From 2ac69b52b526e21164189e4886a53f057b5510fc Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Tue, 22 Aug 2017 14:31:58 +0000 Subject: [PATCH 01/22] Merged PR 2804: Fix link to download in Surface Hub content --- devices/surface-hub/surface-hub-downloads.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface-hub/surface-hub-downloads.md b/devices/surface-hub/surface-hub-downloads.md index 0adb44a4fc..10a0151d96 100644 --- a/devices/surface-hub/surface-hub-downloads.md +++ b/devices/surface-hub/surface-hub-downloads.md @@ -23,7 +23,7 @@ This topic provides links to useful Surface Hub documents, such as product datas | [Surface Hub User Guide (PDF)](http://download.microsoft.com/download/3/6/B/36B6331E-0C63-4E71-A05D-EE88D05081F8/surface-hub-user-guide-en-us.pdf) | Learn how to use Surface Hub in scheduled or ad-hoc meetings. Invite remote participants, use the built-in tools, save data from your meeting, and more. | | [Surface Hub Replacement PC Drivers](https://www.microsoft.com/download/details.aspx?id=52210) | The Surface Hub Replacement PC driver set is available for those customers who have chosen to disable the Surface Hub’s internal PC and use an external computer with their 84” or 55” Surface Hub. This download is meant to be used with the Surface Hub Admin Guide , which contains further details on configuring a Surface Hub Replacement PC. | | [Surface Hub SSD Replacement Guide (PDF)](https://www.microsoft.com/surface/en-us/support/surfacehubssd) | Learn how to replace the solid state drive (SSD) for the 55- and 84-inch Surface Hub. | -| [Microsoft Surface Hub Rollout and Adoption Success Kit (ZIP)](http://download.microsoft.com/download/F/A/3/FA3ADEA4-4966-456B-8BDE-0A594FD52C6C/Surface%20Hub%20RASK.zip) | Best practices for generating awareness and implementing change management to maximize adoption, usage, and benefits of Microsoft Surface Hub. The Rollout and Adoption Success Kit zip file includes the Rollout and Adoption Success Kit detailed document, Surface Hub presentation, demo guidance, awareness graphics, and more. | +| [Microsoft Surface Hub Rollout and Adoption Success Kit (ZIP)](http://download.microsoft.com/download/F/A/3/FA3ADEA4-4966-456B-8BDE-0A594FD52C6C/Surface_Hub_Adoption_Kit_Final_0519.pdf) | Best practices for generating awareness and implementing change management to maximize adoption, usage, and benefits of Microsoft Surface Hub. The Rollout and Adoption Success Kit zip file includes the Rollout and Adoption Success Kit detailed document, Surface Hub presentation, demo guidance, awareness graphics, and more. | | [Unpacking Guide for 84-inch Surface Hub (PDF)](https://www.microsoft.com/surface/support/surface-hub/surface-hub-unpacking-guide-84) | Learn how to unpack your 84-inch Surface Hub efficiently and safely. [Watch the video (opens in a pop-up media player)](http://compass.xbox.com/assets/75/2b/752b73dc-6e9d-4692-8ba1-0f9fc03bff6b.mov?n=04.07.16_installation_video_03_unpacking_84.mov) | | [Unpacking Guide for 55-inch Surface Hub (PDF)](https://www.microsoft.com/surface/support/surface-hub/surface-hub-unpacking-guide-55) | Learn how to unpack your 55-inch Surface Hub efficiently and safely. [Watch the video (opens in a pop-up media player)](http://compass.xbox.com/assets/a9/d6/a9d6b4d7-d33f-4e8b-be92-28f7fc2c06d7.mov?n=04.07.16_installation_video_02_unpacking_55.mov) | | [Wall Mounting and Assembly Guide (PDF)](https://www.microsoft.com/surface/support/surface-hub/surface-hub-wall-mounting-assembly-guide) | Detailed instructions on how to safely and securely assemble the wall brackets, and how to mount your Surface Hub onto them. [Watch the video (opens in a pop-up media player)](http://compass.xbox.com/assets/bf/4d/bf4d6f06-370c-45ee-88e6-c409873914e8.mov?n=04.07.16_installation_video_05_wall_mount.mov) | From e4b2e3e70cedd4898bf26f94ad998fa9348be06c Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Tue, 22 Aug 2017 14:42:15 +0000 Subject: [PATCH 02/22] Merged PR 2805: Add topic for Authenticator app --- devices/surface-hub/TOC.md | 1 + .../surface-hub/change-history-surface-hub.md | 9 +- devices/surface-hub/images/approve-signin.png | Bin 0 -> 33063 bytes .../surface-hub/images/approve-signin2.png | Bin 0 -> 33650 bytes devices/surface-hub/images/attendees.png | Bin 0 -> 46865 bytes devices/surface-hub/images/mfa-options.png | Bin 0 -> 62968 bytes devices/surface-hub/images/sign-in.png | Bin 0 -> 123100 bytes devices/surface-hub/manage-surface-hub.md | 1 + .../surface-hub-authenticator-app.md | 78 ++++++++++++++++++ 9 files changed, 87 insertions(+), 2 deletions(-) create mode 100644 devices/surface-hub/images/approve-signin.png create mode 100644 devices/surface-hub/images/approve-signin2.png create mode 100644 devices/surface-hub/images/attendees.png create mode 100644 devices/surface-hub/images/mfa-options.png create mode 100644 devices/surface-hub/images/sign-in.png create mode 100644 devices/surface-hub/surface-hub-authenticator-app.md diff --git a/devices/surface-hub/TOC.md b/devices/surface-hub/TOC.md index 240bcc485e..74d61c7720 100644 --- a/devices/surface-hub/TOC.md +++ b/devices/surface-hub/TOC.md @@ -33,6 +33,7 @@ ### [Install apps on your Surface Hub](install-apps-on-surface-hub.md) ### [Set up and use Whiteboard to Whiteboard collaboration](whiteboard-collaboration.md) ### [End a Surface Hub meeting with End session](i-am-done-finishing-your-surface-hub-meeting.md) +### [Sign in to Surface Hub with Microsoft Authenticator](surface-hub-authenticator-app.md) ### [Save your BitLocker key](save-bitlocker-key-surface-hub.md) ### [Connect other devices and display with Surface Hub](connect-and-display-with-surface-hub.md) ### [Miracast on existing wireless network or LAN](miracast-over-infrastructure.md) diff --git a/devices/surface-hub/change-history-surface-hub.md b/devices/surface-hub/change-history-surface-hub.md index 60353013ed..6fc60ccb51 100644 --- a/devices/surface-hub/change-history-surface-hub.md +++ b/devices/surface-hub/change-history-surface-hub.md @@ -18,9 +18,14 @@ This topic lists new and updated topics in the [Surface Hub Admin Guide]( surfac ## August 2017 -New or changed topic | Description ---- | --- + +| New or changed topic | Description | +| --- | --- | [Accessibility](accessibility-surface-hub.md) | Added information about Narrator +[Sign in to Surface Hub with Microsoft Authenticator](surface-hub-authenticator-app.md) | New + + + ## July 2017 diff --git a/devices/surface-hub/images/approve-signin.png b/devices/surface-hub/images/approve-signin.png new file mode 100644 index 0000000000000000000000000000000000000000..7736b95431c377f0500be39ece51d7bb7ffcd70e GIT binary patch literal 33063 zcmdqH<9j8++C7|1Y}>Xuv2ELv?AW%giJcuA6HYiWC&`X&+s1FsInQ74etbXF)pgg^ zU0uDdu2rj6-O(ya(n#?5@L*tINU|~#YG7dCW&a8UEcCyYfWktfe-}tAQAJTOu*O7$ zcT=c;F`Sc(t}7TA^5B08cp3vT!M{dyH%T2gbw^7#Pg9p4VA3u>emJ-S9NmmGVgEf6 zR4pqZs^MjHkq1?Xd9XBGaIu-==E)NSh5oIGJSG@6WMgB)5VwL9yC|rrFeJu}?qAq; z<#FXX)!CVWV21GZvHxyzIn{OdIGKASn3A2p)Ps>IxfdiA>J=BzmqH2~LQ1I2$w|d2 zGk1}Vvd6k=-B;MZ=Zr=ziVC?C2zH{(cur&5VQNSC$QKpa9c9}**3#b?l&g06WDMNF zigdOpp;#)28cbaE?EeZx@BE5xPn;0)=Vb$&klafFI<~mkjM{y%xc%>7IbZjEb}|dY z=%hGmz79NOm?CM8@HTbT^)v%MC8Uvezo=gX=#ZkQ zVfP}J9;p8+v+(~zfMg&MUy>Yc(9BQv*r|WV$>nmIte^59Xzvs{sXBi2S~ai%@8M7} zrpfe7Op@{VT&VFV2!I&sFPg_fClI8ECqy7RI_J{m1nO;i+oivLPL;A!3U z`o&NBp)4Wd|86!>rlp~Qsqg*dJ6))bgdy=meR+9lzn_(N-tvFi$+oQv1_8p9%H_+R z{UtL0GuXg5qk8S~Yn`|%t=gEY-Y+9>`J-G{ui)5j!)4V;skS)rGN8r70c`k2U{5B~<&QZG_7FzaGq= z4uEIq`IB&#^>^3$E<8HXsq2?w z&(H02YPAg9K#~nQj5bDLvj33fWp1E7I6T~)Qx+b|7xXo0T1kby$@3!oyq{AZFk!7& z8~;KiR|p}6?H3M#qB&qA@-BwhLQPIi26j~m$NnEuFHM^>1)~4$Pln-V|6oCNQ6SA} zIVIFTP`>EkkmRO3d)>|6w=W-bJ}y3Hk{GCW@3+DnBS3SkgO>B8nDG>-FSS=E#Qe_z zgv4+waUyZp@5zH#y{a%%Id_f6;CWgQfxHPaas8iChwIu>L?(;2s3kq{QeQ?yznQf{ zv4yH)jUS$R=d?thS^AeM*y$IgJHbiB=T186cXbzetDplU5Zx%pfOiF9b}j6)uB|X2 zR_#O^529zu`@q}Fzk!H2;vPl|rbC~oHIzw6O%GASTs9lR;ZJ%T7d>Zp1GI31pbqxl zj98CH;isul_I74!d%{c7hIJDFuv3Id7f@~xw{6*v_ zQEr>nn$0-~gNU9|`yC-QY2oU&5ryF~g7v&#VSPs6_pamhOc$=vdn2a*+S>I)`2OyP zzsKcBJs&)`ZM3 z>L*7-#!pc(RP&?}_w-hV(PLa!NCY99Jdy7l?c`T5S6|s3S8-35l@F{=Rj!KU@^Urd)4@^-d4%TF4oBMh}`tiTWB8 z;K(fWB{6a;OjI@mLU6z4^7snwzcY}TkiAzAR$9rhkIC;M{94x@!wL-6Fhrc+I!|@+ z*SY_ca);azM&XyhW>?C2q7FMTW``5&7#J>yr}F(~+Jkk;8;hP&1+j%SiZT7AUz8fM zHf+C7{Yj)M_h%F70OPPn4*ElK*><biemgi|e2 zrGKAlB-fN;^f({?$8^ta-vjz3pn2=K$SEkq6~}35v_Eim9#7&He?6uvT0#_oco`E0 zf9aNgr|w5flm@aL1Jx)j}z6#eI6LOZ4H1SA|x;Bf%=?g^OP~ zl&CR*y6kPHsM4+tLM+G9%)akyBQO}9bTc`yLIG-}$TyOig$xz$FuyLDD9cJ0S*!~| zr_s0eA1kU_=pbS;?^42wy}BBNMgIlncSX($#y0pIXxY7a;c}~HYSzovSm<;;H)DJd z^FgKQ2?-z*EPL7b(<`ydz3^5(aON1e(<&(DCTN%StD~iq>{jz?^e3NS>_iTj`ZOVB z`*S#pPRBN~pM8sa_rO0?e8WaD4B)G|K^=~T#;aMyqrnP z-GFQbT_)tu9dXHzm+*Z+^){=-T@GTVLC6}(X_YA|;yvnwiM52113O}Ej{>45 zc+n(cz(!*5Ds6Q#vI5CB#j2j);@N~qeWYru^b%D3mqVkIv-P%1ZbS0bo{RBu6J<#5JJ6yA3m1rIJs05!yrokLdQd&5 z0HN_s`61l+QkiGU7l=^bU{&#B2jD2E5PSqvrBhqOpe?I0sQuX~e#WwVf=kf@JoS*Wq$|6HIDYr!Z@>=twJnzpIviy5V=bt<$X>fEcUV3}~2`>?<# zuF3DpJn%CQVE$YA226c_u$?q`*W zk?`~@MDW%v4B)RswiyS2Pas1!Sf0YJ`yGHGc0GFdark+cbGY7zb%Wr{`dvqWWj4PLx9Sl^RELhxHA+?^Jjku=aUo)G?4C2$-}3A?9Hoq zo7wgO1lx7?8>{nz=&~#;$GJn-+w})-Q%Po6l(P3wA%~6$O5FfOn?T%O5Tb=8FWP!1 zp*V3T#0N_!qNji$p)ZBjvJB*JbrflNA2~BrW-%Qm>Fqn8of|J%(y?OpEY$`}_ z9WJEMThFM6b{+$wAxh(hhc8b4oO&4dI}f-nUvoNo3jOjgM=V|>(@2J4ArQUW(fsxO zr4V&PYkN3<04<{R=4|qo|513t`4|+c@x-@c zGESrVvm{{3(5PoI(3p!*BJ=8IjfL0_V_Lno|fqJc<$3{>`?fcNX2wf3u>k?V_F zwcOPU!g;QXL5Pf}z9f>iew$L>O^D}!=R2?K=(a|6eF!ES?Xd7c%ZdFR-tv)no$|_v zOTms}byuSNo*I_?S3A7IYQ*VRI9xt6^rC&L?{~f;ZT8=od(Tzv+>)PwOX(Qpyx#e2Zk>m!&BCnkg3!XTFZ`j=1Vp1Bszv2I z{Y~z45s4qf0huOES&gRsd&jPK6R?{6P*zXJuv@n*P9JGYCWB81qN;_7zBdynB)f}e z4ui{3L%av)cPb2BkPs{#;CGKhCZ!-L@8J25gs0v| zD3`Sdi6?C2F4qClE>>>>J4%Or{j}(uf5Px9#+*d~pQt7qRZ2h*5vjfdPq7wLrwO5h zoAJ-GBX-IVm-xWx54S?K6Xevx$3F-x!pg*RSnVI-Xt>T#zj5D&8AgjOJUSuz`tw*h zdtmFkZW-%{1yB=v+3=?g*S?W--D3-2j);=$=p2UwAAWm%mf~D5r*)gS)ej&{BZ{y2 zZVkgs3y1Y-BM(1#c1N)}8idpv`QpaP2iacrfPc1Znd%CSmU8x?E+^n@Wk=*}`4d~7 z|G}8%l8~z03tt#aqeZ#s#3k9PO2j^b9_T)9hZ1I1FNi)(y=$c12FCYKKe% z!uUF^NbBppa8%yNyWZc6aTSc#=12mf5vptcykTIASy4amO&$Qf(cdT6?UF3%?)~uD z^+V4t@j}+>+7Xuoc_9a`0Alv9h|E9PAPR^vf1v-{22QeJQ9mL-mqi}eWqBRE!5RfV z+p!16VR#z&l4&VFW9AIt>$qveN0In4J~)rWcbiJX*8NoTf>6z!Z^Frz@HG7lki$k4 z(XM2w>n!3xy(cZET%`!_yWyCt&jtMAN&1Zg=xqD>Fk6Re-XusU$ zKzr;^)zgbnL-7_9WFDZ?rOM2VuI3nBnEv}#i-UmIqJGN(JAE4c}yb$zf_C=?I zA!_oP+VATD2baT=vFF8sdR?RU1%XGTcwx2#e|Ws4F6%|kaAt`QiK48gFM^K6^d{*O zuyEj0L${c8<$qjR{4azjfQG(^Oh7WO#4@Au|j%eeY(Pc?hiw7xqvkv|kHd#E|=A7$L zF&Mh>9zEy#HCA0{p+UoRP#dlK-5JAfMG8HHJjMVifoTR4cKQ|EAw5Sq(uM_wv@MF zEAljr-YEevR|``_U}>g46I&X~1N3c6(QMDUva4Q%tq*v`6Z+a^h$G-ZHuitu8ut4X zsuM1U`UcMZ5UId_pSN6A3G9Uol&1crK z$4JuqhRF9uhfVH;rzM$l-6Vf}Ky++HSeo5K_r+x{loa-4hz*09+XK29X{b725QX5q z{p+S2)Gh63u=vGp;Grvg&v*50-F-w;=j~FZ#*!vFtf;IJ6GiBan;R=^XL2+M)J^2r zbIoV-*bZes>JE2u-XM{&*ODRB{~4sap@J&ZfIlt#^nKO9mEc7{BuS7(jpm2l*mFcz zfCk@#nt?_!X4}>aUyP~hQq}n(t(5R5Y^&yZ!ktoObdYe+WZA|{TMJR5kt^CFPY(o6 zt_GfvoTIHPvJcmKqOGGZ%*%dwqaw;nOk==b_H!2a6qs~ad66P%;>qD~js~}pfa5qz zUPA76l)B-h=|Hhi4ke}a!zp4kI$B@G_|8YkyA9)=#>68E2WQfO9g&;G?_QtLi91{? z$Q$@do7?qVVH~eaKTJVD_aD_`cl_ja9Xr8k2LF_^BCk~cV1yC`gYLFH0GBus!S65;G$?j0 z?dm*Y>$q34TR+q7>v?|`2=$u3hF4%$8?SBbkE`hh4mm&;#`V3uXbUe>`doVEiiY!g@>8yrsrX-5wP@z zKA!-CL2M=fUq2%6Zi;oJ&!|D_9qh1>aWGEqb96cQ zTM&AC_6Y~r=1-AsHx)`(%%06{8^WlL+1F0I%#W0je~0Oi)d^;QduYCpkIw62TP!>G zdKv*IY@8D9)963ppkXtQsDvcEJRY8`lUX|x9@F6P;6vyHW7=#9{E@Rb$}X{uM48V$ z3wU7dk6)N*16rPOH@N!Pzz{f7lqUM#H3ob@V|t0PuDZ@NsES+YaZ(y#(o`z?*(el) zerjX(1skq4*cy|;g+fosae=yI1v87lA!YE2HU;biQAGxPxEAR6VmA_Y4Q(4N?}Q*t z#fn?Y$sHHfy-X}{_j&^G@Pf(hHd`^$$K6#{EJbM1$-p@aou;YV@6%Mve}%e5LDGBg zFd+-x6PRqya;RB(k$a_wUN z=^E$Y>GRaUKaaRQFJyI_i-k0Ml@#J*5%)4FBWWOl_?c5g)=urcE~AX1=?2aAx_CGs z>JSYJnZikbGVVPkBBMgay&vq-U&90hhRCrAphD64LfArRwcXD>J)$@tBD|9%pEdDQ zd+2w3lG=O{%LVZf9<3Rdux?6s3`uhIrAWsT6VdoEUcrM(Oqv^d5~5Nb6`vmO5M>;f z4RVlpQ7U;_BE5XMW^IBb9rK8`w@U(L2sBdvyb?A<@k$vn_o2G|J0aHA0nd9j@^gOx zOn~2=OW5edeosubK#|;gyOIyY1IddB8hR;j3xy`uBP$nv6+{aaHavygi;M7?J6l+2 zbo)HqKR|j7$rYU2VG`|P|Dn=&C}S#@ePIsX8$weDNiHF!E>7-Fc`n!p7B=8VPWST3 z?LJ|M3f@cdNg6$18c}ddVP3P(fi9A?3rQy!Ne2#;6_?^4G}SPYOU3Oe%^4!YMEs+C z@~w|_6hwzXCDk1hH46jLC+n9#F_k)l7%9811xI z=AKp6j2AgpJ@a&|XmDt_$dvw0#Q-bvEo?|tLKZcQa|ah5LmWD@CXdhmi9o8Jkrz97 z=|VIpt_1$zi=L_8f+Zx*i4zjV8<}2?{fF)+-Oq`GP_>fXbj7jj+f?H~%7dj3tz1m$ z*oiqZ^t%!~))l*%Bc{Rlk7>#BggnsAWL^7H?NIy8-)U#>PDZcyzF*CeN2+zX`!3$& ziL(-lVb6M z>QgDZcWA3-i;YsXV86eSeC2S<#?xlwYUri&Jx?G}Qt%W0>+JRmr^Ge~<3Wy@kS3v$ z)!AGv&yc(Fx_41dDNQCr=d+s7DAHovm@>_1AtFG{JFVc8F7h;U^i5{GA0u#{{fmCS z!zBe?uI`N@LB{u-w<~ur)!;#Rw|)K~iv77wpt3={m$S6>Y>PTeD9xDtN?5!KId`N$ zL9Ar<9pdMS=F8YtuS)ROQpswzjqhqwRZ8|x(~)3v8ilIRhtbhdUOyK;(?T`#^-+t^ zL^+qd>}Kq=DbrcfbQv!|o}5x|*LM^IdGuJaIu6S5R(v|_z~Q`N>RnZy%vX(0sg$Ucda;1w_leHrw|=g0zFl zh5?i2N^ZR7RGzlv*;S2I@eez$Q^1B}>WEVoRorGYS9aGJf&(r5jAJEo2+>j^`4qrS9+ogQF=#u z{fD*50!vG%i;?lSAMU~K+!v)Z0>g-@sWbx(mR7*!%wQHV z*VV7<`WNU$^7ocXqm7+)>Obh{GskV4g<( zlBgqRADUj|*|Z?a);V`_V<|*J9Bcg^glIHGAadwuqq9<&dggc{vO*pl_ZGK+i*H~T zk0;MLbuqoT{K4rcYng{%!bHKsc69vjadlt7rWF6*ki@H@78GRZq{D|~T({S-?d~rf zWkh{6O&IhgX}oPp1C)3vn9x43(EL?->-+m^&HnV~=J4!elV&~6=hxCTr?nZn27aP> zp6F-3mFjIUL`Ivb~R!6P@|tLcJt3xq=Nl{_{iI1J>`4r(n4aaML=$RQ%-f_uD_LAyd+BM zLPTFK0aE5g0$BNsEDP9NR7|O08CwCa*~ZH?JiJ8o~%e5cb-e zEY@3ve)FyKYG0N1>8z`{8QfT9VQIUnM!C$5%FcwE^dB~+ZPqsn4Zfh(0qM5X5G>9$4+0i&wx_lqhb6U8U5O1>UReX-pqIpm-ni1}EI78q(r(TR&0-j_< zgs^T@Cr!_^pjdiVUtL5}@&EpsuHKph~!4Wne7$7lvXc zr>0@>_WC|Z{^qkw&~06}LSa=|&3|Hq!b-yF&3o(6U*bUeY`hgAEfsf=JvXA2BCY%u z_&n}V@eu8=eV}g1!wWY(SASY>;bWw-mi=05*GV~XD5Q2UL#RyHk5}>vT<KlK)PTR)1ju;`cgsD#eVjR;sVDz(!mC#ge9>$@m*|FIT+t8@<@PIZ|4CRvIP=E!_OAjwwLVODdt3>XKJ+_uc3=f&XuVtML z9)w=Fawn_W^8xEKkr~<(R~T_u;in~GwAd#nV<+}Q{V9zJPm0P$K{F8_*&!6t@gx*< zHdUDj!%`S}^!TmI$%oJg2~LzU3NxY-+eP(dU9OdCEL2wh zfjb+3Nqp0{mzZp#V^S16K6<8aYE-R#y{RY&(7=_d2x|=F;4_jU76?le*=YU9`Rn6VsX!m}NJn%LK&IK6|61<_0tj56o2|c2ne$d!Qkx}% zUGxT=2I8yeOj7ojwqM4@&b+@g0ytjCyHamhdjhxZ!YE831)0Nkp>K_9VBa7(XUtf5 zt5(Z^uR|x92i&eyMRouYXCiPvr;n6n&(}0BKPL*r-`x7{fo3~#e{5eOEKi#TpJDCkT!L_zn@(c`SMb>!UT z&{?-b@Lqno^M$UvikgnxNON?8CdT9{YmA`i>LVvBm-?34iw_@hoJCi+1Ih#23b>7W z9Q1(m>6!>_S*xu8Hqd^0L?;fq9sAha)T=Tc`WFPXf9~TF?ZMbXY~RIg-?>xOJsO{f zX2z@#pwR!j*qSgg1sbqJy5h>dxmM7q;PtfiuVtw{D&^YHh*;d?*x(AL-0W`bpQ*JNc{SQ`9j|GsGWKD$OA@Gm9 z_l%H?bLA0QVQ?hK4CY<(S~A{gdAUrL1oSz$Hl^%u0_*?{lfRAnBCK%!5`?zL6yP?cIluE4%eT(kKY z2-Qvzq{sgR9g29QV<6vxv9rhhJLwrE&1}5Qp>Y~}*_gSjnZgxv6^@T1jAoMM&-jb~ zCqvmF`f|f}cYLH*Y;=Ff>S;Y;L6t9Pl*8*}Ret98T&dT=!qIhqlK1>h=gl|+ipe~T za-sf`1MgRKy(ut{u@UFkREli4`;!^_9Ins}wATLF*yi-L0Wnkh^pGi6tPvajh|66T z?2pTJ4`&CvY8q=llJ`;H&$n!{%0*Hv?H2{rWVxG{?AmyEgmUvaseH4)hqAlo9-uMG zW`36YKgP;q} zh)Z2NqB570ii+z@M=liX^fcWVAF^5Pu|@G9VjOPGgSw9Brrh=2jyWh?3*S)bumRU% z)QkA04ug2Qh#bDgV=}iWIJ(3o)!Rd)^2-&Y^XxRfxyB|jX-PZuq-^{_2WKAU3uXQ~y#Y+EHHJZo)q%tLAHEI3!X*5jSAY5q zq32;Q{@@hE4W4f}*sZmLHOUkfapHn98EHvPSKHsM>dL0%^+H_|@j@Xf-{7i_5Hx`KeB|&!Yz;6l8xW93pc>~V(aGuc9JUzLN88IjKO)O%g>TY}B zX=`w~Kx!vAqgO-+X8?s|D?;e#QDjSqXXmK9IdL{=Tx@tmB9tU_1sMU4qs-zH_x@@D zORyt1c4VX`l&TAgrR#>vK$Tqvis5>YNZHhOJz}N~&uh1s&S~U6RV%U9Rd~d9PiQb_ zdNTsJWiO_*U~^sffuCsX0ex!pOiNA)i5!Xa7WfL5;c*&#sl6FttuMDzvKJ&hPR$O; zspxSGXv9zM3irBgq+#9vedgpa^60f48QQRNvHUavFxb3vbL)5ppEPXwcGb;_Ik)A5 z?AiTF2md%d)TF%`#&5kLokDH)Y+G-hGXWV%m2g5L5PfoXn~H>cHyF=bFK?CWyH)+{ zu}<5?;Ymo`d&2C;<_$F*{{iOO`fANT%yto)<5*&olGyZ0#BwS^m%}B5}#m)1Cc_9VCA*(m*PE#anKmpRHdx4qB z7V+^)H-QoE2M1E&`Lp+Vlb89d)Q^$J+U$r7A!ArY0LEs=9k+nr!G@R5u>wFA>|PJO zKa-?haFc|k_my($1cb2E^NjVaxtl2KchrI7P!fNg*ilNhxl0e860sjnec#5%YmxMm z>&(|qB3hA0xOPJM#|Z^uU=2!#+ewV}A?6&|7Mwi@T7WI;acT2tJ4?AzVfD&;2E7=V zn$}@{yXLtQk}o(@e6+DFHKGsLQ}#OP%eYxo_bk+or1moPK}(ZuZ8G_O*>gyk>%P)AghjV4DpPul^WG>rNkuveRI^zo=M4R*VjkO0!Bo!X6tuCZF377u#9^!E_QBfDad z3M_+kS46$Lw%JRUY6bTbnO}4G{MPVruz|Kc>KP96kdZbd=;Q7NWX0k9mtWXqUNg(< zF5XiWpR0Nft93GlR-hfm-0D)qZVS2Q{l(RU;WTQ{BDkvY-sxt1aC`-1J9Wek*+UQ+KehuyLIf1AZPFXcuW&vjOfc+YsC;JiFq8vq-B9 ztMlo+zwAQ4!F`0=ZlxuyjA;3nKL8tHwV7b zvP$0OLj8+D*V?Tl*lNw^xvi$JuC&+We57D67DX5c>Vk&2^2YOb^dVfqvLSPPGD^k7 zOo{4Hm7|#dfI+yKf56!TR{QR)B6OM@hao-NJQCY2>qez7m{$~>g>!UL7iE=;sRJ?I z>u?3a9oiAr+ncw-kLT)1pbfv{wi!6HIs7(7ow{&AZ>}?($*_xD+zo2IJedJ$C|s;| zyFwuouSdmBImSm`36Vg&<;9R3P7Tv+`Ngi>;q0X1Kg zi>TO!kienzTU5%}gS{2PU05tA%b046V5D&E_8J7S63bh$%Q z$J?B{uJZx!eDVpnqDax;HcZ<*ofi)jwjX(gyE66NH>)YRaI$~094&YtuJf`+DPu8; zF>}B!qRp$!_{E%bYO^nsp|Rl6Lfi>S;%_?frzk6QD64e;=x7Ij3Up&q-~=iU!OS zdfO{xy+bXgC+#)bez#26jD_ygJ@z|N=;BR=_POhk+SEqbt(Am96A*cuRBB_d*bLdw z>G@s&ITbn`ksuu}iefryenfG3OP{zTF>;J@6&PQ;0By4KGaS%+#v~wMMpm<;Gzk>l zTT%9p3pa<^sWU?P$6>+wCKYgpm73g?ByNs=4c;G94_h~SGJQXX^0K`)y7vb#|9T+n zy15;w@ID*Sxt<`vUHD=ir$SLSbY)?mA`bp7j3izAM+p-vh2Nd&MY|Ui0gLiarWGY58?Ge-woeYa}GYv81^voxPGCUaml9hu>$CcCL%$i6ijE0}02$ z_BxHqiPa85865p5OB*qVQuqhSXZV0MBxQqj%m%Gt+43J|JFn!wMoTQD>0^!Ok7EPI&n|2-MQ#ou0SL-N&nFH$O?LrExA z%cCKEPBk^7X0v|oYJ%Se(5EiBGIHzLrWbAklwmED-XR5`}QWpIB(p02aUhhe-> zVo+gFi&-rP-~molnKN&hUp{UO#+=wB~- zypb!N9Pjj^i%dAmqH(nMk_visJl>|PH+?p2+uM=lPsVE;P+sI@cf^HWfBQx~eKT+b zUo?eh7<56hyGkPkwD~Ky%x)#b*^}n=TGx4V7)G}&{|0AGZ$BlWZzd{~h9Sji6!x;; z?eW_O74Zhvroay_n-g|NBv{(;NLHj@V)Ly^Q(nb!1`D7-hGx%%=-rMdl&2bJd9>Ki zQte@KcHeUR=H$75RS^B-F86q`gsY|uaEmVz204yk%qVduin&U^og2)PbcK@Z>R?#2 z)=k8Z{kPxd)-7_=oxuoK`pqgC8Rn(K+J)dOj`~1S%8!||(+hRVTHHua%l5vu4QHZT zk*)Af_WAsf;QBKLV$^LGz=tX}bEVqp#aSWx@3>*61|LeA!fi71=bJ!5zWa;`O$ggG zbALR`I-KvIvcC=vwoNaKj$CNvAe$L$3XJT?Qf?kI`opFT!P2=K@~MW0*+oKkMbZlN zl3_slc#~%FBkj6gQ0qnq>DQ6A^Hx%2sudLOLziO~>ci}|V-B8nvi9J{T+JS7uBC2# zJQeY>e(Uf7j$5%GBVeWu{uTgMQTjoHUWlaA&0klK{U?>HvoT8|I=It-rVo67c0kySx3AVqeuSkc(+`ZFZF2?u0y;bySH7HM|sbXgjzvcd(Yzb?et zeTd~&RM)m-6Plp;XfpOnwA|y$b?A4;ed%+K#CWf>64@}qy*rV)2WSTITzcWX0b;Y8{qja62=b7@gf^qR z$n0Uqm8J9Q$PS)fctc_34EBM^rmtAd+Jmx)-!OT^V#x|f(0K3=vyVEr-^qwp3v@|r z-`5(!m@&AeuM8 zB~a?|?lYMPTCpij&eV;Mc*)jH>LMjBT_d9Gu;gI3^HbsxGm~-#kibe7v1Xz#kxr&g z*>Hi7iKNy=CicO@$D%T=kB%TlNea8-4kZXGj6Z_G`u#4L2-TJrd07O97UuehV5Lx( zRE3AdFo5w=c=Yc%MSzcL{Lk>c!EseX zeK>C`gp|MyCMj?HlsznCQD}B+&avU#i?VdS9+$aKufx*vo9m{5>$!|J^RFnJ>yy`x z=j}WzXYbyW(dE=Xi~IkwYEL0@iHw45w{Szn;`0+ua(dWh+-xfBzm_X z|6!}=vU{=hm3jv503M|3GYg7pBSXNbtsJ2$+wCu|c^XP;#0N*(^krdrLDl8arrD$= zwMJDEf!9e_ufu~j*0V?}6~TRRR$a8I$a36|mSMlbji_tjADqaH){$_Y?oiKyix}fg zZ&~k&af$=~+?*kQJfL}4%FN?bg^7qI_g}TOk8n3TwGACInTZN#?A6P4F?`%xwu5bR zdNz|?cwFzKz8~tnq}Ze=A#bscP9Tb7`FlrFjj&mC9-G|nu*E{&81bHdu?$ZE1E;Hhf1unC9Tr%cO`;Pq zpRR%R`JsPEP=-(I%Z%hB-J4{qK-fY3WOGks>@9^Qr_ z8AzEHNOTk;i01EHiX6cT8nYg{Tp`&jPW0S8Jc`)O;-4!1jHE&P;0Y!sx8_kI?j zMg)=8mXoe3cfa^ruTjQdI`6i_s^?1d@4;0NkX0d)Qmww+4zjhM4|(a<-lygAS!jwe%&@a8@2qpD7;T1S7+ZgUzPJw(!H`t!jIvG zAALu-e1|Z8{O_t=SXBwJ`il~xrera4F{(%7ZO-HSzSoms2RhuYgi?R?P|PEUC6{BV z<^qBC&lDkgG>;1Y=+lW?@$2cDs_l*(e8%4VoUuZ~)fk7SH}|r*@)3+;&^!ltBgcQ9 zUgdTqv7zsUVAKn`@QjtRVu8xt(25>`oRhzP-q4nQWI%4{$C$N|5KUdejO;(%%pM7w z3?H|#KJOvpF0x>_D^*4!ZFPs>CEx=@i~X0DwHqhrFuU>bWS>`5T;=~(sQiYU>wO99 z@!iW!zqr`|+*oRXL{F}jLl#ie7@=# z{Mm);?Lrtif~4nFOSRl#!7UVEjR;5Ry}UzeKG6$C$V7a~UpoLFt!~-Rv(i8nO5&%EBypPA#qxqk zmY=*x1h?nyXAd->Wz3Mscz)p~3&ub9C+ZC@=8zdeZa7L+cA>)n@mlWkoq3LFQK=hp zg@QBbk*O6OT@4fnW*g)jGMvBoJd)VHT8nm^fEjcoc54Ym3QwU8^X4B#0ZmdB$8Mz6 zdgh$f#;O6dXM?bS%liN!+w*>5G|rrp!>jSvr%MB%UQAY zoQ;JJk6nep0oCxG%;K%xC4WR!LPw;Ub6PSd zrPA!nf;ZdB+u}{-75mt)*U6x_P>1|<`OU)pIK&6bx}1|s?5asgJPpxgZ`|04lqF`) z=TS^toG$KRwRmn!F-gA#n_e%5)qD&)HS7VfaHf{4HXQ_Edt~;~aWPuAg)jJeFZIFa zz5q3E|0Xc=&!V3Ss-7v4;%>g&xIW5{OZZDrC|3s;n^7yNRopbQ+=vrw)9tL)$=9Hg z`=IafN2i!;s(as$vlPD8um_F*PF|(c-tk_z8tN2ZaJjfPhS{o_N_jf*<3)-SU`(QP z1Mz+uJhr+%S?0<{prJHj>-oY~Vk40npzFj!JLU-8ih! z?iS)}o*2xHPHC`dg0{*FL{>U;rvDaOZob$->tpE2#@Fl+Hy%N1>Hk1==v%d02}3Lu zKb{6^iAUN}e1;>4AqTihp)^-X?2dYRHj)*omN%LGm@nL`G0K@!6|ctmCtcdxMvM%63}2Ljfu>dut6N@>Va1F3l-Z z-OxA|>-}ivzcApeE7A6}2Pwrj42QfjRhb@TdtWc>7a88IR;YJ=&(>_AklPgZcsM+s zX~*Mht_-ur=;pSup&u|5??9p?SI>U99)p$zn;QNh;oiY+BE;HcIPa zjY15fq&~nPe$|j=Sks^HPqrq)ZzzJs8eHCDe+G*qE%EN*2NTvDP?r%=O#vI6H`dxt zcJRkcg%sAjLm;t@Esxph{L75CeH^mAKG1uOUPs80s%9Y@=-s4OVOWivowp80bK+@s zpLmBhZ6C^ii65kJ%7U9)F;_xXrQJ-f-$b5XzUIttR;as(2XX)Kuk3l8= zL;`r6;;~}c58h`X6xs%$5fl1xE9?iKFmZ0%ETd}@>D^Y@Rp=+)jy2L;4s+^_cD9;r zWY;Hq&k7!Iup@vbeR#_?nJqt_A+#j1%X(|PY88x$V2R9;8s62CYTkC1I8WIj zG&CpOJZ(3+wwLtfoQ?UI7Tc5cv!S^bzkGnEzDXsjT8#J}19Q2v7q6?ls@ zCY2(3^YTIYXJ0DC{Nhe}enZI5m%m@%X{gZ3X|cQB#HlmpG&?+T)wV^gzz2|uv(&fK zTvd*KR!U<`)7*dM>+P3LO{a0OM-W*={lX%4$cLJc(w-bNS zE$Sm|xdq2wIlLCg9`c$}7Np?(tIb-Zakzd&VzdLlp_j8o62avodV~a z(dag+Z$B*tZL%(O;abrx^pVYe#i={jEqP=e& z`v8u|F+GL7(^7kiajC6*2)>+S*7M-{x^}Z6>6nccTTJO zh;Iqn*X5*G1;M(Q@k@n!@c!~QPiOd=65yZkyFwSeHfv3K4vhcWBiye47;=%NbHYO4 z1}=9^uYTFj(Xzb8MstVOms_An=8PR>MLI;fy2oqfiW=R2CFT6)Xy2w2&?2zB2lJ=o zgN#s7>SwKd_~Veryt5$xGaeGQchnIXRsQm*o`Qmgo z{kxLr6&_LZc1y$^0JlGU20}I2Z$GD>OqRJ8J)t2|ryGdk=sYHFP0*m_l@>o|h-+K& zyd}I%%I!)*+uHoq2Kf<=e&4O<)5to{d?JvU+FG=cDK1Z>|H!fw3*ZE62fSslB00fT zPrk;g&|R0N=u-zg3n@%;^?L#WqJ(hX-->LNI;%E=BDE}GZ=21(f}c7>y7Dd^eHMHS zidKie{F`TbZ)AmiCR=tbwmmzIn@?)FRuHiIx1^u&Uq@U#fWX43cR|{5gJy8dZl%T_ z_?>oo=5Ij{-|St9IYjo4FRk@~nA1Hz8O8Eig&LEF`#lQYr?q8VdNGHh0MO^!T6w4> zV6js2Um`U)5xZWL1MS=T*U2=o!%-&aA5Buh$UG4-l1m}BpiUSsDbwN1y?)Q=uOri> zXi)#@G05Nr-f;6qVB6ltha)d8o{6gzkv1ghaVrMXWUhQmo|3y^1(%-jtXH3=MtPEt zNJQKJe)M3M3jf)G0p~=H;aBW5L;8(&b?zNvk9mEBLMKkP`_;nn0taeIi3Ra%yp^^f zBsP5FeSyw%YI%mV1ugXkNT-xd!K3cz`VfqI3X4FZQLZ>;9wVD{oqA<`@d%-3Nqfn& zyES#|@n;)^x7*+<`My1CsTWQ_P3k3AZS8Q=d0gZffe?*1#1kv7DR?l_vSQv6w^9$ zWgj^JW|BI(trNZDC-I+?%TY&W6C+W0kB%H2X3oX+T7SEbI|YyhWpBM3ACd6;skai; z{P#6d&ahJIRkSN0u9N4PNsnA8Yb@Z1XB^9aMJ13TV-T!xIzC}VhtLiiXBiS9y6_$F zdg}JL*Wjf{Oa>An#lF3NXI0Cs3HGMx#wGJoq>jD&Vn>Kw?Te(WaOaSyFLdB787GSw z1gF|=yn?Q){O0&9*QNOG00*+X4iC4YDYa&SLD`zXaX^@vqDd)!)lX?iafvnq(19v9 z#+^aYnesWA`_a%nvR7xMs6>h)sAfa4@3!=7ZyMC~Xc~BZfq&0za{F0NM6qHbai{C) z^e5G7Zjj#e7Mr5dkEO1zSoExH5y?lk);i_Nk+JjQyoa@>7E zmsPf~o2aa=SRKI*|9y7my%NzxR;i#b_chpgYSWbQQQ_u1 zUi1&%+u$uGcRlTodTw-*yUK0TopL#@YM(}=*gW5^L{`dtwE)aj#Rs(>7ov~2qq z;XG*ZZpn#KuL*WxBJKL-7AYf>wt+{mh{{TDl{ml8|{WA7d zvGl1XJB}nxgzxFtOF7kR-V1bXdcg7n_yqoPEIda?aZ_cJs<}|t5`KXI}j%~ z1RmPuD&Z`rJ z3zCQeb`G4p{Zk-NaYw_OqN*8$6MlVD<${~J#bdrw|3@_tiaVxsa@jqMH0F5T9`X&1CYkeg9S-z)b6sy+{5 zemM){;&nY-V$&93TdzI0)$!68*3V;C`X%<)z{_W8SAH%LFsKH~6OEhhbwd)`wT)@Q{Zy$B>NdU2 zKl@W36|4Opp#wF}v(E?>GycVfdW^lN<%%8q6KHX29s-ZV_iwwjw}d-oH=96j+g zo^izIUxg+&hql7_te~dT*859UR;^HMHfj8!PQQtgB}qRonRl$Mb5 zNOW><>_dNVv0uV9)S_OU=yN^~3pM2iS;!o*S0N>2Gk>s}KX0H=*ZCsjhhhS{y-0^$ zq9Bgqk)XN`B1q8P0Qq{%NNy)8T-o6yMVn3?uBt?Dy*tN8vHX{WgIWwr7iwyK7Sqyx zv~KSEuLW=qbnw4lux;-7ru5w(@FN56)$o|Z-W|S* zqujQ|_1DXzZf`XZSaQZ}XUqb&Cs#?rx@gEMTOln=>%lLiQX%oVrN;;ZvPOP<|KwJzxV5!y)<&(+A7@a;+2 z<>j_6{;naCF?+rfGG-5@hBaD&ZX zrsPV+2|0wOz!;f1( z0K8wUg(P!?F{jPV5p6cfLg{LZ18}4P>mjFgUAW8=LIh2RQ-hq?b~|8FgSQr(rRv7W zNdIhZ3t3?<@-%e!YxO=7QUJ(DwnhfD0p6Q*m|i@IbalonJyR@oJmtgf@PrKs{Z@;i z1nx}39`f;g;aex46L9HE#j=uPBL|7F2m9Q5pudO>c_~gWWty2ce;{qJQ7<-e1Yqf3e9NtN$8m|;Nfvndd-%d86kTxb zMrK5G#bK^l@B#M>l;rfONdA$l{21Ivi9u)3ME;Pyft~T|%h$iF)WoWEMv~Wr{*RD< z?T_Qp?iUG;3|~9zmz-rzN$hvBlbWpOPRk|mVKyjVC63-2MF$QZJ_*9$DO@;kh;vj8 z5WdcqEKg1ZK8c1+Z0B(S9dUXZxDw%Po(mfh-$y&2-Zndky_srr=_}kd9~JLLWiu_ z*%U@1?9GT=xi+*}XI~niy7`etfVedfpAYEw)#|?FCEG1Kxc|GMU@Mp7>-^g%UBHo# z#8o_UCrwb=0*vc-tMf}1H;#@*o0~lry5>p#FnftfKpuFLnK|mJ_RAp<-Gcm4BKDyS z-h{*2elWTE=>m6eF77Hl4)BqAAo3wJaxiAJx;WUP+lt_F{~rJHM}p&Cqz>?DSUm8a zeoJm#aQD4l{l6i`5oH$G)UMi$ycc7?U`FM3cE79D??L7Ct7`(aoJ%COaB(z6<1-cs zpae&fwdi0E zM$I`Z4?35ql$_M)`)(G_`Xcou-FllX8a3lyva)r5VyDGNY;u^q5LoY=Z@n_=Y|t>Zx#cty7W z5|80W$&ImoF9jy&SKLV&BW#dz3K1d*+e-7DrIRAvyMEL&KFLzHcv-EXnXQ@N37lVp zcfT_Ge%}4ke71s>!}XJc|NhmuSIIY9&54)o0wf;@iu7={E ztk%4*JPbL#f+E)0Y|@Bj>eXVCHo65Kk&wNN7QsB$Nqt|F;u~tqaULue&}A=vVp{rN zV@F^E(I>9=W|~F@$ATO#{yp4~h&zKmj~ zQq~ie+8sTCf)hN^x5?w2B=-kSB>hg+l-AxDi;YS@TCqgn69)?O@#M>pM6 zIjip#hStsY4Jw0~Za)uv*fcj_43xGL{NYROQK>Kg_aP-gyPK85aOUGdV@vtswTW4v zovcx#Q;|MSz4rmz8Tag7Os;*QN+~h9{^vsFiHMm9n6hRLP8W9a{f~j@uAt5TvJ02&p zw_xl$l`-dWr{Cl?XTbEfkGK^7dPop8YLIK1P*xXaY&LfnSkUEWA7Xx$XZ-!3P*Pbw zSIGO*ON`i*bb8=nN=&=svAg{!TXdh=NxLYJsj~GC7)QOTzp|y!ab#|`))*V=@*GLQ zUI>KK^5yA+V8d^v@m@@+deho}SVucHpR6kG=78Lhx@c|(v|jFTdiQx1hBtP3==VLU z(!4~gnQlK0zF7#rfa(l`#Q}FAuq;_PA_D-`pSH8c6JwcsFK6t6xky5|$wF7kwYO^G z9b=R8EV_$RwjOf)@IP{l=e*n4TYat+ZU zc&@-JdljFlE*3dl6C5I!MNwKSeKj^p2K*@LngHcZ?M^1zXN9Vo7Byp!Tey)QX+|cH zjvigjJL*atxEc&p^?V}5>8H+rDemE~Nc&!yJ+I1tZ>scUf-mK2*mF0smHx53*SuMx zJwTxekx3%u6kU2`%jx%(>IcM`%hQm_u8q;Pk}jYXJ=y>mVeM+~mB28NCCNTe5aX~! zF9QsGNsB6x3pK3z3fiT4Vep27H7ExlH(k@b&Pq1T7cY5YNATpdPRqzX1kEh|9iK_ZT3l6m9~j_#@TD|m9HlFzl)Av>Rh>OsG$qafF;^jVP*l*TR= zUQh}9`#L85mmMH8Q;N<(8ZCM5lfKuHrAl7Ng!=r>=+nGOX5l_7#mxQP(dBMSH=bKs zrQs8E)V6Q3#saf8(<|q<4egF69fs7T1NTnC;O6W~MLw<(-3c@9T!Ma90w6O~DP^j> zD~S*lU?BO-)M{DSMFf5Vir}|ZbKaPy8o(ia<{q8eK%N}AQ{NGre8ogj4=H`C3H*C( z{89miovF)Ytp6lmgYoA6Q-}TkMy~&VCFW=QUbYqLY@t1x6I}T|*yy-V9Qm<4U;GE0 z;?R=ZWcmR$`*p~s_f_M~{{W@*2TJ}(+NfC&bkGnC_3gmh;@|}h_nHVflNZ{;#mJbL zn611o1}d-iayob#RB;oeUyyf#VjpC<|8Dv>Y0nMxx`wS%z9?DCGC{l_e_Ly>^NXMs%K3t!$9g2TD4F2|7swlHa(Ew zdXxwcfa-qKpfZ&@31+2$B>It;1oEM8`uP4dGsXaTg6Y1m&SnCCqTv_~LUkj(e| z4c4nQwVEA$P#)=(1KN%f(yRj!{sU*0Qt%gV!k%vjf&RR8Z-lB6_tjCtLlR`dlwq2X z!lEV0??3*MT}?U*U+h+0CBaGKDTE*N%F4(vzlizAqVNS2uIuKNV%U!~B|3;Kzq0Y4M{k z;#Z?XJfJ6)n?X~8FeLa^3ZjffVWO_L{)MC_rG<`*Lmq4W&r<33bOdS+;(wFnqyL zzCT%!N8rN0%iWdKAtZSJ0b!c$Ub*<%s9+{h zX}>MuT~S{aIA?O*uO&7+$Sxjya9wb|6^5TLBGIokAL)qy6SZ6qR|4!S}uA5+Vutn_B?wO^-m&Xf}jpRXR z7Gj{VvquTZ>X9D71a0?UNo_wx7_@gu6U6Rwu8*tI#YYCJlV_lP$q5T?>j9lA#wnIf zq75BTQV^71^KTtTHvuvuk~E~S4~_7&y~rG_W`-KRK|IdpmxfsdvmJmh z8)RnoD61AwoK>H5Fh>nwXaA36=xo&U>7i9!EmNk!#D`E_)ZP0d7X^iSB<*fuoV~#H z^As@X zn_XV3dFx`?So}n^GmOl!OO1eVF~S7ae!jvLKapp*|G&j18U^EAKB#ODjwooX?{G02P(THOXSli6T@@y@5Sjnx5*UYo!?!&;b`F;io)2@}iMVM>e7V}qExa&c7yb7?_00%Mppy8} zS^`*UYuKdVAHJ#~mm~kZRV3p{*6y^L3RAB*9BgvCI`bEpDoz1(wV9l!p>e>v8o@>*}RA^T}d;@aH~UC#Uy+HP;gi;IqMpj^Y0!!Tx`T|7TZ2 zeidC;JU4w@i7O44AZ}pxftA?XXuILSH;ox>ASk|>pwu^ptr&4KVxNyvq_Q9-wWV3( zY{T^f_0aR+b7_f%&U5ma7zlmlvtF`P#O|PQUGK_l_OEMsa2_F!iV54xuthhh}BS){G2VZ^+D>wLs1DgAaMU_=Sp~v9s+x>KwW~V*x+r6h7eV{L)`r7wg;`pT`G-OrjJ=>j7h&BuHr}~Fl~)P&q%wo zn<%R3*BIjsr4?xIduv~cB>Etz)jn6L>&Q~Uwj_6N;+w3Qs;8QGrdOM~Xsixy{K5th z>iZs7U6(ShbIJm+AU)z^=?Uc!1+B13#Z3c6IEfU1>0if$yT0r|%l*d{H3=qjV{@SV z4g~HTL>l_xvk4AabJfA%EX7mx=3g1rq-~%*Tj87f`zPOzX83nHLm~hd(${x6igH!K z8M~g{`hm$Asq9M2dO3v8BM1Hx-DvFH?omYskp3&j#zdornd1sqy;p6~BB6ImCgWSm zYa@0`)+g(9F{@<7fjcDdTlSOJ*9DWifX2X_%H#RpU>4Jd*LNs zXlvpDIPZ2l&8_vu=L>#HM!D;~y01ZaG7DKG$-)zfXxS--i(?Ul9X9c?tzY6;PV{E2 zU%4tz`J6_2$SCG{^6Aj~E2*V9Rse&x<3;lNh&Vc8Tc#v^l5DTvRYNtLIY#LUViKBH zlx|p97tEul)e)yCGo0o#f574h6i@y>N@6#$>5@cfX@;l}k#f(&Zf^CoJ5IK$ID+DZm;|XEB#<+Us z!Zul)*?zo;=BfMM^_GBwx`V(a9@SL?I#9c*>vT$;=dI2T5T?`kI1H2dp+!frS14r>hHR)ZP20O_)m>1@l;&j$^g?`-jEOO zTdzX6$&8f>17wN=Y8%o~$>kC7mA7Pk4g=ad?Uh~cif8%V+PwAZD-JgRt6!W##Lpc)J?JqG@ z*;&L8C8z@1`>%zr=7eV%6t;?V%bq+Mw+nr{Z(RNw;Y*mNYw5@Zsu_g_oAbGCIvP7T z(z`mFzM+hgaj-NFwZ!pjaIvSt*7&_s^@nC&as&KLqirv7qG`64C$gjSBM+IEaNci= zwcjf4>!T8ki19v?ed;+>4xi~YS${Zypn9X8&1D+*88_{)7_6Hz-}u%=tD#D?uk%cn zdhuMb71>-X<(69!bDjdiZ7swp(5Lo5S*)@J<_lIx45D6J1CYXOaRuyjC+wuvDYQSL z)mZc9;(~v>8`Hz>(}>#o#^hVfgREsZ*g*@*fuBDt9jZd1_zFVtS)ieP7kMF3Dv%OdWRL020r_V==!C#uXv@ZyJ-4rRq^~x$+PM5^vU|lNyOGg8!Bj z+>Fm8^ze?aIfdVA`R7P{2LlrmK^k(E1e#te{$6D*Mt=Wp`-}G}%E%Q!i){3UARO8ZO@eiHT#=8;0ZO#O!zD za11cw`z=o(-n}H6<~rC%YxKSWv6v;cldkR66c*L^gGY0SqZPJ;hus!W>2(nKnw*&w z*cHXWQgI>qROOq!)THqY^~ggY&ss^patanhmpc?~g^{<=Scu0PkrlDUYdY?Y-M(T9 z3zL&-!W-lYga)#bf>xNZGnnPMF^srVnPIv-EYUm`c4$xPt=;wG1C~paT}6drlLOIh zmayAJ2F^|So3pjO{-5dit_e$D1G&&Yu>##%V$16%K=)kZ=|s+FOj1#Lc@>3lx!V`M zKYP51@1hgiY$`qu)o*&oJTn2zBdGh5zQw{a#Y>EY!+eY1*%xj>z_9dv8*BVYau4KqrDl~@i?;oY~D_iZ4L#ymJ;ba|J%L2Wm@-&!yXmf z7A4SBm4^y{q0pP)+fFuN7+|0xy{V0vlc32~c0LuD1@#AbYOUZa8blxnR_i4>kahp6 z39AhRtm@=pZIBMhV^8gm4W+b|xfnC_J1GE9izxJp8$HH4K6-hHVwGnV4YjJ%WIvv} zm|f~3wcU-$s5g;xXQp2+F75B6nD9L6pw4iJB45ODyBxM+zPdMyuz+7Y3wtHvv#Vw| z=tgm|#A4i+{&e|wd>{GJv6E*ZzMH&L99kiOEmAR)XZWiPi-_eeuF0lN~3>6ku zgle8sy^4$}8N&rcZQw)Fgr;-h z!?hzMDw*p8UEyGyIG;pYPHMXu2?=&e6{9={ZJDy{ZI#;9$|G3Im;$;eOr3W=|Ks1+ zgzQo*0(Q0#aq)3Qa1)B?IX{6dSA2J|Fld(T7LRj^vOIg2cBtUqNr-bGnY4}@szXtP zl96l;W=0_eo1vskmvPX~F9BbKIj{dnN2vkRZ@~i6Ce?CR14Mbq*#*^bSFAwNz_Y=R zzbp8a;MO3lvEob-)ns|^_C7N!B%$b^*?t*=UU|gGL6jmAAz#MkzDPqOgsb_;7pMp- z`LyX|JG=rVO#=2tK0uL9=-+bJ?4f2GeQi`et4y%IP0+SuJ@j9O8S*0*Gom-pLdJ1p zhL^9EWCBpTwd1KeNrd?NQk1bi>b)na=XqWoO|Varws#G7m6=JP)hm7Y@zO8<>5AHu zc#MDiBLbszj5c|4G7^jXH=h_MLj9l$e}W%qHPadGYl=s9(Xt@8PbRD=l&70o|Xu>zv{Pn#;RQz|yjj6Hzt*GWNR@#N*p61=w*k?rV(pt$s6|D|MvY>}t`dFE!STMx0QO@Ck(J3d2Yb1yi z5KQ6}T~ydOCWqgX$Jdq2i-?dS;~Eb4RiZ%kgt^q4vEmvYI0> zWWkk>T62d-tHzro!s0xPQ{yA4O7*svnfjewJI$v*BGVqX2X0(hn*6DC@ln%FPPyzu zD^UG>TmNxpeZ#m3SHEpog|HdQw|KC>4p6((K>}3v`wFXU=dBSQ@I}kgL0^=3*jZ`# zK&S+I^rYjp`?4$CHTi7O^Y=u`9-cP1e6J*Btuhc%^F@@8qhm5TJ}tyvc86^JoW)FF zTyyn-FD_;}`2cba&WHTw>5^2thj(zU4B|}dl@v);h^Jd}UhBDt$lo8(AL#;%wXDI$ z^2XWwPl?3?ab|`j8vF;>_B!_|Q)!lm6=p`pz8yUOxzWk2V$4asJK(=`WNJ-)Ep4#f z%PM^8`cGT<;xdnjDMC}Wg0k(jgqSM?pmYn z7EHunMFAH5G=_&f&Q_^@LgLS4kK3coiR=ikQUu34ys! zpY)R^6|%4QZl273Z?*jK|0XC^?zBx)q}HBW(G@ec^oE+fL&;x1l_~QGHSj*x$1LyF z)s3>96Mnk(Dw?1Z_9D)IS(FCETHp5Lr5=oEjkCYCu4a!+G9EXG|tPe@ZH}b4>(CFyRTj2v6dJWF%D>i zsW3cu3M+Q3{M$=J76!wJ-ZLkrk|^jY@ejA2r(smok~ZD$ju(zNyUO+q=#ksYPfq3? z(d#S@;YkH|*J%#GB9CWv zy@=S=aj!zUiPehn{Pwd%j{w+2_ZfJl;zC&BAL|mRw|L@tEMUUbc!_z>O-zr9Ev@$@ zD|1Pk8p|wIsP^Gk@v5SAbM7AT-@BbPb8FjGR{Bab;&<@<$o~5Tv(-BqMc3}YCPfm_ z2F2D!OP8J^@v6=CWR`9ujEa)n#2l;l3yzhsJ60wwxpWfAup3p@Ske_~1dj-Jr3HDi ze1ujvZ}4PZa95UHN=&)kk`?aI&a~0wD*3PmL8aY_AJQK~)nS3-XxgnR=?L}caw(aQ zc#2$8pttyEKA&g0O3|@BzAkrE5WQD}_Uk|*4~wzrS&KZY{#;#K7)WwDW!^7H+QyzpMKEr;qpsdwwd+U>?u?EWN5(={J_Aaf@K^I@}@>Djr%$?~`NIIdVOC#L{h1?||@JVuKCGAZJ{ zlpNl#6;2EY#eSZsj6dNL=!Dr&%X)QsYr5&d{Lo>_fzE40hvm_bpT?rglO|Nl`jMu+ zG22hNoJM?|Z*V!{ib6yp?WH(FYFiMURS=IKlqExK4-Tt6t)Uj2T&{L93>2Y@<)QYU z(On+<6cF`knfiyC=z-q^7;kxE{1>q6K%$GXfhl1TS~GN%~Q2J7FE1lITT^q z0M{jZM1rC}qEPtP`22ROD`o>@?a+fW*W^mk5HPm6J*`XL`7cLv#oI|sqwiobb%(e& z8n0bwPn%sURp#lY4ui-odoaHWTvg?EjhZhqHEKEk<$gaEACxWJn;D!t%=q4Ye->Chn)^&bagqjSq2B4^`+KT#(H!T-vQv`JXQ`~Pvo(@k-pHr$?1Y#N zLc5j^{meC{2InLy_nHhSy6VSKyK}L;8RDu>?BsA@^~;1Z z(%MKuHfR%=Ax4et5q_Mvk%{()ZO1c3vDn>}nU~8M{UBo+b~`K zq7A5g8Xn`1I=yW_KBHQf{kTw-LXxG7U#N%MtshVMYibxZlx+t~9WB}ib_Hv5X+ASX zkY)AX?~5{O>p~k6r`qJv^OebbB(@nDt z%S<&y+%pOjbqujdc*^(r$;@oAuiQdlVhQ+_+;3eiz{kcE)lYBM>azuwYM}SK-XGLO zsE1bTedEVgxO?577$VaQ2Te)!`Vw-5xi4b9`SzG%56wIkq)Soon~a+P{B+O>8?|V0 zNs9iYx%ge8?hUT`6@w(E^l+U3ncM^iJJnM#0|6PF%WetUxj0;D#I_}(M@!IN*EA5u zQ|~epK*j`Yjgv6qR^tRsqiKgJi^H08MNfw}3+KYbD9LzSdr+%dMAtV4BWpSl(O_N< z>h~bl?gvr!689vfl*VY~+Yb>43&NgkYqn};iXV%r_M*8<-gWVGpmA&7S`Ax33(Ivl zig7?R8QB@QZnGW;Kt6n(ZM%;Bj&M4(xvrtnyza=tV_t= zv({xV;|CfgFDt}{l$wQZbHfMRdzGiET@vt{NSw?n8sXYEp)cVj*2$Nbo3=xkW#ra$ zxbOPzVnf){r;Loxi+JKA-Z!jZqh|*ii(V_R?ZYmJ9jwT}Z%8tobT38AuMBlRj88LBBv!Y5idx zRJjGMm(0wquGiMVrXXuWy*|X)W}eycLCV<*fBmC&Ki=wJrLxHCNE7972azLZZw7lBF$-rER6<9ErWE6lg*`;=s7MU!p+3n zMyqhjHTIRuU*W_&BPqRzn4{L!sOjXbztGJ#uds4{`pqO8jZL{Q zQaqpLwB)Bm)O6!u6|?vKBw5(N1;e@y+)B?0Jz4?sd#uhMZr2_A`8Izjl!Im+Gs7>B z^h)r2KKl@0-n6~&P50)nk=QMoL3PjIp6)Mh6r=e`Zo-x6S9YrOzg~F&@oH@SKR;lt zBn!ZWC$bbSE5y3_)J+o14X*wBr4&#$#sFk=niC4AlV^6bCf(Z6W}ymT>_=W{o$AV| zsq&-vk45_NF%Kwb8~D;F=tTB*Jg3&5*t4AFRdtEl0*%8Y_9d=HuJlqF$h8!#j&U?!=k?# zevl}_=d2>TT8#NPxlExDVUC*Rfvj8&%cLrC-QdIwfJoj@xxWcj0Q8xvhSVp_e9HJy zM#w5ur5lNKyKhHc{};M_QU|^4CxP0^P-HJMqTa4cW=rt_0wgC!TGOdDzY6TWT%o!T z9lsUldmpp*U=ZSM$je2M1X3MI%U66f%g(SKAkO*gdlKE<{di zv6~w&Xi?9_s2P63N=V+s3RXAaZcEEDH(lizwbg|~rN3F6M8Bdb7LHyIY4?{JwtZr6 zpt~p)M%(|P&3#p`SV(_G_ioo;Ig9;=k+wTVHy2LYdyE`#*chH-0Xs(1!W+tP(sszc z{&AwsLjMKE$52v-54WC)!UtNw@jXv@D_ZUPq_)8_vU`%#eC8-YM*R87MTmw%mMh_O z5uXPOP2L^*oxF9v=)r0W3k%xEBzBE~LdDJ~xJ>t^s7KPGZWcdPaxM|KOfE&VMjvT# z^oiwIX*d&Ae^e;%C39h>K5su&6m5JLNl#V6v_G^$EtTai6ZWvONQ;gP6fXwUn|zIY zgcxa)$(z;5@0lT%S1$YV6xUuYxSeQ+u9CZjH&hC1FQukn?RQ_92l9RqA(O|y_1vQx z&+gLb7K-y%F$}*zVrX;BlZqJkCh#)HTEkJ;ekWZsoyTbBO9_wGG7ucOd+z1Zg|dYd z;lzU7BiCh%t0BLhl&lNunMB^U1Rin08YD~N1VcH6)&OTX9oq%P5g&--|4q1zSu>Ik ztYxuIfo-osgOVjp0$?;Cil2_SYLcX?)evFCW>92atBw(|{I(0MMcuM4tEH}Jz8d5g zYt}ILDYWXT9jGTA1hQ~*h)mn>#1Q3mqi{u?_FuvHkIi_FvQ!{4!C7o+g*~GM|OU?4Kq2tnV?w;4J7!a>sx8zlsh0Ixs)jOeTlIbffa24 zUBd)Z7o*npEuXLQ#85S1P)j1odQ4va{w`U%siI`w=~t0|&nI9irf#yPD&aJ9VRAHt zDk_jnaq(!>Bk2`4`k$%0FYkh#JYV)+YTawWJ^gRY5Vrw{cR?4=m6gq)NvHF!do}-_mHb!n;r%~{PnTaA6c?HCQ!%8HOZ~eBp>=zgYWH0_ zJK}k}m;dt+v{ce27;~=DOzIm5BNn;|f%i8Qe^UNK)_~pD6dqoX!WB5N?Z5HX?rYBf vl%`*u|JNhF8D86m_uwh9|NlJ{cng!do3U{wGH5h<1OF(?Ysl5gScUvQ^^)Ez literal 0 HcmV?d00001 diff --git a/devices/surface-hub/images/approve-signin2.png b/devices/surface-hub/images/approve-signin2.png new file mode 100644 index 0000000000000000000000000000000000000000..2ccfc40eccd117958465422bf3300fdeab485b34 GIT binary patch literal 33650 zcmb@tRa9J0_$`P-&=5#)cY?bUg1bxO?v1+>g44LWyK4xV;O_3hY1|u~{{8REU2E3d znTL7k)92Kx?(_9`zN*@L*X~FaC20&)LR1(S7z|k%2{jlPSm-J2Ulb(h8;ly>3iOCz zC8j6_1Je+P_F{qvz5d`N18{|b!R-I<1)K5}lL*@Q$xTwnP2JJb&C|ri0!G@!!otDT z+R@EW69xK_ANR5nVj5nCXF15mxRQ85Mm{JXeJ<$XD5Eg2aS^dkyG-zi?pZt2i>VIe9B~x(lY@O)#znI8c;cyO(;v)VMC%l_{o{gYzQBVPi-8??8scz{^J(fcP{ zSD5A3s2E~Et4WnB9Hulg?5^Vmo2G6lU78cz0P#1q@7W4~bc%PTVq(Fz z#@%m~nFBT@pXz)<9oP+U8axN=Y$1%_1AueWH1W-p)dw<{<)(!I|>H2$oF z&D&PP8@6#TGnuw0D#(w=DssMNcP)^Q94Bxkv(1{eMvp7y$$idE8`9{|M+<1S54B%3 zl2t}PU5o!=4@0`^TMHNXdoV#H-$o*UJMx2e?c|QgVla<$L1%8%DAo9gyDBN0Y01DX za~-nn+I>@&u6V?K0WbKA_h|2z^X zb3j|8l6bq${M$cj^5JMzHX!S%O#mffW2Oz@I?)|98NFMMW54h_l*yA z85$Ise_g6hqEhP6r>;S#`Zmnp&aq#my}u{#nABcbOcM+E;-kd7$)*oq@Y`h$h-F9d zm&-W+v=YHlNJMS5#g;|=Et6qs{XSwUBefN)buE)Bulqj!bh@_X{QKvTk7WbO$-cQh z2Af`Y@YpG;%N8Gyu4lvtz}zOGyQ38!SzwuSL%eAN{tH6+bsm<#x!0w=(a~ zIrgMgk2CS#Ps0~$$K{xhrPgqqmsMPYiy3C!+s+%ONIQm)B9kokPu#uOrbJMSecLA0 zL~CM6yHqq;mYbn^1Ay<(``_@<_kQju4!}h&YSewd5wUcoL7_$FKOWzG(~*g0E|y zIxM24)bP6neuX@&$-g~$##X1-rKF6uqA)9Gu4=9wDBi_i4YC{*Wo5T%X(k-_*-x@QkO;QkXb1eReRxX#2Lm_Bh(N@-U%OT}ounF9Zg^nK{Ur4HTd83>HeTK_ z8ur+CK%a&lPzm}8pIdii)rrjl?1BQ4tjmvP=Xq!6!B zEGyMzKL2%p8vaRUjAYd=mj^T&BA`y0DZs!`=~XGTLu$m$DWB5|9ZBPm=UF5`t8I;b z;F}7+-Lh<9feK`DD4G$crQX~z1un%qb@3-_=S_R(!=8c542=~*3FdFdWTm=+?J-f&K=VulNB?V3wZ@PG(}d|gHY?}+4A*=_ zc>xcn)mw#9S^CwX+*IyHvE3nNBaPnFoWnV*`qJc?`5_BQ$#X18agG#9^;QEA&88sC zdQ@q`VXRK{gY$>P)XYjuE?Ji*4r)=mr2c(}nI{&-e{hV9@RQCrU%anYeD^@%jwu_S z#|NDD_cnIc)5m-@GVf2f2#<^~Pb&r$P6%9V^Y~Mt`mwDkrAj3OS)cM0@@atX~R_=@|THhDp zpNBBlH|D(}U3)jYq?~k5J=&zx<=jRV6(;RIN(>soKgEJ;wbL$>S4U`V74QBj&{c$g zJzGE!x{_9YmtM8ba+yBXwr=8Dn1>0^_OEH49{wi{`lz;$J}SYg(8$<_NJqw?H-GuC zW~RMTc9APGfPx&Ap20xHB49veYBcYJ6RQGhlxdI)aaZX-)xRr)=<1jrw+rd@@*6u(QUAYRc8(P~P+gy%f$EU?yayKBSIKCf+!98j%Jb zdGl}AH|<9?DPM92N6^3E+A_ZmmYJFNr%>&yfs~%}{33;(^T3j~tF>G8vR|VmY}&?@ z*4!i?1W)(+_QSW{7zrwp#k}mQ$So%U`Mm)2(P!K=ugk>Y)oVmY3oP2Z)I z$*4og=fXX?^K#S5WohB?dGzyS`%(KvKKJy8aAI=lJkKI@fjd-!&aKTx@TTyX2PLt% z`upocsy`RHf|7z-U@|Ml$zqEC{g(9oitiF|)DYGAsZJ&3pl=3;`$us*)%Ec&GR3*k z=9I6fa&;{`?P;5pOCFgoPZ0UUa&IHMB(vUb-%%yxTuRY5wwBw2L_)kl?@hqcut~^$ zQeZPuRhq8!{l$j7*7&1Tz|$@nf%gzSu(V>v3$&$Nc(Sk_DsNtUvcAqA?dFrwKi6LI zWC{wbn#qA#PAh#7A*HJ8xy^MZ<*Nx>mB^}jF1m46c1P`SJEr!oWF3ejVFiG-Kx~9&h%1$b99cM7vLl3aU3`~A^s6K7W$wp$U6|DarKa4Z#d zf63iJ4f)3okG+cWR8cPDi&hQE)TP0&$`Der(pY@Wvln<~O)(E;bX|Px_U|i|c}m!o z<+JH1K{l?t+it*%B1`)#Hott9rYj!HU5>g11+}t#(tGSL?OdN-D)qt7mB!K}{<-!8 zPUUB#KQd)LKkq+u$3ttMdd_MhX=xtclhiMaNwp8xcGURD8wZ2gpnLStoU0P>+btBg zT_Y(PTTFphwtWGv%t2-e z;WeF{;o_GJ&K(2b+mSO|U5FtOF^gi1fyW6GYd54p$Z3vd*72JWh>&M^6JBWsc)QNc z(Ybr#y8pZCeAdI4YPUK8+#F~*#vXo;2WVX9`d)5(tT9v?>_KO=SFJh-a+?)_L~)fkmf|j;NqJ#@>zY~JuPS+%!5jAMQAk>_ z;~ni_)cF}LD zbB;0gMOt%OTr2mCiIo`?6oPoytWJ2INqr0I`odRh(POAUUz4rQ+qD8_{IL@@y!Y9R z$^if;)01^F?<-jTi()GCfy@@$8;0wRpYO7+7-beoWfQuD_;IP6@)m+JMLFF*6DOZ) z%0H$3;xSyF^jK`jU9|5Y+;!CceWhnjYn|oGLSnkAHI(4@_D6eGA~%x&Q&LMc%_yLJsjBwn<$3G+6n<*B8gOIrE9@38 z+ozbd5Lhggp2Iw~?w_-MbtGRJ5*NR5lu39LDAh$BPWG$LPw z$6WZJW)0xILn=1!1}hzUmx7e=V>YqKsgJCzqT2pclI(>r0|Rco2HnT9-N#;yVs@$#30Kz2=zlrzxi(tKz-_#&uF(_^~V9uetIbE0e)pGk}Evxo6=+bDgSXn*SB5PM$@dNUC?_jucrKf_5 zPxXWc$PDq;r2sa`lbvL9aBwP?n5>=)C~u_(8!hB$fE<2_dt76O?6s7g&$@0(hUEps z5K9+VO`iTrVoefTeIqNyUaaIM@}DqKUdxelKb`6sDSsEC!V-OId|~%bt!sS{@0k+3 z@T>jpnXm73|KX&3>ng_z5oHS&rj6v%>9&*y$dm!*9fhScvK7cv8N6t*tgVwXJGVoo z&<2@rzjaxh4T3l+Yb|bof6*nf(Aq%67THs5+^J|`ThwKF z-k@sT-)g!%c9iesbRs9i!7kSCn;chZqJG>FyndXc$!4o>S#9RvLOx(CFriG7pmZwR z?1_`d(jlQKR#1bm+4jo|aWfD9&QI}TV6^4n_J==PZ*J9{l_n0~{eBp(`Pmd21}rn2 zWK?+n5aXZbFC`@4d+A7RE4&kUY_RE4_+7=}65^BGR4XFrN&gC$XlZgo|J_Z?sL6;s-B@fbnXd4&JmJQ(=Y?S@Cosyd`ZN8rV#zf< z-G1OFwvQN*;EIp5-LJpcD+BRZ5(=!04t>i9qJ7qV&pUM|g^$^c;yge6Q#hR3u`;4k z_f8+kbpsq-VF?+N9dC7{876}`{O^Sz0WZoTf4pbPcQi1pF6LJg!&Ov7V;|17clYC8 zeTWcg1S+a>egExk?H7XI!BwCdoEhCvk@$RBww9&YLb8Mu^tA#BWD@&U-sCBWu>R)mHJgwe7?kylI z`lbh6cI*E`LdFf;ofC0v$3)IIkE#AC(-uulp|K1sO z1z`w1u4i#QD&mx&7;IKqY2U05^j`!rcPqH>)>FLhZ$Y9hYNg^7GkH^AeJ*J8{H{U# zo0@p&Dbl%tYh|vRV4MazSn&d>^v&XgPPcaqj+6Zd^Vztb&#ZjpUc&7;8U%h(7gG-* zH^W+W9oAPaMrUfI0}H!EPK5L8e;g1iFYlp* zc`e8Vuju^wZIK>)uu8$gM}$HNkKsFitbPwxA0v z(dghA97#mZfM|!jTGUxXs+8U`N*uQi09xA9le*lRG+(*G?5%FL>nQd$HBhBie%qZH zBL#cuZaCy=bgKz(c)dN^T$;Ptf-#MmtLaAy*1+_<^jf#bE|$TKYwZ|Ror%Pud(L*3 z93Dy7T=n~X6tmkLyIh&p@2U9fWL-@vuk4+3?U1e0=`7+po-_96?wZgOf9F%xZ!1dd z4lLr2(JL(J=+iW#*b0k6ho%B`+y&qx4rQxG5sral#8ssfK^QhUMXZJ|gKo8m!Qa)6 zR8%f|r-k)j@M`CQ*!DI^x@Rjw72906Z zOFk2Clcayop7ThpL+&k@T}+H-kA~mR=+<54&F7E$0&&xEq`sgOcSd4_?04X9*!b#e zQ~q>Ps|S8f{EltEQ7)e?<0P#m1gGNt)-AVJmy)TOfYQ6;G%pkZquW1nJ|XD>uL}|* z{#NkP@_o%tbJ@?Gk9Z*>({(EK!wJkkIX)O}h{{LUUweu2GkM?Dqo6V_aSO>I3~?;} zAU{kvRhTno?@olt|H!-e|A*#G%sTU%FGe%s&k0lLUNg(yernL(lFxsC?@AkRDYX>5;goaKG*;}LeAZ3kNX=P zzu(2evRep3vNbjbALgCTp&GJP;2lL=_hVG0$mc*>+cX|wOtk6DS#U>lxxv81C&qhy%VD3)rm2b@cC z+Hv3h=m@X132RNEz7Ri`_>bCnOU$Is&)8*GEAFrKk5f2)=Q^a>W``g1vN1`XWxzxl zBA2!tWT}#gkjFi*T~8Oj?pmwSZKE$~#B?K9SBYJkQ=-NML?yIWvOGDKY29p6%7do{ zOLyON0 z?+HmB@@ch-Ns1-EZPmLwAwyCt$&&48`^yGIGI3u<1`n1TCezv$f~&_g9ILW0Pqeh} z9kOgiGEys$UIt<&t}mi$5{nO=06k&X7nQ^i(fe3KOP>LoEZX$U-S>!}^~9vy(3uUtnini^Tl7-&5y*!_*<`65f{rc3hNWON}9Y7%VRb zN@7HbpdwA=yH5L^#5ma+4@B~~gS6@^jpKIxMpP%kch<~$W*A~1@MK|rm=bVhzgk+AizY@wf`N*mn zXKHu5ld%6h8UC^`CQVn9WEHqcjuy$GT8N_Njhw%lotsJy`GW50(pgD z4z`Xtv2%AigO%$(HGLeTU{;qXU8WXZo{@dFvVY12A`4hFlwR+CGqhJ%gZ!HhXS&`8 zhj)VoIjz3_Haf~1$)dB){rCY3V|9gKBWPqTd$~aM{U0JA^W{y9F@?iB2kN0a1>QA4 zNF^JJq}@Z#d;`;ZI#pcNj!-ehO`qA)uzXJ~FVd2HQBY^KAE2GV$j6qGfuuD;!0M#K}1|qFO*}V(*<8_ifG1ahhH}m z3X#}IvM6HM>THG0YKR{_57o`6h!~Qnz}sY(a(Dcm7h--`Tcrk617E2PJd`ew2-&GK ztb;b69$G%Id1|(vvnow47X`c7XII}FS+5@B99oP#xN=OG+-roh{gM~vRMZ2NN*e%4 zg@jCUZjW`OF^_eX#edy32Ds*O&C47&27t`}b~0bTR!_{TJ$Mh29;>nP8;UGtzAp`| zl*ZJ|;?T(FVB}<|r`o5~SsgV{Qm{(96+ES$Um%#Hk35t)CazR5PNS=oskXGi*5J@% zC8$^mv$RRGjiR4}o8&u;3{sOnvf9oy%I1iP)?>z$iK03WaegXnZ(@k+NVawk!nYVo=_|h{*k5ykkK`cJ9 z>(hX)p++!7+r6J&Qb0}2fPMg0Ck154_K_-`Jn@6R<)O1fFj(6wgZ6@>!(qD_z-vqj z_h7d~F;xv7^XO-j6!@1HN3MAUW6yn%D9@rPqKT0b_^BRW3{~IV!jsPw-Yg2%Lo?Uu z8*kMt9jrfMk#j*$s4kmYu;_|+n!Zbg>4=@YWGs1a;#V02;-Ia|E1A;xHOn@d38xX7 zG{$%#kK(2Q60vV_hKS|G@cA&h_`3yuN!{jXR!Mz3<@k$XLX*7$aGbkFT4IdOMDg%o zfj2U;)2O|v?NqH9N5HcyAMx7d8m4Dx)HxwQu<^cRL}N!1=TGDd@LS-{i>OFCh0P9| z7il>6*j*e$(_|WoqrS^XN#X~+tBk}33Nv{HTnlTpbnYZcoc+=t*f7X*`)_$bWV)%m z5!p*{AxwBtc6kl%!pkypHY_5` z{1&D3_Omk|u~=_ub-~<<)nUPMCp(vs>Fnc=!pMIT>#!;xef{d_*pM!=m@+5VDHF?{ zS)3vSZCNnh{OL?T(&>-O$G0#JqbVIzfO^vHKVJs~GF zbLFU;HPTw4lRjS)buWELcNe-r%2|49^96gYbXX8z!l2&VP}9*#e{~WmY{0lT(3$V% z1=t?`4!h`a)GhN%>4bdBt2S(rGxT~xTycL89(Lm+HsN@!vvHXO9Lh9(nTTn>qGbp> ze7>8=Vt6&XiJ4(=zH;`Mt;VUF5m$4GLi+6YUdd;uZ4xmzO~uX+NK{j!;V)5Am7^?q zO3GPs_q$<8Je^XeWnIa06Ue&U+Hp#bKFtj29UFHM^^?u7=t0Jxb7F=T(@`YpIU!aA7?o!7@zI_ehFC_8TwSVJ>#2A zqfcvVHi>;Z^rFEYxasw(f@dv#y*8h~U$}ALP)=Y@9gVLKvaBh{r?SY?hoFz%Vz-6F z&TdmfMMZ@R<4-C4%@6G6C`$va2U>ZyqE_$V9?bBfe_m(w=|IF)z&1zLsUI6Oe)OEr z$ER)ZpW+`?N}Uk`;{FN*=hDmvek;=<)0pfZR?V z@1{;3nz6Ki4a&OrM#))lnVfA@T?oZ`a%QIODmnB{e#Z67@n_pr3XBt&@?5Zq5ICSq zd@PFM;|hZ*jlN49)Q8>o zznV2qV7zL{`)`nA*>t*mS^^ob%`GkEw6szKS%j`{HnMVBK#Z<1F{{tdvlETR2CbrW z9N8YLHU|`u?XHJUuC{dVZ_jmHj+^>Q0>{*WN_)d&V@Y3_b!84Gb6)vNZXS2zvUtb5 zDvAxEJJSbQj!$WPg*lAQF!=BN?L-zMryz?!gHGbTgM-l}qd;c&llg?hyui&oJ;CGE zmMWo#byt@q15b!6C34tH&-<&gq3;=YpprGMLOOYxQ9ygP*S|;(;40Tj;QOn^a=l5T z@gKN%!dPqCf0*Rl>`Jr~Q}Kam4%o5>cgF8OP`*uw;|rJ%fAogzr@gj|491dtW$k_} zWCAow)V3cGw(qCvna`CfzLl6Rl8FX%zCdGlxf;OB(w%7ZzOnRv+zH>m=y^}2%k}!6 z>vt{t{wV>^&`WGm^xe<89Pa)SqDKIm1bvdiUy9M)QE*h^pU*Oa^8-+TcLrlD@9%QH-4!^3RP=39cN^&#U~ zyi?T=eORLD@x;h|0XiO2!VklWyc_1|h0q`EGE5OZj7;W7ZWI71Ar5%lq3yTKkVG{x%B3_;yL8K_`z&FUD zOD`<440y3-q8*2X+j{z&jkhtH=RvU>#3#w?b95dTxlb%s?gL))g0ovNF00e_R%l_})7EN?HzbCdlr9G={?7k_SUPO*I( zI^Bp8%x9Nq2J4EDyw+95fme?~5=>UPjN%hM>K%C6L;=Ke?wY)de zE#f+KilBY^`$5na8QU2qy`wVirNONU#Supf)=gKH=u>x_?ZW8KfuE19ti548n|hjV z9@zIf)qmj!Sg8PnFn#$N^MjihAV(0+5kS{ayFE-V$=UyDm6e;pYc#-;^ zvL_v;AhJ2OwLQ0TAQBt(g<<4eEpbr(gZZbaoNBcvBNodTD{VuGnB(at;4B}*mbIGq zk;Lj7A1eLVFmZacc|&MvB$0To&y0s?AAcxfx6H)(6H}qr=1^L(9qPS^y!wJn;ue35 zTjU{fnC+?{V(~XV;)}@Zt@<3Cez81p$@~xE)Mi=Kv8!SwBrvoo<)p?tJ~hHu z2%5biSR&TAxtrbs)wLbx0&_{q_;1kJ{j>YI3H^Gh&+}QE;t+n0o!d`X6A>hjolv~Y z$?v&z`Qi!nnU{Gof50dX9cMi1f)~)@A0)RS-Bw{kKx^x>oXTZBTWv`azP|+de;Xp1 z4C+RHg4^`k#b~M)5684@#~YPj%N2pMwOTW2TXX0jIF!h+?|0txJ|vKqX|EVi7J=*) zM!*bx(Fy4AH&%2sX>S{RsEwX8UhNS58<_c-%YwKiJVF9yolPgLWK;vOMU;YD&J&7h zA6;9Wp%Zyle8xvSv%loA0w?tCr;TF@zFE3y`^I(_f1R^spaVGi2{}klAHOct&}DV^ z=NX>9Q*gWBHw=ZXAEEWR-l@KSRGsx=C%K3}V*b_h)%&I1D?n@ob&8g9CdBfN##~+5 zt?l1pZ)@nhLq|6I^>#L!#$=AW4I$tNYuWoSM_d4AGEPa=Sg=)^=i6MFbR6kHY)B}k zIB}`Lkg8z$EwJ|o959P^Xyj{>w%mc1JKQhaRtm{S9%CEhc`ju8GGp?ef0|8>$D^c< zUg-)O68golgw3_zkssf+yq-aEJe6%k1bmP__lv*4 zBHj&4P&6EIY&p3pCb@E75J}d20+Iym8YwxHO>n12@WTvGevPN{;ks)1p#O2(Y2J(S z1g8F3Akx{zYijT(!sG{Nx9kW3m|;!U=}NIEbathnf`L~wXgnaQf0!^X*Jvf~K8?3) z9Tmki+9MRuc7$>c@VF-3Gw<`UYQb#33y@|%XuokAYW2sB^?eZTYnXUz3KP)y+i za__6}&X}mAEaya8P^-Tz^<@=h0g9(^c%LeNbq!(@|MmA3Q+DKDBL5C9<#;O3Dk|wa zg}V|1b$1a>jyCfwWz>XI-oq{iwm5I8)twuY|KQ=J4Xd5>ANw&uGRCQ_PBS4dh65Ns z)|-C$re-f2H7h;a%+!2AdbUAgM%8WOn}i^2PY9Ce?&{U6AJPK~;*ag+{m`=@>=Jx#Xwk%Dm2le{W?kKTl+%K<#2bk#h@znR>2F#+>P(vMm7i1tv;(g;z5MwqD!QZx&t5N7ZkifbeL|&@$?Yx z&x2R26R=ueklrq1#dHiGUwpRX|Lq3{s}UepP_o5;cv4-f=h4ipLCnG&N0ZWUgDXsq zSr?xeXWd<656jIt*uxKToG(|kEC)(0S?D+-&DK-xayX%|+4B^^v8zOcUYv5~qfCal z^E#|sr*Z;6M_oMimw4f##jfB&C3={SC>&SD*uZgg^|C3+(`uxEAY#zbB z-SN)UgjDZyXKSXg$4(Cgrf)V<|-xB6cQq zF1ACkc*LvOfkSxZ+I6`ELZR%KBkz#IJjJ(aK$8Lh^6#|kVbkt99?$H{rySV9DQEot z{sZ=)56^!ZTtJ=mA{J6oF{=nMF}M9V%IU{Mj-5019b+sV>2?TZ*)CB8r68AO4!y-1 zJ#8)@uKoI@{}48>cWk0WDEzl8{GYBDT@O4V{v3p?sFJ^8O*!1~cQ4sJM0dV!O$`C^ z$zw<&uKe#7v@PvL2X_Nsu7)P8(wJk0rkvJr=#;pk24ENhY!$=w>twnqlvy9}y6|W`pU?Ft+BCB2M3+>kDC@$S;ej z7-lm=|2)Wnq$2!uR5Wp)y?ebs22wB#e09$d4eTaJN;t^iwnxI0bkL`|4tPG}<$Pp# zK5Uwg$sdO)O4V~{FOiYb=OxBE{PEJRgkCq;I*gJ51L1=m4NfW?|FS44RS#tcoXPDQ zxz_@6pFU#-WfGUX?}U>nU?>a5sRoq`!wj^>Pvz&veC8Bhh05v1!lRQc?Ew- zj*R{E4OW%u8#{p;ZjpukH%jD~kb<5rOc-QSJA!O9q(>-5BPv6Pu^ktQV8W-Hjy;th zwtXgIQ$WvcbjdwUa@n~J3Klzt|Ffd%>Qj*IF>i{V-tT>BM-r5ReJEaokxjRY47YDe zbkY6W^TJ^eUc!M7p^$lW$jO`!UP|UZwi_M)7l~!g>N+OfZnxM3++P1vH&LoGbm5byimdfz^MnUf9@7rO%FU2gpC&5%Iu zy~1Z-UM&1}Hpb2_qGxIR&Lcr5V7%2@%?0no<>6mQXsbVpR~<*G@`d`|4CAk$Y2w4n z>D9{S==577aam~a>P^FbQAG&T+5ML~rsK9h0G)U;rM~aY-xL*#zt2lFMbQ7)HEovg z{I;@EH$a+nciPaK%Ud6iuRu%_iHaO_^&cvCEdkr4C^th` zFvpxdKEF$`O~K%QEtAbv zM?0%T&%V?T_CuDhaQH_>3}P=9^zA^}?j-T*Rd8agJb|!uS|R z1O7$QWp?98IhP76Az0Ws_QI-6zP~;6(Dok^M>f-o&cN-6EM*T53#g~AtY+KEx>*-6 z@u_~BY_(5L84bC@CD7ey0GW!1>~Mb|0@h$hEG4blv^LBw?j}nAGi7fTJ^MG>8%n!p z`F@HAU+f>J#)i%VX}+@Olk3Rfp&6BVgAxg=RnUB|>)|AK)KLvKtXY0vv=T?mRM^4% z0S`4TE-lv(ftMZWw;k&TQ>RwEoXcd2Q3f<_LM61_`sYDD>kz#RHF1suvO%dHWR-x` zdOmKn3D}s#k0fj;=AhuhTjD;%nk|^bpj_rM(A+xMN*aon9~9nwRD3cZao37 z;{ib;u-EKzZa*#28YQecooaNJHkDppZl)$6Y^5gT%_{`gFA-F+Yzau1Fo%l$u>WzR z>%zF7cKzH|!fru8=Tt4N~e?<(qSW%L61O(vm=rxO=9%t$}!kv{kffTSQYg-{Q`hg zxG@t!p!+}KpdzWh*Faz7UTp9G*UjAj^VYBI(Mr>y%zJY%Z{&|IMTAZp^DSCbo{2g< zLol(BSH1UZbLCFo=gz~)=ND?jg#8rNZAJQPdaA8Yd(4vE%Y9$V?EAhp?p^sX)V*J$ zvXH^-Ea+~!q5HWnqt&Hfck_dRZWZ}z!$Hg^u)4W-Y1ToA^P3a=jF z`q<&P$3SjmZ@hR1Dqqu7E@KZKta^H29l#(oW9F7??!2C4)Y?@kA~37a-p$6K?h4}G+Z z-&pYTH^}n#3l|TwLXtt(Y*Y7Mj$hG?i6~K9cXRB)I*%V2*3^_l^2JDvCjayTNiFKh zE_+R`6op4kE&kyBc>Kh2IN-d}^IFa@B(7Dh>^)q@#4{x&S}mQSgPg%OF{C0c`6IS+ z$RDd0elTRVFq;}ZyC2V<4gHhUxKN~xV`uyO^$6L9fu|8EI`e!ND5xr_aJHAg-fC*8rn966G!x~|>}0sXrDqFtI; z6yaOV;`kQCc1QXmK9n|b~0^rB%?0g=SRR`1ClmPIEB%q6`eV)>BP8d)bZ zygxmg3I{NtJ@3sK4@dgvdLLv+Zf(2HI~2~s8W)e7@h!sUk5m6O2g9&Q#31fk7{nx> zu^}zCtf}oHyTSy)_p+7Ku=8YfVg}u<@ILp$vf+P-4R3@CyKsl`>%f9<**{F%-G)Kg zg_M#?$%`T)*^JqV2V^4bH3foUmPwI&+g|C>p6MEDmSE$Dx}jDWvZp;E=ged(9sJ{R ze~AH2sRDMTgW>Lujbwc=++VcuwMkb!*!BW`dVlN=i-xPljz6U=8h+4l+8g2fd zXu2stnUzl0Agm&iWz}}*l^iM2y^#hiT5*TwtUzIt!^v>drCxNBti4_sd<_;xT8nqQ zNpD?Sd-W+hbCEuyV-$crK09cdxt)g3LzGUa*oT}84gC{*O%5hZU5(L=QFb-!mw>5O zRvgQx%qELcYVL)o*)?K~DidWGA&p;-2K(#vS!N>GBcF!z@C**u2%tyQXV&4F6?@cU z#|~Jvt(<4OPO`5}&kX0M??IWlb1AK*@bj^wNc04MJy|9OaaQA1wDX*~vEH72n}rwK z^&>U!noI3}jCi_5^qmU80 zymZ!n(<6MW!O6D|;l~Jlmo-7@hd48SUx*Q{^uK|LWllrbi2Am*NG%59Kg1CTN7yVj zsfH>?2~YR$j@qMkBqN3ozAeXXu+G_ANu#^ilU0KGgUTUHk5EC!$^pnOfiJF+ zf;{-CA8KV!{$t#WVrzmPP3q(@#8142#>?`b_WTQKlEIWt`QL@;|C>JDpA7HiJc<-a z^j5Zq_a)GHWG6z?bQG4_8H0k5~sym-)YPt)|0YO9%G6iw0&fwjD|GNC&CGP%o zc&D?#@ILu@ei)GeXQ(Kc_3#iJXM+xfqkgMIUKj6;V=P~v(vkF`XzKb5FHc5yLnAP@ zZzrf6n(6v$DBs~SnhTa^?V9)dx}B`9#D3$s>0Kst)sN%y-=Yq&%Jm-XO!OO_PO^CY zjnOG@b4`LNjVllYW!LkaH$vva@uoL^Cum6M_{IUy)hF;~tS?Efa;L(?-{ zf<_)b_A7k2J$9Nwp_z#jxJST>S&*s{cM2uq9^QF#cX|mZx{?cGyrC^joB|G^>!j1lv=EJ3&x}hh1 z;E(gaTus6sj-2=^iT@84r~mV+`2W!-_5c5ueDb+J<)0M=M#RPOGT?`XhJM1s!*j_r zV$I@pO#KsrEDsfmU-@HC_G%mK_G)Yhu2*6dExYZSaBl=XfvxL8mLR`tnB=oixVXN zU-AYyH^*X{oVK$9fL03a-*)`@-|o)t9T$fMb>FbwH>pKgCliHNi{)~Py&%4lt?Q*@ zB8xZAZkDCh8`-QKZA#p0!gn`5-ZrCB5S6K&@KC^Pk!0h%@>LGr`s1B#I|QuRDA#tp zH9{ASZB(6n>X!g@h-G>II%rBsOeAI%Wm=|GR^B8hvmp@4NnjwWK*u`MQvS62l_hO| zENu*`MwU2i{2pwzhqKGu6naM6v_WeHK)1Y1GooQ^**ya~q~27Dl$0WpigI=7pGDex z_oe`8bW?uqa%HFsI{&CO)0Q+P-%j%;T)_Q11JNE6N0yWgsR>?a66Sn_wcUN(arUISH+i&QsGw%4EQ{l|x35zbA$$%?NG@dp zU9k_7?2uvmqb&JxuJLIzk?QBud3xF0j84@}^$hMx999OO>b?Gx1X*e)%=|Anb(?RA z{)EFg(rw9|Lq5Y(mA6LL7@9^PgA=;po1vD(p*ULx)|_Rzd#FRo4!MP1^QfS5IsOM_ zS${MV-1Q6qXp!mALrtYE<=><9$?cg4nTH#!i9A(4)9PR(ePS~+G__`btzc0qVlDAb zd%bNkVR2oOQw%)(eO;c)Dy*qpokkva3~_#wzc^(Kd`qDKH(rCp`D%Ur+b^aMIF1Wr zXTRG)uuAPFYOw#5wzM~T>?!@88cg(e^aSuZMk{3ZNRsjuwwtp|q?Y)+T{frE85HGV zVkA);ksLQ{fNcnLht-FglMiDZ_md28w~4<2rQDrdm4Y)ARP0s&AhX+^jKs>8!oA4s zhd(auN4uY0_RGGG3$%NOaui$nue6zw)SRWs6loagWY<7|vq^jD0igYK?Jr|BMs*2G z$`zZI8}K-bqkYn?@kt)aX}(;|ZQBSgXnu-QAi^S6K)a>@msZhjjt6$0jjQxLJ<-yP z>nyPGHhbH#2BK{{SK!%!OCadkblMogy4Tk1kjJ<+xk8z*N5pl;Tj(QX#&)7@)2&t2;JcLHBAUx>=u zTAtk+zsL%UX33I_NhP5;I4qK*SsOmkVc}+K)E>|zBCWK^ZQwvKuQ6z=m{WwL@H44a z>125bPj0<^u6QRjaD<|RJAUVxE3wA=1h&;S>*0qejl(h-hd#;DJIk^4eOhJgcIXE? z>hl+y#<4rjz4N)%;cb>Xb2F{rgoHE%pyT0V*GS20<}jydH7}+!c$B!kTvF;vJr9U;(@2>P-O1_T6+!BOu+~-3>}3E!`j?En7mm zJEU8>Te?KL5h=+{NvD*07vFc!y?2Z=#u@jF<9{+h+3#NOyVjiZH=ms!nftCL`{w3# zMlJ5pCMRbJt-RWAMN#%cMx|CP`-@+Cl{*W4EBBHv*}OksqnyeOFheH=-|7n(@l1d_ zq&XdqTx+M%o^)qkFKzhma?MnGYt~5VP*2f)bLU5XE^93;{djug`MIE{ zwqIGc`cH>_6CUPdpn&+%cLp7`X`8{HfBi$Pu}|1~IG0#*-u>0nwSm3*2KrCkJD;Rg ztrV+|)h`tB>l7=k4BEIAk+ zSXT>vzl_n6k(Q>{gdH9Izl}HlpKjafEbk$&UafTV9J&bg(+V$LGVii{Rw9>r^CmNf zQgTgl4}96WKLqV{sT%n|qwl!qQ$f7g0v|zU|GLND4}c-umtMkiSmD8&Uws7zIhg_d z!o$NuC;n6LCZJjI)A`6dJTHRCsUXEwxJA>tF(EGfqTkMkE?-3!o>y&NI59b?b|9%_f(1$#LJ!Jyr)XgkoU=tOq#lmS^^w<-AgWvaQ zYv$D1f>db+^E+Oo+lbfBtcZ2wg2Q2CGp>JiwE?ZIM9SuhXBYJ86>w4Bj`;`e1pWa$ zJAI$-5oe3V9{1ZU+t~Gvaf>t*JX{pWLVnvR}y{hl?`$T)tFOhg3)H8^-Iq!ent<-cBg#zjv3QB?Hxes4cJ{ z`co9sTN4<~;GYjszYDPIG4j^<3AFk1zXWamCw=q(_q(;Wf~nR_ z!T%##M+wh-9WCX{{n@f~a<=UfE2$Q&cG~+VK>>B&8xBIcoFMAy1U!+j@X~Cly5zyi zyN@H2BjTC2p8Gyt{(}{=ip_}*J(-{U*L-6 zA=V<0kld^^PWDXxRH0a+?0w}z7S=Z5wg%@v$gfmXm9sUbof!lORm#roz4mBLn)tObc_R3RP{2|mbx`>Xu;Fqs;(akQm|KMfh}<>)rhZn zQ1!Y`J>y=Hn=t_MQl}myue8r*53|G+?F4KblPEtv8sOoz2*Wu%`W$~(&UBE6F_AmI z9~Z=*w@Hq{WZi)f)4}os|4ek!@}Xuj^tNvI@HS`YLCdeP#p?1zg5Y^iQL%WGUq+;% z;rmb9QT3!_-U-@CeVjvd;b9}k^gsG?I&MZ~EgZlj3WtH-f|ixjMj$3_f{MU7{bhU? zWo3ch6do4R2~SOVCsXHSd_f=m!&$jV1x14xW+5a~(5!{y>dKx?Fn}P8G-sS=G@$iX z@z%?*1VN)`E3ZQ2>_p(Z0*+fo5C@}422`s_i?9J*p6f30EyCuqQ%1u=z_=tK6i1+y z&8}!sn^dzos*E5pOV4I4B_#!B$|@qQHe4x!${>mNp1SZSZb+r8wP*k;M*j)6y!@gE zPd5N_o@lC(Idw_$YjiTU#ZvL-MAFy+s{p*96Wci>eY5N^+xpJ54QyD2KhQ!F2;JnnQ*mh(q(fyz4yzhrz$Z?4S`H=ZdCpe1 z52rn2K%&$69My+E?Q@#PF9(`exH2J$=YTW2zdqdQemF@M|GlaeCw`;<#4$lduoyMK zCh|&I`LdQgG(ST@TN*|Phg;amM2G$`uciK~>%%pyFq$KYS*v9DXsK}rAP|YHHD6?& zD61*Sf1OVjz)WSY^iFXGOs^kdS~>0muy|;-wv4U$%;2q2Xyxl63J>WieDk^Ju#vU6 zokl=v?xD*>{@L!CtePc|A;1ww`}#*+JCng$;aSBj6+Z0!Ss#irfB`2EoOQ$YndX39 z9pB{eL#@Se$pS_`hn4@DTMvSIyX;V#ibXDxey|8_ue;!pgRrV^St#x|KFw>^1OpD4|F7L*u?>4a;g$FcZxxwjgra z`38-<9mdY%0T)OjQi0{8#$9p@JC`>B-W`%po9@C5tCwCqH))ny zmUsfmF7RxYBD}m>4Gj(B9;(4Sg&zf$F6&(=R^ee}b}Sl~bK1`s4jatYkEU2zS7IzP zCK$P$#7ZFnu-RYO!`~wk*;O0MR6mqM= z@+djDBg#7}Mpjn9ve|D`#=FI}lvt zo~IyK%R+}@Nf`xydL&2UeCe6UAtaN6ntz-Rx|+yu@?cnA#*p8+IsUF^%KmWDQR@pJ z9fp5kIdYRHUez_mIDPqU_#NGdM2PXjKae@Tb7$NDH)rx%mrvH;@}KY5e+r4jtcyfn z1Xb;8%Tb6q1oR<19L^RiCsw%#eJYBVSay`vx=Xi=V{XpCL(4{pu;60Dq?GRfBo(al za*~(-2XNZh09aY*inyagaWnFF-{okrzR2Tv`8#ohCnRJLgNTFA4|lZ>bd7(iNL-2@ zHzj9$vva`%5TbJEsD`l%2jHfX5wOLkub#P_N{WgaQutkI-T_cBhK&X9ug_8^w9&PH zILOb{Pl)6039gcyv(uwwAwD9Pe?SM*IuSqyLZsLDINElXN4vJuFO@PKFxK9K} zwQ#HY!Rl58k0s6}pVKZ?b)mW#Ij4~vvJ?_|WU`Rz1I??H6oTZpZ;#&<*hpN@Ywd*K zt8poe3cHG4gQuS0-kT-VZ=-VpgNsBx#J8}KWL273_&9$1Svvek9QF<3s_kkPa8+cg zEV>^r#!7P9K?Lo-@(Vl?latjY+WNm?Gm%9NZP#7Fomr7#yA*t8lTAd^iWfZ*YTF3H zfPp(wu$f`($kkP4)tUA+Rc2YaTEK;yVdjgE0F5a57s3EHX$H>CyXR(B#w4^>hCZZ; zndD1UvbpP2Ux)6dXYA6jNqFQqx~^W&g*X6?wwN}d!3B$IREnCLWjR8uHI8Q{j0_;L z&;%s<3MOKfQKjQ}*-dHMLbQ{#lKl@tz+6>dW)t%C6DBQnz}%Xthc!aa$*ZM-nYe3QP2ALy1+7=`13|(8Fw| zAVh-&zu%b?N7ck6Fos-EdWv~)9D#>zm@`2-`2MhovzDfga%E0^KbE!^?aagab8W2C z@8!eZddG+<9?tnUbaAJ~Hm#iR+Vuadyz5E64RM;Hq-tGVbriPS2z>MW{)LKHoB7A= zX!`Wks_X;A;*SC03lTLeg~@>p7L-TpqjMP6n_mc1vj#u?8>{W+9x|64?{I}HB&+1= zR2h`t^)l5VmaJ2+451@6UbJ3=RRfKjs<~Cs`zbU|H72tZuDTB?*p^v;AzvEdquSm1 zXfUD)^aK9gqi*XeScLEza-G6m=U4Z03zC=Pyc0Yr>6r}r6?S`s==(Y{r=2-By9P>z zEnW3ItM7XL#Ek#F%=?$_TXIk-rOReZu}@5wcgiNkq^S9#0EV0XE)7~*iLnPMMD2h5 zb`|U;W8i0OoCjT3nDh$`(i;{GzO;oGAHCfZ$u@}3S+=qOf zneBTs_rT2}8#|4~f!b9F0_N*Ip`gH^!kATy?Y`7xHIb3k8w?fLr6(!He8Ka|m&ZCQ zy#Z+TD^2#6G1>OHwi_J;tN%{dx;mh{fh+GiQR)C2o!KI};o-oFChl`Xc916!wpgNS zXund^m4U3*t(-<4CGvsh89zbTlY3Xi{lX=bS;;p^DzX{a* zqVbyo&Z~>CqTu1k;iw-WcQ#04ZO;7FoU~-qsY~v=8JC4e0~>?*c7q@WQBNF`-Dop(JF_)<=RPMtk=LlV{8K2toRHx+$PAq6)-p2Qh zFF<}e_VVQDo)5Ejq}TIC8j+k%j?`U!oxbYLX?7vADSr>QD6N1@$+SqLNa31pP}(3~ z*Nh7b=>=%Jvi)pR#^=wU@6&ESSv!MbnL*ahv}}0#iucvLNK|mPo4ec2;fy66J^w@} z!FDQsEm^HWqf(s6#aY?yWbX~cN0H6c_dJ!3{zu}KM;@kf2Zlxk0_218-gqv(`|c#Y z5HB=tiwhMYx7DzfVz$MJbUU((Y5)micMRZIzQ18PWXb`U_;_33sM_(eR4pfX)MX@z zo@YDnBV7;G`Un@|ur4kn@*I=i^B+gKW z#l9BLatmC|HgXUMm5KjXM4Dg2;biXY&3Sn`)oS1b&4fK8jG~rZ{#Wzo#S6xPm%S?= z2d(wX)ui&yiIf1N?@`Jyh8xh*ODD*w_leWgo+2Gx+bj?BvRL&{7w_Gglsh^ZD$lqU z31H$owMkmuewRtYOV$oj3+w9@w?EfJE2tB!yVgOz?GdbPQN!Z8tx54)xPz z?T-vbrqCe36$-LU^<2F@ooLd7qB)>oEvlz3hSnAbj!(C`;xlBtWAe6s`9jF-Um;Y{ zj_bC5o8g6@Y*=dhv;8h7C&Crb1G}ZsIGdg??Zt64O!GyH$qphG0^;F6e;dI&*=7JL z)uh)YB)Y;L$F-nUEow6``_an;GtVfP%>|L(sDphDuFUjYU58y@yfSu^TqaH%J4#Q@ zy4a2`sR2D)%0RyHsPjqcjAmkmRv-t?sns*LGnb1Yeemyl+kAn?RNC;GkEJ2zs6!X$NHS-(>sC-uY`LaZC*cR8k(^NRo zj3@nH!yqmw+PUT(<)5fR&Xd;mdbtM947iAJYyM#MFAuQ^*XmieE9+1@X=Kjz` zt2+o{^9$NF1$w&@Tpb*!yhh0U{(R6Am;T{84+hSe%!$NZznkXNcyV88<7t~@zVfFR zgM5qEy!;?aOLB>u_V>@j7-!ETO{49U075wznUE!-7}%W{>Lpg>Nx_v}!pe_QTQi9P zXUKlky!Qu1n$v-Z;wZ^P8SY>wNQN?%fCj~Ey`>^=g{m1%jMG{tGzH7P*bSX#;N^ap zlWq(#cYn-)BoMz)fJer%B@((>vq@zl3Ppk~`lnoJaV({V7Mh;P$^;xv7`t)1HpPd1 zYFaZfPMP?t^NNbcf=%ziSdJv?IzQf<0ow67-DfIH?pGu|@ktjf=(Q}E51;#~$4k-V z*(Kl3GbP7&-qKrGWV-$#Aw2_?B7qNY8pL$et>Z~fZp^RBv~%!q@3*0p-WzcCv!5d~ z;^=&(k}!sAk&4bfc%1rfGz{Ykli1kUWSVBGe5%mZxU5&};jO>eOy`q766;BH7t$$p z_Yl}7dkUQAU`^lN;U^67gke<<|3*0uSMFM&retMh73^3QRhNm|XUB>@xS&{9^ya}F zfRlT!7KU%>y$eK921cLMr}@8$A(mX3C+XalDva2ds2{)~yM%Uvg-v{y%{G^3n#{Z_ zGm2d5`x=szW>o_si}B}lVfT_dGNQ0xl|aiHgGL3L@pN+n|C80WZ^H7EXmZaDIqnsi zPB;33C&YLfd79i1CsVaepl)PguBNTd#+rk{&NBx>wv%Ly|G@i|v7ff>`uHULB7&`9 zn*sZnKzp33YRmZR80nSis_xMVNfZ16LWGx5A->u8IrHKvI5Ing4Lg6YNIf8a0BGz) zsFWs&1ZiLL7mcejUZCpV-hm_igoo+?OP!9=@@+3_tL0D}e^1H^iw+&kKK@l!x`|sh zeS=KB>!&G+hpG%4acA|y#c{pV23=$y4vgn)T=z504tl)m|B+Kq{jnK&nBBAb&b>Zv zu0?Fg$Lam7@3j7HqQNl%GdZT-n@E=Xx{NbAEu}&2zt?{&e2YhujsxzID z+;%f;U&!xLum#1@ks%a)TX{ldSAUTRIO=O&21PqKs4vieZM;Oyu&-p}$EATR*Is2z z>lO<>fcra*Hcm)Jv0=CH3nNe#EZ%Q5jb3?x#M zifC|aTYV!>PNY>F1tQ9(a0c*{KjeZ4J>mJLTs{%=-iHMm{)E2)w~N*tfSAX{4i_cJ z$=GJl-ZSohhJB)&c-~TrKJ>;3E1_^J?ssOBWMrm@)b}s0| z*yQe99sRvod3SMG+mjiWTX9jN(>I#RI&r7z{H?ABOi>w6zqv9gEiMKSi?2nP{vH|Y zHe!%d_>s$JaFaIxe_)bW>2s~Aj`Y$D65jjllg>-EC#5qUY&)Dl@iCiGEwyAKfm(Ll zsV_Mmimh_{ymkp>{OFh8zwIST~L` z?r)z;hTWqlTJCUcWXa1(r5Ma8&BQY(LA$y*PAhi3EYz*4oSkPfbI(hWix%2}>{Crf zFO{l}Imf>ah;1Lm_`ym%{K@s|pl9e@jja$>JTZ5IP@tZGzpM0A|ncAg8L zc3#4s3Q|s|`08Ra*+g-0o%aM-#J9OVC-yZcZoLH_2eZXY==9jOQm}Jyxzb(;*E>Vw zO(`k{;TB(fN+8?JuL_V7>eCp-W9i{r49iUL!k-Iyt!LyKs%eK9Ig96i4BBNjB)Kob zHRcMAm{froI^pL?Fu!0Y;MzUh0%|cOIl``6az#cviACaAf6$Et`?XqHBe!3Rw%E<| zH#v08BzwMiTt0q_o-&w=9Y?th?w^MktPj=^{?pQ+Tqld)K36a#uoGxm5G*tb`etMM z`uS|r!Ze8|KRdFz;T|AliL8E_MkshQ4Zq{mKbO0qm?1qWDbk`&(2@CU+5>*QD2r$K zfx*{ds9l|-7)DYuOv`^)_vq(`#+Gl0u)s+61$y|pOD2T59dR2^^Vm6-3LU&GMjRa3j zW~f!=WO@)EihL7Gl*l3dy}g>~YGF6e;f0?-^jAw?A4zPp&BbWcwt$7f?NkzV<4JGEm04!hj|@Vw`RT! zP)cN=aI^hck^cr@$^G8K1a23w5eBgw0jD>b7P&s>^S9YdmyW?wEWfT@;F-1p;1FUE z%yL6CMr_xOxZWZz+m6%Pi3FzCywcxk#>Hn&*$VR0&2MV4wy%3P3)-ztZ)IxWnkD(~ z)kKf27NkE7V-?v7^Bm6y$+!m!^HItg^&Gou=*1B@I{a-!qAd= zIC)G}gv2y&NgKcF;DFmzPWXmh3pM8_cOx?RhCPwR&We2SMuhHu-Zv^xB&;1Xd>fLs z_LW`qL#-XPoQ5F|I+F4{+bT(2kkn>*Y!^{Up?2|E1qRHb zh;|uvb&sIddy~3oPsZ%z3VWqh!Nb#pZa}&r#>GVQ>B%FTKNHgSz+a-4WmP_@nTC6r zd>w#*#f5DA)2*y#TSplmLf>SLef~{uy>qi5yqCQlBMGsRwu{B5PqN7E zhR_su-7JrZL4SkgO=57liaLR`P&>h+0>I|dsR`z6?<@hQVyBK9n->~o9L8Q;mpbgI z{kkVp?(2NZog9Umjo&Z#IH&89_O}0E5WLNu%n`laV?l1%doi7|MIkW71-S$jm*tBy z>?t^|*mFhNVQ?r5#oHrULPkfwD0VN6TNbOz#(E<>iyMwmoQGyyl$MLt0qn4)PNLpm zv6;7zd=55K8Mc|TDS3DF%Fo9dtd(P&KQLcr1vGtpa%@-#k%tP7twlQuHKDlw!>UzVje?f4(7e2AuWU4W)*l)caNl8zqYlGfcW-C}BTYcdVCldE1 ze-9MlNSfo&?!wWL#kWZ-ikvJKQyAHk{uvofu$At2O)p+UGDFG8;<5g7&(8x(=-cHD zzTy#y8bD<;Y;1(BaBmmuth6L09YNDftkavJ(N)GBN?0Ox0c}!hVf4~JzC2tWFP_hS ze&r5orMJoXOBL~BpV$C4hnnrGOYtX`@9n(yukW?CyZ^Tm|7M>h z`K|^kvCiy_s?8SpDsr~jLGV(*D1WcG6?(oU&+~qgOeoWUwzLgDk!)C#;|m4a&z;d8w2Dq_o0f-|$SG zm*qDGW+~`c+_(jHs=2R4A>Yed&JpIp)cGK_C(Zt7XDeRC#h^U3{LQ5PgZw?A8BZ9V*OYm z_$la9zHKKi`OhS{|H6?BRT2;x^pkgKj7<^ZTXfvqSGV57lMltjiY`YOY<*`V2^~yo z*s_5~-W0v81EW8Y+0OhPx-7%Js5w=}i`+)WCQ^|w($atEAnaI~P9IEn=g^fUYpC9E zx)KyzjOcBfe6g$NzA|ft!@xiO@vdLpiKbbozdbizlS8oK=nq1P zh3Y+r4H$nZq$zre`V3jp zdG&o#rCM@$Ad4?4&bd1^n{K@^OGW@E{5dC%X)dSaVhhI|-Yp%mQP?n1(362-5QA{7 zo~DrT9xl6)9lN4LI#*Nr-OnP{|3`-B@PsLUc}hehq7$Z_i1l){4SVs!w`0eG^%NE^ ze;~K%gjUJmDup!%f)GswMM_f2TDq)Bb~LN-(jtYeQ8*qo2mL|DpgP98BVm%l-^oNf zxGc!zH!7M&{R1|=?1!l$t=}!UH9tQ=i30X&!Z9U=$9-0aH~S@USk~W|f{_Kd9!yo! z(6o%&#wUAN^EyyN55pt2`^?`u zDM7Deq)2Qgti{T@Y82-VYMq{!#|XwS2ezV&VLZs7EMX%AaH({W|H`gsCfQCnhv=6U ziu8!ri|_zV&fal4P%*CeXdHklETd3)2b%li2`UA%wLO2|hGA#%*(V7n+QIV|d<_ki zCJ3ui`jyyKmywaNo4kSfVuZ_qiKCT>1f zn-GI+ssC5U^L)J}xg*Zt&OabB^)~gGqNIWeQw$aP1#qdEB zv5s*TxR7OJ87D1Q8d_P0@nX-@$@S7A8nR`;*zW{^v+mS7JpxewFi45&q z(XmaAj`CcX<;juINs#P0IoD-xwvy~OcMjFOE!$z%D*Me-H8YDFK~czP4V-e4`@uGR z9V*rul(7Wr2l=??SC}O3Lk@QrJMtpmINfCZkHVewdKc zbvY?ITcn8Hcp6UeVc1CDr|KAPNWs+=f|;wtE&ysyMQj4Esr%^Dj4V>lpNatMVXU>h zJNiNjR#8U@JK&h^l#-&hdN5Z?Bs>FVu)Ywc$t%tCUuI&n-b!CJDI(jP&;9-ikZP)T zb`(ehpHgu{GHeKT8>F6lSm6)4b?;NP+9wXSdmh5-hbVY|gg*lFW_^DNTtbzP2tW2O zrz8a%=<<#!p)g#0KQp2$z5G0*_;5=9#bKeO_Aful0>shOo==LNid`DwVhE z2W%p=lDB0^DPq4TMtvwd4~!nTUv=%(-<`^PcR|FaZ$^epP4zqE6{?>P2)Vy_T#$Qj z1YUrn{fNZFk!5bJ8IyxTyS292w|2>=Nb@NQ4Kpwi!kRLr8UmsA2z5A_#fccm_#Mfg zZD?!05pe-9y)z9qLHfh5m@5^=og1&*=MIa*F+7{|0S)!z43pT~mMPXENRdJPaO90@ z)sUOvh6Y}aoj427as)3U6vd1cEE zVTj?%WCrih_%=kSK8gurWy2mVr!4X8LaI8F=1pKhnGx}Z%v?9EX5-8y#v_N(7mcSR zc&=$<66v81y{T)1tXf*D1FyiP8%W)nHV2t-!pY?D01Du?HJZp1BDJ}8A5D$25--^0 zgJBoD3omd4EOF|(c5I~mhqs@~ISO(l>tO0cQTTq4svJ8QS5wE_8f!BeyT(ce1$!)G9LjR`t96FAlYAmxs%n_rQfj7U6LigSYr{{*?RNY=fm&N#%8wyUHO)I zi{Ts|-OzsB=N>yx5*@q5m1F+PRVh#!OX&9@F35br5p|vGKd_M=3TS9AtUk_zxtShZ z$G-R3#BAS2;cX`@Pp%qqoHU^IG21xzMaf6l+k4A1g3Z9rQHp-fu43|;{Fm3vTeZyP z)LhFCmMBu{OSw)2BSaVR;X-j}$e?E6`hZY&-l?EfkLRP2r? zpYOZS@s9IIzO)B1c)JD-E6V+u%5ahdgre*NaQ|4UxP}QW&vSpDbeuYi6xj{oog{1M zcVOY7B1=)!#b=`Kg*v-XfQMR;YsE0Z-V}b|)iX^rD$#p^{?I+W{jR;`4V(yuNTEe+ z5%oNRu(-HqAj>!LJs-3n#JC^kM_ftcfnHeQ6XthZoi3^!y-dsxC3y-xr~earPQHIY z{qn`Q{YZn2t{ij0aLWlQ8K8k1udj(Bm9d|{C66VlUbs51$gZnFHtm>@VhtS6SKP&m z6e0oeTq*bpD(v<7RHh>Df0Z?qE&3x!d!=Mdu1Waar%#$;E-LU}{o2NyR$boP+?Pzm zRwt&Ry-{VP5s|a{dc7S7PYyMrj2mRvfen5*B86TuwR*mgbKxT?W8(G|VN4YKQN-sb zhw>yRCxicR^;nHq7_>M>&Zu&(u-DMTcIj~Zt^2l-`y**R{L2%$ygP+ekvMopkDkT1 z*?HTyY^FK2dmX>|yt;xv*|&gYq(Ul?M2Sg&sZS|Wt@q+6Pcb@?YZ?EPshfBW|12R%4D#M8MLvl22o8#LC}7~$3;i~Y_T%e$ zE^f9OvnLfujd`Y8ZUpFg6m28-Bc8v!!k25e*Ez=OMNi6ARhyMa)FBB)BNW#kgb7sz zC$tgcFv)dbp9*}=gjmbFzMMxK#yX`?0{gL}>@gf+Dtm(rvdNC38Z22T>^;d4bx+|? zr4kc9vMRfZVmZId2HBD4P~^?!CBS@Q0!D4g%?fO2r6%knf5|_RBY5|PMu8=@}@2Viove-6L zbxL#*Mcyz`=1yuM%Ws(Oq6s$G7sYuIC2_6DwXu$Ar~z1XG!PN~eZ=xeYD-lF6e;h~ z?ayM_UlABOg$9#9jDsyVaTg9ho0VK|_1cV-ab?SF`s!Y5tmvZ{pZr7SjS$wS-1j2U zZTKONZ$-_qG5dY##Hb(gWuv`_A4=2O1p@3YF3_!xzM#EOD@liLkYQY4SWV~u6*(TO zWIDoNlp+W%T(-Sz6S$Jna?q@tA)WG!R@hc_{*MpA=;)J`FgH9g@d>1(Wqa!D;UhH! zA&*xLmuKn6yalxBC2+sbi*)=`GD=kBkde)86TKk4{!C;Wi4F)6B^Bh5I!RbKJPLw* z+-_Z-gn3To7H@;>5t$N%)H zjQm)e@o@m)K*dP*F(#wr_yiRTe(#2%2;s7-C2f2n!|kiNtjbVMvbkLXwbR*D53$q9 zTkp*sb_JB(HYnr3wEn=yf5Gv^(!pUi?fn28APF+U0 z`u=P5I9gpoUBze>C*s`wd(oYgLOd9(s!c7iJ(c)M@{tahrh-%9-qMsr<5{eKZcbS} zU%#g1u`+fVAnqBpUcEh^Z807yObcT=3DXFB8w|gXh zVt?}-YL3BU)Z!62o+W9D?)`<%tW8#vuG$$xoGkf0Nu~ zb1s~u(PFJ3wb>fK2O1LHQ8xFENWba>=REuMM6$n^lRamNAPn)2L{E=wbfxePc_@)um5@H&?>P55`u_S$O;OM z2Y)|9P zH^a0R`Xm0;s1o2k>=ByFr$0p7Cy4W>p3*qV$}@4CVPgaQyOT;i&*%?H-0SlL^AIvA zBeG-8bv1J9KopJxHeBP+gF{FR=436^wwHw&W(`{@zV}4-%nLSPt1i)@+n-Q*}G>;y3Bsz6$Ubi~E%Rw|zpv<^y3Q13h3)OQ8s!i+^nUr&HxGh<8ke2%8LeJZsztT3585M zutAQ)Cqs?=Ow3b+QM{vKRlWpb}i@2{)M{peCgJms&K0YMnwPd~b_9IaMem?Rx z0?ujILmV9gA>|J-vWv@$V%Y~Q9k2d_H0FK6y*8_GyOX7O4pn2 zdH{*xuG&eI87I}PJe)A=8|FBk&RqiSZH{@aD8-F{f($nqh%)Po4KI&urKr90=aCpH zr13yybS12jN1>AUSA9lNdOAnR4?F+feEt*NCEp^L^i;ihjCr?r+M}%cQ9aLu=H2~O zkJZdpXcB>R@lx&+W?NEXD<*~NTSXk+i?ii(+??i`4Mv|_aJnLb54>Aj6}|vu$nY3v z7ZYdqS!d_Xa^+j59;FI}IJVy+i_0%#Js{pt3fs=Z$raV($nbB`iC>rm$Y5B<`59Kc8nXJ>P)cs4}XO8Nak_9J6 zUc7y17@5pFC8n$p*Qre5yN?TfjAYbVTjKeZ7(QW`yuj0c`P0420;~JudZ2j|DDsoOiQ~zMBPRu z`S+@b&tX9Yq*7Q1^W}|q^n8CG@_J&oP%gV?F!u)bmR>PoMTO#piKr`}*en46f5O)( zSy3mUp!pA&bY=w{huJc7TH(L9_~TcYPX4oG)rNwq65jvF+s=aA`EwYFOg##~NY*tY zjO>elYyPq|om*~q$F1dVlS{Uv@&lYHhR)qHSK@=^_%C0*;>WtHVC9@ccT6|RKd2To zNo!wOLYrqok?J_y45vu=Ua3d)P*I*ncU|~VHH!fZkLWmW`e7p3@8SE?{}7De{p)Kw zY>Gh*-#g;!A5vUw-lG-lakwCCZDc(S3m54Jh#Cel_ zr^2TiylgaQek&&^1ozs0I$AYEYIsB-?o2v-nl+DMusrvizsfg*%Rd|7-Krox#4Oj7 zH0J0$qXD!_xo?reky8m)&pw|0OkpvmFpSH7siK(8v_&Q9b&}`9xy`zsv1heN+Kt=n zh-|TOhu6gzr=+ry)ReF1>mo8pl;4Esk1Rv|f|Tq`msXRGv5D5T3a4@zC~Onuv*xzK zMV`-TT8V1b_t6*FpHQyjTyrj35h z=yS%E5>_X{d?LWm`liajZErX+DJhc; z1zTd#`*6ABEE{`t4rK2|0bu>Jey`K30rgjYfQ;sCqhhbiN?nPw8#a7}X^a^nOw8b{ z3z^Wqmq5_VKlWMs2E(`R_H5ZSji=)HC&KHv0JIncD>akC6yc=OhdcGLw0| zM)5M&oB+dCn^%oC6W`HR-_YQh3I9Qi7rRJU{csuEKK^5_otam*rt6*sdN?82EWXph zuAfyGHYqDEG$QQ2n|`O^(vk2c0ws(prO3sxNbODLuh;D$`q5`i!@PqfWAhg}viy91 zV(w8Pf4R%!u-k)|mu|Kos}5WzDyKKCiLi#us%5gn`SRpQ8n@=4Uo(xRN1rDmoqu`> zY*Q6(uPEC(q#!`@@E6}^_r?nTbVO8LR7b%;;~W(UF~8NlxJ4v7yp@4<7J72SZ%Y*# z{i}w%48VSxiu{Po65F-I2L$h&)&7s#yo~oD-_}&`VB7IKkwcWJfRxv(X}>@pS1~gH!HAcPKnfx6PSSKr)-z4kp_B)#u;7@XVPv?`(!&BOtF0` z`)Mj;3i9i^&YNGX7kv+>0If4(0ehZFvt-RlG59c`GvPosdk|zANp9J=uXm_sdHrJd zi=0fpIbI=}Xmwgy7*FnDpK8T25#tdE{)F!Fg= z^n{P6WUt$L?77>i-*07LUC@b&4r%Kfw|j7dkCCF`tkn?l+NT2M2ahJH>f8gR_sjdM zB|ZNZFw-G5Hm1NOfjsX(k`aq1gHF z*1Io&ANY`VyYb@L3%-}YQse}5NM$w{kFqPGkc^OD_Wh0n^83v1ey2l7%vuRiiIQN< zi6niueHNxN%>%RloROHQX+?BIEC0J$n!M4o{n-nF6rn$@{(nRo<3^O#1zQ{7d{&y6 zwSKE25w)k z#r|B)G4zzSa7*6r)4EU4Q1|=_QPwfWg2;?8rcWXo{;1hARxsJgrsz|7IW7OVueYADLbp8!8?k{)$rV zV{+>1?d*j{3re~y-Q<50g$xO35WkgiK8>Z6GJmHCjR0E%gEHE;ciB=(Ix@4Jyp{MCLA{iDZXroXsd~row3pp1h z+X0gTn2;4WRIwDH{~e+Ng5&Px!S@gS#nU5- zQ}4+jq6R(YT}N|SiW)x+t&97*et;3wqn%KUiE0tf&Ybs)1t?kJYGlO&vO=bQ*Rk`J zrt5jz!D;z`D`Sd%!O!zvn5?hQ23ohDW?Gtwon_WY_z~yj`%jJhh9&?0lwK{ig?}A- z=c77X|16swd!Ox1lN|6uI9|b-a_yQ|2)o;it@+#}!3aFzClf!(g+^qTsQoeaTC7)| zk!Aa|x+-?*x)?{kLZbLfP9N`=?+IigomI07COH@n{ONCETql)mHvt%Y4$nC7TFSW- zWwzZjt1xYVWe0LLF8nJ4nwzU=yp4X{PtYU4jXfHPumL^OFx}XEPR;}KK@J=}J_GJc z?~ni#CQM8$K^eG%p`jKAS4K$mjXOatD6!x!w`7!nWe@Tw6qu%JfSZ(Tz9dAVn=3`~ zX&3T8=FEsW0y<(saLg!u$7LQXLMe^Spi1?QUc|WbYM_o&eirXIyD_We)8kN!XX;^^Uj ZaQ)t1L&O?X{1EWxmAslVvdbU7uwOo=^BX|}Peua?sJ ztcM3%&hE3)8yJqmMjk~c7BuKd@0lQoL|aFqzL6wJYW$hzyi6v5ry=c!kX&#H3$^)i@GxS+K+>bV@FitvKtoqL!q zLL{-|XMA(#a2v0ts99jT%W-$r#?UP+mz}M#BUhlLr|~sOrS*9JrGUlTW#N8fh9o)K zwr{b4uWT02u(c0;o6w~m?D7^{32e~s-hKSQ-t;gJ9)BmKulI?Vg(l##UuEpXf3roN zGtKf?lp4L@{>3RS>Y3HK@#kB5iM0DUB*dCdg+nPk*LLI}Kz@$D0z!Qw*E2dkPLGZr zUe(Ful+?(;S5V@Uw^0Xs%{31Zu+QB&FL6_zBC2An%epM5EL9b=`SM1K%#}c31m8bD zl*WbJrp(Ht1Z$SezDmq0A6Z%rDmhIv$B+L}#2F_eBN<Zf?~M`YK~{s}_-d)^K!`;2>1WVBfhl&>Gf$2u^mM#s?_o zSYP}*0|WaWlCIXGa@^kQ(V;VRmS-rz!$_2UBO_@M5fT5cQ62w`(f*o%VREc8?A3z9 z6jsB-!{NW2{FRsd&QuZITmdvta@WYa%euA{m-WAjs;V)hjfFvZzkmO(TJ)UnD-XQ4 zOXs&u)S~7f#6&|mM2-!L=B!^q5jv`0w>Vwvmiv67AS)Z*o#THwt6^xEwXq{Qr4-4{ z6&`Swv7GFGwWt$;N5Lw%=$5b#a->_~vNnmEG3+`iZO?-$Zqinq?W zeus9(NhxeP{lu*&=t)BRrPVO?9C7&G&+>0f&&@3P@i8~P=jKWhaT+j}H^V>s9l7Q3 zZQC8UT%}TYExdm?lX$H5&?~3AOX#a9=F_1DGiB3wu%#*}uYdmS8|fVwzijBW$gqqU z_SygiUWXcZ&RX(%9(<&0$0B6xg=}XrjYvE;52o|=H2>wOThLGwJ(UrO;HK$DMt%0R zCo;`@^1XatBmvzQOcxL10E8u?i%Fb@PCl03iMN*a`f!ASrI`psz*1kJO)YikiT}Z;}1TA{;`65=20`GbPdjs#M0~Ol> z?gxJ!EH>4l$NFCES;C&rywK6mFx%bOB(b_$b$z-zIwq(n3f+iETTSfZL&HX*^2XiS zNL>Q6ri=4b<9D!IBuNm>Ak9(rh`8%|j9~x$)w0vZU%$2e@-|LFCN=&lb`Fjdp!+98 zWw&s7;jfX=WCWM-0_^VWkT%fw0&AY zi)#ntWNeS*IAOO2*e!n>ogz0|%FDU;FSOWr;5}O%u-Fy3QZ^;y@@mId7&O$17>TE$ z$AZL=^8LkWTKmk#9@D25iCYeWYTuT)rFN+hu zDfW;h)#zdg1=pX26YR{5jxW%ohs##21Aw%7R;a9b(HuKOBmFL(bcrgOmP9HTO;p@5 zAF;_5X#3Z|@3dPk7AL$9m4Fsw47qkkipa3n+aTVQ8s7#q4E`cO%>L2jZq+0v1btz5 zqKIs}lucMB63LvJoryy*)?7O$?(G^T*#ut^W`k5R=k{$`PuzSG78*)$Et33-ijv8{g!AI6`%NB<>|CJ&;3%!F3)})a~{e4!qB~zuy^bTL8#TqhL zz_5hO^XdDJou|5HksH=qly-Y`#iuJC_>F&>y*I$a$z^~95m*$Ln(wvG@EaE=y%UUs zhLR!p{5jlW7p~W^qpobRTB;+nmv&;f#m48hFV`Q}Ruz|7KN2qk%v>~qzz<~~S&EEr zez4!1yy~+nRUp!W!>4ZZ{=4Jk=*+vE(sT>rq^6D9jHhQH#}6X`zz{109~FRbDSR`a z&j!AwWZ%OnNz?}Y4-Ri`zNZyFeG)n+^E1kw1 zaYTV@xIQ4Z=e=CqIuOF^U-&lCt+N%)P=Zwn4do&Qm;I_U0g%qRG+7FK^dD&QL%50< zRhoqx1Ryq_uyN)zLJ~mo1@{Tntz5{THMRn1^8ltEc!O6C>y}fG z1Fo8$N<`PWsHE`BOu2Czy;bLTuj3^RBcmlwnt)wpxI zrF1gJB_7IOseKoTE6Vm!GV(i>Z8-UZo%B^JXoW;=834yE%az0P-HD!v*~ic>R z@e7Ibi`k4)@BaIlM(({5ELWzbrR55saX%_Zl-j8kQD|S;O*AFs_FhMa2_$h>k;3D9 zX&>G6_;71^FjHAbJeVb-^Kf1y(FYWan4q37q;x<*gojeywMW2kFzh~k8k{&SeVKk$=o)jOgzP zI3ER5u%yLBCdDDTyq5i^&jYVlp`OD7{r!pL!IC4AF_(`b*#_)yQm`4y3kq+EwWyP+ z?sw$ngxy&qSFnw*LlTH&LUbZGieEL1^sRMAt3La4v%w@`OD`vX{{*5N3QXY#)GzEm zHoEVAasm~dfz^PabEQv=OC1T6=lx0s>wJ#C(^eVN_Wnid(e-Iu zVCH)+Y9T#zhVO%|w?`Rcc#b`Dro6z3267@96puI4ZNv6$_m}Ci(L}Q@%F59W9hpLI zynBn5l#mSq5pCLj=8oBb*L%M#Cp8C(1g9@;mNKwUNvi9}^^L`XfC~&_F=d+EN-DDC zTco^St2Ae@O=6;aSNCv#Yn^Ozcs-Hx;4TMUsRbQ19k+h*si+MEhO^%NI?K^&cvOD_qt6o!0 zsJmH`L4*v24@WhWh6QZt7@Vg{u5`p}))lGEm6|88BybvJdbQ+x>;NIfTmLu4Sc8$h z<`j6Ve-?`j-U-DM?%hNG*qbM2J5Y0#83D={%JE)Q%JqCe+J5GH(hj_Y2+`YYrPRR2 zWc>NP758^rg|T9nAB7&S*Eb{SVk=C^lTN5rBOHSB=DLZE?ScD?m}c`5@APJ!Kt(C= zDYDL2LP10qYMUpWpt@Cl7^W?6TqLdoE(WrU^ZA&3w2v(#M!KW{wV~SUnYD`$`tdWz z%pbN$la6PiMoPktRQTLC~rk^Ed8WvSmanV zgQ|;e)+)n+oq{%h{bo)28~JVxd*ljDRq=S8lX1h%-p`~-t#(4w)|dt<3?n*0WihkH~Z!Dw9%mm>E@LvLMA;LYrdn9V-6Uy2idkg=&Jdz`|*EQ}E#TL4l)O2`59JjYE@z~Jqzpuaii2*Z0lbw@#WW&EvlP3@4!qWgE7+*cj zb?sO~fqAb*G4&q@KKklMHr!v%s}iIA`OKB|Fs{t?Ti>q?m?wz9$K%J@9~>q-*r#hT zJmgkm^u#k!P{mf@+aqu!QMHIP?~e--Sf*7r?lY#)zC0-9C$NF2J`p>$(B5O<<5i&c zvyJ3vGROLk=3SsBO=-v1%{z)z=Y-?6)4mK-AZ0%vU8-S=ej8sx2o$rY}_RdSR`@(XO4?bLaTrOT7)s(+JleJq9D&2b8@yqoZgKLCMtSR&`u^B&TSWUwaQ!={RbQmG!Z-xquKfm|EX|wNy=>6fdq(Q2gX9nrI}&hNZG~~$kWIb0p02^^!;CR9D~}ADP?M*GzX4j`}9n9YZx|2!u38e#A$6cT;y+H7|(&#W&^!xYj;EEwN9Qj!QTsts&9dg0lcIy z+(rT=%D!?eU+tm6$1J6IC2V%n^=iUmtW<}-yz=|)F?a#rgkaQA zrkxQCEc>8l?yU`<@#;qQ+!NmCTUP#@o~l2agC$qiXV{^GLE(gL1PyF`_|9(b>a^hY zKhLrGCeyZmhvJ|HU-VdkpJ;GJ>;I4x|BsmTeOU!&VHSs=(JeLeQ}{MgkwI{n`9?M)MTy zx5pfEXu9d_ZEX{_wzlXQfrn|taK_F1N$_(pSkfd374M^$$^iP4I8c32s^$JB1YeM^ z%S@ZP;%EktH~pipbPQ9;sn$oI{R26@fV09(XftKsS)a zl?J5>m?3Hqjt1(EI^fCR+1>J|a_BQY0*-@uoiISp*#wwrrlzKp%8gn!ej4BZ@VlK~ zP6evn(3*cpa%?7JyS`J47Nze&2zD#3TJph9nYFZJOIp%N3?estC zz^DSayRxZi9=h-XU7RTGM3H)$juAxGDDd86HsJQ~P|is-lR-IE0dN-%jOcn@_9jbs z&Hv(%iu=_A+Cl!P_0|z`HY8{{RjOOHnX0d(s2G*<1`q`U5?)6J5CF7G^Apve^bZZ& z*?juU*eLD!W-NjI$t-dP-ZC>6WAapeUwO=7#l^k-^#EezF(;5L^kCeb{`D{eONk+(V;q3%i$bczc z5P}-)f$X1b=RIxc^@hpLup{o0LX%k8V-uy%u4J)-l9mFhh8{J>LoK$}+?fT`u`MA{ zK*U;(tQb{H|KsZQ#W75IRtI;@@7>%kZizbz#=0p=6)=H@051~pEkGw=jyVpj_j zn9#SF-T-Y&e1g^~l7)9_={qcJY)SdC!b+4rJ2Z64MvZiOCxkpOd{N_pa57H>)8 z%TOsMqobApS!L+C1hH-aZZuf^jn6tZfmuM>22YJu{YsK|$A2}P_{p2RTn}l%Aa@Q* zPEDQT_P)D5bp<%XYnpWzserrdcSM%WKt+`+zN>iGQ|lPp!xqMVN{gV$RYew@bmJmE z1eJiTGSk|C@}vQntl6TlFT|J?32uKuWEZQ@=eKVKXa0h)9MoT59#(YX$%X9P)&<@Q z3IQTq)rop^qCyHQ0q;4)rAUY(L`@!}Ykk)DxMj%g8(^gpVDjR>T%yS$(D=jGuo^-3 zh5K}C$In{`n1WD<+3xmh8mvgdk;LIRPGR0`2AT67iHEUssl*xCyRIn0814$w42N2t zCb>9D2e4>lg7bEkmtIfAU}Z-zlX4MMrV{+TAZ_5ZaLqXy; z8&Nt?=q4QS1#76#MLGAR$u}kK@kzS6hf3lJ!&L8We_o2Z2XNc0XE-+YHOtta{qJrQ)311^kCPnrkE9!+(4Jns^Rx0CzGek7BH+VHLw_sTrc}6>v`SYBU01-~!(x zn1$4Q`+_CaJDxGfD17RTr*R!uWJ*tyg~ElHuB=Y%{e&nW7`sp96T-8Q70`iB{1HQS z02YiF0eEi=+%lcjVPPi*&UG|eT!f_OQd4SWtqiyt!hkb8WZrna7Cm&ULYEe4z;qgR ze)l@pzV`|kdvAQd>THtyQBK2-szR?py_6cnU!AqiaR^gvuA?~-E*T|JESAa?^AfkmNl z*i18al%NC})%olSKV98y7<(klKN7{v*(`q@F^VH?evNs8cKTxXV^58$zDMm6m%g zl}ou}M%mT!#y8IQop36B^4gzS5#wt0B_#>{HPF);7$|vnfKacB3W#tIYCgg$>^O<%mn7Y> zh*l$_b!^xqqQi)A?czi80D%&ned9YEg?Zepri}wzhIT81R_M`3U8Z!cNeP}}g*O@L zXPwcq#KLYJ&Xnq(8+x9UzML?UZp2VKv_Y*9N4C-pki*r8p8uR?QG61#7`1U4R!mmh zLI&z8V?Z#=WwP@IKj|m;`y;QmYEKh!d{c7>j6*?S*C%t3Squ}KYcTYufm0~g^=0)4k&sfYlJfRqyB^tMwAg$5S zwqAEj&<9;kT>i2XLk-3akCA?&N~44XPoAQHA~*WPza3X;i;ph>hj9_B(5x}kuJJBr z*7yOQHZ*!OYm-+wl zGyezFZHGwOpw>Pe@Z1E2_Kf)7ywTNV(++AT#@oLvD?;Q!g`#95m3gD{^MIyxQ1$x|5YH0oaawK&k?Ks>;VWr z>M|i)=~Xskv~-o_0T(~vF;0G9AhogK^^>v#!X7vvS8D?PBs-OB>*x&JA$1RG<&3>Twucx4g-KhC(6oIY1ea%QwE5N~i?&6`LJbq&)Y1%(c zE3-LbgQ`+8%*P#N$&`ycsXG={)%Tp2 zbD~OLa_OPi1Wc#|AhR%{^j<;M1+3Zwpwj%8-8nYyGM@3bU9}vO3IYENhF{J*&10M% z1N@Ipd|dtQD%!vqU<6LN-vcZ)<@4v~vw-tABy!&Y3NTrYdAMDEdB82XPvjNj`{NX4Qq)kHU71Zq=Un+1s;#e4?3Lj&8d0>;^4;n*(<9fAJH3Zh4Ani9z7~_A1I0S& zq&#Laa?t5?pnQw*`CU6tc+6U+S>9aiTQ??K@HHLQ>dWgMt=1G19`Zo4@!Zq?h|`vZVu2pkTgCh7e$J^X`>cCG!up0?iZ5r?j*J*ju3pKIYxN ziK49R)(Ljbpo;Ltbb6NhwNarmbdam%JaI5vO#k`w=N5g53|lNqp7Rc=Q*D8P0Q=w@ zu^-Kq+G4>Y;cky;!f`o;KLwqLhpRRxxKgqJ?EWcKQ-ZmUN@1k4e|cDiQuQOYbGU$J zXJrCTQ!T?GP$C4ll2@<2+HMV>tY?n;l|1pglg|IDU(8N7U042x@mCCB!1t<2A;Uy_ z@BoYw?|)i4q_Y)TMRh!kX_B_2-WT*qXI`v}!VY2qXv>KA}=R~vsiV;+~DCJ2OuPsU6P zdEMM6HabaB!QMDT>ytAKuWP$kJ!;sdqyulgm<_qP@nJ(<3mtSXW`6?kO`W!zlpz9b zEv-I)xjD%A0vScd5ujnlMBi`m>4yImr^p@v>JF>dqDPv6OZThqV0%))oSX&l?&0^C zWi)FkIarC<*sl_YlvhScNy$DTt`Cidzg-to{Ju)4SQ|OR`++iXtK*%7?lFmc1Y_>517uVa2#{lH5`Z}HY@=pE&FCJ(fk-Y`Lck28J)(x0~~BMiIlf z)nPR<7ADJ5yguitu4|;$eJ(}WocVRLjD530PZ2yE(7e)1{#S;xt^*vKfFW9ST;R?y zI>dx|T{eJ>K~4?eRA6G&b0Fr(^yf{fi#XGE6ff)E23_Y)t#pJQ;E7mOu7nx`o=B7b-#7S}774c@GmdmJ zMu;|x2Nm7(ONoL!s|NnbXqAl9*1LoL49oXgE$6IUgtnhj_g=BVWbP*e7z%iOe*W6% z(J|uib+4L$XIYDb+nKPhNyMqLxAjM!LK%1a)mwJI5TuY(4w$q;pnAAE;W@yNT7RP; z3-O#f5Vh|9ftJK?^I@3x#J*YVy%o$-e7rvnbfTJB<9qH$i=2i3Lijoi*`m)Hw70kS zWrbR)SxmgV9pf62jBI&&%HAJxeQibq8B=bUiD@2?Y)wWV4L?k7a9)+Z{fjG%h{d(Q zkut}IAo*0HuN8;`3q1-a96WEab{OL^MpHLXyXXdpboWMhHsAFC1kE%Q-%Pgq1>&Bo zJRY>{3&vY;OZ-CFkixFptO7tk5yW;5sf>f^Gy~^P%Ncx_{K|yKuvBA}n zP0EKnEEEHC_k_n^JQ3X`VOm6}2Z%^)QzU?@Ge{&})DMNzaP~(;W=h7RcY*oiM~U?9 zO_xJy`~mypl7`d0dgRKc0!#ON)ezqBK~ys``W%?VW9KpCLgOfwQV}x>vv(hxPydox z30}gbIL;;ey}#`g{krZYhTl1#ph{*)R^XG?N`2b6YK(_A*DzcPk!r|amW2BD+|{3G zbpvlDZ(f4tX;F^X;<*UqbhmAQ{P5%S@+kt4Y8 zfNYMCLF-vV(&j=EC;=JuR^buuS2BU;_ivgrxunjzZF_-0Qo)aT4=9zj{_~{cxnS^1 z_m8#sC=^SfR7po2n^@Tq9UsAoYb@WT6-EX{F#>kh4CI43XHd=YysDjh)dSae)@_- zwO|bY%&TGajf|2q!+#Y_*Q!i)5Rn|%f9xcyx5UNbsj=4#`%0BufQG<(nQ=renVpIdAE z?JIennrfLtgZ?U-s5eH(h!dh@FDpA|3Nr#nCvWV((|m0ynX|-evBJ$VxlYh2-$#^R zo4V9;qwEq;Ihc)TW&ikrW>bT`<#+Wzc3svXwx1T|6T=EMWN9Ei}}{#rXxtiA-&jrxu6$8JJf_*_~{v__`BF# z%_bHRUy`^s{@{;e;r$8DrN-T&U6~E$vkmi^Y@Cks|Q4;gulRiiFk4f4+_L* z{&2ru^!xitKdWX`s$m8vou}@t|Bd@Z$F@m2TliNRfqq&l@FHMB3`b1Cs*7bra#8iK z6FMmOdc?sFd$HnsvZA*$!D4{&K$V!<9f|iWfxf+16@k?jYV`Z2D5t+LgH+<>_3Odv za}{5|)`zuLDuVMTe`3tce3_msr6`g8@rle*$}+mqM|je%Pa(>)%!mO2hZ`R!#tA#? z4=*&hZ9dtKqVQfiUd#TM8CM}Msp*+Gg_)2;{&dpdg@h_#9??{)H~P9F>7L`OQ%-|L zU0^~pS5=t3bo<%lH?vnkc>SkU3s!I`cl-ojeY7Rb@T2E))iJx5%?Rn_cGKpAd!1ZVq{B@kJ~a_WDuoy0qhJ`T{{3gidhR3hbBOed!u zF5v!)(fHjgdvm$VMHk_~;_>_6mIn@%fIOM$~mN@Xsu$KHptkk<18u5{?%LqYeC)lwpFD3Z(-P`Jsv=wN(B zeZlU{913GP>55<`BYJppsCAUl7W=(t>XR}Ur4Yh^t-$flk(s!f1u!GKamPO2hLnCJZN^Q>nW$IUc>cgs#T(9%@b!_w}#5#DgbcxGQx$hT({ z0%^8Pr1W%kBy>Y_v)Z4a2CdT2U#zze^4J@BEF%h)K53!fCi4fm5~PQw>#O8EC5~(m zTVhwrM$*)FC|O@)50|DQ!hB`axXH-yDQhJQZFvuHsKUmUlL$ikfoIPL_5uE&>u{jK-ac zLVTZFvnBeA=S*`m%B5c_#cF#axj40J)iJ%nLP-tQuy-n;ILa-DIpm5k*;sFmC%h8?&*;>|Fc01?K>&h9>@BY$ForQsP04#ev8jo#x$tp z6c({l)`#!w=Nw6^|7OESTJ$vc%xMi}&@|vw)~@ZnQ%dmK{@3p|K|Dan)yy^UvwpQw zwnd8K@9sO+iOd$_vWnbyK3AMcdKa|BA9hCh%4PN79=)lyWAR)bdxy9SpV(M5)C>7` z6fg{y)xKrqtb6>Mo%M6*E4Q0njLH6_1FY9<90VKGx>p*Uq^S32l&ep#y0n&lG@|=` z0U7_0%thx*+|LAB(q}ww%|E9S{Yb?Ak=bd)Tj!IG0JH8?FUD~oJ>Qa_encvr@nT4wZ_%%>6!j}d9LH>OasL(B8sMMt?)ZGuHHq^ zonf}mt|6(gcf8+GsV3}4l@iggKCNW|x{r$`OpOcX#)*iv=LwjHC0};n_C0z0&3Ett z&n8^ryrfvdF!d9+_dcQ&#JZPa*Wp8{{3yf%*cb~ogQ@121f;^^*et!3_#L=|3n72Z zaBg-ilGTN?Vw=@8@TqSqpy)4%*zW>l?agzVlRJqZ?p4PE72VI^@mqDzD+^Q{x!`cI zci9;5_#BQNfHoy7lEd4h63q`JBm75{PrS3?rcx1&zPXM&7Bq~8Ag)diSX@GpO1Xq( zLYjHqqQk`{Y*943F<#Eu-@e7qf_&lYaP`iNqP_;D;P?D#r_W3h+hH7#DD!A>dpb~$ zTI3`uq&6Gsi6ebLx{~QJA2Yk1eFo{{I$+?qS=TqvDDKjx5BC|1Arq5kR9Vm?jktaM zY_Xu$)ZcbLzr7J3dX=EucK@c~eB5bZ{6-JrHO$V!%(=qww#opPLc;d@fzJv}p|5I? z-%;CRfNyX+kn`Aetr2HEzOH7FjL7~gyT7};Qq^!uxiIh6;I2^A6cDElttkpJ&?_47 zHmaMAo49ck!%Oqhole2aPMu0pQyze=PxMf3*A^UJc`q}?4+~_atstgfj(ZILQ#Ozv zA3xn)LCiE7=*9IEtX5@j(PVMeweCvl`Stj2u9&GG}a(frjq!WVUtb5fwBVF6e z^Tic3cBVnOgmvj%B#B3QOx}xpIX1-ga;adxGZnB5+6So1kCP-0-z3VVZ_q97f5{4R zx0ied0WC42jT>Otwofo)=$7aA_=;4j`x{DZR(H#-HB%x%>`j^XHVF&_g~hyevm+?% z4Rd-592B>=Nkj}lE&&HF3?fr?mvVXRIUVT_(7ta{vV*ZTH8 z5VcU+l^VJ&Ef`|N*t4_pb$C<#&xytJ^3CsOys%5t-`lbhOWfrmU6K3Dfo z0WTM<4)RsX>3V8Fuua>UQ1(kRXitG6?qY9lT2&=9kGou(E~Y3BC=pJVqnG%|r#s)( zc1-p+6LWm(W6+$a)`FbIdg3UqL|^nwq91+U@d)5o4=u5+c ziA1@oc@t&$;rxU=%k(_28kIuqFb$6o946Ne?W-)wQ~7^*%4(Y;P{=@w4>#owwWLhT zO$YN;iG()gq@n<+P$`aI<4uQsK7hyp$0Nq?r<}9QAhB zQ(?ecau}6&w@Nh2zZ~1e5kPBfdwXSxj`^2alnZhwyt_UP6t?~iKKCTE3+L{y0TrM2 z_|{wh1=6M&6+#qri?&umhMcv;ICFSGo6TGAmE|h*ogv5ri1<*R*u(etw_MnUJ6#o3s@o-LUdKdb0>v zlnI_%O-ss%1T0L8GsK}8<1`uir4BpT zeWL|8k}k_%n4i8^+~fSN_pM9(a>CR;ay>Z0;*8m*ah-sRL`@O%f_J% z^L>YoNlr5fVrTAs?Y+;oesv!-FERdg?70E`RvPF zRKlJ^aB^oRb-O?>g~n=vm_=m1IhcH7{Xu#zQdl~>Mr1RO49-Ns3pQSiUx#Sl$6Clx@n3|FIztd)#dv;q9?Ae7kj1J!^$j(%s3#mdS12u%rY(}#l z2246kGnJIa<>C5g{xg1awnYp)W)hM+)RM1v(BogRmDCV;jutkfd~rji#-E!DtjXja3+CuGr#f{c zhEFDV2QVw-8^ltu*Ni^w$WnO}aj<~CpI!b@?va}#*T@%@oWFt4a@{P1VjK{T{FWjE zN7M*esFHi+-AAF$?87i-zi05Wv5|XPkTRNn#tFyZ}GRM;}QqjYM_~okIp6Ahow)ZdU|MiAg6BQ2l1>{ zo?C8)E=!L5%_QpsX2QQ`Dt4On(LfMbjeefm$4o;+tT^T_hWc)ZWh(4)c zq0Ancw!iy-J5S^-^z@SPqf_v8dJVm}5*ezE`J@dTQql!SPHSVIu9azOU>&F4jx*6c$rk>CBu$mc2)Kj)XquFhHrMzFr1?{x)gVmr}?AW=W&on6~&itUi*Dba9LLw7cD&yf<-vPuNgg zBIo$##w&!yc;b20GM-V+4X`2SNFE4-v#4G$bAI?U5vZliwsCJ;K2T$wlblv4%3Lmn zC~iLc!^eBo;#H7W_&2gtAqt0f7sth-PqA)jHZEy;`h&8ER!Zr|+7EjCcyj&xKkICS zPbaS_%PIHUQVXqYOUozV*E`;qWbKTylqq%QDYj+hT84gJg7>EIu6?jJ>M{k-qAKqA z%)4?Q{_?+X>iCu1z@hw;mJ-;X8VMenm%@)hNwgTS>^b+)2&1T&Z~fZK>E*cf{49mpMJ< zih`O;>?Vl)>wU1_$=1L)46Vj&_Jz=GTOhM6Ljh)AP#ztuzJ~l;;w$Ae1x^3ZMCafS zTAbZB41axQt+p43nov`Ei(B*vQ_3supD{E#c+E~wB7!GhC#xV^4L_O`PL`Ewlxv=W zy%B!YtqQ3e+2!5V$;CSTWf)X+2tCH#NeBNqAz+24h;!pk&jpZcU&2277q=SS3|t>R z>kE1aSCX3@ZsZKYajAU%`T3yc?aHs|jYXYo%{Ye!h%-d#1io>RBFMfz1WI7Rfj#-?;|iLb z(}eX0Wz|jTgspF77x<=&W*5EGP+P7$P1dd9_i@a|&riNheJ4cC`1ZQsUCR$1kt23< z&zadsRHuZ7`dUc{gWgieELHy*XxZFosp}qZD$gqlZqdqqvje7pTPgm~X?sXC{$MY> zJ($V)n~l|BM#OoC*@1*&@~6s_ei$4MBX!cgKrN`VuL;TH#`vvN*hKZ6GDm>5XNXn# zRmv7jGOkb8z<{-S*;m=YCPDB1{o4b=Z9CtW-$WZjfsI@-p_igvoEhM*2{z^p58)K} zjix5BYwYUqLfAXx-RC}Lf=NMsB~^!(NfyW(0RdgnAo9=26<Dn>+Z_BLg;l{0@(7x~dVS4)6Bd*6J2^`5e*iRx}( z9{qa(+FzZm`t4T+eY>Y9T9uq|Ka`X?Z0LFW4&LP)j+@=I#aAngCB)N!S;rnZb9B zc}wRF)2XHevg@aMq|fuo#9BO%rb*ZH|h0rB%m?e7L#VG5`@GIy9Hb#bD|_UvNVGiYQP6q=VEyp}X? za7h{Op?Es!uXOK~B1_}JTOZ7he4PgV#EFl>iDu27H?sXcpturxD`FuqA+kISV3D2V zqn#aIrLw5ZjYr;#Kk~<|1sfXW79W#g%r#-c9PT4g^L-`IW2QPWeysqnedEn(!DS9U ztC56}EY~kM6f^33ZV@93w{Y;=rU=%%Jb3SXH_ zm`7S28non4PjQAC3jWqA<|dq2h%H(Wip~BzEi5f{)TK9L$PB02=#3_~tcL%>nDvX| zY(noPkRic5R{%C#N@EV@{3`yDxQR_X@2AgeX#-d_o5i7?%d(UKd+6!#KWrM>2CNqz z7q0h-oV9KVC`w14?t zQNg;5&6cPokQh>ptOV1Ei3p6%+~NybZj>O)0Y8#>J$~km1W9RQMZf9}^HarsOzN<9oSN_c5usUw(dRYlo41O^` z6d0)T?0nz+6weV#%5DGkz;l#`+rra+DZ*g}Deo0q!W*7JSv4W3EUvkA)z|G}uvu>; zI^I1Cw~-R&=kT;2o39v^&i~9(&FpuRwmP+}504i;N@gh6Af(UPs<2sf`7?BiMSips zc^w4E+*iH};kWTqwMeVa8HkHi=ugbE* zITTBu6hxRw{>w#pe@7EI#teVwnd)4xn}P8x z>8(BO@I;cgy`AcIUt+U#lXYT|s`rnAWYcP&tc9XpX)ir-!JV7~?cehf93!H=^hElgL;_1q8>eUB>(xYi^YWC4 zO5)+=jCyTOb6oc(Q|F$xYrcw@Bd(&~RD?ZZ;S955uH|#>9-gTNA#P0))YER;Hp<|q z-*bw{E6Bh?ZlHF!K@IUTXZ+z8Kk8A`c(=YXL7MSy-Ih(Pl<#YQrVwv1u8uEQxl%^5 z{c3OymgOIuZ(CeD#Xtl9>Xw-VCEm)$&RK(mwt~bQ0yqWBJ@r`*{|z(?3v*lk#`<5Z zop(6f;s5T=m(~5#y*7oo{qlVq5P#w*NGIbvdKRZ8iMeqo-09?IAanA%ej7qCv&pPKz$bt6v>@-FDcEi3WI1)( zKHZ;Pd%;;y@OA0$XsO9(!IgRXN*)-km)6bsJy!3+rf(Dlw3sP%*>h(pt#@zY2`}qF zA7?NmI_62>mTXgJNK2)}>~2_BDm@&t^P+a#*>G)YJ^V%7RzYEn%?^9o&R=bl&xI+% z=8IGB_KzCIiuLk*e|#s}ml^He{ZuCxwD*h~_Oix@co1o~9rgDvv0zuhc>5mx?Xh(( z((Vhs?AtFg`Y7?oR9 zsCrPcG?rUiydN-2}3#Qsc?D-spN^ zpsD_BWO&uy|Izn+ueIh|k{6$qh7dl<*7P`?e7?g+55KnjLHiKxnEGh6u6%mainYqc)a{F?X3YC81TY3}-`Au%jW9Q&rTUbpGX*qzQucQ*CF&_4(z zu8#I~BMC+C8z`lK6dKT&V6$$s2}~7p3*r@-!h9cNY8u&-UgjaTS_-%*LMkM(S!W>r z+{sk*k#eu?6lvm$o**aMH*^r@590QV1z%Z9XF7b$fNc;pT*U@m?>WXkUDbH8Ui19R zUk$@2js;4#xQnj~ShB#71KkeA!yx8WOSv`oj9@{nq>e%5vkNPgX5|}+dD&)e-e#8H zIB`QPqo9~+PMQ8<){3y&(cnc3g@Zh0ukwZF6W1mBQS4(jYQq6}xK9QwJvw;svK8BIWPsB# zV-n3bliD0m!0rz?F7`y7SL?;K`+-tPs?Gt@BVVYjlwYS6*rlRM(f+|dFLJ0xRvm>= zPBAig%wO{SEqEXW-~827j_l($yR9}KrxA3qUpM({dQt1&HXE+vQ)Zs$r=(IVtLJs{ z#=wzgqnD`Jzze3-u8Y zN(!RgqF4`=4maYITNme}xpmFXLLr*PeS65BNRmmpzFR^BJ6Fyg?(IJS5xA z;%TqL62_UeT=)lW{`Jj|XP~czEsZ&1@)=S88t?jiab%(ifK>%oGTLO_`}S>_&7%$d zylS#tyXWSO+Q=Vfy9QU;C(r`{MZWxNx#N$Wp6EW%n(pR1m@@R8SP~GyKbK@=-}L#$ z3eER6gZtn@58F)(2lzt z@EOUX9N#u&(Bm5K>hK!4f~8eJy8^26s<4oU4`#SiN;>Wfb{~Jf<4e7)Fi1&0k(| zcOTr2Kj`@fEMmW&+hldWh;n{)A(rlT%F}KP>+i~~l9A&4ZR<-sdd8pTz%Vbf3z zP>Y$9(5DSY4a7AIYKg*JhaIDMP5u@$UH`512fHshWb^r{%rQ2#ARBOMf?A&uwHv@BNVB%?CZ?x*`#o%E(1+KVbAhdvGM`%2gz z1UZ+AAu;1gK2;uTh6zb_Gj|3tI6_{MMpjV9w6=;5ks$~9=OZl@&ozqyd3n(mgPfL^ z#zj2z9#@umnKHIH{ewqmA-*Rp8~=*OJNc!y~D# ze=ILE@wB1T=%%)PSYEW%mZ$X+Av?aM@v83W0D8=K$JP|40xf6Oi>=w5h~ar@%I5s! zJIE>E7yGZSK}kjZuHCs*Yp%$QW7?owxoxZ19{Cz7-G`Upxqsle)o0&w;-Z4`o(kUh z)%%^@>PjuAMo(jr$W5*+3>&pc_2ZxvNRx$xNjX;kKW*_P4kq7&ZYnfuLDgFh3?wU;}c(2)@ zY2n8@vW;H%-@+TPnet4e?{^>CLfQE)$8}xqce9Tzn|Qrz5M%!yv(*>}dwfWgNS<8!Sn`E9C-a{v<@auir9T|cG-R9QOP8G( z*elESyW&KLuQETSw6Xr@l~3Q9rk&ch?&qm%FDha05O~prj*ccmeIn(vi8Xz1)CMj? zF5SNW$?#wM`OBSY*REUiBe!k7tqVzaf4io$EAkF7bW%E&mV$QyXY=Np1iBe8NqdPD zQNc#L8(n%g&+nnc??r(x+6>r}`eXP;&x<_g%gJxzpH;Q~z?3@cl-SG6*p4Qm;v%1< z`I7A!?#RsuRX5pu!+fd{ayxK;Z1LsZmww)01*bYtSeuqs;M>%C-VAZf9k1V(4J_t? z`x}ls2uR=a53XV0mjM|ZRbI)ao_8g2qP8U9JZX}z{yf~j8=AyO-sct-v?Oj z>?{a>4ZV4^X7WUUZP}loPhYu4|1x+N(8C{aWiX%TZQ4$*|4&v>jasyn1>gzKP?@l8 z9G!GUDm$BVS3j;C8M{jh0Ur1h1aoS0k@Ndq{Vch7OT%JD+N@vRj&9u7B4%W?w2@o> zJo5Z>`~G*p6}>P}*Ehg!Tfk17yC2PXO{@E`r9LVX^Uvs0*@FMLkoI}tr+D`CLG111 zo~75)8k|1^G|AU)SG|?53rYO5t;a^({$F4uQS%o4e$1cJC+cv^N2aHxxO2JQKdjEM z=u+MEd6MYAg&X}Bi@QxYM}BKi5?7;k5wBkNYn6>156~fp?jNIUN zcXM*8KoAL0s^_4#hQB9kMQ*=aq+j%1HEr-L>Mqe}4yJ3+R6bc2O!x=9(t`nj8Du{E z<;xeBUMXib9$7U3w9NBZv06!mp3Prh#$M8N^E3hYDC&muI9Q3w*{91_u5<(GBG+2+ zXBDd1=eAfmw`?H6WC3_TWCdGFYbWjl+n!QbPsr-0lCPPTzT;gzkeLk+#qkqmN}j=g zQ(gn6%{pttC8&{+k(wS8KYUrk;_HQX zjpu293ODNaEda4t=+@c}=uHBzbI66~G`p&<)KZ6DW5L4T6+>0-&?>c+p63ZU4{4butsKPw_1<7B_D#|pvQgtXGxIUGOk zXUND$;sH`L@ozaG<}jRk%bJDBb$|$%e(r@mPeYkc0b$uveR^sl1>4);^hdp!fH~Oz zvCUMyhn6Qn>soDP7a&XmAfZdaTQkiLN858%lder^X8gyK~& z0n%b(Dk{PwU27cld-i}SbFG)}e+Eg!0~$K=S#uKV{+>J*`RIbqOX&YFkzeWgOAOWh zd-JvGlSh5Y->a@4ZyJ^-GX6XBlHTZ|b2zbkjXu$=E-F*D{(Nhx*Y`B*I$iK;l*y># zDQz=y_B@_paD3SM&oYFZkds=HdeA69Pt_SVHh+(nKn$MqpoHE9@!G!`qs^m;rZi;d z(@PP*>vmB!7tKpv_94=usZP;CaRXAFl<}A7VjiT+bVo9a*TMCo`*W$%nV2Kv(Ahy<9`#zZ(84)?=}CE4ESGsO z_+F173pc!&g;%3*Brd=e;0$UN1D0s5h=X}U3#rom1s2OqaGAwP9xQnHwaz?-%l?RB z!=`t!TM(rpvGuw_rEp)=a&K?% z&kHaa%zd4UAHd8RIO;hg6?%r?(36KCS(`7Dv|+^k_{gPYlD4w<_3-9$Kq&1V1QEiS z*;-jUcC_NvI0yUzNQ5x8LVgOl+0r>yE&Kv^9w5|lH-KzY49S?kgRBb$tT|jF;z|B@ z&+J1Ur}_5(t(s(+>@DM{O>Ch)>CJ|I75n@tu`#_1Z($-(zuLCRNeuH6H|8AXBSjoz!iKw!77xh>S)SB)zDP= z0|ffEp=wE>vsE%(4;YPfq3PKVT8?-xplQGT49r81+YnIM2iLRUhZ4lGYDzmq`ek25 zhLP@YY&=)i2;*tDMq`3to)WjAcCsh1hiA5g+LwJfGTJ;DwW|6U5|7KJl(wC{Cn9k( z8FedC$Hy{nPedeHlSLSN+y2 z9)}VQgQT)mw%4n$!4!7=yHnx~V~EgD=%yF2^*9lBo#nw0CF9mvv}^(v=mo3WUmBz&F{J zyK#Kdej?zRzqv`CLJnuA^x{i9yTc)x7+vgsj05V zQRqrPP$I9@IJq>7eJbYy&tmNj^56U}Y44q8>Bi#+&Z~+B*T|>$sk3ek zU+=xWw!q=Id9$cX)1(MQ3@iE9L`peGV4^X4dPD4fW;yJvqA%!-o7>1jgz>lk6D`#A zV}qj~VrJ^tV#O8ARCshsWYmI(x7A@LFT&c}hT^#Z-4u_f1cQkUzyFvTh7P7pPdEg_ z4uA#rdp#OO$(0eg0^A2+HHd!C+f;&I6ECl#LglTW$|_fZQBc%B(% zCoN!~<5-91!Pz6S%aU=1N1vkN-9XU+Fn{i(UrNl!5yu};T!sHG3iLOc?F;kR&!Q`( zeJ6vxWh}+LmN0pnldG|OmJG1$DYVw6hhJV(&vTvG4$H`iEH!i4Z@;tv@5vhg|FZ#M zN_njkSfxK@TlVM?=DOQYYw+Xy@A7A?y%-I3M_##oP6@byIk_;sTJgEER_mI8nv(0s z;pZtV-RbG%qN*0n)pvn<#{cF_WNi`yP~*>C{Mr-|P)Qm4<@+|veNyIB9crj8CR~Cr zgvu+Ksep2!mJW{zstZGdJnQHdjT^c%XX^xgE+>mtmIf7z`B{BqBGp`zTkQ%j64;2cl;VXyk}WjeZ44ifAP+t?u#Kh zX#o|%vw$JfjKWW81{Q)3;%*le#iW29_4cGERaGT(@yv?69ArsJc`DlbqWKo}s!HOU zBL4e1Et)3EK^2Lp8MUb4adXQ?>K6BSmKLW_zpi{*57A@+y>y9u?+YQl2Ck|qs(yh2 zrKN+WJWxh>0W++ymxV@F+j}KATFz?U%ip)>m&q79K5aL-JC{r;ogeg8M&}!e%b~Eg zK{Jxc;%32x{SQ6w-s?{s28par8@{`!_lxm!^7wE`^dkrRBix*{?;nK!(s3QBLLx-( z1jU_`Sm8T6zEjU@KX<#Ng?Mqhb{ik$aK$akB_JYYE-%paE4|kM-^>TrBCrl}`eD8( zJvDmsP>h|mvT93CwwiTn*!FR9;MH-zNpw3)ZKs_gX~iGyl@UyM&s3ADcc6 z{4C=dNRWwIyZ2+a;zobi`$@yb-Wo2P-suOFDzEt=6(!c$QaqN)Ur9w)utT==cU`Af z8UEk`AX{1ft<5kt-@3W0oGN~|S0!;GVBgG4+T@AJt^HMICXl>NE$`j?PaetXn*Po+ znK6ut4Gz$It`^^y`AzlK7tQ3y{qcX5iyP%V{3I2exgFEK<7U)ZGp?FTwC8hC#6(~_>m~n@DCYdUX zIn08!vX`N<=BtJ8%&E=($)e7D&#jf=Ce+BU?H}A5BX@i4*IckTOjj={JR)`^ye}c$ z;W3%OI7~`HAx7)&zhg}91$a?j$2}4MlAJ6Quj0utF#r|0X|6-fo>zcRTOoP-5;KD` z~V>zL{>iECb(VK|XSXJpp2r-CMzm zj*tvu6tU$H>Z8yeP{L?D;}{x5?o~kx8k}Hi zM&xjzE%!mxJ%w9sGf+(M!!x`sckVq?3rh*jG*0ePD?8_6-IGsK|1ABQ0NMqYa60q? z6udQ4P~8fUk4BHP;CLEscdF~?$jm@d@eV0IP7{jF?uva?E8Ls@2TOKADh@1DNtaasaKxB^n>?I@Kr04}q7>sFb|A9MmQDLpLLtQ`?btT|6hd}q~M9l`Y zY(O_1zBbI;vUy$A#x76qX_^Z1J?8IJf%I-%38{HSqI*h#UsqSzie-S|@Wb=w(;ni) z3)2Y`;ih$;TwcV{Too{L3HvM3;kJ>Ao03~wYu5i7n{i3tt9(p`5n#~U4)YWWS|v{<(KfGH@7RcR|glq z^x-7`2#GWI+>=ewuNZLgW52-0cJD0=%H3a(fPlEEhL9UU#4Mb=?;C1@f$9Y%Hqp~g zV@HT~Pthi#s)k23rw-yP(A&Zx8SwG&oU>ByI={;t))uK+S0??M*IybQTUj+NPKT?{ zIzYE;X!j=D)g{ao)Fuvb2zNhG+z?UZ_x_q0vf0{gj0L^wDDt5NsPf=)vg6g2LUqT2 z;i0hjxzsuCmA+E7Xyto?Gu>~wG>*`$gLzq^gB@%20@U<$<1V%1KkTo9s!a5)yit6L zqdk!pS7kr2QiX{M6zt4n&7qXn)gZpl?*JZZ9<*j_0;7bX0FqTXk5PgCsu908n|7AK zHF~7HJx*Hz4t}vW3^G8FupxkLY(uS~CN2R|Ya+e_xUSx6hj{OFXjpa|o(e>T^w_Cb zYQxna?Ic%twilD3nfkr8Y{SdX#f~?Bt7es4?c@XD$i|0H1RI}7=Slm zg}%)%_|XdR{~OW~lxw*o8_!i!G*$^-yGs9+`J8%`{T}JthU}RWnHwK!P^8A~0>HT> zL8QDo@-a&OL8OfayJlcv63=h$3|y12G>uwhSoZtZ4C?DIC57G&UTr)VHtE!&*C;T& zi!J9a;fVhZmi}M##Q%4~`v2ug=cG2&?VZQamPc5}yT{VzfH=B$8ICUB+%Yv!*6ltF zJLAX-u2(-%A@9aHDMwu-+8F{;_R;D&{Z8!g_v_aGNL>H`w-l)8YXRyvX^Q7ktD}Rm8hztYvQhhUvFVHbB@5 z9t5ef^MOGm0jLg}VG1khH-P)_1QG5_S((3-H-{=;>H#)pH919sLk=UGr~j4gh%TxE)Ffx_=2m zCh{S1Ur90(up>K|E9$V+w)w(Bg6#CoA>= zluNZ?PW}=Ap}9M74Q+5-bA|s+i7Rg_V8yScbrpOY_-6-O*YlON`vO%4qo-2mo6088 z>y>wlEuI9Dan;%KObp>93>k-wa=aG>M=^zA1vN^t&ItpR+DP8<=O#kGfx-=vqsnR8 zLYUFje02df4y)@L&N`6_eLzph#9x3NwQ-fZ$Bt2L&KPW{Dp%DP_(98R&kf+}Kj9>i z0n%*Es0$!R3P&;dw1?a0_-`ToNH}2dfhkR0gxHCa5ldL` z`ZjExqavmXhEQSsXv`l1J-#F$?tQ{G!f;i6 z=lNaI965W8fpIePURYq1t4d?A@`#ek8*Fu#aL-P|10uub751Ch<_G-OG=NCLBN$0@V#g1ox+6oFf ziYYJ6rp>wdUN*SEMvg@ZIx1g}oGJH;u$Ngyzy{mga4>$A4G zdx#?WvF1_eFhniEmT{75qTPpmDPWr=MzFlxmSf9YwXwrz)?r?xv2-K?F)(kwXe`1Q z{D)qxjO2jJIdG*8d+kFillJ2Vd$vxWGc2>v{Y%?O|2`>fswBHs7MR2VKk=_qIL$ya@`kT zF|89E1C=+?A(h1V@U@FS5(ZrM5fXI4g$+t&IbOq{c3>eC1&TDlREPTbP=Ou&`nU_M z+W__*ou?5saevoXo6q5Jweo7m>PzwEHW2h8Ox*g@#=B7QH-X=jEgraWH+t$Z-EQoZ z`nM8$-PO>HwZnbl4XpqP_S3B$T;rhUsVycpVluTFIp@$%Io5$G+6(5_a1d+`JO`J^4J-?7>IL$g}B@PhF@aNR)rkTi{9Y zeV?Z^tXFXUAQ#2cM7e^9Xkm4(F0z`syy2f(M_og?Z_jwNgZma&x|N`1)#Kd^SJ09( zPZ7)(+kc_Qy-Y{4n|miu+P-S3Jguy6dL*?^@vo0%nUxVTL zL;oZint}$CSU_}ho{UW9PhYx*5pW*tUPcW%{S3yD}wn%ABYZ8ek*d6RW5 zTMPM&)17%arF1DfK#CJ^C%I`Oz4l8M7|_MPkK#%}7%SYVGB`_)55_lM)12KeWljVf zBhli5_ar@t_jV=gm-*OkWM2_#M?<;L0xN9MfkrcV&k&}Q1%WtxS~u(Vn~L_OL3)Hf zT7pvjfHr2&f(P63pw}*^H(nwuMdr;KMP~_hCyL1&Y02t9imdrNRhrT+wZ97uNdJd3 zikxKf^jW+>oHnQh$@^ApIS6h!T#`4SOUYAqb!!lcOHj?wndk^=oohV}w4 zYDr5`UHhsgp>_~%^7dO+b1G6NXFbeaA`TW(Ag>xJv)VSSSvYK^FM(+CXu513odSs= zP!TB_ojArA2v`G*aR>=G$V?dxprPVnoc{ZU0Njx$VVXJA1%ed|#6y;Z3p?T((BtLA zK1JWROq5$x_M0E(Zt}μd+8j7EhbJ}ARAkx0Yb0*)k%&^|yUCO9XHJhpxKF?J4(?7FO%dVW?!Qh=YG|~bM?pQ#+ z!499JgJY!;ZZq-I4|l<@T-_CVmQqW%PCWvCFAN_87c_r~nxg#2lBInY^V1bHPpfcR zE!9Djh3j;*UdP7nEOcVR5PQ6nKJiX$>5X)~`1$*}`m2c+c2Y5FC|P+$$f?rl__55s zjai~blpW#(Q8Lo^$_iBZK^NUV9&DioS8j4mBc#e$C%22IZhH@06wni3;q$hF@$RwJ zA5Scu;O2K${O=sHi|~8e#EP$KK|K>=`4Hbh(IqhZ$}49rIc1DkP%7tk&}PvkwBK2x zrXt7S(&_SHu(!>tlc)}dPpH5mlA2tH7aslmZ;Ct~(?W<8FXyUd!$pB=v-~OD1qLlc zc^da=D_O*SXIinZ*8HcHN%TX5;Go9|{TEXo60JHp4CLFPJ&hFX4z9@O+zXPwvC3H- zsyBH#Se*ycL~<^)bHeizhVvNEtmM9|cmoRW0D82v1*g0z8rvOOnm`GDAWsAT&O#ho z!V;pC;oIQ5jk+2vO$x=X@Jb%jHYxwCkCZFQZ;Q`{9oP-6h`3l+vaO0w-h*IVZ?ZI4 zrY^yIkHb)a)#Y6Xve{rHg{*^BCIhJ&=4m3hxZRejZbVXTAlQY;#eZ65HzbJG72xpI zfMq=p9BUWJEkMS4)U?4bUV7yZrkTg^-J!%LK#Dzh%Or$7dxNV;RfiS+v}NnWv1KA= zrs+Qouk0YkwOLU-_&on>U6@|E<}HGvgz*+l}kYrwS!C0JN(} z6gGPf{v{9pn3C>tWE6NvA0Kgfm1gI9xMf(|k9z?do=x3n$hfEVVC zg1(8LCuFD^&+ZgbP>}@5LEI?ACu9aAW%KT+ydw)pA#O?G_;Oq151>bgv{I5&YZyr0 zAR$BDxKsf6=mGZwmFdreaU}~anAx?!TO6@`F;qn9`^#i7FW_X;IcRe3{>k|L z=ZARagG)gvCn~^`&T;*^`iJ4K(!A!zus|n*-S29ay&&(5sH4B9TfG3`l=Uq_NH> z!ylyr@WA_6l)oc4f>c2mz^o%Xg7vLMLp9C-czLHXJt_)ExAsX;8of~0vM+Ypc6uYl z!j}KllHmCa{?R{ndC~588O&$gjRdz&?SXOcZ*Z16JC)U+IR!%H>Zhy?$jh`Gf z1=d>MK>a0wSJ?VFO z%mF|XW33VYo@eQE$CD{zLwroZ^y|F>{&DQT@}^B_Q+CU4)>i7wxw=&wqFn!ENIOL9 zen_y1VVU8oR#tSuOpTZU%|TxHt2bT-&BTXwYZv;>>t27%X8aoi$*%bB850*98k;0$ z^SfR1d$&U>eHcLJ1eEYQWz7d>=QUoAt+?g+RHVT;;mr(CPttwv?n&_2Q3Bd`e4l%@ z8>ULC0UXy-IP8hI8Ib`;E_Jl8NQ?cznA)#_EgT;F#Qj-4$O4m1rz(r{)L;6+SX`a^ z3TS$Jfl9b6L}@zwsUk{dRaKd^QcsWvTGmdFl>C=v5DnfzJ#$`P;m2yZ593kfk17F! zG1KdU+K?itke(mP z{dYZZ=MBS8xbOmc#D-D8Y-65K)M8Ob&@q?#rLHhCKAEr^PQ4AFgv}-;uW_q{V8$;m z%X_Lk`n>?U4%ywo^4D2Qh?mLCc}RH;c^P}CQ9wWT4m#6YEL*&_`|-YV{##gVd@KUs z>-xrfgw=Dk({8o)SisrB5-79Mkl(v>cx%-R2tPHWEWO$5!n}!}1i55YIr++>pq^pF zQXd6(I{ky2hrt?(^#-*y+*LE6PA`3)$}RgvbF!cw-;mz1x4^3EX}lI+JYn(TmQ&@4umf=1N##BT`bJh&w+7#_S^?8)2kW(iONKnh z{@*!~XBLPMqR7~Q)cy^d+fV_m5cEenmp+C3G8+1c*Uxmc=}s7y?}5--=AQ3G$F6M9 z#H#>{iQAmfaoX}uQC9L_u|n&{a{50 zO+pg$P3eHpAuin$0FXXP6O4pgH#>(v)#EB+`;n!D z0jbu$T^cWMHd~|3?m;8ny!kixQ{jTVh8+8yy59ZN{^E{TKNR0it{6lz^LB6;Q?rey8v<|RE zo0wcSUG6Ip@GqE7bxYvHvmhza5|?Og$e7>>cf3&@&_=8M9|m`yqq3a?4HOBSAn9>E zPF>3@2&D5-g<8C4N&pH86?X;X$NSB9JW7of&l%O^4GSpV_b6i+8DEQgFe97k z$I4r>VZRmt>@~^7E@}{=#8E@#y7q;jj7cldm{sH2HhQ#6Rt)8`Vpo3qbVim2@^W^C zq_^hFM}t%nw=^6>^?Uzg_^Q}AqG7L@*1#GmnCaaXLloKq8uMgDpJ$^u?l%rxsiOK> z7&!6eZIJxj*HJ0aXFNy09F!xi&7Z{WnAICSo9+PVBwGjUov<+sGNcg}pMuP%8E3gB z-2CTkNhw!tOVFp*B>hHd%JZt-}3g%en#)^ z5BKF^0s6f3mI!NaKtu{GVts^Ruy|AIn8@iMRYifDE5dUU+UeiaQiT}YglvQb@Wnfd zr+V859}P6TXu)qRO${n1F3iaIPh}Lt;lBRAO}I!?FLJ0C2re{Vc(cvvU%5Ch_IAN)GHyr`5}yBbl(}` zu0N_DOdX~qbZQRJ>N>u7)~U=T+1eR0ciPn>weJwS!BjMarPa5jJRV~GWJAq&)gSuC zdbuGN4u=3Pv;cgSGtY7j??XeKILt`Sb7`M9>*tzS!Xe8A1;q4VY%ocUf5Gm~3a)_e z%&KMb!(Yl=K3E*Tz*z4fGI)<27yuwn#GA36(NWJTnWveOVh+i?nTmB$jq$A9DGqBJ zks+<17{@UBGa7P0aDyza_gnjR4h-j>LU9sv$ghdVzoieeWjqGoA}MgOiAk?ua7LUv zIH~-6@sSi~`nq;5odo?=6pPY-+DJLc?oFaT-?Sq+?ztN$CZM? zeJv@|*}Rk9xiFOBBxAIfB}o22MmyklFN8GO6`#E075Oz~%RkzSFI%N_cn<5*&9+ok zhC)a7+QqI>WV5QCpf^QIGTH43nt-3>En)jI9>RLmjSaV9Pvv+oN{XiYAt7m>9ymu$ zME7pwI_KtCzgiR?>Jk%alYoVs9q;={0K_oP9U7t%QmkqP5emXjUM!;{7we1L6OZ?Q zP|v;5gisDJ9BF2Ki46tSx^iHhPdyKtk*?KaJls9IjT~Em+PQ5{V2=W3=kdl6`}p0` zwYgMSiw`%|3aFyn#c)lxPC}LgCgHrInz?pBR;qWcEo|toVQOqv#?|v~*Un>(6}$xI zkLg`mXRiigrZEH6JpqU64^Y&qj z+R}>RKQy6PZ1oB9JEVES0!&G+J}3|@*DMx@m(IO&qR39sNZ9(?kF0qOC9PVSpO%YF zhxhtC3bCXPwRP{#wW-TGJ+4Ed*jnBK(f9PEi=^R6tlxj@|KLfZuH84} z9L%cBny_rUM(Ms&eX;wcjGTnVGOmE*bO?J(+@<}UaI8A6(xEJ|vHow36|o{*?AUbY z#w>XF1+L)?XG7YPXx1QqhzKP2YO*FEjHrxo4|9j35zo#B;-=S(&E^p+nXC8{36%*E=3BR zI30R^Myu87Y)FZ?Q;a{UjIe_;uHa71pN9TJ2+TWFqqJ9K6UOG7HQd)dmiGh4>8IQc zjtjxm1c>~UI665GR!fMYTi^Lg+@;op`fQV9fN#K~gAHufi4wwKYM5Om1f~z;0sP+Z zM=x=7m#YNh2ldh3-QY4~IF(h34E|&s`=Tx!L6p}*b!@o^#l2!vly?iU1|Opx`4Q&E zwRN|*y@?_nE`nKhwTLy>s3k^V8?f;MPKTP@5u${=kL@&s2SU)^cszt(eZdxbK(KRR z@o<@SV26RdfHX(C@=lk(xa={M`Sab?lthCHjc5uVlAzt$S&A}8M7VB8f)lHvW zSyealgTQHmCsKr3VC_Vw#A@A+ZVa--p6AwuY7QZMya(4K;Rl}YhG4fMF04l)sj!rzN7BrA7zrKS`-fgR-gK9yu?cfe; z$3gtTEjb2yB_+f700vyqJl?-Dt6wc0+te}@TuU>i;Ybbzlw{Qwi>9;GStwz#=aRP0 zn*Nd>cWsD1aN1+X>U^rR8w5&09?k~9>VMK4C_DvOD9af_3th0FiK+Ra_T)dVjP7JI zhUQ@M;!2f*!Q>iLNxXT0(?%mVa8OJldg196X_ChcdSt@HjIKU*w-<{Jw^n=2QX|;b z)UHRgRi~qDwkSk!ti)c+zp&1MnG);6H>+chZ}$jNp(S54gUw(@;aTpV0dT=INz4YKqogLiR%ze+o3$g;)zvDx43 zknklZAbI()Yl~St`LmA=RvsH3IMZ#mlGKau*fH)4vqCG=?A%yM=n|%$s69Y{x4Llu z^urIHf_TU_I}KF)AdfY$5=9=0RU#cCJA3bcy5o;9rnp^5(1R>t8B8Z)?4lzYtdK(} z7O0YglxylQ3w^dI&YQ2R&bCu)YQmjsI>Kr-baH7Zr> zf*R9K)O4qSGq92?>uYEAmW!&@0P9CaKP7iDTMh~6fe6EE4d@uVON7$;Lu(`wn*!sz?mQ^}EHjin?Vibf%c8afzYA(v= z(SjYEhDdkAb~~=noyQ!J>X9?0B#GLRs0ze7@I#edrfvma55_)4c0(J*(W<_N(*#6e#h3ytbP7>xJKK;l(IrlKIWb8`|P7|5(wY|JkB= z_N`wB0g6lIegJ%vF&EqmGs85Q4Mnrcjyqz1f zN5V-xlkkSNuVO3iS=b>@>T85HBjNCTw$vU7e`+N$ zrdKL2W)C15T`>`y9QgMH9}PDCc+Igj(D-w~-9Intbc3;ts1G5J^=L%{oi}9EuDYds z<<>267;qoe%!(0Fh*oxE z`wBpQ{xaxwBrO|D`j?KiTxSxIRIdT2JKNx&e3p%UMV+Uo+3 zAW!17YriV>(!W+mAg?2M7ygwZo&-R&Pr z^SLw8#>q{D>JsscEu)wDvcZ|yLZ+SI`>0LU#lWWVbrdg%+C3>!UD?iVjMc;?kN8@s z3Z;V1V&CeDqhOA&%g;$_`;&~b1#YPqo3AS9uB4`sQe9wWR_QWUhY2d>Wnxla2e7LL zqAKqCccZm}17KfthW)`RQC-+S)Ci>}IN3j}jN`vpv_6txGmyWKdI^&3pj2Y-Kj|mI zh${*zh}4pbUo;lLQNF0z4omQKaw_pCUb%q=bH$vi)Y0owzjA{)R{t#H3icDW81ej_ z)=Tzj*v{dN_%EOs(0Gx&_Nh%5nBIYIBQ(Olv4{C>R^Idt=Fc0aOAwtGcYbMqGCzYL z*(bW+vW!=~#ex93?HFhHNaCTS9@YnwRY3Mt9{5uj(Bqr%|IhBr|IY)18*F1P%UZvU z-`e0;VJ4u7QttNRUj{?@)Lt&;iy^_>RX-rXgY5UlT%-u*TCTDi_yxpQ%Ks=_@$>cu z>|YvIO>`4$U0~N*J=o!FuUOD9_K^8Tv!9k%9NOT%n6Ob-n!i3w{aRab8ejk6)uPvQ zx{Ewse<|MuIs5Cwbba~lS-SI~{Tr42^?v%GqJ@XjZ##`I$)E$m3la$qk^=+D-1XHD zo>;Qn?N!7$j5}pHOxtt`c|hg#l^bVsq%g{^x}U&Ol;W^R2@I7 zMn^XlfwR8KI{Tnfk1_kLt{jj^-tO_M^DvjCmS3Q(QhJXiDOz6rxoY<8nT-mefxf&0 z2ng)na>KG6bmSAvLlhX}sIZCj?!l5Tass(Rnexg(Da^B;c}r5v>=VgkpI&0tc!h3CoP)I%qF!}R#*hs zyEL`BU)^~90LZ5C4Z7B*o7uZoSJ$p9Q`6UTMhplgZ!dsoi`4SQzoe0?kHBC!vf-j;sB;xfZ2UR7|swtk{Xf&+{#m`$wx(q`$Q&+%D;4#yMrY6 zMHkw8cl}m_I$o&T;kjX{7Lia14Z;dis=<1~F^DEINU@U2J+CG)+<$CF*>vJI7%D#2 zt1VR&&uZ8j&~qm*?h=ZLJ>E|d?dxXgJF0_Z^LMPRs%ADi|7rqIILKZ-I6^}`)-S1Z zYL~djQl_oHaB*b$QudXO>@Px3^p||vywqAnizhc8u5A2atS*Ll6_OK6YH$Pab3b1W z@3#zRwuLig1K#yOAp5-JyC;_!zD*8cmlclakm0`SsOe<4%Hk*x2Wr95a$o1yo5rL`nZ~=8 zjBb4*WI&73& zX;$Q{o9RcHL7^!XRljc}?6RS9t0PUJkdmi}Gbhs|c z9_c<-POR#O@t?Eg%!X_Ct6Q> z+@KM=JDHdeNkl~i4noHD5Av@19#)7}+x(4IC6JclxIH@R_G`am^j)*HOjUgBATYLb z*A>SS;}v*F1@~jSgx64VvoyERS^AZD**%K7AR&j2`1QI*f5JXhqCdZyK!8K)L^0)h zX59-=KTo9#>8-5gvHrstN`*He$1SPLX2(+4|7w&Opeymzn|uz6l%CwutY_<^Rn6_y zYyd7_X%G{A56urKR^%j)k*OMv|-c!3+I3M&+ z;iChLrF$7Ti?LA*Zdko;8g71D)+1LPkt?k)UkB81JOuu6;~zq09q;>GtYMwRET}xW zWVe3)`k5z8H}>lV^hS1F!%F?n)z{*O?lQei1FS2_G>|93tQawBJ_l4Ii>#~ft3P@C z=(Ds%y83n-JhN0MvZ6-Zp0@;dzj2bsE)a1uzR}P8Ut`kf876Wx5I=U&!%%WkS_>>ifd1%?3Xx zCQ`sZC7nw<$L~<{=yIQ9Q;|FwU3b3%YiWJ?SFBYidc&)cC;ge@Suo_0>`={+bU#Tg zyM_J6@PTsOEwhoIb&4IH@-DD^Ov$o%BC9J2gY-jp)ccRYiS({1fyABqS(coKx->mU zFNENay7{=N7uwk%?N9L(?)L)38QC;b}2jsFJ)Y3Y?#bHp#uUs0W zWI;37%_+Ndz{hI0jq>CpW+vDJ1s8a%1rK#Iv9`(FVUDEiPUK_egtbQ9*^Kr?Q7su{ z&)^EHPhz*P2$5VM^$lmeINBsyf?r5ED)%1Hh`KD){J~)n8ZIc)td~blwb@QtFZK!Z zY5T#eoi+EYDVV&nDGRep?lghniTDquCJLm-yqIy^d~DYI&RWx=3;R3}q$$)Ur4|gn zx^vLi(0V|0aHpXgR3t}0%n`{I?5(Np5f@ZHx&shrA}8kBt}aorjQCy^Vf>ehzv(0` zsRK*nQzfUD;r!Wi&VF9h#o4w?QcX{x%;Vj;g53$2MCkH-5 zRJIe?2+6KDI_x7XU793 zsD|SubMf<L;}aubz22&0VdkYjZB$48o@)GWI{=qr!L$IsnMI)o`(2@w{RFAuF$(9LBtqxFSiv4 zvs`(iXI~x?zq= zL&m<730dFW3_?-mP-T{35@qmE%`duk3E(NLiCnTBtzByMAU5XkQp1~h1c< zhNJ|g2s>!c20aU>TDk7-I=SU4gMa0c>D%gnO)*n<{eH7R&6d)#iI^jeJ%l+9m)Qvw zyYoGSC#*u_jSUa_uDx!5hb}*!LPdH$4SP*)*LW`iD%dWwH$u(~)tBbaPBcbb=qE@X zo(q8zO4_T1REWb!c*2*3+(DEd3b9~mXn-fM%Y@sKq0vx$*Vgs!p!uk@4VABnygy7{ z!4Yk7c)OVC?FxKYMIzbBkI&YdtE8*}I@q6Zy|CjOPW5S#{{@!b!(-=(de|^|{X2z? z+pbK*jNm`Sp{GieV5t&+$&%kmnv3s<*A5@J9(ut4WEoQ0K-8HX*ndM51<_^n8|kl= zDb08=TBczcN1C9PyNu=FLv&q!I9mHBntp0WYC7x=mSyyh*4U}^&(I>6TR=i+6U36nu~a?B;lnLhSoqTv+fy&{HPqBCrBu6eooTP zLNak=Eod_mn*_UJQsg z;e88{1bl7)4dTs{;?lNoKU@IPIsw{B@NNFvllCJr5ukC9PTW@+Avv@%bUC00c+=ld zAWwm&cS3w-)&Bzz{~Puoks^Wc)XdZ>XiQTV21ZV+tqGiC511P#f|xaa~=HtmwT@ z%&TVEy2bGS4qr-93!6vboS0uh4as?_jCz=A|D3Nnc((xgyh;fCo{r-RnJ9`No#cI4 z^Yo-F*7O8&@Zf-nr}VbFXIz!{!nmKirEJ^`_bEVuj-iu{&u9f-hW3}7hkFZ z3(QOVVtsCwI{U|1__|6Jm~LyT+3 z@pIAvEkmtSos^txvM^ck2%2G#)CtER7;&CaQEOF{BwUTTj^3H!wY2d>Ihn;;nm>MI z$bqGjdr)yTgU6%n31VNHTVMmKK=4gq3+u%RFONR5|98o41^OYYV47WYnl$)U#nWN$ zNg3vTdTG57S1$|KvhXtyiR+||vLF37KrjA|z@!3aR1y0E6DCbD`;)x;Jz2%rA-86= zD%EA0wP=9#xel5)m$~Vo(tM%->I1gG=dJ84K9v1S?0-v3swctlb;E!@!=4Z+g|v#T zJT-nh<_SUqxD=5MS)3JgCjv1fVzr|7WuKCxX^geaV-QzT;vxAK7Y?Y*nl6df$Iv zr<)XzRXc=DfeO$Wv)9?3w*T@kTTAeyjh;M7^eS)dx?{VAtfM6Kqyr({%pYHGzsqw1fkZ}^LX zBhK-6@6u_j)f?*bT`*R>IrbTG>Wv4mD@3tAIJi2y*Z7UlbFl^j$_BvlN&u3JN^& z@0|5>Qu-af1uQu^d;lVnB=OyET;Lqi8AE`2?9he#cwJ)3WB-Dub26$}zy9{)hhmf> zPYwIExXc!C=cx<0ZSvozm7Z&qIntQ<9k~=WYBm|KyUc*ww6%QFO3!G7rzK9{HJUo zvPYR)#fou9ncJMh>%_@?P%|=6iBCLZZpA!)vgJIZ=vV%sGKsh5CN!bn4GGm}JLa9f zZA}tP26{)OX57=LV^#-Q<#pc@iLQ)SetY-el#jb=l?$r5lLLu z5$XNh0$xDG*(|##GBEVSY7kQLz^t*-9eF(eMV{PDnu7yTFbNsTa)&pRudL#J_u7N z`=Tp-T7o=zFeu|xdG9BAj^&dn@G5DFU-F=_RsVGKV2NIDxHa>st?PslLvpU0Hhsz_5--so&X3_%oinZV;4_n3MA8EE`THxY2mQ;L8EsnHzi;G$oU`eN8=t$yX zvTIgh?=l*C%CNY>0>ddEeioh9QWAMOWKHtn;*nYs-=yfnQpW(BEPQ^AY(tr${RUQ; zbuvsnXYHBD>QYBZ(?_{YTasLxCpFX2Vv1cpA1`9aV?bj1boqH6cj-g!ZwmiVw&Sjq zYLj+#oPVP9!S0XzVn%o|VP_Rhu3^cXE6+OQka)$ut%jY>gj0W==~1M5xO$n4k9;!u z0pT-4;<*&tKCGry%{FHergU@7?j%2Ta$6P$<7~N(<4*vJ6i|_<&n=v~iPE#b0ri{( zGZ;z^RajrUJpRQF3nPyQs?anY92^qn+=}Kgf0mkkwb5ua&G=+sQf*M#{ zS;iCjzj*cNXmm(pfCp)uvff$I6rr^IX=-vZ1B3kW2n^`WyH+X39clrl_*kGr(Zt7P z->(tx7^u`bzDGyb2dGh8!@xxE?%m1`tn-K1kh`0P7SL9&KC|S- zq^D5*X%chQKU>rm6`2T()df01M}8_2FHPY8Xf*5jP*9*O(6q^hKJ4Wh{E(^erbQ=P z`k7RTiI$euKtDT6MLZ64_bLS5>@!Pu81l5D<&$f;dV)(va`^ zhNTG-*P45Gk0o3raXE~2QJ=2pv3^AbCsfm7Eh9sPUd6telvE^@1d4B0kDQ{+x7aD~ ze%VyeSivNYPC_a)dD8%$?9W9-MSE5{qdu|Av>~+uC-xU0EE*rn%XJ05Ub{JuzL+g;DXI_7TeW?k_R$=Enlh-8G$WdA{8G9vgBC^P&W z2kE=~Ok9_h6JFD^a@EDJew?O8NMwGgezRi^VwuQ!aeaHLLBBVVUj3MLvTEW%VPJ2 zLkxeVi z;f=k24d`@DVtzf-CJS2uDwNpu<$ZE}e@k8bz)t#K9G*Y<>N3ww!S^mhG|b%{vY+GnA! zZ?@>3)LAnSRh%SFnmB}nXBUXZt2q|!0io}@P7GKanHFzvV^d7wz+g%X5exG|rGoAi zsRx9$VTh^3(Kx+h#k3^SQEKi)Yn*Ohm>&@HrGyWuw@&bK@DxeNB2*qAp>GiC>k3F2UFU)j$2x|h!!_R_U29Z=~}$c z7sf{?uMWEGXssHqI1!iv$t3z)!ItG%blaETP5n5r9tuON{7}@{YMLG*HZGt47l<{e z_Cd~!enQ|ayrUp&CfY?ypa_bQb<;)a7J<0k$n!PBi-2$z-%Z`>>YP(WG9WZ7)-CyL zPhCSyj0_I-$AVT5Cu=?vAEk|R!v8fyxGY28WC<2RWju$5{wcqBkYv;Q?8>?AXT0_n zGOO&Lsi=U0AX^X;BT8)e;Cu7eOtWig;A;^a2-tXwUSau{AG zdUINn+Y8LYeJ>^}0yy>LPLi^K(N5jU^`E^r-|1f5Z^{AMebwAiDBag63@T<55fqXy z-VR@Z3ir8B-zc48Y-H$c+F5yDwxMQIZz{Eb+JtK#@-_;iTFZ#gdh^p zEJU&8@L7>hoLrUCYV=con?#Q?l$RK7(<`W5ruKewEiM(dRELkQrpcgUQ=?zwfr9g^ zI?V>^N8LXhMMlpiC->4oqXe3~d}Sh^+fW{p{CMo#_hG>0QAp>jlzd^>vxso$E^y~@ ze%O7}_Homhfw)O6W&SJt&8{9RD$)*KeGQhCGy+EFTVA-SoRl?=RH0Ktpn{v?aMXo4Z%z(Te~ei^bcAxQpV-_1*oI_D zM^Dw(1}4_&oaX}!^*@TtQ5r627uCkO^w;3I8uZF(XF0QbCrd4b-`}KeZEv$aRE>Dd zAfLL~ZW+rU^7B(w8NL!e$=g={pa5-3m?h$t^Edxc5IYOYDzTJuUXNlOQ|a0$M%Kna zV2Rzm$AZc^iV08oxX!j*z<1BG@UG~zrjmK_UD2nSnlXPh4*cBI2+q!`8uArP{RoN! zp-Ao1cL{!QLb9Mk$2agZRVKX(#lZK|@??2G9!o7GS;MSWeyG@VMAI6Ie1 z0vSaX)Y=0q&I>pj@_!9PjXdp46_j`mMKi_P_D5Y28!`M@7KLvVC;#*5wTBvG`7#BuJl{=UeP&c&=)7v(C8Z);&ha)qmjlNyhn0O zzUsptL_y-@jgyq4!ujN)Wlzp`9H?+=B%`yzmX!&#f{}wXT+nT(I2X)3>;u2}KVt+7 zdrl7Zy_`a{`>eIBVGl^eDW8wMorb-OuZlPSeL$9$ubH?CF^zA{)q5&HU0t;o8$H&A z>%lt}EeZ)lLhiC72lD(%i^d1^pVjkgX_*Kb498T{5SSnR#&*8MxO#FseHhbv!556U zqwSSTC6}zBZIDh=$U>jY*!y|E`EHL0v^j;1P6Z2G@(EOOTZ5(+aO#yJWKFzX_Gb(J z1*30J<#AXKO#{PJ<7hP$*l}66I&<(5R>o8=6Wr|vz<_3+A7IP2261|%RXlq244kU# z2gkApbzooL&p8i$k0?5d2vu2Rn`|lSAcp$9k5SPVoQ%Y6N+?vYpUT@~ktkPz0;Vy| zhm-y|<;lWhgoMwNums530X}KTZT>R;bV$XkY^(P0BANo9s%+JdBE&v~&!1aR zw{GA72saKhV)Pa)_Ea$Gx{0^9;?rG+vMH2HyXO5~?nvs|-)31X+rO+s)4e$ktDi5W zIq!+rTDyGjEtj0PSCo^Ydv$*I9fijvxVB=4hje4vIis5Io$y}TVim!k#1kuDDn@}& z|L};UQ(7KYKEo-lZ64)l%_T9*-myDoHgMVP$#ZfCpu&Mn%jH!1FHw9(F=GpmA_zc*9J0eNE>!Tx5Ly|-(E$d-1Yt2xa6)H%_bP_04u??u1 z#|Bd~bznA1mgpp8VWK#rhc7iFI_Wfs4WA|izeb+x7-?vSH=YKe2Zt#p(Q0tc1mhBz z&1B+B!}3cXO}In)>a38&!DbS<39bs<^o;6qB=d7PL7izi<+8IFgKyvEdx4WXQBS#Y z@&{QRH*YZjr9iyX_|6Kz(D5!7+LGX70-_)^`q=TL1fB*I{S+2;j6=Jad!1pRR2ma; ztvIov-%mQoRN$I?FOOF5DJ77;bJKw+*s!@OY2MRIKxs^oHfbCw70lo6z9lC6^MV}`jwV)7Am9UbnMFu=!TxbzQflIZ41KPRc zF*K`a+R|qWvvgEo;B~6Jy4Oq0;9lgm{)SP>QHmTx)}M51k}je$3F^MWtekXv`!~bf zmKbZ5qX9s$r3AEILJ0I+m9#%1PJPoflB9xMc|vk5jX;!UGKR+CbpVK2%ZZWr%f6P7 zS&Z#=Tij>9!n`TJ>*1{$$sW)*YYp;?16=iN-sul!8rL(O1cj>NM2ab`?8zETAz%w5&o-L~nn9QNAK+ zV!p?eHj>@m;FK_?&+dqGDKGhx&u+~vtpM3V-#8c^FW>dS@R`X`w*S`Z3VH7EdWXJim)Q z5miW3?;#gtbHhd;`VsW2OXD#n-bf@w02nH5?!bOoMHt9QzKjuHF$_MQcS4>Ijz~il zl&eY}aj45Ta(3gC!d9`6GlrC3@^BuH)KgVCq=EA4QkFnb)qkR|?GL|n?^NXA(G#{K zvzG%N;Ex?*Dn-Nk6iBJC9*uGR_aR}%4ib7!EMcv$$$u3qzZ_KmyY!yezd2nn#Pi_p zXB<9&c^;92?fhcg82Mi@+J+_U3%OoQ#Kd^}mq%71mHX>S9X>qi)IL=GG)2^$t7;jv zIeW0IA}V8%rx)(YT#zRv4r+M=3@i6|NuQJ_Q+RnnX&)#$0SnBNN&F?S1BhPuUC;)v z%xgFK`jUD$ZbZ6!(<87~*z6_006WD6N6dwWM#^%{u=>h9Msv=!*R=nc<2FXOIB60t zWY>urZ+Evi6olB4@$*GUlJXu(963a8yeDfTlW=2We~-rIJ2 zWAzHG^%9)Ks137HOKJUto%+(kLicR~!S<2KOLIZ}MI)nA`^9+fJpL);RAcXE=eY$% z3`fk*>9EiBzptiNuJyD62m)J-&5Z@8WMaH&&xcT+!4XU&M(zFR+#^7E(iD$aTFP}2k# z1zUj9yd9@#4pX~B_EZ-pqd>YFO!a5~+Q!27KWghy1z4arHD+J%5UR%H>Vyau7! zNh8-Anb}15!|`-?UN4NC*@|Oqc{^Y6PvvbgRg>o;uykX6@5aRe#tL^d8GYpO9#?u0 zL5&+Tk2W})-cSJf0y;V9CDP=HOQp2&YO6l1srSGi6G%z1oL|84f&mlXj*t#76n5Z@Ta7kiF{vz#C(Kb+Y%6 zvy+p#Lfd!5_QUkcS1nA&&s7*=4B#`egL7+3!hgj7_$x6^1W Qy#@Ses_LqgD_aErKde&ft^fc4 literal 0 HcmV?d00001 diff --git a/devices/surface-hub/images/mfa-options.png b/devices/surface-hub/images/mfa-options.png new file mode 100644 index 0000000000000000000000000000000000000000..c91a2a5517ab0af3a7a195781fa9628a7e13d0d2 GIT binary patch literal 62968 zcmaI7b8u!+x9HEO!}cX60Kj9Eq==x3yWYhogfmbw`#NT8 z*->s_YX$rGV}Hx}x4E0A`EN5QH?uac^kOfp;=Gv)ro^aqMMZ)!A>=WAZ*HzC=V5--P>=Z~7acVbNFjkC9~s->1Q5KDKRSI|p!o@1{HZ z>(IE2oQ`k0k3zSqUVZKB6Zx(WWUf8U%{fM`!+hknYroJZfdaFeL3DkAP$b*YBr^tz znV8#NC_kTbhX80d2$KcXLP+7^6n)=XSOIB6IG5>?p2%OiH$DXV!g3!<7mDAMLvtVL z`J@?NzO?v3qj>-|2ci}B`H2R9<0^p?>u zt!+v0ey%qVgGO(WGDgg`k;>x`_bBOJFI$W55ek7DA>I$9##uYN?&32Wo(C3xhC}*u+ zb_D<-Z6K}xZTmsccnc;J93lr)qfn&^?lYOQUZnUWj0+FCQLmco)6Y{N`$Z)p6fo+~ z=1K+eff`oGRI5PqOMrc#MER4?SAs?~)K|hceyyc;XSqc(cRAIrVrw@mqRtK50e-J$ zBe~=v`(>}z13MY-;ErRI`r)s~H zQziDeX4&805BBvt2T(5vhAR}T79!;@kSF{on4pI6N1zmnyaT06A%7nDgADa%w|ceU z@K(;92vbuh6d!E~a<^KAh%4X+s#Tgod17xCmB!q!n?)wR4fqMMV5RZ}jEQ1X@5U*B zpC~9^+Zp&P9Iv9ZsF+IYf|Lh2au;ArV&E7$7K)-S^VTKL@pt*K^DPbYjv^hX`w5r4 zR*K;yzN7EOo@H{1j`JsFwQhlDVQ;l#Ldyr%sp|5vkGaawFXgI?fmLgq`0qI?Gizz- zLSj-LQkq7B0^6M$T=Ap z`8w?J_sayr`;_M%vBiA1p*wfhfZS4SE(xG2iD=yth(>nCa(2%*Pt6)juLFdEFqM@q zXXcerqJI*Xds8hrH+^YyT$-{*4_3Ag=#EIU2H_^Db2ff-ag+*sW_jK%_`rVQO>+T) zDZRSl`QNHfe4H~@B4XnG{rx;3QNYpuwfF_f+dFx`l=wE=+6wXs=!f?o=eM%9P~e=j zwx?Qyb){&-QwDV_g$h=K=L42zl5FthIO!+%$rygnGM!TATt`yMAm4$5WafVG&MK=jP>*y_ALeiyg>6;cZin|QA&&s&~u4D4|nBwu^=-R+urj8cwv zY=TdI=e&uUK7Sx-|C*JBp$M$EF_qY%q_X&ZKcE1jyIwAoTka$1XE>X?zHo4&d_M@O zT)2?4H@q-jZ;NwclM?B>8$-IcKlh!D&b37gy7 zyJN+4;~j|-k7M_Ndd8pPc2Wg;#?}pM16knW%gqpHi&4rRYLq^EQuZX<%mz68Q8=63 z_hyJcJ3a8fmaoHj`6*6Vf58+=#&{+#Xf135m4HDJB2`Oa!9oUPZ&^QF#OeW80j8*N zB0vFN=Yfn96Rm`y9|KC2N>7QFR}tXW`((EX-cicR zW5xlXtlS+dWXe=5SXfvR!vZ0=9oQYA`nv+QR{re~=fdjdy7qWHA~7z3-N^l28Rx>! zH7s$Mu8TuSh?Tffp@nCOaOz&_IsPIGo6aROP9$ef3!!`nh&x4p?uB2@FSXOqHPW&+ z+DJfnAbwP9ijv|lz+B0EKnVp`5pUX-QpvXSW@4O>&Vx3GBI@d7{>jX$081Ek#v8OQ zgLjlC(yvgGBJoUOA#N6+MEgzgNKQ^J1{RJDLpsJrf}Esbxl=)9ctwPEGe8l4(tZ*E z8mB^ZFgj>dn2J@0AOraYEl(E@{X#Ca3QZ2RNWm(iy)+sI?pdyoH%dvwCts}@lA+QV zfdS^{GN2qTm*|3++_uOm7eY1=&2;*Nez(2JI!gM z5_4=o_n(cR2X)4A?BP*J)~K?20w8yHSq#qu@E$Ji%p~UIv?b0UY@4LY3x4xZk<+SG z3s?YC#*XrU6}5|(B`R4sNE!%|?%Q?JLRN&0M$XdSsGFe+6^@$hRb&gwOop4?N(K_( zp$h|OtM3aNryYmq$E#K?m@{jp`-xDKx0J3nMV`<_mAicN`1p8xOW2$TDl=Yk?B#|m ztAbcKy#W4Z)>r}~j65b@b?VVdn7iyiO3_$oJi zWKE2M^4%bzRBSDaQxNGW%IsqwK1(*VkxIma zKgJ?B=N|GmhTw?N0*0ZgWg!l{iZccA(EzSWUygSM;_meoc-dMjsayUhI)=!0jyL~; z$2|TkD z-H)&2gM7>Vs+^qRd9wV_o%U-A$w|toNv*gR5nu&57pBj)mtPmG-?Qhwfx$>q=@l&7zMz7%X7=X#O$uCOJ6obhjV+rK2E=|4FHKoH4rGWGX^so` zhB!NJT>i(`yY|T2R|i??3EI(x0hxbX04B4OV8=FEc>$!8? zRc)@yDo|E>B;xZ2vNSl-46_8iDuq#2NOy9l>2r8gj6lnU+U@iVNt@GNB-Ty&i7XP_ zotrmL%gSZ1cH7zl?P@!cFKYzPnQZp0ACoRG)U{9>V+|GZmh38KV@yN?rAVglHi?7z zWU!%JEZgm#DDHK$DR8jA;}Bfb!WL_~3y(D& zov6rsi#{Fdn^3GOjZfyJ57NhS4SBH1N6b!2np{pLsV^}!cCJZY_S6>fP^rIsq9XO7~1c}mH8$-uF-Uem! z<2s%6Iu>JlwFQ!GFb+RW|A}kZ4xnkY$QqjnEaUH@ICWPlxZT5h#-`bsOZ{drKstr1 zH_-;fjzMVWBF1QzndI?I4S|8up^Ci6pbMm#+lzU_x_BOB(oRuSMTl#df(>{HDsQ1| z{dT$r)>YQI-1r%%`;IP#F3aVmGREl9uTaBDoBBGkXi_zAC;zbcblNrIQ8xM zsUr!hlxH(P^UydJQj0Hv-GU>~d>fTmns7 z@w%b|sHi*^NGwszl<@-6nOPD-kh-3Fs=3DGIwNL9A@z0$sTJc0+E-pnMQ(2Hyk1qS z;1&yvG>j`$KxePY=tQW#Ah>@dlydy%pH5r`W#%!tG%DCiIEn35LC;b1#^B}a3u!?a ztrR6=nh`=zQ9MIe`IvmnoOs~fkQWC^JR|(C}}XQg7$oS{1OlTmI^Ho zJ|SM{wpRicRkgXR%>%RmW~?Sjn&$|NXo zs{r{&q8WsDyv{;D$KaxzdN3;DeR@T8~PNBLnIjB(^aw^H(&@IXi{tE}t z?O!bWVt0C41pf~_gbW4cDZ>Q3P}RRV&!K`~B75tQHJAwDzWld7Qt7y~Mr>X+67)FP z)qZkr1wn?#Ri4;-fg(htc8`b?e-(TVz6X8orDwyxv~P!MZLZe?+hJyZ7R?Pg_O-ns z?EryL#5PfNxLi!qWacW6^{<0+3x0H?2Z`^3IKn7-pf8k3qA zl|^fs$d%XFv)yV*PS;R0ddLBmX-hi_^XL!I@}t!N3ntBA^W+)0k+el?ky(qlbTfFX z`+Wd|6O7Z4Wwhf&)1CqQvBZKTLTS#S$6Qh0pSrwtLO&L2V&cI16oonE+KT&8?1PC> zp%radZ;ZZ{SD4$*c*=>0K_Z3&NEYlnAxo*)_$`H>nuZId2UyBRX0>{ie_?57N)okN z2LQoDaahArjgSle6v-o#TuB;{Z4B?0blS!?VIujemJMVCXc4kvPAip?M2dlhTD2IH zQ47|r$fZ&=s_B!SwL;qZ@sx2TDpZZmvn@Jggo8wA(i4#IyMNHWkl*#R@ya8MC3t9} zB$d>8uDCvxC(p@pJ7(z!5*$0=sZPD3JcP0XUI}Y|L>ePu4ZGIPxd9Az#pC0VVPys! z7*S+`-LbPu`ew(Zu4Dbd(n<~ClbWU8TZOySWWv_yED0CBT~5dzTq_21u5M4zCWY`puO*U-}Su%k^{BvjD4RVw5So{XB(d< zkM-m1Mx@B^BkZq)L)AiH3}R>6L1-neGu&P7C&^# zX24dykL(BdSZ>++kt)BSBu|kl7%wHE3yg+wWVSQ?9MKIX-Z;$cp1ol6n6!e^M062qalytQk&It(s69HxOeH{ zU?P)dBOQ>%+F~2X<{#yk2+WuL&`XV-b+eVoER@p*XuOMGqGbO4Wlo3`+wHE*BznLP(_T&*F(KO|CX{l9G?p3@|;I7-(q!i6X$w@^-!(u~6Vx zay2aUoz4zYJmf^t>%1FoA<8*VxOfqnFfQfbk3BW1%>JXwIrk6!?0<9L*#Kdq@A!@KaC_5bq z1)cfOvZHBU9CkmvPet(n6A1%99tVjX%zvP#CSmClU9Hcsc>VVAk_CAt2Sr7O%{ zxF|;0N^F+>EOS?V3R#$;TDVoX^5R2rjOL?q4dVM5-{P~k2T!x{SX_(~J;cNvEIq1C z3YCX`ue9@K~w(uZuv+=u$FNGRo4v<(NczFkTV;1sOR-kC?Vl$MMM&%zd&W#R`Hycg?#X zP)sC9TqAa}M|oHr4v4znR6i7tO|B~L-!2EcWw$?a34UC>g!VAi4oWy!zMgRak7>Q9e zN9OvrsATIWh2}BqF>5x1jBdH2VY14Hdi=Zb1I-gwRH1(=-!H^knVT*xT z9Ok0BpbHmpuk(8`K+_SVfvksRMLi?&w}RwjyAzrsYkMJJHB}&;0ULQ=&NkH$4;B^q z(8JQ7zio4PbYzSPz@U=lYId&0ppu#u@Eecbg>4!JWX8n&7>rH$5iB)R|FX3rU;pZ(v>j`^)(o;}L)2tjV^ex!Gx6C48QGRA@e~6Wn z7Wu~#aG%Z#u=HV@i1I~l;hRD*nDvK~d(GT{;AzPi;Wu(K7Lk&oKxK&=s7Hz+5scrJ z<6sco2vauA2sm|*=%i=hZ_*CsCbRr)oClpDL8?Dic>k-xMz1ZNBi5=C!vk($4yv}P zp8F@uq90=|7LTC+%Ev3$2*M_kSz&z15uE|3^$CrS8<<$g_<=t_$DS`1u&~FMi<%x< zA7HU%a|Ytn(00Ny&b+-Hb{Yive!#^T$m?o}0<;Y`6xX^qY# z07XXH%?~RvI|DqN45;Pl-r7hEI>N2dEY!L%-WhST3 zKyXK!QZ8OyUH$v_N7j|Mzp^2pmE&6aHP;#Kg6q6@{v90bpaDE)L~zR+c;M#J$Vc=E z_ml2B3V)35hW`%|Rm27JD-+;= zt}1QrF*_6yU#fU@3UM}NE#08KO-tT+ZeHo*GgBvNkG8z!Ez4(~Rzac4!<5MJHDOl~->p z&Xn%#+A$^ZC;>)9ki%jMaNFkR9( ze*C6OXXst=-DUd**8K>dpM-%#MIu!mr6n#7Y3}yyeuU)Ri{ywNiHc-sn09%ROykn5 zce_-VG)BvRn1%?)f*0?PTA`2!cZ^%U>Td@kXIZQ?6?he{`Y}KQWWwl=7_0zAKO$A> zAO;jhSUHg!6ZcUOTr9rveMOYM7ot)rN@lA=rYK4O4|aS!$pP=P6KMUCBv=pcT0P36 z+nFALMwKxXsRx)i9iX_p(NcJU)r;+@N6!t;AF)yvkO1&X<$jbrkgicwXR$1u0+Bz< zyVR)xct>XBOr$*bK`~NJSivG?b0dEp=UYiH&9a2@g}$Hc$3&(Mw8iM;;Gt~2IlF~R$8>Y&l6n%UF;f7>j^O;dUjs@@-$e+|T*$AE{^a=q z7v6Jrn%8I?rUNSt>f^!!@6rksS(cEi!T8E5BkxyRo`y z$|SY(RdnEuz)RL)W!Kud5yHl#oYvaKA{})7$Ro~oyRp`F)o1;ryCTXVerhrI$mHoK zV$Flq_u-SPM9!*}{S9GA#@qSEmSAM_{???hkE)J{Fhh#$zvKMG)3_=y8Q8P$7Sm8#V12ey( zq)5p_L^6Nx>G@$Dh5eKEQ%0aQ8(gj@=lDMmAQSF0+VApR0N@ZnU+-=I8@o6 zlfuwT(0VlgLLWy1i{IkX8DO>~L;L`MsEZ6Z=U4wQJ=#}@$J&WMB?kp~+cG!o;Cy4p zZ8~Ap*7)$S%?v3+D46j6oE7E$7{$Xs5RX6zGO<8TBxl>!2R?Z3H%IGQ9g*7 z7%)|*YeSQFLZd<`PBW;_?`Q!J8AyhM`x~X8kku}9&&L|znm=F*S!oxv#-B`0^pqYO zb$e$_!Ux2I7o)qm)#fIsC^B^5b9DaCj^_#)*<4J(kR1*0(vS?v8)UazFw#`j6WDrZ zV#V-LE%6$CN|$Y--t&57l3^Xitzso;?dkFG(alPZbb`Z%G5}_xNs}P63pfQoQ9OHs zxhKcWR;kX8dw5V(BxK~|-ZF)*0&dK-@Y_U1-#A1IT_Q8Bhzft-2Gqk+y#Z>^h0y^A z3^neaJ9{RGJ$MVK6`35$=ivs~0oMt}Ks|zqh(MUIv^30REs=`VSZ6Q_rKd z)rKYqp5=ZDD2cH5KlB_V46?Du7e?X2#dB~xa;k3LDnvKLUHm^xI1r)Th9g{-=3>(`6hA7g&IpHmkE@Q)k?`px;d05b$L41D)|Bj7VQ(2iW z@z)+t0z16&l)X8_!itxsK8+s7*I7E1hQ+*jRl*#}ygVOMK0rx{k79O)Olj%JSm|)G z+g%7|9A8j;kbd>dI*thXrH4Ha9Rqs2!X7+cnjm?vMLxuyS|5v%6K~O!p)?|kEcV@G zhi3|Hu5k#bL>G98)v$28ugS}<8j#%SMU*c~g&W_jj7I89#6vfHRZa0Uo&)`G=jet& zk;YF4G+jMFU|LCF7MUeqm_GJL>EfRlgB}6Nc;tmJEI$Ns=(ZnX;IuW82pU4JNEeiX z!R(RtmzRw)qy;h(F#L_hg+*n&z#loFE{T$sW~u$Lq-7}a^6K8=<=!`07I}hV5MqUk za+X^RHu7`)91<1z{QNwwIM(Zj0;g+vC{oHQBaKp%vz5`x{NyI=s4pMcsFRQy<_;pg z%>#hpGHID_QL7JIWRkF>>*9&ED<+5k!y$XCtA^$LJOT>{SYZj9iI3sq>jGdXQuH?b z3<)~=$r*rr^>BZi?4%C*@tK(Mr>ypDpHa;QvaI3V{T&BXxvraiM!H}4V?^eQbw6pm zR)5{*A_+EZ84U-S9pe8*FggzMWt`uxR8<;$j@|ouhq(I1K>6f0xHF4qr;PmMv#%@1 z-SP8|dc$a9NjP?;4FI|oPJzVE)G6|r}AKZ)96nwJSoijeQ(zhXh}d^J(%FBG`o-Ymqq zd?TGOU`?9UtWA%ZAWAKgC1|c^9O7=*2xbrAPu)e*ZJ|)fkO58n9yNfWqk9H+$SM#W z5OE?__q;Y5o%1kY58~~-n}lL0q|gH355)0xLb8-gyr32w{HNIVCc7CE|qA|t?z|te!E)*GsvP%!lO&5 z;y5K9bMxzFCyIdU!R@pTYZSq?RbAt?!FMmlwW3C`+!ROQZZ9`I@NTLHDdGB00bpn` zaCtRLLZ0h$C{t#;;Eb>o#uw#t?S;n>TLbG1g}<|xId!ru0b<#U?Su!#yRlND9d0in zcUh+HSr8@uCwY|`V*Al=7qj}=+|;v?`Y0i5QUNpAin%}@YA-YwvfQK#NbmctrnCPf z1Vf4{(o;{g6A{8kmk@B6LggOuGA-y_vP?kZ0M)!qgUat^>Kz}+`z70l@%5GV9wy<$ zqPn`2h?B1GsC~NoQ6z4nWm4+A%?x!h!UJM_-A6>Ol`_cM-cLL<|JNg_J1TD*i_skZ zwOzx~FL9Cg?XNR1eJra?zeFm6lslMh`I(vyW)A44ku7Gxwg-6l>o8O?&hrtc30%*o z0;;V@^DX7)*Xsz|Oku~K464nvpG!RcGBQxCt&2fRHT7`+>SgsE-wheMzpx`vDOmD; zM^>9~_RcfJGW185mo2+1_5y`*@iHuWGQe4(e{M!^=Uh zYuODk&fnn!)L7WEmAl_vGuDM!jt(+`-?C%B>5m}B#f#yNNwPfF(@sW+;PA5YxKh2@ zK`T)R&%$6!JqFfz1CMq#U}5x)Jxuai%Htfiqq+?urHVgpWT|gUsdUOmgWU*Iq!rA| zY8ny6J6Y9R^259Ql~reKsue}`=Wv%UN;#jE*`xxw=?3m*Y2IPWMu>D{=R1UQZg%w% zX^QbK9lepY6tlp}j6^&IQA3(?oho2p4+7YpDaehs_fg2lpcSXMHpnYi!FIi)qAI-< zMLGXuBWrY>+#*)%8u>|&Tq6uDkmDJ)i5}ECp`Sx6k@2E`Tf+75~w7vQxy2z(l{|BNb8ZIrQq(-+HE}1x`aNb|6)=Xs`25 z7}t$y2J^}NCKWcZ|Ml~?=$ks<+<>}kro4cXoF*mn()Kxc3JqC1tR0Dc-Aj?5( zx3G?91ymWW1HXFtY!8M%SZWmpuOv+A)89idXhv6+K)1BK=EIeMvlrR9i+#gq78y=i zYQ!iM~ zE)RW*P2`}*#+$f?q^aq+kYD-!_BS^}cUP4Mr2mz?@GMh5wXLE)glOo2dg9Q=JHH?K zkOB7N_SdQUmt?T%X+Zb;e2y=6X!;D%mG28fRSOCGT-m_`v5}rEUTHX?*%cd>LG`6| znf=L05|&J8{iR0|SQa?0uI{e&>6%I*l?& zk5K8gm;U+|VNG4zbY`NUs&|}>E3w53%J=gp2Q!2BT`BXgSj8!y{V0VJm}`1|-1eEi zRV3T{CG}@Xc^lix_2emAfwLE9LAmdjb##Qq`4PFHf9aH~q-Uh=_mdKBcL89Onhr8Zdf&|9O}AH`1Httg{01JflM`Eqs)G*1m! z9fBjd>?aIZF|m{=$o^i1)wAH}IdMYG^Vb=^U|n^;^XhIh`q2PA_j7gomLfD~td*;& zUItGgRd3%in7?)uSI^yF-Sfi|4hpFJ-<(Pi3RB;Y`o2hdI?C$VDVy;3;lTIqw=`p_ z@}{b-Q)7K2Mda`j`)gB`g_I-lucJ$cRP_rM@bC5OZW{Z&8rXO+>zRqd&92Dpk4HgU zy$~J5HR5Z(JAyo>ddO0uM5SP1T-C1d<~QXc8Tr_Nq>&6T2u&;< zk6~e9r;GKY7C$NtGRT#tg zz3rq4Rw#kp>Dwc>|y9~F%r)ccQ=rG-TgVNO`|1#5U=6pW8~v(9{gJ! z6jPFb-#dA`nia9n&5(LMde|Y6>_R&g;ox+&bmI&IFcroN;| zSCX99cQv0!q)dvW%~V2fs;{c3pzv3fhp9&+InJA_SSu$*+hy(D*67g&Y*5HU)DINO zlb@@LFx|S6^BjeFLWQk59U=XGbn;5*XcgQ{%p2k%C?Tf@_}hSi9u8LZA!RmfHEGDn z^J6Q_$ghQ~(JXwWce+Bvn49Yklq`CNN4ob{x#OPqCGM<-r4eTgGtPX0WBu8Qzd%7rvsWaK;f?+5wskLmA^ zA#D2|S^jS4^F8!aid_3-4=PqO0<6(${R8;AnHt1?MQvl_=@l3T3bYsn^G7Ci6SW`7 z6x5hyNsq#S$aCX_8)ifownl`>-p=w)_^7B!EaDwIJNoEG9Ds+HwDUI)XLdisY;2s4 zBI%5OLU3N7Lv?nlF-4l$XjnD z1KY#WA*tM*45L5qWUs7joFI^=42_8P{G6VV0RfrtWMcf=qcN}a(k4KS(*8Y`dvRf* zj4}04oH{dP=!(*W#;~EdvC9jGZ_7a1nAqIg%T&$+5MJp40r+TyMg?G_;L6HgmJqA7 zw)60=@Vl9;WdypF#=vjS1|-FW95u-~#p&PnO0?)}Jnu2iTs5dE;u z|HK#?YTl_D{c4Jyoo$?jH#o|6KtJPz50WJU_p?=~fLK4@SI!LieS#Vw#DQjkztuSa zHP#st5|TZ8&v}HcO&zhBSvBf&QfXlfiif+N3|8-9_3U1g#N1AvHw9);&s=QfP+VIG z)|GDM=j-WiVI+@$u+z>miEphUPR)&MfNbkDDRw#A7pBI)wK6luW#W&>zcy}pk_6V1 zb&X|by-OXdN|JR3@C_=WG^z2j_Av_Yx5O13y*hh3(oy$W?t%2qF3hu&^OP0hRN`rxc8A;NlV_c6nGqnb5McoFN7#Ei@3?~!szm{dy9!&ZCmT=(m z$;A)xeNQv>({uE|2c*x%Qh<5CFAlW}iUuye)dwH8Yrrva;Wd%I&K5zFGhljYy)cbh zNOBu?SFn$($^0;`?A}{gcx40{0U+&)oC#YiHEg0SHP}mz$B$X5U3ZCfYBnbuM(z^H z)d(#j)qD?gO$wt#H>e2n9~`=hY;d}|$ky31SPbhqh2Y#k2%2mPn0c+i{9EsSHk3uW zKU7)cY}n7yuWdvx2S&|3@ch0vaxhcZOR=dhv_K9n>tf;B{653AvztJbb1@mCbeTJK$mCXUJik3>T1 z7Fs~x0JL>vX;DMhB`+ClPe=wW4#;D{x#Z(wa%nK2?-vWSFAXx!u9y_Xg?YN?i$EdV z$`)iU)V^dq-bnjCe{MVe1cK0FDwDf2?B;@`4ZXFdHbO}5t1u|BYn5~XMW5y9`LR@^j)&{4a zY~%i{ja|Yyk!G$c8$0y_D@dul#igg7$uKwhwsAwNh1>2aP4Jh%0tvTr6>J4Q-&W$W zo$)?U-Hj~O)?ASec47Vf_((D*Mzp9{#`Qht?Fovi z%R@01j6_^qDPD4>XYdOsuVX-c*9@r$-?|oqx4RBHx>`Hyq<4$d0{G7CE6%gv0Xik_8uPw^scGBcS0yelU&blO-D zP9rH?)vYYqiEX#+Z~6^og<1IWh(e?=vlkb@#KKXGbgzhIiJbk}Xt=hr|K@4BGI##T zYvG2d#&xDa3);lRE!nv<^a)vFK&;wcq7l{Ri;hp3dFeVSbcC}5gbM+1ltVw4A z8ZL19N8?cx-=9V)pz?#?uN28TsahhfXaXu!z-Pn<=NQR+Zeq1j)f>$~JElmEH~{39 zQsHmtkXytWv@x$%DZR=L-ycCrb zIb!AKV)E;1aS93=82CwLY_T!)J?w@bc4@LXBB>a0S%EkbqGJ!!DTcC1_pj;_7RprfBgI zuAb(h&dtx6iG*H;Ifi*~PT=M~KN_7G>@7^vjZBZ*t`WLA@+e+ssDcex`#QD;Ll|Bl zl!x#>Op zeEK&;i^5A;kg=2~{-7&`|DqoOg49ziu&2ruo4d+_U6r7#bSwH@vz!LdF!3@u?XpXz zC#L?kPMD>`rROB8Eg_&R|2dem(c{kwjgcSRFb43eYsyWP+=s(}F#hUw(em92gPFOT zR)L|KGiHhiN67~RVSpSk|AjV}Ak85_-Gm?q6n67SQS*&Wke8R2NdZEX}4*wUCF6IR+h<;u0HMc;2&e0>l2 z-#zmGpX~oH9eB@E#&I&Xx@Yb0!A{){W%qPcjK}W_Kmc%`AM{;uUl^7tzd{(Uq!W4; zxLQBrs`zn2-t*Qfh)SZSw}!;J$~ln=bR}S%T;l#@84xY%hiY#}=P3Q^J^XjrUf3z| z>iVH)b&@`}p_^dO9|MC~Eo=Aq@-j)o9NeI^a%FmZoIC#~o}sx|3m5l0WN-!u1-{_X zaN)Z#2w&G$7vH3_1;^-?*8HBDS4~W_y%MTn!AE9ewh}!)z2A2#D>RlKtB$@0g96O; z9{#WrU?v{>WbfqQ@~{+~=Qll;D{yxj{O$dp73)|OS7;VhW^4!~-&kJfW{I$MTT`{$#8MOZEshNnCBPRT^h%0|(FyKn>4Y{;gnW=A}Hbvn!Ir&a1?+_V*^O z1dZy&q5gZ2CZKBy?-467uc*kz!O6_Z+m9o9o84~|3q>V{hyYpkJ{_ty>BzOzYAstl zG=#niUyS<#U^z(2nO4N1&*Wl4Tvk`e03@n4_F}6J{6ZqujkbC}a=+iSAj1eV;VZTi z1)k~5#S5*|PnGb)U-(%0|TBA zjM!yr?~`L#1e!9HqQ#b@=lTrw99hOGuU3P|>8Gl&5XA4SLp{WyP&I9iNU${4^~8>I z2*feRsNotpDWS-R#fLlkB4H>esMWCL60U-+rcMhu{@O9qS0_(%b8&4*R*KD&4TtZC zYZdM2ic!s}yK?~|C(}+t#l>%WS34Q1%FFYSn_5FVQ1mc?FlKZV)db5U0I!DzyL!tA zF9!;a>=NsC2Xwfhc=d`VULAG0R)*A+A?l)k4Jj1h|JtBxlo(azF|?LtxXi~3LmtzJ znX9BE_iYE?86;iB6`{!RYVxesPb#pTJPNeg%X8P4LdTh}9iCD&$7A}iReoju8!DNO zC($sbq6Y_46H0W*Fa{#?!9e%#a zI|?H#T_y#U5Q_Nn+UjzmR{-^cm4J;2_c0UcNOA|!&$Xq4g1N>jYWRsi{*M)zR*6?- zd3wSTzh?y17}Xl3l_@}5lZzhzJz5o7*l`4S>cPEIoR>h)A0jtH7r z$AcNiITF>k+RpX8phAMxPEd1*q8Q~WJ=mwo8q_vcik4`#FFrr_W-_kq*&y_ z(0;a-gLw8fRaWY1@Y(+RHBng&q=Dx-9@=5!(8d-OEt!Xi?SOk;N9O`KmTah}n3f4k zKXL0;U*9^7#f6JiH}Lu-*a0c=Sy_2`c@Zo%W)`f*dwpS$la0mJWN#$8)#T>1h#ggT z8vefY+b$rir=-wz9Po3vb;D~17xJD>AIr22;}0j;GW9>BLPsrFsZ^)Ej}$utW8!?$ zR5daxOEW^G}N~?Qyi;- ze+A@qF(aA3Avaayc^wttX2L4yw!IGHOXv-&Y2-=8@d%77a<}8E;%gHaAH<_^dngh# zQjEn>e=-+bXVB=;T;PG!I5A|Bx?Dy^!ro6pdPLq6qq>e}&ZQ{rs!3;ITpQ5)LGhvS z&kVJrlcy8Rx`?Qz6f|V0rdL;GM3|rwgVIvUO-W;rsaSC6q#A(jbuBoIw#KNYb594s zEM9yxKQ3tW{MflArK7cHjsFu#Zon`-aKF?srO8!_u_0v?$m_#D1-vowfnxEE0%X+G}XZ%Px@jvwQB+ z?+V)RN`Wq31(lVy7M>9gC}$Q0z_@Y%RK4xx5;)g)_4c*j~=^paVXh`owrk=ra* zuk*PM;6eFc{^MGBhlVt_QO~6{jE&-A0z!7HnwHE;EZ{=+l1gm%LntQ@$NuGXObk9Q z?xo(&j=}coYdR`7W9o9!xz#!#*4iZ9B*WuXbjDG)Q)p-Zf=V=Ns_4Q$UK*0M`L|&h z#6&Y%&vw&BP0(4~)tk}Y2&zeFC~~8oQ|yL&lfcoV#M3bjwhb7CR@7B8n*k!GJ{`Dx6A)b(`JUUKJX{xz&yyr z!vDqEHw9-;`F(_w`RhdeO&H2K5)GZ#RER!76j3r2wIto2Vq((RK}X?4SphMcEG=p2|HdilSSx=cQJL zWl4ig1eYzu9{f?9oXdLEGev%eYx}7vRW`DDl;HLS45w(xpuM@8W+^Gx%F2p{zP72U z2q~wp_#l5oRH)AA0#po}QP;9uH=CcfPu7W>WCmnIu8hNg?fx$8Vn8~sn3i7KJ&yPw zYlwk;ekBk4Oo@$s2xzhj%;zLyv-WhR%{2@AtCW(JoccRs#wmBc2^f{kQ={^G?uTl1 z=mc|Z!{$J38AXzM1s2kG-nlw815?d*;@w0gwNV;7Jg65)`6Wq;C{*31qBWauG4%A* zMbEWnJw~d`=@QDLgA0!Tjo0nY$DjLch-j+$Ia-<#nExbOE|W5@ z(WtntI+uA7|2W9gE!9;~WVL!;qh~a8)gF%pZm(&qXnm!7~1c^AMkDEceEHmy44uBc)wIQ4UW{JJlBErV=EA z+i3jzaYE$$hd&usj{IQ|ZWFDsr?^)2HZl1uHDiiJt5a^K&mBS(NtdxoqIX5-kmF$u z{Qysy@scxSL}eG4OJlTSl7XNi zD16>mvk@!TJ}9tT7i(+SR}^}Uhj#ltv`mO-8f*#Pa$e@dD8z~KZW}FU-)#@ZD!dmy zo!@H2X6D#VhV)UWZNZ(g@3RR;=Ig7AJ=AR@-}c_c4t#0b-|!}BqI0cfpDHek7nRjM zexpHNZv35N>W?Zdua~|8gYA5(w0$!g%?(!qY43^0VuWv(#KCanv;

(o zq$|fQ*0y{2BT#0>B-VU0TRf4Q&@y$)Efo5UM^qFUO|hOp4-q}#-OEe4R)$>7i^s__ z;4fFIJYRiD6B*m& zKrS3J_KH9qVv~2FW(6$)pV_hK;LG>H;{j2&ViCqo-TMSw0*xB#D zbG`F;j1~}rj3UYe$J9pWE?_mjk1wCkod8)5TB#&VZOab1qJO&!7` z8-j9IBW0|@)Fo;R{s@f@mx1h)CQx8RSe(lmV9{%BOHK*0RDhb+e~_hfX&NX{vZOoN zrJOrBeLxdM(Y6L|h$cP!tPl6xtsKjQnj*LiGPpm8VeYECUNz|z(nM>S0`M!#Ud}B}W=ONUWUK(&<$WJ)?RUV6^>+x~Z;twV z^|xfeJoU&=v{)V#hCGe0GT<+d68=(dF|R+jV=j|qxay%kH5OiNQ5ucc_dSpKE$^*rpH}~Hw zTppQ~khBr5kPPq%Vu6+~$EI)-onNEud>=v^y&-a#_Ibu5--c3icwr7QaR<+3-89;` z2JN%5mIGi2v!ux8J{OB~e6DAT_5E%J%m?aWg_!nmBx8D8`fYynf5~%Rf7|>2=Ni*N zJV^0aIyMLS_w6=H`;wW@iD;X8?t$C=@B8go_2nVQge{wd&)dk>*7I4|H4(8ORsJYW zTR}fb7~|i6Z%y@EZ#$l?rn1y7$N#1IN#NJjyQT|tMVypUC1Wh- zTngn&xAE4-)A3fG0Kb3U#>C;8{NH~()e#x9`$zu}eOmtd!U&G2PZ(h?+afdIkRc0W z@S=CgHE&z<`~r;02?iCl<)Q_)|1YkxCElfNJt8x#L~9g|`$W(+rvQc=ft3kCqx=RexD#fqTtpws zzl1ZraO+2){;@KpGLcOm7gkIUpHvzb%oK8I`Wq1Y@o+6*+)tOy z*LJ0L3T~HRFGKRdrQ;97oA)!|K^j!!1OYR6s%m3>g3LYj5ktBbv5(S>`Rp-P_u`$P zoE=+M4=ciu#9cyl{=E6V;)I34m7?Z6s}`whzb#T8HVSX;TqgVnYw`nkG)2o18pOLQ$vyl-iV(-b#l>`;hP@;n73V?wv8V(|) zo|6tK*kKk^D>MyejJoN=W||J)>)dl;?v*UayFQX!JpEr&%l=42^VM}2zu3m9ihPTU zhuSsjv23M(sRu)9474eF^1+c!@)IMpV^%>DGPu4$2>Q$g2>hE1gEeo>Svh~atmMyE z?Wx;#VTibfMdD3$YLdqJN9>>dqbvJI&xs0}8Od9J-t_H{ID+@-Z$Aot{(JQIClkPr zw3%J`Jiz+&UOdxxqyyBh65ww-+Cf^@&HgnAbP|1GK^taX+>$`6YW{dZ9oZ5f`bCZ2 zU&mlLKg?++L7Udvg={0>_3Hj`#w5v3WUq%UhYchpyuPL_UN4q8Y%3Uo=)PDBgALi! zVsn~#leD+=i#*Hnw*UO7H{H$4Rzic9-Lb?TM7Kt!5V$T0PO#55Oy1;jcKDu3`OW=~ zmke+-`MwTcZ8Z9C|3b9^r>6i=yN|9T&c#5^vvOuxF(!l1br;7d@TPrg3^3GUnB?*O z#|m-&zH`^DvnzX+4__K8u#@$dpu@>_hcT%f#8sUos|qvCs4?kH3TpWk1&Wv5dSA_| z4l@N)+0LN3DbooRE_3stJ<9Fto8keCRPSjdAY5ye9KcNY+eMal-l9rYZ>SCK zkmWkhmGAcx8Zl+WpWVof`V5jE^S(LsN@yG!Xjpu4fDA~%lP&I?NAmOUceJ7s3{v^0 zE)Rpnsbb!lt`E?!4UKv3D;COM{3713#k5-kWb8@@YlnS z+0fgRr=_P6oqXn9+1gXSvf;JfS(qGQwB5(+mPKp23jsZ}+M`64NdRfXjVu`fcD#M( zlkmEx@GxN0=kRv(rqP zoC>VvO-L6>(ISzjj|fBvtEip(;Mr-pYrd*oidSYyJ^?ucYv(JuKK68A8gF8`m5&A> zAFSR9ktt66q5&*dKHOe-VHou;XMZ=f007c#N!cteS@Wghmh$s0uEa3{jWwkw+Q|2%c`S>^?-@A(u^PCKVIUH+_t-D9S01@W+$dFN!tb%RB^FGP zdD;aS8#vifM`51rk>ZXxGK#|_Km44r4=!md(rdfBNPQev5`RTPCP3`+#>W+FC+fM+ z5uC_h|5ZTZeYPHS8`;a(ynMQYR;}a|ONe2jI1E`$W#)-XE7&Jc5{ocUMpb^lTi0+- zK?bsnd?O4ps?+#m%3X>&sV8NgtO4u2C4rZY8qLkyhMA;-aYPA?EsMD(kOpKytY5*o z>879w)*CSj36uD?7^(Csr!5$U)0FTGY=vt#Vp1ng5-viAT7944)U_JE*KS($`|J`G zD5z-2r&{hSt${SfQ$X`?OZHSm8@YNnOrOtCd)ba!3$3^<1NSKEKAOrw@g_ahAzljz z;Zw7;bW^ebH$?O+W*y+COIB4&N86d>>hwICVm7I&+(GhlU+YX7z)`X4);j1+tMA=6 zoQ7;~84s#cGBYZS(-((*ju!`hJ~dk&aSKfU_&jlc)j*3op!27wSto0?%Ylv)+>uHZ zoOz`b`FD-5$@gBmpT6}8#~7Sp_?MIMqt*|PPZ14gTpped4q*`D{}h7M<lw}30Tqu9~ntPc71S!O{gIzZl14szxa z{xpeiy<)Yn#mN4g$uz1qkI`Jk(kUWOrB*Nul@KgXzW>|whcg>Zs0@X&Whw6|J55U| zpd-j)->E>DGI4al>fi+Qw>ww0^q!(XtyJ)0W1%$pnx<7r)b5PULitZClTaX-K$8yA z6mOQIISWmMtP@WHT!qH_j&kMCJa)W^SNhMI$hp$#S#Yg?2**(MKdS<^AaxzR$iq`w z8pVs%$4c{Lyejc76{+ZpA&m6c=>R=dWyLz%HEq_IV3t34AjMr)E+ci28z}Ktl0~gz ze*Ilm;%!3=Xya(DvC1r8IA!B4_+fje)oA5-Ve{{7Z@B`_XNmbwThl)`1=97TN|pEB zsjU>Xr7f?cRBA{coULB}8{!=9qZ^EuKa0nldnK;^yA=Xf0x)|gIZLDQ={GC0+xngF zai?XY$FFiah|5=FFV)SLDyk{|Z$qCIdL3MHa-Of1pK{d}!;ucQz+I2y3&F289g}nK z=UrS?4HU<6_UqGDM_*M{2391`DB0HMc((4yCgfrN)~C@aPFd8^ZPeEC--o!m)3&LP zH*p_WFX0n|H^!}6YUBEiN zbpj(QV2{Sw^L;Ia9IXu2ilv3F`#1ZtR?CB4k5Nj+-8bTU*-=FD<-X4k$b)&=_xC6; zs)%9zkD+T)MZvzp4Fk>0ProASXG-{nCn9B&^Haok{-51_ z&BE)}B?>Q<)OGvEt1U=M+dhg~s#3D9?y$}0JDlf#zuoEkYpE$~XAl!*aLP#T9+`u{U>08gdYwg? zlxaW!g%^RVpmYDH1Yciz-rm6j1=zz;QNQOyb=StmiuLaE>^Vy;6r!UlV-sccwTt&H zPWbJ+j7-6o=g#go9=Djd3D~d_y9y+a*O-vewp&k)R{hVlzg@aYijYxiQhx=L`>QvB zzWD&~a$-l~w-@8BHnpaxF?YAmX9=o^^h`#+#Gj|Mw_9&}Yj`@T9?7-wP|*xle?&@E z@W#a}kp?BLlzlVKab2uJAug4073(Y(%Sv~HM@rOtA&*6zhR~-=4@3fms6d%n)hW_Y z4sjYk=Vd2;=3N_gC`E+Q@Ux?9RfDWb#a0UABX?AlS~He8%D>5r8I|@Jt^5dQT8lA_*_|+|1QfsenLFj)pVW&l`!?dL#5hb};E(ZYDJ^AJ?tTo}SCcFyf7q zb^|q(JG=m3V2{TCW4Mm|X;fmLEW!QN0UD*HiP-sIr-K`p?h!%r0{Z_)S9JQ73GM7L zjA_FtBO^n1QNYax^T$CQ3d{VfaW@!h6*c0#Zk%9ZZ|UP>l&w{=?$gl9#LZmmA%y2L zQz;W8D)D7E!p$M;a{GH8d#a*x0jJY-Q5OffQIkJw!p|zs4#Y4__nN>T{tW6^7aN~ z`eAv+fy*KtFsAl+ZoHKbF*z-n@YK24z&D4ogiQ&0nU+P6J}kLF4+5>1Hk{duR-vdx z)&Pi(18k_G*I65!oxM`1i%_lkhfSq=b7o}{7ZkkQ=)z`Uo2L~l%w13mRYYIeC<8t7 z#HwIB;m4wCR^=6A3BG0s$UshUt(`v^68rldyQ|4#5Y^e5?o}l*dZ|KCmsX=tMN0)5 zG4hg01?u42es6)A+9Ilp6weE1llCbuTmA(pI~8HjYm+pt==C=#Sy$G0`-6f%q@?xd zP4&rE62omFY7}WUv;^2%t54kqU9i}|TIF6bX6@G1lZ;ge!iJV^-~5KZIteW9g~8C2 zpKP8GWXaZGv9Osq&6N=L|GcYYLm{GMrGUnk8_t7d^TpUFk6gnA6m=hNSX~DuVvI@GEL^F{rsP{{{5U zhj6HR;0WqA@C!1KGGM~`zYjW$aJ3p8otTQ~j;s+44_BDp0s!CR%*&^JDAt zHRtm==kw_EE$7R0xxBnwsWgel2ep6%Fzk;@(l~#JB^lT)*l>9uIW(QH_EV0=SD+2X zK4~FnqxTS=b^)EB8et06O^PT~uEzJR@Z8IAFThDx$c@GE*=$OVG^=j>R(ZP)u)Di! zkZ|JvUi}FTyb=5u`W&8^P%Tw~0B2TQMZ0;CoG2pA&4Aw^;1PuhAyq_FK%?#3K+OCF ziMjmyj3cAx_B!Z0*ybUD=fcfsg%E7RXn`zsybThE1J@a)SAD|P`Z`~2Ib>U6X~arX z_P|E%BaB?9Py_?>@nWw{Fuu84pz!z(TZ3D61{`>Ip)xxMyZh9g++qp^cP?74#KN!fZPW3tX|w zn97BL%a_N?aR#vC_=shtfn=eI+a?oI_d#&O~=63o;N7W+sOAA4b6UMoT z4>A{hbBl2%LXOMR)61JtMI#IoS22$+KLcz3w3d4MbyOHH0M^2$xLd?eg_hE=leIRG zb?Z9`uYX@pqJa@scP6kh)fWqDqW|7;*Rm=(ie|LA1=Bd!B|5$$NZTlw4DsfGw(5D@ zos?6S9YQF&jD3%|yc!2K7P=mV(_9-k*xA`0d*&8Xu)wC{T}Wa%rfX)R(?j(!B zbEKYBrF|$9JI?-LnO|=nPdDVIjtDUwRxMnvSdlvpxn_|4(EI2!%IQbAy+?QT7X<^S z$=x+%|D-C=B->$48rZOx4|;RyA|!YFDlbx2(Pz8BOUAyF67B&F&pkskqsCo_F?68` zqpoSX90X77K&Sz`r{G{vwTrlv5W*quNInK=c|zS0$XW{ly9Tg0&P!$M>LDb8^UhMp zkE;c73C!%@7<&h?Kgyr(w$vc%)mobcey>*Y>aCG`UyBg?6UHfAr<(QojLcw16;EXpjJRf!B#=!1? zF8-#;-ObHFO#b#h#66wH4edm@MVs&5D-<<`h4=uf)4x7F-F%*42pB@sW9ND1#L6Go z@k2%Eu}Wz{M4kg@KQ>{)0XcaTN0n?u#%?adp^Aazi#d5cMwld*{0kEayndOq$u)o2 zlPL5)uFq6z*n|Zp*ip@Md1K?^_?ToPj^%)*c{i^ipTMzCN9eL?v)7)%R2Jxo1+QeDCO^gQ@j zc%6QgP`eIT=v92r#0ut}>VJp%I@^EWSLBPq2J2Y!b|HXy3y5qPPB*JcD%7 zW5QsQ`3CB^^)~3|SopP~b~y$EpZ4I)e|nIS97&Q#q~gr8!>u(SGXNqL%!3l}H;2Pj zcavU?{}Y;ZdtIaT6Z>~?G9jPA>BJ$e0?VXX?*1>6T5fidW_1D0HY=EwhvRbF81)|e zB>Pmjfb znbvnd#c39Ol{;TA@aXm&xx$E_UKM=)4uTpAW)topw=3uco@bb8VP; zy9z_l=ifAG4HQ)|depB#xt*QMLnlU~)HWEGKg-@Tu!VCmYLit&b_q^DYqkwa2OoC& z;%`F@wbt3nuEKXOc?Dct?KV-6vBTQEUI1SIx<%ytO04D1c7?5JI-+b@!aCH(>D`@O zV-Q>U`(RzEAFCJ`)Etu?{GsW|mRCmDEAHpZ4izJ1lgiKfEEYNFoH;TLtc&#zMKZw8X%pooOyXjboyz z(Yw8m6Dy}C*w~zl2+12GOR#pWFp$B$YkeCFCwgZD$=M8!Mp;=|_1ahf;{j>$IVRTr zoj_+7tr;pX+~&kQ01WQ4`9tCTt<;Cgj}wGw_|)%gu48_a{=NIcdGlSA{c&S zgA44mOj4Bc0X%}vDlgBc3fSgH`IErYNa7T0z|Fiu&*Qhr zSb-0=VRU(qllgsdWd;pC<0J)!$iDLcstmqQHT<>dtr5AX5u@hb-z85xyyegS*I zV;~JZJv|*h>qSVOECvpa#|%TcDWyFxExlhk)$~(Owbzt>EU7?66&0~ox%8Zz)RAyM zVt7DARqTmnsbSv8+Ugw9OtBE{vH*&9Ln=xM=&uw<&`7?SN%k`^cTG>wddAmGhG*do z+z{v8jAWHyL_ps$K%|B{kI(w3BewLVEXLYPXKE(uv2JatBnJMPQ>{>4^jwpv>`yij zett0Ks1A^ypHH;Ou%CNA&Rf%NAWuEd6%AK6tKl5FtFGw)vc7MO$Ac#6q zv3oD;T5)O0O@g7^{fO2r>9SD1Y>dI5^-}q>-=F!?U+9Q%Rji=jAe0)x(k?G%a7{mP~>z1H>IRgStaE0D`)=|;{E zm?DqQe0;~zo-KfJTexodrZ>XNoPEHCmoAQ^58nyzW9_0KdH=68$%;B|Dm5p|LS-zd z91GZselIHn6R6`EG%0pPCX{ENLc)%}uf*>2tyZZTL)iYA2mK!N2Wji1%_0p@sT9Qz z1A-aVewtH7D!iI9=*mE8jGg89&$I!IIHV(KH1gD>sZ>&Gs&bX`udp!8$a2g5R={jQ zdih*(L`=C?@;Jxux>UM#JI8Q4u=WSjsE)k17CoYA%T?)OjNOF%Rm+=`#C)_BBlBlE zCPmP(mUh)oYwiGCAN`wvaK&+m4AHAxs(-yJjV8r;O?&_mdx&>WxHA~i(@qMW)jMkn zg9eiUvvf5Yv{ShN6S`(E5T6(c&7=W%BFi|(mw2ladStJ7A}!mpklKR2Z%VCnhJN8k z^d)4E8mD=x2N#I}23rQuo3x}oW6UN4G9dLr)|ae~Zzb~p>9ch`D&U3oCo(upXqIch zJOYTtd3X+N+0{vU28^8^?ID3&9`@K4U!r0e;dG~5+#ukzP=fTFUQgZ1W2E;+#&$1b zmZJnsJn*eh2NUIG)%zGRfN+=17b4|s7blTqO8|bLXilD6#(5bvF#T6c26XP+qlxvQiD4mb@I!7L*$^Lm|V>J7jK$ZmAR!~PBA2o>6_V0-IbX$_jCmiz3Oe_ z3X_(j@mjMQ1u-<8%s8frw7JEsWpld)J)~feQbzHcCXnlRy4Av@3FZJRBbV$FNwR2L zCxD@1gf2rPla(7MUm>}tm9<_*#&w)u#D?t*djngPwZ9scD89UV=pqt#M9Wv_< zn@@K77>G+ipsJd32%EIu$Wc=hx6!bt6(DlUo5J1L{|~`8PZbXrgA$(*(IS4?PwL5z z5!Ta!BZ%ZM#3xgcQ#v%oB58q-i*tSacsre1>fUDDv1IKB%ZpoE6b?Ua;_gXn-=QkQ z3Sl`ld}I&^Cm+Z_9pK?Euui%BjpI1k7uK5>R>EiR=Rpz%OsyOf?>1_Nqz*&^6U$hD z9G*@b%m_6$H#DRP56^Oo9Flgx&!~{i$AiJAs%tklw;xW%J_N?WltnYRLS4w@v|z>q zF`}<)*9`NLVV49i+i-uAiD3Tv=+WZcG|VftnJR_W%{au(fXJ*$$d{?lLF%Twry} z$Lfr$$Yq=7a=sdq7Is$`=lT-l7@k8ziXVA8J&KYt6G#Zry4eP0`I$PsC}inWB^N7r zSCO`db_>6Vq;juYo)ZXEy^G-J_o=C=?V!I4%VwzG4c=k=V~~cZYj4-q)txY5p{1q8 z$1i>Q8w6O{XpEPGkCf$`!EMZ63C|sV`x2UHlHu%VS2n2>xZ=4VPn6FZHpwfI#$dG# zvj$a~eUk8S_bal2FjJEf@vt_%Y~-FPpcjFW+E^;Aw%Ksd(|aSf^wW$m&@+Kjd#;>f zJ{i0A?4bvT2NLZb6&4MR>7KyxWmiNhxi~ti+|&hmd~D4EGN8f*#=&ePt8PrTCXqJ_o(!l(g7j& z-IGMN@&qi3ehiF#br&W6s+fk5==}VBNk$w^W2M>1@5h!EJh{o9gNNN=QkC4=1_qqe z)TQy+DFdg>1dL+)M@(};8U@x_K<6#}t}oEpJTih0LH2Hx)bSJY#Kx||sJ2L5ZAJke~$J+ze>=fE1UGMUDe&c;b?1!$LePMKM)EoB?6Lfil^=2qfC&fw|6|BjMzdH22`i># zabNGzMLE)MSu6DggzRy++WgRmn!p6b%=5e~hb7$P2uq7BP1Oh$i} z%s|%6t8MQbU}h*)vV(UMSJ@LFxgZB9GIiNFl~*sXEDWrT`A;Lz{7O(oYBV6{S>9S3 zbKccJGT|*H1>fB4()GrxS$W?MtS>KC*E-vz;?Jx}t+M^|!_(V43{dxN4W(m!IOA_Z!~0_`n0dYf!N+Yr=g701kJ*nq|=d^e|BrFuhUhuWCPdT&GYzhFKexopa>iN z?D<&Bxi@c0I0B(pEs2J;rjCtsaBa_UfJBQ*)}IY$ckh5G+n>Cm$=D8n?HqAYM`I$} zZ=z*rKN<^@&W~^5)GS3?mVpL&BF0h~#)Sw_iSFAu}e= zB1!nbdyVjm0!znONY-&F=!KDHahXOL+4f5ila^HJuvo~BQ5b<{CGt(l)PbbDxdgWS z#S^sS@(@u$%JQP@(HZ#X8h?-)jsSl!v8TTUNt*?jRM-WuhzS2QYD1?th7JUA5tuwF zo{f@vjJ>m81lQLm{;BQZL*&A_Iwq586Oy_f57710+qGgSRf2HT6Txp?(NuIL{hek> zk^%`FDItIf>+^gs9x@-*N@WYGBn23WpuKi0WczdlOgq4#xQCA7q;(aY6=q`%9I8FPv|78d43A~1V; z_~=1UtzP6w{RyaSY6{pQG#UhH()$C-t-=yNFkO-RrCeVz4xn;#P2n8Elvk zS&c}R@%YAokGb8qB?mmD{EenHFIj{-vKefe*+L+a(y1xZTS0_FJOkhs8wCMp40rxN9w-H6*+`#mAkZ-R|||6Ybwkiiu8aGbpB( zf=aEVG%l^ckPB~`zpEjg$gOsY6gr|)U_dwwH6o3uyAOwY0mu}cK`8mc zb33GVRFiN4OmvY?=Yj}zAz+#h@*Waz^1%6jTa?L5TM0QR#A}#>bt_pk`ZP^!+~(4$~Y9Omzytg;rMC0LR1dNJy5tb6}Sm7YI3PA%K|_)T^tb zt-qD2H`)?M)(}4LOHhZ(QWavauh>m=XnH}m+ZzmjWv{1TwImDaqIT+ckr+A zn7=a?Nx{UZ1N}%zF}1)lj^V&j)4ziqo}ybYE3VzK`uTO$4u~3L*E1?5EEzEYus~FX zZt~3JU?@fR*@ZLZ-6P{!-O;P7tL-BjUu7ofU}K{KF%) zyl#ZQ;b(y+w@Wy^MZYJ6xV&pJuK-n{sk8r#eVHGe(bTMF>T*dg=klasQD5`fL_=eN zzG@~*=sD_fx)^Z4zG`5>&2ihD(wLUD+EkTP4|0__bg_;&p?jWPkfh<>UioWz)R5uV zoU6Kt;}Gw{Gh1-QAICUgbU6-bc8qF35qD7`E3KdD2qmoiLEB~~IPmA$(!Bx&gkXsD ztvd8JR$|PHN!kiwfLim|`^n(7aOE|;R#)lnj)cr$yJ8Ee%oT}7l7jo`-+|v%M(%lB zK%Qe`4EwpPmHs&mQeZF6Hc(=&QohT(s7gjD4yrsl%3q+0B3iza89v=I#vn(Z1xPX4 zXo0J5si%juHW0bn@3`6R;`iwBi)_o^nhv7ubURaHdwX|4plRaXar=|5Zb6o%FMj2S z+S8S}iygXO&_#Bp_ml1HcepP}lkRiO@bRD|^DPHo{`d2z8Cc}l)nf-r{^hYz&Z?x5 znecXa%h<)I%c`iJo1YT+*o(HSSvD7!P$neu-&jO-PkedbgxkIvY6b&njo3J+$6Bfq$AZUl$i~JAIh68hU~cs1Xh`qrR3r zlLi`2H1NLw{lzcr>gsZX?#yQU71Go3p_3wJVgfj5>mGsQzzlvabKJM;MCAW;;8xSQHM5S^gRDA!HbfX zy|HnF+`79E5xxp6{{s|j+OTDEK8!d;Z4hOMY1)#~XBmKm)@bwFolAA7D%GOw^qWyTjxpXNkq?}-h3?>SoNPKH;)szF+xM8tsDuAOekN8Vq=!7 zWHF>ZBRH~Jg=wv{?*U(&gZPtt%&tp^LK;()bR_r4+>}C;OEoVQ#%_z85gguhdSs(< z2tSE~sty_kw;=?XvYt1%1)*3*Z_Tc)!DHCN{i}RVF(Wf27!Lbr&lSE_FW*YQsS)e& zA7UACW%IJLj&BtWDFk49rc%+<=8yZdgqfBNhBOY7WUSvmIEv#OOqen}SY2(Y9`wy+ zC9TU6;2eXMaFjY16N&2c#K;YQyG=}M^IbyR^?iL4_p8l^R)`#b&r}DoBf(|Y9 z-Oy`&n6gwi`t(8EBTi@Z+LWC3#D9nyfFTvsVD8z<&9DviGUl-6zo!Xqoe&NW95vAd z5tveQ%dS(lAL^I{c?4qt7`@MkqY*vpbbbV1ePYg(F;GoYlUrwykU_1@mr@kZSrbiN zD{~%(FBkGodAANQ3G0#;7|WZYv|`PnZyS=##F|*=e5a&5_xeQL4vzgCXf-0=HZkbH zf6!}?oiPRqkBrSMr{-b?d!G@L!#xGI6zK8}eg6PwyZ~OVm`@5VSnjF9#-^g9U@SoKy?fG2z7X>EPe{j{4g?)0b6CLJFaxqB zUA5J&MWidXo}n@N5}*Kf4JmiIWTdHy8PR^dM(alxO~Z+c@cJ zj9J*w9#`zGgSn@y6@wO12It22{#zJ|XR(}UO1sosE`E24H59J1TSM;{%c(v}@FR@V z>KC*Y4`k&JK~*d(2<=O^r=7$Wn4yt+OPeQ7j##XQd4;zYDZ1>j=`p3LwH{T0U-L_1 zvq5ic0fl7`iCC#bIG!~;L9=6Jt*uQ-m)>KpA<>i#^;?;O6{YvJu@Oo3qMIKFVZRPw zhm^6m(Dkv?Hd^sR1JlEbNBL^lpa(A4Q_rpnz?4P|4S-YJo*F?Mmxl1)Q4b#jT|Yf- zH5%BPdmpWyvLBxGfILFK61Q|r%^hOv;BVvDZA;$!s-5|i^ZFZpI}7lXe%gLhDKT;J z>!*^FOxB0=nAfEz>2Z}I3AK1%&ke|SkzU8h^J|5QMd=o)7-=EOXoNf4D~syitrpU6 znG?D$)vb#VPIt`b1k|}p4a3g$HS+RGW?urQ?;)pFB6Wq#mr$ds5u(qdb~K%8HOPc-Ho4TaW;-j`aWL@; z%xdfGj6|#Ftm04X3dG1#O23pWKM~~BP69_zax`tG@$aon%9nEk{lYP?Rq8d%X2%MR zl4I-s*-lf!S* zT4jR7Z&JfUW4+u_LJUL`7c;@Fqqljs?Dpgxe%LmP9E=16ay8Z|LiX963Pp?fGG?sN ze^y819g^VyM=2s(;u^a4^qX(PH`niggBU zSPlr^S@3Dq(AB8@)906ekBH=yW60Tjisx+w^MzuA5V^w*wWtTeguE8*CXuE{ai(#h-zKh-LEv#gG-8m~jNCASUm_h8|k$ zG`3#Yf4b2MQv8_LaE+u*9I$A<>={<&vF&HMDrch*6rgL&uE8Xm(9=PdIICWlxl623~IbQs}}nnVHf3N54XWP91Ua){m8|ylO^% z#`Ob;D1jfdkAFDCjMU_P7iQ39PFE{EXVaAVvlm0eenU@Rd!y)Qa-yo@#-2Cgk7o%5 zv^-a)t7YQ+#tQ3t9fjsL52kwS=MF(=>0QjPy^nx^fQG)bq@;x=;-;>FR3(@R`-g@* z;jmcZLEeq&zyNh(yBWz<%(n@x&DF>1O&DHw*)fT*f&)`$gI3D8eMP;D zV_)ea$cpih!@P$CqXuzBBNY!#PfeESF0be25kd!fxyfgPwY25?^n!`r5*Zxca>$N9 z2HbzYjShA!6Y8rBhfDq3AMH`n$4eZLxp_8I20vx}nk$ihuYsH<4KQcUMIOpD(O@9s zTN@8Af#ex*AEDZrDo}@b5Q&$^iyElF)tIet;~JWl#);0Xm8H6R1HaUA{mxfOA;9u` zpv>+MOc{cycp-L*#E*U=aNTfkgkaT-jNU~E%}7-RxWx2$h2jLjLAKks~z?l>ZbwzB%$B_LpVzJ0@bxU#Lq&^*Sw{O-uTxbz zYAn?uqB9B9!@m{1Twdd5*KNi-g&)j~jwuzabcs6YGA$u7hx^KGP+t{qF!$aUt?O&F zbrne>>Y^cYS`Jt$@aFyw$dtAO`Z}^$ge=@dfeO0W55INaz*(*@(5-K9=uq=o7Y^yv zZX(Q&MZpiX{|41F)SYc#Dq80VAXB_gR&84WmkZIxD>Ew--hEMtvZso;_?Dr~_EytT zEyt~gl6A;$&u9*Q}OfCH+Rf(>LgB6Ijb}N+=28;5MJLV6Mjh@6;@bGsE9;TM)Hka_U_PSX_1H zaSzbq7|W2b%`63f(g^}7KBaKZ4UJV-SGW3#nAzIeS|`uwB{b8)?go3o4#AFFy6XEC z##AC2i!`aBeewePfS?5qR**-DW=b>z2qnG)n2h3Aa%cLouUr3siT|E8h1lkZ@ zV(y?qQ*J~YvfcbuL+j?tNfvDCiBL_O5M^WhyiRiPPYtq+wo^U_I{cW8hb)2M|T0d{t_F2@q|)Q5{Fw=K4D75p+Wi@ zSm*|Py3FNJGLs=$Hc*#yPQGJ5k@Xf|&{!dR09n&F{14W?`m3!b>Y7rd6f5r1BEg}> z-QC@xxVr?WxJ!#$vEo+TNh$75aCb`~c#t>G`~3yqTJJBpD{JmuGnqSc&Sal+_BM<0 ztr~QBk^`+6ECv65EB2M4U{kV;>qIX+iUL4R-~N zF8hs3EhF2Pe#RPfjDs7NzA4w-?>ZHE%udS@D~mGb;j~9li;f{$dWK~QPquR=o4XyT~Y1yQ^pv*@y(r{oB=Kf`}-lk+gYyREs zt%$ttn}zKDB4NZy%7rsQE=Kf+3-l+B1-YgZ5IP*Ht7ZzFD;_uJO-u09%u6ajd`b)IM=lMrH(*$0}exF_7>ItWOwe~}zKFjCd*)mjbzCkEf5hJfqRJHze z5#<|HWwD-1KZNn+%t-x=YTt&R^7g#sO2G5<*clG14A9M!Tvt=k{BmTyv&0%5#6O0% zkkvQYm-fw*T!y9{6(~R2SH67{yZzBpN4pMSs;S3i>NmX|4H?K8-lCq8BV=jS8hAuPil8i5xA*&{s$_0%CQg-V<)%=cpJX#6 z;PwWAX8%SOfu)Jydk#UCSx-;l+`kblzXPQA3w|!pP@^iNb6R)o;R{=I?9!8GWK{Fr zNxd;HrMq@x@i%W~_RCv1jd0E(5Qt&u_=YDh7_nF=G66-6fcF0W0SON~u6#5mT29F_ zE%A?0C?VnYb{YyE?!J+}yi9V2?%AcC4dp>3{C`&_(VwpuC`qHdX^mFsaM_Q~b%=Vn z>~Hc$#S++&th-ml;Hmy7|BD0se|_-k;`)`8^B;jhw{?OaM7?!382z>fJ;|!t8Z0id z%{o;Fs|lPi@gsdZ9-;;Z1_lNrQ=6QjBNbtp87RP($<61yPCLB$Tje2Y0+t&s!t_NY zO5?n?Tgf8+%p-HoQA2v(%O{obu|xVpyq#OPR2^McjAAB>$UwQ~6*jn4m2Jt0PW?Qo zbq@tehR755HZLD@Zo@q={yEB-AT?wxBT2uQkAG!d=!H>F^s_xdQD4FYJmo79UfTaG z>NPChIO2>2PmrKr(qG04o4d>@v-N>>OK%5#beqT#9Y(O}miV)OK_1I8?o9J5F1Ltp zvwSUGKF&^%cwBKiZ47X~YSA=}9l&II_IMt;T+ampf+opITTDeN2MTkM098A>CA80h z$&MK5kuMYNCzV;zIa#Vlw6F=^Maa-K!g`XS1A<}Lb-8QKxc8X05&Z0)ne#(6H)B=B zIB6JQ8O166o$8^nqNG{XS4MCu<2(D5B}&&F_j8nDbHXWJ6TU7PA$QrW*B*=1Jj_BH zC%j?&^z~5^`Dkhv zjp6$hqRaic@7fzniMi5#hl`6xm&gWbWfQbdE{l|`bW*zQ0-J*$2UL2+!381qGsm{ z%a*xhpz*}tSvVM%LuGb2{1YCaV-=|Rw(O_o#4twN-NgFzPA|=6#Fu87u1(^rq0Wf7 zF9{KL`0tBHIaC{8cJrD<3O@u1y>;=gtZVM6D5BP2m(Q6P)fjWAmTv3$TWLxIM8 zW2dxCVAQD!B|i%+zS27rQ1S2xR91H{hjtq#n(4nC($$pcyY$hF%*bo@5K~asccQs& ztPlN8a^iaTQ_*u^Z!$t_;g@b5;pQupV&%`uS7n*QBJCU(k_9u~r#rPPeWw^i)t zKgbs6=T{l9fu(*+GEgQ#f!y!>qTaAis8t*vsfx36Vp zmq&AL^$19wZV!B{Sn$VtOEHm9Gf>gPrn2cnuhsllEyQFItm^1+eI&lfyjv}FG1P(+ zw`aU(8B20tWwF0Sl4oM1J+~HJWGY<6z`r)}m}qP%z1ebN9+#y)l0VW3jp~fgdKR~C zN-ERUlMqMltZ%RA>G;IEG6gRp$ZHU|Rq~m=R?QvS$2&bA5vO{+8@i*>nE9bin7L?= z{`YL-VQprJx!mX3{j|a-HGS*iYrd#Qp|~Gt=5_bqQ(=Xy*B5qtzu@!JK2p(BBOj?i ziQj_a*s$T&D|PHUF*~tt@SuaO#Qi5<5Zjf+gmz^c$mO0;b6? z(=jddg91egd06lTx~%f}sd0_(5gKZ?8-6DlSE4ma5|Xnv4+uZifu8z!ggR3EOJEZ1 zbKftX&vi|diJa(}7RTOpp9@JSWYm&aQJ)RFwFVJSo(Og$9^g4Bbtd&ZUeEc@EEJ>a zIv4IXkc-|6Y?qLT}My~9Z8RN*}QTR;4-cLc!ohFBfDhf6iiM}p za9G!U{pDq%FL$z?`34&ivz2pnUvOyn$ISX1fP*Q*UmsYtM$6D|8#v#>}B7s_lXZ4;5IQe&^KgFf=%);H3pl=Qv~+} zNHp+AU&Wk00@AZ-@-{p7N85v*z9kASr&`|ikdc)}T7IqQC_Z!iYo5)+J{S{cTXtmD z`$AdG|7C;*8Ux%!H>-)MQxw`ZytWCt^8UIpd*a(toO0H>w^|Ueqww0l5b&4J@cvIP zfX8J|ANFCZRcBZ#U}O8@c5(2;(*+oGe-6YG9N&^K@8;G*fX0m9Rt-k5AL99?GzdO4 z0=xCb)=oLmV#8!aQK$agrz^Y9mE(`kR&V&RSN<$(X9G;@?w_5daBzgzGs!J>3eoChsBnd1;Ofzjvw0JHWxqRclwswVo#?iX-22XV1im zVfT5GqfAqkdsOU_cq%46tT>mYUfnQ5>UjuqCkl`?k17XDF3>TgK1T}-Tc|r?E|hiX z2i{(ELIQ)vZq3BZbxfoc5C1%cGy$eo=sq^OP-a1-yZ#02Tt4HigrTW~o}*HF8J0ct zBaY3y#BIKAPq~1eZwgy0|UQD+H?@$g1X0UY&+~< z8em?!_Ml>GxjWp<)E;UwU|Ows-E(*8PZjXAoN;?0j$;=en_ZjL9x;-3;CXt7E11uo z&ta#eIFRV_(5N$@O3cuyL+Q0S#MqcI&Y&hD-WoJlYAaRQu95ZaPe2hXoRR}6Z8u;C zFoB(}de$58i3RxeMEw~L8ezizG2h3ab_&om#@+kI#H3!?5KI>vCArL2h>ce{OlY2| zT0lEX@A1txJNQ%5DBxFEiO2Tm*3fClPx?WMV=%}HGE#kL8N~4@?nwY z*DtG^j@e(OyoWDg!{aZ=V*!6VY%kRx!rglQyjUH;`vrn7ldKX8Z7qXX`j17$L_QlI zJf*p)DMRqcU`nCIy+%_>jvA3@u{+v@R&$ePjRkezupyneK0vG&V~5Qhc*2lzL1MZ$lw49k3wB$2&gnT6im49KDFFx8+#<><2f7$)`32~T(>&<9H$xm zWmvXXdf3SW1*O_&sXAg4AR%uiRe@F-JxYTAIuc^a1V8egcBKmsEEMotrJQ?=@wc`4 z#`&q_!sQPmsaW!<6%Tn@yn9E^mRUn2(8p!MROr@nPZ?t0W0+f`1i*l=e;NRbfa}n- zj(C5nHF@%lG%`&3nt*)&B8}p||Kg?q-(0JyH_l(W5&XcVVzr;i5>SeFd>ks%vIq&( zH8OAxa!IqKngzdSCYBvb!+Aa5{HhVu$mQBy8bwv%S>nF27l@H+<*^E6>w^?Z(8mg~}Wf0(oTRF8%Y z$FUVG3Sd8Q>{Dhl2H0B1^4Fiiu6FD)AA?zYhr3fe`N^cnGYacv9o0@I#EdXe+TNop7v^^zY6y);pQn(%$pHKqn;|m>Ct=3#w8yfrp9*?^^i{S{MAe}4`&29s zAi9{k)@i{Whv499#AT4p)`&c?{WiCa0L+lYTNk9{pDFQZAM}_08vM+3ln61k2hLXW z0>U>yyCzNVm@8z$3>q4P5iLFnxi?dhxd|B(o_T|3m|LPb8#>sv>?W*J)Lqoj+N+B5 zq-QAaY69PP+OUOVP69Yo`z)@|7A`)75mHG~HOeKa@arFsPhP23lx-{^x z-xr>*8v-xZn%!c@Z8K>WXEf_te|>h($^(zz&%FnCR&q)RpI2Y3b$A_K2$KPbky(&6D$XbuXZpLPF zaQI)P-~4h@w~1D!;|}ZvqWY9yWjaf4-0BGDxj9hMeo++gqej- z)GOvDP|i&h;}tE>k4BpN!nW<^(o9sAy;g0HmC^gFnlF1)?zS>OhxlVhnf%|KxVJl>#6OMvX7%p*md2*L=RnVR04x_3kpua!&YW@&5!Z+&aHts-V#F;}0 zP1*kZ07qYYzjE;9!!r+v$1QsQ-*-w>`1&KpK!NhPiiE(MGlxQ;Xc+K2g|Oh33f^+y zwiU2bVxe|PbW$w&*H(D7!=c8w%REzAOh})CjBwz{bZ=Mu2F_cFJqa)o@S_7p=6%31 zo^P${vbfP-%+LLI90jmq{R4%y8PXIeMRm{l@=5xD4zLtZ+P3%eba2|gT+THA#v6N z74AKq#FM*7CXZR%U5S)Ye;|^;*L1fsLB+-&=H_s8+QQs?&i>Hy

8{h{!s@vkt(% zbs-r1FcI8!2@QrNnFd;>%nFPMavyzNJZ^t$C4MJ*4}mkROa)!7qbkqOa!=(0faje*g;TqpMRpk zuOq;Z1Yv7qC`v5fojnf+mjdoHOka0wUS9^`H1ON47YlRrdiP~&PItOP%TLc!pn%=Y zjr#$}#=|Iov752vqDu>(2wN~L_yzQOh0+V}4{F+VIoRrp&P;GY6>xnDmpBRr+`XRJ zyk3>@ijIENaX(dg>|+;2cgPl?2ThFFJKTr8`fYyiF4o_rUFwD%1ovD*L|^xVg9&oi zyREX$k0Lm|Dk$@N?p9y#?_Ob$*P9mO4^=(g>|^_z!FM_L;&T<>b=P0u;Ug$7WeI&J!vfg8U5KR4@ZEbW{|Lt;h^OU$!*u=mA}D(yjx$; zHr6(NhUpwt{vZz_5;^)Z3FOjhy{+zevN;_+(v^Aa9N@HbSd{woeU7_G6tK~!zxYfQ z_^KKg(Snz>N%ihth^J=ps|S5L_&SGnJwg;VlP^kJN5bk%<%*56=I(ZU9{g|^?8~$! zlM-?w^?==THzeva%~ve4o&ePoi3i=v249O-4JE1S9>i1$P#VLAUOh_OP>gFwi$&}3 zzV~fcmWjf)RbOk8>#c!#KF^Q&`ayYyFhI|8Tzf^n9Ek`U;NfmaTV1pcTcBixBrzqG2TozN;eh%JY{a zMzg<-#5Lm)RWTcbI%CR2}q= z{UsUKTl|eZ9;cns>n8~nD)f>Zd?5d=#{_N~4WFbIL6fH|)t={+B+3K0+bCIS#EdAC z?JRoAe+6wmH=3?bjQM6kzlf`tY|rI@9;+ZvN02(*!ifmi2H{IE9nGkRpsrta)h|@h zmy6BR$uI?WzQl8!{O4WKz|_7R)$3zflR316^0QsgE6i{yq!qI5&7mC(H3dEQQ3ZPf zK-9b>I3LoU{^o%0i#K7K4jzTWq_#rce9% zPYa-puKfI0rv6+ac2mozXUMZC=(R0yEK|>12Q=s#1f2@LwEXw<7cy!0l<@j+IZ?V1 zHjkF9?{d=rqPAQEd0m&yZH!afqaXkWJ?et(`vnU6BJ*zHv#`$G-(B#UI{-Y<|6{Fzm)rzP5#0|CuvESks=pRm(2aOjKmi*pT_uFFV9;={q?hdbu5;S|PG57%rdfcYkwEg+HNFPxA zvU3P0cp6&T=FYnfh^BTkP^3F#*Hp;DQNNn9Nf(KB z5+dxqlBWWso+(Tv&G(5@`SvHUBW8yx7?Phu>hVH8Ur@n(Fvn~HM(eL1@$oyKdObJ< zj^Lr>6P<6pF90^IrqFz@)ixiH6@APJp0sgn7ZwpciS6hlw~kuPAMWBs6BtK{TRyl9 z)r%^|Y1LUbzK24dmIJ@PAo)zkjn%@}{L7W^?!R97PiD56CP`z~?moqJ4XbU8!w-9~ z;5%q~ge$&f+7Ow7=SM$l`PP?hm)8gRxh4{P1kvFxY;X*g=cR9w>dMP8HVE2%8m`_x zLV*$Tiu{)HyrJM>G3f-sPJM|#@>iw3H?rO9J#yRnN zg#s6~Pxbl{pjAs(r?7a9dtpLK2PEZmLm%D?nXkFt5}Z7h>Mu1Q{>2SW)76?^T;S!} z(eL}SQ6#wiME`DSAJ2*R^_)HUJ`56YD7g9ZlK-^Ne!+9gN{YKWMT?ftw}^bh`?_Bj zeBTWTf*Ec;z9a=*W9wdky(XDbIyVsVj+h@NTVG0oE}R0*w=-ReUR-+a;7FH&sDI`L z5YOwBj`j7i#)TkucBo#J%g`88HTZH)^qDI7J`WObhZ+obDlgxb*hN(s&4(-VtQI$( zhD4v=xIRy|2LH1Web@vA%?MC)7g@iuN_oqWQkp)%r}(v7^u7=BH1m3Y{MxQQnzJA? z8yVF7*o^g*68yT1-2+42e4GS=?)pGaFjJGdgGt*b8%=>O1AW;MK=9?c=>6^8>plC= z-vl9hEdevdXgV*lqAz`L;|O`V4z}^4l2E?Z-ya7ylpR!wiQKGsU$y~9 z8AzKi7k9x=*r3VYcm^>tKuxX~buxPzx)&niLlGLqC?C8r3^cxXyp5{-VHk{84qqZs zwzTEO2MvBQL}2{Nx92m3<`!<>^n6bbMW1IjgER!4`5YF-sgvu7)Bx0`xb?&J=IJWs z!~Wif-rkE7IY3Gw=H5nG?;D#uw-4|3PT$R=y+c9_F+%!3zs9iR#S}CJG6aO`oIi5p zhdSBWR@c?kz+(>EO66yT{a6LjeiHprz3N7V`BbFWK5gL zSQ}v7<8V#_&bnqs4x+e@twhov9R1|4*JlU~r-;4zD9}=ilAvrHDD0)Nj~&*AbUj-! zd7HkH-I0Bgjl$C7F%aIrkoS-luv|!!MT%4psf~5zzh7>w$w}xw@85{=^29#=W1K`0;T3OT_!&`UFEo~X?gmL0z)czKJ4N#r# z*PCBeGpx+B(0Hf3wg5Fmm7;q>k%2U<#5ilVe37eR`EXH^tC6XTgu&)wewr4jGSuGx zr%7E;ad6)4eMwt`ev`MQ0A7aA7nN;S;_vA7)%tWDVIkI5Qo}_P#~R?=hL7}6zrj1l ziauKE>V(8ESIM(`V%QWX6Z$3;wW`sF&U9BFOZ3Y$`+jp;iaaM5fXNWqcFfLX+Ud>0u&r2(*Hj5Ar_1P<4M>N>9AAR%Ry6NfC z1nl^YAmz_19h)ZG#jE5WF72=Hz$@~atUb{W!?G@%#ShOMyg!I9`Yt7^9|wIvbI7oM z@G0f;dcn^L-=sOC(D;QlS3jXC*hvpqsOZzg8qjVMPg_H-T{8IaopiEXjvh+TL{zH&y- zgm`3ujpZE|R-GIK7@M2vP1Lz^qEPwy?|yMB8UVf>11NklR2-A81i}MX3#?pYD_Wm; zti`OvYu2_|G9=5edaUP?Y#4|)raO4TsozXo@m1CP3JD{8Gy6Go@XkiNqR(TA=twKQ zT=jP4)*AMt(4~iRQE7sU-Y#V4H};1|?-^mPyHHq#qAWU(*t^|JTNp+OY*1yAo@U6g z;o`y~NoFvBw#MVxNkWa+X6k#*NI2%zTa6c%#WqE77x4gzMloW2v00QN37{=;>{))& zBCl&Dwk4eY60W2Mxwr}_no*q5j{>0c>)N_Fb9Gf^ym0OrP=Ur)lz50p^FZay)rJ@D z*KT%=1#q}(qy0&=WbW>1N9VObuAa#+4Q~I2!?VZxd_R{pw?#0Yo#f;aqbkK?MlX48 zcg>#5!?lF5O6KNw+$GrS{9Q4+zq-43nGRdtPMn`^e2#Z8HTPJ}K4sjgec6sd3| zF%e1NZV5h<=2gYgZ;?SgqBS6T=U{H`?q@H?B_cKDgbQ(4`@?lgFoq{AX;D5jbBXgN zjE7k^iW|dyzos{QT9RpO5jUrBIpJ@0o6 z{8nWi#!o+%yJI{H7_&}JEw6?au^eOGAm^-cNexWU)d~;Pt&*Oa&H8rl#yn+Z=Vp-~ zk(ABvP1EnEBj9@2@(@KnMh=DSF5O3GN}i@0ghGhhLg4P8?uX(KU}LgZ378?qhiX3u z`Qx8_1bj@!@>vxsk>uhpk*5gya0%33LT82OTBjFM!k=-$%9jOfd=YU|&;Ss-#H$*K zxd)i{pU|@t4y67_kVr$G0po2dtO~#l_>lW)wh3mn30;=)Z831U>+e6av}QuzfLzb z*uZE>LvvuTY}wqow`V6>{uCfh0SE+2e)RmTmmniqs0L?9DN=9q`fuYr5xU2yWGc~r zm*Wx;cps#yto*zO5Pe{O-3LAW$1V3d7yPLDdINd^Cy6}TIyf-n##~=tBe1@~{c(Lm z87@pXLS0)KxZ&4gH+8wFq#6uvT8SfH$;6lh(=B6CSz-Y|o%g4M3Q^YiK>@Ie^a( zfc_iRw(I>$v%~8%==JXPcJpQRH4WjYpX#ZX3LhUILAMT^lau4nSOPH)#Bp1FndB(U zWjr4DpVXvz*`q8@95DG3wnXDW;|(S6EH6^MxxKqtYj4tp?Ktcb8BVvho7j8It@lDm z{+4BaRIMbt_yWpL0G67As=f{98GQy|i9BsUFz#lB5W410{Rei}iMlyeDqcmWB6vCD zxwSc>?!+ke@(Ny_qv9yy1+Gq4JMu66QrWtWSIIXowgZ0K$P%Goi>(U}p}38CT?Jf? z8$NY;@2s1d96;k+`O61gF-U>e)L!>&8wWSnYn@lytX&tkEphDsUP<0R!PYKY(-b`= z*fLV&X!Ee<&%T$Gl;l63*%Sz0QoZiNPeZTUq6odi!@~$fwCsK6^+Q8LXsQ`FyrVXL z@504daV1(Zu@ySGH>A2pUI_EVLV2E%C^XfLjf{-7AG*3Ir%3o)mL_&tNwmXa5`Jif zrbk716=8CR-luYgIdP|Y$7@cetWcO4sUj1{vdWtOppVu?!W}k#}m})mu1JfpHwk3kH*S9$A)n_ z;J))a6c{rVnGE<>U0&Yfe?I(GR3FzPXOvP~M>``!mq=&pF>$;eO2>>l?X0rJO!ZB% zl8L$g?PyA-^LK+e19goEJ4bq;%31!A)mtN_K$>Xv=SI@CA}w_Mg`lPxN#>ebhw|F0 zDR##!-k}fs`0W*2i_cN2`DvU;9-TT;AkZJc!a}h;Ba<_s^BBePs;IO?&+}&u%y%vI zh4)xSQynz8Or zi>X zQ*`ZmVI{-mVjNg#pE|X#sv1>%fC6MC=iPBV0tiy+S9?N;v;yb# zvLb`M3wwv50n8QElXfMHEY4hn=8krX%Dz?}!avze)H7St4bdAt#5F1_SL`OHuI!2x zy0K@*(F_$S2^O@#^Q~$&7&DFGxwa*F{eNND7eYQJ5q%gJ)FQjRYW`00UUnotVydHL znZ|Q$o4&hSo8~|4?PJlInHB0&Hxg+21G}XBA4A#W25~@MS?Z<+>Y0Y>+DR_umCm(( zqb3Lgq5>;^C7Dt~+)X?>!rf`Q0~dP!fuihaH{P7O9lH{a4ibLPc{|?XhE{gc3v)_p zKCB^gHLE!NR_ZrDOhr0?P<3Z7%pfg1*G!DSrqYh93~lX&0qKP_q{Zr8S}(Wv;P?5l ztik%KCA_KWsr$k{A$j!!G;;U-T+H@WwQNj?Bsyy9x+=%~0*RqVl}P+kIps@()<(uJ zyJg7D@o4+2Jb0R_$+q`J+1`Xb4P8xLC;D%!`=c+uxKP&C4bEq1@$h_IHdeIXv-L<+ zdnm7bkDpqZyXLp@#b+CvP6?$arZI%N-eOe?y34E`5crN5Sy`2}*}~T(uuV9T(N|3i zovFs_+RaJm{cQV}KQ2S_VDJLLA{UO7=Ty$X%EIom zG0s)6Kh`SaTvN`VE&M=puif!+bMd$ zJSr-RpPzpV<33Nw_w$O?o2usQMsg@jh%L$kBWGsX;WJF^Ay666&-7K>8f_uZ&_K2l zhiX~@(1z(12y?Rn+ELojw9(ifjNh2K1*TZ6R-xvY;|B5Qmjp%Fg=~y(O*j_d61tKc zv<;+5aIGzD%-Y;35NjGn6>`XBF0_qRKHfjpz<{`GogRYue0HA1t!3>>EI?$6teD5X ztJ+A}JC6~M_j$s^i87OPy!de{EjHUIHO|TSLx{%n!XhyjHwo4TwB)%iQ-3gg^K67Y zhN5QKWVB)T?L3)wKUc<2GT}^mj%DX+YImn(%Xhe+I|A>#z1f1kzD_6kXhV&av0W^! zHhThjVLERdXb?8ayDv1p00VG{pQ23!LjwcOt^cm(3BpSXC+&C6kEYfS`!CL1di){I zx99%)U{SUrIZLemW?mNix;>W?HgV7A8@lRC$)q5~VY7N9hodS)PeIbGPu5LX9nW^! z9%1hFVaWg^MT$?Q+b0SKdyyjF_;?R97qG>Q8eP`A?|%Q*q?GZ5riLC))mOeW=3Vc;!cO#F!X9 zBMlWZH*gTS`fd8cKSH4LNRh)#EwH(Ji#-exC&zy3Q#@Z68nnjX;4{P0%z3|bS#^DW z3mW(?31_uKP0X3_ya-_N{YdC@qt~z4vAfyqqhAES{9!v?6}u8w!XQKEbhbwl1RiiurXqt0%8K zJmuk$$>eBx>NmZ2`m%6zDzY zWSHA?G$(SgeY<<8eIV(_1MHO6)>fOyIBh9;&uvYStTW-lDQ!97$4iDSGeSJ1ohJ>` zaWjafqZ@*J;?-4%BFL-V8EpvfN=nO$z6raapQImKrn`Ox=>O>sx?|WD2;z#hwOJX< z?je&)Qg`A2iST#b7 zKlj2~{nS5%I~GO#X?vLOIOwy--~o?3YI)r;5(i09wm)*eTQ_nbi_Sg<0hC`#1k|gu-w>tpB)h87NrA(^0S^hDFM#rYdD}TO{}y(m%UYw zpADXN((&Fjdn&B&t|f*mOC)QroCl0HjYizJO5dNHFm0Ej=3=(rMMQvehH_u7FMy4H z?KLmXpB*@T+x`Zn%93;P^A6p!-k&&=L^}-E|Cs=3(`uniJ~0xtHF=M_8a(cz_n+z1 z6CTBRw?ye?fa%HKV#6^&vqQqPecn6%?mw{b|AcD#{vI3$p;pGZ7c?;b^^OWpGo@XL>z_5bx7cUNpOMQEJ9p%3 z8Dkw~GOzKOM!;FG{7s-aD9ny$bCe%>0TY9U!R2#l%f2M)Jq5QdN`Zh=5=L4C%|fouQa+BOlP_ZjLAYDy+x zpsmM>;?dp5>r^-s)k@gFbv5kb2kvC-V4{I(lB3u#^#_~H*}m#5TAc-*Ex?SQ_c$bX z(B{C^5`fb$Ff-dvo~up&>0GN~sW~gD9rqex_{;~Ef-*WT!qD>O=8EM(8ofCzUWQjd zwz87VCzeW=Zl#3L9I(jh93&ovIKPxlMYPk;B)QUu?wgm=rnDwC9M&Q-^)BnKtU|iA zf;pyG`(^CRZzb^r$;~m^z`=w0F*OD{L$@DzD)rO1+S!In}3 z5ythNh$k4bkb01x7ZQE@-9%`5G~u78mpUq(^)$SV?EJCSI0~L%1avWVyRMY>Ow?O) zQip^xBPbLD$kBi5VG!o5<}f`MC>(vc09>FsGlBJIvNfh{<`~7D&qnUB;^}J^PZae! zzKs=WJ3=a&b*>NG^7p^8ll+@(8FY7dUcJ;4I`~2ty1qOUc4+77Bc@|$Rcw4Ou@bKQ z^ST@e=(Nn$c#|Vei|KT_*SS^dUIR@y$rf*>?H9I)*C&WMTb^s*QJ;5VadkxW{oUBe zp5YL0ows<9L^DK~hA5;m&7^%yLCIAduqerugUc(NNUNwdea=CG%~~!v>oxYFtv)a0>U~+G{TVA^)a^F;2%p5Gztbq*cC={cY=N z3iC}2(-r?tFJ75R2>o0p$F4}6OnXu!bxOs}q!d5jP>ghq0Cz%)_6P$Y`r+EYny_)kYjIM^)m)fkx%=fE?(K>b zeK)Hav-tCP!ee}wP8#y#oA(zl7e7bC(_h=bMY@pU_O}X8g#*un=%jFXl*QWNlf!O( z^i-*E(*vG0hmYfYIj#s0Kf7-pMufd2{!tJudE_jyFu%>%Vkf~I!)g!=npxb$EKm`{&Bd(Gf01+dzR&I>fm}Uy zPUK{{y>Oxo>y92W{sZ}o<$V)_gW}Qw-{25NX-Ehh{Y*|t(S(z^(x;S_mgY_ZgY2>X z7ZgEc1INHOaa)^QiH5F@&Y8C$pVCikBt$WOYiny;u9XAp6Gfu`aQ&xrIOOo{Kq5F; zG*3m90)$xyjvLx7D=Sl_+mi@oTVI?lfD1WG;lzgT!j5#KP4TJbSBYaHv2|d&*njK! z%yq_V&dK#O^N)jRz6n>ES|G9&n|qn}B?~-#`pkS#Mo6fg!J+|AwocNgqd5Qm6Gjiq z3lNSq6vAzSsHj3#5Vv`IE<*!E*k;hC)oktU5fzdJg2*m?*6f?p)6)3Ki2`svVjY5W z`~F@YYEl(`oJ4k?IiJ0~k%SUyuH<^q3T4r)@$vE=Q{0Dbs0Yvo&7;3x@pJJd18S8j z^9R!KZBP{bAS1zpbOw#O{D@WrSak(_Y;#ItCU&m&to zG1BwH?R=$dD$cF=(1x=n?)2)XNvGTMVA@%i%nAlaZ6U80Vjj1rdpTvlP>(weGxO=e zM0_?|4tF#;yT(d6`8H{CzD3-RP1oXhc2%WKLs}lU!(S_NXvX5LzCZJHk&Gm5S%)|x z>Po#?E|8MT%`D0vHp;-9jSUdXozk_S`MV7@hY4sExYl?qNMAaWBZNU3=o|4MBOO;&12s{MrJUqOXvmVAKCJ@u4tP-GxXrb zfolJ&%)y3rA6S}TAgRuz)9*$FClO?g!Jp2@ZtCi@bY{qF-!VZb>dq(W zjh=mfNT?}3Gd^qRF4FBS4E4L6D@zDF%2i1AJ#T#%X56;Zu;!5eBGCCew$m0#W-Pd? zZ(?LO(QS-M7?g53!Vb-O1pk-|n&TrbXWWe~PvEA*t_!#t*`3XH_H;L3!PSaUpxl_~ z$@1Dgk&UR?McW3J0}jfE2cD5KoMKZ3poNmyq*ueeDSkP=S@j*;!^r7WPl9-Xp#^~gvnG>I>a;-cL$H|akenA9uG2t{*gp5I^VcQQ; z`FH#zm4|&ZJO|~=7x9@1$NglJg9aJxjy6^95wivD~_fzkaG>C3l7 zBRM9ozv7EEK#LY1u4D#3^KukF-wz=taf-a$tqt}p?7bDPxA!|0L8feUwl?vV`T(#o zJ4&}kO7&L`?WI@y+fZlfbmrDma*{nA6Z)x_ul4B?T}>q@4K-AHEbUYc3=Sv>8DSqE z9o=OScy>EA(v{peX9l~hwOvt{WwVN#&m>pUuxB*e^P!No^U7D-RUT)d-j3V2W0+qF zrp+ADLYKo};5yT8cTj9IgQWJF*}^;0X$?xeDg~_%c8XA}tr5QPE)J$|`V?idbRNW+N2k<;4$wZ5zbjGesq|>H+-yS;r?&V?* zmZdA&qdQ@^F73}#EkM$}vs=a6=xnvlV(xU0=kc`%18yHdo1*;uaHNCMmz(TBS&Z`& zJG+a&KP=Q?)+a}W7$s*F)k@&uq9A&T%CGrJl5dA>aDzVHV9n0yO};k&C{qpL8C}^- zC8|AhrltXOaxGO(EGvkcOz>cJpD-PbM>(jU#_R{l(@)(~pnJ>4l`<78w@!auRGdHYP$)D0oOij#4?8CXO zvO|(lMroCJlGS%zt;GsCVhYdh3V}#DChVw*oZLr2AZ6=BcgGUf+{@Me`FPIq9bAap zgBdz{E<12dN87{BFk&-l7=ZRUmAyfcYK^H+3Dhk4r&r6c*XM=?Dxr!Ka9GM%svs)`EcTba8>IGD&0*!h>odF0D>SRh zTJ;NSgFI=3QkMK=abSdXd2RS?(qyCbXO|ju*QvIVeU4ug?W#XFQ1tz7Ql46VD*KDI zjt_Uc3znUF7UJycdCWWyS)IX!xG6#>EzoG{s#TFgo#?Tl_70r~hfP;~HzFuO=3svz zX$EsAlz@s0%-t{fVpfSx*=K_!GH%l5UwHid5at$}8&a5#um-w*(?v18iP^juAM45* z%WWwYh@4)Nvxvz}I0aLMg!_O8{qE<(w+j2i{&a~@E0OC>mF^?QH_RM#f+4L~KW}WE zFuCza)^q$oexSI2nGN?$0n(<*jDdP3Nw5V?76UvdVuEK|mfs^&>^n|=Ms{^Bf2eb; zv~`Lc-t=>=(+xCb1#%i7B(**Y*dkr6IhfXETF2aAe78iMPt1j#1i44Z`7#O0zD-ab zpYNbx{HCI`(~v!2;9sN$iOJF;vivo-cDZDPggG>NeKtSzW`ayY`+?%(KH zZ0lJxUZsk^GuZcNYIt9df|i7P(UP=`ShbrgZeq+`md{&H(NgQB)07~cyrgydYzStS zj+Ej-a532ba4=HG*>LgZVq>i5 zJ?;d9WFM_{Z6hf-!;eEpw4e5PKNuVG5wP)nQEB`)&CL}l;gTL{u(zyNo2viANH^j} zh6s7U1E04LCHUBr91AsW0IrKe3oJy?V@c1-BEdkJTUfXW5>}Bnxe@Gcct-70=I2k# z<@Rik2vhg-(4^5!_X}@{i1e4HfF)ixg98Zn89J+b09LKdG?@G2ZVB>@0^-iqf0XSt z>MjzGmKzt{ifLl`4jIqK6W{on$7&i#2IO6C(Yg7ca_6WlAk=pxe{uGe1kmHB7X*Z@ z=9;c|W(1^0cYwB#OM$N+x_12~ch|BdPQHS-f~ZgQ=<&^0#>VcWWDeVjHXSrQbvJAC zmAVYfDhj&r`@Wy$-ZJ$kjAB~b@tExabv!ke*PYH3?Eo;a;aBqo9$Jg%fJ>2C z`4{@OgjG7TBzcs|b_EF4J0aL?DL+MfiwVj1ePqK2z#fs4H^uET4*C0^W$&iAxI7&V zwg}RIOevL-)eW(Vzt`Xlb+O1d6v(&-83q--xBaQ zpJnN0rPH#O!i<+R$gR&lbjLW9be_2BLq58i6mA4c5NpyaXx_VabawwwYiAkMRu}dA zBE_BJuEE{iDHfo(Yl}Msr?|Tor?|Vjy9IZ5C|VraH+}BhFZbh}_k7tiNoLQSlVt5B zzyDf|#pmRogjWyoHp)olS4lTN5JU~RJLJ}+5XUZvR-3cXVKo%^jQg4Rdd`Q{y;+%V3|B#I+?fVk@X;i*KgysNRh89YH=_0P$h|7)0*boT9MEAw zq0+zS@TzQgKhSv?o@3pdVh2*=#M{)t%&)D`bAPOQvC@>g|1gTeRkpRe6zH`jRSz>} z_Jcx8XriD9xAH@ z1Q4~*XsyJf*I6>nWzm)znQ4j8XUZSic*JRHN}uYrP&VHah?J@PP_c5IsxJ+uw_XT? zo4oqV<3BZ$ip|5&I((XY4n1)~0?FhunaCRL5zjNi^M48#iOVy5pJj9Iwma0_WyeR^ z8YeOeuy`(CVoq;P{Zucf#PQvPz>Q-)PqzwWdC%9Wy8l2x3l;TPgF3 zc8T2#x5AVIGU|$KuF*YsIvsb@6onh{rJWDbi{zqn5sKYG*rjkON^-1RE6xsog9eUO z@q+o%4}{r$KYTSbWG8$s23y$&07-P87_x_mSD>DK9~kn2m2Gbq!E!oh;(U)KGDWYr zg0;Nj6>@XRv`ON%u5bO9k^Jl(F^q&sMT?f=UTB(d!L}R`gXh>008L!YPo&hi zsWZq&hZHIRo>3XRr30DYA|@>sHb3N{D1tt7(k73QQuo$5IXG2+mk!ZPp$zx+4sNL> zL+I|VlotBbVvABo;EEA!>8vP3x5>R`W*GLZxFrSw`eR-8Jf#!YWUZB%BFdiB&v-d~ z@ohrO0hpcv$#dC17`l``VI6A1lOW3U{sYhyEp8sa?BLJUjGe?EfzyXl@Ckl$gJxg) zd?N;P+F*pe-k&d|0=?wE^F~QfV-XnaD};@(_kesYUFSoysuN7sGfDUIRP*Ck^>>}~ zgH9~FqGo<3MieIe3Ak*lx*vSW45$?s=!Mm2t#fN6b@gfGBd1Il`^1sXa+0+oXq1AW z3o4OqC4XG?@!PI6_u{&dN-KS|yddRJ`%Kl85Nvj5y)Z2EHqsFoh$Z6yhzS@@=4~ri zsFZPHq0jgkN(dJvy?@tBQ<+nSBm8nXv^NUoNE^vZkUL070AH?dGIxzRtY+;rCei0T z)p_%RUo)15HubS0K2y8JPSRn2!ImXEVRN^iArp&9SF7Xi;cK_zBOzL1c5X#cSrS`9 znKrH#$1%n2L-f^8@}Ea<@->8<3yB!OPDQEfLIVW)hOCUy}6JN zMrgms!i+)DxB6YAx;4Sj_ZC1JA&^qR*ia$AkUV0ldbcz?n<3)SUJpmU$3s#X8}lo_ z#l;pqu9Af2ycuf#@@Tw&j_AAr-nC+0*cIBrQ66p5fv;Y)FHf~siJp2qeDd+dSpck} z$iK~AqUgq;_ozuT_wl2yn5oHt3_7Y59&=;%1OvKtH)fh2DFx@+1Z*%3?r8$koXyZ*!EY&qCcZGubKuh_|=_RA~7>1U_B zUSX+UHQ}#un=)IdsbDfK1(``3s_$>LU4KhM_gNcQ8V&|gygMs%xX>p*1aRNUaoMgU zS65b&6mjQ#fkh#rdMCafcN7#H;$(D5^0rqQUNE3ZL7@m6J_`IYL6EcA@{_{*R}Oe- z64VEq0=HEU+S^GaHK?Y$oE;xt**S!#4Wig;F4n^CHWm>BK={iHX;V#`tDm$Qh@Ua< z$*!(%Z#@J{6k57tf&$JcUrKMUQGdOW&|=-{-6IvrS80~1&nMRtPZu&&%^=+_V#Ud* z_XkQWMJ_oR-udu6V$i|}W>*sXk^FDdGylK)JteyKlVjcvFW*leR3|`{$Z!CQ8b$yB z+SG&U0UAsTpT%$9E;YUAJFf7(2k6&VV0k=*r9aPs@6L#&n(%PLcnhH}>+%prXjE$~ zZ87J1EgJw{VDTFftSAUPiXE&zLG%HQ$Wh;}k+zdX+Itp8i4)1VHz*~bJe=3N?C4#u zE;Mu^&8cUMw;9;y{v|53g}_EFxh>~X)F*fF5+<(bw_JM^xx5&$!&oxRxTw!vr0&ph z@L8f=e7I;K5`D&eSijrj0t(1BU%4-2yM_xAKJ%HzPeab z`vB;B$PEF1j1OF?ZnY^-jJc3lZm2IEFCO3|ES$U;Eoq;C`}-nth3to+Qj)vIy?D{X zVry#4#6gYJ1BwU1hsHM1IzZw(PjQjwKyr>9U9SC^MrO3VtY~z3%IUFAvCX}mh%8vK ztatLc-e>&aD+OqZE`6Lygs$c~K=9!w+;lf3K`{@eH(UuC^k*)V;E!4Q)QdMX-o;W% zt98r-N8B!2s&aBGi!}25-)}yrIl7LQywYj!1v7kDpbQu}y)9^-VM&XAc$~fz$nPx; z3lhl%M%$gOH|J6lQNklj8Yr%XqiLjn?kCOfV>$h8S<620P#Zrhk-Z3Sipe$mnahJ~ ztkUL6UnNs@TeC}I_PP~%0Ds**ET~i}l&b(@{CW#HR<$1BFb{=t6{*obGbflUN{Xjh zBdBeOberAe;}J90)K=sysg_EPo9j}7dxJY4GsAT)Z z5n%2vkbgT|tlM2+IbrJH4jd-*mYM2fp9g#b5YK^s7WoZoo9)umilo^_`nylyk@-UX z7OQD|dLp)ZM1Mv=XfbKq6y^s*Dv`|1LsuG8I7m8`tXJ?go5|&k#cxKe-;@IUA^)<> z_Doa=jVjzPbowGAo&cMrgb&UJL9(67I4_n4Mu?@!;#EIPSssAJv)s_aLukDW_hs>P?rshyTgYA;6^8Gop@W`ujnHAdxlQmg#f38A;WA%F{;YuP za?)y2tXW}Om$%wCS&V^xTR_KG^)zRX5EJ5=PrxbbUgaJo;hCEJselEVO@Cl~0MOP_ zoMjyE<+?Rz**ECIDC_bFOEw@lXlWc@B&^{mhMI#s0_5J78JrEP48Rq^FJ&D@wI%Kc zqd^!={#Ik3e)`OdLk>6`1T2BoqvhSB%Fp;s7V87a56znGmOkc|*U>){>U7e^C3@uE8Vx`#JQ7?62hbt~Qnu08%4r z3-3>?jJoY3r;hJqF5!)`KS=p#77SsFPsQ6gp`8rQ!Jh|{dNj+GNUIxLR9QVR;i3%t zdnP*zdUkb{D8>AkXk-`^nJSplV~TjG2Xf2}02d)}af!S+z2WOaaSZR^hG2mYlu>86bHUjLN zE>^j!IH1PjhR^Na&0dX#2tYBVi}OrZGh9M9E#E!edz&?e_FJ$zJG;0jL{`*p5Tr2j z|FJgG$;cp0%DJl2F=+->jV0l}OV#mj&Tla*@a278MKxgbk{l101^%A!{gHpn3eLN` zi<}@(bB1?}BCD|QMm%KA?V4mRtt>#X=i8fzZoj-w2Kv*Ljhy1Jk{;t~?T^IzhgJm| z7r~iX`%w6p>SJP$-(vS29UQ0dxK9yu(aR2&tHsQ+@2@SGBzBcmliplUufJqt!J>}K z;TH29eJPP5zbf@1MNy8DADV@DNIT z8H&?t(Cg(~BK%6aRDG;e4OzlBCpN|(x|MJ~L9p7}T}a&^er9@iLxQ))?!_+K5(Dz$ z6x7)u-f-VSv_CjY#25n8l5dOU0ew`n(6$O=_Wl)nc+pF-A)kb9L-=1_!`)AV%_>S* zSW6neN~H_jME;5m1T1>oc&&+`*I>#<(10q!Ju3A!-h2W!($>aaBoSUslU62|*zayC zhI)Ds)Tx9}y6bJ$NjNeGt8@lK7M_=HTB~5H((SOp+ApEl2z%VNkDL>kFR@=n@L)LL z4p8)O5FzAx5QJP`;qf9U>>SZBN3t7A5eOq+ihzSld&1&m>#0`G_QIa>fRBpFmB$Cx zxMgZ-uapT{=&`aT9cP)2aRV~`bfL7|gs{^|~Tb~atP>CVW+HgNxppKT>`Bb9s z38kaSiMlPSI8<+*ql}nRLoGy@NR!%JME9fwA#`bZx$sNb4|U}X)%6&GO@yNM`f_~M zwRjTis%ksnY7V~y82n!#MrYHx%wl~YwzJ-aTN-#Te}jARzHp%fo+H;KTe*#GnbkBy7=Wqt%q8S z>N|yH<$TZWK5~;1EBNM~j5G}_hX(KLK6IM9X)qXAEZ|)ihS|^N;1?#*F`I>bo=q;s z#+@2|S-X8X0-@(h6x1z=TX!{!Ox^=RerAQuGPN)Id}9 zP$^+cPE*ly@@nOw$f{O2klNVixyCS3VZP7dcjc#d(WXPDb+3X0iZkqWHa3?IfPLHRo;VU73KI)#wHo$ARHyLC&_RkM5W^%uODqE=mT{ zL)fXG?4m4T`K8~c%mzTb3CmrraFj=C_Q1KdGe`gC;(T~k%K|u7X9UxUK_%;XH%j9b zf}P!UM|>Y|8#h&PH?`v|;k_30-Fiy}gv1T=-{vWDrq^E0ar%)ani@7ew4~cdxT5rB zL&mkRLa}1xJFt5nL)e{e=qoM&u;3#!jCSmFbE)uO8im9kGA}Hu`e_zd{pu)6faCNG zr%O^0rz3N?h2xbrS$wc!oAhf_6SmG~QqsILb|7&qkEVuZ^0LV~ST+E_CMcaqMNOCi znUX~N28;*AKf@=oi&SS%pJo~AZ}51{XAsv?p+KZyy@GD0O+jK*k1Qlq;oF@wlQWa8 z$_6rTy?M5`)@x6jL_C8vn}>V3M;Nb_xIv^tN3nTCj%TzXD9%*h`+Tt+`G2ij?PE6+ zQ0CAQueErg!>=~6j^lqx8nfiec)3<462xn?Kk$$pw5%9(8zTl~%WzLKb-Fcq4xS-O z`+}lW9o%v*s!%}j=U&ZNPKu@m#(2E@9VJW38{>$;8qD z*+RN_JGl!kOI2`Pz;VXz_e74$N6HLUw3OKFSxTsa?wb2=raq=guZ4{Uogb{%&eC&= zZxfOFvKR>+U0d`!HaENrmok1$n;0r#$Fx+%j8qD~Pu?DhGz!--O|}_GCfSWneVeW3 zSU2cyjH$rBa62&7Ny66a#xPx|oL|quX+~R9lF0`1%~X0wkns>If6>Z^CC;Ir+tj}u z+)e1~=AXT7&1*B0Kb75sN|Ux=TaBh2_^=CQ#`9^D&}yQh>O9@BPH)O98*J+WpPh89zvJ|PfR~y z=(6(sekW-IH zzZ^U9HWCRIu@r8U``~nd+-r{U{1+`Z#;ew+ldxyHy2nMtV|%=870JV2I?4cs%#_#W z&ri(qn5e@Kg7QeuSXu~9lh?H7A~Gf>`ZwhT-;40UFimiSP)E*NP#qni;j7@M%giTvbh`Nv7;L#8iopM^MNM%%%ZptbH%w^_)4 z;6ULBEBpG{$GS$W3*EGhlDe1O?9T{QyrIUn|kk=vOvw4liNx7n6~ z6~*Y8N`%dHhw>p3EX#uZ5pE^<5YTJNk{?(#{K=8<_d^n!*Qc9yC0z_gj6(UUCR*GD z$@utn+uF7_C3jNO^C4;<=38|!QWok3=3!(gH8b~4a=m@DVU%p_)jlf({<0FOm zh-?ppp>JCd6aDAJGC^#IyB}WWlQEsSPHw>`-kCPDo2Pw+9``^s#DCipjTQ+|(ARtr zz|^Q2OU(QWnDSL=;Ty82z78vj=qlfK_!BJKA;3d@c0$d)h$Aw?&>tS$KRpe0Q@GeL zZ$(DX{oO%yH#gv3wRMBqTaY~MaB()P2>k^Svh zc}5e;Ss*lLH#s}unDz6yaWQ_&dovc+>om*%$96)ur`3UWP5cB8FAvXQ#vpI8Nzc9G zV=t-HSNgL###lw33MKB<7zd{E-O1907Z*pZWn*I{`4|2D!(dC5{lIj!t+$Pf%kk_P z+~Z@%B)lL|X-jstFgC`76r}0$yNI!OzjQ)#o!LfEvOAGR4Gkm`k4Xx#t z(Lr+B{dm>59l>=a8-GxOIR}+rrk{fgHmVx!e2FQJ2v3GBZgyYZI*iq38d)}C$~Gu( zO>)1ZK!_u^7n2rZB?ZV z{V_rI^<0lwX=!h(`l?9JM}QIr5g$mt)6XJBu1ZBj}Ar3N@6by*g*_KcKnZI99rT$r2@CNr^xc0ggbpG*{e%y>D8eh z&hg6v<{Qf4p|QYKXvQvAEs6#6uOIX(-z2`sI?wGe_KPe_o!?gywL-Zg93(qoEk_Qy zRlj09_Svq_XS$zzq4#MV5ln8W6TW;v1YTC*WB3bPjpCJbpxF zt{?^xXB^>e4gi0uA*GG2GH2J5aJH_L{Ww&$L4bJ))`D0(&mjwvT)vs(Sw!Q?Z>8>f z9UyeKU4OE7+wt=|crdLPQy|^5^sPCmbie4=g} z2j=+~_QcVyArrl2J;bJvXkA+-jFbXUNrqv%2U~QuuxBU3W&3wHhC1`O0e7AnBSP(i zvV14^q2ES7#yN=6DvrgaM6x6O3>5alNAFM^kz7&SNM_}kPf)<9wp2W+g2;Bk4=tNT z@?z1)Yxd2NZtzFOY)*JJtk>nKf06bby-Cy>E1~2~x04>!Y6r?xK7@{?BFXe9CeVJO zsByt^Ph!Klr#}BX!WhIQlWBQATA=eS=pmTL2{%~RXe4WmtENWzw?X%$kmr0U8w?6&?Cds5BdFxc+!W5G}0PU!%xHDvGUeKC*XV_ zDx!B7I}PjFX+<&iU{Q{V`euj5%ED4h_HCB2O)J5&O!^j#=%$x~!@vl$S_0kLiOyG{ z-rD2BykXLL2OuV6t_V|2DIIGK9rMvtj#PBLA6j*NYh`|GVRbB}p_>=wcpuM>zK%wU z*2<{CYSYufeBjZ>1pp^y5i-pzG|^}&j`%g zb@Vu6(6FX&XM(YUVO*XpmD^=_xr?3JbSwMk!6B$vbA0YGB_#n4FW@DZ*P`PL$-axJ zhKZH2#zR|nlg|~ZsD1{6O-l2aVNDO7lKy9x$F!Q1>E~Yd33~>*nHk0kIz|>-T1UL( zF^qq<6$kHB>g}$k;++QwBaHms|Elk`s>5XzcOyu$l{wKBa^H}R^VKdnnT1_j2bL#&HH!b?i1BCYq^(@n$U z&f!EFS{T(KD)ckMzZ!@SCM5GRF)@L2(p`eL+f-n17e^}Ux9wz$a1aFr@rZAw9ovAN z=N&7h3UymSL)fPS83x z+R8DAtqXUYlKFi!LrV`!(`V7YuMPIc9Cn+Go2>f&&?2-cjdy9J^Y~U2vZ8fZtI?)q zcE`7!nS^O}wX{L@U3kL*4ZS3~s(wY6Ro*zODjSrFuEBsLdPed3Am?LQDU)nIK!Nz> zx_dSIhcO=d36H=zf|Sg*>Rvwj4^fl#ldrpmTMSl1oJWaC_q{z0$*xLK5Y~>SDow5u4haUe)8s$JG*B57e(AkU;p_P!IzIE>>b>9 z=<{WmAP1b=Fnm>mZIf+h`*4tF-hlU5s9UL^eeashw?S&h{B|NQb97%R_!uQ{7(geW zQ_XYyrv$>1zWxSL*n3!O0S;4B!;`}$w7vg=mhPh&b2l6=R>^WN@Dd1NGs)vW^R?15 zb-VF0-mRs?MOkJdDG#;|TXp{(YdYuUXt>%ORPMpG#kBVzgq@(Lzmz%Vg;{!f_C&A# zX0G3nXrRANFMU2H?(SH54+k>+;V63C*A(}+>jP(fO2%<2IcXG2;+06J@4MG}MjQKp#LyFUKpgifAGDt3xf)^Ky&eZ$F*zsLiw`5wNh zZ6{D+UIXzWCJU#E89zoQ-}ui`X;H6XXA}W-xtj&~-I&|wb+jjSoZ2y;UG<0}cxWVN zyo6&hC7`_Tsk6q__oXZZV?^>rAZYgu|H9#cj(NzR58G99aQ8OQNOf-H{Icw%AbXBm zBu}~QlfD*JtE3ZWn(&dlbGva`<{_-4IisICR|WeF(#Sg&gJi@GW40&D0$`ld1DJbt zudB*w8_kC%E%#qpz_=5w2Z`FZyC8uSQ4@rAuFWd<_0YF6&tJ0dQ_Pcn1dHoLxsa|v@vMOpZu#}~9Bz&j zy>y*DKqeZI=*W;sU8k?A$lY9F4VKrG;kL&rck9v;2>+F+Qh<=6EJoeT3N>@e_srauy$*ErH@6q-5!!CU}PH;%9;TBnQ! zNlIy9@k3uS7wzb+w<@63c-q9rr){TQ+${gb*|y&+i@T61D{aGJO)Oq|)VuQWGT(A5Li77?RS;TQ?@?{nj)C!C`}%3^lzCMA!C^JgFcu$W}x>Q(=r}W2%@{!HT#Q z97=s4zc;UjNlUDjMk7M8I#ljAdH*Vw!z=2d<*v1tR{surWXf@K5IPw7irwS`wDMj4CvldkVHNvZFA>~E(s&Ffp4dB0i#%wVC=BJwPM^oM_CoBs{T3bVC zU0S-NDdM&&hJkt<_V6b9S(Pn@PnKz{ILd?@@8AUA3WFTh*8-L+jM$9@98y-1sMkyp zsktyR!cPY;o5k5i3Rj4TzOI29+k^z`t6)T_`hNIC3O9XEeDdmLBGS{>-Ik4UpvGDu zbpSL%v_%_vle?1GL~LX3se=ZRK|aK>vp~v79HdEU83|oJC?IHZ^<(<{UQq8 zNV_(*P>%mdGh2rR?-xdr;_I^F7Z3CJCX}BlT=jenc_0|n)SJl2Qwcx8kZ1?HuV|HL zzbug_>@^?F>Jd7}njao`gm766A6vojX*t!L5S`JV(kX^-k0NC z*!84yY|58)QSl6i&5vmBa(DOfe9O3g>=vm*2OQHTnXc40%JMPQN58g0b2*0tU2)iMfZd(bBMjSx3>kdakzMR7F*L77Z)3E{cn@MT{ShAyra$j z>;FPDd??`5CnD|C18JKXRrK&#=#Ss_kRNGx9;7(T=}XY7A1c<}reBSHcvuR25(XSE zErz!(V4GXJFuRF5{r0;9d=mc3r+f9Zs>zp7`aR}GD6ZiWlug#{!#KQX&r_DrbO22% z2@(9*KkR$EJDRO;23reQ2(Y*9`67CgpeeHvOHZYVuMJUh*QH_^A^DC4S3XFu-DSmY zYQMS8^?$^-SZNK^%RS<5iUSdYMm3TbLcyjqnl)^={3c;ZE*ymh_ zuxRIg{MS~=6Fs}M6jowq{a|Ct$~G!()y`3ny6SXWbFD8hm`| zOcNs=6UIgR`;{5>JVNW6S*zk(<730GIf6Kwb_Mx1#;`F07b6OjFqaTD?YXAEh5~iM z3sR;Lg=KB9MgZdSAyS`9=?T!&MGmGdtqJYD20J7Nc63eg4#bRe%8@&ao}MtMsmi+E z5`aq1H|ou60;Xde3{ssl%ve-CgU5`^!J76n8*|;u=Zlx}UOH3J{ES#}N*E3GcaAU< z>x9bqs*_G_)V9mG?HRM(c`OaxHp(VQN)MWxaW!q;~}1T5E+GyvmY!&H9dNKRZ0|c8L@;BFCJP%ERV|3KFR7lyFvA?j{VX)MJUT<82H*g_) zoa*5lHkUxklTeqqHHi4KIUg8FOYA1Lhb$PU?qWCNAVL`#*J#~=zDkz=X@S>OnOVn9 z^LY=ermE9NDs&LDsP^nKJMBl#q44|oha!qc9sauSOT}MCR~B1r;8POBUY3jhNQSiD zI4w2k{`_Qa#QGq2c_(m|uXw48pU2&@5W(wvljj|s^je$qy;S9VDm8^gf<1z>#XTBA zu|6FVJUXAicx7vrTn!0T|H{(xj-QRy78}4mHn8-j{D~caum{ly3XU9o^~zmtVI{cC z<3gj>EwX?W8bQk(bGp#{ybK#m3?`*B9o1hS@OGD{Q($!NFe_7-jby!A6BK{@!|i2% zlr3>qs94lscP&RFb=$j@)=-EGdn?#~Oqk1e2;&NkI0ksKg;s4WB5<%WhLVhVc()v8 z`-;yL#GHdqKuAbPnxh*(&RpkVTP_^McEKkHY!TEwa2{)|Hc&xze;KaL6Lt!$o;S~+ z;b!w%Qokj!0u+V2+wa@vdi@MiFmn_f0lW(0uN2oq1mTSUQ%mnaD*oC6Z1hHCVwScp zWzt&#xVoYNF}yF?r=)Ut0pcVZ^K0(kR+`+X%7#=>VKi_mPwfU)=P*SozC~Zxeq~90 zNa*n_D5)%Ec)E_2^2vQ7K<=u7&W55v;AKP{ z7X=-C=5yiMGVKjSjewb+kAsRZ-PtorUxWX7ieVv~F@0YEM?e;%D}A|`)S)McMA9Fq zp6tq`Bee67bI&3YH7=E=81b@sP9iNGxanw$yUFNt_HLpnJuhXdsjt7Tr#YQQy3&ht z*`@UxKjs>CYaJ?@SYP6NSt`pExuW^8DNc!<$cPXKgtf zPsjDe_a`TD-c3o;R#Y=k>=7?ad_rhZf^W)NA>znwwBiVpBy=Q)pCN$w!K^&9!cj> zW)jwFH}B(q>VTv5Tp^pm`&giS(Ht5riShumB~18C&oo1;n*2pZx?y}}c*GMS+IL`P zmIgYc{TdY{ydLYEbz%UAdcp79#vk^LP zc9Z`7K7Od|dD!P!oo}&K#`u1+9|L^E|F0nVe|hZ?kN-=yj{7E7rV|bI0dmPn1Es1Z Hj067%?W<8Q literal 0 HcmV?d00001 diff --git a/devices/surface-hub/images/sign-in.png b/devices/surface-hub/images/sign-in.png new file mode 100644 index 0000000000000000000000000000000000000000..bd34f642a7ec991c945df2b66cc698afd6f24b2b GIT binary patch literal 123100 zcmV)ZK&!urP)31^@s6QJh-7A)H_eVr)UqqiGEsFQIDpWc_CR75U;ec$N-%nUm#%r{RP)`VfUJ-FsJqSG_WTA!` z5^l9!gO_NYMK!V`fq3*`BTt54Zwr+d@@4xA z_V7Tz4W)qe(yv6bZYxooWTP`BN8PQ;@2mT+w_SXMYTHs2W9T$=B9ENp+ZDEmM}IL! z+Q~;AxQzJN&<#sG;ytx}wxeC?UZs_lz#g)ZZIKMB`X$pQNjU(Ic>mq+A?LjxhyElgXVHzC|-$DC(SC4rQ`GkW5nYGI4>2Ob~x|@XgOLAlKd74 zX6K41lMV>DFhGHo4xy~UujTT4=2XStusj=R#^!PJX8)(*_Zx!8ORX$ZkP8vV5Z>s(P|Ju!B5N8wZm7 zx~_huTU9x-#IXxo)8QaSS)kB)l+P0jyt+P%F;=oM)Pn-jBE)(m*RDKNbc>NimG&{q zI_hY<%A$*Y%(MtJPR{V_c&}uM;ylao1nOj_T@Adt`3;ovm=2I}b%c%bR$?@#A8Nop zQ3iFx=||exLqEH5fOZg9h`iY)P(fZZDB8>~c~%Wd9YdAd6)3YWpgwHjr0x34E=Wen zB;HhM%lvu;37^h{m^fKh%vO)2oZTXn4WTFjU%ir(N>Nq?OgIKKomHY1-EB~9>J)W~ zdhwXlBL=)Z0+p926%3are)eN&G<9Qxq7+L91Y04itcIwV^a=TUZtMV9y_NRlN=_kN zL0!3;RKzPh>_||*f^?=tgv=sNp31c7IOB}cSt-qqqBWHwScC?7*&#J3XI&6!__YjU z3MWS~$n_IaCQo+o`9m4T8zF=)NKx#n3W)&mCRn7ARm#?Jf{fNemhTbM^8g06W`>nM zl!1*PjTY3FG#k6!;3A&KThV$dRd5??S*rx7t&290C)Yxb;+6wt`JJNHlPKbilehDX zQhpae6v7sqC84`06Rv}Jlg@OIb-W=*=uUGd<{7mV7|vi(PE?Vd1Vk3FioJn#(8yld zmCk`i0WybBo=(Yde#sN;&_S+x4dm-G=*fXr=EGAyEX0uUc?3}i)GBrhZVo_i*}T-9 z6)CNZT;VB>^TDT#7tC|{=sp;^~M6hoRxyJ;^} zaRzt_avrG7>?U%|DP)Du3AXGC#yn08f01cXUcC_?IWCVh3?M!nka2zy&-#hfX&=fR z7XAO~rfkqVU{odew&$*7_Yz^koK2dR*iqgOL7N_=nOYO`H+ z;~2;pb!Jm#Ow0z45MU?inuk+qWH*jLjk+FIQ#dF>WQPLfT?MdQ$!kWbtGR4CyPAnv zxdp9x4BB-5*rT`|WI7UrYrf^lay+4Sxm=^o?yI`Z$+r%dg_p}Kfi&d2GDJ>s_kW`; zbzPaX9-~=@^#I!hECYxGmjNzQ!sT5K5OB}i%gZY+ClM$Bxoo`y6=RXTXjF@n6LXb$DN`HWC#@IDmxPcl-c5^ z1A_|vL!y+c<9Wl$$4z|9=&DjFh71mRcbud}d|dGl*q(awpw=jK4euaTfWloEr7#V! zl3@(VPE{Tk-?=H_70v+zEu{{VZLH(i0}ILnSlW`zN+#L0VBTroN1zJWBtYEVSDL}9 z&}o+bnN}eNqOS$o)*;~mL_UNvR|HA}tiwD2kF@&@kS=9_tt}>2I&ALdtp@!wH z(|QRlYo61kEbVq(#Np-sPUQ9wcirwM0H3m!6T!;yfUH99;8P@vD&IpRZx|_qF`ipM z%1aMBCe)z^H00|Lu?Gsa!Psft<#8wltppzNp_I6BZY)5yl(!xq!(GAlP|kX5eFV&t zJZ$=dkKtxu!wC;%;}F1X>)}#QlR48@!vw?lp$e z53jD9Ghc3vMR~16>;~0o1~s-S7&r^=BT| zoP7`=EDw4qPn^muZ#h7EC^VNZ;dH43S?qG%z~zSmGLSpMWvs*cJfcYxmU4g&w7hi! zmnZE`b{?o@2^u#A1jYy}ctSfr$am6nJ6_jG*}MT(l&4B|0v=yQ)&T|eP@n5GHKV~( zpK~(K0wt^jH0K$mj6u2_W1v}PXBetX9Vej6nLl1!z{``=9)NP5hq+@YiTolyG?bYR zM$r!SWNzmaFUjzj%}Greh3Ozo2MVgILDWMC2r<0OcivFg9hu#P&G5m4IG{Mgk#$Jg zR90#E2CNJksxM1n=a+IW3#`NNY&Q>G%{+s2smn0mph4DS9WK{g79dmB)toNNIbP38{my%m<{c%PTR<0+&Um9xn|U>LdisdO@iJ-9oxE$Y)&mUY?-x2ccYN3b>!P=E-1On+k=uw5vsWf~~@iB%yEviW8s zTWs>!o!}f@#Mitn=fm2#S(S;ZOr6z0ISy!Juf|euZ;#5Vo!S0MUu#|iXo>drcGce! zEo~Z0`d5~xe%r)hp=)asGLMjxIE!+CY}o}3`|HqUN;Jzn;J^S8H)?4|+G9hT!<}Gf z**kZTZ~*Eq2O$F( zr^q1g(;yz90Xt^I$mnRt8Ma0n16Q&P@LtU*WKzDTE4sUTGOwefLle3^2Yo{~ZLsZb z8)>(V5EF)zarsgn&|j28p0H}h!0fR;gZxq-7^*CJ=8=!QkB#Mk%Q~bSM3-e>FJMsr2R&_2#5$X^f|y zo^Cnw)*Mgm9V2Cb)n41riK1Ixp;vOWvq$~J7|OAvF~>N{lQFuh>KZmeZbM!^6Va4X zjyOE>$|+_YV7T}L3Mv-SeZITiB}3_>%%VZ0l}9$mAh8F=?%YATR}96=O2}pqV21}8 z*%*`{+yi5F8&nLkV!<{6j;`x<{(b@zx4XN$nuPTrZtoZo?QQKbZrr$-bI_bP^svKY z`qarWX6%F*Gj4p0ki+ci?20X0H^ur5>tg-7HL-HVidb>?(%7DXxV#4^*F@EC27&~@i_HnPA z%GOOAVuSi~^XAQQ|NSfCp1bdgHTU0NIawX6K6$D3;$)O?yX$1bc6)^;*i^(B_q4~4 z!2#MvlVLD9;UkBC&&gT~@>WyMBT=iA^x*Kiy3%RlBzQL)ir=^5N&WAvq*DS z*WKV%B`ZvHkcTWLmyXo(*7u;G?new@RnEzXYxmg18$?9vy+rN=63Fi+cD==J&L!<$ z0;HjOfF~ZT-m)za_U%VIIJ0+lcFGxQ(vBV-QzuTAGn^O49)DsSchZS5XU^Q1K5be| zm^wAajv1xx&xoAhOh#6YOw>*d;LdGZW8;SPvGTtAV%d_#an+T-iyIeQEvLCWwr|~< z1DmZ=f_4}lm4J4+oxn4JQQ>wwUY0S>Xzm}5Ygs3HNxMGE!y^RnT%Y6QS+97F6RPrj z(<#sPb(wUS@*^7NQ{#Nl!L$tTAN$DbSr&p9NtwJgHf`7#%XKoi@#Y)j zs^4A`H!Zj(wr|-Mo&CM)C-v1(ZES+=1ek|I^bHK+3=7ia5eIY;LxD7WY9TDKo87p7 zQ8xx#Y?tleIDkC4Rne*ewLp%=8jkMTL6)#&a|zN^ZhA1$XjvWZ0~m~~7;%mra#~|` z7C++1qvFJqPmfbidrTaDmTyi0?8#fp34wp(tA8{{N^_2ciyl0^%(m1>DmBS)%CedK5pQIA04@XEG&6c8`v zNP7^J@=!A~8g`CJq=ZK@@ z@lSekoP5e-V*2b^F>Cg0tsbZ5*1D&+JGO1vs*r1Q+EOcRu)1&2RvJAcwQ3)!lNhV= zjq5kWn$@e~mK&~(-~96Danp4R;+_>tRcDV@rdqMHoGXF-L-oxtpnZVJ)m4`p0Z)`! z;?d?jQ7Dp!L4UgC(EHTxQDeu((Z`+`PdWGeIP=WMs{Mz@v}w~N+OM&+HOCWeWh|yc z&k9>|Ja%Y|j2S&9PpBKTJ6W=1QCxM&Z{pHl{45q+zaX}#{CGLZyu7d*juK#NRYOHi zr`>hBeyxoE2!ETiqq5|8|$SY;a3To_`gEX2;I8ARoj8OIsD4PWj zC)cGj{OFORF~g2ZSC$|eorjC^Y*y&wp(M(n)_qx z_HEJMy}i~{1#Gvc&6uTC=gD#W{NrQR+=JyPM`!lBHEZI#-@YjR=d+)RMR(q&6^3xMhhOWxPbGvpl9{$M_h-L!Pwt)x5^FAEnuX@&Su9MR8V6 zDW;Q04_iWQf7{ze#8K*x^Dq3pIOFWIW4_{Sp#id+Hf~V=E{|3B-xs&td~ViQiuO zt9)LU{%>r#_XRREyHD-&3ME&L3VCutJ}$S=44H0LfO343W$RO(aelnu#jlJLv~nCb zwi*kYH*bksZ@eLHx%s+SwD6ADuu1JyVa8kDu#uCTI%!(WoqJf!KjHW|{-l#);^fI$ zmdiFbTys@?`x{@4AAk2-xhm(#9;&?SaAmhM4}q^F?&L1S@P-jw5yAIpZ;B#CaDy zJI;E_)8f#>4$C{xTuWPV?|oYBT@^PjxJujOo7BH+Vw;@GYVo(RQtxD?t}VHAC+gKX zEAR0WC&^(UFM&yFe6r>E$mJMWCIeEzfXvmgC$+_!Rt%GB3> zcjZ8a>#rezS=~BbOgdK1oHSb6`lGX}C%U(8i#Z3+jW@mfy>Z_8&x+}@4oauD;@*4X zmp}P&{NhL7mor}y>$LJ+sdlr{q;5W>fnH=sX@xvx!lalsb!r@O)X{OqTo~;gZPBKcJkpT2)?J;Q z@!`My$9U;0Ul(m7+HoFaTXwew@=6UnZHU|C%rpRXo|hJB zZklkpO;TQ8uc)sl+BKOEKjNr3`OGuo$xk^q&U*4wD)sP zj|(n*Zk+qf3u2xoH8;6fi7&frQC$3sU&NJHTo!9q-W#j#yC-jMp^>}MD9v7NtHb(l zU1Qb*vHIuQ@3;vQV(!6*#Qc*_kEcK5!raDAoH8ZuyXT(x#m{~e7k&BjvGCSg(lNKG zpLgmcX&BkN*Uu|Vv;vk_`DMWQ&cDjseX^WZK(L6z`?`OU6WpVPUkBP}z zQEu3@=}n>T#RercWC8!8-nkgFBnhai6tF(+LnA<<1B2y0p^i z(}aHhi(VGToNz*{UU^@9?;Br>uYc)_aq&-n6xVBIbDz%m-CE6X=drp&THQ2YqP2Ha zPOT)a73Cu;oXtgemDTsJiY1HgjKzy?kI|#Y#@xe>&}wo<96a}s+^R3U@{I3*V1wYskZWH(?qR$ z&VKUK<0UVDRs7y_pP$Z=JIhNKEsF1b=UeejZGV6E;~&ILH(nQO)qXBbN+L|w3cxNnKa%ZOJ9(q{Jm_0j=oOg5{vzxEG zHnwcuoQ^xMW$wy>>>}Ghj4gGGIsk{qHR?kTIU-*CDmllOyeuY7nk?tPK7R1+Z^air z^U1jSx0lAojccPrCxQ++vkr|BPP*Knfm$H7X=L_?+A4c#ClzhgZsYE|m&D>FOQJ_h z*F)wW8k4oUoU4%S`3=`yqiy|`l;54Lb{^Cr#7Y)%6KGC@<~;N=E^-))kpzzrex0B3 zf=HVH^SI346)~r+laO>nhZto(jyvD3A^u2okQ`e;gUdKu0XhQ8juACFMFdE<>8LTN z2#-4ESUImd;)@!<-`3XmrW-VwwrtADhhuC!$EZm<HDC4_A-7$Xrgkruv$m?-= z=2qG&)g9V8x8w^0I7iYr#dMa$k*nnm;ylFLsns(1C!ca=yy>m)j@Q2a&GFbLoE787 zkB>Wa0{H5ez7U`N^vC0e-~CSAzgyBlu;OXWlMarr?%&Ge46bMp>i$jVG2l4ajxWD^ zY213#b+LK<25sk$(AIWV9C744ZP&YXjPK0j$~JUZ2SVr2U%QD^Bl7jugJ#c-*Q@<6 zdf6*u;>1a@Lc5Ru{`{xne?Iq#ShDbrJb`kFARhovXUKSx3ObLvMPlV~sU~%6^~|l? zs5T+u=^o$li%8Y+nk= z_CO@)OHrDl{FHNkCI*KYC#f=w)kd8=BcL!v6(%W8KjwyxghHY@v=qsDYThH(LDKiM z6L{4K2%XnVz$^ngtc}LHW$=YsD zojy~m)wQuu{miP~_3nT@tQ+`p4Ug+w_?#ESOJ4nkm^67(Y}vFqKJ&?cjqiQ)Yq9da zdv%=E=K7`_4|!94PF9iI4P_kj#P>1eBt@AH?M^t6a8v6pIec!;aPtc%Iex-~Sh4(W zt)lO$#vN^>yvh!Oc~Gst0n0Y?f#sX^fl{Z*aC|5k5A|kVncf*$whrkxKtB$W1LVsF z_j5K;;ltWNW+Mc*5ipqmt3^9TFQq|q|2Ct+Q!g=)xEZry?b=*fFmah=OuBT8r2)iI z-b~~<#5nUomgA2OM7=^ZxbM>)!Ov zIP}OP)&9=-;kUmTU-;C&$Nei;=5w7~I^YsU<0MeGF@t*iBwKyjXn!G-Bss2?^U5XH zAManYDh`@^SR8fqF?rdBrzmc?`s&!Uc|+Ys`q#>8czn9wz1<=X4-hxcXi_r>rB26P z-sPOO+)#O-<~N*~@-i&RV$Q3>fsBe8^3HcXq-);8)k%M~M)g)*#tC?auBhKgI}%YxE5Be$Z&!fr_*$*m4{%r;6B#Kht{rL9joqL5i@5W97i5?lvZ_9 zV!gKB*Is=^9`oJ0tGx?wthnxY*b(!za(sO}<=khc9amlY>-eXSeI%AGTax|ZlP+z_ zcDY)|OQI8+#u8@cu_GcLz^}sZp=P-Zfx7$8P_eiLMO(aXqPk1 z@^+HwGXclRu0q8#!p1C^$w2pE1;dZjKLyQf3HHA0M({<*{|^<~VrH+?apd@%ebl z8g0LCxNbq-6w0%|WLY;>3NeN?UrRcvbY2RR_#+1QL38yXxt#cQ(Xv?;Q+jyNT^{ncQMSSlE--~6-m*2vj)mL7s73N0C zRehX&wHK&9Hqov2jf!*6|GjwrOI{J<$4`h`Z@e+S^!ZQ6RaaaRBS%%&SzX6&)r61* z%djA~v0o=9Zgg>D@buFkALDeQrJYx*?u{EZNEBiHr!(uaJCM=LE5rJjH0Pz?t>Y=? zv?$q>%SaIxsE0%)uK|(iQr-gOEASX>*g~Apv=?~TUxQ>K(I2IAq%U#;7wKKXoo!I4 znFmm4J{20S$TSpo#}Ed$Xw&A+dEM&R`6uKvlAWCSufHx4%Be`3XXkQK$3xDopbva~9b4giTSN--p>Pp)@Twh-HlP0!VNNTnP;An_?#@m*)Rw&Q#50YQ_x281 zjA3V=lZiNLl+HYO2m^R*XAzd>MMU6|M{TfI#)CT0xLsG%;z=kSlP>F~A3et_DlK{uJ zZ0wN7d#D~`tWp3t1m;_r!{&;1Kv~I<0+Og!bAW?Sy05=Yajm#?#JA}TfAqZhapvP5 zAEU>NjurQ=h~Hd%arAX{X)E5Lk}{4_0s6Rxhgp?QYWLaOtG*myiraw!CNwLJ?c27; z;fEa=uYKK{;}x%ZZ9Ms@PmPmLJv|@AS+#OiUeCgr;kX!uOn?EMQm48Ykib4A2dLu6 zvI6A>j8~&RUI6htPW8beFRKw{eM0`qp5Rpog;IuemE0p#j;}@S-jeTnpQ#nrgh>B$o{d&}~$H((t{PKK%pDpcAfB4<_#gD$1mm2oQ`R*yK zf76yN(bL@>^X46!&w!59%6-Y=MX_k%o!T*U=N6n3XZDEx)Lp)NeVPZMIu7Zylw>?G zHcI4>EAl;T>*9lm@k#m8$s*q9t|r6MQ7S|)A9A zDC)>}tVQ%!9aLLx>O;2}Imngdvl6^wW+F{_WFX|z@u@5WJij6%K21x0tp`z%*Q7+A z9MGNu2f_y~)~{b1%a<=p-n1FhOijucNd65tjvx*{)9OG#FLVb{%fxK zt@5}5wD(*0J#A;z#)u_Lm&9)`zcg(duWk0Jr=1xiM~#W?a-8fe_!3c$AC-ZqXP0$J z0DXC~6miTL8yvTEHjsFPd151hQjQ&ER1xDdiSm%*=@5|<7^6ul3oFNqBGf?~hiBa> zqr4mwqO_@*TvuI>ZBK_>6YbCXMYw>6HPj~!&?Yyqfx4k|SVLH?&YQF~4eAA_A>`}w zJHi<|QuU9*TpvV{jz$t&Tn$FW_(*Dx^1D=|3%;`Zb;SGoluKOBkI8xOJawqOYx8gR!^zr)u&*xAaI~Uvxh9Et?o@du0xdPNtHgI*AXfp%Vu$J~|1@f8U^y zG%Tpsb>jg0W$4VA2Wtg>rcP=z^KGCTue~a6zW%z#>Tzdi=&HjKv=u6Wm2SV|ran32 z))6CP&AK(QV8QS5jj&OpN5yd`os=J4VddDx0FrQyMUjt5mPct5Wq<1rWXFRFoE69u znqZj*iKn13y%I1WXHr&V#|Rr@%;w2eGLXlz^=1=ldE4Fqc9|rTV@F`DQQkTmCvU|) zPa1YU+(AQVcb>&+qJcisb1%d>>8AG(c@b6aP3seR6<4U^v4b@pA>H zbUF?xWfcT5sB%T5{63xXds^CMb4zT}7I5>{%_Hg? z>}->FS0nAtW3E|;J%=4LKaM(je&(&XcX?cOh8oI#BMwTQi8jJ_ zUKx_-)w!vclddY@NrHRtT@lw`d$qVa*-oDx^G`S_-`wF_njR?hamtIbUmaJr<2VpI z71A8zoJXiYM*NhiWlKUwI#gs;W)Q(E_^#hhxOsg0q@TKL8OysYGK_EZD%$V`48nXD z9HzsDkp7F%Q;kyu_8Ju4QNd6u2lGf_4YBH9!@35!gwuxNc_iz2rqyQBA`WnNkUF8e zP3=}IljxX~F8{Hr^It-v*2_#Cv^;|7NtDrjT%%&8*ruH7b`iNf8CKLIenm_=$uNp^ z)LOVxs*sgqmXXRH>1B{t7PZ9IZJn`YE1ykcLi5EM)v1Q^*(*k7HApn!(4hvx&H({m z`nYl8Z4ZMZDfL&~#}QOyomwroYLTeDsQo(kvWbutUU!o1tL(u>@(2e=t2>qNjgd8tl1zunwrdi==Z^1) zEZ5g3r`Rh8Di7VSUT;y@E5mx_DDyz6`#4x#I@;W+%Ok@ZGfMO-W7FoXu|<c>tMhj5Ijt9vY3l~D85s+yF>0r5UB+rFjCmd2OA_T~8L&wdi? z)~%~PEvBvK4}bLI`0`i38k=N8z8lT;GnEIqT9A#{k=qmM6y-pxg$OLaGuSS`gv?c= zLhJ;zfhbO;Ul~l|bo}CFyA+{4xlPo_?p7b=4JjRo>UdU;i*$7(OQ9-cTykx7i&pCS zXis}vOqe(+ZzffjKNugCEwq=(pZ1YQeIh<YT+7rWrb`}bxf-~WNB~8i}Iw=L~2yZk(bB0L29QI;vD&| zz(yU{1y^5{uUn29IVz4l?t~aOVWRphsdb;gg8->uyH)tNd!Q?VN3HU_NDV{0wMd;B4wxMAy-{7BzLKW4Pm~`txDDn$iT~T8Uv=na7Avq9F>@jOsBG1hGXnNDk*!*@`1m zIfdF>ss75jbx9Wc;Ps}X8=-VFVZXMwH8Fwm)PT+XJm04}Rbj5s;LDcu^&0KD#gZLa zRx;$JY%P;#KBaLsgqfLv`bl{V1|LkE1i49NT;%IGxv~~03!&d}PNSMWI-#`0<-hxF z{QW=wV|@B^pNTL1&ws~%eBwXiU;g!<;*!gLB_}Fps=lpywgPd^!ihR0U{yhn?+vUD zlW9LD=5bVLr^zJt*`7EjndBiSB9HOZtrHO+*kFuR#}htd&7|X?cJs3b{H6<^p#x*a zPt=J>4pMRIPiL$!S5HN~UV&sEh?mYv{JDo59)}!ym=d9F?aEkq=R!?RF1S?vhrT>E z#GyK#j=s)InVOKv4yjR%=1Puy>P9||ZICiG2AP-G$JV|}9_!wfE936Fmr5XF)~wkv zYxZ2Oq2#sbE_IwwI)hYEUQDO6?V@x%q8!^w!-vYPHTm=x1sQL7f`MPlq9>`=-EeBi ziO`jEfK22RmgARrqp--w#&xH2B~-TC`0Y{svp_VsXTS+X!EQe89s=#g@eu+sgvz-3v24`JSYt8Jm|`!_Zgs_ z@-XxV*DObl869IpfM2g;JIEtIs;)6G(;-2U$-`KOwQ<#ek{pAj++uk9-KSaJ)~b_% zgsxt2ZG7@GpN@a}mw$>ce(8&G?ez;(XJ>B1siy=W^HR zqEn$KI;)U$Y7ptFSoEVvvu*C2!{U%bs_iwuJ+yeyBF-)vlGLY@C3X%)($jDj1)mc@ z9;ZDd`lA=eD1ALTc$^G2YDIhdZFl7FD~%a5CLKAifikA3m!?n`W1~T0<_>{SLO2{d zC$%^UC&MZXK1!$`y9qgom@=DuMJUr)t<{vy3PNce_i@($)aP-_*kCL)#s~UEjCFYE zYUmSTo9#~rtg@-6E@QdWRj0MH#o^#!nB0;~=g0~O$HZi2wIfH>@9ku@y{xXO(fO6* zgD-sws|_|Qv&u1`8%L+Drs6nMa{0?duAI#%5&4zTxy%)@daSmhJiDiOZkt%?Nv9gn zaGdEK&_-QQ?M!o3DJR+B<2;eW8R8UiYgM`eA)Iy*R@T+*fS$FxS-;A0Ftbk7m!Zgm zgu%_>MK+xaag}ErGC;Tr#m_wO*w4Ky?~A*aFN-y6SEoFDoWC7G9wa}0F4PXpuKfOwC68M zN`bI>%a-alW7PjlG}@QWHg$^#l}@T{t0tsQnQa|$*kOmq?1N{euDkAD5_c@TGo5gc z#xq-gZ|eq;bfp6tB9F4H;Jl?AM3hrKI}#@WPQzSW5IDhU8?brXwz%!K+wu|$H|CC> ze@u)WD+j6e=E_w%aZc1n*dUZBq^%xPY+JXBu!D4p&=-m@E{3u<%c=j6&EqBcMo1oI zMf5du!N=K-jr_C^8RgOMje3wlUS-pX*5!S?(lLsNrz2DuLUf@cx9^H~N@tSN8ud8B zdez0sjG>uJ1>zbpxMd-4I%t3~k*bxIS5FdAUap|>AFD8Ob8(*psysr~oVp3k=O5+x zSLK*EuVv>!N^{`(m_e_cB6oRnGKiSSRjWnVpH8!?aR5$3>0U%b!8Q*rZBSKC42gMy z(7|~Cln43jnHnUJ??j7u3#CWYrK84y_W`8FN?s+zPlm!#qejK3F{6^dt-CAMZ``bU z*~-^-i{Ci-=z|<5Pn4>pTdeGwB;qyIRb@YR=%g}k)R=tpV$`V7d3`d4074L`;~CWX z7TaG)efooaIcZ#{;v8=~teiA;UQSMh)yjaruEuSS87Zj_gHGm_l_%h}$8lrFX!vU! zi??a>CQS~U3*)WoM~){amYm>(@Jvc~sUUqmaq5hibI2j$qGw|)xoc6Z-?UNXG)8ON zOxS?kNy>A(nu+m1=wn`%OGjZMt$IxwZP|xO`qQdo+qu0vzkt zb!J${Q$P8&Of#WB7XdX%Y#?6=`klDz%eX?)@=9_NIb(EY)tMB>!)M<636))~d@47G za(7mCqyjrN$WCW~H<064#Y3){Z%!RYKlP}7CIXbzD#VUKOMg)w5DBGgrqSZ<8d5SO zXtVUy1RRI*AS%*0E7k)mols5g`23M2old*^y7KI_U75KuQ5|j<;1HnP2aAtI^oS;m zpBNMCAFx`#e!W(At75xGQ%+pTZ2DAI=YH1f~<)(r;W*{9!ZcKDa zL5m#4sL^A!3E`$%Pi)mT6la=sOBTwNG9=xD!leG_(isvbJZtuxn03%xO6GSS?^=3S zbW3kOouK?&@zul_LVW{H5Gv1U>Y{xvN85~?kK(n7a_dhh9=0>rs)Yw{?eI0K5gM!g zao>IS$7Y>q!NCX3iIF2li(lPHP0}BnRPN*yhkQc=Tj+o00J3&WQA1~KTf=`qDw`y}#}{pMyIXVlDWV2eWZfD_ zIk7Yuy5%Ih+Qd(1nIhF96A(&48l@Ja7tg;wa7qbAEq&-ciTI>{+w(J?6!W7v~-3s+%h(PMrGPUzycJpo}-8%**!5 zhHNwy5Q0)jJnV&#KhU7sY^R7pP5-BZs_mrz@`R;i9y9nF)cK%y-X7-Yi76+MH}~px z;0*K4mXRGXVjK>#HLuOBT6Ld}9oLApXyBx);*C3{rXro&F&RaC)||O<@SKBF|6O-2 zi#zUIl0Of@G0F*wNs!{$nPmx0)>oz#(!MNT#~XZwwAsgld6AAm3EX49w)FYtl{&9Q zo~%-*zCCg%~N2)2+FE5J|@M z<*KH!6s^--&dUZ0#M2@`=z@;#4_LqTm3kG=21_PMacuKqhY+XF?=k0ceHfx`gq~RR zLnB{`aw3Wt_#S`^6b2y&kUACQVBupA{Io!)MhXL_r=P1o)%z}e8U=ivJKtqio(G-> z9rbYbB`%ioq(ge<9x^wMKISNKB39kMIubzG`rv;!%R>yJDKIb9BC%G9aiMBKCd zzPNkoJ^7eTeh@;k4Jgj!#aX7_lB}0F$|)zx@*?`YA*Yb>wq5ZYv$7RA#uhs&MaAe= zU2=}<2cA~gzI{uqT&a^lS5J%{Gd2#AQ|EWYyL)@;a+Ph_=u}Vzt_wmYopGI?W3Z%Q zkXg-gWx627cq0wUIA~4-^9mwJ)NQh(v?F%f&J@ad1&N;r*iHiYm{1@+JVGu^ZImqI zwIKtR><73$*JIr!4-l{IOM4ZiW0^z@B(ioO@o8h@#Go{TE9Fhf@E|D%jS2lYwp>vv zlZS8nG-CSt8DtuW>a-S}%K4H`e$j@(D*47BQ{0sL73LX>D(k)5k%u21^YW)=BbMEB zPuzI(&61Not#tBdU=ILfM)rwE2<^=A;EdW%q7aT$|Fhf!0oR2Mx%*K9^07+iAU?JY zY-_!>WknD5)M0;Ym6PCSVvjuH$l#;MTQ+Zvg*p*!-=-PCHA$7{_~Z$Z5XD8@6Rcl@ zffd`7DU++WouqsH`gQq{5AI%9kAuku*#_m!BoV;ov|q$(CL2f|q&V%VuBle>%%@I~ z+l`Ic7fNOwiqk%R#)6YTjyIa-Sm=tW`2x%jbso5Vn8SAv^fdV!%9Bpel4~5v+ zd|Z94mm_26kvD79ha9t<^kVW0lEYNIl%3S+ikHY-3fXG}rRWGEj~OQ9aDE9k~Lo`AP7Q5jDz)mzNr9!mx52 zbNuoKrV>3O9OZV#Rf@F4`Yl`I9-VNxoG^04$e1~EM)mHwJR{3 zI6b8ugeKrJZk&R2b{a8ua&~?^F5O@UA zDXuXV-mBS(#j8*jQb zetqfXv3bkpbdG!bC79ho+Mz$5#Mv#`rh4KjWTNFthIAEVxd#%|=dntkViU)QNsZIv zx*-PV8ztgbV_W|u46(xN?e2-m+FBoX{E0Dj+SL45@U;uB&22WTM;t3{wR<^r<{{ z<@iKTO*w9Tb5o& zX zal54?-;2)lfL@3JrvF2Nm0^#ZV^>#K%sKd=c+LeE#0keAmw6Ze=2vmq<(FmrK&>8| zk+wqF-hsB~Dx_{lNe>np_3ICgf@1~|r_ZsSRaKJ28fi6#RpRt1)8o_=PtI5GR^GoV zex-iiBuClbUVTl;?agDTI7Ghyr@8FGHDRHDqY4tNLLLGBK+vj&q-!b4k3+71!EWlZETUmx_A)xc&@ z+Uv$DjuYcRJ1eP9bLM0+`0gQFOWy>5^1`(C8GKxVZ#6O@QfFSzVk;x3sQMYKZ0#~z zx~V$P#3Dd?DCBn;ySrl2gh}z@=e;nVb;0>^hOKe=6<5SJzw^JbYW1po)h|Dyz>GS; zpoS#XPyyfKjHBdi(7BIEiU=( z<*`L8D^`$s4N`o_$FOXB^3ofDmYA$#H(^}$Q2)C1>to&8_0{eL24bo^Ax8FV6-|CR zJko?FWGI(HRhTkrhj&7muaLGfe!T+ZB#?Rw;^0*dvOCsp*c6>Tl!%x-X>#@TA|?oW z#iQ=D*>wx z5R(63w~YF2qis>hWX^FR;_S-xoxCdviJ6Zn)FERdw`h+;?hel z$!AS-rGeB5|A`ajAjgi&>^1Axq>}_}Pg5S0%7D`t>&i^Pq2V<8 zC{ydjQ4-B|Dr6itR?eoJ%NnoBgo!bBT;(9wuU(gSv2*5Io0S%26YzIgVS!S<){`sAni!He z%DnTfbc2-bOGSLdcU%3Hs4;TtZM>4J4Em>pQ_L5df`en4kZuODm_>*TKpw(DlGjWn zn$r&j@FMg;%Z9SrEgcFEkrvqj0-PXcGQOZl=)Q)!ElkBcVZ7e?1*^R z+uj}@`m^`P@y8w$TQ+ZrPks8+@$aAdR4iMzw6S`8)IshUn9wD07Q#95PWvgRo*FND z;frIOoWt_v%i{;%{olCtj@#uZ_<34y5Csj529@AYG`<6DXBgu(kGa6L*anGTi)#G#HXP*Gabu&c9T(PUP=XXXkSCYt zW8pEc;88vK%suj~#~*Y7$_=M;Z&2zWUg*zcj&~7h_?j4ec!U%5*3NBWh~M54 z?V~lu>PtA7TAB-JDm-Qip{sE|JUdBb;pYNHgq+I|LI6Jb4`uM8=FYLJ{09K;(6V#w z(l`ioG>$7BqY_-eP66WLRf9tjF2sn@uO(!kmXQ5nVaBt*y^Y#tN`TyN!9Gufr&iCjG979q{7mkyamy;plQ!K*;3Z0-`L$u}Wao0mWa zDq$U#c`$*^4@tOl2yLVf7EaLz4T7JJP{eq2Jb&#kBM8W$F;Y~TA<$cEsp2@-YGCk& z1uyjTS*jj6OWvVIL9PTO&DUS-_)6-Aw0*+?b}>0R6)L?|Tj)+rl*tpO#A&BKCf@Mc z*T(<%(T~PIeC(s~mw*2Lc>I}X#Nx$E;&1=)pW=_+|7Y4Y>r)~sF^|MkWHiCldY~y*KyCHWV4C;8>JzJ1&X5}>EHtf;E8Y1o#}wP_zTlHlBRjN} zY9AdV+eXF+(dZGQW8%2+F>A)OIPB2F;@Ek|#;GTt92cB-ZoK1-Z;HS9%MZo>_ctGn zzxnWo;sfu0f4t&lFUkDPn>WTMKKZHmvk&}L{PTbOTm0@?K2F=4&hdfx-Q@oZU`5aB zokyn5d)m|D&2M~t9CP$Bv31L~_~y626JNRL>)L8|4)k}~=Q)OIYDURp%xHHpdeq1) z&Uv|;i{BFR-S9!E$Jl;_?J4adUJ^lu)n%lvF6M?z5woS84|`RMgnXSi=NCP;ne%9Zj%phWFH`JSCp`#3yOO zb!Z?-n}m2ivAsi%Q`@VNBS*!E5hBHBPM;bF&6pJvCr`?i1=qJWZrm7GU$Y>tz5e>R z`IejF(#w7u_uPA5Ztpuf+M~UdyVW$IZ1lqnKClmB6TG$EwtahEkAB8epBjJuNAHU# zoOQOgmp$>dZ+yUanwL0Zv6rcK!e~(wZ@};p| zyN3^c`2WR!eEj3-pt+7*30J`&T?e?2TxA2Ymp(c4u*2fd{^XD1HLrYmtlzjH-uCWy z#W%nCJ$W~sC^Vis)E737!^wQKsf6U&5i+NoCS<j@UI?i*3#^ntZcw%H)l&F!e`4~he~G$Mt0CDyEmDHBE!*dgmJ#v6zxeZb_dDM%Ikwx?R-^)} z1?nR@gc5-jDj!1l@>jnS-~Qfr7#p!T>8& z9OUQz^Aqusm%J!8ZP^qb{Lo*=r#|)BT#coJq^$b`edvI901mg+QVry)Gc9}gSngqm z9U6c3hwqCwyyjK0VdJKF_aD43zVeN4RllPx2g#3omF29@x*<)s3~n;1B|nEM>e64FV|A}O|64EO`qOx~ln^3+2;lmtX3d(_ zv1rM{xa+RF^RrmD%i-O8>#cFit+&J-cPxyhcQ4ORN%@xnnWS9b!Z}j+j2ScHymOu& z?|R$YwB7!*c;%~K6Q`VfLX6Pr5qTUjtBxTr?mw8Q`)v@+Yv#KzA0+q@swq>Z#>-y( z()gqIygQxaR-KH#`@ z-H;<>+`2qrvyS})R5Mkmjw)P@rw^xfZamUYfcEof6ITOhhD`;?<5aj+=mf?j8&` z)Ro{Q^1erXFd8U@Ky$&NkhiN5K%vi9+=QuKx+j(3w@8%8jzZkVCqsb85q5p%7vKXD z{QBRC#~&BR9e=DGYe&A3(Z|ghIYB;a)}fW)*ioak8mu1o7&Cfo{xH&{$x~wX%$YH3 z=Jc2~>)@C+wfdj|H*xO1>#n%!nyce?S6-#<_T_Q&?YG5t=^H<8TyFawGN8Zco6@94 z2MhGygALioaoW6jvra_QiX`bEPEPLn9JtY3*z3+~ct=x^P;#_QI z)u>ojs_kzjQWYZ(titL_wM}4E2da;(5~+;Nzm0~e9u(+5+ilL&T%VjUVM2a$Z_cb) zF=OVeIO5PFWB$=c#xe7cjd@2_-+SD!VM8pqW}Ausel z(5RYU^`Vg+ETYf$)I{r}>@a=4J7A@aljHbo@7x|;+q>eVlTV6Qy!0jUvKPHDe^OxM z#?A4iuY4sw`Pt9J9k<<<4@K{=a0Ho{Ue`h0rJNm=XRnxOj2CSAE%UFOTbQygqJ` z6I^-U%9K0kpo8M*qmR~h`{X$6u)~7iXkNYg{(NVax*v2WN%M#5AM=OG+ZpJ#y)9b+ z2j%OHd??~+Pkm~<>+SE17ybSVV*1qSv3SYS_`-kxcm9;^t+(Bp&We-H4lBoM=u{x9 zOcSU3OCG4b0ylkHI$Gm7&$=LvKkm46K)?FUC2_+IH!1tTeZRBW9M2YrIbml&SCa?0 z2HDcn8d%ewC2Fvvlc%H09*2+Mq6 zqZ-Z-CVvnFF4PQLcvH*^x&a5j|bKao6%?v2Ojk)c=rJNtVdt zSJR$iU&_{?FS%yBb=#IW?2yCbdCz%HyyLBJj`N=Wv>2ro-PKoJ8z2AlXX2u7eIxF^ z`|dm*(6DH>iLf3=jd(M}%Ws3~*j{+y1#!{|C+LLN8<$*qSzLSVwOQmqI7sxCbJI?Q zxMxyxJRJom_1>PCHf?I0tA0BExcT{v=y!kcgShRs+oMCaQic!idZh;JtUR6UbdZHV zFjK2M!je34El*kVy#NE2Gt3`Km)i@^amc_9WU&ny=an{q<~mF4;2>QYXP~mv0eMMc z)F+t1RszQ%$5TOB2nIC(3!n&8Y206RPgr?8uw5?$SvTftO~h3}K3SVz+{pjRQyr8_ zlFF(|Wo9p^%e);Xqai4&**oxd2#M?&yaMDpl^rNNZr*I#v^kdFb5C4z?KN@N(xrLR zXy)`8+InjnK7YO@bVuBA#~rao4wbSGIVZWdpd0tRD-*05b8D;Bd8;P$nWvu~Z++vN z<2A2(WgK_xvH6jR?|ttF@lXH$@9~2l{V>+9TbF%K{|yV5=+2D0u99c{=8+Fb zlaGFMIt{Gb^^<2AP{xM>@3%J^;YJ(qOekp(3<@?|XmXxw&O$IaSGYE(OCDkMSh!rG z{>cGqwU=+XKn;n?K~~Qjnnye0TgkIoA4L{YG38BoZSqXR!Akb~yr%^RF5lkWdA zs#W8*I7of+%9p+@{`!L-idVnlC)9kn}bNq-J-vWW~{V>>;%l>&=8oc0y3|J`Kf&W0O!pr5@MUq-EOvN zx88AQeC|vC6aV?y&&A>;cjcohZ+PwN;-xQsNlcnBAt(I*RR>ACw`|>_6;EdzJMZXt z%j@3|fB4?_#8aO5#GLR~Tz*CTXZJ)iW(a?Z{4QCD$SS_Z&34! z5R`Fdlzj*KNdwE^f}v7pV@lR=o(UVhr8mmB;r0@u(|X-6@acobi9uAt_{XZzMg!s$t}3ak)F1Nmdr+b_rArw=k2a4e@`*bfG zd@=svpZ_f%CZ92DX1xCOuZ`zC`#H)V`G0a1+0)Y<+cb$MjGq+eKJA?Ni$8sTUT>Ut z_z|&o&ARx)m;O8cTr0`XDO|SV9!>rc`G$;7Lc0aJv>e+WOAbB80Aq!;_*_2cnMYn( z+}?$|kb@f0uI(z%H0p|9lXS=Znowln4GUz}KC+rI-)P>i9Z(HG6 zuQ8New#mBlQAAg6BAp-;LQ97F!|Qdv^HCNurD{7xD*%o|tP-o6D}+dUC0MN-s|Q*8 zwJqjK2-oEjgyN^uPPKKV8Lyd^O=L!83c#8A8XmouJuevu8OtG37tIizP9I=!GiUtR zF|lF&y7|*aJ6PkgzOZY4~W~zq`d6myO(3eR1R{>w(k0& zah0t8r#zwSBTjh}fDe%--()`ZGq>##2;tfB8N}g{SJnrto6vFcLCG^*hszL>w(b(- zQ!glW*nTj`_m~F3EzJ_-x~kF%mVoE(ur|w)W;?CHq`#G8tiWaN>IzQ9s~lieG8d4B z7>u_ZbFMlaql7q>yI=~{X)7cjg@a_238AcJH;e+r>B$EYvXkE_-n?Z~{P?Fok4rDD zez5D56Hbh0o^wu&A2&97@(hyfM=ZEYy>07u^+!vbc-#r`j<>xf-u~7%#c8LW92+-p zjPL*82l3&L{!RSX|9mO#UVgWnQd^83U9B4T3KVnEGEP6|xT&d38(KWz$b0G!K(MtR zAqQCvt9?6AROK0ELLJn%guoQ53- zaB~SMPrc|Qgii<`BF#KD-_EeAsY2RN!}-AVxEz2-dtJZV4jhu_egQ6T9ip zp%YmMK4Ar0;IO2I1|@Jhyd0fQ24TY{qLKx#&9nKIt*T~aSbbco9zODd846jQ{^Zt0 zQ7Eeu;nULB5ieEhjF=HzKAEf(bG2BfnKa0t6tEh`^U{_+WGm4|XgCe2$O8qgV{zy8 zwmWW(uYdDfvE;71V)WS2ao)M-#A&CT9Bpa`Z{j>sx7s|{$g7vU5%ZGYe^Gq+10RYv zzu`@B@a);KZ29u|&(D57KKTDW8sGfhcVgxJEA#iAJL(nNJ~_yGcnpfu#qQ>EegMf; ztHjp)NCls^1KfNYH(^|^fcIvbje2H{t08P2nwY{q!VbwMBWp7qrY=R=bJvkb{pbDD?osW*IWoH&UfG+j4ICv0I!RsH@Lw169!~%rEOmLCV5YJQXV4SRvLjsjB9=p+v0@5O?q7 z=n|Fr2N0g%zVrI4OD~BZ{`9Bm43C?CT%7yVb7I2yaoQGDtCdF*Xd}PD!wrvlN6w3P zy!p-Xkq>+zF1+Bpe5B{sms}Db`@4UPfBX2yV?L7!CQX_WlO|7+7^57aJqN=Mcqn=}VuFvnd4RZQ8Z~;=mL`hQ67_G# z=rJ*C=8Qb4fK_YOMsFuSH8S`osth;Z`l%ns?5?o9^P5+!kY$l^9_8S>Jp3{rl=TAQ z5FjKUa#`o?Ey}vV;9oTaNZ28`=0+(+GHzxgLnzIoAWe6E_0SG?rP)|l_pGbOc3g3e z?R0`AiJ8t#gaA?T`PY{oQj`I5M5H%m_yf_9WKe#rU`X$3DQzqrlsq$n(DZ3}YDY&R-7i1?0;fx^5GN%Y#&Z{x< zv4tO+qtB*IpO!n69-WBRtzI8pILNl@*+*a1GnAm6ZV zLZi$F)<@VJ$3D_!-O#=Qy*~7ngCs?WcDRlYTN?sC6ac|I1ft6ARdEz^ce;9ixhun- zx>H7o-zKWgv2CmrHPT3@Fky=hNe+B<0ijle+_grAyN1=XkF~+%RlH+w*H!D}8bzIpQg68xA1pUD(66bN}l0|Xj%{M0hpo8bcG4qdCeybcL zef;o7I>(;s^~`Bgrp0Ss@rwBOfB1)Z?JHjyQ>RYNPsIJpCq5p3@u3gKC6`~8D@>dt zH)4i$j2t^?cVO8(?jm=o(~zrSXb~qA-_Dt@aId&;WvpDi4yl+rWlBt)JXtc;E2(=5 zs$fRBI!r(d>C)kN>N46bXBnGKntV9jz5Ow6%*dEIV`_{X)sc^l@k;A9ZL$07%TJU+ zFFJ_3UQp^JLdLMFDb^&zNIe1 zHPQqE;*mrqb&jayAg)gm+WZD!2zmWdu;ZkfI%@|E$KMZN@^y@8k7di2#WmMntGfF0 z_iN@KJ3pQ0-b}uS8hG%VyQuSzJvQE^E%l%M@gK$Mr=2EVSN!~!7sp@!&Bx-?pZRnw zS+Y1rj~rD!+sI_zS-+EKYDP1kxQFmi-N~^pVfmV0eVC+QtJ?eJY*r_4%EU=A9S5o7 zw>K+%N?;BIsER5f&fzwdur!D3es)-;*~A&joKVMVi#>D3>=-q2bUstMV%5E|wR3x3 zrs%_7$ue6YuTX*OLU%noQZI6b?Ka;Th9GMXxL8YIc^#38gTs71eF?w zg;j!5J^t3KM}R`Qs9lw`>2JFZUPs1x%d>hHrdmsa$~eV!6!{2gKPx+&THcAqRH$-r zJn5gNrn7?wp+J9_IE{;$b@y9Go*`vx{_bmiSaSs?ZIovOWk}uim6WVVs8uE4HODP? z0MOpn9;?@^jyo4Fj4fNX#*|5uV&370rIX-mF%Rc0c0R(heS6G5=9qZfo8B0&eEG{_ z&YU^CYq?^53{U$Hzow{44dIY`Q+tO%VBy|J?1Qa5~eGd%Mx>vS_p*#ik|^IZCze}+be?q+ad6&FrybOf^OOva#J6z2PZf}#*CT7>9dN8r z$jXsbSvpR1At0a*0_Hsc@D`3=$y>K(O>Eq_A^EeW&xo;O#^$vzoAq!4jw65IOvD$A z-v38`7_WKdD`L*U2gORQ#6JG%&&G#8_OZD5vR}v6?OXG~@BCm#p5$sY9|s?H(41#J zGM0lJN4})t^b7->&(_VGW8K;{nI1cSOia`YvQ17s$J1VbQCXI>DfEC%2gKbgj9Sum zXl{mqo&56RjA>Icy>;uhSiW?5bjd;bLls6n1Cj^X9{9F}w0X9}U1)l+F`O;#ANXav z%QjUGk`&nO)}XF-HrZ|ELcBaA)%lM*)t!oOS4G^S!C6-2(9#7rTim|zj(odl&~L`%u@f3H<1Y3Lr!JG>ZY>W-ng37#w$U%N z341*R%J!9g36C~$#3}~~$F19Kpw@*^O||Ym_|U)twO3u-uhm=?cE})Bj>uvf+wkha zAL7-`8yqI9PYw;kgpfM9e(5{m$h)3OZzac-7~4lP3EdqkN0Q=f$w~Cd(c)lmj^u%Q zuw)t{S+jP)aQyv*tXeB4p0nGsrTVdV?m$kMJW(quOt;YwLAd{F6LaO*&9^eUs(GxdeU3vVP2(jVv0HIZxSEwEm z&H2N~r;Yl*T3hV3^){Q;@S%qun$B@o$B10aHj%cuWtEI(2p+S?qnt9NEnhlH;A_>R zbz(j0sH0-s*fE*8_cA^5j^#_Sm@5BOuq1eel55gKgWk$L1{?GtD+>@}x;x zxeN^KhYaZB>Y!91BTs~r;BGZ1qsN_bdc5~t?~HTLd77MkM_hZ&b@8#k`}_FH*T0(A zTe%t2(N^E3ro465y7JIEG@s*SIp8#TCCuNC#}zyAflHS!i)HuTlRTW`ym|AYN2}#s zIY>-o)*$5&5HHPVWJ2)FcXQyoJM6T|(ZS8IapT6usVAHmW5unlSTN@4% zT^{|!o4cr)hb*)8p$z&20@zFcKyItsgA87Yklv{B`Rk*x+n@ldC|ptHo~o5!MM!bK z8W)Be1gsHzlE*Xq6_1w=D@R#vrRi|ijcmlLFZginl8rYql`hO@rCB*rKtrm=078Zj zrHQkulq?RCM}YbiQY@EW%42Zkhb-!@!y6GLe8@okt4UV<-m;oNoJTWuG4UQ0V4}?` z4hdgd=TV;1A9H%V`yKDfw}RN3-gNV=@%R7wFY(Tcj(G=I$`>tK6pI!vO8%idj&;;L#aJd(|AqtRR3mvH1a^>= z^k_CY4|#gaIv~rK&kB;ynT;PiE>4nz;j}(-BLVwU_ zO&8~~FX>~;SbiV-f#Pg!S^u?(a9SN1=a*s_5Uls8syev1y|#3b5bl&*+#Gkdt7juI zb6_x4`Q)+*#|hIwWUG2B*IPA(HDxu7s@3U0lc}Myqv{HxRjs*N%uz<1h`SA4P-Vx1 z4ms-v8S1CKVE;Sd^F0_@mCk7$>LN7}Fsz&POp71O3okJ$&$P97g?Uc6+n z#!~f&&m$G|0sRQ-*`K`1msB84f4VOLL#SHnxfk~Um6NJgdDXvaby!iC6j$6zJ!?Mx zF}bU&kCdxcoVY$rLbh^bXz-en!(LrmtmJ4ApSq~F=mUeoTX}{lWvf*qgaqdcm4ux= zpr*5u#3AO&vFskjt(5Q~0tPq}uC1eT9{f1fhPCT+RaV{A$KZVfb+FRljTW30+hJe3 z+AYvuj4Du%vVN_~`_#wX+@$Dli5I@$dGV4LzCc^Oak1>~W$|zS{_*(QH!jLwBILui zTyxB_=&26&;8AS&`1n`>!jkVi=a;hk8*(tYitOdL&lknr%a$hlkU4YWgkz6Y-)fPt zi))dXR(D$hNk*`FgdBZSHCqO{3o4syCQg`;&zka(J?Y!-TquXWI_u#z&WGHI zb}ztCF_j=~=SaUnWozk2()6L_z`(9_4}b&WYGSoDu2y?KXsE-Hc`NK~G6%7$s&aeP zX1rQMqNn=lt?GMp3<^uwP5Otp(1GsKaANIQ7OP5290KXjw`rt>-r@!gM1mg&;{kQ@ zU@=hgQ6XDR%?}=OfNNq+nlL_QPSQIy+)&S-UmI0(q4|;=a?E}@>$4K=?Cgpo4xbmVdDW}qJ@0(Cw!$xtBMv=GjBQqR`?tTnBEI>(|Bcma*5_I2lyO%DH#f!Dg)@pL*tXXl=DJR8*i4z;ga#z5tW^+pn zm0yh1L7+YyGfzPrJm-)&`>ZD5bJ8SN)yJD|U_RUaL zm`AJWH=Lv|tigjAhLxw;LoiKHXyus0Iud296RI_3wb~=BR(k{05UWzvEg2-qN75@s z_>}iD7~P~Rx5+52Jx5?kw^{o1b3tg~77P{+aPvO64amMt-quDt*&V4UQ}^_ybx!o{(6?b_s> zar)_T%1I~Wxr`t9+7;*mXiq>B%4QolNRHdosngv0_5-Yzp~T4Zu(FAuSRU0E{i<{+4}m>B4ujfUxj(KAjucg@ z_**%)${~^Fb_#~`4hvpFxU;i26Cw#*d{yX%3+vGSZ&&? zc+GFsIfHADt>lS_w-Bn!vU*vPXM5MU3m|#`zyRl0=nk24P@H_yamnL*h}T?yod$l- zKA-*BN<%ZI&x{wp_(k!O7yf?Cnl&@Vj~f?r=N=p{f7wgp)vtVcZo|6SZu3YK-BBH$ z0hs50P`sL)eKC5>=s54Zb7KB+$7a?~fARD9$YGkwxr{^ZcE>FPnh!}S zUmh~^o67^In|192@-l(+U3c9LaYOxak@@qFiF3FqHF{Lutf~y$Ip_vxU%|0um3YMA zhsN(+_>4S`YuB#HpBr9#|LS~uWTH%>gR+MX_7ac|sw%T3DbO$WIz7uT~6(b2~oosZw}i+m+UX;Pnf;)z;; zu(hv`O7;tp0zV8 ztgoBPG^d;O?o8Jng5$xfvbWrRTU_xwZDBjRwdx-ir=EIh9HG@4!>5d&A>x219qa>N&!=e(YMqUPeau)4z z!tp2M2PnWb*IpMl-gK+vG$y2zyWH8Gkh^xMI-CzI=QJ3KXIN*myu;zj?FBd&eQqG@`OBomtS>t+;-cY z%ImGR*ZVq#C|;@ zFR0>`NnR(qACTn{aUH@;;Xn;!pz4!o14dT7N-sRi8D+ijk=e0e{@-!O?Q!+h3(_H%*uHIhTz|t&`7ziO9d0sJhpGZ1YEShnV0HcRkhztE zy#9t8^7eLb8Ec_vWC_Y(q1j* zr_vzFG3t44GL_YQc)1N1)j@(V)tezSc$unTo>ZBiTO$qbuI-&MYsRcN|J?I(1p*da zcU@d{&DDAHgX>583LG9cN>;938Q=c?cjAXX{&8$ryDooXb)~jqKlt%a;#=SSZfx7W zeaH8rOJKW+Zc`ij~qA%`Cp z&w0+XV*2zcIv#y-{k02X!8M!+b%Jf%$?+TxJ`OgW&;;MKGdSORtZN^E8io=;wWkz3 z$kh;%=h=f}nSBx1mKA!V?&x&WB_w?i~yJtmwPY!G8@_SUh+zS(NPX~AtD9?2> zKKgpq)mO#e|MNe_Km5x-$G?C4Kl0sZ;+OsIw<%{D7PNTta*pWb@#)jhis}g9`Tu zHp2bjN&tpo0BOjT!KZRUyfr*ZR*&{nH)Y84*CHz}Kzqf5&{1(JU6r0HgkP1Z>Mrx0 z2jArz@O4N1;n(Rh!OBL`E%_bE+Cf6utpaz!QyY#Hs}#pEvIS@0;Y{`6%Ss%{=a(SRd@_g&@S?6Dn54c};`4#bftx)+K z7{43cn4oo+XFn8uktqAh`E{`doCliob_UDtNtxY*PbRBZugPnD^XJdcZT8IR)AEyJ zH{WzitlPLDS|zi;jw53S=g6nz+S*&={PWL^cf9Sb`FrB@`9 z2kE|cQA~$?Y{1U?wJdM>Qr|wnDmxY$FcO4h)!Y9+ly- zaVNMH@&IY_;dz-`yOTy)WFQ;rvNqoJSQj894?+%DZbu+dbrIJ~dwTj~^Oi07X|cZi z?HX3Nl&&@A*1E2pfeqml(=hmokWVyG=at*>l!Z4yIk>gz+PZyPw&lrBJUia>+SkOX zC!dI9Ty@pe@vU!vD^{;swMWisPrx>qhqn0?8K2w(O0y^E3Y%ZL9zH zd*9FZ;q!G)V{fW$?lT6gu{(WQ_WgeDe}*4qwXVu@zg%Den_xMbQZ`|)W*LRu#a0T> z#sNDzU>>qi>7C63=z-_5gyfZt1EkA3-5ASOI=PC;n>v+tWQbX|MD?DmaurUVI4M5| zHFL%kImxZDb!(^cDC?5Aa#_|oO3Lb+B>nJ|&vTTl7;%^hS((qhDb1rpSexclHaTQq z^E0QLm_TF4#QEo)7w>+@JL9ag&dLk^-1+_2Pku6f`ioy=iGA80?E*MnK2keo^ynBZ zhskxS-2&#Afcle*BNOBVMvoeqZQLT~*rf@Yrb9G_18KNhNn#tWYN+?c5G#%JtslKTo)j^MOY zPmQ;~?Je>2r*gfsB^E7Q7+?J2f5)}g-Kdp&M~ z_!t0s)}~P!s@~bC&R1_H=cj57rN_S1UVia-9 zw&A$MPrU-GJ+|?E+!03}9-?jeQwrRXX4`elyrbh~FM3J-7WCsE_t>0ZciwSl{D1%W zkMVV_9$9U$%ELJxCSjtxM?TggsN88seK3i$M{;MmH&#BtK!HbkBGw$Jv1gwniNMJ zHBTqszF2zq-LYoPnv`W6>?v@rtPD9ZKl$vlT4K<*($f zh&P!A9n-R@#NF>@+-S}NPL~AAuvrfB@xm%$iC?5(-u}+>8+c$ z=W}QWA3Q6b^n@qG+urb|c+m@gKjzIlk^*tvb=Sv#ec_AojsN|QR~wr`Kl-k#{{>B_e}cn3U*c$qE@GM~5RUNv`&Vh~bj7^GkBFHwXThZ_NC;sIhC$C+EE-$u z63ta0Vjdy==>BqX`hBSWEqRU;f-?Rv!frW8`o+Tpp8LxM%du@a_n}et7y8f(nk%>5 zP$+d^19h2azRMEdJy3!R<*jmFEiq}__;}6BUlPwe@0^%DXLih)bx`B=yN&BN>P){l zuD$W*xMsnEShVD>Sb5*-*tBI+Zk74kH;-=giMakrOZm(%+j4%SeZWL@D$(kUioOEi;o;@p93){4+T)ARp{PNeoj!%B!zv2c>791+uYMxbWG!B%V;qW1X zbdXxv@S5VEzweLZ?QeN=zK?z7HN3%bd$hN=X~8Xn%l0&5sP;6=yY2f3`kuFlmfy1? zzWTLq#4WepmM2a836E3lFL=e*s`m3$o%g)w-SN0H&WI_KCT1S5kpAl8U&W7q_OrNa z$&&o$XCC(^RF{Mz#*7;qC!Kn7Jonkpj?+##DJD&vD973pH{X0qeC`WhiqC%G^Up%>5usfz1wfM042LMdqd{jxRn~#0uBk`s;yrIGG)#@yFjt`(c zI|JQ=DeM6F(Cs_l^WM1Z(kt?bf^_6*?EZlrTRKUdG|xQqjCkG)p06Fmx!QIgDnnXh z>$a`2LXLXF#!cxo^SC#G$EYxz?>bJOK0OYaU40?^{`*%~pOO3ax8f&1zc}vKPG^jE z9(hv_J*6s-3r`&K;F%9Rwt({qn`N!nJj)m*e<_v9@2Og+`Na1JSOIb|yQil!CQO(R2hTn@ z<{frOoN(OH@whV|A4eZGFQ!hK6ywH^&oeV%Aa`ld_w@BfcUO9X?xa|*WoyO zBg+MHz*{hzc$7%n_q&%bkIOE*JTCd&@8YK0?u=FUu2lV7^HGd;P1@ErwN%^n1f7u` zsR-9O^Feem2tacuGZD!3E6CA0G5p0J{&772`OlRpGDfH3J@PkYyBr@1)>+EX zZV#jqL+~la*UUK<@BhFD;+iWLBtJiZyB{5-!E=aQf}o$~&Yc@)X?y&F=RG%0Jo%)U zt`q0jv14n=U4yr+)~sI_cP?BMKltH~bKs~NVX3?E`>I7sXRgiJ>}qWYnhw4L@7x=(SQ@JisoAg?z{KCxc;V_sIiAvH~BdX#uUG0z2csG zzKGVc<@gJSE1D9~WcgIHyjT9MeVoq$aD*QQBIvO5jG$ zmd%?LZqBXurY&2wE$4TW*T%XH;;mmBomy>njL_<`V}vHD+M{h&zLm~zb!Y1!wX{tk zZ|3wWZgx5xMKWGf3HT2p=r^2>pU>NE&<+l+2NQ9(jW+qfGZ4yl6E^coIN#+X4%?hgb!w$f3mkJ>c`W=@|HvuDnVNs}h$S9qpqMahjA?m)9k*|>4D#?P8qx$?f) zv~FYEud&42Po3J0@XTe$NbNdu45@*%mv%z#6ZcQqPtFJMou;4MUyeJE5R^JfJ%BO* ze(97+6L+~%-$M-PAZ;&B%-dyv-8ez|#SV@*umg1a%DyuJ>qC!uC0wS&u6V>DY$kjl zz+FhT&G;nWh=E6(0XdqRFxsYZv7hf8vKnM7jdSSf?viumhp^aoGZ6`SRZ!!G>q9NP z8ROBT9^;NW51;ob&cNb&CR-((V_w@-t9h={7e^Z37p!~3gRzPIK*J7zaF4dC?h2Ym z8%*Wka~!p9Cn)9jqTSdz=+5e&-C`bo!^al)8_$CC@A$5z)6`N<9cm>So>S$T5& z+qGlKor_kPts~?Z^CT*z*i19%%N#>>+&n^fMN=Dm!~N_&b{WgTN5**&dG0Ur0DRkI z*-{R`2PN+zfR-t8ke*N22D$xiA8`l|u%tz~6np2bDgeB*kSoFkd_wZqod-gJ&tkI+)&CCutkdh$2B zah&<1V(^uX91ara*aly$UUZVDGO1rt9|(Z1J#kPECD2u%G{5S;s*Ut5X^6N7R&#T$ zXHVdI9PSL(zbm<&pmLNbsvV}{)klX5XsER6*ykkx4J;08t{5{?%eV-(n1F3$0wW9G zJksvZrYai_wgl<2d|40W;iHSNB;azEA1?k7K+7aK$c%`Xs-^P-B@dahU*VT+Nku|) z``l)S=%6ehP5-0cbpT|`{slfxrQAaSZkHYBVBiS3{-)R(-Eb_`_{PsL*3Fj-x44FF_N%dn~-d^kGEx;fbt10HF*i?D89g9ki#fb*O#;XKeB zFAt6RLt!`_#!$SSq0p5M(rH53)Y^+-bs9pyCk0s^hGierMH1$fupWoafM?xh9i{W6 zEbuWPk9euKlyw}~zGj&R89ALG+RK!5dqC-s2;By!OOU2LWq%oNr~AZxYc!_;vhdM2 zRK3l0JeX*-PY#IfSw*tDl}B1COLz25Fld=u2Z&2P-@ak>C}&xhPhO_Q=aofPp8ebv zuVwN^j*<`^g?g9GUK9go`fx+Gqlz|ArX6?FEKk~9>pVj8%rEtnG6wN7y(^UZfXfdx zDTadOO+t>Tyz$3t0`(TU$Zy1H6ZMx=4lQKhfs)_c7Y>1Smh#O&FXIg|N*%;aJJT~1 z+{OnHjTK~R3vF?Knoryqj>ndm(3{2KVBMh9Rq}!Jfb$t^z$dAl)pH=wY-0tF4sx6e z4{47IKM&v*7}}O+o(6xe*99Ky$(4i3wsM2R<=_*dv$#mX$`uw>rYSgA^-yC)iyp<9 zTss>7$N)`s_j}-&SFUK_IUiWwWnBhX>RMtPfacb2t>5WgzST99Q^+Wjg?TV7)Gf zEOF!=KTx0!+XorugR(ugrEDv4%L3~$|3KQm3&@np3fpR1YvD@3jF3gqf9r;IbOmtP;*%WzRQ;~pt*b* zIu7~patNDYSrf1hP{t1wN*fL8blUYJ14x_a(6Y^CN}Uf9WHu`iTQnG@y`@BR8X#-_ zaP4xLp~^R>0dB$l3ean}V0q$pCFVDm zCvBIqztN|fyv_py_G59g`*f}`bg#9@@m1fgtnPVd86s@2vy64P_v_Z;9C-|=+&1%p z-+b#vGTg+m3drUVF9H9N3KsPcgTs9U951`q{op<_xvcxoH$`l_`MHOdt}5>1mv^<1m5%Jlx);jon>&Uy`OW-C0%%uBz+LJ# zmwd-dl(IvCJeMnFNwUX4_WwcbP}LN4MlH|G5fx|~S=mrL8 zdHy#Km}i-iPaie+8!+E_!1-mKc_myQdDKPPJV4wwxV&xgP$=zm{mptF2-sG)!*K)K zAP-~P?Y7%?VEe6WcY!SW+*bz(GRqbY59gNl(8l3xv+eE&r>zIR%a=79cU=)9*o_yq=My|X8kUYb;e@O}3hwRN-+ zr;Mv3EYpu9(58|=83$$B-CXviL(7@WGb~GAI)vam&#(^iIUY^}r-91@%UEA?8kEQR zK*RMnli{`j^9ivPz6qW~_ZhUia5>j;0O0Q3C9t6++O;#=%rB22pbTloA~I!vSl@6u z0W#DLEW0!L9f1bB)w1@%AZN$i!L{vq-A!mzQ1%iUoyJC-qzTkL#~tgunIk@r{!lEh zM-o>#@_56>AX+3F7>f5uN7)z6?dO;{pF_|br~5%UIEE@yqLd}i1K9ksjN{}XN7{9| z+)zN?c0Aa?2B>V8L$|qXJ0O3kHkdaYTy7}rtlVzG=It@Ct8B+`*j3vM%k8YKj1y?z z+wGc%)&!T1f%d(wVPM~v*A5{idZD65-i*ojui+^qk8+vRpS%XiHAl+VJ>!*SZm|^t zHy4!g|Er)6hU*9CnLNqem%zsWlzEO50_1?xrJM&?SspkKSeNT-)>GHLysVh?0S48T)sUvo=qu-$N7#HU4z!8X3HGiYA9Xu8!+agNtUz&A zfqnI8NeAiE335PAv?0UI8R9D5)*9WNeA#8Qiu6Rs$k8#fqdi*NTC}@XdHrYN_Vx6| z*3DZb!f)Y>%AarGwYB`X!G46D4_~6$wryL+`Rtp2rEh=M=elr=+cs~`&xLiUZTxbg z+h!TU{N$Pl8NPCE?6FO#q)4T@>SO7LIy<*lU)a%!h#PqwBS*xjF{87NtjA@5brgCM z9C9W#e1~Oy4omC@C$QTn>vw#2>MzTASOd4)a9b_oG$Fh)Z8+V`b6E2C0*zM<(*P^3 z#`FUUx20?oahp=ELLd6TT2_a=E8TqL;4`Xd8ENiBE8Q#S2a8oDlRIA@6yY454_dWa zR34wjnlfopoO;s9(a}C4ZoT8SxaXb~(%7FLS*#-Z$Q zCyA55IpTnhKmPc<1bWNux5Z{TFzVrxT>A^OzemK6o}GHqi7|ERw7B7>n_~Gr_oN-P z4PXy6@5m$LB-zAo2;F?k&AIAs!*SJedkeR@Tm5;^tXXl!>5qvSGiF5R*6nfmmA{KS z?z}TkNP~W;zZuLso565!*le2TCx?tY(!?LENnu;}w0?%9%K}dWx5fExe>H@wys}(# z8rYUnmw9`Mwo(4s*V4#+RJu2yN}FI1FUQ5c!@86``3RRZ+pvI^4IfjxcTP%sRug|oDEeIQn#HZli$dErOhiHt9jJNPp2L{dv<)_ zPv0MBJ@yRQvmowUxhj9#1z5*`<^c?)6Ab0V$>lqnGp0|Ek9_d2;yrJFha6^q+Ew*A+ki)h}ghuN=1esA^ellm1axS$F=a>Mv~q z)RCVg6aS#uGvlpqd}F-i_g|>^LGh#~J~57;e|#*yYl%);_vG;ysvU`vP2A*x50(68 zda$s!^;5>fpEeq0_gZh+c26g#%Q!F(IM3lepqeEQ5e(H9c>CDKs-tqiDUzQNb5HIe z8hSFd6Ubuf;=7K0a&)x*Kl3EcrRS5HIJaU+6BMwoA2Eu{nvybpA(Mm;M{@%#Q zjt)7BY4P~So}OPhXTmaZAwJ-H=ILj~{9}%ZiQ~sd2fvAf{u-?AHm+F{8&|K+aLbl0 zbx!4gHmqMC8`iChjceCda?r+&SqEU!vl>Nilk$2tZAu*@wY?lOc1*oO>&q>7>Zt44 zBpoxS8jz9a$zlwkR_$TAgLl2EtzVxLrd)CZstIO;Wnu~b&Je)zBd`LYN;F(Vd-)%43 zT!sv-GSBixb9yf^u!01x(3Lh|>%k704}D;Mb{K7t6KcH1w}c=?rZ3G&De1=2YpD;ZXmnNEeNgUQyVNq6wUbK)saJUb>$nwUS(bjO|A zLf?H?Zu@X>T$6kE+us#O9d%T0DKEL~@>p=~wds(!c6a=7$Hh~g`t&$WTf<}L&(9U$ ziWMu;flQk^HRg+V$lSSc#8LC&th3IJW0Ypg$j_s)0>v5edprDK{S(eUJB~W$*qAeC zj-2x8xsv_G#TUmaty&K|?65fdiBF0%9(!iiGfGZn)8!n)?_tK;Hd{Yoq7o|t>^+<4kko~#qgW3>`LK5bfl&)qRa?S9N- z9uw1ave~$KgPdEnYG-A9(upU=s4-)*|8T%KzH#Hn#fzW+{QL>uPksJ#@vEQyMBDgV zvQN)edvCw}wz&0cGAfjO!#s#MKCcH-T^>v+!9nueB46ap z)njc(KGuUsM^%@$gXut7LDmj79i*JoTsfnsJ@u*S5L;VE#7M2AF8}RsW1UuO{I1IU zV~>lsyy11)>fN2Xxc+w4f@|`}!%jZsl=#y>{v$b%=gUFNj~B|3%$s*)TzlPhvGTr^ z@r1L^ivRb)55~)0{E|5JwA17C(@u%=&pR)kaOPuU!SxGb#l82X(|z`Z7slUy)CzRuh>m#8D_$8N`O6QaBj%Domz-h#G)1<)>K+^v4~bOXN&fuU;8r#*B^kyyG45_P4wx)~sF= z*WGlZ4im?vB}UNC^N)*Tk3BZ7x_Uuer~aL!75#Rd-Ge3<$$ac|=5JfFGO>GJNtYbddUEitB@Tf>$;h3tG=l}Qje;03k z=R4z{{_Wr8EKZ0&c=x+v+O(;vvNaAm=-`+>ZF*dK>80_mcfTh-|AjBa(MKH_uXyo` z)5$#c%rmq?eS0ikvLycGFa9F_w8H_Lg9=Eg*a+M%v(?`Vt7TQ|kWKlO=t#j9T( zANuPL$JlY>@mm01;(j#$sN$^04D_LzIf;W{Smvgxz& zs@J?R{#k9GK4WIQ`jxMWO&c~zeqkJO#Jrew&>>ohwrV9lDo)p`vR96F(c*>1FBqhl+L zUP9?*l4SQ~g+!__9jf{_x83j%s-5Oez@+Pt16r}-p7{QczaQhrO^6ph|AjG8E34VF zX2cn%og51^ak+b2{oq)?ChN$!Kr6wcjyxiM@Z+Dv*T4PkxOu^X_|#`Vqb>0-;)&WW zpDpT;1KA?SbIrBa#FxJG#kf&2*Is{p{s!}j$Da^~9x^w6PpilA+UEZ2Cq5BB|M}13 zs^4A_|MjIW#qD?A5hGQe>!Vxba6bR}|B9=%y`4F2TCBc*ZLHI(@~9(^$}RmBzx%CL zXrtr!6He5*qBCaAn32xv*Oy(c72k3#`dgBkLC?Tv1-E_c*7)8Jz909kyf4l>=jl38 z%#BHtCdF~b9hWQJn{U1?+s-PJJN%0lE{?B!6H49?a%<0jtEq=fH|FFXk&)>$r z=<65d7W!zWop2_^Wm=stUbIMU>xfZuwj;IrZ*A#~^=nthop&sX!{#2U zmFcVEf@eN6?p?Jqog;1Jhqbr?l!v*X|I^@*HXqiK=TOsNkeodhe1m-Y(|t;w1(k|UXPN(=#nX&X8T z(Lo)e>@JR`R*9?-^EJR)f7XMnoM^rps5~4saddH1@_Hmx^m&sV}j3!N;nl~)osV(Z?{oUWk>t6r5I8x~u)A*^}DRPik#-c?_;@G2) zifJ=vYK3}KZp**>{qN?@nw>r(1M%khs*N6Rl;P8d5rUjD+D#?zkk#Q56RzZ~y--@D^)|Nb9h%&774 z_BXyc9{ZS6qg#%@MPq|2Jk^5={na7Y@f<`|iypb)SlPh==7K@v8PFyG4;ez2vz!4R z8S|{OEVH|yOcOX>4c+BXG#?tG-0(oyl<-8yazba;yi(S2cM2%uJA>sMmIN>PY7LGE zX9e6qgm_B@hnDiS&5d%R66RTsL^@T)Qz!b^KI1eM&t9%S%tkbwZ(X@{qehL^N@+!0^bM_ir2E2Wo*!pF@rki)#l5lQF0CGGXO&8%lYf5L zCMT_&N8}9zt=7oRdXTB^__9SruwQlI`}2;h?WxhCeDsWwE$!_cd5w_l3!d?e_}KsZ zYpuY>#V0=X$@u8UJ{DJNRXb8ES#Ba-rB&9iFS{fTK4?xn|Jl!tv!3v{xclygrc;@GjH_L>-isVX7q4~VKjLvFS=Oo9WG=4(Wb>NI}5KxX-Zji|Cj4K~1k-7=h zOMKaz?QynIWwI_6NIp(iyp*dQXoeC`z4U<+4gJc?2g4O@uG1i|0NZSS)QOumcieGD ztX;i2Ui->d#tHL}i%TxKB-XB58zZ!Zq8wp5OlNcjIgS{XcQ{(q*|)%VtPzC)fOLzg^B~OuX!+FOP#} z&5mp3G`DTpBIn$mTjeQQX}0OuU{gBh5=!F4JGDyV5&+Ki4X=4^{QmQv8&_U=xg6aU zDqB6MUOnp=al{cv<}hF@ed)zNk2_R9i}w6&Y1O%Q&04J%f1M|W^PX{T9DexR_~oxI zjuk6c=9a!XHXYKYRk@BY*IPHs-mP17JX=P@w(Xsxl7VCy6&wMfmM=`ma^} zN?gOOtuLLX7V9xWVLQjZ#y~6kHB@<>QZZA-et07Lt_Jav47ZJe2A?!tLs;ek_{fy9 z#z1!thGk0GVUX(v9iJrPI83PI0o%Vzoi^45iQqtZRjwC;hfqDxkV7d)o>MYgOGc|f zew!ReZc7!y0tv#>EItasy{DS}Uxv6UJ#PeNTMpt6!7j>4?Al zix0%p&pjv3e%zVys#m@&PB`I&>L!iaii2hai{m?1+h1-1J?nyJeBe+2IHpaXmM4Kkv6>vkD~6*-MTZ>x zRynE5uDD9FGgWs>T%V6Lbw*pqDA_$m4o?nE9k*Q$Y}APiaz+`atox_bU7|W1 z0~kg=KUTq@L7uP?&+MuUQv|#0Q{X{Ef`Vn?hM<@nSv#X#b=88U9DI(xd`hDeaIQEP z;we{WxEzG;w9q=m%&06Ugy7{0jsi7ka6@sy9}X6wx=g5Sp7|jv!5P+$I_tN7708uo zEtC8-s>-W`i*N`OSxn^4?#@^)M|JPY`!$(bVxt@ckCpsF^h=&WTqQoMtIqBDs0mw6 zwwX6;LjUW>KOSr3yk4o*=3ji^1M&RlJSQ&w?d9>Q&wVa7Zrl`I-Cgsz9`r!T(zm9NKw>lWm5o~`_3Z_XmX z#S7e`mm)xVTRSADm~3R#n+{ZCrd?y36(&xTbt@*|F!P_xU%GYR_#m6cP3lz#7#V$~v!)yH< z=vpF=P63i+Rf4s?nvq2q2?MNLIrieba3Xb{D`f=u=;vxs#A%(;q#!{V{7B%1{b2RjrR_Bd3zv_k`*k%#W+to7HY6m1I|*Cw+LWFP>O zxD}T1;la%k9)_McVL}{p)KR&myK~{4`IbkACiijkkCvm_6!*zVaie4E)TwdAVTZ+9 zO>%Cc@MsFx|9DXRkb@7FsqN{kZo1``xc$yMb89(s+VnX5$RlF&#*J~u!iD)z^rXp? z<4EaY0^fMkO}P@|fpQ*_o;ZF|I#BfUFgg0}T)a4)GWqk4oTuJsi@WY#qHfYeSDlL% zEshoUt*Tx(pm{B8|_-h9J|ZT05O+v1Kp?$maE zd>lRR$e1~6MmpLx>(=LUlKp)>amy{YYJ0pXCQq6WfB4?_#B-nf?D&&E|3Limm%qvt z9?zHJoH$N6C!VqF)wtzG)N#ihqm}V!9iN`KM=SK(<)Alj-jw}WFCc69_9%a$n%CUecC%vY;%0{&B@>)2DRM5$omd~M5przKXFE$i*Cx?} zKAa>sO{kkUQ&>%PZAbUk$|$Mfx*^Ux>(`bZUA!{b%Nr@mZ>#Ty(_|j+8KbT5*=L;{ zfArq>#=<*qi@*Bo|EKNk-Raa`{G#8F^Pcv!c>iDiRV-S(ByXVPwN$!GgdW<;RXSd6 zWc$lI<(p+U?Lj|nR^_s@Q;u|0I>&Bp-?wkuo_$rV3K&F%AT%Fu#tnoVV~2dk z59#X5NL5;MLs|Vf&iH7F0-c~+7{9WMpMJ~w)5)m>fn@ShyvAUzx)D%*e?RYsQy23@ z^)N;$mvc+)LoVaC&9*j!3Wv+v4?sPH3AhH}G-27bmWAgyrZtCqfRY~n6regi6-d0Ae$*v1Va^wK7rPC7~D zr63vDR%+dMFfp0rAm21m-R2QzViMv=pps`fLIWM1%sVRskOd_VAPdjs0INN=$s7t+ zdwgZ6PjvcYPKlSl>}7HOdC!c6T5bOEpZ;mweA}&ZYHjJL=gdAhUnk^_c4u#woQ>K@ zU)SAO)s5cj3r4JLf$hoqWe4wA(-xc?H(}%|@^W>5eR8kbrV-iQrxp2;@#=GvqKUk*mr&&LHF9GKjgO3{Pq+ z9R=Xkx(EO@Vj%BOP<0$ zbs#I(gXbI+r=D_3%$zYJZoc{E`1K{1M!QaK9eFcFdlRiXxzmOQY|4I`Q&L+;*2v+i>Z^Q#?oa=X8PrYVA;q(pWV0=94`p>y(7&Gkk!qVx4iaRpYR#V# zY{&cLJS(Tk=$4{XqfpK1=j5V!n)91E#T*3$S!X4eg>o^14l$C4JjuGu{y^4Qgs5)r zwi4v04Vl_&3^+)Gl>2%J<*+%|4a#qK)#ba3x-;|SF{QKxvUE+waN+O0NM z4?wjgzeVll8fW#<<=Q46S2`@KRf2TRSs}-GEt^3h*O+_z8Cic7O*l?SmDmh+RlVhh zK=$+w4wAO|7z_cj202Jd*Jqt-^(O^{4JU^}Iug>^D{B)!KhU6PiXoQ@YHCJ3IP#zo z*I>vvRxlvYP5Ih&v3hJcNV4*e$b+o1pA>@wRGX5)DATqI9%UJh1}y}6wxur+=1z7m zCj?3~Ykn9Z+fqdn&1nNZ1j;6x*95kttZZoGc3R| z^h$;;0&$*sOqs!Y;dV$*tL))y$^h~3-W|BbXvIPZ4tGtf6|y*Nvm0mE!Sz2ZfY~(6 z9n+jHK{Mf#PuCmphk|r*;~*!lyN9wyeVCI^zTtG456mNN+AqMxRPKdgn>$a%8QyG8 z;Nd9q-c1@nCqNj46C)0vlQ*yodC2g^r=dVCltD3NNE3P;>T^w_s z65*NPd~!*<_9L378;!GR4ohH~Wtxyh23>>nV74-WvOctc#X0}d$B|2fPRqia zQB*LU0tbNFiCeL)P+qPw;a7)dSSu5iiHVF-Ir@?J!6yS56~mCED@ z)!CZ$a)uq^AnpQ`v@TkLtIbs;93EMsUvia;#KREotg>sW?yC3(&4UlzAudD5xcQdZ zSyxluUFLdhL#fO4lrYa^G}}UYI9psFDD;>$5UD_Rx-3n2RPy!_SN1ZMCufbUETccE zt5%rOc36Nof_AFNl}5T^;vVzJxeWZu=~X-$3$b{xo=Pvba=10aH`Q4;@^od7%5zhv zO0%-m+~{l9lu@3>aIYj>BXhSWo1=N7ogms;@>ylupv-JE^^;WnITxe>${nXdMAA`a zq^5m@kFiyun&$gBlXeKfC%=>jb=t)SfIyu|l=>)d>SgJzjH+EKo}>a9l0gYFIcP4O z!bM#CbR58WI|ByQX8x*K+hhfOk=T%;K?97gWsRjWt1dk#7e0_a9N_X;aB zYP+h8hbL$PL>t@=ca?c1za;bNAoJW|rHti_GVOebLtKLLL!p#++`|x1uFM;X$hS-l zo9y9dVu-PrVqWx#c#MXJ*7-rP9%T&t;v(~g0#XX4HVi9`bLH^JPj^%UK6A<|LS&I6 zT`yV`GmouupKnyA9-Ow^qUvrDwc*tCk5hVYmgy2NN3S^5ZmOL*gS_G$$*m3`*Mr-% zljA{lmKNz4T^HMJ<{M6tIY{9&OtX#-tF27=+=fHUNOY6eOnV5_P)$kAJk%1pdw{De zWdw>2Ms24Llgj{{BG+Cj-$n<}5t&shCc`BNtAkgetQnqV%QCwQWUT|r!&%3%T4YC^ zMk`vYrzSv&s^5yty#OWAi7s3%HZVBzf;MMS>d#7D^TP~PlPaPKWmlC=g6}-b0`rF= zVA-K`m35Z+LxFsc=4O4i-{ky~c9ypjG|a4R#tHVw5%ehJ3QLbpl)a*E#Yy*b;)GJK zl@qcZ^?YIM65+4pj_H?HmI6MBe$Z??w zYE^!9ONY03G@mq|`AK1##^oqv^5%|+m2zK8wFS@X4mdjm@d0eb(_xC2mz?Sva@Pkc zP1RY3dSJn;QAC>(yGGhjMH5b&=(;kE`Z7&^fx%mB`clNf_SJ*zf1zL7g%)oc=_Jk+ zoFxE?2f+;TiKD5k*;auvzBix_x4Nh=&rsU7kd@EJRdTk3b5=F9D%Wc3_Qn!)I^>ED zTWvZqb>S@OGpK$}?_mcz%BBx@7!7!ID*RFwSl;=hA>fcQP zt0JT!#9c+*45v9H10X|i*#?Qx!n1umrh~>@LMz%(jGB^MQjJYA&!}rpl<~cRb(bCK zG_6-W56}R}tq)n22BaymH$ac6y4@qKd3KaW4l*I#khW0!!wfX642|YAfJdhel}FR- zLox`+nt=0%(nXwn=Mi@rz#FQ}P&SpkW}6K73=9t^Ld!Pm6JRw+e@bE=;l$FJNl%{= zJX2e(HnrNzG>>kx0_8fNHpP&Ha(hm`%H=On%Av42r7Xnu9(~qTZTaQaB%Ae6uAa92 zt*j(*cpCNno!aPd-H~_Vs)y)FvGU{;&;9#qok&i#1*Z#en7Kj6*(SMxs=@t(WIB45 zAa$ej(IB+Ik|1+~>zBC#B@N#P#)=4QDxyVX&wy$`(X6i~;CQXNW!9luLDJ&79_DYi z1Q-i2^R6r<^66*^(x5D0Eue0216GJvK+b962O6$NHgUjs#3#>03UkZL;m5AlTsaa0 zSV$|}G9RM70X^0&O}w>`-IXTkkI$Y7Y^$T7U_a!rzig`pRRua2y(a5+n*8#Bzyp>w zStoJJ1Bb4Me8V~+%K^&}mh~Af1K=}w2(7;?KMYEBB^VwozHAPvvuVn}ar%l4CvsMf zRFci8>)zqKiw$+2fs@NsV;#~tty;a|kE(0&tQ9MF$SRQ(@7*wxly zeWX1#C{7weZw+c5$bg#b*`eplG{O)XOM-`L;xuX~#Rn3$i{ZpUQvKPEs)KEbEyK!z z+<_3lhxP>MudYWj7?LH0I=~v}6;ELfEG2ClX|mz%RjmgQ*yVQY3m6jBh^w0Cw0Q<~ zl{}}LspL1?2akE{d{D}}i%TAW=K*1zgqDL3oM%1e?*dj;62LF82Jvvn;YyfeMkXoV zQy0k9qVts|3V+aw6=ofpDyPP3)I8}?Tl2=N!q!|2;SveGUgUyNcV3-jWy?yG{>e9P z@`R7$t9O@av?@gzyG&%$88Q!vL+GyM5*R5N${NlPj>s5?~88T!7=a~d?u8fAPp(NLp5IV?o@#q{a`|OGtpaHh>qTzX;1(In=CSe5d7#x{OKz2GM@OHeb3=*ZbsZTY zq#;fZq7q7{O;xmVq7Vspyyj3EDqhwp0y$R*OXgm}^%uvsy6S2MP#ptFomtW#aq?~x zOJA0{+~PoDS4Qol!FvriMt0`)kJ^rW9D$Cv_0=$_T2Z;k%DGjSq}e8SD@3YtqUrL6 z1$hH9Xr(7L+j(e~tLgbh4?N{DsED(7$^j%h^KPK>(q`lyp`f`wM8N5tkx|Bh(`8r^ zXifv-ba8VCahNP`o@Gh`=7V~e?JH1+Dyuy(sI;?rZk2Os(<+Xy8nLOSQEau@j8_lx z)UWbNuKMhn2m_PQBT98cSUd!4cp!{Y<_1(3&dwlS+0aPiFxkfMQ60Mgx(aG~P`r*- z0Y1CF^r()>>j_HudIR^lEjY++kO#=~=po;-hUE?fs0%wG;&N~PE+p@^w%Gy6u51tX z(LVS>9t^f3H9s92clH=8J*jn|ZPi`yS~5d&SaWh2o9jK*>QTL!clH#`Ka>^mwe;*q zmCCJ#LfMpSSkCZ>=W>EbjjGz=L4GMe94v#pbvBM^QOOXjM?Chl&B#9t`vY8NrtT1kr_tUlQ*7(Rz9HuXj`0liMPy2Exf^@qor;HPs1WN@aXT-^^! zS8ugem$7k-6`znc5;CAvHn%29dbOBmW7UyrRd041Hc$u7QG+uFA{o-@?sE5n%A^4x z1CM%2{!l>HIsxrUJBinIf}!ed1~S>UM+n^J-EGsJ%0DE4u{!Cu^2SVeI!KlPj9Ttz z^Ecnm*8Igya@n!E+s;7HxW$C>&+iM?u#D?%M#|UW|7Fnro%Q!a6nxr@JLB#8hl8wEjP(gxgOfF7b%eGLRtV>MrMln}3XB0Jnz9SS+u`l5CF z=A`OUS5-Jykmzga+8#ZVX2}g9Zk-|u`2d$_97z31XIz!b&+4oH{dxaJ zdCS-A21qxf%x{LvmtjJY^u{%VpsaUiu#R2HJ&Fe(#j&cQ{N<9+ju^Zv8d_!m$gp6j z78C=62RgHVuK&gvNL@V<6b=v1+hL;Y;+|Ew(SYDmw07Aai)Z1VvIa zR}K=B`_n-l6kYS59KB;FYj@eD#Y|-Yb2cB4uhRooG@)TsrTifScb?JMJ}RTJ3RdXm z?Esi=x8o&t#;-A)?m>J-?_&T5@2<=V)&nXXML+Z|6w7*5$2qUY<*DLjq0>&mTf$%De)uW;nP? zV;D7qfNgEsE%tQFL0%CZa*~<0gFLj}V&fpU;~V+-!phj!o@+D%cYr}Y1$QVkd<>92oE4IwXH2zkR6M!jP|A1 z404cdQzlLRU^YzxJ)_1)@3cdrrDL=lVXtI3b5twHM*EAN8r)HjVt<0ZeYAfc#RCbC zxuFP@@d~6$XXv!ontKDv;$&SL`s{$py7nV@N4&Q`+ScC_tsCx@bL4&j^(i>KSV3;n z3bON`Tzju*4`2QJ**&qx5Emuv4+KLFK%rjz>(&Apd#{lUW&49 zbqM8?APfbpnmvLl4&4V0$6p!Lj><*alasmlL(#$N+ zE<1#s0U1CUbeJ9-4650t?EqzvXNTA!!cmSW;_wOiE#7phild$9u+wRp?062a_i-K6 zX$Mc7hB$3r#*wY%O?kbw<{L$HFow-|6p!MO4pxq=@HA-}4lS2cBJxNxLCUy6yqN&H zfb~5%*yEZpdl2al4rYXi=CiWIaYFFP=c$n-r_~39>9B_Co4tj~r;`(99b!?Boj5kw zu|r-3cOWC;cSUS3g-M&2dSTc48@4(wnFjAsJc|D_VBj|so`A`~M6#0vo+wZ`aq0=z zAeSlS9~@xWJ^|C4n}>u~ z(#gZ{{1_cHQfX|#(G7BfBJ6{51t~df!an41pgdS_hng~~1G&=H3`xURyxFcnHp=ws zPZdCHB*-ISp2?e&OzTgXHz-}kohH(Zp?HttQS4V}5;Qyl1I~A~ae9Q#C+!fzQ}E6= zA$+bq`ugL82Q1lV(BuZ`4+K!|RalZ3UbU4gO$bLum~Z+hOsGsc9-@jjbUQ9tZa}3Y z6ybQS$90tDO6NF;hn&mQJj=p^(s4>Z4m0bh>r2}u*Dg<%I>k$y#8)yMD-JjF)R6pM zhQf9c4mY>)%EP(B8&T&e*&tpH$T}3Nc*>;yS{D19*P)O?)HldUDxQ5=@*c&b*zaJ( zG7>cjGW2Q?!ui=DI!(wjz|PR+2+{T60!tng&~&=Mgduh&Y}f5H^O~l@bgqh<$VU!` z)o{9Xo}&A`YtvDpn>v(k*aBZpCs)fNY{GeETNE~&qv9!#GKJjKB8}tYyh$9Mzxjuw zgP#slX_v_R$~J zi7d+PqX-N}jCg97n@lHRE4w>8zL+C(Gc|3>86&+TI zU5fKdd1U!&jh$q!C`CBQOxNJIP>L4E|;F)&jAn|TB z<;R9Z`B)JSQE|4@JTk;KT0z4}mP^7%o!_H)6#EyCI>-kTa&GuHDF4U_=88~pKLXSv zA`1e!x~$`1sFmWQcodJK8J0VF!W7TO;!m*L}l(a#hM!cSf~B^t*# z#xWQ$@#3L%5aF0n5#Jl*267j}jbW!;ZaYi+{!0+*C%URlVQ$Rus~Ql7GVix>qd1On z3KT zl}?eV0E<9$zdOeWdDo zIlF^yFwG>%aPx@J{~YI$3R^F`OcT)GCz5pm`5;~2*{h6`qs&p;8g z4~mszK>m1UE~4eu_A-j&Gjr5|t}&4Qdp`2VbB*I_9>+Mw8q73^RiJ+}s|YjuFnst~ zO%_xmqZvtsUFxHZ$5zu|hj&TeDOqwu+7`xm+;txZ~>0Lip-XgzU3yNijgF` zN>bJMag5`s0iJ2(>jeNq7dK!aCRp4i%~y_;AuS#%4`W)On47gEH)z&2*42wm*$jl)t!@X%|#Ig;g4P$4&^8hk7FE93}67UWULJHt#Ygs3Fj+H zfCXg46NhodcxEUTp4>Ok#H5I=d_q;%Y7#m8@QH%srHj;r`4 zQ9Ul@$gg-O%0uKW(mhk#aI9#9FwXo0Eg$m5Se6g1@-RbUd{~TQ z^iV#cV#MVXTW#{iiZaS+06Q4q5OI_NnjodsW(E}@XHQv>ViH0gT*?RUAP{v#-W-+U z#!(e?L+Qu6AnCkUIFG~4{mE*u* zMmScQ_&uD_IL0wNFnTaFF_LmW29ebwz(_Ib@|!gA&b0<{$zYOB7>aPQ+N5|yyBAMH zL?Vb09(5K49QcDkt?PU`PO z4pGGQhwiR!>p=D(l`AigKjQjD=rbsghx2$4X_W|6iWgz*FnqYKfnpCXX+2ycVw>UV z>Q9U)t4xe$ld}5xDPg6v!h|QP%D4Ug^AX8gqH&C4Xka|XmN^U{qpI8}mXEG5ia}uv zA<{H>y<7pZ1Z$jw4?5VVeqDR3?VLW>HZ48TIwnlF+D=(!W8ECb?1KEObXpn{91r)x=B%x-ly9=d1?>uOxY^qEJT2Q{%Um z6_&qN{z3#tdq=0s7sw4=b5o;DX>RgzE_IUIKMhLtYQ{ z_X>-8Lh2Iq)DN#}K&E>2L*Bkl8Tu4VaSE2&0MJ<=_d9x;?rHq!SY8&Hv*0+!F#y8& zFlrc45OKI{k?}+MiVipOP!?iE8DZt+vs&6db$7H|!~Hi|{X@4XTHEtt4%HlduneT~ zlnmsu3I;Oj!UgzaRz`fD7A~^k=J^AP!{D&ms;{fF`Fl;(#7{<~rM2C*wYJHhjACb} z3}hj>*7nc1xVqBRWB6TageVkj3-sZ--h}+Yp!pQ zzsEq944ER_Kt@1$SYd|Ar#W>TMi%^H^_-CM2Z(Ot!;%@uA82Z*SAXZc_#5fE7?rm_ zWpI$x6QZt6H{KUAphcJ}JBxZKO$Ks_3}mwmWLIGzLCzC|oXpdZ1%xaSN4cN?GO5D0whlXLzXf*k!HaG4 z&KA3O)f!FSTBo&}x7*{Jwz!|kFnwaP8z9QD(t3RJ)>4&(CpGi1dsa!vr>I7iBM<5D zTe*IdPb|U>S~2at*EFs4Qdt+Z@Z(IM)U5L9ZA?~I4?MoUw5rAUt>3!C!|gJ%hweMi zPCjTq8Lv){+p?p@4OvX}&cfJGoD0M4D^@#C@^0JNY8$ujbU(7pn=!>EG^REMuK+S1 zxnyq{+{6!q#{~x9-uCdSl3bLZHhE%69mu?V?Itfno6y_LDHC1CZ2jj>pJJ1mid8Uj zX%$aK{K$3ZBagexlx=FLv#ArB)#Vue8r!LhTANnP)J6G8T1`jWF>1BNg@>4(>iZ4b zTNLN)ZOX(Z@kJPr;BRvp#6i0M@eN_WlH+$ynOUPfV z!QC-ovbD@uXkGQqii+i5;p7x3j}HpD@B@ShztS*5DCo!~3+%K*mipv)bi-zw*xX>v znhY&%T0v@Z`j$`sW=x)76SakH)TCsxU{KkXWBAC!1jBG(M4gncK^;^tKjq-bgvRKs z+q&J)%$Qi@T`+UH^4BU)z1#*b*N9(fvosN>$~ePg%7i9cw{5$pH^^wR%GoNzh71_1 zWqZ%Irysb;x7jmfbTG`5RBqa&3C?5cMET_sCjPNaTg6xHRh_J&x3#o6FO1dP>65(- z?M1HkjxK9dy%>1P9J_3xO;$bAWWe`QU2~>Qwi%O>yK3VW+b&+nk5QUAWs1y*N@lNf_hQzcR)hM?G;tP_oN_zR)*(k!79?`F)SAw~lrh zWW|wZ9J>dMR}3C5V}tR@I7s6m&9eX-Dt0Br%+!UO@yAYz`9uE>9T-Py!QfCnj3NYZ z$rIt&S-E5d2@EvJQMci7tKGC(VdX32?%6YiI}~JfILgC-F!E(-m|o88rcRjPXK@`e z&PmaQ!j+C65aM6obi$e6^QLl6c^;<}_7t1~J$zGoUJsq@BtP59oL9~Rq?!-)#HYwZe)vRvIlOMgrSx!>&(qkh_wa;R!NQXpTs|<#C{Q9~PCSc*3{gLPyEJ%R zMko1|fD2FDXfqCFdMMRVN-xDFf7Bg*&s##YHS+hQdDz_)7ydT2bN-B}Hf_p;l8n81 zj$>D$MtWyw!WcPW|9$Q6UwDQct%VN;#^aTq`WEW)9oA&+Jl=ZVsrJ{;Ki&47GtJty zAYy~nlMgB?=oc6k&L1&?tP%-_k@V3b0)zpUXJ|+t%&lbDMiarisD~9?M>j^X(^nQ; zd00jHnWU&qMzgiO-B*$=+K!=oN8zxY+o?1s`FDu6x3=|=RwqvKV}RjH$1t(n4f1+A ztcAKn_=yh}{=svHDDO0NVXrWgC2H@;OkEvNOo4Z z=!#Wv@ZR21=uUBz%iDpwvlXHb<-*r_CrW*r@*#V9zir&M(?0vU=i2*Tbfzts!33jk z3Sq~wOTh}!$A`wzKC`FUnMW-3V=JaQABpz)O#g`(`>Yh(wR`;Y{VVOd`l} zj`dOi4PhXWpMko5%MM$vZ8L44jWe~~o*+5lMV<|twz?m1q_K~-;K)QHFxFdm(m-jf zIQN@7-KI~TP#V|`>X#@>y~sqJ{9__uJZT$!&e?9)H_on89p zyZpjcUrV1b>KWTw!D*~%ZE0O?@+-Qgo(H_SsG}dxsv3XiW$}(H0KX^Hg zfly6LB|R53B>2}>(h-gCirU+3*@9X2<+r`azWc5V?OX49xxM|oQ*6e>3A(s7+S^`m znqBoMfx@o1i>-k$ zirmn_D976~{kL|v7)ZdXrN=l%V|w6X`-CXMc=+#eJrl@X&jEUTIdbkX3De}Hd@2(q zonOJ1kh~>$ZiU^|zrg@rpl=HkQhefDk_qy-!X-x$uRp0o;g-YmD=qOVvPV|JIK9$R z{w#}!6SUq_-#96h%Jq~Dd3`Nk_=5r^PR=K}#Ffexc_Yo!iPyx)^CZ5W)wkjAf63Xl z|K78-ny&X}KS@kdj-wh-pQ})R&}B{$SIQJL6sRBA5wOc!y7z2*+jCB~{boJ~OA=xknykXCA)9W=@)5XCHN-z3J=|wd<(0TUR`0M=#ym&O7#C zE#%UZE70J<7|6HRIY=W8BhIGCbF5A~;O(<3%Y)x6hmpT9vTpkhI@WhMqsVtAtu+>a=YSW$IK*&qb9pH8C9AF;4Xr>6G>IJ^X1$qTrX} z5h3LBn?YjYTV&6Zw&>9(em9zU{uSwzqkQxSM=ET~+4d8U{wYs;Ij8coN6~g|+i3%R z<8D!hleS>+2CLU^vh6%YK#)KEeJgGprM}1GYp23~;6i*an>VCbTlxBmII`j6DH|d+W{*tKnpRBv``JG2-iXZ@?=8_q=JF%QlH_nI=vA45Sd zpR^)w5VUu2L!i}fAZ*tp+XiuSK<>k9H`)4a+daH?%XT~WsDpF`o1vxsUN(Q)RNJ_H zN68SP+UBMP8JFVG70JOHJzI9RIBnXtQ*umln$*~253O78#(}aNOfQ);%WpPxNG1#f z@-wlS=$lkeD@LND!*5*N`RHmtSKY8}hs{=-PCQ_d-cF5t&lp|LWMnm=`$9=F=fs}z=&iu!m>*0bX7 zDqv8W8tYtHe)m-W+!&}=Vg*-%1S3C_+g%aKzEV+g>fD~PzS1Zt8K|B(!uj1$zd2Lz z3Shj^1#UUNo)xKxQ{@bBfK8G=#l=dJzb>zc^x&ITqG<)_cY`Gla$)Rp^hlRbk}(Ax z-Uj`Lhu`rQA6(+1&Pse}Q(Doo0xc2*yvP=-Wej!dDIZIvG7x=2xTkn}C_i+M!R0wj zZmi%E7Z*4P!^-om+-%}GI`m6BFzV@!X3t90C!^fO^Jm#%nphK?8#RcdFUngu6u=`r zA@F1Y{Sm}F^B6!@hCWn$T=e)!3qOP^amf!g$nSZ?N9r$)6|~mLjZK9Y=wik={KH+# zZPljDTKr74BbP2z1`3%StW{x0N1N?zX-_)?uSa7=W6QlPOn9nA<0D0g#uRx4_$8;R zcA|YAM0NrK@w)<4$18r_e8pS}O@kaw2PQqv|{qAF_Eou6QJwl1tgN zr7YT`e8ju#&O6$h_>dO5Vmq4JnJDtW$MY3@f-h;Q{R%5h|Fe8Oe9(5t7j+Tu`fy%7 zyra&`fS~Y(8 z?Ju#Ho_d(w|M(ia=e`wo*^T$u@9uoaKK9CU?ep)x(EjDk7igz3!G3n*-Tw3kFCsM6 zHCVlbVf^yApJpQxsGeFsB64|l0i+)NNedPCN(_E|2DfhR+}W4V*m`ZTO=Xic)ga_y!pa2kvs|%^6*&AdjkigSO9{VYO zn#A4q*v8GiHC!#eJb%aJ=NMq^=55ZGRVk}r9zB_+PWNXfi^r6ZcFrKXm=52zfYOVC8q(Axk{| z`ukVf1COusK12VLrHgZpKG5F~y5WIG?f%Es+Y0GrliE+a0WvdzetY}I;9gnQGyB=HT z^ZNny^WEB-a~xE!zGcqbvivbWCgZ|5{C-V{o~eXx_-j7ZZ+TSP>{Zs~R}e`5k2>OD z-y7AorRN~mEIHBI$M`u&z$!s&2AkB(Yk(Y*sy4~N8C{yVUB1+2l1)$^UTgCegvxLx zw^?~uxhu*hYTMROSMSQ?tsGVv7#*J6-zh`G9kcD`!&2hiIz5H(1rYKuCdsmV>1Db{SpLmrT;_GW7M5>5~^f&t7!Wk@inNyu!YG z`5&#Rsb2k2V;wU7ryqNWeeo|}D5JR1Uh~i2w>2`ftRh{1D$7|XEc$anU68o zu#rx6S!YnY#3O-k97R|aG&2}524Yb`x!nUFiW0$%W4Y)fS4?WA`1pv|9Ac%(F?MOf^UIptu5cGLSo_$w2P6YYZe{^}%WY zLl>Y%j6=Najv+x&ZN=&VkivV`_%IYuTiT^CLOY+Eq9#{1mwWjGC|XpyGK9O+5%t76T-+b2nfSh3|vk=i$=W| z*G{cwF;v0E2aiImR7n>DYomRIKG^DFBzP+cgGxcn-@6e)uvw_xOYD zNUb36(CXmxKl#1gqZI_R`jCC*+F3^)=pX#x#@#1=@+-Scs}UqdS4^;ucJ&F?TR&Uhmg55y6b@iT*z5&a6#gSO2-=c{G?9$n;U(| z!dT}82u+=$Pn4#MGM_JO*P!D9%sHfwAq|px1u%@vBf6Pze;>Ul2XzLxA(da-e7uN= zPO>B*e^Dh59h=?az%WUs3s@qPxf+NecC4Ul&*~61BT11MuWF> z3r1t7Myox_YBB2PG)ziZ<#h!Ja}nSTn2Sz5#?C(K0K4na$9*ey%LA*t5QhE40~guF zryt`F5&!n~2kpDRyIzIU+Y~wH@Rirqt)(Mo&5b>YBSOx3u*@hEH+j;IXjdYd?KflS z69QO;F-EWPE2!)gLY;9M$`#1MFHc`h{yI)Kh>yW7Qv;E+xxDAC~8jDDryK^aq!= zGfdpCKde~eM$*90=#zmotsom^AnUb)?BrELl&Ff*UMK_^6vLFAJ|KG(9WIzaB`V@7 z!Nn}g>k26nBd!{cRKCbp-}`qWYk`Je0%JleZ5_WmB*( z7)M9NSQ|oNPvN0H_fW4q=(^(QQo9cf{TQF zWyA&n;tqLZL2lecxU>sH7r%)F(L`2<5c&A|56Z)bxCRv>zNCl#NQfr84n-8DKKOCZ zBju=~m}*HG|6#*<`y|Ir{z|BnkGfq4#K%9+)0aoYr+*ngPwnxSmo4QZzAUX@M41Zc zsjHwA?MQW{xKh1k=v5v!Me?^)j&OO|NDJx%&yc*m5b@ZA=dt4LlF7#1WCV*&zIL>UBVSTstrq>nL-#uGgXZRtE8#kD6Yt^RkWBf3h{6Z&j@yHPug}l7}4;>T|AL`*3 zKRHE)l7UpDyJh15ZzPrLCWZ)U!v&AWw6^nEvEmb2+%(bpxP1OHp}7;xn=%lOxDdzl zbgiA~vt*E$=YY420XJWG)P*~(5cRbw%#9a#w5SZ}`Ohynih6k*hgD5Q!%_wgoOg;B zk1oJF2SK)w$m*XBlN{X0fN!rhDxUJlT@G(cRvy3qyo1VfxXs<_igl|T@oa7J_d;|g zpu+*hBOZUm1HwT82EqV?fz@K^H`uehcv&rSql)yDZ+Iiiul$lL7j0;up_m-%4;jiE zOP+E?4Zp^rAZqgC36Z}YBQafFA?|SCOhq&+cvT|uRijY?ZJ{bwjugsIvw8=KDx!JnJ zjMvh5Hjc@SLU^=Q6$x~|&uixO0nlRC)PMqLh(w@}NXxmy_{MDqL z=``4th%Mk}6J}1HV3T>|fIDo8=M_Jmqh#eWZ`u^kyl(3@e+&Vo^K4X?49<*+ll+V2 zJpaeDT})ig%_;%o#Unn`Cr|Xd$ZI!kQ(Ghef}pM9`3Kz7 zy_>DH290=L&)cwVoAF~;RL6vXKacm2k4KxhW5{!(Yqo8-tvhzwROyk&p?Hi5{h&LH zj{oSHXzuiBlB>p_bHu2U<}HcNg`#7bi4Y)6M)C#nytt(2`F973cAzu=NgVk{E((p} z?zFGdh!9}T4VhT7l`FutI;x z4BNR!9cm}-zn>ktV2&NOaBo|&VO@GiTZW2BP5nHe{Gt<&v}YW=#7^9QksC37TZWb7 z>4z?}vyV8?j^1y99XNlkui$u6pXaeKAgs!G>HYi@j~@0i2v^uzYIqxRj~ z_StKSKOD`2)~s~t1y+cMDD9;u9c{<%x3?{uJI4;+XK#Pzli%<;WWjuU#VN=7JL?aw zS?>>JGjTAiyg&YmlaIBdRPQ4jH~E9^Y#)3J5uKT;>7hy>Z{GQF1&#c9+O7uOqWWt! zXc#wKbcZHRY@sL>B_mugcSJbG0WSG4q|}TtjdCLg<1lLEj4aL?OTUdy!f>m~n+ui`^ojU`x_g_ zF5254q;8Tz_%ijy5W3uwf*3lo9yw;o9&pT``LbT_Oc^oxcG4FRd?KH|MjPv zwN1&~kH;>z36nSu`)EIe71fq?&L6KGt22MGu<=usd`8zZqczJ_}3&RdXmHJ}BZ)L4UNTK(e4`z_Xb(n(MW- zO){K~y4b2QooW;h*!F7h7=qO+4}kLHOxHg6h}|wD`RMws*1|*5+8a%1Y_hYCJlLLh z%;9$Qz6<@Ea(BuQTz&6y`^_B>V)<<0UenwdvQoTt#Y(&7;YaMQ$5z|aDHF9qoNx8o zR{P3JZKFv%e7%1A4tsFzdb{VbHMVN=7MnSJs=r0jqOIMdLRi$FK3-7TFRws6LDw|DEb)pp}5-AtR<=;x|a)W)SUnk|x(RjDNQ3zUxxXDSLC zP()QkR>a|g6>d<3`{Oglz@WJOkPJf;g9bu0AV8QEVKhDzh08WOH->Q!lsIT)ps(pB zZbZa6qjwuL+MvmKvj>B`3~tBLizoJFWZ5K<$*FTdO)Tm~53>wCZJx&&?&sUq$TbuvuE|9=6YXzY(%x&01gO z`9rVz=kJ&5g23n1_^lTI`3S|YT(ikK#cSTwsWzi|f<3xvlWmp`cuQrA^3~R9ML2Py zLh0dI)aF2DSwq6CPh z9s=QK97J4>YGZ@EF)2W$vbz$J1w#@d4Sq;dB4%@rXb_6QFouH23->UZ#KB|eHCKZ_ z_^s+(f?yZoj21>m)E>Yu3?u#shib}I1Vz3)ZZu^I%T$M@} zyAXO8fK^wMwvR_?#dYD+kFjHyF0h-IKk6Ti;6dVF-gcK=cKt2>yC;6h)W^E}nN*n1I1W z4;&5bKYx}Tzhr?{j5T)e>h;nEM+0qInLa8WHIi$BuYecLn`IlN*R@(DqZ;0fDb4A; z?}5vgyuCnNwKU>`K)AaLl949H{2Uo*3}=hDaLc*kLb>t)aVR#FJWPlUZwC2ENX$)W zv=B`iZN4DqI}$?1YE%h%TAnwkQXQFY*>!+Y5)+Y5Ab=rpCc6L_gdJM#-15*P_WeKJ z>|bR$Zpps(yb})hn+)8j+2W7%@Sz74(9GtB3dW^Qtzb3C%87S?)BBn-9ml#b^?%=$Vry+Ov;3)c#WS zFPt^Y{v_RTlZMA*wC=PuTesSVmKHm1*}it<;srK+ayj1w%$XE-`7(jpmAq;7}k4?Ua1H+fXjU>Bys-)`C27IBh zMAVT}sIwBqsYbYwKS#Mr2?y^y4SvK0-@KmS4V6PYYIz)jFQCwsOw95+#{w7}madKU zHGU3x+lp0o?E}kg*M2cXvHt-@EoE@wmnQOMJeomEjdP-(g#~ zZL`^vC&(Brw3j^XXghk*-nK|`owRg6J9M9U_Nr5kvqKjwu$^t4e)EPiLiE1x-09Y( zne3keQ`&;P_R=bMf}e9vXl}Hv(g&YeqfdC`DLrCjT2*hg>+XNZzIFAD_8rkJT6tq~ z>uNjw!CEdn_pVx_RqkXv^`K?8wY9?@Q#(482VIC&8W1q1;{pDpuAw7%Mfu_K8BG*2 z3{MmqlPf2Lz$9?BJ(Bf`ON=-~K^3uDwgstA#XC)&sn>VtAb7`29Mp<>)1!Xba; z3x1I|j36#?pxgy{dGZ7KYkm1H_;GVyU<|=o9^ZpIcs`Hz%=b_0Pn*=_TkZ|pTKwxg zGqg(LrvUi2;M&bw?SMJ6{4DLLB@3-vTWfw+b@}>@Heo`OE!}&L?KgLh?K^#%ZQi!S zzemSoH5fh`j>|u8oZRu~YP%}hZXCiT4n7&ccu(htF2tW-VH5V z`3_mMhu3Ye+aGz{>CTnnBVM;IUuBowe5ZZqk2l)SZ@$ZJc<>Ql&28GbL-nlj8#Ubc z;kM)b+6J>7p0BO>-ZEax=I>?ew`{eQGLUPw?396=VF#)$tX^kLY0~z5gRN7#ORskL z7mL&+R?d%Y+HAM4cuZ|g-_zr}MzxwvyoExYtJZIp%~-)jEd9rxIkx7=m-tzKu>XbU-O%2d1XQ>P$D;~G| zAKz$4FW%Sw^6aN;bvfB?e0Y`Lk;bU_YRT*C_6MW6frBAr)fhhj#SIbOJ|Pc=`G)(K z+sd^Y?XH!p{IMZqB|d#;vQ`F)Pn9Je{uwmYutLV@=7%4(KR@t@-6D6zhK(|kJ7i!t z+VZs?Q3zA_#)2lG8h`RhAct!2tw z+pzdV>lowDoiRaq3}?oq2{ICs{0Fj_@NAn`YFq2C0Mcvv&+3nx77KZ{aALEsKK%!w zT6X$Yox8{LrcbrWjSaSLE8A{uS7it>8myGK8Pwd==r>+?zLA?iY)5GsX{@N`YX!>} zz&B~T&%@XYv=Ze*v|D!U^tY5c=OBv1usBm>NfD;2sH{{&9?p#_AZ_qVk(^Vb0&zUT*d8Q{ z{y_!sK}?zw2qUp41KD#04M$#0Du0uvv%{u7a+^(g{Lb`spJHB=3}megWQPpo`m$FI z#{zx>MgQ3b`?HEvQ#6!^x-p6_l)ym1pkgqKVx?6e@HEeh(M#LR^zqhYAgRl5=&)*1 zIrx*{RVtpM7)2f=CyB>rJgflqr1E}0Io%9WILmMx?6z1cy7<0yEXBVf0FhE4=QySUicOIJMyvyCiZ}~{R22x#SZ<4PNJN2)=hF?1r zKf+4HXv2fD7*pEi#}5VXQ3K5yMRvmmauh}qZ<}O7ze5*|QW!x>!YLSI9K#Q)aV8IG zQ9gh*!bpO_NkwVK0v?W8)TKql2oa1!j9k>w;6K&~SqG=azF>YcPc`?Zu9Sg%Oa`)E zedAZ6G8Hf!qQ0?&Pk1J&TsL-Vou36_l#0pB1opGTB2VOHdyCM7o!pRVz_>rTl+piE zU3mRwjQkk0(pXTKI96%o=W(J`2YFK+pXde2bIpRm#{k#z|iq3M0l*e^Z)J3@(@uw~R=z^{y z)I_~vUy^rJG0NFeNb`^Z0Yx4Tf4`{oYenO!nPA{-p@_Ys5pJ8`{ z7Chuun)Gfs#M_Oes2q_NCDTt5q$>8MQ}t0BWhn<0gEbjJ{Zn2qM;=IiZF}QMyw3rhh_mdWR zLGA|;4*nqbN8X%IIpz7E3_yQzv7v4Fi3`1!wK<{(Rs%UPscfB@8o`*-AkuS=Lsf2+ z2|*!vvTDU(MqSn6QYf3Bz31YM7T|}7@E%o5{KUh!fgBDPKruL>m?L>Sn$7co^0^V^ zBCb3wj}PFFI?L1Za86G)7{ToTo ztv}@Gq=+cHM>sOT9G=d+@CS$sdJ19OKn@2Ck{CP;s(kPS<>^6z@-T>SrM%_nFTGO! zCnGAgTNLVNe#abVkaK!SeE%qz^yzAF$?#x}lxAQ`Ig8-1gVFpPzc9k>yf$3M{#YLB*MgJs-64h1NW5y{+vP-H$> zavI0jBJ?h>nhKKw;m<*rxgqgTHISpcWd9|`2GofhnE9Zhp%vhdY!&`7Ll}-&41nFC znq2|f1r>v7+&~Tml?-1D9$XZQ8~$;OEsDV$Y7ZAgmjnja9Z>=oBNbeCHKHXL?fwzQ z-y1xZ2-Q#zRs#_s!ed?cSR>j7@JE|O;|6lDh_Q;sP+pA8m_NB2{&9>x&^d#cekcYu z>W*%~jiksrc;vGK?9Pttziv`pT6z3#cF<^}oHrGto)B-KdLs?Dyh9=`R9=Zlk36{_ zM0qIZ3(CX&fwn|@;2j$Y@n9^Cqd%Z%2nB{eIxlD(yAJupED+s8S1_RC^bkZ^|DYtZ z3`FjMOYIsU7c({nT2I4!NlJ94lMy2nm#ZPhJ82W4A z&x!oiWCY<32jV+!Ao~N#jSd57i;l`WWh5Oij^QKk1A#8e=Nuq8pF8~{FS(}x>5+++ z1@)ED+dcS(4h=b9st(E(UP-LT2O=N94a&>3PVOb)JFU>Fks#2Ykw8uHe}WKA-A%2rNKjwL~sX#K2K`@O%JU(R3&|@GgF@CC}T&dv)p|5eB?Rw<>AYd*S>qGAfIyh!Z zOay2QIyJ^p5aDv<=^(@_A>?AI6LKf`n>8xe*%LJ~45R|mBM&Yz=Vb;eKi0@)3IfFC z-5qL-xH8n1I)FsyMR}zaD)hK&X?q%wG31P$7i|mW1Kd13jJ0h# zA3Vs-U<7ao8f74NP=IR7 zecF(|p&I^?DK)Ps{N-`*#|;7zzpFcRFvu?$Av@u6MfOqbI7SsQUdqNvM4|rSUE3*9 z#o~?>AslXi>Y^o-W&n(IkmPLvxX4n@x0>wZ7#+kIi1AeP2i`c1 zi!4J!-nm0BT@fJ&#CS(Q{8WRW5b+=%Pcf#VY#xUje4vut1W4#m$P-FgOJ5!zM{l5$ z7)RwG4nlVhehpx>04Es7l@H>~J6+^bI6yvnk@yg}T89R&0RAYKBl1Pw@K@qFR78Eq z7_yFI*8!bZS?J~68(q{t@_`bAa0IJJD$Usi!8Q=-uS4IPdhJN&_JehaVy@1oAvNkPynt zLD7aB$Kk5j|>%t%5+|Bbwe58R&hHa>b^0~`I4c_5KojHiB zmNt&TBlKL1hv@21E6IaLY%Q=JU}&Yi((-W%aEHihScp1MfY(n1mB&^)X{J-r{_YJ) zA>%j(1%Cb+y)onxLdV4bEGaaU8$^eYC-Ou1p-QL}U!EU-jCKeRhoAT$5M^UvMmQ(( zk`5wnG!Z<*Fy{VfLlEfCfR1DEK!*hwyi9(6$p!U7gI8}15K3fB2ZOv4{J|n5q#Wb733<0Il&0{L-NYSf`fZjH?7R86ypaLX0EVZ~^?~;n4!JL4l|X z3MunA5PlyG1(7#+Mcim3mlgi#i7;=fRa#kwaSx1zOivXQI>o6g^jJPjdq8YCF|aYM zAUbi7pm?%BJs2X3QAae%5yB8zAfl=(X&fbB8f&G_1`RNNDw$9YU#jC41W;@kfSf|% z_#;35ks{|8Jfr^d`0$4;mHasoHx}rv#RTGl0wHs_;}|;79gtqR7I96Au8ySMh({^P zQ91XZK!wqdyA%D^k46%FsD;eq=m*_aD;;%f_1M+jA#>;kvd|nqY{9;TDu zM5nm&?9l_D3^8CK20+M;8*?GzapU-4ED&YU~44H5%fjs2|D#cf$K<ZqY3H=b>fe?in;-5vATqq>7*kgZcvm1 zd3-e@f3)!_Fe&nDPhW%rNF`?&$jZ5^VwlBt5Bd&pLO!)a1!?||BLiFO8eK|iYSK-v z4lTWkkSDGXCAny4P>Rg6Irg-6 z>_&9+NKbc{HEem@>P0m*HP&6Dm85i3bMQfneCJ))(P}%V>}{JCpJMIJds$5vH*5ql zC8wlM{2&ik@(%^&9PrnFaVN_kPxL+2!49OW zPWsXUang#LtZC&fR#TUrgY@)+4_e|kwCmbiZ0EFvwqeQX)-iF0)pqt6$Z|wf3`D}Y zf4B%9gGF9fscaviid;A`m?~kYmG_5{C}Fe_?TSebVxpH&WXj~;W13J!5MMd6YgUH# zB2SOq*Wc1d5qUF$*pyNcM3Y<%qy_T~)rQhoqL-QPHJ(E_8iRpsNUbfJoD8HiQIydl zsR#YF{YehSQMU|ajSS?(<*6mF0Pdi%>{;y`Y?brTB=;QLS8mpiIaTDCgr)uSxmc>RcZ%%3m?tt_HFr zNLgEnVoRL{L#N+$^f-}sJ)zE?PDmy)`KyAYR5(MF5qVK+z>~hd$j=+#GJHH)C=+$m z;QYm$d7Fl-#iTG=^hLoI4(jumg7|Q5>eYv27%j5PWMBk*wj~@J@p)IyL zvvJcZtKYUpb)eg%3>nD9(kMSoBMBH(vW7K&@~sRCav}Ef9h54+KToA3x}lErl&$EJ z-Uh53(RK7$47GA_gO+%BkryIdo|kacg`X>ALlp2rilvb?)E3XrQ~-tZ%JOXZ%PSrX zP)P0q#2}pW!ygUK^AfHi?&yQc(4=}qGIWX9vW7UjOpHoE2nI?9q=nifSeJyYLE!GR z+v!o841*8anv&5Z4YyZ&2t*>l-v>lS$wE)?SFl|{hFQ)xSmns;B)vQgh^tgKz{MZi z#_#^CN327206TM#mLhT1bAcNPEIHi$`AsP92BThq+d`bcv5{3hz28Y#FIb# zIrWEJ=21a0J2au{RCn}8RI^(Vf)vzi{Q3n@z3y&}{uddf7ao(w+pA1YfB}OJV^HO3 zrM&vXg27$ssYcq7pCndjjj~(~3gh?RFY$c6$>$Vqgv;D=KU9b7wa8B$vWyLKF_1|P zbyQE5gpw-{|9$l$SzUY@s2Rir)_)c`eai327|gsFHe&1~e-5o6_mjHnG(PlC%Bz)9 zeXEKdMO=spqfnj;3WEvSYy|x(|N-3cR z(@H99OiBf(3=tI_5Me3?5kD9pR0tLz3{PBuAKv6aJW$vuC*sP>fH?M$m$tg=o#Uy) z1Y8R0?hxN@zYzJi1mz;apfIG&gG96o-uMgtco{3m=_^Ri%TY)`iHu#clNWW8zn6F< zxUo=d6eU9x>XjM5g-!zeJQkg&jMU3Y0Y@>g3gWMiNoDnUqnK0*qnWCJBh^8{9Y6U( z1TI=J=MwxxF?j>dkV;fac`3^((dRPTZsvkkkyfL!D%zB?rE+*6@;*_3++d7l_M0?l zjJFQEy4tLxz0L0odgoHPQjw)Y3S_&@HrpShR2pY6WTiugDkt4b+2|iusJ=oh8V*15 z5QKjXW})#<8xx&g$#cj!s?il)tm4)7o3rV(%}q=L`mmq5_Bfx}c;__KR1@IS@k5;Z)xr za(?J33nMXdrZXTZpsa2#>@GgZ@{_eEOEGF0;8-tsl$GxbMiw1LMi7S2TYUTs()u3m~N%NEK{n%!*+;k5oH|><;r; zfiqDs7zj}m{uS7a2m{HW^lmApvANMEPo6Bj^R&NKdTs5tZOb<6?CMlI)xN>Dr57kb zqk#M}x?M8B9h%4yJ0Lgueafw8B&nmnCad9=5;Yt@@pkf5A9@H4}rJF6o& z1jwC@b2-k37-el#6b9O}$-w}7({TgkET0Nc`@1^3eEv+FIMJFKoBYBSsGB`&<|Rop znh=_3?OH+NrYlXMP>~xlxe&@n_w7m^^d!oVYU}9_SaQ*$j))s7;6Zg95v08(X$r-G13U*k9acWBNLF8hX)TP9Y!+Fx4N}b z<;D`#_z|M0WDIjZ**(9r86+r-tboGFfpF5gD2)`tu8Jr!yyiVQ5bc-S*wAS8b==G% zGND*Of-bEfJ8j2~9a=%QB*WrJ3(mAvEp(|r*ia0lLkZ!n2FeDJmtmP-z^E?2*bfKr z2tIMuEDZv`n+=s3)*F>74q*c!>_~(JIp2YJM!M#euOKH*_73cp(Pss@b?a6)W-$pz z288I60q*n_q_4(D%yVo|5{ngNZsP=6!ES`;TK@EE2dOdAQhR%Y@eu_`4;N&W3;@5A zT&y5@vJ5i;7#A9B`4{^tjGWDV;t6}5+ z{7#_ahWZcwe1oI2D63X#yDnE_J@O>(RsJb|A1aUMAN=#U;ZV*u{^jX87616}9RLNg zF3a-{?H`(hr~>_H)`(ZCC(pNM{YwfF;ecE(Lga8ALA}!1uK)~TWPsu#N_uQpDVSH% z9|gkb<~-pS^^OH9D56}fl2)Wa#&OV7{9k`i57K!UNx$BTC=gmL!W;}1>wh<=^0FZF zU3kVnFByFU5l?B#`n6k;J_kj-BIaSmBMB=%Pm@bos6RxyOG-dx>*aFe&R;)+JQssD za)&z%IKSNp8VYE_2%3?APUsPOCV=wk;N%^79lHP(WW^MD6o1ee<7Hq!VM1L`O%b zOM@KZ_;Utmvr9So;%=9^TeepW+;%D}!vLZbIuA~Oe5LEL{Ct#>=Pr5wf#cMunb1`yA{Y; zW_yUr)#Pn~01a|dp)i1CaLW9Q87IvP?*4k-CK2HZRH^{CAU|k~a7Ys<2~tLZ@^F8M zd{L&LLIj2hH&Y{*1CjFVudnrzhh(k!-N7{>I50^^9%+}$n*9Gydv z=7v-*uh4Uc8H4E0X|exTJgZUi`*c-2Mq6U57WGc;$VU7-rOLidtME`E?s52 zG%!;dx32IfqK4q%OnVtnxhCSt0@VpGe?HD%0|cpjUjiXXAj*WKK>_?!0O4nRXFGyC zYbE4WjiU#Jnq&NAAO)?3A)({km*)}X<$N)!j5#SKm6wm* z3~my#FrXEQGz6r4Zr(MH3l7N*e;|xvg)|@kdp>Ak`m<+2J&<<-W)8FFCxxOwVJv<7 zk%DwS&)2dtbjYPIqCe;+79cUuC|c@2w`N7vrT8MV7;%@cLF9J=iKY$_yX7#33_6~j zfpo8Nh0%C4TD@L#wu^R zK>pA-mRRwnR^)L-154?+q*D{FKvae((F?(9S0jWG;rK9BhsuPY~Vt04ak+Cz??Z z7g+yLLqQzp5FcqJD$4YV6Ok`&0_HB`KPQZ-8&Jlo(jf)YAI141F{4;Gc87KKF$`fW zi)E@CM+$(LqlEK#RTK-H$WnM&=JW!xkex)_U4^VJyi8qm#XK&_)Z^?rRM3M&YLQcX z`!U~sx=e<0l#JbRgD8zN*cc47E!LeyHos!~AXC0(xpbq?I=}H#yg%z1 zAmT|^fGcP{Bx9+dU%6EQ-?hXb*2xHR_S2zJ$Dne>`UoV0YOPgGepAUAipp2SPf*Yt zh^CEslj=1;dp^4QgaD#4$b3AB=z7J)wG%(XEGSliEZ$1Z^s$stAo3IxAyg8%b~_|UEUti?8a0E94Xboy1%>##2B;2%=@1lE_#C8!g7I<)%^hd90SY56 zSwz?)x`l3lf+wYE9Qpm`jS{?(3cGFekb9ErBRaMP!G%JdQdTk0H0l^1wW^erW35IN z58tMz8sP`2ybmM@DWCwny}~Cx3Z0HEsD$3-2QZ8NdZNGwOhGXiLwx)LQ4F1+N_onO zd|ACb#1GOlr7~uI(N98n79~@JksmBDd63&h2tG>ig(Gg%;jAMNz#p9OE8PqBV8C7^ zL(o`5g0Krk50Fb;2*;@N%_VXau5Y^u?}z~Ym;gQ?X-QfDAKHH;$}$y#Ies=Jng7(6fQ38Fd~%X;NxNRc0k;RfIn zd~^Sk0MQ)OQK)3}QS^Z-@CWyWF{^4U5ZxX`bMoO(jmYPI##k0timyVEr=VEq@tLxE zUqx!1vLj;ar2;HE_#Z`a5ih7@D2og}_sAG1bw-pV5h@yqade}cf=<;y8vK}kK554e zAvP}6#wr{Yv6^l`Wa-{N%pyN$y*&#c#mkA%m;j+5P%J_u7Dka+v{O`#6G0KG_j2+R z&G}=S7|@BV3In9Y&M)gO&y!yHij?3;4&b>&q$3%c5=nEuO(}6>rOCE}m1BC~B1z$r zhyo!LZurMBFk+S@oqG>yuyUN@UGqdm4519wn?p)8cnFP-Ix_N!uL<8IeoY#q7)yq= zrx#U}k51QlK^V$(b0-yv)uh8k;}3lnvU;SLD2{i&BMPrvpMphHFXa6jW%^_q8DPhC z$6b#}evTNh4}NsUSd-PP6S<+(&aqbhMkO{8UoZ$hqYjuNT zA`IK<8f76a%A#oh3?308H-bf8f4)&fc^(L_75UW=^3o7hLy?e=9Qi5WE5}HSVL~`} zg9twbKr?d{j4JXeL?6_pZXih@c9$S3DuxPAGq^YW$y0=T;(AlH_<@LWygOZ9J`dw} z2?vJqF^3qzr8xja|G_7x0+A(V1t_f~aZ8|(&qfjb2NdQEvf%F@?2tE(!zv zO^7!(BJ7DDswqrdyKGOVh-FVLM`wQjBjxiCerUItUZqX>A(s_|I~s_g4}VBVBSEor zJlf++Q0%gK*P1iLcmm&7jUsluEQc{yfMVW|B8*L=;pC~Q=j>1(e?m8|g#rA96b}6P zaEP!EtqMdwD8f$x#NeevLM@|;U`hqaSh}XAX75i$lQLF-cQQPM5mM!>A{@my4Y&`1 zs!D{iKsKg)aB2c7s!`kChT2AL+~27D^>tldj;$YO;wXj> zOeaB;6p$mT2A*Fo`b#m%gGj{Z1WHVL^5e$xAZOi^0+GUO^^XRM$Sr0?r@5*GQt$@# z0_-X#j1HW&>fpioPKoU6AI0)OzSfRDFlr$zl)O=U)UGOH>4mX zjU2SU3=$FR%|{-3D&Z=FAElyDe*c3w4=cidx<+ws7|AGNoFFt;t5*5pM;CDgNZaJN zb}PZDn~8!7kP;<&p^6M627FZ^?TB4xT2b?p72JH4a2`ggBw0=IdNYH7T`1pnRhJ|K zDMnltIPWEQuKRF@j8HPwB8$Sc{&7@s#Nc7I-NGx4O8i3-g`fPMCL-Ruf%GB{0=@)J z-UQ;qlDbAPkN^(kB(5mj2VttmQ9`Jz7&}!}H!MU?!x$77GcMJNBGngiqX78u0oR;3 zuj9j{=^Hkh>VuU(MO*uT zI7+3m+?iJGnxyG#;dLU0wLh0DqFp7#L;|I{gdysX>^YkRVwgj$8e^YFDuh3qJ8ZYL zEv!*LA|E@!Fpx!#zNl(JhYuvfxM2!7)pK2mc(cy$C!jz1(l4o!TX9^7=tC(P+d>}V z;KA8AF7X&lcxP=KuA7OE`8m7||DIEKCIouyhz_(_8_t7~LLyE|l<_-JpMtE5x}#bG(h zaGN5&EDSlu3-J3#>|&{yYJI`x^{2R!k4WMvuYVLFp3xc$v_C(n3VhX|@@$Q|xa|A(wOEO<%G0RA?A5ZJDG1}19+62vI%U=vV+0~l zfD}*7+(3DFWbm(=iX~IpZz8Z2CsvAKmE^h^tb)iF6R!%89`btyzKmhjNFmyv>mcB{ z3j%T#RjZ|2t@Gd~AiDiHEKV)^0QOMD#G%2Z(I1Z9+(_aVUyQZ4Kyet&IO^kkvO{%a zJX1t+x;txSr)raNR33&9ZoC)5xWqdwsC+r4RjbG=FZ_YrA0Q3^LI^LXNQNo{BNb9C zoZU)B&fM5hYA`4<9LJb|iB>){qj!l%_v%?U08D@WrIn;VnV<=l{#A#kkxw4aDG%p& ztQz6zMzG*ms?S}J_kZr+(;#E5na(7~X#3OzhofqE$qg&Yto3%7~1+z}~&+yUYS)4AgqdqltF!yxyQ zUKp=pt3j&&pqo0oPM2=Kp^E|Ze?7e(hZ zOD#oRDRFS1*{GmG^Wno~jBTg?GyqGkl1Uq^zQ_kBm1BbX0btRmM8mtt(F?(z>iQ%O zA8sVGI{mv2BHD-=BhFPSB0fD*$VnygbJHdX2OrW)7KP}L+ardFqAcAqWcY9v0|vOC zzo0<5E>}rFas`#cGmK-mf<9n!_iSBz5T+~oPMysjhW(7c5U(I-hTKtRw8P2=R57Y> zoYG-BdmtYE#W?c#3|mqRZ#o-{v9OEBL?PbDdUp%!f*&zABhMK^4@H zwxSqE4=Il;l|YZKLGJGZ^231g5Pp6KJ^etN8{r~HFBTzBRldW64;%6HrqDixF@k=0 zpfCmxSpw;t60tR6M7~N_JgZHA6i7s#(lH@j;w47_@f%V9gc={^s{}xjU+8Zl*Y?n|XhpbGUl8(b`t{^Mx{y zoY8SpCGp5<6u~g7M4;SH)e#;Qh@p&5x>3U|$};BtHI+2xPnA4jOx%1VPY($C+{>sc zr~o1pMpFE=nq&vyD>21F69n14!JuS# zi5mqB+Df@`B)42I#GfebS0fQib_^p@I*JzbQTb?zKaO1k`YSpd1Ig;I=zR5cy;ha} zT%r2jx6b&9lX2w3BK69{&6ge{J4#?!#n37rVmTs>s&oG+1J>O5;B2jrJie?cDBuM| zOp!sMm}lj}M|2Q8`{hgd;GvAl=XO^_kzB+Qh^(48dT`13qk7!X$xqM?Csg>|Bf>~x zG>Kw#5uFMY?g$Yku3vbiLYf}wfn8P$p5lj47{y3sm5^`Sh#yon8q+80B+B zoq+VBNM(>wnf#8pGGZhPTS>hYi^3Dyjfmz&Q;Sx(ypc945VHYCuOBIDobw1z=*1s~ z^}(q>zH(I94JC2pik#zkYGYJ~YXUA`>C=Zp#4->HI(BBU20sSZ{ z5cQM;nJQYJ-oQwaFRi}Im{AWD(cv#gE>Be`lZ<4IR;k>uVO18!8Pn;AI)W%K`J_EKdGEfJ1wcF)YU0Ozl z=p~RfHTNk4-#zDj7h?%sge`Par;g{H$aIIA9F&SwA|U*EcpT#xA<73Rh`1PHxRIwk zZ{&%1!c6eI{D=S}85ayoIa7i`f$-->y8_}4t%JMG9vFtedEHe3Ur3pYm1NvP?o(q# zgbtx6i@~HVfkGYZp1rR~!}ag9;a3FP>Uh}!Dg~mnpD*U0F(W=`9OD=v7-BJ;@CU+H zFkoZwf(S=`_J@%c6Pk1|DnpcqdAj@oZeM_vDl0$`QeC~OLzXH=g=oZflc+!{$KQ-Y z@U4cT&NPvU7%Yl9e6^~!sa;*&{%Ce@amhv<2%54!c@VlS^u`M?rFCDJK1?0~zF_P- zXCm1;_+c&qZq-EYoOTV;`>1_UEq)wNU}*gD34R~2a{T#1{7g)STt0vSLm(z?J|yu+ z+9&~5Y_8k7I<+I!_L}EV05SpUE8uw*=7DC9FPASvtBB;pCJGctl_pdv-wT7u(+51t zC3Lk~XD99Jsj`INi(B-~lLoYf2CHqQUqWCF=<7g5Vi;LHLJ84bjKb(4Nh%?IQD4>S!W5A2$p9Kk zTZ(a1%NKh6<#5?PUonzNahSujWq^o{RU=^#X}bnt6x-U`Y{!lrwr$(C5^deO)wXZn zZaa7G^z<;6P;Nkj#*OG6f&qpQ{p9_mNmtwY;}S_~pR z2C?~eWz#$KSZIFiHG%LLKMdN;Su^dlXPjowf8O(L>C&Y(WBLq_@96BX?c287Ew|lb zS6p$0-Ez|{ZczR0j>4EQ*)S;N+qiL~^K5Kv^z_KLC*w(LAfar+`?gx+u}y7jYHqUg zp7Shw;~U;=`ya5sb!lAw>dIf)fBeUP*sXWo>PC{EMDPu6@PijX9mIifi#kRIB;>|S zyR}R2oIUztHshTe$R-)c&Tb5(41Qayb!Y{ghFU6sxDX~+>@>wx*5@NzYf`d)jm%~B zl@RfxHa!c5-Hj5X)_0gJD=?B3L47$rK~OS~jWUp2&@x+4bMS#OkSL<2PDVopa_1Hq z6O4XWB!V537GtM}}=FgvB#euimA|~w9(wR0Tf2I#pKFm9L%Sy%$tRtG z1Tmq*6&S3o?Jd^W)M#g&d6vEJz3;O_4>?S$uNLpmwzhV=^nWk4kAD24wtVGsYi?>z z{h#v!Wqd~uye%W+$hj!YRY&=-$qi&fL$kHXujQt7s$K0ZZN0`Bv#MkYF^oKe=x2bq zAl2a@DxY?hKwgFd)L*_bFovMsfC2Me#3DjFO8+2lNUYUGRCQE)6QS(WgK2413qR-et!g zeXKgB+wQ&hUc3A5yY0RQ?(;46ygBpifMo~RL5Cb<3$z`hOslTeewZ(?6=Na+R+enj z?!5a>`_HfZr`>e@P4@WXkE!S>;ge#BNkzS=H&)kSv0^*7kW2@`wTPIt%H&i$hXn09Jh zbyyqYQ--h7+%6f&#tBy6*sRr~GIjSgkZ@xb`TN$QTHfL2c}h2qS$~FMqyXrzUF0F1 zDcfJZGNAjmomz}U9lfA6BQl96r*8d%I`g4OxQZO~8!NUr?%G`#z(5u&NVSRyw_}I4 z0Ud3Hfh@M!w9ub_u=468$w%qsBULl3rRp7BhZHf5TvShd2_5OK=nDYj(E5}P+~p6#azH*2q1 zF7|!*-)F!7-S6$2-}|_7*5xeD<+hjCfW}p4s=lqC--Nd!mUh8Mkd`ZZMXeDbks-S`C z!rLaJhuy1GW63}^Xay+)+2&tVkb%?!1Oq8ST}#-!w6*Tm22CM;bGfurD>z3+2vn*t z2l>e}NCQdT7zkG9bLPzPRWG};1Q;-`ID?do;>ijU)>Km!Q7@S)$)R|TM>sNJSI0b# z-QMm%{|53vtsp(Dt*BOxJ9ccBVQNnku3L(U14}m=Eo2nJKoSRyZo}xb7Hz4To15*Q zG&x@Ns#m)_|Mu_yX5aYwH+%&dMgd|{cC>f+nbn-xb9};V+rG_Li!_#l*NGD+CL?;- z!S?!Bz21&L>3EwkVS=w%uKn}1_Ms1b$ZovhMz6p89AZxZ?cI|NB$KMMz0)shLp74f z-=%U*lPB79p7U(`;QK#l%a$#(n{TkAuim}rHE0c`Iqeix-k%F$~DsV#O|L3XN*E!Ni3s&blZ zMP4-JZ?0%jB9B5@8wiHI#AXd0qmzTS?uiDHx`SAKH&1AGy%X+*5HE&728?P`V}m{KdFR<*z4dKc~o)G@A>(eBs9@$;YitX=u5Uu&FboYvR+1aH&WjXK9h z7d$#9<1b^@(N*hqi??noLKBXkF0I!Jvc9QayHoB>a}ns2tQ~G3We&-x1*2qEeqT#w z6SHK2SYif>_a!fXiT&@7{@14NHGqN4#|@R|ji-9T-3xtlOiq*WhEeamap(= z921O#`pHu!YxP)bv-g^5hiJP!WyW-E$2Qvy*I)0?Nn&_0DDY>s`Lw4!&0hD~*J)xt z&sUSb`t`5ubK1iF;rD;=NsbJ;vUVrX%bsc={g^|m^p{`way#>^Gi~PdnWfbn>5foi z1ZjiZ4wa?<=(qi}rRI^I-(Gcukr)9d_My*V*^J`#oE+d_}3xMz`OPR0dL8;0_ryzS;x(sx=e_vQ8_=1{waEZj860 z-9Tyus>0j>@7B1kk2B;rZgn^vDaK2q}`4x8H0SDUq z|MC5H%{ABfd`f!Mj#2&7p^H$v78>cNc{SrTM`CMS>gRqy9tYlc$4z+MQ#76=ZP+$zwj6a6FWo3?wyCBbm!3z!;(;w%mmA z_a|BOHhD;^E;&kc1EvZ0-S2+a?^@q?-+lI$x4y-$`_px$JI;|8g(LSN2OnY=yzl~l z{AbRr**16fY-^l2!CH2<*oqY^Y{U8ucE_D}*#BJmKelS+s?rtm=%bIeH^2GK_VSm# z+}c{(>?c3@iCyyHOT5g4=Clgk6F^({R0E08nlWRBee;{&w9`&Itw2|F z;qG^=R@s&_8F!cQ$w7PfL<7m-!a%Yrxbn&?eb9gUGoSVeQ0gs0b;=ZbnI^~! z&c8qntg%afeyM%_^PjUn>q2HmJXCrdi?Pb%UYs3s^X-+d ze5Fq`b^@bsAXz=Kda9ADkv$OWFp&JHSrZ156{U1l7)X93zk}B%WgOGz(F%rmA*M|h z9booBME5(xD4T+5Y-n z@3f0wd67N($Vz*7`Es8l*IavzA4&10ull*isOZQ0~;V2UOr+v@|8w>CljbtD*g$owCF~jg-?R`Q> z9#*+0KJ7$1?6AW;A6WV5O8fdZzV6RWzWZJ8w!iPxfajxidO8lkdq3*QZvFtmN1QK=^~09Q5V+=bvxy zQr{eW$f0gfKl#Z|+Mlky){Z&uSbO*1|Gjnt$J)x3EA8`N_`E;Z-_qLRt7jhT30~Z& zgWu>Q#v@}@{ja}#(FRXG_bS4RGH>L%0TdPCPOU)Oh|)Ort#yu=8l)GM;AJL3b$=3()2m)jxGlk^$N0l_zxxqzv&Du5g5AXX2d;J?Si*NPGL+-mbV0+SzBF?L4_a0>(ilinL)NZ_hx8 zybx_K`p?}U^bty}g4)PTUs9ej+*nID*HWZE7ezt|QEO0^NL~$qWN8_^q(wLPVv?bE zSEE1-;bV_IrkHL!RFi1$z4!LCB8wZX#fulaabyw#&Kp@>eB%Fn!oK>IuexFU+E>43 zANarr?BgH*xIJ+H1D=nnn(ES76=3ViD~SL7hTpA4JwHDn?u+LxJ3nJOiGRhtP<^1z(e!f9P=Hl!-QZ`edI2KmX~^?fc*TzU|n& z!{a7T6-}9}of#iMthF1iy}>^5xzE~r)Gx1k-D~WhzwpmKM^8ER6#Ll6KIS_w_^{jC zqd@!16^VjF=l#H6BlWYXbVgG2mp zfBW0^na_R3et-4v?b4rJYTx?SxBQKom}p%6ZoA_)yYsF)o!2qP9AitCE^*@+tJZN0 z4!N%Iqd(3JF>)7NaDlz$&2O<~OPBe|kh__z-p_c(8TL1S^EY<#(@yqBu86(5__XW8E_^76Q%WL#^kLx#?`+LVfZmEVsgOCVhlZn%`_ z)|Cu+xXM#F7{q9RP$FT5ffo`fq!j|^e^*{{rQLV$eIEC;lb+^xr~wa}f^Azj$rx^P zKfoBWJ$~bx-e_l?bC%6tFyAMq7Wdjhtku@w`}W}vf5<-b+0WR|F8`Tr-?6>4isamd z?Z)G)9{0PYJaCSIjn(6@w*}+y3mVTyp8MQ$?VWFXryX#>0Y0fd``ORhHGjIsjy>U6 z``f?$TYLJ`o^JO)aKHWE|NDP^WywV2k*+a+0K6&~qv`W_+;s8ah=u`Ui5bV3&lnZc zp>TXwkTb&lf%KSFK9>uBwX!S(I4@*;zy5Wvx4(MxU-=pSn_mAW`-?aIh0~kf_$GV9 z>)&9nd)@2YzyH$xRY|v1{uK*zW@F9(T{w@7A;<6U;W0{?ccuqpW1=#u;Y$D z&YpMP^Sr;gAnuWi3e;Y%9Q;zEKcyfqx6dL=Ed^LL(iRlULeaO^WFTH)TnwlyzUU3< z*zF!wtQIg#_ug}_e|Q4$ATU=YSGuxd z^d5fr5xet_yL<}M#G&4nF80yXrSr`Q+r2 zXc)&Ze7JNh6O>1SxS_)ebsQsrRLdJq^x1jmooDa)`}f!Z2OeOT|Kf6c@B82DcQVgC z_gwF*GfqFlcMPmZe(-}ISbJ-Fg>-Dr7^@+T(ew{+H(IM-?X!IB`?wnb#r$w2CJs&= zwHGTw1(!T;(acy02FNlPP$p&-Ji-hE;)18|?1iaQrutbtca{IoC;pGUv z_U^xZcMtvDyX~FtdZ*oR;|*Ts%U}6V--&J7w9(Ew>nyD#FUL4%@Z1OFe~+^ZQk7A0mI0jlS~*lp?Sr z5HHpfA4U}8ilKB+utYFb4z}Hd9dH*oh~cGtj9sZl5QS4+D4DG?;DZvIH*a=7h7ID& zE>~!kdG*y-_gd03v3TJ1oO8~xH@@+W_RhDz)3644V}yT*(HN3U?B0Y-LTdl zJ_ciV#`P3|RLfBbZ`iOpq)+a;>n{7ZfBiRqkNWh}Pxp)23CEw{cdI}De?Mt~HK;5v@t0aoeHsiR@`%kmM*v@8F@bZjhJ;a@ore^f(B3L~rkCw7QtKr5ilu zhBp=ltJkddCpiA~i~nk${mf_WGoSuU4{3Y-h0lJ$?z!(Ce=7VsVU5xJ{Zp%Zn(kz`JeyUe)z-xvbF2hdRjTydM{eM z*v@_SbM5`w9{kO_-eqSz^9-N3Y~}NdT6c2=L6Q4^%(L7p(k1O@nrCjkSGA^N@?x+0Q!L&OGx>`}I}7wy%Ee ztF~?HHov&Bt$y(ShwS?6Z}3IMlKq!z6Uld4c`KcEu>wzq5~GvbnUIULFr>tj2Wt>v z{1EX0;-S$3yHdW;17$2opu;cn9eZLY12@mY&!*jvDKWR`@m>5602s zxMGS3mp~yoJU--RmyFSTxc8ujpP-CAL4h=H$eX@E!dVB;*1h+=e{Uan|NH!K{|Eo| z1H0q4J8Z++4W&ng0!=cOXPy=SoL#>9 zm9Mt1{pZ*08K*wOZ*>0rvY-2l8XTKEaQ{7a-SyY`oS8XernrhZ4bg6qEh`Vkcld&c z?`X1?PGBtsNYh%SBDG6-Y2wmWf;RnCC4)?>moZU!3)y&mipl+y8d8NgG z&x_(F+2vPWZeRcQ*KO5ft8C3Cy<*71OImW2Hv=?~+mK0ZXg&rdfmx`d+a^t51A|6}BT_N0v zO9@e00(ghyTmgci4Z^jydGi*J-FMNxHe<&0;^4PdMQe3+>9m6nKG-h0=puW`OJ8pD z=P&e|FAv`Tfc@;UpZVF!|M~d;u@8OtL;ha(<1(UwNfRg8@y8u+d(D{TS4bu^lapsE zd6o+iXU(2v(^V&FyUtLij(I{OY@Bq6P8aR7$hX=2W)Pn!W5xgfzViP{4}tp)8Ld=? za<_U+R+yTgtW6lVd~71So(>M=&xbU_m|>$hK4~V7J$axq47T;dZ8@S;HIn^+iyTjR zeE)~vx3|CJ?f%SaT~nR?;%C3`yWrpW>esElx!xc6f7jo<%l`F?U$ULsclhM*YSW6* zNqW_84{Y7CS#!6L#0?Qh((&GUO$}~N(w*P8z=)ztSgWVRpPOj7X@yytFqqVqY9B15 z6pgXLkH|7`0Sw(zxn%G^G?!PYu;A?9<9EN<)05f#7)dF-Q$$%eq>M(c8imbgv%}}5 zcr%7ywBr+Hv**m#c7VIh?fw;*h5Ib@?b?^W{AK(4*S>CVdFx-<0S7GAr0n*G#(77S zRUluU{_gj_>mSGsu&vl@+Fn|HHmH8pr!a48T>Yo3Js%VB?6c3dBab-Jjbp4b#}@E+ zO+I0Pj<|E((b3_0MR!b`fB(0Cw~uRO&(X%KUiB(}oP>9IcW&S5MwEP%87y(Mf;%#x zYX&BKw87TQtJj$Gb0~EM6N?@h?j&Juu$lB-6l2GYf!xxB=>d76!GKS7^c(~Y9<&AO zg+38|LH{rxSmpDKF>{J?M;>#ez2eocu&1B;bn9sA@W=38cG1f`?&8;8Y_ECUYkJYE zU-xRe@S+RtwXc4y|DKdHDLoS!hO&|tl&3~@`jJ~~e?@HHWiR-`yFn? zl&{kbsiJYop{nDCb7iC+8CKs@6mifkeq3xGeq66quEv=IL+L`H3;D?(4h>`2;Xtf(}yxtypWTj1;I^B*x_BdOx&)%9GEgHn_cEGZw{#Z}oB`b|BjsS%XclhraKu_q7_vCRoBKhVwzG;8=w}0oy9o+ro{b`Ox&^tzs2}i!c z5PZX>9Q6%vHOYvK5y)udWQ-A*rUb`FqzsF726)0fO%6Ol9BgI0sVkB}f7K#+o_DaI zWxc+G6wNP~^`}SDc&emnLX(%_*NjUFzZd4pj62Yv%SA8w^(XwH_lWOQ`|$hNAdFv` zd?l(d^?8*tkp6{b)<>b&a0bzsF;2r4L=tl@(h*W$CsXXWQ${wAOHBr{-t^PHTgVD(-g=hz) z9gRGGvyuPF861i^3s@L1zWqZF>NBsw$Cg&7S|#vd2uH@8JU%BxL^CgvWGODKgLx>l0owa&5Nb=S!bW+-|4*fzI*Na-~YbN znmfzicH;+TUUB6Ww(8MUR@d0y+=}>UvB>j=A14bV zTq&qOMG$ky5sLS(;*uT69w787Uy`NY!}nb)#j`tn!WhcEdjZL#P2ySeXs-{0DbhnI_QgB!kgzVmN< z(gm2XoOk(eUDVe3L*J9R!Bf=3Z`=IW4}NH$`1B`i?Yecne$WfzOFx%fa)}$tfB1)g z@Ykz?P8FzHH=?$HM&5CT**l$j3e*DyDQE4jzK!8 zuaoTc4c5?D-&2gFu>e;=sJ=9iFosKPv8k8W-Z7Y(KPjEDLM8%aa3d*?99^@lt+hi2 zZmNCZ3;*I@fa%l~_=A_c&%UA6-&$SuX3U&pFL?g>_NrIC(vCUycy&-Rc9p<6#EM6j z+vPv|xqbOR|I;3L;6Y!JMd#3N3?v`k{l^ddqyNAc4>JGzzyEugfsEmZ;Gs>z#K&-D zW5r$hT#u0_FE=>ssRq*J(1b&eFMa7t?VM+w<3EZPpUfI-u+{#l!`4eRRBg8@xw(Oi-62PvP*jJd*5sK-hZ$EU>c8Q^=IHPE3wObuwX98mx&MQbjWIjj4eI zQ5P;8Sw-^rgddU;mTahp^cbHEP8U+(>f6$~(_ZtM*V{YZ@h)xGmipE1^Pm5;{r8W4 zWb4;&l2L556HYk6E_&swwEa57=FFaJ)263yJp#_G_$9pMD;}|*{_H1q#V>wtYu9Yh zWWqS|r5Pzo^|4(=2fP>jwzs~`S4G@Z`1;qs?wuHuuV+TkB8a$HjZi0Pkhi9wfVWyy zEgiro_@}fz*+7QNMP%$gK~@>m%d@UbS|%^(YaEk|$+VzbfdQ!eT@sbEadwR*n;u;= zSd<$`@$$!onEZ{Bs();xK#}r2hFiA|(QYtz8}1q|SK7 zD=xOTz3uI`@4oxm!w)@d-}=_q?WQeh>$*7iAy>S3}fi6DFb`#S6pR~aSA)Kc zv&YJa^%ZOurkcjS5IUfo7;}1p4KsLC6h^3x)7=gqfQzVg*}!THbEDv~q%G^Pdx7r(|YOb)B8c<&LIfJXUFUi8_pw*M`Ze|!Z~9A{Idi71->}}k{jG1><(FS( z_uhS{t$b{ysR^cCjZL03MH5F`;u@80*QQ^GXg?D;%HeI2E}nFKH^H}2T*`|8AzmY z@p0V@*F|_32GaA3qF3P?al-|?8q_~NUew@;lP3B3e4Q@-4rCgF9{dPQi;8Vq zw)uy08H1JkU;yL|!;hd)G&&ISLAfHxOB{JA6X8JauK;dZF#sAg|9zgzA1vy$jl3in z$M4lvzWqLOz|pzt4?7%=V*Ifn5sy{qzXRbA$-h%652qqEGEUpJY_YrUzE_5--uBTd za{jz|cIcsp*)hi)XVa(8vMpOT+oXw2HgUoP>(sJ9W<*T8{h{z#vu4Y{G}-p;JJrrs zwUMXxYt+FQ$DP(ZVWJ&&_!0gqhrD09apNZY+E>47zy8$~ZsXEc9O-~dCn5qjKv?9- z#jNo%ktg!gurRiSJ(J)ClebSVBg39|7dt@xyPJBWT$c$xCiEX8g`M*4)o@i8RX_y~ z_(A?2udenyx9cCs6);SEYD_Vu{MA4*R7?T42Z_t@0Ustmx0D*Gk;qX_B%i}?%v^-BgqVYT541(IaMys#ose>A~OFjb^FDX`# zBLCS}UJL3Rn-ye^^3GxNn2*dGNTcqg9RIHh#AR**RmmF+hC85P;c8#1WYXA1)5AOTekL9QHb9Lrdi z5IpmA;%Hb5chaEn2cm2s((?E`e{nhAx6pgNH7VjqmS!DJt z_AWAz<#65TPkeff0nsRr$19F=OB&f#(`hX`TCAygqRriVZ+qEGFOso*zAf5!AFU#J zI$r~bm6ePfmY>1M7J{=8jt?HVU&iy^yY23K?{Oo!Xun0aKhHfLew0m{KF#02`Of#h zZU6Ca|Dmn*eJaO5N1vz*Qjhu@5dfhCIvJox*QEsYZMItBvyXh*_v5g#^ldkMVsrou zrMI?l0dXmP+&~Tm=nv~9-Kig>DGhpswN2qIF5j^z)ioCCA1W9EdA|$P${RSGKk|Fm z>^d46*m=lgDlf0w`OPFB6N3lUguGN6qoXSF3>B*4S&Tl>lp)fs0ufa}zMMZoMO?&} zmye+tI*U5W8`EFCg8{sPN6t3~=@2rN>XU(#ooJ}%_^nA}MM7#m`D%OdqA~;7x_b;H zKzG!N{?HwbJ*cXk2?on{RDq?6sGSOoJ{MY%jLDA)Um#*To9-kw=!>l~?}KzWks6CL?-RQkoBN zCHlTeMh+_;ca~gAgp=a}rl9{}jqZvjoeZ9kiiB$Yk)|+$MS8Ch*VBvR2689}{Rz@{ zw^nexC&Q0s0Tys027|Te{s1+yg6#A=Hhs!;d-^G-*%{9~)8@*k#)o)YTU-1W53j%RM*GF(m)b2i-Kg+pU*t73 zWDgvR5AWzwd3v7R|41Ok`RFftoz*3Rda}aN7$%JiFC;cXDPsYQC7BpCpl7s>8_1yo zy~>@_;<}BYz+SCold8=Xt6iScAN(a#Rz& zgj^;vyPqSNv=~YTQoD{Cxjg0K2C~4eJcH~Hx!xF9Ie1h7qe&le)>G#zI}Jx|Y4}J2 z6Cl0N?sJ39l{F|&b5o)AAcntAdkmC2%vH(M8hAT9l;X&5LH)Y9T`B8 zk+*u1frNw5tp!%C7D#)dfvkq;XABfVqojHalK!<9cMAP=Mm3gpE6L3bDRl~TcNAas zV2kXARSC*iTd!3i=ajl?@FoFq-01hCLI@^NL}8+0mt8C>wQ|rZMQ)uUim23^Nvu?; zsL%ZlB4`aDBViK5U^*AaxPh#MP-p>ytkkuo)|Imq)uw^s3-~PSh`_)rs~UJ+>I(a88a|~p`Xe!!!6dwM#5)sG=;r9%H z2r7!Mh*nk_^`KJRQxPaI9|?-#7^GGgs#?yJc%()b5oL+K8!=ElRaWVOQncToiyDhq zx|!$-h~bd4#h)9-JgpCcZ;UB2Qy+-JrSXt<>^8FVW9K^uteQ_ zGP{>?Bq4VT<>4SYF25rHQLe1%2_ZKKHwQQMy4yx)-0Vu^x($CQ05>Quf`Ds+n;lkO zGM2nS!CN%lqAt!EFs@qu)ylG!2BivM++v~WMo)xG*mu+-9KhpArFum1xhyB8xv`DR z2pEZ_E+mob9vp(If&Akr6j-23tNKo@6x;m0YR&>VGcHZ6(EUh|S66`_bUASXC59vKOYEvRBMU=%|Je`E>~U{)rI%bL7B$eB|H5Et>mC(j4+JfnyT zV)wKs67x)DnF*r5Fq##S^DCifjGX>v;U0^;KXO0F;{jKo7<{=NA@YO*;#o`LqO7kH z6`(9UP&6)xxY9%JS^4M?j3{ZWG=0tlsN4l2GM5Z#h>Oe-pCf9nl=f6ZT#`a3obPq{ z#fo!2?~h!aBLV6Tl~>{CJ?Z&kqy!ZO%4Qo`Nd+Vkreus+D5}KGM@lbLO%QTfGlo&5 zPqENfPyj!f^SChtRrP6BMCKF z!2y@ifuFRh)d$}){v{w7X=Uj{*3T{;a=qG%pt%zA_T&n}t=p^)6k(3D|7(5*Wh|41J=5+VKF_o zD7w-!6bR{p^Ei?&&SsKP8|;cxWQz@Qh)dopKF8l3X# z`yhr27-B<%Z@>I^15%InBUf~4P>w2vh^}}+pgfTkyDi<3c+w!(SNJ0w2nC^wJWnM8 z{lx|H^gN!r=x917R+GIJ7v3TKAqP3>4vb~=RDP10bI$!wHH7lef!0?%yx&!;#kk@W zm8XtaOLRjRpne!qA3eyqXDUQYhTu~c9SE5r#tGS@=VK&PL?lu$svW4&$Psx9C!+QQ zAjg1BDP%7p`X(L;0DF2J`oNoltk+#R~`{%1t zjs-?MsG}S5>MDR_&nm;n?={!DNh79$1QntvPl-x~FhuAV$OctyaOkW+v?a=k!a%zY zlXtfu+8YvQQuiR_9te59@D~ir>v4qsh={~OAtN43XAA|ZcGK)U3uDL>yuts?CF-@!_Sq4E0RBiE-%|GlLpvGDSTUj@p9AuYind@j z2u6OPE8H4<)yfodmLtzTEV;w7l@B3DBtRL+S0NhgE@OatLR!G6$4^`d(Y^|D_lsyR z%&15d!Ez&6VjXqKl}?BrYOUiK2%+QXWCkCL3;(u7(NXEOo4l*i#7_tg(48FxguF}^g*Vz&?k7VrWuc$;sH z-W^W4Acl&<-JEPOOk!9LuWxuCxj$4&AE?Yw5&Uom&pX;4Q-xnYiI8+u!ysw3>>gGmldU5q6$ zK^NuaiehT$lxp=ct;Q>gWs^ph&XiW@$?NeJkTFd z^hfkvd0YoyI#Qj{hy316-iMKg-@qA4|8lPxeuFQ=7-T%*lE3F-;rFe(JJM(8q$iFm z&`>3=$Un4t1*#cjR)2j|B2s_+?E`p`Pfq0Mle5TEYA!&I4*ik*Qo6!&@iSN|G4cxd z;{`=91Cfa|tKhGabxgHiHS~$0wAr&}+leQfXeXX{q8)P3As)A8%^F*>-x53Q zki%3#`o%Pqmw%^_aD2&a&O(X)#LkoGqYe_a$!_S ztPEshb%7mAeaF{7W^VHEWi=7oGnipHxqO+S6_Fq{(*Mt+(0vFF4=c`WJ7twd>c~op;^o zs~5n4g#dhG0)rUPxcuy_u1k`?X97{D8)l^khT0Lk8zC(&gbjq~KVO8%%TL>S&v*iZ zj*d(z!C@#r`-<+TPMc~U_`v(^TNsee7c&vlqVTg?7gsci6r6 z-fM>+dAPmjJ@2upQ>S|WzVg+t^b6kIci&yodsB0hoqW>C_RMEK)7ETQW1BW^a>K_2 zNgwScSFy4X(WmrXQ&W?@?d@-~lTSI>?z!h4d*qQvG)9xGF}YIz_7KLAH6k}-j=MeU?2_cLz%Cl!*6gngx|xKp2gs{PG7{>IDSeDlpdnbBV##9RWsRoDmA0{J(2 zRhR#qtN(yoR*(z`DB|PG{9JLD_pAP^vpb45L>?!=K#;89_!CdCH^1pkcJ8_7*ilCw zVJ9Acf*pU{vECn#Keke3D6fiqW$6+jka!>mZgNV5n%z$tI}^&v55>5_PyM77eNGyw zb>2Uco4ybs|Ncvt+J5`(=RX(A803?IL!Fn1L`@-H9}t<-fb4?{E<58izEUj!21Q)( zipmw{mrF5_rTRo!2qx7fhyi)j5l7iGPJ4!3@vAHBwQqQ>z4!g^wTG8KYk9$PpbpcraM``H1`OyT@kFoMls{PH}^@Z0R!Fd%@nebjebiF=K}7c&Xw@ zU%!66m%|97XSUs?eo|ll;>usxhd=URyXrSr*@6WN>@WV}FSHsxOzFM*D7N*KV?s4G zYD_fLm*VN~=u4wV(#{nQ6io8CiJ8YU(@vnL9 zt8C%E``AZ6{t0`->)&91`*(kD*ZlEX?Kr}~tKNL;?N?a{zmlC_Mj@uBMLAq8VB9b( zLHg64S$PX0ES}x+ci<-u11i1Zo_o%->~(K=osS#(*yD!?bV2h~x}>&V2>AyMIKVZ& zCmslYpBfU1dP=ELuOhU9oURolif0Ac+3yOHtMH)*9_lNJ$5ub)6K2JOEA0LU?zasa zH`sB<9A^g}bf8`R$E$74+BLo%JM7TIeAO~->NNjxEG8XWxg(D_(iOXSzs0uC!hP)U z!w$DY4?EOm&YbB#X3iF!ba+5)?=Zk@3As6xuQK;!6nb_I14QOR&(GMp*43Y+`|p%+ z^=6gB0cEWQq>pG)0U!At{0b7Z`45`4+9@ZWYIojwmn~oMkUi_%b8Vk}_K|Vi%Wk~> zdS6{V=iF!8>^U>-=a>E5rc9n<2OM~SZ=vVRnd4h=jLiCV>wWt@ZQ3;d`P_5PIoF=` ztaBtohx%lP8&?eOv0CY{wcU5$eSHkH$+(^NjMHrLl*!uW@3ckxEb=sDkJZNlZNE=F z_33ud!H3%7MT;eQmp%UY<2Gf=G&}m}qqM?3!j>Lzpe}8~ z3Q|kYPG7wh`Q!Qr3vR?HAKU74pLMSN$AA2X{q|Q^`gmWvX0_dV+wJz)s#UJvxgK=rp|(Kf*R5S|?K`$J$ZW}h2iXb7A8&^q za)`~IJ=<4~&wJi^s^d_NlZ}2sTDx`~Eh_B_1_PSTC28DvMNt>3U-ie75xpMSppJ__5bwQJYf4o#9% zo_>lC%6sm=$BsMhID5z2-{E1l;m00xto`g~Kl7{p^Uiyoz4LAFwAJePxBk^z?fK7p zz8!z;@pjrNr+L~VD<83Y@6*=r(8KL*Z+)AcbM`rQ%u&bKp$8r6hWVifAM%cCHFZY!fCn|_xZMZ?P?!uZ+_!n+Fyv^H*5ARX{W|6eCdVu@|V5bjyv`^zu?Z;YldBO?KO7m zt+%>9O5+99h8rC+09fTPnQ_@;r>_TjNXQsO*O5#IV<7!TTuSVgC%u-aAjN!Oh>vKx zR{C#v?Zq~6!X*2jAODZ7Ten7e8bvi)#kII`+;8!I_K^>N*k1qI*Sk(%eEth%1ncbj z8?U#MPB_s%_3=;JdFP$ybLqLyd9Gh9{&4jlWXuk>Pk#K9cIKI9Xa}e?^}*BCFTeWr zuMtfAUS}6c*QY-1Wa;@i_V~JWcHjN?yRp6G10S%9F1pB$(n5vtarohf*-7f-{TA(K z3+6A-g|F4Fz3xxW$1e)mSj<6_L*1cI!07G;*GU-#DzhE{6bi~fFzS+@?s5ZJqj6Hy zo86>Q-T@3GjpxAo_B(Iaiet8&|NQgqp#2Z>Ez`p*9=2nSmIC)*>Q{P<8J+fzm;9qm znmEZ$I`JgC?DETeHF=>rV)K^GcE{~^*bAQj0$*i(@WUUp?|%Qg&U2Oq%9_<{?49p; zr*A7Rz4TJM>E@e!GO((=?$6h`abUn#>x?}KuJer0J^eyw@Td=QK1hi0_CO#~(hwS~ zfef(4k@{y0&m;UWb*4)%=FO-qox_zs!SJ)ra$CI=pY}I1tV;}vP{qonpw4LJ5?>{jPtIbJ_ zB26VVE-fIsp#(B8Jp`yHwe&Z3}mfl)QS}={4DCC zS6*ZrHf^wXzx&<3y1=;3nLWpzb7a1sC`h2m|K{*OI<^)ZQr`h?$ibL#v5<6m8({oF7$TW zEw|ZkfAd>=;JycBTz_j1-v6LA)HM`?z5puCX@E&b7HxjrX!)G+&Vs7+3rPZbBd1q^ z2QeZtML`2W zS!dW1>HFDQRlZVlnu{GjqukuwYzwu5{PE8(wI6-&yS75*xlmEZI;}97zjxhpmkjxO zH;(?Jc~y)f$c+uBgzSwf!WEsoz5F9Z=sjEng5dA{T2_&wa+&)DXE+e6L$=M^G(c~= z`8MBrO_?}Zam&&bT6HwkH^_)h_46ul`)#+|Raaf*lZRCxTcjIry3r5*eefa(lS#$7 z>&do#XG?kn<+5K~W*`5=$L&4ueUH8N^{=(Be*LR{rDSE~WuBmL$%~HiZpr(G&LYjv zs`91A;K7y?9kuM(X+Qtz&;2JyPdoWE+q7|`8>gFZy2-~G;aeRcEpx4+%q{N^{?HGjIs&yMTrRlex1 zX7zE0b^@$=y1LrMt6r0lm9hB+u%o@p)^6BfM;>#mz3z=~($@cf?317Vq#IW*iab8U zyEUz?Eq*>av3a5^bj!{y{@c^QZw&cQc$Ojbj2r$6K>e7dk{R^=5c%;(mDOVzN>z9{ zQ51naG&PUm8A9y)%CN1UK$`j=bYdUeR~e*13;|kOI}c*ucv;L@emqAfOuwHUX}o445I zS6r@D;$HTazkG`wa@e76OmDd920z?A`pBdGO14q?;m4yTXPteP9e={{cEpiK*s&TI zk3RCKU3cAe_Sj>OX&ZHr9}IKThOIm+QLeP!<^5c(_H_7eI`mz1kn3MM@qiDG7*3#{ z&Zz_y!;o=Y!p*VmJGT2xj8$4~t$zG5dswRv`ij;3Ms4MmKlFfazc5go3(}Y9x1q7Y z;UaPaCk3LS@*?sKpJMQ)|!c8{7MT|+yZzytSvh)OoDBu!M*SRK`07y+{)i!##CZ`I0;2lpO6DQ{ zhzGR|)+Js2>Dp^;tyW}jcwU0^4jbh7O=Yc>W# zYUy7uaaoC6sDKe(aS0HK0m9`vs|3<3Q8~ZzbRjJOM3G;V&LE2juFmb9)z2WA6kMG+ zxM$n*;upQx?-u^okAGy}{@!=&U~Px@S+K8t=lkEWyR`jz-gBO7PkY+a?GYKg$Jab& zXPTlw%xU;1+>&rN_cpQ%p2;Dxqgb9@-9WT3!6XOMtA ztfme+;2^(g!D{TLn{M&=!(_BLNBrqee`de>^>1CM!;d&z6J@UQ++_FPf4^^a57_?z zU-6U9<2}Fl#V@?RV~#pneR8&6zQ+pYNfcV|8%vjd}O7qT)EPpf_V8$UvAGo@A&_NNnO&z)^Y9Dam7wEQ7k`RGc`)dQuAJN!I>hudS1Kkf?^9`!l( zv{S8KvR|#$CdUuHtD`LyfYzWG(fFCc5#I~0m*g!aMmT3rTAnY@6ZbdE%M(Y%xRBym zu+*!scD`l0oufB@ZKL-2!dGoDaSMhDzw)cw*Rtaz7@Oej@xbi{Jrf{|MYQt=;4R#6QBL0J-XsCJLMUt*d-sh z#C~(tZ|wRTuJ^MlCKSZPXSKpv7ONbtg51n`XvIUmqF`(OL^qH{ANU{bSgc;7#vg;G zw|JArGtmz`JYBEV(j=Qad6IV`la2mL4{7&)V=0iYoMz6N>4u0^Ib|?#7&Z(E=fIpP z!DBD2{HIQyYU?+yw=G&>PMI>r^YIuD>8$uMMyyu2;WlU99ADYrf8YJS^5pRw9tYyQ za?7SIw&IcHGSGE4ZTbwYSf=_7yDeKc*z)BM+IrQ=nBv^}paT!FTCG&Kix)eLRgbOm zl?uC#IdkXuR*@$tSe0(vywRplneJoj@imY8V@DVs9wFLi-+g>sU>sTHke5f6*k;!H zid;bP6%e)!*Wb0KD==tXx(JoZc&8+9C9q6#wNsc*P0!@wlP2UDg^@m2QvP3vvL+6^{g z(gdHU7&H2a8(iERUB7m{HBD&Ld|fF0Y_^T-HrWgrOwJzJPGjIUZrJ4Wdi%Cbwm=J+ zMVj;MBsOo|Vh>A>ww9f?L<<{^($=q8V-KkRd8COk(x+J>;zBjyuL?4OoDl^GlNL;J z7vRssn1?)^L-C9Tk~~?uuh%M`mA04hIC&Q@l7R%u&Faw&q&lS9go8Mr!iYKpDU*SU zF~g`)7Gp*{`Pc$Y(xg7`x#!u1y1IY!Ti>vsUiNdpv&QP+!yo*xefcZt3dqfXMs*y# z804&2;pq>e3h*S2`tU!Ifzs(e$iMOr?^-=JG|529_^9pOn(PA^ z$Uv+#>6_3WW!MIzV+KA1I@;62`E1X~7kz-=)5U|sd*I`s=x@rCmv9(n`mm{q`1Ia) z8b2K_KU?HF&b72^YSZ?4yDokXHM?F$g*qrh9mr2STOfEM8+E~t_Asc)OM7Bm`q{S1 zu&QmWZPe=A8T1QA8M|mepJ2qiFLxlZGHJbQ#p=&KG$y&@TF<=x0!`{vt$nC~q2Kkw%rI zg})+5qyP*eGsxrdLy-q&;RlfxQ~{Aa*w(5o+|a8D11Tb{=P@7U<|@pjV?b6iK*T{z zMhqWYH{9C#T94xnH-nW4LzqF!UFg@n=5_w~&aJoKZvXSY|KnG8(&x{g@2@NJ%G>hg z%OzYgfTU3mlOavAG^wF5zE2h~R_Q38mG;@fGkh|Wzu+`*t$4~x_D0!1L^6>=|RDuRx=)NQgctf7%Y|2A`I|X z3WM;&Bg(6f9ISZ#c&DgH{owLHvUptjN`CHOhn6Uf3jtiN8?oaBJT#gwrZa+v@Hbtss@g9r`$v>OO`U(2}U2{k7PJRT3&=v1jt{G$cKvxA%{mKuLD1XJb?5l9Fd7k>50mn)$I5HqX)H-5NU5E+>$rJAOxaL`iz|keI}z3Nkmub?gEsAK(qpvI9yr+ zt7uV-j7lJ%^9V+zhytjKFcStpM4phZkeTGDABrqFE6=L_>XvQ7KoX`L`RZour7d>B z%(raq>P(H^v`Wd@3?1-*@+}xtp2p;c2CT1;bB{u39Sl=lF{r$c#mnyt$i?Q>$T0GH z8qCpEVWMXi;uXy~9`E^M zfeTuPFjinCC7unSO^ zRVYeixpCZGKn6x6gzOSF#G>0nKlsa#G}U`N$7(IE9i-9xP}P7SbLcDl;3e3`jhPY`Y90 zPcJPG4`>`V%tzRut#lMgC{3=q`X)c4D;Y@5W^PQNyXwXfBp$tuT&27*gklze@_f-~ zh+&_PmB<_M3e(s6*NJgd6tR(7H+Dgbp61hz)bxIXv$zBX$giaZ9Zm6UTp|2u) zFP2sKlRc9BJS)rveW(jXpY65Rp1htA{#}h26S&BMTa1TX-e_Nul%uSaBm5LAOs-R~ z9CmAA5KO`!;Q|=C^60WGy}$ybp2eE{A$QHW3YV?CaJ`<0Gy~bTo8Wphp~u>p64MAz%S=b zyjDaQZ2n7Lj@}5ug;a6}rx622Zp-9h?~VwFR}JLP(viilEuwb*l$LqLopn%FrXnZ? z31lxl<|FIN-TRJ?F3l}Z$$;Px@h*ud5Zc-m$mPOM-O=Y6NQz{M%KnD+HGffith}NX z_@lprn|D=4<%rP)@)4Eu1eMALs4EO)CFH!q?>7&%%_bb>dKpL_k-#|mA+`R|=-q~p z5KV=~cB42|5xobHxfnQ(T>FCnSz*T@qb&2CyTE*ymEl)gTW<{wypor?zEcyfy_55; zR7vVH5W@?=5tPS~GXzKI7{&m>sUz|bhQgnx;RmrURJuQqEd$9?PEnL_yC8p*!W|Gr znE^9XWoO#H^2!^ZT`t`TE(bhAhyv)D6=csai%ebe$yG4@1`QdBj}2o6ve7=dJmv^L z^_-ZZTOLX3(7dWmN1Ieq0w0K`f0Ibj6G_k>iN+e#6r&2>02eyYkM7xLaf+sK;7 z4FO(UWf@})B95`>8YtbM!DUMwkLN(Sa`2-#?{*>tl$*zK=0zAkMlL2|5c!}e11N)^ z8xK)O@J9xWqT>AbbP6LPw%AE>h6I%C7kP#ds~`CKMb@cP7P5^BO0@yx%Ala{prInk zjbP#HsVv39g;@XXZSLaubDYtNjCV9wQFuF*rN*D#QbY|aQJxQ#?$AewCNR$kVpag! zOqZIpB1>7bdd3J`l#!PDz2#KN*a`)tgp{cS0%0qV7IRq?@Qb*hq$uM3m>=o(3(o{~N2Wgv%yD3x>V z-MZc&t-rW55_e!N9PxGqIB4#60~QA?Jk7wTrr=(&px;=q4Egq(ovg!4EMY>1B@2Lt5?q=oc= z@_RC(Ew~|bX`~e>*FhEJO~$zR^WxrvFoy`_0}wZ77~%4`7;G4^C?9!b3UZ11MP8^Xlu4F|M`+r$TH^*tzx)v$zC!6Z0XL3>=`&wVgQC_#1~O1AGz#e1JUrH*K4d_1{5VBPFCM8s*n;wL z+zXVTL6M1-UA@NyucSj-#riV!QA&^2Cn>rLBt~{f zTO>Ow*}Yy5it}7zTSuG59EwR9sv15^^$_ z3}nx!;zTjUU?6+yB$Rw?rP)XWSfw-E#A8?}D)GgrDCz{&cw!)VJ1a+e7aK`x`Gi%Q zZQr@Q>c=WZ4B8)xE%fS$I1uqseY9!}#2Hf{ciyf*u7klqd11v_BvgX?quX)A-~omJ z8JM;BiKk+QYp!@eI&lzuC>QyoEMWUYy5d<8G3mJx5+EBzgN?$R+YRPg+XwIf@Tr6l zuc(s&OdSK(qcWTk@~mUX<d<9f=_jA6F4#-A5LZ)7fJJI_;?`nI6C=F8q2Y zibVmMu4c>zM97L0l@uroI_M{iV|;TUP_uZyeUkLDp6wl7w!LMCe|5wYD=aykJFPAz zLBEK(H;xej6{2ni7UbIoACNH$aAVko(uoTL$4Oem^@pe>W;|uQMiFTOMuI!k9wmN6 z<4-feYw&v!8bWNZNg6dca}jk7kugQN)5?~&6N9DZr8t#3@Hm5l-AVQ`hdjzQ> zeI-qvP^Ck4m43@+PeP0pIuth_N76^GZ<2@x5nl`shm1{8$~j>$ds>`svp^jM6U+>^ zS6Ga~jx>y9_=g1wm&;h7ELcK(>mi3$kaLt@|F!XNS10di;fpA`VwTpW1-qQ9x0)8@ zJs)l~U*TS@Q+@;vp@#y>*(n8&rWry z|9W=VNMBH(XiP#hwLocd38g#=Gn z-3>Yx!+_KPKk^Y@Y&j8=pf^fDbcLDjej^co5${Rpn0N&!%6Q=7PRmKcP$ zT;9s8SORGju7HU4Iz^NXH`2n78=aV!3qNiq#uEwAY;TSNO$0QbdHTeg6>ZG*!iWri zAmS*W>B0?d=qh)^D&vQD5oVCPffPTYm;`L*$(FGl9Z)ZF;|_s2*^#MJ7P6+RT|+P$ zPf8#d2J<0SQo%q{3(=(jF7P}=V2nb+yBlE?kc*y#3Ip!*R$k=K)J7C*o;nRguBY|& zHGc77=ZWd4lf@&epPNI4Q@Y;D?bLul3;aer3Eax@2mQO!t(zj+#}$FGG?G;f%=}PO$$TZ^8CNHi(-zG2A3p65%(IU6L1j=$oV||-WheW{)o=0&m z$0#9K;f4&m6R4&fRpfG&iqIHp<5-#8VI#)f0!4 z@r#f5dIaU7EW{X6yyw+C@_hOeMuB*b8%@A8>K`=oG)ehFPp6DytqV)x{um5HdKz9P zS4kJdyP_cdDXm^f*i}F<>g^Aq7X}2R{1ic7?&?2dKz>rO5A_-(5a)%B3fCzweyD)~ zD3>vck)$Yy&)oSq)qsnOEEi^;N8pvzPQ{b2LzdBRbSXc2#8B%0n4qeGoI7_$ca1Iu z-F2OAApJ|tlFpUkots3WZ=F0O;R|8O21Ps`;+;w!QBRHpkIUQ=A|fi|3RZMjACNax zKS%_d5WG+QyBL+`NiI_r`MeqWLox$03?lLEYFC5!x`7mVHx}XOM@P|q1}9kwGkCck z`OiNPNnTGZ+$bBMfZ}mjse#Bos-Rx%%AlEJ9J&9j$tL0W(fzb~90Tc4aK<`BCCdMh z4t#k|gs1ExAQbZli2`(d2n7fSAw90jg|~41d$KCV^OF2TNTZBnlPq9^rYO4^j3Q$U zV*npP;J(?U3qfaLFo}Z=VC+$ImpmPXA$0zVY*)BdE^k9|UfhZSE%LabgkU20*c?Ul zGLTV;P&04dG^N#eh5miU*7PZRzf~_`$%~CdI6h@Z7}?6*0FB26(4z2LPcZ;q%Y>h4o+6cKe%Pxu3bnJc-7(JWjjt_`?l zAeuk)kFO{d^r8y;LZ$GtjUh<7U%4Y)E{>N~LBHsWI*YnIEWLIrjd%>FizAs)w_ms9 z&+CwP^Z{ck^h$~7A3l-vM^n({;w#?Tys7M%NSAC+S>p-1kwj+i<7h;5IPRW+c&r6! z=}=_ENHCHFiHfusx_Vj126-@q&B`)S#<5BJ<0fToQc>a?q~rQp<&(=eqa1^haa3^h zmix+4acrqORTmH8V+=8lt@5{M(CujN*6Lr|aOG)J7+oSAnxv0Mvpd~D*2_R*?Wq7^ zsbk*UX~n}xvevrPwztSYNgxm2%Hwm^ z4D&wa6~PKO!lZj3GJ0V=>b2Mxc&3aKvl>KH5iGf&R|SJW4rz~xuMNij}D6Z9n9ZB zR6r3PYvi|I(&r7@R7?ZH$H5q(%s{#fB6Q|&C*tumQV2l!cQ+6!}V+*8$tSDpK?H8V+juC_U_0Lz37)VeImzsHVrWXcMl@=>VBoHrFE$xSi@FiH;O_7$#Dp{&){B2HhKh{@ z&lJ*tqErY0il`ET4{>>X4$4EMS8GU)Jlu;X3FQnj8FLxR<;)Q5NzVP{2$q4!3u}!{ zcNyGBguZc!g8)X9ff{+r`HdJb^vXSy2E!mKpqT%v0b|&IXp5&G!Kg~t8x;(suO11| z2A7@KporXEh@OOy1!=j*T=Z_y7XMnCq8ha_WR-|foZMtK0RyRypD5$lB)@OBRlt9l zQ{`x?FJR=x_yDLU{2)}qaUB;mf_yg=BiX9(4khfAVZ=yoYpbyxN^6(DO-7PuOyN(N zVXq{;un1lfh983~8AzZu)XbYD16k;Wn=`(}mLOfSKnyQ<0GEN812=v-j{TR%@rP6x z%k^hIN zAj*&o1+y5#go!6l@Fp(Gk&pDqABglo@GXH?*p$V21*2dh*}C{aq;&k@Tb|(OZ4vbY zvh}I13?W*cuUuThR2BW@XGTQ$pz0}0^g#6u2`~&*gl-3@fFe-4^473)t7%g)F4dzd zSzlBzkiNnuP#WCf0puWDC~}t|uZsbMznHV$0Q|~>X!w+c-{)%3wtAA1Cdl$lY3Q=a zS{_bNcw)U)l%9tzwK$3m-v@@959NZD`-zkrUdVSJ5&>6PeFe!y7Zr8N&Tx_2DSt~x zt?g8JODhIbe%Yp-Qf^yUt&c@alJlkPP!PfZ)m1W(aR!NskkJh!8AY8MS=^-I0JTju zk`E+43ZYZJW`Y}ufr5t{N1E(g8VHCN=3bzv|HPtPV*Y=3Zvv&~QQdjp-WTn%E!(m! z+t`-8@7VH&F$M$P4cIIptY#+;36Oy{h&7fB&lc_S3EIRtw_{>11i@_^Pn=&n|B&1LzodTCD!3lT>Bi~6Vamo@;LK2$wnoyU# zf@GaJeO_XgU|Gf0KC;(2;V z%&-P~WbE{7KF^bJIY-KIzLevV znA_jm`pE^9m_OrBSe>U#t3fL9DJy!C&@AAv{`la6GKEe42A+Jr)yKAH=jf=n^22QB ziJTVD9S!Wb> z6xGo1NDQg8v} zO&QxmUpX2Y9ve~>l;ecaerW-HJc&NYZXHn(X^kxrTuMQ6iG*efHPc=UfD4@2ICHAZ zs|mzb+9~NXN6n47nhtY&*iuI<>~4!W-P&p^uS-^>FJn~4N=xBp*9kMVFnDMwdjf9q z0Q?fJwHltOs|DFUdmAlw4UA}OEzODrxk(n}_Tl!}sQewn@MEoYD@$YBW@moyXGfl^!vx+la@0N%0+T%q0Q5K@jR`LX%M3l_zJ zOP0i8M;saZEjb|O&zm0$7A?@0o}Vq<5}RJw6i+|*R6P0A8o6g<+t%%3%2>2_q7a0Z z0}3}PHj`k$&+ybh4FJ^#xh|cFj97CtCg6feYLkxmVrM#F_*Gv6MA)~cpsOgciT$Z~ zjT(bCCVZ@Tlx{&~ogqm{fFwD{V9{aS=@LC{T3~o~)zIqLe?WjYIm2erN1nbI-YEs? zt@Q*hzqBxgf+Py*WVQOy$|s>&3BSnDPZq$Ld;oW@sI<+jP`Hvns_c@otyb1NDaH9x zkn*x@m6!Tjjy>5cC0?&$96 zmJ%#yp2LGfF)%z7+qZ3vyYILo?!4pnSo8EVF(|8&K{GA13$wk~Buqz|z1$tBLQ$wo z(J+uPVKe|YQ2i#}R;_VpDYZJl#MNOutOg58t;SR}D9z~;CW;`N1-#IZIbO%0D8Jv1 z&(#-al5Kn(lH&`~XJ*6CCeU}-kt~@7up=2B9jOX(mX&@IFpYwQbZ0T<6Z$~{k^-b4 zl9`X%?=7St(?}Ci>Tys4s4SDy?G}QVUf$tpo7E@N5Q}l1!t;9M{s!;jPcZ$ z(|=iuMef~w@{~$GZ`Ihip^(y&GAqUs@bOwJEId$Ts!Ap2VLcLKC(6YQ50dkI!z{r%# zD_e#9!Yw8%_w;SDqGWv%T(o#WoOky5aoHu8#*r(Ijz#0b_Yt5Lw8dYTrx9KCR@-d zF$rp$=@2gHFfGMHtg#NcaAL(|HT2nt94~J`s&!wfQXrdhU-0G3SAYt*8Wm)B+bl@J z>qV&+sCob4pom9-J@yZ|l}s^11XIfIO9e^iq$Wvr7U_&Vu2m+bk`nkCZbHst$~J{3 zA@j3dmZ3ZrBJt)Gpwd}s{WM1 z1>Szk_XFi}{18@GM|*TC%(-Q!#>KBBs+^*lpUfAKjW22V6OQ;4AdExZ0BsPh_Pwd+wfZBqXLF2!r+pL)t1|tl3=)uonBcoNnL#lUrvyqi9HWJ_%>D)4a(aXFeydK5+Jb##nHw=BmwY^%G+MB_N3MT z!t(KSe)o6oyq>t=f{SA1%Clm=w$y_|L%yZXhEas6C}|Jn*}|j_QuO`8i|Z0k>!_yDuU3pAx4{{y2$pC4)bjJLL;NC`cX& z@;N^_##PHUflPRiu2EnH1zCtG3X-8HlW-z1KsC|D75B=7lH&0lR_?KQ`6;KxYcIMu z7A#okpKd@ICKT&YOxKpWN89Z#tupOWcs{dK4l4+XIW5Zh^B2UTh5N({&#jB+);(9{ zhIUHtn#!^KD-i7^T<_O42rgumRAYA35hP(>Nfd6QaOq-!^WZ}3kD?hF!CAqs0zcf&q z+l@X%f+R-C;?c}!tXg#xa99yf{OU}9N<(5J-V|hfIm;6u$xjrm@)f8CP?Th4vnA#o z>Uk0eANvkXUilQE}L^!{gwCmd5`3Es2rQ(HPjyPd%Xg#+4*AEL^b2jC^A4Be8Y+ zpwr5?Dp7%aLC)&jbO8KqijOaXhDT({j>hots2DjaI;3KRe~@oqs%<}SHHk6iJfq_g z5(sfBGk_O{3QOuJDt}ac93C05-%bJc*o>CTXc>{mnTel&1fLvAk(N_-6}3Pb$Y@n9m=oU`hG&H(7B_JFs)Gj7*VZ);vrAm<}hg8PT;STa) z=+WrV#QupWQqWI%a9}wIkKEqDRg;cOmX$MxY1gc ztdSDd#J7ecE$I{*P;s`%tAsv#Y~ zJELFz++O)sik)S9-N9D7Sdb`FEJ!XIdqe;hDC@j0chtc6h}AIjM&m=gHB9NN|M~sM zVe!Uq*Ptv#qWLYqRVVwMK)4wfOsydM>K0p6!oLwNSrp%0W}4ikJgtKaf#XH?jyU`5 zbK;cK&hWED2qBQl4n=h+%JGQhK3iP#%+s+$N^!xQxv_Nr17q9P&9P%(z;(b$`-}xX z*63r8KNiofdzLIK2B@e*R>Nh(NtgizXqQRAf$rRSb7M~boapN5lwvIH%u(CDy*;Ka zVZvmgyFg9iq!TW*N>I&PI(`&hlT8hC+0-q;*d^fvEy~baausFJEYosOZuI)YT0=SX z9fD{QaD}}BdQ>tzk4O^#8B6!NNplmXN&cAwceuhH`XqJd$u=hbu-!`e8y+qSkqN*= z=%2$lb$gcsyeK7^Qv;}I@NkSASx(NxCJ@hY&VtQw^}SnwM#pJT4q?KoQC?sFJYRO= zI=XsnY#>ZL66Si~s(r+2M9!Emykp&qf>dN7x7XTQb1@@5SFA^>SrE$TF(c>_d!PuKTWu0c zdYxaISnPax1PGrGT4Y^!*@1>nrvM`yhp83hyv|jwAdODv1W?=I$&&t z`3;+;2QG~>&RiMGmK`SI$~j|8IZ9d1pFcm2TXD3%IeE_m_r=4HJ`x)?tdHTLfjH>E zgQB;uFE(u67(+wDB63`?X`@ey?YXC)ji;Y}DuzaQSe?~|X#mY^IH5@83uOgVmxs^$ zg!l3*uZnlP^IdV}Rd0xwzx<52`|f*`Jr>tq`@uN-taIauCsv!54h>rC0b?Ozm~8C} ztl$VFU64j032S*=DdNbZ4vUX`@S}0~;fKZp4?Psyw+|PE*n~#hY?tF;nk@%CP_O{( zCDWb4B7!!RP#Q&C&l-{tbjUM-0+R=>g3MtT5XiHjXI>+m;Qm!;jYEZ*$|f{%PlhJG z$>pZPZMxM(tU>xUxqdTDZO1E1%Izj{s3gk^&&!R((UQaWz4v`_~Zq zItB(uV%@V(*9sC4w1D86xBOiE(#Nig6gLLCo6G| z6k|Wiv2L|{JG*2(vVHE5E0!X4bGKH`Ad6zm%Nci_c9aM!cq@uF`9nGdh*OTJ)8*J= zk0`ZgPTEpQ#g33BWrd60qLADnPi?T!EFo@KrZef1{Ddd#0sW~8&cV7=( zc4#bFvcEb~E?E*_ES+1laB+0^^u>LTJQ&YO8DVL$<$mh<=i}kWAC3i!_lfy)=Udq{ z&n+Qhr*Iy6_+hbRzx^sv{3*TTFO*XQTfkPH+T$Vg9<8S5zw(vwrZ-*_LjyxnuusS0 zMT_H{v(Jl#3m3&R&pzX`O}60lW0L9gdZFnv{gJfJm_-p&&LWol)in?eIMl)*#sOh3~S*ibp|IqU4ZYp zN^7R$h$rr>iyImmaz2pta`%9rcrr{Kthp=$P#@e)ye=bI7|;TW8yVFYVPXrYOS{=V z@h0s3U(s<^nr{aa@pNkE0-Q8XB zx>sEo*Sz6M&9y#P6Ctsy(lH7@MT1o}zlG0J6n;}KkFC@d|0z`oqC9-=DAyx}SI!r; zJCg-Dr>Dztw$^O3yRBrUPozk3EatdQrJ-E8(Z-@I)+gI@>UG6jDO_LfC=L!QRdf>s zRK5b}G0!_u)**hO^hJuxkMA%mOsZ>`P+)q{LZa=UZ@KtRu<)oNE63DIGJ#YCoULVv zE?TrG=FOY0I$|%3caO$_$!%d_qSpyU8Nx%u2wN4d29S?{vZGkEXrGuncaGaD)oEWD zl|rgwOY%=cFGVvJ^X4y%Q(u0jV(syVfA9zKiBJA&{Pu6JigntmBj|tqzyCV^;xGO@ zo_+4wvZ`s-!{Y4i?bB)^o`?}($Esw-?a=^wTdp$XjIoW@D#u{)eCgWNPsSg8_K)Ms zU;1Kf+o~0t#YnEVuQ%q1_ICCYkc<=1j}EnY+8JlWTi^QjIR5w(Ekt6I@T#5^Jbmu# z>vwr3CcK4bpcvJ}9+Ob_XrDA!boI}fqxv11XDDq6u;`@S9&NdJ#~x)dCdEyB?%cWR zi)d1N#;JcSG}PmWgw-^G_IQAnve3W-wJdO62|x6 z1+N`#tB%jL#AE0t9i>UxIlZM{$buwAb9k4_&T!`E-8jN^X8cUl!HdBUGS36Hl8Okpw<0?H}DER(_gtcN~dk?lycr8MXCH=wb>(j zz`1Gj7R?i$xTOsIPfL;`Em;= zf`P!hlmrD}VjQslfo9mIO`BwqX~k7ue{X-RIC429<0);S2ZshdvHXl*1#Y^>Bs32^ zbYDFE%rn9-!gKx_zX`UFaZSi{DRk(;hr|UJzACnC-KK5*!?GgR#p=hNkh1HDtFC%u z9CgHUZ`~IzS{QGC`#a(dZ+KIjd(Js=@<}JlDn2~6NHCW#UlHe?eRf=U;j81a%P)^t zoPWM7h>=*mdbK8z=o2kkgyYad4$?OMs_32D7dwV_#3dJB5@$&HU3}@q@!HqER(O_s za&F(c-6R7mWj(&-EpPSKXdhY8@bsyt){37e$})IwT=cq&)b52=k`F!juq_uRGfD!5 zaKsUZ$2)%hU2*vpSH#J}v0fJWrp=q<73aP}{ktk&^{Q9J2`8K&zCCRV`rxGp$5mHe z6_;IhS)6s|Sw4$wDhy zp1ADN%i=;=DD>&x`|h=py!4VwuoqP7Vam8g<#M!clUjMq+d%@kQh4cN_zF*4i)!LmbiTm!q&+>89 zQAfpF-ujk!-9@j9v(7q8N?@CDK^uL3)0^HD=V%NMJn+ESxN&2gdFIM^_q*O5ha7xR zER=%WUpt+nk3Bk;$}-~|oc>;T!G&?*Yc7n7FTU8c-hI#AF}Q6o7A;;BAO6sX-i@pIbVUU}t}ao&07#rhZ4$J#Y(ExWdAHJ8qo+S8VCO?9`*dn>I!JwOv>i z3pHr08v88XH;y>+h}c((;h{$#(!_e+!Ud7z^-++raz=+VLGF#UYoBsjQIK!|%24G3 z6N~kv_C?2z?L)EVsWocjsJQg9OC{XL#12iEwQHaBMET9%SQUq9>;8kAzZXCMj(5k^ zSHDet*(ocgQX2Nek@MbgnGw2-WdxQE;Rekla(=l!NPdv>1X1K%dd#jPdnY#x#z??fBv1Z@r8|X!7DHDR(0*#wZ8O1 zNn&w5rS0AO-}`YhUx)c<|u|be&Hj(;7PD}@#1)+7O#Ex*;l)cQJ)oFaQ+2x(+_U4<#X+|*ZN2YAaD5! z7P+V6)KgE5pZmF=)8f}-JSa(T*QHd?Kkr=C?TQEPd(f8U&Doqc{nNq1_kNqs}{=^dHmLz8|yjR4r6ilOJQP#Vh!84k;{4j zDu-~!6Ur3F%CuMGWlE!kMx|G*{FKIPiOlzM@#dg`vYa_`05u>DJFFc8Kij}*hqOQ` z2kz;JXuwnovfX?4>QI!4leY&kSNYB`!;K@m(j_1^4s1o}5YW(V4x{r&G|-zjyXH`@^90ijMQ3_LG?%2MhU<136c<$B3#lcV^@L4Y&tc7>z>^Z zpZU!1#6M}vYW zAO7$bZL>IE<2-NJ=cQl%%HPGWX`BAJKlxlN*?(!Abn;2w-ZF^5ka)07mMW8yiO=MI z?6JpU)v8r--F4SFe8!n)#J)@REfoYeeg6mXuV4G;xc}b!;*b9D58`kB=I?CrE!qEo z_^+b-lb`stc>nval>%BL3*e2~PH9W&xAG&F9B@FKdB!EI`O3V{`bBgU;EeV<2$mze&aWPBfk38uf_o9m&1dm75eVK@BaAor#~H^_?1t@ zgZDoe7rpADIPK-9SpojbSN|p6_x|_ACqDTJ$;A(C5d%jYeuU&_AU^x2pN&ud=BMM< zTW*b>zMklivhZQPy7u_$$K!?@Z-@sq4jkp|x8Hug&}6svq!#Kg{LL5QgCG7-{NW$| zkr(ZwWMo`?(M8&U48*Vg`me{Ye*EL{CGmLkmW}0Gg@DFyOtSf%Z+#=Kzy9lS*PVC9 zAAjyo;;+B(1s{Rnz|S6vGyUZ+J3?c0h4I6i)oY%JeHSg(B6wvScieHBqdVj7JAV{^ z^VeUD8~)D^G=^Ke5am3^^Y&Vrj4iLTV(ck*s^{=+sG%i zeFDaYIMg5UmZyH9UvWhvwRz*_xclzAJ^9%-ZQZgpI<)#Cd8PQm)6xzETn> z9=80)9latR)mG};-~PH3#vHl%+F~w=6Hh!b7Von-ZqY(;*PVCy*})F+f}@pt?!Lzg z@!&%aj#p~y$CmhxJMORma5RFVLHTnL@{O;5!`o$_p-ECvIP`ZwTeRc_EMmcUD^}EwNlUrybw38B%AGdE3E&V zeQn&h$?2q7QOfaAT%JKZcExeg-#15-{?7RBO*h1Ccik4Z-f?T(_`MtA;m00~{gy0_ z6J$*y$Uf+1a#dVB$H+U`o40OuTC3L-NuqItl}1%=fA`&Yo-D&x*t+2Pur1nN+$$?( z-n_-puStVd2&~g~5dC`e(Z|M;{q~JR4&FZwkpk_X+apt56NA-EWx2Tnm}p%Rw%xut zs3_Y_loNEL2ysjXE@-R-$ukEFaKczo#aIO(L* zrLbR+BH?q!QZSkf>({OKWy7a_<5TK>Tdex6&%`xverxIH{rAW3eC9LpK26Z~z3&6@ z30b0F``Xuhb9=*$--%!UwO@(%YN2@7yWbt(_{KL(8??8nkB_gB)pNrQvERb|;@xk5 zx5wn$-~M)NT(>d$y8GgsmFL(xTex^(oO9MWrhlv2&zxZvFbW`IejGBOm^VWa0zyp$~spR_kZu=I`GUf2^Gg#sS-Wb_4tE zvyXRdEn`RHQ)FGr3WX&;p~#9dVtzV@VtWM*2~b_|fKxuSE6s`*%(d;^8h{5RD;ru$ zor1Te9GzIhKL)f+8Ca3JW&#}`W?U+-P$@nWa14N9#hO{KE#0zZ%T%WxQj5W8`~w(l zG5zkl?uuunNWnFJPBRuyJo%J_wOi)?@v%r&+H>ok_276V6fPL_3GSfO8k z@g-8K`&tRDIOgcsv0WA^-96h&cJAQ)B7UL*lPxE%Npcbc{&o_m`!3!K+>w z^EHuBPMkqKvG%FBOI8!-oo{>l+qEq{!*o0B|w$A+hG3d*(Tx>wfe9d^6tpws*#VUiF{jek~AuKo{Cjo*Or8^m*xrKKLO& z#el+QVA|U?u66NZ%(~jU%r9tJ`{a{xn=I!Ky#Ir7z>@v_A_JE@oB=cJ=e_b3as2U; zS@9psl1F`bg?4aYQ2h(lf68ap=bd}5mDt6vzu1>T=7;#eLcop!U_P)AaDjQ-k8X>% zz3pwj+*$YBy0}8yV=k89B|zJ@qr|?HO%#|F4E#ebk+-_oa6Wn4t+!eM{^E7liH2=4 zD64<%;}6CGG6Ie~XrEZJ&z#uw!p3;!skO0vaEI`?DL3Y4Z`Br#x43ws!{ee%tVzP; z)#4NN#~z?rmN1I4JoixWqUgY#zLLiq!51(s$zxk>D;9dIvE*X>`7r?W9gF7ot|EXw z@r@Cun@WJdB*3izq(g{;lvn8*8uK|9hrfp`JIq321u5m%-`5i_)9Tl$mG$oX?vZ6T zs)1t?jvt8n^*jweU+@``aBbeUNlL1`rbs!q!r%Sww|$-iP>oNZwO|qh3bP_MZyJzg zv)#AAC!KV1EIaHlpVx5K_q?`x%d~~$668m>-yW;iJQ+(5IyjD8zC7m1>Y39&Ujnl} zzWco!JuyaPz1()&zr|BeJ?CvIUp>F$&fDXO$5)H?LQDVLem~N|4d~-fJZ>xN;fEjg zWe#VwJP`lH+9%>iKl+i+I48*?Vj!Evg^A6u~mj$Oh zVubR8{te;-WwDO2_PF%8>+ZXJL(4~&*@hBlF*!yH-SHUSbNDlks@WT)H8ReGETV++QwLCo{#Wr7K#--ZbcinA8#?u7Qc>Oo7 zkK6CKD^65jx!_~`P&%78Z;Bg#@cmf%@|Ci<-Vg`Ns(j$V`{RpW`eHn>T3cZ$TNLCA zQg)O-RlMd4Rotkf;BS?(0=T`$s^gM}$B+29%QwII&A46i$gMpWUeLT&w8H=I-S|B} zagfFZ{M%PM9=7K2nTsW!^F^lN6&C*HO`DDL$+c_Z&_kAa;X3wM?Ua`68v|Ngj$C$7 zoV)UrSa#rkvEjKV<9pxzPCWa})9M3@ye69Zf#*d_%7-mIAEoG3A8|f|Q~{s+S%ayp z|IQAYQP1-@}q9Ms5aXx$K?? zk~SkWb&{$W+LkR{P#$+yOKd4dhqXFlnF)D9hDf3!@nS`m-yCML@&h_Yh}oB2c4eG; z+Da+75wG~%STB?H!@H6XKlYF(AA}?`nK(?69&O2vJnV?rscn*9L)0qfb1KpG!<)Vv zfBO$#jt!f(YIRpfrW%2wvCHU;ldkQBk|*8$^mR)S$XeJjSS*2#-p&~1+wBz&(iZzq z{^ZXka2sNkwrfv3{)E$6#WZ(~Gl64Bc0O)m9K}RPdXnovV})**;|97wcP4{$id}-% z74yCcSPk^naY{6L+xxHuHcJVSSoiKC5mL}tl1?25A4K{$qlu3>((8j2?n8XoQ z&d;vnzo z?$ow^v=|M7gQfg`@ArQ{x_Z0gxBkoT#63T{-RTK!TDbTibOL8xNPf` z?6Fv2eeN2T1ti7fH`$njlfag=&%F!47q;XHUfilcfD=AW4mW|{m{}ll7mDu13NKQ4 zK_6$YvZggZnW9kP2ivi(wSS!_+UJO8^LjgCq4>b-g}v}mbhAAMs58|RoeJPAwNPRx zM~>unNSO>s!)+QIiEX&yF}V@tp=+cs8tqV@TWda|`@&FrY#eHfjq2(qY0DvLN2@Xw zs#T^1#vR#$SB}fkhmQWaJ*&8cFp(kv;qo^R+ciieRz~^rUW&qgu2Ax@6yGMTh}f!? z89_Vj@RtP-RAcTAN+>sM+Njm@1rtGjDo21Yj>l_Wcws|q(CUn$_Li)pODo^n_|CV# z6_05fjDpfwn4aALViFqpS=KbFZQqJ%fN9eoi=d+XS7^I*+G(f7F~=PnAO6q>;)o-T zj4yuSOYvP-STOlv74&z zq^0BFoNc4K#j2i8ijzk}AeiP^@%=C_{7^dQJv{inbLX%u%N6mFk6afgoqR%kD^DcO_n=@RB+h0VlqGJwiW8-RpwL~Yv?cIzybz6(8>&g&g7fp(Bbc$Qmrw5jF;*`tBM)O zcRBsbet;wS0OUNvC$HdXQ~zZR_O!#x*W9oNTL*;T!lEz@R${1amAHyh-`|n#Gx;uM33F>qq&;s~K zTNWttk_pLbnl5tZg|{UG)uVob@l<>XE&P-GCQOwE?3Ruw*5;zRb7jdczy6=&-){T2*fyZ;l?JW3swE_*Y5U)7 z%0KKPfwrK@bfS_-mv%%3@v&hsMOQg)&nD-i=5Wysqz z^Q24`^!6xR-ka``^5ky8&q8K9)lCKDXBm86L*|7Ow$~^~l;UR1`|U#tOKA>hPNJ9i zFopYpf|SoXgtfR`3i5evu{WV0`PD;NlS3+?scl)Ootc2KDGIV%VdLK_2%@(ZB9P0A)vF(i@7(Z>xcTN=f}dMpU{XhTWvgNQqyrLw7F`LM0U)668%`yO z@=x^eYTUrq9lmAc42m)$$Nia6IRZ7`UTqI0m(wRnAU;_!O$Aw`)oylpub{Tdb~Xv1 zal-OI4SxG%ISwz{V?e9iR*m5ZXNFRgY`-Z`7M7F)DrfB(Adv&jaQeV3(EP+8+sgK! zBg54%e2^)CLX<4N)C(5^w?Ez{zJd`+fafHDI zkIkl}V+Iga2DU=U&)L+Q2&tk~u}zB}mShtFL0la>(_4ZTb`~ptutTXk<^20Qa+U|x z@lymXbbBCanF(7+-}5n{NJ7 zuJ&y*8mvbg$}tsW>vBew*~6M&gyom>$MT!m+lK2oq{eR;>#>$I zP4cFNdW+M}BVJuS>SL$+D*4yK*0yNh9^n9!CZ-4)85?0|Ij$5F%oVxXpoIvRSV`M;fGu8~oH>5IpFxUBKkx1vH>D#ewyVw+m`TczaQhqr4`i z6mx~z0>Vw9B^?23mYD+JgB7JZLC5CI>5J~}@>?{WJTD`{Mn`#fbVL^CPz>{^gUVxZ zG2fCIhT4`r(g~|fPW{w_Es`>VgVrXly@J|UYsS0?fR;25EAYS!yv}|k$!=AD+*cCF z#QoTih&Y56q6y5c;6~+UXeVhyYW&M`B!bIllti%U>5U_^hh`u5vg%J9pe22VeJYxA z97(5K)|n;kvWfIpTRQ#aVuuOun^OfwcxX&`P>g=$X99A<&MDFIXRp8tQVr8~uZC*A z26I98SnSu|77J03T}46WIb^9*EK8muV~4>{DEKSlT-hM@OB8R31v}^xZT<(4qbSREI8$HONEa^mhoFa zLc)ZMy#Xr1u)@R_4M{8@AK6J(;^>;?Ne-{2YsmPCKt+t?lorMzyEsEz)PSuPJpJ)M zcc2c=ZZKuy)X-$a|4m35nsii|n~**^J{hJ@Oy>97V-Y$!ao&OUR*der>KdgS(cKye-tC(nkD+DNN2QGZ~v}UMUj*XlzhOrQD#DiTd=2A8(@CQrSij- z^S<%8S2Vc^?M?>rz$FrKtwF$%UZUgR47r(b&I$@oUNltt?E$PBQ{^gcTn3vzweR={ z+5|pO7HFpJEwuQcfVT)Vf~)B`+D?BDVDeRV+&DmZiO?x>IqU$M$XbPWhv~9rsPgXu zv_BOMncj3j@)?)mDImEu0hGYx#93ixSQDcIaNgm~9 z!;e&uerC4=zK&Otf{ayZlJRLTuG#@3F2Si`77aH6e0y@UhAd0H;+3RKhwgMhroU(a z5xkm-F?#`3cUVuMvl4AhZ*{EcW(^d^@)ct65^eE=29<|)qpft=25tt(BA^rYGJcAb zF|0WbQ=+*Sb>hsBMU1$*p9M%-liu``=fIEAmzI*WW5}>Ju`t=jcG${9k#R;yQz))7 z4$}kKCQD<^urqjFs?^&lzbaw>6f0R37e1~$q+L4II*O~EOiPcUGc8zvituy{mnU}TAJX?t+jFL5BO1l(xrX|a=R4d4z0)AM%#sxr*V{D zDd=qgrwqf$q2pA@7!J?2YYYimJkvQl=sMrP6Yw2=4{_7)fA!I5}!f&--G zD7_dOr-aFb|Cj(>=@Oc0Q@Onb#xm=9CNLu~*X10RH@S^0-+=7#6j?23p)$`CQMS)u zWCd8(x=+b3PAtlE@nR_!!#_I2~ZRHuRKyyWA@vt$kzs)HZwS1e|QLq?>YM1 zF(388igX)BRh(e<^G$F{SWWJQgKN5z7y&vGsP0;zco*H)D8=r`%ZcI8WVX zqaabFC`Y5`U!eg&oH1g_!wu=r4q1#SN0j6?>90}6g~IdzS$8HF-(rtHrI66JaIr+1 zy)7LRkt0&uC`t=D!imEOpiZ-~7o&i(9xi+GVsPaoV%|g7i=k~=NP&GdRB`fN8xN-Q;Q>C- z#qL^VDbyZs*BHNzjry<1o5DFco*+Udz)X1wiEA>xX89(by#a9Ge%$)gg2ki+e^vmA zMj3I?+0Ku$iGGp*1sP*{)N}yqix=oD3sQfCi+zIFAmE8)ybj>4ULvYv>HIvqLQ$r& zY}HJ^0h!$#$0>^a)I;`TDhE^^?FN}Y8>skTF}&xsU>usHdFwkRP=_JWa9Y{vZ-)|C z$GpXMxST~6+_es#{*+-Y2`H{{C04f9R)SJK__iGF6vk4N6^X?-BFBepD8oYAeBYWj z07Z+_A7$Ih9Kv#x+cJz5*&f@qujazWKlw`GLe{JxEyxbG*gX5Ievd22zHTW}}_# zfkcz^&KB)-{hM6hXN}rK*?J>hJd_|k(T>VtJLMJSh+kHE5Ozv*kq&+kw8IJ$m01vF zbKrvg2)UiIks+S`F?cqSNP?Vi*%At_DS@n%kA!CN#1G7X=Kne*ZO#5n?pG7`vM-?G zk^Y@xI#sd$Q6|mp;#2_p%67fPP_6`dL&giEB0R^4-x8tp^)ID_7_KNul#~=+ReZj& zmS48mMOl_KlxID+RK0S%S1@K9PH|pw+T@mZucZ{XNh$KoBin0~BbPI~gpWFV==KCi z1?i8x&~FxoIyh|$7xaS9z{~jlT)gsHN^4I*?G^?BvjgHtE2CCGzKfZ1reU&|3YE!; z3&;G)y0ZZz7trS3)}1w^T1g@c?WHjq-Al--K+->3x|?+qG7aCn7rkq5zu1pBX6OVwse<}6W zv#Yh$?$Lnx;c=C7`C13xdJU^fjeGr58r$mxe~qYyu@C{`&}yZq|H%U9kXe$g6v2sN zERXb*_pG;KJ<8ua!l%y4gW)nJTm9K9;8;Pvz<)ssCd7>bBjAzSmTWpuVRcU-&hxe{|sH`Pl_}nQm8X=2HhG&3gHaHrrGmwT;+%|P>3vaTr zbiCH}aYfU)Oi}1O)y3DuQ#l$(vt8o&K*oUyd~6mfiMf>~Ho02~geN=bw%{uaF#csC z!b5x}K;54d2GtJXi4l7BtJDK=Uk<4^W^S{nm`P)_nW1SdJrH zFoQ?ssSDb@g4&Vt9ZbEsrUFXm4W}nH zKw-l2)jvnI7`Uvv$$LUO!CHu&9Z;~Bq+r+Flv`#x=@;(573}1V?=gOO zOh}nzGvG1X^d}!0=as@f4N$)ZXnyxt%9F8 zNUIOH&^WY`6@WbY?5-;g$!x2OEALuw(;j+TwIKN@Za(vfg-Ln+-+Sd)0j0=eK76Ew zu-{}-KPOs{BBXriQxO`HORYTKQPvZ_oZRW(q4g~n)H!Erhg=pjT`0iQbb>s{XQGuJ z)(jVRp!zQYKm{=Xexe4lN!rGOMT^_jFq1Z=U^k~fDuW8!WmC?*C_sLap5?P`+$5lA znZqbHjv>HF3RZWe$BPo>Kv3wzLQHi?Zo9^&Sd2xnn(r+so&{vN7Td=wViV+FY<_$X zQ%Nq6^)h{8Z~`D|I7A566g>K4!6T9mnB2fDU{ZC{(M|Uy!S&~W@EKk3yjTE- zoL4J=nMndKqZ%L*wNj`oe-oxBz&RdW=p2qVMmYr}6=DU75ub=Vp-tS?UnxPv8usq2 z3KE5f>V-okrQjfqCb9Do8M`pw1?6weOCWJl63`A}^G5~9&;AHVHZ6+cBT|L7 z!a?#&Nr9?0(PudG?duQp%Rm`7AaSj;-At^ty$~fArh^s*B?$ehVsWZTWo2%Zn+!8# zO$n39Y1W^K)R_QbW&a2?yxE{b*4TlJ@!?)gC2p0=z)l0uD;}}jqF8&{JECh>XY^`d z`a4HuQSOu_ITmv?`S}TCz8~48@>rY5Di);)qZy@nZfDvAp%92T>lUR^j!hVpl`VBq zj(l)}E%XkBw_!D^+ya8U=QH0zR1K0scx&FO&pJ2}h%6shC1 zQ}xkxQ5;Q)cR)zyM*!nlIWf{m?MO^P0T1^C@rcb`d%0!W5ZkD&h0 zaYquUhp%#EvC=>S^N$Xu(Acb1=f`#qDGx6LzTF{d;QN4izyh#qzonpij81!-C6ro_on*}pH z)0%let;68+m69$g1L$=Ic@P4Qq*ZB*GgERD0ko-2K#pI<^Ww_~dB>PIwaOH&|(`JNPXly{i!a08H86_fPY63aC0mYl`HDRi@ zDMxzx70g=285=&V%eiBZ{B9{(zCg|yCGT(ZB_I@Jhb&C1598pS7>;~2m&6Ar=}$hV zh_ltG0AhyK$TN{c5)^(afg5XHA>@H@Ki)Ii9wU-tp7XR)RT?<<8X%-uQFszOH^|3T zXgvq%@y4Z42n(IHwSy0rFd+>^L3;NGC^>WJbdvy>MIKejB1|>D!r^AJJWk=UvB4M- zL$O<&Z%s-7Xdo`REidaEvX~n#K>!O5dc4}zv;tHh1$8z4h;)JR&{RN8s2!C+lqUdG zzS$?LPoe|J7U2a&XqmKx47Xa(3M4QQv(hX81=%69nJ>bi6qvWJpN#{_XT=d#R`QnK z;84h~v5}xkW~2&}nFE|S(+8jvUMP;zCECmeh$kNa!Z>FDj#MC=Z2--13o1q{a)mux zNt2HdE31}po0f0ql_HW3If$m8N^n{es7+6(08dC`AZXK(siBfEdr)EMk71GF{fUeR zDF=~;LfIp#2JdHtB$@7H`9>YG$!hOlf750wlCyDqlw?omPJfY{XDG|p$i+GHfjJ~! za)V`=D6QP8pKrYow#>=#C2-CidFVTprSn_|>vLSe?x|~20u||JLNh$6?}XbHqy@?N zx&UWfrBwN#5*hmMr2#=uL_yxnK~R3}k0GDF8QNT&r#tQrtmj3W#JL&khpc+k)H$`^Hl{jKzNO4Kly-Aw z5T1tC-2h9L0Z=W;6AE&ac_AE3L%Q4=n}o@zi9==J0Oo8)+*^Ed;idRU;Ls z6(c?<1!nDRfC}jnkVz#plYk~l@@S)N;l4c{S39NBL9V#jO7mMXrBp@MpbCcdP`0*W zgaopPh=2)Jgaw7^qQjK&uEAmcAPg$0Ofydvs0XlKlq#6(3E zkg7hyPkDG&gB6H@ob<9Zk1rU=A$g3q#-E}sC?{K3H9)~o>e*L-zSwtSRg_*N$dIQ$ zoT>XkWyi`w;zeK1MJiHHk_0I&j(?C-CN{tNmk8We1%8Jey3H)7d(;|GksC^Hit=U2 z}dG90yS)NuE~`(&S)>Z>l!YaQmpVb8;N3^>LUz=$fCkJwV&r7=@disP)>Zoq$o+bq_xSA)G!GYt$p!I zSFkGsXM*gqdc|mf9{!cE^3=9PS#6ttBqoX`xN!C9d*&w}Dr7N$Fo1x8l5W87M4#Pq z`RVW{P>*qihuUVdIOJ#WTSaR-_lwo&lgqbuEmdfrAK=N>xID zTNX$mDyfCm1dzu>lY;aF$vP+u&WVePEb>BX&DS8)MJ!T}w-CD|bASp7;s>u{l15F+ zz@J*w6Bk)QCO!80kH}J%Hc9VN+&xej`V7nZ$m z${I-db`7v-uEhAYxdvTR0{P@M%Yi)0SHG2A%fp^lwKBh4%|T@_rCc>DP6gQ!A?1rr zUfs1NL>T;pQ)R#B7rq?m%oe&SM}p&IB;ELXf;zlBS2nCb-6)p47ME+sD5zON$dJWq z*2Ff6P%jfvZFOtv^jfeYE6P&1@u@-@e_%j9UZ50PlbEXV3&w)Yn6WZI2$Bl$#QbrD z#!B1tqC71@8U1x$iF*!##wo>z0`nh0I0YO@pfsS}W%(mlQB8!J=LVYj1yupkv#XG~ z2S_wc6hLbZ3hFvr%0R3F&__J!wA=_BRb{^LgZeWbDJn>UvwQ}HM0OJ7Qwki614j&{ zLP1)NFQ$Mj(sU{c)!jE1p=36shI?4_HuA8T4e{#GsuATlh>@(Z9|>l($rspB(_Kw$K|$_O)~Q23 zjVgy5MacvI1-}o>U09%`!pjo%TA;KRxfP$G*@wxHnikxgqv>Cz zK(l$m6eWPH);_iI$VlTti(*#P@_peTpTDJRh5t?~&ANG`1;}VQ{?u>_nuVtT%93A5 zD@4oy6v?7l6(49e11XL-60I2Nj04rH`A#Xx6-r@CMeEkLq_TXHg5zx(6dMbmAL3Sg zN+n4}988s8hETPruS7o!3Jx-r*Rn{n>;zC7OAlJ;vIaO(p@>)M7unWPQCk30Y$*R0os znpX^nELbX!hbk!I3m7tLycGtBPpHs<>Dq3kD`K;zw(7xEn9f-O3D@idifK$NK*H0^ z+6_RX0yKvnaDPz(+ETO$2^Vgxpsdse+G@>K#!iAMpY5Z|)O7n0P^-0k3!$8aS|JI} zh!CP2fu>OUPu5FWAWmK>UI-`NY|B7mCb(18xu4L}3?@RhFnnSJrDivoqJaUfpX zm<-?{n|>0WrdR?+Sa$Gf4an9KRRZxQSWnbSSvJe(@EV+n`e6|QCKA;geims`;O%Ie zw&y#sKoy_N1ImF{eu~qsQ7*aEihmzonM!ZTAW+M@p$X_B{(m8C`17xr%RvAD002ov JPDHLkV1j1Ab^8DS literal 0 HcmV?d00001 diff --git a/devices/surface-hub/manage-surface-hub.md b/devices/surface-hub/manage-surface-hub.md index ce6d076d19..25cca9e168 100644 --- a/devices/surface-hub/manage-surface-hub.md +++ b/devices/surface-hub/manage-surface-hub.md @@ -34,6 +34,7 @@ Learn about managing and updating Surface Hub. | [Install apps on your Surface Hub]( https://technet.microsoft.com/itpro/surface-hub/install-apps-on-surface-hub) | Admins can install apps can from either the Microsoft Store or the Microsoft Store for Business.| | [Set up and use Whiteboard to Whiteboard collaboration](whiteboard-collaboration.md) | Microsoft Whiteboard’s latest update includes the capability for two Surface Hubs to collaborate in real time on the same board. | | [End a meeting with End session](https://technet.microsoft.com/itpro/surface-hub/i-am-done-finishing-your-surface-hub-meeting) | At the end of a meeting, users can tap **End session** to clean up any sensitive data and prepare the device for the next meeting.| +| [Sign in to Surface Hub with Microsoft Authenticator](surface-hub-authenticator-app.md) | You can sign in to a Surface Hub without a password using the Microsoft Authenticator app, available on Android and iOS. | | [Save your BitLocker key](https://technet.microsoft.com/itpro/surface-hub/save-bitlocker-key-surface-hub) | Every Surface Hub is automatically set up with BitLocker drive encryption software. Microsoft strongly recommends that you make sure you back up your BitLocker recovery keys.| | [Connect other devices and display with Surface Hub](https://technet.microsoft.com/itpro/surface-hub/connect-and-display-with-surface-hub) | You can connect other device to your Surface Hub to display content.| | [Miracast on existing wireless network or LAN](miracast-over-infrastructure.md) | You can use Miracast on your wireless network or LAN to connect to Surface Hub. | diff --git a/devices/surface-hub/surface-hub-authenticator-app.md b/devices/surface-hub/surface-hub-authenticator-app.md new file mode 100644 index 0000000000..a13280d8d4 --- /dev/null +++ b/devices/surface-hub/surface-hub-authenticator-app.md @@ -0,0 +1,78 @@ +--- +title: Sign in to Surface Hub with Microsoft Authenticator +description: Use Microsoft Authenticator on your mobile device to sign in to Surface Hub. +ms.prod: w10 +ms.mktglfcycl: manage +ms.sitesec: library +ms.pagetype: surfacehub +author: jdeckerms +ms.author: jdecker +ms.date: 07/27/2017 +localizationpriority: medium +--- + +# Sign in to Surface Hub with Microsoft Authenticator + +People in your organization can sign in to a Surface Hub without a password using the Microsoft Authenticator app, available on Android and iOS. + + +## Organization prerequisites + +To let people in your organization sign in to Surface Hub with their phones and other devices instead of a password, you’ll need to make sure that your organization meets these prerequisites: + +- Your organization must be a hybrid or cloud-only organization, backed by Azure Active Directory (Azure AD). For more information, see [What is Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-whatis) + +- Make sure you have at minimum an Office 365 E3 subscription. + +- [Configure Multi-Factor Authentication](https://docs.microsoft.com/azure/multi-factor-authentication/multi-factor-authentication). Select **Allow users to create app passwords to sign in to non-browser apps**, and make sure **Notification through mobile app** is selected. + + ![multi-factor authentication options](images/mfa-options.png) + +- Enable content hosting on Azure AD services such as Office online, SharePoint, etc. + +- Surface Hub must be running Windows 10, version 1703 or later. + +- Surface Hub is set up with either a local or domain-joined account. + +Currently, you cannot use Microsoft Authenticator to sign in to Surface Hubs that are joined to an Active Directory domain or to Azure AD. + +## Individual prerequisites + +- An Android phone running 6.0 or later, or an iPhone or iPad running iOS9 or later +- The most recent version of the Microsoft Authenticator app from the appropriate app store +- Passcode or screen lock on your device is enabled +- A standard SMTP email address (example: joe@contoso.com). Non-standard or vanity SMTP email addresses (example: firstname.lastname@contoso.com) currently don’t work. + + +## How to set up the Microsoft Authenticator app + +>[!NOTE] +>If Company Portal is installed on your Android device, uninstall it before you set up Microsoft Authenticator. After you set up the app, you can reinstall Company Portal. + +1. Add your work or school account to Microsoft Authenticator for Multi-Factor Authentication. You will need a QR code provided by your IT department. For help, see [Get started with the Microsoft Authenticator app](https://docs.microsoft.com/azure/multi-factor-authentication/end-user/microsoft-authenticator-app-how-to). +2. Go to **Settings** and register your device. +1. Return to the accounts page and choose **Enable phone sign-in** from the account dropdown menu. + +## How to sign in to Surface Hub during a meeting + +1. After you’ve set up a meeting, go to the Surface Hub and select **Sign in to see your meetings and files**. + + >[!NOTE] + >If you’re not sure how to schedule a meeting on a Surface Hub, see [Schedule a meeting on Surface Hub](https://support.microsoft.com/help/17325/surfacehub-schedulemeeting). + + ![screenshot of Sign in option on Surface Hub](images/sign-in.png) + +2. You’ll see a list of the people invited to the meeting. Select yourself (or the person who wants to sign in – make sure this person has gone through the steps to set up their device before your meeting), and then select **Continue**. + + ![screenshot of list of attendees in a meeting](images/attendees.png) + + You'll see a code on the Surface Hub. + + ![screenshot of code for Approve Sign in](images/approve-signin.png) + +3. To approve the sign-in, open the Authenticator app, enter the four-digit code that’s displayed on the Surface Hub, and select **Approve**. You will then be asked to enter the PIN or use your fingerprint to complete the sign in. + + ![screenshot of the Approve sign-in screen in Microsoft Authenticator](images/approve-signin2.png) + +You can now access all files through the OneDrive app. + From 96c6034c4be9a128e7a343688c34d157f5717e02 Mon Sep 17 00:00:00 2001 From: Nicholas Brower Date: Tue, 22 Aug 2017 15:25:00 +0000 Subject: [PATCH 03/22] Merged PR 2790: Adding new privacy policies. --- ...ew-in-windows-mdm-enrollment-management.md | 6 +- .../policy-configuration-service-provider.md | 12 ++- .../mdm/policy-csp-privacy.md | 79 ++++++++++++++++++- 3 files changed, 93 insertions(+), 4 deletions(-) diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index 2960668bda..8152a13cf7 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -10,7 +10,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 08/14/2017 +ms.date: 08/21/2017 --- # What's new in MDM enrollment and management @@ -1012,6 +1012,8 @@ For details about Microsoft mobile device management protocols for Windows 10 s

  • Power/HibernateTimeoutPluggedIn
  • Power/StandbyTimeoutOnBattery
  • Power/StandbyTimeoutPluggedIn
  • +
  • Privacy/EnableActivityFeed
  • +
  • Privacy/PublishUserActivities
  • Defender/AttackSurfaceReductionOnlyExclusions
  • Defender/AttackSurfaceReductionRules
  • Defender/CloudBlockLevel
  • @@ -1407,6 +1409,8 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware
  • LocalPoliciesSecurityOptions/UserAccountControl_RunAllAdministratorsInAdminApprovalMode
  • LocalPoliciesSecurityOptions/UserAccountControl_SwitchToTheSecureDesktopWhenPromptingForElevation
  • LocalPoliciesSecurityOptions/UserAccountControl_VirtualizeFileAndRegistryWriteFailuresToPerUserLocations
  • +
  • Privacy/EnableActivityFeed
  • +
  • Privacy/PublishUserActivities
  • Changed the name of new policy to CredentialProviders/DisableAutomaticReDeploymentCredentials from CredentialProviders/EnableWindowsAutoPilotResetCredentials.

    Added links to the additional [ADMX-backed BitLocker policies](policy-csp-bitlocker.md).

    diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index 69a15107f8..25f2ec0c0f 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -7,7 +7,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 08/14/2017 +ms.date: 08/21/2017 --- # Policy CSP @@ -2023,6 +2023,9 @@ The following diagram shows the Policy configuration service provider in tree fo
    Privacy/DisableAdvertisingId
    +
    + Privacy/EnableActivityFeed +
    Privacy/LetAppsAccessAccountInfo
    @@ -2239,6 +2242,9 @@ The following diagram shows the Policy configuration service provider in tree fo
    Privacy/LetAppsSyncWithDevices_UserInControlOfTheseApps
    +
    + Privacy/PublishUserActivities +
    ### RemoteAssistance policies @@ -3353,6 +3359,7 @@ The following diagram shows the Policy configuration service provider in tree fo - [CredentialProviders/AllowPINLogon](#credentialproviders-allowpinlogon) - [CredentialProviders/BlockPicturePassword](#credentialproviders-blockpicturepassword) - [DataProtection/AllowDirectMemoryAccess](#dataprotection-allowdirectmemoryaccess) +- [Privacy/EnableActivityFeed](#privacy-enableactivityfeed) - [Privacy/LetAppsGetDiagnosticInfo](#privacy-letappsgetdiagnosticinfo) - [Privacy/LetAppsGetDiagnosticInfo_ForceAllowTheseApps](#privacy-letappsgetdiagnosticinfo-forceallowtheseapps) - [Privacy/LetAppsGetDiagnosticInfo_ForceDenyTheseApps](#privacy-letappsgetdiagnosticinfo-forcedenytheseapps) @@ -3361,6 +3368,7 @@ The following diagram shows the Policy configuration service provider in tree fo - [Privacy/LetAppsRunInBackground_ForceAllowTheseApps](#privacy-letappsruninbackground-forceallowtheseapps) - [Privacy/LetAppsRunInBackground_ForceDenyTheseApps](#privacy-letappsruninbackground-forcedenytheseapps) - [Privacy/LetAppsRunInBackground_UserInControlOfTheseApps](#privacy-letappsruninbackground-userincontroloftheseapps) +- [Privacy/PublishUserActivities](#privacy-publishuseractivities) - [Security/AllowAddProvisioningPackage](#security-allowaddprovisioningpackage) - [Security/AllowRemoveProvisioningPackage](#security-allowremoveprovisioningpackage) - [Security/RequireDeviceEncryption](#security-requiredeviceencryption) @@ -3406,6 +3414,7 @@ The following diagram shows the Policy configuration service provider in tree fo - [Experience/AllowCortana](#experience-allowcortana) - [Experience/AllowManualMDMUnenrollment](#experience-allowmanualmdmunenrollment) - [Privacy/AllowInputPersonalization](#privacy-allowinputpersonalization) +- [Privacy/EnableActivityFeed](#privacy-enableactivityfeed) - [Privacy/LetAppsGetDiagnosticInfo](#privacy-letappsgetdiagnosticinfo) - [Privacy/LetAppsGetDiagnosticInfo_ForceAllowTheseApps](#privacy-letappsgetdiagnosticinfo-forceallowtheseapps) - [Privacy/LetAppsGetDiagnosticInfo_ForceDenyTheseApps](#privacy-letappsgetdiagnosticinfo-forcedenytheseapps) @@ -3414,6 +3423,7 @@ The following diagram shows the Policy configuration service provider in tree fo - [Privacy/LetAppsRunInBackground_ForceAllowTheseApps](#privacy-letappsruninbackground-forceallowtheseapps) - [Privacy/LetAppsRunInBackground_ForceDenyTheseApps](#privacy-letappsruninbackground-forcedenytheseapps) - [Privacy/LetAppsRunInBackground_UserInControlOfTheseApps](#privacy-letappsruninbackground-userincontroloftheseapps) +- [Privacy/PublishUserActivities](#privacy-publishuseractivities) - [Search/AllowSearchToUseLocation](#search-allowsearchtouselocation) - [Security/RequireDeviceEncryption](#security-requiredeviceencryption) - [Settings/AllowDateTime](#settings-allowdatetime) diff --git a/windows/client-management/mdm/policy-csp-privacy.md b/windows/client-management/mdm/policy-csp-privacy.md index b2969151a6..a390391af7 100644 --- a/windows/client-management/mdm/policy-csp-privacy.md +++ b/windows/client-management/mdm/policy-csp-privacy.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 08/09/2017 +ms.date: 08/21/2017 --- # Policy CSP - Privacy @@ -133,6 +133,42 @@ ms.date: 08/09/2017

    Most restricted value is 0. + + + +**Privacy/EnableActivityFeed** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark3check mark3check mark3check mark3check mark3check mark3check mark3
    + + + +Added in Windows 10, version 1709. Allows IT Admins to allow Apps/OS to publish to the activity feed. + +The following list shows the supported values: + +- 0 – Disabled. Apps/OS can't publish the activities and roaming is disabled. (not published to the cloud). +- 1 – (default) Enabled. Apps/OS can publish the activities and will be roamed across device graph. + @@ -2503,6 +2539,42 @@ ms.date: 08/09/2017

    Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the 'sync with devices' privacy setting for the listed apps. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. + + + +**Privacy/PublishUserActivities** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    check mark3check mark3check mark3check mark3check mark3check mark3check mark3
    + + + +Added in Windows 10, version 1709. Allows It Admins to enable publishing of user activities to the activity feed. + +The following list shows the supported values: + +- 0 – Disabled. Apps/OS can't publish the *user activities*. +- 1 – (default) Enabled. Apps/OS can publish the *user activities*. +


    @@ -2518,7 +2590,7 @@ Footnote: ## Privacy policies supported by Windows Holographic for Business -- [Privacy/AllowInputPersonalization](#privacy-allowinputpersonalization) +- [Privacy/AllowInputPersonalization](#privacy-allowinputpersonalization) - [Privacy/LetAppsGetDiagnosticInfo](#privacy-letappsgetdiagnosticinfo) - [Privacy/LetAppsGetDiagnosticInfo_ForceAllowTheseApps](#privacy-letappsgetdiagnosticinfo-forceallowtheseapps) - [Privacy/LetAppsGetDiagnosticInfo_ForceDenyTheseApps](#privacy-letappsgetdiagnosticinfo-forcedenytheseapps) @@ -2545,6 +2617,7 @@ Footnote: ## Privacy policies supported by Microsoft Surface Hub +- [Privacy/EnableActivityFeed](#privacy-enableactivityfeed) - [Privacy/LetAppsGetDiagnosticInfo](#privacy-letappsgetdiagnosticinfo) - [Privacy/LetAppsGetDiagnosticInfo_ForceAllowTheseApps](#privacy-letappsgetdiagnosticinfo-forceallowtheseapps) - [Privacy/LetAppsGetDiagnosticInfo_ForceDenyTheseApps](#privacy-letappsgetdiagnosticinfo-forcedenytheseapps) @@ -2553,5 +2626,7 @@ Footnote: - [Privacy/LetAppsRunInBackground_ForceAllowTheseApps](#privacy-letappsruninbackground-forceallowtheseapps) - [Privacy/LetAppsRunInBackground_ForceDenyTheseApps](#privacy-letappsruninbackground-forcedenytheseapps) - [Privacy/LetAppsRunInBackground_UserInControlOfTheseApps](#privacy-letappsruninbackground-userincontroloftheseapps) +- [Privacy/PublishUserActivities](#privacy-publishuseractivities) + From 354164a2915b2716bd6e8eb3ce551d33ca6d8b12 Mon Sep 17 00:00:00 2001 From: chintanpatel Date: Tue, 22 Aug 2017 09:04:33 -0700 Subject: [PATCH 04/22] Update reqs-wd-app-guard.md --- .../windows-defender-application-guard/reqs-wd-app-guard.md | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/windows/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md b/windows/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md index a03b3514c2..f726d67b28 100644 --- a/windows/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md +++ b/windows/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md @@ -25,7 +25,9 @@ Your environment needs the following hardware to run Application Guard. |--------|-----------| |64-bit CPU|A 64-bit computer is required for hypervisor and virtualization-based security (VBS). For more info about Hyper-V, see [Hyper-V on Windows Server 2016](https://docs.microsoft.com/en-us/windows-server/virtualization/hyper-v/hyper-v-on-windows-server) or [Introduction to Hyper-V on Windows 10](https://docs.microsoft.com/en-us/virtualization/hyper-v-on-windows/about/). For more info about hypervisor, see [Hypervisor Specifications](https://docs.microsoft.com/en-us/virtualization/hyper-v-on-windows/reference/tlfs).| |CPU virtualization extensions|Extended page tables, also called _Second Level Address Translation (SLAT)_

    **-AND-**

    One of the following virtualization extensions for VBS:

    VT-x (Intel)

    **-OR-**

    AMD-V| -|Hardware memory|4 GB minimum, 8 GB recommended| +|IOMMU|Not required but strongly recommended| +|Hardware memory|8 GB minimum, 16 GB recommended| +|Harddisk|5 GB free space, SSD recommended| ## Software requirements Your environment needs the following hardware to run Application Guard. @@ -34,4 +36,4 @@ Your environment needs the following hardware to run Application Guard. |--------|-----------| |Operating system|Windows 10, Windows Insider Program (Enterprise edition, Build 16188 or later)| |Browser|Microsoft Edge and Internet Explorer| -|Management system|[Microsoft Intune](https://docs.microsoft.com/en-us/intune/)

    **-OR-**

    [System Center Configuration Manager](https://docs.microsoft.com/en-us/sccm/)

    **-OR-**

    [Group Policy](https://technet.microsoft.com/en-us/library/cc753298(v=ws.11).aspx)

    **-OR-**

    Your current company-wide 3rd party mobile device management (MDM) solution. For info about 3rd party MDM solutions, see the documentation that came with your product.| \ No newline at end of file +|Management system|[Microsoft Intune](https://docs.microsoft.com/en-us/intune/)

    **-OR-**

    [System Center Configuration Manager](https://docs.microsoft.com/en-us/sccm/)

    **-OR-**

    [Group Policy](https://technet.microsoft.com/en-us/library/cc753298(v=ws.11).aspx)

    **-OR-**

    Your current company-wide 3rd party mobile device management (MDM) solution. For info about 3rd party MDM solutions, see the documentation that came with your product.| From 08193c230930b954f8f2dd455c0d3ed0249eb27f Mon Sep 17 00:00:00 2001 From: Maricia Alforque Date: Tue, 22 Aug 2017 17:23:00 +0000 Subject: [PATCH 05/22] Merged PR 2806: Merge maricia-12040373 to master --- .../mdm/images/provisioning-csp-office.png | Bin 6250 -> 9615 bytes ...ew-in-windows-mdm-enrollment-management.md | 14 ++++ windows/client-management/mdm/office-csp.md | 34 ++++++++-- windows/client-management/mdm/office-ddf.md | 61 +++++++++++++++--- 4 files changed, 97 insertions(+), 12 deletions(-) diff --git a/windows/client-management/mdm/images/provisioning-csp-office.png b/windows/client-management/mdm/images/provisioning-csp-office.png index caa243a136a32a1bbce5e05bf6ec2569440924c5..c361494236d2d0994c2646f291e277cdda550d38 100644 GIT binary patch literal 9615 zcmb_?c{r4D`|l$~A(XOjSt80B8fKzotL#J!l8`l-tYeEpi!ECiBgv9A>lkYydj?|( zV+~{M`#zjUy}j>ye%Jdu*Y!K+{NZAr>-pYuZ=d`A-1pZj9WAxfH0(400G!rPzoiEN z$20+eg8Sq#@CmDZSsVC^0->jN6Ugu2B!M4}+uqQ;0RV*&wELDPz|W^#)bAqzfWH3d zhob38)*}EA6wtVJ!@$#gA$dWY(+IspTxwO65HAwvn^G}1MxGyznlCNNF>YyXF>gz3 zk?&`_pzT~Go$v$SAf1qq~9@8@j& z%$&q&0}p+(jhz|M%H5vN_{>U^T82#a3jea}ZuoIeT@};ma73~WE zp-tV0oSd8pZpB=Ja4c7TtT%1?A|fcWW@azos=~x)W;QX4cx|#eX?p$B_9-g_LO+=U z06Kpr6Z`u6mqre2pn9CbEY}y1hchpILuz&)1NEHO4_iZEPu`?R+>V|2IT^}`mNx`| zF`WXUtgLKJt%q%v)bh{>|B`#Py@BbwV9wfSN+-217sbcL_1IAY%`gR|vxCFj_%G`E z*t$`RgLGYE4H|yt0a(37n3e%(M$e_=K(nNRr`F|PszSFj^AD!;5aJvgF`pn!75-04 z3DVMA#>whHK$TwGk!kg5lpi0m%fytZG(=n^=BMnA*Oka80{~W_58;2`bI@W@p?f1y z7p8%ndLzp7Ry)ku$?5YN4G<~)5r(O%f(yGL@}xK*U2D@nf1EL(26hC#A?D`hl=;aa zxY~y?ZMQz3vv6e5<_HVZ{8st6j&4gVWs|&?Tq)OkiVA3E${@E(Ld%7nO}NGtJtXaW!q#-Kd5C_K3jIZ!4|hU({gySIpb+HH zM|CY4FXh`gaQ){Ne4}7|p1sl}`sQb(m)HGdJ0QS^ah1^Bt%qASQhj=t8+-P3Ur@BF znZ#X*@axJ=s;*~jv{t={cI4;H-%%GF6Rsi`tKSqvgva-`fF@C2z`f!VzMZPe$)uL+ zcC#aL%DmE^CI6tP*yAZKKF$%9tA0a%A<-;QG(_4LA57#6aqV+Dza{LC>ZBXqc`Lo+-^Vbs(1KeVQpiqmb{M7l^+EF2=6k1Kyb7@6jHtKsPyUex3=8Q+v_bw+#yu3#ry2sAD#Hrs{W>mt+JWCb_yULBF(%1A zL~Eeb4IWe6s~*X5s;TXCN~>u8MNt6Y9a6{r`0>NnYePBh+(qqu!a5B#k%^vL+>3U)k}9#%Y2u^G!E&K-s`28W3i-~lK>#~cAe0(@QMi*@>X8G zDEYaorJGx??->Ai#7e?;y`r(mNW{R!(EgkA34441&@9o7nCjvi%}m6gIH09pzKs1A zLWgd%Tjm5NkLR0CUxj0i2cW(#rA}Vm=cWOlkswL6q7sUkB3yQxx$h!U5{Y58qCfzO z7iPQSF|n(Le9S{T(O40#z!R)D$E55Ysvx@aq}RfKY5l&yhG1d(zFn43p8f5`riK^O zJU-KRmizr?T@*W5>Vr)P4g2Sz{zCM?&JAzpt(3jqRR4pbRL0EXO@0KU9|G$rIZ-=) zt7E5k*KnEJrud{I`XYnZ zgZvZ9_C2;U3sMzcr*JwjJzw-l*-qyqLXe6;vZWQ5amS7$?@{m?3FDlcoMKgj=djQ2 zo2jPJZCeo`Ur|XgNSNY)l6A+QS)GCJ6P=;&gRs<(Hd7lcfnDLRxjwbbVYAunwG;9FvNMcx5T_L*Wg8jyS3a=q zCyL~ThxCB!t!9MoQg_Q>b^#`^G>RqdOKZ||4pjXw(bauN$q6%2ESJ1a3C9wS6!pvC z$L;$U))jWMCG8mpxW^%CH|RqXHe0?EbQ(XZJK7FVN&MzudPfv*YiL4~#pzP}uqkb9Dh z91xEG#D&=Je%|%!Y^~KPu)z-^0ta>ya;DJPhFo^V`!!4PH(h;XD1ga0W85i_fds4W zdTigJd^dsO+Mb_Y_sE?DcyT?TGkkrkrOfwpUD|~|2uwk|EiF=eeu$$1V15kp-1syB z>EZ!$A4}Yjs-)nh_DZt?GzZiWt2?0$mbc>y$PSgu^Uhk@^f9#G+^g*3JE}ZZHaZTp zZ}ZpF($dbBfZvbyh7pS@DnuNOxG$NBp%0ywqWH}U*wW)luGiMAHx4|31Be)HNp4Se8cAH!}=k?%xo`ugp4 zX!{#tC;(o>7z9cUL|QL%qCpZTJ-iQYlok(F0h5}y~42+q+Bw5 zt&b5pB9EU>0L^S?(5B|*VqtWLO_gGMZF zZt2%n`ZNfKF0kUvb?HT)b?jZ)-ISx=LqDl~zi`sqMt&kQp{}*Jv{YuRhZ16L5Z4V%{Aei?rBeNN|6%}+6O{zyjx@s{5Za&nQpG;9R?Ztuw5brP5? zVR}E^qeQX9WG)%@mqUD*wfG~h6mjnFYe^Nbryq%tx->&qTqRj95AQd-B^@}!4N=x8 z0!JSNm0iR2mZIBk z(xfj=O<8ZL06?VWC*tD1%N&?3s$7n>dnxUDxs7|qOjAG8&Em>fFmL}%Xepzpw2gN#lB9@hvfl&2PyW!V8 zaM(g1rg&+ScVrvF(oBe<;}UX=})wavaT{py*k7#k`9vZvx-Go z`m})43A97i(Ws^-Bmz#F)(56xtI^TbOQAgXxuI2=9g;u^gJ*sn8d00IX}l%=_NInZ zq@wxW2e zZvNBOK=oarkJo~n2hZJ{VtU{+HBP1-vBgawgPkMm6(nlVJq+{)k{uG?dd-e_nUe0pF#ar z)sy`IbxF^B3UoBfmA3vc`Ep`c4`07_bZmIb!UBsFIC2)4rq7gI^BNf#&o9|$UT`TW z^c;jq^dWka`5Or&#$Hw!@!2HkBvm1iSr8kSF7~4p`mVtGkqF%^F%4&!`Fu{c4OX*ib>k&rzxEoJnEMrr zij&4{B-rF!Z+95{nnrz$Y1eEWBeRcr0r64ht-EAhR zdkfBbwOTOV*O^DC6o%2am8<(vwm|?}LY$g0j-rGDy9rN=;!8{VFpTQL2o*OOjV@*_r~B`by!B6JSw%?NQhy5|J=R!;_aM% zgkdsSQW=4$`0P||ItcS9+DZnKQ?CH{9Sq6PcS1BNx-?s|iFY2NF31HsyuCrKW>nM# zfs3^nq$Jdk9$vwH_mFMuVbIM+FqKOzpesGe?GqCp<;kGWmf=>$CML6N2d%;{1#-MF zbG_Zo5*BcvlX(mqEGch3O-por2QrQ6X`9|x)B(?ei0qB4tFEa%$=MO*0zX36SSAFS z5x~MRw1dFW$^_P97o+kny=rJgR7vVq@>y7luCO6#Kh*o!NIg922r`&){pf?1XtEt@tN9^oJxCv z#II-tMY7u{5i?rb(Eo)($-55mfB{VzupUJG$_=s;5;g8Q3}hYM;6o%xLO$_8sW-vi zp|0pjKVOFcBK?**e+Cf&Uh){^3pI{HY4<+~xUx(DRoLI(2X|ZQ*l$8F%g*x)KJCkJ z*1mlCvZJG8mNZSLD<}wWfIC&MN#Nwjg)6KrG=ZIoaom(VC<-P4U&r7pv@(%O`*eK4 zDAI*xs16+fYCr9@*fP&=S#DwBT`!#c$#?Dk_|N6$G5;%KSqQpLkt3OOM>CJ+F#4Lp zasuc}D!zN3)!(1^`S@5QI|jrZ39<29>=;f0cTmN;JQ{J`ZsZ7QL`3fn)#K}+k#^-o zbo=#(g7G_5Zi`bO!;OtS@770=NC!HEeGVHI7B=4cAm4xBlb%nZ8Pw^jjpUMig-(YPcb1W$&kqXApvw>=5zGW;Gl@% z>mB3vaR^)7vrefa{grT6u3Xum^S6%qMiA6SGqGjUfz2+*2vEX*1;taswq{o9!CDQH zhkFR`d#1Sa@);0fHWd!MSBY2_GtfiOK-Qo ziX-()C|pcmaGk`87x-P1lgl)}3usb;p=Z)Y)8b?Vi1}t8T4aFvw98!fv} z%~wpZ`0{}4GmC}kAG-7-j9SxpHmjU^>T)kGqb`)8yuvp)OQ^u4Sw29S8RM`JIZu1b z=Mj}JGQbQ&Q+Yc-eY!HSA+5^QZeOxRoJ6{=;i;#}c3;MDdWDZ-Ui2Nshss+_+g~vg zsdebvHerWNX2F3oO@V9LCoM%K=_40Y!i3)cgLs|RxK~e1RcbqOjTH=2Q6aA*#@ZYC zND5q@ny|AmzwvZiq)0sVJ9v<~VQRdE`CgbVlg4JZ>3*;{{AC>IC3G-SYk4@Y(0>PE ze((UAvZH^vw3BW4Snwzvf{$3si{FR^C!w8ho&E&!3ev5J!sHkzG;tgfU&)YB5bGV` zcKA&=2Fyrscu|f$81T9doG>|k^a>GD*V@`TbIbYze7j_c{41WG^QZwP36Q-&dUQ0E zBs@_BdoTfoo-CMppnYVD{_iPf7mRdaOVsM)Lb`><8Bec?>7V=i(BL50aWGU@mf_Po z&mL$&LnsxY`WT82UB4kI2%_>T#}R6=lVgwoo8Q2W=Y&#sI{t?4I}p8zM|v&8K?o`p z|HkhfdNk!@+20Uv0a5;g>Zl5cK|JX{4E!I2qEx-WO>iDuH$~*sPO6mN2!UWAek_#Y z&*89D!tV;{0w6W6cc(Ra1L+9M?`{z83C-iUPsmGTNP?0pWGxk0n9{?V-eF9^43vw$;1+ z?74%2%HYxc=_haHf0|1|iF2A|chbrGI;jYA4|Mz&3|viheic(s9=hh4&;3WMHUAD6 zBhE5ywb6eO#4S<&9=EX|7_@a zZJT$5@>-W^`#Rx3r+9g&(AlSw`1LsWCe{}e|w012K%HfKEgs?$u)L-l@~p9=8uwBTM-|BYTgAe3Bn`c*0X&cM;%QC zko==XrY_i}uKkVi|E~=G&#(YB?CtHfZf0|EaF|_JhW<%LyBOk&$=k6HQ+qUBV^`Jf ztgMu)Px2m>IuL1~@)K%E-Ho^6P8SjwM%(oNa|ZvnPFd#s@6-OJ-VADV#BcmjkzQ%M z!HIuC1r>KhICn@v9h-GE#P4{my+5?r1T)h!aK-B15XN##Y}#g*#zq01bLQWWU^3|~ zHZM|`tsgIG9cboVX}qc89vxQq9e2BnM0$cuPVsOr4_jdS=ZPKvmqHVe{ifor@A&ru zwX+re>p4+!wL2VX^kw&oAYu$PParK`*B~jp}{w0GF-Ddkwg{jB?BT&}AV6hNzlyh`_F)4znO#zvf-ruVG z|4Q8cEAzYBd32H27O4o1eZ8W<2RjgqAZ_7DsdBUS%-!0()}p=pCQVve8k}M}uY%|V z*~{?u;`F$*{==*9QczVA;lvLoek1rO^*h;r16ciCNg>gD^KjmF57`qYA>*!6G<1+B zM3yF;ItoAJod9VAl{+uvfW*T*meS(gCGWaDfz00F8P>-LjF9J@AGJ91L|s|+Ygcf! z$@!Ag)Y|K;b>W`=;O3DD82S89gkRiaUxaWUEWAg zC&q*JsNaBxV!X9pD;bz>SX`C4edwI`W$2*mg$j}2{W<%4_t~%n%PTSUZxy7bQDYZC zGlZnkd)woiZ=A##Y~NNRBMVrjt9IU+=M5&se!?S)Q1ajVMs=Ep#Ke8qb=_3L3Fqgt z3j71^tqs3wrgBp^$TP}zDI2CF_$O0kejl0(gCmTwc!yEa8B$P)&{=QRjxx3Fk#pX* z&z~00x*suYAtrPZ+v!TpYfqdf(Ei0IqT)`s7;3d7)mPKv;uOOdnUm!!(=U8pN12kz znzh^t8)geGv}G2qzuZX+yANc7X*yq5;71jV%a(XgE#;S7Xvpx7?1x+ZEN7ctSfnQg zdxSX8-Puzqxn7rA$90QoJ?_QgT|FG*5t9(2L`UEAEL+w#T*!NCcM<#Ew07C8v+gw7 z;Y3l~ZmFSYu4-7Xs4GFN`0^XBjvwsGc8`Co27FMv>+clep?2oV*#a5Aqwnz*I9M11 z3a4_<3_I_dHFpet(0$PqPaU$@@xD*&i0bSiwenFP#pqre#`O8Q?R+mYF@S{RT9nV4 z8=aGta<1^593Oe9bExET*LH{XSs!xO&vo|&{QN-Pu6cGP)?+q|$(wgkvtZ4<`T9#V z!rp-uQ^YQ4Udx6NeR$bcEiCnFiOn!`A^C)T#5S(@`5+z7#PDk#S%PA@U5Nvxy0GDJ zRk2WcID2-9(F(lM*{&SA0@nM4L^DZ|c(;Qs9_K?cDM{4|&s6N1{h8Xx;HjJn=YVJ2 zZssdD?F;!YdWK1J&7tSt+wziW?8{9b2k+*y58q@E*et||k=Edbg0ZoKms$^k-;78) z$9FC2TM3`eyU)$I9!e5-pH?OG@?XA9Rv2#`$esD-_zNvOMVp?~%58 z`{ZtYIhF&2&DtYU?Ut`!ldyT;PNhEPZCplEAEHid&1U2M#~`G%d;3WoBr3c|fW2Sy zR28rgqApKJyl?BN~q8i?(&S#!Xy6B^AxRt{t)akDNP2t2rXP1YN=?Z5F z7jg$Fd?s9D20NU0#=)xtBJvHa^7~!6eF&3Bd)!%KVYMO0oB}!t&X+@oyn^!sqvy+W z_%x-v*%)lEnwGyoSHOr_Dm*$*A~sOAm(F+`Gm*3Ypo57dqS$89c-1%lye1Ea2?Q|h zl`fz6um$(@mn?Bmp zzvraS0B%acliq|99b^zdbY+E7=TYEph(0y>r)yjMn%_MA%QKenwv6NzK_opW=SxY6z-{iyu-;z74VnNmuqN;L zz2?yxNpg)pC^Q``8zDTP7CH{zK1{L;3h!9tCI%)aE(;uJ{#s5A8aE z;I3h9aNeSIJ3eB$${2C7_*OVSN3!^Jw=P>970+_Uj-U1^13xOAO7;%!P=KxD!;bpt zZMV_*05L|h(?wh1gPrYX*_$9gtH(>`f)cGBKdxt+@!+lydWFFcoT00&PcA)o^kv7c z-rr6#NeYS#LKY7~&WxOtPZ%Z-tES_F)d6waU=MI{mS?Rtr9#R$$?jr*3 zFXFP6)Oke1!$zcWuBf#WE)`9rKXu)SS6TVhz8JY3V zDsuvIWXj3Y>F5SDzH#;B4~TbjXxir4Bh5uV0d$hr22Z+d8ItN@o&4F+ef&D$4xBdP z%5nt5B~AX-nsrM(0SE{{#^4Pwk7MM;YxiL9wa_Arcn@3n8) zcZQH{1~X%KUcTRRUBBy`bN$Y_uJgyd*Sya>_j5n*bALYf{kh)>G0@ZCVEu~~0054g zn(BrCz_0*)|8s~Dx&mKceS)qG9)=p%fUH*7EOf){a8>sz0Q|tSZQVTp-5-9WY32a{ zoHctN2GA|_0RZsr-c-M8jImybUvL}x`80T`qAA$-d>Gf&amj@#AThgFE$sMBgT!n} z&bWIW#r4U$+~7@t1CP5DKGNSB0A@}>u_9)C|6fv2`eC7qm0;@>F{;(osUSO`y9gd`Y^rj~Y~Y!T6XHtF9NW~` zLHz^-nl1?Nw@AQ8M@Gt#I1k%-ScK?oCMT};apk2QEelh-WLIW4Q{+?dUxmK%#YW>mj!}e-5&bRQ<7ip$h};FVMV@? zL<&1xU>hw~;s=^Phkz9u*yX~+ZFTOe^`0%gUcWsStFhi$bpr;6MJH6bTy!@gV!zkB z6IPxtUcYtEVZfbjxTUPwd%8F9tlnSNK};>$$Tn*+F0z9@Al!je#<~5jsTy_UJrqCW znfXq#uc@t-cce*F$UA(1b_PHH`wtZ+{lg9EKYFlplt6X}*HS0M) zljTzV4QMvAZ%T*D%;&BC&hbtva z=V#kojhAI&z*spue91)zvFvzNuJ|41He{}Wu_NM?EVk%v#$ZNn9-Y%0j!yVJ;0M%@ zk>$n3*ksIArFr3(#t$Dw!}uGtPWFi2b`9^=P0{>yG_E8hKgoQt$6H*`prZHvP_0$+ z?L6-JBo_-p1l3M=ktPasnAe!4Jqy2cpSB0RD7~?BwBFsV#!dT9Pbh z?$B-7@GgsU?Idi7n?>Q#-6w8;&?ic!Te+Qt=YlX>>bv6&vuKA3rT_*ayh6pB?m5l@ zEh1E$@CO~-dCjmfz+4cIQ>>?8)VO#C2O_7pSuY~9*heCkC{fsii{@XtoxA&~K$w>$ z-lA9gsMVVA+usd((M^IVmV2)y$+F6YIUi@uF+*N)gXKye=*H(veROX=E#3{!s{08~ zD~N2;Qc44-a(i$0pQXR~jLJ%GNh|YKcxU;SVo7P~{5%%WRO%$rZm$InB#k&7#}~qE znl!nbZB*a?kS}yFo>#C&O`-Kiy>yE*xSWQ)w(_nUyl%nr=VYFCJo*r^Xm0&8``35y zI<0;DrMvssRIJSByMPqKETyilE-!J{TB)lhg(|LY_-+dhH?S@umn~x&d{_Y0fpB=@ zCatPuy_cYd^n4aLb4FwxiKu*^*-4`ntcU;s#==Mm<$JHW1_sc2&8<1I_1Q8^(N9;` zCRf)&c53zp^^&>@3krUh9tMQEHStlRuZElvF0&_;^YZg2_Xo!)Zw}&__ybqh7_7qe z-@&q4S)>lmQohGVRQ%Zu_lo1rletse+@=NWtvf$lQT}*6)hll4*!Gp>2a}(0JmuT9 zrKtN;NBxZ$E7`w-Vv&urTRW(%&(<-imOV3H@9X#Tc@&gPpraJZ-tEd+4(AOL-s7|# z*>J;;Z1P`7C`J_>+*q>7`}1UQczCF3=Ls^)QbK77*gtS6?J?b-&L@>VbpNxRdHMRl zD<>aC|G}VDOqpqCfjP_R;$mb5xZRs6aW7N0zb%D4hpr&528Kvd6ar3Z;@#ZbqB16+ ztl_MIOTS#yqGL(~Sq1TaU})MoCa)+;3;ti~fPqo*9# z*YmqSpBFXHW)wY^Eps~auOCfwvGu6bDU=_$%s@>?W@LA!bwk|V)amx`iK3>6*obwE zp{8500~zk_P>oqu@919wY=JB=5#b|k&#`3ZoP3MBrS_JoLuHCy(TagqJ5Pim=%zKA zqiZD1;b$;lDylX>0~1y0avgutb-y=BQ&Z+8nLkr=cG{Oxx(cnX(uo3Qsd4bh-vvYQ zsk>G++DX&K<7@JC`}l26;NTe6QYiExI>-g|Rg2L~3sFF9H#`qOBW5uLhJ-2kWQ$xY zBVF8-tk}S+M()LvPUGmzlkqr9NmtA_f0h`m<7Q_?n4 zNnM}EaQsT7bXTZM}F7@>j$FzxC_=cL8v)fy7_#DO<)uO7hKe1~kM>BRFzEaPd z%w3pcW^^&QuYj2#Db#p*L0=4y+bD2pv`gM~=Gt}`9;4VJ*%3z9+fNT*EPZ^ouRMG( zY=3*HUIQ~UF>V%K$u4&v$Hg$Jn?D)B%QVbK#ssaBp*rriSA}H&{-8y4 z)w0S?f}~ZK_$U0Gh<6WYTDqsPn9sZ9NsiYicmQFi33OG>dXfGMJtqmF^DP}C)7rfn z>D_51-VBxEF*r*he z<@xydM89SHSk_GH65Z2WDJyPaDIc|k9qPnXj3wTK$>nt{BHyYRa&L;l=|==ddR=*W zc`uxwoFD6Tv)*!d{$0MQa9dnb^0jF~VjvJ;0M}Q_rnd=TmwFa7c0C1|fUidop&*0M z@E97w3CteElhA;sJO+kmQZ23`VPHTf2OJ~;VJNZ!oF%|B5TqyoUr+vRGCx6CSa>+y zh@;BYVN)UF0q#r zch6c`z<;+x_;({ia}{-Mcr#DXvc-v|)Mqv(d!bAH!umB^vvhl}zlGP@VU=2TTh>le zw===BXXl5gX> zIjP4*TTI#x31V^KB-CTM(o-}k%PcBL zqLD4l()l)+){jqXQL6v^N&BblS|^>sciRPoP{obYO zrxBf&pCn&sP6zk{&7MqW==(9V#uk@Eg7nL9`BODLLf(V}QcSaG%DTC4V^8SHYTXH0 zu?taNCfg-^_@%r4LjkY_zjDMa&wrkuqnNXPhqZ{Wu1gxXOnlk-(k9j4=K7go8?*5% zLO?_qoX^+84PqqGE1z3fSg-FsZ|@XSbl@BsZH#}*$zP`Tb=v;}naXdBhx-4fN`()CK3MB*u@?Hq~;@XC* z09#&N#9~fqsrU=Gv*~xvQT?P>M`pK9{+@c$8oybnqF3s-{?!C^BkQ;%dnDTwWdc$s z%L~VWK&M$W3+0mU!-oqL63D}?=(W?DL`QMxsyq^mt%E|i<~X&_G%Ey34r2FV{HXt` zKK&A)%KE=i_}{P|UrB;MwMZa`o&E6P!;m+inlVN>gpdfGuI{tRA2dEnGLncI{(IOF zF#?ge1opTb!V5NJ$A0qPA0nZVxS>ZjaIT&z5^(DoNFgQ!(ut?4NMT3F zYne^*QO_G|Ce!=1a*+~X#V-?7vB_Zg_enOYvq^`ByPO#|LGsL+LFcPko|GZKBs#rf<@T zDW*8~MWSJ-7oS5Yaf<5LdK>BoG0N05LfUA4F86NI=n2tWZ7)*`s^ZmuR!Y^}+QOU^ zmHS9+FB1=5&=XKvK$ctBiSDQ&IFI~=fHOGJh~}v}_n6D(AC@#>e7Pdy*SIJOs*Yp~ zbMzS6F3S>ihwf(3LL2kThP$QC6Hd&;TD4f2q>rNm%ASG3LYeR=wjJ0@o2s54;`#DX zHO_^4XH|?`rzt&=1i5Zq%Sa`P6&_@uvBL2I53q4CPqM-pX2>rF5xalp80ImG>p{F4 zRLGA8fO#kOgQNk#+wA|_#6x)ehhVnk@{Fm@`bw_RiuFAGCUc(~h6T_}Mrg^w!9kag zlN-ayYD>c#K1)_~^v}MbAZNEAD95}YSUxrfHMKm4`c<^ zW0jn@ECdqhTsfiCM$Sy!dWyKF|aEvc&0N92+sIGkl`Hw4{n8UbMs%#Pp__R zyDjPI;UhBa9zJaGV^KW>S?dMCCH0T%bC&vk-j!<5Q-=Gd7=9-%0f!i%B|>^gdqn}o zuHD=U@fCwOw(n2$?lbTUH{>vcc<$WG+=Q@eZ_MtIK>i&*PzrY%@_g)lm zOhG$k-ZQ0yJ_8}$^!M+G3Fv_i?QdR5ySG#tF6k-R?_m1OII<*>v)y;&QK2{63&wIr`Y;6Kc1Bf?ME@NYm~+m zZ=3Dak-2S;Q!9<2yubUR-GYL=Y&j^4ChfZo5&E)1dIM50$071En{6wl#BtliDV~lR zR>4f{`#8ohY8rkpstE(5alnJsE9syNKLXAJF^K`*W=qBx?-^ncfmNhiPr*}1$0+Ov z@fru9nF0UPL^Imjlbv-N!n-%jf6tP-WM?JDaa_yKtSK7{a+Z0|>5QkDBs^!2I>^V% z3+137D3Yf!%aaY}BJ0E5isO{Fa_ppXD?fy#MJ3=`0LU;gIh=H0oRXxJzIZ=i8v?-u zbj%nCGjU_+LtJo{m)r=>aR?LWXW%IW1R*`LLJ$O*+QaZ*GK4UND$)@+#5GY2tomP# z)u$+#nHOD3+0AN-t+Pzh_bfjzuMG^CCv~L^8-(#E-g425tA?lu`GL>?6Y?i39EN-y zQNhFo9ftf0BJ`@6AxB*BCoy{(qItUOdH$YfF1V>jJGPDl96@3%bwTVf=>?>_KC|G{ zt4Nz1`<7WZI_CCN#6Y8N?;ad{ldM}V44n1qDe>^qtx)eTwZ1d&E>}we9v#^lXPc!& ztOrkvMpaL`{#fqle&!XHA`t^3{hHjr&pTL)drGG1WsA<(O~cwBL>9s_5+Tq9tgSn> zA;&4H%Ow5sY=P<7SD$+WUN2lC%4B>HUak8mjPgM~ERBo(PMiiHoybxZYbsV<5&i}o zofqunT<)^tg7Y~^_kYHjaSp~`@gge#FjzA_y+0Q0zGgR3w~~7i?Pl>4+F#BXS{8c0 zC~YbspV4$>28|;_>T_(YlH?3&XG^lE&KB#4`m3@cSYXNH3+o?GL!y(386P19MT`;% z-h^^oz*-gQj1Cmgt^ehq^^M`9eSPQDXgNQdx}ABTlfG#T4;KH|sQ$ko@sDvtDx$oo z$gE%phf?(#+qnQxxFf-$(Ytar+nfv&EdSTNBf_rH?`0O;cNlQKqx}~oryx_Y1}NOG zWi;legx9I}qO3+_Z3aKKo$rouz<0B=?IUARV~^y|tV6-UzrkgC8YEridwr`&spT{& z+pwuFr_4##Y(~HJ&h?USg_hZ+P)%h01?BA{DsCJmL7@I`!GuIh)`+~i#-$zUuL6^^ z+QT{2ex8pno_eXaj||Ydees3-)RfD6koHHXL zwA4*{YPQz3hv>GN$XzAb{7)QNN-z2GiRIF%0+Z)Mx9fPo0$oIwZ{~ITCvd(WqK_UJ zsz^c2#c$goI+*-C7B}>PC_1x^2P5mNJ=38UBs!1*9(9AJp22UzYQF9ApprzZA6Oxp zU$pgd07k|rt8I}`yW$~rA0g2)s6ZNT`P_BUCQ-F8z2&%-pS-crZ~a$R?wJc{pBIl< z?Y0 +[Office CSP](office-csp.md) +

    Added the following setting in Windows 10, version 1709:

    +
      +
    • Installation/CurrentStatus
    • +
    + + [Policy CSP](policy-configuration-service-provider.md)

    Added the following new policies for Windows 10, version 1709:

      @@ -1367,6 +1374,13 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware
    +[Office CSP](office-csp.md) +

    Added the following setting in Windows 10, version 1709:

    +
      +
    • Installation/CurrentStatus
    • +
    + + [BitLocker CSP](bitlocker-csp.md) Added information to the ADMX-backed policies. diff --git a/windows/client-management/mdm/office-csp.md b/windows/client-management/mdm/office-csp.md index 8b62bdd0c7..96b82f9aa7 100644 --- a/windows/client-management/mdm/office-csp.md +++ b/windows/client-management/mdm/office-csp.md @@ -6,11 +6,14 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 06/19/2017 +ms.date: 08/22/2017 --- # Office CSP +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + The Office configuration service provider (CSP) enables a Microsoft Office client to be installed on a device via the Office Deployment Tool. For more information, see [Configuration options for the Office Deployment Tool](https://technet.microsoft.com/en-us/library/jj219426.aspx). This CSP was added in Windows 10, version 1703. @@ -38,7 +41,7 @@ The following diagram shows the Office configuration service provider in tree fo **Install** -

    Installs office by using the XML data specified in the configuration.xml file. +

    Installs Office by using the XML data specified in the configuration.xml file.

    The supported operations are Get and Execute. @@ -48,13 +51,18 @@ The following diagram shows the Office configuration service provider in tree fo

    The only supported operation is Get. +**CurrentStatus** + +

    Returns an XML of current Office 365 installation status on the device. + +

    The only supported operation is Get. ## Examples Sample SyncML to install Office 365 Business Retail from current channel. ```syntax - + 7 @@ -76,7 +84,7 @@ Sample SyncML to install Office 365 Business Retail from current channel. To uninstall the Office 365 from the system: ```syntax - + 7 @@ -95,6 +103,24 @@ To uninstall the Office 365 from the system: ``` +To get the current status of Office 365 on the device. + +``` syntax + +    +      7 +        +          +            ./Vendor/MSFT/Office/Installation/CurrentStatus +          +        +    +    + +``` + ## Status code diff --git a/windows/client-management/mdm/office-ddf.md b/windows/client-management/mdm/office-ddf.md index 0fd89434b4..ebd7f2b843 100644 --- a/windows/client-management/mdm/office-ddf.md +++ b/windows/client-management/mdm/office-ddf.md @@ -7,11 +7,14 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 06/19/2017 +ms.date: 08/22/2017 --- # Office DDF +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + This topic shows the OMA DM device description framework (DDF) for the **Office** configuration service provider. DDF files are used only with OMA DM provisioning XML. You can download the DDF files from the links below: @@ -19,7 +22,7 @@ You can download the DDF files from the links below: - [Download all the DDF files for Windows 10, version 1703](http://download.microsoft.com/download/C/7/C/C7C94663-44CF-4221-ABCA-BC895F42B6C2/Windows10_1703_DDF_download.zip) - [Download all the DDF files for Windows 10, version 1607](http://download.microsoft.com/download/2/3/E/23E27D6B-6E23-4833-B143-915EDA3BDD44/Windows10_1607_DDF.zip) -The XML below is the current version for this CSP. +The XML below is for Windows 10, version 1709. ``` syntax @@ -30,12 +33,12 @@ The XML below is the current version for this CSP. 1.2 Office - ./Vendor/MSFT + ./User/Vendor/MSFT - Root of the office CSP. + Root of the Office CSP. @@ -46,7 +49,7 @@ The XML below is the current version for this CSP. - com.microsoft/1.0/MDM/Office + com.microsoft/1.3/MDM/Office @@ -55,7 +58,7 @@ The XML below is the current version for this CSP. - Installation options for the office CSP. + Installation options for the Office CSP. @@ -100,7 +103,7 @@ The XML below is the current version for this CSP. - The install action will install office given the configuration in the data. The string data is the xml configuration to use in order to install office. + The install action will install Office given the configuration in the data. The string data is the xml configuration to use in order to install Office. @@ -137,6 +140,27 @@ The XML below is the current version for this CSP. + + CurrentStatus + + + + + The current Office 365 installation status on the machine + + + + + + + + + + + text/plain + + + @@ -156,7 +180,7 @@ The XML below is the current version for this CSP. - + com.microsoft/1.3/MDM/Office @@ -243,6 +267,27 @@ The XML below is the current version for this CSP. + + CurrentStatus + + + + + The current Office 365 installation status on the machine + + + + + + + + + + + text/plain + + + From 52e4b0f7d7efff629fc3b49f77b387a7a8d8207b Mon Sep 17 00:00:00 2001 From: Elizabeth Ross Date: Tue, 22 Aug 2017 18:04:28 +0000 Subject: [PATCH 06/22] Merged PR 2810: Updated system requirements --- .../windows-defender-application-guard/reqs-wd-app-guard.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md b/windows/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md index f726d67b28..c9f657f6f9 100644 --- a/windows/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md +++ b/windows/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md @@ -25,9 +25,9 @@ Your environment needs the following hardware to run Application Guard. |--------|-----------| |64-bit CPU|A 64-bit computer is required for hypervisor and virtualization-based security (VBS). For more info about Hyper-V, see [Hyper-V on Windows Server 2016](https://docs.microsoft.com/en-us/windows-server/virtualization/hyper-v/hyper-v-on-windows-server) or [Introduction to Hyper-V on Windows 10](https://docs.microsoft.com/en-us/virtualization/hyper-v-on-windows/about/). For more info about hypervisor, see [Hypervisor Specifications](https://docs.microsoft.com/en-us/virtualization/hyper-v-on-windows/reference/tlfs).| |CPU virtualization extensions|Extended page tables, also called _Second Level Address Translation (SLAT)_

    **-AND-**

    One of the following virtualization extensions for VBS:

    VT-x (Intel)

    **-OR-**

    AMD-V| -|IOMMU|Not required but strongly recommended| |Hardware memory|8 GB minimum, 16 GB recommended| -|Harddisk|5 GB free space, SSD recommended| +|Hard disk|5 GB free space, solid state disk (SSD) recommended| +|Input/Output Memory Management Unit (IOMMU) support|Not required, but strongly recommended| ## Software requirements Your environment needs the following hardware to run Application Guard. From 3362bfb5edfda855938866eadef989f3fb462a19 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Tue, 22 Aug 2017 19:56:02 +0000 Subject: [PATCH 07/22] Merged PR 2811: Add note to Authenticator app topic --- devices/surface-hub/surface-hub-authenticator-app.md | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/devices/surface-hub/surface-hub-authenticator-app.md b/devices/surface-hub/surface-hub-authenticator-app.md index a13280d8d4..a501494419 100644 --- a/devices/surface-hub/surface-hub-authenticator-app.md +++ b/devices/surface-hub/surface-hub-authenticator-app.md @@ -39,8 +39,13 @@ Currently, you cannot use Microsoft Authenticator to sign in to Surface Hubs tha ## Individual prerequisites - An Android phone running 6.0 or later, or an iPhone or iPad running iOS9 or later + - The most recent version of the Microsoft Authenticator app from the appropriate app store + >[!NOTE] + >The Microsoft Authenticator app on phones running a Windows operating system can't be used to sign in to Surface Hub. + - Passcode or screen lock on your device is enabled + - A standard SMTP email address (example: joe@contoso.com). Non-standard or vanity SMTP email addresses (example: firstname.lastname@contoso.com) currently don’t work. From 86a40ce2ffcd412abbf857e0b4a69253a31801e8 Mon Sep 17 00:00:00 2001 From: Meyyammai Subramanian Date: Tue, 22 Aug 2017 20:59:30 +0000 Subject: [PATCH 08/22] Merged PR 2794: Creating a note for skipping EULA in AutoPilot OOBE Creating a note for skipping EULA in AutoPilot OOBE --- AutoPilotEULANote.md | 20 ++++++++++++++++++++ 1 file changed, 20 insertions(+) create mode 100644 AutoPilotEULANote.md diff --git a/AutoPilotEULANote.md b/AutoPilotEULANote.md new file mode 100644 index 0000000000..8915b7c4a3 --- /dev/null +++ b/AutoPilotEULANote.md @@ -0,0 +1,20 @@ +--- +title: Windows Autopilot EULA dismissal – important information +description: A notice about EULA dismissal through Windows AutoPilot +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: deploy +ms.localizationpriority: high +ms.author: mayam +ms.date: 08/22/2017 +ROBOTS: noindex,nofollow +--- +# Windows Autopilot EULA dismissal – important information + +>[!IMPORTANT] +>The information below isn't the EULA. It is a notice of awareness to the administrator that's configuring to skip End User License Agreement (EULA) during the OOBE (Out-of-Box Experience). + +Using this tool allows you to configure individual installations of Windows on devices managed by your organization. You may choose to suppress or hide certain set-up screens that are normally presented to users when setting up Windows, including the EULA acceptance screen. + +By using this function, you agree that suppressing or hiding any screens that are designed to provide users with notice or acceptance of terms means that you, on behalf of your organization or the individual user as the case may be, have consented to the notices and accepted the applicable terms. This includes your agreement to the terms and conditions of the license or notice that would be presented to the user if you did not suppress or hide it using this tool. You and your users may not use the Windows software on those devices if you have not validly acquired a license for the software from Microsoft or its licensed distributors. \ No newline at end of file From 6fae593a2349a2466e62255b73fb78a7845ec402 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Tue, 22 Aug 2017 21:38:46 +0000 Subject: [PATCH 09/22] Merged PR 2817: Added EULA notice that is unindexed and out of ToC for AutoPilot usage --- .../Windows-AutoPilot-EULA-note.md | 38 +++++++++---------- 1 file changed, 19 insertions(+), 19 deletions(-) rename AutoPilotEULANote.md => windows/Windows-AutoPilot-EULA-note.md (98%) diff --git a/AutoPilotEULANote.md b/windows/Windows-AutoPilot-EULA-note.md similarity index 98% rename from AutoPilotEULANote.md rename to windows/Windows-AutoPilot-EULA-note.md index 8915b7c4a3..941c15911e 100644 --- a/AutoPilotEULANote.md +++ b/windows/Windows-AutoPilot-EULA-note.md @@ -1,20 +1,20 @@ ---- -title: Windows Autopilot EULA dismissal – important information -description: A notice about EULA dismissal through Windows AutoPilot -ms.prod: w10 -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: deploy -ms.localizationpriority: high -ms.author: mayam -ms.date: 08/22/2017 -ROBOTS: noindex,nofollow ---- -# Windows Autopilot EULA dismissal – important information - ->[!IMPORTANT] ->The information below isn't the EULA. It is a notice of awareness to the administrator that's configuring to skip End User License Agreement (EULA) during the OOBE (Out-of-Box Experience). - -Using this tool allows you to configure individual installations of Windows on devices managed by your organization. You may choose to suppress or hide certain set-up screens that are normally presented to users when setting up Windows, including the EULA acceptance screen. - +--- +title: Windows Autopilot EULA dismissal – important information +description: A notice about EULA dismissal through Windows AutoPilot +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: deploy +ms.localizationpriority: high +ms.author: mayam +ms.date: 08/22/2017 +ROBOTS: noindex,nofollow +--- +# Windows Autopilot EULA dismissal – important information + +>[!IMPORTANT] +>The information below isn't the EULA. It is a notice of awareness to the administrator that's configuring to skip End User License Agreement (EULA) during the OOBE (Out-of-Box Experience). + +Using this tool allows you to configure individual installations of Windows on devices managed by your organization. You may choose to suppress or hide certain set-up screens that are normally presented to users when setting up Windows, including the EULA acceptance screen. + By using this function, you agree that suppressing or hiding any screens that are designed to provide users with notice or acceptance of terms means that you, on behalf of your organization or the individual user as the case may be, have consented to the notices and accepted the applicable terms. This includes your agreement to the terms and conditions of the license or notice that would be presented to the user if you did not suppress or hide it using this tool. You and your users may not use the Windows software on those devices if you have not validly acquired a license for the software from Microsoft or its licensed distributors. \ No newline at end of file From 21fb0635387a04f67c937fddffc9246efa0aba31 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Tue, 22 Aug 2017 22:14:16 +0000 Subject: [PATCH 10/22] Merged PR 2820: changing location of EULA note again --- windows/{ => deployment}/Windows-AutoPilot-EULA-note.md | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename windows/{ => deployment}/Windows-AutoPilot-EULA-note.md (100%) diff --git a/windows/Windows-AutoPilot-EULA-note.md b/windows/deployment/Windows-AutoPilot-EULA-note.md similarity index 100% rename from windows/Windows-AutoPilot-EULA-note.md rename to windows/deployment/Windows-AutoPilot-EULA-note.md From dc93b4f3620cf1a52e1cb074d8e0b512ed36e7c3 Mon Sep 17 00:00:00 2001 From: intothedarkness Date: Tue, 22 Aug 2017 16:40:42 -0700 Subject: [PATCH 11/22] update the new value of the 15 / 16 for MBAM non-compliace reason. ping internal alias RIZHANG if you have questions. --- ...ining-why-a-device-receives-a-noncompliance-message.md | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/mdop/mbam-v25/determining-why-a-device-receives-a-noncompliance-message.md b/mdop/mbam-v25/determining-why-a-device-receives-a-noncompliance-message.md index ed35926a8b..e9c656984d 100644 --- a/mdop/mbam-v25/determining-why-a-device-receives-a-noncompliance-message.md +++ b/mdop/mbam-v25/determining-why-a-device-receives-a-noncompliance-message.md @@ -89,6 +89,14 @@ You can use your preferred method to view WMI. If you use PowerShell, run `gwmi
    + + + + + + + +

    14

    AutoUnlock unsafe unless the OS volume is encrypted.

    15

    Policy requires minimum cypher strength is XTS-AES-128 bit, actual cypher strength is weaker than that.

    16

    Policy requires minimum cypher strength is XTS-AES-256 bit, actual cypher strength is weaker than that.

    From f30b13b40eea22928d8857649ec598a19528c2a6 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Tue, 22 Aug 2017 20:12:51 -0700 Subject: [PATCH 12/22] update contextual information --- ...ows-defender-advanced-threat-protection.md | 39 ++++++++----------- 1 file changed, 16 insertions(+), 23 deletions(-) diff --git a/windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md b/windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md index fb191cc3b3..d2b2480f15 100644 --- a/windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md @@ -52,10 +52,9 @@ Whenever a change or comment is made to an alert, it is recorded in the **Commen Added comments instantly appear on the pane. ## Suppress alerts +There might be scenarios where you need to suppress alerts from appearing in the Windows Defender ATP portal. Windows Defender ATP lets you create suppression rules for specific alerts that are known to be innocuous such as known tools or processes in your organization. -Windows Defender ATP lets you create suppression rules so you can limit the alerts you see in the **Alerts queue**. - -Suppression rules can be created from an existing alert. +Suppression rules can be created from an existing alert. They can be disabled and reenabled if needed. When a suppression rule is created, it will take effect from the point when the rule is created. The rule will not affect existing alerts already in the queue prior to the rule creation. The rule will only be applied on alerts that satisfy the conditions set after the rule is created. @@ -64,7 +63,9 @@ There are two contexts for a suppression rule that you can choose from: - **Suppress alert on this machine** - **Suppress alert in my organization** -The context of the rule lets you tailor the queue to ensure that only alerts you are interested in will appear. You can use the examples in the following table to help you choose the context for a suppression rule: +The context of the rule lets you tailor what gets surfaced into the portal and ensure that only real security alerts are surfaced into the portal. + +You can use the examples in the following table to help you choose the context for a suppression rule: | **Context** | **Definition** | **Example scenarios** | |:--------------------------------------|:------------------------------------------------------------------------------------------------------------------------------------------------------------|:-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| @@ -87,34 +88,26 @@ Create custom rules to control when alerts are suppressed, or resolved. You can > [!NOTE] > You cannot create a custom or blank suppression rule. You must start from an existing alert. + 4. Specify the conditions for when the rule is applied: - - Alert title - - Indicator of compromise (IOC) - - Suppression conditions + - Alert title + - Indicator of compromise (IOC) + - Suppression conditions > [!NOTE] - > The SHA1 of the alert cannot be modified -5. Specify the action and scope on the alert. You can automatically resolve an alert or hide it from the portal. Alerts that are automatically resolved will appear in the resolved section of the alerts queue. You can also specify to suppress the alert on the machine only or the whole organization. + > The SHA1 of the alert cannot be modified, however you can clear the SHA1 to remove it from the suppression conditions. + +5. Specify the action and scope on the alert.
    + You can automatically resolve an alert or hide it from the portal. Alerts that are automatically resolved will appear in the resolved section of the alerts queue. Alerts that are marked as hidden will be suppressed from the entire system, both on the machine's associated alerts and from the dashboard. You can also specify to suppress the alert on the machine only or the whole organization. 6. Click **Save and close**. -**See the list of suppression rules:** +### View the list of suppression rules -1. Click the settings icon ![The settings icon looks like a cogwheel or gear](images/settings.png) on the main menu bar at the top of the Windows Defender ATP screen. -2. Click **Suppression rules**. +1. Click **Alerts queue** > **Suppression rules**. - ![Click the settings icon and then Suppression rules to create and modify rules](images/atp-suppression-rules.png) - -The list of suppression rules shows all the rules that users in your organization have created. -![Suppression rules show the rule name or title, the context, the date, and an icon to delete the rule](images/rules-legend.png) - -Each rule shows: - -- (1) The title of the alert that is suppressed -- (2) Whether the alert was suppressed for a single machine (clicking the machine name will allow you to investigate the machine) or the entire organization -- (3) The date when the alert was suppressed -- (4) An option to delete the suppression rule, which will cause alerts with this title to be displayed in the queue from this point onwards. +2. The list of suppression rules shows all the rules that users in your organization have created. ## Related topics From ce4c5de966fc30d6e904f9dc82a956ca57d40745 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 23 Aug 2017 09:36:11 -0700 Subject: [PATCH 13/22] add activate rule --- .../manage-alerts-windows-defender-advanced-threat-protection.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md b/windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md index d2b2480f15..82f32619ad 100644 --- a/windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md @@ -109,6 +109,7 @@ Create custom rules to control when alerts are suppressed, or resolved. You can 2. The list of suppression rules shows all the rules that users in your organization have created. +You can select rules to open up the **Alert management** pane. From there, you can activate previously disabled rules. ## Related topics - [View the Windows Defender Advanced Threat Protection Dashboard](dashboard-windows-defender-advanced-threat-protection.md) From f2657a2b09b54dd489dbe8fcec153c82c02f4065 Mon Sep 17 00:00:00 2001 From: Maricia Alforque Date: Wed, 23 Aug 2017 18:10:18 +0000 Subject: [PATCH 14/22] Merged PR 2809: Merge maricia-12880990 to master --- ...new-in-windows-mdm-enrollment-management.md | 12 +++++++++--- .../policy-configuration-service-provider.md | 6 +++--- .../mdm/policy-csp-defender.md | 18 +++++++++--------- 3 files changed, 21 insertions(+), 15 deletions(-) diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index 15da73f3e8..24d8e2a40f 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -1025,10 +1025,10 @@ For details about Microsoft mobile device management protocols for Windows 10 s

  • Defender/AttackSurfaceReductionRules
  • Defender/CloudBlockLevel
  • Defender/CloudExtendedTimeout
  • -
  • Defender/EnableGuardMyFolders
  • +
  • Defender/ControlledFolderAccessAllowedApplications
  • +
  • Defender/ControlledFolderAccessProtectedFolders
  • +
  • Defender/EnableControlledFolderAccess
  • Defender/EnableNetworkProtection
  • -
  • Defender/GuardedFoldersAllowedApplications
  • -
  • Defender/GuardedFoldersList
  • Education/DefaultPrinterName
  • Education/PreventAddingNewPrinters
  • Education/PrinterNames
  • @@ -1427,6 +1427,12 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware
  • Privacy/PublishUserActivities
  • Changed the name of new policy to CredentialProviders/DisableAutomaticReDeploymentCredentials from CredentialProviders/EnableWindowsAutoPilotResetCredentials.

    +

    Changed the names of the following policies:

    +
      +
    • Defender/GuardedFoldersAllowedApplications to Defender/ControlledFolderAccessAllowedApplications
    • +
    • Defender/GuardedFoldersList to Defender/ControlledFolderAccessProtectedFolders
    • +
    • Defender/EnableGuardMyFolders to Defender/EnableControlledFolderAccess
    • +

    Added links to the additional [ADMX-backed BitLocker policies](policy-csp-bitlocker.md).

    diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index 25f2ec0c0f..cfefa4909b 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -667,7 +667,7 @@ The following diagram shows the Policy configuration service provider in tree fo Defender/DaysToRetainCleanedMalware
    - Defender/EnableGuardMyFolders + Defender/EnableControlledFolderAccess
    Defender/EnableNetworkProtection @@ -682,10 +682,10 @@ The following diagram shows the Policy configuration service provider in tree fo Defender/ExcludedProcesses
    - Defender/GuardedFoldersAllowedApplications + Defender/ControlledFolderAccessAllowedApplications
    - Defender/GuardedFoldersList + Defender/ControlledFolderAccessProtectedFolders
    Defender/PUAProtection diff --git a/windows/client-management/mdm/policy-csp-defender.md b/windows/client-management/mdm/policy-csp-defender.md index 42421382a1..2ab2afa893 100644 --- a/windows/client-management/mdm/policy-csp-defender.md +++ b/windows/client-management/mdm/policy-csp-defender.md @@ -782,7 +782,7 @@ Value type is string. -**Defender/EnableGuardMyFolders** +**Defender/EnableControlledFolderAccess** @@ -809,13 +809,13 @@ Value type is string. > [!NOTE] -> This policy is only enforced in Windows 10 for desktop. +> This policy is only enforced in Windows 10 for desktop. The previous name was EnableGuardMyFolders and changed to EnableControlledFolderAccess.

    Added in Windows 10, version 1709. This policy enables setting the state (On/Off/Audit) for the guard my folders feature. The guard my folders feature removes modify and delete permissions from untrusted applications to certain folders such as My Documents. Value type is integer and the range is 0 - 2. -- 0 (default) - Off -- 1 - Audit mode -- 2 - Enforcement mode +- 0 (default) - Disabled +- 1 - Enabled +- 2 - Audit Mode @@ -977,7 +977,7 @@ Value type is string. -**Defender/GuardedFoldersAllowedApplications** +**Defender/ControlledFolderAccessAllowedApplications**

    @@ -1004,14 +1004,14 @@ Value type is string. > [!NOTE] -> This policy is only enforced in Windows 10 for desktop. +> This policy is only enforced in Windows 10 for desktop. The previous name was GuardedFoldersAllowedApplications and changed to ControlledFolderAccessAllowedApplications.

    Added in Windows 10, version 1709. This policy setting allows user-specified applications to the guard my folders feature. Adding an allowed application means the guard my folders feature will allow the application to modify or delete content in certain folders such as My Documents. In most cases it will not be necessary to add entries. Windows Defender Antivirus will automatically detect and dynamically add applications that are friendly. Value type is string. Use the Unicode  as the substring separator. -**Defender/GuardedFoldersList** +**Defender/ControlledFolderAccessProtectedFolders**

    @@ -1038,7 +1038,7 @@ Value type is string. > [!NOTE] -> This policy is only enforced in Windows 10 for desktop. +> This policy is only enforced in Windows 10 for desktop. The previous name was GuardedFoldersList and changed to ControlledFolderAccessProtectedFolders.

    Added in Windows 10, version 1709. This policy settings allows adding user-specified folder locations to the guard my folders feature. These folders will complement the system defined folders such as My Documents and My Pictures. The list of system folders will be displayed in the user interface and can not be changed. Value type is string. Use the Unicode  as the substring separator. From a011228c789d3293cd8d27027b7703915fbf2486 Mon Sep 17 00:00:00 2001 From: Maricia Alforque Date: Wed, 23 Aug 2017 22:15:01 +0000 Subject: [PATCH 15/22] Merged PR 2853: Added download of Policy DDF for Windows 10, version 1607 release 8C --- ...ew-in-windows-mdm-enrollment-management.md | 19 +- .../client-management/mdm/policy-ddf-file.md | 6581 +++++++++++++---- 2 files changed, 5357 insertions(+), 1243 deletions(-) diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index 24d8e2a40f..494fb897c3 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -52,7 +52,7 @@ For details about Microsoft mobile device management protocols for Windows 10 s ## What's new in Windows 10, version 1511 -

    +
    @@ -184,7 +184,7 @@ For details about Microsoft mobile device management protocols for Windows 10 s ## What's new in Windows 10, version 1607 -
    +
    @@ -495,7 +495,7 @@ For details about Microsoft mobile device management protocols for Windows 10 s ## What's new in Windows 10, version 1703 -
    +
    @@ -916,7 +916,7 @@ For details about Microsoft mobile device management protocols for Windows 10 s ## What's new in Windows 10, version 1709 -
    +
    @@ -1324,7 +1324,7 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware ### August 2017 -
    +
    @@ -1394,6 +1394,15 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware
  • Added default values.
  • + + +
    [Policy DDF file](policy-ddf-file.md)Added another Policy DDF file [download](http://download.microsoft.com/download/6/1/C/61C022FD-6F5D-4F73-9047-17F630899DC4/PolicyDDF_all_version1607_8C.xml) for the 8C release of Windows 10, version 1607, which added the following policies: +
      +
    • Browser/AllowMicrosoftCompatibilityList
    • +
    • Update/DisableDualScan
    • +
    • Update/FillEmptyContentUrls
    • +
    +
    [Policy CSP](policy-configuration-service-provider.md)

    Added the following new policies for Windows 10, version 1709:

    diff --git a/windows/client-management/mdm/policy-ddf-file.md b/windows/client-management/mdm/policy-ddf-file.md index ec16e08ca7..3e242783d4 100644 --- a/windows/client-management/mdm/policy-ddf-file.md +++ b/windows/client-management/mdm/policy-ddf-file.md @@ -7,7 +7,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 06/30/2017 +ms.date: 08/23/2017 --- # Policy DDF file @@ -21,6 +21,7 @@ You can download the DDF files from the links below: - [Download the Policy DDF file for Windows 10, version 1703](http://download.microsoft.com/download/7/2/C/72C36C37-20F9-41BF-8E23-721F6FFC253E/PolicyDDF_all.xml) - [Download the Policy DDF file for Windows 10, version 1607](http://download.microsoft.com/download/6/1/C/61C022FD-6F5D-4F73-9047-17F630899DC4/PolicyDDF_all_version1607.xml) +- [Download the Policy DDF file for Windows 10, version 1607 release 8C](http://download.microsoft.com/download/6/1/C/61C022FD-6F5D-4F73-9047-17F630899DC4/PolicyDDF_all_version1607_8C.xml) - [Download all the DDF files for Windows 10, version 1607](http://download.microsoft.com/download/2/3/E/23E27D6B-6E23-4833-B143-915EDA3BDD44/Windows10_1607_DDF.zip) The XML below is the DDF for Windows 10, version 1709. @@ -353,6 +354,941 @@ The XML below is the DDF for Windows 10, version 1709. + + Browser + + + + + + + + + + + + + + + + + + + + + AllowAddressBarDropdown + + + + + + + + This policy setting lets you decide whether the Address bar drop-down functionality is available in Microsoft Edge. We recommend disabling this setting if you want to minimize network connections from Microsoft Edge to Microsoft services. + + + + + + + + + + + text/plain + + + + + AllowAutofill + + + + + + + + This setting lets you decide whether employees can use Autofill to automatically fill in form fields while using Microsoft Edge. + + + + + + + + + + + text/plain + + + + + AllowBrowser + + + + + + + + + + + + + + + + + + + text/plain + + + + + AllowCookies + + + + + + + + This setting lets you configure how your company deals with cookies. + + + + + + + + + + + text/plain + + + + + AllowDeveloperTools + + + + + + + + This setting lets you decide whether employees can use F12 Developer Tools on Microsoft Edge. + + + + + + + + + + + text/plain + + + + + AllowDoNotTrack + + + + + + + + This setting lets you decide whether employees can send Do Not Track headers to websites that request tracking info. + + + + + + + + + + + text/plain + + + + + AllowExtensions + + + + + + + + This setting lets you decide whether employees can load extensions in Microsoft Edge. + + + + + + + + + + + text/plain + + + + + AllowFlash + + + + + + + + This setting lets you decide whether employees can run Adobe Flash in Microsoft Edge. + + + + + + + + + + + text/plain + + + + + AllowFlashClickToRun + + + + + + + + Configure the Adobe Flash Click-to-Run setting. + + + + + + + + + + + text/plain + + + + + AllowInPrivate + + + + + + + + This setting lets you decide whether employees can browse using InPrivate website browsing. + + + + + + + + + + + text/plain + + + + + AllowMicrosoftCompatibilityList + + + + + + + + This policy setting lets you decide whether the Microsoft Compatibility List is enabled or disabled in Microsoft Edge. This feature uses a Microsoft-provided list to ensure that any sites with known compatibility issues are displayed correctly when a user navigates to them. By default, the Microsoft Compatibility List is enabled and can be viewed by navigating to about:compat. + +If you enable or don’t configure this setting, Microsoft Edge will periodically download the latest version of the list from Microsoft and will apply the configurations specified there during browser navigation. If a user visits a site on the Microsoft Compatibility List, he or she will be prompted to open the site in Internet Explorer 11. Once in Internet Explorer, the site will automatically be rendered as if the user is viewing it in the previous version of Internet Explorer it requires to display correctly. + +If you disable this setting, the Microsoft Compatibility List will not be used during browser navigation. + + + + + + + + + + + text/plain + + + + + AllowPasswordManager + + + + + + + + This setting lets you decide whether employees can save their passwords locally, using Password Manager. + + + + + + + + + + + text/plain + + + + + AllowPopups + + + + + + + + This setting lets you decide whether to turn on Pop-up Blocker and whether to allow pop-ups to appear in secondary windows. + + + + + + + + + + + text/plain + + + + + AllowSearchEngineCustomization + + + + + + + + Allow search engine customization for MDM enrolled devices. Users can change their default search engine. + +If this setting is turned on or not configured, users can add new search engines and change the default used in the address bar from within Microsoft Edge Settings. +If this setting is disabled, users will be unable to add search engines or change the default used in the address bar. + +This policy will only apply on domain joined machines or when the device is MDM enrolled. For more information, see Microsoft browser extension policy (aka.ms/browserpolicy). + + + + + + + + + + + text/plain + + + + + AllowSearchSuggestionsinAddressBar + + + + + + + + This setting lets you decide whether search suggestions should appear in the Address bar of Microsoft Edge. + + + + + + + + + + + text/plain + + + + + AllowSmartScreen + + + + + + + + This setting lets you decide whether to turn on Windows Defender SmartScreen. + + + + + + + + + + + text/plain + + + + + AlwaysEnableBooksLibrary + + + + + + + + Specifies whether the Books Library in Microsoft Edge will always be visible regardless of the country or region setting for the device. + + + + + + + + + + + text/plain + + + + + ClearBrowsingDataOnExit + + + + + + + + Specifies whether to always clear browsing history on exiting Microsoft Edge. + + + + + + + + + + + text/plain + + + + + ConfigureAdditionalSearchEngines + + + + + + + + Allows you to add up to 5 additional search engines for MDM-enrolled devices. + +If this setting is turned on, you can add up to 5 additional search engines for your employee. For each additional search engine you wish to add, you must specify a link to the OpenSearch XML file that contains, at minimum, the short name and the URL to the search engine. This policy does not affect the default search engine. Employees will not be able to remove these search engines, but they can set any one of these as the default. + +If this setting is not configured, the search engines are the ones specified in the App settings. If this setting is disabled, the search engines you had added will be deleted from your employee's machine. + +Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on domain-joined machines or when the device is MDM-enrolled. + + + + + + + + + + + text/plain + + + + + DisableLockdownOfStartPages + + + + + + + + Boolean policy that specifies whether the lockdown on the Start pages is disabled. This policy works with the Browser/HomePages policy, which locks down the Start pages that the users cannot modify. You can use the DisableLockdownOfStartPages policy to allow users to modify the Start pages when Browser/HomePages policy is in effect. + +Note: This policy has no effect when Browser/HomePages is not configured. + +Important +This setting can only be used with domain-joined or MDM-enrolled devices. For more info, see the Microsoft browser extension policy (aka.ms/browserpolicy). + + + + + + + + + + + text/plain + + + + + EnterpriseModeSiteList + + + + + + + + This setting lets you configure whether your company uses Enterprise Mode and the Enterprise Mode Site List to address common compatibility problems with legacy websites. + + + + + + + + + + + text/plain + + + + + EnterpriseSiteListServiceUrl + + + + + + + + + + + + + + + + + + + text/plain + + + + + FirstRunURL + + + + + + + + Configure first run URL. + + + + + + + + + + + text/plain + + + + + HomePages + + + + + + + + Configure the Start page URLs for your employees. +Example: +If you wanted to allow contoso.com and fabrikam.com then you would append /support to the site strings like contoso.com/support and fabrikam.com/support. +Encapsulate each string with greater than and less than characters like any other XML tag. + +Version 1703 or later:  If you don't want to send traffic to Microsoft, you can use the about:blank value (encapsulate with greater than and less than characters like any other XML tag), which is honored for both domain- and non-domain-joined machines, when it's the only configured URL. + + + + + + + + + + + text/plain + + + + + LockdownFavorites + + + + + + + + This policy setting lets you decide whether employees can add, import, sort, or edit the Favorites list on Microsoft Edge. + +If you enable this setting, employees won't be able to add, import, or change anything in the Favorites list. Also as part of this, Save a Favorite, Import settings, and the context menu items (such as, Create a new folder) are all turned off. + +Important +Don't enable both this setting and the Keep favorites in sync between Internet Explorer and Microsoft Edge setting. Enabling both settings stops employees from syncing their favorites between Internet Explorer and Microsoft Edge. + +If you disable or don't configure this setting (default), employees can add, import and make changes to the Favorites list. + + + + + + + + + + + text/plain + + + + + PreventAccessToAboutFlagsInMicrosoftEdge + + + + + + + + Prevent access to the about:flags page in Microsoft Edge. + + + + + + + + + + + text/plain + + + + + PreventFirstRunPage + + + + + + + + Specifies whether the First Run webpage is prevented from automatically opening on the first launch of Microsoft Edge. This policy is only available for Windows 10 version 1703 or later for desktop. + +Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on domain-joined machines or when the device is MDM-enrolled. + + + + + + + + + + + text/plain + + + + + PreventLiveTileDataCollection + + + + + + + + This policy lets you decide whether Microsoft Edge can gather Live Tile metadata from the ieonline.microsoft.com service to provide a better experience while pinning a Live Tile to the Start menu. + +Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on domain-joined machines or when the device is MDM-enrolled. + + + + + + + + + + + text/plain + + + + + PreventSmartScreenPromptOverride + + + + + + + + Don't allow Windows Defender SmartScreen warning overrides + + + + + + + + + + + text/plain + + + + + PreventSmartScreenPromptOverrideForFiles + + + + + + + + Don't allow Windows Defender SmartScreen warning overrides for unverified files. + + + + + + + + + + + text/plain + + + + + PreventUsingLocalHostIPAddressForWebRTC + + + + + + + + Prevent using localhost IP address for WebRTC + + + + + + + + + + + text/plain + + + + + ProvisionFavorites + + + + + + + + This policy setting allows you to configure a default set of favorites, which will appear for employees. Employees cannot modify, sort, move, export or delete these provisioned favorites. + +If you enable this setting, you can set favorite URL's and favorite folders to appear on top of users' favorites list (either in the Hub or Favorites Bar). The user favorites will appear after these provisioned favorites. + +Important +Don't enable both this setting and the Keep favorites in sync between Internet Explorer and Microsoft Edge setting. Enabling both settings stops employees from syncing their favorites between Internet Explorer and Microsoft Edge. + +If you disable or don't configure this setting, employees will see the favorites they set in the Hub and Favorites Bar. + + + + + + + + + + + text/plain + + + + + SendIntranetTraffictoInternetExplorer + + + + + + + + Sends all intranet traffic over to Internet Explorer. + + + + + + + + + + + text/plain + + + + + SetDefaultSearchEngine + + + + + + + + Sets the default search engine for MDM-enrolled devices. Users can still change their default search engine. + +If this setting is turned on, you are setting the default search engine that you would like your employees to use. Employees can still change the default search engine, unless you apply the AllowSearchEngineCustomization policy which will disable the ability to change it. You must specify a link to the OpenSearch XML file that contains, at minimum, the short name and the URL to the search engine. If you would like for your employees to use the Edge factory settings for the default search engine for their market, set the string EDGEDEFAULT; if you would like for your employees to use Bing as the default search engine, set the string EDGEBING. + +If this setting is not configured, the default search engine is set to the one specified in App settings and can be changed by your employees. If this setting is disabled, the policy-set search engine will be removed, and, if it is the current default, the default will be set back to the factory Microsoft Edge search engine for the market. + +Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on domain-joined machines or when the device is MDM-enrolled. + + + + + + + + + + + text/plain + + + + + ShowMessageWhenOpeningSitesInInternetExplorer + + + + + + + + Show message when opening sites in Internet Explorer + + + + + + + + + + + text/plain + + + + + SyncFavoritesBetweenIEAndMicrosoftEdge + + + + + + + + Specifies whether favorites are kept in sync between Internet Explorer and Microsoft Edge. Changes to favorites in one browser are reflected in the other, including: additions, deletions, modifications, and ordering. + + + + + + + + + + + text/plain + + + + CredentialsUI @@ -467,7 +1403,7 @@ The XML below is the DDF for Windows 10, version 1709. - AllowUserPrinterInstallation + DefaultPrinterName @@ -475,9 +1411,9 @@ The XML below is the DDF for Windows 10, version 1709. - Boolean that specifies whether or not to allow user to install new printers + This policy sets user's default printer - + @@ -491,7 +1427,7 @@ The XML below is the DDF for Windows 10, version 1709. - DefaultPrinterName + PreventAddingNewPrinters @@ -499,9 +1435,9 @@ The XML below is the DDF for Windows 10, version 1709. - This policy sets user's default printer + Boolean that specifies whether or not to prevent user to install new printers - + @@ -1133,7 +2069,7 @@ The XML below is the DDF for Windows 10, version 1709. - AllowInternetExplorer7PolicyList + AllowInternetExplorer7PolicyList @@ -1757,7 +2693,7 @@ The XML below is the DDF for Windows 10, version 1709. - DisableDeletingUserVisitedWebsites + DisableDeletingUserVisitedWebsites @@ -2357,7 +3293,7 @@ The XML below is the DDF for Windows 10, version 1709. - InternetZoneAllowLoadingOfXAMLFilesWRONG + InternetZoneAllowLoadingOfXAMLFiles @@ -2597,31 +3533,7 @@ The XML below is the DDF for Windows 10, version 1709. - InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG1 - - - - - - - - - - - - - - - - - - - text/plain - - - - - InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG2 + InternetZoneDoNotRunAntimalwareAgainstActiveXControls @@ -2861,55 +3773,7 @@ The XML below is the DDF for Windows 10, version 1709. - InternetZoneInitializeAndScriptActiveXControlsNotMarkedSafe - - - - - - - - - - - - - - - - - - - text/plain - - - - - InternetZoneJavaPermissionsWRONG1 - - - - - - - - - - - - - - - - - - - text/plain - - - - - InternetZoneJavaPermissionsWRONG2 + InternetZoneJavaPermissions @@ -3340,6 +4204,30 @@ The XML below is the DDF for Windows 10, version 1709. + + IntranetZoneDoNotRunAntimalwareAgainstActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + IntranetZoneInitializeAndScriptActiveXControls @@ -3364,6 +4252,54 @@ The XML below is the DDF for Windows 10, version 1709. + + IntranetZoneInitializeAndScriptActiveXControlsNotMarkedSafe + + + + + + + + + + + + + + + + + + + text/plain + + + + + IntranetZoneJavaPermissions + + + + + + + + + + + + + + + + + + + text/plain + + + IntranetZoneNavigateWindowsAndFrames @@ -5501,31 +6437,7 @@ The XML below is the DDF for Windows 10, version 1709. - RestrictedSitesZoneAllowFontDownloadsWRONG1 - - - - - - - - - - - - - - - - - - - text/plain - - - - - RestrictedSitesZoneAllowFontDownloadsWRONG2 + RestrictedSitesZoneAllowFontDownloads @@ -5908,6 +6820,30 @@ The XML below is the DDF for Windows 10, version 1709. + + RestrictedSitesZoneEnableCrossSiteScriptingFilter + + + + + + + + + + + + + + + + + + + text/plain + + + RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindows @@ -6221,7 +7157,7 @@ The XML below is the DDF for Windows 10, version 1709. - RestrictedSitesZoneWRONG + RestrictedSitesZoneScriptingOfJavaApplets @@ -6245,7 +7181,7 @@ The XML below is the DDF for Windows 10, version 1709. - RestrictedSitesZoneWRONG2 + RestrictedSitesZoneShowSecurityWarningForPotentiallyUnsafeFiles @@ -6269,7 +7205,7 @@ The XML below is the DDF for Windows 10, version 1709. - RestrictedSitesZoneWRONG3 + RestrictedSitesZoneTurnOnCrossSiteScriptingFilter @@ -6293,7 +7229,7 @@ The XML below is the DDF for Windows 10, version 1709. - RestrictedSitesZoneWRONG4 + RestrictedSitesZoneTurnOnProtectedMode @@ -6317,7 +7253,7 @@ The XML below is the DDF for Windows 10, version 1709. - RestrictedSitesZoneWRONG5 + RestrictedSitesZoneUsePopupBlocker @@ -6652,6 +7588,54 @@ The XML below is the DDF for Windows 10, version 1709. + + TrustedSitesZoneDoNotRunAntimalwareAgainstActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + TrustedSitesZoneDontRunAntimalwareProgramsAgainstActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + TrustedSitesZoneInitializeAndScriptActiveXControls @@ -6676,6 +7660,54 @@ The XML below is the DDF for Windows 10, version 1709. + + TrustedSitesZoneInitializeAndScriptActiveXControlsNotMarkedAsSafe + + + + + + + + + + + + + + + + + + + text/plain + + + + + TrustedSitesZoneInitializeAndScriptActiveXControlsNotMarkedSafe + + + + + + + + + + + + + + + + + + + text/plain + + + TrustedSitesZoneJavaPermissions @@ -6724,54 +7756,6 @@ The XML below is the DDF for Windows 10, version 1709. - - TrustedSitesZoneWRONG1 - - - - - - - - - - - - - - - - - - - text/plain - - - - - TrustedSitesZoneWRONG2 - - - - - - - - - - - - - - - - - - - text/plain - - - Notifications @@ -7062,6 +8046,7 @@ The XML below is the DDF for Windows 10, version 1709. text/plain + HighestValueMostSecure @@ -7108,6 +8093,7 @@ The XML below is the DDF for Windows 10, version 1709. AttachmentManager.admx AttachmentManager~AT~WindowsComponents~AM_AM AM_MarkZoneOnSavedAtttachments + LastWrite @@ -7134,6 +8120,7 @@ The XML below is the DDF for Windows 10, version 1709. AttachmentManager.admx AttachmentManager~AT~WindowsComponents~AM_AM AM_RemoveZoneInfo + LastWrite @@ -7160,6 +8147,7 @@ The XML below is the DDF for Windows 10, version 1709. AttachmentManager.admx AttachmentManager~AT~WindowsComponents~AM_AM AM_CallIOfficeAntiVirus + LastWrite @@ -7202,6 +8190,7 @@ The XML below is the DDF for Windows 10, version 1709. text/plain + LowestValueMostSecure @@ -7248,6 +8237,7 @@ The XML below is the DDF for Windows 10, version 1709. AutoPlay.admx AutoPlay~AT~WindowsComponents~AutoPlay NoAutoplayfornonVolume + LastWrite @@ -7274,6 +8264,7 @@ The XML below is the DDF for Windows 10, version 1709. AutoPlay.admx AutoPlay~AT~WindowsComponents~AutoPlay NoAutorun + LastWrite @@ -7300,6 +8291,921 @@ The XML below is the DDF for Windows 10, version 1709. AutoPlay.admx AutoPlay~AT~WindowsComponents~AutoPlay Autorun + LastWrite + + + + + Browser + + + + + + + + + + + + + + + + + + + AllowAddressBarDropdown + + + + + This policy setting lets you decide whether the Address bar drop-down functionality is available in Microsoft Edge. We recommend disabling this setting if you want to minimize network connections from Microsoft Edge to Microsoft services. + 1 + + + + + + + + + + + text/plain + + phone + LowestValueMostSecure + + + + AllowAutofill + + + + + This setting lets you decide whether employees can use Autofill to automatically fill in form fields while using Microsoft Edge. + 0 + + + + + + + + + + + text/plain + + LowestValueMostSecure + + + + AllowBrowser + + + + + + 1 + + + + + + + + + + + text/plain + + desktop + LowestValueMostSecure + + + + AllowCookies + + + + + This setting lets you configure how your company deals with cookies. + 2 + + + + + + + + + + + text/plain + + LowestValueMostSecure + + + + AllowDeveloperTools + + + + + This setting lets you decide whether employees can use F12 Developer Tools on Microsoft Edge. + 1 + + + + + + + + + + + text/plain + + phone + LowestValueMostSecure + + + + AllowDoNotTrack + + + + + This setting lets you decide whether employees can send Do Not Track headers to websites that request tracking info. + 0 + + + + + + + + + + + text/plain + + LowestValueMostSecure + + + + AllowExtensions + + + + + This setting lets you decide whether employees can load extensions in Microsoft Edge. + 1 + + + + + + + + + + + text/plain + + phone + LowestValueMostSecure + + + + AllowFlash + + + + + This setting lets you decide whether employees can run Adobe Flash in Microsoft Edge. + 1 + + + + + + + + + + + text/plain + + phone + HighestValueMostSecure + + + + AllowFlashClickToRun + + + + + Configure the Adobe Flash Click-to-Run setting. + 1 + + + + + + + + + + + text/plain + + phone + HighestValueMostSecure + + + + AllowInPrivate + + + + + This setting lets you decide whether employees can browse using InPrivate website browsing. + 1 + + + + + + + + + + + text/plain + + LowestValueMostSecure + + + + AllowMicrosoftCompatibilityList + + + + + This policy setting lets you decide whether the Microsoft Compatibility List is enabled or disabled in Microsoft Edge. This feature uses a Microsoft-provided list to ensure that any sites with known compatibility issues are displayed correctly when a user navigates to them. By default, the Microsoft Compatibility List is enabled and can be viewed by navigating to about:compat. + +If you enable or don’t configure this setting, Microsoft Edge will periodically download the latest version of the list from Microsoft and will apply the configurations specified there during browser navigation. If a user visits a site on the Microsoft Compatibility List, he or she will be prompted to open the site in Internet Explorer 11. Once in Internet Explorer, the site will automatically be rendered as if the user is viewing it in the previous version of Internet Explorer it requires to display correctly. + +If you disable this setting, the Microsoft Compatibility List will not be used during browser navigation. + 1 + + + + + + + + + + + text/plain + + LowestValueMostSecure + + + + AllowPasswordManager + + + + + This setting lets you decide whether employees can save their passwords locally, using Password Manager. + 1 + + + + + + + + + + + text/plain + + LowestValueMostSecure + + + + AllowPopups + + + + + This setting lets you decide whether to turn on Pop-up Blocker and whether to allow pop-ups to appear in secondary windows. + 0 + + + + + + + + + + + text/plain + + phone + LowestValueMostSecure + + + + AllowSearchEngineCustomization + + + + + Allow search engine customization for MDM enrolled devices. Users can change their default search engine. + +If this setting is turned on or not configured, users can add new search engines and change the default used in the address bar from within Microsoft Edge Settings. +If this setting is disabled, users will be unable to add search engines or change the default used in the address bar. + +This policy will only apply on domain joined machines or when the device is MDM enrolled. For more information, see Microsoft browser extension policy (aka.ms/browserpolicy). + 1 + + + + + + + + + + + text/plain + + LowestValueMostSecure + + + + AllowSearchSuggestionsinAddressBar + + + + + This setting lets you decide whether search suggestions should appear in the Address bar of Microsoft Edge. + 1 + + + + + + + + + + + text/plain + + LowestValueMostSecure + + + + AllowSmartScreen + + + + + This setting lets you decide whether to turn on Windows Defender SmartScreen. + 1 + + + + + + + + + + + text/plain + + LowestValueMostSecure + + + + AlwaysEnableBooksLibrary + + + + + Specifies whether the Books Library in Microsoft Edge will always be visible regardless of the country or region setting for the device. + 0 + + + + + + + + + + + text/plain + + LowestValueMostSecure + + + + ClearBrowsingDataOnExit + + + + + Specifies whether to always clear browsing history on exiting Microsoft Edge. + 0 + + + + + + + + + + + text/plain + + phone + LowestValueMostSecure + + + + ConfigureAdditionalSearchEngines + + + + + Allows you to add up to 5 additional search engines for MDM-enrolled devices. + +If this setting is turned on, you can add up to 5 additional search engines for your employee. For each additional search engine you wish to add, you must specify a link to the OpenSearch XML file that contains, at minimum, the short name and the URL to the search engine. This policy does not affect the default search engine. Employees will not be able to remove these search engines, but they can set any one of these as the default. + +If this setting is not configured, the search engines are the ones specified in the App settings. If this setting is disabled, the search engines you had added will be deleted from your employee's machine. + +Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on domain-joined machines or when the device is MDM-enrolled. + + + + + + + + + + + + text/plain + + LastWrite + + + + DisableLockdownOfStartPages + + + + + Boolean policy that specifies whether the lockdown on the Start pages is disabled. This policy works with the Browser/HomePages policy, which locks down the Start pages that the users cannot modify. You can use the DisableLockdownOfStartPages policy to allow users to modify the Start pages when Browser/HomePages policy is in effect. + +Note: This policy has no effect when Browser/HomePages is not configured. + +Important +This setting can only be used with domain-joined or MDM-enrolled devices. For more info, see the Microsoft browser extension policy (aka.ms/browserpolicy). + 0 + + + + + + + + + + + text/plain + + phone + LowestValueMostSecure + + + + EnterpriseModeSiteList + + + + + This setting lets you configure whether your company uses Enterprise Mode and the Enterprise Mode Site List to address common compatibility problems with legacy websites. + + + + + + + + + + + + text/plain + + phone + LastWrite + + + + EnterpriseSiteListServiceUrl + + + + + + + + + + + + + + + + + text/plain + + phone + LastWrite + + + + FirstRunURL + + + + + Configure first run URL. + + + + + + + + + + + + text/plain + + desktop + LastWrite + + + + HomePages + + + + + Configure the Start page URLs for your employees. +Example: +If you wanted to allow contoso.com and fabrikam.com then you would append /support to the site strings like contoso.com/support and fabrikam.com/support. +Encapsulate each string with greater than and less than characters like any other XML tag. + +Version 1703 or later:  If you don't want to send traffic to Microsoft, you can use the about:blank value (encapsulate with greater than and less than characters like any other XML tag), which is honored for both domain- and non-domain-joined machines, when it's the only configured URL. + + + + + + + + + + + + text/plain + + phone + LastWrite + + + + LockdownFavorites + + + + + This policy setting lets you decide whether employees can add, import, sort, or edit the Favorites list on Microsoft Edge. + +If you enable this setting, employees won't be able to add, import, or change anything in the Favorites list. Also as part of this, Save a Favorite, Import settings, and the context menu items (such as, Create a new folder) are all turned off. + +Important +Don't enable both this setting and the Keep favorites in sync between Internet Explorer and Microsoft Edge setting. Enabling both settings stops employees from syncing their favorites between Internet Explorer and Microsoft Edge. + +If you disable or don't configure this setting (default), employees can add, import and make changes to the Favorites list. + 0 + + + + + + + + + + + text/plain + + LowestValueMostSecure + + + + PreventAccessToAboutFlagsInMicrosoftEdge + + + + + Prevent access to the about:flags page in Microsoft Edge. + 0 + + + + + + + + + + + text/plain + + HighestValueMostSecure + + + + PreventFirstRunPage + + + + + Specifies whether the First Run webpage is prevented from automatically opening on the first launch of Microsoft Edge. This policy is only available for Windows 10 version 1703 or later for desktop. + +Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on domain-joined machines or when the device is MDM-enrolled. + 0 + + + + + + + + + + + text/plain + + phone + HighestValueMostSecure + + + + PreventLiveTileDataCollection + + + + + This policy lets you decide whether Microsoft Edge can gather Live Tile metadata from the ieonline.microsoft.com service to provide a better experience while pinning a Live Tile to the Start menu. + +Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on domain-joined machines or when the device is MDM-enrolled. + 0 + + + + + + + + + + + text/plain + + HighestValueMostSecure + + + + PreventSmartScreenPromptOverride + + + + + Don't allow Windows Defender SmartScreen warning overrides + 0 + + + + + + + + + + + text/plain + + HighestValueMostSecure + + + + PreventSmartScreenPromptOverrideForFiles + + + + + Don't allow Windows Defender SmartScreen warning overrides for unverified files. + 0 + + + + + + + + + + + text/plain + + HighestValueMostSecure + + + + PreventUsingLocalHostIPAddressForWebRTC + + + + + Prevent using localhost IP address for WebRTC + 0 + + + + + + + + + + + text/plain + + HighestValueMostSecure + + + + ProvisionFavorites + + + + + This policy setting allows you to configure a default set of favorites, which will appear for employees. Employees cannot modify, sort, move, export or delete these provisioned favorites. + +If you enable this setting, you can set favorite URL's and favorite folders to appear on top of users' favorites list (either in the Hub or Favorites Bar). The user favorites will appear after these provisioned favorites. + +Important +Don't enable both this setting and the Keep favorites in sync between Internet Explorer and Microsoft Edge setting. Enabling both settings stops employees from syncing their favorites between Internet Explorer and Microsoft Edge. + +If you disable or don't configure this setting, employees will see the favorites they set in the Hub and Favorites Bar. + + + + + + + + + + + + text/plain + + LastWrite + + + + SendIntranetTraffictoInternetExplorer + + + + + Sends all intranet traffic over to Internet Explorer. + 0 + + + + + + + + + + + text/plain + + phone + HighestValueMostSecure + + + + SetDefaultSearchEngine + + + + + Sets the default search engine for MDM-enrolled devices. Users can still change their default search engine. + +If this setting is turned on, you are setting the default search engine that you would like your employees to use. Employees can still change the default search engine, unless you apply the AllowSearchEngineCustomization policy which will disable the ability to change it. You must specify a link to the OpenSearch XML file that contains, at minimum, the short name and the URL to the search engine. If you would like for your employees to use the Edge factory settings for the default search engine for their market, set the string EDGEDEFAULT; if you would like for your employees to use Bing as the default search engine, set the string EDGEBING. + +If this setting is not configured, the default search engine is set to the one specified in App settings and can be changed by your employees. If this setting is disabled, the policy-set search engine will be removed, and, if it is the current default, the default will be set back to the factory Microsoft Edge search engine for the market. + +Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on domain-joined machines or when the device is MDM-enrolled. + + + + + + + + + + + + text/plain + + LastWrite + + + + ShowMessageWhenOpeningSitesInInternetExplorer + + + + + Show message when opening sites in Internet Explorer + 0 + + + + + + + + + + + text/plain + + phone + HighestValueMostSecure + + + + SyncFavoritesBetweenIEAndMicrosoftEdge + + + + + Specifies whether favorites are kept in sync between Internet Explorer and Microsoft Edge. Changes to favorites in one browser are reflected in the other, including: additions, deletions, modifications, and ordering. + 0 + + + + + + + + + + + text/plain + + phone + LowestValueMostSecure @@ -7346,6 +9252,7 @@ The XML below is the DDF for Windows 10, version 1709. credui.admx CredUI~AT~WindowsComponents~CredUI DisablePasswordReveal + LastWrite @@ -7392,6 +9299,7 @@ The XML below is the DDF for Windows 10, version 1709. desktop.admx desktop~AT~Desktop DisablePersonalDirChange + LastWrite @@ -7414,28 +9322,6 @@ The XML below is the DDF for Windows 10, version 1709. - - AllowUserPrinterInstallation - - - - - Boolean that specifies whether or not to allow user to install new printers - - - - - - - - - - - - text/plain - - - DefaultPrinterName @@ -7456,6 +9342,30 @@ The XML below is the DDF for Windows 10, version 1709. text/plain + LastWrite + + + + PreventAddingNewPrinters + + + + + Boolean that specifies whether or not to prevent user to install new printers + 0 + + + + + + + + + + + text/plain + + HighestValueMostSecure @@ -7478,6 +9388,7 @@ The XML below is the DDF for Windows 10, version 1709. text/plain + LastWrite @@ -7520,6 +9431,7 @@ The XML below is the DDF for Windows 10, version 1709. text/plain + LastWrite @@ -7542,6 +9454,7 @@ The XML below is the DDF for Windows 10, version 1709. text/plain + LastWrite @@ -7551,7 +9464,7 @@ The XML below is the DDF for Windows 10, version 1709. A GUID identifying the client application authorized to retrieve OAuth tokens from the OAuthAuthority - E1CF1107-FF90-4228-93BF-26052DD2C714 + @@ -7564,6 +9477,7 @@ The XML below is the DDF for Windows 10, version 1709. text/plain + LastWrite @@ -7586,6 +9500,7 @@ The XML below is the DDF for Windows 10, version 1709. text/plain + LastWrite @@ -7608,6 +9523,7 @@ The XML below is the DDF for Windows 10, version 1709. text/plain + LastWrite @@ -7630,6 +9546,7 @@ The XML below is the DDF for Windows 10, version 1709. text/plain + LastWrite @@ -7672,6 +9589,7 @@ The XML below is the DDF for Windows 10, version 1709. text/plain + LowestValueMostSecure @@ -7695,6 +9613,7 @@ The XML below is the DDF for Windows 10, version 1709. text/plain phone + LowestValueMostSecure @@ -7718,6 +9637,7 @@ The XML below is the DDF for Windows 10, version 1709. text/plain phone + LowestValueMostSecure @@ -7741,6 +9661,7 @@ The XML below is the DDF for Windows 10, version 1709. text/plain phone + LowestValueMostSecure @@ -7763,6 +9684,7 @@ The XML below is the DDF for Windows 10, version 1709. text/plain + LowestValueMostSecure @@ -7785,6 +9707,7 @@ The XML below is the DDF for Windows 10, version 1709. text/plain + LowestValueMostSecure @@ -7808,6 +9731,7 @@ The XML below is the DDF for Windows 10, version 1709. text/plain phone + LowestValueMostSecure @@ -7854,6 +9778,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer AddSearchProvider + LastWrite @@ -7880,6 +9805,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer TurnOnActiveXFiltering + LastWrite @@ -7906,6 +9832,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement AddonManagement_AddOnList + LastWrite @@ -7932,6 +9859,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer RestrictFormSuggestPW + LastWrite @@ -7958,6 +9886,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyWarnCertMismatch + LastWrite @@ -7984,6 +9913,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~DeleteBrowsingHistory DBHDisableDeleteOnExit + LastWrite @@ -8010,6 +9940,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage Advanced_EnableEnhancedProtectedMode + LastWrite @@ -8036,6 +9967,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer EnterpriseModeEnable + LastWrite @@ -8062,10 +9994,11 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer EnterpriseModeSiteList + LastWrite - AllowInternetExplorer7PolicyList + AllowInternetExplorer7PolicyList @@ -8088,6 +10021,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~CategoryCompatView CompatView_UsePolicyList + LastWrite @@ -8114,6 +10048,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~CategoryCompatView CompatView_IntranetSites + LastWrite @@ -8140,6 +10075,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyInternetZoneTemplate + LastWrite @@ -8166,6 +10102,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyIntranetZoneTemplate + LastWrite @@ -8192,6 +10129,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyLocalMachineZoneTemplate + LastWrite @@ -8218,6 +10156,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyInternetZoneLockdownTemplate + LastWrite @@ -8244,6 +10183,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyIntranetZoneLockdownTemplate + LastWrite @@ -8270,6 +10210,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyLocalMachineZoneLockdownTemplate + LastWrite @@ -8296,6 +10237,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyRestrictedSitesZoneLockdownTemplate + LastWrite @@ -8322,6 +10264,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetSettings~Advanced~Browsing UseIntranetSiteForOneWordEntry + LastWrite @@ -8348,6 +10291,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_Zonemaps + LastWrite @@ -8374,6 +10318,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyTrustedSitesZoneLockdownTemplate + LastWrite @@ -8400,6 +10345,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage Advanced_InvalidSignatureBlock + LastWrite @@ -8426,6 +10372,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyRestrictedSitesZoneTemplate + LastWrite @@ -8452,6 +10399,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer EnableSuggestedSites + LastWrite @@ -8478,6 +10426,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyTrustedSitesZoneTemplate + LastWrite @@ -8504,6 +10453,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage Advanced_CertificateRevocation + LastWrite @@ -8530,6 +10480,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage Advanced_DownloadSignatures + LastWrite @@ -8556,6 +10507,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryBinaryBehaviorSecurityRestriction IESF_PolicyExplorerProcesses_2 + LastWrite @@ -8582,6 +10534,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement DisableFlashInIE + LastWrite @@ -8608,6 +10561,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement VerMgmtDisable + LastWrite @@ -8634,6 +10588,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer DisableSafetyFilterOverride + LastWrite @@ -8660,6 +10615,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer DisableSafetyFilterOverrideForAppRepUnknown + LastWrite @@ -8686,6 +10642,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~DeleteBrowsingHistory RestrictHistory + LastWrite @@ -8712,6 +10669,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer AddonManagement_RestrictCrashDetection + LastWrite @@ -8738,10 +10696,11 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer SQM_DisableCEIP + LastWrite - DisableDeletingUserVisitedWebsites + DisableDeletingUserVisitedWebsites @@ -8764,6 +10723,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~DeleteBrowsingHistory DBHDisableDeleteHistory + LastWrite @@ -8790,6 +10750,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~RSS_Feeds Disable_Downloading_of_Enclosures + LastWrite @@ -8816,6 +10777,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage Advanced_SetWinInetProtocols + LastWrite @@ -8842,6 +10804,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer NoFirstRunCustomise + LastWrite @@ -8868,6 +10831,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage Advanced_DisableFlipAhead + LastWrite @@ -8894,6 +10858,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer RestrictHomePage + LastWrite @@ -8920,6 +10885,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL NoCertError + LastWrite @@ -8946,6 +10912,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~CategoryPrivacy DisableInPrivateBrowsing + LastWrite @@ -8972,6 +10939,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage Advanced_EnableEnhancedProtectedMode64Bit + LastWrite @@ -8998,6 +10966,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer RestrictProxy + LastWrite @@ -9024,6 +10993,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer NoSearchProvider + LastWrite @@ -9050,6 +11020,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer SecondaryHomePages + LastWrite @@ -9076,6 +11047,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer Disable_Security_Settings_Check + LastWrite @@ -9102,6 +11074,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage Advanced_DisableEPMCompat + LastWrite @@ -9128,6 +11101,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement VerMgmtDisable + LastWrite @@ -9154,6 +11128,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement VerMgmtDomainAllowlist + LastWrite @@ -9180,6 +11155,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_IncludeUnspecifiedLocalSites + LastWrite @@ -9206,6 +11182,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_UNCAsIntranet + LastWrite @@ -9232,6 +11209,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyAccessDataSourcesAcrossDomains_1 + LastWrite @@ -9258,6 +11236,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyNotificationBarActiveXURLaction_1 + LastWrite @@ -9284,6 +11263,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyNotificationBarDownloadURLaction_1 + LastWrite @@ -9310,6 +11290,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyAllowPasteViaScript_1 + LastWrite @@ -9336,6 +11317,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyDropOrPasteFiles_1 + LastWrite @@ -9362,6 +11344,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyFontDownload_1 + LastWrite @@ -9388,10 +11371,11 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyZoneElevationURLaction_1 + LastWrite - InternetZoneAllowLoadingOfXAMLFilesWRONG + InternetZoneAllowLoadingOfXAMLFiles @@ -9414,6 +11398,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_Policy_XAML_1 + LastWrite @@ -9440,6 +11425,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyUnsignedFrameworkComponentsURLaction_1 + LastWrite @@ -9464,8 +11450,9 @@ The XML below is the DDF for Windows 10, version 1709. phone inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone - IZ_PolicyOnlyAllowApprovedDomainsToUseActiveXWithoutPrompt_Both_Intranet + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyOnlyAllowApprovedDomainsToUseActiveXWithoutPrompt_Both_Internet + LastWrite @@ -9490,8 +11477,9 @@ The XML below is the DDF for Windows 10, version 1709. phone inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone - IZ_PolicyAllowTDCControl_Both_LocalMachine + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyAllowTDCControl_Both_Internet + LastWrite @@ -9518,6 +11506,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_Policy_WebBrowserControl_1 + LastWrite @@ -9542,8 +11531,9 @@ The XML below is the DDF for Windows 10, version 1709. phone inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown - IZ_PolicyWindowsRestrictionsURLaction_6 + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyWindowsRestrictionsURLaction_1 + LastWrite @@ -9570,6 +11560,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_Policy_AllowScriptlets_1 + LastWrite @@ -9596,6 +11587,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_Policy_Phishing_1 + LastWrite @@ -9622,6 +11614,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_Policy_ScriptStatusBar_1 + LastWrite @@ -9648,10 +11641,11 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyUserdataPersistence_1 + LastWrite - InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG1 + InternetZoneDoNotRunAntimalwareAgainstActiveXControls @@ -9674,32 +11668,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyAntiMalwareCheckingOfActiveXControls_1 - - - - InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG2 - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone - IZ_PolicyAntiMalwareCheckingOfActiveXControls_3 + LastWrite @@ -9724,8 +11693,9 @@ The XML below is the DDF for Windows 10, version 1709. phone inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone - IZ_PolicyDownloadSignedActiveX_3 + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyDownloadSignedActiveX_1 + LastWrite @@ -9752,6 +11722,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyDownloadUnsignedActiveX_1 + LastWrite @@ -9776,8 +11747,9 @@ The XML below is the DDF for Windows 10, version 1709. phone inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone - IZ_PolicyTurnOnXSSFilter_Both_LocalMachine + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyTurnOnXSSFilter_Both_Internet + LastWrite @@ -9804,6 +11776,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyDragDropAcrossDomainsAcrossWindows_Both_Internet + LastWrite @@ -9830,6 +11803,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyDragDropAcrossDomainsWithinWindow_Both_Internet + LastWrite @@ -9856,6 +11830,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyMimeSniffingURLaction_1 + LastWrite @@ -9880,8 +11855,9 @@ The XML below is the DDF for Windows 10, version 1709. phone inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown - IZ_Policy_TurnOnProtectedMode_2 + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_Policy_TurnOnProtectedMode_1 + LastWrite @@ -9908,6 +11884,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_Policy_LocalPathForUpload_1 + LastWrite @@ -9934,36 +11911,11 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyScriptActiveXNotMarkedSafe_1 + LastWrite - InternetZoneInitializeAndScriptActiveXControlsNotMarkedSafe - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone - IZ_PolicyScriptActiveXNotMarkedSafe_1 - - - - InternetZoneJavaPermissionsWRONG1 + InternetZoneJavaPermissions @@ -9986,32 +11938,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyJavaPermissions_1 - - - - InternetZoneJavaPermissionsWRONG2 - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone - IZ_PolicyJavaPermissions_3 + LastWrite @@ -10038,6 +11965,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyLaunchAppsAndFilesInIFRAME_1 + LastWrite @@ -10064,6 +11992,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyLogon_1 + LastWrite @@ -10090,6 +12019,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyNavigateSubframesAcrossDomains_1 + LastWrite @@ -10116,6 +12046,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyUnsignedFrameworkComponentsURLaction_1 + LastWrite @@ -10142,6 +12073,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicySignedFrameworkComponentsURLaction_1 + LastWrite @@ -10168,6 +12100,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_Policy_UnsafeFiles_1 + LastWrite @@ -10194,6 +12127,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyBlockPopupWindows_1 + LastWrite @@ -10220,6 +12154,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyZoneElevationURLaction_1 + LastWrite @@ -10246,6 +12181,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyAccessDataSourcesAcrossDomains_3 + LastWrite @@ -10272,6 +12208,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyNotificationBarActiveXURLaction_3 + LastWrite @@ -10298,6 +12235,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyNotificationBarDownloadURLaction_3 + LastWrite @@ -10324,6 +12262,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyFontDownload_3 + LastWrite @@ -10350,6 +12289,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyZoneElevationURLaction_3 + LastWrite @@ -10376,6 +12316,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyUnsignedFrameworkComponentsURLaction_3 + LastWrite @@ -10402,6 +12343,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_Policy_AllowScriptlets_3 + LastWrite @@ -10428,6 +12370,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_Policy_Phishing_3 + LastWrite @@ -10454,6 +12397,34 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyUserdataPersistence_3 + LastWrite + + + + IntranetZoneDoNotRunAntimalwareAgainstActiveXControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone + IZ_PolicyAntiMalwareCheckingOfActiveXControls_3 + LastWrite @@ -10480,6 +12451,61 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyScriptActiveXNotMarkedSafe_3 + LastWrite + + + + IntranetZoneInitializeAndScriptActiveXControlsNotMarkedSafe + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone + IZ_PolicyScriptActiveXNotMarkedSafe_3 + LastWrite + + + + IntranetZoneJavaPermissions + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone + IZ_PolicyJavaPermissions_3 + LastWrite @@ -10506,6 +12532,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyNavigateSubframesAcrossDomains_3 + LastWrite @@ -10532,6 +12559,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyAccessDataSourcesAcrossDomains_9 + LastWrite @@ -10558,6 +12586,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyNotificationBarActiveXURLaction_9 + LastWrite @@ -10584,6 +12613,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyNotificationBarDownloadURLaction_9 + LastWrite @@ -10610,6 +12640,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyFontDownload_9 + LastWrite @@ -10636,6 +12667,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyZoneElevationURLaction_9 + LastWrite @@ -10662,6 +12694,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyUnsignedFrameworkComponentsURLaction_9 + LastWrite @@ -10688,6 +12721,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_Policy_AllowScriptlets_9 + LastWrite @@ -10714,6 +12748,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_Policy_Phishing_9 + LastWrite @@ -10740,6 +12775,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyUserdataPersistence_9 + LastWrite @@ -10764,8 +12800,9 @@ The XML below is the DDF for Windows 10, version 1709. phone inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone~IZ_LocalMachineZone + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyAntiMalwareCheckingOfActiveXControls_9 + LastWrite @@ -10792,6 +12829,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyScriptActiveXNotMarkedSafe_9 + LastWrite @@ -10818,6 +12856,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyJavaPermissions_9 + LastWrite @@ -10844,6 +12883,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyNavigateSubframesAcrossDomains_9 + LastWrite @@ -10870,6 +12910,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyAccessDataSourcesAcrossDomains_2 + LastWrite @@ -10896,6 +12937,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyNotificationBarActiveXURLaction_2 + LastWrite @@ -10922,6 +12964,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyNotificationBarDownloadURLaction_2 + LastWrite @@ -10948,6 +12991,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyFontDownload_2 + LastWrite @@ -10974,6 +13018,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyZoneElevationURLaction_2 + LastWrite @@ -11000,6 +13045,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyUnsignedFrameworkComponentsURLaction_2 + LastWrite @@ -11026,6 +13072,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_Policy_AllowScriptlets_2 + LastWrite @@ -11052,6 +13099,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_Policy_Phishing_2 + LastWrite @@ -11078,6 +13126,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyUserdataPersistence_2 + LastWrite @@ -11104,6 +13153,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyScriptActiveXNotMarkedSafe_2 + LastWrite @@ -11130,6 +13180,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyJavaPermissions_2 + LastWrite @@ -11156,6 +13207,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyNavigateSubframesAcrossDomains_2 + LastWrite @@ -11182,6 +13234,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyAccessDataSourcesAcrossDomains_4 + LastWrite @@ -11208,6 +13261,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyNotificationBarActiveXURLaction_4 + LastWrite @@ -11234,6 +13288,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyNotificationBarDownloadURLaction_4 + LastWrite @@ -11260,6 +13315,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyFontDownload_4 + LastWrite @@ -11286,6 +13342,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyZoneElevationURLaction_4 + LastWrite @@ -11312,6 +13369,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyUnsignedFrameworkComponentsURLaction_4 + LastWrite @@ -11338,6 +13396,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_Policy_AllowScriptlets_4 + LastWrite @@ -11364,6 +13423,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_Policy_Phishing_4 + LastWrite @@ -11390,6 +13450,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyUserdataPersistence_4 + LastWrite @@ -11416,6 +13477,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyScriptActiveXNotMarkedSafe_4 + LastWrite @@ -11442,6 +13504,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyNavigateSubframesAcrossDomains_4 + LastWrite @@ -11468,6 +13531,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyAccessDataSourcesAcrossDomains_10 + LastWrite @@ -11494,6 +13558,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyNotificationBarActiveXURLaction_10 + LastWrite @@ -11520,6 +13585,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyNotificationBarDownloadURLaction_10 + LastWrite @@ -11546,6 +13612,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyFontDownload_10 + LastWrite @@ -11572,6 +13639,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyZoneElevationURLaction_10 + LastWrite @@ -11598,6 +13666,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyUnsignedFrameworkComponentsURLaction_10 + LastWrite @@ -11624,6 +13693,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_Policy_AllowScriptlets_10 + LastWrite @@ -11650,6 +13720,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_Policy_Phishing_10 + LastWrite @@ -11676,6 +13747,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyUserdataPersistence_10 + LastWrite @@ -11702,6 +13774,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyScriptActiveXNotMarkedSafe_10 + LastWrite @@ -11728,6 +13801,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyJavaPermissions_10 + LastWrite @@ -11754,6 +13828,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyNavigateSubframesAcrossDomains_10 + LastWrite @@ -11780,6 +13855,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyAccessDataSourcesAcrossDomains_8 + LastWrite @@ -11806,6 +13882,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyNotificationBarActiveXURLaction_8 + LastWrite @@ -11832,6 +13909,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyNotificationBarDownloadURLaction_8 + LastWrite @@ -11858,6 +13936,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyFontDownload_8 + LastWrite @@ -11884,6 +13963,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyZoneElevationURLaction_8 + LastWrite @@ -11910,6 +13990,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyUnsignedFrameworkComponentsURLaction_8 + LastWrite @@ -11936,6 +14017,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_Policy_AllowScriptlets_8 + LastWrite @@ -11962,6 +14044,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_Policy_Phishing_8 + LastWrite @@ -11988,6 +14071,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyUserdataPersistence_8 + LastWrite @@ -12014,6 +14098,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyScriptActiveXNotMarkedSafe_8 + LastWrite @@ -12040,6 +14125,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyJavaPermissions_8 + LastWrite @@ -12066,6 +14152,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyNavigateSubframesAcrossDomains_8 + LastWrite @@ -12092,6 +14179,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyAccessDataSourcesAcrossDomains_6 + LastWrite @@ -12118,6 +14206,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyNotificationBarActiveXURLaction_6 + LastWrite @@ -12144,6 +14233,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyNotificationBarDownloadURLaction_6 + LastWrite @@ -12170,6 +14260,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyFontDownload_6 + LastWrite @@ -12196,6 +14287,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyZoneElevationURLaction_6 + LastWrite @@ -12222,6 +14314,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyUnsignedFrameworkComponentsURLaction_6 + LastWrite @@ -12248,6 +14341,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_Policy_AllowScriptlets_6 + LastWrite @@ -12274,6 +14368,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_Policy_Phishing_6 + LastWrite @@ -12300,6 +14395,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyUserdataPersistence_6 + LastWrite @@ -12326,6 +14422,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyScriptActiveXNotMarkedSafe_6 + LastWrite @@ -12352,6 +14449,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyJavaPermissions_6 + LastWrite @@ -12378,6 +14476,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyNavigateSubframesAcrossDomains_6 + LastWrite @@ -12404,6 +14503,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryMimeSniffingSafetyFeature IESF_PolicyExplorerProcesses_6 + LastWrite @@ -12430,6 +14530,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryMKProtocolSecurityRestriction IESF_PolicyExplorerProcesses_3 + LastWrite @@ -12456,6 +14557,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryInformationBar IESF_PolicyExplorerProcesses_10 + LastWrite @@ -12480,8 +14582,9 @@ The XML below is the DDF for Windows 10, version 1709. phone inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone - IZ_PolicyDownloadSignedActiveX_1 + inetres~AT~WindowsComponents~InternetExplorer + Disable_Managing_Safety_Filter_IE9 + LastWrite @@ -12508,6 +14611,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer DisablePerUserActiveXInstall + LastWrite @@ -12534,6 +14638,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryProtectionFromZoneElevation IESF_PolicyAllProcesses_9 + LastWrite @@ -12560,6 +14665,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement VerMgmtDisableRunThisTime + LastWrite @@ -12586,6 +14692,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryRestrictActiveXInstall IESF_PolicyAllProcesses_11 + LastWrite @@ -12612,6 +14719,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyAccessDataSourcesAcrossDomains_7 + LastWrite @@ -12636,8 +14744,9 @@ The XML below is the DDF for Windows 10, version 1709. phone inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone - IZ_PolicyActiveScripting_1 + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyActiveScripting_7 + LastWrite @@ -12664,6 +14773,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyNotificationBarActiveXURLaction_7 + LastWrite @@ -12690,6 +14800,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyNotificationBarDownloadURLaction_7 + LastWrite @@ -12714,8 +14825,9 @@ The XML below is the DDF for Windows 10, version 1709. phone inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone - IZ_PolicyBinaryBehaviors_1 + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyBinaryBehaviors_7 + LastWrite @@ -12742,6 +14854,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyAllowPasteViaScript_7 + LastWrite @@ -12768,6 +14881,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyDropOrPasteFiles_7 + LastWrite @@ -12792,12 +14906,13 @@ The XML below is the DDF for Windows 10, version 1709. phone inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone - IZ_PolicyFileDownload_1 + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyFileDownload_7 + LastWrite - RestrictedSitesZoneAllowFontDownloadsWRONG1 + RestrictedSitesZoneAllowFontDownloads @@ -12820,32 +14935,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyFontDownload_7 - - - - RestrictedSitesZoneAllowFontDownloadsWRONG2 - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone - IZ_PolicyFontDownload_1 + LastWrite @@ -12872,6 +14962,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyZoneElevationURLaction_7 + LastWrite @@ -12898,6 +14989,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_Policy_XAML_7 + LastWrite @@ -12922,8 +15014,9 @@ The XML below is the DDF for Windows 10, version 1709. phone inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone - IZ_PolicyAllowMETAREFRESH_1 + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyAllowMETAREFRESH_7 + LastWrite @@ -12950,6 +15043,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyUnsignedFrameworkComponentsURLaction_7 + LastWrite @@ -12976,6 +15070,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyOnlyAllowApprovedDomainsToUseActiveXWithoutPrompt_Both_Restricted + LastWrite @@ -13002,6 +15097,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyAllowTDCControl_Both_Restricted + LastWrite @@ -13028,6 +15124,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_Policy_WebBrowserControl_7 + LastWrite @@ -13054,6 +15151,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyWindowsRestrictionsURLaction_7 + LastWrite @@ -13080,6 +15178,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_Policy_AllowScriptlets_7 + LastWrite @@ -13106,6 +15205,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_Policy_Phishing_7 + LastWrite @@ -13132,6 +15232,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_Policy_ScriptStatusBar_7 + LastWrite @@ -13158,6 +15259,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyUserdataPersistence_7 + LastWrite @@ -13184,6 +15286,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyAntiMalwareCheckingOfActiveXControls_7 + LastWrite @@ -13210,6 +15313,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyDownloadSignedActiveX_7 + LastWrite @@ -13236,6 +15340,34 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyDownloadUnsignedActiveX_7 + LastWrite + + + + RestrictedSitesZoneEnableCrossSiteScriptingFilter + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyTurnOnXSSFilter_Both_Restricted + LastWrite @@ -13262,6 +15394,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyDragDropAcrossDomainsAcrossWindows_Both_Restricted + LastWrite @@ -13288,6 +15421,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyDragDropAcrossDomainsWithinWindow_Both_Restricted + LastWrite @@ -13314,6 +15448,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyMimeSniffingURLaction_7 + LastWrite @@ -13340,6 +15475,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_Policy_LocalPathForUpload_7 + LastWrite @@ -13366,6 +15502,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyScriptActiveXNotMarkedSafe_7 + LastWrite @@ -13392,6 +15529,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyJavaPermissions_7 + LastWrite @@ -13418,6 +15556,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyLaunchAppsAndFilesInIFRAME_7 + LastWrite @@ -13444,6 +15583,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyLogon_7 + LastWrite @@ -13470,6 +15610,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyNavigateSubframesAcrossDomains_7 + LastWrite @@ -13494,8 +15635,9 @@ The XML below is the DDF for Windows 10, version 1709. phone inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone - IZ_PolicyNavigateSubframesAcrossDomains_1 + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyNavigateSubframesAcrossDomains_7 + LastWrite @@ -13520,8 +15662,9 @@ The XML below is the DDF for Windows 10, version 1709. phone inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone - IZ_PolicyRunActiveXControls_1 + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyRunActiveXControls_7 + LastWrite @@ -13548,6 +15691,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicySignedFrameworkComponentsURLaction_7 + LastWrite @@ -13572,12 +15716,13 @@ The XML below is the DDF for Windows 10, version 1709. phone inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone - IZ_PolicyScriptActiveXMarkedSafe_1 + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyScriptActiveXMarkedSafe_7 + LastWrite - RestrictedSitesZoneWRONG + RestrictedSitesZoneScriptingOfJavaApplets @@ -13598,12 +15743,13 @@ The XML below is the DDF for Windows 10, version 1709. phone inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown - IZ_PolicyScriptingOfJavaApplets_6 + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyScriptingOfJavaApplets_7 + LastWrite - RestrictedSitesZoneWRONG2 + RestrictedSitesZoneShowSecurityWarningForPotentiallyUnsafeFiles @@ -13626,10 +15772,11 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_Policy_UnsafeFiles_7 + LastWrite - RestrictedSitesZoneWRONG3 + RestrictedSitesZoneTurnOnCrossSiteScriptingFilter @@ -13652,10 +15799,11 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyTurnOnXSSFilter_Both_Restricted + LastWrite - RestrictedSitesZoneWRONG4 + RestrictedSitesZoneTurnOnProtectedMode @@ -13678,10 +15826,11 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_Policy_TurnOnProtectedMode_7 + LastWrite - RestrictedSitesZoneWRONG5 + RestrictedSitesZoneUsePopupBlocker @@ -13704,6 +15853,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyBlockPopupWindows_7 + LastWrite @@ -13730,6 +15880,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryRestrictFileDownload IESF_PolicyAllProcesses_12 + LastWrite @@ -13756,6 +15907,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryScriptedWindowSecurityRestrictions IESF_PolicyAllProcesses_8 + LastWrite @@ -13782,6 +15934,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer SpecificSearchProvider + LastWrite @@ -13808,6 +15961,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer OnlyUseAXISForActiveXInstall + LastWrite @@ -13834,6 +15988,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyAccessDataSourcesAcrossDomains_5 + LastWrite @@ -13860,6 +16015,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyNotificationBarActiveXURLaction_5 + LastWrite @@ -13886,6 +16042,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyNotificationBarDownloadURLaction_5 + LastWrite @@ -13912,6 +16069,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyFontDownload_5 + LastWrite @@ -13938,6 +16096,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyZoneElevationURLaction_5 + LastWrite @@ -13964,6 +16123,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyUnsignedFrameworkComponentsURLaction_5 + LastWrite @@ -13990,6 +16150,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_Policy_AllowScriptlets_5 + LastWrite @@ -14016,6 +16177,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_Policy_Phishing_5 + LastWrite @@ -14042,6 +16204,61 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyUserdataPersistence_5 + LastWrite + + + + TrustedSitesZoneDoNotRunAntimalwareAgainstActiveXControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone + IZ_PolicyAntiMalwareCheckingOfActiveXControls_5 + LastWrite + + + + TrustedSitesZoneDontRunAntimalwareProgramsAgainstActiveXControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone + IZ_PolicyAntiMalwareCheckingOfActiveXControls_5 + LastWrite @@ -14068,6 +16285,61 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyScriptActiveXNotMarkedSafe_5 + LastWrite + + + + TrustedSitesZoneInitializeAndScriptActiveXControlsNotMarkedAsSafe + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone + IZ_PolicyScriptActiveXNotMarkedSafe_5 + LastWrite + + + + TrustedSitesZoneInitializeAndScriptActiveXControlsNotMarkedSafe + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone + IZ_PolicyScriptActiveXNotMarkedSafe_5 + LastWrite @@ -14094,6 +16366,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyJavaPermissions_5 + LastWrite @@ -14120,58 +16393,7 @@ The XML below is the DDF for Windows 10, version 1709. inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyNavigateSubframesAcrossDomains_5 - - - - TrustedSitesZoneWRONG1 - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone - IZ_PolicyAntiMalwareCheckingOfActiveXControls_5 - - - - TrustedSitesZoneWRONG2 - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone - IZ_PolicyScriptActiveXNotMarkedSafe_5 + LastWrite @@ -14214,6 +16436,7 @@ The XML below is the DDF for Windows 10, version 1709. text/plain + LowestValueMostSecure @@ -14260,6 +16483,7 @@ The XML below is the DDF for Windows 10, version 1709. Printing.admx Printing~AT~ControlPanel~CplPrinters PointAndPrint_Restrictions + LastWrite @@ -14302,6 +16526,7 @@ The XML below is the DDF for Windows 10, version 1709. text/plain + LastWrite @@ -14345,6 +16570,7 @@ The XML below is the DDF for Windows 10, version 1709. text/plain phone + LastWrite @@ -14387,6 +16613,7 @@ The XML below is the DDF for Windows 10, version 1709. text/plain + LowestValueMostSecure @@ -14642,87 +16869,6 @@ The XML below is the DDF for Windows 10, version 1709. - - AccountPolicies - - - - - - - - - - - - - - - - - - - - - MinDevicePasswordLength - - - - - - - - This security setting determines the least number of characters that a password for a user account may contain. You can set a value of between 1 and 14 characters, or you can establish that no password is required by setting the number of characters to 0. - - - - - - - - - - - text/plain - - - - - PasswordMustMeetComplexityRequirement - - - - - - - - This security setting determines whether passwords must meet complexity requirements. - -If this policy is enabled, passwords must meet the following minimum requirements: - -Not contain the user's account name or parts of the user's full name that exceed two consecutive characters -Be at least six characters in length -Contain characters from three of the following four categories: -English uppercase characters (A through Z) -English lowercase characters (a through z) -Base 10 digits (0 through 9) -Non-alphabetic characters (for example, !, $, #, %) -Complexity requirements are enforced when passwords are changed or created. - - - - - - - - - - - text/plain - - - - Accounts @@ -15910,6 +18056,30 @@ Complexity requirements are enforced when passwords are changed or created. + + AllowAadPasswordReset + + + + + + + + Specifies whether password reset is enabled for AAD accounts. + + + + + + + + + + + text/plain + + + AllowFastReconnect @@ -16537,7 +18707,7 @@ Complexity requirements are enforced when passwords are changed or created. This policy setting lets you decide whether the Microsoft Compatibility List is enabled or disabled in Microsoft Edge. This feature uses a Microsoft-provided list to ensure that any sites with known compatibility issues are displayed correctly when a user navigates to them. By default, the Microsoft Compatibility List is enabled and can be viewed by navigating to about:compat. -If you enable or don’t configure this setting, Microsoft Edge will periodically download the latest version of the list from Microsoft and will apply the configurations specified there during browser navigation. If a user visits a site on the Microsoft Compatibility List, he or she will be prompted to open the site in Internet Explorer 11. Once in Internet Explorer, the site will automatically be rendered as if the user is viewing it in the previous version of Internet Explorer it requires to display correctly. +If you enable or don’t configure this setting, Microsoft Edge will periodically download the latest version of the list from Microsoft and will apply the configurations specified there during browser navigation. If a user visits a site on the Microsoft Compatibility List, he or she will be prompted to open the site in Internet Explorer 11. Once in Internet Explorer, the site will automatically be rendered as if the user is viewing it in the previous version of Internet Explorer it requires to display correctly. If you disable this setting, the Microsoft Compatibility List will not be used during browser navigation. @@ -16679,6 +18849,30 @@ This policy will only apply on domain joined machines or when the device is MDM + + AlwaysEnableBooksLibrary + + + + + + + + Specifies whether the Books Library in Microsoft Edge will always be visible regardless of the country or region setting for the device. + + + + + + + + + + + text/plain + + + ClearBrowsingDataOnExit @@ -16848,7 +19042,7 @@ Example: If you wanted to allow contoso.com and fabrikam.com then you would append /support to the site strings like contoso.com/support and fabrikam.com/support. Encapsulate each string with greater than and less than characters like any other XML tag. -Version 1703 or later:  If you don't want to send traffic to Microsoft, you can use the about:blank value (encapsulate with greater than and less than characters like any other XML tag), which is honored for both domain- and non-domain-joined machines, when it's the only configured URL. +Version 1703 or later:  If you don't want to send traffic to Microsoft, you can use the about:blank value (encapsulate with greater than and less than characters like any other XML tag), which is honored for both domain- and non-domain-joined machines, when it's the only configured URL. @@ -16863,6 +19057,37 @@ Version 1703 or later:  If you don't want to send traffic to Microsoft, yo + + LockdownFavorites + + + + + + + + This policy setting lets you decide whether employees can add, import, sort, or edit the Favorites list on Microsoft Edge. + +If you enable this setting, employees won't be able to add, import, or change anything in the Favorites list. Also as part of this, Save a Favorite, Import settings, and the context menu items (such as, Create a new folder) are all turned off. + +Important +Don't enable both this setting and the Keep favorites in sync between Internet Explorer and Microsoft Edge setting. Enabling both settings stops employees from syncing their favorites between Internet Explorer and Microsoft Edge. + +If you disable or don't configure this setting (default), employees can add, import and make changes to the Favorites list. + + + + + + + + + + + text/plain + + + PreventAccessToAboutFlagsInMicrosoftEdge @@ -17011,6 +19236,37 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + ProvisionFavorites + + + + + + + + This policy setting allows you to configure a default set of favorites, which will appear for employees. Employees cannot modify, sort, move, export or delete these provisioned favorites. + +If you enable this setting, you can set favorite URL's and favorite folders to appear on top of users' favorites list (either in the Hub or Favorites Bar). The user favorites will appear after these provisioned favorites. + +Important +Don't enable both this setting and the Keep favorites in sync between Internet Explorer and Microsoft Edge setting. Enabling both settings stops employees from syncing their favorites between Internet Explorer and Microsoft Edge. + +If you disable or don't configure this setting, employees will see the favorites they set in the Hub and Favorites Bar. + + + + + + + + + + + text/plain + + + SendIntranetTraffictoInternetExplorer @@ -17181,6 +19437,102 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + LetAppsAccessCellularData + + + + + + + + This policy setting specifies whether Windows apps can access cellular data. + + + + + + + + + + + text/plain + + + + + LetAppsAccessCellularData_ForceAllowTheseApps + + + + + + + + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to cellular data. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. + + + + + + + + + + + text/plain + + + + + LetAppsAccessCellularData_ForceDenyTheseApps + + + + + + + + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to cellular data. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. + + + + + + + + + + + text/plain + + + + + LetAppsAccessCellularData_UserInControlOfTheseApps + + + + + + + + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the cellular data access setting for the listed apps. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. + + + + + + + + + + + text/plain + + + ShowAppCellularAccessUI @@ -17633,6 +19985,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + EnableWindowsAutoPilotResetCredentials + + + + + + + + + + + + + + + + + + + text/plain + + + CredentialsUI @@ -18845,6 +21221,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + DOCacheHost + + + + + + + + + + + + + + + + + + + text/plain + + + DODownloadMode @@ -19520,7 +21920,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - Specifies how many passwords can be stored in the history that can’t be used. + Specifies how many passwords can be stored in the history that can’t be used. @@ -20468,6 +22868,52 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor + + ExploitGuard + + + + + + + + + + + + + + + + + + + + + ExploitProtectionSettings + + + + + + + + + + + + + + + + + + + text/plain + + + + Games @@ -20514,6 +22960,52 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor + + Handwriting + + + + + + + + + + + + + + + + + + + + + PanelDefaultModeDocked + + + + + + + + Specifies whether the handwriting panel comes up floating near the text box or attached to the bottom of the screen + + + + + + + + + + + text/plain + + + + InternetExplorer @@ -20752,7 +23244,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor - AllowInternetExplorer7PolicyList + AllowInternetExplorer7PolicyList @@ -21376,7 +23868,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor - DisableDeletingUserVisitedWebsites + DisableDeletingUserVisitedWebsites @@ -22024,7 +24516,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor - InternetZoneAllowLoadingOfXAMLFilesWRONG + InternetZoneAllowLoadingOfXAMLFiles @@ -22264,31 +24756,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor - InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG1 - - - - - - - - - - - - - - - - - - - text/plain - - - - - InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG2 + InternetZoneDoNotRunAntimalwareAgainstActiveXControls @@ -22528,55 +24996,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor - InternetZoneInitializeAndScriptActiveXControlsNotMarkedSafe - - - - - - - - - - - - - - - - - - - text/plain - - - - - InternetZoneJavaPermissionsWRONG1 - - - - - - - - - - - - - - - - - - - text/plain - - - - - InternetZoneJavaPermissionsWRONG2 + InternetZoneJavaPermissions @@ -23007,6 +25427,30 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor + + IntranetZoneDoNotRunAntimalwareAgainstActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + IntranetZoneInitializeAndScriptActiveXControls @@ -23031,6 +25475,54 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor + + IntranetZoneInitializeAndScriptActiveXControlsNotMarkedSafe + + + + + + + + + + + + + + + + + + + text/plain + + + + + IntranetZoneJavaPermissions + + + + + + + + + + + + + + + + + + + text/plain + + + IntranetZoneNavigateWindowsAndFrames @@ -25168,31 +27660,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor - RestrictedSitesZoneAllowFontDownloadsWRONG1 - - - - - - - - - - - - - - - - - - - text/plain - - - - - RestrictedSitesZoneAllowFontDownloadsWRONG2 + RestrictedSitesZoneAllowFontDownloads @@ -25575,6 +28043,30 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor + + RestrictedSitesZoneEnableCrossSiteScriptingFilter + + + + + + + + + + + + + + + + + + + text/plain + + + RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindows @@ -25888,7 +28380,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor - RestrictedSitesZoneWRONG + RestrictedSitesZoneScriptingOfJavaApplets @@ -25912,7 +28404,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor - RestrictedSitesZoneWRONG2 + RestrictedSitesZoneShowSecurityWarningForPotentiallyUnsafeFiles @@ -25936,7 +28428,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor - RestrictedSitesZoneWRONG3 + RestrictedSitesZoneTurnOnCrossSiteScriptingFilter @@ -25960,7 +28452,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor - RestrictedSitesZoneWRONG4 + RestrictedSitesZoneTurnOnProtectedMode @@ -25984,7 +28476,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor - RestrictedSitesZoneWRONG5 + RestrictedSitesZoneUsePopupBlocker @@ -26080,7 +28572,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor - SecurityZonesUseOnlyMachineSettings + SecurityZonesUseOnlyMachineSettings @@ -26343,6 +28835,54 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor + + TrustedSitesZoneDoNotRunAntimalwareAgainstActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + TrustedSitesZoneDontRunAntimalwareProgramsAgainstActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + TrustedSitesZoneInitializeAndScriptActiveXControls @@ -26367,6 +28907,54 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor + + TrustedSitesZoneInitializeAndScriptActiveXControlsNotMarkedAsSafe + + + + + + + + + + + + + + + + + + + text/plain + + + + + TrustedSitesZoneInitializeAndScriptActiveXControlsNotMarkedSafe + + + + + + + + + + + + + + + + + + + text/plain + + + TrustedSitesZoneJavaPermissions @@ -26415,54 +29003,6 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor - - TrustedSitesZoneWRONG1 - - - - - - - - - - - - - - - - - - - text/plain - - - - - TrustedSitesZoneWRONG2 - - - - - - - - - - - - - - - - - - - text/plain - - - Kerberos @@ -26708,9 +29248,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor This policy setting prevents users from adding new Microsoft accounts on this computer. -If you select the "Users can’t add Microsoft accounts" option, users will not be able to create new Microsoft accounts on this computer, switch a local account to a Microsoft account, or connect a domain account to a Microsoft account. This is the preferred option if you need to limit the use of Microsoft accounts in your enterprise. +If you select the "Users can’t add Microsoft accounts" option, users will not be able to create new Microsoft accounts on this computer, switch a local account to a Microsoft account, or connect a domain account to a Microsoft account. This is the preferred option if you need to limit the use of Microsoft accounts in your enterprise. -If you select the "Users can’t add or log on with Microsoft accounts" option, existing Microsoft account users will not be able to log on to Windows. Selecting this option might make it impossible for an existing administrator on this computer to log on and manage the system. +If you select the "Users can’t add or log on with Microsoft accounts" option, existing Microsoft account users will not be able to log on to Windows. Selecting this option might make it impossible for an existing administrator on this computer to log on and manage the system. If you disable or do not configure this policy (recommended), users will be able to use Microsoft accounts with Windows. @@ -26883,6 +29423,130 @@ Default: Guest. + + Devices_AllowedToFormatAndEjectRemovableMedia + + + + + + + + Devices: Allowed to format and eject removable media + +This security setting determines who is allowed to format and eject removable NTFS media. This capability can be given to: + +Administrators +Administrators and Interactive Users + +Default: This policy is not defined and only Administrators have this ability. + + + + + + + + + + + text/plain + + + + + Devices_AllowUndockWithoutHavingToLogon + + + + + + + + Devices: Allow undock without having to log on +This security setting determines whether a portable computer can be undocked without having to log on. If this policy is enabled, logon is not required and an external hardware eject button can be used to undock the computer. If disabled, a user must log on and have the Remove computer from docking station privilege to undock the computer. +Default: Enabled. + +Caution +Disabling this policy may tempt users to try and physically remove the laptop from its docking station using methods other than the external hardware eject button. Since this may cause damage to the hardware, this setting, in general, should only be disabled on laptop configurations that are physically securable. + + + + + + + + + + + text/plain + + + + + Devices_PreventUsersFromInstallingPrinterDriversWhenConnectingToSharedPrinters + + + + + + + + Devices: Prevent users from installing printer drivers when connecting to shared printers + +For a computer to print to a shared printer, the driver for that shared printer must be installed on the local computer. This security setting determines who is allowed to install a printer driver as part of connecting to a shared printer. If this setting is enabled, only Administrators can install a printer driver as part of connecting to a shared printer. If this setting is disabled, any user can install a printer driver as part of connecting to a shared printer. + +Default on servers: Enabled. +Default on workstations: Disabled + +Notes + +This setting does not affect the ability to add a local printer. +This setting does not affect Administrators. + + + + + + + + + + + text/plain + + + + + Devices_RestrictCDROMAccessToLocallyLoggedOnUserOnly + + + + + + + + Devices: Restrict CD-ROM access to locally logged-on user only + +This security setting determines whether a CD-ROM is accessible to both local and remote users simultaneously. + +If this policy is enabled, it allows only the interactively logged-on user to access removable CD-ROM media. If this policy is enabled and no one is logged on interactively, the CD-ROM can be accessed over the network. + +Default: This policy is not defined and CD-ROM access is not restricted to the locally logged-on user. + + + + + + + + + + + text/plain + + + InteractiveLogon_DisplayUserInformationWhenTheSessionIsLocked @@ -26911,7 +29575,7 @@ Do not display user information (3) - Interactivelogon_DoNotDisplayLastSignedIn + InteractiveLogon_DoNotDisplayLastSignedIn @@ -26941,7 +29605,7 @@ Default: Disabled. - Interactivelogon_DoNotDisplayUsernameAtSignIn + InteractiveLogon_DoNotDisplayUsernameAtSignIn @@ -26971,7 +29635,7 @@ Default: Disabled. - Interactivelogon_DoNotRequireCTRLALTDEL + InteractiveLogon_DoNotRequireCTRLALTDEL @@ -27233,6 +29897,39 @@ Default: This policy is not defined and automatic administrative logon is not al + + Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn + + + + + + + + Shutdown: Allow system to be shut down without having to log on + +This security setting determines whether a computer can be shut down without having to log on to Windows. + +When this policy is enabled, the Shut Down command is available on the Windows logon screen. + +When this policy is disabled, the option to shut down the computer does not appear on the Windows logon screen. In this case, users must be able to log on to the computer successfully and have the Shut down the system user right before they can perform a system shutdown. + +Default on workstations: Enabled. +Default on servers: Disabled. + + + + + + + + + + + text/plain + + + Shutdown_ClearVirtualMemoryPageFile @@ -27278,9 +29975,9 @@ Default: Disabled. This policy setting controls whether User Interface Accessibility (UIAccess or UIA) programs can automatically disable the secure desktop for elevation prompts used by a standard user. -• Enabled: UIA programs, including Windows Remote Assistance, automatically disable the secure desktop for elevation prompts. If you do not disable the "User Account Control: Switch to the secure desktop when prompting for elevation" policy setting, the prompts appear on the interactive user's desktop instead of the secure desktop. +• Enabled: UIA programs, including Windows Remote Assistance, automatically disable the secure desktop for elevation prompts. If you do not disable the "User Account Control: Switch to the secure desktop when prompting for elevation" policy setting, the prompts appear on the interactive user's desktop instead of the secure desktop. -• Disabled: (Default) The secure desktop can be disabled only by the user of the interactive desktop or by disabling the "User Account Control: Switch to the secure desktop when prompting for elevation" policy setting. +• Disabled: (Default) The secure desktop can be disabled only by the user of the interactive desktop or by disabling the "User Account Control: Switch to the secure desktop when prompting for elevation" policy setting. @@ -27310,17 +30007,17 @@ This policy setting controls the behavior of the elevation prompt for administra The options are: -• Elevate without prompting: Allows privileged accounts to perform an operation that requires elevation without requiring consent or credentials. Note: Use this option only in the most constrained environments. +• Elevate without prompting: Allows privileged accounts to perform an operation that requires elevation without requiring consent or credentials. Note: Use this option only in the most constrained environments. -• Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a privileged user name and password. If the user enters valid credentials, the operation continues with the user's highest available privilege. +• Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a privileged user name and password. If the user enters valid credentials, the operation continues with the user's highest available privilege. -• Prompt for consent on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege. +• Prompt for consent on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege. -• Prompt for credentials: When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. +• Prompt for credentials: When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. -• Prompt for consent: When an operation requires elevation of privilege, the user is prompted to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege. +• Prompt for consent: When an operation requires elevation of privilege, the user is prompted to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege. -• Prompt for consent for non-Windows binaries: (Default) When an operation for a non-Microsoft application requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege. +• Prompt for consent for non-Windows binaries: (Default) When an operation for a non-Microsoft application requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege. @@ -27349,11 +30046,43 @@ This policy setting controls the behavior of the elevation prompt for standard u The options are: -• Prompt for credentials: (Default) When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. +• Prompt for credentials: (Default) When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. -• Automatically deny elevation requests: When an operation requires elevation of privilege, a configurable access denied error message is displayed. An enterprise that is running desktops as standard user may choose this setting to reduce help desk calls. +• Automatically deny elevation requests: When an operation requires elevation of privilege, a configurable access denied error message is displayed. An enterprise that is running desktops as standard user may choose this setting to reduce help desk calls. -• Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a different user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. +• Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a different user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. + + + + + + + + + + + text/plain + + + + + UserAccountControl_DetectApplicationInstallationsAndPromptForElevation + + + + + + + + User Account Control: Detect application installations and prompt for elevation + +This policy setting controls the behavior of application installation detection for the computer. + +The options are: + +Enabled: (Default) When an application installation package is detected that requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. + +Disabled: Application installation packages are not detected and prompted for elevation. Enterprises that are running standard user desktops and use delegated installation technologies such as Group Policy Software Installation or Systems Management Server (SMS) should disable this policy setting. In this case, installer detection is unnecessary. @@ -27383,9 +30112,9 @@ This policy setting enforces public key infrastructure (PKI) signature checks fo The options are: -• Enabled: Enforces the PKI certification path validation for a given executable file before it is permitted to run. +• Enabled: Enforces the PKI certification path validation for a given executable file before it is permitted to run. -• Disabled: (Default) Does not enforce PKI certification path validation before a given executable file is permitted to run. +• Disabled: (Default) Does not enforce PKI certification path validation before a given executable file is permitted to run. @@ -27413,17 +30142,17 @@ The options are: This policy setting controls whether applications that request to run with a User Interface Accessibility (UIAccess) integrity level must reside in a secure location in the file system. Secure locations are limited to the following: -- …\Program Files\, including subfolders -- …\Windows\system32\ -- …\Program Files (x86)\, including subfolders for 64-bit versions of Windows +- …\Program Files\, including subfolders +- …\Windows\system32\ +- …\Program Files (x86)\, including subfolders for 64-bit versions of Windows Note: Windows enforces a public key infrastructure (PKI) signature check on any interactive application that requests to run with a UIAccess integrity level regardless of the state of this security setting. The options are: -• Enabled: (Default) If an application resides in a secure location in the file system, it runs only with UIAccess integrity. +• Enabled: (Default) If an application resides in a secure location in the file system, it runs only with UIAccess integrity. -• Disabled: An application runs with UIAccess integrity even if it does not reside in a secure location in the file system. +• Disabled: An application runs with UIAccess integrity even if it does not reside in a secure location in the file system. @@ -27453,9 +30182,9 @@ This policy setting controls the behavior of all User Account Control (UAC) poli The options are: -• Enabled: (Default) Admin Approval Mode is enabled. This policy must be enabled and related UAC policy settings must also be set appropriately to allow the built-in Administrator account and all other users who are members of the Administrators group to run in Admin Approval Mode. +• Enabled: (Default) Admin Approval Mode is enabled. This policy must be enabled and related UAC policy settings must also be set appropriately to allow the built-in Administrator account and all other users who are members of the Administrators group to run in Admin Approval Mode. -• Disabled: Admin Approval Mode and all related UAC policy settings are disabled. Note: If this policy setting is disabled, the Security Center notifies you that the overall security of the operating system has been reduced. +• Disabled: Admin Approval Mode and all related UAC policy settings are disabled. Note: If this policy setting is disabled, the Security Center notifies you that the overall security of the operating system has been reduced. @@ -27485,9 +30214,9 @@ This policy setting controls whether the elevation request prompt is displayed o The options are: -• Enabled: (Default) All elevation requests go to the secure desktop regardless of prompt behavior policy settings for administrators and standard users. +• Enabled: (Default) All elevation requests go to the secure desktop regardless of prompt behavior policy settings for administrators and standard users. -• Disabled: All elevation requests go to the interactive user's desktop. Prompt behavior policy settings for administrators and standard users are used. +• Disabled: All elevation requests go to the interactive user's desktop. Prompt behavior policy settings for administrators and standard users are used. @@ -27517,9 +30246,9 @@ This policy setting controls the behavior of Admin Approval Mode for the built-i The options are: -• Enabled: The built-in Administrator account uses Admin Approval Mode. By default, any operation that requires elevation of privilege will prompt the user to approve the operation. +• Enabled: The built-in Administrator account uses Admin Approval Mode. By default, any operation that requires elevation of privilege will prompt the user to approve the operation. -• Disabled: (Default) The built-in Administrator account runs all applications with full administrative privilege. +• Disabled: (Default) The built-in Administrator account runs all applications with full administrative privilege. @@ -27549,9 +30278,9 @@ This policy setting controls whether application write failures are redirected t The options are: -• Enabled: (Default) Application write failures are redirected at run time to defined user locations for both the file system and registry. +• Enabled: (Default) Application write failures are redirected at run time to defined user locations for both the file system and registry. -• Disabled: Applications that write data to protected locations fail. +• Disabled: Applications that write data to protected locations fail. @@ -28846,102 +31575,6 @@ The options are: - - LetAppsAccessCellularData - - - - - - - - This policy setting specifies whether Windows apps can access cellular data. - - - - - - - - - - - text/plain - - - - - LetAppsAccessCellularData_ForceAllowTheseApps - - - - - - - - List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to cellular data. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. - - - - - - - - - - - text/plain - - - - - LetAppsAccessCellularData_ForceDenyTheseApps - - - - - - - - List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to cellular data. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. - - - - - - - - - - - text/plain - - - - - LetAppsAccessCellularData_UserInControlOfTheseApps - - - - - - - - List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the cellular data privacy setting for the listed apps. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. - - - - - - - - - - - text/plain - - - LetAppsAccessContacts @@ -30199,7 +32832,7 @@ The options are: - This policy setting specifies whether Windows apps can sync with devices. + This policy setting specifies whether Windows apps can communicate with unpaired wireless devices. @@ -30223,7 +32856,7 @@ The options are: - List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will have access to sync with devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will be allowed to communicate with unpaired wireless devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. @@ -30247,7 +32880,7 @@ The options are: - List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will not have access to sync with devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will not be allowed to communicate with unpaired wireless devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. @@ -30271,7 +32904,7 @@ The options are: - List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the 'sync with devices' privacy setting for the listed apps. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the 'Communicate with unpaired wireless devices' privacy setting for the listed apps. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. @@ -31258,6 +33891,30 @@ The options are: + + AllowCloudSearch + + + + + + + + + + + + + + + + + + + text/plain + + + AllowIndexingEncryptedStoresOrItems @@ -32950,6 +35607,30 @@ The options are: + + AllowDiskHealthModelUpdates + + + + + + + + + + + + + + + + + + + text/plain + + + EnhancedStorageDevices @@ -33221,7 +35902,7 @@ The options are: - This policy setting lets you prevent apps and features from working with files on OneDrive. If you enable this policy setting: users can’t access OneDrive from the OneDrive app and file picker; Windows Store apps can’t access OneDrive using the WinRT API; OneDrive doesn’t appear in the navigation pane in File Explorer; OneDrive files aren’t kept in sync with the cloud; Users can’t automatically upload photos and videos from the camera roll folder. If you disable or do not configure this policy setting, apps and features can work with OneDrive file storage. + This policy setting lets you prevent apps and features from working with files on OneDrive. If you enable this policy setting: users can’t access OneDrive from the OneDrive app and file picker; Windows Store apps can’t access OneDrive using the WinRT API; OneDrive doesn’t appear in the navigation pane in File Explorer; OneDrive files aren’t kept in sync with the cloud; Users can’t automatically upload photos and videos from the camera roll folder. If you disable or do not configure this policy setting, apps and features can work with OneDrive file storage. @@ -33260,6 +35941,30 @@ The options are: + + FeedbackHubAlwaysSaveDiagnosticsLocally + + + + + + + + Diagnostic files created when a feedback is filed in the Feedback Hub app will always be saved locally. If this policy is not present or set to false, users will be presented with the option to save locally. The default is to not save locally. + + + + + + + + + + + text/plain + + + TelemetryProxy @@ -34070,6 +36775,30 @@ The options are: + + DisableDualScan + + + + + + + + Do not allow update deferral policies to cause scans against Windows Update + + + + + + + + + + + text/plain + + + EngagedRestartDeadline @@ -34239,7 +36968,7 @@ The options are: - ManageBuildPreview + ManagePreviewBuilds @@ -35739,6 +38468,7 @@ The options are: text/plain desktop + LowestValueMostSecure @@ -35761,6 +38491,7 @@ The options are: text/plain + LowestValueMostSecure @@ -35783,83 +38514,7 @@ The options are: text/plain - - - - - AccountPolicies - - - - - - - - - - - - - - - - - - - MinDevicePasswordLength - - - - - This security setting determines the least number of characters that a password for a user account may contain. You can set a value of between 1 and 14 characters, or you can establish that no password is required by setting the number of characters to 0. - 7 - - - - - - - - - - - text/plain - - phone - - - - PasswordMustMeetComplexityRequirement - - - - - This security setting determines whether passwords must meet complexity requirements. - -If this policy is enabled, passwords must meet the following minimum requirements: - -Not contain the user's account name or parts of the user's full name that exceed two consecutive characters -Be at least six characters in length -Contain characters from three of the following four categories: -English uppercase characters (A through Z) -English lowercase characters (a through z) -Base 10 digits (0 through 9) -Non-alphabetic characters (for example, !, $, #, %) -Complexity requirements are enforced when passwords are changed or created. - 0 - - - - - - - - - - - text/plain - - phone + LowestValueMostSecure @@ -35902,6 +38557,7 @@ Complexity requirements are enforced when passwords are changed or created. text/plain + LowestValueMostSecure @@ -35924,6 +38580,7 @@ Complexity requirements are enforced when passwords are changed or created. text/plain + LowestValueMostSecure @@ -35946,6 +38603,7 @@ Complexity requirements are enforced when passwords are changed or created. text/plain + LastWrite @@ -35968,6 +38626,7 @@ Complexity requirements are enforced when passwords are changed or created. text/plain + LastWrite @@ -36014,6 +38673,7 @@ Complexity requirements are enforced when passwords are changed or created.ActiveXInstallService.admx ActiveXInstallService~AT~WindowsComponents~AxInstSv ApprovedActiveXInstallSites + LastWrite @@ -36057,6 +38717,7 @@ Complexity requirements are enforced when passwords are changed or created.text/plain phone + LastWrite @@ -36099,6 +38760,7 @@ Complexity requirements are enforced when passwords are changed or created. text/plain + LowestValueMostSecure @@ -36121,6 +38783,7 @@ Complexity requirements are enforced when passwords are changed or created. text/plain + LowestValueMostSecure @@ -36143,6 +38806,7 @@ Complexity requirements are enforced when passwords are changed or created. text/plain + LowestValueMostSecure @@ -36166,6 +38830,7 @@ Complexity requirements are enforced when passwords are changed or created.text/plain phone + LowestValueMostSecure @@ -36188,6 +38853,7 @@ Complexity requirements are enforced when passwords are changed or created. text/plain + LowestValueMostSecure @@ -36211,6 +38877,7 @@ Complexity requirements are enforced when passwords are changed or created.text/plain desktop + LowestValueMostSecure @@ -36234,6 +38901,7 @@ Complexity requirements are enforced when passwords are changed or created.text/plain desktop + LastWrite @@ -36256,6 +38924,7 @@ Complexity requirements are enforced when passwords are changed or created. text/plain + LowestValueMostSecure @@ -36278,6 +38947,7 @@ Complexity requirements are enforced when passwords are changed or created. text/plain + LowestValueMostSecure @@ -36300,6 +38970,7 @@ Complexity requirements are enforced when passwords are changed or created. text/plain + LowestValueMostSecure @@ -36346,6 +39017,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx appv~AT~System~CAT_AppV EnableAppV + LastWrite @@ -36372,6 +39044,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx appv~AT~System~CAT_AppV~CAT_Virtualization Virtualization_JITVEnable + LastWrite @@ -36398,6 +39071,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx appv~AT~System~CAT_AppV~CAT_PackageManagement PackageManagement_AutoCleanupEnable + LastWrite @@ -36424,6 +39098,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx appv~AT~System~CAT_AppV~CAT_Scripting Scripting_Enable_Package_Scripts + LastWrite @@ -36450,6 +39125,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx appv~AT~System~CAT_AppV~CAT_Publishing Enable_Publishing_Refresh_UX + LastWrite @@ -36476,6 +39152,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx appv~AT~System~CAT_AppV~CAT_Reporting Reporting_Server_Policy + LastWrite @@ -36502,6 +39179,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx appv~AT~System~CAT_AppV~CAT_Integration Integration_Roaming_File_Exclusions + LastWrite @@ -36528,6 +39206,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx appv~AT~System~CAT_AppV~CAT_Integration Integration_Roaming_Registry_Exclusions + LastWrite @@ -36554,6 +39233,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx appv~AT~System~CAT_AppV~CAT_Streaming Steaming_Autoload + LastWrite @@ -36580,6 +39260,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx appv~AT~System~CAT_AppV~CAT_Client_Coexistence Client_Coexistence_Enable_Migration_mode + LastWrite @@ -36606,6 +39287,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx appv~AT~System~CAT_AppV~CAT_Integration Integration_Root_User + LastWrite @@ -36632,6 +39314,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx appv~AT~System~CAT_AppV~CAT_Integration Integration_Root_Global + LastWrite @@ -36658,6 +39341,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx appv~AT~System~CAT_AppV~CAT_Publishing Publishing_Server1_Policy + LastWrite @@ -36684,6 +39368,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx appv~AT~System~CAT_AppV~CAT_Publishing Publishing_Server2_Policy + LastWrite @@ -36710,6 +39395,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx appv~AT~System~CAT_AppV~CAT_Publishing Publishing_Server3_Policy + LastWrite @@ -36736,6 +39422,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx appv~AT~System~CAT_AppV~CAT_Publishing Publishing_Server4_Policy + LastWrite @@ -36762,6 +39449,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx appv~AT~System~CAT_AppV~CAT_Publishing Publishing_Server5_Policy + LastWrite @@ -36788,6 +39476,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx appv~AT~System~CAT_AppV~CAT_Streaming Streaming_Certificate_Filter_For_Client_SSL + LastWrite @@ -36814,6 +39503,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx appv~AT~System~CAT_AppV~CAT_Streaming Streaming_Allow_High_Cost_Launch + LastWrite @@ -36840,6 +39530,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx appv~AT~System~CAT_AppV~CAT_Streaming Streaming_Location_Provider + LastWrite @@ -36866,6 +39557,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx appv~AT~System~CAT_AppV~CAT_Streaming Streaming_Package_Installation_Root + LastWrite @@ -36892,6 +39584,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx appv~AT~System~CAT_AppV~CAT_Streaming Streaming_Package_Source_Root + LastWrite @@ -36918,6 +39611,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx appv~AT~System~CAT_AppV~CAT_Streaming Streaming_Reestablishment_Interval + LastWrite @@ -36944,6 +39638,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx appv~AT~System~CAT_AppV~CAT_Streaming Streaming_Reestablishment_Retries + LastWrite @@ -36970,6 +39665,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx appv~AT~System~CAT_AppV~CAT_Streaming Streaming_Shared_Content_Store_Mode + LastWrite @@ -36996,6 +39692,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx appv~AT~System~CAT_AppV~CAT_Streaming Streaming_Support_Branch_Cache + LastWrite @@ -37022,6 +39719,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx appv~AT~System~CAT_AppV~CAT_Streaming Streaming_Verify_Certificate_Revocation_List + LastWrite @@ -37048,6 +39746,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx appv~AT~System~CAT_AppV~CAT_Virtualization Virtualization_JITVAllowList + LastWrite @@ -37070,6 +39769,30 @@ Complexity requirements are enforced when passwords are changed or created. + + AllowAadPasswordReset + + + + + Specifies whether password reset is enabled for AAD accounts. + 0 + + + + + + + + + + + text/plain + + phone + LowestValueMostSecure + + AllowFastReconnect @@ -37090,6 +39813,7 @@ Complexity requirements are enforced when passwords are changed or created. text/plain + LowestValueMostSecure @@ -37113,6 +39837,7 @@ Complexity requirements are enforced when passwords are changed or created.text/plain phone + LowestValueMostSecure @@ -37135,6 +39860,7 @@ Complexity requirements are enforced when passwords are changed or created. text/plain + LowestValueMostSecure @@ -37181,6 +39907,7 @@ Complexity requirements are enforced when passwords are changed or created.AutoPlay.admx AutoPlay~AT~WindowsComponents~AutoPlay NoAutoplayfornonVolume + LastWrite @@ -37207,6 +39934,7 @@ Complexity requirements are enforced when passwords are changed or created.AutoPlay.admx AutoPlay~AT~WindowsComponents~AutoPlay NoAutorun + LastWrite @@ -37233,6 +39961,7 @@ Complexity requirements are enforced when passwords are changed or created.AutoPlay.admx AutoPlay~AT~WindowsComponents~AutoPlay Autorun + LastWrite @@ -37275,6 +40004,7 @@ Complexity requirements are enforced when passwords are changed or created. text/plain + LastWrite @@ -37317,6 +40047,7 @@ Complexity requirements are enforced when passwords are changed or created. text/plain + LowestValueMostSecure @@ -37339,6 +40070,7 @@ Complexity requirements are enforced when passwords are changed or created. text/plain + LowestValueMostSecure @@ -37361,6 +40093,7 @@ Complexity requirements are enforced when passwords are changed or created. text/plain + LowestValueMostSecure @@ -37383,6 +40116,7 @@ Complexity requirements are enforced when passwords are changed or created. text/plain + LastWrite @@ -37405,6 +40139,7 @@ Complexity requirements are enforced when passwords are changed or created. text/plain + LastWrite @@ -37448,6 +40183,7 @@ Complexity requirements are enforced when passwords are changed or created.text/plain phone + LowestValueMostSecure @@ -37470,6 +40206,7 @@ Complexity requirements are enforced when passwords are changed or created. text/plain + LowestValueMostSecure @@ -37493,6 +40230,7 @@ Complexity requirements are enforced when passwords are changed or created.text/plain desktop + LowestValueMostSecure @@ -37515,6 +40253,7 @@ Complexity requirements are enforced when passwords are changed or created. text/plain + LowestValueMostSecure @@ -37538,6 +40277,7 @@ Complexity requirements are enforced when passwords are changed or created.text/plain phone + LowestValueMostSecure @@ -37560,6 +40300,7 @@ Complexity requirements are enforced when passwords are changed or created. text/plain + LowestValueMostSecure @@ -37583,6 +40324,7 @@ Complexity requirements are enforced when passwords are changed or created.text/plain phone + LowestValueMostSecure @@ -37606,6 +40348,7 @@ Complexity requirements are enforced when passwords are changed or created.text/plain phone + HighestValueMostSecure @@ -37629,6 +40372,7 @@ Complexity requirements are enforced when passwords are changed or created.text/plain phone + HighestValueMostSecure @@ -37651,6 +40395,7 @@ Complexity requirements are enforced when passwords are changed or created. text/plain + LowestValueMostSecure @@ -37661,7 +40406,7 @@ Complexity requirements are enforced when passwords are changed or created. This policy setting lets you decide whether the Microsoft Compatibility List is enabled or disabled in Microsoft Edge. This feature uses a Microsoft-provided list to ensure that any sites with known compatibility issues are displayed correctly when a user navigates to them. By default, the Microsoft Compatibility List is enabled and can be viewed by navigating to about:compat. -If you enable or don’t configure this setting, Microsoft Edge will periodically download the latest version of the list from Microsoft and will apply the configurations specified there during browser navigation. If a user visits a site on the Microsoft Compatibility List, he or she will be prompted to open the site in Internet Explorer 11. Once in Internet Explorer, the site will automatically be rendered as if the user is viewing it in the previous version of Internet Explorer it requires to display correctly. +If you enable or don’t configure this setting, Microsoft Edge will periodically download the latest version of the list from Microsoft and will apply the configurations specified there during browser navigation. If a user visits a site on the Microsoft Compatibility List, he or she will be prompted to open the site in Internet Explorer 11. Once in Internet Explorer, the site will automatically be rendered as if the user is viewing it in the previous version of Internet Explorer it requires to display correctly. If you disable this setting, the Microsoft Compatibility List will not be used during browser navigation. 1 @@ -37677,6 +40422,7 @@ If you disable this setting, the Microsoft Compatibility List will not be used d text/plain + LowestValueMostSecure @@ -37699,6 +40445,7 @@ If you disable this setting, the Microsoft Compatibility List will not be used d text/plain + LowestValueMostSecure @@ -37722,6 +40469,7 @@ If you disable this setting, the Microsoft Compatibility List will not be used d text/plain phone + LowestValueMostSecure @@ -37749,6 +40497,7 @@ This policy will only apply on domain joined machines or when the device is MDM text/plain + LowestValueMostSecure @@ -37771,6 +40520,7 @@ This policy will only apply on domain joined machines or when the device is MDM text/plain + LowestValueMostSecure @@ -37793,6 +40543,30 @@ This policy will only apply on domain joined machines or when the device is MDM text/plain + LowestValueMostSecure + + + + AlwaysEnableBooksLibrary + + + + + Specifies whether the Books Library in Microsoft Edge will always be visible regardless of the country or region setting for the device. + 0 + + + + + + + + + + + text/plain + + LowestValueMostSecure @@ -37816,6 +40590,7 @@ This policy will only apply on domain joined machines or when the device is MDM text/plain phone + LowestValueMostSecure @@ -37844,6 +40619,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + LastWrite @@ -37872,6 +40648,7 @@ This setting can only be used with domain-joined or MDM-enrolled devices. For mo text/plain phone + LowestValueMostSecure @@ -37895,6 +40672,7 @@ This setting can only be used with domain-joined or MDM-enrolled devices. For mo text/plain phone + LastWrite @@ -37918,6 +40696,7 @@ This setting can only be used with domain-joined or MDM-enrolled devices. For mo text/plain phone + LastWrite @@ -37941,6 +40720,7 @@ This setting can only be used with domain-joined or MDM-enrolled devices. For mo text/plain desktop + LastWrite @@ -37954,7 +40734,7 @@ Example: If you wanted to allow contoso.com and fabrikam.com then you would append /support to the site strings like contoso.com/support and fabrikam.com/support. Encapsulate each string with greater than and less than characters like any other XML tag. -Version 1703 or later:  If you don't want to send traffic to Microsoft, you can use the about:blank value (encapsulate with greater than and less than characters like any other XML tag), which is honored for both domain- and non-domain-joined machines, when it's the only configured URL. +Version 1703 or later:  If you don't want to send traffic to Microsoft, you can use the about:blank value (encapsulate with greater than and less than characters like any other XML tag), which is honored for both domain- and non-domain-joined machines, when it's the only configured URL. @@ -37969,6 +40749,37 @@ Version 1703 or later:  If you don't want to send traffic to Microsoft, yo text/plain phone + LastWrite + + + + LockdownFavorites + + + + + This policy setting lets you decide whether employees can add, import, sort, or edit the Favorites list on Microsoft Edge. + +If you enable this setting, employees won't be able to add, import, or change anything in the Favorites list. Also as part of this, Save a Favorite, Import settings, and the context menu items (such as, Create a new folder) are all turned off. + +Important +Don't enable both this setting and the Keep favorites in sync between Internet Explorer and Microsoft Edge setting. Enabling both settings stops employees from syncing their favorites between Internet Explorer and Microsoft Edge. + +If you disable or don't configure this setting (default), employees can add, import and make changes to the Favorites list. + 0 + + + + + + + + + + + text/plain + + LowestValueMostSecure @@ -37991,6 +40802,7 @@ Version 1703 or later:  If you don't want to send traffic to Microsoft, yo text/plain + HighestValueMostSecure @@ -38016,6 +40828,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + HighestValueMostSecure @@ -38040,6 +40853,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + HighestValueMostSecure @@ -38062,6 +40876,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + HighestValueMostSecure @@ -38084,6 +40899,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + HighestValueMostSecure @@ -38106,6 +40922,37 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + HighestValueMostSecure + + + + ProvisionFavorites + + + + + This policy setting allows you to configure a default set of favorites, which will appear for employees. Employees cannot modify, sort, move, export or delete these provisioned favorites. + +If you enable this setting, you can set favorite URL's and favorite folders to appear on top of users' favorites list (either in the Hub or Favorites Bar). The user favorites will appear after these provisioned favorites. + +Important +Don't enable both this setting and the Keep favorites in sync between Internet Explorer and Microsoft Edge setting. Enabling both settings stops employees from syncing their favorites between Internet Explorer and Microsoft Edge. + +If you disable or don't configure this setting, employees will see the favorites they set in the Hub and Favorites Bar. + + + + + + + + + + + + text/plain + + LastWrite @@ -38129,6 +40976,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + HighestValueMostSecure @@ -38157,6 +41005,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + LastWrite @@ -38180,6 +41029,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + HighestValueMostSecure @@ -38203,6 +41053,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LowestValueMostSecure @@ -38245,6 +41096,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + LowestValueMostSecure @@ -38267,6 +41119,101 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + LetAppsAccessCellularData + + + + + This policy setting specifies whether Windows apps can access cellular data. + 0 + + + + + + + + + + + text/plain + + HighestValueMostSecure + + + + LetAppsAccessCellularData_ForceAllowTheseApps + + + + + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to cellular data. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. + + + + + + + + + + + + text/plain + + LastWrite + ; + + + + LetAppsAccessCellularData_ForceDenyTheseApps + + + + + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to cellular data. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. + + + + + + + + + + + + text/plain + + LastWrite + ; + + + + LetAppsAccessCellularData_UserInControlOfTheseApps + + + + + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the cellular data access setting for the listed apps. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. + + + + + + + + + + + + text/plain + + LastWrite + ; + + ShowAppCellularAccessUI @@ -38290,6 +41237,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on wwansvc.admx wwansvc~AT~Network~WwanSvc_Category~UISettings_Category ShowAppCellularAccessUI + LastWrite @@ -38332,6 +41280,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + LowestValueMostSecure @@ -38354,6 +41303,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + LowestValueMostSecure @@ -38376,6 +41326,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + LowestValueMostSecure @@ -38398,6 +41349,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + LowestValueMostSecure @@ -38421,6 +41373,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain desktop + LowestValueMostSecure @@ -38444,6 +41397,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain desktop + LowestValueMostSecure @@ -38466,6 +41420,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + LowestValueMostSecure @@ -38488,6 +41443,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + LowestValueMostSecure @@ -38514,6 +41470,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on ICM.admx ICM~AT~System~InternetManagement~InternetManagement_Settings DisableHTTPPrinting_2 + LastWrite @@ -38540,6 +41497,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on ICM.admx ICM~AT~System~InternetManagement~InternetManagement_Settings DisableWebPnPDownload_2 + LastWrite @@ -38566,6 +41524,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on ICM.admx ICM~AT~System~InternetManagement~InternetManagement_Settings ShellPreventWPWDownload_2 + LastWrite @@ -38588,6 +41547,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + HighestValueMostSecure @@ -38614,6 +41574,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on networkprovider.admx NetworkProvider~AT~Network~Cat_NetworkProvider Pol_HardenedPaths + LastWrite @@ -38640,6 +41601,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on NetworkConnections.admx NetworkConnections~AT~Network~NetworkConnections NC_AllowNetBridge_NLA + LastWrite @@ -38686,6 +41648,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on credentialproviders.admx CredentialProviders~AT~System~Logon AllowDomainPINLogon + LastWrite @@ -38712,6 +41675,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on credentialproviders.admx CredentialProviders~AT~System~Logon BlockDomainPicturePassword + LastWrite + + + + EnableWindowsAutoPilotResetCredentials + + + + + + 0 + + + + + + + + + + + text/plain + + LowestValueMostSecure @@ -38758,6 +41745,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on credui.admx CredUI~AT~WindowsComponents~CredUI DisablePasswordReveal + LastWrite @@ -38784,6 +41772,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on credui.admx CredUI~AT~WindowsComponents~CredUI EnumerateAdministrators + LastWrite @@ -38826,6 +41815,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + LastWrite @@ -38848,6 +41838,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + LastWrite @@ -38890,6 +41881,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + LowestValueMostSecure @@ -38912,6 +41904,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + LastWrite @@ -38957,6 +41950,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on wwansvc.admx wwansvc~AT~Network~WwanSvc_Category~NetworkCost_Category SetCost3G + LastWrite @@ -38982,6 +41976,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on wwansvc.admx wwansvc~AT~Network~WwanSvc_Category~NetworkCost_Category SetCost4G + LastWrite @@ -39025,6 +42020,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + HighestValueMostSecure @@ -39048,6 +42044,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + HighestValueMostSecure @@ -39071,6 +42068,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + HighestValueMostSecure @@ -39094,6 +42092,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + HighestValueMostSecure @@ -39117,6 +42116,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + HighestValueMostSecure @@ -39140,6 +42140,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + HighestValueMostSecure @@ -39163,6 +42164,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + HighestValueMostSecure @@ -39186,6 +42188,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + HighestValueMostSecure @@ -39209,6 +42212,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + HighestValueMostSecure @@ -39232,6 +42236,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + HighestValueMostSecure @@ -39255,6 +42260,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + HighestValueMostSecure @@ -39278,6 +42284,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + HighestValueMostSecure @@ -39301,6 +42308,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LastWrite @@ -39324,6 +42332,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LastWrite @@ -39347,6 +42356,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LastWrite @@ -39370,6 +42380,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LastWrite @@ -39393,6 +42404,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LastWrite @@ -39416,6 +42428,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LastWrite @@ -39439,6 +42452,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LastWrite @@ -39462,6 +42476,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LastWrite @@ -39485,6 +42500,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LastWrite @@ -39508,6 +42524,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LastWrite @@ -39531,6 +42548,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LastWrite @@ -39554,6 +42572,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LastWrite @@ -39577,6 +42596,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LastWrite @@ -39600,6 +42620,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LastWrite @@ -39623,6 +42644,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LastWrite @@ -39646,6 +42668,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LowestValueMostSecure @@ -39669,6 +42692,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LastWrite @@ -39692,6 +42716,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LastWrite @@ -39715,6 +42740,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LastWrite @@ -39738,6 +42764,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LastWrite @@ -39761,6 +42788,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LastWrite @@ -39784,6 +42812,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + HighestValueMostSecure @@ -39807,6 +42836,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LastWrite @@ -39850,6 +42880,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LastWrite @@ -39873,6 +42904,31 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LowestValueMostSecure + + + + DOCacheHost + + + + + + + + + + + + + + + + + text/plain + + phone + LastWrite @@ -39896,6 +42952,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LastWrite @@ -39919,6 +42976,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LastWrite @@ -39942,6 +43000,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LastWrite @@ -39965,6 +43024,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LastWrite @@ -39988,6 +43048,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LastWrite @@ -40011,6 +43072,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LastWrite @@ -40034,6 +43096,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LastWrite @@ -40057,6 +43120,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LastWrite @@ -40080,6 +43144,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LastWrite @@ -40103,6 +43168,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LastWrite @@ -40126,6 +43192,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LastWrite @@ -40149,6 +43216,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LastWrite @@ -40172,6 +43240,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LastWrite @@ -40195,6 +43264,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LastWrite @@ -40238,6 +43308,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + HighestValueMostSecure @@ -40261,6 +43332,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LowestValueMostSecureZeroHasNoLimits @@ -40284,6 +43356,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + HighestValueMostSecure @@ -40330,6 +43403,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on deviceinstallation.admx DeviceInstallation~AT~System~DeviceInstall_Category~DeviceInstall_Restrictions_Category DeviceInstall_IDs_Deny + LastWrite @@ -40356,6 +43430,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on deviceinstallation.admx DeviceInstallation~AT~System~DeviceInstall_Category~DeviceInstall_Restrictions_Category DeviceInstall_Classes_Deny + LastWrite @@ -40399,6 +43474,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain desktop + LowestValueMostSecure @@ -40421,6 +43497,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + LastWrite @@ -40443,6 +43520,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + LowestValueMostSecure @@ -40465,6 +43543,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + LowestValueMostSecure @@ -40487,6 +43566,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + LowestValueMostSecure @@ -40509,6 +43589,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + LowestValueMostSecureZeroHasNoLimits @@ -40517,7 +43598,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - Specifies how many passwords can be stored in the history that can’t be used. + Specifies how many passwords can be stored in the history that can’t be used. 0 @@ -40531,6 +43612,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + HighestValueMostSecure @@ -40554,6 +43636,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain phone + LastWrite @@ -40576,6 +43659,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + LastWrite @@ -40598,6 +43682,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + LowestValueMostSecureZeroHasNoLimits @@ -40620,6 +43705,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + LowestValueMostSecureZeroHasNoLimits @@ -40643,6 +43729,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain desktop + LowestValueMostSecure @@ -40665,6 +43752,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + HighestValueMostSecure @@ -40687,6 +43775,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + HighestValueMostSecureZeroHasNoLimits @@ -40714,6 +43803,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain phone + HighestValueMostSecure @@ -40740,6 +43830,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor ControlPanelDisplay.admx ControlPanelDisplay~AT~ControlPanel~Personalization CPL_Personalization_NoLockScreenSlideshow + LastWrite @@ -40762,6 +43853,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain + LastWrite @@ -40805,6 +43897,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain phone + LastWrite @@ -40828,6 +43921,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain phone + LastWrite @@ -40874,6 +43968,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor ErrorReporting.admx ErrorReporting~AT~WindowsComponents~CAT_WindowsErrorReporting WerConsentCustomize_2 + LastWrite @@ -40900,6 +43995,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor ErrorReporting.admx ErrorReporting~AT~WindowsComponents~CAT_WindowsErrorReporting WerDisable_2 + LastWrite @@ -40926,6 +44022,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor ErrorReporting.admx ErrorReporting~AT~WindowsComponents~CAT_WindowsErrorReporting PCH_ShowUI + LastWrite @@ -40952,6 +44049,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor ErrorReporting.admx ErrorReporting~AT~WindowsComponents~CAT_WindowsErrorReporting WerNoSecondLevelData_2 + LastWrite @@ -40978,6 +44076,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor ErrorReporting.admx ErrorReporting~AT~WindowsComponents~CAT_WindowsErrorReporting WerDoNotShowUI + LastWrite @@ -41024,6 +44123,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor eventlog.admx EventLog~AT~WindowsComponents~EventLogCategory~EventLog_Application Channel_Log_Retention_1 + LastWrite @@ -41050,6 +44150,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor eventlog.admx EventLog~AT~WindowsComponents~EventLogCategory~EventLog_Application Channel_LogMaxSize_1 + LastWrite @@ -41076,6 +44177,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor eventlog.admx EventLog~AT~WindowsComponents~EventLogCategory~EventLog_Security Channel_LogMaxSize_2 + LastWrite @@ -41102,6 +44204,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor eventlog.admx EventLog~AT~WindowsComponents~EventLogCategory~EventLog_System Channel_LogMaxSize_4 + LastWrite @@ -41145,6 +44248,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain desktop + LowestValueMostSecure @@ -41167,6 +44271,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain + LowestValueMostSecure @@ -41189,6 +44294,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain + LowestValueMostSecure @@ -41211,6 +44317,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain + LowestValueMostSecure @@ -41233,6 +44340,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain + LowestValueMostSecure @@ -41255,6 +44363,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain + LowestValueMostSecure @@ -41277,6 +44386,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain + LowestValueMostSecure @@ -41299,6 +44409,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain + LowestValueMostSecure @@ -41321,6 +44432,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain + HighestValueMostSecure @@ -41343,6 +44455,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain + LowestValueMostSecure @@ -41366,6 +44479,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain desktop + LowestValueMostSecure @@ -41389,6 +44503,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain desktop + LowestValueMostSecure @@ -41412,6 +44527,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain phone + LowestValueMostSecure @@ -41434,6 +44550,50 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain + HighestValueMostSecure + + + + + ExploitGuard + + + + + + + + + + + + + + + + + + + ExploitProtectionSettings + + + + + + + + + + + + + + + + + text/plain + + LastWrite @@ -41476,6 +44636,51 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain + LowestValueMostSecure + + + + + Handwriting + + + + + + + + + + + + + + + + + + + PanelDefaultModeDocked + + + + + Specifies whether the handwriting panel comes up floating near the text box or attached to the bottom of the screen + 0 + + + + + + + + + + + text/plain + + phone + LowestValueMostSecure @@ -41522,6 +44727,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer AddSearchProvider + LastWrite @@ -41548,6 +44754,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer TurnOnActiveXFiltering + LastWrite @@ -41574,6 +44781,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement AddonManagement_AddOnList + LastWrite @@ -41600,6 +44808,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyWarnCertMismatch + LastWrite @@ -41626,6 +44835,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~DeleteBrowsingHistory DBHDisableDeleteOnExit + LastWrite @@ -41652,6 +44862,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage Advanced_EnableEnhancedProtectedMode + LastWrite @@ -41678,6 +44889,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer EnterpriseModeEnable + LastWrite @@ -41704,6 +44916,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer EnterpriseModeSiteList + LastWrite @@ -41730,10 +44943,11 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures Advanced_EnableSSL3Fallback + LastWrite - AllowInternetExplorer7PolicyList + AllowInternetExplorer7PolicyList @@ -41756,6 +44970,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~CategoryCompatView CompatView_UsePolicyList + LastWrite @@ -41782,6 +44997,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~CategoryCompatView CompatView_IntranetSites + LastWrite @@ -41808,6 +45024,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyInternetZoneTemplate + LastWrite @@ -41834,6 +45051,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyIntranetZoneTemplate + LastWrite @@ -41860,6 +45078,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyLocalMachineZoneTemplate + LastWrite @@ -41886,6 +45105,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyInternetZoneLockdownTemplate + LastWrite @@ -41912,6 +45132,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyIntranetZoneLockdownTemplate + LastWrite @@ -41938,6 +45159,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyLocalMachineZoneLockdownTemplate + LastWrite @@ -41964,6 +45186,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyRestrictedSitesZoneLockdownTemplate + LastWrite @@ -41990,6 +45213,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetSettings~Advanced~Browsing UseIntranetSiteForOneWordEntry + LastWrite @@ -42016,6 +45240,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_Zonemaps + LastWrite @@ -42042,6 +45267,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyTrustedSitesZoneLockdownTemplate + LastWrite @@ -42068,6 +45294,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage Advanced_InvalidSignatureBlock + LastWrite @@ -42094,6 +45321,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyRestrictedSitesZoneTemplate + LastWrite @@ -42120,6 +45348,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer EnableSuggestedSites + LastWrite @@ -42146,6 +45375,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyTrustedSitesZoneTemplate + LastWrite @@ -42172,6 +45402,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage Advanced_CertificateRevocation + LastWrite @@ -42198,6 +45429,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage Advanced_DownloadSignatures + LastWrite @@ -42224,6 +45456,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryBinaryBehaviorSecurityRestriction IESF_PolicyExplorerProcesses_2 + LastWrite @@ -42250,6 +45483,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement DisableFlashInIE + LastWrite @@ -42276,6 +45510,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement VerMgmtDisable + LastWrite @@ -42300,6 +45535,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor phone inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + DisableSafetyFilterOverride + LastWrite @@ -42324,6 +45562,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor phone inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + DisableSafetyFilterOverrideForAppRepUnknown + LastWrite @@ -42350,6 +45591,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~DeleteBrowsingHistory RestrictHistory + LastWrite @@ -42374,6 +45616,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor phone inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + AddonManagement_RestrictCrashDetection + LastWrite @@ -42400,10 +45645,11 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer SQM_DisableCEIP + LastWrite - DisableDeletingUserVisitedWebsites + DisableDeletingUserVisitedWebsites @@ -42426,6 +45672,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~DeleteBrowsingHistory DBHDisableDeleteHistory + LastWrite @@ -42452,6 +45699,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~RSS_Feeds Disable_Downloading_of_Enclosures + LastWrite @@ -42478,6 +45726,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage Advanced_SetWinInetProtocols + LastWrite @@ -42504,6 +45753,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer NoFirstRunCustomise + LastWrite @@ -42530,6 +45780,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage Advanced_DisableFlipAhead + LastWrite @@ -42556,6 +45807,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL NoCertError + LastWrite @@ -42582,6 +45834,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~CategoryPrivacy DisableInPrivateBrowsing + LastWrite @@ -42608,6 +45861,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage Advanced_EnableEnhancedProtectedMode64Bit + LastWrite @@ -42632,6 +45886,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor phone inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + RestrictProxy + LastWrite @@ -42658,6 +45915,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer NoSearchProvider + LastWrite @@ -42684,6 +45942,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer SecondaryHomePages + LastWrite @@ -42710,6 +45969,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer Disable_Security_Settings_Check + LastWrite @@ -42736,6 +45996,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer NoUpdateCheck + LastWrite @@ -42762,6 +46023,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage Advanced_DisableEPMCompat + LastWrite @@ -42788,6 +46050,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer Security_zones_map_edit + LastWrite @@ -42814,6 +46077,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer Security_options_edit + LastWrite @@ -42840,6 +46104,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement VerMgmtDisable + LastWrite @@ -42866,6 +46131,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement VerMgmtDomainAllowlist + LastWrite @@ -42892,6 +46158,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_IncludeUnspecifiedLocalSites + LastWrite @@ -42918,6 +46185,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_UNCAsIntranet + LastWrite @@ -42944,6 +46212,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyAccessDataSourcesAcrossDomains_1 + LastWrite @@ -42970,6 +46239,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyNotificationBarActiveXURLaction_1 + LastWrite @@ -42996,6 +46266,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyNotificationBarDownloadURLaction_1 + LastWrite @@ -43022,6 +46293,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyAllowPasteViaScript_1 + LastWrite @@ -43048,6 +46320,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyDropOrPasteFiles_1 + LastWrite @@ -43074,6 +46347,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyFontDownload_1 + LastWrite @@ -43100,10 +46374,11 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyZoneElevationURLaction_1 + LastWrite - InternetZoneAllowLoadingOfXAMLFilesWRONG + InternetZoneAllowLoadingOfXAMLFiles @@ -43126,6 +46401,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_Policy_XAML_1 + LastWrite @@ -43152,6 +46428,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyUnsignedFrameworkComponentsURLaction_1 + LastWrite @@ -43176,8 +46453,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor phone inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone - IZ_PolicyOnlyAllowApprovedDomainsToUseActiveXWithoutPrompt_Both_Intranet + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyOnlyAllowApprovedDomainsToUseActiveXWithoutPrompt_Both_Internet + LastWrite @@ -43202,8 +46480,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor phone inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone - IZ_PolicyAllowTDCControl_Both_LocalMachine + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyAllowTDCControl_Both_Internet + LastWrite @@ -43230,6 +46509,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_Policy_WebBrowserControl_1 + LastWrite @@ -43254,8 +46534,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor phone inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown - IZ_PolicyWindowsRestrictionsURLaction_6 + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyWindowsRestrictionsURLaction_1 + LastWrite @@ -43282,6 +46563,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_Policy_AllowScriptlets_1 + LastWrite @@ -43308,6 +46590,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_Policy_Phishing_1 + LastWrite @@ -43334,6 +46617,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_Policy_ScriptStatusBar_1 + LastWrite @@ -43360,10 +46644,11 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyUserdataPersistence_1 + LastWrite - InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG1 + InternetZoneDoNotRunAntimalwareAgainstActiveXControls @@ -43386,32 +46671,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyAntiMalwareCheckingOfActiveXControls_1 - - - - InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG2 - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone - IZ_PolicyAntiMalwareCheckingOfActiveXControls_3 + LastWrite @@ -43436,8 +46696,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor phone inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone - IZ_PolicyDownloadSignedActiveX_3 + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyDownloadSignedActiveX_1 + LastWrite @@ -43464,6 +46725,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyDownloadUnsignedActiveX_1 + LastWrite @@ -43488,8 +46750,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor phone inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone - IZ_PolicyTurnOnXSSFilter_Both_LocalMachine + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyTurnOnXSSFilter_Both_Internet + LastWrite @@ -43516,6 +46779,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyDragDropAcrossDomainsAcrossWindows_Both_Internet + LastWrite @@ -43542,6 +46806,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyDragDropAcrossDomainsWithinWindow_Both_Internet + LastWrite @@ -43568,6 +46833,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyMimeSniffingURLaction_1 + LastWrite @@ -43592,8 +46858,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor phone inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown - IZ_Policy_TurnOnProtectedMode_2 + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_Policy_TurnOnProtectedMode_1 + LastWrite @@ -43620,6 +46887,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_Policy_LocalPathForUpload_1 + LastWrite @@ -43646,36 +46914,11 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyScriptActiveXNotMarkedSafe_1 + LastWrite - InternetZoneInitializeAndScriptActiveXControlsNotMarkedSafe - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone - IZ_PolicyScriptActiveXNotMarkedSafe_1 - - - - InternetZoneJavaPermissionsWRONG1 + InternetZoneJavaPermissions @@ -43698,32 +46941,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyJavaPermissions_1 - - - - InternetZoneJavaPermissionsWRONG2 - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone - IZ_PolicyJavaPermissions_3 + LastWrite @@ -43750,6 +46968,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyLaunchAppsAndFilesInIFRAME_1 + LastWrite @@ -43776,6 +46995,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyLogon_1 + LastWrite @@ -43802,6 +47022,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyNavigateSubframesAcrossDomains_1 + LastWrite @@ -43828,6 +47049,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyUnsignedFrameworkComponentsURLaction_1 + LastWrite @@ -43854,6 +47076,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicySignedFrameworkComponentsURLaction_1 + LastWrite @@ -43880,6 +47103,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_Policy_UnsafeFiles_1 + LastWrite @@ -43906,6 +47130,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyBlockPopupWindows_1 + LastWrite @@ -43932,6 +47157,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyZoneElevationURLaction_1 + LastWrite @@ -43958,6 +47184,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyAccessDataSourcesAcrossDomains_3 + LastWrite @@ -43984,6 +47211,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyNotificationBarActiveXURLaction_3 + LastWrite @@ -44010,6 +47238,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyNotificationBarDownloadURLaction_3 + LastWrite @@ -44036,6 +47265,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyFontDownload_3 + LastWrite @@ -44062,6 +47292,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyZoneElevationURLaction_3 + LastWrite @@ -44088,6 +47319,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyUnsignedFrameworkComponentsURLaction_3 + LastWrite @@ -44114,6 +47346,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_Policy_AllowScriptlets_3 + LastWrite @@ -44140,6 +47373,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_Policy_Phishing_3 + LastWrite @@ -44166,6 +47400,34 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyUserdataPersistence_3 + LastWrite + + + + IntranetZoneDoNotRunAntimalwareAgainstActiveXControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone + IZ_PolicyAntiMalwareCheckingOfActiveXControls_3 + LastWrite @@ -44192,6 +47454,61 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyScriptActiveXNotMarkedSafe_3 + LastWrite + + + + IntranetZoneInitializeAndScriptActiveXControlsNotMarkedSafe + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone + IZ_PolicyScriptActiveXNotMarkedSafe_3 + LastWrite + + + + IntranetZoneJavaPermissions + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone + IZ_PolicyJavaPermissions_3 + LastWrite @@ -44218,6 +47535,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyNavigateSubframesAcrossDomains_3 + LastWrite @@ -44244,6 +47562,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyAccessDataSourcesAcrossDomains_9 + LastWrite @@ -44270,6 +47589,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyNotificationBarActiveXURLaction_9 + LastWrite @@ -44296,6 +47616,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyNotificationBarDownloadURLaction_9 + LastWrite @@ -44322,6 +47643,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyFontDownload_9 + LastWrite @@ -44348,6 +47670,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyZoneElevationURLaction_9 + LastWrite @@ -44374,6 +47697,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyUnsignedFrameworkComponentsURLaction_9 + LastWrite @@ -44400,6 +47724,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_Policy_AllowScriptlets_9 + LastWrite @@ -44426,6 +47751,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_Policy_Phishing_9 + LastWrite @@ -44452,6 +47778,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyUserdataPersistence_9 + LastWrite @@ -44476,8 +47803,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor phone inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone~IZ_LocalMachineZone + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyAntiMalwareCheckingOfActiveXControls_9 + LastWrite @@ -44504,6 +47832,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyScriptActiveXNotMarkedSafe_9 + LastWrite @@ -44530,6 +47859,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyJavaPermissions_9 + LastWrite @@ -44556,6 +47886,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyNavigateSubframesAcrossDomains_9 + LastWrite @@ -44582,6 +47913,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyAccessDataSourcesAcrossDomains_2 + LastWrite @@ -44608,6 +47940,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyNotificationBarActiveXURLaction_2 + LastWrite @@ -44634,6 +47967,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyNotificationBarDownloadURLaction_2 + LastWrite @@ -44660,6 +47994,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyFontDownload_2 + LastWrite @@ -44686,6 +48021,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyZoneElevationURLaction_2 + LastWrite @@ -44712,6 +48048,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyUnsignedFrameworkComponentsURLaction_2 + LastWrite @@ -44738,6 +48075,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_Policy_AllowScriptlets_2 + LastWrite @@ -44764,6 +48102,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_Policy_Phishing_2 + LastWrite @@ -44790,6 +48129,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyUserdataPersistence_2 + LastWrite @@ -44816,6 +48156,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyScriptActiveXNotMarkedSafe_2 + LastWrite @@ -44842,6 +48183,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyJavaPermissions_2 + LastWrite @@ -44868,6 +48210,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyNavigateSubframesAcrossDomains_2 + LastWrite @@ -44894,6 +48237,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyAccessDataSourcesAcrossDomains_4 + LastWrite @@ -44920,6 +48264,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyNotificationBarActiveXURLaction_4 + LastWrite @@ -44946,6 +48291,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyNotificationBarDownloadURLaction_4 + LastWrite @@ -44972,6 +48318,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyFontDownload_4 + LastWrite @@ -44998,6 +48345,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyZoneElevationURLaction_4 + LastWrite @@ -45024,6 +48372,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyUnsignedFrameworkComponentsURLaction_4 + LastWrite @@ -45050,6 +48399,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_Policy_AllowScriptlets_4 + LastWrite @@ -45076,6 +48426,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_Policy_Phishing_4 + LastWrite @@ -45102,6 +48453,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyUserdataPersistence_4 + LastWrite @@ -45128,6 +48480,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyScriptActiveXNotMarkedSafe_4 + LastWrite @@ -45154,6 +48507,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyNavigateSubframesAcrossDomains_4 + LastWrite @@ -45180,6 +48534,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyAccessDataSourcesAcrossDomains_10 + LastWrite @@ -45206,6 +48561,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyNotificationBarActiveXURLaction_10 + LastWrite @@ -45232,6 +48588,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyNotificationBarDownloadURLaction_10 + LastWrite @@ -45258,6 +48615,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyFontDownload_10 + LastWrite @@ -45284,6 +48642,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyZoneElevationURLaction_10 + LastWrite @@ -45310,6 +48669,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyUnsignedFrameworkComponentsURLaction_10 + LastWrite @@ -45336,6 +48696,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_Policy_AllowScriptlets_10 + LastWrite @@ -45362,6 +48723,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_Policy_Phishing_10 + LastWrite @@ -45388,6 +48750,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyUserdataPersistence_10 + LastWrite @@ -45414,6 +48777,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyScriptActiveXNotMarkedSafe_10 + LastWrite @@ -45440,6 +48804,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyJavaPermissions_10 + LastWrite @@ -45466,6 +48831,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyNavigateSubframesAcrossDomains_10 + LastWrite @@ -45492,6 +48858,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyAccessDataSourcesAcrossDomains_8 + LastWrite @@ -45518,6 +48885,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyNotificationBarActiveXURLaction_8 + LastWrite @@ -45544,6 +48912,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyNotificationBarDownloadURLaction_8 + LastWrite @@ -45570,6 +48939,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyFontDownload_8 + LastWrite @@ -45596,6 +48966,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyZoneElevationURLaction_8 + LastWrite @@ -45622,6 +48993,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyUnsignedFrameworkComponentsURLaction_8 + LastWrite @@ -45648,6 +49020,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_Policy_AllowScriptlets_8 + LastWrite @@ -45674,6 +49047,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_Policy_Phishing_8 + LastWrite @@ -45700,6 +49074,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyUserdataPersistence_8 + LastWrite @@ -45726,6 +49101,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyScriptActiveXNotMarkedSafe_8 + LastWrite @@ -45752,6 +49128,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyJavaPermissions_8 + LastWrite @@ -45778,6 +49155,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyNavigateSubframesAcrossDomains_8 + LastWrite @@ -45804,6 +49182,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyAccessDataSourcesAcrossDomains_6 + LastWrite @@ -45830,6 +49209,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyNotificationBarActiveXURLaction_6 + LastWrite @@ -45856,6 +49236,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyNotificationBarDownloadURLaction_6 + LastWrite @@ -45882,6 +49263,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyFontDownload_6 + LastWrite @@ -45908,6 +49290,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyZoneElevationURLaction_6 + LastWrite @@ -45934,6 +49317,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyUnsignedFrameworkComponentsURLaction_6 + LastWrite @@ -45960,6 +49344,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_Policy_AllowScriptlets_6 + LastWrite @@ -45986,6 +49371,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_Policy_Phishing_6 + LastWrite @@ -46012,6 +49398,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyUserdataPersistence_6 + LastWrite @@ -46038,6 +49425,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyScriptActiveXNotMarkedSafe_6 + LastWrite @@ -46064,6 +49452,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyJavaPermissions_6 + LastWrite @@ -46090,6 +49479,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyNavigateSubframesAcrossDomains_6 + LastWrite @@ -46116,6 +49506,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryMimeSniffingSafetyFeature IESF_PolicyExplorerProcesses_6 + LastWrite @@ -46142,6 +49533,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryMKProtocolSecurityRestriction IESF_PolicyExplorerProcesses_3 + LastWrite @@ -46168,6 +49560,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryInformationBar IESF_PolicyExplorerProcesses_10 + LastWrite @@ -46192,8 +49585,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor phone inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone - IZ_PolicyDownloadSignedActiveX_1 + inetres~AT~WindowsComponents~InternetExplorer + Disable_Managing_Safety_Filter_IE9 + LastWrite @@ -46220,6 +49614,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer DisablePerUserActiveXInstall + LastWrite @@ -46246,6 +49641,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryProtectionFromZoneElevation IESF_PolicyAllProcesses_9 + LastWrite @@ -46272,6 +49668,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement VerMgmtDisableRunThisTime + LastWrite @@ -46298,6 +49695,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryRestrictActiveXInstall IESF_PolicyAllProcesses_11 + LastWrite @@ -46324,6 +49722,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyAccessDataSourcesAcrossDomains_7 + LastWrite @@ -46348,8 +49747,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor phone inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone - IZ_PolicyActiveScripting_1 + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyActiveScripting_7 + LastWrite @@ -46376,6 +49776,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyNotificationBarActiveXURLaction_7 + LastWrite @@ -46402,6 +49803,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyNotificationBarDownloadURLaction_7 + LastWrite @@ -46426,8 +49828,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor phone inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone - IZ_PolicyBinaryBehaviors_1 + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyBinaryBehaviors_7 + LastWrite @@ -46454,6 +49857,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyAllowPasteViaScript_7 + LastWrite @@ -46480,6 +49884,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyDropOrPasteFiles_7 + LastWrite @@ -46504,12 +49909,13 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor phone inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone - IZ_PolicyFileDownload_1 + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyFileDownload_7 + LastWrite - RestrictedSitesZoneAllowFontDownloadsWRONG1 + RestrictedSitesZoneAllowFontDownloads @@ -46532,32 +49938,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyFontDownload_7 - - - - RestrictedSitesZoneAllowFontDownloadsWRONG2 - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone - IZ_PolicyFontDownload_1 + LastWrite @@ -46584,6 +49965,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyZoneElevationURLaction_7 + LastWrite @@ -46610,6 +49992,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_Policy_XAML_7 + LastWrite @@ -46634,8 +50017,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor phone inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone - IZ_PolicyAllowMETAREFRESH_1 + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyAllowMETAREFRESH_7 + LastWrite @@ -46662,6 +50046,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyUnsignedFrameworkComponentsURLaction_7 + LastWrite @@ -46688,6 +50073,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyOnlyAllowApprovedDomainsToUseActiveXWithoutPrompt_Both_Restricted + LastWrite @@ -46714,6 +50100,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyAllowTDCControl_Both_Restricted + LastWrite @@ -46740,6 +50127,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_Policy_WebBrowserControl_7 + LastWrite @@ -46766,6 +50154,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyWindowsRestrictionsURLaction_7 + LastWrite @@ -46792,6 +50181,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_Policy_AllowScriptlets_7 + LastWrite @@ -46818,6 +50208,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_Policy_Phishing_7 + LastWrite @@ -46844,6 +50235,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_Policy_ScriptStatusBar_7 + LastWrite @@ -46870,6 +50262,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyUserdataPersistence_7 + LastWrite @@ -46896,6 +50289,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyAntiMalwareCheckingOfActiveXControls_7 + LastWrite @@ -46922,6 +50316,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyDownloadSignedActiveX_7 + LastWrite @@ -46948,6 +50343,34 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyDownloadUnsignedActiveX_7 + LastWrite + + + + RestrictedSitesZoneEnableCrossSiteScriptingFilter + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyTurnOnXSSFilter_Both_Restricted + LastWrite @@ -46974,6 +50397,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyDragDropAcrossDomainsAcrossWindows_Both_Restricted + LastWrite @@ -47000,6 +50424,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyDragDropAcrossDomainsWithinWindow_Both_Restricted + LastWrite @@ -47026,6 +50451,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyMimeSniffingURLaction_7 + LastWrite @@ -47052,6 +50478,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_Policy_LocalPathForUpload_7 + LastWrite @@ -47078,6 +50505,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyScriptActiveXNotMarkedSafe_7 + LastWrite @@ -47104,6 +50532,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyJavaPermissions_7 + LastWrite @@ -47130,6 +50559,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyLaunchAppsAndFilesInIFRAME_7 + LastWrite @@ -47156,6 +50586,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyLogon_7 + LastWrite @@ -47182,6 +50613,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyNavigateSubframesAcrossDomains_7 + LastWrite @@ -47206,8 +50638,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor phone inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone - IZ_PolicyNavigateSubframesAcrossDomains_1 + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyNavigateSubframesAcrossDomains_7 + LastWrite @@ -47232,8 +50665,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor phone inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone - IZ_PolicyRunActiveXControls_1 + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyRunActiveXControls_7 + LastWrite @@ -47260,6 +50694,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicySignedFrameworkComponentsURLaction_7 + LastWrite @@ -47284,12 +50719,13 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor phone inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone - IZ_PolicyScriptActiveXMarkedSafe_1 + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyScriptActiveXMarkedSafe_7 + LastWrite - RestrictedSitesZoneWRONG + RestrictedSitesZoneScriptingOfJavaApplets @@ -47310,12 +50746,13 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor phone inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown - IZ_PolicyScriptingOfJavaApplets_6 + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyScriptingOfJavaApplets_7 + LastWrite - RestrictedSitesZoneWRONG2 + RestrictedSitesZoneShowSecurityWarningForPotentiallyUnsafeFiles @@ -47338,10 +50775,11 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_Policy_UnsafeFiles_7 + LastWrite - RestrictedSitesZoneWRONG3 + RestrictedSitesZoneTurnOnCrossSiteScriptingFilter @@ -47364,10 +50802,11 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyTurnOnXSSFilter_Both_Restricted + LastWrite - RestrictedSitesZoneWRONG4 + RestrictedSitesZoneTurnOnProtectedMode @@ -47390,10 +50829,11 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_Policy_TurnOnProtectedMode_7 + LastWrite - RestrictedSitesZoneWRONG5 + RestrictedSitesZoneUsePopupBlocker @@ -47416,6 +50856,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyBlockPopupWindows_7 + LastWrite @@ -47442,6 +50883,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryRestrictFileDownload IESF_PolicyAllProcesses_12 + LastWrite @@ -47468,6 +50910,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryScriptedWindowSecurityRestrictions IESF_PolicyAllProcesses_8 + LastWrite @@ -47494,10 +50937,11 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer SpecificSearchProvider + LastWrite - SecurityZonesUseOnlyMachineSettings + SecurityZonesUseOnlyMachineSettings @@ -47520,6 +50964,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer Security_HKLM_only + LastWrite @@ -47546,6 +50991,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer OnlyUseAXISForActiveXInstall + LastWrite @@ -47572,6 +51018,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyAccessDataSourcesAcrossDomains_5 + LastWrite @@ -47598,6 +51045,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyNotificationBarActiveXURLaction_5 + LastWrite @@ -47624,6 +51072,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyNotificationBarDownloadURLaction_5 + LastWrite @@ -47650,6 +51099,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyFontDownload_5 + LastWrite @@ -47676,6 +51126,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyZoneElevationURLaction_5 + LastWrite @@ -47702,6 +51153,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyUnsignedFrameworkComponentsURLaction_5 + LastWrite @@ -47728,6 +51180,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_Policy_AllowScriptlets_5 + LastWrite @@ -47754,6 +51207,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_Policy_Phishing_5 + LastWrite @@ -47780,6 +51234,61 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyUserdataPersistence_5 + LastWrite + + + + TrustedSitesZoneDoNotRunAntimalwareAgainstActiveXControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone + IZ_PolicyAntiMalwareCheckingOfActiveXControls_5 + LastWrite + + + + TrustedSitesZoneDontRunAntimalwareProgramsAgainstActiveXControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone + IZ_PolicyAntiMalwareCheckingOfActiveXControls_5 + LastWrite @@ -47806,6 +51315,61 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyScriptActiveXNotMarkedSafe_5 + LastWrite + + + + TrustedSitesZoneInitializeAndScriptActiveXControlsNotMarkedAsSafe + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone + IZ_PolicyScriptActiveXNotMarkedSafe_5 + LastWrite + + + + TrustedSitesZoneInitializeAndScriptActiveXControlsNotMarkedSafe + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone + IZ_PolicyScriptActiveXNotMarkedSafe_5 + LastWrite @@ -47832,6 +51396,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyJavaPermissions_5 + LastWrite @@ -47858,58 +51423,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyNavigateSubframesAcrossDomains_5 - - - - TrustedSitesZoneWRONG1 - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone - IZ_PolicyAntiMalwareCheckingOfActiveXControls_5 - - - - TrustedSitesZoneWRONG2 - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone - IZ_PolicyScriptActiveXNotMarkedSafe_5 + LastWrite @@ -47956,6 +51470,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor Kerberos.admx Kerberos~AT~System~kerberos ForestSearch + LastWrite @@ -47982,6 +51497,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor Kerberos.admx Kerberos~AT~System~kerberos EnableCbacAndArmor + LastWrite @@ -48008,6 +51524,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor Kerberos.admx Kerberos~AT~System~kerberos ClientRequireFast + LastWrite @@ -48034,6 +51551,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor Kerberos.admx Kerberos~AT~System~kerberos ValidateKDC + LastWrite @@ -48060,6 +51578,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor Kerberos.admx Kerberos~AT~System~kerberos MaxTokenSize + LastWrite @@ -48103,6 +51622,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain phone + LowestValueMostSecure @@ -48126,6 +51646,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain phone + LowestValueMostSecure @@ -48156,9 +51677,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor This policy setting prevents users from adding new Microsoft accounts on this computer. -If you select the "Users can’t add Microsoft accounts" option, users will not be able to create new Microsoft accounts on this computer, switch a local account to a Microsoft account, or connect a domain account to a Microsoft account. This is the preferred option if you need to limit the use of Microsoft accounts in your enterprise. +If you select the "Users can’t add Microsoft accounts" option, users will not be able to create new Microsoft accounts on this computer, switch a local account to a Microsoft account, or connect a domain account to a Microsoft account. This is the preferred option if you need to limit the use of Microsoft accounts in your enterprise. -If you select the "Users can’t add or log on with Microsoft accounts" option, existing Microsoft account users will not be able to log on to Windows. Selecting this option might make it impossible for an existing administrator on this computer to log on and manage the system. +If you select the "Users can’t add or log on with Microsoft accounts" option, existing Microsoft account users will not be able to log on to Windows. Selecting this option might make it impossible for an existing administrator on this computer to log on and manage the system. If you disable or do not configure this policy (recommended), users will be able to use Microsoft accounts with Windows. 0 @@ -48175,6 +51696,7 @@ If you disable or do not configure this policy (recommended), users will be able text/plain phone + LastWrite @@ -48206,7 +51728,8 @@ Default: Disabled. text/plain - desktop + phone + LastWrite @@ -48233,7 +51756,8 @@ Note: If the Guest account is disabled and the security option Network Access: S text/plain - desktop + phone + LastWrite @@ -48272,6 +51796,7 @@ It is possible for applications that use remote interactive logons to bypass thi text/plain phone + LastWrite @@ -48285,7 +51810,7 @@ It is possible for applications that use remote interactive logons to bypass thi This security setting determines whether a different account name is associated with the security identifier (SID) for the account Administrator. Renaming the well-known Administrator account makes it slightly more difficult for unauthorized persons to guess this privileged user name and password combination. Default: Administrator. - + Administrator @@ -48299,6 +51824,7 @@ Default: Administrator. text/plain phone + LastWrite @@ -48312,7 +51838,7 @@ Default: Administrator. This security setting determines whether a different account name is associated with the security identifier (SID) for the account "Guest." Renaming the well-known Guest account makes it slightly more difficult for unauthorized persons to guess this user name and password combination. Default: Guest. - + Guest @@ -48326,6 +51852,131 @@ Default: Guest. text/plain phone + LastWrite + + + + Devices_AllowedToFormatAndEjectRemovableMedia + + + + + Devices: Allowed to format and eject removable media + +This security setting determines who is allowed to format and eject removable NTFS media. This capability can be given to: + +Administrators +Administrators and Interactive Users + +Default: This policy is not defined and only Administrators have this ability. + 0 + + + + + + + + + + + text/plain + + phone + LastWrite + + + + Devices_AllowUndockWithoutHavingToLogon + + + + + Devices: Allow undock without having to log on +This security setting determines whether a portable computer can be undocked without having to log on. If this policy is enabled, logon is not required and an external hardware eject button can be used to undock the computer. If disabled, a user must log on and have the Remove computer from docking station privilege to undock the computer. +Default: Enabled. + +Caution +Disabling this policy may tempt users to try and physically remove the laptop from its docking station using methods other than the external hardware eject button. Since this may cause damage to the hardware, this setting, in general, should only be disabled on laptop configurations that are physically securable. + 1 + + + + + + + + + + + text/plain + + phone + LastWrite + + + + Devices_PreventUsersFromInstallingPrinterDriversWhenConnectingToSharedPrinters + + + + + Devices: Prevent users from installing printer drivers when connecting to shared printers + +For a computer to print to a shared printer, the driver for that shared printer must be installed on the local computer. This security setting determines who is allowed to install a printer driver as part of connecting to a shared printer. If this setting is enabled, only Administrators can install a printer driver as part of connecting to a shared printer. If this setting is disabled, any user can install a printer driver as part of connecting to a shared printer. + +Default on servers: Enabled. +Default on workstations: Disabled + +Notes + +This setting does not affect the ability to add a local printer. +This setting does not affect Administrators. + 0 + + + + + + + + + + + text/plain + + phone + LastWrite + + + + Devices_RestrictCDROMAccessToLocallyLoggedOnUserOnly + + + + + Devices: Restrict CD-ROM access to locally logged-on user only + +This security setting determines whether a CD-ROM is accessible to both local and remote users simultaneously. + +If this policy is enabled, it allows only the interactively logged-on user to access removable CD-ROM media. If this policy is enabled and no one is logged on interactively, the CD-ROM can be accessed over the network. + +Default: This policy is not defined and CD-ROM access is not restricted to the locally logged-on user. + 0 + + + + + + + + + + + text/plain + + phone + LastWrite @@ -48352,10 +52003,11 @@ Do not display user information (3) text/plain phone + LastWrite - Interactivelogon_DoNotDisplayLastSignedIn + InteractiveLogon_DoNotDisplayLastSignedIn @@ -48381,10 +52033,11 @@ Default: Disabled. text/plain phone + LastWrite - Interactivelogon_DoNotDisplayUsernameAtSignIn + InteractiveLogon_DoNotDisplayUsernameAtSignIn @@ -48396,7 +52049,7 @@ If this policy is enabled, the username will not be shown. If this policy is disabled, the username will be shown. Default: Disabled. - 0 + 1 @@ -48410,10 +52063,11 @@ Default: Disabled. text/plain phone + LastWrite - Interactivelogon_DoNotRequireCTRLALTDEL + InteractiveLogon_DoNotRequireCTRLALTDEL @@ -48442,6 +52096,7 @@ Default on stand-alone computers: Enabled. text/plain phone + LastWrite @@ -48468,6 +52123,8 @@ Default: not enforced. text/plain + phone + LastWrite @@ -48497,6 +52154,8 @@ Default: No message. text/plain phone + LastWrite + 0xF000 @@ -48524,6 +52183,7 @@ Default: No message. text/plain phone + LastWrite @@ -48553,6 +52213,7 @@ Default: Disabled. text/plain phone + LastWrite @@ -48582,6 +52243,7 @@ Default: Enabled. text/plain phone + LastWrite @@ -48611,6 +52273,7 @@ This policy is supported on at least Windows Server 2016. text/plain phone + LastWrite @@ -48636,6 +52299,7 @@ This policy will be turned off by default on domain joined machines. This would text/plain phone + LastWrite @@ -48663,6 +52327,40 @@ Default: This policy is not defined and automatic administrative logon is not al text/plain phone + LastWrite + + + + Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn + + + + + Shutdown: Allow system to be shut down without having to log on + +This security setting determines whether a computer can be shut down without having to log on to Windows. + +When this policy is enabled, the Shut Down command is available on the Windows logon screen. + +When this policy is disabled, the option to shut down the computer does not appear on the Windows logon screen. In this case, users must be able to log on to the computer successfully and have the Shut down the system user right before they can perform a system shutdown. + +Default on workstations: Enabled. +Default on servers: Disabled. + 1 + + + + + + + + + + + text/plain + + phone + LastWrite @@ -48694,6 +52392,7 @@ Default: Disabled. text/plain phone + LastWrite @@ -48706,10 +52405,10 @@ Default: Disabled. This policy setting controls whether User Interface Accessibility (UIAccess or UIA) programs can automatically disable the secure desktop for elevation prompts used by a standard user. -• Enabled: UIA programs, including Windows Remote Assistance, automatically disable the secure desktop for elevation prompts. If you do not disable the "User Account Control: Switch to the secure desktop when prompting for elevation" policy setting, the prompts appear on the interactive user's desktop instead of the secure desktop. +• Enabled: UIA programs, including Windows Remote Assistance, automatically disable the secure desktop for elevation prompts. If you do not disable the "User Account Control: Switch to the secure desktop when prompting for elevation" policy setting, the prompts appear on the interactive user's desktop instead of the secure desktop. -• Disabled: (Default) The secure desktop can be disabled only by the user of the interactive desktop or by disabling the "User Account Control: Switch to the secure desktop when prompting for elevation" policy setting. - 1 +• Disabled: (Default) The secure desktop can be disabled only by the user of the interactive desktop or by disabling the "User Account Control: Switch to the secure desktop when prompting for elevation" policy setting. + 0 @@ -48723,6 +52422,7 @@ This policy setting controls whether User Interface Accessibility (UIAccess or U text/plain phone + LastWrite @@ -48737,18 +52437,18 @@ This policy setting controls the behavior of the elevation prompt for administra The options are: -• Elevate without prompting: Allows privileged accounts to perform an operation that requires elevation without requiring consent or credentials. Note: Use this option only in the most constrained environments. +• Elevate without prompting: Allows privileged accounts to perform an operation that requires elevation without requiring consent or credentials. Note: Use this option only in the most constrained environments. -• Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a privileged user name and password. If the user enters valid credentials, the operation continues with the user's highest available privilege. +• Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a privileged user name and password. If the user enters valid credentials, the operation continues with the user's highest available privilege. -• Prompt for consent on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege. +• Prompt for consent on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege. -• Prompt for credentials: When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. +• Prompt for credentials: When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. -• Prompt for consent: When an operation requires elevation of privilege, the user is prompted to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege. +• Prompt for consent: When an operation requires elevation of privilege, the user is prompted to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege. -• Prompt for consent for non-Windows binaries: (Default) When an operation for a non-Microsoft application requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege. - 0 +• Prompt for consent for non-Windows binaries: (Default) When an operation for a non-Microsoft application requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege. + 5 @@ -48762,6 +52462,7 @@ The options are: text/plain phone + LastWrite @@ -48775,12 +52476,12 @@ This policy setting controls the behavior of the elevation prompt for standard u The options are: -• Prompt for credentials: (Default) When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. +• Prompt for credentials: (Default) When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. -• Automatically deny elevation requests: When an operation requires elevation of privilege, a configurable access denied error message is displayed. An enterprise that is running desktops as standard user may choose this setting to reduce help desk calls. +• Automatically deny elevation requests: When an operation requires elevation of privilege, a configurable access denied error message is displayed. An enterprise that is running desktops as standard user may choose this setting to reduce help desk calls. -• Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a different user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. - 0 +• Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a different user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. + 3 @@ -48794,6 +52495,39 @@ The options are: text/plain phone + LastWrite + + + + UserAccountControl_DetectApplicationInstallationsAndPromptForElevation + + + + + User Account Control: Detect application installations and prompt for elevation + +This policy setting controls the behavior of application installation detection for the computer. + +The options are: + +Enabled: (Default) When an application installation package is detected that requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. + +Disabled: Application installation packages are not detected and prompted for elevation. Enterprises that are running standard user desktops and use delegated installation technologies such as Group Policy Software Installation or Systems Management Server (SMS) should disable this policy setting. In this case, installer detection is unnecessary. + 1 + + + + + + + + + + + text/plain + + phone + LastWrite @@ -48808,77 +52542,9 @@ This policy setting enforces public key infrastructure (PKI) signature checks fo The options are: -• Enabled: Enforces the PKI certification path validation for a given executable file before it is permitted to run. +• Enabled: Enforces the PKI certification path validation for a given executable file before it is permitted to run. -• Disabled: (Default) Does not enforce PKI certification path validation before a given executable file is permitted to run. - 1 - - - - - - - - - - - text/plain - - phone - - - - UserAccountControl_OnlyElevateUIAccessApplicationsThatAreInstalledInSecureLocations - - - - - User Account Control: Only elevate UIAccess applications that are installed in secure locations - -This policy setting controls whether applications that request to run with a User Interface Accessibility (UIAccess) integrity level must reside in a secure location in the file system. Secure locations are limited to the following: - -- …\Program Files\, including subfolders -- …\Windows\system32\ -- …\Program Files (x86)\, including subfolders for 64-bit versions of Windows - -Note: Windows enforces a public key infrastructure (PKI) signature check on any interactive application that requests to run with a UIAccess integrity level regardless of the state of this security setting. - -The options are: - -• Enabled: (Default) If an application resides in a secure location in the file system, it runs only with UIAccess integrity. - -• Disabled: An application runs with UIAccess integrity even if it does not reside in a secure location in the file system. - 1 - - - - - - - - - - - text/plain - - phone - - - - UserAccountControl_RunAllAdministratorsInAdminApprovalMode - - - - - User Account Control: Turn on Admin Approval Mode - -This policy setting controls the behavior of all User Account Control (UAC) policy settings for the computer. If you change this policy setting, you must restart your computer. - -The options are: - -• Enabled: (Default) Admin Approval Mode is enabled. This policy must be enabled and related UAC policy settings must also be set appropriately to allow the built-in Administrator account and all other users who are members of the Administrators group to run in Admin Approval Mode. - -• Disabled: Admin Approval Mode and all related UAC policy settings are disabled. Note: If this policy setting is disabled, the Security Center notifies you that the overall security of the operating system has been reduced. +• Disabled: (Default) Does not enforce PKI certification path validation before a given executable file is permitted to run. 0 @@ -48893,6 +52559,77 @@ The options are: text/plain phone + LastWrite + + + + UserAccountControl_OnlyElevateUIAccessApplicationsThatAreInstalledInSecureLocations + + + + + User Account Control: Only elevate UIAccess applications that are installed in secure locations + +This policy setting controls whether applications that request to run with a User Interface Accessibility (UIAccess) integrity level must reside in a secure location in the file system. Secure locations are limited to the following: + +- …\Program Files\, including subfolders +- …\Windows\system32\ +- …\Program Files (x86)\, including subfolders for 64-bit versions of Windows + +Note: Windows enforces a public key infrastructure (PKI) signature check on any interactive application that requests to run with a UIAccess integrity level regardless of the state of this security setting. + +The options are: + +• Enabled: (Default) If an application resides in a secure location in the file system, it runs only with UIAccess integrity. + +• Disabled: An application runs with UIAccess integrity even if it does not reside in a secure location in the file system. + 1 + + + + + + + + + + + text/plain + + phone + LastWrite + + + + UserAccountControl_RunAllAdministratorsInAdminApprovalMode + + + + + User Account Control: Turn on Admin Approval Mode + +This policy setting controls the behavior of all User Account Control (UAC) policy settings for the computer. If you change this policy setting, you must restart your computer. + +The options are: + +• Enabled: (Default) Admin Approval Mode is enabled. This policy must be enabled and related UAC policy settings must also be set appropriately to allow the built-in Administrator account and all other users who are members of the Administrators group to run in Admin Approval Mode. + +• Disabled: Admin Approval Mode and all related UAC policy settings are disabled. Note: If this policy setting is disabled, the Security Center notifies you that the overall security of the operating system has been reduced. + 1 + + + + + + + + + + + text/plain + + phone + LastWrite @@ -48907,9 +52644,9 @@ This policy setting controls whether the elevation request prompt is displayed o The options are: -• Enabled: (Default) All elevation requests go to the secure desktop regardless of prompt behavior policy settings for administrators and standard users. +• Enabled: (Default) All elevation requests go to the secure desktop regardless of prompt behavior policy settings for administrators and standard users. -• Disabled: All elevation requests go to the interactive user's desktop. Prompt behavior policy settings for administrators and standard users are used. +• Disabled: All elevation requests go to the interactive user's desktop. Prompt behavior policy settings for administrators and standard users are used. 1 @@ -48924,6 +52661,7 @@ The options are: text/plain phone + LastWrite @@ -48938,10 +52676,10 @@ This policy setting controls the behavior of Admin Approval Mode for the built-i The options are: -• Enabled: The built-in Administrator account uses Admin Approval Mode. By default, any operation that requires elevation of privilege will prompt the user to approve the operation. +• Enabled: The built-in Administrator account uses Admin Approval Mode. By default, any operation that requires elevation of privilege will prompt the user to approve the operation. -• Disabled: (Default) The built-in Administrator account runs all applications with full administrative privilege. - 1 +• Disabled: (Default) The built-in Administrator account runs all applications with full administrative privilege. + 0 @@ -48955,6 +52693,7 @@ The options are: text/plain phone + LastWrite @@ -48969,9 +52708,9 @@ This policy setting controls whether application write failures are redirected t The options are: -• Enabled: (Default) Application write failures are redirected at run time to defined user locations for both the file system and registry. +• Enabled: (Default) Application write failures are redirected at run time to defined user locations for both the file system and registry. -• Disabled: Applications that write data to protected locations fail. +• Disabled: Applications that write data to protected locations fail. 1 @@ -48986,6 +52725,7 @@ The options are: text/plain phone + LastWrite @@ -49028,6 +52768,7 @@ The options are: text/plain + LastWrite @@ -49071,6 +52812,7 @@ The options are: text/plain phone + LowestValueMostSecure @@ -49113,6 +52855,7 @@ The options are: text/plain + LastWrite @@ -49135,6 +52878,7 @@ The options are: text/plain + LastWrite @@ -49178,6 +52922,7 @@ The options are: text/plain desktop + LowestValueMostSecure @@ -49201,6 +52946,7 @@ The options are: text/plain desktop + LowestValueMostSecure @@ -49224,6 +52970,7 @@ The options are: text/plain desktop + LowestValueMostSecure @@ -49266,6 +53013,7 @@ The options are: text/plain + LastWrite @@ -49288,6 +53036,7 @@ The options are: text/plain + LastWrite @@ -49310,6 +53059,7 @@ The options are: text/plain + LastWrite @@ -49332,6 +53082,7 @@ The options are: text/plain + LastWrite @@ -49354,6 +53105,7 @@ The options are: text/plain + LastWrite @@ -49376,6 +53128,7 @@ The options are: text/plain + LastWrite @@ -49398,6 +53151,7 @@ The options are: text/plain + LastWrite @@ -49420,6 +53174,7 @@ The options are: text/plain + LastWrite @@ -49466,6 +53221,7 @@ The options are: power.admx Power~AT~System~PowerManagementCat~PowerSleepSettingsCat AllowStandbyStatesAC_2 + LastWrite @@ -49492,6 +53248,7 @@ The options are: power.admx Power~AT~System~PowerManagementCat~PowerVideoSettingsCat VideoPowerDownTimeOutDC_2 + LastWrite @@ -49518,6 +53275,7 @@ The options are: power.admx Power~AT~System~PowerManagementCat~PowerVideoSettingsCat VideoPowerDownTimeOutAC_2 + LastWrite @@ -49544,6 +53302,7 @@ The options are: power.admx Power~AT~System~PowerManagementCat~PowerSleepSettingsCat DCHibernateTimeOut_2 + LastWrite @@ -49570,6 +53329,7 @@ The options are: power.admx Power~AT~System~PowerManagementCat~PowerSleepSettingsCat ACHibernateTimeOut_2 + LastWrite @@ -49596,6 +53356,7 @@ The options are: power.admx Power~AT~System~PowerManagementCat~PowerSleepSettingsCat DCPromptForPasswordOnResume_2 + LastWrite @@ -49622,6 +53383,7 @@ The options are: power.admx Power~AT~System~PowerManagementCat~PowerSleepSettingsCat ACPromptForPasswordOnResume_2 + LastWrite @@ -49648,6 +53410,7 @@ The options are: power.admx Power~AT~System~PowerManagementCat~PowerSleepSettingsCat DCStandbyTimeOut_2 + LastWrite @@ -49674,6 +53437,7 @@ The options are: power.admx Power~AT~System~PowerManagementCat~PowerSleepSettingsCat ACStandbyTimeOut_2 + LastWrite @@ -49720,6 +53484,7 @@ The options are: Printing.admx Printing~AT~ControlPanel~CplPrinters PointAndPrint_Restrictions_Win7 + LastWrite @@ -49746,6 +53511,7 @@ The options are: Printing2.admx Printing2~AT~Printers PublishPrinters + LastWrite @@ -49788,7 +53554,7 @@ The options are: text/plain - desktop + LowestValueMostSecure @@ -49812,6 +53578,7 @@ The options are: text/plain 10.0.10240 + LowestValueMostSecure @@ -49834,6 +53601,7 @@ The options are: text/plain + LowestValueMostSecureZeroHasNoLimits @@ -49856,6 +53624,7 @@ The options are: text/plain + HighestValueMostSecure @@ -49878,6 +53647,7 @@ The options are: text/plain + HighestValueMostSecure @@ -49900,6 +53670,8 @@ The options are: text/plain + LastWrite + ; @@ -49922,6 +53694,8 @@ The options are: text/plain + LastWrite + ; @@ -49944,6 +53718,8 @@ The options are: text/plain + LastWrite + ; @@ -49966,6 +53742,7 @@ The options are: text/plain + HighestValueMostSecure @@ -49988,6 +53765,8 @@ The options are: text/plain + LastWrite + ; @@ -50010,6 +53789,8 @@ The options are: text/plain + LastWrite + ; @@ -50032,6 +53813,8 @@ The options are: text/plain + LastWrite + ; @@ -50054,6 +53837,7 @@ The options are: text/plain + HighestValueMostSecure @@ -50076,6 +53860,8 @@ The options are: text/plain + LastWrite + ; @@ -50098,6 +53884,8 @@ The options are: text/plain + LastWrite + ; @@ -50120,6 +53908,8 @@ The options are: text/plain + LastWrite + ; @@ -50142,6 +53932,7 @@ The options are: text/plain + HighestValueMostSecure @@ -50164,6 +53955,8 @@ The options are: text/plain + LastWrite + ; @@ -50186,6 +53979,8 @@ The options are: text/plain + LastWrite + ; @@ -50208,94 +54003,8 @@ The options are: text/plain - - - - LetAppsAccessCellularData - - - - - This policy setting specifies whether Windows apps can access cellular data. - 0 - - - - - - - - - - - text/plain - - - - - LetAppsAccessCellularData_ForceAllowTheseApps - - - - - List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to cellular data. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. - - - - - - - - - - - - text/plain - - - - - LetAppsAccessCellularData_ForceDenyTheseApps - - - - - List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to cellular data. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. - - - - - - - - - - - - text/plain - - - - - LetAppsAccessCellularData_UserInControlOfTheseApps - - - - - List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the cellular data privacy setting for the listed apps. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. - - - - - - - - - - - - text/plain - + LastWrite + ; @@ -50318,6 +54027,7 @@ The options are: text/plain + HighestValueMostSecure @@ -50340,6 +54050,8 @@ The options are: text/plain + LastWrite + ; @@ -50362,6 +54074,8 @@ The options are: text/plain + LastWrite + ; @@ -50384,6 +54098,8 @@ The options are: text/plain + LastWrite + ; @@ -50406,6 +54122,7 @@ The options are: text/plain + HighestValueMostSecure @@ -50428,6 +54145,8 @@ The options are: text/plain + LastWrite + ; @@ -50450,6 +54169,8 @@ The options are: text/plain + LastWrite + ; @@ -50472,6 +54193,8 @@ The options are: text/plain + LastWrite + ; @@ -50494,6 +54217,7 @@ The options are: text/plain + HighestValueMostSecure @@ -50516,6 +54240,8 @@ The options are: text/plain + LastWrite + ; @@ -50538,6 +54264,8 @@ The options are: text/plain + LastWrite + ; @@ -50560,6 +54288,8 @@ The options are: text/plain + LastWrite + ; @@ -50582,6 +54312,7 @@ The options are: text/plain + HighestValueMostSecure @@ -50604,6 +54335,8 @@ The options are: text/plain + LastWrite + ; @@ -50626,6 +54359,8 @@ The options are: text/plain + LastWrite + ; @@ -50648,6 +54383,8 @@ The options are: text/plain + LastWrite + ; @@ -50670,6 +54407,7 @@ The options are: text/plain + HighestValueMostSecure @@ -50692,6 +54430,8 @@ The options are: text/plain + LastWrite + ; @@ -50714,6 +54454,8 @@ The options are: text/plain + LastWrite + ; @@ -50736,6 +54478,8 @@ The options are: text/plain + LastWrite + ; @@ -50758,6 +54502,7 @@ The options are: text/plain + HighestValueMostSecure @@ -50780,6 +54525,8 @@ The options are: text/plain + LastWrite + ; @@ -50802,6 +54549,8 @@ The options are: text/plain + LastWrite + ; @@ -50824,6 +54573,8 @@ The options are: text/plain + LastWrite + ; @@ -50846,6 +54597,7 @@ The options are: text/plain + HighestValueMostSecure @@ -50868,6 +54620,8 @@ The options are: text/plain + LastWrite + ; @@ -50890,6 +54644,8 @@ The options are: text/plain + LastWrite + ; @@ -50912,6 +54668,8 @@ The options are: text/plain + LastWrite + ; @@ -50934,6 +54692,7 @@ The options are: text/plain + HighestValueMostSecure @@ -50956,6 +54715,8 @@ The options are: text/plain + LastWrite + ; @@ -50978,6 +54739,8 @@ The options are: text/plain + LastWrite + ; @@ -51000,6 +54763,8 @@ The options are: text/plain + LastWrite + ; @@ -51022,6 +54787,7 @@ The options are: text/plain + HighestValueMostSecure @@ -51044,6 +54810,8 @@ The options are: text/plain + LastWrite + ; @@ -51066,6 +54834,8 @@ The options are: text/plain + LastWrite + ; @@ -51088,6 +54858,8 @@ The options are: text/plain + LastWrite + ; @@ -51110,6 +54882,7 @@ The options are: text/plain + HighestValueMostSecure @@ -51132,6 +54905,8 @@ The options are: text/plain + LastWrite + ; @@ -51154,6 +54929,8 @@ The options are: text/plain + LastWrite + ; @@ -51176,6 +54953,8 @@ The options are: text/plain + LastWrite + ; @@ -51198,6 +54977,7 @@ The options are: text/plain + HighestValueMostSecure @@ -51220,6 +55000,8 @@ The options are: text/plain + LastWrite + ; @@ -51242,6 +55024,8 @@ The options are: text/plain + LastWrite + ; @@ -51264,6 +55048,8 @@ The options are: text/plain + LastWrite + ; @@ -51286,6 +55072,7 @@ The options are: text/plain + HighestValueMostSecure @@ -51308,6 +55095,8 @@ The options are: text/plain + LastWrite + ; @@ -51330,6 +55119,8 @@ The options are: text/plain + LastWrite + ; @@ -51352,6 +55143,8 @@ The options are: text/plain + LastWrite + ; @@ -51374,6 +55167,7 @@ The options are: text/plain + HighestValueMostSecure @@ -51396,6 +55190,8 @@ The options are: text/plain + LastWrite + ; @@ -51418,6 +55214,8 @@ The options are: text/plain + LastWrite + ; @@ -51440,6 +55238,8 @@ The options are: text/plain + LastWrite + ; @@ -51448,7 +55248,7 @@ The options are: - This policy setting specifies whether Windows apps can sync with devices. + This policy setting specifies whether Windows apps can communicate with unpaired wireless devices. 0 @@ -51462,6 +55262,7 @@ The options are: text/plain + HighestValueMostSecure @@ -51470,7 +55271,7 @@ The options are: - List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will have access to sync with devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will be allowed to communicate with unpaired wireless devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. @@ -51484,6 +55285,8 @@ The options are: text/plain + LastWrite + ; @@ -51492,7 +55295,7 @@ The options are: - List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will not have access to sync with devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will not be allowed to communicate with unpaired wireless devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. @@ -51506,6 +55309,8 @@ The options are: text/plain + LastWrite + ; @@ -51514,7 +55319,7 @@ The options are: - List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the 'sync with devices' privacy setting for the listed apps. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the 'Communicate with unpaired wireless devices' privacy setting for the listed apps. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. @@ -51528,6 +55333,8 @@ The options are: text/plain + LastWrite + ; @@ -51550,6 +55357,7 @@ The options are: text/plain + HighestValueMostSecure @@ -51596,6 +55404,7 @@ The options are: remoteassistance.admx RemoteAssistance~AT~System~RemoteAssist RA_Options + LastWrite @@ -51622,6 +55431,7 @@ The options are: remoteassistance.admx RemoteAssistance~AT~System~RemoteAssist RA_Logging + LastWrite @@ -51648,6 +55458,7 @@ The options are: remoteassistance.admx RemoteAssistance~AT~System~RemoteAssist RA_Solicit + LastWrite @@ -51674,6 +55485,7 @@ The options are: remoteassistance.admx RemoteAssistance~AT~System~RemoteAssist RA_Unsolicit + LastWrite @@ -51720,6 +55532,7 @@ The options are: terminalserver.admx TerminalServer~AT~WindowsComponents~TS_GP_NODE~TS_TERMINAL_SERVER~TS_CONNECTIONS TS_DISABLE_CONNECTIONS + LastWrite @@ -51746,6 +55559,7 @@ The options are: terminalserver.admx TerminalServer~AT~WindowsComponents~TS_GP_NODE~TS_TERMINAL_SERVER~TS_SECURITY TS_ENCRYPTION_POLICY + LastWrite @@ -51772,6 +55586,7 @@ The options are: terminalserver.admx TerminalServer~AT~WindowsComponents~TS_GP_NODE~TS_TERMINAL_SERVER~TS_REDIRECTION TS_CLIENT_DRIVE_M + LastWrite @@ -51798,6 +55613,7 @@ The options are: terminalserver.admx TerminalServer~AT~WindowsComponents~TS_GP_NODE~TS_CLIENT TS_CLIENT_DISABLE_PASSWORD_SAVING_2 + LastWrite @@ -51824,6 +55640,7 @@ The options are: terminalserver.admx TerminalServer~AT~WindowsComponents~TS_GP_NODE~TS_TERMINAL_SERVER~TS_SECURITY TS_PASSWORD + LastWrite @@ -51850,6 +55667,7 @@ The options are: terminalserver.admx TerminalServer~AT~WindowsComponents~TS_GP_NODE~TS_TERMINAL_SERVER~TS_SECURITY TS_RPC_ENCRYPTION + LastWrite @@ -51896,6 +55714,7 @@ The options are: WindowsRemoteManagement.admx WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMClient AllowBasic_2 + LastWrite @@ -51922,6 +55741,7 @@ The options are: WindowsRemoteManagement.admx WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService AllowBasic_1 + LastWrite @@ -51946,8 +55766,9 @@ The options are: phone WindowsRemoteManagement.admx - WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService - AllowCredSSP_1 + WindowsRemoteManagement~AT~WindowsComponents~WinRMClient + AllowCredSSP_2 + LastWrite @@ -51973,7 +55794,8 @@ The options are: phone WindowsRemoteManagement.admx WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService - AllowCredSSP_2 + AllowCredSSP_1 + LastWrite @@ -52000,6 +55822,7 @@ The options are: WindowsRemoteManagement.admx WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService AllowAutoConfig + LastWrite @@ -52026,6 +55849,7 @@ The options are: WindowsRemoteManagement.admx WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMClient AllowUnencrypted_2 + LastWrite @@ -52052,6 +55876,7 @@ The options are: WindowsRemoteManagement.admx WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService AllowUnencrypted_1 + LastWrite @@ -52078,6 +55903,7 @@ The options are: WindowsRemoteManagement.admx WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMClient DisallowDigest + LastWrite @@ -52102,8 +55928,9 @@ The options are: phone WindowsRemoteManagement.admx - WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService - DisallowNegotiate_1 + WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMClient + DisallowNegotiate_2 + LastWrite @@ -52128,8 +55955,9 @@ The options are: phone WindowsRemoteManagement.admx - WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMClient - DisallowNegotiate_2 + WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService + DisallowNegotiate_1 + LastWrite @@ -52156,6 +55984,7 @@ The options are: WindowsRemoteManagement.admx WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService DisableRunAs + LastWrite @@ -52182,6 +56011,7 @@ The options are: WindowsRemoteManagement.admx WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService CBTHardeningLevel_1 + LastWrite @@ -52208,6 +56038,7 @@ The options are: WindowsRemoteManagement.admx WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMClient TrustedHosts + LastWrite @@ -52234,6 +56065,7 @@ The options are: WindowsRemoteManagement.admx WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService HttpCompatibilityListener + LastWrite @@ -52260,6 +56092,7 @@ The options are: WindowsRemoteManagement.admx WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService HttpsCompatibilityListener + LastWrite @@ -52306,6 +56139,7 @@ The options are: rpc.admx RPC~AT~System~Rpc RpcRestrictRemoteClients + LastWrite @@ -52332,6 +56166,7 @@ The options are: rpc.admx RPC~AT~System~Rpc RpcEnableAuthEpResolution + LastWrite @@ -52378,6 +56213,7 @@ The options are: WindowsRemoteShell.admx WindowsRemoteShell~AT~WindowsComponents~WinRS AllowRemoteShellAccess + LastWrite @@ -52404,6 +56240,7 @@ The options are: WindowsRemoteShell.admx WindowsRemoteShell~AT~WindowsComponents~WinRS MaxConcurrentUsers + LastWrite @@ -52430,6 +56267,7 @@ The options are: WindowsRemoteShell.admx WindowsRemoteShell~AT~WindowsComponents~WinRS IdleTimeout + LastWrite @@ -52456,6 +56294,7 @@ The options are: WindowsRemoteShell.admx WindowsRemoteShell~AT~WindowsComponents~WinRS MaxMemoryPerShellMB + LastWrite @@ -52482,6 +56321,7 @@ The options are: WindowsRemoteShell.admx WindowsRemoteShell~AT~WindowsComponents~WinRS MaxProcessesPerShell + LastWrite @@ -52508,6 +56348,7 @@ The options are: WindowsRemoteShell.admx WindowsRemoteShell~AT~WindowsComponents~WinRS MaxShellsPerUser + LastWrite @@ -52534,6 +56375,7 @@ The options are: WindowsRemoteShell.admx WindowsRemoteShell~AT~WindowsComponents~WinRS ShellTimeOut + LastWrite @@ -52556,6 +56398,29 @@ The options are: + + AllowCloudSearch + + + + + + 2 + + + + + + + + + + + text/plain + + LowestValueMostSecure + + AllowIndexingEncryptedStoresOrItems @@ -52576,6 +56441,7 @@ The options are: text/plain + LowestValueMostSecure @@ -52598,6 +56464,7 @@ The options are: text/plain + LowestValueMostSecure @@ -52620,6 +56487,7 @@ The options are: text/plain + LowestValueMostSecure @@ -52642,6 +56510,7 @@ The options are: text/plain + HighestValueMostSecure @@ -52664,6 +56533,7 @@ The options are: text/plain + LowestValueMostSecure @@ -52686,6 +56556,7 @@ The options are: text/plain + HighestValueMostSecure @@ -52708,6 +56579,7 @@ The options are: text/plain + HighestValueMostSecure @@ -52730,6 +56602,7 @@ The options are: text/plain + HighestValueMostSecure @@ -52752,6 +56625,7 @@ The options are: text/plain + HighestValueMostSecure @@ -52774,6 +56648,7 @@ The options are: text/plain + HighestValueMostSecure @@ -52797,6 +56672,7 @@ The options are: text/plain desktop + HighestValueMostSecure @@ -52839,6 +56715,7 @@ The options are: text/plain + LowestValueMostSecure @@ -52862,6 +56739,7 @@ The options are: text/plain desktop + LowestValueMostSecure @@ -52884,6 +56762,7 @@ The options are: text/plain + LowestValueMostSecure @@ -52907,6 +56786,7 @@ The options are: text/plain desktop + LowestValueMostSecure @@ -52930,6 +56810,7 @@ The options are: text/plain phone + HighestValueMostSecure @@ -52952,6 +56833,7 @@ The options are: text/plain + LastWrite @@ -52974,6 +56856,7 @@ The options are: text/plain + HighestValueMostSecure @@ -52996,6 +56879,7 @@ The options are: text/plain + HighestValueMostSecure @@ -53018,6 +56902,7 @@ The options are: text/plain + HighestValueMostSecure @@ -53061,6 +56946,7 @@ The options are: text/plain phone + LowestValueMostSecure @@ -53083,6 +56969,7 @@ The options are: text/plain + LowestValueMostSecure @@ -53105,6 +56992,7 @@ The options are: text/plain + LowestValueMostSecure @@ -53127,6 +57015,7 @@ The options are: text/plain + LowestValueMostSecure @@ -53150,6 +57039,7 @@ The options are: text/plain phone + LowestValueMostSecure @@ -53173,6 +57063,7 @@ The options are: text/plain phone + LowestValueMostSecure @@ -53196,6 +57087,7 @@ The options are: text/plain phone + LowestValueMostSecure @@ -53219,6 +57111,7 @@ The options are: text/plain phone + LowestValueMostSecure @@ -53241,6 +57134,7 @@ The options are: text/plain + LowestValueMostSecure @@ -53264,6 +57158,7 @@ The options are: text/plain phone + LowestValueMostSecure @@ -53286,6 +57181,7 @@ The options are: text/plain + LowestValueMostSecure @@ -53308,6 +57204,7 @@ The options are: text/plain + LastWrite @@ -53351,6 +57248,7 @@ The options are: text/plain phone + HighestValueMostSecure @@ -53374,6 +57272,7 @@ The options are: text/plain phone + HighestValueMostSecure @@ -53397,6 +57296,7 @@ The options are: text/plain phone + HighestValueMostSecure @@ -53439,6 +57339,7 @@ The options are: text/plain + LowestValueMostSecure @@ -53482,6 +57383,7 @@ The options are: text/plain phone + LowestValueMostSecure @@ -53505,6 +57407,7 @@ The options are: text/plain phone + LowestValueMostSecure @@ -53528,6 +57431,7 @@ The options are: text/plain phone + LowestValueMostSecure @@ -53551,6 +57455,7 @@ The options are: text/plain phone + LowestValueMostSecure @@ -53574,6 +57479,7 @@ The options are: text/plain phone + LowestValueMostSecure @@ -53597,6 +57503,7 @@ The options are: text/plain phone + LowestValueMostSecure @@ -53620,6 +57527,7 @@ The options are: text/plain phone + LowestValueMostSecure @@ -53643,6 +57551,7 @@ The options are: text/plain phone + LowestValueMostSecure @@ -53666,6 +57575,7 @@ The options are: text/plain phone + LowestValueMostSecure @@ -53689,6 +57599,7 @@ The options are: text/plain phone + LowestValueMostSecure @@ -53712,6 +57623,7 @@ The options are: text/plain phone + LastWrite @@ -53735,6 +57647,7 @@ The options are: text/plain phone + LastWrite @@ -53757,6 +57670,7 @@ The options are: text/plain + LowestValueMostSecure @@ -53780,6 +57694,7 @@ The options are: text/plain phone + LowestValueMostSecure @@ -53802,6 +57717,7 @@ The options are: text/plain + LowestValueMostSecure @@ -53824,6 +57740,7 @@ The options are: text/plain + LowestValueMostSecure @@ -53847,6 +57764,7 @@ The options are: text/plain phone + LowestValueMostSecure @@ -53869,6 +57787,7 @@ The options are: text/plain + LowestValueMostSecure @@ -53892,6 +57811,7 @@ The options are: text/plain phone + LowestValueMostSecure @@ -53915,6 +57835,7 @@ The options are: text/plain phone + LowestValueMostSecure @@ -53937,6 +57858,7 @@ The options are: text/plain + LowestValueMostSecure @@ -53959,6 +57881,7 @@ The options are: text/plain + LowestValueMostSecure @@ -53981,6 +57904,7 @@ The options are: text/plain + LowestValueMostSecure @@ -54003,6 +57927,7 @@ The options are: text/plain + LowestValueMostSecure @@ -54025,6 +57950,7 @@ The options are: text/plain + LowestValueMostSecure @@ -54047,6 +57973,7 @@ The options are: text/plain + LowestValueMostSecure @@ -54070,6 +57997,7 @@ The options are: text/plain phone + LastWrite @@ -54093,6 +58021,7 @@ The options are: text/plain phone + HighestValueMostSecure @@ -54116,6 +58045,7 @@ The options are: text/plain phone + LastWrite @@ -54138,6 +58068,30 @@ The options are: + + AllowDiskHealthModelUpdates + + + + + + 1 + + + + + + + + + + + text/plain + + phone + LastWrite + + EnhancedStorageDevices @@ -54162,6 +58116,7 @@ The options are: enhancedstorage.admx EnhancedStorage~AT~System~EnStorDeviceAccess TCGSecurityActivationDisabled + LastWrite @@ -54204,6 +58159,7 @@ The options are: text/plain + LowestValueMostSecure @@ -54226,6 +58182,7 @@ The options are: text/plain + LowestValueMostSecure @@ -54248,6 +58205,7 @@ The options are: text/plain + LowestValueMostSecure @@ -54270,6 +58228,7 @@ The options are: text/plain + LowestValueMostSecure @@ -54292,6 +58251,7 @@ The options are: text/plain + LowestValueMostSecure @@ -54314,6 +58274,7 @@ The options are: text/plain + LowestValueMostSecure @@ -54336,6 +58297,7 @@ The options are: text/plain + LowestValueMostSecure @@ -54358,6 +58320,7 @@ The options are: text/plain + LowestValueMostSecure @@ -54384,6 +58347,7 @@ The options are: earlylauncham.admx EarlyLaunchAM~AT~System~ELAMCategory POL_DriverLoadPolicy_Name + LastWrite @@ -54392,7 +58356,7 @@ The options are: - This policy setting lets you prevent apps and features from working with files on OneDrive. If you enable this policy setting: users can’t access OneDrive from the OneDrive app and file picker; Windows Store apps can’t access OneDrive using the WinRT API; OneDrive doesn’t appear in the navigation pane in File Explorer; OneDrive files aren’t kept in sync with the cloud; Users can’t automatically upload photos and videos from the camera roll folder. If you disable or do not configure this policy setting, apps and features can work with OneDrive file storage. + This policy setting lets you prevent apps and features from working with files on OneDrive. If you enable this policy setting: users can’t access OneDrive from the OneDrive app and file picker; Windows Store apps can’t access OneDrive using the WinRT API; OneDrive doesn’t appear in the navigation pane in File Explorer; OneDrive files aren’t kept in sync with the cloud; Users can’t automatically upload photos and videos from the camera roll folder. If you disable or do not configure this policy setting, apps and features can work with OneDrive file storage. 0 @@ -54406,6 +58370,7 @@ The options are: text/plain + HighestValueMostSecure @@ -54432,6 +58397,30 @@ The options are: systemrestore.admx SystemRestore~AT~System~SR SR_DisableSR + LastWrite + + + + FeedbackHubAlwaysSaveDiagnosticsLocally + + + + + Diagnostic files created when a feedback is filed in the Feedback Hub app will always be saved locally. If this policy is not present or set to false, users will be presented with the option to save locally. The default is to not save locally. + 0 + + + + + + + + + + + text/plain + + LastWrite @@ -54454,6 +58443,7 @@ The options are: text/plain + LastWrite @@ -54497,6 +58487,7 @@ The options are: text/plain phone + LowestValueMostSecure @@ -54520,6 +58511,7 @@ The options are: text/plain phone + LowestValueMostSecure @@ -54543,6 +58535,7 @@ The options are: text/plain phone + LowestValueMostSecure @@ -54566,6 +58559,7 @@ The options are: text/plain phone + HighestValueMostSecure @@ -54589,6 +58583,7 @@ The options are: text/plain phone + LowestValueMostSecure @@ -54612,6 +58607,7 @@ The options are: text/plain phone + LowestValueMostSecure @@ -54635,6 +58631,7 @@ The options are: text/plain phone + LowestValueMostSecure @@ -54657,6 +58654,7 @@ The options are: text/plain + LowestValueMostSecure @@ -54680,6 +58678,7 @@ The options are: text/plain phone + LowestValueMostSecure @@ -54702,6 +58701,7 @@ The options are: text/plain + HighestValueMostSecure @@ -54725,6 +58725,7 @@ The options are: text/plain phone + HighestValueMostSecure @@ -54748,6 +58749,7 @@ The options are: text/plain phone + HighestValueMostSecure @@ -54791,6 +58793,7 @@ The options are: text/plain desktop + LowestValueMostSecure @@ -54833,6 +58836,7 @@ The options are: text/plain + LastWrite @@ -54855,6 +58859,7 @@ The options are: text/plain + LastWrite @@ -54877,6 +58882,7 @@ The options are: text/plain + LastWrite @@ -54899,6 +58905,7 @@ The options are: text/plain + LowestValueMostSecure @@ -54921,6 +58928,7 @@ The options are: text/plain + LastWrite @@ -54944,6 +58952,7 @@ The options are: text/plain phone + LowestValueMostSecure @@ -54966,6 +58975,7 @@ The options are: text/plain + LowestValueMostSecure @@ -54988,6 +58998,7 @@ The options are: text/plain + LowestValueMostSecure @@ -55010,6 +59021,7 @@ The options are: text/plain + LastWrite @@ -55032,6 +59044,7 @@ The options are: text/plain + LastWrite @@ -55054,6 +59067,7 @@ The options are: text/plain + LastWrite @@ -55076,6 +59090,7 @@ The options are: text/plain + LastWrite @@ -55098,6 +59113,7 @@ The options are: text/plain + LastWrite @@ -55120,6 +59136,7 @@ The options are: text/plain + LastWrite @@ -55142,6 +59159,7 @@ The options are: text/plain + LastWrite @@ -55164,6 +59182,7 @@ The options are: text/plain + LastWrite @@ -55186,6 +59205,30 @@ The options are: text/plain + LastWrite + + + + DisableDualScan + + + + + Do not allow update deferral policies to cause scans against Windows Update + 0 + + + + + + + + + + + text/plain + + LastWrite @@ -55208,6 +59251,7 @@ The options are: text/plain + LastWrite @@ -55230,6 +59274,7 @@ The options are: text/plain + LastWrite @@ -55252,6 +59297,7 @@ The options are: text/plain + LastWrite @@ -55274,6 +59320,7 @@ The options are: text/plain + LastWrite @@ -55296,6 +59343,7 @@ The options are: text/plain + LastWrite @@ -55318,6 +59366,7 @@ The options are: text/plain + LowestValueMostSecure @@ -55340,10 +59389,11 @@ The options are: text/plain + LowestValueMostSecure - ManageBuildPreview + ManagePreviewBuilds @@ -55362,6 +59412,7 @@ The options are: text/plain + LastWrite @@ -55384,6 +59435,7 @@ The options are: text/plain + LastWrite @@ -55406,6 +59458,7 @@ The options are: text/plain + LastWrite @@ -55428,6 +59481,7 @@ The options are: text/plain + LastWrite @@ -55450,6 +59504,7 @@ The options are: text/plain + LastWrite @@ -55472,6 +59527,7 @@ The options are: text/plain + LastWrite @@ -55494,6 +59550,7 @@ The options are: text/plain + LowestValueMostSecure @@ -55516,6 +59573,7 @@ The options are: text/plain + LastWrite @@ -55538,6 +59596,7 @@ The options are: text/plain + HighestValueMostSecure @@ -55560,6 +59619,7 @@ The options are: text/plain + LowestValueMostSecure @@ -55582,6 +59642,7 @@ The options are: text/plain + LowestValueMostSecure @@ -55604,6 +59665,7 @@ The options are: text/plain + LowestValueMostSecure @@ -55626,6 +59688,7 @@ The options are: text/plain + LowestValueMostSecure @@ -55648,6 +59711,7 @@ The options are: text/plain + LowestValueMostSecure @@ -55670,6 +59734,7 @@ The options are: text/plain + LowestValueMostSecure @@ -55692,6 +59757,7 @@ The options are: text/plain + LowestValueMostSecure @@ -55714,6 +59780,7 @@ The options are: text/plain + LastWrite @@ -55736,6 +59803,7 @@ The options are: text/plain + LastWrite @@ -55758,6 +59826,7 @@ The options are: text/plain + LastWrite @@ -55780,6 +59849,7 @@ The options are: text/plain + LastWrite @@ -55802,6 +59872,7 @@ The options are: text/plain + LastWrite @@ -55825,6 +59896,7 @@ The options are: text/plain phone + LastWrite @@ -55867,6 +59939,7 @@ The options are: text/plain + LowestValueMostSecure @@ -55889,6 +59962,7 @@ The options are: text/plain + LowestValueMostSecure @@ -55911,6 +59985,7 @@ The options are: text/plain + LowestValueMostSecure @@ -55933,6 +60008,7 @@ The options are: text/plain + LowestValueMostSecure @@ -55955,6 +60031,7 @@ The options are: text/plain + LowestValueMostSecure @@ -55977,6 +60054,7 @@ The options are: text/plain + HighestValueMostSecureZeroHasNoLimits @@ -56020,6 +60098,7 @@ The options are: text/plain phone + LastWrite @@ -56043,6 +60122,7 @@ The options are: text/plain phone + LastWrite @@ -56066,6 +60146,7 @@ The options are: text/plain phone + LastWrite @@ -56089,6 +60170,7 @@ The options are: text/plain phone + LastWrite @@ -56112,6 +60194,7 @@ The options are: text/plain phone + LastWrite @@ -56135,6 +60218,7 @@ The options are: text/plain phone + LastWrite @@ -56158,6 +60242,7 @@ The options are: text/plain phone + LastWrite @@ -56181,6 +60266,7 @@ The options are: text/plain phone + LastWrite @@ -56204,6 +60290,7 @@ The options are: text/plain phone + LastWrite @@ -56227,6 +60314,7 @@ The options are: text/plain phone + LastWrite @@ -56250,6 +60338,7 @@ The options are: text/plain phone + LastWrite @@ -56273,6 +60362,7 @@ The options are: text/plain phone + LastWrite @@ -56296,6 +60386,7 @@ The options are: text/plain phone + LastWrite @@ -56319,6 +60410,7 @@ The options are: text/plain phone + LastWrite @@ -56362,6 +60454,7 @@ The options are: text/plain phone + LowestValueMostSecure @@ -56385,6 +60478,7 @@ The options are: text/plain phone + LowestValueMostSecure @@ -56431,6 +60525,7 @@ The options are: logon.admx Logon~AT~System~Logon DisableLockScreenAppNotifications + LastWrite @@ -56457,6 +60552,7 @@ The options are: logon.admx Logon~AT~System~Logon DontDisplayNetworkSelectionUI + LastWrite @@ -56479,6 +60575,7 @@ The options are: text/plain + HighestValueMostSecure @@ -56521,6 +60618,7 @@ The options are: text/plain + LowestValueMostSecure @@ -56543,6 +60641,7 @@ The options are: text/plain + LowestValueMostSecure @@ -56567,6 +60666,7 @@ The options are: text/plain + LowestValueMostSecure @@ -56591,6 +60691,7 @@ The options are: text/plain + LowestValueMostSecure @@ -56616,6 +60717,7 @@ The options are: text/plain phone + LowestValueMostSecure @@ -56640,6 +60742,7 @@ The options are: text/plain + LowestValueMostSecure @@ -56662,6 +60765,7 @@ The options are: text/plain + LowestValueMostSecure @@ -56686,6 +60790,7 @@ The options are: text/plain + LowestValueMostSecure From e3c9ffcd872d09844a5daa915973452fda7ec853 Mon Sep 17 00:00:00 2001 From: Maricia Alforque Date: Thu, 24 Aug 2017 17:38:23 +0000 Subject: [PATCH 16/22] Merged PR 2862: Update to Privacy/AllowAutoAcceptPairingAndPrivacyConsentPrompts in Policy CSP --- .../mdm/new-in-windows-mdm-enrollment-management.md | 5 +++++ windows/client-management/mdm/policy-csp-privacy.md | 11 +++++++---- 2 files changed, 12 insertions(+), 4 deletions(-) diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index 494fb897c3..a55e1acb45 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -1443,6 +1443,11 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware
  • Defender/EnableGuardMyFolders to Defender/EnableControlledFolderAccess
  • Added links to the additional [ADMX-backed BitLocker policies](policy-csp-bitlocker.md).

    +

    There were issues reported with the previous release of the following policies. These issues were fixed in Window 10, version 1709:

    +
      +
    • Privacy/AllowAutoAcceptPairingAndPrivacyConsentPrompts
    • +
    • Start/HideAppList
    • +
    diff --git a/windows/client-management/mdm/policy-csp-privacy.md b/windows/client-management/mdm/policy-csp-privacy.md index a390391af7..8f5423f922 100644 --- a/windows/client-management/mdm/policy-csp-privacy.md +++ b/windows/client-management/mdm/policy-csp-privacy.md @@ -34,11 +34,11 @@ ms.date: 08/21/2017 Mobile Enterprise - check mark1 - check mark1 + check mark3 + check mark3 - check mark1 - check mark1 + check mark3 + check mark3 check mark check mark @@ -48,6 +48,9 @@ ms.date: 08/21/2017

    Allows or disallows the automatic acceptance of the pairing and privacy user consent dialog when launching apps. +> [!Note] +> There were issues reported with the previous release of this policy and a fix was added in Windows 10, version 1709. +

    The following list shows the supported values: - 0 (default)– Not allowed. From 3b27342e54d02192623fcb299b925841e7bd93a3 Mon Sep 17 00:00:00 2001 From: Maricia Alforque Date: Thu, 24 Aug 2017 17:38:53 +0000 Subject: [PATCH 17/22] Merged PR 2863: Update to Start/HideAppList in Policy CSP --- windows/client-management/mdm/policy-csp-start.md | 11 +++++++---- 1 file changed, 7 insertions(+), 4 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-start.md b/windows/client-management/mdm/policy-csp-start.md index 6c0dd2a75b..c33b8625ee 100644 --- a/windows/client-management/mdm/policy-csp-start.md +++ b/windows/client-management/mdm/policy-csp-start.md @@ -448,10 +448,10 @@ ms.date: 08/09/2017 cross mark - check mark2 + check mark3 - check mark2 - check mark2 + check mark3 + check mark3 cross mark cross mark @@ -462,7 +462,10 @@ ms.date: 08/09/2017 > [!NOTE] > This policy requires reboot to take effect. -

    Added in Windows 10, version 1703. Allows IT Admins to configure Start by collapsing or removing the all apps list. +

    Allows IT Admins to configure Start by collapsing or removing the all apps list. + +> [!Note] +> There were issues reported with the previous release of this policy and a fix was added in Windows 10, version 1709.

    The following list shows the supported values: From e28e96c2fac5b140464dc1ac97559f3d0474af88 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Thu, 24 Aug 2017 19:17:17 +0000 Subject: [PATCH 18/22] Merged PR 2844: Moved service acct configuration under step 11, and updated ms.date, fixed HEAD conflict Moved service acct configuration under step 11 in "poc" topic, and updated ms.date in several topics --- .../deployment/deploy-enterprise-licenses.md | 1 + windows/deployment/deploy-whats-new.md | 1 + .../deployment/vda-subscription-activation.md | 1 + .../windows-10-enterprise-e3-overview.md | 1 + ...s-10-enterprise-subscription-activation.md | 1 + windows/deployment/windows-10-poc-mdt.md | 1 + .../windows-10-poc-sc-config-mgr.md | 1 + windows/deployment/windows-10-poc.md | 43 ++++++++++--------- 8 files changed, 29 insertions(+), 21 deletions(-) diff --git a/windows/deployment/deploy-enterprise-licenses.md b/windows/deployment/deploy-enterprise-licenses.md index 40f279e10f..a05a03bbe9 100644 --- a/windows/deployment/deploy-enterprise-licenses.md +++ b/windows/deployment/deploy-enterprise-licenses.md @@ -7,6 +7,7 @@ ms.mktglfcycl: deploy localizationpriority: high ms.sitesec: library ms.pagetype: mdt +ms.date: 08/23/2017 author: greg-lindsay --- diff --git a/windows/deployment/deploy-whats-new.md b/windows/deployment/deploy-whats-new.md index fddacf3a05..e11c92867c 100644 --- a/windows/deployment/deploy-whats-new.md +++ b/windows/deployment/deploy-whats-new.md @@ -7,6 +7,7 @@ ms.localizationpriority: high ms.prod: w10 ms.sitesec: library ms.pagetype: deploy +ms.date: 08/23/2017 author: greg-lindsay --- diff --git a/windows/deployment/vda-subscription-activation.md b/windows/deployment/vda-subscription-activation.md index 8d3a787f3c..a6f560cc33 100644 --- a/windows/deployment/vda-subscription-activation.md +++ b/windows/deployment/vda-subscription-activation.md @@ -7,6 +7,7 @@ ms.mktglfcycl: deploy localizationpriority: high ms.sitesec: library ms.pagetype: mdt +ms.date: 08/23/2017 author: greg-lindsay --- diff --git a/windows/deployment/windows-10-enterprise-e3-overview.md b/windows/deployment/windows-10-enterprise-e3-overview.md index f76208ce9c..5f663ae222 100644 --- a/windows/deployment/windows-10-enterprise-e3-overview.md +++ b/windows/deployment/windows-10-enterprise-e3-overview.md @@ -7,6 +7,7 @@ ms.mktglfcycl: deploy ms.localizationpriority: high ms.sitesec: library ms.pagetype: mdt +ms.date: 08/23/2017 author: greg-lindsay --- diff --git a/windows/deployment/windows-10-enterprise-subscription-activation.md b/windows/deployment/windows-10-enterprise-subscription-activation.md index 8e9912ed68..c767d18075 100644 --- a/windows/deployment/windows-10-enterprise-subscription-activation.md +++ b/windows/deployment/windows-10-enterprise-subscription-activation.md @@ -7,6 +7,7 @@ ms.mktglfcycl: deploy localizationpriority: high ms.sitesec: library ms.pagetype: mdt +ms.date: 08/23/2017 author: greg-lindsay --- diff --git a/windows/deployment/windows-10-poc-mdt.md b/windows/deployment/windows-10-poc-mdt.md index d9870313ca..f7f79e2f18 100644 --- a/windows/deployment/windows-10-poc-mdt.md +++ b/windows/deployment/windows-10-poc-mdt.md @@ -7,6 +7,7 @@ ms.sitesec: library ms.pagetype: deploy keywords: deployment, automate, tools, configure, mdt ms.localizationpriority: high +ms.date: 08/23/2017 author: greg-lindsay --- diff --git a/windows/deployment/windows-10-poc-sc-config-mgr.md b/windows/deployment/windows-10-poc-sc-config-mgr.md index 63e2727b2a..eb042d424b 100644 --- a/windows/deployment/windows-10-poc-sc-config-mgr.md +++ b/windows/deployment/windows-10-poc-sc-config-mgr.md @@ -7,6 +7,7 @@ ms.sitesec: library ms.pagetype: deploy keywords: deployment, automate, tools, configure, sccm ms.localizationpriority: high +ms.date: 08/23/2017 author: greg-lindsay --- diff --git a/windows/deployment/windows-10-poc.md b/windows/deployment/windows-10-poc.md index 621de876bd..5a67eebb9e 100644 --- a/windows/deployment/windows-10-poc.md +++ b/windows/deployment/windows-10-poc.md @@ -7,6 +7,7 @@ ms.sitesec: library ms.pagetype: deploy keywords: deployment, automate, tools, configure, mdt, sccm ms.localizationpriority: high +ms.date: 08/23/2017 author: greg-lindsay --- @@ -771,6 +772,27 @@ The second Windows Server 2012 R2 VHD needs to be expanded in size from 40GB to Add-DnsServerForwarder -IPAddress 192.168.0.2 + **Configure service and user accounts** + + Windows 10 deployment with MDT and System Center Configuration Manager requires specific accounts to perform some actions. Service accounts will be created to use for these tasks. A user account is also added in the contoso.com domain that can be used for testing purposes. In the test lab environment, passwords are set to never expire. + + >To keep this test lab relatively simple, we will not create a custom OU structure and set permissions. Required permissions are enabled by adding accounts to the Domain Admins group. To configure these settings in a production environment, see [Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](deploy-windows-sccm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md) + + On DC1, open an elevated Windows PowerShell prompt and type the following commands: + +

    +    New-ADUser -Name User1 -UserPrincipalName user1 -Description "User account" -AccountPassword (ConvertTo-SecureString "pass@word1" -AsPlainText -Force) -ChangePasswordAtLogon $false -Enabled $true
    +    New-ADUser -Name MDT_BA -UserPrincipalName MDT_BA -Description "MDT Build Account" -AccountPassword (ConvertTo-SecureString "pass@word1" -AsPlainText -Force) -ChangePasswordAtLogon $false -Enabled $true
    +    New-ADUser -Name CM_JD -UserPrincipalName CM_JD -Description "Configuration Manager Join Domain Account" -AccountPassword (ConvertTo-SecureString "pass@word1" -AsPlainText -Force) -ChangePasswordAtLogon $false -Enabled $true
    +    New-ADUser -Name CM_NAA -UserPrincipalName CM_NAA -Description "Configuration Manager Network Access Account" -AccountPassword (ConvertTo-SecureString "pass@word1" -AsPlainText -Force) -ChangePasswordAtLogon $false -Enabled $true
    +    Add-ADGroupMember "Domain Admins" MDT_BA,CM_JD,CM_NAA
    +    Set-ADUser -Identity user1 -PasswordNeverExpires $true
    +    Set-ADUser -Identity administrator -PasswordNeverExpires $true
    +    Set-ADUser -Identity MDT_BA -PasswordNeverExpires $true
    +    Set-ADUser -Identity CM_JD -PasswordNeverExpires $true
    +    Set-ADUser -Identity CM_NAA -PasswordNeverExpires $true
    +    
    + 12. Minimize the DC1 VM window but **do not stop** the VM. Next, the client VM will be started and joined to the contoso.com domain. This is done before adding a gateway to the PoC network so that there is no danger of duplicate DNS registrations for the physical client and its cloned VM in the corporate domain. @@ -984,27 +1006,6 @@ The second Windows Server 2012 R2 VHD needs to be expanded in size from 40GB to Restart-Computer -### Configure service and user accounts - -Windows 10 deployment with MDT and System Center Configuration Manager requires specific accounts to perform some actions. Service accounts will be created to use for these tasks. A user account is also added in the contoso.com domain that can be used for testing purposes. In the test lab environment, passwords are set to never expire. - ->To keep this test lab relatively simple, we will not create a custom OU structure and set permissions. Required permissions are enabled by adding accounts to the Domain Admins group. To configure these settings in a production environment, see [Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](deploy-windows-sccm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md) - -On DC1, open an elevated Windows PowerShell prompt and type the following commands: - -
    -New-ADUser -Name User1 -UserPrincipalName user1 -Description "User account" -AccountPassword (ConvertTo-SecureString "pass@word1" -AsPlainText -Force) -ChangePasswordAtLogon $false -Enabled $true
    -New-ADUser -Name MDT_BA -UserPrincipalName MDT_BA -Description "MDT Build Account" -AccountPassword (ConvertTo-SecureString "pass@word1" -AsPlainText -Force) -ChangePasswordAtLogon $false -Enabled $true
    -New-ADUser -Name CM_JD -UserPrincipalName CM_JD -Description "Configuration Manager Join Domain Account" -AccountPassword (ConvertTo-SecureString "pass@word1" -AsPlainText -Force) -ChangePasswordAtLogon $false -Enabled $true
    -New-ADUser -Name CM_NAA -UserPrincipalName CM_NAA -Description "Configuration Manager Network Access Account" -AccountPassword (ConvertTo-SecureString "pass@word1" -AsPlainText -Force) -ChangePasswordAtLogon $false -Enabled $true
    -Add-ADGroupMember "Domain Admins" MDT_BA,CM_JD,CM_NAA
    -Set-ADUser -Identity user1 -PasswordNeverExpires $true
    -Set-ADUser -Identity administrator -PasswordNeverExpires $true
    -Set-ADUser -Identity MDT_BA -PasswordNeverExpires $true
    -Set-ADUser -Identity CM_JD -PasswordNeverExpires $true
    -Set-ADUser -Identity CM_NAA -PasswordNeverExpires $true
    -
    - This completes configuration of the starting PoC environment. Additional services and tools are installed in subsequent guides. ## Appendix A: Verify the configuration From 12e372ce3adc36d46a88797b9bf238a7b1c7faf6 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Thu, 24 Aug 2017 21:37:41 +0000 Subject: [PATCH 19/22] Merged PR 2876: Fixing wrong LTSC references credit to - andreiztm (GitHub) --- .../update/waas-servicing-channels-windows-10-updates.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/deployment/update/waas-servicing-channels-windows-10-updates.md b/windows/deployment/update/waas-servicing-channels-windows-10-updates.md index dd5cbaf8b7..cddacc1917 100644 --- a/windows/deployment/update/waas-servicing-channels-windows-10-updates.md +++ b/windows/deployment/update/waas-servicing-channels-windows-10-updates.md @@ -181,12 +181,12 @@ During the life of a device, it may be necessary or desirable to switch between Use media to upgrade to the latest Windows Insider Program build. -Long-Term Servicing Channel (Targeted) -Use media to upgrade to a later Long-Term Servicing Channel build. (Note that the Long-Term Servicing Channel build must be a later build.) +Semi-Annual Channel (Targeted) +Use media to upgrade. Note that the Semi-Annual Channel build must be a later build. -Long-Term Servicing Channel -Use media to upgrade to a later Long-Term Servicing Channel for Business build (Long-Term Servicing Channel build plus fixes). Note that it must be a later build. +Semi-Annual Channel +Use media to upgrade. Note that the Semi-Annual Channel build must be a later build. From 7d33997c6cba8f798d58961ee8a84552409c6c01 Mon Sep 17 00:00:00 2001 From: Iaan D'Souza-Wiltshire Date: Thu, 24 Aug 2017 15:04:34 -0700 Subject: [PATCH 20/22] gp updates for 3ps --- .../use-group-policy-windows-defender-antivirus.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md b/windows/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md index 79abd8d757..eb1d2a3b47 100644 --- a/windows/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md +++ b/windows/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md @@ -82,7 +82,7 @@ Reporting | Configure time out for detections in non-critical failed state | Not Reporting | Configure time out for detections in recently remediated state | Not used Reporting | Configure time out for detections requiring additional action | Not used Reporting | Turn off enhanced notifications | [Configure the notifications that appear on endpoints](configure-notifications-windows-defender-antivirus.md) -Root | Turn off Windows Defender Antivirus | Not used +Root | Turn off Windows Defender Antivirus | Not used (This setting must be set to **Not configured** to ensure any installed third-party antivirus apps work correctly) Root | Define addresses to bypass proxy server | Not used Root | Define proxy auto-config (.pac) for connecting to the network | Not used Root | Define proxy server for connecting to the network | Not used From ec8cedeb1400db8ac989bc43ae825effb61eaadf Mon Sep 17 00:00:00 2001 From: athamala <9799916+athamala@users.noreply.github.com> Date: Fri, 25 Aug 2017 10:08:26 +0300 Subject: [PATCH 21/22] Added missing Ext/ node to last six nodes Based on the tree picture and DDF file for DevDetail and most importantly based on tests, Items VoLTEServiceSetting, WlanIPv4Address, WlanIPv6Address, WlanDnsSuffix, WlanSubnetMask, DeviceHardwareData are underneath Ext Node instead of Root node. --- windows/client-management/mdm/devdetail-csp.md | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/windows/client-management/mdm/devdetail-csp.md b/windows/client-management/mdm/devdetail-csp.md index 45e1aa1d54..5eb786803f 100644 --- a/windows/client-management/mdm/devdetail-csp.md +++ b/windows/client-management/mdm/devdetail-csp.md @@ -150,32 +150,32 @@ The following diagram shows the DevDetail configuration service provider managem > [!NOTE] > This is not supported in Windows 10 for desktop editions. -**VoLTEServiceSetting** +**Ext/VoLTEServiceSetting**

    Returns the VoLTE service to on or off. This is only exposed to mobile operator OMA-DM servers.

    Supported operation is Get. -**WlanIPv4Address** +**Ext/WlanIPv4Address**

    Returns the IPv4 address of the active Wi-Fi connection. This is only exposed to enterprise OMA DM servers.

    Supported operation is Get. -**WlanIPv6Address** +**Ext/WlanIPv6Address**

    Returns the IPv6 address of the active Wi-Fi connection. This is only exposed to enterprise OMA-DM servers.

    Supported operation is Get. -**WlanDnsSuffix** +**Ext/WlanDnsSuffix**

    Returns the DNS suffix of the active Wi-Fi connection. This is only exposed to enterprise OMA-DM servers.

    Supported operation is Get. -**WlanSubnetMask** +**Ext/WlanSubnetMask**

    Returns the subnet mask for the active Wi-Fi connection. This is only exposed to enterprise OMA-DM servers.

    Supported operation is Get. -**DeviceHardwareData** +**Ext/DeviceHardwareData**

    Added in Windows 10 version 1703. Returns a base64-encoded string of the hardware parameters of a device. > [!Note] From 171b38ccab8a0e265bd142709136c7034d0baf1c Mon Sep 17 00:00:00 2001 From: Maricia Alforque Date: Fri, 25 Aug 2017 18:11:08 +0000 Subject: [PATCH 22/22] Merged PR 2893: Policy CSP updated to add new Browser policies --- ...ew-in-windows-mdm-enrollment-management.md | 6 +- .../policy-configuration-service-provider.md | 8 +- .../mdm/policy-csp-browser.md | 90 ++++++++++++++++++- 3 files changed, 101 insertions(+), 3 deletions(-) diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index a55e1acb45..0dc3060c96 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -10,7 +10,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 08/21/2017 +ms.date: 08/25/2017 --- # What's new in MDM enrollment and management @@ -984,6 +984,8 @@ For details about Microsoft mobile device management protocols for Windows 10 s [Policy CSP](policy-configuration-service-provider.md)

    Added the following new policies for Windows 10, version 1709:

      +
    • Browser/LockdownFavorites
    • +
    • Browser/ProvisionFavorites
    • CredentialProviders/DisableAutomaticReDeploymentCredentials
    • DeviceGuard/EnableVirtualizationBasedSecurity
    • DeviceGuard/RequirePlatformSecurityFeatures
    • @@ -1407,6 +1409,8 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware [Policy CSP](policy-configuration-service-provider.md)

      Added the following new policies for Windows 10, version 1709:

        +
      • Browser/ProvisionFavorites
      • +
      • Browser/LockdownFavorites
      • ExploitGuard/ExploitProtectionSettings
      • LocalPoliciesSecurityOptions/Accounts_BlockMicrosoftAccounts
      • LocalPoliciesSecurityOptions/Accounts_EnableAdministratorAccountStatus
      • diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index cfefa4909b..750dc3fc1a 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -7,7 +7,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 08/21/2017 +ms.date: 08/25/2017 --- # Policy CSP @@ -456,6 +456,9 @@ The following diagram shows the Policy configuration service provider in tree fo
        Browser/HomePages
        +
        + Browser/LockdownFavorites +
        Browser/PreventAccessToAboutFlagsInMicrosoftEdge
        @@ -474,6 +477,9 @@ The following diagram shows the Policy configuration service provider in tree fo
        Browser/PreventUsingLocalHostIPAddressForWebRTC
        +
        + Browser/ProvisionFavorites +
        Browser/SendIntranetTraffictoInternetExplorer
        diff --git a/windows/client-management/mdm/policy-csp-browser.md b/windows/client-management/mdm/policy-csp-browser.md index f0d50ff7ac..89fd1b0f08 100644 --- a/windows/client-management/mdm/policy-csp-browser.md +++ b/windows/client-management/mdm/policy-csp-browser.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 08/09/2017 +ms.date: 08/25/2017 --- # Policy CSP - Browser @@ -965,6 +965,51 @@ Employees cannot remove these search engines, but they can set any one as the de > [!NOTE] > Turning this setting off, or not configuring it, sets your default Start pages to the webpages specified in App settings. + + + +**Browser/LockdownFavorites** + + + + + + + + + + + + + + + + + + + + + +
        HomeProBusinessEnterpriseEducationMobileMobile Enterprise
        cross markcheck mark3check mark3check mark3check mark3check mark3check mark3
        + + + +

        Added in Windows 10, version 1709. This policy setting lets you decide whether employees can add, import, sort, or edit the Favorites list on Microsoft Edge. + +

        If you enable this setting, employees won't be able to add, import, or change anything in the Favorites list. Also as part of this, Save a Favorite, Import settings, and the context menu items (such as, Create a new folder) are all turned off. + +> [!Important] +> Don't enable both this setting and the Keep favorites in sync between Internet Explorer and Microsoft Edge setting. Enabling both settings stops employees from syncing their favorites between Internet Explorer and Microsoft Edge. + +

          +
        • 0 - Disabled. Do not lockdown Favorites.
        • +
        • 1 - Enabled. Lockdown Favorites.
        • +
        + +

        If you disable or don't configure this setting (default), employees can add, import and make changes to the Favorites list. + +

        Data type is integer. Supported operations are Add, Get, Replace, and Delete. + @@ -1194,6 +1239,49 @@ Employees cannot remove these search engines, but they can set any one as the de +**Browser/ProvisionFavorites** + + + + + + + + + + + + + + + + + + + + + +
        HomeProBusinessEnterpriseEducationMobileMobile Enterprise
        cross markcheck mark3check mark3check mark3check mark3check mark3check mark3
        + + + +

        Added in Windows 10, version 1709. This policy setting allows you to configure a default set of favorites, which will appear for employees. Employees cannot modify, sort, move, export or delete these provisioned favorites. Specify the URL which points to the file that has all the data for provisioning favorites (in html format). You can export a set of favorites from Edge and use that html file for provisioning user machines. +  +

        URL can be specified as: + +- HTTP location: "SiteList"="http://localhost:8080/URLs.html" +- Local network: "SiteList"="\\network\shares\URLs.html" +- Local file: "SiteList"="file:///c:\\Users\\\\Documents\\URLs.html" + +> [!Important] +> Don't enable both this setting and the Keep favorites in sync between Internet Explorer and Microsoft Edge setting. Enabling both settings stops employees from syncing their favorites between Internet Explorer and Microsoft Edge. + +

        If you disable or don't configure this setting, employees will see the favorites they set in the Hub and Favorites Bar. + +

        Data type is string. Supported operations are Add, Get, Replace, and Delete. + + + **Browser/SendIntranetTraffictoInternetExplorer**