(<_uszzb=@J~ey;?R!hFS~{PX;50l8+@1Ep!TjFKB} zvCuY8&Cg>~-m_JuiF5=1JpDn<29|&{?$GQo^IQf{3yZwp1*gQnW#8DPZG9y2O!Gma z6-Lr7MCzMC2(f&*Nl`EmEl6iYA5`8TDd-{6Jvz<86%(2kiC93Q0xfItjvF`-jQtHp zFfS&COyf#`D=m3tonlc8>{xD#6cu#ItgP?D3P#zQ{-kMMKB@(>+(aZ9S%+KR8^!Mw7Dl$wX*=%_X>0}))*aqP*aA=5VQ32CzNg`cM zOAn9$D0JmucQgIhpsBa_@h8gCL0aZV2}5(RaFaMx-E6(oYxj*NXD%O zrZDpU^=wn%&84S9XR%g_RBC=Iy$ThFO-!ad5^#je>o~)rVxhjEO}G1Y)Z0bZY5w){ zuSNS+&=PpQK{gVd0qJ;8up=w=^=u617#n5$(0=01uEgGKsj8t#EK^vLc|Cg*M*rFz zaa*XwiEy>|3uBdiYEK!L)5JvHbeDvey?MLG+m8}F*>p1U{$$Jm_HAD)4gF@h|!>K*Cw*}nM^c(-Rf}Q#nMc3kE9-b_29WDPw(xUSW znY@9w)4wQ?9)i|!FqD%p)hKzsK-K%VRjK(D_dQ0OdKt2ajNf@CD=C?)A-w!uBiOjc z2yilZ)95-WL9WqbcuW%X3GT8Vg+*%wJ}_M15}1qOB8ef04NN~D%iK*Vf+Ci8zwL;B_(aITcvZ^nPL)IkFRKM z75S7R$jYY@&^nPeuBoOElmS4xRFPu@2E>5^pZPU8lRK3ioBVfSlb6rGzxq-XMuoW( z{W`K5!QNY_4yXj^O=-iWkQTjUWs_CDoMMZJRW43l7=7`7wm2*{+;AUl`;aL}Hx%~m z=p-*<2@3HUPjW1-51m|!8Y3l1fAGbhJW-I7i3n{s04@JZN+GeVl1_ zTDDo|Cl~bw?((fltv^Q#h(@FpTGXkSI6UzJT_fBf)O5w;W`5HPGkF-nEo~k@k5fW! zLxe*DG8>1n=$cMIM|1U8ov*PNSw-g5fZ2GUx%Cae;1d;(BB~V+J%ixT!goepg7rW} zMFrV9Un0^Qvjjdf*$xFzEdJ*pg6!1#1)QQKgnD2aufp4?qRLj2yEo{YRbRC0&XtYc zEZvvUeeCe)P)%M7LH{!msfmp$J>o(U3M>#aK{em@F zOb#_QN$*d-1G7tAXNm+amWL#zJAoql0%K^SdCIyQR3cvALXh>3`Q(k}p?d;vA7RW0 z0seRZzNT(pj@>;lwh_+bu;IK3=>*kY&&KPI?-hI|CzTADcaJnwQD6LQkwOfQd}xPs zT-d(mJXRon!Oqated$!`tzKJ0qe^5lzRyf=ak69=&d;mGJvNiKNzptW6B^-D33yn{ z7vYfn^+ve<4ZH8__~$A`>g*t-zX({4{zOmhbZphv#GQz#Hk&3d&TjCs`Z7yvowG&AAJa4o!cTzQHfD zi9Oxj8vp3R;XkcPq^wd(WcY23LjKR&Zge}%_`El+f99w`+IZ7_3>EgN7a|SA7*v*{ z$3CT?36pUTq1~BU`$U3t&5Zh6sFlUz-@c!xF+P-6L@>$sDH?Z)@p-L%FC}G~aN`HadgdwY$jM=J+tC zH}}kG?M&`0TbdAIX(gWerKR)XHO!_RR5DdTo#}$l$d}7MO_HAH_yV=vcb)-Cqshs? zFw@Nea-d(9QB#_iQV?GXEew)m7AVeVyEES6>15sh3~GM2M~ctre>V78CSt=q&r3m} zdh=N}lZCBM7<4Enn~E{ z{%H1a4#&^^2ui9kq%{Ra%BIjO%p{cPo$$;sHJ(F-&}wt>3CtNn=Jq3}3g0M@@Jkg- zRl0mL@JgCoTbYWDwKgHR!UA`l|CsS@cOm)ozGsV7-CTo?IT{f9Wo=H4lUBG;W53p+ zZj>1RX1~E3cUqxB9LYrORdAeU^1etx9FL>h0!UkS^}+P|txS;F##804W-+N&L!!B( zO=aFx(9F{&n5o;@>uaR7_16&JhURIi;K@=*zM9ndh@LKRjTR3)Sjfp*t0~x|@av#l ziks?do{qkW8*}yd`VNIrMfQ-hH^a>;uce9SW(}L0X6-+p9>_s1y@zIA$9p(l%IFG@ zRhsYbO_IYV`ik~IM6BWMUkb#3cr50-{A(QZZEKn-QQ^%TdKm|P=W}pEnbyU%&v=Iz zx~lvY7>YT*UsFdanJZK6CqSv7R10MwW3JM;0*6CD*6#_)5iB`_IM61Q1$LrVNuj2hviKs?U z+V+kpt`2x-mBducR4n7(?xmHQ8q=C`2o)(n*TuDVIk>^Prhl zVHglwv0>kCn-nuGpER<)P4)I#*Z+&Wndyv-gVI3qmqew08J~e}+3>9DQaIErR`0e= zN7M)?YMgBcOk_>Yo+|r!-lU+7$toquRNx{z+t%3D&%r(^Wltgg4r%YmC9UREHHSwy zR6BO$r2PgZTU>w%CU4Mcow33$b%Y=-QwZF$oS)j=2qt2buLC>jax4n3sn+t!2Jio& ze1rU4ygAFRY_ebXxTK86bh4k}XV=>@(xSbeVoTz?5x)JRNhU}sv$dh_aOB&L9g~|& zy>byo^0QItWGG?JCz@CgDXVp5v21sNW@tT<+|Ifw@*;Wh@1LrBjvDD`H=i0DO6*>V z3Vr|UQ#!vR9&iDQ#|H#MVCl{4?-QHF{w*8QCQ8w*ZQ_5ZnGV_%4fl!%{MHI?AD&1C%lNK4|s9lZF z>npXevCKxU*z$9gU{NB~w;zC$#ZR&6V-@marKL;qFLt9ZJ*CT)lzQcp8rCiX5t@^( z(WLzdvqqQS!t(+t@`}0R)mmEANpbL;835Zs<=@X!S~V+Si^4w0!aeG#%`=qn#5$j* zsE?7RF~s|8e;c5hvKh_gr5?bS8IouncYD)kzNo6?p^n?706#C67sZzPKRx5?l!|tV zgNC!_HTm6Dvry6)+V#*0HJf&&Ib(Mg!hxew**3NkjB)xw#6PZARx&BaTHcq~99AtK zL`wI)m6rA4k^@-pyY+15-dM*y#JP61b#Du!ZPtNEso0BGWikW6S(Uklwz47o0QSxh zoKOeHRjQ_qot~i|Q@kGd{8|MKVOByY?h;OojOZVTr^#jCQF}~BFpLqUnYsL2w#uJ( z$B*X#4$NM4U8L$Xy(cmo5JJh(q4K!mz=rZ*E4mQEQgVBHZba-g4oWV~*dy6w^a95) zeNR&*bpE`MZbx6}jU}uA^@EhfCZ?WcnH&Mc#?*kl6n`U49kd?YA0o21+LGUz=4RqG zS}#fBh^aLQ<%~pVx2ZG&{LQ0Nn8;PhI!-p>7Sz+CH{a|Nk3QVcVGv^5<&^tuGpB+( z@VR`2mB|Ekz07Rv8z!|(%XM=}j@#vL&q3GD?|<*!@uA2|nQ&Rvrycwn=autGAkJ>L zcKQV;RU$b`|2`Ift@KY55j}ctb~-*=E2*Ahtf}R#upcR8BjKrvH zxIz;UP&E75qdzB<&dXN4!Xv;>CYP0oLRaF(-dd)T`*31>Mkd{gRWe!DCfNH4S5@AT zZEfC|*^bEGn9$ikr?DCw86V3L5|b`!I2m-Mxy2z&UcM!pVt}}4m`&Z|+pX;Xuqpt^ zrw{dAui6D4rdzJ*3xg?d6!eHBO=iq# z|4zYyPY~e1Rr%@UiX%_LmhNFfZ#A5}Dqls=;a^*rWY`^ivr=1YgPe5>f??iA^~Dsr zA(3MR9iv{-SMq-qOuh;kMfw^Q6c~6PD|m>3HC9m;pKv;;*@ZyhbxHnql>A<`CJuAM zy*EFQ-;z)c$m%z2IbOQim}wFrw60S1Ml?ZXK2^!w=PB1XJxVO)vWmz5<;+pqnI z4K!?Kh@cZY=5T(uB?Y@Qwq7FBPlqAzEU+WZ2Ai$*K1;yW?r}?6VM3fk;)&wMe~TY4 zXq;~fLKzlA_V^55E>I|5w7B}PIc>J70zZZr>a22!0QM)&1ao$_zrL^!lMK9H$jCIJ z-Ybr)8x^_465I;I5(Iu7+@9?|Y8lqFwvJ8VAabfu>*8;KXZ)CvUH-hqbWv4}a;Wcs z(H@27bt)E5U|ES9k85^=4)+~>2hX!En&9@Go04)k2x`u^5FCXcKllEopC+Mvdww=+ z7mcOxd?!FJH1mkS`uXp{2oHF^rXES)8h)4lhE}YPa2h@)aArdILWOT1lWvy&k?*Vk z{&*&W%JVSfTP2*^9#PC5BL0Vst~sJB8%yy=gD$;Go5dOSpe-p@j?rN>r36#@(#l&Q z(VBly@HYzWKB!7hSULG zZqY2PWsOgKISH073&HfXPuLhwf;4JiQ*#zHE-fLXutZ@W&p3SnwvA)>YlvTwOm($5 zr}h*+%CQI)(YMHiXpAx5_}ms%`gMgHIAFy{(7W}O9nxM3arYx!wL%ONxcCMSG*$K# zBu~ErrBy!=DOv>dew%R#7cO8FwKHfFj#ES1g@C#)`|cUyi6-*6k#^Y^K`E-SviePo z54RE5mde@BB|JuRkClgGJj^`mdsZyl&JznAH}j=^Pel{vpMc%f#1^ex^B}x=qOmz9 zt1eCxSR0&m1oFj!4}rWNl%AyGYtu`GO)`zMp|{#*_};eJ0{Vl$j=@2e2@VCrj5788 z);dWbn~Cievz`2(siRb-$@O>S{JCy6vZ+ zCDMMFOZtu&tDE}d1z?hx3E^EJ>Nc@s8}IX{kg$ z+1Q*96?P?+hj_av#Ibi)=aN?t_e=62rLfV;cIo8h{$#A`pGuqg5Dhq@z$*)_7TDW5 z2^CgS@IvYGL~Y&{1Gya)J2vY9c?#lB@`IiEn~WJ2#VW4cKnHl!?dCV7 z)PTFX$hGcmk3-I9U4O4F&vq4nXOR0VKhtLE!JTkZ*o!H?*Ny|sE~~bd-GBf;5hE{= z(^e>V`y4z`?()ZY7M3{z>=L(Q^?@Ko&075|+qPX8KPSW(MNQZYx^N}wW`dymj)uB| z=rU^R&uqW>9OE%H`3=Y9CYV8QLhXI~ud@KGv~6-Mu_*5e3Y@bK^C~d|GvjiJZ(W{+ zzHgHp7Mpoo^lFh*15_A)27#a7*Cx2fZCceB=PFs zMcRR09*Fz&YZU^TK{G_TG|+qRSk9>MUKbNP#Qg8(EWL}wA45BLP4-b=USg}ky}xPQ z9nK%*xhVWX*g1?T?%*XUl;Hz9%sQWeIZhUy2A)`Pdi(ARsH3Q_W<1pwiwGg$=h$(l zm`L&Y;Uc<{HI&^;y z?2^YguRjIc2qN!8M0SVL(^AIDcE`X^a&*?hnH2+#z=IYBDpmZd+Lj$e<13s#++f^B zaFUt*7tAY@Tc(AC2rAqcs=wwXI(UUsM8VxY?>Zymh8-Ur)ncC?*J62XQ516%%`x(7 z)dU8kDgK83ct=`nOa11tOV~_4Jl;G4w9(@Ps*OiO%JX0&3@>UBdcM)1{HBnWbRx<}74eb%XgGJxw3a;Yf4hjF8?I~V|$>gI+qpOJT zsRHu{&k$V5&34*&Nq`X(!K+)nU%-BxIe6$vGc)1N$U8??8EKLLEcj0R0^K0$83LMe zxBFj=y<>D_ZPczC+crB+I=0=h?T%4NcWkrcj&0i=+qP{d6?@nF?LE%fQ@x|v@z9bdYH4V zmp91Il->Im?WAYOx4qqi^qto+Yzvy6ng^GbwgQ;@?JPFnOmA;Tx>$Nc{a-s8zaPFm@WnDzHEYU8u0Gwd4tL6bV}2I zUp61xmphmTf9<|_G+Uw<)d8|694sE1bLo36xTZke64%K@bjVD6>9T@CHu9jv5z)R&hke%JEkxl>{|&|eG? z_H1K`tIv?lLpLhg5rK-Y!Pi7WBw=^?#|v|ULNOXe#9H4MzHlc;FK?NT%4;2PoTs9h zWr$Z8_N-s+31=`s#CBAtmZ;^LFzaP>kHCyk3eG5GOip@tivRf_mA>$T;jpGysvnuzO|FiRrWJ51bW{_A9~Q|{BCy|uQZ5Cn`?MLo!KK^%=7=V_Xlg%$R)>0IUL z1svY3g238M2VCt{pC*9x3Jt;fYpfC+8U4Wq#{&k#0%cbUeEcgAFZ}|*pRgrjm>9GS zKf7`7T&M5!4=W zeOTV$;6e0Ou!zk&`WXNCnfjU#13pcrkB&;2w^NPj2}^wyBgbieJZ zr(Z|T=KaNmI)%hE2TOiqX$f1L$?bc+9Njh_n*WFIZt2!Dl^btO^L0b>Rr%Bhi3?&V zqx~g60yr#3Gj54GjtnYZ!`?HA31Udd_@9(s`BdiGy6>OJY}LZw*^LqECgS9^_x$p- z!qWaS6OD5e+nM*t>99DUUfs~p9PqiyIX}$!(xC*UQKG$7qWeIhr9>o7i0GJyuO+U; z6dL6SdGuL?A|D|`;*Mmt6xh{)rox{0Y-5&D!T^$qFOn70v9}P&aM2&W6VuQaq`2=; zjsegV^4`^zwh8No%xoS3NM=IOetdFXW=}KpQmjsB@uCwN2-Of{5vHi%49NQ$caIC2 z2|?)=em8CXpOA%O3pPJvxZkI!duM)oiX3|u29p5q>HHl(nF$nJTClFOQ!e(VwBgubxQ8vac!wSO3qM3(%bx=FYI)!mhLP*a#P>MJxjR2eZcA+A)?!`sGNld|$R}udJ zNaiOA#(p;+CrP<5JI}} zL6@4Pgopi!mBwDrm=2^!uJrhB|5*1-*CyL(`TN)(ZHi8xuElm2P7z*G^A z$i&o2VicBKpPI(V1|7#{rrIM8;&BycQ5!YtpV{4cGs1?EL;IXgNLw`6vd~j*-NW$V zcDnDWAIW;bL@1G#;tTVbFkWoKk@YM&9%ah&TCcIJlVuz*QtuFM23GeelPljG5jZIE z7sH{~J>JK)1aLYT=%gMm_Al?W5!@! z|Gr1mk{>5yc{(27r}e834eGwVH~&RxZLqB4L47kLg9D{b{;yH^)93#7vw*qeYrT z`Q_d6Z(Mw5khJ^-m|tQcsr$+hJJRG+w_gw5mL6f;o2xTN0i8TPLEK zsn^J8(}sEd>6d%j#W{!1H$%Tf1+KvxOAk(K5N=~(Vo1%h4mIn+3rwSwqMubEtz$wY zLun%onEb~tH)Uz&v?q}n(z-eYS>dPVkpQS3$<|3BNu{_%XKl9S`k3ZooKP~8;Tp;^ z5+-HIUzfH&>06hsR(Z*_6oTb}kdG(p8#pu7{NcG(;j50uL1#i*Gz9&|xVL*$v43|8 zn&_uBgb|WT%Oz}d=k`&kOn?@)7NPLM9iFbHhQ{)G-&8YNzEL#m;qMagNd9iDj><8pu6O zEj)=Mgl;WCR+~e`R$ke>da$tS6uQ2pHL)Dzw>o_{d>pmd6|1(YvIt7SeQiEc?nY*9 z`a&6+Ufp?}+W;Im{j#}3)m+8G}OZ!Es21OLO@%RS! zyVhOg=uIe2ZFzIxh2d&xFWLqEQdKO+kH$-KsJhx3kLb(;vS9$6`fk%~LbzSV2rC#4 zt6TmQ<`x%?(-y92A0V9`7t^H2L)AI{gw>gIs{S5tZdHAkv^wHu3o4cqm2-w4vC(&ofJt$ z6R2Eo5$}Ao@+&!ynLXDuRA7pqOiuMD|Dh40>_HH+3$S;HK&L1aZ?>V#11}N2e85Kj zlr`}=bk0>uzx^B4K*lb#Ffk8b*|@gZYvA<&nXRVPM@gy57|St|1{+e&gceosZc}mL zRxypSRb3qogJs#gD&R@b0TA!Dw1}Uh_trEeA;6Q{BL%-2jyB^gmp zR-sRVRsYb%;zL*pSH@pY2h#$2Xom)~GYdkT3RUBF+yg3f_)If1n0j{~ok%Q=rLmht z_bO7wDuRx&_6c%*%^9*-A9V}y+5>Em!!3l{btn!}%?Se#^n9G0NN8|V?bF$ydJ5?? zq2k=2ZkZ3cqIA_V?ZCC=ubC%2)>Fsl9@SznX-Zl~Zt3A}ZkmXswMO|v4F3YT<(FF3 zXph2fN# zjh2Cjr{)eXc51^cskbY)YAl2ASH%FNV|9dsH*052gKQN)LyM7(&NxT1e0IZ+qE#U6 zGlA>!hnH^4%d|>fG(C*W)@qvsmP1T59ktQ3=W>w;d6F8<`9vPUy~B+(XD#)mTT%<5 zR5ZGAP`}tPy$1v~Tb8)jq;~Nt<{dE(QtA3DyMLnyuV~XS*HoUaU46siw;g$SLpL~x zxedt+_P3a(`Fw;2NBcXVOfi;3G*8!5g|3<(iWCZuxr2{jY!xWYLd#iF3+?AKApEuG`M&b}RH_cmQ`b9w!amdQwo!>ug^DSKzipWfP8j*>14f&(dDEcI`#YkGa^eEjR)vJL zKn0i612vwNY{sl1a3tXp6Z^D2rAx2rJ*YvDri?ePoTbbBG}Kt zzXm-O?;DkDKb~dw4C;nfo2hnSIIGh>*}H0y5`_s;JPYZBFnLJF4l{)ekKzm?2TBb` zQ`7jMETP2K=k1ZE$BFpaA#0n3!@Kua(|nRN-qCYhu=lf+MLcfDq%)E`oH(1h1(`(zAH@W|BZQsnT0RGA zH|x9jcC>m38ty9jnhzH_i16B#AfdSPHgRy7&sm7(>(41HAu$wYb>1vv3uL!6ZLG@F zInSaT6-vCplQL1pZuh@CjyXXvx|l#WutJR@oFcJkFsO!}r@Zfn-G}QkrDFFEC+YbY zr1X+OF$1Gh#ySLP$8tT7NA~e$$fH<%P&_i7t?y965|7fOm9Uule!FT4@LfOkdmboO z?&)Xb2;SBvGJl&n<>bPmNuSs%ABo<1?48Gxv`Z5QgULE_Anl`*8^OFM7pU43C1@0! z;f?nxmWP^e9VR5+`UH%XcrFLBSfrfzxD$TFkkAO*fw?C&j#NV^$QhIsY~zd>d&0U% zUG07YCEz5wNUo&`nW;fR%b49o*96>+yI4kK7?0}D+H6`d2@o_j9`JEDEYQD4K!)n2;5$P}Z?+jQ1 z;`}DUs!&hpPmQz;u^FE{!hVi5C7%~n_Cl2%J$K*se|J~C*8yx$K~*}RqnM&%xH1NF zVs6mjwD}wK5^{I<#LTS6lf&lnpG+6fSh4@2^f%Up725Q;pLi#}2KOaYIvdW66p<2$ z4KzmODgO4}O|!iATj(~!?{)7BD?_+zKe#Q+6i$775l>(k*OXwPe3saueYhj@Ap z#w_#}{psQN{Es})mLn8Ajt76qfZX0xe3N+Rz)11f4ncq6~ zB?Q9Xs@(7e5Cr?5T!P>syYd3Lw-IMTxR(sM@o+wLw!pVP$NTMFj;}gEnV{eJWg6Gw ztVwa*!q(cP0ACj@=)`|k2J}Z@TGUl0{=M6&jNr#+J38Kns`RJIv-w;liN|b-`3G_O zRQvJaDAkFVwDVQV=yzw3LycExrXcwy)g=t6Q*BgOlL&>4Z&!(~>U8sj*7 zOJv?ji|HA)u&}^yXqX9%UUEvNXnWet-gn&Amn}l)!h@WC?&LhoeAUHu;y8fvzdTKu zylVIVMlWDfs6o-%WI5C^7D|+k`pOBUDnJfuVhut7C;&q$tZ8 z;*2ND=Ix{lslYhroSoc0k40AV8{hLQJg?(WrTqF+{H}N?l%Lz^w@CZnQ0SQPLG_pP z<0af(ZUZ^KUSjjNhvP^c*1|PgQ9Nk+%{g2=O-7ofNEb{-HSfeNc_q!BFEAMQVD=A< zW&gz8jbUr55qle#Fb%+Rnggvm%QIP- zbh><1yAFM>+e4bgIPs*qbx{uATyDlLTe}vfOP*$&w*;A)ubw22eKUTHhcycQ1ErLF z+hs7*ac)ZdVwIEtaFYoR-7#K}UPSR;b|z(@ijq|rdaDn3Lv0gPT7(MlR9t$6L@jS; zVrkuQ{pX#PwhO`9DoSTTH>IQ2Mk^y)d_komud7WuJotY%4TS13>?~pk@>s~W>AOf& zBMe@?JcCBzzvg=9cCyeA3ns_CzgDNG@J%BHi26`{kgKlb(BLV{oo{<7?f&}Frds@3 zUWaxa@o|V34a=@$09^@NV_VG*p;Htu zH}5Yz$NywRNda~g-=^~urippkel45$nOcTvK4B}9O{kgh1o5$wrzu3H_4jw+wwQ~4@oMl7yMWQ+2G!iV~M<@CnF{bDVE$h>~goJ(fQX6YiXz^ z@hh%k8ma-05Gmh|LVMogO~}4PnDRx)APSY^6ThShJG`d@rL2MhpH=BNr|aC&MH`{g zMNU#-x0gvm6^ofJW`+uA?n~p&6ATLqbt{9w6z6s(C>Zt~pPlPGPW7Hq{%#((N}>}G zFhNz_W!swdG#;3p7nPTr!F#_m=x`CFQ8DeUPY+ThG;HQo>5Wdp*@1mrK}S6`@N*>a z@Ybei@ETmj30{8?A$0S)1h7-^YBdY@g!T}bO5`+nCKarLn4{ewX(8IbmdWY}B@JY3 z;WHlFp6ua@anzenj{t&e2sh8SDmYJH>Fzvn*R*3tP<_8;wZsTqj=#tE8e(N_&#NT1 zu3#ASI&OPfH7#&@=y4)z7!UkB=qVvmJHEBtDW2_oa?1U(fPV2=p1Ap30SBpg2`_l= zVoApj@9Gch`(KCs@vV$ULW&N(2y@h!F(Ie8|1aPK1iTHSlIq#6)4xCVMFcR2!}q2S z_L9H<>hIQ+wYRB!->Li!V)!rt000K@CGq((VQ8&Fw^Ppqz}gLBQrZviH(2bS{huq4 zaoZP=Cp)#my=Y&`gqoM32_7iB$nFiDrZ@A}AW{<)b09s5`UNxCB_gHTNbEV$+viO) z{GiYQ^7Tf*eN0!OIsf_v=k~vGvM?p3gF=vj@$YP>_Gt&H6@=jP z+dE1izeI8_a)9Ll)u>JbJIE93imkQXsUJ!+II<{xxc2D{GJ+yJqj1{1e;!0U0K?>{ z$1Y|;r(Agh-6-x%@?}_%0NCLdXogT!*VI4d1h97^gt(?dbM&zO&li{l`sI_A)m5C@ zSM3k`PP@PC2Sl&Xpvw-;5Zy<^36G9R_Gn<`37_8?D*30m5@hGvD zVv?7zutAr*o#Fp&JpTXZxelxC0n`AJK*WHKy@yBSJIIO%y!Z?Jf9b9N;S+oGDk=^Z zlQe*@<@6rr9z~1{rKtZmmU|9Kgge+}f%1XK1!Xag{)M?e1@|A}|LX+0>XP{J_lmf9 zbybx@VFBmO^3DL=JiD2Nq3TXeUW}`?wKe?vR=ctI4vHVU@yA6?(7vu-o@LQFcns~K zoh8yWQ92L4ci!gPoU?N0ee~f0?*nTsYb^d_VnZzr5MrhvGK; zXk~w%SU^)U`Y;@eu(8?lJgf%|1OjCv2y-(qoD2cta_v5tn*%>wPw+u(6)@v&c>MWd zpeLy_vP76J;cbgJ6IjRnd?jw+)c$QqD(#)<0&693B0Z7XXeIW|XzRH~Luxu++<$@M zUf8G_8Tu6g=KA>vk$NPxG8l9a;}OB;TKOx__8!**(x@K)AlXoiy!+tdB@|xk*V+#Y z{Y$y`OOP-7;xB>>UT!GSO>DVK1B7eT*$`LjL;Wb*_aC%Z3hz(*Y^`_Ey$qyo!L(Fj zk=3xDBoiV+*(`w64fnp!gxH*JuU0ybS07sA(zB!TP_7q{cJ#;R&GY}hfKQdQjXTBN zI4pH>c(`)RlA`gH7{d3^jmvWP96i5F${JKDy!pRF#@hch5gU{RKgxDbB zk>UN4;%hDGr!_CFADd`w2ch(FI)1I*KrRrG9`W@5K!j}nABeCWPAdN+wtuTX%K>Ml zxMxD?4TR$y44PwuK-D*hO=seNAbgnc7jV|ZsCQPEyKgFPKP&h=GS5(+#9>)UZ@BrP z(W@CSRK1vGxlt|_pQ5EchA78y0L{6Rt*1(!V^@Z_fluWB-8G5p5xW$3owe>EQfvC^ zyj^_0{Vh{``({h&c`m-oH6eB;!APm=V(a@{@K;nq>>KR;S9M2?5BymOO6XE<>yGD| zre?dgL(WoPQ>PEP9TIOM9H!K{-Wq`L&ss6p8-FI(eu&k7K2%$pn7;)y-`4&*fz94T zj^5glbu$VLOv&O=U&w>%b5EsT>}NTSphT>4?Z?RH*)_PoydZ|OQ3MUm{B$!j7ujf{R7(v znCUippC71zmf@^qh)thAq?`L9qB(e5*f~TAusH8WxcGJpVPV)$+>9(Z*IS-4YT_ys`yWLMPMe91Us9Hqv zl-s;aMqNH_iEkqC$~mK`WmWozH?v7(s6sefpi?R~DUB=jHDxWt{nnwUvaXw)44+8Ooy%4G+e%;BU_i%~Za_#Hf# zI7h&dkdDS=q_ThYx_`IOqo#wC%Xu%W6hOWPnMK0RtKjQ8#l!0%6*^iQ5c**=G8=(5 z4DG~zIK@Cco)Sw+H7t++U0Ojlfs)#juy4z0P$Dg!uq5lUXuD=+&xg;--hNh?a$-kB zSz%NrvBTsyn@j}4&%El5jDkP!AUM3U8SsHFYYnebet~h2%S!hbqb5{;XG=Nw629={ zDlY(ji#2|YH4WZz-LiP(KRL%8%EVuf@|Bp()bF??e6pX{ePC z4VJxB;{os!Y{@^YT-?Gs=ch%I@Rnt;@)`ed%JtDxLDsD#Zx{DD%%tL$&dXZFT!;AB z9ATTn4Ua|j)}xbnM^LnwS3e0CcneBRgN85pq+40rj+Bq@q}Wx&*|NPncj)-|f}io&ASRo|Bwa1IVBbDUS4^j&AdE3$-N zP*duboPw-tbD%&6DnSB$fx3lxu>|2ZGKa*61p0HQp0>&Y8Hna(H?L*Lt$|y`fPcdOi3Q^yv7;@)w4(Y6q;Iu(I8T?%H3b zRh4wsiFn_7zXuvK4rA1f+SL;rGqh-eTTuD9yJD$fwRS%@v%rnuG-FbYHQ21DSphf z@nJ%Y@m}guzO{LZ7zMg!ec@QA3r|nILv5g!KtT$$)k>1{{d_#VQL#x%ng{y6zrGK~ z!y$`iI6juArn~i5zN9!v)N6B($w-P=p~sk`rKKtRTOpGE=q5RKpKbqe=J(t62<;=| zKtyn?8?;5s343>|ap2jyJ19Mr~YoN%r%rf*L`|3bm2je zRv;$lEn@{frrT6GH7x#?Gmo^ZwEC-+tTh(uuSn%7&G9xy>1bYAo^+hDoW8+n)&A1d z+^Dj2dc268M8EjRO!@$Ah9hO2PEaJ|YM^#W)#&1!8t?kjLGE~w&}1_) zNTfxXG>*bG190W}4PUl8Qg^sQJ*)k@KX{RSJ3qL9-b&Lv_oy}m>j#L#v0SvWsZ+6}D>P-TJBhO z7{X##R_(l5HUu~t1bnkE_~G<}uxd-e@TIfqcWthuhaWH;N<#$y)tB!OR|$|9wivEg zJ%r}nRsYY>_dzV;{XW74nA}Bq5Qh3Xeh~Xe>?7}Y8}pB3&2lE_!4kE;|G*S=8mw9+ zG-v66(i)O2-TMWaSQNrmE@R==oT|;OyWLmfs-x8}4;Zg%q%zo6Udn1*xK;qu{a(#Q zZ-7^2)tdKEWC+?BX;6My(IX5)NKNrwx;f)qb;*oS00F$nw2GK<@Ha_xApd*m4q z&xu10g(2O4clfjRV=|^oy^iw2*DDL2R~~3Tkj)q6*NJEA=~@rrZLRd4MfjYq2(XXw zJcfZ(NkcT_SbkNT<0k68J(AfkyXl`hgIosV(5QPRZZ2#OkSFKcP@}ye$G_)8!u~bF)FQ> zbsCcoue#m{i);b(!{qU(zKBolu zKg*6^BE`1^AAf!mZ47OKL-1`-IF69!E2WU|iBX%;=qB#$qRKJN$*CuP7H-m3{k#lv zbio)G`QBDeyaU?NuG08zPhQ>>r?y`Ix4}sn> zL7i=K#Mto4zsV$zZ>w5%6B+r}Q>j_jcjZDW$_y{~@KPxf+c?mPbmoq(z^36S4xQKl zzu;nCo1f_uMCeTMDs|LBX$cWgIwkdSmZj_5N>eSMjsvqbEhUht{b{ry;pg|`GL%$y zzSSew>8Qk5yhF0QDN#zx2Ai&UU+I4Sym@qo$! zs@_wY&Egb^`^21rZ-5SL2ji-oCVHJYnZSprQwNbSINFQfh78M zYHSnX^LBtMB9ESvX{PTjaGN9d+Wf&nREB1~ZF~(tIzoM)g&(%ZL{vOjoU?Mliy>>4 zpcqZPPDu5(lp(FRVawfOi@lnBY_vzmk=!+*vKo=z=(Rz%Ll6MH|ChM?K|0nM_wpS0L{u$%QG z`^1xoN_c+@9AY#euaQ7gHntUJEoX9bm&17Xc0n zEO(3>S!6!y`yI`6?E}XaXr07Rm3bYvD$QOBm7~2mKiz3~;P)4J%|_r0B3|N*1g#q< z9VQmtraGo56Nk2R^h^~?YBrSn@b)V422y3^!t0)*`_C1^B2qNUaaj&>oeWXusZ-m7 z9hp?jT^Hji7yrp|zrblU!1blX#`>yTAUJ1^tuidq%~i)eaV^NT8wLrD+>H-MCr(?F zfF|1~Z?SA3V6EfEA4{haP>5t(AmqOxon1^VvATelX;_UO5Qr0-kxB6%118SQL(ss0 zR~kxG4-091mHN#I;j1%ubjjkPI1J?A%EFyKJTg#R#L}kAfbu(v&;68kv%$o*E_bhwmHFX1TW&RXPOZ{YK zX^c&P`Y`aeN^Yjy%sj%Dd|1*vi@ANtK%~*Wf$|Iq{&N^1S;S`4DKK<qi6)Sq_EaH_^l>KvtCY7d7g}sMafWEPfUu}HeEBX$Ha2K9MxF> zY(PL@=9-G|Q|Kqx!Ie+RjDTnG*V~!{r;YR8<^}3S3^}Y1h9sZe+^-65r+{P}j{8yE z`|}?f--Y?SG6|TofYU8pqaTQ49lPM1U=}g5s(DFvAEIV|o=WT21O|3TXB`&`kq*0c z?+Wn=O6_eBX(b%C(686`q2ig#{RvaDY+}X%H4aU?(`&EPyw*o>6*PY?CONaorM*%! zeOI2bGDx5H>Sf!%K>Ls~s)mDg?)rD#ACrC6c}OB&F&h1ha?#VroPPQ9Sy|}x&IJGr z7bmY^0T#c6_q$Hj{SZ{Hg;Mmm!XcgdMN|Q1va6T7ZZgTSEmp?=^#B=Y%Ox+Xd=R(da4wjai z$JBDvQ^|*JrlMv~*QVjAnN^-=phH<_4GzeFH_cjH)}&e^ASlDmirddUf8mVZ>>HTt z&PNOZ4zrP#Y5caI>dW(XEW_dCVp6$)>BKYS_=ArNszY6AuO3)GKXa9BeA3y)cV*vU z@Q7IJ6i}-XLqh`{s_F0F6FjRJ?xi=Cg9kYQT&M^IQKe5HHT}uMZoRux^v3I%MNM=$ zQ3Zjn`B15I(bqQ@ecLEQ@G+9C_zFIM+CAZ|6$(%%Kl_XrQ|GxM3l}05vquRb6bbQ| zkt5N9Ju^?kbUWJW8bUPL_Kr1HDZ$5)(1z+ruBy-sn(Z%$kFKcnB+KO2cM!{ks2P59g- zO{)HD2jbx>Q&h?9kT}0k+b_~rW^My6UeHJg8^8J8CW9Z8lTYH(4Y`u2`RV?BO_jOZ z*P>vQHNSsh{H*wOJ(j+P4$wFYzjX@gX~4C9u#5WV0K_sJx&Ze1Z7VP`Ggl(Kb_Hi^egWS^7Ao5F>!k_fMxHLZEW{6e2R(ncFq|otQ<+A%bJ^hr?DP93Z;qw zprU zz5HHd-Qc_u0h#afG~6S@^tlKcse)BLKeTh)1P!qf$6~FBhIRy!_&}iNNcQ?S+aw`` zM4`_I(U6VTG0kxf?b;j6B4c3)zk(gS$Di47B4A?s8HvrT6hFj2@Y>*DAdn#;1=@@g z1nyOu66yVnS@PIOOYjWD* z%9Hsfkl9NdJnQz8Tf-eet*C+NRZI#;qXMLnIVyVCITX*D1*cIUw66y~F*|7JIGqEz`6TiN{2~OHJrfIg10;(Ca;KWMhs@7%zdjxy=5HH@ zP*P^kpvWzQ&>5nEi?B;0{5FhiV&Q6UM`!fy!yQ^{|G4Xnka$feL`IP(`I|p|(CTyI zF>RBthY4jDLF>EGz2Mbb*SdkPJJE=uthD2*12F=!g&rC`g2Ptx#pIZKZ_uZ{`0G4z zLtTMz#~o@fpkV(&E5p+RTQ{3q+TSrlJ-(g-bzlWWk;FY>68w4^why<43ffddv^2Rb z-G56{)&*RY)5ASVk|D*8F$J4SflHrYV+eNpX^lsr6I__|kpYqcLGOU>0VQ>Nrv<$x z@rRNt!k@LjAynaZK%rIjv{qgubmVU$Lab{rp|8DD?hkRa{dq|3rX5U-RPr}bfy|;S$d73vQ$r$7zMh!7x8xlIHF2R5w><8c`d>z*@Hl>(4X@jjTZ@Lu3LvK-KL1}eCe%Gsv+ zt!+x3z5mFK-e2rNU1XF~2RF4+wUn#5A29P8BhAL3L62X5998!J8xCycwj)(e;)h}b zqdYi)rz>aRH~Va(k63y-ykqx?ROxiCplL|$+jX!$*gs}YEW2AYxsG}2dHYWPMDco} zw~|w)*^f!7;JV}d6A2xkU3dQJF`#QWde8>%_RpI!x>cm5h!@h`I^4y*om(wxR+CD| z7%Qe)<#&ggsyRN-=@}{DT7C?yC{9o2{S4P9D0!ctRy^Jq%>y5TogEd#EdKYJ^)Zq> zY%sDnSXEYCd>HBpMWg^-U^akuW$$M=S@7AO zTe}x<;D(ilFv)8~j4fMe^cNxuE}ncMu$;)MUjBXM<^xmUHbkpuS zB|0QPfd*d1v`ci$MW_2i1tG`q#4S@kLNV^onr37p#kf!EZ=C&6D>D_NTpg0=hYu7P zQ9-u9o$vTC=7!tNfPwhiwGkGZ8^NBtb-Ei7iu;a;C2}bD2ua!KNyA2)V4$@TTjV;D zwUo3p;k0I{-JXG)@X@WMLBg@sZcm8RgmkH?NXy$bEU?`6$qZ(SmaLnWDd;`C^aX`2 zcZTRwRpRQVam(kpT_ zTYbglDr?$)EZ?88UcBW**7bxK&PcIR29a@dxl&<)onl$&Z!CEb#Bhmc=Ij`ZA)CAG z#SYI1t6&;TSOmcmSCo=o(A;5=+d?Pf@G9vh;VI@M9X?m0hT-aarI0wsmOyveqAFrF zN!Lba=s3)amjP)3mGa%fO7oGE5SdT2G*waGrQ$?}-c?DvmMHE*4o( z{ys*fL&w%B@rbm;KZ9?huYPYd-pPN|Op9yY{b>U5x`11le&}_OGtHw(am#3{r*z!K zlNaHS;IW?d8{-Yk#-&uSQasu+n`)Ha{acxjSrq7VEjnM9>OfJLHfyJ(V_LQ(aGGCX zY;wYQcO8gPgrQvG3F5daaG22E1nC*v<+T6@hv8Gtj1ch0d8=<&Hi<2ZUcz2A)xBnE zNoD5JV#55s{_QiozR2+$QC~AcyGmC9*%I-~L-segFW@+i4-5H%y{;cE%p!021iA(X zAx6UN%)G^=v40Cp&obI6G4uYA?A7IwUFK_0DF{BTm!6_k3!P7F|AI)&OdwD4tk(mQ1ns=xZ*;{dla_}3S=+1S1tYUY60r;k#iQm} z`ahN@;)bhps8Ic^iv?biR-4=0$-o0bZaZ5Whd#48xz>*qLA_8yr&Q+fxF_KIekuHk zZ8TXD$sO$}u#Ql1wZqXiTrrcvy`JO7dkg%UVj%3ir%anhSEV}2bgU9jc!t3)42j1l z^0*S)dBM^sCfCvN=oPPMtozrjkiNFI_#BnI8?lMb-Q$qRUI8D_T|$As2y-T|;D2Ic zW!>-+zB4D@&_>~$CqhC_ng%xc3)R>?+_pD2Cy%){e}&NS8ZoPwq>WhRo=$Jwf8txQ zr(MNBywW7G;p-pIqc%}weyMFbfw-7KiHtG9toZUF30mR;hEQlC%Vv}MQ%;|rgg_Owr1bPQo7$L^K~k5FbfE80tiuPyzLu9Bp;TkS?oEsp7c8n8%RS8Bd> z%+xDzpehT?r6n$HH}9Apk|moftfWXm*Oq#j?KVGzb5~Kh&f(7zNt^f}O$lYf-{qM5 z0=jxJ69}AKEpH9{`NMIJ(}EpuC+!*^U<8udzMp&!UHBFA)X_f@`8r`#o=N9+^4P=R zuqaB^>uSx2t}*+>=zyYibsCV`jcJQ%K3>{z1P)n}ZY^Rf6_KkAw0(()FqAKpEFNhS zY7k8E69sqK;{LfvqP5rZFQ14OcwkhQ%Plm7^YJx(caG)Cda>Z=p!57K0FdGrVo`2Zr||J z1-ulKH;tN`hRlqNZeZfp5~(>+-`3UeldR(L(PBfhmqewdC}2i3-{Dw!V^vt@L=jynMl60J|0Cn1>8iU(NUKByAx z_)*%tdxt!m67>LIIkvG=?EP?(I#t>H6+Ej_U{Zd5K2;%6ZVOJI42563q%*NvtSQ6m zdQx^d-}1dL9_70-UECE#l-+3*-2Ihn>s!EI=x^&hVQa%Q6)@Y2D4#FpT*Fo5P>OZ6 zmW-i>vlXLq^6gG>`77>n8Ex+ZT{tbCA0&x%(^-oo=x66|`N`bF1R-JA+cO))(Db>O zhf&7DUOd8R4THCprb$fKqYKNxgOpp{eB+D0)_$+zoceG5h-JT>pO;?g?Cv@O%Wiy%f->M z?0Ed}d5ApP>i7>XjVo z5rg+TbkfU0^R}F}TiOz`SUUf0LiRklqznDGk`r%$u%dW|C~b~^IV;7!cVxEaYcxS; z(Ae7h$|@r3L$-E5s7OU@mKz(M`*GB&@c7hmdkQp7QebQrHN3S?>wkN|tham1g+H?s zi}lkmgf~8|taY8LhvelS}!?RplbL;e*t@E9~98^4RnzRw?dWX(Xk@K9ecd*CSovBZ;@U zj&}c%2z`%G5!7K_O7GDtkiZAk$GZIe5rn2MXjzQ9X@s-T-J&uBnu{*bNN>gio&(>~ zbG-5PX&n4Y14ffUN@>UnHBdXX&<(dsXC~8Tf7Nt{eOPv7cJ3^1$s^&d|>kxn0x!=ZiBXF)2x&`ncRXw^HA) z2XEyVFl7}2U+=1oWv?50M8Q8ef3rG29rDHF^5p5S&XNCUy?%1;BzbOmy_DB9m~rUS z5<1wQa|M0+KG?CsaN@cKvjDT>I_IDlc0i;7qpH2#x_+pdyyK2pAUQyYFq}YV@{Yq=Xj_AS}3V$l^;E}O3JDm(gM^6ztZ_0>Q7XV#ir2ltOsckAwq!pRA1|F`4#0esLpU(OGJp{_f<(w1 zUy@MnhbliAX(I@9$CcCM0oCb$xokpLgx9ZIK&4t8w^p{u{qN#rN60VEpCFH2H&M%; zBF}zpj_rH*fy%SrzqrL)02IKE+UQ@i`J?u0?_s|knh$tcG>sQR7_&&dMLhh5mIym* z_0<&>+L0x)c&p~G9fWblOJ&pDw$@gQ46t7j`?{d$?p6k8tA=1to-ioh8=I!uya~M) zEMWL&OIfXagqNxvO`Uj#;aP+QVPlTkz_@$h{StXyy$oK~nj+1w)L#L}B-|+b{kGPP zVG;7-Z}z=nnS4Y9^G7%irrtbf>OeGxJ&)K648x3}ENi1$`0P2;+1@7AP2L1w7>JE> z|2e-QnG;hGN+I0v>zepw~@_QSwyk1yv^F=HQBqjE1-=2+z|Ky6$)&Duvq(o zJ>+08!sq(~dva(#eG7eX?9XC-AM7yCA_%4luws;x6JA(WA^&<`ofCa8C=lolXNF^{ z8k*ZoP%`|wNc-c__Y38DHG+6$qzjZ{5nB}fg7ww*?JH#80D}gI?pCSy$aB!*n(|f^ z#!cplq7d1`>9LPWZ4X9<-pd-G^IE%4emEQS!3u2)bjxq9}JcZufM&=E6=RfQa^u7N2Lr%WFv8OePwUfLb(&W6A~=r@}D>S{H#>sxK(ROqO_neCM7)nTZV zd*3NCSsABR3UtTZ9{L0&SW(|$eaOCW$gjV>Sz!DAF}Tc@uQ9PwmOjVOg_-b z`js5rsdBSLmK4-k|5GQ1{MqA>kq{h%I+b^9!27_05`9;-w%UGOd9%tK4lVcI3v!L; z-&8usK)1H(b!d?Hhs>sJ)Dwf>qb={4I8KAGqrx;j@0|THKhShIGi7z{CLh_Nf_?IC z*EX`DYp@QWjchKAY~g*-zF--c9MhrsH_KAxSFQ%%+gTtV2kN2uv{$=T3aV8{Y;6?p z_&b$FE#5XVY!Z&a{kJy?Y}yaT7U`MKy0(NPDV33_rI;_+SeYj5%aKa+2pL17nJl78reF+DU=(0P+)kVXOI7zxn!t?4TJ&$5yGn zL?2SF*B_l$UlvdycN&`8VmJw&2oESkpI zzfXQrriN^Z(Uxy~0_YQG{_VBi2G!l|_ZDmtG@`yZ@jh?tD&XzV4S^$65YyJ(#^WEA z$vy8BZev*NDo_{@ApK1z&@udtQO9o@9L!uW4Mq@_H&F_NF(G+mr5}m&K|1=&TB+ZN z53=%`&5Pid_b$A9z~;TFpg`zR2kJsv3`(VC%ZDY!)Qh~x4#M=y^R9d4uwusAr8iJW zl)>{}RL(0uP^>)%$cJ`X8|e=%lov?zAeLZswK4E_a2vTsJ-jkK1o!36g0fGXmM&j9 zZdBmP-o>SVU!r}i?a-$2K9AS3zIDo&z}Mozn_SDhOOFOZ)AC-q?j338y>4AYH&WDb3>b;YlM4)))g-}xNhXY6aI4^pL;_!<}vGae-7d9wXqxiyuQO0F?o1*S*pj`j))}G5pGk&y5n1P;WM4zW(_Bk&iorYwulQPL^*x><;Kx zc-xC=d67_tGwCbjL@1B?dfRgzJ(}P>5LpjRtN(AOBZKepcPM>uk39Jkc})F~S?t-# zJ!sl{){=Mq)-U_VHx{{$Job4A;86NAqC6VWy!1bw2reI)$zOgOsRQr3r#6xg{oi{V zyXo4$x2r&A{pIq>k{=Z4@LIH=L1&=6Fjze0;!U*V8b(WKgL!$RB@LVOYQGpmhZ=Ff zCu*`V5fjMD&y(98-*3yn5P+{x87A<`^ztXYZ^Qw<`58)te36geE?&Of50uqaH~Y8y zIl#THHtKVH)5cIE4g}}p=WT!M4}N-OdI&BfoPaQ9UIIoB4D0vxKn30GduO~mgd0W- z!V$U(768B#FkVE9w9HSV3wlb+J2U}il)vpe^?&zvkA9^LTcxM@8b=PBMjX`_eWd%FrAZO7dYWB9ZYEJpy> zFj_*J58Yu4r`Rurj9<2r6+ZzZgZRvG{7mnq7M~(H<^0Ia& zt@jCB2%!7=_V)nS{WAPC!OsN4PaAq2`1gYI@!|d5_j7xvjlDm=|Dg<`9O8K{oDFlfLkB0Ov6I`HjB9UL6`6SxcrX9oudhk*)b$T@@sSV76k zGgjrX67oBz?VtH^zzd!`3fqoo(BTX@hp@oIAC}0! z7Zl5b?-$!{+V2F;ncOdMM%>T=L#rfqoofU(CL0zdL$soeE;!8SW-I}ARsiu9Bj z!{mk&MhC9!U7Y`y#dfwITM1Cs$y(O;Pahk&yKnKAS2oLYODk=^B8R~Zjz1 z$h+%mY$HrywTjT%DXVPvZ7Bv;8bG=sl_qc<1mDAX`09xxRVXF}?(SW1jMmd1t9*1$ z!Jr26ajwe8i~C7F?hJnU^ak6;$=Pv(8_2A0oibWR4% Date: Thu, 19 Jan 2017 13:53:08 -0800 Subject: [PATCH 002/108] revise art --- windows/deploy/images/multi-target.png | Bin 37274 -> 37291 bytes 1 file changed, 0 insertions(+), 0 deletions(-) diff --git a/windows/deploy/images/multi-target.png b/windows/deploy/images/multi-target.png index a288129e1d7d4f016d0b3344072e85e619d3ef10..fb6ddd7a2d6ee2e40b8fc9c352282207512a4a71 100644 GIT binary patch literal 37291 zcmZ6y1yEek5-m#bpdq+ha0nLMZE%O+?(Q-;!GgQHyIXK~cemgUgZrP{d*A={epij0 zs#9mn>AkyGueC!J`M3o>QAT7cFv*BUE-;!VNUco<~oRq|cA*v<` zj=>kuWM|h_41P;Oo!!5*khr5GeisKA#flQ1BrjVg)5dg;d;i&og2C2p8@? zrdp*J<7L?|V1<4`ySY(M8^TB-&Tp*wb~JP~CCp;2<`rTvT;S0Q!uM}1ZFqkiIvq@0 zjE&j4lBZj{UUH;*UrwyII9+D$F7QY#dUUq`pW)~)Q|7VzzQ1;J!2Qoc zy#0YU2QZy3MkO$M|L={B6c~S+azvG|kohKc%IhyLfT9DsE2BTkKU;*o658oJ+2= zY;&v2n2G{((U!h1!sbh6(ZQ>}SQuk^dRw%gXTBdb3FOIcSxRXK@;0vZ2A>`vy?R4%f=~jh<3walIaH-GmTrlF^wgeVWmoHmfUMiN6TV$dq zcT4f-8kyRwQ7V%3akc=C!E)-4=L2m!(D=OUcqUHCB#R}$SVEEkLJ@Jv-BV6 zCr9ZHNEef;_3Ttm=ex@q5X zGQ8t>u1LPOJkkfL_P;sy2w zmnAN()fQQZoYc_YS>P7sWhk=q0Zq1+pNNSs1b51_b6s)aRT zm8Nr3k3jC`2wrl^zkNupXZc3QJQ~6I&mBVe;37(BxUOl<=4>>|bl4WpI+)JgBeVUks_R@Z#kg~2GJ^TLmA#Ftvj(X55OJ~! ziJ17EIEFeF+p-(ijLW1qw`_Utm%NBwr<# zjB*qpGDJCsI)z7mNSLrf^TOpDjOVY%?U3-TgcmiciHq|Lo~Mx)E-)zMsvL1hI?U%D z#@E}XyuH0$*l<1_=O~B9Jfh@x&18wHIwKu284`TX8>roZ1rXUdwbd+Dw!j{*QD ze(2!?u+4jQ^6}@b|084QX#p45!+dK+3CN&D*&IuBAgd0J!4rpJ|>0rd?n zjUI$iGMG&Pud85tK?G{=PO0-8jh?3^r8(TLj$vL;{q6ttVMxHwBM`yxAFM>1Z0;Xg zliBgOoNY$d-|gb?FZF0fyc3>YzGlTzenrPMwUQ)*>+_7=Sr2gXPQg>t4Abbz7pB!*o2)Tgu6+HIBCn3`&>CxzwJjBxu4vfD!u9oe`1~17X9g|LburE z9m*I;)9CmVV5{Vsu~#@W9M;RdqB&y@z*Bf{ zhSFDtS?T8!i5E2&nOmGuG%)4t9d=Me0}Y1^e65b)qv6>MRLlmg4dqa{e>m^X(s$r? zqM)F>AsQ>@j_xmr-PI}V|8Vrm#ly&H?AXWT*Y?_qDgJXXp)L9dLSGcIj z5obirvvWCXhhh9=PbY#`jo5tiCnnw2v|o8zB4mnbR{0_AAX^_H7u^U_#D)vmtWgfe z>()2_Y3kRm4=LQ2IT&hb(Apf~e@k`zJ8zl;Ro}H$?lTlRh+@SW;U*Qt3whmg8brc2z}cC z&GrBnzWE|0LwOH)q;6+Z19MtNq1jQS{}}w)1`P?6|1O#q*ATTQf~z&3Z<0eZ6^#_; zIv16pr#7pf>)u}f=0Aky(LiHjwn%%~+tXvP)x)~jy2mmY#F%}nM1ruNdB_6`n=DC; zc|1Z#$xDj=iT8X=od0RC2GJSj8KOnrqxI_uI*DiOwKloHEP22bgbzE5|XgL_(X*!}o%pu~Skc~?S-i;u+H)Sr}yBw}89G zdo}8G9Q7QGDe)AC1SzCe3!JOMK4}I_ZI+9a@KwBqe;WJVE-@to5l~lQ^b4-&S3|!4 zO%%J!6fP*Lm5oYEAj@8G)bZYf=kj!IWwCAFQ)3@RLszol9WJM%Ev%SaQ%Q9#$k?qn zWcb@`?lghIp&k4HbThN^exSf{;`q)gM`=7X=6>fGst#J~>B;r&i6V*iR>^~%zTZv% zWx^>Qz^z;X{CzDt<;O9(7_YiapfRH8*gjf!8ck$Smw|gkAmc84fgUPyMw-tOpSO1} zFVFtO&C50jyO3R7cbg(v3Yvx+NU~M;O3-$cX!6=w*5=YPVRt+UEVXd_J8$6XQ!xtf z{CO5xgjRJ<4=5Vtb@1D|MZG%y-LL%{O@$@z7+R12MPH*(8g-)SM|DLB6HtDmpH!`! zpiAM@p*@LMPeAjon}F@z96v7^Ck%F?zP(CSE<4q>9EyHf!KRL{L5AO*5xZP2;sk)o zgQN?+W~l$L<@0cB;%6a_5*~Y*&83M#oK26osD__Arz-XBd>x8)p=R`lKV)q$0j|G) zH9T}g*+>1N^D> zJQEX<83vd6$d1Tj3q^(~#?<6T<7v1)*C|E*T}ntbD|dJdzZn{X$F#L^5A(nEYh#8z zO}mZ$^>QCl^TbBm&+jHv)iK3LkX(LA&R{%%Opc{lJoa{U~w=C}J9gsiXHymxzj1+C>n``n3bq!s0 zvyJL01_oA*@&1rvmEf-Cs#TC+$TSovpdOHp)=>0E@%?r5C-5Ym1-BUG^kEW*T)fOk zdY}mh1b>I#L@E6W~!Ljy>mGwi=;h171$U zl2iCtK|_;Rm1_QZUO+vA&JpVj`Fq4HvtvK zH))C}(P*jb>=(P9mk&{zx4Mcw!kE{!Ud@yf60?Hc`b|4`meg>uMfZIiNa6RyMoM&`?r znK|AE$1fxWGv2zf`2Z+ipi8-z)@jI9%l!prU2VlkU~1ruj+G?0&h01QZ%A^)-a^)}Qu&t>Mgkocia*#)$X z_c|6Rr(bnGOHc`~U|d!p@A5H?Z|`Ut-P_i&!(8^pQOB{$scqDW%tc$AyXIKH?ecKV zZ*Qs-elN7>x}UZTFUaJe5}Exu7z930OjfvM{xGeq4r30{9 z@M($$RU3(<;S?P%vvqPrx-Q`NX5xot)pMC(=k+vR%iTUh+}EwQaRtX~!ZT+!sbd5e z`y*t}euYzuRQOhe(|J#KCsj-W!+w-(`z#67SUkeoQ9iB_#X%;~c`v&&k-KgpEp~}zm5B^3H7p)InRadp0&TcMCm}|QIdiX3jwD;W=I_+o2#pF0CW;}VXw^(-CP|J zbBIS6%KNs@6&cSVWlu}30Ro+Vzct<9hv{v|FMUQwD<;|-)JvCLM|N zlmXQhHq&Odrxq(WcUQ<7AjH-)FjA~p(_hEl^?!5ccchZZ1bARCCb~<*Jk`&Zt2Uvl zLhZ8tm1!cY|7EfvpS^C*^#nrT%1*{IT2k9vlBzEf8q9~ovP0fW#5Lm%dZjcT7`a9J zOna%dugHcH+x+f?RZ$+>IDm|$VU)xV%r|=7MBQt$Grs%QH!`GW8$g6}3ovK#vd(is zBdpYft0s!b<*|(8s5-x2YFgF^eznhHHvjl3PHg=k$|uCdk<76wA3Pe99ncq5BaYN) z!*kpOBZ?Y7Z6Y2>$HS!=MUYJf7cHrDa0?9?jIVF$Zqxnc8X2dm$DIjxgvk^~4|aeR z;wNwswyZu*K;MslDlio{A431tDr!7do;b+{Znqb{Ent0qSA(Hd59M=zMv8lc`VX~Q)^i$l1YA~L;er{U!=ku^!NO~@-EsMX1-7X-7Pk0Cf%%YJb6Q<>7skI~5Y$@J&?4P6fV7}UZa-V(Rq?<3zdtLjrQo7^HALD|3yJ>%C+w=ZavF-k1 z-w|9u*k^V79v}YEDr)O(; zIQYJUe`@tfM6@95VmxC9dIW7dI0`YD>is$)d?=D6H)#Qp(s zPmv&2QJg0dEHw_>yB&?#JKGJVQVNhVe|f?|YX58p6^{B*Hr#^H?gQ6B-5^KykX@z7~iJi;c9+&s-&F1gg) zfU6vfO!Vc?`GOZ4&d*Wo3q6bMitlehFKT0V4;2a3ynj}4Jk)SP>ac%utUTQIUkrV7 zZ#-t1bdRu0SHwOcK&oPG`PFoTtWR7Zqmm07HfF_59t(wwQ!)=Dl0^Qc23+S^X7n?d zHCWqaZu7Pf>R5k2`HBA$^xFPnQyo49_jf$mh0ouB2q{!3i+S$$!m4P5af+Dnnih4$ zuICvqy*7%z!a}gKX+%r>P^rna`G^@N=q6dh8Ld<82IQ{sb6} zb>gbwY4=v5VOV9cA5{192rH~!06Xkm1=mxujsoj zhwQGR568e4JRdhWG-3V#-Da?ZLcoC{y@NHIhUFl;IvsYruavu)`d9-e|QC;O+6ZGgg;tB zCdP)1Xem|9IMu~?zXbkJH#g5Xj-eo(a>WRKFBO9kEdTnE>~$6osmSa?fPqXpcIiot zb6^8arXDPrO8RIAyoQ`q#AgVQm^v6uk~zFXEcfHsMTnZyPB9sb2fa01j3-h|P+H@h z3K@UdjldQ6@;QmI#?9KXG5K1<1(oAtkhx34zp1oVe#rer5T7jLtq=PQoE1Q!a!zKc zTt8yeiZ6XboHhK$R_Y%(7sMMLiqgEF4AIqs3Osc4{wnm)>GFw?iMHk^#qJvarnV7F zMq#=&E+tz6j#)(eKG%2&eTik0Mgm-vT!JYB)YCId#_MZpylb@2MD91P~FU3;pPG)XAbmb(BX#LzByQQb$mOK_)udqp{4b7@XNkRdBSv8(>C%12cun12qAWw4aX$OFMq&_3jbmUyeissCoNG_QyJs|mrP#NiyxY^88=I^Et&C-y%K3YpD=enwZaUAaiQ$>dXD<9j3 zhmp+=gTr5ppM~=OTBnjPvV=DZJ?X9>mZ=;zG%xpVV-uuUpf91|rdxx!=hgd|26o=; z1DcmCyb=!K;fh7X(PRs(k~AGr^MLOsQsp-*&k=N}Q?aR)df?X=qc@gkFOP*^+R=?eE&r znx5|l^F}8t0Z7j~jL|bX4a0c`g93!0_f`bpUY`=sK_jTWreWOFy{`9;krAgl3z-#? z`x^tl)cY046zD0NC|1?!;h6Qhmr)Dqs~;T2md7iHB;9Oh_>km{mr%8kt*`8Vi&Va` zHW-xTayaM+`t_2g$!!c|&UL!mREY_~bAJET`cB!!#MOJUb%{0Nd0K9L-kdIv#~?7x zlF7+1v54+rm&pOhuh+pCMjq6EEPpoggViH0(XZ87y&BvFj3&zyP!!8NK(~Q6rtScn zje@$t=yC(mnxqw|OYD_t^oY3ZlAb^U3dh@R&&^dc=V-{;m%3Rjs7ruoZMt6=%c-iq zKL|VN=dd*G5TfeE*{Ss?31e9d+vfpS`BO4qn z1sPUVtj7Ig<11mY=Nbf7Rg6e&L6GpFpI00}h?rmL-Q7>=v?6-k`5y`g#g-S9(b>BG z)m}{+E0d^zB+fYD>`umcGUH*Y(dA-`2|px+OqBIwsCmzTT6;l}oPZAI*_LZK;UDqwYqS@IAJmw#li%; zRbt0=$}u!6BV$SPg=Utt2U(17mtma?b`387uW&~8V|DpYX~A(J`vzD`GrxO7b_Zkr~s1ntTLs%2@)fQCf$fG0Z?9 z+8(w*GN#rN%-cwvF!~LND564A!@+S5s(ixy2ASM=orZO}$g-flHLn*-Y>4D9u4oq1 z>yf32CrxKHtz|-_333tsG&662nX;~jBmgyBm5N6<^Tk!8u5oh}>KdPxH8zp{%T=`% z+ z9ad4Kjd^DSni>jIcjoVp1oG%eyQA<%4_MfZ*=|ROpZx z%yBU*_%x<>>d!209A%Ts+c(eJTjE*h5eeT2Zr+}_-dBA%mJn2U%$I*bRxnh1=d(bmhHrs_2G> z%c}AdXLtV(FHofN(|NML(;ogU4%BgJco%zGae8ZVa)wxRd)KDcR^-5R>iT|PwNXv% zK_4S_+sPI0to#1wb@ch~oHu4NcY{aYRr;!{9M)7(2?#uTiJ0f_VXsQA)R#4BdDw(H z-4@+}SI@_w?Zcw6t*R7yv+>aye&752zOfZ8zZv({K4P`i%lM+=RI@)+LT=FbAH9#4 zmGnyTwdHO4IlDIxl?mnVE!tHrRxMu7lO|0Y{{Yc66g#30&=(=%)R3jeCRsl2W8;VP zMXN`d*Gt0;d->Z`wRJ7-+wgUV!SEFlQd!~C9o8{7HRA}a0GJZrfj9&1BTjt^zf4Jo0?RJ96#OUIg_&?JAi7*;e1)>zop8r@ehVmZ$$t>ZAx6fHaDbVb}TXO)s?qP!n7|h{FaK@PpF3M4@zGL4nmj%yx38?wv%1lY*#yGu| zbt>|So}M8eafZPo%ZQ$F(U-^Dp}2FzgZrL(PrRWTD!*8f_m}us*efO6OQ9c;@~sZw zlq&dpOd^gDj#cOD!S+Mek0@7|VY@wR--G~%_$HrU zFJA^6hti)6*Zh#a)O-QJA+D_c!m<2)Huw;jVvo-_poGWcdHH^osgZ5X^m=((v<3vT z!MQoUY zyupdSY$xsdRetKazS0EVXgNWe!QuxGdO9Bom*g(mbRFn(%tGh{p4+uygCM;=2Ec^TpJ!XgxOze+EpM1m(t*gb)g#RJY^$Iv= z{xYfWAhCf}0!~_OF2K5FhU^~vMIKI0&a>||Q`Xdttn;uioi|6CPj5GyJ~b#r9vL!B z%MPo=*dr8hhr_Dk2mcwz`{jTvI|-JM6!t*GIyBdz-#C~r4(W*QEu-XmXrgF3Zti=J zP8qhBjQE@!_WW~=W8UBcAf*k?E7Iu&IIU#1$EQWIDbbN&IKjFG1M|OQ9~unE3^tDY zJALPK;FzRO@||1w!kt`i(4?PBWCGU`EKRV-DSNypx2i;ZPYS05_kxoX3BzmWJuxmG zgIs`j4cC%?9fu7(PSTK`CZ@80K7D_qiF5E+|LbsYA)gS;O1N(6I`6j@9CzR7_78l) zWr2-);rFMXKL1KN|4anzrfDKwc?CscVRzg06458Yi`|(2bJ@-9e-jtfwQOS?_;8HX z?(!eq#1YSb+}_;6D%ljPeIY=;dAstz&)WLWL=RNNhB|haeB=8HhDYCUfu)&<X7l(YPQ)M8K(5#v*+&5AwDlarF( znR8wTZ1c%_&slpJ+(j!32m27KZOhq4uW+%s+dJ|uskQH zr%+oS;wdaPR7;cD0(u7%>1JDc>PnRIUP_d;0n;g=N~9fC4MIwP$xPI}3L20NS_a4( zLLz13#!&EyIP1->k9m@%M4Z~r6{eSGzYobtCRS%9VE;L(slM(P9{~LYjgsy*=;vUn zuz#i(AY(I?VCdG~ny2I-77#9ql0e9Cz>#?DF*+@%YLV>?DMA0VE$^ZCI4&2O)Fd>T zZC&{I0M^&|*hK4VA>Epn@U_;6zH@a6el>(Gh6wpm0$ls@@SQnJE-i_YgHV9Q-gN3O zm`tcKt8u|-!yt%Brp6}DApF-Chb^8U&^Fw_S7JWryfIE>{Tf>TEQO6}%B~jk_VIC9 zq<{VR^PD|a2#B;GlM=x#O22brx}g&B(|tbi_t#s?p9)^xB~BdOurn$VTeb`7`5aM# zUQ{%C7=2DGGGU;SYKgx1Eoy!to5dPcz8_QYC9W*788H09 zHcaZLE#$YrMXJbwG)t!;3N52r62ik6o!l*>0@)`P!%Q{6oSkCq4tu4$FVtn7fSI>0ST1#s_?;jBkwK>Vt%)aDtR1^X7-U zQzTvy;mdiNlkMVRH{hs3-ktg9-RO91Xqnz^#);bE+s&QKmD{bdn0I=Gf(|r33YKoa zpwY(MO8!?0n(woa6p42XpqV1g(3z$cVzXgGhx4w2>s502{HfRbET1|lv}u}-hQ z_fZVoGzp8_J=uJXLI`DP58*lfX4*|@GX9$)`{Es|1V(d4`$LBj3#V%*d!SXUmSg{g z!5{CCJw>5ZRX%xmedmV%u%js|}JM5HCe*UX3o_@T#0Y zbebj~qOYoAM+Kcl&F__~dG$~fyJXa*#F4mPl&60U?S|CURECQ{l$G1v(IuqTREOV& zGu7l`xvYheVo#(|oiv=C^8Uh~!$be=#k$e5@WBq6&brNf3 zqM;$!VX^m_b3?<;^27{UWBA4*sm-&XD!)3};jm<1T{cy4y+Ine7g80WO+2utn+`u2 zmkwMRM#)&Ie{`3wJckf+reymrMY-SK0>c6K1U%^l` z)~eW>c1pp(rMrl^H1Z3XtuD7=#u(zq$JyVyH?q87zy2@JONr?Ftww-RaM@*i7zD!y zt5i07GPRI`TZv$}6D;*~Q~m_HSf$-X&x^P_S*BlC$$urNI$Sle22`wjPyATh->zg+ z9XxECMe$j&?ehBN_5Mc@)H8@jv(-1q81~U$Y7v*XzHiQrM8NyxPA?hmE#5f;b>!|kw3B;B*hUk-hDWL5-#^~d7$CAI_?aVJ%>3%?7BGW z2u*bWrH4~#=IpKvP&i)lh-q$dTi9A8(wvCeR9Yw9Y1+A?ke|nabE9Nz878Ah-Kt?7 zXJ=|HS>-m~y8#Wy#R_MjkxL?sPOFoW8zwk603G*vpm@Nn8Rkr}3B`y|H}iIB{A0UY z?h+Y5A;}zIDNy{6=8%y$#PYppM&OdqLoX%J0$8{qvhi!E{R-0j_k~~1-c?t8=fdn7 z4b+1pa&DhL1O>tuFFU3`OY&3oG}6?!4TU=CN}%!CyA)KTJ_ssg%h{_N%f>r&$UDs4YnZqAOdza z-4OQW8Ex2n-p`%zP2K@^jLTwLCka!{I3G^u$>4CLgRFowT{U&+_56yCU_M`br|*Hh zkNSbPyS*K+&yOmLD1jRN&@b%)0IED`0KZb86%Hni1Pc1B$CpQ$1#@HKhn4M}MptkY zV^E!;GTJ7kF9i5nXatGEVLP^Z%a9+)Z^mpC?Yuv8iqCeRA?6u0T?O8uv@5sI+XLpG93b}^OM zWXPPyBkyoppzV(~IN7YMYp>DWR97YK@-_(fy4i8DjGouRkL7y^-yf>y+uS?4Sm6zD zy*>*+2ZrcnEOnK+b^PctK@_udG?UMn0;|HVq#`1(qEg^bxdoSnaIO^%TqoOzEOu9@ zolU&UKM$mmqwoD0DP{T2x+xr{p3swc5JWjBs!4PfFtDgPB#%p}A;~;j#OPP>17{RX6LUeYDHy@%mboX^Rbt7iGI|qGQw5Ip)+x@+d-D(cTlKF4X!#j zhkg>H3+co~$0b8(yGoVb;FA704iqns)S8RCWkXZF_`0*V5_^~Tr>E=8sz~n2HBzH^ z2IZ{XA+2~4(0vf z7{mQn{A-^q?2mFmerK7u@kwc>tg9y|BebEtn3)mBy+GsrQVB_As4z#gTng#zq8*c2 zCjqpozMu_ovqX>e{=M7)XKTz z%Z}k01CU%RhKD?XLns*J^{c2jVsD=gzB75DNgaQJP+CXn8x;kh3{Mdw3u(_!T-<8K zupzUr;cXKy%}nPm-lKO(gGP~ZsRXX;?cNE8xBCmTPrwo+_vEf9bL-jPKKN4$ z|MeZ1Cd71Z-X3>wDPPn=r9-W_b*>nde^s?Qn2xyLim1^e(f~p{LOw~-BfB`8j}Y3% z;aqTm2JY0KKfo846@X3NaJqjyQ+wV14uG3jG$Y5Kj@~n|xJB1V$t1`}HD{)xq8pjB zlGMaH@spF2`(5vKym4b3vs5VADrxyr@1wSm)_ zMP}QWmV}}N^d5Mxn1_u{%I0m6`-#oIoZ}%VR3DeWM>ljhynJ@vwqWZG3~z628s*id z&CU^ZJyccRn^;J!)Aw%lI^V0R*#b5*unX@{yzk70nv%GNfMN90H9Edbj#8(=^H*?4 zi2K~B&)Zoe_}*62OEkV|DZj}}XCG8_Bo)roxqV-lw8VfNojkJg88rP81nPdFIJnMh zAmJ3G6K2Am7>Sccp?D7NIcf}wUYjTPaG{7DWKyQo<0X}zvRy;2ZE08ZdESF9RWv0J zTvJ}@=JI{-$4R`;KMfUnhNE$UHrmI!1L)Ev(oztmk^cA=W$&gXfvj_Df=B~>&UO<# zrcuwjcPt-+7zF5>{@VUYN5@ejNp}iqeI}?7e{7$F5j&Mcv}BRJadcxzrm;4C3+P<= z`uyv&e*&4Ww|9AaL&bVTvt0&@R8-mzdV3Sk*CXFk89ytU3ag{%e84a>tyh4e`U2S& z&^Xe@SvGmLS$-nEFX6JaFI#VejPW}IhtWx!Sp>5WSTUqJI*>(qN3rC{nJJ<``#dAo=!6Us4;D#6B%-Qsu5#RG_- zr%2@{!b3?SuxKd1y(<@xIegKkw}I2>AGz5S!y+QQb+e?(K~yn0ajCm(y#adP!-_zP zXaws6t0sM^Gn>a)vlB)HHfdQrD2Z?Hr>5{3KO01XI*P;hun!}V3oxJN#?o!#z66hR zsLIRYCSv`m3mYeJOE5si87C%Th$@D8887Qn`B!#$4fWC?dztK$WN}+>HCa>n}wG@ zS}1WbXJjIjX%Zedy$UW&Yi$$1!bC!PUJ54ebR^rKx zWrL8GiDs3@4=~>|{@0OCOVXx3(FQEP#WntT_-i^*F1M+nRSM9lPmGM*SNskaA(c?f z|2+wAA*Nu$QiX|_ommHk2$OE=$O$JLUFwHB#~T;mAApRXU|THogE;%lspEb)C;n|1 z^s0$Z1-T(4O-r@l9~wJV>geubk~nLV+FsY*ixjL~coW(eKdz;h_hXDTP1T%$lU5Q_ zFpz+YS(a=yZ9jAXlYKMrnk`6m!VxUrb-e$S3VL64Y`K~6!oN%_d6&7U;apKsB6sUh zHk9t@UW>VrrS)Py(Oo>`fApzsZ)_Dl!Anz}{5F=+{w=kuXwNE zr1#?)*g$ooT-8fCBAvdg@ExSW@69FSd$@xnjz)%Zad<(JpkRJt4UMW_>9&iC$F-VE z_CVpx5o|S;k(ZMOp906_=-JGIu+ySlam`iV4pkDyqxvv9D-&bQ_7PcQ{e1orxgn3Z;GF%;Q-|HrJ#w zeqLkic92OrZ^<)$X3*q@`l@-baob5>K4r0_spT&jl}w2*MowUQ^x-`FXF60{Ky4l2 zIRlHZ2{i11@`(bAu>n{&<1`;*(AD9dhq2f&yo)G3K?IZ@o03^c1>W8ctlT(AG57zI zZnH~e9Bh35c+2U(Jx?!huwHe&B8`8s*PY^LlHSx)qj~61rnWnB8TGH=HTC+{-ds94 z`{YQD!@~oxNk(Q9G|E~H$Q?YyVl(~n4J>&2*;k|())33TI;#&gMpZV@s!?sk8;f;% zt4+Z|<{qvBe0^S#eO4;p7s1@5hHme6x_xdtEn5)Yv_!5EM$QZT?TR@}V~V-;;M39} ziqVT10uF%@oKG|8r{_;5E|vH6&}s2NTX38#&z}bL9+@OB@;>hjS1KjJCXAbzD8Z-1q72U z1bk(o27};q876&*HyC-!BNX`6P^lYE9V_Yi9R<>0mTSU<)gqMCE=^<%wgd%)>8-TC zur#H%F-DYBV^;>(preq1MVpy|;MLN(IqR=VGREQBzL%OnPn}3y3+JVn!zFoK6W+V@ z!{%Xb%+&!}j>UwAVPNa~Ed01bF! zn3VX!J4oOdy1_R82lctP7U<-XXswW`ti6%~nbyC~# zD3PB{Txz?+Pr&Sv#uVJ?=$Ivz1_qW`G>ZJ-vmI4Vs4|Kg-yJ{Nf{K)<(>c{e3mlRz zfYqX-mgy5UPlCWR>it-nKJ(_wJV`^(y?~47F(!7OP zqJqJ_s|1`mfAaXgz4%wy@Ns3klL++S$qCue#8k@&{%VilVS!gb;Ox=_{qc2%Za$wq z(o8Jkd={sZYp@vhmV$U#uBuPE_klfwmQK3twg}*$TpMZ`X*lsTdXkOnA)cxhI|g-P zk^S~@VqChG`7&JfCz+-Q)VDYGR1%CY5i{bbKg9Y-^byNDI_vxPDD z`hS5mX^aFta3GA|P$Eel#jF7+J(rfSmsWGU^JGQ0lCYX3IyxiTGgLz7hs>2Eqm=Eu z!P(*gh1Q8p5$(n&XY?vMn>r1a+8ISt`xlke zg!VLWB{w+1(%eX8RE-!=QZrcCo;u-7lSy=t-Ql+GSv5T0U(Rs z=zOh#2I3<+(*dFp{3qnf?K`Imx>D9lY;x0ohe^=SfacvjkEf?klrg!U311#~pCm(d z(tjAHWZjI80w2Esikq=@uQQmd&#q2+EJ<{3mndkR%PU2kgl${@$*C4Men9ck~1b;t?A=wDsouX1cGPLoYA?67b%09?vA0Es01FitE9TUvYPjftN! zPa}7J#*#*RA6@^YcbRo?jOaAbXZX|(iRuc<%gQ-(IEmqHD;Qt=`>K$M@BR>oyW)6h zMm2(Ixz~+8&2`+e#G$@}CLk~wo6H_5){R>XCy>i{TsFW&NdoPqdk>7RWAq8LoPA~!fT2Kg2=ccs-JDv6hRhw^5jGvOOLkCnz>Rr zT`at5K+rFc8I>@Sf#VFR#({&f+NfwpsIK4633HDAJ-a&`6GW`WYJWmOpP#?@3J)yJ z(Fs(0=QPh*D+mR)w>Ca*Kab18aR9Ave;tZN1;+`KygK~;_1fMU^?A(0UccarL79zt zQ&r+;4F~q==BiR1K&e9#0kOdbrPzY(Aoi6vB~&n`d$FF;d`DI-<(r!b) z1ZKe|tHCF!ubObg34PG*KQZK=LZYjai}?-Gbjk^MfGJ+b%k-y)zl27ho)+=Vd0NGB z+r9oB;Cde3DXVE`W@0cHCSzng-E25(VkBhoCxR4AK30>z-&?)YR6Fqo9}=!$D51=L z@mnB-h1iyN#+}(SqAVPy2r(YR3_(qvGc8ziIa=c||0Se?ZB!7C&Gs2UoRWnc?Xr9( z6U@xSnilGMDuo|$IU~fWenjt{p87WZ&Exkj-SgYt@n%Y6Y?-I3tVfL@2^7=h**JR+ z0sC=Di;fRy-s5S14u3yi7Mh4`|23d)uN`WRzHZWqp+nZ-YS1v)R9v?P%d1DdQQ6Em zW&F>{Fu~~t)cn@e7#%^AL|X$*^vjb2?vtMrG)~x+Y9gDDj)pH9E;RgssB-NjuNz^T zb&28?A>UTJ+}p!KJYa-z5}%603g-LtAfHyyL&FZAo43JMiWuP|GD!va^k2mq1r@^x z?8^jUHW^2HPM+fGUTo07>NJ{W5egfUx#(S4;Y=$O$~3l9cZn#bJ&ohzqp_8F`&1&# zU8X2L(E)IT&)`f*vr&5?)Cof zXHX_9ApP3o{tU_c*aD0BhzyI75%zakbi2+I6Qo6XNs9WLb#m#b0#ZdmRiLRN{Wy+^ zE3VEU^*{&mVp^}C2?Tq{#{!N;`76G(3A|A)9mP6tk3j$f&HkhnIHNiEx_? zO;%2WCMo_$_+HnaplW!g1N?G6<|uaehRmYb`c8TS?8jM}PT#2*ALCa_I_L0^vJM&h zBX_00#d1%krx>zYn??NQ;5YjtVo}MlykcPfNteFVCb60*-Sjkc!>gB?ZC=S{czVXD zV_P)vglAASWESTY1Ied1oRNVhG4?nV^de1Z$&Xvs$GUIEeoUf`RZ(5H4Xf|?r3dX7 zDytK^v78{P1Jg^qfv~85s4iMr<_7Bjq3W%o;%M5oZJY!R5MXe3cXtc!?!he(d~hcOcXtc!KDfKPySw{8 z_w#Oi>#xmOy}EmK&(u_1bsk5RyugWOz#mYI0_=_>gZCGhH~A?PD|XmvDy@@K4c@6zkY>$7WI$rNr!70MxE z2IaMz#W_xpha9|^Ip+NC`n=MMx0kn?tVK}K(Ztl)YLIttQJzyZ_dsbxuF*<`#80`d zn?GW_l~bjk-C<;HrH;DL0X#hB<<>*aw}~dSV(SwuWA}O?%I(HdtqWV03T9moXkZ4|l<3%p&_@2plk>_JxD?>0Pyud|{KN80o30NI&ss zWqUwn=6lFk6`bZ}Jl%6U8M!Vyjz|X_SfVndfRn%2JuV{+wk4og{JP)e5={8{*6R!uV|g`qkjuVu z@P<91kvG5pJ&sF{{l{urmhtu~;rLJ?+hB(^`i8v0OtE=%Crqf*7z5&toE-rGuV#xE z(&aJqG@~ZpOj_3NH97>^np*E++X`DMytzdorillON|QA!3C{(PxaX3^7L650z3*Ud zc6i()zxAVLF~-?k>M()}YZc(aeZzm5PSaEbC4L9oMAwFfxfLDLkt=sH=2lbN_SBrf z7+QlmU(^Lb{qOFul0RPbhyZ^9SsytDT>@VeTj_*X6CS>w{Pg+cCid^hzZl7wMIp9cR~5_uG&tkP4uN{Dw2#5QX84Y>&?|eY#+jA*=0OH$&=- zeRP2mxpSgOxkgO|6IFS-$KmZB5J_Mrxjg?^nOybm7U}gG%i$P^>+J^8CbqKP!y!2R zOwve*r(zDHM~g)$^hT*dGLXlS4Yb|S6E*UZX9kEzcA*^jqL$a}dG~hrZjlKM3_>j^ zB6dKxbip9OVQJ1aj+|Fvr-6jwShM;!^$Qq4Wv3YV$t-?D!~+Ph*pU0Zjb47K9yO)f zZDnP{BJy=i?(4>zkSZi6>?DJygcfLeN8B7aP68^TsKA%+!lWI_CiMj3tW!+NhVCaD zO^D-HPanIddw3(!*=-hu@~&itM@X&adBh6%r=RT}yrS-c0=%ynlrBe4~x7>@K;!p&?Dkjm=&EJvd&a)`edjrkrH$b~H=j|2cS2CGeK`_xa& zAmI4oi3)?BWE-;lt{nh=-w0qthIm+4!fE&W8UZyd2f^L5yR&3>f6mxHAcDH@cCawF zVqbQ&qk?L$y;7oZj8J`d3P%$Ty%6Z zMsLV4?N$Jf_JG?Ej61^0<5R)-zz>hf>m-blii&A_Zem#gt4@A4sR6T+ zK<&e8?nO}Qh%~2-!nl~OV3*Sk$Qa3wVw3is&^`J$TMnBCHusj(h&c8r=xc6Wd3)`= z&9bn<&lGu4VgWlvyt+hee&4+ywe&v{O^o;K&v}!DW1JHMjt&5ospJWFBP=I4ve}>V z_Bl?|;Z$KInonG-h$H%N3=+2P>}YO z*9*=jUr^C36j6bQ>}(4OVfF?%Ao%V;`iXF5G2Yo0NDm80j}ZCX%M?2VCP%f>3qfO< zzc}7!IZ8_Frj3wh`vzUy+yk9I`&c^C2m2*}0#Nj(vO1>U_o=$N%k6|yq179CSy+0q z@@xGY$$d#phgv9Lv(|X*2AC6nPiqKuRu+g|oTX}|g|6#JAy+@7GECOg&O`u&WP<(0 z#O=g&0>(0#$AYjt!6mo2YjjLZ6EsdZW>&K#Pjt0!*_A++^$cyzwM*?h&;+x#ww^uo z16mUOK`6SB4nw$u0VkI(>zspbhM@%+Mq3F1IPRZB|n`U61B|j>egS(VKZZSiocb^KY;*4zVpX^WnizaWo)TTmslv zba#7Wyk zZHZXzeuVb%z+mhQ^&=B?(+~7rWrfsO^B&}?49rn)#U#``b>|j*e%@t#)~5`w7&dxx z@0&h=w%(L22=cOaV5vC*kjla;4R)l+hm;tnU=cCQI_=uoPH-s_*ai5Qp}Ck2Scj5R z_KiU1$JuIUJKuLG(_aDVy6t(bGBQ{ND;?bQOMZTFke@ zNT*@hnlK4*1hg;ZhkqhyE38;~To%rpbzj4-9j};9wLgx|SXLfbX!&T{5?8M}b+b&i z@~TFix@;l@eC+ijD;N%<>js!d{@Ns$kf{sNGR@c|6vM41D~!Y+^H}HnLkoqze;GlL zjouK{dB&wW>by+WVu~qt5-`v!j)L?ws$<6jMFu*Qp0GS!tL*n5FCVQ@hFgnuURnbu zQgE5#r3#j0z5rZd)XbxPB;cvTdtap3>Ouv2vkwz_Sa4&!o@DW{i7b=pOsINykasRP z?^qlnH<=YrWMvWOv&QWa&nsu}iH<@N`5sQYU}Z}A7)9hFYP0idt{(WU0fwc+HVXJtiVxh6$65+Q^O92#N;|n-uUE)LrBo^-y=4wF3g*rozu8`(iTd>TQ3pK#`nz zN3aYy>a={VU=^@WSz)khWP^OkY&fZwUOH@RC{z}luxD?<_}ktZh1-r&ek___8-l*T zLL%Lj(@&vmQ<1lP@{U%S%}XjGxS>Sj>rP_`CcUg}vdgKjuqF$(wWaLZ5oB@YPVtFx zTcLSvk&9>V3mH^R&Zbdi$GUXuOLRDs7i6phnhemR4+@Re>#o*F<$D*tlg$(Vv;i~@ z8nJ28-yUMsq1SK`A`NWye^=v7%}Gy*x0NK3+a`!a3+;F|W=n!W zzlcm_@u&YYs-*Ro?rpC{!}KzfC}b%y;OvK}DJtw+65GR^Y z!duZQf16niXqv*zqCi1MY-QB6N6%u>SzJw7h&ExBImTGY$Pa;YmVFGDXb+_rF+mI; z`(x60n`@#%k3Ipwewev6gL9Tk?gPS`%BVPpzIlq&cva_W2rg+cl+8_%zHm@r2eK$6 zsx{DXw7zU8ttfg+m|bta|$f#u6{N054E)ueaN&&`oYA{kWPjR~5aqvsKEyWPp=fwiPkJe4!5w0FmeUVML4xV^uNPCH4Hp zl~(*af3sa*DpCd-1$3A_-`^}r6)s4~807vhUS^2I!AwE5fhFwwOFDHL_Ht#Bk1kPg zYS1>3Q`Lo%*YAGL=l0Ef7ugc?WfzBA0Y3U6$q9Hy#xX~adbtcBIF|8*5pjpJ$!Azo zGx0Dtk7zAl~eiG8~&I~K8-R_uHHy@^&!@m ze@=~OyO5iQw$m~@GS6lg;P0}N1pu4Da&C~BkAa~MH7Y}CJpw?u*(7& zCq2tX0I^?Y@D|y?@Py%}5u&k4gu-}Od_EOw-NV51tC2|s2vpnZ#1o@*R-W4k&IJ6% z9>5Iw29?4Q{dC@GDLnK|><_j2Pqomw`XK2VTv`Aj5;K*W;v!^|5wlUwReB|yBMDRa zug1cc1uGz{oqN5W>!EeY;>fEVm&Q1i5`(SLbliYNwICa#iu;oso1G z#FCzJ#G;8;A`(8rG)s&HSp8C|NeYEby{np?oa{;U!Gp+}w7y6!_2QOTMT2{2%XBA% zH*mN1N*G5stMfWR$d8Sxs1NvSNxb>7Ci+*K*ZKKMFb5vV+WeCj32E)~mp^}P^<0pr zqF)u-9{_&8OfSGNO9@p^vo(L!?+=s7Eb$w9p(3favoSN_=;n4HXp4zdgj;foo*ku% zy|Hn)Uj|Qn;^X;119&7hvd_|LZvW=>=`x!j)w`#QTA@yIS)n*^tL!i(=oLj3z5Qi! zIUwgnPv``~opKr)YkJS8^#{O24E<&sBUQrSinEtuiv+1(Db@dp-1<*-k?fc16pOkU z{x``-Bs(rqSRXm}Hp|;(KbsNZAavlLvD@I5MEOn?&JiTvxGYEabMZyT(2*|>{E;)Q zwHBpK(IltLJthEe5s5RHiOf||>#aN{-5y8~;I)L;i&=zUHVwEnC{Y#TvISc9aTvv_E!gg_wjjvE>T>IcM79f`T?^asw_ zc;`5g-Xd9jDRPSDT4}!@O;Efqh1DKooIbtcd?64}@L7VmqP2?Ee@;uPRgvsu>~Wc>d;L80bDM_z%D%zF`)>3s zxyUR^4wZGh&yNa3WZQ9D6V4@E2cF`I@q`#L z*@YBjH5{%O+{b3Tja?g#P@ba4P1|Sdv82?dr>%Z5G*ol8MXbW7?sLvl*3)bi>KBE< z_BqH@W3N7!_Vp*Wt8yh6A-ovQC7PS;{&^#uKW8V5hBGE!D|LY*SV)FgS3ekICq^|t z?b7QpsD+bcNN0AKuN=?Wk|(&U`!~My>d^meI6J4A%=V&td@1KolCZsX z7A|v-K{f_i837$`;)gz&ptXP4&%m#Ns|ug1z!Q0yCmL=BV&vy1$GkS)po3wG&WLUx zY@jor%|9#G_53zCWLRlpEI5{jgsdLYf*QH!Jua*BwvE%xejcGWq6}wC^k>g?Id4gLN9?5k*rwA6_4n^kf%BS^ zQ1p)%VO~L;@?c)S9tIMvjq=Rc%I2(+I0xDAVkE7VA! zKzj$)o_i%J+IwC65qf_KD%$N$#&PfUF%ZD9B7R!-S=pNVs1r3aQhfH9-26?@T2_{9 zPb|WDX}hs1hX?cypZmTQN^cOg{YE(^^x`cW1MWSB07}Lv>^CE~F?^ zvkUu7PDw@{`o#yN_ltZRvuTZo9X!Ck>y;mu=$Dj!jAv)W4HRaiZ>}PhBu7h1&rw{r z6qK9>zqnn4!0|HvRrx){!Tph=dadX2+w?uK+7xP|Z1+AB77ZfQ|F6H;WW>9dmvR_C z*dIpuUC(U|u(}U#0NM_!G0*r<-^KYcs~a$qD^#PapY4hGJ(f}6y8wyg%Ms4&Oz8y4 zYe+2`Qqb#-2C7O)ff9rwL*a=gpRTE z^4SQPyl>mR6@VN(2cJm(@S!W*-zf_FkEjF+g#|4`qLNuW`~TUDGXQU)Eun~k2Z%cB-V}D zKS~&he^Fgp`emlhGF@-KzSlJ_gM(DuBq*b3fxfGlc077f3#Jl0!38B{2Lu$0_-ga;C1W|; zmf!#jM8NI77bpremkzFO`;zDPCH=7kJMajGX4=K>vglgDp|JS!Z_caR9RaUtqO(GA zztl=l@C20B%KO=?f}i?jr}v8GD(RO0hc z`RjEZr2HS#=Sj5bYg@sMb_DadXOd=RIL{(d8LOD(~ZVN0}`tiKbYg1U*uJ7Y}EnZ?}i>&wih%V*Npe>N{ z3s`S!<@F&*iP1NNI!TDZ&33nC?hW@JLidhFWLut;erag;dd_o(8~3xFW7isY^=vlx zvWrv97RdS}2i2EKn{$lCZ{VSb>$3QNxF90<%IypXlC9i#ba`aG z6q3cRXceJJh!U_P>bkKOt| zcedT^{!-v6!|uG0E?SkgrpgE6~bGzuIPL<)4*U`RF80 zJ;-a)WN&Hx57le64uEh|Lq$F)xk6<_hC*ZvOUSU{9A^qSychybm(N9eJI{ z+UaeWMBz+9j zv_6l?2QNEE4n`vBt+zcLzIg$Gz~H{K;_!=FLu+rRbZ_*`zAvsvgdCA}H>bCQ!_DPS zU8w@$#X>ZRuNwpz;Cp+z5V2ED?~{^BdBZ>Zz7#Q*mO`4n8hR?U@ph>$Ik_$7H`jBQ z&9oQ-^F{54r^h0y!(H8>(PF?n_P_y5|D_7P37(S zZwBHF4el1B#HUAZy4_sYxiN52D72x%BB`(IX>Zc{zK)p=%SNBS7M-zU1+i$M=Amz| zXAu1j{UAc$%EVYctwerECX+kunqKE{b0z@Uyl>hIJGefsmoo>@?IjR;7~`p+HJ;6iygZviiMIsf1Bs$bscQ2|u1+q{+-yuAcnp z=WfUd)Cc+{L(?-(5#?jxB#;DHExm}3{kxG?)|0j6ACA2b*MxV>k{ozlMFZB#Te-LZd;ScYf9WA=N0niJLZRHm1b*Z$(=(#8V}gxd%K5M90C4E zR7gZCscD?hrj|dW6Rw)NOl4yu=cCX;rcW>pmBYy*-W0T}Pb8{aW@1{z)mb?cfDJtT zqIC33HG+syyAuk6u5HVaw@KHr6R4dvFDmmIORUP?86E`x&}Gt#L~>DJbawRrV>tr{ zi-vM{Rrtl^KewIq%cHs!Cvm8D*>-uY0$4A92u4Xqb3D60ui3J_y`Io>pYdDzBBhUn zXn2Nd;%6}!@>wNJuOJT|jO=B==wjOwPvQ6-OlD+~NR={X#Z<5t*29gH4@!(+&%3u> zH|ue1sU^W$BDc@zZ-u@H7yqZ?&(0FiP)N%%XSMZ}=mc1^qceR5@Zj7;(@_p%N8!;( zDJmob!5)u4UpE4Z-3(boicq7c2kvGrRgZSxAJ^vQ%7uEza)iIhPlP3}8MCk|hr#{K zDc4J{`1=CJ!v&h`p3!(|exsF+?d;`DOUHdL3(?tHQ3~o57u7^O&)y=yup-DrqiXW? zsD0ZSV{zQ@Pi57_Tm%~&_j|;oMn3gfMFgwr<(*9pXW11kUMsOMy|@VhRuCQ%%0F$# zhh^s+J*<>#Q%|~8s3wAG6=8NjUx(w0QRJ;bGk1;21g=o^4B(FDR&wb71_&IY;3Pa{ zXqh88v+n%%qviH54Xc7xpXl9<($4)&_oVK@)bFKqQhMtQ<67$#J1dfp5TiFqEPF7JJ zz7;cdIoQ`RH5#luc&RwQ#R1iV8k26 zZSdKCZ!Ma=fG`LAj|x4`X5gDp@AsVs2k5s&w80$kvSSJ^=PLpt*TN7u!y6Vb>xK@a zy383Wp@uR4WYE$edXZvC|LNVSmGxYp2DWU=mU?*C?}F9UI2C8IX_Dk5LlY{O35-RH znwm1|-eoicE?_~j-t+5v!@P>#ENSctA+oie!Eg7db|%*gKSjP(>C0lg&+&QnTAkHP zj6}qZV@R1f1kl;61!-44l*I$R2Il;zRJyB#;LQB;ujyf@`U+*jPi-Z7RBtVMx3Y*g zBe9A;DfZE)GxFo9$H(r06>ml&dC3AgyJ*?O`@%?_BHVnk2%i;WZIO0R(?tC4kW|L3 zp&@s79!@kpJYF>ZI=2HnVa!{cOZs4To z=RJbyo$FG26SK0Dg3eB5;!gu5@@QYRQjZGdW3I7?Y_n$<6_wT6-UiSEoCC~({BTmn z9yQQLJ~63fc%->7Pn$D|YlLo;&Qwge7~Pu;*LxqW*DRtm@i2KYWsSqK{kgHRKxE+< z99cq0w0=#B_JC$Z%x9B`oB*o<&OievuodU$=0W;`T!TKFA7D`VHqwjj4bWSsBJ_E4 zg7v(;YqMVy+>dS+w9P>%8o?g1Y*a2;LFi18>mXX;?XwH}wC!@yD||QL?(B5p3J6; zdE`=)4a4OvY^bmv0)LXVLG0F%+BrS}4 zL5-PiVfXED;NhczRBTZUuTBeI`{AS7V0VD|{=4+@?^2_gyLacI$?O$s)Uwz{y-0#5 zFEi!Lx0~Rf&%+p}rX3w*d!eW+qkGYf1a@+s*HPR=E9O&y4HjIry?Z8Hj}Q~rNJ16E zQZsO-?9VsIya6x^N$jO2qjJA4Jv5*HfPf~K;LQXSy(KUYOM626(5#zq-wxftoJWtP zL^hs|!HC4O7cXLBw7~rDe}2EWEhc2@EDvYibij}R-rQ43f=Z(H5F4e(`^mDr<7xP5 zWRo{pBxnA)7jS3RzbZ6fmA!c#D3yh8eHo|i@7Wsoh$N5a4(BLhpIq>TDeqtuUq`O!xh`A=D^A{w}_b$nS-mh>Nia?OHvkU4wx4H{WrW0SGa#V#{K2AchJ zJU^s=C5a#clh0YM)`f#XBUqF#W&)t^J7ozLF-FYMu#nIXShpggjKtldj8$70d*{cz zc|tISz!7E=T1+#~D2{~12cO_rP)e4;r_k;rpWm#_Ah0!F6`^P-p4<-ZrA_xYvO7Bw za55^R;NXy<#VWu27dYM z?uPhZONTr`;uS!4%KuPjjW~bi=Uz`>ZG#&SA^k6A!21|rrd5yDL#Tz#};A17N1AKQL2r;yIbyQxGbB! zY->jLDT^|ZU`C6#MfS8@MW+8vN*>o-d3Lv9j4V+@-79rk3J+L_%tqo-Za}pXfIZ2v z8w|}Fv1q9ovAM;2f$*&hnjtUbjl{$GICq&-<6X1Nr z*vG+GGAkLMN)K6{JRBP(I!>K}8OftkV^wB?g}!5bzTq!Lc;*mR1BI+4#={bn6am`l z0o45H<_&Er2D(5R^V}4 zp0;eY>m`nrF7sbMNZ-A$Qpjmkf$I3Abr2?#?i13ps{0AY$CSF%x3vMhJT4kVrvLEM zs#xg^%>bA99&HNuR|y&J&nbz}2~mux>16Oo(Q#-p>F8L-7zO5$GOUM1O8Ze*{YMw4 zREId3ByEAGe=2(1l`IKbhMB3d>O`z)w9L`GdODirp5gf*_{=I#&cjhB;=~4u{!N$F zHm=0)x5-#QY@E{MHA*3K*jY$xbi0RXKuG@AeMLfiQH2W}nfkT>&|!i>G_oDIe_;hQ zN9P7Ph-mA1{Rjyb{2DleL@ov4`_Zg7ZE8K%zakDh;5-G^_Xhv;(iKqQ=lv6x+&fC4 z_EIq`IVz_v6IS|9Ng)|Ojsoo^;0V6zpPhZkAFB;{D)#?Bnw32$7-~Kv zAJ5ky)Yr1TBu=2o#bydPnZ_F!yQcN?`TgOJS2ZL6QeD9{p`@c3$$$}75U*0=4~HUb7SfZn>#B>4TRux0aNy9nY`*t298o)Nko4TL<6!-`S1BEcDq*y zBUn=N;CiHIL!@22>*zHp+UhQ80MOG)vzioErTjwPT1mKcXgA}b3uz#z?)v%)uRA0_ z1Uj6*p{rJu906f5D@RYp7_?ec1{a&MAdM24K_uVCSA{MumyaX#9_pX`JIM<8X1j=? zr+gNA`)D#I_Ei;}#WR`))Y?dP=4;0Eg?$psuLHUFA!U6dwDX7n>nWb9P-El>0#P7V zS#9gd5SlfpFwHBdG}Ux#bP!Cva=`Lv?4Ko`+*zs)dE%WE$WMw8?L7yZNDa-W4c4Rm ze)%996ZS)4;wP5IvLOJ5%q!aqUyv!r?~>XcAt*2${vj3#A5@TuYg(L7A;HF%U&cAB z3c;;~hqjzJf^mBJsLL6;i$qTt#wD6cwl{i$L)t~LZ*dR6Ihe9Z<8=fG|5uvfAv4*} zymv{8+Nr0}*YmPW;?bp>8+sXDHj#TQI`sw!0z9W>b}mb5F5P5jimt7h!6}&yMn*XvH>>uFLpZjFE?nya)@eYMSD z4WTV&TM;AFsX?wtPaEqtC!0^?9fjci1&qR|tE?ArQLCsyko^Jr*GUbO3@Q;vmk=9) zrV6@XAgJSNI6*(Y%a@|BJx=1AJbqpWyMRY?2#Ccuan~>+#uDwI`n;8q$#{1lAVTXA zmX=)U?y{mP2|Ce%q|u%qwD4yq5i=3%-0z>ew#7d#ol?Tyr$nJfF|teq^$m{>>YqAL?)VD5HnQ{zD;0CZ`wNorSzPrOad$_2l8^NA7w0xDO29+ zCN{#`z+E5rO+ulOluex-^Q}}iC%F54ILjIe-{;e9z>e=1=BL-{-_o3d z=ly1wuJ8BiiE%lgzq?n>2fl;pu$lVEelPg>A(}moxJ!=0XSBUqE8kvDx znevX8o)iO!M7IAlD6(?~H1iq_rHBzQDvwvj{YK^fs&!|Z6W(n$j468QnQw5RjER6# zF*EgL?8tDY;>gec3_f}4R4L@_+b-9Cs&ezGbeUh#y>CB_t4g#uco(icto*lEiX&V7 zkx!~1t@}2&LVwva46 z=43<$==!^4&PqF1Xe1<$uJl*K?;ikt@d_~IE;U&^x-&lSxLTIp&Rcp@R&F1AOs1On zficHY!RY}@?c_Y*Fb^pX`T0D61$@hA)m6jGkK^SmG4ac-<-7Uq%Rcu5B`dM--zVfg*tkF2+&u>m{5Kiqx-SRY9=&|ie;td7rruP8T`Xgp$ zs_*Ag!HWs(T9;6lcMGGGsdhJ4@WGCUZ%{z})2D|O8IGI8r1~gY^ZnF9bq%SR-D)Fu z*3(prkNf$G5u!rQkH|wsyjV-nKA&J)00EA*cQUIt1Qe-)p|hiH!H4A>)MJ)_u|&`F z7fg^}C&++4+qOjcz_zZkT}s``=&Y}=Z>T0ML~>Uei$qmiqJFsD9y2A!P*u-9cc!zW zvA=SA-m@S#GAH1_?Crz*SB@A118pi@I=l+REk!2#BrXkO|FV7D3OIvrpknteisS|M z^lPm`1ED3o4Qky4VlL`f5~RjpH!d?tEp*8IHD8|!EkPAysU{fXg+U=&&TVkE)NWnW zHJvbPX#OyyX~cJvK?PRdIs|U_;1}W?TE97(*el1?RR$|{$iS?%u-Fn&={88n-_1|7 zOBnJ?{6=0f$b__IvCI+n6X+Sw-_g9%`c2kGNB*cr7Mk4aKDL*kqFv}+Y)*c&nE~l7 zo{DQ|kk$`DO-rD{?#EK5n}7l){79rF?!bm#A}zrz7Isj$flU@NyL(xM$+CB@pl*ib0=C+vh?-LAN{{->qu2>8bQ?u)!<^G zF-WLaJTSIx$UO?T5X2-~%KY6X^i_e6wj`?!tfUV~+KM0(Vvw2F zA6$u^2+DOOu+vB^ zQJ+`Yg=>KOF+w^zHlNBpo3H-`BXbF)|*9K%+Hvg)$953(;eQj zvZ}!kzCHv4$Aiw~W{dOW$0N7b(+aq(E}Uu688tcw`T2VKT(oNuC7rB%vPWzYh{k|? zQwYB>v}%ns(;GVba&RKkHqfkkvP86$ACksmKs@+TM4)>q_@zW~GK_Qdeixa-`kr&y z$hK$8y-aHcO#Ls-Obp$di*}!XVYnJjf&>22PAnu7kdjvo#Wg2j<=38t7F5=OZ`~0w1UddlxR7b>XPLk{;Idg4z}?QA#R43On?Y>*C=xrT z2t)d+NI=_(WJdr4HxSjI{OOZKm1c5m$D*JV87=suxHOPna>la_WfBkqyW#-Nq3nW& z5HNh~=ZKP|Yi~uMj@ZFXYs?uzYR0Th(+aZKRM_;UDl(L@885|dMa^INS;%c@`>dA{ z>^~iCw_pylmg4Vv4f@q?yUMpuCKY|7e43JsWjEc=HE+yVV*X~KNkDT;=Fc0Y3N5Hs zN3RSUP9mMk&_06^xD531P>Bc%wqK0;n3e?WX8(BMFUCDhlCFSdR8J9K3Es;9C>`I|N-;B@HmizsrMQx-2S zf2^zY7iL`XplSqK$DAk~jlXTX<{QO1gb%cL(LfLX+gC(Oi-@1CDZ(C5rxNGQSb7$3 z*wB3~(Uo{iJzM@&;?vxyGZ#=LxX0`2j8=j&i4PP9pzy&UMg zj3sf8+jWt1_aCjMg)#xN-Y}#H$3zfseE_~7%(~H$IpX_K#HYU&XOmGV24=k>y0jb z%GW19xGb(Xy53i5j)Y0?n!^@IVBEu`g^}eA>S=VJ>$y_<&06uv$jBlsM%6j5E8BkE zKGii&I~6!giIQzBTR+X7eZ2aEtXKI{{p-FCF^Oi2_=xv;!2^_j;WtM83+hVU*iL4u zjdTP8pKs^^1-m~~p;>5YWlC|O;*&&A|M}YBfn3Q(WMe1*L;NT6>Vqg&mbV#Z?oO+7 zo+y8=1rSJmzx=8-k8L6F>>mrbiTL)d+|tXT2stoZ5=m9`OTD!s?WW@tyJQL)?G}`_ zN69k6h;F}oI@Phn=k)n@meLv;>D@&^b4Rpyn39fJb)NSk7ru@o;d%&cshuRjd08G; z-N4De{c}HS*9_-u$X)_enCMKhge!Pncg!g^Wmsn3mT^n`{5mR!uT_L;q;vKzC?M4? zP0J~J#Ja)rvcneF@SN8`e^R)QAbg^?JjB4Y9u8ljxUVJ5=H;q0Fk}v;J*{6GVV}{a z@4GLxFlzx8bA=Q^#ZL;US4RGc@l_r{uDNjed?b8Ye%FE1;9W%{!s;5Yb&4&BiP|q5 zVqt7P&o8gEX(b~QH*TP_VDdbNJr&`H;JVd!VmCXLhS}u4o>Y& zNx<}oLuQ8@9NZ(=uCA>9ZZ$C9YWL>A{ThtBUg5H_m=$irtZhCyXAvqU#Mj|pHpSzE z7|R^-I>ot7wJ7YCH&kYV{UqVz7pAg4Z>eb1=DJ3pB-Hv#1KVSJT5)om1+|tBO5{&| z-#>SKRZUY8wOBFy1@(OS>eA+#*9AmK9`~r0ca|KgqnYkHsco1huASOj*m|Xhtn6;g zJA4dyVJ`Jml(7h7V=2EyG+e8CUbu*Pm%#iK|>6UE| z%y!o|@3DcHwj1ggP zzB~^>n6#QetaD``!kr^|`(sKNJi6H*G1qMFTjnuozrdQ3Gk-VHrHJ&hwtk#RUSwH7 zvR-2GP~7%+mRnd>J2;Lo<-ig>2I#ZUZvpD$Vv&81VYAdC8ZSVF5OB4(IbT=X>C^Pr~ zZ^Nw1PT`(AYU57OIwW+X94!8%X$3XupIjGHYgVm{ONL-@k@f50?)wkEy30E$`^cT@ zQDXkju^V1I-Ts0AGAeRi)4oTQTq_v4#15&R{b?Bt(4}ibjANXMEgWtg!TaNQ8+hc| zn5x2!+Rq_>@Z$5~3zS&BqRUNz9DlT^d z{tB7+w9xm5?~sAj7(d$!5mNRfKKR2=!Ft-6PTI$pf{gZ57e7Ys@uE7=x&Cy{Kyb~^(MIy+7C7&JxV8JDz*lYWI)_&TjC zx0pZWd?}l|HOC^KJu}{WTwK)p;U>kf+ex~T{C@oAj$vX2YEbW6_)01>Xx+azYT#)B z598mY8UX(Vk`9O$Q-zLQX9!{QL!GO3g)3lO!7h}#Va_PcrSM)-soYBZlX4`%wWggE zyn`Aqla{7kh`v3OVYay()wawW`x{u?Wc=tSGDf>TRt=pzK3)^KWc+J`<8Xh5Uv#5}1O{yR+DR0CFBKK1 ze7^~}ZoDMDMEbB;jE^rW8rozesEA@5bq`vu#T(nBV0D}~##!hW#nUXMHxuBG_!oCV z`Rp#+J}o{}wvLh|7g66mDfowxzj4Yl*-(&i))c4yFX-c?1gIe?{HPWES4m`|;^hL| zeT@+&8o2}#dbEZ!QZG=MCJBu)c>gjenkIB%C$n=6sc`F0nUF|7tssCdm_sC$H@u@c zCWf{XhdEoEw5#0&dw)iv)i_yFVS)W^W=Q8?O1*yHWuT1htH6gk5OdAJISSW?<>1E+ zp+irH*UXRbjgE#D-5TN_>JK;u1y$2ngZuAmU>d*OB&+v^`Ai@!>6@AIY*xt_^yDMe zT8$vF0{f_IPPS(&HqOK1VmnT^CSj}{;t}qpmEgR!z1RMpa^vB353&pADWGLZGl%RY ze4&;6k}$xq=2A%4^pv-MU|=|M@Nig_YcdY3JW|j4*s;~+j`#Wh0`LtF@^iMZ@C~Ei zKDW`P#U8Il-9w+BBEPw4f;{!bner_a5)AtL!%LfOsyD<1{O3Si!EMP`4*J;1+wTfs zFeAd?t-$Qg2dkfMs7#gh6^OsjQD`U6VD*O+AZiaR1{_mz)^7kvI*!o{fHk8=f zKa4eFy*t(ui&h@EMqUJfZUOu^Xq! zuF+dx*=kWsKLX&tZ=TmB z(L8k5?$843K&>oLdPzuBSv^zky>_ZRqx5vh=p?1pQj>?xs?dDe63%efh|56y-nE5h_;tJA2M>Ym47pINszl`hvQ#-qxmyCNI*W z@biH$LXF2jam>l`$NUa8KnumyE%L+1R!M19y&RaAD0f~tMdj6Wr6GO4pPecv%ouL7 zIqAy8SZ6Wq2Nx7+1BTmT)Q?;{L2kVaex7CPkr7C^_0QIU89^XqjxR}g?uRNr=_w<~bLW*) z+{tW<=RlivUscJuML3l z#Y!*-}~~AK_(cLsBO0 zq5BkJKvp{i?lr+eZN4S zS0jg4M!LXLEaHkHU$DN)K7EDj8(7c)(b-D%{n7Avo|}Fnbzd7Kd3ggu6!tOXC3wMx0~aBqSjsa?Hm}gaPqWa zl9t%}tZ7~obnJr51?{*c+! zjdEhpd$i?kW5#X14+>DpqpOjJgWh_d&$vY^3?D_bhd^7YCBIl%+bdLwJyu@)mV;DaSTFxHU$ z$Vu+w85m3K6hQA8!$R_v2auoW3!4qE`pwrDWCzXAyR}O7CHj!(dhO9+nGxYto-WG(0udS z+Pem9+?fgjgc@a_ETqL?R9dxsm~u&pu&ls(k*~k%2RN7MK2g ziMFxUL#xL7JWikW^^->juI^p1VB>R3%C=ExI}6&J@jDnAC=HmNbKVjO2nEk6@BuAA zZwNAP@G9dTJsJp2%X{U#x8<7m*8O+t)3x`ux4#A*L5I*4c|g~m5#iCZo(eq6qn)m& z2Iu2BFVqRTMtIk2S@B|n%SH~|;os-+x!09q9xbL*uOWNfCl z=;xjW%JZM|cV9l5aiewg7pxN=K1f-mvgKU$r;MY7ry&t3lzcb_W{k3 z7j%STrjE!B+G1zx$aOA<)^TS*xmj%Z#^d@&KK2FI-Lt}+DBn2P70|BmwilK1BAIkI z(pJccP#*R5w&xsrG{JiyG9H>%|8J)wgRk*Bls>pdp8P}}Q$A!CYgTd%n)dFsjNBl*z&J=d{|uKjB}3uM+` zE}tZM>9O0`V!*3eKY_}koG?f{<>3uv$#|kFU37P+qXFFbU&(&-C&qy>FxeKKU9-WPFg1UoT#+T@O5~vuyUa>psA>&N}LS zd{W0yBMk)S_XH87;#*83}HX5YKw-66a%QV@R7RWO4C zPk?w4Dbg}Nj3($VE$`3-lu`b+@6`X^(>2jM}*Z3N2^z&VVP(CR~X z7)&Sxl&mj1f(;lzyFm+G=w5bsX|{b1G((=02g4Af&=k8}^%Se+5xAE;c$a(zzb{|T zK?~H&?z3lgm5q;3`k*e*@U=aOy`nX}ihAKvK6g|ZKP@k#FKN9aa3X-N z^V?qoocEvMrwP6%7=GH&^T59roR1IhcklP@nL74-|GtMZfO3H6d3X#z7(knMzQe%# z-w`Z*AJY2yc9&+y*MgoAbe(hF5jdgfI@f(Z-0$;hFi79i^MPIO$2#s5l+-krz>k3q zzs~-<+fmj1w7tnv&UYPwlL74L8sNN@Cy>TJ=N~@!>Zc7p@58PI(Sx7F``-OM!0ywd zKkGOY;kQS3@1#2fr{z8L1WRXmZJ)+_Mo-s*o)MI$yL-Aj=Yvz653ZLFJFiD~_krO1 z`lF6}3j23>!(qUKSvYvcj5XlXj~X~Q^e1o$5WWr$4i5V}oT28>uV4luGq;%4#!SL* zp1N zAIA|m3>>(wPX`Bw!2)NfISd)tCcrMLHYDJ>J{=q!1`C{_=FqQr_`_oP&w?U(@cklN z4f^fCK8O1R&PW?NpzG5`PaPZ_1_63p@b-}pOXOc~ zl-Z(i4uco04t?fvbBKZ1eQ=$0{G4(Lbnxe4L~5 z@#21xkA1-}p59=~9638}a08k3^^-@*h+%y+)I4Fw8AlmI1?=q?Zrl1eI5_MGPCgDj z>?`@$*48EwZ0hVVG|;Nalk;NajeK;aBE2L}fS2L}g- c0SS@+4^I5ev@Y(K$^ZZW07*qoM6N<$g1-@ve*gdg literal 37274 zcmcG#Wl&sE_wEUS;7-uSU4uh_0158yPH=*|dvJFrSa5fOySqb>(2Z-Ojo!}t{^!oj z{WM=@Rkc-h_t|y!K5MV_JiimEtSE(!LW}|f1A{IjEv^a!^UfLiz5)pW`pmdl_zHc2 zby1ZPg{he)If8zGxBRN`6$Yk09`)JeJ@hlOqqL3-3=GELzXxn8GX?+#CXr1>{HwaB z;aTo`V*?Q6Ex%1}fkq*V*Nu-sb@NXcmoeOMATs;P_VB65Tm4H5$1tz)sBuiez@Gx; zpC69TojhjVAfFHNfOovsHr5VF_o%J+`#JZW?qmV1g=&--|5w0aBnCMk{!fI%B3O>{ zfBJ8rDSr~1?)z_;1ojg-|L>oCm`-qU{BIEcbPUT0`ELxs{NMtT{7)b-VnHg~@caBT#Qop$SbegxyQpjL^!YTjndh+3nE(>jmY58#-S7HI zO%jHXL)nT6yU<^IK%PO{C`Esf$bq=mIL_jrox_U79`tiX@?_g`YC7cEZ=3XNf373Rw!R^RGiW+>9&xMMGM~wsX7V`vHea5 zBkCw%?klf{C$xF?yIr@L%2oDQb%g|C+KdiwGrh*Z@vSJJ%pnlYwv-43i+#6eq5QOB z3b}BL;&KYNbklOFZ0)u?2P2IT;M+0bMzdsDvg38}Sr-x*9EhkF(g$ubWl9OQfbQ5{>!+Z?ZCfWHNh1c8Q#* zoaV4w(&?Pp8!(Bcxjt=&mtWmZsa=D%F9;?=P-W%sO$Mh(lc}}^{bEvNWlEfZlF{MT?&22}&~n%5;((R!pl`OlyAR`b5D+4*RFXf>{6h zte<=lu4BvI5Kos}--Z%J{1ZzBnW8`Rsv~Z~(Y#CJI9*!$3*TgYDFRz^g#^|7ou@w$ zn#oiO#QTlOoX>X`(U+`kv$0gK(p~nJ zC5<`1bTx9W#3QsIb|?Bc%_V}@qfnlnF0UAqvIy;*H~R|sZlaGuEf>nj#?Kr+j5_3R zFuXl&(m_C60MIsS)Y)rPAp&G*0RRlh-!{w7Hd?h^VYj8Q?WB&O?uLYNz7KdhdYBqf z0+7&QDiY-6zpbfs3(5{8fMPmnh|)7D1{P2HrB4{EF>72bbrq8&Mz-_~x(o&t$oa~w z_g|1it-79hIYmMm^mKnulwfLo@IkolGgX_K1t5J1{L1$_lIetj@q{TX(%oJ$Zgx8b ztMjt=R@3^lgnkD0FzP~5bN;byV* zh+P+cEU?zDN=PST#%;tg_qFIGQWf9#t|-O)DD^#`L_k;}szO&DGn7gB0@6!Pxnt<~ z2U1IK{KcW%HZf@(pNQ-8*0Gcx35mB@51}(mNTEdLdvJ&hl8^@xTSWX;S zuy$A&lipbt6ARJt&_)^57?oQ=&GOtQvc{<5VJRJkY=+dC7<>mAK|spIGwRn?5T?GEyf2Q;3K-E!9<5v;!2>es?x>ijsNOiWlDC z*uFF6^4RNyYXn9KrcX#9TCPbp>~upUz=u*L!wG86IH3NJ26GF;!mXY2R9K@yb7bS!8T2Vof@e}IW@7HVZ zN2(Q~(^AaHq7-?&5YSOM z{Bwegl;oH}eGg5ur=+vBylA<}6!Z!cNSkhsj)!bF+)_1sDc0);-Ml0Fx38yT=ndtC zV`x-npLk_7Wn)M*7XiLq4VO+V<->>^osLd~@w_s*KUe6pV0C;2e6mE}$@zbX=5%B5+7 zk=ZCUwk$Jvrda@AE{~>cbG&fCy|c_p2h4d%dC=q9fHSc7*^CER$Xbgi!hrXopJxO( z7L3jVjxOb075XyB&P=QM>bqtJQNDP29h&;p~}qLFOx2oKe}wG=+#1;#KHadvX#Vou~$A4 zvkFvd;c-f-4mmjvlAGg&2wn>4a%kN~c_LpWD}LH)?Mmc7>{!PPJzBg-^|{W2Pzmn7vHrYA-hcoTjX_#66%UdJ?V z52y7OKPh4pbi1zu21B_a)7FsVGN}q`eNzM?Y-W6sKc4*zF5l7#ma>bUH|L#`hX|dN z%FzNG3}Qh+7$)$bUyUQ9$V?L}DcocEMr%w;eySh$xNw2cN+p$={+He&IiyY84c6ru zCTv&rCA&QkFrGDueU99;hKf=)%?>%9Qo)csEF!FDd3{JaPB2|0Ea}P9)3-;s;*kQ4 zOCZMAxfYlgNOOmtjCx?E%ccPo(hU7?qaHhy)&&)?W)r=+Mr5*wTpa~h%I~C zV&xP&=Y5IgkSdO2z#rVK$r)|%bX+Xv=2=7m0x)Y5FN7O3$#k^8ZQekNTuxsx$&Kih zJ~E~9Ey6tZnVu~6TBmO|ebS@+{i{udXf9jdJC_){>hgI%KvQpx?dat~xKqL%eC5Rqr~k*st2opmicnj}*MS8hw)5N)WyfX{9E2mu9 z;3b?Ctkk;Lo6=ZvOyGd?9dx5I7_vzjWcC0R4-<-ECti2)_fN;OvTzlJS^6SmhMHdF1N*vSd!&(VjYV7^cMZ{YmJ@lXHAvB)J#Nr)}y4CiO!GaAP_hd)Keb(v!X_2Vslxo z5q!G`=l~M9Za_OsllZ<)u6^pKJ=oD)BsV6aTy3pmyC1;X3QKP^6@GR~u0AtnPG;@p zm(#J>v}Cs0glh=V*6e9iuz>X(_o(Mh@89a6&ITO$(uD27Q+U97Rh2_yInS13xz=>B zTXRE8@f?-QDd(51L&AU?`1Uh^N!OSo_^K7x1Rk*qI}43G$I3|EGP|YkJEF@&T;Aza z8SuZQU^ZeIp#Jj!-@o90d<*O*h37*0{EhcQZV>#;eeqhHI3l<-h zEFK>|+}GAV6{dn<~lC>AZRPXulUNu8WI;N_8BC#jxlWK$I1>b&De^&+V(FV5OalWr_s2;q|aV%6u zL*+EGpDr`wcm9?&1$sZa@e$ttTSjW-0BL2zbn^CAsc0-`LX9F{13(NJ&L)P~G;miB zNTb8K6lO&vId7@q9&kRY?=oBanQDZ}jS)F-FV?<5+ssTFbT+eP-sX{nQD$e;T+Sm@ z3PO_P0e9wGQ0!aMtmaOEw(|0pCC}*hRU0{%X2mph&C5dS!AD&N_z>>sR?DIFE$Q6wy4 zh|Uc^X&$~`c92#Urc%v!q)86c2?#!#OJ1Fmr$5VCNoShQ za)c~?ZY?4!Z|Cjs^^v;=TKdH|tLAbZ_poXkOi)E50Z>*E9&L-gM~r`p18dqX+x6X_ zR3WFN6TrVc9~1Qq*GSs-pyRgx65|!uPM@Bjh5ud+a$63^35o<*jIpLGq><xkQVMyIHQ!|9+#gExSeGneN^AUhx_7Ylh1#>T1O7P3{1s zO*);QUA?X2ocTI+Ni%G$q!+fsG9oT<%Siun@Qj@|i^#q{`6Zf?9qW+vC0p81qRX=G zeQVOItitNmyW}l2ImB?|(0SLlujRxJ$W5(Z|4Qy}ZI91ZIX?c8z&%5owrb~hDh z=nHw*+O7K&VMrDNeqlb#{?p#$`)1RAzLg5TMbrWeTws{0+!tn9JPCbnKj6nU{N54E z7j;Alx zDg_*$??-4qTdL;0M}v6H2yS5&Vh(1qop{47NM|^Qe13}A_nBE*0BId4)sZ5OI`lp2 z>cz&hRN0Alw`{2A$h~z>n%xt;9*td|To}>juUxQgwT_?TBE$I~jpi-i-Py%dDI3#p z#sgNdYW+W}RRgwWD_X&1muzP=Z!t8kBP~h^H7k3a+?0S~OFEx0GHRCTGM7X2r|ASW zVj7k$Tng8;s(}=x0M#0VCC$v98c9ujK509->@7=SQ9kU8h#U@2?eo}`;hH@b$A=yQ zzKseEy50tLKQ|dutxz;TY2mc#ufZ}+RJUu7E^h~gM-x?M6IVbt`XcPUJZk8%U0LAU z?YFXeJhY^s`T<;b?Ev!0daLiZ`wLF41jD~l`-EOB@+5WTE0<{7)N4_4aR?633HaQG z&(*!20I!ZH*pl5LhON-9Gy@JY%s)dfPiiqdIg`I-ykMAyx44n0@hUB*R~Li!d>Xkl zhetq`VvdUDe+}&*A!-2muttqBg*O9-Xogk650}0QE}`QuNJK&`iWTY>)NE_1fvIn3 z8#s}Bdx*G!wXw6XlROB}6gr=PnW`9ZeHV1X$mlHiE9AZ1BaDP~R)@unTukwxk4qHcs)7wzdaoyEB0ZD5AlfkcM@D=DRm z&B00#(#kIsw*Itae9L#izStH*OUcsE3XYF|I=cuvYn)3z=Zg0Hpw*SQ`Wf6fEW&EzVe`cWmHb19!e zi2k=-1OOq|!AIqnk3Z=j7Mmn|>=u>2>-ntUGnUGeFE=X(JM5boxjMG|L1j%6@w05{ zsMp{Tn{jh?gxSb|c|oBapQZc)Q%{An+K8URC8!XWmtsHZGo7;w7O{-0_w)4jZlO0e z!>;jncgh4}D%GLmk+<1*pjQh!{y~F4y!Mum##iZHn=tllsiojC(GaO?S)iBF>OkBh85ivze5+7SzTUcqA;dG*q|^$7EivNw z#G(#EBy&fBf!|DRSn4+e$jNGUjlh%mnMU-0tIycVHgIl1ww~_d6_%3?S~xS|f^oSy z_SaT%`B@+7%X^D1pdwU1ZVsKPn%cVn>TfoH4RZ~ZkTV9yrQLQ;YWiu-B>#&h4(EMa zhdDxo4>J@O?B3pR)O46^EQ#Jcp4zT=v*{L@XgzQ1)^rO!C0b#~$vCJO77U9|g=a1qcwD;q+^m~8mr79JzV<3(ySY0~x=E1<1U z@H;QZuuDqFLP1f4B!@!V|15;|A;cfD5peUtuE8qnN~^T9r$&_wQYUYyugS>9!rF>galoAXb{vd+OjQ4^ zK#dc}6o|>@kmj+ht_M5;lmel80FNS6f&2s+AKOzmrpapEPZ!S=?-;kyv-JQwAQR{WnrV_uHDK<=}-=t*>+qN2_>QoWPe)uJp|r*wApw%A5I<_RnRR> z{$;u9FMCmay&vIv8~v`mp9Blv69#Q@=V=#(7w#8kt%!e$?^*Gj^D&yzrQoMeq2#Al zEU7&H`WVz9U7KW{J*&T3jGLa-(V2h@iKU3!*LVJ=4|oY%>8UL`-k4MsWgQac=^h>E zfVQ5xCRIaKe#2sC4}1R@yNBu5JfT76HTvBk< zlUDwmdyDMYY>O6mlZ=Lt8yI}~<4;|&6;$+Ako~S}yTodV+n|bSVPv>!JkXaS=S`In z(DN+{UFsQ}8B4cX=ArcS)bUf{1hhndGuDbb{A*QJPMs_-?4a(2=(`r2L(Mcae1^DR zDy?W!MZ}RK9r7WYOF%}mqDmAWj6_alL2FZoSEetPr~5(990vhgaus+A-@Y5PWU&Yd z!{t0*%p3rAm`aXSGBepNc%spbQ#k)H8C5?2lp6bNsIf@{m;fm7{WN6=X((qaVlfRH zs>IDJn+^zPSz9-L33@0jNc*B?MR@L4rsC>)oei^8A%oR2q zVr;7saO{)VxSdlzE9tyz4%Z@ka-#}39S??-!!$`ee-tIAxbyJsYmtv@49X6t8+>)HF>liX# z&X`pD)^P7x%g+J6zc7Bj(mRg+g_*@r{mF3^K(XFa_|tG1A+8l{PPNm@Kg1Mr0Nq2A zans85Z-Dxx=yFsG9P`o>=0I;)$t;V#gP{}xlEwPtvc|)hT!c}Ac4^{$YKNLj{NQ@L zh&K|>ggMgv>H42%YqTKUa8(^mWlNAM>O4ZyhQt1pU4^ZxpV~(@*2)G_9IPJyyuO{J zDC^Wp!n%4+#={4(ar?8w1c_{$R*t_g_p_#pum_JkJi?WW%0)R38AyV+{m|j-aB2al z%AeZNh@!Li%QnoU~jcTWM3KLbk#u&&Vw$%}7i zW(7?xDoFT+*TQr-a#mCBkEvbGHbr>Rwv@Nbj$pkW%{e+FEkhD0q7G5>j4%0C$_ZSk z9x$rq*sZww&HYSLr`}Bc!`a|rK&oj*`Nj#g+iXpl-2Mh36B5RprJ-Jggq1m@hi9oP zK3)H;C-?V+F0aEa1(zTk&JSMZV41f&bCDjugtYIYEjyjk6Xl88w zRUQ7IrY{-eQzSCC-Zs$s1Hyvq@dYa=L(W!$z5@a3F+n#?L)(Dq1qGoAxtc<$Eu)Jw zhY^b_7UApNR*uz(>)n-TwMd3|ZbQF!Gw`>l)32Eeo&5bIe~q@A&T7yxFbY;J#VVgr zEGD^ICloAWQ$vQmrHVXRZ>Sss`4Rb`5@OoWMTFBmukoW!5e`VoGCo~vk$JDGt82{x zjg%xI{~IcA-iuY`v!8znO~puS(cO=U+2izcJ?lBO!g$Y3DMk5IHqry+?}&)uuLCt` z)#s=b1CbR9Q!)u}9_OLG8cLcbXkLd+E~Q3#I_5>VPqJZZh$Q#qIsC);GCB9@LoFOn zTTJNG3?L;#4u)Q!bnY;2Iz~kT89#KZ8?8?e(z%0 z)Lv-z{APp<^Q9|GSI~UxK|Py#l;2y(%i%XFw1Sq7laEh!GgnYuX*y%KQ$ivTJ0A~V z;S!5`xz`f!fWpJxF|F7!=Hz0mJIp_`>ET;u{In*HalQ&*NZOK(Kk@KzGV6 zOgIsdAQLsz1L8#*vAQ+4I%BcoqbE=xPBcCUb*Q#IU+?vlf?Axj!#}x!FjM`~S9ioz zO=kupo~GUX-4_1ji_ww&?5|tge|={ygbBs{h@2?&(b{MJG;gAP+D;Js=hK43|M}cE zeEo9?aHFy*$*oeBty$nO_O61lm-qXys`LR7t`5QOPth0dno^&{?5#}mrxQ2QdzGW( z!27i(X5h0K^9>_OlAotr`zojC#z+tsQ3RYzXCm+6h&_Pm3N$4jzSD_J98@l1>w#R} zzjFVD0R#9q$ZvoCdHpPa7@phrlLttGfRB-%KqsXzKQqY9Z{ge_KP7{<=>*Lc&^Sbg z8u>`5n~wbq8xfH2^zkj|X)`&wME@Gye=!SydicgJoc}RjNk|aL?mX)U0=C!^H?~=@ z1TARgduddDje*hcfF7#)#ZxQa`p;^F1+n}aSA*bwzPX*D{XXB>VQ=c?l_%J08B`=8 zoV>h?j&3?D4<=ATL#Q)(ZZyiJmbtR8A5b2ITHq(L$L4-s*SrAYb0bH2jcjoV2^lFw zsRq|O2tZs?(*8c1>)QYJ)Iv}ivMN*V{%bpK9&>QJ(~s_qOvo$404n1V>Xtd!B(|XtfO=v+5NPqBX_a?@UD9R?btzPPSoz^+jNrjQbpU>d^e0pd3 zd}Ru`>CcWm(kg4@b7wnV={J}aO$0l-uCyb z?u7hl4`L2M7uypOu#FcY#w0zJBr!&67*L=+^>AFabrZ|>(>mg_WPx%3r>JP?pbH1< z#UpfCG|^Ag_GSG#3>YS`R8FUUBUnP)Pd@n!&;#_nH!A)#_m_Qj2aP|x?u(pHIC^;l z5&QP3E%a>e)U^h_Sg5t+}Gk%6*6EPWIAR4 ze}X0^K@P8$&Ht?B_A8@GAnJWhLO`bh*8gi=V&OAX+oj^XTpCp6XAQUXlKvMk3E%q9 zX$$Nja&%3(KjVe}4~gJ-2>8!ZZ))+7Mg_b(33q6vtoskkAhr!1yO_4|9aJ7Oc8&5+ z0`)$BAQJp6>^SmY^re6gIyy?0%iM+G)!{giPcBu@H)?yp=k~QA!T%v*y88aV!ZH2t zwgb$nNmZwZdu>sCFP{7Vk74(wRamU)uCeIdG`1J&jGySi{ckE`fQ-ob?Cgw+G{gt- zH6j8jGTP~`CLF`s?u;C6VjJxf9TU`3-VEzC32EW=)c5j>=(AE45yQ4)RhU0gq{S5E z=HYqo&tF!-ZosiRH#>{1sa`IYA zaI#_FL8;7opGKZZ##hW+W^ZMm4p1UwT#)<)U-Kyx*WTMUcd@le4v6K(3G+O5h`vod z|E&tO)T2-aB$-i?&2O)_*Qm=h9=&};gelo)t1lrMMc;`q zrgv1pNw>rIsO^;lO2z=*ylbV&UhCA+`9}^yNS9*mz?IkZqm!M*P`1ahzZq&Y2yg*6 zZ<71aSQ^2P_+IDV5#eiY;wbGGpgquk0!{z_T=D<2lHmTKRY<7Mhdn1iLCo633!w(h z?yDV}_P4IW|9h#-vW4kONtG(ZZD(RKe?Z&|R@R)i-Jb6I-C?0r-(97$oXWd)zdkR? zSZ4c=^${^Ips=%Ime`mcsV_Y1t{$Uew>Jb1r*r{WKWfS%3`@FJ&=uH~aiM0Lx zzR%dsQfc+1Qu9duE+v~!cu61`{i!X?7WD-^O2ed<$tIy}RGJ9Qr*}RVot3oZVlxOb zhEwn+VZCBoZJP-Caf^dXYCZ7_k=Qf+rQPP%#e=n#^Vts=mzhIn#P8&~Q#0@?d03(G z0nzodmv|wXQXEGCvQA^GhMvzsOV2GJ{;D}u0|!t|!XeG;Gt9s6WV8?(l+00cjB(nI(xb`&wX7g z7Z0z6O_q3?*SN}MeX%z4epcE)`VdB$vlaHBx6f>ih4tpa!l;q)(HeB0^TJ~QLW!LT ztsq2B;A@u=IopW7;BO`(y~>-8Z%i8m))Yt@#ouDVbSRWO!rs40fdzBB znt+7|0E21KV&y<8bceX&$osruaHG*G1nb+~7^c6d^dV^b_YXV?^y8pqH)NLC&3!MV z$|!)Dfpw9@rt`ucEpLOEu)fwuIh1TWq}WCtBLfx2Y^JPcxPB3;aQ3{UWEu~Behpzi zXrXnh7)b-qSdXt^@3KVwaAyr+dMEP#1}_J{W+Ibrs@_0ZE!~$N#Db>k zK`fifv;qFjU$zYN?0iL28orX||H!sU&8NQA4Ud_KN%yJAvo96z?E1C-;Op_&SG!@C zu9U(?DxxdAs?Ch&v-WA2{gbtBm|3a2U?IkC2))QhE(6?CmS*PIzAWLMYDVjX$p`ny z`1oYZ6wFe47@5EN`&`kW zhJOCtrvA#`qrIWW##(L1sgYY%t-;!0xPd-nGHBrJnD%@e9BDDhA&cLY9f##sX?LDb z+RdpqohPKfrEOsMH8U?~^^b(<_uszzb=@J~ey;?R!hFS~{PX;50l8+@1Ep!TjFKB} zvCuY8&Cg>~-m_JuiF5=1JpDn<29|&{?$GQo^IQf{3yZwp1*gQnW#8DPZG9y2O!Gma z6-Lr7MCzMC2(f&*Nl`EmEl6iYA5`8TDd-{6Jvz<86%(2kiC93Q0xfItjvF`-jQtHp zFfS&COyf#`D=m3tonlc8>{xD#6cu#ItgP?D3P#zQ{-kMMKB@(>+(aZ9S%+KR8^!Mw7Dl$wX*=%_X>0}))*aqP*aA=5VQ32CzNg`cM zOAn9$D0JmucQgIhpsBa_@h8gCL0aZV2}5(RaFaMx-E6(oYxj*NXD%O zrZDpU^=wn%&84S9XR%g_RBC=Iy$ThFO-!ad5^#je>o~)rVxhjEO}G1Y)Z0bZY5w){ zuSNS+&=PpQK{gVd0qJ;8up=w=^=u617#n5$(0=01uEgGKsj8t#EK^vLc|Cg*M*rFz zaa*XwiEy>|3uBdiYEK!L)5JvHbeDvey?MLG+m8}F*>p1U{$$Jm_HAD)4gF@h|!>K*Cw*}nM^c(-Rf}Q#nMc3kE9-b_29WDPw(xUSW znY@9w)4wQ?9)i|!FqD%p)hKzsK-K%VRjK(D_dQ0OdKt2ajNf@CD=C?)A-w!uBiOjc z2yilZ)95-WL9WqbcuW%X3GT8Vg+*%wJ}_M15}1qOB8ef04NN~D%iK*Vf+Ci8zwL;B_(aITcvZ^nPL)IkFRKM z75S7R$jYY@&^nPeuBoOElmS4xRFPu@2E>5^pZPU8lRK3ioBVfSlb6rGzxq-XMuoW( z{W`K5!QNY_4yXj^O=-iWkQTjUWs_CDoMMZJRW43l7=7`7wm2*{+;AUl`;aL}Hx%~m z=p-*<2@3HUPjW1-51m|!8Y3l1fAGbhJW-I7i3n{s04@JZN+GeVl1_ zTDDo|Cl~bw?((fltv^Q#h(@FpTGXkSI6UzJT_fBf)O5w;W`5HPGkF-nEo~k@k5fW! zLxe*DG8>1n=$cMIM|1U8ov*PNSw-g5fZ2GUx%Cae;1d;(BB~V+J%ixT!goepg7rW} zMFrV9Un0^Qvjjdf*$xFzEdJ*pg6!1#1)QQKgnD2aufp4?qRLj2yEo{YRbRC0&XtYc zEZvvUeeCe)P)%M7LH{!msfmp$J>o(U3M>#aK{em@F zOb#_QN$*d-1G7tAXNm+amWL#zJAoql0%K^SdCIyQR3cvALXh>3`Q(k}p?d;vA7RW0 z0seRZzNT(pj@>;lwh_+bu;IK3=>*kY&&KPI?-hI|CzTADcaJnwQD6LQkwOfQd}xPs zT-d(mJXRon!Oqated$!`tzKJ0qe^5lzRyf=ak69=&d;mGJvNiKNzptW6B^-D33yn{ z7vYfn^+ve<4ZH8__~$A`>g*t-zX({4{zOmhbZphv#GQz#Hk&3d&TjCs`Z7yvowG&AAJa4o!cTzQHfD zi9Oxj8vp3R;XkcPq^wd(WcY23LjKR&Zge}%_`El+f99w`+IZ7_3>EgN7a|SA7*v*{ z$3CT?36pUTq1~BU`$U3t&5Zh6sFlUz-@c!xF+P-6L@>$sDH?Z)@p-L%FC}G~aN`HadgdwY$jM=J+tC zH}}kG?M&`0TbdAIX(gWerKR)XHO!_RR5DdTo#}$l$d}7MO_HAH_yV=vcb)-Cqshs? zFw@Nea-d(9QB#_iQV?GXEew)m7AVeVyEES6>15sh3~GM2M~ctre>V78CSt=q&r3m} zdh=N}lZCBM7<4Enn~E{ z{%H1a4#&^^2ui9kq%{Ra%BIjO%p{cPo$$;sHJ(F-&}wt>3CtNn=Jq3}3g0M@@Jkg- zRl0mL@JgCoTbYWDwKgHR!UA`l|CsS@cOm)ozGsV7-CTo?IT{f9Wo=H4lUBG;W53p+ zZj>1RX1~E3cUqxB9LYrORdAeU^1etx9FL>h0!UkS^}+P|txS;F##804W-+N&L!!B( zO=aFx(9F{&n5o;@>uaR7_16&JhURIi;K@=*zM9ndh@LKRjTR3)Sjfp*t0~x|@av#l ziks?do{qkW8*}yd`VNIrMfQ-hH^a>;uce9SW(}L0X6-+p9>_s1y@zIA$9p(l%IFG@ zRhsYbO_IYV`ik~IM6BWMUkb#3cr50-{A(QZZEKn-QQ^%TdKm|P=W}pEnbyU%&v=Iz zx~lvY7>YT*UsFdanJZK6CqSv7R10MwW3JM;0*6CD*6#_)5iB`_IM61Q1$LrVNuj2hviKs?U z+V+kpt`2x-mBducR4n7(?xmHQ8q=C`2o)(n*TuDVIk>^Prhl zVHglwv0>kCn-nuGpER<)P4)I#*Z+&Wndyv-gVI3qmqew08J~e}+3>9DQaIErR`0e= zN7M)?YMgBcOk_>Yo+|r!-lU+7$toquRNx{z+t%3D&%r(^Wltgg4r%YmC9UREHHSwy zR6BO$r2PgZTU>w%CU4Mcow33$b%Y=-QwZF$oS)j=2qt2buLC>jax4n3sn+t!2Jio& ze1rU4ygAFRY_ebXxTK86bh4k}XV=>@(xSbeVoTz?5x)JRNhU}sv$dh_aOB&L9g~|& zy>byo^0QItWGG?JCz@CgDXVp5v21sNW@tT<+|Ifw@*;Wh@1LrBjvDD`H=i0DO6*>V z3Vr|UQ#!vR9&iDQ#|H#MVCl{4?-QHF{w*8QCQ8w*ZQ_5ZnGV_%4fl!%{MHI?AD&1C%lNK4|s9lZF z>npXevCKxU*z$9gU{NB~w;zC$#ZR&6V-@marKL;qFLt9ZJ*CT)lzQcp8rCiX5t@^( z(WLzdvqqQS!t(+t@`}0R)mmEANpbL;835Zs<=@X!S~V+Si^4w0!aeG#%`=qn#5$j* zsE?7RF~s|8e;c5hvKh_gr5?bS8IouncYD)kzNo6?p^n?706#C67sZzPKRx5?l!|tV zgNC!_HTm6Dvry6)+V#*0HJf&&Ib(Mg!hxew**3NkjB)xw#6PZARx&BaTHcq~99AtK zL`wI)m6rA4k^@-pyY+15-dM*y#JP61b#Du!ZPtNEso0BGWikW6S(Uklwz47o0QSxh zoKOeHRjQ_qot~i|Q@kGd{8|MKVOByY?h;OojOZVTr^#jCQF}~BFpLqUnYsL2w#uJ( z$B*X#4$NM4U8L$Xy(cmo5JJh(q4K!mz=rZ*E4mQEQgVBHZba-g4oWV~*dy6w^a95) zeNR&*bpE`MZbx6}jU}uA^@EhfCZ?WcnH&Mc#?*kl6n`U49kd?YA0o21+LGUz=4RqG zS}#fBh^aLQ<%~pVx2ZG&{LQ0Nn8;PhI!-p>7Sz+CH{a|Nk3QVcVGv^5<&^tuGpB+( z@VR`2mB|Ekz07Rv8z!|(%XM=}j@#vL&q3GD?|<*!@uA2|nQ&Rvrycwn=autGAkJ>L zcKQV;RU$b`|2`Ift@KY55j}ctb~-*=E2*Ahtf}R#upcR8BjKrvH zxIz;UP&E75qdzB<&dXN4!Xv;>CYP0oLRaF(-dd)T`*31>Mkd{gRWe!DCfNH4S5@AT zZEfC|*^bEGn9$ikr?DCw86V3L5|b`!I2m-Mxy2z&UcM!pVt}}4m`&Z|+pX;Xuqpt^ zrw{dAui6D4rdzJ*3xg?d6!eHBO=iq# z|4zYyPY~e1Rr%@UiX%_LmhNFfZ#A5}Dqls=;a^*rWY`^ivr=1YgPe5>f??iA^~Dsr zA(3MR9iv{-SMq-qOuh;kMfw^Q6c~6PD|m>3HC9m;pKv;;*@ZyhbxHnql>A<`CJuAM zy*EFQ-;z)c$m%z2IbOQim}wFrw60S1Ml?ZXK2^!w=PB1XJxVO)vWmz5<;+pqnI z4K!?Kh@cZY=5T(uB?Y@Qwq7FBPlqAzEU+WZ2Ai$*K1;yW?r}?6VM3fk;)&wMe~TY4 zXq;~fLKzlA_V^55E>I|5w7B}PIc>J70zZZr>a22!0QM)&1ao$_zrL^!lMK9H$jCIJ z-Ybr)8x^_465I;I5(Iu7+@9?|Y8lqFwvJ8VAabfu>*8;KXZ)CvUH-hqbWv4}a;Wcs z(H@27bt)E5U|ES9k85^=4)+~>2hX!En&9@Go04)k2x`u^5FCXcKllEopC+Mvdww=+ z7mcOxd?!FJH1mkS`uXp{2oHF^rXES)8h)4lhE}YPa2h@)aArdILWOT1lWvy&k?*Vk z{&*&W%JVSfTP2*^9#PC5BL0Vst~sJB8%yy=gD$;Go5dOSpe-p@j?rN>r36#@(#l&Q z(VBly@HYzWKB!7hSULG zZqY2PWsOgKISH073&HfXPuLhwf;4JiQ*#zHE-fLXutZ@W&p3SnwvA)>YlvTwOm($5 zr}h*+%CQI)(YMHiXpAx5_}ms%`gMgHIAFy{(7W}O9nxM3arYx!wL%ONxcCMSG*$K# zBu~ErrBy!=DOv>dew%R#7cO8FwKHfFj#ES1g@C#)`|cUyi6-*6k#^Y^K`E-SviePo z54RE5mde@BB|JuRkClgGJj^`mdsZyl&JznAH}j=^Pel{vpMc%f#1^ex^B}x=qOmz9 zt1eCxSR0&m1oFj!4}rWNl%AyGYtu`GO)`zMp|{#*_};eJ0{Vl$j=@2e2@VCrj5788 z);dWbn~Cievz`2(siRb-$@O>S{JCy6vZ+ zCDMMFOZtu&tDE}d1z?hx3E^EJ>Nc@s8}IX{kg$ z+1Q*96?P?+hj_av#Ibi)=aN?t_e=62rLfV;cIo8h{$#A`pGuqg5Dhq@z$*)_7TDW5 z2^CgS@IvYGL~Y&{1Gya)J2vY9c?#lB@`IiEn~WJ2#VW4cKnHl!?dCV7 z)PTFX$hGcmk3-I9U4O4F&vq4nXOR0VKhtLE!JTkZ*o!H?*Ny|sE~~bd-GBf;5hE{= z(^e>V`y4z`?()ZY7M3{z>=L(Q^?@Ko&075|+qPX8KPSW(MNQZYx^N}wW`dymj)uB| z=rU^R&uqW>9OE%H`3=Y9CYV8QLhXI~ud@KGv~6-Mu_*5e3Y@bK^C~d|GvjiJZ(W{+ zzHgHp7Mpoo^lFh*15_A)27#a7*Cx2fZCceB=PFs zMcRR09*Fz&YZU^TK{G_TG|+qRSk9>MUKbNP#Qg8(EWL}wA45BLP4-b=USg}ky}xPQ z9nK%*xhVWX*g1?T?%*XUl;Hz9%sQWeIZhUy2A)`Pdi(ARsH3Q_W<1pwiwGg$=h$(l zm`L&Y;Uc<{HI&^;y z?2^YguRjIc2qN!8M0SVL(^AIDcE`X^a&*?hnH2+#z=IYBDpmZd+Lj$e<13s#++f^B zaFUt*7tAY@Tc(AC2rAqcs=wwXI(UUsM8VxY?>Zymh8-Ur)ncC?*J62XQ516%%`x(7 z)dU8kDgK83ct=`nOa11tOV~_4Jl;G4w9(@Ps*OiO%JX0&3@>UBdcM)1{HBnWbRx<}74eb%XgGJxw3a;Yf4hjF8?I~V|$>gI+qpOJT zsRHu{&k$V5&34*&Nq`X(!K+)nU%-BxIe6$vGc)1N$U8??8EKLLEcj0R0^K0$83LMe zxBFj=y<>D_ZPczC+crB+I=0=h?T%4NcWkrcj&0i=+qP{d6?@nF?LE%fQ@x|v@z9bdYH4V zmp91Il->Im?WAYOx4qqi^qto+Yzvy6ng^GbwgQ;@?JPFnOmA;Tx>$Nc{a-s8zaPFm@WnDzHEYU8u0Gwd4tL6bV}2I zUp61xmphmTf9<|_G+Uw<)d8|694sE1bLo36xTZke64%K@bjVD6>9T@CHu9jv5z)R&hke%JEkxl>{|&|eG? z_H1K`tIv?lLpLhg5rK-Y!Pi7WBw=^?#|v|ULNOXe#9H4MzHlc;FK?NT%4;2PoTs9h zWr$Z8_N-s+31=`s#CBAtmZ;^LFzaP>kHCyk3eG5GOip@tivRf_mA>$T;jpGysvnuzO|FiRrWJ51bW{_A9~Q|{BCy|uQZ5Cn`?MLo!KK^%=7=V_Xlg%$R)>0IUL z1svY3g238M2VCt{pC*9x3Jt;fYpfC+8U4Wq#{&k#0%cbUeEcgAFZ}|*pRgrjm>9GS zKf7`7T&M5!4=W zeOTV$;6e0Ou!zk&`WXNCnfjU#13pcrkB&;2w^NPj2}^wyBgbieJZ zr(Z|T=KaNmI)%hE2TOiqX$f1L$?bc+9Njh_n*WFIZt2!Dl^btO^L0b>Rr%Bhi3?&V zqx~g60yr#3Gj54GjtnYZ!`?HA31Udd_@9(s`BdiGy6>OJY}LZw*^LqECgS9^_x$p- z!qWaS6OD5e+nM*t>99DUUfs~p9PqiyIX}$!(xC*UQKG$7qWeIhr9>o7i0GJyuO+U; z6dL6SdGuL?A|D|`;*Mmt6xh{)rox{0Y-5&D!T^$qFOn70v9}P&aM2&W6VuQaq`2=; zjsegV^4`^zwh8No%xoS3NM=IOetdFXW=}KpQmjsB@uCwN2-Of{5vHi%49NQ$caIC2 z2|?)=em8CXpOA%O3pPJvxZkI!duM)oiX3|u29p5q>HHl(nF$nJTClFOQ!e(VwBgubxQ8vac!wSO3qM3(%bx=FYI)!mhLP*a#P>MJxjR2eZcA+A)?!`sGNld|$R}udJ zNaiOA#(p;+CrP<5JI}} zL6@4Pgopi!mBwDrm=2^!uJrhB|5*1-*CyL(`TN)(ZHi8xuElm2P7z*G^A z$i&o2VicBKpPI(V1|7#{rrIM8;&BycQ5!YtpV{4cGs1?EL;IXgNLw`6vd~j*-NW$V zcDnDWAIW;bL@1G#;tTVbFkWoKk@YM&9%ah&TCcIJlVuz*QtuFM23GeelPljG5jZIE z7sH{~J>JK)1aLYT=%gMm_Al?W5!@! z|Gr1mk{>5yc{(27r}e834eGwVH~&RxZLqB4L47kLg9D{b{;yH^)93#7vw*qeYrT z`Q_d6Z(Mw5khJ^-m|tQcsr$+hJJRG+w_gw5mL6f;o2xTN0i8TPLEK zsn^J8(}sEd>6d%j#W{!1H$%Tf1+KvxOAk(K5N=~(Vo1%h4mIn+3rwSwqMubEtz$wY zLun%onEb~tH)Uz&v?q}n(z-eYS>dPVkpQS3$<|3BNu{_%XKl9S`k3ZooKP~8;Tp;^ z5+-HIUzfH&>06hsR(Z*_6oTb}kdG(p8#pu7{NcG(;j50uL1#i*Gz9&|xVL*$v43|8 zn&_uBgb|WT%Oz}d=k`&kOn?@)7NPLM9iFbHhQ{)G-&8YNzEL#m;qMagNd9iDj><8pu6O zEj)=Mgl;WCR+~e`R$ke>da$tS6uQ2pHL)Dzw>o_{d>pmd6|1(YvIt7SeQiEc?nY*9 z`a&6+Ufp?}+W;Im{j#}3)m+8G}OZ!Es21OLO@%RS! zyVhOg=uIe2ZFzIxh2d&xFWLqEQdKO+kH$-KsJhx3kLb(;vS9$6`fk%~LbzSV2rC#4 zt6TmQ<`x%?(-y92A0V9`7t^H2L)AI{gw>gIs{S5tZdHAkv^wHu3o4cqm2-w4vC(&ofJt$ z6R2Eo5$}Ao@+&!ynLXDuRA7pqOiuMD|Dh40>_HH+3$S;HK&L1aZ?>V#11}N2e85Kj zlr`}=bk0>uzx^B4K*lb#Ffk8b*|@gZYvA<&nXRVPM@gy57|St|1{+e&gceosZc}mL zRxypSRb3qogJs#gD&R@b0TA!Dw1}Uh_trEeA;6Q{BL%-2jyB^gmp zR-sRVRsYb%;zL*pSH@pY2h#$2Xom)~GYdkT3RUBF+yg3f_)If1n0j{~ok%Q=rLmht z_bO7wDuRx&_6c%*%^9*-A9V}y+5>Em!!3l{btn!}%?Se#^n9G0NN8|V?bF$ydJ5?? zq2k=2ZkZ3cqIA_V?ZCC=ubC%2)>Fsl9@SznX-Zl~Zt3A}ZkmXswMO|v4F3YT<(FF3 zXph2fN# zjh2Cjr{)eXc51^cskbY)YAl2ASH%FNV|9dsH*052gKQN)LyM7(&NxT1e0IZ+qE#U6 zGlA>!hnH^4%d|>fG(C*W)@qvsmP1T59ktQ3=W>w;d6F8<`9vPUy~B+(XD#)mTT%<5 zR5ZGAP`}tPy$1v~Tb8)jq;~Nt<{dE(QtA3DyMLnyuV~XS*HoUaU46siw;g$SLpL~x zxedt+_P3a(`Fw;2NBcXVOfi;3G*8!5g|3<(iWCZuxr2{jY!xWYLd#iF3+?AKApEuG`M&b}RH_cmQ`b9w!amdQwo!>ug^DSKzipWfP8j*>14f&(dDEcI`#YkGa^eEjR)vJL zKn0i612vwNY{sl1a3tXp6Z^D2rAx2rJ*YvDri?ePoTbbBG}Kt zzXm-O?;DkDKb~dw4C;nfo2hnSIIGh>*}H0y5`_s;JPYZBFnLJF4l{)ekKzm?2TBb` zQ`7jMETP2K=k1ZE$BFpaA#0n3!@Kua(|nRN-qCYhu=lf+MLcfDq%)E`oH(1h1(`(zAH@W|BZQsnT0RGA zH|x9jcC>m38ty9jnhzH_i16B#AfdSPHgRy7&sm7(>(41HAu$wYb>1vv3uL!6ZLG@F zInSaT6-vCplQL1pZuh@CjyXXvx|l#WutJR@oFcJkFsO!}r@Zfn-G}QkrDFFEC+YbY zr1X+OF$1Gh#ySLP$8tT7NA~e$$fH<%P&_i7t?y965|7fOm9Uule!FT4@LfOkdmboO z?&)Xb2;SBvGJl&n<>bPmNuSs%ABo<1?48Gxv`Z5QgULE_Anl`*8^OFM7pU43C1@0! z;f?nxmWP^e9VR5+`UH%XcrFLBSfrfzxD$TFkkAO*fw?C&j#NV^$QhIsY~zd>d&0U% zUG07YCEz5wNUo&`nW;fR%b49o*96>+yI4kK7?0}D+H6`d2@o_j9`JEDEYQD4K!)n2;5$P}Z?+jQ1 z;`}DUs!&hpPmQz;u^FE{!hVi5C7%~n_Cl2%J$K*se|J~C*8yx$K~*}RqnM&%xH1NF zVs6mjwD}wK5^{I<#LTS6lf&lnpG+6fSh4@2^f%Up725Q;pLi#}2KOaYIvdW66p<2$ z4KzmODgO4}O|!iATj(~!?{)7BD?_+zKe#Q+6i$775l>(k*OXwPe3saueYhj@Ap z#w_#}{psQN{Es})mLn8Ajt76qfZX0xe3N+Rz)11f4ncq6~ zB?Q9Xs@(7e5Cr?5T!P>syYd3Lw-IMTxR(sM@o+wLw!pVP$NTMFj;}gEnV{eJWg6Gw ztVwa*!q(cP0ACj@=)`|k2J}Z@TGUl0{=M6&jNr#+J38Kns`RJIv-w;liN|b-`3G_O zRQvJaDAkFVwDVQV=yzw3LycExrXcwy)g=t6Q*BgOlL&>4Z&!(~>U8sj*7 zOJv?ji|HA)u&}^yXqX9%UUEvNXnWet-gn&Amn}l)!h@WC?&LhoeAUHu;y8fvzdTKu zylVIVMlWDfs6o-%WI5C^7D|+k`pOBUDnJfuVhut7C;&q$tZ8 z;*2ND=Ix{lslYhroSoc0k40AV8{hLQJg?(WrTqF+{H}N?l%Lz^w@CZnQ0SQPLG_pP z<0af(ZUZ^KUSjjNhvP^c*1|PgQ9Nk+%{g2=O-7ofNEb{-HSfeNc_q!BFEAMQVD=A< zW&gz8jbUr55qle#Fb%+Rnggvm%QIP- zbh><1yAFM>+e4bgIPs*qbx{uATyDlLTe}vfOP*$&w*;A)ubw22eKUTHhcycQ1ErLF z+hs7*ac)ZdVwIEtaFYoR-7#K}UPSR;b|z(@ijq|rdaDn3Lv0gPT7(MlR9t$6L@jS; zVrkuQ{pX#PwhO`9DoSTTH>IQ2Mk^y)d_komud7WuJotY%4TS13>?~pk@>s~W>AOf& zBMe@?JcCBzzvg=9cCyeA3ns_CzgDNG@J%BHi26`{kgKlb(BLV{oo{<7?f&}Frds@3 zUWaxa@o|V34a=@$09^@NV_VG*p;Htu zH}5Yz$NywRNda~g-=^~urippkel45$nOcTvK4B}9O{kgh1o5$wrzu3H_4jw+wwQ~4@oMl7yMWQ+2G!iV~M<@CnF{bDVE$h>~goJ(fQX6YiXz^ z@hh%k8ma-05Gmh|LVMogO~}4PnDRx)APSY^6ThShJG`d@rL2MhpH=BNr|aC&MH`{g zMNU#-x0gvm6^ofJW`+uA?n~p&6ATLqbt{9w6z6s(C>Zt~pPlPGPW7Hq{%#((N}>}G zFhNz_W!swdG#;3p7nPTr!F#_m=x`CFQ8DeUPY+ThG;HQo>5Wdp*@1mrK}S6`@N*>a z@Ybei@ETmj30{8?A$0S)1h7-^YBdY@g!T}bO5`+nCKarLn4{ewX(8IbmdWY}B@JY3 z;WHlFp6ua@anzenj{t&e2sh8SDmYJH>Fzvn*R*3tP<_8;wZsTqj=#tE8e(N_&#NT1 zu3#ASI&OPfH7#&@=y4)z7!UkB=qVvmJHEBtDW2_oa?1U(fPV2=p1Ap30SBpg2`_l= zVoApj@9Gch`(KCs@vV$ULW&N(2y@h!F(Ie8|1aPK1iTHSlIq#6)4xCVMFcR2!}q2S z_L9H<>hIQ+wYRB!->Li!V)!rt000K@CGq((VQ8&Fw^Ppqz}gLBQrZviH(2bS{huq4 zaoZP=Cp)#my=Y&`gqoM32_7iB$nFiDrZ@A}AW{<)b09s5`UNxCB_gHTNbEV$+viO) z{GiYQ^7Tf*eN0!OIsf_v=k~vGvM?p3gF=vj@$YP>_Gt&H6@=jP z+dE1izeI8_a)9Ll)u>JbJIE93imkQXsUJ!+II<{xxc2D{GJ+yJqj1{1e;!0U0K?>{ z$1Y|;r(Agh-6-x%@?}_%0NCLdXogT!*VI4d1h97^gt(?dbM&zO&li{l`sI_A)m5C@ zSM3k`PP@PC2Sl&Xpvw-;5Zy<^36G9R_Gn<`37_8?D*30m5@hGvD zVv?7zutAr*o#Fp&JpTXZxelxC0n`AJK*WHKy@yBSJIIO%y!Z?Jf9b9N;S+oGDk=^Z zlQe*@<@6rr9z~1{rKtZmmU|9Kgge+}f%1XK1!Xag{)M?e1@|A}|LX+0>XP{J_lmf9 zbybx@VFBmO^3DL=JiD2Nq3TXeUW}`?wKe?vR=ctI4vHVU@yA6?(7vu-o@LQFcns~K zoh8yWQ92L4ci!gPoU?N0ee~f0?*nTsYb^d_VnZzr5MrhvGK; zXk~w%SU^)U`Y;@eu(8?lJgf%|1OjCv2y-(qoD2cta_v5tn*%>wPw+u(6)@v&c>MWd zpeLy_vP76J;cbgJ6IjRnd?jw+)c$QqD(#)<0&693B0Z7XXeIW|XzRH~Luxu++<$@M zUf8G_8Tu6g=KA>vk$NPxG8l9a;}OB;TKOx__8!**(x@K)AlXoiy!+tdB@|xk*V+#Y z{Y$y`OOP-7;xB>>UT!GSO>DVK1B7eT*$`LjL;Wb*_aC%Z3hz(*Y^`_Ey$qyo!L(Fj zk=3xDBoiV+*(`w64fnp!gxH*JuU0ybS07sA(zB!TP_7q{cJ#;R&GY}hfKQdQjXTBN zI4pH>c(`)RlA`gH7{d3^jmvWP96i5F${JKDy!pRF#@hch5gU{RKgxDbB zk>UN4;%hDGr!_CFADd`w2ch(FI)1I*KrRrG9`W@5K!j}nABeCWPAdN+wtuTX%K>Ml zxMxD?4TR$y44PwuK-D*hO=seNAbgnc7jV|ZsCQPEyKgFPKP&h=GS5(+#9>)UZ@BrP z(W@CSRK1vGxlt|_pQ5EchA78y0L{6Rt*1(!V^@Z_fluWB-8G5p5xW$3owe>EQfvC^ zyj^_0{Vh{``({h&c`m-oH6eB;!APm=V(a@{@K;nq>>KR;S9M2?5BymOO6XE<>yGD| zre?dgL(WoPQ>PEP9TIOM9H!K{-Wq`L&ss6p8-FI(eu&k7K2%$pn7;)y-`4&*fz94T zj^5glbu$VLOv&O=U&w>%b5EsT>}NTSphT>4?Z?RH*)_PoydZ|OQ3MUm{B$!j7ujf{R7(v znCUippC71zmf@^qh)thAq?`L9qB(e5*f~TAusH8WxcGJpVPV)$+>9(Z*IS-4YT_ys`yWLMPMe91Us9Hqv zl-s;aMqNH_iEkqC$~mK`WmWozH?v7(s6sefpi?R~DUB=jHDxWt{nnwUvaXw)44+8Ooy%4G+e%;BU_i%~Za_#Hf# zI7h&dkdDS=q_ThYx_`IOqo#wC%Xu%W6hOWPnMK0RtKjQ8#l!0%6*^iQ5c**=G8=(5 z4DG~zIK@Cco)Sw+H7t++U0Ojlfs)#juy4z0P$Dg!uq5lUXuD=+&xg;--hNh?a$-kB zSz%NrvBTsyn@j}4&%El5jDkP!AUM3U8SsHFYYnebet~h2%S!hbqb5{;XG=Nw629={ zDlY(ji#2|YH4WZz-LiP(KRL%8%EVuf@|Bp()bF??e6pX{ePC z4VJxB;{os!Y{@^YT-?Gs=ch%I@Rnt;@)`ed%JtDxLDsD#Zx{DD%%tL$&dXZFT!;AB z9ATTn4Ua|j)}xbnM^LnwS3e0CcneBRgN85pq+40rj+Bq@q}Wx&*|NPncj)-|f}io&ASRo|Bwa1IVBbDUS4^j&AdE3$-N zP*duboPw-tbD%&6DnSB$fx3lxu>|2ZGKa*61p0HQp0>&Y8Hna(H?L*Lt$|y`fPcdOi3Q^yv7;@)w4(Y6q;Iu(I8T?%H3b zRh4wsiFn_7zXuvK4rA1f+SL;rGqh-eTTuD9yJD$fwRS%@v%rnuG-FbYHQ21DSphf z@nJ%Y@m}guzO{LZ7zMg!ec@QA3r|nILv5g!KtT$$)k>1{{d_#VQL#x%ng{y6zrGK~ z!y$`iI6juArn~i5zN9!v)N6B($w-P=p~sk`rKKtRTOpGE=q5RKpKbqe=J(t62<;=| zKtyn?8?;5s343>|ap2jyJ19Mr~YoN%r%rf*L`|3bm2je zRv;$lEn@{frrT6GH7x#?Gmo^ZwEC-+tTh(uuSn%7&G9xy>1bYAo^+hDoW8+n)&A1d z+^Dj2dc268M8EjRO!@$Ah9hO2PEaJ|YM^#W)#&1!8t?kjLGE~w&}1_) zNTfxXG>*bG190W}4PUl8Qg^sQJ*)k@KX{RSJ3qL9-b&Lv_oy}m>j#L#v0SvWsZ+6}D>P-TJBhO z7{X##R_(l5HUu~t1bnkE_~G<}uxd-e@TIfqcWthuhaWH;N<#$y)tB!OR|$|9wivEg zJ%r}nRsYY>_dzV;{XW74nA}Bq5Qh3Xeh~Xe>?7}Y8}pB3&2lE_!4kE;|G*S=8mw9+ zG-v66(i)O2-TMWaSQNrmE@R==oT|;OyWLmfs-x8}4;Zg%q%zo6Udn1*xK;qu{a(#Q zZ-7^2)tdKEWC+?BX;6My(IX5)NKNrwx;f)qb;*oS00F$nw2GK<@Ha_xApd*m4q z&xu10g(2O4clfjRV=|^oy^iw2*DDL2R~~3Tkj)q6*NJEA=~@rrZLRd4MfjYq2(XXw zJcfZ(NkcT_SbkNT<0k68J(AfkyXl`hgIosV(5QPRZZ2#OkSFKcP@}ye$G_)8!u~bF)FQ> zbsCcoue#m{i);b(!{qU(zKBolu zKg*6^BE`1^AAf!mZ47OKL-1`-IF69!E2WU|iBX%;=qB#$qRKJN$*CuP7H-m3{k#lv zbio)G`QBDeyaU?NuG08zPhQ>>r?y`Ix4}sn> zL7i=K#Mto4zsV$zZ>w5%6B+r}Q>j_jcjZDW$_y{~@KPxf+c?mPbmoq(z^36S4xQKl zzu;nCo1f_uMCeTMDs|LBX$cWgIwkdSmZj_5N>eSMjsvqbEhUht{b{ry;pg|`GL%$y zzSSew>8Qk5yhF0QDN#zx2Ai&UU+I4Sym@qo$! zs@_wY&Egb^`^21rZ-5SL2ji-oCVHJYnZSprQwNbSINFQfh78M zYHSnX^LBtMB9ESvX{PTjaGN9d+Wf&nREB1~ZF~(tIzoM)g&(%ZL{vOjoU?Mliy>>4 zpcqZPPDu5(lp(FRVawfOi@lnBY_vzmk=!+*vKo=z=(Rz%Ll6MH|ChM?K|0nM_wpS0L{u$%QG z`^1xoN_c+@9AY#euaQ7gHntUJEoX9bm&17Xc0n zEO(3>S!6!y`yI`6?E}XaXr07Rm3bYvD$QOBm7~2mKiz3~;P)4J%|_r0B3|N*1g#q< z9VQmtraGo56Nk2R^h^~?YBrSn@b)V422y3^!t0)*`_C1^B2qNUaaj&>oeWXusZ-m7 z9hp?jT^Hji7yrp|zrblU!1blX#`>yTAUJ1^tuidq%~i)eaV^NT8wLrD+>H-MCr(?F zfF|1~Z?SA3V6EfEA4{haP>5t(AmqOxon1^VvATelX;_UO5Qr0-kxB6%118SQL(ss0 zR~kxG4-091mHN#I;j1%ubjjkPI1J?A%EFyKJTg#R#L}kAfbu(v&;68kv%$o*E_bhwmHFX1TW&RXPOZ{YK zX^c&P`Y`aeN^Yjy%sj%Dd|1*vi@ANtK%~*Wf$|Iq{&N^1S;S`4DKK<qi6)Sq_EaH_^l>KvtCY7d7g}sMafWEPfUu}HeEBX$Ha2K9MxF> zY(PL@=9-G|Q|Kqx!Ie+RjDTnG*V~!{r;YR8<^}3S3^}Y1h9sZe+^-65r+{P}j{8yE z`|}?f--Y?SG6|TofYU8pqaTQ49lPM1U=}g5s(DFvAEIV|o=WT21O|3TXB`&`kq*0c z?+Wn=O6_eBX(b%C(686`q2ig#{RvaDY+}X%H4aU?(`&EPyw*o>6*PY?CONaorM*%! zeOI2bGDx5H>Sf!%K>Ls~s)mDg?)rD#ACrC6c}OB&F&h1ha?#VroPPQ9Sy|}x&IJGr z7bmY^0T#c6_q$Hj{SZ{Hg;Mmm!XcgdMN|Q1va6T7ZZgTSEmp?=^#B=Y%Ox+Xd=R(da4wjai z$JBDvQ^|*JrlMv~*QVjAnN^-=phH<_4GzeFH_cjH)}&e^ASlDmirddUf8mVZ>>HTt z&PNOZ4zrP#Y5caI>dW(XEW_dCVp6$)>BKYS_=ArNszY6AuO3)GKXa9BeA3y)cV*vU z@Q7IJ6i}-XLqh`{s_F0F6FjRJ?xi=Cg9kYQT&M^IQKe5HHT}uMZoRux^v3I%MNM=$ zQ3Zjn`B15I(bqQ@ecLEQ@G+9C_zFIM+CAZ|6$(%%Kl_XrQ|GxM3l}05vquRb6bbQ| zkt5N9Ju^?kbUWJW8bUPL_Kr1HDZ$5)(1z+ruBy-sn(Z%$kFKcnB+KO2cM!{ks2P59g- zO{)HD2jbx>Q&h?9kT}0k+b_~rW^My6UeHJg8^8J8CW9Z8lTYH(4Y`u2`RV?BO_jOZ z*P>vQHNSsh{H*wOJ(j+P4$wFYzjX@gX~4C9u#5WV0K_sJx&Ze1Z7VP`Ggl(Kb_Hi^egWS^7Ao5F>!k_fMxHLZEW{6e2R(ncFq|otQ<+A%bJ^hr?DP93Z;qw zprU zz5HHd-Qc_u0h#afG~6S@^tlKcse)BLKeTh)1P!qf$6~FBhIRy!_&}iNNcQ?S+aw`` zM4`_I(U6VTG0kxf?b;j6B4c3)zk(gS$Di47B4A?s8HvrT6hFj2@Y>*DAdn#;1=@@g z1nyOu66yVnS@PIOOYjWD* z%9Hsfkl9NdJnQz8Tf-eet*C+NRZI#;qXMLnIVyVCITX*D1*cIUw66y~F*|7JIGqEz`6TiN{2~OHJrfIg10;(Ca;KWMhs@7%zdjxy=5HH@ zP*P^kpvWzQ&>5nEi?B;0{5FhiV&Q6UM`!fy!yQ^{|G4Xnka$feL`IP(`I|p|(CTyI zF>RBthY4jDLF>EGz2Mbb*SdkPJJE=uthD2*12F=!g&rC`g2Ptx#pIZKZ_uZ{`0G4z zLtTMz#~o@fpkV(&E5p+RTQ{3q+TSrlJ-(g-bzlWWk;FY>68w4^why<43ffddv^2Rb z-G56{)&*RY)5ASVk|D*8F$J4SflHrYV+eNpX^lsr6I__|kpYqcLGOU>0VQ>Nrv<$x z@rRNt!k@LjAynaZK%rIjv{qgubmVU$Lab{rp|8DD?hkRa{dq|3rX5U-RPr}bfy|;S$d73vQ$r$7zMh!7x8xlIHF2R5w><8c`d>z*@Hl>(4X@jjTZ@Lu3LvK-KL1}eCe%Gsv+ zt!+x3z5mFK-e2rNU1XF~2RF4+wUn#5A29P8BhAL3L62X5998!J8xCycwj)(e;)h}b zqdYi)rz>aRH~Va(k63y-ykqx?ROxiCplL|$+jX!$*gs}YEW2AYxsG}2dHYWPMDco} zw~|w)*^f!7;JV}d6A2xkU3dQJF`#QWde8>%_RpI!x>cm5h!@h`I^4y*om(wxR+CD| z7%Qe)<#&ggsyRN-=@}{DT7C?yC{9o2{S4P9D0!ctRy^Jq%>y5TogEd#EdKYJ^)Zq> zY%sDnSXEYCd>HBpMWg^-U^akuW$$M=S@7AO zTe}x<;D(ilFv)8~j4fMe^cNxuE}ncMu$;)MUjBXM<^xmUHbkpuS zB|0QPfd*d1v`ci$MW_2i1tG`q#4S@kLNV^onr37p#kf!EZ=C&6D>D_NTpg0=hYu7P zQ9-u9o$vTC=7!tNfPwhiwGkGZ8^NBtb-Ei7iu;a;C2}bD2ua!KNyA2)V4$@TTjV;D zwUo3p;k0I{-JXG)@X@WMLBg@sZcm8RgmkH?NXy$bEU?`6$qZ(SmaLnWDd;`C^aX`2 zcZTRwRpRQVam(kpT_ zTYbglDr?$)EZ?88UcBW**7bxK&PcIR29a@dxl&<)onl$&Z!CEb#Bhmc=Ij`ZA)CAG z#SYI1t6&;TSOmcmSCo=o(A;5=+d?Pf@G9vh;VI@M9X?m0hT-aarI0wsmOyveqAFrF zN!Lba=s3)amjP)3mGa%fO7oGE5SdT2G*waGrQ$?}-c?DvmMHE*4o( z{ys*fL&w%B@rbm;KZ9?huYPYd-pPN|Op9yY{b>U5x`11le&}_OGtHw(am#3{r*z!K zlNaHS;IW?d8{-Yk#-&uSQasu+n`)Ha{acxjSrq7VEjnM9>OfJLHfyJ(V_LQ(aGGCX zY;wYQcO8gPgrQvG3F5daaG22E1nC*v<+T6@hv8Gtj1ch0d8=<&Hi<2ZUcz2A)xBnE zNoD5JV#55s{_QiozR2+$QC~AcyGmC9*%I-~L-segFW@+i4-5H%y{;cE%p!021iA(X zAx6UN%)G^=v40Cp&obI6G4uYA?A7IwUFK_0DF{BTm!6_k3!P7F|AI)&OdwD4tk(mQ1ns=xZ*;{dla_}3S=+1S1tYUY60r;k#iQm} z`ahN@;)bhps8Ic^iv?biR-4=0$-o0bZaZ5Whd#48xz>*qLA_8yr&Q+fxF_KIekuHk zZ8TXD$sO$}u#Ql1wZqXiTrrcvy`JO7dkg%UVj%3ir%anhSEV}2bgU9jc!t3)42j1l z^0*S)dBM^sCfCvN=oPPMtozrjkiNFI_#BnI8?lMb-Q$qRUI8D_T|$As2y-T|;D2Ic zW!>-+zB4D@&_>~$CqhC_ng%xc3)R>?+_pD2Cy%){e}&NS8ZoPwq>WhRo=$Jwf8txQ zr(MNBywW7G;p-pIqc%}weyMFbfw-7KiHtG9toZUF30mR;hEQlC%Vv}MQ%;|rgg_Owr1bPQo7$L^K~k5FbfE80tiuPyzLu9Bp;TkS?oEsp7c8n8%RS8Bd> z%+xDzpehT?r6n$HH}9Apk|moftfWXm*Oq#j?KVGzb5~Kh&f(7zNt^f}O$lYf-{qM5 z0=jxJ69}AKEpH9{`NMIJ(}EpuC+!*^U<8udzMp&!UHBFA)X_f@`8r`#o=N9+^4P=R zuqaB^>uSx2t}*+>=zyYibsCV`jcJQ%K3>{z1P)n}ZY^Rf6_KkAw0(()FqAKpEFNhS zY7k8E69sqK;{LfvqP5rZFQ14OcwkhQ%Plm7^YJx(caG)Cda>Z=p!57K0FdGrVo`2Zr||J z1-ulKH;tN`hRlqNZeZfp5~(>+-`3UeldR(L(PBfhmqewdC}2i3-{Dw!V^vt@L=jynMl60J|0Cn1>8iU(NUKByAx z_)*%tdxt!m67>LIIkvG=?EP?(I#t>H6+Ej_U{Zd5K2;%6ZVOJI42563q%*NvtSQ6m zdQx^d-}1dL9_70-UECE#l-+3*-2Ihn>s!EI=x^&hVQa%Q6)@Y2D4#FpT*Fo5P>OZ6 zmW-i>vlXLq^6gG>`77>n8Ex+ZT{tbCA0&x%(^-oo=x66|`N`bF1R-JA+cO))(Db>O zhf&7DUOd8R4THCprb$fKqYKNxgOpp{eB+D0)_$+zoceG5h-JT>pO;?g?Cv@O%Wiy%f->M z?0Ed}d5ApP>i7>XjVo z5rg+TbkfU0^R}F}TiOz`SUUf0LiRklqznDGk`r%$u%dW|C~b~^IV;7!cVxEaYcxS; z(Ae7h$|@r3L$-E5s7OU@mKz(M`*GB&@c7hmdkQp7QebQrHN3S?>wkN|tham1g+H?s zi}lkmgf~8|taY8LhvelS}!?RplbL;e*t@E9~98^4RnzRw?dWX(Xk@K9ecd*CSovBZ;@U zj&}c%2z`%G5!7K_O7GDtkiZAk$GZIe5rn2MXjzQ9X@s-T-J&uBnu{*bNN>gio&(>~ zbG-5PX&n4Y14ffUN@>UnHBdXX&<(dsXC~8Tf7Nt{eOPv7cJ3^1$s^&d|>kxn0x!=ZiBXF)2x&`ncRXw^HA) z2XEyVFl7}2U+=1oWv?50M8Q8ef3rG29rDHF^5p5S&XNCUy?%1;BzbOmy_DB9m~rUS z5<1wQa|M0+KG?CsaN@cKvjDT>I_IDlc0i;7qpH2#x_+pdyyK2pAUQyYFq}YV@{Yq=Xj_AS}3V$l^;E}O3JDm(gM^6ztZ_0>Q7XV#ir2ltOsckAwq!pRA1|F`4#0esLpU(OGJp{_f<(w1 zUy@MnhbliAX(I@9$CcCM0oCb$xokpLgx9ZIK&4t8w^p{u{qN#rN60VEpCFH2H&M%; zBF}zpj_rH*fy%SrzqrL)02IKE+UQ@i`J?u0?_s|knh$tcG>sQR7_&&dMLhh5mIym* z_0<&>+L0x)c&p~G9fWblOJ&pDw$@gQ46t7j`?{d$?p6k8tA=1to-ioh8=I!uya~M) zEMWL&OIfXagqNxvO`Uj#;aP+QVPlTkz_@$h{StXyy$oK~nj+1w)L#L}B-|+b{kGPP zVG;7-Z}z=nnS4Y9^G7%irrtbf>OeGxJ&)K648x3}ENi1$`0P2;+1@7AP2L1w7>JE> z|2e-QnG;hGN+I0v>zepw~@_QSwyk1yv^F=HQBqjE1-=2+z|Ky6$)&Duvq(o zJ>+08!sq(~dva(#eG7eX?9XC-AM7yCA_%4luws;x6JA(WA^&<`ofCa8C=lolXNF^{ z8k*ZoP%`|wNc-c__Y38DHG+6$qzjZ{5nB}fg7ww*?JH#80D}gI?pCSy$aB!*n(|f^ z#!cplq7d1`>9LPWZ4X9<-pd-G^IE%4emEQS!3u2)bjxq9}JcZufM&=E6=RfQa^u7N2Lr%WFv8OePwUfLb(&W6A~=r@}D>S{H#>sxK(ROqO_neCM7)nTZV zd*3NCSsABR3UtTZ9{L0&SW(|$eaOCW$gjV>Sz!DAF}Tc@uQ9PwmOjVOg_-b z`js5rsdBSLmK4-k|5GQ1{MqA>kq{h%I+b^9!27_05`9;-w%UGOd9%tK4lVcI3v!L; z-&8usK)1H(b!d?Hhs>sJ)Dwf>qb={4I8KAGqrx;j@0|THKhShIGi7z{CLh_Nf_?IC z*EX`DYp@QWjchKAY~g*-zF--c9MhrsH_KAxSFQ%%+gTtV2kN2uv{$=T3aV8{Y;6?p z_&b$FE#5XVY!Z&a{kJy?Y}yaT7U`MKy0(NPDV33_rI;_+SeYj5%aKa+2pL17nJl78reF+DU=(0P+)kVXOI7zxn!t?4TJ&$5yGn zL?2SF*B_l$UlvdycN&`8VmJw&2oESkpI zzfXQrriN^Z(Uxy~0_YQG{_VBi2G!l|_ZDmtG@`yZ@jh?tD&XzV4S^$65YyJ(#^WEA z$vy8BZev*NDo_{@ApK1z&@udtQO9o@9L!uW4Mq@_H&F_NF(G+mr5}m&K|1=&TB+ZN z53=%`&5Pid_b$A9z~;TFpg`zR2kJsv3`(VC%ZDY!)Qh~x4#M=y^R9d4uwusAr8iJW zl)>{}RL(0uP^>)%$cJ`X8|e=%lov?zAeLZswK4E_a2vTsJ-jkK1o!36g0fGXmM&j9 zZdBmP-o>SVU!r}i?a-$2K9AS3zIDo&z}Mozn_SDhOOFOZ)AC-q?j338y>4AYH&WDb3>b;YlM4)))g-}xNhXY6aI4^pL;_!<}vGae-7d9wXqxiyuQO0F?o1*S*pj`j))}G5pGk&y5n1P;WM4zW(_Bk&iorYwulQPL^*x><;Kx zc-xC=d67_tGwCbjL@1B?dfRgzJ(}P>5LpjRtN(AOBZKepcPM>uk39Jkc})F~S?t-# zJ!sl{){=Mq)-U_VHx{{$Job4A;86NAqC6VWy!1bw2reI)$zOgOsRQr3r#6xg{oi{V zyXo4$x2r&A{pIq>k{=Z4@LIH=L1&=6Fjze0;!U*V8b(WKgL!$RB@LVOYQGpmhZ=Ff zCu*`V5fjMD&y(98-*3yn5P+{x87A<`^ztXYZ^Qw<`58)te36geE?&Of50uqaH~Y8y zIl#THHtKVH)5cIE4g}}p=WT!M4}N-OdI&BfoPaQ9UIIoB4D0vxKn30GduO~mgd0W- z!V$U(768B#FkVE9w9HSV3wlb+J2U}il)vpe^?&zvkA9^LTcxM@8b=PBMjX`_eWd%FrAZO7dYWB9ZYEJpy> zFj_*J58Yu4r`Rurj9<2r6+ZzZgZRvG{7mnq7M~(H<^0Ia& zt@jCB2%!7=_V)nS{WAPC!OsN4PaAq2`1gYI@!|d5_j7xvjlDm=|Dg<`9O8K{oDFlfLkB0Ov6I`HjB9UL6`6SxcrX9oudhk*)b$T@@sSV76k zGgjrX67oBz?VtH^zzd!`3fqoo(BTX@hp@oIAC}0! z7Zl5b?-$!{+V2F;ncOdMM%>T=L#rfqoofU(CL0zdL$soeE;!8SW-I}ARsiu9Bj z!{mk&MhC9!U7Y`y#dfwITM1Cs$y(O;Pahk&yKnKAS2oLYODk=^B8R~Zjz1 z$h+%mY$HrywTjT%DXVPvZ7Bv;8bG=sl_qc<1mDAX`09xxRVXF}?(SW1jMmd1t9*1$ z!Jr26ajwe8i~C7F?hJnU^ak6;$=Pv(8_2A0oibWR4% Date: Fri, 20 Jan 2017 08:52:49 -0800 Subject: [PATCH 003/108] sync --- .../deploy/images/icd-multi-target-true.png | Bin 0 -> 20112 bytes .../images/icd-multi-targetstate-true.png | Bin 0 -> 21805 bytes windows/deploy/provisioning-multivariant.md | 51 ++++++++++-------- 3 files changed, 28 insertions(+), 23 deletions(-) create mode 100644 windows/deploy/images/icd-multi-target-true.png create mode 100644 windows/deploy/images/icd-multi-targetstate-true.png diff --git a/windows/deploy/images/icd-multi-target-true.png b/windows/deploy/images/icd-multi-target-true.png new file mode 100644 index 0000000000000000000000000000000000000000..5fec405fd6682a9c8ae5ccf720da562b790115ca GIT binary patch literal 20112 zcmb4qV|OJ_w0CUVHYdqRGO=xEV%wb9=ESyb+xEn^GqIC<{&(Hy13WKIcUQ0KUe)_l z@7_ODgrd9zA{-tZ2nYzGl%%LK2nZ+|@OTae3b>s#xTXQ_K%JE(gh6U%2+n{F2y-Dh zArO%IIQS1kNMIY*LGqU~2nf>9e?QP7O33P6{d+fgwFLkePYsP}C zcfJ6dG7W2&cC3wTjhREkBk|&e^FISBUo{HnEs*f4B>{Lbi%ZV7c0JeJa7f71+NP9$ z!l0GJApew7qb}?IIw>o%vlCTQyCO#va?BFX`vM z;Hy{wDY8DWq>GF^9U4zO3ywgK0Z=_+jEg*P%OFpu8`oF@@Z@}+t~MlkYjtJJ6*A52 zSblVJfD^j^wE)B@X(|(`;7rv%ih!xCRWQo(G#fTpOwEkEC@Ji<+MS&xa zQK!I*8L>Q{CinQ4<8`|C{V}RjX{=yIs|)ahhkWhG)COF|oa5m`{_b3)UO`}OwE%qQ z=<>KP2xM~1|2oMswqvnKA(NV+EwtX*kQd_D`qQLQ@k;mZ*)gA)`o#9X-9s_PdmU_b z#)ie1uiW}EhXnAZ4FyO4H&Xv^TnU4sG1KD7f7$O=excBa@h_X_SNz7mYqeXn(1Nd) zL;`1LILxuDS>oH20Lz-8NvyEKfAwnrliFFy8-P3vN{NPkDz!D>tvP-g#>ieBw-^c0 zZ6sugd6Ww1#z;{kOd#rD1kY!xtjI4PBtMOC_H3y0ied$+V~Cun$lOAbJUBZRe$HNx zVZy-_Bf4e^E}WpVws;$p^mMXPI7dC3UJ;~6le^eYA`3vnT^i5*;_2q>b`Y}9aPO&~ z;;ZH4bJt_e;4HM;kimY+hgP_dw_{?u5>FST75pbdSCOe}wv36fdnG>D0io#X%Kn+G zDoIp@kS7Y}vw3g?alXBckT!j!7(Vo4f}br*>C!SS!4L?SkyHs~%_gdN%_koi zjV*44T&H13Oxh7i6YKEDb2}0#^3G9%8-JeGH+s%3;D=3oL8d;HLZ&_xx|=q!!ZdWI!i9p=~`$glW@@*jiEBe*Jle=&?aoWZY`tZ=C zcQ{xBYJ$PKcYH4GQ{Zi35G}C9&J`Pbg)aMkHv#JgmZWA0xsOVUHgtu%C$eKRQ=sp5 zsN|AIEe7qOg!OzG@yoP%AX@J$(y`uUHpvd-@<52b^<+LH+XK+nD8T0-kBqm-qiKZr zlQTFW2BTk5kln@<2W%(4PZ$;P)TE8w!{!%Ylt4+^`EFOS!%`T#d^EH>q~M=f%$X>s z?5RyjqChjr30{x)dnBLeEvemtU_BsXaE4TaqHS*w93g6msAs1R@B250v=djDHdFRNj-l&RWZvZ{L0oWq+Vre&n6SlG`XONLHX<2Bt3zz@+0 z2m?YvGt@5C6jW({oM0_HWh9!oIKS`@Cd0~-0Fy`mglL3+@jKRQ(;}aaNHn@rk#aLk z$v&}yJcb3t;s2hK-mC%D{lIA!Pe=nRAvh=ft8d_g_jD%lz~b7Y+r;fy1(*%gMu!vV z;gK-{zy@n`=3ui3AtvckQM|hxU=xQ!McWq-K?Bgx12!CQSy&Rx{LFHqN%8@t-tzVe z8tUA3E*nKZJC25ac6b9T+!38CZpa@AkYi0okk76>DgUm#|f;V_%fj}ee z?ZULFO3}$S@q5cj{;PcA0ET9)L3-4-dcKJwOy>`Xsgh;@T0kJ~@^G$RPhM>_z-Cih z_U1cBzLjBJs6SPVs`ElWB6JgfxhhofRTv6IIE<+AhLiwPsUE~ z@a*i7IhO5wlWR$4J+EExOcV-F+Crb7zV*o+muRz5A>O|La{y<2BM zsF1Fn&i_$RccjEL)`PK^nXD}eu2PmZY87IP=pqq>s}x@2r#trdt}CWRm3S5V^W*C> zbPwdnmkUbeM2dkHg=qJem%P6*YNaDYOMzV)3&X{?FsLOUEMstg{U;uuzxPXnb^bmm z{#t_I)L@VgM$ss^_!T}P1d zBGfwkNFxFIA3tg;@sCn)5^sKN>ZmJ;EQ;e4azSS$YV1K8%EL>J(WT!1HyaJxAAc-a zAqS%mHkEsfl#N_bk4BL7vw8^rn9dgW^{x1Zr+72eE`rv1`#SHg&xwxs**}JuH~+$&R!Kr686!h8Cua5cY70ipL0DhE|*D5 zg<-{ruB@atJu#WgO1%9Pril*064Fj@+!F*ANp`YKDLbfN*K%j5mgq3w#9nYFp;z%a z^Dca;pyWT5zU&^x()mt{0`kqy-*zu)jDyS5*x>0810-Wg*nzcYdA+z`CJ5)x!16vk znqaR0rFeS|6Gb~Et{B5qlm23#v&X3S`DXO}(~TFSdXkS-E2Z7vG3Th7)ZGrg#Ga1@{0vQe zmKNB46%8~@#BP=Rs|K1l=7gw1wT{2Od8%7^gDqkaR=}l6DX}9PLPOnpgbuY*w$UOl(LFPUJa~HZ_K#Zf?L^lWOc~Hwtcx1lk9|uHkDI0 zNNj&gB6QfePI_+3iL|exVk|Hn3wk(w&hBz7S|FulWf4qBDwKYKM~_NiOurF`37fHO z{oAv11jQ3E4S9ix#$h)y>Tdr7)!mLN(I03~w&!VppRmu_Qka^Y22r~wWqdhA^f2<{ zAlLAMWNbFs?$rXj7+W=-6CQ3scW#mLFCe2o00B&Vjprtror7C;sg9-*B6N4mKEcaD^=-UvN-)uYgc=6#ty)6#a` zm?9C4YSjUbahx30sE_la0aGSw+ei_2VfV#d6PWdE>STaq-tm z%pbQzv$?mv-cA!bG{nCb#f>6}WLLB3kMXO3O(PxZcn~&>jiVF`Ju)YEkA1l87#+iC zV*7}Q8+KeQ8t7Mum-S(>;C8rap7&3IDuyJ`6Gil`Dx9;6iKv~}Bp5-h(>~j?;ex5y zizE68P-(C*%?smP=-7}<g1r(~PyYod3OjC1fmq z0PxMJ2@+n(ZkMje`G4H6=$K9D005uM1i7t zWaiyY8b$QVEkxwt^>88jwj1Zd@jN-y98fvG(9Ldy57Xewn0U2%h0=OB=U=h=2=|+9 zE3&$MAIj2Nba9=)X{CfR0K`yqXcYZkY10}TA(;#*@UxoIM3D;ToG(dQG=R=9{UZ?(P$lY02_Ri6w$E-{St5 zx1h4^qoVY3i(@i{U0Y|LlNYm+OBP>*j5NfqE*Z$;96O%eBxoX-JyVke@+fe)X5fhf&9q|5F$Tdv@&gbUbrJ9+(al)n zxt}gxXbG`OruG-wx3waNY<{sCc&+j3>Z-#ir|RWg4Umhl|!( zvEDpy0gx~J-v;3StFf4`gYN-WKk`yi1H3sGcZ#)fWr_yFn^$KhK7f$$)3&%pNTf!N zZD(!0Wo%};aLdC^RZmSW`E7cZ5brb&g&3c3emGZWi*LF*W7%l*=?bIQ!});Oujgjl z>#Uy3d8)ZZM#~pc&d-)D_aMACg^2E)c9I63t)ilq zn3(C`hS)2@vWg7#BGQ$T!RU3t2!g+i{-Hx}D>ID!z2a9khgM1nIoCB!PTEYAW~qPh zD;J&&BGgt^i}bGTm=3SCdb`?!%NpocoHerq5F-)uw*T-q3DjmSQ(`UbjE7Xo{uWqK zQESfHfdB2_yWGNsgGZm)c&e1yA{Iv6+>hu!KR*xfaKOptXV6Ju3k{h|mk7Q`Q|d&V z91jwZ3cjSV`7Q9XG$POfNrQR<1{(b1ds!kJ;p{+OWSYzpE@ z&#$oVhuu`K(*WkDxyxC%#f?gp@{*E_yS1ra+gtgy*rPp4*oWy7hP(LfMKMp8iv^Tr zAH?EOE0K4+g7SycE9lX;c~fI!%ik*?6@Y43NS!nus$u2XQ^7Y|g`TC)J<13dfj5z5{R zC0}Vd*z{H==j+RFYHF$^BoxqoGzZqmP1~8(Qj#*)0?>Q8iJgL@t2J}ZxmoRQ$83Jz zf5vWfD#v0Y7LHs?Je8_!e>?iXA24A4iGow4bj;XqgBV_`- z^q!p02nVyP`+8HnNV2uhECDo2x_5Q$gMuVjCyG;)C^!!ir{5C4k9bRsn6%zBL)G1w_pw`Dr%GYERob=ie*ZXPB zeBrkR1HejLJhc5}4$L(01sW^uvL|OmA75iK1ix>v+fE=DE^tF&B2oUFSQNWK+hzRJ zg4@Re=P~vU(@+HtOqgKW?A?RBfQGkE#PfM^%`}6ZDl|449%WA$TtrjC1wOAaE;`<4 zQ9^t^0$k**NXQTnlG>xBM-~q<+DC{#&*xu4h)H{r!}>EAO57`4P`Iz|r7_{Bt0WF$ z4|MjneQ=fX!Og@X=sKZ5Tb_3U%66 zzariSb+~uCo^(Llt)p>==VE%6+i^V$An1a%Mghj-p5?EOVA1`-L*kko!SXPTcCDm6 z6ZQm_xKA5mGAnAxxa}7EROVvXyr~T==}!Gt_Ytq$FP5+jRC4jTrE(RqG4q)$+70no z0;yD8H{5K$uUD6G%GCJUT4qQ{$nl;Ew%3o^{fT^rnp?HpkrzcP(uxk5Q?*F}eihZ|yhM+w~tj*gEP z=xe)#udlBGW>aZU?7y8YW-vT9vp&}jbNGrgABxzp?a+q{k|@PFYVdc`sgPg}*?B=U zMf4bcgY;t8NEP4gJCBVH$}xb^{Bf2LUC_2(I1T^lhi3(+;3UtrHDibV0RE&vOhmgu zx|?Hn^if%pbAf(;_NO*+92zc`eJxr^32hOSax-d>uP{SetG+N?PpdwT8HXOJX0Xuw zAs+Db(Z!dV^G+%j>^Y7oVzR;0Te48#id%KL2}>L!VXI{BntqeBki11vc=@z>|4Ou; zqb}P`=6&YmrsgT(d8>}?7E+-(jx)=?$5pD0eN`mQZ%(XkNm*Jpzrq_pMZ`QIkj3-!B)haz_C z<+=J%BAJaA+rl27_l)v&WJEq|=P_M;n#i`cjwn4PC811C`x39~_Aq(wGm4BKhJh;5 z5SlLfg>Ch919yF85T42xN+=)X1-4ZTaHkdSt@Fe1Epts8od0nuPK^pYbb;Jqzax(P zd0C_A4%=i#MeEUS3%|V+C0Dvyv#~z^%wWOKzv%H-i4Is&cVe1%KOpPAi1X?`>!B4N zr$#AvT6|%79=~HKnT_376%L3+e6+Ermh?2FV{WN;JWN+N@f9XeJ;3L)g@uGaHe_xk zT6TRu=Eh_`Z0RqaW~FlZ&D=cdKgsx(ofNp9HGJ>{Rq##} zEuGpJ>$Oc9fqN}McAxX89hUKx`c=H3uH?%BcUM;AAy6WjIpt~1lRf+RN=~ZJ(3rjn zHO5JrI63luQoTz5>i1y|m2I1H1<8+PD$tTUDhEjzaE2-@X1hjvei= zdEA-6AtPghwlb}9_`JEWB^xKj^Pt%rB|tzxjOl||^H5WVK_TLq*s*}cPhV{&4ZQvv zL_Yg`-YE@%$6mOo?cHYDC(j!ex3vmMeceBZ8@?PA6E5s0_CCpWH_?~rd#+@liG@?A zQl3IwiU$?-lss(U^%)D(*_4qcd{1Hut10K1{it#+S@z(4pah z_%;0)pKz<70n^rwXnJqby4%>xde*~?X7M{4EV&2u(9kP`7%lRdV*YZa=ZO-5-8JV1_A#XYPtOo6Zo^&~?RR)a_7h zX?4}IS%O-I2~^rm;knLBO2Tk7&GGy4XxCKWdrZ1?hSHD}t`6r!2!`fkV#?0!*pO4i zdZ-;Lfi_HBph+RfItsqovvBMGR08jv+$$Dj@a*i>X{dRpCUjPp|`^q|4$X!*#so@berP%I87UzqwbM6!#@Nn zrxeM7?S<@8AF9r85Tj;*7IU~s z{PjBWkafLfn>L3!ovkg7W{f82DgY|D2Ksre`4PHZAForc9{JOCmt!=^L|Ei>%=)XT zHAb!bw~by4{x||}uI~KWxJUZ~yOJ~*|M2Z493Ftg)v1VczdggvXA0He8q$6oVxW_t z5D{o zF)l#inRR~|f?zz>E#Z4d&+Oxew+~hImM)3i-+uqR(~sBtv#ZvfnpOk+z|5F@h^~f) zFLvnj961wg!smzUtxnSyEO0n=hd6SggYc#%fD*SfEp1X@f3sy-s(n;bq&0Y+XwtE* zqaq=+T3}tDLhoVQOwun+DP*5y!8q@1nt(Bh7fzj2PX{7Jv{=EdT{wgrEJrp~c&Hj=OV#}bAb`_B&F3F$*!b*i)-u*!3Tw(qZZ zQwuDSvSrAPj0XR!jg`pt)bw;(KU52!hk1#!)*atM)5(-^4*zmQ5`KQYFS@)e->+Bm z$cTvY>B{>1W@xS9W-cATN;3v6w*g3Y zFlnizsu%}$KYZEZ^$}2!Z_a0huf>4M*&9!#p*rrEI4BoT9Mbd?$~B;QiFrh0!5ceQhHF?2?fcK2V<(OEgfx3Dwm};X`b<1F z7ENf=2kR>#<|%DG8UZq7M84fnsiJ#fO~SCyEifZRc=^jub{K2`A%Y?BJ1bFxc%{&F6qF4b|8f^Vq2FjE0sWx+&h+1vVj}7^)cvS8I`SlJg0QJ>Fk(MTVgu zOo}CFKFTjGY#ZzIoEEqiz6y~hq{qN8V&62q-+Pdb&LC7pK97GjSg%0u<#)H;uhx^@ zE?0#V1U_B5QHhTBqlpFd?!wrEAQN|XxtoDs0Aal22%DWA-M}gkexp+P?9(;#+~Q38 zo?k6oGFEo9x?k5b;`(3F?f4QykaL%`j$|;YOq+C^^qzLAxGV|Svo|93qGf|*tx`=)pb9hVr-uQCF2j!5r|@oE+j@yq%kY91d$v!GhT9Kw zXIn>W$qkWKcN}3+nBj@MpSleX1B$#ph2Ce|@Dog%#C)x(vM0Uo zi@F6SdHy8f&NJss@2K|v{=4lNE56$ji*X3WG9zw(?hS|;NMP8`p-?h4C+tG-a>}4xN__lQ#bGJH-@cQ8_pOR|4O)za`D&zM~^-%Rx_0)yguX`{?Ql^ql zI48mpVkK~ixx4XQ_n!tgF{Uab6ljZ9eAk#CLt4_E#j($caQkXZLWc5wNMnt-M!?<~ zKwgV$^mMC*mOI8&5nRJs)=gnCYKa1IF92BdPi|U)q#keB_a-Z4^a;x90Q$PSyN1m_iG~Vg!e7j+<(T5Do#>U70b07 zJ2vj3Ny9W^R%iH=<)@@X>eE{&8LSnmtfa?}oHY1WM5d&P^VhMGp#+l$j+VVwIf>*P z``Wg!O%WLm`7kGGvf0qSe#qw^9w-FgA8h|RBUW4pY!5N$j>Xs{8?ELrOh|et-o{4$ z^7u&tni{1%Z7#+QWx?6+B&LAXkA15*SA~E!)iKn_vztRBkGEEhB4!Wu)H#Jsw}>^& z1$jl~orX+^Vvs0UTTn_3-4q4)U>Kkk0BPu#Sim_vjR-11E;ye@4ZX^wvNpX6vtWQ9EKv*^ z-Z}*3wa~ceHEGfUG$te;V5G4HoLJ1@vKBE|xHWmRXfr!t8a#qFz?2X0L0g!+v9;|E=q-;g=53>VHKM5taon74J5=hA9>EEyJFn zbj0Mxsv$hC$RnI9aHzzPjB5!F)G!s%tH>^@`M^G5BT@vMpPvUdIO_79j|Nu}*hPun z-&mY>a=5zlE^hC{n<3lDzdXE<1i;BjZUXDrUV2Vw$ko64pR%H=96#L8d^=8r{-d9XIBb zNHP&BRI%2=Z#_$0in&&@2neDXt^=+;*ss!&zC)XqAxgM5)8f9E62`TE|C#&Lrx@EQ z?NKPk+=!x?+eo{}pKmg6vUW~m*=H1Y-Y4Zn7~GdLgkd9lsbEBvlMw9WV1%ebqQQiq zy4BDo&4>+l0}2K)ixw;Y*$?G_1b1gvd`g0fF!t0A)jjiiN>pL;Mm`iW4Uis|e9kfI zVpCh}002m@;svZ1(NtCUapRSppD0V}TKO$R(|p2rNR}a(QT<|EH74Dft3N+d-fnHd zWKjIH?>M(LiBV4}7th(N6+~v&msBXO&JwdzyPIS5+VYTH;hnF=7J!n)t4o=JoA9$K zw#Gyw39x-sr>5barG!tzi%{K?xNij@gldJ#QM5}f{7>L;JyraV;Fi0X1G4uq;)~n_ ztSeBpaY07~DN#%vWlu5}k@|k0&3bsvfQKt&UNi&|4ZW#t5KsN2iN*_7I* z-sf$vyE|=fieIQ$X5KjX_VXiQQSn5zhojGY8Sm=$zzd%oCYt+Y9B%(MjEzaYy4?Vi zErmXzc7qA*ClFC4K;;sv8nB}Faf3wn6E$?e2Hb+NTu@z*U%8I|m})U5`OO zSVWA=nUVKhUrsrj+1O5SFvM#m16o&z_Mgm5`uF$e8+$t-?|+3@s*_n&#o*EGE3&is zkE8YA!blxBmNwoOZ=;*-Zp*{5KQ1e}?&)4YCBmV9 z{ic_h*ky!M;2)%0GH^OH31m6hibvy+7P2m@66Juj}g|Xa`>eX6e_B~&ow(*!df{<2(I>7Sc4*Omn_}{({0S7D6T1W9C z)nvKqmyx4EL}Vmd>(MZ_ev$L6z>ch~H$LXB$hf+m*A+Xi^hj6=@Cn}wM{rl59xhfC zlKOyk1}!n9#w2hihyf#zojw85sHyL9go#^R?=*sIKG!(QFO$vf`kyB?<4IJ6n7j5l zwCUY^wnSoM9DiZP!<4PtQA*$(`^wr5=!p%>H0vgn^9vFKN>-tZHFDYmBj2Q_D&{hl zfQ*zppnQ@;W@)ihQVj~Ze{?OqO|%~P_TB%xv#Z4Qztg(DD^Nwp$tqexkZLQZnU#eq z)2Tn#OEWseA#Vw_Yi|~ter&Yb7Bb%65*~DN7>tK9c=`_O-QDxf=`XqfZKjoH+q7F2 z1O6z^Q6kx#=Rrh;T@9g;la-W`za}25 zDp-yUP6M1`8eM*`Km~%a|E%yLk>jIFnBgZAPHBt{FJcSZtF5m|xt9ppoXSfvN`<+VjXTBTE5~y*UeyMcMo7D-v!Oww)j zH+bw&6U#vFoe|iUWu@*K5~Sx#>($&`a1+wOdYjWc{A9&h#F5m)VFQI{U}{*ebW!ep zOl#ABhFfIjHS&%6kLOMk=?NxsPJ%H(oC~Zq7Z9u7$5z+Ob3x`bm9O|=bp`feW*wl^GS=MC5jtzS)ID;noQd7Ck&At%%2&*vb?x7v zrnaI*(lv463Y2^f=4P5-(`{?E@}ES29~(X~Cz>gxE;pra1g(0THC9xYM|Jitm^TOi z556tkqX2#eqD>j-SDYGTJ0tfL3g+#Srvv^IWu+Y$cf3)v`*!kz)2u==3zKIMxCb{j zNEsyT;d#!9)WwkSJa^N|-G}_W1#}6h-;u1S?ty*?7yAn4_fKqb;dv3CB9wM)70}FE zA2h3@m~pvMJ(AkPCpf4lzG@!a?GBgk)g>#m4TY@H(x8ZE8=qrw#H@Y?eaxA{|S_yL^Ok zF)GDI%olN>t~pXq7g@UR`Y)1Y&-#@ZL>IUCaCQPk7yKNaq$;1`8hcy4NEsok{N$YDGhn~ZE#9v69XauS7kxAXn=?61MfJ;<4<`KQWC>yIoh!HDoq zg!MOE9mejF z{A|uj)G{^pg0;X6I%w#ms-_-g`?Qq~h>S4i86Iqi$ilp*J{ZAE1c6ZNs?5RgCY7 zd|#64C!LR}?Oe=v#ibK@ILX{w#5T*jsN+0!cQkoclqjFTy$%iuVhS+m1Nk*tDLKpc ztn;cB_^Cmg?^4tKq$RDOkZNxMF5v;@{XPE0UThnJ<+Th&JP?Qp_765{mj7Lrza}Iu z?x1+q>*?~3&rBduL;1q~aTq+fmDNwz>=}xlS=z?7(2{9|Jol9nWkXB$NHvitO_n6}2Cu$X zpJ_OI5hs4c%R`Cz03tL%NM76}7KyZp51QuzfX>uVM8|NthS&4E6`+K`78(|z5cwi) zW(cX4aV)Tznzb)IL0g{C6^~`Nnpjn~Oo>qkytf81u}oAg(UhGOO{e80og>klo<*Q{ zON|4szw*?Pcb#4zSQN*jp)EZ8-no10qJ9;FA~HcQe|vb(Mm*UlqH##cz9_B^2MwFz zz@xe;ddPTYH?NLpM3U16e+M8yT9cN%H+n$Y^Xt7Et+&ICcO5BJviWHb`UYj>b&1vG zRPps8(iJ}`e7`tVuVRacn3y?b@~kx1?wWmD4dKY>d%+o`9pq&-EBPeHt7iMPu1Sp& zY&s=?6+6P zm;;NQ=jNOuMaa?RI>sJI?fOA{49mIF^tBWke5)J;QshKpQZj+@ zM5q8fz;{6R4ApQ`6X-x@Vv-<*=iH=*p-O`N_jt?UX)yyfF~AT>brTpd48@ZP8 zd#}{zVc$I>DeKqJyVVe0r@b`x^&_9yI4Rp<2;{CqGtd|&+k%OyY4PUw(*zhvHaQ$T{IvcRc=Y6} zG!IV(f144=BMj$xUSGa=?X@^p@d!*LtK4mAUXyYaUYihb!3YHjEa)Zbo}BKWPrIe< ze|9*C=|tpfG^@k!G2E@QN_;5b`Yoh{qsa@X#i$ef`dAP*eD9yVP}lw7{;cJP_cfck z($C(1L~Cm{N7cpIhi_kRGB)Kf@Si=*&O`g<;wlF6PO%RpTI*#vPo}OP=8LyZV-pb) z3Ewlo!6xcP`pQKHPVcRu7fV-gTtB0+n;zq5z8VCEX5|>_f=s_YUJq|>n2D_i^_zEn zZRDpw;RJP6BvwZsf&3#Wv7gFvD7X67w>kkW_T1ca(*_+7p&Pr}>a^eP(hJLw_XXc< z{lqs>Tg^CF|HlVQ53<_HfkFc_Wm-6B`9=A8+GJ?Bf0Nq&CWHLTF5?`I0PoOx69Gk% zegyGQ7)XOpyy+%(F0iS1Ele5n%rB~V$;g7%hw@&B7&en|d3u9f9BjN0yy-Cl6ETlo z&vu#=kRLN@Exgm$#nuGJDHodUv2iBay1iv;f7#pIKsJDc?ze+$!Qd+>k} z{~i4-OmRFIN%vZ(s@`7*N%KNk9bua5pLhB7M;MWQT>}w}on$1H3ONRA*l~rr^Xyu| zy>a)dC@hsixgxu7_azW*Dd4`5h5|(B@zJHY-Y1ZjnK>8hJH5ZVk|&#$BB`Yqb1@U> zlGmuh_?Y^GmIUhvTW90UG=1_Jo>+FosE1W0U-*~jZf$^N6F$$ASE8F^T{C@F5;}Dv z4%67qk@BwjF7|J_Blu>u+FY|WM_q7 zW}3J2ovDA|N_65H!|9^hQB z1$CD>Ym&GvE=;c(Ns;OWHk9u<((6dmF|z@o&RC<~+AbKC^G0CLyl(LP`EG5hgPO7h8x6 zVPfqQfk4aadc_<$!o%6464KNp2yZ1px_jW#Jxee)D%1W6)&%om#G1oHxWkzi>JA@| zZ*bpJptS;89fn$-wu={Ox;F~JfxzZ`BrDeEdRSDr?`=YerL%+M$89g#Mxeivpy*^% zt%hfck1_tLIT6|-HO`1_Z35CMS&9IgxM$uLTgHrmUh?rAF;M6F>Gs(=mCh!Sq$DDv z(wAYuK$rx*&+L%+Birylv(4{YBWHVE8wxI3sV}X5UNjUUyQW;Q$a21UqnenEO=C#x zGSbECUCWNDWeip)>oxyveqX=(hoM0)huM1$b&x{6D`TD^!)uHcy{g zP=XJp^L#Kn^V#(?%+I?$jsMJUv1 zf|0an4-4tE`S-wxVl|SR*Heo@J8PtlWuj29>ttn1d`cT?LlXP*6&a)V^x$W+#o6B2Dt!s&d%rj_Nnk~-U`_aIV)|!vih7g6t$g09F zt5OrgJ`)hPPaYrjf%!7mlhG9ln+8XN@BNJDEPDwHS0R8~U%hBlgII-n5yWTV%@D>d z4rcl{$tn;x4*K3Hs?vfPzT+>M&}{U$-m`B{W=m0ujJ=1qzJODs+I;iPO&)MvgOZtH zF$|$7l!s}ms79*RI&a;hjMR-IT%mYLtkgSPire|vZ=u5R}O01X*fwX=m>lgbtf>a>(5 zDSx#%$J`}6VfnsAA`yfRKI-|8(4d9UI0Pv^{}Ny4_a?#(v-7lQ{E$1v7S{c!I6cXJ zeOS7qaC1evJo`cv2}Q`au4xy?g6YuOW&Md}X&Y}ti9~okFcbmLjwC@+BDK|x797jnk`#vQ8hbQ5+MQ8 zfKhxXKJH`sKIX7VgXR=P*R(5~V-M5$_kfYMWZ@M51TYKJkL44dg07%6SoeC6BU~ExBA_9vbWx42h%<{IGYkL9oz9@=3AHV zv2JuR#-dMHqQV^CgR0g5TF_4jaD~{!#THBbOy?>EZc_6YhrlLi{3qKC%mk#~=MqF6 zGn4!+GsJu2ihvwfBgf;-vB>Uv6UHgKHM;?Q5YBk)gK|C03>RI(vHT6KW6EM^=wdas z=t5wWm$bj*>#@yx;@PGSEO4C$&|jOGQouC}R4*)8HL>xZvF5w=DduXmpH<3wvE>M7 zuqMW6@Rr!4mEmk2#xx=xsQ#ysGmVFG?c=zTtuR_hF^=UZSq^oK{SY-&B1;A{l&!-w zma&Y=z8?}HN;r%q>(JP@MwE5NHi*n%?CVGoV#ITKdilJ0Uf%cTx?kL%&;Nhl|Lgbr z{w|aW7DD(VN`ElZDv@hD~@fY}cVYM#ESbi0W9{nZtw(r|bSG+vuCdgg?kO*}R z_2lFrD=qyyKh}cSe|&dAypyk&+T)D-w1Yipk9coyyVt{YsoId9R`r>Zg*vKr*Y_uj zzBIbAOFj_;JNRu95$Q#(5>wb(UwFyZht8X|AR8vY4s=|k2X=i5P16PLL(;qvke!#Y z|4ktb74l_HLm7(KGl@WYR^S?=@WUjGfatFE_^ru5X$kp2(#_;o{dMdA%sZG!{#s~i zYw;^JA^Lwl_-ol<0>;}4lp$bC$=%&&Rv$pLHz!wC3=PDd{JuKgXgOec}@r zFRZFc){i?cz4C+ffFiWBvixvSXExHC7pjpQ5D-uZbgSu^nIb$s6iq`~@{4vf*g>{y<#GCirmFwhjYG+qhqHoF_ozI`3wVX7kuahmab8~RaFd?zV zWQj~BFGid;PGCI!{@tf*4ai_R;_m}lTU5Xep}SKrCwT~_cY!{G2%bGVa?d>Dv|Bvp za3?`mcKau)2@`(8k`lN*=D6?0-^7E@IB)ZV^M%jBPG7JS34mC`rJ?|~QE960hNZ`O z^s=v;o{;0dSqYf)^n!u{SAPKFJV;NW<{Hpj?K3(>hc*nk8bw7x;s`@8xg&4^4 zr5~zHIIU!PD`K;KU?~Nl5>9fmvR-v->lDS>@@W?@&rMGiRDQS>rSa&CYuP7HKz~O|hig%Up~J~uNr$Mo5Iv{fm0b#;B;+vqb# zAYOtX0u~U1hpV~UVJ72*qLeN20|T0?gMyEmVonm>EWyF zoV*EI*YxySne98dxw)9W(DY!S13FB2d)#!*7C@Q(&EH;su)Ct@`C@&2-DQrPQf2>< z(_1m-3Xu1a zap4u0#==6GB7fl4=LJr=hXAh-9V|2JocToGM!W7}u|oePyu#icdse=U}gr`F@LrS!x&YNM=~tcyg4} z4OGXl;RIBRW&fA=2SE*B?P6KumttEYsP0-rX5pp&p!hS5q_1*zm-M=1V>w26-IzB{ z;xiF?pr8N#iA&Ij~H(I8a~)HIqkKI2b69F+#%Io@!VEeWcx- z-xd??Skm17GWPYr-;RTp172&=ONsHNT;IM4x^7WC53O7RL{zO`1^gU$_<-l=k`74q z`e7xtz7)%Q=(5q@IYR=n0@iPSTbnuv-uu>(6rU22XAd_M5pjr=n1eTrjoB25pkQ9| zbm;b|lKfCjk$FKH1~(bdIRkK{w-gf@Lz+~es1CjO3@a~W8!>cr>w*#frcjZD1yUcI8=(#DV8B3b?SJ=>AzrpxH?hneGT05?+f~_ z9FxL%x;6{1?gyPT|Lekqs8c|}bhLxE*j^oMwU9z(s4fhHM1IrCfNA=Ai^QD-JnF)0< zM~8W~VDmH?f>6vR?NKYWJYKJ)UZpPdi2EP@$@I#gpMKW+`z#M@0rqC2;}Vq%J*td6 zP*>&y62{p5orQFNUM!eFjWV@f_iD3T8^Cwvf$jLLQK*R6@h-Ce8p*(QsuQaml|B`A zb<|4m+?Z&cG$O!SDNwCv;EiFA!gW`83~^GlP)ev3Cm_;HRI`x*a0g7mXur6|EEsZD zCic^tyM-%{Y3Ks#SiN^!q*oQvZMjF>~ad+E%Z8~ErU7#w@HEH&S4AOT~pW7q#| zVwaJluPfSiL3G^p_%Wl>pqk|=B1vMX$DJ>%33P*(yr1#+ns~B3B%%eWa_rXVr$h#` zth0x|jY~Qw8QL4y_OL6Yi6EL!G^^WPF2R)Yv}*UNFNmr`B6!MUQSS9{{Xdi(LOF)H z9mD{amQ_Ht+Bw<%z%u?bJRzhIX$Q4Wmuho`I6&iUUo8z5#BLsoj8~(=Mr@=I$$GXI zaS8#q5zl3T0ODYJ%|aF#N17pzfPHdvoBitX{W3Cntj*5#0ceTStc3mf5qbxV&wZ0(i6A`YVyd_&UDihvt)MY7eF6%&gx^ zof!c$yZE&!V5n8_9T$+g%?M(ZK11rpFC3AYGJ ztKs;<2e4E3eI$QJA)me^Hmy(RU~J5cOYX>MhiY>D8~$e@;%RRuMGOZtkYMhS=F^80 z-JxBkU-{%&N{!W*65@>>d-t$WAL6v-*WPW!KPx8cD6%d~hMnXR60^3%j|s;S#Y%*_ zk6M5q(Q?R7ruJ)pzRbX_QCc8V_B9Hk&?%CO+9Kj)So6LAV%#s=!KLZeM^aI)DhPcq zl7)3SQQFe~UjoqrsrWB)|HlmE&&YfQYJXvm{gYvR^A3V_r3?7taaqY>kJ!x-n^RFB zP<)8$i29DqA3%9ev)?`w9uv$6+@_Y+PRL$9$vSy4F28i}VOh_Crl6pp3PQ5_LL(9s z6|?`%pbOB-R3ugppwDjqwcaT;O|yE19?XYfWRSUN!$sBqhEu_Yu!tco7R7@GD9;R= zbk6;K0ytev?=ZXEjs~+jxM&}w#FC*}YDf<~+Q;p20~2Z3*HEhsy9VVDtNj9HY{pBIIlFl)K9UX-hEA<@u;eNxU%(~&b}?cKow+oa>i-w zx)i<00a;`KiG;V9q?`wF<75AO0@}^!eJ)be=0W_8St>Y1j_oGg_8~G1Oftz3OvAIpn$)uEgy6OPoU0962c%g(*$Qg z1HxQLRtN;7J|6zV5E5v^I{egh1_41D`gee)(jno4fT#>eiVCTC=w0PN2VjUTkM5MN z{Ysaulb$9Pf)EphL}f7)91-d-|i!8Yx4KPSOvaBFbB)Y+Q3zd!BaZG8j$i^ceyYIJqJg61&sqC1#s zQ8v6-2@8tCISXE4I@DP415~X@3pTv?St-$?IggM9-bAkFO%Y`N`-t}DJU+-&zzcRK z&Fapm%p8H`;vzRS7j1wY&dRXNoCQ*@7?F>lNEmY2H$Lwy8d()m9%tIq^;QmLkNn!q zLazDp7M^l<9TYwm)4xReMO+%2G>Me$-?#Nd{rI;{9+oB&J6>Kr5}Cdd@TLsKNB`d( zV*`&+O;=r`scp)tu(Fz36ahEIR9{pObFKbR!$@0E;7_-&-O4MSYl8Ylmx$L%!d#LX z%XGBlMkQnspYMC5+U#;ye+PJ-60!K1p1>`pGy$eRy;AXe1=N$d;{N58&vJg(Lhde! zjXL44?si_9!)pO(535h*Tocwe8dU0pVru`ljXys+4%=R!(s7Fp&MrwOti^diUJ5J|QVt2QwfrTF-Ei3UPIzs#nf*1Js4%Kd7*yD%`{THu<`d!v9@ zaO4vio53DMd3|^bPSs2@m$`AM;E#B-WDCciN%?8ZfOt+o8sxZrD~HH1FY9lnqDb2?y@?t{$E-494E>Y@NKQwbg2Ant2^1H1Y42QCl{y| z*6Xec*HWsnA{a1z4)4#}@Q2TJhYE1;yiPU0OF#D#(fU7vP3fsQdsWSufkJG~xMQ$FUE#m2sTOt%NVaRIMz&80(nER=yYT=m~WA-p(g%YQ(P7s&h6 z*$isI05<$170Kzd;ne7>)RAy?dP&_Z-HuWgcBlJOaQ14A$+FZ2$tZ%pwPe{|Ulv-8 z(^eE0!tt0k!s;9MWYtG)<#dONd)Y~{(2YA4H zxnEY6w@CBm7tddlv%SRLqXdLF6!10^V;#WV7wH^|5js>oZjQ8D{r-imP&F>16aGL8 zc>t#;i;sUUF_Eb2QaUS)W;1f8;geerPk?9d{P!ZT-~1siO(-3}C`r>BSaZosj z8svQ%@WNApbU=yr2-O&W2?BBH2@#<*vdpzyy!@HiO8kY)cX_$u>=E}; zZ7Omu8Z?-e-aKqw4;gwszGm#HoXy~AJTx*_;Y)BhFk9|}a*GaQqXq(WY`daLxl@@| zM?S}I)WYsj5RXC#WC0t0FXF)Xp(T=zY0 zr|J&$R-CQo?p4)YsQ6Q>bA*f{D=Qw^bb`7IROA~lT{Idwg*cz15yY4{{buO$ z@WR-1`zExxfFFdQi?)9wa)NXrdUEG9Iz--)wiWflj30YVD4w$x5)Q^ypbpXP{V4dh zQT`*!m?Q@Np-5SCO$G;t;RJ7DTrxJU?>vLI3H|ft9@M2jLIV!@zT}YFA5~}Zx3&zi z>dFu5KRekYkFmwc@3{6&NXDU|Aje~$g%)h^Hu)OL4HJ=8H2_6j1a&hBwUVZ4mV7}2 zF@lMe-O%30y|-Zn>OACn9BP@N54Au+C}LaNSBDEta%HqsKFXh2Yj+wbs|t3 z$f`|MnRxm&u~x=a@m7XaId{Ld*p_P=jOe2j&_py*2nBKlUPI6x7c_XlsI`;D^eE4n z{>1#zm=S{Qwu=;Yy;kl!We%giZ}N~Hzg{xKDAU{bY_qPG$cqEI8sU|4kPaUi-jXBL zKc0!$^}oz}<&rXrh|X?8p|Vtjk^(Gt%P z>hu~*d_v`aG+Xlv?i>^UCyUM0ZicUzY7^bcALWstj?@SHar&akAX+)cI+P+6bCk57 z2vrF?n!`(Wn6Y#g=Na3m`=r%BX^O=v8;6awddpN&j?Dd!vbb`D=2Dk3zAG_oC~iKz z8Lk6sR?ZZnmJt-QTrJ6eGm&@C3!w zw5uNMpqrpvVGG0?NcG`AF)-$@=ye=a(a3DjUSua~G1TFT@EjoDh9KuUVvM*-)yo8b zlkMY~ni*i44oD?Y8G1UF2}1D4%Nw+Pgutunb3kq)|0>gt>9z5%W7Te935jMmqR;y< z)lh}*GZl$EOvg=wF=9FIuw-M9Y@|j-z4r=Gf-!tP+%#m_kDBB!qT_S(lYe`Mg)LMe zzJ-IK4~euIH??&|HVEva1qDC&w9rsOIZ8EX8kWN*$|gR0zn?G(ffO4Fd5LmxGm<_S zKI=YfkA9nNT=1F*S{>9BiCG1w2Ll<#n11BNNue;Pt=V@LZo^+D{S!-UU;f%a)h4_A z18$w}${pNk&j&{gOv~RwEBarTcg9ZbBvKUAA!VEtZiF3zi+C`r9M z29Y^e>LX3aFSpOnY#@Ts&{Spk9AOmnF@d2gvIC5pex4plzt1-%)~ie`Pw)5MUr0SX z-J5|9JJ=$2-(B!~S-))#!n8SDFnQn5NdNDYadfa;ouly zj;$`~YA`AxiUjhir%FOA8!hkhrYC^i?2kfi15}loka7SLjUfdj*oTjpBpbwidZTob zdeo0-+?Bc)a)*iY?7x8x;F@QBV&Jqm)pJd3;kuE6*Kk`Jq-|#`Ceb7sbs>;gYLXGX zwSaYxZ3xnfIx>aTwp+Ev5|%>kjF0U^T{(BAO`(Oa&cM>{rodyLE@>|d7ATz4f=eS~ zB~2V8@>b-N@C?#8#XP5gd7&;ymq;5QESl*sSQpwF zmX=O|)P^K*1xf`394j|ysTM63oN8{3lCn7hB&1F>PzPqQatmHdxCTm>&YU-ZFEhLHctEh09IN=9) zKODXB-rqkJ;2L)*Bur_GD=;GxHCh&=Fqe_D&8kDJ!sHs!6umh3>)E8}s!%kl8IrUq zlh=hX2Z3kZ^TNvoNY!?XUibC5o>2fE!*uFNp(w*<%dhtec}Je3i#w?(79_qy&w*e`wL!or^mG~#RZG&9 z9-b0=z2AUaoIUcLc3VS95%RaWG3z=T6>2a`K|;NG&XrjsmfY?hUIVVK1})|$i_Qt< zLeV70SnuOcy>{u9s1b*>$&Zan3%Yk~r_18ka^Mi^#-dXkb7$<%Y0$5}y}6Vf25VD! zO+lPU>~cmhpz?|YTkGDGCyFn`yzusA^q#$&PMjXz9ZXe!=C_VG<2}Y=Q0Lna|2+M0 z`#U^P&*h>oZxS96+>*W&dVqEwts# zyQIfKLzQ!Jdl4u6W}(Vaa^J4N2}6D!fJ#hF(ngp;^1c+tTVwpY4gET#B@6R#Rj&Yp z2vv}%X435&+A;g~-}>y(Zx1F0bGz%S8i@u*xZ^42{GK@UcJSjO-SYStBA@6%7I%4EO*y*UI+bq$){sZx>KGPm;p4}#_%!?^fuu!+lNdcj znzt7ni*Nk6iAkzboKrhOs6vRyo`uw#yAC465eaaA;#F4@%94D2VUWB&qpZRwPXgFM z3&d_>*@;wFHV*#MN4p;3oaxgV)G-6%nyI}cElJtLr!J*9Mb62#-70&q>;6^2O zrPm<55Ftex)O{xYgw(vdsTWeTT#-U7uOWcSq+l*o3z#1)jm z5@)&VA%7Pu;_^WHOh(w=O05i{jf>+e#0&nwIN}%&uWkYUyh|EENt+KBs?dKDUMHMySb`(c zIeikCKbRUo+W!aX{6H=cBqerr+)9nWV7w2c!hlYkMjgYJ8r>WctZD^P3h7bASAjAP z{6pH0?0Auh|ECf&8>5hFs$`L+VOFsy0h0Mn4+(Qzv=llMO+e#6nO0Du10fPQP0Dr!1QX^FzZ3vkJr!7G%&};b2{ZBOS`Oc zQ5hNw5r{e-fQS?YAK;8pD_KkC6Ft~+KcAYrz&!(S$n=>Y<>>};XAz4WMYd19Q7;=)Zc@}7Y5j9D1*Wm>^$79i&zrVpj6ZI zskABFmbSjvG2ZekWg~Bb7E#$-8qgT#LhE2u^0@vG>^usU+%#!(RM3enFec3!>?au& zMHn2gY}YCBnGZooQ68S zU2HzmTGQ{iZ9 zOH;6Tk>!F%I|Gs9$xS0d7fw_e{kSBNq{bxx0&j|a^p!%N?^8Z(?3EzF> z`nE8L)jV0MXpT+bdNY%<$GF)xF+E+vPiRj?N0H2)Wu-~~HpnZxC~2Q8_|K?%uY7B> zW}5*hB0fvu7dHFOsFcYyYQCtF6RqV)B|bIp>>B4nlfZbzrOVQ)XorQ#ugpSASv=p3 zci%?yg-y?g$?BGg>rJ?+IQLh{^SJ7o*e zJ0%OwJH>NJ?3wh$%_-VSvhu#Ev}YP$@5WFJTNx5xJ7{RvG5IspW~Xz%4V} znMZt0nc`!1pHvw{QyC6YP_!+(r|tX@C+J_Al)&@S1azHq-Veel?BW3KQ6YO6)qU^@;)2sOZsO9+thQ8WozK{vVdigYoJ#SXIz6exd`0CB%YZ&eCp=FD^xjN zE^sk=BAgwi|50%ulpTVGhBiR%lu)P)F=~%D5Q7k+#5@I>M2rWD97?hHtYbKQqqwT) zPDp9Ss^&y7C)iXUNn3~c?;O7le47=f4pngxZyS9iDu*SR;2JRGJnWKG{JMXZ;HL(4 z^C_2TVj?VBpZ^|{)Lx?iQLe6hUb;>@9=3sjc_}TDEd1KxT1cWROvAsJ{o@rRw8(O> z4L662G%v?;yvZGAKv7rt^m?IFNlg)R3$V@6a~7Kc()S&AL40K4u;1|T=4OVb4Pk^I zaLV*q7tUdpmK58m8RMkG!7Y?B;@`6)B0&*4Yk@^uN74A}`o#f%O+z|oo++t@k4AAG zvBGoh@9e7jMZ;N1-c!`A5UMNzhS-9{aJF~s12#tb+`g+AV6K8*5lW;D@%h)<)SvwU z@7|jtWHqz;U37*lE{*wb??%|4UDXi-nueMO1a zHJ@+OL`>si4cdk@7;;9)=a0X+N{~!xH%Mcs7`whFT!e85N(jR0`uTv-Vefn%sirTC z;!9KH=&7*)8^%__+GRQHv?=GaFad!Exog{6oYZtMlF;CJ~msk2vAmz#YIt%1jlp4MOD zF7dmp)~Cym8x|KmaA%2%$0paYe@EaxsW*w0E*^tEIu zsxFD!5|}jDfq)==TdODCZ(U6gpG#mJmV&dw`^PiDkG^Wp$JfeY=^Bj-Y8g^1#!Mt* zr8ITc+}imJ&_9=wrA|^`RNJ<-Q&*WjcoGchCjOV0+tmS~`_7t!DKp7mR*U5^8u^$a zBEGUPCJ2t!l&-A4!|-e>ZMtfqQL3p4JB&u@hj#q_wB>~Ccl$^ zQ_gxpnp`|dQ$v!8ej@*VABRgJ-ag%6H_(rB9LC@os)t7^SWra;zvruzSBG5x{>e}s0@@iW zMmT_JiB9Z9Dh^{>NPS+oUcO+T54Td;3Oh6Km#rW zu|5^iTWSa_GAb%f1KbL61$rFJAVY2Z*twjoN^#1+9?WO2lCX)VEJpc?Em*e>n##Qh z^bT~s2wa~L{s>eDyoguNIdc^&^x`Pt0*oStyWmQrEZw8g$XE;=PY6k`h!1fIF`dA+ z@99}PY7Ma(Z8)?=*iz83c7i(57**Tp72R^3_{z*>Wa6SPtSx8*Pb%aG6U0(Zs_HbS zlNjdYkwS-`4t5qhN!oT-6*7>*n;fGAi;oY;B0n8rHb&aP5GVMuyJgNoLb)R)k{qFJ zhxI*4BcuWt-lfFq47Q);*~as@3(>p1mq5I(8vGhQZlb;bi;&&aNn2>tB@x6!WaQRG zyE+kc^c#wj$bKEsdasU5sr6z@p<8v?a*|1`vU~#s9t>5287w!H38{xEMF*!Ncai|W z;SV4NW_@+U&v(mKVrX(D)<Jx=g2WXeddOoY~kMq2N^!fxZK|I_#s8+&5qU;;CqZXn9Ver6G8IZ6J6( zKl>WNwzV|V3>MUR1br5i6Es=4wiF{8MZ=^8V%lga&thqSV-pb44fg3*&y;9m+m!Y8 z)`tRNaANK!x9oU%ZKGo~ehq$DdjHcUtJmI!i`P>&TiMe9WcKqbBd)Oh{Eq5Eg^P}R znEyeT8Zm!>B0hrtSFRHM0D>}+$OwuKwkC>@vY$X0MRf&)=OFm!DbDrTL`9dycG8y1 zJM@Ma&DLK>xNaaPPHkK&LXzOZg-pHo27#xAKx?!O{*0xFz#h^Z@m8-;)mcigSc*T?e-ngmL1A2R(M5QwBN$Xs6Y+6-9G|2~scu z+oIDa!~65}F#;@;z9kcoM?v<_zA*cDB(%TWr=)S>z#vdV$zx2{wi&pY2xkA|uxjjqJrqBzJT1 z^sX+9-QoIHBMR}M$ge&SW5RQW08a!vHm2BCQx${oQepy_tJC{!80Q{~gb}De0cY?X ze)x+EQO^k0;3v8>8#Cw8X${H#cFZZ3)B&{U+;8xr@}Sf|rF33<)m~0lPVyoIyrK!lr7c8T_b)n;fQTbGsh; zS#0ESl!$SqxjA4IZP6#1%#!e3pBs8_#_sjhAWcN$H2mB#Gx#zR6n9zixNCeeVdi^& z27f#(&{|0nQ#CzMT6tn>e(^Tkm#&5-R=4W<4Z0cum*^AI<=ePgcGIO_~Y8(GajRSP!om;-2wqRpl$rPT6QGHdLs7g%FdOTQdi!IIA#4N< zpy6#&gvc2{elK@sE~%$uc`w3vGt#YT(p|!59O~4m-Eqf?qzF)_5M8%2;fJM%k?HV$ z9p%G7!H_}M?2{)V5bZ5ZnH75xCIgZQdxC-bnOuM}`(O0Vyr-yrg#!{QRBDzl5 zJ&UL@RHCfPO4RK#u^U6zzs5?JTX?eMtOffyMq847d}HCT&Lb!TQN)~(qre%+(@a!^ z)do|Cwpa(`q*aQUf*5++cLYQeg2$1u-9->^(~*PcYD*9+$_slgDr+ts++J6NcRr(op@Z!${>cCtI0qy23h0vX zrRbc()}mh%>PaxEnjPN#p3=S-ZS({t-&MEmoSh!zZUw?QI3u*U*uYDeyL-$!5xP~f zhcE=ZfSm=s0>mu8G29VZAw7(vD+AcC5pX~1@0q@Sb)9{TQegS~3RtT|g!@z{ zHyGzs$iGP6`c)|9@KK(;toPF71bH0EwyP4R*u_2o7H1Y=iG^~|# zfsn|i>>aCYcIw8qWJ5rzOw9WJ=rK?$&?3&IiDw~Z7nEZNlbIZL0%EWPhfp|RDTA+K zj^Ne8y%bW=0gVwUs0BvP>Oy3p1~@GPbsi8`)Bi*r7M#gbEmsUB*4x{(53K7+icTS? zyJT=O9-SXA9$8_W{gzsU?#WYef3Vq4QdP!yxLG=z)c6>dqYRGe&79QMV%IW37_qSy zk*%#ezP126sY`C2mMLECiKVWN&xK~@6s+DHQ#qV7n^qI~EN_~! z|3hiq|DXquRHgnus`5Vr;lFyx|IdK=&zSlDDkk$i&>sAt^E;lbciC3gS`~w$PKG?v zUuI8Fr0szc%ijFFh~`vf3yyc;gHoy23c>4vf?PeY`%fb^Ngk< z&g^CeO8!Ri9)?QG9TRNzIrUZ~_Ev7ntJA4}&Z^E90g2!UI^gu*o}lX2E4uje^L z$8B!zSU7V4Hq@2!#4_>mFTtOcSIssAEet}TV3Kig`O0q+N(llz?~T2FN2+c$t-9;8 zDzhW=Qk_-ownSIc874Oy5(lHPMTdtb9dGBAzY7ZoHW#=B6$Kp+Q&c8&l8ZVZ7J$g9 z+}efsD1A-r2eLSGb~0SeiDhu%*?Ka!vTz2`Qic>nl)-s~2KQ$8nU7)9GvbRj zCf(dDlB8V*F2(({Z0+ z&;m>x`!Y-w#q-nZzgb(XHCtm>Yc`Ht^)y?rWKrO5I*t-1UB{jI>=^4C8Wz~p>i2H{ zroU)#JP;pq1|giwk(81uoX+9N))v*&)C9aoVY)nTxi1_~WuG0y3zU|ZQ#;#FfC&Yy z{^BN1!W3tc)NW}H*nYFb?tXKo^nFuDGR1nGSEVAKozoQ&Bi;a$LQPTIMK54>d>x^$ zEwJZ2S{Sv4qb^$%;{SyNiH>_HA+I+Z4TJ<_wns%rf7=ubRC=~EqjLiMahoi3VHq^D zMQZ;hNk02E1@~yAd-sKl#On1d)A)h4f}Yi^YG&2%)IlITgN>@*EA6ld-rv{1KP+d_ z_VpoW4amUUJr|tx$d+;XZHWwDt_!yBW@IP`tPv4f9o$D$y!ezOkGH&fEvy5S-cIIK z-i*x)Y_x@PkL`@DodI(a3&5t3L*~5&+48!mPI7xYD_gi+Ydk9m|5n&}-62hHNzui* z?LoHXJj0h%Qx!@fo%RQBv92Vbgk-TO&qDgT98-$>IL&W+UGBLMsH#OLMx-Y^B_TvjAW*uuk! znnHZF{MQzYI>{ghecq}8(K$9Yb((@vhyXk}AS`huodMbvW1R5Uu6(yq@Sk)BbPXyX zU;7PD1Rm7J(9I301SFzrzx&dO-7hnFd61Xj)}?0g4JqtXs*LuHJhz4 zuU6{^CzqHZAt8@zKdC8{R8+{V#e{`}l3hWD^Q*Ab!N9?DY67{D?q^N73wgk+FHg(? zVP*1JqAPmd)jD0@r+Pp#PI2BD#AW*)^QAg`G~>fZ-Okp@KT8j zrGN?5!a;s_75&u)>pXKN#2I@d9AD1^SWLNgIg4B=&@i~0$q#XHB@#1N;>bB0$=A6ihutmMnHjd0j@UbQ}a<0mf%C zRg?}y%)f1gmJ*^%h+&G~ka9-F&wcU8OP4-`xfbTRtIZSM*q4>y-;;lK+-M4{5?vsFw01iG;=lfPaLkWoc1z%C94kplBpK@0>O`Z#CT1{Q)pZsrZ^|~1Kzv&rH3$8kF)K2XzCN7iF^`rJ@#SWfHwIS zA>n*Zpr<*ZFAWV%qO0$EM@ji{wx@!*2#&LqRa<)1(FIfXBiOT%gAubV4vN^TrzhJ1 zP(Q&9eAHpBAC0We=;5&-Twp`&A?>nI*Ao*h`o&Nh6cTcE z=u+Yp#YjVd(|HCt_r-~G>aQ=8?V7r{GrwE`cJGF=IcC49BjhzUHrc@2LJJsdOVB17 z5Cw9i|4VH2&PO3DWN-~H&3~m?7&`|M^V5UFw7Uvj7Fn;Ct59}*u!MJQvu=QD+JInH?FQez%kbDLBWyEs zI2t<|ztQ{IuA-_c1r@Jy-r>ZK`ss3w4DM&_cHblD+S*!!9o)Zm95z%X71ZrohR78( zGi?5dgSk(}@2Rhhm*dpb$+sG3q&Mu}{Cg6tFwm`$twy^6Gu{E`spg0YfAEz7Pd@{s zmPmnBY{VHqDCuY8z44ihih}MZtbWmx5AmS<1-VXvp+`LxF~^+yk!qtGaBM@iPwzLM zF;W94cv!ct9lNE|0lxs_d`nf=WBIQ?CS_Zlz?X6?$c?gx#_yFhqB&YVo`mYZajU{HIq(=7cbZ9Z%@A9D!9Dt8(aj5N(bmLsG<;=lq7g(*XPsJ${SM>1&RN1Wg3q7Y-mmpdRp@Lab4RUR;L^rhB8#ocZ|!3fyYM zn~#ww<0Je8!A=R-532hEwrE`{CxSWXq%o~+uk}JFUZZ`5LBa~u1;h0k4gpyxW{@Z9 z7spm)H4GKAX`1y$p+hP*C6JiknD|cd_sAHHnq!etI5_-?SVlcgGG$C> z<2iM1B|D0o!vL~>CmG z6&Fdwr)93H?KTWnC@hCAfhiIrV~pMI4PJ;R-s0Z}NoLxeMO@2hi($alHUgCa&3T#@ zR@SGJBrE^`=>J~j(L`|o4eQBfSw7J{(1r;$x~tX@Di&HT<2b17qWbxo{tW} z7W?nY$;v*q8-L&Qez0)8brfdI1!_0rb2{b%Sy*>w`1|Z$ydYjn4f8B^noLGM4mpfJ zv&9CPn((BXFjdGqisz-mmL6d3z?|w9_v^w{nOi|+Th9q%yea%JS3;Ezmj;WR?JuvF z^@y&=s|B`Lq_gQJQwL=p4Y=O*1PRWW9U=Vh6Mt4_@}L^q{dD3TuG?(^2g^Pku3sEl zd3uv}@#z_de~m%?AItby2VH&sQgi2p-j_3y05$g^*V{0#6R|BxIz2)yda>i7!mAMSc$qs?hZKqO~ zM@>#YN8-n70vD*r*#mJiFn8@2@Dtqbxv!1M;+&8Mdw>! zU`q&AU}4uU_*y5bB@Loo7@Ji(Mba5sRVuCJfU zI6AWMy&fhvwE3k#6C>(F52p9iLn#w7^?tB+1B3D7G{tZHpdNoepI5qxv6(zxUr+L; z2&TYuj~smUM2jrr+wgM&9hMz$sx*&l)AoQ1vJkU`qiCicX65IHQ6m2zHXPZPy|2gF zQ;VN~o1GoU^WSAz+DN0w0v`(MxfiU)BM9GD_RJ@ZD+%D$O*6IeWZxlKJ3SxFoG0>C zfqE1XjGLgChzN&wLn0qil)Nu|9yfZv=S}DPJ6k#r=<*A9x4;W`whq?|%G!(32`hHI zSm-7Scc|JP{SKGkKHczk&=?T>e~clSR2Uf;QseOt9_>85n=!lg)~)oGo(W@fc-*73 z8*MjQ%-n6+vYuqJvusAL;rFJHsd79DeULe+s3bx*F{$A+&|cC;)Ajvmh@h2rr>>U8 zh4w()5xcKiHioPmo6XqpWEU)zXQqi?JkN_IF@}O-XW(-^k2CLC4C!dma}cn`oQLGBRp`8iw*=RZ`#Ah*IfHgh_cS7K`tej)qqkUJllbsKuoX| za(+g+9xk{GPi!KDms-+MowvV9I7M~VCrYVG&53p94e1p@_V?=YG3!z^@lQQE%${k-un zsR{t``B)RwWK>jCY*6EUzij*mEtH*{SY6a*r27e9n2Sf61LOYpW!s9L7ce* zl;CPGME5o?Tc5z)^~a)4SguFC;|55E5}~Uw*RoMAZN{Y~`rAn-c>v1_Oz$ ze2G^(j7O1Z>FHDEuzkQ#>XGSiDnbhb3;SAKF%|I8spK$P#oO6_>>%4b5|^)cy4yU@7bgO79b5Pz^m21n}%pGroYCvYL$y`cGYEqvN-TgYoPqA@y zaXyFWx>!(vZvDF-I;tH@2(EGR$6gsDF^Hyy9x}G#N*i`mEznOLcx!uY%ZAJbL z#BtX>Jpb+uR7zp5`E)eyt8 znA6?|$Q~=i%{3tbeLYyUCS*1&7geRu;==x@W83_5h3OotDGXM)%K;X#o6D*Mb4K{{o$HO<1q& zJgn+arMF{ic_x7RnW} z7IC=K*=+h3%?<9ziP@c$!Xv4ZkJ%G&eVeue=c9hsIK!VTU)2^g(^RF~skVJ`aC5_y zm*aa@l3q-3R9dc{x<9O6V-ExIuXRbNvQ2>`a)GfUqQ!QHF)!ca>-8i@uhFBQ>4)Ht^9`?Ru8?+v0Q1>yj)(rf?pGNw$IDW=6V#w`2Le}=RBW zQ;$vJE~D4YdEl?$)JbR_YKnModb#iobd!ftJZiKrc^a%uw>m*PZi>he09;ut&+~j0 z#To|QtlQ4W4uRC+oCHy7d?WkN^;YLmBaMe*JDvG2M<@o3y8LVD1ov&vGHU#2jg>%7 z=;=HG{hsoG4}q^2vK){7$YVY8+i|6f5Z3=xZ`(O%+uhz$6Q%1lDHK_NI@WAM79i2xxe=6K>Q%mrlP)ScCO(?H+I)6Tjw&ONKgWFUP<9QQ$ z8>d=QBLTU!zs)|M9_w$W?9FGc1nzKi;jMus!4gHrc9#>#mXlNiL6MyuptNl(t!m1U zjyz9KTT=?u@9O5u8o?(Mbw!k6w;!6wMQX4!@NSE|&Tgxt1JJtdCCxA9z2&+x#vdR* z*3oDM@)Q~pvZzV;=<9|R%>zm5GBk(V6^%(Ws$^nnI(I{-_9r^K!1hjz*WFB8T49jS zaYioCWj^0y&F^JF_mZ@Dejc$MFqp>cb+*FWarBwf@pcR;{5Q!7@3X-oR zRa5TM#1@=e~Fm$kWP-T#6x|UTWlx4reN`(%|W0?Q}34 zzwMWPd0)3X3Ei>WErW1+%9Im5#v&Jf%;UY~Ze^hO?||E(5v8fXR40xPjE%l}@|=bx z^DIEGAeDB?T}WXQ;Y&2moJzsh;>)NLPKC3Bb*sljmOa;e6Lgo6DFx=1XRXs8i^3_NQ9?l{Q$dcL zo{MW-u$c_2U=9X9&LU~}&bkc4aQT^8GVC%FL^+-KYQAL?3nO3bZyM^fDko{|7X1!_ zSAi>T-&obz{c>_gDh>_Bg==QHH3d^oF$&~qv|OO{%zS;hJ2;{^e(90D|Yz& zmOLJg6V8nUZ$$g}FM1vlT-?~Fk_CcH9p~5&aY49lsGjl_JVAvHaoqmRoOV;vrsdqN zsJDZC@uqs=c2^(LoN?h+BXd-~cUiotR}ZT0kArVgCr;Df)*~4O_!YezA!WQA*x{F6 zzEA;USvHO&C{<#a>UkN|YQYc!nd5lSgj?(>l*q9qK@E6bKt)8>`xw%jiEC-s{Vv2q zGxYU2`~~EfoSh{*-}H$Fz`LW^9=OHsuU4Ae-&g+NZOufn)J?r6*eGzpJ|XGm`gTEs z?+gsp*WOZALJojPs$6DZXIOGl+tmuZsO{D3!C9+RXTpu_Ke4C=RoB?Q)*j;q5 z+QSmUI-blVdlWcIQT`u|tEWZv2{zmA^1O%6cPKEM z(Im>@nHNRai57Sm6T)2M3jrUrUQwYCfvd5ZB|u>gBVQ|hFl{BF3t09ea0kb*X&oBw zzC`>TOYLV@x>_;D{9nJZV%6UiMpp<&9fAoH%#LcRTm|(Q_;#GD+?Pz96!k}?ErTL$qP80Dv-!gpMmK8_LX|_LH<6(SIIw3R4 zP;DMc5xvJPkCqYcpC62#Ns1W*erL>J^+lzS!aY4>xr6b2%|Es`Fo6h9?&7q4(xMBe?NbH`j*!H?P1W9ekBX_c`wjZF#khCMO{4bwiJavfZ#8#z&|#>g;j z7RAqQtnE52j4rmlPU{bb&ThvW$>Ay5|K|G!NJJfNcRrbKvRn`atR-Q*-m%^@sJv_)I2yT_)EWRL%;xz?z4sv`UXP~tp8Z29bnBo&-T~~hhkGL<^R-j z-cL<-TN|dlbOn?yRgos0ASLwPqzMQ}RXRc_p-2gYj&$iQ6e$V>qzQoth=3^4dkIpM zC@n}0O*jv}=gjvPe7|I7Pm-BrX79D1`@XNW_UdtJNyHgEyPocAxDN_i*54OT_MO~` zJ8x2KuEnxK(*8&<`eh&qosp4E!{8cRQ&arALcejH%)C5-GwU(HL*y7hjLePOqXGgU zG3OlFY??qEHco{mCW?JYPJRHv#q4VB%Ncdv9ZqL zn&??xQzR!2)}EebW$H5ZZj4_PGlv;Fw}b9k)-F=SX1Ozl{qP)?dSw&e*6hU9ivY79 z^Jt(1a`zn(G8AIl>;t{02)Ew*QVBFMJy6x%?svG>te$lTJ+0-8t9jCMYDP8zk*zEz@0r zU|0%Ggl=6V?^O@xl03crkTd6;ve%}b>YE<)-3Qc!J$W=Su#6R0!;UJT1X(^3j63x$MMA|p&(1QwRDurubMZ3y{ty(6N@2un& zhn;?Li>%B7Y@ZKy=YZ)rB%DqI=ce`l!jqFLP)im(bb0YKw=_4}zvq|Oqq~2*4T37B z_6!V@Oy4V((Xi)uINaWURou#?9rhqb>w|dl{u2uZwdxGgXp_rmuK5nWf@!DB7ru>= zPexDGwJW$G^-gxO6}T_y7DLAu#;-7xa~u4~Hx&h+qK&PiOV#hy&}5pEx3!OOEnDGl z4S)f5esgD80%%Iid6->IW*W$m;?*KG-KsX>2ric+-XFcipcVR$n#G1?^z=VO^~o_? z>lJP{KgdHJ10VZN*guwsigiGzl!IoUeG5{k`iRqK;mPgW&2utHo7sf`Yt5$!9ACK18`1buVBOl*74C(wiu6rO3FiL&LWbJtr;2R6mO6>UW2J^Y z@yNGgW@0Y?^en7liNmIYL*_M0AUoa=VtU>U-#3hb(D#(f+GT2;z$@X$XctGZ2~a@{ z16A}5sDw42%gRo)vBj2Fp}i=6mDZI!+YCjpr|K=Hfw^aGkqF-n=kKXjo(v=BP0_HS zE$&ta8aibz&DFoFXgE)v#_JDlGK6~jeZE3;pvR;Ciu}^6p11E5^H;i>1F#>R z)$FA8$yCswp_rCsNp|AxVM)5&aQF%PG|4_ErnWY57+StIwzo2j@X2og|11jmrSga5 zeN?XsXlahu%gx;UrtNJJK`b8|YC0%oQa;xnzj_ed**~sg@!tlp2+`&B5mye$=iM*m z=nN+m8#xmR(Z{CUJKZLKnxk=-(aKmiQ2ugR_T^ALR;!f*D7*s)88K}z)t;6Jl9&6!ZKh~j6z~2@s$RM z4b#}iB5glz0`1N~$|T~}&jw8j9UC41a+!N)04*X1>a!myQUKa#c1$ZbeaAGI^4hFY z0WxO1&IUbL`)4`$?D%+c>b|04(fIiIV265DRh2JtjrfKBrwj+0tf-D~>m0x)usagi zI73GP)}7_i_P36O2R?SZ*>5{f2L{IsuHaYCca?G=?`7qDX)lhfoE#HZSN=agl`cy$ z80+@^VY#a6YTXMihfhi3&HvaH687JK{v#v ze&fcCM%y;uib6ba2jqAze`UJ1rl|qoprkU`JeQ)Edr?tQfH@JC&U&&E$BEsv=Kd+O zUY;?CsqF{EzW(b%--Jp1h9^CwU;v(33x1k>+WGq<)xpt%*96kC=`KwjQ%hn(!jByv zvFE;9rQ?}rKcndk#Gn~|%o%)!*#~Q1b0#ot&?+P{=?a#avs+qXkB*N1d<&nI^^#jl zH&2F>UqGO=ECs9^*2)A_720Yr4srkM`P69=yWF&R=&?8SD~o9ekg#H>!>)4nxmF-# z1NE&iD+K#>tnowI*Llg7gs3|Se>@iye1uGE)-RCC6Tk%lRtb$vi|}ZL9#cQyJUT&G zFroWH)Jg?I-3nECtKM6S=$V&USxyjHHY7P41qB6mx_jkILtNq~T(K4>Y!V~EEM^bK z5F^i>(4}2xKv2(hhMb{V0K)8&wyCfaKyb1b0Qg$#wfQ8u@06WEk1Z@*A?)Nci|6l( z0RqUf%*E`(nsVwWZM{+O(UySoJ=7Tv?R1@ph^V|(_3b?EH1wXXp5A(j94_tq)Ht9> zpl=C-l?#S6?ZW@~+i*CkmT9$e)G#__GttwJ?)G!;G<%J`(r7fy!>_Ne`(vfElaj6_ z#3z-zv4s9&6>k7kWgWgCLR8j}9vq7WN|PAz3K#HKk?SXe03W%;Y(n$(Gtm8Enj@z(&D{BAE@`UvH4oa7_j zalO)_PzSKc``@adxSnq3)*s!G@sWYOj@a=aq zDk?q8aSFTR1!X` zl?QzO#a4$bc6J9-+?lb9*Vob0reyeR+k-rSk$|;-huxH z!nbfL24BMZQ??g|go#~v#sQ4rdy3q!`19ZPz~(;hzV*2C1j`C~-Q%^4m@Fd-{s-Sv(h}tu?fgKw{3+WJfyM1D3d#w0`Q{ia?1h)s;;gsGwYST9e#PX zBBbey~Fc086 zvje_Y5{t1#af8w0tqpp5&`c?LQE6pmB_)EGEFrRQr@mfH%gL!CuV)2_k=uSi?=Pyr zbbI|-zG$fCgAOd^`OYT(obv5oaMWp{(F%Drvp$kN2KA zy$S~sB7Z`)&5yd8gJC2aYr|8j_NPGpley1rbUf>jdP7hc`qn2b$<%TaE{RI=*qua- zAly>@3h7h~NCY`819!f4;4FkLPiMLcHD&3AW+gpl#VjqDHyJ&ee8v7fEf?Qpl&n?Z zn-r}N2?I$TU0lA-Q(8+cgVTQo8-6@=4@CL66lQ8$<$J^`(MF>cX}!Ej!el-SmBMNH z36V5gtwql;C?Cn-1K0epF%AEh&o{4QsRJW}mtgoY5+-Y9bK9VbUPTVrf$^>T?({yX zE?BWl@=&)K)-b@OH~{XboA}AzN7OdK>lNvWPkYHN%M@wvJWtl*JPaYrz&;F80&ZEE2sKUz!ISfB8^SK%Z1)9u9&= z;?J4@d=#1*vP^}xHt^vAE@F2GOFe_Uf0QzUk^b(LmID#DYyj@vYSs>8I53Xhl)O8#^elcZX z2}E#gRMHg!77iM?>`yYeXD(|4S?Q$G4+vXtxY1w&i}MJ>ePFve z6-DKnk_rxjZ$-9o6^HIozyM^-_qu)FZ5km2Anf7`c7Z#2>?%iN%#F-?n`HlfZ$Qv@ z$VdsrOz?<2MME^D@po(ea2}lDwPuXB5VC-Rj#t|&^&9J9cTlV60`CmVbiUw~r&rhn z6ftV-MYnZ6mFRmT?123N<#PM#&LM#nfDV**$OUYb0Qh1QcBI%&TGg54%qMxwS*Yvs z0-fPMAp$(5EYm#Hvbu#(5xvR8Mk#7FL69wU zBG2km3 z4FJW?64Z#}l=8^UsHk@xyYu=F(uf@>vF#?eva3ugwL=(~8{j0BM>X&bAX3@%V?$C~ zJQOl*g)T}*6$;_USsd$$=lp92R5YX&E9`;2_KBHwsVU4MT z>W`w)V=SWQsjPw+>Hm@SHlt9rL^Rbam7X4HmyEdw;>smHhZ|Ejwaq#df=wRuv>dJe zI+=r2QPsV|s~Al$w$Z*(PhIK?4{x20jU+J-793otk36BSr}fUu$jImetBCfAWFM@$ zD>+NuDy`PSpL%$X8N|JIac~3>I|ttKJ>niVV*_%3nYJB*Qr#h{Fg(XgBK{FEzMQA!(Z# z7`ZQ~an76}1Em}j+m=sz8S+1ZA<4vBX9kNA-?jRw>0>BVdE12ShGZ~5+NN+ zr6iUW@Ekc;t1Y97Z|UomEqMe)N8BJva1C8xtS1G5P#Q!AEmHuH# zZUfoYfyRJT@sle2E8E>=Nkhl^lb>II[!NOTE] ->You can use any of these supported conditions when defining your **TargetState**. +>You can use any supported conditions when defining your **TargetState**. | Condition Name | Condition priority | Windows 10 Mobile | Windows 10 for desktop editions | Value type | Value description | | --- | --- | --- | --- | --- | --- | @@ -80,10 +75,7 @@ The matching types supported in Windows 10 are: | Numeric range match | Matching type is prefixed by "!Range:" | <Condition Name="MNC" Value="!Range:400, 550" /> | -- When all **Condition** elements are TRUE, **TargetState** is TRUE (**AND** logic). - -- If any of the **TargetState** elements is TRUE, **Target** is TRUE (**OR** logic), and **Id** can be used for the setting customization. - +### TargetState priorities You can define more than one **TargetState** within a provisioning package to apply variant settings that match device conditions. When the provisioning engine evalues each **TargetState**, more than one **TargetState** may fit current device conditions. To determine the order in which the variant settings are applied, the system assigns a priority to every **TargetState**. @@ -291,7 +283,20 @@ In this example, the **StoreFile** corresponds to the location of the settings s +## Events that trigger provisioning +When you install the multivariant provisioning package on a Windows 10 device, the provisioning engine applies the matching condition settings at every event and triggers provisioning. + +The following events trigger provisioning on Windows 10 devices: + +| Event | Windows 10 Mobile | Windows 10 for desktop editions | +| --- | --- | --- | +| System boot | Supported | Supported | +| Operating system update | Supported | Planned | +| Package installation during device first run experience | Supported | Supported | +| Detection of SIM presence or update | Supported | Not supported | +| Package installation at runtime | Supported | Supported | +| Roaming detected | Supported | Not supported | From cfd4c425b1891f0b0fed5ab5c18a37022b250e1b Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Fri, 20 Jan 2017 10:31:44 -0800 Subject: [PATCH 004/108] sync --- windows/deploy/provisioning-multivariant.md | 10 ++++------ 1 file changed, 4 insertions(+), 6 deletions(-) diff --git a/windows/deploy/provisioning-multivariant.md b/windows/deploy/provisioning-multivariant.md index 13e8915966..14d9bfed7e 100644 --- a/windows/deploy/provisioning-multivariant.md +++ b/windows/deploy/provisioning-multivariant.md @@ -30,20 +30,18 @@ In the XML file, you provide an **Id**, or friendly name, for each **Target**. E ![Target with multiple target states and conditions](images/multi-target.png) -- When *all* **Condition** elements are TRUE, **TargetState** is TRUE. +- When all **Condition** elements are TRUE, **TargetState** is TRUE. ![Target state is true when all conditions are true](images/icd-multi-targetstate-true.png) -- If *any* of the **TargetState** elements is TRUE, **Target** is TRUE (**OR** logic), and **Id** can be used for the setting customization. +- If any of the **TargetState** elements is TRUE, **Target** is TRUE, and the **Id** can be used for setting customizations. ![Target is true if any target state is true](images/icd-multi-target-true.png) ### Conditions -The following table shows the conditions supported in Windows 10 provisioning: +The following table shows the conditions supported in Windows 10 provisioning for a **TargetState**: ->[!NOTE] ->You can use any supported conditions when defining your **TargetState**. | Condition Name | Condition priority | Windows 10 Mobile | Windows 10 for desktop editions | Value type | Value description | | --- | --- | --- | --- | --- | --- | @@ -71,7 +69,7 @@ The matching types supported in Windows 10 are: | Matching type | Syntax | Example | | --- | --- | --- | | Straight match | Matching type is specified as-is | <Condition Name="ProcessorName" Value="Barton" /> | -| Regex match | Matching type is prefixed by "Pattern:" | <Condition Name="ProcessorName" Value="Pattern:.*Celeron.*" /> | +| Regular expression (Regex) match | Matching type is prefixed by "Pattern:" | <Condition Name="ProcessorName" Value="Pattern:.*Celeron.*" /> | | Numeric range match | Matching type is prefixed by "!Range:" | <Condition Name="MNC" Value="!Range:400, 550" /> | From ac4d177134425d0da2e94695ac15528aadf8b73f Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Fri, 20 Jan 2017 11:20:23 -0800 Subject: [PATCH 005/108] sync --- windows/deploy/provisioning-multivariant.md | 22 ++++++++++----------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/windows/deploy/provisioning-multivariant.md b/windows/deploy/provisioning-multivariant.md index 14d9bfed7e..fe8e986435 100644 --- a/windows/deploy/provisioning-multivariant.md +++ b/windows/deploy/provisioning-multivariant.md @@ -75,11 +75,13 @@ The matching types supported in Windows 10 are: ### TargetState priorities -You can define more than one **TargetState** within a provisioning package to apply variant settings that match device conditions. When the provisioning engine evalues each **TargetState**, more than one **TargetState** may fit current device conditions. To determine the order in which the variant settings are applied, the system assigns a priority to every **TargetState**. +You can define more than one **TargetState** within a provisioning package to apply settings to devices that match device conditions. When the provisioning engine evalues each **TargetState**, more than one **TargetState** may fit current device conditions. To determine the order in which the settings are applied, the system assigns a priority to every **TargetState**. -A variant setting that matches a **TargetState** with a lower priority is applied before the variant that matches a **TargetState** with a higher priority. Variant settings that match more than one **TargetState** with equal priority are applied according to the order that each **TargetState** is defined in the provisioning package. +A setting that matches a **TargetState** with a lower priority is applied before the setting that matches a **TargetState** with a higher priority. This means that a setting for the **TargetState** with the higher priority can overwrite a setting for the **TargetState** with the lower priority. -The **TargetState** priority is assigned based on the conditions priority and the priority evaluation rules are as followed: +Settings that match more than one **TargetState** with equal priority are applied according to the order that each **TargetState** is defined in the provisioning package. + +The **TargetState** priority is assigned based on the conditions priority (see the [Conditions table](#conditions) for priorities). The priority evaluation rules are as followed: 1. **TargetState** with P0 conditions is higher than **TargetState** without P0 conditions. @@ -104,17 +106,15 @@ The **TargetState** priority is assigned based on the conditions priority and th Follow these steps to create a provisioning package with multivariant capabilities. -1. Build a provisioning package and configure the customizations you need to apply during certain conditions. For more information, see [Create a provisioning package](provisioning-create-package.md). - +1. Build a provisioning package and configure the customizations you want to apply during certain conditions. For more information, see [Create a provisioning package](provisioning-create-package.md). 2. After you've [configured the settings](provisioning-create-package.md#configure-settings), save the project. - -3. Open the project folder and copy the customizations.xml file. +3. Open the project folder and copy the customizations.xml file (TO WHERE? DOES IT MATTER?). 4. Use an XML or text editor to open the customizations.xml file. - The customizations.xml file holds the package metadata (including the package owner and rank) and the settings that you configured when you created your provisioning package. The Customizations node contains a Common section, which contains the customization settings. + The customizations.xml file holds the package metadata (including the package owner and rank) and the settings that you configured when you created your provisioning package. The **Customizations** node of the file contains a **Common** section, which contains the customization settings. The following example shows the contents of a sample customizations.xml file. @@ -145,7 +145,7 @@ Follow these steps to create a provisioning package with multivariant capabiliti ``` -4. Edit the customizations.xml file and create a **Targets** section to describe the conditions that will handle your multivariant settings. +4. Edit the customizations.xml file to create a **Targets** section to describe the conditions that will handle your multivariant settings. The following example shows the customizations.xml, which has been modified to include several conditions including **ProcessorName**, **ProcessorType**, **MCC**, and **MNC**. @@ -202,10 +202,10 @@ Follow these steps to create a provisioning package with multivariant capabiliti c. Move compliant settings from the **Common** section to the **Variant** section. - If any of the TargetRef elements matches the Target, all settings in the Variant are applied (OR logic). + If any of the **TargetRef** elements matches the **Target**, all settings in the **Variant** are applied. >[!NOTE] - >You can define multiple Variant sections. Settings that reside in the **Common** section are applied unconditionally on every triggering event. + >You can define multiple **Variant** sections. Settings that reside in the **Common** section are applied unconditionally on every triggering event. The following example shows the customizations.xml updated to include a **Variant** section and the moved settings that will be applied if the conditions for the variant are met. From c228ff75b20f55802d7c41979c6ed6a84de38c8e Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Fri, 20 Jan 2017 11:54:11 -0800 Subject: [PATCH 006/108] sync --- windows/deploy/provisioning-multivariant.md | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/windows/deploy/provisioning-multivariant.md b/windows/deploy/provisioning-multivariant.md index fe8e986435..9d917e530a 100644 --- a/windows/deploy/provisioning-multivariant.md +++ b/windows/deploy/provisioning-multivariant.md @@ -52,16 +52,16 @@ The following table shows the conditions supported in Windows 10 provisioning fo | GID1 | P0 | Supported | N/A | Digit string | Use to target settings based on the Group Identifier (level 1) value. | | ICCID | P0 | Supported | N/A | Digit string | Use to target settings based on the Integrated Circuit Card Identifier (ICCID) value. | | Roaming | P0 | Supported | N/A | Boolean | Use to specify roaming. Set the value to **1** (roaming) or **0** (non-roaming). | -| UICC | P0 | Supported | N/A | Enumeration | Use to specify the UICC state. Set the value to one of the following:


- 0 - Empty
- 1 - Ready
- 2 - Locked | +| UICC | P0 | Supported | N/A | Enumeration | Use to specify the Universal Integrated Circuit Card (UICC) state. Set the value to one of the following:


- 0 - Empty
- 1 - Ready
- 2 - Locked | | UICCSLOT | P0 | Supported | N/A | Digit string | Use to specify the UICC slot. Set the value one of the following:


- 0 - Slot 0
- 1 - Slot 1 | | ProcessorType | P1 | Supported | Supported | String | Use to target settings based on the processor type. | | ProcessorName | P1 | Supported | Supported | String | Use to target settings based on the processor name. | -| AoAc | P1 | Supported | Supported | Boolean | Set the value to 0 or 1. | -| PowerPlatformRole | P1 | Supported | Supported | Enumeration | Indicates the preferred power management profile. Set the value based on the POWER_PLATFORM_ROLE enumeration. | +| AoAc | P1 | Supported | Supported | Boolean | Set the value to 0 or 1. WHAT DOES 0 MEAN? WHAT DOES 1 MEAN? WHAT DOES THIS CONDITION EVEN MEAN?| +| PowerPlatformRole | P1 | Supported | Supported | Enumeration | Indicates the preferred power management profile. Set the value based on the POWER_PLATFORM_ROLE enumeration. WHERE DO THEY FIND THAT ENUMERATION? | | Architecture | P1 | Supported | Supported | String | Matches the PROCESSOR_ARCHITECTURE environment variable. | -| Server | P1 | Supported | Supported | Boolean | Set the value to 0 or 1. | -| Region | P1 | Supported | Supported | Enumeration | Use to target settings based on country/region. | -| Lang | P1 | Supported | Supported | Enumeration | Use to target settings based on language code. | +| Server | P1 | Supported | Supported | Boolean | Set the value to 0 or 1. WHAT DOES 0 MEAN? WHAT DOES 1 MEAN? WHAT DOES THIS CONDITION EVEN MEAN?| +| Region | P1 | Supported | Supported | Enumeration | Use to target settings based on country/region. NEED REFERENCE FOR REGION CODES TO USE| +| Lang | P1 | Supported | Supported | Enumeration | Use to target settings based on language code. IS THIS CORRECT REFERENCE FOR LANG CODES? [https://msdn.microsoft.com/en-us/library/cc233965.aspx](https://msdn.microsoft.com/en-us/library/cc233965.aspx) | | ROMLANG | P1 | Supported | N/A | Digit string | Use to specify the PhoneROMLanguage that's set for DeviceTargeting. This condition is used primarily to detect variants for China. For example, you can use this condition and set the value to "0804". | The matching types supported in Windows 10 are: From b2e5ae9c7e54d67c367b8fc661270f6cfdd899e4 Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Wed, 8 Feb 2017 12:14:47 -0800 Subject: [PATCH 007/108] rework logic area --- windows/deploy/provisioning-multivariant.md | 13 ++++++------- 1 file changed, 6 insertions(+), 7 deletions(-) diff --git a/windows/deploy/provisioning-multivariant.md b/windows/deploy/provisioning-multivariant.md index 9d917e530a..189dbc3bd1 100644 --- a/windows/deploy/provisioning-multivariant.md +++ b/windows/deploy/provisioning-multivariant.md @@ -26,17 +26,16 @@ Let's begin by learning how to define a **Target**. ## Define a target -In the XML file, you provide an **Id**, or friendly name, for each **Target**. Each **Target** is defined by at least one **TargetState** which contains at least one **Condition**. A **Target** can have more than one **TargetState**, and a **TargetState** can have more than one **Condition**. A **Condition** element defines the matching type between the condition and the specified value. +In the XML file, you provide an **Id**, or friendly name, for each **Target**. Each **Target** is defined by at least one **TargetState** which contains at least one **Condition**. A **Condition** element defines the matching type between the condition and the specified value. + +A **Target** can have more than one **TargetState**, and a **TargetState** can have more than one **Condition**. ![Target with multiple target states and conditions](images/multi-target.png) -- When all **Condition** elements are TRUE, **TargetState** is TRUE. +The following table describes the logic for the target definition. - ![Target state is true when all conditions are true](images/icd-multi-targetstate-true.png) - -- If any of the **TargetState** elements is TRUE, **Target** is TRUE, and the **Id** can be used for setting customizations. - - ![Target is true if any target state is true](images/icd-multi-target-true.png) + +
When all **Condition** elements are TRUE, **TargetState** is TRUE.![Target state is true when all conditions are true](images/icd-multi-targetstate-true.png)
If any of the **TargetState** elements is TRUE, **Target** is TRUE, and the **Id** can be used for setting customizations.![Target is true if any target state is true](images/icd-multi-target-true.png)
### Conditions From d5860869a7c439c639559f2c6a698d807cd88bef Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Wed, 8 Feb 2017 12:26:49 -0800 Subject: [PATCH 008/108] add notes --- windows/deploy/provisioning-multivariant.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/deploy/provisioning-multivariant.md b/windows/deploy/provisioning-multivariant.md index 189dbc3bd1..6322c42d94 100644 --- a/windows/deploy/provisioning-multivariant.md +++ b/windows/deploy/provisioning-multivariant.md @@ -55,13 +55,13 @@ The following table shows the conditions supported in Windows 10 provisioning fo | UICCSLOT | P0 | Supported | N/A | Digit string | Use to specify the UICC slot. Set the value one of the following:


- 0 - Slot 0
- 1 - Slot 1 | | ProcessorType | P1 | Supported | Supported | String | Use to target settings based on the processor type. | | ProcessorName | P1 | Supported | Supported | String | Use to target settings based on the processor name. | -| AoAc | P1 | Supported | Supported | Boolean | Set the value to 0 or 1. WHAT DOES 0 MEAN? WHAT DOES 1 MEAN? WHAT DOES THIS CONDITION EVEN MEAN?| +| AoAc | P1 | Supported | Supported | Boolean | Set the value to 0 or 1. WHAT DOES 0 MEAN? WHAT DOES 1 MEAN? WHAT DOES THIS CONDITION EVEN MEAN ("AoAc"?| | PowerPlatformRole | P1 | Supported | Supported | Enumeration | Indicates the preferred power management profile. Set the value based on the POWER_PLATFORM_ROLE enumeration. WHERE DO THEY FIND THAT ENUMERATION? | | Architecture | P1 | Supported | Supported | String | Matches the PROCESSOR_ARCHITECTURE environment variable. | | Server | P1 | Supported | Supported | Boolean | Set the value to 0 or 1. WHAT DOES 0 MEAN? WHAT DOES 1 MEAN? WHAT DOES THIS CONDITION EVEN MEAN?| | Region | P1 | Supported | Supported | Enumeration | Use to target settings based on country/region. NEED REFERENCE FOR REGION CODES TO USE| | Lang | P1 | Supported | Supported | Enumeration | Use to target settings based on language code. IS THIS CORRECT REFERENCE FOR LANG CODES? [https://msdn.microsoft.com/en-us/library/cc233965.aspx](https://msdn.microsoft.com/en-us/library/cc233965.aspx) | -| ROMLANG | P1 | Supported | N/A | Digit string | Use to specify the PhoneROMLanguage that's set for DeviceTargeting. This condition is used primarily to detect variants for China. For example, you can use this condition and set the value to "0804". | +| ROMLANG | P1 | Supported | N/A | Digit string | Use to specify the PhoneROMLanguage that's set for DeviceTargeting. This condition is used primarily to detect variants for China. For example, you can use this condition and set the value to "0804". NEED REFERENCE FOR PhoneROMLanguage CODES | The matching types supported in Windows 10 are: From 4582fb684df2c803eae540b99140893aa42441f5 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Tue, 28 Feb 2017 16:17:04 -0800 Subject: [PATCH 009/108] stub topic --- windows/deploy/TOC.md | 1 + windows/deploy/index.md | 1 + windows/deploy/mbr-to-gpt.md | 82 ++++++++++++++++++++++++++++++++++++ 3 files changed, 84 insertions(+) create mode 100644 windows/deploy/mbr-to-gpt.md diff --git a/windows/deploy/TOC.md b/windows/deploy/TOC.md index 98951382e3..e4aced3ac2 100644 --- a/windows/deploy/TOC.md +++ b/windows/deploy/TOC.md @@ -51,6 +51,7 @@ ## [Upgrade to Windows 10 with the Microsoft Deployment Toolkit](upgrade-to-windows-10-with-the-microsoft-deployment-toolkit.md) ## [Upgrade to Windows 10 with System Center Configuration Manager](upgrade-to-windows-10-with-system-center-configuraton-manager.md) ## [Resolve Windows 10 upgrade errors](resolve-windows-10-upgrade-errors.md) +## [Convert MBR partition to GPT](mbr-to-gpt.md) ## [Configure a PXE server to load Windows PE](configure-a-pxe-server-to-load-windows-pe.md) ## [Windows 10 upgrade paths](windows-10-upgrade-paths.md) ## [Windows 10 edition upgrade](windows-10-edition-upgrades.md) diff --git a/windows/deploy/index.md b/windows/deploy/index.md index b2d4ab858c..e3af726270 100644 --- a/windows/deploy/index.md +++ b/windows/deploy/index.md @@ -24,6 +24,7 @@ Learn about deploying Windows 10 for IT professionals. |[Upgrade to Windows 10 with the Microsoft Deployment Toolkit](upgrade-to-windows-10-with-the-microsoft-deployment-toolkit.md) |The simplest path to upgrade PCs that are currently running Windows 7, Windows 8, or Windows 8.1 to Windows 10 is through an in-place upgrade. You can use a Microsoft Deployment Toolkit (MDT) 2013 Update 2 task sequence to completely automate the process. | |[Upgrade to Windows 10 with System Center Configuration Manager](upgrade-to-windows-10-with-system-center-configuraton-manager.md) |The simplest path to upgrade PCs currently running Windows 7, Windows 8, or Windows 8.1 to Windows 10 is through an in-place upgrade. You can use a System Center Configuration Manager task sequence to completely automate the process. | |[Resolve Windows 10 upgrade errors](resolve-windows-10-upgrade-errors.md) |This topic provides a brief introduction to Windows 10 installation processes, and provides resolution procedures that IT administrators can use to resolve issues with Windows 10 upgrade. | +|[Convert MBR partition to GPT](mbr-to-gpt.md) |This topic provides detailed instructions for using the MBR2GPT partition conversion tool. | |[Configure a PXE server to load Windows PE](configure-a-pxe-server-to-load-windows-pe.md) |This guide describes how to configure a PXE server to load Windows PE by booting a client computer from the network. | |[Windows 10 edition upgrade](windows-10-edition-upgrades.md) |With Windows 10, you can quickly upgrade from one edition of Windows 10 to another, provided the upgrade path is supported. | | [Provisioning packages for Windows 10](provisioning-packages.md) | Learn how to use the Windows Imaging and Configuration Designer (ICD) and provisioning packages to easily configure multiple devices. | diff --git a/windows/deploy/mbr-to-gpt.md b/windows/deploy/mbr-to-gpt.md new file mode 100644 index 0000000000..8e861df720 --- /dev/null +++ b/windows/deploy/mbr-to-gpt.md @@ -0,0 +1,82 @@ +--- +title: MBR to GPT partition conversion tool +description: How to use the MBR2GPT tool to convert partitions +keywords: deploy, troubleshoot, windows, 10, upgrade, partition, mbr, gpt +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: deploy +author: greg-lindsay +localizationpriority: high +--- + +# MBR to GPT conversion tool + +**Applies to** +- Windows 10 + +>**Important**: This topic contains technical instructions for IT administrators. If you are not an IT administrator, .... + +## In this topic + +This topic contains ...: + +- [Background](#background): A.
+- [Requirements](#requirements): B.
+- [Syntax](#syntax): C. + - [Command line options](#command-line-options): D. + - [Examples](#examples): E. +- [Conversion workflow](#conversion-workflow): F. + - [Validation](#validation): G. + - [Repartitioning](#repartitioning): H. +- [Troubleshooting](#troubleshooting): I. + + +## Background + +The ...: + +1. **Something**: 1 +2. **Something**: 2 + - Example +3. **Something**: 3 + - Example +4. **Something**: 4 + - Example +5. **Something**: 5 + - Example + +**Figure 1**: 1: + +Image here + +definitions + +## Requirements + +The following ... + +Table or list here + +## Syntax + +### Command line options + +### Examples + +## Conversion workflow + +### Validation + +### Repartitioning + +## Troubleshooting + + +## Related topics + +[Windows 10 FAQ for IT professionals](https://technet.microsoft.com/en-us/windows/dn798755.aspx) +
[Windows 10 Enterprise system requirements](https://technet.microsoft.com/en-us/windows/dn798752.aspx) +
[Windows 10 Specifications](https://www.microsoft.com/en-us/windows/Windows-10-specifications) +
[Windows 10 IT pro forums](https://social.technet.microsoft.com/Forums/en-US/home?category=Windows10ITPro) +
[Fix Windows Update errors by using the DISM or System Update Readiness tool](https://support.microsoft.com/kb/947821) From a7c17cf6c3279549d735c79c9fab59ee3b07a37b Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Tue, 28 Feb 2017 16:59:38 -0800 Subject: [PATCH 010/108] stub topic --- windows/deploy/mbr-to-gpt.md | 54 ++++++++++++++++++++++++++++++++++++ 1 file changed, 54 insertions(+) diff --git a/windows/deploy/mbr-to-gpt.md b/windows/deploy/mbr-to-gpt.md index 8e861df720..12758b48e6 100644 --- a/windows/deploy/mbr-to-gpt.md +++ b/windows/deploy/mbr-to-gpt.md @@ -23,6 +23,7 @@ This topic contains ...: - [Background](#background): A.
- [Requirements](#requirements): B.
+- [How to use MBR2GPT](#how-to): BB - [Syntax](#syntax): C. - [Command line options](#command-line-options): D. - [Examples](#examples): E. @@ -58,10 +59,63 @@ The following ... Table or list here +## How to use MBR2GPT + ## Syntax ### Command line options +| Option | Description | +|----|-------------| +|/disk:\| This option specifies the Diskpart-reported disk number of the disk to be converted to GPT. If the option isn’t specified, the system disk is used. (System disk is determined using the same mechanism behind Diskpart’s “SELECT DISK SYSTEM” command.) | +|opt|desc| +|opt|desc| +|opt|desc| +|opt|desc| +|opt|desc| +|opt|desc| + +### Help + +``` + +C:\> mbr2gpt /? + +Converts a disk from MBR to GPT partitioning without modifying or deleting data on the disk. + +MBR2GPT.exe /validate|convert [/disk:] [/logs:] [/map:=] [/allowFullOS] + +Where: + + /validate + - Validates that the selected disk can be converted + without performing the actual conversion. + + /convert + - Validates that the selected disk can be converted + and performs the actual conversion. + + /disk: + - Specifies the disk number of the disk to be processed. + If not specified, the system disk is processed. + + /logs: + - Specifies the directory for logging. By default logs + are created in the %windir% directory. + + /map:= + - Specifies the GPT partition type to be used for a + given MBR partition type not recognized by Windows. + Multiple /map switches are allowed. + + /allowFullOS + - Allows the tool to be used from the full Windows + environment. By default, this tool can only be used + from the Windows Preinstallation Environment. + + +``` + ### Examples ## Conversion workflow From 236f22d261dfbf3e3699a0062704f5b4dd8ec42f Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Wed, 1 Mar 2017 14:12:12 -0800 Subject: [PATCH 011/108] draft --- windows/deploy/mbr-to-gpt.md | 32 +++++++++++++++++--------------- 1 file changed, 17 insertions(+), 15 deletions(-) diff --git a/windows/deploy/mbr-to-gpt.md b/windows/deploy/mbr-to-gpt.md index 12758b48e6..24f6985f1c 100644 --- a/windows/deploy/mbr-to-gpt.md +++ b/windows/deploy/mbr-to-gpt.md @@ -1,5 +1,5 @@ --- -title: MBR to GPT partition conversion tool +title: MBR2GPT description: How to use the MBR2GPT tool to convert partitions keywords: deploy, troubleshoot, windows, 10, upgrade, partition, mbr, gpt ms.prod: w10 @@ -10,27 +10,29 @@ author: greg-lindsay localizationpriority: high --- -# MBR to GPT conversion tool +# MBR2GPT.EXE **Applies to** - Windows 10 ->**Important**: This topic contains technical instructions for IT administrators. If you are not an IT administrator, .... +MBR2GPT.EXE converts a disk from Master Boot Record (MBR) to GUID Partition Table (GPT) partition style without modifying or deleting data on the disk. -## In this topic -This topic contains ...: +## Syntax + +``` +MBR2GPT.exe /validate|convert [/disk:] [/logs:] [/map:=] [/allowFullOS] +``` + +| Option | Description | +|----|-------------| +|/validate| This option instructs MBR2GPT.exe to perform only the disk validation steps and reports whether the disk is eligible for conversion. | +|/convert| This option instructs MBR2GPT.exe to perform the disk validation and to proceed with the conversion if all validations pass. | +|/disk:| This option specifies the Diskpart-reported disk number of the disk to be converted to GPT. If the option isn’t specified, the system disk is used. (System disk is determined using the same mechanism behind Diskpart’s “SELECT DISK SYSTEM” command.)| +|/logs:| This options specifies the directory where MBR2GPT.exe’s logs should be written. If not specified, %windir% is used.| +|/map:=| This option specifies additional partition type mappings between MBR and GPT.| +|/allowFullOS| By default, MBR2GPT.exe is blocked unless it is run from WinPE. This option overrides this block and allows conversion while running in the full Windows environment.| -- [Background](#background): A.
-- [Requirements](#requirements): B.
-- [How to use MBR2GPT](#how-to): BB -- [Syntax](#syntax): C. - - [Command line options](#command-line-options): D. - - [Examples](#examples): E. -- [Conversion workflow](#conversion-workflow): F. - - [Validation](#validation): G. - - [Repartitioning](#repartitioning): H. -- [Troubleshooting](#troubleshooting): I. ## Background From 8e55bd2f43398bad4923c84c89b8ed0afef471b0 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Wed, 1 Mar 2017 16:18:03 -0800 Subject: [PATCH 012/108] draft --- windows/deploy/images/mbr2gpt-volume.PNG | Bin 0 -> 16765 bytes windows/deploy/mbr-to-gpt.md | 71 ++++++++--------------- 2 files changed, 24 insertions(+), 47 deletions(-) create mode 100644 windows/deploy/images/mbr2gpt-volume.PNG diff --git a/windows/deploy/images/mbr2gpt-volume.PNG b/windows/deploy/images/mbr2gpt-volume.PNG new file mode 100644 index 0000000000000000000000000000000000000000..d69bed87fb01a1134dde922ecf9df866000528bc GIT binary patch literal 16765 zcmb`u2RPgB-!C4!DB3D&w`Ng$Q&d~EX(?(`d+#k&RaNc1X=~Mry%I61_A03vVh0V< zT0taE`u&~rJm)#rInR0i=lZ*@+~kuGZuk5Beyzkk*HfpVVxa;605qB!PYnP7q9nqt z{~9^r%2qxHjPQxb&p`b#05rk2OSnVoq^he505l|1U)qup?o)benEC+#wBP^Uh%$v} zSpfjmTbfT*Uj|$4FMGMWZ5OU$iZ2}Bgwl|bG0HN3(pcxM6CC`0_sS}TwqW>r=QRiD zbK-ZR$o_yEpMH8S7HXG24@@@`Ym`XqzxHan$r)@A)x!vG`r4@b?(xlNX-5gl*EgMC zhgEdO8E21mGirnfIXa<}Hg^5Z9|0pKLuk)`|7J^5=Mpfuh`4@{7Q4;HQKT}7K7UfU zGTm_x07%$X@w*}hh%pjV0PZsUUl$8MZEfwtMYp;RljvimLMID5(xmt9ISe8mQcI|a zLZ)IV&a=|ad2v6_oO6G~(1s>Z(qeKR_M`-XZYWl%F9e6z1EZ2U&+NUFBlB@5U20h(DNA(U34$o!cWj?#AUlOtf@;f@mn)!2EmD-Ol^^6R=Z&A2L?u^7Cf# zrH1?OA1)U~6Otftb2c)8rLcR*Z|*~STi=zK1P+Sg5xtw2m#;<~b3+w_ale)m@=Iie zLoON~z8HQ+HSq$?TK+qD&B}D70lom69~x1u6yAoYLB?%t6rz3-FVUX9z z*5>-iHJ_%=LVT5f_qQDESGS$hatjkqrW>^VY|-{WtnHY?<;D+C{L3QX)PoQPE>$r< z6RUkiMnE{{R~L(}c1!lc<*ldX29dYvdg*@SCpnS;~^l}0IpO$RO}PiWCITU+mL z363kXv_P3wR+u}mRRT*vbIT}I60B{4!xxF5;`GDeD4so6fFB>rLlG9KpYu^0f5x|U z62k|DYIKE9V!{ko*t+YP&5_Ik45yo7%D&$_S8kfqs-%m1Eu;n4^Ig``40B|ZdbrK| zEFNy8^KZ5aYb*L*A>v*(s!Nnds1p%bpk*>}G-lZme-Us|wHK$T9N3@AsIjMDQ9YuYEb}TV zzlV;4iH1e6e>M2U?5LIP@_81UhNjL!_TxISqMd$}S3EhxQB^meyK-A2|JL?F9yp+L zV4!NL+6ycqU_z3-`z;L`cG!*r$wz$Qn!JcXv}2t&PpdTd&|jypwibm<)+x}p-Aeqv z=s(%x5mTN@hAB=$hfn8coXkF8jB(=En%G4@bnYS25AZWvV{O+Vyvb@-J0iD1)+ z`S_Il8AzzrQE99mCzfQjI%!;#vSEVT7noS-#hs$}E0i zGhYK1RM*6AV90;Req5&8I3&5sDV9wOqy|?Qn8<{!=9{(RZcblO24v>fj}O2M$FPc)?h>r+v_#t$>#93%4|F>V6`*g~^C7_gpv$!@O!Z*7ctn;0X)yihOf6b{q{sHQtnNLN ztnFt%f585L8MCbF?XKY%#y2snv0(;x?!RooR@eysiJs9Cmh*S#a-$l5ZybOzUJi{` z|B-3?)=+Moyz+NN(M7xnjJzJ6)&fK}Fs$Fh-rqmfbBe^EV~3eO_lm9@)V{|)A7s1y z_(-+r%;)(L-Kp1^Regc{d~evr2M-p~<=E4LJHaZp?5AEY-_9+L%k1JP$C~JXJ5NYd zxo?xx5!!2MQh$QW^V!wO6-z+8ATXW;;9YW44gje9VMGSdh++J{Hto!^SUS$bAU438 zhN*P`p!D(T|6%zy>9ai_O+mNRgxa00H9uf}qxN_;$BsqLbERwF%2E`AUg7r!P`lc% zwjZ=0LV^lOC_F_3Y2rOm`83$)fn~xk*TZ5)XZ;Q#%0yN@!8hT{1vg}LN ztllXE2t4r6@NXy;q;=Ck1GvX;|X;_MHonQ3D9*TvB7yH5AQVmk`ZSHi1X5l{RD8nzB z%AjIM2X@vx1+n=yA2}X&6aOdp47`Mo&LQ?R#s=m1w8CU3Wb}{1PCUGRe^uE>Kx#td zIC3hfDU#~&y~&%Sb#rCtr7*Avo%MOmL!^~R!C>QI7w1xTaeHV(8 z`>t@`=dnuF^3T7-Y;Ma$*mxAzoovsrflX2mLY{ zi2A?=8$A?aCn?4mp8pzP+M-Z7d)=mn*IMduZ>v)|)A{uM(iJu;InX7^Zo@&JTVPkgA^>Ujw(-ys)Yp z;*9tMRFy40=Q!+F=?uQd7-%Bh=~-1NNFf}5u<=wdH{qq;+d1%2aYse`c}W>+{$|4{$(Xh~UTwetr)-l}^FEz|2Uu#~5>`a?u8=*v9yMa4>% z7k-uEu%GT7S>vomm%z$w{7QjMHz)LU>;$^S{n9LDVuR0G%X$SZg#027^A9U+D@+Dn z(jTsIwor)f4TU?ZYgo?N=0A8gjk%~~ln@=R7;CQR#`%P78N}qEK#R1HO8+$S^s2q~ zX>&+@UdPs|Ql@E^#nH>fgR*A*vfU!uGL*D%e4m)${2y9+p1tngV0E81;g)c1E|pX8 zyW$}nXQzH6SRd!t8*+isT{|B4%C|c*6yGWeH>DeB--bQy*w46Eyw8fVC|V7X5F5Bz zBZR}pcSK-y4wnWx!QOEb+W@=DgR`EVy`r7bp{OaS&X0;!+WF2>E<46MdO;g5JPZkX z56kLr$RV>d$xI5`(-JqldE^74780T;1H!0$;w`dPfOobVk}0;=g;>7hKBb&qLQ1># z3x0MyTsY#H{f=3=-pXupK&Y*z;>hC4)HD7VtLq?SDSt_2K)6siY!>vs;E~;=m#hC; z94;N3?&9;kfeFU6MYl{o&v%J!Y>oe{Z?6oYYgUn~vE&1aV!eKNUHan!&KvjFy^k#3 z3AF3GXQzhM?n%uR`WyHN-;^9zntZ7jx~$93-|LSCMk2bl`F8f+kA@WQ)}ifvUvTe8 zTwc}_Z47>wy0#TxeDS4nJp5sf=>B<-3nEbO(4y!#6xMGy~xoEi!=3nD7hmQ;qE#+nze15oo&C~j_-cM}%A8#! zXXDWC1w)B_G+9cMKjhU3rjWnqbAM_v-E z`(P|4CQp1GI2^4s06jUdys{L}Shl|u&%L!}ge!Zk0OwD~P(H*WA3#-VS(QV>nradU zTaP>TS|{N_)|+-jrT)B88$+m(Md$W7Ga*!<8$&5aZP5Y-x{F73Imq%@lrhxq$JFh2 zvo^lCmL>F))c~y=hr_UaxX_hBiC2fmssQyvxYqR(EYS|-j$@t--TBFECGOS4dke0v}ZSxSP;KX&Z+R+Yp2c55P8 z&G>|it+9{XtS+SGw=o06pmTE*ipXwpe4^wl3TEjMufBp!in%(pw9sYe&fq zDzToZ`mGkgQWgUaFJ2qq7|WUJl_0mDzBgbt+g^2 z=bpUax}c$*VX}nNo zw9u4Et+?^2^zV>~+kPZw-YMQSsg@jfcv_~!7ZzJ?luw4?{^r^eKRfRrsq`j#-`upO86y0%TRSyuHAZCBRKi`TAxu=Z!4MW506>1M8)i%AAotyS4*R> zG~x8%G4U6OjwL0&l2%F2<+X+fAZ?IYW)`&QV`EYEh^sU|3OLU5X{Df9t~smRj>y)~ z-0f{DUzc6}0Y#mZExd3bXs!|jyJxs5(oxc0o~gMYHIo24a>QZ8y0PkjA^y7 zsVvU+9lY#lZ{f_(aAsSQqQEw1q8sP5)nT6HFVark{LOXbQCT~h9nh{W4^GgF zMi$0x@f5fmq-u+hoKV(XjC}IlBYAccg58i9d`h-#)BA8uoVlfNDgZlZ0GZXf7I5>W z`CS7mOxDcD$vcBLWk;s_V(BKAkCf>+9;U$CydWlkH~Fi09M%^#D~u6DuqFBc0E|RY zB!CpE|Kc+8(o_EMa8wlH1b7p2yw@}dcESyGY+b`t5d-{v>I4Bj-~XX2|AnTj!|(0? z%it9OaHAWhywNlz1fWeI3gQ%w-Vaz=5f_7I@^7l8pp5EWeEUa!@@>hjHSQ4N*wy;r z@{kAP3a#dA7jOeN5ADKqk{mb5UsWR-4ulEsVK`(j=<91BZdjkg7ybZVF+C;>39z@9 zpUZ%?0*P$&#yu0bn;vu^E1RKat`$~0fiG^8SLMW9(oy)hUxyzolXOJ4?>iN4_NW)d?1cC>sm2;IpOm&qBzWUTG%Fx|Yk8ZP{ zVbD;umXF%h(z$#UIu>T$;f*t`MDENIBiSqMhya$QNn`*Ww*TV!`S)}7cUszUciyww z>;+CUB}0#DBiZacUtU{%maDaT|A4%Md15lT%-v6-eGb_6vVZ+|k}ZUXB8c3uhjyzh zhphf=r|PkSZI=(m_d)K*f)p9Xb{R(&Id`V4Im@y-YF5^A8Sp*Un0le_qa9Ooy6Zuy zDft^C!3$SkEYsFL@BgG;b|F)81`5+E1xAkoUa?8iu=S7UZDMFGqgGP-ppEVxpbt{! zjg6fCG0oCz$-=r)u%)PsMITEZwFR0ZGduFP;p?sSlX-THoXs4emT95kuG5RN8?cl@ zSCO4X30Nt3gDlujhr0ST!he)KzDB~4_(9%6ppi>!+hGx#tLC&^2J|rW`PsI1Bl1FA z!maFXyMNN=rv-o0t>&I8t)`H>>bE6KdRRB)R?=WKZu{rLkCl`I5j8cN(T@z}%+l#q zdQjq-dG3My&Sb0a5+Zxv=APeC_klhLePl>I5W+pd}m@v-MZlFzQ@rm1ALT&047P0B4Z^Y^E$! z3A&0{9kQ;U2=FSHlos$v@V~misM#XYIFIhC?GQI%?ocOh-Dy*uvs=++pk4*%8m!*Y zIfR)lrwquEQN>JzPkpj&g1#SYWER_-fgPuooHNDk+$` zxfVs9pTdJ1W6ij{%_C_Sh?%p`TtMWzWmC9%BV#VV)sw)gj!)R{51gvHMPA)@$j%zK z4>;-$lNe3&)9)uehXq{S35`N9DHa>wz7!cxV_VXE#nH2rgIH~+;Q&4Q0ZMEq?yd81 z)Yb0ODhPX*LS77A zeoJoeEP7>OnNUmZB6NQ)CR@aO^&!pL-|6Jm9=4X`(yqCedNj6o_%lXSM8COOO`dga983k(MzxZnM%HOok=woudJ z9%LvsS!5nO^blVA$tbOIsEgKPUL>i8E#uTuIJ5UpoY29@dBbs1ln1X~mC+|*b%?Lm zvcDqnQBuJM;0?&fH_2Mg`*JH%e*O>XD)L+uUl&!ZZxfYBFXt#pkj>gpEL%rjPa*;ECG`*y#J~TzI1rAKXtnw8ozd%UAC48z7p{4I{Qc^*;xs+9 zS111je@CvaJVjg#xim94HnH+~I~NkSEjMUC-^Fsl-tpr8vwW-gCrxKD@{I2t-p3z` z7W@ubk^(Ag!pzVCDU;e=0kd#f8KU&CqJgKU4cXlrUzkbMJz^sd%9SE3z8bDD$_EC~ zaiDUpFPOxwG~9=T_N~X%?b_x!!i*TktHnV&YI^I77N3;w^LUPX+E6Q~QD>OQ# zd6|^zrt@aDuQQZtTcHtt%3I>hC+wG)_Pr8*B`+=WI&ZL*y!{^Q z;?LIIC)H^)EVgnuJ^#FF`Q4)fu*K0L)EcAA4?46@*X_VipS=GGova@XrQVfc3LJ}J z{)M&ZhHPHQ9L>%8`L1eJ5&*9jO6auXqf+@mJ@8@hn zDWB{nrA6*a+2kitMZ)<9Ot{MKpWy%!Go=$`h`T)a3Jj?R4dMkYQb!gNR z(XoSm@4IEVPnpk`65TjZm%^qCbmdzu%*!4|HABb<|2!(HH%mVCpjN(csygGNg$k5- z@f5>Pgu5i7Q*`Eu>8Wx_qe~GwMjG^^O|tX;i61VbErRKd3(|V-a@+I>N0&5) zk;0Z3rAgP3epD&%!}vJPM_iwbnFlg&=Al*U(k5cscReb<7wL0cEwvQ;37S7?ThI}8 zZk3Q-cI=w|l-6u{!Mqll_>C(oEoo~h8uMfkWA-K2Y7W@fne3x=fGO&+sH4uXwF zfzlvn-N{p4S<6#Z411ncc5gtLi`CZ4MX-wRD2~i?Pn^9WIsLTcH1oO=(W>DzF zY%0`Z9|qywvQmen`s=8pH|B9U^Vzr5qYbqu$`#IRx(1ECMMy;;q$hgbZ;b!^nP)Dmgx!v$}UnR@Y4vEA3KCjv65tcu>V(zkDPZ#N)vtv41;MnL$Ftvllug zPY%mkG*nBZUH1C|S9)h#`#f_{igKR2qKo7M?6;D3hky^=RcJRbaMb)8k#v6%9-U;R z;`fx`Wm;BEI9qO4=?42EmF}X5wLgd7L`TrYQ>s(Yyxpyja1+gM=&zHCzO#bKw9ncb z+G|6(XozDQi-KPeHVIdo&p-2-e!q&?`{;*J0Q9dLk|XyY z-Rn$hIzq1magq-b0qA90de)pGVd}EnER1^A@4ItITqJo;4b}qs^*K9lmUiR4Po|Fe zgP(e~*`oE_$}t}4d`1$m*G<=d^-V5Pta1@X%kh`CAmV-GgKGzD3MZ?dW8N{|S?l(c z5YbECs$zp|%x9UowOq;N0io=E=^MSfphwnbnO(z)G^QRgnlZ-@Dc?RR_gzuT zc|Bp@ke+{JnDX16@Qi+piYbYRr(jf{#d=(&3Kpz1);DYAL48jLQI~9${dDg#D=_3~ zc`T}bj${oYhi*B{>NDxn&y|k}(c8b3_Sf%gEE{v1*!y+!g^X9an{j699(CpeD(=OGIV?1WShX-b1tm%; zoG2RXBM0@sxWEy(FH_K#T!m(4GqJb2o?o;F+4#q7ILkD_!g*vHoh;wQVnhDrZSjwx zmu?qkeSqn_kk$Iyw+CwOX5^l}vLW5J=@+pvz@^J6(kq#3Jev^{FYT-MB=TJhuG%Af z6MnL{`C3L5UIe;#rIqgX9Sc(MH!7#dwcJyjxmo$b<6_3p1@$LUmj<;>Nr2-IgmqUX z2q#3V{1y6C9wXlJBHt5c`CVak7r|@;p*I*)dFrF2@x5;OPRo3R?{#__7RQhK2Cl|U zGM}8PdygJNQ^k}{?LT}L&@L05I|+``7_>5Lgf6EY4ux0bakcPHA;bV1`C6+#F3)GW ztU)`$kL8rtc*neoPk&`2-Z(@WT;-f|Q{tmfVl9ot-Mf%RrtH)DNu-H1^Z;MqB}_@Q z_b0{RX19>xxkX<#|zDSkGi)7Bj_gS9QMB=dyqLQCF~@V?Km z<9#A=Uvi$sVo>a5z3)ZhU$Df2C!ylRM|Zl(#Pf=T1{)WZy0+}RmWF8>>EaZXF5LkVnc)y;-UDaS~&f`MiP6YVVK70@G zDV|_`+N}ROM*7dcD!(na?s+%3H=k;;CgS9Lh+CNs?(OiNty|3LW46nb&UN2}SgcS% z1@`_BDLV6-&3jMJ_>E^2QBoFwS7r=otAXgl5Q2>riiIJ%2t?!XmSBsv?~fo95D@ZhYVE`3jV6wwkUPTy<@ERB2fS zYW;j?J1P2nF>hx$t8uaH7Ec1z?B}?mw{HWzq3VsT*6HD0$m!3&6mYj&Y-P2soC-My zXF8$_=3A);YRsz?33`+J@JK|x1>v{ovYT$@_sF(P-l7D8UK8(uE})Gzys z?>&E67t0R#bn#X!oV$t>-I>fFj%6$tmOr9yPqm~c$Tw!rZGj$Uqz8qg%t6qI&*gNY z4ExWamvDj;XV}Ak`~4}zdQ)-0eQwDZCfR80I(!R@p zYgS#73uX6ixoPWCKfxgoJzhbq`_(xfnu~#&^CB2u4j0r&xG6KUth>-8oC&}<@Dp6s ze8X}f(DK2>yjAMyLH%?of%-DunCQ+s-q1JfTdC7@lg<$hd+v*x$?Hy{Y2V8BAA97s zO^Ish{#8lfCErsWJgOf-3ceIOu+a8SE9HL7F|`OX_)C^mwfjj^JTSRX51or7O?XkW zrB?JP8~M#974UKZ$)z|gyJB9GI19k;UcjD|^XO{QP#1eJ#hZTBU$6dA@5)snZq6Qn z_VWL{#Qv8@%jxAV3+NFg+54VJJFRJ9;a|IIVtgpXA0mKg7hge1VVS-!%HI^3NM1?7 z+oQhh9pk!be-hatAM7zE**cn+h^UhvTZ`IN!ubLkRO8u!m~h2{85l72|30?6a(o zw^gC>dFGXePPL? zfgKS(@Ylh`3$yQZL~h*8_sP#74g7Y;3vc z>6AWW&Dp5j z>?jRsiRAX8;xqY0$iS?5Qr9HqwBKvdH9Y1MhKs?<_!QzDs35%u895$P!w4tWk3TQ} zDMB-`i*x+;{3mZN2F(k+XRDf{;cAf<#OHq4@_}%1u?kRIuj#0eoas>~bAXXUX`@jV z)br528!)Aw!zcZZT@d5?>g)G0*4p7kVxj9)&~LyR2RmL5?RWdGE<^8icYi7OHOt+? zo
+ ``` MBR2GPT.exe /validate|convert [/disk:] [/logs:] [/map:=] [/allowFullOS] ``` +
+ ### Options | Option | Description | From dd9179e6b336ffe48b9c75792531e938c4fca617 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 3 Mar 2017 12:45:27 -0800 Subject: [PATCH 038/108] draft done --- windows/deploy/mbr-to-gpt.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deploy/mbr-to-gpt.md b/windows/deploy/mbr-to-gpt.md index e3082d8322..ec05ed70c7 100644 --- a/windows/deploy/mbr-to-gpt.md +++ b/windows/deploy/mbr-to-gpt.md @@ -78,7 +78,7 @@ In the following example: 2. The MBR2GPT tool is used to convert disk 0. 3. The DISKPART tool displays that disk 0 is now using the GPT format. 4. The new disk layout is displayed - four partitions are present on the GPT disk: three are identical to the previous partitions and one is the new EFI system partition (volume 3). -5. The OS volume is selected again, and detail displays that it has been converted to the [GPT partition type](https://msdn.microsoft.com/library/windows/desktop/aa365449.aspx)   **ebd0a0a2-b9e5-4433-87c0-68b6b72699c7** corresponding to the **PARTITION_BASIC_DATA_GUID** type. +5. The OS volume is selected again, and detail displays that it has been converted to the [GPT partition type](https://msdn.microsoft.com/library/windows/desktop/aa365449.aspx) **ebd0a0a2-b9e5-4433-87c0-68b6b72699c7** corresponding to the **PARTITION_BASIC_DATA_GUID** type. >As noted in the output from the MBR2GPT tool, you must make changes to the computer firmware so that the new EFI system partition will boot properly. From b2219ef1dd7a8c7d4fdb54295473c98ab6389f0d Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 3 Mar 2017 12:49:36 -0800 Subject: [PATCH 039/108] draft done --- windows/deploy/mbr-to-gpt.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/deploy/mbr-to-gpt.md b/windows/deploy/mbr-to-gpt.md index ec05ed70c7..84ee78ec10 100644 --- a/windows/deploy/mbr-to-gpt.md +++ b/windows/deploy/mbr-to-gpt.md @@ -29,10 +29,10 @@ You can use MBR2GPT to perform the following: You can use MBR2GPT to convert an MBR disk with BitLocker-encrypted volumes as long as protection has been suspended. To resume BitLocker after conversion, you will need to delete the existing protectors and recreate them. -The MBR2GPT tool can convert operating system disks that are running earlier versions of Windows, such as Windows 10 versions 1507, 1511, and 1607. However, you must run the tool while booted into Windows 10 version 1703 or later, and perform an offline conversion. +The MBR2GPT tool can convert operating system disks that have earlier versions of Windows installed, such as Windows 10 versions 1507, 1511, and 1607. However, you must run the tool while booted into Windows 10 version 1703 or later, and perform an offline conversion. >[!IMPORTANT] ->After the disk has been converted to GPT partition style, the firmware must be reconfigured to boot in UEFI mode. Make sure that your device supports UEFI before attempting to convert the disk. +>After the disk has been converted to GPT partition style, the firmware must be reconfigured to boot in UEFI mode.
Make sure that your device supports UEFI before attempting to convert the disk. ## Syntax From 7fb3521313f5e84b8cefcec004ad24f140a05c22 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 3 Mar 2017 12:52:21 -0800 Subject: [PATCH 040/108] draft done --- windows/deploy/mbr-to-gpt.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/windows/deploy/mbr-to-gpt.md b/windows/deploy/mbr-to-gpt.md index 84ee78ec10..408698d4a4 100644 --- a/windows/deploy/mbr-to-gpt.md +++ b/windows/deploy/mbr-to-gpt.md @@ -36,7 +36,7 @@ The MBR2GPT tool can convert operating system disks that have earlier versions o ## Syntax -
+
``` MBR2GPT.exe /validate|convert [/disk:] [/logs:] [/map:=] [/allowFullOS] @@ -44,6 +44,7 @@ MBR2GPT.exe /validate|convert [/disk:] [/logs:] [/map:
+ ### Options | Option | Description | From 178bb9524e1d9b13c304ff225b42a0103047daae Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 3 Mar 2017 12:54:52 -0800 Subject: [PATCH 041/108] draft done --- windows/deploy/mbr-to-gpt.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deploy/mbr-to-gpt.md b/windows/deploy/mbr-to-gpt.md index 408698d4a4..aff993ba86 100644 --- a/windows/deploy/mbr-to-gpt.md +++ b/windows/deploy/mbr-to-gpt.md @@ -79,7 +79,7 @@ In the following example: 2. The MBR2GPT tool is used to convert disk 0. 3. The DISKPART tool displays that disk 0 is now using the GPT format. 4. The new disk layout is displayed - four partitions are present on the GPT disk: three are identical to the previous partitions and one is the new EFI system partition (volume 3). -5. The OS volume is selected again, and detail displays that it has been converted to the [GPT partition type](https://msdn.microsoft.com/library/windows/desktop/aa365449.aspx) **ebd0a0a2-b9e5-4433-87c0-68b6b72699c7** corresponding to the **PARTITION_BASIC_DATA_GUID** type. +5. The OS volume is selected again, and detail displays that it has been converted to the [GPT partition type](https://msdn.microsoft.com/library/windows/desktop/aa365449.aspx) of **ebd0a0a2-b9e5-4433-87c0-68b6b72699c7** corresponding to the **PARTITION_BASIC_DATA_GUID** type. >As noted in the output from the MBR2GPT tool, you must make changes to the computer firmware so that the new EFI system partition will boot properly. From dcba64e7e9589afb1ed27b457457fd821c6a7b19 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 3 Mar 2017 13:01:06 -0800 Subject: [PATCH 042/108] draft done --- windows/deploy/mbr-to-gpt.md | 12 +++--------- 1 file changed, 3 insertions(+), 9 deletions(-) diff --git a/windows/deploy/mbr-to-gpt.md b/windows/deploy/mbr-to-gpt.md index aff993ba86..6eef8da0ac 100644 --- a/windows/deploy/mbr-to-gpt.md +++ b/windows/deploy/mbr-to-gpt.md @@ -21,8 +21,8 @@ localizationpriority: high You can use MBR2GPT to perform the following: -- Within the Windows PE environment: Convert any attached MBR-formatted disk to GPT, including the system disk. -- From within the currently running OS: Convert any attached MBR-formatted disk to GPT, including the system disk. +- \[Within the Windows PE environment\]: Convert any attached MBR-formatted disk to GPT, including the system disk. +- \[From within the currently running OS\]: Convert any attached MBR-formatted disk to GPT, including the system disk. >MBR2GPT is available in Windows 10 version 1703, also known as Windows 10 Creator's Update, and later versions. >The tool is available in both the full OS environment and Windows PE. @@ -36,13 +36,7 @@ The MBR2GPT tool can convert operating system disks that have earlier versions o ## Syntax -
- -``` -MBR2GPT.exe /validate|convert [/disk:] [/logs:] [/map:=] [/allowFullOS] -``` - -
+
MBR2GPT.exe /validate|convert [/disk:] [/logs:] [/map:=] [/allowFullOS]
### Options From 61e51a91ac5357e04cab3c421b48e36281887624 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 3 Mar 2017 13:02:21 -0800 Subject: [PATCH 043/108] draft done --- windows/deploy/mbr-to-gpt.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deploy/mbr-to-gpt.md b/windows/deploy/mbr-to-gpt.md index 6eef8da0ac..d1bdccaba0 100644 --- a/windows/deploy/mbr-to-gpt.md +++ b/windows/deploy/mbr-to-gpt.md @@ -36,7 +36,7 @@ The MBR2GPT tool can convert operating system disks that have earlier versions o ## Syntax -
MBR2GPT.exe /validate|convert [/disk:] [/logs:] [/map:=] [/allowFullOS]
+
MBR2GPT /validate|convert [/disk:] [/logs:] [/map:=] [/allowFullOS]
### Options From 41487852bc3bc17f03f0866b77e21cc457b5684e Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 3 Mar 2017 13:08:37 -0800 Subject: [PATCH 044/108] draft done --- windows/deploy/mbr-to-gpt.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/windows/deploy/mbr-to-gpt.md b/windows/deploy/mbr-to-gpt.md index d1bdccaba0..259dbf6521 100644 --- a/windows/deploy/mbr-to-gpt.md +++ b/windows/deploy/mbr-to-gpt.md @@ -36,7 +36,9 @@ The MBR2GPT tool can convert operating system disks that have earlier versions o ## Syntax -
MBR2GPT /validate|convert [/disk:] [/logs:] [/map:=] [/allowFullOS]
+``` +MBR2GPT /validate|convert [/disk:] [/logs:] [/map:=] [/allowFullOS] +``` ### Options From 392e4e817647b116eb39587d4bd59a4944f8f8dd Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 3 Mar 2017 13:36:00 -0800 Subject: [PATCH 045/108] draft done --- windows/deploy/mbr-to-gpt.md | 11 +++++++++++ 1 file changed, 11 insertions(+) diff --git a/windows/deploy/mbr-to-gpt.md b/windows/deploy/mbr-to-gpt.md index 259dbf6521..b1c03a1403 100644 --- a/windows/deploy/mbr-to-gpt.md +++ b/windows/deploy/mbr-to-gpt.md @@ -40,6 +40,17 @@ The MBR2GPT tool can convert operating system disks that have earlier versions o MBR2GPT /validate|convert [/disk:] [/logs:] [/map:=] [/allowFullOS] ``` + +
MBR2GPT /validate|convert [/disk:\] [/logs:\] [/map:\=\] [/allowFullOS] +
+ +`MBR2GPT /validate|convert [/disk:] [/logs:] [/map:=] [/allowFullOS]` + +
MBR2GPT /validate|convert [/disk:] [/logs:] [/map:=] [/allowFullOS]
+ +***MBR2GPT /validate|convert [/disk:] [/logs:] [/map:=] [/allowFullOS]*** + +***MBR2GPT /validate|convert [/disk:\] [/logs:\] [/map:\=\] [/allowFullOS]*** ### Options From b710a210a0aded1df4ef8be3ef8af7f34b79010c Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 3 Mar 2017 13:44:21 -0800 Subject: [PATCH 046/108] draft done --- windows/deploy/mbr-to-gpt.md | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/windows/deploy/mbr-to-gpt.md b/windows/deploy/mbr-to-gpt.md index b1c03a1403..8882ec0ece 100644 --- a/windows/deploy/mbr-to-gpt.md +++ b/windows/deploy/mbr-to-gpt.md @@ -52,6 +52,16 @@ MBR2GPT /validate|convert [/disk:] [/logs:] [/map:] [/logs:\] [/map:\=\] [/allowFullOS]*** +
+``` +MBR2GPT /validate|convert [/disk:] [/logs:] [/map:=] [/allowFullOS] +``` +
+ +
+`MBR2GPT /validate|convert [/disk:] [/logs:] [/map:=] [/allowFullOS]` +
+ ### Options | Option | Description | From 536cca3ac70fcf5895083360edc45e624b391ab5 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 3 Mar 2017 13:51:27 -0800 Subject: [PATCH 047/108] draft done --- windows/deploy/mbr-to-gpt.md | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/windows/deploy/mbr-to-gpt.md b/windows/deploy/mbr-to-gpt.md index 8882ec0ece..14f07feeb4 100644 --- a/windows/deploy/mbr-to-gpt.md +++ b/windows/deploy/mbr-to-gpt.md @@ -62,6 +62,14 @@ MBR2GPT /validate|convert [/disk:] [/logs:] [/map:] [/logs:] [/map:=] [/allowFullOS]`
+ +
MBR2GPT /validate|convert [/disk:\] [/logs:\] [/map:\=\] [/allowFullOS] +
+ + +
MBR2GPT /validate|convert [/disk:\] [/logs:\] [/map:\=\] [/allowFullOS] +
+ ### Options | Option | Description | From 7ef6574651390021fb2575cbe8f17df6071724fd Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 3 Mar 2017 13:55:10 -0800 Subject: [PATCH 048/108] draft done --- windows/deploy/mbr-to-gpt.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/deploy/mbr-to-gpt.md b/windows/deploy/mbr-to-gpt.md index 14f07feeb4..0f6ba54c9b 100644 --- a/windows/deploy/mbr-to-gpt.md +++ b/windows/deploy/mbr-to-gpt.md @@ -58,7 +58,7 @@ MBR2GPT /validate|convert [/disk:] [/logs:] [/map: -
+
`MBR2GPT /validate|convert [/disk:] [/logs:] [/map:=] [/allowFullOS]`
@@ -340,7 +340,7 @@ Where: ### Return codes -The following return codes are displayed by MBR2GPT: +MBR2GPT has the following associated return codes: | Return code | Description | |----|-------------| From 631ea9fc4d1e6e0eb33031c647ea8180f1c546c4 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 3 Mar 2017 14:01:21 -0800 Subject: [PATCH 049/108] draft done --- windows/deploy/mbr-to-gpt.md | 25 +++++++++++-------------- 1 file changed, 11 insertions(+), 14 deletions(-) diff --git a/windows/deploy/mbr-to-gpt.md b/windows/deploy/mbr-to-gpt.md index 0f6ba54c9b..17940ad043 100644 --- a/windows/deploy/mbr-to-gpt.md +++ b/windows/deploy/mbr-to-gpt.md @@ -44,32 +44,29 @@ MBR2GPT /validate|convert [/disk:] [/logs:] [/map:MBR2GPT /validate|convert [/disk:\] [/logs:\] [/map:\=\] [/allowFullOS] -`MBR2GPT /validate|convert [/disk:] [/logs:] [/map:=] [/allowFullOS]` -
MBR2GPT /validate|convert [/disk:] [/logs:] [/map:=] [/allowFullOS]
- -***MBR2GPT /validate|convert [/disk:] [/logs:] [/map:=] [/allowFullOS]*** - -***MBR2GPT /validate|convert [/disk:\] [/logs:\] [/map:\=\] [/allowFullOS]*** - -
-``` +
 MBR2GPT /validate|convert [/disk:] [/logs:] [/map:=] [/allowFullOS]
-```
-
+ + -
-`MBR2GPT /validate|convert [/disk:] [/logs:] [/map:=] [/allowFullOS]` -
MBR2GPT /validate|convert [/disk:\] [/logs:\] [/map:\=\] [/allowFullOS]
+ +
MBR2GPT /validate|convert [/disk:\] [/logs:\] [/map:\=\] [/allowFullOS] +
+
MBR2GPT /validate|convert [/disk:\] [/logs:\] [/map:\=\] [/allowFullOS]
+ +
MBR2GPT /validate|convert [/disk:\] [/logs:\] [/map:\=\] [/allowFullOS] +
+ ### Options | Option | Description | From cd75bdcce8af76ecc181bb57a51cd490cab5c4e4 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 3 Mar 2017 14:03:13 -0800 Subject: [PATCH 050/108] draft done --- windows/deploy/mbr-to-gpt.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/windows/deploy/mbr-to-gpt.md b/windows/deploy/mbr-to-gpt.md index 17940ad043..8de07198c5 100644 --- a/windows/deploy/mbr-to-gpt.md +++ b/windows/deploy/mbr-to-gpt.md @@ -49,7 +49,9 @@ MBR2GPT /validate|convert [/disk:] [/logs:] [/map:] [/logs:] [/map:=] [/allowFullOS] - +
+MBR2GPT /validate|convert [/disk:\] [/logs:\] [/map:\=\] [/allowFullOS]
+
MBR2GPT /validate|convert [/disk:\] [/logs:\] [/map:\=\] [/allowFullOS] From e8455192638b6d0bfd1072b9bb11a475e9ecb67d Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 3 Mar 2017 14:07:01 -0800 Subject: [PATCH 051/108] trying to get syntax on one line --- windows/deploy/mbr-to-gpt.md | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/windows/deploy/mbr-to-gpt.md b/windows/deploy/mbr-to-gpt.md index 8de07198c5..2a3fc365c2 100644 --- a/windows/deploy/mbr-to-gpt.md +++ b/windows/deploy/mbr-to-gpt.md @@ -69,6 +69,13 @@ MBR2GPT /validate|convert [/disk:\] [/logs:\] [/map:
MBR2GPT /validate|convert [/disk:\] [/logs:\] [/map:\=\] [/allowFullOS]
+
+ +
MBR2GPT /validate|convert [/disk:\] [/logs:\] [/map:\=\] [/allowFullOS] +
+
+ + ### Options | Option | Description | From 0d63c3e7622419cad894395b5d9f6f851eadbc3c Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 3 Mar 2017 14:10:35 -0800 Subject: [PATCH 052/108] trying to get syntax on one line --- windows/deploy/mbr-to-gpt.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deploy/mbr-to-gpt.md b/windows/deploy/mbr-to-gpt.md index 2a3fc365c2..6a4b5fdb66 100644 --- a/windows/deploy/mbr-to-gpt.md +++ b/windows/deploy/mbr-to-gpt.md @@ -58,7 +58,7 @@ MBR2GPT /validate|convert [/disk:\] [/logs:\] [/map: -
MBR2GPT /validate|convert [/disk:\] [/logs:\] [/map:\=\] [/allowFullOS] +
MBR2GPT /validate|convert [/disk:\] [/logs:\] [/map:\=\] [/allowFullOS]
From 16350475d79d38d79b0c6d577a4c9a256a2bbd53 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 3 Mar 2017 14:14:30 -0800 Subject: [PATCH 053/108] trying to get syntax on one line --- windows/deploy/mbr-to-gpt.md | 9 --------- 1 file changed, 9 deletions(-) diff --git a/windows/deploy/mbr-to-gpt.md b/windows/deploy/mbr-to-gpt.md index 6a4b5fdb66..032a68f18a 100644 --- a/windows/deploy/mbr-to-gpt.md +++ b/windows/deploy/mbr-to-gpt.md @@ -44,15 +44,6 @@ MBR2GPT /validate|convert [/disk:] [/logs:] [/map:
MBR2GPT /validate|convert [/disk:\] [/logs:\] [/map:\=\] [/allowFullOS]
- -
-MBR2GPT /validate|convert [/disk:] [/logs:] [/map:=] [/allowFullOS]
-
- -
-MBR2GPT /validate|convert [/disk:\] [/logs:\] [/map:\=\] [/allowFullOS]
-
-
MBR2GPT /validate|convert [/disk:\] [/logs:\] [/map:\=\] [/allowFullOS]
From 0be2d9abd1ea45f5dd3eb1e634472b8f803635d3 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 3 Mar 2017 14:17:22 -0800 Subject: [PATCH 054/108] I hate markdown --- windows/deploy/mbr-to-gpt.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deploy/mbr-to-gpt.md b/windows/deploy/mbr-to-gpt.md index 032a68f18a..0f86cfcab9 100644 --- a/windows/deploy/mbr-to-gpt.md +++ b/windows/deploy/mbr-to-gpt.md @@ -56,7 +56,7 @@ MBR2GPT /validate|convert [/disk:] [/logs:] [/map:MBR2GPT /validate|convert [/disk:\] [/logs:\] [/map:\=\] [/allowFullOS] - +
MBR2GPT /validate|convert [/disk:\] [/logs:\] [/map:\=\] [/allowFullOS]
From 2803a165f3fb62c09e8d803b6517774df3c4ca4f Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 3 Mar 2017 14:26:37 -0800 Subject: [PATCH 055/108] I hate markdown --- windows/deploy/mbr-to-gpt.md | 13 ++++++++----- 1 file changed, 8 insertions(+), 5 deletions(-) diff --git a/windows/deploy/mbr-to-gpt.md b/windows/deploy/mbr-to-gpt.md index 0f86cfcab9..eab1b71dec 100644 --- a/windows/deploy/mbr-to-gpt.md +++ b/windows/deploy/mbr-to-gpt.md @@ -37,19 +37,20 @@ The MBR2GPT tool can convert operating system disks that have earlier versions o ## Syntax ``` -MBR2GPT /validate|convert [/disk:] [/logs:] [/map:=] [/allowFullOS] +MBR2GPT /validate|convert [/disk:] [/logs:] [/map:=] +[/allowFullOS] ```
MBR2GPT /validate|convert [/disk:\] [/logs:\] [/map:\=\] [/allowFullOS]
- -
MBR2GPT /validate|convert [/disk:\] [/logs:\] [/map:\=\] [/allowFullOS] + +
MBR2GPT /validate|convert [/disk:\] [/logs:\] [/map:\=\] [/allowFullOS]
-
MBR2GPT /validate|convert [/disk:\] [/logs:\] [/map:\=\] [/allowFullOS] +
MBR2GPT /validate|convert [/disk:\] [/logs:\] [/map:\=\] [/allowFullOS]
@@ -60,12 +61,14 @@ MBR2GPT /validate|convert [/disk:] [/logs:] [/map:
MBR2GPT /validate|convert [/disk:\] [/logs:\] [/map:\=\] [/allowFullOS]
-
+
MBR2GPT /validate|convert [/disk:\] [/logs:\] [/map:\=\] [/allowFullOS]
+- Last try + ### Options From c65dc0921e8db701a1406162b9478c7cf3a56d86 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 3 Mar 2017 14:35:18 -0800 Subject: [PATCH 056/108] ended up using table style --- windows/deploy/mbr-to-gpt.md | 30 ------------------------------ 1 file changed, 30 deletions(-) diff --git a/windows/deploy/mbr-to-gpt.md b/windows/deploy/mbr-to-gpt.md index eab1b71dec..5d8d8e9247 100644 --- a/windows/deploy/mbr-to-gpt.md +++ b/windows/deploy/mbr-to-gpt.md @@ -36,40 +36,10 @@ The MBR2GPT tool can convert operating system disks that have earlier versions o ## Syntax -``` -MBR2GPT /validate|convert [/disk:] [/logs:] [/map:=] -[/allowFullOS] -``` - - -
MBR2GPT /validate|convert [/disk:\] [/logs:\] [/map:\=\] [/allowFullOS] -
- - -
MBR2GPT /validate|convert [/disk:\] [/logs:\] [/map:\=\] [/allowFullOS] -
- - -
MBR2GPT /validate|convert [/disk:\] [/logs:\] [/map:\=\] [/allowFullOS] -
- - -
MBR2GPT /validate|convert [/disk:\] [/logs:\] [/map:\=\] [/allowFullOS] -
-
MBR2GPT /validate|convert [/disk:\] [/logs:\] [/map:\=\] [/allowFullOS]
-
- -
MBR2GPT /validate|convert [/disk:\] [/logs:\] [/map:\=\] [/allowFullOS] -
-
- -- Last try - - ### Options | Option | Description | From 5c723e83dadd78b2a94e304171b4fe82f6855e1c Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 3 Mar 2017 14:43:38 -0800 Subject: [PATCH 057/108] minor tweaks --- windows/deploy/mbr-to-gpt.md | 27 ++++++++++++++------------- 1 file changed, 14 insertions(+), 13 deletions(-) diff --git a/windows/deploy/mbr-to-gpt.md b/windows/deploy/mbr-to-gpt.md index 5d8d8e9247..0d68c5dab1 100644 --- a/windows/deploy/mbr-to-gpt.md +++ b/windows/deploy/mbr-to-gpt.md @@ -262,7 +262,20 @@ The conversion tool will obtain volume unique ID before and after the layout con ## Troubleshooting -The tool will display status information in its output. Both validation and conversion are clear if any errors are encountered. For example, if one or more partitions do not translate properly, this is displayed and the conversion not performed. To view more detail about any errors that are encountered, see the associated log files. +The tool will display status information in its output. Both validation and conversion are clear if any errors are encountered. For example, if one or more partitions do not translate properly, this is displayed and the conversion not performed. To view more detail about any errors that are encountered, see the associated [log files](#logs). + +### Logs + +Four log files are created by the MBR2GPT tool: + +- diagerr.xml +- diagwrn.xml +- setupact.log +- setuperr.log + +These files contain errors and warnings encountered during disk validation and conversion. Information in these files can be helpful in diagnosing problems with the tool. The setupact.log and setuperr.log files will have the most detailed information about disk layouts, processes, and other information pertaining to disk validation and conversion. Note: The setupact*.log files are different than the Windows Setup files that are found in the %Windir%\Panther directory. + +The default location for all these log files in Windows PE is **%windir%**. ### Interactive help @@ -327,18 +340,6 @@ MBR2GPT has the following associated return codes: |10| Conversion failed due to error while applying GPT layout.| |100| Conversion to GPT layout succeeded, but some boot configuration data entries could not be restored.| -### Logs - -Four log files are created by the MBR2GPT tool: - -- diagerr.xml -- diagwrn.xml -- setupact.log -- setuperr.log - -These files contain errors and warnings, respectively, encountered during disk validation and conversion. These logs can be helpful in diagnosing problems with the tool. The setupact.log and setuperr.log files will have the most detailed information about disk layouts and other information and processes that are encountered during validation and conversion. Note: The setupact*.log files are different than the Windows Setup files that are found in the %Windir%\Panther directory. - -The default location for all these log files in Windows PE is **%windir%**. ### Determining the partition type From 1b2977c38b97fde87ab9c3c20dca7bdbcae30cc8 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 3 Mar 2017 14:47:10 -0800 Subject: [PATCH 058/108] minor tweaks --- windows/deploy/mbr-to-gpt.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deploy/mbr-to-gpt.md b/windows/deploy/mbr-to-gpt.md index 0d68c5dab1..5775e4b633 100644 --- a/windows/deploy/mbr-to-gpt.md +++ b/windows/deploy/mbr-to-gpt.md @@ -254,7 +254,7 @@ For more information about partition types, see: The conversion tool will attempt to remap all drive letter assignment information contained in the registry that correspond to the volumes of the converted disk. If a drive letter assignment cannot be restored, an error will be displayed at the console and in the log, so that you can manually perform the correct assignment of the drive letter. **Important**: this code runs after the layout conversion has taken place, so the operation cannot be undone at this stage. -The conversion tool will obtain volume unique ID before and after the layout conversion, organizing this information into a lookup table. It will then iterate through all the entries in **HKLM\SYSTEM\MountedDevices**, and for each entry do the following: +The conversion tool will obtain volume unique ID data before and after the layout conversion, organizing this information into a lookup table. It will then iterate through all the entries in **HKLM\SYSTEM\MountedDevices**, and for each entry do the following: 1. Check if the unique ID corresponds to any of the unique IDs for any of the volumes that are part of the converted disk. 2. If found, set the value to be the new unique ID, obtained after the layout conversion. From 5f1cc66633e04285101469db74078416bf7f1a1e Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 3 Mar 2017 15:44:13 -0800 Subject: [PATCH 059/108] done --- windows/deploy/change-history-for-deploy-windows-10.md | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/windows/deploy/change-history-for-deploy-windows-10.md b/windows/deploy/change-history-for-deploy-windows-10.md index a71d13e154..d2629f839f 100644 --- a/windows/deploy/change-history-for-deploy-windows-10.md +++ b/windows/deploy/change-history-for-deploy-windows-10.md @@ -11,6 +11,11 @@ author: greg-lindsay # Change history for Deploy Windows 10 This topic lists new and updated topics in the [Deploy Windows 10](index.md) documentation for [Windows 10 and Windows 10 Mobile](../index.md). +## March 2017 +| New or changed topic | Description | +|----------------------|-------------| +| [Convert MBR partition to GPT](mbr-to-gpt.md) | New | + ## February 2017 | New or changed topic | Description | |----------------------|-------------| From 75d41995de588b067686086f402de8632d1d8020 Mon Sep 17 00:00:00 2001 From: Celeste de Guzman Date: Fri, 3 Mar 2017 17:33:16 -0800 Subject: [PATCH 060/108] added BI metadata --- smb/cloud-mode-business-setup.md | 5 +++++ smb/index.md | 5 +++++ 2 files changed, 10 insertions(+) diff --git a/smb/cloud-mode-business-setup.md b/smb/cloud-mode-business-setup.md index be587b1251..e91ee664fb 100644 --- a/smb/cloud-mode-business-setup.md +++ b/smb/cloud-mode-business-setup.md @@ -3,8 +3,13 @@ title: Deploy and manage a full cloud IT solution for your business description: Learn how to set up a cloud infrastructure for your business, acquire devices and apps, and configure and deploy policies to your devices. keywords: smb, full cloud IT solution, small to medium business, deploy, setup, manage, Windows, Intune, Office 365 ms.prod: w10 +ms.technology: smb-windows +ms.topic: hero-article +ms.author: celested ms.mktglfcycl: deploy ms.sitesec: library +ms.lang: EN +ms.loc: US ms.pagetype: smb author: CelesteDG --- diff --git a/smb/index.md b/smb/index.md index e110eb7d93..66ce83c5e5 100644 --- a/smb/index.md +++ b/smb/index.md @@ -3,8 +3,13 @@ title: Windows 10 for small to midsize businesses description: Microsoft products and devices to transform and grow your businessLearn how to use Windows 10 for your small to midsize business. keywords: Windows 10, SMB, small business, midsize business, business ms.prod: w10 +ms.technology: smb-windows +ms.topic: article +ms.author: celested ms.mktglfcycl: deploy ms.sitesec: library +ms.lang: EN +ms.loc: US ms.pagetype: smb author: CelesteDG --- From f90e3c0fcc85ec5fccb835372c7ce62cbd653f0d Mon Sep 17 00:00:00 2001 From: Celeste de Guzman Date: Fri, 3 Mar 2017 17:51:01 -0800 Subject: [PATCH 061/108] removed ms lang and loc, as these get auto added per brian --- smb/cloud-mode-business-setup.md | 2 -- smb/index.md | 2 -- 2 files changed, 4 deletions(-) diff --git a/smb/cloud-mode-business-setup.md b/smb/cloud-mode-business-setup.md index e91ee664fb..5c56cb0492 100644 --- a/smb/cloud-mode-business-setup.md +++ b/smb/cloud-mode-business-setup.md @@ -8,8 +8,6 @@ ms.topic: hero-article ms.author: celested ms.mktglfcycl: deploy ms.sitesec: library -ms.lang: EN -ms.loc: US ms.pagetype: smb author: CelesteDG --- diff --git a/smb/index.md b/smb/index.md index 66ce83c5e5..b15093ddee 100644 --- a/smb/index.md +++ b/smb/index.md @@ -8,8 +8,6 @@ ms.topic: article ms.author: celested ms.mktglfcycl: deploy ms.sitesec: library -ms.lang: EN -ms.loc: US ms.pagetype: smb author: CelesteDG --- From e1d3cdf540b6629f18ec2136b69457735b51210a Mon Sep 17 00:00:00 2001 From: LizRoss Date: Mon, 6 Mar 2017 11:28:23 -0800 Subject: [PATCH 062/108] Changing formatting --- browsers/edge/available-policies.md | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) diff --git a/browsers/edge/available-policies.md b/browsers/edge/available-policies.md index 110429fbf6..351950b7bc 100644 --- a/browsers/edge/available-policies.md +++ b/browsers/edge/available-policies.md @@ -29,6 +29,30 @@ By using Group Policy and Intune, you can set up a policy setting once, and then ## Group Policy settings Microsoft Edge works with these Group Policy settings (`Computer Configuration\Administrative Templates\Windows Components\Microsoft Edge\`) to help you manage your company's web browser configurations: + + + + + + + + + + + + + + + + + + + +
Policy nameSupported versionsDescriptionOptions
Allow Address bar drop-down list suggestionsWindows 10, Windows Insider ProgramThis policy setting lets you decide whether the Address bar drop-down functionality is available in Microsoft Edge. We recommend disabling this setting if you want to minimize network connections from Microsoft Edge to Microsoft services.

Note
Disabling this setting turns off the Address bar drop-down functionality. Therefore, because search suggestions are shown in the drop-down, this setting takes precedence over the "Configure search suggestions in Address bar" setting.

If you enable or don't configure this setting, employees can see the Address bar drop-down functionality in Microsoft Edge.

If you disable this setting, employees won't see the Address bar drop-down functionality in Microsoft Edge. This setting also disables the user-defined setting, "Show search and site suggestions as I type".

Enabled or not configured (default): Employees can see the Address bar drop-down functionality in Microsoft Edge.

Disabled: Employees won't see the Address bar drop-down functionality in Microsoft Edge. This setting also disables the user-defined setting, "Show search and site suggestions as I type".

Allow Adobe FlashWindows 10 or laterThis setting lets you decide whether employees can run Adobe Flash in Microsoft Edge.

If you enable or don't configure this setting, employees can use Adobe Flash.

If you disable this setting, employees can't use Adobe Flash.

Enabled or not configured (default): Employees use Adobe Flash in Microsoft Edge.

Disabled: Employees can’t use Adobe Flash.

+ + + + |Policy name|Supported versions|Description|Options| |-------------|------------|-------------|--------| |Allow Address bar drop-down list suggestions|Windows 10, Windows Insider Program|This policy setting lets you decide whether the Address bar drop-down functionality is available in Microsoft Edge. We recommend disabling this setting if you want to minimize network connections from Microsoft Edge to Microsoft services.

**Note**
Disabling this setting turns off the Address bar drop-down functionality. Therefore, because search suggestions are shown in the drop-down, this setting takes precedence over the "Configure search suggestions in Address bar" setting.

If you enable or don't configure this setting, employees can see the Address bar drop-down functionality in Microsoft Edge.

If you disable this setting, employees won't see the Address bar drop-down functionality in Microsoft Edge. This setting also disables the user-defined setting, "Show search and site suggestions as I type".|**Enabled or not configured (default):** Employees can see the Address bar drop-down functionality in Microsoft Edge.

**Disabled:** Employees won't see the Address bar drop-down functionality in Microsoft Edge. This setting also disables the user-defined setting, "Show search and site suggestions as I type".| From 3a5956519d62393ebd651c3beb1969b6dfce2921 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Mon, 6 Mar 2017 11:37:16 -0800 Subject: [PATCH 063/108] Changing formatting --- browsers/edge/available-policies.md | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) diff --git a/browsers/edge/available-policies.md b/browsers/edge/available-policies.md index 351950b7bc..61f8b42505 100644 --- a/browsers/edge/available-policies.md +++ b/browsers/edge/available-policies.md @@ -50,6 +50,35 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A

+### Allow Address bar drop-down list suggestions +**Supported versions:** Windows 10, Windows Insider Program + +**Description:** This policy setting lets you decide whether the Address bar drop-down functionality is available in Microsoft Edge. We recommend disabling this setting if you want to minimize network connections from Microsoft Edge to Microsoft services. + +- If you enable or don't configure this setting, employees can see the Address bar drop-down functionality in Microsoft Edge. + +- If you disable this setting, employees won't see the Address bar drop-down functionality in Microsoft Edge. This setting also disables the user-defined setting, "Show search and site suggestions as I type". + + >[!Note] + >Disabling this setting turns off the Address bar drop-down functionality. Therefore, because search suggestions are shown in the drop-down, this setting takes precedence over the "Configure search suggestions in Address bar" setting. + +**Options:** +- **Enabled or not configured (default).** Employees can see the Address bar drop-down functionality in Microsoft Edge. +- **Disabled.** Employees won't see the Address bar drop-down functionality in Microsoft Edge. This setting also disables the user-defined setting, "Show search and site suggestions as I type". + + + + + + + + + + + + + + From 2bd8eef122ac8bf6be5c765f828f5b71a24d1188 Mon Sep 17 00:00:00 2001 From: John Tobin Date: Mon, 6 Mar 2017 12:47:42 -0800 Subject: [PATCH 064/108] comment added new topics to March change history --- .../change-history-for-keep-windows-10-secure.md | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/windows/keep-secure/change-history-for-keep-windows-10-secure.md b/windows/keep-secure/change-history-for-keep-windows-10-secure.md index 2e7879cd8b..050d3dc69f 100644 --- a/windows/keep-secure/change-history-for-keep-windows-10-secure.md +++ b/windows/keep-secure/change-history-for-keep-windows-10-secure.md @@ -13,6 +13,13 @@ author: brianlic-msft This topic lists new and updated topics in the [Keep Windows 10 secure](index.md) documentation for [Windows 10 and Windows 10 Mobile](../index.md). +## March 2017 +|New or changed topic |Description | +|---------------------|------------| +|[Protect derived domain credentials with CredentialGuear](credential-guard.md) |Updated to include additional security qualifications starting with Window 10, version 1703.| +|[Requirements and deployment planning guidelines for Device Guard](requirements-and-deployment-planning-guidelines-for-device-guard.md) |Updated to include additional security qualifications starting with Window 10, version 1703.| + + ## January 2017 |New or changed topic |Description | |---------------------|------------| From ce081d57d3bc7ea46268b1af6cb1aa5f647d5d7f Mon Sep 17 00:00:00 2001 From: LizRoss Date: Mon, 6 Mar 2017 12:58:40 -0800 Subject: [PATCH 065/108] Changing formatting --- browsers/edge/available-policies.md | 362 ++++++++++++++++++++++------ 1 file changed, 290 insertions(+), 72 deletions(-) diff --git a/browsers/edge/available-policies.md b/browsers/edge/available-policies.md index 61f8b42505..69525233c6 100644 --- a/browsers/edge/available-policies.md +++ b/browsers/edge/available-policies.md @@ -29,89 +29,307 @@ By using Group Policy and Intune, you can set up a policy setting once, and then ## Group Policy settings Microsoft Edge works with these Group Policy settings (`Computer Configuration\Administrative Templates\Windows Components\Microsoft Edge\`) to help you manage your company's web browser configurations: - - - - - - - - - - - - - - - - - - - -
Policy nameSupported versionsDescriptionOptions
Allow Address bar drop-down list suggestionsWindows 10, Windows Insider ProgramThis policy setting lets you decide whether the Address bar drop-down functionality is available in Microsoft Edge. We recommend disabling this setting if you want to minimize network connections from Microsoft Edge to Microsoft services.

Note
Disabling this setting turns off the Address bar drop-down functionality. Therefore, because search suggestions are shown in the drop-down, this setting takes precedence over the "Configure search suggestions in Address bar" setting.

If you enable or don't configure this setting, employees can see the Address bar drop-down functionality in Microsoft Edge.

If you disable this setting, employees won't see the Address bar drop-down functionality in Microsoft Edge. This setting also disables the user-defined setting, "Show search and site suggestions as I type".

Enabled or not configured (default): Employees can see the Address bar drop-down functionality in Microsoft Edge.

Disabled: Employees won't see the Address bar drop-down functionality in Microsoft Edge. This setting also disables the user-defined setting, "Show search and site suggestions as I type".

Allow Adobe FlashWindows 10 or laterThis setting lets you decide whether employees can run Adobe Flash in Microsoft Edge.

If you enable or don't configure this setting, employees can use Adobe Flash.

If you disable this setting, employees can't use Adobe Flash.

Enabled or not configured (default): Employees use Adobe Flash in Microsoft Edge.

Disabled: Employees can’t use Adobe Flash.

- ### Allow Address bar drop-down list suggestions -**Supported versions:** Windows 10, Windows Insider Program +- **Supported versions:** Windows 10, Windows Insider Program -**Description:** This policy setting lets you decide whether the Address bar drop-down functionality is available in Microsoft Edge. We recommend disabling this setting if you want to minimize network connections from Microsoft Edge to Microsoft services. +- **Description:** This policy setting lets you decide whether the Address bar drop-down functionality is available in Microsoft Edge. We recommend disabling this setting if you want to minimize network connections from Microsoft Edge to Microsoft services. -- If you enable or don't configure this setting, employees can see the Address bar drop-down functionality in Microsoft Edge. + - If you enable or don't configure this setting (default), employees can see the Address bar drop-down functionality in Microsoft Edge. -- If you disable this setting, employees won't see the Address bar drop-down functionality in Microsoft Edge. This setting also disables the user-defined setting, "Show search and site suggestions as I type". + - If you disable this setting, employees won't see the Address bar drop-down functionality in Microsoft Edge. This setting also disables the user-defined setting, "Show search and site suggestions as I type". + + >[!Note] + >Disabling this setting turns off the Address bar drop-down functionality. Therefore, because search suggestions are shown in the drop-down, this setting takes precedence over the "Configure search suggestions in Address bar" setting. + +### Allow Adobe Flash +- **Supported versions:** Windows 10 or later + +- **Description:** This setting lets you decide whether employees can run Adobe Flash in Microsoft Edge. + + - If you enable or don't configure this setting (default), employees can use Adobe Flash. + + - If you disable this setting, employees can't use Adobe Flash. + +### Allow clearing browsing data on exit +- **Supported versions:** Windows 10, Windows Insider Program + +- **Description:** This policy setting allows the automatic clearing of browsing data when Microsoft Edge closes. + + - If you enable this policy setting, clearing browsing history on exit is turned on. + + - If you disable or don't configure this policy setting (default), it can be turned on and configured by the employee in the Clear browsing data options area, under Settings. + +### Allow Developer Tools +- **Supported versions:** Windows 10, Version 1511 or later + +- **Description:** This policy setting lets you decide whether F12 Developer Tools are available on Microsoft Edge. + - If you enable or don’t configure this setting (default), the F12 Developer Tools are available in Microsoft Edge. + + - If you disable this setting, the F12 Developer Tools aren’t available in Microsoft Edge. + +### Allow Extensions +- **Supported versions:** Windows 10, Version 1607 or later + +- **Description:** This policy setting lets you decide whether employees can use Edge Extensions. + + - If you enable or don’t configure this setting, employees can use Edge Extensions. + + - If you disable this setting, employees can’t use Edge Extensions. + +### Allow InPrivate browsing +- **Supported versions:** Windows 10, Version 1511 or later + +- **Description:** This policy setting lets you decide whether employees can browse using InPrivate website browsing. + + - If you enable or don’t configure this setting (default), employees can use InPrivate website browsing. + + - If you disable this setting, employees can’t use InPrivate website browsing. + +### Allow Microsoft Compatibility List +- **Supported versions:** Windows 10, Version 1607 or later + +- **Description:** This policy setting lets you decide whether to use the Microsoft Compatibility List (a Microsoft-provided list that helps sites with known compatibility issues to display properly) in Microsoft Edge. By default, the Microsoft Compatibility List is enabled and can be viewed by visiting about:compat. + + - If you enable or don’t configure this setting (default), Microsoft Edge periodically downloads the latest version of the list from Microsoft, applying the updates during browser navigation. Visiting any site on the Microsoft Compatibility List prompts the employee to use Internet Explorer 11, where the site is automatically rendered as though it’s in whatever version of IE is necessary for it to appear properly. + + - If you disable this setting, the Microsoft Compatibility List isn’t used during browser navigation. + +### Allow search engine customization +- **Supported versions:** Windows 10, Windows Insider Program + +- **Description:** This policy setting lets you decide whether users can change their search engine. + + >[!Important] + >This setting can only be used with domain-joined or MDM-enrolled devices. For more info, see the Microsoft browser extension policy (aka.ms/browserpolicy). + + - If you enable or don't configure this policy (default), users can add new search engines and change the default used in the Address bar from within Microsoft Edge Settings. + + - If you disable this setting, users can't add search engines or change the default used in the address bar. + +### Allow web content on New Tab page +- **Supported versions:** Windows 10 or later + +- **Description:** This policy setting lets you configure what appears when Microsoft Edge opens a new tab. By default, Microsoft Edge opens the New Tab page. If you use this setting, employees can’t change it. + + - If you enable this setting, Microsoft Edge opens a new tab with the New Tab page. + + - If you disable this setting, Microsoft Edge opens a new tab with a blank page. + + - If you don’t configure this setting (default), employees can choose how new tabs appears. + +### Configure additional search engines +- **Supported versions:** Windows 10, Windows Insider Program + +- **Description:** This policy setting lets you add up to 5 additional search engines, which can't be removed by your employees, but can be made a personal default engine. This setting doesn't set the default search engine. For that, you must use the "Set default search engine" setting. + + >[!Important] + >This setting can only be used with domain-joined or MDM-enrolled devices. For more info, see the Microsoft browser extension policy (aka.ms/browserpolicy). + + - If you enable this setting, you can add up to 5 additional search engines. For each additional engine, you must also add a link to your OpenSearch XML file, including at least the short name and https: URL of the search engine, using this format: + + `https://www.contoso.com/opensearch.xml` + + For more info about creating the OpenSearch XML file, see the [Understanding OpenSearch Standards](https://msdn.microsoft.com/en-us/library/dd163546.aspx) topic. + + - If you disable this setting (default), any added search engines are removed from your employee's devices. + + - If you don't configure this setting, the search engine list is set to what is specified in App settings. + +### Configure Autofill +- **Supported versions:** Windows 10 or later + +- **Description:** This policy setting lets you decide whether employees can use Autofill to automatically fill in form fields while using Microsoft Edge. By default, employees can choose whether to use Autofill. + + - If you enable this setting, employees can use Autofill to automatically fill in forms while using Microsoft Edge. + + - If you disable this setting, employees can’t use Autofill to automatically fill in forms while using Microsoft Edge. + + - If you don’t configure this setting (default), employees can choose whether to use Autofill to automatically fill in forms while using Microsoft Edge. + +### Configure cookies +- **Supported versions:** Windows 10 or later + +- **Description:** This setting lets you configure how to work with cookies. + + - If you enable this setting, you must also decide whether to: + - **Allow all cookies (default):** Allows all cookies from all websites. + + - **Block all cookies:** Blocks all cookies from all websites. + + - **Block only 3rd-party cookies:** Blocks only cookies from 3rd-party websites. + + - If you disable or don't configure this setting, all cookies are allowed from all sites. + +### Configure Do Not Track +- **Supported versions:** Windows 10 or later + +- **Description:** This policy setting lets you decide whether employees can send Do Not Track requests to websites that ask for tracking info. By default, Do Not Track requests aren’t sent, but employees can choose to turn on and send requests. + + - If you enable this setting, Do Not Track requests are always sent to websites asking for tracking info. + + - If you disable this setting, Do Not Track requests are never sent to websites asking for tracking info. + + - If you don’t configure this setting (default), employees can choose whether to send Do Not Track requests to websites asking for tracking info. + +### Configure Favorites +- **Supported versions:** Windows 10, Version 1511 or later + +- **Description:** This policy setting lets you configure the default list of Favorites that appear for your employees. Employees can change their Favorites by adding or removing items at any time. + + - If you enable this setting, you can configure what default Favorites appear for your employees. If this setting is enabled, you must also provide a list of Favorites in the Options section. This list is imported after your policy is deployed. + + - If you disable or don’t configure this setting, employees will see the Favorites that they set in the Favorites hub. + +### Configure Password Manager +- **Supported versions:** Windows 10 or later + +- **Description:** This policy setting lets you decide whether employees can save their passwords locally, using Password Manager. By default, Password Manager is turned on. + + - If you enable this setting (default), employees can use Password Manager to save their passwords locally. + + - If you disable this setting, employees can’t use Password Manager to save their passwords locally. + + - If you don’t configure this setting, employees can choose whether to use Password Manager to save their passwords locally. + +### Configure Pop-up Blocker +- **Supported versions:** Windows 10 or later + +- **Description:** This policy setting lets you decide whether to turn on Pop-up Blocker. By default, Pop-up Blocker is turned on. + + - If you enable this setting (default), Pop-up Blocker is turned on, stopping pop-up windows from appearing. + + - If you disable this setting, Pop-up Blocker is turned off, letting pop-ups windows appear. + + - If you don’t configure this setting, employees can choose whether to use Pop-up Blocker. + +### Configure search suggestions in Address bar +- **Supported versions:** Windows 10 or later + +- **Description:** This policy setting lets you decide whether search suggestions appear in the Address bar of Microsoft Edge. By default, employees can choose whether search suggestions appear in the Address bar of Microsoft Edge. + + - If you enable this setting, employees can see search suggestions in the Address bar of Microsoft Edge. + + - If you disable this setting, employees can't see search suggestions in the Address bar of Microsoft Edge. + + - If you don’t configure this setting (default), employees can choose whether search suggestions appear in the Address bar of Microsoft Edge. + +### Configure Start pages +- **Supported versions:** Windows 10, Version 1511 or later + +- **Description:** This policy setting lets you configure one or more Start pages, for domain-joined devices. Your employees won't be able to change this after you set it. + + - If you enable this setting, you can configure one or more Start pages. If this setting is enabled, you must also include URLs to the pages, separating multiple pages by using angle brackets in this format: + + `` + + - If you disable or don’t configure this setting (default), your default Start page is the webpage specified in App settings. + +### Configure the Adobe Flash Click-to-Run setting +- **Supported versions:** Windows 10, Windows Insider Program + +- **Description:** This policy setting lets you decide whether employees must take an action, such as clicking the content or a Click-to-Run button, before seeing content in Adobe Flash. + + >[!Important] + >Sites are put on the auto-allowed list based on how frequently employees load and run the content. + + - If you enable or don’t configure the Adobe Flash Click-to-Run setting, an employee must click the content, click a Click-to-Run button, or have the site appear on an auto-allow list before Microsoft Edge loads and runs Adobe Flash content. + + - If you disable this setting, Adobe Flash content is automatically loaded and run by Microsoft Edge. + +### Configure the Enterprise Mode Site List +- **Supported versions:** Windows 10 or later + +- **Description:** This policy setting lets you configure whether to use Enterprise Mode and the Enterprise Mode Site List to address common compatibility problems with legacy apps. + + - If you enable this setting, Microsoft Edge looks for the Enterprise Mode Site List XML file, which includes the sites and domains that need to be viewed using Internet Explorer 11 and Enterprise Mode. If you use this option, you must also add the location to your site list in the **{URI}** box. When configured, any site on the list will always open in Internet Explorer 11. + + - If you disable or don’t configure this setting (default), Microsoft Edge won’t use the Enterprise Mode Site List XML file. In this case, employees might experience compatibility problems while using legacy apps. >[!Note] - >Disabling this setting turns off the Address bar drop-down functionality. Therefore, because search suggestions are shown in the drop-down, this setting takes precedence over the "Configure search suggestions in Address bar" setting. + >If there’s an .xml file in the cache container, IE waits 65 seconds and then checks the local cache for a newer version of the file from the server, based on standard caching rules. If the server file has a different version number than the version in the cache container, the server file is used and stored in the cache container.

+ >If you’re already using a site list, enterprise mode continues to work during the 65 second wait; it just uses your existing site list instead of your new one. -**Options:** -- **Enabled or not configured (default).** Employees can see the Address bar drop-down functionality in Microsoft Edge. -- **Disabled.** Employees won't see the Address bar drop-down functionality in Microsoft Edge. This setting also disables the user-defined setting, "Show search and site suggestions as I type". +### Configure Windows Defender SmartScreen +- **Supported versions:** Windows 10 or later + +- **Description:** This policy setting lets you configure whether to turn on Windows Defender SmartScreen. Windows Defender SmartScreen provides warning messages to help protect your employees from potential phishing scams and malicious software. By default, Windows Defender SmartScreen is turned on. + + - If you enable this setting, Windows Defender SmartScreen is turned on and employees can’t turn it off. + + - If you disable this setting, Windows Defender SmartScreen is turned off and employees can’t turn it on. + + - If you don’t configure this setting (default), employees can choose whether to use Windows Defender SmartScreen. + +### Disable lockdown of Start pages +- **Supported versions:** Windows 10, Windows Insider Program + +- **Description:** This policy setting lets you disable the lock down of Start pages, letting employees modify the Start pages when the "Configure Start pages" setting is in effect. + + >[!Important] + >This setting only applies when you're using the “Configure Start pages" setting and can only be used with domain-joined or MDM-enrolled devices. For more info, see the Microsoft browser extension policy (aka.ms/browserpolicy). + + - If you enable this setting, you can't lock down any Start pages that are configured using the "Configure Start pages" setting, which means that employees can modify them. + + - If you disable or don't configure this setting (default), employees can't change any Start pages configured using the "Configure Start pages" setting, thereby locking down the Start pages. + +### Keep favorites in sync between Internet Explorer and Microsoft Edge +- **Supported versions:** Windows 10, Windows Insider Program + +- **Description:** This setting lets you decide whether people can sync their favorites between Internet Explorer and Microsoft Edge. + + - If you enable this setting, employees can sync their favorites between Internet Explorer and Microsoft Edge. + + - If you disable or don't configure this setting (default), employees can’t sync their favorites between Internet Explorer and Microsoft Edge. + +### Prevent access to the about:flags page +- **Supported versions:** Windows 10, Version 1607 or later + +- **Description:** This policy setting lets you decide whether employees can access the about:flags page, which is used to change developer settings and to enable experimental features. + + - If you enable this policy setting, employees can’t access the about:flags page. + + - If you disable or don’t configure this setting (default), employees can access the about:flags page. + +### Prevent bypassing Windows Defender SmartScreen prompts for files +- **Supported versions:** Windows 10, Version 1511 or later + +- **Description:** This policy setting lets you decide whether employees can override the Windows Defender SmartScreen warnings about downloading unverified files. + + - If you enable this setting, employees can’t ignore Windows Defender SmartScreen warnings and they’re blocked from downloading the unverified files. + + - If you disable or don’t configure this setting (default), employees can ignore Windows Defender SmartScreen warnings and continue the download process. + +### Prevent bypassing Windows Defender SmartScreen prompts for sites +- **Supported versions:** Windows 10, Version 1511 or later + +- **Description:** This policy setting lets you decide whether employees can override the Windows Defender SmartScreen warnings about potentially malicious websites. + + - If you enable this setting, employees can’t ignore Windows Defender SmartScreen warnings and they’re blocked from continuing to the site. + + - If you disable or don’t configure this setting (default), employees can ignore Windows Defender SmartScreen warnings and continue to the site. + +### Prevent Microsoft Edge from gathering Live Tile information when pinning a site to Start +- **Supported versions:** Windows 10, Windows Insider Program + +- **Description:** This policy lets you decide whether Microsoft Edge can gather Live Tile metadata from the ieonline.microsoft.com service to provide a better experience while pinning a Live Tile to the Start menu. + + - If you enable this setting, Microsoft Edge won't gather the Live Tile metadata, providing a minimal experience when a user pins a Live Tile to the Start menu. + + - If you disable or don't configure this setting (default), Microsoft Edge gathers the Live Tile metadata, providing a fuller and more complete experience when a user pins a Live Tile to the Start menu. + +### Prevent the First Run webpage from opening on Microsoft Edge +- **Supported versions:** Windows 10, Windows Insider Program + +- **Description:** This policy setting lets you decide whether employees see Microsoft's First Run webpage when opening Microsoft Edge for the first time. + + - If you enable this setting, employees won't see the First Run page when opening Microsoft Edge for the first time. + + - If you disable or don't configure this setting (default), employees will see the First Run page when opening Microsoft Edge for the first time. - - - - - - - - - - - - - -|Policy name|Supported versions|Description|Options| -|-------------|------------|-------------|--------| -|Allow Address bar drop-down list suggestions|Windows 10, Windows Insider Program|This policy setting lets you decide whether the Address bar drop-down functionality is available in Microsoft Edge. We recommend disabling this setting if you want to minimize network connections from Microsoft Edge to Microsoft services.

**Note**
Disabling this setting turns off the Address bar drop-down functionality. Therefore, because search suggestions are shown in the drop-down, this setting takes precedence over the "Configure search suggestions in Address bar" setting.

If you enable or don't configure this setting, employees can see the Address bar drop-down functionality in Microsoft Edge.

If you disable this setting, employees won't see the Address bar drop-down functionality in Microsoft Edge. This setting also disables the user-defined setting, "Show search and site suggestions as I type".|**Enabled or not configured (default):** Employees can see the Address bar drop-down functionality in Microsoft Edge.

**Disabled:** Employees won't see the Address bar drop-down functionality in Microsoft Edge. This setting also disables the user-defined setting, "Show search and site suggestions as I type".| -|Allow Adobe Flash|Windows 10 or later|This setting lets you decide whether employees can run Adobe Flash in Microsoft Edge.

If you enable or don't configure this setting, employees can use Adobe Flash.

If you disable this setting, employees can't use Adobe Flash.|**Enabled or not configured (default):** Employees use Adobe Flash in Microsoft Edge.

**Disabled:** Employees can’t use Adobe Flash.| -|Allow clearing browsing data on exit|Windows 10, Windows Insider Program|This policy setting allows the automatic clearing of browsing data when Microsoft Edge closes.

If you enable this policy setting, clearing browsing history on exit is turned on.

If you disable or don't configure this policy setting, it can be turned on and configured by the employee in the Clear browsing data options area, under Settings.|**Enabled:** Turns on the automatic clearing of browsing data when Microsoft Edge closes.

**Disabled or not configured (default):** Employees can turn on and configure whether to automatically clear browsing data when Microsoft Edge closes in the Clear browsing data options area under Settings.| -|Allow Developer Tools|Windows 10, Version 1511 or later|This policy setting lets you decide whether F12 Developer Tools are available on Microsoft Edge.

If you enable or don’t configure this setting, the F12 Developer Tools are available in Microsoft Edge.

If you disable this setting, the F12 Developer Tools aren’t available in Microsoft Edge.|**Enabled or not configured (default):** Shows the F12 Developer Tools on Microsoft Edge.

**Disabled:** Hides the F12 Developer Tools on Microsoft Edge.| -|Allow Extensions|Windows 10, Version 1607 or later|This policy setting lets you decide whether employees can use Edge Extensions.

If you enable or don’t configure this setting, employees can use Edge Extensions.

If you disable this setting, employees can’t use Edge Extensions.|**Enabled or not configured:** Lets employees use Edge Extensions.

**Disabled:** Stops employees from using Edge Extensions.| -|Allow InPrivate browsing|Windows 10, Version 1511 or later|This policy setting lets you decide whether employees can browse using InPrivate website browsing.

If you enable or don’t configure this setting, employees can use InPrivate website browsing.

If you disable this setting, employees can’t use InPrivate website browsing.|**Enabled or not configured (default):** Lets employees use InPrivate website browsing.

**Disabled:** Stops employees from using InPrivate website browsing.| -|Allow Microsoft Compatibility List|Windows 10, Version 1607 or later|This policy setting lets you decide whether to use the Microsoft Compatibility List (a Microsoft-provided list that helps sites with known compatibility issues to display properly) in Microsoft Edge. By default, the Microsoft Compatibility List is enabled and can be viewed by visiting about:compat.

If you enable or don’t configure this setting, Microsoft Edge periodically downloads the latest version of the list from Microsoft, applying the updates during browser navigation. Visiting any site on the Microsoft Compatibility List prompts the employee to use Internet Explorer 11, where the site is automatically rendered as though it’s in whatever version of IE is necessary for it to appear properly.

If you disable this setting, the Microsoft Compatibility List isn’t used during browser navigation.|**Enabled or not configured (default):** Microsoft Edge periodically downloads the latest version of the list from Microsoft, applying the updates during browser navigation. Visiting any site on the Microsoft Compatibility List prompts the employee to use Internet Explorer 11, where the site is automatically rendered as though it’s in whatever version of IE is necessary for it to appear properly.

**Disabled:** Microsoft Edge doesn’t use the Microsoft Compatibility List during browser navigation.| -|Allow search engine customization|Windows 10, Windows Insider Program|This policy setting lets you decide whether users can change their search engine.

**Important**
This setting can only be used with domain-joined or MDM-enrolled devices. For more info, see the Microsoft browser extension policy (aka.ms/browserpolicy).

If you enable or don't configure this policy, users can add new search engines and change the default used in the Address bar from within Microsoft Edge Settings.

If you disable this setting, users can't add search engines or change the default used in the address bar.|**Enabled or not configured (default):** Employees can add new search engines and change the default used in the Address bar from within Microsoft Edge Settings.

**Disabled:** Employees can't add search engines or change the default used in the Address bar.| -|Allow web content on New Tab page|Windows 10 or later|This policy setting lets you configure what appears when Microsoft Edge opens a new tab. By default, Microsoft Edge opens the New Tab page. If you use this setting, employees can’t change it.

If you enable this setting, Microsoft Edge opens a new tab with the New Tab page.

If you disable this setting, Microsoft Edge opens a new tab with a blank page.

If you don’t configure this setting, employees can choose how new tabs appears.|**Not configured (default):** Employees see web content on New Tab page, but can change it.

**Enabled:** Employees see web content on New Tab page.

**Disabled:** Employees always see an empty new tab.| -|Configure additional search engines|Windows 10, Windows Insider Program|This policy setting lets you add up to 5 additional search engines, which can't be removed by your employees, but can be made a personal default engine. This setting doesn't set the default search engine. For that, you must use the "Set default search engine" setting.

**Important**
This setting can only be used with domain-joined or MDM-enrolled devices. For more info, see the Microsoft browser extension policy (aka.ms/browserpolicy).

If you enable this setting, you can add up to 5 additional search engines. For each additional engine, you must also add a link to your OpenSearch XML file, including at least the short name and https: URL of the search engine. For more info about creating the OpenSearch XML file, see the [Understanding OpenSearch Standards](https://msdn.microsoft.com/en-us/library/dd163546.aspx) topic. Use this format to specify the link(s) you wish to add:
`https://www.contoso.com/opensearch.xml`

If you disable this setting, any added search engines are removed from your employee's devices.

If you don't configure this setting, the search engine list is set to what is specified in App settings.|**Enabled:** Add up to 5 additional search engines. For each additional engine, you must also add a link to your OpenSearch XML file, including at least the short name and https: URL of the search engine.

**Disabled (default):** Any additional search engines are removed from your employee's devices.

**Not configured:** Search engine list is set to what is specified in App settings.| -|Configure Autofill|Windows 10 or later|This policy setting lets you decide whether employees can use Autofill to automatically fill in form fields while using Microsoft Edge. By default, employees can choose whether to use Autofill.

If you enable this setting, employees can use Autofill to automatically fill in forms while using Microsoft Edge.

If you disable this setting, employees can’t use Autofill to automatically fill in forms while using Microsoft Edge.

If you don’t configure this setting, employees can choose whether to use Autofill to automatically fill in forms while using Microsoft Edge.|**Not configured (default):** Employees can choose to turn Autofill on or off.

**Enabled:** Employees can use Autofill to complete form fields.

**Disabled:** Employees can’t use Autofill to complete form fields.| -|Configure cookies|Windows 10 or later|This setting lets you configure how to work with cookies.

If you enable this setting, you must also decide whether to:

  • **Allow all cookies (default):** Allows all cookies from all websites.
  • **Block all cookies:** Blocks all cookies from all websites.
  • **Block only 3rd-party cookies:** Blocks only cookies from 3rd-party websites.

If you disable or don't configure this setting, all cookies are allowed from all sites.|**Enabled:** Lets you decide how your company treats cookies.
If you use this option, you must also choose whether to:

  • **Allow all cookies (default):** Allows all cookies from all websites.
  • **Block all cookies:** Blocks all cookies from all websites.
  • **Block only 3rd-party cookies:** Blocks only cookies from 3rd-party websites.

**Disabled or not configured:** All cookies are allowed from all sites.| -|Configure Do Not Track|Windows 10 or later|This policy setting lets you decide whether employees can send Do Not Track requests to websites that ask for tracking info. By default, Do Not Track requests aren’t sent, but employees can choose to turn on and send requests.

If you enable this setting, Do Not Track requests are always sent to websites asking for tracking info.

If you disable this setting, Do Not Track requests are never sent to websites asking for tracking info.

If you don’t configure this setting, employees can choose whether to send Do Not Track requests to websites asking for tracking info.|**Not configured (default):** Employees can choose to send Do Not Track headers on or off.

**Enabled:** Employees can send Do Not Track requests to websites requesting tracking info.

**Disabled:** Employees can’t send Do Not Track requests to websites requesting tracking info.| -|Configure Favorites|Windows 10, Version 1511 or later|This policy setting lets you configure the default list of Favorites that appear for your employees. Employees can change their Favorites by adding or removing items at any time.

If you enable this setting, you can configure what default Favorites appear for your employees. If this setting is enabled, you must also provide a list of Favorites in the Options section. This list is imported after your policy is deployed.

If you disable or don’t configure this setting, employees will see the Favorites that they set in the Favorites hub.|**Enabled:** Configure the default list of Favorites for your employees. If you use this option, you must also add the URLs to the sites.

**Disabled or not configured:** Uses the Favorites list and URLs specified in the Favorites hub.| -|Configure Password Manager|Windows 10 or later|This policy setting lets you decide whether employees can save their passwords locally, using Password Manager. By default, Password Manager is turned on.

If you enable this setting, employees can use Password Manager to save their passwords locally.

If you disable this setting, employees can’t use Password Manager to save their passwords locally.

If you don’t configure this setting, employees can choose whether to use Password Manager to save their passwords locally.|**Not configured:** Employees can choose whether to use Password Manager.

**Enabled (default):** Employees can use Password Manager to save passwords locally.

**Disabled:** Employees can't use Password Manager to save passwords locally.| -|Configure Pop-up Blocker|Windows 10 or later|This policy setting lets you decide whether to turn on Pop-up Blocker. By default, Pop-up Blocker is turned on.

If you enable this setting, Pop-up Blocker is turned on, stopping pop-up windows from appearing.

If you disable this setting, Pop-up Blocker is turned off, letting pop-ups windows appear.

If you don’t configure this setting, employees can choose whether to use Pop-up Blocker.|**Enabled or not configured (default):** Turns on Pop-up Blocker, stopping pop-up windows.

**Disabled:** Turns off Pop-up Blocker, allowing pop-up windows.| -|Configure search suggestions in Address bar|Windows 10 or later|This policy setting lets you decide whether search suggestions appear in the Address bar of Microsoft Edge. By default, employees can choose whether search suggestions appear in the Address bar of Microsoft Edge.

If you enable this setting, employees can see search suggestions in the Address bar of Microsoft Edge.

If you disable this setting, employees can't see search suggestions in the Address bar of Microsoft Edge.

If you don’t configure this setting, employees can choose whether search suggestions appear in the Address bar of Microsoft Edge.|**Not configured (default):** Employees can choose whether search suggestions appear in the Address bar of Microsoft Edge.

**Enabled:** Employees can see search suggestions in the Address bar of Microsoft Edge.

**Disabled:** Employees can’t see search suggestions in the Address bar of Microsoft Edge.| -|Configure Start pages|Windows 10, Version 1511 or later|This policy setting lets you configure one or more Start pages, for domain-joined devices. Your employees won't be able to change this after you set it.

If you enable this setting, you can configure one or more Start pages. If this setting is enabled, you must also include URLs to the pages, separating multiple pages by using angle brackets in this format:
``

If you disable or don’t configure this setting, your default Start page is the webpage specified in App settings.|**Enabled:** Configure your Start pages. If you use this option, you must also include site URLs.

**Disabled or not configured (default):** Uses the Home pages and URLs specified in the App settings.| -|Configure the Adobe Flash Click-to-Run setting|Windows 10, Windows Insider Program|This policy setting lets you decide whether employees must take an action, such as clicking the content or a Click-to-Run button, before seeing content in Adobe Flash.

If you enable or don’t configure the Adobe Flash Click-to-Run setting, an employee must click the content, click a Click-to-Run button, or have the site appear on an auto-allow list before Microsoft Edge loads and runs Adobe Flash content.

**Important**
Sites are put on the auto-allowed list based on how frequently employees load and run the content.

If you disable this setting, Adobe Flash content is automatically loaded and run by Microsoft Edge.|**Enabled or not configured:** An employee must click the content, click a Click-to-Run button, or have the site appear on an auto-allow list before Microsoft Edge loads and runs Adobe Flash content.

**Disabled:** Adobe Flash content is automatically loaded and run by Microsoft Edge.| -|Configure the Enterprise Mode Site List|Windows 10 or later|This policy setting lets you configure whether to use Enterprise Mode and the Enterprise Mode Site List to address common compatibility problems with legacy apps.

If you enable this setting, Microsoft Edge looks for the Enterprise Mode Site List XML file. This file includes the sites and domains that need to be viewed using Internet Explorer 11 and Enterprise Mode.

If you disable or don’t configure this setting, Microsoft Edge won’t use the Enterprise Mode Site List XML file. In this case, employees might experience compatibility problems while using legacy apps.

**Note**
If there’s an .xml file in the cache container, IE waits 65 seconds and then checks the local cache for a newer version of the file from the server, based on standard caching rules. If the server file has a different version number than the version in the cache container, the server file is used and stored in the cache container.

If you’re already using a site list, enterprise mode continues to work during the 65 second wait; it just uses your existing site list instead of your new one.|**Enabled:** Lets you use the Enterprise Mode Site List to address common compatibility problems with legacy apps, if it’s configured.

If you use this option, you must also add the location to your site list in the `{URI}` box. When configured, any site on the list will always open in Internet Explorer 11.

**Disabled or not configured (default):** You won't be able to use the Enterprise Mode Site List.| -|Configure Windows Defender SmartScreen|Windows 10 or later|This policy setting lets you configure whether to turn on Windows Defender SmartScreen. Windows Defender SmartScreen provides warning messages to help protect your employees from potential phishing scams and malicious software. By default, Windows Defender SmartScreen is turned on.

If you enable this setting, Windows Defender SmartScreen is turned on and employees can’t turn it off.

If you disable this setting, Windows Defender SmartScreen is turned off and employees can’t turn it on.

If you don’t configure this setting, employees can choose whether to use Windows Defender SmartScreen.|**Not configured (default):** Employees can choose whether to use Windows Defender SmartScreen.

**Enabled:** Turns on SmartScreen Filter, providing warning messages to your employees about potential phishing scams and malicious software.

**Disabled:** Turns off Windows Defender SmartScreen.| -|Disable lockdown of Start pages|Windows 10, Windows Insider Program|This policy setting lets you disable the lock down of Start pages, letting employees modify the Start pages when the "Configure Start pages" setting is in effect.

**Note**
This setting only applies when you're using the “Configure Start pages" setting.

**Important**
This setting can only be used with domain-joined or MDM-enrolled devices. For more info, see the Microsoft browser extension policy (aka.ms/browserpolicy).

If you enable this setting, you can't lock down any Start pages that are configured using the "Configure Start pages" setting, which means that employees can modify them.

If you disable or don't configure this setting, employees can't change any Start pages configured using the "Configure Start pages" setting, thereby locking down the Start pages.|**Enabled:** You’re unable to lock down any Start pages that are configured using the "Configure Start pages" setting, which means that your employees can modify them.

**Disabled or not configured (default):** Employees can't change any Start pages configured using the "Configure Start pages" setting.| -|Keep favorites in sync between Internet Explorer and Microsoft Edge|Windows 10, Windows Insider Program|This setting lets you decide whether people can sync their favorites between Internet Explorer and Microsoft Edge.

If you enable this setting, employees can sync their favorites between Internet Explorer and Microsoft Edge.

If you disable or don't configure this setting, employees can’t sync their favorites between Internet Explorer and Microsoft Edge.|**Enabled:** Employees can sync their Favorites between Internet Explorer and Microsoft Edge.

**Disabled or not configured (default):** Employees can’t sync their Favorites between Internet Explorer and Microsoft Edge.| -|Prevent access to the about:flags page|Windows 10, Version 1607 or later|This policy setting lets you decide whether employees can access the about:flags page, which is used to change developer settings and to enable experimental features.

If you enable this policy setting, employees can’t access the about:flags page.

If you disable or don’t configure this setting, employees can access the about:flags page.|**Enabled:** Stops employees from using the about:flags page.

**Disabled or not configured (default):** Lets employees use the about:flags page.| -|Prevent bypassing Windows Defender SmartScreen prompts for files|Windows 10, Version 1511 or later |This policy setting lets you decide whether employees can override the Windows Defender SmartScreen warnings about downloading unverified files.

If you enable this setting, employees can’t ignore Windows Defender SmartScreen warnings and they’re blocked from downloading the unverified files.

If you disable or don’t configure this setting, employees can ignore Windows Defender SmartScreen warnings and continue the download process.|**Enabled:** Stops employees from ignoring the Windows Defender SmartScreen warnings about unverified files.

**Disabled or not configured (default):** Lets employees ignore the Windows Defender SmartScreen warnings about unverified files and lets them continue the download process.| -|Prevent bypassing Windows Defender SmartScreen prompts for sites|Windows 10, Version 1511 or later|This policy setting lets you decide whether employees can override the Windows Defender SmartScreen warnings about potentially malicious websites.

If you enable this setting, employees can’t ignore Windows Defender SmartScreen warnings and they’re blocked from continuing to the site.

If you disable or don’t configure this setting, employees can ignore Windows Defender SmartScreen warnings and continue to the site.|**Enabled:** Stops employees from ignoring the Windows Defender SmartScreen warnings about potentially malicious sites.

**Disabled or not configured (default):** Lets employees ignore the Windows Defender SmartScreen warnings about potentially malicious sites and continue to the site.| -|Prevent Microsoft Edge from gathering Live Tile information when pinning a site to Start|Windows 10, Windows Insider Program|This policy lets you decide whether Microsoft Edge can gather Live Tile metadata from the ieonline.microsoft.com service to provide a better experience while pinning a Live Tile to the Start menu.

If you enable this setting, Microsoft Edge won't gather the Live Tile metadata, providing a minimal experience when a user pins a Live Tile to the Start menu.

If you disable or don't configure this setting, Microsoft Edge gathers the Live Tile metadata, providing a fuller and more complete experience when a user pins a Live Tile to the Start menu.|**Enabled:** Microsoft Edge won't gather the Live Tile metadata, providing a minimal experience when a user pins a Live Tile to the Start menu.

**Disabled or not configured (default):** Microsoft Edge gathers the Live Tile metadata, providing a fuller and more complete experience when a user pins a Live Tile to the Start menu.| -|Prevent the First Run webpage from opening on Microsoft Edge|Windows 10, Windows Insider Program|This policy setting lets you decide whether employees see Microsoft's First Run webpage when opening Microsoft Edge for the first time.

If you enable this setting, employees won't see the First Run page when opening Microsoft Edge for the first time.

If you disable or don't configure this setting, employees will see the First Run page when opening Microsoft Edge for the first time.|**Enabled:** Employees won't see the First Run page when opening Microsoft Edge for the first time.

**Disabled or not configured (default):** Employees will see the First Run page when opening Microsoft Edge for the first time.| +|||| |Prevent using Localhost IP address for WebRTC|Windows 10, Version 1511 or later|This policy setting lets you decide whether an employee’s Localhost IP address shows while making calls using the WebRTC protocol. By default, this setting is turned off.

If you enable this setting, Localhost IP addresses are hidden while making calls using the WebRTC protocol.

If you disable or don’t configure this setting, Localhost IP addresses are shown while making calls using the WebRTC protocol.|**Enabled:** Hides the Localhost IP address during calls using the WebRTC protocol.

**Disabled or not configured (default):** Shows the Localhost IP address during phone calls using the WebRTC protocol.| |Send all intranet sites to Internet Explorer 11|Windows 10 or later|This policy setting lets you decide whether your intranet sites should all open using Internet Explorer 11. This setting should only be used if there are known compatibility problems with Microsoft Edge.

If you enable this setting, all intranet sites are automatically opened using Internet Explorer 11.

If you disable or don’t configure this setting, all websites, including intranet sites, are automatically opened using Microsoft Edge.|**Enabled:** Automatically opens all intranet sites using Internet Explorer 11.

**Disabled or not configured (default):** Automatically opens all websites, including intranet sites, using Microsoft Edge.| |Set default search engine|Windows 10, Windows Insider Program|This policy setting lets you configure the default search engine for your employees. Employees can change the default search engine at any time unless you disable the "Allow search engine customization" setting, which restricts any changes.

**Important**
This setting can only be used with domain-joined or MDM-enrolled devices. For more info, see the Microsoft browser extension policy (aka.ms/browserpolicy).

If you enable this setting, you can choose a default search engine for your employees. If this setting is enabled, you must also add the default engine to the “Set default search engine” setting, by adding a link to your OpenSearch XML file, including at least the short name and https: URL of the search engine. For more info about creating the OpenSearch XML file, see the [Understanding OpenSearch Standards](https://msdn.microsoft.com/en-us/library/dd163546.aspx) topic. Use this format to specify the link you wish to add:
`https://fabrikam.com/opensearch.xml`

**Note**
If you'd like your employees to use the default Microsoft Edge settings for each market, you can set the string to EDGEDEFAULT. If you'd like your employees to use Microsoft Bing as the default search engine, you can set the string to EDGEBING.

If you disable this setting, the policy-set default search engine is removed. If this is also the current in-use default, the engine changes to the Microsoft Edge specified engine for the market.

If you don't configure this setting, the default search engine is set to the one specified in App settings.|**Enabled:** You can choose a default search engine for your employees.

**Disabled:** The policy-set default search engine is removed. If this is also the current in-use default, the engine changes to the Microsoft Edge specified engine for the market.

**Not configured (default):** The default search engine is set to the one specified in App settings.| From 4f0cb893bb8a1eed1e5089a88138c5d7cc189d3a Mon Sep 17 00:00:00 2001 From: LizRoss Date: Mon, 6 Mar 2017 13:12:55 -0800 Subject: [PATCH 066/108] Updating formatting --- browsers/edge/available-policies.md | 45 +++++++++++++++++++++++++---- 1 file changed, 40 insertions(+), 5 deletions(-) diff --git a/browsers/edge/available-policies.md b/browsers/edge/available-policies.md index 69525233c6..815a44a832 100644 --- a/browsers/edge/available-policies.md +++ b/browsers/edge/available-policies.md @@ -326,14 +326,49 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable or don't configure this setting (default), employees will see the First Run page when opening Microsoft Edge for the first time. +### Prevent using Localhost IP address for WebRTC +- **Supported versions:** Windows 10, Version 1511 or later +- **Description:** This policy setting lets you decide whether an employee’s Localhost IP address shows while making calls using the WebRTC protocol. By default, this setting is turned off. + - If you enable this setting, Localhost IP addresses are hidden while making calls using the WebRTC protocol. + + - If you disable or don’t configure this setting (default), Localhost IP addresses are shown while making calls using the WebRTC protocol. -|||| -|Prevent using Localhost IP address for WebRTC|Windows 10, Version 1511 or later|This policy setting lets you decide whether an employee’s Localhost IP address shows while making calls using the WebRTC protocol. By default, this setting is turned off.

If you enable this setting, Localhost IP addresses are hidden while making calls using the WebRTC protocol.

If you disable or don’t configure this setting, Localhost IP addresses are shown while making calls using the WebRTC protocol.|**Enabled:** Hides the Localhost IP address during calls using the WebRTC protocol.

**Disabled or not configured (default):** Shows the Localhost IP address during phone calls using the WebRTC protocol.| -|Send all intranet sites to Internet Explorer 11|Windows 10 or later|This policy setting lets you decide whether your intranet sites should all open using Internet Explorer 11. This setting should only be used if there are known compatibility problems with Microsoft Edge.

If you enable this setting, all intranet sites are automatically opened using Internet Explorer 11.

If you disable or don’t configure this setting, all websites, including intranet sites, are automatically opened using Microsoft Edge.|**Enabled:** Automatically opens all intranet sites using Internet Explorer 11.

**Disabled or not configured (default):** Automatically opens all websites, including intranet sites, using Microsoft Edge.| -|Set default search engine|Windows 10, Windows Insider Program|This policy setting lets you configure the default search engine for your employees. Employees can change the default search engine at any time unless you disable the "Allow search engine customization" setting, which restricts any changes.

**Important**
This setting can only be used with domain-joined or MDM-enrolled devices. For more info, see the Microsoft browser extension policy (aka.ms/browserpolicy).

If you enable this setting, you can choose a default search engine for your employees. If this setting is enabled, you must also add the default engine to the “Set default search engine” setting, by adding a link to your OpenSearch XML file, including at least the short name and https: URL of the search engine. For more info about creating the OpenSearch XML file, see the [Understanding OpenSearch Standards](https://msdn.microsoft.com/en-us/library/dd163546.aspx) topic. Use this format to specify the link you wish to add:
`https://fabrikam.com/opensearch.xml`

**Note**
If you'd like your employees to use the default Microsoft Edge settings for each market, you can set the string to EDGEDEFAULT. If you'd like your employees to use Microsoft Bing as the default search engine, you can set the string to EDGEBING.

If you disable this setting, the policy-set default search engine is removed. If this is also the current in-use default, the engine changes to the Microsoft Edge specified engine for the market.

If you don't configure this setting, the default search engine is set to the one specified in App settings.|**Enabled:** You can choose a default search engine for your employees.

**Disabled:** The policy-set default search engine is removed. If this is also the current in-use default, the engine changes to the Microsoft Edge specified engine for the market.

**Not configured (default):** The default search engine is set to the one specified in App settings.| -|Show message when opening sites in Internet Explorer|Windows 10, Version 1607 and later|This policy setting lets you decide whether employees see an additional page in Microsoft Edge, stating that a site has been opened using Internet Explorer 11.

If you enable this setting, employees see an additional page in Microsoft Edge, stating that a site has been opened using Internet Explorer 11.

If you disable or don’t configure this setting, the default app behavior occurs and no additional page appears.|**Enabled:** Shows an additional page in Microsoft Edge, stating that a site has been opened using Internet Explorer 11.

**Disabled or not configured (default):** Doesn’t show an additional page in Microsoft Edge, stating that a site has been opened using Internet Explorer 11.| +### Send all intranet sites to Internet Explorer 11 +- **Supported versions:** Windows 10 or later + +- **Description:** This policy setting lets you decide whether your intranet sites should all open using Internet Explorer 11. This setting should only be used if there are known compatibility problems with Microsoft Edge. + + - If you enable this setting, all intranet sites are automatically opened using Internet Explorer 11. + + - If you disable or don’t configure this setting (default), all websites, including intranet sites, are automatically opened using Microsoft Edge. + +### Set default search engine +- **Supported versions:** Windows 10, Windows Insider Program + +- **Description:** This policy setting lets you configure the default search engine for your employees. Employees can change the default search engine at any time unless you disable the "Allow search engine customization" setting, which restricts any changes. + + >[!Important] + >This setting can only be used with domain-joined or MDM-enrolled devices. For more info, see the Microsoft browser extension policy (aka.ms/browserpolicy).

+ >If you'd like your employees to use the default Microsoft Edge settings for each market, you can set the string to EDGEDEFAULT. If you'd like your employees to use Microsoft Bing as the default search engine, you can set the string to EDGEBING. + + - If you enable this setting, you can choose a default search engine for your employees. To choose the default engine, you must add a link to your OpenSearch XML file, including at least the short name and https: URL of the search engine, using this format: + + `https://fabrikam.com/opensearch.xml` + + - If you disable this setting, the policy-set default search engine is removed. If this is also the current in-use default, the engine changes to the Microsoft Edge specified engine for the market.

If you don't configure this setting, the default search engine is set to the one specified in App settings. + + - If you don't configure this setting (default), the default search engine is set to the one specified in App settings. + +### Show message when opening sites in Internet Explorer +- **Supported versions:** Windows 10, Version 1607 and later + +- **Description:** This policy setting lets you decide whether employees see an additional page in Microsoft Edge, stating that a site has been opened using Internet Explorer 11. + + - If you enable this setting, employees see an additional page in Microsoft Edge, stating that a site has been opened using Internet Explorer 11. + + - If you disable or don’t configure this setting (default), the default app behavior occurs and no additional page appears. ## Using Microsoft Intune to manage your Mobile Data Management (MDM) settings for Microsoft Edge If you manage your policies using Intune, you'll want to use these MDM policy settings. You can see the full list of available policies, on the [Policy CSP]( https://go.microsoft.com/fwlink/p/?LinkId=722885) page. From 8944c9b87fa16aba925c17124f7c43f12e541903 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Mon, 6 Mar 2017 13:14:37 -0800 Subject: [PATCH 067/108] Updating formatting --- browsers/edge/available-policies.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/browsers/edge/available-policies.md b/browsers/edge/available-policies.md index 815a44a832..eab74497e1 100644 --- a/browsers/edge/available-policies.md +++ b/browsers/edge/available-policies.md @@ -29,7 +29,7 @@ By using Group Policy and Intune, you can set up a policy setting once, and then ## Group Policy settings Microsoft Edge works with these Group Policy settings (`Computer Configuration\Administrative Templates\Windows Components\Microsoft Edge\`) to help you manage your company's web browser configurations: -### Allow Address bar drop-down list suggestions +##### Allow Address bar drop-down list suggestions - **Supported versions:** Windows 10, Windows Insider Program - **Description:** This policy setting lets you decide whether the Address bar drop-down functionality is available in Microsoft Edge. We recommend disabling this setting if you want to minimize network connections from Microsoft Edge to Microsoft services. @@ -41,7 +41,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A >[!Note] >Disabling this setting turns off the Address bar drop-down functionality. Therefore, because search suggestions are shown in the drop-down, this setting takes precedence over the "Configure search suggestions in Address bar" setting. -### Allow Adobe Flash +##### Allow Adobe Flash - **Supported versions:** Windows 10 or later - **Description:** This setting lets you decide whether employees can run Adobe Flash in Microsoft Edge. @@ -50,7 +50,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable this setting, employees can't use Adobe Flash. -### Allow clearing browsing data on exit +##### Allow clearing browsing data on exit - **Supported versions:** Windows 10, Windows Insider Program - **Description:** This policy setting allows the automatic clearing of browsing data when Microsoft Edge closes. From 48817b28b787dbd70abfd369d3fd680949a3f1cd Mon Sep 17 00:00:00 2001 From: LizRoss Date: Mon, 6 Mar 2017 13:23:52 -0800 Subject: [PATCH 068/108] Updating formatting --- browsers/edge/available-policies.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/browsers/edge/available-policies.md b/browsers/edge/available-policies.md index eab74497e1..31d5c9e19e 100644 --- a/browsers/edge/available-policies.md +++ b/browsers/edge/available-policies.md @@ -29,7 +29,7 @@ By using Group Policy and Intune, you can set up a policy setting once, and then ## Group Policy settings Microsoft Edge works with these Group Policy settings (`Computer Configuration\Administrative Templates\Windows Components\Microsoft Edge\`) to help you manage your company's web browser configurations: -##### Allow Address bar drop-down list suggestions +#### **Allow Address bar drop-down list suggestions** - **Supported versions:** Windows 10, Windows Insider Program - **Description:** This policy setting lets you decide whether the Address bar drop-down functionality is available in Microsoft Edge. We recommend disabling this setting if you want to minimize network connections from Microsoft Edge to Microsoft services. @@ -41,7 +41,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A >[!Note] >Disabling this setting turns off the Address bar drop-down functionality. Therefore, because search suggestions are shown in the drop-down, this setting takes precedence over the "Configure search suggestions in Address bar" setting. -##### Allow Adobe Flash +#### **Allow Adobe Flash** - **Supported versions:** Windows 10 or later - **Description:** This setting lets you decide whether employees can run Adobe Flash in Microsoft Edge. @@ -50,7 +50,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable this setting, employees can't use Adobe Flash. -##### Allow clearing browsing data on exit +#### **Allow clearing browsing data on exit** - **Supported versions:** Windows 10, Windows Insider Program - **Description:** This policy setting allows the automatic clearing of browsing data when Microsoft Edge closes. From 1f2bd83dc033782e0c6364e2ea4cc5f8da75f01c Mon Sep 17 00:00:00 2001 From: LizRoss Date: Mon, 6 Mar 2017 13:31:19 -0800 Subject: [PATCH 069/108] Updating formatting --- browsers/edge/available-policies.md | 58 ++++++++++++++--------------- 1 file changed, 29 insertions(+), 29 deletions(-) diff --git a/browsers/edge/available-policies.md b/browsers/edge/available-policies.md index 31d5c9e19e..83b2d741a9 100644 --- a/browsers/edge/available-policies.md +++ b/browsers/edge/available-policies.md @@ -59,7 +59,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable or don't configure this policy setting (default), it can be turned on and configured by the employee in the Clear browsing data options area, under Settings. -### Allow Developer Tools +#### **Allow Developer Tools** - **Supported versions:** Windows 10, Version 1511 or later - **Description:** This policy setting lets you decide whether F12 Developer Tools are available on Microsoft Edge. @@ -67,7 +67,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable this setting, the F12 Developer Tools aren’t available in Microsoft Edge. -### Allow Extensions +#### **Allow Extensions** - **Supported versions:** Windows 10, Version 1607 or later - **Description:** This policy setting lets you decide whether employees can use Edge Extensions. @@ -76,7 +76,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable this setting, employees can’t use Edge Extensions. -### Allow InPrivate browsing +#### **Allow InPrivate browsing** - **Supported versions:** Windows 10, Version 1511 or later - **Description:** This policy setting lets you decide whether employees can browse using InPrivate website browsing. @@ -85,7 +85,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable this setting, employees can’t use InPrivate website browsing. -### Allow Microsoft Compatibility List +#### **Allow Microsoft Compatibility List** - **Supported versions:** Windows 10, Version 1607 or later - **Description:** This policy setting lets you decide whether to use the Microsoft Compatibility List (a Microsoft-provided list that helps sites with known compatibility issues to display properly) in Microsoft Edge. By default, the Microsoft Compatibility List is enabled and can be viewed by visiting about:compat. @@ -94,7 +94,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable this setting, the Microsoft Compatibility List isn’t used during browser navigation. -### Allow search engine customization +#### **Allow search engine customization** - **Supported versions:** Windows 10, Windows Insider Program - **Description:** This policy setting lets you decide whether users can change their search engine. @@ -106,7 +106,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable this setting, users can't add search engines or change the default used in the address bar. -### Allow web content on New Tab page +#### **Allow web content on New Tab page** - **Supported versions:** Windows 10 or later - **Description:** This policy setting lets you configure what appears when Microsoft Edge opens a new tab. By default, Microsoft Edge opens the New Tab page. If you use this setting, employees can’t change it. @@ -117,7 +117,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you don’t configure this setting (default), employees can choose how new tabs appears. -### Configure additional search engines +#### **Configure additional search engines** - **Supported versions:** Windows 10, Windows Insider Program - **Description:** This policy setting lets you add up to 5 additional search engines, which can't be removed by your employees, but can be made a personal default engine. This setting doesn't set the default search engine. For that, you must use the "Set default search engine" setting. @@ -135,7 +135,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you don't configure this setting, the search engine list is set to what is specified in App settings. -### Configure Autofill +#### **Configure Autofill** - **Supported versions:** Windows 10 or later - **Description:** This policy setting lets you decide whether employees can use Autofill to automatically fill in form fields while using Microsoft Edge. By default, employees can choose whether to use Autofill. @@ -146,7 +146,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you don’t configure this setting (default), employees can choose whether to use Autofill to automatically fill in forms while using Microsoft Edge. -### Configure cookies +#### **Configure cookies** - **Supported versions:** Windows 10 or later - **Description:** This setting lets you configure how to work with cookies. @@ -160,7 +160,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable or don't configure this setting, all cookies are allowed from all sites. -### Configure Do Not Track +#### **Configure Do Not Track** - **Supported versions:** Windows 10 or later - **Description:** This policy setting lets you decide whether employees can send Do Not Track requests to websites that ask for tracking info. By default, Do Not Track requests aren’t sent, but employees can choose to turn on and send requests. @@ -171,7 +171,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you don’t configure this setting (default), employees can choose whether to send Do Not Track requests to websites asking for tracking info. -### Configure Favorites +#### **Configure Favorites** - **Supported versions:** Windows 10, Version 1511 or later - **Description:** This policy setting lets you configure the default list of Favorites that appear for your employees. Employees can change their Favorites by adding or removing items at any time. @@ -180,7 +180,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable or don’t configure this setting, employees will see the Favorites that they set in the Favorites hub. -### Configure Password Manager +#### **Configure Password Manager** - **Supported versions:** Windows 10 or later - **Description:** This policy setting lets you decide whether employees can save their passwords locally, using Password Manager. By default, Password Manager is turned on. @@ -191,7 +191,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you don’t configure this setting, employees can choose whether to use Password Manager to save their passwords locally. -### Configure Pop-up Blocker +#### **Configure Pop-up Blocker** - **Supported versions:** Windows 10 or later - **Description:** This policy setting lets you decide whether to turn on Pop-up Blocker. By default, Pop-up Blocker is turned on. @@ -202,7 +202,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you don’t configure this setting, employees can choose whether to use Pop-up Blocker. -### Configure search suggestions in Address bar +#### **Configure search suggestions in Address bar** - **Supported versions:** Windows 10 or later - **Description:** This policy setting lets you decide whether search suggestions appear in the Address bar of Microsoft Edge. By default, employees can choose whether search suggestions appear in the Address bar of Microsoft Edge. @@ -213,7 +213,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you don’t configure this setting (default), employees can choose whether search suggestions appear in the Address bar of Microsoft Edge. -### Configure Start pages +#### **Configure Start pages** - **Supported versions:** Windows 10, Version 1511 or later - **Description:** This policy setting lets you configure one or more Start pages, for domain-joined devices. Your employees won't be able to change this after you set it. @@ -224,7 +224,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable or don’t configure this setting (default), your default Start page is the webpage specified in App settings. -### Configure the Adobe Flash Click-to-Run setting +#### **Configure the Adobe Flash Click-to-Run setting** - **Supported versions:** Windows 10, Windows Insider Program - **Description:** This policy setting lets you decide whether employees must take an action, such as clicking the content or a Click-to-Run button, before seeing content in Adobe Flash. @@ -236,7 +236,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable this setting, Adobe Flash content is automatically loaded and run by Microsoft Edge. -### Configure the Enterprise Mode Site List +#### **Configure the Enterprise Mode Site List** - **Supported versions:** Windows 10 or later - **Description:** This policy setting lets you configure whether to use Enterprise Mode and the Enterprise Mode Site List to address common compatibility problems with legacy apps. @@ -249,7 +249,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A >If there’s an .xml file in the cache container, IE waits 65 seconds and then checks the local cache for a newer version of the file from the server, based on standard caching rules. If the server file has a different version number than the version in the cache container, the server file is used and stored in the cache container.

>If you’re already using a site list, enterprise mode continues to work during the 65 second wait; it just uses your existing site list instead of your new one. -### Configure Windows Defender SmartScreen +#### **Configure Windows Defender SmartScreen** - **Supported versions:** Windows 10 or later - **Description:** This policy setting lets you configure whether to turn on Windows Defender SmartScreen. Windows Defender SmartScreen provides warning messages to help protect your employees from potential phishing scams and malicious software. By default, Windows Defender SmartScreen is turned on. @@ -260,7 +260,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you don’t configure this setting (default), employees can choose whether to use Windows Defender SmartScreen. -### Disable lockdown of Start pages +#### **Disable lockdown of Start pages** - **Supported versions:** Windows 10, Windows Insider Program - **Description:** This policy setting lets you disable the lock down of Start pages, letting employees modify the Start pages when the "Configure Start pages" setting is in effect. @@ -272,7 +272,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable or don't configure this setting (default), employees can't change any Start pages configured using the "Configure Start pages" setting, thereby locking down the Start pages. -### Keep favorites in sync between Internet Explorer and Microsoft Edge +#### **Keep favorites in sync between Internet Explorer and Microsoft Edge** - **Supported versions:** Windows 10, Windows Insider Program - **Description:** This setting lets you decide whether people can sync their favorites between Internet Explorer and Microsoft Edge. @@ -281,7 +281,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable or don't configure this setting (default), employees can’t sync their favorites between Internet Explorer and Microsoft Edge. -### Prevent access to the about:flags page +#### **Prevent access to the about:flags page** - **Supported versions:** Windows 10, Version 1607 or later - **Description:** This policy setting lets you decide whether employees can access the about:flags page, which is used to change developer settings and to enable experimental features. @@ -290,7 +290,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable or don’t configure this setting (default), employees can access the about:flags page. -### Prevent bypassing Windows Defender SmartScreen prompts for files +#### **Prevent bypassing Windows Defender SmartScreen prompts for files** - **Supported versions:** Windows 10, Version 1511 or later - **Description:** This policy setting lets you decide whether employees can override the Windows Defender SmartScreen warnings about downloading unverified files. @@ -299,7 +299,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable or don’t configure this setting (default), employees can ignore Windows Defender SmartScreen warnings and continue the download process. -### Prevent bypassing Windows Defender SmartScreen prompts for sites +#### **Prevent bypassing Windows Defender SmartScreen prompts for sites** - **Supported versions:** Windows 10, Version 1511 or later - **Description:** This policy setting lets you decide whether employees can override the Windows Defender SmartScreen warnings about potentially malicious websites. @@ -308,7 +308,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable or don’t configure this setting (default), employees can ignore Windows Defender SmartScreen warnings and continue to the site. -### Prevent Microsoft Edge from gathering Live Tile information when pinning a site to Start +#### **Prevent Microsoft Edge from gathering Live Tile information when pinning a site to Start** - **Supported versions:** Windows 10, Windows Insider Program - **Description:** This policy lets you decide whether Microsoft Edge can gather Live Tile metadata from the ieonline.microsoft.com service to provide a better experience while pinning a Live Tile to the Start menu. @@ -317,7 +317,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable or don't configure this setting (default), Microsoft Edge gathers the Live Tile metadata, providing a fuller and more complete experience when a user pins a Live Tile to the Start menu. -### Prevent the First Run webpage from opening on Microsoft Edge +#### **Prevent the First Run webpage from opening on Microsoft Edge** - **Supported versions:** Windows 10, Windows Insider Program - **Description:** This policy setting lets you decide whether employees see Microsoft's First Run webpage when opening Microsoft Edge for the first time. @@ -326,7 +326,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable or don't configure this setting (default), employees will see the First Run page when opening Microsoft Edge for the first time. -### Prevent using Localhost IP address for WebRTC +#### **Prevent using Localhost IP address for WebRTC** - **Supported versions:** Windows 10, Version 1511 or later - **Description:** This policy setting lets you decide whether an employee’s Localhost IP address shows while making calls using the WebRTC protocol. By default, this setting is turned off. @@ -335,7 +335,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable or don’t configure this setting (default), Localhost IP addresses are shown while making calls using the WebRTC protocol. -### Send all intranet sites to Internet Explorer 11 +#### **Send all intranet sites to Internet Explorer 11** - **Supported versions:** Windows 10 or later - **Description:** This policy setting lets you decide whether your intranet sites should all open using Internet Explorer 11. This setting should only be used if there are known compatibility problems with Microsoft Edge. @@ -344,7 +344,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable or don’t configure this setting (default), all websites, including intranet sites, are automatically opened using Microsoft Edge. -### Set default search engine +#### **Set default search engine** - **Supported versions:** Windows 10, Windows Insider Program - **Description:** This policy setting lets you configure the default search engine for your employees. Employees can change the default search engine at any time unless you disable the "Allow search engine customization" setting, which restricts any changes. @@ -361,7 +361,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you don't configure this setting (default), the default search engine is set to the one specified in App settings. -### Show message when opening sites in Internet Explorer +#### **Show message when opening sites in Internet Explorer** - **Supported versions:** Windows 10, Version 1607 and later - **Description:** This policy setting lets you decide whether employees see an additional page in Microsoft Edge, stating that a site has been opened using Internet Explorer 11. From c484a004dab68961a5a60c2658d3dd390f560360 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Mon, 6 Mar 2017 13:36:37 -0800 Subject: [PATCH 070/108] Updating formatting --- browsers/edge/available-policies.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/browsers/edge/available-policies.md b/browsers/edge/available-policies.md index 83b2d741a9..e1a7d516ee 100644 --- a/browsers/edge/available-policies.md +++ b/browsers/edge/available-policies.md @@ -38,8 +38,8 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable this setting, employees won't see the Address bar drop-down functionality in Microsoft Edge. This setting also disables the user-defined setting, "Show search and site suggestions as I type". - >[!Note] - >Disabling this setting turns off the Address bar drop-down functionality. Therefore, because search suggestions are shown in the drop-down, this setting takes precedence over the "Configure search suggestions in Address bar" setting. + > [!Note] + > Disabling this setting turns off the Address bar drop-down functionality. Therefore, because search suggestions are shown in the drop-down, this setting takes precedence over the "Configure search suggestions in Address bar" setting. #### **Allow Adobe Flash** - **Supported versions:** Windows 10 or later @@ -122,8 +122,8 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - **Description:** This policy setting lets you add up to 5 additional search engines, which can't be removed by your employees, but can be made a personal default engine. This setting doesn't set the default search engine. For that, you must use the "Set default search engine" setting. - >[!Important] - >This setting can only be used with domain-joined or MDM-enrolled devices. For more info, see the Microsoft browser extension policy (aka.ms/browserpolicy). + > [!Important] + > This setting can only be used with domain-joined or MDM-enrolled devices. For more info, see the Microsoft browser extension policy (aka.ms/browserpolicy). - If you enable this setting, you can add up to 5 additional search engines. For each additional engine, you must also add a link to your OpenSearch XML file, including at least the short name and https: URL of the search engine, using this format: From c37ad7aa75d8742be3142d50136c8937cbabb131 Mon Sep 17 00:00:00 2001 From: GITMichiko Date: Mon, 6 Mar 2017 14:04:43 -0800 Subject: [PATCH 071/108] Added secure boot & revised TPM Hoping more clarity on TPM text --- windows/keep-secure/credential-guard.md | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/windows/keep-secure/credential-guard.md b/windows/keep-secure/credential-guard.md index 7d3b48530d..5fdb54b819 100644 --- a/windows/keep-secure/credential-guard.md +++ b/windows/keep-secure/credential-guard.md @@ -46,6 +46,7 @@ For Credential Guard to provide protections, the computers you are protecting mu To provide basic protection against OS level attempts to read Credential Manager domain credentials, NTLM and Kerberos derived credentials, Credential Manager uses: - Support for Virtualization-based security (required) +- Secure boot (required) - TPM 2.0 either discrete or firmware (preferred - provides binding to hardware) - UEFI lock (preferred - prevents attacker from disabling with a simple registry key change) @@ -85,7 +86,7 @@ Computers that meet additional qualifications can provide additional protections The following tables describe baseline protections, plus protections for improved security that are associated with hardware and firmware options available in 2015, 2016, and 2017. > [!NOTE] -> Beginning with Windows 10, version 1607, Trusted Platform Module (TPM 2.0) must be enabled by default on new computers.
+> Beginning with Windows 10, version 1607, Trusted Platform Module (TPM 2.0) must be enabled by default on new shipping computers.
> If you are an OEM, see [PC OEM requirements for Device Guard and Credential Guard](https://msdn.microsoft.com/library/windows/hardware/mt767514.aspx).
#### Baseline protections @@ -94,7 +95,7 @@ The following tables describe baseline protections, plus protections for improve |---------------------------------------------|----------------------------------------------------| | Hardware: **64-bit CPU** | A 64-bit computer is required for the Windows hypervisor to provide VBS. | | Hardware: **CPU virtualization extensions**,
plus **extended page tables** | **Requirements**: These hardware features are required for VBS:
One of the following virtualization extensions:
• VT-x (Intel) or
• AMD-V
And:
• Extended page tables, also called Second Level Address Translation (SLAT).

**Security benefits**: VBS provides isolation of secure kernel from normal operating system. Vulnerabilities and Day 0s in normal operating system cannot be exploited because of this isolation. | -| Hardware: **Trusted Platform Module (TPM)** | **Requirement**: TPM 1.2 or TPM 2.0, either discrete or firmware.

**Security benefits**: A TPM provides protection for VBS encryption keys that are stored in the firmware. This helps protect against attacks involving a physically present user with BIOS access. | +| Hardware: **Trusted Platform Module (TPM)** |  **Requirement**: TPM 1.2 or TPM 2.0, either discrete or firmware.
[TPM recommendations](https://technet.microsoft.com/itpro/windows/keep-secure/tpm-recommendations)

**Security benefits**: A TPM provides protection for VBS encryption keys that are stored in the firmware. This helps protect against attacks involving a physically present user with BIOS access. | | Firmware: **UEFI firmware version 2.3.1.c or higher with UEFI Secure Boot** | **Requirements**: See the following Windows Hardware Compatibility Program requirement: [System.Fundamentals.Firmware.UEFISecureBoot](http://msdn.microsoft.com/library/windows/hardware/dn932805.aspx#system-fundamentals-firmware-uefisecureboot)

**Security benefits**: UEFI Secure Boot helps ensure that the device boots only authorized code. This can prevent boot kits and root kits from installing and persisting across reboots. | | Firmware: **Secure firmware update process** | **Requirements**: UEFI firmware must support secure firmware update found under the following Windows Hardware Compatibility Program requirement: [System.Fundamentals.Firmware.UEFISecureBoot](http://msdn.microsoft.com/library/windows/hardware/dn932805.aspx#system-fundamentals-firmware-uefisecureboot).

**Security benefits**: UEFI firmware just like software can have security vulnerabilities that, when found, need to be patched through firmware updates. Patching helps prevent root kits from getting installed. | | Software: Qualified **Windows operating system** | **Requirement**: Windows 10 Enterprise, Windows 10 Education, Windows Server 2016, or Windows 10 IoT Enterprise

Important:
Windows Server 2016 running as a domain controller does not support Credential Guard. Only Device Guard is supported in this configuration.


**Security benefits**: Support for VBS and for management features that simplify configuration of Credential Guard. | From 0aa48d9c7e2c92be8dd5f9b19acf4d07ad39e15f Mon Sep 17 00:00:00 2001 From: LizRoss Date: Mon, 6 Mar 2017 14:09:58 -0800 Subject: [PATCH 072/108] Updating formatting --- browsers/edge/available-policies.md | 218 +++++++++++++++++++++++----- 1 file changed, 178 insertions(+), 40 deletions(-) diff --git a/browsers/edge/available-policies.md b/browsers/edge/available-policies.md index e1a7d516ee..149180b50d 100644 --- a/browsers/edge/available-policies.md +++ b/browsers/edge/available-policies.md @@ -29,7 +29,7 @@ By using Group Policy and Intune, you can set up a policy setting once, and then ## Group Policy settings Microsoft Edge works with these Group Policy settings (`Computer Configuration\Administrative Templates\Windows Components\Microsoft Edge\`) to help you manage your company's web browser configurations: -#### **Allow Address bar drop-down list suggestions** +### Allow Address bar drop-down list suggestions - **Supported versions:** Windows 10, Windows Insider Program - **Description:** This policy setting lets you decide whether the Address bar drop-down functionality is available in Microsoft Edge. We recommend disabling this setting if you want to minimize network connections from Microsoft Edge to Microsoft services. @@ -41,7 +41,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A > [!Note] > Disabling this setting turns off the Address bar drop-down functionality. Therefore, because search suggestions are shown in the drop-down, this setting takes precedence over the "Configure search suggestions in Address bar" setting. -#### **Allow Adobe Flash** +### Allow Adobe Flash - **Supported versions:** Windows 10 or later - **Description:** This setting lets you decide whether employees can run Adobe Flash in Microsoft Edge. @@ -50,7 +50,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable this setting, employees can't use Adobe Flash. -#### **Allow clearing browsing data on exit** +### Allow clearing browsing data on exit - **Supported versions:** Windows 10, Windows Insider Program - **Description:** This policy setting allows the automatic clearing of browsing data when Microsoft Edge closes. @@ -59,7 +59,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable or don't configure this policy setting (default), it can be turned on and configured by the employee in the Clear browsing data options area, under Settings. -#### **Allow Developer Tools** +### Allow Developer Tools - **Supported versions:** Windows 10, Version 1511 or later - **Description:** This policy setting lets you decide whether F12 Developer Tools are available on Microsoft Edge. @@ -67,7 +67,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable this setting, the F12 Developer Tools aren’t available in Microsoft Edge. -#### **Allow Extensions** +### Allow Extensions - **Supported versions:** Windows 10, Version 1607 or later - **Description:** This policy setting lets you decide whether employees can use Edge Extensions. @@ -76,7 +76,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable this setting, employees can’t use Edge Extensions. -#### **Allow InPrivate browsing** +### Allow InPrivate browsing - **Supported versions:** Windows 10, Version 1511 or later - **Description:** This policy setting lets you decide whether employees can browse using InPrivate website browsing. @@ -85,7 +85,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable this setting, employees can’t use InPrivate website browsing. -#### **Allow Microsoft Compatibility List** +### Allow Microsoft Compatibility List - **Supported versions:** Windows 10, Version 1607 or later - **Description:** This policy setting lets you decide whether to use the Microsoft Compatibility List (a Microsoft-provided list that helps sites with known compatibility issues to display properly) in Microsoft Edge. By default, the Microsoft Compatibility List is enabled and can be viewed by visiting about:compat. @@ -94,7 +94,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable this setting, the Microsoft Compatibility List isn’t used during browser navigation. -#### **Allow search engine customization** +### Allow search engine customization - **Supported versions:** Windows 10, Windows Insider Program - **Description:** This policy setting lets you decide whether users can change their search engine. @@ -106,7 +106,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable this setting, users can't add search engines or change the default used in the address bar. -#### **Allow web content on New Tab page** +### Allow web content on New Tab page - **Supported versions:** Windows 10 or later - **Description:** This policy setting lets you configure what appears when Microsoft Edge opens a new tab. By default, Microsoft Edge opens the New Tab page. If you use this setting, employees can’t change it. @@ -117,7 +117,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you don’t configure this setting (default), employees can choose how new tabs appears. -#### **Configure additional search engines** +### Configure additional search engines - **Supported versions:** Windows 10, Windows Insider Program - **Description:** This policy setting lets you add up to 5 additional search engines, which can't be removed by your employees, but can be made a personal default engine. This setting doesn't set the default search engine. For that, you must use the "Set default search engine" setting. @@ -135,7 +135,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you don't configure this setting, the search engine list is set to what is specified in App settings. -#### **Configure Autofill** +### Configure Autofill - **Supported versions:** Windows 10 or later - **Description:** This policy setting lets you decide whether employees can use Autofill to automatically fill in form fields while using Microsoft Edge. By default, employees can choose whether to use Autofill. @@ -146,7 +146,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you don’t configure this setting (default), employees can choose whether to use Autofill to automatically fill in forms while using Microsoft Edge. -#### **Configure cookies** +### Configure cookies - **Supported versions:** Windows 10 or later - **Description:** This setting lets you configure how to work with cookies. @@ -160,7 +160,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable or don't configure this setting, all cookies are allowed from all sites. -#### **Configure Do Not Track** +### Configure Do Not Track - **Supported versions:** Windows 10 or later - **Description:** This policy setting lets you decide whether employees can send Do Not Track requests to websites that ask for tracking info. By default, Do Not Track requests aren’t sent, but employees can choose to turn on and send requests. @@ -171,7 +171,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you don’t configure this setting (default), employees can choose whether to send Do Not Track requests to websites asking for tracking info. -#### **Configure Favorites** +### Configure Favorites - **Supported versions:** Windows 10, Version 1511 or later - **Description:** This policy setting lets you configure the default list of Favorites that appear for your employees. Employees can change their Favorites by adding or removing items at any time. @@ -180,7 +180,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable or don’t configure this setting, employees will see the Favorites that they set in the Favorites hub. -#### **Configure Password Manager** +### Configure Password Manager - **Supported versions:** Windows 10 or later - **Description:** This policy setting lets you decide whether employees can save their passwords locally, using Password Manager. By default, Password Manager is turned on. @@ -191,7 +191,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you don’t configure this setting, employees can choose whether to use Password Manager to save their passwords locally. -#### **Configure Pop-up Blocker** +### Configure Pop-up Blocker - **Supported versions:** Windows 10 or later - **Description:** This policy setting lets you decide whether to turn on Pop-up Blocker. By default, Pop-up Blocker is turned on. @@ -202,7 +202,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you don’t configure this setting, employees can choose whether to use Pop-up Blocker. -#### **Configure search suggestions in Address bar** +### Configure search suggestions in Address bar - **Supported versions:** Windows 10 or later - **Description:** This policy setting lets you decide whether search suggestions appear in the Address bar of Microsoft Edge. By default, employees can choose whether search suggestions appear in the Address bar of Microsoft Edge. @@ -213,7 +213,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you don’t configure this setting (default), employees can choose whether search suggestions appear in the Address bar of Microsoft Edge. -#### **Configure Start pages** +### Configure Start pages - **Supported versions:** Windows 10, Version 1511 or later - **Description:** This policy setting lets you configure one or more Start pages, for domain-joined devices. Your employees won't be able to change this after you set it. @@ -224,7 +224,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable or don’t configure this setting (default), your default Start page is the webpage specified in App settings. -#### **Configure the Adobe Flash Click-to-Run setting** +### Configure the Adobe Flash Click-to-Run setting - **Supported versions:** Windows 10, Windows Insider Program - **Description:** This policy setting lets you decide whether employees must take an action, such as clicking the content or a Click-to-Run button, before seeing content in Adobe Flash. @@ -236,7 +236,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable this setting, Adobe Flash content is automatically loaded and run by Microsoft Edge. -#### **Configure the Enterprise Mode Site List** +### Configure the Enterprise Mode Site List - **Supported versions:** Windows 10 or later - **Description:** This policy setting lets you configure whether to use Enterprise Mode and the Enterprise Mode Site List to address common compatibility problems with legacy apps. @@ -249,7 +249,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A >If there’s an .xml file in the cache container, IE waits 65 seconds and then checks the local cache for a newer version of the file from the server, based on standard caching rules. If the server file has a different version number than the version in the cache container, the server file is used and stored in the cache container.

>If you’re already using a site list, enterprise mode continues to work during the 65 second wait; it just uses your existing site list instead of your new one. -#### **Configure Windows Defender SmartScreen** +### Configure Windows Defender SmartScreen - **Supported versions:** Windows 10 or later - **Description:** This policy setting lets you configure whether to turn on Windows Defender SmartScreen. Windows Defender SmartScreen provides warning messages to help protect your employees from potential phishing scams and malicious software. By default, Windows Defender SmartScreen is turned on. @@ -260,7 +260,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you don’t configure this setting (default), employees can choose whether to use Windows Defender SmartScreen. -#### **Disable lockdown of Start pages** +### Disable lockdown of Start pages - **Supported versions:** Windows 10, Windows Insider Program - **Description:** This policy setting lets you disable the lock down of Start pages, letting employees modify the Start pages when the "Configure Start pages" setting is in effect. @@ -272,7 +272,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable or don't configure this setting (default), employees can't change any Start pages configured using the "Configure Start pages" setting, thereby locking down the Start pages. -#### **Keep favorites in sync between Internet Explorer and Microsoft Edge** +### Keep favorites in sync between Internet Explorer and Microsoft Edge - **Supported versions:** Windows 10, Windows Insider Program - **Description:** This setting lets you decide whether people can sync their favorites between Internet Explorer and Microsoft Edge. @@ -281,7 +281,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable or don't configure this setting (default), employees can’t sync their favorites between Internet Explorer and Microsoft Edge. -#### **Prevent access to the about:flags page** +### Prevent access to the about:flags page - **Supported versions:** Windows 10, Version 1607 or later - **Description:** This policy setting lets you decide whether employees can access the about:flags page, which is used to change developer settings and to enable experimental features. @@ -290,7 +290,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable or don’t configure this setting (default), employees can access the about:flags page. -#### **Prevent bypassing Windows Defender SmartScreen prompts for files** +### Prevent bypassing Windows Defender SmartScreen prompts for files - **Supported versions:** Windows 10, Version 1511 or later - **Description:** This policy setting lets you decide whether employees can override the Windows Defender SmartScreen warnings about downloading unverified files. @@ -299,7 +299,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable or don’t configure this setting (default), employees can ignore Windows Defender SmartScreen warnings and continue the download process. -#### **Prevent bypassing Windows Defender SmartScreen prompts for sites** +### Prevent bypassing Windows Defender SmartScreen prompts for sites - **Supported versions:** Windows 10, Version 1511 or later - **Description:** This policy setting lets you decide whether employees can override the Windows Defender SmartScreen warnings about potentially malicious websites. @@ -308,7 +308,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable or don’t configure this setting (default), employees can ignore Windows Defender SmartScreen warnings and continue to the site. -#### **Prevent Microsoft Edge from gathering Live Tile information when pinning a site to Start** +### Prevent Microsoft Edge from gathering Live Tile information when pinning a site to Start - **Supported versions:** Windows 10, Windows Insider Program - **Description:** This policy lets you decide whether Microsoft Edge can gather Live Tile metadata from the ieonline.microsoft.com service to provide a better experience while pinning a Live Tile to the Start menu. @@ -317,7 +317,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable or don't configure this setting (default), Microsoft Edge gathers the Live Tile metadata, providing a fuller and more complete experience when a user pins a Live Tile to the Start menu. -#### **Prevent the First Run webpage from opening on Microsoft Edge** +### Prevent the First Run webpage from opening on Microsoft Edge - **Supported versions:** Windows 10, Windows Insider Program - **Description:** This policy setting lets you decide whether employees see Microsoft's First Run webpage when opening Microsoft Edge for the first time. @@ -326,7 +326,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable or don't configure this setting (default), employees will see the First Run page when opening Microsoft Edge for the first time. -#### **Prevent using Localhost IP address for WebRTC** +### Prevent using Localhost IP address for WebRTC - **Supported versions:** Windows 10, Version 1511 or later - **Description:** This policy setting lets you decide whether an employee’s Localhost IP address shows while making calls using the WebRTC protocol. By default, this setting is turned off. @@ -335,7 +335,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable or don’t configure this setting (default), Localhost IP addresses are shown while making calls using the WebRTC protocol. -#### **Send all intranet sites to Internet Explorer 11** +### Send all intranet sites to Internet Explorer 11 - **Supported versions:** Windows 10 or later - **Description:** This policy setting lets you decide whether your intranet sites should all open using Internet Explorer 11. This setting should only be used if there are known compatibility problems with Microsoft Edge. @@ -344,7 +344,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you disable or don’t configure this setting (default), all websites, including intranet sites, are automatically opened using Microsoft Edge. -#### **Set default search engine** +### Set default search engine - **Supported versions:** Windows 10, Windows Insider Program - **Description:** This policy setting lets you configure the default search engine for your employees. Employees can change the default search engine at any time unless you disable the "Allow search engine customization" setting, which restricts any changes. @@ -361,7 +361,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you don't configure this setting (default), the default search engine is set to the one specified in App settings. -#### **Show message when opening sites in Internet Explorer** +### Show message when opening sites in Internet Explorer - **Supported versions:** Windows 10, Version 1607 and later - **Description:** This policy setting lets you decide whether employees see an additional page in Microsoft Edge, stating that a site has been opened using Internet Explorer 11. @@ -374,20 +374,158 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A If you manage your policies using Intune, you'll want to use these MDM policy settings. You can see the full list of available policies, on the [Policy CSP]( https://go.microsoft.com/fwlink/p/?LinkId=722885) page. > [!NOTE] -> The **Supports** column uses these options: +> **Supported Devices** uses these options: > - **Desktop.** Supports Windows 10 Pro and Windows 10 Enterprise computers that are enrolled with Intune only. > - **Mobile.** Supports Windows 10 Mobile devices only. > - **Both.** Supports both desktop and mobile devices. All devices must be enrolled with Intune if you want to use the Windows Custom URI Policy. -|Policy name|Supported versions|Supported device|Details| -|-------------|-------------------|-----------------|--------| -|AllowAddressBarDropdown|Windows 10, Windows Insider Program|Desktop|

  • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/AllowAddressBarDropdown
  • **Data type.** Integer
  • **Allowed values:**
    • **0.** Not allowed. Address bar drop-down is disabled, which also disables the user-defined setting, "Show search and site suggestions as I type."
    • **1 (default).** Allowed. Address bar drop-down is enabled.
| -|AllowAutofill|Windows 10 or later|Desktop|
  • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/AllowAutofill
  • **Data type.** Integer
  • **Allowed values:**
    • **0.** Employees can’t use Autofill to complete form fields.
    • **1 (default).** Employees can use Autofill to complete form fields.
| -|AllowBrowser|Windows 10 or later|Mobile|
  • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/AllowBrowser
  • **Data type.** Integer
  • **Allowed values:**
    • **0.** Employees can’t use Microsoft Edge.
    • **1 (default).** Employees can use Microsoft Edge.
| -|AllowCookies|Windows 10 or later|Both|
  • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/AllowCookies
  • **Data type.** Integer
  • **Allowed values:**
    • **0 (default).** Allows all cookies from all sites.
    • **1.** Blocks only cookies from 3rd party websites
    • **2.** Blocks all cookies from all sites.
| -|AllowDeveloperTools|Windows 10, Version 1511 or later|Desktop|
  • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/AllowDeveloperTools
  • **Data type:** Integer
  • **Allowed values:**
    • **0.** Employees can't use the F12 Developer Tools
    • **1 (default).** Employees can use the F12 Developer Tools
| +### AllowAddressBarDropdown +- **Supported versions:** Windows 10, Windows Insider Program + +- **Supported devices:** Desktop + +- **Details:** + + - **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/AllowAddressBarDropdown + + - **Data type:** Integer + + - **Allowed values:** + + - **0.** Not allowed. Address bar drop-down is disabled, which also disables the user-defined setting, "Show search and site suggestions as I type." + + - **1 (default).** Allowed. Address bar drop-down is enabled. + +### AllowAutofill +- **Supported versions:** Windows 10 or later + +- **Supported devices:** Desktop + +- **Details:** + + - **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/AllowAutofill + + - **Data type:** Integer + + - **Allowed values:** + + - **0.** Employees can’t use Autofill to complete form fields. + + - **1 (default).** Employees can use Autofill to complete form fields. + +### Allow Browser +- **Supported versions:** Windows 10 or later + +- **Supported devices:** Mobile + +- **Details:** + + - **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/AllowBrowser + + - **Data type:** Integer + + - **Allowed values:** + + - **0.** Employees can’t use Microsoft Edge. + + - **1 (default).** Employees can use Microsoft Edge. + +### AllowCookies +- **Supported versions:** Windows 10 or later + +- **Supported devices:** Both + +- **Details:** + + - **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/AllowCookies + + - **Data type:** Integer + + - **Allowed values:** + + - **0 (default).** Allows all cookies from all sites. + + - **1.** Blocks only cookies from 3rd party websites. + + - **2.** Blocks all cookies from all sites. + +### AllowDeveloperTools +- **Supported versions:** Windows 10, Version 1511 or later + +- **Supported devices:** Desktop + +- **Details:** + + - **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/AllowDeveloperTools + + - **Data type:** Integer + + - **Allowed values:** + + - **0.** Employees can't use the F12 Developer Tools. + + - **1 (default).** Employees can use the F12 Developer Tools. + +### Text +- **Supported versions:** + +- **Supported devices:** + +- **Details:** + + - **URI full path:** + + - **Data type:** + + - **Allowed values:** + +### Text +- **Supported versions:** + +- **Supported devices:** + +- **Details:** + + - **URI full path:** + + - **Data type:** + + - **Allowed values:** + +### Text +- **Supported versions:** + +- **Supported devices:** + +- **Details:** + + - **URI full path:** + + - **Data type:** + + - **Allowed values:** + +### Text +- **Supported versions:** + +- **Supported devices:** + +- **Details:** + + - **URI full path:** + + - **Data type:** + + - **Allowed values:** + + + + + + + |AllowDoNotTrack|Windows 10 or later|Both|
  • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/AllowDoNotTrack
  • **Data type.** Integer
  • **Allowed values:**
    • **0 (default).** Stops employees from sending Do Not Track headers to websites requesting tracking info.
    • **1.** Employees can send Do Not Track headers to websites requesting tracking info.
| |AllowExtensions|Windows 10, Version 1607 and later|Desktop|
  • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/AllowExtensions
  • **Data type.** Integer
  • **Allowed values:**
    • **0.** Employees can’t use Edge Extensions.
    • **1 (default).** Employees can use Edge Extensions.
| |AllowFlash|Windows 10 or later|Desktop|
  • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/AllowFlash
  • **Data type.** Integer
  • **Allowed values:**
    • **0.** Not allowed. Employees can’t use Adobe Flash
    • **1 (default).** Allowed. Employees can use Adobe Flash.
| From 6fa7490d4d452ae26b49cf77a60e7bc7b5f9a160 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 6 Mar 2017 14:15:21 -0800 Subject: [PATCH 073/108] update code line --- ...-example-code-windows-defender-advanced-threat-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/keep-secure/python-example-code-windows-defender-advanced-threat-protection.md b/windows/keep-secure/python-example-code-windows-defender-advanced-threat-protection.md index 36b0a25f3b..6e63d9f1b5 100644 --- a/windows/keep-secure/python-example-code-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/python-example-code-windows-defender-advanced-threat-protection.md @@ -71,7 +71,7 @@ You can now use the alert ID obtained from creating a new alert definition to cr ## Complete code You can use the complete code to create calls to the API. -[!code[CustomTIAPI](./code/example.py#L1-L51)] +[!code[CustomTIAPI](./code/example.py#L1-L53)] ## Related topics - [Understand threat intelligence](threat-indicator-concepts-windows-defender-advanced-threat-protection.md) From 50a055530a97d2c3b485669fb17b37c1db6c9ce2 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Mon, 6 Mar 2017 14:51:19 -0800 Subject: [PATCH 074/108] Updating formatting --- browsers/edge/available-policies.md | 205 ++++++++++++++++++++++++++-- 1 file changed, 192 insertions(+), 13 deletions(-) diff --git a/browsers/edge/available-policies.md b/browsers/edge/available-policies.md index 149180b50d..a10866f11d 100644 --- a/browsers/edge/available-policies.md +++ b/browsers/edge/available-policies.md @@ -415,7 +415,7 @@ All devices must be enrolled with Intune if you want to use the Windows Custom U - **1 (default).** Employees can use Autofill to complete form fields. -### Allow Browser +### AllowBrowser - **Supported versions:** Windows 10 or later - **Supported devices:** Mobile @@ -468,18 +468,56 @@ All devices must be enrolled with Intune if you want to use the Windows Custom U - **1 (default).** Employees can use the F12 Developer Tools. -### Text -- **Supported versions:** +### AllowDoNotTrack +- **Supported versions:** Windows 10 or later -- **Supported devices:** +- **Supported devices:** Both - **Details:** - - **URI full path:** + - **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/AllowDoNotTrack - - **Data type:** + - **Data type:** Integer - - **Allowed values:** + - **Allowed values:** + + - **0 (default).** Stops employees from sending Do Not Track headers to websites requesting tracking info. + + - **1.** Employees can send Do Not Track headers to websites requesting tracking info. + +### AllowExtensions +- **Supported versions:** Windows 10, Version 1607 and later + +- **Supported devices:** Desktop + +- **Details:** + + - **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/AllowExtensions + + - **Data type:** Integer + + - **Allowed values:** + + - **0.** Employees can’t use Edge Extensions. + + - **1 (default).** Employees can use Edge Extensions. + +### AllowFlash +- **Supported versions:** Windows 10 or later + +- **Supported devices:** Desktop + +- **Details:** + + - **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/AllowFlash + + - **Data type:** Integer + + - **Allowed values:** + + - **0.** Not allowed. Employees can’t use Adobe Flash. + + - **1 (default).** Allowed. Employees can use Adobe Flash. ### Text - **Supported versions:** @@ -492,7 +530,9 @@ All devices must be enrolled with Intune if you want to use the Windows Custom U - **Data type:** - - **Allowed values:** + - **Allowed values:** + + - ### Text - **Supported versions:** @@ -505,7 +545,9 @@ All devices must be enrolled with Intune if you want to use the Windows Custom U - **Data type:** - - **Allowed values:** + - **Allowed values:** + + - ### Text - **Supported versions:** @@ -518,7 +560,147 @@ All devices must be enrolled with Intune if you want to use the Windows Custom U - **Data type:** - - **Allowed values:** + - **Allowed values:** + + - + +### Text +- **Supported versions:** + +- **Supported devices:** + +- **Details:** + + - **URI full path:** + + - **Data type:** + + - **Allowed values:** + + - + +### Text +- **Supported versions:** + +- **Supported devices:** + +- **Details:** + + - **URI full path:** + + - **Data type:** + + - **Allowed values:** + + - + +### Text +- **Supported versions:** + +- **Supported devices:** + +- **Details:** + + - **URI full path:** + + - **Data type:** + + - **Allowed values:** + + - + +### Text +- **Supported versions:** + +- **Supported devices:** + +- **Details:** + + - **URI full path:** + + - **Data type:** + + - **Allowed values:** + + - + +### Text +- **Supported versions:** + +- **Supported devices:** + +- **Details:** + + - **URI full path:** + + - **Data type:** + + - **Allowed values:** + + - + +### Text +- **Supported versions:** + +- **Supported devices:** + +- **Details:** + + - **URI full path:** + + - **Data type:** + + - **Allowed values:** + + - + +### Text +- **Supported versions:** + +- **Supported devices:** + +- **Details:** + + - **URI full path:** + + - **Data type:** + + - **Allowed values:** + + - + +### Text +- **Supported versions:** + +- **Supported devices:** + +- **Details:** + + - **URI full path:** + + - **Data type:** + + - **Allowed values:** + + - + +### Text +- **Supported versions:** + +- **Supported devices:** + +- **Details:** + + - **URI full path:** + + - **Data type:** + + - **Allowed values:** + + - + + + @@ -526,9 +708,6 @@ All devices must be enrolled with Intune if you want to use the Windows Custom U -|AllowDoNotTrack|Windows 10 or later|Both|
  • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/AllowDoNotTrack
  • **Data type.** Integer
  • **Allowed values:**
    • **0 (default).** Stops employees from sending Do Not Track headers to websites requesting tracking info.
    • **1.** Employees can send Do Not Track headers to websites requesting tracking info.
| -|AllowExtensions|Windows 10, Version 1607 and later|Desktop|
  • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/AllowExtensions
  • **Data type.** Integer
  • **Allowed values:**
    • **0.** Employees can’t use Edge Extensions.
    • **1 (default).** Employees can use Edge Extensions.
| -|AllowFlash|Windows 10 or later|Desktop|
  • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/AllowFlash
  • **Data type.** Integer
  • **Allowed values:**
    • **0.** Not allowed. Employees can’t use Adobe Flash
    • **1 (default).** Allowed. Employees can use Adobe Flash.
| |AllowFlashClickToRun|Windows 10, Windows Insider Program|Desktop|
  • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/AllowFlashClickToRun
  • **Data type.** Integer
  • **Allowed values:**
    • **0.** Adobe Flash content is automatically loaded and run by Microsoft Edge
    • **1 (default).** An employee must click the content, click a Click-to-Run button, or have the site appear on an auto-allow list before Microsoft Edge loads and runs Adobe Flash content.
| |AllowInPrivate|Windows 10, Version 1511 or later|Both|
  • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/AllowInPrivate
  • **Data type.** Integer
  • **Allowed values:**
    • **0.** Employees can’t use InPrivate browsing.
    • **1 (default).** Employees can use InPrivate browsing.
| |AllowMicrosoftCompatibilityList|Windows 10, Windows Insider Program|Both|
  • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/AllowMicrosoftCompatibilityList
  • **Data type.** Integer
  • **Allowed values:**
    • **0.** Additional search engines aren't allowed and the default can’t be changed in the Address bar.
    • **1 (default).** Additional search engines are allowed and the default can be changed in the Address bar.
| From c6d9af2be22d164eadebf83e58fd0ef733942334 Mon Sep 17 00:00:00 2001 From: Jason Gerend Date: Mon, 6 Mar 2017 16:43:29 -0800 Subject: [PATCH 075/108] Fixed H1 position --- windows/manage/windows-libraries.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/manage/windows-libraries.md b/windows/manage/windows-libraries.md index 1608798dce..f8937e7a43 100644 --- a/windows/manage/windows-libraries.md +++ b/windows/manage/windows-libraries.md @@ -10,10 +10,10 @@ author: jasongerend ms.date: 2/6/2017 description: All about Windows Libraries, which are containers for users' content, such as Documents and Pictures. --- -> Applies to: Windows 10, Windows 8.1, Windows 7, Windows Server 2016, Windows Server 2012 R2, Windows Server 2012, Windows Server 2008 R2 - # Windows Libraries +> Applies to: Windows 10, Windows 8.1, Windows 7, Windows Server 2016, Windows Server 2012 R2, Windows Server 2012, Windows Server 2008 R2 + Libraries are virtual containers for users’ content. A library can contain files and folders stored on the local computer or in a remote storage location. In Windows Explorer, users interact with libraries in ways similar to how they would interact with other folders. Libraries are built upon the legacy known folders (such as My Documents, My Pictures, and My Music) that users are familiar with, and these known folders are automatically included in the default libraries and set as the default save location. ## Features for Users From 2f25fbb84379730e2d06c2d37d8f9c85cd4c6479 Mon Sep 17 00:00:00 2001 From: jcaparas Date: Mon, 6 Mar 2017 21:12:56 -0800 Subject: [PATCH 076/108] add custom ti topics --- windows/keep-secure/TOC.md | 7 ++++ ...ows-defender-advanced-threat-protection.md | 6 +-- ...ows-defender-advanced-threat-protection.md | 2 + ...ows-defender-advanced-threat-protection.md | 39 +++++++++++++++++++ 4 files changed, 51 insertions(+), 3 deletions(-) create mode 100644 windows/keep-secure/use-custom-ti-windows-defender-advanced-threat-protection.md diff --git a/windows/keep-secure/TOC.md b/windows/keep-secure/TOC.md index 4e77353f2f..92fb8a44a9 100644 --- a/windows/keep-secure/TOC.md +++ b/windows/keep-secure/TOC.md @@ -772,6 +772,13 @@ ##### [Configure an Azure Active Directory application for SIEM integration](configure-aad-windows-defender-advanced-threat-protection.md) ##### [Configure Splunk to consume Windows Defender ATP alerts](configure-splunk-windows-defender-advanced-threat-protection.md) ##### [Configure HP ArcSight to consume Windows Defender ATP alerts](configure-arcsight-windows-defender-advanced-threat-protection.md) +#### [Use the threat intelligence API to create custom alerts](use-custom-ti-windows-defender-advanced-threat-protection.md) +##### [Understand threat intelligence concepts](threat-indicator-concepts-windows-defender-advanced-threat-protection.md) +##### [Enable the custom threat intelligence application](enable-custom-ti-windows-defender-advanced-threat-protection.md) +##### [Create custom threat intelligence alerts](custom-ti-api-windows-defender-advanced-threat-protection.md) +##### [PowerShell code examples](powershell-example-code-windows-defender-advanced-threat-protection.md) +##### [Python code examples](python-example-code-windows-defender-advanced-threat-protection.md) +##### [Troubleshoot custom threat intelligence issues](troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md) #### [Check sensor state](check-sensor-status-windows-defender-advanced-threat-protection.md) ##### [Fix unhealthy sensors](fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md) ###### [Inactive machines](fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md#inactive-machines) diff --git a/windows/keep-secure/custom-ti-api-windows-defender-advanced-threat-protection.md b/windows/keep-secure/custom-ti-api-windows-defender-advanced-threat-protection.md index eecae9a27a..8c54c753a6 100644 --- a/windows/keep-secure/custom-ti-api-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/custom-ti-api-windows-defender-advanced-threat-protection.md @@ -11,7 +11,7 @@ author: mjcaparas localizationpriority: high --- -# Create custom alerts using the threat intelligence (TI) Application program interface (API) +# Create custom alerts using the threat intelligence (TI) application program interface (API) **Applies to:** @@ -23,12 +23,12 @@ localizationpriority: high [Some information relates to pre-released product, which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.] -You can define custom alert definitions and indicators of compromise (IOC) using the threat intelligence API. Creating custom threat intelligence alerts allows you to create specific alerts that are applicable to your organization. +You can define custom alert definitions and indicators of compromise (IOC) using the threat intelligence API. Creating custom threat intelligence alerts allows you to generate specific alerts that are applicable to your organization. ## Before you begin Before creating custom alerts, you'll need to enable the threat intelligence application in Azure Active Directory and generate access tokens. For more information, see [Enable the custom threat intelligence application](enable-custom-ti-windows-defender-advanced-threat-protection.md). -### Use the threat intelligence REST APIs to create custom threat intelligence alerts +### Use the threat intelligence REST API to create custom threat intelligence alerts You can call and specify the resource URLs using one of the following operations to access and manipulate a threat intelligence resource, you call and specify the resource URLs using one of the following operations: - GET diff --git a/windows/keep-secure/preview-windows-defender-advanced-threat-protection.md b/windows/keep-secure/preview-windows-defender-advanced-threat-protection.md index e4a19d51d6..3a89c15e0b 100644 --- a/windows/keep-secure/preview-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/preview-windows-defender-advanced-threat-protection.md @@ -47,5 +47,7 @@ The following features are included in the preview release: - [Check sensor health state](check-sensor-status-windows-defender-advanced-threat-protection.md) - Check an endpoint's ability to provide sensor data and communicate with the Windows Defender ATP service and fix known issues. - [Fix unhealthy sensors](fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md) +- [Use the threat intelligence API to create custom alerts](use-custom-ti-windows-defender-advanced-threat-protection.md) - Create custom threat intelligence alerts using the threat intelligence API to generate alerts that are applicable to your organization. + >[!NOTE] > All response actions require machines to be on the latest Windows 10 Insider Preview build. diff --git a/windows/keep-secure/use-custom-ti-windows-defender-advanced-threat-protection.md b/windows/keep-secure/use-custom-ti-windows-defender-advanced-threat-protection.md new file mode 100644 index 0000000000..ee87fd5701 --- /dev/null +++ b/windows/keep-secure/use-custom-ti-windows-defender-advanced-threat-protection.md @@ -0,0 +1,39 @@ +--- +title: Use the threat intelligence API in Windows Defender Advanced Threat Protection to create custom alerts +description: Use the custom threat intelligence API to create custom alerts for your organization. +keywords: threat intelligence, alert definitions, indicators of compromise +search.product: eADQiWindows 10XVcnh +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +author: mjcaparas +localizationpriority: high +--- + +# Use the threat intelligence API to create custom alerts in Windows Defender ATP + +**Applies to:** + +- Windows 10 Enterprise +- Windows 10 Education +- Windows 10 Pro +- Windows 10 Pro Education +- Windows Defender Advanced Threat Protection (Windows Defender ATP) + +[Some information relates to pre-released product, which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.] + +Understand threat intelligence concepts, then enable the custom threat intelligence application so that you can proceed to create custom threat intelligence alerts that are specific to your organization. + +You can use the code examples to guide you in creating calls to the custom threat intelligence API. + +## In this section + +Topic | Description +:---|:--- +[Understand threat intelligence concepts](threat-indicator-concepts-windows-defender-advanced-threat-protection.md) | Understand the concepts around threat intelligence so that you can effectively create custom intelligence for your organization. +[Enable the custom threat intelligence application](enable-custom-ti-windows-defender-advanced-threat-protection.md) | Set up the custom threat intelligence application through the Windows Defender ATP portal so that you can create custom threat intelligence (TI) using REST API. +[Create custom threat intelligence alerts](custom-ti-api-windows-defender-advanced-threat-protection.md) | Create custom threat intelligence alerts so that you can generate specific alerts that are applicable to your organization. +[PowerShell code examples](powershell-example-code-windows-defender-advanced-threat-protection.md) | Use the PowerShell code examples to guide you in using the custom threat intelligence API. +[Python code examples](python-example-code-windows-defender-advanced-threat-protection.md) | Use the Python code examples to guide you in using the custom threat intelligence API. +[Troubleshoot custom threat intelligence issues](troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md) | Learn how to address possible issues you might encounter while using the threat intelligence API. From cfaaf66ccf8f12546e88d3e97c19a72bcb8ee70d Mon Sep 17 00:00:00 2001 From: jcaparas Date: Mon, 6 Mar 2017 21:22:55 -0800 Subject: [PATCH 077/108] update topic header --- ...ator-concepts-windows-defender-advanced-threat-protection.md | 2 +- ...use-custom-ti-windows-defender-advanced-threat-protection.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/keep-secure/threat-indicator-concepts-windows-defender-advanced-threat-protection.md b/windows/keep-secure/threat-indicator-concepts-windows-defender-advanced-threat-protection.md index 835ddbf45a..be6cfe9d8e 100644 --- a/windows/keep-secure/threat-indicator-concepts-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/threat-indicator-concepts-windows-defender-advanced-threat-protection.md @@ -47,7 +47,7 @@ Here is an example of an IOC: IOCs have a many-to-one relationship with alert definitions such that an alert definition can have many IOCs that correspond to it. -## Related topic +## Related topics - [Enable the custom threat intelligence application](enable-custom-ti-windows-defender-advanced-threat-protection.md) - [Create custom threat intelligence alerts](custom-ti-api-windows-defender-advanced-threat-protection.md) - [PowerShell code examples](powershell-example-code-windows-defender-advanced-threat-protection.md) diff --git a/windows/keep-secure/use-custom-ti-windows-defender-advanced-threat-protection.md b/windows/keep-secure/use-custom-ti-windows-defender-advanced-threat-protection.md index ee87fd5701..0757a26702 100644 --- a/windows/keep-secure/use-custom-ti-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/use-custom-ti-windows-defender-advanced-threat-protection.md @@ -11,7 +11,7 @@ author: mjcaparas localizationpriority: high --- -# Use the threat intelligence API to create custom alerts in Windows Defender ATP +# Use the threat intelligence API to create custom alerts **Applies to:** From 4726e8ee22f1b00336f0bb29912ecee4c054c52a Mon Sep 17 00:00:00 2001 From: jcaparas Date: Mon, 6 Mar 2017 21:36:07 -0800 Subject: [PATCH 078/108] minor edit --- windows/keep-secure/code/example.ps1 | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/keep-secure/code/example.ps1 b/windows/keep-secure/code/example.ps1 index 877292e484..278824d13a 100644 --- a/windows/keep-secure/code/example.ps1 +++ b/windows/keep-secure/code/example.ps1 @@ -24,7 +24,7 @@ $alertDefinitions = (Invoke-RestMethod ("{0}AlertDefinitions" -f $apiBaseUrl) -Method Get -Headers $headers).value $alertDefinitionPayload = @{ - "Name"= "The Alert's Name" + "Name"= "The alert's name" "Severity"= "Low" "InternalDescription"= "An internal description of the Alert" "Title"= "The Title" From 3c59e980aa104a48e63f5902fcf97133f7c1ac11 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Tue, 7 Mar 2017 08:44:07 -0800 Subject: [PATCH 079/108] Updating formatting --- browsers/edge/available-policies.md | 483 ++++++++++++++++++++++------ 1 file changed, 376 insertions(+), 107 deletions(-) diff --git a/browsers/edge/available-policies.md b/browsers/edge/available-policies.md index a10866f11d..04f361671f 100644 --- a/browsers/edge/available-policies.md +++ b/browsers/edge/available-policies.md @@ -519,238 +519,507 @@ All devices must be enrolled with Intune if you want to use the Windows Custom U - **1 (default).** Allowed. Employees can use Adobe Flash. -### Text -- **Supported versions:** +### AllowFlashClickToRun +- **Supported versions:** Windows 10, Windows Insider Program -- **Supported devices:** +- **Supported devices:** Desktop| - **Details:** - - **URI full path:** + - **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/AllowFlashClickToRun - - **Data type:** + - **Data type:** Integer - **Allowed values:** - - + - **0.** Adobe Flash content is automatically loaded and run by Microsoft Edge + + - **1 (default).** An employee must click the content, click a Click-to-Run button, or have the site appear on an auto-allow list before Microsoft Edge loads and runs Adobe Flash content. -### Text -- **Supported versions:** +### AllowInPrivate +- **Supported versions:** Windows 10, Version 1511 or later -- **Supported devices:** +- **Supported devices:** Both - **Details:** - - **URI full path:** + - **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/AllowInPrivate - - **Data type:** + - **Data type:** Integer - **Allowed values:** - - + - **0.** Employees can’t use InPrivate browsing. + + - **1 (default).** Employees can use InPrivate browsing. -### Text -- **Supported versions:** +### AllowMicrosoftCompatibilityList +- **Supported versions:** Windows 10, Windows Insider Program -- **Supported devices:** +- **Supported devices:** Both - **Details:** - - **URI full path:** + - **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/AllowMicrosoftCompatibilityList - - **Data type:** + - **Data type:** Integer - - **Allowed values:** + - **Allowed values:** - - + - **0.** Additional search engines aren't allowed and the default can’t be changed in the Address bar. + + - **1 (default).** Additional search engines are allowed and the default can be changed in the Address bar. -### Text -- **Supported versions:** +### AllowPasswordManager +- **Supported versions:** Windows 10 or later -- **Supported devices:** +- **Supported devices:** Both - **Details:** - - **URI full path:** + - **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/AllowPasswordManager - - **Data type:** + - **Data type:** Integer - **Allowed values:** - - + - **0 (default).** Employees can't use Password Manager to save passwords locally. + + - **1.** Employees can use Password Manager to save passwords locally. -### Text -- **Supported versions:** +### AllowPopups +- **Supported versions:** Windows 10 or later -- **Supported devices:** +- **Supported devices:** Desktop - **Details:** - - **URI full path:** + - **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/AllowPopups - - **Data type:** + - **Data type:** Integer - **Allowed values:** - - + - **0 (default).** Turns off Pop-up Blocker, allowing pop-up windows. + + - **1.** Turns on Pop-up Blocker, stopping pop-up windows. -### Text -- **Supported versions:** +### AllowSearchEngineCustomization +- **Supported versions:** Windows 10, Windows Insider Program -- **Supported devices:** +- **Supported devices:** Both - **Details:** - - **URI full path:** + - **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/AllowSearchEngineCustomization - - **Data type:** + - **Data type:** Integer - **Allowed values:** - - + - **0.** Additional search engines are not allowed and the default can’t be changed in the Address bar. + + - **1 (default).** Additional search engines are allowed and the default can be changed in the Address bar. -### Text -- **Supported versions:** -- **Supported devices:** +### AllowSearchSuggestionsinAddressBar +- **Supported versions:** Windows 10 or later + +- **Supported devices:** Both - **Details:** - - **URI full path:** + - **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/AllowSearchSuggestionsinAddressBar - - **Data type:** + - **Data type:** Integer - **Allowed values:** - - + - **0 (default).** Employees can’t see search suggestions in the Address bar of Microsoft Edge. + + - **1.** Employees can see search suggestions in the Address bar of Microsoft Edge. -### Text -- **Supported versions:** +### AllowSmartScreen +- **Supported versions:** Windows 10 or later -- **Supported devices:** +- **Supported devices:** Both - **Details:** - - **URI full path:** + - **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/AllowSmartScreen - - **Data type:** + - **Data type:** Integer - **Allowed values:** - - + - **0 (default).** Turns off Windows Defender SmartScreen. + + - **1.** Turns on Windows Defender SmartScreen, providing warning messages to your employees about potential phishing scams and malicious software. -### Text -- **Supported versions:** +### ClearBrowsingDataOnExit +- **Supported versions:** Windows 10, Windows Insider Program -- **Supported devices:** +- **Supported devices:** Both - **Details:** - - **URI full path:** + - **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/ClearBrowsingDataOnExit - - **Data type:** + - **Data type:** Integer - **Allowed values:** - - + - **0 (default).** Browsing data is not cleared on exit. The type of browsing data to clear can be configured by the employee in the Clear browsing data options under Settings. + + - **1.** Browsing data is cleared on exit. -### Text -- **Supported versions:** +### ConfigureAdditionalSearchEngines +- **Supported versions:** Windows 10, Windows Insider Program -- **Supported devices:** +- **Supported devices:** Both - **Details:** - - **URI full path:** + - **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/ConfigureAdditionalSearchEngines - - **Data type:** + - **Data type:** Integer - **Allowed values:** - - + - **0 (default).** Additional search engines are not allowed. + + - **1.** Additional search engines are allowed. -### Text -- **Supported versions:** +### DisableLockdownOfStartPages +- **Supported versions:** Windows 10, Windows Insider Program -- **Supported devices:** +- **Supported devices:** Desktop - **Details:** - - **URI full path:** + - **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/DisableLockdownOfStartPages - - **Data type:** + - **Data type:** Integer - **Allowed values:** - - + - **0 (default).** Enable lockdown of the Start pages according to the settings specified in the Browser/HomePages policy. Users cannot change the Start pages. + + - **1.** Disable lockdown of the Start pages and allow users to modify them. -### Text -- **Supported versions:** +### EnterpriseModeSiteList +- **Supported versions:** Windows 10 or later -- **Supported devices:** +- **Supported devices:** Desktop - **Details:** - - **URI full path:** + - **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/EnterpriseModeSiteList - - **Data type:** + - **Data type:** String - **Allowed values:** - - + - Not configured. + - **1 (default).** Use the Enterprise Mode Site List, if configured. + + - **2.** Specify the location to the site list. + >[!NOTE] + >If there’s an .xml file in the cache container, IE waits 65 seconds and then checks the local cache for a newer version of the file from the server, based on standard caching rules. If the server file has a different version number than the version in the cache container, the server file is used and stored in the cache container.

If you’re already using a site list, enterprise mode continues to work during the 65 second wait; it just uses your existing site list instead of your new one. +### Favorites +- **Supported versions:** Windows 10, Version 1511 or later +- **Supported devices:** Both +- **Details:** + - **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/Favorites + - **Data type:** String + - **Allowed values:** + - Configure the **Favorite** URLs for your employees. + + **Example:** + + + + + URLs must be on separate lines and aren't shared between Microsoft Edge and Internet Explorer 11. -|AllowFlashClickToRun|Windows 10, Windows Insider Program|Desktop|

  • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/AllowFlashClickToRun
  • **Data type.** Integer
  • **Allowed values:**
    • **0.** Adobe Flash content is automatically loaded and run by Microsoft Edge
    • **1 (default).** An employee must click the content, click a Click-to-Run button, or have the site appear on an auto-allow list before Microsoft Edge loads and runs Adobe Flash content.
| -|AllowInPrivate|Windows 10, Version 1511 or later|Both|
  • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/AllowInPrivate
  • **Data type.** Integer
  • **Allowed values:**
    • **0.** Employees can’t use InPrivate browsing.
    • **1 (default).** Employees can use InPrivate browsing.
| -|AllowMicrosoftCompatibilityList|Windows 10, Windows Insider Program|Both|
  • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/AllowMicrosoftCompatibilityList
  • **Data type.** Integer
  • **Allowed values:**
    • **0.** Additional search engines aren't allowed and the default can’t be changed in the Address bar.
    • **1 (default).** Additional search engines are allowed and the default can be changed in the Address bar.
| -|AllowPasswordManager|Windows 10 or later|Both|
  • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/AllowPasswordManager
  • **Data type.** Integer
  • **Allowed values:**
    • **0 (default).** Employees can't use Password Manager to save passwords locally.
    • **1.** Employees can use Password Manager to save passwords locally.
| -|AllowPopups|Windows 10 or later|Desktop|
  • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/AllowPopups
  • **Data type.** Integer
  • **Allowed values:**
    • **0 (default).** Turns off Pop-up Blocker, allowing pop-up windows.
    • **1.** Turns on Pop-up Blocker, stopping pop-up windows.
| -|AllowSearchEngineCustomization|Windows 10, Windows Insider Program|Both|
  • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/AllowSearchEngineCustomization
  • **Data type.** Integer
  • **Allowed values:**
    • **0.** Additional search engines are not allowed and the default can’t be changed in the Address bar.
    • **1 (default).** Additional search engines are allowed and the default can be changed in the Address bar.
| -|AllowSearchSuggestions
inAddressBar|Windows 10 or later|Both|
  • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/AllowSearchSuggestionsinAddressBar
  • **Data type.** Integer
  • **Allowed values:**
    • **0 (default).** Employees can’t see search suggestions in the Address bar of Microsoft Edge.
    • **1.** Employees can see search suggestions in the Address bar of Microsoft Edge.
| -|AllowSmartScreen|Windows 10 or later|Both|
  • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/AllowSmartScreen
  • **Data type.** Integer
  • **Allowed values:**
    • **0 (default).** Turns off Windows Defender SmartScreen.
    • **1.** Turns on Windows Defender SmartScreen, providing warning messages to your employees about potential phishing scams and malicious software.
| -|ClearBrowsingDataOnExit|Windows 10, Windows Insider Program|Both|
  • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/ClearBrowsingDataOnExit
  • **Data type.** Integer
  • **Allowed values:**
    • **0 (default).** Browsing data is not cleared on exit. The type of browsing data to clear can be configured by the employee in the Clear browsing data options under Settings.
    • **1.** Browsing data is cleared on exit.
| -|ConfigureAdditionalSearchEngines|Windows 10, Windows Insider Program|Both|
  • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/ConfigureAdditionalSearchEngines
  • **Data type.** Integer
  • **Allowed values:**
    • **0 (default).** Additional search engines are not allowed.
    • **1.** Additional search engines are allowed.
| -|DisableLockdownOfStartPages|Windows 10, Windows Insider Program|Desktop|
  • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/DisableLockdownOfStartPages
  • **Data type.** Integer
  • **Allowed values:**
    • **0 (default).** Enable lockdown of the Start pages according to the settings specified in the Browser/HomePages policy. Users cannot change the Start pages.
    • **1.** Disable lockdown of the Start pages and allow users to modify them.
| -|EnterpriseModeSiteList|Windows 10 or later|Desktop|
  • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/EnterpriseModeSiteList
  • **Data type.** String
  • **Allowed values:**
    • Not configured.
    • **1 (default).** Use the Enterprise Mode Site List, if configured.
    • **2.** Specify the location to the site list.

    **Note**
    If there’s an .xml file in the cache container, IE waits 65 seconds and then checks the local cache for a newer version of the file from the server, based on standard caching rules. If the server file has a different version number than the version in the cache container, the server file is used and stored in the cache container.

    If you’re already using a site list, enterprise mode continues to work during the 65 second wait; it just uses your existing site list instead of your new one.

| -|Favorites|Windows 10, Version 1511 or later|Both|
  • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/Favorites
  • **Data type.** String
  • **Allowed values:**
    • Configure the **Favorite** URLs for your employees.

      **Example:**
      ``
      ``

      **Note**
      URLs must be on separate lines and aren't shared between Microsoft Edge and Internet Explorer 11.

    | -|FirstRunURL|Windows 10, Version 1511 or later|Mobile|
    • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/FirstRunURL
    • **Data type.** String
    • **Allowed values:**
      • Configure the first run URL for your employees.

        **Example:**
        ``

    | -|HomePages|Windows 10, Version 1511 or later|Desktop|
    • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/HomePages
    • **Data type.** String
    • **Allowed values:**
      • Configure the Start page (previously known as Home page) URLs for your employees.

        **Example:**
        ``

    | -|PreventAccessToAbout
    FlagsInMicrosoftEdge|Windows 10, Version 1607 and later|Desktop|
    • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/PreventAccessToAboutFlagsInMicrosoftEdge
    • **Data type.** Integer
    • **Allowed values:**
      • **0 (default).** Employees can access the about:flags page in Microsoft Edge.
      • **1.** Employees can't access the about:flags page in Microsoft Edge.
    | -|PreventFirstRunPage|Windows 10, Windows Insider Program|Both|
    • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/PreventFirstRunPage
    • **Data type.** Integer
    • **Allowed values:**
      • **0 (default).** Employees see the First Run webpage.
      • **1.** Employees don't see the First Run webpage.
    | -|PreventLiveTileDataCollection|Windows 10, Windows Insider Program|Both|
    • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/PreventLiveTileDataCollection
    • **Data type.** Integer
    • **Allowed values:**
      • **0 (default).** Microsoft servers will be contacted if a site is pinned to Start from Microsoft Edge.
      • **1.** Microsoft servers will not be contacted if a site is pinned to Start from Microsoft Edge.
    | -|PreventSmartScreenPromptOverride|Windows 10, Version 1511 or later|Both|
    • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/PreventSmartscreenPromptOverride
    • **Data type.** Integer
    • **Allowed values:**
      • **0 (default).** Turns off Windows Defender SmartScreen.
      • **1.** Turns on Windows Defender SmartScreen.
    | -|PreventSmartScreenPromptOverrideForFiles|Windows 10, Version 1511 or later|Both|
    • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/PreventSmartScreenPromptOverrideForFiles
    • **Data type.** Integer
    • **Allowed values:**
      • **0 (default).** Lets employees ignore the Windows Defender SmartScreen warnings about unverified files and lets them continue the download process.
      • **1.** Stops employees from ignoring the Windows Defender SmartScreen warnings about unverified files.
    | -|PreventUsingLocalHost
    IPAddressForWebRTC|Windows 10, Version 1511 or later|Desktop|
    • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/PreventUsingLocalHostIPAddressForWebRTC
    • **Data type.** Integer
    • **Allowed values:**
      • **0 (default).** Shows an employee's LocalHost IP address while using the WebRTC protocol.
      • **1.** Doesn't show an employee's LocalHost IP address while using the WebRTC protocol.
    | -|SendIntranetTraffic
    toInternetExplorer|Windows 10 or later|Desktop|
    • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/SendIntranetTraffictoInternetExplorer
    • **Data type.** Integer
    • **Allowed values:**
      • **0 (default).** Automatically opens all websites, including intranet sites, using Microsoft Edge.
      • **1.** Automatically opens all intranet sites using Internet Explorer 11.
    | -|SetDefaultSearchEngine|Windows 10, Windows Insider Program|Both|
    • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/SetDefaultSearchEngine
    • **Data type.** Integer
    • **Allowed values:**
      • **0 (default).** The default search engine is set to the one specified in App settings.
      • **1.** Allows you to configure the default search engine for your employees.
    | -|ShowMessageWhen
    OpeningInteretExplorer
    Sites|Windows 10, Version 1607 and later|Desktop|
    • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/ShowMessageWhenOpeningSitesInInteretExplorer
    • **Data type.** Integer
    • **Allowed values:**
      • **0 (default).** Doesn’t show an additional page in Microsoft Edge, stating that a site has been opened using Internet Explorer 11.
      • **1.** Shows an additional page in Microsoft Edge, stating that a site has been opened using Internet Explorer 11.
    | -|SyncFavoritesBetweenIEAndMicrosoftEdge|Windows 10, Windows Insider Program|Desktop|
    • **URI full path.** ./Vendor/MSFT/Policy/Config/Browser/SyncFavoritesBetweenIEAndMicrosoftEdge
    • **Data type.** Integer
    • **Allowed values:**
      • **0 (default).** Synchronization is turned off.
      • **1.** Synchronization is turned on.
    | +### FirstRunURL +- **Supported versions:** Windows 10, Version 1511 or later + +- **Supported devices:** Mobile + +- **Details:** + + - **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/FirstRunURL + + - **Data type:** String + + - **Allowed values:** + + - Configure the first run URL for your employees. + + **Example:** + + + +### HomePages +- **Supported versions:** Windows 10, Version 1511 or later + +- **Supported devices:** Desktop + +- **Details:** + + - **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/HomePages + + - **Data type:** String + + - **Allowed values:** + + - Configure the Start page (previously known as Home page) URLs for your employees. + + **Example:** + + + +### PreventAccessToAboutFlagsInMicrosoftEdge +- **Supported versions:** Windows 10, Version 1607 and later + +- **Supported devices:** Desktop + +- **Details:** + + - **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/PreventAccessToAboutFlagsInMicrosoftEdge + + - **Data type:** Integer + + - **Allowed values:** + + - **0 (default).** Employees can access the about:flags page in Microsoft Edge. + + - **1.** Employees can't access the about:flags page in Microsoft Edge. + +### PreventFirstRunPage +- **Supported versions:** Windows 10, Windows Insider Program + +- **Supported devices:** Both + +- **Details:** + + - **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/PreventFirstRunPage + + - **Data type:** Integer + + - **Allowed values:** + + - **0 (default).** Employees see the First Run webpage. + + - **1.** Employees don't see the First Run webpage. + +### PreventLiveTileDataCollection +- **Supported versions:** Windows 10, Windows Insider Program + +- **Supported devices:** Both + +- **Details:** + + - **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/PreventLiveTileDataCollection + + - **Data type:** Integer + + - **Allowed values:** + + - **0 (default).** Microsoft servers will be contacted if a site is pinned to Start from Microsoft Edge. + + - **1.** Microsoft servers will not be contacted if a site is pinned to Start from Microsoft Edge. + +### PreventSmartScreenPromptOverride +- **Supported versions:** Windows 10, Version 1511 or later + +- **Supported devices:** Both + +- **Details:** + + - **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/PreventSmartscreenPromptOverride + + - **Data type:** Integer + + - **Allowed values:** + + - **0 (default).** Turns off Windows Defender SmartScreen. + + - **1.** Turns on Windows Defender SmartScreen. + +### PreventSmartScreenPromptOverrideForFiles +- **Supported versions:** Windows 10, Version 1511 or later + +- **Supported devices:** Both + +- **Details:** + + - **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/PreventSmartScreenPromptOverrideForFiles + + - **Data type:** Integer + + - **Allowed values:** + + - **0 (default).** Lets employees ignore the Windows Defender SmartScreen warnings about unverified files and lets them continue the download process. + + - **1.** Stops employees from ignoring the Windows Defender SmartScreen warnings about unverified files. + +### PreventUsingLocalHostIPAddressForWebRTC +- **Supported versions:** Windows 10, Version 1511 or later + +- **Supported devices:** Desktop + +- **Details:** + + - **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/PreventUsingLocalHostIPAddressForWebRTC + + - **Data type:** Integer + + - **Allowed values:** + + - **0 (default).** Shows an employee's LocalHost IP address while using the WebRTC protocol. + + - **1.** Doesn't show an employee's LocalHost IP address while using the WebRTC protocol. + +### SendIntranetTraffictoInternetExplorer +- **Supported versions:** Windows 10 or later + +- **Supported devices:** Desktop + +- **Details:** + + - **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/SendIntranetTraffictoInternetExplorer + + - **Data type:** Integer + + - **Allowed values:** + + - **0 (default).** Automatically opens all websites, including intranet sites, using Microsoft Edge. + + - **1.** Automatically opens all intranet sites using Internet Explorer 11. + +### SetDefaultSearchEngine +- **Supported versions:** Windows 10, Windows Insider Program + +- **Supported devices:** Both + +- **Details:** + + - **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/SetDefaultSearchEngine + + - **Data type:** Integer + + - **Allowed values:** + + - **0 (default).** The default search engine is set to the one specified in App settings. + + - **1.** Allows you to configure the default search engine for your employees. + +### ShowMessageWhenOpeningInteretExplorerSites +- **Supported versions:** Windows 10, Version 1607 and later + +- **Supported devices:** Desktop + +- **Details:** + + - **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/ShowMessageWhenOpeningSitesInInteretExplorer + + - **Data type:** Integer + + - **Allowed values:** + + - **0 (default).** Doesn’t show an additional page in Microsoft Edge, stating that a site has been opened using Internet Explorer 11. + + - **1.** Shows an additional page in Microsoft Edge, stating that a site has been opened using Internet Explorer 11. + +### SyncFavoritesBetweenIEAndMicrosoftEdge +- **Supported versions:** Windows 10, Windows Insider Program + +- **Supported devices:** Desktop + +- **Details:** + + - **URI full path:** ./Vendor/MSFT/Policy/Config/Browser/SyncFavoritesBetweenIEAndMicrosoftEdge + + - **Data type:** Integer + + - **Allowed values:** + + - **0 (default).** Synchronization is turned off. + + - **1.** Synchronization is turned on. ## Microsoft Edge and Windows 10-specific Group Policy settings These are additional Windows 10-specific Group Policy settings that work with Microsoft Edge. -|Group Policy setting|Description|Options| -|--------------------|--------------|---------| -|Computer Configuration\Administrative Templates\Windows Components\Search\Allow Cortana|Whether employees can use Cortana.|**Enabled or not configured:** Employees can use Cortana on their devices.

    **Disabled:** Stops employees from using Cortana on their devices.

    **Note** Employees can still perform searches even with Cortana turned off.| -|Computer Configuration\Administrative Templates\Windows Components\sync your settings\Do not sync|Whether employees can use the **Sync your Settings** options to sync their settings to and from their device.|**Enabled:** Turns off the **Sync your Settings** options and none of the **Sync your Setting** groups are synced on the device. You can use the **Allow users to turn syncing on** option to turn the feature off by default, but to let the employee change this setting.

    **Disabled or not configured (default):** Turns on the **Sync your Settings** area by default, letting employees pick what can sync on their device.| -|Computer Configuration\Administrative Templates\Windows Components\sync your settings\Do not sync browser settings|Whether a browser group can use the **Sync your Settings** options to sync their info to and from their device. This includes settings and info like **History** and Favorites.|**Enabled:** Turns off the **Sync your Settings** options so that browser groups are unable to sync their settings and info. You can use the **Allow users to turn browser syncing on** option to turn the feature off by default, but to let the employee change this setting.

    **Disabled or not configured (default):** Turns on the **Sync your Settings** area by default, letting browser groups pick what can sync on their device.| +### Computer Configuration\Administrative Templates\Windows Components\Search\Allow Cortana +- **Description:** This policy settings lets you decide whether employees can use Cortana. + + - If you enable or don't configure this setting, employees can use Cortana on their devices. + + - If you disable this setting, employees won't be able to use Cortana on their devices. + + >[!Note] + >Employees can still perform searches even with Cortana turned off. + +### Computer Configuration\Administrative Templates\Windows Components\sync your settings\Do not sync +- **Description:** This policy settings lets you decide whether employees can use the Sync your Settings options to sync their settings to and from their device. + + - If you enable this setting, the Sync your Settings options are turned off and none of the Sync your Setting groups are synced on the device. You can use the Allow users to turn syncing on option to turn the feature off by default, but to let the employee change this setting. + + - If you disable or don't configure this setting (default), the Sync your Settings options are turned on, letting employees pick what can sync on their device. + +### Computer Configuration\Administrative Templates\Windows Components\sync your settings\Do not sync browser settings +- **Description:** This policy settings lets you decide whether a browser group can use the Sync your Settings options to sync their info to and from their device. This includes settings and info like History and Favorites. + + - If you enable this setting, the Sync your Settings options are turned off so that browser groups are unable to sync their settings and info. You can use the Allow users to turn browser syncing on option to turn the feature off by default, but to let the employee change this setting. + + - If you disable or don't configure this setting (default), the Sync your Settings options are turned on, letting browser groups pick what can sync on their device. + ## Microsoft Edge and Windows 10-specific MDM policy settings These are additional Windows 10-specific MDM policy settings that work with Microsoft Edge. -|MDM Policy name|Supports|Details| -|----------------|--------------|-------------------| -|AllowCortana|Both|

    • **URI full path.** ./Vendor/MSFT/Policy/Config/Experience/AllowCortana
    • **Data type.** Integer
    • **Allowed values:**
      • **0.** Employees can’t use Cortana on their devices.
      • **1 (default).** Employees can use Cortana on their devices.
    | -|AllowSyncMySettings|Desktop|
    • **URI full path.** ./Vendor/MSFT/Policy/Config/Experience/AllowSyncMySettings
    • **Data type.** Integer
    • **Allowed values:**
      • **0.** Employees can’t sync settings between PCs.
      • **1 (default).** Employees can sync between PCs.
    | +### AllowCortana +- **Supported devices:** Both + +- **Details:** + + - **URI full path:** ./Vendor/MSFT/Policy/Config/Experience/AllowCortana + + - **Data type:** Integer + + - **Allowed values:** + + - **0.** Employees can’t use Cortana on their devices. + + - **1 (default).** Employees can use Cortana on their devices. + +### AllowSyncMySettings +- **Supported devices:** Desktop + +- **Details:** + + - **URI full path:** ./Vendor/MSFT/Policy/Config/Experience/AllowSyncMySettings + + - **Data type:** Integer + + - **Allowed values:** + + - **0.** Employees can’t sync settings between PCs. + + - **1 (default).** Employees can sync between PCs. ## Related topics * [Group Policy TechCenter](https://go.microsoft.com/fwlink/p/?LinkId=214514) From 8b312040cd7319eba8a963c0499a33a939b9da45 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Tue, 7 Mar 2017 08:45:39 -0800 Subject: [PATCH 080/108] Added content --- browsers/edge/change-history-for-microsoft-edge.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/browsers/edge/change-history-for-microsoft-edge.md b/browsers/edge/change-history-for-microsoft-edge.md index 9501635fa9..ce750be2f7 100644 --- a/browsers/edge/change-history-for-microsoft-edge.md +++ b/browsers/edge/change-history-for-microsoft-edge.md @@ -15,7 +15,7 @@ For a detailed feature list of what's in the current Microsoft Edge releases, th ## February 2017 |New or changed topic | Description | |----------------------|-------------| -|[Available Group Policy and Mobile Data Management (MDM) settings for Microsoft Edge](available-policies.md) |Added new Group Policy and MDM settings for the Windows Insider Program. | +|[Available Group Policy and Mobile Data Management (MDM) settings for Microsoft Edge](available-policies.md) |Added new Group Policy and MDM settings for the Windows Insider Program. Reformatted for easier readability outside of scrolling table. | ## November 2016 |New or changed topic | Description | From ea5f7b04997cfdbf5f2f531f2cd643a4ee8bd6e1 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Tue, 7 Mar 2017 08:59:08 -0800 Subject: [PATCH 081/108] Adding content --- browsers/edge/available-policies.md | 12 +++++++++--- 1 file changed, 9 insertions(+), 3 deletions(-) diff --git a/browsers/edge/available-policies.md b/browsers/edge/available-policies.md index 04f361671f..cdb17ac81f 100644 --- a/browsers/edge/available-policies.md +++ b/browsers/edge/available-policies.md @@ -963,7 +963,9 @@ All devices must be enrolled with Intune if you want to use the Windows Custom U ## Microsoft Edge and Windows 10-specific Group Policy settings These are additional Windows 10-specific Group Policy settings that work with Microsoft Edge. -### Computer Configuration\Administrative Templates\Windows Components\Search\Allow Cortana +### Allow Cortana +- **Location:** Computer Configuration\Administrative Templates\Windows Components\Search\Allow Cortana + - **Description:** This policy settings lets you decide whether employees can use Cortana. - If you enable or don't configure this setting, employees can use Cortana on their devices. @@ -973,14 +975,18 @@ These are additional Windows 10-specific Group Policy settings that work with M >[!Note] >Employees can still perform searches even with Cortana turned off. -### Computer Configuration\Administrative Templates\Windows Components\sync your settings\Do not sync +### Do not sync +- **Location:** Computer Configuration\Administrative Templates\Windows Components\sync your settings\Do not sync + - **Description:** This policy settings lets you decide whether employees can use the Sync your Settings options to sync their settings to and from their device. - If you enable this setting, the Sync your Settings options are turned off and none of the Sync your Setting groups are synced on the device. You can use the Allow users to turn syncing on option to turn the feature off by default, but to let the employee change this setting. - If you disable or don't configure this setting (default), the Sync your Settings options are turned on, letting employees pick what can sync on their device. -### Computer Configuration\Administrative Templates\Windows Components\sync your settings\Do not sync browser settings +### Do not sync browser settings +- **Location:** Computer Configuration\Administrative Templates\Windows Components\sync your settings\Do not sync browser settings + - **Description:** This policy settings lets you decide whether a browser group can use the Sync your Settings options to sync their info to and from their device. This includes settings and info like History and Favorites. - If you enable this setting, the Sync your Settings options are turned off so that browser groups are unable to sync their settings and info. You can use the Allow users to turn browser syncing on option to turn the feature off by default, but to let the employee change this setting. From c56a7907ce8bf61a740e51c1e9991cfb7f6a7399 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Tue, 7 Mar 2017 09:15:54 -0800 Subject: [PATCH 082/108] Updated formatting --- browsers/edge/available-policies.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/browsers/edge/available-policies.md b/browsers/edge/available-policies.md index cdb17ac81f..b22ded8a4f 100644 --- a/browsers/edge/available-policies.md +++ b/browsers/edge/available-policies.md @@ -127,7 +127,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you enable this setting, you can add up to 5 additional search engines. For each additional engine, you must also add a link to your OpenSearch XML file, including at least the short name and https: URL of the search engine, using this format: - `https://www.contoso.com/opensearch.xml` + https://www.contoso.com/opensearch.xml For more info about creating the OpenSearch XML file, see the [Understanding OpenSearch Standards](https://msdn.microsoft.com/en-us/library/dd163546.aspx) topic. @@ -220,7 +220,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you enable this setting, you can configure one or more Start pages. If this setting is enabled, you must also include URLs to the pages, separating multiple pages by using angle brackets in this format: - `` + - If you disable or don’t configure this setting (default), your default Start page is the webpage specified in App settings. @@ -355,7 +355,7 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A - If you enable this setting, you can choose a default search engine for your employees. To choose the default engine, you must add a link to your OpenSearch XML file, including at least the short name and https: URL of the search engine, using this format: - `https://fabrikam.com/opensearch.xml` + https://fabrikam.com/opensearch.xml - If you disable this setting, the policy-set default search engine is removed. If this is also the current in-use default, the engine changes to the Microsoft Edge specified engine for the market.

    If you don't configure this setting, the default search engine is set to the one specified in App settings. From a09567af939d0ca0fcf3900404572d2943724737 Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Tue, 7 Mar 2017 09:48:56 -0800 Subject: [PATCH 083/108] Deepika's feedback --- windows/deploy/provisioning-multivariant.md | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/windows/deploy/provisioning-multivariant.md b/windows/deploy/provisioning-multivariant.md index 6322c42d94..5756994088 100644 --- a/windows/deploy/provisioning-multivariant.md +++ b/windows/deploy/provisioning-multivariant.md @@ -55,13 +55,13 @@ The following table shows the conditions supported in Windows 10 provisioning fo | UICCSLOT | P0 | Supported | N/A | Digit string | Use to specify the UICC slot. Set the value one of the following:


    - 0 - Slot 0
    - 1 - Slot 1 | | ProcessorType | P1 | Supported | Supported | String | Use to target settings based on the processor type. | | ProcessorName | P1 | Supported | Supported | String | Use to target settings based on the processor name. | -| AoAc | P1 | Supported | Supported | Boolean | Set the value to 0 or 1. WHAT DOES 0 MEAN? WHAT DOES 1 MEAN? WHAT DOES THIS CONDITION EVEN MEAN ("AoAc"?| -| PowerPlatformRole | P1 | Supported | Supported | Enumeration | Indicates the preferred power management profile. Set the value based on the POWER_PLATFORM_ROLE enumeration. WHERE DO THEY FIND THAT ENUMERATION? | +| AoAc ("Always On, Always Connected") | P1 | Supported | Supported | Boolean | Set the value to **0** (false) or **1** (true). If this condition is TRUE, the system supports the S0 low power idle model. | +| PowerPlatformRole | P1 | Supported | Supported | Enumeration | Indicates the preferred power management profile. Set the value based on the [POWER_PLATFORM_ROLE enumeration](https://msdn.microsoft.com/library/windows/desktop/aa373174.aspx). | | Architecture | P1 | Supported | Supported | String | Matches the PROCESSOR_ARCHITECTURE environment variable. | -| Server | P1 | Supported | Supported | Boolean | Set the value to 0 or 1. WHAT DOES 0 MEAN? WHAT DOES 1 MEAN? WHAT DOES THIS CONDITION EVEN MEAN?| -| Region | P1 | Supported | Supported | Enumeration | Use to target settings based on country/region. NEED REFERENCE FOR REGION CODES TO USE| -| Lang | P1 | Supported | Supported | Enumeration | Use to target settings based on language code. IS THIS CORRECT REFERENCE FOR LANG CODES? [https://msdn.microsoft.com/en-us/library/cc233965.aspx](https://msdn.microsoft.com/en-us/library/cc233965.aspx) | -| ROMLANG | P1 | Supported | N/A | Digit string | Use to specify the PhoneROMLanguage that's set for DeviceTargeting. This condition is used primarily to detect variants for China. For example, you can use this condition and set the value to "0804". NEED REFERENCE FOR PhoneROMLanguage CODES | +| Server | P1 | Supported | Supported | Boolean | Set the value to **0** (false) or **1** (true) to identify a server. | +| Region | P1 | Supported | Supported | Enumeration | Use to target settings based on [country/region](https://msdn.microsoft.com/library/cdax410z.aspx). | +| Lang | P1 | Supported | Supported | Enumeration | Use to target settings based on [language code](https://msdn.microsoft.com/library/39cwe7zf.aspx). | +| ROMLANG | P1 | Supported | N/A | Digit string | Use to specify the [PhoneROMLanguage](https://www.microsoft.com/resources/msdn/goglobal/default.mspx) that's set for DeviceTargeting. This condition is used primarily to detect variants for China. | The matching types supported in Windows 10 are: @@ -80,7 +80,7 @@ A setting that matches a **TargetState** with a lower priority is applied before Settings that match more than one **TargetState** with equal priority are applied according to the order that each **TargetState** is defined in the provisioning package. -The **TargetState** priority is assigned based on the conditions priority (see the [Conditions table](#conditions) for priorities). The priority evaluation rules are as followed: +The **TargetState** priority is assigned based on the condition's priority (see the [Conditions table](#conditions) for priorities). The priority evaluation rules are as followed: 1. **TargetState** with P0 conditions is higher than **TargetState** without P0 conditions. @@ -109,7 +109,7 @@ Follow these steps to create a provisioning package with multivariant capabiliti 2. After you've [configured the settings](provisioning-create-package.md#configure-settings), save the project. -3. Open the project folder and copy the customizations.xml file (TO WHERE? DOES IT MATTER?). +3. Open the project folder and copy the customizations.xml file to any local location. 4. Use an XML or text editor to open the customizations.xml file. @@ -291,7 +291,7 @@ The following events trigger provisioning on Windows 10 devices: | System boot | Supported | Supported | | Operating system update | Supported | Planned | | Package installation during device first run experience | Supported | Supported | -| Detection of SIM presence or update | Supported | Not supported | +| Detection of SIM presence or update | Supported | Supported | | Package installation at runtime | Supported | Supported | | Roaming detected | Supported | Not supported | From 1aad4e4c92f1578e2821ff4ff331501d4da5b49e Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Tue, 7 Mar 2017 10:22:30 -0800 Subject: [PATCH 084/108] new rules --- windows/deploy/provisioning-multivariant.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deploy/provisioning-multivariant.md b/windows/deploy/provisioning-multivariant.md index 5756994088..0ca3464bcf 100644 --- a/windows/deploy/provisioning-multivariant.md +++ b/windows/deploy/provisioning-multivariant.md @@ -61,7 +61,7 @@ The following table shows the conditions supported in Windows 10 provisioning fo | Server | P1 | Supported | Supported | Boolean | Set the value to **0** (false) or **1** (true) to identify a server. | | Region | P1 | Supported | Supported | Enumeration | Use to target settings based on [country/region](https://msdn.microsoft.com/library/cdax410z.aspx). | | Lang | P1 | Supported | Supported | Enumeration | Use to target settings based on [language code](https://msdn.microsoft.com/library/39cwe7zf.aspx). | -| ROMLANG | P1 | Supported | N/A | Digit string | Use to specify the [PhoneROMLanguage](https://www.microsoft.com/resources/msdn/goglobal/default.mspx) that's set for DeviceTargeting. This condition is used primarily to detect variants for China. | + The matching types supported in Windows 10 are: From d2e66dd234330cf3f24e4cf32936327c6efc004f Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Tue, 7 Mar 2017 10:35:48 -0800 Subject: [PATCH 085/108] rewrite rules --- windows/deploy/provisioning-multivariant.md | 16 ++++------------ 1 file changed, 4 insertions(+), 12 deletions(-) diff --git a/windows/deploy/provisioning-multivariant.md b/windows/deploy/provisioning-multivariant.md index 0ca3464bcf..61cba70e8f 100644 --- a/windows/deploy/provisioning-multivariant.md +++ b/windows/deploy/provisioning-multivariant.md @@ -82,22 +82,14 @@ Settings that match more than one **TargetState** with equal priority are applie The **TargetState** priority is assigned based on the condition's priority (see the [Conditions table](#conditions) for priorities). The priority evaluation rules are as followed: -1. **TargetState** with P0 conditions is higher than **TargetState** without P0 conditions. +1. A **TargetState** with P0 conditions is higher than **TargetState** without P0 conditions. -2. **TargetState** with P1 conditions is higher than **TargetState** without P0 and P1 conditions. +2. A **TargetState** with P1 conditions is higher than **TargetState** without P0 and P1 conditions. +3. When you have more than one **TargetState** with the same priority conditions, the **TargetState** with the highest number of that priority conditions takes precedence. -3. If N₁>N₂>0, the **TargetState** priority with N₁ P0 conditions is higher than the **TargetState** with N₂ P1 conditions. - - -4. For **TargetState** without P0 conditions, if N₁>N₂>0 **TargetState** with N₁ P1 conditions is higher than the **TargetState** with N₂ P1 conditions. - - -5. For **TargetState** without P0 and P1 conditions, if N₁>N₂>0 **TargetState** priority with N₁ P2 conditions is higher than the **TargetState** with N₂ P2 conditions. - - -6. For rules 3, 4, and 5, if N₁=N₂, **TargetState** priorities are considered equal. +4. When you have more than one **TargetState** with the same number of the same priority conditions, **TargetState** priorities are considered equal. ## Create a provisioning package with multivariant settings From 05d7b1f897f02f488cf54ae1d0dd244013aa19f2 Mon Sep 17 00:00:00 2001 From: Justinha Date: Tue, 7 Mar 2017 11:15:15 -0800 Subject: [PATCH 086/108] added info about password protected data drive in BitLocker section --- ...ps-compliant-algorithms-for-encryption-hashing-and-signing.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/keep-secure/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md b/windows/keep-secure/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md index a1a1738dad..2d68063ec7 100644 --- a/windows/keep-secure/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md +++ b/windows/keep-secure/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md @@ -38,6 +38,7 @@ For encrypting Remote Desktop Services network communication, this policy settin For BitLocker, this policy setting needs to be enabled before any encryption key is generated. Recovery passwords created on Windows Server 2012 R2 and Windows 8.1 and later when this policy is enabled are incompatible with BitLocker on operating systems prior to Windows Server 2012 R2 and Windows 8.1; BitLocker will prevent the creation or use of recovery passwords on these systems, so recovery keys should be used instead. +Additionally, if a data drive is password-protected, it can be accessed by a FIPS-compliant computer after the password is supplied, but the drive will be read-only. ### Possible values From b02be4bf6c9942e225c6f841e732a83e94926a4f Mon Sep 17 00:00:00 2001 From: Justinha Date: Tue, 7 Mar 2017 12:40:11 -0800 Subject: [PATCH 087/108] added new image and updated interactive logon lock screen setting --- .../privacy-setting-in-sign-in-options.png | Bin 0 -> 5030 bytes ...-information-when-the-session-is-locked.md | 73 ++++++++++++++---- 2 files changed, 58 insertions(+), 15 deletions(-) create mode 100644 windows/deploy/images/privacy-setting-in-sign-in-options.png diff --git a/windows/deploy/images/privacy-setting-in-sign-in-options.png b/windows/deploy/images/privacy-setting-in-sign-in-options.png new file mode 100644 index 0000000000000000000000000000000000000000..cf2e499e04717fd743d4a5d475b64eb2ea7d6f5c GIT binary patch literal 5030 zcmbW5cTiJLzs3V9s6Y@Kp;ti=13?Wv5L&1~6h)*24P7D<2u-RWMM41S0#bq)y0jol zQzS6~K?q1yDM7kO{Yembcs2t|xP*&jOGPrhxvyA*8 z_x-CACXHSC&QdOkHnGdf@k@^%NAegrOQqZ$kCckCi8^guQ@u73l1z9mlq5SYZ2HfU zZemjFHqEoni|j zJUC`S#C{pyX`TOh%I#9#?W~@q_28%nihtX00OL&1I-evu?fY zXOG!++;n%Aa&%QyRk^L6!>x11m)@y4Xu=DN4D=@L9s{fTu(xs0rc*38EglT&tl;d; zv(+-ECz+vJl2&sIdh#YaA`0_*krP2zoh5>;31oAW4@m@*z+^4e=K=Zoscl2m!c9OR zuvGZl<*KkEkFUMG$ks;T$~dddurlwH&++2cdAwZ=hf;Om8qZPNOzpD7>v?!PyBE7$ zVL!~|Ivx1fO{Qq`0z}$*OEbpM<@`!2^l;co%rp&W2rs~5mdxQTfD~memtfXO$S0Uy z@-iN!8ABf|9csbHje^x$0g&(AH7-&nM)v=WX7Nx|3G4)p*8HmqjyF{j`#n{I@+?)3X{Jvd^P)Bi*Mo>Om2PTU zzl^q!&ins(+`TN6cPXXxD=|N#y6N0T>j_@_n1R+aj#3_4FK^2cX(?-<%G{O0xFgf1 zV)+UAm}h!&`e{Ybr@2K+Rsi{I-$`tm$6Ukk33<=T9oNFt$T()(H z91!SEg%^wOj1Xb?5E4NJpsH`8z)3>nduADyoK8W!Erou}x}&EvmJ-KHZ{%l|F}%B- z!ZNus$wVZ7T4CF!TZw!oVswmPjN?7;kc6YVCL7e;WZi&Yh!=PJGhL=c z)t>b=m(6%D)!%6Rj&1-i`nZL9EcnOMAR9};O7oGTo;TP0@g@`Q_JO8)1v|C4SwFL0 zF`?}Zg;u6y8e^MCB)(yuq^YEmSWV(Qz#)kRTsW@ijqDHo9}K4ec( zO8%xEi`-6HIMnLPi)O`$b!Kz^?coRnui#8oDUJMFaf%?|LyrnS-2IXya%23B@5{bW zTl?ggqdLc>b?nZL?{K#~rNKKpLWWBVA&y*632ai8YyvaMfaHu7G2SoxRJFlS#WyRh*UsT z)PKI7N`;1`($qbcKiZ;-`97;4U0o&NUMIAWb`Bs_*^^@Ovd|9l zi1A0aEy(s2Fl@{?m>&1~;-KyMBv0{N?aUO6R~?_M)m{QiA#wc*@M#v6ui;h<*$-uo zlT{v*v_ZI*SL}a)+<#W%;gbtYI%3$|++Hhg;*%G5hZTXa)N-VjUw&6%<|*ZLB-nTR zm{u(0$TEm>`V|^K4%@ZrOuT|FccxtRC!S4iSqUxDq4m6g?!1NvqnggWVBQj`5e zd61_3X@S18volCu`vBG?RRbM{6AB<0yauJWw|A17EHM<|fBdAii};u*(f@`tD%0U* zg_au*Ms@(#`}Wkb4S zaGDm08eG4wT%gl{g?pv(j|_~sRo!x40pmPp5$YDZ7|iErn-Q1lbd%$luKAW^SC5(_d@ood#?3BfFUPvp`a;&*TwLr< z?4EGdcQR-`sI?#wU^77m4Huh~X8lE$)_F zaj17Ukk?CjBzYr+D$+V&WH)%Bnch8fs9Z+O4n{iY2c}F+3_B<<-f(mQGG1W$NQ%Z$ z!ncIvrUq%j`q(Xn;Ae&l2Gxrunf_f-eE~+hl4Dsocag0e3cX4ES3-fQG zW(SgbMo>e_qg=wtr6Er{)w|tB^D)<9Vb7txcH!w~s1_R)tn~iCE#2{pt*Mn4`VzML z&$vc2pS}zkyQ#wx+oC{3OU-B9G;ix+m^6FW>U!l-jolcrnd4>Le#<0R${p{^$gom! zKjDtW2X^N8_nleT4E8R>a@wDZl2=i-wB*&rbqr#HOV&3>DopHU6eq|K>Y*2qpbN zhYAJ6IL6J3#zXS6g;jz?wQYpYtu!QA5?8=x;DIbK9x;eN5PWIr37|!F<-b^qU>=9L~aTa+G)2z7YHz$8IY3&bJoX%?~P! zzEW^F7SE}-a57`eZFFGR->%|x&`}dv$M8#(Y)b@n_|77t1JL&A`Zs_6m_ypQqvr=1 zFO=5%$7ORPi?Ao7A_FW#WZTOo*uy<0rWIEvsshaj2D=KOdo+pa5DOqk|DS8>r&K8* zzl7-zDjLonywC2FMA#i5qM7UvgvNVPI66US3wco$_GJ3M|9=E`y*fTuP%=gYTNEdh z=idfr$5kJ|ABazDFQJ&dyH5h06xvO8Z%ivvs}9!@4>DeR77W_w*ZAr5KB4T(QHoX$ zHY#N{8<8^{#O_Cd9k+P*C8*jwNx?Z?aQ7++J7x!UEIT05-uA3elN<}A@}cG4Xyw_; z1C==?5)m3MyHWi(UC7F`y604Uti`QSIi1!iw^;- z+K}iWYUF7VL&vt)^+4HYm#%=(3-%38CCRc6Nx8#)Ei;)pau;g8dMjVmCBwyWb$r&q z&vNvHH~nc_<@_I?YzVCMt*F*r)Zg>q-W^PZZ8aYoqipw!yY!1+29Cv5UPu;WLM^Xa z%}D3^wHHssd#8zol1DFUoO^gfx7XU+D*Vftr7Rc9c1L*rSiUuVTJP1z;s^1;-UwGt zq4HDm`K#kY}G;0{vtWaxP<|HQZ1Jv7nbUy8Vp>{Vd*w;GCqwaCI*V9y? z-I~)YXw=r@AD83=Rt7~qQd9fF(@~FDzS@$DPs#=nW6;rwBNXtGRM%GOO7}+EE^vcj zpCD()bRUm|dGbN4Rz0Dg!AmyRbXMlphO_Ch@%|Ye7i3T&3x3;i*Ph4EWF@SC(v%FK zrfTR+>ZKpE%}+Ku+bG9%f`6I?3;0XQRO=L4K0jn#XUmpQ9cBjoN&$lc(0|*VSBNOCN>9B1eLbN5D)NCVBw z%RF~p#=1$e=2L8GfMww&LV~0+K>|Ay&Xr%=o`NX~bCP(`a&oc4|3knziT5Q=osU!hQKDq7kSw-4??W^tpQm}GnWKo>TO3#|GTLzq;morx{dXK{A?qXQ>xNF; zb|~<0_Lb4hr7Z7+S!?4g$We^48ot@AK`$4W=a?ET)3?bjR_Nd1aORaAH;N%fsX_ul z6cGBE@4xH*e?Z{BgM?m=88&00*@WT?2ngUBA0Ib24P5;u))Kto_Q2QI+TIlp`BBOy z1}yZq%4@$lB(5X;&+oNK_E$LCr|66P60k~dsRv=K%`z~AtzcgpxbU5wor{w_?o2k_ zSX~QyyZ>;r{rS*#`@z0_mXmJY9qlkyL*2^!JgGNdVwwLC1OiNTh(p2azHXW$*{l(K zzvlBtZ|Bd>#$sg8IZ1e-WQ~Ha95yX#CRul%w7I{(yNc`eK5^bmwTY`kK*eGt#`+*EX6$(o)2ATn&vaa{*p6?uPfn>Fh3~b zU@s7-68>xQ-6Y#l;C?#)nk$GP9Es1Ko~>B=!L}oB;vPAHGd>xNpHp}QZ;_piyn`S0 z|4UG9XF$}W$anA^_H_mBCw3}UjoZt6?E80#(1ZO}aE=6!bw~1v+AA@(%;zH2kw`Ay zwf()_#cwgavQ8~Q5OocW=2YtKV7#E?n`2hf*wKXrPe(QwdMrOHI2*zu_O;bvuxjw! z2T81BLj6(kr7-rr5l)ECZh_7IFOZB{{0BnhIN5H2ov!=6x$;|r-X|z18~6mrzFPyB M8X*m<^_?I63m2-lg#Z8m literal 0 HcmV?d00001 diff --git a/windows/keep-secure/interactive-logon-display-user-information-when-the-session-is-locked.md b/windows/keep-secure/interactive-logon-display-user-information-when-the-session-is-locked.md index f82d103fb6..aad3155b35 100644 --- a/windows/keep-secure/interactive-logon-display-user-information-when-the-session-is-locked.md +++ b/windows/keep-secure/interactive-logon-display-user-information-when-the-session-is-locked.md @@ -17,31 +17,80 @@ author: brianlic-msft Describes the best practices, location, values, and security considerations for the **Interactive logon: Display user information when the session is locked** security policy setting. ## Reference -When a session is locked in a Windows operating system (meaning the user at the computer pressed CTRL+ALT+DEL and the Secure Desktop is displayed), user information is displayed. By default, this information is in the form of **<user name> is logged on**. The displayed user name is the user’s full name as set on the Properties page for that user. These settings do not apply to the logon tiles, which are displayed on the desktop after using the **Switch User** feature. The information that is displayed can be changed to meet your security requirements using the following possible values. +This setting controls whether details such as email address or domain\username appear with the username on the sign-in screen. +For clients that run Windows 10 version 1511 and 1507 (RTM), this setting works similarly to previous versions of Windows. +Due to a new **Privacy** setting in Windows 10 version 1607, this setting affects those clients differently. -### Possible values +### Changes in Windows 10 version 1607 + +Beginning with Windows 10 version 1607, new functionality was added to Windows 10 to hide username details such as email address by default, with the ability to change the default to show the details. +This functionality is controlled by a new **Privacy** setting in **Settings** > **Accounts** > **Sign-in options**. +The Privacy setting is off by default, which hides the details. + +![Privacy setting](images\privacy-setting-in-sign-in-options.png) + +The **Interactive logon: Display user information when the session is locked** Group Policy setting controls the same functionality. + +This setting has these possible values: - **User display name, domain and user names** - If this is a local logon, the user’s full name is displayed on the Secure Desktop. If it is a domain logon, the user’s domain and user’s account name is displayed. + For a local logon, the user's full name is displayed. + If the user signed in using a Microsoft Account, the user's email address is displayed. + For a domain logon, the domain\username is displayed. + This has the same effect as turning on the **Privacy** setting. - **User display name only** - The name of the user who locked the session is displayed on the Secure Desktop as the user’s full name. + The full name of the user who locked the session is displayed. + This has the same effect as turning off the **Privacy** setting. - **Do not display user information** - No names are displayed on the Secure Desktop, but user’s full names will be displayed on the **Switch user** desktop. + No names are displayed. + Beginning with Windows 10 version 1607, this option is not supported. + If this option is chosen, the full name of the user who locked the session is displayed instead. + This change makes this setting consistent with the functionality of the new **Privacy** setting. + To have no user information displayed, enable the Group Policy setting **Interactive logon: Don't display last signed-in**. - Blank. - Default setting. This translates to “Not defined,” but it will display the user’s full name in the same manner as the **User display name** option. When an option is set, you cannot reset this policy to blank, or not defined. + Default setting. + This translates to “Not defined,” but it will display the user’s full name in the same manner as the option **User display name only**. + When an option is set, you cannot reset this policy to blank, or not defined. + +### Hotfix for Windows 10 version 1607 + +Clients that run Windows 10 version 1607 will not show details on the sign-in screen even if the **User display name, domain and user names** option is chosen because the **Privacy** setting is off. +If the **Privacy** setting is turned on, details will show. + +The **Privacy** setting cannot be changed for clients in bulk. +Instead, apply [KB 4013429](https://support.microsoft.com/help/4000825/windows-10-and-windows-server-2016-update-history) to clients that run Windows 10 version 1607 so they behave similarly to previous versions of Windows. + +There are related Group Policy settings: + +- **Computer Configuration\Policies\Administrative Templates\System\Logon\Block user from showing account details on sign-in** prevents users from showing account details on the sign-in screen. +- **Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Don’t display last signed-in** prevents the username of the last user to sign in from being shown. +- **Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Don’t display user name at sign in** prevents the username from being shown at Windows sign-in and immediately after credentials are entered and before the desktop appears. + +### Interaction with related Group Policy settings + +For all versions of Windows 10, only the user display name is shown by default. + +If **Block user from showing account details on sign-in** is enabled, then only the user display name is shown regardless of any other Group Policy settings. +Users will not be able to show details. + +If **Block user from showing account details on sign-in** is not enabled, then you can set **Interactive logon: Display user information when the session is locked** to **User display name, domain and user names** to show additional details such as domain\username. +In this case, clients that run Windows 10 version 1607 need [KB 4013429](https://support.microsoft.com/help/4000825/windows-10-and-windows-server-2016-update-history) applied. +Users will not be able to hide additional details. + +If **Block user from showing account details on sign-in** is not enabled and **Don’t display last signed-in** is enabled, the username will not be shown. ### Best practices -Your implementation of this policy depends on your security requirements for displayed logon information. If you have devices that store sensitive data, with monitors displayed in unsecured locations, or if you have computers with sensitive data that are remotely accessed, revealing logged on user’s full names or domain account names might contradict your overall security policy. +Your implementation of this policy depends on your security requirements for displayed logon information. If you run computers that store sensitive data, with monitors displayed in unsecured locations, or if you have computers with sensitive data that are remotely accessed, revealing logged on user’s full names or domain account names might contradict your overall security policy. -Depending on your security policy, you might also want to enable the [Interactive logon: Do not display last user name](interactive-logon-do-not-display-last-user-name.md) policy, which will prevent the Windows operating system from displaying the logon name and logon tile of the last user to logon. +Depending on your security policy, you might also want to enable the [Interactive logon: Do not display last user name](interactive-logon-do-not-display-last-user-name.md) policy. ### Location @@ -86,13 +135,7 @@ When a computer displays the Secure Desktop in an unsecured area, certain user i Enabling this policy setting allows the operating system to hide certain user information from being displayed on the Secure Desktop (after the device has been booted or when the session has been locked by using CTRL+ALT+DEL). However, user information is displayed if the **Switch user** feature is used so that the logon tiles are displayed for each logged on user. -You might also want to enable the [Interactive logon: Do not display last user name](interactive-logon-do-not-display-last-user-name.md) policy, which will prevent the Windows operating system from displaying the logon name and logon tile of the last user to logon. - -### Potential impact - -If you do not enable this policy, the effect will be the same as enabling the policy and selecting the **User display name, domain and user names** option. - -If the policy is enabled and set to **Do not display user information**, an observer cannot see who is logged onto the Secure Desktop, but the logon tile is still present if the [Interactive logon: Do not display last user name](interactive-logon-do-not-display-last-user-name.md) policy is not enabled. Depending on how the logon tiles are configured, they could provide visual clues as to who is logged on. In addition, if the Interactive logon: Do not display last user name policy is not enabled, then the **Switch user** feature will show user information. +You might also want to enable the [Interactive logon: Do not display last signed-in](interactive-logon-do-not-display-last-user-name.md) policy, which will prevent the Windows operating system from displaying the logon name and logon tile of the last user to logon. ## Related topics From 7919477f8de8d3ffb8dccc256993b1dd5baf1c0d Mon Sep 17 00:00:00 2001 From: Justinha Date: Tue, 7 Mar 2017 12:50:51 -0800 Subject: [PATCH 088/108] changed image path --- .../images/privacy-setting-in-sign-in-options.png | Bin 1 file changed, 0 insertions(+), 0 deletions(-) rename windows/{deploy => keep-secure}/images/privacy-setting-in-sign-in-options.png (100%) diff --git a/windows/deploy/images/privacy-setting-in-sign-in-options.png b/windows/keep-secure/images/privacy-setting-in-sign-in-options.png similarity index 100% rename from windows/deploy/images/privacy-setting-in-sign-in-options.png rename to windows/keep-secure/images/privacy-setting-in-sign-in-options.png From 2ad7db8fe71ffae83e44c1a914ae920940b6eb5a Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Tue, 7 Mar 2017 13:29:54 -0800 Subject: [PATCH 089/108] Aaron feedback --- windows/deploy/provisioning-multivariant.md | 14 ++++++++------ 1 file changed, 8 insertions(+), 6 deletions(-) diff --git a/windows/deploy/provisioning-multivariant.md b/windows/deploy/provisioning-multivariant.md index 61cba70e8f..d33f1206b5 100644 --- a/windows/deploy/provisioning-multivariant.md +++ b/windows/deploy/provisioning-multivariant.md @@ -59,8 +59,8 @@ The following table shows the conditions supported in Windows 10 provisioning fo | PowerPlatformRole | P1 | Supported | Supported | Enumeration | Indicates the preferred power management profile. Set the value based on the [POWER_PLATFORM_ROLE enumeration](https://msdn.microsoft.com/library/windows/desktop/aa373174.aspx). | | Architecture | P1 | Supported | Supported | String | Matches the PROCESSOR_ARCHITECTURE environment variable. | | Server | P1 | Supported | Supported | Boolean | Set the value to **0** (false) or **1** (true) to identify a server. | -| Region | P1 | Supported | Supported | Enumeration | Use to target settings based on [country/region](https://msdn.microsoft.com/library/cdax410z.aspx). | -| Lang | P1 | Supported | Supported | Enumeration | Use to target settings based on [language code](https://msdn.microsoft.com/library/39cwe7zf.aspx). | +| Region | P1 | Supported | Supported | Enumeration | Use to target settings based on country/region, using the 2-digit alpha ISO code per [ISO 3166-1 alpha-2](https://en.wikipedia.org/wiki/ISO_3166-1_alpha-2). | +| Lang | P1 | Supported | Supported | Enumeration | Use to target settings based on language code, using the 2-digit [ISO 639 alpha-2 code](https://en.wikipedia.org/wiki/ISO_639). | The matching types supported in Windows 10 are: @@ -82,14 +82,16 @@ Settings that match more than one **TargetState** with equal priority are applie The **TargetState** priority is assigned based on the condition's priority (see the [Conditions table](#conditions) for priorities). The priority evaluation rules are as followed: -1. A **TargetState** with P0 conditions is higher than **TargetState** without P0 conditions. +1. A **TargetState** with P0 conditions is higher than a **TargetState** without P0 conditions. +2. A **TargetState** with both P0 and P1 conditions is higher than a **TargetState** with only P0 conditions. -2. A **TargetState** with P1 conditions is higher than **TargetState** without P0 and P1 conditions. +2. A **TargetState** with a greater number of matched P0 conditions is higher than **TargetState** with fewer matched P0 conditions, regardless of the number of P1 conditions matched. -3. When you have more than one **TargetState** with the same priority conditions, the **TargetState** with the highest number of that priority conditions takes precedence. +2. If the number of P0 conditions matched are equivalent, then the **TargetState** with the most matched P1 conditions has higher priority. + +3. If both P0 and P1 conditions are equally matched, then the **TargetState** with the greatest total number of matched conditions has highest priority. -4. When you have more than one **TargetState** with the same number of the same priority conditions, **TargetState** priorities are considered equal. ## Create a provisioning package with multivariant settings From 08017040df0b83a6e10617a1dedf242d4be6dfcf Mon Sep 17 00:00:00 2001 From: John Tobin Date: Tue, 7 Mar 2017 14:43:49 -0800 Subject: [PATCH 090/108] corrected spelling --- .../keep-secure/change-history-for-keep-windows-10-secure.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/keep-secure/change-history-for-keep-windows-10-secure.md b/windows/keep-secure/change-history-for-keep-windows-10-secure.md index 050d3dc69f..858577af50 100644 --- a/windows/keep-secure/change-history-for-keep-windows-10-secure.md +++ b/windows/keep-secure/change-history-for-keep-windows-10-secure.md @@ -16,7 +16,7 @@ This topic lists new and updated topics in the [Keep Windows 10 secure](index.md ## March 2017 |New or changed topic |Description | |---------------------|------------| -|[Protect derived domain credentials with CredentialGuear](credential-guard.md) |Updated to include additional security qualifications starting with Window 10, version 1703.| +|[Protect derived domain credentials with Credential Guard](credential-guard.md) |Updated to include additional security qualifications starting with Window 10, version 1703.| |[Requirements and deployment planning guidelines for Device Guard](requirements-and-deployment-planning-guidelines-for-device-guard.md) |Updated to include additional security qualifications starting with Window 10, version 1703.| From 6f99b630ad372f6a85e3354f643df7316957746d Mon Sep 17 00:00:00 2001 From: John Tobin Date: Tue, 7 Mar 2017 16:29:33 -0800 Subject: [PATCH 091/108] policy name change --- .../interactive-logon-do-not-display-last-user-name.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/keep-secure/interactive-logon-do-not-display-last-user-name.md b/windows/keep-secure/interactive-logon-do-not-display-last-user-name.md index 5af92d1bcf..d712d65bdd 100644 --- a/windows/keep-secure/interactive-logon-do-not-display-last-user-name.md +++ b/windows/keep-secure/interactive-logon-do-not-display-last-user-name.md @@ -1,5 +1,5 @@ --- -title: Interactive logon Do not display last user name (Windows 10) +title: Interactive logon Don't display last signed-in (Windows 10) description: Describes the best practices, location, values, and security considerations for the Interactive logon Do not display last user name security policy setting. ms.assetid: 98b24b03-95fe-4edc-8e97-cbdaa8e314fd ms.prod: w10 @@ -9,12 +9,12 @@ ms.pagetype: security author: brianlic-msft --- -# Interactive logon: Do not display last user name +# Interactive logon: Don't display last signed-in **Applies to** - Windows 10 -Describes the best practices, location, values, and security considerations for the **Interactive logon: Do not display last user name** security policy setting. +Describes the best practices, location, values, and security considerations for the **Interactive logon: Don't display last signed-in** security policy setting. Before Windows 10 version 1703, this policy setting was named **Interactive logon:Do not display last user name.** ## Reference From 00cdda9bb8f765ce96058465b84c734f11998770 Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Wed, 8 Mar 2017 07:18:58 -0800 Subject: [PATCH 092/108] fix links loc bug --- .../manage-windows-updates-for-surface-hub.md | 26 +++++++++---------- 1 file changed, 13 insertions(+), 13 deletions(-) diff --git a/devices/surface-hub/manage-windows-updates-for-surface-hub.md b/devices/surface-hub/manage-windows-updates-for-surface-hub.md index d8661c166c..659e2a6ae5 100644 --- a/devices/surface-hub/manage-windows-updates-for-surface-hub.md +++ b/devices/surface-hub/manage-windows-updates-for-surface-hub.md @@ -17,7 +17,7 @@ New releases of the Surface Hub operating system are published through Windows U - **Windows Update for Business** - New in Windows 10, Windows Update for Business is a set of features designed to provide enterprises additional control over how and when Windows Update installs releases, while reducing device management costs. Using this method, Surface Hubs are directly connected to Microsoft’s Windows Update service. - **Windows Server Update Services (WSUS)** - Set of services that enable IT administrators to obtain the updates that Windows Update determines are applicable to the devices in their enterprise, perform additional testing and evaluation on the updates, and select the updates they want to install. Using this method, Surface Hubs will receive updates from WSUS rather than Windows Update. -You can also configure Surface Hub to receive updates from both Windows Update for Business and WSUS. See [Integrate Windows Update for Business with Windows Server Update Services](https://technet.microsoft.com/en-us/itpro/windows/manage/waas-integrate-wufb#integrate-windows-update-for-business-with-windows-server-update-services) for details. +You can also configure Surface Hub to receive updates from both Windows Update for Business and WSUS. See [Integrate Windows Update for Business with Windows Server Update Services](https://technet.microsoft.com/itpro/windows/manage/waas-integrate-wufb#integrate-windows-update-for-business-with-windows-server-update-services) for details. | Capabilities | Windows Update for Business | Windows Server Update Services (WSUS) | | ------------ | --------------------------- | ------------------------------------- | @@ -27,7 +27,7 @@ You can also configure Surface Hub to receive updates from both Windows Update f | Define maintenance windows for installing updates. | Yes | Yes | > [!TIP] -> Use peer-to-peer content sharing to reduce bandwidth issues during updates. See [Optimize update delivery for Windows 10 updates](https://technet.microsoft.com/en-us/itpro/windows/manage/waas-optimize-windows-10-updates) for details. +> Use peer-to-peer content sharing to reduce bandwidth issues during updates. See [Optimize update delivery for Windows 10 updates](https://technet.microsoft.com/itpro/windows/manage/waas-optimize-windows-10-updates) for details. > [!NOTE] > Surface Hub does not currently support rolling back updates. @@ -45,11 +45,11 @@ In order to improve release quality and simplify deployments, all new releases t The Surface Hub operating system is available on **Current Branch (CB)** and **Current Branch for Business (CBB)**. Like other editions of Windows 10, the servicing lifetime of CB or CBB is finite. You must install new feature updates on machines running these branches in order to continue receiving quality updates. -For more information on Windows as a Service, see [Overview of Windows as a service](https://technet.microsoft.com/en-us/itpro/windows/manage/waas-overview). +For more information on Windows as a Service, see [Overview of Windows as a service](https://technet.microsoft.com/itpro/windows/manage/waas-overview). ## Use Windows Update for Business -Surface Hubs, like all Windows 10 devices, include **Windows Update for Business (WUfB)** to enable you to control how your devices are being updated. Windows Update for Business helps reduce device management costs, provide controls over update deployment, offer quicker access to security updates, as well as provide access to the latest innovations from Microsoft on an ongoing basis. For more information, see [Manage updates using Windows Update for Business](https://technet.microsoft.com/en-us/itpro/windows/manage/waas-manage-updates-wufb). +Surface Hubs, like all Windows 10 devices, include **Windows Update for Business (WUfB)** to enable you to control how your devices are being updated. Windows Update for Business helps reduce device management costs, provide controls over update deployment, offer quicker access to security updates, as well as provide access to the latest innovations from Microsoft on an ongoing basis. For more information, see [Manage updates using Windows Update for Business](https://technet.microsoft.com/itpro/windows/manage/waas-manage-updates-wufb). **To set up Windows Update for Business:** 1. [Group Surface Hub into deployment rings](#group-surface-hub-into-deployment-rings) @@ -58,11 +58,11 @@ Surface Hubs, like all Windows 10 devices, include **Windows Update for Business > [!NOTE] -> You can use Microsoft Intune, System Center Configuration Manager, or a supported third-party MDM provider to set up WUfB. [Walkthrough: use Microsoft Intune to configure Windows Update for Business.](https://technet.microsoft.com/en-us/itpro/windows/manage/waas-wufb-intune) +> You can use Microsoft Intune, System Center Configuration Manager, or a supported third-party MDM provider to set up WUfB. [Walkthrough: use Microsoft Intune to configure Windows Update for Business.](https://technet.microsoft.com/itpro/windows/manage/waas-wufb-intune) ### Group Surface Hub into deployment rings -Use deployment rings to control when updates roll out to your Surface Hubs, giving you time to validate them. For example, you can update a small pool of devices first to verify quality before a broader roll-out to your organization. Depending on who manages Surface Hub in your organization, consider incorporating Surface Hub into the deployment rings that you've built for your other Windows 10 devices. For more information about deployment rings, see [Build deployment rings for Windows 10 updates](https://technet.microsoft.com/en-us/itpro/windows/manage/waas-deployment-rings-windows-10-updates). +Use deployment rings to control when updates roll out to your Surface Hubs, giving you time to validate them. For example, you can update a small pool of devices first to verify quality before a broader roll-out to your organization. Depending on who manages Surface Hub in your organization, consider incorporating Surface Hub into the deployment rings that you've built for your other Windows 10 devices. For more information about deployment rings, see [Build deployment rings for Windows 10 updates](https://technet.microsoft.com/itpro/windows/manage/waas-deployment-rings-windows-10-updates). This table gives examples of deployment rings. @@ -75,22 +75,22 @@ This table gives examples of deployment rings. ### Configure Surface Hub to use Current Branch or Current Branch for Business -By default, Surface Hubs are configured to receive updates from Current Branch (CB). CB receives feature updates as soon as they are released by Microsoft. Current Branch for Business (CBB), on the other hand, receives feature updates at least four months after they have been initially offered to CB devices, and includes all of the quality updates that have been released in the interim. For more information on the differences between CB and CBB, see [Servicing branches](https://technet.microsoft.com/en-us/itpro/windows/manage/waas-overview#servicing-branches). +By default, Surface Hubs are configured to receive updates from Current Branch (CB). CB receives feature updates as soon as they are released by Microsoft. Current Branch for Business (CBB), on the other hand, receives feature updates at least four months after they have been initially offered to CB devices, and includes all of the quality updates that have been released in the interim. For more information on the differences between CB and CBB, see [Servicing branches](https://technet.microsoft.com/itpro/windows/manage/waas-overview#servicing-branches). **To manually configure Surface Hub to use CB or CBB:** 1. Open **Settings** > **Update & Security** > **Windows Update**, and then select **Advanced Options**. 2. Select **Defer feature updates**. -To configure Surface Hub to use CB or CBB remotely using MDM, set an appropriate [Update/BranchReadinessLevel](https://msdn.microsoft.com/en-us/library/windows/hardware/dn904962.aspx#Update_BranchReadinessLevel) policy. +To configure Surface Hub to use CB or CBB remotely using MDM, set an appropriate [Update/BranchReadinessLevel](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Update_BranchReadinessLevel) policy. ### Configure when Surface Hub receives updates Once you've determined deployment rings for your Surface Hubs, configure update deferral policies for each ring: -- To defer feature updates, set an appropriate [Update/DeferFeatureUpdatesPeriodInDays](https://msdn.microsoft.com/en-us/library/windows/hardware/dn904962.aspx#Update_DeferFeatureUpdatesPeriodInDays) policy for each ring. -- To defer quality updates, set an appropriate [Update/DeferQualityUpdatesPeriodInDays](https://msdn.microsoft.com/en-us/library/windows/hardware/dn904962.aspx#Update_DeferQualityUpdatesPeriodInDays) policy for each ring. +- To defer feature updates, set an appropriate [Update/DeferFeatureUpdatesPeriodInDays](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Update_DeferFeatureUpdatesPeriodInDays) policy for each ring. +- To defer quality updates, set an appropriate [Update/DeferQualityUpdatesPeriodInDays](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Update_DeferQualityUpdatesPeriodInDays) policy for each ring. > [!NOTE] -> If you encounter issues during the update rollout, you can pause updates using [Update/PauseFeatureUpdates](https://msdn.microsoft.com/en-us/library/windows/hardware/dn904962.aspx#Update_PauseFeatureUpdates) and [Update/PauseQualityUpdates](https://msdn.microsoft.com/en-us/library/windows/hardware/dn904962.aspx#Update_PauseQualityUpdates). +> If you encounter issues during the update rollout, you can pause updates using [Update/PauseFeatureUpdates](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Update_PauseFeatureUpdates) and [Update/PauseQualityUpdates](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Update_PauseQualityUpdates). ## Use Windows Server Update Services @@ -103,7 +103,7 @@ You can connect Surface Hub to your Windows Server Update Services (WSUS) server 3. Navigate to **Update & security** > **Windows Update** > **Advanced options** > **Configure Windows Server Update Services (WSUS) server**. 4. Click **Use WSUS Server to download updates** and type the URL of your WSUS server. -To connect Surface Hub to a WSUS server using MDM, set an appropriate [Update/UpdateServiceUrl](https://msdn.microsoft.com/en-us/library/windows/hardware/dn904962.aspx#Update_UpdateServiceUrl) policy. +To connect Surface Hub to a WSUS server using MDM, set an appropriate [Update/UpdateServiceUrl](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx#Update_UpdateServiceUrl) policy. **If you use a proxy server or other method to block URLs** @@ -135,7 +135,7 @@ A default maintenance window is set for all new Surface Hubs: 2. Navigate to **Update & security** > **Windows Update** > **Advanced options**. 3. Under **Maintenance hours**, select **Change**. -To change the maintenance window using MDM, set the **MOMAgent** node in the [SurfaceHub configuration service provider](https://msdn.microsoft.com/en-us/library/windows/hardware/mt608323.aspx). See [Manage settings with an MDM provider](manage-settings-with-mdm-for-surface-hub.md) for more details. +To change the maintenance window using MDM, set the **MOMAgent** node in the [SurfaceHub configuration service provider](https://msdn.microsoft.com/library/windows/hardware/mt608323.aspx). See [Manage settings with an MDM provider](manage-settings-with-mdm-for-surface-hub.md) for more details. ## Related topics From 5ea5fcbdd8fedcd9bad9cb2d24220949663b1119 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Wed, 8 Mar 2017 08:18:34 -0800 Subject: [PATCH 093/108] changing name from Upgrade Analytics to Upgrade Readiness --- ...configure-windows-telemetry-in-your-organization.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/windows/manage/configure-windows-telemetry-in-your-organization.md b/windows/manage/configure-windows-telemetry-in-your-organization.md index a7f9bbef7e..0a872f7c96 100644 --- a/windows/manage/configure-windows-telemetry-in-your-organization.md +++ b/windows/manage/configure-windows-telemetry-in-your-organization.md @@ -98,17 +98,17 @@ Windows telemetry also helps Microsoft better understand how customers use (or d ### Insights into your own organization -Sharing information with Microsoft helps make Windows and other products better, but it can also help make your internal processes and user experiences better, as well. Microsoft is in the process of developing a set of analytics customized for your internal use. The first of these, called [Windows 10 Upgrade Analytics](../deploy/manage-windows-upgrades-with-upgrade-analytics.md). +Sharing information with Microsoft helps make Windows and other products better, but it can also help make your internal processes and user experiences better, as well. Microsoft is in the process of developing a set of analytics customized for your internal use. The first of these, called [Upgrade Readiness](../deploy/manage-windows-upgrades-with-upgrade-readiness.md). -#### Windows 10 Upgrade Analytics +#### Upgrade Readiness Upgrading to new operating system versions has traditionally been a challenging, complex, and slow process for many enterprises. Discovering applications and drivers and then testing them for potential compatibility issues have been among the biggest pain points. -To better help customers through this difficult process, Microsoft developed Upgrade Analytics to give enterprises the tools to plan and manage the upgrade process end to end and allowing them to adopt new Windows releases more quickly and on an ongoing basis. +To better help customers through this difficult process, Microsoft developed Upgrade Readiness to give enterprises the tools to plan and manage the upgrade process end to end and allowing them to adopt new Windows releases more quickly and on an ongoing basis. With Windows telemetry enabled, Microsoft collects computer, application, and driver compatibility-related information for analysis. We then identify compatibility issues that can block your upgrade and suggest fixes when they are known to Microsoft. -Use Upgrade Analytics to get: +Use Upgrade Readiness to get: - A visual workflow that guides you from pilot to production - Detailed computer, driver, and application inventory @@ -118,7 +118,7 @@ Use Upgrade Analytics to get: - Application usage information, allowing targeted validation; workflow to track validation progress and decisions - Data export to commonly used software deployment tools -The Upgrade Analytics workflow steps you through the discovery and rationalization process until you have a list of computers that are ready to be upgraded. +The Upgrade Readiness workflow steps you through the discovery and rationalization process until you have a list of computers that are ready to be upgraded. ## How is telemetry data handled by Microsoft? From 96038940a23a16cb5475146b39988e561e7a6a00 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Wed, 8 Mar 2017 08:57:21 -0800 Subject: [PATCH 094/108] typo --- .../manage/configure-windows-telemetry-in-your-organization.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/manage/configure-windows-telemetry-in-your-organization.md b/windows/manage/configure-windows-telemetry-in-your-organization.md index 0a872f7c96..0b4b7ec69f 100644 --- a/windows/manage/configure-windows-telemetry-in-your-organization.md +++ b/windows/manage/configure-windows-telemetry-in-your-organization.md @@ -179,7 +179,7 @@ The levels are cumulative and are illustrated in the following diagram. Also, th ### Security level -The Security level gathers only the telemetry info that is required to keep Windows devices, Windows Server, and guests protected with the latest security updates. This level is only available on Windows Server 2016, Windows 10 Enterprise, Windows 10 Education, Windows 10 Mobile Enterprise, and Windos IoT Core editions. +The Security level gathers only the telemetry info that is required to keep Windows devices, Windows Server, and guests protected with the latest security updates. This level is only available on Windows Server 2016, Windows 10 Enterprise, Windows 10 Education, Windows 10 Mobile Enterprise, and Windows IoT Core editions. > [!NOTE] > If your organization relies on Windows Update for updates, you shouldn’t use the **Security** level. Because no Windows Update information is gathered at this level, important information about update failures is not sent. Microsoft uses this information to fix the causes of those failures and improve the quality of our updates. From 2fe1bdbd8d40a7ed75a862e25b132113e88eefc8 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Wed, 8 Mar 2017 10:31:05 -0800 Subject: [PATCH 095/108] removed link to update history --- ...gon-display-user-information-when-the-session-is-locked.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/keep-secure/interactive-logon-display-user-information-when-the-session-is-locked.md b/windows/keep-secure/interactive-logon-display-user-information-when-the-session-is-locked.md index aad3155b35..535cee4aee 100644 --- a/windows/keep-secure/interactive-logon-display-user-information-when-the-session-is-locked.md +++ b/windows/keep-secure/interactive-logon-display-user-information-when-the-session-is-locked.md @@ -65,7 +65,7 @@ Clients that run Windows 10 version 1607 will not show details on the sign-in sc If the **Privacy** setting is turned on, details will show. The **Privacy** setting cannot be changed for clients in bulk. -Instead, apply [KB 4013429](https://support.microsoft.com/help/4000825/windows-10-and-windows-server-2016-update-history) to clients that run Windows 10 version 1607 so they behave similarly to previous versions of Windows. +Instead, apply KB 4013429 to clients that run Windows 10 version 1607 so they behave similarly to previous versions of Windows. There are related Group Policy settings: @@ -81,7 +81,7 @@ If **Block user from showing account details on sign-in** is enabled, then only Users will not be able to show details. If **Block user from showing account details on sign-in** is not enabled, then you can set **Interactive logon: Display user information when the session is locked** to **User display name, domain and user names** to show additional details such as domain\username. -In this case, clients that run Windows 10 version 1607 need [KB 4013429](https://support.microsoft.com/help/4000825/windows-10-and-windows-server-2016-update-history) applied. +In this case, clients that run Windows 10 version 1607 need KB 4013429 applied. Users will not be able to hide additional details. If **Block user from showing account details on sign-in** is not enabled and **Don’t display last signed-in** is enabled, the username will not be shown. From 9aa14dc2b6a4cd5385a62df265a84a4d81508c6e Mon Sep 17 00:00:00 2001 From: Celeste de Guzman Date: Wed, 8 Mar 2017 16:24:52 -0800 Subject: [PATCH 096/108] Update index.md Added localizationpriority in metadata so that this gets picked up by Loc team for next loc handoff. This will fix the broken experience for international customers when we did the redirect --- education/windows/index.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/education/windows/index.md b/education/windows/index.md index f8db1c0562..2be638bb44 100644 --- a/education/windows/index.md +++ b/education/windows/index.md @@ -1,3 +1,4 @@ + --- title: Windows 10 for Education (Windows 10) description: Learn how to use Windows 10 in schools. @@ -6,6 +7,7 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: edu +localizationpriority: high author: CelesteDG --- From d0e314b667ec5add7ee804af698250271a672b13 Mon Sep 17 00:00:00 2001 From: Celeste de Guzman Date: Wed, 8 Mar 2017 16:26:58 -0800 Subject: [PATCH 097/108] Update index.md Fixed the extra characters that always get added by GitHub when I edit through the Web UI --- education/windows/index.md | 6 +----- 1 file changed, 1 insertion(+), 5 deletions(-) diff --git a/education/windows/index.md b/education/windows/index.md index 2be638bb44..554d36336b 100644 --- a/education/windows/index.md +++ b/education/windows/index.md @@ -65,12 +65,8 @@ author: CelesteDG

    [Upgrade Windows 10 Pro to Pro Education from Windows Store for Business](windows-10-pro-to-pro-edu-upgrade.md)
    If you have an education tenant and use Windows 10 Pro in your schools now, find out how you can opt-in to a free upgrade to Windows 10 Pro Education.

    -<<<<<<< HEAD -
    -

    -======= +

    ->>>>>>> e04a8c5905ed4bcb1df7b6b60d48146df9095a12
    From 4e46d112f5e9a24f566096b9aad4a8eb0164efaa Mon Sep 17 00:00:00 2001 From: Celeste de Guzman Date: Wed, 8 Mar 2017 16:27:55 -0800 Subject: [PATCH 098/108] Update index.md --- education/windows/index.md | 1 - 1 file changed, 1 deletion(-) diff --git a/education/windows/index.md b/education/windows/index.md index 554d36336b..fadd9b2b74 100644 --- a/education/windows/index.md +++ b/education/windows/index.md @@ -1,4 +1,3 @@ - --- title: Windows 10 for Education (Windows 10) description: Learn how to use Windows 10 in schools. From 2fe1369def71c1f3379c0aaed98fffa725f519c5 Mon Sep 17 00:00:00 2001 From: Celeste de Guzman Date: Wed, 8 Mar 2017 16:28:59 -0800 Subject: [PATCH 099/108] Update index.md --- education/windows/index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/education/windows/index.md b/education/windows/index.md index fadd9b2b74..8697339d5d 100644 --- a/education/windows/index.md +++ b/education/windows/index.md @@ -58,7 +58,7 @@ author: CelesteDG

    Try it out: Windows 10 deployment (for education)
    Learn how to upgrade devices running the Windows 7 operating system to Windows 10 Anniversary Update, and how to manage devices, apps, and users in Windows 10 Anniversary Update.

    For the best experience, use this guide in tandem with the TechNet Virtual Lab: IT Pro Try-It-Out.

    -
    +
### ![Upgrade to Windows 10 for education](images/windows.png) Upgrade From 176a956d6df635d0bf9e319b99e1a3159b744785 Mon Sep 17 00:00:00 2001 From: Celeste de Guzman Date: Wed, 8 Mar 2017 16:31:02 -0800 Subject: [PATCH 100/108] Update index.md --- education/windows/index.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/education/windows/index.md b/education/windows/index.md index 8697339d5d..1fa7bad868 100644 --- a/education/windows/index.md +++ b/education/windows/index.md @@ -24,7 +24,7 @@ author: CelesteDG

[Windows 10 editions for education customers](windows-editions-for-education-customers.md)
Windows 10, version 1607 introduces two editions designed for the unique needs of K-12 institutions: Windows 10 Pro Education and Windows 10 Education. These editions provide education-specific default settings for the evolving landscape in K-12 education IT environments.

[Compare each Windows edition](https://www.microsoft.com/en-us/WindowsForBusiness/Compare)
Find out more about the features and functionality we support in each edition of Windows.

[Get Windows 10 Education or Windows 10 Pro Education](https://www.microsoft.com/en-us/education/buy-license/overview-of-how-to-buy/default.aspx?tabshow=schools)
When you've made your decision, find out how to buy Windows for your school.

-
+/

How-to videos

+
### ![Upgrade to Windows 10 for education](images/windows.png) Upgrade @@ -67,7 +67,7 @@ author: CelesteDG

- + ## Windows 8.1 Follow these links to find step-by-step guidance on how to deploy Windows 8.1 in an academic environment. From d695b6b45b9af0fadc259b626c204455edd3593f Mon Sep 17 00:00:00 2001 From: Celeste de Guzman Date: Wed, 8 Mar 2017 16:36:03 -0800 Subject: [PATCH 101/108] Update index.md --- education/windows/index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/education/windows/index.md b/education/windows/index.md index 1fa7bad868..3caf701e82 100644 --- a/education/windows/index.md +++ b/education/windows/index.md @@ -24,7 +24,7 @@ author: CelesteDG

[Windows 10 editions for education customers](windows-editions-for-education-customers.md)
Windows 10, version 1607 introduces two editions designed for the unique needs of K-12 institutions: Windows 10 Pro Education and Windows 10 Education. These editions provide education-specific default settings for the evolving landscape in K-12 education IT environments.

[Compare each Windows edition](https://www.microsoft.com/en-us/WindowsForBusiness/Compare)
Find out more about the features and functionality we support in each edition of Windows.

[Get Windows 10 Education or Windows 10 Pro Education](https://www.microsoft.com/en-us/education/buy-license/overview-of-how-to-buy/default.aspx?tabshow=schools)
When you've made your decision, find out how to buy Windows for your school.

-/
+

How-to videos

From 76dd710db2d80be2d04049674529a296a01d991d Mon Sep 17 00:00:00 2001 From: Celeste de Guzman Date: Wed, 8 Mar 2017 16:43:34 -0800 Subject: [PATCH 103/108] Update index.md --- education/windows/index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/education/windows/index.md b/education/windows/index.md index af628fd1e2..bf4146606d 100644 --- a/education/windows/index.md +++ b/education/windows/index.md @@ -59,7 +59,7 @@ author: CelesteDG
- ### ![Upgrade to Windows 10 for education](images/windows.png) Upgrade +### ![Upgrade to Windows 10 for education](images/windows.png) Upgrade

[Upgrade Windows 10 Pro to Pro Education from Windows Store for Business](windows-10-pro-to-pro-edu-upgrade.md)
If you have an education tenant and use Windows 10 Pro in your schools now, find out how you can opt-in to a free upgrade to Windows 10 Pro Education.

From 625c4ba42359a1701f5feef4ba800ff7c369b1a9 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Thu, 9 Mar 2017 14:31:30 -0800 Subject: [PATCH 104/108] waas-optimize-udpates fixed typo --- windows/manage/waas-optimize-windows-10-updates.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/manage/waas-optimize-windows-10-updates.md b/windows/manage/waas-optimize-windows-10-updates.md index 773814c884..e8a17a2b8b 100644 --- a/windows/manage/waas-optimize-windows-10-updates.md +++ b/windows/manage/waas-optimize-windows-10-updates.md @@ -61,7 +61,7 @@ For OS updates that support Express, there are two versions of the file payload 1. **Full-file version** - essentially replacing the local versions of the update binaries. 2. **Express version** - containing the deltas needed to patch the existing binaries on the device. -Both the full-file version and the Express version are referenced in the udpate's metadata, which has been downloaded to the client as part of the scan phase. +Both the full-file version and the Express version are referenced in the update's metadata, which has been downloaded to the client as part of the scan phase. **Express download works as follows:** From 31a7c8b11291a6dbc10887c1c07946ad4848f90d Mon Sep 17 00:00:00 2001 From: John Tobin Date: Thu, 9 Mar 2017 14:43:14 -0800 Subject: [PATCH 105/108] minor edits --- ...ive-logon-do-not-display-last-user-name.md | 2 +- ...logon-don't-display-username-at-sign-in.md | 87 +++++++++++++++++++ 2 files changed, 88 insertions(+), 1 deletion(-) create mode 100644 windows/keep-secure/interactive-logon-don't-display-username-at-sign-in.md diff --git a/windows/keep-secure/interactive-logon-do-not-display-last-user-name.md b/windows/keep-secure/interactive-logon-do-not-display-last-user-name.md index d712d65bdd..9d9b695978 100644 --- a/windows/keep-secure/interactive-logon-do-not-display-last-user-name.md +++ b/windows/keep-secure/interactive-logon-do-not-display-last-user-name.md @@ -20,7 +20,7 @@ Describes the best practices, location, values, and security considerations for This security policy setting determines whether the name of the last user to log on to the device is displayed on the Secure Desktop. -If this policy is enabled, the full name of the last user to successfully log on is not displayed on the Secure Desktop, nor is the user’s logon tile displayed. Additionally, if the **Switch user** feature is used, the full name and logon tile are not displayed. The logon screen requests a qualified domain account name (or local user name) and password. +If this policy is enabled, the full name of the last user to successfully log on is not displayed on the Secure Desktop, nor is the user’s logon tile displayed. Additionally, if the **Switch user** feature is used, the full name and logon tile are not displayed. The logon screen r equests a qualified domain account name (or local user name) and password. If this policy is disabled, the full name of the last user to log on is displayed, and the user’s logon tile is displayed. This behavior is the same when the **Switch user** feature is used. diff --git a/windows/keep-secure/interactive-logon-don't-display-username-at-sign-in.md b/windows/keep-secure/interactive-logon-don't-display-username-at-sign-in.md new file mode 100644 index 0000000000..f2f996cdf9 --- /dev/null +++ b/windows/keep-secure/interactive-logon-don't-display-username-at-sign-in.md @@ -0,0 +1,87 @@ +--- +title: Interactive logon Don't display last signed-in (Windows 10) +description: Describes the best practices, location, values, and security considerations for the Interactive logon Do not display last user name security policy setting. +ms.assetid: 98b24b03-95fe-4edc-8e97-cbdaa8e314fd +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +author: brianlic-msft +--- + +# Interactive logon: Don't display username at sign-in + +**Applies to** +- Windows 10 + +Describes the best practices, location, values, and security considerations for the **Interactive logon: Don't display username at sign-in** security policy setting. + +## Reference + +This security policy setting determines whether the username is displayed during sign-in. This policy setting is introduced in Windows 10 version 1703. The setting only affects the **Other user**tile. + +If the policy is enabled and a user signs in as **Other user**, the full name of the user is not displayed during sign-in. In the same context, if users type their email address and password at the sign-in screen and press **Enter**, the displayed “Other user” text remains unchanged, and is no longer replaced by the user’s first and last name, as in previous versions of Windows 10. Additionally, if users enter their domain username and password and click **Submit**, their full name is not shown until the Start screen displays. + +If the policy is disabled and a user signs in as **Other user**, the “Other user” text is replaced by the user’s first and last name during sign-in. + + +### Possible values + +- Enabled +- Disabled +- Not defined + +### Best practices + +Your implementation of this policy depends on your security requirements for displayed logon information. If you have devices that store sensitive data, with monitors displayed in unsecured locations, or if you have devices with sensitive data that are remotely accessed, revealing logged on user’s full names or domain account names might contradict your overall security policy. + +### Location + +Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options + +### Default values + +| Server type or Group Policy object (GPO) | Default value| +| - | - | +| Default domain policy| Not defined| +| Default domain controller policy| Not defined| +| Stand-alone server default settings | Not defined| +| Domain controller effective default settings | Not definedd| +| Member server effective default settings | Not defined| +| Effective GPO default settings on client computers | Not defined| +  +## Policy management + +This section describes features and tools that are available to help you manage this policy.This policy setting can be configured by using the Group Policy Management Console (GPMC) to be distributed through Group Policy Objects (GPOs). If this policy is not contained in a distributed GPO, this policy can be configured on the local computer by using the Local Security Policy snap-in. + +### Restart requirement + +None. Changes to this policy become effective without a device restart when they are saved locally or distributed through Group Policy. + +### Policy conflict considerations + +None. + +### Group Policy + +This policy setting can be configured by using the Group Policy Management Console (GPMC) to be distributed through Group Policy Objects (GPOs). If this policy is not contained in a distributed GPO, this policy can be configured on the local computer by using the Local Security Policy snap-in. + +## Security considerations + +This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. + +### Vulnerability + +An attacker with access to the console (for example, someone with physical access or someone who can connect to the device through Remote Desktop Session Host) could view the name of the last user who logged on. The attacker could then try to guess the password, use a dictionary, or use a brute-force attack to try to log on. + +### Countermeasure + +Enable the **Interactive logon: Don't display username at sign-in** setting. + +### Potential impact + +Users must always type their user names and passwords when they log on locally or to the domain. The logon tiles of all logged on users are not displayed. + +## Related topics + +- [Security Options](security-options.md) From 64172dcde32fcde2840ad54740479568c5aef9a8 Mon Sep 17 00:00:00 2001 From: John Tobin Date: Thu, 9 Mar 2017 15:00:10 -0800 Subject: [PATCH 106/108] removed file. Updated TOC --- windows/keep-secure/TOC.md | 2 +- ...logon-don't-display-username-at-sign-in.md | 87 ------------------- 2 files changed, 1 insertion(+), 88 deletions(-) delete mode 100644 windows/keep-secure/interactive-logon-don't-display-username-at-sign-in.md diff --git a/windows/keep-secure/TOC.md b/windows/keep-secure/TOC.md index 92fb8a44a9..82fea36b85 100644 --- a/windows/keep-secure/TOC.md +++ b/windows/keep-secure/TOC.md @@ -572,7 +572,7 @@ ###### [Domain member: Maximum machine account password age](domain-member-maximum-machine-account-password-age.md) ###### [Domain member: Require strong (Windows 2000 or later) session key](domain-member-require-strong-windows-2000-or-later-session-key.md) ###### [Interactive logon: Display user information when the session is locked](interactive-logon-display-user-information-when-the-session-is-locked.md) -###### [Interactive logon: Do not display last user name](interactive-logon-do-not-display-last-user-name.md) +###### [Interactive logon: Don\'t display last signed-in](interactive-logon-do-not-display-last-user-name.md) ###### [Interactive logon: Do not require CTRL+ALT+DEL](interactive-logon-do-not-require-ctrl-alt-del.md) ###### [Interactive logon: Machine account lockout threshold](interactive-logon-machine-account-lockout-threshold.md) ###### [Interactive logon: Machine inactivity limit](interactive-logon-machine-inactivity-limit.md) diff --git a/windows/keep-secure/interactive-logon-don't-display-username-at-sign-in.md b/windows/keep-secure/interactive-logon-don't-display-username-at-sign-in.md deleted file mode 100644 index f2f996cdf9..0000000000 --- a/windows/keep-secure/interactive-logon-don't-display-username-at-sign-in.md +++ /dev/null @@ -1,87 +0,0 @@ ---- -title: Interactive logon Don't display last signed-in (Windows 10) -description: Describes the best practices, location, values, and security considerations for the Interactive logon Do not display last user name security policy setting. -ms.assetid: 98b24b03-95fe-4edc-8e97-cbdaa8e314fd -ms.prod: w10 -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -author: brianlic-msft ---- - -# Interactive logon: Don't display username at sign-in - -**Applies to** -- Windows 10 - -Describes the best practices, location, values, and security considerations for the **Interactive logon: Don't display username at sign-in** security policy setting. - -## Reference - -This security policy setting determines whether the username is displayed during sign-in. This policy setting is introduced in Windows 10 version 1703. The setting only affects the **Other user**tile. - -If the policy is enabled and a user signs in as **Other user**, the full name of the user is not displayed during sign-in. In the same context, if users type their email address and password at the sign-in screen and press **Enter**, the displayed “Other user” text remains unchanged, and is no longer replaced by the user’s first and last name, as in previous versions of Windows 10. Additionally, if users enter their domain username and password and click **Submit**, their full name is not shown until the Start screen displays. - -If the policy is disabled and a user signs in as **Other user**, the “Other user” text is replaced by the user’s first and last name during sign-in. - - -### Possible values - -- Enabled -- Disabled -- Not defined - -### Best practices - -Your implementation of this policy depends on your security requirements for displayed logon information. If you have devices that store sensitive data, with monitors displayed in unsecured locations, or if you have devices with sensitive data that are remotely accessed, revealing logged on user’s full names or domain account names might contradict your overall security policy. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -| Server type or Group Policy object (GPO) | Default value| -| - | - | -| Default domain policy| Not defined| -| Default domain controller policy| Not defined| -| Stand-alone server default settings | Not defined| -| Domain controller effective default settings | Not definedd| -| Member server effective default settings | Not defined| -| Effective GPO default settings on client computers | Not defined| -  -## Policy management - -This section describes features and tools that are available to help you manage this policy.This policy setting can be configured by using the Group Policy Management Console (GPMC) to be distributed through Group Policy Objects (GPOs). If this policy is not contained in a distributed GPO, this policy can be configured on the local computer by using the Local Security Policy snap-in. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they are saved locally or distributed through Group Policy. - -### Policy conflict considerations - -None. - -### Group Policy - -This policy setting can be configured by using the Group Policy Management Console (GPMC) to be distributed through Group Policy Objects (GPOs). If this policy is not contained in a distributed GPO, this policy can be configured on the local computer by using the Local Security Policy snap-in. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -An attacker with access to the console (for example, someone with physical access or someone who can connect to the device through Remote Desktop Session Host) could view the name of the last user who logged on. The attacker could then try to guess the password, use a dictionary, or use a brute-force attack to try to log on. - -### Countermeasure - -Enable the **Interactive logon: Don't display username at sign-in** setting. - -### Potential impact - -Users must always type their user names and passwords when they log on locally or to the domain. The logon tiles of all logged on users are not displayed. - -## Related topics - -- [Security Options](security-options.md) From fed964f2d139ce05cc3a6fe0fcbbd15dadb637d3 Mon Sep 17 00:00:00 2001 From: John Tobin Date: Thu, 9 Mar 2017 15:08:46 -0800 Subject: [PATCH 107/108] Fixed typo --- .../interactive-logon-do-not-display-last-user-name.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/keep-secure/interactive-logon-do-not-display-last-user-name.md b/windows/keep-secure/interactive-logon-do-not-display-last-user-name.md index 9d9b695978..d712d65bdd 100644 --- a/windows/keep-secure/interactive-logon-do-not-display-last-user-name.md +++ b/windows/keep-secure/interactive-logon-do-not-display-last-user-name.md @@ -20,7 +20,7 @@ Describes the best practices, location, values, and security considerations for This security policy setting determines whether the name of the last user to log on to the device is displayed on the Secure Desktop. -If this policy is enabled, the full name of the last user to successfully log on is not displayed on the Secure Desktop, nor is the user’s logon tile displayed. Additionally, if the **Switch user** feature is used, the full name and logon tile are not displayed. The logon screen r equests a qualified domain account name (or local user name) and password. +If this policy is enabled, the full name of the last user to successfully log on is not displayed on the Secure Desktop, nor is the user’s logon tile displayed. Additionally, if the **Switch user** feature is used, the full name and logon tile are not displayed. The logon screen requests a qualified domain account name (or local user name) and password. If this policy is disabled, the full name of the last user to log on is displayed, and the user’s logon tile is displayed. This behavior is the same when the **Switch user** feature is used. From a034f3833b18c8a1dcda387193c4389a79ff2ae1 Mon Sep 17 00:00:00 2001 From: Justinha Date: Fri, 10 Mar 2017 11:38:26 -0800 Subject: [PATCH 108/108] added feedback --- ...play-user-information-when-the-session-is-locked.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/windows/keep-secure/interactive-logon-display-user-information-when-the-session-is-locked.md b/windows/keep-secure/interactive-logon-display-user-information-when-the-session-is-locked.md index 535cee4aee..ddb0839afa 100644 --- a/windows/keep-secure/interactive-logon-display-user-information-when-the-session-is-locked.md +++ b/windows/keep-secure/interactive-logon-display-user-information-when-the-session-is-locked.md @@ -17,9 +17,9 @@ author: brianlic-msft Describes the best practices, location, values, and security considerations for the **Interactive logon: Display user information when the session is locked** security policy setting. ## Reference -This setting controls whether details such as email address or domain\username appear with the username on the sign-in screen. +This security setting controls whether details such as email address or domain\username appear with the username on the sign-in screen. For clients that run Windows 10 version 1511 and 1507 (RTM), this setting works similarly to previous versions of Windows. -Due to a new **Privacy** setting in Windows 10 version 1607, this setting affects those clients differently. +However, because of a new **Privacy** setting introduced in Windows 10 version 1607, this security setting affects those clients differently. ### Changes in Windows 10 version 1607 @@ -36,7 +36,7 @@ This setting has these possible values: - **User display name, domain and user names** For a local logon, the user's full name is displayed. - If the user signed in using a Microsoft Account, the user's email address is displayed. + If the user signed in using a Microsoft account, the user's email address is displayed. For a domain logon, the domain\username is displayed. This has the same effect as turning on the **Privacy** setting. @@ -51,7 +51,7 @@ This setting has these possible values: Beginning with Windows 10 version 1607, this option is not supported. If this option is chosen, the full name of the user who locked the session is displayed instead. This change makes this setting consistent with the functionality of the new **Privacy** setting. - To have no user information displayed, enable the Group Policy setting **Interactive logon: Don't display last signed-in**. + To display no user information, enable the Group Policy setting **Interactive logon: Don't display last signed-in**. - Blank. @@ -71,7 +71,7 @@ There are related Group Policy settings: - **Computer Configuration\Policies\Administrative Templates\System\Logon\Block user from showing account details on sign-in** prevents users from showing account details on the sign-in screen. - **Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Don’t display last signed-in** prevents the username of the last user to sign in from being shown. -- **Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Don’t display user name at sign in** prevents the username from being shown at Windows sign-in and immediately after credentials are entered and before the desktop appears. +- **Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Don’t display username at sign-in** prevents the username from being shown at Windows sign-in and immediately after credentials are entered and before the desktop appears. ### Interaction with related Group Policy settings

Sy2IQi{zBhla_Pki-CvaUO9{0CAm{f6_!UJxqRlLJOXDcnc2j>G^yq)Yxz{3e=ILEM6eKa+bqp{VMXm8 zQ;jgzv6j&Qw;B1}tTKh1nyY8Z{CB#=P;6MmaY~QWfJot))FxxA&U?v3i?<{dpFJC( zfpZ<7vcBp6EI+ux;pF60E)lM}zZjxyt>^{Gjyeqy7TtC*oKaR$Q5KDN2KgNg70)dt z?3*EU(~rXC#61!1CnzZ|%c!$SN@M`+=sd?Gae)z=>xek;g*se@U{{V*R4xw$Z6SNd zjptY4@*4pzEF+dP+j>(<9X)l>j);Tv)TnUzD7wKRac-T=V#J;Gw}|Ib1YXXgo; zed7DDo6|q5wOMZ!y6=X?fc=-W0X>&_ga>Q3$^vFN$raQoxLR}tz;l2%{Zg4dsis14 zY-}OIACjDx?$@RUGXNNu{RiYE+zir4_Fp4O!SGHGb?|qjH7o8ktEN5^B*f zbLmePx8)avdJ<&$cOJ}GL`od=f?eI;PL0yek{ zcqxgRQEfqKr3`)@AY!8x)rbDKR14_)Y{+4)q~ze8Ls0)MAjlv3kIC1cTC3GmDO^Ml zWij?f=Bxy1|8YIwjds4->dyZ;6|z%A{AQHUL#{!p2_#Igu(Y?7Fkp^nMQR*9<%9Jd zvUuknX10b25cDo^#gpAo-O+Wi1ggN!K2l1oml)#3l83hNO4?8|6aWy=758=y@#KmX zI1lSCmk@q~%WF1{7AgBHvqB=aU%ZeBSn8v36!mE1AxLU^=8S`{8T~Dd6c7zU{W@x6 zgB>C@e<`A_(9>-vZ#IC4>+V`#?Dj!O@xL81K##8X6&~0TfXWJE@TwA~1@xRe`8Nmt ze+idKWEO9DUZpcF6aF)u@C)^z<)%LoNs0t2=5-BVqpUXShEF2tiMc$??)IPbX16>& zyY-(M^cI@`I&031WfSp-_6EMZK=d%v;HWOG%`XK}Wo8~-zvL(s^W0)4Y0`KoA@hf( zBl(-C{VCf&NpZ~v@BE{FK@oC}i{8sOq~ow9OZ&K)2}$co4SANH8ab-?n|-SNMQC|G zkgcbnF`zRWt%Y_K9syC_1)6@UxJStK0%xu)EHbN^H-;W^^U9}q#iW)T2_IGQ$av0+ zRM%6o?SenfN?o|#Wo`UpU%!+tDzn*t;3pfj5?Y+$E%C-5Jm;D)@GLlyj1Eo}XHkp~ zU{~y(skdAN!un1gny03xf3zQOx%wi4mJaX-F1v9U`l&^4FjKOy_Y$=(zbtbiB)~eI z^*-_^Me}(>2qy8M$5qi%`k=MUXbXxflj-TV?N)~plypTHT)Gy{=dPq}$duE(4uTBq z1sG?CiMFF2bSiVt1zcVtLxH|V-!n;6O>!#tS_0w*9geoZx2XbL@@EH^b&tZ)KghoP z6`!^`AkCWP`yYv8S1h*z3>UK0EoCgzO|}J=Ae;rkCAT}xQm!m^L-qAa(*mS(YGz+` zGSa;n{%w95TG%m+mv*T`)z>HIs~FIdTH4l)EZ2nXjxJ?xkA(St6>?)6u?i{lnPzTp z?3vmJxdt!4G&GW7xKkHc!oU7gg}y!F0-TGLvgby%?diJpKqWu@Znua1B~t(0(LifL znLNbQOqk@p9aJ%W`&Zp?DT0EuAoY4h?aQp!N0+kr^&%d$_E#;c9LzYspE_Z*sC~L% zruR)hlIVKboJUz*wd|ebYoWzODeyHilyxy803K;MIL0YJ@%A4o^)DS~Came}o5z;6 zt3QtV3ZjrYySO|-?jUQ>D0Jr2u50As9L6y5i@WQU^L#UK4Ur>#y9r?uU3{Hf_jT>o z-gGIM$X!2-kxMo$535zI_CGwz7YI7&;7$0Z6w<4Uww%*EQU{qp{xT@zyF$pLz7gxc z@(h(N*=<90E`9)sly#pM9_a-($u1SXbW*b_TGV%GQS-fz+I~qsxW#FGOP;9RlwfG6 z`6jDy6bTShyxGk|avm@Q?e|<%Ursyxr@)O|XU|JcEL$Wjobo@4&LAG|=Ey^8?Ah=n zULT7##X9+hp3*TI@ZXp9DBEmh|dShDs%ZO#Y+4BN6&&nm$vhWA5oE@14^yLU{oioNnL9X zm(^7}b^Gst)Z$D2O3H}L8cLRu^c^M#6aK+Mf55Zpkp+U(;#MQvGV6LJ?MQ|6Ko7K= z&DXWM9)O#fte^X6D_RNxtHTTebBU72jn8^3g^IJoQ8htu%tR`i)bf#ts7kUUDRkp4 z)quoN&u8I;W;|vNKc*D_*Qe8)jc1ovxKX)p(iyhS!!sr7nU}7lBTIQVkzfT(K$wi4 z&1!|X6vp&}DwkK}Q!M1sR;-~amFd61V#1#T8QjF*G(#!*ytnAdQI)oQ2D6MGgTdoS;H3fyhBuC|4 zIM_NEAJs?D=&(E=qv&`evGhMd+@faHXa9K6^k6YiE=AJHS>j5{75>O5=4q2LLqHW`7tXcCGLrtDGk{}og! zXe;yxlGZ#YxA>iI{?DMhk?$ZbM3THbKWoSb^y`+|aw^QCt~MpR4{`Rr{s2i}m@;Ql zoAnNY86;}otwf_T_ySR=%AWgv@&kXiStCUzFQHDGy(?j><$xSnvsJjb+T3!fU1F`7 zuhn&Ue*hvYb06i%pEU4)oU5a>as8s&r_*4mHSRh)yWTXjdcL|E z;IG4zAqC}Dr861`v^^P6PD9e|VucqFo|+*_0vR!#K1>N)TEv4_zg3{OvGZZO)+G&yP@b48a!Z|wIq zh;!?AV%PcNc1ySyGhjne1Oux3ZTt3JnCz#y&nn~AeEY`;X?M142<#-NgJiMgD7?!N z^!r*QSeb5ajl-uJEbwKkB@5>x-W&N~_i8MO_4ohqWi$1p&d-}&XdIl*?SDJ9X&xtk zpq+yj-zM%Ezb#yc{s*{-q?*-E6k{Sixvn06#9miiSZO`@o(hM}>9ie%9jRp-;g4(1@tzXi z0#mG{zXG-!1-n7(1>yEmIVYXWH|CmhG z)2)>b9!IT~^pzYVhh4e)kWBYl0gZqK)ahYf_g}mmJL(btZW6LE%+(pscmI>VgWHZ1 zsf$+_ygUfcW*0Vgyy4pv78Q_0TWX3()8cb6Ed<5+E*)<)TGF;(H{bn3FXl4(1#Zb| zQCvBAM%aTJNZ$mz&Zl|^kAh^s-u<7F3=4vgjCxxwQ+NigUhB81MVsubT5;*JJR1FH z9*H@~#@0yOf!I|@T9(8<6MGwu31ii7=#117Eo@i%)11&U9;HgOcsKAnWbRPcn&UVjgDpyP@)a#C?8iDQ{eE z5#e#2%N*J5t}TMM9M!Zh*jVkW8aK+}pxRY|6tk<7?2H^ui0#QwDW~#Q zZ%B96bV5YPpZ5>R39n1^l-~bca)|!s&tjc&6@m1wZT^@)>5619>B{tOi!(FMb3a9G zsXy9Fe%5>bx_21(;^NM)+j+x(e%Pnn{hul585)q_Qb4Ms3DfM6vi5Z6s))Ey*NAPL zsD%;Pl(OazRccFOg=@8{TQz?G-UxJ9MLmg}@re-0yUPg>W1kZulw$e+&X4}@rAXB7 zyT<-?S?HGh@{MLWfJK79P#b3HNaV`Og~t~R`d2AX_ApR;t`!S~VNCf_VTs~LJ>scP z^#CB_e+{h!q$wBSvKZlV?%&ILPh^bMl7hHpPw)MGcD5bc2Cpx%H-o~-{u#D6b!c}W zXS63(A(j43?$jmgxNAzQyg5w~-DsaaR|RTYi&)*_7C$f{e~7YYX1Cm3Ci!126!9wK zsh;fM7|9@g+e-e$pQxqCtt@h}Iw^|th8l2p!;fQfZ11EG;iQhlL?cZVzbYS-&pJlr zN3KBkw*LvN=pYKKy=my>i2ws?1mM>5^S>H>`zIZzv!BIHAjc`ES=@$yu~`3iC?T^< zul|2xSA;k05RE}qa4?mC$s5~kk=VB7rqK;FVUMX<OpGTD3qe1_1@&aSLT?nq)9IV7Nr0P}17v-Xn5%a>N&V5843(c#QpyCacZbyR1 z2kKVGXFa@_g&$^x$Z*p@E4{;xC1$|+p2917iHTxL*yS$U?6v2Q!T0^>MUO|pP#UL zg#1(%9Wh*J+f4MnTdJ6>g7etzw4FVAIgdNh3pt{hV_=xLdO1rfM=y0@#-ce26(~F{ z;k!>ZstK_xe?U$^&ZuF|jr-)%mo^uQTb37>`_{Q{6@-}K88<>UEzue3D;EJbu6+x+ zu87N~+te*wA^mWQ`DSBpcEbxQ&^=8aEqnE*bPEyjk|X3e`|y44Db5G29moMH3naiRNa~+c$_^JVVjoa?^m*tglbpt zGx>+JC6S{6PABBk5LiG2>~ZjotOEs4aXs7O<^miBJ1wqT5QLvKOamSZpP#(FB#rMO zT754ejmJ1`)ylpVDMdri^+JBNSvaK%d{N>(f51Qo%>#6`_&|Cz&i8(P|v=PbHO~`bPDG^N8GteK-1Kod* z?omZ=0FWH=gR$J(a)8y5-_`$LVxRwoWa$6nQ~u{z80I>_JADZpFsc-veTN`2e0XBQ z@PB>3GvT821}dglCW@O$|`8abEn0 zT@reV`yH!7fG2aBcjO}eV6ObIqM-btli^E;CuO z(4$p=*jpE+%O=SXJj6ORxkKQvXmUu_$}CHCpEfJO>_f!GUdZ`@3E0otPbFJL{#FRS z_(Jv2?vR205eOwhkP+`3Y)5jb*9nh?mFUJ|9Jit)kL$`r{d2O0)w`P?h%TpOy)VP6 z&u#|Y>iQkj^#j%QE6}z>q`WQ!ePYJHk}CRi+XSo=6zc2d#YotNXIL9!1gaADCYARpssz~VLHSi}kPc{cG=1smG2<@+jSxw+`S<}U^)wrM%Sb+P`DP^do6${VU z@nr7r<7IEWwEV@=Od=8oMN=R6&r&Hen0y~1;{r^_cAv#_o`S~^ssEw(naNRuTwq3 zNw*ucGD0;V@b(X-SGY!WZ5Yca`Dam0v@8X{8hnX|b#;!ln^;m1xXpE6KJ z*s=s>ItwrU3{HR6vvS1T(9lOGGdCZmd_;48u$USywWQMPmAxgziOq3;7&!~~3cT)o zhu**Y=4D1(8^`iw>TcjwShsJ!xTo*62X{Pua}x5|^vGr9NdY>y|2@)c$JX=q9?7b6 zf{z6)Ga$] [/logs:] [/map: | Option | Description | |----|-------------| -|/validate| This option instructs MBR2GPT.exe to perform only the disk validation steps and reports whether the disk is eligible for conversion. | -|/convert| This option instructs MBR2GPT.exe to perform the disk validation and to proceed with the conversion if all validations pass. | -|/disk:| This option specifies the Diskpart-reported disk number of the disk to be converted to GPT. If the option isn’t specified, the system disk is used. (System disk is determined using the same mechanism behind Diskpart’s “SELECT DISK SYSTEM” command.)| -|/logs:| This options specifies the directory where MBR2GPT.exe’s logs should be written. If not specified, %windir% is used.| -|/map:=| This option specifies additional partition type mappings between MBR and GPT.| -|/allowFullOS| By default, MBR2GPT.exe is blocked unless it is run from WinPE. This option overrides this block and allows conversion while running in the full Windows environment.| +|/validate| Instructs MBR2GPT.exe to perform only the disk validation steps and report whether the disk is eligible for conversion. | +|/convert| Instructs MBR2GPT.exe to perform the disk validation and to proceed with the conversion if all validation tests pass. | +|/disk:\| Specifies the disk number of the disk to be converted to GPT. If not specified, the system disk is used. The mechanism used is the same as that used by the diskpart.exe tool **SELECT DISK SYSTEM** command.| +|/logs:\| Specifies the directory where MBR2GPT.exe logs should be written. If not specified, **%windir%** is used.| +|/map:\=\| Specifies additional partition type mappings between MBR and GPT.| +|/allowFullOS| By default, MBR2GPT.exe is blocked unless it is run from WinPE. This option overrides this block and enables disk conversion while running in the full Windows environment. You cannot convert the system disk using this option.| +|/silent| Suppresses all warning messages so that the utility can be used in scripts.| + +>You can use MBR2GPT to convert an MBR disk with BitLocker-encrypted volumes as long as protection has been suspended. To resume BitLocker after conversion, you will need to delete the existing protectors and recreate them. + +## Examples -## Background +## Specifications -The ...: -1. **Something**: 1 -2. **Something**: 2 - - Example -3. **Something**: 3 - - Example -4. **Something**: 4 - - Example -5. **Something**: 5 - - Example +### Troubleshooting -**Figure 1**: 1: +#### Determining partition type -Image here +You can type the following command at a Windows PowerShell prompt to display the disk number and partition type. Example output is also shown. -definitions -## Requirements +``` +PS C:\> Get-Disk | ft -Auto -The following ... +Number Friendly Name Serial Number HealthStatus OperationalStatus Total Size Partition Style +------ ------------- ------------- ------------ ----------------- ---------- --------------- +0 MTFDDAK256MAM-1K1 13050928F47C Healthy Online 238.47 GB MBR +1 ST1000DM003-1ER162 Z4Y3GD8F Healthy Online 931.51 GB GPT +``` -Table or list here +You can also view the partition type of a disk by opening the Disk Management tool, right-clicking the disk number, clicking **Properties**, and then clicking the **Volumes** tab. See the following example: -## How to use MBR2GPT +![Volumes](images/mbr2gpt-volume.PNG) -## Syntax -### Command line options -| Option | Description | -|----|-------------| -|/disk:\| This option specifies the Diskpart-reported disk number of the disk to be converted to GPT. If the option isn’t specified, the system disk is used. (System disk is determined using the same mechanism behind Diskpart’s “SELECT DISK SYSTEM” command.) | -|opt|desc| -|opt|desc| -|opt|desc| -|opt|desc| -|opt|desc| -|opt|desc| - -### Help ``` @@ -118,15 +104,6 @@ Where: ``` -### Examples - -## Conversion workflow - -### Validation - -### Repartitioning - -## Troubleshooting ## Related topics From cd75edb1cb3dde543d07c3dbd92f724d4ff0a526 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Wed, 1 Mar 2017 18:08:41 -0800 Subject: [PATCH 013/108] waas-DO - add GUID generation with PS --- windows/manage/waas-delivery-optimization.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/windows/manage/waas-delivery-optimization.md b/windows/manage/waas-delivery-optimization.md index 8f9e0d54cd..120818bbe1 100644 --- a/windows/manage/waas-delivery-optimization.md +++ b/windows/manage/waas-delivery-optimization.md @@ -99,6 +99,8 @@ Download mode dictates which download sources clients are allowed to use when do By default, peer sharing on clients using the group download mode is limited to the same domain in Windows 10, version 1511, and the same domain and AD DS site in Windows 10, version 1607. By using the Group ID setting, you can optionally create a custom group that contains devices that should participate in Delivery Optimization but do not fall within those domain or AD DS site boundaries, including devices in another domain. Using Group ID, you can further restrict the default group (for example create a sub-group representing an office building), or extend the group beyond the domain, allowing devices in multiple domains in your organization to peer. This setting requires the custom group to be specified as a GUID on each device that participates in the custom group. >[!NOTE] +>To generate a GUID using Powershell, use [```[guid]::NewGuid()```](https://blogs.technet.microsoft.com/heyscriptingguy/2013/07/25/powertip-create-a-new-guid-by-using-powershell/) +> >This configuration is optional and not required for most implementations of Delivery Optimization. ### Max Cache Age From 79b5c19cf2c6938e0adcdcadc3823dffb5adbd4a Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Thu, 2 Mar 2017 16:26:06 -0800 Subject: [PATCH 014/108] draft done --- windows/deploy/images/mbr2gpt-workflow.png | Bin 0 -> 29166 bytes windows/deploy/mbr-to-gpt.md | 251 ++++++++++++++++++++- 2 files changed, 242 insertions(+), 9 deletions(-) create mode 100644 windows/deploy/images/mbr2gpt-workflow.png diff --git a/windows/deploy/images/mbr2gpt-workflow.png b/windows/deploy/images/mbr2gpt-workflow.png new file mode 100644 index 0000000000000000000000000000000000000000..f7741cf0c36e6a8ae1785b18536933ee50696c81 GIT binary patch literal 29166 zcmY(KV{~L)*R^BYPAcixNyoO)v8|46+vwP~ZQD*dcE`5Ax}W#g_oJ%z8C3^0#y)G$ zHRp9A6y+rl;qc%?zU1~CP_$sAfVU~Dx zyLkq9Tr;Q?gL;Gh0`fkSrD-jfl@pXZ+c+5w5)CQoL3rc!_7zRwA*TAad;dEmeE+4x zX$6sOCupOA18o4g#(&oWYcLK4yp{}1jlkhRNZ{zdlaBr01pJa|L=6%-@$-mS-G>F1i-klOXNtaay1V`e%{Wh);(8;&2D*0q%XZ70DXRn zPo3Vws;E=IagR|J!gFrEw&NW>g15!KbZiqV=Q4iRDRfOw_ozc?UFOxG8H6vabs(ba zTz;5AmblQ_yEKmeay(uVnyayzN3L9JGZ?Lv(0{>Jg7@asU!Uso>V3fA%^aC9tk+Oq!o}b@tigS2P_s2w0u* zqo=8PMB5WQqV()qga+zx%(XH}6<$?d@nJBRyQyeDuCdOyxull?!fR|=%e31;qkB4H zb~U(Fj`eMHlJ=c^;5rBYP01Rfs^$8&M^H3lH*Wo2p1YV%GAo2U>0k$c@cd2j8s2u! zRP^OE;Ut3q;jx2>Vcseh@*=j6Fw=%1L8}Ir7^Uj8KXZ)pWYm&RGh=1uP+@9kRb*OT zv*-8-fsflh^ZE)hAcLK(BR=*G$1gk|IVZ#{RBKKeR<%rw4xc5!3GWaU_`m7iMrc^i zbsg=>Sl;XpaEVmWx(o(T5A)Kwk3;_ASJDd1xI*h0Ka)gAq8;L;%L`thu8)s;OLERH zD3ujF4`L^W9w)xUX7N&eyHGXPdtvr^893Njs1WsLpwcbg=5{iDn~RHuecd#y?%Li= z;<-P6V06Va9Btn*nbJt`EmwDE* z(Q08cCVrn+W5Wl=*wL}RHljnN&!hhGQo)vgbRd~<8piaG4113$2D+Xx)nd^DTAiJ(8CCin6b&0Db5 zGR43c*44vb(Lg=2;Njt5<4o1*G@20VQl^0QX9MXlFi~fh9@|!~^36Kr9RWz2;$ z+bol;a)8smKcSzPXn1AGfJ<8OJ8=hYgihYe)Oe=b#^<8!_#aeD6OTwx$QP_-^*Dc1 z@@ibzUi363@Lne9K^@o1gA6w=t zEPM|`MZi9N4hsAkyPt@>T6@H-X*Lr)7Cm~E&5kTdwhKLTpJfmlT;-OKK1FXGnA)_O z`(@OHi%d`~hJ7^$D8u@f7<{GxUggFvq9P^TQn?Nx9zlU^GQ-jy3%N39ra#XBo95afGGKM^Z8#Lf zUC_6#)(^N^pxqV${L>$+uX_~s>Ldpl$Eijt4EeB(VXx|7*WoCW4TnhQ7^Y*tbH$lB zhXXJvxyzucIpaq<=l|2eC=-D`*Q$las4V*EiLi`Ejt@;D@yPx%fUc-?miQQ^2@ZyA zoDN7dHITJA4LHN3157qx@F*v^@e-XV4h&|H)}6{XMWL4a;5qhBL9X3fdZ-aC#ci$L&wTX z^p);^umxp<(mu9Wj#pvyWP{hPWL#5O>Vi9!aIq{;E=wlX_M{Gu3Yc9WH z{yZA!y_;m1o-`#*rTguo)n=_oO~&6PFW-m9Rk56 z*v~cp2|qf*%SGbcANyex14#$dX_A7=F(n1767jD_{yF}(@~n1c#@xgqSW#P+xsul zRyo@I3MiGXI)r29L*tptD+M+Q>8(LZ#-m!t3x4&XRb_(Lvx=cTF#85J%|g!P#HOl#hgghbQ7$YaZoCFDYd(pz&#tr6YgW|L$e$^%gJdWe z4y3Nx^St*W6sOSl3~3_hs)+3YUKrb7#d}o&gy*uH$Rm{e;1n|~a2>3KAZiomBQSS7W;MMtHjc}`%f^v?#PI-C>Z9FBKf2(MJGKI`l zny;Ey3#cG93j=73u?bL+5aAE)k9ldfh6?8Uf%66`BL4kSpg1V~93oGYi3{Uudx$!WWP4My3Sw@rg3y%l%6V?B+J_& z4T9TbR8$0Phb|8{lWX_5+ENNSB4X@+DM8DlxU;=lM^O|TkU6*>K9(urd9OUOBF?oCtjV{wo+gJK+ONhtx!!v^b zX+V_LMePKKyYC3?P3)DxS5a#MCj+^&0A#dc)^ScMByF=1{f6`J56m0E_LC*pq?jwBM6X%ms4m;DbzD4>>SvVIKTCE^2m$jwjQzxhzCC%GgBVNteS~u-SbfwKNHBzsivPua#S<*$d^UFOM#GCBIsp zzF!+bX38Zse_CP8Lkce+lk->TWDAzr>wzOlYFd;k=l*0A* z2YJP~&yPbgt63wu9LKvMnM@Qh%Xsg*)Y5i>R&@!{B^>K|--X;bwFj?nn0>wz?1m9R zxA`K5FRSO&FUJDQ;cc|0t}BDJnMKtAA|rQ>xsqW&tOEPbgvjdA$`6$Slh9PrcWI(i z{4Phk@$isQAB@0OadFjin_JL^i0n_j4`!a$iI>fI#jFIgqvSp_w2$K5P2#VNZwXJt zBnZB))@+4y6tUJ;BpXhpeCD+tKE==s+Hab*+(N`Vl+}}J<zm#lhM(huS$$| z{q~i+kNCO)OQ&z-Sd$d|*nd{fS<5Qt)%G*#rs72&=-ltU&E$5Qe}4XOxqpLN#k1)r z+Nah9SG%BI%hY5g`Q_tB*$b^+qM+&f)_)an`&9!i5I^!jI{N5gZSyamx4Kt4SQMip zWtS2E&)MV3icU;_Xgnw@uT~!X^Pgb%NCdO@cohW`NJ&P09K5fQlub}#f>VNGyv2Yi zfbi%*0jdN2)pad8mqf#)!asGgpyQvb$1JEc-dn@f16@~=FmN}nZprNIvdziHYI+Bw zIRKC9@g5_`j}~Rs+z+j`^Ky1ziN>&+f{FsS?N$z^nUaYfD*lF+$R)xFym(rB)D+-P z`gkP{A<+ZYK3@-!r+l4i$-Z}2@%>4B$FG^C8xLDI(J~Y^O6Mo=!SDxEKUY7U>t`e~ zO#RDp# z5=hFsRn3^`y_cOlrk4_MuJw=uqqiPE2yj`L_#Spr$B%`?qh_q+q#YWKd2Uhpm$?OH zcyTdIl}v#(&G4IY=5;@hA1<5Nl+EJ!hjWyAeCCh1bsL0n%^5BG&QjIIZe7scYhz-R zdIWe_2b4Yr)cJL&+Y7DNF zDfI>ujelW92tIcIA_zWtMeB{c%!7C48!9xA${*0pP1>-^6GnWBeOQXo-9s(G@NY1w zik9U0ja0T5v@0D)JD%0U)VDB8@^bZ z0(8w`Cv4mEyP=HlYQFj}NmVnpQo+&5Rfo*uTE*FS%ALElYskXw9j=?#Yb-n7U1y!E z$tn(_n=xP)j;ru3I?F?vOoGLgOkqMHY2oWhbp%`=2nWWGd32i3K>>t*m#zcKRH^|k zF42m%X^GrjF&r7BUJjclK~3T8obhSxeyE24xJL})vGPw#yW1lXU8lZdKa5B3XQr|# zlYam?zz!n+@QyCdDgEc$HCnt3x9i6sShK>Iy$)q>GwYw-nLo39sxh}gjnW~9SIAqC zegI555N9{KxzquR{LDo;nnUx{OcL^?A_cN}%NNT1&Z`Z*!_7@=L8KGR4mmHXU8k1Z zs?h5k@6zwuxMryG0#VSTmvd_Lk5`jS2e%g_*}I`L(@>EkuwVXG{&sW6v*CY)Y<1*4 z>%X$AU#~y@r0QAv<2XFnJ*ARJZa&`D7rt`Sv}!{#Vf8f+fK*~P&<=Fq7^LH9EH+kl z46^xc3hQ?J&Y=tViLl=#w&X|VI1oL|yC75V?1&szqx5P1?h9@?s$Ey-&h_{P-$v-c zr4h+$#FwBrJW|WpRW*7VEN=Cfkn{wN%3h_!i8lGb zro_IW>ib)dzlE-eguvgq3B&qzvKm<28I^KP(Ri1K)Y$zB<_zbf_v$vD7TY5p)t$Gl zq+|T$Yz_#mGg6Q;j7jf^193A9nUU^|%T)i3=NGn9XvIq5=W({-Ck@bB$9QCQF~|Y2 z8EXNED2=^Pwe?OpilkB%ul@6nPYg8KwG?ABvo4Umf`VAGg1Xcsr1VGl;#FR}tQJv) zI=@lVduV6=F=YSt-2BX?Yt&}G7ZIjbyf}dkiN~@*2)X=kW}YUzL&;8rM98CgMjDs8 zEo)jRhwO(NZa7FpC#Aj*YT|Lq%wyRR$VI<+4h98{vvC?kY@oeW6G`ZH_~5Ty1I~OG ziC`byaory(i#V{|z5i72_2ovAn$^2%ci?| zw6s-&>S?u&Fs9~_c+!A(xkJD2edRRM-w>XN=g{*>Dz*g`6kGnz0T^fv8xp(Pmr79= z7K`0n2wnyjB|6@1fggoad93SBG}ADk#Fqx71374IFm*q*+Nt-ve;*MSZofY&CM@e- zp4P;ViF&*L#;eV|MCKC}*h*Fk={zP*fAiYjetK&4(gA;C{NU(+`;=UnTW!rL-*+!N zJe-G6zoiFv#>pVVh7VSH#qNwU_ik!_)tL|mQ#NiYPQ@AE9Tp%g2O-0_YZoA-&Rykr zS$sF%>152<^mlX;u>}||z>CuT>9pSjwjkg3xx0{sg#tL3A&!U40)+Ir+kCsgG7djF zoCk3n0p(9jES>&$4cTVE6Pb7CsvTgsL2Shq&AaQ(`Z<3jG!80`&=z(X3L(Ry{Go+g)#~cGqMJsvWC7@+y@t z#*<6J!8{N1RLmn2%=?ihHb61#eHF%Y*D2O%my_CHVsx=VR!Cwa3Vi{FyMucWi^V=8 z_v)zRT|F)j8S6@gSd6$3KldSojHe!uTcb_oe+$s^zgKeq)}u zeS1lMsrA98D%K62VA?%=uVF8ey?}DpC=t6yJ9RP0M%! z(c@|Qb_FDu5L#b5m4_z@Z2*@h583JctwR*W5Ggp9UfFCd`zuX|z?AeA)_MI+YoG!0 zZ3eECJ}=5DrCztaIiUR~$^N|d7So^@54?65m2Xbs-GJi$TY(RGG-~2%QM`%><{sue zMkpgdy?U&Kd)HZU*5A+1L`B4Z(iOXN^2M)6oy?f`LHOM~EZD~Dr;9AK{)^x$zg*Bo zL8RX7R~^UbMU9Gqf00ZLeJj+QwzC$^;rLOcO{uep-dBB7#Y*$#!b_ZaUC*Yc`&zCC zk@Onjy-4s3@AEFcpxq2vc_@g?11>X41N_tNJS) zj+q@zJcv6KI8TX3y5*@_O^jK(6ddi z5sxgYrF@|mvL5kQyN`cAw{91y*B&vTZ4KhX)*5gy zO#$Ojfw(e^ZX`tRL?deiimWAc#xt%ay~2#MG?gjARj$aXaN1;=#W26{~ z(f36A%##Q{H3anzc{nAQOR_?bow0YT+Q*U2{pKUR1jr9j9vIOyr>wFc4|JqMWjx{1 ziJlLEyhgc&#OVGBRn<`JR2)tO7lHPZ%-I%!y`&^$1M0^qwY!nQPO`!hIsr(Tp>m0D zfTr{&?PJSh;~(>C>C%-$G=8W1Zux2ZO-{cxpk33OTdo%IN`gf~`+c}n0D6O5oYs3J zYFf(~H-LA4QM=eWWtFUI%d2gBk(xKsqpY44iZ43ZR1TGgjLCMzs)57S1W!~lVK5BB zL@-BD#$7e24LHFNs*xcaU+rgic-jc1j(6{?G{%nFLd`>KhE=r|h{y^HFSBamIfSef zC5x|6ngS0h5;ti^Ulf6SY4vL`^mLVs>L9chhJ=AYLM)-gyd}|QY|jg9??5mO4q#P( z3D*)X6x4`f!$Qpsl0$LXP&D-qqpDVf_9$q7tBH=Rtk3!1vLLfVs62LfjNea>5U!$K z`RQ$z+NP+lK0j>VzE`v6;eDF>YNE}`QGyo5p&r52kxISu*22^dJW|N9|Ka3)7p! zdEqE2TYfCRY6b2(=q>#DcZg>^?9i`xN(6$h*aq4q@~QxDftm_gD=}U{$fP_3xlh-M zjd9}e56kCU%Of>5vKb5}pFV03l2n9zg5ZT*|gPG}=05QA@ z;+~Q;ZP`>yBBFDoFK*Icb<((KZ3A&(v?O8N1rb@NeyZeMxc&fi z@AJjS7!{rT@Z|Y1+^F5eVWI4!v(lC(6k z5KQnQJ+&e`=kTIBx&Kff=01243X&wf5&aO(5n2C=hCa3FCB~dhom2<)j6NJ|m^YY; zuru3~@`8XAq8-SA*h?@PlB`-G1-D?}AtD4HN#Zq%py&f*S&;A){2dCS>=T4bs4Npf znNU-lvq2;tTHfQlA#pKCgC%i^f7IYiJZy9lj3zMpy-@rW-9+ic&7{$REg1K*&G-uJ z{XbkgJS{5JW450ZYe||muRqD6d>J8XhxNG`N8%(Vc6L(Y?)c2D`mFMePY~C>LqR5D z231eW^Ajq^n7Fgps6Y@b?{6oz%-Q0R5#ZJvpXure&$Q<}ZUAWj*I=}Q!`X+7EnK`d zPAYn}darC$LpQpQ1ii*1cT8s-ajED?(1VoCmSWZ96|~i0rT~|RfR%o6G?t5@hnvCn zL5ezH1Vi*F$xkXQrl-0n9(<5KJX_6GkG~!yw9S-z)NTC&rGZo5XxPplnB22X$YW_ z0Eh*3gV5z6>59>7u&BLGAvFo#Lv)Nj-0u9E`(<2rB0z}BvW^$zGX15Lo;Hdwp-Sw> zEPGaTQ`yS{i5HMWVvn%^R}?>pL7K?l8~<~d010uIxN(;oPAhMcgYZOr3+LPuW{zkd zneW==U_f|_Mps;}gG_L;URNeygGT=Gl!Mnl;!S;ytPCGbg_5}0r2cDmR zaFIdZ zpYD~m>n^RHU4Y)t!AIjRXnwwvy0su6)n(?&w@P|Hca!)LUz@kdd1g=TkNqU0;>QoT zit!@l38v=n6kyk&uUOe2xaTn{79ht(XJ!xkxteILPLRhXTRTfIxKvZJ%6QtK?7B<9R7Nx z#Q#UC!rB7*VO0j;ep^aV75D*Y>`3tUTx}10o7C_({Us5sy6=j!QO*jHrK6IUd`rxp zFPuHk#)Ny;TvooIdnU+{&qf!&GV3PyxX~~CDW{Q_6HwQ5zhNzE(G==2`SoP4zI2aE z4NkK)Rjb-b~ zxu>4%IH4K$>uTUuKP#*2V+j}*8|f7D{+a{mpC@Ac|fH|FR;=D1@ezh3_A=$vEk?n79O{|jQz zX(QL2>qL<*w;#^c#G-9)nAlf?=%Syj(a?eV$v9ifQfUfSif^ti-Yh)T^>5|6lT+)|8j;A< zXj#kFbL_A99pUx8>S`aEI=|lsdNjqVBn|7K3gSkLUoyY}`9Fl-+2V-yS!HrR<9 ziI=+%6I;rFx!-r<8ijvQx_ijfPM-)2lFGJN6aG<%DwXQD02 zrG$Gt`6E3*Th$`^Ci#&>niQlXJQKop2yYPY(A>}7tld`|*Sh^ANvl@KMAZPJQSI(rQ z+d{#cIyhYL2-<_N(oyH+%u=h#H-2U3=Ur(e&gw#BafTKy@wap=R zN%-RSAwe3wN(c}E$qGtA#SterbUb(z9wU)YbHaxyw-X)OX>c6Q?ieuo{8VB*5N$>+ zUoWt6&%$%qPbFw!ykypUcSI~Z!}P^U!tfacAIDp$(oA&NLj?(%P+w=~spH?>J3M!b zhIe?3>_%%nr@UwoHPi^UuzANxJS{48f9++-DSt~T zgQ$STMtprGs-Os%wFLOKt>7ciu_r4%t*`skJl;E?1~&iJhf*N1(V-u{`3ZHGk|j)9 zHP2d`ilQ!mf>mwr(f2n)_$Sk;ejIkES_WbsgJc5n$-ZAmJ^JJKqBOworFpNqo2+Yi z37j;Xe~I=4Xah`#85@!iDSai?fS#ar73oY>DnNsZzMXD?0kh+~jLI^i6XUU(am zlAFR>-4Dd)7nHBoq9IyGwv^ z-xQc#$}_Qs-m%a>O#~0Bmo?@J$NQ`CjC0oxQ>D!10;5dvG8x}di1e};k5TLC19*t# zeHUivcMNN}D|i4Wi1oWtgA0d$(rWCjk_#^Y7L_mg9%g=y2L}xV8lcz1eh&mR6cy(4 zOlEPnz_Gs6{E-InTj5f67FX~IJ6YF1Q=85n(7@&2fMJ;sQNiorU_B3KLHKM)5Stc( zh%$4Z-#oj@Jh^nUx7&E%k6GV{Gm>Tt`RhCsw$~~6YQgeDAlUJdA{$;kr%5vC*80yC zPMwd3v&t>Y)7!jP&PlmE6xdlHNj-XZ`P~?Q3S)h1!b}L;k+J*bRf;I{8GGyQbpQ5$ z`v-fC81$xqG{0%jUE3rov5-~*;w~_io)I0dKq1#1?VWaWoVLxeA_K66BL)4WD{H}0 z*E3lOjf(a?jv%csL*1UL0uL?a*vP@lx!XGER-Zkue@h^$14&%oCZ9?54nN4!&Bqf= zrM7?-UE~(NEKK^@VPP;X4$Vkkxzy}yEJRnb?S8ISzYDH+%zEK57 zfZn~Sc>-+2bd$Dr#^b!{V}Hw=w>-x_|8;1nm?_=S$&=xnzZ@KUhECu{mQ-U*M+s{a z8IA2N15f=)GOi5xdbSlN-1YAe>m)Op&k)?w!`>f|n-XGZH|~xJ)+L7;^G+J*aJM)7 z#0SqZB~CVgxS#&#_wI%yn~NV?P?LMo)hZlM;GVN?z_l*HQmbHZ8$zu@ug43RQK$Z? zo$a%~tcccO^(js@R)3ysfSG`a+5|e!@Dl542~ehu+MjMRBjB}@q884(;4$@-i!U`lLWp0`ZUup`{6y_txY=?d)Eb- zm|EKjSZC~jtDqacr%O$$trhfSB|xomFr1OcU1wuvoT@bA6X5b6ER{ko1RGs!h5`6J zP@5`^wNiz9^gC1e)Uq}~iAy*bj!zHI6hZ=LEp-8Wn!gf_#8t6y7Sf+wXZ$=9@oWH9sY)Njyqpj3dLw2%tc>D^wq! zS_n@HT3a;IcGT`m`#tsHYsU^DdNssBWIyB^K@_*OIN$7>+}7ezXCK>4kr^hdSlCLP zR?BuS>*`K?w~cZyuU6Fh@YqQP<>S7T{o2I((G##1T!o#CIAs!aBWeL17{lRxA zIgk2Ze;`!GIC{^a(YXJQ$Ib12aDLAHVw3_jCy{t}(s-I^JZ7)^!SXoY%wLM8Q12M5 zc1L-T8W^1YIp59MFGuAxd{FWV%sVOKUQDQs zg?yO(5infj+vX=YqlN+xVoF&0VB*1Dha7L?#~nI0z&(pJC4dnwY>l)a6R#xXVdxO3 zxyOeF-xMP)VUfpjZcs8;m3&b&R_UaglRuaVg8a36!bD6rnA=A%C#4bGf0pql0U`2s zk}4JE*FZl_AYZNwCrZnHnB@tpcno*+UHlsgqXj(%xMk>@eZ8VO(LDpsL;8iJna`o2 zL>9IMYO$Ik;G?+j3hLe?Gu)l)aF40Vi1BAQS;58$nmjEg<0A-0O361Cz$C;8S}w?9 zjyX#X!F2%$SE|f@#7E2sBE7⋘a~oM45UDU?ekpW+4yZoB%4ANy!rpP_-M|f5K_e zn(Bp{#Y)ZKg({>n+Y7wv1_kG&b@T z&}}|-C;tg8BCe-vQ#TN4s0NP4cWrad=J*S*3U-153MrL3-YfQ zBs7rrjFKDv%UTA++Cl^*C|mdib|Y$^N{`gxYsb5Fh;G39;YJI%K6THJ=Wa}rtmazp z8LIUKn9PuIJ>bv=pb|EHtLkKpH=hOsle&EUI_-$hL#W=S3%gtRSHI)bp@JeUV^-Kv z^@!!Knojx|1o*a~9Uq)hXNXXGoxVuK17pSoJ$UteAzwrLR6%`Lnw=l>kc@6$+LD#g zdUCLk7XuI6Pit;~jE|ouRk2%OSpS730l3(Qudn1^j;Rvgh#Y$=m>8fdUz3~tu{Bi$ z-SL7bf19z%MlvPS^*O&H8H&QAE-$CSOb)8eXJP`TG-lO*QU;8xf!MK3iKJ05GzUjj zGRJ~6=MYp@9Ux*TNB8LbE%yWraI0B^CQfoi@ zDq!i-h<2#qsekB8%92wD0hY-3U@-XJ$JK9&c91O6ioVek;)|E^^}HPRIxd!!7yQ6^ zd=b>_^|R^_*aiaub8((e^yRo`WKDi9A~f2C_&C1r7ezRTueYrP6gG>YNNR_%0S^AG zbp{>Kf!n9CF?)sazw*BL#}tJEmjf7OaaZ&>=%&qVGsRW3s|*B)l-Jqsr1OKOi3fY) zl5~e{K0hfufutIOlV>YP%sf=+r($hi?lBs3kC#5i$uJOvE^$LfctE*yZ^G=34I%Uz z>JZ@JMCkgcHD6yiXK-0nWTu&`eP4gy)v3x(2)0~?!XM~c3=&?Qk_==QcbA!i@dd^z z3ZuhDsrtlrkZ1b&jr$q`vr?~?(gW(s=zWrSn@`=odB-)y@cuWlYnULEGRDZ84Dz&l z0|ZELTg6}>iZOU#77*@SK8l3D2qt&;!!4clKUAe&UIHWyv77o{ekuvSa-7YXq0+&^ z?mE=*;PtP(UBC(M{;q@VRCa~T3nof->OZU7u%W%MT(1jU;8x*Ap2i-prHJQRN z%G;Vlk4^|?5Vv(1%>N^#`Z3lMZ4I#3ia{+0DIBEH0K?>OS*fQ5;W6%d2+MHEBq1OG z%NF7a4#JvasSbstsSzJljW}O7sOL8RECNDkq32)w0q!_sKuNjQ4d$a#U=!C8DDh?{ zPFhi&oxs_uz;t(53O#Uw=9iW2tzMyCJ$_Y)($^{gq$f6Tr6hmjZS~Z^r8p6Rb81%% zk2_WWWKYX{wUt~I_5Mq^G>(|HS4i#F#Zf-^@A!=|a|^Ks=NL)nER53Y`|iWPb)>bl zlMOYmxEPNmroifx054Xcw=0FQ4J*(Ow-5T$wd=%P@A0klP4)^Cd@&y8Ras!e)QJY0RH6uv?$Bj3N%66NYC$w%PkI3v9K}p)9dz*{b zaXvzmFEGAAQP`kq-P{?OB=ND^?d2+DwElt|y9rS_+WMIF{G9dK&tXBGdfmNgzqAk- z*Oqu#&1BKB(BTok-_J+7)_yd4D~tmphKk3P_U`#SixY{_FUeZ*5*WljWZN2>vi&d- z)79OE+J2LqH~#bL>h>GR2TN%mgFHA?KRuw<@*T(T=A<7=L~+P~_M#2G!88z7Ng3Z(a%`rT;P$AIK-TL=KzCN49U0{P(YBrmv*6<)2RznV*SvZcoG+kOo42yP?wf z2c#>1=^Fs76(APs`5FR_tVGB(cfBaHt$wOp~dgfUuz`S zu~c9m?#J4F_Mk$|q_?FY)y$-}_MKy;Y-X$)Z^KhnsVs;&hnK2nW$H5-y+@OuJt0@k zAlo4g&b3vhqh<8dch^q99!b-oT3VR5GlI!&!WV$#CnF+!*b|WN8=ID`d{#fx{ zSnv1?d3A$snURtCcWEyVJnlc$41NN1#OfZ|SO|yPn!D`6SNz6fyRq`QHPP0Y%lr|r zbgyTc+ozSTW8bO3Hi&}CR+G>hpXS!X%j$MTUiJBE@LIq*;nPbOq#T|nydHCOCDOoC)7#53~X zW1K>C$kk9t;@~K(_@#Sr5;m7${F!%AwKa~0Wysdb&&(8IGaKp*Uh6AW^hv#aS zw8=MFkZfvB-N%YT@ExM%C|x^$v!ePcIo5c@%hWFDg``sne!M^BvN*d4Hkiv7JNT*5 zcW{>!+U-C*rlSqAo;M0|{603+GHp(|b$jt?tgXshhmdzAQSZE0VLM43u^`@Ff8PK% zRV1)qdorA;nZK&FnMsIxfp)aCig`*hNROX=HP9An?srwtzP8XWpRtz62AZzk{ue82yVuogU#516i3IJaCmTy5|6Vn({a!E}*Hf2e<|UePUeG1L&<4H0-AK1YbPUn~cV*)Jm<*HE3!=M| zO~KAJ>Ab2O;HY2B#HEN7@ZljIq#|KO3ib+Q!`l8aF~X|;2uB6Uyoh@EpW!Gfn|6!4;v#VzO&;MPoy)7?tu4egtGT7GjZ|rH; z>#;VAJ;RGm>6)DT(K@8@(9Qv*s7~H&akCj&`{#+}4IF5)KWV#~Euo-}QI4|tK}l+w zeDcY8)RB?^4Fk>r$9IyGb&6y4^lnCEC93}%)NIPH3b$0aj!{nxE4nSCO+&YGp*y>$ zWT*s2I7ziH)kuSUW-W>4=TApBhvJ#HUZH$3HZ>gn3kEg~poLbDD5BI&q~QrC#Y1;O zBRp>!Ap2{?$-<_KmP0(%74vL`h>Ee688b;01|miP8`OVDiS#h;1m|gV{7)C0Zu^Kc zZ!KOC4cnB{c0(@!qF5B=kbEOkkK0XgKl40J)na8@q5@K=fmWcJrHtMJ>))i11nG5Q1unSI4TK`XGXU!IZ( zj|0*HLQ0AekE=XKcJh-(znQWPOfUw6_k9k7tzagc_We=e4uaJVy+VVZ>kCL1mQ;3y zMwj&-m^^;_j$Po?ym`pO`J@z27);i(kdgK@vpwftXw`vY2!ngX73A!v8XO zG0Q|hCIk!kV&a{ccDyRUSYe8OV-F$kkbbP-4?jsewu7sXJ<^&??TiG@eX#l5ri-M- z)1mZBjPfe0bavtI$XA^ubAF=THv%}P%_wk@8x$Uirgpf?z%~;j+pgS)dsqkK>zn-9 zho5jK&3dcSjSx*T^mV$)uKhS$V8;t?tlk{^<~H-^=?X^ zznHy}2UF@W!bGjDX&rJW4!Syz@0i3_eh z7wabqJv!E%xHzr<$(DmYiEt2(FXB!;C6d1ZEni2&S(9tj^H?kr(RlVEM#yD~3soKC zZTli4FD=YFttKT!o7l(1z{L4ZyRzC8_z%?rfyMDhgoXUdA-1lG*Uk7jj_U}xCzLaW zwjih-$A)m7u3>}zT<+jX3oh`x;DoTG@8R6xMz!Kni1CE&d}m-91_TFz&)FoL;?Al= z@!YR1kwJF!L=dTE7LFKPChs~_37VT%2#x&~gVMn30>RM;?3JZIIB-^E6Ms36jHa=jGzo*{z{fNwkW#E~aed(Ns}b8j+I|9?%rRajhI z*R+e%xCPh7g1ft0aDoJP2n1`~-624L1a}SY?(UG_?k>R{{`I`yKG+=f0kko%wdNdE zb(f5iWy_@mXIPK{a~2W7)A?`-X2Y=YE5;ejz-PG!lPuGJ#co>)E(9Nm)SOjo@f9|$ zm&54XGRg%E@-DLFN-748Pck?C*nSDQfc%-U130nfud{guB9t#GHZS<3LnJqbH57*1 z@SU}+#7y%AA9yHuX&E0UcV=J=(lHAorb?%EFJjb=nD5$uk14?;IW1Ljn0Xec3G%D~8kU>G_s~>fSRkg1v&Y=1TP4oxV7F<$T&dnxv`+YMWDyW= zOL0eRaE4KSN|SEZ_^eIIG6Hi5SjMpMz}N^lAp*5bnBLr6%r_&Z-EaJc4O?`PAmC6~ zh^1YDs0~H(WE1P;^HH=wz{yXY%t*|z?CTFdELArOwW6Q0S0B&KuxD$DrjK+Y}!L#s$0l^X{`2!i(^~YMqTH zeS&-D99<{c@VjPyEueQ_hv(YV5u(~1JS`{W<^WK&YY-l(#u;3U5I3g^^{H=az|nHGU|$@*X(Y< ze#=i5sHb>M`zJ2=`t7I%)_ zsDTbJP>QQupd&&tQLe83GlQycIHJ= zZnh1!co02Flm_+Puz&DA+Nyjw_VaGPJ-{(rm{KO2U-n+gGF45ytxLp<`-ou=%V$AB zwHFKY zc`PxMZlCOFJ@16tdYeVt+yLV)1|c~z0#Y#ogUEZnDtMoqbsDiH+D&L)AXI4gTmU-+ z>WfLBmtDXcD^0drY5DXr1qtfi^Oup*o~!wuD8MZ5NMU^eT-pzld+_{JM6%Q}lt+xRU>5TWh9mXkQ+SNc!tjDe3hM=rW$;1(<3goO z;Jg$;m+c-N+#j_CbsRDJeff}fNT$V3O;lA8HIpv|I-Wq23g#)+BdR{hc%4#7uQiQE zogXjf<5G`_gZ-#2`R~;yx#QXqCq=2|R{X_uqFV#sl(=?!+RVHh{w;jYHhW*c?y&b; z;za?_iED;9?Kb1)aC3%L7eAY=*vlP0q6h~y;hvJaEiv`bC;H#-J|OA7uS5Y~vcHX0 z&|q}5&Q}rh!PQ#T4fx4ss5m8qi}hsNFO;>o&HPZsSEe<+n=+k+9eZ?NHjZ zB5|w6@R9+2iN=_SE@~>L_$GKY6^F(q4DFw`%q_{ZsS)j?=u|!H1RvxG;#$5b6VIfb z()V2D+0?C@@}`i=i*pQLnbDig%bQP62I) z<_VMI`V>2mwdD}HyR5kYU3r2?LS}Se=>CVXoSn+!fl=CIeOqGy!38&_xD#D#W9 z62#4f^6~Y%9IgveaDXEPC2E0d1ZCCe=e(NX)USPPEFeUMP(O)iHawK;EB}nH8>zr7 z5fN$PkVSUnVK`hinMDv$2*Y*+pHhMdHfsyiE^2r;Eqiu40Uhi>69*^vbj?cSpJhSm zlJEG()lqvO2P6nArUod!<|sNgTqya^@Lw){PB9eVp!QSS;_bK!JBCyyEzS*gomfw<&(&E4I+;X8UK+%!A zV7EfI^vL@1(RvMy{AM016MF^Y$zc#XiP164Vkp3E8Ta%y3)Xgz+o9l8X%r8_WV+`( zD*hE4Lcb5{Ic7$0NFv|)IKjlJbyQI;2!b9>++-CVO!=6hx1tKaN=1VHqH>}Nepwu2HBnFfX%uT&DKvV-utsk%=V&Qgu6X$$0jS?2 zQmeZ8!gZ?=PoVJrWKJwBy%`Z?ED%_XO((8|d>}5G z>U`HyTQ;gNUtK^NZr|0#_4J3VzZh?)t)!rL)_Egr={KQhP$WiP z|GJe|4Q}hR7&NQKSPrkN42DDPXOt6(&L>L75bEfAR z9tmSy_+XvaW$C5yu)#Sy4yHUV$Mg5!FnAQ8Cpl3CLbVJ;U9@fvp81U?HRGD46&X+Z zlu{7~>S4!WsyQ_2Kytie#~CG8n)-lB%7;14ZVnd|@ejsC6u1#B9BO}UoKYVS2}(aT zabx6!_e2Fi!GN)N==rDuLz;?zhq@@weF9I#xRr$x+w{nAq$#@uz3G~c`iM15?#jYA^+Txd^ z^-N36!pLuQ9cg~%exp-q45?4{V2VvZlTa)vZdSK_v{sA(boCF^*$W>R(=lu13hT29Zbv1hpB6(yTp z7Y+0-GTce}Q6vXPVujrcsb6juc5(>$5%UoiN^c1E#;@?uU-P<@?KF(EA1TbB_Q81T`vX zDc>{KS23q8ewExBd0I^p?nXQON$-fG0KrE56O`^^v)I)pjq4}mTiVYjKKf$S8OjdH z1rD{@Gt0fn#CdE-u8Gf0Hk4@AVL8Y}KjIk)lnQJB)($n@z>7&XiNCML->s6(d@CH8Iv_YwQx5rA?OF1d<*7se3Xt0pr?+ zr623?o*CXV-@*m(7m2T%QB!vf7+QyYgYlqPe&utoY^?me2U6}vWb#VLN#MktL}Fh3 zr4}`E)<29iJ|J-P<2ucriY$r?u%}m7kUP+TmC#mE@v$;Dm#>f>7lIkyo*#%{sS&|$ z!t?BCL?UaURyp@e57 z1K#(jrV&3oSF8#Itd?Y)jNzf&YQjesz~oER@A5#)WNxy0=S06huqp%bO-H{5d9ia> z2oFgGLB=-H_U&sAM?6Euy_`d2k14M%=}qoVI|JvNu3dj^i3leJ3SLosWs^|E!>Zj^ zO;~)AHAwqaLmO4ejE>#zP7K#*m=_QOZ<{g2P(@Nnj<>Q=lgr95DTv*BB(D7r=m9A8 zHQB|k z11D7_fe}3kJMvcSMl0{}nRh->wAt1)UfcEM8#s4!=hwc@p=8Lf-O@mC6W&k|3lQIk zXP}Pjif3z18k7@>Bi)mycF2sX#L_=j?b zX+}t5dVQ(jUJAufvt?ZaD${uqQ0J_% zn@Y0J?I5S1RMENDf>vF&tb4|J?+UtA(`UeHhU+oy1an zyA=V=m2CbbIjocvM?I(#1>ZV`h9F?lB#5sPqsPaB&=of{2uNtbC3kxT9v+MCvN9D} z3D)%jn^mH1qIZBp^%L#js}Qd=7)%}0n8UdQIKbKY2Fes1e0SD|0Smm9S3}NvdhiFd zf{>m0w)#yNVfb5UmhS;kZ1N(QBlQ7pEZ>kRmC%2Lxx+tzd}c_7_XZpU&pAXU;gf}wC-%cN1ZC+{ml%nVe}_WP+E{r_)W8^gt=QYk zu9J1YfnP9skySHHCj1>*m!W3Kmr(|95tJ9mJfWY8Zhr~L(RnygN5=8?ymDn5 z)2IbTrdFaqW}zyT<9uFhbk${XKYIcZIj>%x~^*aA_00SUZ3P%=#kx% z2NxX2+%{WmzO}G5Ebd0z2pOwpcEomev6mU(lVd2JrhTB?^ouC2Xn6Y%CyhN%jWx0CF%REcWauX{KITiH6usdhn5x@w5zZ{GR5w__73i* z`?hdIUyqx7qw9q2XZp~NbzvbuPlI2%h8IG2#^^bFqxlL@V}2T%0{#of*A{xKt#Vmb zk(zTcLXQ-M@%KIR+vV4HzkZ_HIaQ~GI46!@Mk#uJGAOAk(LZyDBrHQGx50Zj@*Gx( zy;g9CS`(mnrzCr8WdBRET4!wyK5jmRo%LVs?A>DV^1+C!kMm$TKfoj`4}C@EM3#f{ zx-NS4&{}t6HiZp+zq5ht=mwBe{OTP*$tq(AI=9(`+#iu$rz`6zUr(#1m|iLzpGQVl z6>vVoII%CwwsKb>&u!{l;wxPJQCZUX?;f6~KK#)k#H0^#1%=Ge86m9Q)B#Bm_35X! zw8%!=VVs25$C^;+ynxnn(a$1)am$gO0G>LZd+Fdku>ceSPe((GRG#(El} zq!}%~qh4zpL1U~hbZE-`?FJ2Jr-J{}^Z15xqC;eBn*Ch>V}MEtH`bqC4@ zw92`o!9aDQn`J?&J(L4f)N3_`;fkJ5$c0$Y!O)@)mR{SvPVB%e3;UdA{l(EH0@2f- zcs|0yD7o4>2?Fpm02@drC&$&B;7eG;)$xbimz@zFaWYD}9ekYapGr|iqJo|f?RQAU zZ7Fmv03dwuR2~KV_B(>lqTFmZfI&v@pit&P?wAknbVv^@m0ng%<2R`&j$Ri|Qw4ZW zCMhabg;*_m4y{Q@kN6}jhnZWN&SUktMDW6*G?yo1;eKdNi%Ze+SrGNG`-sH(NOfA@4vE9XD}@el3u2HTn1v7<>Y5po+A#W{3^U zHc7^R^c>M~Wx(pu42*`l?|Yspa#sba=AQHO!SepeAQpL=JvC@QVQw-dafMBFhjpAt zjmQna@pEGtzP{bumB^}$M$ON*^cRA{fguyMI|iLo4f2>>k$Fxiy#S(^1RRqnQRWhr z`r|7eNiBa{rq_+INUE1}lZIZ42YJTB)`yB1g?2&MzYNeqnSIogt{hpkMtbA$ZqowW z$sNs`YRfJDRE$|+`)Dz7(+}J{dPf3GtJ2Z{hMi8cuR|deE?!(*=+vW$7Now4dQcmt zD)f|hR-^rB>oXsn2XQmj;^wtvpCJ+6cTEqE2SP`Ry17UJIwMXhr=8WLSqgrlK*{Hu zH-ctX5?jD)l;ra$wt6*ksYMKSOW!XN5vIFoOC13g&#Isyu;~P5`fP{)vWi#SV%1A6 zVE9_$&GP(x=m_`MW=WzmJc{++@3yihk4b-5+cr@A;LAHH*pPrq5Zjb_H|uC7pE~|a zFQPh3^>??G#|ZU3w_k4I!QTGN^aXE{l&j1rCc})Ws{BuSIo^J*HeAyFizLPfJZh%6 zhUPl0+|^q>SzOF113sj{MYoX{;)mseQScks^X`dB&+(eNtG^{*w;ngJ_DB8Oks z$K9cMdVey!Z^B@Hth1iz`~zqKcNTNspDEA2rJ4X4Qck+_1Th#xV4ML#$a zX!kOnJm#beB#1u|;^bpmlziD7b)l_jpZSeJuXKV3YQ3II^6+=x0&a{d$%i#hs#Rii z+{!f4$?LTH&H%%QwY-L{t{6*I0Q4)iA79y?jwn(QjBz)*$*SO^t2^Dw9_N-3suH~j#a>n7@YxRk5n zr3?=F@vX#Kg}>`uav#9qo+b&7B(?K~`ty3wDV=Ux8E3)W{y>po66*Y>a#@}g=*_`J{;mbJ&AoqJpLxU` zcZ2eF=HgnsfG$$Q@^|1hok(tLH6y`q)SaBp?xJ_z^$`#@Q6l>u7IJVrZ*gsWdeo4V0CQp~cD_O+v=ZEC^`*h8; zgbUPLTtnGOW-$0S*t%^}a@qem`%&(N`CDxZx)fMkls@_P1>^@ZgNY5Vjep2>bLyS~ z67C636@p4@Tjo9B*f2(2`NIH^_c->H{X=;FA!K|)Y(cV+{ntjNj#T;YX$@-%6-q?2v}z=?&?gu;CLV44*tQJo+ZIJS}|lhs|J0lT{juy%nt zD_(3Iypg!SaYvu7=dH@;KB5HQ^`w+Q!&j#wuch-mR(JfqBje$?3gPF;`PFlFG61ES zdwug*4EQ&@(vu6=m$MAAkz}Or;j6JaXul*R`bZ$6xaJ4EsNkNwn~31lKbH@F>bW4u z4d@YC&vpc{6#(c<4}U@%bUAf@A(mF>Bn6gjZ-qy!^&hdaWsXTkD%xg@lOvfk48zEt z)XIpuh!b`=5_DHb*sw9?eKiUs(Ii(tVX}9A>Y3=bM$3`GI{mup64c?jK5>bRZ}afc zPl|)cOI=B0x$Yq>2b9K2reamsDT_%P1^!S}0t#h!W1 zx>)BZP0$6*`chh)zyL6sgIP2B0=Uab8wqz=jtO#W1xQp-L7o?#))@3%zRlQQXpa4> zg~``_Uco=e6;j*{a%;E|h{xT>Y81>hE@Go#=7LqszHjVyt8E?>`dA%=fW!e zX?TaxJR@leIoHu(Ka8}U$?Z5Wl8f8jKh@uL3B6YOhUxUTreBR*hGF(nZfT7i_lh-f7rNBwNgMc z1tLZDA^3oq?91DY>gYq^N0YN2o0)q1Ks$-uou373{^8_`L`d^fvJ6^p22sOX$M*x% zhZ~eGe3@G5I7~J@-`mf=ny19$B7E17z7C6Z)&NXl9(3CGk0FcUU0{{^!wK}zT_Z}J ziYEJ%^sB2Wet(Ov^HU0jt;HVNUT7U%P$R*D>sW;_2Ej!CU7O2#K{6}MgRiONwQTBq z_-NOy+b>&Kz-)d*DCpR-deJHA!iuJ=lm5WC63?<8(DkhRhcgxjjBIOzBLZ9l2Q{sk zUlWBcE_S^ahKAU)dg!w>E>H<>wq~9-$n5_B{}9o5oh~o;khOE4t2RZNYb4U|#7MXg zRT5UOz%3R;$k6&)GtYSU;T@8vAluCP=%$L}xtspRERo@t=RID(T$yJXv;WB4YZ+bi zj0aXk*m669z3eK`v`iwjx(9h#NKOW>>Xt_EcIZKsj7N)Fkx%?ZddR3D^^vW=^mEWN z44r=(jflv)Ao08J9KJJA;G^Wa+SIoCjn=pzD^>7|sB_84rct01Fk4T~3l$s!%BiBR z8?xSo?ZICLska;V)ROldNqQ9jvADZLSCF<)mq@w*7iQ_I!e7?7dcevj1LScS095By zM|P$d>BGzOuL7_Pg?HS)1jQ4)_zx7s@6u@#P6>?c3-8RmW8LSDn>jg{yVzKdr=@EW zv^)-BQHLK;B1Hpj;e0n+_?@s*;jR_hyl^W)llaBr)Q*YBd=RiK*imDw*-t^7^W~8N zULhe}yq;hE9a{qIh7flH>&rp#W?sa(hfp$7_3V@Lb z+V!`XpEU55=|2elO#`}SK*Ep*l?(z9k@D=D&ox`dmFUGuEj-Q%iJxG0S|mPCr<_KF zo>6_U(6znraQ`r$V14s(QbkwGHuZ9jzPu4dBS@X1M5uQE6rgT90d$f1_MUhoPnS+8 z)B=Yffn{xE2kicK0waC1B6g_0aGlTQ%3;@1Vqq%yDP0GFa{K!1TT2-LQejgJFuDY0 zEHh-{GANN>!`MB2Y~umcg~U)fjPG+`{V$buz^2NCk(~ak8}Lr4oBn_nkT$|CF#`RZ z_#AcQB!QvGkwv2(dVC}=m1k)@{vOp4*#SEF8Os)8b2M_~E`K#i^VfKT5*qbuT2pOa z1YMleue}WrkwXHi4w~IqHLsbR%YZ@XR>f?QqA@02sBdmo>8kLP=buFPz6l#5J&P6L z9fGkh`BW+e)72~wNe`e|q0_zWoX^i=(xBzD`V%|}B1C^TY?>PD$4zanIcv0S4rzgFhA!E)FZ)wu z_x_#a&_6R%=;Q%SxdJDX20;O7I&Ee7#b?EIASyW8K{L$Rm{lUN+6!cF^LYjLF;F(H zK%NCoQ(u%y=WAK@U}42Zv5%N#p0Lm9*YB*$fP8=tA8purCfMp>wcD|^MhtT9Ed8J| zyaTNJlk<6zwk(^!!h?OrVEpi}Q7}^?c@_77S_;IFEA?$H4ClZqynQG>Ep3Nu32G&p z_(=9phjcMog0*G1i8uhEmbb91YsS>yRjU7PNS7HfN$+f3!H)lmQA3m5{9`g3Y`Z!x zt5PHNi@rMa5A+kp7$x+jtbayn7#sixsx?)B5u!Sr1xSul7)UEGa>q|gBN#4sL!GP+ z!{>=PZ`UI{_w~2XbBRbJuFpilb~~%HXwK@>H53>#OB_2tagvQxlomNyxtm7eEPcc; z(zq!w4`tMIGTKqu!ROaVHIJG_;a&)KUVOLVOCxg50C9rVjCM0jX11i4Q9DH{;$J~$OJKs%^@ zKH>owNHU#K&MRO===<7xf4h9&g6#J%Nq~)wgB=~c#kT&rSP&)h3zmaSXQN1a!vYXx zFzgaEod}Lp#p9BDC3vH#DR*9DIoPMBF;Bhpa9op{#NsoqcC;S*I8+QbN*_(h%+_W` zC@iE|j>x|#z>53$;(ONN??-1b_17+8_dT;Tmz8AogE2J)_MuKNXx+yzNe+|UFfqPz z8xI_f;zZK~!s-k0u@6v4QL{{n^uTQXB~k78?G)B1OUim^q-^#}Pod(tCeAdghhYW| z5T$|xr6IP(-X-V2wUrh61kXXY{Xq7V6XcRf4^P4%wIC~m%y+d}nb5|_2xJ-Bh;8gr zUa4cGN#KPFjTkU=f45Q?;pFA|nPX-R*Os%(;Z#54fCYmohjxv?A9qjf{yYthkdbM;s_%ttIb4*$?tWLLd#E|LNX&Ic2y%6otqBd#JW)^ z>%>i}qew8$NskfzK^6G`6^H@vUk<;cH5rFU5>Hu-&o`*A<^aY{VA_!+snyrRvtx;D zk7}fhLsGkA7bZ33*B8r>SPkrXC?&7xe|OLqg})3T%(cy4i{pbAadXI#$cH;Gvz9Z=3DOPG0fjJNc+W2@v?QLYT_F;xb29761O#)V~UM%`Jqkl+WBav zIL8|A(LWF_F%W~?D=o+fWL^3h#7?L(D17pi>SIi~BFNpusa(+vk%z~7H7D=bJ1cL? zLPowl?G+5Vy^;F=VTZ=Z?3uZgwA#d{mZ+u?MDlYa7~X0wxW;#dgBn!U>xU_jMWLVm zOuCVmM}=)nNjV9MwOI`5S`4BxB@{vNuZgNCfkh0LEAB%} zKm2|h_&`k2;HpINtG^OjtM2k(r@>xdu3PiZVSwT>HO7&NoKEO@V3j2QNJ?rQEPJb) zwL-vGIQooCQ=ewOOKps{iP|HNco#Tx zQzMRwZ-b$!Ie~Nod#2CD*PVRM70eGK+Sz*ERHP|?KR#raFGG)H(WdVJL#tLPhMu3g z;dErDSfCSmt91{tJBX2Bw)e89Syiy-GEeU4TVz&*|2o8^W>5mgqy?!3d3RM*UbwT) zf5?#r68T5hw!8}%oFM3m)|81#K=34cp%$Pf5$nffznx`C8J@Kx@O_()9b&NS-)L6Q z<)L74sOj*AsV~dTG(@7PR2pJro{Wx0IRM$fPCMgn%h0KvF$BQDxDbd*IZ`?% zzo{U{Pmz-)Xj(1<5^LmJ?kl#i(_l|GK%~(cY=_|~PhJ3^VL-vemf;Uv4Q$I>RH2OG z^ci6`cGXJGC0e&jNo)O$+9Wi720F@V^|4x_8F1}(-GX1PuiZnmXsKz(s)1{{pZCrnf;k7?!K6*^o20F2Q& zi-5tmL+nCRBrOz#=I?;;uq-C2!2NSfG^+<-t9+`qhv}}-aT^F4m1UMi#LF{=_(1-W7odfV$Tbst zo>qC6KNq!>8Yw9?mnHw|u{pTpli06}|Ge9}5j1${`#27{(x?3n^Jl+|dI}*|+xQzY z7I{+iXN#FUXc?N#1n(daawR1mGl;3jv?plb43xI3??Fs7py_3+o}*|>x$zqF?`IY> zRieAG#%p`T7iw*ie{qe0(rirs>W7}gg_^Hi7I-m$tUnR~u|}K_q8;1H(E+L2+IYJ( z!2#<4xO;@Mof^@(;f4&y?yUDaPl+T^D`blbYiU?v-i0_p~xEkmv`1Ys^$eLN2Z#loI)0K(&|? z+V)QgmbbB(2Xucz;frI0ya1B~MJ$K`E?QzvSm7 za0hheQ?Y8`S5@*mZ`g?Qo0zKL3Dn&KstcYPplCKF%idYm-0~E_`?0S=O18D|9ue7Z zBF;NAkmRJUBaeYA;emDJ!1Ys#I4jNcRhkzJ{|Ugu;Ad0)@-5W~z@)Qv?!XItmeinx zwgN2HMk;f&9UOx|U6CGo`E4!m?KK9(s}$|9F6hDwP2SZra9C0OGOH1+W}=RhcWNZ5 zs%6g}O^EUsAi4%-k)o?=sznU}+A}trhSrD$R@z}QX4RLT`V}*cjKR|sTz=Fl-bJ$k z0wmv8wl|^ybO&IPRb>2w;-Oz(y`?iymJT6BKgg;xHzNC${}aj0%G&Ua{yE*Z5dC9| zxn_9{$>`jlM=5386V9o%G;?6}RDk~1u(s_6-Heig);&$pYw(ZU071+N#BVD0B|))2 z9|vW|#svpTX3r}mdi>WuLveouUQiy8p2y~5!TL8%QDJn?guk2={fKS3PhGyv>Xw^c zO$C66s+$WhtHz9-m>pZckdj0Pk9&K2zwqsX*KGZqSC8riR?E>=zSW4v+<2|m4plbA zl@Cvei@c3)hxND-^Rw{T@LuJ1o^;#o9akCYGeO;H@GpceAOCLR$;L&p{}qSSeT?0{ zdVVq&CO=k1G{>E$(pV(e+%#6#1~Se?eopE+`>zBpw&*E%f{z7DWt5y`-nimG~H`~6U^8&Ap{VSa~d&(jkww>(1zB;F8 zI59k4vT`>A_Wx@2q|Jg{MHXUL`f$1Fb#TpRT#Or{fdW2W`10!(`)auV9{<(|T*{-VFaq$yvq)Qc(vyN9zA|ZdoI- zt&k99&iDx%`M1w)?m~ocf7qr!WC5?Jg!aE>oJSMzs0{UZqT7Ym?X&}W+&$5(bOqim i*T?_=M^M|^zw=LAJ~9{{(`+SW6 literal 0 HcmV?d00001 diff --git a/windows/deploy/mbr-to-gpt.md b/windows/deploy/mbr-to-gpt.md index f8b724027f..40afa86627 100644 --- a/windows/deploy/mbr-to-gpt.md +++ b/windows/deploy/mbr-to-gpt.md @@ -1,6 +1,6 @@ --- title: MBR2GPT -description: How to use the MBR2GPT tool to convert partitions +description: How to use the MBR2GPT tool to convert MBR partitions to GPT keywords: deploy, troubleshoot, windows, 10, upgrade, partition, mbr, gpt ms.prod: w10 ms.mktglfcycl: deploy @@ -15,7 +15,14 @@ localizationpriority: high **Applies to** - Windows 10 -MBR2GPT.EXE converts a disk from Master Boot Record (MBR) to GUID Partition Table (GPT) partition style without modifying or deleting data on the disk. +MBR2GPT.EXE converts a disk from Master Boot Record (MBR) to GUID Partition Table (GPT) partition style without modifying or deleting data on the disk. The tool is designed to be run from a Windows PE command prompt. + +MBR2GPT is available in Windows 10 version 1703, also known as Windows 10 Creator's Update, and later versions. The tool is available in both the full OS environment and the Windows Preinstallation Environment (WinPE). + +You can use MBR2GPT to perform the following: + +- Within the WinPE environment: Convert any attached MBR-formatted disk to GPT, including the system disk. +- From within the currently running OS: Convert any attached MBR-formatted disk to GPT, including the system disk. ## Syntax @@ -28,23 +35,236 @@ MBR2GPT.exe /validate|convert [/disk:] [/logs:] [/map: |/validate| Instructs MBR2GPT.exe to perform only the disk validation steps and report whether the disk is eligible for conversion. | |/convert| Instructs MBR2GPT.exe to perform the disk validation and to proceed with the conversion if all validation tests pass. | |/disk:\| Specifies the disk number of the disk to be converted to GPT. If not specified, the system disk is used. The mechanism used is the same as that used by the diskpart.exe tool **SELECT DISK SYSTEM** command.| -|/logs:\| Specifies the directory where MBR2GPT.exe logs should be written. If not specified, **%windir%** is used.| -|/map:\=\| Specifies additional partition type mappings between MBR and GPT.| -|/allowFullOS| By default, MBR2GPT.exe is blocked unless it is run from WinPE. This option overrides this block and enables disk conversion while running in the full Windows environment. You cannot convert the system disk using this option.| +|/logs:\| Specifies the directory where MBR2GPT.exe logs should be written. If not specified, **%windir%** is used. If specified, the directory must already exist, it will not be automatically created or overwritten.| +|/map:\=\| Specifies additional partition type mappings between MBR and GPT. The MBR partition number is specified in decimal notation, not hexidecimal. The GPT GUID can contain brackets (ex: /map:42={af9b60a0-1431-4f62-bc68-3311714a69ad}) but brackets are not required. | +|/allowFullOS| By default, MBR2GPT.exe is blocked unless it is run from WinPE. This option overrides this block and enables disk conversion while running in the full Windows environment.| |/silent| Suppresses all warning messages so that the utility can be used in scripts.| >You can use MBR2GPT to convert an MBR disk with BitLocker-encrypted volumes as long as protection has been suspended. To resume BitLocker after conversion, you will need to delete the existing protectors and recreate them. ## Examples +In the following example, disk 0 is validated for conversion. Errors and warnings are logged to the default location, **%windir%**. +``` +X:\>mbr2gpt /validate /disk:0 +MBR2GPT: Attempting to validate disk 0 +MBR2GPT: Retrieving layout of disk +MBR2GPT: Validating layout, disk sector size is: 512 +MBR2GPT: Validation completed successfully +``` + +In the following example: + +1. The current disk partition layout is displayed prior to conversion - three partitions are present on the MBR disk (disk 0): a system reserved partition, a Windows partition, and a recovery partition. A DVD-ROM is also present as volume 0. +2. The OS volume is selected, partitions are listed, and partition details are displayed for the OS partition. The [MBR partition type](https://msdn.microsoft.com/library/windows/desktop/aa363990.aspx) is **07** corresponding to the installable file system (IFS) type. +2. The MBR2GPT tool is used to convert disk 0. +3. The DISKPART tool displays that disk 0 is now using the GPT format. +4. The new disk layout is displayed - four partitions are present on the GPT disk: three are identical to the previous partitions and one is the new EFI system partition (volume 3). +5. The OS volume is selected again, and detail displays that it has been converted to [GPT partition type](https://msdn.microsoft.com/library/windows/desktop/aa365449.aspx) ebd0a0a2-b9e5-4433-87c0-68b6b72699c7 corresponding to the PARTITION_BASIC_DATA_GUID type. + +>As noted in the output from the MBR2GPT tool, you must make changes to the computer firmware so that the new EFI system partition will boot properly. + +``` +DISKPART> list volume + + Volume ### Ltr Label Fs Type Size Status Info + ---------- --- ----------- ----- ---------- ------- --------- -------- + Volume 0 F CENA_X64FRE UDF DVD-ROM 4027 MB Healthy + Volume 1 C System Rese NTFS Partition 499 MB Healthy + Volume 2 D Windows NTFS Partition 58 GB Healthy + Volume 3 E Recovery NTFS Partition 612 MB Healthy Hidden + +DISKPART> select volume 2 + +Volume 2 is the selected volume. + +DISKPART> list partition + + Partition ### Type Size Offset + ------------- ---------------- ------- ------- + Partition 1 Primary 499 MB 1024 KB +* Partition 2 Primary 58 GB 500 MB + Partition 3 Recovery 612 MB 59 GB + +DISKPART> detail partition + +Partition 2 +Type : 07 +Hidden: No +Active: No +Offset in Bytes: 524288000 + + Volume ### Ltr Label Fs Type Size Status Info + ---------- --- ----------- ----- ---------- ------- --------- -------- +* Volume 2 D Windows NTFS Partition 58 GB Healthy + +DISKPART> exit + +Leaving DiskPart... + +X:\>mbr2gpt /convert /disk:0 + +MBR2GPT will now attempt to convert disk 0. +If conversion is successful the disk can only be booted in GPT mode. +These changes cannot be undone! + +MBR2GPT: Attempting to convert disk 0 +MBR2GPT: Retrieving layout of disk +MBR2GPT: Validating layout, disk sector size is: 512 bytes +MBR2GPT: Trying to shrink the system partition +MBR2GPT: Trying to shrink the OS partition +MBR2GPT: Creating the EFI system partition +MBR2GPT: Installing the new boot files +MBR2GPT: Performing the layout conversion +MBR2GPT: Migrating default boot entry +MBR2GPT: Adding recovery boot entry +MBR2GPT: Fixing drive letter mapping +MBR2GPT: Conversion completed successfully +MBR2GPT: Before the new system can boot properly you need to switch the firmware to boot to UEFI mode! + +X:\>diskpart + +Microsoft DiskPart version 10.0.15048.0 + +Copyright (C) Microsoft Corporation. +On computer: MININT-K71F13N + +DISKPART> list disk + + Disk ### Status Size Free Dyn Gpt + -------- ------------- ------- ------- --- --- + Disk 0 Online 60 GB 0 B * + +DISKPART> select disk 0 + +Disk 0 is now the selected disk. + +DISKPART> list volume + + Volume ### Ltr Label Fs Type Size Status Info + ---------- --- ----------- ----- ---------- ------- --------- -------- + Volume 0 F CENA_X64FRE UDF DVD-ROM 4027 MB Healthy + Volume 1 D Windows NTFS Partition 58 GB Healthy + Volume 2 C System Rese NTFS Partition 499 MB Healthy Hidden + Volume 3 FAT32 Partition 100 MB Healthy Hidden + Volume 4 E Recovery NTFS Partition 612 MB Healthy Hidden + +DISKPART> select volume 1 + +Volume 1 is the selected volume. + +DISKPART> list partition + + Partition ### Type Size Offset + ------------- ---------------- ------- ------- + Partition 1 Recovery 499 MB 1024 KB +* Partition 2 Primary 58 GB 500 MB + Partition 4 System 100 MB 59 GB + Partition 3 Recovery 612 MB 59 GB + +DISKPART> detail partition + +Partition 2 +Type : ebd0a0a2-b9e5-4433-87c0-68b6b72699c7 +Hidden : No +Required: No +Attrib : 0000000000000000 +Offset in Bytes: 524288000 + + Volume ### Ltr Label Fs Type Size Status Info + ---------- --- ----------- ----- ---------- ------- --------- -------- +* Volume 1 D Windows NTFS Partition 58 GB Healthy + +``` + +X:>mbr2gpt /convert /disk:0 ## Specifications +### Disk conversion workflow -### Troubleshooting +The following diagram illustrates the high-level phases of the MBR-to-GPT conversion process: -#### Determining partition type +![Workflow](images/mbr2gpt-workflow.PNG) + +1. Disk validation is performed. +2. The disk is repartitioned to create an EFI system partition (ESP) if one does not already exist. +3. UEFI boot files are installed to the ESP. +4. GPT metatdata and layout information is applied. +5. The BCD store is updated. +6. Drive letter assignments are restored. + +### Disk validation + +Before any change to the disk is made, MBR2GPT validates the layout and geometry of the selected disk to ensure that: +- The disk is currently using MBR +- There is enough space not occupied by partitions to meet GPT’s reserved space requirements: + - 16KB + 2 sectors at the front of the disk + - 16KB + 1 sector at the end of the disk +- There are at most 3 primary partitions in the MBR partition table +- One of the partitions is set as active and is the system partition +- The BCD store on the system partition contains a default OS entry pointing to an OS partition +- The volume IDs can retrieved for each volume which has a drive letter assigned +- All partitions on the disk are of MBR types recognized by Windows or has a mapping specified using the /map command-line option + +If any of these checks fails, the conversion will not proceed and an error will be returned. + +### Creating an EFI system partition + +For Windows to remain bootable after the conversion, an EFI system partition (ESP) must be in place. MBR2GPT creates the ESP using the following rules: + +1. The existing MBR system partition is reused if it meets these requirements: + a. It is not also the OS or WinRE partition + b. It is at least 100MB (or 256MB for 4K-sector-size disks) in size + c. It is less than or equal to 1GB in size. This is a safety precaution to ensure it is not a data partition. + d. If the conversion is being performed from the full OS, the disk being converted is not the system disk. +2. If the existing MBR system partition cannot be reused, a new ESP is created by shrinking the OS partition. This new partition has a size of 100MB (or 256MB for 4K-sector-size disks) and is formatted FAT32. + +If the existing MBR system partition is not reused for the ESP, it is no longer by the boot process after the conversion. Other partitions are not modified. + +### Partition type mapping and partition attributes + +Since GPT partitions use a different set of type IDs than MBR partitions, each partition on the converted disk must be assigned a new type ID. The partition type mapping follows these rules: + +1. The ESP is always set to partition type PARTITION_SYSTEM_GUID (c12a7328-f81f-11d2-ba4b-00a0c93ec93b). +2. If an MBR partition is of a type that matches one of the entries specified in the /map switch, the specified GPT partition type ID is used. +3. If the MBR partition is of type 0x27, the partition is converted to a GPT partition of type PARTITION_MSFT_RECOVERY_GUID (de94bba4-06d1-4d40-a16a-bfd50179d6ac). +4. All other MBR partitions recognized by Windows are converted to GPT partitions of type PARTITION_BASIC_DATA_GUID (ebd0a0a2-b9e5-4433-87c0-68b6b72699c7). + +In addition to applying the correct partition types, partitions of type PARTITION_MSFT_RECOVERY_GUID also have the following GPT attributes set: +- GPT_ATTRIBUTE_PLATFORM_REQUIRED (0x0000000000000001) +- GPT_BASIC_DATA_ATTRIBUTE_NO_DRIVE_LETTER (0x8000000000000000) + +### Persisting drive letter assignments + +The conversion tool will attempt to remap all entries from **HKLM\SYSTEM\MountedDevices** that correspond to the volumes that are part of the converted disk. If an entry cannot be converted and it represents a drive letter assignment, an error will be issued at the console and in the log, giving the user the ability to manually perform the correct assignment of the drive letter. **Important**: this code runs after the layout conversion has taken place, so the operation cannot be undone at this stage. + +The conversion tool will obtain volume unique ID before and after the layout conversion, organizing this information into a lookup table. It will then iterate through all the entries in **HKLM\SYSTEM\MountedDevices**, and for each entry do the following: + +1. Check if the unique ID corresponds to any of the unique IDs for any of the volumes that are part of the converted disk. +2. If found, set the value to be the new unique ID, obtained after the layout conversion. +3. If the new unique ID cannot be set and the value name starts with \DosDevices, issue a console and log warning about the need for manual intervention in properly restoring the drive letter assignment. + +## Troubleshooting + +The tool will display status information in its output. Both validation and conversion are clear if any errors are encountered. For example, if one or more partitions do not translate properly, this is displayed and the conversion not performed. To view more detail about any errors that are encountered, see the associated log files. + +### Logs + +Two log files are created by the MBR2GPT tool: + +diagerr.xml +diagwrn.xml + +These files contain errors and warnings, respectively, encountered during disk validation and conversion. These tool-specific logs can be helpful in diagnosing problems with the tool, however they are not meant to replace the default Windows Setup log files: + +setupact.log +setuperr.log + +The default location for all these log files in Windows PE is %windir%. + +### Determining the partition type You can type the following command at a Windows PowerShell prompt to display the disk number and partition type. Example output is also shown. @@ -63,7 +283,22 @@ You can also view the partition type of a disk by opening the Disk Management to ![Volumes](images/mbr2gpt-volume.PNG) +If Windows PowerShell and Disk Management are not available, such as when you are using Windows PE, you can determine the partition type at a command prompt with the diskpart tool. To determine the partition style, type **diskpart** and then type **list disk**. See the following example: +``` +DISKPART> list disk + + Disk ### Status Size Free Dyn Gpt + -------- ------------- ------- ------- --- --- + Disk 0 Online 238 GB 0 B + Disk 1 Online 931 GB 0 B * +``` + +In this example, Disk 0 is formatted with the MBR partition style, and Disk 1 is formatted using GPT. + +### Interactive help + +To view a list of options available when using the tool, type **mbr2gpt /?**. See the following example: ``` @@ -105,11 +340,9 @@ Where: ``` - ## Related topics [Windows 10 FAQ for IT professionals](https://technet.microsoft.com/en-us/windows/dn798755.aspx)
[Windows 10 Enterprise system requirements](https://technet.microsoft.com/en-us/windows/dn798752.aspx)
[Windows 10 Specifications](https://www.microsoft.com/en-us/windows/Windows-10-specifications)
[Windows 10 IT pro forums](https://social.technet.microsoft.com/Forums/en-US/home?category=Windows10ITPro) -
[Fix Windows Update errors by using the DISM or System Update Readiness tool](https://support.microsoft.com/kb/947821) From 28fdb29580e81f2340bc74ee259d59f7e36a0ec2 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Thu, 2 Mar 2017 16:44:50 -0800 Subject: [PATCH 015/108] draft done --- windows/deploy/mbr-to-gpt.md | 123 +++++++++++++++++++---------------- 1 file changed, 68 insertions(+), 55 deletions(-) diff --git a/windows/deploy/mbr-to-gpt.md b/windows/deploy/mbr-to-gpt.md index 40afa86627..3cf9862d26 100644 --- a/windows/deploy/mbr-to-gpt.md +++ b/windows/deploy/mbr-to-gpt.md @@ -15,21 +15,26 @@ localizationpriority: high **Applies to** - Windows 10 -MBR2GPT.EXE converts a disk from Master Boot Record (MBR) to GUID Partition Table (GPT) partition style without modifying or deleting data on the disk. The tool is designed to be run from a Windows PE command prompt. +## Summary -MBR2GPT is available in Windows 10 version 1703, also known as Windows 10 Creator's Update, and later versions. The tool is available in both the full OS environment and the Windows Preinstallation Environment (WinPE). +**MBR2GPT.EXE** converts a disk from Master Boot Record (MBR) to GUID Partition Table (GPT) partition style without modifying or deleting data on the disk. The tool is designed to be run from a Windows PE command prompt. You can use MBR2GPT to perform the following: - Within the WinPE environment: Convert any attached MBR-formatted disk to GPT, including the system disk. - From within the currently running OS: Convert any attached MBR-formatted disk to GPT, including the system disk. +>MBR2GPT is available in Windows 10 version 1703, also known as Windows 10 Creator's Update, and later versions. +>The tool is available in both the full OS environment and the Windows Preinstallation Environment (WinPE). + ## Syntax ``` MBR2GPT.exe /validate|convert [/disk:] [/logs:] [/map:=] [/allowFullOS] ``` +### Options + | Option | Description | |----|-------------| |/validate| Instructs MBR2GPT.exe to perform only the disk validation steps and report whether the disk is eligible for conversion. | @@ -44,6 +49,8 @@ MBR2GPT.exe /validate|convert [/disk:] [/logs:] [/map: ## Examples +### Validatiion example + In the following example, disk 0 is validated for conversion. Errors and warnings are logged to the default location, **%windir%**. ``` @@ -54,6 +61,8 @@ MBR2GPT: Validating layout, disk sector size is: 512 MBR2GPT: Validation completed successfully ``` +### Conversion example + In the following example: 1. The current disk partition layout is displayed prior to conversion - three partitions are present on the MBR disk (disk 0): a system reserved partition, a Windows partition, and a recovery partition. A DVD-ROM is also present as volume 0. @@ -61,8 +70,9 @@ In the following example: 2. The MBR2GPT tool is used to convert disk 0. 3. The DISKPART tool displays that disk 0 is now using the GPT format. 4. The new disk layout is displayed - four partitions are present on the GPT disk: three are identical to the previous partitions and one is the new EFI system partition (volume 3). -5. The OS volume is selected again, and detail displays that it has been converted to [GPT partition type](https://msdn.microsoft.com/library/windows/desktop/aa365449.aspx) ebd0a0a2-b9e5-4433-87c0-68b6b72699c7 corresponding to the PARTITION_BASIC_DATA_GUID type. +5. The OS volume is selected again, and detail displays that it has been converted to [GPT partition type](https://msdn.microsoft.com/library/windows/desktop/aa365449.aspx) **ebd0a0a2-b9e5-4433-87c0-68b6b72699c7** corresponding to the **PARTITION_BASIC_DATA_GUID** type. +>[!IMPORTANT] >As noted in the output from the MBR2GPT tool, you must make changes to the computer firmware so that the new EFI system partition will boot properly. ``` @@ -178,15 +188,11 @@ Offset in Bytes: 524288000 ``` -X:>mbr2gpt /convert /disk:0 - ## Specifications ### Disk conversion workflow -The following diagram illustrates the high-level phases of the MBR-to-GPT conversion process: - -![Workflow](images/mbr2gpt-workflow.PNG) +The following steps illustrate high-level phases of the MBR-to-GPT conversion process: 1. Disk validation is performed. 2. The disk is repartitioned to create an EFI system partition (ESP) if one does not already exist. @@ -195,6 +201,10 @@ The following diagram illustrates the high-level phases of the MBR-to-GPT conver 5. The BCD store is updated. 6. Drive letter assignments are restored. +These steps are summarized in the diagram below: + +![Workflow](images/mbr2gpt-workflow.PNG) + ### Disk validation Before any change to the disk is made, MBR2GPT validates the layout and geometry of the selected disk to ensure that: @@ -250,55 +260,11 @@ The conversion tool will obtain volume unique ID before and after the layout con The tool will display status information in its output. Both validation and conversion are clear if any errors are encountered. For example, if one or more partitions do not translate properly, this is displayed and the conversion not performed. To view more detail about any errors that are encountered, see the associated log files. -### Logs - -Two log files are created by the MBR2GPT tool: - -diagerr.xml -diagwrn.xml - -These files contain errors and warnings, respectively, encountered during disk validation and conversion. These tool-specific logs can be helpful in diagnosing problems with the tool, however they are not meant to replace the default Windows Setup log files: - -setupact.log -setuperr.log - -The default location for all these log files in Windows PE is %windir%. - -### Determining the partition type - -You can type the following command at a Windows PowerShell prompt to display the disk number and partition type. Example output is also shown. - - -``` -PS C:\> Get-Disk | ft -Auto - -Number Friendly Name Serial Number HealthStatus OperationalStatus Total Size Partition Style ------- ------------- ------------- ------------ ----------------- ---------- --------------- -0 MTFDDAK256MAM-1K1 13050928F47C Healthy Online 238.47 GB MBR -1 ST1000DM003-1ER162 Z4Y3GD8F Healthy Online 931.51 GB GPT -``` - -You can also view the partition type of a disk by opening the Disk Management tool, right-clicking the disk number, clicking **Properties**, and then clicking the **Volumes** tab. See the following example: - -![Volumes](images/mbr2gpt-volume.PNG) - - -If Windows PowerShell and Disk Management are not available, such as when you are using Windows PE, you can determine the partition type at a command prompt with the diskpart tool. To determine the partition style, type **diskpart** and then type **list disk**. See the following example: - -``` -DISKPART> list disk - - Disk ### Status Size Free Dyn Gpt - -------- ------------- ------- ------- --- --- - Disk 0 Online 238 GB 0 B - Disk 1 Online 931 GB 0 B * -``` - -In this example, Disk 0 is formatted with the MBR partition style, and Disk 1 is formatted using GPT. - ### Interactive help -To view a list of options available when using the tool, type **mbr2gpt /?**. See the following example: +To view a list of options available when using the tool, type **mbr2gpt /?** + +See the following example: ``` @@ -336,8 +302,55 @@ Where: environment. By default, this tool can only be used from the Windows Preinstallation Environment. +``` + +### Logs + +Two log files are created by the MBR2GPT tool: + +- diagerr.xml +- diagwrn.xml + +These files contain errors and warnings, respectively, encountered during disk validation and conversion. These tool-specific logs can be helpful in diagnosing problems with the tool, however they are not meant to replace the default Windows Setup log files: + +- setupact.log +- setuperr.log + +The default location for all these log files in Windows PE is **%windir%**. + +### Determining the partition type + +You can type the following command at a Windows PowerShell prompt to display the disk number and partition type. Example output is also shown. + ``` +PS C:\> Get-Disk | ft -Auto + +Number Friendly Name Serial Number HealthStatus OperationalStatus Total Size Partition Style +------ ------------- ------------- ------------ ----------------- ---------- --------------- +0 MTFDDAK256MAM-1K1 13050928F47C Healthy Online 238.47 GB MBR +1 ST1000DM003-1ER162 Z4Y3GD8F Healthy Online 931.51 GB GPT +``` + +You can also view the partition type of a disk by opening the Disk Management tool, right-clicking the disk number, clicking **Properties**, and then clicking the **Volumes** tab. See the following example: + +![Volumes](images/mbr2gpt-volume.PNG) + + +If Windows PowerShell and Disk Management are not available, such as when you are using Windows PE, you can determine the partition type at a command prompt with the diskpart tool. To determine the partition style, type **diskpart** and then type **list disk**. See the following example: + +``` +DISKPART> list disk + + Disk ### Status Size Free Dyn Gpt + -------- ------------- ------- ------- --- --- + Disk 0 Online 238 GB 0 B + Disk 1 Online 931 GB 0 B * +``` + +In this example, Disk 0 is formatted with the MBR partition style, and Disk 1 is formatted using GPT. + + ## Related topics From cee4eac0aef5e15abb8d5325500635df8de14f90 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Thu, 2 Mar 2017 16:50:00 -0800 Subject: [PATCH 016/108] draft done --- windows/deploy/mbr-to-gpt.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/deploy/mbr-to-gpt.md b/windows/deploy/mbr-to-gpt.md index 3cf9862d26..5e0fff79f4 100644 --- a/windows/deploy/mbr-to-gpt.md +++ b/windows/deploy/mbr-to-gpt.md @@ -17,7 +17,7 @@ localizationpriority: high ## Summary -**MBR2GPT.EXE** converts a disk from Master Boot Record (MBR) to GUID Partition Table (GPT) partition style without modifying or deleting data on the disk. The tool is designed to be run from a Windows PE command prompt. +**MBR2GPT.EXE** converts a disk from Master Boot Record (MBR) to GUID Partition Table (GPT) partition style without modifying or deleting data on the disk. The tool is designed to be run from a Windows PE command prompt, but can also be run from the full Windows 10 operating system (OS). You can use MBR2GPT to perform the following: @@ -264,7 +264,7 @@ The tool will display status information in its output. Both validation and conv To view a list of options available when using the tool, type **mbr2gpt /?** -See the following example: +The following text is displayed: ``` @@ -320,7 +320,7 @@ The default location for all these log files in Windows PE is **%windir%**. ### Determining the partition type -You can type the following command at a Windows PowerShell prompt to display the disk number and partition type. Example output is also shown. +You can type the following command at a Windows PowerShell prompt to display the disk number and partition type. Example output is also shown: ``` From bd19a97d144b9df2ff46cd872d4dbfbe669c2576 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Thu, 2 Mar 2017 17:02:49 -0800 Subject: [PATCH 017/108] draft done --- windows/deploy/mbr-to-gpt.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/deploy/mbr-to-gpt.md b/windows/deploy/mbr-to-gpt.md index 5e0fff79f4..a5b06869f5 100644 --- a/windows/deploy/mbr-to-gpt.md +++ b/windows/deploy/mbr-to-gpt.md @@ -27,6 +27,8 @@ You can use MBR2GPT to perform the following: >MBR2GPT is available in Windows 10 version 1703, also known as Windows 10 Creator's Update, and later versions. >The tool is available in both the full OS environment and the Windows Preinstallation Environment (WinPE). +You can use MBR2GPT to convert an MBR disk with BitLocker-encrypted volumes as long as protection has been suspended. To resume BitLocker after conversion, you will need to delete the existing protectors and recreate them. + ## Syntax ``` @@ -41,12 +43,10 @@ MBR2GPT.exe /validate|convert [/disk:] [/logs:] [/map: |/convert| Instructs MBR2GPT.exe to perform the disk validation and to proceed with the conversion if all validation tests pass. | |/disk:\| Specifies the disk number of the disk to be converted to GPT. If not specified, the system disk is used. The mechanism used is the same as that used by the diskpart.exe tool **SELECT DISK SYSTEM** command.| |/logs:\| Specifies the directory where MBR2GPT.exe logs should be written. If not specified, **%windir%** is used. If specified, the directory must already exist, it will not be automatically created or overwritten.| -|/map:\=\| Specifies additional partition type mappings between MBR and GPT. The MBR partition number is specified in decimal notation, not hexidecimal. The GPT GUID can contain brackets (ex: /map:42={af9b60a0-1431-4f62-bc68-3311714a69ad}) but brackets are not required. | +|/map:\=\| Specifies additional partition type mappings between MBR and GPT. The MBR partition number is specified in decimal notation, not hexidecimal. The GPT GUID can contain brackets, for example: **/map:42={af9b60a0-1431-4f62-bc68-3311714a69ad}**. | |/allowFullOS| By default, MBR2GPT.exe is blocked unless it is run from WinPE. This option overrides this block and enables disk conversion while running in the full Windows environment.| |/silent| Suppresses all warning messages so that the utility can be used in scripts.| ->You can use MBR2GPT to convert an MBR disk with BitLocker-encrypted volumes as long as protection has been suspended. To resume BitLocker after conversion, you will need to delete the existing protectors and recreate them. - ## Examples ### Validatiion example @@ -355,7 +355,7 @@ In this example, Disk 0 is formatted with the MBR partition style, and Disk 1 is ## Related topics -[Windows 10 FAQ for IT professionals](https://technet.microsoft.com/en-us/windows/dn798755.aspx) +[Using MBR2GPT with Configuration Manager OSD](https://miketerrill.net/tag/mbr2gpt/)
[Windows 10 Enterprise system requirements](https://technet.microsoft.com/en-us/windows/dn798752.aspx)
[Windows 10 Specifications](https://www.microsoft.com/en-us/windows/Windows-10-specifications)
[Windows 10 IT pro forums](https://social.technet.microsoft.com/Forums/en-US/home?category=Windows10ITPro) From 2cc3440284892a9d910b3ca2fe74b270a0d867bb Mon Sep 17 00:00:00 2001 From: jcaparas Date: Thu, 2 Mar 2017 18:12:39 -0800 Subject: [PATCH 018/108] add powershell code snippet --- windows/keep-secure/code/example.ps1 | 53 +++++++++++++++++++ ...ows-defender-advanced-threat-protection.md | 19 +------ 2 files changed, 54 insertions(+), 18 deletions(-) create mode 100644 windows/keep-secure/code/example.ps1 diff --git a/windows/keep-secure/code/example.ps1 b/windows/keep-secure/code/example.ps1 new file mode 100644 index 0000000000..0cbdecefac --- /dev/null +++ b/windows/keep-secure/code/example.ps1 @@ -0,0 +1,53 @@ +$tenantId = '{Your Tenant ID}’ +$clientId = '{Your Client ID}' +$clientSecret = '{Your Client Secret}' + +$authUrl = "https://login.windows.net/{0}/oauth2/token" -f $tenantId + +$tokenPayload = @{ + "resource"='https://graph.windows.net' + "client_id" = $clientId + "client_secret" = $clientSecret + "grant_type"='client_credentials'} + +$response = Invoke-RestMethod $authUrl -Method Post -Body $tokenPayload +$token = $response.access_token + +$headers = @{ + "Content-Type"="application/json" + "Accept"="application/json" + "Authorization"="Bearer {0}" -f $token } + +$apiBaseUrl = "https://ti.securitycenter.windows.com/V1.0/" + +$alertDefinitions = + (Invoke-RestMethod ("{0}AlertDefinitions" -f $apiBaseUrl) -Method Get -Headers $headers).value + +$alertDefinitionPayload = @{ + "Name"= "The Alert's Name" + "Severity"= "Low" + "InternalDescription"= "An internal description of the Alert" + "Title"= "The Title" + + "UxDescription"= "Description of the alerts" + "RecommendedAction"= "The alert's recommended action" + "Category"= "Trojan" + "Enabled"= "true"} + +$alertDefinition = + Invoke-RestMethod ("{0}AlertDefinitions" -f $apiBaseUrl) ` + -Method Post -Headers $headers -Body ($alertDefinitionPayload | ConvertTo-Json) + +$alertDefinitionId = $alertDefinition.Id + +$iocPayload = @{ + "Type"="Sha1" + "Value"="dead1111eeaabbccddeeaabbccddee11ffffffff" + "DetectionFunction"="Equals" + "Enabled"="true" + "AlertDefinition@odata.bind"="AlertDefinitions({0})" -f $alertDefinitionId } + + +$ioc = + Invoke-RestMethod ("{0}IndicatorsOfCompromise" -f $apiBaseUrl) ` + -Method Post -Headers $headers -Body ($iocPayload | ConvertTo-Json) diff --git a/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md b/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md index b06391c16d..91887039fa 100644 --- a/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md @@ -37,24 +37,7 @@ The following example demonstrates how to obtain an Azure AD access token that y Replace the *tenant\_id*, *client_id*, and *client_secret* values with the ones you got from **Preferences settings** page in the portal: -``` - -$tenantId = '{Your Tenant ID} -$clientId = '{Your Client ID}' -$clientSecret = '{Your Client Secret}' - -$authUrl = "https://login.windows.net/{0}/oauth2/token" -f $tenantId - -$tokenPayload = @{ - "resource"='https://graph.windows.net' - "client_id" = $clientId - "client_secret" = $clientSecret - "grant_type"='client_credentials'} - -$response = Invoke-RestMethod $authUrl -Method Post -Body $tokenPayload -$token = $response.access_token - -``` +[!code[CustomTIAPI](./code/example.ps1#L1-L14)] ## Create headers The following example demonstrates how to create headers used for the requests with the API. From faf66032008f741826a35ff16e983e71245e1c3a Mon Sep 17 00:00:00 2001 From: jcaparas Date: Thu, 2 Mar 2017 19:33:20 -0800 Subject: [PATCH 019/108] add code lines --- windows/keep-secure/code/example.ps1 | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/keep-secure/code/example.ps1 b/windows/keep-secure/code/example.ps1 index 0cbdecefac..3bba0ef005 100644 --- a/windows/keep-secure/code/example.ps1 +++ b/windows/keep-secure/code/example.ps1 @@ -1,4 +1,4 @@ -$tenantId = '{Your Tenant ID}’ +$tenantId = '{Your Tenant ID}' $clientId = '{Your Client ID}' $clientSecret = '{Your Client Secret}' From 953d497b7f055f536633f28a58f2cfb61049d606 Mon Sep 17 00:00:00 2001 From: jcaparas Date: Thu, 2 Mar 2017 19:33:28 -0800 Subject: [PATCH 020/108] add codes --- ...ows-defender-advanced-threat-protection.md | 43 +++---------------- 1 file changed, 5 insertions(+), 38 deletions(-) diff --git a/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md b/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md index 91887039fa..199f4fcfb3 100644 --- a/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md @@ -37,60 +37,27 @@ The following example demonstrates how to obtain an Azure AD access token that y Replace the *tenant\_id*, *client_id*, and *client_secret* values with the ones you got from **Preferences settings** page in the portal: -[!code[CustomTIAPI](./code/example.ps1#L1-L14)] +[!code[-powershell][CustomTIAPI](./code/example.ps1#L1-L14)] ## Create headers The following example demonstrates how to create headers used for the requests with the API. -``` -$headers = @{} -$headers.Add("Content-Type", "application/json") -$headers.Add("Accept", "application/json") -$headers.Add("Authorization", "Bearer {0}" -f $token) +[!code[-powershell][CustomTIAPI](./code/example.ps1#L16-L19)] -``` ## Create calls to the custom threat intelligence API The following example demonstrates how to view all alert definition entities by creating a call to the API. -``` -$apiBaseUrl = "https://ti.securitycenter.windows.com/V1.0/" -$alertDefinitions = - (Invoke-RestMethod ("{0}AlertDefinitions" -f $apiBaseUrl) -Method Get -Headers $headers).value -``` +[!code[-powershell][CustomTIAPI](./code/example.ps1#L21-L24)] If this is the first time to use the API, the response is empty. ## Create a new alert definition The following example shows how to create a new alert definition. -``` -$alertDefinitionPayload = @{ - "Name"= "The Alert's Name" - "Severity"= "Low" - "InternalDescription"= "An internal description of the Alert" - "Title"= "The Title" - "UxDescription"= "Description of the alerts" - "RecommendedAction"= "The alert's recommended action" - "Category"= "Trojan" - "Enabled"= "true"} - - -$alertDefinition = - Invoke-RestMethod ("{0}AlertDefinitions" -f $apiBaseUrl) -Method Post -Headers $headers -Body ($alertDefinitionPayload | ConvertTo-Json) -``` +[!code[-powershell][CustomTIAPI](./code/example.ps1#L26-L39)] ## Create a new indicator of compromise The following example shows how to use the alert ID obtained from creating a new alert definition to create a new indicator of compromise. -``` -$iocPayload = @{ - "Type"="Sha1" - "Value"="dead1111eeaabbccddeeaabbccddee11ffffffff" - "DetectionFunction"="Equals" - "Enabled"="true" - "AlertDefinition@odata.bind"="AlertDefinitions({0})" -f $alertDefinitionId } - - -$ioc = Invoke-RestMethod ("{0}IndicatorsOfCompromise" -f $apiBaseUrl) -Method Post -Headers $headers -Body ($iocPayload | ConvertTo-Json) -``` +[!code[-powershell][CustomTIAPI](./code/example.ps1#L43-L53)] From 0de716bae56d120d97897db239a92ccf88a516b5 Mon Sep 17 00:00:00 2001 From: jcaparas Date: Thu, 2 Mar 2017 19:47:00 -0800 Subject: [PATCH 021/108] remove powershell --- ...code-windows-defender-advanced-threat-protection.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md b/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md index 199f4fcfb3..171ccbcc93 100644 --- a/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md @@ -37,27 +37,27 @@ The following example demonstrates how to obtain an Azure AD access token that y Replace the *tenant\_id*, *client_id*, and *client_secret* values with the ones you got from **Preferences settings** page in the portal: -[!code[-powershell][CustomTIAPI](./code/example.ps1#L1-L14)] +[!code[CustomTIAPI](./code/example.ps1#L1-L14)] ## Create headers The following example demonstrates how to create headers used for the requests with the API. -[!code[-powershell][CustomTIAPI](./code/example.ps1#L16-L19)] +[!code[CustomTIAPI](./code/example.ps1#L16-L19)] ## Create calls to the custom threat intelligence API The following example demonstrates how to view all alert definition entities by creating a call to the API. -[!code[-powershell][CustomTIAPI](./code/example.ps1#L21-L24)] +[!code[CustomTIAPI](./code/example.ps1#L21-L24)] If this is the first time to use the API, the response is empty. ## Create a new alert definition The following example shows how to create a new alert definition. -[!code[-powershell][CustomTIAPI](./code/example.ps1#L26-L39)] +[!code[CustomTIAPI](./code/example.ps1#L26-L39)] ## Create a new indicator of compromise The following example shows how to use the alert ID obtained from creating a new alert definition to create a new indicator of compromise. -[!code[-powershell][CustomTIAPI](./code/example.ps1#L43-L53)] +[!code[CustomTIAPI](./code/example.ps1#L43-L53)] From 66a3d95786fee31900cbeb0f6ca941c7509a555b Mon Sep 17 00:00:00 2001 From: jcaparas Date: Thu, 2 Mar 2017 20:15:34 -0800 Subject: [PATCH 022/108] add complete code --- ...ows-defender-advanced-threat-protection.md | 21 ++++++++++++------- 1 file changed, 13 insertions(+), 8 deletions(-) diff --git a/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md b/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md index 171ccbcc93..4c7572c61a 100644 --- a/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md @@ -32,32 +32,37 @@ These code examples demonstrate the following tasks: - [Create a new alert definition](#create-a-new-alert-definition) - [Create a new indicator of compromise](#create-a-new-indicator-of-compromise) -## Obtain an Azure AD access token +## Step 1: Obtain an Azure AD access token The following example demonstrates how to obtain an Azure AD access token that you can use to call methods in the custom threat intelligence API. After you obtain a token, you have 60 minutes to use this token in calls to the custom threat intelligence API before the token expires. After the token expires, you can generate a new token. -Replace the *tenant\_id*, *client_id*, and *client_secret* values with the ones you got from **Preferences settings** page in the portal: +Replace the *tenantid*, *clientid*, and *clientSecret* values with the ones you got from **Preferences settings** page in the portal: [!code[CustomTIAPI](./code/example.ps1#L1-L14)] -## Create headers -The following example demonstrates how to create headers used for the requests with the API. +## Step 2: Create headers used for the requests with the API +Use the following code to create the headers used for the requests with the API: [!code[CustomTIAPI](./code/example.ps1#L16-L19)] -## Create calls to the custom threat intelligence API -The following example demonstrates how to view all alert definition entities by creating a call to the API. +## Step 3: Create calls to the custom threat intelligence API +After creating the headers, you can now create calls to the API. The following example demonstrates how you can view all the alert definition entities: [!code[CustomTIAPI](./code/example.ps1#L21-L24)] If this is the first time to use the API, the response is empty. -## Create a new alert definition +## Step 4: Create a new alert definition The following example shows how to create a new alert definition. [!code[CustomTIAPI](./code/example.ps1#L26-L39)] ## Create a new indicator of compromise -The following example shows how to use the alert ID obtained from creating a new alert definition to create a new indicator of compromise. +You can now use the alert ID obtained from creating a new alert definition to create a new indicator of compromise. [!code[CustomTIAPI](./code/example.ps1#L43-L53)] + +## Complete code +You can use the complete code to create calls to the API. + +[!code[CustomTIAPI](./code/example.ps1#L1-L53)] From 8bf1e05b7f66f84ae64b0cf0db1875dbddd0ede5 Mon Sep 17 00:00:00 2001 From: jcaparas Date: Thu, 2 Mar 2017 20:20:12 -0800 Subject: [PATCH 023/108] add anchors --- ...indows-defender-advanced-threat-protection.md | 16 ++++++++++------ 1 file changed, 10 insertions(+), 6 deletions(-) diff --git a/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md b/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md index 4c7572c61a..76e7f4138e 100644 --- a/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md @@ -26,12 +26,13 @@ localizationpriority: high This article provides PowerShell code examples for using the custom threat intelligence API. These code examples demonstrate the following tasks: -- [Obtain an Azure AD access token](#obtain-an-azure-ad-access-token) -- [Create headers](#create-headers) -- [Create calls to the custom threat intelligence API](#create-calls-to-the-custom-threat-intelligence-api) -- [Create a new alert definition](#create-a-new-alert-definition) -- [Create a new indicator of compromise](#create-a-new-indicator-of-compromise) +- [Obtain an Azure AD access token](#token) +- [Create headers](#headers) +- [Create calls to the custom threat intelligence API](#calls) +- [Create a new alert definition](#alert-definition) +- [Create a new indicator of compromise](#ioc) + ## Step 1: Obtain an Azure AD access token The following example demonstrates how to obtain an Azure AD access token that you can use to call methods in the custom threat intelligence API. After you obtain a token, you have 60 minutes to use this token in calls to the custom threat intelligence API before the token expires. After the token expires, you can generate a new token. @@ -39,12 +40,13 @@ Replace the *tenantid*, *clientid*, and *clientSecret* values with the ones you [!code[CustomTIAPI](./code/example.ps1#L1-L14)] + ## Step 2: Create headers used for the requests with the API Use the following code to create the headers used for the requests with the API: [!code[CustomTIAPI](./code/example.ps1#L16-L19)] - + ## Step 3: Create calls to the custom threat intelligence API After creating the headers, you can now create calls to the API. The following example demonstrates how you can view all the alert definition entities: @@ -52,11 +54,13 @@ After creating the headers, you can now create calls to the API. The following e If this is the first time to use the API, the response is empty. + ## Step 4: Create a new alert definition The following example shows how to create a new alert definition. [!code[CustomTIAPI](./code/example.ps1#L26-L39)] + ## Create a new indicator of compromise You can now use the alert ID obtained from creating a new alert definition to create a new indicator of compromise. From 3df3711ed7baf61e49ea02f01c4d4d0aa16aa318 Mon Sep 17 00:00:00 2001 From: Celeste de Guzman Date: Thu, 2 Mar 2017 20:42:05 -0800 Subject: [PATCH 024/108] added description per SEO advice and looked for broken image --- smb/{ => images}/cloud-mode-business-setup.md | 6 +++--- smb/index.md | 2 +- 2 files changed, 4 insertions(+), 4 deletions(-) rename smb/{ => images}/cloud-mode-business-setup.md (99%) diff --git a/smb/cloud-mode-business-setup.md b/smb/images/cloud-mode-business-setup.md similarity index 99% rename from smb/cloud-mode-business-setup.md rename to smb/images/cloud-mode-business-setup.md index f141dfe74e..1b4ad0385d 100644 --- a/smb/cloud-mode-business-setup.md +++ b/smb/images/cloud-mode-business-setup.md @@ -79,13 +79,13 @@ If this is the first time you're setting this up, and you'd like to see how it's **Figure 4** - Option to add or buy a domain - ![Add or buy a domain in O365 admin center](images/office365_buy_domain.png) + ![Add or buy a domain in Office 365 admin center](images/office365_buy_domain.png) 2. In the **Home > Domains** page, you will see the Microsoft-provided domain, such as *fabrikamdesign.onmicrosoft.com*. **Figure 5** - Microsoft-provided domain - ![Microsoft provided domain](images/office365_ms_provided_domain.png) + ![Microsoft-provided domain](images/office365_ms_provided_domain.png) - If you already have a domain, select **+ Add domain** to add your existing domain. If you select this option, you'll be required to verify that you own the domain. Follow the steps in the wizard to verify your domain. - If you don't already own a domain, select **+ Buy domain**. If you're using a trial plan, you'll be required to upgrade your trial plan in order to buy a domain. Choose the subscription plan to use for your business and provide the details to complete your order. @@ -94,7 +94,7 @@ If this is the first time you're setting this up, and you'd like to see how it's **Figure 6** - Domains - ![Verify your domains in O365 admin center](images/office365_additional_domain.png) + ![Verify your domains in Office 365 admin center](images/office365_additional_domain.png) ### 1.2 Add users and assign product licenses Once you've set up Office and added your domain, it's time to add users so they have access to Office 365. People in your organization need an account before they can sign in and access Office 365. The easiest way to add users is to add them one at a time in the Office 365 admin center. diff --git a/smb/index.md b/smb/index.md index 2d81f94e50..e110eb7d93 100644 --- a/smb/index.md +++ b/smb/index.md @@ -1,6 +1,6 @@ --- title: Windows 10 for small to midsize businesses -description: Learn how to use Windows 10 for your small to midsize business. +description: Microsoft products and devices to transform and grow your businessLearn how to use Windows 10 for your small to midsize business. keywords: Windows 10, SMB, small business, midsize business, business ms.prod: w10 ms.mktglfcycl: deploy From ede9d961e6323b846bfe1f08c11adfd095f23baa Mon Sep 17 00:00:00 2001 From: jcaparas Date: Thu, 2 Mar 2017 20:47:34 -0800 Subject: [PATCH 025/108] add sample python code update python topic --- windows/keep-secure/code/exampe.py | 53 ++++++++++ ...ows-defender-advanced-threat-protection.md | 97 +++++-------------- 2 files changed, 78 insertions(+), 72 deletions(-) create mode 100644 windows/keep-secure/code/exampe.py diff --git a/windows/keep-secure/code/exampe.py b/windows/keep-secure/code/exampe.py new file mode 100644 index 0000000000..7bf906738c --- /dev/null +++ b/windows/keep-secure/code/exampe.py @@ -0,0 +1,53 @@ +import json +import requests +from pprint import pprint + +tenant_id="{your tenant ID}" +client_id="{your client ID}" +client_secret="{your client secret}" + +auth_url = "https://login.windows.net/{0}/oauth2/token".format(tenant_id) + +payload = {"resource": "https://graph.windows.net", + "client_id": client_id, + "client_secret": client_secret, + "grant_type": "client_credentials"} + +response = requests.post(auth_url, payload) +token = json.loads(response.text)["access_token"] + +with requests.Session() as session: + session.headers = { + 'Authorization': 'Bearer {}'.format(token), + 'Content-Type': 'application/json', + 'Accept': 'application/json'} + + response = session.get("https://ti.securitycenter.windows.com/V1.0/AlertDefinitions") + pprint(json.loads(response.text)) + + alert_definition = {"Name": "The alert's name", + "Severity": "Low", + "InternalDescription": "An internal description of the alert", + "Title": "The Title", + "UxDescription": "Description of the alerts", + "RecommendedAction": "The alert's recommended action", + "Category": "Trojan", + "Enabled": True} + + response = session.post( + "https://ti.securitycenter.windows.com/V1.0/AlertDefinitions", + json=alert_definition) + + alert_definition_id = json.loads(response.text)["Id"] + + ioc = {'Type': "Sha1", + 'Value': "dead1111eeaabbccddeeaabbccddee11ffffffff", + 'DetectionFunction': "Equals", + 'Enabled': True, + "AlertDefinition@odata.bind": "AlertDefinitions({0})".format(alert_definition_id)} + + response = session.post( + "https://ti.securitycenter.windows.com/V1.0/IndicatorsOfCompromise", + json=ioc) + + pprint(json.loads(response.text)) diff --git a/windows/keep-secure/python-example-code-windows-defender-advanced-threat-protection.md b/windows/keep-secure/python-example-code-windows-defender-advanced-threat-protection.md index 4b482cc066..e3414a7cb8 100644 --- a/windows/keep-secure/python-example-code-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/python-example-code-windows-defender-advanced-threat-protection.md @@ -27,95 +27,48 @@ localizationpriority: high You must [install](http://docs.python-requests.org/en/master/user/install/#install) the "[requests](http://docs.python-requests.org/en/master/)" python library. These code examples demonstrate the following tasks: -- [Obtain an Azure AD access token](#obtain-an-azure-ad-access-token) -- [Create request session object](#create-a-request's-session-object) -- [Create calls to the custom threat intelligence API](#create-calls-to-the-custom-threat-intelligence-api) -- [Create a new alert definition](#create-a-new-alert-definition) -- [Create a new indicator of compromise](#create-a-new-indicator-of-compromise) +- [Obtain an Azure AD access token](#token) +- [Create request session object](#session-object) +- [Create calls to the custom threat intelligence API](#calls) +- [Create a new alert definition](#alert-definition) +- [Create a new indicator of compromise](#ioc) -## Obtain an Azure AD access token + +## Step 1: Obtain an Azure AD access token The following example demonstrates how to obtain an Azure AD access token that you can use to call methods in the custom threat intelligence API. After you obtain a token, you have 60 minutes to use this token in calls to the custom threat intelligence API before the token expires. After the token expires, you can generate a new token. Replace the *tenant\_id*, *client_id*, and *client_secret* values with the ones you got from **Preferences settings** page in the portal: -``` - -import json -import requests -from pprint import pprint - -tenant_id="{your tenant ID}" -client_id="{your client ID" -client_secret="{your client secret}" - -full_auth_url = r"https://login.windows.net/{0}/oauth2/token".format(tenant_id) - -payload = {"resource": "https://graph.windows.net", - "client_id": client_id, - "client_secret": client_secret, - "grant_type": "client_credentials"} +[!code[CustomTIAPI](./code/example.py1#L1-L17)] -response = requests.post(full_auth_url, payload) -token = json.loads(response.text)["access_token"] -``` - -## Create request session object + +## Step 2: Create request session object Add HTTP headers to the session object, including the Authorization header with the token that was obtained. -``` -with requests.Session() as session: - session.headers = { - 'Authorization': 'Bearer {}'.format(token), - 'Content-Type': 'application/json', - 'Accept': 'application/json'} -``` +[!code[CustomTIAPI](./code/example.py1#L19-L23)] -## Create calls to the custom threat intelligence API -The following example shows how to view all of the alert definition entities by creating a call to the API. + +## Step 3: Create calls to the custom threat intelligence API +After adding HTTP headers to the session object, you can now create calls to the API. The following example demonstrates how you can view all the alert definition entities: ->[!NOTE] -> All code is still within the ```with``` statement with the same indention level. - -```json - -response = session.get("https://ti.securitycenter.windows.com/V1.0/AlertDefinitions") -pprint(json.loads(response.text)) -``` +[!code[CustomTIAPI](./code/example.py1#L25-L26)] If this is the first time to use the API, the response is empty. -## Create a new alert definition + +## Step 4: Create a new alert definition The following example shows how to create a new alert definition. -``` +[!code[CustomTIAPI](./code/example.py1#L28-L39)] -alert_definition = {"Name": "The Alert's Name", - "Severity": "Low", - "InternalDescription": "An internal description of the Alert", - "Title": "The Title", - "UxDescription": "Description of the alerts", - "RecommendedAction": "The alert's recommended action", - "Category": "Trojan", - "Enabled": True} + +## Step 5: Create a new indicator of compromise +You can now use the alert ID obtained from creating a new alert definition to create a new indicator of compromise. -response = session.post( - "https://ti.securitycenter.windows.com/V1.0/AlertDefinitions", - json=alert_definition) -``` +[!code[CustomTIAPI](./code/example.py1#L41-L51)] -## Create a new indicator of compromise -The following example shows how to use the alert ID obtained from creating a new alert definition to create a new indicator of compromise. +## Complete code +You can use the complete code to create calls to the API. -``` -alert_definition_id = json.loads(response.text)["Id"] - ioc = {'Type': "Sha1", - 'Value': "dead1111eeaabbccddeeaabbccddee11ffffffff", - 'DetectionFunction': "Equals", - 'Enabled': True, - "AlertDefinition@odata.bind": "AlertDefinitions({0})".format(alert_definition_id)} - - response = session.post( - "https://ti.securitycenter.windows.com/V1.0/IndicatorsOfCompromise", - json=ioc) -``` +[!code[CustomTIAPI](./code/example.py1#L1-L51)] From d06121c2af31dbb1d5cad01c9f9eddf2ec584f89 Mon Sep 17 00:00:00 2001 From: Celeste de Guzman Date: Thu, 2 Mar 2017 20:53:31 -0800 Subject: [PATCH 026/108] md file accidentally moved to images, moving back out --- smb/{images => }/cloud-mode-business-setup.md | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename smb/{images => }/cloud-mode-business-setup.md (100%) diff --git a/smb/images/cloud-mode-business-setup.md b/smb/cloud-mode-business-setup.md similarity index 100% rename from smb/images/cloud-mode-business-setup.md rename to smb/cloud-mode-business-setup.md From fc94a872db0820804dee40ddef326331b3b5f4fc Mon Sep 17 00:00:00 2001 From: jcaparas Date: Thu, 2 Mar 2017 20:56:03 -0800 Subject: [PATCH 027/108] update name of python code --- ...-windows-defender-advanced-threat-protection.md | 2 +- ...-windows-defender-advanced-threat-protection.md | 14 +++++++------- 2 files changed, 8 insertions(+), 8 deletions(-) diff --git a/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md b/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md index 76e7f4138e..9ec25133c4 100644 --- a/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md @@ -56,7 +56,7 @@ If this is the first time to use the API, the response is empty. ## Step 4: Create a new alert definition -The following example shows how to create a new alert definition. +The following example demonstrates how you to create a new alert definition. [!code[CustomTIAPI](./code/example.ps1#L26-L39)] diff --git a/windows/keep-secure/python-example-code-windows-defender-advanced-threat-protection.md b/windows/keep-secure/python-example-code-windows-defender-advanced-threat-protection.md index e3414a7cb8..f8eec68c61 100644 --- a/windows/keep-secure/python-example-code-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/python-example-code-windows-defender-advanced-threat-protection.md @@ -39,36 +39,36 @@ The following example demonstrates how to obtain an Azure AD access token that y Replace the *tenant\_id*, *client_id*, and *client_secret* values with the ones you got from **Preferences settings** page in the portal: -[!code[CustomTIAPI](./code/example.py1#L1-L17)] +[!code[CustomTIAPIpython](./code/example.py1#L1-L17)] ## Step 2: Create request session object Add HTTP headers to the session object, including the Authorization header with the token that was obtained. -[!code[CustomTIAPI](./code/example.py1#L19-L23)] +[!code[CustomTIAPIpython](./code/example.py1#L19-L23)] ## Step 3: Create calls to the custom threat intelligence API After adding HTTP headers to the session object, you can now create calls to the API. The following example demonstrates how you can view all the alert definition entities: -[!code[CustomTIAPI](./code/example.py1#L25-L26)] +[!code[CustomTIAPIpython](./code/example.py1#L25-L26)] If this is the first time to use the API, the response is empty. ## Step 4: Create a new alert definition -The following example shows how to create a new alert definition. +The following example demonstrates how you to create a new alert definition. -[!code[CustomTIAPI](./code/example.py1#L28-L39)] +[!code[CustomTIAPIpython](./code/example.py1#L28-L39)] ## Step 5: Create a new indicator of compromise You can now use the alert ID obtained from creating a new alert definition to create a new indicator of compromise. -[!code[CustomTIAPI](./code/example.py1#L41-L51)] +[!code[CustomTIAPIpython](./code/example.py1#L41-L51)] ## Complete code You can use the complete code to create calls to the API. -[!code[CustomTIAPI](./code/example.py1#L1-L51)] +[!code[CustomTIAPIpython](./code/example.py1#L1-L51)] From 00b2a73647682ef58d2f683aa3141ab77303fb9e Mon Sep 17 00:00:00 2001 From: jcaparas Date: Thu, 2 Mar 2017 20:57:30 -0800 Subject: [PATCH 028/108] update file name --- windows/keep-secure/code/{exampe.py => example.py} | 0 ...de-windows-defender-advanced-threat-protection.md | 12 ++++++------ 2 files changed, 6 insertions(+), 6 deletions(-) rename windows/keep-secure/code/{exampe.py => example.py} (100%) diff --git a/windows/keep-secure/code/exampe.py b/windows/keep-secure/code/example.py similarity index 100% rename from windows/keep-secure/code/exampe.py rename to windows/keep-secure/code/example.py diff --git a/windows/keep-secure/python-example-code-windows-defender-advanced-threat-protection.md b/windows/keep-secure/python-example-code-windows-defender-advanced-threat-protection.md index f8eec68c61..6260405baf 100644 --- a/windows/keep-secure/python-example-code-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/python-example-code-windows-defender-advanced-threat-protection.md @@ -39,20 +39,20 @@ The following example demonstrates how to obtain an Azure AD access token that y Replace the *tenant\_id*, *client_id*, and *client_secret* values with the ones you got from **Preferences settings** page in the portal: -[!code[CustomTIAPIpython](./code/example.py1#L1-L17)] +[!code[CustomTIAPI](./code/example.py#L1-L17)] ## Step 2: Create request session object Add HTTP headers to the session object, including the Authorization header with the token that was obtained. -[!code[CustomTIAPIpython](./code/example.py1#L19-L23)] +[!code[CustomTIAPI](./code/example.py#L19-L23)] ## Step 3: Create calls to the custom threat intelligence API After adding HTTP headers to the session object, you can now create calls to the API. The following example demonstrates how you can view all the alert definition entities: -[!code[CustomTIAPIpython](./code/example.py1#L25-L26)] +[!code[CustomTIAPI](./code/example.py#L25-L26)] If this is the first time to use the API, the response is empty. @@ -60,15 +60,15 @@ If this is the first time to use the API, the response is empty. ## Step 4: Create a new alert definition The following example demonstrates how you to create a new alert definition. -[!code[CustomTIAPIpython](./code/example.py1#L28-L39)] +[!code[CustomTIAPI](./code/example.py#L28-L39)] ## Step 5: Create a new indicator of compromise You can now use the alert ID obtained from creating a new alert definition to create a new indicator of compromise. -[!code[CustomTIAPIpython](./code/example.py1#L41-L51)] +[!code[CustomTIAPI](./code/example.py#L41-L51)] ## Complete code You can use the complete code to create calls to the API. -[!code[CustomTIAPIpython](./code/example.py1#L1-L51)] +[!code[CustomTIAPI](./code/example.py#L1-L51)] From 396063f29ec0ec56a67a8123b114e7c61cf11e31 Mon Sep 17 00:00:00 2001 From: jcaparas Date: Thu, 2 Mar 2017 21:00:22 -0800 Subject: [PATCH 029/108] add step 5 --- ...-example-code-windows-defender-advanced-threat-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md b/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md index 9ec25133c4..d8b9b38f4a 100644 --- a/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md @@ -61,7 +61,7 @@ The following example demonstrates how you to create a new alert definition. [!code[CustomTIAPI](./code/example.ps1#L26-L39)] -## Create a new indicator of compromise +## Step 5: Create a new indicator of compromise You can now use the alert ID obtained from creating a new alert definition to create a new indicator of compromise. [!code[CustomTIAPI](./code/example.ps1#L43-L53)] From 86810b957839e525b24120ee8927a51508d68fe5 Mon Sep 17 00:00:00 2001 From: jcaparas Date: Thu, 2 Mar 2017 21:04:26 -0800 Subject: [PATCH 030/108] minor edit --- ...-example-code-windows-defender-advanced-threat-protection.md | 2 +- ...-example-code-windows-defender-advanced-threat-protection.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md b/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md index d8b9b38f4a..c7e14c01db 100644 --- a/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md @@ -52,7 +52,7 @@ After creating the headers, you can now create calls to the API. The following e [!code[CustomTIAPI](./code/example.ps1#L21-L24)] -If this is the first time to use the API, the response is empty. +The response is empty on initial use of the API. ## Step 4: Create a new alert definition diff --git a/windows/keep-secure/python-example-code-windows-defender-advanced-threat-protection.md b/windows/keep-secure/python-example-code-windows-defender-advanced-threat-protection.md index 6260405baf..9bd1a6336b 100644 --- a/windows/keep-secure/python-example-code-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/python-example-code-windows-defender-advanced-threat-protection.md @@ -54,7 +54,7 @@ After adding HTTP headers to the session object, you can now create calls to the [!code[CustomTIAPI](./code/example.py#L25-L26)] -If this is the first time to use the API, the response is empty. +The response is empty on initial use of the API. ## Step 4: Create a new alert definition From d1b8b8699ff39b5feb012729e464728d56a811c3 Mon Sep 17 00:00:00 2001 From: Celeste de Guzman Date: Thu, 2 Mar 2017 21:09:19 -0800 Subject: [PATCH 031/108] some images are not showing up so added spaces to see if that fixes it --- smb/cloud-mode-business-setup.md | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/smb/cloud-mode-business-setup.md b/smb/cloud-mode-business-setup.md index 1b4ad0385d..be587b1251 100644 --- a/smb/cloud-mode-business-setup.md +++ b/smb/cloud-mode-business-setup.md @@ -46,6 +46,7 @@ See
Get Started with Office 365 for business. If this is the first time you're setting this up, and you'd like to see how it's done, you can follow these steps to get started: + 1. Go to the Office 365 page in the Microsoft Business site. Select **Try now** to use the Office 365 Business Premium Trial or select **Buy now** to sign up for Office 365 Business Premium. In this walkthrough, we'll select **Try now**. **Figure 1** - Try or buy Office 365 @@ -54,7 +55,9 @@ If this is the first time you're setting this up, and you'd like to see how it's 2. Fill out the sign up form and provide information about you and your company. 3. Create a user ID and password to use to sign into your account. + This step creates an onmicrosoft.com email address. You can use this email address to sign in to the various admin centers. Save your sign-in info so you can use it to sign into https://portal.office.com (the admin portal). + 4. Select **Create my account** and then enter the phone number you used in step 2 to verify your identity. You'll be asked to enter your verification code. 5. Select **You're ready to go...** which will take you to the Office 365 portal. @@ -65,21 +68,24 @@ If this is the first time you're setting this up, and you'd like to see how it's ![Office 365 portal](images/office365_portal.png) + 6. Select the **Admin** tile to go to the Office 365 admin center. 7. In the admin center, click **Next** to see the highlights and welcome info for the admin center. When you're done, click **Go to setup** to complete the Office 365 setup. This may take up to a half hour to complete. - + **Figure 3** - Office 365 admin center ![Office 365 admin center](images/office365_admin_portal.png) + 8. Go back to the Office 365 admin center to add or buy a domain. 1. Select the **Domains** option. **Figure 4** - Option to add or buy a domain ![Add or buy a domain in Office 365 admin center](images/office365_buy_domain.png) + 2. In the **Home > Domains** page, you will see the Microsoft-provided domain, such as *fabrikamdesign.onmicrosoft.com*. From 7dcaffc42e27de15ded1ad26a8395eb96fb9d53e Mon Sep 17 00:00:00 2001 From: jcaparas Date: Thu, 2 Mar 2017 21:24:50 -0800 Subject: [PATCH 032/108] remove line --- windows/keep-secure/code/example.ps1 | 1 - 1 file changed, 1 deletion(-) diff --git a/windows/keep-secure/code/example.ps1 b/windows/keep-secure/code/example.ps1 index 3bba0ef005..877292e484 100644 --- a/windows/keep-secure/code/example.ps1 +++ b/windows/keep-secure/code/example.ps1 @@ -28,7 +28,6 @@ $alertDefinitionPayload = @{ "Severity"= "Low" "InternalDescription"= "An internal description of the Alert" "Title"= "The Title" - "UxDescription"= "Description of the alerts" "RecommendedAction"= "The alert's recommended action" "Category"= "Trojan" From 75a78e6ebd6e1cae63c381c5e011a6a60ec499a5 Mon Sep 17 00:00:00 2001 From: jcaparas Date: Thu, 2 Mar 2017 21:45:38 -0800 Subject: [PATCH 033/108] fix related topics --- ...-ti-api-windows-defender-advanced-threat-protection.md | 8 +++++--- ...stom-ti-windows-defender-advanced-threat-protection.md | 6 ++++-- ...le-code-windows-defender-advanced-threat-protection.md | 7 +++++++ ...le-code-windows-defender-advanced-threat-protection.md | 7 +++++++ ...oncepts-windows-defender-advanced-threat-protection.md | 6 ++++-- ...stom-ti-windows-defender-advanced-threat-protection.md | 8 ++++++++ 6 files changed, 35 insertions(+), 7 deletions(-) diff --git a/windows/keep-secure/custom-ti-api-windows-defender-advanced-threat-protection.md b/windows/keep-secure/custom-ti-api-windows-defender-advanced-threat-protection.md index 7c5f60b159..eecae9a27a 100644 --- a/windows/keep-secure/custom-ti-api-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/custom-ti-api-windows-defender-advanced-threat-protection.md @@ -347,11 +347,13 @@ These parameters are compatible with the [OData V4 query language](http://docs.o ## Code examples The following articles provide detailed code examples that demonstrate how to use the custom threat intelligence API in several programming languages: -- PowerShell code examples -- Python code examples +- [PowerShell code examples](powershell-example-code-windows-defender-advanced-threat-protection.md) +- [Python code examples](python-example-code-windows-defender-advanced-threat-protection.md) ## Related topics -- [Understand threat intelligence](threat-indicator-concepts-windows-defender-advanced-threat-protection.md) +- [Understand threat intelligence concepts](threat-indicator-concepts-windows-defender-advanced-threat-protection.md) - [Enable the custom threat intelligence application](enable-custom-ti-windows-defender-advanced-threat-protection.md) +- [PowerShell code examples](powershell-example-code-windows-defender-advanced-threat-protection.md) +- [Python code examples](python-example-code-windows-defender-advanced-threat-protection.md) - [Troubleshoot custom threat intelligence issues](troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md) diff --git a/windows/keep-secure/enable-custom-ti-windows-defender-advanced-threat-protection.md b/windows/keep-secure/enable-custom-ti-windows-defender-advanced-threat-protection.md index 38074271e9..e62a85a083 100644 --- a/windows/keep-secure/enable-custom-ti-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/enable-custom-ti-windows-defender-advanced-threat-protection.md @@ -40,6 +40,8 @@ Before you can create custom threat intelligence (TI) using REST API, you'll nee You’ll need to use the access token in the Authorization header when doing REST API calls. ## Related topics -- [Understand threat intelligence](threat-indicator-concepts-windows-defender-advanced-threat-protection.md) -- [Create custom threat intelligence](custom-ti-api-windows-defender-advanced-threat-protection.md) +- [Understand threat intelligence concepts](threat-indicator-concepts-windows-defender-advanced-threat-protection.md) +- [Create custom threat intelligence alerts](custom-ti-api-windows-defender-advanced-threat-protection.md) +- [PowerShell code examples](powershell-example-code-windows-defender-advanced-threat-protection.md) +- [Python code examples](python-example-code-windows-defender-advanced-threat-protection.md) - [Troubleshoot custom threat intelligence issues](troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md) diff --git a/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md b/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md index c7e14c01db..5574319409 100644 --- a/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md @@ -70,3 +70,10 @@ You can now use the alert ID obtained from creating a new alert definition to cr You can use the complete code to create calls to the API. [!code[CustomTIAPI](./code/example.ps1#L1-L53)] + +## Related topics +- [Understand threat intelligence concepts](threat-indicator-concepts-windows-defender-advanced-threat-protection.md) +- [Enable the custom threat intelligence application](enable-custom-ti-windows-defender-advanced-threat-protection.md) +- [Create custom threat intelligence alerts](custom-ti-api-windows-defender-advanced-threat-protection.md) +- [Python code examples](python-example-code-windows-defender-advanced-threat-protection.md) +- [Troubleshoot custom threat intelligence issues](troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md) diff --git a/windows/keep-secure/python-example-code-windows-defender-advanced-threat-protection.md b/windows/keep-secure/python-example-code-windows-defender-advanced-threat-protection.md index 9bd1a6336b..36b0a25f3b 100644 --- a/windows/keep-secure/python-example-code-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/python-example-code-windows-defender-advanced-threat-protection.md @@ -72,3 +72,10 @@ You can now use the alert ID obtained from creating a new alert definition to cr You can use the complete code to create calls to the API. [!code[CustomTIAPI](./code/example.py#L1-L51)] + +## Related topics +- [Understand threat intelligence](threat-indicator-concepts-windows-defender-advanced-threat-protection.md) +- [Create custom threat intelligence alerts](custom-ti-api-windows-defender-advanced-threat-protection.md) +- [Enable the custom threat intelligence application](enable-custom-ti-windows-defender-advanced-threat-protection.md) +- [PowerShell code examples](powershell-example-code-windows-defender-advanced-threat-protection.md) +- [Troubleshoot custom threat intelligence issues](troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md) diff --git a/windows/keep-secure/threat-indicator-concepts-windows-defender-advanced-threat-protection.md b/windows/keep-secure/threat-indicator-concepts-windows-defender-advanced-threat-protection.md index 32dc72d7fd..835ddbf45a 100644 --- a/windows/keep-secure/threat-indicator-concepts-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/threat-indicator-concepts-windows-defender-advanced-threat-protection.md @@ -11,7 +11,7 @@ author: mjcaparas localizationpriority: high --- -# Understand threat indicators +# Understand threat intelligence concepts **Applies to:** @@ -49,5 +49,7 @@ IOCs have a many-to-one relationship with alert definitions such that an alert d ## Related topic - [Enable the custom threat intelligence application](enable-custom-ti-windows-defender-advanced-threat-protection.md) -- [Create custom threat indicators using REST API](custom-ti-api-windows-defender-advanced-threat-protection.md) +- [Create custom threat intelligence alerts](custom-ti-api-windows-defender-advanced-threat-protection.md) +- [PowerShell code examples](powershell-example-code-windows-defender-advanced-threat-protection.md) +- [Python code examples](python-example-code-windows-defender-advanced-threat-protection.md) - [Troubleshoot custom threat intelligence issues](troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md) diff --git a/windows/keep-secure/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md b/windows/keep-secure/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md index 5448e0e2f5..d63bd1bf4c 100644 --- a/windows/keep-secure/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md @@ -44,3 +44,11 @@ If your client secret expires or if you've misplaced the copy provided when you 6. Click **Save**. The key value is displayed. 7. Copy the value and save it in a safe place. + + +## Related topics +- [Understand threat intelligence](threat-indicator-concepts-windows-defender-advanced-threat-protection.md) +- [Enable the custom threat intelligence application](enable-custom-ti-windows-defender-advanced-threat-protection.md) +- [Create custom threat intelligence](custom-ti-api-windows-defender-advanced-threat-protection.md) +- [PowerShell code examples](powershell-example-code-windows-defender-advanced-threat-protection.md) +- [Python code examples](python-example-code-windows-defender-advanced-threat-protection.md) From 3fa36f50023ab83e1fd99a8e7270b2a0b7b5ac3f Mon Sep 17 00:00:00 2001 From: LizRoss Date: Fri, 3 Mar 2017 09:43:49 -0800 Subject: [PATCH 034/108] Adding content --- browsers/edge/available-policies.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/browsers/edge/available-policies.md b/browsers/edge/available-policies.md index 12e1c2171d..110429fbf6 100644 --- a/browsers/edge/available-policies.md +++ b/browsers/edge/available-policies.md @@ -16,6 +16,9 @@ localizationpriority: high - Windows 10, Windows Insider Program - Windows 10 Mobile, Windows Insider Program +> [!IMPORTANT] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + Microsoft Edge works with Group Policy and Microsoft Intune to help you manage your organization's computer settings. Group Policy objects (GPO's) can include registry-based Administrative Template policy settings, security settings, software deployment information, scripts, folder redirection, and preferences. By using Group Policy and Intune, you can set up a policy setting once, and then copy that setting onto many computers. For example, you can set up multiple security settings in a GPO that's linked to a domain, and then apply all of those settings to every computer in the domain. From 050f0773dbd70cf393e2bf80534321a683849bb3 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 3 Mar 2017 12:26:27 -0800 Subject: [PATCH 035/108] draft done --- windows/deploy/mbr-to-gpt.md | 68 ++++++++++++++++++++++++------------ 1 file changed, 45 insertions(+), 23 deletions(-) diff --git a/windows/deploy/mbr-to-gpt.md b/windows/deploy/mbr-to-gpt.md index a5b06869f5..a538b7d0f1 100644 --- a/windows/deploy/mbr-to-gpt.md +++ b/windows/deploy/mbr-to-gpt.md @@ -17,18 +17,22 @@ localizationpriority: high ## Summary -**MBR2GPT.EXE** converts a disk from Master Boot Record (MBR) to GUID Partition Table (GPT) partition style without modifying or deleting data on the disk. The tool is designed to be run from a Windows PE command prompt, but can also be run from the full Windows 10 operating system (OS). +**MBR2GPT.EXE** converts a disk from Master Boot Record (MBR) to GUID Partition Table (GPT) partition style without modifying or deleting data on the disk. The tool is designed to be run from a Windows Preinstallation Environment (Windows PE) command prompt, but can also be run from the full Windows 10 operating system (OS). You can use MBR2GPT to perform the following: -- Within the WinPE environment: Convert any attached MBR-formatted disk to GPT, including the system disk. +- Within the Windows PE environment: Convert any attached MBR-formatted disk to GPT, including the system disk. - From within the currently running OS: Convert any attached MBR-formatted disk to GPT, including the system disk. >MBR2GPT is available in Windows 10 version 1703, also known as Windows 10 Creator's Update, and later versions. ->The tool is available in both the full OS environment and the Windows Preinstallation Environment (WinPE). +>The tool is available in both the full OS environment and Windows PE. You can use MBR2GPT to convert an MBR disk with BitLocker-encrypted volumes as long as protection has been suspended. To resume BitLocker after conversion, you will need to delete the existing protectors and recreate them. +The MBR2GPT tool can convert operating system disks that are running earlier versions of Windows, such as Windows 10 versions 1507, 1511, and 1607. However, you must run the tool while booted into Windows 10 version 1703 or later, and perform an offline conversion. + +After the disk has been converted to GPT partition style, the firmware must be reconfigured to boot in UEFI mode. Make sure that your device supports UEFI before attempting to convert the disk. + ## Syntax ``` @@ -43,13 +47,12 @@ MBR2GPT.exe /validate|convert [/disk:] [/logs:] [/map: |/convert| Instructs MBR2GPT.exe to perform the disk validation and to proceed with the conversion if all validation tests pass. | |/disk:\| Specifies the disk number of the disk to be converted to GPT. If not specified, the system disk is used. The mechanism used is the same as that used by the diskpart.exe tool **SELECT DISK SYSTEM** command.| |/logs:\| Specifies the directory where MBR2GPT.exe logs should be written. If not specified, **%windir%** is used. If specified, the directory must already exist, it will not be automatically created or overwritten.| -|/map:\=\| Specifies additional partition type mappings between MBR and GPT. The MBR partition number is specified in decimal notation, not hexidecimal. The GPT GUID can contain brackets, for example: **/map:42={af9b60a0-1431-4f62-bc68-3311714a69ad}**. | -|/allowFullOS| By default, MBR2GPT.exe is blocked unless it is run from WinPE. This option overrides this block and enables disk conversion while running in the full Windows environment.| -|/silent| Suppresses all warning messages so that the utility can be used in scripts.| +|/map:\=\| Specifies additional partition type mappings between MBR and GPT. The MBR partition number is specified in decimal notation, not hexidecimal. The GPT GUID can contain brackets, for example: **/map:42={af9b60a0-1431-4f62-bc68-3311714a69ad}**. Multiple /map options can be specified if multiple mappings are required. | +|/allowFullOS| By default, MBR2GPT.exe is blocked unless it is run from Windows PE. This option overrides this block and enables disk conversion while running in the full Windows environment.| ## Examples -### Validatiion example +### Validation example In the following example, disk 0 is validated for conversion. Errors and warnings are logged to the default location, **%windir%**. @@ -70,7 +73,7 @@ In the following example: 2. The MBR2GPT tool is used to convert disk 0. 3. The DISKPART tool displays that disk 0 is now using the GPT format. 4. The new disk layout is displayed - four partitions are present on the GPT disk: three are identical to the previous partitions and one is the new EFI system partition (volume 3). -5. The OS volume is selected again, and detail displays that it has been converted to [GPT partition type](https://msdn.microsoft.com/library/windows/desktop/aa365449.aspx) **ebd0a0a2-b9e5-4433-87c0-68b6b72699c7** corresponding to the **PARTITION_BASIC_DATA_GUID** type. +5. The OS volume is selected again, and detail displays that it has been converted to the [GPT partition type](https://msdn.microsoft.com/library/windows/desktop/aa365449.aspx) **ebd0a0a2-b9e5-4433-87c0-68b6b72699c7** corresponding to the **PARTITION_BASIC_DATA_GUID** type. >[!IMPORTANT] >As noted in the output from the MBR2GPT tool, you must make changes to the computer firmware so that the new EFI system partition will boot properly. @@ -198,18 +201,14 @@ The following steps illustrate high-level phases of the MBR-to-GPT conversion pr 2. The disk is repartitioned to create an EFI system partition (ESP) if one does not already exist. 3. UEFI boot files are installed to the ESP. 4. GPT metatdata and layout information is applied. -5. The BCD store is updated. +5. The boot configuration data (BCD) store is updated. 6. Drive letter assignments are restored. -These steps are summarized in the diagram below: - -![Workflow](images/mbr2gpt-workflow.PNG) - ### Disk validation Before any change to the disk is made, MBR2GPT validates the layout and geometry of the selected disk to ensure that: - The disk is currently using MBR -- There is enough space not occupied by partitions to meet GPT’s reserved space requirements: +- There is enough space not occupied by partitions to store the primary and secondary GPTs: - 16KB + 2 sectors at the front of the disk - 16KB + 1 sector at the end of the disk - There are at most 3 primary partitions in the MBR partition table @@ -225,13 +224,13 @@ If any of these checks fails, the conversion will not proceed and an error will For Windows to remain bootable after the conversion, an EFI system partition (ESP) must be in place. MBR2GPT creates the ESP using the following rules: 1. The existing MBR system partition is reused if it meets these requirements: - a. It is not also the OS or WinRE partition - b. It is at least 100MB (or 256MB for 4K-sector-size disks) in size + a. It is not also the OS or Windows Recovery Environment partition + b. It is at least 100MB (or 260MB for 4K sector size disks) in size c. It is less than or equal to 1GB in size. This is a safety precaution to ensure it is not a data partition. d. If the conversion is being performed from the full OS, the disk being converted is not the system disk. -2. If the existing MBR system partition cannot be reused, a new ESP is created by shrinking the OS partition. This new partition has a size of 100MB (or 256MB for 4K-sector-size disks) and is formatted FAT32. +2. If the existing MBR system partition cannot be reused, a new ESP is created by shrinking the OS partition. This new partition has a size of 100MB (or 260MB for 4K sector size disks) and is formatted FAT32. -If the existing MBR system partition is not reused for the ESP, it is no longer by the boot process after the conversion. Other partitions are not modified. +If the existing MBR system partition is not reused for the ESP, it is no longer used by the boot process after the conversion. Other partitions are not modified. ### Partition type mapping and partition attributes @@ -246,9 +245,14 @@ In addition to applying the correct partition types, partitions of type PARTITIO - GPT_ATTRIBUTE_PLATFORM_REQUIRED (0x0000000000000001) - GPT_BASIC_DATA_ATTRIBUTE_NO_DRIVE_LETTER (0x8000000000000000) +For more information about partition types, see: +- [GPT partition types](https://msdn.microsoft.com/library/windows/desktop/aa365449.aspx) +- [MBR partition types](https://msdn.microsoft.com/library/windows/desktop/aa363990.aspx) + + ### Persisting drive letter assignments -The conversion tool will attempt to remap all entries from **HKLM\SYSTEM\MountedDevices** that correspond to the volumes that are part of the converted disk. If an entry cannot be converted and it represents a drive letter assignment, an error will be issued at the console and in the log, giving the user the ability to manually perform the correct assignment of the drive letter. **Important**: this code runs after the layout conversion has taken place, so the operation cannot be undone at this stage. +The conversion tool will attempt to remap all drive letter assignment information contained in the registry that correspond to the volumes of the converted disk. If a drive letter assignment cannot be restored, an error will be displayed at the console and in the log, so that you can manually perform the correct assignment of the drive letter. **Important**: this code runs after the layout conversion has taken place, so the operation cannot be undone at this stage. The conversion tool will obtain volume unique ID before and after the layout conversion, organizing this information into a lookup table. It will then iterate through all the entries in **HKLM\SYSTEM\MountedDevices**, and for each entry do the following: @@ -304,18 +308,36 @@ Where: ``` +### Return codes + +The following return codes are displayed by MBR2GPT: + +| Return code | Description | +|----|-------------| +|0| Conversion completed successfully.| +|1| Conversion was canceled by the user.| +|2| Conversion failed due to an internal error.| +|3| Conversion failed due to an initialization error.| +|4| Conversion failed due to invalid command-line parameters. | +|5| Conversion failed due to error reading the geometry and layout of the selected disk.| +|6| Conversion failed because one or more volumes on the disk is encrypted.| +|7| Conversion failed because the geometry and layout of the selected disk do not meet requirements.| +|8| Conversion failed due to error while creating the EFI system partition.| +|9| Conversion failed due to error installing boot files.| +|10| Conversion failed due to error while applying GPT layout.| +|100| Conversion to GPT layout succeeded, but some boot configuration data entries could not be restored.| + ### Logs -Two log files are created by the MBR2GPT tool: +Four log files are created by the MBR2GPT tool: - diagerr.xml - diagwrn.xml - -These files contain errors and warnings, respectively, encountered during disk validation and conversion. These tool-specific logs can be helpful in diagnosing problems with the tool, however they are not meant to replace the default Windows Setup log files: - - setupact.log - setuperr.log +These files contain errors and warnings, respectively, encountered during disk validation and conversion. These logs can be helpful in diagnosing problems with the tool. The setupact.log and setuperr.log files will have the most detailed information about disk layouts and other information and processes that are encountered during validation and conversion. Note: The setupact*.log files are different than the Windows Setup files that are found in the %Windir%\Panther directory. + The default location for all these log files in Windows PE is **%windir%**. ### Determining the partition type From 5724c5c39bd455f15457a41738ae22db2dba7a18 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 3 Mar 2017 12:40:34 -0800 Subject: [PATCH 036/108] draft done --- windows/deploy/mbr-to-gpt.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/deploy/mbr-to-gpt.md b/windows/deploy/mbr-to-gpt.md index a538b7d0f1..fe519db347 100644 --- a/windows/deploy/mbr-to-gpt.md +++ b/windows/deploy/mbr-to-gpt.md @@ -31,7 +31,8 @@ You can use MBR2GPT to convert an MBR disk with BitLocker-encrypted volumes as l The MBR2GPT tool can convert operating system disks that are running earlier versions of Windows, such as Windows 10 versions 1507, 1511, and 1607. However, you must run the tool while booted into Windows 10 version 1703 or later, and perform an offline conversion. -After the disk has been converted to GPT partition style, the firmware must be reconfigured to boot in UEFI mode. Make sure that your device supports UEFI before attempting to convert the disk. +>[!IMPORTANT] +>After the disk has been converted to GPT partition style, the firmware must be reconfigured to boot in UEFI mode. Make sure that your device supports UEFI before attempting to convert the disk. ## Syntax @@ -73,9 +74,8 @@ In the following example: 2. The MBR2GPT tool is used to convert disk 0. 3. The DISKPART tool displays that disk 0 is now using the GPT format. 4. The new disk layout is displayed - four partitions are present on the GPT disk: three are identical to the previous partitions and one is the new EFI system partition (volume 3). -5. The OS volume is selected again, and detail displays that it has been converted to the [GPT partition type](https://msdn.microsoft.com/library/windows/desktop/aa365449.aspx) **ebd0a0a2-b9e5-4433-87c0-68b6b72699c7** corresponding to the **PARTITION_BASIC_DATA_GUID** type. +5. The OS volume is selected again, and detail displays that it has been converted to the [GPT partition type](https://msdn.microsoft.com/library/windows/desktop/aa365449.aspx)   **ebd0a0a2-b9e5-4433-87c0-68b6b72699c7** corresponding to the **PARTITION_BASIC_DATA_GUID** type. ->[!IMPORTANT] >As noted in the output from the MBR2GPT tool, you must make changes to the computer firmware so that the new EFI system partition will boot properly. ``` From 8d627a6d4de37abd602947631ff4c4c7ca59d635 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 3 Mar 2017 12:43:18 -0800 Subject: [PATCH 037/108] draft done --- windows/deploy/mbr-to-gpt.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/windows/deploy/mbr-to-gpt.md b/windows/deploy/mbr-to-gpt.md index fe519db347..e3082d8322 100644 --- a/windows/deploy/mbr-to-gpt.md +++ b/windows/deploy/mbr-to-gpt.md @@ -36,10 +36,14 @@ The MBR2GPT tool can convert operating system disks that are running earlier ver ## Syntax +