From cf9de3c509903168ee2fdabb50800ac6cfd037ac Mon Sep 17 00:00:00 2001 From: Aabha Thipsay Date: Tue, 9 Oct 2018 10:43:10 -0700 Subject: [PATCH 01/76] sample page --- .../hello-for-business/FIDOTest.md | 15 +++++++++++++++ 1 file changed, 15 insertions(+) create mode 100644 windows/security/identity-protection/hello-for-business/FIDOTest.md diff --git a/windows/security/identity-protection/hello-for-business/FIDOTest.md b/windows/security/identity-protection/hello-for-business/FIDOTest.md new file mode 100644 index 0000000000..769d4859f3 --- /dev/null +++ b/windows/security/identity-protection/hello-for-business/FIDOTest.md @@ -0,0 +1,15 @@ +--- +title: Planning an adequate number of Windows Server 2016 Domain Controllers for Windows Hello for Business deployments +description: Planning an adequate number of Windows Server 2016 Domain Controllers for Windows Hello for Business deployments +keywords: identity, PIN, biometric, Hello, passport, WHFB, hybrid, key-trust +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security, mobile +author: mikestephens-MS +ms.author: mstephen +ms.localizationpriority: medium +ms.date: 08/20/2018 +--- +# Test Page for FIDO +I was there hello From 91ad3f0f1f64d2ee01d9ca6fb9e5df524c98ea89 Mon Sep 17 00:00:00 2001 From: Aabha Thipsay Date: Thu, 25 Oct 2018 15:30:11 -0700 Subject: [PATCH 02/76] First draft Microsoft compatible security keys --- .../hello-for-business/FIDOTest.md | 15 ----------- .../microsoft-compatible-security-key.md | 27 +++++++++++++++++++ 2 files changed, 27 insertions(+), 15 deletions(-) delete mode 100644 windows/security/identity-protection/hello-for-business/FIDOTest.md create mode 100644 windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key.md diff --git a/windows/security/identity-protection/hello-for-business/FIDOTest.md b/windows/security/identity-protection/hello-for-business/FIDOTest.md deleted file mode 100644 index 769d4859f3..0000000000 --- a/windows/security/identity-protection/hello-for-business/FIDOTest.md +++ /dev/null @@ -1,15 +0,0 @@ ---- -title: Planning an adequate number of Windows Server 2016 Domain Controllers for Windows Hello for Business deployments -description: Planning an adequate number of Windows Server 2016 Domain Controllers for Windows Hello for Business deployments -keywords: identity, PIN, biometric, Hello, passport, WHFB, hybrid, key-trust -ms.prod: w10 -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security, mobile -author: mikestephens-MS -ms.author: mstephen -ms.localizationpriority: medium -ms.date: 08/20/2018 ---- -# Test Page for FIDO -I was there hello diff --git a/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key.md b/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key.md new file mode 100644 index 0000000000..e71013ebe8 --- /dev/null +++ b/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key.md @@ -0,0 +1,27 @@ +--- +title: Microsoft compatible security key +description: Windows 10 enables users to sign in to their device using a security key. How is a microsoft compatible security key different (and better) than any other FIDO2 security key +keywords: FIDO2, security key, CTAP, Hello, WHFB +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security, mobile +author: aabhathipsay-MS +ms.author: aathipsa +ms.localizationpriority: medium +ms.date: 10/25/2018 +--- +# What is a Microsoft compatible security key? +Microsoft has been aligned with the [FIDO Alliance](https://fidoalliance.org/) from the start with a mission to replace passwords with an easy to use, strong credential. We have been working with our partners to extensively test and deliver a seamless and secure authentication experience to end users. + +The FIDO2 CTAP specification contains a few optional features and extensions which are crucial to provide that seamless and secure experience. + +A security key **must** implement the following features and extensions from the FIDO2 CTAP protocol to be Microsoft compatible: + +| #
| Feature / Extension trust
| Why is this required?
| Relevant Section in FIDO2 CTAP specification
| +| --- | --- | --- | --- | +| 1 | Resident key | This feature enables the security key to be portable, where your credential is stored on the security key | Section XXX | +| 2 | Client pin | This feature enables security keys to protect your credentials with a second factor like PIN
We recommend strong multi-factor credentials for authentication to all Microsoft services| Section XXX | +| 3 | hmac-secret | This extension ensures you can sign-in to your device when it’s off-line or in airplane mode | Section XXX | +| 4 | Multiple accounts per RP | This feature ensures you can use the same security key across multiple services like MSA and AAD | Section XXX | + From 8b5e4e64b8058f9d363c3cda9c2ef1b73177cffa Mon Sep 17 00:00:00 2001 From: Aabha Thipsay Date: Tue, 30 Oct 2018 14:47:13 -0700 Subject: [PATCH 03/76] fix formatting --- .../hello-for-business/microsoft-compatible-security-key.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key.md b/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key.md index e71013ebe8..d91af39e14 100644 --- a/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key.md +++ b/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key.md @@ -22,6 +22,6 @@ A security key **must** implement the following features and extensions from the | --- | --- | --- | --- | | 1 | Resident key | This feature enables the security key to be portable, where your credential is stored on the security key | Section XXX | | 2 | Client pin | This feature enables security keys to protect your credentials with a second factor like PIN
We recommend strong multi-factor credentials for authentication to all Microsoft services| Section XXX | -| 3 | hmac-secret | This extension ensures you can sign-in to your device when it’s off-line or in airplane mode | Section XXX | +| 3 | hmac-secret | This extension ensures you can sign-in to your device when it's off-line or in airplane mode | Section XXX | | 4 | Multiple accounts per RP | This feature ensures you can use the same security key across multiple services like MSA and AAD | Section XXX | From b354ec0adbb7763544fd6c70c2a18731344dc275 Mon Sep 17 00:00:00 2001 From: Aabha Thipsay Date: Tue, 30 Oct 2018 16:05:02 -0700 Subject: [PATCH 04/76] Added link to CTAP spec --- .../microsoft-compatible-security-key.md | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key.md b/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key.md index d91af39e14..1d3573bda0 100644 --- a/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key.md +++ b/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key.md @@ -14,14 +14,14 @@ ms.date: 10/25/2018 # What is a Microsoft compatible security key? Microsoft has been aligned with the [FIDO Alliance](https://fidoalliance.org/) from the start with a mission to replace passwords with an easy to use, strong credential. We have been working with our partners to extensively test and deliver a seamless and secure authentication experience to end users. -The FIDO2 CTAP specification contains a few optional features and extensions which are crucial to provide that seamless and secure experience. +The [FIDO2 CTAP specification](https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-client-to-authenticator-protocol-v2.0-id-20180227.html) contains a few optional features and extensions which are crucial to provide that seamless and secure experience. A security key **must** implement the following features and extensions from the FIDO2 CTAP protocol to be Microsoft compatible: -| #
| Feature / Extension trust
| Why is this required?
| Relevant Section in FIDO2 CTAP specification
| -| --- | --- | --- | --- | -| 1 | Resident key | This feature enables the security key to be portable, where your credential is stored on the security key | Section XXX | -| 2 | Client pin | This feature enables security keys to protect your credentials with a second factor like PIN
We recommend strong multi-factor credentials for authentication to all Microsoft services| Section XXX | -| 3 | hmac-secret | This extension ensures you can sign-in to your device when it's off-line or in airplane mode | Section XXX | -| 4 | Multiple accounts per RP | This feature ensures you can use the same security key across multiple services like MSA and AAD | Section XXX | +| #
| Feature / Extension trust
| Why is this required?
| +| --- | --- | --- | +| 1 | Resident key | This feature enables the security key to be portable, where your credential is stored on the security key | +| 2 | Client pin | This feature enables security keys to protect your credentials with a second factor like PIN
We recommend strong multi-factor credentials for authentication to all Microsoft services| +| 3 | hmac-secret | This extension ensures you can sign-in to your device when it's off-line or in airplane mode | +| 4 | Multiple accounts per RP | This feature ensures you can use the same security key across multiple services like MSA and AAD | From 3587619a01ccef6ff76c55d490ef8e2f4aa3e493 Mon Sep 17 00:00:00 2001 From: Aabha Thipsay Date: Mon, 5 Nov 2018 11:32:10 -0800 Subject: [PATCH 05/76] Minor updates --- .../microsoft-compatible-security-key.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key.md b/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key.md index 1d3573bda0..cc059702b7 100644 --- a/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key.md +++ b/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key.md @@ -12,16 +12,16 @@ ms.localizationpriority: medium ms.date: 10/25/2018 --- # What is a Microsoft compatible security key? -Microsoft has been aligned with the [FIDO Alliance](https://fidoalliance.org/) from the start with a mission to replace passwords with an easy to use, strong credential. We have been working with our partners to extensively test and deliver a seamless and secure authentication experience to end users. +Microsoft has been aligned with the [FIDO Alliance](https://fidoalliance.org/) with a mission to replace passwords with an easy to use, strong 2FA credential. We have been working with our partners to extensively test and deliver a seamless and secure authentication experience to end users. The [FIDO2 CTAP specification](https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-client-to-authenticator-protocol-v2.0-id-20180227.html) contains a few optional features and extensions which are crucial to provide that seamless and secure experience. -A security key **must** implement the following features and extensions from the FIDO2 CTAP protocol to be Microsoft compatible: +A security key **MUST** implement the following features and extensions from the FIDO2 CTAP protocol to be Microsoft compatible: | #
| Feature / Extension trust
| Why is this required?
| | --- | --- | --- | | 1 | Resident key | This feature enables the security key to be portable, where your credential is stored on the security key | -| 2 | Client pin | This feature enables security keys to protect your credentials with a second factor like PIN
We recommend strong multi-factor credentials for authentication to all Microsoft services| +| 2 | Client pin | This feature enables you to protect your credentials with a second factor and applies to security keys that do not have an user interface| | 3 | hmac-secret | This extension ensures you can sign-in to your device when it's off-line or in airplane mode | -| 4 | Multiple accounts per RP | This feature ensures you can use the same security key across multiple services like MSA and AAD | +| 4 | Multiple accounts per RP | This feature ensures you can use the same security key across multiple services like Microsoft Account (MSA) and Azure Active Directory (AAD) | From 1d9948df07f761d91076828d90612dbf7d732582 Mon Sep 17 00:00:00 2001 From: Aabha Thipsay Date: Wed, 7 Nov 2018 14:23:45 -0800 Subject: [PATCH 06/76] minor edits --- .../microsoft-compatible-security-key.md | 16 ++++++++++------ 1 file changed, 10 insertions(+), 6 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key.md b/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key.md index cc059702b7..fb9afb773b 100644 --- a/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key.md +++ b/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key.md @@ -1,22 +1,26 @@ --- -title: Microsoft compatible security key -description: Windows 10 enables users to sign in to their device using a security key. How is a microsoft compatible security key different (and better) than any other FIDO2 security key +title: Microsoft-compatible security key +description: Windows 10 enables users to sign in to their device using a security key. How is a Microsoft-compatible security key different (and better) than any other FIDO2 security key keywords: FIDO2, security key, CTAP, Hello, WHFB ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile -author: aabhathipsay-MS +author: aabhathipsay ms.author: aathipsa ms.localizationpriority: medium -ms.date: 10/25/2018 +ms.date: 11/14/2018 --- -# What is a Microsoft compatible security key? +# What is a Microsoft-compatible security key? +> [!Warning] +> Some information relates to pre-released product that may change before it is commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + Microsoft has been aligned with the [FIDO Alliance](https://fidoalliance.org/) with a mission to replace passwords with an easy to use, strong 2FA credential. We have been working with our partners to extensively test and deliver a seamless and secure authentication experience to end users. The [FIDO2 CTAP specification](https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-client-to-authenticator-protocol-v2.0-id-20180227.html) contains a few optional features and extensions which are crucial to provide that seamless and secure experience. -A security key **MUST** implement the following features and extensions from the FIDO2 CTAP protocol to be Microsoft compatible: +A security key **MUST** implement the following features and extensions from the FIDO2 CTAP protocol to be Microsoft-compatible: | #
| Feature / Extension trust
| Why is this required?
| | --- | --- | --- | From 58d0f0680e8b6f10b66564a89eef7373ce4ec7df Mon Sep 17 00:00:00 2001 From: Aabha Thipsay Date: Wed, 14 Nov 2018 18:27:04 -0800 Subject: [PATCH 07/76] Draft page for reset a security key --- .../hello-for-business/reset-security-key.md | 31 +++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 windows/security/identity-protection/hello-for-business/reset-security-key.md diff --git a/windows/security/identity-protection/hello-for-business/reset-security-key.md b/windows/security/identity-protection/hello-for-business/reset-security-key.md new file mode 100644 index 0000000000..000898161c --- /dev/null +++ b/windows/security/identity-protection/hello-for-business/reset-security-key.md @@ -0,0 +1,31 @@ +--- +title: Reset-security-key +description: Windows 10 enables users to sign in to their device using a security key. How to reset a security key +keywords: FIDO2, security key, CTAP, Microsoft-compatible security key +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security, mobile +author: aabhathipsay +ms.author: aathipsa +ms.localizationpriority: medium +ms.date: 11/14/2018 +--- +# How to reset a Microsoft-compatible security key? +> [!Warning] +> Some information relates to pre-released product that may change before it is commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + +The steps to reset your security key may vary based on the security key vendor. + +>[!IMPORTANT] +>
This operation will wipe everything from your security key and reset it to factory defaults. +>
All data and credentials will be cleared. +> + +| #
| Security key vendor
| Reset instructions
| +| --- | --- | --- | +| 1 | Yubico | Remove and re-insert the security key
- If you are using a NFC key, tap the security key on the reader
When the LED on the security key begins flashing, touch the metal contact | +| 2 | Feitian | Touch the blinking fingerprint sensor twice to reset the key| +| 3 | HID | Tap the card on the reader twice to reset it | + +**If your security key is not listed here, please reach out to your vendor for reset instructions.** \ No newline at end of file From fff6db43cfec9fe14dd5e3a8b48b66c66db14ee7 Mon Sep 17 00:00:00 2001 From: Aabha Thipsay Date: Tue, 22 Jan 2019 14:56:56 -0800 Subject: [PATCH 08/76] Minor changes --- .../hello-for-business/reset-security-key.md | 22 +++++++++++-------- 1 file changed, 13 insertions(+), 9 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/reset-security-key.md b/windows/security/identity-protection/hello-for-business/reset-security-key.md index 000898161c..2a7a25acc9 100644 --- a/windows/security/identity-protection/hello-for-business/reset-security-key.md +++ b/windows/security/identity-protection/hello-for-business/reset-security-key.md @@ -15,17 +15,21 @@ ms.date: 11/14/2018 > [!Warning] > Some information relates to pre-released product that may change before it is commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. -The steps to reset your security key may vary based on the security key vendor. +A [Microsoft-compatible security key](https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key) can be reset via Settings app ( Settings > Accounts > Sign-in options > Security key ) + +>[!NOTE] +>The steps to reset your security key may vary based on the security key vendor.
+>If your security key is not listed here, please reach out to your vendor for reset instructions. + + >[!IMPORTANT] ->
This operation will wipe everything from your security key and reset it to factory defaults. ->
All data and credentials will be cleared. +>This operation will wipe everything from your security key and reset it to factory defaults.
All data and credentials will be cleared. > -| #
| Security key vendor
| Reset instructions
| -| --- | --- | --- | -| 1 | Yubico | Remove and re-insert the security key
- If you are using a NFC key, tap the security key on the reader
When the LED on the security key begins flashing, touch the metal contact | -| 2 | Feitian | Touch the blinking fingerprint sensor twice to reset the key| -| 3 | HID | Tap the card on the reader twice to reset it | +|Security key vendor
| Reset instructions
| +| --- | --- | +|Yubico | **USB:** Remove and re-insert the security key. When the LED on the security key begins flashing, touch the metal contact
**NFC:** Tap the security key on the reader
| +|Feitian | Touch the blinking fingerprint sensor twice to reset the key| +|HID | Tap the card on the reader twice to reset it | -**If your security key is not listed here, please reach out to your vendor for reset instructions.** \ No newline at end of file From f1ce0c8d6cfc20edb94de1e88c992118fdaf10ca Mon Sep 17 00:00:00 2001 From: Aabha Thipsay Date: Tue, 22 Jan 2019 15:51:29 -0800 Subject: [PATCH 09/76] Minor edits --- .../hello-for-business/reset-security-key.md | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/reset-security-key.md b/windows/security/identity-protection/hello-for-business/reset-security-key.md index 2a7a25acc9..bcefcbf9bb 100644 --- a/windows/security/identity-protection/hello-for-business/reset-security-key.md +++ b/windows/security/identity-protection/hello-for-business/reset-security-key.md @@ -15,11 +15,10 @@ ms.date: 11/14/2018 > [!Warning] > Some information relates to pre-released product that may change before it is commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. -A [Microsoft-compatible security key](https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key) can be reset via Settings app ( Settings > Accounts > Sign-in options > Security key ) +A [Microsoft-compatible security key](https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key) can be reset via Settings app ( Settings > Accounts > Sign-in options > Security key ). +
->[!NOTE] ->The steps to reset your security key may vary based on the security key vendor.
->If your security key is not listed here, please reach out to your vendor for reset instructions. +Follow the instructions in the Settings app and look for specific instructions based on your security key below: @@ -33,3 +32,6 @@ A [Microsoft-compatible security key](https://docs.microsoft.com/en-us/windows/s |Feitian | Touch the blinking fingerprint sensor twice to reset the key| |HID | Tap the card on the reader twice to reset it | +>[!NOTE] +>The steps to reset your security key may vary based on the security key vendor.
+>If your security key is not listed here, please reach out to your vendor for reset instructions. \ No newline at end of file From 3174e4918e57b4ef7229e46c2e0c2d67612b1594 Mon Sep 17 00:00:00 2001 From: Aabha Thipsay Date: Tue, 22 Jan 2019 16:14:55 -0800 Subject: [PATCH 10/76] Repositioned text --- .../hello-for-business/reset-security-key.md | 22 +++++++++---------- 1 file changed, 10 insertions(+), 12 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/reset-security-key.md b/windows/security/identity-protection/hello-for-business/reset-security-key.md index bcefcbf9bb..43aca85f75 100644 --- a/windows/security/identity-protection/hello-for-business/reset-security-key.md +++ b/windows/security/identity-protection/hello-for-business/reset-security-key.md @@ -15,23 +15,21 @@ ms.date: 11/14/2018 > [!Warning] > Some information relates to pre-released product that may change before it is commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. -A [Microsoft-compatible security key](https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key) can be reset via Settings app ( Settings > Accounts > Sign-in options > Security key ). -
- -Follow the instructions in the Settings app and look for specific instructions based on your security key below: - - - >[!IMPORTANT] ->This operation will wipe everything from your security key and reset it to factory defaults.
All data and credentials will be cleared. -> +>This operation will wipe everything from your security key and reset it to factory defaults.
**All data and credentials will be cleared.** -|Security key vendor
| Reset instructions
| + +A [Microsoft-compatible security key](https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key) can be reset via Settings app ( Settings > Accounts > Sign-in options > Security key ). +
+Follow the instructions in the Settings app and look for specific instructions based on your security key manufacturer below: + + +|Security key manufacturer
| Reset instructions
| | --- | --- | |Yubico | **USB:** Remove and re-insert the security key. When the LED on the security key begins flashing, touch the metal contact
**NFC:** Tap the security key on the reader
| |Feitian | Touch the blinking fingerprint sensor twice to reset the key| |HID | Tap the card on the reader twice to reset it | >[!NOTE] ->The steps to reset your security key may vary based on the security key vendor.
->If your security key is not listed here, please reach out to your vendor for reset instructions. \ No newline at end of file +>The steps to reset your security key may vary based on the security key manufacturer.
+>If your security key is not listed here, please reach out to your security key manufacturer for reset instructions. \ No newline at end of file From b454c9bca3328437b8ddce05095f95ee38b509ff Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Mon, 28 Jan 2019 18:34:57 +0000 Subject: [PATCH 11/76] Updated whats-new-in-windows-defender-atp.md --- .../whats-new-in-windows-defender-atp.md | 55 +++++++++---------- 1 file changed, 27 insertions(+), 28 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md index 7557ed0cfe..32d0ac3b74 100644 --- a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md +++ b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md @@ -5,7 +5,7 @@ keywords: what's new in windows defender atp search.product: eADQiWindows 10XVcnh search.appverid: met150 ms.prod: w10 -ms.mktglfcycl: deploy +ms.mktglfcycl: secure ms.sitesec: library ms.pagetype: security ms.author: dansimp @@ -17,30 +17,12 @@ ms.localizationpriority: medium **Applies to:** - Windows Defender Advanced Threat Protection (Windows Defender ATP) -Here are the new features in the latest release of Windows Defender ATP. - -## Windows Defender ATP 1809 -- [Support for iOS and Android devices](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection#turn-on-third-party-integration)
Support for iOS and Android devices are now supported. - -- [Controlled folder access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard)
-Controlled folder access is now supported on Windows Server 2019. - -- [Attack surface reduction rules](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard)
-All Attack surface reduction rules are now supported on Windows Server 2019. -For Windows 10, version 1809 there are two new attack surface reduction rules: - - Block Adobe Reader from creating child processes - - Block Office communication application from creating child processes. - -- [Windows Defender Antivirus](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10) - - Antimalware Scan Interface (AMSI) was extended to cover Office VBA macros as well. [Office VBA + AMSI: Parting the veil on malicious macros](https://cloudblogs.microsoft.com/microsoftsecure/2018/09/12/office-vba-amsi-parting-the-veil-on-malicious-macros/). - - Windows Defender Antivirus can now [run within a sandbox](https://cloudblogs.microsoft.com/microsoftsecure/2018/10/26/windows-defender-antivirus-can-now-run-in-a-sandbox/) (preview), increasing its security. - - [Configure CPU priority settings](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus) for Windows Defender Antivirus scans. - - +Here are the new features in the latest release of Windows Defender ATP as well as security features in Windows 10 and Windows Server. +## October 2018 +- [Incidents](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/incidents-queue) **in preview** Incident is a new entity in Windows Defender ATP that brings together all relevant alerts and related entities to narrate the broader attack story, giving analysts better perspective on the purview of complex threats. - [Threat analytics](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/threat-analytics)
Threat Analytics is a set of interactive reports published by the Windows Defender ATP research team as soon as emerging threats and outbreaks are identified. The reports help security operations teams assess impact on their environment and provides recommended actions to contain, increase organizational resilience, and prevent specific threats. - - [Custom detection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/overview-custom-detections)
With custom detections, you can create custom queries to monitor events for any kind of behavior such as suspicious or emerging threats. This can be done by leveraging the power of Advanced hunting through the creation of custom detection rules. - [Managed security service provider (MSSP) support](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection)
@@ -55,8 +37,29 @@ Windows Defender ATP now adds support for Windows Server 2019. You'll be able to Onboard supported versions of Windows machines so that they can send sensor data to the Windows Defender ATP sensor. - [Removable device control](https://cloudblogs.microsoft.com/microsoftsecure/2018/12/19/windows-defender-atp-has-protections-for-usb-and-removable-devices/)
Windows Defender ATP provides multiple monitoring and control features to help prevent threats from removable devices, including new settings to allow or block specific hardware IDs. +- [Support for iOS and Android devices](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection#turn-on-third-party-integration)
Support for iOS and Android devices are now supported. +- [Controlled folder access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard)
+Controlled folder access is now supported on Windows Server 2019. -## Windows Defender ATP 1803 +## Windows 10 version 1809 +- [Attack surface reduction rules](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard)
+All Attack surface reduction rules are now supported on Windows Server 2019. +For Windows 10, version 1809 there are two new attack surface reduction rules: + - Block Adobe Reader from creating child processes + - Block Office communication application from creating child processes. + - [Windows Defender Antivirus](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10) + - Antimalware Scan Interface (AMSI) was extended to cover Office VBA macros as well. [Office VBA + AMSI: Parting the veil on malicious macros](https://cloudblogs.microsoft.com/microsoftsecure/2018/09/12/office-vba-amsi-parting-the-veil-on-malicious-macros/). + - Windows Defender Antivirus can now [run within a sandbox](https://cloudblogs.microsoft.com/microsoftsecure/2018/10/26/windows-defender-antivirus-can-now-run-in-a-sandbox/) (preview), increasing its security. + - [Configure CPU priority settings](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus) for Windows Defender Antivirus scans. + +## March 2018 +- [Advanced Hunting](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection)
+Query data using Advanced hunting in Windows Defender ATP +- [Automated investigation](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection)
Use Automated investigations to investigate and remediate threats +- [Conditional access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection)
+Enable conditional access to better protect users, devices, and data + +## Windows 10 version 1803 - [Attack surface reduction rules](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard) New attack surface reduction rules: - Use advanced protection against ransomware @@ -68,9 +71,5 @@ New attack surface reduction rules: You can now block untrusted processes from writing to disk sectors using Controlled Folder Access. - [Windows Defender Antivirus](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10) Windows Defender Antivirus now shares detection status between M365 services and interoperates with Windows Defender ATP. For more information, see [Use next-gen technologies in Windows Defender Antivirus through cloud-delivered protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus). Block at first sight can now block non-portable executable files (such as JS, VBS, or macros) as well as executable files. For more information, see [Enable block at first sight](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus). -- [Advanced Hunting](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection)
-Query data using Advanced hunting in Windows Defender ATP -- [Automated investigation](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection)
Use Automated investigations to investigate and remediate threats -- [Conditional access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection)
-Enable conditional access to better protect users, devices, and data + From 472a8be63bf5d04aae8a26070c21e1f28b3cb27b Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Mon, 28 Jan 2019 23:29:44 +0000 Subject: [PATCH 12/76] Updated whats-new-in-windows-defender-atp.md --- .../whats-new-in-windows-defender-atp.md | 7 ++----- 1 file changed, 2 insertions(+), 5 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md index 32d0ac3b74..3330c0e773 100644 --- a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md +++ b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md @@ -40,16 +40,14 @@ Windows Defender ATP provides multiple monitoring and control features to help p - [Support for iOS and Android devices](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection#turn-on-third-party-integration)
Support for iOS and Android devices are now supported. - [Controlled folder access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard)
Controlled folder access is now supported on Windows Server 2019. - -## Windows 10 version 1809 - [Attack surface reduction rules](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard)
All Attack surface reduction rules are now supported on Windows Server 2019. -For Windows 10, version 1809 there are two new attack surface reduction rules: +- New in Windows 10 version 1809, there are two new attack surface reduction rules: - Block Adobe Reader from creating child processes - Block Office communication application from creating child processes. - [Windows Defender Antivirus](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10) - Antimalware Scan Interface (AMSI) was extended to cover Office VBA macros as well. [Office VBA + AMSI: Parting the veil on malicious macros](https://cloudblogs.microsoft.com/microsoftsecure/2018/09/12/office-vba-amsi-parting-the-veil-on-malicious-macros/). - - Windows Defender Antivirus can now [run within a sandbox](https://cloudblogs.microsoft.com/microsoftsecure/2018/10/26/windows-defender-antivirus-can-now-run-in-a-sandbox/) (preview), increasing its security. + - Windows Defender Antivirus, new in Windows 10 version 1809, can now [run within a sandbox](https://cloudblogs.microsoft.com/microsoftsecure/2018/10/26/windows-defender-antivirus-can-now-run-in-a-sandbox/) (preview), increasing its security. - [Configure CPU priority settings](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus) for Windows Defender Antivirus scans. ## March 2018 @@ -59,7 +57,6 @@ Query data using Advanced hunting in Windows Defender ATP - [Conditional access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection)
Enable conditional access to better protect users, devices, and data -## Windows 10 version 1803 - [Attack surface reduction rules](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard) New attack surface reduction rules: - Use advanced protection against ransomware From d34222f56d293ba099cc066c2621342096f57995 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 28 Jan 2019 16:34:26 -0800 Subject: [PATCH 13/76] fix indents --- .../whats-new-in-windows-defender-atp.md | 47 +++++++++---------- 1 file changed, 21 insertions(+), 26 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md index 3330c0e773..ffa0fe7e8f 100644 --- a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md +++ b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md @@ -20,35 +20,30 @@ ms.localizationpriority: medium Here are the new features in the latest release of Windows Defender ATP as well as security features in Windows 10 and Windows Server. ## October 2018 -- [Incidents](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/incidents-queue) **in preview** Incident is a new entity in Windows Defender ATP that brings together all relevant alerts and related entities to narrate the broader attack story, giving analysts better perspective on the purview of complex threats. -- [Threat analytics](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/threat-analytics)
+- [Incidents](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/incidents-queue) (**in preview**)
+ Incident is a new entity in Windows Defender ATP that brings together all relevant alerts and related entities to narrate the broader attack story, giving analysts better perspective on the purview of complex threats. +- [Threat analytics](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/threat-analytics)
Threat Analytics is a set of interactive reports published by the Windows Defender ATP research team as soon as emerging threats and outbreaks are identified. The reports help security operations teams assess impact on their environment and provides recommended actions to contain, increase organizational resilience, and prevent specific threats. -- [Custom detection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/overview-custom-detections)
-With custom detections, you can create custom queries to monitor events for any kind of behavior such as suspicious or emerging threats. This can be done by leveraging the power of Advanced hunting through the creation of custom detection rules. -- [Managed security service provider (MSSP) support](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection)
-Windows Defender ATP adds support for this scenario by providing MSSP integration. The integration will allow MSSPs to take the following actions: Get access to MSSP customer's Windows Defender Security Center portal, fetch email notifications, and fetch alerts through security information and event management (SIEM) tools. -- [Integration with Azure Security Center](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection#integration-with-azure-security-center)
-Windows Defender ATP integrates with Azure Security Center to provide a comprehensive server protection solution. With this integration Azure Security Center can leverage the power of Windows Defender ATP to provide improved threat detection for Windows Servers. -- [Integration with Microsoft Cloud App Security](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-integration)
-Microsoft Cloud App Security leverages Windows Defender ATP endpoint signals to allow direct visibility into cloud application usage including the use of unsupported cloud services (shadow IT) from all Windows Defender ATP monitored machines. -- [Onboard Windows Server 2019](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection#windows-server-version-1803-and-windows-server-2019)
-Windows Defender ATP now adds support for Windows Server 2019. You'll be able to onboard Windows Server 2019 in the same method available for Windows 10 client machines. -- [Onboard previous versions of Windows](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection)
-Onboard supported versions of Windows machines so that they can send sensor data to the Windows Defender ATP sensor. -- [Removable device control](https://cloudblogs.microsoft.com/microsoftsecure/2018/12/19/windows-defender-atp-has-protections-for-usb-and-removable-devices/)
-Windows Defender ATP provides multiple monitoring and control features to help prevent threats from removable devices, including new settings to allow or block specific hardware IDs. -- [Support for iOS and Android devices](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection#turn-on-third-party-integration)
Support for iOS and Android devices are now supported. -- [Controlled folder access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard)
-Controlled folder access is now supported on Windows Server 2019. -- [Attack surface reduction rules](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard)
-All Attack surface reduction rules are now supported on Windows Server 2019. +- [Custom detection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/overview-custom-detections)
With custom detections, you can create custom queries to monitor events for any kind of behavior such as suspicious or emerging threats. This can be done by leveraging the power of Advanced hunting through the creation of custom detection rules. +- [Managed security service provider (MSSP) support](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection)
Windows Defender ATP adds support for this scenario by providing MSSP integration. The integration will allow MSSPs to take the following actions: Get access to MSSP customer's Windows Defender Security Center portal, fetch email notifications, and fetch alerts through security information and event management (SIEM) tools. +- [Integration with Azure Security Center](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection#integration-with-azure-security-center)
Windows Defender ATP integrates with Azure Security Center to provide a comprehensive server protection solution. With this integration Azure Security Center can leverage the power of Windows Defender ATP to provide improved threat detection for Windows Servers. +- [Integration with Microsoft Cloud App Security](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-integration)
Microsoft Cloud App Security leverages Windows Defender ATP endpoint signals to allow direct visibility into cloud application usage including the use of unsupported cloud services (shadow IT) from all Windows Defender ATP monitored machines. +- [Onboard Windows Server 2019](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection#windows-server-version-1803-and-windows-server-2019)
Windows Defender ATP now adds support for Windows Server 2019. You'll be able to onboard Windows Server 2019 in the same method available for Windows 10 client machines. +- [Onboard previous versions of Windows](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection)
Onboard supported versions of Windows machines so that they can send sensor data to the Windows Defender ATP sensor. +- [Removable device control](https://cloudblogs.microsoft.com/microsoftsecure/2018/12/19/windows-defender-atp-has-protections-for-usb-and-removable-devices/)
Windows Defender ATP provides multiple monitoring and control features to help prevent threats from removable devices, including new settings to allow or block specific hardware IDs. +- [Support for iOS and Android devices](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection#turn-on-third-party-integration)
iOS and Android devices are now supported and can be onboarded to the service. + +- [Controlled folder access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard)
Controlled folder access is now supported on Windows Server 2019. +- [Attack surface reduction rules](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard)
All Attack surface reduction rules are now supported on Windows Server 2019. + - New in Windows 10 version 1809, there are two new attack surface reduction rules: - Block Adobe Reader from creating child processes - - Block Office communication application from creating child processes. - - [Windows Defender Antivirus](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10) - - Antimalware Scan Interface (AMSI) was extended to cover Office VBA macros as well. [Office VBA + AMSI: Parting the veil on malicious macros](https://cloudblogs.microsoft.com/microsoftsecure/2018/09/12/office-vba-amsi-parting-the-veil-on-malicious-macros/). - - Windows Defender Antivirus, new in Windows 10 version 1809, can now [run within a sandbox](https://cloudblogs.microsoft.com/microsoftsecure/2018/10/26/windows-defender-antivirus-can-now-run-in-a-sandbox/) (preview), increasing its security. - - [Configure CPU priority settings](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus) for Windows Defender Antivirus scans. + - Block Office communication application from creating child processes. + +- [Windows Defender Antivirus](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10) + - Antimalware Scan Interface (AMSI) was extended to cover Office VBA macros as well. [Office VBA + AMSI: Parting the veil on malicious macros](https://cloudblogs.microsoft.com/microsoftsecure/2018/09/12/office-vba-amsi-parting-the-veil-on-malicious-macros/). + - Windows Defender Antivirus, new in Windows 10 version 1809, can now [run within a sandbox](https://cloudblogs.microsoft.com/microsoftsecure/2018/10/26/windows-defender-antivirus-can-now-run-in-a-sandbox/) (preview), increasing its security. + - [Configure CPU priority settings](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus) for Windows Defender Antivirus scans. ## March 2018 - [Advanced Hunting](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection)
From 93a86092f2851371570bb2990c187f07e13328b3 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 28 Jan 2019 17:04:38 -0800 Subject: [PATCH 14/76] organize topics, sort alphabetical order --- ...ows-defender-advanced-threat-protection.md | 29 --------- .../whats-new-in-windows-defender-atp.md | 60 ++++++++++++------- 2 files changed, 40 insertions(+), 49 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md index f0d5d23e2f..90b05dd237 100644 --- a/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md @@ -11,7 +11,6 @@ ms.pagetype: security ms.author: macapara author: mjcaparas ms.localizationpriority: medium -ms.date: 12/03/2018 --- # Windows Defender ATP preview features @@ -36,34 +35,6 @@ Turn on the preview experience setting to be among the first to try upcoming fea 2. Toggle the setting between **On** and **Off** and select **Save preferences**. -## Preview features -The following features are included in the preview release: - -- [Information protection](information-protection-in-windows-overview.md)
-Windows Defender ATP is seamlessly integrated in Microsoft Threat Protection to provide a complete and comprehensive data loss prevention (DLP) solution for Windows devices. This solution is delivered and managed as part of the unified Microsoft 365 information protection suite. - - -- [Incidents](incidents-queue.md)
-Windows Defender ATP applies correlation analytics and aggregates all related alerts and investigations into an incident. Doing so helps narrate a broader story of an attack, thus providing you with the right visuals (upgraded incident graph) and data representations to understand and deal with complex cross-entity threats to your organization's network. - - -- [Integration with Microsoft Cloud App Security](microsoft-cloud-app-security-integration.md)
-Microsoft Cloud App Security leverages Windows Defender ATP endpoint signals to allow direct visibility into cloud application usage including the use of unsupported cloud services (shadow IT) from all Windows Defender ATP monitored machines. - - -- [Onboard Windows Server 2019](configure-server-endpoints-windows-defender-advanced-threat-protection.md#windows-server-version-1803-and-windows-server-2019)
-Windows Defender ATP now adds support for Windows Server 2019. You'll be able to onboard Windows Server 2019 in the same method available for Windows 10 client machines. - -- [Onboard previous versions of Windows](onboard-downlevel-windows-defender-advanced-threat-protection.md)
-Onboard supported versions of Windows machines so that they can send sensor data to the Windows Defender ATP sensor - - Windows 7 SP1 Enterprise - - Windows 7 SP1 Pro - - Windows 8.1 Enterprise - - Windows 8.1 Pro - - -- [Create and build Power BI reports using Windows Defender ATP data](powerbi-reports-windows-defender-advanced-threat-protection.md)
-Windows Defender ATP makes it easy to create a Power BI dashboard by providing an option straight from the portal. >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-preview-belowfoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md index ffa0fe7e8f..01ac181e75 100644 --- a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md +++ b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md @@ -20,21 +20,15 @@ ms.localizationpriority: medium Here are the new features in the latest release of Windows Defender ATP as well as security features in Windows 10 and Windows Server. ## October 2018 -- [Incidents](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/incidents-queue) (**in preview**)
- Incident is a new entity in Windows Defender ATP that brings together all relevant alerts and related entities to narrate the broader attack story, giving analysts better perspective on the purview of complex threats. -- [Threat analytics](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/threat-analytics)
-Threat Analytics is a set of interactive reports published by the Windows Defender ATP research team as soon as emerging threats and outbreaks are identified. The reports help security operations teams assess impact on their environment and provides recommended actions to contain, increase organizational resilience, and prevent specific threats. +- [Attack surface reduction rules](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard)
All Attack surface reduction rules are now supported on Windows Server 2019. +- [Controlled folder access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard)
Controlled folder access is now supported on Windows Server 2019. - [Custom detection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/overview-custom-detections)
With custom detections, you can create custom queries to monitor events for any kind of behavior such as suspicious or emerging threats. This can be done by leveraging the power of Advanced hunting through the creation of custom detection rules. -- [Managed security service provider (MSSP) support](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection)
Windows Defender ATP adds support for this scenario by providing MSSP integration. The integration will allow MSSPs to take the following actions: Get access to MSSP customer's Windows Defender Security Center portal, fetch email notifications, and fetch alerts through security information and event management (SIEM) tools. - [Integration with Azure Security Center](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection#integration-with-azure-security-center)
Windows Defender ATP integrates with Azure Security Center to provide a comprehensive server protection solution. With this integration Azure Security Center can leverage the power of Windows Defender ATP to provide improved threat detection for Windows Servers. -- [Integration with Microsoft Cloud App Security](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-integration)
Microsoft Cloud App Security leverages Windows Defender ATP endpoint signals to allow direct visibility into cloud application usage including the use of unsupported cloud services (shadow IT) from all Windows Defender ATP monitored machines. -- [Onboard Windows Server 2019](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection#windows-server-version-1803-and-windows-server-2019)
Windows Defender ATP now adds support for Windows Server 2019. You'll be able to onboard Windows Server 2019 in the same method available for Windows 10 client machines. -- [Onboard previous versions of Windows](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection)
Onboard supported versions of Windows machines so that they can send sensor data to the Windows Defender ATP sensor. +- [Managed security service provider (MSSP) support](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection)
Windows Defender ATP adds support for this scenario by providing MSSP integration. The integration will allow MSSPs to take the following actions: Get access to MSSP customer's Windows Defender Security Center portal, fetch email notifications, and fetch alerts through security information and event management (SIEM) tools. - [Removable device control](https://cloudblogs.microsoft.com/microsoftsecure/2018/12/19/windows-defender-atp-has-protections-for-usb-and-removable-devices/)
Windows Defender ATP provides multiple monitoring and control features to help prevent threats from removable devices, including new settings to allow or block specific hardware IDs. - [Support for iOS and Android devices](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection#turn-on-third-party-integration)
iOS and Android devices are now supported and can be onboarded to the service. - -- [Controlled folder access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard)
Controlled folder access is now supported on Windows Server 2019. -- [Attack surface reduction rules](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard)
All Attack surface reduction rules are now supported on Windows Server 2019. +- [Threat analytics](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/threat-analytics)
+Threat Analytics is a set of interactive reports published by the Windows Defender ATP research team as soon as emerging threats and outbreaks are identified. The reports help security operations teams assess impact on their environment and provides recommended actions to contain, increase organizational resilience, and prevent specific threats. - New in Windows 10 version 1809, there are two new attack surface reduction rules: - Block Adobe Reader from creating child processes @@ -44,24 +38,50 @@ Threat Analytics is a set of interactive reports published by the Windows Defend - Antimalware Scan Interface (AMSI) was extended to cover Office VBA macros as well. [Office VBA + AMSI: Parting the veil on malicious macros](https://cloudblogs.microsoft.com/microsoftsecure/2018/09/12/office-vba-amsi-parting-the-veil-on-malicious-macros/). - Windows Defender Antivirus, new in Windows 10 version 1809, can now [run within a sandbox](https://cloudblogs.microsoft.com/microsoftsecure/2018/10/26/windows-defender-antivirus-can-now-run-in-a-sandbox/) (preview), increasing its security. - [Configure CPU priority settings](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus) for Windows Defender Antivirus scans. + + +### In preview +The following features are included in the preview release. For more information on how to turn on preview features, see [Preview features](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection). + +- [Incidents](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/incidents-queue) (**in preview**)
+ Incident is a new entity in Windows Defender ATP that brings together all relevant alerts and related entities to narrate the broader attack story, giving analysts better perspective on the purview of complex threats. +- [Information protection](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview) (**in preview**)
+Information protection is an integral part of Microsoft 365 Enterprise suite, providing intelligent protection to keep sensitive data secure while enabling productivity in the workplace. +Windows Defender ATP is seamlessly integrated in Microsoft Threat Protection to provide a complete and comprehensive data loss prevention (DLP) solution for Windows devices. + + +- [Integration with Microsoft Cloud App Security](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-integration) (**in preview**)
Microsoft Cloud App Security leverages Windows Defender ATP endpoint signals to allow direct visibility into cloud application usage including the use of unsupported cloud services (shadow IT) from all Windows Defender ATP monitored machines. + +- [Onboard Windows Server 2019](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection#windows-server-version-1803-and-windows-server-2019) (**in preview**)
Windows Defender ATP now adds support for Windows Server 2019. You'll be able to onboard Windows Server 2019 in the same method available for Windows 10 client machines. +- [Onboard previous versions of Windows](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection) (**in preview**)
Onboard supported versions of Windows machines so that they can send sensor data to the Windows Defender ATP sensor. + + +- [Power BI reports using Windows Defender ATP data](powerbi-reports-windows-defender-advanced-threat-protection.md) (**in preview**)
+Windows Defender ATP makes it easy to create a Power BI dashboard by providing an option straight from the portal. + + + ## March 2018 - [Advanced Hunting](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection)
-Query data using Advanced hunting in Windows Defender ATP -- [Automated investigation](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection)
Use Automated investigations to investigate and remediate threats -- [Conditional access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection)
-Enable conditional access to better protect users, devices, and data +Query data using Advanced hunting in Windows Defender ATP. -- [Attack surface reduction rules](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard) -New attack surface reduction rules: +- [Attack surface reduction rules](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard)
+ New attack surface reduction rules: - Use advanced protection against ransomware - Block credential stealing from the Windows local security authority subsystem (lsass.exe) - Block process creations originating from PSExec and WMI commands - Block untrusted and unsigned processes that run from USB - Block executable content from email client and webmail -- [Controlled folder access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard) + +- [Automated investigation](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection)
Use Automated investigations to investigate and remediate threats. +- [Conditional access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection)
Enable conditional access to better protect users, devices, and data. + +- [Controlled folder access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard)
You can now block untrusted processes from writing to disk sectors using Controlled Folder Access. -- [Windows Defender Antivirus](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10) -Windows Defender Antivirus now shares detection status between M365 services and interoperates with Windows Defender ATP. For more information, see [Use next-gen technologies in Windows Defender Antivirus through cloud-delivered protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus). Block at first sight can now block non-portable executable files (such as JS, VBS, or macros) as well as executable files. For more information, see [Enable block at first sight](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus). +- [Windows Defender Antivirus](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10)
+Windows Defender Antivirus now shares detection status between M365 services and interoperates with Windows Defender ATP. For more information, see [Use next-gen technologies in Windows Defender Antivirus through cloud-delivered protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus). + + Block at first sight can now block non-portable executable files (such as JS, VBS, or macros) as well as executable files. For more information, see [Enable block at first sight](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus). From 3407217e7b6c32b9154f2cbd3bc46b49c0d02ec4 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 28 Jan 2019 17:17:10 -0800 Subject: [PATCH 15/76] add in features for march 2018 --- ...windows-defender-advanced-threat-protection.md | 3 +-- .../whats-new-in-windows-defender-atp.md | 15 ++++++++++++++- 2 files changed, 15 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md index 3caa3bf11d..918bdf63f7 100644 --- a/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md @@ -11,10 +11,9 @@ ms.pagetype: security ms.author: macapara author: mjcaparas ms.localizationpriority: medium -ms.date: 12/04/2018 --- -# Overview of Automated investigations +# Overview of Automated investigation and remediation >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automated-investigations-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md index 01ac181e75..a809e44125 100644 --- a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md +++ b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md @@ -74,11 +74,24 @@ Query data using Advanced hunting in Windows Defender ATP. - Block untrusted and unsigned processes that run from USB - Block executable content from email client and webmail -- [Automated investigation](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection)
Use Automated investigations to investigate and remediate threats. +- [Automated investigation and remediation](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection)
Use Automated investigations to investigate and remediate threats. - [Conditional access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection)
Enable conditional access to better protect users, devices, and data. +- [Windows Defender ATP Community center](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection)
+ The Windows Defender ATP Community Center is a place where community members can learn, collaborate, and share experiences about the product. + - [Controlled folder access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard)
You can now block untrusted processes from writing to disk sectors using Controlled Folder Access. + +- [Onboard non-Windows machines](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection)
+ Windows Defender ATP provides a centralized security operations experience for Windows as well as non-Windows platforms. You'll be able to see alerts from various supported operating systems (OS) in Windows Defender Security Center and better protect your organization's network. + +- [Role-based access control (RBAC)](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/rbac-windows-defender-advanced-threat-protection)
+ Using role-based access control (RBAC), you can create roles and groups within your security operations team to grant appropriate access to the portal. + + + + - [Windows Defender Antivirus](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10)
Windows Defender Antivirus now shares detection status between M365 services and interoperates with Windows Defender ATP. For more information, see [Use next-gen technologies in Windows Defender Antivirus through cloud-delivered protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus). From 12e36a100bce83f93cd01c5c4f3024c870d84c49 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 28 Jan 2019 17:26:01 -0800 Subject: [PATCH 16/76] remove preview tags --- .../whats-new-in-windows-defender-atp.md | 29 ++++++++++++------- 1 file changed, 18 insertions(+), 11 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md index a809e44125..68b301d1db 100644 --- a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md +++ b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md @@ -43,20 +43,25 @@ Threat Analytics is a set of interactive reports published by the Windows Defend ### In preview The following features are included in the preview release. For more information on how to turn on preview features, see [Preview features](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection). -- [Incidents](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/incidents-queue) (**in preview**)
+- [Incidents](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/incidents-queue)
Incident is a new entity in Windows Defender ATP that brings together all relevant alerts and related entities to narrate the broader attack story, giving analysts better perspective on the purview of complex threats. -- [Information protection](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview) (**in preview**)
+- [Information protection](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview)
Information protection is an integral part of Microsoft 365 Enterprise suite, providing intelligent protection to keep sensitive data secure while enabling productivity in the workplace. Windows Defender ATP is seamlessly integrated in Microsoft Threat Protection to provide a complete and comprehensive data loss prevention (DLP) solution for Windows devices. + + >[!NOTE] + >Partially available from Windows 10, version 1809. + +- [Integration with Microsoft Cloud App Security](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-integration)
Microsoft Cloud App Security leverages Windows Defender ATP endpoint signals to allow direct visibility into cloud application usage including the use of unsupported cloud services (shadow IT) from all Windows Defender ATP monitored machines. + + >[!NOTE] + >Available from Windows 10, version 1809 or later. + +- [Onboard Windows Server 2019](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection#windows-server-version-1803-and-windows-server-2019)
Windows Defender ATP now adds support for Windows Server 2019. You'll be able to onboard Windows Server 2019 in the same method available for Windows 10 client machines. +- [Onboard previous versions of Windows](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection) (**in preview**)
Onboard supported versions of Windows machines so that they can send sensor data to the Windows Defender ATP sensor. -- [Integration with Microsoft Cloud App Security](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-integration) (**in preview**)
Microsoft Cloud App Security leverages Windows Defender ATP endpoint signals to allow direct visibility into cloud application usage including the use of unsupported cloud services (shadow IT) from all Windows Defender ATP monitored machines. - -- [Onboard Windows Server 2019](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection#windows-server-version-1803-and-windows-server-2019) (**in preview**)
Windows Defender ATP now adds support for Windows Server 2019. You'll be able to onboard Windows Server 2019 in the same method available for Windows 10 client machines. -- [Onboard previous versions of Windows](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection) (**in preview**)
Onboard supported versions of Windows machines so that they can send sensor data to the Windows Defender ATP sensor. - - -- [Power BI reports using Windows Defender ATP data](powerbi-reports-windows-defender-advanced-threat-protection.md) (**in preview**)
+- [Power BI reports using Windows Defender ATP data](powerbi-reports-windows-defender-advanced-threat-protection.md)
Windows Defender ATP makes it easy to create a Power BI dashboard by providing an option straight from the portal. @@ -75,6 +80,10 @@ Query data using Advanced hunting in Windows Defender ATP. - Block executable content from email client and webmail - [Automated investigation and remediation](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection)
Use Automated investigations to investigate and remediate threats. + + >[!NOTE] + >Available from Windows 10, version 1803 or later. + - [Conditional access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection)
Enable conditional access to better protect users, devices, and data. - [Windows Defender ATP Community center](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection)
@@ -90,8 +99,6 @@ You can now block untrusted processes from writing to disk sectors using Control Using role-based access control (RBAC), you can create roles and groups within your security operations team to grant appropriate access to the portal. - - - [Windows Defender Antivirus](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10)
Windows Defender Antivirus now shares detection status between M365 services and interoperates with Windows Defender ATP. For more information, see [Use next-gen technologies in Windows Defender Antivirus through cloud-delivered protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus). From b499b6b2a87fee7265443c4d3b587c46ab6995e4 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 28 Jan 2019 17:26:31 -0800 Subject: [PATCH 17/76] edit --- .../windows-defender-atp/whats-new-in-windows-defender-atp.md | 2 -- 1 file changed, 2 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md index 68b301d1db..3c174b527f 100644 --- a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md +++ b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md @@ -64,8 +64,6 @@ Windows Defender ATP is seamlessly integrated in Microsoft Threat Protection to - [Power BI reports using Windows Defender ATP data](powerbi-reports-windows-defender-advanced-threat-protection.md)
Windows Defender ATP makes it easy to create a Power BI dashboard by providing an option straight from the portal. - - ## March 2018 - [Advanced Hunting](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection)
From 2d8476eef2d8e89dd999a88aab4f2534e8948d77 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 28 Jan 2019 17:28:24 -0800 Subject: [PATCH 18/76] preview and ga --- .../whats-new-in-windows-defender-atp.md | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md index 3c174b527f..716481a045 100644 --- a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md +++ b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md @@ -20,6 +20,8 @@ ms.localizationpriority: medium Here are the new features in the latest release of Windows Defender ATP as well as security features in Windows 10 and Windows Server. ## October 2018 +The following capabilities are generally available (GA). + - [Attack surface reduction rules](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard)
All Attack surface reduction rules are now supported on Windows Server 2019. - [Controlled folder access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard)
Controlled folder access is now supported on Windows Server 2019. - [Custom detection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/overview-custom-detections)
With custom detections, you can create custom queries to monitor events for any kind of behavior such as suspicious or emerging threats. This can be done by leveraging the power of Advanced hunting through the creation of custom detection rules. @@ -41,7 +43,9 @@ Threat Analytics is a set of interactive reports published by the Windows Defend ### In preview -The following features are included in the preview release. For more information on how to turn on preview features, see [Preview features](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection). +The following capabilities are included in the October 2018 preview release. + +For more information on how to turn on preview features, see [Preview features](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection). - [Incidents](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/incidents-queue)
Incident is a new entity in Windows Defender ATP that brings together all relevant alerts and related entities to narrate the broader attack story, giving analysts better perspective on the purview of complex threats. From 73e7e27f8ab0fd84079c26234485ccb8bd487840 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 28 Jan 2019 17:29:13 -0800 Subject: [PATCH 19/76] update --- .../windows-defender-atp/whats-new-in-windows-defender-atp.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md index 716481a045..336df39657 100644 --- a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md +++ b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md @@ -62,7 +62,7 @@ Windows Defender ATP is seamlessly integrated in Microsoft Threat Protection to >Available from Windows 10, version 1809 or later. - [Onboard Windows Server 2019](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection#windows-server-version-1803-and-windows-server-2019)
Windows Defender ATP now adds support for Windows Server 2019. You'll be able to onboard Windows Server 2019 in the same method available for Windows 10 client machines. -- [Onboard previous versions of Windows](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection) (**in preview**)
Onboard supported versions of Windows machines so that they can send sensor data to the Windows Defender ATP sensor. +- [Onboard previous versions of Windows](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection)
Onboard supported versions of Windows machines so that they can send sensor data to the Windows Defender ATP sensor. - [Power BI reports using Windows Defender ATP data](powerbi-reports-windows-defender-advanced-threat-protection.md)
From 2424a85c9d48e37cb3ae9209e20b3fdf7b525f14 Mon Sep 17 00:00:00 2001 From: Mitch Lindgren Date: Wed, 6 Feb 2019 14:30:21 -0800 Subject: [PATCH 20/76] Fix incorrect information about PIN complexity policy PIN complexity group policy is only supported in Computer Configuration, not User Configuration. --- .../hello-for-business/hello-cert-trust-policy-settings.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-cert-trust-policy-settings.md b/windows/security/identity-protection/hello-for-business/hello-cert-trust-policy-settings.md index f33d7bbf02..4c008a5f24 100644 --- a/windows/security/identity-protection/hello-for-business/hello-cert-trust-policy-settings.md +++ b/windows/security/identity-protection/hello-for-business/hello-cert-trust-policy-settings.md @@ -126,7 +126,7 @@ Windows 10 provides eight PIN Complexity Group Policy settings that give you gra * Require special characters * Require uppercase letters -In the Windows 10, version 1703, the PIN complexity Group Policy settings have moved to remove misunderstanding that PIN complexity policy settings were exclusive to Windows Hello for Business. The new location of these Group Policy settings is under Administrative Templates\System\PIN Complexity under both the Computer and User Configuration nodes of the Group Policy editor. +In the Windows 10, version 1703, the PIN complexity Group Policy settings have moved to remove misunderstanding that PIN complexity policy settings were exclusive to Windows Hello for Business. The new location of these Group Policy settings is under Computer Configuration\Administrative Templates\System\PIN Complexity in the Group Policy editor. ## Review @@ -153,4 +153,4 @@ Users must receive the Windows Hello for Business group policy settings and have 2. [Validate and Configure Public Key Infrastructure](hello-cert-trust-validate-pki.md) 3. [Prepare and Deploy Windows Server 2016 Active Directory Federation Services](hello-cert-trust-adfs.md) 4. [Validate and Deploy Multifactor Authentication Services (MFA)](hello-cert-trust-validate-deploy-mfa.md) -5. Configure Windows Hello for Business Policy settings (*You are here*) \ No newline at end of file +5. Configure Windows Hello for Business Policy settings (*You are here*) From ac0a370a5596a6b2df66f429159c7e8057c4f72a Mon Sep 17 00:00:00 2001 From: win32-shintaka <47413322+win32-shintaka@users.noreply.github.com> Date: Thu, 7 Feb 2019 17:29:38 +0900 Subject: [PATCH 21/76] Update policy-csp-browser.md If you specify multiple URLs in Browser/HomePages policy, each URL should be separated by comma, not space. I've verified this behavior with Windows 10 RS5 + PPKG. --- windows/client-management/mdm/policy-csp-browser.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/policy-csp-browser.md b/windows/client-management/mdm/policy-csp-browser.md index 9397bb5aae..9b9cc1b64f 100644 --- a/windows/client-management/mdm/policy-csp-browser.md +++ b/windows/client-management/mdm/policy-csp-browser.md @@ -2785,7 +2785,7 @@ ADMX Info: Supported values: - Blank (default) - Load the pages specified in App settings as the default Start pages. -- String - Enter the URLs of the pages you want to load as the Start pages, separating each page using angle brackets:

      \ \ +- String - Enter the URLs of the pages you want to load as the Start pages, separating each page using angle brackets and comma:

      \,\ From 79658cc83d963e06058f80327a1eba4645cd2344 Mon Sep 17 00:00:00 2001 From: Ronald-den-Os <41728016+Ronald-den-Os@users.noreply.github.com> Date: Sat, 9 Feb 2019 11:51:24 +0100 Subject: [PATCH 22/76] Typo Phonefactor Admins In the paragraph discussing the creation of a Phonefactor Admins group: When created the group is called Phonefactor Admins, in the next paragraph the group is called Phonefactors Admin --- .../hello-for-business/hello-key-trust-deploy-mfa.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-key-trust-deploy-mfa.md b/windows/security/identity-protection/hello-for-business/hello-key-trust-deploy-mfa.md index b8d18d2c76..cbd0e62a4f 100644 --- a/windows/security/identity-protection/hello-for-business/hello-key-trust-deploy-mfa.md +++ b/windows/security/identity-protection/hello-for-business/hello-key-trust-deploy-mfa.md @@ -104,7 +104,7 @@ Sign in the domain controller with _domain administrator_ equivalent credentials ##### Add accounts to the Phonefactor Admins group 1. Open **Active Directory Users and Computers**. -2. In the navigation pane, expand the node with the organization’s Active Directory domain name. Select Users. In the content pane. Right-click the **Phonefactors Admin** security group and select **Properties**. +2. In the navigation pane, expand the node with the organization’s Active Directory domain name. Select Users. In the content pane. Right-click the **Phonefactor Admins** security group and select **Properties**. 3. Click the **Members** tab. 4. Click **Add**. Click **Object Types..** In the **Object Types** dialog box, select **Computers** and click **OK**. Enter the following user and/or computers accounts in the **Enter the object names to select** box and then click **OK**. * The computer account for the primary MFA Server @@ -541,4 +541,4 @@ The Multi-Factor Authentication server communicates with the Azure MFA cloud ser 2. [Validate and Configure Public Key Infrastructure](hello-key-trust-validate-pki.md) 3. [Prepare and Deploy Windows Server 2016 Active Directory Federation Services](hello-key-trust-adfs.md) 4. [Validate and Deploy Multifactor Authentication Services (MFA)](hello-key-trust-validate-deploy-mfa.md) -5. [Configure Windows Hello for Business Policy settings](hello-key-trust-policy-settings.md) \ No newline at end of file +5. [Configure Windows Hello for Business Policy settings](hello-key-trust-policy-settings.md) From ff537157400545735219330683b7820645949ee3 Mon Sep 17 00:00:00 2001 From: Aabha Thipsay Date: Thu, 14 Feb 2019 15:24:59 -0800 Subject: [PATCH 23/76] Adding Webauthn API page --- .../hello-for-business/WebAuthnAPIs.md | 33 +++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 windows/security/identity-protection/hello-for-business/WebAuthnAPIs.md diff --git a/windows/security/identity-protection/hello-for-business/WebAuthnAPIs.md b/windows/security/identity-protection/hello-for-business/WebAuthnAPIs.md new file mode 100644 index 0000000000..244894fa66 --- /dev/null +++ b/windows/security/identity-protection/hello-for-business/WebAuthnAPIs.md @@ -0,0 +1,33 @@ +--- +title: WebAuthn APIs +description: Enabling password-less authentication for your sites and apps +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security, mobile +author: aabhathipsay +ms.author: aathipsa +ms.localizationpriority: medium +ms.date: 02/14/2019 +--- +# WebAuthn APIs for password-less authentication + +[!Warning] +> Some information relates to pre-released product that may change before it is commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + +### Passwords leave your customers vulnerable. With the new WebAuthn APIs, your sites and apps can leverage password-less authentication. + +Microsoft has long been a proponent to do away with passwords. Today we’re excited to introduce you to the latest Windows 10 (version 1903) W3C/FIDO2 WebAuthn APIs! These APIs allow Microsoft developer partners and the developer community to leverage Windows Hello and FIDO2 security keys as a password-less authentication mechanism on Windows 10 devices. + +#### What does this mean? +This opens opportunities for website developers or relying parties (RPs), who are dependent on the availability of authenticators and browsers to build password-less authentication for their sites. They can now leverage [Windows Hello](https://aka.ms/whfb) or [FIDO2 Security Keys](https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key) as a password-less multi-factor credential for authentication to their web sites. +Users of these sites can use any browser that supports WebAuthn Windows 10 APIs for password-less authentication and will have a familiar and consistent experience on Windows 10, no matter which browser they use to get to the RPs site! +

+The native Windows 10 WebAuthn APIs are currently supported by Microsoft Edge on Windows 10 1809 or later and newer versions of other browsers. +

+Developers of FIDO2 authentication keys should use the new Windows 10 APIs, to enable these scenarios in a consistent way for users. Moreover, this enables the use off all the transports available per FIDO2 specifications – USB, NFC and BLE without having to deal with the interaction and management overhead. This also implies browsers or apps on Windows 10 will no longer have direct access to USB for FIDO related messaging. + +#### Where can developers learn more? +The new Windows 10 APIs are documented on [GitHub](https://github.com/Microsoft/webauthn) + + From 26600aaf077a754f47805e62d1bad9fc070f6712 Mon Sep 17 00:00:00 2001 From: Aabha Thipsay Date: Thu, 14 Feb 2019 16:02:52 -0800 Subject: [PATCH 24/76] Minor formatting edits --- .../hello-for-business/WebAuthnAPIs.md | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/WebAuthnAPIs.md b/windows/security/identity-protection/hello-for-business/WebAuthnAPIs.md index 244894fa66..4e38fac566 100644 --- a/windows/security/identity-protection/hello-for-business/WebAuthnAPIs.md +++ b/windows/security/identity-protection/hello-for-business/WebAuthnAPIs.md @@ -10,22 +10,21 @@ ms.author: aathipsa ms.localizationpriority: medium ms.date: 02/14/2019 --- -# WebAuthn APIs for password-less authentication +# WebAuthn APIs for password-less authentication on Windows 10 -[!Warning] -> Some information relates to pre-released product that may change before it is commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. ### Passwords leave your customers vulnerable. With the new WebAuthn APIs, your sites and apps can leverage password-less authentication. -Microsoft has long been a proponent to do away with passwords. Today we’re excited to introduce you to the latest Windows 10 (version 1903) W3C/FIDO2 WebAuthn APIs! These APIs allow Microsoft developer partners and the developer community to leverage Windows Hello and FIDO2 security keys as a password-less authentication mechanism on Windows 10 devices. +Microsoft has long been a proponent to do away with passwords. Today we're excited to introduce you to the latest Windows 10 (version 1903) W3C/FIDO2 WebAuthn APIs! These APIs allow Microsoft developer partners and the developer community to leverage Windows Hello and FIDO2 security keys as a password-less authentication mechanism on Windows 10 devices. #### What does this mean? This opens opportunities for website developers or relying parties (RPs), who are dependent on the availability of authenticators and browsers to build password-less authentication for their sites. They can now leverage [Windows Hello](https://aka.ms/whfb) or [FIDO2 Security Keys](https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key) as a password-less multi-factor credential for authentication to their web sites. +
Users of these sites can use any browser that supports WebAuthn Windows 10 APIs for password-less authentication and will have a familiar and consistent experience on Windows 10, no matter which browser they use to get to the RPs site!

The native Windows 10 WebAuthn APIs are currently supported by Microsoft Edge on Windows 10 1809 or later and newer versions of other browsers.

-Developers of FIDO2 authentication keys should use the new Windows 10 APIs, to enable these scenarios in a consistent way for users. Moreover, this enables the use off all the transports available per FIDO2 specifications – USB, NFC and BLE without having to deal with the interaction and management overhead. This also implies browsers or apps on Windows 10 will no longer have direct access to USB for FIDO related messaging. +Developers of FIDO2 authentication keys should use the new Windows 10 APIs, to enable these scenarios in a consistent way for users. Moreover, this enables the use off all the transports available per FIDO2 specifications - USB, NFC and BLE without having to deal with the interaction and management overhead. This also implies browsers or apps on Windows 10 will no longer have direct access to USB for FIDO related messaging. #### Where can developers learn more? The new Windows 10 APIs are documented on [GitHub](https://github.com/Microsoft/webauthn) From 895c9c7abda99b5a1078ad890752a4561cbf51ce Mon Sep 17 00:00:00 2001 From: adrianwells Date: Fri, 15 Feb 2019 10:31:30 -0500 Subject: [PATCH 25/76] Update windows-10-edition-upgrades.md Correct spelling --- windows/deployment/upgrade/windows-10-edition-upgrades.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/upgrade/windows-10-edition-upgrades.md b/windows/deployment/upgrade/windows-10-edition-upgrades.md index fc3d890534..469b80ff01 100644 --- a/windows/deployment/upgrade/windows-10-edition-upgrades.md +++ b/windows/deployment/upgrade/windows-10-edition-upgrades.md @@ -23,7 +23,7 @@ For a list of operating systems that qualify for the Windows 10 Pro Upgrade or W The following table shows the methods and paths available to change the edition of Windows 10 that is running on your computer. **Note**: The reboot requirement for upgrading from Pro to Enterprise was removed in version 1607. -Note: Although it isn't displayed yet in the table, edition upgrade is also possible using [edition upgrade policy](https://docs.microsoft.com/sccm/compliance/deploy-use/upgrade-windows-version) in System Center Configuratio Manager. +Note: Although it isn't displayed yet in the table, edition upgrade is also possible using [edition upgrade policy](https://docs.microsoft.com/sccm/compliance/deploy-use/upgrade-windows-version) in System Center Configuration Manager. ![not supported](../images/x_blk.png) (X) = not supported
![supported, reboot required](../images/check_grn.png) (green checkmark) = supported, reboot required
From 09925646d6029fb079490d83730484569215754f Mon Sep 17 00:00:00 2001 From: Narkis Engler <41025789+narkissit@users.noreply.github.com> Date: Fri, 15 Feb 2019 09:34:22 -0800 Subject: [PATCH 26/76] Update windows-autopilot-requirements-network.md Updated the paragraph about Delivery Optimization to include new content that is now supported (Office Updates and Win32 Apps from Intune). --- .../windows-autopilot-requirements-network.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/deployment/windows-autopilot/windows-autopilot-requirements-network.md b/windows/deployment/windows-autopilot/windows-autopilot-requirements-network.md index ff491c2f9d..7e2b2472b9 100644 --- a/windows/deployment/windows-autopilot/windows-autopilot-requirements-network.md +++ b/windows/deployment/windows-autopilot/windows-autopilot-requirements-network.md @@ -41,11 +41,11 @@ In environments that have more restrictive internet access, or for those that re - NOTE:  If Windows Update is inaccessible, the AutoPilot process will still continue. -- **Delivery Optimization.**  When downloading Windows Updates and Microsoft Store apps and app updates (with additional content types expected in the future), the Delivery Optimization service is contacted to enable peer-to-peer sharing of content, so that all devices don’t need to download it from the internet. +- **Delivery Optimization.**  When downloading Windows Updates, Microsoft Store apps and app updates, Office Updates and Intune Win32 Apps the Delivery Optimization service is contacted to enable peer-to-peer sharing of content, so that all devices don’t need to download it from the internet. - - - NOTE: If Delivery Optimization is inaccessible, the AutoPilot process will still continue. + - NOTE: If Delivery Optimization Service is inaccessible, the AutoPilot process will still continue with Delivery Optimization downloads from the cloud (without peer-to-peer). - **Network Time Protocol (NTP) Sync.**  When a Windows device starts up, it will talk to a network time server to ensure that the time on the device is accurate. @@ -79,4 +79,4 @@ In environments that have more restrictive internet access, or for those that re - (includes all Office services, DNS names, IP addresses; includes Azure AD and other services that may overlap with those listed above) -- **Certificate revocation lists (CRLs).**  Some of these services will also need to check certificate revocation lists (CRLs) for certificates used in the services.  A full list of these is documented in the Office documentation at and . \ No newline at end of file +- **Certificate revocation lists (CRLs).**  Some of these services will also need to check certificate revocation lists (CRLs) for certificates used in the services.  A full list of these is documented in the Office documentation at and . From 524ca2cfbbd54efcb9ae99dbef3ba9a1f3cb1909 Mon Sep 17 00:00:00 2001 From: Narkis Engler <41025789+narkissit@users.noreply.github.com> Date: Fri, 15 Feb 2019 09:58:27 -0800 Subject: [PATCH 27/76] Update windows-update-troubleshooting.md It is no longer needed to recommend customers to bypass DO. DO will fallback internally to perform a full file download if Ranges aren't supported. --- windows/deployment/update/windows-update-troubleshooting.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/deployment/update/windows-update-troubleshooting.md b/windows/deployment/update/windows-update-troubleshooting.md index 638a2ff2e1..131a99a2ff 100644 --- a/windows/deployment/update/windows-update-troubleshooting.md +++ b/windows/deployment/update/windows-update-troubleshooting.md @@ -103,10 +103,10 @@ If downloads through a proxy server fail with a 0x80d05001 DO_E_HTTP_BLOCKSIZE_M You may choose to apply a rule to permit HTTP RANGE requests for the following URLs: *.download.windowsupdate.com -*.au.windowsupdate.com -*.tlu.dl.delivery.mp.microsoft.com +*.dl.delivery.mp.microsoft.com +*.emdl.ws.microsoft.com -If you cannot permit RANGE requests, you can configure a Group Policy or MDM Policy setting that will bypass Delivery Optimization and use BITS instead. +If you cannot permit RANGE requests, keep in mind that this means you are downloading more content then needed in updates (as delta patching will not work). ## The update is not applicable to your computer From 6817e4c68363f2e9d68c268528de9ef723e3fd8a Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Fri, 15 Feb 2019 21:39:48 +0000 Subject: [PATCH 28/76] Updated whats-new-in-windows-defender-atp.md --- .../whats-new-in-windows-defender-atp.md | 18 ++++++++++++++---- 1 file changed, 14 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md index 336df39657..d664a0dd75 100644 --- a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md +++ b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md @@ -19,16 +19,30 @@ ms.localizationpriority: medium Here are the new features in the latest release of Windows Defender ATP as well as security features in Windows 10 and Windows Server. + + + + ## October 2018 The following capabilities are generally available (GA). +- [Incidents](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/incidents-queue)
Incident is a new entity in Windows Defender ATP that brings together all relevant alerts and related entities to narrate the broader attack story, giving analysts better perspective on the purview of complex threats. + +- [Onboard previous versions of Windows](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection)
Onboard supported versions of Windows machines so that they can send sensor data to the Windows Defender ATP sensor. - [Attack surface reduction rules](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard)
All Attack surface reduction rules are now supported on Windows Server 2019. + - [Controlled folder access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard)
Controlled folder access is now supported on Windows Server 2019. + - [Custom detection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/overview-custom-detections)
With custom detections, you can create custom queries to monitor events for any kind of behavior such as suspicious or emerging threats. This can be done by leveraging the power of Advanced hunting through the creation of custom detection rules. + - [Integration with Azure Security Center](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection#integration-with-azure-security-center)
Windows Defender ATP integrates with Azure Security Center to provide a comprehensive server protection solution. With this integration Azure Security Center can leverage the power of Windows Defender ATP to provide improved threat detection for Windows Servers. + - [Managed security service provider (MSSP) support](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection)
Windows Defender ATP adds support for this scenario by providing MSSP integration. The integration will allow MSSPs to take the following actions: Get access to MSSP customer's Windows Defender Security Center portal, fetch email notifications, and fetch alerts through security information and event management (SIEM) tools. + - [Removable device control](https://cloudblogs.microsoft.com/microsoftsecure/2018/12/19/windows-defender-atp-has-protections-for-usb-and-removable-devices/)
Windows Defender ATP provides multiple monitoring and control features to help prevent threats from removable devices, including new settings to allow or block specific hardware IDs. + - [Support for iOS and Android devices](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection#turn-on-third-party-integration)
iOS and Android devices are now supported and can be onboarded to the service. + - [Threat analytics](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/threat-analytics)
Threat Analytics is a set of interactive reports published by the Windows Defender ATP research team as soon as emerging threats and outbreaks are identified. The reports help security operations teams assess impact on their environment and provides recommended actions to contain, increase organizational resilience, and prevent specific threats. @@ -47,8 +61,6 @@ The following capabilities are included in the October 2018 preview release. For more information on how to turn on preview features, see [Preview features](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection). -- [Incidents](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/incidents-queue)
- Incident is a new entity in Windows Defender ATP that brings together all relevant alerts and related entities to narrate the broader attack story, giving analysts better perspective on the purview of complex threats. - [Information protection](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview)
Information protection is an integral part of Microsoft 365 Enterprise suite, providing intelligent protection to keep sensitive data secure while enabling productivity in the workplace. Windows Defender ATP is seamlessly integrated in Microsoft Threat Protection to provide a complete and comprehensive data loss prevention (DLP) solution for Windows devices. @@ -62,8 +74,6 @@ Windows Defender ATP is seamlessly integrated in Microsoft Threat Protection to >Available from Windows 10, version 1809 or later. - [Onboard Windows Server 2019](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection#windows-server-version-1803-and-windows-server-2019)
Windows Defender ATP now adds support for Windows Server 2019. You'll be able to onboard Windows Server 2019 in the same method available for Windows 10 client machines. -- [Onboard previous versions of Windows](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection)
Onboard supported versions of Windows machines so that they can send sensor data to the Windows Defender ATP sensor. - - [Power BI reports using Windows Defender ATP data](powerbi-reports-windows-defender-advanced-threat-protection.md)
Windows Defender ATP makes it easy to create a Power BI dashboard by providing an option straight from the portal. From d3ae6ed75ff7fec04769f635486c7bfe0b07b8cd Mon Sep 17 00:00:00 2001 From: Narkis Engler <41025789+narkissit@users.noreply.github.com> Date: Fri, 15 Feb 2019 13:40:40 -0800 Subject: [PATCH 29/76] Update windows-update-troubleshooting.md then -> than --- windows/deployment/update/windows-update-troubleshooting.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/update/windows-update-troubleshooting.md b/windows/deployment/update/windows-update-troubleshooting.md index 131a99a2ff..c4202da9c9 100644 --- a/windows/deployment/update/windows-update-troubleshooting.md +++ b/windows/deployment/update/windows-update-troubleshooting.md @@ -106,7 +106,7 @@ You may choose to apply a rule to permit HTTP RANGE requests for the following U *.dl.delivery.mp.microsoft.com *.emdl.ws.microsoft.com -If you cannot permit RANGE requests, keep in mind that this means you are downloading more content then needed in updates (as delta patching will not work). +If you cannot permit RANGE requests, keep in mind that this means you are downloading more content than needed in updates (as delta patching will not work). ## The update is not applicable to your computer From 1e45edeac57fd80e210fb10dd6f958e3ff90649c Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Fri, 15 Feb 2019 21:42:03 +0000 Subject: [PATCH 30/76] Updated whats-new-in-windows-defender-atp.md --- .../whats-new-in-windows-defender-atp.md | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md index d664a0dd75..f2653943c4 100644 --- a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md +++ b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md @@ -8,9 +8,13 @@ ms.prod: w10 ms.mktglfcycl: secure ms.sitesec: library ms.pagetype: security -ms.author: dansimp -author: dansimp +ms.author: macapara +author: mjcaparas ms.localizationpriority: medium +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual --- # What's new in Windows Defender ATP From 63ea4c6f76482d908666d137aea1c3a1d6333f46 Mon Sep 17 00:00:00 2001 From: Narkis Engler <41025789+narkissit@users.noreply.github.com> Date: Fri, 15 Feb 2019 13:47:07 -0800 Subject: [PATCH 31/76] Update windows-autopilot-requirements-network.md --- .../windows-autopilot/windows-autopilot-requirements-network.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/windows-autopilot/windows-autopilot-requirements-network.md b/windows/deployment/windows-autopilot/windows-autopilot-requirements-network.md index 7e2b2472b9..d4417a5ad0 100644 --- a/windows/deployment/windows-autopilot/windows-autopilot-requirements-network.md +++ b/windows/deployment/windows-autopilot/windows-autopilot-requirements-network.md @@ -41,7 +41,7 @@ In environments that have more restrictive internet access, or for those that re - NOTE:  If Windows Update is inaccessible, the AutoPilot process will still continue. -- **Delivery Optimization.**  When downloading Windows Updates, Microsoft Store apps and app updates, Office Updates and Intune Win32 Apps the Delivery Optimization service is contacted to enable peer-to-peer sharing of content, so that all devices don’t need to download it from the internet. +- **Delivery Optimization.**  When downloading Windows Updates, Microsoft Store apps and app updates, Office Updates and Intune Win32 Apps, the Delivery Optimization service is contacted to enable peer-to-peer sharing of content so that all devices don’t need to download it from the internet. - From 7e42b632fac22206ebfa2ebaf1f5e8319f445ef0 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Fri, 15 Feb 2019 21:47:18 +0000 Subject: [PATCH 32/76] Updated preview-windows-defender-advanced-threat-protection.md --- ...ows-defender-advanced-threat-protection.md | 21 +++++-------------- 1 file changed, 5 insertions(+), 16 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md index c60119b6e2..04fc82a90d 100644 --- a/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md @@ -26,10 +26,13 @@ ms.topic: conceptual The Windows Defender ATP service is constantly being updated to include new feature enhancements and capabilities. ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-preview-abovefoldlink) +>Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-preview-abovefoldlink) -Learn about new features in the Windows Defender ATP preview release and be among the first to try upcoming features by turning on the preview experience. +Learn about new features in the Windows Defender ATP preview release and be among the first to try upcoming features by turning on the preview experience. + +For more information on capabilities that are generally available or in preview, see [What's new in Windows Defender](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp +) You'll have access to upcoming features which you can provide feedback on to help improve the overall experience before features are generally available. @@ -39,21 +42,7 @@ Turn on the preview experience setting to be among the first to try upcoming fea 2. Toggle the setting between **On** and **Off** and select **Save preferences**. -## Preview features -The following features are included in the preview release: -- [Information protection](information-protection-in-windows-overview.md)
-Windows Defender ATP is seamlessly integrated in Microsoft Threat Protection to provide a complete and comprehensive data loss prevention (DLP) solution for Windows devices. This solution is delivered and managed as part of the unified Microsoft 365 information protection suite. - -- [Integration with Microsoft Cloud App Security](microsoft-cloud-app-security-integration.md)
-Microsoft Cloud App Security leverages Windows Defender ATP endpoint signals to allow direct visibility into cloud application usage including the use of unsupported cloud services (shadow IT) from all Windows Defender ATP monitored machines. - - -- [Onboard Windows Server 2019](configure-server-endpoints-windows-defender-advanced-threat-protection.md#windows-server-version-1803-and-windows-server-2019)
-Windows Defender ATP now adds support for Windows Server 2019. You'll be able to onboard Windows Server 2019 in the same method available for Windows 10 client machines. - -- [Create and build Power BI reports using Windows Defender ATP data](powerbi-reports-windows-defender-advanced-threat-protection.md)
-Windows Defender ATP makes it easy to create a Power BI dashboard by providing an option straight from the portal. >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-preview-belowfoldlink) From 0237fb4ff1ead413154ace7a82176e76bb99f08c Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Fri, 15 Feb 2019 21:47:39 +0000 Subject: [PATCH 33/76] Updated preview-windows-defender-advanced-threat-protection.md --- .../preview-windows-defender-advanced-threat-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md index 04fc82a90d..22185fea41 100644 --- a/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md @@ -31,7 +31,7 @@ The Windows Defender ATP service is constantly being updated to include new feat Learn about new features in the Windows Defender ATP preview release and be among the first to try upcoming features by turning on the preview experience. -For more information on capabilities that are generally available or in preview, see [What's new in Windows Defender](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp +For more information on capabilities that are generally available or in preview, see [What's new in Windows Defender](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp). ) You'll have access to upcoming features which you can provide feedback on to help improve the overall experience before features are generally available. From c76a7e5835e2067fa3b6d80f3bd208615988e7d2 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Fri, 15 Feb 2019 21:48:41 +0000 Subject: [PATCH 34/76] Updated preview-windows-defender-advanced-threat-protection.md --- .../preview-windows-defender-advanced-threat-protection.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md index 22185fea41..b20c0b27fa 100644 --- a/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md @@ -34,6 +34,7 @@ Learn about new features in the Windows Defender ATP preview release and be amon For more information on capabilities that are generally available or in preview, see [What's new in Windows Defender](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp). ) +## Turn on preview features You'll have access to upcoming features which you can provide feedback on to help improve the overall experience before features are generally available. Turn on the preview experience setting to be among the first to try upcoming features. @@ -43,7 +44,5 @@ Turn on the preview experience setting to be among the first to try upcoming fea 2. Toggle the setting between **On** and **Off** and select **Save preferences**. - - >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-preview-belowfoldlink) From d638e862fcebd781eec12ac43aac4cbc476346e9 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Fri, 15 Feb 2019 21:51:41 +0000 Subject: [PATCH 35/76] Updated whats-new-in-windows-defender-atp.md --- .../whats-new-in-windows-defender-atp.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md index f2653943c4..38ca10ad59 100644 --- a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md +++ b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md @@ -23,16 +23,16 @@ ms.topic: conceptual Here are the new features in the latest release of Windows Defender ATP as well as security features in Windows 10 and Windows Server. - - - - -## October 2018 +## February 2019 The following capabilities are generally available (GA). - [Incidents](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/incidents-queue)
Incident is a new entity in Windows Defender ATP that brings together all relevant alerts and related entities to narrate the broader attack story, giving analysts better perspective on the purview of complex threats. - [Onboard previous versions of Windows](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection)
Onboard supported versions of Windows machines so that they can send sensor data to the Windows Defender ATP sensor. + +## October 2018 +The following capabilities are generally available (GA). + - [Attack surface reduction rules](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard)
All Attack surface reduction rules are now supported on Windows Server 2019. - [Controlled folder access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard)
Controlled folder access is now supported on Windows Server 2019. From 99aae4d19d88452b193016b7021a88182713a255 Mon Sep 17 00:00:00 2001 From: Aabha Thipsay Date: Fri, 15 Feb 2019 16:56:11 -0800 Subject: [PATCH 36/76] minor edits --- .../hello-for-business/WebAuthnAPIs.md | 20 ++++++++++++++----- 1 file changed, 15 insertions(+), 5 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/WebAuthnAPIs.md b/windows/security/identity-protection/hello-for-business/WebAuthnAPIs.md index 4e38fac566..d43f98328c 100644 --- a/windows/security/identity-protection/hello-for-business/WebAuthnAPIs.md +++ b/windows/security/identity-protection/hello-for-business/WebAuthnAPIs.md @@ -15,16 +15,26 @@ ms.date: 02/14/2019 ### Passwords leave your customers vulnerable. With the new WebAuthn APIs, your sites and apps can leverage password-less authentication. -Microsoft has long been a proponent to do away with passwords. Today we're excited to introduce you to the latest Windows 10 (version 1903) W3C/FIDO2 WebAuthn APIs! These APIs allow Microsoft developer partners and the developer community to leverage Windows Hello and FIDO2 security keys as a password-less authentication mechanism on Windows 10 devices. +Microsoft has long been a proponent to do away with passwords. +Today we're excited to introduce you to the latest Windows 10 (version 1903) W3C/FIDO2 Win32 WebAuthn platform APIs! +These APIs allow Microsoft developer partners and the developer community to leverage Windows Hello and FIDO2 security keys +as a password-less authentication mechanism for their applications on Windows 10 devices. #### What does this mean? -This opens opportunities for website developers or relying parties (RPs), who are dependent on the availability of authenticators and browsers to build password-less authentication for their sites. They can now leverage [Windows Hello](https://aka.ms/whfb) or [FIDO2 Security Keys](https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key) as a password-less multi-factor credential for authentication to their web sites. +This opens opportunities for developers or relying parties (RPs) to enable password-less authentication. +They can now leverage [Windows Hello](https://aka.ms/whfb) or [FIDO2 Security Keys](https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key) +as a password-less multi-factor credential for authentication.
-Users of these sites can use any browser that supports WebAuthn Windows 10 APIs for password-less authentication and will have a familiar and consistent experience on Windows 10, no matter which browser they use to get to the RPs site! +Users of these sites can use any browser that supports WebAuthn Windows 10 APIs for password-less authentication + and will have a familiar and consistent experience on Windows 10, no matter which browser they use to get to the RPs site!

-The native Windows 10 WebAuthn APIs are currently supported by Microsoft Edge on Windows 10 1809 or later and newer versions of other browsers. +The native Windows 10 WebAuthn APIs are currently supported by Microsoft Edge on Windows 10 1809 or later + and latest versions of other browsers.

-Developers of FIDO2 authentication keys should use the new Windows 10 APIs, to enable these scenarios in a consistent way for users. Moreover, this enables the use off all the transports available per FIDO2 specifications - USB, NFC and BLE without having to deal with the interaction and management overhead. This also implies browsers or apps on Windows 10 will no longer have direct access to USB for FIDO related messaging. +Developers of FIDO2 authentication keys should use the new Windows 10 APIs, to enable these scenarios in a consistent way for users. + Moreover, this enables the use off all the transports available per FIDO2 specifications - USB, NFC and BLE + without having to deal with the interaction and management overhead. +This also implies browsers or apps on Windows 10 will no longer have direct access to above transports for FIDO related messaging. #### Where can developers learn more? The new Windows 10 APIs are documented on [GitHub](https://github.com/Microsoft/webauthn) From 702d5b8c8432d307dde0ed64fbb82ad809b80321 Mon Sep 17 00:00:00 2001 From: Liza Poggemeyer Date: Sat, 16 Feb 2019 01:51:39 +0000 Subject: [PATCH 37/76] Merged PR 14329: readded waas differences article from ksimpson readded waas differences article from ksimpson --- .openpublishing.redirection.json | 5 - .../update/images/security-only-update.png | Bin 0 -> 222446 bytes .../update/waas-servicing-differences.md | 115 ++++++++++++++++++ 3 files changed, 115 insertions(+), 5 deletions(-) create mode 100644 windows/deployment/update/images/security-only-update.png create mode 100644 windows/deployment/update/waas-servicing-differences.md diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 47f6a1f4ed..6568445c8a 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -1,11 +1,6 @@ { "redirections": [ { -"source_path": "windows/deployment/update/waas-servicing-differences.md", -"redirect_url": "https://docs.microsoft.com/windows/deployment/update/windows-as-a-service", -"redirect_document_id": true -}, -{ "source_path": "windows/application-management/msix-app-packaging-tool-walkthrough.md", "redirect_url": "https://docs.microsoft.com/windows/msix/mpt-overview", "redirect_document_id": true diff --git a/windows/deployment/update/images/security-only-update.png b/windows/deployment/update/images/security-only-update.png new file mode 100644 index 0000000000000000000000000000000000000000..9ed3d0f791544296f70bb9192a61f0405fa4f5b3 GIT binary patch literal 222446 zcmeFZ_cxsJ+bxXfVh}-uVGt5Mh)x)hi0GX#`jF_oGZ-yINwkQXM6aXwPV^SNkKS8! z2ItQAS!ccPd7eMu{BqV}F=H_1{#@7I*WUZ`NmW^nl=v|*78Vw%{99RdEG)tVEG!%$ zLLA_pP!lmOA9$hOIcdyQ{=hjVX|H%)|U^I32rSfx+Yt zWDFp7=SkBWJ~D6DCNjQw7U{X4E-2hfDL?OT7)p~ozPm|;5C;CYH(mHJ1qe!x`+vT5 zNh>+F+NUSO5L7xTV_}EcE~V=R(4?2*6AKkjI@c=NQ;ow2#@CU?VPwr}UWzGPvq&S#^uQ$LkkI9(Wa@S$eL(0%RWK-N>^ zL$X7oC4^1wGXywZCfjo_Kzx52Y?{q<|>O5jkrGI2z2{Aan9eZyJdrI*~!zy^)Id!S0a zSIN#5((cd+z0UoAI$%CC%<7VcYfH{R2r~!R4S|yJ6e8BLV`&TfrOC~iC{b6 z{j$$);r4gNqQQ>BnZpwybpYFIWE0Gzb)Um=Em5sa#?PA)4 zf?uc%20+3P3_xEByBkZeO3Z z31xJG`3<^DX%IHw_dA+oqFM~qxqS%pWow$?&3pN*l5f{QL36#c15=3D{A+82M}$Y`ea*V_|Ke6AUt3Y&ZQZ$-&`AUZz{oXcM{oC9~nY%8{$hRc_ zlrJo$Ud2!nAu1sv#wRJzb=N}}IQ6{ccj(^Yk<%js=uVNc0|}bG<#mTS4Bs7FnFUgd zO;1=u;lPGgZz=Wn#(uiu#=%GrssTH^Ljl%{FEl}0bTDID3WCb-*WYY8C1Ei;$z9JYQmo6GD?2M=z8Cvei4SKY|LE3eu7Wrsly_`Ba@FsbT5-0DOK)dRtRpTjUe?<7-t%>F;ZZCUiaSqWl8fNP?DG3cw@!S9knEy zn^-!(&-sDIWS^SGh4tQ~=j?z*3--R`FMTguPVpFK@+(m)41|9!)LXS%AtXXRSDQzt zz7LokyOGj3y1DQ_mm_G965p-YnrFO~qnI~#M5?l{97p`( zA)$WKF!&fOWq+iVaNL7gxy@RX(}cEBd|CLe?!dj#mii|ov@$VWXmPW~shZ?T2lDKt zDh01$HFpIT{zqnVGd*$oYO&~GeMbIdmcV#jPE! zkPyfxHQ)JXwtje&W&Z6*Ih#@DtWPrO)rPFY?e_Jtw5EimwlSHXCy1WPyao^n^;8H!4bVl@7Ir)Lr_dc52if;-NtA%txf7dQbl0dpt^qcqYTNMzMoL5 z05nih%Op=85%R^DecOHx!{?72g&&f*(S;(zkO;in*B6sXJPIL z1kHH}^;ep|JIC5~MC0B2=os4=@85dp9JsbJR_^H`u1R)(J%29ol25+wGvt3lD%up_r)9qvA4ma(14#_tw8PR27ulf79;1BX?$ok&omTWRo`jYOsti6 z3jZxQ(0U=2-+Wbgs=ZNpJ@3xY>_sS+Yn@wfZ}Y*$G~9(8N{)E&AMh9)AS*TlN{N@N4*oJKo9U%WND4{KQm6_&{X7=)fCnZ^5i&_NGYGm-*0|B zz=(O^k)uNPD+dR0N_(scu|VI=XH%eH0$6^M7=83wi(cyxb~Aw#rC(W`n#jc~(c@>V z;R24`=Q}bLG7eNENHp~63-IgfXQ`3fZ{LYl(?ScGmGh?aHtNkxxox>U6&XM3(Yq~?BkyP)=--u5 zx!Xx5GX#41V17+%j63Uz!SUAA3?+1}IET2fd4L}m_8a`CfjceY_p)g0Au9~ubi0U$ zGE}=&GJEY%>adUrf=lXld$ncGPs#$q@z$>JvyFRbpn%~?ysPkvjVZrL&ixcnqHN_G1xAY{=ryE>ylUN#!EZ)zQ<%7Nq_9eq;90tY}`9f7fMN*BQ7rlfCM zbY7!JP8R@s9`}Zk>XeSCzH6=YkNaKnio-x)3vt4gi-XtqhzN<=dmKRCCe=pr z!t$l)>OfoV5F1s+Kz_`TfX4BBU4K=c^LjN{5m^oH`+UbZ&FgRU`|b)Zh3yA9k6o&s z>i6TlP@3Mje-KTUVuE;(UbKxJBi8+04(y~jd@5$`h$E!}l=ynGE?L=+jCH^Hc(=EX z`;uF}6M|#nhmRGM@;Eu6g%lQ+8*;zd0D2+0N8fN9Cdg8E@g(Q3vf@ORMyX)e%{zJk zc5e7#vn*6kh{Gs{A0&@sUcMw8-0trxbn)%cv;9q$(Y%tk;HcdvIc_gnuqI_*TfQtw zwNZ!)WJrlWx8!JocmNGN&c<{M78@CrUVSMv+g`tUeb_r(KCto5Ex*A7#*0aoFfiRs9#rR9y=7ZC;4FCYrM*>&pLf znA%0HUB+!e()o{~!j5H{x57N6j<2IO$ubpjOZe&+i@*26{+wad9?~l_x!%WY4cBLsW9Q*P~0OMA zG!3r@?#x_3IN*vnKd!9|_tbk&9yGgv`Xt-+H(LB!8681~;>9kYP+#{C`0pNvu|=n((-pJ|&os`QUo?d3anh5aLGw^nD?6a!|ct zlJ~n)r{Z^p_c+vy3yIE|s*i~||`|9LeL|?5BThriZPWNu#eeUyzR5=|tZjMt_9dSFvZ7>Yk zT>knHRTQ6Pr+0qV4BvuY(V?cU)m79Dg(cptZI7O#ltYhR>p`a|=ZR+D?eoLtmJ)(! zj%>!Za9x&FuAgT!9Sly2s_sfcB5s36<_qT(@k<-}0=;&V20l*LYC{D9lVcW zauxlJ{x>~w^5`&JLqdh!%Q$%l?C&=w==7yK93A#Hb++PAZV`2d9JFR@<@fY%EMbyC zY6BjTh4mdUI;fROV~+&d@N_{@Q3@gIv&KU`2H*zSTRRLhYV2y(1~&9UD=`y!c9gJPC66aP927Z zHsjP6#%AusTO7mA5}|Nx_Q<^8NnoZkY@8jxbb7>qb09yI{1 z$Y-DG;6jWy-IQ?jU=z|LZu%_9bqu=QJO))5gk~TY#0dP5yo;yChzZdQOWk#P^!a-y z5U0zq5Y)^{{*@sCI}+sdR@E6B>@u;`HFwa)**;jAnYfT|<=a-gA2~t~1`aF{AmHsJ zOxIolQbN@JkNRjMSlztd^pyxe(rb46VsL#JRIRRIRaJ8N4e*CSOVOZ|%OSsp$+iwG zqxRq|+U+KT*S|re&8gpSWjvgPbakJ~$_i`B@)~GLsgFV4^+VqDlXGeJKhvIj7Nyrv z!>1btDWm)0- ze%2TF2tN|+2jR-7K4{YlR@KKsp7o-*AEH+deWsJiQ!*$U{=ee}Yo-ntBhSAD8^T3mG z!dE25`7QC3KY4PvXgB2GEV4RiU-WrcvR)7=q!Ify<@&`DI%^+Z^IHbb6SX)y4H9!s z)>u`-2e)I93wPBA{lMH2>>7AJ^Lv|7a^u2`L8t8dH-upGy5Zhhj?R8l&0WR$>!I$= z9rk=3*06J28=fgs)JTnt$CMWe+k~#oB8YqI!mRlAOL=cqDN4(vy{#&Epq?KtBX=SM z58NYD#xlSbW9~M&h}#kdQ*4+l$R{O;G7pM#DBXY$)f5sohpgm{2Fkq>z0eb9$)i=9s4rDc@6Ucmg;;0|7Z8iHkdu$ z9@Euv87J`|HRUq;a2YI;VlTB|Y=_Sw0}Eob`**Ov&-+|x2_??}0N2gyOUM#y&g(~y44f9ODB+jBzjg$O_2tMj`s(%&6p zHV5dPt|0=uiqgKOLizU>mkF_7GLYf@D(1OjPvvQYUwt$DfgBbs90SCl56**2?b{G! zyx50YXSCg6p#w-kjL@&NOo{8sdyv#>8X?EIg3a6h`maW=CF_4Ei?iNY4t00$FTW7qO^q{Z|DE^y5!c0_t6zSd>reSB=QPN~*>=r>>He@$Jiz}UUU^U0 zjE|;ZxZ{bmYIbYBK#e+ywhzUVOv=xHTOjY|o>4Cg%et^fl-F~Qy6eN=>08Rru69qY z2kw>j&6?>ztc{-Ss6N>s)Mnn$O72q zgNe_lXm(5c5=#e==`6O%EVi+YvtrKGaD2?0m^aefSj~c~1k6_y->5%04(RLgg}uSj z!79`A=_SIypxYb1|8SCQ+LoTjo+2_*4@~)D?yFMs+j9{O53wrzulH0{&(qIHqm_7g z)Rm>l8Nb(Fb}sx77M}GA-(i%sG{i8K{khDMXgAv!gB=+{sB4qu0zOcTlVGn!pBe1#jC7xVNHm#Z7=6py@Gi{tNVn{Y zJE0IiOUNQ&(W>?mbJ<6+UHXRnP6W_DQMJYqt#3%)eGF0}&{vt{q^e@Fc{BAD#pg~N z(#95C)SIJN_}4dY7u=_|n621Pu@xLZiKPRvyU(uiKqPcNVFQm{Luf-%w>Pet3(!cP zyiH2s1Zt88_`D*HpX!DmjzdEb1)2kkNILkUv06z@dpic5rWkkU<34`e2hnK}B3Le( zTmC-=R%7bWJt(zy_ec+q=P~_hQB_*g4@ZZ2OgRhTGTHMhul%B4%~#8@nV160Wvj-i zPE)1xhr@6KsN^O;ITuRBM8PRk*eAbzJ*0RT4hcM5eZxy{PB9Aq1c~#2h2$wGK*sfc z^wnru*76kKeq;l_Gyk5l1^YPm)AG1&|JWYWI<6ZSj5^rJ#x)R;*Qc9bu9#TbOo4fP zVclkwP>(~1@CC?3IVG)}Pk6(MRV+!dmXXgD$_$Hv<_=A03KM8XO-V`k?Ti%s`CTja=3BtSm5%?ZU-{EJ z^1=JmuX2rFEgQ=$k!6-Eh9%jJa^KIvw$ttvu8XA+*HN%GgvdFyP3Wm}NyWTSnhs`VGGHa7_DB68E0my; zVQQuEby#CCC?Z%TxD)kPF^xJRst~xXJfLu8t`Qn8bltq|m z`G!wWa#HwY{pdIVa4rgXUdnSeEhSGmbW~5R9v@%tnRcE8N=fcsBd$xM1wQx{@|$($ z%#Qo&P3JYoxIw}xVHgRHUaQ_3F@8*t$@lv*ufO_sVi_@+C6{--WQ_l$krx;t9aE#l z_w-&`KD95%gJC_dg(e^er@14AY9o(_I7Lg~f)69ukdxnqNW39G^zPRP(CQYC?-5Jr zo}qE@vH*HO=9;K{`HKq;lcVpBIGnoe&L6U^P;Zq~A<=%{cooegTDPK$p1j9o+7V#GmO6GgTt8LCsNA@`@kK1g4-JB4Eqm0 z;l=!v9lYPnxJ|_CLhYq?Kh~Ua0fXmeZ2}+~XfK-Qi9LNs8)~n1dOd{QklYp(bg4<; zLYuga2?4G;by@CKR8I`$R| za|ZRfkk{7{sQAO?BgX!|b;R(Uhlb^UE9`sidaiFT)qI{=UEqFldhsG2{h;FwU~Y$< zwseefg#{(hfj1QFE;=T?J!ois{ccfaKLfQYKFi~NH~@dgPM)%*!#pU}togAN%}N)@ zOJRzyw#;^vaqO;-R*U>>TU_Y-G9g$jzBFct@y|2UhOU?ru8U>=#fQ>l4sN)?t^6y0 zv9c*uIZzt(`{}hQ(uXF?MWyNYfFVt{p9(G9cE9}>wVyS#ST&fVjYw0L@2+)BEF#`7 z6MDsL@re5;4I4)2sYmr#9MzB=pgxb2;$H7E9xUF`unVgjJ zWsbRNc>zl9tEJ_TQV4z~Dj(b&vyW}LruuB70~9an*oI($FLxl1HAx#3Ja-BcYQcvx zeUemD^=ZVZO;PUJDLL;S2n8PGqw@~yt>POL@Tg0c&Z8t~XH(|2lhmm!Y8*buRy0Pi!mV0{I61*;tbQJ@ zZT6h#=SQ>QaQqt8hC;JP_mrs&I61#|HnWHT(7Q}eA!2^96S0YljKG&8-G7`SRAc9W z22_2{Lk?$N5jU&jx8w>9Y2W++qi5+oK?pM-7HZv1hOuHWJt2zsob#@s)R9K{6ZuY0xi|P?|#qGVya*Hd6f?C>)T=Q}2lc zux_B_;hp1>!%z=#xpC2+lfDx(KUVCXNI=#$XgdB`;2!s8oxCF?5GcAz;_iEd?=w>L z?OmxS7NUE8hy0Ch3f2K#TVk{~j_3hfqc4b5@KGc5n`+`-UVHff7;C9&^F({sd zJ0*??0YJ1ux(@3Tj&^7*dV@%>%T)Ve0xR6pE>VwvBCu5ExlMm~wX@6uw;)P|SfW!u9NE^JRryRb?kg(?8yK@-yrtEdZk7Qe3 zYhI~=XZ2KZGbgX5^R{Scy=~2)1^)h_l7!-pBqE%yHkmxR{43W%VUJ}^KhYWzE6%~w z0^vDA)82>vNmAvl%o;;ijfRn%eA*tL;2`s0Z>atfV!=_VxdPto)H!s?IG9gG1nuqm|9uy{2=y0<7?6#ttIw<#?{V9KQr_II2a;e zo#Z$~Wy8@@d_Bx|=*oz+AzR2A_o$#{Vw2W`bQV`gL2u>Nlt_-5^}I6Grbp&JUqp~C z9#CVC#8H=fB)vXVJ`Zg4ry5Yf({i!uQ)8$~6J$G3S+@#gsDAA_P{mpkJZo0Z1bEr0 zq%4DJ-Y3;o`p24gmJ4D&MVS$asDD&U8bn&d-Cb%(#0n)6=r&n5P00pn4PF2i|0w<> zDQNDb?=vq>UrQF!jNsg_yeOy9nvniwjqhzOWyf!0M@Prq0Zm|@nt$5JEsUa(G5_5O zXl+w|iO6=${a3;TSH5k5BBO9!`@t+R0Fqu6AF1KIeI&0i4AzhgkJ+plmXd4OZOPH+67yI=3b)!eNCceOtVodLDE5q`WRhzV%5du4DvAcd zsyH3Zn&wfQRRS}AZ=$N&=n7H)`{HA}s0uI~)=d5t>n3thr5J?*es0F5yK9V84zlVe zs4XW*EG$xN;_qA6OVK;c`)-}QwjLgrgAr9{O^G)pPqQ}*6Co3#KzgfCGCO;t&P$F- z8?H46dTS@Lt#69Cylhwg6s|q;C);DgqTT}QEgqrkVY>ch8>vl9Z+>0dbE4<+9c`oq zievauolZP!;l&<#3Gt3cf(8oXw4AT_?KxS_#T~)6p51pWRm(<*jnKQ_=|AFc-nmsL zjt4ttF&6G4ua)25N3_mQ=zXQ$fQXU{eC|}&c=;4Lm8wOk!ppJ?`=*q9c;wpR3} z==o^y!jY?GMCqwjSKrc+d@m8fVT)Q~`k6@I{pR@4*yvlBYg8BR9#nSRqJQXs(*(seXQ zD!hc>f#(r#Gy;E*4UrEzZ3BGQHU^ZgLL%AnYit)j`GQ+zJw zx6oHVC7j39h|%8J8>EqBi5=A}mnpQPzPr8}I03ADz!-}CTLPqA_D(d?igjlEu01>> zHjVyyOH&_ICR`yhpGTq88*ch5Nu=8lF4};Tdnrh?+rd}RRm7l4=kGg~vwaoav-Tv* zi*czCwD9|V`WkB=dso$cyS~pbi;s!~uLZylJGLM$fP(XOJUUVgG;j78`xE_+O3dYJ zW4-R_b$qAb>B-t^iKYL`-Lwu z=d%rldpL@w#TpkrY zSB;*8=I^*X@;P1+lU)_--d;0OvxLV|`z>is{S>9%qKsgXdr>e&sgsOXfoqdV=)=~% z4ef3CkY*2VJ?_fMgDjv=yE;bUTmy|@%DaKEFQ+A_e2Z9)bis69G`?oSQ*$Z4!T!N`= zvWR&ykXA{c_s4@v)vl_Q4bH*R1aQZJiEkjBjYCec52O6xCzcdh?yH6M?juPTb#ZOh z<1~zmKz2|3!oniKtB|6@>)#wyiTwdB9&JQ5Hg_yvSbp;opm6f7{9e%?aWiqqt8rNs zbZOXg_u4e2`yp0|AOG6*xfE{8*!tt`#z-Cq)A@}5E_*^}>&bxX)xaK{N_T#(-17Ox zNOvco9C75PT$C|Z;SvpNwJT7JAzcpPYpa{OU|?A3z2YtAE&mwQ03S2y!i@mh=Nm1! z=3Jdyb3MX5<$VD~2X9hx^1(ixb<@Zf1BX*thoq6C{0eiY#HY3`Tg^ytuRL;ozX{GW|Gfp#3oY znH4#EW+c@SdI|6ux#HXH)!J2t0EjmqV2&>|doizJph6XtW?THh?_~253&!|F2!h&W zlsw?I_adajuDWMKJoOj_HBN4^2;gR!68FGPR7f&*Zly*>h8StuI-BgY;$vPjVR#Rw z3r%=C=tuq-1$k<^$o3Tznf3;)m7)`lWXe4si&$YkmyJ~!&ZpP6RD6QL@t=|vGyG#b z4!2JO`te-#9Dc$qpLHNW~r2{fb)%>_{^eKX*Q0J(}`I1pDdy%IsV$iE|W z(SvOB&#UsaZ^A5k>Wlcl@o)k@Rr9aDL;gi^I%g&EB=<(vQFtLfLT?h+FtPPsKo<@f z0mBy*D5p<*p)a8884xHTqh+WJ*Z2u=UO)?UF4&*5@fLj{*3(QEc%hS&Y_z$BnD^T8 ze1CKb`0$^lq!9k|wbQl_24USRf5>!)I9+2#N;V-vTie2}!(vXLi_kkQ@Dl>DZXU7+ z0@=u)K~n?93!)9<(7;>VbrD{)?P zH#X0lige~0aDy%@WyZ)U8VTvgt?8q)_7gVDcb&{jJ>Rmf?xQ>rjorRC;+*@u*UCNl zf%<}+;X{d4gE23<6oO1cN^Nc}zr~#OI$hk&y04G6Hv#E0FS$Qa*NJa3s}o*S%zGS` zm0Nx*CVQ}xCcH9=8ndrx41zPJEjZ0J;|k%}5KKKphb=T>LSgGBl%>?irKqBR2hl9@ zUGHJlfIU^4J&;c6Gi&8WI^)xjMm;WASBgC{1R>%@aSg7*zj}JipfSLahX9A|Eqeq0 z4{RLVAfmd*Zwq16G&G@a*wS1;6${(_bq=$_rGsl5nD)U>GGb6h@Ckk?N*+%=6;5+~ zAufyqvvAa&VN;m+5d$b>#M| z+U7S&HP+gAlBjX%_v!TCnAk8+RAK=z=;kMVVPu25b3Tjc9U!A~s*|2YJugD51wXc} zDpT4Oa=p9r2ZKyApc6m!F;(ll?FAY@cCP4Hh$Z{v&!R~q8) zfCX(m)x^dnB&3WM!)MFMEhQ>F`<8CxF(RPuz4g&%B8xZh@axgb*{ON9C7>B(Jk&j; zI*~D+235W0|BSDPy=)o{dpQap51)%~T4c{%{FWEh(!(_gx3L0kmOW8Jeju++*?9wF zt9e7DqOU28YuNg7R%B&mqxn8Z#6Xj#`{l>Uf{{y4vENKD=`}{3qtnTN5L9rA?Ozd% z%$20<55Zz@b)Say_3Layz$uFTE~>v7u5nU)UyBj$O{TPqixH;0%1Y7rRACFEM*jqb z8)PFF&Yt?qaRa?o9?kR*=mZd9xr&@kewWG{Ezh?gfx5@QDobgd@uYnhknj)g+zp;= zA}e`u$DuLJ<`zm_Wp}pCPq?h5ehBBI$>boPy8V#M> z%8Wi=`JISJfwrnUaj_P}xTb_I0}J?5q=}u7T}Osd*>`TPP1LtQ`vdZG09V~>9ulS0 zN!0VJKV3ftkl`N73PvAD?t!@0tIl5PPSL`v2RkO()I;%jf70ELNUy&OeO>a6f2oCg zimhLu!vF7GdnDQ#4(Lqus~NK}}5_S%^cye@42>H|rQ9sP?_HMLLL)S>SFYXWEfxb4D< ztbaQQN)QXZ02sELV+Ya3LEJ*QfLUR^oU2baondI8){BPk_A;Db{}xXeczIo`ku`|q zm$ED{QpO5^=U)LVKT)Xab#^t-EhbLi#ZrH6lL2S`K4-WP1jh}ys0M$P1Bd7Uo$wQfk2@nD|r$QFZmWJIUp{vdfR6gvQ;n{bmXYGQWK=K4g$W2pKGd<1tt8U8j{IA#c_DwNBRTqO{D2$j!C%f7Nm%1Wv5ZwS? zmDW6hK!kHQiJIe??7)7c(fSf)2E~qm9%e zvWm*xlX3$1&CNIt@t1^1@6#Fsf%Vrefo^nWN%^fK&T_sH0P)r|^7%6_{BAi|ceDj( zf19qT?m}eOK!D3ecLCMyxSOC%?oNX{DOK-Q{=$KzipYj~ihu5dG!NV~>ccekuedE8 zTXwkV{^MI34?Fbl)+A@vW19|iSwa64Y=995`dF3G_UXf z+PF9RVkpIf>~o~bqK&s_)y38MQvAe!>>k~Pe!(6*p$9Bv2e*pPabE6t(AhC8eTi7U68pDZjdqhxb zqfJrazoBe*!qORuGI>n>Q|w`{xXv@ru{J}q;9O1XvqalzVUW*PZiv}K15P+t!QAE& z-`eI4UXBUs)eCE~NM1to&!0bLwvLn=;Uzv@Gb(DHxy@*__xK!wMQQzcX@qFPu}PBe zZu=9O|Ayrw3T5K?N;V`5MB-N;!dvf28N?n7eQ{mvl_2MNciMr(>3l2 zxqWTmxAeC(4hQJfX{~jx!tk~2waapP#UzNdKTV)9_5nQImMe&ikQvCmLo!@k$X+=t zE%HDyv;E~!guqmpAo%jW_$08mBRwvvHU}}M+~#K-hNIFhlZC}vnXgiK6igQ_6GJ`* z@ca@NMhqqFl>N%>s~PdvHMWcgk)_N_g=kuSR0p{g2GUdj;hr{#=73<&jUsgFGU0D_ zD3B3u+D1q=qgtAc11|~`m4<+A9-lQk9lLSZVux4#LHYUgZ@^e`v_24aQ6(07=lCqn zxmeYw0NE{yfqUx^fNkMox$i)(y&E*Pk*0083=uYgqZ)U<%X%&;3Wmu08BAURXMq4EB#bm+0fw30=?p^lNTO2ZF? z>V~?STSzX}E|=IozHO_6@@G>3ODY4(nRn!BN&24Wfa^{Bcvhj11qjmueP5ov;q0|> z90jf}aVcnhFEB)Ple&dj=bf!T{jh5o z_0><7Qfg&Z2%6l_F#T{z|<>{==v^erUIU^}VHgfnh+~BUe?AD1PNYo1U_? z$OpxE_YZPQc=KthIv?b0S^;tfna~*A)$cZ<2JW(`o>e> zRnVuMEw*ZY8(1_3KQvz4=FfTHv3q#Z`3UN_VOQa>)~@ z9J|FHve#*Gcncci`)3gtKfGOxHgRgv*#hp7xe7*h6qU0MXmm!dbl(3NS^*GAysQ`R5wWb640!U- z#W<-Ji*yeMBfqxanQ~w&}(m0KY6-5-aYo>l#WT89VKG& z$*^%UUd`>g9z}w3F~N48?3*&!$*P+));&b+njE!L8zTdGTe36awi@Z~B!g?cgt~AJ z_{`*Y^@vt*{S*ghzv{k(&-`5HwWRoXY)g%s2s8rn50E)7E>(NVWh3L0fiXa^z2Y2N zF5~s~qG50e3w@G4350;!cgj@NZk{==h{(J3=uZ651*W8}GVKY{PbvN0Wovl=AIJZ9 zUZyLXAEtD68eOlr(!TxZ;dpozRDnY#`ozPNrgOvaW5e0*Rzxe`_TpO%Ed)aP`75pKZJt>;rzoy6Q+br6?Z61aOh>()F#5e|KdVc>*Dx@h3?l^t76v(obacEQn!D9FkIx~ zcV2FS9*6XFi+5QyE5jjKVbi_YCe9koZqxTMAoj=S@;JEdWn%6RJpkqAyB#~AzKod z@CCV@n0Lt51A!wZz<=Il^cw|qBZK`lmL}F2hP*Nh-KK#p{Y$QWyhP);tyI> z+}m<%;S^AK%yaoU+u*e-kE2AFVS-B54S$u3B9IeLY$-s5OgLT0F~~4G)K}NSk&TUJ zlKL1!uj9dAX_NME2`D=9LjaacMqFTtaNaRd@jIOtaI8!)f^+D;u^%PGD0aHXhV#;W z>It8AZHN4M`|XLmUP_m#TaJ3`eWHFWU5B6d(f8;w@wf!g+jElJz?^VCwT28|*%rsO z6cuTv;cP~65OgU&0!!WbdceJ=iwe%`yso-FNP|kXzon%4-a6H6i5XI2Br-ICjS>Qv zyi4Eg<$IqFKuUJ9PpKPLVjRjJl5>0Sl0YlC>RGyb;;HmM?fTM{P%TmIo?58`_;fZb zH2rm5mt+XW`0x*LkZ$|qu4|v{z*qicQ(fY>-)O$hXii+9_Vn($t?R_!77`n?w*>~l zX;WraJ^1Z`EE1QFZpFWTV%D2UMX2zYTByKVG9uLitYAECHqUu1vl;dbesx$S0dISG zN~61{key*@=pd*%nhrBP3qUh}e1so>-$sg?nr#i%B@5SQuD zYT!iVSqL2sa_WYGBzJNPb)zgw7_!3B)*+ zAWE>W{CqouUf$VHF-n>MPx^7KJRU!JbLxAjx9!Sq^AM5ZM=skB^>-EaAL8&=$vZfL z{~ejG{#_ry&jj-4fbKP6WVu%!Nj2G3wpnDAVSH2VIC)%&e0|E|p7aFB^e$TxPIAC) z3L6^2km>=5zJ;QLLmSnzLJb!)*Zrv|QN1w;vHh0m8cmZb3RnO%yUo$ko=p8>irS%L0Chi`fs-KN3Nv+1~$ z@n-mD9`2x3o@50{L2$KV;`6ADm$v@MnfxfN!$alZO5_vLc91xmNP2&SqP=ay?e2KX z&ZTF*8tbi~@ntJ>P}ZX_3&ed7sBUk=b!>uhGRz?l38$ztPW1$O~|N3WnhPz{MdxS6*U-3`^GpWH>XUBpOfFffU); z-!KmZz&T&~^6CCLM7!8TPJg=3y7TDmOlv8Mo}ufS4@Ql%C8<1KHkjbd6S%|B`u(LE6~jX{{i5C zv2>PURd(GLmhSFul$K6`O(;nBMp{axyQEV+UPaJq(}9WnXH<}Ckz@otD1M^HNtj(#h*fp5?ZETU&*H+{LoTWdUo^M_ zWwCN~FE12zZ>88*k3Y@3ov-?^S{McQjlqBB|D5SXv_}wdkV2PAFoo3FFiPO!H_wuCCE{yVG~bbg>leFoMMrZYvP+_Ws}F0(uJ00G?IQg}8Bs`Kw09Dx zyOG44&E1W#)9uyy^#qtA zCyUyzV;t&<%6FVZw=KC{b<5fR{2OQGE@u#9X(-c!E_0y;jqAA%p9H4F(yC9P>Ld%E zCh2aqwD{b_=j+aQO?2-=at0e9`N8Pl6Mwl2C^lJZ&Bk$xdg86~?kx>`zfUa;BY#~3 zFDihoIz%Ev)?$vAY0RI@sB)AWc0Pr{5l#JyCWnj^vHy5_9Xymsb(fzB_JCXkTH)r* zog9^9=NRH$T5dxW^TAUR-xFo(Bgz-|P^~^;6lD|-fdNq+dmBw!e?opqs-Cag;Ftm3 z@OjHq>!UKzJZpb2bC!iCGC&umg#>apN12U{*Ip`KU=-ez#VWL)^1_@j>fb&&oWAcO z75RfG-wE~i6gA8sg5L+dZ;L6#o%ZgV#xr=0e8Oz!5k<{k+8(w{iySxebu5aGYn9N6o>V@2diHu?GM3 z{6Xzj4iy*4WJoDOQ#rC>c7j$&iW+;1YRufR<8_8M!qJ^Sqr`U1vNI2tz}6|a&*Quk z`<{8cr=Hb2o}s>ufxSAZ;Zxk;<^{O~2y@^(qCq}A-=DGoQkeic>Rj!>J ztq<*`fu-hD;fx%^->}DYzXihgoJ;2`(Su$O#8b=?mOO9X+n=;+4!y=LLjo3qMFybt zsfeQNaY|qb&skr)5SxWRO}yH@Ed`v+^WRN3zeb#6>)+>5@Yj?aZlqjAXIt%f3m1oC z)kDkip;O0oKdxGbz$Xqiv|yfv9$->3C#o}l^2eW-hU%Dj9EV@bXYu*B@8vrtdR|K} z_|fRJ;Sjple$ZU3Yc5_3l;b;2fpcWJL|lCP>q0nem0c3#wLns9UdV9lbRH<(vOid% zcel|-U8SGm*sOX}LRMBW1fty7XKWI`n12ZQ14SJfc7$=Cn`A$Qmzar+kOn{e)j&FF z6uQ0aEyE*!sobJt?BBXg=HE-4>@>5n1@95@0UFdmh_g0Lak!35%*w6e|vHCRP_GEAUyE@N{dia&p4}ATFM)}~GmU{P)eQ#NBPlea;lh_k4rbC*X3nX5S z^uO)b|)W6YAF1Zc}z246G5oA(4^Chw)p%3sS zs3mA}1kfnrK{BrSzv1~UclF!BSF&n#mprmZ1ilN@=7jn?I3x`^_-?8E6zT?rFl9y~`oq9-q^xPRjIcSaN8%v>muz6B2wo+3w?T*OV?L4;$ zj4V%On`#|;ERs;H&5e3!1th6E{@E|t1S7bggtY05x0xm&mLr&c?5v779to$eb5v$( zuHbb`WsV@1iP#Q$?+~ipq0Ntrd8H)U|Fc< zKb={i!UH=eLWE7a=QDOOsL%h-h#+&ci1=I2E@pK;$1;+nlV8C~^@W(}Ba*+IYmovl zf=DT2Op|_DpociI5Fj!fGOEZthfWHkNljjlr2|PcYE)2r6^EDq)$P@_q}sxLcAgb5 zWhe4s1~O7kO={OM84!nu3c9y)A&9>7nlKK9j+yUu3K>k5e$Gc*7ZChSX~;*tz8%1c z5rp(?@EI`zI~vQ{%RJL9<=%;e2?_Tx;b(&(Mv^@@=0FGm2L+f+DI+G9G&6qL4uLu9 zO+cg+QNTYr>J(z#Siu-pnktCbZh*Jk!Rrl*)kP{5WLVSYuf1*XCUL zXpNFfayFod4Rfhdp+WAfo<0CLyn^k=#d#7H+f9Jq0D{-_*84-m{9+^h(Rk%fdqBCD!HVxFMER?8B1WB2M1-=7QIwjImjnT-yP`J5v886HplUZ>}XI@7&T#e zF0izI8ESJrTTw_WkpC?A+DJuU$$c|>-WWV#kso`2ea9xFX6%^688a;IrP8Jh#vW4i zMzM8pe9=3U`g7Lw#Asu>mVm+FSFYEf2+;j|HTpyZ;=lV*ng>)1kPTFGlNZO+H&pdH z0tbK(7643a%8sD2mx4A6h;`sJG_LZ0*QXU4g(^|;)MI|}R?vs;?8P!eYa5(@;#HuS z8iuvLMdf}Hog_y)`L%&w~9V0@}r2vy^2Lz^v1VxI~v#uDxC}qLxj+OhU zbS=6OU`M({gf2pMcqHTof@=e1&mqZ7%PU`{t8%R-c?@1FTTrFYPIl_dU~-Wda<_bN zUpO9v#C5~FmkshE$T$Zi+Pu$H*?dl-54t!vi=-Ro3d_E}BCf?pnr`nl zUQSly^|U`#d5@$ZXAhcziXS3*yj(NhAc9GLvSX4BJSm;br9#M*>39xC^k&v)>zNMl zi*0!UJIx6w6^p>O&R~LTabfOh{K*sqgkuO4$2-tg zU!7UJe+qELh16%~mesvd52_6m7g@%72v<5W&+Gcfz^I5{a2)YEHoz(|$Dl*D)Waxx zDxj`!egSg%PWa;9IaxQH)C#_lp#SlGcIxB4M2+sG(TvE{c+rcBtDA~YzJ!3QW&i|Q zvfh(tYr>9r`%~mK>^F4DL+Q>FJ|ZTYFsx{x4klA|{*SakaqrJd^R7K1{a5Tk)K5mX zi2@opIy88Kpyx@NUKmy=JMM)Klp0ucnDAr^#>_quGmXK+It*Ak*}<7s^)NTS~g22w!8Z_fe{F2AQYc;qFo=wq$bi^|PKz^8G3H4e(a`chMhOAdD*0@{3{ z7r7LyCK-PJ_J=pz(f&qoF&LC$((Bpv{oR2j?@gAkt8w83bPAB%mhObq+&04LP2N>u z)TBLfcE5D_yKd?;O}7r%eg^$?i!=bb2S)bcLv8za8V_)x?rICh_8RG0_w^;F&6ch{ z1S}u3m?N+vN)yB=phKcg8VxBwbt~TJQGaPkgITqhvP>0|n{@KHv$iON+gQ?OApO#l zN&TF9n5k+sb8}_>IDH3Cl#Ay}4i$j8bJmK9ci#+kZrR|LIe{FsGK_a$=`(b}9BsgvZ(PB0}jxRp#vH#FM>)^j2wpgz z+;>TUACbWZ1{1ESjMW+$lHlVe1|_I?24?vjIFyJfpy^oKLg4HB{EAyZ+&k~UTzqJ(#v%2K=`Cr}0OQ)^h5HQ#Lg7%Ck8Ccg6&VD;R3sZ z^I06q2&N4izw;uavL%T0^cK%!(n|4qLPLSN(~eQ^a71I(b|S{Q7dJS9bbGMs_6f1If|0VFIaIaM z1npnD0%pFG%*IxY4Su#z&HZoqIL=XAC z3?ty*zhW;Z_+95QZmng=Wvg{zo#0jyQ}wei>EtGs);I_% z;XgF*?9htKpS*7RP*5WKw{qc#nlf`)hZJ%Lhy1$FWTsgovf(x+s2ouHfd=YC<{!U`U-9 zQlyC08V+^6|7@bOa3uZKbV#eJQZtQ!JW%`a$!ofi7;pxG6Ae&Rs!!f2G+~D7$)yz? zRI#Z#m(A|=8XPeg)SE=A*m8B1={Q%s=P(;LmiIHZ9Cx@=OD?%O7)95t|Kf7R&9(a3 zs(aGXpf%6w?7YI&hFAD&vfW#Xx#6C_sXnPy{Rw{|dcq*&v#X9}Z?D#0U&J>3t6Ck4q1pYJ{!TSO^4g!zV?{7ePZ&-XQ4Gd{_A z#zY_r*don~n~xE-v+7Cw^duEI%3A({I@j0Q0)P;u9=gi(FzR|)hICbexyT-0SCf=e zo&(=;hsrM@{l9Dnn$|W4iA58Nepi7V>LrbLh)G!N)KIA|5eO{9Uae$podRm%ejSoY zZ@T0m4r~o!;yKoorgj;F@lO&RBg8o1zvGq&ksVbJW9Im)^ z{)oKRbW6qVsuhq?ltAZNGVVP-KUq_w}XM4i)YNN({8^kt4m>bls+W zuw-x^Vz)d+aTzOqo<}%y-{V3pXlPC?jQEb1Rb{v$(>EfL?ZiGc-X(ro6s$k7lANhA z(ItDA|B~V@9Jg(J_|fBm1Om?{Ok?%O3JJQ^(GNGQKfRDuH@}TP5ATa%n-AawF$Qm@ zKNBLx7myqYl)l#C8p@_3snP>(kC43W9hG64}4D%2p=jUzSPA8IcW)!`oL z;!?FQ!{6q))BNGM5^FE_0_$39CaW3x&>%HL+!s}UZUQkhW@Fpf|9#GzLp_z#ucCgGjZ)zdW3`qRZ6h}%BA=YWqwoy;t3pZYp!zfh>H52K~#FK zwE?ki{dZnH0N|;caPVBmT^LWGX_J8-d)g#58ZiMqrqux1T12_AR*Bf`E3lw{a6wu6 zFzFW2lwB*|@aMz{yFqEuqu(LRXe=&`0zdy^P~PK^FLO_T2E30bJ?`x&n*Fm@wr z8#3({hi1TJz&qzmz>e^;l3DhWJf`mIV>c~2h9>|0kB`f$;X|xKRF>H`8Q=^kkrf0= z!TMiH$Q?YC8gP9Ke10uiMRDzU7z;cwgX7-GSY`Gy$4xnvML3hqoSJtOt|hEI!(0=>J%w2tpBQWKC-H(IKc7S_ zS=%4~v*t`?Xs1H#o=OJI=oYkG5agTfyhltL>9 zne3W>T8Uj^HiWsmKhW9OW4Bg-5Xla9Xx2z*Aa^F4nBz-Y}tRv&pxv*HVCP3I4SV>Xo za>c~I?U6||iFFMm2{CF5rw99%B;9HdD{mP@8Z$R*x43hrgi^boO$(p|iBTYio&Bf} zu~e z6IaceK9kurd1QxHA2~m8V3FGy8*nXMm=}?!NVaLQB;+J$D;8`hZSQSdt%)z3sem`F zQX+tM5dq96?mmX}GnaC`5+>6sIEZZ;d}$p)PW;T)^xuA0)3+;mLN@sbTA~ht!}6%W zM91lgU*H=P9d0s zR6;S;9#MyoqOg?Q4PJde}e`SvF6dRB_i^k7OQ!26{MnG98@30>!Rb$gTAn z7@tTk2OjrxLEg8H3yK*|Oy1A%lh`PD3aPU`(U5 z++v8lzzjfbPSq)VF$&SguYPY6V`IJc3PA*n4}=NdzRP#$zD@xLpKDoDd#!xXN|lq3 z{6Ek+_J8D|fwTxd)g}bLhlkvpaT58&uF}{xM!PhhDG1x2D#aB0!xW?&ukoSr z{QNz7H(XBgHSGc3rG^l!{bBoqxbWK+~S@F&&`e10oQGRacT!L3h^`cz#Fy$kojyf z{0ORdk~c=smoV#N!WkhrVtn@JP|bi3atsXvKK)m+0ZY&m-nVdwJlx%+sGo3WX*;T3 zlEC`K@Zo8KBv1o1F`L^`vr@grgj009kIp*A5H8#&Nz;o;ZlusbIoNRW&i%R&J~SR9 zcbaR8h%B`Ou}Sd@1>%SFL1Z|`rr$J4#HhYd3*bY3dQ6KOAJ2Q2&)NC4^uD%GXSdzv z3lUZD+y?=cgSt( zTn6kYe0>VHvl?Kwn8y`Ugl{15`h`635Xv!m%f|vyUe;ta_b{A)Nj?G3&QZRvdPXpY zrVfj&zvq0;xpkV^U%5>fdga}>s93k?NgXrx!TBx&FcXT0Dn2zNJ-uRRM1oOsHo*tW zClP&fL~>c-`#hns0M@6pJS0AM%;H^gaUXlmMlLoE!LZ$`*#n#!xe_{|B$?z5X zGbl2Mv;vDtSC`*LmFxmd68itXi^gc3QUM!55#dG#;O+8RN@`K%4SI=cCe+aNLK!MZ z2u}$l{V^md@LG|i%(|awKSz}DQN!Ph*hy^!80Wat%Gt-1GBYZMTmnQi-f}oG#wj#n z-Y^i|dAgllgbhFD&fyNEwLL$-w zneS?gS=Mc8YLagQ5D_-H3Q0T%xL4dIKN|j9AgO%4DGwYV5?DaI@eKoLb>JiDH#e%k z7obpw8$eKfUVQD~V)#CUTk(0q3$F>&?!&d@;<$u;mDy^}-^%7f_V5z&LHlOo%*IvV z;~dY2DR@o)N~oe_WAhBs)S_}nj)4)ub=$|PM+4^g6+2n z6&d(xg~rsXgOAHgs20ufXVF}CExM@ON3n@UcG9G00!?@pQj{* zW#0@_M1d;$$v^)LhM7=dYAi2F7`V~dl#JLJuu^Jd0`6IE!k7IKibBPCXG&Ddv8kD- zHw%&yXpBOKLx~q8!4aL1ZThM79gQ?Je{J2RZ*+SdT+^XS*7`p5I1?cd{R z#&*6hzKOlPkAT5v;B~!|I{l7ngpa!wR~hBxKu-;YNlwr58}{iZsVzzHdX3D+VV@Q! z)^X{NK}01{s?JT*o7!`=BKJz}YI^@3NgSl7FoM+XBjeNIWk<_l)jGM8Jdtyh2+EnJ z^85uF(MF2iYVH>3*f9Cdn3jHZ`+J3mP^(gAn|KaeN*pP|q!|G$_PuGK$QM%NZpNKU zo0$V*w72xyIhe={?^9wQ0GPMi#1HpM4!I#(ec^I?qNAnlV3VRZ&0-nC4*6d$HKA_x zjx2Gp_gM}$ucPV?MaKemd#i$oieDd?6$#;znf&xuP7*--amUIlum@(0m3{K9){K46 zEdek73t-k^JWGOOM~31<$w!9m8phn8>J4MG6)E~RG8ZJ)EaoC(`OEK+zG1;r1_`6O z>KBMTefe%})}n5bB%z=G@S@Yj8Rhl7L*`lPjQs-qc|frK&{Pn%7b@u)*@US<^Q`RX59$L7m5F=1rR5QyN zs86IE2QycXMdWzxL40#2c_)^P$F=lvXk~ZH~_Y5{;dw3%l)Kp zF>g6;#4f>8E%E8<{+u3_lxf6MSd(i9yvo+!8)(X#K!9So90<8U`N2`PvTdCdmdh3p zKt9gZvlRzb2alL5H8{l(pqSfXeD^`l0lks$VSI~Kgw4suus|jm7J?ZgLB-T46ZXK- zkP50Hb=qmjcWi$gZ7RghAy%K$O*LHNk>thCql+m1aYiLQvu3tFE4^j0)qSB$AqHUn z4>MqRmhoGF-?wlO9+*$*Z2G?C0}#mj5z7g-WGu278bKc-5B{#)xcXsYL1jPlzC9lP z2{390)cyA8Vpcn!=}A#^g#@GWo=|f~&kK`&NsDWn5nkEwq(49%6o0i}b5Mbe9{P-~ z`-hzkJ(bMG4;y)u71`E>;=uQGe-^&&i~w$$5DJhJ@AJ06k_P}v!^Dg}V@m`il&4KU z?LWabjApMl3KZa>V4t%jL17`^LxdNhdp2U{EY+igpKs%|VZfHydVCk+{Us+F&&+om zHn`iC#{nxQoG&%oM~A@(C*c>n{5O8c4*8aO`u*2UcKr^YJ1~%T(u6jxz%4jlo|H9Y z3?>;_0*p~r6#bnNWRxS<6EBX~@=}PHrRndBnp?y5@_`4q?qEdn2HBr^hQp1Yf4DG< z_I8r%s?~P*z zgmpRsObo*~mtyX{*EE=~EK%*fD8pd|Ukniu#lMp#?NuU~{Mk(}zseYN%O2(HmupP9&UI+{@n~c|-<=hReAp_s6VHa?PAjz}X#u6##VVm>AJhN>i-86Ei3S zVP;7{U(TI)fcZ>ozkV3JvF4N3085!<6jSOn_OrNjRzc-vhcJ}(0qvoQJH3r%5tw^CDz3M*MP|jYI|8+JWQDztv^W z>A~Q@_!^=NtU}o;*f(w}}^@!|XAETctNDL)ZTkalP*Z8qpXwq9xMJwFFAb zkJ8&RAtpe8FmT)0Sw<~M{`d53p}g(`key%>?`al1Ly;Cw=(7}_k0{~WL0w%j^*`g> zD*Ot%ys`5tpM$?_^2-^M3NJ`lSHO$%e`O&qIv~{{n5ZdA^xVn3w!Sb&O(uv34fFxG zsNm9{R~ZH#{cDQf$~_2MrlN7&rQiO}P{d{Y*{m49WXR8K@cJTpb}U@I1H;z?HZ61B zC2UZy)cu%;uo&YGa2p;sgd18*-iy5OgNa5BJ-3$cKW#3KFJ85x>q|dYOJ4*L(8}3~oXf z*`@jvaeJ2hz(>-^#N?#ipp^kI&47R8g>JvK+P|gp)#k*1m!Zx|nq2B*>{?Uba1~}- z(`YFq^S~?iSnja*t4#h+o_3T{dWQ=BY-b8?@vWWqzq$O~=ceQ<=Ni;*;nHpn0?avj z$9K%PaXZO7t2cD%npYmD%jJmiO*|W!gTU-Hlbc)ZR_!|vy;|eMZqoi~?9Zy4?+0y^ z=6&Wo2%H|!7}nu^!mZtLIFVl6Xz*S5YvAF@Q;KfL*JA6wbG&;(OD0hfa>Qez(V$<& zXBfj3%Rqno21|qauA>ypHjea>{c*ZzhN=Ie2O)i7i4Ug_uCTWaCjePW5y_}WKx`h15MUNa z*~}B^jx-C`)k2SAopEO*?AYgzMZ*3$6H%TVj$#Ixx!0hhJBjt8RhGA1H9U=ZT+srq zo&qaX_;QU+w|zjfqxr|C4eQb_&89q``MwgJnBVjboFo8-wqcLYl@HGW?T3^+oAKgd z*9t)jxpdmd_~oi+9!Aj%gjMt!yS!}b)9Z6sH0biyyxPdI1wgF__Tyll0h)kPCTjn6d%-}!IXUkx2$vJG5rkwuKByW zv#i*Cj30m`wa*=KhiO!Rlizu45e$wj?mjd<<$|}+QmLlMeQ)xj!D&nVq^P5)|U143GT&)UJ$QqFjc5^fNAp*U$IwFBY%n2Z@c$!zqHQb(RB7t5i{fP5Qm| ztZm;{(MrZR(RxYr?d1?NwH58@atD4;MzPV@!Z&S+I5W5kE{#w@4(Z=v#fIFOgKwZa z%5f2BI^U90Q(khZnQaN`X;vk&Ce`LChb7lrFdbwC#JRGb(tEY{@eDHz{mQ~RqR?S>WB#Wi^WA{2yP5C%Q9Pg?}GYc*9OEe zZ2zA8@tRu2VZPKHMk;^=Paho37<8Sc6BBGYBL`XlS3cM>0kXV-1p|a>%~-oTGs&WET0hze~Lb!*}-qCPat& zEA@?sCkfHSqA##@`X8>g2m+uZb?qh7rcvDu^3jsDIv~SAEoCzzH&{m@`};OCUW^R4 zMPJ7uZzNGBrFWa>cns!M?ZMp9m*6(neSmJ|Hmr1Z@Zes0BHoYofgaTBEl6YKV22fO zr@2l2_bX()6Tq7GM$V}2zMpOjIpQ$ugn$=-Rmg>Hp% zIC}ng9y0=z#fy~JO?Ub+S`N3mmoHs3=TL!pc)@EHj4NjDWRS~5&la7hQ9#j-_+|Ia z+q9yetE0oSt#5Q^L_Jumam+p=)yC-rwm4nemSOIj=Tp%4%tpc*k>E->ADhPrU_v+|AEmw(@dby#)TXpjkbwByU*M9T8NF^4WM1}?M28BB~ zXfT*zN|1amkOk>oKQMx`h|WennV+RWy9S*AuYIEc4Xc?KN4RN|B|IDU1#a+^4%|6e7l`vVw9f@?KPS+8-IO&^2T`6nz}GNua$(W!wbu5!eE90n5@~}i z$QXY)oPZVMEl0pE%oIHfI7aw|*0YFZ*C0Lg1JLw`8rF_KE=5;!T^@~+8{%T z6{d=yl^G9adUf-k#l>EO0THRYH-}&rSYj4T(gdpHuFxFAg}#XP|^k=xjEFsbd`X&2|!F0c4=DnDe|N< ze3MdBuK`$mEZi3Ao6ccEir&an8TjNt>2_P`S$%H^@@%xXqkTz~q@t^dpl-9AwBF~$ z-jmNc^aWCbnWhV1I7%}(hfCx7l7m^5yJzTPg5awg9+-8d(*E47p!LJh+*x`a2cQG5 z^9b+&H@)>WkO7=47fiF;F;pD7g6pOYG6EN~sV){wLyCkN6Wzcbz|E4!QxS7di|=4h z()&fN!Af4Hb7={GoyxAmr4MJ9cI&D?_&U^Q+z2x!!^+#0Bu4Z7Y}Q^j zpp@Qcqzx((nm5Rha~ZM&=gV-Dt30xwtWh=;#S|DBIqIy`PP#Cr5)5L$bk6^kE^>+O*EKlw0~^4yP*0A_!hBM zLqvk|LA_tx9Htc;06Yn#A;3Ke-=%KZ_f?{rd|lfVF-j@;6y zyVhPjpx^)@7@XGdo~K*r1F^g#57Ika+54 z_}4^B4_=Ki9;sK&@dUO<nZlB>d8j z@A_I0_?-#$S?#Z|>eKxBC8NUjjd(VLjq#+Q2~IC&&69qO^!^D-_(?Ox5u{dDS)-0o zDQz5l{HxM#b;-iSp{mHYy!K>8tsUPZ;svhx;MS5H>GS=njl(5aLW(+AJv9O?4QvAR z6LQf~vgfFKA&zc>w zw0Nz@1{N$pGX~ea0^X}EkWimXPR~4?m#Ws8#1iP+;To$YDYKgt{~ZjJPeP8Hu{-<- zSf99G^A#ca*NvuQZ$20z&NAx(s{Lo~NsrhH?7)m?$@Cf+9tuT5qI~xf!a?A_6uz07 zd$;Rl;LRuNWY9U8xpF=9W2PCit3%_&JG%~q9q5^^n`)Z8-NzKokIc$Cpjc_uI(dMm zm9R|sMvl!mBJC0MNY;N*N9`3Zl#1Kk%gz8rxc%1`t&!=g^WM2kfYCd?skcJ@T>FUG zqMG5`J#4ou+r1Z(9K}N5{fbTxsjpWCHOgy0f>u?kAt(ntpV+sOq=_$4YwiV5;Msz7 zP^<4)pFg|;$Q>_a!(_f%Dx4P@u*jMG)d+7qJ_HbYy2eWPUDIw=iNUONUjVPr{8h6M zx~&#C4p;k5zzhba-*|1Gu6ajT@g8*EY*wGAMXy4X9Uic2oG?_3FtgZNcaEjMCpcU^ zMM^e~mi(~Mm(0_u``c9ifeQn0wX6`cP4N_m!i#IEBkSMI5$FYB>qd2jp6_HgS< zO&XURYW>G!HwOULYW)msLDc8x8jl+;UBBn0z&Z$^$OtTLgi!?f6t1Eid6pb1cJawh zeN+9JXM3b(>k(5!uSe83nZx2G@KZEdK{tzpKa6+`&9Et=Mu|bPn_rl=ab@=27F0=BuvEY<*kh~At9U=B zLwDggHHW#CelhuO*bgU3VJfq@+Wt1&jFx2=P`rYl8Mi_#7r9};N-Iyyi%10?+xpTq zMpLK4+eWpNKJ)zC1PVkN`qGQJ-axr4z^-yvH#vA_vViNr zK-pKe>p876On*~sB(FQ( z4M(2v<3jiD$XC?pYhm(I^{u#DGTmakuC^O6Tk)lqiAw*GafvEV9o6EexJdM!e2%S7lrbjMNT9%G~5c3!^OcqDEa@u9VwOi zfQ6Grp_&u=o>D`mkL18$2|7nAl})hI;|Vc5-n}^JtU5;BeD`CBNT-dQr`q=~q6li) z%$V#6r}E35x{C7WonV;=|6j9q#&V1FjI51hQ3!535dE$7nTxi-rpfcDN>StJEkRI1 zBVF1B^nQJxU%?ALVtzl&>HVGI!7psvEK7CK9E`;+4hDPyu<{G~rcO>31Du(L(IdwZ zS_c1GUR=mAN{U=MSSJ4+|56wk)CwWeRlH!!dHLVZoF`u_nRT8o~My+%F z+_E&E9x0{s;z{07du6fAnv;fz$ho9q^T^MeW>*Gn2_6%>OQ^iA2dr!CY27CMU#ted zah+9PF7}$dLIdM^tEK|LS{C2m&d$sW`HpxZk;9PjbrA4Nz)u57srpisyQMbX7-O`L zdCDCoEmLIZoEzmS3A-%=+BGJR=2s|?A)O4EZ86Ms*;T1L`e7ed34nIKj@WV>Zn$S~vV^8@@XX{*(harYQh57UXuq$z{O7 zCQx>B-|k%`>nv^EJ~+(YeqU`DX>{4cieRYp`r2mCu13~5@aej*9W9Z{bYcYmMdu>X zV7{q+Tc7sT{NK~p23^?!o-W_Vag?Hq4ROY2!eP+F6#=XkoY zr-d!^RrlT4^C@x=ss!7RRb7q9-5E#zF;xnR5OarJUyRb?3jeE82O z+$$1zVk_WG6Jbx+97wLxq`hhZvk+V;U5iwVmXk8NoNWt8z8l^2gsz%DLf@TWjdP9l zo=ekuFO={0@A2f3?pqCA$}X=Ca2c|Z&Fpg5%a}B>Hs~)Sr*!j#^kRarbA1Ek308l` zBnY5@o5|uQ?H|0RXfmeCSCZ)S5kyd*ADjH)*rr`WBx@FGhvut6*Y}KK?0;C!-Fv&9#~CXKir^w zM5?x+)#trLhGdeMBbb%V+kZI}o&BZk!09(CTlZua9nbcr0K-Idrw5kyoJ~U&iIQOc zzOJtKZ!YbDwF~^j;8a`xzfBtBH0j}_{R(rA(%w5YEHm%8iPfX)feB_%gb;XB!?%Nv zCIYVZ+5u=OqG<`(t^mg#Y*uYe&C$rvLTrh8+ORiC35#CJ4dKF|iq(GBBJTd>nDyii zxfM5=zruaT%&cr=+L93H9jJLi)l$z9;n~VRp;pt2K){;4B0~MZWd-w7n#i_qf(2i3 zUJVnWF75%98C z!B*vaX}c>dNwDcW;_+agOjz%8_i34;+5)b-=QbJNJ#^elfO4=R+-r6)OM+~sl;0oB z3X@$}!4ejNKM~7d0oo|!)5Goldw?7TWAO*i&uL2tVE-gMxc>H_VXm9szT&Rl1zQF$ zwFr4waqZ}vOqS(=J_r2Lqd(OJBGCfUbMaSBXIyLo0lh;-TA?4;^Q=Xkzf#N7XnGS zr;CqNnMjET?j*EKe?@@^QG;9ht^>V{Jb*puo$i@jKg}8K6(IcofIATfu$Pk7yYsT; za4;p4n$@pE->!ZJxRopsXQ#s(LS_-I)kZCEp8iYhlPA_OZmh|*LZL`(X>g)^s>z-7 zAQE}3v>gmw8hnIXmpc^XBV|onr%wJYvgfYuo-NquU_X;Z@>yxeSKckj9h8|_?u)On zWft)uHxdr!i&drBDTZN5Z%TdDyFvaKtfyZ6@$_}?z3TbB&|fJvo>n`rK^r_Y0TfOBS+=eN-%l@-!AwmoQ9;*ajG#lon(F5nlYu2s1LtJQxk zkT6v45L()d3Z561{yTAa#21d(wjsazN|BKmL+r}=o`#<_p|zojH;&WHYVc)C*O->$ zQ`3ki*oE&dphh`@-1D!hU+&$Xe^JTZ<28Jpdq&8Hod6{TU}WIo?Jn~tsnw#gMD1n^ zBzbO{j=_c3iu*U?(?$d{gI-;qIx~B`U0)YTgwyn2yrQUEn_$&4JX$+Eq|P6u|KuN! zh1$u&F1x3%Ccs9>Hne{r!Y6cPfS^ugZNrgE0g5b8_@>ZQ%a&lzkn{S-pL~dM0UcTz zrb5~dk2BA7%^#+p5@?}`>W%ky+%Lrp-L7}OqqIts5(%^B zNRvcq{0n?~CnBg6_&M14lNj9MKH}U*pFqhy@td-p3^f3X4C)x#%`FnJBjoEyqxFf_ zCTAW@iFNyhn>`IfBtb`L^>-O(ie&2w@*mCs!UYNvNee=-^!eT&U{R79urrRn>}-<1I7kM_BQ*Fraz;#waaSLGLHRgU&auM-{XJi2x}OrH+@}JTVVp;t zZ~u+}Tbt7|^8ykR!HRKPz@P!Rfe@=xy zX?krtc$RykmSb3d<{+%v$+HQHe}HED7K^sacwG4`+S}eNw`C_bS)~f>a&$co)ya$6 z63j(bd%E~03~$8Ef%l*u`74LP|0J429;E=co?nFI`RLv~*WGc&86E6puAUUm!U*y?K# z)&l7?hm!7qWY7oPiR@XQ3=L<+HZ~&pnBqR(AAvzY=9^alj5ABkLf_O0X4V~mYfJnG ztGnCa7M{s%6mlH&q$a586$a{a?$^I1;SIw_rV4WT(H7%4nEJ*mgN60u2MSVZBU(Bc z+#@Ma+64CYW<6Amh1BP@F*$CkWkWW5(){-)u!#l3K&H9#9fwmM4-06c=9pjXHPAk} zLkOQYWbC!?z_^N$isC(Hh}=Y)LbpidILcpxtqNc<@YkU>>$__YRnK(I25t8TdT2u0 z3)6m14C;bh&FVV4@~_W~;O%_0H6`%Rg?r3LcY)UtM}+Z?&|ty2!qnY4Zi%7?#q5J~ zHP{j#uQmyAWP)WY3Y`gP6e%*C28c3TGDa!`Qw>$-^O*ibppeu>tpghiqT=Zg)2q9Z zZx6gDM%J^<|8s&eR_=ZWUhIXw6~*M03Wp4JThit^5sk%y_mw2Tr|4pwvJ1nhBZ9$B zW~-E6vb#JHq0ANO#abf3^vdmD6z5pzyFL)a>5h8nX( zpXm^fcu>J(%Uf_P5@dlodWTK-ARx^^008rbi?XN0e`3;j42U}nPUEW;`+UX2l z*JDQ(h`iA=mhbKg*}#gRtfaC+?5JMK-7GRDbNXGG-?BqTRQ@a?A_DAm2HQwsH_QrS zxHxWtRGXYz0Der7UP$>7I5q02!9s*(O0hk2s)$DUz8Gt}wRSCJN=L;jmeQNmgJJn5 zbVb}jaM=DEIsd(1QBR$H)#P3802CvEwclnLA*{7L9K~9oX!|K2MF<;lC#WK|8k>&;F@UZZV71+B&EB%8>CAbq`Nys z8tD{}knRR)knWO3x;y1=zW?6);47Z9&+OSVYu2nq$a8TXs!COJZQ?=aS%wo-mg$`K zt*mwZIEQ?KmP1E(fI@~?JOq((yElVmrgxN$359^WC9E;q-r#SbC|oS} z1P?)Sk>stvCh@V`Bs?6w62c%P&W*VZ+k+#LG3kyt(vBgqTuw~N1+$WgFIjlOj8rRF zOU?^uo?;-3A~tIRg27$6=#%=Y{0R1}fCGP8<1(djDesu8Mau_qp!EV|$%pb|LZN@w zQ0w~7b=SYBI#rsGeskR5n=f6{b(c3)S27G?=9UP%Tx4c?haZ?)VNOOQ<#fhPUR@88R{pdHe_ zG!q(pMSkdY`kvlu`(7K&FJ#dA^PxbXK0)&G)3s> zcq z`s=$uLCLssldVX6a&m`eAge<1SZb_D1hFjgk!xY^@=^uxGll#lNF`tN4PuoV|9JUP zbtsN<;IEFEt3TPasIdvpka;z_HbA*CcK?Z){Q+#hK)yjYsn#0G_XF=ph+|%y8wPi2 z`2qJ=iLrOThl`r3ZvGAX(FOX)y4*&0iQQb$2Elj8z>bfv;{f~ap2J@yfh5;*m0zN4 zvUKPhyUCA4&q6U!0^fGCc#tEE9#jmiBDw zHj6vBLp}_XOV3GiuUPon66FtTYI-=W#ael^NVBVlHf*591$J!w7tp|?0Z3V3kHOY^ zu5)tdC0c3BpyjfgsYGO0z^ure%#^GRZ7O!jHmPJ?qaHwSw|g3bN}ygc`EXNh@U;(% zO6K+G7vOlM`|M-23l2-V+kUo!5Ige@BjaQS$8U#En8Rpm1GGSap2tu}CYDNGS#@+d+=z2oxfOLOvRyT)Rph}2+NR8P%`-r%E^^) z=5z$mH}GvJxZJtzy&CZu9^E~QOR}kAd}{(@0E2?d78N)T$pqVup|4G)`vO|mN-Bg7 zZdW}fqHY$v6riLEa(EsqljvZfH@AOa*W{N!KU>|_cBO%lC{XE)p~B%({9|HRd^9Nx z+SPt$7gnt*W5a;PXP0}<`31#M%I=MUwxFfQ9uvaS(d)|;ifSIstJv%}z$p6XPNxJ; zMjvDQ?PhZO?X7foV?Nr&@^}2=PdJyrhzShA)uvrA!x#2I z1NC5P?)L8_(EwZ$NJXr)!mWffjliYk>7l z`@cSBHJa;i?n>lDwOd)x=i}> z8Ai#b&xDdf*S(=2ICJ<%*%V0UVEaAo-h$5WGouWUA_W3?JG&sA69UqKb`H3xg()j_ zKz2czZx8sKEdD%UDkG)=-VtVwiok4zpTaqw0Ze8aFry3)42p4I32fC?8vwNYXWz+X zgDOy22egco3{Wn>Hw*xaNoyVx$BD}RzXbmQG9=Ko3e;23qL%&xMhu*qlf*8_DdX`) z@0KC@8Lsmg0P_kMl(&u~i1Z*^!P}``2Xix8z1{IFECxlfFaPrZK1s$0Yo9&GLJX1% zFoX((M~fvU5p09MgD0&_J4?RIOchaN5Dm&cz}7ONK*(pj z3@@)1WBaxJ_3B&qA=t{lAFZtbanSUd0Iw z9c5WaOE!?$HlsPw0pE^yd4zD)PRM(?z7~`yqF~VsdtTrzQTF;Rx`>T5s9T6x1^5gB z0d^PihwK~+5Q^q1d9bt4ynZi_b+dp2mP=0gB>M_X2}gBqh+CWHYgNX+Yhjhj_PASa z%t0`;4}5ri=QkhVP3#Nr7{q;O3~pk7;2N+!vihbNy>0m1#Z)Ac`xj^|({ZQteC=s$ zxKK}sFSl5BufqXTeMz`dHIq^GL_#w_k;7Ae2ssj08QId`E?l<4oCnJR480n4052C5bKyoJzHL%rUoue}} z;sq4z@)DO~fQ5Fkv#>;vpfo4SV3T5%Q05yC=2e2WfF@1&J0^&6Ye^69gjFWw7$O5o zNZS%-P*>dB6Hl{2Fg?@Y1r_Td%pixUFHct{|E#!?XYv+116v>xLe-Ys-a^{B62>m3IOHH;eXYOJOq)K=n%1(Bs*YY4us5lwnD>E zVhKpN`Q1G3&XCq6aw)*(j!iH=ohKL(w7$bKg__nM{2U(>s00S%*UHP?pl5YN-*qWFFmv_RUF*< zg`3~rrY@cz{u$4f^Gr8KK?X%Gop@t zX57S+ncm7gZjAAgkBhZ|JW@ZY-!BKiU1&Mju5GqO7`(MXjY9&ICY)*HYVP>>RCk;i zDBriw%uz~;hVApfdbRj(d}Io&`dKY)fh9n$zz!3V-2z^=C*4D_NW*#5%DwVUF)&4; z0S-6?#0a`3r39S88g-HX-c{AL-5Z^*6Z$b>`a^p}oiPgm@?lkE*Z}gYCl)AWR(0HH zLNtG^BK(jyC7d9;+x#8w@WD0<_B(z9T!Ad=aO9>pX{`Oej<5z*Bek)>vTO z<{^-r0R(W-ZbU2USA#Cv%UY+gzup3buu9(dJ=7G-2w^fEH5U1xyDIP`u!#f)bHmId zH?2p`@40f^&=^0Ijb}$EPSxeWk$~#zwX4 zaS*_6!222WLVrFv$ifbC)*SOK{XEi+RsYeC*xf=7@(yR|ov0$2Etb)Xm>t-G>ry$W zd?4RD!jBnmHwG((O@4d0>NejS02cTd=@33Dm9Dk>&Pl_Ra5kplh;J$n)KSZHVlxn} zZ*8IX^ET-Va9qF>Fi`vx=o(w%_N{?M7ZMT*etC}qzWU&G;1Cri#qb#e_J8S|E}DAz z*IW>7qGn>I8sdBcNjE!QCAkA3sZdUwdws1%$eLnr<*Scg!A9V4i4Xp?v;$L|1K@#5 z>6;Uc|2#UR0SSBoPNV^cGbl=*=?(d(s$T&>#HK7fim+u6c zwX$KtbX|ax)op=DG+X?va@JW$Mt}$&T*1BqDdu7sMPov*|)5i^I z3~1@2RO#n59BPNVyodB;T~Ri zvxc_e0b{2$oBFTw0)gY}m`XKpF{m4oz{YwfOXP}e){k{3BPR9II9nH!#SYCkHsQea zdsC7Hh>d}iOHR|1tWpzmEm!7$R%Y*K)b47NnVD_fyy!U6Dc;R|HQghaiH0?Yn#8Oa zS3RocQo55f@_Rr+vcbqk2A(HLRyz~uq`qRkz?To}vJ%uJs%)CZ&;Y$X4F4B@J{86Z z6ea;2{9=D<6^A6c6!^|-Bf*A@q(NCs6M;9d0BW(H!w=bmgN|EMTKh*Wd3#_k?mzpr zv||Fu9YZr9!Fg~({Dao>G zc@J36IB$fux99)pT4b5*0%3%Xw^8Hmd0R<0X-IpyY<%p1ja<={f)9P+J4$+6m6??p1uVbV!Y!V)UwE8t;*bY%M=+bPQy8*KQ3VF&it2O zYZDOjIH;^sl2`G*z3uyTCN6R;FrS0`s^C$4Z>xH~QbOE|mZA1H>-ReBlj#Z zg$1Fp5%!F<4`UA$9Oe6@y|2WR42j@j?1*LPe^CxhaR5DuU%Fuo z$er(GKSj=qNH(xUBmc(8C6^bg+G#-p>X(VN5l(#S2#~%GA-oe6rhpfFFFAmYnFLRa z)lBIeZVsWbm_hk_36IW`GmephV(XaZfOP@e8|XW@39)khF%g(H!W)0%Mz2hG`r`w{9-#|EqU$l8@87v@>qBK$Whk0X#jB>VC4Qoy9p(IC_j>b2@v<^Z(} zEby2Q4_Iv=;Uj)l02F4Ri#9Ffl+1DT*9E`T)+Pydi2Bi7p(QFRD(w>=%`05?8_bYJ z0s|DOgvGfQ))$&*@(6)K?bDpj79azIF(yXbACCy)lM7yH!d;W0g`J>`758s082I@1 zkH3K2D(_T?1SPHokWg>(XwheLNHI#?iuL@ffIdL|nxC~me)jt0<#uwDuUWM98Rvt^ zt1Y1Vs6DltE}9Yax$HNA!&{Ort3Z06claQ0oS0Wwhi^kSx?@WwwuvQ6eL(kCTBJUv{AY~%W$Jd`lm0tNQgC1KZjS1ez zB&|@u4ukwyc!BkQ`Uu54asDUEiXxK*mHvG7Dfd2q! zfgYl_6cz3Q)^IX#6V_h5SO7x3m|1a3Xhzf6cNvj;QdN1&$Yr4f`(&&@re&Wjwgs4L zU{N88E{Rl`HRPgQ@Em=6o4tC`$ zNAb#BS{W(A9t@~F1~s&XJMzopFb09j%&6XR?lHl_s&BYtz|ih)B2q;?P(cz0)OwJp zmt(!4)G~m8q@ddQ^LFmIVmSmzK)|vDtbLh{OIGY3Gp%CdFNSe~`oB(M^=}Ym!x!{7 zVB%AD06+FQ)@u7aAmQiS0L9h$)i^UC87^MzrTTvX!Y=%h9;s*2)!~R}#ZA9L!*D7C zqHKBy`TC5AEwzjCF%Z@;dV%P!s4!RnZn?ahMN#O*oLFRYYS<3z)5I6m5qViWZC3~; zyu)L#O$=^~UYtKLAzUG=KJFZc@%{5y~8-v z33XrA8bdZW+ZXA?*TPdG9c(Ir`T2riocwA17akI2ot1|W#?7bNEA(g!!=|k>lM|BK zLBJQ({pcI&a3_8R3@xRHQ$6yTicC%EQEyG|y&h7*~;;LV|~00svTf+yk=DGDp# z5U?y#obZS8(CaEu;LR>E_9B1HAT^LUh@fX!C-2Fpk^-9sa$7SnFxCi*7)?N@lPp4v zCOiPxmopVzD86{@yIgUlrDt0M)mU}ud%srh%%I>eX1Ni5z`oIu4)|)D4pHy3vevjq z*Q*7i0$}N#RW@+e!p0x_GKt3j3GW4vRtgV^r`fC@-;GV|iTjNT05xDB;l~^gP23x4 z_oHl#-T{YlMl?F=2ruk-Mj3wgw0b<;MPHl=r2(BAo~8X0!!0)Gn)qV9?*t?<2q9ii z7$r)+AZ3MB(9b}e+M`wSmz%3028yv{HJ}3nYWBj^GY#=ZT>SHt&cd9fhD&99^>7Na zA`m+YJFeC5F_fm4?qT5J-7>ZqAB58Hy$?^#%IE|E1%RC2oS@aOeq`gfHCmYf9Qm4< zKH2PRZ!14;{KZOq*_8Y{eX-TQ-QX8cehm7;4GCn(GZlB#*@f~hcZ3ErhVVV~VuW_O z@|V$KA{4s1bcZzn_>ObudQGD!t9y<#I5@~GOllkYU%|l@Lu3JTbFYBh2oO{{5!??I z9zU&%Mxu;ndNico(VxAR|6Adn&p3^SwFRf&G+RY21Ljnwoy^Gxzl3O7)J=k6wzwC# z_e|NLKhf_K^JM6G9D|yro_-iC8ZRw9`d}U0F84X|T4uD6a;whWc1XXHyD|SDN;mSqk)-%Etn}(uKC|P%SX3K)O|ui zGleEk*rB~pGy^El$a%aX8O5WziEi+F7=XQqrQF>!9|MRIBmD0v0IoVFa%0G@{)TnCOn1i-km#)sO{?p@3&mm2lxbv zQ(Iagp>YEVX?clxx-P?w zE#U}=1n?4F_f@2X^n30f<;TbLTi1?>4c!-LjoxhQa>G(9YjKHpv&+m?YvD5?tKM1w zIV83PipQ!q?0oif=FuSnt$BqI8*IPntP^ev3~Fu zPfZ~10>1_|wC#r4CQN1yaJP)oJr${7MnL`#C+@4(1zOlspv^6qvb9kyiBqfsEY9s9 z>+zQGyU~Wi*Bf|UMNQT$vclmBCc@ND*qIoJCK@7}i^9ASQAfAYD}6>QdJNN`x*#94 zGfEWs5!Is)K)bosQ^GvEir%o-SB}})`IX__f!JIHgq@`M91;OpHX1_Z+2N?+h-R-r z{=fTU@gz>o(&SEVZIhF|R?&=cjwe)jc(Un@vitpoG^B}$*tmQP4A zDp7T=REk~SUo-B@@EO9cWhrPx+=4h2ws}Q@Yq4fgCtVcKq(8s1Ti5J+?HvGl@TC{d zL+@;2eX@^4$>M6Ui;i3l0?HDnXFsO=lK z%l#%!UJW}_iCca@fQ&L{A=~~?~pl&;Aj7Du&zWMyknJ$Ta zK;{Q9rFa8xQw;EVV3;+l@7aP&y@?XF&aT{g>I|gm8myR!L&94p7kX!}p`Q9^pTXtz z?V-pt$qha*BSr!WcRw*n9ZmB*&?^MyPS{f$)SEW*C?8#AQH18F&Ye8` z`~ufJdUN3G<^UU9NK%7VOTxs^!w*SufzfRNrR1%vKNZDePXEtw9nf8g9G^CfVfQFb zaAR5k`f-zAL=SqiS+s5CntYU)@dxLYupy{Re;-vLBgL^64o-KI# zYAAWri0Y1HgU^Y%do(3ZG+_p8APqymap|AF)#Xc+#lyw*hF`^=6Rdh6*YxPaCQ63` z`EfUj2fh;SXy@~9rQQvf2}m&C*zV_xHBe9-z3`4Do1=X_PO!Bv%h+W8Prb0%?rZ=a z7CbqQNHKX*$Ezmnu;Echv4pJ+;|jejF(AXPR^US{e-1a#tGcEUbZrFhmab{SHzC$t!ibvPr=Wf@a){AGD&hg&%4L`aZ3*YRGE7T0QlS+31HMMj%<3$n|ANsMR> zkMHj%$oY5y5Ym?lOl?jM0rzXW6eZEDpUzkrL0h%K8F0VVef)(5wg3%P4xNyJ8r793`0x6)%=>vYL=lzUjB>0#w9#=nN^{S zoZ_*TDm7wDmC?+Tq*T^XoWzbEP@@5E^ds8Vp33swnBjN#Ggq(+09a(I{WeH31YEGx z02fD|V)D88FSUe66K_;~;YJI^T0rClm2IgJwI%ScKMiRCBYf}?wBY!Y+0N_f#$?{L zke@XzU}rjb1f0DEKRJ!rJBr8reqU$63P@-e3JQpMN?w&1Vc+D^JC-w8Hf=&#j83BcVB`yRRD8Z}4V2TM%AK9)M55 zR$On#CH>Gp@;CCmj*N+Q+{n6C@Q;5Wmt`mE2nZ?l4A|Z{0_g+b3#sj&QNIi#CVZc4 zuD2fRUk%V68T{8&O_8YqRF1U6^FU`%9K6r~q#^{jQ}5K|ucP6a?%Sm>4zWS4n+SG$ zc@5pvPWKjx(;?Rz8l2S}qPEPAF0fZXG?shQ7J()Io_^n0<^M#vfE)$Z)DG3=`ae}i z*{HF$g=r-YV*kKCfJF#N%mWWL0N_|0Up$8Z)(oK1X38e<6aMqR>F6&1S?K*JbieAe zy33-Xj4eXDRc)zkBT*oCWVdezBO(HWgNX@a#qHwm?#}hp;e8`Wgdxs?XrX@_>apN` zGxDot*PzyXd;**~O$U)&sa!pb!xiG0cgU_Uk6U=G)>h1SV z?Li!3;%#aUPZQBctpV(zVj?X5%+T&ZAqFVk+uS^uQcKuk{7-UMA=3i85#5ov2oM$U z|KR4PCU^hwO2`hFT;w7&%aA_tq zJ*gLtwT`Kbp^Pb)dWIu%pL>uiep773fwlRrmeV`5H&Us?dtP20GWLf@TP!$OFpiNtZ^+c3EI+9Z=RBcSiA6;}_oIXc~| zC0vxOJ`XQjB3bM&-rae~sF$WmmEFng`k%7uuy`V&1<|OK#~r&g{^cQKv3)Tn$!&g* zYHq-T=kWJRwD-DW(;!j;y<$GXIvg?UOuO<|W(0-V&8a>*7ya@|74qk6z_vfBpY)itdTJ`3tVolwGI>@hqhz%vwNrrF9%W@QZL-SXf4%jCc5m zv`J2pnP)uc-iT*%u$sRtTVJfLP_go6XWLH^=z8xNW%G+^ve&uf>lV}tOi1j}xZrss zq48p@NNew9Kqka9lV$d7k;aWjS<@ubYE^E0q8SJn%Z>;pCxI5oDf@BL9#H&^75qAH z7~Khp35V%z+jfb_eR?4s7iDRw7}cs4eg5dm^SS7_E1U{P(vFxX+;5d`HrYe}#+!>= zEF>&7OTxieo0t$>nB|&U5d0Q5Z?~cQ(}&uu)a{5fYXRR~#fPiOfTHl4q@vem!Lr4v zlUC2>P$fLPLgn5}!Ng=sk6N#clbIVU#o+r3vqL-o;%zn|e7u^2fi&}1J6az30gK`Q zaW1$udgk@voNP4Xnc;DBtVmM$O^$5_foQVTFWmko9QWgE{g3Q_^bHGVI9(^XBbHb> z)4R2e;W!WWPGY6$_$+WKi)|jqiP3Y-f9XNN6Ezm!$?Qp<v) z%R|3!d$l{EkQgzf1JXn4jbUb+LN4)bK2l(Oj9o3jWGKL=$Rnoz`3Nma94YaYc*O1V z=C(M|>9uTw_1_N|Ex-CG6?udlzQ_+(9v+i!K5W?Aw?Frkc-HUXen}jAS+xp@5p_SO zU;KVJ5on_{wr3FODJm*tm!Vh|2bYqcThegQEBZl2i%Jt{Dq2jV@(K{dP>12Os^9eQ3P?oG15$_Z}UP5WuVGc1Wsm%Z=o! zMbhc&8BmgT?A3}4J;bhT{~EcDbPJLa7)D-obu*JC8eyPf-$)( zkK;J(4#)9*`O$*a;0A8@pN<#R&5Fx{(*2*&AX>zU2Bo6iGh&27$+Re}A@OvnEoh5g zX1dup^K(g@G7lqXI!xPr#aK#kxQ@F2X?WMkE*<%MN8N9iVFV*)U6CKErv0*+s|*01 zJv6Ng`twC9b48A@WPG*3={Neay$ns5@1^(Htmm$_gafAK3bo)qiKd7nwo4m<2n{DK zSF6&dHM`k0FxjBEA#i_s7Ii*IZ)x(oTh_HTNjZJ|;PUm%=uznQZDJNKwhbo<72$Xu z^kg)9=;dfY&BG%hwOTtq(yEAC;^5f|}gK~dt^8-A+$n)Ni;KYgFGbENoa zJinTcfGkma!&ALjz9m2Q$=EortYZ9Gf42J3>fI7$7uyzNBq;=yDw*~1>>3iuwO*xZ zqfS__*%Oim{J22vt;`_3ErD*Y+~EVfBzKy+duI3T=cdYJPI!Teq}pwv^``q?HkI;Q zOS0%-^MD^g?QF)RRKGSPxYl;|n~+nn7)aGnf3Nul)+S!{eFs%rncpK;$iqqF#}&dZRQV)^Ry(q4?%rOyq81T6$|!3$|CEzwG%_T z#>&v!zvR7;#-uRjW8ch1C$?l3TO`_U=pNiu95_mIAP)pYmR8&&aV3P-8$+0jJ*725 z-|2M+$QNzO>Sx$Euc_X+spTZRL7!fPrC8n%>8pXLC85i#oC|BX(>6<(M}OZ4C;c*U`!+Nr1pcqibqk$-=<1 ze$sL21t?<_`Q@b?#BT&1ALh+|p&NTu*UTqe+0=|?r;yogCZVSaGEFuBXXfO#OCoKE za2lKbW8iHfj|A_iTvlw(OexTrKyhe%h*Rd4<>@lO!r$5y`2U0Oy?Jm?er3-kT9$u< zM!zwRGaXY-CeF;SIW~Jr7Yf9ZNgNnb=ydO|8Y6+av@wu4Jbzb?1t?a0^FJKuz^xXs z>pP7tyJk~#k8t}qnZbty6_cc?2-v1W%EYVB^{r;>EO_?SL&zG}N?tWGAb!_!`SeFh zl*uc@Yoah;34~V_^;JazXUf!#!==*x9?5#kyZUhg(VxFt+}<==o+l>4d&p)~Xx357 zjkB-G9kA^xDc7XK4%ME2BJ4$H)l5V=b~X^7)#SLT4Vj)6TH<3~;^LkYV&`N=y(=hn zuWL3buBk@H#*1Iw#MJY>bnK$dciE@^l1l}{K*sW0Wf(c?@on#y!w}>gzj~2Hv+^=n zJ)5Muw1B+&x%PmjtKWV6mFL4KSr~~r-#u?RT0)cLU+W@XRQ+%?Q>_TB$$3a)nU7p< zMdZ6@D>LD%ebtM$AEahE(HGi2tU0rYC^H~US@!E=4`W05@|Cx(^sWH+O6$sLf5k@ z)gk+XG}b4Z#W95&38&;6RO|JKx1Xk)+p$#0I85!htgctsC*qb7>mAIT#vPFWjThm& zZWxF9+g&xfP3|45&Vdd*0?ySNmz$`MGq<5d_54?K8f|Is^4`c@)Yl^2qpWv3sLBL$ zqkb(b`p)5rvtp~?Q{WJ08&J2YxU6YL9X;i4xGucvBNiF4nG%c#FAvzGf5K?pCC zR<2p4+I~;>t|aQjPsz5KKw;y0zw9|yy{dn zFWdI!YjMk51^LbDLvok5(${k}k$Ou+UV#=HVNhUKyy^H`z|@&1poj7q;)Kel_g}WN zhluCp`UK4*ys#}}Mrx|CeBV$RE3;o~4AHubn}#;MHI>7!w8b`>^s%%t*bw|rgfQrl zT#5EVj8UU@#DtGXki49NlXC)kTC;DmW)I#NJpL-ZTL@-n5pW8^8;tJwT02q|Otd4z z>4!}j?x_>s!+)FhWFPxwQ=4fm?r1KiV^YF@>Qsq?z4J%@I5oFg*E($rY*sL%sMPn? zL3(aeDOXwXH7LX#giQTiZn}Q_vA`rVS6`d(;CoVd&C}M@Dv_i@2S0j;K_i?ZLqsBn zZsFJsl3>BkARHJ7>RJNhPxv`>{OtTXsUWAMZmi$ffn4P%G8 zmm^jzp?#YZd|i!cLH3%xO;!hkwOMd{T!k+_Y&fa(%6En4r_r3MDh@OX}u zoP2`h8SC88-s8Dwb<*)UF{yuKLX($X>(e&>)PO0CJ&$NH*SRc$9yejucwWI48?}-* zb#dr-*~35iG}ER7+FL$#eV~&-jB67hMJXX4~;!hD*uvzP zBs7a_1^HHAR+yV@evY=5eC)`!YF9Lgb{xl>6zI$MDgsfaf7J&YYu z0U^1|#l4q=cf=FUqx^KC20ADoQr2T_ecW}{^&@l)vbuz6XVH>xoU3wO(H{PEYp&YGQC8Sr(l zDz&Gqtl?w-f&cM_yI^TcV6o$V=rLWB<(fsi{60wl)izkHhxFO(<|?)j*Oj-Ugxf4L zkhLr1NYpz?RjYf9%7c;Gx zx%T;PDWVAm`rC}}Unf-d7|myq6*hb*JZOnrofEogiw}(W+G^c<_Z8lQ@UkO=ZZQf< zoqHUmZey9KOsWrQEl*$#f9(uRHLlSar?O%?ruzq|k%lvfv#E*rcSkEfg*MsLNAZZ~ zudBqCABc?X7k~#4R{n+~6H(cHH*>jYgk(h?0-Rm_IV5MN*$y1vI39Hqlo z#6Q-PEar;mcA6(wIE`3fa%@$td)iBCvKDn;fpO68Jr zknifGL4T807GDo=s=E7v*kTO?nT@wp6Us)M9<-Sj8}*~af3VTuj`x{VKXP92!F{Az zQ^cI7mfD7#mIHY(HJ|q2GXS#Ef_p{|`@UF(+p3%|=N`2rJ2rxQW=x%l8U^lQjcIvSo*UO-3TB`o(GUpBy5n=M?dOthq2b`0CzserIWKs_ig~i&oMid`mD~dEkgv z#_z<0^Zx7pRF&!dr*Lw|_aThB96_AKw>p)*u3V53Ahjy7#V$P6P@SxG*;`q5>~For zCq{QcXfdm=1l-!WSmaEI&Fede*up6b%wCM=94~E4yLx{-ytkBdf{{1WWc9Blp3H z<*Fk6EL7!=s3P&e5j!|yjtU=(Z|9`O$O`qnq=&~!vuZ| zoO|%Jt)^qUB_>g#4hw%xlfkw1>486fviHs$eSAJzsTtXb{M~jr7m?c=4YRS0t*M{_8Im9VHMr0_xaZ+L?%=$OVb2BSrk@^aSTa?Pt%shHsWN7hYf3))mSsgt zVYm$3>g)1gldU&B`6jk2VlW4ZO_3K%8siz|cD^OY|nf&Y){Q z26XU7EcT%uRi+Zu|1|}l-n7jA)7@jKBTVJuX0zq}c9Wn?)sWMTgXaG+2$>zH0osB* zZ(40%0tC(-*^O^pR|1IT8XTj)V6BxT%GAE-`SUvUq|vafaEBhs+&u-Ut%{v)QlDBU zAoKEi6^=baO_J}hTrvnaF}cq3pwY+$k<2vv2sZ@cP9x$8KC7@pJ)wTrvkQdcgk;yy@DV59X7keTqpxucxF z-J7Rfs7XMCf?)mCD^OTgnDvaTZ9casu>Q;`28uc7NY;WF#GK68eu~(}pRftFjM93- zGCRnr^r4A{v(9sZc&fYp;X(+-k|GBqu;kH}RikLE)Pl8Vq_6;vgbA1t(Zhw^edlS+ zL!WGVXUdQ?=5-Ha;d=d{;yB^w0pACKEw_@E1bo6UBH<{27vapJB+po&!~EE0hJA7p zT9US94V_-%__*?CZ9#B>3qpa5g_Cn~if8+ciubm`l4L!N(P(U;wK;ShnGptja==Tr z^Ps}W;ip@=y(41AlH+pAyk3=`gtkeemAm3ZpFINgue)}+A zu2=Fr_6mme^ixxPCg8Pg=SiSrd|5TCGtSx9!Jl@$n9GO}L2b*)jLQAI{w6iM+iL$E zEz#h~Ljz>g9I?P3cUm&!&*=|_eRGFe7IJ$7w)c19L@3*9Y2D;4YB_CZU%x_HeoISz ziog34uD9W+DL1#+K>F0|B2NYK!~RA!zzMY(B9M}n$yXqPONOA=PR+mdyoxZVtd9V{ zR_HeUsd`z<;B@G6y{uvEpP5hcon9DK{)S~o*~uFhSYDWwZfc9_^QuSAYcdx+v+t)} zTtyBD?aWNPwT$RK@~|*RyGJ|MhLkXR0aG4a7o6R&eAP;6L!52h7Pe_}=ft1dzx)T> z16%;k7v=f2d;`@QVwyU|SDWakTSDYRk$q|h$d2%ac#Mr9o& z?-NU~ym9{FfK=*T*|aToaF!GEr;u$l)B=*^*)xx zU_8UFHF8lZY11lYAx_JE6CM%jNdtHzI^7ArkhrtoMle)b>GC@+?(KQVDvo;AlKH`w zf}zP~zlbcFuHwB+TscBvx>y&~Dhowuk6l67`j6Ze>imM*x{6Bwh`64?J#nqiwP6y; z5pF2V`I(CWr#+tTSzG*Pbc`i`D>^@vo+2w)#SGgWX6l`2EKa=KW213JZoo?A7-MOC zg1A&+qKW?2^JlQtEV85!=j)3q)cuDDu6SpVCB)%c`BrQ!r-~@v=PEvIKrOANEFLHRH6=pV#=g)W;BVTIe+q*@=bFvHW zdYV5G=SFtk!BL_Vo_e_Nhm%d6S){rTQmb)n3RvSEU|IQ69a?5aB6i{sg}Fe z*3_k}qj{N&@^DZhr}HN5pY^<$Q$SJMEEulo&aSdPMuNGXAbiuM9&P5&Lcg^^9q3jf z2kZ(+m8!-nBM2WoX*L~Y0a<`aZ$7-Hl%FILYKx8#TJaa0?8Ovci7Q-Z%M1yC>>Qs-b6u2 zV@#ug;)izOVn_!x%0r!Qf`1&B`kowZ>}1ql)<3eIai5Cw2cn5Ig7R$z zOq?3Ee!rK;I$R})rr!-~@L9z?6lnJz0XF*kt#7s8LC)o9#@dAgKRk`H?5m7ctj(AYF zWMYi%A{C`F4c@bCp9vWy;XQ%9e>+fEcVBbTEoO50<0a~>E(%n=-LaAy=+DscHt-!3 zaGZ7j@eLmvfe_wS*{|+;B;)v~ZzP}{tz_*r2VKzlI^DmtCA ziqr}Na~8yN_b~aUgTINNwy5H;Dk!;FE3sh)Ui^R38EabY{sh>5Xr**YCIMot>63DP3-yiW<}T!gI0M z8EV}OK^$f9vP0!l!7bTKZ+t2Xb@@fZ=$ZT>F8qTq`IKg&sfF!f6#9<}%9GaKl?i-z z$mx2)ew)G&@zvysDNQVLS-0%Ri&Nhsa*Od$m~Z3WM86kZW7-l0pE0pXgF}#%!;eAZvCOTP;8?$hLznv}d(X6?I0a2|2z$-rGvio=*1jqX*>i*`SBAXkw&ee=^Ta zthwB;_7E1vgjzQb8wxH&AM~2;SYcYeR77pg;#3uE^fohV8X{9zG#JNt<0410e_zqh zDUzQZSON%(QpC>j$y@?;zpx#yanZDbRA5lOb_Iq-023!jhk@w`n-StrO- z)#AA-;W9s?U`8KA@(OFmdk5c$0cGT-{;tM?;0q>m?AB*$s%L2BpZ6-C;M~#Ryiji6 zUd{j35rq(jlRorF7l=_9Ef3}Y^rDy?7#$s*^0D3%rXZ_nlRnoH*0D*a-={sVd>u0u zjPk%JksxIhU5F{PXIi4{C-@le5Xkki64=FOF%-!%gD2449dQN+lzRPz(z-?7>#u5% zG-uG|5eGBJO)Q}(K5DHx@Ptbmtie%*LhruwE+O`8Gw5;y{eqr-aKiPFwV%>zL5c=b zB%UK2oD?h40Ygsj(7u2+g~`7GJBm2+&V=Ve6N9{Ta!UlUq*|R@Z)impzR=*Yqa#8@ z#m{Xob%W;$650Z{^7Tu}fp{#}VK>cZ+!%u{)hxs`YT_ABR|P7(d+&?#ydxHc{2eU+ zP`91b$@HV%22Jr+{2!XmDj=(_?bdXs(v37occ&oIEsb<{cY}nKbccW-E!`c`-SE&z zw}QZ)yx;y$JoAKStvT;|jBAV~RB8K94+W6~W@7CV0cJ{I2^90;TNzE0nmoF02B_^zT$_A;h*(GJjYpdO8p4~n59(d#@nPng!n0DY`vj4tQ1 zH9}I@32-fm!FfSdxUCWUc&3&CbV0u!8*I+%M>Lf$(Cepee<41mh9(DY?nQlKPv{IJ zF_XZm@DwP5k~Tz-me;d|XrbU<@)h07TB2i;QO+p_;ij;ToC-5c*NjU`1#vi05qnlg z1x$p60@0DBb!XfCmgONZ>KBVw#96Tf+~#4^o*FJie&oNKox0m*dU8x}BAsnAJ@~l- zS0;E>!A3aF;kw09uwwJnx-5Y;XcekvLc9qTJEd!>1`tkA_H=Q&^gbJDtB)+tNXU= zV6~j-F`U&mrFdZ@=ZtKyrD*;w@1l?09JfB*R}6-^KkZgJFqODa5Dd@fR_8WoG+ZZB zOX-y&*caK1?IF{;%EnK|EtTE6&(zSpcxOeUn#Y{D0;V3|(pgAl*scF{MG-aeQCoqS z=*ymiW`l0c1RSXZt@0OoaTfJe30J9y&ZjPpn6p>C+EV~#}Vop&JEh698_Yt@nUWly&qMyl`}uFK7VD)__57UBa_ zNB+o!cJJ#v|1xd@^=v!?u05I|^#8x(F)=jzv#TDTcU@lCGxq?S3Y@{V)?RLCvS`U;{U zWAuCQv|)9Rwj_G;2SssR&?VfXIzImJOje|E5tRuH&Gpfc^Uj?0d}YO9pa-ldwN@su zKilLYlh*~CMvutRVgMCc35w-*7)Md-Inq$QB1L1qUIyN(Kid}b4)cpyihFl9t^+M9 zJL~Z{eQa1Lbb4;L(v6*qgqm*4y)+h@g1kIeBj(bB7X9jb{M z$;OtsHaq&Zk7Y5Q_pR2IEorXqC1OZ1mxu=aM0n{~61MzJ30gRTI{6=v>c`W}G9FU4 zq$eh=SDgpA)SkRw4ek8!!w`wkgWwVC#ikfIjfr}Tq8G@?$IY602jM_v_9V>4trwI1 zJY1Z)iNYu!!U-LwHCvI~&*c|Udi&khEMN+VoR~o5q%qpw-e$ML-5(9^Q{=mN@vh^P zyPbRUWmdISYI(6?=!h77i3k`hiX4GX2YkXulOtBXT?6NFR0Vr7(p^QTTeKKyiv~UC z;gB}GdFtpgWf%k_DeR5-o&+J{2#Dr|^dns>`kOos2Ks%^rUZKdEIZnYz`EE$=9m6DJv$7R1F0F@p;$y#pfgGs4V0~ z&mDFkOXxXN{0KY8_NfCco6hG_`ej0~o7o^q3n=Y&5hQQ|_<2Q=~&yZQI(e=bBM)E>s`V z+PPxP*c=(&ywOOK&rCG~dTlcLBXhRordTyOq$|ORtGc#^mA&)P%5n_8L}u*0*pz=9|4+kHVXyv1JSS)Mb=8Tlhuzy$|UElmW~oW6PO0 zUeGFzJ@qy*5;c8gLnWl6oBb>1{qNtTR;L7ImIokL%6-GY4-}gcN*TRe)3oAL`3t+3 z(ShF~D_v5%#OPO34q;zcezXVx+9)s=JCn?eBzp_^Z*=gSAeGixd@aooX92I}kuGB0 zht?dKdCDgN$LP?49~t89E{d6Kab}~56`iS z2rDdD^63oig-oM{@Z0DzL94G{TBUyO%R`W?Ufnhw8pNwC_p_K&9p)yo^s!zpBvpxw zuvTn$EOBa~AaVu2y48EncR}$8#Ea*}@ax3N+ItaCZ>=->4<_(v|4237O~M5zu^fAn zsD86aLg(&b3StH$fO)LtP)Vy&lxnmfg}$SSo?>RR!y$jfDmag-jDMq+wX{AA$zxB> z@apKTMDH88j!3R8{`sOs1dmUR@qxlA-hB}dS2QSurJQg<5~*5k?k2_WqqMm2Lp0E{ zy$FE71PxF^pV!F&2R(Ij9C+a7(~_l9uf`Gj-JLb^OR;-~?~~%FBE$&C!IJnomfB&8 ztUdR3$4|lMZdL_aL*cPfJQ-;GCq{b=Y^qU*{`x40lH5ofkYE7osW8|MD2J{aO<;F_ z<=Ch?fndikuL%yhGjQk3ak*zS$wX&68r0-wnYZbTxV9IxPk!Iu5+HAIiNngB8pa`q zwtvWG$U3n__I3jMN#383qzo+NYMQ*#qF_Myy!uN#eC`J)XT&cHTl*GA=({7;-{r!8 z``GnX@3Lc0LUNblU_?tDNMk1Ke6GKIR%J=JAN9n>Qs|-+oaiU-Nb>Hj*z}UpHT_L6MJ7<4kK5QhTIBcr`a&3{bm2xE1xM z@YJRnErFa1p(Jo7cNq?d+vTI zfd#O~(EdVe%m{eJ5761U+7`6si!#>DJ-Ic5!R)xcC_8)<197xaCFqbLi_%Y`(V+fD4(S6(xJy2=SCiCwXori&NSjr})m=^SDQd!~3uuXd6e z-#DfJTw)|dg%2t5KdVCw@4&KrhOx0dskw;SsNCWpL`(+?#%qDUdh&v{f_IO|A22wf z@gL+-_JDxDA+-aE#_Ad=JR&;alkMz`Wf-%yVVxr_3v8`7G!K z^XZ(UwTk7M0z;q*GmvL50xIAqa~;@B)S?7dyu-bG2qDC1&ylK& z8Yhu(p2N5V{!tm5c!Pl`8Z$9#_UH&yzW*eySj*|$XjseS)JRWw7tK(IW5K?G(s zrSEnlsV6AZjK`=C9?_vh2&K%{nyw9zn1~EGU+zfsGVgoI4#o`7$e`x*oQ5$KtgLN` zNz#3poE$yd>TL)hQXok6PSQ}}myyrJ(Bu%DB}%~GP4<67tSyQQ0zMP(FeFHE`Vmx$ za7V`xB2J5f<$BdJRS?~^;0T_&+l@Lqx>bDp?|zU&f@hD$;cl08;PIOzWj_lpE-wCQO?$&dGA2Wp$23WKkYbl{ zHu+9oX6#rvs;cK7keFKDF-hNl*aF)Q_8~JfsidAo?jKQla%t4qq||>1qLdK`2!kkP z-a_kI<>?l|y2|6O`SA0v)T4tFk>#w+t7P~Y;7Q3BkKT%&R|9n~)k0>u1 zQ}@(@?2g+IkscTi!3Y!lI#a;=J$2YCFzdv$MPpxXW`Mh$k+?a4Emt0rCog_u>3cQV z+Vs=>x2=jgIyQP1X$$QnfxIiW;+TeJF}Aa^$i?u~4kOG*IXKcpizEn?>^) zG5z0zgNfH;iNl*K8R@0~ez1GMg59Iv-Y6?-*S;3FAXJa1;3xZzwy~qF_j%-l`(}IDV4O0fu2i zw%$*}fahg_O@SbENxn-oXb5>3E>R%kza@jja&OCt1%8ZON1%dy@iAmf8EZ68XMFL^? z{Rk)wkqMkHr7V51yRB2xbk@NlLQtXHY6Wih>beGy^!s;z z&efyIKl?bG68Mv@$ZKG7IQ)v-~F*c zA@Pjn3|H4mGZ6x22xeNERSXs4~`mIvv~R8MXU@Q1~UItw(lJ61EJd406&BNzuSi`5EQSR^zSvC--~%Buj>2tOypR}g*G*JrzA zLO9k`lvR%^%5(68tCAk7z=jwxR8r-psroBL&z9A8x2Ff1E8-D1$Xuq$&`QecGz zt&ZpmO|Aa^MFrr$G6$;7(M|>B;B)(oWk_QEX>Zq^Q-1}iTDh~oO9)$;)$t|zu!#FG ze*1N9XYBmYM==RxvYXXnYH5Po)abCd+|a!JO8H$= ziyX0#DTWf*BEdQe`BVI+{HKj$TDiThKtuuOkh99J;P*%aEZbv|i6syIi-Y!`tvT;L zF^sj1(TQgs_GikRnEbd~sYF5HIz z@VI(k`&o#Xg7WDi_D8Q0Hs2J^_`mK@md{%PJIUhUZWQ5n9z6?q=2>^!O9->jb9XX% zrnu8;XhR7CDzb=LpC(S=ib@53~BJg2nnDA*~= ze>~_LC#|$H($nK^qghfSy#nXa@4a+Q))C{nl?=fWcb#(U<3?YVhC9{ZcHMJ?^4|x4nNaEtlvT7@HWb?z=Q5naXen_tgp)v=L6wG|z zz;yrOoH-!aO-1&9c;z7Lg9Of2;57@I!Q0p1y+d>+ zsuE@7^At4O_!cURk1VE%X#WlDLVd$_GK>8NF%CVdne`QQi!HL_A0XG93?%adbVv|D zg_|b30r-ahEFP6{#e?DEz%TM!PkhlpON#hu^gt2ObE@{V*{LoH`hfJOA0G?;pj11h z`^Q9Yogm05dK$n^YS!=BIWW4h(^< z8U-q(WI$pzL*awE;3v=4l(FQVr6TNDilL!axMQh?)~ch}aa%t; zm50gJk24%<7v{CI$<&ACvUFrch4xh@#A153ElBh0!ZFcjo_KGj#dnuDAU88=e8)L+ zMo4%ek}uZ2`bW-QIb)|lN`cRbQ=C0TfSE^9Ozlm;*&M9DO z34>Xx+%n$6%T`g|kegsDZqNfu5nd}$1v-$%05eSVdnZnK01S5vOw0B{m!9Q1c}36? z@Br7s4;1&S#QD;pfFboaS4MP5PtMs-S9@-DVnw|4yU7r5ts*#6fkTOQC85Kvn%a@o zlTIikU&&8ONE%`9nY(Ix-?jrxrghXEApz*yIl>UnFydhyP3HpgNAOZ8>st#*rKS%rFV5ir0A#Wsj z#D2XDOK2-mPNXtOtlRA6q#3nlb@wSy7|i(r?iiA1lg66Bg1L)d9j8@la%DP)85r{~ zz8dQ9irj%;ha%d{CQqGf1K@{;$KXTBzQ&$G`Nojt1;g^!1cYuvQ>Z>N zJk%fWlZ){czGdmQhJ(ottM|NII{15+kYF0~Y)o!4^}fgX_$<&IqlT^P0`&7Gc?{$h zL6q~iCtuW>4?DEVYow&4mGw1V0RbLpXK6j^JfhF$z8KL}Zev4lNjvHTcL*L;y1n4qXTE}$6B>9q)%*QZZAUxzhDjEj+ z=G9zm$QJ>V46ie*go=P>Fk(im)8J=aI#zAPnmXcu&%>$1*^Ad;F{k*OQADLERt_Eh zriymtesQ-qH(@S@|3)hnI~s-bnlcrEX&fA(7V@0#1Or#)(#WOKCmcJa1g}4(=&uWN zG$R$41aNT_?zWkbeZZUkW66xs-xx%Az;CQ`7N#illEe!n_()~KQuPdXNl{+y&rYIw zAsmif(bn*IxPq2^#L7cf9Yhhj3DNqw;yUY+dB1XkP-BZZdVm+z%myeOAEn9)A3oah z8(DhoozusBca|o2t+h*f^^PPI^T1m%OV}l#Q|tz5IoY}sD}4jEm~eFIT;o_mOBT{D z?B8w}4%jboD-{M`zu~x@V_=MyAA23>zjfiphJ)9^TA<_X0b9v6Mocgi>=x0euiWey zC-w$%*}D*z2Fw1y4XoOrJnIZZ&$<>QQNux=Ko^R10!o>8;|sx3uM-h!9C`UjI}<_7 z&7~=SQ(SkBm=!dQYR-F{yc|J`CU7ty1PH|eM^kW##y@I_ z0S_I112(KkB=s0hEY|bvC?T8N%&!~W18b3*%RbV+R7V&a3M+XZUI`%y)5=A!jM}mW ztQ5w3&4m4P_ePL@eYFAt>2ij$5>~qV2|eQc6!fJ?vm-rKqbK^wVTOlpjWAN|AcEsg zG(eU3rh6)#e)WwX%|(_Z%TF1wKtAB}Nw1F{x%sL=Ga98f<;yFN9OGcvNK$QwX|zvJ zS%W#?q&2NcJ1Nu(DRswz`j?@SM8EQDz+Lb=Zs*Y_ZV2x*7<8NO`q!pr95@YLnV+rq zeXV(KmUgE`k2$E$K)|&O>BWn zKsb{Gt>s8j=D0Hp1Vbp^);C)@_vUs(*kgWFI+QCCn%T~M!39}l(KsB89X_%WPfqw+ z3ZC-hHE-N-WooW4TSNDA_Yrs4QzniA@11fum&K}3@zo2&L*R*iN1~*a{KB%QPS!^W zUfVnjf+3HbZIXa^1nw@u0L%+%V}sUa2ZlFTLZoBj+-zMAQ!&_J5#tLoZ*X@e=4KPZ z%a|_slmMR}GVQ4^#m>t&>T8&lrg@N})&VmzZez*}2|wCp{#Gwc)+9~6KZ`cgK1*=) zn-EQozS)+r4Wy5(39mYD6KDK}M-LBEw*(+b!u*9k4CY&i#g1J*^ys50nybSD64i$e zkU%&dn?8zoHh)c3os~g@so^YXlO6px9?XQJ0|o=e(VAR>oaN>z7ko`Ed1Vp8pWto( zG8R7_v~!u0lCVSrgv7)$ml$h9d7)?R!pPNEsJ?oprx6FO;lURs-TD(nnH-Yi9sG;q z37pL>mt`Q72uqahR&5_%GiOzGVMuNn?@%k~;cN5%tQ4e2Arp0Q7%^R6Kqv_NL14^;%j03SvBUK-P{zhhOTeF8v1(`b$;kX4z>_}h54bhGj%^WFRUEp={3Q6%zf3LH8mI4{{&_Rr<}c&fbL9zM2QNI zApj!H*mEdL_E>|rT`~6gX{e#lBFQ~L5nsL}Y}bllhPs_464h7KcB3Kreyk`kPJ|F^ z%dA70NBt%wKv%Gut{JAC$|9n&`q@nJvrv{NP}o~^jKPtyq0EL*Y_!xQ8-5-};q&i) z1trKiBfp4<%E!5F!X6qDE<}9TO_FMK@QG!+#C~Ks8*zf6^=U!249!`qn*y{8ipuWf z8J`eiG743hX$nnsPB=xx1zjo=XkHxUpPG{a#;1fy8tR?ORrfd7=nifgR$hlY}Vek8}&#FUOyiCt64FUu?=7BTsg?%o{?*x za?~%1;@DwvFH$7r#qqOK^3T8QJ9p$87<#*6K0QP;khpVfffQX_{O_o6k#*#0pgYX7 z{sL}#(q9FDN)BW)1ojOwXQqX;Iu*(p(VVRkf&bw2{zkUY6$xH1oY*5Lx^qu6-e7gu z0QR$5uN2WFZ=|$TS|8eg574&Y7FKHMFD;m`65G*;seclu$;~RVA4SeMlnidd)ODEc8WP|7H?FzP zCXHtOewRRq{z3B!Dl4`0mOQnm8IqE#I?I0Vgn}4^E|@^+#Y6VV=7c`W#RTA9;tK`LW@aufVJ!4Aku z)56jnFn#?)ZQ=7iwW-VEgLBh+j*`&tY#2@ki{lDWN194HSRH<`+Hp9=NheJ?a*=0u zDVb~K7V1*pm=L~L!R>)2J;M9xJ)hP{zQRMgr;)UuMNa4eMw!?hv6)g&M+K)|m}jwG z;`po=Av2&BE%3uIMZBfjHK>Z--5tfk)fVOr9ew^qf!ulys_8bja#k8kBT-&9_*5(i zIA?8WYVx3;e>Ko?qT|BV2^9$BS&C-pAdQIzOjDxXrHax}AZ{P}SOZBzgpem$R`ce5 zY(PnD%$Il6$wV0)xT1%BbQax666NR-YoQv3pA+U7sWYEcB9wjc&JVzlwCC`>pL7yU zw;ub*X##!j=TMZq13cws3AjehZv4iBa8uxREY&TEl@!$HKPb`AO+BhQLTDWA~{7B+q0*H4dmSjz2 zBK8-hu+E+$k*>kA_BtzWc!E+DvZ4r`i{TZ}W3X6ui|}=5{$F9ZvOG+$z`zl|8Xqm; zzcOk9{tLD>_PjT(KcXAAjorN(m#$QIR~T${!b~->BnkT%*5t*-u#=~zdA%r{tUnE& z42Df>rSZK>CaK`f#leW`*ZPVa1*PTt!=N}#N{st5PV$p4BQ`Kjfy*^1VOyh+9g>qj zhq$i@sgCG{pbqWm8_#$Rt_tH1pR)Fhrt==)`MxuQBElMj9aRqz|B(isu+!VT*Tjey zOdrqYTmue>()Cxno(xJ=bbkZ-EP6RlBG?2qAAyIY8lZI@A4W_ovUUf0P4T(SHNTbx zvBKUH6h7$zr0mP&LGlm1R7hiJ4ak__XI>i)!P;!4tQI|*WO&qmFlD4FbC6J=9IB|aEypj%`{r0TP zfz*>w-(%oyk^+PxR7}I|M;#T1PK0#R-0?A0VMq8oyo|2#;o8_&3vr!W8M)d$`XkG8 zyupEeeI-)Bi~7uDxyYu(#zG71F9j-3;4}JO&O7$baqJ!KR$$~@d6Q)=t^M*FKICl# z@oU|)KkY>JoAjY96le8Z~RtM{WzAr*xxI6U4sd0ewNEOZ=s5Z)k)P z-cEOlHKP7OsLn?n<^=(Hn!Mv4ON1HF!vV5QL4@p(F9nT^O9+ck`UT zBI%hugd}8gqYk`x%>3S>$&=fw3|ZZfi_vKoP<4?saQN!}q9yAty{doePS7HE z{$g+m(W*Az<`Chx5wF#uc`p(7775r2RWKx1Nem=XVv@bvK+?vd+c_e!v?TZKwVJFQ zh2f-lS}u^q_{&-SOJT&u;@2TD$r$62v%gxtu>=M#qNlfcqI;q{k+XZQQqxZ2#IT)3 z>N&4AWB~>V5&zx4nL};eR)TAf zAAoD@b}RRF`gSvEe?a^Q=Y)s+4sQ-EVb)?^LDe}8_B?f>#F3}$9kP|QBs0PCe#aL( z%k)*lqVFd3)Xj&0^z+pYmCfj>Q2qk)6Nc*gc2`gj8K{vo;9&kKi|`Kz^OZVP?_(Q? zb!mCBi@;$9R^{PgZHw(w;DuOzvV!}7ptW^WFY_0eC0=S`06HLZ=?qKK8YV@T8KlKx zU+Sz>Zc2DtB!0`e`5pTj4L`~69Xs#hcLejbir+`*5qfm6&;T*IMHmRWAWXK6P%CVh z1G*>%v8T*3K?iw8ko22{|Y5uJL4gPR)O7N1W zMg_=iQ}EWobc$7Efhy#S@_0^C-w8@0in*@7R382&MV7VRf~SjTjZ{)s;QVJo3=Vf~ zKTZywocIO*aZ3C|cw8~RzMIH4zE42aZYV2D&|LwTFVO3OAn3zF8woz<>tdlEVyxIT zg~q?t0s)l5Ji}ray4HuxM<6u2@yoRcgnP`Cs zTEkR^iX%T#turj;Pe+Cri|s6pxd{Ij#yeN1t7dQPXy_WVc~?{oHjYR&3jxiu2NA># zssfW#S!PrI)aLm|Z>N%}x-GvQq%6y+VYiE!AjdG|_917UP}u`S_Y>lNE$A|_OWReR zo4nYFwfT{Zssx@#5W8ozx=LF3*YoOwv~;I;(A6{t7u#1g->ov%jF|AkzXx#Ly{Ev= zK~0tyMFF56G=&gFe4c673py+QbJa)36ryDf$i`j5h(PD^R5Rcl0(qvEj#u@FoG7G+ z-Os>zXB}Ua?=i&WqS>zLaq|R6h!kHwRW~n{S!aiysTWZd3hMb8_!_aRl}o z97MqD2&9kuT}ATdzM6L6fv^+Sw(olzC-gE`Up2^WB}&%0EFXfpo{!Y{BSL!~eV=%w z6IRCVSEZA_k9sQ+T_eIpBexpqz`Hq242S`U?w zFGr47DH~&82~|^Ob`110QdyD*G~hvvYju}ejR5HAz-OvS_tr&+M03O-RZvxjpGX>5%bRLxcP9atNxGr`i)0C zMPy=cR$yJ18gN*$c!mR`?WW$88|_xn>9*4|Wv^Dl*?-iV+5Xp%*pyGJ9oGs$<8Qe7 z;l~n;<1PSih%MF(uK`Aer6H2vf9n}YCQ(U9sG+_C`363fvcda6AMJObw|E~Mk$A;1 z>tauSLfG(`YT>QP%PCM5t0b?^>$>PUD3|5@;&oHx)pHbsKz*3vy%_qj zP_ERSdNyW9T93GTT(_!J1PNh@U2-gCTY=MM*xd#4P~<+gTRaZIEcaWE&a|HHI)G>u zaOf=A3=Aksh@MIyn<9uO$t!@DACp?L5ZiBnYg=EH%Hf@maoqVe9_f+o&tUD!cX)v$ z&8gP=hB?~PbG+P$Qzrj@NbOm_5wr{Pgms1lc{s^y5?G=_ELLE&}^fyW{NycAcM78ufCd-463 zaI{13Lb0QmO%ptnDE+$pRNZimw+bHCLcIE<%EvX`^+~PXY6ZU|s1E4%*+$G;#WIS6 ztiL6W#xBbMLr6X=`f#A6KOC$8Apr$A+lDzB0?9q!Ee{Z73+#hI%)eJ`oOqD;|11&^ zSA_G*v%nb|E+a}8qB9yM>@xr@j8ld0L7EyXi0O{gDZO9~Xh4bgQ}TM!-^Lf94rIY;bz#{N zy%G)+9IT^iv=#c2fV=S!LNTkNMYc)MI|Ig66WXQNG=)8QAz$d=;YYgu$bREGof$cS zXd54EoqOVCgrgON#XMy7nK?lLj*$vt^)X*nJ}jYOc+yf#q!Uh+SN*=#z43kG0G;6> z^?|W~Mb-guao5H#?4w!LU^<w*|v;Kj89;Ed}_Xe7(OWc z-FXXCe&k$#enQ5{zmcr4k~jF^LRVh;fv^>HWDgI}w#Os^e@j!LZ+Tbq+Y)G90`uAg z4doeofJdPhlKaKMBogs}A{rcV87^{mt`qr64>^d#Pw|t$IhEL$5GQ?25HGI)mk?gU zRDoc6Pf(LMWoc24!WTnReG|bu^~HgPZh%S(%u9LY!Nl`{t|H+Lt<;6PShh?U3ZuxZ zw}{ZNe#Cc2UB!;$19rl%t3gFncGfPVRb9ZTCw-o!-~5i9=?87Cv(2-&NCN`{l%N0g zx(si5Fx0)&eS$4Uaou|xGPuIEp5XR<)E1-P7s~(76AlIm31vjQG+HoR-Tt>^^i?b~ zQ`fe(js@;g)k9EJl7|IsK`9X=p)U1f?hSJ@0AQ?ZmSvb9^AUFff?xyx6$vb(ry#QH z?U%m&hP42lw|+F(Lee2gxrm89{JByFgw(nOOBeqIC6V(i}WI*r{vgmbp}AGGCE#A{%Iy zxW0W4dEix6UyF|4`Koe%dPSlK3-UN2I{9M%w0?hh)3&(UILlgw5e$b<#g(bFs?OVq zqp0+3sVX81d2c9Npfc?dT;w=T2c(a96Y=C@Y@~n96FY{jWT$*5#t_0Jt$C>z3lZ(b zLagF$xP|M-IUq(vA+3F$*pQ}HSFT?3T-4u@4+M%`I_|gp9-+XgJD{lf_9qh*feu07 zQo8tPY3M|BrxSnD+%b|gEe{ZaUenu)j>v86+%*IJQu~vYd{u!tg>v>8GvCKuChe0c@m;7FY7R| z^*tPu`9}|6$T3zM=UX`eql0=-ofP+PBn>@p;|gy_brf+k;!FurT|Pj4y^Xo1 z;1-}Yw>pk)a*rUxDJNKAkTPtjWKi;i#}911m*+K(9zlgR zO9fp9z|eg(iK{7!`o$bkz4$Zgzt@c*BOGD9;Mn&bGlB4qW?Ppp$w>4d#$jUedXogH2owtj<=3o3r)V_w1wUW%kiyuEiH5yS zmE=){JyYmR><2;Y5ourt$02eaxKR8DI#M80piy7~rNP}RL0x$rZmH|``Bm-3=g-T< zm0F++{ettpSGW;I`v9wh)lw zB_c6DWmQz?GzADO3}V(i+Z8tGM2%n-a=BC(WwO(`jga>pxJL+oT~`MB!;0L5fIkBe zDfV0vP8aXrVQIIB#dnqm9ER1`yM`7BK^zGg>;U}L@n^8EHDKZH#0=72P4CUZnECkz4&-j>-dL>XNg|;Fqbr2%83&_7qGj`gA8mjdf3qC3t)nMeR*KFd&;*9*+VH-@ zB=24}j9e)6M<3kxSXWLG5r8z`H$?NveX;+71!Awn2*k+5sMDI>(U@sT@>D-|hT7Wt z7L?ZZpJmU*XEREK!v7}snvN$<=HAuLWRRH>`U534ZLccxoZOtrofdq1?i_l zE}y(n_Q!tWD4um$esWW?{4i68$!)LvR$ODoY}8e3Iv$l^v6Dr{7f}NitX{pBi=f~G z#1_G7b)?(u06~k50UAXv`!A^>h9BHlEKz@hKL5Hlfq2X3EMku%rLKB*?e%GN4*thj z3SC!w=1c7>;mjxiEVJ8tZS^?WxSmpGO05%z6>~PVO`D!oQ4leM zw+l5}Ssj5Xp0%#N^VQ>uM<>+nE-vsRpoiLftn-4&;5CA~vAEimtQfza>}G%0+W_Kk zCy6`>^>+{$U{*elq=N}cR(+`_Z@VciJPm<*K3}~zw{HZpkn77r_#F`SJE`3KLP~tD z>%>uT)<*R|!@9&R@{=asac?Be8Gyz&QKPOL3lzkV76O-Xo&g=u^!5E+w#ldwI^onR zJ5KJ(-rtU8x&k~Cp1;>}#NTT;3krAMW$dWU3IsXyo#x1M~66Abz9;4kk;{+**(dSj0 zQ91|7b$oR{=E~RXOFo<}U$tK6|wkW@==f&o%I7DTz+EmcNy*JsIBh8dBjii((hCrY95B~p==biSY1ACe1pp= z6Ni*S8J90HWEK22U?cvpH-@2vc=~FZ!b9AW5@oyJM&FML+6kR;bc%Gd2E;^1G38C6 zr%G{KcE472iKhZp+))<#-4SfK0gr*x(z}~Z=f;8cC&lDvjs`Te) zXOkiy<0$ZVX_e)n$2ox6GGNK08V{nB5M3ReU-~#Osc$O}YrHhv4-^@*xM*8(U1KMJ zlsfYJUT;Hl%jIjAz#%yHe}o2}vt2NJp0L|yt~?#@R`c_uy?KTIHiR2VfyjXS5>}OY?4Z`-q$91g{mY+iJEm@MBtD z{Fqq~+?_`K9Ygj`*2V`EH9x)!CjW&VK?at!{^i8l zN`Rl5To>;7)u+yVgGj@5KR8cSX(aL>g@SkqZZbdfK%+!6u9A4`O%{fEK2 zN5n?Joo(?488fgp6yj=f+dV*gO1lLC=3MpY8*z-^!+NX*3Otg6PZVpyO+;>+V-ui> z(7^92Yk)8ShmXwE{bqJfWs#!Z{u}vvR`doZ$W`p9STx&M#AuaSQIA(*M;jsw(==($QNWox9GC8y3Bh;yT`2X@#gs!KE3TX-aO;Y%TT2u1Hy(t-9SWGg99Pz9nZA{dn{ zrN?BMt22Kkt*;1YUP2R3GYS9766meB(^Cnh2~V-|4$Z_(Zr)Nayh^a=%t^$icf8bK|IeQr0jCRuNEvn#a6L zMYcW%J)ANdebc`+Z&Pdk{U|EKMHg~i_n8sb{qOz@Q~X=N1Xi5%f9Ny?vDLeW720|uR(zyYQ3SyUGhFRzfyr{#(G~P-8}EJI z9Nn8IH#S!Q6>ba(+!_N{Kgx&-=cOet68b$166_G{MbdZ+<^~+NhWoSSK?3F#NBJqA z?_xQm!(jc@8^?+tb07`YV_J_QC?`j_S1w+VNuJOHy}}my8U$~L5473OxI2J!aekdb zY!AO#USINNJ|||8O|r`u1&a|&MQV;MD-Z>wJ<-?&Nr3bU$_hWZ{-RUmqeraC%t6OC zY09a1^`w|cNs933^YMqvnfvu#v{E3i1SuL-_1!s+g1U8(skAK%*BdsK z1_nCl2H&$vOc{rGe2xWG=m6I4Sy<%$0WLyg6d7L4k4Zv`D~w0))b&qH`8Wl5611m5 zL;7dL?l33zp4^)fs)gJyAHCj^WJvYCxpF(6)dk-^sl%d}!H9p9_g_!~6?BXYSGW%` zU@#_QyRN<2!_nlbTT_f(p5_LB`=aoCCXvF+D2*X^T(Eqk2Q0b8`&2{c@x}oC9M#EgUA9-5YvF%_(32Kl(Rbke_>+?r zcfONU7cN(sT#qGuT69H0!Pih4aDJx%`RRJ?1#d>ud8v00|7dOA;h9~qR=mBw!WBYu zlOG6{E+#06z>olqmnNqV;_|_*UBJCJ3F9)p1+~0a%*>UCyNVf!VY!81c8L>}N0hOf z0~5Aq%4POfM5SmTZh1ZYKepa7tO~Ac*QUEex1Nx@qFd~f|4WTqFs`fRi zYv!F7Li+930*2g&Iz|5-}6t2`AI>L=}0+X^Wl!rvq-K*9;fCz-K$RrLkP6pY^BS@)i0eXZB)t z%}QNf=&JMM4&qx?nv1DHK0>9{WY3Wu+FsG@Ys|M;y(q4nWf87=iC@lp{3cQ}=h{oT zXvmeuYMu%50KDFENS)|T%&npb4_R#U+H_?cWtG751s<`LPV=fG%|Z0Tqo}4ZrWi84 z2Xe&h*B<&8sL9;Id30!38AwVq@tYN~m5w$}rbXMkorV~R*WLd~D~sHmb!dWLb2dl} zv`oAIo2#0x;@si-+H`z>HF}!bNShFw9NdPFxF`|i@Tjkv#Sf_65DIL@HHB9Vj{1%P=*bn}WwZqr1v4dD3@f0v5-PL=1 zI)D<7CdI@8v4_&?aZah-TwW+&7A#9^q`if1`Sm=S{x=s$w`cu#e-BUJy?wP;(Mvrl zgpby7s}|ER(ZQgj#Vl47e znnMbo4^@JWKnm)v1tL}-M$-860d+x;)i}D7DOpy#XwKl$BjFk~bHz2i|1_^bmWVTe zI{NczkC=VR<%Ybbr^s>NUu-YTa`%XLK)OKmEkem+hfH`{;84`QqKY{b*MFE5Uw|#( zeH^8#G=W$BnOqxc=|a)BlCQl9o-)ZzF)ub!&|97{Cg-;v7ZBdhaTENryePMBXaW0< z$B)z$k`_*klKag=>~l?1W#?Ry%>?*lx92|@ zfGSYw-*_W{%83Kl8`n(>r}59d*7(aW^U{j7Sx0G_SD&qF^iA5*3wQ@VnHxIED zyf+tZF6=2?(9(~Hc$0tag&Z*~1o|%q$|xKzsL;Q6uf*(Jps`GgKdVEWFipNiDGc0A zKE$=Hy|IL>5RfuMnn2O3zN=l*n)$Ux2R+}hfk?s{_YWp<51V7-@9{W$>Q$8R+!b!yi!IJ5^aJy)X=(n62T@euy8U;zZk}SZ#R|>7YAc6EFNz1ELVs!waEq$4 zho+_Vzs_+qXOZ821eh%?VC=xIw>x%XYddnZ*hdFf4Mo8LLIBhRCNUA9Y1f=odN5 z&QMkw%p4RvY^9kA_&nrU4vwPA`%53gQ%HH3$p?ukK$fiDzAP7M0~Xy3tlCKRNyDlQ zz-Jwho%nBH(RXxU)54PbSjJ6jVgvUUn+F&T(m!k-SZp`P_mu1}6q(owl->w=vxk0sv>DBDTRH)^$F@O-}i z6Hm=pX>74K`O}uvR#@`vFj)5tNItot5B6qBaZ)h?zhGlAYfmnqfwyP9?suvxKik|- z?LQg8kR=GW3|9}%yhuaUl9xcmK#KIEC6Z>ON3z%yTIw-Y$KX}8s(N{#l}r8+P_0UW z`Ew7|h`ui5`MUWBP3*^hP;#IQ%qaZu`AU`D{ZEuRO5(96%rz?S^|dVmjxV|{mfe$E zbzZ4r>M#d-psoUXjVFcCtQ`Acwmz_JvMrkOwfuEZ!_nCtgxXkfr=5gxoTPK%3}jv) zuy0&c{icOJBAJ$XYfmH=eWZ74>tHZ5ks-7mV8#ymzV$IdJj+hK;5bDSU-W_j?S`dc zWpm6gD{P|?YsUAlyRv$3bo%tzgDILNO7J8%*&|%hLtwkYUu13r5GlDlY;x@__97n? zTVovSD3mNeRljte_BvIvadMj5-p9Vl`WrT88VYgP3nF5*k_|1CxAH4~$t0B>T+gEj z-@C}e;diO8Mxdo|&_5i|)+M`>U%wnA#+Iml!PIYbqI!TKP(z0G?0Vc2ZpT3?rJL9d768F#){lDD3leyWLkSQOl2m>>~^-$Uic3V1(O ze)uI0b4bSc;2`RWla-YskzYe7t9o~k)Xd7xM?Fy%Jr3Hku;Y;XunY(~WP1a){xK(( z4__2i`76faGV}%1>)iwu5A7j6W@OyL*lpI7v|cnl1_Ze_BTS9Z$ckYrI!v?laeXRv zRjw`kZz}fI=0A?Tt0Strp>1rqA!7UmwtqceuX~M~Vj-(Vbtd!jHTme{grIjhhQ7`| z{w6UycJ~&3ga$!ZT%c%qtPzYwct23ogLO#B3t=H|V@_AzA7H=G_v$iwiB-K>SF@k% zcfYy1fxlo(EwL+IL#oH9)R<)L&5xk9Jfm_@fNvr4YeSSy!}jRP#fJew4mkjW zfvRLa7W9Ev`!(fD99B^4y>TePIma)~D!Hg`$7~H0zPgxntNQet`YEXoi?XS{ud25~ z*@4S!DQYd&O$HL*mpJ(incJ$?RUe*W@Z9sf`6N|s39`h{>rUkhU(B^zf!A|8O|e8) zA7nKRQ`mR|L~+wEr;BBl?_a0)UpEqH6{)53@5ZkQDEj6w^X6M%yBTCru;KYy`-^fJ}168+UA($jACJ#8l!s&q_0;@UW-ZWUcQ6;W4|>mU?Zp&_s6k#2{Jc{C}}5# z1l-NhZFqQ9RMUo2oBz>>JDB<>xm+(2;|Dab^)FZ!NwdW_%tUA8>P1Pkmpg0nH6 zFvW2(3O#%|a*H9S!vu;qo#`LjU@v2thD}v@s!-eVn?1f7y#3H#d=(qwEMl$92^U$M zkQP;gOHSIcjQ~zCVvnjM%R#Fci~dvNB4rcV5b4$?jmNq8;kIBD8f3hER6WrLNnU)lZBiK$`B~u<^|HjWk82x><&u;ca+p3`?>6MS9(LuD zlju+c70q)3F{Pm};&A_fh(>jSS#>ijOJb)?6j;SzWU0PKdGq1J?`J&ay`#-|5*#nY zh&2KPi1E_g5*_|z3EiwDXJXrqTnamF0y~78UBByjqYu3pd#N-t5~W-CoFtu7LxK9( zN;MzLc}yBRk-c?vgRgO$V(X3e!bUps=i^JxPv4P;`5{nTU$k@Ok=7sE3 zj+m5$6L+?FFO{+xHL-IRF4BA5nudOWx{W8WH=hh+hIl>4SpiB>(D_kjujU^QOl5h! z_pPY4bT}Y14ofM{y~bU_;CbNleq#UIYSHLBtt}p|vN{7Odnq3)U?@~U(ztt%)3&us z7NE>xUb{y3+D~GkXj1?*Vei zMyES&`2BhmPR0hg11q!TaCKi-bW|Ui{_)PWm*tK_ZXqKD?=AUmB^k*pkcGPM{NY%1 z*(SUN2rA}mQtjKY915D!2JOsGC1YE+#73X2h!NN*$_H-;FkzOk6*5#R{_6Blyj^=k zF8HeEqV-+-(K3DcA-A61Nb}p)Oc&3)*2duFDK4P`;rR&i>gau#xli;LU!8O) z*d9As8YMX1oxW9r68{t} zvn2rvj|STK^ba5bYIAJ7%}4;@@%NQnwHn<^SWfp9bDqsrzYu z{2a7`a40?I_)r*4mIi1pQMDkE#KF973et6!{>MG9esgBM3#xKC_<43Cl-@OH=Rx^w ze1`>2H8{kv9A+ogMyRDawnk~rmxYhW7_HDf2dO%khwWSrcwlt(t({5b)ZA<2(i7|t z@``PIA5;n{$xx!DpGb>k=vT-iJ0qQBX8|$klgbeVk}l34ffh9uXYF zlTYA22q9-K7GBp&vol0jPpe7Q-neAi>Ssn0|`;Qk5wQIawa=2*7WjyK)< z2F2II$0SDrl-7Nl#^h3lb#L*0U-u4n!n)4fEkbUTt9QGw40_SH=yC+1fi6;Z;-^7( z24g#9JtMBF_A^sv;{19V=D$YyXu{nWL!e=-Nl8gxd@;r%2VYaByC=5ky}&Cw414)N z>r}1~q$!2~s?cIwdCozLw`1=6GSDrezH3PBTlj6OJDzVx4`=>}Lf_0x+UdmM!!)OW z9`GY?X+4ex$Aj=M4!EJVZuCZH0(DZr3JD&oAunC$yG@y@b~rjr#TIzlU-=_zkh8?SmNM0kdeDKj(-54bC_7?VaxrQD^k}W# z2(DC}I7-uVbGE?c6!8@STLSgL!cp%NOYpRbYvTt#_ISa$^~ci(Gk64@=g4foa-FuM zxx)tEtIf|PXRW36L|nTX_ec-@32H~F`6{S-w@GNgHkJ794?us+&Z3Tf6Qcz|%0fJu>lpTfEJmBctb(34~&JC>)2UP^bQIqcf z>|Z;pO_8@$Qqp0_P38z#Ge5o|gna(m5he}EXYVW%UhK14Jcf}OIsV0*3>gsJe)4|c z0iU{Ri<{y=aCE2Djl9W^`v)3$4?uC#@uE$H!L!a}hWd0KBpg>iEpB{V|4s3JdgSb@ zqq{pL^{+E2TzrL~SE7+BtcXmwVHg{VGU&03er z5l;AVRFP!3temZ51SZqJuDsvS;v$nEjrd`n=re;`WF3ZnwZ_&aXi4Nm^Y*szPu2Y;@8ocbT}2ge-bL0+~$w9WJU3Fy&KM* zNMJ&nGjl8bkM94hw{lOx<)%=46WyWf8x5=(pmYHonT%HEQdk{y}jOoX*4 z{@emo@u2(+ZPK8}bNoz^NgOHc&#n=C#%ra!SMFWmwWF`k{7G{?+&XJGAnrY*&rdeO zJHbpy16;o=+>HnV0;-X<_YV5>ytu~!6#41Rqh9(&DcXI8Nd`N~HS2k*2l})8m+A`@ zF<;9M0_vVy%6dI}2lfSz$w@J>+3W4}aZ@4!*%2X~-vp;yrh7nPuEvRsoNB$;_iIkaIRaH}@%Z$XZx%*gOCaCo^|*;K<|vIpzVTC^7sda@rl zz5T+8m537+ZFAyj`hw6=5YR|$AL{SAmlA}60S$xd^T z@?)DTNayr)i<9i3q%*QEaTA$ANzss(du4xJOjP;kK8Xtk#@X-SeZLiyXzFNQU=Od| zw|b)lHvp*Ex43(e(>BB_s93bU=d~zrymT&nu z^!CW*10%zs$CUXBo7Gp;RN?c7Su2r!HCCbYHT~5|vwE zS@#V~CoDUV4t})CDQdcsw+W9ifAAF;Y}8>tAs*Q_hE*plc*z6}D_UheI!Erwr>bUoBzt!8e7ZOsKQ z9~|?E33PvSyUJCFS87jmM3tkcO{>+a9mZzxQS_8D>i??;c38Z)PYg_Hu>v}KH7bOp?E;> z#*)lctg%qk{(brPXw=P)Jo!YDCr6L88a8z(0qrm@)$yQMKtNz-;`X;6{Nuw?!&72E z0K_06E+ruDpa01<%H<%U%yAPhDk7ik<-p;!LG0`U!on|8D9XM54<32pc3<8SOAI+y z)3)z#kuN0?$d}g>m8OnBnu~7lB9u0PEYV#?A)qL@i_W(PBNX$!6gk%ERYtigKWc$dx!HcKW6*<)jBEk?wrk$?V$Ov#(iTI~$ zf#Rd-t;Q_)00^>-ck@WEnU<+a%DeRBd}yWcijv_H&(`n0NfS}7xSvfnXmplRn_`d` zakaimg~7=Rurc8SLVQhZ=IVP#o})XDhVLsm=YvE>&@#!Bmo@Yo_YWT|FkqBcI{9?< zDsT{5Q%)MS`2Z%W*CIAjJd|(OdoXh$vHqJTLWAdf6GID|4@|ngnuZtdKb|$_t}w@T3-`!DKPw6L|;mO8ElrQ%pukFZ$y8! zEg$=SFwwFtxJIi!9Gy4VY{R&%MALtyir`dfbZt^A*U1UFB>qQ~UX#4Z40q8D&)l7$ zJ6FT(F6x^5NCB)plXchebk=$55WdlZ`nIowskooDIS< zkd&1DX)u2)VWoNvmM*n`MbC;!+|{}Lrw7y1y&{EKC1!R4vr4dIECg9t#OQaC_-OqX z-+5dn`Mbf0^1i>eY^%p&rt)9Cn`k$Qs(Ts*2MlDv*cBJiW1<1@7ktg8iSo_37g#?tdK?G4nsi zqoJn*5u*n827uGON2LtmUBHo@f1YcyLnc8+vC$mwHfw9cfjI;OYKD-z42|hfGg2de zi${aPuIbQM(-YsyN0>S1hmiSMucQ(g&k}2h8PnWkSGR0t_x;TbE zMEE|ZZMjLW&-dN@B`h2WMIJ4)6J&1|B9|US;XbLjZ)Gke<(Lt({3i2YVbJjFA?)+; z-d=%2JHk@W^!j%UvyG($K{}t~N;Ih-sKAY%^?H)r|I%yw(P2w@u7lf!0M=|i+E9lM z*+0ks@S}VXW7?l@!U#LQw_0xPS=Kx939TCv#ko1vHLe05lI*|G1wK`z0Tc=nd%p%70^j`L2!fbF>e4K1}| zHdlIAroZoo@ac1g3AbzbvsnwuZwfQIF?~4a{G8UnVCn9c9#$rfV7hdd`J=7*PqA7F zEo$I13+*}CCp+E-bs1kP7ygE1N5MoWqVNunHN*Rq7*+1; zAN6D{q9q$TBFbKFfCh#wQZP&Kv)~85SR|kOE^{x#(AceC;wZ-@x5?7gittSqQ%W*( zq(ly+5NvydZDZbc#pW;j%S1l{7zh)|XwUtWhGonNq}{ThXT305)#0$9;F)_?|8v5h0l-JyT?1%`sKc>TGln5#7X=bsM^O;>rI^9Y3`)obhS>!I@HB2&2O zL8DGRG(Lfk;#Wav(s`?K*cfd+_zKl! zLXq5)Z+*V4x4QvK6($HVxSQV05U>C~u=e6d3U>u5-{v?Edm*{bH3sir zuWNGOOPvNO>0A!0{&zg44i1Jp7SR#~vQwA+uTQJR0Fjgz9ygd4W5r-YIHN_b9jQ>> z(1>|&=anZ|k&pIz6HL~HfPM{s^Z5}7O`TY<|Fj~#+6DVsZGuqOyk-rFc5VM}bu$GK z?;v8uiu1e$<(LHiNB-JEh0-7FLwdPvC@IhB#-?>22qOe7U*G@qkXr~FOll$*TiBUxjxfD0*=ipmK)vwSM@R?xKnjA>|m_d4T~S3j}{&`?Kt`?RR6GK3-yNFMz>)!5_Gk+9BqWih&5`|ABWyHDY}!e7ccR zzUMG8xzlqGOe?bu;Sq8#1)qX#hwQ3n@4zugBptv?9(NEjd(m5MBxNB3Z*QR1r$G4t zlgA>xKu&QFC2?6gE>8^Bj&yd37IB)rPYUlS4XWIdnI!@O6v(0@6B;Uk#laU zQWW@L)^gBJtC;Fv;fGAYD&=|A5W=^{wV-b11;L8>-4{HChue>YgxEkH@kURSI@B_& z+VW{jN!>#E|1M`+E*U02dtgl z^fFCjs?H=Z1I%AuM>}W!K*Q$E@;k+>r2A|wabq;=Jv}>rJdz9FuOGsM&<2870@}{u z^1)|V>_f$?7@q;D*8JMBb}5C;SCXm-<^2;?OHQLyQbmImg^_YRV0B&H%-d>UHbM>* z-zhQozmnVNomFYN`XmaE><5rR;VQUp>LAhj|a=`*6cI{F`k2#I>DP+;l-2r zegNqtN^rg&wE6gSS=`daGC9+mXX+@9cyz^o9hrZ*j4G5=L0@U6GxYVd{`&coNc#vB z(T zf`1ZI!HvkkWz^bngH*~OX*T*i@H1t6=Wp274~-OwSwjZjMAjm@K-|3903uWZf{*~= z$F2=lh1n%982L-5+iLFaTH>7TO&!!H(tK{ez^_4>F;2=gjtclN*T2N_xtENfB^t@- zhv$jI8lia#|)dX9pE^KA{XMF&7CWUv(jj`)K4jW&QI4Kv-IJNM0qH)PblWDTLq3Q!XLq>-yiIHlEAYr47L83=F~uS?tW7Ml z&#F$pcq1Rn!>~{OfK^`GoPi{|xLW@Rz;jq1Rg%81Ij%ptY^kU8da+2l=g<<7eJ(M)&kQ9i8mv-S=Ig zgZcSM^MttKZD4073`bq}r+uq2i!3V8f#t)jS*;<`3giXT zLasnMhIIBqheNNpmwWGLyHJIRd_G!moe+vTz(`tCF!8*V)LBJ!`2o^1KeH`hhjnr7 zS1S{rr@qke@;z~&{`(?%`Nc9xkB>QL*bLrYrgl$&rH;U*xk73c;sR<3vJV({oep)H z@)X~JwbC%18WPivsH{eU#x<~l39!9~4E(L4r>diUe(#C!vb^}l5890EG0I&=c`!{G z6N&6)&4}qMEOfm@LVqx+uL}i=FdV;9Z{wd&3&6C$>(JmvooHh6{ixD#6rUi{{MzWG zTPG)_1jx8|F&7xcIAP-lCZ3%tv}n{hoGQ!cUAGo~m9YH2X8|q;ujKqlTTO|hdQ8;Y z?)X#Hv`8{(%^6X4%r_U!wqkC(k)`o}LHjs&t#)&xete$3oTMSKvA-i^0GF;-(TkyG z$MUfgRr`(5oCO(X=%Qx212M;6gwgmR6*8(~&G_d~tlE-{e=qx^*hNuL~Ipsu!!^m}ckW`pZX< zJ=(sT7GHCwDe|VZU8)C7GIbS;6^u_;?LdKBkkxr;v4_}bp! zAsuR)(EK?MCCLHxg+*edCfVt{gb0+0Z+VY2cD)%h+l~-|`AoT+K18dwJ=mm5u!a(b zVe;XXQ)K}RQ3Th)hFgrUsjcXq(kES z>d{cJDnXJe^S%{{Uqh*&yX5>w0GJ4E8x_#-m^my}4BKg}w1B-uj#%6ciAI_DBm50z zehNq|f_TSrx!T`->+`30z6D*RFWA1AH+ifDo_7mllkAB4SEQj8Qkt=GGHuyC>%` z-@Ux2*!tWnZF|2Zme8k7cNfcw`q4aRQ#YF+PPeZPmnT)>z!aY9t|p@{ zCIOZRnfM=C(2jJWY+q#%Is_R_ zTmB<{XCn1L!4I1JY?j){5?Cg$39TM>p*rg;rD!yxYlWG5pX$cmK^b$(#abMUI2&rf znB&K8>b|AtFjzog(4t{QXkb}3R>sAj&B|3X;K2I!x-`k(-4OX|EwQc6(xo!pK0F+S zlhDRfd*5`|Bz^qUhYVmAgG~*hDRCNx^d1g}Paf3y=Brh*y|1v{xX|K_YYG||amAql z@V2GpbtYYQX{hjouKQwA0dUDTYiT2M=-K9F((57tu^TZ2h1F5lj_3GF3u zQklU3xZFq>60z*ynD(`@ozO~8XZ7+VS@osp53>0yFRD39R&>0LmoO^I5a+-j3jUPp zjN2&^NWK7D(LF~B2tbBWtK?Y!1GT5pO)Io9iTW3|T7wTIz#QpBs_7))Pd#0}@jn5& zTWUb$oX#EMDjDo)71r7;jl)P84HOS#$Cd>E}(ZskwtOf|9RJW5?dg>*qe@Z-`Yi3@q}L*)8OuMgStfFK@P)xbpi_dr6vM1Awm zKW^gL_~nlm(oue&`oy;!F8kYW+DtMuYe~9)A;eb@{CclK<}!y6jy5Bg!t2#~WD&NT zDsiSa(yjys!wH*L8%|Pw390aEV{X0ILODt6M>QAmitSePU!s1+FivQt;hiOOee(cY zwIX;<%_~ZIpf(os;hj<2xZVNjgCu~(@wHk!oTNyd<;2>j!qTFD*pqgIckUe z7|Fy}XBQW)TcxAp+-e3xagSoKnju-BA@~eVhAesere{Ww&{E9x6Jbv#GKQ}t?njg@ zqZ*9(DamjI*f4MsEqhAD7f|ENSunB_wb|*n8=&e37??ULKMm#F#Xbp(FIDYJ*AZ3g z3YlZkWySCIk?7&#uKdJfhby+*M*ar-7zjJDW1de=Ma3nX9S+zS?$3M|AxpdK(J2nQ zI#H|%6%%$63rx?J@kue~c|#DeCIg9<c~q>&eug=coQoWSsO;x8edPjgDGwAw5jf#@FMr2@uF1Ge7#Sv%Hk^ zMcGi->vpZPHkU}VXUkLaq&&WfB0Jafunaf|;~iaw-vLC)IU+0R|SCtBWaY%UCJHpnd-p?pp?B9_iZa}d+eK`LRYdjH~# zqLtg%BT3`wz9S>7Mr+Qm0`l&!3tDm;jL<(TPjA-Q-+SosOW^j6^YGEHk~_k6GPCU3 z3-SBrINdM5^IPuLn~*_xU~_9|-CzIQvKY-l{l{Py^J*Xt4(a^DAMH`AK6BjjK^r}< zpu%C6yQ}fM(sC56!GXiSdRQ1JnwKixTaec=k~}}s6!&Vy#5dOyMZru>MBmFC2=9jx z5Gs<$%7=_7s@E6hX@lx+k1L`-yZLGNEm?rwb%s$;IIbBLH-iZiy^{`#wQ|7omMv!JcZduN735tH}kL?P--}r=Ohef_B!79 zvaly3jV3+B->fylcUL&!gK7W#OlN&!ZqXg`!FLi2CRrz}PQbkU=mUqcoP*W}os+{p z3iQ8#Y>>Vk{2f-iNFKQi3R%~O;r49uvIe)O#ddbcPW8k*NlVnFmf#IM8>q9xn0r*a z$DE(6+;xy$&pPeib?ZC-^p|{3@u4s7K{7na1{)F2?hSZ}TfAln?-dPQa=r5h5D=Dn zqR9k5Zwi*KlIvGHc_%{Hw*DKoy}Yj9s(I(lMsYI;O`_r&jY`3sG}X=M3~N?>9c}G% zbG{M^Uf6BeC|WBw7^L1pY{cjter4&8E{Nar&&(|^KZ~k3D)G76ktp^oRlFlw{Eqc` z2LdNWclQSZ%%U2JNKK(L0AQ);*?jUxZAL^^qJuyz_4K z^K1p7dQZ{mgjM{@!{}T)55n2dbSD#LGlDR)cNLNod9p{&zeb`10v5)AA<_|3tasN0 z2Rv`zz4Cl-C-FGjdd}iPh^M(IX}ulh$gU4();jp5+*nb2>oX5v@aq6f7avsnB0NQ#-}$Sk&0baw=!#?LGMz6OHc zw9Lhe{uo(F)e5$mtl6=SA}-?+8#tCA=VKB*7uR}7z9 zjo*v;%3nfrMZ3Pb=1czW`SK_y&|_dsk8pY1Twa{XqGlS<6&8OgkN5=g85cTUF!%6; z_mzN~Vx|m85|3>qg+0jL0^#t`6tu({pe4?#EZ^O&JqW|S)`~?w+WR2(maX~FukNKF zC)T?eHhuw5Oj|&I;WGduKag<239^~-rlWmuP@n7ce$q1?!;-fCzzg~z@MY~|GaMmC z0GS#07|S?PM4eNy=D%OUqUshv6RPffznIT1nEIwvLdc8T&+*i2j{37LtL9gBIWotpADDj6<1a9E+9lw;YUE? zB1-{v2I60t86aC!pj0+jp6|6Mtc@DI@ql3Rwhyw=xl1$Eu z_gx=_)4rICWBD!v=C%RK>2@Pn?=o;VIoPieAx>zgoj&0cJyEASmQPay2QU2iw03uT zhG5(2#gTjC7tv>5m3K0@dm?k3$m~VZcK~>ge)v^1G~kJU%L_^8Y4&-7?d&A37v5dDq?u^uT*M zUl2}&pku%~CN;b`Z{PQ+A=5Imjau&~L%+yJ2^$3vnP;Y6)03YA#AHG)aIz?&FLjWm zpt9PgIbQ?|Id`2un^IH{7^GW}{diP^|5o%@07eBz3ao^_PH`99?6go*AR}w0jaZk( z3w;`bo$5t^xRQlP|30uE)#kdQvi!kT4oyG3dK|a~@fF}HN^|&*XKEsv=S+p(iQ?}p z`E2gm1YK)fLL0HTU8&Ecv}nmHSohw)eJU}NL&tY;O?!dI;z7Q3&7Y;`(e#mlaD@rJ zFECb#VBvtoAw4B`9D9Y+fC)@`|2sRPqapl7Chu-1t}@eW%who+pwGVRM8Uem*r-{NxVyRo zj&iSQcvw0N!E=yH>+@V0AuN?5J4+&}Yb@h}Y>HK7=ScLAFWW=NSf=f_cUG){>@o;0P{G_!rP6}Mh+7)V}{YXrE z{gP%k8e={oiM|($>1N!UjZx=%O9$Y?P=@k3W-K)+*A8kF8Si*n#0S}N2+NQ3wYz1L z)Ks|a(YGqDU00?XOh#w1G<^PFN6p1f;zo(euhV{fHQ|r>x}s?agqxx32MqWbctyuC zEV=M{!PqYzuQ5Hu{KA1F<#gGh-YP|sdJ95BZ6>bjd_(kbWa6mt_uGGCvR`dljt`z3 z#mhtRX4GR3;||#zN@`U9^1$HZQ0#MCJk7viAteFLJf|P1pLu!ou0gn?jR;pVyw0jSINJTl!{b9RjJ0l{kX_hlsZ|sM~p^!t! zTDJbT<^SS9auia0ZjU|~DVoX7$T(4Clqz7T*OUx3^0sVJ`$=Zb;x=qBdt(1g3m=h# z!IuUhIO{1KH+a*h5RX37bsRWrD40^P-^x+6hqCv$DxM?hSG;hDou6BQjHq=xGR>wZGGu!H z&n=C(De5vmVN=0^#T&eTSA#QthxqT~eS_#GLNgYubrMbXh76k=26x+I9vf7Nmk=9m zXzB;(yTj6500v@rA7|xlj>!*#w!85~i1XNiiN8=CGu-JN86h_HJU5=IIjidE!mp#q zqRJnMtx|2>1gSaT7R-oZ$p%ebp$BUfYHc~B4axFNr@25951qD~yb$oPFc5>5x;&P+ zwq5MrcVl2B>LI`b14&2cO+uoeh##2}|2`Y43A*`O5!HD{o;ZQPk2k3$4spNy0i;0J zD7`K3;L-P}S}^Yo-k1BIkA{^XjA8_98AidZMR7F-^%pl;iv#{E4TXV6Y5P7Ie&c1V zz=O{WUkOy_qeo1Bn%Z#*1*WmHv-{BD%?DzW)WyiLrN@!I`P8fSmk4=Tyu5rVURCcJ zz24OvqA%h?Eg424wsz9o$ZEcP_hZ7vdEO^vCe z&Bc`{3U+c-*WrSz&;}7d>{|G7ND;$f@!yAviq4bxJ#+E;?yO`NXI?&J;6$uhnJ5r! zP%_&-D_}RWL&$3&8}z*tes|XykV)roqCQZIZ;1yx>Q*ZfLI|W)y!%LIb!v-@E2R@A6edi6;Ev2S3KGMr#K-2Ph|f(QF6iOgFHp5 zi~KLo^7x(O1Oe@$_;OXcJ`&zgHm@5l%r7ZfzaeS`xd6O_*RaRkKt_;)m}Vba*GhUP z?^f!G9)6kba?k;9hrm%4oRAtCWTQT%MMk*PXr!1dp-&qrBo@Ht?s7_buU?t=%u9vq z*C`(ikA@K(qKTf>amd0Y*Bq{<{_K=`n@gdDneSse2I1TuV)^z53w}xvlhw+f8!G$U zH+^9KHkSsq9VqDAi@RxQ)7V}fo|^#s>-31`rRh3(k&MB>rDEPWW{ScfT1NKEH1(`Z zT=-O4c31=~lGL+aHXC<1M=Cs$USBaa)#)$YX`?~s+=d8zRhq`fsm#Lc6X(yn+x2xd zXmgerv(}oY8Q=VUpm1N&l5~D*ht1r*UVi6cdW6KtWiG{#JwNe(Uqzt%Um18FM9~qB zv*dykZ&HxM(%?Q8xi#XOp67ep<__uZdGjWr!keFyXE$6fA^6oDt%G8EiCfkH)|{$D zR@tfRptj>mL{lQcHfGfmy_&X<82+`>X%*Ake>0dAdQ8A`5WSXZS zHkAM8A?iDYhsfFcEtk)?-&dP%@QcNMab_}n>9DxF20xs#hilVaICwt=1QJz4Xg8P( z7d9@%4=Hk-w#0&Q+3#POodrJSNEs`j{F^~tv-2_3SP6vsZHjErVbOQnqrm*+z*_>I z-Un^}LYh*ymwd&MP2H7k0`XleSLUk18mGT`xhUncm(gTepQ6JU>SKO}U6`vD0(ePz zc6N(9rSJ48`G|q2?%Z}v*>PSaEpk#;o&qY>P6GL@2ck5Do@F$J7v3N-&=taAm8C9OB)1QyMHOTc9qLao3m$X-NmPV zY1fzT&0vork|*D`L=l1q&=NR+0by*DMrHO3ResO0}OG2ay!zzx&s?QW8Hs z1LGtx1OHly=%r9eIbQ<>2&6CVB;vT;f_&aluO=BhSB;=N564Rv$HgqEyYqdTbJZ{< z*ldBG``HiVPfA0G!td_mg^VPt`J!>hm*;)^J2&7rR+l+@_pnRBd4&-Zo-c!OG_;dBY1cz$I%%kg#twAUp@lF<@<@lm^(9Si(9sT^Pq&_ zPK&!AW_Q7y^u|XMKo2~JtG@CA1u|q5e-&2jM(g?SrHq7gY0)_Ul3ci)f0JB3p@j<` zJ*DpFoj#TN)+h@CmVvg;sZQ5lVD)OJ!M~T?>1B#0(f2=Pe`-Z&<2o#KEuHkm8rg>A zD_*_w{TnK}_f%6(R1=zOouhj_Sk8d6C+qR=yX9j-a^y%xC&NlKEiU@?n}#=A_uYsC z+7BO*zs;U(vqgU$bkG#|*=EQ=1uIuW6WhruxcVCMJ_?jf6iny(VeE8}0LXbfe@Yj{ z=KmYf?5QsAZxb}o?L?2Y{+o9AkZ~qk9@4`6P%T4n0g5XL-vp{*MbSynIL_Wz5mJoU#PPMFVe&oTkp73 z9hg5<(iNQ<*uvWQCf+9qc@;WI!t19YU{6!@u3Yr->fv>v6-dLVA9&iOJHPxOb-y<< z5MtqqC0G7ngxJuq z4E#&}<1D#8vI(6lH=D;eHnQ-ILC{AI-;<_Oq9cM=U}3KVCM2) z_G-UL-n>4*?1Cak5k2C;5&~ZY%i;BWR|>>OgNdk;#sRS-Li_9iGb$8HKq9QHm^O;5 zfz~OUglq2-jqM-P)`E%!-&{CbWY(<*A3s4T^w$gYzkl8kRb^GlLB|~#s!JJ5vD`0A zG>r6X$q7n0R!-Ij7Wdxl{jpkKO02b$j%yR!QhYb6Y0LWe500I6e3BEP+XtJSzx4l) z?G)aKIv8^Q!s4-35$C8^XEs#04zxMe&A;N)YaKcc)(~yeXGCN2jAe*SyU!B&_#ulu zD`eU$vN8{qSpIj~Kif@S2$)a+CD;gTw&giVDBcRJq50eYLkT!+60P{T9wfpWTxl}1 zHs|g*8(lQZ9jrGyWq%b>Y4|<0$UaF8Dx-|QaWoK76Ac&~wm@|a88|x*be}*%kh?tc zS3mH~;fwn|<2*B%FD~Rdp?vi+F+>E?Xa7?c{hy9bW^VF&d-xF>-z26O%1JCZ`bpQXC zLXe{LnD(2VRkHf`+sQxupOXaR$+94lFZHFt@tdHPEShqxFc{VSr)G~m9f;Mf~Kuum{n`%=C8F0$j9>qLFuBgH$;+yyZ`V{(yoWON}G z|HW29%G0}?{P!tBLbP=#xU-Hd0|nggyy3!(sUo^P?=o`g?IBBtsDpBUjTx8Y5KC@# z*h#Bj{{$Z=!T{?x{x|aYP)MJ}D8~XR89j&6pz!un@w@ByH-ELZ+nh(_ubG)&MRfk; zmoyUrGP5_t03=6_;zxJy3I?5hV0bHzxC~u~Di0wCbvx(~dg2yIVphA` z%WhxKjdhPIen$HJ+_wDtopz!YYd~&feos1CPbTrwZ!J+FEOYU8K2=`cda>2*R zZ|>we33E=S)ooD_#f<%@B?gbdlu0gos`t%|4t!$(%9JJw;~PWRAp+ar_@1OfvO#gN zei%PGOoUim8-0$@rYOl?Xx0yJ-sG{KyNk0jKqHiXfbkpW|MqrdNU%~<)c(_u7OFag z1L-_Dyt7)LD0etn8bmNzoT@R8MekV${bTq|*ANY`ZinxPB4@PkKD2;K-N&SFlvukh zt>hs(J85Wn9O=h1PA#tz+9tgAJ}18XmzIz~ds2M@`qi+NLXw|SY7~;Q#Pe|)tKh=n zZ&K3L)orHRkFOaB-DZDlgAG9wX4}uZJ7&aHHQ(RG4=!*(d6JHAfWO)utvx@kC*^Ki z%O-~ocLpJmjJ&zZKs#TzyKSmzFPVn?G=xWjRKgkv(M*})1=r*f?)}Zuh$zPdLrKRX z$qc-?GdB8O+(G|1Z4anG-j^$=sSVqcgNJZU$q~9s zRoNDAP7rz*b^T3YT2~RFsE9>FO-@5yfC zySm_5rCfL`b^U>1tmNv^->KeTuF?fQZmIU$GJnJJ}|=gYug-pYva z%g{fE1MLa#6778v;D6fyqsu?^HEI_dyrXl*`>xwUm#(jXUX_VnetHgp7S&37xlv-&Ea<+ zjyUYHKdnh4q!wjp6C-`I{G5pve$8Zrvm|TKK1PQh{(KMpGh}-t_tmvCOF7Zq^P8mo z?9h*84|?8VXma~KPx0d4-*ij~eQtU8V)i8FJL5!y{~uFt85UR5M2imY?(XjHZoz}Q zyA#|Uf(Cb&0KwfIf)gBqyL<3pcjx`?dCvJi&&=%J-K$rvT2(cioL9Ou8x?ZOLNstf zgo_l%BebVIfy%oZ!r| zdb{GhMh02Axf8V3Z9A`N%ye&wVb158L;;Ltcw%WOdGcl@;4-klo2liln2S=M`Ig3a z+9|n+b~*Mb{Oinv)3b&d#vInb$t8g|zM9wJaO1tqIyT+PYg0BMY2Be0DxX0ZqvFAr zTYO-dcyM2TrL?Y4YRr-bY@8f1pm@DEEFYE$X;yL)Y9PLy`^}Hr3WN*48kEdsDXr1` z7?0=y1fu7dq^WTTlz$pgj`@HJHLz|1u@zVeV4uNJA!Z;NXcfn#FCz)8Ax0&XKgxmS zzU1WNN>0&noqgcqt5%sJ9&(DR7(4~m>$^MQ;!bR1@6Ylx2Tr*VjvC?JM#=CtnjE(Y zJQj|ZjFj`$lM|gng22oL9$su>ttx*3{r7SLxSj2b(_ePqVC-kSryOSYfNz){#e}2` zvZl*kCZ}pETO9ZQ=6j#7EhNWW@miDC@I`hN9cSSAbng6I-%@3s=<&&bKVA#iFT`Uu zJ-@9p`of)o1-)XI8!G&L&|Ewu!P}en&|&>TFZP+jfh;HQeb&ke@5E)&fH4fCP3(~i zXW-wzp4#>tKvi1rn4bn-{OOz0ivoBKxEGeYfjG%Kv#Pg4dU4=iVT?e|&x~QW3SRlF zGMWE=gtbC51NE03Dg<{}<4%Uazg4>GIT`J3GBu{Xh;dS7 zDFk|5>uz(&Va^^p%o?sqe1|YIYvu~A$7lzmc)*|dPCX|^fV8`mkF4iCbBn{SXhPMv zrL(6Wq$c{;)8qfav|qmt(pz<3O3LwHs@G}YcL@I&1|H%WMmSgZFgONZ^mp23FKu?2`J}&4zb(b+9<2Qj(AV81$tl59=f6Z4?(^H2-3~d zP$sT<{#Zbk(+p$qEi2qhXrjX56z%V|XQFME4{?MAaW`QIbhJ1xu{CdZO3eR$)N}w9 zx$z6|eIhdu_yb@jpno7oLWuGAdO5eW)Cy86?oklq;Z#KDSA=tz{Ml~%e{W8a8Xl-X zt`&LlTP&2Zhm{%I9)qYIs@g3*$z&n;H;OC%K*O-kzxiNNB4{n1Gt6~C%P?EWBJsc9 zG;$;-Dk=Z)*!WSl&k0T))_53nTNu-Ssmwu7&{H`N+eYaSg|Or2ZsXxmQ_?ZW7wNez zz73qHj}@DC?J|E`~MD9l~^m#Ogys$K#=YS z$r%@V!PGDvd&!bO^_!I($fI z=8JU*>IObMONV+fhuyM;`VO36gBZRDg8lhqZuI-}lfb7ZM<9c7=vuh;p#;1pL8jKHl)lU`I0@e2F}Ir+7o_FZYxeOV5D`K46ZUzmAFyDxKc*NSY zuS1{c{KKcZTdR+yTy=2N|VQ;TImnIgDJai9c3X~{x*YPC{6z}CA?1G@pkl1GSh2r(v5%` zZ%^txP56hfcu;GQf^pL@!|y*T)WVVwtr>E{y+LTw6PV54s#$+Dnup(D5rg>p7_L2l z4d}b<(&?cKNRC%Ohqg9Xq>rRZI+bcB8LO!`-36DXq!Li+@j#BW+C+?c8|8xe=v^t~G$ zn>7eUY5*m@it6wQx;L;is0T`sv=%iL@oo+B9bNou_-Bz*8 z7!8T>A&9qdJp&wWr)otBP_Y^cBxcCu#83v*Ia;Z-JFW_M*ni+#{0bmNL9n;kq7e<$ znBnw^s{yd)*VumY*Gpl?!cpkF$((8x6RImZt41mIAKioEhe3@?)kkD(P)JPvu14G; zw_7)3C%Y9MtqHMjrC>m;a{cg~9+|So_mr+Uloqi^%k>8j;@>bbKUEkuvrDJk;=V!W z=lkns@84()&jv(ydI(k*68yALvto$6U5~He(mtW$2P2&!>e{@4_u1}gnD{2|M;zRE zRP$>w=~u4LHu3i;0!&!(okk75MA@1vD;$jf??xATqqqq--5Ei?l1( zG`@2PTvKsgyc~67Br{5A`B*>P>Q7F{!02+~=T!#!1y;(LmN(}=4_;dVQ9)N7%3GRzezQCzZbTdfsh`|J z0dwQNs*rS9k4On;1^Gn7Ppfn$!cmGr372v5hbqu$dKm0h8seN=`9Lh1&7w#%#7^HZ z<@G0z#>AHQSuN?nE8-5YDd-0tu2h5?PAudGtSgpGa4R|?T$NN6l@>ag-@I6r7A8hb z7E!y_N&<*4X*RpB0n@#l@7*&-3$U3;0*+ca((oMu!E2;Cd{(e%tlb)zcpyQL1nM;_ zhx+oW{Fg`@G7c%UWAfiA`}G|W5*4Ow(>scl@N@xP%75mXH4oCQK=_Hq8F4$PVs2m- z^)tTTdnP1eMuf|?M-Uk=@ekICn;}|^6L{$4S+h|nT%d^;2i>mJ7itqkux+~IpX`-} z>uKeyp_Gi8^#U$*xJ^K^5L5hk(8x0@`^8CSdZu#0g(7B@3no|WH9)1opl4d@FtWDG z0~2Fl$8ALb`YJTOui8U@f3}~sxSWicQekZN3995!tOJKe>t^M5+U@B#_;~Pnp*Z*t$ zFCaI=C(52=w&^${E^}Ug%U_!eTs7-fnEJ9P#?s!nlO3DXnuFt97V>#boHZ*p(5@-@ z`Zmn_Qm7X`KHWXQ2|u5@rR$SJ%wg*YEPr|TezS~A!k`jvWRU>>mAY9t%BBgWvi)2KJUX=N>^@8&;5R#8HV-)#q$Is{x4!?= zjf*?YC#bfvNwA~arCC`WE{MTBBcJBwA|t(Qdk~2z(%BqG?oCHyQAJ9-vUb=>?6J zpnmd*DBDO;*@T-k4fNkkp%^V?!>Hr)V(()0Ni@vG=|D56uv@Xx8*t-OCI|>V`Z8*` zKTR_;d`btD1A~xfAj(hPT273&R`NC|b45i#dVNGj;KT-6{VwOiZ&+sp)ohFNR`pwK zpNo?5y)8hrHrDv2cl4A)VSs{zi=#S;BawuI<@v)F`y@Q|x2vtRks1Q+jYvV!xf{Rj z(!iXc`mcTGAsfKt2GbBDeKR+ab$5vjP)3$prnda~AU+4t7ltXbCny#%EqfUrRBU(o z-VCO@_bC7k@zg2G#04W@f}(fvs1RAior1Q8}(@MwNO2R|-S`Uv>y|@7ae434DK& zNk7yfL~i}N$bJY^3*UWG;t0{vr2(FHpWJ+PTtXO_hf-zrJkJ@X6v zinHISZ)O$-A;x9BCXWJEJQB#MgU8ueTDDZwPh85L4kr_TbRP68`&Ok_tX3~L8wK*m{<{F7MPfUjEFLX- zS`2#5VpbOh^0Jl^Yl5R@Z!%XrQJOqGHC5 zrW_Xv=oDPN#e^d+5Z-*d-pcGsUYIJ!>QucbS)Q6-c3xt%Nk`FS_1{Ap^jW?}n{{i{Fs zaTjnu>_V4>SUK>GtO228wARV|5O$lP>oTshnTs5{^7UBXHD&>0^p?kTyn@4dd(I7m z#G?qeH@r&yEG-f{XnPOc5NOl9@jG~+Y)b^j&(9P(BSCB9gRvc}4w&fjP+LTGP2%e3 zhn!K=*cz1n*4hx86Vp|M??V5g5~zE=aJSx=vIGE(rX4ktU~MpUL4{;guDpy20IPmx z1oP3bZjVU*1w7Q$R=zN0wz|@DF}~oN+y)PfVkAX!K#kz(2)|^OBIZC;x)5=b_=W`? zU;f7FM~mM1V&Luzduz3?^TSItx0$m{ah~L1LGVZG6nLD}zxGTdx&NWu!ZzcOg~A-$ zQabpSR@_KKYjh!f zNEM&d*G9eXaFvTooK8q6HXR{TcD5!n7u`Y9UBUB(PPHQm46{g-QiajZ*}DK0(YV}C z!}%`YSDehjw3=R}Uc?A>crB4HxA-fQHv-y=V>gKi4od~LwGX;X@V$+ zE`Bz3snttF+3A{0|BT~vN+kzsSOxPdJRJ|eCmeg--Gf1iseEO@f~%-HdW z=8c0aCEpALzGu^dR+^Q+2Z40XADNBGZghD&0d2ZBsrln4b6v;WL~ly^>-g%!&k{kM zi(iQyX1r1zFp9FT#%do*7WdN*hXU@zz9Q4MmxKu|u4-*}xm19hlv?_0(b{tzd=0M12EPVi~s$|MR> zy;p8mz&JiNtLq&3qnN0Lvp7PzsLYjso`9X6OpRA+%}DZOG57O1XUfixF_-~BxSMESQl=({+d{k=JSMsu^d!BKwzH zV!-j875XayzIm#9Yo+Sgsx&imWxW9#NO47`eQcQad>ZqKioO6sq(71!*DZNC&T~-1 zyaHb;_fTAN^Or+Pc|1h#{0Ddn`E@%-g5cr}xiUI1fv^i;Z4Q)ZOP=c(pTd>*kyNj% zYy5*h)=G;y`t$mgtAq%N^QDP^4Qel5p~8R(o)Aoo%96?D$6T4*pu_?NKR)z*l&b4N zLt4gr@OtK0ASR=TgCBWgOxN9`5Ea>cjyjnWGn_qsbGqJN_l>)Oy;Tz?RhX@`yS z>Xdtn!=#1c8N?wz>K6(B2Wm#Mq~EH1c1*`&9oUuhYV+ZLneD0~_9Pk!%`A%CjIHI# z43|~vNpG6F59m$n9$fTH!sz>v`{u3ybc32gIFHr(0a-DP3o(MK zHA9F|qnmo&__3aD0x9ALsd!lG##qNq8=@pbGibR)jM z!R=)LC??v9Ue3(LijxSX$TvJ+7vR;==fO=|aM}CvT-dpCEf;&9y_qa1na&0ewcmf^ z%~ade+U)!K7F6k#l|gQ&*;m|EbT;NV5OZrq+2vGVdzR@7d1G{2<=&(5Spx_-9I5(c zO};3IYfQIe?yy~xN1wg^5+jX^uN{s}7U(xfa4)u!N&Bovj)S$@}1loM0-UppRvU`BtE)tly(KB8e$ z#95Etk^9V_EzD^)cwC_V3DIHAFF#{ABrEtbcr1KnYIMj=?MU0yFx}t!UiQ!}4a#GB z`};z!r@NREVSDi5NNyiNDMPK6s4gmI(`uk%v@nlmrUXUHo{IaGZ)A=IVxRv(y z9kw~L0D1!ngU7XWg#oh#CfDwuyyv;OLqrCf%D_oTa`9?KhDJ2&K2A>iG}j3VI^Bjy+)2 z&b^+3tvWeR-i&3w7t$HSx+{3mI!B#nV#xP}RU9S)^h2U-zyP?Vl;MJdO-C&Yy+Fv_jPv?LuI{Qt`fbAA{+F&+XqaZZ{Qs7Nv?gxqZ5t zq4bGb+;Mev4Z6b>8%h28y_4BO)Ul8=O3QgT%$XhYeruG_yFvXYvhn>O0A3e$f^KBj zNWJL(wC7V-w1q15Cs_X#2o;U}*VMY;pXfVh6ZCCSckJ^!N-;kFOIR}0^?G8x&1ZZs z>_UZ&z5fPRCkl(s&m1dQ>g4-t-`~LSU7LENTW7L(W4IEZOBZuuIzH4D(U%@6U{wRtWTIFYZ*lXL`@X4 znrD&_RzoIZbtv;*IWk+v_IZj0v8b^srhaBlRyam~YB@87BNR6~eY<>HF5Y^r2)$Zw z;+Xxb|42261%wxw8|v9$pQmY|an~r|R6ZTDQ{b!(3{2?jgpF{Dv4tU#;;~+3P1K5z zls#piO~bJqL0qw7q`kPf{OBvO_3-Y!Df8I*oB+0e*`4%dq6`>1PoRN*ShjAT;s$#S z-woCT2HQ(9K5VH9@9QW+r`5?UDx`wUs=14m!$t-)Ckj6wGv=kx|5LWHtdjxBaea(~%1_W>^Wbsph&VFSO8gbPbCWp=B-! zDMUFKH7d~p7quiYo6#9TR#@5E*CoRCbR<;KvGNM99ajEvC%*Ka_#DE|_?TOWf_Ppm zym8{iPx+hSgXhxZ0s)+k7CYTgix9i9u-0R4uwXE52nX`JjS>bB$tqnBt~FBI@_h_a z;+d32{dgDy!N@+HK+LSF;ae2yq5BTV$NtpsKo`U$n0x0a`7Pal8k-Hkw!Mk9N*vE0 z_Z;m$g-iL4tz6oDdx40>&Fwpa1yfKGaZk0JlZ{#5e|21SBJE#f8iZ>%5N1PK>eqOD zWdKM8Anf#xAD7z@C1xb`%{&Qy*I4cm?Wfhy=vosd9CxebyD_RA6{M4Z2dL-piON0hpWZURQ z$iH7>BxUZSH#YK!;{Qv`HbswBrg*nlW+3MO_C9#NEyBv_AwS*GxH!TSM9hgAG9DO==LWT~y2d?!2U z#;z@_zUr|W=on-^j+2rz&$0yaYCbLlr}WGYx}oojY`eGdL9y2T4PUOapNA`I=uTTlUrOiY0!pAkk*7rlGasxa0FQf?^SyTqb6Q;$-6QRtjEh z?{`MzQyg$En%}?R_{~3@$JH&Y^RLEj8Oe>+{3{Ka``v9GCzw@R@DhCocY;LEu@5bI&tPZ^;E*RarU-I97i!4F=$KnMI-6@;tjd*u zSpwkY;9J~yyx4O(aG*rqoqiE4qqFeAGMEXw=c9j(*{KV-8+JX&aVL)Y^nT8kZYfqB*l) zNFYI+L5}*R>mW*#4U=UU6bvzfFoWld5`YQxrnh&xlYG?0%!m|CjLz{NHc68WIFly# zD6v>HYbLcAfCaXi4%_@K_NOFZ%9G2?Ro1~jA+;~zUq zW)T0m0WWA3r_?ac6>Nd3^GYThxVj?a_i$4Q9VyHTLyAjL1^spSFdr-{Se{q7lFuX_CkW!-ABbW)k9B*GTL8FW6bS zXaaC(Sfwu-`sWvDJ)7;3q%9he15^8SMU>J+P9Lsv5qW8Kn3kOl0;%mW%0eZf%RsV0 zI9p!&$PVH!)xO3>>{k8l_}ha9bM%cfeZ)%G=OJV zXeQoBar8ao{x2Png!AgE3f+s3`DT%wnQ3>53-MI&y4Hh5yTyP%I8yI686Foy5pWS zKENRN^V@O3#m?;Y(@CnC>67R<3H{0J6y?wyY2H2yF$QA@z3)oF2OtU3X<;4 z0{!LV7PSvGIn~Wg0T>ork_JzF&^z^^hnUxvpMC@in?eYKJ)7c|C&z7(Z`4P2X-F2B zHJk|!hnYjbeIF1RR3D99E7LHGu^SU)V5qoXz>5~FY>)5X*>kM8tRX!I7veajFH+GU zu#FThnS6G_6tHn{cB8K@hmnJTH^RgubKf*qAZK3tb^C37svf>(fa9EceTA<<+uh#O z(#1B-!1;!cjBr76mR51k68i~88`hVeVF(m9-t{V0!^LK?u;84UjCa1dd2>b7`i0UGxNCh~DN~ z?R;1?TO{&>XsUrY*puI_*rZE)Im)wi0Z$(ew%9twXRMf#ueYq-wX4o@n=0Pf&FqN$ zI|KM>h5*YSW!-&UNX;JfCV5ERzcSPmbF06!55VBHO@d5!%AROG!;V8fNt?C0y6*cu zH$)WHl`KsVQ~6G@2NA!_;v+Kh;h>g%%&J`=X|)wr&@|1_pftfx5?{Tj6fvFG{Hqb6@*B`+ z#+KN!j8QD$Pvwh&(ZbxV0!Y$}xHpI$ED|;m$nri#kDVVMXUC&}d5C5vq=%PI!vTCv zv}m}Rk+pTabO#QtPC?<9dTXp?Y3tTwt>8PU=Zh3^dDd|CB*Gm7!o=zG2e%zN6~-*`rg{`Uv*hr7{J*l+kZUS?5bj>ukkTPPxU>Xt&MD2x@WzHM?E1Za;}W$#?Hjl!&o zrT{6hV7!KIu-7U(lA9+<8jt7!>+||3n!jIx+Kmp)%HkXboI&EW-ISBVtd>8M=;Jw%Uq} zvSwK0Kq@`{SHqGPgByA%8=Z+RqP=&ntGR-(!}IZXN0+&*84kUU;Q=*0mNpy-Hn3vW zs`)=+A_e*dp>F4YNO~PZ)Wn2zT9eVHYyWV~P zQGjgx(`IhVOp z_(HchxocNpcf3*d&tEzqEyd!Sv=$L_2D5@Raeq;as;kTGEx>X!c5%GkfSky7DQzjm zbKGO-I*FnR#@w#GqWO?8aYA5%21i9<7Pw(sTg&8rhv@s&$|mR5==%;}jk+Z!HvpW7 znlpionNd9Ro5?N|dK+=`$XioAry90+>QL>D=lWg)f-sOo+oD7ml7z|wJaM@(AZjLq zTaHxM55PiCc8f2-oFvbvf_V-9DLfw}N?U|u<4}cuOprBML&|eJ!vSONu9}u7C;D6- zy6PTWV-T$2tl<*CgCIQfsXg@#NGC5knuE`P9Lu3Gz?GjDIdeB_)m8*2^8`UdK%7BW zg$IDvC2>XpjH?)zKYLhc*2HP4eQzJfEq&a?r8&zv9&xsqe?iZT$X&V5F-bvXtS0*P zMTu06#wQJXO&QnajL+0llK^@GvBG(8ZgV)8#$D)8XUXCyHX-^FyMlHgw;y0KV9%}_ zvCYhSOXDyE!a{8ICN_h2qSDtt+??0T^Z&9|#s36=UPBJQVij=yu(e2tHOaKHlFPO} z7{!h=Jrgu-n}<3~aElbbUF!kIPN)+bVg$Di><1byDW zA((t%Xw29Jes$uQje<}M&G%I~6#)Gd9NBeGWo7Lg`DTh|<1N_&N#bX7C?F!7`#b~i z4RX=S1vJUwdEewJDV{R zfIBNT3`$0nC@ZSl*YxOI>$_Gr)c8owh(K`sDW}E09V@SlkqZS6$rw@#mb>fH@jE%E ztkep@4mt>g&%?3I(NC<7yMT5FK?^n>Rx}O_tq^qFhcY$wK*x=+vPul}m z1n2x!X}eEsaP*#jhk_vE2AWA3n$-nXn~~#_|<$E?;o*mg(+s@T7V1F3cmH zo&6D$&oL#YxA$*Tupvf54AMCwm5jeFCr~_cnwt{FOAQmKC`p$F7- z-%PWMp7sL-JzhSJ!kj;oo)+6FKOol6w{dW|!g+51)|Ui4JNM*p-AFcCFsMOJXKJ$} zV3Oey@@&>hOI|&!3$cIw9}SmE)-1Xk<{w;gJ^j%8&4x*5RO&=KNeS@TO5S;m(LNKE zuM9lrfet@911Tv>wI@7ZQ!w z@S>q7R8ph{UvM(-h*(}~o+2SxSmJo6Ed8=IrJ(7x{mjKb7S!zfjs?X9fyp5=Y?UQ2 zl62b4(9B5JYcEkZhT$xdoEC?sO;YRp zY7#sFTWdNDb*@g>$KvrWRuoK9f0L4!> z>h6mHG*}cO0$U4zR+Uzdwv6a2Pb48U5dF1mc;}u?|4(+Dq|qDG2Pbk{&Doq4Y&!j3 z(ZK8+bN^{b!B44dWf0vjJeCx$?%wA|C-W`9WO_e2**z(7bKJP;L#El7Tx$X&qqR>#_&%o^fi(1})2 zL5apb z7<{7$ba4mx!40nUAhbk-pwXUYnzylq?d%RYSdc;PZP+p=e&dDOCOHJp2xKw;Du1I~16fh+_aUvr=Z zY?+huxwn4e!^P2`k#%gqCf>AWo7r)jwf9cYRLt|`W+VRhNFP`ziyP|eV~8&tN>l#j zl9j5|UY)$x#q0~;nq=$D7+yl%4BV}LYb5_@G~4X4{-WUdZHE{Et4rcK89b;k90PDU zhMsZ-`&+xa-?9o&EUfULp)R{!D`Ag9;3C*Y9*K!uBlw}_ePUqe7luFye}#*7LXNdl z8b7l=#{Dk8{&{YIjF1z%*#Nkhu?`h$C^4aPMCnOw&j%|~Yk?u9^Q!}xuw-Ow>9s=i zKRbQCQro!qr*E2jhSZ<8^_d;Rv_^(;nZQ~Vi>?2ipVkDr15j3Us1B-(ZAUE@?*q2$ zQiOlSCA|NNOE^s=>B_B}{ga9;_gh`^_X2@RD%BP}_ZfLkl0-RVtyCZJy6`%3_My2K z4vVH_v5S~zf46c@`em~l z2*pJSf+*_MmB$SdGfW6D=nM&4XO3M-R%^6~lK>JMfHvuN@rR`&{b`sxbpa_Z(qq_< zKWy+^5qgc)jXrkz!t`X~_mBc+@7q)8`u8$)O&jV$cQ0Hl=`t~zZEwuBH}GllI(Wrm z9e$q?vhOuMsTGD3C9Z_KEJ>yi1lzzpVNV+HwsH+z9Afl+Q~+_iTJrZ>yKwL^6lxN> zkf2jYV4kHrII1#q6uw8DJCKQ_b+>BZ)Hpk!9;8&cl6CvBfcKN!`AfmS{z{@$DERI4$34WiE1;2mQ*@xQCs>C$7X_%dBfPTknpuGhwK*eK2$%PR5aAW_MXb*N<`@xd!t*$)w; zObH^Rn^AEKzZ91#{0?YefY~%QhF)J)XsU4Lbc8x zpDb#plsl`?Zbk^1-1g>A?xqwmL+w~J<4KTU0=Kr;oDqxr)BeW=z-hdyK zpiRcs0U^hS4uWGGw?0L|T$5!$1O#p?7gaNoWoG3~F;aN;5%$RJVvoWuHEDj$(KpA^ zPgPqKVb0<@JI)6DmR|dY+y*V;Y{5N5v^15;U4QJ8R^9st%l{64Q{mR!Sm3k8(}(he zMx3K((*Rg2&x?(!{0D3Q;NOSY-;+vf3AX-U!2!t#P_i=*{QZk`Ho_%%X)&B&s)#zW z9Y}NyRA~f%Aq@Q}_vm9PLe8(XI3}D36eV3gOS-RH`;{z_a}3Ea6`n4Av)VtCQVVB2 zhS|w$2JKG_3(~oFS-?pF4T0{AZ%@9KYO2(#PKXg$lLP=g6nv-~%WwJz!@B-1-d7gQgrzajb5q&B+4%5i$sW^!sErCDJh)(4L^h~*Of_$*oK0}CaXL)go`M7W-ZUp+;`2_ zN|VfvSpkoK*I2TkzmAxBW8pX$Iq>Z@Oa6QqF-VhN%rXBaoH!r5Zk-Vc&#_H93;Ba% zH!n7HJD%hY0#;NCo`@gLjWvEJpA>Yx1-P*iyB;pZc8GB(>!6-efcxQcV!sX**N=7YG3R5d;BF&g`3Jo^sb9g99D{xP?dw zKFbENEQAHqx%`<54H^fe!uF3}_rTCTxfhTQ&PEI%tzHV!!Dt7!&cHJh4ixUgh@{q- z1DU>WXl`|r70p(Nc#0d**TYy=g#(gSpU`RLC2Xw0f2Z8ut^%5^2hC^0MUXY((CpH! zAbRnx5=8;^g4hpupZW$G37}Fmj1UB&;|lbT`c4{OhNppK&;;=huzCIi>?xocaKY0% z9PXPTa@xw(-JsHhl$-~{qi@1ql$%)_>bEeH1PC+g;q`5C8R0L3pF1>pq~0t`{k6G< z1w9r3)8`@9qc*e_aZh%57ePku{WdmWg%VV>g?1{4SDc=N8~@Afokoj~zDQQTgq}ha z$`A=V^a0qG58`fPIPG+0CLtJFIrL0ze(obhV)B{fy*z0^gh93k-?|q^xuOZh>>YO# z)*eShmzr>o-aV5MvSvK#kCN_G%8Xd`q4d4%@{srtYA!<~m>p~>bj?>9&D;0@fbchIqX+xA_!UVvQWL(dOy3#MeXIiQvmA5VF_ zqW$2nN7=*P&+!&il?3KW6rm&mj9>P6CEYZ$-&Jj|HNAEPjPExgoULHpiC$i3_LoY3 zJ>OqFz45KjS9<}uuLO55T2`=d{TpVilzS!C9OA!VAqJH(BrWFxjeoBw(>Q=6y6ZmjZ3JDkQ>S<>SWBGIjCrFshklO`vtC+Z%ltX z80NFy4UTLr+;{l~K#a;Vdk0E+0;%VI%Drb~Uv6BNv4u|&K{P@1_5#IvLC~k`aOona z5!A&y*6*uk?|*b>k5Rv|M-jMR19UcCH;4>G>tS%X6`-1@`+Hu17BN9#I$=+REhyEJQ8)Bn-B=cwWn#teZ)Ry^2!B?Rp}URCeL)`j1bBnq^5sIE6Z|O=*oi1^){$BLoq_KAN2q6bXH+maM8A=OG=RL4yBRq zRvHOGQo6glyOHkh?iQrGL0Y;ylsb!l?|tsMfQRo}YpyZJct<(}Jmv7ZNjmWV0S(1$ z|0{x&=@Fi>Bf7_WcaD#Cg7{JB@u1z5f4XXh*3=z!+03cw*e82C3<_p=F<_q^cRKLxOnzx3|5InBB|Cdb->(9b zJ#hiMO+1by4tvgF z*}Ugu<)ENFYVg!>y!PS z^os3pd!@OX#61pGps9lgYg_)(IH!2upmR+vgV-#FO7IW({r3KE>W9{sx;X|4 z;#fyB&cRp{_W4V%zv#pojj)~8_>dp3cjfcjOT9+2hk@a}G5Ip&fvqm_o6HQ_`WOfW zbv_p#r%O+5x-Z!TfZ04p^n3!$Ww%~u6Udw8b8>L)U*S}+=1{BM3ETeBcxZE$t`8n}CgE0S=jAi2^pe%aAlY;W;{b7y>>dOf2i6^?yX^(IXQqa`~^$y%Bl(Rmn530_8 zai~3Dr4((o;5)FLx>b?U5H~(+a)#|QrUod+cHJwpEkrcHv6H+qL={ZrC8!yqMO^I} z%kk*^d0^o9qwEdjUltqI9NyXxZ%ZEiFw9jR3F7xrVD9fV~#C<*pBgIh%XpMgjrrcrmPM%>hF;HHI-11#M&4y zCcf^Z@PFty6lXkxB!w7A%=j#ZQXyLEt3}a872w}9(S`-0Pkp`Y3*CbbnsR$%G&?|X ziw&1s4>5)z_x-$SufHdvt;jS6o2W7;Q#rwHo)I0lj+P=_!QwA~2Al{G1`r88h%Sqz z_(T)ftYh2Bt)Wf@C-bX*NDfOD({83H16@ zj=#07L)CX$@@qa84gxMT%L3&*b>-3gnXM)E$5UlNY>BSdM#A*N8#h8&p20olYXwPs zpR*x_mBI7OcLKy{w_XZMZaIT&l4o?@1Hl_k{J}K4+HWf@GCkZ!!v!vcEEXpKzPNb{ z3Jsxutt{+Vea92rGecNJxtOF}n1`%e%67_IEZ)tV;)W{zjujmwHLcc zBjsiGlA3s6^UKoinN$K%YjquBf{#OWG1jp}{>b@Am)Kfbe$QW>p}Zwi#;X`IEsex zgBI_t6i>2OXXt&V=dZ4=q17QMV)(Mz6+|V^b{@@A<<3@E9X>?tHq{MGd9wyU`}*qu zp%~bO{hC4se(+NqjZbe?iMQqUu|ehe_>yV}R1y3WySo$O>DzN!bZZK9Qb4HN* zOVC{IR7ezpbknLH=I!Q944^?qF%X=Zy?#!-JF9%m_-5sp!* z_V0pII2FCq$X$z&D&2lRKt!w?oZB|j*hoy|Y;bee7<=KM8X$8oEhUP5#flg_tW(kW zbiWg2&FxOLJGkheZP?{$^06Iv2jXsxNk=U%3JKp`T-a2`AfQ zBeXf7`)bxlIZUF&+##+h`I50UDMWwOIM8NrJahX5=N_1vVw=7tI9qs73ltp<_bSbq zL-7TfVOCGmxRXN;0&fCo`gb;iRt0r_f;kLb<@Wy znvxSX4xd|o`Xi)3kCXZum}aET9QH(KFou(vC^L-!CCgMd9AcJdLu~i z{adZZ-R!!Wosor6Gpt*uf-X`$gL3l&l#p>=BkZ2;4DLMt!IWvF)+z-(Ie5>`pO6S3LFppm21@|fv1J>gmDT0k^5utJ@TWveOw$&Dzd> z(0Y%acsB_^KrpD(e9PHv1TjgYt?mD^KEL(|B*c)L(D%UnU78xKP7ctw7x#`7b@iIf zJ0uYvJL-02vYL&|0nkROQ(VUcGcNNyB)z4CY>@Pd0>yA}?mx_-iv3J#WE-AD<1e_i zoHLbu#xUuiF2~YmM-xP;Nevw1F5dKOar3hpA_`o56XjxN%^LZj+_kHP9slWcBHQ&L zxDe$0`11~horT^Ag=YKd79Ro+CU8+sk{y#(8x+N6_b#@WyrDbq-6NJNNx9sxN}DJc zG7YNY+o(~VJKgKxcxmhN_z^Ti)usl5ty32zT}t#Gman8GZ5Yt)KQ9 zYAh(d1y9}I*+gRq46JDsOJ(VvgBuPBAq3nwaRgRD)Jt6-?pf;=!_cltG5pf8QDS54 z7MlFHyF&6ibB5}Bh|%3@KWC()kbl}&6hPS|okvdZ>F@Jx=j$d+J@A`AT zYSHdiVZ}NeJ16@*M@dA_$XwZyS>jmCG%;C)VwRtEWh< z!02jtD7S$ucwGN)k0TspxA{e3Zx}kh%&f1C9{e}0UAv^#e0i7>Y)W~3>)JUMH4H#c zk?mtUM2R`u-m*Zqmru#9Stjb?DgXF3$K*AjE#{V%C@Zi^3GXk-B$!cbr-J@&eKZqk zdXXDsc%8-z5QKyiBic!N^onP}hm>NE+#o=5CSog|Eyb|IDQCM|f)9?;*BLs5)&T+? zLTq$fjy@YLL=5fg!xI^y;=YNl0Z%64rpd~`b4Eg3Lj?eH%X2w7j`Ho?{1n58PE$=i z8{A9YpDetd01qW3r}(7-p6Y%;_01&o*tZGoA{Bryd;0Na`=vYpKU!ACFo|8qJ`C8s zU@6b{_$Lh;-`}-W30_&$eWK4B;VQjqfrE*e`@{|WS)7e;34<~UEDs6o-4&(%OKfO; zklVd}sK!NELRNjn?ZL~+UxqvaE;zqE2*Sl3+j2{0N>1Oh^}+U?FVEC%b>HfLRGaJm zag-QvJY#Jj0F1E$9%NdU)`%89=su-lZu2MOAe#srq)qhM9yPEGw159#nvN@YGz5vb zt5&yi+CxDD-TKQu)qOnn0zxJMX*+Ha*1UMlur(^3D)_%D2E$=Oplk6W0hYTbk@0dBrZoj&b4 zWH>^p^j8nL8$U*m-b4TiZptvYicl-(n^XF@E+s{|Bu|a~Ef7BMRrQuwlOTSw;IPd^ z+f=aeX{zNxaK(y{y2s0krzm;(g&rllb{idRGdT^OmyJ1d-Q=m}W^R?uUg)xm?&8%F z!D8N2cAtu3(Z^wbQuhWl(D(uD3mn&D^~fQ~@+jCLx4~SLc8y_CYW|56dp(XE&Cc*H z5wHLl6J!&yLGVyJ*P=sn^=(Z36f-f@tGTmt=%}c2>a&0YCogGbNuIN&7~G&A>Xi>Y z@;2+JIti{0i;@02b|*#|CX7#kp(&50kYIO$x!Z!=_u|tyz+7b_wo3u7pT}$ov90&q z=-JuJeASm5M0TVQDbeVL!ekC`FkKs>v**siHbREF-zKg=@U9V+%ooqe3o{3xlcE;JA|9+1qWb`<0_iA1d5DmfbXcrqdhGCfY8scH6 z5UNc{`6Acqk@$09;V?$sKb*MFw2%LIni;`AU}c<5)zw^#hPQWT=UVA5`GTm|OhatJ z9C`(W@>X1w3++@OChx(0AGoy#j!I6Fq`p0e+NNER)`0(YUUEZ!{q-5)k`bu3P8E!bgW1DbbkMhB!L3MiVJ=EU$Z~U5v-iIKX zj$8t#G{f$(3uKR!6~eqMw_$Ql){aQxNG{$79h+p}yg0XofIUabCQ}p;fE-)&%5w$COq(GD2Hu!#`jH2o}LU1b!Hg_5>{g z=YA(;>C=hUEMC2Z{fz>=>&ktY#H7B0XF08-|3zjgTIZtkc(TloZj=_xXnJQr9PJi) z+!~F+nh+}3*Wdr78)frLgu`dHs}DmZ$3+v}dN~e+J!VlW6VG1};Kxycv;m3zHg2(J zIv@C6n~%qN<%fNVZNAxdP@uA=i8*gScA}%YpF(EJqrIpgt%sg+e_cJA0HnNdLyrkRN2WEiy7(L_-EeI;E}!ihb~DQQ`}pYP(Y z0$RE*^RMr8d>;z1Z}%6mVib_(gtw~=S?|6RY4)A&oDe5V4N{pK&s7?GeF*SJi&Z;m z-6(Z71$OwZeT097jtnMGfwCOmA09W9kBE)%K(~`e5cw9`UqxdqGn%6lJ zf?E4L!B_^8W6B>dQ9|kVNic}BMu1^_=JiaOGqv!bzn0zXw0{;nYw%@Is?{hpV*;X< z@ZC+--gKi6ijCPOTZDp{QSUQeS^Iv3)9tuS@!+4UM@O#Q0xK$%?zhJq{d9a)48gjXgko}PLrbNFn_#1PwhvdfL7x^w|H3H? zG?81lF5k_P`dsai>{3zZ{XPtmuMp%N)DAVk1Kw0i1C><5+k@h*So_zs=|=8EQhS26 z?ICcJhfW?W5bsE+Ex2}XUn53I;_ekmY~SEGLFAff(08r~B?=iA(sSL8k%(DIN$}Tr zdQ?<=-x)gG`;YPS2h`T=SEP-i8fJg5pNAglb5ll0v{vw3vo;?s^ zKBx+)k>AvT$!_CE&$A&l7h&dH_mf)sr+~Y+0W4G(8*QCCq*xA|^x4_jM%};&5}|U6 zz1vCH+`j!jSsiil_DwrTcYShQWoJUKDm0|z>QrCPfpGmq+qd0o0VB3^7i2T-q%|(| zmsI395K~ukoB3aoBREj9zt(4=F)i5k% zL}ojiU#+;@;};IJCJ=)Vw2&c?`@St|-!1FTsdKE^QIMk_Bz9>J1R;AKMI2L7w^Fwt zkwznNm>I*axFv2I*o+Gfx!+N4JIaP6ipx)o8mV0C*f0T6R-|$YV|B~3hi`#Djxbk< z!pR{&f(`nTwSOF(XJE2fSx$ZRal$p3>hF9W3S5>#jT z`?RsSn86X|aV(5#bD-bwgHgX2)d4Tv3h-Q+33Eq)u?|agy?ehsC-!g1hE58;#zTc? z9G1LW$N_1RV^O9Rdx){Qz&g^nfWc@0Tpe)_*U7)UTE9a`W~AR8`j~80utYQrc4{o{ z*CnXAZ+d{+T%Be5H~%eb$4RX*V*O|j4}#OZRpVV5-0kO$%%7p#ey0y!SfxGj$O5_k zUe*Y~VR;nJbqxNcte@Rz#NgGNZX&w=IBPmE^*5PhGzayxO~SNWT@1mn|IPF^1pOLr zNF|k?zrg;QK`Srg1Mz*VDyG~=pYwRx?qCuI#hN@GlhClIlA|2Jp|&td2U1btt5j4v zGkR>HDe+^i1E)54NPQZdHX0&PG;SY?{(g@q3+=bJ*ocRtX0QesDft_XLRTTG{LX6o z6!CTIT3%*|Ej;xM1LQf~D-b#zZ+RC;%>l}a;Uo*=F56E3#+TJyY(vEd#Sr3(f#s=7 zpGYLquHw1?e%xZNrLx&dZF#d4xN&DbJ{kT0!)lSm2)2(bog#5&KTubb8 zPRZeJZ2GX5R8niBA~Tssg!R;DbNV=l?E+==A`y01yI>X&sJElxrGlI%pIH`?GP#Xf3tjMwdUM(*Bmyy&MbPt;Mo1iD z5O5KT_0;{V$6ee(On3Qs9Na?*l?Lb>gDVZFqEwKo`;l5nf5B3ryQArQ8ji0<3D{Dt zfPbAudPL4^if+Rg(1*WgQSAGweKm5QX!49dzu&$d*`8+O?3pLD(a!z;Mx>ss6t|NPY}y* zXbd~aca5JDKEn%?+`y9uf zt#Q}=L-)#{>F?vfqwYB{Kz#s!GSV3e`bH4sVUzrr_@V_*<#-c$-#)nJJnmf(L?MJW z*(9^-I#%NYxSSB77GvDsy7vot9_^<27HA3~p?OZe?Ps^%P65Y<$T@4Tc8J3c(rF4{D%X`IPpfZhn*KFS;s&??z#_V!7LY zTp}YBr>NCI_mO~6HllI=j)WkiIF>DGuzCR`T4@)i?qDBi`)L8(H|#`G2>*UPs6e~N z;4AUt^tcY}D~tY?@V~z?&h&o-X)OvKsXpz^<^jWpg%okwo~SL1q|OTvf$qFbP+4&p z;P)yT-@-aX1rH|8^6yQD-M!$*q(AH;qj?v*>PJX+Uu>y&yAC`|zSuhMVsa?o7vkmQ z#<1s+o5g3pi~Z6aWp-rsZoT{558|HZv#N=lKG@*$Si5*X5Q5t3V=PcOy>J+}$_LE0 zrhz@Z4c*+SJOe#(-yDxST@c_MU|N9>-Zj?w_p7JylB%kr+%|+i99VKtKR`+()yMF9 zr3R59j}j*WXL+{P#{0o2IsJJ~TevNj0W3e1UvD{V7TrVXZF>t!ow_o;Tz+!!u+$lO zh;aR&*eP+=J^s5)ezH8V6Wzj~)c9oDG{@>llR_Z?lJPR_DYyAzcXrh5E`;sh5@V@= zdE7s?_hLZ&sBYh)??$p1jY3ah}$E_~D4z1T8%W$0-q>})=fY~vTO#LLCbGxl9= zeUh>(f8j*D0!Sd*k=hzn^1Dt=%tgxfa1?uC$(Ni2MKLKen8NRG+v3Ok+{+Dac~5xv z&IpsW)z@WtuO8$8H!lkE;6di`fB8{D!INKETSL-xwYnk1!um~Ff0GiJ2FV2mAcUUl zS)F!)Rp7HVzT?TzBSnFX9b5@7kw~+TwV6>PSY~fn&X|sXzb}V0PdA~^Lq!)y14UKB9`etinB_@#e6qwO zvB!H!Cw!`$_dd!G)`oa(?|>)4<-S&cuB**oywO(5p!=)7oIftg%c^rU0cwh$B?A!TZBN-|5+ zM){1a09ZgDxXOAtb~Ph~7>^?=v}GcO3Zp3f*~qX6?+#1wJN>Ch76E8YtVwcMUaSFi zmmd`0-#yY3{0_{UUWDOun51fVdN~mk1Rulx$k9rCzAcjFSzg-mE990hPV{;C3p=hA zg^thT;U4NllhKrqD`vyIZcKZ*?ls~HR3WNHt|V`gr9h_vQ6A4ArMNJs1YkZ5KiP<~ z64iX}{WLc?G0xdgUnsh0tNCY|GZQ$})iQ)O=nvc4dsw4W0|yBK0X=Dl+^`J`-wJRC z;y)5mmjs~LT)ib>nKX$w#TC2wvdr<~YWALYIRwV*5%AeQcuW`y^ec-~u#W22W1seX z`ZwdWiOw2(t#;hwy9vqnDcA!<$|jN=m#{qjb9ZtvfSIB-+pU|oRePaRmw@ekSUbrU z&$Jo)c}!t8!FzXBmmSFHKKffAS8C>1RayN(PJNgwu z2ZGQ_D)2^6?)wr?T#NyA)xy%x*~H=R6O8Y>q!~kE1;mD+Fi2D1 z#IuQs&vjGiY*pH)N6Gw~J0^R9a^lmQaOYwXWmcEG=Dt(Zx?-_0_TL z>W1!cy*`v*4xCxyeH;I`0I)UUjS=R6Ir=B!nAQ{Kahb8vU@8Io3|V>qV#|KLA+gMQ z=lOX2B@Ig?c#!O%^sYi<{$c(IbPrW>K z5__)qP02<^M&b0!8U8NtRJ*F+FwuZ5OAG84hYhCywhx3wF`= zU9|(Msl)feay^90t4Eb02mWdyVg4YwwUAMD7O`!Ci_zhdeq?l z2g_2wadR#rP3xLkq7@q;-sij#uKf8pof-v-(iTDJU)$@6KRSTlO#q^U`e|_d zjnR;sFr#p_L^lCp28uIAf{HU-+dY6gokEYYt>v2%?tFjS@(3`B$Ocb(YQQrC;NYC~ zw}`w^;5pF$`W*QE#r;k}St+HaZ{&4z+|c_6hiVxJ^<`*+{h4)_vZy`!Zrpas3W z5#`#OzE})n3kAt-U}cXSHwiw}l^2ec`Z80OP2@MdCRv4lO@!2x97l)N9>SlI!qx*f z{)QtekC9l)9?3VOgRdO*1B`+BYUA#cK!76nSj0f&V0kDs0ri!P3tM1X=WMtV~3zz zcb{#fP&opwNPWr$9z4m?D+>AAfc^npQ}f3H2TNLh-I!vgkHwpb$7C!J77i ze<|wP5S+}A3C(-_&mEd?+4iyR+N$)(>lkk~Sw9YtfcApw89QJP=G0m*G+4Ot+zMY8 zWXnkzQg7hYT+0Q!4FK|-!jk#GZIO50X={bL(+jr{WV}h!o=iBa{d?f_BjmSYGh(Oc za{oI>6$sK}4r-UA4WQBpGCY3nlVWR}?ZYQmB`@dbeF0|54P54m zd@JUPVj6*>H*h|%TIH5R2L!2ZFT`H>JuRSGN30+Dnh$n087x-*XTu7@5ht7|5d5@d z2QVt=x2sJlySuxo%MV!{4AU)`jP~7#0XDIZd9VMx{^q7ehySb)iVT09 zg%jmVL{^3Yp=#hnTuX1P`~FuuIzd{p=^-Js8KehDpn>4nbhz6&a!MA~NinwkfA>i1 zDA$kCY2pjtBcP215>#^U=Q`hsgPUJ^52DTYfJrX?3mevr*4jiZ*cXGx!yVX=Lv-(m z!Nbz-_hnzcBVIQ}HIDeX%FMVm;eJQe87e&mHqIB#QfC|6=EA|D(ie$WPHK)T701Znc&A2Q*)5w6}vaGqvM^0=LfDXL`(L=fW_MdMS z9#sdanhUHuv%d>DS-KQs00n!gKcLfBf*lWtjmCIO`FNkzuekJVfzANG>_TH9uDSuB z{vExle>L(AF$U1E{$7ykqLSFy<8C&vef>#O! zN?YRnrvVPZj(zLqH}H;M*r|;%0m#1nqWJ?)UPp^LDBB@JM`l>n2bs>m2LBtPJm3zz zw$DFEQJ-bz6L+~GIcbfSO_j<}EYXc4cjovGx?o0>iM*D~uc8@tK~0rxMc$X%!+*j3 z&(sCya|J0&OHrAdgTJP~sP#@tzpNN_eqBO+G`)G71ztVi#vec?9w3G0M%2n`iLWa( z3~-zP!g4;J-3vpDMm#rjhEWb#x~OxC7FXaES^9*al;sa2jNux@60;{>-~{VafPZH< z%sRo{j%{bC>w;g&&c+L$T?ul)#dsggNplSiJc1l+Hd*Z6)VPbS0>u>AFp7sHBt||Z zFlA69Z{q%n{W5#o@SQqy?_CwWhHM9slLQg90D8m0P;#iIYS040RZIm`@ONtakKZ7}6B&3y_Er z&php^p=bkd3qxwbGt!T^of;)6%`Z;#;q`z0XFK<`xMmU5S!I^Ns^Hoy%1}W?Nn6c$ z{nxK;8jjiApll_Vw_Z@E`@wmbGedv13M;__+QcE-*b2i7`9GiRd3fB(fw^8bdi-TlkNrMF z+Qkx>)W5=?OxFyh03}PUc31$X5@twL3sD&|6IH=aBvi`U5;M>S+=%*Y%hn$K!e%jY z%$R$*E5lv;jD%*SG$v=KBY3S&u-a2Me^sCrv_DvReAtAvA@)ILCk+&Ptje?IvfV8_yjL=$C$kTHBkPrZj#|ufrU`BiV3-F zh0jy5`>w!&Rt$-6vv>5x1&F9Uq%*y}Ev#{a+rh6Zbm z6ZvrTnksZa^YVi$!~Q;AvVr8l{3%OUlPu}ZHyK1|-4a1KyGKk>fuQZ`ZETJJHfFvb zG0Uz4cOckP_A$QR;_@el$y&)l%kTNO)!wpcpz~?TBgzDq&jv`UKqT#Yg+Y1*sk4NU zbyXWNbLHT{>=(+Xd=t~slr#2x*uSo?7R|;>ZR=M;as$9Ml9nuJGr!VYp-?rcg4pg} z>aBdoqTb}2{6>IG2qFOXL5Bs3&e~1_zldA1r1JrG7VZr7S%6!(-0Nt3soVKUPL)RBo_KMoxs5jQE6Z07fc*exxxV;} zHz&ovcS~L$>Hj~Dv%kH&)<3Yd$Iu$U>xOxRY<%LA2P3bki2av6T;64byNEwc1iUz> z?St#xgmn@n2%7T1Jg~pG-!CIcGSalv;InG8?N?!D34wNh->%^nYq1x`M^_$9q< zWrS+2J6k`Rk8s1kUgjuO|9tCQL0fHagPyS5911 z&U=g`az8^Xk#u4o%YWk#PquV8u+JKG(yp&dbgteUdin8ZEUz*$=YXe*({cQL)g2}bMZUVKtB#zZpbfH67+TI2 zK92+d@e+0>p&T|qw8UXkfNI7`?OSDpbW{LIc=S#q86$uEbH+_{P3Hf`nwip=LR5G$KzT>`y6*1Le@bsL zPd&vYn$Kbg#&b)QAt4XnU+W<&a@QH_ z-PXsLuzGxb-O+8hBy+i_8O5WuISmqSSr&Arz6-=i3>3Xj4T34~1R3aTatAkKGq=WO zD~N_be2p^M9z_hMI1YUW^#8Vj`p*Dh1Bv=-g#jc@kaK{S*tgbA1{Xa)1-1OqT z!DQJZXxn;e%1B45m0EHuNrm1BwHnz0l=C2A#e7VJgQ7Qtzzj76!^YO^gcirf6QLC* z1T}w189o74OEmyyl=DSTSM!V31H#M`?o<&Nsy_Iap{|ZeY+eF{wk~tOPlawm*ju8< z%w52FWhf!IjI!b~j19kB`eAss41OfrfZg@Tbq(=~uqovCpH{L~8&5m4#tLKdit2$Y z!wzD$vNvnhFHYFon5_lXM%B(HVV4k;?JRA%>-5cs8zD8%;!LxP+65oFzc+BPuqwvfeBB&+@M3G*K#$*7*u*R zhWv|XGqW)kr=~=9=5-PrAg^X+X$nVC>n4HJ1corwHR@I^j~rT7k$#A_jS**$p+mOY z&a%R&8gPPsS;*x#B0n!@;&v-Ff7o2ILg3M)B#cP&?Df8=Ti)H@iE$BbsNTw_?zU>nT)zE-~n$b9_MH&E|)hE4hRFqyj>dvsA9gkC2_fla= zC2cY^6?!p2gO7aSe2~k* zRWY-}un+lUeNB}A{L{8-PyO4tOO9i9V0c0~SOiz_6Bif11YJYFqOd-5Z&aUi-KVCg znYx$}@P*$}vP-#>*ph2KKf#DjIz8ByKwY)${l_5A{JSCZ zK5|xsA5s+LdPOcL+YNF&v6e1Cnuw!$c)&=*RJ;A@E)cw;H<>w7lzqylq*g~{-U`TCl$he_so7s6%XW?(v_BUkZ~f!xcvou> zcb!RF_13o!Q&b*)wE}290f?YC9Z_s=I#P^!8}`F zHvaGe49M*P0X;_O!<7&eWZ1+(>r=kwNf5-gsBmjlYBrl^TI3f{6aiX9n`Fi=_BvE; zx(m#1AI4!}I)-27t#_UE__ylNY3QRsSInp12P!yjYd z@IB~sblLm8w6>tQYSKA8b_fJDDdIO-L_dIM1~`$K4DEaMRX#xLwAfIno=ZTFzFUnC zZI25qCe>ePmv-$t?%z?j!3EN+amCd+uFrmN{oVw^W;QB>UV^_G1T$n~cRdK>3HhG> zRav>K%6A%Q`m?)bR~KC1qPrd`13c!yl`>3!0QENpX7f{v-84~;-ZQfc?miY6@#JCR z+n^B*Ya#K#`)-jt2Hs8Rg}@UYm~H;KYF>bHGy@Fvq1!!vRq2!pF9L^L&Nq&DO)J_a z=MFA-UOgiK9tzNH9~+}1!^at5PC|irb#&4?3g1%>N*k(4MIBNUe~(LhOk!mv2eqo| zZNNWgf@SJs`|bV{;XBlymz_sHpXjuO3Ay>pDy-fzwjKhn!}u8oTJefE?;C{MpXX@E zu+JChsE64mVh~P8e;wN8)^pB5Z;5P{T{coUvk-wU=+`jJwg>TDpDVueDwx74bqxfb z7?PsB2Czq{T98$YIYdV-Mx8SpB1nGoIjNKzU8~TdO>^}ETsb(11(;vFUj({dyA+E2 zz$_t+O9TT~tC>N#gQUA+A@b7BZGfI?f*{8`Xi*qCaR983#?BB64Us)J4kvFm`o!Sz z@~wo=LU#haeMJC~2}#~k-+Ja4n@Fg_i$6YnN(=p)0y+?g{@OXu){cgck$G ze8Fd1T^F8?;yr-xBxdt5M#87MK%!&K_1{o6O^d()GhI2)en&Fd3q&v|R6`*VySyYw zeh~v31m`%QCve7q0xSsrh4k-DnZUSU^s+@<1_b=~Xl@m}M1{pKiRlWzKEWanjTT3| zCGyV&=nn9Hu<>A9^6sTXb~2b!_2LX+RfY+Y;R|B<+76=tiJJ^V++Bb7S;>bBp=Q3L}J$taE#a9R9;iRn}PjC>yreiN(kJ0N+r{tGZZ-e9U| zaOb1U`I|3(>Sl*k#4Zh6+C9UG&s>)aKowcNH;Ki+=`zomYhCctw7Gd0)A#;hq_zH& z@B^)n?bxlL>^px1sEeQxYJ~8H>cS{bOx5R8%g@-&Mj_-u40PwvCr&`vAl(JB3nM5{b}D2$EFLq?W2Ot{v7Rf}cI6Rh_`-eGp5)7mncm(98iNN039 ztgCfJ*vQjQ>e?b-`U%|}GboKx_3TMT*!~U*y4bI^MSONHypdaOY;>+Z%B{rwGMPk_@OKw5vj;c~7an7FA#g0WAz?w`JEbGDT<6@(K8IjvQ=EW6q{ zqYC+tiKApegfwQ+AnamjkDPAcWu=3JEF>k!&qodnmL^5Rh{rsk1%Y|OqduJU&@U*l zaz-|B?$dnZSoFj}s^M;O_sr)*xQ<+WIrTWp`Ad>@BL6OGcm%)uE55w? zE+mow?h%zk53OaDdQj{aMJW;KaFZb^$#od5{D}}@C@~DYlALZq;vU~AxqHe%1=_?Z z>R{28iwat-hI(%odNAPgWhvzD7uwFwULTPYRvQ|mc}kMHVrw)Kj2Vl7)4IF+jmO%_&JSn zs`IhrV5xt+W-=dexJ0TE_#}pcTo7k%2U+0I?1($ebmi3v@iWF5&zjIGmH-Tx@zE;+ zdnZOTS$2B1%2?Z7`5$#%yjG(U&}i-o71uj;7pNrQJ;l^X&q&ZVy9G!H74Q-e+5O$j zj^5s4c)4aw+3x7knZ2>ua6q3D{yzeP=C9_pFwdwqM^8|@1C~#wMYbT4A_+X;>q0#- z3QDV+_`d{g1i;c~3$5(~4&5>!8h^7N^@irh4QP8CjHe*%4L+}QT4P*isxr6h^-o(5xCQJIm!*HRzui>DcUkvp!3`bI>2U z*?8b5#oBNinLYV|;=#}!&la9a-Q_o@t@8~ZmpFP$Ert7+#T=!y?x5Bmv#2su0ZnIm zWl+I#d+4sk;0TwcLfPZ*e6QUIWXjK8oNX}3CAF@Ysq-2j_w3Qmf76 z7>&1np^oC7g+j<(gfYF7x5xD*q*vaAxUJeuSbaSif%1(RT+GE_$1zBoD6dIv7X;ls zN1>yxAvpSGDd6{yi%;PZ<>ij~0c!LWAdM2?+?O>V9A|rnRO=P$o-^vc^&!fBhr6&c zDZoR;^O?AG=*p0vGBQGS8fx<2DuKfrdv=f7bff&yw^=(6nqF(>SD=~WMpAQP#bx)7 zwW>z8nNZkGNz|MKj5$@j$6=L1!P(yoqWEGL!o(zV+M2oFwZg+%p(epJkv&+O!3T>= zvc^4e7I-$wLn3f@rB3!v3LuNoifIe(fJ0hZo43uSG0&NtqwK2Ic&PD;ubEj$l$>G` z!Vv0Dchn=0DVq?~mLno$XCgq>pO#Q4APbDMzP3+v;ATuM>`u3r9-4lwRVLT>k|!r& zh0V3v$NN|LbLwFG@$}*OM>l`={6ONBbSR5IFB&v|kUR1}X%(W^^-ZIxn~rTrMl{TJZGAq@rv!K%m3I_`Wn{-@@(bI~(~B3cp>_6{5E@CWhISL2mb&|pLh$$qZdbwq zIWL;f=~JK9+^KpG)ESg%Jk_KZ7O%Edi+^{h4IUs&%Qy~xV1P_vZ(am0((PgiL*C}K zVb7?C@xRLt1v^Piae_m|u4FSVzt2tUpm z*2`{b4;1Kz#GKd+iL&? zxV>8f#ggY_mm+>-6jja6Vh$+UpPsU>051&9u2E|vb_P{Ige>Mx9&xi<0q+``Si+YC z7M|e})5rea%1Kuf)7?N5kn+&#&aEC`i9g@V^jvABD!}8>jF@-8%;|Ja+~829y&N~j z@o(GxF)N-3KmNU|{o54GEqAg1%`ME7^-ib~)Cq^{(J|Z`j}s@@z?7*jK`k-#lQb>m zF9KZ>l0j((*+3iPWkkjse@ubumt9b)_@fL;+=y3DLI?Esh?3!c0AX_w9#&*z;pK%d zc$>0TxToNwn3W=*Fd8@k;u*?S#%p(FGK~ADL>P?4*2jcbF6!Rfj4iV`{zp(-M_}3I zGvD2PFRK}rSx{fQpdnP&K6KiC@CEM1&sNLtC;FOxdZ#KUUf}(e*Avlq+9YDT-0_)W7tW3+3+hgu>9k{4t99Xn zK4u=R09>5Q8TjiUaxX?edlI(q4`5s8!1yx7e*93VxR6O0+NdqBRLX)klWhR1cmb{& zph*bc5=C$`vjU2=BIx$|6~{hdu5eI0MJjwdJM-gV6;MlovVRCV$~iL6n|E>3lGT@a zNguCbGG}K5!-Deuh7IsfV(p_lj0{5)gN`ICRw*H8TVTc07fCq}FLdm*d5JU$UuItQ z#?-Js=V&p8f@6mm!I&7w&$a-es7?ZPve2<(>J|{?+xE*W(=Kp<7=IAB5>7dC_~N9q ztK;<*qc2P6W?GQ_hP?(>1*%7Z^dBw+l>Bo!Ix2ESZ@8{WNx-Hk1pbVgDd?3T?kqQ! zH-KV8jxe9DVOSg*h3%yb`$3=Q&zqvfe>kAYX7$Ql$u>GZ!%tUKnnQIHdN={vQe9o7 zh4LVXf zrRV3-X%mfN^hCJ8yME(47*Ckg>>mNL4CF_Ek~rJ?^thCkTiEzqwb>dTI&=W|kP`~N z{Vfo*lCh|E0O8*zy!V5-^ZgV%9oysBh$wjOoVLZf4m3Sl-ts9v&4=tU^NMIG>>zeW5byN8NE%bToNGKCm-U!i6by z#tFCEK@wf>0V!(JaXXR(DmZfVqkFd!kOjb#HttR90nFRy>6tJ$g>N?mPzl*4*PD(U zO5c0Xqx5=OzvzL*9oSGjhH7eAka_<l9m>b1}W)oq#G$g zkPeY93F(v&X{2)o>F$pA`~1#();j+H%W>|x?ko2G?2*UMEBiu$MBe_~>7Die2`}UM z1SE7cR=t4s63}#?7tWv{zD7mIVV98raKLv@kv}PgX7Z6zUZFnDs0h0WF0sX;9(Z4^ zZG65rmLlZp4WUbsKJAcs_e(LR;5uB+sUcss`JF>TrK0MeV*#(1GF}rA*Iy#DC0fGI zyK@|Xhi%HQ79O?))@J~beAKMyWS>vp@c(xzdkEPkm#t7Ry4p+oH+|qB4WOgzxcsc} zV~Pk~5&tIswLD>Cn!bzQ6rCVfXIX(osyG7Uw+6knAGoGUuBcHy1gOBBS9A$f&-2IF z-eGTp_rc!DXH`Umy(!Sg!!04+&s8ba+Sm z9{oK!FoGvPg{7-OZ`lenS`$Zq^#ZVPt?s)>z?FOE{_adt|M$3%68|4DA^-phbvkvUqGfvCq zY*(ZJfR;thpPIYnaBDJKG25S+{y7ROBp_=~#53}i*d?gEbqJcbMV?!#-aI58sj=P5 zv2>D4D+dR+cu-N6#{9kk!ro5W=3at*!tKkw0UqrN!e|B&ZC1=`tRMzj+zv|s`_D?+ z3*8GTz&Y%Kf2y2Q*R=HNS0e0vfork30D@RD0J`NqDk37ddqW3j`Laq%zL^8?2l>6>V@)UNgwAv7)fzvZ!%Q8sU+g zENkSIUF$k-y?{OqxXOuYkBjF-hkm|kyn36749fwN72 zkAwv>w23z|_F`TvcA4;_G4M`C~(9HsnpCuf>kfbfk zZ1H8B620K8Xn!tL7($VM<{W7U77?2@tR4`u-n2j|UYHS)(0R&Yvcx#PzOoTIk$UMD zeplZzp+_D+rORs*mR9zIYsZ=d|^Ae|j70|V5 zoi<0st1BC)oFs{JbmU2KxT_d)EOeTDhh5ZAjyMh|3$XDmTdGF@m(TN;2TEnOcNs;9 zBGCFJ&Jz|A=RHEIF$rOQ!#Rl;UqLjib1D2EXwi-DXd7Q!VIEcwcDyP;mM(4#@0V20 zF}720I+$}nR{OGPUw-=%9<+M#a{SeP7)pN2T~tXZfdP$ADFuE|a`(4>wkqlXQk@`BKj{C`U5tyG^-~nq0U6qpTeT#s3fmqTA*F%1n7|<*ossIjSHp=m z^8D=|6HB>#IA}a8dH6%Zhn9t|!1BY}8*0Txd@$Nj3sFb^Z?vJ=)1~x#eYE-hh&)}5 zFcjVpT5wb5!T;;P+%`asq$8W!Ht>0r681!n@cQ@*jg!keK+6Vrw_HttNd9;5`i<=1 zSHssifB50EUvRuCdQ*(~Xog*c{5T)PHq2HISYCn1N;>D!a#D<3xK>lIsCnD3LH8fb z{(+_yA#&>JsdQ-`3=XR_cnO#$1C9$B9T6r z7Xa20%47aNb8E8$Ns8X=9e-uQ^IvU{oaqkd3^a8#QC$b{zu$3cyBoQWm`W!uxAc3( zHIQXT`=pt($~z{Zw@vKzzJMLDPG^87%X^oq9y57ODUHTF7(=M7Sk=Ts9zyPr8`4|8 z17Yh%w3N~H*uxV(4;JpmGI?2&S8i_#Cl7?qMOdX$%F>A;+O*j(T8Lc?11<+;g-Y?2 z;Ue<|!(Hw;I(nFI(D!g0mw~QxrtK9+TT1S2WO~S0M9EJo|0KkQ*H-hNv~2sbc5;G1 zvF@3KI)Rq{38bC^I!i0EO@jyK#IuO0Y_HI}w+n$QyQ7(iV{j08h(7PWlPsW^KPofP z6%kQb=>w%LIilAg;8IRXDt8ccm#LbQv@pXUrjFVKExM_^0w6R$8_;(BYoDM zfJZX{BgcWW495J8kRCo5V&))`?$uwBs<-?rw@^S#`*xgz!gH3fE6 z%)~X>owVJJw2PU*cGaA^P8)44cG(z+vqS&jlwf3ha9d|`TORysE9FSmsEiGdvWOD- zv${u8-DP51)pPxl-Iy*hoxp`DzVYf4q}_3qr4(vm+>~2YCaSmW-{vppsCL`B=$f7XG<+!;} zG?S@>%bXL*Tg&}8GJGZa2-Ge=Dt!ggoK8|f1aU6cIK6^X=OUo)eA**Nz zPc5(5LJz7?9rV?d*x>IQHP1PBmSx(-AVkX)7HQDRGaylgg~N??Uzb5ZSo)^!l_8Q2 z`ZXnwp3zi>b~iG5l~5EEbM`oa?DEEbV+s5Gzc;w_y-`?g-P>B=~Q!|?>+gx0Pd z$|@?UWxZmeBe#`qXI2sGPM5y--frw86*z{$oWR%(Y%sFV&NBZROQUm+xCo3mY_5#2*+i*V z3*ku^KTb%&O9P=h&rH<^#UbQi%hw>sRGdp7Xbk4zA%73LI7$*<7rS;m4oswZ29b2k z<|2Dj+>BKLn#DF=0qzw2S?@dcK zZe*G?&)Xq}$+a}gOO?A=Zk2)){CP(I1IJC9ptTh6m8kXNj#q|wK3Q?m6^X~;!j?dH2o39IhXI`iUlN1iWJ=CKPWB`82Z{`S-sJ)w4pT(~z$tgnoh$;3? zavYj%yyPUwy?6KWe7;P&_E)^!%!C_J zJ`0qJm8qg~BvgZ^`*UiSX zQevay?M&_tkJZx5eU6&Z#}~;OB4?fsJ?7f>+xdgqA$0}EZl2{~|J@IgJ)0Iavp)U) z>Gq$sl*}O>!Su^m0Fb&G^X7 zHa)~&5SQwxci?U4E@l>X#AYoav!`aVYWazl%X9zsBCM&N8tH8@(IqDDU&vqH@Zu8U zD?qdWsxKVbm#=ROjNLS^AgZ~-b%@CCgY~$S`**7S*w53{eT}@B{Z;#a-*~9WAaq`2|TC~6h+{8}=Z@mw=P(0-oqCPy4 zl#&C#aRC3nbc@r9uk{$E@Lr`nJxiL4AxruoOxdTu!{MeJ>}$DehFP2MZo;wwHUt;N zfq~7^6ZJj)F<9VU0IE=6_fj$72-_QjSatYXP`J1dwg{Au+xP&khT|mluis1eY42N! z^gJ@}6k%wVHwzQ{3Q*C__PrYzNAO&m8a&0{SoSbe{++=NuCdUnbKgaDK3Wye9GuPZ+I$S}~ox+D9E-g3S z3CH-49fXufg}?HlH?B~_(r7vGSf}Fcv~nS8UPuB$6rql7(+~(TWnu}b3>J}@EtN7N z9dQ3>gC)p~(^Y}!0`M_^K#&-;fGU=um}!LJ6`2&Jyfg&HRf$^#6MSS zbW2}?!70$5En)z3=K(~$ldf}5aO!wkE{_revo8&6S>>^)@g)zxc#7tP%P_xF$<;Tj z@^BUo-Jgc8-4=&2`B<&oU7x>u(xglk4@YzLlz!YW`RSj7zcqL6^!}J-=eXPE`D)H_~#|;E;Y0 z$;(?R&^p+5hp(jH1_S@!*F>Ndvtz98KY7sAUQLL5_$bJ$In#Z!1<-D~3H;vi;_9{? zP+iQJsB-1YSM1-01+t19Cq80r8~j+K1c(#EV(TuI>r=|>n~}oennSOt9@wc~84*(& zr(n*RQIVyJM^gE(KVdk4)w5Dc&8(G)Kl(6+C4w6C3~&{*W_J5K4yaN?l6ObyB)|?4>~ku{nAjzxiwWmGFb9ov7cJbP>IMckhV7&a zVovhdY;WB~G6DJ(^&sD8)lL#0U|D4s&Ztc`icYsDG9t>IHFzt^@^jXK=T%Gp#1EJ2 zO+XDvQ#a`$T}6;rv*z;%_k8EYidP)SJ1kyT4GhOtw6`;eJ}Xn&Xp+>4>67>pZ)6o% z(khdzW@F2Z2;M>TMonY5d81b0vd~l=TDA>c2UwlwtR#eb0Ow~XDPG3bMrlMi#Yo7+|2h!Wbq8BPfA(0LHHV&s4r_#(!%HyS$>F?4LC zpNG$##5fX1=~NV6B6UN0OsKl(_7|)?Q=~KCNcw{0OgPPbP}Jgi(5!f9F-%W}pA7X+ zv^6-rI_P&a^dE7>uIp@eSJ}ua8sR8U_d$vO*Od1bj-!tCZb65~<*@lctv-s8h8NRp z3?io?6gWsOJ@bynz?I4MGzJM8=4+^>|1F5>Htf#-4Iz`Pzj+6MW=ARe6@7wh8W;-b)` zB41fZ$aPg4jUkpkk`-S*QBo$ud6D20OoQAEZ+2>DhKGwHgvjW> zVUkd0_`~>vCt+7dxmCFMUo=dJbIVgS#doO|0*&NZ-52qbRy*)u-3%@v|A``8nsh)f zZGv$blwr6wrEq_^|KIS7OyrpGWNSAN2)fKNYy)gckN;Rsjf%F)BtlXU5abeuc-P0* z%e|YX%Yd3TKQhLKqjGx4?1_6|O!*ql1{52_sNUM5G$&0(5X<|s%3qATX6eZG@&`m1 ziW8^K6g&^&WTM`?C06=pt?185{E>eH7W3J8a|q2pjd62f@)e_<$kSFP5L-sgwYeW` z(Teu=hj`VR-O(o?jD6E!D=1;0fat;;q{EGf;G{-MTGV1Ryq)WW`vaCb@XA;;QVd^T z3X>$*QKNhB5Hv-%hA&rdRdeeKV8^S;*)))g5CM(|bE3_JW->#0ImUF)D^!~SV39d~2`nhRpIt5Qs(2Nv2jIb59GesOm3e+R5S zsF9yOuNq2h`g5EQ!HBTjAvwZD%@fYD z#fbXJuRh{$;avvk|C<_eRYQ;F8WVy~K`KPGjj78b&+#Wus>@THEY&B_(}{A1G!ls8 z$PS%occ%k6hxsT?g?y68Jri8m7_2dgZ34vw1ZxAuOjW;Um_uz8#hW!rytL_ZtDM9_ zLOD%y1NV01|DsSRTGA0m3Opwo#ze1ZNLu^3DBtww{YO6{+OQ+<}vLZiy|4|kfH z_GdM)Rp-WxuxH$fd8PC0{N}BzRkW-5*s`*P z%(Ud+7gzUBM8Vj>VVxGV0b(2_71bY8ImQ)0$|ZXhc>_+B{13j^PdpL)HpQGFc{k`^ zyWNDRVK-q$W^z(S?!NyfN~4E7E>y*09QzReOP!3rFy9dIlZ0qQB4}o|OT?grblrB^ zzA7VsWlsvU%op*F0Z>!(bt8`fR-8}66J@`}@_AS~UxIA!)K57b{hU=R79gw*^ydua zMa(k_rJ7;Xu&(s>*j<4CyuO|3Tw}#Rbm&RotHs$thHZtGXPh>HU8rzdj|| z8ms!hj#HMHR}JY@#shDdoc;?Vr$5g%MXo7I_jF;v{S0J)ia5CV&GWVuVyfJVzH1== zc)>p+-UJsP`3a8Bb+t-}*8Ay>qo^l&7r-yq1XY3DBm`|jnM7Qfs>=yC6>qWIB#~Q8 z-fJwwH|?PL1l~Au&D(gLx;aN~9s`*yD*y`j1dgy2i{&l;pV-k4`hl4Q9Cg|gs<>Ww zf`qm2Han13K3qa%--^tr^YS}@Wj#vv)bO2n&q6kC>cQz1U_zcen`XE$euN?w%E4w& z>XBFqB+A;l%)VhB93=#T<-?yo&*oqQ$S?}Yy;Tj?vLm>lvZ?(5Y~rVy9Z$O)$ zVfMg{MrtQYkQXPB%UC52aUnyfeL_Qavsx9DUQqN zzF`2h2Dy}R(*hs~0z}^H7I=H$%F113Ca-Wg^z%8QK6Z101l%56zt;}vj><20TK04z zqlPdOOUHbUJF{dc80rR&(T>c`zg_eZD;Lv!?qFQe3yP zMjD~!3Jts20?{J~v(2@~mnz*VHu<&rn|F_jb+P--?q$;-WnX!nX zXO#xRy5(H0t%ow)0Ai-p#m|-VPmdu;&QjTr61ih4?(?|3+4z*-FbCMI-Bp$B#o;#H z^L8q6+((Fe#iiG}SFcapJk$IC2#i#par#o4&ZjP%KD1C z;!5<s-ghb4ABtp2d zcTzX`JwZ8nDc{$mSX)P_H?^my8aYv8?W=9ctgmN5d|ecirchUrphOc!LY}Gk#4S z(Ie3&?Gm2ol;h_Zs2v`RFO?B5hV~c`-+}OML?uUszOaJe{HxVdFyl(=Q}e8|-(+Y{ znl6dZQ7I_c9q0JuPT3t8HALy>$HIcY7;0I_T+^07KF9$BRP;zTYchsd(4vL=hSte& zQC-30ZHCA0n-5Qbpz>N~2o@&|XozF)t?d8TUPo5biz~IB-a`siJzymO%vSLqt_A$S zUJXk1=A+E9Rgx)|q`vGDmD}i|ZeTIF=RdBaB)Q$c`0Zqtsy(jQqnqsO%i~V+{ z_wL_5;xyEP++gjbG`q;)A08&%|{Y>VJAP9ALK9%e)oz%;ZLm zxj%AHF8ciq>4nvmXb9X!dQ%8yz#tc&IPcOjH<*Bz+_qp{-tQjU(=~Fe_Qw7PwCF4d zm3dK$jaeN_OBGgEW4A$^9}NfhPp;7{lCAjFr{>erZM5-;G`WQK(MrfYz4T;$iuiaC{Y{0`?8zG zg`AI?)Nn>jtfn8mRrCAV0BtvYn>s35HoDXXk#W$hi1ToZhrY2E_6jq@clojerOZ&1 z1A{t)el(7&a})dKrP+EDCt9*9<1o{umv#)JFv(31CC@?C^d@j}|MruPa^vUGTNd}? zi-7%3=dd`KGwI#?HPx+8ciC!Jidvb_au+OVTk1*ad}@qP#O1$-aw`B&_f|XUtRU>` zM`2*D0h59hT%TS&%=iY0E^aTsoppWeAQPvkx)ZH7Vo73?RS%g(8)i(&;4Bqg2u|q= zmc|aniV!0FyAV@!dz1nND73fk>E5*2UALtOJ66%T?Xif04`mq8@uB12ALFZUJnC-|;N_m;GOKf00$nBFV4a z?I0cxkR_!#yBWNU|7Z}3%EZ6$84y_^)HqLX_d2EI?cy&`2Ak&n4Eis-A#kOK;4}^1 zA2;Y)(gDef2)5Q<*z1sNS&i9!Qr&uB`4kFiZcpa0Sho3QUf8Z%G?L7$GD9)MIIsK@ zsKfc+AR?G<;v~9N2ulbydSDA7pLu-{H<0n-S;%KjuV||jKI)R*p0WOCxr+w-&70nn z4Zt#qrEF#74`G%({9W6XsuD@)iZa7`W==5Owp`z#Zww3tWHoS9W6?}}l4)=fmyR2l zf;+Kb!T0kk`mnh@ws3>IsBgu~<7!hm>C0fQC1-WT%elvCyq@eTaJ3JP%1BcTJkKB(W5${ zA@N~NCcg)~g6yW4F;*x1tITO;Y4dMoo`kIt9(X543&blCYO-?$h-4$rPa&w)9VVPs zgUGAGbL%8!RgQ)B=Ygg#$g+TE%6xqDlTK!@eW`{-yFW-M1k+ra^cQCyQSzmsq7trO z3R4%DEmYrXt-A$(PR_R|f^(d3+UQA+zm>*;!QlpoT7siLh&k_~hbMIwe+lV9tSkU~ z>y*Uh;j5sf>Hl5=1-E9s*MMjSyxE|30vTbkQ$Gky{~)9+8?jKX{EeHI0&@pAow%Ey zgRWNZI?5}2sh>nw^E&gkZR4VZ`iNrtR*2TI32QK3t1YkOpt@co;T#c*G4vrviyeX0%*q@*~nxrICjF<1#H7r_jLrOpA_~_HD++q}L?Q z7&k1Y)7w(~RHN3W1Yw1H;Q(AvN4u4tkAyoOl0Y=f9W6DNb=bc`wlkwMcv3NS8i zsi1tF@ma6JWX)_upiLtgDJhc4)c;gazAG z*BDL3-5>vDU1G&|jFtPFUHy8g*4E?ibX)wdq`|(V2B-a@o>?V$PMcTuTg|Z~xsAK5 z>$7|c zbePCzK6K;nl)=AvN8fK8)YrC@o09Jt{vjAQLA^)#NMVB6 zg}<>9`i^CP3h6ogIw~J^67PM{?2}s5Hyhekk|v23x1bFizM+kZU3+nQBXx$hwK2QH zUr~53j#H!9>S!~nL!A`&Z}kER)r`qc;#!M#LJWl}Q_wnZuRi7^(SFSG;BSJ#TC!w6 z%GQ{SvaR`$q|{hbN#qIndcp-#O9&JppXj2$gK}nCQ3?^@1ZrHCCVP*ha3_Xk`+xb_ z)hu1RHFo2SM1;lc{1-2~E1?G#W8s;e9VArjK;EGy`JvG(I9&5 zUV-f2;dr^;MVWe;?5VS~HL;x)?p~L4u7)|+b?f(ZIk`9@D7o|94^$~ouPOVSZSpCS z{5w|fvC%aj&4*<=tgc`i469C1W_!2oZPYI%4sKD42XHnkx8Bu{Td4eC1c*KYAGqXE zv28z{I6{4bS`O7UYYM1s7LzT0i!SGfMz!Ed{pKIe@~?FVt8yitdSk?#miIBn9ioQm z>|bD;pmGpieQQ!3EKcYgtwcOL3yMUz{Zz<&b##K>mNa*R`+ykaDS=)8tWx8f@1C!+ zSeEQh%K9c_u_@rM`Q`BLFEl-~nY<2ep}G1~V-Q-m8YH5-aQTXByI9+-X|;zys49v- zD*Jh;C&G*(Nb z>C}nR2ynJ=L6qs7#U(b2<13=1x{r5x5U9FKd!gIJw*H8_mSfX}!%Qt<&KO(s%K_|MRJIJJY z*_|GcCSz&hg$Fn5C6fb*4w{*eydPwZHWki&{XgR#AJ`<(N4M{n!(1_rsiD=jzPougwfl$%*B!PDuErG z=h_gsKOV02cmJ+P(Sv+uJvxqQwY)+s2_qJP+~_GvLZkBj)|l?Y6zGGHOw`9W1jTut zPxiErGYF6f!mA?=w#sK>^D&MbX3Iq3TnPPb1ndBAx$+o%EJCmmIa&M*UGCN-C-AF!rHe=+%^XRI-Sdy`8;I=n1 zk2TEHK^&ykMq`b?(Q@M$*v2cQC8DX6fy)y0p7N{UHKSBxT zv5rxC!~7HAY#~MWCnZhwbd5XfZA8Z7iyRj@E!;kbJ-;6WLz+4QoNq=h3$~6rL$?MC zkeg`!O|Gt$9Ykaa(mlKlRYLC44PdoPVYS8Y*=nXB62$y5pGB$Xvc8wI9e3LB^uGV5 zui|eyH41~^zE4r*B-WiBxqr3!3r3stvOP^kLTe1C9yj_*CZ~q5$)*5L(#pY>nNjwW z>*~|%vw^V5Pni&bu3UI^Wc#2eQ_bt1Z$5@yyS4X+2Q_4KiH%}Mtq+CwvlBD-^fyn- z!_*0(`$C?MwT1h(8b_)(qoZvL7;6i*D7`k;Jl`yw55E7SRIk4JH1ZKMx4qtPzpedV zZjtlq-ezq=)B{0+cdisml3i2?HK_N(Kbs|2=NdQLW%~;W$r0v?-_2~6(J@(vi~mmF zmyo>_q004=X?uaL><~ftF32(0wXIzIGI2trpa3U8cn}Dp8}_64ur3W8V6#*>bgbTo zqWGNo%t{(ex?yp|)v59s(KTzhv{=4chfVb$6DG4$yt8Lrt*Xs-3>1Gf-10nun>$Jz zsWNgpeezWBINR$^9wAS%{oTSp9`qa42}ui8vCsp@Ls|<@-=k#f?eVUC7}Tp;5~|Gv zZOolKZ;BM*==kmEkVXb0O;5A$Q_FWDehitEj%-)f%-X6pksCY;947zcK2!>1_En_)w zKx*RIJKC7HKEq%sMkGv{k^%G#80(a{6SS4GE>XBRDwuC$s%`AdlzAE83MV21{rt9c z)lHR8$(F)=KMxcn@m2pNQ2hGZp;k?Ipn!y(u5j4wvA1q&ac!4%CxNx|uU~<)lTKa4 z?Gq;K`kiMT$pv9M?W=iY93AN`ht(OUyI)GUPDw<;HzMBdCub|>H*CxHFdXBae$jc4 zBj11p@e?^{B~<4GZOyplWGhLnyA?$^!(atb|L?L5^j3oT{D@??lmF{m*R`W2US+D% zv*y0>o3@msoBs5bDzV#!ee`0>lO88@Q;e5nH`%|i6e`FDS;CADY zDkiKouXHb~)Ts+sx-k%+w$d6XxQaUat319MIPol)=nxtPxJ4ZORf zVWIr}XUhcP<=_4#*(Cd!+#}@88#OnpHqA^Y3bX~9r*<=obGAVnmFj){9o#n|U3u5GAt$gd zl~(j;%1-R|#L*g?hHLNMxwm}^>7l8@DNn$=5sH)1DH5&b1mB#r$2jwzV*??nXRPi?|% zA|IT0SxZ-5U!Pq5u-`l=)cDa<8eK!rTOn;`Ib-Yr2`4pB-(bTlkFU=@=(Cqk&BIXy zHKE>_&u%W1koB6I*GApN@NJ^aCQ~Pi-j{IO>QdHUpFRF?o~>WM)Z1R&4r}H-;<+hw ztn^1SLO&XXL3ErQB8SBP!Pzv6?%_Xd!HOb+kON2p;vQY~9_TnkAYNIpB982|5W~5^ zLZ7F|A7O@~c2qOuj=T(SdS}T|bw40?b zP4?elBbk*Ftk3A+0fXW6aB?bUG|P2xUey`82sQ=%60gfX$2mu%CSP^G?^GN7X46wL z+A##dduny=lRN1S$Q&HI3+RC0|0ej^m3xXR-X*wocKqGzq^rHx%&KLzAK@zTQzRaccpk7FYGq&cXv4K@~sdK#Xyimq+Vj*cxY4lZMp&LV*{fB zuD6jsW`Np_;Zo;rFeXF-k--?+iTxw>00L8KPQ?`4INDK3TGW4bdqF|jOoBX%Vcru( zsC1@=QlUd}{{782Fu6^lg)=hQ6L)ep*Igd0B>zZ{(@z6B*{e=ccBke8AEBTss@6fz zI|SDWY2s7mF~-bJcDjEQH=AZ>k4l2lg0Bso&;lsLWjS47q{NF4T?o&Ac4<(LXo#0( z$HGYbYOq7)Aejhmv?qGaVfRrYsDZ)W=P@@vlns(kJVm%hBnmG4PztDc~)j2DacDelIhdhk&^nF;N zdUnVU+xzq{uw9>&MoFB+G6IxDqH7(b4TV(jaq_U`Ha!9lvu`#9f__`~UDTeRq3pjU zYI0NUB2Gh>QmgG=U{{w3h-k);PR3ZGR`^ub6+}n$g!Eu~!-mTb6FhZ>)4+Ca45&0GwOU(VK z?_RFw$ZA@b2ds36O8g;52fS7=s8NH~#qFP~B(JSu?iEylK~Ke({%E-&?jO%rw-He} z!zCM_;==1CL?#3Y&OrtV$F90v-pH>bn=SbQvQkfmY}fq|L%s%1C?87Y?;edj>|r3% zO|$*W$=ts1x!~QX_C(28RLe0o~~6>*LzNA>=W1nwURIXxd6hmRqBj#o?Q3Ypg#JL)w8` zGRHk!@9?u(RnPNXTpWomM>_9APn+vQ7B%_vtmqJ0;F#|^-r7Ue^R`|0%TKG?w;^8T8kLD()>-+~S;v{PI zqxwzaGINjj)8jbW!#=eRsO$2-O7s^tn?DhaEff94F!)Z{{N6t}MBTu8p`|l~I}jNk zbr`Q9qMm_U;tBOT!ANanm!Jn+WXKJ(HV_UnE@p?_z&8Ut zO3Pf9RZehTzqru3uZ9)b#AO${2VvL}b01dL5zuCrxyDbhX3PF?e19RKnm_RlYcX`` z2j)X)nE+)nhm*EG& z*_gy5cO7eOq4vmCg};sV{Uy0vj(C505Ar4lUHwQG6g(c7;#FPKbuh8aqqibPY_+N~ zfr>nu`3|#~KL2yHIgXXtyoZ?E`Jr&cjZbPdzji5ry7kCe$RfEzdEA&07SOgL^!#t} z(r{iCcGVY#)KbAzY2fcWQe)I*+PTnRv&U`6aQl?Ygs*~J5dQn8o#;Wadg6oA-0OTpI@tYGu4pF>Th9Zndn!)cTLs;*456DrcbalhuUx$Cd<3OgqJpu_DF;#a zk)`w3_A&{xXImL^tDnM1DKbXN4g{W=RHlU9zLETp;{<1fPT}{XUL&5|FGQ&rb%!S{ z{DHpJp(oT>io-X!67C7Ndik2uM64F$7%|VTXLvhhxEN~joP&vFf*NEm?Kj{nb92lx z7&!RLB`@Xg`{NZ`Vx6;A%(TSb1etfr`&hEGKlC?2$C&0{e_p`}^2^SKon8MurSzPP zc(GqwKA_7`GT7%7ZWtB9R(^NB+|9?K5g@onq+}Rze|ign#oiB#psqUh+&_5s4*KXp zdZISO=BbO6mbb%?F-*7BCChh`=A;Aj!^$@)-83P)|LQedu*uo!!~@x#grvX4p$${~ z@0sQm^}jp&Wx7sILz~2fso%0fy_{C0gv5lz@!f|&w#Z>gu#pv43Y zZM>Qr>Impr>Kty7>~rlI_U$|`U!%XicXvLM-Y{u{VhOuF+e?tN?_sU^R;po!+=iR7NWp3oK*vwZJowMD>TDyzv3`~MJt%4Mu8|1o?Ed*lZ!-XkkxmW zAghFPQ_(yOlS{}(V9?P=iRiBDrl&&4zh-D-;TtCmg_RP`$uh+ORx~!ni%^;^<&1E$ zTkCLZGeO(HLp;=BLhxX`J#F^BdAGvYloxBM`m1Z+%_H6^zuBBC0p0tz&ULlTy&wgN zhy-2ojezTSDS>?0-_qK8jYToyv?-B~JwZ)W#?H9!>m>y{E)G_rI6t6{4Z=3}cQFKW zBdvb!`EM%Yb^+%{J-C4xC*PsYYYydWJMz>qnEWNd;x~d zCJFy%A~mf7-;)Gg#lNZ165PAnMrNKJU!JeVlZQS+rc*+MQ6@Vw;@IPP`L8x-jc7wRH|WMA+SDhGs>W2^v}J`n=daa9 z)(?5Xow%xO>|Sj@AKbyF3=drJH(pLl3jvt=6jBMaa!Q)A=mS9qb7^7gqx>3FsOt(f z+zK5GOXXjEZtu>jY(ieLn;yS;S4LEu=4paL$q0V_>$)g^Vyz_U-p)!h1Twg0xM;hS zy9hLMXN7(vxtO_vW8B|yrngfw_Tv(GiZ%5K$LTwGMb%ff+q`>g|07jt9=!^VyPBZE zHnrWN`h{AbE&Z+x!xR5H&*X{iTMv#jSTS@5xoQf{po-wbMpmv-z}?e7_&ur2K8u)$sBiQ zU&I+3Q#Bg8(|sBv^AddEW8N zzvy9#2NfeuO@4*;YVIcTe2z-}P3IQLY9VANzXvunkka%qF>NR_BCM5AtuH3k`?ooP zYqP6!N*VHDPCa{AVP=f`rN&QIqa|f)|ES?P)c%$&1u7)|+C-QcL^lnEf=U#w z5=;3(t}N$8@{OxyPb&dJ(`R=yB-aD;&@jX>hEFn$%b#f{*4o#YGygTys0T=Jr5Ud} zHVP^XFnpS`LZNlgvJJ^(&Wfg2KAev3OQbCld6Qn|JIg9W+I|IW$ibm-IRRvR@oq{dk+18~bF8neZl+-}LgS>g@~% zcp2o^5_s^b^}*UmlRaqhpQ9bZLR5Pe^jR!2Xv`@(<(W~lzkrqNrr^RUGV`(6&h{KR z%-iK&I>_h=t=Y(B5;}#(yw1?gNTk+Bs{lR(UJHMyw#z|X(a3w6R9Pud1B&cO_T7sJ z5gsR^cdpz5#Q8t2%Z#gYUm8>o?d$UlF|EJ;ZBWA6mTG$!JNue~?$qM3cCvdGyAQ!*5`=Jx3rCy|jZG{Iy*YX~xb+?GLArp8+*(+~yvWb#!{0Y5+1_Bdz zKM#OE_gxoG5P93h$8$f!|JOIp+e`TyO3XyHpV=)K=_(Pbefr=(rMrLmLzXmwYjmF^ zeKq!*3>S1YG;cey5~xG}OQFb4GVT^*+#TBG^L_i) zg8AO2JC=}+rI7~dE(z&Ix0GF8cNdEd9SSP>N#}76@}|C4 zfA$_8Z$nc{JGqvmbBmnlxAB`o2Sorp&_fp+X)C^Mb|=mWg-5qm&V0u|LaAii;eNa{p`*~u zGcdL|kumG#iJ0cZfo}Zi+KL)$JsE}}jEk~!BO4MU4c#XbN4}U92M6QotE1H7vM_eg}td0BQ#8-!2Qyk7MMzd5~=<%|H#=9v=LhCC_N=KDBfjPE{$J z%7(!^AwS;q)d z6#43eG}IRXLrBKebIrW7}RyOP_C+7C9_ia zg_#X?-QUpF{uRukmqqOruS3VQ?{G_lMf5_{TCU~pnxoic>mlzI+K3NU3T(@_*t-s#nqQYHt+ zgDt7@PzncDX7d|B3oV?#vnq@$hD&J+W+6Sd)AD5f$??O%Cr4}tLC;ZMY;@rx|N3QY z>BfB#5lO%DH$S+EdGamocW!ttx(qfy6}4`d+FoAmq{;bb+M^?vZH#SOxsjm+I-*S@ zHKBBdwZ9xL13zZt2hk=w44aPY%*&tf?TuFU)QQRvQK^Q$lx=<-YwQy`yqGhp8~c=N z*CAxaV@yeq`aGcsS5Bc!wt|k|aLBMUG+tTP3JYd0mLI23TLs7Lf))=IRi;g9XU7aV+G&Q?h%gOjPXfsfHdC?|P+V1=JT_XHYWulu zfv61>*KkImMgSp;<;}@$v>G^gbKvr}Df-Dj0D)nP2ti5`YW=ZhPc5#;iH{H8`jZqb z?(4LB*8|lXTh+xBcF>|KSk*Xw3+fd`8^4-9Lqlu$`J1D+59J9W?z?(=sKW30#X@J~ z%}F2o9{rZ?5VK(VM&PR-NZBBPj^Sm(%MmK|^1f*Og30^t{fOxbe(sZ_K&2z)KXXOH z9})Qt7drPOH1~+{iM>a{K~GT!f;^qNZSl^W!eZx)#wat?OPL!qRDVl#>QBY z$;cL~4>aS;GC*oW*#c!RRRP0`ypD&0Am2z|f!_xKoO;Xd!zX3b^4s6QFU0?@aQ;)h zbmlh}fSax-TU9HiXs3%f_9}fA#((Z_;gf}J@N`Jj`xh$?tOT*KIko@wH;FekQ6KLSPxJ|+lP;$d4q}T4Ta6A`9>bHbNZvdR|%R^y0R&Hmh;R7qON1bm3c|>&`igG{fA>7uwyO)*rU3*yo zO;gic*8x0C=CS;`oYj&*sv)s6@ut}TT?9I_0|hoAF&mG8v**$wFwqO-5&}QZ?^2T5;)y4 zi#9p^9&XPy)%12QmaXcFkKzdR^SQLm6PNmUHTQlt$u~+K8Aloolmm(|%N1R_**{fY z$1bQ%74f+1#q`$5*S|FgfR>3+ld zpk6nOI@WM1N)|nNnDqlyP<(|EpE6%?Z+mc7WDYf3Zf9JtJP$^`?w7xRm`7!}3;z#c z!xawQRjN~QIW5_nhaVGLpGK@ljw=rTxZV7T(j2f1k3-GGXR9uDK`^i|Ei1yCQ%;cE ziI(tDVQ{1s+LNk}OvViH%L{}cxJaFGqa55&V1C<9MI<8nz*ydW0BY@`*E_!Out!{; z5ZP%q{rT?f-pb;MXldy2djzraHmz|0uzrwk+UzNqK=_@JBGk*wQrXMh75|s}k1%ok zgqZ2COe%*jDnmGY2;}%>8(C$iT2ZMIV7X%AyRd%SS-x(qKI_hh$;42GPk5j&F9c!4 z)Ik?b0wg~lOgugR0Jh>_MY(D911OY?9YxRtLJ&lWhVMR*7-5#FPu4H+nryH4Rz6KW3~%EQVT5pqh5$hFIKTZg?1c! z9s>H#WGxpgHW~xPwqj>fx_D=9!eeoL_)NotXo3}dYPI6A62-h@vfJP21QoJXdO5RKVa`*mWd@=iSG%6PAWY4O}Yz~CzXBI~@&id3OF=eCr(S+h6C?_d6437`85vF#mX}PcdtL{w_Z8WutBdX0`?y9y7r_WQ#+%X1D zjJj2X2nsSQ9788%gW&|aO4CEAs*XH16{=r@sgYBgNUPeA^iBr`kgFYJko_@$toZ2^`P8R!I2!8 z{UnmS2&Y=hAq49d);jJ|;ve72sOUUNfJSA(WA#c@9mpKev*!7 zyRpk<;=IoFZ^52`<%@CnPP^LNH#t6?^~aJUqllBaaGgjwe6^k#3CvjK*IXI$$%Sqj&V2&qi>B-Unsg|Yy8Nf= znBgQW#P#_n(2_o4m*Icpy^=RBW6-U^`>d_wZNE-0HQa14>s8zJK+Y~t8;i7rYZG>_ zyC$l?%mNl0A!FRukc_2ao{p2d=vrHaQY7|v&Rc}XZSVIWfDqCgigex~hiICYAq`rv z=n4Tv9k|S61($HYoxcP1$&yK4=pe%t;z9N23;&wI&HMKw6H+u2N1sOaM>ob03}l|s z0iA|4R5mUH+qMnorOmA(!a`QELX=bu%%l8fNH&$YRF+YkLr^HxxoS}+h)~TBoUNnX zTjaJIZ>V6a#!nhzwq?-%ICE`9_J6mUab3CZ%KcO-Q$+-9SZ-M8 zY=kL{T=+*&5Sa^-tm>06|0o81ae!P!AX!7#Z*!RA#VW4!Gtggsesp~mgDwJ!F1vQR zFfaY_(jAxGlj>e3tV2unkU2Otgcz${AFrrLl_DUlOQtjDtT2MG;RW>X=_Qjx;7j(!~;Jz^6%rrgcM+YBK3=)dZ^ zH@z8s#5x@Vu8$21=!vwU6-8Bjk@#w->8p?X$*EMaP@nCn2$%_pFDwKZBZ3bF=|ACz zFhW~9XagzV{`CB_=33KuMoGr*(DmzDKPJ|2l0@$O^QJyJErtX#9TUJ2Zn@EKyv79} zuamp52DHEbd7GT!CTJ6(9h@egmEz>6GRQ1RvG3&lIn}U>0#7j0zHQTk9s=V^keqDhDzLi;3q)Jnx-G^!qCKfbZ z62(kJCOz3RG{!31&c~fQj@rWA=pP!ht-gO7zkFSy{F2JmPmTKtD>k{w{A5lJ8RvDH zlY8=ejg(OKEc3k&yszF}vwxRb z?@@gnn-v1{uc|Q|=4a>GVc{B78pj+t`=Qp8=PLO_P6%dH8-M2Hc91zxS$Y#R$gVN)Nn_RKO(6 zovM-x(=Ryu0oNLamnvO&ko+=2c|~pwph77ypFZf5{O^)H?RoSzd++=0Nx-N(Kk(cg z+OtudV%$-zHYNy^InKl-K=0dNQX=EsEDv&ZOs9`w=~4fl{fFVc!r&5Ebm{N>a~3*Q zW-}F0Un7lFSof8-fS#Lu)!&!4;a!{p^-VGm{Fz3_`*dw3!u`sZ6pUu{-SJ2^W}apR z&+?+-2K@5qQZ}yd7alnLHvr-heh_c=)!a}zv=EfameET~PkHUX&s%SiSX(VPA2!%q z@4_ZhIndHug2M|`2Rl>d-Geou&Eohth0Riu1&6cMJDTwi;_-uEY+dteP=aIfUSb4_+7s*5urnBv1%2gUc;F z|KwElvO2x>YYJ~%3I~Q^4e8Z9Z;*VE>a5|1nfAO^zrT0aQnyjg$AQM0%4L8|eh%}^ z&_T<6iuy{Q`K?s?l>sVtX?&cAB5p^f8Zr z&Me`QS2MD@}Wc&w>m=t>+%P3Om8x+to7k zzW2{E77qU!4IcT-x%s#CTjj{FtmYfqtr@fEkKj%k2ZD(`p9P!0&8QzgvUSx+Z@CtI zo15<@b!l2+k_T|Xig>*`^SPKYrCLk>=4RgN%_u|p?+40}#i6Q1x0~LC@{l-;Oy3eu zsDWqOtuuOBZrpqT$!4kZ``=Sj)VP^1@6yKWFeU4|q$tA8QNBR30U?4v@cEO9V7NWX z3Z&g_=Q2hnx4S}{vhf|TD80pLZMv|?1rKiIlqmQe(nkrVB`r4 zZ6HeB3WKeH%)dp-;eI(Q2d)u&@HFZgbjUYISz>DVnaJKhA;-_h>T#2($7T@14*P}9E=4ea=8h4vsf{jByY3o zKUF{lthKEJm@(44)!pS60d3(H64iIB2L7k7-6TH^G%BU=QO&gL4u4c08PSdEm4n|_ zz&48-TGFt}Dj;07t*z2~;2xLf&l7O;eNbwX2cVf7RuO^#U!s-(&{~Hzxx*&pb%f&Y zA}m+dpC&nMmL$y-vXTfj3#j3_D_c3$xv{6#0n`oc3ebC4(C;jnZS86vFZr#@ECA{e zpATbC#zyje`0hy};*k-i{Zr(&5LTL;0lhT(s69;55#hF4z@RE;K>r&DT`V|{D1Nc0 z#xE_$VcbOb#>3ldo7J(W_&kXJZ&6%a}NtR-cDG6N)U6M;Jbu04)mi{mCwSLrG2?< z87bTzEcayX;9{3@FlTCJsMJk|Qf-Dcj)VgiJ0ut zs}WE`RPf3XJ;hB!;OTHPQK@zjw@jRW#9}TSCS%4OZkH?SVv$Y`VbtgLr`HOFG8E*4 ze=10EBy62e>RmI`fT{~2I^Zg*2U-&T8@T_%+hAJya-^ffiY{}zaiPNG{`guv6S3bl zxhekYZ_Vf8i!WhiVTB8&7xTx5RbGCnaVq*}6Db^MhW+lzLnlv(4 zQ@1S6l3aaYZ^GL?=qu_GrldjXuf?u1yUSWEo+Ml0N+%M`kzTBlP?NmCbI;Ztpe7={ z`A2W8bb%guer9UFHD95C4HB>#pwszKexiWSe3LW!l7FwtZ=Ul|^4}C#DyuaH?f|_s z!#9>S8np3)5*=YpdQ}X`yqI41Ed_0xzx%!+IPeCkgJjV6nys?;*SQ1i|MK{Tj2w|{ zpHhfEJRgc9o`@6`n~r2M;-&UYby)p`M_z zEIW0RkcWuI5C_eRBd*zl1kc-o30>iX*bWXX}q7c1Wo1!vPj+M z#e2LPO6)Fw*4PdVgX4C)q@eiPS?6f;LuC38fa8`-Ztaj?&ItqHB=eOI`3|~ZIe_Ds zXxGgCW`&2jC39mniDYFOyEO#aae!^F-+B^scSd(WZoqBrYQRj0MY{ZQp?`l6FFnvYc<>d^>A?< z;zQUrA`hWwpicdau-WjR;B-CMf&7*PT-LE(Nn!TTA{hf}w}JcuY~?OFguE_n4J9qkd>v7ZFgn}d+Hm(F(2 z@G-B;ja|PIEp8_7-D0evb$V_r)i25O2s)S$?+EQanM*m8sfcDmV+^J9>HCe6TA9fZ#^WT(ZV3s@3!yaX1+%~^Emw^&^@#(?fGcsRo3AZR;bbNEJJtU&w3CP=??;B zj<$|TH#TOrCzbmbm$^^XpaOAvf>!$!ZwvxCwzFB z#C+yzwuI~LW1>3CEZQrK2)Xl2C;#Cpg<5kV$(4JvUNWObzrnJ_a0>rvJe9Jbt`#G`VZi$8 zSs=v+sSBTy1F7_eGo$e&lqh#nPeeI0VmnOl*OG3ML+v38mdo1|zIPl>!{noVb4$6b zutZN!4x-eKM2*`&LkF_sRQ}1_zNUT;BDLG6m!0=4JVfO$T1_y(;?b0es+LrdOPB=0 zuxytPw%#cRy`b?c{GtiM6VlqpTo_keiX9IBzp)>nk0Jh!Bj zv$LcjT^+L()Q$Kjl$b7OU@L9D7JuoT zlb)wwS))#;M7=Ds4nwpyKw z^MVo^6$?iQA)f~+Xj(on)xO9Mv@d4xWpdRXDp3(;i5{s2GK-|VxGlQ)frZ1O-LR(j zTv%?xXOiQ+NTk_#=26rnZdMNd7c>`Ocs0SGHG zTve$tGr|(^9YCC^el?~nZ$yV`o|t1tX-U}-G{bIx#HuSRty?|8{A&N>TF$U6ssjU8 z(_b}Cgfulh_YHSf&bRJ*8uYUjc50XLl%TPK(^Z7MsiPz6z6}9GBn9y#2i*0xf4LpB z2`W8;J{SGiY92>eE{e#AwVNKQb22#?FMha|hP7RV<-)rhrp`)q3e9yL;gg{kv*LoR zI&_7Yi}juZt9j{Ts>aMio0oS6lN<^Hl?}QqEyvyO>kku2q3U{=U9(iye_fB&s_(ck z0I#%Sk~i|@=Y=yHvr}1kaNFl`k*yzB4%#kN$xTyfL!jz7J}-ZqY3`8tX@E=h%26P| z+B>asnUE&`Iw^z4aCO(X)`~KY)u3fN@Kre>O9;?4U6+5qa@cJ-AXxFDc8N(5;a&Y) zg&C*rMKG>Q2WBwp93uoaPZ^JJPx=}=O7_PbU#V_4ncLbTvH3~%%jZ0_JJa;6?DgtJ zrH_+F4LYd1Gll9S@g>IbpgS?Av=xs{w&B4shwGp;dP9;u`1C$SoG5CYYy+-VN;UG^ zBs=ziSjbFFX5Oku?+Bl5XIb?;p?~|yfuM+-M<|u$s!i&rUwV-p@kuzK=26I=jQ8>i zmJc&^vWU802xFTyx2j_YCtKkCw?&U0>)bti&MVA#t=83B`f|xZPRDf54V_Dmnpv$RH-Pts!>q;;N_1~~ zA`VjO164W@jy#jXTK~3&t|lkL7{UM?)&5}c8I%=TWk|L2=xH1n=?&4N$`=$o*(-w@ zzcq*Gl(ciSVdSWY|i>;n#ZWI<%L&X#uy2g=u$hJBCr0nd9{7Mhy~&SG;OtC z&_q?_52FpXybIsbLHt*M_!m`rGhISjtx=*#EkKSiV5}&nyUxr?+g3*=F?)Ou@w>?qASS zB{f^8HPs{&;-Rq{E3adVTs@De-jZ-}ThdnlXDfA|X7<$;huOszP*d0BKNc6xwjlrB zVWHMOG@&WFUL0d|uhkIl+`hU`Ym<&CL=5a346WTYP^)YUF#%gTWC=h6hnqBGvtywO z#%p6>?6Ye_>>c9mJAv7UZ$+Z4Cqdb;>SrAcr0#%phTb+(5aqYy4RYl#e-1Ym&R zJgMgm$Ua$LBpXv=67)Eh5PQ)Vh&DMnDH_D-+jUs^HANl7jE8UeM4PMM%O)b9e+E4M zsuPD?zd45J#`!uXi}cn+kumf^sSHS`?2dex$+eq& z*4D1@j}Kv>vw)RsM)K=yKLB!)IbQyhX{!8Q;Nh!#Nta+rUfo4LA!rj$@A9%SjP$&G z?`>IIk@yI;+6o8$q#t0E0cD)9hXa_bNfsfm%RtH(sceCYVDP!IA8y|4bD960(ftMQ z1QzZr_Iqxu%oiDbuMQ=7Y=%nYeg%Iz{8@OUO=X=K@wx&D&RN^;+`ZZ)&TY#JhX)8l zL@0^2f52}V!>xoy;Jc?BdYCF#*bt}#;tnY|O z?@pt|i1f66x}*xW;i8-YbTXRYe*hlG_U+rBVW8lpS!mdfEm+FZiym#nI_+oNLr8-_ zG9fcIRHS{gZOU|w8S=O?{FvC2etAa8pXIX}jAb;H_Y?fSG8n1r6qba{TT=1q`gKZOA@Cp)u#kpH3oH*)fRXs z*LL!6FXzDn--0Z+b?}a`E72g<@_WoRm)J~sC))M$nzEVpJZ~$&jgPg;axXF2 zC{E_~TUua8fp=y_&BS?ngAA&c#*MXZk{6pA|6K3W`ow8nR;PMRZfCF6nNP!-eGK(T zJ5G8%e4Y6ZX~YJfG34Cn8$lxD*6*pZlqGU2zeYe?X`2c0^!u_LqW}qqnk$=SC;!PW zadxn!Sic3iIcD&e_)RS%51pptgWca!~LM%j3 zC*tO9ePI^wrwf=~B$PN9z$;sjiJ`a3Omn@rn}|sq;|RZgWg0;Kuw0It(Uvy0MXy}u zTo-D>WJ!V;lHRO3D0x@dDRCYFnXH2yC>y%EnryF1La3;T6g_-jZC#|A8Q}!L zQsib)CI4T#&Xh4j!*4v@s|{B>aWHfj1hobjF%(HU5p9v>NTNvoS#6}n*(F(9l?N?T zn!4X>T~-K1(b%>KGStpuBWcAQMoB=FxmqT+JRkzdTk6!=RrCkYGo+Q3WfZsm)IvInK5Lk1-2x_1ObHO_&HL`LiNx#19#E2rt+@|B z>{E{&X&)oR98wJ@fX>f+m&~;-CEwj58H8uV9M&AG^6SQoalls?f+j zH&j^s0Y(H3lnMj;2q^leh3!m0g$SdJvBM0MjRJvBExHJhuLFr%1H}(XLo1TzeqO_+ zW<`L|WgP*QiOrP@Z@33#>I>Uwe{g@iTBd2LIBeEUDfxxi@Z86)+hDA_hZkK$Bz5+k zrw{rs`S6hgc#iX_EeV*du?5S~7_3sTsM#<>KW(9!%t=fSH)>zHL!?C>Oajj40C8sL z<#+hJ&d6Y$afSif+EJ_D3I9dY-dx)bIRN+^elxigK`I2A`)qs4pSWBaQne^HxrJNN z1pcwSY_dTuf&g$#=jQ{kr;WXp>3H<6ZhLfnf`FB-Y; z=;9?ySb_BBQcJ{6yn91c8kb{ecyiT1*a3O95TOH+K}9;4u5KRluPf=udJS8Q*r?e) z_0h)`6iyKl_}0C$tiJ#PFL$&gIjOEEFJEh{Fm99->)l4V`y zqR;uoWc+`Ly?Hq&&%nQQe;n%cH~eeFrZ>qU^8|qy%GeC4nSjId9JjAe*>+fWE^EmTNB1Ykdztgo;)WJo`WcG#!52N^cVmKF0JeBR1@(vxd zSCC7hKOAsXgin{(DL}!r=ht}7eL6_^s>xk5sA6mWxB{@e;l-`CfR=T?GdosGW^>M@ ziwC)LYq#B}*Po`yYcfpEfYw4qna7{x?txU}8!Oco(qcQxR$Z6Y9G}DsP>Ui(GI)0~ zuyFO&RGf6R3)LG;bKyD?ukg18IOA=Cr%rNlF+b7+?widsG-k{Fg2ZQ37^MIrLzN{d z7tx2d`6ATb#`k9gsS4Gv-<~SB@y|Yjx1Q5hLA3y&q;0Uf&SHComd+KoWCP|KXu}?| z9dd1L(L2)CcXYUN=)Ih^;V|LY23-k+Zx|!=1Z!_s(^Jg*P0kSI^K_d`ryCgyj{~2Q zz-Ez+Uj4+aM>g%I5Uki#uQ845>ZQ+d?huz0yjEvtn+An(q#RB8Svh57fC%6BPRRnv z(Jh6D(R^T@G7KI{5HJ?t7%G09bfw{*^0ba64F@{cdUYWfS2)xn6EdC<9^)4zqHe6( z@*EIC;tTn=QKiOJm40-}hq#*+9=ENog%-el0bHlEyKhz!1Yk=f;)gF>Gd>mmrxG9 zmQ_af0AzQ=UhF&d(iCrgZ1-d^as*_BD5<-4EkX)0%F=AmN2vfvfjVJaXBMb-VkS?y zSJPiwLGIUCW!tmaQG5276^5H72V2uyoTKBC7+=(X==9_H*&CC}F<_?7*o3x%osbg+N`<;t^gr89v1BFuQ5Sq*ghES0qA^P=J zAf+uDDA?;yC)?e_uJt{vA#No~gXGxz)@ga2KwOwjVawv!huLvmAO=)DqfVEWii4Yf z8mt*t-sYBLF1&j)&HpC(`CFx!WCWhr=6j$eB64M*LIkOTC5a+TI)G0y(tIW48xu;S zCd|JxGykpY!{=UIAE5r?DIuwEkvrn;vWF6SocCpnli6t4c)1MsepYT7y|m7xvm60y zZ(@wVZ5|NvNyS&r_vaFG50KiChw#7u+@-qoYS zC=mY2Bi#Na+8Zlx$zG;1whem|j3Of^xwQskF++P7zf5n{XR`y)RiM*etMyGO zL5B@`R2#}zBW$myRub3_VKCfFILMsi>^?#Ni_=8{AU$R@V=N=Vyl956vP^n)CoeS1 z1%_%sk_#1!gFm8^Tws!Sk^R)6^I#=vY+%AGy=A?BnmFYr$m5@rZpgoi%L-t`{Jh>f zvk5hzy^k8as~EPfT@85r{X!{Umn%5O<7E0WZR-{ASAbKop*?_U3Ev^PNwCe9Xh*!_ z-gf;tLdpQcLPbXiDADje@qzGFqAk1t^%EW(W4M|}OOVErC;R|2!rQeks839hGRB_y zXQ*>(uSt$TvpPMOB=B4c&Nt3 z+TF?g#3&8>CQuDa{`tB*%_VCpq$_+t1JF%5wB*vzdrLrb!g7A`bP1hZ#t8U6j41`i zJk$=^o^U3D!0HhC0-ai;Z%B z&g&NAP~3OQpt7=lx+!*QE8Jbq??cn_6OMzw33xUQN<JTV0YNonys~^k3fxQXQ^RQ%~f}_i=Ami4QYMklHMNoQbLkdw%&NUK=k@ zw4&Npg}p>xTL7Oqkhy6w}+WhnQF>7S*M)@A?kWO!y^cA%+$d6S|?GDvY_PY zbryXZJyHDUEuCyt%=F{PCu_b<%Cn{F_MT{0ifb1x^;>!V} z_yL^6TXr0E`sgqSgo*{kxk8q-c)`#mpPu)l%#fa|^0mFsbJvEw@UJ1jIyk6L%`AbES?8Uj6 zfFPUjKTeOF&LXHx`gLcc)8Acy9$W;qzDO@T-ts*V+u0fcgJmah!Ju0R$^onk(LLF4 zZ^gNqr(-cn9B6o4os{j@VnCIs3CggFAHJ``o5d5plwUe*soOVU^-E6%UNcVwhCfv`<%}a<}%;H55<&Sf5 znS3cp4nd&8mlO}LkKT8}aCyYkJ+w6x4r&rAAbVc*x68e6tBHv6ZN$9JT5n|lHs|q+ zW!lz}4eO}U8`P~lUu~7v7usn* zHDWGcBIY8C2Rsfe7||!}EvRb{w1n;DVx}Xm-nL3vT*QC6CEeJ>A7Pu{oZYF~om@s8 z$i{WpSY-&@&f_I%#~bf(4P%n3SYc=3cA0ex7H`08mWR_=a(ygE(`yZN0r-^4kY;<R4})9xLnRGEe<6f`*1 zJA;+Xh1#^7NuIL~q-_(ZP>IdRksXh>r&E#o79@*g z;#{)0HeZUP1pQ9*fuK=AC3Sc9)~mmxhC3e~2Xz5vey~gmBI6@O&tm4>$qxVpCoiSY zV7Q7iCI@ZDuUbErESWnqzz=oph@Z$^=f$ADprlst_%?Yjp2@RSF4oDyA<6L?R736` zvhu}$iri(k{cUjr5Wj|TxC)T-Ey-3h^n;qn^$3n|&kOSMYg(O%W)9E$&D%lMh zNHTp0?bYU~^QGH=4_rd(_KyifLP7A;65shJ{Z+K3J!NmMN6qo-yoKl?D3mCmD(XUp zr%7E55@=BS`btYt>~^B&@fQnLd4#I`EGWh+_#FnS98=c~B+nBm8E~IOBNj?FR||Fw zI%atD*mpTFkZ>lzRk18^0nD5Z`w44=MX%;Cq=(LZZTB9xLk5-=L}eAy9g3)g3>wI9 za=?ARSd_pIz>XIS6E?4639^}$?=38*(cI%IWfMZpVG}X=Vk|D5Lfh~7)agHE{A(<_ z6#Qx&BrGc5Vfoh7|F;JK9n}Q#>Q?ArlxABmgX#;F=KG6GnkeVxY+;;GG0c z^Uyxz%_P6iXs|c~)H$St1!jcso4<7*N`S(otkmYo>K(9Zv^Y6;T@0O279F>=)78uj z!yhCgxpgRh;r0zv%6{(_)1do_96MuPFv2z?>oWn(hl5)YXj*m4KS!Pk;P+UEV*#UriD9qP=%}DrP8&n)&w@WehN7F`clyZ+_FS z*#{+35CAg`mI>-*RO*KXE`CO5FHh%mvx8^kqRqgFyvNiK^Xp9i#I(xAVL+_$4w&z>n^-^tbNcL&>wHHj3PPmq>xS3DvZeRI10Y9agj?lGfl4F61Qr=UHrngOv9BP~D$2yWj``1;JnB zQSU)If3wNSX;H90%ifkcCLgk;SkBH}*s$utco&PAw+Woc?JAK3qj_DySB#kc1n-gT zmmVrb!Ph{P3r|662_A%VVa)FxKjQbgo;kQxSo1_h7?1@ZM>Ss}sxLq(lF-TTk?EgAq0^86ENJ6}S@|&4mO#^3EI))) zh5x$DjHm9e52qg1P0Nl&)rT+{LAs(VR2!03CwTnk}jVGBElDz;7#+odTa--EMxD z3?E7^M)A;r>7sT6_i;|~kf(s!_3p?uey z`eOkGx6~|*XfNA&gn>a{@+h}90{_Tfw4yCozVO<3$pC#+;$j}yQJ-ynJKz0gjg!(H zt{Be5)x?{*xepE=z^~wHlNjR7?Yj04KI#JhU9>-LB0rc8su>_hjy^;V%L7Nspp1~Q z6dMT->F9L`v+A{-C6WwWi#W+4zEWg!#AyjLLpBLs(MmiQdGK~V!~ zF&-ap%0oC9?9%_=o}q+7(15L4N_U0O;O(;aZvU)=tw3k-%-6jwG9`PiEBQ<=EX!7Y z6Y{bN3@NB-2EhG1>JSV^h>-vj*E=p?7)egD%Cvi4?gDfqS!6^MS(HSdKD(5s7|V#O z<4yMxXKy5=pA&Pw68cx~RbG9!-2d$eOp!TmHyr`eSL~=S z!ceq_+*P9@y}}w5h-W2cjvG8_omtDm+(UO*XaGDpyyxLzTy*#UcMKJDvY}s<7=TuuLtSM!gw(+J zn=lw;Q{@5vc)wsc?N(e;2SmHhGI8DNvko9j$pT%M$K>>M4^cipz*a0g%jW;HPxy2w z!l1s&fy=7d(yIlEh&fC2sYto|V+1@nsqZ`V_Dhyw=c65h0kHpV*vI&n6g-L3CxULf zo4`3m-h0;yrZ!v_I~5=9KT&#R<=6`nocU5Ts#$({)Hqc$#d3`LS6gz%&OX+|w zcBBGC#gYc`>lKXP|%E7=8@!PM5jn_z2m46zP*9qx? z8QcGOX{YMtnmFnc#WR|dcZRC$(7c#R=S19o%1Vwuf_1c8*`X!A0R<^g&Q;LHi|~HZ zUG)NqbWS39E3^cl^m;YqjPJ<)Hfs#j25(0+XP%0XWaZO8gE8jMTV^~kp`!sr^JGpP zjbd%Cz;Z@}EZaumO*5pwJo2SV0Krq$A)7X#9*m>aMCmdoGqbj>@!I!Cv zf%YvI*FSHcm1jMyIXCXEsEjGMuoi`cfvT6~T8nB>yYzT-28_@jhvtd~K>Ess%5yIN z#MAQ$*kOVB8dy=g-r-6=%PxQpEf_YKn8>?Ko;WJhG}tFNCAcEE-^6Z|9MMG5M9xO} z3M1my)Z*nV1sUt~8>7a>6ieYC`2IwZFNET^VbCmH@5X=2cqnn;12fR+>5bO|zZvWL zxp;}U?R9$?rc&4Q?=KVXmwpJxc>}QTD8*iM@#{&_09v ziM_JdeZL>P%1}H(fG#s)WYl%X4M@A$n+Tw^hhRY&`&hT#lRx{ggkwAwP}GHu2|&cc zi8Pe^u-k%~ijoftK5jz zhp6VH?ZVBzyMa=>ZJSrf_elJFS>4{M4NQ6iI%G`aKs|PCPgRGP7ueBC6t`||V4*>m zYM?+3XfT(wBHi|`Hw>!F+=@SFc1>(v{20&UlZD&#`rjxQCo7-U8z(ybTwFSg24mr> zQ0&l;B~#{$(y`lMqW_{MW-`cEL^_8aKtQ@n5QL$m1*J<; zI+c#08xbk#kd~AZ#CP-izhA)1i!*1RXFqGLdqKw|ak-U1PL?U8n$wu(8{+sb0Vaty z`!A5e(17~GZfYJhRWA9dHTMru$N7a18C5XEei}blOB5zF8_{C;YBj@xNqSvSMYHia z?bFbY6kbdAx~~-xkC}W;!k%_+3-B@VvGQ^7J>cWvD3H0#@LD1gmne8q(9Wl!@*u zae@fG;Nde#V8L_Sa5{(rQ={AkSBk&z=_hZn7TpQ@TEfE%yedp720P0duHX;%Eb*lt zZZ-t}{+t^g3+uN0wSs_6!P}7uJBrLm(I17+(|eSu!xi?7iu!uwf)Z5gPR>I)*=#Bn zeV>963L^y#0K8g}>L)!_f3Sooq*YQod|c9U93@i7WGoBbzrEO8SNIU-OeP~e`>wCV zEUzk%Rz?=h;c5LJ3hPq#2IKh&%|Kqqkna2~ z)4L?0xAE0V@c`zJlWy;&sup&^vCflE93u6y^T0LEK`V%uPS= zWq)~pdlg6QU*A}G>727aoo4fbFpWGQ@^^^yfzUI^z=AM;=Z+Fz1GrZKNKyt0$d76I znYr%xNpWE7&{mEjFUzGT+2o+iYVz6L{tDfOW342<0VDpsXyBwBGx4KO5470y4lVJj z&Y{$^!!5H8Em(cZq!mwwoYiNNp$pA;^J`|UP`UuO+jqSjOA8ZxGsb8$ID+CHTe1=< zOarX(E?%%EfS-lvbi6WCb1}46JZ~L$O+zVO@JZdHF5PZ8Qt-%p=iF3gd-1@ruJrTX zGW<)3NZdk%(P-bK)b61e2_w;F#-zMETO@BNlS<+*5OUY=m)rnu(Ia)CssW!4<#Jhm z)G~0Qw8YVmRcy7*PV~*)3+ixL3oz636;0{0F2do@;G>6HWA}DFviz)!m4`Kfg^ewk zP8dt5`tE+`n*g&(^!>pMLTR7TnLJw3 zC6|$j=!;wlz7nuu9{j>j5`N55D+%5PzRLu!2r5Z{YZT3BIDKx68mJfs?`3HnAHs!L z$A{rXdhxn(q(px*c-vZyb5IX{dan;vZP*(3fa!5+n^5Fe^!asx*x!p;FolfW#Cdt) zhp6M;zHvlAj#~)$nhnOXwPXw3tC`PD!4z|Ur?;zlOYxWxMs|!GHpvBm*R(&;t@c7Y zPj}Vm#jI?2m~(BUQD}w&N$g6GL@bPtiC-F)eFK-NPP|$P?gq++lT1N^SEu6bG6Ccm z==N;CNNP`U)7PlLa)CWA$8_doLdlDsN;w7 zYjTvSDgZ`|D}|E5v`T4Tnd{?IA?H9GENsfIGZK{V9%04&>U$_2wsqH8f-4nd7(bdo zg|IozXBt)gabTR1#FY_9bf_y)SP8k;`p_z`fQ&SzQLsyxy8dTus}bg5FPqT(­$ zv4coE?}2~#PDlU6kiGXS?dPLnfq^Om?5|>+z7p^RDitkl2}JpT8<17K8*#SvM_!|s z){iyWQ*d?!vaR|h5Hx}LoTq=IDx_Z$&W;0jT} zfccgpqt^QexZ?9y2EisR(c?N<_Tv5Rl+w4h-xU@PP&vL2bjn8BK zI8Sqtm<`5fhaVWO83Q1{en#*e;qX2umK3@CTgygyF z>21QQ{J-@HbqTflPUqj4UUx2`yVrNMsqO(!@BVd#Y|kwu6gD$M;6<;f@<{2HzjP}m z=;PjV6w3YRrl%aI@g&W-L!O~@d#+PI->|6aZDz3NtC=cj`Afgsf{uZTXs}c&{oy3F zOZU?;R@MiCWYjI64va1lJR8EO#azP#Q#zLW?W^|#nMhzAHaF15lR>rG^;3S0HIir( zmj$X0%ZKa8by#Fh@L2`R;_1~r6;vs4665=jZ1fS zBdty{N2;jiYU*#m;xhC(4#=`+wjSRHxrQOqKAm6HL4#5Z-Zua;t(~+Bp<{32euMLD89cJ%3QJ_kOxkO=KdeR4y67{(I=e+2F)hAomYHXUP=E2 zAEdV3DIlZ%S+uplLz_9B0+1qBUe_GtgS39#z%*3J#HT(!tE#w1NUzO8_8X z>cNvi?lfU_g<69lH|2hAIe$iiN?!Y>SLfpx($Vni*Fbe{aVrunI&L|4E&wVCz<9KM zJBIjKjw-(y!5OvyEI=*^it3N#<-^+MKa|OJ-Ns88=FrXW2WG3i4twuhXed025PnT^ zZIRv%telgJ84-K2qbKKAczw3DsfQ4ZlPx;x-MzMZS(7B-(8Ol1BdB-zdMC*C2*m}I zeB;6Ip>qT81>TArG11Bx_S`Xk0?T*7N!Fwe;o-IVV<(x_u2~y*D(*&)H9slYnrEp) z`>@I9(yjz-3asW%5At^E<`Y374PWtwN9wIu{!E)5=l(%T<&J6b%JZh^evesRDSvEs z%rJD!bSGKBpO@eQ3I8>{4FR{rYie!%g@841qfe{)OwKQHvjbj5kb3%yHTa!j74EWp zvrorBKIoy5cB^ACx=Tc4pzgb?L4->hz^;9>A5l|{_=KvmB*?Ff?^aF=Nj(@K7jxkq*fKZ)L zTLFeR*EqaXY;FJI+UroP@VOYDKL{KcN~7^kBEa^6vHd+OgXHU*KZ!@r(!M{rcut+| zv+(*aKbRoK^pYR{H~Ez`GIb$1{7V23a4x@TONFm8{%bz+l41A`9WD z@TJA!h8mT6@Hue)cuaR`1qKVFZ$7wK^up>a7+IvT!kJBE@4s32!SxqpNVM#gs^pU8 zYKS>SSr@-;9Jz@>t8^IVSnC`XLm9&e{SOc?l~87E5-|-Ww*%{{mo$bC1ME>1fRHu~xf4tkG&jzdf!*c=ki_3!s1XZ|BI~G8jIq z05~ZCx9OjkO#imGLPJj_#UYw2MiQS=w{vo1<{MV)0bj?Un{xAUeRk9up;}h!@k@_j z4_MG)DhQW`1Y!Vd$@IY~g{bi*Q_U2xs-O%m4Cj0BUzntz&}(b8nuPuM$2#+fS*kEd zS}co1_Z;yo#(HqczR!g zcW4z=L_fG29qAW_WsTR{i$~B49accYcV)23ZhVYDy0pq z8B<%ivo4SuV4>DXHelmicFlM&52So{!*ve>h{zL{QZ3j%>^XHqwC zrXMSZX`m~uVt$)}J~c;mwIH^5I~CY@fK^;4A_pf7hU{EE%nR!c2%Fj`;fMn)xV-dSDX(HgA3jHHiq> z3;){>=cBN;prbE>-gz~W#(@%NpS6Qi0{Zpm45+MIJ5K+|-3?>%q3`2;KF~-Ww{{^^ z%j`YBQ}pB8&jC?S`WbQ6k=iWjyCWZ}-}v*Bt5`6o8TH7N*n8sIomG>BpP;l10YF72 zKrP%Enhk>^ogVpUesj4j+LDNJuAwN)l`R9orR*ioDJmse#eRT#1sT_d6<2!VcFHRA zkNkTU?@UPdot<{OsaH@N16!P9`k%0{ez`!|zT9n-}>K-adt12G4MZ-(9h z`Z?Rw^=hO=Yj3g*iiSK=H9rwKQEc9Crnhmt3!gL(k24VRpA&mK6zt5bL^omed2qC^ zTD{DdzG!IXg&UCq@%VwkJXI2Bv11Vx^j7WWQ0kI6?fv#U+y1F z27zx#)U{QQKRrJLIs0ztq>30SqWQtQKl!to`GMLJxeU1D_4R7Mr;pPWoR_x(adtpLjsyulpf<*ayGO*68dcon>B$JO=-KAerS_ zC8G=jmir%`k9SlE_kKk=DxzojtiJWVLh#9pFmOaUKY7kM;l}Q5GsiS9`!(omm!Vj% zJf8*KfE+9fu7=5kl$!}&#%0>OjN+H@SGbUN>2s}E*dD2Dtm3HhpNPGflt}Rb*Aa8A zLVhuZJ|?=|AX(GBy93E|G&TH= zdRsR=F02hel4DDzB-k`1*5A4TjNt1b7Q8-`ZNK|GUjB@bUv*r%5^MxDBNm%iv? z704f11<}T7x*F@p5*H2rnOU-<%-_C>{&n$Db^Tl57YFgd1_l+v!a{3spHDLIa`Ki< z{o+@{y^DdL)R;z0O(lwhNyaoH{mApdoza3EfjX-$QQ?EM03J{egT^!8+wOCcgi7JCIRTnkY(#TGBHy+SE~Qz+bo1=TX#AAnT}435ej zrsa;%b((c`*(m%RnFd}Y!G#aSND9uvxF#Yk*Y8$)2IcR?w`x2EaNGx$5Pf}@@u%Q}pn+eywqP|k_MHlnjf^(>ItHIXie+I;pl+@H;_vj_PPhDSa z8!YAZwR?32k=c8=Vh3hsVI(}c(4X3oP8!*h4jX$q`-c8Z=lxyat7>`c!gcw|YadqO z+Y;i+Dyo8&9U07475fhy!@Q5^qegajBm)20E$U_xG#5W4qP=IbrHp_SSZIa6Y4NPn?QEE~EPUZRoz+ZIdxhUvQM4@r`7UQX) zHk+%v>~j;AZ6cq^*mnhU-9EdArmZIqFFg|K8L?LGbslc5gIN}dL|VVfD%R>XNBVGE zbt?O+q*k4=;i-_*Nj2#QkLMC6vKW%AYqR^mTJ21uHDImzrte=DNvgr;OA_3XkEF1w zeWV}%g8-ATlM?6Q;wxy#BW$`i{I39;B;T?~Du8#&Bid|iTfih^Kdd-b^Zry>N}nU3 z-+?IfhC$wTIJR5=0Qc+TCY7$rCzE-2k45J#8pa(OaOsXglDN62a}1O~_}yq_7<=se zE(jlkJS{4+0WSczSqoT?9d09swwujq9D&#Jy+bZ&g>~{sihk1hw3!>+oxaHpMYM!d zW&Pz@_KfG>f=i`}7NJ;U6h1E`oI~_C^vxRlcR44k??C_Y-j2t`e1g(`|HfsX3<>}1 zX1`Lnq@4*hIPB5;_ptsC2xTLH{^!(Tt%hI+h;}YKW(2(tU+SAC|BX4^TthOH;qeBJ@dyB604(Z7Pf{M&7s#6$iV4fS78OeoMA3u2en1V>J}Fu2 z`?oKS9?p`Q)MC<)B^WJ9e5mNzXBiBHG^^n?wwSI)(?hU`Yy-rf>knWS5t(KMeGJSs z610GSJEdsZ1U~k+&mHLifLV^7&#>ydf;Tkzl)NIup(^A=6vGtJl%j4ebim+Ht(BGO zU+~^`0Kg8_WMSrHoQKey&RBmaKkVgln*un#u`!|hGB_;IXMkZ1u-Z&YnazJvp1RzT z0np!D;8^7D!+&?@knV8(5gD&?Q`k<8<4t_7pa~^6&~@xnxewy=*0pkXE-QHb`cmFT zy=$=PS`fZSeYCi##cY$!VxJnKYN45o+o=k9cGDyB@AE4Fok0K!F$g=q7cp-8n-dqg z^O$&ztn%TaPlB%3zU<2n+Z99rE(BnVDfrIk;lHuv6B^6`U;Q`WK=~>bqNH{kc8nH> z`^C9wMz?c#mEhIWt$rVJwa1@UpoAvmmg&VnU>I}%3e4MpXRRjzr@mK*p?7gKkJx%|#G7Q}c zul^(g&+bFpe_>TnKAEE(*8>-TTJ7IcYexBkLKb}o(vITx<>KEBjpQG1Q(5Ev5(WW^ zZ6$sb`>V?e#5(;4+ytwuFZ$ToO_psuD@VXts4y_6gwkk1%;r&{>jjO1KNmr?$I*V2aY(&%N3YCPPC0O36IpHHo4Q z)5K2M3HCIM2iPXocLy>BvnH%uc0sDXShDw$UOLO12G6Ff%LsY>{8Rr!`?4-bOYp`Bcd`BV$62Azl{T;$#Kh z_8q6V`{bcKG$3!m)x41{kWSORWqS}*R{h6i^AL!Wy*R)90gMHOw<`SPnGT3?u6y*p zeUk0jqJUd@)-o5b;8%Qd%MWH+g_<)FzBYHDhR_GJG9xe(KFl8a_w4H2B5jXx14zD&ggp>ZV@RJ@|@iImI_7fuk~oIJFB!GkN& z-uwB@P|*9~)m5jDwes&~3qkY6zHZT~-p48yGq9TZ#u{8IW|W8RO`~uZN)13qj_2gl z*^%;sKho5eeEAKLg&&jZIy zPB+$EG1G@!n zoAa)KvL_|QrWV7Q3#Aj~ya4RG%azDXVJ&`O3$Ia76E_lE*)pEo-kQM+1B`shLZ;ik z68&@#xe$KPc5q3lhQDx6%eF~UdxGB-#3y+9Tt_jnlInajGG0?o$O+#r%tuo1ZRb4c ztItqq4kHx{e??KRtOU0zPbKNhvJIM_HG_|K*TjBvd+v2}lLG%-aMS$@pu!eqpg5h( z7+?;RffN=UiIJ@1^rcr^a0r8~fcBTSLBH=DEA``TJZNWCWtJOss(aSwbWrgVaT#hC zXyEj`jXNH|S6Z3U^UuUeR;2$_Mua$FKPBK)?-{9zYkN%l?nN zqSrd>PZ0Tlr}+19TLUD0et)aILUEn8e#=+w(yK9u-70nw!p&mnUK2}t>(FUaU1cxj z13)2BF?(J)9^3Ql(-r%ZIbfPVGf~k|ruMl_bT&rT3QOEK0Wdqc%9>HzU!Iww&Wi_m zv11{DxJVyl05Sv_S@DP>$ROA?`0Xfz#l{8^ipCP97;Y?5T#6Z;QJ^wEq3iZID%>4_ zvvCN8<7lDuFd2A+(u(iTs#Cn{0XnD<%n80FyCn|O`Verv2VPfL0toRO6R%`iD)}r9+fJ-7zm0AG? zj_`b2y(i7$DzN`Le9;?y7t*^LHUzZ%*Ebdpk?cz_YIf7MfbWtX$KO!H$L=7LLj3xh zm1-9gA7-e865NTL-Ilh;L!*!xB(-Rz-gR-uXLPNuWw^i8KX>ZrEhq6+fmEj=oOg3T zNDN%9c$cWctn2jaml^{8U3MIHbDzTDFiNu9VZs0y9s)o=7I+eH)sgcT#j}0NwBf-o ztnk^+xI3Q?8`pc!sq|z%0qQwobAO@X?PO!^Dv2`54Mol2BX7cu$k_$1qh}$~-tyUF z*vonq-?8w5tu?;94O@5Cmo)&X0Du4lY>eYVSva=^2lfK# z^&X@OX}^f*J*-ju!~_`mHF^WbB#ofRv1EVJ&h)fQ#dFbvz(bEP>F$wsB1Ox|Xod`G^@mDqGxSV$ z@cU@w>TYA#;IY^{W|~e2&K)S5{fw^_JcJr5B*DnZ*iIg5RX6Ru@aoXRCG1ZUOok1J zgKEZG&m_DeCH>1Bq9#%fU3n&~EHZcn-!6xxa_w^igv*P~xJJvs{GppCquT=Wbc^ed zCZe&kAQ!yLXtJA`7lgN2O#q&8GwQq#+M#-1=x>t=0%r;~YYYi!26om=%7mOi(g5uH`wUr#ZjB&1A9dpiM8|6%hJ0Y+ zsmhD@R8wH+wzdG}x}e$!K)*#GZor2=QrYBkv@vmqwnY)nt$gbVbq4`_igg^5%>#w~ z297FvH!PZoL*ZA!lP7rVNZ0UZ`E>>vWx51~xT9)k#(#pk=u=xsg*)iAm4&1vdOjpr|sK6^j8DcoR5 z(859+kYjb4_cLAaGKv3Iv*r@iq(I+K!RPEm2q}9lZBGQq**uPS+R^NpABvMouY??a zO!hvcJl6S#<*SZ+BoAD4|807dMtQYCqs1V1*oVAhOXsOz4|D?y7+pa|@zU|Js_E$^ zxLco}#i_OBr+IhgVx+9r-i*8JGj8f-{S#^F?S6=TJ7ua+Nq%?dOf5zHsPp#%zII zDo|<@6iD9wJx2>9{<|J4^A4Xjeaf@ ziraU1R?Y#eMNljn5^OK&6qa8v@!ITDBMakk%%lYM7uf^BP55`YjU3dsbptvIs4w`5 z=#ILR+?qFXP>0Kv(N@QE5)mJ2_!$7o<{OY(kO*Bbt8wT|{%hul2py}FhL>KVp3vvO8iQSdBTKu z=*?SIfOe>y4-gS~cDff*Kmg;jdH86sV(W&fWON@{5ys-Q{wDp8UHT)*cPIfo`<0k3 zgH*e)&QW>LPbVDL$S*!Gk!w+>uGrAI$LvlK=<~G70JOb)$h`AHT?o{!>*MIxf&li`_cQyYl;@S^!B-+jK{CpFz|VD0hQUtCS5lm5mb{=Al%@8~>0fJ!Rs!y?s=7)XBQ`@k5nBW~K8F2~_8|)T(y8iLQA~ z!O9$t1aXv@Lv58!nr$8H7j@6coVD>bW`P|1XQIdlmQRRxOgVm$AE?hdivCq zLU62D;DTM$%dx~D&|L)9;~gHiJP2_=ye{k5h)1*$n<*n}Nc;|YBwO`ql@R#$bg#F- zzNGh^1ZD{XjuH$Cr&mht1-wOqsMRAix#eZ%2p}GQQ9K6JB%I`Z`#7er0J7299tzki zfAD%MmR_4K`kziW;DMrnW6F2-p)@kDsB+ z$@INVT@x{wVZm5CFc8)`D zZj|p}`fWcLF^r32@`R_iaUs*lYz2YpU(UssL2I(S%V|0-OEw^l;c^Rqb@Q1 zxtr}}L^Io0 z^3s($e71ZJQnU>WyFby(=som>IewK*S!V)bj26L8xZ#OuF!(rjOF_JH>x0QNk*Hi6 zV`<7B$>cXDf!gF_TI?13r=^aag(s4$@Cfj&U`(3TTkv8CCJaR3hXm67#kK^yRW`~j zDQZJ2Ke%_g{p!=Gh|d64HB;R#ZbCWCZeC^cIcI2|>$}wM_ttcw*REYYPPWj@;b4l# z*Me=OLoQ$LfiuPwlZu|VIa>GbnMzkGrH}T82hDCYdG(0!z!`G?V^s-QxJfi0wC7Zd zhP1~3966BK02JZ^_q~CC;%8f%mT1l*)b-L9T-t&7fz{xTPdOwHvViDJ=m~S&@yDUs z%Hh3;qn+Wx%>*B*hiY93e6iqHMc3H33;&CJvU}fT>^%T5T$7`00zsZfK^nqeTFul6WeENAC~UY?vZZTO7sG6FYrLh8dfDul2!kSh2cA?#ESb#?W7cK z8Rzb3_WTKPIc1=pM2N`Zqr($Sgj(LX&>X${lm?lKU!C<&7qTVP>ozARsei*|-AC|H zuN!n6x~!kjLG65Q%Q1|uMSmK$#j>V|tT zti95uEma7Q2ldq(3F~LtnlGOksrJPHs|J7oe!C$yA27GL3t4}IsqZ}x9eL^b_lWv` z1B{^O;vHAE>MDBR1U9$r7k|+u5Omw3;uD)nKdyMfqlgpBFfS=~*~kOFRPh3>y5tX~ z{y~@kUVs72!0$lR?mU}F77?`ExdiIJ%=-5Jh4q;NX~hF*;GIoT;1+9eFr?`oK_N;M zRCh0fXy!zsRkrGvZxgo~C5QPN-mZN+a6_&f@*!1F+d$oKdAVhNp+(V91@~KF?kd=b z+U1`_vsb%FE*Ex`%b8eH=kCL7+~Mb&Gk<`l2_itppS*ouME5SjZZK79|&VXbl8@NY_CuT^+`m)qCNw0qT`+b;EAumWqIIp=NqCW`Pi$`T;X znK&+Z+Q$EGTCgk;frju1QDe!C$}d-ymr!F=reXs^<)nKE(Cldo*>2HBQmR1>UAoY zfFhXe*kU(2-Dy>mb_LSP-^X2bJ!D)mb)HAV0 z)G5$$I5Xrv&G=K_45RBz+KoP%UWI`uAVv*l^REhq6kmQzpQpijLXBXrLL6$`HciS@ zfrP?cMymixD`rKZ?1Ow2hYiXGSC@_DZ|G{2-_py(*i38H+>T$UlW-VD5Jo2^4la~9 zQcn}c4(jU^`XfemgAXy~UZkasl2M9goyFBU}5>xeh)^NOv@`aVdb-j=Y-S$0yYG!@?nd%F6jYp%hkE0C%n$~1$Th>EtHa) z*?Rsmr*Q2lh-NFSOp=5X)-7n0m*;6hsyo6Zl)@+E&}A{oop|XUm!cA%!nSjOD=o0s z+XGfgi#GTBgevi2=%%XfS^ZMchT$2n24@X&VSzKf7mk{#V_9_YE(Bg9xd9$fZ#rh| zD<&i{u=E@&s4D-~QqhC^wT8v=VYbx0wt#cr*PG>A8N84F2>?C}VDtg`ytGdCZtWkE zinRwzu{7xwg9z4OA3c|0eK%g+la991bg#9Ssw;_5W$1>skKFQV)$?uwC3}Or8gEQK z@FZ3Rcd-)i9$fGLl7-=ydIrBx=>n`A=|D~rRr~Unjb4{iwICMnlF&``;oaTGxInLM zr=|@&d~rBGsR%@zzm!W2YjfACl4~HlG%H}<`q6;x$14=9EL8L@urMWv^toNccp2pM zx;_on|I6O~Mb+=(gHqNG!>DfwiNoKzW`^I4XMx_l)({-+f)O%SRm+rG3)}+-9Wmoe z5a5741SU*!$6TR)G3Nqx!NJNN3Od%@`8fp*&ATtOES4w0|DoSj5i;s!BNI*BqY6Hss^WNi1Y>f=i z`8ySIXw*dtEPQBu)F7}uGXMr!r$<|XQ|j91&=58vFu`$~f>uBfCNTh9L4YX(4VQXX zZU7`VXz*0NbbW9a?2;6Fj@G0>ek!mOt@K9yRe5;*&xz@nOm79Mw7J*Ios9^)xQ6(k%o$0HHK} z?`TlgYVwf+!#b_YP4kJ3Q-h(PaNGl!Ul~l;Xi5T?Q1jAO)L|5-^vTbPFW_E~t6KNPDDv;e z76tQ3{7??iBfYq@?e~PmAAg9d(o}V!X-R+1Rq*37PD<-vv=r!2K|rhMk(wRf-r!;l z;ZPEC(>Q67aOV>rwi*0{d~s+U8G zbt=wiMrNZqCt3Ovw3%Z$24^B46bD8!AHXY-@HItyd|~qSKZAeJz%FP=LDfs^U% z_d>=bBQH-*9ttico_==k#EXgm3(9{#J!#T=dPuvF1?QCbpxkDWUhZr?7LMZWGL1da zr^$=h5x9tRkz20eGwHpzhs{rzOcKJgPrOz~m+>g1Nrljp2F82!G)k!f7XTD~5!@#o zvjfFS{wseH%^y^7_PYBby8sD!(eQ7I2xkM*vKt9Bi z+?9ar548=nEw>Yrt_P7|ZE6&5g-AdXL;*Nycsr+q!Z0Pkzj_j=+p^=dq&HyGCkfM{ z(09o#{M$QnHD=bv401@^zF?zeu4#GvQ|I6EMXMsV$);ZoS5shYdA)Q>sRLcDo;rp& zrZ;o=o$pvnXPKEpZ<9o#J^iA2eG8Hh7@dM$q8c??-sweB`@dQ1IzSKs3|d#V43x5r2pgxei1m(_I4TNHk$9grL!`mUYlEFW?Hs4 z4F;xpaO5ifb6QY>0-&A1BsCteZ~Et`7DQwW_lNYVVhziqELL~`O=ZZuiD-&&N1!x6 z#w!&rUDcPyu_fTIC+S>1vKjoj(LwA$vh8vep#!19;U%mb;?_(KN&z(k`@_W9I~`AY z%LNwTPj+AKz7~Jqu6((!uLf}+?A_sxqES$ z0KlRQYF#4U`f!_4GY5ga`h8Q#Y*Y;i7D4;+d_7)GripGGEnBjddHF9%$Z<;hPhRc@ zT&1%qpv{SO|GIALcvM^rAc5Olq+nwdvL3%P0}c6kd)wtE{vYcDCzz@H_b?FA09IG% zcw}ZL;nT|)={|jjzR3KCn>+0@u_Thos8h4DQ@aW07g;Y?SY;vPuDXFMqxWsu_aJi zbLp+Dw<#)PxJ*w;w<$H*`A7Sja!;J|;)PzYVd;)(Pl?9!TgcSxCTMu-k=H2`?%Fso zE}vEA2|T)(D(iey?I z@5qiq+ICy8d~B+v66(%q!l*d)2VTdYZVuzLP;$xEw?k)bs)kRu$&7Vs-(`l$#N7s~@rY zcj>PTO)$lL0Y7i~5dG_b7mDyV`nkvMu@SNfAk?t|a5A z=x^1f)r|XNVOYTt$lcZZNsI1H(H|C{r#=n-J%daq5qLaa3}t<*kvwURDN{K#bL>CV zHLUJQ*_ddaeb}nD5yOkpQT#MCuaS%{KsFI&k13};wRjlf+eCERw<)5<^%(uYF3LUO zo%)|xXF`(j>3s5RCvo@9n>EY_T1?!Gx1VM(D0*JS^gB4@Spc)c5|`ry$#*#rbZsHA z_=|s|11Sbzk9!|U(&}@>z&4nWa?N5b!v+S9->Ab;b2Z3{uh~bE2f8>6>+#J&lJPe5 z=wGuPo|cef;6`YqKeN~U5;IF8@lu~%l$Z;6{nra1>VKYoatV<|Sl_xt6VTs(4z7P$P zp23QrVk%=r@8jW*?NOeQ(NBWw z45C5VJdVEXpR-iDWsswuY?1?w#^5S5vo|IUJ`tI722=j0!ygo-)gcf?c2o6tYH-*M zG_kS}M1z)mXO=wMHW9yiz7ow3@y}%zTTrn$QDZ%KFcoicF^x5kz=0~RGQPG)w>vE+)|2?{ETr62C zyhfn8>01JTnPuZ&fQ3$LT5$4IalY}{L&-Up)hS(WpL-1HK2MrL;WZd*_bhMk>`2Z0 zdylT{{aLul7~*sg0%DvHtwK?@ldXuwd=+-ht%%_@B+Y75of$pMGj5^mlS%W;Sl#mKPFR zi(Ns9RDO{=4?}G}AK-I~E+rON-{UgJk$@^}W`wqn%XQx1s6g1jxv~%etdax8k8#yE zuU(&0#1c-et*!)*iEq*@Z;CVMl<#R3Hq=IJ=R}JF^qKp~hAiWlIM6<%|bC%{R5-M;=*qlHs|_^v2HsO)`5#)tMFu*UCLCW567aJX4~7B!k? zc{0MJ_Ctv11(AMSnB{|pS3+&-9#x>8#joRC1T9|aw`20mSk7j~zF+iuH6>^Uw%?BC z>0cd(OPPM#`1Mh(;W(5U3cY}f6Ucw+TsSPpRCFN85nN&KL z?|br>s9ih=sOBizeMi8{Kz}t>eTpAiG-y~6+y$wBB&a~Di_aW_UU>^rg+NwTeiXn9 zZ@fkPfO`S?n5;1&SHbFK#Kzw5y>x2<;C!Tfnsrjd&s$O0zlnGuxRN^k?l0#XjB<(y;CU`&}$F!ibcPLkd8 zKVeT_E)$#MBdx8^E<3gWJNSWN1skK}ZK@JvyTSbrFdrrvR>ASEPk2Rkd#n6;7=DIx zx7R$uA@7`rp_>@?Gj{(7DAx*HWz8d7^czX}@h6mf!9SxjjQ09*1C~ujuYTeloFr#p zZ{>XPmH3pk4W~ch{4OW10$CXy!D0Y6ASmfNKSMsKu$vSg?kFaP5CFaB@fDM(INTc85|x;F5-7Ndyo@Fn78FGsK#zzU4_1Nr>L; z-q=E2V(GuT$Z(i>F%~P%p?Vw6FrQB6ePaYJB~YKkiPNgT3qhW%UT!c=?jZKjBd3}A zgd%;HLDyrAaQx+lW$%D&!W$u&>HZKyZ(rg?NoV2(0f{d#K#CxB_38B|dz2NIh#Ji& z^HLaHlW_@^Jddtx(q5NcW|e`9^GfP3P$lA-dC)jHL3(71^szW*n~c8;z4vx@)1*+s{i>r6XeE&I7dv|KY%9$YAY*6p#jZ|F(*25ApTaSE2K{zw~$+KQBp?^ z-0`?mHnOu%F5r{RriqoRSLvg6L2;|#|9TUD`+t2*C^H1}!gJvPL!9QkCiKP&5UR>3 zxZFh3B^|p+8}I0SJkGMKm{I}N-=I|j%oza@CC??iNgxdR;oQs8f%L;3=K zsXY|)bveDA-cF`7WnnbHtc#nlGH~(^sM+eqTbxb}^r;Kgq7C0HoWF!wX5?$$&l*bA ze?>YJS=qK3yFu;V#7&z)q(p6CPwzQ;57UDeHx=6gavsezdGxy3yAuomL626j&asRS z2?P6a18JcLRkF$EJPeH7ctQAP;oAaw8l-A?TA86u(e2zRFfhq!5cl~Ewax;AYMz?} z$X5VHGX^iW@gn*ie%doNg#4Q~VocxV05#NE(oeKRy`5OQxdAZTUdDv=<^ zncMIUdJTwq6nPh{3tL`)3AW5y9hK*OqycKk zuOxKKtlW86x614VB`dpP_gvUMMLYUqq2+JVbEBnA%vc%?i7Fn1MD5C6jEHcLEbl1% zooT)l=}OO|K6F|hYLLBKHT4O0wZg(FPSMqeBIP`Y=dnp2U<|A2B-Z|l_i?qX#GXgb z6Bl5V5FdY%>faK|-Sm-}GE-i*5*8C)!0rdijsMXurRaE+)SUha-BkzXrg1bNU~Auc zAiy?M-7Ekg*}xCFn{?ch@e!4ge`5KstXwdVScbJKw#`KD{*K~7gf(hKaTyRJ*-GVB z@em)vRPkiH5NwtvEhdyNF+v$GBgOVhapJZcl1iI&OPcgi`R1b~rkPxcit0TXAHD*e z=S9q{x}TyDvrEVrB4yG#K4ZE%re9rp57aNtdXNzgwBv>;}}Qzqr9aidJK z7+`$}&~JE@FCf&)LzkVp*g84!NZ_dgJ2Zq8k2?drCV&MQT0ow#h&Mz)NyW{Ncv&@% z97lh<8ly}SsQ!VF$`q`0lrB{1U8xGWv<&`2Q&o3lz8i~$*sEF(<?RAB^ee!JOo z$=vfIl>_(3CtB=!BY$KRarR@Mr_Si9eg+V@LY0cXqqhU2mH>CL%!hUiKEa_Ph$X)o zJchhSA(*5JRhA=M`iY;Xb}*rgl7tB%RK&4Az$@GLuxGgm9h59&jA=u{n^}lM20a0s z(>YN-ukERcoinzCr4NtC?fqJ~Gf?n^3YmfR{j2|kv>ZR*J%S{0KG ziqPRUxTkjxJsT!OQg&RL93+c|e5@i*6nU6Mes!Bdy&xyoSc9?bA_e5x6}IiJV51J) z+W+2hvv3oF4(otp|BJm3iUq3rs|0Guz+kf|p7V{ZhN4fB-SVGIhCIIhbCq~Gcd!lj z@*wrpNTc`aA44-Rs6j^DNwSS@#dZ(a0sY2qj>Q+7#Pe8^$O{&R->2^=3^DJ{_`$(7 zG56g=67&x$<2xCPX}XIG00j$*F}m_R;0Nw&JDH21o>p4!=cO(cu={9ClB@{c(oTmU zAhk_g^QThs_K5V?Fb))FuEk!Ze;EckAH*IiCZ{K#=tY^Em-iVJ6e6I#uh7p^dz4ap z0GVzG!CtdyzYSnK1SF0A5AP(gA#GEPJ^**|===%J)R8>aH(Y04lb7f(qhj5`6k#2t z)W<=cn_2y@=s}ZJw%;Fvf*rh|_Kb(*xX+g3A%V2HZ9r!OF}7%5DK3*ZbDkfYJ5QI) z8qjyz#Prvht?m*K47xd=RlKQLuA6G1b&&N~3s?fxuT%Sd^qY2Ce8msMxGEmRNGel@DdHQL(`K;)hGe>8Uj8!+ zQr*VaFHOIFYDg+>ay63F9UjOj!OTXfGlLh>5haoTL7Zz;`=he?XrwcKX9mT;bu52| zHqr}eA9W`)8bY-w3II@;b5~b#)uv&K6wiXLH;KEmS$8sf@7EEZPcC}t&8O1+MT!q8 zF~q&l;9d%w23XfmFIVhF@W7^!Bu4EUrWe*q9_A1PEI10l$8~h|e$=k3F9-4?+6@Kv za?Y7I!S3SpjqmZ*b35*C3|fNCC!@gT?e%blFuVN4z?{M$PApWbP|JKU#BaFs{WI`u z^Gy-uBs)ijdOtQEWOaDdNk8859^dF4pQ27I@w1IDc8CAR)>p?xy={G)fRai|Bhnqh z&{Cpw2?9e4NHe6gl*AAsEh#14-6;*yT|-HC*SqmN_r2#_&mY7GW`48x+AF_nueF3< zQ>RO-yq+VNO_l!T_Y+l@qUKuxR)T|=CCXM5K%8wXHuPld4L<(H{;F1oNdB_9UL43# zz1m85Jjn0S`gcU-BY&a+DGJarWY)3nd(yHVm^qQqU=47&o5Y08zIB0i)AlO+##eIw zJ0~xrbhGqHF%?m4pR_+s@7gP10vDH9hv&=fy=4s(m>0+vdRL1u!VPPf7Zgc)JFGG> zAWxQc=W<{C63+6fLMt~}UM;dcA#hLc!Xsr|_5&T3Z1f3{@LLSEd%?(zZ!w!bc2T@6 zHN&VL%1?B8bPWyh?65`?=PWG26dW~!X>j9grat29R;RqXsa7u^@2?;m6z2tEaNETS zqY3eao40*waGgBvmp@bgB8fGy!G)mY?@Kq&#dDBW_E=BPSc+Wy0J)a`U?;7msfu_L_cXHGU_A~##j4-E*Vn86)@@5UXAv4` zm)X9sb5~H$ieAN*Uaww0qu_2dONgDuix0kLJm+S9mpjXEX#p3>aBW-nI|U~V30 zVA&!5y)!l+)QMx^G?_Zx5+=U@wev2npfDdaGDn9B2pRNf1I&ul;+9mT$6 zb@PYM>}h&Sd|Tr!1x8d;3POz(?FJAedZC3d@G;81$HgoE@R zYR*W08M2lC?a}AD-@@jV;>kaYBz3*O+pX$;Y^(M#ziWeCEo;B6D#v@3eOY%o4lSKG zF3gc{__ij<-eP(QV9tyfJlbKqf=0OpRhhLO-FiSttXJr0#P4DN7f=H|c|cZKkU)j% zmHBH19?fy5T2NH<{W4{62-Sm}J=%q5c>lvri%$ZWSNGsPP4F|$E!>Y7^hJEpMpX<- zlLBhZY_h#~BuK8GleENnvGF1s4}t=U<-zr&Q)ez|uvg1<@uHcn!eCD&bgmX$pA}pu zOS|*F$p{SGz=~w57|FgXx*(Sj@^P`wX@%z*azqAk?>%bnZPdI5MWw#*AaL#O@MJ4_ zzl&^!YQ$J1xEJ4Nmue^HBz!p0n)Cik(Xp3^2c*G;10TX^w$KaZ;lm~{&Lw)$Co40Z z&mK=w+4v-rV~*_-Mj~6ehJk5~HK!kJTC$h{e3`S|2I}NqeY8goCzE+E$;j_mvnvS- zt{BP_r=2->z&s)_BOCSAYZ@$+YkDoY9x!9vMUeIA*Z9wPWEOCBW&lhBE}Vd~RcZ>g zjff&yR)9v2)`xo&5Eb&~>%qF_`gw;hIl;u#)+K!UJF?@%;(^FJDyiY)j zVeYNtL;fc&BXT{npi2@4ezHj|Dwl3%lc$dX zD%@cvr|~`x@6$+tyx4gM`|XQ}NE}Ge4f0F0I8%J1Jc|$a=XrWym$OIWJDx;2aIGZK zl2|s6NxR*3I|?YcW~r_G=kXvIHUS9JQ93&>`LB`);$`&X1-Ycpc0fyRG|?EVFAy#_prLXp}K> zUO#G+r_=E}Fj&Lci~deQF?m0Q}=$alIiYjK4LSTv@<$27t_QvSgHgXPb z9r29Gmbt3&0vY0=c>R<;j^M3P?k5cLWym?8wIG3y1!o8-2^p~poLu{oy4{0YfPY3T zaOL{W9Nbnj9Ip%*F{SA}o~k&$Xq|%$qhO)H$;b`C{WWOiWzObCEkI+e7I@N@bl#TI zkWw+S0(f^NrmB@kVVXj=pI04#5VgAP^zr0*17Z7^zjDfSV=gY9jvPAz7KLtJh{zqD z_nK^xEXU#22%U(6x-y{$WFOC2cbY-JY)~GfNUaM59CY#_Z!VcCY@gnGkpN}~I(yQC ziaEb7AyA25_-)-Dv;rqr1zo*%M?GHv6ZO#m1^y`Vo#<#TsE;i?)htjxz8BG4RJsuS zpo*s1TBQ^oQ6A`hzfM;B7Ton}!U$+&zkQ)~zvbFymmA*AaamEMzH0vH49)dYa%s@@ zoV>U4fEkCFu0qKwE1^Du_+d7Nr15PdRAzi)mI~0&vP4&u+(i+zyP8^C<#XH>elvNP zv$wU=eMFXQ;u=Ega7VL@rLBR_Jl6C}x_%A&FLoP7W90d}d%hZ@z%9G%T7~v5-K5<~Cn%FeUNvL$*bxMIOVAgx)~UMua;g@Lj5JO&x}TYo)@ez_SI5*4 zNe>3(yz}Bk@#ORVkca)CoYZk;r;Yd3FXAg>67OcSxw}@Y$S%>iNnQu{GQ1cSkj*Ea zI8Im?}rf{Rlb7lE-L|rtz&kbIMGLLSUTTu+{F=hJ`TcEP_w?LD95F{(9gFNrWswgh}kW z^?P+avE$eti#<|MX4S=emZ@{kruWIc*Ri!7JS%ZFz1_~L$1^=hTm-C1Hrnficp?sV zZ|v-Pw%k5csl)m{I&$S#P*dhVrB3@LUhu)uuZwEfLe)}=Z}$UYlxcK1CO)wS!71ps zpx@}e!uQJ3+u`T!CG%@&bOk>w6rmU-$AW>cPK7HtnyTqW zuxhJNx_+`BWFIoRQCB>)wl-C|(wc4HF35#;Y%q|P3te?J{1`Q1YT;4K^&zwK8Kt1@ zyvifo*bEArwQxn3eZAef>kdjc3g>yIU23+M~ zl@*whJxW}0Vzw00363-ejdyRV-lo}UQGy6i9X_u*qyo+r)2<0Y;U zXP2EEs3Y1fzEp#?$6RENH7luoyV+|*358eSX$-wBuJZm{f*F}X?t<*$p`wuMIQ{E- zx$*11@gr?U+pp#u9wFg<%9#cchZ8|4jz+BBqJBx4l`>aKO4kL_F6B zd=A&s7Beasa-(D}@6DVYT7xy}&1;WRmX_|Xx6Jyu*6$s73&{m**z0XrTIjn82%4-G zJ`y6kJd=oGiGnPo)EqDl&(GR~T-cONU-K!|Y#zA3$``?N&v?Gi>P9>Bm{qQ34~59R za_n@S4EplI7RM*>>hNT27TR{{rq@J9^F0S5(A@4?H-1XS$b4C~G_kkI4O1~3)V3F~A0lTe%66=UVR0&r@~Yw{SopWnAHwOmXO(R4s1$bRX9hD|8Q{!LmM z7X6ELT6aLh4E6w@Bb)h>H`UDvHu$I`qReW4(+T_??dx>?6^u5eu^?J^`h zUvb#%v7BGM19Vfpd1aa2Ig|b*-#R9L0q@>DT)vGh_lvCMsan6-gu;-^F!|H=RL?k1 zdQOQ+R+09(j4X4>u1A^9GmWd5F4*}3t*-I}S1WFFf!p>|$m2p>lkQ~K>(_(J)PhKi zg%zBm(#~X@!c~|}$Vj5c!g|*7TVCNE!VYB5WH1D_yr8zn!fmC;!tMzhb(lpp7w04E z+4fWH<2DY>jlLShi4#?)V~MC%)ue%#QVt1i0_f5hfmr#*OtiTMw8tr;81p)>bi7|- zp0(Wh%rO$zy0cIPSrll%!k|!J6ndVUY5AkaMa@7|K}}N&CSx!B#>v7_#Od{0mpaS$ zNP@IbH)6XzLzFA-8lbaejzUHeN=;jQ3=UIg&1XOIHS(@XRyz^s_$#sTiRK$@=FbJ0 z;}Sj+`D<%RTr!d>&gI=g(To4usLjS_OV1!>YgDi8Km@T$|@S_YT63ZZzbKaJWqRvC>L4a$S+zGAX<8wyUb!C`x;br!O!^j> zC7Y(U)#SDA_@AbIdZftD?t2@FKf`%u5N@!nx{RZ;6g7ksH5&2ex$-dQFjom@X$g#i zSwv9LY8UbNhfiSF6a44Q=Fqu{Zdf6WK{%qRZRwhp{DD&A>g2a*JXRi^fVVUWRWq%r zyWe}zrOBgTvc~90Hnw=K-Vf_;5t7wuYAo^UkkEREfVaw0x;@?|ZM^4W{4fkRolzQ! z+S5v@ENu||Q^l;l(&^ZIq4t=yf4t&@-TDNQ2O zV$^F>;KG6QxJhPk!u1#!L4yjG;;OT-C4618-v5BwcuMM0%UX!W-&_V|Oi%fPX&tS;4RTfIG12 zyogtspgb(YC8dI8Au$VUk1JH^7#M$s)N}F+OU)@{T;=rT@U~PO(`1{S`YXPf-4!x1 z;`%JX4bsv z{1c9a@$HUowxN1_xAcWN6YjSQbqFzHllea8kmRs-o<2s(j)BP!aTZ?`*9Nz}kUj2!JSVSvgIr3;P>r-5ER!jE)urU|f zr^Y%DEl4e#TIa6^Pl(;;g}u+G3kJ(YtXNU@oy<0zWNg+9QS61>g%Eow?WS@mmQFvW4_|*E{=7l- zm0}BhK&t3rmX*}U*xTklC={uf6=WHv?;B-AUTTS(nS@ePkJ3OcL*4f_S9ZDi_45V& z>ker5rY?7i9Yo}2Q0!~7V3jzFRun&bo3H1d%+}Jl+LO5lYsBZu%H_riL^enTsxVk*l(~z5E>WCgqP0ZV%p}MwWhbto=-{sv#A&1jC`mlBSH7W=+%4Ydr9L zy}YBg8~R`ngPKfQINFbuWYgX?IP(EEPCA{mN^}t`EWYN6%aJTWI=l4y(F8Gl>*`IC z5Pyt85^4cy*XUbp=z8oMiF`nkw`aI&f z%mq=X+~Z5E-U6Seru#zs;ZR}+G}8PeWtXdW^cap3z$zsc$%2L#N|^8t|@a9#J#i19zL$i8I>S0{_-f%@9aEd&{cb6C?K|xt564z=84Fs zrzf{QcHAaI+6lcyhKA%w7Jg}REL>WFY4Uiywg&UedzGjuRQo=oH4KlZhyBqyf*)O) zF4yem){AxxAD{qGD7>-$^R4BUt0?44@O3Dj`g(6Gcr7cwZ;dNK)8AeKUX1or4n-m- zF*Olhe3>!IfeTd0r0*Y3LK1<%HS3_(8(n0<=-L~MO9f3o_=2V>nO zcsL&yuXARWmF6^1g|DwV(LZp9CSfYqR{(H#aH^19w=<{!pbR`71<_0$#efa0QFz4T=I%Lk97Cdfci-uF?!kfYNKK*eNI&)aP$3(+Q zOuC8CxKr@RVi|t3Xt?MM&L6a^Vf4nnS8W69Mq5TeWVLNZezXoUyjn!O@1j~9{)27} z+1^%FHZU%vRclyp`#R!6H5R@A>1t{IF}@!|Uz$@StiefrNd8=m6UxdPYnWl|2Q&P?n4cbP{vVt|f%G9BD_A}Xj{VFUrZPjg+cnM- zWd(R@`41w@*@;2~tYN9Nz1)g8-}&&3zAc#PV-khJ!xUBC@j(#ihitQ-q+hTE{*Zju3asFQS!f*3 z(RH*rO)i`=8KSku36@#+$M$u0DB=>p0>J6-J1-*4qDEVFnK4!${IQCemnh(pcB{f+ z6r4lpFNqmI{qtyYf3wu=aeHg!u&HJoix_jTuf1j*{W1cJ>CZ!QrXc>tg>RH%@>{Yj zU5iWj@K+Ln^JDzuYw@IJO#-0EuRp0ai9UbO+4`io$%?tx9>32hOBp==&l4yoX?kS8 zg2>qnh3{KxGWT{r*V82a*H=0`YFdqf??XFUPo;(M+s2xIsHx+BFVfP$-7EM0L!`H< zy(u@s;0uCK7W|d{`@tL|HwWT)KaCxKW&6+bo6$sBIS*RPthIsl5_GpZrc2TpG55~m z{z<$pz_Tp)ZKmCwvDVDJ1>jr;svzC1r?E|cu%H7;Q$IKj8P5GLHn2~}-K{a^h{9=~ zN{GACAMCKRB?=MAowD)2Lr#VSsB(ZXhEkb|}~BM|&S@K0{Krik0- z&Z^%Ih1-~Ve}QvomooGyC&NxHQE`*yZU5CN^&YPiG<^`V^Pz&A<*!qazX z1C!=AgC>BG{f2eE14H3Om7TO#=)QM){wRv{rIzbsng9O`@U(-$pYtvaU(oS|VzM!U&>gnX~=HYfkI7 z>x=l!>)p%S|J@t-E%DR!@qy@djKd;aT(%jX&mAZ#prr@9QeEVxY^7`o4SI*veDoo89ssNX1#&UtPyJ?T{63T7@>~qLO@KD!6v3i+@)4 z?H`8$J0G9&+F4JO4d!+_0K6hn3yoX(WDO%W%7NWjZpH6F;s-y1#SUzaSi>>%Yhq|0g}i!ZFZ=DQ>;TyQtyc(Ka{7C7ZVYyg-6m{G4ZK5q`G8m>)1RZ91I zNaMlyG0~mx(dTkp$A4dr;#q&S*1(i|fVfV6bf>eb5dKQ#Jd_yQ!F0t)?yiy~1JHqw zezPZ0)9F!2c156(nSY!GE|<9t%HN+e5Hc$du~XVPj$9LDi@;2BW9}V`c#6N$HM5S0 zn|1?2>Q@ONV?&!qi>#xFQ|QW**1Fa^TP`q;6=``R_76tIR$%&~b9PTz&>Q$}DpSO} zT~EAje49)t{tBfJpsXIPw~gZfFBy;9;7W4x-;YOfHu!1QGoarO39I)Eg(@N7E&4Za z0ow8(tHn%pV-8jYFCgV&P5^8`pbOXlsGNT+mqTwh5gL>8E7AhTKFd%$f#Z!fELInUZ^nk*0qd9Qz?sJR1Rfj(#)r6hCkTYMVY2tcie|3F&SmNr)W~m<}&%3mVrdA*5|3*4z4|?#7fOgJ=FLr`iTUiKTdM%yaMK zDDXBPS&qOd^I#`Oq#GYcwDDi~rY$oLj?LLG9e`jIpj<-O=EFG#$C@X`2bCh!e?a3f z|Ba2wGH*?zv#$UPoS32i%;kSt_ zA_AX(1`!8H-SCaJI&S|Pfp;0KVRiVGki9C1QG^}ril5#eVCOK{9m>;!tS?#5R9 z57QrD%M0O4xNF9__weK_0tWeE2b&@L`=Pid%8nCoI(nHTSDJV}tBWZSe%_jVYK?0A^&%-JorXs_BTFh4d&mu{A?!90sa4?a5*Kx*9u#D0eOUzCE5v zNp-AaBggSnF*Is2Mui63tq47APv{OTY}}OPj8tqzZsuctmYT}f*<*1tp;+5BT`pOy zDK~24{-e*k>vw1*V-$ZYvjhD?2WAk9gE*;1j2QzQs_K6ab#+qF2`TIAv)oOJ$k4Z# zckN8vY59!3Op1I0+y}1gBhKrq!+PGF(72767R$XXOb+xRkeU{i4dgXwf4$~L#rqB= zunK&bMC{qM8Ik>(uDywytERrQovVhT>}A@DBXuwvL~S+~o#5ejG`klL{>-@3v~`Zt zh2B9+{TXpMap~WFmRyNV|5Ob8>@z9KmFQRhot~c7wCRDT!v#E&#P4LJ#XU|8J-{k%ptk=gfK?4xK*`4z2Sbk(nY%BaoQJUPdF@F)-t#0oS$U=J zezB&3eSLG*Ihb)~jY7umrpebd=JG)tsA9*#oO=?g3u1v9_K8}h{Vip=^K~$ z6R1);V^nS_7(K&_4V9Sw5LksyW<4|?n8aSc1+SP_{rPi>*_}M!^u0Ttq8^N&lm-@P z+~8Zw+!DYNsmJ)Odhse;6*M7Zyd{J~bTFP4wTJY}h!bx*FD|@4{VMwD;@)97+0*3x zwtVcc0l8|?V=ZYF8s&B)E?*-=w^6(^3H zmuP~bk_qcK(CgR2wADuG!PYa3T^~ci)@8k|M%(}>g7X@hKp-UPt_Sfy)X_33O)!o$ zDVz!6BwP})dYEph2;cL4$Bbb@8$?Y1vC$-fN=)K=J@2uvVe5DB$L_`QwvHvp*;j_amSIPg zMwR#i`^-)c`ka>&9OD+8gt|`ce_Tn?MOwh>w?m?f-*B{w@Jp{C$h=?y_myR4Q?-gX zY~!Ui8W}RblNwge^iA0aj{kaf(6mW0$T&~Uy;=f+(MfelTN(zo<@1}c~5H#zSX3c<`t%-l@_PTjExN_C`?AGj>JXIVtrM% z<1W~lix`?c^3gxuUDw_di^j-lrz@22nI<$t5V-E?s=QJ(&~;RjeJ%Pz`gFHC=A}fk zk%n=L?{s=hc)*0Vwi>8bMb zDvHw5>uNK_`4(A^2xIw7)+Qyh)Y;*L$s8u6#sQo8X}bBRBNT(&nF_)0wo_`9&_7v8 z(rb{S$6)n3nBM)7hyK<8-;OV-AhoEn?zMU@P4(8);8cV!C7b$>nA&%x34o{iyJwFj zbWVI|RHIbOldyi_zp3k`!dprS65aVC5phs#bw^+59SZXBFPNibbKNM{U%K`XfNM2Q zD~RrqKr;C z68m|(`wlg@RASFzT}B zh0S0SKolXddH3hQh?@KiF*v`$@}FBKU;XvFr_8@TSQn2`VpQH{!Z-TmYxN@(|!a+nbL^^c3!xe{N!IQ`|} zA$3BYEGbIiodQkxMdgT20e)~^yldA=_)Rgg(Er2mQte>>ODy{)r`?>R_4cMYRi_%S59*z+E zH&I66{#>WMGaHeg@tx zRVr1pzax%;M!FS52K86RAmGV+dw}$lsS&{Pa6;iJ)y-6v07(0fBUtAV#?%skuf&aX zS-@a+oi;Sr(s_hozIbbhyS&Y4SnvUJ-39;l#zNd+NKyXTV!a=uR7Y<90Mopd*0hN` zlR0q4yhF)EA(m#xHb#>>UaE@EA4Et-=VWIy(C7Y`e|h#Loi_Eo`x*G?31@Px`I_tA4VCt@hrOD6^*DB?U?`W1YQV?9;I z#m64e`?2wds zb6LDB|1skzOBQ2F(zl|#=Zuvm-<=0i(X;xgyPF(szWd>4`rEPNZKF(EvtO0D>#8W| zo9pvQ_gPk8%U2vK-;u?Z#glzfmKcb^eb~l5V)Xb@zq3$HRLL184%b#bok68TH5V&D zzE8h|d0$}#csbuK74z+aD}O~qg)4o3N2pr^Za^5}ap^$g-NI{^-ZfdCKV4Sy)oEv% zBGuc#a@~e}_>6QUm zD7)~L<|nbk)qPa@c;ff19Pz@roqZzo%Hpb-2#h4^KL3UXR+Ba(;5ILNTTk<~m}LRp z4+6G(|MmFKkb4?a;~swCGg4$O>(!Ue zTLbX*N0Ar{9iBE`RSfOICMi zivSj8C1FVfxX&80{-1wJ^W_FqAjfEY%ZgSN(nN-EWURS%F~X1@t@Q zp`q;gx^av+`d+`Vt$NQqgYkZ@s1?QkMNMaA8!>R3!5098ExHL`XNdo1mhZN`mP>Y@ zCUR?J;MR`vy!*v^4MXd7tU=lneL_~?y91GJI(y+~nQn&mweGcmDco?YZ0>ZV(WWe5 zm_&Z)7N$*M*Sl3JRYjhOWG8wzs#Y4Y(^`A77sSf-P6Dp4W5!h7C0v9+AT}p4us2Wr z>-f{R&C<;`4@V;yw`a=BPQEGjDogd({u+o;A+%+0;XYa6lvyr*Vrz8)x>Us%ta@W{RRhh<=9J+y9s^OUh&DBL~I{nzbq)4Vvo$_A}Tw4^DD zvHQ6kf{$G%>kEoh&LvCo>aXbY%p6nc$^^qs7PjP9UEhzrZE;>~HfE?-@X=sLD_in? zN@9_UOrs271X_yk6&;6KBOwT7)FyXj6G} zWIA`7!f_4iL@Y(aljv&a}i&w(o6Z2yH=uiYANo8=3!;qPsOF(p~Oi+Jjp*a_o?ehI?#*wycBb1)3wz8BGNcVLs z4%%M+=*j%O4uj-|+mg+FyBcU8qf}OL`Q(kM?Kd>Tm18_KByQw{S9!RvwQ`&icx0DW zq40(Ncz8-p$=4c;zl%yIMH~q8pw6M%S}8qd4Kx!4i&-)jyOco}^>26eJROrRHr{GI zb5E{Z<123HPrscKcqu_}s(buEu}s1}6H{sFbMsjPTl(!W0t3B#%Mn{Xy&y6-Kkbe_ z&O%uJ<1?i^v?D^QfJ4zj+APZ$h;2T*!keLo=fPZuqZTaB@71!YsXswkvt-F8wn#0s zXR&R1M#tEny$K;E^gK#d8AF>4;lQTSU)b(0xulLFcQbuPx*V{u*4d~~&{!YkcwJvF z=zD$Ij2!#TBBP;1Mvuw11O@$KWqanNa@hY~9OG#Vu~<+^hYjcoZ*v$ zmBw~`2X=i96W-GKkM*6V8gB}5k@HiTXPyKMQY5k~^#zaXPPy%<=c>oKDpsptz&CL+jSdf0ZW;poig#c2sbb?l0)-YLc1{=>6Y!;yB0 zd{YzEHq|XFIT5Mr(r%*@N$twFX4Eg$X9rUAArIZ)w|_cBhB-uKd(U8zoD_YdN<`(< zjzcwm>N$~|I^a~AS8wcbV-0OlCgS1x)FZ7=ey4zmNy>gIEF!uiM_YNSFEgTyH$p6n7Ih&%UTkPEqo<0;VrKQCxN^$#s#5Py8y|YC16+p6Yu=R--3X*n>1& zBD2P$@q9nm3*Q1$t%lOJqt{|r?!s!OY)(yMCr0BOA8}VG_s65cn2XPkoI6^XCnzLU zTI6>2$2B-1B^d=;F=HgXV>v&N_I`{x)Y+i~d^OB`sed?`4S6FeB*L&r-QYOVc;XNJ zdKEdy=w+y$*`F*v5IN?S9)Tp$W>}oVxorWAZofYQQb)vqhZt~#;wLgyKV_gaVV3ySxIWfGROG9y=0lALOp zj@nCQ4+(^Tau#IFgHd5{+sNu=5dQ#6W}3pf-w8kvP`cX{{|3jmhz| zXx#JZkE;$Jy6VLlKo%3GrAsThuzCMvg}uBx zr}h&O$-y0LH040_@Q+N$y^12n5E87mFUZBVTUA}*Ebnah4rGJ@Brxet*D92rvt>X* zjN`Zav8=lV5|zgn7^X!9Z%Xs=G!tB1emSg8~HYSvrkyDmd zS_@x=~Q~N}@gc^!pvCrMGyS2Cbu5rI7xfC~q z{40nr3-oLL0=s*j#(XUkm~Z1Z320Jj0?X5jYGNHKVXXpdSN_Tiw0 z;_OXN+){Si4gT3TCNFt*%4$z?rv)2p@(()E-iFmndFWaZjDuJ~d(3w%f5@>nqcxHTMkn zeFo$ua=+|;ep$$b16%8YF$P!j(YmJIck{>JqR`tA!80BF$0gNSMv03_U*PuMolAjX zq&Y++{`S?0RF-qL4EmS-Z%c4$*Nfb@(WDB0skiAnQ4vDROlk?V##CdaA^>qUwDsljo$+} zklijI!6Y+Mt8jS1<9i1o>NxS?bh%mWJ(2;9|gbS zf&}QftWc2A8+|xtc|UYz-U}2Bvf1)5YSD)`GUVS(m47M|kLG5B1H$ zG>G$Hr+ZP8_t_-n1iJ-Yn9wPSbHlVYhb>R=zTe__EZJP>HbGLh^zIHbI`jnJZsAFC zR@=4#Q0Gla?6ANYAZ9elC1t|rBXxBY#5`#Jb%f@GAJ1ZW+P130Jx}i~+{34qRFeEL z?A>)V)NBTQ4x)u?eggmWZ}U%o(Y_&AN_q=jHjUSZZu^@OuV}{0tEG2Yh#})ea%V3v zSf0I(`aXnt0wTYjAv(iv=vxzFa)?C)QMkXlurwiv@i(pH#BzTY5+qjKis-;D6^Yo$ z|Gp5Y6M)sh`{SxMou$%(K=p*DuCcNJg6Hd{C!xHzXJc+mdo(pjOl)vI-U2|Dexfl_ z)y{^fXE$j3s=QKX>w_QMVI!x3nvUzSiE^0Q8~kS97TlL7u1$k4-B(CrY7pVA^S;~( zt<**lT;=btM|^7@{;zX%Bo5u}Wyu{7G`Uwv6=X!Z!Z^u7sw+1^PP!=L62F8;UWOAA z+d8qg2HeJY3&Rf*;Z!R_xTizljc4QdJyRoctL)FfrjnTT@cSLs5NX{JtZUXqDDx zg1R3ooZR4*AHJWtZ4fZVTwD$fdtXNi7EM4bQoj}SBJstgS7$_wC5ah~f9nU_#WuJm z%2K(~U-aPpD$~m`v(A^h0UTzh3wZ^aD`Hq=VqyCGz@g|B)o^@S}#WJy}EAOuC3kq2es5Mk2w{4Jk z$Rsl2hYqXZ9@20*^=)8C%i<(=(3qHLEg$oh*`_XyR?c)mD+CTS^fyfpknl+S?3u<$ zt=AMVg7b3eKdBjqO`EW<0BrAx)y6a1Xz{#AM;&dt)<0^dEiF z4Csq-p+ zQ5jG5RK$;cQ z=zb_(7b?nm<_?1Q+J>f#gS9VNc+l9Y&~Y`**#zwo;usY#b#sA;k4VWS{>vU=+y@!{ z8)9_37H8Clmgh~!n$p6m3r%fSS(au|`P6=qhEbenZQ&S}0Kb{9yXWuTKjNkFS?&jMIQM1=(f@$f&I(nP6vEv7SW?VA7 z+@t?na)$`w<~sLY={nK8SyrH1vI}3~_GyYZNHx7PIn4AOAJ}(&UiRoV(%|UZe37e^ z?N&aKvIJS+HiZmynj)RKfLquxsuMVIZ>fa3!Or>Z%>g7Y&~!J(;`ImWerB ziw(#2@M*8d;scirH}$UaMHCE*+rr|WOC*o*1`sGJ!ON~>a^pP;m#X_{`X=!LmH7K> zBrN435+vPgCong8t$3dElvgh=J!jgIv&P#-6OZrbIdeW#d06?4xZ*;7QKsIr>ZN&) z#su#IyD28X6Y5@H_L$WBueYw3Ic;0KBHq=|zb13=(K_gSGt==YxR(}dK1NN0GXwV% zSs5`+?Sq{t0bMx}$;BRC-YU|JfS>PHG@f`A;@&rq+3P#^yb6)c=h=r$j@=f>---y{ z8NlkrXVAJZBMP<{6}nd^!*|K3?IF)V#n{nL6qj{;^O%Ca&H92j3#pCT|%{rKj4N_jS?sQ9aS+rcmFV!-- z$$ueBYZLU*u<7&tn0x%$CL+~s@Ka`zvd-H6PEk%WlELG3DIi_S>ZL$`4%_#04-_*RQ(hER7BD zdQBVtd-cFF=>uhqT7wADqqq-v>d7@i8ic9X`T z{DtvTeWC)Vp_e$Q!!EH{>l_bg%Tlw{f{TEhJTJ8kS1Eso%bkut1OUdx2(C9nWo0D@ zZUn^#4QEva@qN)%o(ey|SD0@jzAPOxc8s&C*6b^#O5;?PCDn@JXpN3x?4n=MUDuS> zaujFG@9o#%`liUwy){-l1UZfJc-dFoBg{(u6in%eUCxz|yN?hZrQfi6L#jm_5~Ys( ze`%>xJ}d0(=6Tth5LzByY<1&2ZR=U?v!fF3ljLKJ*G{!hrd?f^j>3S@PIOR#- zrQF?h1s;N^jqinq-wcY(WA|kimP|c&0fFiYg_*jP{rr-evxQ^!s0}m{13mIYq_(pW zu^PYbLoGw$m@+|#o|wtue0C`&XxVB!i>ME-F{{NqeUyE-G?8{L!2<&9 z+k`h~K-`oMSv=EP2*y<9CKd4pwVLPd&l68HJ_8tRf-rF0g5G zgk1<|m~cESKV2-eT5T_U0@H|iqx2haMp!XViD0(YMSM;+kYN^bZ=7se^Kq2;6!Y=i(lHyXMb*0VytBB5Aa<&n;B>lPf zW2vTCDugIrl45^eN-{+E0pl?+@Mz+kQ`g@}4vMjyQ_ISP&c)inp^=p911&$d=z?R0 zYT+JVr?No?8FiVMSdR_kxK+rv-;D8t8|NG+QvY&DxL9ir^4Wj?dXIJ2Xb^gw4<)Py z=hRqj1=d)#svU4T9yX-(HK&@&3>9L{pCo)p%j~E84~}D*4pSEoB86bm6)1)W3^M*WFzgqZ5KQ!Hinq{X8GDcz*f7Lkik;6A0 zZD&V}*R3A{$hnUbwyhYKj#LsKYnb}5cY)DlrM5}WDnx4rc_ee~S?&Ln#2m#U^ooG| z8-ql#HflZaL~ae&5^PkPuAm$Z^KP1)#C0|iR$kY+CY;1-^5~h=oFU;XyzP-M=EhtwB@K*0QKqg1Y-fdHbw2L6Q1vAn; zYp|RcacPkxb+%Th16xXM>gS-^C33LuqAa@c8YPX>=2|_OUa@k!5Yeg9!&po;r#gy& zgLGF7rZaX}&&V=i3*m3Inn4;k^=%UBnN?J21*OtrUm}bJsUCT-jXJJ*VB8^LC%Y%x z?uZnQM;Ng^l<%wAh`EF&lfI%bnJ>NBc&=sDsW$#6v0%ky{1BrsA!!OML`TpV6qZ?o zWM=hiDRm>n3e6tFRPBE`%FwK(E(YX8D?*S)oP=a@9(-_FMH74xAevi!YgPdj2J_io ziqd#qK*7Sb%$Y(MQy zTs`*y+aujQkCgQH+JMl3wzr|fxUcBZ?`eYg!^g0Vf}6>}6q_7~-E9rb99r&=fv6Fg zqFN>vU`#LMtMOdG_e$+>nwGR^Z^zb0IjJ&-jHu+&NWRw0nkaO1{vuw3CjBV{AsI_Q z?$yI*g5(rD;nWObn?ab;f<3?5L_ZcbpYidz81=;+RAs*oX8;eCx~P3t<`10}dr-;D zF5L8Lgu&c;orGjp6B+DXxR$nKZl|tfqwg;32&V$>Bqx!}8q8ZTa;G|d9?{ZqP?rsM zfck9!@wS0^bAhlL!gSWf>R$$8p+@V8;w8BC0XmE(8ho)!7nJS%LGKTL>q^^*2_PVn zT0#T!z8ryuj7=Yjna@$1hS?#Yx7sfwz#ZJf<7CdRa?qGHo_4qVWk*A(nqY$NFjmpR z{n_!k(lEQHnkuYs#0`nNYfv8^2l9Fv$#WGlbwd zt3^|}{soWxD`lQS4TAXpcGslpDlFa@>?W*=s(~QD!wgQ7=SXcAtF0K#kFj9k< zN@BRtzfW`F*2wCS;$&2B=IPTHg|oS7rmpUZ9?i^+K)!5Ca699U3GM_as&7Py`JoZMGE$4d>4t#L@|fbO0({c(}+BpU#H}yxaJ}a|&rB zSO~eZ!(cGYp{6#FJIXUZf`h=#OFW>0_jkt-Imcp@$1Hk~yY>o_go1RJJbr{PqhXN% zRf%P3VyiOOkO7=ZM<^Qbd(bLer(wrASY6!&B}Dx5?fn@EU=?DKp+ zRtKdy89JbIu5fQ&;%omAtxp!8%Rhx<%j5FO3x0RN?o>ZU3D)=?mk1F^bBV`IoxpwI zHMbSPvb@JEbqwV70;Xg-zs&%Yk5xH>N3gbct~px*5}GD?_^S&I9_2qv?SzbR@n9Fs z5_f$gO?P4yrhpUFjHx82UeA9ZfyHfZ1XL4uI2=YAtlQK7!u(pq|jNC@<^HP#0SE zu21kmWmfeOPYbOluoEh@xf1k-c>1O&6z3w{E}V_R-$hrD5EFk`(xpmENb{p6eu|X4 z{hZ%_s1ZAyz$Zp@Zr%;)%P~AaI&|QsWGaB`5~C>rW`B{=n+08I=#oiAv)q*Bn!Ohv4dtxNebb zPm_P*f4ey>=`9LwRqAB|ndmVYh-1=LI8;PDC7ts$vq@7F zW)4xl>D-dUXq`3BpVr~lts~-jg!@cV{b|@@X8UW$t~~RS^TS5X{}P!0!E<`5cENX{ zeys0DqBymO2SYK*Tx*EN@}@_A@q*H-IiYpcXb}hnYZYhnKTapso@J?PC~3r)Fg=4> z2dI~63&lJj3(Mm%suMR~>SwRqCL+}{RubO2>26$KVzrei-n-Y#J08rp<2(A}Hbmg1 zf|kU`TQ@^RMGfUY;8-;c;|n$%Htku7l%)HRTu0qK!F*)#OXoCet)QF25_8%E z?vXGcv#{%EtiWQ3wD8Ba_2; z7?PZQcEq!s=p|T3HLv_er(2Xw|00Fu2R8J-{Z!F=tl8$ezQ2VEt22%p=$9K-zOe_! z;9Lv2XTyY1u&`-C1z=^4Zi)m+4YvH=sWu_5#)y)(J&@Q+dqb7FlUB24@zY zmfnS52zsv?SKllll0BSDec1~~rRJ`}`^E&PDzT8QVUFp1#-pGnP=eCQgB!Lq-2JOd zx_o%w*GjA>DHl;q0zsl!Zo+$PA@3#G2)6e~MNdh2J)lc=6F{Ti7=*4U7P(mu)qx}O z&u~b2bfJN|gOIGKKM4!Slnoc~=F(LGwiNJ{6+y`wvd1G8apr@o=tGh*xTp8v zxc^#;^>(1%ZB8$wUJ&F-2Ki~fkrSj z0Y8H}I(DS<5@Oc#UQG7JV{^4%_CpmI_D!&>4N>E|sGomoUipMFUGZwJ?vNqqLUrx_ zKO2x7Ss~=r?~fcKBpGE-En<@jYN-Mqv+z^xLhYl1ShpESzZo-x<ZQA>A#(SO0{g8gR+%mYBdE*xeuF*^Dt z?%@0-;~kx<4xWJV4hGXJQfr`^Ur?}jPm)73qVIXv4hz-U*_7CVxez@LJ>@=1IGg2Hu+rpRhsw0T)d}t~Lvv|KCPndR#ob?#HsEI{s!+c;A~aFLBrCme$CTZ@ zWwzFNs6%iqE%RHqcm!F1F!yY`BVcIs{9Gi7J*O?O(9+^MjEs>RBbY*1va9FM#>y3c z{n9A73*|MUqc!L4fbIwO!nf0F&igm^I{a`iaD^20JhF~8)sdeikB-AqaDOEr_WA;a z{J1GjQh6aZgqojXX5H9*LvJWiJmN)j&xb&m^zOzi9_OU*n0YYa5Zk!dYE z=2}7V@<$++8c+P$DBqxH=(09|qf8v-98qp&w9BsWsiFl>BOOdu4=Xo&_ZsPs7itv2e(MWSeN9^SlV zUlNn-pGF*N>~*M+8jO*9z`;(Bld4>VrA0Sv5g@}`%&)dW>1`v;szY!fndPx|-a znTBqiy&)Qt=xzS!htK&ieVue&y*3GF@y{+bPW%h4qU7<^Io{8{RY;LaHOD%G2h<($ z7h^4%_}N3Yl`J>Z6GIrYZ<>}zWnxn)%8XA#saAGVzd+YUJlBydG3KdJ;`IDxyDD__ z5b(Nk<`Z|n=O0}J$GtYx1$^$$TNVORJiX1`?+|8$Lm-ktlhNWa96e|*NxBaH6;e1)vKd9-4E4YBrX8I` z4ce%-pm5P2+6DZIYn?&WbFv9%)yYrXC9LAH{%tZ4yhmbeVlVw`WH zQ!}Ay%3+snC|121^Rq?n(ZJJ>%SS5nVw9IBF|@5ptM^kTD-pefW<(rjx51u|M_lHz zW8hbmAsk~rvA#7@S{g8EQWOQdo^80PI}>!KIL8l8ekx$es9Kuu!%G&_w*2CB4HiH= zPd_8X(ILn48@x=Yqn>>*!U?l*{dzmoGGRJ59sGJl7Dh1c%@6i_zSzSPp~MPh>YUF; zY3{nZ4SzN~B|K`7!kUT0f-R+T@~e-KBmmLb6?y^W-f;pl3~aJYr2}7!4$Gw@!_64u zv~A$)bQ?~wFN=YHWk^;Q?9Mlww|T}vzI$UalfQpLH*`sR*fqi+4=<6_9>}-yT=GIn zxp*NJpO_o@IhN^ss*ZIkDM~9iG-=zISWfsTNZ!ZObPMEC?CVM zS=@4tlS?{i>KN(q=-M|TQ7cWa)kS#fniXIS7uk`KRI0fy{%%I6*TWG{%E^tpbuc=D z&D(gQscM7%hlSv?<<|%+)^w=>=RsQYGp9sKlo*zxo=W+$MSdi6o{( zL9nP$N_d$;A7PPrI{`fp4nXK#^VoQ3>jcQkV7s+7*OOtwheqVX7}Lwph!spi-u@2= zb?nH;*z(gfQ-vksdJM`bA$>4?^_?{JN>&4oW!HZukdvhM?HF~(!=$3Ut9~$S-lD2| zA%fQw2nOZJ-^Kq68v3Vmom*P$O}AO!%;1Da!4@R+p$_ zAe1SJ!MyL*pFV1fW>{g@OVmedrCG$Q6dDEe3cyG_aRSPlVlj|pH8NZY)8f?)-AR!3 z!x*mcbt#_q7P|@Vl$8Q2uY~R07ykT;tQn!7HK?vu@jDa3S`mw_{CN`kKne~i3i4+W z4~<*A?~p;)c zx`!(5^0Hjok;0NC{pgc_sk?&cgvmXb*$<5gPuygf-yiR3t6>4Yhxdo_mG{Qt9h9Ps zCaaJ46X0g*-T=c{?F^;jO+)ov?^XNk86bnD=#!DnytlHrJr~ipoEV7+bFi@cRdw8s z*yBPbqO}H!f?snx!H{z1U}e4C1RoC}MoX!bn!XVSd&iSYB7266^9+u_6GGeT-xRiW zK|%y9s^<8i?0@0pm!B|W)qDrEdks$axRW~uCKjGIbga>;ak ztn}zbNQ*JY#UUMP%piM({MAwQ#BE=TUilD77Nhq?ye9JBS$AaYk}agu?bp8=?({nI zz1kzdkyC9|8OOe-$;}5|LiU+;g_aL~ee~TzD~wu5eC(-w0-JQvElWo|5;*g-no@nx zhB_!NB<);=E1EtHec(?w)-1W=-~6C1-j%#q9NZTtU&A?#c6=gqXRZm^^WL@YH9#oz zV*GjTTb7S^C2u11FZlQ6Fvin1*Ana_ik1~m2|vpezM^*~QKn(|-$)2jSG z@f5(f13eg+D=3vFG4_IbCu|UEO}?)R3xcE76Cuo~o~@7ftybZAY@d7)%qQ+JW=Wdz zPc^hM{v5*RCGCP6C&lfTZ&^_3H3NZzb3S?4P;tR{31dX0s->+0cIPK^!c2(42>mPi zO&j=sG~ZJumfm9&LvYyU-v6`Y$-<~p9zdjHe)!_ zqaJuEZD~k|gMte{;WNRmnKCswbV8Cdv-^UDEk-wE@OF3!qj{Y9sUr7d&tMXNuKa?! z_&s1Ln8*!9oh`op5P>m_QO{m@{5>0Tgf#MZy7LsA+CK+<^6cKJfK^$N>ww#bXsH^o z_kMYDY|Cix|7KO_&Ri+w;f8*11H)KQByUt#WDi3**?m2!S$fT}bW6dk{(aq1;a7IilOJ29cQMpQvy=Ijg#bkI@ZO-u>|VWqswgs*>t-)O43Id? zNCi7L>m!^sf4_Bo?G;VgiA;0|+yz|kH#uRx&n$1AKGV!*V@Bi*Iv>#bc&n2XD~3ic z??8q`bT^R9ZAp;N@p@sQsi8rY+;8dlVymBYP}%z$!821+mkQq@A4%7Lzou)a`!d2g z*eg~fjt=Z1zWzm7(E$?v|f?8drZZ z+Xl7(S2TiZil3^==NO1=wA`b%%?TBMh(4u+cm+v^e(n1k(Z_af`67I=>&2W|{&d|~ zp_(3QQ_df5J4F~KE75uyUieS;dL>9UyYFZoG;0#(GwN0uWQg~(Z_obuP{ni_1DyF# z@uf0_B1@AGk|keVNNoYt4WgH=8i!zY>qb9r{>gB7K3z(KtU^{~F+gicL1sx&XvAWs zZ>ua`^iZr!LR{tuW7r~EOp+nH{_YhUv|)*V(#( z+v8P>ztw~8pdx;t0B^5|>J@3>odhogQf2cNTz)C;$x-p@l-%cU&nR$#8`7DHeTQ8lPIUxat;0;(!8 z2P-Gz&}JaN3(yH{5T6R4@g`ury30G#71ve_(-wl&ic^J4WsnZre6J0tSG@KWM+ho9 za~T|7z8|$R6-+fzEOv`JkR%+W*EhG1!EcABW`qs8>q!+As!Jn;(D-dS&=GaAH}@4h zJ2+1W3*CSq07fIawDeSi5uMB2wLt@C5gtq~DNJ43=tWJKcPX?CDm29Jx}zzpM1U$( zs%#csCQCg9X#-f8N@I^MUb}wSAnEqxW(+fiBJ=v#Ad|et0!13pkB*1h?+}P)JrYo0 zm#!%LX)J#6LUhWut^g46JK1;Br79=YcT@Z}Ur)a(G8M*ZEb2oQ$Y1EZ?)xQh`@YU! ztG7$*oAF?yR6QAmscMwX-fJBS8kbGLPTTDc)v^l$*1mF;n3_ z8bfZX&e<0qD`HYsV$aws#x0|dCKMbjHGFm6HHp-tL2!iXKkwqIT zwKa~w+tfT6RJVqhG+(@C1tIxXiCZKBoRytQkOTl@6fb3TuD_L3SD+3(%2YD- zzZ+XokcmB;wn}5@iHwwj}?2`J` zJj&&^qd%*Tkx;hCe)qj62(~Q3k}d9Faobk86f6JTP^3XU#4bteDWjnnP5$#(h|j){{}-U47Z9C&<_3RYZay@`9X3QaWz_wnPbJH3kgwxWaR!s z)AyycjjcGA8sVat^bzY%HLfG1l2!0`3dM;;g%#t>G<3D!EyQ_k-wDJm)l6!F2!J77 zX|zadCNwWZ*%txWND6Z;8Zg_Bj@u5YblCQ1)pS}ud8tp8VLaW|ck z8P~}$uEs3v(lDJ!Bn|G?p6nU2U?1=Ji+OOzWQjj;KcDxc`4b*PV<=1;S{Eq=vg_Pm9u_7}VtlP*p+jSb0>o1$>0XpjdE%gN4TZDCg%n7~!zMH&If3 z5Az*D_`dI}OZND?kQdHFz%koEranLCpXvVuvjP7&$K2|~RB7Czb88`lJG8u2; znI|+5i<2H1K2~$sb-JM6z2nbt1&NxCmCSrm4dJKan1WE4#DtXjBiXnqR4l0|eD{SVC4B>U;8+AJ2W)_NX`4cgSIi&Sp4iM^7HULDSMG`#EIWjC)NH2>NLr(e8U0 zRzLvLyb5|N+FOP>lo3vkP!7SvOi&=gyjQ5STB}+H1o$wLQv_Br1-0YF6vay5Rw2-H zqipv#^Tu&g)^48$-p$$8nLOP#U4tkjh)&pwVr}*{F(a4*E3$SwYTN8R9yPW2O3~~S zUs`&h4PDnP!5z;phaUT}#d+ie1$Pkh6Qhh^J>S#MR5!W@8Fs)zmlVz*R9%gL=oD0( ztkirRFS!rnfEpEIxGnHij}j$4Gy<=x6=rI0Xnmqhi{D)i8+#`PZXYJP~NYbK$OnF;T<5evl-%F zV|OOh^VH}W_9Hr;`ZVt8BCdWr2u}Qqox~^%eoBK)lP3EMrMDZ;jihcN1<#dG$ly+# z6uLa#yQ5@od&)FiR@wfTjCS#1K40^%Xpb|#_C}qRYd-+&MAWidvM7nmmUk6;Irp_D z4Le<8IvDfI`giF+@HOQsLz_de_R$qGv;E|zYVY{t7Lvu2E0nqB^=Xyoh22(@|S`{SL5qWZ$O=fCCC9=Nt;!OjO( zo}args%!fo#WYek!5c}Dlyksz0tT}k6SHsy?&)Z>y~fwx8?~MUCINx^cO*6OAMeGI zg3hX84b8{X^No`xW$ibIG7YWX@`MPO(E)R|uuB@4$=YMRdXs3;tgJOg*i+NXG0L-6 zLuE)@;Wk#Ko2~zLGdx;d^|yUmB7NQ(>KQrzJu=tm(grgC_5zNV`mz68BDGQ@o8w3c z3<}M9uI^n07dsd6EQ^MK108di?Q?E-kkPc>b=I&jj(Yfwsp-8&3F7e2`;KYP+i}|~ z#aGzc8>~9RLx&!N#^hY$EC_VAVX$K@fkjnSMfsVxxtbjmO=P#mH68!7>z(>vtr<6| zB|eCuUgFfzjP3D#*DGYn%gZTYWUD*+opqpp5Bm7xi!jVTRD4YVj$D1AMS!0bRwDaY zCee&0N@qeP&ljb?82#P!TbYI$DjF@x;#14Zo46W&EP$JCIMxyQCgzKi*`)}^5b8XX zE%WyR*yHUp2oz#;n9kh5j4!>e3Zke9&ueOYqA0NdvDljX8Ao8I6hFIwwet~IaTP&!7+$$95k$^latlFVQ=_Iu89V2S+I&yI_vKE{K}>X zacjtVj0qWfL+TP8_{=Kc0k)+K=}YlLn+;e+d}x-^ZbewI((=6hccty!{S!_W@U^2y zr}T~|ZZTI)fsHs+(fw>jx7`v}z<=F^uZ;_af}&u8rVR8M`@S+hKni8=zhx4suo>8? z3&eh%6Bz}_4vKAQ*i|h-9NhIo|CF_zR%!j=#=7dwxEE@nqAfMdn`RD~z302{?(3@Q z?IBIKmR?H`Z6EC3Eav0T;PUY{@%f^FTdxQ4VFYQqyWG#!ci^HB;PGCRfuC{pBJ?>Q z#^P4v(JZ^_VQtwOXbodRF}2X9i4;t4osdF{xUtN6+k1j4=dph3WY-CRU>@rj5fxQa zRYNhCVIWd7Zd9|h%>TPgw0d5iSvCsnYNcFHU592 zOcEP^Tpoi*OTT5j5e>B~QOkqK^Bh@gS~CxGFOybu#WSD~)sGEH3>?b>Q>4i>vi(*N zRiD-j7p!Jn6DksFM1GKxH(8AOZVX`X5P>Elb;{+DY#gDNUV~buhX;bDYb6X`gc5!H)i4{u81^>dW#x!#OaPyF4E zVm0E0fNKn>88*`9<|#%$0SyeAH#|*I=oGG(NzJ&W2f47?XioB$GTzbT0nVJ#DSv7WhW5S6-)|1jJ|(`y^g&}c7yjAUKZ@=1A2rua5d(~vbkgdqyd8bVJid8;IX-6 zRnj)=o%4m!Agc`lc2z81E?ZRK%v2R17eBGY`g zW|#%Yk`Ju@x(bt!SL-3Ea|%JQtH(()vp5WqDC$7J=<5)=z`n~?v~12i%c%zIGy3tv z!vu*s+^{Bj!zE1}gB5Jn32@x_{I7S-A51_{v<5S=d{a)x>U)lwwi|hwaRa83k=+*+ z8qdFA7s>)A`EC$u7V-j_dB=zGDI?swjScVOo8KxS8qQ^t4|gwnD_$75P(ro6OBo#k zTCXxcHwoR}F(4(VvPFq=<{b-!5v22Qk^8v73i$!U$1q^9ox$4}KO=9Q{JgKNyttIKLG6^X|-qGZY zEMbHQLvw||X^Fx+x%C{$QhSeKBeG7ECmivct0R+736|zPHgmx9f;=vMVJPmn0RKbP z@kXG9v|rjHBjgPWFF|IXoh%n(sCVXdIi|!4Sc}MSFGUnL;+Pv2N8)Sv8Bw}Y|EC(y zgU)qp1@wr4X>}@Tf2G;EvhdnKN9_E}DkBcQ43 zC1?EUo_Yb_x`(5zJhMUknva=2&taxv<9Hg{qhZ2v^=eEVPgp}cN57G@AxECt@ip8G zekkC1n!C-a3vQAuHnmG}a1zTkvWNN!2<4!XR@3s6-0W`0H?SgPq~vl`_47(v7zuM+ z@&qR)#ZAnfQxfv4Zgf4#)z>)~PswckVq8*0i-%I+n@o)-7_Co{P|f+ESnx_hNdTgOBnz5s1~G%W-ov_Ts>jN7IX3?TPe)BA6%(ia5TN6hAIVu9|KoO z@5;CT7|NlWcPN7t>HLxHz*poP^qLZz%Wul!LqOyL;~HOZdBxcY76LvY0gm%MC@yi$ zDa+ZM$+EO=d|}nn80uK}92lRYr?yJD)H8_-@xf8M+7Xm5g`YkZ6aFU+t10uApj+35tJ^-1Di5eN+4N z7#x$JvDaNXn1j1A&{qfKMJT0+<$ib5L-V_v?$P??L~nYVXvG1URJ+Wch8}YKvBky= zUQ0#>=t<-GfxvhXOw=J}gy(!ueY^hcjUT&-dgW`Tmkt)j?+=<};cEw`>SQ;r`45;sJ|&NJAcl$yg2A%vRN}NRY^!bpl!F z$yY=;{!%o&2fjQ%=RO#Ui>0pB*grw;*OEn|2)eK1`>dqI&Sv4U*P{a|`GZ2jl-8fa zSDGt25U;a=!biL&Fa0OTmdiC5x}P|p(@ zeFX^4mrS6O;0`Ewiamf=*Ft3g)`S@4>8*C=(Q(tN&*d8OG8JX$!&+AREZpYtSdt3I zYn`DIiQZt+Ez<{(Z7gQTvA>gcaPe|*KLhUw0odG>wtFZ->WptUM+UV~6yrJBgd8r- zlG@~_2^A2-P0}s$vo9X#k)EtSuPs(3Up%t8NL=DtsDAd#TYXDRfbAB@0uV;p9H z;V%KI@IgvkyeuY?s`f5MxMpZ9hGL)faConaU^MeCUM_2${hdIJrA@FPn+@zNG#8zF z6&7kbz(BsS`OMeGx4fk9^F+T01$>iJkX}y^oZ~)*#V6(};+F=wr19+?giW$a z7s-S_020`M5d;Ns2GT@N39=JPGn3PEbHvntrJYY~f}+_!<6U1j;dg#f+>d!}%f=MhU$!2D6&JVnua906mLKUivvsO?m+fNj40F98=Unczv8BLDV6D z>Qi*OX1{6R(s(jRjAMuQtpHt+YzD8QO4LWrny(1;w5ra;%0y}bR^~DthaRQNAZmV= zV1C`$;=6()ySlahkh}c&7V0TztE$N1B>jd1g-yvmGnHA5Qz}Xk^3T1 zp6EjQ$`pqyWppuBjKKJ56QBd= z)3ij@s`9x75D|Th^=i~73;dOZ30nk~d4U4%9d!vLg!D`fpLJB}+AX0;0A)L8;5MlC zmY{BeFp!xo$!TCNq^(#POMET6%>_fkRZ!7H;}PJIAGOxh4JYJ&n4;=jbzSdtMf7?= z1_7rE5u9&fZ<;v6rb~IM<$m3h33V#p%1#F}&V7>?&snE+1|N}oD&^LrMj&YMMgC(W z*%g@j>gor~@cB7YY2^_2a69}xaW}-njyZ083_70oTOlnsnj5YziSGwIORDkh*3BvNCP;Q!k z11V1xk4JBr--K^vy{cvDs@`CytabC2}DnO0Loje@CRFeYR^}smQp2^;gxN% z9-8ve8e;$`jfs}^9}HKBvuoOhcq7dX9Gw5S)acp(_`NFy}i8z<3)4!bH|Px(p$ z`q>rFU_nmC1o4Grakd~v{j4i#s=YwnjAQ`kKV%M>?(w(hf&_PIMGFWLW;EdHXBvXi zG#ai^^?e*~SwDI@Wfk2m`eGA+F%+06*^sD9QUJmVTyu{F%&^psz_D=WbW}ef zn0MxJj%w9hdSD_3YYN+Lc1cTBekNO8weVMrLd+P2(Dx^v<>9lpF4r^~@O5?EzF_HooZ*l-0__vP0?4FHeG`}d zt~%-IQqf*LNvZw$Tepxd@N@$u?KJ_-64ypR=PORugR>v2j}`QtqBfQtfT z2QFB0VbDEhJoa_!t^O2ssx~o5^}itH41J=a3?a(cCw)Apl{F8QB%5`sK*X7rCuirWm;z61|xe*Tkkl8WXU2Q7}fs z=b6hq*U~;Via zSvg1}u~D!_O*ZLaSEcnKD%DGq^w7Ab?j+-n!eI+7zb^^^W~C9~|6(^V^dgRf z)~dDY!Q-U8ogI@IeXI;#IcxNVQIe6k$YheemZu{GzTv(^=yY@r&ThiF+ooT*3T<3B0IeAxhoxAIcL3FlS(z~Do~VWHj*srmtu`(-y9o3Shu zm_#P3;0BFQ2@ST3bDaP!COdnez4de$@%l^1Cpn^$bRJkQt-gn|T#zpN*t?z+jTYjt zNd^LFjZb@prItPXpgBSk@q79T3r;xd{&t_D)IeRp|? zE4njlXlaJt-sRu{kf{r$p0`z3U%^P0+H|AT1!5b(f3}t1jV@t@3|}QnUWJi$agM1c z+a2A#U)6FFTPa@NP4!`+Fcq(?q*THq4)WRf|9&7f;av)o<%(m>twZ zpR3n08tcEs?L#Flurt76H+PCy5fs}7KI%(CuPemUuTZ^tNpAWO7er=}rc` z=d?;L?@E*XyL!USbdjhb^hLh5kTgA}!-Tq23SKGqnZSadS{PZ7X zc*Z6Y%_6~=SR>AE(^;e7sD(?M8W((G#c@#hu?zn#n|1!(Non<7}j%@yCTVy?>S-Iwuqzu(eT(uoFR;Ajg%#ke}U5ymNq3 zRNSXG38wvqt*8$m;s(5l=)8^3WUZY545VP0@AmxZ6qV%E7YzVhRgbrK!vCnNtKS$} z>1?L_Gj4SpFab&q^iPv23uAwtkq~d3dwhq?@gvM=Y?wo)DSe2h-*v_U8pFs^!ur}3 z3jDAERy7W_Gy7xqEV}uwebxqGZ7+TyzzjFi&wjBx7WBR9{5# zqTeSw<*9`m_3g9En=Cm_6jgw_zBzlE0m|m;nJN$XlFYL$@ab=B=K#mR@-}$Ynza1H zna|ivKwMZp7{%)!$a`tyDc}>9aN_t%(_5r?{eo>QvV6gz26q+i@ZY_ITLm@zmaeW# zND{{SL+jw#jGb4>m0;U?1SJMN93P;RXfZy2JFg1H21SjauBEqt2iAMnN_ki3A}us{ zoElNRuvtPJ+K{sQ`l^JMzgQOLxU(9`b98lSP&}g#s_Vt)s@}{mM<1;5(pclI|=C7`A z{E8ur@4F$K&rGb;nqQ^{n(TxdAoV98()Q8?LvkY!V~Eb|ATmQa0#mA=-(2&7R|3>z z8ImYOdqK#-P78Uas>>FkMHLFNT|A+*a{cA|%3(|T3RGGU1j?f~I+cHSr+%$JVjEdqEfAHC|oRD_7|JC@Dp?HCpv&UnykzK|VjsP+G@Kb6OaBzl)y*5_2+yp5Fu>vQD& z6}smwuFn4rR+nvlA%AZO>K=f>0lbB71EZCz^PuW#`&hXe0I`R!46A`(Ql+nw0*}X9 zNEsQ<$Q+@o{J{}H_~izZYwpYt~~UZ#(zgBEu6D)I&t=a`xp`AK`;6B zlzE(GMNN-oPH7+Us~rQT)MU>0X@N@&!ST)P{-bIfhztQfL!4lwrJS<9dQoL!<4+le z!mvBitx2x&=o|hx#r-EKE~bLP-*ew!-Z3wFk`sTb~UW3_E1%gejeKVkU;R@7OSO#o9-tVqPH?srEtTzlK(z8+QJf&#ac~k@+XIfS< zxon4Ah$Za;H+KMFK(+jdePR}$^!u_YU1le0_Sm|DwXW2Z$&Lskrj+&p$rjz2_a;)mMf92`p>EBpN3gOk$u) z1w7`qQ)fzhR%BOpSycQ#Rn*NZR5%CB^I!ho zkuFr-6wJRXlzdEnl%&mvrTmdP$g$Hgiw`Z`#jFiedieAFe3|qofNO9(W33h>xWS)_ic0 zN>EWErKu`*B8L=-hmyuZqWZ*_cZYg-ra_(yGl0=WC1rip#_mSU3@q{7jA5;~EG4^f zunhtaAlFhM3(1az<`=l)%twju1>@r6YMFw2uNGYI(wQ#woJ6KT!!_9}UNnApP{_D? z^(#2lS%gnHO=ELSP0MKmgOy7L6V!g(Su1{2@uEQRAp0N1JP~Sh<-s(pCDL;pHCaQs z>mlhHJe~IcD`sP5t3~zS4A13OfWh;TpT|VQ9VEK}&%|C>U(_?4bw6=l_H2){O9TXnm~6vR3~_&=NYSI^xYIQA z5Nkx(5o`iYz(QE|xG#YnZYT*#XAsxYK&i18MEOd-`~!#$a5>}ZA8^lC3&I!{n9pWV z7If&4e>M*U7hkUojA2N%zUNvkm6hj%GwHA7-x}WoHbf@EC-Xf z9b+C#-j9e?!=$Y2DdTa}ZFWkG$BS2n_GJeH6e5@rv3#8b@x^^?T63=bRV zb{IR)$n)(Ep^C}oYB~9`r4=O{O!1^T@$3|U(Pageb!S}KPQuH~%=)o)P&T7^_dO^r zx+Q5vGmbB|(|udLi9zWs81uD4sWO%1{_W5lar8-{(C3TmI7sh&R@dCohL^U(g8t%S zTo_&VB`zF)Fwc1PO3SXS@6RGw4T-JGX+e#X#wszeF4lgwoKV%}YPkLcQ*hBirohMB z@R;uqS*mVPEP6-kdA!O;vk6{%X#?%9e^5V%-6+Z0ta(gVjiKmMbX~U{2Di75eOUdL z+&X|kp=LewA?TyCkxdTD+#Wwj-JBoVB|EAOp-uVUhvC8 zs?M>bi~M&)!z~zUgH0}c}UCr{OJ@zx%|a}1OW5eG7joI%8XYrMT#0rL7tf>u3r2ADWjc7W(OzSdEm|8 zZV@x6G~eiSRDq=!mKO;ax& zz4vM&VgjMfWh5CBySYxCl*=?zjQ@C3_jFkdrK9^3fozzQUrevz)M~eU`jZSQsDTIF zMWy#!mK-TJU8Uv5v6-kB`2CsHmf{b2%7x%R7p38KV?A;|rTOmuBrNF383{eaULV}tvxnj z7Bg`P$mkeqRJiXxCP_E#t1%=p0>A7T2SH=<&0C%PzdLP*@9UZpuRxTk3qqfVX!waM z>%xIw+*I4y)&=!dF|-AcF3rT{$aP@i!0 zNhL8^Hk=Y|ragVIp^@dJn9Bps${u13a*>?7>0~SlF-O@v5LY(d!krMamUJ zx0lob0NlT>fu|HeycuXl1-A&do8m@qdkLrtECwhny62ohd8-Y>D^hnrI_)s+W-Bsj zp8S5CV}XZ)N=cWK$Ed*t3E27EbntnGtqh|bhYb}_7Mex)vr-k9g-Miwc5}-=fj2!9 z7e6hcC8xU)2;Y1i5&;q7y?%S^RzjIV(7PVIQKahFDpEv8&6=~RdsciEOd}|rzfk!I za`uxpY(}_yKMHh1-J{P-E(8-Z`>Rdh51Jzlk{t_vu|)eF+lnRvO&e@}2c@~0KD$X% zE26{~CTRbb+i}P~w&c(}8#9BmmoYWN<|>cWQ9AT4W4aJ63;#x>aOhAh2d7~G_?Bym+((G~ssc%OSy^Ln&fbTHQ74kOw>4^i zzpzypo1TD)791f~jR`cC4V!vD)e!VWy>(VjCxF<_jpmCOalPb9&;z1Fud&_o{}?Rq z9RFn46l?(t+9JrMeNMCzEWh;DYhfDGh#~@`SuX{PK)LN<`A7|HDj>k!^SE43{zHoOf2zCkf2g@E1w@HzhmO}>-u?w7B3@MRQ2EfQ*7)fXAC6p<4lcbU@+a)1)|m~B zZuWojjv|q$bFWuFrsmGJErooCod4K-as23JC!DTWh7sCR(CM+V6gn04blroX2;OpW z#SE*>iNhf$YknKwry3KXmH1X@q=8C2%*!JKWsU{uNM~R~#QGCR3%;RmqD%HmZ7|`h z-xJ#yo}#F`T5*J;|1PI28~A8|WANvh9n@ks>`26;Y7ilh^&Zo@yyw1F`5C@1L?iw< zKoP@#&a$rtV8fhpd+Bx}R7EoxKUuu3<=-<8U#pH|Tni5wI??{XAQ&qE%JM?FIhXc& zPp=;Ir(lDuRb8cEW7tTf%?y; zxd1#z00%Nz%2Xet?o1n#N{E)3HfEmuy*f3I%R241eBYYmR3qE%di5{TiqNZ2haa3% zDOm#86a72qRc#J#gs#bSCB|pH4Dt=OwV374xLtOwT&~4yfqP8dOts)pk48kgQeR=8 z7gxgjjFfBYFUed{z3$ae`OA-_&aSRG?e5?|K$Qt7l21~rOnMv|60)0btLv1gPFTzt zZk|6|v3DlI-iH~jtIYUhj{{dLJsGFvio~0gt)cxfExT`v&ZDa-18xd*dz$%`)JBLW9uH?>KM zUogF6PX=J15ZYxjHk1~or2>c{K}&0`JrJ;PT|A(1#hhEPFfPSFF|^8)tOY8q5klb8A;T;hYHvW ziJz+K`n*H;1?1YYbxWie2^I#4#T3g{Be^$rA9u$5waiaPVB22VMq2u0UJpqIfD*b*?VJbNxZ&+EO$o*Kwsc!dNXqaoJSxmmqyX}ar zzQu%thLrD?#OGLyT4NjLuT^9}QSIV)u9es#d6Or|CCpvQ`eOjA zU39FmaiOexBh4+be=*5=o6VZD4cvfq2B6d=TM=wu=Men-q2XMZp0|xD7BE@W=PX*6 zsLATsU$}4Ru!Kz10mXyn2@*1oNfLuykK`9c?sC=daZJ${Z+SbdUM)UibVL-hsZ?LL zBZ2A6+G_hCr@z2Ij>~t-Yr=HIQRH>0my<8x5jl&ymgd^4GOx$G@9#g)D29}zgF4^2 z{x4hAG|l-pPI`z+mrE8TPRLVF1kx-rg-k;)33rsgtP@WIA43@-9=|{M078XLzhkM{ z!z<6m$V-QZbA}yhim;lp=;@SqX53nlkM>MneAQuHEEz2ii}7S@xX0~oO+O%(eO@}` zeRsv-GYJO|_$vqrG40tKAMfq0&7V2~)6y|Dc6T%c<9{FZm<^3>A+|8=xC@CbMYnQ4 z7NWW~X<+i?M}xz6*r@VI4hH$8Mz8<6au25BDkc@dwSqNrt#JL&>(+doW}Y8vjd(^x zCp!m}vBJ#)S`KV3s^cZHN+NA3y~ojCL7e0l8k4w_|L{E(>Z@*y+mRGIUZVB_-EB_I z#{aE1eswSUw+1v1NgAStm`3qTtYyvtNW)1yDEa{9A%NSZ^6#R5YWJntge{!xUxOd) zy7NgdmdmW2JoY9=1#(CW*~lkz0l7x^+n=`E=BWG?Bu3?Z3&PkPcO!t#@lKQQkDYzvgtniV z|GD!D!;XYt(dQR1yLt(F#7VY+U~h#=l-Z5lonBfQ;d3hVjRn&B#e1cC)h);ub}@>Q z9UAnwL}wGnR00Z-p^MV`K*Q>N7$a*;c0ikmZ^B6Zr>g@=hHcQMHQ(=6Rf`ByqQ0}a zzSoWXrf&n9q}&>hRd1CY}^ zG7mHb(QMN$Q{?QtM{c@eMA-2+nYHbt0!9?B0o;9qq@>%nLGcmYSDw^^yyBw-*RRZ< z4m7M%`D}M5#CQlcL)Dc?tz#VT_i_r0Ny%Mh5mge@YZ9zF$wWcBGa8Q_AIe->;Fi{$ zpTmfQPqBBp)RXE`X3J($=?*H=0IW+C4SV*9A!QL|!t;G6RWu`zF8d(qRp^=4h^JuJ z54hF%UVPrb90>V4ouO;wrdHA@zmugII&)v8%2Gr5cBNmX@6#=G$0KW&p~KVJWm5XE zSC%IH0;L0(Bd31YMT(Ryd?{hhuuzXg+Zl6xW(dh_0 zRQM=4D_4Aq9D95l?6vn-#E(}UGI6)B(XfFtP0)?o_i!UrWg2#Kr4X_CCBlrml8jZZ zB$}N(!`3xnpq{wafmHC9vA=5N)5*l=O_AH~FL~V318T%hk@;=E=X5O(A@U>b0c>V; zp*?t#clzd`gA{uM8*T#*|)nc`D7i)Fv6V<*Qq zLF?O(v)gUrekG76nt|eznxP}JH7{rlz&?cIf7Q+dw|uq=cfJLQnJ)0S!Y>D5u$6`t z3#E_`ZimM`f7L>${2ET@7MY0$Rp7vloMPdxaQ|Q*-}FZpgSX^)UMDYvPx_|fblkPz z7t`-RDQ^DNnZJ*WlOuJ1TsZ$dwYd6KC$y>O09&9B`aj5U-|m9P@zEf~G^R)0Z*x^= zRWs&?tI=g6L4IUSRbg{_o!L={fl`w3U`eLpdTvG)TN%nAQx#{d@2EtW&m|h{PZ?g0 zkKZ0-9T&Z%6=kd{YYc#l%iryOWfOM`Qt&)Lq1E6NQSvb$Ban?l!N>&Ff&Fgt`ISMt~ z%-Ls;)i(F2j7XWHsmE8Pe~hs2vR zm+sXn3yhJafb)o(ZGuYr44af>l@X@_FfhfFa(>n*T+lgaZFI#<+qscOJ7L8_$Kzvl z#jVi&s{k2bre)bB=DiJbMq%>@XIlD|sP_J}F67*P64X6czZ{~ko6GMMw;cI-sMj+6 zKguo49#C$S+`VWcCsoIkbY+^iK#a^l7T!RK;{QG}vOWt(zl7inJfeu8J=@>HC*I}3 ztR)tl6>v91>}L%JaP9YDfXynNBvqs#^_6p5g%7h8s-uFSS56{r24=StF}pzY6?`qT z7xwP$fWvaAu)*xApSn6w50fwd$OisKyrk|V+lrTtHB?0mh-_UD)$i zHQNHiUy#0}K(PEWKghSQcI zeu=#h7<}ku+k+Nvs;3{V+I(WA>n6Tpppti zjV^cC>*2s@EFz5+2NV5OSDUJ4_7{jE!+`F{oC8euzzR_j6tYI|IC&usq$V5y6x9Fw zp5-@kZ8@IquRmk-AZUh$-4CM41Oex%PQcj@6qji-MvwBw{~(z$ulCdU@YL)aoQ~N; zc6%T9Ysf(PHMG7Jfh|%N;Gn%XH08ZZp2aTvyYL7ALxBavyg#aHoUodN7{bq=O8&L5P~oQTT2j50g;0;F@_>Kh4kSu9wyziK3pGy)|p$cU$d z@PZZMeBoK%#vpb(#e&`LK?(Ds1iY_}x~P+dGx^0F2O`TrME_J7Wnv=$f*te71dR4f zOf#fC`%egc4$N1n2U}nR=h#v~ZR9BVa_TTD3JIF0Sd!g21?A*PP@Qy zGn`#=i$9xmgT0225LWj=`#jkK+Tb&7#guT1AnVq47$pyTm9x;^vWIAhjen?WR44@Q z`=<#9Hr^v_4MKGfI2_*q3U7OuAuWrjl$C=(2I1I>8nQQ{+(o^JBRj#}??+@;QM(*gDPzJLPg#)3M|Ixck7$ zN6LG> zY?S~Y2X5d__Z(#>ABL5{?(J$Hr$KA+4b8Me8@@=MVBtS9C9T3w?4V4F=5j=F1 zW5)N8g**BzJ1^@*>o-p`-Z+F38Dnjq6@g{B08pUF3VOA2WDS@)w zo}%zQ?nB`20!eM)5pj-30G}#?9qWuiBM8KCwFiVmK zN=8?BU1Z<@7cg9!33h;L$dQ=QNA60WLHQEp=pBFgnP)q{-RTZ(%zxSK|PB1eB|#fr687&P#m49s1asg z7w&c_8WnT!!Px# literal 0 HcmV?d00001 diff --git a/windows/deployment/update/waas-servicing-differences.md b/windows/deployment/update/waas-servicing-differences.md new file mode 100644 index 0000000000..27e3799565 --- /dev/null +++ b/windows/deployment/update/waas-servicing-differences.md @@ -0,0 +1,115 @@ +--- +title: Servicing differences between Windows 10 and older operating systems +description: Learn the differences between servicing Windows 10 and servicing older operating systems. +keywords: updates, servicing, current, deployment, semi-annual channel, feature, quality, rings, insider, tools +ms.prod: w10 +ms.mktglfcycl: manage +ms.sitesec: library +author: KarenSimWindows +ms.localizationpriority: medium +ms.author: karensim +--- +# Understanding the differences between servicing Windows 10-era and legacy Windows operating systems + +>Applies to: Windows 10 + +>**February 15, 2019: This document has been corrected and edited to reflect that security-only updates for legacy OS versions are not cumulative. They were previously identified as cumulative similar to monthly rollups, which is inaccurate.** + +Today, many enterprise customers have a mix of modern and legacy client and server operating systems. Managing the servicing and updating differences between those legacy operating systems and Windows 10 versions adds a level of complexity that is not well understood. This can be confusing. With the end of support for legacy [Windows 7 SP1](https://support.microsoft.com/help/4057281/windows-7-support-will-end-on-january-14-2020) and Windows Server 2008 R2 variants on January 14, 2020, System Administrators have a critical need critical to understand how best to leverage a modern workplace to support system updates. + +The following provides an initial overview of how updating client and server differs between the Windows 10-era Operating Systems (such as, Windows 10 version 1709, Windows Server 2016) and legacy operating systems (such as Windows 7, Windows 8.1, Windows Server 2008 R2, Windows Server 2012 R2). + +>[!NOTE] +>A note on naming convention in this article: For brevity, "Windows 10" refers to all operating systems across client, server and IoT released since July 2015, while "legacy" refers to all operating systems prior to that period for client and server, including Windows 7, Window 8.1, Windows Server 2008 R2, Windows Server 2012 R2, etc. + +## Infinite fragmentation +Prior to Windows 10, all updates to operating system (OS) components were published individually. On "Update Tuesday," customers would pick and choose individual updates they wanted to apply. Most chose to update security fixes, while far fewer selected non-security fixes, updated drivers, or installed .NET Framework updates. + +As a result, each environment within the global Windows ecosystem that had only a subset of security and non-security fixes installed had a different set of binaries and behaviors than those that consistently installed every available update as tested by Microsoft. + +This resulted in a fragmented ecosystem that created diverse challenges in predictively testing interoperability, resulting in high update failure rates - which were subsequently mitigated by customers removing individual updates that were causing issues. Each customer that selectively removed individual updates amplified this fragmentation by creating more diverse environment permutations across the ecosystem. As an IT Administrator once quipped, "If you’ve seen one Windows 7 PC, you have seen one Windows 7 PC," suggesting no consistency or predictability across more than 250M commercial devices at the time. + +## Windows 10 – Next generation +Windows 10 provided an opportunity to end the era of infinite fragmentation. With Windows 10 and the Windows as a service model, updates came rolled together in the "latest cumulative update" (LCU) packages for both client and server. Every new update published includes all changes from previous updates, as well as new fixes. Since Windows client and server share the same code base, these LCUs allow the same update to be installed on the same client and server OS family, further reducing fragmentation. + +This helps simplify servicing. Devices with the original Release to Market (RTM) version of a feature release installed could get up to date by installing the most recent LCU. + +Windows publishes the new LCU packages for each Windows 10 version (1607, 1709, etc.) on the second Tuesday of each month. This package is classified as a required security update and contains contents from the previous LCU as well as new security, non-security and Internet Explorer 11 (IE11) fixes. The security classification, by definition, requires a reboot of the device to complete installation of the update. + + +![High level cumulative update model](images/servicing-cadence.png) +*Figure 1.0 - High level cumulative update model* + +Another benefit of the LCU model is fewer steps. Devices that have the original Release to Market (RTM) version of a release can install the most recent LCU to get up to date in one step, rather than having to install multiple updates with reboots after each. + +This cumulative update model for Windows 10 has helped provide the Windows ecosystem with consistent update experiences that can be predicted by baseline testing before release. Even with highly complex updates with hundreds of fixes, the number of incidents with monthly security updates for Windows 10 have fallen month over month since the initial release of Windows 10. + +### Points to consider + +- Windows 10 does not have the concept of a Security-Only or Monthly Rollup for updates. All updates are an LCU package, which includes the last release plus anything new. +- Windows 10 no longer has the concept of a "hotfix" since all individual updates must be rolled into the cumulative packages. (Note: Any private fix is offered for customer validation only, and then rolled into an LCU.) +- [Updates for the .NET Framework](https://blogs.msdn.microsoft.com/dotnet/2016/10/11/net-framework-monthly-rollups-explained/) are NOT included in the Windows 10 LCU. They are separate packages with different behaviors depending on the version of .NET Framework being updated, and on which OS. As of October 2018, .NET Framework updates for Windows 10 will be separate and have their own cumulative update model. +- For Windows 10, available update types vary by publishing channel: + - For customers using Windows Server Update Services (WSUS) and for the Update Catalog, several different updates types for Windows 10 are rolled together for the core OS in a single LCU package, with exception of Servicing Stack Updates. + - Servicing Stack Updates (SSU) are available for download from the Update Catalog and can be imported through WSUS, but will not be automatically synced. (See this example for Windows 10, version 1709) For more information on Servicing Stack Updates, please see this blog. + - For customers connecting to Windows Update, the new cloud update architecture uses a database of updates which break out all the different update types, including Servicing Stack Updates (SSU) and Dynamic Updates (DU). The update scanning in the Windows 10 servicing stack on the client automatically takes only the updates that are needed by the device to be completely up to date. +- Windows 7 and other legacy operating systems have cumulative updates that operate differently than in Windows 10 (see next section). + +## Windows 7 and legacy OS versions +While Windows 10 updates could have been controlled as cumulative from "Day 1," the legacy OS ecosystem for both client and server was highly fragmented. Recognizing the challenges of update quality in a fragmented environment, we moved Windows 7 to a cumulative update model in October 2016. + +Customers saw the LCU model used for Windows 10 as having packages that were too large and represented too much of a change for legacy operating systems, so a different model was implemented. Windows instead offered one cumulative package (Monthly Rollup) and one individual package (Security Only) for all legacy operating systems. + +The Monthly Rollup includes new non-security (if appropriate), security updates, Internet Explorer (IE) updates, and all updates from the previous month similar to the Windows 10 model. The Security-only package includes only new security updates for the month. This means that any security updates from any previous month are not included in current month’s Security-Only Package. If a Security-Only update is missed, it is missed. Those updates will not appear in a future Security-Only update. Additionally, a cumulative package is offered for IE, which can be tested and installed separately, reducing the total update package size. The IE cumulative update includes both security and non-security fixes following the same model as Windows 10. + +![Legacy OS security-only update model](images/security-only-update.png) +*Figure 2.0 - Legacy OS security-only update model* + +Moving to the cumulative model for legacy OS versions continues to improve predictability of update quality. The Windows legacy environments which have fully updated machines with Monthly Rollups are running the same baseline against which all legacy OS version updates are tested. These include all of the updates (security and non-security) prior to and after October 2016. Many customer environments do not have all updates prior to this change installed, which leaves some continued fragmentation in the ecosystem. Further, customers who are installing Security-Only Updates and potentially doing so inconsistently are also more fragmented than Microsoft’s test environments for legacy OS version. This remaining fragmentation results in issues like those seen when the September 2016 Servicing Stack Update (SSU) was needed for smooth installation of the August 2018 security update. These environments did not have the SSU applied previously. + +### Points to consider +- Windows 7 and Windows 8 legacy operating system updates [moved from individual to cumulative in October 2016](https://techcommunity.microsoft.com/t5/Windows-Blog-Archive/More-on-Windows-7-and-Windows-8-1-servicing-changes/ba-p/166783). Devices with updates missing prior to that point are still missing those updates, as they were not included in the subsequent cumulative packages. +- "Hotfixes" are no longer published for legacy OS versions. All updates are rolled into the appropriate package depending on their classification as either non-security, security, or Internet Explorer updates. (Note: any private fix is offered for customer validation only. Once validated they are then rolled into a Monthly Rollup or IE cumulative update, as appropriate.) +- Both Monthly Rollups and Security-only updates released on Update Tuesday for legacy OS versions are identified as "security required" updates, because both have the full set of security updates in them. The Monthly Rollup may have additional non-security updates that are not included in the Security Only update. The "security" classification requires the device be rebooted so the update can be fully installed. +- Given the differences between the cumulative Monthly Rollups and the single-month Security-only update packages, switching between these update types is not advised. Differences in the baselines of these packages may result in installation errors and conflicts. Choosing one and staying on that update type with high consistency – Monthly Rollup or Security-only – is recommended. +- With all Legacy OS versions now in the Extended Support stage of their 10-year lifecycle, they typically receive only security updates for both Monthly Rollup and Security Only updates. Using Express for the Monthly Rollup results in almost the same package size as Security Only, with the added confidence of ensuring all relevant updates are installed. +- In [February 2017](https://techcommunity.microsoft.com/t5/Windows-Blog-Archive/Simplified-servicing-for-Windows-7-and-Windows-8-1-the-latest/ba-p/166798), Windows pulled IE updates out of the legacy OS versions Security-only updates, while leaving them in the Monthly Rollup updates. This was done specifically to reduce package size based on customer feedback. +- The IE cumulative update includes both security and non-security updates and is also needed for to help secure the entire environment. This update can be installed separately or as part of the Monthly Rollup. +- [Updates for .NET Framework](https://blogs.msdn.microsoft.com/dotnet/2016/10/11/net-framework-monthly-rollups-explained/) are NOT included in legacy Monthly Rollup or Security Only packages. They are separate packages with different behaviors depending on the version of the .NET Framework, and which legacy OS, being updated. +- For [Windows Server 2008 SP2](https://cloudblogs.microsoft.com/windowsserver/2018/06/12/windows-server-2008-sp2-servicing-changes/), cumulative updates began in October 2018, and follow the same model as Windows 7. Updates for IE9 are included in those packages, as the last supported version of Internet Explorer for that Legacy OS version. + +## Public preview releases +Lastly, the cumulative update model directly impacts the public Preview releases offered in the 3rd and/or 4th weeks of the month. Update Tuesday, also referred to as the "B" week release occurs on the second Tuesday of the month. It is always a required security update across all operating systems. In addition to this monthly release, Windows also releases non-security update "previews" targeting the 3rd (C) and the 4th (D) weeks of the month. These preview releases include that month’s B-release plus a set of non-security updates for testing and validation as a cumulative package. We recommend IT Administrators uses the C/D previews to test the update in their environments. Any issues identified with the updates in the C/D releases are identified and then fixed or removed, prior to being rolled up in to the next month’s B release package together with new security updates. Security-only Packages are not part of the C/D preview program. + +### Examples +Windows 10 version 1709: +- (9B) September 11, 2018 Update Tuesday / B release - includes security, non-security and IE update. This update is categorized as "Required, Security" it requires a system reboot. +- (9C) September 26, 2018 Preview C release - includes everything from 9B PLUS some non-security updates for testing/validation. This update is qualified as not required, non-security. No system reboot is required. +- (10B) October 9, 2018 Update Tuesday / B release includes all fixes included in 9B, all fixes in 9C and introduces new security fixes and IE updates. This update is qualified as "Required, Security" and requires a system reboot. +All of these updates are cumulative and build on each other for Windows 10. This is in contrast to legacy OS versions, where the 9C release becomes part of the "Monthly Rollup," but not the "Security Only" update. In other words, a Window 7 SP1 9C update is part of the cumulative "Monthly Rollup" but not included in the "Security Only" update because the fixes are qualified as "non-security". This is an important variation to note on the two models. + +![Preview releases in the Windows 10 LCU model](images/servicing-previews.png) +*Figure 3.0 - Preview releases within the Windows 10 LCU model* + +## Previews vs. on-demand releases +In 2018, we experienced incidents which required urgent remediation that didn’t map to the monthly update release cadence. These incidents were situations that required an immediate fix to an Update Tuesday release. While Windows engineering worked aggressively to respond within a week of the B-release, these "on-demand" releases created confusion with the C Preview releases. + +As a general policy, if a Security-Only package has a regression, which is defined as an unintentional error in the code of an update, then the fix for that regression will be added to the next month’s Security-Only Update. The fix for that regression may also be offered as part an On-Demand release and will be rolled into the next Monthly Update. (Note: Exceptions do exist to this policy, based on timing.) + +### Point to consider +- When Windows identifies an issue with a Update Tuesday release, engineering teams work to remediate or fix the issue as quickly as possible. The outcome is often a new update which may be released at any time, including during the 3rd or 4th week of the month. Such updates are independent of the regularly scheduled "C" and "D" update previews. These updates are created on-demand to remediate a customer impacting issue. In most cases they are qualified as a "non-security" update, and do not require a system reboot. +- Rarely do incidents with Update Tuesday releases impact more than .1% of the total population. With the new Windows Update (WU) architecture, updates can be targeted to affected devices. This targeting is not available through the Update Catalog or WSUS channels, however. +- On-demand releases address a specific issue with an Update Tuesday release and are often qualified as "non-security" for one of two reasons. First, the fix may not be an additional security fix, but a non-security change to the update. Second, the "non-security" designation allows individuals or companies to choose when and how to reboot the devices, rather than forcing a system reboot on all Windows devices receiving the update globally. This trade-off is rarely a difficult choice as it has the potential to impact customer experience across client and server, across consumer and commercial customers for more than one billion devices. +- Because the cumulative model is used across Window 10 and legacy Windows OS versions, despite variations between these OS versions, an out of band release will include all of the changes from the Update Tuesday release plus the fix that addresses the issue. And since Windows no longer releases hotfixes, everything is cumulative in some way. + +In closing, I hope this overview of the update model across current and legacy Windows OS versions highlights the benefits of the Windows 10 cumulative update model to help defragment the Windows ecosystem environments, simplify servicing and help make systems more secure. + +## Resources +- [Simplifying updates for Windows 7 and 8.1](https://techcommunity.microsoft.com/t5/Windows-Blog-Archive/Simplifying-updates-for-Windows-7-and-8-1/ba-p/166530) +- [Further simplifying servicing models for Windows 7 and Windows 8.1](https://techcommunity.microsoft.com/t5/Windows-Blog-Archive/Further-simplifying-servicing-models-for-Windows-7-and-Windows-8/ba-p/166772) +- [More on Windows 7 and Windows 8.1 servicing changes](https://techcommunity.microsoft.com/t5/Windows-Blog-Archive/More-on-Windows-7-and-Windows-8-1-servicing-changes/ba-p/166783) +- [.NET Framework Monthly Rollups Explained](https://blogs.msdn.microsoft.com/dotnet/2016/10/11/net-framework-monthly-rollups-explained/) +- [Simplified servicing for Windows 7 and Windows 8.1: the latest improvements](https://techcommunity.microsoft.com/t5/Windows-Blog-Archive/Simplified-servicing-for-Windows-7-and-Windows-8-1-the-latest/ba-p/166798) +- [Windows Server 2008 SP2 servicing changes](https://cloudblogs.microsoft.com/windowsserver/2018/06/12/windows-server-2008-sp2-servicing-changes/) +- [Windows 10 update servicing cadence](https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-10-update-servicing-cadence/ba-p/222376) +- [Windows 7 servicing stack updates: managing change and appreciating cumulative updates](https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-7-servicing-stack-updates-managing-change-and/ba-p/260434) From dd444d0ee46a2ca5a61e5aaa2bcb55e4cd0323da Mon Sep 17 00:00:00 2001 From: Aabha Thipsay Date: Fri, 15 Feb 2019 23:08:41 -0800 Subject: [PATCH 38/76] Updates to address Dani's review comments --- .../hello-for-business/WebAuthnAPIs.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/WebAuthnAPIs.md b/windows/security/identity-protection/hello-for-business/WebAuthnAPIs.md index d43f98328c..94caf55f34 100644 --- a/windows/security/identity-protection/hello-for-business/WebAuthnAPIs.md +++ b/windows/security/identity-protection/hello-for-business/WebAuthnAPIs.md @@ -8,7 +8,7 @@ ms.pagetype: security, mobile author: aabhathipsay ms.author: aathipsa ms.localizationpriority: medium -ms.date: 02/14/2019 +ms.date: 02/15/2019 --- # WebAuthn APIs for password-less authentication on Windows 10 @@ -16,13 +16,13 @@ ms.date: 02/14/2019 ### Passwords leave your customers vulnerable. With the new WebAuthn APIs, your sites and apps can leverage password-less authentication. Microsoft has long been a proponent to do away with passwords. -Today we're excited to introduce you to the latest Windows 10 (version 1903) W3C/FIDO2 Win32 WebAuthn platform APIs! +While working towards that goal, we'd like to introduce you to the latest Windows 10 (version 1903) W3C/FIDO2 Win32 WebAuthn platform APIs! These APIs allow Microsoft developer partners and the developer community to leverage Windows Hello and FIDO2 security keys as a password-less authentication mechanism for their applications on Windows 10 devices. #### What does this mean? This opens opportunities for developers or relying parties (RPs) to enable password-less authentication. -They can now leverage [Windows Hello](https://aka.ms/whfb) or [FIDO2 Security Keys](https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key) +They can now leverage [Windows Hello](https://aka.ms/whfb) or [FIDO2 Security Keys](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key) as a password-less multi-factor credential for authentication.
Users of these sites can use any browser that supports WebAuthn Windows 10 APIs for password-less authentication @@ -32,7 +32,7 @@ The native Windows 10 WebAuthn APIs are currently supported by Microsoft Edge on and latest versions of other browsers.

Developers of FIDO2 authentication keys should use the new Windows 10 APIs, to enable these scenarios in a consistent way for users. - Moreover, this enables the use off all the transports available per FIDO2 specifications - USB, NFC and BLE + Moreover, this enables the use of all the transports available per FIDO2 specifications - USB, NFC and BLE without having to deal with the interaction and management overhead. This also implies browsers or apps on Windows 10 will no longer have direct access to above transports for FIDO related messaging. From cf516f588f8597c9a802e03e6feb61a9cbfb788f Mon Sep 17 00:00:00 2001 From: illfated Date: Tue, 19 Feb 2019 18:06:21 +0100 Subject: [PATCH 39/76] Security/Information Protection - insert the missing word "identifies" in the sentence "When the operating system an Encrypted Hard Drive, it activates the security mode." Closes #2710 --- windows/security/information-protection/encrypted-hard-drive.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/information-protection/encrypted-hard-drive.md b/windows/security/information-protection/encrypted-hard-drive.md index 68675bb3d6..6d4df86d67 100644 --- a/windows/security/information-protection/encrypted-hard-drive.md +++ b/windows/security/information-protection/encrypted-hard-drive.md @@ -62,7 +62,7 @@ For Encrypted Hard Drives used as **startup drives**:   ## Technical overview -Rapid encryption in BitLocker directly addresses the security needs of enterprises while offering significantly improved performance. In versions of Windows earlier than Windows Server 2012, BitLocker required a two-step process to complete read/write requests. In Windows Server 2012, Windows 8, or later, Encrypted Hard Drives offload the cryptographic operations to the drive controller for much greater efficiency. When the operating system an Encrypted Hard Drive, it activates the security mode. This activation lets the drive controller generate a media key for every volume that the host computer creates. This media key, which is never exposed outside the disk, is used to rapidly encrypt or decrypt every byte of data that is sent or received from the disk. +Rapid encryption in BitLocker directly addresses the security needs of enterprises while offering significantly improved performance. In versions of Windows earlier than Windows Server 2012, BitLocker required a two-step process to complete read/write requests. In Windows Server 2012, Windows 8, or later, Encrypted Hard Drives offload the cryptographic operations to the drive controller for much greater efficiency. When the operating system identifies an Encrypted Hard Drive, it activates the security mode. This activation lets the drive controller generate a media key for every volume that the host computer creates. This media key, which is never exposed outside the disk, is used to rapidly encrypt or decrypt every byte of data that is sent or received from the disk. ## Configuring Encrypted Hard Drives as Startup drives From 274f1a2aa046e7bf1de8ab9bf85733dcdf63f7e2 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Tue, 19 Feb 2019 09:56:54 -0800 Subject: [PATCH 40/76] added text --- ...-portal-in-microsoft-store-for-business.md | 25 +++++++++++++++++-- 1 file changed, 23 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-application-control/use-device-guard-signing-portal-in-microsoft-store-for-business.md b/windows/security/threat-protection/windows-defender-application-control/use-device-guard-signing-portal-in-microsoft-store-for-business.md index 1423972366..d50f975bc2 100644 --- a/windows/security/threat-protection/windows-defender-application-control/use-device-guard-signing-portal-in-microsoft-store-for-business.md +++ b/windows/security/threat-protection/windows-defender-application-control/use-device-guard-signing-portal-in-microsoft-store-for-business.md @@ -8,7 +8,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: jsuther1974 -ms.date: 02/28/2018 +ms.date: 02/19/2019 --- # Optional: Use the Device Guard Signing Portal in the Microsoft Store for Business @@ -16,4 +16,25 @@ ms.date: 02/28/2018 **Applies to:** - Windows 10 -- Windows Server 2016 \ No newline at end of file +- Windows Server 2019 +- Windows Server 2016 + +You can sign code integrity policies with the Device Guard signing portal to prevent them from being tampered with after they're deployed. + +## Sign your code integrity policy +Before you get started, be sure to review these best practices: + +**Best practices** + +- Test your code integrity policies on a pilot group of devices before deploying them to production. +- Use rule options 9 and 10 during testing. For more information, see the section Code integrity policy rules in the [Deploy Windows Defender Application Control policy rules and file rules](hhttps://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create). + +**To sign a code integrity policy** + +1. Sign in to the [Microsoft Store for Business](http://businessstore.microsoft.com) or [Microsoft Store for Education](https://educationstore.microsoft.com). +2. Click **Manage**, click **Store settings**, and then click **Device Guard**. +3. Click **Upload** to upload your code integrity policy. +4. After the files are uploaded, click **Sign** to sign the code integrity policy. +5. Click **Download** to download the signed code integrity policy. + + When you sign a code integrity policy with the Device Guard signing portal, the signing certificate is added to the policy. This means you can't modify this policy. If you need to make changes, make them to an unsigned version of the policy, and then sign the policy again. \ No newline at end of file From 4db2a975d3fb5292179d66ddf71fa82e9b57a014 Mon Sep 17 00:00:00 2001 From: Liza Poggemeyer Date: Tue, 19 Feb 2019 10:32:29 -0800 Subject: [PATCH 41/76] Incorporated @illfated's text suggestion. --- .../windows-autopilot/windows-autopilot-requirements-network.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/windows-autopilot/windows-autopilot-requirements-network.md b/windows/deployment/windows-autopilot/windows-autopilot-requirements-network.md index d4417a5ad0..260b773472 100644 --- a/windows/deployment/windows-autopilot/windows-autopilot-requirements-network.md +++ b/windows/deployment/windows-autopilot/windows-autopilot-requirements-network.md @@ -41,7 +41,7 @@ In environments that have more restrictive internet access, or for those that re - NOTE:  If Windows Update is inaccessible, the AutoPilot process will still continue. -- **Delivery Optimization.**  When downloading Windows Updates, Microsoft Store apps and app updates, Office Updates and Intune Win32 Apps, the Delivery Optimization service is contacted to enable peer-to-peer sharing of content so that all devices don’t need to download it from the internet. +- **Delivery Optimization.**  When downloading Windows Updates, Microsoft Store apps and app updates, Office Updates and Intune Win32 Apps, the Delivery Optimization service is contacted to enable peer-to-peer sharing of content so that only a few devices need to download it from the internet. - From 114ed5680bfe010eaf5f9a4330e11ce12847c33c Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Tue, 19 Feb 2019 10:34:03 -0800 Subject: [PATCH 42/76] typo --- .../install-wd-app-guard.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard.md index 1ec89ed28f..68919bc05b 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard.md @@ -8,7 +8,7 @@ ms.pagetype: security ms.localizationpriority: medium author: justinha ms.author: justinha -ms.date: 02/07/2019 +ms.date: 02/19/2019 --- # Prepare to install Windows Defender Application Guard @@ -58,7 +58,7 @@ Employees can use hardware-isolated browsing sessions without any administrator Applies to: - Windows 10 Enterprise edition, version 1709 or higher -You and your security department can define your corporate boundaries by explicitly adding trusted domains and by customizing the Application Guard experience to meet and enforce your needs on employee devices. Enterprise-managed mode also automatically redirects any browser requests tooad non-enterprise domain(s) in the container. +You and your security department can define your corporate boundaries by explicitly adding trusted domains and by customizing the Application Guard experience to meet and enforce your needs on employee devices. Enterprise-managed mode also automatically redirects any browser requests to load non-enterprise domain(s) in the container. The following diagram shows the flow between the host PC and the isolated container. ![Flowchart for movement between Microsoft Edge and Application Guard](images/application-guard-container-v-host.png) From ff4afa1a5e90028e2745585fa9b4f8684462387f Mon Sep 17 00:00:00 2001 From: Geoff <34522990+GeoffFromMSFT@users.noreply.github.com> Date: Tue, 19 Feb 2019 10:37:51 -0800 Subject: [PATCH 43/76] Update policy-csp-devicelock.md Resolves ambiguity in DeviceLock/AlphanumericDevicePasswordRequired --- windows/client-management/mdm/policy-csp-devicelock.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-devicelock.md b/windows/client-management/mdm/policy-csp-devicelock.md index 94e15bf96e..e258974ff4 100644 --- a/windows/client-management/mdm/policy-csp-devicelock.md +++ b/windows/client-management/mdm/policy-csp-devicelock.md @@ -288,7 +288,7 @@ The following list shows the supported values: -Determines the type of PIN or password required. This policy only applies if the **DeviceLock/DevicePasswordEnabled** policy is set to 0 (required). +Determines the type of PIN required. This policy only applies if the **DeviceLock/DevicePasswordEnabled** policy is set to 0 (required). > [!NOTE] > This policy must be wrapped in an Atomic command. @@ -306,9 +306,9 @@ Determines the type of PIN or password required. This policy only applies if the The following list shows the supported values: -- 0 – Alphanumeric PIN or password required. -- 1 – Numeric PIN or password required. -- 2 (default) – Users can choose: Numeric PIN or password, or Alphanumeric PIN or password. +- 0 – Password or Alphanumeric PIN required. +- 1 – Password or Numeric PIN required. +- 2 (default) – Password, Numeric PIN, or Alphanumeric PIN required. From ddb1cf5e7ad5d59ebeff264e82432e1d8d47f107 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Tue, 19 Feb 2019 19:57:04 +0000 Subject: [PATCH 44/76] Updated conditional-access-windows-defender-advanced-threat-protection.md --- ...ional-access-windows-defender-advanced-threat-protection.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md index 70e3d006fa..0db8c85384 100644 --- a/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md @@ -15,7 +15,6 @@ manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: article -ms.date: 04/24/2018 --- # Enable conditional access to better protect users, devices, and data @@ -57,7 +56,7 @@ There are three ways to address a risk: 2. Resolve active alerts on the machine. This will remove the risk from the machine. 3. You can remove the machine from the active policies and consequently, conditional access will not be applied on the machine. -Manual remediation requires a secops admin to investigate an alert and address the risk seen on the device. The automated remediation is configured through configuration settings provided in the following section, [Configure conditional access](#configure-conditional-access). +Manual remediation requires a secops admin to investigate an alert and address the risk seen on the device. The automated remediation is configured through configuration settings provided in the following section, [Configure conditional access](configure-conditional-access-windows-defender-advanced-threat-protection.md). When the risk is removed either through manual or automated remediation, the device returns to a compliant state and access to applications is granted. From 864845e0b9790d27ac566bdd036535850ffb9031 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Tue, 19 Feb 2019 11:57:23 -0800 Subject: [PATCH 45/76] revised step --- .../threat-protection/intelligence/safety-scanner-download.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/intelligence/safety-scanner-download.md b/windows/security/threat-protection/intelligence/safety-scanner-download.md index b122b4f14c..4ae4b880f3 100644 --- a/windows/security/threat-protection/intelligence/safety-scanner-download.md +++ b/windows/security/threat-protection/intelligence/safety-scanner-download.md @@ -28,12 +28,14 @@ Safety Scanner only scans when manually triggered and is available for use 10 da > **NOTE:** Safety scanner is a portable executable and does not appear in the Windows Start menu or as an icon on the desktop. Note where you saved this download. ## System requirements + Safety Scanner helps remove malicious software from computers running Windows 10, Windows 10 Tech Preview, Windows 8.1, Windows 8, Windows 7, Windows Server 2016, Windows Server Tech Preview, Windows Server 2012 R2, Windows Server 2012, Windows Server 2008 R2, or Windows Server 2008. Please refer to the [Microsoft Lifecycle Policy](https://support.microsoft.com/lifecycle). ## How to run a scan + 1. Download this tool and open it. 2. Select the type of scan you want run and start the scan. -3. Review the scan results displayed on screen. The tool lists all identified malware. +3. Review the scan results displayed on screen. For detailed detection results, view the log at **%SYSTEMROOT%\debug\msert.log**. To remove this tool, delete the executable file (msert.exe by default). From d6cb2517e33adc3478e5ab3028903196557705fa Mon Sep 17 00:00:00 2001 From: jaimeo Date: Tue, 19 Feb 2019 12:14:28 -0800 Subject: [PATCH 46/76] added some info about why collecting device names is worth doing --- .../deployment/update/windows-analytics-FAQ-troubleshooting.md | 2 +- windows/deployment/update/windows-analytics-get-started.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/deployment/update/windows-analytics-FAQ-troubleshooting.md b/windows/deployment/update/windows-analytics-FAQ-troubleshooting.md index 31b15c1429..c11042619d 100644 --- a/windows/deployment/update/windows-analytics-FAQ-troubleshooting.md +++ b/windows/deployment/update/windows-analytics-FAQ-troubleshooting.md @@ -195,7 +195,7 @@ Finally, Upgrade Readiness only collects IE site discovery data on devices that > IE site discovery is disabled on devices running Windows 7 and Windows 8.1 that are in Switzerland and EU countries. ### Device names not appearing for Windows 10 devices -Starting with Windows 10, version 1803, the device name is no longer collected by default and requires a separate opt-in. For more information, see [Enrolling devices in Windows Analytics](windows-analytics-get-started.md). +Starting with Windows 10, version 1803, the device name is no longer collected by default and requires a separate opt-in. For more information, see [Enrolling devices in Windows Analytics](windows-analytics-get-started.md). Allowing device names to be collected can make it easier for you to identify individual devices that report problems. Without the device name, Windows Analytics can only label devices by a GUID that it generates. ### Disable Upgrade Readiness diff --git a/windows/deployment/update/windows-analytics-get-started.md b/windows/deployment/update/windows-analytics-get-started.md index 11b2b08514..849127c525 100644 --- a/windows/deployment/update/windows-analytics-get-started.md +++ b/windows/deployment/update/windows-analytics-get-started.md @@ -163,7 +163,7 @@ These policies are under Microsoft\Windows\DataCollection: | CommercialId | In order for your devices to show up in Windows Analytics, they must be configured with your organization’s Commercial ID. | | AllowTelemetry (in Windows 10) | 1 (Basic), 2 (Enhanced) or 3 (Full) diagnostic data. Windows Analytics will work with basic diagnostic data, but more features are available when you use the Enhanced level (for example, Device Health requires Enhanced diagnostic data and Upgrade Readiness only collects app usage and site discovery data on Windows 10 devices with Enhanced diagnostic data). For more information, see [Configure Windows diagnostic data in your organization](https://docs.microsoft.com/windows/configuration/configure-windows-diagnostic-data-in-your-organization). | | LimitEnhancedDiagnosticDataWindowsAnalytics (in Windows 10) | Only applies when AllowTelemetry=2. Limits the Enhanced diagnostic data events sent to Microsoft to just those needed by Windows Analytics. For more information, see [Windows 10, version 1709 enhanced diagnostic data events and fields used by Windows Analytics](https://docs.microsoft.com/windows/configuration/enhanced-diagnostic-data-windows-analytics-events-and-fields).| -| AllowDeviceNameInTelemetry (in Windows 10) | In Windows 10, version 1803, a separate opt-in is required to enable devices to continue to send the device name. | +| AllowDeviceNameInTelemetry (in Windows 10) | In Windows 10, version 1803, a separate opt-in is required to enable devices to continue to send the device name. Allowing device names to be collected can make it easier for you to identify individual devices that report problems. Without the device name, Windows Analytics can only label devices by a GUID that it generates. | | CommercialDataOptIn (in Windows 7 and Windows 8) | 1 is required for Upgrade Readiness, which is the only solution that runs on Windows 7 or Windows 8. | From 9dba6cd3110e9f5a26f042466d939e8afea6897a Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Tue, 19 Feb 2019 16:54:03 -0800 Subject: [PATCH 47/76] removed incorrect ps example --- .../bitlocker-how-to-deploy-on-windows-server.md | 9 ++------- 1 file changed, 2 insertions(+), 7 deletions(-) diff --git a/windows/security/information-protection/bitlocker/bitlocker-how-to-deploy-on-windows-server.md b/windows/security/information-protection/bitlocker/bitlocker-how-to-deploy-on-windows-server.md index 491f941bf8..972960257a 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-how-to-deploy-on-windows-server.md +++ b/windows/security/information-protection/bitlocker/bitlocker-how-to-deploy-on-windows-server.md @@ -7,7 +7,7 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security author: brianlic-msft -ms.date: 02/04/2019 +ms.date: 02/19/2019 --- # BitLocker: How to deploy on Windows Server 2012 and later @@ -41,12 +41,7 @@ Windows PowerShell offers administrators another option for BitLocker feature in   ### Using the servermanager module to install BitLocker -The `servermanager` Windows PowerShell module can use either the `Install-WindowsFeature` or `Add-WindowsFeature` to install the BitLocker feature. The `Add-WindowsFeature` cmdlet is merely a stub to the `Install-WindowsFeature`. This example uses the `Install-WindowsFeature` cmdlet. The feature name for BitLocker in the `servermanager` module is `BitLocker`. This can be determined using the `Get-WindowsFeature` cmdlet with a query such as: - -``` syntax -Get-WindowsFeature Bit -``` -The results of this command displays a table of all of the feature names beginning with “Bit” as their prefix. This allows you to confirm that the feature name is `BitLocker` for the BitLocker feature. +The `servermanager` Windows PowerShell module can use either the `Install-WindowsFeature` or `Add-WindowsFeature` to install the BitLocker feature. The `Add-WindowsFeature` cmdlet is merely a stub to the `Install-WindowsFeature`. This example uses the `Install-WindowsFeature` cmdlet. The feature name for BitLocker in the `servermanager` module is `BitLocker`. By default, installation of features in Windows PowerShell does not include optional sub-features or management tools as part of the install process. This can be seen using the `-WhatIf` option in Windows PowerShell. From d8f11d56bb379dee507e20ee5c56a98867b85d5b Mon Sep 17 00:00:00 2001 From: Ronald-den-Os <41728016+Ronald-den-Os@users.noreply.github.com> Date: Wed, 20 Feb 2019 09:11:27 +0100 Subject: [PATCH 48/76] Typo In the box just above Configure Company Settings is says intstalled instead of installed --- .../hello-for-business/hello-key-trust-deploy-mfa.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-key-trust-deploy-mfa.md b/windows/security/identity-protection/hello-for-business/hello-key-trust-deploy-mfa.md index cbd0e62a4f..0db3bc6070 100644 --- a/windows/security/identity-protection/hello-for-business/hello-key-trust-deploy-mfa.md +++ b/windows/security/identity-protection/hello-for-business/hello-key-trust-deploy-mfa.md @@ -224,7 +224,7 @@ See [Configure Azure Multi-Factor Authentication Server to work with AD FS in Wi Sign-in the federation server with _Domain Admin_ equivalent credentials and follow [To install and configure the Azure Multi-Factor Authentication server](https://docs.microsoft.com/azure/multi-factor-authentication/multi-factor-authentication-get-started-server#to-install-and-configure-the-azure-multi-factor-authentication-server) for an express setup with the configuration wizard. You can re-run the authentication wizard by selecting it from the Tools menu on the server. >[!IMPORTANT] ->Only follow the above mention article to install Azure MFA Server. Once it is intstalled, continue configuration using this article. +>Only follow the above mention article to install Azure MFA Server. Once it is installed, continue configuration using this article. ### Configuring Company Settings From 15061e5e1dea159deb2f5ac359784b0b12e00a78 Mon Sep 17 00:00:00 2001 From: Lexy2 <38648992+Lexy2@users.noreply.github.com> Date: Wed, 20 Feb 2019 12:20:01 +0300 Subject: [PATCH 49/76] Update bitlocker-how-to-enable-network-unlock.md - Corrected certificate store name from FVENKP to FVE_NKP - Added the requirement to reboot the clients after applying the policy - Added the requirement for the clients to have a TPM protector - Removed duplicate steps of adding a TPM protector (require TPM+PIN vs allow TPM+PIN) - Fixed linking within the document --- .../bitlocker-how-to-enable-network-unlock.md | 59 +++++++++---------- 1 file changed, 27 insertions(+), 32 deletions(-) diff --git a/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md b/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md index 4643595543..8d2dd4d8dc 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md +++ b/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md @@ -7,7 +7,7 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security author: brianlic-msft -ms.date: 06/18/2018 +ms.date: 02/20/2019 --- # BitLocker: How to enable Network Unlock @@ -39,6 +39,7 @@ Network Unlock must meet mandatory hardware and software requirements before the - You must be running at least Windows 8 or Windows Server 2012. - Any supported operating system with UEFI DHCP drivers can be Network Unlock clients. +- Network Unlock clients must have a TPM chip and at least one TPM protector. - A server running the Windows Deployment Services (WDS) role on any supported server operating system. - BitLocker Network Unlock optional feature installed on any supported server operating system. - A DHCP server, separate from the WDS server. @@ -83,7 +84,7 @@ The server side configuration to enable Network Unlock also requires provisionin The following steps allow an administrator to configure Network Unlock in a domain where the Domain Functional Level is at least Windows Server 2012. -### Install the WDS Server role +###
Install the WDS Server role The BitLocker Network Unlock feature will install the WDS role if it is not already installed. If you want to install it separately before you install BitLocker Network Unlock you can use Server Manager or Windows PowerShell. To install the role using Server Manager, select the **Windows Deployment Services** role in Server Manager. @@ -95,7 +96,7 @@ Install-WindowsFeature WDS-Deployment You must configure the WDS server so that it can communicate with DHCP (and optionally Active Directory Doman Services) and the client computer. You can do using the WDS management tool, wdsmgmt.msc, which starts the Windows Deployment Services Configuration Wizard. -### Confirm the WDS Service is running +### Confirm the WDS Service is running To confirm the WDS service is running, use the Services Management Console or Windows PowerShell. To confirm the service is running in Services Management Console, open the console using **services.msc** and check the status of the Windows Deployment Services service. @@ -104,7 +105,7 @@ To confirm the service is running using Windows PowerShell, use the following co ``` syntax Get-Service WDSServer ``` -### Install the Network Unlock feature +### Install the Network Unlock feature To install the Network Unlock feature, use Server Manager or Windows PowerShell. To install the feature using Server Manager, select the **BitLocker Network Unlock** feature in the Server Manager console. @@ -113,7 +114,7 @@ To install the feature using Windows PowerShell, use the following command: ``` syntax Install-WindowsFeature BitLocker-NetworkUnlock ``` -### Create the certificate template for Network Unlock +### Create the certificate template for Network Unlock A properly configured Active Directory Services Certification Authority can use this certificate template to create and issue Network Unlock certificates. @@ -143,7 +144,7 @@ To add the Network Unlock template to the Certification Authority, open the Cert After adding the Network Unlock template to the Certification Authority, this certificate can be used to configure BitLocker Network Unlock. -### Create the Network Unlock certificate +### Create the Network Unlock certificate Network Unlock can use imported certificates from an existing PKI infrastructure, or you can use a self-signed certificate. @@ -214,7 +215,7 @@ Certreq example: 5. Launch Certificates - Local Machine by running **certlm.msc**. 6. Create a .pfx file by opening the **Certificates – Local Computer\\Personal\\Certificates** path in the navigation pane, right-clicking the previously imported certificate, selecting **All Tasks**, then **Export**. Follow through the wizard to create the .pfx file. -### Deploy the private key and certificate to the WDS server +### Deploy the private key and certificate to the WDS server With the certificate and key created, deploy them to the infrastructure to properly unlock systems. To deploy the certificates, do the following: @@ -230,7 +231,7 @@ With certificate and key deployed to the WDS server for Network Unlock, the fina The following steps describe how to enable the Group Policy setting that is a requirement for configuring Network Unlock. 1. Open Group Policy Management Console (gpmc.msc). -2. Enable the policy **Require additional authentication at startup** and select the **Require startup PIN with TPM** option. +2. Enable the policy **Require additional authentication at startup** and select the **Require startup PIN with TPM** or **Allow startup PIN with TPM** option. 3. Turn on BitLocker with TPM+PIN protectors on all domain-joined computers. The following steps describe how to deploy the required Group Policy setting: @@ -247,15 +248,10 @@ The following steps describe how to deploy the required Group Policy setting: 3. Follow the wizard steps and import the .cer file that was copied earlier. >**Note:**  Only one network unlock certificate can be available at a time. If a new certificate is required, delete the current certificate before deploying a new one. The Network Unlock certificate is located in the **HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\SystemCertificates\\FVE\_NKP** key on the client computer. + +5. Reboot the clients after deploying the group policy. +>**Note:** The **Network (Certificate Based)** protector will be added only after a reboot with the policy enabled and a valid certificate present in the FVE_NKP store.   -### Require TPM+PIN protectors at startup - -An additional step is for enterprises to use TPM+PIN protectors for an extra level of security. To require TPM+PIN protectors in an environment, do the following: - -1. Open Group Policy Management Console (gpmc.msc). -2. Enable the policy **Require additional authentication at startup** and select the **Require startup PIN with TPM** option. -3. Turn on BitLocker with TPM+PIN protectors on all domain-joined computers. - ### Subnet policy configuration files on WDS Server (Optional) By default, all clients with the correct Network Unlock Certificate and valid Network Unlock protectors that have wired access to a Network Unlock-enabled WDS server via DHCP are unlocked by the server. A subnet policy configuration file on the WDS server can be created to limit which subnet(s) Network Unlock clients can use to unlock. @@ -285,13 +281,13 @@ The subnet policy configuration file must use a “\[SUBNETS\]” section to ide To disallow the use of a certificate altogether, its subnet list may contain the line “DISABLED". -## Turning off Network Unlock +## Turning off Network Unlock To turn off the unlock server, the PXE provider can be unregistered from the WDS server or uninstalled altogether. However, to stop clients from creating Network Unlock protectors the **Allow Network Unlock at startup** Group Policy setting should be disabled. When this policy setting is updated to disabled on client computers any Network Unlock key protectors on the computer will be deleted. Alternatively, the BitLocker Network Unlock certificate policy can be deleted on the domain controller to accomplish the same task for an entire domain. ->**Note:**  Removing the FVENKP certificate store that contains the Network Unlock certificate and key on the WDS server will also effectively disable the server’s ability to respond to unlock requests for that certificate. However, this is seen as an error condition and is not a supported or recommended method for turning off the Network Unlock server. +>**Note:**  Removing the FVE_NKP certificate store that contains the Network Unlock certificate and key on the WDS server will also effectively disable the server’s ability to respond to unlock requests for that certificate. However, this is seen as an error condition and is not a supported or recommended method for turning off the Network Unlock server.   -## Update Network Unlock certificates +## Update Network Unlock certificates To update the certificates used by Network Unlock, administrators need to import or generate the new certificate for the server and then update the Network Unlock certificate Group Policy setting on the domain controller. @@ -302,12 +298,13 @@ Troubleshooting Network Unlock issues begins by verifying the environment. Many - Verify client hardware is UEFI-based and is on firmware version is 2.3.1 and that the UEFI firmware is in native mode without a Compatibility Support Module (CSM) for BIOS mode enabled. Do this by checking that the firmware does not have an option enabled such as "Legacy mode" or "Compatibility mode" or that the firmware does not appear to be in a BIOS-like mode. - All required roles and services are installed and started - Public and private certificates have been published and are in the proper certificate containers. The presence of the Network Unlock certificate can be verified in the Microsoft Management Console (MMC.exe) on the WDS server with the certificate snap-ins for the local computer enabled. The client certificate can be verified by checking the registry key **HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\SystemCertificates\\FVE\_NKP** on the client computer. -- Group policy for Network Unlock is enabled and linked to the appropriate domains +- Group policy for Network Unlock is enabled and linked to the appropriate domains. - Verify group policy is reaching the clients properly. This can be done using the GPRESULT.exe or RSOP.msc utilities. +- Verify the clients were rebooted after applying the policy. - Verify the **Network (Certificate Based)** protector is listed on the client. This can be done using either manage-bde or Windows PowerShell cmdlets. For example the following command will list the key protectors currently configured on the C: drive of the lcoal computer: ``` syntax - Manage-bde –protectors –get C: + manage-bde –protectors –get C: ``` >**Note:**  Use the output of manage-bde along with the WDS debug log to determine if the proper certificate thumbprint is being used for Network Unlock   @@ -343,14 +340,14 @@ Network Unlock and the accompanying Group Policy settings were introduced in Win The following steps can be used to configure Network Unlock on these older systems. -1. [Step One: Install the WDS Server role](#bkmk-stepone) -2. [Step Two: Confirm the WDS Service is running](#bkmk-steptwo) -3. [Step Three: Install the Network Unlock feature](#bkmk-stepthree) -4. [Step Four: Create the Network Unlock certificate](#bkmk-stepfour) -5. [Step Five: Deploy the private key and certificate to the WDS server](#bkmk-stepfive) -6. [Step Six: Configure registry settings for Network Unlock](#bkmk-stepsix) +1. [Install the WDS Server role](#bkmk-installwdsrole) +2. [Confirm the WDS Service is running](#bkmk-confirmwdsrunning) +3. [Install the Network Unlock feature](#bkmk-installnufeature) +4. [Create the Network Unlock certificate](bkmk-createcert) +5. [Deploy the private key and certificate to the WDS server](#bkmk-deploycert) +6. Configure registry settings for Network Unlock: - Apply the registry settings by running the following certutil script on each computer running any of the client operating systems designated in the **Applies To** list at the beginning of this topic. + Apply the registry settings by running the following certutil script (assuming your network unlock certificate file is called **BitLocker-NetworkUnlock.cer**) on each computer running any of the client operating systems designated in the **Applies To** list at the beginning of this topic. certutil -f -grouppolicy -addstore FVE_NKP BitLocker-NetworkUnlock.cer reg add "HKLM\SOFTWARE\Policies\Microsoft\FVE" /v OSManageNKP /t REG_DWORD /d 1 /f @@ -361,10 +358,8 @@ The following steps can be used to configure Network Unlock on these older syste reg add "HKLM\SOFTWARE\Policies\Microsoft\FVE" /v UseTPMKey /t REG_DWORD /d 2 /f reg add "HKLM\SOFTWARE\Policies\Microsoft\FVE" /v UseTPMKeyPIN /t REG_DWORD /d 2 /f -7. [Create the Network Unlock certificate](#bkmk-stepfour) -8. [Deploy the private key and certificate to the WDS server](#bkmk-stepfive) -9. [Create the certificate template for Network Unlock](#bkmk-createcerttmpl) -10. [Require TPM+PIN protectors at startup](#bkmk-stepseven) +7. Set up a TPM protector on the clients +8. Reboot the clients to add the Network (Certificate Based) protector ## See also From 9ed49958e5107a2f0c0127387925b3602988e765 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Wed, 20 Feb 2019 16:59:26 +0000 Subject: [PATCH 50/76] Merged PR 14382: 1902 update --- ...ndows-diagnostic-events-and-fields-1703.md | 467 +++++++-- ...ndows-diagnostic-events-and-fields-1709.md | 793 ++++++++++++---- ...ndows-diagnostic-events-and-fields-1803.md | 811 +++++++++++----- ...ndows-diagnostic-events-and-fields-1809.md | 888 +++++++++++++----- 4 files changed, 2235 insertions(+), 724 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md index 79ef8ac888..05bbed9fe0 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md @@ -9,7 +9,7 @@ ms.pagetype: security localizationpriority: high author: brianlic-msft ms.author: brianlic -ms.date: 12/27/2018 +ms.date: 02/15/2019 --- @@ -65,11 +65,12 @@ The following fields are available: - **InventorySystemBios** The count of DecisionDevicePnp objects present on this machine targeting the next release of Windows - **PCFP** The count of DecisionDriverPackage objects present on this machine targeting the next release of Windows - **SystemProcessorCompareExchange** The count of DecisionMatchingInfoBlock objects present on this machine targeting the next release of Windows -- **SystemProcessorNx** The count of DataSourceMatchingInfoPostUpgrade objects present on this machine targeting the next release of Windows -- **SystemProcessorSse2** The count of DecisionMatchingInfoPostUpgrade objects present on this machine targeting the next release of Windows -- **SystemWim** The count of DecisionMediaCenter objects present on this machine targeting the next release of Windows +- **SystemProcessorNx** The total number of objects of this type present on this device. +- **SystemProcessorPrefetchW** The total number of objects of this type present on this device. +- **SystemProcessorSse2** The total number of objects of this type present on this device. +- **SystemWim** The total number of objects of this type present on this device. - **SystemWindowsActivationStatus** The count of DecisionSystemBios objects present on this machine targeting the next release of Windows -- **SystemWlan** The count of InventoryApplicationFile objects present on this machine. +- **SystemWlan** The total number of objects of this type present on this device. - **Wmdrm_RS3** The total Wmdrm objects targeting the next release of Windows on this device. @@ -475,7 +476,7 @@ The following fields are available: ### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveAdd -This event sends compatibility decision data about non-blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up-to-date. +This event sends compatibility decision data about non-blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up to date. The following fields are available: @@ -1270,7 +1271,7 @@ This event sends version data about the Apps running on this device, to help kee The following fields are available: - **CensusVersion** The version of Census that generated the current data for this device. -- **IEVersion** Retrieves which version of Internet Explorer is running on this device. +- **IEVersion** The version of Internet Explorer that is running on the device. ### Census.Battery @@ -1757,6 +1758,20 @@ The following fields are available: - **syncId** A string used to group StartSync, EndSync, Add, and Remove operations that belong together. This field is unique by Sync period and is used to disambiguate in situations where multiple agents perform overlapping inventories for the same object. +## Component-based Servicing events + +### CbsServicingProvider.CbsCapabilitySessionFinalize + +This event provides information about the results of installing or uninstalling optional Windows content from Windows Update. + + + +### CbsServicingProvider.CbsCapabilitySessionPended + +This event provides information about the results of installing optional Windows content that requires a reboot to keep Windows up to date. + + + ## Content Delivery Manager events ### Microsoft.Windows.ContentDeliveryManager.ProcessCreativeEvent @@ -1827,6 +1842,7 @@ The following fields are available: - **LastBugCheckOriginalDumpType** The type of crash dump the system intended to save. - **LastBugCheckOtherSettings** Other crash dump settings. - **LastBugCheckParameter1** The first parameter with additional info on the type of the error. +- **LastBugCheckProgress** Progress towards writing out the last crash dump. - **LastSuccessfullyShutdownBootId** The Boot ID of the last fully successful shutdown. - **PowerButtonCumulativePressCount** Indicates the number of times the power button has been pressed ("pressed" not to be confused with "released"). - **PowerButtonCumulativeReleaseCount** Indicates the number of times the power button has been released ("released" not to be confused with "pressed"). @@ -1841,7 +1857,7 @@ The following fields are available: - **PowerButtonPressPowerWatchdogArmed** Indicates whether or not the watchdog for the monitor was active at the time of the last power button press. - **TransitionInfoBootId** The Boot ID of the captured transition information. - **TransitionInfoCSCount** The total number of times the system transitioned from "Connected Standby" mode to "On" when the last marker was saved. -- **TransitionInfoCSEntryReason** Indicates the reason the device last entered "Connected Standby" mode ("entered" not to be confused with "exited"). +- **TransitionInfoCSEntryReason** Indicates the reason the device last entered "Connected Standby" mode ("entered" not to be confused with "exited"). - **TransitionInfoCSExitReason** Indicates the reason the device last exited "Connected Standby" mode ("exited" not to be confused with "entered"). - **TransitionInfoCSInProgress** Indicates whether the system was in or entering Connected Standby mode when the last marker was saved. - **TransitionInfoLastReferenceTimeChecksum** The checksum of TransitionInfoLastReferenceTimestamp. @@ -1890,7 +1906,7 @@ The following fields are available: - **CanPerformDiagnosticEscalations** True if UTC is allowed to perform all scenario escalations. - **CanPerformScripting** True if UTC is allowed to perform scripting. - **CanPerformTraceEscalations** True if UTC is allowed to perform scenario escalations with tracing actions. -- **CanReportScenarios** True if UTC is allowed to load and report scenario completion, failure, and cancellation events. +- **CanReportScenarios** True if we can report scenario completions, false otherwise. - **PreviousPermissions** Bitmask representing the previously configured permissions since the telemetry client was last started. - **TransitionFromEverythingOff** True if this transition is moving from not allowing core telemetry to allowing core telemetry. @@ -2017,6 +2033,80 @@ The following fields are available: - **WDDMVersion** The Windows Display Driver Model version. +## Failover Clustering events + +### Microsoft.Windows.Server.FailoverClusteringCritical.ClusterSummary2 + +This event returns information about how many resources and of what type are in the server cluster. This data is collected to keep Windows Server safe, secure, and up to date. The data includes information about whether hardware is configured correctly, if the software is patched correctly, and assists in preventing crashes by attributing issues (like fatal errors) to workloads and system configurations. + +The following fields are available: + +- **autoAssignSite** The cluster parameter: auto site. +- **autoBalancerLevel** The cluster parameter: auto balancer level. +- **autoBalancerMode** The cluster parameter: auto balancer mode. +- **blockCacheSize** The configured size of the block cache. +- **ClusterAdConfiguration** The ad configuration of the cluster. +- **clusterAdType** The cluster parameter: mgmt_point_type. +- **clusterDumpPolicy** The cluster configured dump policy. +- **clusterFunctionalLevel** The current cluster functional level. +- **clusterGuid** The unique identifier for the cluster. +- **clusterWitnessType** The witness type the cluster is configured for. +- **countNodesInSite** The number of nodes in the cluster. +- **crossSiteDelay** The cluster parameter: CrossSiteDelay. +- **crossSiteThreshold** The cluster parameter: CrossSiteThreshold. +- **crossSubnetDelay** The cluster parameter: CrossSubnetDelay. +- **crossSubnetThreshold** The cluster parameter: CrossSubnetThreshold. +- **csvCompatibleFilters** The cluster parameter: ClusterCsvCompatibleFilters. +- **csvIncompatibleFilters** The cluster parameter: ClusterCsvIncompatibleFilters. +- **csvResourceCount** The number of resources in the cluster. +- **currentNodeSite** The name configured for the current site for the cluster. +- **dasModeBusType** The direct storage bus type of the storage spaces. +- **downLevelNodeCount** The number of nodes in the cluster that are running down-level. +- **drainOnShutdown** Specifies whether a node should be drained when it is shut down. +- **dynamicQuorumEnabled** Specifies whether dynamic Quorum has been enabled. +- **enforcedAntiAffinity** The cluster parameter: enforced anti affinity. +- **genAppNames** The win32 service name of a clustered service. +- **genSvcNames** The command line of a clustered genapp. +- **hangRecoveryAction** The cluster parameter: hang recovery action. +- **hangTimeOut** Specifies the “hang time out” parameter for the cluster. +- **isCalabria** Specifies whether storage spaces direct is enabled. +- **isMixedMode** Identifies if the cluster is running with different version of OS for nodes. +- **isRunningDownLevel** Identifies if the current node is running down-level. +- **logLevel** Specifies the granularity that is logged in the cluster log. +- **logSize** Specifies the size of the cluster log. +- **lowerQuorumPriorityNodeId** The cluster parameter: lower quorum priority node ID. +- **minNeverPreempt** The cluster parameter: minimum never preempt. +- **minPreemptor** The cluster parameter: minimum preemptor priority. +- **netftIpsecEnabled** The parameter: netftIpsecEnabled. +- **NodeCount** The number of nodes in the cluster. +- **nodeId** The current node number in the cluster. +- **nodeResourceCounts** Specifies the number of node resources. +- **nodeResourceOnlineCounts** Specifies the number of node resources that are online. +- **numberOfSites** The number of different sites. +- **numNodesInNoSite** The number of nodes not belonging to a site. +- **plumbAllCrossSubnetRoutes** The cluster parameter: plumb all cross subnet routes. +- **preferredSite** The preferred site location. +- **privateCloudWitness** Specifies whether a private cloud witness exists for this cluster. +- **quarantineDuration** The quarantine duration. +- **quarantineThreshold** The quarantine threshold. +- **quorumArbitrationTimeout** In the event of an arbitration event, this specifies the quorum timeout period. +- **resiliencyLevel** Specifies the level of resiliency. +- **resourceCounts** Specifies the number of resources. +- **resourceTypeCounts** Specifies the number of resource types in the cluster. +- **resourceTypes** Data representative of each resource type. +- **resourceTypesPath** Data representative of the DLL path for each resource type. +- **sameSubnetDelay** The cluster parameter: same subnet delay. +- **sameSubnetThreshold** The cluster parameter: same subnet threshold. +- **secondsInMixedMode** The amount of time (in seconds) that the cluster has been in mixed mode (nodes with different operating system versions in the same cluster). +- **securityLevel** The cluster parameter: security level. +- **sharedVolumeBlockCacheSize** Specifies the block cache size for shared for shared volumes. +- **shutdownTimeoutMinutes** Specifies the amount of time it takes to time out when shutting down. +- **upNodeCount** Specifies the number of nodes that are up (online). +- **useClientAccessNetworksForCsv** The cluster parameter: use client access networks for CSV. +- **vmIsolationTime** The cluster parameter: VM isolation time. +- **witnessDatabaseWriteTimeout** Specifies the timeout period for writing to the quorum witness database. + + ## Fault Reporting events ### Microsoft.Windows.FaultReporting.AppCrashEvent @@ -2227,6 +2317,30 @@ The following fields are available: - **Version** The version number of the program. +### Microsoft.Windows.Inventory.Core.InventoryApplicationDriverAdd + +This event represents what drivers an application installs. + + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationDriverStartSync + +The InventoryApplicationDriverStartSync event indicates that a new set of InventoryApplicationDriverStartAdd events will be sent. + + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationFrameworkAdd + +This event provides the basic metadata about the frameworks an application may depend on. + + + +### Microsoft.Windows.Inventory.Core.InventoryApplicationFrameworkStartSync + +This event indicates that a new set of InventoryApplicationFrameworkAdd events will be sent. + + + ### Microsoft.Windows.Inventory.Core.InventoryApplicationRemove This event indicates that a new set of InventoryDevicePnpAdd events will be sent. @@ -2378,33 +2492,34 @@ This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedevic The following fields are available: -- **Class** The device setup class of the driver loaded for the device -- **ClassGuid** The device class GUID from the driver package -- **COMPID** A JSON array the provides the value and order of the compatible ID tree for the device. See [COMPID](#compid). -- **ContainerId** A system-supplied GUID that uniquely groups the functional devices associated with a single-function or multifunction device installed in the device. -- **Description** The device description -- **DeviceState** DeviceState is a bitmask of the following: DEVICE_IS_CONNECTED 0x0001 (currently only for container). DEVICE_IS_NETWORK_DEVICE 0x0002 (currently only for container). DEVICE_IS_PAIRED 0x0004 (currently only for container). DEVICE_IS_ACTIVE 0x0008 (currently never set). DEVICE_IS_MACHINE 0x0010 (currently only for container). DEVICE_IS_PRESENT 0x0020 (currently always set). DEVICE_IS_HIDDEN 0x0040. DEVICE_IS_PRINTER 0x0080 (currently only for container). DEVICE_IS_WIRELESS 0x0100. DEVICE_IS_WIRELESS_FAT 0x0200. The most common values are therefore: 32 (0x20)= device is present. 96 (0x60)= device is present but hidden. 288 (0x120)= device is a wireless device that is present -- **DriverId** A unique identifier for the installed device. +- **Class** The device setup class of the driver loaded for the device. +- **ClassGuid** The device class unique identifier of the driver package loaded on the device. +- **COMPID** The list of “Compatible IDs” for this device. See [COMPID](#compid). +- **ContainerId** The system-supplied unique identifier that specifies which group(s) the device(s) installed on the parent (main) device belong to. +- **Description** The description of the device. +- **DeviceState** Identifies the current state of the parent (main) device. +- **DriverId** The unique identifier for the installed driver. - **DriverName** The name of the driver image file. +- **DriverPackageStrongName** The immediate parent directory name in the Directory field of InventoryDriverPackage. - **DriverVerDate** The date of the driver loaded for the device - **DriverVerVersion** The version of the driver loaded for the device -- **Enumerator** The bus that enumerated the device -- **HWID** A JSON array that provides the value and order of the HWID tree for the device. See [HWID](#hwid). -- **Inf** The INF file name. -- **InstallState** The device installation state. One of these values: https://msdn.microsoft.com/en-us/library/windows/hardware/ff543130.aspx -- **InventoryVersion** The version of the inventory file generating the events. -- **LowerClassFilters** Lower filter class drivers IDs installed for the device. -- **LowerFilters** Lower filter drivers IDs installed for the device -- **Manufacturer** The device manufacturer -- **MatchingID** Represents the hardware ID or compatible ID that Windows uses to install a device instance -- **Model** The device model -- **ParentId** Device instance id of the parent of the device -- **ProblemCode** The current error code for the device. -- **Provider** The device provider -- **Service** The device service name -- **STACKID** A JSON array that provides the value and order of the STACKID tree for the device. See [STACKID](#stackid). -- **UpperClassFilters** Upper filter class drivers IDs installed for the device -- **UpperFilters** Upper filter drivers IDs installed for the device +- **Enumerator** Identifies the bus that enumerated the device. +- **HWID** A list of hardware IDs for the device. See [HWID](#hwid). +- **Inf** The name of the INF file (possibly renamed by the OS, such as oemXX.inf). +- **InstallState** The device installation state. For a list of values, see: https://msdn.microsoft.com/en-us/library/windows/hardware/ff543130.aspx +- **InventoryVersion** The version number of the inventory process generating the events. +- **LowerClassFilters** The identifiers of the Lower Class filters installed for the device. +- **LowerFilters** The identifiers of the Lower filters installed for the device. +- **Manufacturer** The manufacturer of the device. +- **MatchingID** The Hardware ID or Compatible ID that Windows uses to install a device instance. +- **Model** Identifies the model of the device. +- **ParentId** The Device Instance ID of the parent of the device. +- **ProblemCode** The error code currently returned by the device, if applicable. +- **Provider** Identifies the device provider. +- **Service** The name of the device service. +- **STACKID** The list of hardware IDs for the stack. See [STACKID](#stackid). +- **UpperClassFilters** The identifiers of the Upper Class filters installed for the device. +- **UpperFilters** The identifiers of the Upper filters installed for the device. ### Microsoft.Windows.Inventory.Core.InventoryDevicePnpRemove @@ -2429,6 +2544,18 @@ The following fields are available: - **InventoryVersion** The version of the inventory file generating the events. +### Microsoft.Windows.Inventory.Core.InventoryDeviceUsbHubClassAdd + +This event sends basic metadata about the USB hubs on the device. + + + +### Microsoft.Windows.Inventory.Core.InventoryDeviceUsbHubClassStartSync + +This event indicates that a new set of InventoryDeviceUsbHubClassAdd events will be sent. + + + ### Microsoft.Windows.Inventory.Core.InventoryDriverBinaryAdd This event provides the basic metadata about driver binaries running on the system. @@ -2567,6 +2694,18 @@ This event provides insight data on the installed Office products +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsRemove + +Indicates that this particular data object represented by the objectInstanceId is no longer present. + + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsStartSync + +This diagnostic event indicates that a new sync is being generated for this object type. + + + ### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeProductsAdd Describes Office Products installed. @@ -2591,6 +2730,18 @@ Indicates a new sync is being generated for this object type. +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBARuleViolationsStartSync + +This event indicates that a new sync is being generated for this object type. + + + +### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBAStartSync + +Diagnostic event to indicate a new sync is being generated for this object type. + + + ### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoAdd Provides data on Unified Update Platform (UUP) products and what version they are at. @@ -3215,6 +3366,12 @@ The following fields are available: - **Time** The system time at which the event began. +### Microsoft.Windows.Sediment.Info.DetailedState + +This event is sent when detailed state information is needed from an update trial run. + + + ### Microsoft.Windows.Sediment.Info.DownloadServiceError This event provides information when the Download Service returns an error. The information provided helps keep Windows up to date. @@ -3394,6 +3551,17 @@ The following fields are available: - **Url** The new URL from which content will be executed. +### Microsoft.Windows.Sediment.OSRSS.SelfUpdate + +This event returns metadata after Operating System Remediation System Service (OSRSS) successfully replaces itself with a new version. + +The following fields are available: + +- **ServiceVersionMajor** The major version number for the component. +- **ServiceVersionMinor** The minor version number for the component. +- **Time** The system timestamp for when the event occurred. + + ### Microsoft.Windows.Sediment.OSRSS.UrlState This event indicates the state the Operating System Remediation System Service (OSRSS) is in while attempting a download from the URL. @@ -3408,6 +3576,17 @@ The following fields are available: - **Time** System timestamp the event was fired +### Microsoft.Windows.Sediment.ServiceInstaller.ApplicabilityCheckFailed + +This event returns data relating to the error state after one of the applicability checks for the installer component of the Operating System Remediation System Service (OSRSS) has failed. + +The following fields are available: + +- **CheckName** The name of the applicability check that failed. +- **InstallerVersion** The version information for the installer component. +- **Time** The system timestamp for when the event occurred. + + ### Microsoft.Windows.Sediment.ServiceInstaller.AttemptingUpdate This event indicates the Operating System Remediation System Service (OSRSS) installer is attempting an update to itself. This information helps ensure Windows is up to date. @@ -3855,6 +4034,26 @@ The following fields are available: - **threadId** The ID of the thread on which the activity is executing. +## SIH events + +### SIHEngineTelemetry.EvalApplicability + +This event is sent when targeting logic is evaluated to determine if a device is eligible a given action. + + + +### SIHEngineTelemetry.ExecuteAction + +This event is triggered with SIH attempts to execute (e.g. install) the update or action in question. Includes important information like if the update required a reboot. + + + +### SIHEngineTelemetry.PostRebootReport + +This event reports the status of an action following a reboot, should one have been required. + + + ## Software update events ### SoftwareUpdateClientTelemetry.CheckForUpdates @@ -3977,36 +4176,36 @@ The following fields are available: - **ActiveDownloadTime** How long the download took, in seconds, excluding time where the update wasn't actively being downloaded. - **AppXBlockHashValidationFailureCount** A count of the number of blocks that have failed validation after being downloaded. -- **AppXDownloadScope** Indicates the scope of the download for application content. For streaming install scenarios, AllContent - non-streaming download, RequiredOnly - streaming download requested content required for launch, AutomaticOnly - streaming download requested automatic streams for the app, and Unknown - for events sent before download scope is determined by the Windows Update client. +- **AppXDownloadScope** Indicates the scope of the download for application content. - **BiosFamily** The family of the BIOS (Basic Input Output System). - **BiosName** The name of the device BIOS. - **BiosReleaseDate** The release date of the device BIOS. -- **BiosSKUNumber** The sku number of the device BIOS. +- **BiosSKUNumber** The SKU number of the device BIOS. - **BIOSVendor** The vendor of the BIOS. - **BiosVersion** The version of the BIOS. -- **BundleBytesDownloaded** How many bytes were downloaded for the specific content bundle. -- **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. +- **BundleBytesDownloaded** Number of bytes downloaded for the specific content bundle. +- **BundleId** Identifier associated with the specific content bundle. - **BundleRepeatFailFlag** Indicates whether this particular update bundle had previously failed to download. - **BundleRevisionNumber** Identifies the revision number of the content bundle. - **BytesDownloaded** How many bytes were downloaded for an individual piece of content (not the entire bundle). -- **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine does not exist, the value is null. -- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. -- **CbsDownloadMethod** Indicates whether the download was a full-file download or a partial/delta download. +- **CachedEngineVersion** The version of the “Self-Initiated Healing” (SIH) engine that is cached on the device, if applicable. +- **CallerApplicationName** The name provided by the application that initiated API calls into the software distribution client. +- **CbsDownloadMethod** Indicates whether the download was a full- or a partial-file download. - **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. - **CDNId** ID which defines which CDN the software distribution client downloaded the content from. - **ClientManagedByWSUSServer** Indicates whether the client is managed by Windows Server Update Services (WSUS). - **ClientVersion** The version number of the software distribution client. - **CurrentMobileOperator** The mobile operator the device is currently connected to. -- **DeviceModel** What is the device model. -- **DeviceOEM** What OEM does this device belong to. +- **DeviceModel** The model of the device. +- **DeviceOEM** Identifies the Original Equipment Manufacturer (OEM) of the device. - **DownloadPriority** Indicates whether a download happened at background, normal, or foreground priority. -- **DownloadScenarioId** A unique ID for a given download used to tie together WU and DO events. -- **DownloadType** Differentiates the download type of SIH downloads between Metadata and Payload downloads. -- **Edition** Indicates the edition of Windows being used. +- **DownloadScenarioId** A unique ID for a given download, used to tie together Windows Update and Delivery Optimizer events. +- **DownloadType** Differentiates the download type of “Self-Initiated Healing” (SIH) downloads between Metadata and Payload downloads. +- **Edition** Identifies the edition of Windows currently running on the device. - **EventInstanceID** A globally unique identifier for event instance. -- **EventNamespaceID** Indicates whether the event succeeded or failed. Has the format EventType+Event where Event is Succeeded, Cancelled, Failed, etc. -- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started downloading content, or whether it was cancelled, succeeded, or failed. -- **EventType** Possible values are Child, Bundle, or Driver. +- **EventNamespaceID** The ID of the test events environment. +- **EventScenario** Indicates the purpose for sending this event: whether because the software distribution just started downloading content; or whether it was cancelled, succeeded, or failed. +- **EventType** Identifies the type of the event (Child, Bundle, or Driver). - **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. - **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. - **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). @@ -4016,39 +4215,39 @@ The following fields are available: - **HandlerType** Indicates what kind of content is being downloaded (app, driver, windows patch, etc.). - **HardwareId** If this download was for a driver targeted to a particular device model, this ID indicates the model of the device. - **HomeMobileOperator** The mobile operator that the device was originally intended to work with. -- **HostName** The hostname URL the content is downloading from. +- **HostName** The parent URL the content is downloading from. - **IPVersion** Indicates whether the download took place over IPv4 or IPv6. -- **IsAOACDevice** Is it Always On, Always Connected? +- **IsAOACDevice** Indicates whether the device is an Always On, Always Connected (AOAC) device. - **IsDependentSet** Indicates whether a driver is a part of a larger System Hardware/Firmware Update - **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. - **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. -- **NetworkCostBitMask** Indicates what kind of network the device is connected to (roaming, metered, over data cap, etc.) +- **NetworkCostBitMask** A flag indicating the cost of the network (congested, fixed, variable, over data limit, roaming, etc.) used for downloading the update content. - **NetworkRestrictionStatus** More general version of NetworkCostBitMask, specifying whether Windows considered the current network to be "metered." - **PackageFullName** The package name of the content. - **PhonePreviewEnabled** Indicates whether a phone was opted-in to getting preview builds, prior to flighting (pre-release builds) being introduced. -- **PlatformRole** The PowerPlatformRole as defined on MSDN +- **PlatformRole** The role of the OS platform (Desktop, Mobile, Workstation, etc.). - **ProcessName** The process name of the caller who initiated API calls, in the event where CallerApplicationName was not provided. - **ProcessorArchitecture** Processor architecture of the system (x86, AMD64, ARM). - **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. -- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one +- **RelatedCV** The Correlation Vector that was used before the most recent change to a new Correlation Vector. - **RepeatFailFlag** Indicates whether this specific piece of content had previously failed to download. -- **RevisionNumber** Identifies the revision number of this specific piece of content. -- **ServiceGuid** An ID which represents which service the software distribution client is installing content for (Windows Update, Microsoft Store, etc.). -- **Setup360Phase** If the download is for an operating system upgrade, this datapoint indicates which phase of the upgrade is underway. -- **ShippingMobileOperator** The mobile operator that a device shipped on. +- **RevisionNumber** The revision number of the specified piece of content. +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Windows Store, etc.). +- **Setup360Phase** Identifies the active phase of the upgrade download if the current download is for an Operating System upgrade. +- **ShippingMobileOperator** The mobile operator linked to the device when the device shipped. - **StatusCode** Indicates the result of a Download event (success, cancellation, failure code HResult). - **SystemBIOSMajorRelease** Major version of the BIOS. - **SystemBIOSMinorRelease** Minor version of the BIOS. - **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. - **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. -- **TargetMetadataVersion** For self-initiated healing, this is the target version of the SIH engine to download (if needed). If not, the value is null. +- **TargetMetadataVersion** The version of the currently downloading (or most recently downloaded) package. - **ThrottlingServiceHResult** Result code (success/failure) while contacting a web service to determine whether this device should download content yet. -- **TimeToEstablishConnection** Time (in ms) it took to establish the connection prior to beginning downloaded. -- **TotalExpectedBytes** The total count of bytes that the download is expected to be. +- **TimeToEstablishConnection** Time (in milliseconds) it took to establish the connection prior to beginning downloaded. +- **TotalExpectedBytes** The total size (in Bytes) expected to be downloaded. - **UpdateId** An identifier associated with the specific piece of content. - **UpdateID** An identifier associated with the specific piece of content. -- **UpdateImportance** Indicates whether a piece of content was marked as Important, Recommended, or Optional. -- **UsedDO** Whether the download used the delivery optimization service. +- **UpdateImportance** Indicates whether the content was marked as Important, Recommended, or Optional. +- **UsedDO** Indicates whether the download used the Delivery Optimization (DO) service. - **UsedSystemVolume** Indicates whether the content was downloaded to the device's main system storage drive, or an alternate storage drive. - **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. - **WUSetting** Indicates the users' current updating settings. @@ -4221,7 +4420,7 @@ The following fields are available: - **EndpointUrl** The endpoint URL where the device obtains update metadata. This is used to distinguish between test, staging, and production environments. - **EventScenario** The purpose of this event, such as scan started, scan succeeded, or scan failed. - **ExtendedStatusCode** The secondary status code of the event. -- **LeafCertId** Integral ID from the FragmentSigning data for certificate that failed. +- **LeafCertId** The integral ID from the FragmentSigning data for the certificate that failed. - **ListOfSHA256OfIntermediateCerData** A semicolon delimited list of base64 encoding of hashes for the Base64CerData in the FragmentSigning data of an intermediate certificate. - **MetadataIntegrityMode** The mode of the transport metadata integrity check. 0 = unknown; 1 = ignore; 2 = audit; 3 = enforce - **MetadataSignature** A base64-encoded string of the signature associated with the update metadata (specified by revision ID). @@ -4232,7 +4431,7 @@ The following fields are available: - **ServiceGuid** Identifies the service to which the software distribution client is connected, Example: Windows Update or Microsoft Store - **SHA256OfLeafCerData** A base64 encoding of the hash for the Base64CerData in the FragmentSigning data of the leaf certificate. - **SHA256OfLeafCertPublicKey** A base64 encoding of the hash of the Base64CertData in the FragmentSigning data of the leaf certificate. -- **SHA256OfTimestampToken** A base64-encoded string of hash of the timestamp token blob. +- **SHA256OfTimestampToken** An encoded string of the timestamp token. - **SignatureAlgorithm** The hash algorithm for the metadata signature. - **SLSPrograms** A test program to which a device may have opted in. Example: Insider Fast - **StatusCode** The status code of the event. @@ -4452,6 +4651,22 @@ The following fields are available: - **UpdateId** Unique ID for each update. +### Update360Telemetry.UpdateAgentCommit + +This event collects information regarding the commit phase of the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. + +The following fields are available: + +- **ErrorCode** The error code returned for the current install phase. +- **FlightId** Unique ID for each flight. +- **ObjectId** Unique value for each Update Agent mode. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **Result** Outcome of the install phase of the update. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. + + ### Update360Telemetry.UpdateAgentDownloadRequest This event sends data for the download request phase of updating Windows via the new Unified Update Platform (UUP) scenario. Applicable to PC and Mobile. @@ -4483,6 +4698,26 @@ The following fields are available: - **UpdateId** Unique ID for each Update. +### Update360Telemetry.UpdateAgentExpand + +This event collects information regarding the expansion phase of the new Unified Update Platform (UUP) update scenario, which is leveraged by both Mobile and Desktop. + +The following fields are available: + +- **ElapsedTickCount** Time taken for expand phase. +- **EndFreeSpace** Free space after expand phase. +- **EndSandboxSize** Sandbox size after expand phase. +- **ErrorCode** The error code returned for the current install phase. +- **FlightId** Unique ID for each flight. +- **ObjectId** Unique value for each Update Agent mode. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **StartFreeSpace** Free space before expand phase. +- **StartSandboxSize** Sandbox size after expand phase. +- **UpdateId** Unique ID for each update. + + ### Update360Telemetry.UpdateAgentInitialize This event sends data for the initialize phase of updating Windows via the new Unified Update Platform (UUP) scenario, which is applicable to both PCs and Mobile. @@ -4501,6 +4736,22 @@ The following fields are available: - **UpdateId** Unique ID for each update. +### Update360Telemetry.UpdateAgentInstall + +This event sends data for the install phase of updating Windows. + +The following fields are available: + +- **ErrorCode** The error code returned for the current install phase. +- **FlightId** Unique value for each Update Agent mode (same concept as InstanceId for Setup360). +- **ObjectId** Correlation vector value generated from the latest USO scan. +- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **Result** The result for the current install phase. +- **ScenarioId** Indicates the update scenario. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each update. + + ### Update360Telemetry.UpdateAgentMitigationResult This event sends data indicating the result of each update agent mitigation. @@ -4578,6 +4829,18 @@ The following fields are available: ## Upgrade events +### FacilitatorTelemetry.DCATDownload + +This event indicates whether devices received additional or critical supplemental content during an OS Upgrade, to help keep Windows up-to-date and secure. + + + +### FacilitatorTelemetry.InitializeDU + +This event determines whether devices received additional or critical supplemental content during an OS upgrade. + + + ### Setup360Telemetry.Downlevel This event sends data indicating that the device has started the downlevel phase of the upgrade, to help keep Windows up-to-date and secure. @@ -4865,7 +5128,7 @@ The following fields are available: - **RebootReason** Reason for the reboot. -## Microsoft Store events +## Windows Store events ### Microsoft.Windows.Store.Partner.ReportApplication @@ -5623,17 +5886,17 @@ This event indicates that a scan for a Windows Update occurred. The following fields are available: -- **deferReason** Reason why the device could not check for updates. -- **detectionBlockreason** Reason for detection not completing. +- **deferReason** The reason why the device could not check for updates. +- **detectionBlockreason** The reason detection did not complete. - **detectionDeferreason** A log of deferral reasons for every update state. -- **errorCode** The returned error code. +- **errorCode** The error code returned for the current process. - **eventScenario** End-to-end update session ID, or indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed. -- **flightID** The specific ID of the Windows Insider build the device is getting. -- **interactive** Indicates whether the session was user initiated. -- **revisionNumber** Update revision number. -- **updateId** Update ID. -- **updateScenarioType** The update session type. -- **wuDeviceid** Unique device ID used by Windows Update. +- **flightID** The unique identifier for the flight (Windows Insider pre-release build) should be delivered to the device, if applicable. +- **interactive** Indicates whether the user initiated the session. +- **revisionNumber** The Update revision number. +- **updateId** The unique identifier of the Update. +- **updateScenarioType** Identifies the type of update session being performed. +- **wuDeviceid** The unique device ID used by Windows Update. ### Microsoft.Windows.Update.Orchestrator.Download @@ -5696,7 +5959,7 @@ The following fields are available: - **deferReason** Reason for install not completing. - **errorCode** The error code reppresented by a hexadecimal value. - **eventScenario** End-to-end update session ID. -- **flightID** The specific ID of the Windows Insider build the device is getting. +- **flightID** The ID of the Windows Insider build the device is getting. - **flightUpdate** Indicates whether the update is a Windows Insider build. - **ForcedRebootReminderSet** A boolean value that indicates if a forced reboot will happen for updates. - **installCommitfailedtime** The time it took for a reboot to happen but the upgrade failed to progress. @@ -5741,14 +6004,26 @@ This event is sent after a Windows update install completes. The following fields are available: -- **batteryLevel** Current battery capacity in mWh or percentage left. -- **bundleId** Identifier associated with the specific content bundle. +- **batteryLevel** Current battery capacity in megawatt-hours (mWh) or percentage left. +- **bundleId** The unique identifier associated with the specific content bundle. - **bundleRevisionnumber** Identifies the revision number of the content bundle. - **errorCode** The error code returned for the current phase. - **eventScenario** State of update action. -- **flightID** Unique update ID. +- **flightID** The unique identifier for the flight (Windows Insider pre-release build) should be delivered to the device, if applicable. - **sessionType** The Windows Update session type (Interactive or Background). -- **wuDeviceid** Unique device ID used by Windows Update. +- **wuDeviceid** The unique device identifier used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.PowerMenuOptionsChanged + +This event is sent when the options in power menu changed, usually due to an update pending reboot, or after a update is installed. + +The following fields are available: + +- **powermenuNewOptions** The new options after the power menu changed. +- **powermenuOldOptions** The old options before the power menu changed. +- **rebootPendingMinutes** If the power menu changed because a reboot is pending due to a update, this indicates how long that reboot has been pending. +- **wuDeviceid** The device ID recorded by Windows Update if the power menu changed because a reboot is pending due to an update. ### Microsoft.Windows.Update.Orchestrator.PreShutdownStart @@ -5953,7 +6228,7 @@ The following fields are available: - **revisionNumber** Revision number of the OS. - **scheduledRebootTime** Time scheduled for the reboot. - **updateId** Identifies which update is being scheduled. -- **wuDeviceid** Unique device ID used by Windows Update. +- **wuDeviceid** The unique device ID used by Windows Update. ### Microsoft.Windows.Update.Ux.MusNotification.ToastDisplayedToScheduleReboot @@ -5985,12 +6260,44 @@ The following fields are available: ## Windows Update mitigation events +### Mitigation360Telemetry.MitigationCustom.CleanupSafeOsImages + +This event sends data specific to the CleanupSafeOsImages mitigation used for OS Updates. + +The following fields are available: + +- **ClientId** The client ID used by Windows Update. +- **FlightId** The ID of each Windows Insider build the device received. +- **InstanceId** A unique device ID that identifies each update instance. +- **MitigationScenario** The update scenario in which the mitigation was executed. +- **MountedImageCount** The number of mounted images. +- **MountedImageMatches** The number of mounted image matches. +- **MountedImagesFailed** The number of mounted images that could not be removed. +- **MountedImagesRemoved** The number of mounted images that were successfully removed. +- **MountedImagesSkipped** The number of mounted images that were not found. +- **RelatedCV** The correlation vector value generated from the latest USO scan. +- **Result** HResult of this operation. +- **ScenarioId** ID indicating the mitigation scenario. +- **ScenarioSupported** Indicates whether the scenario was supported. +- **SessionId** Unique value for each update attempt. +- **UpdateId** Unique ID for each Windows Update. +- **WuId** Unique ID for the Windows Update client. + + ### Mitigation360Telemetry.MitigationCustom.FixupEditionId This event sends data specific to the FixupEditionId mitigation used for OS Updates. +## Windows Update Reserve Manager events + +### Microsoft.Windows.UpdateReserveManager.RemovePendingHardReserveAdjustment + +This event is sent when the Update Reserve Manager removes a pending hard reserve adjustment. + + + ## Winlogon events ### Microsoft.Windows.Security.Winlogon.SetupCompleteLogon diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md index 63376e03ed..e6461d30e4 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md @@ -9,7 +9,7 @@ ms.pagetype: security localizationpriority: high author: brianlic-msft ms.author: brianlic -ms.date: 12/13/2018 +ms.date: 02/15/2019 --- @@ -46,15 +46,14 @@ Invalid Signature - This event is superseded by an event that contains additiona The following fields are available: -- **DatasourceApplicationFile_RS1** An ID for the system, calculated by hashing hardware identifiers. - **DatasourceApplicationFile_RS4** An ID for the system, calculated by hashing hardware identifiers. - **DatasourceDevicePnp_RS4** An ID for the system, calculated by hashing hardware identifiers. - **DatasourceDriverPackage_RS4** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoBlock_RS4** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoPassive_RS4** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoPostUpgrade_RS4** The count of the number of this particular object type present on this device. +- **DatasourceSystemBios_19H1Setup** The count of the number of this particular object type present on this device. - **DatasourceSystemBios_RS4** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS1** An ID for the system, calculated by hashing hardware identifiers. - **DecisionApplicationFile_RS4** The count of the number of this particular object type present on this device. - **DecisionDevicePnp_RS4** The count of the number of this particular object type present on this device. - **DecisionDriverPackage_RS4** The count of the number of this particular object type present on this device. @@ -62,26 +61,24 @@ The following fields are available: - **DecisionMatchingInfoPassive_RS4** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoPostUpgrade_RS4** The count of the number of this particular object type present on this device. - **DecisionMediaCenter_RS4** The count of the number of this particular object type present on this device. +- **DecisionSystemBios_19H1Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. - **DecisionSystemBios_RS4** The total DecisionSystemBios objects targeting Windows 10 version, 1803 present on this device. -- **DecisionTest_RS1** An ID for the system, calculated by hashing hardware identifiers. - **InventoryApplicationFile** The count of the number of this particular object type present on this device. - **InventoryLanguagePack** The count of the number of this particular object type present on this device. - **InventoryMediaCenter** The count of the number of this particular object type present on this device. - **InventorySystemBios** The count of the number of this particular object type present on this device. -- **InventoryTest** The count of the number of this particular object type present on this device. - **InventoryUplevelDriverPackage** The count of the number of this particular object type present on this device. - **PCFP** An ID for the system, calculated by hashing hardware identifiers. -- **SystemMemory** The count of SystemMemory objects present on this machine. +- **SystemMemory** The count of the number of this particular object type present on this device. - **SystemProcessorCompareExchange** The count of the number of this particular object type present on this device. - **SystemProcessorLahfSahf** The count of the number of this particular object type present on this device. -- **SystemProcessorNx** The count of SystemProcessorNx objects present on this machine. -- **SystemProcessorPrefetchW** The count of SystemProcessorPrefetchW objects present on this machine. +- **SystemProcessorNx** The total number of objects of this type present on this device. +- **SystemProcessorPrefetchW** The total number of objects of this type present on this device. - **SystemProcessorSse2** The count of SystemProcessorSse2 objects present on this machine. -- **SystemTouch** The count of SystemTouch objects present on this machine. -- **SystemWim** The count of SystemWim objects present on this machine. -- **SystemWindowsActivationStatus** The count of SystemWindowsActivationStatus objects present on this machine. -- **SystemWlan** The count of the number of this particular object type present on this device. -- **Wmdrm_RS1** An ID for the system, calculated by hashing hardware identifiers. +- **SystemTouch** The count of the number of this particular object type present on this device. +- **SystemWim** The total number of objects of this type present on this device. +- **SystemWindowsActivationStatus** The count of the number of this particular object type present on this device. +- **SystemWlan** The total number of objects of this type present on this device. - **Wmdrm_RS4** The total Wmdrm objects targeting Windows 10, version 1803 present on this device. @@ -506,7 +503,7 @@ The following fields are available: ### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveAdd -This event sends compatibility decision data about non-blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up-to-date. +This event sends compatibility decision data about non-blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up to date. This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). @@ -625,6 +622,7 @@ The following fields are available: - **AppraiserVersion** The version of the Appraiser file generating the events. - **Blocking** Is the device blocked from upgrade due to a BIOS block? +- **DisplayGenericMessageGated** Indicates whether a generic offer block message will be shown for the bios. - **HasBiosBlock** Does the device have a BIOS block? @@ -885,6 +883,7 @@ The following fields are available: - **AppraiserVersion** The version of the Appraiser file generating the events. - **Context** Indicates what mode Appraiser is running in. Example: Setup or Telemetry. - **PCFP** An ID for the system calculated by hashing hardware identifiers. +- **Subcontext** Indicates what categories of incompatibilities appraiser is scanning for. Can be N/A, Resolve, or a semicolon-delimited list that can include App, Dev, Sys, Gat, or Rescan. - **Time** The client time of the event. @@ -1339,7 +1338,7 @@ The following fields are available: - **AppraiserTaskExitCode** The Appraiser task exist code. - **AppraiserTaskLastRun** The last runtime for the Appraiser task. - **CensusVersion** The version of Census that generated the current data for this device. -- **IEVersion** Retrieves which version of Internet Explorer is running on this device. +- **IEVersion** The version of Internet Explorer that is running on the device. ### Census.Battery @@ -1539,20 +1538,20 @@ Provides information on several important data points about Processor settings The following fields are available: -- **KvaShadow** Microcode info of the processor. +- **KvaShadow** This is the micro code information of the processor. - **MMSettingOverride** Microcode setting of the processor. - **MMSettingOverrideMask** Microcode setting override of the processor. -- **ProcessorArchitecture** Retrieves the processor architecture of the installed operating system. The complete list of values can be found in DimProcessorArchitecture. -- **ProcessorClockSpeed** Retrieves the clock speed of the processor in MHz. -- **ProcessorCores** Retrieves the number of cores in the processor. -- **ProcessorIdentifier** The processor identifier of a manufacturer. -- **ProcessorManufacturer** Retrieves the name of the processor's manufacturer. -- **ProcessorModel** Retrieves the name of the processor model. +- **ProcessorArchitecture** Retrieves the processor architecture of the installed operating system. +- **ProcessorClockSpeed** Clock speed of the processor in MHz. +- **ProcessorCores** Number of logical cores in the processor. +- **ProcessorIdentifier** Processor Identifier of a manufacturer. +- **ProcessorManufacturer** Name of the processor manufacturer. +- **ProcessorModel** Name of the processor model. - **ProcessorPhysicalCores** Number of physical cores in the processor. -- **ProcessorUpdateRevision** Retrieves the processor architecture of the installed operating system. +- **ProcessorUpdateRevision** The microcode revision. - **ProcessorUpdateStatus** Enum value that represents the processor microcode load status -- **SocketCount** Number of physical CPU sockets of the machine. -- **SpeculationControl** If the system has enabled protections needed to validate the speculation control vulnerability. +- **SocketCount** Count of CPU sockets. +- **SpeculationControl** Indicates whether the system has enabled protections needed to validate the speculation control vulnerability. ### Census.Security @@ -2016,6 +2015,81 @@ The following fields are available: - **WDDMVersion** The Windows Display Driver Model version. +## Failover Clustering events + +### Microsoft.Windows.Server.FailoverClusteringCritical.ClusterSummary2 + +This event returns information about how many resources and of what type are in the server cluster. This data is collected to keep Windows Server safe, secure, and up to date. The data includes information about whether hardware is configured correctly, if the software is patched correctly, and assists in preventing crashes by attributing issues (like fatal errors) to workloads and system configurations. + +The following fields are available: + +- **autoAssignSite** The cluster parameter: auto site. +- **autoBalancerLevel** The cluster parameter: auto balancer level. +- **autoBalancerMode** The cluster parameter: auto balancer mode. +- **blockCacheSize** The configured size of the block cache. +- **ClusterAdConfiguration** The ad configuration of the cluster. +- **clusterAdType** The cluster parameter: mgmt_point_type. +- **clusterDumpPolicy** The cluster configured dump policy. +- **clusterFunctionalLevel** The current cluster functional level. +- **clusterGuid** The unique identifier for the cluster. +- **clusterWitnessType** The witness type the cluster is configured for. +- **countNodesInSite** The number of nodes in the cluster. +- **crossSiteDelay** The cluster parameter: CrossSiteDelay. +- **crossSiteThreshold** The cluster parameter: CrossSiteThreshold. +- **crossSubnetDelay** The cluster parameter: CrossSubnetDelay. +- **crossSubnetThreshold** The cluster parameter: CrossSubnetThreshold. +- **csvCompatibleFilters** The cluster parameter: ClusterCsvCompatibleFilters. +- **csvIncompatibleFilters** The cluster parameter: ClusterCsvIncompatibleFilters. +- **csvResourceCount** The number of resources in the cluster. +- **currentNodeSite** The name configured for the current site for the cluster. +- **dasModeBusType** The direct storage bus type of the storage spaces. +- **downLevelNodeCount** The number of nodes in the cluster that are running down-level. +- **drainOnShutdown** Specifies whether a node should be drained when it is shut down. +- **dynamicQuorumEnabled** Specifies whether dynamic Quorum has been enabled. +- **enforcedAntiAffinity** The cluster parameter: enforced anti affinity. +- **genAppNames** The win32 service name of a clustered service. +- **genSvcNames** The command line of a clustered genapp. +- **hangRecoveryAction** The cluster parameter: hang recovery action. +- **hangTimeOut** Specifies the “hang time out” parameter for the cluster. +- **isCalabria** Specifies whether storage spaces direct is enabled. +- **isMixedMode** Identifies if the cluster is running with different version of OS for nodes. +- **isRunningDownLevel** Identifies if the current node is running down-level. +- **logLevel** Specifies the granularity that is logged in the cluster log. +- **logSize** Specifies the size of the cluster log. +- **lowerQuorumPriorityNodeId** The cluster parameter: lower quorum priority node ID. +- **minNeverPreempt** The cluster parameter: minimum never preempt. +- **minPreemptor** The cluster parameter: minimum preemptor priority. +- **netftIpsecEnabled** The parameter: netftIpsecEnabled. +- **NodeCount** The number of nodes in the cluster. +- **nodeId** The current node number in the cluster. +- **nodeResourceCounts** Specifies the number of node resources. +- **nodeResourceOnlineCounts** Specifies the number of node resources that are online. +- **numberOfSites** The number of different sites. +- **numNodesInNoSite** The number of nodes not belonging to a site. +- **plumbAllCrossSubnetRoutes** The cluster parameter: plumb all cross subnet routes. +- **preferredSite** The preferred site location. +- **privateCloudWitness** Specifies whether a private cloud witness exists for this cluster. +- **quarantineDuration** The quarantine duration. +- **quarantineThreshold** The quarantine threshold. +- **quorumArbitrationTimeout** In the event of an arbitration event, this specifies the quorum timeout period. +- **resiliencyLevel** Specifies the level of resiliency. +- **resourceCounts** Specifies the number of resources. +- **resourceTypeCounts** Specifies the number of resource types in the cluster. +- **resourceTypes** Data representative of each resource type. +- **resourceTypesPath** Data representative of the DLL path for each resource type. +- **sameSubnetDelay** The cluster parameter: same subnet delay. +- **sameSubnetThreshold** The cluster parameter: same subnet threshold. +- **secondsInMixedMode** The amount of time (in seconds) that the cluster has been in mixed mode (nodes with different operating system versions in the same cluster). +- **securityLevel** The cluster parameter: security level. +- **securityLevelForStorage** The cluster parameter: security level for storage. +- **sharedVolumeBlockCacheSize** Specifies the block cache size for shared for shared volumes. +- **shutdownTimeoutMinutes** Specifies the amount of time it takes to time out when shutting down. +- **upNodeCount** Specifies the number of nodes that are up (online). +- **useClientAccessNetworksForCsv** The cluster parameter: use client access networks for CSV. +- **vmIsolationTime** The cluster parameter: VM isolation time. +- **witnessDatabaseWriteTimeout** Specifies the timeout period for writing to the quorum witness database. + + ## Fault Reporting events ### Microsoft.Windows.FaultReporting.AppCrashEvent @@ -2367,35 +2441,35 @@ This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedevic The following fields are available: -- **BusReportedDescription** System-supplied GUID that uniquely groups the functional devices associated with a single-function or multifunction device installed in the computer. -- **Class** System-supplied GUID that uniquely groups the functional devices associated with a single-function or multifunction device installed in the computer. -- **ClassGuid** A unique identifier for the driver installed. -- **COMPID** Name of the .sys image file (or wudfrd.sys if using user mode driver framework). -- **ContainerId** INF file name (the name could be renamed by OS, such as oemXX.inf) -- **Description** The version of the inventory binary generating the events. -- **DeviceState** The current error code for the device. -- **DriverId** A unique identifier for the driver installed. -- **DriverName** Name of the .sys image file (or wudfrd.sys if using user mode driver framework). +- **BusReportedDescription** The description of the device reported by the bus. +- **Class** The device setup class of the driver loaded for the device. +- **ClassGuid** The device class unique identifier of the driver package loaded on the device. +- **COMPID** The list of “Compatible IDs” for this device. +- **ContainerId** The system-supplied unique identifier that specifies which group(s) the device(s) installed on the parent (main) device belong to. +- **Description** The description of the device. +- **DeviceState** Identifies the current state of the parent (main) device. +- **DriverId** The unique identifier for the installed driver. +- **DriverName** The file name of the installed driver image. - **DriverPackageStrongName** The immediate parent directory name in the Directory field of InventoryDriverPackage. -- **DriverVerDate** The date of the driver loaded for the device. -- **DriverVerVersion** The version of the driver loaded for the device. -- **Enumerator** The bus that enumerated the device. -- **HWID** List of hardware ids for the device. -- **Inf** INF file name (the name could be renamed by OS, such as oemXX.inf) -- **InstallState** Device installation state. -- **InventoryVersion** The version of the inventory binary generating the events. -- **LowerClassFilters** Lower filter class drivers IDs installed for the device. -- **LowerFilters** Lower filter drivers IDs installed for the device. -- **Manufacturer** The device manufacturer. -- **MatchingID** Represents the hardware ID or compatible ID that Windows uses to install a device instance. -- **Model** The device model. -- **ParentId** Device instance id of the parent of the device. -- **ProblemCode** The current error code for the device. -- **Provider** The device provider. -- **Service** The device service name -- **STACKID** The device service name. -- **UpperClassFilters** The list of hardware ids for the stack -- **UpperFilters** Upper filter drivers IDs installed for the device +- **DriverVerDate** The date associated with the driver installed on the device. +- **DriverVerVersion** The version number of the driver installed on the device. +- **Enumerator** Identifies the bus that enumerated the device. +- **HWID** A list of hardware IDs for the device. +- **Inf** The name of the INF file (possibly renamed by the OS, such as oemXX.inf). +- **InstallState** The device installation state. For a list of values, see: https://msdn.microsoft.com/en-us/library/windows/hardware/ff543130.aspx +- **InventoryVersion** The version number of the inventory process generating the events. +- **LowerClassFilters** The identifiers of the Lower Class filters installed for the device. +- **LowerFilters** The identifiers of the Lower filters installed for the device. +- **Manufacturer** The manufacturer of the device. +- **MatchingID** The Hardware ID or Compatible ID that Windows uses to install a device instance. +- **Model** Identifies the model of the device. +- **ParentId** The Device Instance ID of the parent of the device. +- **ProblemCode** The error code currently returned by the device, if applicable. +- **Provider** Identifies the device provider. +- **Service** The name of the device service. +- **STACKID** The list of hardware IDs for the stack. +- **UpperClassFilters** The identifiers of the Upper Class filters installed for the device. +- **UpperFilters** The identifiers of the Upper filters installed for the device. ### Microsoft.Windows.Inventory.Core.InventoryDevicePnpRemove @@ -2543,28 +2617,29 @@ This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedevic The following fields are available: -- **AddinCLSID** The CLSID for the Office addin -- **AddInCLSID** CLSID key for the office addin -- **AddInId** Office addin ID -- **AddinType** The type of the Office addin. -- **BinFileTimestamp** Timestamp of the Office addin -- **BinFileVersion** Version of the Office addin -- **Description** Office addin description -- **FileId** FileId of the Office addin -- **FileSize** File size of the Office addin -- **FriendlyName** Friendly name for office addin -- **FullPath** Unexpanded path to the office addin -- **LoadBehavior** Uint32 that describes the load behavior -- **LoadTime** Load time for the office add in -- **OfficeApplication** The office application for this add in -- **OfficeArchitecture** Architecture of the addin -- **OfficeVersion** The office version for this add in -- **OutlookCrashingAddin** Boolean that indicates if crashes have been found for this add in -- **ProductCompany** The name of the company associated with the Office addin -- **ProductName** The product name associated with the Office addin -- **ProductVersion** The version associated with the Office addin -- **ProgramId** The unique program identifier of the Office addin -- **Provider** Name of the provider for this addin +- **AddinCLSID** The class identifier key for the Microsoft Office add-in. +- **AddInCLSID** The class identifier key for the Microsoft Office add-in. +- **AddInId** The identifier for the Microsoft Office add-in. +- **AddinType** The type of the Microsoft Office add-in. +- **BinFileTimestamp** The timestamp of the Office add-in. +- **BinFileVersion** The version of the Microsoft Office add-in. +- **Description** Description of the Microsoft Office add-in. +- **FileId** The file identifier of the Microsoft Office add-in. +- **FileSize** The file size of the Microsoft Office add-in. +- **FriendlyName** The friendly name for the Microsoft Office add-in. +- **FullPath** The full path to the Microsoft Office add-in. +- **InventoryVersion** The version of the inventory binary generating the events. +- **LoadBehavior** Integer that describes the load behavior. +- **LoadTime** Load time for the Office add-in. +- **OfficeApplication** The Microsoft Office application associated with the add-in. +- **OfficeArchitecture** The architecture of the add-in. +- **OfficeVersion** The Microsoft Office version for this add-in. +- **OutlookCrashingAddin** Indicates whether crashes have been found for this add-in. +- **ProductCompany** The name of the company associated with the Office add-in. +- **ProductName** The product name associated with the Microsoft Office add-in. +- **ProductVersion** The version associated with the Office add-in. +- **ProgramId** The unique program identifier of the Microsoft Office add-in. +- **Provider** Name of the provider for this add-in. - **Usage** Data regarding usage of the add-in. @@ -2582,6 +2657,9 @@ This event indicates that a new sync is being generated for this object type. This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. ### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIdentifiersAdd @@ -2592,6 +2670,7 @@ This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedevic The following fields are available: +- **InventoryVersion** The version of the inventory binary generating the events. - **OAudienceData** Sub-identifier for Microsoft Office release management, identifying the pilot group for a device - **OAudienceId** Microsoft Office identifier for Microsoft Office release management, identifying the pilot group for a device - **OMID** Identifier for the Office SQM Machine @@ -2607,6 +2686,9 @@ Diagnostic event to indicate a new sync is being generated for this object type This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. ### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeIESettingsAdd @@ -2617,6 +2699,7 @@ This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedevic The following fields are available: +- **InventoryVersion** The version of the inventory binary generating the events. - **OIeFeatureAddon** Flag indicating which Microsoft Office products have this setting enabled. The FEATURE_ADDON_MANAGEMENT feature lets applications hosting the WebBrowser Control to respect add-on management selections made using the Add-on Manager feature of Internet Explorer. Add-ons disabled by the user or by administrative group policy will also be disabled in applications that enable this feature. - **OIeMachineLockdown** Flag indicating which Microsoft Office products have this setting enabled. When the FEATURE_LOCALMACHINE_LOCKDOWN feature is enabled, Internet Explorer applies security restrictions on content loaded from the user's local machine, which helps prevent malicious behavior involving local files. - **OIeMimeHandling** Flag indicating which Microsoft Office products have this setting enabled. When the FEATURE_MIME_HANDLING feature control is enabled, Internet Explorer handles MIME types more securely. Only applies to Windows Internet Explorer 6 for Windows XP Service Pack 2 (SP2) @@ -2640,6 +2723,9 @@ Diagnostic event to indicate a new sync is being generated for this object type This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. ### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeInsightsAdd @@ -2650,6 +2736,7 @@ This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedevic The following fields are available: +- **InventoryVersion** The version of the inventory binary generating the events. - **OfficeApplication** The name of the Office application. - **OfficeArchitecture** The bitness of the Office application. - **OfficeVersion** The version of the Office application. @@ -2670,6 +2757,9 @@ Diagnostic event to indicate a new sync is being generated for this object type This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. ### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeProductsAdd @@ -2680,6 +2770,7 @@ This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedevic The following fields are available: +- **InventoryVersion** The version of the inventory binary generating the events. - **OC2rApps** A GUID the describes the Office Click-To-Run apps - **OC2rSkus** Comma-delimited list (CSV) of Office Click-To-Run products installed on the device. For example, Office 2016 ProPlus - **OMsiApps** Comma-delimited list (CSV) of Office MSI products installed on the device. For example, Microsoft Word @@ -2692,6 +2783,9 @@ Diagnostic event to indicate a new sync is being generated for this object type This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. ### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeSettingsAdd @@ -2704,6 +2798,7 @@ The following fields are available: - **BrowserFlags** Browser flags for Office-related products - **ExchangeProviderFlags** Office Exchange provider policies +- **InventoryVersion** The version of the inventory binary generating the events. - **SharedComputerLicensing** Office Shared Computer Licensing policies @@ -2713,6 +2808,9 @@ Diagnostic event to indicate a new sync is being generated for this object type This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. ### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBAAdd @@ -2779,6 +2877,9 @@ This event indicates that a new sync is being generated for this object type. This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. ### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeVBAStartSync @@ -2787,6 +2888,9 @@ Diagnostic event to indicate a new sync is being generated for this object type This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). +The following fields are available: + +- **InventoryVersion** The version of the inventory binary generating the events. ### Microsoft.Windows.Inventory.General.InventoryMiscellaneousUUPInfoAdd @@ -2841,6 +2945,14 @@ The following fields are available: - **IndicatorValue** The indicator value. +### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorRemove + +This event is a counterpart to InventoryMiscellaneousUexIndicatorAdd that indicates that the item has been removed. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + + + ### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorStartSync This event indicates that a new set of InventoryMiscellaneousUexIndicatorAdd events will be sent. @@ -3263,6 +3375,12 @@ This event indicates an error in the updater payload. This information assists i +### Microsoft.Windows.Sediment.Info.PhaseChange + +The event indicates progress made by the updater. This information assists in keeping Windows up to date. + + + ### Microsoft.Windows.Sediment.OSRSS.CheckingOneSettings This event indicates the parameters that the Operating System Remediation System Service (OSRSS) uses for a secure ping to Microsoft to help ensure Windows is up to date. @@ -3277,6 +3395,31 @@ The following fields are available: - **Time** The system time at which the event occurred. +### Microsoft.Windows.Sediment.OSRSS.DownloadingUrl + +This event provides information about the URL from which the Operating System Remediation System Service (OSRSS) is attempting to download. This information helps ensure Windows is up to date. + +The following fields are available: + +- **AttemptNumber** The count indicating which download attempt is starting. +- **ServiceVersionMajor** The Major version information of the component. +- **ServiceVersionMinor** The Minor version information of the component. +- **Time** The system time at which the event occurred. +- **Url** The URL from which data was downloaded. + + +### Microsoft.Windows.Sediment.OSRSS.DownloadSuccess + +This event indicates the Operating System Remediation System Service (OSRSS) successfully download data from the indicated URL. This information helps ensure Windows is up to date. + +The following fields are available: + +- **ServiceVersionMajor** The Major version information of the component. +- **ServiceVersionMinor** The Minor version information of the component. +- **Time** The system time at which the event occurred. +- **Url** The URL from which data was downloaded. + + ### Microsoft.Windows.Sediment.OSRSS.Error This event indicates an error occurred in the Operating System Remediation System Service (OSRSS). The information provided helps ensure future upgrade/update attempts are more successful. @@ -3292,6 +3435,65 @@ The following fields are available: - **Time** The system time at which the event occurred. +### Microsoft.Windows.Sediment.OSRSS.ExeSignatureValidated + +This event indicates the Operating System Remediation System Service (OSRSS) successfully validated the signature of an EXE from the indicated URL. The information provided helps ensure Windows is up to date. + +The following fields are available: + +- **ServiceVersionMajor** The Major version information of the component. +- **ServiceVersionMinor** The Minor version information of the component. +- **Time** The system time at which the event occurred. +- **Url** The URL from which the validated EXE was downloaded. + + +### Microsoft.Windows.Sediment.OSRSS.ExtractSuccess + +This event indicates that the Operating System Remediation System Service (OSRSS) successfully extracted downloaded content. The information provided helps ensure Windows is up to date. + +The following fields are available: + +- **ServiceVersionMajor** The Major version information of the component. +- **ServiceVersionMinor** The Minor version information of the component. +- **Time** The system time at which the event occurred. +- **Url** The URL from which the successfully extracted content was downloaded. + + +### Microsoft.Windows.Sediment.OSRSS.NewUrlFound + +This event indicates the Operating System Remediation System Service (OSRSS) succeeded in finding a new URL to download from. This helps ensure Windows is up to date. + +The following fields are available: + +- **ServiceVersionMajor** The Major version information of the component. +- **ServiceVersionMinor** The Minor version information of the component. +- **Time** The system time at which the event occurred. +- **Url** The new URL from which content will be downloaded. + + +### Microsoft.Windows.Sediment.OSRSS.ProcessCreated + +This event indicates the Operating System Remediation System Service (OSRSS) created a new process to execute content downloaded from the indicated URL. This information helps ensure Windows is up to date. + +The following fields are available: + +- **ServiceVersionMajor** The Major version information of the component. +- **ServiceVersionMinor** The Minor version information of the component. +- **Time** The system time at which the event occurred. +- **Url** The new URL from which content will be executed. + + +### Microsoft.Windows.Sediment.OSRSS.SelfUpdate + +This event returns metadata after Operating System Remediation System Service (OSRSS) successfully replaces itself with a new version. + +The following fields are available: + +- **ServiceVersionMajor** The major version number for the component. +- **ServiceVersionMinor** The minor version number for the component. +- **Time** The system timestamp for when the event occurred. + + ### Microsoft.Windows.Sediment.OSRSS.UrlState This event indicates the state the Operating System Remediation System Service (OSRSS) is in while attempting a download from the URL. @@ -3306,6 +3508,107 @@ The following fields are available: - **Time** System timestamp the event was fired +### Microsoft.Windows.Sediment.ServiceInstaller.ApplicabilityCheckFailed + +This event returns data relating to the error state after one of the applicability checks for the installer component of the Operating System Remediation System Service (OSRSS) has failed. + +The following fields are available: + +- **CheckName** The name of the applicability check that failed. +- **InstallerVersion** The version information for the installer component. +- **Time** The system timestamp for when the event occurred. + + +### Microsoft.Windows.Sediment.ServiceInstaller.AttemptingUpdate + +This event indicates the Operating System Remediation System Service (OSRSS) installer is attempting an update to itself. This information helps ensure Windows is up to date. + +The following fields are available: + +- **InstallerVersion** The version information of the Installer component. +- **Time** The system time at which the event occurred. + + +### Microsoft.Windows.Sediment.ServiceInstaller.BinaryUpdated + +This event indicates the Operating System Remediation System Service (OSRSS) updated installer binaries with new binaries as part of its self-update process. This information helps ensure Windows is up to date. + +The following fields are available: + +- **InstallerVersion** The version information of the Installer component. +- **Time** The system time at which the event occurred. + + +### Microsoft.Windows.Sediment.ServiceInstaller.InstallerLaunched + +This event indicates the Operating System Remediation System Service (OSRSS) has launched. The information provided helps ensure Windows is up to date. + +The following fields are available: + +- **InstallerVersion** The version information of the Installer component. +- **Time** The system time at which the event occurred. + + +### Microsoft.Windows.Sediment.ServiceInstaller.ServiceInstalled + +This event indicates the Operating System Remediation System Service (OSRSS) successfully installed the Installer Component. This information helps ensure Windows is up to date. + +The following fields are available: + +- **InstallerVersion** The version information of the Installer component. +- **Time** The system time at which the event occurred. + + +### Microsoft.Windows.Sediment.ServiceInstaller.ServiceRestarted + +This event indicates the Operating System Remediation System Service (OSRSS) has restarted after installing an updated version of itself. This information helps ensure Windows is up to date. + +The following fields are available: + +- **InstallerVersion** The version information of the Installer component. +- **Time** The system time at which the event occurred. + + +### Microsoft.Windows.Sediment.ServiceInstaller.ServiceStarted + +This event indicates the Operating System Remediation System Service (OSRSS) has started after installing an updated version of itself. This information helps ensure Windows is up to date. + +The following fields are available: + +- **InstallerVersion** The version information of the Installer component. +- **Time** The system time at which the event occurred. + + +### Microsoft.Windows.Sediment.ServiceInstaller.ServiceStopped + +This event indicates the Operating System Remediation System Service (OSRSS) was stopped by a self-updated to install an updated version of itself. This information helps ensure Windows is up to date. + +The following fields are available: + +- **InstallerVersion** The version information of the Installer component. +- **Time** The system time at which the event occurred. + + +### Microsoft.Windows.Sediment.ServiceInstaller.UpdaterCompleted + +This event indicates the Operating System Remediation System Service (OSRSS) successfully completed the self-update operation. This information helps ensure Windows is up to date. + +The following fields are available: + +- **InstallerVersion** The version information of the Installer component. +- **Time** The system time at which the event occurred. + + +### Microsoft.Windows.Sediment.ServiceInstaller.UpdaterLaunched + +This event indicates the Operating System Remediation System Service (OSRSS) successfully launched the self-updater after downloading it. This information helps ensure Windows is up to date. + +The following fields are available: + +- **InstallerVersion** The version information of the Installer component. +- **Time** The system time at which the event occurred. + + ### Microsoft.Windows.SedimentLauncher.Applicable Indicates whether a given plugin is applicable. @@ -3642,7 +3945,7 @@ The following fields are available: - **EventInstanceID** A unique identifier for event instance. - **EventScenario** Indicates the purpose of sending this event – whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed. - **HandlerReasons** If an action has been assessed as inapplicable, the installer technology-specific logic prevented it. -- **ServiceGuid** A unique identifier that represents which service the software distribution client is connecting to (SIH, Windows Update, Microsoft Store, etc.) +- **ServiceGuid** A unique identifier that represents which service the software distribution client is connecting to (SIH, Windows Update, Microsoft Store, etc.). - **StandardReasons** If an action has been assessed as inapplicable, the standard logic the prevented it. - **StatusCode** Result code of the event (success, cancellation, failure code HResult). - **UpdateID** A unique identifier for the action being acted upon. @@ -3708,7 +4011,7 @@ The following fields are available: - **EventScenario** Indicates the purpose of sending this event – whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed. - **FailedParseActions** The list of actions that were not successfully parsed. - **ParsedActions** The list of actions that were successfully parsed. -- **ServiceGuid** A unique identifier that represents which service the software distribution client is connecting to (SIH, Windows Update, Microsoft Store, etc.) +- **ServiceGuid** A unique identifier that represents which service the software distribution client is connecting to (SIH, Windows Update, Microsoft Store, etc.). - **WUDeviceID** The unique identifier controlled by the software distribution client. @@ -3797,50 +4100,81 @@ The following fields are available: - **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. -### SoftwareUpdateClientTelemetry.Download +### SoftwareUpdateClientTelemetry.Commit -Download process event for target update on Windows Update client (see eventscenario field for specifics, e.g.: started/failed/succeeded) +This event tracks the commit process post the update installation when software update client is trying to update the device. The following fields are available: -- **ActiveDownloadTime** Number of seconds the update was actively being downloaded. -- **AppXBlockHashValidationFailureCount** A count of the number of blocks that have failed validation after being downloaded. -- **AppXDownloadScope** Indicates the scope of the download for application content. For streaming install scenarios, AllContent - non-streaming download, RequiredOnly - streaming download requested content required for launch, AutomaticOnly - streaming download requested automatic streams for the app, and Unknown - for events sent before download scope is determined by the Windows Update client. - **BiosFamily** The family of the BIOS (Basic Input Output System). - **BiosName** The name of the device BIOS. - **BiosReleaseDate** The release date of the device BIOS. - **BiosSKUNumber** The sku number of the device BIOS. - **BIOSVendor** The vendor of the BIOS. - **BiosVersion** The version of the BIOS. -- **BundleBytesDownloaded** Number of bytes downloaded for the specific content bundle. - **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. +- **BundleRevisionNumber** Identifies the revision number of the content bundle +- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client +- **ClientVersion** The version number of the software distribution client. +- **DeviceModel** What is the device model. +- **EventInstanceID** A globally unique identifier for event instance. +- **EventScenario** State of call +- **EventType** Possible values are "Child", "Bundle", or "Driver". +- **FlightId** The specific id of the flight the device is getting +- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.) +- **RevisionNumber** Unique revision number of Update +- **ServerId** Identifier for the service to which the software distribution client is connecting, such as Windows Update and Microsoft Store. +- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Windows Store, etc) +- **SystemBIOSMajorRelease** Major version of the BIOS. +- **SystemBIOSMinorRelease** Minor version of the BIOS. +- **UpdateId** Unique Update ID +- **WUDeviceID** UniqueDeviceID + + +### SoftwareUpdateClientTelemetry.Download + +Download process event for target update on Windows Update client (see eventscenario field for specifics, e.g.: started/failed/succeeded) + +The following fields are available: + +- **ActiveDownloadTime** How long the download took, in seconds, excluding time where the update wasn't actively being downloaded. +- **AppXBlockHashValidationFailureCount** A count of the number of blocks that have failed validation after being downloaded. +- **AppXDownloadScope** Indicates the scope of the download for application content. +- **BiosFamily** The family of the BIOS (Basic Input Output System). +- **BiosName** The name of the device BIOS. +- **BiosReleaseDate** The release date of the device BIOS. +- **BiosSKUNumber** The SKU number of the device BIOS. +- **BIOSVendor** The vendor of the BIOS. +- **BiosVersion** The version of the BIOS. +- **BundleBytesDownloaded** Number of bytes downloaded for the specific content bundle. +- **BundleId** Identifier associated with the specific content bundle. - **BundleRepeatFailFlag** Indicates whether this particular update bundle had previously failed to download. - **BundleRevisionNumber** Identifies the revision number of the content bundle. - **BytesDownloaded** Number of bytes that were downloaded for an individual piece of content (not the entire bundle). -- **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine does not exist, the value is null. -- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. -- **CbsDownloadMethod** Indicates whether the download was a full-file download or a partial/delta download. +- **CachedEngineVersion** The version of the “Self-Initiated Healing” (SIH) engine that is cached on the device, if applicable. +- **CallerApplicationName** The name provided by the application that initiated API calls into the software distribution client. +- **CbsDownloadMethod** Indicates whether the download was a full- or a partial-file download. - **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. - **CDNId** ID which defines which CDN the software distribution client downloaded the content from. - **ClientVersion** The version number of the software distribution client. - **CurrentMobileOperator** The mobile operator the device is currently connected to. -- **DeviceModel** What is the device model. +- **DeviceModel** The model of the device. - **DownloadPriority** Indicates whether a download happened at background, normal, or foreground priority. -- **DownloadScenarioId** A unique ID for a given download used to tie together WU and DO events. -- **DownloadType** Differentiates the download type of SIH downloads between Metadata and Payload downloads. +- **DownloadScenarioId** A unique ID for a given download, used to tie together Windows Update and Delivery Optimizer events. +- **DownloadType** Differentiates the download type of “Self-Initiated Healing” (SIH) downloads between Metadata and Payload downloads. - **EventInstanceID** A globally unique identifier for event instance. -- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started downloading content, or whether it was cancelled, succeeded, or failed. -- **EventType** Possible values are Child, Bundle, or Driver. +- **EventScenario** Indicates the purpose for sending this event: whether because the software distribution just started downloading content; or whether it was cancelled, succeeded, or failed. +- **EventType** Identifies the type of the event (Child, Bundle, or Driver). - **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. - **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. - **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). - **FlightBuildNumber** If this download was for a flight (pre-release build), this indicates the build number of that flight. -- **FlightId** The specific ID of the flight (pre-release build) the device is getting. +- **FlightId** The specific id of the flight (pre-release build) the device is getting. - **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds). - **HandlerType** Indicates what kind of content is being downloaded (app, driver, windows patch, etc.). - **HardwareId** If this download was for a driver targeted to a particular device model, this ID indicates the model of the device. - **HomeMobileOperator** The mobile operator that the device was originally intended to work with. -- **HostName** The hostname URL the content is downloading from. +- **HostName** The parent URL the content is downloading from. - **IPVersion** Indicates whether the download took place over IPv4 or IPv6. - **IsDependentSet** Indicates whether a driver is a part of a larger System Hardware/Firmware Update - **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. @@ -3851,25 +4185,25 @@ The following fields are available: - **PhonePreviewEnabled** Indicates whether a phone was opted-in to getting preview builds, prior to flighting (pre-release builds) being introduced. - **ProcessName** The process name of the caller who initiated API calls, in the event where CallerApplicationName was not provided. - **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. -- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one. +- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one - **RepeatFailFlag** Indicates whether this specific piece of content had previously failed to download. -- **RevisionNumber** Identifies the revision number of this specific piece of content. -- **ServiceGuid** An ID that represents which service the software distribution client is installing content for (Windows Update, Microsoft Store, etc.). -- **Setup360Phase** If the download is for an operating system upgrade, this datapoint indicates which phase of the upgrade is underway. -- **ShippingMobileOperator** The mobile operator that a device shipped on. +- **RevisionNumber** The revision number of the specified piece of content. +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Windows Store, etc.). +- **Setup360Phase** Identifies the active phase of the upgrade download if the current download is for an Operating System upgrade. +- **ShippingMobileOperator** The mobile operator linked to the device when the device shipped. - **StatusCode** Indicates the result of a Download event (success, cancellation, failure code HResult). - **SystemBIOSMajorRelease** Major version of the BIOS. - **SystemBIOSMinorRelease** Minor version of the BIOS. - **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. - **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. -- **TargetMetadataVersion** For self-initiated healing, this is the target version of the SIH engine to download (if needed). If not, the value is null. +- **TargetMetadataVersion** The version of the currently downloading (or most recently downloaded) package. - **ThrottlingServiceHResult** Result code (success/failure) while contacting a web service to determine whether this device should download content yet. -- **TimeToEstablishConnection** Time (in ms) it took to establish the connection prior to beginning downloaded. -- **TotalExpectedBytes** The total count of bytes that the download is expected to be. +- **TimeToEstablishConnection** Time (in milliseconds) it took to establish the connection prior to beginning downloaded. +- **TotalExpectedBytes** The total size (in Bytes) expected to be downloaded. - **UpdateId** An identifier associated with the specific piece of content. - **UpdateID** An identifier associated with the specific piece of content. -- **UpdateImportance** Indicates whether a piece of content was marked as Important, Recommended, or Optional. -- **UsedDO** Whether the download used the delivery optimization service. +- **UpdateImportance** Indicates whether the content was marked as Important, Recommended, or Optional. +- **UsedDO** Indicates whether the download used the Delivery Optimization (DO) service. - **UsedSystemVolume** Indicates whether the content was downloaded to the device's main system storage drive, or an alternate storage drive. - **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. @@ -3941,14 +4275,14 @@ The following fields are available: - **BIOSVendor** The vendor of the BIOS. - **BiosVersion** The version of the BIOS. - **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. -- **BundleRepeatFailFlag** Has this particular update bundle previously failed to install? +- **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to install. - **BundleRevisionNumber** Identifies the revision number of the content bundle. - **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine does not exist, the value is null. - **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. - **ClientVersion** The version number of the software distribution client. - **CSIErrorType** The stage of CBS installation where it failed. -- **CurrentMobileOperator** Mobile operator that device is currently connected to. -- **DeviceModel** What is the device model. +- **CurrentMobileOperator** The mobile operator to which the device is currently connected. +- **DeviceModel** The device model. - **DriverPingBack** Contains information about the previous driver and system state. - **EventInstanceID** A globally unique identifier for event instance. - **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed. @@ -3964,21 +4298,21 @@ The following fields are available: - **HardwareId** If this install was for a driver targeted to a particular device model, this ID indicates the model of the device. - **HomeMobileOperator** The mobile operator that the device was originally intended to work with. - **IntentPFNs** Intended application-set metadata for atomic update scenarios. -- **IsDependentSet** Is the driver part of a larger System Hardware/Firmware update? -- **IsFinalOutcomeEvent** Does this event signal the end of the update/upgrade process? -- **IsFirmware** Is this update a firmware update? -- **IsSuccessFailurePostReboot** Did it succeed and then fail after a restart? +- **IsDependentSet** Indicates whether the driver is part of a larger System Hardware/Firmware update. +- **IsFinalOutcomeEvent** Indicates whether this event signals the end of the update/upgrade process. +- **IsFirmware** Indicates whether this update is a firmware update. +- **IsSuccessFailurePostReboot** Indicates whether the update succeeded and then failed after a restart. - **IsWUfBDualScanEnabled** Is Windows Update for Business dual scan enabled on the device? - **IsWUfBEnabled** Indicates whether Windows Update for Business is enabled on the device. -- **MergedUpdate** Was the OS update and a BSP update merged for installation? +- **MergedUpdate** Indicates whether the OS update and a BSP update merged for installation. - **MsiAction** The stage of MSI installation where it failed. - **MsiProductCode** The unique identifier of the MSI installer. - **PackageFullName** The package name of the content being installed. - **PhonePreviewEnabled** Indicates whether a phone was getting preview build, prior to flighting being introduced. -- **ProcessName** The process name of the caller who initiated API calls, in the event where CallerApplicationName was not provided. -- **QualityUpdatePause** Are quality OS updates paused on the device? +- **ProcessName** The process name of the caller who initiated API calls, in the event that CallerApplicationName was not provided. +- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. - **RelatedCV** The previous Correlation Vector that was used before swapping with a new one -- **RepeatFailFlag** Indicates whether this specific piece of content had previously failed to install. +- **RepeatFailFlag** Indicates whether this specific piece of content previously failed to install. - **RevisionNumber** The revision number of this specific piece of content. - **ServiceGuid** An ID which represents which service the software distribution client is installing content for (Windows Update, Microsoft Store, etc.). - **Setup360Phase** If the install is for an operating system upgrade, indicates which phase of the upgrade is underway. @@ -3988,8 +4322,8 @@ The following fields are available: - **SystemBIOSMinorRelease** Minor version of the BIOS. - **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. - **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. -- **TransactionCode** The ID which represents a given MSI installation -- **UpdateId** Unique update ID +- **TransactionCode** The ID that represents a given MSI installation. +- **UpdateId** Unique update ID. - **UpdateID** An identifier associated with the specific piece of content. - **UpdateImportance** Indicates whether a piece of content was marked as Important, Recommended, or Optional. - **UsedSystemVolume** Indicates whether the content was downloaded and then installed from the device's main system storage drive, or an alternate storage drive. @@ -4020,7 +4354,7 @@ The following fields are available: - **EndpointUrl** The endpoint URL where the device obtains update metadata. This is used to distinguish between test, staging, and production environments. - **EventScenario** The purpose of this event, such as scan started, scan succeeded, or scan failed. - **ExtendedStatusCode** The secondary status code of the event. -- **LeafCertId** Integral ID from the FragmentSigning data for certificate that failed. +- **LeafCertId** The integral ID from the FragmentSigning data for the certificate that failed. - **ListOfSHA256OfIntermediateCerData** A semicolon delimited list of base64 encoding of hashes for the Base64CerData in the FragmentSigning data of an intermediate certificate. - **MetadataIntegrityMode** The mode of the transport metadata integrity check. 0 = unknown; 1 = ignore; 2 = audit; 3 = enforce - **MetadataSignature** A base64-encoded string of the signature associated with the update metadata (specified by revision ID). @@ -4031,7 +4365,7 @@ The following fields are available: - **ServiceGuid** Identifies the service to which the software distribution client is connected, Example: Windows Update or Microsoft Store - **SHA256OfLeafCerData** A base64 encoding of the hash for the Base64CerData in the FragmentSigning data of the leaf certificate. - **SHA256OfLeafCertPublicKey** A base64 encoding of the hash of the Base64CertData in the FragmentSigning data of the leaf certificate. -- **SHA256OfTimestampToken** A base64-encoded string of hash of the timestamp token blob. +- **SHA256OfTimestampToken** An encoded string of the timestamp token. - **SignatureAlgorithm** The hash algorithm for the metadata signature. - **SLSPrograms** A test program to which a device may have opted in. Example: Insider Fast - **StatusCode** The status code of the event. @@ -4282,6 +4616,7 @@ The following fields are available: - **FlightId** Unique ID for each flight. - **InternalFailureResult** Indicates a non-fatal error from a plugin. - **ObjectId** Unique value for each Update Agent mode (same concept as InstanceId for Setup360). +- **PackageCategoriesSkipped** Indicates package categories that were skipped, if applicable. - **PackageCountOptional** # of optional packages requested. - **PackageCountRequired** # of required packages requested. - **PackageCountTotal** Total # of packages needed. @@ -4519,36 +4854,36 @@ The following fields are available: - **CV** Correlation vector. - **DetectorVersion** Most recently run detector version for the current campaign. - **GlobalEventCounter** Client side counter that indicates the ordering of events sent by this user. -- **key1** UI interaction data -- **key10** UI interaction data -- **key11** UI interaction data -- **key12** UI interaction data -- **key13** UI interaction data -- **key14** UI interaction data -- **key15** UI interaction data -- **key16** UI interaction data -- **key17** UI interaction data -- **key18** UI interaction data -- **key19** UI interaction data -- **key2** UI interaction data -- **key20** UI interaction data -- **key21** UI interaction data -- **key22** UI interaction data -- **key23** UI interaction data -- **key24** UI interaction data -- **key25** UI interaction data -- **key26** UI interaction data -- **key27** UI interaction data -- **key28** UI interaction data -- **key29** UI interaction data -- **key3** UI interaction data -- **key30** UI interaction data -- **key4** UI interaction data -- **key5** UI interaction data -- **key6** UI interaction data -- **key7** UI interaction data -- **key8** UI interaction data -- **key9** UI interaction data +- **key1** UI interaction data. +- **key10** UI interaction data. +- **key11** UI interaction data. +- **key12** UI interaction data. +- **key13** UI interaction data. +- **key14** UI interaction data. +- **key15** UI interaction data. +- **key16** UI interaction data. +- **key17** UI interaction data. +- **key18** UI interaction data. +- **key19** UI interaction data. +- **key2** UI interaction data. +- **key20** UI interaction data. +- **key21** UI interaction data. +- **key22** UI interaction data. +- **key23** UI interaction data. +- **key24** The interaction data for the user interface. +- **key25** The interaction data for the user interface. +- **key26** The interaction data for the user interface. +- **key27** The interaction data for the user interface. +- **key28** The interaction data for the user interface. +- **key29** UI interaction data. +- **key3** UI interaction data. +- **key30** UI interaction data. +- **key4** UI interaction data. +- **key5** UI interaction data. +- **key6** UI interaction data. +- **key7** UI interaction data. +- **key8** UI interaction data. +- **key9** UI interaction data. - **PackageVersion** Current package version of the update notification. - **schema** UI interaction type. @@ -4643,6 +4978,12 @@ This event indicates whether devices received additional or critical supplementa +### FacilitatorTelemetry.InitializeDU + +This event determines whether devices received additional or critical supplemental content during an OS upgrade. + + + ### Setup360Telemetry.Downlevel This event sends data indicating that the device has started the downlevel phase of the upgrade, to help keep Windows up-to-date and secure. @@ -4734,6 +5075,7 @@ This event sends data indicating that the device has invoked the predownload qui The following fields are available: - **ClientId** Using Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. +- **FlightData** Unique value that identifies the flight. - **HostOSBuildNumber** The build number of the previous OS. - **HostOsSkuName** The OS edition which is running Setup360 instance (previous operating system). - **InstanceId** A unique GUID that identifies each instance of setuphost.exe. @@ -4848,6 +5190,17 @@ This event sends a summary of all the setup mitigations available for this updat This event collects information regarding the post reboot phase of the new UUP (Unified Update Platform) update scenario; which is leveraged by both Mobile and Desktop. +The following fields are available: + +- **ClientId** The Windows Update client ID passed to Setup. +- **Count** The count of applicable OneSettings for the device. +- **FlightData** The ID for the flight (test instance version). +- **InstanceId** The GUID (Globally-Unique ID) that identifies each instance of setuphost.exe. +- **Parameters** The set of name value pair parameters sent to OneSettings to determine if there are any applicable OneSettings. +- **ReportId** The Update ID passed to Setup. +- **Result** The HResult of the event error. +- **ScenarioId** The update scenario ID. +- **Values** Values sent back to the device, if applicable. ### Setup360Telemetry.UnexpectedEvent @@ -4908,17 +5261,17 @@ This event provides the results from the WaaSMedic engine The following fields are available: - **detectionSummary** Result of each applicable detection that was run. -- **featureAssessmentImpact** WaaS Assessment impact for feature updates. +- **featureAssessmentImpact** Windows as a Service (WaaS) Assessment impact on feature updates - **hrEngineResult** Indicates the WaaSMedic engine operation error codes -- **insufficientSessions** Device not eligible for diagnostics. -- **isManaged** Device is managed for updates. -- **isWUConnected** Device is connected to Windows Update. -- **noMoreActions** No more applicable diagnostics. -- **qualityAssessmentImpact** WaaS Assessment impact for quality updates. +- **insufficientSessions** True, if the device has enough activity to be eligible for update diagnostics. False, if otherwise +- **isManaged** Indicates the device is managed for updates +- **isWUConnected** Indicates the device is connected to Windows Update +- **noMoreActions** All available WaaSMedic diagnostics have run. There are no pending diagnostics and corresponding actions +- **qualityAssessmentImpact** Windows as a Service (WaaS) Assessment impact for quality updates - **remediationSummary** Result of each operation performed on a device to fix an invalid state or configuration that's preventing the device from getting updates. For example, if Windows Update service is turned off, the fix is to turn the it back on. -- **usingBackupFeatureAssessment** Relying on backup feature assessment. -- **usingBackupQualityAssessment** Relying on backup quality assessment. -- **versionString** Version of the WaaSMedic engine. +- **usingBackupFeatureAssessment** The WaaSMedic engine contacts Windows as a Service (WaaS) Assessment to determine whether the device is up-to-date. If WaaS Assessment isn't available, the engine falls back to backup feature assessments, which are determined programmatically on the client +- **usingBackupQualityAssessment** The WaaSMedic engine contacts Windows as a Service (WaaS) Assessment to determine whether the device is up-to-date. If WaaS Assessment isn't available, the engine falls back to backup quality assessments, which are determined programmatically on the client +- **versionString** Installed version of the WaaSMedic engine ## Windows Error Reporting events @@ -4941,7 +5294,7 @@ The following fields are available: - **ReportId** WER Report Id associated with this bug check (used for finding the corresponding report archive in Watson). -## Microsoft Store events +## Windows Store events ### Microsoft.Windows.Store.Partner.ReportApplication @@ -5446,7 +5799,7 @@ The following fields are available: - **bytesRequested** Number of bytes requested for the download. - **callerName** Name of the API caller. - **cdnUrl** The URL of the source CDN. -- **clientTelId** A random number used for device sampling. +- **clientTelId** Random number used for device selection - **costFlags** A set of flags representing network cost. - **deviceProfile** Identifies the usage or form factor (such as Desktop, Xbox, or VM). - **diceRoll** Random number used for determining if a client will use peering. @@ -5579,14 +5932,14 @@ This event collects information regarding the install phase of the new device ma The following fields are available: -- **errorCode** The error code returned for the current install phase -- **flightId** The unique identifier for each flight -- **objectId** Unique value for each Update Agent mode -- **relatedCV** Correlation vector value generated from the latest scan -- **result** Result of the install phase of update. 0 = Succeeded 1 = Failed, 2 = Cancelled, 3 = Blocked, 4 = BlockCancelled +- **errorCode** The error code returned for the current install phase. +- **flightId** The unique identifier for each flight (pre-release builds). +- **objectId** Unique value for each diagnostics session. +- **relatedCV** Correlation vector value generated from the latest scan. +- **result** Outcome of the install phase of the update. - **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate -- **sessionId** Unique value for each Update Agent mode attempt -- **updateId** Unique ID for each update +- **sessionId** Unique value for each update session. +- **updateId** Unique ID for each Update. ### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentModeStart @@ -5595,13 +5948,13 @@ This event sends data for the start of each mode during the process of updating The following fields are available: -- **flightId** The unique identifier for each flight -- **mode** Indicates that the Update Agent mode that has started. 1 = Initialize, 2 = DownloadRequest, 3 = Install, 4 = Commit -- **objectId** Unique value for each Update Agent mode -- **relatedCV** Correlation vector value generated from the latest scan +- **flightId** The unique identifier for each flight (pre-release builds). +- **mode** Indicates the active Update Agent mode. +- **objectId** Unique value for each diagnostics session. +- **relatedCV** Correlation vector value generated from the latest scan. - **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate -- **sessionId** Unique value for each Update Agent mode attempt -- **updateId** Unique ID for each update +- **sessionId** The unique identifier for each update session. +- **updateId** The unique identifier for each Update. ### Microsoft.Windows.Update.NotificationUx.DialogNotificationToBeDisplayed @@ -5610,6 +5963,18 @@ This event indicates that a notification dialog box is about to be displayed to +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootAcceptAutoDialog + +This event indicates that the Enhanced Engaged restart "accept automatically" dialog box was displayed. + + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootFirstReminderDialog + +This event indicates that the Enhanced Engaged restart "first reminder" dialog box was displayed. + + + ### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootRebootFailedDialog This event indicates that the Enhanced Engaged restart "restart failed" dialog box was displayed. @@ -5622,6 +5987,18 @@ This event indicates that the Enhanced Engaged restart "restart imminent" dialog +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootSecondReminderDialog + +This event indicates that the second reminder dialog box was displayed for Enhanced Engaged restart. + + + +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootThirdReminderDialog + +This event indicates that the third reminder dialog box for Enhanced Engaged restart was displayed. + + + ### Microsoft.Windows.Update.NotificationUx.RebootScheduled Indicates when a reboot is scheduled by the system or a user for a security, quality, or feature update. @@ -5646,6 +6023,12 @@ This event indicates a policy is present that may restrict update activity to ou +### Microsoft.Windows.Update.Orchestrator.AttemptImmediateReboot + +This event sends data when the Windows Update Orchestrator is set to reboot immediately after installing the update. + + + ### Microsoft.Windows.Update.Orchestrator.BlockedByActiveHours This event indicates that update activity was blocked because it is within the active hours window. @@ -5680,17 +6063,17 @@ This event indicates that a scan for a Windows Update occurred. The following fields are available: -- **deferReason** Reason why the device could not check for updates. -- **detectionBlockreason** Reason for detection not completing. +- **deferReason** The reason why the device could not check for updates. +- **detectionBlockreason** The reason detection did not complete. - **detectionRetryMode** Indicates whether we will try to scan again. -- **errorCode** The returned error code. +- **errorCode** The error code returned for the current process. - **eventScenario** End-to-end update session ID, or indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed. -- **flightID** The specific ID of the Windows Insider build the device is getting. -- **interactive** Indicates whether the session was user initiated. -- **revisionNumber** Update revision number. -- **updateId** Update ID. -- **updateScenarioType** Device ID -- **wuDeviceid** Unique device ID used by Windows Update. +- **flightID** The unique identifier for the flight (Windows Insider pre-release build) should be delivered to the device, if applicable. +- **interactive** Indicates whether the user initiated the session. +- **revisionNumber** The Update revision number. +- **updateId** The unique identifier of the Update. +- **updateScenarioType** Identifies the type of update session being performed. +- **wuDeviceid** The unique device ID used by Windows Update. ### Microsoft.Windows.Update.Orchestrator.DisplayNeeded @@ -5780,7 +6163,7 @@ The following fields are available: - **deferReason** Reason for install not completing. - **errorCode** The error code reppresented by a hexadecimal value. - **eventScenario** End-to-end update session ID. -- **flightID** The specific ID of the Windows Insider build the device is getting. +- **flightID** The ID of the Windows Insider build the device is getting. - **flightUpdate** Indicates whether the update is a Windows Insider build. - **ForcedRebootReminderSet** A boolean value that indicates if a forced reboot will happen for updates. - **installCommitfailedtime** The time it took for a reboot to happen but the upgrade failed to progress. @@ -5826,15 +6209,21 @@ This event is sent after a Windows update install completes. The following fields are available: -- **batteryLevel** Current battery capacity in mWh or percentage left. -- **bundleId** Identifier associated with the specific content bundle. +- **batteryLevel** Current battery capacity in megawatt-hours (mWh) or percentage left. +- **bundleId** The unique identifier associated with the specific content bundle. - **bundleRevisionnumber** Identifies the revision number of the content bundle. - **errorCode** The error code returned for the current phase. - **eventScenario** State of update action. -- **flightID** Update session type +- **flightID** The unique identifier for the flight (Windows Insider pre-release build) should be delivered to the device, if applicable. - **sessionType** The Windows Update session type (Interactive or Background). -- **updateScenarioType** The update session type. -- **wuDeviceid** Unique device ID used by Windows Update. +- **updateScenarioType** Identifies the type of Update session being performed. +- **wuDeviceid** The unique device identifier used by Windows Update. + + +### Microsoft.Windows.Update.Orchestrator.PowerMenuOptionsChanged + +This event is sent when the options in power menu changed, usually due to an update pending reboot, or after a update is installed. + ### Microsoft.Windows.Update.Orchestrator.PreShutdownStart @@ -6055,7 +6444,7 @@ The following fields are available: - **scheduledRebootTime** Time scheduled for the reboot. - **scheduledRebootTimeInUTC** Time scheduled for the reboot, in UTC. - **updateId** Identifies which update is being scheduled. -- **wuDeviceid** Unique device ID used by Windows Update. +- **wuDeviceid** The unique device ID used by Windows Update. ### Microsoft.Windows.Update.Ux.MusNotification.UxBrokerFirstReadyToReboot @@ -6101,24 +6490,32 @@ This event sends data specific to the CleanupSafeOsImages mitigation used for OS The following fields are available: -- **ClientId** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightId** Unique identifier for each flight. -- **InstanceId** Unique GUID that identifies each instances of setuphost.exe. +- **ClientId** The client ID used by Windows Update. +- **FlightId** The ID of each Windows Insider build the device received. +- **InstanceId** A unique device ID that identifies each update instance. - **MitigationScenario** The update scenario in which the mitigation was executed. -- **MountedImageCount** Number of mounted images. -- **MountedImageMatches** Number of mounted images that were under %systemdrive%\$Windows.~BT. -- **MountedImagesFailed** Number of mounted images under %systemdrive%\$Windows.~BT that could not be removed. -- **MountedImagesRemoved** Number of mounted images under %systemdrive%\$Windows.~BT that were successfully removed. -- **MountedImagesSkipped** Number of mounted images that were not under %systemdrive%\$Windows.~BT. -- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **MountedImageCount** The number of mounted images. +- **MountedImageMatches** The number of mounted image matches. +- **MountedImagesFailed** The number of mounted images that could not be removed. +- **MountedImagesRemoved** The number of mounted images that were successfully removed. +- **MountedImagesSkipped** The number of mounted images that were not found. +- **RelatedCV** The correlation vector value generated from the latest USO scan. - **Result** HResult of this operation. - **ScenarioId** ID indicating the mitigation scenario. - **ScenarioSupported** Indicates whether the scenario was supported. - **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each Update. +- **UpdateId** Unique ID for each Windows Update. - **WuId** Unique ID for the Windows Update client. +## Windows Update Reserve Manager events + +### Microsoft.Windows.UpdateReserveManager.RemovePendingHardReserveAdjustment + +This event is sent when the Update Reserve Manager removes a pending hard reserve adjustment. + + + ## Winlogon events ### Microsoft.Windows.Security.Winlogon.SetupCompleteLogon diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md index c8a8b09e66..6361832bf4 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md @@ -9,7 +9,7 @@ ms.pagetype: security localizationpriority: high author: brianlic-msft ms.author: brianlic -ms.date: 12/13/2018 +ms.date: 02/15/2019 --- @@ -47,55 +47,55 @@ This event lists the types of objects and how many of each exist on the client d The following fields are available: - **DatasourceApplicationFile_RS1** An ID for the system, calculated by hashing hardware identifiers. -- **DatasourceApplicationFile_RS3** The total DecisionApplicationFile objects targeting the next release of Windows on this device. +- **DatasourceApplicationFile_RS3** The count of the number of this particular object type present on this device. - **DatasourceApplicationFile_RS5** The count of the number of this particular object type present on this device. - **DatasourceDevicePnp_RS1** The total DataSourceDevicePnp objects targeting Windows 10 version 1607 on this device. -- **DatasourceDevicePnp_RS3** The total DatasourceDevicePnp objects targeting the next release of Windows on this device. +- **DatasourceDevicePnp_RS3** The count of the number of this particular object type present on this device. - **DatasourceDevicePnp_RS5** The count of the number of this particular object type present on this device. - **DatasourceDriverPackage_RS1** The total DataSourceDriverPackage objects targeting Windows 10 version 1607 on this device. -- **DatasourceDriverPackage_RS3** The total DatasourceDriverPackage objects targeting the next release of Windows on this device. +- **DatasourceDriverPackage_RS3** The count of the number of this particular object type present on this device. - **DatasourceDriverPackage_RS5** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoBlock_RS1** The total DataSourceMatchingInfoBlock objects targeting Windows 10 version 1607 on this device. -- **DataSourceMatchingInfoBlock_RS3** The total DataSourceMatchingInfoBlock objects targeting the next release of Windows on this device. +- **DataSourceMatchingInfoBlock_RS3** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoBlock_RS5** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoPassive_RS1** The total DataSourceMatchingInfoPassive objects targeting Windows 10 version 1607 on this device. -- **DataSourceMatchingInfoPassive_RS3** The total DataSourceMatchingInfoPassive objects targeting the next release of Windows on this device. +- **DataSourceMatchingInfoPassive_RS3** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoPassive_RS5** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoPostUpgrade_RS1** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1607 on this device. -- **DataSourceMatchingInfoPostUpgrade_RS3** The total DataSourceMatchingInfoPostUpgrade objects targeting the next release of Windows on this device. +- **DataSourceMatchingInfoPostUpgrade_RS3** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1709 on this device. - **DataSourceMatchingInfoPostUpgrade_RS5** The count of the number of this particular object type present on this device. - **DatasourceSystemBios_RS1** The total DatasourceSystemBios objects targeting Windows 10 version 1607 present on this device. -- **DatasourceSystemBios_RS3** The total DatasourceSystemBios objects targeting the next release of Windows on this device. +- **DatasourceSystemBios_RS3** The total DatasourceSystemBios objects targeting Windows 10 version 1709 present on this device. - **DatasourceSystemBios_RS5** The count of the number of this particular object type present on this device. - **DatasourceSystemBios_RS5Setup** The count of the number of this particular object type present on this device. - **DecisionApplicationFile_RS1** An ID for the system, calculated by hashing hardware identifiers. -- **DecisionApplicationFile_RS3** The total DecisionApplicationFile objects targeting the next release of Windows on this device. +- **DecisionApplicationFile_RS3** The count of the number of this particular object type present on this device. - **DecisionApplicationFile_RS5** The count of the number of this particular object type present on this device. - **DecisionDevicePnp_RS1** The total DecisionDevicePnp objects targeting Windows 10 version 1607 on this device. -- **DecisionDevicePnp_RS3** The total DecisionDevicePnp objects targeting the next release of Windows on this device. +- **DecisionDevicePnp_RS3** The count of the number of this particular object type present on this device. - **DecisionDevicePnp_RS5** The count of the number of this particular object type present on this device. - **DecisionDriverPackage_RS1** The total DecisionDriverPackage objects targeting Windows 10 version 1607 on this device. -- **DecisionDriverPackage_RS3** The total DecisionDriverPackage objects targeting the next release of Windows on this device. +- **DecisionDriverPackage_RS3** The count of the number of this particular object type present on this device. - **DecisionDriverPackage_RS5** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoBlock_RS1** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1607 present on this device. -- **DecisionMatchingInfoBlock_RS3** The total DecisionMatchingInfoBlock objects targeting the next release of Windows on this device. +- **DecisionMatchingInfoBlock_RS3** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1709 present on this device. - **DecisionMatchingInfoBlock_RS5** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoPassive_RS1** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1607 on this device. -- **DecisionMatchingInfoPassive_RS3** The total DataSourceMatchingInfoPassive objects targeting the next release of Windows on this device. +- **DecisionMatchingInfoPassive_RS3** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1803 on this device. - **DecisionMatchingInfoPassive_RS5** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoPostUpgrade_RS1** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1607 on this device. -- **DecisionMatchingInfoPostUpgrade_RS3** The total DecisionMatchingInfoPostUpgrade objects targeting the next release of Windows on this device. +- **DecisionMatchingInfoPostUpgrade_RS3** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1709 on this device. - **DecisionMatchingInfoPostUpgrade_RS5** The count of the number of this particular object type present on this device. - **DecisionMediaCenter_RS1** The total DecisionMediaCenter objects targeting Windows 10 version 1607 present on this device. -- **DecisionMediaCenter_RS3** The total DecisionMediaCenter objects targeting the next release of Windows on this device. +- **DecisionMediaCenter_RS3** The total DecisionMediaCenter objects targeting Windows 10 version 1709 present on this device. - **DecisionMediaCenter_RS5** The count of the number of this particular object type present on this device. - **DecisionSystemBios_RS1** The total DecisionSystemBios objects targeting Windows 10 version 1607 on this device. -- **DecisionSystemBios_RS3** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_RS3** The total DecisionSystemBios objects targeting Windows 10 version 1709 on this device. - **DecisionSystemBios_RS5** The total DecisionSystemBios objects targeting the next release of Windows on this device. -- **DecisionSystemBios_RS5Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_RS5Setup** The count of the number of this particular object type present on this device. - **DecisionTest_RS1** An ID for the system, calculated by hashing hardware identifiers. - **InventoryApplicationFile** The count of the number of this particular object type present on this device. -- **InventoryLanguagePack** The count of InventoryLanguagePack objects present on this machine. +- **InventoryLanguagePack** The count of the number of this particular object type present on this device. - **InventoryMediaCenter** The count of the number of this particular object type present on this device. - **InventorySystemBios** The count of the number of this particular object type present on this device. - **InventoryTest** The count of the number of this particular object type present on this device. @@ -104,15 +104,15 @@ The following fields are available: - **SystemMemory** The count of the number of this particular object type present on this device. - **SystemProcessorCompareExchange** The count of the number of this particular object type present on this device. - **SystemProcessorLahfSahf** The count of the number of this particular object type present on this device. -- **SystemProcessorNx** The count of SystemProcessorNx objects present on this machine. -- **SystemProcessorPrefetchW** The count of the number of this particular object type present on this device. -- **SystemProcessorSse2** The count of SystemProcessorSse2 objects present on this machine. +- **SystemProcessorNx** The total number of objects of this type present on this device. +- **SystemProcessorPrefetchW** The total number of objects of this type present on this device. +- **SystemProcessorSse2** The total number of objects of this type present on this device. - **SystemTouch** The count of SystemTouch objects present on this machine. -- **SystemWim** The count of SystemWim objects present on this machine. +- **SystemWim** The total number of objects of this type present on this device. - **SystemWindowsActivationStatus** The count of SystemWindowsActivationStatus objects present on this machine. -- **SystemWlan** The count of SystemWlan objects present on this machine. +- **SystemWlan** The total number of objects of this type present on this device. - **Wmdrm_RS1** An ID for the system, calculated by hashing hardware identifiers. -- **Wmdrm_RS3** The total Wmdrm objects targeting the next release of Windows on this device. +- **Wmdrm_RS3** An ID for the system, calculated by hashing hardware identifiers. - **Wmdrm_RS5** The count of the number of this particular object type present on this device. @@ -540,7 +540,7 @@ The following fields are available: ### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveAdd -This event sends compatibility decision data about non-blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up-to-date. +This event sends compatibility decision data about non-blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up to date. This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). @@ -1223,6 +1223,12 @@ The following fields are available: - **WindowsNotActivatedDecision** Is the current operating system activated? +### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusEndSync + +This event indicates that a full set of SystemWindowsActivationStatusAdd events has succeeded in being sent. + + + ### Microsoft.Windows.Appraiser.General.SystemWindowsActivationStatusRemove This event indicates that the SystemWindowsActivationStatus object is no longer present. @@ -1377,7 +1383,7 @@ The following fields are available: - **AppraiserTaskExitCode** The Appraiser task exist code. - **AppraiserTaskLastRun** The last runtime for the Appraiser task. - **CensusVersion** The version of Census that generated the current data for this device. -- **IEVersion** IE version running on the device. +- **IEVersion** The version of Internet Explorer that is running on the device. ### Census.Battery @@ -1578,7 +1584,7 @@ Provides information on several important data points about Processor settings The following fields are available: -- **KvaShadow** Microcode info of the processor. +- **KvaShadow** This is the micro code information of the processor. - **MMSettingOverride** Microcode setting of the processor. - **MMSettingOverrideMask** Microcode setting override of the processor. - **PreviousUpdateRevision** Previous microcode revision. @@ -1589,10 +1595,10 @@ The following fields are available: - **ProcessorManufacturer** Name of the processor manufacturer. - **ProcessorModel** Name of the processor model. - **ProcessorPhysicalCores** Number of physical cores in the processor. -- **ProcessorUpdateRevision** Microcode revision +- **ProcessorUpdateRevision** The microcode revision. - **ProcessorUpdateStatus** Enum value that represents the processor microcode load status. - **SocketCount** Count of CPU sockets. -- **SpeculationControl** If the system has enabled protections needed to validate the speculation control vulnerability. +- **SpeculationControl** Indicates whether the system has enabled protections needed to validate the speculation control vulnerability. ### Census.Security @@ -2844,6 +2850,81 @@ The following fields are available: - **WDDMVersion** The Windows Display Driver Model version. +## Failover Clustering events + +### Microsoft.Windows.Server.FailoverClusteringCritical.ClusterSummary2 + +This event returns information about how many resources and of what type are in the server cluster. This data is collected to keep Windows Server safe, secure, and up to date. The data includes information about whether hardware is configured correctly, if the software is patched correctly, and assists in preventing crashes by attributing issues (like fatal errors) to workloads and system configurations. + +The following fields are available: + +- **autoAssignSite** The cluster parameter: auto site. +- **autoBalancerLevel** The cluster parameter: auto balancer level. +- **autoBalancerMode** The cluster parameter: auto balancer mode. +- **blockCacheSize** The configured size of the block cache. +- **ClusterAdConfiguration** The ad configuration of the cluster. +- **clusterAdType** The cluster parameter: mgmt_point_type. +- **clusterDumpPolicy** The cluster configured dump policy. +- **clusterFunctionalLevel** The current cluster functional level. +- **clusterGuid** The unique identifier for the cluster. +- **clusterWitnessType** The witness type the cluster is configured for. +- **countNodesInSite** The number of nodes in the cluster. +- **crossSiteDelay** The cluster parameter: CrossSiteDelay. +- **crossSiteThreshold** The cluster parameter: CrossSiteThreshold. +- **crossSubnetDelay** The cluster parameter: CrossSubnetDelay. +- **crossSubnetThreshold** The cluster parameter: CrossSubnetThreshold. +- **csvCompatibleFilters** The cluster parameter: ClusterCsvCompatibleFilters. +- **csvIncompatibleFilters** The cluster parameter: ClusterCsvIncompatibleFilters. +- **csvResourceCount** The number of resources in the cluster. +- **currentNodeSite** The name configured for the current site for the cluster. +- **dasModeBusType** The direct storage bus type of the storage spaces. +- **downLevelNodeCount** The number of nodes in the cluster that are running down-level. +- **drainOnShutdown** Specifies whether a node should be drained when it is shut down. +- **dynamicQuorumEnabled** Specifies whether dynamic Quorum has been enabled. +- **enforcedAntiAffinity** The cluster parameter: enforced anti affinity. +- **genAppNames** The win32 service name of a clustered service. +- **genSvcNames** The command line of a clustered genapp. +- **hangRecoveryAction** The cluster parameter: hang recovery action. +- **hangTimeOut** Specifies the “hang time out” parameter for the cluster. +- **isCalabria** Specifies whether storage spaces direct is enabled. +- **isMixedMode** Identifies if the cluster is running with different version of OS for nodes. +- **isRunningDownLevel** Identifies if the current node is running down-level. +- **logLevel** Specifies the granularity that is logged in the cluster log. +- **logSize** Specifies the size of the cluster log. +- **lowerQuorumPriorityNodeId** The cluster parameter: lower quorum priority node ID. +- **minNeverPreempt** The cluster parameter: minimum never preempt. +- **minPreemptor** The cluster parameter: minimum preemptor priority. +- **netftIpsecEnabled** The parameter: netftIpsecEnabled. +- **NodeCount** The number of nodes in the cluster. +- **nodeId** The current node number in the cluster. +- **nodeResourceCounts** Specifies the number of node resources. +- **nodeResourceOnlineCounts** Specifies the number of node resources that are online. +- **numberOfSites** The number of different sites. +- **numNodesInNoSite** The number of nodes not belonging to a site. +- **plumbAllCrossSubnetRoutes** The cluster parameter: plumb all cross subnet routes. +- **preferredSite** The preferred site location. +- **privateCloudWitness** Specifies whether a private cloud witness exists for this cluster. +- **quarantineDuration** The quarantine duration. +- **quarantineThreshold** The quarantine threshold. +- **quorumArbitrationTimeout** In the event of an arbitration event, this specifies the quorum timeout period. +- **resiliencyLevel** Specifies the level of resiliency. +- **resourceCounts** Specifies the number of resources. +- **resourceTypeCounts** Specifies the number of resource types in the cluster. +- **resourceTypes** Data representative of each resource type. +- **resourceTypesPath** Data representative of the DLL path for each resource type. +- **sameSubnetDelay** The cluster parameter: same subnet delay. +- **sameSubnetThreshold** The cluster parameter: same subnet threshold. +- **secondsInMixedMode** The amount of time (in seconds) that the cluster has been in mixed mode (nodes with different operating system versions in the same cluster). +- **securityLevel** The cluster parameter: security level. +- **securityLevelForStorage** The cluster parameter: security level for storage. +- **sharedVolumeBlockCacheSize** Specifies the block cache size for shared for shared volumes. +- **shutdownTimeoutMinutes** Specifies the amount of time it takes to time out when shutting down. +- **upNodeCount** Specifies the number of nodes that are up (online). +- **useClientAccessNetworksForCsv** The cluster parameter: use client access networks for CSV. +- **vmIsolationTime** The cluster parameter: VM isolation time. +- **witnessDatabaseWriteTimeout** Specifies the timeout period for writing to the quorum witness database. + + ## Fault Reporting events ### Microsoft.Windows.FaultReporting.AppCrashEvent @@ -3015,6 +3096,17 @@ The following fields are available: - **ProgramIds** The unique program identifier the driver is associated with. +### Microsoft.Windows.Inventory.Core.InventoryApplicationDriverStartSync + +The InventoryApplicationDriverStartSync event indicates that a new set of InventoryApplicationDriverStartAdd events will be sent. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **InventoryVersion** The version of the inventory component. + + ### Microsoft.Windows.Inventory.Core.InventoryApplicationFrameworkAdd This event provides the basic metadata about the frameworks an application may depend on. @@ -3191,35 +3283,35 @@ This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedevic The following fields are available: -- **BusReportedDescription** System-supplied GUID that uniquely groups the functional devices associated with a single-function or multifunction device installed in the computer. -- **Class** A unique identifier for the driver installed. -- **ClassGuid** Name of the .sys image file (or wudfrd.sys if using user mode driver framework). -- **COMPID** INF file name (the name could be renamed by OS, such as oemXX.inf) -- **ContainerId** The version of the inventory binary generating the events. -- **Description** The current error code for the device. -- **DeviceState** The device description. -- **DriverId** DeviceState is a bitmask of the following: DEVICE_IS_CONNECTED 0x0001 (currently only for container). DEVICE_IS_NETWORK_DEVICE 0x0002 (currently only for container). DEVICE_IS_PAIRED 0x0004 (currently only for container). DEVICE_IS_ACTIVE 0x0008 (currently never set). DEVICE_IS_MACHINE 0x0010 (currently only for container). DEVICE_IS_PRESENT 0x0020 (currently always set). DEVICE_IS_HIDDEN 0x0040. DEVICE_IS_PRINTER 0x0080 (currently only for container). DEVICE_IS_WIRELESS 0x0100. DEVICE_IS_WIRELESS_FAT 0x0200. The most common values are therefore: 32 (0x20)= device is present. 96 (0x60)= device is present but hidden. 288 (0x120)= device is a wireless device that is present -- **DriverName** A unique identifier for the driver installed. -- **DriverPackageStrongName** The immediate parent directory name in the Directory field of InventoryDriverPackage -- **DriverVerDate** Name of the .sys image file (or wudfrd.sys if using user mode driver framework). +- **BusReportedDescription** The description of the device reported by the bus. +- **Class** The device setup class of the driver loaded for the device. +- **ClassGuid** The device class unique identifier of the driver package loaded on the device. +- **COMPID** The list of “Compatible IDs” for this device. +- **ContainerId** The system-supplied unique identifier that specifies which group(s) the device(s) installed on the parent (main) device belong to. +- **Description** The description of the device. +- **DeviceState** Identifies the current state of the parent (main) device. +- **DriverId** The unique identifier for the installed driver. +- **DriverName** The name of the driver image file. +- **DriverPackageStrongName** The immediate parent directory name in the Directory field of InventoryDriverPackage. +- **DriverVerDate** The date associated with the driver loaded on the device. - **DriverVerVersion** The immediate parent directory name in the Directory field of InventoryDriverPackage. -- **Enumerator** The date of the driver loaded for the device. -- **HWID** The version of the driver loaded for the device. -- **Inf** The bus that enumerated the device. -- **InstallState** The device installation state. One of these values: https://msdn.microsoft.com/en-us/library/windows/hardware/ff543130.aspx -- **InventoryVersion** List of hardware ids for the device. -- **LowerClassFilters** Lower filter class drivers IDs installed for the device -- **LowerFilters** Lower filter drivers IDs installed for the device -- **Manufacturer** INF file name (the name could be renamed by OS, such as oemXX.inf) -- **MatchingID** Device installation state. -- **Model** The version of the inventory binary generating the events. -- **ParentId** Lower filter class drivers IDs installed for the device. -- **ProblemCode** Lower filter drivers IDs installed for the device. -- **Provider** The device manufacturer. -- **Service** The device service name -- **STACKID** Represents the hardware ID or compatible ID that Windows uses to install a device instance. -- **UpperClassFilters** Upper filter drivers IDs installed for the device -- **UpperFilters** The device model. +- **Enumerator** Identifies the bus that enumerated the device. +- **HWID** A list of hardware IDs for the device. +- **Inf** The name of the INF file (possibly renamed by the OS, such as oemXX.inf). +- **InstallState** The device installation state. For a list of values, see: https://msdn.microsoft.com/en-us/library/windows/hardware/ff543130.aspx +- **InventoryVersion** The version number of the inventory process generating the events. +- **LowerClassFilters** The identifiers of the Lower Class filters installed for the device. +- **LowerFilters** The identifiers of the Lower filters installed for the device. +- **Manufacturer** The manufacturer of the device. +- **MatchingID** The Hardware ID or Compatible ID that Windows uses to install a device instance. +- **Model** Identifies the model of the device. +- **ParentId** The Device Instance ID of the parent of the device. +- **ProblemCode** The error code currently returned by the device, if applicable. +- **Provider** Identifies the device provider. +- **Service** The name of the device service. +- **STACKID** The list of hardware IDs for the stack. +- **UpperClassFilters** The identifiers of the Upper Class filters installed for the device. +- **UpperFilters** The identifiers of the Upper filters installed for the device. ### Microsoft.Windows.Inventory.Core.InventoryDevicePnpRemove @@ -3367,29 +3459,29 @@ This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedevic The following fields are available: -- **AddinCLSID** The CLSID for the Office addin -- **AddInCLSID** CLSID key for the office addin -- **AddInId** Office addin ID -- **AddinType** The type of the Office addin. -- **BinFileTimestamp** Timestamp of the Office addin -- **BinFileVersion** Version of the Office addin -- **Description** Office addin description -- **FileId** FileId of the Office addin -- **FileSize** File size of the Office addin -- **FriendlyName** Friendly name for office addin -- **FullPath** Unexpanded path to the office addin +- **AddinCLSID** The class identifier key for the Microsoft Office add-in. +- **AddInCLSID** The class identifier key for the Microsoft Office add-in. +- **AddInId** The identifier for the Microsoft Office add-in. +- **AddinType** The type of the Microsoft Office add-in. +- **BinFileTimestamp** The timestamp of the Office add-in. +- **BinFileVersion** The version of the Microsoft Office add-in. +- **Description** Description of the Microsoft Office add-in. +- **FileId** The file identifier of the Microsoft Office add-in. +- **FileSize** The file size of the Microsoft Office add-in. +- **FriendlyName** The friendly name for the Microsoft Office add-in. +- **FullPath** The full path to the Microsoft Office add-in. - **InventoryVersion** The version of the inventory binary generating the events. -- **LoadBehavior** Uint32 that describes the load behavior +- **LoadBehavior** Integer that describes the load behavior. - **LoadTime** Load time for the office addin -- **OfficeApplication** The office application for this addin -- **OfficeArchitecture** Architecture of the addin -- **OfficeVersion** The office version for this addin -- **OutlookCrashingAddin** Boolean that indicates if crashes have been found for this addin -- **ProductCompany** The name of the company associated with the Office addin -- **ProductName** The product name associated with the Office addin -- **ProductVersion** The version associated with the Office addin -- **ProgramId** The unique program identifier of the Office addin -- **Provider** Name of the provider for this addin +- **OfficeApplication** The Microsoft Office application associated with the add-in. +- **OfficeArchitecture** The architecture of the add-in. +- **OfficeVersion** The Microsoft Office version for this add-in. +- **OutlookCrashingAddin** Indicates whether crashes have been found for this add-in. +- **ProductCompany** The name of the company associated with the Office add-in. +- **ProductName** The product name associated with the Microsoft Office add-in. +- **ProductVersion** The version associated with the Office add-in. +- **ProgramId** The unique program identifier of the Microsoft Office add-in. +- **Provider** Name of the provider for this add-in. ### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInRemove @@ -3785,6 +3877,81 @@ The following fields are available: - **UptimeDeltaMS** Total time (in milliseconds) added to Uptime since the last event +## Miracast events + +### Microsoft.Windows.Cast.Miracast.MiracastSessionEnd + +This event sends data at the end of a Miracast session that helps determine RTSP related Miracast failures along with some statistics about the session + +The following fields are available: + +- **AudioChannelCount** The number of audio channels. +- **AudioSampleRate** The sample rate of audio in terms of samples per second. +- **AudioSubtype** The unique subtype identifier of the audio codec (encoding method) used for audio encoding. +- **AverageBitrate** The average video bitrate used during the Miracast session, in bits per second. +- **AverageDataRate** The average available bandwidth reported by the WiFi driver during the Miracast session, in bits per second. +- **AveragePacketSendTimeInMs** The average time required for the network to send a sample, in milliseconds. +- **ConnectorType** The type of connector used during the Miracast session. +- **EncodeAverageTimeMS** The average time to encode a frame of video, in milliseconds. +- **EncodeCount** The count of total frames encoded in the session. +- **EncodeMaxTimeMS** The maximum time to encode a frame, in milliseconds. +- **EncodeMinTimeMS** The minimum time to encode a frame, in milliseconds. +- **EncoderCreationTimeInMs** The time required to create the video encoder, in milliseconds. +- **ErrorSource** Identifies the component that encountered an error that caused a disconnect, if applicable. +- **FirstFrameTime** The time (tick count) when the first frame is sent. +- **FirstLatencyMode** The first latency mode. +- **FrameAverageTimeMS** Average time to process an entire frame, in milliseconds. +- **FrameCount** The total number of frames processed. +- **FrameMaxTimeMS** The maximum time required to process an entire frame, in milliseconds. +- **FrameMinTimeMS** The minimum time required to process an entire frame, in milliseconds. +- **Glitches** The number of frames that failed to be delivered on time. +- **HardwareCursorEnabled** Indicates if hardware cursor was enabled when the connection ended. +- **HDCPState** The state of HDCP (High-bandwidth Digital Content Protection) when the connection ended. +- **HighestBitrate** The highest video bitrate used during the Miracast session, in bits per second. +- **HighestDataRate** The highest available bandwidth reported by the WiFi driver, in bits per second. +- **LastLatencyMode** The last reported latency mode. +- **LastLatencyTime** The last reported latency time. +- **LogTimeReference** The reference time, in tick counts. +- **LowestBitrate** The lowest video bitrate used during the Miracast session, in bits per second. +- **LowestDataRate** The lowest video bitrate used during the Miracast session, in bits per second. +- **MediaErrorCode** The error code reported by the media session, if applicable. +- **MiracastEntry** The time (tick count) when the Miracast driver was first loaded. +- **MiracastM1** The time (tick count) when the M1 request was sent. +- **MiracastM2** The time (tick count) when the M2 request was sent. +- **MiracastM3** The time (tick count) when the M3 request was sent. +- **MiracastM4** The time (tick count) when the M4 request was sent. +- **MiracastM5** The time (tick count) when the M5 request was sent. +- **MiracastM6** The time (tick count) when the M6 request was sent. +- **MiracastM7** The time (tick count) when the M7 request was sent. +- **MiracastSessionState** The state of the Miracast session when the connection ended. +- **MiracastStreaming** The time (tick count) when the Miracast session first started processing frames. +- **ProfileCount** The count of profiles generated from the receiver M4 response. +- **ProfileCountAfterFiltering** The count of profiles after filtering based on available bandwidth and encoder capabilities. +- **RefreshRate** The refresh rate set on the remote display. +- **RotationSupported** Indicates if the Miracast receiver supports display rotation. +- **RTSPSessionId** The unique identifier of the RTSP session. This matches the RTSP session ID for the receiver for the same session. +- **SessionGuid** The unique identifier of to correlate various Miracast events from a session. +- **SinkHadEdid** Indicates if the Miracast receiver reported an EDID. +- **SupportMicrosoftColorSpaceConversion** Indicates whether the Microsoft color space conversion for extra color fidelity is supported by the receiver. +- **SupportsMicrosoftDiagnostics** Indicates whether the Miracast receiver supports the Microsoft Diagnostics Miracast extension. +- **SupportsMicrosoftFormatChange** Indicates whether the Miracast receiver supports the Microsoft Format Change Miracast extension. +- **SupportsMicrosoftLatencyManagement** Indicates whether the Miracast receiver supports the Microsoft Latency Management Miracast extension. +- **SupportsMicrosoftRTCP** Indicates whether the Miracast receiver supports the Microsoft RTCP Miracast extension. +- **SupportsMicrosoftVideoFormats** Indicates whether the Miracast receiver supports Microsoft video format for 3:2 resolution. +- **SupportsWiDi** Indicates whether Miracast receiver supports Intel WiDi extensions. +- **TeardownErrorCode** The error code reason for teardown provided by the receiver, if applicable. +- **TeardownErrorReason** The text string reason for teardown provided by the receiver, if applicable. +- **UIBCEndState** Indicates whether UIBC was enabled when the connection ended. +- **UIBCEverEnabled** Indicates whether UIBC was ever enabled. +- **UIBCStatus** The result code reported by the UIBC setup process. +- **VideoBitrate** The starting bitrate for the video encoder. +- **VideoCodecLevel** The encoding level used for encoding, specific to the video subtype. +- **VideoHeight** The height of encoded video frames. +- **VideoSubtype** The unique subtype identifier of the video codec (encoding method) used for video encoding. +- **VideoWidth** The width of encoded video frames. +- **WFD2Supported** Indicates if the Miracast receiver supports WFD2 protocol. + + ## OneDrive events ### Microsoft.OneDrive.Sync.Setup.APIOperation @@ -3920,10 +4087,10 @@ Event tells us effectiveness of new privacy experience. The following fields are available: -- **isAdmin** Whether the current user is an administrator or not +- **isAdmin** whether the person who is logging in is an admin - **isLaunching** Whether or not the privacy consent experience will be launched -- **isSilentElevation** Whether the current user has enabled silent elevation -- **privacyConsentState** The current state of the privacy consent experience +- **isSilentElevation** whether the user has most restrictive UAC controls +- **privacyConsentState** whether the user has completed privacy experience - **userRegionCode** The current user's region setting @@ -4227,6 +4394,17 @@ This event indicates an error in the updater payload. This information assists i +### Microsoft.Windows.Sediment.Info.PhaseChange + +The event indicates progress made by the updater. This information assists in keeping Windows up to date. + +The following fields are available: + +- **NewPhase** The phase of progress made. +- **ReleaseVer** The version information for the component in which the change occurred. +- **Time** The system time at which the phase chance occurred. + + ### Microsoft.Windows.Sediment.OSRSS.CheckingOneSettings This event indicates the parameters that the Operating System Remediation System Service (OSRSS) uses for a secure ping to Microsoft to help ensure Windows is up to date. @@ -4241,6 +4419,31 @@ The following fields are available: - **Time** The system time at which the event occurred. +### Microsoft.Windows.Sediment.OSRSS.DownloadingUrl + +This event provides information about the URL from which the Operating System Remediation System Service (OSRSS) is attempting to download. This information helps ensure Windows is up to date. + +The following fields are available: + +- **AttemptNumber** The count indicating which download attempt is starting. +- **ServiceVersionMajor** The Major version information of the component. +- **ServiceVersionMinor** The Minor version information of the component. +- **Time** The system time at which the event occurred. +- **Url** The URL from which data was downloaded. + + +### Microsoft.Windows.Sediment.OSRSS.DownloadSuccess + +This event indicates the Operating System Remediation System Service (OSRSS) successfully download data from the indicated URL. This information helps ensure Windows is up to date. + +The following fields are available: + +- **ServiceVersionMajor** The Major version information of the component. +- **ServiceVersionMinor** The Minor version information of the component. +- **Time** The system time at which the event occurred. +- **Url** The URL from which data was downloaded. + + ### Microsoft.Windows.Sediment.OSRSS.Error This event indicates an error occurred in the Operating System Remediation System Service (OSRSS). The information provided helps ensure future upgrade/update attempts are more successful. @@ -4256,6 +4459,65 @@ The following fields are available: - **Time** The system time at which the event occurred. +### Microsoft.Windows.Sediment.OSRSS.ExeSignatureValidated + +This event indicates the Operating System Remediation System Service (OSRSS) successfully validated the signature of an EXE from the indicated URL. The information provided helps ensure Windows is up to date. + +The following fields are available: + +- **ServiceVersionMajor** The Major version information of the component. +- **ServiceVersionMinor** The Minor version information of the component. +- **Time** The system time at which the event occurred. +- **Url** The URL from which the validated EXE was downloaded. + + +### Microsoft.Windows.Sediment.OSRSS.ExtractSuccess + +This event indicates that the Operating System Remediation System Service (OSRSS) successfully extracted downloaded content. The information provided helps ensure Windows is up to date. + +The following fields are available: + +- **ServiceVersionMajor** The Major version information of the component. +- **ServiceVersionMinor** The Minor version information of the component. +- **Time** The system time at which the event occurred. +- **Url** The URL from which the successfully extracted content was downloaded. + + +### Microsoft.Windows.Sediment.OSRSS.NewUrlFound + +This event indicates the Operating System Remediation System Service (OSRSS) succeeded in finding a new URL to download from. This helps ensure Windows is up to date. + +The following fields are available: + +- **ServiceVersionMajor** The Major version information of the component. +- **ServiceVersionMinor** The Minor version information of the component. +- **Time** The system time at which the event occurred. +- **Url** The new URL from which content will be downloaded. + + +### Microsoft.Windows.Sediment.OSRSS.ProcessCreated + +This event indicates the Operating System Remediation System Service (OSRSS) created a new process to execute content downloaded from the indicated URL. This information helps ensure Windows is up to date. + +The following fields are available: + +- **ServiceVersionMajor** The Major version information of the component. +- **ServiceVersionMinor** The Minor version information of the component. +- **Time** The system time at which the event occurred. +- **Url** The new URL from which content will be executed. + + +### Microsoft.Windows.Sediment.OSRSS.SelfUpdate + +This event returns metadata after Operating System Remediation System Service (OSRSS) successfully replaces itself with a new version. + +The following fields are available: + +- **ServiceVersionMajor** The major version number for the component. +- **ServiceVersionMinor** The minor version number for the component. +- **Time** The system timestamp for when the event occurred. + + ### Microsoft.Windows.Sediment.OSRSS.UrlState This event indicates the state the Operating System Remediation System Service (OSRSS) is in while attempting a download from the URL. @@ -4270,6 +4532,66 @@ The following fields are available: - **Time** System timestamp when the event was started. +### Microsoft.Windows.Sediment.ServiceInstaller.AttemptingUpdate + +This event indicates the Operating System Remediation System Service (OSRSS) installer is attempting an update to itself. This information helps ensure Windows is up to date. + +The following fields are available: + +- **InstallerVersion** The version information of the Installer component. +- **Time** The system time at which the event occurred. + + +### Microsoft.Windows.Sediment.ServiceInstaller.BinaryUpdated + +This event indicates the Operating System Remediation System Service (OSRSS) updated installer binaries with new binaries as part of its self-update process. This information helps ensure Windows is up to date. + +The following fields are available: + +- **InstallerVersion** The version information of the Installer component. +- **Time** The system time at which the event occurred. + + +### Microsoft.Windows.Sediment.ServiceInstaller.ServiceRestarted + +This event indicates the Operating System Remediation System Service (OSRSS) has restarted after installing an updated version of itself. This information helps ensure Windows is up to date. + +The following fields are available: + +- **InstallerVersion** The version information of the Installer component. +- **Time** The system time at which the event occurred. + + +### Microsoft.Windows.Sediment.ServiceInstaller.ServiceStopped + +This event indicates the Operating System Remediation System Service (OSRSS) was stopped by a self-updated to install an updated version of itself. This information helps ensure Windows is up to date. + +The following fields are available: + +- **InstallerVersion** The version information of the Installer component. +- **Time** The system time at which the event occurred. + + +### Microsoft.Windows.Sediment.ServiceInstaller.UpdaterCompleted + +This event indicates the Operating System Remediation System Service (OSRSS) successfully completed the self-update operation. This information helps ensure Windows is up to date. + +The following fields are available: + +- **InstallerVersion** The version information of the Installer component. +- **Time** The system time at which the event occurred. + + +### Microsoft.Windows.Sediment.ServiceInstaller.UpdaterLaunched + +This event indicates the Operating System Remediation System Service (OSRSS) successfully launched the self-updater after downloading it. This information helps ensure Windows is up to date. + +The following fields are available: + +- **InstallerVersion** The version information of the Installer component. +- **Time** The system time at which the event occurred. + + ### Microsoft.Windows.SedimentLauncher.Applicable Indicates whether a given plugin is applicable. @@ -4293,6 +4615,7 @@ Indicates whether a given plugin has completed its work. The following fields are available: - **CV** Correlation vector. +- **FailedReasons** Concatenated list of failure reasons. - **GlobalEventCounter** Client side counter which indicates ordering of events sent by this user. - **PackageVersion** Current package version of Remediation. - **PluginName** Name of the plugin specified for each generic plugin event. @@ -4480,30 +4803,6 @@ The following fields are available: ## SIH events -### SIHEngineTelemetry.EvalApplicability - -This event is sent when targeting logic is evaluated to determine if a device is eligible for a given action. - -The following fields are available: - -- **ActionReasons** If an action has been assessed as inapplicable, the additional logic prevented it. -- **AdditionalReasons** If an action has been assessed as inapplicable, the additional logic prevented it. -- **CachedEngineVersion** The engine DLL version that is being used. -- **EventInstanceID** A unique identifier for event instance. -- **EventScenario** Indicates the purpose of sending this event – whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed. -- **HandlerReasons** If an action has been assessed as inapplicable, the installer technology-specific logic prevented it. -- **IsExecutingAction** If the action is presently being executed. -- **ServiceGuid** A unique identifier that represents which service the software distribution client is connecting to (SIH, Windows Update, Microsoft Store, etc.) -- **SihclientVersion** The client version that is being used. -- **StandardReasons** If an action has been assessed as inapplicable, the standard logic the prevented it. -- **StatusCode** Result code of the event (success, cancellation, failure code HResult). -- **UpdateID** A unique identifier for the action being acted upon. -- **WuapiVersion** The Windows Update API version that is currently installed. -- **WuaucltVersion** The Windows Update client version that is currently installed. -- **WuauengVersion** The Windows Update engine version that is currently installed. -- **WUDeviceID** The unique identifier controlled by the software distribution client. - - ### SIHEngineTelemetry.SLSActionData This event reports if the SIH client was able to successfully parse the manifest describing the actions to be evaluated. @@ -4515,7 +4814,7 @@ The following fields are available: - **EventScenario** Indicates the purpose of sending this event – whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed. - **FailedParseActions** The list of actions that were not successfully parsed. - **ParsedActions** The list of actions that were successfully parsed. -- **ServiceGuid** A unique identifier that represents which service the software distribution client is connecting to (SIH, Windows Update, Microsoft Store, etc.) +- **ServiceGuid** A unique identifier that represents which service the software distribution client is connecting to (SIH, Windows Update, Microsoft Store, etc.). - **SihclientVersion** The client version that is being used. - **WuapiVersion** The Windows Update API version that is currently installed. - **WuaucltVersion** The Windows Update client version that is currently installed. @@ -4631,7 +4930,7 @@ The following fields are available: - **FlightId** The specific id of the flight the device is getting - **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.) - **RevisionNumber** Identifies the revision number of this specific piece of content -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc) +- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Windows Store, etc) - **SystemBIOSMajorRelease** Major release version of the system bios - **SystemBIOSMinorRelease** Minor release version of the system bios - **UpdateId** Identifier associated with the specific piece of content @@ -4644,32 +4943,32 @@ Download process event for target update on Windows Update client. See EventScen The following fields are available: -- **ActiveDownloadTime** Number of seconds the update was actively being downloaded. +- **ActiveDownloadTime** How long the download took, in seconds, excluding time where the update wasn't actively being downloaded. - **AppXBlockHashValidationFailureCount** A count of the number of blocks that have failed validation after being downloaded. -- **AppXDownloadScope** Indicates the scope of the download for application content. For streaming install scenarios, AllContent - non-streaming download, RequiredOnly - streaming download requested content required for launch, AutomaticOnly - streaming download requested automatic streams for the app, and Unknown - for events sent before download scope is determined by the Windows Update client. +- **AppXDownloadScope** Indicates the scope of the download for application content. - **BiosFamily** The family of the BIOS (Basic Input Output System). - **BiosName** The name of the device BIOS. - **BiosReleaseDate** The release date of the device BIOS. -- **BiosSKUNumber** The sku number of the device BIOS. +- **BiosSKUNumber** The SKU number of the device BIOS. - **BIOSVendor** The vendor of the BIOS. - **BiosVersion** The version of the BIOS. - **BundleBytesDownloaded** Number of bytes downloaded for the specific content bundle. -- **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. +- **BundleId** Identifier associated with the specific content bundle. - **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to download. - **BundleRevisionNumber** Identifies the revision number of the content bundle. - **BytesDownloaded** Number of bytes that were downloaded for an individual piece of content (not the entire bundle). -- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. -- **CbsDownloadMethod** Indicates whether the download was a full-file download or a partial/delta download. +- **CallerApplicationName** The name provided by the application that initiated API calls into the software distribution client. +- **CbsDownloadMethod** The method used for downloading the update content related to the Component Based Servicing (CBS) technology. - **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. - **CDNId** ID which defines which CDN the software distribution client downloaded the content from. - **ClientVersion** The version number of the software distribution client. - **CurrentMobileOperator** The mobile operator the device is currently connected to. -- **DeviceModel** What is the device model. +- **DeviceModel** The model of the device. - **DownloadPriority** Indicates whether a download happened at background, normal, or foreground priority. -- **DownloadScenarioId** A unique ID for a given download used to tie together WU and DO events. +- **DownloadScenarioId** A unique ID for a given download, used to tie together Windows Update and Delivery Optimizer events. - **EventInstanceID** A globally unique identifier for event instance. -- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started downloading content, or whether it was cancelled, succeeded, or failed. -- **EventType** Possible values are Child, Bundle, or Driver. +- **EventScenario** Indicates the purpose for sending this event: whether because the software distribution just started downloading content; or whether it was cancelled, succeeded, or failed. +- **EventType** Identifies the type of the event (Child, Bundle, or Driver). - **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. - **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. - **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). @@ -4679,35 +4978,35 @@ The following fields are available: - **HandlerType** Indicates what kind of content is being downloaded (app, driver, windows patch, etc.). - **HardwareId** If this download was for a driver targeted to a particular device model, this ID indicates the model of the device. - **HomeMobileOperator** The mobile operator that the device was originally intended to work with. -- **HostName** The hostname URL the content is downloading from. +- **HostName** The parent URL the content is downloading from. - **IPVersion** Indicates whether the download took place over IPv4 or IPv6. - **IsDependentSet** Indicates whether a driver is a part of a larger System Hardware/Firmware Update - **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. - **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. -- **NetworkCostBitMask** Indicates what kind of network the device is connected to (roaming, metered, over data cap, etc.) +- **NetworkCostBitMask** A flag indicating the cost of the network (congested, fixed, variable, over data limit, roaming, etc.) used for downloading the update content. - **NetworkRestrictionStatus** More general version of NetworkCostBitMask, specifying whether Windows considered the current network to be "metered." - **PackageFullName** The package name of the content. - **PhonePreviewEnabled** Indicates whether a phone was opted-in to getting preview builds, prior to flighting (pre-release builds) being introduced. -- **ProcessName** The process name of the caller who initiated API calls, in the event where CallerApplicationName was not provided. +- **ProcessName** The process name of the application that initiated API calls, in the event where CallerApplicationName was not provided. - **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. - **RegulationReason** The reason that the update is regulated -- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one. +- **RelatedCV** The Correlation Vector that was used before the most recent change to a new Correlation Vector. - **RepeatFailFlag** Indicates whether this specific piece of content had previously failed to download. -- **RevisionNumber** Identifies the revision number of this specific piece of content. -- **ServiceGuid** An ID that represents which service the software distribution client is installing content for (Windows Update, Microsoft Store, etc.). -- **Setup360Phase** If the download is for an operating system upgrade, this datapoint indicates which phase of the upgrade is underway. -- **ShippingMobileOperator** The mobile operator that a device shipped on. +- **RevisionNumber** The revision number of the specified piece of content. +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Windows Store, etc.). +- **Setup360Phase** Identifies the active phase of the upgrade download if the current download is for an Operating System upgrade. +- **ShippingMobileOperator** The mobile operator linked to the device when the device shipped. - **StatusCode** Indicates the result of a Download event (success, cancellation, failure code HResult). - **SystemBIOSMajorRelease** Major version of the BIOS. - **SystemBIOSMinorRelease** Minor version of the BIOS. - **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. - **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. - **ThrottlingServiceHResult** Result code (success/failure) while contacting a web service to determine whether this device should download content yet. -- **TimeToEstablishConnection** Time (in ms) it took to establish the connection prior to beginning downloaded. -- **TotalExpectedBytes** The total count of bytes that the download is expected to be. +- **TimeToEstablishConnection** Time (in milliseconds) it took to establish the connection prior to beginning downloaded. +- **TotalExpectedBytes** The total size (in Bytes) expected to be downloaded. - **UpdateId** An identifier associated with the specific piece of content. -- **UpdateImportance** Indicates whether a piece of content was marked as Important, Recommended, or Optional. -- **UsedDO** Whether the download used the delivery optimization service. +- **UpdateImportance** Indicates whether the content was marked as Important, Recommended, or Optional. +- **UsedDO** Whether the download used the Delivery Optimization (DO) service. - **UsedSystemVolume** Indicates whether the content was downloaded to the device's main system storage drive, or an alternate storage drive. - **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. @@ -4855,24 +5154,24 @@ The following fields are available: - **EndpointUrl** The endpoint URL where the device obtains update metadata. This is used to distinguish between test, staging, and production environments. - **EventScenario** The purpose of this event, such as scan started, scan succeeded, or scan failed. - **ExtendedStatusCode** The secondary status code of the event. -- **LeafCertId** Integral ID from the FragmentSigning data for certificate that failed. +- **LeafCertId** The integral ID from the FragmentSigning data for the certificate that failed. - **ListOfSHA256OfIntermediateCerData** A semicolon delimited list of base64 encoding of hashes for the Base64CerData in the FragmentSigning data of an intermediate certificate. - **MetadataIntegrityMode** The mode of the transport metadata integrity check. 0 = unknown; 1 = ignore; 2 = audit; 3 = enforce -- **MetadataSignature** A base64-encoded string of the signature associated with the update metadata (specified by revision ID). -- **RawMode** Raw unparsed mode string from the SLS response. May be null if not applicable. +- **MetadataSignature** Base64 string of the signature associated with the update metadata (specified by revision id) +- **RawMode** The raw unparsed mode string from the SLS response. This field is null if not applicable. - **RawValidityWindowInDays** The raw unparsed validity window string in days of the timestamp token. This field is null if not applicable. -- **RevisionId** The revision ID for a specific piece of content. -- **RevisionNumber** The revision number for a specific piece of content. +- **RevisionId** Identifies the revision of this specific piece of content +- **RevisionNumber** Identifies the revision number of this specific piece of content - **ServiceGuid** Identifies the service to which the software distribution client is connected, Example: Windows Update or Microsoft Store - **SHA256OfLeafCerData** A base64 encoding of the hash for the Base64CerData in the FragmentSigning data of the leaf certificate. -- **SHA256OfLeafCertPublicKey** A base64 encoding of the hash of the Base64CertData in the FragmentSigning data of the leaf certificate. -- **SHA256OfTimestampToken** A base64-encoded string of hash of the timestamp token blob. -- **SignatureAlgorithm** The hash algorithm for the metadata signature. +- **SHA256OfLeafCertPublicKey** Base64 encoding of hash of the Base64CertData in the FragmentSigning data of leaf certificate. +- **SHA256OfTimestampToken** An encoded string of the timestamp token. +- **SignatureAlgorithm** Hash algorithm for the metadata signature - **SLSPrograms** A test program to which a device may have opted in. Example: Insider Fast - **StatusCode** The status code of the event. - **TimestampTokenCertThumbprint** The thumbprint of the encoded timestamp token. - **TimestampTokenId** The time this was created. It is encoded in a timestamp blob and will be zero if the token is malformed. -- **UpdateId** The update ID for a specific piece of content. +- **UpdateId** Identifier associated with the specific piece of content - **ValidityWindowInDays** The validity window that's in effect when verifying the timestamp. @@ -5169,36 +5468,36 @@ The following fields are available: - **CV** Correlation vector. - **DetectorVersion** Most recently run detector version for the current campaign. - **GlobalEventCounter** Client side counter that indicates the ordering of events sent by this user. -- **key1** UI interaction data -- **key10** UI interaction data -- **key11** UI interaction data -- **key12** UI interaction data -- **key13** UI interaction data -- **key14** UI interaction data -- **key15** UI interaction data -- **key16** UI interaction data -- **key17** UI interaction data -- **key18** UI interaction data -- **key19** UI interaction data -- **key2** UI interaction data -- **key20** UI interaction data -- **key21** UI interaction data -- **key22** UI interaction data -- **key23** UI interaction data -- **key24** UI interaction data -- **key25** UI interaction data -- **key26** UI interaction data -- **key27** UI interaction data -- **key28** UI interaction data -- **key29** UI interaction data -- **key3** UI interaction data -- **key30** UI interaction data -- **key4** UI interaction data -- **key5** UI interaction data -- **key6** UI interaction data -- **key7** UI interaction data -- **key8** UI interaction data -- **key9** UI interaction data +- **key1** UI interaction data. +- **key10** UI interaction data. +- **key11** UI interaction data. +- **key12** UI interaction data. +- **key13** UI interaction data. +- **key14** UI interaction data. +- **key15** UI interaction data. +- **key16** UI interaction data. +- **key17** UI interaction data. +- **key18** UI interaction data. +- **key19** UI interaction data. +- **key2** UI interaction data. +- **key20** UI interaction data. +- **key21** UI interaction data. +- **key22** UI interaction data. +- **key23** UI interaction data. +- **key24** UI interaction data. +- **key25** UI interaction data. +- **key26** The interaction data for the user interface. +- **key27** UI interaction data. +- **key28** UI interaction data. +- **key29** UI interaction data. +- **key3** UI interaction data. +- **key30** UI interaction data. +- **key4** UI interaction data. +- **key5** UI interaction data. +- **key6** UI interaction data. +- **key7** UI interaction data. +- **key8** UI interaction data. +- **key9** UI interaction data. - **PackageVersion** Current package version of the update notification. - **schema** UI interaction type. @@ -5301,6 +5600,16 @@ The following fields are available: - **Type** Type of package that was downloaded. +### FacilitatorTelemetry.DUDownload + +This event returns data about the download of supplemental packages critical to upgrading a device to the next version of Windows. + +The following fields are available: + +- **PackageCategoriesFailed** Lists the categories of packages that failed to download. +- **PackageCategoriesSkipped** Lists the categories of package downloads that were skipped. + + ### FacilitatorTelemetry.InitializeDU This event determines whether devices received additional or critical supplemental content during an OS upgrade. @@ -5374,7 +5683,7 @@ The following fields are available: - **Setup360Extended** Detailed information about the phase or action when the potential failure occurred. - **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. - **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors. -- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. +- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT - **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). - **State** Exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. - **TestId** ID that uniquely identifies a group of events. @@ -5516,7 +5825,7 @@ The following fields are available: - **InstanceId** Retrieves a unique identifier for each instance of a setup session. - **Operation** Facilitator’s last known operation (scan, download, etc.). - **ReportId** ID for tying together events stream side. -- **ResultCode** Result returned by setup for the entire operation. +- **ResultCode** Result returned for the entire setup operation. - **Scenario** Dynamic Update scenario (Image DU, or Setup DU). - **ScenarioId** Identifies the update scenario. - **TargetBranch** Branch of the target OS. @@ -5675,7 +5984,7 @@ The following fields are available: - **PertProb** Constant used in algorithm for randomization. -## Microsoft Store events +## Windows Store events ### Microsoft.Windows.Store.StoreActivating @@ -5947,9 +6256,9 @@ The following fields are available: - **CatalogId** The name of the product catalog from which this app was chosen. - **FailedRetry** Indicates whether the installation or update retry was successful. -- **HResult** The HResult code of the operation. -- **PFN** The Package Family Name of the app that is being installed or updated. -- **ProductId** The product ID of the app that is being updated or installed. +- **HResult** Resulting HResult error/success code of this call +- **PFN** Package Family Name of the app that being installed or updated +- **ProductId** Product Id of the app that is being updated or installed ### Microsoft.Windows.StoreAgent.Telemetry.FulfillmentInitiate @@ -6114,7 +6423,7 @@ The following fields are available: - **current** Result of currency check. - **dismOperationSucceeded** Dism uninstall operation status. -- **hResult** Failure Error code. +- **hResult** Failure error code. - **oSVersion** Build number of the device. - **paused** Indicates whether the device is paused. - **rebootRequestSucceeded** Reboot Configuration Service Provider (CSP) call success status. @@ -6259,7 +6568,7 @@ The following fields are available: - **background** Indicates whether the download is happening in the background. - **bytesRequested** Number of bytes requested for the download. - **callerName** Name of the API caller. -- **cdnUrl** The URL of the source CDN +- **cdnUrl** The URL of the source Content Distribution Network (CDN). - **costFlags** A set of flags representing network cost. - **deviceProfile** Identifies the usage or form factor (such as Desktop, Xbox, or VM). - **diceRoll** Random number used for determining if a client will use peering. @@ -6334,21 +6643,21 @@ This event collects information regarding the state of devices and drivers on th The following fields are available: - **activated** Whether the entire device manifest update is considered activated and in use. -- **analysisErrorCount** How many driver packages that could not be analyzed because errors were hit during the analysis. +- **analysisErrorCount** The number of driver packages that could not be analyzed because errors occurred during analysis. - **flightId** Unique ID for each flight. -- **missingDriverCount** How many driver packages that were delivered by the device manifest that are missing from the system. -- **missingUpdateCount** How many updates that were part of the device manifest that are missing from the system. +- **missingDriverCount** The number of driver packages delivered by the device manifest that are missing from the system. +- **missingUpdateCount** The number of updates in the device manifest that are missing from the system. - **objectId** Unique value for each diagnostics session. -- **publishedCount** How many drivers packages that were delivered by the device manifest that are published and available to be used on devices. +- **publishedCount** The number of drivers packages delivered by the device manifest that are published and available to be used on devices. - **relatedCV** Correlation vector value generated from the latest USO scan. - **scenarioId** Indicates the update scenario. - **sessionId** Unique value for each update session. -- **summary** A summary string that contains some basic information about driver packages that are part of the device manifest and any devices on the system that those driver packages match on. +- **summary** A summary string that contains basic information about driver packages that are part of the device manifest and any devices on the system that those driver packages match. - **summaryAppendError** A Boolean indicating if there was an error appending more information to the summary string. -- **truncatedDeviceCount** How many devices are missing from the summary string due to there not being enough room in the string. -- **truncatedDriverCount** How many driver packages are missing from the summary string due to there not being enough room in the string. +- **truncatedDeviceCount** The number of devices missing from the summary string because there is not enough room in the string. +- **truncatedDriverCount** The number of driver packages missing from the summary string because there is not enough room in the string. - **unpublishedCount** How many drivers packages that were delivered by the device manifest that are still unpublished and unavailable to be used on devices. -- **updateId** Unique ID for each Update. +- **updateId** The unique ID for each update. ### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentCommit @@ -6419,11 +6728,11 @@ This event collects information regarding the install phase of the new device ma The following fields are available: - **errorCode** The error code returned for the current install phase. -- **flightId** Unique ID for each flight. +- **flightId** The unique identifier for each flight (pre-release builds). - **objectId** Unique value for each diagnostics session. -- **relatedCV** Correlation vector value generated from the latest USO scan. +- **relatedCV** Correlation vector value generated from the latest scan. - **result** Outcome of the install phase of the update. -- **scenarioId** Indicates the update scenario. +- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate - **sessionId** Unique value for each update session. - **updateId** Unique ID for each Update. @@ -6434,13 +6743,13 @@ This event sends data for the start of each mode during the process of updating The following fields are available: -- **flightId** Unique ID for each flight. -- **mode** The mode that is starting. +- **flightId** The unique identifier for each flight (pre-release builds). +- **mode** Indicates the active Update Agent mode. - **objectId** Unique value for each diagnostics session. -- **relatedCV** Correlation vector value generated from the latest USO scan. -- **scenarioId** Indicates the update scenario. -- **sessionId** Unique value for each update session. -- **updateId** Unique ID for each Update. +- **relatedCV** Correlation vector value generated from the latest scan. +- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate +- **sessionId** The unique identifier for each update session. +- **updateId** The unique identifier for each Update. ### Microsoft.Windows.Update.NotificationUx.DialogNotificationToBeDisplayed @@ -6565,6 +6874,22 @@ The following fields are available: - **UtcTime** The time that dialog box was displayed, in Coordinated Universal Time. +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootReminderDialog + +This event returns information relating to the Enhanced Engaged reboot reminder dialog that was displayed. + +The following fields are available: + +- **DeviceLocalTime** The time at which the reboot reminder dialog was shown (based on the local device time settings). +- **ETag** The OneSettings versioning value. +- **ExitCode** Indicates how users exited the reboot reminder dialog box. +- **RebootVersion** The version of the DTE (Direct-to-Engaged). +- **UpdateId** The ID of the update that is waiting for reboot to finish installation. +- **UpdateRevision** The revision of the update that is waiting for reboot to finish installation. +- **UserResponseString** The option chosen by the user on the reboot dialog box. +- **UtcTime** The time at which the reboot reminder dialog was shown (in UTC). + + ### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootSecondReminderDialog This event indicates that the second reminder dialog box was displayed for Enhanced Engaged restart. @@ -6597,6 +6922,12 @@ The following fields are available: - **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedSecondRebootReminderDialog + +This event is sent when a second reminder dialog is displayed during Enhanced Engaged Reboot. + + + ### Microsoft.Windows.Update.NotificationUx.RebootScheduled Indicates when a reboot is scheduled by the system or a user for a security, quality, or feature update. @@ -6671,7 +7002,7 @@ The following fields are available: - **displayNeededReason** List of reasons for needing display. - **eventScenario** Indicates the purpose of the event (scan started, succeeded, failed, etc.). -- **filteredDeferReason** Applicable filtered reasons why reboot was postponed (such as user active, or low battery).. +- **filteredDeferReason** Applicable filtered reasons why reboot was postponed (such as user active, or low battery). - **gameModeReason** Name of the executable that caused the game mode state check to start. - **ignoredReason** List of reasons that were intentionally ignored. - **raisedDeferReason** Indicates all potential reasons for postponing restart (such as user active, or low battery). @@ -6688,20 +7019,20 @@ This event indicates that a scan for a Windows Update occurred. The following fields are available: -- **deferReason** Reason why the device could not check for updates. -- **detectionBlockingPolicy** State of update action. -- **detectionBlockreason** State of update action +- **deferReason** The reason why the device could not check for updates. +- **detectionBlockingPolicy** The Policy that blocked detection. +- **detectionBlockreason** The reason detection did not complete. - **detectionRetryMode** Indicates whether we will try to scan again. -- **errorCode** Error info +- **errorCode** The error code returned for the current process. - **eventScenario** End-to-end update session ID, or indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed. -- **flightID** The specific ID of the Windows Insider build the device is getting. -- **interactive** Indicates whether the session was user initiated. -- **networkStatus** Error info -- **revisionNumber** Update revision number. -- **scanTriggerSource** Source of the triggered scan. -- **updateId** Update ID. -- **updateScenarioType** Device ID -- **wuDeviceid** Device ID +- **flightID** The unique identifier for the flight (Windows Insider pre-release build) should be delivered to the device, if applicable. +- **interactive** Indicates whether the user initiated the session. +- **networkStatus** Indicates if the device is connected to the internet. +- **revisionNumber** The Update revision number. +- **scanTriggerSource** The source of the triggered scan. +- **updateId** The unique identifier of the Update. +- **updateScenarioType** Identifies the type of update session being performed. +- **wuDeviceid** The unique device ID used by Windows Update. ### Microsoft.Windows.Update.Orchestrator.DisplayNeeded @@ -6785,7 +7116,7 @@ This event is sent during update scan, download, or install, and indicates that The following fields are available: -- **configVersion** Escalation config version on device. +- **configVersion** The escalation configuration version on the device. - **downloadElapsedTime** Indicates how long since the download is required on device. - **downloadRiskLevel** At-risk level of download phase. - **installElapsedTime** Indicates how long since the install is required on device. @@ -6861,7 +7192,7 @@ The following fields are available: - **deferReason** Reason for install not completing. - **errorCode** The error code reppresented by a hexadecimal value. - **eventScenario** End-to-end update session ID. -- **flightID** Unique update ID +- **flightID** The ID of the Windows Insider build the device is getting. - **flightUpdate** Indicates whether the update is a Windows Insider build. - **ForcedRebootReminderSet** A boolean value that indicates if a forced reboot will happen for updates. - **installCommitfailedtime** The time it took for a reboot to happen but the upgrade failed to progress. @@ -6907,15 +7238,15 @@ This event is sent after a Windows update install completes. The following fields are available: -- **batteryLevel** Current battery capacity in mWh or percentage left. -- **bundleId** Identifier associated with the specific content bundle. +- **batteryLevel** Current battery capacity in megawatt-hours (mWh) or percentage left. +- **bundleId** The unique identifier associated with the specific content bundle. - **bundleRevisionnumber** Identifies the revision number of the content bundle. - **errorCode** The error code returned for the current phase. - **eventScenario** State of update action. -- **flightID** The flight ID of the device +- **flightID** The unique identifier for the flight (Windows Insider pre-release build) should be delivered to the device, if applicable. - **sessionType** The Windows Update session type (Interactive or Background). -- **updateScenarioType** The update session type. -- **wuDeviceid** Unique device ID used by Windows Update. +- **updateScenarioType** Identifies the type of Update session being performed. +- **wuDeviceid** The unique device identifier used by Windows Update. ### Microsoft.Windows.Update.Orchestrator.PowerMenuOptionsChanged @@ -7188,7 +7519,7 @@ The following fields are available: - **scheduledRebootTime** Time scheduled for the reboot. - **scheduledRebootTimeInUTC** Time scheduled for the reboot, in UTC. - **updateId** Identifies which update is being scheduled. -- **wuDeviceid** Unique DeviceID +- **wuDeviceid** The unique device ID used by Windows Update. ### Microsoft.Windows.Update.Ux.MusNotification.UxBrokerFirstReadyToReboot @@ -7234,21 +7565,21 @@ This event sends data specific to the CleanupSafeOsImages mitigation used for OS The following fields are available: -- **ClientId** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightId** Unique identifier for each flight. -- **InstanceId** Unique GUID that identifies each instances of setuphost.exe. +- **ClientId** The client ID used by Windows Update. +- **FlightId** The ID of each Windows Insider build the device received. +- **InstanceId** A unique device ID that identifies each update instance. - **MitigationScenario** The update scenario in which the mitigation was executed. -- **MountedImageCount** Number of mounted images. -- **MountedImageMatches** Number of mounted images that were under %systemdrive%\$Windows.~BT. -- **MountedImagesFailed** Number of mounted images under %systemdrive%\$Windows.~BT that could not be removed. -- **MountedImagesRemoved** Number of mounted images under %systemdrive%\$Windows.~BT that were successfully removed. -- **MountedImagesSkipped** Number of mounted images that were not under %systemdrive%\$Windows.~BT. -- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **MountedImageCount** The number of mounted images. +- **MountedImageMatches** The number of mounted image matches. +- **MountedImagesFailed** The number of mounted images that could not be removed. +- **MountedImagesRemoved** The number of mounted images that were successfully removed. +- **MountedImagesSkipped** The number of mounted images that were not found. +- **RelatedCV** The correlation vector value generated from the latest USO scan. - **Result** HResult of this operation. - **ScenarioId** ID indicating the mitigation scenario. - **ScenarioSupported** Indicates whether the scenario was supported. - **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each Update. +- **UpdateId** Unique ID for each Windows Update. - **WuId** Unique ID for the Windows Update client. @@ -7297,6 +7628,38 @@ The following fields are available: - **WuId** Unique ID for the Windows Update client. +## Windows Update Reserve Manager events + +### Microsoft.Windows.UpdateReserveManager.CommitPendingHardReserveAdjustment + +This event is sent when the Update Reserve Manager commits a hard reserve adjustment that was pending. + + + +### Microsoft.Windows.UpdateReserveManager.FunctionReturnedError + +This event is sent when the Update Reserve Manager returns an error from one of its internal functions. + + + +### Microsoft.Windows.UpdateReserveManager.PrepareTIForReserveInitialization + +This event is sent when the Update Reserve Manager prepares the Trusted Installer to initialize reserves on the next boot. + + + +### Microsoft.Windows.UpdateReserveManager.RemovePendingHardReserveAdjustment + +This event is sent when the Update Reserve Manager removes a pending hard reserve adjustment. + + + +### Microsoft.Windows.UpdateReserveManager.UpdatePendingHardReserveAdjustment + +This event is sent when the Update Reserve Manager needs to adjust the size of the hard reserve after the option content is installed. + + + ## Winlogon events ### Microsoft.Windows.Security.Winlogon.SetupCompleteLogon diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md index 639c8005ed..73ccbef0c7 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md @@ -9,7 +9,7 @@ ms.pagetype: security localizationpriority: high author: brianlic-msft ms.author: brianlic -ms.date: 12/13/2018 +ms.date: 02/15/2019 --- @@ -306,7 +306,7 @@ The following fields are available: - **DatasourceApplicationFile_19H1Setup** The count of the number of this particular object type present on this device. - **DatasourceApplicationFile_RS1** An ID for the system, calculated by hashing hardware identifiers. - **DatasourceApplicationFile_RS2** An ID for the system, calculated by hashing hardware identifiers. -- **DatasourceApplicationFile_RS3** The total DecisionApplicationFile objects targeting the next release of Windows on this device. +- **DatasourceApplicationFile_RS3** The count of the number of this particular object type present on this device. - **DatasourceApplicationFile_RS4** The count of the number of this particular object type present on this device. - **DatasourceApplicationFile_RS4Setup** The count of the number of this particular object type present on this device. - **DatasourceApplicationFile_RS5** The count of the number of this particular object type present on this device. @@ -317,8 +317,8 @@ The following fields are available: - **DatasourceDevicePnp_19H1** The count of the number of this particular object type present on this device. - **DatasourceDevicePnp_19H1Setup** The count of the number of this particular object type present on this device. - **DatasourceDevicePnp_RS1** The total DataSourceDevicePnp objects targeting Windows 10 version 1607 on this device. -- **DatasourceDevicePnp_RS2** The total DatasourceDevicePnp objects targeting Windows 10 version 1703 present on this device. -- **DatasourceDevicePnp_RS3** The total DatasourceDevicePnp objects targeting the next release of Windows on this device. +- **DatasourceDevicePnp_RS2** The count of the number of this particular object type present on this device. +- **DatasourceDevicePnp_RS3** The count of the number of this particular object type present on this device. - **DatasourceDevicePnp_RS3Setup** The count of the number of this particular object type present on this device. - **DatasourceDevicePnp_RS4** The count of the number of this particular object type present on this device. - **DatasourceDevicePnp_RS4Setup** The count of the number of this particular object type present on this device. @@ -331,7 +331,7 @@ The following fields are available: - **DatasourceDriverPackage_19H1Setup** The count of the number of this particular object type present on this device. - **DatasourceDriverPackage_RS1** The total DataSourceDriverPackage objects targeting Windows 10 version 1607 on this device. - **DatasourceDriverPackage_RS2** The total DataSourceDriverPackage objects targeting Windows 10, version 1703 on this device. -- **DatasourceDriverPackage_RS3** The total DatasourceDriverPackage objects targeting the next release of Windows on this device. +- **DatasourceDriverPackage_RS3** The count of the number of this particular object type present on this device. - **DatasourceDriverPackage_RS3Setup** The count of the number of this particular object type present on this device. - **DatasourceDriverPackage_RS4** The count of the number of this particular object type present on this device. - **DatasourceDriverPackage_RS4Setup** The count of the number of this particular object type present on this device. @@ -343,8 +343,8 @@ The following fields are available: - **DataSourceMatchingInfoBlock_19H1** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoBlock_19H1Setup** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoBlock_RS1** The total DataSourceMatchingInfoBlock objects targeting Windows 10 version 1607 on this device. -- **DataSourceMatchingInfoBlock_RS2** The total DataSourceMatchingInfoBlock objects targeting Windows 10 version 1703 present on this device. -- **DataSourceMatchingInfoBlock_RS3** The total DataSourceMatchingInfoBlock objects targeting the next release of Windows on this device. +- **DataSourceMatchingInfoBlock_RS2** The count of the number of this particular object type present on this device. +- **DataSourceMatchingInfoBlock_RS3** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoBlock_RS4** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoBlock_RS4Setup** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoBlock_RS5** The count of the number of this particular object type present on this device. @@ -356,7 +356,7 @@ The following fields are available: - **DataSourceMatchingInfoPassive_19H1Setup** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoPassive_RS1** The total DataSourceMatchingInfoPassive objects targeting Windows 10 version 1607 on this device. - **DataSourceMatchingInfoPassive_RS2** The count of the number of this particular object type present on this device. -- **DataSourceMatchingInfoPassive_RS3** The total DataSourceMatchingInfoPassive objects targeting the next release of Windows on this device. +- **DataSourceMatchingInfoPassive_RS3** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoPassive_RS4** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoPassive_RS4Setup** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoPassive_RS5** The count of the number of this particular object type present on this device. @@ -367,8 +367,8 @@ The following fields are available: - **DataSourceMatchingInfoPostUpgrade_19H1** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoPostUpgrade_19H1Setup** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoPostUpgrade_RS1** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1607 on this device. -- **DataSourceMatchingInfoPostUpgrade_RS2** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1703 present on this device. -- **DataSourceMatchingInfoPostUpgrade_RS3** The total DataSourceMatchingInfoPostUpgrade objects targeting the next release of Windows on this device. +- **DataSourceMatchingInfoPostUpgrade_RS2** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1703 on this device. +- **DataSourceMatchingInfoPostUpgrade_RS3** The total DataSourceMatchingInfoPostUpgrade objects targeting Windows 10 version 1709 on this device. - **DataSourceMatchingInfoPostUpgrade_RS4** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoPostUpgrade_RS4Setup** The count of the number of this particular object type present on this device. - **DataSourceMatchingInfoPostUpgrade_RS5** The count of the number of this particular object type present on this device. @@ -380,7 +380,7 @@ The following fields are available: - **DatasourceSystemBios_19H1Setup** The count of the number of this particular object type present on this device. - **DatasourceSystemBios_RS1** The total DatasourceSystemBios objects targeting Windows 10 version 1607 present on this device. - **DatasourceSystemBios_RS2** The total DatasourceSystemBios objects targeting Windows 10 version 1703 present on this device. -- **DatasourceSystemBios_RS3** The total DatasourceSystemBios objects targeting the next release of Windows on this device. +- **DatasourceSystemBios_RS3** The total DatasourceSystemBios objects targeting Windows 10 version 1709 present on this device. - **DatasourceSystemBios_RS3Setup** The count of the number of this particular object type present on this device. - **DatasourceSystemBios_RS4** The count of the number of this particular object type present on this device. - **DatasourceSystemBios_RS4Setup** The count of the number of this particular object type present on this device. @@ -393,7 +393,7 @@ The following fields are available: - **DecisionApplicationFile_19H1Setup** The count of the number of this particular object type present on this device. - **DecisionApplicationFile_RS1** The count of the number of this particular object type present on this device. - **DecisionApplicationFile_RS2** The count of the number of this particular object type present on this device. -- **DecisionApplicationFile_RS3** The total DecisionApplicationFile objects targeting the next release of Windows on this device. +- **DecisionApplicationFile_RS3** The count of the number of this particular object type present on this device. - **DecisionApplicationFile_RS4** The count of the number of this particular object type present on this device. - **DecisionApplicationFile_RS4Setup** The count of the number of this particular object type present on this device. - **DecisionApplicationFile_RS5** The count of the number of this particular object type present on this device. @@ -404,8 +404,8 @@ The following fields are available: - **DecisionDevicePnp_19H1** The count of the number of this particular object type present on this device. - **DecisionDevicePnp_19H1Setup** The count of the number of this particular object type present on this device. - **DecisionDevicePnp_RS1** The total DecisionDevicePnp objects targeting Windows 10 version 1607 on this device. -- **DecisionDevicePnp_RS2** The total DecisionDevicePnp objects targeting Windows 10 version 1703 present on this device. -- **DecisionDevicePnp_RS3** The total DecisionDevicePnp objects targeting the next release of Windows on this device. +- **DecisionDevicePnp_RS2** The count of the number of this particular object type present on this device. +- **DecisionDevicePnp_RS3** The count of the number of this particular object type present on this device. - **DecisionDevicePnp_RS3Setup** The count of the number of this particular object type present on this device. - **DecisionDevicePnp_RS4** The count of the number of this particular object type present on this device. - **DecisionDevicePnp_RS4Setup** The count of the number of this particular object type present on this device. @@ -418,7 +418,7 @@ The following fields are available: - **DecisionDriverPackage_19H1Setup** The count of the number of this particular object type present on this device. - **DecisionDriverPackage_RS1** The total DecisionDriverPackage objects targeting Windows 10 version 1607 on this device. - **DecisionDriverPackage_RS2** The count of the number of this particular object type present on this device. -- **DecisionDriverPackage_RS3** The total DecisionDriverPackage objects targeting the next release of Windows on this device. +- **DecisionDriverPackage_RS3** The count of the number of this particular object type present on this device. - **DecisionDriverPackage_RS3Setup** The count of the number of this particular object type present on this device. - **DecisionDriverPackage_RS4** The count of the number of this particular object type present on this device. - **DecisionDriverPackage_RS4Setup** The count of the number of this particular object type present on this device. @@ -431,8 +431,8 @@ The following fields are available: - **DecisionMatchingInfoBlock_19H1Setup** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoBlock_RS1** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1607 present on this device. - **DecisionMatchingInfoBlock_RS2** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1703 present on this device. -- **DecisionMatchingInfoBlock_RS3** The total DecisionMatchingInfoBlock objects targeting the next release of Windows on this device. -- **DecisionMatchingInfoBlock_RS4** The count of the number of this particular object type present on this device. +- **DecisionMatchingInfoBlock_RS3** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1709 present on this device. +- **DecisionMatchingInfoBlock_RS4** The total DecisionMatchingInfoBlock objects targeting Windows 10 version 1803 present on this device. - **DecisionMatchingInfoBlock_RS4Setup** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoBlock_RS5** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoBlock_RS5Setup** The count of the number of this particular object type present on this device. @@ -442,8 +442,8 @@ The following fields are available: - **DecisionMatchingInfoPassive_19H1** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoPassive_19H1Setup** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoPassive_RS1** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1607 on this device. -- **DecisionMatchingInfoPassive_RS2** The count of the number of this particular object type present on this device. -- **DecisionMatchingInfoPassive_RS3** The total DataSourceMatchingInfoPassive objects targeting the next release of Windows on this device. +- **DecisionMatchingInfoPassive_RS2** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1703 on this device. +- **DecisionMatchingInfoPassive_RS3** The total DecisionMatchingInfoPassive objects targeting Windows 10 version 1803 on this device. - **DecisionMatchingInfoPassive_RS4** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoPassive_RS4Setup** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoPassive_RS5** The count of the number of this particular object type present on this device. @@ -454,8 +454,8 @@ The following fields are available: - **DecisionMatchingInfoPostUpgrade_19H1** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoPostUpgrade_19H1Setup** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoPostUpgrade_RS1** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1607 on this device. -- **DecisionMatchingInfoPostUpgrade_RS2** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1703 present on this device. -- **DecisionMatchingInfoPostUpgrade_RS3** The total DecisionMatchingInfoPostUpgrade objects targeting the next release of Windows on this device. +- **DecisionMatchingInfoPostUpgrade_RS2** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1703 on this device. +- **DecisionMatchingInfoPostUpgrade_RS3** The total DecisionMatchingInfoPostUpgrade objects targeting Windows 10 version 1709 on this device. - **DecisionMatchingInfoPostUpgrade_RS4** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoPostUpgrade_RS4Setup** The count of the number of this particular object type present on this device. - **DecisionMatchingInfoPostUpgrade_RS5** The count of the number of this particular object type present on this device. @@ -467,8 +467,8 @@ The following fields are available: - **DecisionMediaCenter_19H1Setup** The total DecisionMediaCenter objects targeting the next release of Windows on this device. - **DecisionMediaCenter_RS1** The total DecisionMediaCenter objects targeting Windows 10 version 1607 present on this device. - **DecisionMediaCenter_RS2** The total DecisionMediaCenter objects targeting Windows 10 version 1703 present on this device. -- **DecisionMediaCenter_RS3** The total DecisionMediaCenter objects targeting the next release of Windows on this device. -- **DecisionMediaCenter_RS4** The count of the number of this particular object type present on this device. +- **DecisionMediaCenter_RS3** The total DecisionMediaCenter objects targeting Windows 10 version 1709 present on this device. +- **DecisionMediaCenter_RS4** The total DecisionMediaCenter objects targeting Windows 10 version 1803 present on this device. - **DecisionMediaCenter_RS4Setup** The count of the number of this particular object type present on this device. - **DecisionMediaCenter_RS5** The count of the number of this particular object type present on this device. - **DecisionMediaCenter_RS5Setup** The count of the number of this particular object type present on this device. @@ -478,8 +478,8 @@ The following fields are available: - **DecisionSystemBios_19H1** The count of the number of this particular object type present on this device. - **DecisionSystemBios_19H1Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. - **DecisionSystemBios_RS1** The total DecisionSystemBios objects targeting Windows 10 version 1607 on this device. -- **DecisionSystemBios_RS2** The total DecisionSystemBios objects targeting Windows 10 version 1703 present on this device. -- **DecisionSystemBios_RS3** The total DecisionSystemBios objects targeting the next release of Windows on this device. +- **DecisionSystemBios_RS2** The total DecisionSystemBios objects targeting Windows 10 version 1703 on this device. +- **DecisionSystemBios_RS3** The total DecisionSystemBios objects targeting Windows 10 version 1709 on this device. - **DecisionSystemBios_RS3Setup** The count of the number of this particular object type present on this device. - **DecisionSystemBios_RS4** The total DecisionSystemBios objects targeting Windows 10 version, 1803 present on this device. - **DecisionSystemBios_RS4Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. @@ -487,6 +487,7 @@ The following fields are available: - **DecisionSystemBios_RS5Setup** The total DecisionSystemBios objects targeting the next release of Windows on this device. - **DecisionSystemBios_TH1** The count of the number of this particular object type present on this device. - **DecisionSystemBios_TH2** The count of the number of this particular object type present on this device. +- **DecisionSystemProcessor_RS2** The count of the number of this particular object type present on this device. - **DecisionTest_RS1** An ID for the system, calculated by hashing hardware identifiers. - **InventoryApplicationFile** The count of the number of this particular object type present on this device. - **InventoryDeviceContainer** A count of device container objects in cache. @@ -496,25 +497,27 @@ The following fields are available: - **InventoryLanguagePack** The count of the number of this particular object type present on this device. - **InventoryMediaCenter** The count of the number of this particular object type present on this device. - **InventorySystemBios** The count of the number of this particular object type present on this device. +- **InventorySystemMachine** The count of the number of this particular object type present on this device. +- **InventorySystemProcessor** The count of the number of this particular object type present on this device. - **InventoryTest** The count of the number of this particular object type present on this device. - **InventoryUplevelDriverPackage** The count of the number of this particular object type present on this device. - **PCFP** The count of the number of this particular object type present on this device. - **SystemMemory** The count of the number of this particular object type present on this device. - **SystemProcessorCompareExchange** The count of the number of this particular object type present on this device. - **SystemProcessorLahfSahf** The count of the number of this particular object type present on this device. -- **SystemProcessorNx** The count of the number of this particular object type present on this device. -- **SystemProcessorPrefetchW** The count of the number of this particular object type present on this device. -- **SystemProcessorSse2** The count of the number of this particular object type present on this device. +- **SystemProcessorNx** The total number of objects of this type present on this device. +- **SystemProcessorPrefetchW** The total number of objects of this type present on this device. +- **SystemProcessorSse2** The total number of objects of this type present on this device. - **SystemTouch** The count of the number of this particular object type present on this device. -- **SystemWim** The count of the number of this particular object type present on this device. +- **SystemWim** The total number of objects of this type present on this device. - **SystemWindowsActivationStatus** The count of the number of this particular object type present on this device. -- **SystemWlan** The count of the number of this particular object type present on this device. +- **SystemWlan** The total number of objects of this type present on this device. - **Wmdrm_19ASetup** The count of the number of this particular object type present on this device. - **Wmdrm_19H1** The count of the number of this particular object type present on this device. - **Wmdrm_19H1Setup** The total Wmdrm objects targeting the next release of Windows on this device. - **Wmdrm_RS1** An ID for the system, calculated by hashing hardware identifiers. -- **Wmdrm_RS2** The total Wmdrm objects targeting Windows 10 version 1703 present on this device. -- **Wmdrm_RS3** The total Wmdrm objects targeting the next release of Windows on this device. +- **Wmdrm_RS2** An ID for the system, calculated by hashing hardware identifiers. +- **Wmdrm_RS3** An ID for the system, calculated by hashing hardware identifiers. - **Wmdrm_RS4** The total Wmdrm objects targeting Windows 10, version 1803 present on this device. - **Wmdrm_RS4Setup** The count of the number of this particular object type present on this device. - **Wmdrm_RS5** The count of the number of this particular object type present on this device. @@ -573,6 +576,10 @@ The following fields are available: - **ActiveNetworkConnection** Indicates whether the device is an active network device. - **AppraiserVersion** The version of the appraiser file generating the events. +- **CosDeviceRating** An enumeration that indicates if there is a driver on the target operating system. +- **CosDeviceSolution** An enumeration that indicates how a driver on the target operating system is available. +- **CosDeviceSolutionUrl** Microsoft.Windows.Appraiser.General.DatasourceDevicePnpAdd . Empty string +- **CosPopulatedFromId** The expected uplevel driver matching ID based on driver coverage data. - **IsBootCritical** Indicates whether the device boot is critical. - **UplevelInboxDriver** Indicates whether there is a driver uplevel for this device. - **WuDriverCoverage** Indicates whether there is a driver uplevel for this device, according to Windows Update. @@ -870,6 +877,7 @@ The following fields are available: - **DriverBlockOverridden** Does the driver package have an SDB block that blocks it from migrating, but that block has been overridden? - **DriverIsDeviceBlocked** Was the driver package was blocked because of a device block? - **DriverIsDriverBlocked** Is the driver package blocked because of a driver block? +- **DriverIsTroubleshooterBlocked** Indicates whether the driver package is blocked because of a troubleshooter block. - **DriverShouldNotMigrate** Should the driver package be migrated during upgrade? - **SdbDriverBlockOverridden** Does the driver package have an SDB block that blocks it from migrating, but that block has been overridden? @@ -937,7 +945,7 @@ The following fields are available: ### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveAdd -This event sends compatibility decision data about non-blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up-to-date. +This event sends compatibility decision data about non-blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up to date. This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). @@ -1320,6 +1328,7 @@ The following fields are available: - **AppraiserBranch** The source branch in which the currently running version of Appraiser was built. - **AppraiserProcess** The name of the process that launched Appraiser. - **AppraiserVersion** The version of the Appraiser file generating the events. +- **CensusId** A unique hardware identifier. - **Context** Indicates what mode Appraiser is running in. Example: Setup or Telemetry. - **PCFP** An ID for the system calculated by hashing hardware identifiers. - **Subcontext** Indicates what categories of incompatibilities appraiser is scanning for. Can be N/A, Resolve, or a semicolon-delimited list that can include App, Dev, Sys, Gat, or Rescan. @@ -1780,7 +1789,7 @@ The following fields are available: - **AppraiserTaskExitCode** The Appraiser task exist code. - **AppraiserTaskLastRun** The last runtime for the Appraiser task. - **CensusVersion** The version of Census that generated the current data for this device. -- **IEVersion** IE version running on the device. +- **IEVersion** The version of Internet Explorer that is running on the device. ### Census.Battery @@ -1989,18 +1998,14 @@ The following fields are available: - **AdvertisingId** Current state of the advertising ID setting. - **AppDiagnostics** Current state of the app diagnostics setting. - **Appointments** Current state of the calendar setting. -- **AppointmentsSystem** Current state of the calendar setting. - **Bluetooth** Current state of the Bluetooth capability setting. - **BluetoothSync** Current state of the Bluetooth sync capability setting. - **BroadFileSystemAccess** Current state of the broad file system access setting. - **CellularData** Current state of the cellular data capability setting. - **Chat** Current state of the chat setting. -- **ChatSystem** Current state of the chat setting. - **Contacts** Current state of the contacts setting. -- **ContactsSystem** Current state of the Contacts setting. - **DocumentsLibrary** Current state of the documents library setting. - **Email** Current state of the email setting. -- **EmailSystem** Current state of the email setting. - **FindMyDevice** Current state of the "find my device" setting. - **GazeInput** Current state of the gaze input setting. - **HumanInterfaceDevice** Current state of the human interface device setting. @@ -2012,7 +2017,6 @@ The following fields are available: - **Microphone** Current state of the microphone setting. - **PhoneCall** Current state of the phone call setting. - **PhoneCallHistory** Current state of the call history setting. -- **PhoneCallHistorySystem** Current state of the call history setting. - **PicturesLibrary** Current state of the pictures library setting. - **Radios** Current state of the radios setting. - **SensorsCustom** Current state of the custom sensor setting. @@ -2022,7 +2026,6 @@ The following fields are available: - **USB** Current state of the USB setting. - **UserAccountInformation** Current state of the account information setting. - **UserDataTasks** Current state of the tasks setting. -- **UserDataTasksSystem** Current state of the tasks setting. - **UserNotificationListener** Current state of the notifications setting. - **VideosLibrary** Current state of the videos library setting. - **Webcam** Current state of the camera setting. @@ -2035,7 +2038,7 @@ Provides information on several important data points about Processor settings The following fields are available: -- **KvaShadow** Microcode info of the processor. +- **KvaShadow** This is the micro code information of the processor. - **MMSettingOverride** Microcode setting of the processor. - **MMSettingOverrideMask** Microcode setting override of the processor. - **PreviousUpdateRevision** Previous microcode revision @@ -2046,10 +2049,10 @@ The following fields are available: - **ProcessorManufacturer** Name of the processor manufacturer. - **ProcessorModel** Name of the processor model. - **ProcessorPhysicalCores** Number of physical cores in the processor. -- **ProcessorUpdateRevision** Microcode revision +- **ProcessorUpdateRevision** The microcode revision. - **ProcessorUpdateStatus** Enum value that represents the processor microcode load status - **SocketCount** Count of CPU sockets. -- **SpeculationControl** If the system has enabled protections needed to validate the speculation control vulnerability. +- **SpeculationControl** Indicates whether the system has enabled protections needed to validate the speculation control vulnerability. ### Census.Security @@ -2097,6 +2100,7 @@ The following fields are available: - **PrimaryDiskTotalCapacity** Retrieves the amount of disk space on the primary disk of the device in MB. - **PrimaryDiskType** Retrieves an enumerator value of type STORAGE_BUS_TYPE that indicates the type of bus to which the device is connected. This should be used to interpret the raw device properties at the end of this structure (if any). +- **StorageReservePassedPolicy** Indicates whether the Storage Reserve policy, which ensures that updates have enough disk space and customers are on the latest OS, is enabled on this device. - **SystemVolumeTotalCapacity** Retrieves the size of the partition that the System volume is installed on in MB. @@ -2159,18 +2163,14 @@ The following fields are available: - **AdvertisingId** Current state of the advertising ID setting. - **AppDiagnostics** Current state of the app diagnostics setting. - **Appointments** Current state of the calendar setting. -- **AppointmentsSystem** Current state of the calendar setting. - **Bluetooth** Current state of the Bluetooth capability setting. - **BluetoothSync** Current state of the Bluetooth sync capability setting. - **BroadFileSystemAccess** Current state of the broad file system access setting. - **CellularData** Current state of the cellular data capability setting. - **Chat** Current state of the chat setting. -- **ChatSystem** Current state of the chat setting. - **Contacts** Current state of the contacts setting. -- **ContactsSystem** Current state of the contacts setting. - **DocumentsLibrary** Current state of the documents library setting. - **Email** Current state of the email setting. -- **EmailSystem** Current state of the email setting. - **GazeInput** Current state of the gaze input setting. - **HumanInterfaceDevice** Current state of the human interface device setting. - **InkTypeImprovement** Current state of the improve inking and typing setting. @@ -2182,7 +2182,6 @@ The following fields are available: - **Microphone** Current state of the microphone setting. - **PhoneCall** Current state of the phone call setting. - **PhoneCallHistory** Current state of the call history setting. -- **PhoneCallHistorySystem** Current state of the call history setting. - **PicturesLibrary** Current state of the pictures library setting. - **Radios** Current state of the radios setting. - **SensorsCustom** Current state of the custom sensor setting. @@ -2192,7 +2191,6 @@ The following fields are available: - **USB** Current state of the USB setting. - **UserAccountInformation** Current state of the account information setting. - **UserDataTasks** Current state of the tasks setting. -- **UserDataTasksSystem** Current state of the tasks setting. - **UserNotificationListener** Current state of the notifications setting. - **VideosLibrary** Current state of the videos library setting. - **Webcam** Current state of the camera setting. @@ -2542,6 +2540,42 @@ The following fields are available: - **transactionCanceled** Indicates whether the uninstall was cancelled. +### CbsServicingProvider.CbsQualityUpdateInstall + +This event reports on the performance and reliability results of installing Servicing content from Windows Update to keep Windows up to date. + +The following fields are available: + +- **buildVersion** The build version number of the update package. +- **clientId** The name of the application requesting the optional content. +- **corruptionHistoryFlags** A bitmask of the types of component store corruption that have caused update failures on the device. +- **corruptionType** An enumeration listing the type of data corruption responsible for the current update failure. +- **currentStateEnd** The final state of the package after the operation has completed. +- **doqTimeSeconds** The time in seconds spent updating drivers. +- **executeTimeSeconds** The number of seconds required to execute the install. +- **failureDetails** The driver or installer that caused the update to fail. +- **failureSourceEnd** An enumeration indicating at what phase of the update a failure occurred. +- **hrStatusEnd** The return code of the install operation. +- **initiatedOffline** A true or false value indicating whether the package was installed into an offline Windows Imaging Format (WIM) file. +- **majorVersion** The major version number of the update package. +- **minorVersion** The minor version number of the update package. +- **originalState** The starting state of the package. +- **overallTimeSeconds** The time (in seconds) to perform the overall servicing operation. +- **planTimeSeconds** The time in seconds required to plan the update operations. +- **poqTimeSeconds** The time in seconds processing file and registry operations. +- **postRebootTimeSeconds** The time (in seconds) to do startup processing for the update. +- **preRebootTimeSeconds** The time (in seconds) between execution of the installation and the reboot. +- **primitiveExecutionContext** An enumeration indicating at what phase of shutdown or startup the update was installed. +- **rebootCount** The number of reboots required to install the update. +- **rebootTimeSeconds** The time (in seconds) before startup processing begins for the update. +- **resolveTimeSeconds** The time in seconds required to resolve the packages that are part of the update. +- **revisionVersion** The revision version number of the update package. +- **rptTimeSeconds** The time in seconds spent executing installer plugins. +- **shutdownTimeSeconds** The time (in seconds) required to do shutdown processing for the update. +- **stackRevision** The revision number of the servicing stack. +- **stageTimeSeconds** The time (in seconds) required to stage all files that are part of the update. + + ## Deployment extensions ### DeploymentTelemetry.Deployment_End @@ -2609,7 +2643,7 @@ The following fields are available: - **AcDcStateAtLastShutdown** Identifies if the device was on battery or plugged in. - **BatteryLevelAtLastShutdown** The last recorded battery level. - **BatteryPercentageAtLastShutdown** The battery percentage at the last shutdown. -- **CrashDumpEnabled** Are crash dumps enabled? +- **CrashDumpEnabled** Indicates whether crash dumps are enabled. - **CumulativeCrashCount** Cumulative count of operating system crashes since the BootId reset. - **CurrentBootId** BootId at the time the abnormal shutdown event was being reported. - **Firmwaredata->ResetReasonEmbeddedController** The reset reason that was supplied by the firmware. @@ -2630,36 +2664,36 @@ The following fields are available: - **LastBugCheckVersion** The version of the information struct written during the crash. - **LastSuccessfullyShutdownBootId** BootId of the last fully successful shutdown. - **LongPowerButtonPressDetected** Identifies if the user was pressing and holding power button. -- **OOBEInProgress** Identifies if OOBE is running. +- **OOBEInProgress** Identifies if the Out-Of-Box-Experience is running. - **OSSetupInProgress** Identifies if the operating system setup is running. -- **PowerButtonCumulativePressCount** How many times has the power button been pressed? -- **PowerButtonCumulativeReleaseCount** How many times has the power button been released? -- **PowerButtonErrorCount** Indicates the number of times there was an error attempting to record power button metrics. -- **PowerButtonLastPressBootId** BootId of the last time the power button was pressed. -- **PowerButtonLastPressTime** Date and time of the last time the power button was pressed. -- **PowerButtonLastReleaseBootId** BootId of the last time the power button was released. -- **PowerButtonLastReleaseTime** Date and time of the last time the power button was released. +- **PowerButtonCumulativePressCount** Indicates the number of times the power button has been pressed ("pressed" not to be confused with "released"). +- **PowerButtonCumulativeReleaseCount** Indicates the number of times the power button has been released ("released" not to be confused with "pressed"). +- **PowerButtonErrorCount** Indicates the number of times there was an error attempting to record Power Button metrics (e.g.: due to a failure to lock/update the bootstat file). +- **PowerButtonLastPressBootId** BootId of the last time the Power Button was detected to have been pressed ("pressed" not to be confused with "released"). +- **PowerButtonLastPressTime** Date/time of the last time the Power Button was pressed ("pressed" not to be confused with "released"). +- **PowerButtonLastReleaseBootId** The Boot ID of the last time the Power Button was released ("released" not to be confused with "pressed"). +- **PowerButtonLastReleaseTime** The date and time the Power Button was most recently released ("released" not to be confused with "pressed"). - **PowerButtonPressCurrentCsPhase** Represents the phase of Connected Standby exit when the power button was pressed. - **PowerButtonPressIsShutdownInProgress** Indicates whether a system shutdown was in progress at the last time the power button was pressed. -- **PowerButtonPressLastPowerWatchdogStage** Progress while the monitor is being turned on. +- **PowerButtonPressLastPowerWatchdogStage** The last stage completed when the Power Button was most recently pressed. - **PowerButtonPressPowerWatchdogArmed** Indicates whether or not the watchdog for the monitor was active at the time of the last power button press. - **ShutdownDeviceType** Identifies who triggered a shutdown. Is it because of battery, thermal zones, or through a Kernel API. - **SleepCheckpoint** Provides the last checkpoint when there is a failure during a sleep transition. - **SleepCheckpointSource** Indicates whether the source is the EFI variable or bootstat file. - **SleepCheckpointStatus** Indicates whether the checkpoint information is valid. - **StaleBootStatData** Identifies if the data from bootstat is stale. -- **TransitionInfoBootId** BootId of the captured transition info. -- **TransitionInfoCSCount** l number of times the system transitioned from Connected Standby mode. -- **TransitionInfoCSEntryReason** Indicates the reason the device last entered Connected Standby mode. -- **TransitionInfoCSExitReason** Indicates the reason the device last exited Connected Standby mode. -- **TransitionInfoCSInProgress** At the time the last marker was saved, the system was in or entering Connected Standby mode. -- **TransitionInfoLastReferenceTimeChecksum** The checksum of TransitionInfoLastReferenceTimestamp, +- **TransitionInfoBootId** The Boot ID of the captured transition information. +- **TransitionInfoCSCount** The total number of times the system transitioned from "Connected Standby" mode to "On" when the last marker was saved. +- **TransitionInfoCSEntryReason** Indicates the reason the device last entered "Connected Standby" mode ("entered" not to be confused with "exited"). +- **TransitionInfoCSExitReason** Indicates the reason the device last exited "Connected Standby" mode ("exited" not to be confused with "entered"). +- **TransitionInfoCSInProgress** Indicates whether the system was in or entering Connected Standby mode when the last marker was saved. +- **TransitionInfoLastReferenceTimeChecksum** The checksum of TransitionInfoLastReferenceTimestamp. - **TransitionInfoLastReferenceTimestamp** The date and time that the marker was last saved. - **TransitionInfoLidState** Describes the state of the laptop lid. -- **TransitionInfoPowerButtonTimestamp** The date and time of the last time the power button was pressed. -- **TransitionInfoSleepInProgress** At the time the last marker was saved, the system was in or entering sleep mode. -- **TransitionInfoSleepTranstionsToOn** Total number of times the device transitioned from sleep mode. -- **TransitionInfoSystemRunning** At the time the last marker was saved, the device was running. +- **TransitionInfoPowerButtonTimestamp** The most recent date and time when the Power Button was pressed (collected via a different mechanism than PowerButtonLastPressTime). +- **TransitionInfoSleepInProgress** Indicates whether the system was in or entering Sleep mode when the last marker was saved. +- **TransitionInfoSleepTranstionsToOn** The total number of times the system transitioned from Sleep mode to on, when the last marker was saved. +- **TransitionInfoSystemRunning** Indicates whether the system was running when the last marker was saved. - **TransitionInfoSystemShutdownInProgress** Indicates whether a device shutdown was in progress when the power button was pressed. - **TransitionInfoUserShutdownInProgress** Indicates whether a user shutdown was in progress when the power button was pressed. - **TransitionLatestCheckpointId** Represents a unique identifier for a checkpoint during the device state transition. @@ -3369,6 +3403,7 @@ The following fields are available: - **GPUVendorID** The GPU vendor ID. - **InterfaceId** The GPU interface ID. - **IsDisplayDevice** Does the GPU have displaying capabilities? +- **IsHwSchSupported** Indicates whether the adapter supports hardware scheduling. - **IsHybridDiscrete** Does the GPU have discrete GPU capabilities in a hybrid device? - **IsHybridIntegrated** Does the GPU have integrated GPU capabilities in a hybrid device? - **IsLDA** Is the GPU comprised of Linked Display Adapters? @@ -3382,6 +3417,7 @@ The following fields are available: - **IsSoftwareDevice** Is this a software implementation of the GPU? - **KMDFilePath** The file path to the location of the Display Kernel Mode Driver in the Driver Store. - **MeasureEnabled** Is the device listening to MICROSOFT_KEYWORD_MEASURES? +- **MsHybridDiscrete** Indicates whether the adapter is a discrete adapter in a hybrid configuration. - **NumVidPnSources** The number of supported display output sources. - **NumVidPnTargets** The number of supported display output targets. - **SharedSystemMemoryB** The amount of system memory shared by GPU and CPU (in bytes). @@ -3393,6 +3429,81 @@ The following fields are available: - **WDDMVersion** The Windows Display Driver Model version. +## Failover Clustering events + +### Microsoft.Windows.Server.FailoverClusteringCritical.ClusterSummary2 + +This event returns information about how many resources and of what type are in the server cluster. This data is collected to keep Windows Server safe, secure, and up to date. The data includes information about whether hardware is configured correctly, if the software is patched correctly, and assists in preventing crashes by attributing issues (like fatal errors) to workloads and system configurations. + +The following fields are available: + +- **autoAssignSite** The cluster parameter: auto site. +- **autoBalancerLevel** The cluster parameter: auto balancer level. +- **autoBalancerMode** The cluster parameter: auto balancer mode. +- **blockCacheSize** The configured size of the block cache. +- **ClusterAdConfiguration** The ad configuration of the cluster. +- **clusterAdType** The cluster parameter: mgmt_point_type. +- **clusterDumpPolicy** The cluster configured dump policy. +- **clusterFunctionalLevel** The current cluster functional level. +- **clusterGuid** The unique identifier for the cluster. +- **clusterWitnessType** The witness type the cluster is configured for. +- **countNodesInSite** The number of nodes in the cluster. +- **crossSiteDelay** The cluster parameter: CrossSiteDelay. +- **crossSiteThreshold** The cluster parameter: CrossSiteThreshold. +- **crossSubnetDelay** The cluster parameter: CrossSubnetDelay. +- **crossSubnetThreshold** The cluster parameter: CrossSubnetThreshold. +- **csvCompatibleFilters** The cluster parameter: ClusterCsvCompatibleFilters. +- **csvIncompatibleFilters** The cluster parameter: ClusterCsvIncompatibleFilters. +- **csvResourceCount** The number of resources in the cluster. +- **currentNodeSite** The name configured for the current site for the cluster. +- **dasModeBusType** The direct storage bus type of the storage spaces. +- **downLevelNodeCount** The number of nodes in the cluster that are running down-level. +- **drainOnShutdown** Specifies whether a node should be drained when it is shut down. +- **dynamicQuorumEnabled** Specifies whether dynamic Quorum has been enabled. +- **enforcedAntiAffinity** The cluster parameter: enforced anti affinity. +- **genAppNames** The win32 service name of a clustered service. +- **genSvcNames** The command line of a clustered genapp. +- **hangRecoveryAction** The cluster parameter: hang recovery action. +- **hangTimeOut** Specifies the “hang time out” parameter for the cluster. +- **isCalabria** Specifies whether storage spaces direct is enabled. +- **isMixedMode** Identifies if the cluster is running with different version of OS for nodes. +- **isRunningDownLevel** Identifies if the current node is running down-level. +- **logLevel** Specifies the granularity that is logged in the cluster log. +- **logSize** Specifies the size of the cluster log. +- **lowerQuorumPriorityNodeId** The cluster parameter: lower quorum priority node ID. +- **minNeverPreempt** The cluster parameter: minimum never preempt. +- **minPreemptor** The cluster parameter: minimum preemptor priority. +- **netftIpsecEnabled** The parameter: netftIpsecEnabled. +- **NodeCount** The number of nodes in the cluster. +- **nodeId** The current node number in the cluster. +- **nodeResourceCounts** Specifies the number of node resources. +- **nodeResourceOnlineCounts** Specifies the number of node resources that are online. +- **numberOfSites** The number of different sites. +- **numNodesInNoSite** The number of nodes not belonging to a site. +- **plumbAllCrossSubnetRoutes** The cluster parameter: plumb all cross subnet routes. +- **preferredSite** The preferred site location. +- **privateCloudWitness** Specifies whether a private cloud witness exists for this cluster. +- **quarantineDuration** The quarantine duration. +- **quarantineThreshold** The quarantine threshold. +- **quorumArbitrationTimeout** In the event of an arbitration event, this specifies the quorum timeout period. +- **resiliencyLevel** Specifies the level of resiliency. +- **resourceCounts** Specifies the number of resources. +- **resourceTypeCounts** Specifies the number of resource types in the cluster. +- **resourceTypes** Data representative of each resource type. +- **resourceTypesPath** Data representative of the DLL path for each resource type. +- **sameSubnetDelay** The cluster parameter: same subnet delay. +- **sameSubnetThreshold** The cluster parameter: same subnet threshold. +- **secondsInMixedMode** The amount of time (in seconds) that the cluster has been in mixed mode (nodes with different operating system versions in the same cluster). +- **securityLevel** The cluster parameter: security level. +- **securityLevelForStorage** The cluster parameter: security level for storage. +- **sharedVolumeBlockCacheSize** Specifies the block cache size for shared for shared volumes. +- **shutdownTimeoutMinutes** Specifies the amount of time it takes to time out when shutting down. +- **upNodeCount** Specifies the number of nodes that are up (online). +- **useClientAccessNetworksForCsv** The cluster parameter: use client access networks for CSV. +- **vmIsolationTime** The cluster parameter: VM isolation time. +- **witnessDatabaseWriteTimeout** Specifies the timeout period for writing to the quorum witness database. + + ## Fault Reporting events ### Microsoft.Windows.FaultReporting.AppCrashEvent @@ -3409,7 +3520,6 @@ The following fields are available: - **ExceptionOffset** The address where the exception had occurred. - **Flags** Flags indicating how reporting is done. For example, queue the report, do not offer JIT debugging, or do not terminate the process after reporting. - **FriendlyAppName** The description of the app that has crashed, if different from the AppName. Otherwise, the process name. -- **IsCrashFatal** (Deprecated) True/False to indicate whether the crash resulted in process termination. - **IsFatal** True/False to indicate whether the crash resulted in process termination. - **ModName** Exception module name (e.g. bar.dll). - **ModTimeStamp** The date/time stamp of the module. @@ -3425,6 +3535,20 @@ The following fields are available: - **TargetAsId** The sequence number for the hanging process. +## Feature update events + +### Microsoft.Windows.Upgrade.Uninstall.UninstallFinalizedAndRebootTriggered + +This event indicates that the uninstall was properly configured and that a system reboot was initiated. + + + +### Microsoft.Windows.Upgrade.Uninstall.UninstallGoBackButtonClicked + +This event sends basic metadata about the starting point of uninstalling a feature update, which helps ensure customers can safely revert to a well-known state if the update caused any problems. + + + ## Hang Reporting events ### Microsoft.Windows.HangReporting.AppHangEvent @@ -3711,6 +3835,8 @@ This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedevic The following fields are available: +- **audio.captureDriver** Audio device capture driver. Example: hdaudio.inf:db04a16ce4e8d6ee:HdAudModel:10.0.14887.1000:hdaudio\func_01 +- **audio.renderDriver** Audio device render driver. Example: hdaudio.inf:db04a16ce4e8d6ee:HdAudModel:10.0.14889.1001:hdaudio\func_01 - **Audio_CaptureDriver** The Audio device capture driver endpoint. - **Audio_RenderDriver** The Audio device render driver endpoint. - **InventoryVersion** The version of the inventory file generating the events. @@ -3748,34 +3874,35 @@ The following fields are available: - **BusReportedDescription** The description of the device reported by the bux. - **Class** The device setup class of the driver loaded for the device. -- **ClassGuid** The device class GUID from the driver package -- **COMPID** The device setup class guid of the driver loaded for the device. -- **ContainerId** The list of compat ids for the device. -- **Description** System-supplied GUID that uniquely groups the functional devices associated with a single-function or multifunction device installed in the computer. -- **DeviceState** The device description. -- **DriverId** DeviceState is a bitmask of the following: DEVICE_IS_CONNECTED 0x0001 (currently only for container). DEVICE_IS_NETWORK_DEVICE 0x0002 (currently only for container). DEVICE_IS_PAIRED 0x0004 (currently only for container). DEVICE_IS_ACTIVE 0x0008 (currently never set). DEVICE_IS_MACHINE 0x0010 (currently only for container). DEVICE_IS_PRESENT 0x0020 (currently always set). DEVICE_IS_HIDDEN 0x0040. DEVICE_IS_PRINTER 0x0080 (currently only for container). DEVICE_IS_WIRELESS 0x0100. DEVICE_IS_WIRELESS_FAT 0x0200. The most common values are therefore: 32 (0x20)= device is present. 96 (0x60)= device is present but hidden. 288 (0x120)= device is a wireless device that is present -- **DriverName** A unique identifier for the driver installed. -- **DriverPackageStrongName** The immediate parent directory name in the Directory field of InventoryDriverPackage -- **DriverVerDate** Name of the .sys image file (or wudfrd.sys if using user mode driver framework). -- **DriverVerVersion** The immediate parent directory name in the Directory field of InventoryDriverPackage. -- **Enumerator** The date of the driver loaded for the device. +- **ClassGuid** The device class unique identifier of the driver package loaded on the device. +- **COMPID** The list of “Compatible IDs” for this device. +- **ContainerId** The system-supplied unique identifier that specifies which group(s) the device(s) installed on the parent (main) device belong to. +- **Description** The description of the device. +- **DeviceInterfaceClasses** The device interfaces that this device implements. +- **DeviceState** Identifies the current state of the parent (main) device. +- **DriverId** The unique identifier for the installed driver. +- **DriverName** The name of the driver image file. +- **DriverPackageStrongName** The immediate parent directory name in the Directory field of InventoryDriverPackage. +- **DriverVerDate** The date associated with the driver installed on the device. +- **DriverVerVersion** The version number of the driver installed on the device. +- **Enumerator** Identifies the bus that enumerated the device. - **ExtendedInfs** The extended INF file names. -- **HWID** The version of the driver loaded for the device. -- **Inf** The bus that enumerated the device. -- **InstallState** The device installation state. One of these values: https://msdn.microsoft.com/en-us/library/windows/hardware/ff543130.aspx -- **InventoryVersion** List of hardware ids for the device. -- **LowerClassFilters** Lower filter class drivers IDs installed for the device -- **LowerFilters** Lower filter drivers IDs installed for the device -- **Manufacturer** INF file name (the name could be renamed by OS, such as oemXX.inf) -- **MatchingID** Device installation state. -- **Model** The version of the inventory binary generating the events. -- **ParentId** Lower filter class drivers IDs installed for the device. -- **ProblemCode** Lower filter drivers IDs installed for the device. -- **Provider** The device manufacturer. -- **Service** The device service name -- **STACKID** Represents the hardware ID or compatible ID that Windows uses to install a device instance. -- **UpperClassFilters** Upper filter drivers IDs installed for the device -- **UpperFilters** The device model. +- **HWID** A list of hardware IDs for the device. +- **Inf** The name of the INF file (possibly renamed by the OS, such as oemXX.inf). +- **InstallState** The device installation state. For a list of values, see: https://msdn.microsoft.com/en-us/library/windows/hardware/ff543130.aspx +- **InventoryVersion** The version number of the inventory process generating the events. +- **LowerClassFilters** The identifiers of the Lower Class filters installed for the device. +- **LowerFilters** The identifiers of the Lower filters installed for the device. +- **Manufacturer** The manufacturer of the device. +- **MatchingID** The Hardware ID or Compatible ID that Windows uses to install a device instance. +- **Model** Identifies the model of the device. +- **ParentId** The Device Instance ID of the parent of the device. +- **ProblemCode** The error code currently returned by the device, if applicable. +- **Provider** Identifies the device provider. +- **Service** The name of the device service. +- **STACKID** The list of hardware IDs for the stack. +- **UpperClassFilters** The identifiers of the Upper Class filters installed for the device. +- **UpperFilters** The identifiers of the Upper filters installed for the device. ### Microsoft.Windows.Inventory.Core.InventoryDevicePnpRemove @@ -3817,7 +3944,6 @@ The following fields are available: This event indicates that a new set of InventoryDeviceUsbHubClassAdd events will be sent. -This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). The following fields are available: @@ -3974,30 +4100,30 @@ This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedevic The following fields are available: -- **AddinCLSID** The CLSID for the Office add-in. -- **AddInCLSID** CLSID key for the office addin -- **AddInId** Office add-in ID. -- **AddinType** Office add-in Type. -- **BinFileTimestamp** Timestamp of the Office add-in. -- **BinFileVersion** Version of the Office add-in. -- **Description** Office add-in description. -- **FileId** FileId of the Office add-in. -- **FileSize** File size of the Office add-in. -- **FriendlyName** Friendly name for office add-in. -- **FullPath** Unexpanded path to the office add-in. +- **AddinCLSID** The class identifier key for the Microsoft Office add-in. +- **AddInCLSID** The class identifier key for the Microsoft Office add-in. +- **AddInId** The identifier for the Microsoft Office add-in. +- **AddinType** The type of the Microsoft Office add-in. +- **BinFileTimestamp** The timestamp of the Office add-in. +- **BinFileVersion** The version of the Microsoft Office add-in. +- **Description** Description of the Microsoft Office add-in. +- **FileId** The file identifier of the Microsoft Office add-in. +- **FileSize** The file size of the Microsoft Office add-in. +- **FriendlyName** The friendly name for the Microsoft Office add-in. +- **FullPath** The full path to the Microsoft Office add-in. - **InventoryVersion** The version of the inventory binary generating the events. -- **LoadBehavior** Uint32 that describes the load behavior. -- **LoadTime** Load time for the office addin -- **OfficeApplication** The office application for this add-in. -- **OfficeArchitecture** Architecture of the add-in. -- **OfficeVersion** The office version for this add-in. -- **OutlookCrashingAddin** Boolean that indicates if crashes have been found for this add-in. +- **LoadBehavior** Integer that describes the load behavior. +- **LoadTime** Load time for the Office add-in. +- **OfficeApplication** The Microsoft Office application associated with the add-in. +- **OfficeArchitecture** The architecture of the add-in. +- **OfficeVersion** The Microsoft Office version for this add-in. +- **OutlookCrashingAddin** Indicates whether crashes have been found for this add-in. - **ProductCompany** The name of the company associated with the Office add-in. -- **ProductName** The product name associated with the Office add-in. +- **ProductName** The product name associated with the Microsoft Office add-in. - **ProductVersion** The version associated with the Office add-in. -- **ProgramId** The unique program identifier of the Office add-in. +- **ProgramId** The unique program identifier of the Microsoft Office add-in. - **Provider** Name of the provider for this add-in. -- **Usage** Data regarding usage of the add-in. +- **Usage** Data about usage for the add-in. ### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeAddInRemove @@ -4159,10 +4285,10 @@ This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedevic The following fields are available: -- **BrowserFlags** Browser flags for Office-related products. -- **ExchangeProviderFlags** Provider policies for Office Exchange. +- **BrowserFlags** Browser flags for Office-related products +- **ExchangeProviderFlags** Provider policies for Office Exchange - **InventoryVersion** The version of the inventory binary generating the events. -- **SharedComputerLicensing** Office shared computer licensing policies. +- **SharedComputerLicensing** Office shared computer licensing policies ### Microsoft.Windows.Inventory.General.InventoryMiscellaneousOfficeSettingsStartSync @@ -4315,6 +4441,7 @@ This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedevic The following fields are available: - **IndicatorValue** The indicator value. +- **Value** Describes an operating system indicator that may be relevant for the device upgrade. ### Microsoft.Windows.Inventory.Indicators.InventoryMiscellaneousUexIndicatorRemove @@ -4376,6 +4503,80 @@ The following fields are available: - **UserInputTime** The amount of time the loader application spent waiting for user input. +## Miracast events + +### Microsoft.Windows.Cast.Miracast.MiracastSessionEnd + +This event sends data at the end of a Miracast session that helps determine RTSP related Miracast failures along with some statistics about the session + +The following fields are available: + +- **AudioChannelCount** The number of audio channels. +- **AudioSampleRate** The sample rate of audio in terms of samples per second. +- **AudioSubtype** The unique subtype identifier of the audio codec (encoding method) used for audio encoding. +- **AverageBitrate** The average video bitrate used during the Miracast session, in bits per second. +- **AverageDataRate** The average available bandwidth reported by the WiFi driver during the Miracast session, in bits per second. +- **AveragePacketSendTimeInMs** The average time required for the network to send a sample, in milliseconds. +- **ConnectorType** The type of connector used during the Miracast session. +- **EncodeAverageTimeMS** The average time to encode a frame of video, in milliseconds. +- **EncodeCount** The count of total frames encoded in the session. +- **EncodeMaxTimeMS** The maximum time to encode a frame, in milliseconds. +- **EncodeMinTimeMS** The minimum time to encode a frame, in milliseconds. +- **EncoderCreationTimeInMs** The time required to create the video encoder, in milliseconds. +- **ErrorSource** Identifies the component that encountered an error that caused a disconnect, if applicable. +- **FirstFrameTime** The time (tick count) when the first frame is sent. +- **FirstLatencyMode** The first latency mode. +- **FrameAverageTimeMS** Average time to process an entire frame, in milliseconds. +- **FrameCount** The total number of frames processed. +- **FrameMaxTimeMS** The maximum time required to process an entire frame, in milliseconds. +- **FrameMinTimeMS** The minimum time required to process an entire frame, in milliseconds. +- **Glitches** The number of frames that failed to be delivered on time. +- **HardwareCursorEnabled** Indicates if hardware cursor was enabled when the connection ended. +- **HDCPState** The state of HDCP (High-bandwidth Digital Content Protection) when the connection ended. +- **HighestBitrate** The highest video bitrate used during the Miracast session, in bits per second. +- **HighestDataRate** The highest available bandwidth reported by the WiFi driver, in bits per second. +- **LastLatencyMode** The last reported latency mode. +- **LogTimeReference** The reference time, in tick counts. +- **LowestBitrate** The lowest video bitrate used during the Miracast session, in bits per second. +- **LowestDataRate** The lowest video bitrate used during the Miracast session, in bits per second. +- **MediaErrorCode** The error code reported by the media session, if applicable. +- **MiracastEntry** The time (tick count) when the Miracast driver was first loaded. +- **MiracastM1** The time (tick count) when the M1 request was sent. +- **MiracastM2** The time (tick count) when the M2 request was sent. +- **MiracastM3** The time (tick count) when the M3 request was sent. +- **MiracastM4** The time (tick count) when the M4 request was sent. +- **MiracastM5** The time (tick count) when the M5 request was sent. +- **MiracastM6** The time (tick count) when the M6 request was sent. +- **MiracastM7** The time (tick count) when the M7 request was sent. +- **MiracastSessionState** The state of the Miracast session when the connection ended. +- **MiracastStreaming** The time (tick count) when the Miracast session first started processing frames. +- **ProfileCount** The count of profiles generated from the receiver M4 response. +- **ProfileCountAfterFiltering** The count of profiles after filtering based on available bandwidth and encoder capabilities. +- **RefreshRate** The refresh rate set on the remote display. +- **RotationSupported** Indicates if the Miracast receiver supports display rotation. +- **RTSPSessionId** The unique identifier of the RTSP session. This matches the RTSP session ID for the receiver for the same session. +- **SessionGuid** The unique identifier of to correlate various Miracast events from a session. +- **SinkHadEdid** Indicates if the Miracast receiver reported an EDID. +- **SupportMicrosoftColorSpaceConversion** Indicates whether the Microsoft color space conversion for extra color fidelity is supported by the receiver. +- **SupportsMicrosoftDiagnostics** Indicates whether the Miracast receiver supports the Microsoft Diagnostics Miracast extension. +- **SupportsMicrosoftFormatChange** Indicates whether the Miracast receiver supports the Microsoft Format Change Miracast extension. +- **SupportsMicrosoftLatencyManagement** Indicates whether the Miracast receiver supports the Microsoft Latency Management Miracast extension. +- **SupportsMicrosoftRTCP** Indicates whether the Miracast receiver supports the Microsoft RTCP Miracast extension. +- **SupportsMicrosoftVideoFormats** Indicates whether the Miracast receiver supports Microsoft video format for 3:2 resolution. +- **SupportsWiDi** Indicates whether Miracast receiver supports Intel WiDi extensions. +- **TeardownErrorCode** The error code reason for teardown provided by the receiver, if applicable. +- **TeardownErrorReason** The text string reason for teardown provided by the receiver, if applicable. +- **UIBCEndState** Indicates whether UIBC was enabled when the connection ended. +- **UIBCEverEnabled** Indicates whether UIBC was ever enabled. +- **UIBCStatus** The result code reported by the UIBC setup process. +- **VideoBitrate** The starting bitrate for the video encoder. +- **VideoCodecLevel** The encoding level used for encoding, specific to the video subtype. +- **VideoHeight** The height of encoded video frames. +- **VideoSubtype** The unique subtype identifier of the video codec (encoding method) used for video encoding. +- **VideoWidth** The width of encoded video frames. +- **WFD2Supported** Indicates if the Miracast receiver supports WFD2 protocol. + + ## OneDrive events ### Microsoft.OneDrive.Sync.Setup.APIOperation @@ -4509,6 +4710,71 @@ The following fields are available: - **userRegionCode** The current user's region setting +### wilActivity + +This event provides a Windows Internal Library context used for Product and Service diagnostics. + +The following fields are available: + +- **callContext** The function where the failure occurred. +- **currentContextId** The ID of the current call context where the failure occurred. +- **currentContextMessage** The message of the current call context where the failure occurred. +- **currentContextName** The name of the current call context where the failure occurred. +- **failureCount** The number of failures for this failure ID. +- **failureId** The ID of the failure that occurred. +- **failureType** The type of the failure that occurred. +- **fileName** The file name where the failure occurred. +- **function** The function where the failure occurred. +- **hresult** The HResult of the overall activity. +- **lineNumber** The line number where the failure occurred. +- **message** The message of the failure that occurred. +- **module** The module where the failure occurred. +- **originatingContextId** The ID of the originating call context that resulted in the failure. +- **originatingContextMessage** The message of the originating call context that resulted in the failure. +- **originatingContextName** The name of the originating call context that resulted in the failure. +- **threadId** The ID of the thread on which the activity is executing. + + +## Sediment events + +### Microsoft.Windows.Sediment.Info.DetailedState + +This event is sent when detailed state information is needed from an update trial run. + +The following fields are available: + +- **Data** Data relevant to the state, such as what percent of disk space the directory takes up. +- **Id** Identifies the trial being run, such as a disk related trial. +- **ReleaseVer** The version of the component. +- **State** The state of the reporting data from the trial, such as the top-level directory analysis. +- **Time** The time the event was fired. + + +### Microsoft.Windows.Sediment.Info.Error + +This event indicates an error in the updater payload. This information assists in keeping Windows up to date. + +The following fields are available: + +- **FailureType** The type of error encountered. +- **FileName** The code file in which the error occurred. +- **HResult** The failure error code. +- **LineNumber** The line number in the code file at which the error occurred. +- **ReleaseVer** The version information for the component in which the error occurred. +- **Time** The system time at which the error occurred. + + +### Microsoft.Windows.Sediment.Info.PhaseChange + +The event indicates progress made by the updater. This information assists in keeping Windows up to date. + +The following fields are available: + +- **NewPhase** The phase of progress made. +- **ReleaseVer** The version information for the component in which the change occurred. +- **Time** The system time at which the phase chance occurred. + + ## Setup events ### SetupPlatformTel.SetupPlatformTelActivityEvent @@ -4548,15 +4814,6 @@ The following fields are available: - **Value** Retrieves the value associated with the corresponding event name (Field Name). For example: For time related events this will include the system time. -### SetupPlatformTel.SetupPlatfOrmTelEvent - -This service retrieves events generated by SetupPlatform, the engine that drives the various deployment scenarios. - -The following fields are available: - -- **GroupName** Retrieves the groupname the event belongs to. Example: Install Information, DU Information, Disk Space Information etc. - - ## Software update events ### SoftwareUpdateClientTelemetry.CheckForUpdates @@ -4660,6 +4917,7 @@ The following fields are available: - **BundleRevisionNumber** Identifies the revision number of the content bundle - **CallerApplicationName** Name provided by the caller who initiated API calls into the software distribution client - **ClientVersion** Version number of the software distribution client +- **DeploymentProviderMode** The mode of operation of the update deployment provider. - **DeviceModel** Device model as defined in the system bios - **EventInstanceID** A globally unique identifier for event instance - **EventScenario** Indicates the purpose of the event - whether because scan started, succeded, failed, etc. @@ -4667,7 +4925,7 @@ The following fields are available: - **FlightId** The specific id of the flight the device is getting - **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.) - **RevisionNumber** Identifies the revision number of this specific piece of content -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc) +- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Windows Store, etc) - **SystemBIOSMajorRelease** Major release version of the system bios - **SystemBIOSMinorRelease** Minor release version of the system bios - **UpdateId** Identifier associated with the specific piece of content @@ -4680,11 +4938,11 @@ Download process event for target update on Windows Update client. See the Event The following fields are available: -- **ActiveDownloadTime** Number of seconds the update was actively being downloaded. +- **ActiveDownloadTime** How long the download took, in seconds, excluding time where the update wasn't actively being downloaded. - **AppXBlockHashFailures** Indicates the number of blocks that failed hash validation during download of the app payload. - **AppXBlockHashValidationFailureCount** A count of the number of blocks that have failed validation after being downloaded. -- **AppXDownloadScope** Indicates the scope of the download for application content. For streaming install scenarios, AllContent - non-streaming download, RequiredOnly - streaming download requested content required for launch, AutomaticOnly - streaming download requested automatic streams for the app, and Unknown - for events sent before download scope is determined by the Windows Update client. -- **AppXScope** Indicates the scope of the app download. The values can be one of the following: "RequiredContentOnly" - only the content required to launch the app is being downloaded; "AutomaticContentOnly" - only the optional [automatic] content for the app (the ones that can downloaded after the app has been launched) is being downloaded; "AllContent" - all content for the app, including the optional [automatic] content, is being downloaded. +- **AppXDownloadScope** Indicates the scope of the download for application content. +- **AppXScope** Indicates the scope of the app download. - **BiosFamily** The family of the BIOS (Basic Input Output System). - **BiosName** The name of the device BIOS. - **BiosReleaseDate** The release date of the device BIOS. @@ -4692,28 +4950,28 @@ The following fields are available: - **BIOSVendor** The vendor of the BIOS. - **BiosVersion** The version of the BIOS. - **BundleBytesDownloaded** Number of bytes downloaded for the specific content bundle. -- **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found. +- **BundleId** Identifier associated with the specific content bundle. - **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed. - **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to download. - **BundleRevisionNumber** Identifies the revision number of the content bundle. - **BytesDownloaded** Number of bytes that were downloaded for an individual piece of content (not the entire bundle). -- **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine does not exist, the value is null. -- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client. -- **CbsDownloadMethod** Indicates whether the download was a full-file download or a partial/delta download. -- **CbsMethod** The method used for downloading the update content related to the Component Based Servicing (CBS) technology. This value can be one of the following: (1) express download method was used for download; (2) SelfContained download method was used for download indicating the update had no express content; (3) SelfContained download method was used indicating that the update has an express payload, but the server is not hosting it; (4) SelfContained download method was used indicating that range requests are not supported; (5) SelfContained download method was used indicating that the system does not support express download (dpx.dll is not present); (6) SelfContained download method was used indicating that self-contained download method was selected previously; (7) SelfContained download method was used indicating a fall back to self-contained if the number of requests made by DPX exceeds a certain threshold. +- **CachedEngineVersion** The version of the “Self-Initiated Healing” (SIH) engine that is cached on the device, if applicable. +- **CallerApplicationName** The name provided by the application that initiated API calls into the software distribution client. +- **CbsDownloadMethod** Indicates whether the download was a full- or a partial-file download. +- **CbsMethod** The method used for downloading the update content related to the Component Based Servicing (CBS) technology. - **CDNCountryCode** Two letter country abbreviation for the Content Distribution Network (CDN) location. - **CDNId** ID which defines which CDN the software distribution client downloaded the content from. - **ClientVersion** The version number of the software distribution client. -- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. No value is currently reported in this field. Expected value for this field is 0. -- **ConnectTime** Indicates the cumulative sum (in seconds) of the time it took to establish the connection for all updates in an update bundle. +- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. +- **ConnectTime** Indicates the cumulative amount of time (in seconds) it took to establish the connection for all updates in an update bundle. - **CurrentMobileOperator** The mobile operator the device is currently connected to. -- **DeviceModel** What is the device model. +- **DeviceModel** The model of the device. - **DownloadPriority** Indicates whether a download happened at background, normal, or foreground priority. -- **DownloadProps** Indicates a bitmask for download operations indicating: (1) if an update was downloaded to a system volume (least significant bit i.e. bit 0); (2) if the update was from a channel other than the installed channel (bit 1); (3) if the update was for a product pinned by policy (bit 2); (4) if the deployment action for the update is uninstall (bit 3). -- **DownloadType** Differentiates the download type of SIH downloads between Metadata and Payload downloads. +- **DownloadProps** Information about the download operation. +- **DownloadType** Differentiates the download type of “Self-Initiated Healing” (SIH) downloads between Metadata and Payload downloads. - **EventInstanceID** A globally unique identifier for event instance. -- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started downloading content, or whether it was cancelled, succeeded, or failed. -- **EventType** Possible values are Child, Bundle, or Driver. +- **EventScenario** Indicates the purpose for sending this event: whether because the software distribution just started downloading content; or whether it was cancelled, succeeded, or failed. +- **EventType** Identifies the type of the event (Child, Bundle, or Driver). - **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough. - **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device. - **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds). @@ -4728,38 +4986,38 @@ The following fields are available: - **IsDependentSet** Indicates whether a driver is a part of a larger System Hardware/Firmware Update - **IsWUfBDualScanEnabled** Indicates if Windows Update for Business dual scan is enabled on the device. - **IsWUfBEnabled** Indicates if Windows Update for Business is enabled on the device. -- **NetworkCost** A flag indicating the cost of the network used for downloading the update content. The values can be: 0x0 (Unkown); 0x1 (Network cost is unrestricted); 0x2 (Network cost is fixed); 0x4 (Network cost is variable); 0x10000 (Network cost over data limit); 0x20000 (Network cost congested); 0x40000 (Network cost roaming); 0x80000 (Network cost approaching data limit). +- **NetworkCost** A flag indicating the cost of the network (congested, fixed, variable, over data limit, roaming, etc.) used for downloading the update content. - **NetworkCostBitMask** Indicates what kind of network the device is connected to (roaming, metered, over data cap, etc.) - **NetworkRestrictionStatus** More general version of NetworkCostBitMask, specifying whether Windows considered the current network to be "metered." - **PackageFullName** The package name of the content. - **PhonePreviewEnabled** Indicates whether a phone was opted-in to getting preview builds, prior to flighting (pre-release builds) being introduced. -- **PostDnldTime** Time taken (in seconds) to signal download completion after the last job has completed downloading payload. -- **ProcessName** The process name of the caller who initiated API calls, in the event where CallerApplicationName was not provided. +- **PostDnldTime** Time (in seconds) taken to signal download completion after the last job completed downloading the payload. +- **ProcessName** The process name of the application that initiated API calls, in the event where CallerApplicationName was not provided. - **QualityUpdatePause** Indicates whether quality OS updates are paused on the device. - **Reason** A 32-bit integer representing the reason the update is blocked from being downloaded in the background. - **RegulationReason** The reason that the update is regulated - **RegulationResult** The result code (HResult) of the last attempt to contact the regulation web service for download regulation of update content. -- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one. -- **RepeatFailCount** Indicates whether this specific piece of content has previously failed. -- **RepeatFailFlag** Indicates whether this specific piece of content had previously failed to download. -- **RevisionNumber** Identifies the revision number of this specific piece of content. -- **ServiceGuid** An ID that represents which service the software distribution client is installing content for (Windows Update, Microsoft Store, etc.). -- **Setup360Phase** If the download is for an operating system upgrade, this datapoint indicates which phase of the upgrade is underway. -- **ShippingMobileOperator** The mobile operator that a device shipped on. -- **SizeCalcTime** Time taken (in seconds) to calculate the total download size of the payload. +- **RelatedCV** The Correlation Vector that was used before the most recent change to a new Correlation Vector. +- **RepeatFailCount** Indicates whether this specific content has previously failed. +- **RepeatFailFlag** Indicates whether this specific content previously failed to download. +- **RevisionNumber** The revision number of the specified piece of content. +- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Windows Store, etc.). +- **Setup360Phase** Identifies the active phase of the upgrade download if the current download is for an Operating System upgrade. +- **ShippingMobileOperator** The mobile operator linked to the device when the device shipped. +- **SizeCalcTime** Time (in seconds) taken to calculate the total download size of the payload. - **StatusCode** Indicates the result of a Download event (success, cancellation, failure code HResult). - **SystemBIOSMajorRelease** Major version of the BIOS. - **SystemBIOSMinorRelease** Minor version of the BIOS. - **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. - **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. -- **TargetMetadataVersion** For self-initiated healing, this is the target version of the SIH engine to download (if needed). If not, the value is null. +- **TargetMetadataVersion** The version of the currently downloading (or most recently downloaded) package. - **ThrottlingServiceHResult** Result code (success/failure) while contacting a web service to determine whether this device should download content yet. -- **TimeToEstablishConnection** Time (in ms) it took to establish the connection prior to beginning downloaded. -- **TotalExpectedBytes** The total count of bytes that the download is expected to be. +- **TimeToEstablishConnection** Time (in milliseconds) it took to establish the connection prior to beginning downloaded. +- **TotalExpectedBytes** The total size (in Bytes) expected to be downloaded. - **UpdateId** An identifier associated with the specific piece of content. - **UpdateID** An identifier associated with the specific piece of content. -- **UpdateImportance** Indicates whether a piece of content was marked as Important, Recommended, or Optional. -- **UsedDO** Whether the download used the delivery optimization service. +- **UpdateImportance** Indicates whether the content was marked as Important, Recommended, or Optional. +- **UsedDO** Indicates whether the download used the Delivery Optimization (DO) service. - **UsedSystemVolume** Indicates whether the content was downloaded to the device's main system storage drive, or an alternate storage drive. - **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue. @@ -4838,6 +5096,7 @@ The following fields are available: - **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. No value is currently reported in this field. Expected value for this field is 0. - **CSIErrorType** The stage of CBS installation where it failed. - **CurrentMobileOperator** The mobile operator to which the device is currently connected. +- **DeploymentProviderMode** The mode of operation of the update deployment provider. - **DeviceModel** The device model. - **DriverPingBack** Contains information about the previous driver and system state. - **DriverRecoveryIds** The list of identifiers that could be used for uninstalling the drivers if a recovery is required. @@ -4924,7 +5183,7 @@ The following fields are available: - **RelatedCV** The previous correlation vector that was used by the client before swapping with a new one. - **RepeatFailCount** Indicates whether this specific piece of content has previously failed. - **RevisionNumber** Identifies the revision number of this specific piece of content. -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc.). +- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Windows Store, etc.). - **StatusCode** Result code of the event (success, cancellation, failure code HResult). - **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. - **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. @@ -4984,7 +5243,7 @@ The following fields are available: - **RelatedCV** The previous correlation vector that was used by the client before swapping with a new one. - **RepeatFailCount** Indicates whether this specific piece of content previously failed. - **RevisionNumber** Identifies the revision number of this specific piece of content. -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc.). +- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Windows Store, etc.). - **StatusCode** Result code of the event (success, cancellation, failure code HResult). - **TargetGroupId** For drivers targeted to a specific device model, this ID indicates the distribution group of devices receiving that driver. - **TargetingVersion** For drivers targeted to a specific device model, this is the version number of the drivers being distributed to the device. @@ -5016,28 +5275,28 @@ Ensures Windows Updates are secure and complete. Event helps to identify whether The following fields are available: - **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request. -- **EndpointUrl** URL of the endpoint where client obtains update metadata. Used to identify test vs staging vs production environments. -- **EventScenario** Indicates the purpose of the event - whether because scan started, succeded, failed, etc. -- **ExtendedStatusCode** Secondary status code for certain scenarios where StatusCode was not specific enough. -- **LeafCertId** Integral ID from the FragmentSigning data for certificate that failed. +- **EndpointUrl** The endpoint URL where the device obtains update metadata. This is used to distinguish between test, staging, and production environments. +- **EventScenario** The purpose of this event, such as scan started, scan succeeded, or scan failed. +- **ExtendedStatusCode** The secondary status code of the event. +- **LeafCertId** The integral ID from the FragmentSigning data for the certificate that failed. - **ListOfSHA256OfIntermediateCerData** A semicolon delimited list of base64 encoding of hashes for the Base64CerData in the FragmentSigning data of an intermediate certificate. -- **MetadataIntegrityMode** Mode of update transport metadata integrity check. 0-Unknown, 1-Ignoe, 2-Audit, 3-Enforce +- **MetadataIntegrityMode** The mode of the transport metadata integrity check. 0 = unknown; 1 = ignore; 2 = audit; 3 = enforce - **MetadataSignature** A base64-encoded string of the signature associated with the update metadata (specified by revision ID). -- **RawMode** Raw unparsed mode string from the SLS response. May be null if not applicable. +- **RawMode** The raw unparsed mode string from the SLS response. This field is null if not applicable. - **RawValidityWindowInDays** The raw unparsed validity window string in days of the timestamp token. This field is null if not applicable. - **RevisionId** The revision ID for a specific piece of content. - **RevisionNumber** The revision number for a specific piece of content. -- **ServiceGuid** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc) +- **ServiceGuid** Identifies the service to which the software distribution client is connected, Example: Windows Update or Microsoft Store - **SHA256OfLeafCerData** A base64 encoding of the hash for the Base64CerData in the FragmentSigning data of the leaf certificate. - **SHA256OfLeafCertPublicKey** A base64 encoding of the hash of the Base64CertData in the FragmentSigning data of the leaf certificate. -- **SHA256OfTimestampToken** Base64 string of hash of the timestamp token blob +- **SHA256OfTimestampToken** An encoded string of the timestamp token. - **SignatureAlgorithm** The hash algorithm for the metadata signature. -- **SLSPrograms** A test program a machine may be opted in. Examples include "Canary" and "Insider Fast". -- **StatusCode** Result code of the event (success, cancellation, failure code HResult) -- **TimestampTokenCertThumbprint** Thumbprint of the encoded timestamp token. -- **TimestampTokenId** Created time encoded in the timestamp blob. This will be zeroed if the token is itself malformed and decoding failed. +- **SLSPrograms** A test program to which a device may have opted in. Example: Insider Fast +- **StatusCode** The status code of the event. +- **TimestampTokenCertThumbprint** The thumbprint of the encoded timestamp token. +- **TimestampTokenId** The time this was created. It is encoded in a timestamp blob and will be zero if the token is malformed. - **UpdateId** The update ID for a specific piece of content. -- **ValidityWindowInDays** Validity window in effect when verifying the timestamp +- **ValidityWindowInDays** The validity window that's in effect when verifying the timestamp. ## System Resource Usage Monitor events @@ -5133,6 +5392,7 @@ The following fields are available: - **RangeRequestState** Indicates the range request type used. - **RelatedCV** Correlation vector value generated from the latest USO scan. - **Result** Outcome of the download request phase of update. +- **SandboxTaggedForReserves** The sandbox for reserves. - **ScenarioId** Indicates the update scenario. - **SessionId** Unique value for each attempt (same value for initialize, download, install commit phases). - **UpdateId** Unique ID for each update. @@ -5360,6 +5620,24 @@ The following fields are available: - **UserSession** Indicates whether install was invoked by user actions. +## Update notification events + +### Microsoft.Windows.UpdateNotificationPipeline.UNPCampaignManagerHeartbeat + +This event is sent at the start of the CampaignManager event and is intended to be used as a heartbeat. + +The following fields are available: + +- **CampaignConfigVersion** Configuration version for the current campaign. +- **CampaignID** Currently campaign that is running on Update Notification Pipeline (UNP). +- **ConfigCatalogVersion** Current catalog version of UNP. +- **ContentVersion** Content version for the current campaign on UNP. +- **CV** Correlation vector. +- **DetectorVersion** Most recently run detector version for the current campaign on UNP. +- **GlobalEventCounter** Client-side counter that indicates the event ordering sent by the user. +- **PackageVersion** Current UNP package version. + + ## Upgrade events ### FacilitatorTelemetry.DCATDownload @@ -5374,6 +5652,22 @@ The following fields are available: - **ResultCode** Result returned by the Facilitator DCAT call. - **Scenario** Dynamic update scenario (Image DU, or Setup DU). - **Type** Type of package that was downloaded. +- **UpdateId** The ID of the update that was downloaded. + + +### FacilitatorTelemetry.DUDownload + +This event returns data about the download of supplemental packages critical to upgrading a device to the next version of Windows. + +The following fields are available: + +- **DownloadRequestAttributes** The attributes sent for download. +- **PackageCategoriesFailed** Lists the categories of packages that failed to download. +- **PackageCategoriesSkipped** Lists the categories of package downloads that were skipped. +- **ResultCode** The result of the event execution. +- **Scenario** Identifies the active Download scenario. +- **Url** The URL the download request was sent to. +- **Version** Identifies the version of Facilitator used. ### FacilitatorTelemetry.InitializeDU @@ -5591,7 +5885,7 @@ The following fields are available: - **InstanceId** Retrieves a unique identifier for each instance of a setup session. - **Operation** Facilitator’s last known operation (scan, download, etc.). - **ReportId** ID for tying together events stream side. -- **ResultCode** Result returned by setup for the entire operation. +- **ResultCode** Result returned for the entire setup operation. - **Scenario** Dynamic Update scenario (Image DU, or Setup DU). - **ScenarioId** Identifies the update scenario. - **TargetBranch** Branch of the target OS. @@ -5693,6 +5987,7 @@ The following fields are available: - **detectionSummary** Result of each applicable detection that was run. - **featureAssessmentImpact** WaaS Assessment impact for feature updates. - **hrEngineResult** Error code from the engine operation. +- **insufficientSessions** Device not eligible for diagnostics. - **isInteractiveMode** The user started a run of WaaSMedic. - **isManaged** Device is managed for updates. - **isWUConnected** Device is connected to Windows Update. @@ -5754,7 +6049,7 @@ The following fields are available: - **PertProb** The probability the entry will be Perturbed if the algorithm chosen is “heavy-hitters”. -## Microsoft Store events +## Windows Store events ### Microsoft.Windows.Store.StoreActivating @@ -6033,7 +6328,9 @@ This event is sent at the beginning of an app install or update to help keep Win The following fields are available: - **CatalogId** The name of the product catalog from which this app was chosen. +- **FulfillmentPluginId** The ID of the plugin needed to install the package type of the product. - **PFN** The Package Family Name of the app that is being installed or updated. +- **PluginTelemetryData** Diagnostic information specific to the package-type plug-in. - **ProductId** The product ID of the app that is being updated or installed. @@ -6224,6 +6521,7 @@ The following fields are available: - **bytesFromCDN** The number of bytes received from a CDN source. - **bytesFromGroupPeers** The number of bytes received from a peer in the same domain group. - **bytesFromIntPeers** The number of bytes received from peers not in the same LAN or in the same domain group. +- **bytesFromLinkLocalPeers** The number of bytes received from local peers. - **bytesFromLocalCache** Bytes copied over from local (on disk) cache. - **bytesFromPeers** The number of bytes received from a peer in the same LAN. - **bytesRequested** The total number of bytes requested for download. @@ -6251,7 +6549,9 @@ The following fields are available: - **isVpn** Is the device connected to a Virtual Private Network? - **jobID** Identifier for the Windows Update job. - **lanConnectionCount** The total number of connections made to peers in the same LAN. +- **linkLocalConnectionCount** The number of connections made to peers in the same Link-local network. - **numPeers** The total number of peers used for this download. +- **numPeersLocal** The total number of local peers used for this download. - **predefinedCallerName** The name of the API Caller. - **restrictedUpload** Is the upload restricted? - **routeToCacheServer** The cache server setting, source, and value. @@ -6298,6 +6598,7 @@ The following fields are available: - **doClientVersion** The version of the Delivery Optimization client. - **doErrorCode** The Delivery Optimization error code that was returned. - **downloadMode** The download mode used for this file download session (CdnOnly = 0, Lan = 1, Group = 2, Internet = 3, Simple = 99, Bypass = 100). +- **downloadModeReason** Reason for the download. - **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9). - **errorCode** The error code that was returned. - **experimentId** ID used to correlate client/services calls that are part of the same test during A/B testing. @@ -6363,21 +6664,21 @@ This event collects information regarding the state of devices and drivers on th The following fields are available: - **activated** Whether the entire device manifest update is considered activated and in use. -- **analysisErrorCount** How many driver packages that could not be analyzed because errors were hit during the analysis. +- **analysisErrorCount** The number of driver packages that could not be analyzed because errors occurred during analysis. - **flightId** Unique ID for each flight. -- **missingDriverCount** How many driver packages that were delivered by the device manifest that are missing from the system. -- **missingUpdateCount** How many updates that were part of the device manifest that are missing from the system. +- **missingDriverCount** The number of driver packages delivered by the device manifest that are missing from the system. +- **missingUpdateCount** The number of updates in the device manifest that are missing from the system. - **objectId** Unique value for each diagnostics session. -- **publishedCount** How many drivers packages that were delivered by the device manifest that are published and available to be used on devices. +- **publishedCount** The number of drivers packages delivered by the device manifest that are published and available to be used on devices. - **relatedCV** Correlation vector value generated from the latest USO scan. - **scenarioId** Indicates the update scenario. - **sessionId** Unique value for each update session. -- **summary** A summary string that contains some basic information about driver packages that are part of the device manifest and any devices on the system that those driver packages match on. +- **summary** A summary string that contains basic information about driver packages that are part of the device manifest and any devices on the system that those driver packages match. - **summaryAppendError** A Boolean indicating if there was an error appending more information to the summary string. -- **truncatedDeviceCount** How many devices are missing from the summary string due to there not being enough room in the string. -- **truncatedDriverCount** How many driver packages are missing from the summary string due to there not being enough room in the string. +- **truncatedDeviceCount** The number of devices missing from the summary string because there is not enough room in the string. +- **truncatedDriverCount** The number of driver packages missing from the summary string because there is not enough room in the string. - **unpublishedCount** How many drivers packages that were delivered by the device manifest that are still unpublished and unavailable to be used on devices. -- **updateId** Unique ID for each Update. +- **updateId** The unique ID for each update. ### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentCommit @@ -6448,13 +6749,13 @@ This event collects information regarding the install phase of the new device ma The following fields are available: - **errorCode** The error code returned for the current install phase. -- **flightId** The unique identifier for each flight. +- **flightId** The unique identifier for each flight (pre-release builds). - **objectId** The unique identifier for each diagnostics session. -- **relatedCV** Correlation vector value generated from the latest USO scan. +- **relatedCV** Correlation vector value generated from the latest scan. - **result** Outcome of the install phase of the update. -- **scenarioId** The unique identifier for the update scenario. +- **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate - **sessionId** The unique identifier for each update session. -- **updateId** The unique identifier for each update. +- **updateId** The unique identifier for each Update. ### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentModeStart @@ -6463,13 +6764,13 @@ This event sends data for the start of each mode during the process of updating The following fields are available: -- **flightId** The unique identifier for each flight. -- **mode** The mode that is starting. -- **objectId** The unique value for each diagnostics session. -- **relatedCV** Correlation vector value generated from the latest USO scan. +- **flightId** The unique identifier for each flight (pre-release builds). +- **mode** Indicates the active Update Agent mode. +- **objectId** Unique value for each diagnostics session. +- **relatedCV** Correlation vector value generated from the latest scan. - **scenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate. -- **sessionId** Unique value for each Update Agent mode attempt. -- **updateId** Unique identifier for each update. +- **sessionId** The unique identifier for each update session. +- **updateId** The unique identifier for each Update. ### Microsoft.Windows.Update.NotificationUx.DialogNotificationToBeDisplayed @@ -6498,6 +6799,22 @@ The following fields are available: - **UtcTime** The time the dialog box notification will be displayed, in Coordinated Universal Time. +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootAcceptAutoDialog + +This event indicates that the Enhanced Engaged restart "accept automatically" dialog box was displayed. + +The following fields are available: + +- **DeviceLocalTime** The local time on the device sending the event. +- **ETag** OneSettings versioning value. +- **ExitCode** Indicates how users exited the dialog box. +- **RebootVersion** Version of DTE. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UserResponseString** The option that user chose on this dialog box. +- **UtcTime** The time that the dialog box was displayed, in Coordinated Universal Time. + + ### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootFirstReminderDialog This event indicates that the Enhanced Engaged restart "first reminder" dialog box was displayed.. @@ -6562,6 +6879,42 @@ The following fields are available: - **UtcTime** The time at which the reboot reminder dialog was shown (in UTC). +### Microsoft.Windows.Update.NotificationUx.EnhancedEngagedRebootReminderToast + +This event indicates that the Enhanced Engaged restart reminder pop-up banner was displayed. + +The following fields are available: + +- **DeviceLocalTime** The local time on the device sending the event. +- **ETag** OneSettings versioning value. +- **ExitCode** Indicates how users exited the pop-up banner. +- **RebootVersion** The version of the reboot logic. +- **UpdateId** The ID of the update that is pending restart to finish installation. +- **UpdateRevision** The revision of the update that is pending restart to finish installation. +- **UserResponseString** The option that the user chose in the pop-up banner. +- **UtcTime** The time that the pop-up banner was displayed, in Coordinated Universal Time. + + +### Microsoft.Windows.Update.NotificationUx.RebootScheduled + +Indicates when a reboot is scheduled by the system or a user for a security, quality, or feature update. + +The following fields are available: + +- **activeHoursApplicable** Indicates whether an Active Hours policy is present on the device. +- **IsEnhancedEngagedReboot** Indicates whether this is an Enhanced Engaged reboot. +- **rebootArgument** Argument for the reboot task. It also represents specific reboot related action. +- **rebootOutsideOfActiveHours** Indicates whether a restart is scheduled outside of active hours. +- **rebootScheduledByUser** Indicates whether the restart was scheduled by user (if not, it was scheduled automatically). +- **rebootState** The current state of the restart. +- **rebootUsingSmartScheduler** Indicates whether the reboot is scheduled by smart scheduler. +- **revisionNumber** Revision number of the update that is getting installed with this restart. +- **scheduledRebootTime** Time of the scheduled restart. +- **scheduledRebootTimeInUTC** Time of the scheduled restart in Coordinated Universal Time. +- **updateId** ID of the update that is getting installed with this restart. +- **wuDeviceid** Unique device ID used by Windows Update. + + ### Microsoft.Windows.Update.Orchestrator.ActivityRestrictedByActiveHoursPolicy This event indicates a policy is present that may restrict update activity to outside of active hours. @@ -6622,20 +6975,20 @@ This event indicates that a scan for a Windows Update occurred. The following fields are available: -- **deferReason** Reason why the device could not check for updates. -- **detectionBlockingPolicy** State of update action. -- **detectionBlockreason** Reason for detection not completing. +- **deferReason** The reason why the device could not check for updates. +- **detectionBlockingPolicy** The Policy that blocked detection. +- **detectionBlockreason** The reason detection did not complete. - **detectionRetryMode** Indicates whether we will try to scan again. -- **errorCode** The returned error code. +- **errorCode** The error code returned for the current process. - **eventScenario** End-to-end update session ID, or indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed. -- **flightID** The specific ID of the Windows Insider build the device is getting. -- **interactive** Indicates whether the session was user initiated. -- **networkStatus** Error info -- **revisionNumber** Update revision number. -- **scanTriggerSource** Source of the triggered scan. -- **updateId** Update ID. -- **updateScenarioType** Update Session type -- **wuDeviceid** Device ID +- **flightID** The unique identifier for the flight (Windows Insider pre-release build) should be delivered to the device, if applicable. +- **interactive** Indicates whether the user initiated the session. +- **networkStatus** Indicates if the device is connected to the internet. +- **revisionNumber** The Update revision number. +- **scanTriggerSource** The source of the triggered scan. +- **updateId** The unique identifier of the Update. +- **updateScenarioType** Identifies the type of update session being performed. +- **wuDeviceid** The unique device ID used by Windows Update. ### Microsoft.Windows.Update.Orchestrator.DisplayNeeded @@ -6700,6 +7053,23 @@ The following fields are available: - **wuDeviceid** Device ID used by Windows Update. +### Microsoft.Windows.Update.Orchestrator.EscalationRiskLevels + +This event is sent during update scan, download, or install, and indicates that the device is at risk of being out-of-date. + +The following fields are available: + +- **configVersion** The escalation configuration version on the device. +- **downloadElapsedTime** Indicates how long since the download is required on device. +- **downloadRiskLevel** At-risk level of download phase. +- **installElapsedTime** Indicates how long since the install is required on device. +- **installRiskLevel** The at-risk level of install phase. +- **isSediment** Assessment of whether is device is at risk. +- **scanElapsedTime** Indicates how long since the scan is required on device. +- **scanRiskLevel** At-risk level of the scan phase. +- **wuDeviceid** Device ID used by Windows Update. + + ### Microsoft.Windows.Update.Orchestrator.FailedToAddTimeTriggerToScanTask This event indicated that USO failed to add a trigger time to a task. @@ -6718,6 +7088,7 @@ The following fields are available: - **EventPublishedTime** Time when this event was generated. - **flightID** The specific ID of the Windows Insider build. +- **inapplicableReason** The reason why the update is inapplicable. - **revisionNumber** Update revision number. - **updateId** Unique Windows Update ID. - **updateScenarioType** Update session type. @@ -6739,7 +7110,7 @@ The following fields are available: - **revisionNumber** Revision number of the update. - **updateId** Update ID. - **updateScenarioType** The update session type. -- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated to ensure the correct update process and experience is provided to keep Windows up to date.Indicates the exact state of the user experience at the time the required reboot was initiated. +- **uxRebootstate** Indicates the exact state of the user experience at the time the required reboot was initiated. - **wuDeviceid** Unique device ID used by Windows Update. @@ -6753,7 +7124,7 @@ The following fields are available: - **deferReason** Reason for install not completing. - **errorCode** The error code reppresented by a hexadecimal value. - **eventScenario** End-to-end update session ID. -- **flightID** Unique update ID +- **flightID** The ID of the Windows Insider build the device is getting. - **flightUpdate** Indicates whether the update is a Windows Insider build. - **ForcedRebootReminderSet** A boolean value that indicates if a forced reboot will happen for updates. - **IgnoreReasonsForRestart** The reason(s) a Postpone Restart command was ignored. @@ -7028,7 +7399,7 @@ The following fields are available: - **scheduledRebootTime** Time scheduled for the reboot. - **scheduledRebootTimeInUTC** Time scheduled for the reboot, in UTC. - **updateId** Identifies which update is being scheduled. -- **wuDeviceid** Unique DeviceID +- **wuDeviceid** The unique device ID used by Windows Update. ### Microsoft.Windows.Update.Ux.MusNotification.UxBrokerScheduledTask @@ -7069,21 +7440,43 @@ This event sends data specific to the CleanupSafeOsImages mitigation used for OS The following fields are available: -- **ClientId** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value. -- **FlightId** Unique identifier for each flight. -- **InstanceId** Unique GUID that identifies each instances of setuphost.exe. +- **ClientId** The client ID used by Windows Update. +- **FlightId** The ID of each Windows Insider build the device received. +- **InstanceId** A unique device ID that identifies each update instance. - **MitigationScenario** The update scenario in which the mitigation was executed. -- **MountedImageCount** Number of mounted images. -- **MountedImageMatches** Number of mounted images that were under %systemdrive%\$Windows.~BT. -- **MountedImagesFailed** Number of mounted images under %systemdrive%\$Windows.~BT that could not be removed. -- **MountedImagesRemoved** Number of mounted images under %systemdrive%\$Windows.~BT that were successfully removed. -- **MountedImagesSkipped** Number of mounted images that were not under %systemdrive%\$Windows.~BT. -- **RelatedCV** Correlation vector value generated from the latest USO scan. +- **MountedImageCount** The number of mounted images. +- **MountedImageMatches** The number of mounted image matches. +- **MountedImagesFailed** The number of mounted images that could not be removed. +- **MountedImagesRemoved** The number of mounted images that were successfully removed. +- **MountedImagesSkipped** The number of mounted images that were not found. +- **RelatedCV** The correlation vector value generated from the latest USO scan. - **Result** HResult of this operation. - **ScenarioId** ID indicating the mitigation scenario. - **ScenarioSupported** Indicates whether the scenario was supported. - **SessionId** Unique value for each update attempt. -- **UpdateId** Unique ID for each Update. +- **UpdateId** Unique ID for each Windows Update. +- **WuId** Unique ID for the Windows Update client. + + +### Mitigation360Telemetry.MitigationCustom.FixAppXReparsePoints + +This event sends data specific to the FixAppXReparsePoints mitigation used for OS updates. + +The following fields are available: + +- **ClientId** Unique identifier for each flight. +- **FlightId** Unique GUID that identifies each instances of setuphost.exe. +- **InstanceId** The update scenario in which the mitigation was executed. +- **MitigationScenario** Correlation vector value generated from the latest USO scan. +- **RelatedCV** Number of reparse points that are corrupted but we failed to fix them. +- **ReparsePointsFailed** Number of reparse points that were corrupted and were fixed by this mitigation. +- **ReparsePointsFixed** Number of reparse points that are not corrupted and no action is required. +- **ReparsePointsSkipped** HResult of this operation. +- **Result** ID indicating the mitigation scenario. +- **ScenarioId** Indicates whether the scenario was supported. +- **ScenarioSupported** Unique value for each update attempt. +- **SessionId** Unique ID for each Update. +- **UpdateId** Unique ID for the Windows Update client. - **WuId** Unique ID for the Windows Update client. @@ -7110,6 +7503,57 @@ The following fields are available: - **WuId** Unique ID for the Windows Update client. +## Windows Update Reserve Manager events + +### Microsoft.Windows.UpdateReserveManager.CommitPendingHardReserveAdjustment + +This event is sent when the Update Reserve Manager commits a hard reserve adjustment that was pending. + +The following fields are available: + +- **FinalAdjustment** Final adjustment for the hard reserve following the addition or removal of optional content. +- **InitialAdjustment** Initial intended adjustment for the hard reserve following the addition/removal of optional content. + + +### Microsoft.Windows.UpdateReserveManager.FunctionReturnedError + +This event is sent when the Update Reserve Manager returns an error from one of its internal functions. + +The following fields are available: + +- **FailedExpression** The failed expression that was returned. +- **FailedFile** The binary file that contained the failed function. +- **FailedFunction** The name of the function that originated the failure. +- **FailedLine** The line number of the failure. +- **ReturnCode** The return code of the function. + + +### Microsoft.Windows.UpdateReserveManager.PrepareTIForReserveInitialization + +This event is sent when the Update Reserve Manager prepares the Trusted Installer to initialize reserves on the next boot. + +The following fields are available: + +- **Flags** The flags that are passed to the function to prepare the Trusted Installer for reserve initialization. + + +### Microsoft.Windows.UpdateReserveManager.RemovePendingHardReserveAdjustment + +This event is sent when the Update Reserve Manager removes a pending hard reserve adjustment. + + + +### Microsoft.Windows.UpdateReserveManager.UpdatePendingHardReserveAdjustment + +This event is sent when the Update Reserve Manager needs to adjust the size of the hard reserve after the option content is installed. + +The following fields are available: + +- **ChangeSize** The change in the hard reserve size based on the addition or removal of optional content. +- **PendingHardReserveAdjustment** The final change to the hard reserve size. +- **UpdateType** Indicates whether the change is an increase or decrease in the size of the hard reserve. + + ## Winlogon events ### Microsoft.Windows.Security.Winlogon.SetupCompleteLogon From ca76cf634e94beb72ad526124dbefe46dcf3dbad Mon Sep 17 00:00:00 2001 From: Alexander Dale Date: Wed, 20 Feb 2019 10:30:42 -0800 Subject: [PATCH 51/76] Initial push, will need lots of formatting --- ...sed-root-of-trust-helps-protect-windows.md | 6 +- .../images/system-guard-secure-launch.png | Bin 63190 -> 90167 bytes ...-guard-secure-launch-and-smm-protection.md | 67 ++++++++++++++++-- 3 files changed, 65 insertions(+), 8 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-system-guard/how-hardware-based-root-of-trust-helps-protect-windows.md b/windows/security/threat-protection/windows-defender-system-guard/how-hardware-based-root-of-trust-helps-protect-windows.md index 7531187507..03fbaffd0c 100644 --- a/windows/security/threat-protection/windows-defender-system-guard/how-hardware-based-root-of-trust-helps-protect-windows.md +++ b/windows/security/threat-protection/windows-defender-system-guard/how-hardware-based-root-of-trust-helps-protect-windows.md @@ -37,7 +37,7 @@ As there are thousands of PC vendors that produce numerous models with different Two techniques exist to establish trust here—either maintain a list of known 'bad' SRTM measurements (also known as a blacklist), or a list of known 'good' SRTM measurements (also known as a whitelist). Each option has a drawback: -- A list of known 'bad' SRTM measurements allows a hacker to change just 1 bit in a component to create an entirely new SRTM hash that needs to be listed. +- A list of known 'bad' SRTM measurements allows a hacker to change just 1 bit in a component to create an entirely new SRTM hash that needs to be listed. This means that the SRTM flow is inherently brittle - a minor change can invalidate the entire chain of trust. - A list of known 'good' SRTM measurements requires each new BIOS/PC combination measurement to be carefully added, which is slow. In addition, a bug fix for UEFI code can take a long time to design, build, retest, validate, and redeploy. @@ -56,7 +56,7 @@ Secure Launch simplifies management of SRTM measurements because the launch code System Management Mode (SMM) is a special-purpose CPU mode in x86 microcontrollers that handles power management, hardware configuration, thermal monitoring, and anything else the manufacturer deems useful. Whenever one of these system operations is requested, a non-maskable interrupt (SMI) is invoked at runtime, which executes SMM code installed by the BIOS. -SMM code executes in the highest privilege level and is invisible to the OS, which makes it an attractive target for malicious activity. Even if DRTM is used to late launch, SMM code can potentially access hypervisor memory and change the hypervisor. +SMM code executes in the highest privilege level and is invisible to the OS, which makes it an attractive target for malicious activity. Even if System Guard Secure Launch is used to late launch, SMM code can potentially access hypervisor memory and change the hypervisor. To defend against this, two techniques are used: 1. Paging protection to prevent inappropriate access to code and data @@ -74,7 +74,7 @@ In the future, Windows 10 will also measure this SMI Handler’s behavior and at While Windows Defender System Guard provides advanced protection that will help protect and maintain the integrity of the platform during boot and at run time, the reality is that we must apply an "assume breach" mentality to even our most sophisticated security technologies. We should be able to trust that the technologies are successfully doing their jobs, but we also need the ability to verify that they were successful in achieving their goals. When it comes to platform integrity, we can’t just trust the platform, which potentially could be compromised, to self-attest to its security state. So Windows Defender System Guard includes a series of technologies that enable remote analysis of the device’s integrity. -As Windows 10 boots, a series of integrity measurements are taken by Windows Defender System Guard using the device’s Trusted Platform Module 2.0 (TPM 2.0). This process and data are hardware-isolated away from Windows to help ensure that the measurement data is not subject to the type of tampering that could happen if the platform was compromised. From here, the measurements can be used to determine the integrity of the device’s firmware, hardware configuration state, and Windows boot-related components, just to name a few. +As Windows 10 boots, a series of integrity measurements are taken by Windows Defender System Guard using the device’s Trusted Platform Module 2.0 (TPM 2.0). System Guard Secure Launch will not support earlier TPM versions, such as TPM 1.2. This process and data are hardware-isolated away from Windows to help ensure that the measurement data is not subject to the type of tampering that could happen if the platform was compromised. From here, the measurements can be used to determine the integrity of the device’s firmware, hardware configuration state, and Windows boot-related components, just to name a few. ![Boot time integrity](images/windows-defender-system-guard-boot-time-integrity.png) diff --git a/windows/security/threat-protection/windows-defender-system-guard/images/system-guard-secure-launch.png b/windows/security/threat-protection/windows-defender-system-guard/images/system-guard-secure-launch.png index 8707d0fba41e8fffc693ad406d4e646c27308097..b8167afbdc2538b7ba354e0ee2bf0b4297699d9c 100644 GIT binary patch literal 90167 zcmeFYWmH?=`ZZdkKyeC%;!@lS6fMC$xH~OUiWdnItP}|??heI@ySoz{iWUg2Aq025 z>HnPHIq&<9alhOTciazmkAWm>uk7q4&oiGn=l-syB8T&W?8T!;k8l*^r8OQsLMwgr z=t&I5bJRP(ffs71KaX8BRRC`&wgR2hkN`w>yK<(*FiZD8OJmRZ z_mt4*=}NBuSsg{Zn5D7i=UT4~PGrOW^+|t!Z}5;Byd?PNh#vaz&t?8Lat37a{nJE1 z(1`ud_xwLQ@>RqTcI4jY_%>kACDLgsG-m1HNK4~{|EG5?1|g9y-&EfcRI9cPJHb+> zm*MctO)jcDANSK63J1F?bQ3Cvouzqd0Nsd`DxWL%MNq0IaaC+f37X8W35mAc3P=fu zDOvwbj#{gg1#DCqpHKgP8`jWYqY}jtKI$4~JX`pUqL?NC7#p-)7~@@EvBvZ|`$sbn zY-*S4n3}DsE^wO1YwhO@>Fj$V(Tsh;j1-9DOz-*^Gl%$_S+xz1`9P2LO}3`ap-E*( zPL-Hkj59ZKJ16f(r7k*ZZh3)HN*JwE^)61JiQ z-swx_aod91U}a}`YX9=9I5i%n8IT{jz8T@Rd-vW+EpXn~it;lFnP~?;pTK{DW5HbP z2Pa*lI&N)7)<5J~z9#Wc%wr3ml?Jr9${WXLsNZje8$?UeYvea6f4=%4%u=j&p_g!Y z^hG0syMB1!^hxd}(X;{oH>1cFwA@?hp+l#~CG6Z|^|(y1+_8c4&J1rZLS$>H(w@7( z{3mxk_?YA=UdANV>iun1Knl};cGA?IXTwwUm(CzZTU&`Xsu0|x83xJ{h2&s|(mPk< zwW8Co^GQBPDK%r{cii)tg&H?`fTOGlLCds?op3^-tsc~hhz5|4@!q`p2tFvdL6WTJ zn}ZoMKiS>yKa z>dYL+TqcW`Rq3ZNGs}befG4y9`)YC0+OtTWXZVxvrQh-;L#+;E>v4(*#!IS`+bXoLgx_geW81#6CC~ zOoixdVZSyAmV0%ZXS_*+UD!9 z|55&uZME)M)1u+c$Lk)>ypMHpCs8R=rB7N;Yc4%)2|tyE&I*{ux%NtNWV%^zJ9mQ8 zmd*)`@1^K|&qyo@=D2*Z9%oq)i%x-XaO+=x@**s$dvV&AZ2T>pZ@9Hb_1Cs}cQm%K zubJL94c{~Rsbx*BL?1(U!Ka3iR>@N4Kr&mIb5%*$ezdQkRINm!PTO^#?*yYp+eTz- zVU*v*gS)-EPui;qtlQ<2$Q|)HaC6lIAtMlQI605@Q`OK<8vUlj5TKK=Nkmi(-7>%V z&b}8q_Iu189?jl5nj_`&wnj4wH!_IA+*?-kUNl92-_yd?qaL4fbg-#Psm)stL{oZt z7Goak_Ies1O&#mYG37$3)Ze+^U|IuJ(MNZ1TC)#S7jU9xosDFj3LQ&U`-4HuN!T$ZvpT zxX`DE`VGOEqFL>Et$wea-AQ_G|2{3Lg|?}Ot{wkz zs3N}gG`UXKZ*9oLSp#nBQxR?_HH7m*!dq~yf!sGuxcUO`Al^l|E#xus=^2fGxybf) zH+*Yb2jOaqEOxBYZBp?%5uPx=iFSFvGT~3ql;|$~Gm%QT_ITRA^jZDFw6Eft4Q1$H z+rWvb-=}x`q>DO`x`|@l!BkYV&C#uC#~skD!kTtLOTa3fbP27nGc~aOz`oJ2Y5L&l z({)xU&+!R!H_zT8wMx}q(tEr)yxjp|vYW)vp)$ZZaYMWC0`IU(YL^t`CC3D=FJ^tY=k!ksyho6xUUq^%3yZA57 zYY3H%UD%Y@djSBZKp4Ut1)j=3{2Nyn$V3rR4$K9GD2(!MB`N$_7%iHD1pd${>zp5L zu%nP?HciR0FR0&tY?MvK9BEI!n==%w7n{*GpNVTzI>7Dv{gADc$${rFQft8w(n)x} z4~Q?V=g#)R*r%SwEw!DSZHf{RqAw>c6bia-c=NTa5p5_|*Cc|AuEN_If6niUP(~7f z^%^+DF+tnPhk5R^0b&zNEl@E34-Vw`7U&x!Gd)$y@6g8_5Es4kNqbF7vg_%QkYJM9 zy;G-e#%JoS;sjul?LN|0c~FQ#X_$lL*GxQ&NCS)yG+}AY%zNdgojY578dtZGNJtoo zd>wq`GniO}U-f+|jc&16SDx}<9!yG-qWEQ?Lnmpx{8ssCP@HzO2{hTWH~v`Dy4VX^ zH%(g~IC8Zs zK^#EO+WH)Q%JvFz{>FGsX0S}2%SAsYp}RcBZhj_Xj(7m^y5L-WFhy^OgL$Sr^h{@y z#TiS9nVEgL={P9(*%t9aS^>-dG7`bh(!E#%^Rit6sas%+AWvNQqHQ4w$D3P`c=fOA zELZ)U%=}v^3UDk;UCU--$1V?^(npxDgFv|NN)>ieex9$^%5Zz^LZvQeVf24!^Tb(q z{tS|2`DTDK-{9jMA9ct)H9*Y-h4NsxpYQu0e)p~zs>Q32_LoJi1ld7xh!EWKzMwlc zM^zg>)pWmSW1~VP^%twhdX!~`vB$I|1yDt14kUvBdx?CP)zzB#xv}J41}cusOiUUi z4Ar%Wz`8IA5eJXn&BtSx~i~K@LT^2H#RY7mU zWvCE3r2LA_?Q1=Zy~?cK-V=xQye1)KHUYdUJ%aXMsK6}(^G}Ks$=!^@)5?=|{TkW4 zj|Qu^zxt`=pvC<0SKKS1j5Nn#zF32PLgpJ!AlK?K1J%a!K+m9F&~B??bYOgDnaFn> z$VhEH9@FO95FZoJOTkb+irfrVqXrhe2sxHQ2ieUyPn(PCQH9z=t554TWFx8t7q6t|Lso1HI)K5I0;BA1^qaj z-V}S26yG#CabnOPPRUSHAA-w0o15ShGg}(2y)e|W=p-aenrN@RXUQSaRugT}J|U$) zGce3GAy6G>vWAnSkMKD>b}c4~)2+waGP&yul!%!04k3Pp&-d}a*s?e3%UeLc{PNGS zlv9<2D6J>MOTRY}vWB}FhzUC4T?61Bjy$f7BWF!1+hajYB1&3*4r(tION5$1goF)K zrXtt)NvVQ3A}2!P7znR~0jj(Y94oK%7$X?B;~juh^b9fy2eGL%I@I2SV2#A4Y_W^n zU9#aSRl*EK{Jr%}|59#!Fm!Qe}?evL5rkITB!~}sl16e-<2p}JL!o`VISf1Y zFA0)PB9zy~o(Ou@OW0)?dlzRiJ2Bb7N?4@GOi88ImRM`I>7hs^!kXL4!?Gzv$TI|) zIToS4-y&yIEI+4Y8cf89CO1^X;DFB5E9;AMwl=cO5FJo$mIruxE|v_L?`fB-tN1HG z_9h$_*hCyZ>an!mYqP6!GKihhYX6~T30l+7 zD$PsJqZ}M#u$lj-oFh;VrTe(wrYRIZ$nNT}8A=s>f8FQyDu3bxG-ixxnO76?>^E`1 zBC5QIcj)pE;iFba4iesTdj|J3a`I#N{Z3nnueAUE`DM~mGuy(sO<;~*f5MyFk{`q8 z=dNtXD?8eocy$>Coa8urg&ouAz-1oYd0A8-9G{T{%K?*#S?bLefkq}=uS*6-co<;u zvm^5nf7n}n=Fl;>t;zt}@XA+&Zoq>hxiREduf7`pNZ~%4lnxdPYK9MqTpA@;o?ZnP zS#piKx;jU?NR6Xk;TmQ#_0{G}Hqx9~x6Nt)N$;@xsO-DCoKnSJwSX0>>uMy4yqy3!H`PmV=?d?hf zY{u@9Pk=yQd1f|&&?yGpn8CKUQ6K8vYuY(S%$x+(9rpFK${@{q=564NWp_sN-CO$0 zv2wY}&$>T^69xgJc}ntM>%HPXw)4u9%a0%f!;X=xrZld0n}&sb9+9jzaj8SU;wZV) zT{`}Is}z{}7g`0X9A_mt0Yj2Hm@(-qWXhgiR}_KyT1BPRxzFNiGC8ctn8c9r_9?yp#T+ z#gFdX^m-1p+Cn^<*LZ5^yZ3{G+CZ)tiv5}Tv(jVqHJ2#k4-?R8)o?@danVPQby~aK zi|mQDnejOUSmHDoG!mr2p$BRR?`vI(Uw7VG2cdi{`D^9DKLli58RznmOjTipJULB} zor_e1l1N&S4y=IpXs>}I8vs_*l6PBP;r*{K6aGz{X1|gHuPI*I8NbLj^9=j*j)hjE zjk7i|fSbj$slFm8Flz=7m-j5_*{sHO7Pr2QEO5n|1H}xur%k^?cC}0ki|c(QaiAaw z|Ck;S&R4_;ZCjOp?u<1E>5>wDzIt9gzk^il;IilbCCBWbu~72)%paRl+%QG9&Qp*@ zw>~lG+3sQqmUqVI8WlsKp*n9Mk)?2P@6ewyM0n{4$jCd-^De*ar2O{fY6W94V}j9{;u!6FEeCh9 zd=%H?lBFE!5sA6i@&9brptrM{{1?}y5wI3jFuftvpD^v$HqolQ#wHc?mBv_;nLebC zM&ei8Q8UiiOd1PffKY-6`coMW!9l3Iw?1qJbf0?!eyq9CO&dzr2Cq_$d#2Fmx{puFM?*?aiTNn=y*+W~6OP;~Tv5c&a zZzU(~q}s+Gm4Z8yHm;E*b4Ccaryh|>>mclxIXIXMIBX%d?Fh8#5M7nVf&7C7gz&DdG0Re7gevS(0dsel4@zQj8s2i6)v(1aATkI zLWWS(8S5DeFFu)}=4V(r$Vu)?>U>~&njhYYi2zoZT$~&fI%$MK4PE;*iJQ>)sP7C z{}Rv`_I)b543>R--LFi<5gAjVGvCJg-mH2GyjjmxUdgfXDcF%S;x}!@vy(GzCoySd z!)d_fwAVh8fyvct`VC(*{sCv`G@!cJMm2k@L-}sK7HP`$FIqYJABtL0ad7qqE`-YX!pCyjLDL<8bG?9C9s*OG|bU~*>{(6%48H!Q_4n_C3h+X_j@nSM8 zWpC}yt1p{Mp&F;fr$s^V#f?2l<9vfU$3_$M1`cM842(d?@Wjk?Q0K9ciOt;AT{lP{e_ieLx)?VX zUa@ej=Q+wROOC?7aN7HuQ6dY2`17ds*kc->`O6%~)JHX%H)I8MTsO=-&Y`Z0$Ec`w z7LLzAap5YC!44J9whbv8viCH$C}um)hhNBnkTe!PSJ@xcpyJp_qLK^!2#I+u@DQ*t z@eIQ2N@>f55N4BBj{3i6n_cLVvteoFbOXe#MZ2Huqu%CK^lOoc8p@9wY97oMWvEJ; zAu4K$Kt&5>fwjb5a$d!EI>owl3mh5?@$1Lu@6abFYz>~Mb2ZZEfWwpwW0C#mMf9}A z*n~ZUI4pUKC|+b*#F~1}QD0~JUQ6red8wHq1JbNe-JTX|sQo&&D8jIg3CeVom~X&o z&wRsdLGIi#!E2lW4K}VxJ|#>1xtwyo%<;2m&1uQjN%LMrUmN9B+ z2)z~ciqTI>{+@0Ag-`h-H5+Svd!I;l!q@*q4%Es2_hJVD!T&>*QDh*u#YX_XuzfG9zI3R`#6RuYE{yyxWuMvOtcn-ZCXsmJ`M?Q$?Tem zN9y+c58y%#TLpMzl*oLLZ=e?;rR!?$p*$r$O=Qrl@VV8UZ@A;3&VqA^DbQnj2`u(OS!KNI|=Ht9vEdqZ7qLyfchxPL2|DH1`Y?EC1gYhJ2B(mO#(vwiX zvc$NyJLa zI;p5@6jixWhVGW3uTEYYV(Q}PRRp+&H#3JN>W*a80n2Nq@I_`$%eB~&(VyJ1g-WE5 z4Y&pJzGCa3wEq3~ba#xE&Y#lqd_3V|B zzJ4DeU3S9u@%9WYL(X`Tjmevk#B12U`t?-i^AYgrGRVmE-)@ojgj0sbZD-1@w)x0| zZ=HIuDMG%5lZV%agc#tmyg7#S=TY0KY@`9-yU$;zmUJHObU!J&;5{qfVb%-_o**F;u&3O0a4Lha`V z;mrB15s2>f@qCImjD^mbxP>5RePE=Z$VRn@Twp!ewCt7VyYq0;JR#x08=4Mi&Q{d- zkbYTb)=(gqxPeMERXyWmv4EYd+Xt&=$DV%FJ~Yx;{hcH4hvds0OY)C_!6qu^>6tM) zFJJ-VP-=*rYmG@_NC88X@L0HZd(+yPrIaaP@Z{m5^YPAtP=At?ba*LC@C+3d)wPxO z&HC0puDd%P5ee~brt_vX51-LjqwI`gc|d)BVm+>5dM)1muHf|VBBbyE-_hwYPv6Ex zkZ`b>X8gfRD>hd4sdh0Dk)d-a@jJKA9I;Z<2a_S@{!H`MfRjk8lp0;!UfL%|!aWWUCckyQC6D=_xw-gI&1k zz7zP)rZM>R;;f^?ftGZh4LdQS1{o@WIVrHOEMued*!lQJI@xF7=eu*Mr>LQ|QBvlp zNuUutKNR)w0Mj*Tx>FJw%6~{tP6!KpDfc^XOx*6$T=X_Tiu?1FCo?B2&kU=os713^ zlGOh7@!_E~tn#Ve)eyUp^GP=b#*5CP`$J`MwGiz+tK=$7BO zT+eihUSdf^C*{-E1}~$#<<(kw`LQYsuTbn}Y8~xldB9>8pDn7zR*jmXYI{Tqc6lTZ z-XI_{M4M@QicYr+p~k;kkHjwdULX@Ke)-$I{yjrQf^FX;F+3%*#aF;3ilAP{u&x#o zi21d>j~#AF?_HvMCy6TF@5p%j{<=3t=cfhU>ISBSE2g)n2IfCP`rQc4sKjc>L#_P2 zt#v)2tT2%O+~V0QX?Jg%Win>0?A73v!X;fy6FD-V)SWR>tZrmvA(}M<0XLk!P*GK2 zz9SSrmykT#J@0%)IDD|&g!{TsK{$!TVV_F4#qGIuVoMr3`_-zZonh-UFaFZ52_fFM zH;dZ@ezzf49%LcD;XD&lh&YpjM3nzyw=kl82o-PDbA}eG(2izJLN#L=@Tcd=dibD8u?%%4OO(#SdNLtCoE{$WEk{3R;D^x(r zqXjXhU0m8M(QUp3UVxa#3C@!f`#*66?$7`v^*mPh)Xg0O9z0<@q!9QTB#|K6>&W*iS4fI1OowlYrmk zRrO-`F@5F_U0j(t5&Be`N0rw?B?&|K7?`bju>K#J?Gie&WGz14ph%=|ci)HMyxByA zrG2aFmO1l+DGO6}fcN@kX=aY_G0dE+`LXWe1-ru~H1rS;yRR=#EYV?hA|avE8J1!I zz4j;#aJVzj1B^D629?>gqKxBqXK1&~&epshwilebwy^W~6CjvlvxVHhJ(F zF7KA`^0ZZb_sF(;Pga9nn$qZ`U&0>7Yay9S@R3s>8cJY;h?{c~@WnYM9Qgam+w$pL zQP-YsjVKF8NGvYUycL{UwPfCvJns~H`;7a>olb!5rST2UZ;85RxjY9eqwU;VF^HAT z^#FRWI$ALSa*3=`*SV;qr_HPD>!BlTBw25{bUB7Pmqv=C38{;_VIs8-Up#Cn{!~70 z^SwVjKTF&rzOq>icz-YZL7r5k)qCoM7`{E<_)!S=V5#W5kTi?nx3J!byh2Y_dg}PY zaP=y39n$Spmn{x3L1A#{-h%(-I^--0-wXTo047GLT|jo%liGvS3fuJ;t@d*dQHSyt zg?CGL7m8_uE$A6kCN{!otI_sn=CLZ2x`={V6=d$-!*?mK>Gg-MEaTLu*m(bnncp^T zfo%@*K#?Gno5?jfytMdL@%miBypnNo@pi#wX;I*W^RTn`F`7gH7}xYc{O)ou?A@u5 zPh3e}2EB3ZGTEN`4bxDrPp)@J)Y2+?T{-l;7U*=l!g=}pSrI?R>;flye|H3EsKO9w z+a!EHKBInkdj9){_G~bAEy8@#6bqCJ{G9H=Ba6Pacxt;SL*VYR1$|8kcJek727}g3$!XhU8+iY*3nd1OohLD7xZg5pon)kev z8B0sTS_w;Y&gPO=Y7aN{)E^EKrt<)`92=Dyx`th!F{d>N*S_#<(X6RbbRJ209p04S zfoKp&M1J>HX)#IhSqsQIB2&x{iz#w{_9g+}OKY}TMJ1%S@FfKFw!(49z|P=471xE~ z&tik?W8c)PGO!(EON)2K{n(Y>#j3Za0OVhHPWmB(+c%rZtISsak}$1B2R6SeorBn^ zvxIG7&>lVv0C2q`np0&FBE+XC3P75+fzgAmJi%hB6ibjyQC~Fpz!55*bOq;$t^aAG zY`R0)_M){%i|o5lSb|Jzl-iGGzYB}N4@$`_;#zPD+njFXrCau+wkP5E_7I4j0S&E>h(LYadjBIxMkAuP;9g7+08UtA@p$496DZq^5zGi8@2<#H~55|Dz=dr`Tz7j1SCG6^-w z^|JQ@8x95(pcg#=<@d5OqwVOyx{=+Sjf(@7nMhcmG4WxZY5dv4hf_oGj;F zuXA7|%jt@8w^ zQXb+_cyf+rxW>*$qK{`8nl6Sm7ZFKvu3Bc2j9rtOwqIdydEXZ8UoF<5NU8$jM=QNM)V0DmDKiqasLhjvmnst%3+B&FPQ}biz((KqKXTBX*WxMnlCl7t z4|tnOhE^91U7?B7SnYC=kF8d!7O1)lu*#>Q7S>{PbT$?s5n^5xbbhX0;YdyB(2SGM z*@EBbcc%^h&Xy-8`EZ0+qj~b}pm_|QC$2b!9z6V-7yrEt(OP*M*;T6k%lHtojH!}@ zl;Kf~VurU-OT%Tabada`Z10%N#whD`+0L{uX8*{Qmj0smY#s#93owRTdn+m0czETs zrZ8o>$q<4SBUj3N&=FC3UDlW;p;LT$?6Fic8f;Dc47+~!614Kdo)pEt=|QIL*O~jC z9H8pZ>GPr&Upd$pW*PYSOZ(;$m+kf?N-|8rlu!y-IPpn)U%6>}z=kH1>w&qD&YZxU zoM($AOcHF6DOiOkk+r%r-dgUfB;m^`X&|#}4gbhd3>>E*BM7QX_u6%4psVt+GG;PV z^wfG2869TWBA~&;I5)RmL7@5dyj`!bcfm|paHzb@0-+Oz7Y(|e&24>>;RXS zS2^ZmzIt~H7uUa%CNvGZyyiX+ccwQXXW4HFP`D^e+lCUeGLOmIO}1zsx#Yg1f6W)S zj)9Fidt)?htBCT4mRy@U@tL8F1}Y4I6wQYd>Ynh|0jIBdT|e6qd|3_pe6yVy;(_4s zaNGGX49b9Q4ms^+hemz5K?+NcU0+%Cq`Tn8WO@_IFsYE*5)cSQo)#sLvx^>&x~0j# z^Sg9^(>So^M@_L3m&zs_kT+ZV3>onz>w8VPHwz7NWNB8~g4W-ryp#UR?FyB}ulx@W zb!R&h?jg9pig)ALPQ1PEK=MY`jiT=Q=^d<`39+e8-(pSL$sde)L!1JL57Ure;m$N&yzcT)7|=y|hV)gttGbAyKBZrO+lFj#mC-IMupuomH3w)TZ;b#IzKr?Uidw~!tVxb z^ySWnQ~>@7o0Qw+f{F`>K4ns*J{Jt5(4>Y)bQ!}X(i397-nQ7~5QRW+1M@iD^$`3v zJ|~`YX-^HAaJOvXWQD}8)rAsIJ|&~DGPrJNgp#X$9dr6s>=_QZGQ$>sl+UrYz4KOM z?3c-Pt{l)pgx(c`y;aF!hS~o%(DtC~ve;pgL1(miOJ$ld;M8sN`$X(ZpeZ`sm=gqj zZS<0$@vDKKwN|**7dq#L7CzfA$HzlXHpdnl2Y<50RGpI%znl0Blv9Jx{qBN(BFZ7D z_4Ovp`ad)^qOQBJLMQ=ba8vKc8yi}lWpSQpauGDhZ~--sm9L(R1nQIua6GuWJ!a8% zS(ubt*)6>OL_RtEFX^Vlr`+Dg(^cr-9LRYrtoOtY?$1&FlAxBIfq~KZR}S#NU$5SS z^IJFlc#|;`QR?96Bm+aQusC02Vv^TmL(4iI)w<}|mm9n$KJYM8P+gJ1H;?F5&k86r0auTE~{J?{^sxAx|k z3mHpZ9bZYEbDjF5<6mti9_}wLw0uPo8iX3{muI5hH7gjRH)o{2%lMJ&n2pTrRf>XX zJ(Jxy4;L$sjNXY1CQa5Ddwe3Qat^H&V4O@^7wP>)cqi=BdMWscQz$|oXkPhIwWzJo zyd2lR&p=u${l7Jc5mPJJB{srb?SdZz8+V#EpDmh3bI^=pz7bPO*7PfXdJ{r?wq=+S zRg%ExM>TE?B!34s=E0{44ub+Um5@;gnNz;TY&QdH$lEmHd$4|_ME02 zcfm7SVW=v{YLgPG|2bsgx(gx`5ovKn?sBk^tX_65 z?zqjXy@5iDfSYu!?I`Bp^K2s%?*4qBF(T3Yp$^nPGT3v;<}kewJ*ym{KL2yOV^vr$ zftGteNw~}iWF!UpY@!Hgrx=TFH3VG|TZf{UkMTBJ$FRoJ=N?y=G=lGpX1kYK%(84A z+6jI|sN4LIt3w3p{6<#n&dy!`3cZY}^*&~2&zFbdl7MuEB%)* zkH8P!a*_O7_ypRFou{ZG_O_Kv8@-6Ifw}?6858=qk^-&aoPa}9B7>q}m3oRYkSc&it z!8p}f-%KPRm<}@HJqR0-w6keLk(RNx0`^kBOd+i81+gdI&cjr<{5~<<`PeAOT@i1i z{P5M8Zf@%-q4R9{?8yev8z$m%PGfw25bHOG7ImL5PWM6CQ>6*VRLRTUPc*}rBM57Sl#ue{K0m5i}%g_P|C1Lb7NT~fFT(K$D@ zjp8?(n%8b8)}$#u9cnhZq(qcFS+&oUR1B%R|U&1I?G)Qw9Mo{^fzoC zHL(NH5;m)RwHHe7^vJ1EcWL8bgH!sj6s+X;m$w!_uD6%k9pa)l9CR$O9x9aUds^P` zgut;4b8Iwygg3oEE+IG!PgH#O;g0&p%a^t&R#cLIXDgN9ey{p)Z)x%G%@P&zE@}x? zyMtPq`fn{!@;A?Ve<6j11qpm?7qJ?niO)Yvzj{CnSV$>WAD+Cyyw19n#eYV#Yjf! zc6^4L2;jHPwX3wxMf%B8L^hp;-wlV^m?*izn25RN2jqK?xAViPkp3|-s}IW3%8DKp zB!4Be?xzS!2=Cj?fb@n9cx?kbuN`E(J^fx2KQRtc0;Ag?NpT%>xl*zP^tZ%?J!#D- zd6*dXx!wxCXsy+Doc#Ss6(F^2r(xsql3@D#_0JNoC7mPx#w_`5OyGg3?k6}J>LIcX ze8T>z$A07l(aMU>F40$WR)1l{09R|^T3nnWt<&Yn82#SzLof0AeiPOzC+w8qjs4q8Jf#oA6~L#NYkEHW)H(%xYrr|uzl z2vgw}Mmn1pZ``B4xE+z_xauL8HJ(U!?c(`~WUpf}_^w>$dP(OUiOv3D?aITWyL@H+m*gh4`_~K0DIU73B+O zfKfcRdhLsg1G%+DcX|}d5MAwRT?>-@lJNwDtn zai+2gPBB}|cFY9*DD!K&O%3+d+8Wg2;KMXxsK|J@N);}k5dBCfYxITKK&F-#{GObR zmGINd6mYJk#g{sr;SIId9L~;+BePO(FEfhQ32lFPhFK{G(zC;JcNa)Q5lhMNfgSD@ zY*&Pza8o8fcIkqf2GpPp;%X25r2OsdaK@f{b-tN^l&tI*n`5!aLY?t~@Kzm%VSb%Y z8M3zE(&IH3>)ZL89)jkD)Q}J|^uN~BAc3o6Pl72tHBrYLQOIx`?m7%VFNG0+| zq&qs-;cRbCkoyyMOolJnuUIBjOjvyKl;HZ0`R9jOQ;a4!Bb>*~Wak-!kWjzJ0iY*> z91=Hc3N0)ym+cx6$oVkKX^uljxA5%Jb7hsSS%{(J)nwbB94}oU$8IoVo?I^Wz%hqH z9|bh#&|p5Cul##|N?^}TeJLa{l54d6oXYh;Obflm%G8&aZr*jgv$Dx~Do^Ui3oP}h z#Nuux1bCFt4Gi|os;GG6DU_U$y!)_^dQNDl=FA*0#aED*@2nnuC0j-5bt)xaJOhSl z8HFU>y+>LlsKsCbVw?STE&a|-ADzUMV^NVq6f&Phq@Vi!FiYy?oJL* zwV*m*yS{k?959_N+gWEy6Skw5@t4|scjg^2T3TABdmX+z8Bu-F46p;1HGrDs9ghfK z9-lZ5-xSt4eq3@qy9F-;PlbsWKFJ$-U|ExjS!X5tMa zwKX~xYVolZYxyE)D&i_5aJsv4d6E$K)N?H${f}G!5g;8|Ya_=aTyrkB&3})YP_mi# z*a8`|j|DQ93EEMX_?9QLMNrlonW;4IYHz$-sW)FsZ!MFar8O!*xeL6=pFM~0D=Iv9 zQALpc6-5Bgu><@*y!{dS0_13hg{fX&djE82%O@O=s=JB;w;{XZ#J=|$zWq2sXlQ!X zJ4_||m#qeE&*d&0r0UzGD%?+OP+UDhI{0)J%D4)j?-iqE5PgMgI+fIsWxc<(4#rha z9JwQOlDo*UU6#09hmNhnkvURx%T_*tVR6zu)M7>5T9_mCB}Rdqt>_8CjY9g#dhZZY zH9s689~HaBZ9?4be=ooR7P+`ZL4`fJ-D?1whx4Ml5hdlmK~t-bh$4o5MWDpZzK`ol z^Wg#>KG7@xsKc2itGb%*zjBPqrzYI1hfBCi&A~jmsPDbr*@9gz1Jj4)1ioF;?Vp-s zlPf5}00i9nke;&CY8~%DZrc8+HWPX3o8JS4BNZxIz^izFT8`a&_LhU{jKLkVV&d)3 zQ3DhNE5WuittTSCPmAns7Ra&RrV`AJu5=HPAwnLksAOFu zcnf1J)7qN)3UT(>Eb%}K?DP%nZCNCDzS32>?)QS;!G(&)`DINnn95u0W>U#@w6ZyO zfX64{h1Ww@nn z;@Q}cnPI6hF;Ul<4=X)8zxyxOu;Mm0lSv5GLz!l+XIhKeJ-{K8HoU+OcZUyk2tvv- zanX0}?_4tX&yaS`>x$N<*4u|4w&TiBwJ0ONo?$$`j#_dA9}8ISGo`fki>et`^#0{MYh?IMVz5+zi?FD_2HCZcJ&)#Un-L}=M;jN3XGKx z1K4<9@+W4a{s|`HGkx*_6B>zJj!7 zs_&gST;ditqk=WI)tn^RUf5n9YdcG&@)40z6@f#WvPUEEa7OM>E<4?g6 zfEwNU%u}@lLN-EHATt0Zl&w;eW(Vxu?Rt)hI1-L#dgJ}&wNb05#47@*#=ekfvcI5} znkjlNsnoFLkjt3f(uNP1rDtHu>W3jEd{HvTlNQYhyNt{4&08#4_Pe z41RVr^*hx-`dlZ4o+hF*gxP%$Aqxh5HbX}t+*~g-sHqDMkKcWx28JQIe*NVX3sGSw z0gu&ak3ub15CnI+f%=+oatMo7U@;fyA1HG82rTHzBp+A8Y_pl`=ORbj3ia} zHh6NZjnw!CSN4m?n^96R0v1dsl!lilWevacS_NGoHYY;$o~WYqIv=ydrO{W;#;kd4 z?3-L~dN?`RrOPF{LGXybv_hzq@si|S+)^JZ+XbO~69zLlluZ{BTFsnMCcT8`ib?F7 zz;k@m0% zoN8hs$50Y^ZH&#rQ4_U5V z{y;eoJUFK{=M>kGP4QK#nUAD;IyTih!?2U61}>hjo7xlg*^|M*!0ooS%E<8wrCw^4 zsSkRmss-UBbsNpY(7bWI{u2s{y!tDDa^2ugEbW3ECo9>6&vvau`+gYzwX_KBdNf(0 zc=Dza83kF{bX5$Q6ciq4y6bvD;V`J5Yfs2aom6}$L`u4!kr zt#0cu%T%x3zGFK)V_D(h68(j_dGTWXZj#mwzWNYt=1HDFZQxV_c!)4fI7bJhO;+t& zTbet1W`2O|NL{9WyCs-;`nmqJqYl=gZo&lQl#(8ajLV85#J4hb#c{ZW0x?2E`e3T2 za<|{W_2)C_ZtckKA6se9*lc{h)i*-e!N(H31p2F3e!#`;2b| zDn+Zwx7fNjKWw?MY&!NNVG5mLyi&=Ems7UEtz~X6J5Q15yz4vFbEaemPce_4og9y~ zRI=?c>@CzfDI+IzHu{e)E^rvCzvOs(3uxeuDfYa=R1}!Rk#Lc)>qMZs26gJ{9*(J= zN_INU-uZZ9Us_%j7J-#$go5l)=^y$4Mq3qC$eeBRA8388}_ z51Lz+VI7ZxE^ndLdX*1vH#0b#((>%jY`si+X5`t$7B8`v{AlO0Qki*@Xms)0ocP5_ z5>=t%6PYhLFZ*gH_;%9&<|c)NUU_+m`(hi*WcA;KBcwHQ4pzMJoKeG5@1a6shB1leB?Xo*YYfH1wPvt};<6<`jj*?)^I&u0UG8izL{8nJ-H)#?zgbTG*LxYyTXmvMIlSfxdqtvcWB2-nA}?noB#0E`L))7>$^TZ=2 zNz4YJ?Ib^lqKlm-z=h1Z*pt)gbvh>dIO^x0?9tRjK|hx4zvbrtHaTmx+{%YZOV%M; zyqW8V)dzEO{3p}nKYvYls4|bI9yus0HxBm8<@QEgn8B3SrOcqr%Hj-s!^%^a924R3!>?yw@HIQNb;I|#)dK+fZGE#`%LCh@nHwL} z!Wnzs??4$yZ&VZeAX;vlczciG8gADgO(6=}cD7L1=7kPZFf9aa71 z+x##fJqUh{ZS1=pAew3oWxrAB33wZ=J?H2df4b418dPv^>L_-eK^z@3D|6I65PDP| z9`pXLyQz*rUce8|IO=<(?e}&ZXO0~w zoe1fjk7^q{W*=>AF5;PxP1+u;^M^@D+vB7~nHmYVKd#$ETbsCqg_=8t^8|TleZ(^@ zt{mRu7lUXU+^Ti3A#Sy4)Y%i_hF8iQPN1~|6!cy(?CKu+E-_!;_gh}BVSA7hHk@)q z_`tDdnB@8v8R&r&^}f6h)WW&)a@E^2iiqsnnT&G+H^vd17+d(1uxb0 zGj(bcx7ElSW1LeAtW_m{n0E}Kb)F41j?v#=rT8sxWUYIOS6ix|WvBl-(=vme5z?}q zmBmnfFfDT+KlKUVJ8fB0FIpEP{ZY-4JZ*Qs>o~5A_PunaebyOfd=+f38LQs(7lQwle~AXZElCU41i_T;pp#mp5)ZG<-`5PvSpQ59y( zgkRsUw)G9mP8mq|Q9Q|e3hseekYv|2M`pAwp0%;6iQxw{roflw|lGx(6O!k?ihPzdTmlNTpUL_35YZQHRoX^9GY626UESe0-rN zzHQVZ;ehdrI7hIxINUUV?6I?Zp91?gtKs3Kf=e41p)4Rsr};jqYSlm>BZL`JPuOd= zihvw#AvvF@7!5adlrdia5!R^rX`{J3t}i*%&o_A1E}B#GqWIeG((NnQR)1a_BhGtr-P+hOAv>_ zn^L3Qm>0qOGhb{(0pbWrjLZyOl(uz=_wY18s%d-Z01`%Wuo88EQj3zr7i`J;TXk{$ z?RD05{v6i86S{;K!#09vpGOR`&U8GOsf*EjezhU0Hlt#q8XoELY1^M`+5mp2=uD-| zhHXC1D`D@GAzMwB1Rz+rNid0_X0BD8mlJWn4+xZktmkn}*jos0cj^^(jsUuFqAAT% z=fd%0p9?d8{7nqab|vTyjD(UT50L=BI6p_b@SJ_+7&EFl*^TFogAasLS86UZc)6~Jfq_q$Pi^gnX>C9mS6;j)Rbi#>do7x`XQ@r2w&PWAH+D#5!wZ zEvwLJw8+E&gs-u-vFyLrQtW_!BmwO0RSk7kj8RK7dOM$}!5+-@vG!FZf#sfJ7VOjv zaC-D0pjPi8X&k_@Y}kkynTx0SYZ@8jRB=+kTh0jfHT5bqXX_}!!foEj)6@Ss`AV*8 zD+wIw(LXfe<-zEG8Wl|>CX67Y^lU0wxQ$)YSgMxMsM)k>x}|jJUTMmHv^6~@NAWNC z_s}=gdZH<6>T!7ELf)tH%=L)=f6?9S~ec$%ntyh5zLX!_q>&Pi1 z_Q6D$oR5lmEF>!s>{A8>eZ;=_ph``of?tKZ&WIrqlx-XVu;4OAFlrpw4A___R zwRM3R+o(g0+77({`z=7r_la!zo(~X$hOw-bgDv&u+qzDwv5M#T0Py|J7xGaLEw7DvGDQ4Fb;njpk7ey=BB&C^g5yF`osq zB^g9`op;`Kzv6GpSML=ZGWj=bLj5N3@Y{kqF-bGWh-e!4z0LGc4P}ww>AN%7_nTp% zAh!!szXdP8>j338)U_o{Q&NMlv#fZfJJP2F(&rP(**8UBzE^$2?F5vn|Ew8NIJA-l$*9Zh$WhxH zk7}JpvQm`W1MjYYBq$rjbNaoTGh#k(;mX!40_JefqqL^)#7g>(xGQ!Ik1m8B~X5Tvg7Z9M^1OWp0J$TTb%2S>p@5p z76qr3nKvCIy6GZ3q!rT0_;&1aAbtIeZ)vTEf^qWeq}*39K;t#y2UT@i(zpB;g<1wp zSV_SSXXx}iy2n_Tu|RjWGIT&l=@cB4%wD*?yN50x)cWK6hWdp!NpEc2VuY^ermXU&JcrZ*z>Z;3>^^%Q=NvuR?7O?N>qdEU8;=MP zQdOBhc=Tw!(~`=^uI2e&JckV6Es{NHM z<2gG&x9XWs#8V9ChG0T0O|&55x!u6Z6UPZS3c<4E!!rHn46v@a@9HT^VwthURovVa z?l+bvyU-WX5nu`#LeQx1ML@}Vzc42J3vy|Fy;PJ#{>Ckdg^#~fcITUpt>sQ`ufOMX z!UfG2=cQlNB?DX+Vb-(k@^RH4A^391b^tH}d9_Iz8AT-Nc|zQLdBQnT@_^64;33kP zbdF6YPd>Q5(7;%gi^+UjwHxKeXbcY%`<0wgWlyhASa_`S*X6d zy@4>uW_nk=(61CRqPLe4%N2Zm?c^pYl|(Ta1GRsDpS|fXVB9K7%GIpNeHe5?<6^ei z_)%0@ukG^4%7fDBMZ{#o?QzlsG0m>cUkBC(PG+b9-~dyRXEFUqu#5CRkEx*a?3Kl* z;S~=Ygq7dm*?u|sdyUOM_;XTsacPzZV@-{$Gq~W>PdR03bvsb3NlVK$m13G49vtc^ zp`tZH2k`Xu_xCQ$8Y~Y{+y?XIiTWRi-2Iooq7?g1f?*XNNux2i2-oTL$Y{X`t|+}M z+0Wp;P_STui%YpBp1@G}4sApONBZ`OBOOn4 zIy)r|-uaMf1bmxi5h$l9J?ubxd)m1@XT8erL)%Z#d;edM?RsAW(_ymJj;BQDoEvs8bSncUJsPJO zFJz~6-=x(wjqX4q^AC5BHcJ0%wnDW`}nqPs6 zYMsX5IkKzq%R5Og?DK1m`gY+7+yx2oC1NTqgcBDrkBVx{oJW-XNqhp|w)P;$(1PY% zb|bxyB|Yui92bbmSy@>`EZ)TpHhOE3y*+W&ljPrv5LHlt zQQw;ifoBkvDVOA(r6*r(>fR7YhKudU*rA$<-5Ufb1wF$ElI0a%oq*m`mNGC@7!5rI zk?Wv{RCZLZE-#kHi^~FGhEe;9Y!Zm{7S5er3=y>x8A}As8@5e=-3=??-LvoLE_Sx_ z*3$eGiZ9?qrbPXL?8?PP=944I!ju!)V7RFw^CjnHg_P8x%E4AKyHbzBwmX`nG zpg;AOKhq2JSdj!|4;6m!pM0nisIF!Y$;WxF8F9<6GM_ad>Sg6TC(l^dh-T0BF*!G-YaRA~i}GqvL;tom8v$J$nv4*^czR zazPW#HGT+Ocv%7YR;?}iDR6*1&zMxuWj_xdL%J&OYrEaS!7O%t{ooT6BmW;8eNF6L z-_Vehhh=41HrV(?pie=$3tFxSH-NE9YG~v&Z16ll$LB|IG^BVq@eH~SsugqeH0Br> zzI|^t(~qR4q;bI22i3GEN=$ktsj3o9RI!BoidjbH6AD@{JgNI{^URyO(BS)#>%z~H zgI1>34+@#&LO+xj*I#}Dp%6YA8mI_hU4hw6AD>71leY4B|a^Y?|l_`^aG z%Mv)-4pv+O^(J%-_gkji)L@&@{tqV{SG!&H)1In1;Cfzr%0s#3mvp~={cV@yc9hef z_~F8gN3S5E?YJCHOi31olaZQtx2H|R2q~$vTl{gR52N8*yr3ISx99vtqO^R$LfhR} zvAL3*asXu10yJxHr#otO^T2$i0(OIggq}^bG}l>w^_6P-+fgBbLqs$7VpHE)pf{|o zeE~1^pv_D|@b~Wj(!Y7<4!`DVaGBu!b_w~s8aLwpFWWj|))$qh%msvCD_b$VWp3m0 z3?#IRYS)%6Un?LKm278D;NKJ1tEKitmp*Y{!NuU4$589^eFUUqOeOJ)1FBDR3Lj64 zTk4H?+Pbvo3|biaxB%|Kw%Jpo1m*AnCg1Or0aa~tvbTemyH_1z|AdDZm06~b30yF&KcUUeOZ;wWHm186Yt?|V# zlyjdFn=A+>@Lr2P%hB^O!H3=#0kPvj*Sp;3X%5mY9FFgP?OhOnLNx4J9`RuZtLTA} zW*BJj0bfxx=G+5ncr37&?D^G(?d@M2gIkOT(t#R@kcaH&0<0m6&G z)(xC%dXXaG(<)<^(h;gSO+`y7$%TTglYqm%uOvq@gQ(f#^n)@V-3VY&^*jzPgY5N% z3gdR`v>ZJa?(7T`82&;=>YKxo{;^}a6tKB5Z1%r<-8-uP%*os8JITM<0oM7VG`}IJ zi}l#L&|^YsT)qY|WAD~|F&nC5Oz3<2t)#=Fqn_THcaQ?sHM0;Z3ybsZl#%G9Xj`Dc zRQ35HPq9s;>+wlOQaYjRV0$^(B#>|kAyD;MT|LK2oq}v_`OICEj(sDM9khZzD3=ek z)@`{@wQaFM)Lc*5Fsmh4Lh$6tRIXLVZ+ zNt&PkriV%nGr?L{%e))hBxR_9@QaZj_x|;g^;$@>ERnTT%F_{8r`_&X3_kU95IE!- zf;Rl5@L^+e7_eHL+}%=CWJ}XyTh2Z+z}QV$85tb&EVxfsK3msvPF=tM->)IPOtVx3 zR;G1?bAA8*sOu6@V#uIv!FQv#?9<>p=*fPlP0IB0S}-N@LF3ob`CO>-+WN+l=!i(j z8OrTmxiXXl<#|bSna)d@pzrnIqy;bRhgRq2#N%gO`yideaqh?!-#Y!ycO&2kskUoB zhfM>Ys$l_CeP(tFL9Kzu2J!X5I&2k*$X^|zNdK9UAQH#K8e&$#Oj<}|VQ z?0%Bkc&eTFD<(X5>T}zls?DLUe$24MisM_wQ#AIZ;bA#H63O$Xyrw`O_{proaMl;PrsR*ZryYJ&C$xB7tgv?)v5dR*{m{edCey)0j$Tcu{y4fm3nXWC*m+6qaMQV1j~>Z%GaFiW zGoF&FcUOTe)Vf894CgHHo7gZ=FlN?d&g01xI@eWcFM{~Y)}KPe z(Jd=#$DHdoX}#(g7C!51poVHp=lehH&a2F-$Vl4Z7B>><2mwT*4i9cf6LvRLzP$OK z&7AAxz3Ql_S)j}$Wp5yH6}|jm+ji#=CUC%@_bI2yUdzKguqLE^J;tsB9C=Gxw}5#c zKtNk6Lf91dc%jl@y!dK|`k-Bp5bQrs>-myG*X6l*7eiS3%w*Oi(Dt8#+Vls{)ZcGV#G8KRUv39dAOhf8ckiYCu1 z4k7Z{U0omQ!NARpt_g1#7@8hlx*Hpw5$Otc-f}6<6XdR9wQ#};>P5r-S6nf;aJv}7YpmT#gI;Lj<&Wm z+Hs>=e4U9cxv^VDOK|+oX>_EkdHv?TapkG8&iE%2rB&G><@U|1+fo8CkY8E{v_kN- zoUrwW-C3*cUna|MwziG2GIC;jFje)KYrUp{8>grkh2abs!)kWqUvBF)K(25ogl28J zwP=7s8Mh*YfdBqHLpaz61pGA+LP`>K-A&35>1XcKuMp2LHytH*{Y=zJ>+xhyqfD~z z0b%=)Dqbo|kW}SaWAzanC-Pb6bCWrSwolcl@52AOa{V9lOwj_d6&NpzH zdX-{z0y(m?)F3h&kurzL|l7d*X)Jx9PEZPxT7>(E}RLtvK` z?t0uKC-+)Oq2yRzG${dWPN0f%lfb!ftek{1LW((>@b~VnNlPa=-61dCB z1k>`GwZEz`R@x>+eh0x=-RknHywIr&&%!tBmuGXsx=6Pvh0@^EMD zfeK(k+oJUzH5FXbOv3kvN1`vsP7j;57|!u24Hc#oZr@xQcoed;85aXoRIIuK-&s{4+7t<7t9yHdjICQi4G}dD5?@ApB2>H`*p*D-l#u&7N^=YqTa>qU zSH7=*H7StrkOL!5z)`a-;>`BGUsf-UaJR({ygLkwnBFYd?FpSqSv-Y(py}v%(zx?B zW!O$Nz02;}&18U=nRjwFe)H6Np1gF??SV}Ko5b%qT84jh@blOgGpBPduR-M_f`^iE6NYdip2Ooj27wHBaeX7lVy!Y~H|)BHN401E6m8oL|7@`^aS^s&z3) zwX5lsEilxEGyQ7KE85HRReQpxT=7K2JgkL3!9}olCIc>^e6I}0dfkAqnSW2g&jv^L zsKmcsiC%|_fw2$YGpKxwn!pC{Qs|;sDJd3(#d9ZwwU4?9#L9RSHp^-5~j2jIYs>`VHm{pjrA=CM>;5qe9pFK5u~DQ&~)N zkU?#R3xu10n`GW1n<2D~cw1UJCp!@C*>Wa&DIKZa6nM)``)1qvoy@P~X(^cqO0_aE zMDaedX>KB@DL-EkQvS~I>~y-LW^&%P&5>Cg*dm$rcbHa#jIomHZP97fq zI7sB|l{8fyoI@fIiIr)Z<@(>b?b6HY_GY^ZqDK~|Bni$CTTVdsIS_3o6P3a>FhsRi zv-eq0KV!X_>$9YKO?@}MCuWfRe=X{QM};PBAM^dEd-52r-41Qwr+-fO{1DQ&A-0(h z!WzO4QV9@C8~S(CE&U*fnzTh#2EmPT9sN{9N6qTifqqD6bd^hKx(l-^Lyop;%G_(L z5#b2%1A{I513RXGJX$UA2(jfL%im6eh;T-AvkNxYB38n2zgBZDCIY|z<4cNn@0~i# z{`Xk??Q7DfVLd}V_qI*bYRS{gV^bB!Wzm}hrK5_P21s5jtQJ(?b&Qx z-aEb1=pN<-Ru!eLkj8B?&+Gm{?mTPFUm20j5OnIej+TcMwA%6u_RNrmW=B}XMNNvq z5iD3w<3!+Vg_FY7(8Nw*T+U|(>aO+O1_sO%%V&1ovy}WIEhU9|0hx9w^Y0EY>_#j~ zJ&%OcTjV%epuN;w*=jaGNciylcjTy$X8|Vyt2@2NzA%3WaSENTQxCG_hJb!v6g|sj zD|AU0xd(hb$;H--6u{A<46>ccW%rKBSLo;;V0L?Js}-G$x}o7y^nd#!fV&3DV(N4e2{xvQ+dz0C|Ex(%v8uW z-+7bmqU=~pY3r5@|K&m`#6>%0=>Dkn3$@M4W0!pf%vkw8+M;d_X3`7T z7YsMwh@U7wMhqK)B&T^lXpTSDskQD1r1kPU1L9f+j zKz=Z{5gp#v$!t}kV4w|pnPYXxhR?+~m6Dpw97x{kEXk|9Z zRw((-yxa_cKu&wyw>`MBGl@Vq)r_=_f!*v|e61{+?nhc9IRkz; zVOu3yAEDe2k3G}d-Dr{=N=#6uyWb_W}!3?5QRaO0ChY|trBAe>wmfHair_aVV zjiy-`TmeCAc%EKt3PuswO+5`I=jdh0@Kk*<6SA^m4E|v5cpXSc+nZw7lIweQu~Riv zhw=*Ku|gOZCesLiC-U+21-c*F)tL$t{IcMn)c!9X+7x7)CUSpW3l6{!b6JDx`e|KH z-S6$IPBsP~V({CuA1wZ4@!Yvq^zknwI+v(1&3uDOl;AP4-{U`?9zr&2A!=(AfYKqC z_P@2ZeJ)Z#eLGa&V_J+Y4$^a^Jnx>@?H2K;YMWE?2z^O~ad2Kcnd0 z*u7fNCpfx_fKp9z&Dy&|1-~rqqd0tR?OXFr+uicSh)5TL+kB5odn=fTW&2BZlgCp5z_u1! z5IP^m(fXP3)Qfo|n;joKU-RxvDmgXdDItwyR->DU`|U;F?S=XFijn?zoLSpATJ~@H z+*hMwle#>JrMYRf&q}RM&{{BO1I}X??gZLD@c-HHEYmBUKq_?+eVlI}BT(0!zkXnu z!TC_^jz9N^Fe$jv6<#$W?3f3X^B?CT~FfbbTTAH^89)Y=R%<Q3XyWWGgyE3$ZeByj+xqB`fQz`+$)6V`F7HoC3??Z&mT=g5x zr%Y_%mJ=EQV3{yMgnI;qZ)VdPI~F67;$#We@dQy}y!Z6N1QeAMmRkAqSEuZY&F!pk z%Up9yxbyln@XOH3!*5)UH47;?J*e@ zx3!>(9JBq74tpoZ76Eg+jG(_?-*&sR@|nf{zjyUDYhbsO_v!EJlhuVGA%fMh7TaFB zQ=>2C?3SH+BV{ZtiwLaPm^r?A=PRYz&zIKis8Vvt-k>)We0GQ#rRju(bP$+$M6*O7 zLH(DSpUl9Jw`1y*b0UYIO*&bJgbgR?-$v> zJx9%~Z;^`pO|)vu*Dwfy$hEbr8~*(hv+&T-t((~mGI`%5;->c1jXzvdX%y0mzP?|0 z`sBzme3k;_)0Xd9U5CP{LcA~;8j(SjBSdvv%Pw1t-?B@3blxLdH_tXWd)@iz6)EFH^IUN zV+Y4>!6Pnt@Nr)epe=XGtSxr^H$J~QRg zD{MG82XPWhxZBomtX@xOCL%PMXenar?oPV$>o}}%XBN|FaK83}>^b7LF_hVEu2#`9 zea%C+Oy`04e1~XtDQBI6t+a5Zs`1G=XcZ=XYOYS> z1<)0FnS*FFnezV<-1C2eVV_=&U;;-l=fp-f9#4#iPXDC!dgq|2Oq_rY&Jk7y+v3fp zDBXMX+#!GfcKO<_JhS0?ywhus7VmD2$K zhiZ{%cOutYcR|Mx?j0I!==~O-fR!$%>7oavS9NV=MA{TdPaV)JKZE*_zP|+H`+kki zp%^JM(wlJi9yC!q?Qw4n+yP5b6OvhDXs_3lEN&$rcAf#a$Tx?4o65`G^THiBMr6h( z3t!JPkhVT}Ob3W`ws(H6!EQ;DM6Z7%qSfNpnbx@N={nOrp8iDWztc?WUEl(Ot(Llf zi>;rk(V%CG;smNi_C8<~gr0+h0wyU8BsUTaI@P~^ZB)iDO%aj*`l&3lXjJ=yv;AJ! z=;g0`1Vh`O(@@&&8{xAa?(jF8F@jU7r(OE06j$L_xg4GthrN?<+5Uo?&d==CFc`9y z!;(co>zPh@4hW=;x;UT>=d^sfLc&dy5T#=Coh@10elH}m<{?1#4UF7eon`<2{olmg(U zW}0}VY{2JiaM{yFlDF<)6!IGN6Kel78?fH1W$df?7tR)+C+9cqM9>mg=PLX}Et4~w zK=}HH%w$e%vGc5(y#pk1swi&Hx`~Jdgl1e$QH6ovig{Ur6t*l%)U+D0n<{ z#dXXdo;m(4Bh%KI6TiQ`we=lIj!;Z5LE#vTqy`t4HLKQzX3vX9qyhQDH6LmMreSsx zc`(MnX@fm4;tbkzP2>aZnge~?MK_a^14Z65)D*=-TFIHMh%boBAlK1sx=>(-st}+e)jFT_y zj`jd@NoqqWx|)<}F$y@ZBO+zygbwIdZ_cnzI!Xq|p5w(rpY;?1l#=cri20s)$^=e3 zGWL<~bcI@HuK@M20Bf}doWc|3u%)~0~73qnD2nw=k_c!Yy4v6%HIKt-|7LbY?N+`^ANWwB^f>Dr?>)f5 zAFWBfTdbBtR7V5_jl$U>WgxkT**I}43%qTMRx!O8`ADcm=)|PC|8Sb15hk9k{wRRj z`Nm16&i|#*zu*&#)TxQaV-yM@p|1jNBz>p)l(Dmo?XhI4>EFU8jG%txuK|QKZw!2Z zcL)7<3quSVm7~@1T0>OX$hFM6JN51qhI*b~q4740`Ydt}yK$LBj-PyTbo|Q=YG-`= zv{c`d*d~E}>K-I`j&K&oz4ceK@HbD)Gvlei(C$E5>9M0#`xxq8_4Cne#1{%3$mJ4! zqzcQ>K)xb83Oo*9g>%RRS&zlq4O6~cn&YcZcG0oZE1uI=)t0n0sbe~Aj<3DlDO|Z+ zFk<>|eY84Y?r-M_1=<<@n7kJS6|WdJ@RmuHtbayy%5UZ~_29D_s(FKxe~?LsTfIm@p+ zH3`}A?SM=Hsv@GBA-+ReQQ!u>QduSPh8<(k_1uKN+%NmgN9iPCci=4Zq4Abnwh@ku zBgO4)S=c71JA%r$nhzx@2LaRXsKzL(J~U^-Ri#kAIaH;9NAGk+myIb(@>&Ef%?(Z* z(JI||SvR>vM{$erpb{FKs!v-2z$ zK*JC==GDb2M5k}?0YXWS)7@YlK(L!VS)CE{$*-QoB6NK)VHJv{GC{R^T_(fM50~pN zHd4m&m1&XWB!^dW@HDeUa!JYXvWSFEf}6=&7E_5dJO0-TljeTJV-$rZg?F|WZs*Ij z-V>AY!h2RPYs!Q-T(Dmalwl@jNcVd8m6N`s%bA@|bI!`g9>5C@?SMR=luA9AsrX)H zc#i>)87{VXh%qdMB-kA*zrofZqApZ!1~$~?yhfiiUs_gcQp_!@<#+1cI*)y28qsk+ zDe$&^)20&qa2kSJnkMGqb9F(#mJS`YUH{}KeEbBeO*-2j=b?KbqTM5q|MZ@B?b$HW zWR(}hCb&?i)KL=)P7*YUEDb!>Y!)A5`Ryb`c zmFU(yEeB)@)1?NHYDY)^3;`Xc_V$1FlaLF*Ks|1eQ)w$tKz_Uilu<9-uTELI44KF^E06yURoJZA?blpnJ z-eTRD*&Qq1*iaU-2dr;|rh`DPB85p^Ng+`8y899E z{ts}+Xv$1aVx^wvr`EDiq&g^MkgM0y9Bp-R+sxQY8I1u}X4=EZ+uPel);>@jD&lA} z)t6o(U}+_kecV)HEf3hZuh?$ShJ_kWYfidtY=P?sK3^UOlR6xL&$bo;(4(UycJN$Y zZ<sssXdXbM=dIoLsfdW5qOKyB63c0&PPx^E1j&?~eU@acDh%2smwgxT-A(xqd{1 zL-3NH-!ZCfzfc2oWygOa9hMC%SkMe_gqWc<30OLGb{RX!mjw{aW$a*T+U6p z3M)*Ov)4taf+D!~LR-GJaL*=IA^{A<&DfF9q-Z$t=4f zAt50u==ExDfw*nI-obceqk<~3E_UiiK%)AnsAB+AnPBEzOLTH_A|@v{D_N%miVJ5( zX)BVP>ykO+g?fi4`1suv+-6IS{V~|RK>l4c1Ih-P8ChnkPtwz~_b)RFwort}Te&Ud8`H(=SI%chg!30ePxBwnKm z-~^SmKWj<X&kqvE7X$b?T%i zfkOGN6E9p~ScQx_bdo~<np0qYN}B}MpCeS}lup)Nqm36P-;u)nK>9mN zH38vi=Wbz5hE9$WHk{+uMq!Foct*#j>IlYyx|*IAoGMD^Y7iQxB{x;zc~;lljO!p* zs~6OQZMWbrwfe*Pr3JVPBaAe-_9jjPH7w?Km3gl>*5vTAY~7(|X)aE}3h$!e9k?j> zL%>NMfTXgf9kfSwBzwMgtr^vhQ1Q{)hIpPI8aeMTP%SQQT(Jo>3WvO`Dh`C51qBl#LS$vThzHjhbXEFzHipHcR)#AV9P z&W0GWt#VbzqNN8jEainx_K`YgAM2{cyU*A=>IkuUz?D{jQ|5vPpE}v- z{_8kH2A&pc&;tdL>Hckacl%aZTeVSA&*6odFb%V~RX(Nr|ILr;b)5O=9K* zUu{k&o3!hEwT3FES_=HO34Ym;tw`oUTLvRW)JiyjDNd*mi zgQ$h~s=m+q5_F;5V`DS|T^)}e1JdnoKN+)Y$dldWMLh?tr8%gTSpyD!NGuSS zTLy`L@d>T%T8?@~1ycOvH)DA*EooA6)E`b?PB}3RP*1T7iN~$JBWFs6$~uHwW;zx` zS-ng(r5Gnw?0KvXyuMqJN-z9jjh2>HP%tOrzq(i8h}=8}rvsaJHgxceq$Dl&`uHON zC+>#B6H-vAT5}9waEq!=PEO8N@+Mm@8xS-m1#X!{kmb7nR* z-#DZ0SHl7;)%?z8Gsoy0#VHk`aU>mfceN?G7&Inro1Xq8ksm0u*(ADk>^hpfpx+9Q z>YYZUdf~L$IqmmgroY!%b%Ro;ii__Yhrg+A62iR?N6qQ=n@JiT%AkT&+@Q1GxYdT? zHUsZIQ-+sS)fAVaQo^e3txHUbxC<>F2W8jHxrX;N+TqtKfLGX2>bgMo2%b#zVe zrW3UyD>2X%M`u?TKavjN65T8zkt*s)7fT~iij;{pc|axUvKHZxo;=zyJw|@KF@g}x zEuAKpkE0#8{|B1)M(%ii18+GNnf={tn;%at#Mz!mO`q@%)z z5ADfi28YP@(7c|Or4*ABHQ}2Lx{3b7>+7>c80Q-QBFx@k9r_VX=;(+hr_~>*^zriA z{@P+!p{$ePC_Z6Divpvn2GvnXF+O@5KcG_U;14OEYE@MR?7W(CvvOyFP_lx2tJ<>M z2iyZLsJ2VzXW`$FMYa{znZ;rG7c?6I1rSkB&xt4a2p%#pyYo_6V#_R+Q9|;7`{^bX z-!Ai+^ocV;tEe@%Jo+G~doF(u9U=)>ClIJ>{g!w$S(zt3v3ZH~Y5JP(BWXQYIr5AB zwj=<$FQ$CUT-_gtv3gue%j}4;{nLETST!N{tDv0w9=eGv=WHIYyxA{?-%b-)ZvFwL zrI*oE{Qf+f`Kk-{6J0{&Nn zeC1`!#PoMYCiTJ__@nZmd$NVZ@%+x(rkr$M)}ro6U6fGk2+pyw*5)H>!-LM}>5i9Y zQ#b|7H4w_7Hw$7MkM^n9iLS;)uWQm z19w}PmYO;W80FJ#Q&B0XsL1sY(MIPz0NcNDSyOl{d8`b6xK)4Ta&)a_2oU;5VwnFB z`uCr{=p9(AD0UlrKsts7f+8xNo$(0><$#`Gw)x`WS}M@PI?q_8FfcNZC%iJ~JRT(4w*D`zEH=GSly_VM&@+)^)MRds-j%TL|i1@3iOu74q-&6i7a{L&=<>S^*}vH!Q7U}iHIZjZb_mUu5;D-&Ms2r&neR4wQLp$NQ z?w4}r_CL4VXc-yQ40fR%>q8%2M3)&3OaKE;0_e#^7p(_vW;f{ki5=1YPr4eqqeYy~ z9_*v9UqbdUsXRRrS06R0a8M6E>PD0byZ$pt??u)UWbLd7eKexMn|G&f!Xpf7gqfBq z{sp4Iym#0vONeP}H7Nd&>SNVXfdxbiQQ0IOxiFzO)HZYpm@M@AowYH&?$-@Y6A7Dw zbOBz0T&(X(o=bzQ0ZqX@U_)ci;Ft@fNAc#{x-S|SIKL4-YloO8_-+ygK0Fd z0p%h@KKC!Zc9vjV@Y+nPSqh&DZ|iS7pQ`t5TO>UPp)Pi0`K4UfhU)3z<+~e6)I3K( zo#-@4HwB^8C%AaSEpAi+K^+7B2eWax;#$6Z<(c$rh*exar63fLga=bQNO z8(-i9Q&C!dy0vHliq@W|g+9uNPmwTpT{=D;_>1I}Kij-No?7(%MZd@_MSVDv(6RT< zw>5BijB15B3Kp3Swa&6NH9hg%tA$xAbVhOa|HQWe^knY4x<z!#&rct9?|KxXmfqc()*Bf# zHomN`g{#JoYh_94%I@lJYR~PX$~})n(oMtkjX(qsGxM|};D0<$|66vMs!%KPVZRS}Kupf?jNqtCIt-DbX0Yw+}S7oBq_94jU%p%5^`pCG1qi&#sc&o{z}Vt_Yz*8CqlW$JU^@ zBqXCq7(@xe)rM-0I(yw28;nOBDCnA8kDpd#OUPZ z+yk-Am=YT}c6+XR(Z*EHHkbo<=YJf*e?WFWulv*{zP8Oq_P+14oq)3HbS@;JP=Zny z5jSTE45lnRKN;yr++H20vI|;)Hdf#pOXP@;1bno_!PD|!CsRLO%nJ4&AT)+ov&~5#z?PO zXXos#bm3D94qv_EV%e!lPQ(F>ftAOwEKE2op`qSChXQL0Exznc!bPvR;S&J-)IBvS zUJ8fXwLDI1=%k^Udg=mc(x$}?aaSI?}K8?s)#JOiQwPZ5O+|KTHTuZHnjN`;G% z(?DYQ?9}B7J9N@8YCcUI&BF+KT#Ayv*PB?Nx(t98fG1UV5oqKp=$_vm6*+mBBrtEr zK+;{munX>epPg!S-)sNJS`-$t&aX}b0@RtA8C|HaSJXq>JkGW5C=K3?OB6&V{ok76 z2w1i{aA}w7{x!en3;fe&I_;YMIs9c^gYfdDah%)I;~~mW+}bifk)`Ux^d~#W*;Hf= z^IAr0X24@PeKTLUG-$it-#RYE*#cb^YXPZK;U1DKtQvmhKsHDO4Hvw8o(HR zskzQGEOhp|n7T@#Q(>uapG*U!Y5Lp-(8r?g`<;nuVu375$)+f%z30*m7R-r482b?F z7<;jJV|LanW~Yw)@=7LZpq_geg!4sbB&Cqk3u7{gF-{{)DYp>#ouO78%%%U-5SrI^d_7LK<3Wfnwx z9q0i>`}nJmL(c8g2@z@V6?3xLP_NbBN-wpI#$mC7=5FVRNF2uZ9o4;c#t)N{@D*Q+ z#hS$We;%~)-k`sHvdw}aD9r-^G`t!*`@zEO-J0poq7xy3wJ2vzdgdU9hWqxnmjq_F zSFZq-*T==woN@;1;d9tqxQXjrK+@Bx4{ z@Bc?^@N@Vm1q+pAVHygMCgxqnHU+0HU!-NsvNE=dd+4TOSpsWVk|x1E;^GM@DFrAh zrHZ|!8v`zRgsXtGm$0^=hlc{EAz=J(&tO0HU7^g?29JtaC;5dI;ReZ%-`Ne{rIkSZIDryjzI9?(r+)dF3R*afJ8`&j?;D8R)04Boa1o9Tmy0%M zROA}hwo9hMrzk=G5|{q)8@>6=V=7%i!u!ZNCd?0=c%TDjRi~IbHRkPC&l<$zr+H;#<1Ujhn7-y4NpW#uB2esMtpB*c@4D(X;c_W%1@3_O>$vD4^m~BVOez z|7|PFl^{}50oj3m}+l* zQL!5G>|KANMH=rSV;1R<@XOsdTu0u@v^Oz4J(!;pa!5%XlUT4Kfobt3S`3hqp)Vir z@1K3=34dL6Wn=d#2apEmztS<%eWjKi3xJp>HDxJIE~HUu!eml{bEa8RvRrwvQ5X*n zDC(Hb#6Efw@}KEwjXlHIpUo-M*mI~8hLnLkN}wCHFn;>&(OKJ|b@+2l!j7y{V&c>8 z-J(wc7e)!_*`IHP4mru`uE$bWFa5mrINUKpW+uF zI*IVT_45R8nVHx`16Cqg9w@Pb?8(sZr$mIY3O+x0sJHiye;ytN?^zPcX6A*Uc;+A{`UI z+UAG3WS8X)Pf^hL)lAPBD^Km(uBW-2H+i!wvml5KiMI&KeRy_F4 zXo;FcZvwh{C+81X)PRuWz%ma39~%GEs37{* z`Y10HY|tBDJS!b^1qHyeLg))d+u{rjI#~{(E4GDcFAC+0?r3kPGhEn%$DOF$0GSYz zN&cnh$i7{sf6_pqtm?WOcEt%mgM%9AoQ=YlklLu2nYB$|63Vs(>mbX{c z%`?9-^iH~}#?3O}zcD@Z9o7e?fC*ItDeCA2bMk9f3G|n zUv*A+YF;xYM;F_|kpV!?`;~hf8fsU`w{}$x^LuQBjA$~img)YVn9`!{qGB-xP2y6c zGO>u0{Oj{XwSUMet+KX!`{38Fcjk}vrR{#Y<6azZc5@Ij_V_Nf-u>6Uz&LFgYtwsx zttva90!dME#s!!XHsY1-<-pvY*yU?tiBU8>ZB}O1{ABBIJ>b3ZpAQTNv9v6wN@B4M z=g~J8C)D@Ahyl?EQu&bjg?BAW37%eSz9Hwbl&(fHAB@Fr8a^|geujiAO2i-%(_!7; zso(fJF9@7_zi}#y1b-Q7g?SACwIZNcm{|I;yhJZ4vQu)&^U4$S4xj&!}i8d;kkRLa$9a! z-e50rEsEX$`EH4F0bur|U3=1`K=_BFWNUFyl{Qa}1Ce;CQDr_Rfl1yiPX8erCksRI zBgVXN`_17@aE!IQA5AjxdJL8Rz+r!-61A>EJZFw?m#Oj8kJ$xvb#)?ff1QVA>*p>m zE>6HccWku;!a33Zg_a}`z(T@-5yO8OgfuM`&@yT}PH}#}JRtH(a7bGtFJft%KZSwk z)l@3-e5HzLb$c>JgrkCd>~jjZAtkVu7I=vQZW3SS%BNLT17#*%&HW2zrl7KkR!ExH0J1EM;hzu^%~~(Oaq5 zKybm~La7$%*&uSI0e&O6?>V zo;6`F54A9zuTt>bBU#qB0T8=%1TL&wSn>bzQQI;=2raZc(e5U2-`72yp@8 zHBb-|HPijWW7T+`6tu*U+z|8V$bu&9)sw3z=!O4q2a8()_g#w8cU+6WumpKIg`NM2?iFF*z zmTWmW4*)!5TCPv2udc7s{%zsw{I9(S(*^&rz0)-|nhns@+}RbKT+TGtuWGUrTEf?Z zzRsJ-QEs;+h~gfrOKyj>ro_UmKRum+vqY@ru0XQTVq1;9r{#rb6a1Lr>5r#EYxz;+ zFb9t<1;eomcYs#@7RV1=QrF4W+4k{{Q{sI#s!-t2a1blc<&rTg;cv9#c3gg)l{$wr zzq?z;^c#Qbm+K*)y!tin`nV_xSWu){J&8aPl~Q*VAfzetd5CG^LQ(EA};YKGZ@Z z`vu^u+WtG2FCi;CD7Hs6m679p)rrKFj3e#wlhqnw0%yv{JP*|-A?Y3JYYQfpi1-J|cZ3u7 z^d>N2M%?X@B4QQEsslge_IuTX#c5O5^MfUd32EeJf61Ti3!zG@pOBFS9}kOD=omZS z56g6Z@IIO{2l>ucTuIGU{z0wF;C3ioFFO={UZ%G|)=cEBreL6;g8mEW9yZRMGx+?) zAh4qkkEsPpYdC=s--M8dmO(G@J+~}`7D8y(-dmH34j z?!ngz71>#7(ZTX+t@Go7;)MV5?vL#&vhlo6cFX=P+4p4)#U3?D1JhR5tib^lwRXbQ zOG?-Nx4nz48RR^VDBPN!0m_8O^6Gmp@`PO``p&~G9G7AxReJ*J#G;2D4!q{qFzPMu zk2wrj!l;}r?dNqISPTYCa{sbRU30a*7Bq>i8M;sF(DgNqi=K3twg180YFqV1CWvRsO+iTVS{oZX{$I7>uLetL zqiN*8Y!>yKZ(5?wPEW@7eBnjwo-5GGU9a#*CR=II+4rY0$8F?m>On<9Bq{cs0YUC|NnoM_l z*97fFCCIrGUVt!;Hc|DB-u><7$E4uJB|mN@rG-?WPVoB^4)(-HkE+S8^)og$IuL`R znlpoo_eehd_-&5FA#Px>K;k1o1s{@+HqK(%(*MT)k?o~E!wBZ@^8H8fI3$q2dyH9G z?M}7dZMeINJ&xT%bZB!BN>AD#MJNRgd8bnWjU*}6;o%`HxpppE&7s}{aB^!pA5%)b zxjKezRL{j%2qy~YHrPIcI?U^Pm%8w^2dJfoc`W$p;6XX_Vyp8w1?(3}k<#86MR8Ps zTIRR9MStp|qM}luDO(GAzB{;!T8_h0^C7sw4@^&lY_fb5SigH;?!M4>I2rw30O>f? zFbYXd+>RmeS;<*nJ-C3_oZqwt93C&nVcz)M0y-R{+wS0j?iG>R;XS3WrBKeq!h&nvC!~}aDG5q^}Z1w+l&j}`!NK3J731yT13y} zvz$7()nhUyg#UAR`x*X##gFM;$|_F7v}9*#+ayED0(9nh$E!5kX=_1E6C<~ zPbek*p-3+yH7Vo{z&am$1IFK5z?KS9zw+p+`HOlr(QB5Z9}811eEmS-Njr<4Yajyw zv;H!`Lu(&M;X1@ZTE>_{g!s(2SI>iVLTC3>92aeEm+4j9w3K*|6d?!e_> z?ycPniymwA=*JU{Dav1Ojx>5x+;Yv|unJgm0E7@QEm+Y!=J8lp1T@e%u+Xh6G&G+2 z&8$IgdY)8-VL0v>smA36*5WKnymz?2{aNBmv$Y5kSXT8(r^7HDl!yBbw}$lNfHRj7 zR2ku%?7f)#K6ZjXi`EE%{G=FxUR}irz!)FILv>+KnZk$>wU9i{*b-hte8m|o&AI;BBK~L-Q z_M0&dnb3(JB2PU$Qr_W*gw(&f^%|K=SANNt_>;MnxoKp7Z*b0MV|I?}yN4>^Ewq?S zpKOvM$~_QhJQXF7PaS8ts>%&=DtIMsC_ap7qmA4;m;RC&AOA}!aCf>=#v8NCW}OL6 zPAa+pxbg3uowAW}agGz>F@IgpfeB&qhN7Yi&~6z$%GIm>tf8gL8XiZJ0N|LJyxbDC43b@$weS|X3<@Fn=OI|Xcfkf;eNhrK}DKYKwns(toS&CAW2cmDGp@@ z$kn_hf_9EaMAcNO`NGzvRCzp6f-7|``Eh^i1DcY4{3zKLBD^F2C!?mE?Aq_%+QJQb zpm$o6y}r9LR-@-C07qhU^D7{@7Q_1xa(-EV_NsmVaqpIcBgoTbLtxdoBbbzd^_d1W zF}y|2ovxRk?$f3Bg4B$ebu-_V)jV9K{;=?K`q^jdGsE!)t5oN>2(h~##DUYPFJC47 zBqZ<*_-q&BSXh)40Nyb4+~k2y?&0*`1~ zoT8pwHP6+#>BS39PIiyyxCZxBdk8BYqu!t?$bTp(ZXZ6B{ae}0;121zsLZ7Cy9iqq zHP+!b&R+S>`;dSrek{%JvwvZeIaMx7mID$9nSoM(ZyAg+ zZYt_|H228pu(3B`P?~CN^16*sTqmcP6X6ho0+|IZ$vIvIg8-6wrk{ zS?3wWPN^@ga`{eKrg$o4rOiEbN;^;a@Kpp41H`7vH{Wbf|GXaHt^&j>epl=|kcpla z%R}>r4+(z&K)<3N=6ffPH91y6s>r9uaj5C#J=8^7Ys2}2P4m-T+fDQ3-*Nz5`5R=6 z=xJ!JT&1xra$VjM^DMc~jwns6dRd0KUcH+Fey5ns%+k4yjr~>U^|@Pprt*~@kYSgi zZh9Sf(>%ufR-wOt;KU?nhK}4lM^PdE@@!82QIyieQ88hKm^3Fb(MjS}ySd`G$oK$N z8dhPi(C=wkWvA8t!(`HZ2l4N`_PZ6wL?rZ+?dE*ujDs)3T*-4z#hFJ z3%SfFb`250uS$O((yLULksAk|oU#F$$<%Rg{ggnyzoj51zOSRPF9__zEY4oO zU|g_DxcL~HHu_dtze`TBaM$)5QBP|FB8MNsN*tZ&c%-7 zEDKs>XQh{rB}Qa*w!A*ybLM|f5-)jG-B$R3f4d$lSq&`E&>G@+n>04YX6-Sq%`HFd z&P@|PXc^i`aaau`cynh}WfRIzN0KQbCS3FWeEN?f8I_1zA)T*N2oIrp9M3y50pG%Ym(NIgEoo%VD6?*j zp=d!rD+iBJbi_P63RQ z0H>Baiah&-y{W#P@E716R)maJ>xh4xf6b)l#G83%Gf^Y1P9u=V=YGCydqgc9QH0%p z$42h4lXP3L6~E805zB|==i4VqcqK&{PFFLfX{Q{moF=56@=)0G;Maa2GW9+#u9omk z#puWF1$ZOGQQUf%CU>%^ZJ}Xnsw|xd4Gi2sHNR)yy@TH#@UXG5{m7X&*mjx}sgZs+ z-(Xc*^DQa~QkJe5^;zXl=MK`0!!dh8Yh*F;J0x2)V9&wJc}nc!5{+5eG`K};+QDyH zxI|+oAS(p1)4ds+kuIUx5t)1nbT^y24<8*M0;|`j2UlIuLL}Nf za^Zceh?ta|dHwA>2(5hMl92pm-eMht3-_A`US3na7pA9=gk3laq(W}D%*5+KN?x{? zo;KvqUOL`ZXx$uNsvY%WTLuaON~e}9n-^3M@|H_(IHl1$uOx4j7S7!(lS&X34ELvc z66Hgt^2gKE60O6pUe7azJ?t0v@tRm@z{AE`Y(1CI%A&fA%2-&Dws;6Q=y-{E;9256 zUf3)y>8bmECwDEhWUTtz+I;pYW!!T*SJU@818%xl`wKHKhbbc3g+?446WF-ubqv}A zH~@o9SRGR5W<6zPvvBVc_lHcYQvTu*p&Ewc7ZtMt4)%gZhK4T{c~mSd%LPbD*SPaoe$-}FmTx_a%R-(9-7OdY&^+y* zoQCSLL>u1SNFS(Bo7$A(u7)|H#g-+SS=rid^oBfe_i(O!*LNP`{E;;ht%F~}o6g30 zX|HZ;Jgb}Df|}{ZG*6n7mdpga}v~N^qdvi|&I9+`f6<=(-F_TDMJ$d#l zWs93h+d%~a^=p-QN{wCGN-MIFR5=GR*R+M~`S8X?g^J2y5-H@b*fs@PXJHboyz%4&Ftq%|700_K5Hcl!p}+aJzA* zh>g@61E~nU%~4-5zn(K8_T7GcQpKgwQrKYOgkW8zBk>{)N$BC_0~3N=rS|}%#w$%@ zKg=h%n1qD!?aG2KgY0aLSM^}JWXlmvp$*Wu!KT0|5F=_oHCM9XuFpu<90*1_yzs3 z+Snnb!2e7VA`ta>l0RJ~6~X-WV*o?wC|9LT$jO(K7o4k%m{Yr8B{5mR@FX&GH|v%iO!Z znsAoeb|qbWYgi|Uqgrb~O85L1C<KiVINOz-P_sc13gHdZPvQISp(sk?g#?(m(HFZ|}hrK{H138a|CU{;0C zU2pwKT6`N5kx3Q0lONo0NP0tR`l^@uT zR{5^|-EJGaw=AjYd9i}WoS>@FGD9imww+~7sNToZB4B9@t2XjGp~@t{f>k>{IEwt`?SH0CPSdvnxcQ( z>r1GF49IuibM{>{rKi)))dk?~NaRNZwO{1=`ST|XdYlS4G$mtjdUpG8c+B7RdmV3l z$|B&mq7!`y%o0<^RYixs=y?d8YL?~mFR>m)eOu31otq1>I3kV2Goe~tPQwRAG880=PfeY`T{P1lYPM5h%8ca>pdw_Y3$-lbiep?=lB zAzsA0ce3Du=*qPmJAin{TDngwq4q6#I5Fjsa|?*-EU@RF(Sr~ysrPe^3I5uiba{X z>KJoO@*rEhBC*LE+2FFIkZ(8Rqif``Afg}!H}Ubh$#=EvnzEcp_g02MBge6BLw^E! z{hh4ggt)&0%H|+v9Z&@C(wD1iUoa=gj%;%T<{%`!cs%J%L^GVUnCv(%#X9SN%zha) zh5lR47xb54(hDmI_NB;LP|A!OcDdQ26X7t1U;kR$piq?k65r%8^7iMOnv!M#ELiz_ zK*ppF0PnH|l+Uo0FZyTcI}*d={6v_yk0%9q^!;^^op-`$(|da1DVZ+?GbNR~i!4N~ zbp?MGLWA#kcR*xd;d~Hs8pi&g8N$DEA&u9&Eie0jtX?V^n|1guW0v0= zUqxh=onZ}Yjgo%q!ECaLuCg;EjJb4>^7f8R5Z#fir2edn(aCm$fs?jlg1AHN6Nn`iGg?z;KS zFQxgb7?Ig0rtRp@Oo8xB ze^~d17GSYzr-AhKqYP7arLdDfkhr`5QtR`5iKfF1Vo7y9h)ETzlFBoq*L zQj*Yd0n5K+U|^1lCm-KZ&$S$F4J0Kef5}Rwk$vD(UqILiOgZqxx0YDJbC)#HG({s) zc>IfYnkG(zSz=F^VrNbbm;8HTY1wBd@My4XRQe^W?^=a^X}WHYGQJNlz8}gWQq%py z<64xZPswBuku#ktvFDarhd$t$Z}j?@k}Tqsj@f)Z({xrL5y_b@*B`=QWO*0{ud>Qc zEBJM`^#x-XvUJnDa5O6zg>g4$ly>`-nUMJk<(|J)L5YN$8wND^ADPmsHXp6uyRhL2 zGUjer8&O$3l$eu*>kj&i$j!jpQTJa{Cioy37N@@d&a;ft$6awZ?h+FOluDnC77Mtfu)d0 zFYte0$PMx^&4yd@OMBEVo=S^1g+O!ojYTYn5@164D13r@6iE91^oCH&QWAOHZ=q-rP z69Z}O0gTIV1q3F@>pkPBzIiBLD_My0WfeETTips=P&ZOC88#~S`A+d8Y0Ifz&hXEI z_2ZlK9RvXe6#J2uEGU2`5q|azs`t^5@n^$*m-j71yruH&eViO)R;rJ_eK@H#^V>fR z#kpth+g4$e*^`3duhH|Jto67l%-X4ajX;n~l)>sE$2TQKICRa^Li&4J$|g(4T2W;dG{M20^pIzt*MbhYV`Y&dzYWsVw}S%a*f+M59J`#V=n9CHw;d0{nJ`@Gw-mJ|Y=W z#1iN4pmsAF>xNq}NWpZ2ka2w6(`P?=tA?=P7tw*wNCq!1ya$#XIA6CboIpdHX%pRE z;K4=pKj@cg4rE|X-kQ9^4e)@UCSD4EDc~@yGsrsMQlm}H{@apEWKwAq(vuRq#}4wK zNy08>0Z$V;`I*7lzKrEG!4mn9jt$i6XbPzgVUy0Pl&GS;;c6Sr+^dGhYPPhayG4UvVLCo>vxlNYnN4uO!$5F%*yhO=gNoL7`+`Y`dios^YoApo7zKe z2k3~F^0=$A)AhF7>*BhA5lPiV!F@54?vvUpW$R?cwuUZH?D03JD+nTBLOhScagIH% z`8Hg_V{17EF~8gOIAOWXr6(XDUhP(w$>bVte2Zyw1dbzKW*pdC1g7pTHbP42Z)3pe z7^l05M^eHzl1&kB<~(R=7~wwwpFh0cKDemeXRyfmcau%u-t}^gp=$MA+UyAZ+Q=uQ z)!|FPw)}=+VB$i|LsrnH_>>I$Mk`bFq{)93DR;?Dc7V7y;(u9Zx8Pc@-$0_ae3(==;P6ws~TP>pRI5Hp4qg*%Uc_otxUOCiHINq-YwSv&CU^BWQy%_yckDpJ#wXQ}5uXKc1)Wdn0p z;6FSnnxuFx>t_C9LP`x4ZP9b`H42|~sO{{@7Yi2_8r$9{kkF8j-nOSFE2T6cqhdFj zMPYoyfG+6GNSAY%aT;sjT|ZF)om*(~&R3{Xi4g6b+==#^j-HdHZ+@c8JKoK0cm2nz zje_=TeV2N93UX?Nr)EZ?)b;=LYK-fN-yT#NVy>7(-aQturOv&=o4W1Fs1+&g^21HW zul?&o3D+E2sE?qL$Jmyj15U&91m1c}=lUs_ekEEF+*h5%p?x2USF*RhCH3mB4CV4$ zX~&7f(@$6lR5`y$gj`=t`-+AQ6+N4?y4f@FXdY9R=$(0}dFuy2gdE5aTc$an>$SY$ zx|U}!oDfIfq-)#^uHt%jxYiS}&5gHPMu2?3)x^y&6L6YS=Xv~D#VsP%xSP_6IQxDlZM;j?j8(`abA*_zsd@yLw^<7+DM^} zUAnr0+NB#FPf#4qWP?tACB~WfK*ii9^+>76OM^kahk@QBLyR46rg1%La51^s;&2N2U7w~oo{>4~FJb#rG=!E#8rtf`NzcU+I7VQJ+;1(JG%ppj}uMDP2 z{hJk%ALxSdJR4r$fbaYD-HE%cF8Q}&cnA#L|0un8U2yO>gk)WrVdgGM2EA2aeo8d4c+Q% zV&lf(?&{hdKkArm)zg;+(sJc(wH#`-cva-l{=7d+~ex&XP>}ik-Rx` zNGbF|LKeXacun|5);G=i4?I9@^w*1WM`(gD)H@Oe82jM09JlF7#=Hls%tAI?8sc|J zFi%Y(Rm6m^gY~fGio0?x_4T}!J8JWz*f#EFT@6`iKlT37cyFW&6nWeNz9p#~iayl; ziD@NE3o}qH4&oMma`4+Q++OcdlWI@ZF?e*}%GV$ev+?xl4wf~+{2D02b8+rDY$nv+ z5AsOz{x=S6xa=EQFaIHGsl4b8TM!H~%U}|vy^4sU6#SLX?Bu~SlQDNT{mR0PolZSVp z(YV0x9d9_kr+%?iia8qV6+Rj{RqOqg8cDj3(7Feg=|V1&3RpRl=nV}o$5^49% zwK5%l=siFE?@={Ja^Oe<`_OZ^M;$hJkA=QZaKB+=j^v?;6IjPvJ3&lv;K(|S@Y#dU zvW~~FcH((86ZC@j!Ftdhw+_D=8h?yP zA^(V+s%osnFnGuC7vj4AQ_1V$U@tE1GUNHek*>&~Up%69AH&BA9itbr@fE9G2;3s? zhxFjTAo;i|;r-admZT&*YSVKDHzjuZ^iLNP$_s$rwiuP)JJ}JIRb(fhHGBWb3h$Yw zukm=gp!eX3Rujka{_Gwe_&j`J3V0Kw&d4E)WhimS=^u>OqJk+e0wlK)Y>EPC)mq%W z_gm*c$FR1@9Z)b3txP+wxo|yl-=%Gf?vwYfNYKaUEZPv?71xHFnew$^L_m^Yvr%aW z$U2Z;+WBPvy>6uO66L|sUt<3hP*xht@zg%_1X>%g#dXLRJ9O#`!k3%$>Q0frtf6+I zkb2!8I_~No{oEg;md(iqCqF z95qI`BgA_JsKD9LKwWw}`L!J8Fl6-3)4?zLD+)F842ii6a|7l1Eaf7=+QxxgBZ0FM zr>5|8#yjP-T!f9`MV~Ld4YJ}iUbvqfZ(3DteuP0dV_~}p@#DOks329&^gh1ZG*&){ z!~p&x%IPkRe9TJX%m~sXy!Up?txk+*jr!thH}hzCn|;kB(hPB)F;ukk8 z-QtKBPGu@TNU%bw~-7=oWSAR~HfrDG=x-tChM5x7S_N|vLEgEoA z)o{K_{fE3$0g;GFNlBC=cD_zrPbP9x#P4m}P#C@-9!bp^x$jUm(iL*JO1<82Akbb) zR$`cJCu?NxDE@}-LxA11pTbx*M{pBEeV1ue17%I6t1Io!=MBmnciLv5QAu&CmV1n& zog$UQl<}h?5#2s?cWGZ<^+y~$Up`KVrkOVoVtiZi!KYOs7s2^}VX%)~1BFSzvH9u! zRUu@Ol`x2|S;SKZ)$uiKOMIc>Q|Z2XY|mC%j9;fqMmS6Q>Gtz3gxGc7uH<(%!7M@L zSr+}BuZ_QHh9(>sJtwXBCnQ9Ia-|Bz_G*k_kW&?IUnWQY7TFtPxKc`ft3=T)vSP5} zI;fRS?6y$-6t~BI#+>D(;(fUr?&=o5;kpNAhZ?eGmyl>RyyR&&!qcCzq!hWBtlz)S zFu|<@3@TojE?1TlhRhl>iVB!n~j>(_cl31u|*DNv{ff}>Y5(> zy!7Pqv&{G9vCdqecsy%!Mu0~=$|?;4;b+TSwdcv{$~XM#D08t&!CQmv#|@+xa3(Zt zJ{!0yT6ZsK8R7o>->1$X%wr5?9%lq zPA=;8I30i9yl1Y1PR-|-b*~hoe0rJu%RqY60uoj`zex_My4v;`F4g`&^a@|E$$Zu+zphbpf6EM>sjx1V?Lybv;{D0Pev#Nyvs687#Myo^MHu}1d)Q1#yNRKD241oX7=7B5h0sv zNA}9P_TKB-vdIc@jmxz+mwRolbzOeP=kxjge&65uqaM*c>YVrcoY!-_o-cX}IZcaQ zeZwCC_a~v?x7VGW?^^n!30>Q1MRCUnKq`~Y>N;+#($8=`(oX5d+sdFjOYg}oSWcEf z1%1pCA4GZEqFMOJQ!vlG{LPor)uoDUh8g+_4w04a_*Euv)Wv)yq~t(zA9e6z`Ec-3=DJz8Y;{L^ZA06n`w+tXS~hp8dDt_x`%7jLdtCdNv| z;`S!sX?I-I?=OveqPa0v<5l*TN;GnqFx2p)-9wseu?Kj~JTFH=7NEw0PZ_EY?~Y2$5Edu{!K9eO6%)L|a1!CR z^UTCXV*LgU{(N%~=n)dE`1b;#^w$%iaG-Ccpsx~5=d~xS!0<{+gRfO>KalmU{kJ7f z-pX0uOV=8h2$2NV)Du6nSQ~M@M2Dc= z$)%EpMvv-l%c3k|WVI;CD%;U_S z3yAN{&{_*&LeDa^pBf0e46tkb{t|_o^S@2kO#*;Fi_lVqn9*6%qn}R+0K_vM>onde z{(Mj7drhWfGKo48Sc~V&dIxCe0ghy%=H~vcP%4dGT^AKzI6viZtPCK+MTag z8jog}M3lYiZhG72>?oBZgjhMDoB7SD4RV)>*(h4W1D>F0C4;h0smO6uCf z&5t*%&f@)4X>*h~nMUb_ifhGO&?(JRXwHs`^4}_?_dfaeG5MJ;Xu4iE8;e|ZAF_5X zI3E<>GDYB+&gGDE{rf9h+4ejew}ytrT?&`%nC0u8t_&Bbvyv!2Sw>nwF1qOtFRQm) z+u@$w+QyGDadtpAWQg1k;D(OYH&j47VnFwzDZ93k+jk2LQ69#9_xry&2z^%})#$i6 zen9x(B%Tw($Z3J^matjx(Vgr6gh-}SK!F2FZ zG3!RtW}7PktSU|J#_%#79b#r_Q^Adv30rClS}zEyO>/({ z_Q8dGtxU?M-s-8>XB~0B%>vkXjh-=6aL7*~vQUdl1j@Vo4H1Z$J*%s;r3iPA-yT1M zyTO}&{fxOL=vh=k;qM{~$WTN-(zI?>vD&>xL%!R$@-WLqcbx9rM4r zIXm*Zi2sEiadhy$Zm)BmfT+-@e;F9_(#VWJf>nb_Z=TtvM)GC_zjOKNE#82Mzh>q(^ zB`m>6M`b17v-&ERyaI~J=s-F4iEa%|pqL)$8m&|E(hhv`M!xM~m|u zd1|wC^dNjAz}+_yuumZ0pDs3em3n_)`gwF92^}wx-UIF8D`7ubNIJG~vKzaVc}~mW zPA7+$c8ry|%_M!M7hw^T%eD<(`1zqgB;R-U^!UUq)M3#xv*!)ruaN7rG?T1uQccOW z`Ek){1&9^J2j4oP+q8YCsv`i*oPZyGxr~6{!+GE< z;NG@pe%&rYa%SSz%)YLx{M?jwh$lN!5HF`kxaZD~q%H=&1ovy_fIY|SEmY+n=_puISk)t(Zgjy}lvj z!R#AzAF7XJ0tMJgxT$aE=B0D{Fz?q6Z47#3{Xtl7>4oUM36))|(nZyD)knA&TLM-nSMTE4WrG_) zggzQxLS;CS8j%zlBkQ_VRChvLe3L7bR%EN&D74N``yG>aYJCoJMR_ZPk^14 z&*+!1e7F|XlsG!^7Co-Sj!AQ1)1lW4(k6VY?1P)b=>}Lw#*KF6mOBIbejpEuqUB)C z0O6Hzt}5|sG=gucEh-*}Z{84zgOL=p^BB@paOVtX2H_HJ&1jM%pzyoD1rjFzdK@b& zTy9VJaBlI^7zEV-t{2c<38>d!x*6La49@|y7g}1 z*A5_$B$QRg725cy+qC6IYlBHI_C&u{+awaNDsL6EK};nH)84AD!cbX~?v-?E5YMfA z1@fX<(Krkm?sU+4oIfA{m;YzzKi~rx6Az-6b_E%ltadu} zny^1k`&glkzPd^C7ni}$JFb2|uzYXQQ2_=dRDczXKY1}^`mE`}%}Kk51xfIfj832U zdA&^IR<3VC*)?LvM8em}Wk{;&(>KPiNiapl-Jlm9Lqa56N%A)uJ{^^6_dX3xRUBPo z_J@>_2xT$1lQP~PKmKwkBL(VYpE|!>(j9-`jrP$s+cyY)tdMM~pGaERKsw%@<6B5X zM3h(yl`sr1ADqGwH?gJ&UkVovBJhW*)9=wglm4Ea z^@flLw!uSsom$p|dI}K4(n2t1!9eLCzpW3mfSqq|EQ*{h?JU34=lNI{GiV@pK4gGA z)=L3(F8}ojr6r*Q3F8Da=MN3%s`r|`Zj*weuV-3)PXwMU7lAE5Bg%H4XwyjohO|eM z^;yzCuF%H~`>OFft@n&sdZ>LySb)^F6}sv4@#mzUbLr&UoA+KjKX5e^BWbg9lwgqx zbdhi85mwHf^!?=L8tY)h{TA;ViMW?KiWXrG?{aB-@s8fXMW(8fHkx663c@o&0ebCj zy{OgJo+B%t&cP*Di@vC}r!6os#qIvGYi;{1E5|K2S4VL9B)7rYTFu`#TG*fUlnT{% z_ys|!7(H8vb}LWme*!V_JCW@}C!`oMaebYs+5aBA7>uUG|DAMj{eFM5flysUUS;^N zI)XQERiN9M&Nyuf;0-s)nBN0~-goaL=n0uDUFDMd*aLnmCKDc8Fjd7F4g`o4-dC=8 zL21yGrF;U=l}fqY)J@Hl4QStB+)E|HdWP1s1Is}bSG&Bv`i+N_7{ovAX=snUAGOd5 z-CCO#A)|AIZh7L)^5&&Lx!b-#D&^dgt|9?wD1Shh0qVTLJ?u`#|LduWG*bv8YqKT zyo>TJw-<{VirSAZQkv86FhdR#8K77A-Lf^;fVeIDEI%Ro_%HIi`xC-+^8aXDApq&}f`RbkHG24rx-ZZphZnWU$T!XS`5^Kr!spt>7fxlA$ z?E+%-%x?!Fdid?XdoBL;JI(Fty$0u8zeOhBl$+o@N(j3{b;B`z>LS+}?)hxt2RVNS z&k_g9yU)FL#yfY`rv`vQ8T~cm8uU-)O5yoztkV1po;`Zjj7V?kOQ6)f zT+)cR44Xm}h;hpCXL`!sbO&W_*00oQ5s^(=4<6vIWun5vhk&k!1(a|ULl40h+qK#b z;;qHm%try}VLpgv$CcK8fj-4m?dgGb2C(9sFt#Xw^yqH*@|!xEVr(FQoMg)~GM2Ed zB||w%yXvxO%oJN5GP`&hJ(vDHnnv`b=Jfas(e##(^at}d>32H>NftHz-tDf*I>OLo z^ZRqvjl6Xqo`u}KU(qdG=UV4LaHF>R=ZFp=u14?BczK=nl99QxN%a(zDYE*l!*0el z!Y*Y_5XV5S{|+ET#?OoV>)jI(5$qKF=NxUfGIYm_lw5R{H)%$6B>dP$OmL-I!UP}l z`61?WCjR{DdAfM*pg_)bMz#3qAbbvJLqCP;i~2k|jW$%C#&7HBLzz1~5!mIN+8wlA zQxNkb2~%+-C?SIdn>zkn2Qb3A_jOZs&j)1S19p)Ix)tM=?B$$Z0x1lA* zjx-6hR&Qr){ZESz+az7R$wxh`ZCo_I-ds3!frxsnTa z+fM?9E!z+$qm zyQ##dusGkeO8=N`vAQ}5&;HNlsM5lzKrcXx(AT_S$)(9@ceMN1?iU6;v$qtyvH4Sd ztY^zvG5wM=$X{LP69oKkSKYm}UtXYwh*-e9&d<<1fedYOE#)Q8{WDZjGRDFjs40vCA4t=DY zit3!y6{o}z6T}=14JwGA?$1tITQXh><>|PL4<}HKb!Kmt;R9_5uUh)Qpqc-*Uv4!36 zmyx<1c=(gJ^JC~LJv|SXjZX@s!~W|!UOC_A!Gz}sYLrUyYdMl>1)0kCJ{GvCdxOJ# zt}P$sjgf|Htb|zXsddL~xXW>Qqg0!BlxUx=zU=AM zJ|S=9)Yy&anB9-;XNU)AydHc=P9S46Svx*4HH#xq%$vt^DglE&<1pB>K8=3wDpi{! zKnw!oh5>i31Ft_5q^S6szx3y&z#%aS1eBf(^Mq6v3Xy56&%LV^w3I?>EYUD3fF;|< zS%28#PCXRTlg)D1_0MV)GmdbUu>TX@>`UYg~+Hp$5WsmTU)rU0^3_eU_Spg%0oiDB=Z@z$zz2%Gh~Jm42e zfQiYQ@4-!#_8=XK)4-Zo4kaV^go-EKC1doRHrLy!F`z3`mHP2U9i!&G?0-wBo;Orp zK>v~vhZwu1T(jg^w>=E}F_TVtl1@VR@?H4pUi}Ho&Hc_#%~pJJb)Way`g3Z>|3shC zoEe2&P7&DK;;{ZP#llMCX^i0PRekPY_m8&wr=1a!F96rA{vMpa_jIwPCFT%tE&zwh z8vucDzFRI<*N96iLrLpu>J$d*ofr|*h|eZ(Q-S0|R5Hs^bd(kPdA1ykx>IfG8IGgG z1!6C=b5y@q1p&E`$LLAY_N2lhB_NWx8SEJEcVh^B*mnMjkU{WcjpRkowtpzEqtKNA zlRq)d%Xfai)LN}#lptZkTg)J5_}|U+9ACGvSz?f@SIAH8V6>}uMd)82z6DsGjssV# z-K&?`qNLLjjupo>DkG1df-~xtn=1nZ@J#3?=LW!;ZrQOyj1Gk$B$Zhb=%o!aqe>iFFe`x>KB~X`;b$ zf%L2=GBExLf)OZ`eYEL7zXJBT<;ild;}c3$7t3o?Uww_f7dc zlNqsAnbcLg1qh@IFiq_SP_8Vx3r-@TsxfrF#j{`89g#w+wK$YuS<73QFiW^{-5Fv?SGB`xTnPQ^;##o zQ*S{lD8WYJhy2`V4b8Eq&igv*pu(G_n{Dj;Qlmp}9mL&X0JKKb)|$HzNqw12tep9R z%c6g_MbH)COcc2EEwy!OSGetW2Sz2AYlOZnQwTOHmT{d-Sj zVKJzN)m*bkaWD5n+|MpTJIx2__;h)J$7aFfa)qjp2CR?Ir97a(ftrZD9P#hgL}gE? zOo&&aZGRlV=M0w^yiWBMfHisQzR$}Q&oR(7mbc*#!je7izdGw!T^cTihQBjh(8FKf zJRP@h)6SYpAf#Z^&%i`-W+lYFh9+zkWi{Zg_X)%mjl{RXpJT5vXeZ|m=gGrqTlbR@ z(Om{wGT{(%X7!bNOc{9g5ou@ubw6>W07KKh3?BT8nQ__y)yq2@yOh5r2x zb9B$vZpwWefDzlkQObC`a$^r{D}UwRf5>*U=!NbC;=I0+kCuVoV76GpFxQyy%x;d3 zBp&w9C)Pvng4}{k-7|trzX#w(QER^PXTURhqyr_Sdm}G-`hf7)a_vZ5=Snx)LhgB{ zkeUChehpLFxwHLweec{{7akkuqo@c92a8epgg1mhaHaS%TXf0Emil3I*jS(}$4CmR zg5M2Kj*Vmn;nsqo10ym#D<-~Qkd(g-L@ z%JLmd17hW7FD3glL8&@18?w5e?dt$JVcQnV0*#jSidj*(kcnJM9D1b?z4rTB2#;(Wmc^%k>*^hl_TPnRtOajMb z(Jj=dRZ`8#rLxz@X^8p>>lH2*4NHf!k9TM-Ic&8~BDTA{O%=EgCeMrmy6veo*vx$` z>#u)6HJ6jmHZBLMSs1}FOHV5UpCVJO$NeFMbY8(C_?XG2?=B49lRp|4Z}b!mqNdJb zLik6$kO4}XQKgpZH&D@2}v9VteBX{2>5_Vv%NKCxvN z{oT}TihT_o8ZwODn|mP%P5$(+q$l&X^;ZUMwi^4E-g~MqmuOq$#0`!hIR%eq4~}c> zNy#6ba~fLiA>UZ2EG!&e28-OEy6d|LK=YLmAwk&lb8~&t+sn)X{R0d(09x5HVFg9@ zc3xkBnwyXQWa_EZV!y=Vb5p3O^}mv~Z7Aedy=ZBYwG)2y+QQ9AiMCl3Klg{;`m!Nt z4b$zvL?-hmFh-Az44B<^(b@piJ{g|>$P`p!TByZJ@F>9qV4l zA$HH;>^mN;s?yfXcrJiazyEe2g#JB#RmTB*TqL^P$3-pU&)VyKJpjj({6Jk6I}%Z4 zJ6;~!o&;fBiOOvayJ=pkS=!;)n$h3>KwvQ;v@5C3!nWQ%Q&I)9-dutc=pAp~LjVe&R48Vfn5;NMrsD8Ex$guX!3Rf*IzqYJ0Uu}ld0dJ^* z3~|GIBJNZDobBy>af;L69TJHuI#b!;Oaui5>n*PMD~t&B6H=;D%S>dKg9(O{(2+t` zOW)rg$?2Gt{YUGd_eF2OcVB$qYMmlXqo3CMavNmQ+?)kzpcS-B4Kj6(%CxFzty0qf z1Oo55x?iE&6C0ta`Q`ugN|XD|u?D5i)adiIOQX*v@S(E0I;8XC9jl!=hX~UU;<&SJ zk~qwSsz&ZCcw=LG!=vq9$fGex8QK!9K`0*XYBne34 zB^~sJHNf92S6t22N=M1;yyHn&k(zA-pz*c zyLoL8{IJ=qA-5<< zt7g&H&}q_{RBG-|yXDQ*Yl(tLVWd5%`E%QG^m?i5molFhvvmV{8roe~7jf4>30wzq z-8kHx=aSp+FpUFRD|bjFVY@)#&E_{k*S5sY#Wgu%UNS4^72aS!i7^H(`@fR2bDrTB z=fmDyt17}8O4a*+ouMEaRb~MalpxwoRAEEZalWZi{X)292novPgl4~XFdS)CUyg`6<;%s4-%i{HnoX&t+-KvaH6^AdLq+rlg^U019HfnGSf|;7p`jEkT#vw4vflbJ60zS zuy~yVHd(^HG10xzHm|#WZ&oU1@#}2ZoBEs#E&HPtDh=e`^+&I6?DA}+q=4E@;g#g0 z4HXGHOMC@fT%b(Cwl=b2%+FxOoLN7^pEiC~mCKH6k-{v!v_gu9(e&hno6K4tmcM}= zy~%DabraVj0K{C8ugAy;%3izjEEy1Dk&1iDQ|d;XM!nL&!zU>@wzNh)clX~h5pfdW zrgL%l?$vq^XR;`-aZkL`^tCJT$>~$x$5{v84{ax8$tPcJd+HU=;^yEtA4YvT(Nxu* zk^49dFDJWE$vAPMdzfA1MF+5l3O1gRAd|67@ik15rP|x> z*{);HbeGyeDrUeh!eo=*R%3sQ5dG8BGAgtchU5MCgxkl-{o5W)#o{o(ST+@aCW#=P zl)reFeJI3O3w#-SjTe6M8kv2ouM@oS8^R$D9jQRCmq+DUR@PN# z+Sun+;)ti5*@4sIYb`g|2aj!QiH5v)TH4mCG7u`Xr~!RixuKm#b&Rd6aq`fv$?Gq) zoI^%m*G2@(ArqI$RU?;uM@%yP)Kbg0La$jP`#nAU4Vv&qyLfDy7wTQz#U&bKGKGQ+ z<AJ~9DkH^=rA77@-s+GAB%p!l(bhrb#dWGEQ4% z{^D>4rasooYaYjxY&hD?F#|SCOp9y$c;ut61tUeoiN^kmu&>DZ-ZIx9>>49zvFr87 zsCW<#%r@?LyD07evrqo!OQZ=NLBv^4Zx~>16p3um$;{&OT3vGudy3n-MQ_hz+$Q@q zMv|A%rY(ok#QI;wUZ@Bs^?obs@XdK13*D5W(#A62DZ8F;5^0r7d7SV?!Rtstq0`o@ z>%OcsMq~2T=FMdpK=}pGrSgA}g28|=uE>I?Tk08N9#z-;%qDFT&+f1Ot1iln>qer# z6;@IvC^6?YOUHc09j#A%Ou@Flu+ZZk22#$4sQH8@gFT#hm@xR1kk zeX?%01{9Rw<|O>PjF2M(aNL1R!G?)Qol6Kr1fSSf-1@tX^Hl>)w?Kfizw^r9!xtnP zI(rozZ=ZoR2%(TBF#-{BdWqkvNiPi8Oxlx(CFMiEE6=vvmm4y&!--B>c`6$4rD5pK zVItV1bW4`lzH5wMcg{c0^7nntp}|Q{IR%wr6WaM7w_o^wKjJ=25pz>Yi$N@2^Z#Gp zy7bjg8PVCH59zjWsV91C5N!Cp?q4&J*38%W(t%{{wPSi7=l_2F<=&deBqlV(!{}mk z4`sIa11)wX$_Rg>h!_2~!ob5Ae8hB1&(=QALAU#8gRln9GzOAKp?ljlJgADs^-)*2 zHtuW)FkKIz>eWA)fE0+0K_!*0biU|GS=$dj-}6npt9fI{(93~wpx!6scJ(F+@$zlg zpfI0n&#;$B1J(rDzbJZArhq)zZPICx^$*+OSmPF?!8Aef;n$yLLY|{cT+o4EPYoLt z2iFIh)A6KSYGvz7Sn7N)zkYQ>Wb_$D{JXi<)o^H4{{$3rXFZEcO||TG65rpo{s@fH z84-R^5h3_3_BUTg0${dv72gRGcJ3KkGUaopF+gk%X7naGmZc; z9SFSTgHW>`{ z7(>uJZw)pTX@NyBDQMPU`;3mB1olPWr~dAINa_AF=$HMsA4if>4!Ayj)%=18Ic*M_ z0#d(Sa+imWEU^IaQ<{Q@l6fRJ=pkC(&9Zst|BHZbfd|sLD^hdbC9rZ1R+b$j0Zc(l+!TiD^nX|lQ5W!8KAq&@ucO0m*6w#r7 zB}ZZ~p<6=tp05`lZ&IANm&?LdIAP!tb$vv}D-?~izJ2BAwzJI7?H7eX>Aualv~8J6 zwY9zY;z0lu=mh4woB4jA6+&9Zo=vDWFTRrcoR!3b7IP+*KiHqu2A_@MkZvMSp2b#C zRkZAE-f2RV9m!N&dcQ}H2J#=jFe#7Wu|BcJQXTnWlm}tesg`^{WFtof^3~;L#3eOZ>NiC%GIAc8d#s*S423~zK00{Wp_8Q9s!*OLr;IzBuc@VIhR z+T8*9Gd@yR5;?={m+e?|wR&pfDdVE}Ip0F5{P|TgmJZ4)$Jw>Z6F-sm;NX`UiJoh` z*M!I|LM2fsw(slm;tvswcYPLt>E`|ZcljgSfL8aRVRF98&R02aB6nZq;J5kOg%;}| z4J?`}yU?{0EdxI-URY)zDI`8YvS0?43`>K_Ywec=<*yFdaR6{BlF0OXZwcw1B7u}7 zUpCARv}MT+4hLicLjSHE#qn`A&(1r>4PEJ{WhKi{$tayu=9e<>e7?h;3BLu^RWfI| ztwl9!$^66YN9f9jCQv@!8h^579#O}%{^Mc(8$O8Bot_$g@jH2@Qa^BM%{iC|1U$>o z*@d6b=9+2Jgw__u>~Da}7?vs;kxmTNH<&C-GsXO;5)vX+k}hK(;y`;% zPbh4J5Z;GBEiLVz@o|x5oqL3}0=)~fExOU-7oR^+nNq&Zw17(Tl_0WAEg2{5TZWHl zs7LogLG%?dqNqt-cH~|QJ912p2U2kNOpUX3uzsQ_rk%J7N|1L9v^iv1)#563b_T32 zHP^3WkCZ*oCRg1|nR=7{@**u}(W{7P#)A_i?PKKR z=-K@2LkTm$lSZ<67@N#m>@o;?If;lzE!_x$@J8HI~U(6QXPtO(kgpS<965!ij~WF zTWs;qW0g?&@}QgCLbHX&9K8b6R(D*#QN1Bw5e1zjfs+(rI3!wiJOGTtzb2Sjvw}99 zs0m6o!+4_Sgt!Kdro-D(r-1NLcF&F*-Ux~ToXeh(_&rwO!uI{t!f6VM~_NuW6R(# z&QB)TulpI%wt5t`g{~)l*A~>`T$#a#+~%gQm=!yVIZHn8E6he8mx&3A+2{z{spA@p*r0CP69;&-iiwD}K! zfbHY&-`Kq2Jlp3B2*g*a)vtAdA_J{53Z&PQ0H8kpm_T3+D6irCvKXI*<}g1nZ`?sY z&((@tA%O#1Hcx~7L{6%1vq+>OzZ$>++~d47AZ{h#Yf^#clt;q6Gnj! zr=bZ(k9XsYo-(c2t5R5|>|YZdwd|pk9_)!`@9A^APu@ogU!D5tFV7WW*9`5*=L1=Q zrF5@2szTb<)tf4`S^yMcn5g8~mpDqJhPd!gWh_1JcPzhi$Bb4%=Dk)lKElC4BksJx zMjJIMqF%xJ8L4$!4&l7IK8j!nC1dtkK~Bb%W(M-}DIlkZ874O0MTYg+T0vL1D`U%n z2_iUO0Cx18Jo{q?22k@7rrnn&#VZdt@J9Sr#|wB92}-C!52J+GR+~}4s5z}AG3MXF zUtcFFfs(KqD$&bU(EqIqc)u_c3mnE?cY1uBm}omSWb4Ns;lMO_{wDIfcJ0V3`h_30 zg3H#_|EZE^{hMP#mW#s%+)`X=t%g3je$^bC+Lr1a`@d`AsWV$OBLiNayyNxYhtLFa z*9$MNCyM_2@7o@US4m=yM7fk{v>0&7QkP z)bVrfs&kM3(Vrp?*o#xU30W3KZ#6L800=?fMrHYWP@Q(}>dwJwQfwFn`s&a9hc4R$ zfbheOG)1{G&(|s7RoT~ZFV=i`0Oo@;^C0!p)VOI^MDYw|7QXCvz9Xa){K(hcpr%V* zz)9-D8f5Q;*-bJOxZq&hTI}f+b=x}C)}vH+>j#6EHL1Se%#-gTD;Q9SK=#?3?!wrF5TfUrL?!TS^Gw9pTXl? z5aqZ8PyUCQYMhF%6$ENcP2*XuI@c8sx7#3pl*!UNo?#uysN^mWk6Icqh;8~psSm2QX*J9Q)@Sa>{J?`vV5F@xxO{{e zWY8$`UqF*I(lk3kqb7n=pnMPJHaMDQNN+eE{-jUip{|z!=fCt4Xcp@e@rp^`?4o)? z$V_`Qy=ztaOQ12Kb~tm2Fw3V9l|1)nITRl%EXM+bJ*SqUdZ%(qG}$pjeC%CY*rF9V1{i~3?} zMCMeE4Y414LEnAx3NJatfGZ-aau1_my=*`|O_SlHvRGf~W#r(cJvbO>+1;!S#PPB& z5==d5jo}_TS$>My-g=r|e^+kk`@`s@rm4c3j}dvmBO#^CuJgYeKe4egDd7+|6#wvN z?xDPLB?I^WkT3v(njCIG_r0LC?f0$z&tGq_d+aKKCg0)qEfzeRX$9s`)BPWmT$QSe z_MTGF*H7t@!Bv7RwoUq2(BdWGGas4tv(^Q}BKVThp_1^N*GTp}Z@eE%fap9mq#nm= zInHMMrF(A4bhZ6FmxYN33IzvRWtMntbMP8yv9}I;94XKzv5OdraM$h`{g| zpduTIwkDPE51Pf~ZAz8ule;oTX`;nXlk-cCBj0lYdkWBIEy8{d<Ng zWpSDbf1>od0N-~?MmTmmehyaRE6@sPcNbsUH=qT!5di{Y1Hg#%zpqpuRov}D|Ja2L z{$ot~TiN=~Sd-Rkz2MqvkD7&jsI|0l3OU<1!>>7PH#jM_H06K)6G$+KW>?#cICphYt|`ig41(@mK<}4ra9nr@!WQu zPJ*by{Bk3apwB}WYyDKNSKQTN1iv`Bbs05*dGFx*mvj2yq-Wf<-o?{g!=!J47~^GD zzZEH^-A@7}1;QV<3TXL(CUrnz$sDsb{W(jl7(Sg;LqH>8QTLExvS+ynW=KLRGkUg_4tV@6dbUNE^s6fi>Y<%M90A zzwQDQ@Drq~N=^=OpALPI91RqEm$CE*rp0B{IKn?M@+w*F2BvOWsnUbUQQojb~wL`*jo(*^{xQ-LOO}Y%_W?k>U+Ysh2{j*>ugrp92W~Oqd|H&4 zkMFSCHYgRoI4LPnEiTsh;UC(1lP`l62YzT1Y`JZTj;~B5F>WiRk2HPABEQNA33_X^hfHHExdnkzQ<$1@M=; zqy6INe+F;@3=81+@)*wZjZG_TeXh+?HT4Wk9 z^vvSaUh~u@MS|}vu>iC8)OWMRZ~N$a+%8|n6*#BU0zEMVl+Z>Raa zba!`CR+b|I^w=8B%TeY*$MkPNEv47nKh?yT!!_x+UN9o`=F08j%yp*u4Y;+EUFv-(d>aw7vD|xz9AnNhGdzF z6g^UnrR8W8WSAsLU@Ec2+PpKvE-v`oPM=WtU*iS-AH_-p9_4?%NYjAV%R9t#) zAQ0STQ}zjsn;a1iX2q%9rV1sFT)aHs#W7E(g^MC31?tLur^C~ltCp>`UG{z7^OA%H zx{`f3cy;{F_7YO42_0z|Dg5+FK>aLH0`B4A(+ecnv*tD5M{krPM#csC2VwNzwUD2H zgtjW4C+oLOIW*>zwt=A5j1*3sp7@WwCEz`D4R8-d%DD#Kr9qXA zxcU(NCNMVm`3evaV}kcg&o}5a^>KC|1}`);qM|pm|94L4@~ge+rZjOf0u8yj@&!X?^)07o(Y`#aq9Gv#}`- z@4aYLK^lk(xIbbKS)K-!Y*o`xFfchP-(zR_t2+1%1Qx)hT8B3@LS~eBN0;PURW($N zc5p^^jpLi;hYFb|L3;up&(Fq^TL*hlZ zKgg_y9SDa|oyDzGY}6VC4>YqqmOkN5_VRafDu@Sfg zneYpT(o97erX`bpWn`>0v9buhyT36V`fhvSxkl;-Tu-gEQQq^I>hM#Vis?*|?zrNrNnbnx8y!!Rx= zs3mdk)woWXsPnK}e=}=m_8)vUpy%TC^9vryiuYX7>K5H!kVckdQw|1|xio@c2v@}d-5T)ETXZL(VB-I}hk zT4gTEbyiB|8qp*{3GH6niQ@&npvK8PY1GhmX~zRk=ktgxt zLHZTMn6=FRj$P=DTXS>CN=^8dy5uaL(u_lBDq4$D!mC4&(NuVe zV^S0~ss87BPG;bufFIQ4@m&FZr7o^sPtH%yCt!q`GRSA-d%81(XLM@>l*4`%Q9Sf^ zG1@3~%1Y13GrF!81=o%X1!!05p;W=$*3n!X9Zv`!EJ<=B;i;oXod|rRcL0gOWH!b0 z$&!3bj$A_KWM#Dq>Wg*DE{g2&1g9cK!KP5Yb9Kn(GvfS`f%}hmeyi`4m{)PA9zrPVe^{YNry(3ztn4Kc9UW*d(?#6r6 z3LfrD3UGA+7q+s~OIj_(4e?k;k;<5Im$o&k><%oQ-Uf%JxDmeXC_LOu7tn9sLsuyTb5)d>!+;QacsnA_yV|V|U8s$|a@lljh z<+eq_x6T43l)~AdCM&~{vvc&?PP~S)3|~jG#Hdm0CLwpH$qaBX(z5uj1t%+XV!d78 z*u3%yqWI$!#+~iT5g3X!u&vir`0x+54ruvAz*B234W zII|QkOFTMvt9ie#X=ZOv3U`-niXsZzSGr&+kVqPP3fTfK4u}|w zi@^_>c{wR{cL!Z z!pw`hiD9SRTo)%k4L8^pIB4I)7_@4kDLr-00lW@6GAG-gFP4x~e%(u#A7f_6Ou0Q} zZBJIUe6qBro}J90ZjZha1M~f(CkbkeS#arK%bH!#UDM5NU)%Xldh)65PLUZ1YGWtc zs%1ZKOF+$8zu|H=d2_F$BH2ZQa_)^Xl%8{NDqR8F^%}_f!vp}A?O&>E?J#7bgQ{69bDNmZ`z#)XkPyA;!E+12TXgne45LxWXuYVCBmGS!{8x zrIW2}DkbAqqzbMkABDl>f^OK?;TbG`J8xO~@&BlAZpwkm`)Lt2&#Fz$NCuhVR$yd$hO3Ko$s5UvQ>BNt5q7}14!9@ zhabP%*=%s=idtFj?)m1rl%hAeF3>GnJe+P)0t8T}>o8{5kt1#_#OevXz?D&E$Oc)4 znWCdOwo*#BW|@PGAFi(ymglZOk)PHMJ`>_$REKwn+wSLn!5aKKODnj>Ealr2S=A>k zNwiDRjHl~WYzsHJQ>(sd-}m`gf3U9zyCTN6Obf@^;U&9&%OZ;8M6*bSvU`RW5kg@N z_2UY|Y_B^KOI~^uqlhgOxMH|O)Kxl71M^%@+lmfN9;5cIhtfMJm!yPjO-dH^mo?1I zu&G}<&b%Z4qvsizYl!8!m~f}l2WX=r%yLBMHrHA|e%*>BR!09?LN2C?yEfeA#CVos z!uF|BjJeG4?XKpin;)USvFPhO6~Z2^8tikC|M;dB_USwtb9VUgwDo2^_C#b1Bjg+^ z1>Xi&J@B-yvnCI0K{+PZ+QZh7wTp1NX!Xyx3-GGv%WF4>#bsN@C5|kA^B$msLNmK0#AznNK5w1s zhk~#MB`{Ld(~%gF8{wLhc*$cLZFUy)C+m+(qz?M}I+!D_Kxib*cnxPJJoi#fiYvp& zNq*BMmycbOdqw`01FHLFqa>N`mm&HU!i$9y^R)Bj(QeGb;1N#E;Pw&6j*Enqn z(zl1GUp>O&rbkli7Kjob3Kk#Q_8+jj7}g!#0)%elty7+vfUA zjOOq&*HTty8GnI&F3K24%tqvP3`2Ld>8a@&|4$!He^DFM{)6dMze18NU_&OzZr$d~ z88jp5{w{F00F~y*ev4jhb=vJ!f$Uz8I2|KI*^qfQr`mrFX>f*+sKgu3K3Tb_df>89 ze%fjEdhN^EngqD>TTw1T>l4jcxN4Ze0-V-`58l4lekv$0?>8{Lr=mqz9+*Y!@Pozw ztL@3?(8Z&(v)(d&SQ6mR7cLel|8#X*7v}Ws%3m~1-N|yINUYT4+7O_}OPbTb`)z#L zdWWCmB^8ah?L5a)!jylv)lpcC))om}!z_=uVS$?4gdghyQwn|za!1zCd!`@TjoRqK zqn$zC^1VrGtaWZ>cz^RklCFN=ZM_4BmlxJo#?D8l-luQVycw!#?B{(hTIvC{*uOjeCFI8{JIRyvADUV)9my@mb?W%P#icc4S%E}3@6$|P_?5e#BD~; zdMmqy`wPrg*C-IT+_xVqsogF(lD{ZJzvWW$!ssOTCQqtGl(x3WLA)ifHOE|p$yLma zgjSUKevww$f+ZEV(+3_ktR#-Tprw^jOhg%e5h7%37ivW3qWC)epP1*jNf5)Clk z;9`e4&E=RO#2mbNJyon`_6cAw1`|$!B_w9hvxL%l1vt0>pl+>*f^#lT)+u+<5Ubh@2~A_s{#ExKa1--ODGF zyL4)F@NlttiBuw#Ta>eWZeop!&%>QP5~jbALMW6`~5$ChlRSwDvh$g`LAGc@C=NJWn}Lb$FJI4*p#~`Tk_ynW?lW zqrXtsyLCtF`OmvHEA0R@63nVKsN}yaUU&S%iMT{M z|MGwAN$y8gIxVaealaJVe(%d>c1SUt^-dP!HXkLig;eC2#}s|S=>CIeX;m8=qtDBj z=_HQ0XJaCmxBI8EC^K+3QjiJ;V+-n?pSv%|zrWbNtW>BX>lm`v?HwX5aLDQ2qOJMr zMy!L6Vfec~4J@?s%$1NrYoX!G+k@04xDit8H#K9D^4^xO?iV`4}Nsd&*%g{==! zjrW~1o3M*+-VUP`xI z>FNwBSZ3*&&5v0-y6e&K$E%LVD3-<1s|05O?zbc<5iVDl>fLBYK&j4j0j(H3Dq1)% zR4<2IA=d`AEt}YBFhdNUcOhED%caj^ie!u_^61Qak@?qqW=&C z?oac(4`Hrfx`(?H-A}YRx__8^G>DJ7Y|&CaFeS;u{2-~cZFTEQgfVX%t2sUffL1Ja;?>!WP>GqAZimFYV4p_3IiTA*6JaUgy= zLvv~$qw4$jcM`^-Hzt%|TCX>FvibdC`fe$A)}kI~Baw^2r3*=V1|L#{0`K9C$b<)D zN0ss|B4#@^3^r%=)?tYSW^%N4#YC#@eyb~!_lx}PLw;yt6%lU^Yb}$@r6?@AFm#yA z{ITQl)S@)WNcQa9QM768;9_@`3c4KnC(Em6fOMNsGYp4Vv%#2LwYrQ_m9kL7SmT5h z?SzM)WFuRzcQ`C)H?K~tjECW>|Mmfm>Bhhl63%q|D(z->*9A&(ZRP5w{lWzu;MSiN z+8`563QdSVh}uBs2jRJD7A2R7&s2CFBk;gL>C z3Axq-+y9_aqV!H|sQ6@Hvrfh*1l=;QquFzJe_S6PI-!oN7BwVmgyn^H^f~PL=RV4D z_1U`YhC27&8#OMHYAW@N8i!<^quZ|MoSl~$HPFoOC-4?#7o8knQN1TF@)0%1U*M{* zYmPN^!egELQH(UqFjiSCSQc+nM1W3$5kqbMTSM6T${$zVw$ed^9!>fW|c@Iv#zcuPNB2AT_(&@<(X2* zCT(wo>PHikywcyz{ryUcMKjN=dZmcw8f7{C8zSTv1G1H+!vQrPoKX~ZuYsb+cY^J6^Xwz zyWg$lJm1YR-F{j){K3up+dEReO#5DEMvr{HTUJqA?6e{kEjKDY4mO=i)Fhr0@O3a= zir+rNj&Ucx;58lJc{|4cMlCypTxIjLvAyR{H1KZCt(jq^hSk*}R_lBB_CuckkBG<( z0=S}&E{dhQ9c*_-|MeNkAppy@u(bj17fQt`E+WFl78vju0!Y;AcYy<51(ToQWPO%t zmb*$asC|ze7RHEFDhU#-ox>MD3eVx}M%}J^hz;Q~4uPmNds=PWWMfwB-|04sE@hgU z>BTbVcsj2?m?I6AZOzC0E2;Q}@Jyzd*DCWcMw2s^qhq4iRwk!n%H4DPvf2h*T2(u7 z9Rwj z6^0L8eiEb~iRM&NOk9v>Zh7LXznk6W1W;quio z0e;d~^g)ZXfuVL1%&jIFz^>4YKiIiQx2bm(j;06L1{uuj;x1`B-jDmAWV`wCNAj}M z(*Rgv7X)1IXt*D#V8S006xOmW@B@r5`o~RDS0}!tJo`Y!ah?!kOh~8_h|B;|rm03~ zLi~B?y(5zUeC*HWXDXGG3-I?~UMS*y!0M+z&q}z^t*4>c`=Y5SUrg^_;E~a)KU)nG z=HYv5rdL(2l6|S*Y-W{=Dk?YlWnTpV_I=Bo6`ixC%5(4$aMnD{tp*^Ai}e}E_E}!X z$v050QO^)ySr_( z@XI%5!x(5t>8e9pUdhqqSJ>E89dNAqVx|JSFnDC~5REG`bImHEfLi#8RKbGq*9S7DR6qqQ)c zmn)R4$BD=Xnp7(?yb9vo`IZvyJstlFF{sr9rJ1JYtc~5A;fZtGLp^CaAgM-De-SDt z{N?sh2yn}oot=&Nk<4<2mmLsWjpvb2ycb-#$vVG`2FCuvImF|`E`4{U)hqbqtQz{$ z$Dp|CFFa~_L15Y13EDOP8?{)t4e)mhM1}o1$T6u=HFQt3`5=XblHeNaOoIZ&N8M?K zOtQ^BisG?`3UsfIzq2V_B+EZ|-hX}?Pu3m$$O@9b9Xt6U}dc-Wl?`Dq8Ft9q@h3Ah!$R8aC>w;f!!`hnHZDZu;Bwzm!h_l=qsSY;T|1lc?Z3 zhACcswU|~d*HBb=QlcS^YMHG$dQ~;%RqkF@Z)rN*W=hihXDDKQ%){CF`}sw?k4+1L z@}s&_P;%@~O6DUsR8c14cW}7ljG)2Eo&#sx_2yv7q%qW0kLYjPqfQQz}b! zY5T_~<=W0HqvMq%6LSIn?;SmDZ``{N3$v1yf2e1ai`J1O!j`4`+o#0k7q}(6VAZ z+2+v_>%KW?Gd7-(X|npBTy^fKH#Q>q2}BS9eZj~W`)|ll_mqHD{X7X7v&HR9aB!;R zeh2QgGGC*N3IArVJA;Nd0Hj|~idEVM@3cbl)#m4q{TB56s0W`2@tq4*9S+b<*fT~w zQdZLoM@#8+sC8BjiZc@9BN>qMpS_de5ZHeG!^+3c4G`~#(k5Qin66?wpY#(yLj5jwI8BC^PKi*GiA((us+SQ$3P0bAs;g5RS z`0@xw9fRt%-a7a`31)+&Crs9{x3ZTdx&xww!F8^2(L9q`lL0H>TQo+ zrjG8xY9ak1_4C_bTgUJkW|U_svkdrwvQT6NK_0yy?;lN)1pLT<=K-gZ3C|#Zy)vb? zW&Sg-*rG7jJHy_I%E*7?9E{-kF9b5UTj*^0?l#lHZ^&sGXy zu!>}zn!Bztul|q8mEf#7J1ei~$NGkhE6)ZXB^Um}8b77@kIfeBv04-oPu3RY{p%!H z=*KlKgS1^=g*Oe)m|lA&lCdaUH6g7W(|{A18F*7OiLp`99%0H>?vkkSiQa?Ff^kX} z9n1o!EfD)ZBQd=w4&E^QAa0iW%@^Wksw?#6RB~-VN+7>(dzHwvyztPXZiM-RgKPK3 z+y{+G;N@6cSqfr>qCYvR^rWO3y9e3)yf9kExu>MWjN1v8!e1hWs|>e~?M_GD~ZJ!6WNI zd_{pBdNog!Q^Yo`r9OE^gfAh#Y#|^H>+)D|Z%(R;godqL-orsfX9QBCO?~eUR$*Fd zZWNz)V28!y`5;0D>BKkIf9%$!E74}vi1xXK+xV!G4D!eMF)g=F&nz^%xTyIl8@?rGNHeBR-hhZWg=UD3(#$9IZzeYG5bd6m?4?&kix zeafT31oyX?Q0Of|vvj{TaNm5FktZGUtWR7r)vhBv81G~4?+1Qx3g0x;F5p_y{P+)M zRw!FFL+RuVY3U*bRz^Tc(_dX(-C6d!g|F`2A3U-EI4txBUUgULKRyx?IS6r3CM40B zNvJ;3MdPW^gAt^69kHbSvxvhFYne=i;FsV|^XuOaci?^~goA;GgGs_sg{)u?Nh#b4 z0DSI>hoxd3fmnll@2G_QPCicgKKPkkHCUkGo2(Sc$-|D=Z-_v6sfO2tKhqiFqE^Om z2#g4pmKfSE)Jg5wCeB_x<0KDfv|yMm7oxnq?$+R>5FX^->=pfhlKdICqHvP=iH_A( zS|~T(ZEj(BcTKUG^8@VWliu@(6V6nkxcTlC6uyM*el{;7{n~ikuP?qfpN`zDs0-oMzM8uearG$UVzqkIWodlvHo)2tV{S9r5`V=EZ8N2T1Kjw5Q&vb7O}d~)WZ zI;R|iM;+b-{KSQXJ`n;yF`#7lqesg|(}XAX&iS}(W@cOQuWIJg44@)hU->x(Zu|OT zxuCTyPkuOw1$k4=&BTHY z-W4Bc%@F)BaWVMOemr|xs59T&sn?C1U(FDJdlh-4_n~eZ8AU8wvC4SKdRq+IusF|t zwI`u(uSYnP_5%^`3PI;+XYC4j=Ii!mvS#JF&}` zdRo>S%g&8&*;4#LXW)q7uh4h>2K!C}i;q{}v(6$3R>YaB$%_mG;$!pYacKfB98+6Q zMk=h1>S1}}^WbVg!mWft$XnO?IM>wlP-m$>m8~@#)IFC6GTn{YfBW$0-#*Cp-Jnjr z_x^=TNV-uz&jP0lf5OdYUsbRt1NMlO1+p<&wlllm$LTCub>mIpkd{gzcOD>5cV_Ed zZiq?Bs84+ck;ILnOLm3ceF<7@xukV#<6n3@S6eF+%}$5Kgs*<DI4?!SQegMJFAu?kn8 zsS(e$jBzgg#wyw~@MN=S%;(+_TR*R~Q3*xiV!kyqWAVqjs{X42*J#$4hOAPY=rBZ_ z9?zc3wsnOG<&Xgd2&UvT^&KIIoZ0HnpdC^=Ces%UUI;i$hkVpjq<0>lFC$cxrUCNC ze7e9lzJ>ly?I9dE&S$oW+?j+;)hhP?;-@MR+6mj4@O5v}KQ+93znHxGW!U9srKgmM z0zNdJ`Y6!PHsHq0sZ*iOoakX;;eH5ojDfUysU5N=Uo`t_U0H^L$cmR>!aB8#p|aB1 zjM2xTqFSk%biV{gU8XM%(qO@CpO~|@Qo%)`(!3ct>Y5A!A@VO(e{0Q>|D@ZH&6_Ia zZK|NY{!2>Gi{RJ$^|^L!&WQql38DWmBK3gTLq2H>3C+~%0u|2*xqc+7_JymYo|ljj zcV+GdwFRrOkcBoO#)K_~cU6Y$vD2^PgQvA=Irr$~d-k4TsU=mmdN8~y+L%#Gh+ty) zV6N|F4Jo5Q1^T|67&Mz6TW7t~!zxv{keE))mFnxC!K!d$>Pr<_BJ2`tu&CQNF}I9U zNN7pr`_$=~Q+Lhn`0ky)QhCFi`(+c$=ibcv#{O{_PY%}?cTh1(#j6b4>aX85`E_@)pLe)?R`{A~vDi1u%>!VXV?21vBu7jSh`8em)1)gnk%-mNAgY1L@xzkJ zN)X82x}Uu8!Lgtl`miUOByE5MQpYtD1!sC50 zPDqb7g0c5s1Kt?S%de|bKjN)75?89xSC)8Q`b1T2a{6^vu=<-%mCr3w(<)C>Vq?W* zy~4REwCuI`sL~ZM{!W#J2bvlB9UQ~8pYKBkk&{(Kl@ke%WT!|Ms>(a{A&!NeP+}WF z9e0WWz3JIfH5s_UduhYB_uTNkNrBj_m!&u}Hj8$*`@{%M`^f9fw+9Tn2a>fzYmYZc zUs$oSYG5Evt7E$n5ayVkIvT$40BM}-E#cM7_cDsUV^x(N0#}USmTz!--ErPOu&y)5 zpjQ-0Z&p9MPb@N`i1BlEqyeWhQ0SVCR6BgSU0YG8&MLZwGt$`R&Wp)cVLg{9PBzls z=7w~rvacweX(s3<-u@NNCER99R#g7DU#@#_^wd~7Ez^Kl@m`@twaNB)j~*LCVSiO( zkaI}KVXwXJT)^tmU)9DyZhE1L*@HPmcJ%%7q9%<+2J80|Mr?DF?YK=T0baHalMCeH zUD%)A*{$665LSkP+F6%5OMXa^Cc2F%JQ9n5hH%Lz(;wRG%oL00U)@3~vQgVi1i%3{ z^6ABtNax-BqVVe2ijaFTXxw7B6!Lj>81h*X0gYXpd2{>&B1iF%?^A7#5$&v>Hv6`o zB@wpR^Vmul9Rx(~x)Y!l=*IH94qX82e#TVv{%9C^V|sfZ)1$4o0Y#w_lWLS2cRDTQq18U%%)=%sAczokeT|USF(oBC5aU~azjf(F4R9Vz-MV?@Qmz!>cOG zXAF1-GK%73Y75ZDRPu`d)|%p(|IpJu3|>1?soUc4qqmN2r*RHt=l6hZ_6{qKR`9|= z_RN@MpwCc#|Fj~IK!DQf{oEqhy*)9U@Gv3RfW#)yy?vnB?uXeCS8TmE)+SiS$SK+{ zYV3AFvbj`4$<_Tk=PJfFMT1JIu3ji?`C;eGirpYz`ThvE%r-@itJD<$^w9Hh$Yk>i zXl3)h*5ab1!TsiH zC9Z03G2e&%BXh#(SJV9w-Wud0=MW3O4uHw!;W|B6(AGt3D7L$dm;S1pZTCq8B7uol|A-jXo zw_n0vVa?}wDpEdVf6+7di=j-%F~%CgO?Gx}FB&R}(gV>IHBv|)KpXZ@Eba}|Q?}3g zf33u!P$iZ*i>##RRm`yFDaryEK#R!;R3qw-q@EKD?7woPR@-hX{$StFrrvA9@yVB@ zyf7=N^RO2nZ=;D5cH(m!#_t4&b6H$Fw_y8&^ohev{U~QTFo$uN3+0|Tt z1ELJy;-mLA<#QrSJ@o8N)+^)S6pdZPIy@RZdpP%03?OAkVbyp>k5;Sbr{^4BDPax~ zO{bcC{`6n7GE(YEpf;UeRM5n)$uZK(^;7Gsa)ahC`gx~BTcb$t0wrX83|Hv=K1BbN1fcS zL^{-E)n72{ebAS!H9nEK1c8 zrG%m3#H(un-rUvD?wG&&HWX*EMp-NQ)Nx3iuFA*avhFn1P8>T{`kqb%q>2Zell$I1 z?Fuiz{d9o!TE~;!HW(q0QuxE(mBWs2V|$B?8aPY504@^H6(a%#+rO^RthODNhQHa$ z%OD6PLLqm}pkiZ+a8yw+>Uvm^thda&i$;k0B2OmY#`m!P)5A*IGj_jUSnOg?i3i0z z+5GcDuVD0L^@?9-^uo(|`!WyM1JgM-O|`Yz?6RnyK(EC*ch%Y#X;75CiQk%+4NZp2 z=feXA5N7$lFLbpugrfP79*IrF7dALdg5Z&*xudeVT3iaPYqLVi|E^BQ#>8Mh$S0bQ ziH(&AXn^?MIbGKrK3SjBEF|QM?RPe;SKk4*vYSi>-$zUXKxTsH*1#ENu4riT0QWPl z<5Q>3Z6w}W8D)-rFd<5o{@~;H(OM2PxN3%DlIYOZOg!d%zt_M9^+dv;wb-skSKmwn z_ihvC2Yamhd&98iq6KP~klT|BaW}4nnaz_*2!FI||J~vkm0GF#F=mC#6I8!b1aG3< zqAmH&USa)EIpKkN0(HlGIHs?&T!tn6=}YnH56C$jpMV#(^{$4FfzrVa#Vzc9Y*B5(!S z`fTd42$zExI`-9|PRW|;boZq$8NTtHX@QjYN87pWOMVt-9slj;TAMBHkcnw zu}zO>_Vm|gxaFZwg*(QRciBC=bUV=jv zjiOiO*m{mU3y0B%zPPAWgPf)XD;VzSbD{VsO& zoy_`DhBNeG2YO`~!uq#LaoZrdG&(Wav~PDn9y`Y|CUth zn6$8K2It&q&eGuNw|V7m zZj0J{9Sar6v@2?-DogOH=-V}Xq~&})_qZ-tT8di{K-~Xn>;Y=TCa-N z6qL$-XSCJxR#+?O+C#+$0{o!JDa}|jnNy%rdV~d%juHK z=8~g)MZMa;{;7EW*@BBarqVUPs)=%n_OYK9JX=gLdDAOcQ$9V}wZDh6%x*=FWQ<3X z{zxVQX5wsfG1ZOmkH)lvSZLASXxQ2`*xNnl8%j3`NE9fk30Z?n#y+W88Lo`bQciD~ z2S)AcZYafkm2CPVSa!Ol!`VFd@lRYPJa*q}fL%&MmKl#v00cPv{;(>_Tm!RKEf@>! zUV**+kXE3WJJ&TahoXCouk9!s(Iqga{$jg#hVG+WlTFh+5qqYf!q4iH67|D%U6pjW zzh0wZRhE7yrKx+(xDroJM1V8}*pN)e@Bt^`;KzF#Y{w?4V`c5mesJ2rnw*Cj&zO-Q z-V8h;^&ysacBtRrS6AsLn&*XhVtO^Tizw*jidu@*f#iwG*OmB_|MQQLtCKfXZ*>>zKDDY(d^D8Nz#xloSMLZ zd!aJOG2Zq73!5+F;-Zf6mf1V14W<%|LdyP9oWh&^oGIZ5Wr15K=9PTDeK*%j?X_`S z8qVG9Qp2FrkHrYiOkC@X{WsZ5==XU4!qw39BQ0Gmx$!XodkB@(^3@G-QB#}Q^G$$P zIL@s4P9RSCOyEDB8Z*fSn;?MpUq8@mcJu9NXlqaPZJ2qj3iJ_rrSi1kNPm3utwpB; z^X-QKI3f9ee1iJmrO20y!Md5fCC7xN^jP99qu|3yoI*M7MZwXn7(7LB5z8MEe1(Al zVZ_&#_VqLkeOR{g_KAW$73}1lVzkRJ{DHg`_xICi=oSlEN<-A}82Lle4^&4-$=WhcH$6#JgVV$~a zTf10f$piN}pqQ)4W~x;@lG$406as;JDd*$A?dKJgO5>bY>Wz?Z?*>~wxx4$jyTDUE z0G;KZf3x^7rg4@;0xZa2Ua!gl+B1#x?%!@CH;rB|-8%4%(l{}7uWtZA(+}*XgQyZ{ z^8fwuqR$lMeEx2@3nlAJ`^DGoSmJhar80>`7{e;o>({f4(s#m;@2 zNBAyzg#ooH5p=>Q6MOB$Ak;e}8WDrx16ug^C%4!hf9=|RO;w>Kw!d}!P5h57@Hb6} z;=jc}x-<5FM+1n>|1J1GH2q)V;Que@{O|0zUPk<{=(wi9|BA=|-|CL5x!H@t-#?1+ z$XNXwJ88b--h2Ae``~4;N)L@6Q(4?Mm%H(d1M1!`cLx~*G~Z8xf4re_tt!~-xppy($0+2Lo5gMPl_5;8+SZVn}{{PT?K}vy-V>hCAbgUpw)io-0+Ya4h0z5p3 z_Fq>Bq(to0<{$Y2)OP#Tbd7>$djThR{G}4Q|LU&>Njo&}tUF!6>MyMdFS*21MneMw z*|oJODTzzb#ANwyjHCbj&jAvF_|w}Z?(9BGqpL+u^4zk&CzA(VMIt7sqHlj}Kj{T`JF72`}z&7aoh4@6DezsE{Bxg4m6XVIml^oK}0 zL^kp-7iVGSUs18Tb10w9O}kqlNm~{Wd!oaDuH!vTZu=Ozu14)Z_&cskO)VKE=gFTb zGS_{;4gxKtrY}5#!-t;Buvw6^qASJ_t-vUgjUIiHea#aX65!7rLjyVu#3pLb273L0 z2SR4^&8=Ob(@H)Y!JPCI9ax~?%QxwqUl#I-ylp+TpMt;NMF+wgzZIz7siL_9{?z^g z3Vnc0O&9i-rgAS1f|mQi3*Q?R-u{lG4>$oFIg)^#i7rYb*if3*DXDW zG{#Yni&HFK&$NFuc3tk1w=qs)EmnQMkx_611)sQMzKNN6;W_`GGc@s21^oCuB8qRG zzMxQk{QkA()y76tWasXUmS0+;uj%Q7x;GtmQ+OPM;H$>g22O7-?xULmBPjB&pV0cb z+fY=r2krBQDxFcEt#^o#l(AN-u4$pOya@nboxFT%&nwBMYp-rwadB@WAu^Kwdc<+5 zRBtm7S)Yy$$(K&8z4C}SWzxOHLtpBdn9Kq}x9UNWH{p6;?;}=X;?{Nk+Wlke!OMeL zG(}$}8RHymoNSoy>grG@tyafDFHsZa*Q04nKS;XTiRPkyf4t$q_kqUbyXd)?nkQtI z%AlsFhiD-pDU>Ku+?|@LUPDuQfH$3UAQF|9X4jf3ToLAkp3(zC0-51A{PzZ0_YoIp zI>$>^V1ya0AD#bp-Ta>yE;eSSFErT1iU#Gb=ezMMo+5C|QdiI%L_>lBgIX6gGdlXG zYv&6TEfofM=|SoS=4TAr**UFb{zrwNlU{9v;AQK2(AkqGtq2F6nKVk8PwkX(OUP#Nkt@_^6)UoF(F~? z;EIMU#i6Ta%ox^iDVU2U^qU0AAyF@H)6g)Y&6*nBrNwr3aXfKJJFC!8chuyj-B1Ir zh@_vu_$*6Y^%Oi`Ww|+tB>cf={bhXfu^PMLk z$+rL#q;i(^cV$`vGk)nsAZMVb8%&XKO!s>CT|R6ZQ!Lw zY>&u!avL6{Y`~OtWgyxyXbnFr+Q4EQ;Jhl7dn5Upka%?3%yr5w>5 zjRnR*7e8Mwp4;KIEf<^n#o~dTHJF++=tN^KAP`g}6<)h5p;CqF(1OC|))SDB+KHA3 zY#L~eRrJD^-KY)wVqt(5%>(+NLZ+ruw;2tMN9Z}@)du*Twsm&BsFbbgG;wBb{F#y; z$av#bs4))Nix2j9%<$BCJxgCKRaaXL-$Pga)9tahc9&nF5rTHRZoqp3ge^(9lF+Gsh2<%VFo=nYdY0!J!{|)NVy)f^;(zCmt6ysBy`H8cl?>Yx)Wb7+-~epjHmeBddNF_5^jzDN_aMUwg))TiZK^Xr+i z(JBy^*Xk(ubtJs8K~iO<_ivFqponMdmVOhr*0m1vqJL?E6LkoO2Nji;+R-Q-z2*vH zY-zccm9hdLv;0OGy(gNli@_&utbeS)=z5Ms542F@{VVmU{3s?qI| zHA?4vr7o$QFkKWASH(qw2i}cD8{^;@#oBZJ)nx196@C~T1{xYbngJF65zR)qYDtx`l)r?>6*4mp zh-;n!#zRh%2@qyVq9WH+#NGA(`kIlkb#_t}%JIgLLV#tG{+h-9AuLL}soQnhAaL=? zgDev$2xdzusVu@d7g(M8`N@tBH;#y;+8kg#mg=cBTy%pgffB&k(bdtJZ#q5f3DI^B zc|u5d+cW&niW>zX3go!q1A1V(RhM0;2OSgtzS!EoaAY<%Wb*QF|2`X{Q+cxs1%2iB zv?tNhG?#sl)Rc+h#<7hxTM{s4`nrLRxjaX6ZoWu`A8GIxX9@-QQs*`6$O@-(j*K`< zt3)#VrQoALxU2$xp_IzLn*)~yy3i*dV;s(h!e=Xfk4RN3)FVUGPD%!aIR^s>d-i*Ms&s z04_^gO7xq>40jO^-Gg_J&~H2;kQ~P2A?T7%Kb=7 z`{Of?FTm>?`R_mnYk=@!Je~!r_`3Z|65t&^-P@r5*7O5C8UCqXIYQ6C+*^QNOUq08 z(68GX3r(xC9NvMT3KXyAun#W4p4uXm>ZI^aBkh&oAjeMc&5d%6PBe5>~t**cQdDDjyw3f{mtMH2t_Bzpa ztyL#{58K>^glTW;B!ZN8pK;vJpK9Dj^HrKt%`atO;twZX9&c`{;hiCy{9&*^Xco#7 zppl(ROk`pxxWERbyz&9}rU9AJHCB+7Re#5P5c>Ke2)?T+ni-~Sk$=rugoC8dG+9}R z!O+AijOWm)9xXEsa?j2Io^1^u9!4bFY`+Fo$%>|P?nGma1DiHzMw($}E!21>AyNeC zB%>F>{lT7BdDs>G#SvfvlC3|zsaCNi#X9IB@Tq-0Jg)Gt9!*p!8r9o;fuq#;C3<*= z?}d=FWJEYWMwia7{a! z{r^amZu3wmqBTk5AUb7u>0-2f_j)OFAX0(x29wR?+9=pXf5uW;I-9W`1+?C^fS-Tn z07_JHaw+mVeeXxB)&FPZ;o*?1_vOG6(+lB(>GgG=mhf!#6`yEzj~m>IT2QVAYaVzK e>dP+D_{V=IKJb9EoM;!&fefCmelF{r5}E)%eIQ-{ literal 63190 zcmb5V1yEdFuq_P1AvnQ;6P&?4xVyUs3o{UcySoJl!QI{6Avj@hcMa|?gFN!tz4cf9 z_3Bm4)YLgMXYaFTcduT(x=)z0q7*7JAu<#c6snB0xGEGBOcoRrbP^)`>luBAXzkYz zXa`j(QK*VhqW#wcSPKya5h$qYXp~1|xYuJOTWK8!C@3t)KX2&O&!nzUP&ZaG;v(v< zhDYgez8Zaa{hh}r6bUCMxNs`sjOs@xcT4kGzTw*Q#M<-FMfha?j)ji3RaGknFZVm` zt!*n_Hn+zoOXh3#-tG&j4i-E8sizt27W%R{7_cJ$yaM_9%`blcq7a7rpEFV@<8*2T zNqGOAg6%q2c4akwcGPF#L9Lz}mugA)~REQ{OKT|6^7~iP> znW6-&gYJX&G6-yHX(?V)N6Peux4GoMH-C-`Oa>vZ!_| z|Lb?NwoaG5yyYm>m#56)zR0gviaHT+Zm5Yn9U*YLU}pU_<-3ZnBs`7nD9(U1Dv{9t zS=oaK>|eL|XF`8v=1{12|9y7=_xH7bO(NP(_V+EoiU`}uAYGtDs3@!Z$Feqkk4Om* zm;0V>q|UdEgOeH8_BxEqzrz59ap*A<3Inw=umbw?G#3JMChU!vmi#v-Uq4!Dw+kf- z`J`$;F^j{x?s3pcA7UqboS!3xS%NhYwwju54H8;5FfeN}K(U``k4e@FWaK<2RBh6N zJB)^0;Db%`4TEC+mO?Qp3yOZV(f(P1sD>x25B6hEO4rPc0zd{u(Uu4&#rT;d6!}X0 zdvq(V8M*g~t|JbeflM_J>DC78cbKh{eAQwmFgx36JV@Z4R=>0(a0dQoQdcDc{BQX4$JX^$pXHpIRmW1z4NV*hInWxz{2 zrG$-xhUk@gFey@vhQO8eJ6{wJsZYLG2ZAIOJm2F=C0YR5F1Bj^qaY3L!|l^`cZnZ{n5HobB||=Gfm_II$jotn*??I8xLAz3Ulaln3t9 z)A}pkE_SKVTc5mtBSfXSYa`eH4knkSMh#IvelZV!AAdU{eW2Fv18?POFH(>)n8oHT z2+z#WwB}}HEh7ieU6=#4y_Em+OY`r6fKmjBjoFQnaq=OAV@j{Oh>MH%{j-`TX2y-D z>GEWu6B2?*1_a52mg6ZlsDMTI&EZkoMeM&U4oIfV zauNle)sz}_$f5m0y06!T%3WE6e@x+77as?~hfJm{uuaP$wP05?Nyz%amt0$Sw`(lY z+^pn}<~x$|Push_8jI4yZoJxpgt`xh@+Ld|Aj%vX$Um{au?Mcb8?2pIk5YkZpg6&o zXN^H^G*7sa3fZ^%ij)XK^?LB<+MDiGiqH`$LjT)`{K+^l_*e98Y3cBg2<~?{scDHo zVRh4{eX`7sRy!7k^eAvaLC@2(lSNQU)~uYLer6gB)MBn%*Z5zw!86?E8z08VyL!wk zbBm^{=1kKRew5-EU`VX**?yv|hnqH}mEZsDahg0~zU;8jm^iB__t?H{dpr1fF|K*_wKj$vgs=ljuW`L%u$GTfnr=6h3dIf(! zW=bLTZlx9DrTWSjJD(P!OPBz_?c&fnLWrFg#g%{wMq)-Zjn8VdN9RJMQX(mPCFca& z^n0--I10V8EKz}fVIdn@q^sshyTR=jEDSs=3uX}9##(_$hAt0AMgBZ1Fn<;S;vR>r zImxv=z;EF{tJDH&DVZhfQ&jy7op7qqvly_?XB)XuBZDdnCde%$#BOvbtzP|oa+s5t zTwrcE)WdI=sUIJVYjHr@uCH+3Bbdw29b%Oo!3smI0%Qj$CYaOkY&5eA>IL->{A|ve9;9u_4PEd}-&`ujZx3t}eb`go{lWj(~{o0h{4FtraJ~ zHu4)CvXJWMHQer=(a^6bDtOwlkZVO0J$7SVh2ISDuJnwzO8BCgh~18sOVx~X%%f~U zqz*uijmpH!{bOKM$V@e3Kt5c&!&~a#6&GVra{N1wh8y_BLksoEq?;Pg?JEW>ZKhTG zP;dq^cyTDAc@jDFHtN0zqw4!r`n%U}=b%#+wFaEE+^#j;crrAzU|1)dk}1AV_`OD( zFmL)7NnSSli0?&#+(CGka(H`oUfoW__>d1Jp09Se??o%v%5mK@PeOChZ9wesffF5$ z9{MJgcu^1$?;1_(nxG;;G;$BepZxfZ2C)YvXDbGsC0lPhKwZ;ug>@4ENEEV>{y88Q zoh{`cRLA1uNaiskP<^5-nG7Y`#{E!__LBhjTKXKaJ;amFbV#XXFr{qda%H(;vnbN_ zV0=bD+uWXDBT|L;&zAU)3ug<5=6if;?r^teWK4=fSV_smK(90WD)<9r$TmSfq=h1_ zJAq$Rq*GPs79lgwTEa9Y;rA;`0!IPI=+Q%F4Y55khp{qCJRMv)d@~g{cz}5vvfE$Z z7bGk0tmz;Bq)rFK&%gGukSsM-YU*X{#E~R2+1bC;+lpdOIXo965D%NsmvThzzmi+D z+^`@rMJt^I zbe}HN?~(eb4ALu!@HGm`y!0LtbuF5iFD;t|el8iH=%CqLUcr^0|I`806@C6-yc6b@ ztDP^$csM{JSBdL;@G`eEu-?3ewmJ6l$8Y#RS1P={CElxl5}T1*QQc>r&tuMuzbuP!fb}ntLB+V4s|}oO#xOz$ zbOWo+goI#POzd;W*nmCcx^c>R^|4-}fDQai`9ij8ErKH-+4JTvHiR9z#D$R9gpgSY zN-yMM6pxTn{`irBjoPvq?Y>U8eYuIa-OLCRyA-a zeRyN5B!||U(dplSwbPiBGMpWpb(~MLImopnAmY65Z&j~BAeqlqMY(kM^hVE%DONuZ z&sH~clg@e!`5(3n+pczvHMEM|1t6amQ6wztD`MzdCkJ(h^?syll>u_$NP64JZq`Zrgn*Y=SrhYhnNwngtEW_nhUm)L~j+)dp*$=~k4MQY1bA8YNe1E9q9O=yG(Z<>W3Ba+7t}rQj2YDS~$I zJfx7F8H^PVIYR2)th+GFmNN?u^1i07)qPEHnE^1B@BD>pyc$}C=qv8M5LX2E0Z^Q_IeEcqWA($$N=H7% zK)}&RP44-DStdeOH<&jA^ga6h^Fp$J0Iq17qs>lbdDt(VAinRh&=Rf@7|Z}3y%2W$ zDjEF~^)~`5jOuPgkTo_-=EF7L%}890772C(xx4K3Ah|^o`CFEB?gRde(zLE>#r0;{ zq2fV%J~bP2Z(4D{L{96YtcWek|7m^+#ZM7vt8>%+t{*ty0TS)?y z1=b<;wK5-=mQ@m&(WxhPI_-tANi29jlg{x(CaaK-qrd_{IZlgH`6=x;&_uns9v4{T z_V>lDZxk0JvU-u}f50SMgz6l3h%jWVgs&cwGvMnb0oursh)odcv6tHOmot{o(uRp* z)m7GZegq$w08}meIH{Xf**XJH%7|q9@O35BWW2Qnb=AQ=pA@#8IL0i*8#uGZCo76& z18WokmuvLHQhG|QN#&)>4bRF2Cz+O6kSWW=9qc!8vq~A6*NV5hbGW^GKNYu;E-!yJ z3v{y_Z#L{rQ9vzh_hyT!IEg@KWM7yg0eZ?{a;G0@e|ncETq_;YK&I#o=nzcD_6=R^NU`%CdHK$Nz{PipJXo^TJ&}{@SEo`o0YI! z`nEFZE1d~d08gFd$D!7l=;$gCob^xE$Gy2$wy#+2?8wU4a08s5+fJR7^|JtQVun3j zBB~Vt*|eM5g-2GFNFh1K%G5Aucw42DT>eM|y|gODSA|0n5mAU%1gME3LBS2^lTLDb z{b`jKqL`piy_RP*Ah9<6_vGky%a7%mWiltH6|hduhL}5FJ;Am@2lx!{{TP@;A~ zC=|K?R}toV5mOf26dV4#Fyss2OAPobw!WtA>0Et-sdQd}L|kReEYX$!wKzEv0~ubk zaA*S%D3U!(o2@xJMI2^@5diU1m1h}@>Jp@41MZh7#fTV7x@gMDG1Y=M)b}!E8nOVSkA-4+=!QgVXt!wuku?1c-CMg2 z^w`RSSUYnP?;hty!V2Df-uv-5EMa|B?UFG;G{tNka=zVWAg_|raDr~F7ww2h-CeE&&Vr}i;hVT zu$vp)$&YbDnkt-WXS6`Q@Q{Qd5tv@hPcWjGS5_oT{%kym{L+kPAhMTAE7xVu-q&n%e^HfCpR9w>1pS^LOo&cl z|FdU(SP(%~{PJ6z=FnMM+>qBT+^#h9bOUYaNbEpqEr6=dz(8OMJ96 z*z4`Y=T9I7(<(B_J+J#p{9{?GNQsYXXFV-+np3jSdXHMqk0O}tx5T7Aa9+_J(=8g_Sv(ybsLkB zLism-F*g)e!0PPs=VTY%&xJ2`i0{$NljbykXSGxojC>4jKVRVc{)229fhm?oi7A=Q zJlsv?kEj(`g8!cgr8IN*aiUTIq8C1Ca?7b*D$U)nZ1m8!Nh%{HdMicN{C6AMIRNAy}OPz46ATdS8{3_UF zjrExF7}8Fy8};xF5Pqu4RE|e8FxVe@Uoa$xnVvt(zCMntq1Y1N(wzJto-hY2qa<0Y z)bQ11o537w+?J+}%1;&-IP?dhS-#IJuhjo6K%%j4qp>+tB+kgD}$Z0XCiXM zP$;KLRGUy%=o~IbZmG43(rF9Ibk>HBY*rI@&+|h!ov)QLu=3u9=8f4<0V+P5X%Pbl z+oB^D<&D)y!Zi}4sIvQ%G2u#ePjhebt8%t004Ek{2og7q>= zQKEN3pslSrcY|=11#lukc%?;*MQ!i)JIiR=qfn3&=Co;Ey&)g!onGrd&K<1kSCL3W z9q4t-W0$enm2$Sur_0N07MkJu?ZFCsT|4}|<5dqgR=2?D$T<4Cp!8rYZS%=03c;{d zrDL(KU(cz_N)ht)ktRi=f?xJ1caoQynP2ydRe@ySe#q?IrJg%e#3ifE^5>rphYm@% z)f%TblZ-Hpmz6Q3ls@(EG6Q$bS`yqgyi^34w^jP4-PjJourK>$dJApYF#g^If3oS1 zae`4lgd}xQB@{XH+O#K?FR9XW|K*>5JmCLNK>Z`>;r+{X{_N>oSA>*FQDQ38)a;Rymp9)w8yHc_ zaDg1ItgQ@%hj%F}0{j^l2PG)DYO8TulkzGT+w%M`ZTTOaIsyQFu(=a;6zA$nq!&_k zW{ZQ1o6?9V+S4}!7plN4Dm<_uTn%%ogNH{2G*BtSVe0G)ZE`aF{h$$f-hQrLNuzbW z+`6~cSHnsE_lTB$uOpTuY@vVY2{LG7`SKfRW^SJR*N9W~u&3V7Fl;GrgA-E&hHscE zXz2%otaj{N-I`LxfiMn8$|Gho;$L0uMRp@T?+2?I&@+@3!aF@_3*|v?%NVgs#9#NW zl%!gNO^=efw{kLiewbXp&!4*_Ju&lZ-^coRqgE*9ErJ>Tm|C(Xg*; z3+&EL$Ditg2~d3RcXagS5?2J+*#83<{5$hhqlBJ8t0SMNaFpDvl|rU zQh+z9#NXQf2qrW=2lautZwoDSN--?(!+3=OLhY+=pUt`@1KnbU;GE}54}DMxTSTt< zO4h^t8UC1Re#G6nsD=Q`X%kobQEJP})djsmVK@61=D13bi3 zZdT*{YwA2Cx}sl_#E`>fzZ34mnh!2k6S^(X(UT_qTdJm3Ttk?y zl3mzh&_G#UURF_8&)bp53F0dm zmu200LrY6LUh1~Ob0jzQiMgpX`G=$}D%^&8fLM9nHVy@Esqol)S2uSPNYwFs{0^K= zr||VpISh(F8o4bZs-|zrY5sZp%2^|nS}e`wEjQ>A<|b_@%#@&0|%YE^mdwMaA>U06;Hd|W(9?x`iz83 zuKjt>F3x8T0ojO~ch)B)ICGrX2z8#SP-9P5oMr{o`)!X`T`1C_0%cR>Xw-Il#h1ND zuJm?KV`G^nJwJrvvMQ2ZQr5Ex73`$YiX4S{{7;4Yb9jx&Zq~onuY%j8R@RFTd{%PS zs$>mNln~2y`SL+ocvSrV@^vaQ5Z{@)> zDH!?%!qYI(?<3Kv_-ojwUQMECwl!C7&G-xzaWWw1&>>#&Yd$D-(r#`a|FF%|v&!^| z?Tf)RdYjjiqq{ZVt>~2Iv5GdZrsO;gr#)eSpsKAmuA()AIl2`qCFJ%?PeMG(#ulmX zTdEWvb$_?pof%pDhdnRFxEPRjMo*lDt}-~Sb@UDNWo>6!E$LNKs# zb~){f!1ne|Ru-93r72&U>Si=K?{g8ZjefzWl}2kA6Z9iZe_kV{V~@AOwOlyk_YXuQ zhKABgGUAix`0-v^vD-fqxH->VnWos%GSZ6R+~JxsQ&LJfqzvqdE82Ed98U!B^)wj+ zOJ$>(I_0_ddBFG<^tmN839-97e7Y`lQAn4^*#~KmLMkd?Dd2XS*Y#P{DLsmGHKgr` z(YkM&myl|DnxYJDW4b#^YSp?o6jN>5%n;|VkVM~+)QR+LJW^LRi46W0p*yN5Ck|oZ z7H|Awuy|T7m`&zj=g_ya?UTFobE^K%OsI#d(>wB+a!l-X>#Ej6l)k$jA@W_Hgiv*Q zg$U@)0uPPCvA(S(v_ahqA>ZH$is7Ij+=PI(7q6+3>@9xCq4zGA13C?b#CZ7 zJ_{aNAFVZDF3mBi?DuCGGgL~XhIR`yg*w0jqUR-DLE?_{L<`Wgj0mi)V<|O zu|=`=2S)6vg3#mQKzrxU6(yZ;z|{(NU6+%fxF+q#=b0s*Dz987>>#R3l^pRqp<1DV zop(Nme0fW(bC*Oup4UvzdbQemD%k4DOU@_dL3=S?A6a%|2}(SdG~83C8}MO6B=-4o zvjhpMQ0DqyoU?y+HlJkfW5k{PM)*d%h7}kXoN({kl|?m?ZFr`9TWn1u@Cq~Zo=SP2 z@hHf1vxYwgJUwA!$9_*bgm)RMSpnQZ=ENHv?y?TN}nFe(WEf z7WU3?S$kQnREIQlnA5W+$0nn3yJ(r^7n$&cO|D?1z303rkwoaDAQdUwrv?X*U8hwmIZcNUPGU8CI6QC=2}QFeRIm zm>#y*U|`!7dAqf_L?R(xn}CR>wOQ&R^!u|#_P{#3-OQ7k-ErWq-O)Hne5D3H#{oZJ zRM+Jo66I@?QalY}v5XzPP_pc}+oy>%=6K*}f4&R9ANbT;w(td_b(*viVNicPJ+gwD zxFUdQVdR{Om3{f0h_n|%9zlvUdgVwJJ7d5PKGvef8jIB_Fv zjh~kf6$lJyZ7>E-II!F)WT~veyq}+vHpV~ zhx)UjQTZvOR)Dd4px=)@>NI>0?TDG`xz*etlTW}vti19nLnQGV4FK)n+`cQsoq-kn zOKqD*``GH>^w$;J6dOjZ&Bx$OpZF6aS#oaItG-1n0-vj_6DtB7EI&iBvDw{%rD`AL zBHW%wRU0HQ7Cuoy?*<6p^QMpQ2~Nm6r_VzCQWH`2UXS<1qU?TGi>f6)RO<~tM@h1b z?el$ZRLXmT6TXscZfi+)_!zsBFiS=!s zi1A1zjz3u%-~9Pt#9tiPO)xtcKx zq!2lkCEB_oRk|9+fZzBg(^E^>uL#jMM%oct_DvnYNavj#1)zPbVP`)Zm^-DbcBSi1 z6+f)IwOR5#UGvh6=vfb?Zt0{gFO@IJ>z!Vkwx7o*5wl`;*goDWUD1j_j#xiA$-daO zCj2V7o$41i|MJ5;JITyP(dynb9WF>Jdkkb@x?Y50dt=^ca@!w2I4V7Ga}8#JU$nimU!Q8TqcrEoirCX*fk}ay!zAL#hIxv4Hd`KkIjw!t=!9> zZEQ*vM}-rE?k8`E7;QigwXO%AsC+b9wD#{mCo;LR=~B9d6`EODH4?bu|2 zQvjCAYDa-|d7W@U;fHx+Gz*>mHywhJqb`@&-PvPlciZ%%RoZWuEl zaEp$|kzE#9tK?dua&S|4x9iV??_81S73muX|p(Q#+@=*S~W~>H1t>*x^wXwd( zQ^DysU<}V@UY-0|$x(Ln_leIz^(a0n6uhLD9go_#bIXm^u?<)!3pIo&-bn#Mo!&-L zGa5+yrn$OxGhJZ`&s^`_nss#3YHSJ$qiKR838G&kT<+)#LBh*O)b zpI;kM`37$$K^+BisD>TuxXVC~<#vkud3xSLu34#Pbb%QH?m5w;lFG?_*od_!B9P2>|1DG97f-5wD0ra)@mUrY=-!eu4Wbt zJpWG0r8}?Im4AP|R`e-`(6kv=q$-j)x=p<6PhU@<<>dF=bwcGkxZptYG7yU63A;K9 zBQmQZj?9sb%$y##3$r+fO|gNY+uJ@JX*0FE2ZRG-1^jQJror|r)nXo)Wq}5nQ==l< z>JG4hfw^v}qq4&94)z*}J?(b5dV@(PS66{xfB{1H-j9~7|G(B z5s#oJYq|^UsQxVTfv1}N{6&BJG(pd zeij*HV2#ws;J^q&CDw$@(kP8hKfkc~CYEL0W|}?%7%Wx+60vg$6+`X8=cJ&soAW71 zRaDzF|CIgh85^g(I^l!-K^i}IdHiw+Sbktnu6O`ZOnKR#CCks8h%~ifH=L&%7oE+i z6F>9CAb+Wb6^#Lo28L2YI$|y`DOy0~q1f?bi{%5S^G-i9PNeShCC{iBPqMF~yY)1v}< z8^Qllw(#`-ByqrR%EQV(?b76t$-*g2pOEnMBktKY3&kTeB^@~#wQ!Vqb&?;LSBy}* zWJ`$w(aVYZzv-%_?4;yRDhsxFJ80qXVG!&P@pmHB8dA6)JnTs+i8DeDuX(5K3LMP# z;UmelBl+2d_@l5JF)3~O-B91+>4PuqGrA`S6Jroe-yddq5-5m7Hf8LNu%(AMng5oF zujNoGVayZNrLS~1VWEn6Yu)1vitM}{zk>CCEr#1n(5#~F zyJVl|@@jlFw@(Y8k-Sh`La6#C=GPUb{UZ?3g!n78CgA?2JQ==tkl28XbDdZ|nyqB0aE2ykiByl%oI`cKBXa7eWNy85p zM6P`2^Bj7*=8fCweM8uhcK*TH+OQm=K1)TCVK`rPrSwJbvhrk3n*7&>E~9}VLqLMk z#cNdDgt%n%q$RVTJ++P*KXv*X2*%9>d5PRw8-&DP`e=$)e1ZA~AKeml^f5L2pi)Ie z&8p#**WmtLP+#v=zOz=Rumy();d}L2Hyu@k;d>mvU|_B0)!9%5p6x#ZD_F@)q*rA-2i>F_@0c=+VYLgY3*5m||ni>iKZJ!~#VjbjH1U z1=#_|NpOhK797iybt6^Lz}LickJt6XX#0WUHx;!;=pK#L%c~APp@X!yz^+by&0QIU z3)U{D<-~+3!=BOp`?-};hz6ngh8ZlY2?0S;*nOe!+{w^^D823&D5 zK8Z!wC&wq`09L_Vci3c14IMK!J-HwN zCZCFijFv+`nkpqZrEIL#YD<>Gdd4sjv>UuV-|)4#SdbzW#Cn+XY?|^--s9@0;upgP z;a%nrCCSgJL_RnK#WK^X(u`F2Iua3T$YAS^8GDduhIz^FYn#VTwjrFL!BDK=Um&wOKt+1!+ zP9)eEGf+~}I>h*&o?0GO9C-ow%rLK|*{v~~&hf8Rbq6XRR6S1?>yUkh-K9`wlG>Nf z4)JVCtR)uT+>RZMou4urflBqmu{3oEK=ak!yt9A@g$PlHHzz+$W$LA!Ti~$O?w^u)$Hs9^{;MHT~SEXK_gLztf5?5ciHKOYBTn(7m zURu%PT@}^+-P4_=ZqTm={D@P}E~S`FrfTl_7MUc*+nCpSgQmbt5VsvQ18V$O? zmqk3Cjd4K5GcOD}R;A*4C1Q-Py5k=uQSoiaIdCeUo2g~n_={dGY$pE;)Xf*2+?9{K z9E0IP-akX_=8Uhlxz~Rzk%~FH)1#fPmWZ#ASifuA^ieYXO~t+5c6cf=HA`GKKBZzd zQW1+&>&Tv;pO~P4);Fn!w0iC$5L`95<1U2Uy60@o3Y_M#ekbtq02#L$Otv(zu(qDY z?P|(htXZ_0*P&IW0Q=&~Ah(#)XTHh+HMnL7F4ig(@upt5RDMh^k-&{o7Nvbj_02$KQ`_d#YfR)G7f~IRH|&ZqNcl} z_di>|w;hdlDXOy(+3o15Qk$VEPnGj|lGJk?Ykg+=)_M;O3m;+(9`afLC9Fa(WZiPr z#jCX(Dre&%zw5NyuW_L7HSTf8i)cj{Y1hafdiEJ`-JytTLw@P?+JpG%AGJ1(NEf{5 zbQqzR;fd;{_z|Jg^C1Pxo8ihemH_li_tQw)Gf#&HgdmTG<^b3n5)ZU0fTe*mOjr!r zGF4>+wtoWE*CZ7-<;q#BgPjlXr|xnbmA3P^K#h6=qf`SZ8r@BhEKHsn8yaL3!djT6dIMhI=r&L zfzpeLzCvbxKW4+^B7-Cy?&0@BZ^auA{mZ_6Ic|{a%1DhxLQ5ZtMk=V*(-25_U;3(g zWLN+DKN95QgCrPKDU^OmeZzNwgOBcjwZa|MNR?lL&-7xI)OQ2~M>fCJS`m6j?18E( z%A|*)g16!`fFCl&0Z$Wz1vwn=OZb{A$wKt(q_uyJm{H0v*{RqPH9549wnWxNO zWAm})hP0xufb$V1ARa$r@`;ZQLvG5%d-z~nJ26u$)OiI0!kb%3og+WL!;HTH9i+Xx z6z`JGmI98L+fwX|#VK*GD8=9!)fd54)?X4-3Cf0#IAtG71KvX{H>_6Y@?qP9Ga}iU zo1w)9z75=cq%m0^M5!yS6zs1{RLsQRtt#u343Kzwee?jM(4!~c?6)bnqmEGFKB#~c z=`YsB$f8RRVWaLRo;k@&E>4!_cNUkjM2!T#>GUPD_On{3{+P4mGC>hC%c(0*;Ak*dfGiG4{z5-tX?6|5~19s8o_xhQIUqZ1M~ci#;$z~|g0P!oohZ2H(y#saaR2`9{ArifW#_FUsVzL; zH9`2}GQSs5G_ReYi^eK8$gUL$yj|mF>RTAIRUsv5$=2bzuX23zcpJ_B+DA_(aLR_O zIK{i7@$}BBT6W`p#wvEYo+k^g?e!@P)1E(%%TTEm$g?tYdG1t34t%q@O-d{oz{7@6 z(yJTph(4(`eI>>^ZAIs0&`L3w^ZjX6DKU?53e(~AQTcU*D2wSpCCr&>(&c43MMdpe z{TciJPn|8HCCEP*)A+T!F)8B9tZZfOcpeI4dFr_oIw%`^wJyk6B469|rSIyuD{*9e zcZ^v1IBFtOsa?ozml)E|@xg*czWqbetX_@m6NVu>=K9j2l=-o^-A%XU>FU=K!Gk{0 zWYCkulp0q2PcO8suWs6{^SU=L9G_sdk;OHV51xv|%UeUR+Km^nhOz`Dr}b}M^57;g zYWRh6mmcom_Kx*;1SKp?xcbH$x48=YLe1@4yGpIq##u?h5 zNj03obyr+l{M!lbUh<|Mli|M*f7bm7<^(}AYY5?t@FP%SOxcgD!N5D25YWlrb4$gC zh*bx2TNhs%yZOw#BdMTDx<6(f3@3zAiu$#QsIMQBnjB0LBfQjbEF1DcHBkh8iKWSa z%#+`>vU&$j#FmJ=<;~a;M81M|#gdXTwVzAKsf5~I%ZgCflw-cUZ|8f2d2v8T zq%vI+iCV}lxW_F(6e>9CJ{n^oLEfDkjf8-+JdV&ggT8&aGvmMMQzj`xW!mdM{}0aW!+9b6LiTl8{LRC z`ZiE}!hm$McGOq`Q4!%(;l}L-{Y-O=`&6Pi%75!msoqI^w8or=&6VXxhL7Rxt?^}O zdyr=^s@PQuC!)`}MAJiRM;gj&Q5BvGjm{8w&JmVb6De`S&R<<#R+P=M*?_${juSYb zJ>YgCCcjI!gb=qmT(g#Es0p#KC`cY?lAnV9o|FMdqNd!Q6dmmB=S_+tPY657EuL)b zjT^w;=Df+CuWb-AerWOBu_s6xQhoNM-q02-FG1SM0C8Bll9dx4MjKd%lM ziHQ^`-Nk(1ra@Tqd_bD5&_-sqIVZy*3VAJu*|PLCH%ogy+7S^561lzS?%r#MMMn=* zN)5)9OYCk{BCWuD&0*t|%~%J=+~!sTv64v z(bu|_jK;(b4Ktiq@B-P+yQ)8(ZKEu@jxf=--~C!eE1!E zVakZuO$Qx-GSR1@rwlTPcUdb&=Y&oD{%vzb!UCJTzdv7Xj@{NqkaY-q z_13oVW3$`p)Rf%uRyjl^F$7{q+Wk{+SxG9S;Y};jxV6ElsiKiB#gXgpKP7Y++R>bI`eCvuiX;*&7zz<76x4KM6eZVNpbL6 zuFjpWw?0>u3U=%hsP*^44Ka z)D=KLm%JK!hv;=c=jQh3fxbc#*}TEi%*&09{qPwuZr9uxsTTsOWTuE%wfPevQM7<2 zA5KhTBhAh6YE&Y%kpHnB_eMEh;rjJ1jd6dilF3Ej$Lg=!YWpKB9% zj6R|}`iu+>PQ0l*U7v~zbrd=E4!9ndKh$ClC~TDB8&6O0YTt?)*i2Pg6N8Kzod2$y zV>!Q{8)s~xT6Mc8AewK~IzBA`WDyPR?^X)E7Mi$7+#lTdpC*@hw#qKgu7_Q!9Va|t z;oZo0#zoq04>%l;C-9Wo@2E38pHcN$o(YK~wSo`rD2|%cQNI$6_r1r)cy|!VRQ_hz zYDiUU%eP`F+5fTI!C~6q#6$+Ht=RMV74G$`+WyU*mzAJ-N~Fcbg&e1kRH{Z3x4s?d%YM5g9vE(J z&92WQw{d$0VTpx;;TA?uP)`p|5-AT0W{neV%bqyzk}331Py-gDU>3<>f%2YcJLUWp zy%rRzY!|E>LumK{zNWq!c@?mGi9W>rW%sOzNN2r!ela{Ywz2Rt^O%J2eaXqvDI7?} zHf`C7bb`c^j|d!YBb6t6$qST*w?VzEjTsijQuo5 zM7&ZvooK5OQtp;1RE2JlLmH2RrxylU=dC{)AdL}+unk)&q{%~D%2eKn@Ra&|ki0?) zDQtCR$UHC`$&BuWoJy^Zrkj^%z`!S!Wdy({YtE9pEj5sDRJ1DRcn?ypd7vA%d!#lZ zq9(T*t-N-B9KB!D*Vg!~dY=wAg`N-zzNBrxG|@TBFd42=e)W|) z74vO7)MmHgNAq`0>)#`-XmOSOSm>=S?Xfbvjtp09rkKfu5zunJ=e@T!>9$LA`4!*v zeA7DP{^{u;-qoj{L*9KuLA=p2;E_M-+Ufv&f8c<9&69(j>7zlM=qrQ19L!+ThD|v} zkUPos6m@s+VR~}AwsE_#wwX*oN>&2;U=rPXU~DuW!a@51cB`@(PHdD%Eq??ebrK&e zY7NM`t|-|Hzj#1O1bhHTj0N}Zw1fDfwG?zBk~>K!-S89z!l$M%eNNj$1$K#k zGo0%z&P~l|AmE1^R_BcN(TpWtT!8uJRcf*K*kbk-qD*yUo7LVKH=7+X5v=c5Zf2W?S_-?wF zdXQR3nb5Pa{L8bn7sPr+c%v7w(eUXZ`~G6vJv6?>xp`!z2~$c*h!`naF#N~S7l7|I z$^*~eule!S%P)_lhHp_g=EHqvS% z|B5UChP7zC->G!{(CR>lkZ3c^V5xEQXNSSwgas7p2B8+W7T_!I2Npmkw8*NotaRVO zcEotTl+hi+LymC0)irF8g9bCg0p4SRr!w8j1u zDxnQ!RZbS4GaIP8N{NlYC8y5Jt#8Jy>SjQcQTU#OXNn);teHPWm*Yst&HE%2VFL{=i z1z2u2!CfkvTy*4+{;R?&%YCdeooW%Oxos9f1CJ}oY;1yxz>;D$Xv?Ohnin-O=lXIc zMilVXtP-Rb(1`hi^OU>y>NI5fc6ACJF^Hr*qr)PtV#T^Aj@Gew>%0g!k!Q|+UR>zw z@0p5Df4NP9;XCNE7BmJbOx8p$#KH0HY-17E6R>*IYJsojWar{AF*|-sEp24>DkT*5 z=ZmBCuEN0QO0D?~f=yAjU>&osFK&8y@uKET?Ww5>tn3E8bG6p&8=do?_C^SjE>{?@ zNZE*7g!pA_80guMq$FEj0oV#-;sbJK=L>bm5nVuU{JJ_bO_ykie$_{r9zAmxPvrpt;#K#h-V^R z5_aj($;yaKZbefb_n=?1No3->`iUT>-w^qqHcM4j%E?|_e7_oIm-gC#TWOq1ILp&q zXIQ!Y#*T6S3^_Ym)~UoJq;|p#3_WSE5t>F3@xE#GWv@BzGF`YkU(;q>`T;c5i$MwI z?3?dW0g`OMFrz~{)hh0ok<^4%K!)~=k#vYEYMF0{LkE-nG4gSnHk1pzL_$56WyhI( zyQI@#a6y^$|A(o!42rAmx-dfm!Ciw(2=4AK!QI^@xJv`Uog}!syAw3HySp~-4voxt z-l_R&_|a8BRoC&e_gdFpx2`*K5L%pm;TKqU!&>t&^utj#1d&v(G>E@ki8Js91qLc9DV0D1y*)k2IVj;3 z1sv1QRe3Ge@Cf<-l+7@SDoK~fOiM(_ex{_IhRjqZlP74*{@XHY`CAI1KG>5q!KGDM zrEa-zrZ0o~bU&p&pSo^$2JqWSiRL&N$zy+A&}XYjR1zQe#JZ&-c4i%Jt;DN!b(wb9 zAe;W^Y*uK0vi-BN@$CdNo~gR~VT@Ia$-S>k(6ft48@OlI7l^O43$VHe1WLIrdz_8C_uUS2+Jk)VZ(CYFRNQuP7ETkgk%pCONT=}GnF$ELxSNk9bNn2_UtzFa;uA>Zp4*O zmmBHQ=xXurZ)d$b9BqV^r8HN&ERe)jE&TQyn~c*PCT6svL1r+-{{HD+cH=pCL^qet z3})p$>Kx=%LdAs>2e|RivLwpD9Yyt%1hMSJDCdC%UQI{F#ig!s5GO9*vv7zWwb@A; z$KLW&v2=vigf3sQLf9&eYvm7Id{`9B9H(I~UT#$V8U=N&d#O!`;$q0u<#2`ofz;CC z&2HRX(7%XkHBEni_H;f?)LNBAW=Ey504Ql-9GroduHO5agV1-7$g0+x!#5Ol@g!sb zS%OM}u%A#Ov*Wx5D-tXEVw}gwU>A?ttlGz2pw5|&leq#Nd#4Z*?ktU`W5>f-3RM1h zNgB+#)53J6hQg$+w};4z4i4#JJ<8&(ZEg834_R<1$YQn7m^Lo}^1~+{fG^_pm9>Iq z$H5e_b#94TMp}4noNIfDGC5~!i_FgHE0(9dh=^5_5!4G~`&2_+EVYch#LN4eCBClf zAWFK1Vjd)y(>m~*kZ(1_M}-tI2KBzpS3jaLyBK*OyBdiOI}^+4{!fy635LE6EzlI#AowGtAaLm%Q;iJ5{&wh$uyENAfBXTh^dl+T z266Kww9QU^CqD1y%9d}ZIXTp(d4ph}L0obE1HF(wOBv6Ge@pYZ!}AvSY+Pz}z;U$j zZXR8$oXT$s6S|v+1~XjJ%5{m3R>C(+6u4X#A2lDzYz&2>~_IhyZ9hc`(7 zcbhxIOxM#&`&Vv6LWK~<8mz4QmQ@3gJEAXVEs5lP1ocf}9qZDj>sSu;n3o@OYa={+ zbtB5UGn2n}V{D47$khmmHO{I_w^0jxt4eQ`~Tso>e!j<>EPC;rLS0A;6Q zzb4g>n3>QBaU_FRw$=T$bXCIJ)A^hXvAzoYX`CUN4uhyghMuQ*v4$XySVKRrQtG3$DAM{IH(?}8211xj zX(Xro>*e?!)XK{6VFO3^;3zWN+hQ-HEp;xb#ooH5&}Ly}-pu{~z~1gZHi$|HWl|fE zYK4Kv(|JKSrp*Us+P3LsL3f7@!m5ppB5V}VIEIxjA>e>YW_Q)`PaPjkcM7C2X$90A&2H})aFK{h zcXz&W^WN+A30;2pl?+ z#mPQ3+g`M<)P}z>#pb<=%O1|y-4Hn=Gy1|N!<~N+Ns1k;is;l0d?N7?KiR-5>F`s5 z8uSrqr9`K>o{AJ#fdd$vyFdLX+lA%>g`hAn4-Ctk#5Eg+hr)hl*u^$W0qTzfuUvr=o;SS z^R3hZiGNbzqo4a=~i{qX8l(LUVa>Rpq@B zt!wh@Tk208X5Q9yDci&NMYkTlV}b7{Hf~1A$dZ$dSOuZf=1&qS2%@{gkHC+kGAb($K!6r@hQ(T*ST$did(0GKYVJNCEF3)vX%3R{bU33X-;ck#=H#K0 z9I2YWE9ur${I{pb#yVPGW7PlWMvX01R&l>XP*AkGTVn@!P~F;3^(N@C(BfBbE@Co} zgT`!aCLQQvPpaPncZak1V4nu#bg?znyWdg?F&ml++HWybHhdJ@8dq2ar#~xP4TrZ) z+b)t{ww~NRw~Dq=JZJ`97iYV!tC?f%3WgjV4XKG5SUn;gVyMvar-x{s{S~p@y)iuR zIb(9@L#%f<1zIYzeH?N|O2x^p`&R=!4mSp3Zy!1nOu7em>-j#-?1$0suV?P#*Z{66 z`v0A)4MwPuw=A{;9!6pKkabxP508?Xa=Js}9~dLb`y7o2<0KDJboNAB#|N4M@tt1; zsU$)|hO*w1ttA+SUJfbJCyCB@v9iv`)5wm4P^VtvgtnHODmOH64@u=T4egwzVx!8F zm@U8Py}rsLiU#%Ksf2)7v)dZW^?TwC92@LsRvs^k$_5eF-AReKZ<$aF|RNp4A=1UiXR!=D~*j+EPoN22Ro9R z*s4p3VsUOo&x|p@?e@lY!v%8wV@X!*ESfmw+dhDoo8dTh1qk@+Q>!q`|Ge)whFG5>`lN zlogrW@C)Hih(6w7)~H_zQm~pTuKxC1XkN(9%;F-hprGL8%}r2PnA8`R_|(*ho}K~p zwaL*@L?|ezOHSC{-MY9m%Vi!Was^<(Lp~ELhRl1M2Q%`nxSHXCIYL^G8 z;QiRzI{cV}3@Zr7lg>H6a>l+DNjGhBh7Y~&%hulN5$18R0oT5d&z{PG$k6QYpRVbM zSk0%|-}A^#*!AX3*mXTZ`-v1DnIv{|*#5(RO;OZDl!9$hWz78_O{M6?#KQv0c*Z6U z@V{Dmy|-KZF@2o!u%KGldogp;udRnOtRruETyb`lAq`u2NXC-CHTq7Iq@3!r(^VduDFf^G&u`-N$y;fj)}ZthE#^UCC|10ERG z4P@O1lvh7t6T+joDoe-=1boPj;}xe=I7oGVtd;arNtEa+txI}NJihS(uh%f(^@>$q zjM+<;`6E{2AN0(^*2PSiA~ zFovAzb=vU+yzl3BP7=Sc)p%SOFo^!mh>y=d=}ygkT&p#O-SE7TC*<`+b4lEKJ37d| z8m;ci15TaQW~YGQ^C1PHfHziFRwIeZks0ZNt_XL3&F=5&2KAfu9*XdYNfxI0=z*_- z$b^)l)=-6%YF2oc#?;|aVrz+-c?C;e&xg(}sk@7MQKp)D5u)?bG!A!rKL4CC@R?lW z&A;m2-();NL~e8jdjce)4P=uyfNQOsQXFPbBxVX)pwE#iTvk|yVU4ibuWWo{C8%-KU9@Ncu zm$`N|m#mg5(|nBV&se!026F?zAC_?E&|hs~28FMZ8m-WGs=78B@_xn(+Txfz-%C6% z8Yb3yLf!GBToDx$YlL&-q)wx0d1Uzo5>Qo9 zVcv;mV|E=vYkzoy3^7rcOi|5!nSRn#75C(3Wn)Dn#0uUYPpA0$6*^U0du4fkx{e9+&LNGDqc! zgul1dojq44RdzK=Q!k%j9ZzRu)rhNSr|pr;iHhT}jFu^w^&T_(J!caPq2lPJF;z{OVV1RZKUq@>1a zyMWZ;bJsJG$#=)vFY^@fac~*>!;Re4a)&P0OT8ycLZX183Ewi>QFMu z4Muin;^+{DbzcLz8%e{1dmO6cMD%XnBfmo+PKWb`_ zBrJ|L+vmo@@$P1^cdmuY0cEp(LUhmPg2MaG#?$TM8~NOKX@$wbycqbD+bj1B$R)y9 z8j0zK3XashYBeL0hWNvpELG(I4`!0Bhf(VhE8d?iPip4DIFdLrvCzZLUq23K85&vs z)y1fYo@PwvD;qVrtAwlk()StXXt|w{b?Sz}C8ebuDW%x1%V_sA9f%eIEX1ald({h% z$R7r?6&3VI8mo$`7tXDefUC;>xdK6{)p33wv8gMLFRP^~UKP1fMODuHOsl+Z2F7E3 z0_*0F5^l}YNglM;VK98S#!f|lm43KEJ^naw?xQMor=1@dDcAhOF729+s2j0d+Viw; z4t9sOx`*B@$>MoR_w3ffDJ-)h9^co4b`la;H58K=u4A~+I(&Iv24XqvN%3w_5(R$?f+=j%bj?1is8g|U>d`o?Q zwpuKKzphRY)E{9I59JL!G(z|G%+|9LHIxCM!0KeNnThf5qX{$&3{T?+aN~~KkNGle z=Y)SR7hUfSmj$B?AzTdYu6!s+NUkH!GtLZ*ErE`a%Br|)Fef&aS1j5vikV7~hI<3P z))22!3+}wGN+Y7k?-wFL=pFV%J%(NqZN+s=1(fH?$}%mPVMC}w;=p4G?WzaS(RN1M zA;0ZpTG^6JBw~?#{;|{{Qay;(X(vAX3p?C$6pr<_HUBDoda_NpM73VT7UZ0*vf}gk z@897WPZ3_<9XY8*?O<5*;X2MUlJ+TcYr7?1%hbzjoOUIDsLa|^P6Z}Nr*;|r#9_wD zpFj%14Wh5qsue~3F3M$kAN6AU=4*#tAY8b_x#p6I9cd%ktzWQlhD6+Ntku)oQ)6>y z(?`gY7bHJ@J#2d%4KDbH1K{KT@1vbm*gB$o{4wDy4Z?Bkm)+Fz7;OOuU*Z+q3fM7b zdQ-dsAICi&9ogS4$=Z26I4dhYK7>mL^WWp?{8$b|qdbnzeo4?Yl#t8bkcRAGCX@^a zgMMB0qJ|$Wq7F|g!XhBZRAz;a+D+Xpp7>=M2zVdfaddm^Nk3+SniLcr1rPUmHzkwd z{qQi+SGaS_zd?|ybm~77Bz(}X>^p=d@w18yEbpV1NMl1}+t2JVe+@;}${%TQKhq)d zwOXvwZ|(XD3F38mqR(BuB~~x;e}BbYO~eC1GCdm53f1{oSf<;P0la26H}FGdbDg{C zz`Bq1E9^fjxG9*2&MUidSq{^Q8Pk29ZuF_jxq59j_NS)<1RO;l$GC9eJ_3iFr=E~Y zt4)JyI&Mcar{;|^ipe6-Eqde$HLLOY@qD;|1AVN%AJ4UV(9F#7_p9N$5CI5%p5QxS zm7t(E$PTXMjPoXAD|+nFJuZAo6-lQLui)UE@1hS-)2GWdnbtji<=GAYq4azYLaot+ z$7`+SrEujsTdJivZ+Ugs^S$bC_5B2kG-YDfKa$w$`);?o-vDMa0?IGDNZYDTe6BUe zPpuvov9o|30hDtq*N|bVY@=F?q6xi;f$LmhG-y5mB4DBr=D9_nz+1r55j=|ZE>l^( zX4*(06|3V;x%Alh>Eqb~TO#wVbfamb)a~%dOXkeD%>J1s-U` zT-)O=8EHjLa5`j^DLf`-{=5l^*Y)*o(X>YlHP>sY7@6VJJ zJTr5PU2f^OO?%>k(CO*+2lwbFZ5XEx$JwjYE3`MQ@lb3w|-a-%++-*{9FglvJ9} zNH_=kK7}WPz4>1-C zJKjvPTWvNyh$VWw8YH=TgIw4)+gLIca{y7VTif5_~S`{tj@dQX^V4X0^6lZ!df3feX zGpsFT*DkO9z0^czmx{k$v6c2bBzwIZxSr1EW``zhR&HqJutRtlqHg&Nd*sBm>_|U6 zB(AJN9vMp{1}F!SW51D8HBy;G!A7a%27d5ls6r+>+eSc%MQmNBY&mB*m8eNB!(kG# z;_^_Qet9m|F)mBBr9=tde(d>QapoE*OI0OlVLz|TyiBxJ*w(gsJCGu1i;Lq>vFT^t zG;%w&s#|*|tj%@r#e^Kv_H0}q{5fHis=6C>5{bQ<=P5evk|vM$J}AAdc!VU|53|aK zXM0K^`e^H?NO6pC6GmtfR$@y|sUlQfJL0XcT@K~k<|HbeM&--_&qIdG<$$h(@#E#T z^!M)~YC=%kV>BR^bo9r9Z|?5;fg0^M8cAH# zKuj+kn}yM3jtH;Gj}-60CZH8r0Gs~4FRe4jZPm~glzr@cP;#3!NK9=0VJEmXy_5dy zS3n}2=FUL6{R}yuT4J2}-i72MqrQ?>)Y7N_b36WjSlguYq+yJclZ3qmt+!-rj@_#J z5SI`9m6yAE>LDIDe^b+h3>*3&h~(D}D}v)!p5|z@yW87;6Z&m6Z2g!Ues4vv8`0(I zuoHF{f%=G+iP$-WZIwm6)sEDE&_U#5vTk8)a8sKagoC<5XKYOBsIfH9K*%BR(&EMY zm_RO?A&ZLK0 z5#vB!ZL~F{6-Gwzs-J6`ffnJWxts=<2a?3oPk(eR#>gp6M4VCyLZql!Q1fMdKA9pe zHrUhEjXuOQ*mV-w{o_I)C#0m)Ys*G_Ivgl3vRP|-BIo;Oi|;~wFZzplMOMUT)Fcwr zLAQ=s%6>#-RRkFHQO&djqw}5meCwzQV&mMRW?bS{BDu{$a;(F9zL@%s05EW@RQ9Lo zwEXEYv=Ln|23?25#uT}#6jGIMthPZ=RJmx1%$tsOMzR0&!_C^6~PMr?^zQ#vGX&gJUK}#f4p^TCk4GtQ-5nfb_(0{d*}5y>rIaBgmYv%HLkVf+@m|T{OWoFbP#f z?6>47S!M17;}X8l6B6}YMIta{sh!!F5d(e(1{0{<`L7$B0%le`Xi+;%q9z(k;#ait zPY^6I^3EA_dpd}r(?#Ygv@g{TTwGN(9(vpNb)ciW#v1aflw%0H0oY!HN|c?o&pZ2; zoQ_LX%V_+$nt*(6g-uu6P+1CNPm?9k(!J{SBRfT#yBJ|&*gD}xw$Hz#5Na4ih_~}$ z?B@HU*yOB0qG~|e`%QJ1VU*x1YSNwxO|H3>wDQLhEf=iz*QbRxF7 zxw*;v?QvG|xz#y!k%5~VkATy@52#YNb^}I5tly<38O1w16J^h>PQ=k~ql zIFR+juk)j%+T0yWrC9o{n$ffUs}6|nGBuMa$T7AZI*oOdQTM8J9kMWg>===)u#R|d z4z<5T?$Gm>?2`wQCxArhFmv6$ zwR`HWDSCjmqSo)#`*fwT{Fc}GE!+RC+wZQ^X~nthT0NvVIT>SJ@KU8mw@B4vCk$6% zp((SXG#4DEDmH|ft*OX#VxV{5vUN<|l0Udvo=?62jpFFH&ciS+>lVi*-pyh3RZp_7 z57**KO^xhE8JpH;GBq?M>UwNigcKq2N_47ByIHE?&m88+NS&p0S z4Z_J%WMFziRve(4b1-FY0Wx#0w&yY~A4Dz|WcFWIbD1exYkj6&Ii}yt`RLQOTWlRP zCQGH&%!Z9Av|?ev>a^Ixc?_BvYj+LoTI}BqGDPA1if|6_=w+L~xo=do4{3e-Q^%b) zroO2UaBwdxJ02yCy#31dy@tOh;m*k~kd%-}Y~|bE+siQ>jBUA3vu!{uo(`+~mJvfL@1yq`L1H~00%c#@xmN%izt`%U!< zZ&qiPr9GMYtvu_1@SP?-DdPHOua9-IWU?58X8P4f{^T#JgE?fvA+1?Xlcf59Hl2$h zbw9d2A!EQS4+#J zjVnFp-*#62?{|L}g}LeBT&<4Nj&}a(GJUB;hP$=2>dX#h$Host-W%&2IBtMh)UokV z8_g0Ur*ZgXNkkd0GNiv3y=K~DZDPPm3@tD8LyQVQKJzyyfm8siyjQ<1Z|ia!v-6B2 zU}w@}iCLUU*FwjbO8dr7>b&XQHCwHkSYXVSj!GSVzaS!BDdD$)BzM#Y4%NgD93`UR zD;PPaCtl~h*b?BNnEcJUi(-zS>bT^$$Mw2fp)A-!DuVA|#+SCz zQ_liJMdE;(e~}j*|5;yc-{u-WaMVbJb0#Q+{>3eLHE~@(CgXxsOyN@Z2*3nl(@ifAz9-3TSU%!3bN_Xh$ zuLOM1fPfF6Giq)g99n{Xy(()Sg0c^VTl7Pt-CUc#QMWHE$UhXdghInv^q0%_&k8xM zX_gD!>$8}AY7btT_P_Vr4RpAY8{V6o@HYYf{x%3lg*adVcjMBJt*HmEiF(Ip^_IyJ z^Ql!AUJ2C`qCqCSiu_l*O?@FaJBvWAIp^9Ai^3{-KIH49ZAzQZ5V2nk-;t+8k!X_Coiu~ zl%iB(oCNRkZh#H~)drhX91tQS9!wk=0ycd@v}LJK5W~$88qbOvBS%$_L*Z>EWw&@t zncEN9{eUp-8Tp-3>kl$@Z{jWwd_-LK|eB##&jK>VYwT3)Gn(D65z3+;-)O6)))CASA z6q9$1!VaCMAih%o`qq6vZL!za9Cym=;Qzj(;E}YaxA$t4scY+clxea1hYiJyLeU3GtXU+{+sQnM z6^T1QsTM9)$ZS|WE=<oi=YXJs&=j%BiL(?PyA5OBqd#ZcA;BGYA zZCJ>_exR;o08Z=T%12r_(N`rcwP+)RsVJtIE}x{2YHeFZUbIm7IR?=9|$mhw9J$#cyQ_NzRqJaqJ)R1)O(_<2tDCF`INoaQn)_5-ss(J zfBJGgr&JLU3Ail(;V^s(c4P6@(Je8qa|k1ReY zh(8bjuQeDsnKu0^2wORWWoxQPKAqY8+U)jlgJ_wD$7-ekeg_ky#`0nVLCl966KfJ_ zpxy*5BbUaF9`qS`1{@U~Ev}=JhO)LhrtF8jq?nxNa(}wqa<`z%a-J9UD>=Iw;$P=` zvQX`S1qR%CQk{T-!oA~=V+{PQb|ITP3AK_KIOUiOgR>ylcOxCG*uI-30xHY=@j@?StppUMcd@B9KNIlY?jQ=zjJ_Fq#%tOh|RmnY6AAKCi`d=frR z<0oeywUC9<-caYlHG+$5nGRONZ6LEdk;GgS5J})T)-W~Y!3m|}iQfL?YAz{ETa2Q} zb>zXo3_>B|&1r01M3N=dSK~3aus8-~VBbRt05YgfD{C8na)Z%zG=7j2XLnjA-f zBzFukH)tyOI=T0j)a=C;8;$ofSc+IAf)?>Yl5>4`4;&lpPXUvT@)B0*MSfNelz+JV z9d=Y`TP;67Ycw=9+3q`J+2T!MKTJfeY~4Y;%L+rU{sQT?SlLK(^=_j$Ek2%BQB?Xo zJmRvtlrpx*P0MIT8>^)r^PR7dTI*d&hB+<4B)8QjJ8uGrBrhMm*ldx!TTbq#|2vTC z7kL2`D%Oj;oX5QQB7zyQY4>1s=v)!ibSd2jsPzjcsGUFM4lqOlqzIT*KO79oNHR)M zscS8%F>PJ#zXa$`IG7vo@?6RaK?0XQg;0g<@o4A8X}akt zZhDn81E$HS{gZK5E3l?W`Gd+_Vo2a?yOb^0t(*k)WBEh*@)RUs2KfQd(g(5u7ZPxp z?7kE@wp|7yGJD@z34E2c<6Z^{gVdgq==CEF{UP#g>vh#%g*t10;AZ%D#zyKAXcdG` z!6tybj_hB+$%f=KJleYMG%ZIOpj~9H0I_jAoUP*?=kNa|V-iZ(K>{K_RGQk*3ey}~ zN${sG#Xp3S@*_tZYo&Ew@djSBZMHXgUqZ?F9n*YOOfO1Cc9IfVFx!`du2am;ETADH z^f;;1&^H^+m&nJ6+OF=f0B-00GLi4OdY-2#>WC##)l89Uy}(*GSB?KP12l_cj|r=L zFV8$hKz`-Z&hD-g(2`-5TuX2{RON50INB=y z(n*Mu%94W`>CBYG(u=fhT|M9IGW6#*!dkmO)}QpNj`70#FKA>-kNYc}vi$dnA+AaI zVtnN8`30Q*VGa*UaGcMQ%Vh2{iN6)DIs!|Ff&3R4B@Nj3tKDsM3=_@#;3J5>bA)v_ zN~Ef)QU$(26SYQ+f#8~4a-84|n)5p-+@Niu?2-S-RinqGFFcg%u8KOZ!osyXNn!}RIGHcF*A9js+3qYtlwV!K)B#`ilaF!aESPQ6YpL%>}0D* z1tU1Fz6-v-)_5sIkj^uM+lrbnCCt_Fs+tVtj*DTu?4G+9V6d{awY8TzO~amZH%qBv zVMfSgmM+++so}myM0o#D`dsJKB=~2HDFlL|-bsW5=JR`LVKl6vHI%WT<+NWbk-$Ic z{jz<5EQE5p-lm!C2G|DAX=j=j7?CquTSg4LTqSP9G&Bmj3P3*5^`T*5+Px~hmGJKm z1hgDyh9?I((#f$!WQdAE)l2QcjQb9q;DO&;U_RbGwN9|5P zF7|z#mhy(fum$^EbUfU0em*xg{B9X6%E!cnYUqE1EcpCr>dWd<khQTDo+1_^o&sJ2^1M6(ZV;IX5C^C+a-IkV@BgjSBEU>|`OAw^4Kh@oo5w+5`b=`X`6NzaEZYe=fU}t3Gc%waO^$!2 zU@h43SkVTe`MFow;36B?B*D;Y{^(KfAS2CKMEXmu0v|7qF7wKr}#KZ30R7x+>yZM z5?~s({rg<}kpn#&8Q!wSQ>Q1ps%I%ujDPO)J0g>4)ZGcX_o^LrWU0Xx?!|0qZ@zXt zEx|W~AlUSS)BHN=F8*Z8WX5oVI_Pbt4zuJ(tkZ(eIFr{u_)?5#efp9(949bNs@e{a zqGxcVq#q8CJ>M#Si+l zeBa`5`rmc=!)*zg^b-k@Ept&$h= zn9}gWxddCs**{A__rU`h8Gai4qsUL_ZM6v*==r9)i-3eL{7=t|3t56J3pqYCgA$k( zssulYF+8sckT9zbx7d4T13orL!%zM39Yo>V!odqK0UXq=Opmn1rLb}v=En?>d!c>H zSiR+>jW8&sMHRcx6!G0XTW)dRO47_FE1-Bd;9{Mz7O6Ja2}GGyFO`Db0#XvzcXqFhP=Pz z4??+lTzCF%AgmF(7)hjaNokFi9yS>cO0OlwAl-^&q|9kKxAwBA-=EgEoL#YEnpo5IWfMrC#Eif2X6 z71`^EXZb=MN7wM^7Wfq)(%|F6ZS;orjE{~M5meb4k*<-;$9T3~T^2ZVz(}jaB!_ct z2rm&-Yks+uF8PL)3G9E8V>r4kFmxI^v=v$99vyBwivL}64d|Z7Wn)9K7*A2{Pe21X z;?Xch<9A7NkeTNxhTTwIlJkCzU*Dv#RKY>+LLy^^Q3I z+mdO@<6gX{@w2O*%Q%Pk=F0tV{x3DY01UL|$7kPl#)(A4tCn2e;5#W)Jvxr+Nk}rA zx(yrXgsUGsNDRXI^!zYLfhtrn`m~3sXtd%oY1|VG&wE`xeE`H*cQ3QRPw9kbCa(S& zcME*c{1Wug z-9HQw$+Y3WdULj~85v4a|%5z(9^*+L$L&<`g%w%Z1B)UPkGo)NN*0 zp3?@3JGF{+W1Ty?>Q2<(>q)P^S- zm5y&-2Z>2>VpA2mUBsoOrQXY}MC*TZ+G@MHgcu2gI&XuZ2D!jWY_+wu3Lv8YF;qA? zf*fz;W7MS_L^cI1y`eht41n-X92n7#T-1F+fUpttc^NB*QE+1=QkzJxz5Tzr;BbQ` zqzw=xO=D!yshC`l1J{XW0fuO>zk!pH8lv2JGb;!PjljZb$LzE`o7Qpd&GSWY45<1J zRDNn#VrZl0wrh$yLSG8L*N}X!+15(ke7_9JvYcCAH1HW`4;~%^(&4!4J&ivUzQUp& z=gL@J6=GjjHg68VmiZDUh4fUigtH})2~dcka>bWIbACbr@z^F2$AabWsw{J8EK!^O z%MDU`UZ{%cx9j)6vxGrLzMT54ZOiKAJ-6whg2JPu+V|Szeo1>!Y3QJ1Me2!MC+G_; zQ5qGN?9Ne+0w zkM8?JDcdl5413X0JlbhJTO`RM_-(X@Mc1XSzOmn9FqR15>F5mn&p2+6=Me#F5E}>* z5Y5kRxYJ3OE~YzC4sh1vm9(fFR-3iz;>hJZZx&dcmp80Zg^~Fic($rsg3mBt*b-Y2 zo+aR&<+(JnOZFRC(VTmukb|2zt1>_wwWCp87q3#pLklHLMN=tQ;mHh^_C$l*L%Tv9 zSW{7l|t;y5>;6$Jm5PW%gX}Dvipy(}S2o4DevD&Ek zva_=*k8b?_jChdg!}#&z$A&`-thE6nD6kt6D(a#bPHjem6)FKQmc05h2;}>#bc6;j za7wENEr$bFfRHYB8UqHi0cDEgZxQ!w4HYsvrvsvk^RG6WL~99-Ei}f#>UNALKB86B z@p?O5qQV88^mPf*lk6F0@~TQFkuSeWbWb8*>5d{HIT*PTgm;?=xS0zT6Xd(kfIdz` z`PJ^rS@WsvU|T)iXDCx1En-_NoWw1#Lxt26Hf`9#KY%RF*Kc!QQFj3#s1*|&Ow6G6 zH9b3dm;Egc*V_Mh4)2Ha7(mj*6!5w4`zI3Qs0M%D(7@hcz22$}eUSSB+>)I?DX81F zJyXW#eyUYaShQ2qn$+HT`oIM2C7xqAOv29WLIAj!ywU0V{ezQK+kPyG)|=YbgX*p^ zm-}5D;?Rn0zn*Qs*I(B&qtwbVAEmbNv7kNX(HdxR`(o}B4nnGbL{)2^*Ao9a1n}DS z$9el36^Q|)Naq%~!pDp!Ged#fD2^S~>&u}w-Emp-T6GjwP|}$*T%wq=N?uXAeLMO^ z2ZYgH&EFaw2??n$2vxA8G7QUU0s#U9oO{nFYVLG+Y)mUV9VN*kUVH-dPfoiPZZI?3 zLeA*z&~J*XB#f2l00I+Yov6k82IF2=v~RigTOf^8O({2Hv;7|OgEymp&(zfPGj6-m zT19x|00FUVJ+;WhX5YZd~puFvY@DJ zA^tXZ2`6_>3}PQFsZbONAYf#_vaxr4Kr4GDPF1Uka@sij8^&&rj=JG?HJts;g_LZ1u2H5rq{!NYIklIoMMJH!4Ru0U=k1;ltq$+T zbCThIoTr9|70egW`;dcdf0LtYa3NUtuMIY*!$w6jkINGh9&CWdls^tbPuKffIplf* zD6dA!;YV$(T`RIlpg^JSKq;PG|>RR}A?CfT~^xXXN)h=-Zn z)XHM-uXB#B&pq&-rUxY40c+~z@^q)csI5M$P2O4ZX=@y||4q+)<-a72R1+)a^jxY7 zSQsRbx4Klr`9(c6NyN0aJl?LB1PqkV*;h9?2E&0b8M76SEmeK%(47WH2^wu3y;2zst96e} z>xb0=fKY2JD)i`mzI%RFHmX*c)im_4q`;qD*MhdvMo{17AKE0KfHa7S*Z8MaA-z-< zTH&vBaIA13(qX3spFFL5XvHlYPLUJB9Dnh8i>>uMEJL^H5_S7=Ca$buPki2P1-IdK zX!3fqF*Q(XF3{*e96RgN+&|QL=4jD%kGEEd-SZLj`*&usgun?IFDss*;$IvPpCkp} zq#qN)z3Id-ozk6N6EV%>B=Hpbra}h}i6AfW0qR-V(ln99$b|Xf@+E)Lm{(?%<{!W=m#8z zF&8ipw3FfmIe6Xw8+m(#77Yj(988HJ_SLl!fAf6 zPS>j>5aA($*XMa{7q}V`z}+gVeQX`ss# z#I!(ma&?ww1%Rt$38Z95q9#)0atVO#&PrAXb@H>-nm%CF@JfV{aN#k&Hn|xe?FS{5VSwU ziuxH$)>Vyrx*oOUwCf1??Y3CPi8Blww#4 zXScbAx+zDTQ<-}23}{g8*Inn{(aN@XJ1(m~BXP9$!%Zi_b#L720hYQXDu6 z!nrPoo(T8E-__2FHCE2%(T-e=PiJ#evm7?b3FSpUxq>is9=tuQst#yE*XBU3v$q#> zZKqu7gZ9T%%M!LqE-Jk8k?SM$so;lgL)l~v*_QDJ2MJ^2y-kcN+OD)H@I#@JaqB%C z4yw9GX(~^P^EEK>F_+u|4!Njx9fex+?k3gqvtT+~`0>>tT>2B^7jx=tSRM93q~mB* zk`B43Vo?{OsmunKa%s@G;JYbN(>Y&}U$xb|(DVxHOhcmos7vj6G??{-q3Y*PWhU^A z4zW&8Z_q3AZWdxA_HA8p*S{7j!TDJtruT3dTaVts@>8}UcKOA+osRB$?fq%$h@Cd3SWQgoGaRtM8e0ehdyB06I1ijVin3^vQ4c9Fyt=wCE#FqC(yk)lD`U{o|&( zyTd1H6hKA$r#;Z*^G-_6DbwR>yVp{q zEp8gSbskJdI3Z#`t!1QYs zVJH%Qi*(>eD1H&W@1;|^XeGBR%~u*%>8ap9T}-LIKM*9W)@Z9uvVAF6wGkPyJGZZb zyS$q@*kSGe(2R+|(eXn^?E!j`1=YNbYpTbVHx?8Y<;E))baZXB5cIo;7B>87DY?J&;d2mu!?OWv2wqoV=eKYoBGMko%@1B z*0b!iY>UvzpSyo!tkq*e>jtU*MTu2OG&RxWhwN%Z%##hGX`wgH)00SxY{>hguJ&A% zIr5ADS_~Qz*igsfD!sRxHqO#d{Hh(^+mYVSgsK*AT9Dh~Os)n%m$%G`Kfl)y@`qac zw6>kNu=>kougX6t{oV-k*B=-Ab>+7s_3L`sh{Vi5l`HYX#e8sroW5c(L`BQOEZuKY zTe1D~*e4b{u65W3J=jOjBS_xM>xg+)w%5JN;*#=fmTll_I66g9$#6RyJL1DY2IZiu zh^?rMBvhVghvHx9Dnq95ZhX4kjb+3^>JA5AK7ixLbe@ZIoft{P?kvM15{%B_J7;E6 zkBRaw;o-F0Z{MUV=r0aDu~HvT;luSJ;QUwa@81%lO=8gVCodS<40xWWCZo*WSWRR6 zL1;Us?~auJEKx>6eZpA(;>7DCTwuTSW8FcYzth(P zH8J!I)dVZMxuXS23Zp^_obfQD1R}O|97>d>Qm=O4yt;Pn1yjgtM1}stz2WK>sz|j_ zs}XVDd6v`1EmoBKUBSCRGUp3w%bB+C@w_{6t_~`ft+?jhaGuL$x;pHQe;&n&K@b}fXpIKQ|qnP!?>+z`I-Nc>aI-1VlhM_tt zmcrHU*B5B9c+nEJ3p{CdxKN!*2~I|sOSvs#)~@l<0Hn<7e$a`FeLa;3^mlgNS$|uG zPq=>oZ+1nIl$3NuY!@a_9+VDUs&`Hu&8-~AHf+h`i8!6d2y^YvNt3c&c2}4$u6*xs zy}4Jq1NG-EG{>JE-jF7{v!2E;BR$79bQDan7sy*57i#*E?sRQ=de!Cwp=Kkp6Lx>Y z4$qHxs3Pa|__Eq{{P<-!p}uVa?QK)#l%D3Svtbc-9usJjKIJ-dx$P(?y+7$#$GqofZP$v*x(^a&U6%a~>M4kG7O?Is1@#)Ndb+8O zh{iD-c9sIuT>5pM1g~F=MXFcamYxkArakjJK0|_Fz(lw{TQ51iFP%!xLouiO$kx~2 zsOC6>$}YtYkhfvvLsW@~1n}N>IhxUVJ^OHBkdl@bG9b*?<~_A@JRlSebwza*p9y3m zTv-I=PI^jarlndB!9%a=rj=)~A~JN&OMzoLEg{GOp#^VNn1*Q(pGO>Cq|Q8f0^Q-A z(59%#JJue7D_kcm%()a5K#9-l7k`+>J(i;9DNnPy0DCv@Q}A4!xbe4qyw;;!%}E*- zZd>}!u0dff+$f z&9@U*Z=R9iVGC47_Dnd~BAn6(Ctma}?M&#eU&1Ur3W|d0-~eYJC#w+%F7vTzLNNg*>~-w;4fbOmc95lSKhX_pXpjSkNP| z4P$?bvU)jc!K79XLa%%B-0oFscY}Srpvp0uu~g&P=C)WYW?Yzgj~z;AAY~O;uos1O zJzeqkbuQMzbT+5Z30Y^0NS%38b_P}nY zEX2E8Y%iXu13-~slfObOh|t5j7S^_lX)pmeUa5cIh8_QE|H}D%K4UCbms1(~Mf$Fz zQR@&Jb2d4mSiZ73o|<3_;!Zhj-nLWFtGhcRn3IxTdCylt%Tg<5P)h%BI6cq9(*lu+Y(7Bx;lZxLWXX_J1Q%Q99>}MZy3=byEnE) zMF)pa`yZ)9Po_AN22~*sb9zIE0FXTI`7lN!k@3XLYg2KeNya^rXhB_PW9oDGQR9oa zgf+ckH`IsXN7QvG%hsd~A%1RHYPVrX?Y{lgJ&x#^rfcm|0sKH9D)$Y+0akhTo8pHe zZ^AWIGNE*V(6oo?JKf}D7{KZ`&M|T~w<;X_%eI78ou}ycgysj2oZyb0L;T=O1R}jw znv3Jg-k)!%grlYsVlY1m-{8b$`3X8L)@s>Q?G%s_w`A_|z$ktIAi2XAu1B_b+;$~x(Pvj{J+y+2!f*jqH3t}vHplhFal zgqS~)20wgaRkF5b?#|+okAM9DFE7>7jZHeuJn0x<43@tkJG7GXnL(d3LX*_}z!dTw zvWz^OEVfLQ8PqIfGR4iR%yS%^Y{@FN@qHS!r9>=m--r}dQ%F!#WwOA9cw1-ux_oZK z2^$N2Fn{C~emb*XA?5k`gW*)-+vVlod0K~007Cc9XGA}}ZVDrgrHI$@hi|2WFGV4C z34E~>0WITw4&Z3f&1$ODt#}O~4I$6BIV$+qf^uk@cjgAwqvG-uhz}S1$lv7T#ugq= ztKJc;h3GLE<5TX2d$P3JY)Qxy528vBQpq_eL7(l}IuVmLYcTyHipb~<;E-6h(DAy}0_-xOxx3lJlF92M$IHS&W_is{<;F|p*fO=CKE}XR z9YA|Gk_r~tKGw1&<2p`~c9h}#WSyTR8b!bHpW@iAMoVo znUS(`%?h|XSQt>L{hSz9=YdrZu+DnlcKF|R@fX;8`%(!%?CT4c*1S$ew{9;G`%Nv} z=q06Dc*<6I$54^c`#yws=Za>x%J^$P;*6b^ zO3FblCc@tCCVJJx503iGG)K99qeY^@K#wjO7rmT2N za67LR@wAE9_5ih^9vw~**1D6ErkE)T;hGoka@Id4Z9 zW(T2$hGRp7QDdX;_sNy97{Mw3Dx?l=HqHm3$0GX6Z2LQVVIN*0fhg?uM&%HSVB|GB z(=tLh-Rs%gpfl!P2W1LjsX!XTtm3}c_?GfV9;xowA!u}DSsG((_$B`FI2+{u`Z9BM z$uXGTm^vANz{SW<;^*fl=s+-Lsq=k;kEs6C(gT|n>?GD)*m?7dg&+=7PD-8(5qmm0 zaVkiLnzKkx{zQ$I?cOSG!z zn1*d3Fwqim97N{ z%-X91b+h6K)zf70M_>6wI!cdO+05s$r`S>EF7z+clz9#-=@- zAEmIWNf${C0OQctHjvB$YhK8LIl5q!FfyfyCsn)k zyLF#U69ZllldLSVmCfS^vYO($z+C;>m-=nq2Gp0Bu#Fj=7 zQkaxyMx}sm1X{IQ^;P!|+4MF2b9HI)DD3+FZXV{l_uhcgUqeY@(hSDBu%L*pnRC9) z1*(K~SgMQ(9?pG{Sj0I0b~br+(alp_jaPdjQy#R^=?5fLsG$Iw{*AD{07vblbq(AR z`&fiyb+`)Ite+=NJu#iNx?<=4E|R5^bmUo^wnW1MJ^l;qP~KLUXSLV=;^I-cWmo$6(Q``6OV=U^=bT8csVNPT7^DY zBxS=N#w`9cczSwS|JJD@trl2b_Anp96u!Ng^|&lf{R|5w{%n4%Zo3B3FtX35X$qPi zPYJ5lg8sCmq%2~~A&AG6bN)oFfq@ql%1HMDs;fOn31(EL`LoawPegrpUNor4H#0vl zBvS2oVmj(PjsESh;W+_8bmWJxJs67x76BU^U`Uh?Y2*aFo1Un}b}OR3BJgF1NIgXq%(2 znTb{rM=65}8w_K92uXR{Gjd9|S}$O5nHGKLvn=GG=UkW#I{o>AwcXQn!}&2@FxIg5 zYAQ;u$$Uj-zHT%P5c;_msk*vJb++Ph4$A_9P3lrg-xShwyU8!?4{i5&Jj1vcXtp@^ z4kPl&iN8mK-hCm#KR}x;G4~tU_Z8IrjL6X(fxbXR==bDq6KczeLtqe`Df`Z(2XBfs zHF{662z?mvhX9KCJkZ(caq#$b4raDrTj8Eg`I%y|9!25dKY^|<*udZim%%E4URYhT zQYY*c%Xf(?@iI>}k#R|>BO(`p+74`ZmY(HWNdSwO0+#Kr4Ti6mX#rIK zfdRicylb+n`+awPvdr(ai|Uj7+1P)QrKS_F3(iB4th+gxmV7OaaBev)XQirc?Sb8q z-Id+*hA!$9%4}6s)<~QicER%~k>D%=LDt&InY}UBKh#lEelX}x7@6IlfVYS)7t|^B za8}9++u{dkz?E);zo|i=j0jZejGv@7G-xD4y9kQ#1%cf_CzYvp5Mt$zE>ai12{?%Z#)m1w_eb&V(XW7WH$x{fm zayQlUD0Ak_n?dQRnyE>^Oe>d4maW)0aeDJ!*L^*FLFZ=v`gfS333rE#ggBG<_#&@V zBJ3Lr$$^n#cM51Nk|9!FdRrM24Rm-SSXb}R8e>h}h70gh zGB{`j_iT_LC$5eggI@UQW*)nwdN{(}>8i=`1TuBtdIFyKjKkgSLJ?(3oB3B z6DO^nkFz!>l$Gggj5Rq8L^eRF`+d*uw7FW<%Mm~o4FH0SJ_Qe=($LW%O;1m^d93os zbR5#eP>E8eI)YBV#Psaqy+cN}=F_wY_NC#2C&1aV$T6I=lCK=m-@kVoz51YR$z^i6 z-sSD8GZgp1l=+}I_1LMQQ;TJ5{H1GxNIA+LSfT`&*)R@%a|mc{8E`5i zKyT!x!)&35m^~|UnJre%`&f*W80dJoVihARr_v&o931G%PO?B)={|5sLhJJ3=jSY& ziL=64{l=X-qFh_Rl$`wZ0N^+IWRj_^A#X$JL?MyA=F};HhGP{z$Z1A#Nq0aWKZaYs z3Q<5M!tV*Hd%806QDF_7W-_Gw>4QVucD#9!Yb-*!Fe~C%k6JS11^{dhjdQh_ldru~ zbX6{Du23M@M_w4HFZ^Mk@}>dc8EY9@OqV|9qC?+gMkz11NX6sT1S}9GAs5c6g1+T? zz=P)Om-)u}Tq!-0&q{mlf&07KgCS7E0edau8XM2^d5k6^!Now3Yy}%N8Fe zARO&q>!zn#zel_kep>f;?SbAbSv^Z!NeV2^n_y$`TYh7BRY0fyQ&cww#E{9v>B=h z;YIZ++dJ}*?-^z*AGt{?@bY)(y}h?<9D)Dj3Adm&Gs9pYXt#m-`Y|{B@=vCo?cKfE zldzJxD1adMq@Q_?qUnW>fnf)ZSQ1oL3jG$DAxx*ssF{tmMsjm2?d1hJ16w!ySdWg4 zIm3ruT~=ottE_?o=3SYMW_JuhSrtktYbkRs8}9B`%TRrDqI3dR@&>66mWo%BIrHIs z50REnp=*M4$A{}y%S)wy>-G0Li!V5*pyiRivhfvR!ibPM?2m;ds`_rWxHaL5oKI4u z2)l_!S`he=W4jpkhB)8%_mP~ZanAKZ^y0E#iyw>yEYVC~RdsD%b$Vnm6r;Y#?CjMs zo?w&Wr&i3kO>bYmjD;7rF5jlvfnvJlwtBC?eVUJ~oa^UdY1;x;xScmKlq)h)WKRH)wy>aq;tKtg+6O4bEsFsyXF zm?~m!#xRuiAl1o}3*E>~Ems+xLR+d7(=EO(ZD;Y`!_ty2Vl*G}H>~yI#Up}M+R>$ecDg*}xuv1J+qR5y`(IR_(*#r#LH|fvtWE5QQ zy=KSzW$PY#mm8H@!o)-G@9mEPW*N0>?$k1OR<%&JRvXH&;hGQSV^X+Y%YO}@UX0Dm z{mMQ}wHN#G;;S{v8H7~I11V3LCp|8Y#>u~wFi10!0VY-%lFkO~VNH|N+lk^i)?|m@ z$|BAqen%K~k>OhU zf+kCwuevJeEzS|;7{y*;_eN`_%{~GG^;C?A_>Q8zf+r}W-62ifGhbv=HTwHT!h90& z9AZ9?0a;#zw3)*&8Nav3Rtj*UvseE}aS$PU#Qa`#6G#+R>))y#Efps)Dh4^}&!8)))i+wc;L#;xH(Ao0CfGJmi;Zhp9^AJd>9U+jnTfOYZpKt2^!P5(5J z*JPPS59#IkwgkprX8ZgK@C-ziI#gue?Bg&HTn`dJnGKBS3N&qnLYgZ&2}~PvK$~_H`h|R^dHQ0n5Kd&jkQAQ^YBf!C z+<-VYk-%<7ST0WCi`*w);(Sw=5Td~PZy!pYR8QNmDJg2tL*wVW{!nW(W*pIcpB@$V zt8DRo{pafSPwNgQLXxWLb@nvy|46PXND6{#wBx&>xsoBoAKM2Ye|`Y>XYtVpL_y3K5x`8vUMh5NRjurR}PaqAzmD2|_q=bJtRmh(nKt!=KU zNkma$uBlF!s}DR|YErHzD17cR*}|9L!~eg>I29sq05?jM0FWZC*r%@HF{@kx`oale ze0Y!8JQ26e0~BiGzObU5zp5|yOLsF&GCc>hW$@vq<=T-&yyFezu^uHQ9!72Cxkvb4 z`yL|7`zC>+7~0Wcno~9NF?N^g2A`CR7|IH}6*#a9zl&br$BTvEQ@P#8nNwbt%5Co; z^Fp39SJhdk2K{uTnkD-kQm?j@AN#F6A6cy52(vg=*1kW1rYFLkSGdQ1mK(hl7@XB0 zBu{|{t2=!&A`k@GPcc6^c7gZq)NE%>)ohApP==T6g&?I$dW=g&{eo1v4M+Eh(T9;A zOZ)bv`xsXGqWbr9C4mM3uZyXfI=C>>3eLZa_$5Z=3mDt+RH*A|ZK;}e`WE<2>xXU! zrn|05Qt;#CzY>&SrUEuF?%QL2T7JA-{4@Fd5o$wA*J3c|ASTkU>Pw1Sm{~FWn|_wG zRjHcEu#PZHNluXiAu$yFJSuA=FmP$z^VDG=kXwyEF!8OY1MpFvxb!R-$NoYJ-+aBEBd;Z*d** z5twe?&bWDKJ!Ufi`e_o%tk&)sy0Y?*8V&{TcPw8KNp&5Ive5D5Sg9~I6hbbYakX$; zr2i*conKXp8SR~XPe1#U>W86?ZU$4D)v3lSWJ}j$!y!xE3t^zxjCm`gNSf(fdOw}W z3YmLbK)}yVPA0A*F=H@)iwEnHy?1bj9iHKIYm^F5d_SW4eVv)_25@iBTsmJd4% zypGgCG|{lk&W<=7*${M(R+=QBO@c?Vq#)POKA%wD^ZP! zXk)Tl^V(ywOQYRXajQdDhrC!@b@VPRId^V1 zrM4tmwdBjR7;UZQw}oqwk&uzbYWmT%I~{Xd`c&W51sc70@ZKU!j+&33d4ElOfx zG0Z@=?rUC=&P3=a7%)V46E?@Ma(c?7N5mOH%(#7-(ZC$1I*aMnp z`O9ydR{Ay|okl|)g8gW4x_g&z;*sGG-Di?NJCB%kc1H^e*l!m+6$eWLtG)kGp5Wz$ z)U?I9d??nqt@)7YnmZbXTHOV2WGonjV@C@eTtv{5cealr>ke`xZ?5(P%ieo8U3zX6 z8YZNM!-3-wK`>~$P4=eyi>GD2RL!gBfrbMLduZrIgQ7?f1(>D}3oJ+Fy}2C46|oRx9( z+ksy4&5F!4ct#+e&JX~S@ZGKH=i26Uk%s# z0q(`TCe5$eN-lXLa^878RrC$NG&;^2n|1bZx^NoKIE0s45dDNnge`HNZXp)4R_lj{iI^A zM8ggT4lAa|Skg&#g{OrnY&9mfx^tLJ3hG5p6?*l60(RVp2FdH6G+LzIl_|?JzAz#% zA+ylJdp!NeNi>UjZklqo9UVB@%1my%N;AFDxFW0p=z>nz|BXrjMA~ zyyz!ELHLqm=`(u3ui70VFxHnW(#B6Lk7VUjAU?oVx`DMj} z&5tRFDU1ROa$MX2lJA*B4!RF``(I383v;IbV%^$cJ?@lW@JeC#9Bi{P(!0y5Q&3%{ znMn-S%A<&Lw)MZ4H#1+DB0f6_E44c;BJJNNEGFG*I{V(`Rk2 zga1j8j!%jcHBGl=!Oikjv}_6g`5!isq3(tP=4?NGI)=A!nXwoFOiL7;NwJ&!`uYa{ z$@U@)n@Iuv;Sg8P4)>kIBa4sj$vbRHf<4R6e%$DQ z22>emC3 zjY2x&v9C-`9nE&X7Wu=HJ>yr@l2W3omPPe^mu?#M^owpvO{??hLS4^AK62|XaU{|F zHmPT}JT2n6f$t#;8pI?&vD0B6h=33-%V)F{ao}05@8-wzNQ(*Z7$QVEgjD(Kgen#b z=t%Wz4wrE|QL)Q%Gq28>q&#!sir|+5p!w9*<3KY-vobL$udP!!;EAz7t2V3$FIT#~ zo!@V~`KyN|f*d-!g3x?W6Sk;CVDhD)Jd>uWtUAjlPc;Whoww!- zQQ$BmY#Jk9LO6l(tIw$h`3FIQb{oyi`!Yc2CJbQGsLDx6}`c+BS71@-?&qBeSq% zI(%W>IoocKfe_(`kGfSx@qZd8WfnlLaM~vc8b19YwO)n%s_SC@XMyFG+r&B5fUB=^ z7#qK7Z_^5?<3(zanm&?zmOE=>(Aqk8z1-)~ki0iQU(_>P`T^JJ{Wms#Y!|h|Kd$$7 zW-aFCxXn=_8w;7V;2|kMaw1+UmE98H56I}eCDQlx{rzxU8F4g?_)V=OZ*z+J+OUO5 zPC@EqkeF7!Smp8a06O{L#p5wk1Y~ci(ce4;Og-!P z(ozclShz`cD4%`|9`5`Py7wO`!*jg6|4}j%eyUBQ%BmC_x#@i-9vw@D>vGoqSLv(R z_FQ?y(E`>md;2>pD*qVa=IXE29228bDo$UV=AEu?jv|g`QPQ3F)!6`qF1>8!`xZqB z1vCW3MSsr!ap88ku>}q8Y1ZN2VeL7vEzs=ED5fGL+x;hqfInLJkJ#H%rjU})+Tcfg z`$-NX=AO$acW^mTB!(01V56xlHx%a1?RhTZ@eZZ%BMZidMhn`r7BJ3iE602H!+`!% zf#zY{<}7%w3l8WXV81L^F=+r1DFd#5=lX^nhGH}~YvNR3(C&TtN=6ID10BpLYSFCz zr;iL$CdBGPY88eX9TYltXPDuObuedj4xa7d+{eQSA=izm01S?~F&_`cchNI5${x>c zEno4_C#`)6DgrTT^rYS)*thj|e&TlN6kgrj*+cd>x<}^YlzS*vsvh!o#@1e2$DtRs z=hFypewh28BVHo7_x~Dz7qEJ&`Qw!QMMM5&4RP`se+^(bBip!3a^WFT_|Kq_KJen%TssrOJevO7%I<4GeTXLR3 zz(~UxX5Ck)`f>w?K_zQ0osYkF8OW-3bd=h~#u&5AS-a*Rg4Ri^BbJE1{O4=1(Jw-t zH#r(HD7GBz>~MRaf@D0Zt7y}C!1J@ubqanP2vqQq1Lc3X8433`jROSuY&Zj-A!Q=m z(by^7f4{78ff78uyng)OmGG@e(}SNsdqw-Pla0dC7(9q6qnij4fJN@uBBL$ zz)(WgD2N~mxvJy%DIZ7XHAtu%qFKvVTJV)ZrQcZlzexuE$nUmNR&h8Dl}IW$gOjlFLoNSA~vhmhS8?V$m~j63Rb42+DpSLK=G?yyTUOx2#!)_EyU%l!%P? zE`kIilqqgT>Z6q2^%V0m*Z zT=qp?1MhNH4jI5#*V$?o>r^UaYV_N;HJ!)SZJr(lORLFMz0$p|?}n6-p>aQtdS~y4 zf2OypzaRW*R!6KW^Oy(Z5=Eo=G)ESScKOxohO@}`F5Pc{&0qKN>(wQ8_s;u}o+oDb ztbOYR4@(1h2=hWFeS!L^-;tkZ46=Wshn8`vkU{bqlbRcB4jta=ZU+UK7!e#$)~W}9 z$`lBRiMKY_*Sv&M<+(<@nk{nXZqnoq=0(}}l`!;Ml2i7C>n%iWhSlA39F`aUdoEJ@ z!f7biiL5b^`I3|~{Ku&)r`1)Mufnq{cds*pS!n3E^Jp@1hj3r97z-az;y791D{ytPr6s>= zz&@c@q3ksw>XqW)IYidf(xpN1t@Y;KUiC_E3fp>^nB-XeNA6Gh%2iSxeug!k%OU@J zAptS%`Lyis%iBfN&c~k~fcq@Z;E(Ew42SpOYFZd1p9KF*AVE^dHN+e8Ep!#b`o~ z7pnk|dsYz8Vy8pPWa?_`JBi7Pco_;DNn*8kd6!4^F23AA(g^++a^8mE3fUtjNcKX& zlSQA(^6|d`!m#P%y3pD^|8&Nl(*n*lJ=zB|@8LIiJq?074k0F~7c({|O;kQ#Mf zOiwh?VaT-0QM$-8TlsuWDgbW%q7`7mbtbNstglQh-^f>eOSj)G#r`u@l>GzVpX1Iw zPPd8cA8Mn?rxwTOL*~Aismz%cc4;n0mu|a*O?_vk3eZZQa>0F~8V0Y-SWgqSYV_+8 z!jc`feZ@xegV-mo@k*o@I_n(oqg$`vR^^^unYT?<6PcQ6@vQ*+jCr(N{?d%;$88xc zEe*xN63@^h)LFlw%SWWp!(~Ctew2GjLq9-N6l~7#OgF&qVo&L>?U$vu2;6TF!7riZ z#D>MG@|(eruf9QDXggawzsnZU;1?SAzYC44D++FU>*O4`+!*M%^N;LZub~3bRH(1e zPOVMfKL~5Sva?q~vkEYY?4z z4wDU2F}BUExTbA@^<8ETPAR9qeP4BE-^FD=+f?7^U9u6|@JtRt_8qD+oevOAH}k+Y zYfe32XozwULlmfvz%7L~)gZbWq`YXx^j5GXk+?>{pMR#ocdBRJGUSPk+rC;46Bncu zsccUtfpP7uqN-j-+K|Hb!!*Yqi#64TOUc?P=IvtQF}cyQu;Tz{3Iup6$(+f+BQli6 zFw`J249KUk^J=ksy6{V%yKs;L^UTdJ%U-ML*-C;Qhfi`p<;d$RR zy2XfGTSt1%L=W-KK1E#*EVNX_)m!9fQ`&!fyiFOqo4{uWb198d)$Z%a4k-&3YcDIQ ztvz1N?WQGuJH7hby^CvzL?Y_;PJgwl2`c)(VTUCTDGk&X4_z^di@?y8@TNcVq!p~8 z6I5kqMKbrarWIomDBbIhMTPToxKvdFa%$flQtemYN;*bj`)yqCQoa@mpg-$xu}=nm z~@I61kS$LCSG2_{sD;68$rSf4m6UVVkOOej>tbB^Od)iWkw}XV(_r2r8tSt~LV$I{i z_AV|NAb-6tx?rjTZo z!XoT42RU(@$t0|-MskS)qNF2Q3&cC9+3Vz}rLwPh^$ikhc#SNbeib$%4Qeda5h61` z?Ox$#P7EN=Wf|&yJ(hN1>`w3i`qMv{9!`rFqK1F>Hr7eL-_;bQcd%dfDFA%}drSr(`F~@qNH~0>GGUEh3rW>)#=J{_&xWyYB-xoB4E-Si0!C_qB*`J_;t)1nF(e zJDQ%HYQ!&>>eaM1?P9jhUCal*ofAc1%!mi-w5%jlTll`mxLmhujOkgz$BwOA9-O7v zOHGl1SK2(6kl*Cdo3QfI^QF~NU2DGNvTZyA<>i*lIXOd=^4e(v3eeQRO|?li^ec3O zAe6>EyIRF#7t86KANi!DRRm3OMksH@=1^~g^voPNQEYGHI!<337P_Kij` zh$HkCBFhWgZY~AxL&JH6(p#_Y#UEC`jWA68!xfwU8d?zxs8cY-XGawj(J|o~!{oqa z|8^rfUwDvm>(+ILB}a_SW`$W%s5$pLYDhT7rxV!wbXB&KADrBDDR?AK<`2fq)DaFD zYQOvAA9r-K!3Ls<_N38@ImXUK~%~qN$Bmyg{wzS%O>0LiVW@dAyNJ95g?wF+5TC5C^3F1v31_o^9u_ZD# zUjBLMiG1qp3a`%8=>1H{44a!`nb}wE02E*yB5uX`rmPts*>r%LB1KU{|6rUq3D{88 zEz`QU9c*icP?bLDR)V^Jp&Q|cT5OnFTW02-9U6-~tAs}hPvYZ`m#i77lvS;}zK!r3 zReWS`WBN)*H=xt%HnPyJn4rWqO)6n(uo4~1mi^G+jKRtYSV+J#h3tiCyya)2Ug(C- zzbrILMp68W-hW@x$MH30aPX&&&#GZ`{F)8ZH=UG(w%3T#IU;D4v_y-4NFPF@PV{-R zQtSF*zr~0tt?prB;pAOlmd}{`TaK$Sd|$UO*!y}ZnWPEpJeQ933(Nw&z6+9&skTcS zsX|^m)o)5I{V1S-cDga%Fd`c}D0^lP-F%Hu$EU12{>t!JaKqTT#?b~f7!1xvZ{AZm zDh)IG{RJp?eq+iWhWQFbC)z@#SptuLkn(Lon#lBHtcdv8t*g@>2f--^gizB*UyW-E{>X( z;u~L#J2Jh8O^&eN5I&IYuc0`dW?J01EWQvz<^)GlHy3!i*hkp5PbQq>8@sbr3k3th zDmE92N#rAh4iEfW83VNPkM%ahxbKz!@-Y8 zyiR{q+)}_LKPp_YsK&^2(1J9}pOorio z&@*=ys?{{W$8IJBI!`*qS|?Y7WI)%ff381Xle*;O zdK%3u8T<(l1RN|E`*ba3v!3UDu?`1I_m1;DCEyGd(K6etXj5qJc@xnkT`MLtr%IjL z54QMiq^#737v6vb?DvQYSP&Od!2?;jS>$6`d_ zeh1{FQIR4b6zIN>_lI(mt@m_Mpvno|N>3!ydV|&Yuo_EL{p89n6 zc36{rsL`2*lka>14k>ugtf-(vTP zusjg=AlTSRA`9DUFBufN5b{d4LnXSH-I^^_+AX%|sUE9&@XaBUl zIzU-{`nu)-g5BLto?h~GJ1pX!*M0-LRD*to+9u~6dfm2x;OOniZ(#gw6PUm)d9xv3 zr`JS9(BZv%;{L5qv!VvV{lP9__`=Xff>uae#fD$Yql-5zv67W7GGCK4_yVkTZi9sA z``dYfY3-y2L#c`3pr%FkwRuL1bJ0Tb#&7YU;sk0Kz2*A*`su^ET714~uwwXBs`85A zU39L4(0NpxBmtVAY%;6@H7`Q2fAY)<)>75#y}??}4B8r>1g@m0lZkw$(^f+fY-yb~ z_ySxZGZ)%HORDZW2CJvcBD?%~(|B_;UOSbsQVf4D8TILnf2@&RP8=5+ug)_(e> zp1E+W*CGzRbITkHyQrwCE%C{#S;{)1+j8ljF=$y4T>5*3U=B1QW^UdZryI-T!taYZbD^KfndzR5m&dC{$X7&>T< zc$zWod#aV1dlL7-++gJsSX$Ei;jwhh(-35uq)0MX+=o-~$3wmHllPf_ICz7o+WqYl zmrZ8Mp*)YP;{D6yN9Y(E?TM%VT7Q)+lmOg)p9lM~&FKbNjB5sW`&Id~itO9hP;N_j z@KKrFlD|4azd}a?3R$^isrfdL@9k{3>|UZo3W4r1O+u3bXTK8WEj8~o90>VM*f;^h zB6wE$oYO+4_HH>?N3#o*9WUJ8d;N-c(Zs3H$(|R$p>qvK*o~%=vp+F9#<+ibp}DU> z;bcHiAz)+6xfPg_+JAtul|>h#lWD1I#|QZ!kca`+T{3StvKZyZ!>yUxCIv)FZA%Qe?( z-y4<4B0lqUe_a-rmBN0y29iM4GE;8Si&3&Mv3g7bVljf;`9oyymh^6KHS%q-+wN;y z*KtpU<>i|p^v$i0;>{}%i*y6N$EB-b4v`u7yhrHLUwZ7W_6qtpl)E|@J~sQ*d`*FO zB*VG5CRU+XjIg!8w(PcdzTP}C$#IttOu&fm;Br1))Oz27v350S^gK}W*iQo;w_#zO zU9)_DvOEN8QM}|UD4-g4wE>C<6@i?IwQ~zqPxsM=+mzFQiy|*Mu?~Uf-D4=r=NA5U zslr!rU3b$zz2QoWLZMQMneH!>Yk9|ExAA;gKhJ&Z$NZlARNec@&+XHk*SgVjY2!|R z@F~4c)jWy9G@|NJ)?AN=v?ncQ(z+Lz>3X}NyU^}|`+xX?%Ze6Mz}bV^dX|@S1HD$R zF-nkiMD1wh`>;7mw<8c{$8#$NE6hH(4QFjK6q3W9$7?IgHZ5i9g9jkXMMS~y8R-V> zL~EWlQ2{!Z67Y9e*I__qoH=3&uAty>k+5GGaYt53uv(w0~85bCpY| z5vfIH>s#(DalgQOI+TBA|INGOs1kN+BuZ*(zwTNh^5uxY2u%I#smV{_EFlYpRMVbd zx!YwM0V_1(N+$U;Qqs!RN{Naq2av?pW)7-sQ6!lOvxWGy-&B;~O+iwdS{ay+dfQ$? zy(A3zx*yd$DBYoI3rA^ctn7ekAMaGLD!ui3yHLf$+#iy%G4)kd2^r*(XlN~-*Yq9d zgM%rlOA98|F2ACPm|gjcm4q^#UM}6_Hr(#6P%=-5{a*)o+dlH%Cg7iL=ZgRz3|{Z} ziqK2%^}Q0#i_AuIMepc>v|jA;#~;lqoA3BikpN4_CD+wTEst)+6)hR33q2lS)D4+y z6eZsu_AfUI#JVQ7&$atcFyd9`macl2%C*Z?6C)nYc@N^3?aI4tZ?cm`<~0|HRQ&5K zhSCLJcZFT$ugBC-NVQt#r;VSA8cy?$BgNPpb*);q_XmJ>Ej?&yM+3bR0yJ=Evk9&=Qn+yk;uf8mq?>+ej z5gRSnq~B|`8Ze+^>t%szqp@{%vH_e6`@62+GMr|EWrKd5TKrb_ib(Sg9w&OG?UNIl-nWJ0ZVCq}cU_mT(@-SH3CfwXZzu*R zUY~1V0(uL6IS&isB>iq^9OD`Vw$bthmJNRTr1v|jKYL){onF03arNJ?O+|A}s;(ub zJ9xI+)0{0%6V6Ei2x7Ci*3q7pOfCXIZr?}`GbUG$+|eO_Hs=>wQX!&gxwnpy9ahi# zg%~FtN`5~IxuKc9Vw*~S`{#O5?;#S|Z>ml#7 zm_HolcB_I!92*bdNSqXz_znS2)V%I^zl;%v3U?LG%jg>IGy1%Y`c8CTzpl3)yf!Y> zyufHOVV6Wy^tU=_tzbXrBhA)He^{zC_&(H2YN5r3%E*k1sHV~T%rll~vI{oV{cA{rg>B z^wTHJn(ca5$%AOj^7*fv(KbAsepWvBi3?XO%-0@v&eN47XCj=jLng=j#Id%T7!e4&$Ec7ZN|DZ3$O=X3e%mwi0y+#}iw zKgxX5C@zwG^373uO$oZyJ`OmXQ}@r0!;04I1I=LyiQA>cIq0>^toM=LEJc$mh_4Oa z&!LUlfiw>uHhzyk?TR|1Lh|8TTl~f)Lp>|asoc-vl~;dhBGz1gIz>pD)>f!ErGEMK zS7_N_dyt9^DYH%ID0q4jJ-U8?*YrrYhYZ0tNAqoVo!-_?wzeR~CBqKOe$69=>n`>G z^Nls|^3@Db{{yt3%L;$Vj121QP`2kEes(o%%Cen-QsoIwmF?edc;J23`yBdvr&(rgeF8T&xz26s&*#W1cKP84UGLP% zn5F7VCn&_JcHtMo2)*Ql=_s_cipWX>u(FG|%+cLet{-UapwS*ZruSBMK=9pBWEZA;BB4|Hj)Teo?{%Uky2 zU6ro5vJdBsXf@G(Zo}Y>gg-qBpN}-D2_g>Hi3TwCyZ&-)l}Gt8I#lKt`sojrJ)=TNncc__Uj zPX6q3kH1g-%R;@);+A4 zF`v;Wt^!k&CQYu-R*DefSPp*0Wm@W(-q-=*(@4-zhQM9tJI&?A_Zsw1(nU+U6ZR*3DAb6FJsCpo<6`Mju%@JRH6 zFVV2k{-IakSeTv|7xjk|MpaY>&5Ml+s-jzqjiAZ+xV5HOT8M?4GABFaU5Itk>jzApL>MP{o69Z1#hJpPZ*oDY#ZJ3 z+cv{N)F7=vAw*`?C9zgNZ#T(y%@)Elp9zXTkuOaX-P;i6NB)UXk^N}C@61d$PdHus zsskHRiQlIVybgD<_VQ&tLa*~;^#&)bCpjyQ=PQY#w@$7cdf?E(?5^_xFc4#hgI zZXej=w4&WUAU?X*SPyf851)SK=EHR6^Vb~KRdvT_Xyh-xHm%$bGC!~NA&f*z9N)=f zgUMlm`-8dy*NyM@pLfgYxA2Q$c&8p=V zVV|kEzlTNUM{I|uTz>5?f!?K!WQJFFv~&V~<%9C!jurgH)J4L_-I{KFPrG<@jhW**35gdd6}sp2rXI-hErihoX&Hy+3{RHxG}vv z@Ajwd$6xd#=kxlKEg@f^r_iDsd{d1yUG7@G`D&^n=axRlXvD- zz^R5G^X;1ThXr!vF0^>chp5qVWfJetFs(h!TgaAW`DDPjaJKKHFylu8 zZ7Y6W^Zb|=(|i5+WSLzbd*U+eHpaHf$n!-SroY*iDB=6tXZ@SY=1FCUs#}BL@@K8> z7r%0v?;W17=nP28YI)=wmNZD|(}tzgkvA6fRZYV3S=Kp-?*4JUNIP+x&Q*Bg!O?#1 zgsFne(0KshC(vLu9zjwq?s^huQ+{=y6PEH@)Y7JkeH8YO2mBx*V{`H8XSRtwCS|P~ zHCrmlYrSWyi+TsjEG~yIuEPn)=I|tRj8&eVwg3A0XKQxdj0TlssSN%ejlci#$n&0A z{L*U!V#n}BQ-tSeE(B>y@iY}l+k+p|Ief0I*72H`?mGFF>WD-LTqP{ao^9wjk3KXs zHHknrB_&-2zID~7y{v14JUJ+@lZ~XnY<;qvNTmEo!O9(bAADv89YimbPS^FbJW2v{ zo5L$dB+N!ON2(K=e{av29D7l}%LiDy$siMgN?etFPW&qGQ&)`TlE?ksc_`mzh%>~i zP$y7-TO}io7Zv(P*R0k(hrEIiETFemG&#M*a#pvgD{cBi|Fn}u&N&%svBN~R)i-=t zHNFL~_s2C!W$-aaQ)qxx-#)r3e?9bC$%Ns9_-n*hs_K2okuSK(h8r)B2K5c$xTbBh zucj$hGAIt*ilfWmH+G*Fm6*DGST#P0>b-hE-61~m{-m_`b- z`T>{hs71hEK7`#U@$2=Wa1blyUaejv<%kroDda_F{~4<}=o;MMsLSn{zBqL=#AV-r z=|QD@Qz1?M@^q#NqYIQppe4U@v+0x^+L>ptDmy<(iFuj1|CyLQe*|L1lP`~TUd?zE z3`#O_1EHvevfh&0_q&CsCn^0Zu%<3-Sha;`gc*PwZYsf7l(^H~g#77%`xQsA!#5Fy z%9D0Z={5T$xpaa!!WprRxt=do}d?zGaSDf<&6*UqB9D9Wil0y#vK8F6pY2_E&|z8}J*vNcn(* zax~^eTjTxHrWY8U(!Cvy3N$H0GDWz^#N3&Yw{;_huL6-f7)tZldx8QdT$QIN20F!N1H;`U8`5;{cdx}@^6?FLDSnQ_XT#$ z=65w!#~#>5O$56CIOe}0U9`9Rbg!;q(!EMK;rAFiYb|!Cc%-py^}6_Usa9n##LhJD z%XnuL1xV~$bJl~1=$?vaGv-Ink)lR4AaSsMEw&9fZIg*He8+wFJdTMXApnUPBF zF8{6=OWBrVO=a#hHnXjD0`~CS!CqHC-gXUFwOgIR%1G`1xkbx!Gj_F)g$@#CHgsSv z5vYkV_wiQWpXdCL4>wB|U7rzZ3g`cr3}!6RG!InmM0A(?jaU6FA%OQz;$C!k2;tqB ztj-!n>Mny6&vpxs!hge|y?ITnAgSkIz#uZrxsg@FVfwhW_f{+{ANj%lYklp5iGR|* z_16rYXa8DL22!8uAPQX(;#ZqcaM4lo!s6TUm7U&68+fBK2WH zBG$#Uq?(7{uNUHN1dbR3fzYZU8%rhM<>$PM3uoO7OXxs!6p&YMlD0=)0b^kcJ>Gy* zH_@?fy+A;>Nh?1he@;5!{g?ewguc3BfRz=jr1S}^PWfWOgy3As1ds!jdBis(=Wfd> zngC;8euU^v)h|d#%#0cuWf^OdhVv46VY%%#anO2zxRMEC1q{KSnBvgdq4V8S?c^cu zRzHW-;E}JX2hCr)->>5SOxOy8A>^!JAVB$#4PMskP8RE{8F{-Oq+J{S{JB`d9NNd` z@J;MRQd@slhmS&H!m4j)@6dPzu&Tb0{&D29D`$>d8wFe+wtKP0)7(CajpU0T2RQ+BErt`#l@>Zt5JEThN-K1%sx7FZSQUbzGbdHQ>NF#2|YJac_ORIh?*U#=SO zM;T@Xd%_KALpS_cYqW5jIYqzN$J#T#HP3Fon=I+e8z{}ogVA1HGNXkhSI=%ZFTWT0 z8V4Dy^;Yt)172Z1la^ljllu1;Wy1EJu+O&Q%!y$wt5^KJXg)6>{<{D@KUpm5Q^^1A z^pP&$c?)lCj&eXC^LbioI2PjlQO4(>>8(UTAQhX!(lyESHHmiPfR~SCY8K2#H_^~b z#1Mfw+2PR**;&Tl?r+7#7dad6Y-UvINI1>ZR5Dj3k0jg*`Bik#w92-=?;GJ9Xz@|? z+Wxp@*3MbR+Q4Rs#j;y-U*nE%y>@1)P4<848(xes*^Ysy8gZx1_nhL59B%ZUhPVFU zKHAl^vI;IVDjj@b^T0$OX0q&c$R`MnK&B@UjvvFpt@w08YOmfw_Kg<03Ml0Kx1q5W7Zqn6OOtyBGFZP zmvt+%5`H#v-yNaN05?&BGSZgQf1hRUu1wvOz8S@1TP#yt6e!0nAtktd67RqGJT zj;jd5hcTgY{2UR;SYtYujg|*6RK4W)?4WtH^*Armx$?J zs5&QWfGN!ksyqLR8c+jh>#phY87ql;SHff^?ld^ql7^w)%DjKt`+LED z(DfGyhKn@9CJ#5u&Ylv?uE^DSCpFM6zp0l%dlYaKN@P&c!+`RsOl+C&fVc2`sxiJ-g$=#xVrPo8NRL!^^=Bonx=K0?+-s6Q+Y>cycoe1mJ_xM{ zqD=Z2PL4j;i~0~*E*meiySqEB(8c}tF~xue?!CGoV-L0Rhzm`G)eKR3^taXS^x%Ab zSPNN&PqWb4M1K6AKP%II-+m@fgfFRf0kiBc+wjtqJ}Kz^@03yT%=i{lC4T7~>0SMU zqwpovmoxu%O%tKbgw^hdulb_FBT}=%UuTM?cYo8<^}LW4wvCQXiGTk`zt{lMKI{oB zZlvzrS7j)@V^Nm13Tcpwt@z_S6#f2F;wJ`Ir%`xGWQdxvzB^_LTowtU7P~~w+iwGA zS0sD4QvSI%&_{*0z!XKXoO#bB*-19AimskV5PfFWae~1sx4#1iT4*K>1!@MrdM#hE zc$?M6d7|_BZzo=pV>8DR8+`oh zmIBLDF8v9SyUaadDx6T!%(1RMj@hd)<5$SS6@fExm4V+pmPD=rWS-6i!NfS9XL>PU|AQ;4KQi=f`{%F$wG<S9H9UBd>GQ2nN)QO-RfPUN^Zw?|cbLN`)hn+oB7R!Kq@e>6X9dd%;Y*LE zUa+;t$`xVqYVfpuhCb3M3r@S+kCI@!W|bl<3lU>dR8 z5J(e*m{Mibus{hCdnoc^`CLmt;F@8d;4?PejJphqZ+NoHK$xw>bg08^swdf)N;+UB zdHrV|2`RCbj(i=@rZyQb{U1nHHa6=-a#q!M3Vi}w(yuQ|_EI9bdUkPAq zE?>|hhTP$WcM-C|MHJx3e&@y7{)tlaM{5)NXblQpS}{X~WTtTc0MMbfxfmPl66=$;!OBLle$_Em1WjlMs3L?aeADj>*Qi zsnhw9f2y4>>q-LgE&yjK;4iIB@%5aao{2hJ_DMACJst!qMc6!)9wKJpoBd@Wf0p7m zm_?I#{ds=0jt|Xo*wLHI{n(+QVS{uC_9rkXl7T?F*2h8>DDH>jzvSVCaFZL7;csTFgVI!$3#GZX9Qz|xGL(jnU$5eH$H?9}{#kp## zh;hW3Wv{_a!?1QO>jojz?aW_&m5gPv`L5y1B7?OD#9m`H)00-cN?x`DRe~YBo3a3`Oc4m&y|Iw2AcRdC4X_aLFH3A(C)Q2hAv5p zWpHAlU0W$$Al`^7U8t$#cj3ZVVw@VhouPrWb7!zXnNj$dUr2Y|={@L4{w{NswUAV0 zvbkhVacg_4Zaqs6D?n2qkeUiAqLzMfGOhcIde^*nCa|M~<{`v*%-n65qxyF1UGUn& zD$Apv;>u=^BPzL4ed=a>f#}-zzbVc@l3_ONCm%lDQg}vWPr}b#IqOdGFmH*5*NiTil5( zw1k&`lb*D>xUFe#&doL;?GzBlVcF|`K3WYGBXWmpGc|~Yr~Ml>M=BTTeT*K`|JRGh zmy;fm^8)Lq)A^L$D^po})=$~aRrUC08q&VE+Qu|p8>#N(P2XWR>JE#c$ zOV8g&Z*#|zQm;Cr_C`xhZ@9b8cG!n24?O-Vd{#FXqF>pyJ}Wd45IB>E zeKjJ)mU^C}Rp*mtzSl3~4FfWojX)F--}|$>9LOslXGroRqs(`SAq{@;rU2Si`I{B{QWzUjsGe~t0PN*>Ebm3z)QLuLJGi8HD zQL{w9+4cq%2=x8s)%XQ1sp^OsPwznD=y*fx(4pBa_W9rhzgR8xkLC0Y)9^L(pS8dC zHqLKV=E`E79?4`PoJc`9`A^taWDrztqn~5-RGO<`%#HOJS_A=CE{{v&&_@>6&fOa9 zVKfU$-obOr|H>Qo*Z{)ceXYqz@u{!s+Z*eu@|N-^#c^1f-HhU$lip4a?3!Xxs*i?b zqhJ^1kD+K6d%}>(c(>1(X_k!r(eeA{vei=ztQbRBt$E=p^NXTV;|cSF&7|t?1N>sO z)B8i>>B$Il!wkL^DBU;%+ZxRi2aF%Vr)Jr^x;y9#={YGJqAo;>l)$`1VvPAM_LGGT_Om;lhac+O3e4h1$w8+ci;VAU&hdXc1=EJ2ByP z;`gTv(< zAAIoozan41=6VM`ewF<<4^{=&Hyy9KAu~aod<5K+jo!4|cSNz^qj z{_AGA`$J2CH7!1}Vt~W3HqA3(;qO{6EXM?igluB7(mcE>CapQ=3M-*FyLPgvm_)p$ z)MntZ0db`}nvlk#P+I$UiRW;a-qnA;C9NpeSv@;A7qeS5UeRZGTfQqq2hx*TX;Y56 z86ObJYjC1JJToD&U)<%qI4nsZg?*8R*LFsN8v%RvvM1d3!$!*dr@}NB$lxT-I;j|w ze}}(@uKA(vg<1~syS}y|3pFYk)m|Q$^wF6lr2d4`oFpvcNG&%)USsoH}kcYAr-Il-wCU)=ij9=AT|=haDcT(yL9p1uAzG z{{DKjk#zaUGS3@D3dfISteuW64jg=Ee!Koh=AX&vK84u;1wH_4`RfRE86ltHgz%U!XZ<16U;X zI^D)_5BZ5zO#{do1TJOhGK+61E>iVGQn~N=cdP;#pz&mvzdw$u`t3)~)Re0P&fTMt zD@89OXgc_Nz?-#xoI1Vc@aX#O5MfHl{`Avy=W>YY0nurBrO2Ru8e_7RK4*^4-&-vO zv)1}ASeQ1vgf8z>L$CB-%HvUjxzjk!3?l71{qHj`oY$|<3AK3_8pA{kaTBL!E$)_Y4uQ0e_fES1RDaLYMKfwsnuJ)*fN&bxQs0=sOkW{8 z7{cd7UAbL;DeQBNE$isjI_e(3v@HB>JYD~n-eTll%KrE{>vZXAkD;f9!n($ml%hed zu$eU0$yTnG)0WZ})7;+1J^mxx+WAik9GZMggVcZ4m`!4CEEHA}C+^+z4{t8OU~{U~NBs70QHN0@ z{mgot5Q&=nIbXo3l281@gR_(h$cr$2FfQ}AqfXR@+&AOw_|Y(A8O_g0Np^YFu}oMM zP{=QKVSKC(1IBc%%X0+;e22Fd$egafF_hn3K!(b2F;dEeh=;VlN)TjY=o(zY96Z$@ zc^YUArRb0S*Qm|~yH`odjA88-$9sS}V1=IJ=8&E*gGzrSA<&T%mYW5;+-Ww_8ID=B zyt+^a3Tm<2BaRd`Ry{l}8E=9#u8cHA1Me<~evje~!8C?yO7FiMz^kTSbws%BPi%RE z^mO2gGL^2j^)+4v6|}r$OlV=if$2c=2if5lCz7b0%55A_JkVS*e3RkpA+XYK`di%mBWX7Wz``f193xNS+&LnC8D> zgiMJH^C&hGM>fC{W5|-oxN*WX8UC~n@QeJENj|!$D`Jq*z{L1kb{_>uSNw4E&!79m zsd$=mZ6Lx!dtul1B)C6>lO){#*FypVBa|1QAYI`La{v_N*YsFGQINm8qZAo&)3~k9 zH^BEVV)NK*u(xpYdUqH>N3&d5M{cAK$0;}Yd#a+e;@R7Rk&>4;lVcahD1ec)-nc&` zW0E4THpNYDj6reryLjTS#7ZmGl0Ui})1FEW*zp&Vh1YsG@3E^eKcCV{_|?J(bn7<~ zq2qm(;N7tIMUYc|`lk1a)uZD2QLJ{lh2v3ds*C=wYhCU`N&U{%bOOd!$y|Zc^0lY# zrv2DLq^!5ITL(W0$F1v%Z&*!|(_FfQtG>s-9*xzIne!O3lC0m%F_VPEH|Hv$n}z-h zsOvT5MT&!Qa8{Dfuq4R|@Vm*SYyqqR5(7w6mm--HDVE@5lD?QMvwb~*W4USCg5iu1?+Y?b}U^Ks&?P zl?+93^r8pxfcYvD;iUiI89qJ$mpBC}3dkom2AQj-Ej4tg|T7YyygwVjK z5Hrw*z6L-AYshC;wi}1&L~4;dUa`vn!BJDc9x&^y@;N`X1blALdlypMz-+I6>U}+0 z7N8}P4Cwhznk)Pu&CUboQYmhb!=MCAo?#!D&O6|kj~P`dYv`%yv42?17@R-2uyOhR zm|Yuce_??rOphLw$On)(%v$AWr<%m3rEv<7_k<};zTwss*jux*<%9_xHKp?p@q6qI{9|5qTRm_)ynRi!5y-#1Sy*fYsI$rHjLZW=M zX=f@Bv5&!dop?f1yQf7>C7yyGGwmKVCDHaI=bW9y4YE%O#GHPS-0E z6wc!~Gvh;y3eiPkLh}bn!H$d~AQAUKl{lU{paF@yxaf2bTC!KGfZvMd zz?kY9t1~hQ%32~~BwVXNoKWjaTa`)=ik8)ekK*zrO%fmhxTB=LD&qSDl_AcQ9BXsN zg%B_z9W{)L1dsWgChH?~w<3weKsU~}>7B%#jY=*9&(TO=NMq{sTmcK`)Q4KsqZzW) zsky-A>dNHDca2C?I7|zyODqn^+zuOfPtyqZS8Lz)gP+Kqme5*MeHtSn0m32Sc9{#d z@e}>xP6cDbc@2fu9%K7$Y{)$OLsOTlqW}!ZD;fY&ZYuZjtD(>85r3WMV+qlGVXqwP z2h200q4jyHbS3Z1Oe{r@R=_`@@N|(D3Aq!rZK2WifcNUqsW)Bx#cyt}J=#+@Wz#Q?{x{k-y|QWw5WMOKj9jP$%Fd<3xbW zPG9k3>vu<^&CVA6hND+*UBG7pPx?9d2Z z`Kn=%t3c?J5jK(rA9ThApyNAvW%(D|DjcpC@Cmw3Nd!iP2V>gA3elLyz<>;bK+NwI zIH~$%)buS%Ic_XKG|Ay7vz9I2I7XBk0Jy^ns7f{XBXI!@gKS;Qyb;hA#Ogu;dc(fc+`(;1VWclr}DS zF!Kh`0;3^gisVG4d#Rx^z;J;372&`x4P@_?yIkJ_s7u$BblY!uO>iE)aear>zy>r_ zfaN@UV)>dFR~b~vHB_D~Ilkz)o{&i@0$8XNEriv~%_>KXuDsDYncaltPB zi=Qp80(j6s>@Ko-)zlTWCrYiyPfN0B?*!dj&HDx?X;;RqtK35*u&d;}S)6d%Y_!j;>Iwk+B11cr=uq^A&w5t&Z_<*z4Uh&4Yd!@8u7Cs|--V=(&6!qb zHd86AVRb57i7aW^qv7hVc2Csbp(HGfJ8uSFiG6s1L`YiDdR_Q zv#bJ{B2z~{@B4oS&;%(1y~M#@qV|MI%d3$bkUY|905w#4)>A_|R2~l0;M62+1_1e9 z1*AHh(P=l7tq%u&-uVcm7JJwIj{jVkB!G-TD;qz0afw7aATlOJ4*kA1PXT~Jf*zCe z21zp~$1-&Ts57bo@rf3tPXCZ9Lq$@g4jWf8K&#I?gUBxIDj*@C8#Z{EmU@YV2RPU( z5b@+R?J=_(q~0K45uZ6@9$w7rWWugH;bM0Iq6qh_-~LAv(A!2z);YalCkh8f7wq(o zv^*x0DC8<%D8Yf;Pb(Ex7)nd?6~Gn50H6=YIP1HQR(Yj~b@-hxt6kV|Ku{wboelCB zEHJ(~m!nm3IWi*`pyJWvI5~v>9Td3YrQ_?k z0D1-I7M$}o1SOLa81S#z#D2j#ip=uNO3eQ-Ye2}uYI23ihRX>6A+E=^Mvy4?h!F;0 z&ENs}K6dz-URC+MxF30VGfdE^P-F)tBagp7$uBooRQnMC6?Fwbn5OZ&X7+WqYZ#hQ z8bS~GzyXUIBbl#W9{@>;a?VS|MC!u~pK8RAr~wL~Ed#sf!m=w&Wtj+$KwCe_^*2}wu zaWln@vkzKwnU)rfNXlVjqn5BxYJK*E1gi^-_Z9rR`gptjEo$jmpYbyi!8`B*B0^Kf zuJ_tfQam6yFUSeBPqK0N6z<&$3>c zB;DA5KV`kM_^*5kBw?hse%O~f<=ocre063@J4w8YM12<;Zoe;@g0-7uk%4s8y3ZA? Wrem|1zqQ>VHK?m **Settings** > **Update & Security** > **Windows Security** > **Open Windows Security** > **Device security** > **Core isolation** > **Firmware protection**. -![Secure Launch Security App](images/secure-launch-security-app.png) +![Windows Security Center](images/secure-launch-security-app.png) ### Registry @@ -55,12 +55,69 @@ Click **Start** > **Settings** > **Update & Security** > **Windows Security** > To verify that Secure Launch is running, use System Information (MSInfo32). Click **Start**, search for **System Information**, and look under **Virtualization-based Security Services Running** and **Virtualization-based Security Services Configured**. -![Secure Launch Security App](images/secure-launch-msinfo.png) +![Windows Security Center](images/secure-launch-msinfo.png) +>[!NOTE] +>To enable System Guard Secure launch, the platform must meet all the baseline requirements for [Device Guard](https://docs.microsoft.com/en-us/windows/security/threat-protection/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control), [Credential Guard](https://docs.microsoft.com/en-us/windows/security/identity-protection/credential-guard/credential-guard-requirements), and [Virtualization Based Security](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity). +## For Intel® vPro™ processors starting with Intel® Coffeelake, Whiskeylake, or later silicon requirements +Your environment needs the following hardware to run System Guard Secure Launch. +|Intel® Hardware requirement|Description| +|--------|-----------| +|64-bit CPU|A 64-bit computer with minimum 4 cores (logical processors) is required for hypervisor and virtualization-based security (VBS). For more info about Hyper-V, see [Hyper-V on Windows Server 2016](https://docs.microsoft.com/windows-server/virtualization/hyper-v/hyper-v-on-windows-server) or [Introduction to Hyper-V on Windows 10](https://docs.microsoft.com/virtualization/hyper-v-on-windows/about/). For more info about hypervisor, see [Hypervisor Specifications](https://docs.microsoft.com/virtualization/hyper-v-on-windows/reference/tlfs).| +|Trusted Platform Module (TPM) 2.0|Platforms must support a discrete TPM 2.0. Integrated/firmware TPMs are not supported.| +|Windows DMA Protection|Platforms must meet the Windows DMA Protection Specification (all external DMA ports must be off by default until the OS explicitly powers them)| +|SMM communication buffers| All SMM communication buffers must be implemented in EfiRuntimeServicesData ,EfiRuntimeServicesCode , EfiACPIMemoryNVS, or EfiReservedMemoryType memory types. | +|SMM Page Tables| Must NOT contain any mappings to EfiConventionalMemory (e.g. no OS/VMM owned memory),
NOT contain any mappings to code sections within EfiRuntimeServicesCode,
NOT have execute and write permissions for the same page
Platforms must allow ONLY that TSEG pages can be marked executable and the memory map must report TSEG EfiReservedMemoryType
BIOS SMI handler must be implemented such that SMM page tables are locked on every SMM entry | +|Modern/Connected Standby|Platforms must support Modern/Connected Standby| +|TPM AUX Index|Platform must set up a AUX index with index, attributes, and policy that exactly corresponds to the AUX index specified in the TXT DG with a data size of exactly 104 bytes (for SHA256 AUX data). (NameAlg = SHA256) +Platforms must set up a PS (Platform Supplier) index with:
+Exactly the “TXT PS2” style Attributes on creation as follows:
+AuthWrite
+PolicyDelete
+WriteLocked
+ +WriteDefine
+ +AuthRead
+ +NoDa
+ +Written
+ +PlatformCreate
+ +A policy of exactly PolicyCommandCode(CC = TPM2_CC_UndefineSpaceSpecial) (SHA256 NameAlg and Policy)
+ +Size of exactly 70 bytes
+ +NameAlg = SHA256
+ +In addition, it must have been initialized and locked (TPMA_NV_WRITTEN = 1, TPMA_NV_WRITELOCKED = 1) at time of OS launch. + +PS index data DataRevocationCounters, SINITMinVersion, and PolicyControl must all be 0x00 | +|AUX Policy|The required AUX policy must be as follows:
A = TPM2_PolicyLocality (Locality 3 & Locality 4)
+ +B = TPM2_PolicyCommandCode (TPM_CC_NV_UndefineSpecial)
+ +authPolicy = {A} OR {{A} AND {B}}
+ +authPolicy digest = 0xef, 0x9a, 0x26, 0xfc, 0x22, 0xd1, 0xae, 0x8c, 0xec, 0xff, 0x59, 0xe9, 0x48, 0x1a, 0xc1, 0xec, 0x53, 0x3d, 0xbe, 0x22, 0x8b, 0xec, 0x6d, 0x17, 0x93, 0x0f, 0x4c, 0xb2, 0xcc, 0x5b, 0x97, 0x24 | +|Platform firmware|Platform firmware must carry all code required to execute an Intel® Trusted Execution Technology secure launch:
+ +Intel SINIT ACM must be carried in the OEM BIOS
+ +Platforms must ship with a production ACM signed by the correct production Intel ACM signer for the platform | +|System firmware update|System firmware is recommended to be updated via UpdateCapsule in Windows Update | +## Software requirements +Your environment needs the following software to run Windows Defender Application Guard. + +|Software|Description| +|--------|-----------| +|Operating system|Windows 10 Enterprise edition, version 1709 or higher
Windows 10 Professional edition, version 1803| \ No newline at end of file From bf8dfaaf4bd5f60d2fc5fef1673ce047b1cb5d85 Mon Sep 17 00:00:00 2001 From: Alexander Dale Date: Wed, 20 Feb 2019 11:02:28 -0800 Subject: [PATCH 52/76] Fix table a bit --- ...-guard-secure-launch-and-smm-protection.md | 56 +++---------------- 1 file changed, 8 insertions(+), 48 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md b/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md index 1bcaf4a60e..ae8ce4ba94 100644 --- a/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md +++ b/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md @@ -60,61 +60,21 @@ To verify that Secure Launch is running, use System Information (MSInfo32). Clic >[!NOTE] >To enable System Guard Secure launch, the platform must meet all the baseline requirements for [Device Guard](https://docs.microsoft.com/en-us/windows/security/threat-protection/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control), [Credential Guard](https://docs.microsoft.com/en-us/windows/security/identity-protection/credential-guard/credential-guard-requirements), and [Virtualization Based Security](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity). -## For Intel® vPro™ processors starting with Intel® Coffeelake, Whiskeylake, or later silicon requirements +## Requirements Your environment needs the following hardware to run System Guard Secure Launch. -|Intel® Hardware requirement|Description| +|For Intel® vPro™ processors starting with Intel® Coffeelake, Whiskeylake, or later silicon requirements|Description| |--------|-----------| |64-bit CPU|A 64-bit computer with minimum 4 cores (logical processors) is required for hypervisor and virtualization-based security (VBS). For more info about Hyper-V, see [Hyper-V on Windows Server 2016](https://docs.microsoft.com/windows-server/virtualization/hyper-v/hyper-v-on-windows-server) or [Introduction to Hyper-V on Windows 10](https://docs.microsoft.com/virtualization/hyper-v-on-windows/about/). For more info about hypervisor, see [Hypervisor Specifications](https://docs.microsoft.com/virtualization/hyper-v-on-windows/reference/tlfs).| |Trusted Platform Module (TPM) 2.0|Platforms must support a discrete TPM 2.0. Integrated/firmware TPMs are not supported.| |Windows DMA Protection|Platforms must meet the Windows DMA Protection Specification (all external DMA ports must be off by default until the OS explicitly powers them)| |SMM communication buffers| All SMM communication buffers must be implemented in EfiRuntimeServicesData ,EfiRuntimeServicesCode , EfiACPIMemoryNVS, or EfiReservedMemoryType memory types. | -|SMM Page Tables| Must NOT contain any mappings to EfiConventionalMemory (e.g. no OS/VMM owned memory),
NOT contain any mappings to code sections within EfiRuntimeServicesCode,
NOT have execute and write permissions for the same page
Platforms must allow ONLY that TSEG pages can be marked executable and the memory map must report TSEG EfiReservedMemoryType
BIOS SMI handler must be implemented such that SMM page tables are locked on every SMM entry | -|Modern/Connected Standby|Platforms must support Modern/Connected Standby| -|TPM AUX Index|Platform must set up a AUX index with index, attributes, and policy that exactly corresponds to the AUX index specified in the TXT DG with a data size of exactly 104 bytes (for SHA256 AUX data). (NameAlg = SHA256) - -Platforms must set up a PS (Platform Supplier) index with:
- -Exactly the “TXT PS2” style Attributes on creation as follows:
- -AuthWrite
- -PolicyDelete
- -WriteLocked
- -WriteDefine
- -AuthRead
- -NoDa
- -Written
- -PlatformCreate
- -A policy of exactly PolicyCommandCode(CC = TPM2_CC_UndefineSpaceSpecial) (SHA256 NameAlg and Policy)
- -Size of exactly 70 bytes
- -NameAlg = SHA256
- -In addition, it must have been initialized and locked (TPMA_NV_WRITTEN = 1, TPMA_NV_WRITELOCKED = 1) at time of OS launch. - -PS index data DataRevocationCounters, SINITMinVersion, and PolicyControl must all be 0x00 | -|AUX Policy|The required AUX policy must be as follows:
A = TPM2_PolicyLocality (Locality 3 & Locality 4)
- -B = TPM2_PolicyCommandCode (TPM_CC_NV_UndefineSpecial)
- -authPolicy = {A} OR {{A} AND {B}}
- -authPolicy digest = 0xef, 0x9a, 0x26, 0xfc, 0x22, 0xd1, 0xae, 0x8c, 0xec, 0xff, 0x59, 0xe9, 0x48, 0x1a, 0xc1, 0xec, 0x53, 0x3d, 0xbe, 0x22, 0x8b, 0xec, 0x6d, 0x17, 0x93, 0x0f, 0x4c, 0xb2, 0xcc, 0x5b, 0x97, 0x24 | -|Platform firmware|Platform firmware must carry all code required to execute an Intel® Trusted Execution Technology secure launch:
- -Intel SINIT ACM must be carried in the OEM BIOS
- -Platforms must ship with a production ACM signed by the correct production Intel ACM signer for the platform | -|System firmware update|System firmware is recommended to be updated via UpdateCapsule in Windows Update | +|SMM Page Tables| Must NOT contain any mappings to EfiConventionalMemory (e.g. no OS/VMM owned memory).
Must NOT contain any mappings to code sections within EfiRuntimeServicesCode.
Must NOT have execute and write permissions for the same page
Must allow ONLY that TSEG pages can be marked executable and the memory map must report TSEG EfiReservedMemoryType.
BIOS SMI handler must be implemented such that SMM page tables are locked on every SMM entry. | +|Modern/Connected Standby|Platforms must support Modern/Connected Standby.| +|TPM AUX Index|Platform must set up a AUX index with index, attributes, and policy that exactly corresponds to the AUX index specified in the TXT DG with a data size of exactly 104 bytes (for SHA256 AUX data). (NameAlg = SHA256)
Platforms must set up a PS (Platform Supplier) index with:

PS index data DataRevocationCounters, SINITMinVersion, and PolicyControl must all be 0x00 | +|AUX Policy|The required AUX policy must be as follows:
  • A = TPM2_PolicyLocality (Locality 3 & Locality 4)
  • B = TPM2_PolicyCommandCode (TPM_CC_NV_UndefineSpecial)
  • authPolicy = {A} OR {{A} AND {B}}
  • authPolicy digest = 0xef, 0x9a, 0x26, 0xfc, 0x22, 0xd1, 0xae, 0x8c, 0xec, 0xff, 0x59, 0xe9, 0x48, 0x1a, 0xc1, 0xec, 0x53, 0x3d, 0xbe, 0x22, 0x8b, 0xec, 0x6d, 0x17, 0x93, 0x0f, 0x4c, 0xb2, 0xcc, 0x5b, 0x97, 0x24
| +|Platform firmware|Platform firmware must carry all code required to execute an Intel® Trusted Execution Technology secure launch:
  • Intel SINIT ACM must be carried in the OEM BIOS
  • Platforms must ship with a production ACM signed by the correct production Intel ACM signer for the platform
| +|System firmware update|System firmware is recommended to be updated via UpdateCapsule in Windows Update. | ## Software requirements Your environment needs the following software to run Windows Defender Application Guard. From 9e5b72e986dcfee005edba5f5b30e0ddf80b363f Mon Sep 17 00:00:00 2001 From: Alexander Dale Date: Wed, 20 Feb 2019 13:26:07 -0800 Subject: [PATCH 53/76] Fix table --- ...-guard-secure-launch-and-smm-protection.md | 20 ++++++++++--------- 1 file changed, 11 insertions(+), 9 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md b/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md index ae8ce4ba94..f261ef363b 100644 --- a/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md +++ b/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md @@ -63,21 +63,23 @@ To verify that Secure Launch is running, use System Information (MSInfo32). Clic ## Requirements Your environment needs the following hardware to run System Guard Secure Launch. -|For Intel® vPro™ processors starting with Intel® Coffeelake, Whiskeylake, or later silicon requirements|Description| +|For Intel® vPro™ processors starting with Intel® Coffeelake, Whiskeylake, or later silicon requirements|Description| |--------|-----------| |64-bit CPU|A 64-bit computer with minimum 4 cores (logical processors) is required for hypervisor and virtualization-based security (VBS). For more info about Hyper-V, see [Hyper-V on Windows Server 2016](https://docs.microsoft.com/windows-server/virtualization/hyper-v/hyper-v-on-windows-server) or [Introduction to Hyper-V on Windows 10](https://docs.microsoft.com/virtualization/hyper-v-on-windows/about/). For more info about hypervisor, see [Hypervisor Specifications](https://docs.microsoft.com/virtualization/hyper-v-on-windows/reference/tlfs).| |Trusted Platform Module (TPM) 2.0|Platforms must support a discrete TPM 2.0. Integrated/firmware TPMs are not supported.| -|Windows DMA Protection|Platforms must meet the Windows DMA Protection Specification (all external DMA ports must be off by default until the OS explicitly powers them)| +|Windows DMA Protection|Platforms must meet the Windows DMA Protection Specification (all external DMA ports must be off by default until the OS explicitly powers them).| |SMM communication buffers| All SMM communication buffers must be implemented in EfiRuntimeServicesData ,EfiRuntimeServicesCode , EfiACPIMemoryNVS, or EfiReservedMemoryType memory types. | |SMM Page Tables| Must NOT contain any mappings to EfiConventionalMemory (e.g. no OS/VMM owned memory).
Must NOT contain any mappings to code sections within EfiRuntimeServicesCode.
Must NOT have execute and write permissions for the same page
Must allow ONLY that TSEG pages can be marked executable and the memory map must report TSEG EfiReservedMemoryType.
BIOS SMI handler must be implemented such that SMM page tables are locked on every SMM entry. | |Modern/Connected Standby|Platforms must support Modern/Connected Standby.| -|TPM AUX Index|Platform must set up a AUX index with index, attributes, and policy that exactly corresponds to the AUX index specified in the TXT DG with a data size of exactly 104 bytes (for SHA256 AUX data). (NameAlg = SHA256)
Platforms must set up a PS (Platform Supplier) index with:
  • Exactly the “TXT PS2” style Attributes on creation as follows:
    • AuthWrite
    • PolicyDelete
    • WriteLocked
    • WriteDefine
    • AuthRead
    • WriteDefine
    • NoDa
    • Written
    • PlatformCreate
  • A policy of exactly PolicyCommandCode(CC = TPM2_CC_UndefineSpaceSpecial) (SHA256 NameAlg and Policy)
  • Size of exactly 70 bytes
  • NameAlg = SHA256
  • In addition, it must have been initialized and locked (TPMA_NV_WRITTEN = 1, TPMA_NV_WRITELOCKED = 1) at time of OS launch.
PS index data DataRevocationCounters, SINITMinVersion, and PolicyControl must all be 0x00 | +|TPM AUX Index|Platform must set up a AUX index with index, attributes, and policy that exactly corresponds to the AUX index specified in the TXT DG with a data size of exactly 104 bytes (for SHA256 AUX data). (NameAlg = SHA256)
Platforms must set up a PS (Platform Supplier) index with:
  • Exactly the "TXT PS2" style Attributes on creation as follows:
    • AuthWrite
    • PolicyDelete
    • WriteLocked
    • WriteDefine
    • AuthRead
    • WriteDefine
    • NoDa
    • Written
    • PlatformCreate
  • A policy of exactly PolicyCommandCode(CC = TPM2_CC_UndefineSpaceSpecial) (SHA256 NameAlg and Policy)
  • Size of exactly 70 bytes
  • NameAlg = SHA256
  • In addition, it must have been initialized and locked (TPMA_NV_WRITTEN = 1, TPMA_NV_WRITELOCKED = 1) at time of OS launch.
PS index data DataRevocationCounters, SINITMinVersion, and PolicyControl must all be 0x00 | |AUX Policy|The required AUX policy must be as follows:
  • A = TPM2_PolicyLocality (Locality 3 & Locality 4)
  • B = TPM2_PolicyCommandCode (TPM_CC_NV_UndefineSpecial)
  • authPolicy = {A} OR {{A} AND {B}}
  • authPolicy digest = 0xef, 0x9a, 0x26, 0xfc, 0x22, 0xd1, 0xae, 0x8c, 0xec, 0xff, 0x59, 0xe9, 0x48, 0x1a, 0xc1, 0xec, 0x53, 0x3d, 0xbe, 0x22, 0x8b, 0xec, 0x6d, 0x17, 0x93, 0x0f, 0x4c, 0xb2, 0xcc, 0x5b, 0x97, 0x24
| -|Platform firmware|Platform firmware must carry all code required to execute an Intel® Trusted Execution Technology secure launch:
  • Intel SINIT ACM must be carried in the OEM BIOS
  • Platforms must ship with a production ACM signed by the correct production Intel ACM signer for the platform
| -|System firmware update|System firmware is recommended to be updated via UpdateCapsule in Windows Update. | -## Software requirements -Your environment needs the following software to run Windows Defender Application Guard. +|Platform firmware|Platform firmware must carry all code required to execute an Intel® Trusted Execution Technology secure launch:
  • Intel® SINIT ACM must be carried in the OEM BIOS
  • Platforms must ship with a production ACM signed by the correct production Intel® ACM signer for the platform
| +|Platform firmware update|System firmware is recommended to be updated via UpdateCapsule in Windows Update. | -|Software|Description| +|For Qualcomm® processors with SD850 or later chipsets|Description| |--------|-----------| -|Operating system|Windows 10 Enterprise edition, version 1709 or higher
Windows 10 Professional edition, version 1803| \ No newline at end of file +|Monitor Mode Communication|All Monitor Mode communication buffers must be implemented in either EfiRuntimeServicesData (recommended), data sections of EfiRuntimeServicesCode as described by the Memory Attributes Table, EfiACPIMemoryNVS, or EfiReservedMemoryType memory types| +|Monitor Mode Page Tables|All Monitor Mode page tables must:
  • NOT contain any mappings to EfiConventionalMemory (e.g. no OS/VMM owned memory)
  • They must NOT have execute and write permissions for the same page
  • Platforms must only allow Monitor Mode pages marked as executable
  • The memory map must report Monitor Mode as EfiReservedMemoryType
  • Platforms must provide mechanism to protect the Monitor Mode page tables from modification
| +|Modern/Connected Standby|Platforms must support Modern/Connected Standby.| +|Platform firmware|Platform firmware must carry all code required to perform a launch.| +|Platform firmware update|System firmware is recommended to be updated via UpdateCapsule in Windows Update. | From 839587b9f09faa92e140fdc34a55122611839cc0 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Dani=20Halfin=20=F0=9F=93=AC=F0=9F=94=A8?= Date: Wed, 20 Feb 2019 21:47:38 +0000 Subject: [PATCH 54/76] Merged PR 14393: Fixing breadcrumbs for KI --- windows/hub/breadcrumb/toc.yml | 3 +++ 1 file changed, 3 insertions(+) diff --git a/windows/hub/breadcrumb/toc.yml b/windows/hub/breadcrumb/toc.yml index dd69dd086f..4539d3b751 100644 --- a/windows/hub/breadcrumb/toc.yml +++ b/windows/hub/breadcrumb/toc.yml @@ -25,6 +25,9 @@ - name: Mobile Device Management tocHref: /windows/client-management/mdm/ topicHref: /windows/client-management/mdm/index + - name: Known issues + tocHref: /windows/known-issues/ + topicHref: /windows/known-issues/index - name: Privacy tocHref: /windows/privacy/ topicHref: /windows/privacy/index From a5fe41f3bc0120518eed39e86d3b278da19e5576 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Wed, 20 Feb 2019 17:13:45 -0800 Subject: [PATCH 55/76] Update deploy-the-latest-firmware-and-drivers-for-surface-devices.md added surface go with lte and formatting changes --- ...irmware-and-drivers-for-surface-devices.md | 22 ++++++++++--------- 1 file changed, 12 insertions(+), 10 deletions(-) diff --git a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md index 1d736b1ece..9ef498cb51 100644 --- a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md +++ b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md @@ -27,31 +27,33 @@ Driver and firmware updates for Surface devices are **cumulative updates** which Installation files for administrative tools, drivers for accessories, and updates for Windows are also available for some devices and are detailed here in this article. >[!NOTE] ->To simplify the process of locating drivers for your device, downloads for Surface devices have been reorganized to separate pages for each model. Bookmark the Microsoft Download Center page for your device from the links provided on this page. Many of the filenames contain a placeholder denoted with *xxxxxx*, which identifies the current version number or date of the file. +>Many of the filenames contain a placeholder denoted with *xxxxxx*, which identifies the current version number or date of the file.   -Recent additions to the downloads for Surface devices provide you with options to install Windows 10 on your Surface devices and update LTE devices with the latest Windows 10 drivers and firmware. - - - >[!NOTE] >A battery charge of 40% or greater is required before you install firmware to a Surface device. See [Microsoft Support article KB2909710](https://go.microsoft.com/fwlink/p/?LinkId=618106) for more information. ## Surface Laptop 2 Download the following updates for [Surface Laptop 2 from the Microsoft Download Center](https://www.microsoft.com/en-us/download/details.aspx?id=57515). -* SurfaceLaptop2_Win10_XXXXX_XXXXXXX_X.msi – Cumulative firmware and driver update package for Windows 10 +* SurfaceLaptop2_Win10_xxxxx_xxxxxxx_x.msi – Cumulative firmware and driver update package for Windows 10 ## Surface Pro 6 Download the following updates for [Surface Pro 6 from the Microsoft Download Center](https://www.microsoft.com/en-us/download/details.aspx?id=57514). -* SurfacePro6_Win10_XXXXX_XXXXXXX_X.msi – Cumulative firmware and driver update package for Windows 10 +* SurfacePro6_Win10_xxxxx_xxxxxxx_x.msi – Cumulative firmware and driver update package for Windows 10 -## Surface GO +## Surface Go Download the following updates for [Surface GO from the Microsoft Download Center](https://www.microsoft.com/en-us/download/details.aspx?id=57439). -* SurfaceGO_Win10_17134_1802010_6.msi - Cumulative firmware and driver update package for Windows 10 +* SurfaceGO_Win10_xxxxx_xxxxxxx_x.msi - Cumulative firmware and driver update package for Windows 10 + +## Surface Go with LTE Advanced + +Download the following updates for [Surface GO with LTE Advanced from the Microsoft Download Center](https://www.microsoft.com/en-us/download/details.aspx?id=57601). + +* SurfaceGo_Win10_xxxxx_xxxxxxx_LTE_1.msi - Cumulative firmware and driver update package for Windows 10 including optional WinTab drivers. ## Surface Book 2 @@ -79,7 +81,7 @@ Download the following updates for [Surface Pro with LTE Advanced from the Micro Download the following updates for [Surface Pro 6 from the Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=57514). -* SurfacePro6_Win10_17134_xxxxx_xxxxxx.msi +* SurfacePro6_Win10_xxxxx_xxxxxxx_x.msi ## Surface Studio From 46cb46ccdbb0ad169d38c912c9b2cc3d8c774bdd Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Wed, 20 Feb 2019 17:36:52 -0800 Subject: [PATCH 56/76] Update deploy-the-latest-firmware-and-drivers-for-surface-devices.md combined notes --- ...y-the-latest-firmware-and-drivers-for-surface-devices.md | 6 +----- 1 file changed, 1 insertion(+), 5 deletions(-) diff --git a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md index 9ef498cb51..94d8bd322d 100644 --- a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md +++ b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md @@ -27,11 +27,7 @@ Driver and firmware updates for Surface devices are **cumulative updates** which Installation files for administrative tools, drivers for accessories, and updates for Windows are also available for some devices and are detailed here in this article. >[!NOTE] ->Many of the filenames contain a placeholder denoted with *xxxxxx*, which identifies the current version number or date of the file. -  - ->[!NOTE] ->A battery charge of 40% or greater is required before you install firmware to a Surface device. See [Microsoft Support article KB2909710](https://go.microsoft.com/fwlink/p/?LinkId=618106) for more information. +>Many of the filenames contain a placeholder denoted with *xxxxxx*, which identifies the current version number or date of the file. A battery charge of 40 percent or greater is required before you install firmware to a Surface device. See [Microsoft Support article KB2909710](https://go.microsoft.com/fwlink/p/?LinkId=618106) for more information. ## Surface Laptop 2 From f83f6e19fd5096c576ac8ce851837ec1453ec120 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Wed, 20 Feb 2019 17:38:52 -0800 Subject: [PATCH 57/76] Update deploy-the-latest-firmware-and-drivers-for-surface-devices.md --- ...loy-the-latest-firmware-and-drivers-for-surface-devices.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md index 94d8bd322d..45c5f0afc6 100644 --- a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md +++ b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md @@ -42,12 +42,12 @@ Download the following updates for [Surface Pro 6 from the Microsoft Download Ce ## Surface Go -Download the following updates for [Surface GO from the Microsoft Download Center](https://www.microsoft.com/en-us/download/details.aspx?id=57439). +Download the following updates for [Surface Go from the Microsoft Download Center](https://www.microsoft.com/en-us/download/details.aspx?id=57439). * SurfaceGO_Win10_xxxxx_xxxxxxx_x.msi - Cumulative firmware and driver update package for Windows 10 ## Surface Go with LTE Advanced -Download the following updates for [Surface GO with LTE Advanced from the Microsoft Download Center](https://www.microsoft.com/en-us/download/details.aspx?id=57601). +Download the following updates for [Surface Go with LTE Advanced from the Microsoft Download Center](https://www.microsoft.com/en-us/download/details.aspx?id=57601). * SurfaceGo_Win10_xxxxx_xxxxxxx_LTE_1.msi - Cumulative firmware and driver update package for Windows 10 including optional WinTab drivers. From 75a32b9cca65e9bbd596db10bf088fac3a774590 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Wed, 20 Feb 2019 17:45:40 -0800 Subject: [PATCH 58/76] Update deploy-the-latest-firmware-and-drivers-for-surface-devices.md --- ...eploy-the-latest-firmware-and-drivers-for-surface-devices.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md index 45c5f0afc6..0ef51f7bc4 100644 --- a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md +++ b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md @@ -27,7 +27,7 @@ Driver and firmware updates for Surface devices are **cumulative updates** which Installation files for administrative tools, drivers for accessories, and updates for Windows are also available for some devices and are detailed here in this article. >[!NOTE] ->Many of the filenames contain a placeholder denoted with *xxxxxx*, which identifies the current version number or date of the file. A battery charge of 40 percent or greater is required before you install firmware to a Surface device. See [Microsoft Support article KB2909710](https://go.microsoft.com/fwlink/p/?LinkId=618106) for more information. +>Many of the filenames contain a placeholder denoted with *xxxxxx*, representing the latest version number listed in the Microsoft Download Center. A battery charge of 40 percent or greater is required before you install firmware to a Surface device. See [Microsoft Support article KB2909710](https://go.microsoft.com/fwlink/p/?LinkId=618106) for more information. ## Surface Laptop 2 From f71b7461ae79936ccc08d206a0c5a1eba29fc6b7 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Wed, 20 Feb 2019 17:52:17 -0800 Subject: [PATCH 59/76] Update deploy-the-latest-firmware-and-drivers-for-surface-devices.md minor edits --- ...eploy-the-latest-firmware-and-drivers-for-surface-devices.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md index 0ef51f7bc4..88eed714d0 100644 --- a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md +++ b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md @@ -18,7 +18,7 @@ ms.topic: article This article provides a list of the available downloads for Surface devices and links to download the drivers and firmware for your device. -As easy as it is to keep Surface device drivers and firmware up to date automatically with Windows Update, it is sometimes necessary to download and install updates manually, such as during a Windows deployment. For any situation where you need to install drivers and firmware separately from Windows Update, you can find the files available for download at the Microsoft Download Center. +Although Surface devices are typically updated with the latest device drivers and firmware via Windows Update, sometimes it's necessary to download and install updates manually, such as during a Windows deployment. If you need to install drivers and firmware separately from Windows Update, you can find the files available for download at the Microsoft Download Center. On the Microsoft Download Center page for your device, you will find several files available. These files allow you to deploy drivers and firmware in various ways. You can read more about the different deployment methods for Surface drivers and firmware in [Manage Surface driver and firmware updates](manage-surface-pro-3-firmware-updates.md). From 95c3adc83a549b291af34066d45dd6a32bcf413c Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Wed, 20 Feb 2019 17:53:33 -0800 Subject: [PATCH 60/76] Update deploy-the-latest-firmware-and-drivers-for-surface-devices.md --- ...eploy-the-latest-firmware-and-drivers-for-surface-devices.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md index 88eed714d0..07dcf17f0f 100644 --- a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md +++ b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md @@ -18,7 +18,7 @@ ms.topic: article This article provides a list of the available downloads for Surface devices and links to download the drivers and firmware for your device. -Although Surface devices are typically updated with the latest device drivers and firmware via Windows Update, sometimes it's necessary to download and install updates manually, such as during a Windows deployment. If you need to install drivers and firmware separately from Windows Update, you can find the files available for download at the Microsoft Download Center. +Although Surface devices are typically updated with the latest device drivers and firmware via Windows Update, sometimes it's necessary to download and install updates manually, such as during a Windows deployment. If you need to install drivers and firmware separately from Windows Update, you can find the requisite files on the Microsoft Download Center. On the Microsoft Download Center page for your device, you will find several files available. These files allow you to deploy drivers and firmware in various ways. You can read more about the different deployment methods for Surface drivers and firmware in [Manage Surface driver and firmware updates](manage-surface-pro-3-firmware-updates.md). From 8826a9266826d221cc13145be1782fb9a1290e67 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Wed, 20 Feb 2019 19:31:32 -0800 Subject: [PATCH 61/76] Update deploy-the-latest-firmware-and-drivers-for-surface-devices.md --- ...eploy-the-latest-firmware-and-drivers-for-surface-devices.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md index 07dcf17f0f..7f519a64e2 100644 --- a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md +++ b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md @@ -18,7 +18,7 @@ ms.topic: article This article provides a list of the available downloads for Surface devices and links to download the drivers and firmware for your device. -Although Surface devices are typically updated with the latest device drivers and firmware via Windows Update, sometimes it's necessary to download and install updates manually, such as during a Windows deployment. If you need to install drivers and firmware separately from Windows Update, you can find the requisite files on the Microsoft Download Center. +Although Surface devices are typically automatically updated with the latest device drivers and firmware via Windows Update, sometimes it's necessary to download and install updates manually, such as during a Windows deployment. If you need to install drivers and firmware separately from Windows Update, you can find the requisite files on the Microsoft Download Center. On the Microsoft Download Center page for your device, you will find several files available. These files allow you to deploy drivers and firmware in various ways. You can read more about the different deployment methods for Surface drivers and firmware in [Manage Surface driver and firmware updates](manage-surface-pro-3-firmware-updates.md). From c3ae78127b7f707ea2f711f1d9546bb883015195 Mon Sep 17 00:00:00 2001 From: andreiztm Date: Thu, 21 Feb 2019 09:40:30 +0200 Subject: [PATCH 62/76] Adding missing tags and older article that wasn't listed --- windows/deployment/update/windows-as-a-service.md | 14 ++++++++------ 1 file changed, 8 insertions(+), 6 deletions(-) diff --git a/windows/deployment/update/windows-as-a-service.md b/windows/deployment/update/windows-as-a-service.md index 25472e32ba..ad022440c3 100644 --- a/windows/deployment/update/windows-as-a-service.md +++ b/windows/deployment/update/windows-as-a-service.md @@ -42,13 +42,15 @@ The latest news:
  • Helping customers shift to a modern desktop - September 6, 2018
  • Windows Update for Business & Windows Analytics: a real-world experience - September 5, 2018
  • -
  • What's next for Windows 10 and Windows Server quality updates - August 16, 2018 +
  • What's next for Windows 10 and Windows Server quality updates - August 16, 2018
  • Windows 10 monthly updates - August 1, 2018 (**video**)
  • -
  • Windows 10 update servicing cadence - August 1, 2018 -
  • Windows 10 quality updates explained and the end of delta updates - July 11, 2018 -
  • AI Powers Windows 10 April 2018 Update Rollout - June 14, 2018 -
  • Windows Server 2008 SP2 Servicing Changes - June 12, 2018 -
  • Windows Update for Business - Enhancements, diagnostics, configuration - June 7, 2018 +
  • Windows 10 update servicing cadence - August 1, 2018
  • +
  • Windows 10 quality updates explained and the end of delta updates - July 11, 2018
  • +
  • AI Powers Windows 10 April 2018 Update Rollout - June 14, 2018
  • +
  • Windows Server 2008 SP2 Servicing Changes - June 12, 2018
  • +
  • Windows Update for Business - Enhancements, diagnostics, configuration - June 7, 2018
  • +
  • Windows 10 and the “disappearing” SAC-T - May 31, 2018
  • + [See more news](waas-morenews.md). You can also check out the [Windows 10 blog](https://techcommunity.microsoft.com/t5/Windows-10-Blog/bg-p/Windows10Blog). From 4f9e2c248ba36d62c5025773d8ed21fef00d4ced Mon Sep 17 00:00:00 2001 From: Peter Lewis Date: Thu, 21 Feb 2019 11:53:01 +0000 Subject: [PATCH 63/76] Update blog URL Updated blog URL (https://aka.ms/blog/WindowsAnalytics) --- windows/deployment/upgrade/upgrade-readiness-get-started.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/upgrade/upgrade-readiness-get-started.md b/windows/deployment/upgrade/upgrade-readiness-get-started.md index af94500571..89b0ca53fe 100644 --- a/windows/deployment/upgrade/upgrade-readiness-get-started.md +++ b/windows/deployment/upgrade/upgrade-readiness-get-started.md @@ -22,7 +22,7 @@ You can use Upgrade Readiness to plan and manage your upgrade project end-to-end Before you begin, consider reviewing the following helpful information:
    - [Upgrade Readiness requirements](upgrade-readiness-requirements.md): Provides detailed requirements to use Upgrade Readiness.
    - - [Upgrade Readiness blog](https://blogs.technet.microsoft.com/UpgradeAnalytics): Contains announcements of new features and provides helpful tips for using Upgrade Readiness. + - [Upgrade Readiness blog](https://aka.ms/blog/WindowsAnalytics): Contains announcements of new features and provides helpful tips for using Upgrade Readiness. >If you are using System Center Configuration Manager, also check out information about how to integrate Upgrade Readiness with Configuration Manager: [Integrate Upgrade Readiness with System Center Configuration Manager](https://docs.microsoft.com/sccm/core/clients/manage/upgrade/upgrade-analytics). From 7b88c32f0ceadc7ede7d633abd7cc49f10ae2c0f Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Dani=20Halfin=20=F0=9F=93=AC=F0=9F=94=A8?= Date: Thu, 21 Feb 2019 13:50:19 +0000 Subject: [PATCH 64/76] Merged PR 14401: Fixing metadata I know it's a lot of files, but I'm fixing metadata on all my content --- .../windows-autopilot/rip-and-replace.md | 36 +- .../privacy/Microsoft-DiagnosticDataViewer.md | 370 +++++++++--------- ...ndows-diagnostic-events-and-fields-1703.md | 4 + ...ndows-diagnostic-events-and-fields-1709.md | 4 + ...ndows-diagnostic-events-and-fields-1803.md | 4 + ...ndows-diagnostic-events-and-fields-1809.md | 4 + ...ws-diagnostic-data-in-your-organization.md | 7 +- .../diagnostic-data-viewer-overview.md | 8 +- ...ata-windows-analytics-events-and-fields.md | 8 +- windows/privacy/gdpr-it-guidance.md | 4 + windows/privacy/gdpr-win10-whitepaper.md | 4 + windows/privacy/index.yml | 8 +- ...-windows-diagnostic-data-for-powershell.md | 4 + ...system-components-to-microsoft-services.md | 4 + .../privacy/manage-windows-1709-endpoints.md | 4 + .../privacy/manage-windows-1803-endpoints.md | 4 + .../privacy/manage-windows-1809-endpoints.md | 4 + .../privacy/windows-diagnostic-data-1703.md | 8 +- windows/privacy/windows-diagnostic-data.md | 8 +- ...-endpoints-1709-non-enterprise-editions.md | 4 + ...-endpoints-1803-non-enterprise-editions.md | 4 + ...-endpoints-1809-non-enterprise-editions.md | 4 + ...ws-personal-data-services-configuration.md | 4 + .../access-control/access-control.md | 6 + .../active-directory-accounts.md | 6 + .../active-directory-security-groups.md | 6 + .../access-control/dynamic-access-control.md | 6 + .../access-control/local-accounts.md | 6 + .../access-control/microsoft-accounts.md | 6 + .../access-control/security-identifiers.md | 6 + .../access-control/security-principals.md | 6 + .../access-control/service-accounts.md | 6 + .../access-control/special-identities.md | 6 + .../change-history-for-access-protection.md | 7 +- .../identity-protection/configure-s-mime.md | 7 +- .../additional-mitigations.md | 7 +- .../credential-guard-considerations.md | 7 +- .../credential-guard-how-it-works.md | 7 +- .../credential-guard-known-issues.md | 7 +- .../credential-guard-manage.md | 7 +- ...redential-guard-not-protected-scenarios.md | 7 +- .../credential-guard-protection-limits.md | 7 +- .../credential-guard-requirements.md | 7 +- .../credential-guard-scripts.md | 7 +- .../credential-guard/credential-guard.md | 7 +- .../enterprise-certificate-pinning.md | 10 +- .../hello-for-business/WebAuthnAPIs.md | 6 +- .../feature-multifactor-unlock.md | 6 +- .../hello-adequate-domain-controllers.md | 6 +- .../hello-and-password-changes.md | 10 +- .../hello-biometrics-in-enterprise.md | 6 +- .../hello-cert-trust-adfs.md | 6 +- .../hello-cert-trust-deploy-mfa.md | 6 +- .../hello-cert-trust-policy-settings.md | 6 +- .../hello-cert-trust-validate-ad-prereq.md | 6 +- .../hello-cert-trust-validate-deploy-mfa.md | 6 +- .../hello-cert-trust-validate-pki.md | 6 +- .../hello-deployment-cert-trust.md | 20 +- .../hello-deployment-guide.md | 6 +- .../hello-deployment-key-trust.md | 6 +- .../hello-errors-during-pin-creation.md | 10 +- .../hello-for-business/hello-event-300.md | 10 +- .../hello-for-business/hello-faq.md | 6 +- .../hello-for-business/hello-features.md | 6 +- .../hello-how-it-works-authentication.md | 6 +- .../hello-how-it-works-device-registration.md | 6 +- .../hello-how-it-works-provisioning.md | 6 +- .../hello-how-it-works-tech-deep-dive.md | 6 +- .../hello-how-it-works-technology.md | 6 +- .../hello-for-business/hello-how-it-works.md | 6 +- .../hello-hybrid-aadj-sso-base.md | 6 +- .../hello-hybrid-aadj-sso-cert.md | 6 +- .../hello-hybrid-aadj-sso.md | 6 +- .../hello-hybrid-cert-new-install.md | 6 +- .../hello-hybrid-cert-trust-devreg.md | 6 +- .../hello-hybrid-cert-trust-prereqs.md | 6 +- .../hello-hybrid-cert-trust.md | 6 +- .../hello-hybrid-cert-whfb-provision.md | 6 +- .../hello-hybrid-cert-whfb-settings-ad.md | 6 +- .../hello-hybrid-cert-whfb-settings-adfs.md | 6 +- ...ello-hybrid-cert-whfb-settings-dir-sync.md | 6 +- .../hello-hybrid-cert-whfb-settings-pki.md | 6 +- .../hello-hybrid-cert-whfb-settings-policy.md | 6 +- .../hello-hybrid-cert-whfb-settings.md | 6 +- .../hello-hybrid-key-new-install.md | 6 +- .../hello-hybrid-key-trust-devreg.md | 6 +- .../hello-hybrid-key-trust-dirsync.md | 6 +- .../hello-hybrid-key-trust-prereqs.md | 6 +- .../hello-hybrid-key-trust.md | 6 +- .../hello-hybrid-key-whfb-provision.md | 6 +- .../hello-hybrid-key-whfb-settings-ad.md | 6 +- ...hello-hybrid-key-whfb-settings-dir-sync.md | 6 +- .../hello-hybrid-key-whfb-settings-pki.md | 6 +- .../hello-hybrid-key-whfb-settings-policy.md | 6 +- .../hello-hybrid-key-whfb-settings.md | 6 +- .../hello-identity-verification.md | 6 +- .../hello-key-trust-adfs.md | 6 +- .../hello-key-trust-deploy-mfa.md | 6 +- .../hello-key-trust-policy-settings.md | 6 +- .../hello-key-trust-validate-ad-prereq.md | 6 +- .../hello-key-trust-validate-deploy-mfa.md | 6 +- .../hello-key-trust-validate-pki.md | 6 +- .../hello-manage-in-organization.md | 10 +- .../hello-for-business/hello-overview.md | 6 +- .../hello-planning-guide.md | 6 +- .../hello-prepare-people-to-use.md | 6 +- .../hello-for-business/hello-videos.md | 6 +- .../hello-why-pin-is-better-than-password.md | 10 +- .../microsoft-compatible-security-key.md | 8 +- .../passwordless-strategy.md | 6 +- .../hello-for-business/reset-security-key.md | 8 +- windows/security/identity-protection/index.md | 7 +- ...gital-certificates-on-windows-10-mobile.md | 7 +- .../remote-credential-guard.md | 7 +- .../smart-card-and-remote-desktop-services.md | 7 +- .../smart-cards/smart-card-architecture.md | 7 +- ...rt-card-certificate-propagation-service.md | 7 +- ...ertificate-requirements-and-enumeration.md | 7 +- .../smart-card-debugging-information.md | 7 +- .../smart-cards/smart-card-events.md | 7 +- ...card-group-policy-and-registry-settings.md | 7 +- ...how-smart-card-sign-in-works-in-windows.md | 7 +- .../smart-card-removal-policy-service.md | 7 +- ...rt-card-smart-cards-for-windows-service.md | 7 +- .../smart-card-tools-and-settings.md | 7 +- ...-windows-smart-card-technical-reference.md | 7 +- .../how-user-account-control-works.md | 7 +- ...-group-policy-and-registry-key-settings.md | 7 +- .../user-account-control-overview.md | 7 +- ...ccount-control-security-policy-settings.md | 7 +- ...l-smart-card-deploy-virtual-smart-cards.md | 7 +- .../virtual-smart-card-evaluate-security.md | 7 +- .../virtual-smart-card-get-started.md | 7 +- .../virtual-smart-card-overview.md | 7 +- .../virtual-smart-card-tpmvscmgr.md | 7 +- ...smart-card-understanding-and-evaluating.md | 7 +- ...tual-smart-card-use-virtual-smart-cards.md | 7 +- ...dential-theft-mitigation-guide-abstract.md | 7 +- 138 files changed, 941 insertions(+), 343 deletions(-) diff --git a/windows/deployment/windows-autopilot/rip-and-replace.md b/windows/deployment/windows-autopilot/rip-and-replace.md index b75fced878..92c1d57447 100644 --- a/windows/deployment/windows-autopilot/rip-and-replace.md +++ b/windows/deployment/windows-autopilot/rip-and-replace.md @@ -1,19 +1,19 @@ ---- -title: Rip and Replace -description: Listing of Autopilot scenarios -keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune -ms.prod: w10 -ms.mktglfcycl: deploy -ms.localizationpriority: high -ms.sitesec: library -ms.pagetype: deploy -author: coreyp-at-msft -ms.author: coreyp -ms.date: 06/01/2018 ---- - -# Rip and replace - -**Applies to: Windows 10** - +--- +title: Rip and Replace +description: Listing of Autopilot scenarios +keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune +ms.prod: w10 +ms.mktglfcycl: deploy +ms.localizationpriority: high +ms.sitesec: library +ms.pagetype: deploy +author: coreyp-at-msft +ms.author: coreyp +ms.date: 06/01/2018 +--- + +# Rip and replace + +**Applies to: Windows 10** + DO NOT PUBLISH. Just a placeholder for now, coming with 1809. \ No newline at end of file diff --git a/windows/privacy/Microsoft-DiagnosticDataViewer.md b/windows/privacy/Microsoft-DiagnosticDataViewer.md index 014cf520b8..f0573631e9 100644 --- a/windows/privacy/Microsoft-DiagnosticDataViewer.md +++ b/windows/privacy/Microsoft-DiagnosticDataViewer.md @@ -1,184 +1,188 @@ ---- -title: Diagnostic Data Viewer for PowerShell Overview (Windows 10) -description: Use this article to use the Diagnostic Data Viewer for PowerShell to review the diagnostic data sent to Microsoft by your device. -keywords: privacy -ms.prod: w10 -ms.mktglfcycl: manage -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: high -author: brianlic-msft -ms.author: brianlic -ms.date: 01/17/2018 ---- - -# Diagnostic Data Viewer for PowerShell Overview - -**Applies to** - -- Windows 10, version 1809 -- Windows 10, version 1803 -- Windows Server, version 1803 -- Windows Server 2019 - -## Introduction -The Diagnostic Data Viewer for PowerShell is a PowerShell module that lets you review the diagnostic data your device is sending to Microsoft, grouping the info into simple categories based on how it's used by Microsoft. - -## Requirements - -You must have administrative privilege on the device in order to use this PowerShell module. This module requires OS version 1803 and higher. - -## Install and Use the Diagnostic Data Viewer for PowerShell - -You must install the module before you can use the Diagnostic Data Viewer for PowerShell. - -### Opening an Elevated PowerShell session - -Using the Diagnostic Data Viewer for PowerShell requires administrative (elevated) privilege. There are two ways to open an elevated PowerShell prompt. You can use either method. -- Go to **Start** > **Windows PowerShell** > **Run as administrator** -- Go to **Start** > **Command prompt** > **Run as administrator**, and run the command `C:\> powershell.exe` - -### Install the Diagnostic Data Viewer for PowerShell - - >[!IMPORTANT] - >It is recommended to visit the documentation on [Getting Started](https://docs.microsoft.com/en-us/powershell/gallery/getting-started) with PowerShell Gallery. This page provides more specific details on installing a PowerShell module. - -To install the newest version of the Diagnostic Data Viewer PowerShell module, run the following command within an elevated PowerShell session: -```powershell -PS C:\> Install-Module -Name Microsoft.DiagnosticDataViewer -``` - -To see more information about the module, visit [PowerShell Gallery](https://www.powershellgallery.com/packages/Microsoft.DiagnosticDataViewer). - -### Turn on data viewing -Before you can use this tool, you must turn on data viewing. Turning on data viewing enables Windows to store a local history of your device's diagnostic data for you to view until you turn it off. - -Note that this setting does not control whether your device sends diagnostic data. Instead, it controls whether your Windows device saves a local copy of the diagnostic data sent for your viewing. - -**To turn on data viewing through the Settings page** -1. Go to **Start**, select **Settings** > **Privacy** > **Diagnostics & feedback**. - -2. Under **Diagnostic data**, turn on the **If data viewing is enabled, you can see your diagnostics data** option. - - ![Location to turn on data viewing](images/ddv-data-viewing.png) - -**To turn on data viewing through PowerShell** - -Run the following command within an elevated PowerShell session: - -```powershell -PS C:\> Enable-DiagnosticDataViewing -``` - -Once data viewing is enabled, your Windows machine will begin saving a history of diagnostic data that is sent to Microsoft from this point on. - - >[!IMPORTANT] - >Turning on data viewing can use up to 1GB (default setting) of disk space on your system drive. We recommend that you turn off data viewing when you're done using the Diagnostic Data Viewer. For info about turning off data viewing, see the [Turn off data viewing](#turn-off-data-viewing) section in this article. - - -### Getting Started with Diagnostic Data Viewer for PowerShell -To see how to use the cmdlet, the parameters it accepts, and examples, run the following command from an elevated PowerShell session: - -```powershell -PS C:\> Get-Help Get-DiagnosticData -``` - -**To Start Viewing Diagnostic Data** - -From an elevated PowerShell session, run the following command: - -```powershell -PS C:\> Get-DiagnosticData -``` - -If the number of events is large, and you'd like to stop the command, enter `Ctrl+C`. - - >[!IMPORTANT] - >The above command may produce little to no results if you enabled data viewing recently. It can take several minutes before your Windows device can show diagnostic data it has sent. Use your device as you normally would in the mean time and try again. - -### Doing more with the Diagnostic Data Viewer for PowerShell -The Diagnostic Data Viewer for PowerShell provides you with the following features to view and filter your device's diagnostic data. You can also use the extensive suite of other PowerShell tools with this module. - -- **View your diagnostic events.** Running `PS C:\> Get-DiagnosticData`, you can review your diagnostic events. These events reflect activities that occurred and were sent to Microsoft. - - Each event is displayed as a PowerShell Object. By default each event shows the event name, the time when it was seen by your Windows device, whether the event is [Basic](https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization), its [diagnostic event category](#view-diagnostic-event-categories), and a detailed JSON view of the information it contains, which shows the event exactly as it was when sent to Microsoft. Microsoft uses this info to continually improve the Windows operating system. - -- **View Diagnostic event categories.** Each event shows the diagnostic event categories that it belongs to. These categories define how events are used by Microsoft. The categories are shown as numeric identifiers. For more information about these categories, see [Windows Diagnostic Data](https://docs.microsoft.com/en-us/windows/privacy/windows-diagnostic-data). - - To view the diagnostic category represented by each numeric identifier and what the category means, you can run the command: - - ```powershell - PS C:\> Get-DiagnosticDataTypes - ``` - -- **Filter events by when they were sent.** You can view events within specified time ranges by specifying a start time and end time of each command. For example, to see all diagnostic data sent between 12 and 6 hours ago, run the following command. Note that data is shown in order of oldest first. - ```powershell - PS C:\> Get-DiagnosticData -StartTime (Get-Date).AddHours(-12) -EndTime (Get-Date).AddHours(-6) - ``` - -- **Export the results of each command.** You can export the results of each command to a separate file such as a csv by using pipe `|`. For example, - - ```powershell - PS C:\> Get-DiagnosticData | Export-Csv 'mydata.csv' - ``` - -## Turn off data viewing -When you're done reviewing your diagnostic data, we recommend turning off data viewing to prevent using up more memory. Turning off data viewing stops Windows from saving a history of your diagnostic data and clears the existing history of diagnostic data from your device. - -**To turn off data viewing through the Settings page** -1. Go to **Start**, select **Settings** > **Privacy** > **Diagnostics & feedback**. - -2. Under **Diagnostic data**, turn off the **If data viewing is enabled, you can see your diagnostics data** option. - - ![Location to turn off data viewing](images/ddv-settings-off.png) - -**To turn off data viewing through PowerShell** - -Within an elevated PowerShell session, run the following command: - -```powershell -PS C:\> Disable-DiagnosticDataViewing -``` - -## Modifying the size of your data history -By default, the tool will show you up to 1GB or 30 days of data (whichever comes first). Once either the time or space limit is reached, the data is incrementally dropped with the oldest data points dropped first. - -**Modify the size of your data history** - - >[!IMPORTANT] - >Modifying the maximum amount of diagnostic data viewable by the tool may come with performance impacts to your machine. - - >[!IMPORTANT] - >If you modify the maximum data history size from a larger value to a lower value, you must turn off data viewing and turn it back on in order to reclaim disk space. - -You can change the maximum data history size (in megabytes) that you can view. For example, to set the maximum data history size to 2048MB (2GB), you can run the following command. - -```powershell -PS C:\> Set-DiagnosticStoreCapacity -Size 2048 -``` - -You can change the maximum data history time (in hours) that you can view. For example, to set the maximum data history time to 24 hours, you can run the following command. - -```powershell -PS C:\> Set-DiagnosticStoreCapacity -Time 24 -``` - - >[!IMPORTANT] - >You may need to restart your machine for the new settings to take effect. - - >[!IMPORTANT] - >If you have the [Diagnostic Data Viewer](diagnostic-data-viewer-overview.md) store app installed on the same device, modifications to the size of your data history through the PowerShell module will also be reflected in the app. - -**Reset the size of your data history** - -To reset the maximum data history size back to its original 1GB default value, run the following command in an elevated PowerShell session: - -```powershell -PS C:\> Set-DiagnosticStoreCapacity -Size 1024 -Time 720 -``` - -When resetting the size of your data history to a lower value, be sure to turn off data viewing and turn it back on in order to reclaim disk space. - -## Related Links -- [Module in PowerShell Gallery](https://www.powershellgallery.com/packages/Microsoft.DiagnosticDataViewer) +--- +title: Diagnostic Data Viewer for PowerShell Overview (Windows 10) +description: Use this article to use the Diagnostic Data Viewer for PowerShell to review the diagnostic data sent to Microsoft by your device. +keywords: privacy +ms.prod: w10 +ms.mktglfcycl: manage +ms.sitesec: library +ms.pagetype: security +ms.localizationpriority: high +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-security-compliance +ms.topic: article +ms.date: 01/17/2018 +--- + +# Diagnostic Data Viewer for PowerShell Overview + +**Applies to** + +- Windows 10, version 1809 +- Windows 10, version 1803 +- Windows Server, version 1803 +- Windows Server 2019 + +## Introduction +The Diagnostic Data Viewer for PowerShell is a PowerShell module that lets you review the diagnostic data your device is sending to Microsoft, grouping the info into simple categories based on how it's used by Microsoft. + +## Requirements + +You must have administrative privilege on the device in order to use this PowerShell module. This module requires OS version 1803 and higher. + +## Install and Use the Diagnostic Data Viewer for PowerShell + +You must install the module before you can use the Diagnostic Data Viewer for PowerShell. + +### Opening an Elevated PowerShell session + +Using the Diagnostic Data Viewer for PowerShell requires administrative (elevated) privilege. There are two ways to open an elevated PowerShell prompt. You can use either method. +- Go to **Start** > **Windows PowerShell** > **Run as administrator** +- Go to **Start** > **Command prompt** > **Run as administrator**, and run the command `C:\> powershell.exe` + +### Install the Diagnostic Data Viewer for PowerShell + + >[!IMPORTANT] + >It is recommended to visit the documentation on [Getting Started](https://docs.microsoft.com/en-us/powershell/gallery/getting-started) with PowerShell Gallery. This page provides more specific details on installing a PowerShell module. + +To install the newest version of the Diagnostic Data Viewer PowerShell module, run the following command within an elevated PowerShell session: +```powershell +PS C:\> Install-Module -Name Microsoft.DiagnosticDataViewer +``` + +To see more information about the module, visit [PowerShell Gallery](https://www.powershellgallery.com/packages/Microsoft.DiagnosticDataViewer). + +### Turn on data viewing +Before you can use this tool, you must turn on data viewing. Turning on data viewing enables Windows to store a local history of your device's diagnostic data for you to view until you turn it off. + +Note that this setting does not control whether your device sends diagnostic data. Instead, it controls whether your Windows device saves a local copy of the diagnostic data sent for your viewing. + +**To turn on data viewing through the Settings page** +1. Go to **Start**, select **Settings** > **Privacy** > **Diagnostics & feedback**. + +2. Under **Diagnostic data**, turn on the **If data viewing is enabled, you can see your diagnostics data** option. + + ![Location to turn on data viewing](images/ddv-data-viewing.png) + +**To turn on data viewing through PowerShell** + +Run the following command within an elevated PowerShell session: + +```powershell +PS C:\> Enable-DiagnosticDataViewing +``` + +Once data viewing is enabled, your Windows machine will begin saving a history of diagnostic data that is sent to Microsoft from this point on. + + >[!IMPORTANT] + >Turning on data viewing can use up to 1GB (default setting) of disk space on your system drive. We recommend that you turn off data viewing when you're done using the Diagnostic Data Viewer. For info about turning off data viewing, see the [Turn off data viewing](#turn-off-data-viewing) section in this article. + + +### Getting Started with Diagnostic Data Viewer for PowerShell +To see how to use the cmdlet, the parameters it accepts, and examples, run the following command from an elevated PowerShell session: + +```powershell +PS C:\> Get-Help Get-DiagnosticData +``` + +**To Start Viewing Diagnostic Data** + +From an elevated PowerShell session, run the following command: + +```powershell +PS C:\> Get-DiagnosticData +``` + +If the number of events is large, and you'd like to stop the command, enter `Ctrl+C`. + + >[!IMPORTANT] + >The above command may produce little to no results if you enabled data viewing recently. It can take several minutes before your Windows device can show diagnostic data it has sent. Use your device as you normally would in the mean time and try again. + +### Doing more with the Diagnostic Data Viewer for PowerShell +The Diagnostic Data Viewer for PowerShell provides you with the following features to view and filter your device's diagnostic data. You can also use the extensive suite of other PowerShell tools with this module. + +- **View your diagnostic events.** Running `PS C:\> Get-DiagnosticData`, you can review your diagnostic events. These events reflect activities that occurred and were sent to Microsoft. + + Each event is displayed as a PowerShell Object. By default each event shows the event name, the time when it was seen by your Windows device, whether the event is [Basic](https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization), its [diagnostic event category](#view-diagnostic-event-categories), and a detailed JSON view of the information it contains, which shows the event exactly as it was when sent to Microsoft. Microsoft uses this info to continually improve the Windows operating system. + +- **View Diagnostic event categories.** Each event shows the diagnostic event categories that it belongs to. These categories define how events are used by Microsoft. The categories are shown as numeric identifiers. For more information about these categories, see [Windows Diagnostic Data](https://docs.microsoft.com/en-us/windows/privacy/windows-diagnostic-data). + + To view the diagnostic category represented by each numeric identifier and what the category means, you can run the command: + + ```powershell + PS C:\> Get-DiagnosticDataTypes + ``` + +- **Filter events by when they were sent.** You can view events within specified time ranges by specifying a start time and end time of each command. For example, to see all diagnostic data sent between 12 and 6 hours ago, run the following command. Note that data is shown in order of oldest first. + ```powershell + PS C:\> Get-DiagnosticData -StartTime (Get-Date).AddHours(-12) -EndTime (Get-Date).AddHours(-6) + ``` + +- **Export the results of each command.** You can export the results of each command to a separate file such as a csv by using pipe `|`. For example, + + ```powershell + PS C:\> Get-DiagnosticData | Export-Csv 'mydata.csv' + ``` + +## Turn off data viewing +When you're done reviewing your diagnostic data, we recommend turning off data viewing to prevent using up more memory. Turning off data viewing stops Windows from saving a history of your diagnostic data and clears the existing history of diagnostic data from your device. + +**To turn off data viewing through the Settings page** +1. Go to **Start**, select **Settings** > **Privacy** > **Diagnostics & feedback**. + +2. Under **Diagnostic data**, turn off the **If data viewing is enabled, you can see your diagnostics data** option. + + ![Location to turn off data viewing](images/ddv-settings-off.png) + +**To turn off data viewing through PowerShell** + +Within an elevated PowerShell session, run the following command: + +```powershell +PS C:\> Disable-DiagnosticDataViewing +``` + +## Modifying the size of your data history +By default, the tool will show you up to 1GB or 30 days of data (whichever comes first). Once either the time or space limit is reached, the data is incrementally dropped with the oldest data points dropped first. + +**Modify the size of your data history** + + >[!IMPORTANT] + >Modifying the maximum amount of diagnostic data viewable by the tool may come with performance impacts to your machine. + + >[!IMPORTANT] + >If you modify the maximum data history size from a larger value to a lower value, you must turn off data viewing and turn it back on in order to reclaim disk space. + +You can change the maximum data history size (in megabytes) that you can view. For example, to set the maximum data history size to 2048MB (2GB), you can run the following command. + +```powershell +PS C:\> Set-DiagnosticStoreCapacity -Size 2048 +``` + +You can change the maximum data history time (in hours) that you can view. For example, to set the maximum data history time to 24 hours, you can run the following command. + +```powershell +PS C:\> Set-DiagnosticStoreCapacity -Time 24 +``` + + >[!IMPORTANT] + >You may need to restart your machine for the new settings to take effect. + + >[!IMPORTANT] + >If you have the [Diagnostic Data Viewer](diagnostic-data-viewer-overview.md) store app installed on the same device, modifications to the size of your data history through the PowerShell module will also be reflected in the app. + +**Reset the size of your data history** + +To reset the maximum data history size back to its original 1GB default value, run the following command in an elevated PowerShell session: + +```powershell +PS C:\> Set-DiagnosticStoreCapacity -Size 1024 -Time 720 +``` + +When resetting the size of your data history to a lower value, be sure to turn off data viewing and turn it back on in order to reclaim disk space. + +## Related Links +- [Module in PowerShell Gallery](https://www.powershellgallery.com/packages/Microsoft.DiagnosticDataViewer) - [Documentation for Diagnostic Data Viewer for PowerShell](https://docs.microsoft.com/en-us/powershell/module/microsoft.diagnosticdataviewer/?view=win10-ps) \ No newline at end of file diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md index 05bbed9fe0..eaf8f033d0 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md @@ -7,8 +7,12 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security localizationpriority: high +audience: ITPro author: brianlic-msft ms.author: brianlic +manager: dansimp +ms.collection: M365-security-compliance +ms.topic: article ms.date: 02/15/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md index e6461d30e4..27fcd87f88 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md @@ -7,8 +7,12 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security localizationpriority: high +audience: ITPro author: brianlic-msft ms.author: brianlic +manager: dansimp +ms.collection: M365-security-compliance +ms.topic: article ms.date: 02/15/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md index 6361832bf4..e3c6418b17 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md @@ -7,8 +7,12 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security localizationpriority: high +audience: ITPro author: brianlic-msft ms.author: brianlic +manager: dansimp +ms.collection: M365-security-compliance +ms.topic: article ms.date: 02/15/2019 --- diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md index 73ccbef0c7..8916790a12 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md @@ -7,8 +7,12 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security localizationpriority: high +audience: ITPro author: brianlic-msft ms.author: brianlic +manager: dansimp +ms.collection: M365-security-compliance +ms.topic: article ms.date: 02/15/2019 --- diff --git a/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md b/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md index 37a8b7a031..da571eeaf2 100644 --- a/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md +++ b/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md @@ -7,7 +7,12 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: high -author: brianlic-msft +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-security-compliance +ms.topic: article ms.date: 04/04/2018 --- diff --git a/windows/privacy/diagnostic-data-viewer-overview.md b/windows/privacy/diagnostic-data-viewer-overview.md index c3e3209466..f739985f3d 100644 --- a/windows/privacy/diagnostic-data-viewer-overview.md +++ b/windows/privacy/diagnostic-data-viewer-overview.md @@ -7,8 +7,12 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: high -author: brianlic-msft -ms.author: brianlic +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-security-compliance +ms.topic: article ms.date: 01/17/2018 --- diff --git a/windows/privacy/enhanced-diagnostic-data-windows-analytics-events-and-fields.md b/windows/privacy/enhanced-diagnostic-data-windows-analytics-events-and-fields.md index e1797ff113..f3f9bf6b3f 100644 --- a/windows/privacy/enhanced-diagnostic-data-windows-analytics-events-and-fields.md +++ b/windows/privacy/enhanced-diagnostic-data-windows-analytics-events-and-fields.md @@ -7,9 +7,13 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: high -ms.date: 11/9/2018 -author: danihalfin +audience: ITPro +author: danihalfin ms.author: daniha +manager: dansimp +ms.collection: M365-security-compliance +ms.topic: article +ms.date: 11/9/2018 --- diff --git a/windows/privacy/gdpr-it-guidance.md b/windows/privacy/gdpr-it-guidance.md index 273464ae5a..3cc4c3a5d1 100644 --- a/windows/privacy/gdpr-it-guidance.md +++ b/windows/privacy/gdpr-it-guidance.md @@ -7,8 +7,12 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: high +audience: ITPro author: danihalfin ms.author: daniha +manager: dansimp +ms.collection: M365-security-compliance +ms.topic: article ms.date: 05/11/2018 --- # Windows and the GDPR: Information for IT Administrators and Decision Makers diff --git a/windows/privacy/gdpr-win10-whitepaper.md b/windows/privacy/gdpr-win10-whitepaper.md index a8a0214f4a..62925e34b9 100644 --- a/windows/privacy/gdpr-win10-whitepaper.md +++ b/windows/privacy/gdpr-win10-whitepaper.md @@ -7,8 +7,12 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: high +audience: ITPro author: pwiglemsft ms.author: pwigle +manager: dansimp +ms.collection: M365-security-compliance +ms.topic: article ms.date: 09/25/2017 --- diff --git a/windows/privacy/index.yml b/windows/privacy/index.yml index c0af2a06c7..8d5740bc52 100644 --- a/windows/privacy/index.yml +++ b/windows/privacy/index.yml @@ -22,7 +22,13 @@ metadata: ms.date: 04/25/2018 - ms.topic: article + ms.topic: conceptual + + audience: ITPro + + manager: dansimp + + ms.collection: M365-security-compliance ms.devlang: na diff --git a/windows/privacy/license-terms-windows-diagnostic-data-for-powershell.md b/windows/privacy/license-terms-windows-diagnostic-data-for-powershell.md index ee8ecf4a8b..142906d55e 100644 --- a/windows/privacy/license-terms-windows-diagnostic-data-for-powershell.md +++ b/windows/privacy/license-terms-windows-diagnostic-data-for-powershell.md @@ -7,8 +7,12 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: high +audience: ITPro author: danihalfin ms.author: daniha +manager: dansimp +ms.collection: M365-security-compliance +ms.topic: article ms.date: 11/16/2018 robots: noindex,nofollow --- diff --git a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md index 5c89da41a0..75f9a40255 100644 --- a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md +++ b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md @@ -7,8 +7,12 @@ ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library ms.localizationpriority: medium +audience: ITPro author: danihalfin ms.author: daniha +manager: dansimp +ms.collection: M365-security-compliance +ms.topic: article ms.date: 06/05/2018 --- diff --git a/windows/privacy/manage-windows-1709-endpoints.md b/windows/privacy/manage-windows-1709-endpoints.md index 2e754c9ad3..a3e6817d6a 100644 --- a/windows/privacy/manage-windows-1709-endpoints.md +++ b/windows/privacy/manage-windows-1709-endpoints.md @@ -6,8 +6,12 @@ ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library ms.localizationpriority: high +audience: ITPro author: danihalfin ms.author: daniha +manager: dansimp +ms.collection: M365-security-compliance +ms.topic: article ms.date: 6/26/2018 --- # Manage connection endpoints for Windows 10, version 1709 diff --git a/windows/privacy/manage-windows-1803-endpoints.md b/windows/privacy/manage-windows-1803-endpoints.md index f508978478..c23ac04672 100644 --- a/windows/privacy/manage-windows-1803-endpoints.md +++ b/windows/privacy/manage-windows-1803-endpoints.md @@ -6,8 +6,12 @@ ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library ms.localizationpriority: high +audience: ITPro author: danihalfin ms.author: daniha +manager: dansimp +ms.collection: M365-security-compliance +ms.topic: article ms.date: 6/26/2018 --- # Manage connection endpoints for Windows 10, version 1803 diff --git a/windows/privacy/manage-windows-1809-endpoints.md b/windows/privacy/manage-windows-1809-endpoints.md index 7c645311a6..74fa377991 100644 --- a/windows/privacy/manage-windows-1809-endpoints.md +++ b/windows/privacy/manage-windows-1809-endpoints.md @@ -6,8 +6,12 @@ ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library ms.localizationpriority: high +audience: ITPro author: danihalfin ms.author: daniha +manager: dansimp +ms.collection: M365-security-compliance +ms.topic: article ms.date: 6/26/2018 --- # Manage connection endpoints for Windows 10, version 1809 diff --git a/windows/privacy/windows-diagnostic-data-1703.md b/windows/privacy/windows-diagnostic-data-1703.md index 15ce44125d..de1f934651 100644 --- a/windows/privacy/windows-diagnostic-data-1703.md +++ b/windows/privacy/windows-diagnostic-data-1703.md @@ -6,8 +6,12 @@ ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library ms.localizationpriority: high -author: eross-msft -ms.author: lizross +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-security-compliance +ms.topic: article ms.date: 11/28/2017 --- diff --git a/windows/privacy/windows-diagnostic-data.md b/windows/privacy/windows-diagnostic-data.md index dd435f2d40..2b73716da2 100644 --- a/windows/privacy/windows-diagnostic-data.md +++ b/windows/privacy/windows-diagnostic-data.md @@ -6,8 +6,12 @@ ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library ms.localizationpriority: high -author: brianlic-msft -ms.author: brianlic +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-security-compliance +ms.topic: article ms.date: 03/13/2018 --- diff --git a/windows/privacy/windows-endpoints-1709-non-enterprise-editions.md b/windows/privacy/windows-endpoints-1709-non-enterprise-editions.md index 89c04ebc76..58b39b8a65 100644 --- a/windows/privacy/windows-endpoints-1709-non-enterprise-editions.md +++ b/windows/privacy/windows-endpoints-1709-non-enterprise-editions.md @@ -6,8 +6,12 @@ ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library ms.localizationpriority: high +audience: ITPro author: danihalfin ms.author: daniha +manager: dansimp +ms.collection: M365-security-compliance +ms.topic: article ms.date: 6/26/2018 --- # Windows 10, version 1709, connection endpoints for non-Enterprise editions diff --git a/windows/privacy/windows-endpoints-1803-non-enterprise-editions.md b/windows/privacy/windows-endpoints-1803-non-enterprise-editions.md index 39343b19d9..833236d614 100644 --- a/windows/privacy/windows-endpoints-1803-non-enterprise-editions.md +++ b/windows/privacy/windows-endpoints-1803-non-enterprise-editions.md @@ -6,8 +6,12 @@ ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library ms.localizationpriority: high +audience: ITPro author: danihalfin ms.author: daniha +manager: dansimp +ms.collection: M365-security-compliance +ms.topic: article ms.date: 6/26/2018 --- # Windows 10, version 1803, connection endpoints for non-Enterprise editions diff --git a/windows/privacy/windows-endpoints-1809-non-enterprise-editions.md b/windows/privacy/windows-endpoints-1809-non-enterprise-editions.md index 222b37d0e2..370860330f 100644 --- a/windows/privacy/windows-endpoints-1809-non-enterprise-editions.md +++ b/windows/privacy/windows-endpoints-1809-non-enterprise-editions.md @@ -6,8 +6,12 @@ ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library ms.localizationpriority: high +audience: ITPro author: danihalfin ms.author: daniha +manager: dansimp +ms.collection: M365-security-compliance +ms.topic: article ms.date: 6/26/2018 --- # Windows 10, version 1809, connection endpoints for non-Enterprise editions diff --git a/windows/privacy/windows-personal-data-services-configuration.md b/windows/privacy/windows-personal-data-services-configuration.md index e830022a97..bb0d5fa4f5 100644 --- a/windows/privacy/windows-personal-data-services-configuration.md +++ b/windows/privacy/windows-personal-data-services-configuration.md @@ -7,8 +7,12 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: high +audience: ITPro author: danihalfin ms.author: daniha +manager: dansimp +ms.collection: M365-security-compliance +ms.topic: article ms.date: 05/11/2018 --- # Windows 10 personal data services configuration diff --git a/windows/security/identity-protection/access-control/access-control.md b/windows/security/identity-protection/access-control/access-control.md index 5516d2dc33..4783ea80b2 100644 --- a/windows/security/identity-protection/access-control/access-control.md +++ b/windows/security/identity-protection/access-control/access-control.md @@ -5,6 +5,12 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 07/18/2017 --- diff --git a/windows/security/identity-protection/access-control/active-directory-accounts.md b/windows/security/identity-protection/access-control/active-directory-accounts.md index 18260aeb64..f1d45ad92f 100644 --- a/windows/security/identity-protection/access-control/active-directory-accounts.md +++ b/windows/security/identity-protection/access-control/active-directory-accounts.md @@ -5,6 +5,12 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 04/19/2017 --- diff --git a/windows/security/identity-protection/access-control/active-directory-security-groups.md b/windows/security/identity-protection/access-control/active-directory-security-groups.md index d0a9735761..b0fe4c8945 100644 --- a/windows/security/identity-protection/access-control/active-directory-security-groups.md +++ b/windows/security/identity-protection/access-control/active-directory-security-groups.md @@ -5,6 +5,12 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 04/19/2017 --- diff --git a/windows/security/identity-protection/access-control/dynamic-access-control.md b/windows/security/identity-protection/access-control/dynamic-access-control.md index 168780b269..3a780b65c8 100644 --- a/windows/security/identity-protection/access-control/dynamic-access-control.md +++ b/windows/security/identity-protection/access-control/dynamic-access-control.md @@ -5,6 +5,12 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 04/19/2017 --- diff --git a/windows/security/identity-protection/access-control/local-accounts.md b/windows/security/identity-protection/access-control/local-accounts.md index 53820f7491..548fb7d8a4 100644 --- a/windows/security/identity-protection/access-control/local-accounts.md +++ b/windows/security/identity-protection/access-control/local-accounts.md @@ -5,6 +5,12 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 12/10/2018 --- diff --git a/windows/security/identity-protection/access-control/microsoft-accounts.md b/windows/security/identity-protection/access-control/microsoft-accounts.md index f1071d55e7..27e5a67167 100644 --- a/windows/security/identity-protection/access-control/microsoft-accounts.md +++ b/windows/security/identity-protection/access-control/microsoft-accounts.md @@ -5,6 +5,12 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 10/13/2017 --- diff --git a/windows/security/identity-protection/access-control/security-identifiers.md b/windows/security/identity-protection/access-control/security-identifiers.md index 19f600c354..cf302f81cd 100644 --- a/windows/security/identity-protection/access-control/security-identifiers.md +++ b/windows/security/identity-protection/access-control/security-identifiers.md @@ -5,6 +5,12 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 04/19/2017 --- diff --git a/windows/security/identity-protection/access-control/security-principals.md b/windows/security/identity-protection/access-control/security-principals.md index 75137c70cb..c5845d5f63 100644 --- a/windows/security/identity-protection/access-control/security-principals.md +++ b/windows/security/identity-protection/access-control/security-principals.md @@ -5,6 +5,12 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 04/19/2017 --- diff --git a/windows/security/identity-protection/access-control/service-accounts.md b/windows/security/identity-protection/access-control/service-accounts.md index c210880baa..b26e3f92e0 100644 --- a/windows/security/identity-protection/access-control/service-accounts.md +++ b/windows/security/identity-protection/access-control/service-accounts.md @@ -5,6 +5,12 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 04/19/2017 --- diff --git a/windows/security/identity-protection/access-control/special-identities.md b/windows/security/identity-protection/access-control/special-identities.md index 4a7b685722..44dcfef806 100644 --- a/windows/security/identity-protection/access-control/special-identities.md +++ b/windows/security/identity-protection/access-control/special-identities.md @@ -5,6 +5,12 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 04/19/2017 --- diff --git a/windows/security/identity-protection/change-history-for-access-protection.md b/windows/security/identity-protection/change-history-for-access-protection.md index ceecf5c712..c975a34e77 100644 --- a/windows/security/identity-protection/change-history-for-access-protection.md +++ b/windows/security/identity-protection/change-history-for-access-protection.md @@ -5,7 +5,12 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: brianlic-msft +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 08/11/2017 --- diff --git a/windows/security/identity-protection/configure-s-mime.md b/windows/security/identity-protection/configure-s-mime.md index e5086ff9c0..b6fa386ae3 100644 --- a/windows/security/identity-protection/configure-s-mime.md +++ b/windows/security/identity-protection/configure-s-mime.md @@ -7,7 +7,12 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: jdeckerms +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.localizationpriority: medium ms.date: 07/27/2017 --- diff --git a/windows/security/identity-protection/credential-guard/additional-mitigations.md b/windows/security/identity-protection/credential-guard/additional-mitigations.md index 2ce6157d51..39d4a423a8 100644 --- a/windows/security/identity-protection/credential-guard/additional-mitigations.md +++ b/windows/security/identity-protection/credential-guard/additional-mitigations.md @@ -6,7 +6,12 @@ ms.mktglfcycl: explore ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 08/17/2017 --- diff --git a/windows/security/identity-protection/credential-guard/credential-guard-considerations.md b/windows/security/identity-protection/credential-guard/credential-guard-considerations.md index 41b2e20eb2..b3c0ba0502 100644 --- a/windows/security/identity-protection/credential-guard/credential-guard-considerations.md +++ b/windows/security/identity-protection/credential-guard/credential-guard-considerations.md @@ -6,7 +6,12 @@ ms.mktglfcycl: explore ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 08/31/2017 --- diff --git a/windows/security/identity-protection/credential-guard/credential-guard-how-it-works.md b/windows/security/identity-protection/credential-guard/credential-guard-how-it-works.md index 5f0414102b..0e10a79093 100644 --- a/windows/security/identity-protection/credential-guard/credential-guard-how-it-works.md +++ b/windows/security/identity-protection/credential-guard/credential-guard-how-it-works.md @@ -6,7 +6,12 @@ ms.mktglfcycl: explore ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 08/17/2017 --- diff --git a/windows/security/identity-protection/credential-guard/credential-guard-known-issues.md b/windows/security/identity-protection/credential-guard/credential-guard-known-issues.md index 876bf45bbc..d999f556ba 100644 --- a/windows/security/identity-protection/credential-guard/credential-guard-known-issues.md +++ b/windows/security/identity-protection/credential-guard/credential-guard-known-issues.md @@ -6,7 +6,12 @@ ms.mktglfcycl: explore ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 08/17/2017 --- diff --git a/windows/security/identity-protection/credential-guard/credential-guard-manage.md b/windows/security/identity-protection/credential-guard/credential-guard-manage.md index 66069f5d73..def101e7d1 100644 --- a/windows/security/identity-protection/credential-guard/credential-guard-manage.md +++ b/windows/security/identity-protection/credential-guard/credential-guard-manage.md @@ -6,7 +6,12 @@ ms.mktglfcycl: explore ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 09/04/2018 --- diff --git a/windows/security/identity-protection/credential-guard/credential-guard-not-protected-scenarios.md b/windows/security/identity-protection/credential-guard/credential-guard-not-protected-scenarios.md index f5edbab628..a83bbf8af8 100644 --- a/windows/security/identity-protection/credential-guard/credential-guard-not-protected-scenarios.md +++ b/windows/security/identity-protection/credential-guard/credential-guard-not-protected-scenarios.md @@ -6,7 +6,12 @@ ms.mktglfcycl: explore ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 08/17/2017 --- diff --git a/windows/security/identity-protection/credential-guard/credential-guard-protection-limits.md b/windows/security/identity-protection/credential-guard/credential-guard-protection-limits.md index b41c2815de..0277d8dcf5 100644 --- a/windows/security/identity-protection/credential-guard/credential-guard-protection-limits.md +++ b/windows/security/identity-protection/credential-guard/credential-guard-protection-limits.md @@ -6,7 +6,12 @@ ms.mktglfcycl: explore ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 08/17/2017 --- diff --git a/windows/security/identity-protection/credential-guard/credential-guard-requirements.md b/windows/security/identity-protection/credential-guard/credential-guard-requirements.md index 515338ce7e..68c7ae9ccb 100644 --- a/windows/security/identity-protection/credential-guard/credential-guard-requirements.md +++ b/windows/security/identity-protection/credential-guard/credential-guard-requirements.md @@ -6,7 +6,12 @@ ms.mktglfcycl: explore ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 01/12/2018 --- diff --git a/windows/security/identity-protection/credential-guard/credential-guard-scripts.md b/windows/security/identity-protection/credential-guard/credential-guard-scripts.md index 9ac7b4a335..f6c5fda88e 100644 --- a/windows/security/identity-protection/credential-guard/credential-guard-scripts.md +++ b/windows/security/identity-protection/credential-guard/credential-guard-scripts.md @@ -6,7 +6,12 @@ ms.mktglfcycl: explore ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 08/17/2017 --- diff --git a/windows/security/identity-protection/credential-guard/credential-guard.md b/windows/security/identity-protection/credential-guard/credential-guard.md index d541979fb9..54db450ede 100644 --- a/windows/security/identity-protection/credential-guard/credential-guard.md +++ b/windows/security/identity-protection/credential-guard/credential-guard.md @@ -7,7 +7,12 @@ ms.mktglfcycl: explore ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 08/17/2017 --- diff --git a/windows/security/identity-protection/enterprise-certificate-pinning.md b/windows/security/identity-protection/enterprise-certificate-pinning.md index 7732d4dcb7..aa7b5c3ba4 100644 --- a/windows/security/identity-protection/enterprise-certificate-pinning.md +++ b/windows/security/identity-protection/enterprise-certificate-pinning.md @@ -1,10 +1,14 @@ --- +title: Enterprise Certificate Pinning ms.mktglfcycl: manage ms.sitesec: library -ms.author: mstephens -author: MikeStephens-MS description: Enterprise certificate pinning is a Windows feature for remembering, or “pinning” a root, issuing certificate authority, or end entity certificate to a given domain name. -manager: alanth +audience: ITPro +author: MikeStephens-MS +ms.author: mstephens +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.prod: w10 ms.technology: windows ms.sitesec: library diff --git a/windows/security/identity-protection/hello-for-business/WebAuthnAPIs.md b/windows/security/identity-protection/hello-for-business/WebAuthnAPIs.md index 94caf55f34..768730bf01 100644 --- a/windows/security/identity-protection/hello-for-business/WebAuthnAPIs.md +++ b/windows/security/identity-protection/hello-for-business/WebAuthnAPIs.md @@ -5,9 +5,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile +audience: ITPro author: aabhathipsay ms.author: aathipsa -ms.localizationpriority: medium +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 02/15/2019 --- # WebAuthn APIs for password-less authentication on Windows 10 diff --git a/windows/security/identity-protection/hello-for-business/feature-multifactor-unlock.md b/windows/security/identity-protection/hello-for-business/feature-multifactor-unlock.md index 5bc351b6ed..1f39421330 100644 --- a/windows/security/identity-protection/hello-for-business/feature-multifactor-unlock.md +++ b/windows/security/identity-protection/hello-for-business/feature-multifactor-unlock.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile +audience: ITPro author: mikestephens-MS ms.author: mstephen -localizationpriority: high +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 03/20/2018 --- # Multifactor Unlock diff --git a/windows/security/identity-protection/hello-for-business/hello-adequate-domain-controllers.md b/windows/security/identity-protection/hello-for-business/hello-adequate-domain-controllers.md index 69c2f928e5..bd94c85aeb 100644 --- a/windows/security/identity-protection/hello-for-business/hello-adequate-domain-controllers.md +++ b/windows/security/identity-protection/hello-for-business/hello-adequate-domain-controllers.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile +audience: ITPro author: mikestephens-MS ms.author: mstephen -ms.localizationpriority: medium +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/20/2018 --- # Planning an adequate number of Windows Server 2016 Domain Controllers for Windows Hello for Business deployments diff --git a/windows/security/identity-protection/hello-for-business/hello-and-password-changes.md b/windows/security/identity-protection/hello-for-business/hello-and-password-changes.md index 4602d7703e..fcbb4c85e7 100644 --- a/windows/security/identity-protection/hello-for-business/hello-and-password-changes.md +++ b/windows/security/identity-protection/hello-for-business/hello-and-password-changes.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: DaniHalfin -ms.localizationpriority: medium -ms.author: daniha +audience: ITPro +author: danihalfin +ms.author: danihalf +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 07/27/2017 --- # Windows Hello and password changes diff --git a/windows/security/identity-protection/hello-for-business/hello-biometrics-in-enterprise.md b/windows/security/identity-protection/hello-for-business/hello-biometrics-in-enterprise.md index aa575dd8a2..e4763d7e10 100644 --- a/windows/security/identity-protection/hello-for-business/hello-biometrics-in-enterprise.md +++ b/windows/security/identity-protection/hello-for-business/hello-biometrics-in-enterprise.md @@ -7,9 +7,13 @@ ms.prod: w10 ms.mktglfcycl: explore ms.sitesec: library ms.pagetype: security +audience: ITPro author: mikestephens-MS ms.author: mstephen -ms.localizationpriority: medium +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/19/2018 --- diff --git a/windows/security/identity-protection/hello-for-business/hello-cert-trust-adfs.md b/windows/security/identity-protection/hello-for-business/hello-cert-trust-adfs.md index 4cf3f03202..2f9757d9d9 100644 --- a/windows/security/identity-protection/hello-for-business/hello-cert-trust-adfs.md +++ b/windows/security/identity-protection/hello-for-business/hello-cert-trust-adfs.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile +audience: ITPro author: mikestephens-MS ms.author: mstephen -localizationpriority: high +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/19/2018 --- # Prepare and Deploy Windows Server 2016 Active Directory Federation Services diff --git a/windows/security/identity-protection/hello-for-business/hello-cert-trust-deploy-mfa.md b/windows/security/identity-protection/hello-for-business/hello-cert-trust-deploy-mfa.md index be690848aa..a763b76800 100644 --- a/windows/security/identity-protection/hello-for-business/hello-cert-trust-deploy-mfa.md +++ b/windows/security/identity-protection/hello-for-business/hello-cert-trust-deploy-mfa.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile +audience: ITPro author: mikestephens-MS ms.author: mstephen -ms.localizationpriority: medium +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/19/2018 --- # Configure or Deploy Multifactor Authentication Services diff --git a/windows/security/identity-protection/hello-for-business/hello-cert-trust-policy-settings.md b/windows/security/identity-protection/hello-for-business/hello-cert-trust-policy-settings.md index f33d7bbf02..094f75f232 100644 --- a/windows/security/identity-protection/hello-for-business/hello-cert-trust-policy-settings.md +++ b/windows/security/identity-protection/hello-for-business/hello-cert-trust-policy-settings.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile -ms.localizationpriority: medium +audience: ITPro author: mikestephens-MS ms.author: mstephen +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/20/2018 --- # Configure Windows Hello for Business Policy settings diff --git a/windows/security/identity-protection/hello-for-business/hello-cert-trust-validate-ad-prereq.md b/windows/security/identity-protection/hello-for-business/hello-cert-trust-validate-ad-prereq.md index 9c64a37ec4..18164a1c75 100644 --- a/windows/security/identity-protection/hello-for-business/hello-cert-trust-validate-ad-prereq.md +++ b/windows/security/identity-protection/hello-for-business/hello-cert-trust-validate-ad-prereq.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile -ms.localizationpriority: medium +audience: ITPro author: mikestephens-MS ms.author: mstephen +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/19/2018 --- # Validate Active Directory prerequisites diff --git a/windows/security/identity-protection/hello-for-business/hello-cert-trust-validate-deploy-mfa.md b/windows/security/identity-protection/hello-for-business/hello-cert-trust-validate-deploy-mfa.md index ea525b612e..ac2f4ba332 100644 --- a/windows/security/identity-protection/hello-for-business/hello-cert-trust-validate-deploy-mfa.md +++ b/windows/security/identity-protection/hello-for-business/hello-cert-trust-validate-deploy-mfa.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile +audience: ITPro author: mikestephens-MS ms.author: mstephen -ms.localizationpriority: medium +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/19/2018 --- # Validate and Deploy Multifactor Authentication Services (MFA) diff --git a/windows/security/identity-protection/hello-for-business/hello-cert-trust-validate-pki.md b/windows/security/identity-protection/hello-for-business/hello-cert-trust-validate-pki.md index 294064bd90..89d53fc368 100644 --- a/windows/security/identity-protection/hello-for-business/hello-cert-trust-validate-pki.md +++ b/windows/security/identity-protection/hello-for-business/hello-cert-trust-validate-pki.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile +audience: ITPro author: mikestephens-MS ms.author: mstephen -localizationpriority: high +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/19/2018 --- # Validate and Configure Public Key Infrastructure diff --git a/windows/security/identity-protection/hello-for-business/hello-deployment-cert-trust.md b/windows/security/identity-protection/hello-for-business/hello-deployment-cert-trust.md index 0945e7436d..4aeeb5bb8b 100644 --- a/windows/security/identity-protection/hello-for-business/hello-deployment-cert-trust.md +++ b/windows/security/identity-protection/hello-for-business/hello-deployment-cert-trust.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile -ms.localizationpriority: medium +audience: ITPro author: mikestephens-MS ms.author: mstephen +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/19/2018 --- # On Premises Certificate Trust Deployment @@ -26,16 +30,4 @@ Below, you can find all the information you will need to deploy Windows Hello fo 2. [Validate and Configure Public Key Infrastructure](hello-cert-trust-validate-pki.md) 3. [Prepare and Deploy Windows Server 2016 Active Directory Federation Services](hello-cert-trust-adfs.md) 4. [Validate and Deploy Multifactor Authentication Services (MFA)](hello-cert-trust-validate-deploy-mfa.md) -5. [Configure Windows Hello for Business Policy settings](hello-cert-trust-policy-settings.md) - - - - - - - - - - - - +5. [Configure Windows Hello for Business Policy settings](hello-cert-trust-policy-settings.md) \ No newline at end of file diff --git a/windows/security/identity-protection/hello-for-business/hello-deployment-guide.md b/windows/security/identity-protection/hello-for-business/hello-deployment-guide.md index d2b2d4db85..36e3dad339 100644 --- a/windows/security/identity-protection/hello-for-business/hello-deployment-guide.md +++ b/windows/security/identity-protection/hello-for-business/hello-deployment-guide.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile +audience: ITPro author: mikestephens-MS ms.author: mstephen -ms.localizationpriority: medium +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/29/2018 --- # Windows Hello for Business Deployment Guide diff --git a/windows/security/identity-protection/hello-for-business/hello-deployment-key-trust.md b/windows/security/identity-protection/hello-for-business/hello-deployment-key-trust.md index 1c7fd1f995..0d99dddd85 100644 --- a/windows/security/identity-protection/hello-for-business/hello-deployment-key-trust.md +++ b/windows/security/identity-protection/hello-for-business/hello-deployment-key-trust.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile +audience: ITPro author: mikestephens-MS ms.author: mstephen -ms.localizationpriority: medium +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/20/2018 --- # On Premises Key Trust Deployment diff --git a/windows/security/identity-protection/hello-for-business/hello-errors-during-pin-creation.md b/windows/security/identity-protection/hello-for-business/hello-errors-during-pin-creation.md index f5b102d219..6714648b3d 100644 --- a/windows/security/identity-protection/hello-for-business/hello-errors-during-pin-creation.md +++ b/windows/security/identity-protection/hello-for-business/hello-errors-during-pin-creation.md @@ -7,9 +7,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: DaniHalfin -ms.localizationpriority: medium -ms.author: daniha +audience: ITPro +author: danihalfin +ms.author: danihalf +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: troubleshooting +localizationpriority: medium ms.date: 05/05/2018 --- diff --git a/windows/security/identity-protection/hello-for-business/hello-event-300.md b/windows/security/identity-protection/hello-for-business/hello-event-300.md index 2aac336bfc..931335aba0 100644 --- a/windows/security/identity-protection/hello-for-business/hello-event-300.md +++ b/windows/security/identity-protection/hello-for-business/hello-event-300.md @@ -7,9 +7,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: DaniHalfin -ms.localizationpriority: medium -ms.author: daniha +audience: ITPro +author: danihalfin +ms.author: danihalf +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 07/27/2017 --- diff --git a/windows/security/identity-protection/hello-for-business/hello-faq.md b/windows/security/identity-protection/hello-for-business/hello-faq.md index c34aaa4692..4cbd7ca983 100644 --- a/windows/security/identity-protection/hello-for-business/hello-faq.md +++ b/windows/security/identity-protection/hello-for-business/hello-faq.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile +audience: ITPro author: mikestephens-MS ms.author: mstephen -localizationpriority: high +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/19/2018 --- # Windows Hello for Business Frequently Ask Questions diff --git a/windows/security/identity-protection/hello-for-business/hello-features.md b/windows/security/identity-protection/hello-for-business/hello-features.md index 09530fefa8..280135c5b3 100644 --- a/windows/security/identity-protection/hello-for-business/hello-features.md +++ b/windows/security/identity-protection/hello-for-business/hello-features.md @@ -7,9 +7,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile +audience: ITPro author: mikestephens-MS ms.author: mstephen -localizationpriority: high +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 05/05/2018 --- # Windows Hello for Business Features diff --git a/windows/security/identity-protection/hello-for-business/hello-how-it-works-authentication.md b/windows/security/identity-protection/hello-for-business/hello-how-it-works-authentication.md index a3d175023d..5a2a096de4 100644 --- a/windows/security/identity-protection/hello-for-business/hello-how-it-works-authentication.md +++ b/windows/security/identity-protection/hello-for-business/hello-how-it-works-authentication.md @@ -5,9 +5,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security +audience: ITPro author: mikestephens-MS ms.author: mstephen -localizationpriority: high +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/19/2018 --- # Windows Hello for Business and Authentication diff --git a/windows/security/identity-protection/hello-for-business/hello-how-it-works-device-registration.md b/windows/security/identity-protection/hello-for-business/hello-how-it-works-device-registration.md index ce4c2db9b8..5bdfbc21f8 100644 --- a/windows/security/identity-protection/hello-for-business/hello-how-it-works-device-registration.md +++ b/windows/security/identity-protection/hello-for-business/hello-how-it-works-device-registration.md @@ -5,9 +5,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security +audience: ITPro author: mikestephens-MS ms.author: mstephen -localizationpriority: high +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/19/2018 --- # Windows Hello for Business and Device Registration diff --git a/windows/security/identity-protection/hello-for-business/hello-how-it-works-provisioning.md b/windows/security/identity-protection/hello-for-business/hello-how-it-works-provisioning.md index 9ccd6b2fb8..789395a1bf 100644 --- a/windows/security/identity-protection/hello-for-business/hello-how-it-works-provisioning.md +++ b/windows/security/identity-protection/hello-for-business/hello-how-it-works-provisioning.md @@ -5,9 +5,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security +audience: ITPro author: mikestephens-MS ms.author: mstephen -localizationpriority: high +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/19/2018 --- # Windows Hello for Business Provisioning diff --git a/windows/security/identity-protection/hello-for-business/hello-how-it-works-tech-deep-dive.md b/windows/security/identity-protection/hello-for-business/hello-how-it-works-tech-deep-dive.md index 7297f63ac7..e3304e2432 100644 --- a/windows/security/identity-protection/hello-for-business/hello-how-it-works-tech-deep-dive.md +++ b/windows/security/identity-protection/hello-for-business/hello-how-it-works-tech-deep-dive.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security +audience: ITPro author: mikestephens-MS ms.author: mstephen -localizationpriority: high +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/19/2018 --- # Technical Deep Dive diff --git a/windows/security/identity-protection/hello-for-business/hello-how-it-works-technology.md b/windows/security/identity-protection/hello-for-business/hello-how-it-works-technology.md index ab1a856a27..936c4a59e4 100644 --- a/windows/security/identity-protection/hello-for-business/hello-how-it-works-technology.md +++ b/windows/security/identity-protection/hello-for-business/hello-how-it-works-technology.md @@ -5,9 +5,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security +audience: ITPro author: mikestephens-MS ms.author: mstephen -localizationpriority: high +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 10/08/2018 --- # Technology and Terms diff --git a/windows/security/identity-protection/hello-for-business/hello-how-it-works.md b/windows/security/identity-protection/hello-for-business/hello-how-it-works.md index 8f2df655ab..d5904c2e0e 100644 --- a/windows/security/identity-protection/hello-for-business/hello-how-it-works.md +++ b/windows/security/identity-protection/hello-for-business/hello-how-it-works.md @@ -5,9 +5,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security +audience: ITPro author: mikestephens-MS ms.author: mstephen -localizationpriority: high +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 05/05/2018 --- # How Windows Hello for Business works diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-base.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-base.md index 42d6273775..4ddd3e27d4 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-base.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-base.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile +audience: ITPro author: mikestephens-MS ms.author: mstephen -localizationpriority: high +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/19/2018 --- # Configure Azure AD joined devices for On-premises Single-Sign On using Windows Hello for Business diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-cert.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-cert.md index dda2b53178..c7fd156e98 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-cert.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-cert.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile +audience: ITPro author: mikestephens-MS ms.author: mstephen -localizationpriority: high +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/19/2018 --- # Using Certificates for AADJ On-premises Single-sign On diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso.md index 063a6f0ffc..ed400300f7 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile +audience: ITPro author: mikestephens-MS ms.author: mstephen -localizationpriority: high +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/19/2018 --- # Azure AD Join Single Sign-on Deployment Guides diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-new-install.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-new-install.md index 376c0f16f1..4b487da424 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-new-install.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-new-install.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile +audience: ITPro author: mikestephens-MS ms.author: mstephen -ms.localizationpriority: medium +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/19/2018 --- # Windows Hello for Business Certificate Trust New Installation diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-devreg.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-devreg.md index 74d04ce826..cfbf292815 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-devreg.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-devreg.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile +audience: ITPro author: mikestephens-MS ms.author: mstephen -ms.localizationpriority: medium +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/18/2018 --- # Configure Device Registration for Hybrid Windows Hello for Business diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-prereqs.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-prereqs.md index 92edeb0db7..71ad012ce7 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-prereqs.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-prereqs.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile +audience: ITPro author: mikestephens-MS ms.author: mstephen -ms.localizationpriority: medium +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/19/2018 --- # Hybrid Windows Hello for Business Prerequisites diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust.md index 2ee49c9aae..317a2481b3 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile +audience: ITPro author: mikestephens-MS ms.author: mstephen -ms.localizationpriority: medium +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 09/08/2017 --- # Hybrid Azure AD joined Certificate Trust Deployment diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-provision.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-provision.md index a0296bf8a4..461d86ca82 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-provision.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-provision.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile +audience: ITPro author: mikestephens-MS ms.author: mstephen -ms.localizationpriority: medium +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/19/2018 --- # Hybrid Windows Hello for Business Provisioning diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-ad.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-ad.md index 4395d9c432..4f7dca8320 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-ad.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-ad.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile -ms.localizationpriority: medium +audience: ITPro author: mikestephens-MS ms.author: mstephen +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/19/2018 --- # Configuring Windows Hello for Business: Active Directory diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-adfs.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-adfs.md index 25208af1bd..fb95263ea4 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-adfs.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-adfs.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile -ms.localizationpriority: medium +audience: ITPro author: mikestephens-MS ms.author: mstephen +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/20/2018 --- # Configure Windows Hello for Business: Active Directory Federation Services diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-dir-sync.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-dir-sync.md index 7464c27892..559462a9db 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-dir-sync.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-dir-sync.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile -ms.localizationpriority: medium +audience: ITPro author: mikestephens-MS ms.author: mstephen +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 10/23/2017 --- # Configure Hybrid Windows Hello for Business: Directory Synchronization diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-pki.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-pki.md index f14eedf3af..56921a06b0 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-pki.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-pki.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile -ms.localizationpriority: medium +audience: ITPro author: mikestephens-MS ms.author: mstephen +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/19/2018 --- diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-policy.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-policy.md index 9728d0ac98..0ffc39e4d5 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-policy.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-policy.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile -ms.localizationpriority: medium +audience: ITPro author: mikestephens-MS ms.author: mstephen +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/19/2018 --- # Configure Hybrid Windows Hello for Business: Group Policy diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings.md index f3f298b684..49af90f1e4 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile -ms.localizationpriority: medium +audience: ITPro author: mikestephens-MS ms.author: mstephen +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/19/2018 --- # Configure Windows Hello for Business diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-new-install.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-new-install.md index ec4aa1375e..27ed68512f 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-new-install.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-new-install.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile +audience: ITPro author: mikestephens-MS ms.author: mstephen -ms.localizationpriority: medium +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/19/2018 --- # Windows Hello for Business Key Trust New Installation diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-devreg.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-devreg.md index 496b9711d3..baf9a0401a 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-devreg.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-devreg.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile +audience: ITPro author: mikestephens-MS ms.author: mstephen -ms.localizationpriority: medium +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/19/2018 --- # Configure Device Registration for Hybrid key trust Windows Hello for Business diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-dirsync.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-dirsync.md index ce2e65c934..3e829f4aa7 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-dirsync.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-dirsync.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile +audience: ITPro author: mikestephens-MS ms.author: mstephen -localizationpriority: high +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/19/2018 --- # Configure Directory Synchronization for Hybrid key trust Windows Hello for Business diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md index b6cbd28438..aebc17a2ae 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile +audience: ITPro author: mikestephens-MS ms.author: mstephen -localizationpriority: high +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/20/2018 --- # Hybrid Key trust Windows Hello for Business Prerequisites diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust.md index 5387747964..6759f1e112 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile +audience: ITPro author: mikestephens-MS ms.author: mstephen -ms.localizationpriority: medium +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/20/2018 --- # Hybrid Azure AD joined Key Trust Deployment diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-provision.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-provision.md index 06a470b1ce..47f83cea11 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-provision.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-provision.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile +audience: ITPro author: mikestephens-MS ms.author: mstephen -ms.localizationpriority: medium +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/20/2018 --- # Hybrid Windows Hello for Business Provisioning diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-ad.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-ad.md index c2821a19f1..1e1d1effdc 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-ad.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-ad.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile -ms.localizationpriority: medium +audience: ITPro author: mikestephens-MS ms.author: mstephen +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/20/2018 --- # Configuring Hybrid key trust Windows Hello for Business: Active Directory diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-dir-sync.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-dir-sync.md index 70dd6093e7..4ef86bfee8 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-dir-sync.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-dir-sync.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile -ms.localizationpriority: medium +audience: ITPro author: mikestephens-MS ms.author: mstephen +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/19/2018 --- # Configure Hybrid Windows Hello for Business: Directory Synchronization diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-pki.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-pki.md index d21998d065..3382dcb530 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-pki.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-pki.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile -ms.localizationpriority: medium +audience: ITPro author: mikestephens-MS ms.author: mstephen +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/19/2018 --- diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-policy.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-policy.md index ef10959add..9f081c920a 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-policy.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-policy.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile -localizationpriority: high +audience: ITPro author: mikestephens-MS ms.author: mstephen +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/20/2018 --- # Configure Hybrid Windows Hello for Business: Group Policy diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings.md index c28c97dce0..448963dfbd 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile -ms.localizationpriority: medium +audience: ITPro author: mikestephens-MS ms.author: mstephen +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/19/2018 --- # Configure Hybrid Windows Hello for Business key trust settings diff --git a/windows/security/identity-protection/hello-for-business/hello-identity-verification.md b/windows/security/identity-protection/hello-for-business/hello-identity-verification.md index 9c0f5c3a35..672ad0f33f 100644 --- a/windows/security/identity-protection/hello-for-business/hello-identity-verification.md +++ b/windows/security/identity-protection/hello-for-business/hello-identity-verification.md @@ -7,9 +7,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile +audience: ITPro author: mikestephens-MS ms.author: mstephen -localizationpriority: high +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 05/05/2018 --- # Windows Hello for Business diff --git a/windows/security/identity-protection/hello-for-business/hello-key-trust-adfs.md b/windows/security/identity-protection/hello-for-business/hello-key-trust-adfs.md index 0d2f3c602d..5cef71faf7 100644 --- a/windows/security/identity-protection/hello-for-business/hello-key-trust-adfs.md +++ b/windows/security/identity-protection/hello-for-business/hello-key-trust-adfs.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile +audience: ITPro author: mikestephens-MS ms.author: mstephen -ms.localizationpriority: medium +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/19/2018 --- # Prepare and Deploy Windows Server 2016 Active Directory Federation Services diff --git a/windows/security/identity-protection/hello-for-business/hello-key-trust-deploy-mfa.md b/windows/security/identity-protection/hello-for-business/hello-key-trust-deploy-mfa.md index 0db3bc6070..1d92e64857 100644 --- a/windows/security/identity-protection/hello-for-business/hello-key-trust-deploy-mfa.md +++ b/windows/security/identity-protection/hello-for-business/hello-key-trust-deploy-mfa.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile +audience: ITPro author: mikestephens-MS ms.author: mstephen -ms.localizationpriority: medium +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/19/2018 --- # Configure or Deploy Multifactor Authentication Services diff --git a/windows/security/identity-protection/hello-for-business/hello-key-trust-policy-settings.md b/windows/security/identity-protection/hello-for-business/hello-key-trust-policy-settings.md index f9c8f46088..e8cd8acaa1 100644 --- a/windows/security/identity-protection/hello-for-business/hello-key-trust-policy-settings.md +++ b/windows/security/identity-protection/hello-for-business/hello-key-trust-policy-settings.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile +audience: ITPro author: mikestephens-MS ms.author: mstephen -ms.localizationpriority: medium +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/19/2018 --- # Configure Windows Hello for Business Policy settings diff --git a/windows/security/identity-protection/hello-for-business/hello-key-trust-validate-ad-prereq.md b/windows/security/identity-protection/hello-for-business/hello-key-trust-validate-ad-prereq.md index 9c5067319d..4bd120cf26 100644 --- a/windows/security/identity-protection/hello-for-business/hello-key-trust-validate-ad-prereq.md +++ b/windows/security/identity-protection/hello-for-business/hello-key-trust-validate-ad-prereq.md @@ -7,9 +7,13 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile author: DaniHalfin -ms.localizationpriority: medium +audience: ITPro author: mikestephens-MS ms.author: mstephen +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/19/2018 --- # Validate Active Directory prerequisites diff --git a/windows/security/identity-protection/hello-for-business/hello-key-trust-validate-deploy-mfa.md b/windows/security/identity-protection/hello-for-business/hello-key-trust-validate-deploy-mfa.md index 5c80c9502b..11c3a1d90a 100644 --- a/windows/security/identity-protection/hello-for-business/hello-key-trust-validate-deploy-mfa.md +++ b/windows/security/identity-protection/hello-for-business/hello-key-trust-validate-deploy-mfa.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile +audience: ITPro author: mikestephens-MS ms.author: mstephen -ms.localizationpriority: medium +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/19/2018 --- # Validate and Deploy Multifactor Authentication Services (MFA) diff --git a/windows/security/identity-protection/hello-for-business/hello-key-trust-validate-pki.md b/windows/security/identity-protection/hello-for-business/hello-key-trust-validate-pki.md index 7a7999914a..8c28287378 100644 --- a/windows/security/identity-protection/hello-for-business/hello-key-trust-validate-pki.md +++ b/windows/security/identity-protection/hello-for-business/hello-key-trust-validate-pki.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile +audience: ITPro author: mikestephens-MS ms.author: mstephen -localizationpriority: high +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/19/2018 --- # Validate and Configure Public Key Infrastructure diff --git a/windows/security/identity-protection/hello-for-business/hello-manage-in-organization.md b/windows/security/identity-protection/hello-for-business/hello-manage-in-organization.md index f367ae301e..1558fe403a 100644 --- a/windows/security/identity-protection/hello-for-business/hello-manage-in-organization.md +++ b/windows/security/identity-protection/hello-for-business/hello-manage-in-organization.md @@ -7,9 +7,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: DaniHalfin -ms.localizationpriority: medium -ms.author: daniha +audience: ITPro +author: danihalfin +ms.author: danihalf +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 10/18/2017 --- diff --git a/windows/security/identity-protection/hello-for-business/hello-overview.md b/windows/security/identity-protection/hello-for-business/hello-overview.md index 09dfdad4dc..773be29f77 100644 --- a/windows/security/identity-protection/hello-for-business/hello-overview.md +++ b/windows/security/identity-protection/hello-for-business/hello-overview.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile +audience: ITPro author: mikestephens-MS ms.author: mstephen -ms.localizationpriority: high +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: conceptual +localizationpriority: medium --- # Windows Hello for Business Overview diff --git a/windows/security/identity-protection/hello-for-business/hello-planning-guide.md b/windows/security/identity-protection/hello-for-business/hello-planning-guide.md index b762cb48f0..b95f3a6b88 100644 --- a/windows/security/identity-protection/hello-for-business/hello-planning-guide.md +++ b/windows/security/identity-protection/hello-for-business/hello-planning-guide.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile +audience: ITPro author: mikestephens-MS ms.author: mstephen -localizationpriority: high +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: conceptual ms.date: 08/19/2018 --- # Planning a Windows Hello for Business Deployment diff --git a/windows/security/identity-protection/hello-for-business/hello-prepare-people-to-use.md b/windows/security/identity-protection/hello-for-business/hello-prepare-people-to-use.md index 363636202f..9f76cf67c8 100644 --- a/windows/security/identity-protection/hello-for-business/hello-prepare-people-to-use.md +++ b/windows/security/identity-protection/hello-for-business/hello-prepare-people-to-use.md @@ -7,9 +7,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security +audience: ITPro author: mikestephens-MS ms.author: mstephen -ms.localizationpriority: medium +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/19/2018 --- diff --git a/windows/security/identity-protection/hello-for-business/hello-videos.md b/windows/security/identity-protection/hello-for-business/hello-videos.md index 6c6251b3f1..cea13ff9d2 100644 --- a/windows/security/identity-protection/hello-for-business/hello-videos.md +++ b/windows/security/identity-protection/hello-for-business/hello-videos.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile +audience: ITPro author: mikestephens-MS ms.author: mstephen -localizationpriority: high +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/19/2018 --- # Windows Hello for Business Videos diff --git a/windows/security/identity-protection/hello-for-business/hello-why-pin-is-better-than-password.md b/windows/security/identity-protection/hello-for-business/hello-why-pin-is-better-than-password.md index c7eae511cd..2d9ac5058a 100644 --- a/windows/security/identity-protection/hello-for-business/hello-why-pin-is-better-than-password.md +++ b/windows/security/identity-protection/hello-for-business/hello-why-pin-is-better-than-password.md @@ -7,9 +7,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: DaniHalfin -ms.localizationpriority: medium -ms.author: daniha +audience: ITPro +author: danihalfin +ms.author: danihalf +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 10/23/2017 --- diff --git a/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key.md b/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key.md index fb9afb773b..376a238c8e 100644 --- a/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key.md +++ b/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key.md @@ -1,14 +1,18 @@ --- title: Microsoft-compatible security key -description: Windows 10 enables users to sign in to their device using a security key. How is a Microsoft-compatible security key different (and better) than any other FIDO2 security key +description: Windows 10 enables users to sign in to their device using a security key. How is a Microsoft-compatible security key different (and better) than any other FIDO2 security key keywords: FIDO2, security key, CTAP, Hello, WHFB ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile +audience: ITPro author: aabhathipsay ms.author: aathipsa -ms.localizationpriority: medium +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 11/14/2018 --- # What is a Microsoft-compatible security key? diff --git a/windows/security/identity-protection/hello-for-business/passwordless-strategy.md b/windows/security/identity-protection/hello-for-business/passwordless-strategy.md index 0156ec9a78..5f1296e64e 100644 --- a/windows/security/identity-protection/hello-for-business/passwordless-strategy.md +++ b/windows/security/identity-protection/hello-for-business/passwordless-strategy.md @@ -6,9 +6,13 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile +audience: ITPro author: mikestephens-MS ms.author: mstephen -localizationpriority: high +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 08/20/2018 --- # Password-less Strategy diff --git a/windows/security/identity-protection/hello-for-business/reset-security-key.md b/windows/security/identity-protection/hello-for-business/reset-security-key.md index 43aca85f75..1ed55612fa 100644 --- a/windows/security/identity-protection/hello-for-business/reset-security-key.md +++ b/windows/security/identity-protection/hello-for-business/reset-security-key.md @@ -1,14 +1,18 @@ --- title: Reset-security-key -description: Windows 10 enables users to sign in to their device using a security key. How to reset a security key +description: Windowsďż˝10 enables users to sign in to their device using a security key. How to reset a security key keywords: FIDO2, security key, CTAP, Microsoft-compatible security key ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security, mobile +audience: ITPro author: aabhathipsay ms.author: aathipsa -ms.localizationpriority: medium +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +localizationpriority: medium ms.date: 11/14/2018 --- # How to reset a Microsoft-compatible security key? diff --git a/windows/security/identity-protection/index.md b/windows/security/identity-protection/index.md index 1e0b600031..27324b9f2d 100644 --- a/windows/security/identity-protection/index.md +++ b/windows/security/identity-protection/index.md @@ -5,7 +5,12 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: brianlic-msft +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 02/05/2018 --- diff --git a/windows/security/identity-protection/installing-digital-certificates-on-windows-10-mobile.md b/windows/security/identity-protection/installing-digital-certificates-on-windows-10-mobile.md index 0c5455cd58..07bb80474c 100644 --- a/windows/security/identity-protection/installing-digital-certificates-on-windows-10-mobile.md +++ b/windows/security/identity-protection/installing-digital-certificates-on-windows-10-mobile.md @@ -7,7 +7,12 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: jdeckerms +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.localizationpriority: medium ms.date: 07/27/2017 --- diff --git a/windows/security/identity-protection/remote-credential-guard.md b/windows/security/identity-protection/remote-credential-guard.md index 3312502f59..6b8d985281 100644 --- a/windows/security/identity-protection/remote-credential-guard.md +++ b/windows/security/identity-protection/remote-credential-guard.md @@ -5,7 +5,12 @@ ms.prod: w10 ms.mktglfcycl: explore ms.sitesec: library ms.pagetype: security -author: brianlic-msft +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 01/12/2018 --- # Protect Remote Desktop credentials with Windows Defender Remote Credential Guard diff --git a/windows/security/identity-protection/smart-cards/smart-card-and-remote-desktop-services.md b/windows/security/identity-protection/smart-cards/smart-card-and-remote-desktop-services.md index 39707aa3da..5ad84f0acd 100644 --- a/windows/security/identity-protection/smart-cards/smart-card-and-remote-desktop-services.md +++ b/windows/security/identity-protection/smart-cards/smart-card-and-remote-desktop-services.md @@ -5,7 +5,12 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: Justinha +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 04/19/2017 --- diff --git a/windows/security/identity-protection/smart-cards/smart-card-architecture.md b/windows/security/identity-protection/smart-cards/smart-card-architecture.md index e33b59d31c..b6089dbdf2 100644 --- a/windows/security/identity-protection/smart-cards/smart-card-architecture.md +++ b/windows/security/identity-protection/smart-cards/smart-card-architecture.md @@ -5,7 +5,12 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: Justinha +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 04/19/2017 --- diff --git a/windows/security/identity-protection/smart-cards/smart-card-certificate-propagation-service.md b/windows/security/identity-protection/smart-cards/smart-card-certificate-propagation-service.md index 58d230fb04..1ee636098b 100644 --- a/windows/security/identity-protection/smart-cards/smart-card-certificate-propagation-service.md +++ b/windows/security/identity-protection/smart-cards/smart-card-certificate-propagation-service.md @@ -5,7 +5,12 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: Justinha +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 04/19/2017 --- diff --git a/windows/security/identity-protection/smart-cards/smart-card-certificate-requirements-and-enumeration.md b/windows/security/identity-protection/smart-cards/smart-card-certificate-requirements-and-enumeration.md index 4354757189..4799d410d7 100644 --- a/windows/security/identity-protection/smart-cards/smart-card-certificate-requirements-and-enumeration.md +++ b/windows/security/identity-protection/smart-cards/smart-card-certificate-requirements-and-enumeration.md @@ -5,7 +5,12 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: Justinha +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 04/19/2017 --- diff --git a/windows/security/identity-protection/smart-cards/smart-card-debugging-information.md b/windows/security/identity-protection/smart-cards/smart-card-debugging-information.md index 52c470aa92..18e18418b3 100644 --- a/windows/security/identity-protection/smart-cards/smart-card-debugging-information.md +++ b/windows/security/identity-protection/smart-cards/smart-card-debugging-information.md @@ -5,7 +5,12 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: Justinha +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 04/19/2017 --- diff --git a/windows/security/identity-protection/smart-cards/smart-card-events.md b/windows/security/identity-protection/smart-cards/smart-card-events.md index 0c626949d6..5e7a95c1eb 100644 --- a/windows/security/identity-protection/smart-cards/smart-card-events.md +++ b/windows/security/identity-protection/smart-cards/smart-card-events.md @@ -5,7 +5,12 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: Justinha +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 04/19/2017 --- diff --git a/windows/security/identity-protection/smart-cards/smart-card-group-policy-and-registry-settings.md b/windows/security/identity-protection/smart-cards/smart-card-group-policy-and-registry-settings.md index e30638b697..f29978c298 100644 --- a/windows/security/identity-protection/smart-cards/smart-card-group-policy-and-registry-settings.md +++ b/windows/security/identity-protection/smart-cards/smart-card-group-policy-and-registry-settings.md @@ -5,7 +5,12 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: Justinha +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 04/19/2017 --- diff --git a/windows/security/identity-protection/smart-cards/smart-card-how-smart-card-sign-in-works-in-windows.md b/windows/security/identity-protection/smart-cards/smart-card-how-smart-card-sign-in-works-in-windows.md index f9df3d2d77..5094cef3e3 100644 --- a/windows/security/identity-protection/smart-cards/smart-card-how-smart-card-sign-in-works-in-windows.md +++ b/windows/security/identity-protection/smart-cards/smart-card-how-smart-card-sign-in-works-in-windows.md @@ -5,7 +5,12 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: Justinha +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 04/19/2017 --- diff --git a/windows/security/identity-protection/smart-cards/smart-card-removal-policy-service.md b/windows/security/identity-protection/smart-cards/smart-card-removal-policy-service.md index 5d613942c1..eaf2095a74 100644 --- a/windows/security/identity-protection/smart-cards/smart-card-removal-policy-service.md +++ b/windows/security/identity-protection/smart-cards/smart-card-removal-policy-service.md @@ -5,7 +5,12 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: Justinha +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 04/19/2017 --- diff --git a/windows/security/identity-protection/smart-cards/smart-card-smart-cards-for-windows-service.md b/windows/security/identity-protection/smart-cards/smart-card-smart-cards-for-windows-service.md index 196bb6e4ec..1085c2c96f 100644 --- a/windows/security/identity-protection/smart-cards/smart-card-smart-cards-for-windows-service.md +++ b/windows/security/identity-protection/smart-cards/smart-card-smart-cards-for-windows-service.md @@ -5,7 +5,12 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: Justinha +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 04/19/2017 --- diff --git a/windows/security/identity-protection/smart-cards/smart-card-tools-and-settings.md b/windows/security/identity-protection/smart-cards/smart-card-tools-and-settings.md index 886bad7bf9..b2c80de568 100644 --- a/windows/security/identity-protection/smart-cards/smart-card-tools-and-settings.md +++ b/windows/security/identity-protection/smart-cards/smart-card-tools-and-settings.md @@ -5,7 +5,12 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: Justinha +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 04/19/2017 --- diff --git a/windows/security/identity-protection/smart-cards/smart-card-windows-smart-card-technical-reference.md b/windows/security/identity-protection/smart-cards/smart-card-windows-smart-card-technical-reference.md index fa41a42f7d..2beebdb095 100644 --- a/windows/security/identity-protection/smart-cards/smart-card-windows-smart-card-technical-reference.md +++ b/windows/security/identity-protection/smart-cards/smart-card-windows-smart-card-technical-reference.md @@ -5,7 +5,12 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: Justinha +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 04/19/2017 --- diff --git a/windows/security/identity-protection/user-account-control/how-user-account-control-works.md b/windows/security/identity-protection/user-account-control/how-user-account-control-works.md index 851edc7279..13e539022b 100644 --- a/windows/security/identity-protection/user-account-control/how-user-account-control-works.md +++ b/windows/security/identity-protection/user-account-control/how-user-account-control-works.md @@ -6,7 +6,12 @@ ms.prod: w10 ms.mktglfcycl: operate ms.sitesec: library ms.pagetype: security -author: brianlic-msft +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 11/16/2018 --- diff --git a/windows/security/identity-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings.md b/windows/security/identity-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings.md index 0854da77c6..d59b92a77f 100644 --- a/windows/security/identity-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings.md +++ b/windows/security/identity-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings.md @@ -5,7 +5,12 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: brianlic-msft +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 04/19/2017 --- diff --git a/windows/security/identity-protection/user-account-control/user-account-control-overview.md b/windows/security/identity-protection/user-account-control/user-account-control-overview.md index b208897c14..485cb1d9a4 100644 --- a/windows/security/identity-protection/user-account-control/user-account-control-overview.md +++ b/windows/security/identity-protection/user-account-control/user-account-control-overview.md @@ -7,7 +7,12 @@ ms.mktglfcycl: operate ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 07/27/2017 --- diff --git a/windows/security/identity-protection/user-account-control/user-account-control-security-policy-settings.md b/windows/security/identity-protection/user-account-control/user-account-control-security-policy-settings.md index 00b9bc3573..74ed925ef4 100644 --- a/windows/security/identity-protection/user-account-control/user-account-control-security-policy-settings.md +++ b/windows/security/identity-protection/user-account-control/user-account-control-security-policy-settings.md @@ -6,7 +6,12 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: brianlic-msft +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 04/19/2017 --- diff --git a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-deploy-virtual-smart-cards.md b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-deploy-virtual-smart-cards.md index 06c5e2b538..b98146f01b 100644 --- a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-deploy-virtual-smart-cards.md +++ b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-deploy-virtual-smart-cards.md @@ -5,7 +5,12 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: Justinha +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 04/19/2017 --- diff --git a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-evaluate-security.md b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-evaluate-security.md index 32ad78341e..169c653f6f 100644 --- a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-evaluate-security.md +++ b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-evaluate-security.md @@ -5,7 +5,12 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: Justinha +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 04/19/2017 --- diff --git a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-get-started.md b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-get-started.md index 3565c5e1c6..fe4845066d 100644 --- a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-get-started.md +++ b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-get-started.md @@ -5,7 +5,12 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: Justinha +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 04/19/2017 --- diff --git a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-overview.md b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-overview.md index b2e25477d9..4a6fad06dd 100644 --- a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-overview.md +++ b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-overview.md @@ -5,7 +5,12 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: Justinha +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: conceptual ms.date: 10/13/2017 --- diff --git a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-tpmvscmgr.md b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-tpmvscmgr.md index 6b41c05246..46404dc908 100644 --- a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-tpmvscmgr.md +++ b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-tpmvscmgr.md @@ -5,7 +5,12 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: Justinha +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 04/19/2017 --- diff --git a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-understanding-and-evaluating.md b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-understanding-and-evaluating.md index 60bc3ab032..3c46398424 100644 --- a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-understanding-and-evaluating.md +++ b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-understanding-and-evaluating.md @@ -5,7 +5,12 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: Justinha +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 04/19/2017 --- diff --git a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md index 00d53274ff..00602a7e77 100644 --- a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md +++ b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md @@ -5,7 +5,12 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: Justinha +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 10/13/2017 --- diff --git a/windows/security/identity-protection/windows-credential-theft-mitigation-guide-abstract.md b/windows/security/identity-protection/windows-credential-theft-mitigation-guide-abstract.md index 9ad00797a5..981ed888d6 100644 --- a/windows/security/identity-protection/windows-credential-theft-mitigation-guide-abstract.md +++ b/windows/security/identity-protection/windows-credential-theft-mitigation-guide-abstract.md @@ -6,7 +6,12 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: justinha +audience: ITPro +author: danihalfin +ms.author: daniha +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article ms.date: 04/19/2017 --- From 0b87bb2b96da1c3c48a1099ec92b4135432c4e54 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Thu, 21 Feb 2019 09:35:39 -0800 Subject: [PATCH 65/76] Update control-usb-devices-using-intune.md --- .../control-usb-devices-using-intune.md | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md index d61268d81f..663f55f8a0 100644 --- a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md +++ b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md @@ -8,14 +8,14 @@ ms.pagetype: security ms.localizationpriority: medium ms.author: justinha author: justinha -ms.date: 02/06/2019 +ms.date: 02/21/2019 --- # How to control USB devices and other removable media using Windows Defender ATP **Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) -Windows Defender ATP provides multiple monitoring and control features for USB peripherals to help prevent threats in unauthorized peripherals from compromising your devices: +Microsoft recommends [a layered approach to securing removable media](https://aka.ms/devicecontrolblog), and Windows Defender ATP provides multiple monitoring and control features to help prevent threats in unauthorized peripherals from compromising your devices: 1. [Prevent threats from removable storage](#prevent-threats-from-removable-storage) introduced by removable storage devices by enabling: - [Windows Defender Antivirus real-time protection (RTP)](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus) to scan removable storage for malware. @@ -30,9 +30,9 @@ Windows Defender ATP provides multiple monitoring and control features for USB p - Flexible policy assignment of device installation settings based on an individual or group of Azure Active Directory (Azure AD) users and devices. >[!NOTE] ->These threat reduction measures help prevent malware from coming into your environment. To protect enterprise data from leaving your environment, you can also configure data loss prevention measures. For example, on Windows 10 devices you can configure [BitLocker](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-overview) and [Windows Information Protection](https://docs.microsoft.com/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure), which will encrypt company data even if it is stored on a personal device, or use the [Storage/RemovableDiskDenyWriteAccess CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-storage#storage-removablediskdenywriteaccess) to deny write access to removable disks. +>These threat reduction measures help prevent malware from coming into your environment. To protect enterprise data from leaving your environment, you can also configure data loss prevention measures. For example, on Windows 10 devices you can configure [BitLocker](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-overview) and [Windows Information Protection](https://docs.microsoft.com/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure), which will encrypt company data even if it is stored on a personal device, or use the [Storage/RemovableDiskDenyWriteAccess CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-storage#storage-removablediskdenywriteaccess) to deny write access to removable disks. Additionally, you can [classify and protect files on Windows devices](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview) (including their mounted USB devices) by using Windows Defender ATP and Azure Information Protection. -For more information about controlling USB devices, see the [Microsoft Secure blog "WDATP has protections for USB and removable devices"](https://aka.ms/devicecontrolblog). +For more information about controlling USB devices, see the [Microsoft Secure blog "WDATP has protections for USB and removable devices"]. ## Prevent threats from removable storage @@ -167,11 +167,11 @@ Allowing installation of specific devices requires also enabling [DeviceInstalla ### Prevent installation of specifically prohibited peripherals -Windows Defender ATP also blocks installation and usage of prohibited peripherals either by using **Administrative Templates** or [Device Installation CSP settings](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-deviceinstallation) with a custom profile in Intune. +Windows Defender ATP blocks installation and usage of prohibited peripherals by using either of these options: -For more information about using **Administrative Templates**, see [Windows 10 templates to configure Group Policy settings in Microsoft Intune](https://docs.microsoft.com/intune/administrative-templates-windows). +- [Administrative Templates](https://docs.microsoft.com/intune/administrative-templates-windows) +- [Device Installation CSP settings](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-deviceinstallation) with a custom profile in Intune. You can [prevent installation of specific device IDs](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-deviceinstallation#deviceinstallation-preventinstallationofmatchingdeviceids) or [prevent specific device classes](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-deviceinstallation#deviceinstallation-preventinstallationofmatchingdevicesetupclasses). -For a SyncML example that prevents installation of specific device IDs, see [DeviceInstallation/PreventInstallationOfMatchingDeviceIDs CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-deviceinstallation#deviceinstallation-preventinstallationofmatchingdeviceids). To prevent specific device classes, see [DeviceInstallation/PreventInstallationOfMatchingDeviceSetupClasses CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-deviceinstallation#deviceinstallation-preventinstallationofmatchingdevicesetupclasses). ## Related topics From 04e178094cbad59dc4daf556a1a4ab43e2bf1c7b Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Thu, 21 Feb 2019 10:19:02 -0800 Subject: [PATCH 66/76] Update bitlocker-overview-and-requirements-faq.md --- .../bitlocker/bitlocker-overview-and-requirements-faq.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/information-protection/bitlocker/bitlocker-overview-and-requirements-faq.md b/windows/security/information-protection/bitlocker/bitlocker-overview-and-requirements-faq.md index 0623101946..12479b7ab1 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-overview-and-requirements-faq.md +++ b/windows/security/information-protection/bitlocker/bitlocker-overview-and-requirements-faq.md @@ -8,7 +8,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: brianlic-msft -ms.date: 05/03/2018 +ms.date: 02/21/2019 --- # BitLocker Overview and Requirements FAQ @@ -43,7 +43,7 @@ Two partitions are required to run BitLocker because pre-startup authentication ## Which Trusted Platform Modules (TPMs) does BitLocker support? -BitLocker supports TPM version 1.2 or higher. +BitLocker supports TPM version 1.2 or higher. BitLocker support for TPM 2.0 requires Unified Extensible Firmware Interface (UEFI) for the device. ## How can I tell if a TPM is on my computer? From d9c829ca3c389902647d62a49eba2d39b92c99cd Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Thu, 21 Feb 2019 10:19:08 -0800 Subject: [PATCH 67/76] Update control-usb-devices-using-intune.md --- .../device-control/control-usb-devices-using-intune.md | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md index 663f55f8a0..dafdfb910f 100644 --- a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md +++ b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md @@ -29,10 +29,9 @@ Microsoft recommends [a layered approach to securing removable media](https://ak - Granular configuration to deny write access to removable disks and approve or deny devices by USB vendor code, product code, device IDs, or a combination. - Flexible policy assignment of device installation settings based on an individual or group of Azure Active Directory (Azure AD) users and devices. ->[!NOTE] ->These threat reduction measures help prevent malware from coming into your environment. To protect enterprise data from leaving your environment, you can also configure data loss prevention measures. For example, on Windows 10 devices you can configure [BitLocker](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-overview) and [Windows Information Protection](https://docs.microsoft.com/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure), which will encrypt company data even if it is stored on a personal device, or use the [Storage/RemovableDiskDenyWriteAccess CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-storage#storage-removablediskdenywriteaccess) to deny write access to removable disks. Additionally, you can [classify and protect files on Windows devices](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview) (including their mounted USB devices) by using Windows Defender ATP and Azure Information Protection. -For more information about controlling USB devices, see the [Microsoft Secure blog "WDATP has protections for USB and removable devices"]. +These threat reduction measures help prevent malware from coming into your environment. To protect enterprise data from leaving your environment, you can also configure data loss prevention measures. For example, on Windows 10 devices you can configure [BitLocker](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-overview) and [Windows Information Protection](https://docs.microsoft.com/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure), which will encrypt company data even if it is stored on a personal device, or use the [Storage/RemovableDiskDenyWriteAccess CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-storage#storage-removablediskdenywriteaccess) to deny write access to removable disks. Additionally, you can [classify and protect files on Windows devices](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview) (including their mounted USB devices) by using Windows Defender ATP and Azure Information Protection. + ## Prevent threats from removable storage From 76471f253e9504ddcbad1aa1283d80a0120bd1e6 Mon Sep 17 00:00:00 2001 From: "H. Poulsen" Date: Thu, 21 Feb 2019 10:28:28 -0800 Subject: [PATCH 68/76] Update collect-data-using-enterprise-site-discovery.md Updated info and links related to Upgrade Readiness (formerly known as Upgrade Analytics) --- .../collect-data-using-enterprise-site-discovery.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/browsers/internet-explorer/ie11-deploy-guide/collect-data-using-enterprise-site-discovery.md b/browsers/internet-explorer/ie11-deploy-guide/collect-data-using-enterprise-site-discovery.md index 5d6a571e4a..424b01e58e 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/collect-data-using-enterprise-site-discovery.md +++ b/browsers/internet-explorer/ie11-deploy-guide/collect-data-using-enterprise-site-discovery.md @@ -20,8 +20,8 @@ ms.date: 07/27/2017 Use Internet Explorer to collect data on computers running Windows Internet Explorer 8 through Internet Explorer 11 on Windows 10, Windows 8.1, or Windows 7. This inventory information helps you build a list of websites used by your company so you can make more informed decisions about your IE deployments, including figuring out which sites might be at risk or require overhauls during future upgrades. ->**Upgrade Analytics and Windows upgrades**
    ->You can use Upgrade Analytics to help manage your Windows 10 upgrades on devices running Windows 8.1 and Windows 7 (SP1). You can also use Upgrade Analytics to review several site discovery reports. Check out Upgrade Analytics from [here](https://technet.microsoft.com/itpro/windows/deploy/upgrade-analytics-get-started). +>**Upgrade Readiness and Windows upgrades**
    +>You can use Upgrade Readiness to help manage your Windows 10 upgrades on devices running Windows 8.1 and Windows 7 (SP1). You can also use Upgrade Readiness to review several site discovery reports. For more information, see [Manage Windows upgrades with Upgrade Readiness](https://docs.microsoft.com/en-us/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness). ## Before you begin From 3aa70d4ce86ced4d788658800c5b20b37e31951c Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Thu, 21 Feb 2019 11:58:37 -0800 Subject: [PATCH 69/76] edits added new metadata --- .../bitlocker/bcd-settings-and-bitlocker.md | 6 +++++- .../bitlocker/bitlocker-and-adds-faq.md | 6 +++++- .../bitlocker/bitlocker-basic-deployment.md | 6 +++++- .../bitlocker/bitlocker-countermeasures.md | 6 +++++- .../bitlocker-deployment-and-administration-faq.md | 6 +++++- .../bitlocker/bitlocker-frequently-asked-questions.md | 6 +++++- .../bitlocker/bitlocker-group-policy-settings.md | 6 +++++- .../bitlocker/bitlocker-how-to-deploy-on-windows-server.md | 6 +++++- .../bitlocker/bitlocker-how-to-enable-network-unlock.md | 6 +++++- .../bitlocker/bitlocker-key-management-faq.md | 6 +++++- .../bitlocker/bitlocker-management-for-enterprises.md | 6 +++++- .../bitlocker/bitlocker-network-unlock-faq.md | 6 +++++- .../bitlocker/bitlocker-overview-and-requirements-faq.md | 6 +++++- .../information-protection/bitlocker/bitlocker-overview.md | 6 +++++- .../bitlocker/bitlocker-recovery-guide-plan.md | 6 +++++- .../bitlocker/bitlocker-security-faq.md | 6 +++++- .../information-protection/bitlocker/bitlocker-to-go-faq.md | 6 +++++- .../bitlocker/bitlocker-upgrading-faq.md | 6 +++++- ...-bitlocker-drive-encryption-tools-to-manage-bitlocker.md | 6 +++++- .../bitlocker-use-bitlocker-recovery-password-viewer.md | 6 +++++- .../bitlocker/bitlocker-using-with-other-programs-faq.md | 6 +++++- ...your-organization-for-bitlocker-planning-and-policies.md | 6 +++++- ...ared-volumes-and-storage-area-networks-with-bitlocker.md | 6 +++++- .../security/information-protection/encrypted-hard-drive.md | 6 +++++- windows/security/information-protection/index.md | 6 +++++- .../secure-the-windows-10-boot-process.md | 6 +++++- .../tpm/backup-tpm-recovery-information-to-ad-ds.md | 6 +++++- .../tpm/change-the-tpm-owner-password.md | 6 +++++- .../information-protection/tpm/how-windows-uses-the-tpm.md | 6 +++++- .../tpm/initialize-and-configure-ownership-of-the-tpm.md | 6 +++++- .../information-protection/tpm/manage-tpm-commands.md | 6 +++++- .../information-protection/tpm/manage-tpm-lockout.md | 6 +++++- .../tpm/switch-pcr-banks-on-tpm-2-0-devices.md | 6 +++++- .../security/information-protection/tpm/tpm-fundamentals.md | 6 +++++- .../information-protection/tpm/tpm-recommendations.md | 6 +++++- .../tpm/trusted-platform-module-overview.md | 6 +++++- ...rusted-platform-module-services-group-policy-settings.md | 6 +++++- .../tpm/trusted-platform-module-top-node.md | 6 +++++- .../auditing/advanced-security-audit-policy-settings.md | 6 +++++- .../auditing/advanced-security-auditing-faq.md | 6 +++++- .../auditing/advanced-security-auditing.md | 6 +++++- .../apply-a-basic-audit-policy-on-a-file-or-folder.md | 6 +++++- .../auditing/basic-audit-account-logon-events.md | 6 +++++- .../auditing/basic-audit-account-management.md | 6 +++++- .../auditing/basic-audit-directory-service-access.md | 6 +++++- .../threat-protection/auditing/basic-audit-logon-events.md | 6 +++++- .../threat-protection/auditing/basic-audit-object-access.md | 6 +++++- .../threat-protection/auditing/basic-audit-policy-change.md | 6 +++++- .../threat-protection/auditing/basic-audit-privilege-use.md | 6 +++++- .../auditing/basic-audit-process-tracking.md | 6 +++++- .../threat-protection/auditing/basic-audit-system-events.md | 6 +++++- .../auditing/basic-security-audit-policies.md | 6 +++++- .../auditing/basic-security-audit-policy-settings.md | 6 +++++- ...e-a-basic-audit-policy-settings-for-an-event-category.md | 6 +++++- .../auditing/file-system-global-object-access-auditing.md | 6 +++++- .../monitor-central-access-policy-and-rule-definitions.md | 6 +++++- .../threat-protection/auditing/monitor-claim-types.md | 6 +++++- .../auditing/monitor-resource-attribute-definitions.md | 6 +++++- ...ral-access-policies-associated-with-files-and-folders.md | 6 +++++- ...e-central-access-policies-that-apply-on-a-file-server.md | 6 +++++- .../monitor-the-resource-attributes-on-files-and-folders.md | 6 +++++- .../monitor-the-use-of-removable-storage-devices.md | 6 +++++- .../monitor-user-and-device-claims-during-sign-in.md | 6 +++++- ...anning-and-deploying-advanced-security-audit-policies.md | 6 +++++- .../auditing/registry-global-object-access-auditing.md | 6 +++++- .../auditing/security-auditing-overview.md | 6 +++++- ...ing-options-to-monitor-dynamic-access-control-objects.md | 6 +++++- .../auditing/view-the-security-event-log.md | 6 +++++- ...f-windows-support-advanced-audit-policy-configuration.md | 6 +++++- .../change-history-for-threat-protection.md | 6 +++++- .../threat-protection/get-support-for-security-baselines.md | 6 +++++- .../threat-protection/security-compliance-toolkit-10.md | 6 +++++- .../access-credential-manager-as-a-trusted-caller.md | 6 +++++- .../access-this-computer-from-the-network.md | 6 +++++- .../security-policy-settings/account-lockout-duration.md | 6 +++++- .../security-policy-settings/account-lockout-policy.md | 6 +++++- .../security-policy-settings/account-lockout-threshold.md | 6 +++++- .../security-policy-settings/account-policies.md | 6 +++++- .../accounts-administrator-account-status.md | 6 +++++- .../accounts-block-microsoft-accounts.md | 6 +++++- .../accounts-guest-account-status.md | 6 +++++- ...-account-use-of-blank-passwords-to-console-logon-only.md | 6 +++++- .../accounts-rename-administrator-account.md | 6 +++++- .../accounts-rename-guest-account.md | 6 +++++- .../act-as-part-of-the-operating-system.md | 6 +++++- .../security-policy-settings/add-workstations-to-domain.md | 6 +++++- .../adjust-memory-quotas-for-a-process.md | 6 +++++- .../administer-security-policy-settings.md | 6 +++++- .../security-policy-settings/allow-log-on-locally.md | 6 +++++- .../allow-log-on-through-remote-desktop-services.md | 6 +++++- .../audit-audit-the-access-of-global-system-objects.md | 6 +++++- .../audit-audit-the-use-of-backup-and-restore-privilege.md | 6 +++++- ...t-force-audit-policy-subcategory-settings-to-override.md | 6 +++++- .../security-policy-settings/audit-policy.md | 6 +++++- ...n-system-immediately-if-unable-to-log-security-audits.md | 6 +++++- .../back-up-files-and-directories.md | 6 +++++- .../security-policy-settings/bypass-traverse-checking.md | 6 +++++- .../security-policy-settings/change-the-system-time.md | 6 +++++- .../security-policy-settings/change-the-time-zone.md | 6 +++++- .../security-policy-settings/create-a-pagefile.md | 6 +++++- .../security-policy-settings/create-a-token-object.md | 6 +++++- .../security-policy-settings/create-global-objects.md | 6 +++++- .../create-permanent-shared-objects.md | 6 +++++- .../security-policy-settings/create-symbolic-links.md | 6 +++++- ...n-security-descriptor-definition-language-sddl-syntax.md | 6 +++++- ...n-security-descriptor-definition-language-sddl-syntax.md | 6 +++++- .../security-policy-settings/debug-programs.md | 6 +++++- .../deny-access-to-this-computer-from-the-network.md | 6 +++++- .../security-policy-settings/deny-log-on-as-a-batch-job.md | 6 +++++- .../security-policy-settings/deny-log-on-as-a-service.md | 6 +++++- .../security-policy-settings/deny-log-on-locally.md | 6 +++++- .../deny-log-on-through-remote-desktop-services.md | 6 +++++- .../devices-allow-undock-without-having-to-log-on.md | 6 +++++- .../devices-allowed-to-format-and-eject-removable-media.md | 6 +++++- ...devices-prevent-users-from-installing-printer-drivers.md | 6 +++++- ...restrict-cd-rom-access-to-locally-logged-on-user-only.md | 6 +++++- ...restrict-floppy-access-to-locally-logged-on-user-only.md | 6 +++++- ...n-controller-allow-server-operators-to-schedule-tasks.md | 6 +++++- .../domain-controller-ldap-server-signing-requirements.md | 6 +++++- ...in-controller-refuse-machine-account-password-changes.md | 6 +++++- ...-digitally-encrypt-or-sign-secure-channel-data-always.md | 6 +++++- ...r-digitally-encrypt-secure-channel-data-when-possible.md | 6 +++++- ...mber-digitally-sign-secure-channel-data-when-possible.md | 6 +++++- ...omain-member-disable-machine-account-password-changes.md | 6 +++++- .../domain-member-maximum-machine-account-password-age.md | 6 +++++- ...mber-require-strong-windows-2000-or-later-session-key.md | 6 +++++- ...mputer-and-user-accounts-to-be-trusted-for-delegation.md | 6 +++++- .../security-policy-settings/enforce-password-history.md | 6 +++++- .../enforce-user-logon-restrictions.md | 6 +++++- .../force-shutdown-from-a-remote-system.md | 6 +++++- .../security-policy-settings/generate-security-audits.md | 6 +++++- .../how-to-configure-security-policy-settings.md | 6 +++++- .../impersonate-a-client-after-authentication.md | 6 +++++- .../increase-a-process-working-set.md | 6 +++++- .../increase-scheduling-priority.md | 6 +++++- ...n-display-user-information-when-the-session-is-locked.md | 6 +++++- .../interactive-logon-do-not-display-last-user-name.md | 6 +++++- .../interactive-logon-do-not-require-ctrl-alt-del.md | 6 +++++- .../interactive-logon-dont-display-username-at-sign-in.md | 6 +++++- .../interactive-logon-machine-account-lockout-threshold.md | 6 +++++- .../interactive-logon-machine-inactivity-limit.md | 6 +++++- ...ive-logon-message-text-for-users-attempting-to-log-on.md | 6 +++++- ...ve-logon-message-title-for-users-attempting-to-log-on.md | 6 +++++- ...s-to-cache-in-case-domain-controller-is-not-available.md | 6 +++++- ...ogon-prompt-user-to-change-password-before-expiration.md | 6 +++++- ...omain-controller-authentication-to-unlock-workstation.md | 6 +++++- .../interactive-logon-require-smart-card.md | 6 +++++- .../interactive-logon-smart-card-removal-behavior.md | 6 +++++- .../security-policy-settings/kerberos-policy.md | 6 +++++- .../load-and-unload-device-drivers.md | 6 +++++- .../security-policy-settings/lock-pages-in-memory.md | 6 +++++- .../security-policy-settings/log-on-as-a-batch-job.md | 6 +++++- .../security-policy-settings/log-on-as-a-service.md | 6 +++++- .../manage-auditing-and-security-log.md | 6 +++++- .../maximum-lifetime-for-service-ticket.md | 6 +++++- .../maximum-lifetime-for-user-ticket-renewal.md | 6 +++++- .../maximum-lifetime-for-user-ticket.md | 6 +++++- .../security-policy-settings/maximum-password-age.md | 6 +++++- .../maximum-tolerance-for-computer-clock-synchronization.md | 6 +++++- ...-send-unencrypted-password-to-third-party-smb-servers.md | 6 +++++- ...mount-of-idle-time-required-before-suspending-session.md | 6 +++++- ...k-server-attempt-s4u2self-to-obtain-claim-information.md | 6 +++++- ...t-network-server-digitally-sign-communications-always.md | 6 +++++- ...ork-server-disconnect-clients-when-logon-hours-expire.md | 6 +++++- ...etwork-server-server-spn-target-name-validation-level.md | 6 +++++- .../security-policy-settings/minimum-password-length.md | 6 +++++- .../security-policy-settings/modify-an-object-label.md | 6 +++++- .../modify-firmware-environment-values.md | 6 +++++- .../network-access-allow-anonymous-sidname-translation.md | 6 +++++- ...llow-anonymous-enumeration-of-sam-accounts-and-shares.md | 6 +++++- ...ss-do-not-allow-anonymous-enumeration-of-sam-accounts.md | 6 +++++- ...-passwords-and-credentials-for-network-authentication.md | 6 +++++- ...ess-let-everyone-permissions-apply-to-anonymous-users.md | 6 +++++- ...k-access-named-pipes-that-can-be-accessed-anonymously.md | 6 +++++- ...ccess-remotely-accessible-registry-paths-and-subpaths.md | 6 +++++- .../network-access-remotely-accessible-registry-paths.md | 6 +++++- ...s-restrict-anonymous-access-to-named-pipes-and-shares.md | 6 +++++- ...etwork-access-shares-that-can-be-accessed-anonymously.md | 6 +++++- ...-access-sharing-and-security-model-for-local-accounts.md | 6 +++++- .../network-list-manager-policies.md | 6 +++++- ...-allow-local-system-to-use-computer-identity-for-ntlm.md | 6 +++++- ...work-security-allow-localsystem-null-session-fallback.md | 6 +++++- ...on-requests-to-this-computer-to-use-online-identities.md | 6 +++++- ...urity-configure-encryption-types-allowed-for-kerberos.md | 6 +++++- ...-store-lan-manager-hash-value-on-next-password-change.md | 6 +++++- ...network-security-force-logoff-when-logon-hours-expire.md | 6 +++++- .../network-security-lan-manager-authentication-level.md | 6 +++++- .../network-security-ldap-client-signing-requirements.md | 6 +++++- ...urity-for-ntlm-ssp-based-including-secure-rpc-clients.md | 6 +++++- ...urity-for-ntlm-ssp-based-including-secure-rpc-servers.md | 6 +++++- ...-add-remote-server-exceptions-for-ntlm-authentication.md | 6 +++++- ...ty-restrict-ntlm-add-server-exceptions-in-this-domain.md | 6 +++++- ...rk-security-restrict-ntlm-audit-incoming-ntlm-traffic.md | 6 +++++- ...estrict-ntlm-audit-ntlm-authentication-in-this-domain.md | 6 +++++- .../network-security-restrict-ntlm-incoming-ntlm-traffic.md | 6 +++++- ...rity-restrict-ntlm-ntlm-authentication-in-this-domain.md | 6 +++++- ...restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md | 6 +++++- .../password-must-meet-complexity-requirements.md | 6 +++++- .../security-policy-settings/password-policy.md | 6 +++++- .../perform-volume-maintenance-tasks.md | 6 +++++- .../security-policy-settings/profile-single-process.md | 6 +++++- .../security-policy-settings/profile-system-performance.md | 6 +++++- ...recovery-console-allow-automatic-administrative-logon.md | 6 +++++- ...llow-floppy-copy-and-access-to-all-drives-and-folders.md | 6 +++++- .../remove-computer-from-docking-station.md | 6 +++++- .../replace-a-process-level-token.md | 6 +++++- .../reset-account-lockout-counter-after.md | 6 +++++- .../restore-files-and-directories.md | 6 +++++- .../secpol-advanced-security-audit-policy-settings.md | 6 +++++- .../security-policy-settings-reference.md | 6 +++++- .../security-policy-settings/security-policy-settings.md | 6 +++++- .../security-policy-settings/shut-down-the-system.md | 6 +++++- ...allow-system-to-be-shut-down-without-having-to-log-on.md | 6 +++++- .../shutdown-clear-virtual-memory-pagefile.md | 6 +++++- ...t-network-client-digitally-sign-communications-always.md | 6 +++++- ...client-digitally-sign-communications-if-server-agrees.md | 6 +++++- ...t-network-server-digitally-sign-communications-always.md | 6 +++++- ...server-digitally-sign-communications-if-client-agrees.md | 6 +++++- .../store-passwords-using-reversible-encryption.md | 6 +++++- .../synchronize-directory-service-data.md | 6 +++++- ...g-key-protection-for-user-keys-stored-on-the-computer.md | 6 +++++- ...mpliant-algorithms-for-encryption-hashing-and-signing.md | 6 +++++- ...require-case-insensitivity-for-non-windows-subsystems.md | 6 +++++- ...ngthen-default-permissions-of-internal-system-objects.md | 6 +++++- .../system-settings-optional-subsystems.md | 6 +++++- ...windows-executables-for-software-restriction-policies.md | 6 +++++- .../take-ownership-of-files-or-other-objects.md | 6 +++++- ...-approval-mode-for-the-built-in-administrator-account.md | 6 +++++- ...prompt-for-elevation-without-using-the-secure-desktop.md | 6 +++++- ...tion-prompt-for-administrators-in-admin-approval-mode.md | 6 +++++- ...l-behavior-of-the-elevation-prompt-for-standard-users.md | 6 +++++- ...ct-application-installations-and-prompt-for-elevation.md | 6 +++++- ...nly-elevate-executables-that-are-signed-and-validated.md | 6 +++++- ...s-applications-that-are-installed-in-secure-locations.md | 6 +++++- ...control-run-all-administrators-in-admin-approval-mode.md | 6 +++++- ...ch-to-the-secure-desktop-when-prompting-for-elevation.md | 6 +++++- ...ile-and-registry-write-failures-to-per-user-locations.md | 6 +++++- .../security-policy-settings/user-rights-assignment.md | 6 +++++- ...ules-for-packaged-apps-to-existing-applocker-rule-set.md | 6 +++++- .../applocker/administer-applocker-using-mdm.md | 6 +++++- .../applocker/administer-applocker.md | 6 +++++- .../applocker/applocker-architecture-and-components.md | 6 +++++- .../applocker/applocker-functions.md | 6 +++++- .../applocker/applocker-overview.md | 6 +++++- .../applocker/applocker-policies-deployment-guide.md | 6 +++++- .../applocker/applocker-policies-design-guide.md | 6 +++++- .../applocker/applocker-policy-use-scenarios.md | 6 +++++- .../applocker/applocker-processes-and-interactions.md | 6 +++++- .../applocker/applocker-settings.md | 6 +++++- .../applocker/applocker-technical-reference.md | 6 +++++- .../configure-an-applocker-policy-for-audit-only.md | 6 +++++- .../configure-an-applocker-policy-for-enforce-rules.md | 6 +++++- .../applocker/configure-exceptions-for-an-applocker-rule.md | 6 +++++- .../applocker/configure-the-appLocker-reference-device.md | 6 +++++- .../applocker/configure-the-application-identity-service.md | 6 +++++- .../applocker/create-a-rule-for-packaged-apps.md | 6 +++++- .../create-a-rule-that-uses-a-file-hash-condition.md | 6 +++++- .../applocker/create-a-rule-that-uses-a-path-condition.md | 6 +++++- .../create-a-rule-that-uses-a-publisher-condition.md | 6 +++++- .../applocker/create-applocker-default-rules.md | 6 +++++- ...-list-of-applications-deployed-to-each-business-group.md | 6 +++++- .../applocker/create-your-applocker-policies.md | 6 +++++- .../applocker/create-your-applocker-rules.md | 6 +++++- .../applocker/delete-an-applocker-rule.md | 6 +++++- ...applocker-policies-by-using-the-enforce-rules-setting.md | 6 +++++- .../deploy-the-applocker-policy-into-production.md | 6 +++++- ...determine-group-policy-structure-and-rule-enforcement.md | 6 +++++- ...ications-are-digitally-signed-on-a-reference-computer.md | 6 +++++- .../determine-your-application-control-objectives.md | 6 +++++- ...l-message-when-users-try-to-run-a-blocked-application.md | 6 +++++- .../applocker/dll-rules-in-applocker.md | 6 +++++- ...group-policy-structure-and-applocker-rule-enforcement.md | 6 +++++- .../applocker/document-your-application-list.md | 6 +++++- .../applocker/document-your-applocker-rules.md | 6 +++++- .../applocker/edit-an-applocker-policy.md | 6 +++++- .../applocker/edit-applocker-rules.md | 6 +++++- .../applocker/enable-the-dll-rule-collection.md | 6 +++++- .../applocker/enforce-applocker-rules.md | 6 +++++- .../applocker/executable-rules-in-applocker.md | 6 +++++- .../applocker/export-an-applocker-policy-from-a-gpo.md | 6 +++++- .../applocker/export-an-applocker-policy-to-an-xml-file.md | 6 +++++- .../applocker/how-applocker-works-techref.md | 6 +++++- .../import-an-applocker-policy-from-another-computer.md | 6 +++++- .../applocker/import-an-applocker-policy-into-a-gpo.md | 6 +++++- .../applocker/maintain-applocker-policies.md | 6 +++++- .../applocker/manage-packaged-apps-with-applocker.md | 6 +++++- ...merge-applocker-policies-by-using-set-applockerpolicy.md | 6 +++++- .../applocker/merge-applocker-policies-manually.md | 6 +++++- .../applocker/monitor-application-usage-with-applocker.md | 6 +++++- .../applocker/optimize-applocker-performance.md | 6 +++++- ...ed-apps-and-packaged-app-installer-rules-in-applocker.md | 6 +++++- .../applocker/plan-for-applocker-policy-management.md | 6 +++++- .../applocker/refresh-an-applocker-policy.md | 6 +++++- .../requirements-for-deploying-applocker-policies.md | 6 +++++- .../applocker/requirements-to-use-applocker.md | 6 +++++- .../run-the-automatically-generate-rules-wizard.md | 6 +++++- .../applocker/script-rules-in-applocker.md | 6 +++++- .../applocker/security-considerations-for-applocker.md | 6 +++++- .../applocker/select-types-of-rules-to-create.md | 6 +++++- ...est-an-applocker-policy-by-using-test-applockerpolicy.md | 6 +++++- .../applocker/test-and-update-an-applocker-policy.md | 6 +++++- .../applocker/tools-to-use-with-applocker.md | 6 +++++- .../applocker/understand-applocker-enforcement-settings.md | 6 +++++- .../understand-applocker-policy-design-decisions.md | 6 +++++- ...s-and-enforcement-setting-inheritance-in-group-policy.md | 6 +++++- .../understand-the-applocker-policy-deployment-process.md | 6 +++++- ...derstanding-applocker-allow-and-deny-actions-on-rules.md | 6 +++++- .../applocker/understanding-applocker-default-rules.md | 6 +++++- .../applocker/understanding-applocker-rule-behavior.md | 6 +++++- .../applocker/understanding-applocker-rule-collections.md | 6 +++++- .../understanding-applocker-rule-condition-types.md | 6 +++++- .../applocker/understanding-applocker-rule-exceptions.md | 6 +++++- ...derstanding-the-file-hash-rule-condition-in-applocker.md | 6 +++++- .../understanding-the-path-rule-condition-in-applocker.md | 6 +++++- ...derstanding-the-publisher-rule-condition-in-applocker.md | 6 +++++- ...ce-computer-to-create-and-maintain-applocker-policies.md | 6 +++++- ...-and-software-restriction-policies-in-the-same-domain.md | 6 +++++- .../use-the-applocker-windows-powershell-cmdlets.md | 6 +++++- .../applocker/using-event-viewer-with-applocker.md | 6 +++++- ...-software-restriction-policies-and-applocker-policies.md | 6 +++++- .../applocker/what-is-applocker.md | 6 +++++- .../applocker/windows-installer-rules-in-applocker.md | 6 +++++- .../applocker/working-with-applocker-policies.md | 6 +++++- ...indows-defender-application-control-planning-document.md | 6 +++++- ...ows-defender-application-control-management-processes.md | 6 +++++- .../types-of-devices.md | 6 +++++- .../windows-defender-application-control-design-guide.md | 6 +++++- ...ble-virtualization-based-protection-of-code-integrity.md | 6 +++++- ...for-virtualization-based-protection-of-code-integrity.md | 6 +++++- ...production-devices-to-the-membership-group-for-a-zone.md | 6 +++++- .../add-test-devices-to-the-membership-group-for-a-zone.md | 6 +++++- ...le-gpo-template-files-for-settings-used-in-this-guide.md | 6 +++++- .../assign-security-group-filters-to-the-gpo.md | 6 +++++- .../windows-firewall/basic-firewall-policy-design.md | 6 +++++- .../windows-firewall/boundary-zone-gpos.md | 6 +++++- .../threat-protection/windows-firewall/boundary-zone.md | 6 +++++- .../certificate-based-isolation-policy-design-example.md | 6 +++++- .../certificate-based-isolation-policy-design.md | 6 +++++- .../change-rules-from-request-to-require-mode.md | 6 +++++- .../checklist-configuring-basic-firewall-settings.md | 6 +++++- ...ecklist-configuring-rules-for-an-isolated-server-zone.md | 6 +++++- ...ules-for-servers-in-a-standalone-isolated-server-zone.md | 6 +++++- .../checklist-configuring-rules-for-the-boundary-zone.md | 6 +++++- .../checklist-configuring-rules-for-the-encryption-zone.md | 6 +++++- .../checklist-configuring-rules-for-the-isolated-domain.md | 6 +++++- .../checklist-creating-group-policy-objects.md | 6 +++++- .../checklist-creating-inbound-firewall-rules.md | 6 +++++- .../checklist-creating-outbound-firewall-rules.md | 6 +++++- ...ules-for-clients-of-a-standalone-isolated-server-zone.md | 6 +++++- ...checklist-implementing-a-basic-firewall-policy-design.md | 6 +++++- ...lementing-a-certificate-based-isolation-policy-design.md | 6 +++++- ...ecklist-implementing-a-domain-isolation-policy-design.md | 6 +++++- ...lementing-a-standalone-server-isolation-policy-design.md | 6 +++++- .../windows-firewall/configure-authentication-methods.md | 6 +++++- .../configure-data-protection-quick-mode-settings.md | 6 +++++- ...re-group-policy-to-autoenroll-and-deploy-certificates.md | 6 +++++- .../configure-key-exchange-main-mode-settings.md | 6 +++++- .../configure-the-rules-to-require-encryption.md | 6 +++++- .../windows-firewall/configure-the-windows-firewall-log.md | 6 +++++- ...l-to-suppress-notifications-when-a-program-is-blocked.md | 6 +++++- .../confirm-that-certificates-are-deployed-correctly.md | 6 +++++- .../windows-firewall/copy-a-gpo-to-create-a-new-gpo.md | 6 +++++- .../create-a-group-account-in-active-directory.md | 6 +++++- .../windows-firewall/create-a-group-policy-object.md | 6 +++++- .../create-an-authentication-exemption-list-rule.md | 6 +++++- .../create-an-authentication-request-rule.md | 6 +++++- .../windows-firewall/create-an-inbound-icmp-rule.md | 6 +++++- .../windows-firewall/create-an-inbound-port-rule.md | 6 +++++- .../create-an-inbound-program-or-service-rule.md | 6 +++++- .../windows-firewall/create-an-outbound-port-rule.md | 6 +++++- .../create-an-outbound-program-or-service-rule.md | 6 +++++- .../windows-firewall/create-inbound-rules-to-support-rpc.md | 6 +++++- .../windows-firewall/create-wmi-filters-for-the-gpo.md | 6 +++++- ...ng-a-windows-firewall-with-advanced-security-strategy.md | 6 +++++- .../determining-the-trusted-state-of-your-devices.md | 6 +++++- .../windows-firewall/documenting-the-zones.md | 6 +++++- .../domain-isolation-policy-design-example.md | 6 +++++- .../windows-firewall/domain-isolation-policy-design.md | 6 +++++- .../windows-firewall/enable-predefined-inbound-rules.md | 6 +++++- .../windows-firewall/enable-predefined-outbound-rules.md | 6 +++++- .../windows-firewall/encryption-zone-gpos.md | 6 +++++- .../threat-protection/windows-firewall/encryption-zone.md | 6 +++++- ...ndows-firewall-with-advanced-security-design-examples.md | 6 +++++- .../windows-firewall/exempt-icmp-from-authentication.md | 6 +++++- .../threat-protection/windows-firewall/exemption-list.md | 6 +++++- .../threat-protection/windows-firewall/firewall-gpos.md | 6 +++++- .../windows-firewall/firewall-policy-design-example.md | 6 +++++- ...ng-information-about-your-active-directory-deployment.md | 6 +++++- ...information-about-your-current-network-infrastructure.md | 6 +++++- .../gathering-information-about-your-devices.md | 6 +++++- .../gathering-other-relevant-information.md | 6 +++++- .../windows-firewall/gathering-the-information-you-need.md | 6 +++++- .../windows-firewall/gpo-domiso-boundary.md | 6 +++++- .../windows-firewall/gpo-domiso-encryption.md | 6 +++++- .../windows-firewall/gpo-domiso-firewall.md | 6 +++++- .../windows-firewall/gpo-domiso-isolateddomain-clients.md | 6 +++++- .../windows-firewall/gpo-domiso-isolateddomain-servers.md | 6 +++++- ...dows-firewall-with-advanced-security-deployment-goals.md | 6 +++++- ...r-windows-firewall-with-advanced-security-design-plan.md | 6 +++++- .../windows-firewall/isolated-domain-gpos.md | 6 +++++- .../threat-protection/windows-firewall/isolated-domain.md | 6 +++++- .../windows-firewall/isolating-apps-on-your-network.md | 6 +++++- .../windows-firewall/link-the-gpo-to-the-domain.md | 6 +++++- ...s-to-a-windows-firewall-with-advanced-security-design.md | 6 +++++- ...rs-to-apply-to-a-different-zone-or-version-of-windows.md | 6 +++++- ...oup-policy-management-console-to-ip-security-policies.md | 6 +++++- ...nt-console-to-windows-firewall-with-advanced-security.md | 6 +++++- ...e-group-policy-management-console-to-windows-firewall.md | 6 +++++- .../open-windows-firewall-with-advanced-security.md | 6 +++++- .../planning-certificate-based-authentication.md | 6 +++++- .../windows-firewall/planning-domain-isolation-zones.md | 6 +++++- .../windows-firewall/planning-gpo-deployment.md | 6 +++++- ...ning-group-policy-deployment-for-your-isolation-zones.md | 6 +++++- .../planning-isolation-groups-for-the-zones.md | 6 +++++- .../windows-firewall/planning-network-access-groups.md | 6 +++++- .../windows-firewall/planning-server-isolation-zones.md | 6 +++++- .../planning-settings-for-a-basic-firewall-policy.md | 6 +++++- .../threat-protection/windows-firewall/planning-the-gpos.md | 6 +++++- ...ing-to-deploy-windows-firewall-with-advanced-security.md | 6 +++++- ...g-your-windows-firewall-with-advanced-security-design.md | 6 +++++- .../windows-firewall/procedures-used-in-this-guide.md | 6 +++++- .../protect-devices-from-unwanted-network-traffic.md | 6 +++++- ...encryption-when-accessing-sensitive-network-resources.md | 6 +++++- .../restrict-access-to-only-specified-users-or-devices.md | 6 +++++- .../restrict-access-to-only-trusted-devices.md | 6 +++++- .../restrict-server-access-to-members-of-a-group-only.md | 6 +++++- .../securing-end-to-end-ipsec-connections-by-using-ikev2.md | 6 +++++- .../windows-firewall/server-isolation-gpos.md | 6 +++++- .../server-isolation-policy-design-example.md | 6 +++++- .../windows-firewall/server-isolation-policy-design.md | 6 +++++- ...rn-on-windows-firewall-and-configure-default-behavior.md | 6 +++++- ...indows-firewall-with-advanced-security-design-process.md | 6 +++++- .../verify-that-network-traffic-is-authenticated.md | 6 +++++- ...anced-security-administration-with-windows-powershell.md | 6 +++++- ...dows-firewall-with-advanced-security-deployment-guide.md | 6 +++++- .../windows-firewall-with-advanced-security-design-guide.md | 6 +++++- .../windows-firewall-with-advanced-security.md | 6 +++++- .../threat-protection/windows-security-baselines.md | 6 +++++- 438 files changed, 2190 insertions(+), 438 deletions(-) diff --git a/windows/security/information-protection/bitlocker/bcd-settings-and-bitlocker.md b/windows/security/information-protection/bitlocker/bcd-settings-and-bitlocker.md index 6fecccdc81..89aeaf1312 100644 --- a/windows/security/information-protection/bitlocker/bcd-settings-and-bitlocker.md +++ b/windows/security/information-protection/bitlocker/bcd-settings-and-bitlocker.md @@ -6,7 +6,11 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/21/2017 --- diff --git a/windows/security/information-protection/bitlocker/bitlocker-and-adds-faq.md b/windows/security/information-protection/bitlocker/bitlocker-and-adds-faq.md index d90cb76d42..ba3d34afe1 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-and-adds-faq.md +++ b/windows/security/information-protection/bitlocker/bitlocker-and-adds-faq.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 05/03/2018 --- diff --git a/windows/security/information-protection/bitlocker/bitlocker-basic-deployment.md b/windows/security/information-protection/bitlocker/bitlocker-basic-deployment.md index cf809e8fc8..592be01143 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-basic-deployment.md +++ b/windows/security/information-protection/bitlocker/bitlocker-basic-deployment.md @@ -6,7 +6,11 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/information-protection/bitlocker/bitlocker-countermeasures.md b/windows/security/information-protection/bitlocker/bitlocker-countermeasures.md index d4ebe56664..2655d0474e 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-countermeasures.md +++ b/windows/security/information-protection/bitlocker/bitlocker-countermeasures.md @@ -6,7 +6,11 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/06/2018 --- diff --git a/windows/security/information-protection/bitlocker/bitlocker-deployment-and-administration-faq.md b/windows/security/information-protection/bitlocker/bitlocker-deployment-and-administration-faq.md index adaf53c91e..28ec21a3bf 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-deployment-and-administration-faq.md +++ b/windows/security/information-protection/bitlocker/bitlocker-deployment-and-administration-faq.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 06/25/2018 --- diff --git a/windows/security/information-protection/bitlocker/bitlocker-frequently-asked-questions.md b/windows/security/information-protection/bitlocker/bitlocker-frequently-asked-questions.md index e810ee9889..26f1385795 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-frequently-asked-questions.md +++ b/windows/security/information-protection/bitlocker/bitlocker-frequently-asked-questions.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 05/03/2018 --- diff --git a/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings.md b/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings.md index 64800a4fe1..5107934ed4 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings.md +++ b/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings.md @@ -6,7 +6,11 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 11/03/2017 --- diff --git a/windows/security/information-protection/bitlocker/bitlocker-how-to-deploy-on-windows-server.md b/windows/security/information-protection/bitlocker/bitlocker-how-to-deploy-on-windows-server.md index 972960257a..e505fa5f8d 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-how-to-deploy-on-windows-server.md +++ b/windows/security/information-protection/bitlocker/bitlocker-how-to-deploy-on-windows-server.md @@ -6,7 +6,11 @@ ms.prod: windows-server-threshold ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 02/19/2019 --- diff --git a/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md b/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md index 4643595543..e5fb0fc634 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md +++ b/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md @@ -6,7 +6,11 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 06/18/2018 --- diff --git a/windows/security/information-protection/bitlocker/bitlocker-key-management-faq.md b/windows/security/information-protection/bitlocker/bitlocker-key-management-faq.md index dcf559c46d..686e594e1e 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-key-management-faq.md +++ b/windows/security/information-protection/bitlocker/bitlocker-key-management-faq.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 05/03/2018 --- diff --git a/windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises.md b/windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises.md index 3a6301c3fc..38e4da5877 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises.md +++ b/windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 01/26/2019 --- diff --git a/windows/security/information-protection/bitlocker/bitlocker-network-unlock-faq.md b/windows/security/information-protection/bitlocker/bitlocker-network-unlock-faq.md index 78325f1ee2..fbdf7d7e41 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-network-unlock-faq.md +++ b/windows/security/information-protection/bitlocker/bitlocker-network-unlock-faq.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 05/03/2018 --- diff --git a/windows/security/information-protection/bitlocker/bitlocker-overview-and-requirements-faq.md b/windows/security/information-protection/bitlocker/bitlocker-overview-and-requirements-faq.md index 0623101946..801c368bc3 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-overview-and-requirements-faq.md +++ b/windows/security/information-protection/bitlocker/bitlocker-overview-and-requirements-faq.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 05/03/2018 --- diff --git a/windows/security/information-protection/bitlocker/bitlocker-overview.md b/windows/security/information-protection/bitlocker/bitlocker-overview.md index 8431b2341b..42574c9514 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-overview.md +++ b/windows/security/information-protection/bitlocker/bitlocker-overview.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 01/26/2018 --- diff --git a/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan.md b/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan.md index 9e78e1465a..2c7235ba57 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan.md +++ b/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan.md @@ -6,7 +6,11 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual --- # BitLocker recovery guide diff --git a/windows/security/information-protection/bitlocker/bitlocker-security-faq.md b/windows/security/information-protection/bitlocker/bitlocker-security-faq.md index 8ef7812544..0b345c1349 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-security-faq.md +++ b/windows/security/information-protection/bitlocker/bitlocker-security-faq.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 06/12/2018 --- diff --git a/windows/security/information-protection/bitlocker/bitlocker-to-go-faq.md b/windows/security/information-protection/bitlocker/bitlocker-to-go-faq.md index 66780914d3..eb1afcd6a5 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-to-go-faq.md +++ b/windows/security/information-protection/bitlocker/bitlocker-to-go-faq.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 07/10/2018 --- diff --git a/windows/security/information-protection/bitlocker/bitlocker-upgrading-faq.md b/windows/security/information-protection/bitlocker/bitlocker-upgrading-faq.md index 69e24624d0..1b10ce9876 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-upgrading-faq.md +++ b/windows/security/information-protection/bitlocker/bitlocker-upgrading-faq.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 05/03/2018 --- diff --git a/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md b/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md index d3ec59e360..d65bc1e6ed 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md +++ b/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md @@ -6,7 +6,11 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/25/2017 --- diff --git a/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-recovery-password-viewer.md b/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-recovery-password-viewer.md index d835ee97f5..84411a03ec 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-recovery-password-viewer.md +++ b/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-recovery-password-viewer.md @@ -6,7 +6,11 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/information-protection/bitlocker/bitlocker-using-with-other-programs-faq.md b/windows/security/information-protection/bitlocker/bitlocker-using-with-other-programs-faq.md index 1edcded5ee..fb49f2d779 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-using-with-other-programs-faq.md +++ b/windows/security/information-protection/bitlocker/bitlocker-using-with-other-programs-faq.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 07/10/2018 --- diff --git a/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md b/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md index efa0edfef4..658600d2ea 100644 --- a/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md +++ b/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md @@ -6,7 +6,11 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 06/04/2018 --- diff --git a/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md b/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md index b7fb12a822..228b3241e9 100644 --- a/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md +++ b/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md @@ -6,7 +6,11 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 06/19/2017 --- diff --git a/windows/security/information-protection/encrypted-hard-drive.md b/windows/security/information-protection/encrypted-hard-drive.md index 6d4df86d67..97d7c8d5e6 100644 --- a/windows/security/information-protection/encrypted-hard-drive.md +++ b/windows/security/information-protection/encrypted-hard-drive.md @@ -6,7 +6,11 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/information-protection/index.md b/windows/security/information-protection/index.md index 8d7bde1868..e17bd5c51b 100644 --- a/windows/security/information-protection/index.md +++ b/windows/security/information-protection/index.md @@ -5,7 +5,11 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 10/10/2018 --- diff --git a/windows/security/information-protection/secure-the-windows-10-boot-process.md b/windows/security/information-protection/secure-the-windows-10-boot-process.md index cb56f52198..37232dee00 100644 --- a/windows/security/information-protection/secure-the-windows-10-boot-process.md +++ b/windows/security/information-protection/secure-the-windows-10-boot-process.md @@ -7,7 +7,11 @@ ms.mktglfcycl: Explore ms.pagetype: security ms.sitesec: library ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 11/16/2018 --- diff --git a/windows/security/information-protection/tpm/backup-tpm-recovery-information-to-ad-ds.md b/windows/security/information-protection/tpm/backup-tpm-recovery-information-to-ad-ds.md index ad48ae604e..2ad21a5ff0 100644 --- a/windows/security/information-protection/tpm/backup-tpm-recovery-information-to-ad-ds.md +++ b/windows/security/information-protection/tpm/backup-tpm-recovery-information-to-ad-ds.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security author: andreabichsel -ms.author: v-anbic +ms.author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/information-protection/tpm/change-the-tpm-owner-password.md b/windows/security/information-protection/tpm/change-the-tpm-owner-password.md index df37e941b5..5f8805bb4e 100644 --- a/windows/security/information-protection/tpm/change-the-tpm-owner-password.md +++ b/windows/security/information-protection/tpm/change-the-tpm-owner-password.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security author: andreabichsel -ms.author: v-anbic +ms.author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/information-protection/tpm/how-windows-uses-the-tpm.md b/windows/security/information-protection/tpm/how-windows-uses-the-tpm.md index 1cc72bd01d..6800a86d9a 100644 --- a/windows/security/information-protection/tpm/how-windows-uses-the-tpm.md +++ b/windows/security/information-protection/tpm/how-windows-uses-the-tpm.md @@ -8,7 +8,11 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: andreabichsel -ms.author: v-anbic +ms.author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 10/27/2017 --- diff --git a/windows/security/information-protection/tpm/initialize-and-configure-ownership-of-the-tpm.md b/windows/security/information-protection/tpm/initialize-and-configure-ownership-of-the-tpm.md index 37d77fa8e0..5296588ad5 100644 --- a/windows/security/information-protection/tpm/initialize-and-configure-ownership-of-the-tpm.md +++ b/windows/security/information-protection/tpm/initialize-and-configure-ownership-of-the-tpm.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security author: andreabichsel -ms.author: v-anbic +ms.author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/11/2018 --- diff --git a/windows/security/information-protection/tpm/manage-tpm-commands.md b/windows/security/information-protection/tpm/manage-tpm-commands.md index 201fa3eafd..ce4f195e2f 100644 --- a/windows/security/information-protection/tpm/manage-tpm-commands.md +++ b/windows/security/information-protection/tpm/manage-tpm-commands.md @@ -6,7 +6,11 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 11/30/2017 --- diff --git a/windows/security/information-protection/tpm/manage-tpm-lockout.md b/windows/security/information-protection/tpm/manage-tpm-lockout.md index 6f31a72d96..57322cf856 100644 --- a/windows/security/information-protection/tpm/manage-tpm-lockout.md +++ b/windows/security/information-protection/tpm/manage-tpm-lockout.md @@ -6,7 +6,11 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 05/02/2017 --- # Manage TPM lockout diff --git a/windows/security/information-protection/tpm/switch-pcr-banks-on-tpm-2-0-devices.md b/windows/security/information-protection/tpm/switch-pcr-banks-on-tpm-2-0-devices.md index 164658f0a0..eacf850aab 100644 --- a/windows/security/information-protection/tpm/switch-pcr-banks-on-tpm-2-0-devices.md +++ b/windows/security/information-protection/tpm/switch-pcr-banks-on-tpm-2-0-devices.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security author: andreabichsel -ms.author: v-anbic +ms.author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/information-protection/tpm/tpm-fundamentals.md b/windows/security/information-protection/tpm/tpm-fundamentals.md index 09faeded0c..e826eb601c 100644 --- a/windows/security/information-protection/tpm/tpm-fundamentals.md +++ b/windows/security/information-protection/tpm/tpm-fundamentals.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security author: andreabichsel -ms.author: v-anbic +ms.author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/16/2017 --- diff --git a/windows/security/information-protection/tpm/tpm-recommendations.md b/windows/security/information-protection/tpm/tpm-recommendations.md index 36ab2dd427..c7ef09ffc6 100644 --- a/windows/security/information-protection/tpm/tpm-recommendations.md +++ b/windows/security/information-protection/tpm/tpm-recommendations.md @@ -8,7 +8,11 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: andreabichsel -ms.author: v-anbic +ms.author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 11/29/2018 --- diff --git a/windows/security/information-protection/tpm/trusted-platform-module-overview.md b/windows/security/information-protection/tpm/trusted-platform-module-overview.md index 3d34861247..3f858bbcb9 100644 --- a/windows/security/information-protection/tpm/trusted-platform-module-overview.md +++ b/windows/security/information-protection/tpm/trusted-platform-module-overview.md @@ -8,7 +8,11 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: andreabichsel -ms-author: v-anbic +ms-author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 11/29/2018 --- diff --git a/windows/security/information-protection/tpm/trusted-platform-module-services-group-policy-settings.md b/windows/security/information-protection/tpm/trusted-platform-module-services-group-policy-settings.md index 0b2740ff70..6b661fde27 100644 --- a/windows/security/information-protection/tpm/trusted-platform-module-services-group-policy-settings.md +++ b/windows/security/information-protection/tpm/trusted-platform-module-services-group-policy-settings.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security author: andreabichsel -ms.author: v-anbic +ms.author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 10/02/2018 --- diff --git a/windows/security/information-protection/tpm/trusted-platform-module-top-node.md b/windows/security/information-protection/tpm/trusted-platform-module-top-node.md index f66b65f12b..91a5e57e1f 100644 --- a/windows/security/information-protection/tpm/trusted-platform-module-top-node.md +++ b/windows/security/information-protection/tpm/trusted-platform-module-top-node.md @@ -7,7 +7,11 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: andreabichsel -ms.author: v-anbic +ms.author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/11/2018 --- diff --git a/windows/security/threat-protection/auditing/advanced-security-audit-policy-settings.md b/windows/security/threat-protection/auditing/advanced-security-audit-policy-settings.md index f9a028c36e..842cb0b7bb 100644 --- a/windows/security/threat-protection/auditing/advanced-security-audit-policy-settings.md +++ b/windows/security/threat-protection/auditing/advanced-security-audit-policy-settings.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: none -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/auditing/advanced-security-auditing-faq.md b/windows/security/threat-protection/auditing/advanced-security-auditing-faq.md index 80aac0ab42..6935b85eb1 100644 --- a/windows/security/threat-protection/auditing/advanced-security-auditing-faq.md +++ b/windows/security/threat-protection/auditing/advanced-security-auditing-faq.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: none -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/auditing/advanced-security-auditing.md b/windows/security/threat-protection/auditing/advanced-security-auditing.md index 95b7643f60..4d960b6b9a 100644 --- a/windows/security/threat-protection/auditing/advanced-security-auditing.md +++ b/windows/security/threat-protection/auditing/advanced-security-auditing.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: none -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md index 8b1f8421eb..6622f7fc55 100644 --- a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md +++ b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: none -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 07/25/2018 --- diff --git a/windows/security/threat-protection/auditing/basic-audit-account-logon-events.md b/windows/security/threat-protection/auditing/basic-audit-account-logon-events.md index 8b87a565cb..7f78b5f46d 100644 --- a/windows/security/threat-protection/auditing/basic-audit-account-logon-events.md +++ b/windows/security/threat-protection/auditing/basic-audit-account-logon-events.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: none -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/auditing/basic-audit-account-management.md b/windows/security/threat-protection/auditing/basic-audit-account-management.md index 5ae03bbe81..ac22b4c4fe 100644 --- a/windows/security/threat-protection/auditing/basic-audit-account-management.md +++ b/windows/security/threat-protection/auditing/basic-audit-account-management.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: none -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/auditing/basic-audit-directory-service-access.md b/windows/security/threat-protection/auditing/basic-audit-directory-service-access.md index aea8e2c6a8..0de79e98e7 100644 --- a/windows/security/threat-protection/auditing/basic-audit-directory-service-access.md +++ b/windows/security/threat-protection/auditing/basic-audit-directory-service-access.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: none -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/auditing/basic-audit-logon-events.md b/windows/security/threat-protection/auditing/basic-audit-logon-events.md index 5ac16f81ca..2bcf48cc8b 100644 --- a/windows/security/threat-protection/auditing/basic-audit-logon-events.md +++ b/windows/security/threat-protection/auditing/basic-audit-logon-events.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: none -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/auditing/basic-audit-object-access.md b/windows/security/threat-protection/auditing/basic-audit-object-access.md index 564f09756f..ec41b532a0 100644 --- a/windows/security/threat-protection/auditing/basic-audit-object-access.md +++ b/windows/security/threat-protection/auditing/basic-audit-object-access.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: none -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/auditing/basic-audit-policy-change.md b/windows/security/threat-protection/auditing/basic-audit-policy-change.md index d6fa0d9840..129ea370a0 100644 --- a/windows/security/threat-protection/auditing/basic-audit-policy-change.md +++ b/windows/security/threat-protection/auditing/basic-audit-policy-change.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: none -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/auditing/basic-audit-privilege-use.md b/windows/security/threat-protection/auditing/basic-audit-privilege-use.md index 12b823cf4e..7980a4d633 100644 --- a/windows/security/threat-protection/auditing/basic-audit-privilege-use.md +++ b/windows/security/threat-protection/auditing/basic-audit-privilege-use.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: none -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/auditing/basic-audit-process-tracking.md b/windows/security/threat-protection/auditing/basic-audit-process-tracking.md index ada9f8ba66..6c5869c87d 100644 --- a/windows/security/threat-protection/auditing/basic-audit-process-tracking.md +++ b/windows/security/threat-protection/auditing/basic-audit-process-tracking.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: none -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/auditing/basic-audit-system-events.md b/windows/security/threat-protection/auditing/basic-audit-system-events.md index 1c30f0f216..efc11bd08e 100644 --- a/windows/security/threat-protection/auditing/basic-audit-system-events.md +++ b/windows/security/threat-protection/auditing/basic-audit-system-events.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: none -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/auditing/basic-security-audit-policies.md b/windows/security/threat-protection/auditing/basic-security-audit-policies.md index 87389a5d60..9a3ba69bf5 100644 --- a/windows/security/threat-protection/auditing/basic-security-audit-policies.md +++ b/windows/security/threat-protection/auditing/basic-security-audit-policies.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: none -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/auditing/basic-security-audit-policy-settings.md b/windows/security/threat-protection/auditing/basic-security-audit-policy-settings.md index 814491f237..2a98ef92e3 100644 --- a/windows/security/threat-protection/auditing/basic-security-audit-policy-settings.md +++ b/windows/security/threat-protection/auditing/basic-security-audit-policy-settings.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: none -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/auditing/create-a-basic-audit-policy-settings-for-an-event-category.md b/windows/security/threat-protection/auditing/create-a-basic-audit-policy-settings-for-an-event-category.md index 71a8cdfc2c..b3ca1eb32d 100644 --- a/windows/security/threat-protection/auditing/create-a-basic-audit-policy-settings-for-an-event-category.md +++ b/windows/security/threat-protection/auditing/create-a-basic-audit-policy-settings-for-an-event-category.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: none -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/auditing/file-system-global-object-access-auditing.md b/windows/security/threat-protection/auditing/file-system-global-object-access-auditing.md index 7964ac323a..f056c5bcbf 100644 --- a/windows/security/threat-protection/auditing/file-system-global-object-access-auditing.md +++ b/windows/security/threat-protection/auditing/file-system-global-object-access-auditing.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/auditing/monitor-central-access-policy-and-rule-definitions.md b/windows/security/threat-protection/auditing/monitor-central-access-policy-and-rule-definitions.md index 439c9c1b3f..8ac19f8a63 100644 --- a/windows/security/threat-protection/auditing/monitor-central-access-policy-and-rule-definitions.md +++ b/windows/security/threat-protection/auditing/monitor-central-access-policy-and-rule-definitions.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/auditing/monitor-claim-types.md b/windows/security/threat-protection/auditing/monitor-claim-types.md index 7aeb903d71..05c48b5b7f 100644 --- a/windows/security/threat-protection/auditing/monitor-claim-types.md +++ b/windows/security/threat-protection/auditing/monitor-claim-types.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/auditing/monitor-resource-attribute-definitions.md b/windows/security/threat-protection/auditing/monitor-resource-attribute-definitions.md index c99548b8fd..caebb3f391 100644 --- a/windows/security/threat-protection/auditing/monitor-resource-attribute-definitions.md +++ b/windows/security/threat-protection/auditing/monitor-resource-attribute-definitions.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/auditing/monitor-the-central-access-policies-associated-with-files-and-folders.md b/windows/security/threat-protection/auditing/monitor-the-central-access-policies-associated-with-files-and-folders.md index a6c28921e2..a2936e96f6 100644 --- a/windows/security/threat-protection/auditing/monitor-the-central-access-policies-associated-with-files-and-folders.md +++ b/windows/security/threat-protection/auditing/monitor-the-central-access-policies-associated-with-files-and-folders.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/auditing/monitor-the-central-access-policies-that-apply-on-a-file-server.md b/windows/security/threat-protection/auditing/monitor-the-central-access-policies-that-apply-on-a-file-server.md index 51df126e27..d53ec727de 100644 --- a/windows/security/threat-protection/auditing/monitor-the-central-access-policies-that-apply-on-a-file-server.md +++ b/windows/security/threat-protection/auditing/monitor-the-central-access-policies-that-apply-on-a-file-server.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/auditing/monitor-the-resource-attributes-on-files-and-folders.md b/windows/security/threat-protection/auditing/monitor-the-resource-attributes-on-files-and-folders.md index 94d8efbfe0..d7f19b5369 100644 --- a/windows/security/threat-protection/auditing/monitor-the-resource-attributes-on-files-and-folders.md +++ b/windows/security/threat-protection/auditing/monitor-the-resource-attributes-on-files-and-folders.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/auditing/monitor-the-use-of-removable-storage-devices.md b/windows/security/threat-protection/auditing/monitor-the-use-of-removable-storage-devices.md index 27794f5009..bf24f2af21 100644 --- a/windows/security/threat-protection/auditing/monitor-the-use-of-removable-storage-devices.md +++ b/windows/security/threat-protection/auditing/monitor-the-use-of-removable-storage-devices.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/auditing/monitor-user-and-device-claims-during-sign-in.md b/windows/security/threat-protection/auditing/monitor-user-and-device-claims-during-sign-in.md index 3f49698848..e47b57c140 100644 --- a/windows/security/threat-protection/auditing/monitor-user-and-device-claims-during-sign-in.md +++ b/windows/security/threat-protection/auditing/monitor-user-and-device-claims-during-sign-in.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/auditing/planning-and-deploying-advanced-security-audit-policies.md b/windows/security/threat-protection/auditing/planning-and-deploying-advanced-security-audit-policies.md index 8dee2ff70e..6413ce76ea 100644 --- a/windows/security/threat-protection/auditing/planning-and-deploying-advanced-security-audit-policies.md +++ b/windows/security/threat-protection/auditing/planning-and-deploying-advanced-security-audit-policies.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/auditing/registry-global-object-access-auditing.md b/windows/security/threat-protection/auditing/registry-global-object-access-auditing.md index ae9bb6e67a..358f59cf57 100644 --- a/windows/security/threat-protection/auditing/registry-global-object-access-auditing.md +++ b/windows/security/threat-protection/auditing/registry-global-object-access-auditing.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/auditing/security-auditing-overview.md b/windows/security/threat-protection/auditing/security-auditing-overview.md index 8c5ba869ef..43965518d5 100644 --- a/windows/security/threat-protection/auditing/security-auditing-overview.md +++ b/windows/security/threat-protection/auditing/security-auditing-overview.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/auditing/using-advanced-security-auditing-options-to-monitor-dynamic-access-control-objects.md b/windows/security/threat-protection/auditing/using-advanced-security-auditing-options-to-monitor-dynamic-access-control-objects.md index f71f318cd8..2440624637 100644 --- a/windows/security/threat-protection/auditing/using-advanced-security-auditing-options-to-monitor-dynamic-access-control-objects.md +++ b/windows/security/threat-protection/auditing/using-advanced-security-auditing-options-to-monitor-dynamic-access-control-objects.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/auditing/view-the-security-event-log.md b/windows/security/threat-protection/auditing/view-the-security-event-log.md index 5669c302b9..7ba1c6a70e 100644 --- a/windows/security/threat-protection/auditing/view-the-security-event-log.md +++ b/windows/security/threat-protection/auditing/view-the-security-event-log.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/auditing/which-editions-of-windows-support-advanced-audit-policy-configuration.md b/windows/security/threat-protection/auditing/which-editions-of-windows-support-advanced-audit-policy-configuration.md index 8b97c1b72b..20f786b03b 100644 --- a/windows/security/threat-protection/auditing/which-editions-of-windows-support-advanced-audit-policy-configuration.md +++ b/windows/security/threat-protection/auditing/which-editions-of-windows-support-advanced-audit-policy-configuration.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/change-history-for-threat-protection.md b/windows/security/threat-protection/change-history-for-threat-protection.md index c318406475..6261639989 100644 --- a/windows/security/threat-protection/change-history-for-threat-protection.md +++ b/windows/security/threat-protection/change-history-for-threat-protection.md @@ -5,7 +5,11 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/11/2018 ms.localizationpriority: medium --- diff --git a/windows/security/threat-protection/get-support-for-security-baselines.md b/windows/security/threat-protection/get-support-for-security-baselines.md index 497d8b23b9..bdbc4a1115 100644 --- a/windows/security/threat-protection/get-support-for-security-baselines.md +++ b/windows/security/threat-protection/get-support-for-security-baselines.md @@ -6,7 +6,11 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.localizationpriority: medium ms.author: sagaudre -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 06/25/2018 --- diff --git a/windows/security/threat-protection/security-compliance-toolkit-10.md b/windows/security/threat-protection/security-compliance-toolkit-10.md index 5afa6d82b1..fe229e350d 100644 --- a/windows/security/threat-protection/security-compliance-toolkit-10.md +++ b/windows/security/threat-protection/security-compliance-toolkit-10.md @@ -6,7 +6,11 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.localizationpriority: medium ms.author: sagaudre -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 11/26/2018 --- diff --git a/windows/security/threat-protection/security-policy-settings/access-credential-manager-as-a-trusted-caller.md b/windows/security/threat-protection/security-policy-settings/access-credential-manager-as-a-trusted-caller.md index c8c5edd48a..cd1c0bac72 100644 --- a/windows/security/threat-protection/security-policy-settings/access-credential-manager-as-a-trusted-caller.md +++ b/windows/security/threat-protection/security-policy-settings/access-credential-manager-as-a-trusted-caller.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md b/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md index 00f750f49c..86f071831a 100644 --- a/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md +++ b/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/account-lockout-duration.md b/windows/security/threat-protection/security-policy-settings/account-lockout-duration.md index c86030f41b..3d60b94195 100644 --- a/windows/security/threat-protection/security-policy-settings/account-lockout-duration.md +++ b/windows/security/threat-protection/security-policy-settings/account-lockout-duration.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/account-lockout-policy.md b/windows/security/threat-protection/security-policy-settings/account-lockout-policy.md index 1478eafa69..c4a3b395cd 100644 --- a/windows/security/threat-protection/security-policy-settings/account-lockout-policy.md +++ b/windows/security/threat-protection/security-policy-settings/account-lockout-policy.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 10/11/2018 --- diff --git a/windows/security/threat-protection/security-policy-settings/account-lockout-threshold.md b/windows/security/threat-protection/security-policy-settings/account-lockout-threshold.md index 40febeceab..f0f80eb379 100644 --- a/windows/security/threat-protection/security-policy-settings/account-lockout-threshold.md +++ b/windows/security/threat-protection/security-policy-settings/account-lockout-threshold.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 11/02/2018 --- diff --git a/windows/security/threat-protection/security-policy-settings/account-policies.md b/windows/security/threat-protection/security-policy-settings/account-policies.md index 6108d6b607..f31fff3aac 100644 --- a/windows/security/threat-protection/security-policy-settings/account-policies.md +++ b/windows/security/threat-protection/security-policy-settings/account-policies.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/accounts-administrator-account-status.md b/windows/security/threat-protection/security-policy-settings/accounts-administrator-account-status.md index 69c08ad276..995825ed46 100644 --- a/windows/security/threat-protection/security-policy-settings/accounts-administrator-account-status.md +++ b/windows/security/threat-protection/security-policy-settings/accounts-administrator-account-status.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/01/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/accounts-block-microsoft-accounts.md b/windows/security/threat-protection/security-policy-settings/accounts-block-microsoft-accounts.md index 8a72fe5f92..03df52c356 100644 --- a/windows/security/threat-protection/security-policy-settings/accounts-block-microsoft-accounts.md +++ b/windows/security/threat-protection/security-policy-settings/accounts-block-microsoft-accounts.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/10/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/accounts-guest-account-status.md b/windows/security/threat-protection/security-policy-settings/accounts-guest-account-status.md index 7f99611e70..a310706d67 100644 --- a/windows/security/threat-protection/security-policy-settings/accounts-guest-account-status.md +++ b/windows/security/threat-protection/security-policy-settings/accounts-guest-account-status.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only.md b/windows/security/threat-protection/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only.md index be82562767..ae6a3113bf 100644 --- a/windows/security/threat-protection/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only.md +++ b/windows/security/threat-protection/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/accounts-rename-administrator-account.md b/windows/security/threat-protection/security-policy-settings/accounts-rename-administrator-account.md index ddb53a6141..aa48dfc049 100644 --- a/windows/security/threat-protection/security-policy-settings/accounts-rename-administrator-account.md +++ b/windows/security/threat-protection/security-policy-settings/accounts-rename-administrator-account.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/accounts-rename-guest-account.md b/windows/security/threat-protection/security-policy-settings/accounts-rename-guest-account.md index a40ed288a9..8c18930e7e 100644 --- a/windows/security/threat-protection/security-policy-settings/accounts-rename-guest-account.md +++ b/windows/security/threat-protection/security-policy-settings/accounts-rename-guest-account.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/act-as-part-of-the-operating-system.md b/windows/security/threat-protection/security-policy-settings/act-as-part-of-the-operating-system.md index 13a891b6a7..386bcc365e 100644 --- a/windows/security/threat-protection/security-policy-settings/act-as-part-of-the-operating-system.md +++ b/windows/security/threat-protection/security-policy-settings/act-as-part-of-the-operating-system.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/add-workstations-to-domain.md b/windows/security/threat-protection/security-policy-settings/add-workstations-to-domain.md index 723fd057b5..3c82864572 100644 --- a/windows/security/threat-protection/security-policy-settings/add-workstations-to-domain.md +++ b/windows/security/threat-protection/security-policy-settings/add-workstations-to-domain.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/adjust-memory-quotas-for-a-process.md b/windows/security/threat-protection/security-policy-settings/adjust-memory-quotas-for-a-process.md index b84c11a4b2..fc4ae2cbbd 100644 --- a/windows/security/threat-protection/security-policy-settings/adjust-memory-quotas-for-a-process.md +++ b/windows/security/threat-protection/security-policy-settings/adjust-memory-quotas-for-a-process.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/administer-security-policy-settings.md b/windows/security/threat-protection/security-policy-settings/administer-security-policy-settings.md index ef91abb02b..c4cebac730 100644 --- a/windows/security/threat-protection/security-policy-settings/administer-security-policy-settings.md +++ b/windows/security/threat-protection/security-policy-settings/administer-security-policy-settings.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/allow-log-on-locally.md b/windows/security/threat-protection/security-policy-settings/allow-log-on-locally.md index 6b377b9dfa..2bbf8a7ffb 100644 --- a/windows/security/threat-protection/security-policy-settings/allow-log-on-locally.md +++ b/windows/security/threat-protection/security-policy-settings/allow-log-on-locally.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/allow-log-on-through-remote-desktop-services.md b/windows/security/threat-protection/security-policy-settings/allow-log-on-through-remote-desktop-services.md index f2aff6558e..50dd09fe05 100644 --- a/windows/security/threat-protection/security-policy-settings/allow-log-on-through-remote-desktop-services.md +++ b/windows/security/threat-protection/security-policy-settings/allow-log-on-through-remote-desktop-services.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/audit-audit-the-access-of-global-system-objects.md b/windows/security/threat-protection/security-policy-settings/audit-audit-the-access-of-global-system-objects.md index 63c0113000..51fdd036ee 100644 --- a/windows/security/threat-protection/security-policy-settings/audit-audit-the-access-of-global-system-objects.md +++ b/windows/security/threat-protection/security-policy-settings/audit-audit-the-access-of-global-system-objects.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/audit-audit-the-use-of-backup-and-restore-privilege.md b/windows/security/threat-protection/security-policy-settings/audit-audit-the-use-of-backup-and-restore-privilege.md index 32b6e39da1..0b3a95e875 100644 --- a/windows/security/threat-protection/security-policy-settings/audit-audit-the-use-of-backup-and-restore-privilege.md +++ b/windows/security/threat-protection/security-policy-settings/audit-audit-the-use-of-backup-and-restore-privilege.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override.md b/windows/security/threat-protection/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override.md index 321a577f5e..b16c89073c 100644 --- a/windows/security/threat-protection/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override.md +++ b/windows/security/threat-protection/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/audit-policy.md b/windows/security/threat-protection/security-policy-settings/audit-policy.md index e0330e6edf..0e01e604f9 100644 --- a/windows/security/threat-protection/security-policy-settings/audit-policy.md +++ b/windows/security/threat-protection/security-policy-settings/audit-policy.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits.md b/windows/security/threat-protection/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits.md index d5b8c58676..dbc3a2bb29 100644 --- a/windows/security/threat-protection/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits.md +++ b/windows/security/threat-protection/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/back-up-files-and-directories.md b/windows/security/threat-protection/security-policy-settings/back-up-files-and-directories.md index 5c444a35f5..c5bc517902 100644 --- a/windows/security/threat-protection/security-policy-settings/back-up-files-and-directories.md +++ b/windows/security/threat-protection/security-policy-settings/back-up-files-and-directories.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/bypass-traverse-checking.md b/windows/security/threat-protection/security-policy-settings/bypass-traverse-checking.md index 142040f18f..c2bee9f43a 100644 --- a/windows/security/threat-protection/security-policy-settings/bypass-traverse-checking.md +++ b/windows/security/threat-protection/security-policy-settings/bypass-traverse-checking.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/change-the-system-time.md b/windows/security/threat-protection/security-policy-settings/change-the-system-time.md index 4536e9d634..f571b43214 100644 --- a/windows/security/threat-protection/security-policy-settings/change-the-system-time.md +++ b/windows/security/threat-protection/security-policy-settings/change-the-system-time.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/change-the-time-zone.md b/windows/security/threat-protection/security-policy-settings/change-the-time-zone.md index c9d0ba95b7..32a2c28240 100644 --- a/windows/security/threat-protection/security-policy-settings/change-the-time-zone.md +++ b/windows/security/threat-protection/security-policy-settings/change-the-time-zone.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/create-a-pagefile.md b/windows/security/threat-protection/security-policy-settings/create-a-pagefile.md index f1bfda3737..ef9dbd6b30 100644 --- a/windows/security/threat-protection/security-policy-settings/create-a-pagefile.md +++ b/windows/security/threat-protection/security-policy-settings/create-a-pagefile.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/create-a-token-object.md b/windows/security/threat-protection/security-policy-settings/create-a-token-object.md index f19009955d..22cdb449f1 100644 --- a/windows/security/threat-protection/security-policy-settings/create-a-token-object.md +++ b/windows/security/threat-protection/security-policy-settings/create-a-token-object.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/create-global-objects.md b/windows/security/threat-protection/security-policy-settings/create-global-objects.md index f89ff1f37f..d6d7af1bda 100644 --- a/windows/security/threat-protection/security-policy-settings/create-global-objects.md +++ b/windows/security/threat-protection/security-policy-settings/create-global-objects.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/create-permanent-shared-objects.md b/windows/security/threat-protection/security-policy-settings/create-permanent-shared-objects.md index 4cff161fe5..911cc1d64e 100644 --- a/windows/security/threat-protection/security-policy-settings/create-permanent-shared-objects.md +++ b/windows/security/threat-protection/security-policy-settings/create-permanent-shared-objects.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/create-symbolic-links.md b/windows/security/threat-protection/security-policy-settings/create-symbolic-links.md index 73ae7b6fc0..cdf9d19225 100644 --- a/windows/security/threat-protection/security-policy-settings/create-symbolic-links.md +++ b/windows/security/threat-protection/security-policy-settings/create-symbolic-links.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax.md b/windows/security/threat-protection/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax.md index f8daf37229..a51e8d02d5 100644 --- a/windows/security/threat-protection/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax.md +++ b/windows/security/threat-protection/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax.md b/windows/security/threat-protection/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax.md index e88c9397bb..7b0a29c928 100644 --- a/windows/security/threat-protection/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax.md +++ b/windows/security/threat-protection/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/debug-programs.md b/windows/security/threat-protection/security-policy-settings/debug-programs.md index 5bd7b3951b..b0904015a9 100644 --- a/windows/security/threat-protection/security-policy-settings/debug-programs.md +++ b/windows/security/threat-protection/security-policy-settings/debug-programs.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/deny-access-to-this-computer-from-the-network.md b/windows/security/threat-protection/security-policy-settings/deny-access-to-this-computer-from-the-network.md index 659f95a2b8..d2b1a1c8aa 100644 --- a/windows/security/threat-protection/security-policy-settings/deny-access-to-this-computer-from-the-network.md +++ b/windows/security/threat-protection/security-policy-settings/deny-access-to-this-computer-from-the-network.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-batch-job.md b/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-batch-job.md index 8d227032ee..001bea56e7 100644 --- a/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-batch-job.md +++ b/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-batch-job.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service.md b/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service.md index 156963e0e5..e73986c146 100644 --- a/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service.md +++ b/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/deny-log-on-locally.md b/windows/security/threat-protection/security-policy-settings/deny-log-on-locally.md index 8db35c7d85..4c6d1b40b2 100644 --- a/windows/security/threat-protection/security-policy-settings/deny-log-on-locally.md +++ b/windows/security/threat-protection/security-policy-settings/deny-log-on-locally.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/deny-log-on-through-remote-desktop-services.md b/windows/security/threat-protection/security-policy-settings/deny-log-on-through-remote-desktop-services.md index 092ab076ff..dc88264bc9 100644 --- a/windows/security/threat-protection/security-policy-settings/deny-log-on-through-remote-desktop-services.md +++ b/windows/security/threat-protection/security-policy-settings/deny-log-on-through-remote-desktop-services.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/devices-allow-undock-without-having-to-log-on.md b/windows/security/threat-protection/security-policy-settings/devices-allow-undock-without-having-to-log-on.md index 88275821af..9a447f2f54 100644 --- a/windows/security/threat-protection/security-policy-settings/devices-allow-undock-without-having-to-log-on.md +++ b/windows/security/threat-protection/security-policy-settings/devices-allow-undock-without-having-to-log-on.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/devices-allowed-to-format-and-eject-removable-media.md b/windows/security/threat-protection/security-policy-settings/devices-allowed-to-format-and-eject-removable-media.md index 4994799f27..cf13902765 100644 --- a/windows/security/threat-protection/security-policy-settings/devices-allowed-to-format-and-eject-removable-media.md +++ b/windows/security/threat-protection/security-policy-settings/devices-allowed-to-format-and-eject-removable-media.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/devices-prevent-users-from-installing-printer-drivers.md b/windows/security/threat-protection/security-policy-settings/devices-prevent-users-from-installing-printer-drivers.md index e41c0c5067..0fb2492610 100644 --- a/windows/security/threat-protection/security-policy-settings/devices-prevent-users-from-installing-printer-drivers.md +++ b/windows/security/threat-protection/security-policy-settings/devices-prevent-users-from-installing-printer-drivers.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only.md b/windows/security/threat-protection/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only.md index b15160364d..ca5a130d39 100644 --- a/windows/security/threat-protection/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only.md +++ b/windows/security/threat-protection/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only.md b/windows/security/threat-protection/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only.md index 2a3bb79a6f..fc36372e94 100644 --- a/windows/security/threat-protection/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only.md +++ b/windows/security/threat-protection/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks.md b/windows/security/threat-protection/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks.md index 66bdcc3368..9fe3ae0c2a 100644 --- a/windows/security/threat-protection/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks.md +++ b/windows/security/threat-protection/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-signing-requirements.md b/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-signing-requirements.md index f138f45684..550f00e172 100644 --- a/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-signing-requirements.md +++ b/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-signing-requirements.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/domain-controller-refuse-machine-account-password-changes.md b/windows/security/threat-protection/security-policy-settings/domain-controller-refuse-machine-account-password-changes.md index f6e9ee94a1..a01776886d 100644 --- a/windows/security/threat-protection/security-policy-settings/domain-controller-refuse-machine-account-password-changes.md +++ b/windows/security/threat-protection/security-policy-settings/domain-controller-refuse-machine-account-password-changes.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md b/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md index 4f45c4dc2d..50d4dfd8d0 100644 --- a/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md +++ b/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible.md b/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible.md index 70d087e8d7..a57a307767 100644 --- a/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible.md +++ b/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible.md b/windows/security/threat-protection/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible.md index 4ca8bd53b8..8de74ad471 100644 --- a/windows/security/threat-protection/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible.md +++ b/windows/security/threat-protection/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/domain-member-disable-machine-account-password-changes.md b/windows/security/threat-protection/security-policy-settings/domain-member-disable-machine-account-password-changes.md index e54ec081e3..d2a0399346 100644 --- a/windows/security/threat-protection/security-policy-settings/domain-member-disable-machine-account-password-changes.md +++ b/windows/security/threat-protection/security-policy-settings/domain-member-disable-machine-account-password-changes.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/domain-member-maximum-machine-account-password-age.md b/windows/security/threat-protection/security-policy-settings/domain-member-maximum-machine-account-password-age.md index 78d2942171..77ae6bd49d 100644 --- a/windows/security/threat-protection/security-policy-settings/domain-member-maximum-machine-account-password-age.md +++ b/windows/security/threat-protection/security-policy-settings/domain-member-maximum-machine-account-password-age.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 05/31/2018 --- diff --git a/windows/security/threat-protection/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key.md b/windows/security/threat-protection/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key.md index a07c07bfbc..f17f211aa0 100644 --- a/windows/security/threat-protection/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key.md +++ b/windows/security/threat-protection/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md b/windows/security/threat-protection/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md index 8f0fbcb870..2ae2ec604e 100644 --- a/windows/security/threat-protection/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md +++ b/windows/security/threat-protection/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/enforce-password-history.md b/windows/security/threat-protection/security-policy-settings/enforce-password-history.md index 085a3a3c54..96757ef0d8 100644 --- a/windows/security/threat-protection/security-policy-settings/enforce-password-history.md +++ b/windows/security/threat-protection/security-policy-settings/enforce-password-history.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/enforce-user-logon-restrictions.md b/windows/security/threat-protection/security-policy-settings/enforce-user-logon-restrictions.md index 5b79cc17d6..6ee04d6194 100644 --- a/windows/security/threat-protection/security-policy-settings/enforce-user-logon-restrictions.md +++ b/windows/security/threat-protection/security-policy-settings/enforce-user-logon-restrictions.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/force-shutdown-from-a-remote-system.md b/windows/security/threat-protection/security-policy-settings/force-shutdown-from-a-remote-system.md index 07d249dcd0..a9efdd4e25 100644 --- a/windows/security/threat-protection/security-policy-settings/force-shutdown-from-a-remote-system.md +++ b/windows/security/threat-protection/security-policy-settings/force-shutdown-from-a-remote-system.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/generate-security-audits.md b/windows/security/threat-protection/security-policy-settings/generate-security-audits.md index b74521a317..fca71ed15b 100644 --- a/windows/security/threat-protection/security-policy-settings/generate-security-audits.md +++ b/windows/security/threat-protection/security-policy-settings/generate-security-audits.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/how-to-configure-security-policy-settings.md b/windows/security/threat-protection/security-policy-settings/how-to-configure-security-policy-settings.md index 7653e023d7..7b200b914e 100644 --- a/windows/security/threat-protection/security-policy-settings/how-to-configure-security-policy-settings.md +++ b/windows/security/threat-protection/security-policy-settings/how-to-configure-security-policy-settings.md @@ -8,7 +8,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- # Configure security policy settings diff --git a/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md b/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md index e07c18c86d..c17e842ab7 100644 --- a/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md +++ b/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/increase-a-process-working-set.md b/windows/security/threat-protection/security-policy-settings/increase-a-process-working-set.md index 7ce527ad66..4d818afd08 100644 --- a/windows/security/threat-protection/security-policy-settings/increase-a-process-working-set.md +++ b/windows/security/threat-protection/security-policy-settings/increase-a-process-working-set.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority.md b/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority.md index 83b3cbd192..7cd6b91162 100644 --- a/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority.md +++ b/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 07/13/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked.md index 897e2f2549..4a01026f88 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-display-last-user-name.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-display-last-user-name.md index e3afc8ee01..43ec5dfd6b 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-display-last-user-name.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-display-last-user-name.md @@ -6,7 +6,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del.md index e39fec421b..902d890229 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- # Interactive logon: Do not require CTRL+ALT+DEL diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-dont-display-username-at-sign-in.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-dont-display-username-at-sign-in.md index dd30bc56ba..efa5515b00 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-dont-display-username-at-sign-in.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-dont-display-username-at-sign-in.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-account-lockout-threshold.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-account-lockout-threshold.md index babebadd11..42ea616840 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-account-lockout-threshold.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-account-lockout-threshold.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-inactivity-limit.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-inactivity-limit.md index fa9637e81f..14740a3224 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-inactivity-limit.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-inactivity-limit.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/18/2018 --- diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on.md index fb7ddb1250..8dafc863b6 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on.md index e98f13cc83..d166f3b2f4 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md index 403f7249a8..181503ce0e 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/27/2018 --- diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration.md index da69589771..ca42d4cb23 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md index b7dd20ed15..b929da7132 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-require-smart-card.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-require-smart-card.md index 42081cd402..5dc5977d44 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-require-smart-card.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-require-smart-card.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-smart-card-removal-behavior.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-smart-card-removal-behavior.md index 636bd2ec6f..8f86ac3be9 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-smart-card-removal-behavior.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-smart-card-removal-behavior.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/kerberos-policy.md b/windows/security/threat-protection/security-policy-settings/kerberos-policy.md index ac070c7702..059286de93 100644 --- a/windows/security/threat-protection/security-policy-settings/kerberos-policy.md +++ b/windows/security/threat-protection/security-policy-settings/kerberos-policy.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/load-and-unload-device-drivers.md b/windows/security/threat-protection/security-policy-settings/load-and-unload-device-drivers.md index 75fb5939bd..0eee265187 100644 --- a/windows/security/threat-protection/security-policy-settings/load-and-unload-device-drivers.md +++ b/windows/security/threat-protection/security-policy-settings/load-and-unload-device-drivers.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/lock-pages-in-memory.md b/windows/security/threat-protection/security-policy-settings/lock-pages-in-memory.md index 4e94af24de..21e6e17ff8 100644 --- a/windows/security/threat-protection/security-policy-settings/lock-pages-in-memory.md +++ b/windows/security/threat-protection/security-policy-settings/lock-pages-in-memory.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/log-on-as-a-batch-job.md b/windows/security/threat-protection/security-policy-settings/log-on-as-a-batch-job.md index 1636ce5414..98d5d3ada0 100644 --- a/windows/security/threat-protection/security-policy-settings/log-on-as-a-batch-job.md +++ b/windows/security/threat-protection/security-policy-settings/log-on-as-a-batch-job.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/log-on-as-a-service.md b/windows/security/threat-protection/security-policy-settings/log-on-as-a-service.md index 57568063b4..b77a87acd8 100644 --- a/windows/security/threat-protection/security-policy-settings/log-on-as-a-service.md +++ b/windows/security/threat-protection/security-policy-settings/log-on-as-a-service.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/manage-auditing-and-security-log.md b/windows/security/threat-protection/security-policy-settings/manage-auditing-and-security-log.md index b49be1c41c..80ce5dbaf1 100644 --- a/windows/security/threat-protection/security-policy-settings/manage-auditing-and-security-log.md +++ b/windows/security/threat-protection/security-policy-settings/manage-auditing-and-security-log.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-service-ticket.md b/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-service-ticket.md index 84ae8e5274..49593e2448 100644 --- a/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-service-ticket.md +++ b/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-service-ticket.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket-renewal.md b/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket-renewal.md index f1397bc889..9a9f60a91e 100644 --- a/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket-renewal.md +++ b/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket-renewal.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket.md b/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket.md index 412af6ec04..7996b7f057 100644 --- a/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket.md +++ b/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/maximum-password-age.md b/windows/security/threat-protection/security-policy-settings/maximum-password-age.md index 0cd52584a2..108f77300e 100644 --- a/windows/security/threat-protection/security-policy-settings/maximum-password-age.md +++ b/windows/security/threat-protection/security-policy-settings/maximum-password-age.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization.md b/windows/security/threat-protection/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization.md index cf13ab2714..737e1dcf31 100644 --- a/windows/security/threat-protection/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization.md +++ b/windows/security/threat-protection/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md index 7427a0898e..93975f58d7 100644 --- a/windows/security/threat-protection/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md +++ b/windows/security/threat-protection/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md index 72ceae633e..c2973e510b 100644 --- a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md +++ b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md index ac82806b49..eddf44a9f6 100644 --- a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md +++ b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-always.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-always.md index cd24f66c87..8fee2b49b6 100644 --- a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-always.md +++ b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-always.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 06/21/2018 --- diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md index f966580dff..1aeba0b58d 100644 --- a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md +++ b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level.md index e5b6a658ce..4e1e178681 100644 --- a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level.md +++ b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/minimum-password-length.md b/windows/security/threat-protection/security-policy-settings/minimum-password-length.md index 9a65820d67..24c588bb20 100644 --- a/windows/security/threat-protection/security-policy-settings/minimum-password-length.md +++ b/windows/security/threat-protection/security-policy-settings/minimum-password-length.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/modify-an-object-label.md b/windows/security/threat-protection/security-policy-settings/modify-an-object-label.md index da8d2ab5cf..333b50ebea 100644 --- a/windows/security/threat-protection/security-policy-settings/modify-an-object-label.md +++ b/windows/security/threat-protection/security-policy-settings/modify-an-object-label.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/modify-firmware-environment-values.md b/windows/security/threat-protection/security-policy-settings/modify-firmware-environment-values.md index f4abcd62e5..c0218670c7 100644 --- a/windows/security/threat-protection/security-policy-settings/modify-firmware-environment-values.md +++ b/windows/security/threat-protection/security-policy-settings/modify-firmware-environment-values.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation.md b/windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation.md index f18bfcb85a..47871bfe64 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares.md b/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares.md index ed0c582609..bc5a7f8a53 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md b/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md index dba5ef3e9d..7198962e7d 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md b/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md index 6ca86aeb84..e28b603e1e 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users.md b/windows/security/threat-protection/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users.md index d767ea7088..a34782b5b5 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously.md b/windows/security/threat-protection/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously.md index d99e3aded9..687704f45a 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md b/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md index eafe932536..da148dfff6 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths.md b/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths.md index 0207f7e66b..83772af89c 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares.md b/windows/security/threat-protection/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares.md index fce80319bb..eb56502a43 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md b/windows/security/threat-protection/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md index aa5c1ab5dd..5d10afc106 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md b/windows/security/threat-protection/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md index a6a303f5bf..3679a5ee7a 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/network-list-manager-policies.md b/windows/security/threat-protection/security-policy-settings/network-list-manager-policies.md index e5215a392c..7e9dcec21a 100644 --- a/windows/security/threat-protection/security-policy-settings/network-list-manager-policies.md +++ b/windows/security/threat-protection/security-policy-settings/network-list-manager-policies.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md b/windows/security/threat-protection/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md index 27d191495c..590ae28aa9 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/network-security-allow-localsystem-null-session-fallback.md b/windows/security/threat-protection/security-policy-settings/network-security-allow-localsystem-null-session-fallback.md index 21de9aeec4..d4ef57f497 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-allow-localsystem-null-session-fallback.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-allow-localsystem-null-session-fallback.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md b/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md index be635dcfef..3b3c62092a 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md b/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md index 3874bf7655..1fd68c4416 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md b/windows/security/threat-protection/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md index 42f411a872..5bd5cfb2b1 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/network-security-force-logoff-when-logon-hours-expire.md b/windows/security/threat-protection/security-policy-settings/network-security-force-logoff-when-logon-hours-expire.md index 3b064f6908..e4240f62c8 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-force-logoff-when-logon-hours-expire.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-force-logoff-when-logon-hours-expire.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level.md b/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level.md index 1b73389dbb..195c5fb787 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements.md b/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements.md index 428b113fe1..26035ed5e3 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md b/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md index 94cd2f2a3b..68568fd416 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 07/27/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md b/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md index 2b4aa59ac0..4671d87e7a 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md index b3724d05f6..63a5d4ea86 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md index e3a706d5e9..fd9f4c3bc2 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md index 9007808fc8..af8d5872c5 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md index 588e68efbb..a32acc3f68 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic.md index 1fdac0f27c..3170d4c5b3 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md index 6751800e93..bd1fa82e5d 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md index c5a14b24b3..0bf8bbf8f7 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/password-must-meet-complexity-requirements.md b/windows/security/threat-protection/security-policy-settings/password-must-meet-complexity-requirements.md index bfdf5f299a..a083c308a5 100644 --- a/windows/security/threat-protection/security-policy-settings/password-must-meet-complexity-requirements.md +++ b/windows/security/threat-protection/security-policy-settings/password-must-meet-complexity-requirements.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/08/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/password-policy.md b/windows/security/threat-protection/security-policy-settings/password-policy.md index 49e90f010b..1a6c6aa40c 100644 --- a/windows/security/threat-protection/security-policy-settings/password-policy.md +++ b/windows/security/threat-protection/security-policy-settings/password-policy.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/perform-volume-maintenance-tasks.md b/windows/security/threat-protection/security-policy-settings/perform-volume-maintenance-tasks.md index 2eee65e68b..3fc6624999 100644 --- a/windows/security/threat-protection/security-policy-settings/perform-volume-maintenance-tasks.md +++ b/windows/security/threat-protection/security-policy-settings/perform-volume-maintenance-tasks.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/profile-single-process.md b/windows/security/threat-protection/security-policy-settings/profile-single-process.md index 90776ad589..c9a40b1d3d 100644 --- a/windows/security/threat-protection/security-policy-settings/profile-single-process.md +++ b/windows/security/threat-protection/security-policy-settings/profile-single-process.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/profile-system-performance.md b/windows/security/threat-protection/security-policy-settings/profile-system-performance.md index 9b538889f1..a7425d8dc2 100644 --- a/windows/security/threat-protection/security-policy-settings/profile-system-performance.md +++ b/windows/security/threat-protection/security-policy-settings/profile-system-performance.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/recovery-console-allow-automatic-administrative-logon.md b/windows/security/threat-protection/security-policy-settings/recovery-console-allow-automatic-administrative-logon.md index ad5a2f6f14..a23f71b36f 100644 --- a/windows/security/threat-protection/security-policy-settings/recovery-console-allow-automatic-administrative-logon.md +++ b/windows/security/threat-protection/security-policy-settings/recovery-console-allow-automatic-administrative-logon.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md b/windows/security/threat-protection/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md index a513560166..48d79a1a00 100644 --- a/windows/security/threat-protection/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md +++ b/windows/security/threat-protection/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/remove-computer-from-docking-station.md b/windows/security/threat-protection/security-policy-settings/remove-computer-from-docking-station.md index 43278adbbf..ad02d882fd 100644 --- a/windows/security/threat-protection/security-policy-settings/remove-computer-from-docking-station.md +++ b/windows/security/threat-protection/security-policy-settings/remove-computer-from-docking-station.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/replace-a-process-level-token.md b/windows/security/threat-protection/security-policy-settings/replace-a-process-level-token.md index afebd10193..8cb6622bda 100644 --- a/windows/security/threat-protection/security-policy-settings/replace-a-process-level-token.md +++ b/windows/security/threat-protection/security-policy-settings/replace-a-process-level-token.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/reset-account-lockout-counter-after.md b/windows/security/threat-protection/security-policy-settings/reset-account-lockout-counter-after.md index 2d007bb365..1a05c103ef 100644 --- a/windows/security/threat-protection/security-policy-settings/reset-account-lockout-counter-after.md +++ b/windows/security/threat-protection/security-policy-settings/reset-account-lockout-counter-after.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 11/02/2018 --- diff --git a/windows/security/threat-protection/security-policy-settings/restore-files-and-directories.md b/windows/security/threat-protection/security-policy-settings/restore-files-and-directories.md index 3b09600257..efc8bf3548 100644 --- a/windows/security/threat-protection/security-policy-settings/restore-files-and-directories.md +++ b/windows/security/threat-protection/security-policy-settings/restore-files-and-directories.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/secpol-advanced-security-audit-policy-settings.md b/windows/security/threat-protection/security-policy-settings/secpol-advanced-security-audit-policy-settings.md index ef50b18745..93421b1ded 100644 --- a/windows/security/threat-protection/security-policy-settings/secpol-advanced-security-audit-policy-settings.md +++ b/windows/security/threat-protection/security-policy-settings/secpol-advanced-security-audit-policy-settings.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/security-policy-settings-reference.md b/windows/security/threat-protection/security-policy-settings/security-policy-settings-reference.md index 051808cb85..473273bb0e 100644 --- a/windows/security/threat-protection/security-policy-settings/security-policy-settings-reference.md +++ b/windows/security/threat-protection/security-policy-settings/security-policy-settings-reference.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/security-policy-settings.md b/windows/security/threat-protection/security-policy-settings/security-policy-settings.md index 6711b70593..e91d7f083b 100644 --- a/windows/security/threat-protection/security-policy-settings/security-policy-settings.md +++ b/windows/security/threat-protection/security-policy-settings/security-policy-settings.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/shut-down-the-system.md b/windows/security/threat-protection/security-policy-settings/shut-down-the-system.md index ef46b8301e..b1c54ad5fe 100644 --- a/windows/security/threat-protection/security-policy-settings/shut-down-the-system.md +++ b/windows/security/threat-protection/security-policy-settings/shut-down-the-system.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md b/windows/security/threat-protection/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md index b74494656b..b22ed33980 100644 --- a/windows/security/threat-protection/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md +++ b/windows/security/threat-protection/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/shutdown-clear-virtual-memory-pagefile.md b/windows/security/threat-protection/security-policy-settings/shutdown-clear-virtual-memory-pagefile.md index 12b6755312..2fead96341 100644 --- a/windows/security/threat-protection/security-policy-settings/shutdown-clear-virtual-memory-pagefile.md +++ b/windows/security/threat-protection/security-policy-settings/shutdown-clear-virtual-memory-pagefile.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/01/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-client-digitally-sign-communications-always.md b/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-client-digitally-sign-communications-always.md index 78a93d1dc7..6576490671 100644 --- a/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-client-digitally-sign-communications-always.md +++ b/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-client-digitally-sign-communications-always.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 01/04/2019 --- diff --git a/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-client-digitally-sign-communications-if-server-agrees.md b/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-client-digitally-sign-communications-if-server-agrees.md index 74f1f7f04d..83b0cfd447 100644 --- a/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-client-digitally-sign-communications-if-server-agrees.md +++ b/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-client-digitally-sign-communications-if-server-agrees.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 01/04/2019 --- # SMBv1 Microsoft network client: Digitally sign communications (if server agrees) diff --git a/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-server-digitally-sign-communications-always.md b/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-server-digitally-sign-communications-always.md index 9661827e2a..0547bc976c 100644 --- a/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-server-digitally-sign-communications-always.md +++ b/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-server-digitally-sign-communications-always.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 01/04/2019 --- diff --git a/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-server-digitally-sign-communications-if-client-agrees.md b/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-server-digitally-sign-communications-if-client-agrees.md index 7443f0f9de..516a244ec3 100644 --- a/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-server-digitally-sign-communications-if-client-agrees.md +++ b/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-server-digitally-sign-communications-if-client-agrees.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 01/04/2019 --- diff --git a/windows/security/threat-protection/security-policy-settings/store-passwords-using-reversible-encryption.md b/windows/security/threat-protection/security-policy-settings/store-passwords-using-reversible-encryption.md index d7c75a3d4f..e62f0051cb 100644 --- a/windows/security/threat-protection/security-policy-settings/store-passwords-using-reversible-encryption.md +++ b/windows/security/threat-protection/security-policy-settings/store-passwords-using-reversible-encryption.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/synchronize-directory-service-data.md b/windows/security/threat-protection/security-policy-settings/synchronize-directory-service-data.md index 16c68a6929..a9970571eb 100644 --- a/windows/security/threat-protection/security-policy-settings/synchronize-directory-service-data.md +++ b/windows/security/threat-protection/security-policy-settings/synchronize-directory-service-data.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md b/windows/security/threat-protection/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md index 0398bbbc89..0bc082cc25 100644 --- a/windows/security/threat-protection/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md +++ b/windows/security/threat-protection/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md b/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md index ae91d8d14b..95a4438497 100644 --- a/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md +++ b/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 11/16/2018 --- diff --git a/windows/security/threat-protection/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems.md b/windows/security/threat-protection/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems.md index 7e0ca59069..b14941a7d9 100644 --- a/windows/security/threat-protection/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems.md +++ b/windows/security/threat-protection/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects.md b/windows/security/threat-protection/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects.md index c5de4856e1..57d94a5462 100644 --- a/windows/security/threat-protection/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects.md +++ b/windows/security/threat-protection/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/system-settings-optional-subsystems.md b/windows/security/threat-protection/security-policy-settings/system-settings-optional-subsystems.md index c81039c024..3ee47c7421 100644 --- a/windows/security/threat-protection/security-policy-settings/system-settings-optional-subsystems.md +++ b/windows/security/threat-protection/security-policy-settings/system-settings-optional-subsystems.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md b/windows/security/threat-protection/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md index 63c46fc928..86d8763a80 100644 --- a/windows/security/threat-protection/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md +++ b/windows/security/threat-protection/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/take-ownership-of-files-or-other-objects.md b/windows/security/threat-protection/security-policy-settings/take-ownership-of-files-or-other-objects.md index ffa2941137..9d2d8d239f 100644 --- a/windows/security/threat-protection/security-policy-settings/take-ownership-of-files-or-other-objects.md +++ b/windows/security/threat-protection/security-policy-settings/take-ownership-of-files-or-other-objects.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md b/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md index 05f928f9a6..0c5959a1d1 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/08/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md b/windows/security/threat-protection/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md index 64449e0bec..0ed0d17d2b 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md b/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md index ac6a9b786d..2e70f620db 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/08/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md b/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md index b8620f41a5..16f331a605 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation.md b/windows/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation.md index de3df48df1..f99bd12f18 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md b/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md index 54ad96d58f..3a3cee321a 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md b/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md index 80a4e5f969..eec9833f99 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode.md b/windows/security/threat-protection/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode.md index 0e931e969d..db74e8e286 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md b/windows/security/threat-protection/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md index 40cce0498e..1480e9dae0 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md b/windows/security/threat-protection/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md index d6ba8a9479..0c9ff24464 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/security-policy-settings/user-rights-assignment.md b/windows/security/threat-protection/security-policy-settings/user-rights-assignment.md index 931d388344..a8748ce942 100644 --- a/windows/security/threat-protection/security-policy-settings/user-rights-assignment.md +++ b/windows/security/threat-protection/security-policy-settings/user-rights-assignment.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set.md b/windows/security/threat-protection/windows-defender-application-control/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set.md index f876e2a21b..36a71fa984 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/administer-applocker-using-mdm.md b/windows/security/threat-protection/windows-defender-application-control/applocker/administer-applocker-using-mdm.md index 19441d1b3a..af56b3544c 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/administer-applocker-using-mdm.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/administer-applocker-using-mdm.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 03/01/2018 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/administer-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/administer-applocker.md index d85ed0d63b..ac2242bb9f 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/administer-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/administer-applocker.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-architecture-and-components.md b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-architecture-and-components.md index 8b526e85fa..4ba13f8b1e 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-architecture-and-components.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-architecture-and-components.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-functions.md b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-functions.md index e1d9bba88b..06715de66b 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-functions.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-functions.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-overview.md b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-overview.md index d48aa2c008..758f313aac 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-overview.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-overview.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 10/16/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-deployment-guide.md b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-deployment-guide.md index c939e91051..fd7f7cfe69 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-deployment-guide.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-deployment-guide.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-design-guide.md b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-design-guide.md index b6c2c868d6..71f08e91e5 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-design-guide.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-design-guide.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policy-use-scenarios.md b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policy-use-scenarios.md index 36e0ac5981..b56b4d4a85 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policy-use-scenarios.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policy-use-scenarios.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-processes-and-interactions.md b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-processes-and-interactions.md index c4b962b01a..33e5620624 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-processes-and-interactions.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-processes-and-interactions.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-settings.md b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-settings.md index ee4c5fe937..24cdcb9c69 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-settings.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-settings.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-technical-reference.md b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-technical-reference.md index 054ee9ef62..edbe6eb6ac 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-technical-reference.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-technical-reference.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-audit-only.md b/windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-audit-only.md index 44b08ac93f..f644b21ed5 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-audit-only.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-audit-only.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 06/08/2018 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-enforce-rules.md b/windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-enforce-rules.md index 953ead6f1e..9f6c893a55 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-enforce-rules.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-enforce-rules.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/configure-exceptions-for-an-applocker-rule.md b/windows/security/threat-protection/windows-defender-application-control/applocker/configure-exceptions-for-an-applocker-rule.md index dbc018a25b..812492d020 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/configure-exceptions-for-an-applocker-rule.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/configure-exceptions-for-an-applocker-rule.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-appLocker-reference-device.md b/windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-appLocker-reference-device.md index f5511d3cc8..b7ce15ef26 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-appLocker-reference-device.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-appLocker-reference-device.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-application-identity-service.md b/windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-application-identity-service.md index c756426699..bcd9cb9112 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-application-identity-service.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-application-identity-service.md @@ -7,7 +7,11 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/02/2018 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-for-packaged-apps.md b/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-for-packaged-apps.md index a97aa2c7cd..1120cc9526 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-for-packaged-apps.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-for-packaged-apps.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-file-hash-condition.md b/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-file-hash-condition.md index b21e2e2528..43af6ad592 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-file-hash-condition.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-file-hash-condition.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-path-condition.md b/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-path-condition.md index ec420bcac6..59e7c13e44 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-path-condition.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-path-condition.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-publisher-condition.md b/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-publisher-condition.md index 9eec93864f..edf05d2183 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-publisher-condition.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-publisher-condition.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/create-applocker-default-rules.md b/windows/security/threat-protection/windows-defender-application-control/applocker/create-applocker-default-rules.md index 76e4917930..6622ef7891 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/create-applocker-default-rules.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/create-applocker-default-rules.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/create-list-of-applications-deployed-to-each-business-group.md b/windows/security/threat-protection/windows-defender-application-control/applocker/create-list-of-applications-deployed-to-each-business-group.md index 7f38968703..7791c5c029 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/create-list-of-applications-deployed-to-each-business-group.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/create-list-of-applications-deployed-to-each-business-group.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-policies.md b/windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-policies.md index 1848f8085f..4bef661ac5 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-policies.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-rules.md b/windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-rules.md index 1e07df2d5b..b4be8e695e 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-rules.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-rules.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/delete-an-applocker-rule.md b/windows/security/threat-protection/windows-defender-application-control/applocker/delete-an-applocker-rule.md index 7c12e10af2..c7eb47499b 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/delete-an-applocker-rule.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/delete-an-applocker-rule.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/02/2018 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting.md b/windows/security/threat-protection/windows-defender-application-control/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting.md index 3457f579f9..2309668f9e 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/deploy-the-applocker-policy-into-production.md b/windows/security/threat-protection/windows-defender-application-control/applocker/deploy-the-applocker-policy-into-production.md index c3be5b8cd7..d45405393e 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/deploy-the-applocker-policy-into-production.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/deploy-the-applocker-policy-into-production.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/determine-group-policy-structure-and-rule-enforcement.md b/windows/security/threat-protection/windows-defender-application-control/applocker/determine-group-policy-structure-and-rule-enforcement.md index 6acc47d3c4..d4599e1d65 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/determine-group-policy-structure-and-rule-enforcement.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/determine-group-policy-structure-and-rule-enforcement.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer.md b/windows/security/threat-protection/windows-defender-application-control/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer.md index e81f42d528..70728d4e87 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/determine-your-application-control-objectives.md b/windows/security/threat-protection/windows-defender-application-control/applocker/determine-your-application-control-objectives.md index bca3d32254..b05be7369f 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/determine-your-application-control-objectives.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/determine-your-application-control-objectives.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application.md b/windows/security/threat-protection/windows-defender-application-control/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application.md index 393294a921..17e51bf270 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application.md @@ -7,7 +7,11 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/dll-rules-in-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/dll-rules-in-applocker.md index cea7ab6ca2..86b55052a9 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/dll-rules-in-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/dll-rules-in-applocker.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/document-group-policy-structure-and-applocker-rule-enforcement.md b/windows/security/threat-protection/windows-defender-application-control/applocker/document-group-policy-structure-and-applocker-rule-enforcement.md index 01f5f91d5d..d48fe25d9b 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/document-group-policy-structure-and-applocker-rule-enforcement.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/document-group-policy-structure-and-applocker-rule-enforcement.md @@ -6,7 +6,11 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.pagetype: security ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/document-your-application-list.md b/windows/security/threat-protection/windows-defender-application-control/applocker/document-your-application-list.md index 7b6244b2eb..55df155aaa 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/document-your-application-list.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/document-your-application-list.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/document-your-applocker-rules.md b/windows/security/threat-protection/windows-defender-application-control/applocker/document-your-applocker-rules.md index 8f9183d2d5..bd96fb0487 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/document-your-applocker-rules.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/document-your-applocker-rules.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/edit-an-applocker-policy.md b/windows/security/threat-protection/windows-defender-application-control/applocker/edit-an-applocker-policy.md index c03fb9d05e..c1cde0a5f2 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/edit-an-applocker-policy.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/edit-an-applocker-policy.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/edit-applocker-rules.md b/windows/security/threat-protection/windows-defender-application-control/applocker/edit-applocker-rules.md index b620e305a4..79a93ebed6 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/edit-applocker-rules.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/edit-applocker-rules.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/enable-the-dll-rule-collection.md b/windows/security/threat-protection/windows-defender-application-control/applocker/enable-the-dll-rule-collection.md index a915311c12..045b259154 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/enable-the-dll-rule-collection.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/enable-the-dll-rule-collection.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/enforce-applocker-rules.md b/windows/security/threat-protection/windows-defender-application-control/applocker/enforce-applocker-rules.md index 6ef53ce437..4195b8d95c 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/enforce-applocker-rules.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/enforce-applocker-rules.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/executable-rules-in-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/executable-rules-in-applocker.md index 1ac1c9ce81..34a87eba3b 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/executable-rules-in-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/executable-rules-in-applocker.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-from-a-gpo.md b/windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-from-a-gpo.md index 000441d121..a06cd80b04 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-from-a-gpo.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-from-a-gpo.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-to-an-xml-file.md b/windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-to-an-xml-file.md index 71956ee4d9..df296dbc5b 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-to-an-xml-file.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-to-an-xml-file.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/how-applocker-works-techref.md b/windows/security/threat-protection/windows-defender-application-control/applocker/how-applocker-works-techref.md index 536d75e6ad..70a0cb391f 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/how-applocker-works-techref.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/how-applocker-works-techref.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-from-another-computer.md b/windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-from-another-computer.md index b880da4f7e..d28968fd6b 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-from-another-computer.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-from-another-computer.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-into-a-gpo.md b/windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-into-a-gpo.md index 0785d8c4b0..05c36921ed 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-into-a-gpo.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-into-a-gpo.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/maintain-applocker-policies.md b/windows/security/threat-protection/windows-defender-application-control/applocker/maintain-applocker-policies.md index dfb5a0b633..fa2c8449ab 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/maintain-applocker-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/maintain-applocker-policies.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/manage-packaged-apps-with-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/manage-packaged-apps-with-applocker.md index 6f54125e98..312c00c2bb 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/manage-packaged-apps-with-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/manage-packaged-apps-with-applocker.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-by-using-set-applockerpolicy.md b/windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-by-using-set-applockerpolicy.md index 5de1967090..1fdcdbd719 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-by-using-set-applockerpolicy.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-by-using-set-applockerpolicy.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-manually.md b/windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-manually.md index d77a10fb74..ea87808e0d 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-manually.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-manually.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/monitor-application-usage-with-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/monitor-application-usage-with-applocker.md index d7dec8dac9..d1a7055787 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/monitor-application-usage-with-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/monitor-application-usage-with-applocker.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/optimize-applocker-performance.md b/windows/security/threat-protection/windows-defender-application-control/applocker/optimize-applocker-performance.md index cda020c5b7..e972a285a0 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/optimize-applocker-performance.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/optimize-applocker-performance.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker.md index 8911d1bf9e..619aa19efd 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 10/13/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/plan-for-applocker-policy-management.md b/windows/security/threat-protection/windows-defender-application-control/applocker/plan-for-applocker-policy-management.md index f4d78c2168..6500f75fea 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/plan-for-applocker-policy-management.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/plan-for-applocker-policy-management.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/refresh-an-applocker-policy.md b/windows/security/threat-protection/windows-defender-application-control/applocker/refresh-an-applocker-policy.md index 5eb4f002d8..c0a1f26152 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/refresh-an-applocker-policy.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/refresh-an-applocker-policy.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-for-deploying-applocker-policies.md b/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-for-deploying-applocker-policies.md index df08c99d15..dd6ba10e90 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-for-deploying-applocker-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-for-deploying-applocker-policies.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-to-use-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-to-use-applocker.md index d816c2e3df..97d032f8b6 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-to-use-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-to-use-applocker.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/run-the-automatically-generate-rules-wizard.md b/windows/security/threat-protection/windows-defender-application-control/applocker/run-the-automatically-generate-rules-wizard.md index 174b721e32..0e48a6f472 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/run-the-automatically-generate-rules-wizard.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/run-the-automatically-generate-rules-wizard.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/script-rules-in-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/script-rules-in-applocker.md index 6fab819f0e..1649917882 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/script-rules-in-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/script-rules-in-applocker.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/security-considerations-for-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/security-considerations-for-applocker.md index a6b7813076..9d73f8afef 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/security-considerations-for-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/security-considerations-for-applocker.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/select-types-of-rules-to-create.md b/windows/security/threat-protection/windows-defender-application-control/applocker/select-types-of-rules-to-create.md index 6d3979d91f..fc03b4f081 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/select-types-of-rules-to-create.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/select-types-of-rules-to-create.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/test-an-applocker-policy-by-using-test-applockerpolicy.md b/windows/security/threat-protection/windows-defender-application-control/applocker/test-an-applocker-policy-by-using-test-applockerpolicy.md index 453ab0eb53..5ffb4d98b5 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/test-an-applocker-policy-by-using-test-applockerpolicy.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/test-an-applocker-policy-by-using-test-applockerpolicy.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/test-and-update-an-applocker-policy.md b/windows/security/threat-protection/windows-defender-application-control/applocker/test-and-update-an-applocker-policy.md index 27c90949d6..ccbc705657 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/test-and-update-an-applocker-policy.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/test-and-update-an-applocker-policy.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/tools-to-use-with-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/tools-to-use-with-applocker.md index b78412c268..ac08014ac6 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/tools-to-use-with-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/tools-to-use-with-applocker.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-enforcement-settings.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-enforcement-settings.md index 5e696490b6..e5fb93d221 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-enforcement-settings.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-enforcement-settings.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-policy-design-decisions.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-policy-design-decisions.md index 66ac0616c3..5ad969d5f9 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-policy-design-decisions.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-policy-design-decisions.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 10/13/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md index c85924b254..578986beac 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understand-the-applocker-policy-deployment-process.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understand-the-applocker-policy-deployment-process.md index 35b9675e4c..4b1ec580e1 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understand-the-applocker-policy-deployment-process.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understand-the-applocker-policy-deployment-process.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-allow-and-deny-actions-on-rules.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-allow-and-deny-actions-on-rules.md index b8dff87c25..3b54878e4f 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-allow-and-deny-actions-on-rules.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-allow-and-deny-actions-on-rules.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-default-rules.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-default-rules.md index fdba7959a0..725d456a08 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-default-rules.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-default-rules.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-behavior.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-behavior.md index a7077bd6b7..40b6d2c8ea 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-behavior.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-behavior.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-collections.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-collections.md index cf5e0d7301..194a713b23 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-collections.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-collections.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-condition-types.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-condition-types.md index 93e36b568f..35682f8954 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-condition-types.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-condition-types.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-exceptions.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-exceptions.md index 56ef43a232..92a2179fce 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-exceptions.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-exceptions.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-file-hash-rule-condition-in-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-file-hash-rule-condition-in-applocker.md index bf60367a08..72cf62e127 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-file-hash-rule-condition-in-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-file-hash-rule-condition-in-applocker.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-path-rule-condition-in-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-path-rule-condition-in-applocker.md index 46a0ba3967..154d463930 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-path-rule-condition-in-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-path-rule-condition-in-applocker.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-publisher-rule-condition-in-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-publisher-rule-condition-in-applocker.md index 612e3824d2..99c3ebe52a 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-publisher-rule-condition-in-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-publisher-rule-condition-in-applocker.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies.md b/windows/security/threat-protection/windows-defender-application-control/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies.md index 45529acef2..709e3beb0d 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies.md @@ -8,7 +8,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain.md b/windows/security/threat-protection/windows-defender-application-control/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain.md index e5cd39f92c..fdc15a6ef8 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/use-the-applocker-windows-powershell-cmdlets.md b/windows/security/threat-protection/windows-defender-application-control/applocker/use-the-applocker-windows-powershell-cmdlets.md index 686d4be09d..a9409118af 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/use-the-applocker-windows-powershell-cmdlets.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/use-the-applocker-windows-powershell-cmdlets.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/using-event-viewer-with-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/using-event-viewer-with-applocker.md index 36b1d0017d..f675e2f425 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/using-event-viewer-with-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/using-event-viewer-with-applocker.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/using-software-restriction-policies-and-applocker-policies.md b/windows/security/threat-protection/windows-defender-application-control/applocker/using-software-restriction-policies-and-applocker-policies.md index 6d7fb0b8d9..5a4bf9af3c 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/using-software-restriction-policies-and-applocker-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/using-software-restriction-policies-and-applocker-policies.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/what-is-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/what-is-applocker.md index 292c50818f..b77b1ee1c8 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/what-is-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/what-is-applocker.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/windows-installer-rules-in-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/windows-installer-rules-in-applocker.md index 47b6d2df84..1e37f0531c 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/windows-installer-rules-in-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/windows-installer-rules-in-applocker.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/working-with-applocker-policies.md b/windows/security/threat-protection/windows-defender-application-control/applocker/working-with-applocker-policies.md index 9926340d47..cf2294e550 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/working-with-applocker-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/working-with-applocker-policies.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/create-your-windows-defender-application-control-planning-document.md b/windows/security/threat-protection/windows-defender-application-control/create-your-windows-defender-application-control-planning-document.md index e49dcb1440..f204088397 100644 --- a/windows/security/threat-protection/windows-defender-application-control/create-your-windows-defender-application-control-planning-document.md +++ b/windows/security/threat-protection/windows-defender-application-control/create-your-windows-defender-application-control-planning-document.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/document-your-windows-defender-application-control-management-processes.md b/windows/security/threat-protection/windows-defender-application-control/document-your-windows-defender-application-control-management-processes.md index 68bc862fd3..a414320068 100644 --- a/windows/security/threat-protection/windows-defender-application-control/document-your-windows-defender-application-control-management-processes.md +++ b/windows/security/threat-protection/windows-defender-application-control/document-your-windows-defender-application-control-management-processes.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 09/21/2017 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/types-of-devices.md b/windows/security/threat-protection/windows-defender-application-control/types-of-devices.md index 8c0a834285..2edd777efc 100644 --- a/windows/security/threat-protection/windows-defender-application-control/types-of-devices.md +++ b/windows/security/threat-protection/windows-defender-application-control/types-of-devices.md @@ -5,7 +5,11 @@ keywords: virtualization, security, malware ms.prod: w10 ms.mktglfcycl: deploy ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 03/01/2018 --- diff --git a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-design-guide.md b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-design-guide.md index 35710141ab..7fa8248d7c 100644 --- a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-design-guide.md +++ b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-design-guide.md @@ -5,7 +5,11 @@ keywords: virtualization, security, malware ms.prod: w10 ms.mktglfcycl: deploy ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 02/20/2018 --- diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md index 325b6119b3..7328140fee 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md @@ -5,7 +5,11 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.localizationpriority: medium ms.author: justinha -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 11/15/2018 --- diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md b/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md index 640fe4cc29..c803573a3f 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md @@ -5,7 +5,11 @@ keywords: virtualization, security, malware ms.prod: w10 ms.mktglfcycl: deploy ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 10/20/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone.md b/windows/security/threat-protection/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone.md index 98a41989a0..e0eb8aa2f0 100644 --- a/windows/security/threat-protection/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone.md +++ b/windows/security/threat-protection/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone.md b/windows/security/threat-protection/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone.md index 01300466cb..48b1825121 100644 --- a/windows/security/threat-protection/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone.md +++ b/windows/security/threat-protection/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md b/windows/security/threat-protection/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md index 80be70956a..bfcf709295 100644 --- a/windows/security/threat-protection/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md +++ b/windows/security/threat-protection/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/assign-security-group-filters-to-the-gpo.md b/windows/security/threat-protection/windows-firewall/assign-security-group-filters-to-the-gpo.md index ca09cb0b1b..9847ec13b0 100644 --- a/windows/security/threat-protection/windows-firewall/assign-security-group-filters-to-the-gpo.md +++ b/windows/security/threat-protection/windows-firewall/assign-security-group-filters-to-the-gpo.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/basic-firewall-policy-design.md b/windows/security/threat-protection/windows-firewall/basic-firewall-policy-design.md index 52a0ff1746..6a7263f0ca 100644 --- a/windows/security/threat-protection/windows-firewall/basic-firewall-policy-design.md +++ b/windows/security/threat-protection/windows-firewall/basic-firewall-policy-design.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/boundary-zone-gpos.md b/windows/security/threat-protection/windows-firewall/boundary-zone-gpos.md index c6efd1da85..5959bbfda1 100644 --- a/windows/security/threat-protection/windows-firewall/boundary-zone-gpos.md +++ b/windows/security/threat-protection/windows-firewall/boundary-zone-gpos.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/boundary-zone.md b/windows/security/threat-protection/windows-firewall/boundary-zone.md index 4b8a3f82d9..db6b6132c2 100644 --- a/windows/security/threat-protection/windows-firewall/boundary-zone.md +++ b/windows/security/threat-protection/windows-firewall/boundary-zone.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/certificate-based-isolation-policy-design-example.md b/windows/security/threat-protection/windows-firewall/certificate-based-isolation-policy-design-example.md index a3077b6d8b..011ebb5486 100644 --- a/windows/security/threat-protection/windows-firewall/certificate-based-isolation-policy-design-example.md +++ b/windows/security/threat-protection/windows-firewall/certificate-based-isolation-policy-design-example.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/certificate-based-isolation-policy-design.md b/windows/security/threat-protection/windows-firewall/certificate-based-isolation-policy-design.md index 5703ac0670..4e737e809f 100644 --- a/windows/security/threat-protection/windows-firewall/certificate-based-isolation-policy-design.md +++ b/windows/security/threat-protection/windows-firewall/certificate-based-isolation-policy-design.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/change-rules-from-request-to-require-mode.md b/windows/security/threat-protection/windows-firewall/change-rules-from-request-to-require-mode.md index 62420de298..f2e2887ade 100644 --- a/windows/security/threat-protection/windows-firewall/change-rules-from-request-to-require-mode.md +++ b/windows/security/threat-protection/windows-firewall/change-rules-from-request-to-require-mode.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/checklist-configuring-basic-firewall-settings.md b/windows/security/threat-protection/windows-firewall/checklist-configuring-basic-firewall-settings.md index 0494cf7b90..547555a30a 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-configuring-basic-firewall-settings.md +++ b/windows/security/threat-protection/windows-firewall/checklist-configuring-basic-firewall-settings.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone.md b/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone.md index cc95a9fe0e..b9fa4a2a08 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone.md +++ b/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md b/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md index 36a838b94a..e0d1dfffb0 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md +++ b/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-boundary-zone.md b/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-boundary-zone.md index c0097b7a82..d34f75d4fe 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-boundary-zone.md +++ b/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-boundary-zone.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-encryption-zone.md b/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-encryption-zone.md index 59459f5637..e940d4f34e 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-encryption-zone.md +++ b/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-encryption-zone.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-isolated-domain.md b/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-isolated-domain.md index 12aff1bf77..002a46e88e 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-isolated-domain.md +++ b/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-isolated-domain.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/checklist-creating-group-policy-objects.md b/windows/security/threat-protection/windows-firewall/checklist-creating-group-policy-objects.md index b42bfc69b3..c7f2c55c5c 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-creating-group-policy-objects.md +++ b/windows/security/threat-protection/windows-firewall/checklist-creating-group-policy-objects.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/checklist-creating-inbound-firewall-rules.md b/windows/security/threat-protection/windows-firewall/checklist-creating-inbound-firewall-rules.md index 7b6bd39b54..7542c518e3 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-creating-inbound-firewall-rules.md +++ b/windows/security/threat-protection/windows-firewall/checklist-creating-inbound-firewall-rules.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/checklist-creating-outbound-firewall-rules.md b/windows/security/threat-protection/windows-firewall/checklist-creating-outbound-firewall-rules.md index 559291765a..3d514a68af 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-creating-outbound-firewall-rules.md +++ b/windows/security/threat-protection/windows-firewall/checklist-creating-outbound-firewall-rules.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md b/windows/security/threat-protection/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md index 9a7e901ac8..a22fc67423 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md +++ b/windows/security/threat-protection/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/checklist-implementing-a-basic-firewall-policy-design.md b/windows/security/threat-protection/windows-firewall/checklist-implementing-a-basic-firewall-policy-design.md index d58d940b08..f160d1828b 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-implementing-a-basic-firewall-policy-design.md +++ b/windows/security/threat-protection/windows-firewall/checklist-implementing-a-basic-firewall-policy-design.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design.md b/windows/security/threat-protection/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design.md index e482d00b69..018d2e9b31 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design.md +++ b/windows/security/threat-protection/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/checklist-implementing-a-domain-isolation-policy-design.md b/windows/security/threat-protection/windows-firewall/checklist-implementing-a-domain-isolation-policy-design.md index 18e9197b4e..ff503c5cbb 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-implementing-a-domain-isolation-policy-design.md +++ b/windows/security/threat-protection/windows-firewall/checklist-implementing-a-domain-isolation-policy-design.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design.md b/windows/security/threat-protection/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design.md index dcf7575556..995d06b05f 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design.md +++ b/windows/security/threat-protection/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/configure-authentication-methods.md b/windows/security/threat-protection/windows-firewall/configure-authentication-methods.md index b23f0c7d01..61cd9ed219 100644 --- a/windows/security/threat-protection/windows-firewall/configure-authentication-methods.md +++ b/windows/security/threat-protection/windows-firewall/configure-authentication-methods.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/configure-data-protection-quick-mode-settings.md b/windows/security/threat-protection/windows-firewall/configure-data-protection-quick-mode-settings.md index 05db2ff779..04385257bc 100644 --- a/windows/security/threat-protection/windows-firewall/configure-data-protection-quick-mode-settings.md +++ b/windows/security/threat-protection/windows-firewall/configure-data-protection-quick-mode-settings.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates.md b/windows/security/threat-protection/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates.md index 63802f55e1..a7a53b7459 100644 --- a/windows/security/threat-protection/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates.md +++ b/windows/security/threat-protection/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/configure-key-exchange-main-mode-settings.md b/windows/security/threat-protection/windows-firewall/configure-key-exchange-main-mode-settings.md index 4ec20e462c..c9d55885a2 100644 --- a/windows/security/threat-protection/windows-firewall/configure-key-exchange-main-mode-settings.md +++ b/windows/security/threat-protection/windows-firewall/configure-key-exchange-main-mode-settings.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/configure-the-rules-to-require-encryption.md b/windows/security/threat-protection/windows-firewall/configure-the-rules-to-require-encryption.md index b9cb9944ae..4db16a7911 100644 --- a/windows/security/threat-protection/windows-firewall/configure-the-rules-to-require-encryption.md +++ b/windows/security/threat-protection/windows-firewall/configure-the-rules-to-require-encryption.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/configure-the-windows-firewall-log.md b/windows/security/threat-protection/windows-firewall/configure-the-windows-firewall-log.md index ba32647e26..c4b832463c 100644 --- a/windows/security/threat-protection/windows-firewall/configure-the-windows-firewall-log.md +++ b/windows/security/threat-protection/windows-firewall/configure-the-windows-firewall-log.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md b/windows/security/threat-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md index b0f250ecfb..2da66c7b37 100644 --- a/windows/security/threat-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md +++ b/windows/security/threat-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/confirm-that-certificates-are-deployed-correctly.md b/windows/security/threat-protection/windows-firewall/confirm-that-certificates-are-deployed-correctly.md index 1895dc3017..07f9ccdc3f 100644 --- a/windows/security/threat-protection/windows-firewall/confirm-that-certificates-are-deployed-correctly.md +++ b/windows/security/threat-protection/windows-firewall/confirm-that-certificates-are-deployed-correctly.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: securit ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/copy-a-gpo-to-create-a-new-gpo.md b/windows/security/threat-protection/windows-firewall/copy-a-gpo-to-create-a-new-gpo.md index af70080d9b..d0edca9291 100644 --- a/windows/security/threat-protection/windows-firewall/copy-a-gpo-to-create-a-new-gpo.md +++ b/windows/security/threat-protection/windows-firewall/copy-a-gpo-to-create-a-new-gpo.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/create-a-group-account-in-active-directory.md b/windows/security/threat-protection/windows-firewall/create-a-group-account-in-active-directory.md index 9aefd85144..cae0e8377d 100644 --- a/windows/security/threat-protection/windows-firewall/create-a-group-account-in-active-directory.md +++ b/windows/security/threat-protection/windows-firewall/create-a-group-account-in-active-directory.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/create-a-group-policy-object.md b/windows/security/threat-protection/windows-firewall/create-a-group-policy-object.md index dd292b0bea..71d09a7ac9 100644 --- a/windows/security/threat-protection/windows-firewall/create-a-group-policy-object.md +++ b/windows/security/threat-protection/windows-firewall/create-a-group-policy-object.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/create-an-authentication-exemption-list-rule.md b/windows/security/threat-protection/windows-firewall/create-an-authentication-exemption-list-rule.md index f9d1765c2f..6811e14cb9 100644 --- a/windows/security/threat-protection/windows-firewall/create-an-authentication-exemption-list-rule.md +++ b/windows/security/threat-protection/windows-firewall/create-an-authentication-exemption-list-rule.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/create-an-authentication-request-rule.md b/windows/security/threat-protection/windows-firewall/create-an-authentication-request-rule.md index efde773a84..e5a012b51d 100644 --- a/windows/security/threat-protection/windows-firewall/create-an-authentication-request-rule.md +++ b/windows/security/threat-protection/windows-firewall/create-an-authentication-request-rule.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/create-an-inbound-icmp-rule.md b/windows/security/threat-protection/windows-firewall/create-an-inbound-icmp-rule.md index a4ecccf7e2..03f453bff7 100644 --- a/windows/security/threat-protection/windows-firewall/create-an-inbound-icmp-rule.md +++ b/windows/security/threat-protection/windows-firewall/create-an-inbound-icmp-rule.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/create-an-inbound-port-rule.md b/windows/security/threat-protection/windows-firewall/create-an-inbound-port-rule.md index d20966c5d7..14a83fb6d4 100644 --- a/windows/security/threat-protection/windows-firewall/create-an-inbound-port-rule.md +++ b/windows/security/threat-protection/windows-firewall/create-an-inbound-port-rule.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/create-an-inbound-program-or-service-rule.md b/windows/security/threat-protection/windows-firewall/create-an-inbound-program-or-service-rule.md index 36d61e5346..8eabd8aac7 100644 --- a/windows/security/threat-protection/windows-firewall/create-an-inbound-program-or-service-rule.md +++ b/windows/security/threat-protection/windows-firewall/create-an-inbound-program-or-service-rule.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/create-an-outbound-port-rule.md b/windows/security/threat-protection/windows-firewall/create-an-outbound-port-rule.md index 4f3a998eee..d364255db1 100644 --- a/windows/security/threat-protection/windows-firewall/create-an-outbound-port-rule.md +++ b/windows/security/threat-protection/windows-firewall/create-an-outbound-port-rule.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/create-an-outbound-program-or-service-rule.md b/windows/security/threat-protection/windows-firewall/create-an-outbound-program-or-service-rule.md index f0d4c6761c..67f89c2496 100644 --- a/windows/security/threat-protection/windows-firewall/create-an-outbound-program-or-service-rule.md +++ b/windows/security/threat-protection/windows-firewall/create-an-outbound-program-or-service-rule.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/create-inbound-rules-to-support-rpc.md b/windows/security/threat-protection/windows-firewall/create-inbound-rules-to-support-rpc.md index aec0ec391f..235a0c8da8 100644 --- a/windows/security/threat-protection/windows-firewall/create-inbound-rules-to-support-rpc.md +++ b/windows/security/threat-protection/windows-firewall/create-inbound-rules-to-support-rpc.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/create-wmi-filters-for-the-gpo.md b/windows/security/threat-protection/windows-firewall/create-wmi-filters-for-the-gpo.md index 7744378add..47e73387a1 100644 --- a/windows/security/threat-protection/windows-firewall/create-wmi-filters-for-the-gpo.md +++ b/windows/security/threat-protection/windows-firewall/create-wmi-filters-for-the-gpo.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 05/25/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy.md b/windows/security/threat-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy.md index 48712e94eb..a667cc8b9e 100644 --- a/windows/security/threat-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy.md +++ b/windows/security/threat-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/determining-the-trusted-state-of-your-devices.md b/windows/security/threat-protection/windows-firewall/determining-the-trusted-state-of-your-devices.md index 5023cacc9c..5358628f72 100644 --- a/windows/security/threat-protection/windows-firewall/determining-the-trusted-state-of-your-devices.md +++ b/windows/security/threat-protection/windows-firewall/determining-the-trusted-state-of-your-devices.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/documenting-the-zones.md b/windows/security/threat-protection/windows-firewall/documenting-the-zones.md index ee0a546b86..e2c215097f 100644 --- a/windows/security/threat-protection/windows-firewall/documenting-the-zones.md +++ b/windows/security/threat-protection/windows-firewall/documenting-the-zones.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/domain-isolation-policy-design-example.md b/windows/security/threat-protection/windows-firewall/domain-isolation-policy-design-example.md index cb91e6f3ab..4948d77abd 100644 --- a/windows/security/threat-protection/windows-firewall/domain-isolation-policy-design-example.md +++ b/windows/security/threat-protection/windows-firewall/domain-isolation-policy-design-example.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/domain-isolation-policy-design.md b/windows/security/threat-protection/windows-firewall/domain-isolation-policy-design.md index db21ce0ac9..4b4d4f339d 100644 --- a/windows/security/threat-protection/windows-firewall/domain-isolation-policy-design.md +++ b/windows/security/threat-protection/windows-firewall/domain-isolation-policy-design.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/enable-predefined-inbound-rules.md b/windows/security/threat-protection/windows-firewall/enable-predefined-inbound-rules.md index 825edaca3a..7dddf66e82 100644 --- a/windows/security/threat-protection/windows-firewall/enable-predefined-inbound-rules.md +++ b/windows/security/threat-protection/windows-firewall/enable-predefined-inbound-rules.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/enable-predefined-outbound-rules.md b/windows/security/threat-protection/windows-firewall/enable-predefined-outbound-rules.md index df3c7329ae..7f97202ce9 100644 --- a/windows/security/threat-protection/windows-firewall/enable-predefined-outbound-rules.md +++ b/windows/security/threat-protection/windows-firewall/enable-predefined-outbound-rules.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/encryption-zone-gpos.md b/windows/security/threat-protection/windows-firewall/encryption-zone-gpos.md index 6ed1c4c636..3a3de91310 100644 --- a/windows/security/threat-protection/windows-firewall/encryption-zone-gpos.md +++ b/windows/security/threat-protection/windows-firewall/encryption-zone-gpos.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/encryption-zone.md b/windows/security/threat-protection/windows-firewall/encryption-zone.md index 35aa4212f1..d4f2cd21b8 100644 --- a/windows/security/threat-protection/windows-firewall/encryption-zone.md +++ b/windows/security/threat-protection/windows-firewall/encryption-zone.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples.md b/windows/security/threat-protection/windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples.md index 720c7272ac..85800c7ac0 100644 --- a/windows/security/threat-protection/windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples.md +++ b/windows/security/threat-protection/windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/exempt-icmp-from-authentication.md b/windows/security/threat-protection/windows-firewall/exempt-icmp-from-authentication.md index 4cf8c409e1..f2e032d611 100644 --- a/windows/security/threat-protection/windows-firewall/exempt-icmp-from-authentication.md +++ b/windows/security/threat-protection/windows-firewall/exempt-icmp-from-authentication.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/exemption-list.md b/windows/security/threat-protection/windows-firewall/exemption-list.md index 21a3e2c957..54e493f96b 100644 --- a/windows/security/threat-protection/windows-firewall/exemption-list.md +++ b/windows/security/threat-protection/windows-firewall/exemption-list.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/firewall-gpos.md b/windows/security/threat-protection/windows-firewall/firewall-gpos.md index ad1d17f139..128c004e23 100644 --- a/windows/security/threat-protection/windows-firewall/firewall-gpos.md +++ b/windows/security/threat-protection/windows-firewall/firewall-gpos.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/firewall-policy-design-example.md b/windows/security/threat-protection/windows-firewall/firewall-policy-design-example.md index 07ca7e7c61..18505427fb 100644 --- a/windows/security/threat-protection/windows-firewall/firewall-policy-design-example.md +++ b/windows/security/threat-protection/windows-firewall/firewall-policy-design-example.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/gathering-information-about-your-active-directory-deployment.md b/windows/security/threat-protection/windows-firewall/gathering-information-about-your-active-directory-deployment.md index 4c2a252889..1bccaae7f0 100644 --- a/windows/security/threat-protection/windows-firewall/gathering-information-about-your-active-directory-deployment.md +++ b/windows/security/threat-protection/windows-firewall/gathering-information-about-your-active-directory-deployment.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/gathering-information-about-your-current-network-infrastructure.md b/windows/security/threat-protection/windows-firewall/gathering-information-about-your-current-network-infrastructure.md index c3a22d6df6..5ba2d31a7e 100644 --- a/windows/security/threat-protection/windows-firewall/gathering-information-about-your-current-network-infrastructure.md +++ b/windows/security/threat-protection/windows-firewall/gathering-information-about-your-current-network-infrastructure.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/gathering-information-about-your-devices.md b/windows/security/threat-protection/windows-firewall/gathering-information-about-your-devices.md index 8c1b016757..68dd3b06a3 100644 --- a/windows/security/threat-protection/windows-firewall/gathering-information-about-your-devices.md +++ b/windows/security/threat-protection/windows-firewall/gathering-information-about-your-devices.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/gathering-other-relevant-information.md b/windows/security/threat-protection/windows-firewall/gathering-other-relevant-information.md index 2ecc649ffb..8e2fc69d81 100644 --- a/windows/security/threat-protection/windows-firewall/gathering-other-relevant-information.md +++ b/windows/security/threat-protection/windows-firewall/gathering-other-relevant-information.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/gathering-the-information-you-need.md b/windows/security/threat-protection/windows-firewall/gathering-the-information-you-need.md index b2c85e5dd0..c5219ae6b0 100644 --- a/windows/security/threat-protection/windows-firewall/gathering-the-information-you-need.md +++ b/windows/security/threat-protection/windows-firewall/gathering-the-information-you-need.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/gpo-domiso-boundary.md b/windows/security/threat-protection/windows-firewall/gpo-domiso-boundary.md index 38018ab8e2..6d8dc47e86 100644 --- a/windows/security/threat-protection/windows-firewall/gpo-domiso-boundary.md +++ b/windows/security/threat-protection/windows-firewall/gpo-domiso-boundary.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/gpo-domiso-encryption.md b/windows/security/threat-protection/windows-firewall/gpo-domiso-encryption.md index 99ff5ffcf6..c777247232 100644 --- a/windows/security/threat-protection/windows-firewall/gpo-domiso-encryption.md +++ b/windows/security/threat-protection/windows-firewall/gpo-domiso-encryption.md @@ -2,7 +2,11 @@ title: GPO\_DOMISO\_Encryption\_WS2008 (Windows 10) description: GPO\_DOMISO\_Encryption\_WS2008 ms.assetid: 84375480-af6a-4c79-aafe-0a37115a7446 -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library diff --git a/windows/security/threat-protection/windows-firewall/gpo-domiso-firewall.md b/windows/security/threat-protection/windows-firewall/gpo-domiso-firewall.md index bed2d46cda..1ea46fff03 100644 --- a/windows/security/threat-protection/windows-firewall/gpo-domiso-firewall.md +++ b/windows/security/threat-protection/windows-firewall/gpo-domiso-firewall.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/gpo-domiso-isolateddomain-clients.md b/windows/security/threat-protection/windows-firewall/gpo-domiso-isolateddomain-clients.md index 1f645f91c2..9332c21b2f 100644 --- a/windows/security/threat-protection/windows-firewall/gpo-domiso-isolateddomain-clients.md +++ b/windows/security/threat-protection/windows-firewall/gpo-domiso-isolateddomain-clients.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/gpo-domiso-isolateddomain-servers.md b/windows/security/threat-protection/windows-firewall/gpo-domiso-isolateddomain-servers.md index f13c70d1c7..10a3fb7190 100644 --- a/windows/security/threat-protection/windows-firewall/gpo-domiso-isolateddomain-servers.md +++ b/windows/security/threat-protection/windows-firewall/gpo-domiso-isolateddomain-servers.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md b/windows/security/threat-protection/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md index 30a391a025..a19331420d 100644 --- a/windows/security/threat-protection/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md +++ b/windows/security/threat-protection/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan.md b/windows/security/threat-protection/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan.md index e40d8d7a2e..2e40134147 100644 --- a/windows/security/threat-protection/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan.md +++ b/windows/security/threat-protection/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/isolated-domain-gpos.md b/windows/security/threat-protection/windows-firewall/isolated-domain-gpos.md index d32fbbad7b..6a095cdd8b 100644 --- a/windows/security/threat-protection/windows-firewall/isolated-domain-gpos.md +++ b/windows/security/threat-protection/windows-firewall/isolated-domain-gpos.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/isolated-domain.md b/windows/security/threat-protection/windows-firewall/isolated-domain.md index 32a9043172..fe4dcddb97 100644 --- a/windows/security/threat-protection/windows-firewall/isolated-domain.md +++ b/windows/security/threat-protection/windows-firewall/isolated-domain.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/isolating-apps-on-your-network.md b/windows/security/threat-protection/windows-firewall/isolating-apps-on-your-network.md index ca4b001e6a..dbeb159610 100644 --- a/windows/security/threat-protection/windows-firewall/isolating-apps-on-your-network.md +++ b/windows/security/threat-protection/windows-firewall/isolating-apps-on-your-network.md @@ -6,7 +6,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 10/13/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/link-the-gpo-to-the-domain.md b/windows/security/threat-protection/windows-firewall/link-the-gpo-to-the-domain.md index 746570ffbd..2dde088e64 100644 --- a/windows/security/threat-protection/windows-firewall/link-the-gpo-to-the-domain.md +++ b/windows/security/threat-protection/windows-firewall/link-the-gpo-to-the-domain.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md b/windows/security/threat-protection/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md index 7eefeac0b2..20fedfde68 100644 --- a/windows/security/threat-protection/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md +++ b/windows/security/threat-protection/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md b/windows/security/threat-protection/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md index d45ed57dfc..9cfe8cea6a 100644 --- a/windows/security/threat-protection/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md +++ b/windows/security/threat-protection/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies.md b/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies.md index 2894154e47..2c6b03a173 100644 --- a/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies.md +++ b/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md b/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md index f4e67423c5..6200a12ab9 100644 --- a/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md +++ b/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall.md b/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall.md index 485b4917f9..f637339ccf 100644 --- a/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall.md +++ b/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/02/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/open-windows-firewall-with-advanced-security.md b/windows/security/threat-protection/windows-firewall/open-windows-firewall-with-advanced-security.md index a49296f5d8..63089dc239 100644 --- a/windows/security/threat-protection/windows-firewall/open-windows-firewall-with-advanced-security.md +++ b/windows/security/threat-protection/windows-firewall/open-windows-firewall-with-advanced-security.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/planning-certificate-based-authentication.md b/windows/security/threat-protection/windows-firewall/planning-certificate-based-authentication.md index 75bbce24b9..1162388c82 100644 --- a/windows/security/threat-protection/windows-firewall/planning-certificate-based-authentication.md +++ b/windows/security/threat-protection/windows-firewall/planning-certificate-based-authentication.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/planning-domain-isolation-zones.md b/windows/security/threat-protection/windows-firewall/planning-domain-isolation-zones.md index 9ec2562b8a..7a2216d02b 100644 --- a/windows/security/threat-protection/windows-firewall/planning-domain-isolation-zones.md +++ b/windows/security/threat-protection/windows-firewall/planning-domain-isolation-zones.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/planning-gpo-deployment.md b/windows/security/threat-protection/windows-firewall/planning-gpo-deployment.md index 6222a6da9c..bcdf78631e 100644 --- a/windows/security/threat-protection/windows-firewall/planning-gpo-deployment.md +++ b/windows/security/threat-protection/windows-firewall/planning-gpo-deployment.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones.md b/windows/security/threat-protection/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones.md index d43c0a263c..ace81c47a8 100644 --- a/windows/security/threat-protection/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones.md +++ b/windows/security/threat-protection/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/planning-isolation-groups-for-the-zones.md b/windows/security/threat-protection/windows-firewall/planning-isolation-groups-for-the-zones.md index 38d6aa0b45..7125762949 100644 --- a/windows/security/threat-protection/windows-firewall/planning-isolation-groups-for-the-zones.md +++ b/windows/security/threat-protection/windows-firewall/planning-isolation-groups-for-the-zones.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/planning-network-access-groups.md b/windows/security/threat-protection/windows-firewall/planning-network-access-groups.md index 2a53064efd..f720623fc4 100644 --- a/windows/security/threat-protection/windows-firewall/planning-network-access-groups.md +++ b/windows/security/threat-protection/windows-firewall/planning-network-access-groups.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/planning-server-isolation-zones.md b/windows/security/threat-protection/windows-firewall/planning-server-isolation-zones.md index 0dc7dc181b..9a42f48cf7 100644 --- a/windows/security/threat-protection/windows-firewall/planning-server-isolation-zones.md +++ b/windows/security/threat-protection/windows-firewall/planning-server-isolation-zones.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/planning-settings-for-a-basic-firewall-policy.md b/windows/security/threat-protection/windows-firewall/planning-settings-for-a-basic-firewall-policy.md index 73a2f757c7..d8c6149e88 100644 --- a/windows/security/threat-protection/windows-firewall/planning-settings-for-a-basic-firewall-policy.md +++ b/windows/security/threat-protection/windows-firewall/planning-settings-for-a-basic-firewall-policy.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/planning-the-gpos.md b/windows/security/threat-protection/windows-firewall/planning-the-gpos.md index f3db2bbad9..6ede27467b 100644 --- a/windows/security/threat-protection/windows-firewall/planning-the-gpos.md +++ b/windows/security/threat-protection/windows-firewall/planning-the-gpos.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security.md b/windows/security/threat-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security.md index 9a39c0de1d..0077d5fb03 100644 --- a/windows/security/threat-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security.md +++ b/windows/security/threat-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/planning-your-windows-firewall-with-advanced-security-design.md b/windows/security/threat-protection/windows-firewall/planning-your-windows-firewall-with-advanced-security-design.md index a2f19872e7..9c44ddea0e 100644 --- a/windows/security/threat-protection/windows-firewall/planning-your-windows-firewall-with-advanced-security-design.md +++ b/windows/security/threat-protection/windows-firewall/planning-your-windows-firewall-with-advanced-security-design.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/procedures-used-in-this-guide.md b/windows/security/threat-protection/windows-firewall/procedures-used-in-this-guide.md index d3ae509319..fbef5e28cb 100644 --- a/windows/security/threat-protection/windows-firewall/procedures-used-in-this-guide.md +++ b/windows/security/threat-protection/windows-firewall/procedures-used-in-this-guide.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/protect-devices-from-unwanted-network-traffic.md b/windows/security/threat-protection/windows-firewall/protect-devices-from-unwanted-network-traffic.md index 2ab0ca6442..40ea379c43 100644 --- a/windows/security/threat-protection/windows-firewall/protect-devices-from-unwanted-network-traffic.md +++ b/windows/security/threat-protection/windows-firewall/protect-devices-from-unwanted-network-traffic.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources.md b/windows/security/threat-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources.md index b9a8de9993..b1ef08f124 100644 --- a/windows/security/threat-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources.md +++ b/windows/security/threat-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/restrict-access-to-only-specified-users-or-devices.md b/windows/security/threat-protection/windows-firewall/restrict-access-to-only-specified-users-or-devices.md index 05a97f9e40..df49a18a2f 100644 --- a/windows/security/threat-protection/windows-firewall/restrict-access-to-only-specified-users-or-devices.md +++ b/windows/security/threat-protection/windows-firewall/restrict-access-to-only-specified-users-or-devices.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/restrict-access-to-only-trusted-devices.md b/windows/security/threat-protection/windows-firewall/restrict-access-to-only-trusted-devices.md index 4ff811eafc..f512c77601 100644 --- a/windows/security/threat-protection/windows-firewall/restrict-access-to-only-trusted-devices.md +++ b/windows/security/threat-protection/windows-firewall/restrict-access-to-only-trusted-devices.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/restrict-server-access-to-members-of-a-group-only.md b/windows/security/threat-protection/windows-firewall/restrict-server-access-to-members-of-a-group-only.md index 565a73b576..79268f40a7 100644 --- a/windows/security/threat-protection/windows-firewall/restrict-server-access-to-members-of-a-group-only.md +++ b/windows/security/threat-protection/windows-firewall/restrict-server-access-to-members-of-a-group-only.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2.md b/windows/security/threat-protection/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2.md index 6bac7d1d1f..083d71d53f 100644 --- a/windows/security/threat-protection/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2.md +++ b/windows/security/threat-protection/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2.md @@ -6,7 +6,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/server-isolation-gpos.md b/windows/security/threat-protection/windows-firewall/server-isolation-gpos.md index 5d7aec4d89..ec31b17097 100644 --- a/windows/security/threat-protection/windows-firewall/server-isolation-gpos.md +++ b/windows/security/threat-protection/windows-firewall/server-isolation-gpos.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/server-isolation-policy-design-example.md b/windows/security/threat-protection/windows-firewall/server-isolation-policy-design-example.md index a0bac113cf..acf3998fbf 100644 --- a/windows/security/threat-protection/windows-firewall/server-isolation-policy-design-example.md +++ b/windows/security/threat-protection/windows-firewall/server-isolation-policy-design-example.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 04/19/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/server-isolation-policy-design.md b/windows/security/threat-protection/windows-firewall/server-isolation-policy-design.md index 016568e7c7..3ebb85def1 100644 --- a/windows/security/threat-protection/windows-firewall/server-isolation-policy-design.md +++ b/windows/security/threat-protection/windows-firewall/server-isolation-policy-design.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior.md b/windows/security/threat-protection/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior.md index 1dae92ce6c..fd7f843e54 100644 --- a/windows/security/threat-protection/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior.md +++ b/windows/security/threat-protection/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process.md b/windows/security/threat-protection/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process.md index 5be8b4b176..845d5216c4 100644 --- a/windows/security/threat-protection/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process.md +++ b/windows/security/threat-protection/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process.md @@ -6,7 +6,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/verify-that-network-traffic-is-authenticated.md b/windows/security/threat-protection/windows-firewall/verify-that-network-traffic-is-authenticated.md index a41e88727a..4ddc739f6f 100644 --- a/windows/security/threat-protection/windows-firewall/verify-that-network-traffic-is-authenticated.md +++ b/windows/security/threat-protection/windows-firewall/verify-that-network-traffic-is-authenticated.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell.md b/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell.md index 64ec16e1ac..76a58a391e 100644 --- a/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell.md +++ b/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell.md @@ -6,7 +6,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide.md b/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide.md index b89e03159e..b999a2197b 100644 --- a/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide.md +++ b/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 08/17/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-design-guide.md b/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-design-guide.md index 17bc826d98..3b8e40b263 100644 --- a/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-design-guide.md +++ b/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-design-guide.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 10/05/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security.md b/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security.md index 9b266aec88..fae8f19951 100644 --- a/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security.md +++ b/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security.md @@ -6,7 +6,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 10/13/2017 --- diff --git a/windows/security/threat-protection/windows-security-baselines.md b/windows/security/threat-protection/windows-security-baselines.md index efe30a1df5..2766b15d05 100644 --- a/windows/security/threat-protection/windows-security-baselines.md +++ b/windows/security/threat-protection/windows-security-baselines.md @@ -6,7 +6,11 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.localizationpriority: medium ms.author: sagaudre -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 06/25/2018 --- From 31750b696d35b6d56ce48876bc05eb0841196021 Mon Sep 17 00:00:00 2001 From: JC <47532346+Jcoetsee@users.noreply.github.com> Date: Thu, 21 Feb 2019 22:13:20 +0200 Subject: [PATCH 70/76] Grammar change A small grammar change has been made, the wording used there should be "to add" and not "to load" https://github.com/MicrosoftDocs/windows-itpro-docs/issues/2706 --- .../windows-defender-application-guard/install-wd-app-guard.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard.md index 68919bc05b..0d185ae9bd 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard.md @@ -58,7 +58,7 @@ Employees can use hardware-isolated browsing sessions without any administrator Applies to: - Windows 10 Enterprise edition, version 1709 or higher -You and your security department can define your corporate boundaries by explicitly adding trusted domains and by customizing the Application Guard experience to meet and enforce your needs on employee devices. Enterprise-managed mode also automatically redirects any browser requests to load non-enterprise domain(s) in the container. +You and your security department can define your corporate boundaries by explicitly adding trusted domains and by customizing the Application Guard experience to meet and enforce your needs on employee devices. Enterprise-managed mode also automatically redirects any browser requests to add non-enterprise domain(s) in the container. The following diagram shows the flow between the host PC and the isolated container. ![Flowchart for movement between Microsoft Edge and Application Guard](images/application-guard-container-v-host.png) From 363330acadc56fa2084af9caa8e63d7353e2da2a Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Thu, 21 Feb 2019 16:32:57 -0800 Subject: [PATCH 71/76] edits --- .../bitlocker/bitlocker-overview-and-requirements-faq.md | 6 +++++- .../overview-attack-surface-reduction.md | 4 ++-- 2 files changed, 7 insertions(+), 3 deletions(-) diff --git a/windows/security/information-protection/bitlocker/bitlocker-overview-and-requirements-faq.md b/windows/security/information-protection/bitlocker/bitlocker-overview-and-requirements-faq.md index 12479b7ab1..ca512b92d3 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-overview-and-requirements-faq.md +++ b/windows/security/information-protection/bitlocker/bitlocker-overview-and-requirements-faq.md @@ -7,7 +7,11 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: brianlic-msft +author: justinha +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual ms.date: 02/21/2019 --- diff --git a/windows/security/threat-protection/windows-defender-atp/overview-attack-surface-reduction.md b/windows/security/threat-protection/windows-defender-atp/overview-attack-surface-reduction.md index f69f7f9a83..c23a4512ad 100644 --- a/windows/security/threat-protection/windows-defender-atp/overview-attack-surface-reduction.md +++ b/windows/security/threat-protection/windows-defender-atp/overview-attack-surface-reduction.md @@ -15,7 +15,7 @@ manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual -ms.date: 07/01/2018 +ms.date: 02/21/2019 --- # Overview of attack surface reduction @@ -27,7 +27,7 @@ Attack surface reduction capabilities in Windows Defender ATP helps protect the | Capability | Description | |------------|-------------| -| [Hardware-based isolation](../windows-defender-application-guard/wd-app-guard-overview.md) | Protects and maintains the integrity of the system as it starts and while it's running, and validates system integrity through local and remote attestation. In addition, container isolation for Microsoft Edge helps protect host operating system from malicious wbsites. | +| [Hardware-based isolation](../windows-defender-application-guard/wd-app-guard-overview.md) | Protects and maintains the integrity of the system as it starts and while it's running, and validates system integrity through local and remote attestation. In addition, container isolation for Microsoft Edge helps protect host operating system from malicious websites. | | [Application control](../windows-defender-application-control/windows-defender-application-control.md) | Moves away from the traditional application trust model where all applications are assumed trustworthy by default to one where applications must earn trust in order to run. | | [Exploit protection](../windows-defender-exploit-guard/exploit-protection-exploit-guard.md) | Applies exploit mitigation techniques to apps your organization uses, both individually and to all apps. Works with third-party antivirus solutions and Windows Defender Antivirus (Windows Defender AV) | | [Network protection](../windows-defender-exploit-guard/network-protection-exploit-guard.md) | Extends the malware and social engineering protection offered by Windows Defender SmartScreen in Microsoft Edge to cover network traffic and connectivity on your organization's devices. Requires Windows Defender AV. | From fde41e6260781b36f8c784b7efca44f070c8e666 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Fri, 22 Feb 2019 07:14:02 -0800 Subject: [PATCH 72/76] fix link --- .../bitlocker/bitlocker-how-to-enable-network-unlock.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md b/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md index 8d2dd4d8dc..321a0ffe66 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md +++ b/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md @@ -343,7 +343,7 @@ The following steps can be used to configure Network Unlock on these older syste 1. [Install the WDS Server role](#bkmk-installwdsrole) 2. [Confirm the WDS Service is running](#bkmk-confirmwdsrunning) 3. [Install the Network Unlock feature](#bkmk-installnufeature) -4. [Create the Network Unlock certificate](bkmk-createcert) +4. [Create the Network Unlock certificate](#bkmk-createcert) 5. [Deploy the private key and certificate to the WDS server](#bkmk-deploycert) 6. Configure registry settings for Network Unlock: From 612d5d7ea0534f4b5450d47b47b4d766961780a1 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Fri, 22 Feb 2019 17:45:03 +0000 Subject: [PATCH 73/76] Merged PR 14450: clarification on AAD-join for Surface Hub --- devices/surface-hub/first-run-program-surface-hub.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/devices/surface-hub/first-run-program-surface-hub.md b/devices/surface-hub/first-run-program-surface-hub.md index 6fcee63f5d..346d0c8d8a 100644 --- a/devices/surface-hub/first-run-program-surface-hub.md +++ b/devices/surface-hub/first-run-program-surface-hub.md @@ -335,9 +335,11 @@ This is what happens when you choose an option. - **Use Microsoft Azure Active Directory** - Clicking this option allows you to join the device to Azure AD. Once you click **Next**, the device will restart to apply some settings, and then you’ll be taken to the [Use Microsoft Azure Active Directory](#use-microsoft-azure) page and asked to enter credentials that can allow you to join Azure AD. After joining, admins from the joined organization will be able to use the Settings app. The specific people that will be allowed depends on your Azure AD subscription and how you’ve configured the settings for your Azure AD organization. + Clicking this option allows you to join the device to Azure AD. Once you click **Next**, the device will restart to apply some settings, and then you’ll be taken to the [Use Microsoft Azure Active Directory](#use-microsoft-azure) page and asked to enter credentials that can allow you to join Azure AD. Members of the Azure Global Admins security group from the joined organization will be able to use the Settings app. The specific people that will be allowed depends on your Azure AD subscription and how you’ve configured the settings for your Azure AD organization. >[!IMPORTANT] + >Administrators added to the Azure Global Admins group after you join the device to Azure AD will be unable to use the Settings app. + > >If you join Surface Hub to Azure AD during first-run setup, single sign-on (SSO) for Office apps will not work properly. Users will have to sign in to each Office app individually. - **Use Active Directory Domain Services** From f80d5d6e3c62359c2776a545a70115523949bc20 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Fri, 22 Feb 2019 11:24:30 -0800 Subject: [PATCH 74/76] edits --- .../custom-profile-prevent-device-ids.png | Bin 14886 -> 12641 bytes .../mdm/policy-csp-deviceinstallation.md | 14 +++++++------- 2 files changed, 7 insertions(+), 7 deletions(-) diff --git a/windows/client-management/mdm/images/custom-profile-prevent-device-ids.png b/windows/client-management/mdm/images/custom-profile-prevent-device-ids.png index d949232d44fcaabef0df5879b1b4dfaba7c8fea8..ef6c3f78cbe932374e4ede3e0e816913be2989fd 100644 GIT binary patch literal 12641 zcmdseXH=8j)@{Ush@gUkAVsA~jUYupKt<_AYCs^MNSEG26G0G>-a(qw5FqrP(4_Yg zdhaB32qi#r!@1vgzEj@Y#<=&-{gIK8}6OdzPMucO8FH4P#i{n_Teh=HJP29t|I_I z*?jT1)MlIe2>^I{DF5b_rW<&3+VK1IsPo#c`_m`44l~kk4_dWLGt*1s)cLxlZPTiF zd!+YVn5iJ^!w>zxsfPGjGBDg@d4HFII-@uOYzQmFM$^y|>0p_<*6=KYCR{=sm^#*M27UW`Yv=x zYN)q(MIB*tva|h`86i~YIY*6w8;o8DG)(apLV_AeMmP-~Pi+lJi_Jh?@fOMo?c3)k zsf3iwvr=2UW^G%7B9`8IZ5KN_B6a7+nD4-~WpV(GNjgf=>4r|dQ;^+}>aBIRz%n8J5$+&7)Rq0-ElzM!64cYVs~uYj zeotWbxm`bByWH%`;DKMZu}`F*!@@@URD8G&s_Gp)PGx72+o5O43kA%GMdaDhM~l4z zS;L>Qk2kBFGWDN%o|6H(mal07BW}d6#qr&-L9ahz+-_H`KQW7ZLIc;oX+zk9**}4- zo~=q!(Y&z3FrT+Xu=woCR?h52g!#|z6fFn}rHvGT>pf4lZEls0;^l)!Cm&?QZ^zCO z4$|X+-tglAV_*P~MjVSp0RyYEShN=Sxi2?RCB6TZeXaYoq_fwH$N(47dGBPV!Ce*2 z7OOPRES%lkP|nP7eGG0H7WQW^O7YL|7s>+gNu{u)r{eQtcw35(I7JSeA0#O-(NB3A zTzn8>I+5mGb)%Yc%DeW!ye(KZ%SO9}7I1s&3);l+ezvO7ISG5^w!0QwQ!(Fd8EwQ! zSlv}^Pe095$rQbqh?51D3*Xg9IQMZ@`bE&s)x?5)M*A3V_(Gr2&~qjP%!Q*X^)$*xiJ`31#qSy;Y|gMk~dv|#}_XH2>y)H@3;bUd!;Q^4X? zc^nvqr0>+Z`BTfv`MmsgD{$s=LwJi8ym2sw7;RNC7m;lM?L3goH+SVR#BKBI*>l!w zrne9W1?51-ZN1C`ihZ`7=QMJ#A}2#|Q%^LIus4$D-%9y|7I3p>vtlw-h4m7B&D+$o zB@R+W&|_(;@QL}YRN~eNx75F)$7S=z0C}&(F@@DXi}1d>)1Tu*hz;{xphn5UpqI+Q z*hq-$VQC==7}uKWKf9Fcv$_*2U;*81R)G z=Q$LlghaV|wPC}LKBp!}wvN-TTRo#6&+Uox{vz@YAuQqp!D)QJ$x6CP=DVF2#39{} zLysrF^DocaA`i5&K?;u1+uZv;=sbMu9Y9f>|EUvkkpX}Wum8f8cL)GrGaYgXFd_YS z0P16ajh;mL#3a8+tpO88F8g2`D#5Cx5m%~1pQadF38-J&dvzU@xP-M$&L6A|pRe;0 z$e4KyFzQPJVe|4L?_J^KyLCKq`x?^|?8;dOsY++xyM&1Lbac#Wr$cf|ZlX};6(x$R zfDMCvC>Wuh#+Y993urw54y{`#qF#r@*1W0NGtK*X(f|T-hoP4AQ9qSv;y~nhqaLwH3wF)BrLos_G*p;k|vQ|xCr60Nj8$|-JDI?~hn}%wt{ZvkrclE&g z0VtqQ^WGrTK@tROvJ}YDKuj?S8m`MTu0Jm;5GsVkRCB1dhS#OnF#;NF5)82u^{?*@ zHC+RYQRjk<$7O-14@m)IEPpEzf3=mWxnL>WK-i$vC4l+sTrl)|mgO}-!;I|T_xdl3 z&A*NG?R@TdGv|0dFjdCqKw#!^9_^u@wIKlDLW?3-3_)KN{DJ-2h_Pd|$sY-zL zh8}Kc4Z-4&i!SUGDOahh_RWO#Qi>S&b(aD@-+R}mUx$eyoRLb55l~%QLVMxxQafh# zUB0C)naj$wjLz^8TCm$IZq&rYK!$AJFHy&(_B#^UkWKezAo!q@S7{pLlH<;x&kNi) zNA57>j=cmp0DW(AH>q*#&X0)DrP}^}MoT-V{%Xh7GWBKnjWA}Z!ZuB~gzXAit2YN^n$<=6A{zs&)Hy)?k`c+iRob zm#0plZ1i#(Jt$=Kiz5YbWrt)WP_?%M_Oms%_t}(^Q5*PtJW3U@moR&FIJ&+wfrZ^7 z%vIE%_bS`!dkJG%yVMY8Z|^5HqRl@MXF|gvICOWQRt|1h?@c&A%6X4E*7a$1w z?PX(9Z~7~_^bb_>_L#42-C2&|^UA&MmfB2SAs)t*`ZFVXq0@56^gCPR$x6C(V5a^_ z{gIg4&fIcWoDhizY6I0ZabjNt(aL%pnSz^@V7O^7ac*Bv{$M*0WiJfA8ru`6Vm%6D zMXEMAi1%$}_i9m$1sQtnY=Ke;@tXN&h7Y{9_tY$Y;YL-_@zU7DFc=6fdC)JdUaUSH zc^JbDa=Pg;Mk(p>Efim1K#yg7F+Fc!Cj=}Wwao_U@dZXKU^z|mi%u}$hpU_?^_Q}v{qO~7Oo zm&m37N5D9R#G&41yI>6V=V?L6fL!TH`CE~Y$pk$SK^aj2vx7Qb(>kD=% z7A$O>Mbfs09*e=NKC5G{w%(X&P#H{yIQHb>RXY|fp-)|&=_KzRun6Y*!~If7|HaQ{ zKrV&+hJ1jkA->3{A&Q0*iI|7W1?yN|K!qldM~H|4Px5GE6ZHXSJI$&YQV=@ZJAcKb z{|(&!N0j^DE+nF$&n5F%aI4-MY?F7mR3-3x1iASO|_A0W}K`qj7ATv(RwY zvUF1F9;P5f5D_KwuxKp>Z5|Vm%t+0y-bO5DG}U9PI*LQ}V&8I9Q@zizqt1X}B0AHT z`{c#NyXw*z7k24aJ1pZ*w+;35YWI7^w~?nd7T2L4#C~4ASds}4s>@l9d*j_&TQRt8 zrBzOR;jSosLEwGS62WvwmbR?INDfvm@*2-WMpK6AelnWX_MAdeCbx%L`K4xk-aCz? z+6{dARcWtuGS_JvvYxeVBaUGB>8c$R&dv7|bPi@1*VdBHsk(iffQOQ8xSy6loGlfe zfN(~vnOoP(bMnN}>Bu7kj7O3&YKgB%XB_qd#UK zOAl%~syV}u!s{<+b;^6FRbQmHSXyuX38F?q$o~6q3)2Sp4A$gXBj~i~aSvg9w~@vh@SLZCHYfy&$r(Vvp zeWY4%HKvhhom-x%<%(uD)lYTpJq>e8HB#9rNjB3U$_|(F;;P(sf1l5s%{K?8x-F0? zj8Z&1A+d9X+_5>tou_c$%M#VO$@&(x9_l#M7v-X$Csxpvt)P1HFl#cr@yyF8A(3R` zA$>bZ*>|*1M+g)=_BIOm#YXf7+vC~o#U80n{)r*p>&1mtm&9Ed`JkrUsW|nC+Yxau z@F@61t3$<3a0C>-^nH&tLc5s9tXH#z&YYY`U92Z*8@^Wm7@C6bs5Sr}+_ zUxRJ9u-LC*FpUT}o2Wjp*D^VgWMBG9ykJBHOY$!LAAsm0>o0J~fk?5U|Ar0!Qz8Fv zsPeynpAS+xC)=vK&9|gN@M|V@Z#97%q?1S@iRUAN9X*QN{O*5HFe11(TR1wKI7;6V z6PEc9)sg$he+z|Ggkv7 z&Q*Wv$vbhs;783l0N ztn=c6dJ!3s#U)H^;X7V2Ec9-8|Jq%4PA~?uCzW*P$7pM2;xk38!{%;6iZ^aue7nxk z+In+mz8Pvygc>9shxrdAv#fzwe=f|oQEr5(t(YVQOxNahjm=-&64Ic@+7I{uP{U`NffB~2DPTj>zP7LyQ{Oj zw4E-wKi!8=mB#O$^famW#A`HF>?ekJWetAGjP_`12)-XsiPfyFOn=Bz-15mDWE$M( zsfZcJ082l%g$m-wt!{dR)J-KYb)E7RpvP31mF^zzG?17)tP}JlzaO=VJl#@URv$g&jS)vZG-EWM{j z^Qd3Cs$m1ekSNb3XK`eX+Ka8ixy8>3RP!2Q@1YB$0qTg*3!Z0X#i8=6{~-?*%IfC0 zzv)i3ONwiWHN1Qho}jc^V(4`uYw-D=Il{?O8n)HK8WeGpre9#Lp^)3F*z6) zCR=Z3vphg6S=dHoGRiOF&@zP<%M?*t6Lan+x>Vv$wsqv|Z_M69M@B*!L>~vLHypTG zZxTa9fnO)LgZ8EO>9PT@Z5py=OM;>~=&)U9P@MK7%PlJ>Aq2yp4_$)nF~XWZpkch- zz)uGDf~xJwuV2H$hr6xmD10=2)h%((?h}JVbDt8mod;e?^_j9cR?{{r?4(bT@snW;z5)Krs6hkTiC(@<*4 z=}^}%hzldFn3IOE>8|m$O|p*PCeK~jC+1I`gH3YW`@eq5?OaHS4wLs9q-JV$!p^-4A?wseto0pw1bT-r6IQyAB^06#9+pY;i`#Gi)lD=O~!g_iX! zjLHs9A}CM8QiwZ>0M1GJ_%K7TbXd#uh;~<^+S*In&l}Sm5#i+jv@$NOGwqSFI{Esj zyF5eLLpq9E#-5AIQs+(8F=l)-Y}U{Z>pN%5q(iymeJHDK4EE!^GlN~pS0%m_Kd?o^3*4{mszd_ zIOb4Lv>YQF8#`{-H&bzLAY$n)6l3H!+MZdx_zhbvn}gm$_}T zG?tU28NZbazWJ(Anxw#_UnXpTp2|P8CVs&puz!#dXKgy3WYv27;#H|Xa!`Y6bv#R> zn%_!qHvU!DyNWfI^ImBuy7tUbLsCiSdsCAI;gTNO#m4!m$o+*;{7G1rO-J7-VL3Fl z{wR;~Igz556CvSwR~MVEVXDicY>Z&BqDGiw*wtFy>giXjiuh8uIiF>^q*+j-Eu zg*5m^usBec5Zi>1(2PJ8A?>S&smbiR`>E64qNg~EE^l_CAK9>32T_pJ72WBIo{Mf? zEnhX0p8xQ>5{}qy*{^rps1>QlZgEd&We}^p^(o0191ZL$3e)8ruPsC#EslCi9?p7Z z{fz+>{c0l3K!EGAFNgwBl_&)u$v)Hkizo8-AJj|7)rMPAXM(tlxLq2xzp&o^_w1Oz zqzq%XLT9~yFnb?c9LNF}d5OYAYV7bTz{vGNE&V4+xe!YQAh==@j63N8WbX6Nrfa1G zFRwhj`22k#7y~Qu#M4>iL|*8WCnhjV+(B;6kL0;Q9NM2}@+jEwYyp~+0%5&KAvhS3 z_fPddns1;$E{bcoP#Yd+=zT&g@m5w=fy5&1wqs;jN3?kUwa|;w6?}GqDZn2uQ@U$H zsZed|X$QG_{b%iQGFutHSg(`v`>1Hkbd{x(xG#6!gKDW4|G}tPD$+$gx?uiDK<7CB zNuS8Pbqd2Jqh5N#hLAQ7`$Q^hWAoz59D?Yolw;@~Ye~a`oIRo7X@>Fx5pV|z1_FZXa!IYM1Tu*lOrG{j zoezpxw8=hlb{e}Q`$)7%g9W)P+BZm$ zs`Ms`dq#XP!U?na#L05#qjYNT4Ux1hgH{_gwI})*?YcZN_j{GCML?gEuJ`#6lwyG3 z^>yh%c=BOo#tf}5zT%sUQVrl^ zf&9jF=(ZO=*1ZB9!_ne?HgfIhzysU5^a6_uR!^kb6>XgiUl=ch{`44{jk)OwxWV%s zF{f-^VjT=$?iDTKk_{U_sa3-n&|LC0lQ(N!4IQx;&S*_y zbC>6J75_zVCN-LC_;krcni>|Dw9-~e)EYVO*@zpPvYO)2E9p%}K?2}u@Gb;vJLuml z=~Kt8Td89sWhs==BvsY!TT`M1npReAM03+|r8|N}_8^|vMh(8Z)p^m=141dSf0jL! zU+-k&qAlY@b>RZ!ss|OyE7+~qi|a2_b6x`!T|cdbw2-i>Q$+fmop5?yfe||bpC5JO zAk0<2nDIM-7X+7>`@9$Z*ed=*cdSF!lk3Y*=tIO(5$d1H#OTM(_%L@7VuwVVW)k!* zxeqKG#-z*-`11C8+- zNCO?KSrSMDa5M@gb`79&^IuxP|Mz3%uSV=+Dgd|HO0^Kn)J}7sz}cFYPw=4)c8~^O zMEL#BeWHJiKX`Ig8M3CvTmDu_WA7zIRmec6x%A|uP#{AI+&gq#)zX;t5)Dn{-De1< zmO0ASgf>|A=c7f3SkSA-zY;`>GU7~Vyba0aq^QT6yA`|09|LC&XPWnHHr{!mw}$O1 zHYHkc6w^&X6%4sxaelYfJ_w!D!ipnSsYb5Ce3*HIXl4NOVnI&ZzHtNgPxBV=-mkMN9QF`KOc(V~^VLtwf1rNNMw^X)eUt2Zl0TG8zmL z-WGA*c3)XAfS;{Otu+dO;7-#U-E;Dyn1uIj)ti5Yq=ecYl%C6T?5L=05%20XmTG9# zc61~K^~Zd2sVaAmr{>PHt&j7-;MulJiJq$21nZ-q_7~%Ahc3@5X>I3G+!9^pFj`mF zXCiyb)5iZKu@v7UmX_Ae=wxP&-gqo_RHhs5FSS4C9f-=j0TZizwvk^FBZI+TiIa0( zXmLkfL(JszmewFsRE_jxSul$w#rP9GW6_iNp56vF`GAs@BME*kDID@8J3HH`lQ3uR4Xf2rnWKmd z2af#luvf`X7PhZJ|Klr)fv7%v++ETXP9_S zsQ9ZT=RvH$#K4WqH>(fj8e+#B6Y9}PbYjb_=W-!{06-S)WL*U z1#b62m+hPO*R3B0MMb`N5k0ATOG95<3SR4<75Ti2j)G@!c4JQE8g`XNIQD^LLHV?x z)GNaWLUor#v=Z^<#m7^Jil@7s{V%6}C@VL8oJQi8$QX@j(Al3GU{W4?P>|$)(kxz# z5nStyooAjptemZ04}tY%r+li;1BrQwZ`&RHqHM-XxNf?6v+>J&S*~?Ni5uA6#^u2& z^6Cofztf@V1_x%57)}nm8=-=4>8Nd7&;9M2s(N}eY2lMjwLe}P&cp>occ20;SFWc~ z?hRBkavU>AJ_%tj9uhWqD@xNJ)(?VJ8WpgXakB3``jg~bUF2h0LzWn4PHL9GpAI)FQf+p5igjPb= zE^|oHjjksOv<0HSzgR-4s~+iIpEV)VFr#zeRu+0H0t_EoYNQgJs?@Sc@@|v1o)!6Q z#3EoZ5?ovPH8Z%4$j{dOskjS%Wk#h@)Z^x+;V%gMP@O)cFm7f!WAHf^o;u8LMh62e z&EV}?oo417WOO{tU$1r93#Y8&UM)NPVHGU|d&Tbem_*vu2aXxwrucYlC8}%Vf3A3q zzq{^8#+|$_uR>KlE=}ILHjq0Neom=CGl02$n4dpjL0ZB1;5tImyo@gD@5O&z=lqnJBY!`Vn+Ll> zW>eU6zv^h!&_6sSImMtt>7;-{k7ENqqw*Xr74v(ezJ5F*2KuV}D|6@Nbodfb+zy@= za0pgkmy;fOvRM+%rn=vpZjv|CD`qA;9ay5MU%)(%qPXy;V_k%;LPVBb3^)9@h)b(j7Z?$8rrG77?l!W|Tx7DnQ z>#D;GXV>IP$_DR}gH%L?8bZOdZWM?fsmiL|TFUtVZC#$)9fDDHHELsUnu{(oizFt5 z!C&s|Ut-@OT+|VNhEFCdE-tm!$+H)AJv*ogsw_Lv?f%t&wR0s)^r!$ZMji`=R8PhW zM!DmeLGs*YF(yqB(?UYI$kH044|<*Jyw8RAiex}TU9T7_l#JC|3KOvy8FEZfKDG+Y z#>Y4v#BYoxB-0$)mcsmg*M4CPJbn{uT`+GzGA0#U4Ec6yfUN#DnOxD845UL6T0G#) z{gktC@?~r%E7ALk$?}hVBl#Ru@S?AU17UqtQaWeg!#U!`1b_VOI@<{4XsSlLvA4bS zGs?Ikdva&m_O@xfH|ZBI3u3Ba4VjZ%^tR9~in8ro9fD~9hm`z`u^2f!jZC+_W zmieP#$XB5VgV2GHxXfL*o$Lg$uKqd7KXdG#6IC}S1r*7@_T7dE{ShP8a37hS4!T)o zESjhIZJo6@X)T-F)6haukv-Fga($~#EY{*s!Rhj)4b`sWaqcP19)${SZ}YhzqOrED zcJ_vdIO}HLb=O6;liXF;cUJ@7OncZ+@`b2~+tCT79~@K&#&?$DBW2}mw?(xseN$x^ z>5+Z(*6eL+V|f-Gp31?_<9F@;RQtD7EKDpABZo)JMvnWBnG<*hUef@I;6xdNQ7`5))F5fl z{OiL)dEJ|p6^lMkpi#VM4zH7^@g`Y~vpQq`CJ<=Yg_ZD{MfkQ(?5SCzXNJwNwEh z6oJ9GhMEFxpfH#olz&gVLaR*ZcC54dM6c&uE5tI!dUZHU_S>bnr+rh5$*UvAi-?>% zo4uzW;PDT*PNRB#rOD3I$7P%MGNvv?gyo z8XQ>PlKmi}hTw7(mk8`Vw{fZU&o{IccVGa6ZFhceg8lG1j@pXoMclOZ9lsUZxQNuz7j&a^vii9-leVaeOV4I$B{DO?gKY9i)5X35@Y<|XijSX$6{ z@)bt{3k#Pm8~YGp6y6`lBIwI}_+XtwK`-QEyv^?iV?hdn?dqHOQ#B{E*5nl?Q9i%v z5o&H zRdd6lI+<*^4XxfWJT$TG^PkiiL}LxGj_O+veZMZqLC&qa-%yh<*yMAXF{G#|7cLJ< zmi%@SP5<<+sh5_gS(`<*1CO7*#XOY)+%%V#>vc+G6#{)ElOX+QPU2Yim#sO8PJ zf;;UkElchcNEJNw`JLs*riyv2FqPfXEEMNP!UL6inxYQR=z$ZA?L z7O&Z3?b8`tkXjat7z&-dPB`kQaEaSuv#zY<*UB1hU(u?1D zHGt#tqTZm(A0SWJOjz%@liIvX6oyB`@f*1*ao-BV>sSZp)9=ayeOyny@Qzi~w21=u z$V-$^iha7`j?HxNRXa)dP1eI4SDRC$^=_OThwfPLcE42%;gVRmE?<7_BcFV$6Sn<} zcx7-6yo}lR^Ru=Xe(*DM)D>-`|1~`uLv7J(_ggMtk6f!J@O}2sJ?g5^X^0d=)Z-4- zyJ?9)SNhbjZ_bY07pXHOxf~`af@w3Z#=6foW>4~dyYpW)W6n9?A#24S) zcrWv~Dz(@=$T!FS^I7W{tB1c1i!C@T)&{7b{mLq~P*YihDTyWVdRW$eT32`yWg=LH zk=kBAa9ECsws@~`pxKP95-uQq;*v8RS*06*BoS13kmaapQn!E5 za&2a9W!I^DqB~{km~(5Rj^4(Muk-6QT&9)!Gr=Y0yw#iRTo07R?eyfOIr}A2@!i8& z9bH!M$ObH){AnSxfp$B@UYc|SgPfXK*(;`ENs{MNoD;*F^dm2eM` zM^Qd-u4U|0->c$_6WRH6k9y`+sb4{grL;k6y&z56%Docj0&-DwyaH5f5UT91oo0X*LIlR#yXYPyX|N m0{?Z(8pM47^yuiG5C+`WdvWPm#PgZ}fc#sPH-)c_zWz5K?2s@3 literal 14886 zcmeIZWmH_jwl3NvA%vj8B|w1S7Th6t@Zfag?hxD|KyV1|4#6E7x8N>~G!WdK#$9e_ zpL53B@7{Cn+vnXe-mmwg#~iCxb%eBCZSoybu5Y z5CY!3fVX55>YTs@f}^sOD4=5O{T}?{m6?dV2mnwWh4Ns42){=D_66t&0HAmO{UP+* z6&V8nye-n=BC2k>M;RCqOEU>8QZ^q!xYH%{xXS)63m^0MsT0)I8Z2nwGIeRD9;>*d zL=E@I#jF^Up;<8z+dunrNwd62{3>SQ-hw}af7MqP?C@C3T2e!!4}E^gRj-VKs2=q8 zseki9u=)ot7N2*PS03Ah*5k*~kH@g}Eem?dx@F~}!UswNvSqU$yY0Av z=;+;V2%k>@0G}}WEGJVX4hqt2?^cn7HD{RYhvHw|*az2zLQ}Rnd3D8@m#=A-=ZEFQ z4_aMyjoq(rUA7#B1ibDdq5y#JDeS@!tdeF<_39s-q0lrv9jvX!-C5s9ikK+9`*qpn zrG7batE$6(vrJN-xm_r4fQc#!Kwo!64g5p2fm(^tfGKy2^B}07tiym}Cbisr@XpnD z#7z?C72vxwn;irz*H*qrvx`W4*doXrx?iGFt}Hm#>SBG9)?qH(#}CUOo4=ee%BPM* zn{bjiP`uKy7TBM)Sb07s)4q*4>0G;oJq;wRx#}|CJ{ysK+P% z0P>$IN5+*+)&=X{tyd1(EL*Bie7|0K_?1!9>b|>yAEwx|k>tA(#^AG&G%gJ5LK#is z%7yD1pp!TlC%vzPanH-@U8Y_>ZuynFF0*)DuxX9^xZND zcnPpJ;*tb!5*`TRv9?-$R0&rv0OHO#)O;J0g1L1*_w9{mF50Nk(00##f58G;3nzdH zjH3!w9pu1TEUtlDU4a26u#k=m2QsbZ*N=Je#m-~*D=efi9*>LxlY%AyKz|MZ3Cnuh zyi+diWCemaU}14Ggoru`xE=(X6bVIPYyX`6RgFNU3&s+5-J8|Ba_q{9BK8{+Ug39K zWy9W0S5I1O;2JUW+d)NtPmsPrqUigSRKxue0LXL?S3mVELw2^3fxIQFbbdpxI+ZoT z&6V8~o_OnaGLn_~5I}XVl;!~(mIdj|nvIid(I3ELtl)lvyf#7-K^3w70+ zIrBZ@v6Q*X{PB+|2b%Y?INZE#>zLx(S@(V_y*XaM!+(a_Wn|G6I%fj`05zYd9p9(s zm@nTkGGg@}XY|VH6U7QX{>I>wqXb|e0&^5x2Dzfs46ED=Y>-+i5@O z#D^buUYB;fI3pvzv&->)X1#2vst`Eono@U(|GSM<#jTt#^S$xYE>MJh2Fl#F>x}eT zA1JRp1M4@p^aQRzR}Y(3zc8q}eS_(rHQ&LpgL_KA0*)cA<^Kg_{8Mu`IM>;H+z#pL zy+cKuUh{TCT000fEf#jT^`Laj7ut;s78qxfrbe9o|r5O=6kzJBB_F& z&&!TOh{8shdYK=GRjkSstA_fL38aKuyZOQNowPiL?kVuwI85T;Ymo`wZEQF?+U<>% z=oGoI9vtqu5L80dD@fE4Hpgrqm3+~Uq_GTwMHv01-o>FBd=SpC6rbN^JWS}-kW=%@ zc6r5cxi-~$c1vbKU55@|=}1CB3;2m%K5AoFyp6;X&(+k_E+`>*Es~p?F0L4A%#&h| z%j7<9Oa&P#nB?KKIpBqFQ!ZSUki@o(!Zi2yujJn$yy+O;|MCNqLnQ9UpsCpweI}NM zuvTyM`@#KpOfw=^+szUPfYl>2dPvQ+!?k!`rbILS232n3DMO%4$Q1TIT_{_rvz7=6+ebLc%aWr`2fiJ4}Dy z>3?Yj+#ntogN09%o!t0OCyG&mx6|%OE0`O*aWqe7HLRphdDy;}K1T1|*L(D|d~_nZ zeJ?KbI#vi)+}8I{%BmlFreNSc?-lpEE<1va1GwC2KYhvCew7jDdmhdDG`>Nz@)!vV zx4(AHywwVhI8Er!Y8vo(T0J#;`g!TKcWSomy89ezKfA%;dtJqPMWS~rVYO)QwFM&) zqUt;9&w9MaAlUHry`T5hk6dVfJQS|!gL&W2W011;J$oI_`+99Yhn)(O-fv)NZ8%0f zo(l7xr4lp|GJEj3ANHySbJconGBVNdk@g^4zV%1PmiqZnwkF*!n10 z!c|a_qd&2Jl)&nZrcjnarMnN6ijcyK-Rg02 zUF8hg6Wu^(r;h5rady=kEk=$cj>^m95YiLfO@$jov;84^X-OY@o zhsyiTfv+c8g_7nADlgDss3&@ghDHgMH^%|g8?C}f148B9bJ*{Vw)v1If;vy2S07}J zJO9aWU^|BCV~{n?ysF{A>o^JBl;j~o%!E}1Ez^g zOhMLm^P7ePK}j|&LE0}I$V15S1GR|^9|8mHycURd-g}+%uW z`CPa3MJExk;lPpcGb(Z-4(rE97Eqo?`6I4pxgf{5)sdZ+QBR%AjzDFdUUi>*lzJtn z<4oBz=w9Bl+&kB!95}ujgFowDJ{ZU-c?oLi(*-^^!|(0}9JE2N=421W>a31@=NS&j z#?C=4{kn#}8^n*Zf4HIW(YGt>xLaobkj+~ijn7*}(l7x4=C8%!-cu?91Xg? z&k*xpX!bX4e0p>}S??`{By~j0qU9ove(Ltd01zYRA}+iWN6A*gWSaX4$IHmcBJ=Vx zX67>Hdp|?>s;Vj;?NdqvlSZDRo=z?#$P4rM*AiBZjm=e+M6}727o#ry6NZcemR#?$Xo z$*h5pu-W{FH%TdNJS0~j6%E^7RY>AliODk# z@@A5Fzfdu8BCb}|8{O4ASYSX=oDuj9a(hTvs1&R^X$oH6>DST(m)QtE)uJ~scFQ%2 z&Ln_X6H15Lu9puGEiLw-T6VbOm$Q1X{t#$^nG8f3y?Q#!XoU8dhwK-Z0V(4^I%RxR zC-lt}xn6J~$c0bgGQOrFefK(&I#-Nkw}2y~Yfy>$PuNqp>kj*4|DiQtqI*!~`cUX> zd7QLqceA+CV>S_wi65lxlxs5L#@QQAtDV9*r5#AgT)NR8<>~h}*Lj$!;f6K0ZV#Ae zZqcz~WicE$xGSAD79(0~gBQ>pgyQb4v$^{=Pzm$VJFxT;H=}Dg=OO3E1L_M?IsS~U zKBiX-u{(OctMG;NscOF4s4cV;IwN%-@mQbXZyT=3ml)RJ9W#)>FKqAppsT*twa2Lw zmR$-OOXtNF#$e0@_rMJGr)pk9*t9-hCH3|F5Zn=q&6|su_hH)<;RC4+)aybM>37m+ zlv8)d_X$K{TmFa{UBfR`3a|PuupsES8J7q@)*u)m;!D>fG)pIA8~DQ~2Q;qD2FBr` z(4e!!+HqZnL8@HkJ6F&;ul@QD_`V&A&!uwJ;y+%jLmNveXq{4}tKVrBf*$HE_j%&CrohZ87$kgd4LgAc=65B*9j;RW<4Yg< zZ2E;Rrm`M;6p=8?olm<^SPuWx4GZZJ_TWWj1;~$Zug;!FOn7T53sXj5qhxr=zRX7R;V~{PkxWbN?S~?!KSUN5yWqn?3 zWBlzp8lL#cigVAPV7T?PkGRF<2&AkH-+b50o|Rcaya8~PL+Y4JTbRSXmb+x_d_QNl z{9Na72+@M5B_*pP?3sgkc4VC8a=_Uo_`*ft+F>E`KDtdp26`y$`3d&CD<$0ga5lVj zGFNRR^k#c7*}GD~b&==pm*V#&@#V~rV(k4dDer8?Ok)V^-d5qkfzqO*qim>jcrk)4 z_|>MNk=zEVf#JQonov0ErJ;?{&9B{I9}Y zVj6>Hf&2U9hM_^vQ-947qisB@A;^4?%DCS;PxK_ zFSWRO`hh@v4x1rv55Lz9^(*8UK^81UDs%<+0ZJZYcps+?x(#!k`PsJu!Mnis=$93> zbGY3*BbGIcMjIcOeqJ_j1uq7&tD$CMCaK8{2cl~A_HVHRYBx8FJzdD$VP;X33x1HSiUJKyN73CNm-Z&`?S@Ufrlj;l%r=*b-xsn+aZnibwv6Q^@j{7 z?CBWROpwg5Au+rXG4=Cp;pB*f*&=D5);w^Cs}-V~>Ee7?5q33H~; z_bse5>i;=asCfS-nIDnSW z`*^vN!_`jl4=r7PP_Ml4qY~STcGZgu?{`L@PSm>phyo>@3!t2mJ7UK?Y4gR-WI*)` z73DF7;1QmN2dhmKAeQ#iD%Y*QaG0{zo<)}8Bo_&#`JU+ZbcsajZLy0) z@*h5(|35>hJe*l``d^^yZ`XnLo!)SbJQiQVO5*=lUgp1mtL8!LSvzZRHDdp+CeJ&AOHjMCuk4U09du;qJL$MZ-E`+wlCjgW==5;^^ANw`K%$^&O+*hy_SdfN}Gw!$+ardtGit8QPX?j@9QQ+zB z5@r4KC--SX!GTHt>C_^mjxvx^a?NG&vbBKt0Zn3R)wZg)=?&thl(D*$OvV#yK?LUGQDTS}(@oo{ zR_QXx*Ncwhk=)C>NV2j>=|<^oHowmJIUJ)Bll+JYONlck%7xLfEretEEO=X#=tl%ck< zq9JKi_-s$lKIn&ss$XiSjsqgcv+^-jP*pzL4!6!y@H1;n*xRSz6Fu&d&`jJajI0Fkh<{cfc6}$RAXMs`D z={CBr#i-gahGRUG4}#eF$d}@U4DU1TfBC68{V`REaWz17%DoEnPQ`9U5lAU_zso3y zcIZ?#tujPRiXRtcl&nkJd}#gUje>}1EvDIPEz={BOS*aDs=Q=)X?$8F>M*dwcs!vwwbB2k+8r9XsnA)|U9eZ@-tew1*1~GR~LpEfo)><-fdsGs3f8Y zfC)IMZ}(Pfym4W>V3P^lx0JC0mdwe@&Xe6KTMP^FA$9S!a>HyR##DU|hZX5;2|A(E zh)g8GnkzB?=&N62RN#PJB15}Aij(>DN^R$MmW-#-p^mJq;_2paFD?>Q^VR;7uMnnIvUp{i|oQ!!;vBC4CwS+m%dqj@>l=yjzNikKJ+O3%Af(!khGx z`>EGMo1`ZDwz^ED{Jo=`8+|sBbZ0e*FnT6IS&hGrX}=d?pUfV=S%z{#^4IAI!&Y7C z7XLjPI($JqlJ%Hmrw=vF5SwNq!YQ43EpiGzhL}^qe$Li@xn?3$%%>^j3}seduKtlc z!vqa7CKDMaj{eiLw0;*70S)nkUT)H>iuZpXlzs79ZE}lAqoVm2H^8-Y?!+X`I82Mq z`onm~)9*Z%%cn@@zunGpnUqi;gU8V%He-odtxf(Bktu=?3#o~jh$X3B3g~x2U&F(x z0k14DK;QPCBdj-n1CkItYboQE^M9g`{-3gS|3tn23%R}j=*=N^I)46_rONqlu~gXv zsuX}%e_1Rdobt8x{Vq{AwALxg+=Tcc+PU>_y-|F|)s&iq%s-22Tokf|ykTwE$JHU^ zV!{aL|Dd$EvcRpjxM5WBq8u{G%jyt5_p{Bh4E`h>ewRZyuSN5~F+%uvba;HXH51sY zrWDiJWl2X(LjD&0cF+Dre3V4eL(w#=;Q0#Dey9A~WWREARW^{HO6hgGB`J)fp2 z`gbL8qJ;k*ZtwY>_v11A-Pt@=3YS>#qByrXqJ9Ft6HaZ%sk5kywb~G_?aCq76_#wO z)RF^z`uNl4TtN86Of`J((KBR_;oMosClB|L_J&+e|uL^z|#X}G6TC5hx8X)0RJWGam@@dB_j^LIee{LNFaEj>N1nXC^I04tbMMBECmxW$ytcQRQz2bn zALL#btKoV7a{(K$5Rqovya)Fn2pnyBdYs$ zYDc^aTbp|L<9c^zK3S?KVyY`yO~=%3ah6bmvTjGr{>>v;J|?NdUDvfY6G&fbk?W{145>H|3v)}&Lhc0qj2RVQzMmnIu640_jNxG z3~chSxqfzj*ZBN&-zMoSF8hx)4!!c`o7v{Lk1HLK1LsaH*pKDD1boPLw!-Sgs!ukz z0o)#$m2>C8BT4>*$&RUJc+mdHF_MCO?akA+&vC#mBm)MQzDM}nvj??lSmFvbL=J&E zB^NS#Ujq+Dci~h3oDq!bSi}+wTECe3WF~odza=7&cWPZaRW^P@3t<)R6Rm15>V(dYWd6#$}~#dZey@O$JlylYLhA_(w_{XY#HYGCfC z>odEs5Ir8NJ_T<|QFssb@8sS5K~K)AS+&L7*3 zM;98^vt+6lE=$g{O>0k&_ujAIFPufn|NJ^n^f<0v zo@lVf3A(Yo|ONoj=xD*#Z%YK;s@W$%w7>)4Ey70|YKsRNnByCrSISWGDWQw#UDa5HVK+SNJ}Y zw7Q+bO-n*jhihe8ki@VSd`3+oVE6<6&7}PA1Q!VWcf*<3NvQ{ghj-%&6Nu1MfNW$; zzlz=MLkXS>5|OYlyX9hf#QQ0gjQ9@+bd1a!t;|0fW2jR>br;q0{iS@9?5PN zyqgXFISUiQJF_+n|i%gWPI+JZ$*p}+=ekd>f- z1Unl+osp@_=k3AHgwibDOHSd>;2(78el6NiDd!})W|4EAnV(CSV~2%>k4pD0f}S1^ zX+-3puA7HCwxt##LXxz@aG57I!!BlMG8b?2YSDVFu3Pzz#@Vl^I%oFU>rbu_2iPPV zq_^CE$W)S(yY?j;H>vN|l@$h~*KyAEEo&~7oXZ3R-vl*qucp|{$tkKruICj_gobll;`%AWi6v7%s4O$mlvw< zq{=OKKi0!zsInB7n{38;{&ju@8p`;Qu8r&+f*xn1QU6Vt_$w)G%8MjOn!0b{?LF%| zR(|4-(=Ub?ErWAUi;|~^`Nn9Na5dD~=Ih(FG@pbe_>;amO^Pu!XnvGWP9Z3_NpbxJ z+6a~A8fJX=Q(kjS3enTw^&`3E81+TH@vH{KLrwPE+~@GpgeVn_M;jXs8pWmB`vFg3 z&&}Mp!uEZgki<_{m~$#xhXi#jU6~rh!^yqw7)lkXSvdUEKZwTGsO6K3alNP;(#Jn_ zCa9MRWm&6)i55GJQ%E%J?pr`Ba`vV2k{j=(8d3}kois<)hHC?bEpP*iQO^AcD zV6kd~tu4h^AfZk@JMf0hQ2nP2Cn32^Q(k!z^qjB`S(by&C1;m&Cu=QC56(p;JGw+>-kMD+r!;phAn{zn414p@708- z(AO69k4!gR#{(|XAu6Z6wu2gBd5bpHOjp)i{7G16CJ$d^UfY#qQuMw>JaY^p~jkoJjIeRuI@f+B1v8A>wPX0 zp<&~5WlXGO2jP~gsnYCd54F*#CSQ(Db+%(cu_cY5szdjS9J!m~S@ilV`EW}WSMA!m zN`?G)()%rqRL#ls>Yory-}~?->5=z_;i{9Ytb6f1LQANs87`X}%88=0ZRE>2nGH7quUtnwxY6qClIFqaI|H zh2Wl&r6T{$*>?r1gk-W?7x{!O5wq2UiC@mO5)GTa#28ybEe{$gsL-TI_KAME>XByb|*kIc@KIshnhN0KW z_FU<9aH`sl6fK^0yAt=*F3aO4N$d5593-O%+x15@+fl{b!MONY>1LwKvkRwLQKSYU z&l1s?!D)=|0%HzwNWxqEO$lWCjWB0t@;L^{;?RIQBv}PCquB+`^0W(#N-VY$(sW=I z{>BknStZzqAW02Z7DDYB47Qg#6F-Xg>1}$_PBxoZ*<0=wo$ACc6>9MMHWK$q(`-@x z06nE9yPafRzi!ncN~YtiH0C+@*?nZ`aJQcAbd&(=dTkiMhD5-o?r*q4G8J19_6L^2 zNT%LsFLs?*3ZLxCiV5$2H|L}URap!^Me`qJLD3GFzlvD)5$E_MVm6A1I(`7bLpYsu z$+pO>OTY+`I11c>`&&xzp9!lA@(I1xun@4E;Vk^tgB#XtCZm49OiOXP{B!M1~yC zsnN8O9js01{?qO@IrI$lR&QsOK}>i zb*zjx_Nw@dv@0<@a^U@*b=h7~2{r z_SN+>E?-~`q6rt5y3-3l8osy{1!R)j(6izEn#bPE>9`)xTXA~6@7OfN_0yN<;+^P4 zWG<`z8uZXpat~=6V%1)pqjInecgcsuQHq`gcSTkF&+X%-0C|=YHn$)SzSa{Xh#ey`C>l$9V|e8tO{>L8<;3{jXk^(JU3HsaFjjCbM*F z(ml%Z=ZKa7F_R{2%$xR@ljF7nt#y1m-^BR8?XS@M4073(ie03 z;O_{(T>ubKFg3ZSC2*L1uo-1K8tIoNt*7mQXXDH7P`K+?PHj&S!hvATjmZR0c>FD; z`OieTGns#i_tBpxjfgPI?fcij%NwTFyVT*A=Sx2l*0L)pAF25Da@E;_@+0_OoiZpYZYZ)>MeFp+i>&xMEIVTYcdsp|ozDGgL{CW>WaVTECkZCgNNaVy zqAnW=k0Soiv(}#XDa#9THmj`U9yCbGao=RipiDW@R|8qF@F|+@$lXiwZM30zy}>2M zOFvv%zMO8#??>Mn^ zL@8Nez-z%nMLDz?{N&NGqQ()3ll$P?U$rS%{m%4LeY~PNDhP_@fqQ&RvO!}``T`Hd zM=}<;W?!mb6Bg%4zb*auK?{_j_JK8@eUmnT&+F{3Ab%DWK@yi7Z_`8t)(W4EzW!>q z7#jW6-|kWWE3L8-tCy$8low&^J)zkIc8w$Sz1;in)LLT7|UD zrvUU3F&ME2+vg7LT`|{Jt^)W7y$MjBqZ$`?^Hz&YbYMjeY*XN2n^|M%g7_Yqun#ne_+t@h4(^R&E=#I3Xul<|IKW zdUsJxF;2qSBpf4}r1+C2>QTPYN!H~%HD`XH{T5K@LsV_NL0d*229g-!;6;HnyS>S+ z42t^~-@?vWE#-*A55()ghDv$~4Xs_##4d^(jkgKud)~db7e$p)n!1a$h{#0(c5n4e z8BB@N!DQ=RbiShzm4vO=zJw6Dzgf?zv~K#OvET+#Zzm|c3Z*nv8<^!RW{WQoVo0la z;QBpY$Yot3rS0yHU*Lg`NM8}3Dv!t1v^A+oeKaZR@YW<<1eZSX+bc6gdHeqKG8(aO zKeD!7EVCTP;~N=rCgi^j#3qW19PgJ-Zb+E&FjCM|8u?UNyaQCh8ZC1S3}Q^kSQ{#( zP1_$ddqu2cfBSrW^Ibq8I(svE{$0jvXEiePW-8@)I?PWMGAKZ4vaiVD?E*r^JP!_Z z8q_ZbfuZb0qVsottB1wK!YsR+rP}AUUKq=Ef0W&4n9*35>esh>FQ~dfF{>xSG+JJg zA3%8+B0Ss<7u}uLg-iP5aY75Huks!D#7L&HerxJXpd|Y}PBoqn6!io*;~DCzQ?igz z*J9#-wZHZIRP(D7ysBe4>E^79XEtCIo+{dyyYY)7H?N0m-}S6pJ2^TlWs~sP5E{9< zV$Nt9hhwTt7J);iBRG~^FuB1-cqx!ziiCZH${&|FU>QHWFc`)#UQ%bRuH;qy6hw8nhDjsBCpf0Xp0>B0n(rJE zF-kfX_nw;L#wL|AK9mjuRT$>O)8h_-CX1~q$OxEOsszdta2uh@xH#u21eScoi{q@3 z?SoN1_FDuXA8_D7j5@G;0(MChd-F!9yM6WO<{9ocH|0$jq6MK$T~97jS3YX0=^aX96oh2 ztj5VjWMPrK6aoo|}#~4o{|l&Bjw9Uy~an*gj*I zq5xU-s1%5TQ&fGqu)Ug%?|O{gd)BaXO=McK&DFG#my%M@)h08flCDa7MQ3;d!ki(N zI<>#(aW+Ji6nO}M#qHYRa?J&0D?dscOc|35FXE^C$H%SX5}@aFeB93EQ)*Sc77Cn- z{5pT;GS<{%i&sYyxk9?fB}&)B1ZjsiW=Er2-(@u8g$qc>f%8oriRbgyBOwu-!;P6es&PXbRs&$gXh@7`~Lu~#Nc$$q-^scAATgQ`!?_1iQLn%fsA7~!=S2{87WNbjw&cV zY)~+JA8?ONJ+gsuNd|0`Y+w^UjxKJM7_6_Q0Ong(v;v9#mv!*9bSVO_6l8;ULVcc&3T8QFSC1O=$TIYXu+jyhe ztt$62b=yS*(Gj-_Z_WlTTpbq=35K$H(5+q#Rhv$y`*ldau0j+67x2CkOf^}2A`=;U z^4wicOe=kE99}gu8C$a}YYsvSxmZcthyZawIcG$5_p_nxqPR7iR!Oy?+GN%k-VF1) zVcZ{u$TC@IUj@rM&P^D;UvW|Y^BUI*;q%l7kji`iF_Iah<75NTmAT)UsYxY z=;%xM9S>=KB&UHbd*++1bQrqvnQ6{l7n3ri+^u^B7Mq)6nr#cG-$lUCj}) zc`?i3pB5mxX4y!tjak^`y~UnZ0qriQiRJTP$JQcceqxAA%~k&yI%BhGb$vlAB4`U_ z9*y4!Ip)**`lWZ~{#zy^RIR~jIcN0H4Ix_sv)lsRuZdk9);zdil*B#vC$dg?o#YQs6#56R`I4$igX$w+RtYyr^f!KV;f&$(B*Rhv_Tbj9b|;H;qk< z6JS0yUxYxXgMTmL3+`nWAOGC0uta_q zm3Pvd)Zx*0>|Zjdr4V9Uu2XR+DeVZ!i4BmQ@|G$F%T!!xSVH3m_<+Efu73V)fxO$TOZMk7SDhxn9NeDDVELw2sLcn4q{Q;PFXAD+YPHaE~d_uuw z%7oW5!VA4c|9|oS*%Gh?f5&HmS9;c+on0S0PnE#GNBqqNFFyTm)!P4`^=5$s8vyOw cQQb2cIdM3dZX`-9ya6CBp&(u%s_*|l04uv0RR910 diff --git a/windows/client-management/mdm/policy-csp-deviceinstallation.md b/windows/client-management/mdm/policy-csp-deviceinstallation.md index 7380b5d410..a4b7177795 100644 --- a/windows/client-management/mdm/policy-csp-deviceinstallation.md +++ b/windows/client-management/mdm/policy-csp-deviceinstallation.md @@ -442,13 +442,6 @@ To verify the policy is applied, check C:\windows\INF\setupapi.dev.log and see i <<< Section end 2018/11/15 12:26:41.751 <<< [Exit status: SUCCESS] ``` - -Windows Defender ATP also blocks installation and usage of prohibited peripherals by using a custom profile in Intune. - -For example, this custom profile blocks installation and usage of USB devices with hardware IDs "USBSTOR\DiskVendorCo" and "USBSTOR\DiskSanDisk_Cruzer_Glide_3.0", and applies to USB devices with matching hardware IDs that are already installed. - -![Custom profile](images/custom-profile-prevent-device-ids.png) -
    @@ -546,6 +539,13 @@ To verify the policy is applied, check C:\windows\INF\setupapi.dev.log and see i <<< [Exit status: SUCCESS] ``` +Windows Defender ATP also blocks installation and usage of prohibited peripherals by using a custom profile in Intune. + +For example, this custom profile blocks installation and usage of USB devices with hardware IDs "USB\Composite" and "USB\Class_FF", and applies to USB devices with matching hardware IDs that are already installed. + +![Custom profile](images/custom-profile-prevent-device-ids.png) + + **DeviceInstallation/PreventInstallationOfMatchingDeviceSetupClasses** From 6ca22b442e6800e0d05507fe643ef410d383f45a Mon Sep 17 00:00:00 2001 From: Iaan D'Souza-Wiltshire Date: Fri, 22 Feb 2019 20:42:37 +0000 Subject: [PATCH 75/76] Merged PR 14461: Include link to testing guide for VDI Added link to insider preview testing guide for new VDI shard signature updates --- .../deployment-vdi-windows-defender-antivirus.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/windows/security/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md index d4182f5a74..06b879559b 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md @@ -24,6 +24,10 @@ In addition to standard on-premises or hardware configurations, you can also use Boot storms can be a problem in large-scale VDIs; this guide will help reduce the overall network bandwidth and performance impact on your hardware. +>[!NOTE] +>We've recently introduced a new feature that helps reduce the network and CPU overhead ov VMs when obtaining security intelligence updates. If you'd like to test this feature before it's released generally, [download the PDF guide for VDI performance improvement testing](https://demo.wd.microsoft.com/Content/wdav-testing-vdi-ssu.pdf). + + We recommend setting the following when deploying Windows Defender Antivirus in a VDI environment: Location | Setting | Suggested configuration From 5ab573c0e76280dfedb24ab3e91e81f99021850b Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Fri, 22 Feb 2019 15:34:47 -0800 Subject: [PATCH 76/76] fix tag --- ...nts-script-windows-defender-advanced-threat-protection.md | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md index e4df4b05b7..14a13f7b3a 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md @@ -12,10 +12,9 @@ ms.author: macapara author: mjcaparas ms.localizationpriority: medium manager: dansimp -audience: ITProarticle +audience: ITPro ms.collection: M365-security-compliance -ms.topic: -ms.date: 04/24/2018 +ms.topic: article --- # Onboard Windows 10 machines using a local script
  • Windows 7 Servicing Stack Updates: Managing Change and Appreciating Cumulative Updates - September 21, 2018