From cbe91d3e9ac6ecf755c53d054c30dc80d5fbb475 Mon Sep 17 00:00:00 2001 From: jaimeo Date: Tue, 30 Oct 2018 10:48:22 -0700 Subject: [PATCH 01/32] added requested info about Group Policy, fixed some terminology and capitalization --- .../deployment/update/device-health-get-started.md | 10 +++++----- .../deployment/update/update-compliance-monitor.md | 2 +- .../waas-servicing-strategy-windows-10-updates.md | 14 +++++++------- 3 files changed, 13 insertions(+), 13 deletions(-) diff --git a/windows/deployment/update/device-health-get-started.md b/windows/deployment/update/device-health-get-started.md index d713b0cbb7..e4a62129cf 100644 --- a/windows/deployment/update/device-health-get-started.md +++ b/windows/deployment/update/device-health-get-started.md @@ -1,11 +1,11 @@ --- title: Get started with Device Health -description: Configure Device Health in Azure Log Analytics to monitor health (such as crashes and sign-in failures) for your Windows 10 devices. +description: Configure Device Health in Azure Monitor to monitor health (such as crashes and sign-in failures) for your Windows 10 devices. keywords: Device Health, oms, operations management suite, prerequisites, requirements, monitoring, crash, drivers, azure ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library -ms.date: 09/11/2018 +ms.date: 10/29/2018 ms.pagetype: deploy author: jaimeo ms.author: jaimeo @@ -26,7 +26,7 @@ This topic explains the steps necessary to configure your environment for Window ## Add the Device Health solution to your Azure subscription -Device Health is offered as a *solution* which you link to a new or existing [Azure Log Analytics](https://azure.microsoft.com/services/log-analytics/) *workspace* within your Azure *subscription*. To configure this, follows these steps: +Device Health is offered as a *solution* which you link to a new or existing [Azure Monitor](https://azure.microsoft.com/services/monitor/) *workspace* within your Azure *subscription*. To configure this, follows these steps: 1. Sign in to the [Azure Portal](https://portal.azure.com) with your work or school account or a Microsoft account. If you don't already have an Azure subscription you can create one (including free trial options) through the portal. @@ -38,7 +38,7 @@ Device Health is offered as a *solution* which you link to a new or existing [Az ![Azure portal showing Device Health fly-in and Create button highlighted(images/CreateSolution-Part2-Create.png)](images/CreateSolution-Part2-Create.png) 3. Choose an existing workspace or create a new workspace to host the Device Health solution. - ![Azure portal showing Log Analytics workspace fly-in](images/CreateSolution-Part3-Workspace.png) + ![Azure portal showing Azure Monitor workspace fly-in](images/CreateSolution-Part3-Workspace.png) - If you are using other Windows Analytics solutions (Upgrade Readiness or Update Compliance) you should add Device Health to the same workspace. - If you are creating a new workspace, and your organization does not have policies governing naming conventions and structure, consider the following workspace settings to get started: - Choose a workspace name which reflects the scope of planned usage in your organization, for example *PC-Analytics*. @@ -48,7 +48,7 @@ Device Health is offered as a *solution* which you link to a new or existing [Az 4. Now that you have selected a workspace, you can go back to the Device Health blade and select **Create**. ![Azure portal showing workspace selected and with Create button highlighted](images/CreateSolution-Part4-WorkspaceSelected.png) 5. Watch for a Notification (in the Azure portal) that "Deployment 'Microsoft.DeviceHealth' to resource group 'YourResourceGroupName' was successful." and then select **Go to resource** This might take several minutes to appear. - ![Azure portal all services page with Log Analytics found and selected as favorite](images/CreateSolution-Part5-GoToResource.png) + ![Azure portal all services page with Azure Monitor found and selected as favorite](images/CreateSolution-Part5-GoToResource.png) - Suggestion: Choose the **Pin to Dashboard** option to make it easy to navigate to your newly added Device Health solution. - Suggestion: If a "resource unavailable" error occurs when navigating to the solution, try again after one hour. diff --git a/windows/deployment/update/update-compliance-monitor.md b/windows/deployment/update/update-compliance-monitor.md index 5371ba5470..25fac89570 100644 --- a/windows/deployment/update/update-compliance-monitor.md +++ b/windows/deployment/update/update-compliance-monitor.md @@ -38,7 +38,7 @@ The Update Compliance architecture and data flow is summarized by the following **(1)** User computers send diagnostic data to a secure Microsoft data center using the Microsoft Data Management Service.
**(2)** Diagnostic data is analyzed by the Update Compliance Data Service.
-**(3)** Diagnostic data is pushed from the Update Compliance Data Service to your Azure Log Analytics workspace.
+**(3)** Diagnostic data is pushed from the Update Compliance Data Service to your Azure Monitor workspace.
**(4)** Diagnostic data is available in the Update Compliance solution.
diff --git a/windows/deployment/update/waas-servicing-strategy-windows-10-updates.md b/windows/deployment/update/waas-servicing-strategy-windows-10-updates.md index 668d342d72..9ddff72510 100644 --- a/windows/deployment/update/waas-servicing-strategy-windows-10-updates.md +++ b/windows/deployment/update/waas-servicing-strategy-windows-10-updates.md @@ -4,10 +4,10 @@ description: A strong Windows 10 deployment strategy begins with establishing a ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library -author: DaniHalfin +author: Jaimeo ms.localizationpriority: medium -ms.author: daniha -ms.date: 07/27/2017 +ms.author: jaimeo +ms.date: 10/30/2018 --- # Prepare servicing strategy for Windows 10 updates @@ -20,17 +20,17 @@ ms.date: 07/27/2017 > **Looking for consumer information?** See [Windows Update: FAQ](https://support.microsoft.com/help/12373/windows-update-faq) -In the past, traditional Windows deployments tended to be large, lengthy, and expensive. Windows 10 offers a new approach to deploying both quality and feature updates, making the process much simpler and therefore the planning much more straightforward. With Windows as a service, the methodology around updating Windows has completely changed, moving away from major upgrades every few years to iterative updates twice per year. Each iteration contains a smaller subset of changes so that they won’t seem like substantial differences, like they do today. Figure 1 shows the level of effort needed for traditional Windows deployments versus servicing Windows 10 and how it is now spread evenly over time versus spiking every few years. +In the past, traditional Windows deployments tended to be large, lengthy, and expensive. Windows 10 offers a new approach to deploying both quality and feature updates, making the process much simpler and therefore the planning much more straightforward. With Windows as a service, the methodology around updating Windows has completely changed, moving away from major upgrades every few years to iterative updates twice per year. Each iteration contains a smaller subset of changes so that they won’t seem like substantial differences, like they do today. This image illustrates the level of effort needed for traditional Windows deployments versus servicing Windows 10 and how it is now spread evenly over time versus spiking every few years. -**Figure 1** ![Compare traditional servicing to Windows 10](images/waas-strategy-fig1a.png) Windows 10 spreads the traditional deployment effort of a Windows upgrade, which typically occurred every few years, over smaller, continuous updates. With this change, you must approach the ongoing deployment and servicing of Windows differently. A strong Windows 10 deployment strategy begins with establishing a simple, repeatable process for testing and deploying each feature update. Here’s an example of what this process might look like: -- **Configure test devices.** Configure testing PCs in the Windows Insider Program so that Insiders can test feature updates before they’re available to the Semi-annual Channel. Typically, this would be a small number of test machines that IT staff members use to evaluate prereleased builds of Windows. Microsoft provides current development builds to Windows Insider members approximately every week so that interested users can see the functionality Microsoft is adding. See the section Windows Insider for details on how to enroll in the Windows Insider Program on a Windows 10 device. -- **Identify excluded PCs.** For some organizations, special-purpose devices such as those used to control factory or medical equipment or run ATMs require a stricter, less frequent feature update cycle than the Semi-annual Channel can offer. For those machines, you must install Windows 10 Enterprise LTSB to avoid feature updates for up to 10 years. Identify these PCs, and separate them from the phased deployment and servicing cycles to help remove confusion for your administrators and ensure that devices are handled correctly. +- **Configure test devices.** Configure test devices in the Windows Insider Program so that Insiders can test feature updates before they’re available to the Semi-Annual Channel. Typically, this would be a small number of test devices that IT staff members use to evaluate pre-releas builds of Windows. Microsoft provides current development builds to Windows Insider members approximately every week so that interested users can see the functionality Microsoft is adding. See the section Windows Insider for details on how to enroll in the Windows Insider Program on a Windows 10 device. +- **Identify excluded devices.** For some organizations, special-purpose devices such as those used to control factory or medical equipment or run ATMs require a stricter, less frequent feature update cycle than the Semi-annual Channel can offer. For those machines, you must install Windows 10 Enterprise LTSB to avoid feature updates for up to 10 years. Identify these devices, and separate them from the phased deployment and servicing cycles to help remove confusion for your administrators and ensure that devices are handled correctly. - **Recruit volunteers.** The purpose of testing a deployment is to receive feedback. One effective way to recruit pilot users is to request volunteers. When doing so, clearly state that you’re looking for feedback rather than people to just “try it out” and that there could be occasional issues involved with accepting feature updates right away. With Windows as a service, the expectation is that there should be few issues, but if an issue does arise, you want testers to let you know as soon as possible. When considering whom to recruit for pilot groups, be sure to include members who provide the broadest set of applications and devices to validate the largest number of apps and devices possible. +- **Update Group Policy.** Each feature update includes new group policies to manage new features. To manage the features remotely the Group Policy Admin for the Active Directory domain will need to download an ADMX package and copy it to their central store (or to the PolicyDefinitions directory in the Sysvol of a domain controller if not using a central store). Always manage new group polices from the version of Windows 10 they shipped with by using the Remote Server Administration Tools. The ADMX download package is created at the end of each development cycle and then posted for download. To find the ADMX download package for a given Windows build, search for “ADMX download for Windows build xxxx”. - **Choose a servicing tool.** Decide which product you’ll use to manage the Windows updates in your environment. If you’re currently using Windows Server Update Services (WSUS) or System Center Configuration Manager to manage your Windows updates, you can continue using those products to manage Windows 10 updates. Alternatively, you can use Windows Update for Business. In addition to which product you’ll use, consider how you’ll deliver the updates. With Windows 10, multiple peer-to-peer options are available to make update distribution faster. For a comparison of tools, see [Servicing tools](waas-overview.md#servicing-tools). - **Prioritize applications.** First, create an application portfolio. This list should include everything installed in your organization and any webpages your organization hosts. Next, prioritize this list to identify those that are the most business critical. Because the expectation is that application compatibility with Windows 10 will be high, only the most business critical applications should be tested before the pilot phase; everything else can be tested afterwards. For more information about identifying compatibility issues withe applications, see [Manage Windows upgrades with Upgrade Analytics](../upgrade/manage-windows-upgrades-with-upgrade-readiness.md). From 582d95527632180ba2f6688d2add5e4754ddbebd Mon Sep 17 00:00:00 2001 From: jaimeo Date: Tue, 30 Oct 2018 15:03:50 -0700 Subject: [PATCH 02/32] added links --- .../update/waas-servicing-strategy-windows-10-updates.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/update/waas-servicing-strategy-windows-10-updates.md b/windows/deployment/update/waas-servicing-strategy-windows-10-updates.md index 9ddff72510..1906e66ad4 100644 --- a/windows/deployment/update/waas-servicing-strategy-windows-10-updates.md +++ b/windows/deployment/update/waas-servicing-strategy-windows-10-updates.md @@ -30,7 +30,7 @@ Windows 10 spreads the traditional deployment effort of a Windows upgrade, which - **Configure test devices.** Configure test devices in the Windows Insider Program so that Insiders can test feature updates before they’re available to the Semi-Annual Channel. Typically, this would be a small number of test devices that IT staff members use to evaluate pre-releas builds of Windows. Microsoft provides current development builds to Windows Insider members approximately every week so that interested users can see the functionality Microsoft is adding. See the section Windows Insider for details on how to enroll in the Windows Insider Program on a Windows 10 device. - **Identify excluded devices.** For some organizations, special-purpose devices such as those used to control factory or medical equipment or run ATMs require a stricter, less frequent feature update cycle than the Semi-annual Channel can offer. For those machines, you must install Windows 10 Enterprise LTSB to avoid feature updates for up to 10 years. Identify these devices, and separate them from the phased deployment and servicing cycles to help remove confusion for your administrators and ensure that devices are handled correctly. - **Recruit volunteers.** The purpose of testing a deployment is to receive feedback. One effective way to recruit pilot users is to request volunteers. When doing so, clearly state that you’re looking for feedback rather than people to just “try it out” and that there could be occasional issues involved with accepting feature updates right away. With Windows as a service, the expectation is that there should be few issues, but if an issue does arise, you want testers to let you know as soon as possible. When considering whom to recruit for pilot groups, be sure to include members who provide the broadest set of applications and devices to validate the largest number of apps and devices possible. -- **Update Group Policy.** Each feature update includes new group policies to manage new features. To manage the features remotely the Group Policy Admin for the Active Directory domain will need to download an ADMX package and copy it to their central store (or to the PolicyDefinitions directory in the Sysvol of a domain controller if not using a central store). Always manage new group polices from the version of Windows 10 they shipped with by using the Remote Server Administration Tools. The ADMX download package is created at the end of each development cycle and then posted for download. To find the ADMX download package for a given Windows build, search for “ADMX download for Windows build xxxx”. +- **Update Group Policy.** Each feature update includes new group policies to manage new features. If you use Group Policy to manage devices, the Group Policy Admin for the Active Directory domain will need to download a .admx package and copy it to their [Central Store](https://support.microsoft.com/help/929841/how-to-create-the-central-store-for-group-policy-administrative-templa) (or to the [PolicyDefinitions](https://msdn.microsoft.com/library/bb530196.aspx) directory in the SYSVOL of a domain controller if not using a Central Store). Always manage new group polices from the version of Windows 10 they shipped with by using the Remote Server Administration Tools. The ADMX download package is created at the end of each development cycle and then posted for download. To find the ADMX download package for a given Windows build, search for “ADMX download for Windows build xxxx”. - **Choose a servicing tool.** Decide which product you’ll use to manage the Windows updates in your environment. If you’re currently using Windows Server Update Services (WSUS) or System Center Configuration Manager to manage your Windows updates, you can continue using those products to manage Windows 10 updates. Alternatively, you can use Windows Update for Business. In addition to which product you’ll use, consider how you’ll deliver the updates. With Windows 10, multiple peer-to-peer options are available to make update distribution faster. For a comparison of tools, see [Servicing tools](waas-overview.md#servicing-tools). - **Prioritize applications.** First, create an application portfolio. This list should include everything installed in your organization and any webpages your organization hosts. Next, prioritize this list to identify those that are the most business critical. Because the expectation is that application compatibility with Windows 10 will be high, only the most business critical applications should be tested before the pilot phase; everything else can be tested afterwards. For more information about identifying compatibility issues withe applications, see [Manage Windows upgrades with Upgrade Analytics](../upgrade/manage-windows-upgrades-with-upgrade-readiness.md). From 396d8bc23882488ea86243de46c8c339128970f3 Mon Sep 17 00:00:00 2001 From: Patti Short Date: Thu, 1 Nov 2018 11:47:57 -0700 Subject: [PATCH 03/32] fixed broken links --- browsers/edge/index.yml | 4 ++++ browsers/edge/microsoft-edge-kiosk-mode-deploy.md | 2 +- 2 files changed, 5 insertions(+), 1 deletion(-) diff --git a/browsers/edge/index.yml b/browsers/edge/index.yml index 0c4b06ad03..409524122e 100644 --- a/browsers/edge/index.yml +++ b/browsers/edge/index.yml @@ -124,7 +124,11 @@ sections: html:

Minimum system requirements

+ +

Supported languages

+ +

Document change history

diff --git a/browsers/edge/microsoft-edge-kiosk-mode-deploy.md b/browsers/edge/microsoft-edge-kiosk-mode-deploy.md index 5d4b7d4382..a3d1996719 100644 --- a/browsers/edge/microsoft-edge-kiosk-mode-deploy.md +++ b/browsers/edge/microsoft-edge-kiosk-mode-deploy.md @@ -248,7 +248,7 @@ In the following table, we show you the features available in both Microsoft Edg **\*Windows Defender Firewall**

-To prevent access to unwanted websites on your kiosk device, use Windows Defender Firewall to configure a list of allowed websites, blocked websites or both. For more details, see [Windows Defender Firewall with Advanced Security Deployment](https://docs.microsoft.com/windows/security/identity-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide). +To prevent access to unwanted websites on your kiosk device, use Windows Defender Firewall to configure a list of allowed websites, blocked websites or both. For more details, see [Windows Defender Firewall with Advanced Security Deployment](https://docs.microsoft.com/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide). --- From 94ca9a94556ca04a5941568b6577bc1490d5eb8d Mon Sep 17 00:00:00 2001 From: Patti Short Date: Thu, 1 Nov 2018 12:20:58 -0700 Subject: [PATCH 04/32] formatting --- browsers/edge/index.yml | 6 +----- 1 file changed, 1 insertion(+), 5 deletions(-) diff --git a/browsers/edge/index.yml b/browsers/edge/index.yml index 409524122e..0b91243a04 100644 --- a/browsers/edge/index.yml +++ b/browsers/edge/index.yml @@ -124,12 +124,8 @@ sections: html:

Minimum system requirements

- -

Supported languages

- - - +

Document change history

Compare Windows 10 Editions

From a6af7988d519cb397d40549a5edf38f160386624 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Jos=C3=A9=20P=2E=20Cort=C3=A9s?= Date: Fri, 2 Nov 2018 10:36:19 -0600 Subject: [PATCH 05/32] Update file for typo Updating typo (guidelines instead of guidlines) in ### IT-Driven --- windows/deployment/windows-autopilot/windows-10-autopilot.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/windows-autopilot/windows-10-autopilot.md b/windows/deployment/windows-autopilot/windows-10-autopilot.md index 9611b51a68..7f8964a738 100644 --- a/windows/deployment/windows-autopilot/windows-10-autopilot.md +++ b/windows/deployment/windows-autopilot/windows-10-autopilot.md @@ -126,7 +126,7 @@ To manage devices behind firewalls and proxy servers, the following URLs need to >Where not explicitly specified, both HTTPS (443) and HTTP (80) need to be accessible. >[!TIP] ->If you're auto-enrolling your devices into Microsoft Intune, or deploying Microsoft Office, make sure you follow the networking guidlines for [Microsoft Intune](https://docs.microsoft.com/intune/network-bandwidth-use#network-communication-requirements) and [Office 365](https://support.office.com/en-us/article/Office-365-URLs-and-IP-address-ranges-8548a211-3fe7-47cb-abb1-355ea5aa88a2). +>If you're auto-enrolling your devices into Microsoft Intune, or deploying Microsoft Office, make sure you follow the networking guidelines for [Microsoft Intune](https://docs.microsoft.com/intune/network-bandwidth-use#network-communication-requirements) and [Office 365](https://support.office.com/en-us/article/Office-365-URLs-and-IP-address-ranges-8548a211-3fe7-47cb-abb1-355ea5aa88a2). ### IT-Driven From 89f6ddf83537e036deeb3e47cf7f361ef0b72a9c Mon Sep 17 00:00:00 2001 From: jaimeo Date: Fri, 2 Nov 2018 09:53:04 -0700 Subject: [PATCH 06/32] added link to more info about GP management --- .../update/waas-servicing-strategy-windows-10-updates.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/deployment/update/waas-servicing-strategy-windows-10-updates.md b/windows/deployment/update/waas-servicing-strategy-windows-10-updates.md index 1906e66ad4..6041f964a6 100644 --- a/windows/deployment/update/waas-servicing-strategy-windows-10-updates.md +++ b/windows/deployment/update/waas-servicing-strategy-windows-10-updates.md @@ -7,7 +7,7 @@ ms.sitesec: library author: Jaimeo ms.localizationpriority: medium ms.author: jaimeo -ms.date: 10/30/2018 +ms.date: 11/02/2018 --- # Prepare servicing strategy for Windows 10 updates @@ -30,7 +30,7 @@ Windows 10 spreads the traditional deployment effort of a Windows upgrade, which - **Configure test devices.** Configure test devices in the Windows Insider Program so that Insiders can test feature updates before they’re available to the Semi-Annual Channel. Typically, this would be a small number of test devices that IT staff members use to evaluate pre-releas builds of Windows. Microsoft provides current development builds to Windows Insider members approximately every week so that interested users can see the functionality Microsoft is adding. See the section Windows Insider for details on how to enroll in the Windows Insider Program on a Windows 10 device. - **Identify excluded devices.** For some organizations, special-purpose devices such as those used to control factory or medical equipment or run ATMs require a stricter, less frequent feature update cycle than the Semi-annual Channel can offer. For those machines, you must install Windows 10 Enterprise LTSB to avoid feature updates for up to 10 years. Identify these devices, and separate them from the phased deployment and servicing cycles to help remove confusion for your administrators and ensure that devices are handled correctly. - **Recruit volunteers.** The purpose of testing a deployment is to receive feedback. One effective way to recruit pilot users is to request volunteers. When doing so, clearly state that you’re looking for feedback rather than people to just “try it out” and that there could be occasional issues involved with accepting feature updates right away. With Windows as a service, the expectation is that there should be few issues, but if an issue does arise, you want testers to let you know as soon as possible. When considering whom to recruit for pilot groups, be sure to include members who provide the broadest set of applications and devices to validate the largest number of apps and devices possible. -- **Update Group Policy.** Each feature update includes new group policies to manage new features. If you use Group Policy to manage devices, the Group Policy Admin for the Active Directory domain will need to download a .admx package and copy it to their [Central Store](https://support.microsoft.com/help/929841/how-to-create-the-central-store-for-group-policy-administrative-templa) (or to the [PolicyDefinitions](https://msdn.microsoft.com/library/bb530196.aspx) directory in the SYSVOL of a domain controller if not using a Central Store). Always manage new group polices from the version of Windows 10 they shipped with by using the Remote Server Administration Tools. The ADMX download package is created at the end of each development cycle and then posted for download. To find the ADMX download package for a given Windows build, search for “ADMX download for Windows build xxxx”. +- **Update Group Policy.** Each feature update includes new group policies to manage new features. If you use Group Policy to manage devices, the Group Policy Admin for the Active Directory domain will need to download a .admx package and copy it to their [Central Store](https://support.microsoft.com/help/929841/how-to-create-the-central-store-for-group-policy-administrative-templa) (or to the [PolicyDefinitions](https://msdn.microsoft.com/library/bb530196.aspx) directory in the SYSVOL of a domain controller if not using a Central Store). Always manage new group polices from the version of Windows 10 they shipped with by using the Remote Server Administration Tools. The ADMX download package is created at the end of each development cycle and then posted for download. To find the ADMX download package for a given Windows build, search for “ADMX download for Windows build xxxx”. For details about Group Policy management, see [How to create and manage the Central Store for Group Policy Administrative Templates in Windows](https://support.microsoft.com/help/3087759/how-to-create-and-manage-the-central-store-for-group-policy-administra) - **Choose a servicing tool.** Decide which product you’ll use to manage the Windows updates in your environment. If you’re currently using Windows Server Update Services (WSUS) or System Center Configuration Manager to manage your Windows updates, you can continue using those products to manage Windows 10 updates. Alternatively, you can use Windows Update for Business. In addition to which product you’ll use, consider how you’ll deliver the updates. With Windows 10, multiple peer-to-peer options are available to make update distribution faster. For a comparison of tools, see [Servicing tools](waas-overview.md#servicing-tools). - **Prioritize applications.** First, create an application portfolio. This list should include everything installed in your organization and any webpages your organization hosts. Next, prioritize this list to identify those that are the most business critical. Because the expectation is that application compatibility with Windows 10 will be high, only the most business critical applications should be tested before the pilot phase; everything else can be tested afterwards. For more information about identifying compatibility issues withe applications, see [Manage Windows upgrades with Upgrade Analytics](../upgrade/manage-windows-upgrades-with-upgrade-readiness.md). From 96f5e6ba6ef5f49037d91cc43b19e4c082577048 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Fri, 2 Nov 2018 11:37:11 -0700 Subject: [PATCH 07/32] edits --- .../account-lockout-threshold.md | 9 ++++++--- .../reset-account-lockout-counter-after.md | 6 ++++-- 2 files changed, 10 insertions(+), 5 deletions(-) diff --git a/windows/security/threat-protection/security-policy-settings/account-lockout-threshold.md b/windows/security/threat-protection/security-policy-settings/account-lockout-threshold.md index 681ff23ad9..40febeceab 100644 --- a/windows/security/threat-protection/security-policy-settings/account-lockout-threshold.md +++ b/windows/security/threat-protection/security-policy-settings/account-lockout-threshold.md @@ -8,7 +8,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: brianlic-msft -ms.date: 10/26/2018 +ms.date: 11/02/2018 --- # Account lockout threshold @@ -37,8 +37,11 @@ Because vulnerabilities can exist when this value is configured and when it is n ### Best practices -The threshold that you select is a balance between operational efficiency and security, and it depends on your organization's risk level. To allow for user error and to thwart brute force attacks, a value of 10 could be an acceptable starting point for your organization. -> **Important:**  Implementation of this policy setting is dependent on your operational environment; threat vectors, deployed operating systems, and deployed apps. For more information, see [Implementation considerations](#bkmk-impleconsiderations) in this topic. +The threshold that you select is a balance between operational efficiency and security, and it depends on your organization's risk level. To allow for user error and to thwart brute force attacks, [Windows security baselines](https://docs.microsoft.com/windows/security/threat-protection/windows-security-baselines) recommend a value of 10 could be an acceptable starting point for your organization. + +As with other account lockeout settings, this value is more of a guideline than a rule or best practice because there is no "one size fits all." For more information, see [Configuring Account Lockout](https://blogs.technet.microsoft.com/secguide/2014/08/13/configuring-account-lockout/). + +Implementation of this policy setting is dependent on your operational environment; threat vectors, deployed operating systems, and deployed apps. For more information, see [Implementation considerations](#bkmk-impleconsiderations) in this topic.   ### Location diff --git a/windows/security/threat-protection/security-policy-settings/reset-account-lockout-counter-after.md b/windows/security/threat-protection/security-policy-settings/reset-account-lockout-counter-after.md index 8af58b7acd..2d007bb365 100644 --- a/windows/security/threat-protection/security-policy-settings/reset-account-lockout-counter-after.md +++ b/windows/security/threat-protection/security-policy-settings/reset-account-lockout-counter-after.md @@ -8,7 +8,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium author: brianlic-msft -ms.date: 10/26/2018 +ms.date: 11/02/2018 --- # Reset account lockout counter after @@ -31,7 +31,9 @@ A disadvantage to setting this too high is that users lock themselves out for an ### Best practices -- You need to determine the threat level for your organization and balance that against the cost of your Help Desk support for password resets. Each organization will have specific requirements. +You need to determine the threat level for your organization and balance that against the cost of your Help Desk support for password resets. Each organization will have specific requirements. + +[Windows security baselines](https://docs.microsoft.com/windows/security/threat-protection/windows-security-baselines) recommend configuring the **Reset account lockout counter after** policy setting to 15, but as with other account lockeout settings, this value is more of a guideline than a rule or best practice because there is no "one size fits all." For more information, see [Configuring Account Lockout](https://blogs.technet.microsoft.com/secguide/2014/08/13/configuring-account-lockout/). ### Location From 943d6e60e5e87ab898f5d7dfaf8f02ecb8220d19 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Fri, 2 Nov 2018 11:52:34 -0700 Subject: [PATCH 08/32] add scep note --- ...endpoints-windows-defender-advanced-threat-protection.md | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md index eab2954c47..d4ac2f4f15 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md @@ -10,7 +10,7 @@ ms.sitesec: library ms.pagetype: security author: mjcaparas ms.localizationpriority: medium -ms.date: 10/09/2018 +ms.date: 11/02/2018 --- # Onboard servers to the Windows Defender ATP service @@ -44,6 +44,10 @@ For a practical guidance on what needs to be in place for licensing and infrastr To onboard Windows Server 2012 R2 and Windows Server 2016 to Windows Defender ATP, you’ll need to: - For Windows Server 2012 R2: Configure and update System Center Endpoint Protection clients. + + >[!NOTE] + >This step is required only if your organization uses System Center Endpoint Protection (SCEP) and you're onboarding Windows Server 2012 R2. + - Turn on server monitoring from Windows Defender Security Center. - If you're already leveraging System Center Operations Manager (SCOM) or Operations Management Suite (OMS), simply attach the Microsoft Monitoring Agent (MMA) to report to your Windows Defender ATP workspace through [Multi Homing support](https://blogs.technet.microsoft.com/msoms/2016/05/26/oms-log-analytics-agent-multi-homing-support/). Otherwise, install and configure MMA to report sensor data to Windows Defender ATP as instructed below. From 6de2f4f9e53ec3692cd05e766dff8573fbdc18e7 Mon Sep 17 00:00:00 2001 From: Patti Short Date: Fri, 2 Nov 2018 14:10:05 -0700 Subject: [PATCH 09/32] fixed broken links --- browsers/edge/group-policies/prelaunch-preload-gp.md | 2 +- .../group-policies/security-privacy-management-gp.md | 4 ++-- .../edge/includes/provision-favorites-include.md | 2 +- browsers/edge/microsoft-edge-faq.md | 8 +++++--- ...-list-using-the-version-1-enterprise-mode-tool.md | 2 +- ...-list-using-the-version-2-enterprise-mode-tool.md | 2 +- .../create-change-request-enterprise-mode-portal.md | 2 +- .../enterprise-mode-schema-version-1-guidance.md | 8 ++++---- .../enterprise-mode-schema-version-2-guidance.md | 10 +++++----- ...up-enterprise-mode-logging-and-data-collection.md | 4 ++-- .../enterprise-mode/set-up-enterprise-mode-portal.md | 4 ++-- .../turn-on-enterprise-mode-and-use-a-site-list.md | 2 +- ...-local-control-and-logging-for-enterprise-mode.md | 6 +++--- ...-list-using-the-version-1-enterprise-mode-tool.md | 2 +- ...-list-using-the-version-2-enterprise-mode-tool.md | 2 +- .../auto-configuration-settings-for-ie11.md | 2 +- .../auto-detect-settings-for-ie11.md | 2 +- .../auto-proxy-configuration-settings-for-ie11.md | 2 +- .../create-change-request-enterprise-mode-portal.md | 2 +- .../deploy-pinned-sites-using-mdt-2013.md | 2 +- .../enterprise-mode-schema-version-1-guidance.md | 8 ++++---- .../enterprise-mode-schema-version-2-guidance.md | 10 +++++----- ...ie11-using-windows-server-update-services-wsus.md | 2 +- .../ie11-deploy-guide/intranet-problems-and-ie11.md | 4 ++-- .../out-of-date-activex-control-blocking.md | 6 +++--- ...up-enterprise-mode-logging-and-data-collection.md | 4 ++-- .../set-up-enterprise-mode-portal.md | 4 ++-- ...-local-control-and-logging-for-enterprise-mode.md | 6 +++--- .../ie11-ieak/auto-config-ieak11-wizard.md | 2 +- .../auto-detection-dhcp-or-dns-servers-ieak11.md | 8 ++++---- .../ie11-ieak/custombranding-ins-file-setting.md | 2 +- .../ie11-ieak/customize-automatic-search-for-ie.md | 12 ++++++------ ...rtant-urls-home-page-and-support-ieak11-wizard.md | 2 +- .../ie11-ieak/proxy-auto-config-examples.md | 2 +- .../ie11-ieak/proxy-settings-ieak11-wizard.md | 4 ++-- .../ie11-ieak/search-providers-ieak11-wizard.md | 2 +- .../troubleshooting-custom-browser-pkg-ieak11.md | 2 +- 37 files changed, 76 insertions(+), 74 deletions(-) diff --git a/browsers/edge/group-policies/prelaunch-preload-gp.md b/browsers/edge/group-policies/prelaunch-preload-gp.md index eae661d455..aa402f3743 100644 --- a/browsers/edge/group-policies/prelaunch-preload-gp.md +++ b/browsers/edge/group-policies/prelaunch-preload-gp.md @@ -18,7 +18,7 @@ Additionally, Microsoft Edge preloads the Start and New Tab pages during Windows ## Relevant group policies - [Allow Microsoft Edge to pre-launch at Windows startup, when the system is idle, and each time Microsoft Edge is closed](#allow-microsoft-edge-to-pre-launch-at-windows-startup-when-the-system-is-idle-and-each-time-microsoft-edge-is-closed) -- [Allow Microsoft Edge to load the Start and New Tab page at Windows startup and each time Microsoft Edge is closed](#allow-microsoft-edge-to-start-and-load-the-start-and-new-tab-page-at-windows-startup-and-each-time-microsoft-edge-is-closed) +- [Allow Microsoft Edge to load the Start and New Tab page at Windows startup and each time Microsoft Edge is closed](#allow-microsoft-edge-to-load-the-start-and-new-tab-page-at-windows-startup-and-each-time-microsoft-edge-is-closed) You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy: diff --git a/browsers/edge/group-policies/security-privacy-management-gp.md b/browsers/edge/group-policies/security-privacy-management-gp.md index 100feaa54d..3b66e9902c 100644 --- a/browsers/edge/group-policies/security-privacy-management-gp.md +++ b/browsers/edge/group-policies/security-privacy-management-gp.md @@ -57,12 +57,12 @@ Microsoft Edge addresses these threats to help make browsing the web a safer exp | Feature | Description | |---|---| -| **[Windows Hello](http://blogs.windows.com/bloggingwindows/2015/03/17/making-windows-10-more-personal-and-more-secure-with-windows-hello/)** | Microsoft Edge is the first browser to natively support Windows Hello to authenticate the user and the website with asymmetric cryptography technology, powered by early implementation of the [Web Authentication (formerly FIDO 2.0 Web API) specification](http://w3c.github.io/webauthn/). | +| **[Windows Hello](https://blogs.windows.com/bloggingwindows/2015/03/17/making-windows-10-more-personal-and-more-secure-with-windows-hello/)** | Microsoft Edge is the first browser to natively support Windows Hello to authenticate the user and the website with asymmetric cryptography technology, powered by early implementation of the [Web Authentication (formerly FIDO 2.0 Web API) specification](https://w3c.github.io/webauthn/). | | **Microsoft SmartScreen** | Defends against phishing by performing reputation checks on sites visited and blocking any sites that are thought to be a phishing site. SmartScreen also helps to defend against installing malicious software, drive-by attacks, or file downloads, even from trusted sites. Drive-by attacks are malicious web-based attacks that compromise your system by targeting security vulnerabilities in commonly used software and may be hosted on trusted sites. | | **Certificate Reputation system** | Collects data about certificates in use, detecting new certificates and flagging fraudulent certificates automatically, and sends the data to Microsoft. The systems and tools in place include
  • Certificate Reputation system: Protects users from fraudulent certificates.
  • Bing Webmaster Tools (for developers): Reports fake certificates directly to Microsoft.
| | **Microsoft EdgeHTML and modern web standards** | Microsoft Edge uses Microsoft EdgeHTML as the rendering engine. This engine focuses on modern standards letting web developers build and maintain a consistent site across all modern browsers. It also helps to defend against hacking through these security standards features:
  • Support for the W3C standard for [Content Security Policy (CSP)](https://developer.microsoft.com/microsoft-edge/platform/documentation/dev-guide/security/content-Security-Policy), which can help web developers defend their sites against cross-site scripting attacks.
  • Support for the [HTTP Strict Transport Security (HSTS)](https://developer.microsoft.com/microsoft-edge/platform/documentation/dev-guide/security/HSTS/) security feature (IETF-standard compliant). HSTS helps ensure that connections to important sites, such as to your bank, are always secured.

**NOTE:** Both Microsoft Edge and Internet Explorer 11 support HSTS. | | **Code integrity and image loading restrictions** | Microsoft Edge content processes support code integrity and image load restrictions, helping to prevent malicious DLLs from loading or injecting into the content processes. Only [properly signed images](https://blogs.windows.com/msedgedev/2015/11/17/microsoft-edge-module-code-integrity/) are allowed to load into Microsoft Edge. Binaries on remote devices (such as UNC or WebDAV) can’t load. | -| **Memory corruption mitigations** | Memory corruption attacks frequently happen to apps written in C or C++ don’t provide safety or buffer overflow protection. When an attacker provides malformed input to a program, the program’s memory becomes corrupt allowing the attacker to take control of the program. Although attackers have adapted and invented new ways to attack, we’ve responded with memory safety defenses, mitigating the most common forms of attack, including and especially [use-after-free (UAF)](http://cwe.mitre.org/data/definitions/416.html) vulnerabilities. | +| **Memory corruption mitigations** | Memory corruption attacks frequently happen to apps written in C or C++ don’t provide safety or buffer overflow protection. When an attacker provides malformed input to a program, the program’s memory becomes corrupt allowing the attacker to take control of the program. Although attackers have adapted and invented new ways to attack, we’ve responded with memory safety defenses, mitigating the most common forms of attack, including and especially [use-after-free (UAF)](https://cwe.mitre.org/data/definitions/416.html) vulnerabilities. | | **Memory Garbage Collector (MemGC) mitigation** | MemGC replaces Memory Protector and helps to protect the browser from UAF vulnerabilities. MemGC frees up memory from the programmer and automating it. Only freeing memory when the automation detects no references left pointing to a given block of memory. | | **Control Flow Guard** | Attackers use memory corruption attacks to gain control of the CPU program counter to jump to any code location they want. Control Flow Guard, a Microsoft Visual Studio technology, compiles checks around code that performs indirect jumps based on a pointer. Those jumps get restricted to function entry points with known addresses only making attacker take-overs must more difficult constraining where an attack jumps. | | **All web content runs in an app container sandbox** |Microsoft Edge takes the sandbox even farther, running its content processes in containers not just by default, but all of the time. Microsoft Edge doesn’t support 3rd party binary extensions, so there is no reason for it to run outside of the container, making Microsoft Edge more secure. | diff --git a/browsers/edge/includes/provision-favorites-include.md b/browsers/edge/includes/provision-favorites-include.md index efd553631f..a67f33444b 100644 --- a/browsers/edge/includes/provision-favorites-include.md +++ b/browsers/edge/includes/provision-favorites-include.md @@ -21,7 +21,7 @@ ms:topic: include |Group Policy |Description |Most restricted | |---|---|:---:| |Disabled or not configured
**(default)** |Users can customize the favorites list, such as adding folders, or adding and removing favorites. | | -|Enabled |Define a default list of favorites in Microsoft Edge. In this case, the Save a Favorite, Import settings, and context menu options (such as Create a new folder) are turned off.

To define a default list of favorites, do the following:

  1. In the upper-right corner of Microsoft Edge, click the ellipses (**...**) and select **Settings**.
  2. Click **Import from another browser**, click **Export to file** and save the file.
  3. In the **Options** section of the Group Policy Editor, provide the location that points the file with the list of favorites to provision. Specify the URL as:
    • HTTP location: "SiteList"=http://localhost:8080/URLs.html
    • Local network: "SiteList"="\network\shares\URLs.html"
    • Local file: "SiteList"=file:///c:/Users/Documents/URLs.html
|![Most restricted value](../images/check-gn.png) | +|Enabled |Define a default list of favorites in Microsoft Edge. In this case, the Save a Favorite, Import settings, and context menu options (such as Create a new folder) are turned off.

To define a default list of favorites, do the following:

  1. In the upper-right corner of Microsoft Edge, click the ellipses (**...**) and select **Settings**.
  2. Click **Import from another browser**, click **Export to file** and save the file.
  3. In the **Options** section of the Group Policy Editor, provide the location that points the file with the list of favorites to provision. Specify the URL as:
    • HTTP location: "SiteList"=https://localhost:8080/URLs.html
    • Local network: "SiteList"="\network\shares\URLs.html"
    • Local file: "SiteList"=file:///c:/Users/Documents/URLs.html
|![Most restricted value](../images/check-gn.png) | --- ### ADMX info and settings diff --git a/browsers/edge/microsoft-edge-faq.md b/browsers/edge/microsoft-edge-faq.md index d4c8a0509a..47f937d659 100644 --- a/browsers/edge/microsoft-edge-faq.md +++ b/browsers/edge/microsoft-edge-faq.md @@ -32,7 +32,7 @@ For more information on how Internet Explorer and Microsoft Edge can work togeth **Q: Does Microsoft Edge work with Enterprise Mode?** -**A:** [Enterprise Mode](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/enterprise-mode-overview-for-ie11) offers better backward compatibility and enables customers to run many legacy web applications. Microsoft Edge and Internet Explorer can be configured to use the same Enterprise Mode Site List, switching seamlessly between browsers to support both modern and legacy web apps. For guidance and additional resources, please visit the [Microsoft Edge IT Center](https://technet.microsoft.com/en-us/microsoft-edge). +**A:** [Enterprise Mode](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/enterprise-mode-overview-for-ie11) offers better backward compatibility and enables customers to run many legacy web applications. Microsoft Edge and Internet Explorer can be configured to use the same Enterprise Mode Site List, switching seamlessly between browsers to support both modern and legacy web apps. **Q: I have Windows 10, but I don’t seem to have Microsoft Edge. Why?** @@ -41,7 +41,7 @@ For more information on how Internet Explorer and Microsoft Edge can work togeth **Q: How do I get the latest Canary/Beta/Preview version of Microsoft Edge?** -**A:** You can access the latest preview version of Microsoft Edge by updating to the latest Windows 10 preview via the [Windows Insider Program](https://insider.windows.com/). To run the preview version of Microsoft Edge on a stable version of Windows 10 (or any other OS), you can download a [Virtual Machine](https://developer.microsoft.com/en-us/microsoft-edge/tools/vms/windows/) that we provide or use the upcoming RemoteEdge service. +**A:** You can access the latest preview version of Microsoft Edge by updating to the latest Windows 10 preview via the [Windows Insider Program](https://insider.windows.com/). To run the preview version of Microsoft Edge on a stable version of Windows 10 (or any other OS), you can download a [Virtual Machine](https://developer.microsoft.com/microsoft-edge/tools/vms/windows/) that we provide or use the upcoming RemoteEdge service. **Q: How do I customize Microsoft Edge and related settings for my organization?** @@ -49,7 +49,9 @@ For more information on how Internet Explorer and Microsoft Edge can work togeth **Q: Is Adobe Flash supported in Microsoft Edge?** -**A:** Currently, Adobe Flash is supported as a built-in feature of Microsoft Edge on devices running the desktop version of Windows 10. In July 2017, Adobe announced that Flash will no longer be supported after 2020. With Adobe no longer supporting Flash after 2020, Microsoft has started to phase out Flash from Microsoft Edge by adding the [Configure the Adobe Flash Click-to-Run setting](#configure-the-adobe-flash-click-to-run-setting) group policy giving you a way to control the list of websites that have permission to run Adobe Flash content. +**A:** Currently, Adobe Flash is supported as a built-in feature of Microsoft Edge on devices running the desktop version of Windows 10. In July 2017, Adobe announced that Flash will no longer be supported after 2020. With Adobe no longer supporting Flash after 2020, Microsoft has started to phase out Flash from Microsoft Edge by adding the [Configure the Adobe Flash Click-to-Run setting](available-policies.md#configure-the-adobe-flash-click-to-run-setting) group policy giving you a way to control the list of websites that have permission to run Adobe Flash content. + + To learn more about Microsoft’s plan for phasing out Flash from Microsoft Edge and Internet Explorer, see [The End of an Era — Next Steps for Adobe Flash]( https://blogs.windows.com/msedgedev/2017/07/25/flash-on-windows-timeline/#3Bcc3QjRw0l7XsZ4.97) (blog article). diff --git a/browsers/enterprise-mode/add-single-sites-to-enterprise-mode-site-list-using-the-version-1-enterprise-mode-tool.md b/browsers/enterprise-mode/add-single-sites-to-enterprise-mode-site-list-using-the-version-1-enterprise-mode-tool.md index f6061375ab..6ebdd65d65 100644 --- a/browsers/enterprise-mode/add-single-sites-to-enterprise-mode-site-list-using-the-version-1-enterprise-mode-tool.md +++ b/browsers/enterprise-mode/add-single-sites-to-enterprise-mode-site-list-using-the-version-1-enterprise-mode-tool.md @@ -33,7 +33,7 @@ You can add individual sites to your compatibility list by using the Enterprise 1. In the Enterprise Mode Site List Manager (schema v.1), click **Add**. 2. Type the URL for the website that’s experiencing compatibility problems, like *<domain>.com* or *<domain>.com*/*<path>* into the **URL** box.

-Don't include the `http://` or `https://` designation. The tool automatically tries both versions during validation. +Don't include the `https://` or `https://` designation. The tool automatically tries both versions during validation. 3. Type any comments about the website into the **Notes about URL** box.

Administrators can only see comments while they’re in this tool. diff --git a/browsers/enterprise-mode/add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md b/browsers/enterprise-mode/add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md index eafa1921a5..4c6531c174 100644 --- a/browsers/enterprise-mode/add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md +++ b/browsers/enterprise-mode/add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md @@ -33,7 +33,7 @@ You can add individual sites to your compatibility list by using the Enterprise 1. In the Enterprise Mode Site List Manager (schema v.2), click **Add**. 2. Type the URL for the website that’s experiencing compatibility problems, like *<domain>.com* or *<domain>.com*/*<path>* into the **URL** box.

-Don't include the `http://` or `https://` designation. The tool automatically tries both versions during validation. +Don't include the `https://` or `https://` designation. The tool automatically tries both versions during validation. 3. Type any comments about the website into the **Notes about URL** box.

Administrators can only see comments while they’re in this tool. diff --git a/browsers/enterprise-mode/create-change-request-enterprise-mode-portal.md b/browsers/enterprise-mode/create-change-request-enterprise-mode-portal.md index 18b8b34406..45f93d3701 100644 --- a/browsers/enterprise-mode/create-change-request-enterprise-mode-portal.md +++ b/browsers/enterprise-mode/create-change-request-enterprise-mode-portal.md @@ -50,7 +50,7 @@ Employees assigned to the Requester role can create a change request. A change r - **Business impact (optional).** An optional area where you can provide info about the business impact of this app and the change. - - **App location (URL).** The full URL location to the app, starting with http:// or https://. + - **App location (URL).** The full URL location to the app, starting with https:// or https://. - **App best viewed in.** Select the best browser experience for the app. This can be Internet Explorer 5 through Internet Explorer 11 or one of the IE7Enterprise or IE8Enterprise modes. diff --git a/browsers/enterprise-mode/enterprise-mode-schema-version-1-guidance.md b/browsers/enterprise-mode/enterprise-mode-schema-version-1-guidance.md index 88711fd787..52ada71083 100644 --- a/browsers/enterprise-mode/enterprise-mode-schema-version-1-guidance.md +++ b/browsers/enterprise-mode/enterprise-mode-schema-version-1-guidance.md @@ -28,7 +28,7 @@ If you don't want to use the Enterprise Mode Site List Manager, you also have th The following is an example of the Enterprise Mode schema v.1. This schema can run on devices running Windows 7 and Windows 8.1. **Important**
-Make sure that you don't specify a protocol when adding your URLs. Using a URL like `contoso.com` automatically applies to both http://contoso.com and https://contoso.com. +Make sure that you don't specify a protocol when adding your URLs. Using a URL like `contoso.com` automatically applies to both https://contoso.com and https://contoso.com. ``` xml @@ -135,7 +135,7 @@ This table includes the elements used by the Enterprise Mode schema. <path exclude="true">/products</path> </domain> </emie>

-Where http://fabrikam.com doesn't use IE8 Enterprise Mode, but http://fabrikam.com/products does. +Where https://fabrikam.com doesn't use IE8 Enterprise Mode, but https://fabrikam.com/products does. Internet Explorer 11 and Microsoft Edge @@ -167,7 +167,7 @@ This table includes the attributes used by the Enterprise Mode schema. <path exclude="true">/products</path> </domain> </emie>

-Where http://fabrikam.com doesn't use IE8 Enterprise Mode, but http://fabrikam.com/products does. +Where https://fabrikam.com doesn't use IE8 Enterprise Mode, but https://fabrikam.com/products does. Internet Explorer 11 and Microsoft Edge @@ -203,7 +203,7 @@ For example, say you want all of the sites in the contoso.com domain to open usi ### What not to include in your schema We recommend that you not add any of the following items to your schema because they can make your compatibility list behave in unexpected ways: -- Don’t use protocols. For example, `http://`, `https://`, or custom protocols. They break parsing. +- Don’t use protocols. For example, `https://`, `https://`, or custom protocols. They break parsing. - Don’t use wildcards. - Don’t use query strings, ampersands break parsing. diff --git a/browsers/enterprise-mode/enterprise-mode-schema-version-2-guidance.md b/browsers/enterprise-mode/enterprise-mode-schema-version-2-guidance.md index df6a01cb68..ebc229a1db 100644 --- a/browsers/enterprise-mode/enterprise-mode-schema-version-2-guidance.md +++ b/browsers/enterprise-mode/enterprise-mode-schema-version-2-guidance.md @@ -38,7 +38,7 @@ You can continue to use the v.1 version of the schema on Windows 10, but you wo The following is an example of the v.2 version of the Enterprise Mode schema. **Important**
-Make sure that you don't specify a protocol when adding your URLs. Using a URL like ``, automatically applies to both http://contoso.com and https://contoso.com. +Make sure that you don't specify a protocol when adding your URLs. Using a URL like ``, automatically applies to both https://contoso.com and https://contoso.com.   ``` xml @@ -198,7 +198,7 @@ The <url> attribute, as part of the <site> element in the v.2 versio <site url="contoso.com/travel"> <open-in allow-redirect="true">IE11</open-in> </site> -In this example, if http://contoso.com/travel is encountered in a redirect chain in Microsoft Edge, it will be opened in Internet Explorer. +In this example, if https://contoso.com/travel is encountered in a redirect chain in Microsoft Edge, it will be opened in Internet Explorer. Internet Explorer 11 and Microsoft Edge @@ -210,14 +210,14 @@ In this example, if http://contoso.com/travel is encountered in a redirect chain url Specifies the URL (and port number using standard port conventions) to which the child elements apply. The URL can be a domain, sub-domain, or any path URL.
Note
-Make sure that you don't specify a protocol. Using <site url="contoso.com"> applies to both http://contoso.com and https://contoso.com. +Make sure that you don't specify a protocol. Using <site url="contoso.com"> applies to both https://contoso.com and https://contoso.com.

Example

 <site url="contoso.com:8080">
   <compat-mode>IE8Enterprise</compat-mode>
   <open-in>IE11</open-in>
 </site>
-In this example, going to http://contoso.com:8080 using Microsoft Edge, causes the site to open in IE11 and load in IE8 Enterprise Mode. +In this example, going to https://contoso.com:8080 using Microsoft Edge, causes the site to open in IE11 and load in IE8 Enterprise Mode. Internet Explorer 11 and Microsoft Edge @@ -286,7 +286,7 @@ Saving your v.1 version of the file using the new Enterprise Mode Site List Mana ### What not to include in your schema We recommend that you not add any of the following items to your schema because they can make your compatibility list behave in unexpected ways: -- Don’t use protocols. For example, http://, https://, or custom protocols. They break parsing. +- Don’t use protocols. For example, https://, https://, or custom protocols. They break parsing. - Don’t use wildcards. - Don’t use query strings, ampersands break parsing. diff --git a/browsers/enterprise-mode/set-up-enterprise-mode-logging-and-data-collection.md b/browsers/enterprise-mode/set-up-enterprise-mode-logging-and-data-collection.md index bfb9659bd0..b67d27b563 100644 --- a/browsers/enterprise-mode/set-up-enterprise-mode-logging-and-data-collection.md +++ b/browsers/enterprise-mode/set-up-enterprise-mode-logging-and-data-collection.md @@ -111,7 +111,7 @@ The required packages are automatically downloaded and included in the solution. 1. Open a registry editor on the computer where you deployed the app, go to the `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode` key, and change the **Enable** string to: - ``` "Enable"="http:///api/records/" + ``` "Enable"="https:///api/records/" ``` Where `` points to your deployment URL. @@ -125,7 +125,7 @@ The required packages are automatically downloaded and included in the solution. **To view the report results** -- Go to `http:///List` to see the report results.

+- Go to `https:///List` to see the report results.

If you’re already on the webpage, you’ll need to refresh the page to see the results. ![Enterprise Mode Result report with details](images/ie-emie-reportwdetails.png) diff --git a/browsers/enterprise-mode/set-up-enterprise-mode-portal.md b/browsers/enterprise-mode/set-up-enterprise-mode-portal.md index 0aca62e070..fe5fe752fc 100644 --- a/browsers/enterprise-mode/set-up-enterprise-mode-portal.md +++ b/browsers/enterprise-mode/set-up-enterprise-mode-portal.md @@ -176,7 +176,7 @@ Using the IIS Manager, you must restart both your Application Pool and your webs After you've created your database and website, you'll need to register yourself (or another employee) as an administrator for the Enterprise Mode Site List Portal. **To register as an administrator** -1. Open Microsoft Edge and type your website URL into the Address bar. For example, http://emieportal:8085. +1. Open Microsoft Edge and type your website URL into the Address bar. For example, https://emieportal:8085. 2. Click **Register now**. @@ -184,7 +184,7 @@ After you've created your database and website, you'll need to register yourself 4. Click **Administrator** from the **Role** box, and then click **Save**. -5. Append your website URL with `/#/EMIEAdminConsole` in the Address bar to go to your administrator console. For example, http://emieportal:8085/#/EMIEAdminConsole. +5. Append your website URL with `/#/EMIEAdminConsole` in the Address bar to go to your administrator console. For example, https://emieportal:8085/#/EMIEAdminConsole. A dialog box appears, prompting you for the system user name and password. The default user name is EMIEAdmin and the default password is Admin123. We strongly recommend that you change the password by using the **Change password** link as soon as you're done with your first visit. diff --git a/browsers/enterprise-mode/turn-on-enterprise-mode-and-use-a-site-list.md b/browsers/enterprise-mode/turn-on-enterprise-mode-and-use-a-site-list.md index e4e3d83ec8..1a704aa67e 100644 --- a/browsers/enterprise-mode/turn-on-enterprise-mode-and-use-a-site-list.md +++ b/browsers/enterprise-mode/turn-on-enterprise-mode-and-use-a-site-list.md @@ -33,7 +33,7 @@ All of your managed devices must have access to this location if you want them t - **Local file:** `"SiteList"="file:///c:\\Users\\\\Documents\\testList.xml"` > **Example:** - >> _Web URL_ http://localhost:8080/EnterpriseMode.xml + >> _Web URL_ https://localhost:8080/EnterpriseMode.xml >> >> _Network Share_ \\NetworkShare.xml (Place this inside the group policy folder on Sysvol) >> diff --git a/browsers/enterprise-mode/turn-on-local-control-and-logging-for-enterprise-mode.md b/browsers/enterprise-mode/turn-on-local-control-and-logging-for-enterprise-mode.md index 0f5ff8d1f9..5781fe3fc0 100644 --- a/browsers/enterprise-mode/turn-on-local-control-and-logging-for-enterprise-mode.md +++ b/browsers/enterprise-mode/turn-on-local-control-and-logging-for-enterprise-mode.md @@ -46,9 +46,9 @@ Besides turning on this feature, you also have the option to provide a URL for E Your **Value data** location can be any of the following types: -- **URL location (like, http://www.emieposturl.com/api/records or http://localhost:13000)**. IE sends a POST message to the URL every time a change is made to Enterprise Mode from the **Tools** menu.

**Important**
-The `http://www.emieposturl.com/api/records` example will only work if you’ve downloaded the sample discussed in the [Set up Enterprise Mode logging and data collection](set-up-enterprise-mode-logging-and-data-collection.md) topic. If you don’t have the sample, you won’t have the web API. -- **Local network location (like, http://*emieposturl*/)**. IE sends a POST message to your specified local network location every time a change is made to Enterprise Mode from the **Tools** menu. +- **URL location (like, https://www.emieposturl.com/api/records or https://localhost:13000)**. IE sends a POST message to the URL every time a change is made to Enterprise Mode from the **Tools** menu.

**Important**
+The `https://www.emieposturl.com/api/records` example will only work if you’ve downloaded the sample discussed in the [Set up Enterprise Mode logging and data collection](set-up-enterprise-mode-logging-and-data-collection.md) topic. If you don’t have the sample, you won’t have the web API. +- **Local network location (like, https://*emieposturl*/)**. IE sends a POST message to your specified local network location every time a change is made to Enterprise Mode from the **Tools** menu. - **Empty string**. If you leave the **Value data** box blank; your employees will be able to turn Enterprise Mode on and off from the **Tools** menu, but you won’t collect any logging data. For information about how to collect the data provided when your employees turn Enterprise Mode on or off from the **Tools** menu, see [Set up Enterprise Mode logging and data collection](set-up-enterprise-mode-logging-and-data-collection.md). diff --git a/browsers/internet-explorer/ie11-deploy-guide/add-single-sites-to-enterprise-mode-site-list-using-the-version-1-enterprise-mode-tool.md b/browsers/internet-explorer/ie11-deploy-guide/add-single-sites-to-enterprise-mode-site-list-using-the-version-1-enterprise-mode-tool.md index decdc115fa..2eab3c28fd 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/add-single-sites-to-enterprise-mode-site-list-using-the-version-1-enterprise-mode-tool.md +++ b/browsers/internet-explorer/ie11-deploy-guide/add-single-sites-to-enterprise-mode-site-list-using-the-version-1-enterprise-mode-tool.md @@ -33,7 +33,7 @@ You can add individual sites to your compatibility list by using the Enterprise 1. In the Enterprise Mode Site List Manager (schema v.1), click **Add**. 2. Type the URL for the website that’s experiencing compatibility problems, like *<domain>.com* or *<domain>.com*/*<path>* into the **URL** box.

-Don't include the `http://` or `https://` designation. The tool automatically tries both versions during validation. +Don't include the `https://` or `https://` designation. The tool automatically tries both versions during validation. 3. Type any comments about the website into the **Notes about URL** box.

Administrators can only see comments while they’re in this tool. diff --git a/browsers/internet-explorer/ie11-deploy-guide/add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md b/browsers/internet-explorer/ie11-deploy-guide/add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md index bdfc8633a7..df209b5a60 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md +++ b/browsers/internet-explorer/ie11-deploy-guide/add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md @@ -33,7 +33,7 @@ You can add individual sites to your compatibility list by using the Enterprise 1. In the Enterprise Mode Site List Manager (schema v.2), click **Add**. 2. Type the URL for the website that’s experiencing compatibility problems, like *<domain>.com* or *<domain>.com*/*<path>* into the **URL** box.

-Don't include the `http://` or `https://` designation. The tool automatically tries both versions during validation. +Don't include the `https://` or `https://` designation. The tool automatically tries both versions during validation. 3. Type any comments about the website into the **Notes about URL** box.

Administrators can only see comments while they’re in this tool. diff --git a/browsers/internet-explorer/ie11-deploy-guide/auto-configuration-settings-for-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/auto-configuration-settings-for-ie11.md index a1ba907f17..9e485e54d8 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/auto-configuration-settings-for-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/auto-configuration-settings-for-ie11.md @@ -52,7 +52,7 @@ After adding the `FEATURE\AUTOCONFIG\BRANDING` registry key, you can change your - **Automatic Configuration URL (.INS file) box:** Type the location of your automatic configuration script. - - **Automatic proxy URL (.JS, .JVS, or .PAC file) box:** Type the location of your automatic proxy script.

**Important**
Internet Explorer 11 no longer supports using file server locations with your proxy configuration (.pac) files. To keep using your .pac files, you have to keep them on a web server and reference them using a URL, like `http://share/test.ins`. + - **Automatic proxy URL (.JS, .JVS, or .PAC file) box:** Type the location of your automatic proxy script.

**Important**
Internet Explorer 11 no longer supports using file server locations with your proxy configuration (.pac) files. To keep using your .pac files, you have to keep them on a web server and reference them using a URL, like `https://share/test.ins`. If your branding changes aren't correctly deployed after running through this process, see [Auto configuration and auto proxy problems with Internet Explorer 11](auto-configuration-and-auto-proxy-problems-with-ie11.md). diff --git a/browsers/internet-explorer/ie11-deploy-guide/auto-detect-settings-for-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/auto-detect-settings-for-ie11.md index 180e1100b9..8d6510713e 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/auto-detect-settings-for-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/auto-detect-settings-for-ie11.md @@ -40,7 +40,7 @@ To use automatic detection, you have to set up your DHCP and DNS servers.

**No 3. In your DNS database file, create a host record named, **WPAD**. This record has the IP address of the web server storing your automatic configuration (.js, .jvs, .pac, or .ins) file.

**-OR-**

Create a canonical name (CNAME) alias record named, **WPAD**. This record has the resolved name (not the IP address) of the server storing your automatic configuration (.pac) file.

**Note**
For more information about creating a **WPAD** entry, see [Creating a WPAD entry in DNS](https://go.microsoft.com/fwlink/p/?LinkId=294651).  -4. After the database file propagates to the server, the DNS name, `wpad..com` resolves to the server name that includes your automatic configuration file.

**Note**
Internet Explorer 11 creates a default URL template based on the host name, **wpad**. For example, `http://wpad..com/wpad.dat`. Because of this, you need to set up a file or redirection point in your web server **WPAD** record, named **wpad.dat**. The **wpad.dat** record delivers the contents of your automatic configuration file. +4. After the database file propagates to the server, the DNS name, `wpad..com` resolves to the server name that includes your automatic configuration file.

**Note**
Internet Explorer 11 creates a default URL template based on the host name, **wpad**. For example, `https://wpad..com/wpad.dat`. Because of this, you need to set up a file or redirection point in your web server **WPAD** record, named **wpad.dat**. The **wpad.dat** record delivers the contents of your automatic configuration file.   diff --git a/browsers/internet-explorer/ie11-deploy-guide/auto-proxy-configuration-settings-for-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/auto-proxy-configuration-settings-for-ie11.md index 99f85f37b8..a0e95c8fac 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/auto-proxy-configuration-settings-for-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/auto-proxy-configuration-settings-for-ie11.md @@ -30,7 +30,7 @@ You can use your Internet settings (.ins) files to set up your standard proxy se - **Automatic Configuration URL (.INS file) box:** Type the location of the .ins file you want to use for automatic configuration. For more information about setting up **Automatic Configuration**, see [Auto configuration settings for Internet Explorer 11](auto-configuration-settings-for-ie11.md). - - **Automatic proxy URL (.JS, .JVS, or .PAC file) box:** Type the location of your automatic proxy script. This script runs whenever IE11 makes a network request and can include multiple proxy servers for each protocol type.

**Important**
IE11 no longer supports using file server locations with your proxy configuration (.pac) files. To keep using your .pac files, you have to keep them on a web server and reference them using a URL, like `http://share/test.ins`. + - **Automatic proxy URL (.JS, .JVS, or .PAC file) box:** Type the location of your automatic proxy script. This script runs whenever IE11 makes a network request and can include multiple proxy servers for each protocol type.

**Important**
IE11 no longer supports using file server locations with your proxy configuration (.pac) files. To keep using your .pac files, you have to keep them on a web server and reference them using a URL, like `https://share/test.ins`. ## Locking your auto-proxy settings You have two options to restrict your users' ability to override the automatic configuration settings, based on your environment. diff --git a/browsers/internet-explorer/ie11-deploy-guide/create-change-request-enterprise-mode-portal.md b/browsers/internet-explorer/ie11-deploy-guide/create-change-request-enterprise-mode-portal.md index 3d85d5801b..3bd89a33bf 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/create-change-request-enterprise-mode-portal.md +++ b/browsers/internet-explorer/ie11-deploy-guide/create-change-request-enterprise-mode-portal.md @@ -50,7 +50,7 @@ Employees assigned to the Requester role can create a change request. A change r - **Business impact (optional).** An optional area where you can provide info about the business impact of this app and the change. - - **App location (URL).** The full URL location to the app, starting with http:// or https://. + - **App location (URL).** The full URL location to the app, starting with https:// or https://. - **App best viewed in.** Select the best browser experience for the app. This can be Internet Explorer 5 through Internet Explorer 11 or one of the IE7Enterprise or IE8Enterprise modes. diff --git a/browsers/internet-explorer/ie11-deploy-guide/deploy-pinned-sites-using-mdt-2013.md b/browsers/internet-explorer/ie11-deploy-guide/deploy-pinned-sites-using-mdt-2013.md index c89dd26fab..ef14f9f67f 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/deploy-pinned-sites-using-mdt-2013.md +++ b/browsers/internet-explorer/ie11-deploy-guide/deploy-pinned-sites-using-mdt-2013.md @@ -41,7 +41,7 @@ Deploying pinned websites in MDT 2013 is a 4-step process: Pinned websites are immediately available to every user who logs on to the computer although the user must click each icon to populate its Jump List. **Important**
-To follow the examples in this topic, you’ll need to pin the Bing (http://www.bing.com/) and MSN (http://www.msn.com/) websites to the taskbar. +To follow the examples in this topic, you’ll need to pin the Bing (https://www.bing.com/) and MSN (https://www.msn.com/) websites to the taskbar. ### Step 1: Creating .website files The first step is to create a .website file for each website that you want to pin to the Windows 8.1 taskbar during deployment. A .website file is like a shortcut, except it’s a plain text file that describes not only the website’s URL but also how the icon looks. diff --git a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md index a503628344..6f7289a742 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md +++ b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md @@ -28,7 +28,7 @@ If you don't want to use the Enterprise Mode Site List Manager, you also have th The following is an example of the Enterprise Mode schema v.1. This schema can run on devices running Windows 7 and Windows 8.1. **Important**
-Make sure that you don't specify a protocol when adding your URLs. Using a URL like `contoso.com` automatically applies to both http://contoso.com and https://contoso.com. +Make sure that you don't specify a protocol when adding your URLs. Using a URL like `contoso.com` automatically applies to both https://contoso.com and https://contoso.com. ``` xml @@ -135,7 +135,7 @@ This table includes the elements used by the Enterprise Mode schema. <path exclude="true">/products</path> </domain> </emie>

-Where http://fabrikam.com doesn't use IE8 Enterprise Mode, but http://fabrikam.com/products does. +Where https://fabrikam.com doesn't use IE8 Enterprise Mode, but https://fabrikam.com/products does. Internet Explorer 11 and Microsoft Edge @@ -167,7 +167,7 @@ This table includes the attributes used by the Enterprise Mode schema. <path exclude="true">/products</path> </domain> </emie>

-Where http://fabrikam.com uses IE8 Enterprise Mode, but http://fabrikam.com/products does not. +Where https://fabrikam.com uses IE8 Enterprise Mode, but https://fabrikam.com/products does not. Internet Explorer 11 and Microsoft Edge @@ -203,7 +203,7 @@ For example, say you want all of the sites in the contoso.com domain to open usi ### What not to include in your schema We recommend that you not add any of the following items to your schema because they can make your compatibility list behave in unexpected ways: -- Don’t use protocols. For example, `http://`, `https://`, or custom protocols. They break parsing. +- Don’t use protocols. For example, `https://`, `https://`, or custom protocols. They break parsing. - Don’t use wildcards. - Don’t use query strings, ampersands break parsing. diff --git a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md index 354fe81545..d9689c000a 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md +++ b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md @@ -38,7 +38,7 @@ You can continue to use the v.1 version of the schema on Windows 10, but you wo The following is an example of the v.2 version of the Enterprise Mode schema. **Important**
-Make sure that you don't specify a protocol when adding your URLs. Using a URL like ``, automatically applies to both http://contoso.com and https://contoso.com. +Make sure that you don't specify a protocol when adding your URLs. Using a URL like ``, automatically applies to both https://contoso.com and https://contoso.com.   ``` xml @@ -198,7 +198,7 @@ The <url> attribute, as part of the <site> element in the v.2 versio <site url="contoso.com/travel"> <open-in allow-redirect="true">IE11</open-in> </site> -In this example, if http://contoso.com/travel is encountered in a redirect chain in Microsoft Edge, it will be opened in Internet Explorer. +In this example, if https://contoso.com/travel is encountered in a redirect chain in Microsoft Edge, it will be opened in Internet Explorer. Internet Explorer 11 and Microsoft Edge @@ -210,14 +210,14 @@ In this example, if http://contoso.com/travel is encountered in a redirect chain url Specifies the URL (and port number using standard port conventions) to which the child elements apply. The URL can be a domain, sub-domain, or any path URL.
Note
-Make sure that you don't specify a protocol. Using <site url="contoso.com"> applies to both http://contoso.com and https://contoso.com. +Make sure that you don't specify a protocol. Using <site url="contoso.com"> applies to both https://contoso.com and https://contoso.com.

Example

 <site url="contoso.com:8080">
   <compat-mode>IE8Enterprise</compat-mode>
   <open-in>IE11</open-in>
 </site>
-In this example, going to http://contoso.com:8080 using Microsoft Edge, causes the site to open in IE11 and load in IE8 Enterprise Mode. +In this example, going to https://contoso.com:8080 using Microsoft Edge, causes the site to open in IE11 and load in IE8 Enterprise Mode. Internet Explorer 11 and Microsoft Edge @@ -286,7 +286,7 @@ Saving your v.1 version of the file using the new Enterprise Mode Site List Mana ### What not to include in your schema We recommend that you not add any of the following items to your schema because they can make your compatibility list behave in unexpected ways: -- Don’t use protocols. For example, http://, https://, or custom protocols. They break parsing. +- Don’t use protocols. For example, https://, https://, or custom protocols. They break parsing. - Don’t use wildcards. - Don’t use query strings, ampersands break parsing. diff --git a/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-windows-server-update-services-wsus.md b/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-windows-server-update-services-wsus.md index 7a95011950..37916eff52 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-windows-server-update-services-wsus.md +++ b/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-windows-server-update-services-wsus.md @@ -16,7 +16,7 @@ Windows Server Update Services (WSUS) lets you download a single copy of the Mic **To import from Windows Update to WSUS** -1. Open your WSUS admin site. For example, `http:///WSUSAdmin/`.

+1. Open your WSUS admin site. For example, `https:///WSUSAdmin/`.

Where `` is the name of your WSUS server. 2. Choose the top server node or the **Updates** node, and then click **Import Updates**. diff --git a/browsers/internet-explorer/ie11-deploy-guide/intranet-problems-and-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/intranet-problems-and-ie11.md index 5be58eea07..1dcf781581 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/intranet-problems-and-ie11.md +++ b/browsers/internet-explorer/ie11-deploy-guide/intranet-problems-and-ie11.md @@ -21,7 +21,7 @@ IE11 works differently with search, based on whether your organization is domain - **Non-domain-joined computers.** A single word entry is treated as an intranet site. However, if the term doesn't resolve to a site, IE11 then treats the entry as a search term and opens your default search provider. -To explicitly go to an intranet site, regardless of the environment, users can type either a trailing slash like ` contoso/` or the `http://` prefix. Either of these will cause IE11 to treat the entry as an intranet search. You can also change the default behavior so that IE11 treats your single word entry in the address bar as an intranet site, regardless of your environment. +To explicitly go to an intranet site, regardless of the environment, users can type either a trailing slash like ` contoso/` or the `https://` prefix. Either of these will cause IE11 to treat the entry as an intranet search. You can also change the default behavior so that IE11 treats your single word entry in the address bar as an intranet site, regardless of your environment. **To enable single-word intranet search** @@ -29,7 +29,7 @@ To explicitly go to an intranet site, regardless of the environment, users can t 2. Click **Advanced**, check the **Go to an intranet site for a single word entry in the Address bar** box, and then click **OK**. -If you'd like your entire organization to have single word entries default to an intranet site, you can turn on the **Go to an intranet site for a single word entry in the Address bar** Group Policy. With this policy turned on, a search for `contoso` automatically resolves to `http://contoso`. +If you'd like your entire organization to have single word entries default to an intranet site, you can turn on the **Go to an intranet site for a single word entry in the Address bar** Group Policy. With this policy turned on, a search for `contoso` automatically resolves to `https://contoso`.   diff --git a/browsers/internet-explorer/ie11-deploy-guide/out-of-date-activex-control-blocking.md b/browsers/internet-explorer/ie11-deploy-guide/out-of-date-activex-control-blocking.md index 66a5d8b70b..a834636814 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/out-of-date-activex-control-blocking.md +++ b/browsers/internet-explorer/ie11-deploy-guide/out-of-date-activex-control-blocking.md @@ -115,7 +115,7 @@ Out-of-date ActiveX control blocking is turned off in the Local Intranet Zone an |--------|--------------|-------------|----------| |Turn on ActiveX control logging in IE |`Administrative Templates\Windows Components\Internet Explorer\Security Features\Add-on Management` |Internet Explorer 8 through IE11 |This setting determines whether IE saves log information for ActiveX controls.

If you enable this setting, IE logs ActiveX control information (including the source URI that loaded the control and whether it was blocked) to a local file.

If you disable or don't configure this setting, IE won't log ActiveX control information.

Note that you can turn this setting on or off regardless of the **Turn off blocking of outdated ActiveX controls for IE** or **Turn off blocking of outdated ActiveX controls for IE on specific domains** settings. | |Remove the **Run this time** button for outdated ActiveX controls in IE |`Administrative Templates\Windows Components\Internet Explorer\Security Features\Add-on Management`|Internet Explorer 8 through IE11 |This setting allows you stop users from seeing the **Run this time** button and from running specific outdated ActiveX controls in IE.

If you enable this setting, users won't see the **Run this time** button on the warning message that appears when IE blocks an outdated ActiveX control.

If you disable or don't configure this setting, users will see the **Run this time** button on the warning message that appears when IE blocks an outdated ActiveX control. Clicking this button lets the user run the outdated ActiveX control once. | -|Turn off blocking of outdated ActiveX controls for IE on specific domains |`Administrative Templates\Windows Components\Internet Explorer\Security Features\Add-on Management` |Internet Explorer 8 through IE11 |This setting allows you to manage a list of domains on which IE will stop blocking outdated ActiveX controls. Outdated ActiveX controls are never blocked in the Intranet Zone.

If you enable this setting, you can enter a custom list of domains for which outdated ActiveX controls won't be blocked in IE. Each domain entry must be formatted like one of the following:

  • **"domainname.TLD".** For example, if you want to include `*.contoso.com/*`, use "contoso.com".
  • **"hostname".** For example, if you want to include `http://example`, use "example".
  • **"file:///path/filename.htm"**. For example, use `file:///C:/Users/contoso/Desktop/index.htm`.

If you disable or don't configure this setting, the list is deleted and IE continues to block specific outdated ActiveX controls on all domains in the Internet Zone. | +|Turn off blocking of outdated ActiveX controls for IE on specific domains |`Administrative Templates\Windows Components\Internet Explorer\Security Features\Add-on Management` |Internet Explorer 8 through IE11 |This setting allows you to manage a list of domains on which IE will stop blocking outdated ActiveX controls. Outdated ActiveX controls are never blocked in the Intranet Zone.

If you enable this setting, you can enter a custom list of domains for which outdated ActiveX controls won't be blocked in IE. Each domain entry must be formatted like one of the following:

  • **"domainname.TLD".** For example, if you want to include `*.contoso.com/*`, use "contoso.com".
  • **"hostname".** For example, if you want to include `https://example`, use "example".
  • **"file:///path/filename.htm"**. For example, use `file:///C:/Users/contoso/Desktop/index.htm`.

If you disable or don't configure this setting, the list is deleted and IE continues to block specific outdated ActiveX controls on all domains in the Internet Zone. | |Turn off blocking of outdated ActiveX controls for IE |`Administrative Templates\Windows Components\Internet Explorer\Security Features\Add-on Management` |Internet Explorer 8 through IE11 |This setting determines whether IE blocks specific outdated ActiveX controls. Outdated ActiveX controls are never blocked in the Intranet Zone.

If you enable this setting, IE stops blocking outdated ActiveX controls.

If you disable or don't configure this setting, IE continues to block specific outdated ActiveX controls. | |Remove the **Update** button in the out-of-date ActiveX control blocking notification for IE |This functionality is only available through the registry |Internet Explorer 8 through IE11 |This setting determines whether the out-of-date ActiveX control blocking notification shows the **Update** button. This button points users to update specific out-of-date ActiveX controls in IE. | @@ -145,8 +145,8 @@ Here’s a detailed example and description of what’s included in the VersionA |Source URI |File path |Product version |File version |Allowed/Blocked |Reason |EPM-compatible | |-----------|----------|----------------|-------------|----------------|-------|---------------| -|`http://contoso.com/test1.html` |C:\Windows\System32\Macromed\Flash\Flash.ocx |14.0.0.125 |14.0.0.125 |Allowed |Not in blocklist |EPM-compatible | -|`http://contoso.com/test2.html` |C:\Program Files\Java\jre6\bin\jp2iexp.dll |6.0.410.2 |6.0.410.2 |Blocked |Out of date |Not EPM-compatible | +|`https://contoso.com/test1.html` |C:\Windows\System32\Macromed\Flash\Flash.ocx |14.0.0.125 |14.0.0.125 |Allowed |Not in blocklist |EPM-compatible | +|`https://contoso.com/test2.html` |C:\Program Files\Java\jre6\bin\jp2iexp.dll |6.0.410.2 |6.0.410.2 |Blocked |Out of date |Not EPM-compatible | **Where:** - **Source URI.** The URL of the page that loaded the ActiveX control. diff --git a/browsers/internet-explorer/ie11-deploy-guide/set-up-enterprise-mode-logging-and-data-collection.md b/browsers/internet-explorer/ie11-deploy-guide/set-up-enterprise-mode-logging-and-data-collection.md index 8653264774..a72a457d0a 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/set-up-enterprise-mode-logging-and-data-collection.md +++ b/browsers/internet-explorer/ie11-deploy-guide/set-up-enterprise-mode-logging-and-data-collection.md @@ -111,7 +111,7 @@ The required packages are automatically downloaded and included in the solution. 1. Open a registry editor on the computer where you deployed the app, go to the `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode` key, and change the **Enable** string to: - ``` "Enable"="http:///api/records/" + ``` "Enable"="https:///api/records/" ``` Where `` points to your deployment URL. @@ -125,7 +125,7 @@ The required packages are automatically downloaded and included in the solution. **To view the report results** -- Go to `http:///List` to see the report results.

+- Go to `https:///List` to see the report results.

If you’re already on the webpage, you’ll need to refresh the page to see the results. ![Enterprise Mode Result report with details](images/ie-emie-reportwdetails.png) diff --git a/browsers/internet-explorer/ie11-deploy-guide/set-up-enterprise-mode-portal.md b/browsers/internet-explorer/ie11-deploy-guide/set-up-enterprise-mode-portal.md index bb8a401b5c..47c4caf92b 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/set-up-enterprise-mode-portal.md +++ b/browsers/internet-explorer/ie11-deploy-guide/set-up-enterprise-mode-portal.md @@ -176,7 +176,7 @@ Using the IIS Manager, you must restart both your Application Pool and your webs After you've created your database and website, you'll need to register yourself (or another employee) as an administrator for the Enterprise Mode Site List Portal. **To register as an administrator** -1. Open Microsoft Edge and type your website URL into the Address bar. For example, http://emieportal:8085. +1. Open Microsoft Edge and type your website URL into the Address bar. For example, https://emieportal:8085. 2. Click **Register now**. @@ -184,7 +184,7 @@ After you've created your database and website, you'll need to register yourself 4. Click **Administrator** from the **Role** box, and then click **Save**. -5. Append your website URL with `/#/EMIEAdminConsole` in the Address bar to go to your administrator console. For example, http://emieportal:8085/#/EMIEAdminConsole. +5. Append your website URL with `/#/EMIEAdminConsole` in the Address bar to go to your administrator console. For example, https://emieportal:8085/#/EMIEAdminConsole. A dialog box appears, prompting you for the system user name and password. The default user name is EMIEAdmin and the default password is Admin123. We strongly recommend that you change the password by using the **Change password** link as soon as you're done with your first visit. diff --git a/browsers/internet-explorer/ie11-deploy-guide/turn-on-local-control-and-logging-for-enterprise-mode.md b/browsers/internet-explorer/ie11-deploy-guide/turn-on-local-control-and-logging-for-enterprise-mode.md index ea5b7d450b..ea9a56a081 100644 --- a/browsers/internet-explorer/ie11-deploy-guide/turn-on-local-control-and-logging-for-enterprise-mode.md +++ b/browsers/internet-explorer/ie11-deploy-guide/turn-on-local-control-and-logging-for-enterprise-mode.md @@ -46,9 +46,9 @@ Besides turning on this feature, you also have the option to provide a URL for E Your **Value data** location can be any of the following types: -- **URL location (like, http://www.emieposturl.com/api/records or http://localhost:13000)**. IE sends a POST message to the URL every time a change is made to Enterprise Mode from the **Tools** menu.

**Important**
-The `http://www.emieposturl.com/api/records` example will only work if you’ve downloaded the sample discussed in the [Set up Enterprise Mode logging and data collection](set-up-enterprise-mode-logging-and-data-collection.md) topic. If you don’t have the sample, you won’t have the web API. -- **Local network location (like, http://*emieposturl*/)**. IE sends a POST message to your specified local network location every time a change is made to Enterprise Mode from the **Tools** menu. +- **URL location (like, https://www.emieposturl.com/api/records or https://localhost:13000)**. IE sends a POST message to the URL every time a change is made to Enterprise Mode from the **Tools** menu.

**Important**
+The `https://www.emieposturl.com/api/records` example will only work if you’ve downloaded the sample discussed in the [Set up Enterprise Mode logging and data collection](set-up-enterprise-mode-logging-and-data-collection.md) topic. If you don’t have the sample, you won’t have the web API. +- **Local network location (like, https://*emieposturl*/)**. IE sends a POST message to your specified local network location every time a change is made to Enterprise Mode from the **Tools** menu. - **Empty string**. If you leave the **Value data** box blank; your employees will be able to turn Enterprise Mode on and off from the **Tools** menu, but you won’t collect any logging data. For information about how to collect the data provided when your employees turn Enterprise Mode on or off from the **Tools** menu, see [Set up Enterprise Mode logging and data collection](set-up-enterprise-mode-logging-and-data-collection.md). diff --git a/browsers/internet-explorer/ie11-ieak/auto-config-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/auto-config-ieak11-wizard.md index b31c220601..440d2c7fc1 100644 --- a/browsers/internet-explorer/ie11-ieak/auto-config-ieak11-wizard.md +++ b/browsers/internet-explorer/ie11-ieak/auto-config-ieak11-wizard.md @@ -42,7 +42,7 @@ You can use the Domain Name System (DNS) and the Dynamic Host Configuration Prot - Type the location to your automatic proxy script file. **Note**
- If you specify URLs for both auto-config and auto-proxy, the auto-proxy URL will be incorporated into the .ins file. The correct form for the URL is `http://share/test.ins`. + If you specify URLs for both auto-config and auto-proxy, the auto-proxy URL will be incorporated into the .ins file. The correct form for the URL is `https://share/test.ins`. 3. Click **Next** to go to the [Proxy Settings](proxy-settings-ieak11-wizard.md) page or **Back** to go to the [Connection Settings](connection-settings-ieak11-wizard.md) page. diff --git a/browsers/internet-explorer/ie11-ieak/auto-detection-dhcp-or-dns-servers-ieak11.md b/browsers/internet-explorer/ie11-ieak/auto-detection-dhcp-or-dns-servers-ieak11.md index 0752aaac38..b14d4aa1ce 100644 --- a/browsers/internet-explorer/ie11-ieak/auto-detection-dhcp-or-dns-servers-ieak11.md +++ b/browsers/internet-explorer/ie11-ieak/auto-detection-dhcp-or-dns-servers-ieak11.md @@ -36,9 +36,9 @@ DHCP has a higher priority than DNS for automatic configuration. If DHCP provide - Open the [DHCP Administrative Tool](https://go.microsoft.com/fwlink/p/?LinkId=302212), create a new option type, using the code number 252, and then associate it with the URL to your configuration file. For detailed instructions about how to do this, see [Create an option 252 entry in DHCP](https://go.microsoft.com/fwlink/p/?LinkId=294649). **Examples:**
- `http://www.microsoft.com/webproxy.pac`
- `http://marketing/config.ins`
- `http://123.4.567.8/account.pac`

+ `https://www.microsoft.com/webproxy.pac`
+ `https://marketing/config.ins`
+ `https://123.4.567.8/account.pac`

For more detailed info about how to set up your DHCP server, see your server documentation. **To set up automatic detection for DNS servers** @@ -55,5 +55,5 @@ Create a canonical name (CNAME) alias record, named **WPAD**. This record lets y 2. After the database file propagates to the server, the DNS name, `wpad..com` resolves to the server name that includes your automatic configuration file. **Note**
-IE11 creates a default URL template based on the host name,**wpad**. For example, `http://wpad..com/wpad.dat`. Because of this, you need to set up a file or redirection point in your web server **WPAD** record, named **wpad.dat**. The **wpad.dat** record delivers the contents of your automatic configuration file. +IE11 creates a default URL template based on the host name,**wpad**. For example, `https://wpad..com/wpad.dat`. Because of this, you need to set up a file or redirection point in your web server **WPAD** record, named **wpad.dat**. The **wpad.dat** record delivers the contents of your automatic configuration file. diff --git a/browsers/internet-explorer/ie11-ieak/custombranding-ins-file-setting.md b/browsers/internet-explorer/ie11-ieak/custombranding-ins-file-setting.md index 9d4d9f6b4f..f404bf78cf 100644 --- a/browsers/internet-explorer/ie11-ieak/custombranding-ins-file-setting.md +++ b/browsers/internet-explorer/ie11-ieak/custombranding-ins-file-setting.md @@ -16,5 +16,5 @@ Provide the URL to your branding cabinet (.cab) file. |Name |Value | Description | |-----------|--------------------------------|--------------------------------------------------------------| -|Branding |`` |The location of your branding cabinet (.cab) file. For example, http://www.<your_server>.net/cabs/branding.cab.| +|Branding |`` |The location of your branding cabinet (.cab) file. For example, https://www.<your_server>.net/cabs/branding.cab.| diff --git a/browsers/internet-explorer/ie11-ieak/customize-automatic-search-for-ie.md b/browsers/internet-explorer/ie11-ieak/customize-automatic-search-for-ie.md index a4bbac4b2e..fde8b84b67 100644 --- a/browsers/internet-explorer/ie11-ieak/customize-automatic-search-for-ie.md +++ b/browsers/internet-explorer/ie11-ieak/customize-automatic-search-for-ie.md @@ -21,7 +21,7 @@ You can customize Automatic Search so that your employees can type a single word **To set up Automatic Search** -1. Create a script (.asp) file that conditionally looks for search terms, and post it to an intranet server here: http://ieautosearch/response.asp?MT=%1&srch=%2.

+1. Create a script (.asp) file that conditionally looks for search terms, and post it to an intranet server here: https://ieautosearch/response.asp?MT=%1&srch=%2.

For info about the acceptable values for the *%1* and *%2* parameters, see the [Automatic Search parameters](#automatic-search-parameters). For an example of the script file, see the [Sample Automatic Search script](#sample-automatic-search-script).

**Important**
If you aren’t using IIS in your company, you’ll need to remap this URL to your script file’s location. @@ -72,18 +72,18 @@ searchOption = Request.QueryString("srch") ' about filling out an expense report if (search = "NEW HIRE") then -Response.Redirect("http://admin/hr/newhireforms.htm") +Response.Redirect("https://admin/hr/newhireforms.htm") elseif (search = "LIBRARY CATALOG") then -Response.Redirect("http://library/catalog") +Response.Redirect("https://library/catalog") elseif (search = "EXPENSE REPORT") then -Response.Redirect("http://expense") +Response.Redirect("https://expense") elseif (search = "LUNCH MENU") then -Response.Redirect("http://cafe/menu/") +Response.Redirect("https://cafe/menu/") else ' If there is not a match, use the ' default IE autosearch server -Response.Redirect("http://auto.search.msn.com/response.asp?MT=" +Response.Redirect("https://auto.search.msn.com/response.asp?MT=" + search + "&srch=" + searchOption + "&prov=&utf8") end if diff --git a/browsers/internet-explorer/ie11-ieak/important-urls-home-page-and-support-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/important-urls-home-page-and-support-ieak11-wizard.md index 60b082565b..604489d8fc 100644 --- a/browsers/internet-explorer/ie11-ieak/important-urls-home-page-and-support-ieak11-wizard.md +++ b/browsers/internet-explorer/ie11-ieak/important-urls-home-page-and-support-ieak11-wizard.md @@ -17,7 +17,7 @@ The **Important URLS – Home Page and Support** page of the Internet Explorer C **To use the Important URLS – Home Page and Support page** 1. In the **Add a homepage URL** box, type the URL to the page your employees go to when they click the **Home** button, and then click **Add**.

-If you add multiple **Home** pages, each page appears on a separate tab in the browser. If you don’t add a custom **Home** page, IE uses http://www.msn.com by default. If you want to delete an existing page, click the URL and then click **Remove**. +If you add multiple **Home** pages, each page appears on a separate tab in the browser. If you don’t add a custom **Home** page, IE uses https://www.msn.com by default. If you want to delete an existing page, click the URL and then click **Remove**. 2. Check the **Retain previous Home Page (Upgrade)** box if you have employees with previous versions of IE, who need to keep their **Home** page settings when the browser is updated. diff --git a/browsers/internet-explorer/ie11-ieak/proxy-auto-config-examples.md b/browsers/internet-explorer/ie11-ieak/proxy-auto-config-examples.md index 9a57aef1fa..5e04f4e473 100644 --- a/browsers/internet-explorer/ie11-ieak/proxy-auto-config-examples.md +++ b/browsers/internet-explorer/ie11-ieak/proxy-auto-config-examples.md @@ -127,7 +127,7 @@ In this example, the proxy server is selected by translating the host name into ``` javascript function FindProxyForURL(url, host) { - if (dnsResolve(host) == "999.99.99.999") { // = http://secproxy + if (dnsResolve(host) == "999.99.99.999") { // = https://secproxy return "PROXY secproxy:8080"; } else { diff --git a/browsers/internet-explorer/ie11-ieak/proxy-settings-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/proxy-settings-ieak11-wizard.md index c29f790845..22252bf546 100644 --- a/browsers/internet-explorer/ie11-ieak/proxy-settings-ieak11-wizard.md +++ b/browsers/internet-explorer/ie11-ieak/proxy-settings-ieak11-wizard.md @@ -21,7 +21,7 @@ Using a proxy server lets you limit access to the Internet. You can also use the 1. Check the **Enable proxy settings** box if you want to use proxy servers for any of your services. 2. Type the address of the proxy server you want to use for your services into the **Address of proxy** box. In most cases, a single proxy server is used for all of your services.

-Proxy locations that don’t begin with a protocol (like, http:// or ftp://) are assumed to be a CERN-type HTTP proxy. For example, the entry *proxy* is treated the same as the entry `http://proxy`. +Proxy locations that don’t begin with a protocol (like, https:// or ftp://) are assumed to be a CERN-type HTTP proxy. For example, the entry *proxy* is treated the same as the entry `https://proxy`. 3. Type the port for each service. The default value is *80*. @@ -30,7 +30,7 @@ Proxy locations that don’t begin with a protocol (like, http:// or ftp://) are 5. Type any services that shouldn’t use a proxy server into the **Do not use proxy server for addresses beginning with** box.

When filling out your exceptions, keep in mind: - - Proxy bypass entries can begin with a protocol type, such as http://, https://, or ftp://. However, if a protocol type is used, the exception entry applies only to requests for that protocol. + - Proxy bypass entries can begin with a protocol type, such as https://, https://, or ftp://. However, if a protocol type is used, the exception entry applies only to requests for that protocol. - Protocol values are not case sensitive and you can use a wildcard character (*) in place of zero or more characters. diff --git a/browsers/internet-explorer/ie11-ieak/search-providers-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/search-providers-ieak11-wizard.md index 0e48aa99c7..3633d298c1 100644 --- a/browsers/internet-explorer/ie11-ieak/search-providers-ieak11-wizard.md +++ b/browsers/internet-explorer/ie11-ieak/search-providers-ieak11-wizard.md @@ -25,7 +25,7 @@ The **Search Provider** box appears. 3. In the **Display Name** box, type the text that appears in the **Search Options** menu for the search provider. -4. In the **URL** box, type the full URL to the search provider, including the http:// prefix. +4. In the **URL** box, type the full URL to the search provider, including the https:// prefix. 5. In the **Favicon URL** box, type the full URL to any icon to associate with your provider. diff --git a/browsers/internet-explorer/ie11-ieak/troubleshooting-custom-browser-pkg-ieak11.md b/browsers/internet-explorer/ie11-ieak/troubleshooting-custom-browser-pkg-ieak11.md index 2526c4f33b..8f9826a8b5 100644 --- a/browsers/internet-explorer/ie11-ieak/troubleshooting-custom-browser-pkg-ieak11.md +++ b/browsers/internet-explorer/ie11-ieak/troubleshooting-custom-browser-pkg-ieak11.md @@ -57,7 +57,7 @@ Internet Explorer Setup can switch servers during the installation process to ma To address connection issues (for example, as a result of server problems) where Setup can’t locate another download site by default, we recommend you overwrite your first download server using this workaround: ``` syntax -\ie11setup.exe /C:"ie11wzd.exe /S:""\ie11setup.exe"" /L:""http://your_Web_server/your_Web_site/ie11sites.dat""" +\ie11setup.exe /C:"ie11wzd.exe /S:""\ie11setup.exe"" /L:""https://your_Web_server/your_Web_site/ie11sites.dat""" ``` Where `` represents the folder location where you stored IE11setup.exe. From 653b98888d17df71ca9bf83a1f6aca4c380e8b7e Mon Sep 17 00:00:00 2001 From: Patti Short Date: Fri, 2 Nov 2018 14:22:06 -0700 Subject: [PATCH 10/32] added required metadata --- browsers/edge/about-microsoft-edge.md | 1 + browsers/edge/available-policies.md | 1 + browsers/edge/change-history-for-microsoft-edge.md | 1 + browsers/edge/emie-to-improve-compatibility.md | 1 + browsers/edge/group-policies/address-bar-settings-gp.md | 2 +- browsers/edge/group-policies/adobe-settings-gp.md | 2 +- browsers/edge/group-policies/books-library-management-gp.md | 2 +- browsers/edge/group-policies/browser-settings-management-gp.md | 2 +- browsers/edge/group-policies/developer-settings-gp.md | 2 +- browsers/edge/group-policies/extensions-management-gp.md | 2 +- browsers/edge/group-policies/favorites-management-gp.md | 2 +- browsers/edge/group-policies/home-button-gp.md | 1 + .../group-policies/interoperability-enterprise-guidance-gp.md | 1 + browsers/edge/group-policies/new-tab-page-settings-gp.md | 1 + browsers/edge/group-policies/prelaunch-preload-gp.md | 1 + browsers/edge/group-policies/search-engine-customization-gp.md | 1 + browsers/edge/group-policies/security-privacy-management-gp.md | 1 + browsers/edge/group-policies/start-pages-gp.md | 1 + browsers/edge/group-policies/sync-browser-settings-gp.md | 1 + browsers/edge/group-policies/telemetry-management-gp.md | 1 + browsers/edge/microsoft-edge-faq.md | 3 ++- browsers/edge/microsoft-edge-kiosk-mode-deploy.md | 3 ++- 22 files changed, 24 insertions(+), 9 deletions(-) diff --git a/browsers/edge/about-microsoft-edge.md b/browsers/edge/about-microsoft-edge.md index e39d63f4e2..deef9f2c1a 100644 --- a/browsers/edge/about-microsoft-edge.md +++ b/browsers/edge/about-microsoft-edge.md @@ -5,6 +5,7 @@ ms.assetid: 70377735-b2f9-4b0b-9658-4cf7c1d745bb author: shortpatti ms.prod: edge ms.mktglfcycl: general +ms.topic: reference ms.sitesec: library title: Microsoft Edge for IT Pros ms.localizationpriority: medium diff --git a/browsers/edge/available-policies.md b/browsers/edge/available-policies.md index 83197e6a12..e62e7d861d 100644 --- a/browsers/edge/available-policies.md +++ b/browsers/edge/available-policies.md @@ -6,6 +6,7 @@ ms.author: pashort manager: dougkim ms.prod: edge ms.mktglfcycl: explore +ms.topic: reference ms.sitesec: library title: Group Policy and Mobile Device Management settings for Microsoft Edge (Microsoft Edge for IT Pros) ms.localizationpriority: medium diff --git a/browsers/edge/change-history-for-microsoft-edge.md b/browsers/edge/change-history-for-microsoft-edge.md index 3b39c63a9c..6d86a32508 100644 --- a/browsers/edge/change-history-for-microsoft-edge.md +++ b/browsers/edge/change-history-for-microsoft-edge.md @@ -2,6 +2,7 @@ title: Change history for Microsoft Edge (Microsoft Edge for IT Pros) description: Discover what's new and updated in the Microsoft Edge for both Windows 10 and Windows 10 Mobile. ms.prod: edge +ms.topic: reference ms.mktglfcycl: explore ms.sitesec: library ms.localizationpriority: medium diff --git a/browsers/edge/emie-to-improve-compatibility.md b/browsers/edge/emie-to-improve-compatibility.md index 0c9c246104..5676c06b6f 100644 --- a/browsers/edge/emie-to-improve-compatibility.md +++ b/browsers/edge/emie-to-improve-compatibility.md @@ -5,6 +5,7 @@ author: shortpatti ms.author: pashort ms.manager: dougkim ms.prod: browser-edge +ms.topic: reference ms.mktglfcycl: support ms.sitesec: library ms.pagetype: appcompat diff --git a/browsers/edge/group-policies/address-bar-settings-gp.md b/browsers/edge/group-policies/address-bar-settings-gp.md index da3686718d..b8b82b3882 100644 --- a/browsers/edge/group-policies/address-bar-settings-gp.md +++ b/browsers/edge/group-policies/address-bar-settings-gp.md @@ -8,7 +8,7 @@ manager: dougkim author: shortpatti ms.author: pashort ms.date: 10/02/2018 -ms.topic: article +ms.topic: reference ms.prod: edge ms.mktglfcycl: explore ms.sitesec: library diff --git a/browsers/edge/group-policies/adobe-settings-gp.md b/browsers/edge/group-policies/adobe-settings-gp.md index a5bcbb0ea4..3ad76e0397 100644 --- a/browsers/edge/group-policies/adobe-settings-gp.md +++ b/browsers/edge/group-policies/adobe-settings-gp.md @@ -8,7 +8,7 @@ manager: dougkim author: shortpatti ms.author: pashort ms.date: 10/02/2018 -ms.topic: article +ms.topic: reference ms.prod: edge ms.mktglfcycl: explore ms.sitesec: library diff --git a/browsers/edge/group-policies/books-library-management-gp.md b/browsers/edge/group-policies/books-library-management-gp.md index 2fc892d73b..d2e9d6ea91 100644 --- a/browsers/edge/group-policies/books-library-management-gp.md +++ b/browsers/edge/group-policies/books-library-management-gp.md @@ -8,7 +8,7 @@ manager: dougkim author: shortpatti ms.author: pashort ms.date: 10/02/2018 -ms.topic: article +ms.topic: reference ms.prod: edge ms.mktglfcycl: explore ms.sitesec: library diff --git a/browsers/edge/group-policies/browser-settings-management-gp.md b/browsers/edge/group-policies/browser-settings-management-gp.md index 4cd1c73ad2..2570cc3c69 100644 --- a/browsers/edge/group-policies/browser-settings-management-gp.md +++ b/browsers/edge/group-policies/browser-settings-management-gp.md @@ -8,7 +8,7 @@ manager: dougkim author: shortpatti ms.author: pashort ms.date: 10/02/2018 -ms.topic: article +ms.topic: reference ms.prod: edge ms.mktglfcycl: explore ms.sitesec: library diff --git a/browsers/edge/group-policies/developer-settings-gp.md b/browsers/edge/group-policies/developer-settings-gp.md index 4e2e437372..ca4870ac95 100644 --- a/browsers/edge/group-policies/developer-settings-gp.md +++ b/browsers/edge/group-policies/developer-settings-gp.md @@ -8,7 +8,7 @@ managre: dougkim author: shortpatti ms.author: pashort ms.date: 10/02/2018 -ms.topic: article +ms.topic: reference ms.prod: edge ms.mktglfcycl: explore ms.sitesec: library diff --git a/browsers/edge/group-policies/extensions-management-gp.md b/browsers/edge/group-policies/extensions-management-gp.md index 577d254742..3a7fc2dfe5 100644 --- a/browsers/edge/group-policies/extensions-management-gp.md +++ b/browsers/edge/group-policies/extensions-management-gp.md @@ -8,7 +8,7 @@ manager: dougkim author: shortpatti ms.author: pashort ms.date: 10/02/2018 -ms.topic: article +ms.topic: reference ms.prod: edge ms.mktglfcycl: explore ms.sitesec: library diff --git a/browsers/edge/group-policies/favorites-management-gp.md b/browsers/edge/group-policies/favorites-management-gp.md index 4dcf0faf29..13c415afdf 100644 --- a/browsers/edge/group-policies/favorites-management-gp.md +++ b/browsers/edge/group-policies/favorites-management-gp.md @@ -8,7 +8,7 @@ manager: dougkim author: shortpatti ms.author: pashort ms.date: 10/02/2018 -ms.topic: article +ms.topic: reference ms.prod: edge ms.mktglfcycl: explore ms.sitesec: library diff --git a/browsers/edge/group-policies/home-button-gp.md b/browsers/edge/group-policies/home-button-gp.md index a4bac9dd9a..3f22c2897d 100644 --- a/browsers/edge/group-policies/home-button-gp.md +++ b/browsers/edge/group-policies/home-button-gp.md @@ -9,6 +9,7 @@ ms.localizationpriority: medium ms.prod: edge ms.mktglfcycl: explore ms.sitesec: library +ms.topic: reference --- # Home button diff --git a/browsers/edge/group-policies/interoperability-enterprise-guidance-gp.md b/browsers/edge/group-policies/interoperability-enterprise-guidance-gp.md index d053b89a43..9e39200fe0 100644 --- a/browsers/edge/group-policies/interoperability-enterprise-guidance-gp.md +++ b/browsers/edge/group-policies/interoperability-enterprise-guidance-gp.md @@ -9,6 +9,7 @@ ms.date: 10/02/2018 ms.prod: edge ms.mktglfcycl: explore ms.sitesec: library +ms.topic: reference --- # Interoperability and enterprise mode guidance diff --git a/browsers/edge/group-policies/new-tab-page-settings-gp.md b/browsers/edge/group-policies/new-tab-page-settings-gp.md index 6d6ba06617..b18871a3e6 100644 --- a/browsers/edge/group-policies/new-tab-page-settings-gp.md +++ b/browsers/edge/group-policies/new-tab-page-settings-gp.md @@ -9,6 +9,7 @@ ms.localizationpriority: medium ms.prod: edge ms.mktglfcycl: explore ms.sitesec: library +ms.topic: reference --- diff --git a/browsers/edge/group-policies/prelaunch-preload-gp.md b/browsers/edge/group-policies/prelaunch-preload-gp.md index aa402f3743..8baa1858bb 100644 --- a/browsers/edge/group-policies/prelaunch-preload-gp.md +++ b/browsers/edge/group-policies/prelaunch-preload-gp.md @@ -6,6 +6,7 @@ ms.author: pashort author: shortpatti ms.date: 10/02/2018 ms.localizationpriority: medium +ms.topic: reference --- # Prelaunch Microsoft Edge and preload tabs in the background diff --git a/browsers/edge/group-policies/search-engine-customization-gp.md b/browsers/edge/group-policies/search-engine-customization-gp.md index 75d3d2b070..75677a0ec8 100644 --- a/browsers/edge/group-policies/search-engine-customization-gp.md +++ b/browsers/edge/group-policies/search-engine-customization-gp.md @@ -6,6 +6,7 @@ ms.author: pashort author: shortpatti ms.date: 10/02/2018 ms.localizationpriority: medium +ms.topic: reference --- # Search engine customization diff --git a/browsers/edge/group-policies/security-privacy-management-gp.md b/browsers/edge/group-policies/security-privacy-management-gp.md index 3b66e9902c..cf137c8439 100644 --- a/browsers/edge/group-policies/security-privacy-management-gp.md +++ b/browsers/edge/group-policies/security-privacy-management-gp.md @@ -6,6 +6,7 @@ ms.author: pashort author: shortpatti ms.date: 10/02/2018 ms.localizationpriority: medium +ms.topic: reference --- # Security and privacy diff --git a/browsers/edge/group-policies/start-pages-gp.md b/browsers/edge/group-policies/start-pages-gp.md index 8aded2af76..55df08e642 100644 --- a/browsers/edge/group-policies/start-pages-gp.md +++ b/browsers/edge/group-policies/start-pages-gp.md @@ -9,6 +9,7 @@ ms.date: 10/02/2018 ms.prod: edge ms.mktglfcycl: explore ms.sitesec: library +ms.topic: reference --- # Start pages diff --git a/browsers/edge/group-policies/sync-browser-settings-gp.md b/browsers/edge/group-policies/sync-browser-settings-gp.md index 19670fa3e2..aac83e87ca 100644 --- a/browsers/edge/group-policies/sync-browser-settings-gp.md +++ b/browsers/edge/group-policies/sync-browser-settings-gp.md @@ -6,6 +6,7 @@ ms.author: pashort author: shortpatti ms.date: 10/02/2018 ms.localizationpriority: medium +ms.topic: reference --- # Sync browser settings diff --git a/browsers/edge/group-policies/telemetry-management-gp.md b/browsers/edge/group-policies/telemetry-management-gp.md index 446721b2a4..c83cd2848c 100644 --- a/browsers/edge/group-policies/telemetry-management-gp.md +++ b/browsers/edge/group-policies/telemetry-management-gp.md @@ -6,6 +6,7 @@ ms.author: pashort author: shortpatti ms.date: 10/02/2018 ms.localizationpriority: medium +ms.topic: reference --- # Telemetry and data collection diff --git a/browsers/edge/microsoft-edge-faq.md b/browsers/edge/microsoft-edge-faq.md index 47f937d659..f989f0e5c8 100644 --- a/browsers/edge/microsoft-edge-faq.md +++ b/browsers/edge/microsoft-edge-faq.md @@ -4,10 +4,11 @@ description: Answers to frequently asked questions about Microsoft Edge features author: shortpatti ms.author: pashort ms.prod: edge +ms.topic: reference ms.mktglfcycl: general ms.sitesec: library ms.localizationpriority: medium -ms.date: 10/23/2018 +ms.date: 11/05/2018 --- # Frequently Asked Questions (FAQs) for IT Pros diff --git a/browsers/edge/microsoft-edge-kiosk-mode-deploy.md b/browsers/edge/microsoft-edge-kiosk-mode-deploy.md index a3d1996719..a8f34188e6 100644 --- a/browsers/edge/microsoft-edge-kiosk-mode-deploy.md +++ b/browsers/edge/microsoft-edge-kiosk-mode-deploy.md @@ -1,11 +1,12 @@ --- +title: Deploy Microsoft Edge kiosk mode description: Microsoft Edge kiosk mode works with assigned access to allow IT admins to create a tailored browsing experience designed for kiosk devices. To use Microsoft Edge kiosk mode, you must configure Microsoft Edge as an application in assigned access. ms.assetid: author: shortpatti ms.author: pashort ms.prod: edge ms.sitesec: library -title: Deploy Microsoft Edge kiosk mode +ms.topic: get-started-article ms.localizationpriority: medium ms.date: 10/29/2018 --- From 286571f150e4b764a8cf53fc47d3019c915cf2d4 Mon Sep 17 00:00:00 2001 From: Patti Short Date: Fri, 2 Nov 2018 14:48:33 -0700 Subject: [PATCH 11/32] made logic changes based on conversation with PM --- .../includes/allow-web-content-new-tab-page-include.md | 7 +++---- .../allow-web-content-on-new-tab-page-shortdesc.md | 4 ++-- 2 files changed, 5 insertions(+), 6 deletions(-) diff --git a/browsers/edge/includes/allow-web-content-new-tab-page-include.md b/browsers/edge/includes/allow-web-content-new-tab-page-include.md index aa5efc657a..c1ed158191 100644 --- a/browsers/edge/includes/allow-web-content-new-tab-page-include.md +++ b/browsers/edge/includes/allow-web-content-new-tab-page-include.md @@ -1,7 +1,7 @@ --- author: shortpatti ms.author: pashort -ms.date: 10/26/2018 +ms.date: 11/02/2018 ms.prod: edge ms:topic: include --- @@ -18,9 +18,8 @@ ms:topic: include |Group Policy |MDM |Registry |Description | |---|:---:|:---:|---| -|Not configured |Blank |Blank |Users can choose what loads on the New Tab page. | -|Disabled |0 |0 |Load a blank page instead of the default New Tab page and prevent users from changing it. | -|Enabled **(default)** |1 |1 |Load the default New Tab page. | +|Disabled |0 |0 |Load a blank page instead of the default New Tab page and prevent users from making changes. | +|Enabled or not configured **(default)** |1 |1 |Load the default New Tab page and let the users make changes. | --- ### ADMX info and settings diff --git a/browsers/edge/shortdesc/allow-web-content-on-new-tab-page-shortdesc.md b/browsers/edge/shortdesc/allow-web-content-on-new-tab-page-shortdesc.md index 9c8dea176e..a056b0a737 100644 --- a/browsers/edge/shortdesc/allow-web-content-on-new-tab-page-shortdesc.md +++ b/browsers/edge/shortdesc/allow-web-content-on-new-tab-page-shortdesc.md @@ -1,9 +1,9 @@ --- author: shortpatti ms.author: pashort -ms.date: 10/02/2018 +ms.date: 11/02/2018 ms.prod: edge ms:topic: include --- -By default, Microsoft Edge loads the default New Tab page. Disabling this policy loads a blank page instead of the New Tab page and prevents users from changing it. Not configuring this policy lets users choose what loads on the New Tab page. \ No newline at end of file +By default, Microsoft Edge loads the default New Tab page and lets the users make changes. If you disable this policy, a blank page loads instead of the New Tab page and prevents users from changing it. \ No newline at end of file From a1cd8cce894d28fbb9826a3626f50aee0c9f44f8 Mon Sep 17 00:00:00 2001 From: warren-msft Date: Fri, 2 Nov 2018 17:16:51 -0500 Subject: [PATCH 12/32] Need to update that the policies apply to User and Computer configuration paths. They they apply to both server and client. ANd add the date that the policy became available for User mode on client. --- .../manage-settings-app-with-group-policy.md | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-) diff --git a/windows/client-management/manage-settings-app-with-group-policy.md b/windows/client-management/manage-settings-app-with-group-policy.md index 231682d2b9..ae2a8a363d 100644 --- a/windows/client-management/manage-settings-app-with-group-policy.md +++ b/windows/client-management/manage-settings-app-with-group-policy.md @@ -23,7 +23,14 @@ To make use of the Settings App group polices on Windows server 2016, install fi To centrally manage the new policies copy the ControlPanel.admx and ControlPanel.adml file to [Central Store](https://support.microsoft.com/help/3087759/how-to-create-and-manage-the-central-store-for-group-policy-administra) if your company uses one or the PolicyDefinitions folder of the Domain Controllers used for Group Policy management. -This policy is available at **Computer Configuration** > **Administrative Templates** > **Control Panel** > **Settings Page Visibility**. +This policy is available for. both. User. and. Computer. depending. on the. version of the. OS +Windows. Server. 2016.with. KB. 4457127. applied. will. have. both. User and. Computer. policy +Windows. 10. version. 1703. added. Computer. policy. for the. Settings. app +Windows. 10. version. 1809. added. User. policy. for. the. Settings. app + +Policy. Paths +**Computer Configuration** > **Administrative Templates** > **Control Panel** > **Settings Page Visibility**. +**User Configuration** > **Administrative Templates** > **Control Panel** > **Settings Page Visibility**. ![Settings page visibility policy](images/settings-page-visibility-gp.png) From f9b8dccb64f016111b3409909bf288ef49ea32cf Mon Sep 17 00:00:00 2001 From: Liza Poggemeyer Date: Fri, 2 Nov 2018 15:37:57 -0700 Subject: [PATCH 13/32] Typo fixes --- .../manage-settings-app-with-group-policy.md | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-) diff --git a/windows/client-management/manage-settings-app-with-group-policy.md b/windows/client-management/manage-settings-app-with-group-policy.md index ae2a8a363d..aa9b63bd2b 100644 --- a/windows/client-management/manage-settings-app-with-group-policy.md +++ b/windows/client-management/manage-settings-app-with-group-policy.md @@ -23,13 +23,12 @@ To make use of the Settings App group polices on Windows server 2016, install fi To centrally manage the new policies copy the ControlPanel.admx and ControlPanel.adml file to [Central Store](https://support.microsoft.com/help/3087759/how-to-create-and-manage-the-central-store-for-group-policy-administra) if your company uses one or the PolicyDefinitions folder of the Domain Controllers used for Group Policy management. -This policy is available for. both. User. and. Computer. depending. on the. version of the. OS -Windows. Server. 2016.with. KB. 4457127. applied. will. have. both. User and. Computer. policy -Windows. 10. version. 1703. added. Computer. policy. for the. Settings. app -Windows. 10. version. 1809. added. User. policy. for. the. Settings. app +This policy is available for both User and Computer depending on the version of the OS. Windows Server 2016 with KB 4457127 applied will have both User and Computer policy. Windows 10, version 1703, added Computer policy for the Settings app. Windows 10, version 1809, added User policy for the Settings app. + +Policy paths: -Policy. Paths **Computer Configuration** > **Administrative Templates** > **Control Panel** > **Settings Page Visibility**. + **User Configuration** > **Administrative Templates** > **Control Panel** > **Settings Page Visibility**. ![Settings page visibility policy](images/settings-page-visibility-gp.png) From adcd168f28322cc76b3aa97224f713aa4d8f8541 Mon Sep 17 00:00:00 2001 From: Antony Bragg Date: Fri, 2 Nov 2018 23:39:55 +0000 Subject: [PATCH 14/32] Update account-lockout-policy.md Corrected the location of the account lock out policies. Missed out the "Policies" section of the tree. --- .../security-policy-settings/account-lockout-policy.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/security-policy-settings/account-lockout-policy.md b/windows/security/threat-protection/security-policy-settings/account-lockout-policy.md index c481a744c3..1478eafa69 100644 --- a/windows/security/threat-protection/security-policy-settings/account-lockout-policy.md +++ b/windows/security/threat-protection/security-policy-settings/account-lockout-policy.md @@ -18,7 +18,7 @@ ms.date: 10/11/2018 Describes the Account Lockout Policy settings and links to information about each policy setting. -Someone who attempts to use more than a few unsuccessful passwords while trying to log on to your system might be a malicious user who is attempting to determine an account password by trial and error. Windows domain controllers keep track of logon attempts, and domain controllers can be configured to respond to this type of potential attack by disabling the account for a preset period of time. Account Lockout Policy settings control the threshold for this response and the actions to be taken after the threshold is reached. The Account Lockout Policy settings can be configured in the following location in the Group Policy Management Console: **Computer Configuration\\Windows Settings\\Security Settings\\Account Policies\\Account Lockout Policy**. +Someone who attempts to use more than a few unsuccessful passwords while trying to log on to your system might be a malicious user who is attempting to determine an account password by trial and error. Windows domain controllers keep track of logon attempts, and domain controllers can be configured to respond to this type of potential attack by disabling the account for a preset period of time. Account Lockout Policy settings control the threshold for this response and the actions to be taken after the threshold is reached. The Account Lockout Policy settings can be configured in the following location in the Group Policy Management Console: **Computer Configuration\\Policies\\Windows Settings\\Security Settings\\Account Policies\\Account Lockout Policy**. The following topics provide a discussion of each policy setting's implementation and best practices considerations, policy location, default values for the server type or Group Policy Object (GPO), relevant differences in operating system versions, and security considerations (including the possible vulnerabilities of each policy setting), countermeasures that you can implement, and the potential impact of implementing the countermeasures. From 387ae68d462295806a038c8da593dab99befbaa3 Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Sat, 3 Nov 2018 19:28:56 -0400 Subject: [PATCH 15/32] typo: occuring -> occurring --- windows/client-management/mdm/policy-csp-power.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-power.md b/windows/client-management/mdm/policy-csp-power.md index 6a7dbb8a95..99ad8fd29e 100644 --- a/windows/client-management/mdm/policy-csp-power.md +++ b/windows/client-management/mdm/policy-csp-power.md @@ -348,7 +348,7 @@ If you enable this policy setting, you must provide a value, in seconds, indicat If you disable or do not configure this policy setting, users control this setting. -If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the sleep transition from occuring. The "Prevent enabling lock screen slide show" policy setting can be used to disable the slide show feature. +If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the sleep transition from occurring. The "Prevent enabling lock screen slide show" policy setting can be used to disable the slide show feature. > [!TIP] @@ -412,7 +412,7 @@ If you enable this policy setting, you must provide a value, in seconds, indicat If you disable or do not configure this policy setting, users control this setting. -If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the sleep transition from occuring. The "Prevent enabling lock screen slide show" policy setting can be used to disable the slide show feature. +If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the sleep transition from occurring. The "Prevent enabling lock screen slide show" policy setting can be used to disable the slide show feature. > [!TIP] @@ -600,7 +600,7 @@ If you enable this policy setting, you must provide a value, in seconds, indicat If you disable or do not configure this policy setting, users control this setting. -If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the sleep transition from occuring. The "Prevent enabling lock screen slide show" policy setting can be used to disable the slide show feature. +If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the sleep transition from occurring. The "Prevent enabling lock screen slide show" policy setting can be used to disable the slide show feature. > [!TIP] From 57704903d09aef9fef737f30032e726c7ae6ed35 Mon Sep 17 00:00:00 2001 From: Andre van den Berg Date: Sun, 4 Nov 2018 10:36:27 +0100 Subject: [PATCH 16/32] First note in document not correct formated --- windows/deployment/windows-autopilot/windows-10-autopilot.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/deployment/windows-autopilot/windows-10-autopilot.md b/windows/deployment/windows-autopilot/windows-10-autopilot.md index 7f8964a738..6b988faa67 100644 --- a/windows/deployment/windows-autopilot/windows-10-autopilot.md +++ b/windows/deployment/windows-autopilot/windows-10-autopilot.md @@ -51,8 +51,8 @@ The Windows Autopilot Deployment Program enables you to: ##### Prerequisites - >[!NOTE] - >Today, Windows Autopilot user-driven mode supports joining devices to Azure Active Directory. Support for Hybrid Azure Active Directory Join (with devices joined to an on-premises Active Directory domain) will be available in a future Windows 10 release. See [Introduction to device management in Azure Active Directory](https://docs.microsoft.com/azure/active-directory/device-management-introduction) for more information about the differences between these two join options. +>[!NOTE] +>Today, Windows Autopilot user-driven mode supports joining devices to Azure Active Directory. Support for Hybrid Azure Active Directory Join (with devices joined to an on-premises Active Directory domain) will be available in a future Windows 10 release. See [Introduction to device management in Azure Active Directory](https://docs.microsoft.com/azure/active-directory/device-management-introduction) for more information about the differences between these two join options. * [Devices must be registered to the organization](#device-registration-and-oobe-customization) * [Company branding needs to be configured](#configure-company-branding-for-oobe) From 18602e08d71c3c6d992ebf7faaf5aaf24ed5090e Mon Sep 17 00:00:00 2001 From: Patti Short <35278231+shortpatti@users.noreply.github.com> Date: Mon, 5 Nov 2018 07:13:33 -0800 Subject: [PATCH 17/32] Update how-to-deploy-the-app-v-client-gb18030.md fixed the table formatting --- .../how-to-deploy-the-app-v-client-gb18030.md | 405 +++++------------- 1 file changed, 96 insertions(+), 309 deletions(-) diff --git a/mdop/appv-v5/how-to-deploy-the-app-v-client-gb18030.md b/mdop/appv-v5/how-to-deploy-the-app-v-client-gb18030.md index 5142ecf01f..346ca3eb1a 100644 --- a/mdop/appv-v5/how-to-deploy-the-app-v-client-gb18030.md +++ b/mdop/appv-v5/how-to-deploy-the-app-v-client-gb18030.md @@ -7,7 +7,7 @@ ms.pagetype: mdop, appcompat, virtualization ms.mktglfcycl: deploy ms.sitesec: library ms.prod: w10 -ms.date: 11/01/2016 +ms.date: 11/05/2018 --- @@ -18,341 +18,137 @@ Use the following procedure to install the Microsoft Application Virtualization **What to do before you start** -1. Review and install the software prerequisites: +1. Review and install the software prerequisites: - Install the prerequisite software that corresponds to the version of App-V that you are installing: + Install the prerequisite software that corresponds to the version of App-V that you are installing: - - [About App-V 5.0 SP3](about-app-v-50-sp3.md) + - [About App-V 5.0 SP3](about-app-v-50-sp3.md) - - App-V 5.0 SP1 and App-V 5.0 SP2 – no new prerequisites in these versions + - App-V 5.0 SP1 and App-V 5.0 SP2 – no new prerequisites in these versions - - [App-V 5.0 Prerequisites](app-v-50-prerequisites.md) + - [App-V 5.0 Prerequisites](app-v-50-prerequisites.md) -2. Review the client coexistence and unsupported scenarios, as applicable to your installation: +2. Review the client coexistence and unsupported scenarios, as applicable to your installation: - - - - - - - - - - - - - - - -

Deploying coexisting App-V clients

[Planning for the App-V 5.0 Sequencer and Client Deployment](planning-for-the-app-v-50-sequencer-and-client-deployment.md)

Unsupported or limited installation scenarios

See the client section in [App-V 5.0 Supported Configurations](app-v-50-supported-configurations.md)

+ | | | + |---|---| + |Deploying coexisting App-V clients |[Planning for the App-V 5.0 Sequencer and Client Deployment](planning-for-the-app-v-50-sequencer-and-client-deployment.md) | + |Unsupported or limited installation scenarios |[App-V 5.0 Supported Configurations](app-v-50-supported-configurations.md) | + --- +   +3. Review the locations for client registry, log, and troubleshooting information: -   - -3. Review the locations for client registry, log, and troubleshooting information: - - ---- - - - - - - - - - - - - - - -

Client registry information

    -
  • By default, after you install the App-V 5.0 client, the client information is stored in the registry in the following registry key:

    -

    HKEY_LOCAL_MACHINE \ SOFTWARE \ MICROSOFT \ APPV \ CLIENT

  • -
  • When you deploy a virtualized package to a computer that is running the App-V client, the associated package data is stored in the following location:

    -

    C: \ ProgramData \ App-V

    -

    However, you can reconfigure this location with the following registry key:

    -

    HKEY_LOCAL_MACHINE \ SOFTWARE \ MICROSOFT \ SOFTWARE \ MICROSOFT \ APPV \ CLIENT \ STREAMING \ PACKAGEINSTALLATIONROOT

  • -

Client log files

    -
  • For log file information that is associated with the App-V 5.0 Client, search in the following log:

    -

    Event logs / Applications and Services Logs / Microsoft / AppV

  • -
  • In App-V 5.0 SP3, some logs have been consolidated and moved to the following location:

    -

    Event logs/Applications and Services Logs/Microsoft/AppV/ServiceLog

    -

    For a list of the moved logs, see [About App-V 5.0 SP3](about-app-v-50-sp3.md#bkmk-event-logs-moved).

  • -
  • Packages that are currently stored on computers that run the App-V 5.0 Client are saved to the following location:

    -

    C:\ProgramData\App-V\<package id>\<version id>

  • -

Client installation troubleshooting information

See the error log in the %temp% folder. To review the log files, click Start, type %temp%, and then look for the appv_ log.

- -  + | | | + |---|---| + |Client registry information |

  • By default, after you install the App-V 5.0 client, the client information is stored in the registry in the following registry key:

    HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\APPV\CLIENT

  • When you deploy a virtualized package to a computer that is running the App-V client, the associated package data is stored in the following location:

    C:\ProgramData\App-V

    However, you can reconfigure this location with the following registry key:

    HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\SOFTWARE\MICROSOFT\APPV\CLIENT\STREAMING\PACKAGEINSTALLATIONROOT

| + |Client log files |
  • For log file information that is associated with the App-V 5.0 Client, search in the following log:

    Event logs/Applications and Services Logs/Microsoft/AppV

  • In App-V 5.0 SP3, some logs have been consolidated and moved to the following location:

    Event logs/Applications and Services Logs/Microsoft/AppV/ServiceLog

    For a list of the moved logs, see [About App-V 5.0 SP3](about-app-v-50-sp3.md#bkmk-event-logs-moved).

  • Packages that are currently stored on computers that run the App-V 5.0 Client are saved to the following location:

    C:\ProgramData\App-V\<_package id_>\<_version id_>

| + |Client installation troubleshooting information |See the error log in the **%temp%** folder. To review the log files, click **Start**, type **%temp%**, and then look for the **appv_ log**. | + --- + **To install the App-V 5.0 Client** -1. Copy the App-V 5.0 client installation file to the computer on which it will be installed. Choose from the following client types: +1. Copy the App-V 5.0 client installation file to the computer on which it will be installed.

Choose from the following client types: - - - - - - - - - - - - - - - - - - - - - -
Client typeFile to use

Standard version of the client

appv_client_setup.exe

Remote Desktop Services version of the client

appv_client_setup_rds.exe

+ |Client type |File to use | + |---|---| + |Standard version of the client |**appv_client_setup.exe** | + |Remote Desktop Services version of the client |**appv_client_setup_rds.exe** | + --- -   +2. Double-click the installation file, and click **Install**. Before the installation begins, the installer checks the computer for any missing [App-V 5.0 Prerequisites](app-v-50-prerequisites.md). -2. Double-click the installation file, and click **Install**. Before the installation begins, the installer checks the computer for any missing [App-V 5.0 Prerequisites](app-v-50-prerequisites.md). +3. Review and accept the Software License Terms, choose whether to use Microsoft Update and whether to participate in the Microsoft Customer Experience Improvement Program, and click **Install**. -3. Review and accept the Software License Terms, choose whether to use Microsoft Update and whether to participate in the Microsoft Customer Experience Improvement Program, and click **Install**. +4. On the **Setup completed successfully** page, click **Close**. -4. On the **Setup completed successfully** page, click **Close**. + The installation creates the following entries for the App-V client in **Programs**: - The installation creates the following entries for the App-V client in **Programs**: + - **.exe** - - **.exe** + - **.msi** - - **.msi** + - **language pack** + + >[!NOTE] + >After the installation, only the .exe file can be uninstalled. - - **language pack** - - **Note**   - After the installation, only the .exe file can be uninstalled. - -   **To install the App-V 5.0 client using a script** -1. Install all of the required prerequisite software on the target computers. See [What to do before you start](#bkmk-clt-install-prereqs). If you install the client by using an .msi file, the installation will fail if any prerequisites are missing. +1. Install all of the required prerequisite software on the target computers. See [What to do before you start](#bkmk-clt-install-prereqs). If you install the client by using an .msi file, the installation will fail if any prerequisites are missing. -2. To use a script to install the App-V 5.0 client, use the following parameters with **appv\_client\_setup.exe**. +2. To use a script to install the App-V 5.0 client, use the following parameters with **appv\_client\_setup.exe**. - **Note**   - The client Windows Installer (.msi) supports the same set of switches, except for the **/LOG** parameter. + >[!NOTE] + >The client Windows Installer (.msi) supports the same set of switches, except for the **/LOG** parameter. -   - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

/INSTALLDIR

Specifies the installation directory. Example usage: /INSTALLDIR=C:\Program Files\AppV Client

/CEIPOPTIN

Enables participation in the Customer Experience Improvement Program. Example usage: /CEIPOPTIN=[0|1]

/MUOPTIN

Enables Microsoft Update. Example usage: /MUOPTIN=[0|1]

/PACKAGEINSTALLATIONROOT

Specifies the directory in which to install all new applications and updates. Example usage: /PACKAGEINSTALLATIONROOT='C:\App-V Packages'

/PACKAGESOURCEROOT

Overrides the source location for downloading package content. Example usage: /PACKAGESOURCEROOT='http://packageStore'

/AUTOLOAD

Specifies how new packages will be loaded by App-V 5.0 on a specific computer. The following options are enabled: [1]; automatically load all packages [2]; or automatically load no packages [0].Example usage: /AUTOLOAD=[0|1|2]

/SHAREDCONTENTSTOREMODE

Specifies that streamed package contents will be not be saved to the local hard disk. Example usage: /SHAREDCONTENTSTOREMODE=[0|1]

/MIGRATIONMODE

Allows the App-V 5.0 client to modify the shortcuts and FTAs that are associated with the packages that are created with a previous version. Example usage: /MIGRATIONMODE=[0|1]

/ENABLEPACKAGESCRIPTS

Enables the scripts that are defined in the package manifest file or configuration files that should run. Example usage: /ENABLEPACKAGESCRIPTS=[0|1]

/ROAMINGREGISTRYEXCLUSIONS

Specifies the registry paths that will not roam with a user profile. Example usage: /ROAMINGREGISTRYEXCLUSIONS=software\classes;software\clients

/ROAMINGFILEEXCLUSIONS

Specifies the file paths relative to %userprofile% that do not roam with a user's profile. Example usage: /ROAMINGFILEEXCLUSIONS 'desktop;my pictures'

/S[1-5]PUBLISHINGSERVERNAME

Displays the name of the publishing server. Example usage: /S2PUBLISHINGSERVERNAME=MyPublishingServer

/S[1-5]PUBLISHINGSERVERURL

Displays the URL of the publishing server. Example usage: /S2PUBLISHINGSERVERURL=\\pubserver

/S[1-5]GLOBALREFRESHENABLED -

Enables a global publishing refresh. Example usage: /S2GLOBALREFRESHENABLED=[0|1]

/S[1-5]GLOBALREFRESHONLOGON

Initiates a global publishing refresh when a user logs on. Example usage: /S2LOGONREFRESH=[0|1]

/S[1-5]GLOBALREFRESHINTERVAL -

Specifies the publishing refresh interval, where 0 indicates do not periodically refresh. Example usage: /S2PERIODICREFRESHINTERVAL=[0-744]

/S[1-5]GLOBALREFRESHINTERVALUNIT

Specifies the interval unit (Hours[0], Days[1]). Example usage: /S2GLOBALREFRESHINTERVALUNIT=[0|1]

/S[1-5]USERREFRESHENABLED

Enables user publishing refresh. Example usage: /S2USERREFRESHENABLED=[0|1]

/S[1-5]USERREFRESHONLOGON

Initiates a user publishing refresh when a user logs on. Example usage: /S2LOGONREFRESH=[0|1]

/S[1-5]USERREFRESHINTERVAL -

Specifies the publishing refresh interval, where 0 indicates do not periodically refresh. Example usage: /S2PERIODICREFRESHINTERVAL=[0-744]

/S[1-5]USERREFRESHINTERVALUNIT

Specifies the interval unit (Hours[0], Days[1]). Example usage: /S2USERREFRESHINTERVALUNIT=[0|1]

/Log

Specifies a location where the log information is saved. The default location is %Temp%. Example usage: /log C:\logs\log.log

/q

Specifies an unattended installation.

/REPAIR

Repairs a previous client installation.

/NORESTART

Prevents the computer from rebooting after the client installation.

-

The parameter prevents the end-user computer from rebooting after each update is installed and lets you schedule the reboot at your convenience. For example, you can install App-V 5.0 SPX and then install Hotfix Package Y without rebooting after the Service Pack installation. After the installation, you must reboot before you start using App-V.

/UNINSTALL

Uninstalls the client.

/ACCEPTEULA

Accepts the license agreement. This is required for an unattended installation. Example usage: /ACCEPTEULA or /ACCEPTEULA=1.

/LAYOUT

Specifies the associated layout action. It also extracts the Windows Installer (.msi) and script files to a folder without installing App-V 5.0. No value is expected.

/LAYOUTDIR

Specifies the layout directory. Requires a string value. Example usage: /LAYOUTDIR=”C:\Application Virtualization Client”.

/?, /h, /help

Requests help about the previous installation parameters.

- -   + | | | + |---|---| + |/INSTALLDIR |Specifies the installation directory. Example usage:

**/INSTALLDIR=C:\Program Files\AppV Client** | + |/CEIPOPTIN |Enables participation in the Customer Experience Improvement Program. Example usage:

**/CEIPOPTIN=[0\|1\]** | + |/MUOPTIN |Enables Microsoft Update. Example usage:

**/MUOPTIN=[0\|1\]** | + |/PACKAGEINSTALLATIONROOT |Specifies the directory in which to install all new applications and updates. Example usage:

**/PACKAGEINSTALLATIONROOT='C:\App-V Packages'** | + |/PACKAGESOURCEROOT |Overrides the source location for downloading package content. Example usage:

**/PACKAGESOURCEROOT='http://packageStore'** | + |/AUTOLOAD |Specifies how new packages will be loaded by App-V 5.0 on a specific computer. The following options are enabled: [1]; automatically load all packages [2]; or automatically load no packages [0]. Example usage:

**/AUTOLOAD=[0\|1\|2\]** | + |/SHAREDCONTENTSTOREMODE |Specifies that streamed package contents will be not be saved to the local hard disk. Example usage:

**/SHAREDCONTENTSTOREMODE=[0\|1\]** | + |/MIGRATIONMODE |Allows the App-V 5.0 client to modify the shortcuts and FTAs that are associated with the packages that are created with a previous version. Example usage:

**/MIGRATIONMODE=[0\|1\]** | + |/ENABLEPACKAGESCRIPTS |Enables the scripts that are defined in the package manifest file or configuration files that should run. Example usage:

**/ENABLEPACKAGESCRIPTS=[0\|1\]** | + |/ROAMINGREGISTRYEXCLUSIONS |Specifies the registry paths that will not roam with a user profile. Example usage:

**/ROAMINGREGISTRYEXCLUSIONS=software\classes;software\clients** | + |/ROAMINGFILEEXCLUSIONS |Specifies the file paths relative to %userprofile% that do not roam with a user's profile. Example usage:

**/ROAMINGFILEEXCLUSIONS 'desktop;my pictures'** | + |/S[1-5]PUBLISHINGSERVERNAME |Displays the name of the publishing server. Example usage:

**/S2PUBLISHINGSERVERNAME=MyPublishingServer** | + |/S[1-5]PUBLISHINGSERVERURL |Displays the URL of the publishing server. Example usage:

**/S2PUBLISHINGSERVERURL=\\pubserver** | + |/S[1-5]GLOBALREFRESHENABLED|Enables a global publishing refresh. Example usage:

**/S2GLOBALREFRESHENABLED=[0\|1\]** | + |/S[1-5]GLOBALREFRESHONLOGON |Initiates a global publishing refresh when a user logs on. Example usage:

**/S2LOGONREFRESH=[0\|1\]** | + |/S[1-5]GLOBALREFRESHINTERVAL |Specifies the publishing refresh interval, where **0** indicates do not periodically refresh. Example usage: **/S2PERIODICREFRESHINTERVAL=[0-744]** | + |/S[1-5]GLOBALREFRESHINTERVALUNIT |Specifies the interval unit (Hours[0], Days[1]). Example usage:

**/S2GLOBALREFRESHINTERVALUNIT=[0\|1\]** | + |/S[1-5]USERREFRESHENABLED |Enables user publishing refresh. Example usage: **/S2USERREFRESHENABLED=[0\|1\]** | + |/S[1-5]USERREFRESHONLOGON |Initiates a user publishing refresh when a user logs on. Example usage:

**/S2LOGONREFRESH=[0\|1\]** | + |/S[1-5]USERREFRESHINTERVAL |Specifies the publishing refresh interval, where **0** indicates do not periodically refresh. Example usage: **/S2PERIODICREFRESHINTERVAL=[0-744]** | + |/S[1-5]USERREFRESHINTERVALUNIT |Specifies the interval unit (Hours[0], Days[1]). Example usage:

**/S2USERREFRESHINTERVALUNIT=[0\|1\]** | + |/Log |Specifies a location where the log information is saved. The default location is %Temp%. Example usage:

**/log C:\logs\log.log** | + |/q |Specifies an unattended installation. | + |/REPAIR |Repairs a previous client installation. | + |/NORESTART |Prevents the computer from rebooting after the client installation.

The parameter prevents the end-user computer from rebooting after each update is installed and lets you schedule the reboot at your convenience. For example, you can install App-V 5.0 SPX and then install Hotfix Package Y without rebooting after the Service Pack installation. After the installation, you must reboot before you start using App-V. | + |/UNINSTALL |Uninstalls the client. | + |/ACCEPTEULA |Accepts the license agreement. This is required for an unattended installation. Example usage:

**/ACCEPTEULA** or **/ACCEPTEULA=1**. | + |/LAYOUT |Specifies the associated layout action. It also extracts the Windows Installer (.msi) and script files to a folder without installing App-V 5.0. No value is expected. | + |/LAYOUTDIR |Specifies the layout directory. Requires a string value. Example usage:

**/LAYOUTDIR=”C:\Application Virtualization Client”**. | + |/?, /h, /help |Requests help about the previous installation parameters. | + --- **To install the App-V 5.0 client by using the Windows Installer (.msi) file** -1. Install the required prerequisites on the target computers. See [What to do before you start](#bkmk-clt-install-prereqs). If any prerequisites are not met, the installation will fail. +1. Install the required prerequisites on the target computers. See [What to do before you start](#bkmk-clt-install-prereqs). If any prerequisites are not met, the installation will fail. -2. Ensure that the target computers do not have any pending restarts before you install the client using the App-V 5.0 Windows Installer (.msi) files. The Windows Installer files do not flag a pending restart. +2. Ensure that the target computers do not have any pending restarts before you install the client using the App-V 5.0 Windows Installer (.msi) files. The Windows Installer files do not flag a pending restart. -3. Deploy one of the following Windows Installer files to the target computer. The file that you specify must match the configuration of the target computer. +3. Deploy one of the following Windows Installer files to the target computer. The file that you specify must match the configuration of the target computer. - - - - - - - - - - - - - - - - - - - - - - - - - -
Type of deploymentDeploy this file

Computer is running a 32-bit Microsoft Windows operating system

appv_client_MSI_x86.msi

Computer is running a 64-bit Microsoft Windows operating system

appv_client_MSI_x64.msi

You are deploying the App-V 5.0 Remote Desktop Services client

appv_client_rds_MSI_x64.msi

+ |Type of deployment |Deploy this file | + |---|---| + |Computer is running a 32-bit Microsoft Windows operating system |appv_client_MSI_x86.msi | + |Computer is running a 64-bit Microsoft Windows operating system |appv_client_MSI_x64.msi | + |You are deploying the App-V 5.0 Remote Desktop Services client |appv_client_rds_MSI_x64.msi | + --- +  +4. Using the information in the following table, select the appropriate language pack **.msi** to install, based on the desired language for the target computer. The **xxxx** in the table refers to the target locale of the language pack. -   + **What to know before you start:** -4. Using the information in the following table, select the appropriate language pack **.msi** to install, based on the desired language for the target computer. The **xxxx** in the table refers to the target locale of the language pack. + - The language packs are common to both the standard App-V 5.0 client and the Remote Desktop Services version of the App-V 5.0 client. - **What to know before you start:** + - If you install the App-V 5.0 client using the **.exe**, the installer will deploy only the language pack that matches the operating system running on the target computer. - - The language packs are common to both the standard App-V 5.0 client and the Remote Desktop Services version of the App-V 5.0 client. + - To deploy additional language packs on a target computer, use the procedure **To install the App-V 5.0 client by using Windows Installer (.msi) file**. - - If you install the App-V 5.0 client using the **.exe**, the installer will deploy only the language pack that matches the operating system running on the target computer. - - - To deploy additional language packs on a target computer, use the procedure **To install the App-V 5.0 client by using Windows Installer (.msi) file**. - - - - - - - - - - - - - - - - - - - - - - -
Type of deploymentDeploy this file

Computer is running a 32-bit Microsoft Windows operating system

appv_client_LP_xxxx_ x86.msi

Computer is running a 64-bit Microsoft Windows operating system

appv_client_LP_xxxx_ x64.msi

- -   - - **Got a suggestion for App-V**? Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). **Got an App-V issu**e? Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). + |Type of deployment |Deploy this file | + |---|---| + |Computer is running a 32-bit Microsoft Windows operating system |appv_client_LP_xxxx_ x86.msi | + |Computer is running a 64-bit Microsoft Windows operating system |appv_client_LP_xxxx_ x64.msi | + --- + + **Got a suggestion for App-V**? Add or vote on [suggestions](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).

**Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). ## Related topics @@ -362,12 +158,3 @@ Use the following procedure to install the Microsoft Application Virtualization [About Client Configuration Settings](about-client-configuration-settings.md) [How to Uninstall the App-V 5.0 Client](how-to-uninstall-the-app-v-50-client.md) - -  - -  - - - - - From 574ced082d417dcbcf423150fdecf28c58913523 Mon Sep 17 00:00:00 2001 From: Patti Short <35278231+shortpatti@users.noreply.github.com> Date: Mon, 5 Nov 2018 07:16:10 -0800 Subject: [PATCH 18/32] Update how-to-deploy-the-app-v-client-gb18030.md --- .../how-to-deploy-the-app-v-client-gb18030.md | 53 ++++++++++--------- 1 file changed, 27 insertions(+), 26 deletions(-) diff --git a/mdop/appv-v5/how-to-deploy-the-app-v-client-gb18030.md b/mdop/appv-v5/how-to-deploy-the-app-v-client-gb18030.md index 346ca3eb1a..56a42d55f0 100644 --- a/mdop/appv-v5/how-to-deploy-the-app-v-client-gb18030.md +++ b/mdop/appv-v5/how-to-deploy-the-app-v-client-gb18030.md @@ -1,6 +1,7 @@ --- title: How to Deploy the App-V Client description: How to Deploy the App-V Client +ms.author: pashort author: jamiejdt ms.assetid: 9c4e67ae-ddaf-4e23-8c16-72d029a74a27 ms.pagetype: mdop, appcompat, virtualization @@ -40,15 +41,15 @@ Use the following procedure to install the Microsoft Application Virtualization | | | |---|---| - |Client registry information |

  • By default, after you install the App-V 5.0 client, the client information is stored in the registry in the following registry key:

    HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\APPV\CLIENT

  • When you deploy a virtualized package to a computer that is running the App-V client, the associated package data is stored in the following location:

    C:\ProgramData\App-V

    However, you can reconfigure this location with the following registry key:

    HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\SOFTWARE\MICROSOFT\APPV\CLIENT\STREAMING\PACKAGEINSTALLATIONROOT

| - |Client log files |
  • For log file information that is associated with the App-V 5.0 Client, search in the following log:

    Event logs/Applications and Services Logs/Microsoft/AppV

  • In App-V 5.0 SP3, some logs have been consolidated and moved to the following location:

    Event logs/Applications and Services Logs/Microsoft/AppV/ServiceLog

    For a list of the moved logs, see [About App-V 5.0 SP3](about-app-v-50-sp3.md#bkmk-event-logs-moved).

  • Packages that are currently stored on computers that run the App-V 5.0 Client are saved to the following location:

    C:\ProgramData\App-V\<_package id_>\<_version id_>

| + |Client registry information |
  • By default, after you install the App-V 5.0 client, the client information is stored in the registry in the following registry key:

    HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\APPV\CLIENT

  • When you deploy a virtualized package to a computer that is running the App-V client, the associated package data is stored in the following location:

    C:\ProgramData\App-V

    However, you can reconfigure this location with the following registry key:

    HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\SOFTWARE\MICROSOFT\APPV\CLIENT\STREAMING\PACKAGEINSTALLATIONROOT

| + |Client log files |
  • For log file information that is associated with the App-V 5.0 Client, search in the following log:

    Event logs/Applications and Services Logs/Microsoft/AppV

  • In App-V 5.0 SP3, some logs have been consolidated and moved to the following location:

    Event logs/Applications and Services Logs/Microsoft/AppV/ServiceLog

    For a list of the moved logs, see [About App-V 5.0 SP3](about-app-v-50-sp3.md#bkmk-event-logs-moved).

  • Packages that are currently stored on computers that run the App-V 5.0 Client are saved to the following location:

    C:\ProgramData\App-V\<_package id_>\<_version id_>

| |Client installation troubleshooting information |See the error log in the **%temp%** folder. To review the log files, click **Start**, type **%temp%**, and then look for the **appv_ log**. | --- **To install the App-V 5.0 Client** -1. Copy the App-V 5.0 client installation file to the computer on which it will be installed.

Choose from the following client types: +1. Copy the App-V 5.0 client installation file to the computer on which it will be installed.

Choose from the following client types: |Client type |File to use | |---|---| @@ -85,35 +86,35 @@ Use the following procedure to install the Microsoft Application Virtualization | | | |---|---| - |/INSTALLDIR |Specifies the installation directory. Example usage:

**/INSTALLDIR=C:\Program Files\AppV Client** | - |/CEIPOPTIN |Enables participation in the Customer Experience Improvement Program. Example usage:

**/CEIPOPTIN=[0\|1\]** | - |/MUOPTIN |Enables Microsoft Update. Example usage:

**/MUOPTIN=[0\|1\]** | - |/PACKAGEINSTALLATIONROOT |Specifies the directory in which to install all new applications and updates. Example usage:

**/PACKAGEINSTALLATIONROOT='C:\App-V Packages'** | - |/PACKAGESOURCEROOT |Overrides the source location for downloading package content. Example usage:

**/PACKAGESOURCEROOT='http://packageStore'** | - |/AUTOLOAD |Specifies how new packages will be loaded by App-V 5.0 on a specific computer. The following options are enabled: [1]; automatically load all packages [2]; or automatically load no packages [0]. Example usage:

**/AUTOLOAD=[0\|1\|2\]** | - |/SHAREDCONTENTSTOREMODE |Specifies that streamed package contents will be not be saved to the local hard disk. Example usage:

**/SHAREDCONTENTSTOREMODE=[0\|1\]** | - |/MIGRATIONMODE |Allows the App-V 5.0 client to modify the shortcuts and FTAs that are associated with the packages that are created with a previous version. Example usage:

**/MIGRATIONMODE=[0\|1\]** | - |/ENABLEPACKAGESCRIPTS |Enables the scripts that are defined in the package manifest file or configuration files that should run. Example usage:

**/ENABLEPACKAGESCRIPTS=[0\|1\]** | - |/ROAMINGREGISTRYEXCLUSIONS |Specifies the registry paths that will not roam with a user profile. Example usage:

**/ROAMINGREGISTRYEXCLUSIONS=software\classes;software\clients** | - |/ROAMINGFILEEXCLUSIONS |Specifies the file paths relative to %userprofile% that do not roam with a user's profile. Example usage:

**/ROAMINGFILEEXCLUSIONS 'desktop;my pictures'** | - |/S[1-5]PUBLISHINGSERVERNAME |Displays the name of the publishing server. Example usage:

**/S2PUBLISHINGSERVERNAME=MyPublishingServer** | - |/S[1-5]PUBLISHINGSERVERURL |Displays the URL of the publishing server. Example usage:

**/S2PUBLISHINGSERVERURL=\\pubserver** | - |/S[1-5]GLOBALREFRESHENABLED|Enables a global publishing refresh. Example usage:

**/S2GLOBALREFRESHENABLED=[0\|1\]** | - |/S[1-5]GLOBALREFRESHONLOGON |Initiates a global publishing refresh when a user logs on. Example usage:

**/S2LOGONREFRESH=[0\|1\]** | + |/INSTALLDIR |Specifies the installation directory. Example usage:

**/INSTALLDIR=C:\Program Files\AppV Client** | + |/CEIPOPTIN |Enables participation in the Customer Experience Improvement Program. Example usage:

**/CEIPOPTIN=[0\|1\]** | + |/MUOPTIN |Enables Microsoft Update. Example usage:

**/MUOPTIN=[0\|1\]** | + |/PACKAGEINSTALLATIONROOT |Specifies the directory in which to install all new applications and updates. Example usage:

**/PACKAGEINSTALLATIONROOT='C:\App-V Packages'** | + |/PACKAGESOURCEROOT |Overrides the source location for downloading package content. Example usage:

**/PACKAGESOURCEROOT='http://packageStore'** | + |/AUTOLOAD |Specifies how new packages will be loaded by App-V 5.0 on a specific computer. The following options are enabled: [1]; automatically load all packages [2]; or automatically load no packages [0]. Example usage:

**/AUTOLOAD=[0\|1\|2\]** | + |/SHAREDCONTENTSTOREMODE |Specifies that streamed package contents will be not be saved to the local hard disk. Example usage:

**/SHAREDCONTENTSTOREMODE=[0\|1\]** | + |/MIGRATIONMODE |Allows the App-V 5.0 client to modify the shortcuts and FTAs that are associated with the packages that are created with a previous version. Example usage:

**/MIGRATIONMODE=[0\|1\]** | + |/ENABLEPACKAGESCRIPTS |Enables the scripts that are defined in the package manifest file or configuration files that should run. Example usage:

**/ENABLEPACKAGESCRIPTS=[0\|1\]** | + |/ROAMINGREGISTRYEXCLUSIONS |Specifies the registry paths that will not roam with a user profile. Example usage:

**/ROAMINGREGISTRYEXCLUSIONS=software\classes;software\clients** | + |/ROAMINGFILEEXCLUSIONS |Specifies the file paths relative to %userprofile% that do not roam with a user's profile. Example usage:

**/ROAMINGFILEEXCLUSIONS 'desktop;my pictures'** | + |/S[1-5]PUBLISHINGSERVERNAME |Displays the name of the publishing server. Example usage:

**/S2PUBLISHINGSERVERNAME=MyPublishingServer** | + |/S[1-5]PUBLISHINGSERVERURL |Displays the URL of the publishing server. Example usage:

**/S2PUBLISHINGSERVERURL=\\pubserver** | + |/S[1-5]GLOBALREFRESHENABLED|Enables a global publishing refresh. Example usage:

**/S2GLOBALREFRESHENABLED=[0\|1\]** | + |/S[1-5]GLOBALREFRESHONLOGON |Initiates a global publishing refresh when a user logs on. Example usage:

**/S2LOGONREFRESH=[0\|1\]** | |/S[1-5]GLOBALREFRESHINTERVAL |Specifies the publishing refresh interval, where **0** indicates do not periodically refresh. Example usage: **/S2PERIODICREFRESHINTERVAL=[0-744]** | - |/S[1-5]GLOBALREFRESHINTERVALUNIT |Specifies the interval unit (Hours[0], Days[1]). Example usage:

**/S2GLOBALREFRESHINTERVALUNIT=[0\|1\]** | + |/S[1-5]GLOBALREFRESHINTERVALUNIT |Specifies the interval unit (Hours[0], Days[1]). Example usage:

**/S2GLOBALREFRESHINTERVALUNIT=[0\|1\]** | |/S[1-5]USERREFRESHENABLED |Enables user publishing refresh. Example usage: **/S2USERREFRESHENABLED=[0\|1\]** | - |/S[1-5]USERREFRESHONLOGON |Initiates a user publishing refresh when a user logs on. Example usage:

**/S2LOGONREFRESH=[0\|1\]** | + |/S[1-5]USERREFRESHONLOGON |Initiates a user publishing refresh when a user logs on. Example usage:

**/S2LOGONREFRESH=[0\|1\]** | |/S[1-5]USERREFRESHINTERVAL |Specifies the publishing refresh interval, where **0** indicates do not periodically refresh. Example usage: **/S2PERIODICREFRESHINTERVAL=[0-744]** | - |/S[1-5]USERREFRESHINTERVALUNIT |Specifies the interval unit (Hours[0], Days[1]). Example usage:

**/S2USERREFRESHINTERVALUNIT=[0\|1\]** | - |/Log |Specifies a location where the log information is saved. The default location is %Temp%. Example usage:

**/log C:\logs\log.log** | + |/S[1-5]USERREFRESHINTERVALUNIT |Specifies the interval unit (Hours[0], Days[1]). Example usage:

**/S2USERREFRESHINTERVALUNIT=[0\|1\]** | + |/Log |Specifies a location where the log information is saved. The default location is %Temp%. Example usage:

**/log C:\logs\log.log** | |/q |Specifies an unattended installation. | |/REPAIR |Repairs a previous client installation. | - |/NORESTART |Prevents the computer from rebooting after the client installation.

The parameter prevents the end-user computer from rebooting after each update is installed and lets you schedule the reboot at your convenience. For example, you can install App-V 5.0 SPX and then install Hotfix Package Y without rebooting after the Service Pack installation. After the installation, you must reboot before you start using App-V. | + |/NORESTART |Prevents the computer from rebooting after the client installation.

The parameter prevents the end-user computer from rebooting after each update is installed and lets you schedule the reboot at your convenience. For example, you can install App-V 5.0 SPX and then install Hotfix Package Y without rebooting after the Service Pack installation. After the installation, you must reboot before you start using App-V. | |/UNINSTALL |Uninstalls the client. | - |/ACCEPTEULA |Accepts the license agreement. This is required for an unattended installation. Example usage:

**/ACCEPTEULA** or **/ACCEPTEULA=1**. | + |/ACCEPTEULA |Accepts the license agreement. This is required for an unattended installation. Example usage:

**/ACCEPTEULA** or **/ACCEPTEULA=1**. | |/LAYOUT |Specifies the associated layout action. It also extracts the Windows Installer (.msi) and script files to a folder without installing App-V 5.0. No value is expected. | - |/LAYOUTDIR |Specifies the layout directory. Requires a string value. Example usage:

**/LAYOUTDIR=”C:\Application Virtualization Client”**. | + |/LAYOUTDIR |Specifies the layout directory. Requires a string value. Example usage:

**/LAYOUTDIR=”C:\Application Virtualization Client”**. | |/?, /h, /help |Requests help about the previous installation parameters. | --- @@ -148,7 +149,7 @@ Use the following procedure to install the Microsoft Application Virtualization |Computer is running a 64-bit Microsoft Windows operating system |appv_client_LP_xxxx_ x64.msi | --- - **Got a suggestion for App-V**? Add or vote on [suggestions](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).

**Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). + **Got a suggestion for App-V**? Add or vote on [suggestions](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization).

**Got an App-V issue?** Use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv). ## Related topics From 5a0acc5fa90de2630db761428aef4342cbd8bdd8 Mon Sep 17 00:00:00 2001 From: Patti Short <35278231+shortpatti@users.noreply.github.com> Date: Mon, 5 Nov 2018 07:17:05 -0800 Subject: [PATCH 19/32] Update how-to-deploy-the-app-v-client-gb18030.md --- mdop/appv-v5/how-to-deploy-the-app-v-client-gb18030.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/mdop/appv-v5/how-to-deploy-the-app-v-client-gb18030.md b/mdop/appv-v5/how-to-deploy-the-app-v-client-gb18030.md index 56a42d55f0..143ee0777c 100644 --- a/mdop/appv-v5/how-to-deploy-the-app-v-client-gb18030.md +++ b/mdop/appv-v5/how-to-deploy-the-app-v-client-gb18030.md @@ -112,9 +112,9 @@ Use the following procedure to install the Microsoft Application Virtualization |/REPAIR |Repairs a previous client installation. | |/NORESTART |Prevents the computer from rebooting after the client installation.

The parameter prevents the end-user computer from rebooting after each update is installed and lets you schedule the reboot at your convenience. For example, you can install App-V 5.0 SPX and then install Hotfix Package Y without rebooting after the Service Pack installation. After the installation, you must reboot before you start using App-V. | |/UNINSTALL |Uninstalls the client. | - |/ACCEPTEULA |Accepts the license agreement. This is required for an unattended installation. Example usage:

**/ACCEPTEULA** or **/ACCEPTEULA=1**. | + |/ACCEPTEULA |Accepts the license agreement. This is required for an unattended installation. Example usage:

**/ACCEPTEULA** or **/ACCEPTEULA=1** | |/LAYOUT |Specifies the associated layout action. It also extracts the Windows Installer (.msi) and script files to a folder without installing App-V 5.0. No value is expected. | - |/LAYOUTDIR |Specifies the layout directory. Requires a string value. Example usage:

**/LAYOUTDIR=”C:\Application Virtualization Client”**. | + |/LAYOUTDIR |Specifies the layout directory. Requires a string value. Example usage:

**/LAYOUTDIR=”C:\Application Virtualization Client”** | |/?, /h, /help |Requests help about the previous installation parameters. | --- From a3300d5a3fa071bbbe8287655e7c4a1501bdbb4d Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Mon, 5 Nov 2018 17:48:23 +0000 Subject: [PATCH 20/32] Merged PR 12582: add new topic on space mapping for HoloLens --- devices/hololens/TOC.md | 1 + devices/hololens/change-history-hololens.md | 10 ++- devices/hololens/hololens-kiosk.md | 3 +- devices/hololens/hololens-spaces.md | 69 +++++++++++++++++++ .../wip-learning.md | 2 +- 5 files changed, 82 insertions(+), 3 deletions(-) create mode 100644 devices/hololens/hololens-spaces.md diff --git a/devices/hololens/TOC.md b/devices/hololens/TOC.md index bec5bec56b..5e6c740970 100644 --- a/devices/hololens/TOC.md +++ b/devices/hololens/TOC.md @@ -11,4 +11,5 @@ ## [Configure HoloLens using a provisioning package](hololens-provisioning.md) ## [Install apps on HoloLens](hololens-install-apps.md) ## [Enable Bitlocker device encryption for HoloLens](hololens-encryption.md) +## [How HoloLens stores data for spaces](hololens-spaces.md) ## [Change history for Microsoft HoloLens documentation](change-history-hololens.md) \ No newline at end of file diff --git a/devices/hololens/change-history-hololens.md b/devices/hololens/change-history-hololens.md index 0b9f30c11d..8f2862fc81 100644 --- a/devices/hololens/change-history-hololens.md +++ b/devices/hololens/change-history-hololens.md @@ -9,13 +9,20 @@ author: jdeckerms ms.author: jdecker ms.topic: article ms.localizationpriority: medium -ms.date: 10/23/2018 +ms.date: 11/05/2018 --- # Change history for Microsoft HoloLens documentation This topic lists new and updated topics in the [Microsoft HoloLens documentation](index.md). +## November 2018 + +New or changed topic | Description +--- | --- +[How HoloLens stores data for spaces](hololens-spaces.md) | New + + ## October 2018 New or changed topic | Description @@ -25,6 +32,7 @@ New or changed topic | Description [Microsoft Dynamics 365 Layout app](hololens-microsoft-dynamics-365-layout-app.md) | Removed, and redirected to [Overview of Dynamics 365 Layout](https://docs.microsoft.com/dynamics365/mixed-reality/layout/) [Insider preview for Microsoft HoloLens](hololens-insider.md) | Added instructions for opting out of Insider builds. + ## July 2018 New or changed topic | Description diff --git a/devices/hololens/hololens-kiosk.md b/devices/hololens/hololens-kiosk.md index 5e1218f90c..8f05c5e15c 100644 --- a/devices/hololens/hololens-kiosk.md +++ b/devices/hololens/hololens-kiosk.md @@ -145,7 +145,8 @@ Use the following snippet in your kiosk configuration XML to enable the **Guest* ![Screenshot of the MultiAppAssignedAccessSettings field in Windows Configuration Designer](images/multiappassignedaccesssettings.png) - +8. (**Optional**: If you want to apply the provisioning package after device initial setup and there is an admin user already available on the kiosk device, skip this step.) Create an admin user account in **Runtime settings** > **Accounts** > **Users**. Provide a **UserName** and **Password**, and select **UserGroup** as **Administrators**. With this account, you can view the provisioning status and logs if needed. +8. (**Optional**: If you already have a non-admin account on the kiosk device, skip this step.) Create a local standard user account in **Runtime settings** > **Accounts** > **Users**. Make sure the **UserName** is the same as the account that you specify in the configuration XML. Select **UserGroup** as **Standard Users**. 8. On the **File** menu, select **Save.** 9. On the **Export** menu, select **Provisioning package**. 10. Change **Owner** to **IT Admin**, which will set the precedence of this provisioning package higher than provisioning packages applied to this device from other sources, and then select **Next.** diff --git a/devices/hololens/hololens-spaces.md b/devices/hololens/hololens-spaces.md new file mode 100644 index 0000000000..19307fdfb6 --- /dev/null +++ b/devices/hololens/hololens-spaces.md @@ -0,0 +1,69 @@ +--- +title: How HoloLens stores data for spaces (HoloLens) +description: +ms.prod: hololens +ms.sitesec: library +author: jdeckerms +ms.author: jdecker +ms.topic: article +ms.localizationpriority: medium +ms.date: 11/05/2018 +--- + +# How HoloLens stores data for spaces + +In the Windows 10, version 1803 update for Microsoft HoloLens, the mapping data for [spaces](https://support.microsoft.com/help/13760/hololens-spaces-on-hololens) is stored in a local database. + +The map database is not exposed to a user of the device, even when plugged into a PC or when using the File Explorer app. When BitLocker is enabled, the stored map data is also encrypted with the entire volume. + +Holograms that are anchored within the same map section are considered to be “nearby” in the current space. + + +## Frequently asked questions + +**How can I remove map data and known spaces from the HoloLens?** + +There are two options for deleting map data in **Settings > System > Holograms**: + +- Select **Remove nearby holograms** to delete nearby holograms, clearing the map data and anchored holograms for the current space. A brand new map section would be created and stored in the database for that location while the device is used there. This option can be used to clear the map data for work without affecting any map data from home, for example. +- Select **Remove all holograms** to delete all holograms, clearing all locally stored map data and anchored holograms. No holograms will be rediscovered and any holograms need to be newly placed. + +>[!NOTE] +>When you remove nearby or all holograms, HoloLens immediately starts scanning and mapping the current space. + +**How does Wi-Fi data get used by HoloLens and where is the data stored?** + +As long as Wi-Fi is enabled, map data will be correlated with nearby Wi-Fi access points. There is no difference in behavior if a network is connected or just nearby. Network characteristics are not sent to Microsoft, and all Wi-Fi references are kept local on the HoloLens. + +Wi-Fi characteristics are stored locally to help correlate hologram locations and map sections stored within HoloLens’ database of known spaces. It’s inaccessible to users, and not sent to Microsoft via the cloud or via telemetry. + + + +**Does HoloLens need to be connected to the internet?** + +No, internet connectivity is not required. Observed Wi-Fi access points are obtained without being connected or authenticated. It does not change functionality if the access points are internet connected or intranet/local only. + + + + + +**Since HoloLens no longer requires you to select a space when Wi-Fi is disabled, how does it find the space automatically?** + +If Wi-Fi is disabled, the space search can still happen; HoloLens will need to search more of the map data within the spaces database, and finding holograms can take longer. + +HoloLens will sense and remember spaces even when Wi-Fi is disabled, by securely storing the sensor data when holograms are placed. Without the Wi-Fi info, the space and holograms may be slower to recognize at a later time, as the HoloLens needs to compare active scans to all hologram anchors and map sections stored on the device in order to locate the correct portion of the map. + +HoloLens will visually compare the current scanning data from the sensors to locally stored map sections in the entire spaces database. It will locate holograms faster if the Wi-Fi characteristics can be found, to narrow down the number of spaces to compare. + + + + +  + + + +## Related topics + +- [Environment considerations for HoloLens](https://docs.microsoft.com/windows/mixed-reality/environment-considerations-for-hololens) +- [Spatial mapping design](https://docs.microsoft.com/windows/mixed-reality/spatial-mapping-design) +- [HoloLens and holograms: FAQ](https://support.microsoft.com/help/13456/hololens-and-holograms-faq) diff --git a/windows/security/information-protection/windows-information-protection/wip-learning.md b/windows/security/information-protection/windows-information-protection/wip-learning.md index 0f59fcfe7b..8bb9b2c5d5 100644 --- a/windows/security/information-protection/windows-information-protection/wip-learning.md +++ b/windows/security/information-protection/windows-information-protection/wip-learning.md @@ -97,4 +97,4 @@ Here, you can copy the **WipAppid** and use it to adjust your WIP protection pol When working with WIP-enabled apps and WIP-unknown apps, it is recommended that you start with **Silent** or **Allow overrides** while verifying with a small group that you have the right apps on your allowed apps list. After you're done, you can change to your final enforcement policy, **Block**. For more information about WIP modes, see: [Protect enterprise data using WIP: WIP-modes](protect-enterprise-data-using-wip.md#bkmk-modes) >[!NOTE] ->Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Editing Windows IT professional documentation](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md). \ No newline at end of file +>Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Editing Windows IT professional documentation](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md). From 4b2b29c93e88d13419f7cf20882510b8d6a5d21c Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 5 Nov 2018 10:46:35 -0800 Subject: [PATCH 21/32] move asc to ga --- .../preview-windows-defender-advanced-threat-protection.md | 5 +---- 1 file changed, 1 insertion(+), 4 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md index 9a703bf22c..27650aecca 100644 --- a/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md @@ -11,7 +11,7 @@ ms.pagetype: security ms.author: macapara author: mjcaparas ms.localizationpriority: medium -ms.date: 09/03/2018 +ms.date: 11/05/2018 --- # Windows Defender ATP preview features @@ -43,9 +43,6 @@ The following features are included in the preview release: Windows Defender ATP applies correlation analytics and aggregates all related alerts and investigations into an incident. Doing so helps narrate a broader story of an attack, thus providing you with the right visuals (upgraded incident graph) and data representations to understand and deal with complex cross-entity threats to your organization's network. -- [Integration with Azure Security Center](configure-server-endpoints-windows-defender-advanced-threat-protection.md#integration-with-azure-security-center)
-Windows Defender ATP integrates with Azure Security Center to provide a comprehensive server protection solution. With this integration Azure Security Center can leverage the power of Windows Defender ATP to provide improved threat detection for Windows Servers. - - [Integration with Microsoft Cloud App Security](microsoft-cloud-app-security-integration.md)
Microsoft Cloud App Security leverages Windows Defender ATP endpoint signals to allow direct visibility into cloud application usage including the use of unsupported cloud services (shadow IT) from all Windows Defender ATP monitored machines. From f7484cd37a1c81a1ba03ede360fcab56834e74c4 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 5 Nov 2018 11:20:43 -0800 Subject: [PATCH 22/32] update images --- .../images/atp-action-center-with-info.png | Bin 48786 -> 49276 bytes .../images/atp-av-scan-action-center.png | Bin 21745 -> 22272 bytes 2 files changed, 0 insertions(+), 0 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-action-center-with-info.png b/windows/security/threat-protection/windows-defender-atp/images/atp-action-center-with-info.png index 5f0e1199b6c83c8f22534950100db413c810f4ed..afff6b70931208c5d1cb1349c792c67f47528097 100644 GIT binary patch literal 49276 zcmdqJ1yq!Ov^F||f=UTel7a!!-Jt?vPzEJ2bVzp(B1$TVfOIM#AT1pO0s_*~(%m54 z%(ut?J?Gx_ednBY?>Xmw>#pk}oOj-NNl04Bxnu`bog6P40*(V4D zjs*gNTX7x_w$y4~`VGG>*xuK4Kp==4u-|7Q*@bb{{qoI>IJdV+TWfb6ZDq8*9Yn3ryEw`$g<_85>(SdvjAWN5of> zHZj;r{CBIpu|9U!tB&SY#t6YZk_+(81?)RdZA=_p^zDriI<^?>?gW1iZth@csSmr_ zBT8$(g~I0Z*v;zt_SWXsrifbFIe*xO|Ig>0>Pf7wmO#>&dr+7Yqa_7M%+ z@UXi*Gk3H!MtoWO#ezUwMLdwb^UO7VWz^f2c0ix|Fi*QUBH zh{#ChD^Gn=-DMdWIdk?NJyZIpfDk-N*1%lz*nIl9gT_64FJc#;M(z(+)qD5&KNS>6 zcO**g?=*^~&5EueZMpfPZS^>m$1F-nCnQr6NFWjS&h-=6eV( z%VPgAx-K_{BVG=xl`~*pK10;gkdl&yz2W@|zeqKy|NCAJ9yYG+Dcv#CkJsk+2`R&7@hz6+O*~mD`H|Jj{!LwdkOY7iv`%u(#eP4ff1p9HtlvIa)zfdV(+RWBS3E3fC)TG;p+kpK0!^Kdl zV$4(Tt@H4%p~mjMdT3szZt>)&&WTL4n^AH09k}l=wivhW09!(^;2-s3jU}|8`x&voDOT>8eT3=(Q`SMX110#P# z!TN;$!G2Or|GQpg@3+!BYmu`!wV#&MZP!^CI9wTqs9YBO9l0_4=jcK`Z>`&roHS-^ zOmsMFpKcJiZtYlz4ohskk)O5arSn=Cnr~%0nkvVTtXCfiF}ORT&5y`PNk`kTLlejz zML6zrpxxV{x1EGRI!d6-x<$?8tVfw}hF|RE>%ig4ELs_H5NjTPdawsBJD#Q@96s(D zsMz=(L(QOyekIc>6^i{H&#SpC&Tz^>EO{hhjp@24QC39npXepE9$$)mZ0Whk$RkGg zT{i_CG#j_oO?BnOXlr?)z_F@nLnz{J_M|_);fV5Vaxx(!s;h z-$=QoFgo=@(q0?*t_$5Keq%ZIT(a1(sya9nJRTZn;Nid&p(XWbh<6-DrDjKi_r|=$ zO=-P`AV4ItP>uQ8z3cL(2ClZIl__h(&rdBnj;lf?|FH1gA3X}h*N0nehdf1!OKuZ8LN z-K_Ov-*{tmbCs%XQd)$ftn9ab%cssbh?=d{^C1!i zHVL-2vSXz-u3`h*SZ7_moJMN*LQmXbP)d9H4MNg6cCE4#8Cu@0Id6`Nxyr+y`bnx4%IAsrWp`3QBZF&II+c^yVx?Tz!b zJb|b1*f~Vd7ESd@jWFe|&r2C&j-``cS7*9C*eY+3s9Y(OJ1HqXRzKcuWTdu!U=JZB zN_B?3XfZc*rY%7$w=ggupg-2?r;^0Psg0|o*E#f&hiWTL?@Nj`&C6s>QmW(dJUTBaNc|1S}7@VfvT9F z`luV-Vs%s3>zoZ*@Xfop7sh(DhjZ$GehsZ}bl$-xtXbpE$66ht7B22n;Y={o<<8dWuu@!B&JYw5ceyiSR7W`Lj6e?h4Pf zs&vWhgNeVxV zxN#cDbU(Dox4ZkX5#N<^B|7dS>VuH*>I98+49ib)C*_Qu`!~bk=IqZ4jjI$4EDPp% z>~07s`Zi6sRO*O!-f=z(bf^0L`s)ojEkifr)m^17eVBU&ee6h@De zRF3NY;$3yFOp%m5A|fXKiH*ZQM<<&Ft{t-U4O?9U1E#FQUlZyl^DSFf_~Z~&JNZMF zA}(w3lhlVo>g4CJ!&5WlFuQj&3DaQSNG;D%Ea7ruqv%O&_-tc2oL(%3U32{bbYE|GTU+&)`;dWu^4T}+Ubm20M_Rh-}7+iT>ijYQhGRyoWo z$#ezY`vezmW@CfT!#H9o6gT;Z5%J>13m!>HB7~W>^*yl!-CvOo%sdPAXJ5uoUp&;8 z={EfEFzu(<-2T1@9kG0ez1(AnHv7Alj~)e2+STahSPpgiXqX83NP3jH8yMgqZ0Fiy z;%{5t47;zVr-!gE70=*2cfzB6Gdzsy<%~yeQK$I0gQ}L6g}c(Lbo2C8&d*P79bCJk z+$&F4N?pWAf`Fs*2nwD{-rnUfNz;WT#v(!L%LR7&K@JbWFXQV?Vb|m@1ve(MUL*^Y z?TCtww)xm@U5cx*|BHc|`ep0vt5Iui5zC0sb`y4UahS^rH+><*Sc7mBd+hzn9>SR` zznpxG8(5YTOSlKoI(faa{n3E|BR&0_b`$>UO;tj>LrxT z-~yiS!s=?fxwm4^%q7#Bv4_du=5K4XIjDTCZnxelq)t25V@;EMr2hu{$lJ42R4%Kr ze5U2;<`5C-GWNktuksU7y2;c_z4*l|&X;7`(sHtvoP72y(2Wn4ay5=Jc7AInz?R3_AGK~PV!uR9>`$OO6rEQs zN8k8{`Ox8)08w>ywQc3-jZW^%^ZL$o8#Ekgk`^ysDEKXaff8;Ny$8>geq@3S$w5#h9Oeg)#qy7D|$>95FYj^kGJZEpb(ok1duR~9Y z2nd|59JMa9z3TC$eSNQW_<4X;Vcr7n99p(fyYjC0(!+?nJoNCYZohaR?DsY_v~{yF zhxcqZ?X9`va&4|22bwEaTHF{m+oLv*PW~KtLh{@^_N_~y+l30Xh#%ZX* zerMO#Sb!#SkML7u*a=+#?TQJKNda4FXh00Bb$4~Wcd+>y=d{0Na%0YR(QZE+()u|< ziyIojmkWbOlR92dI`A7Z!{eAJDK9VY%f-bau-Q7%|2nGsuOPyI=d;V~UI@h=NLYle zzlVoYSRdA%xVyXa@bmlLzh3xxno-J=T0K|$4lIp{o|`Qn_Qc&buLB{YW$&e4fs%a| zzfVU>LrYuWjX6~XQswah8$-XW%H@!R!~souX%R@c_{)-z9znN+*dnFwLKz3^DO%9S)u*v2m_>s%|T^cU*w z0JGv}0$up z47IhjQSavD=K3{F^Y+S1bFc*XQ`LzO@X7P4s>apAHe+w;#htHG z22)6Idnv!%Z%i7Ml07@(HlGk36LSZk&-P4k=UGIV-L&7N*O!68!SjesN$1(06koD} z4iDWG6cn2G40cTwcDu6oTtb4JhlhApb~bz_&LKA|3wt)ioOJEh4qr!GTXI1GX{{xYzsFU%@$GfFed~WG(tmPma2O|GtRelRZ-l&$hs7SP1ccosn08 z?exr664TM%dQ^&{r*&_C|D5Dp_a}K?e*SB%6vmfHIU9qtiL$cTn8N}HRS#=b+gPLz z9w6Q`=GxR8q-(3|=)9};*h@`M$3x^hEvvBxy@GuK_vORNiO+*!`br{b5WQRLgPZQ; zy3?nArp-G)7`ZToE0Lhox(czF!g_J7YD)=GJ8Xm2*>qb{RaMo;oSqcY*>ODX6drTM z%|oAxy?m2+hE%E1o;fzjBMZYDzAj08d-s&vxa=8W`B<6Vr>~u&%&B+Pw)^QTomX)X zqDE!ZrQ@ih)IAEu5eUqW_3v4f6J=dogkjRaKw9jd(+zq@E6i0P)p}>UE6_VWN+!Yr zd)6kcZNKHfTNhLJEDOlx!X{M+;|fdT0zPJ?>aWhUg!_@Ocgqy(*W(Sz2#SjnDE9pM z^@uy>qus%#F`|~ldtU}otK%|SJma3372CsqQ_AQJ^;{g{2eLJ_RB78N&?${f-=Uz| z`jwggqbM%UOuE$KB^Vh$M%^i|lSvY9jol}~!IxgcmCe0o-|$tiWZz9lOvFQcev%n) zxIT_XhT!G@b2U`d0S9`iR0PqCQPzXNsO{Iss?*VLAB9OWAqj;| z_U;9eXx@2DUbXRqR>WhM!=NDgtBr*PJGop7tw8(Wsvz1-VG!f`oTr8H6=FW>BOAmSxGDEayM{TOYAsIDNkq?@s`aooZ{H)~K`*?Z$v?U*(5 z^DHNP5{CFn)QQ-0Ev@dMq4M85Oi(H@Bbq|!WlT+3FeBuUSi>U!V>UMjGbfA=M4l|E zZ*~>}(MlTT^mV+z5MSzek|fVr5?kgrH&_w-8x}9$#+JZtw$u^WZQuK)cLxp2P$!2k z27Ix5DU3MpEcN|MIxj%Ex<=P0V?ROJsIP*(E`n)AJK$mdjjGw|oSOuLS!~JgzN-~C zyiO~__j`q(WIKBf*FD-lc41Lp-EUpo8c%4b;I4j^mz0EusK-z}F{|wKb|EYAjrv%e zC~MJp7%39aG=1l0_!$I1ekiWWJC=8t6O?cfBi6z&mCUdB+(xt*ks&5*MY_hvlb)97 zN-%J1ka%4|T>5AEv-OT@H6G;lU}UOXc|tB$lWq>R%7@US!^31q`Pj9J+FS>i zI=xFMG}=sZd)PRy6~z_U9|RZm<1}2DuvKa~f3o4zPWH2F7H)_9POk8stwWTmb+6H* zze<-oUWo;2ufxMb9v+^n9#PL!&+#xSz!s?fpwK4prGv!7$QTMMC zF5}_h{S;G9jcXrKmkKG*^Q7~4vH9W9(iXdTF*h40sW> zy}c1B{>_uNdIko}8S%2rJ|Q8*2W2@q?T#Xkdjz09=ou?lVKrKKU@w*s9UqUGc-LrP zD?(Su6?XqDRCNrW(CG1R8JuxhS%BZb$?sAaQSH;>TukfCm6b$gZV_lNolNA~@Z5SkHn^*0R-M~Ih_O)U9q zkMf$mhh#hsojgM3QR!Yww70$<{bJ`k9>Q!Cj*Oj#Mk$u+?4_yy$+Y>bC+^x}D{)fu z#?Nit`*7Y~oOfh@XRAj8-nI{6SxS~JK~>(B`DhUE?6{ShG?RWSE{=Rwy0Kx` z+t=^DUD~Q!Ybz4plkPq`I=Zm9*rGYs z)pb>-@Vrao-L!we|8Sst1g%1#wTa8g>2X__x^7ZrwYB$eSNzkB1K}B=<(ln_5ScAI zL%VcIwP>A#b8|JDb`mEsVxA|*0&AHklI30|yQO>+tD;gq-ss($l&__x-t4Uvn8hT+ zo>la<0nBhDlAKV`KwPWO3OhNmgWNmZPm42~{S@7hXe9(uz>T`LSDu%9aZmbWE7i(z zZnM%psZ-2ye>ZfD?<)p=epp@~+pctL{YGDPeRyO2bVkW@72k$ZQmFfRaTXOd%vk|J z!Ma&{_+p|a*KkjPZ$w%wax$MSw ztNt9UD^1O|XnG!!tRoP|Gh5!Q1ER~qSGVrG{O#b0vs1F;S8jEPQSLmZ>Ab-&Qsq&k zy<1K%xIcilejkdx9oLftBrc*O1Lfl{b$DbyiavG16;k8$v_wmYT6}3u5*lOjz!WZ) zR%Yz(@$3YTBM{C4BR*T1NJO+vc-xB2tf#<<6eBwOqD}Q)oCK#4Dqa~gN$+QS0pWen z6gPwMw)P;>^;lLHHTHzWn6El|b9imBvo~d|B(d7UvGsWv0paF`d$rk%7awHa!psho zHF#Y8v_OMUDWhn{kjteD0A#x4^G7$hxGqsqn8o5nwMIIG-4UVtvAyj$MnEe|OUteF*Ss+$qKRv#}ar5TQuC6Yr=FV1m)x$ zjAuS(hNwr(4o$O)6<6&H@*(-9Hk@5&p zZe}R+lntP$>tD(Gz2eZbM}Bd4Y3EC6j{G6x8mGIpZ0V~YVqdl(oXSxye|kYh8NQf^ z`cNPoI~sB3@?^he#$Xz+oIiW%{8>aBk}#RX4n|rr<{x!c9 zgO?AP_Imh(dey9<%i9DGu9HEOvAG@DhaiziZW~Qzc&~S$)4MAeVo---czm2&rU-@7 zV-9=ou)9q~O-MpQ>vw;rVe1TsL{ut+teVqQx4Y+IBFW^CcT(NKz!EumXDBkQ*yT9n7!$=p^?l6yv>C5HK5vEK{F2r3qZ*fy^kJ%y zjrD=IGHEb%9^&zOL#h z`IId=T|HBaUyRoI;?L(I(INlJ6!Z%K|CX4@Kuk;4otgtn<_#h*vhMcvfA|6IQ366> z7#1<7r?mTX1as<`!C>;khP^+5Yy zlHECh`c~&6`AI?oSjRoNm@A6EF8u=!zwr18{)LN%8rR@=;s5(DE3G!A(|H9GG*{jK z0^qSVe0(^FFWK4k*Fq&;0h-S> zqQC-UYc}>@Mb3-AZn#$K#*5hDKvj+ff@5BLI*v|GKqThL{WdR(T>1z&K)dNByv0l81zg}YR(+n8sn z?L$cKx3{nAX;7U%J0n))@W;K{&ue=)*qb4g#Z+3cMNGT5JG~KIL#6hib@qAR^kq`b z2aWZ=OKWyGp#asXbUuSHD4^E$+>k4;L8BSRF{gWWaK}9-9v&Xu0|Wl962u5T@<7aw zX}hz&cL2P8EcTXQ5I)9zdH=e>AfP+eAm-8sX-_sE3DFT7y1UZ=It6MT^pE#Pfw#kR z03q5cfW%Q!QgXLF>e{9AwTq6-459V&TUYK*)z-e07Y@uaPx1N8kfQi}lJO70gso0l~HN zOycXw42$#~R&utocF+qp64pIgOx;B2{OTuPrm`Xsa*vI;+h%62$HvAY5GXXGP#kB5 ze|p!cdsf!>Rp)sQb@E1)Jy1P>zCc8i*wfR~+lxaou2*CwzbnBIwZs3(oaRa9v+k0X zj|w+usmx)sSb|@=d6xhYr0K-$p2dcl8KW`7P(U(({fq-;zjxsQ0}Jq_b;!luo($k+ z`m71x6#)T(2q&qjW2)gw5JJE8t4e&e8q8-h9qL5w^23UFaPFi#6xA!B@%G(20GFCl z*5>ASZt`O?3LyG^G&P;Mz3Uv9{N(4Ud!TIU=fu~Gi{`xp1GtD^i{Db_zhq|KvJv3} zZR+QmYVf^JelO1Fr_As&1tVfplOh(TIJ=CD$_#;YU|6socEMKFn9JeMdCdTH^ zQv@_~qy%9$%Tkg}fS`xYE>CK@xnGLqiAq5Y%R@^RzhqpWmy;vgGUadlaN0|HNXqAF zX@tYqtF~o27((&8&B%ew#g-Yzwj$cLUv#|33|xx_d5TfdYUt`A2ezLSO%$zde&qzk zp{LqAt7|*%M4?3#h+Z;bt10H|9YKxdG@a&UJa>T@H={Q%VHhMfXJ^d!k z9BloRkzx9H2UNBjJ9wE{LGV0Z$#~2{y63D^&xwY-cjaTeQii#Xs;V3;14{W$VhQkO zWGFs9zG5h8pe$j1*&%mFSQu$JSB%0(aIgjVd z=eWF#!*TWy6gntQLGs$(-o6^6@RJY6=cWFjho|Srx2DeJoz%?C2iAb#lFeiFnFa)wYv3yDLLa)ykoMhS1xrAD!Mv&d6Y4c}@O_v7=4i zQ*{2QkS&TjQAY`$8)%4Ot0`G*&s61rxCAbE#KhB6TdE%lQvjlcE)A2m&543Vt3C&! zt_L??9eGOi=s&x&Vp=pr=#cwNRq*w_$2OItiNdTN5)6JM#2ETiSmb8L$Rz5m1- zH0gFf?FmrlekUCX;!#_%4?(-LvR@k!t$#0$05$PCSzy&pzW`B;0v?RKXlv7tA3xXJ z=wYd@`Y4lf$9tmU9vNnSf(L$W5)gzJUP?CXY7~i$^P6rejPKTPjb1ONCJRNOg6gufLzB=1*sW zIEzOeL>v%bvtk)Nff^iYo2PeghTqzsT;Fi*>h2EXS9k$;TYVE$Ci}sH=z;>?m67tI z&sIA$G&D0*30M6Lcj^-nU1MV*vdsE}&bGEH#3`U4eC{!ap#7Oh;+3Zf>7Y*38fgaEdK`oSN#2o5!6^&)v17S&_Z3C(wm-DSXe0knS zw`>5*z@s-NvIE^AJuPiU~uRQ&d0J;|t-j|5|AE81)0=fZH3i2FR6amPa z+c+<6P+M`XOPLu8dsa3!!h}!FV{giYfcEyfNS2vN`cI=o%-y5l={O>vpp(WZU(IL- zu>=u^xwjmp8Vfy-ZiWXh(Kpw;zcVfa!iwp6jsgt@yvw}vmS$$nf6l!q9VR8jbHE8q zH^)x3GlCu+u>e&!cP|kW5^}J;4+^GA?fyb&0GG4q_}lUR5q1}2|h4nSu<#>;* zY-udT0RbLV1`zd~5?h2I3*-Y)S%o=0DueHh-lxj5C+v9tAVwzA(qT@S4ww)6WW~d) z9T(`|?BZWU4zczJw`>D(+XV6xkW}$T#8)#it}@#7%^3u4fgs95$mDmI2@?1$y)H+Z z?%`ya=lmzeA7obgCFst1cJcQmrKPQ+E+CS3DZzS)C9F!#K!Eg1mgM7OmMJ+c)`wV= zw3rg&hKvegwO{@az;tefONH|)XSOHN(bG4|Ts9*88B;=GjB%PSk3wP7Ek% zFBcaVjn|#7Ggn;sD(?DcVq|A|0J!j=j*gDLToV1$M}?J@9z*L%a^=8@iHV7cko=s& z@j*DRjkL@|4!`v;1m=73(TeYrwjG=r&F&477Y-yqB7Y%=c`x4mqK9M}CyfNzvjiR! z$Okt_>c~K>B($LX%zDxPHv8u;PS$4kkIT-Yva-Vb#J=Fa`)~EL{x@1<{~sOdzX~;} zMuchJeg8|b)GhDO^t)B-mUGd(`&f(yi%dq=i;mMnL+~opSKPjObs#3eA1pE}pT>2M zfk6>HGLJQ>(Ej5pVUJa|H-VBW%{3_;&WSkL87|Y#t=i$Ucywa7gV~-}2{BkTx&f?Y zN%1Kr>Y-|%stvBHDuL8^+D{akBkJ~5m2C&VfaaedhH>dsyyix21iP*jGyyFedbEya zB$4=o04wwBo(yF}OUthl_~te?+(4QFjd|v_HTx-TXcJ@!tYX=Jy5TzVhXesrM<1!! zlgt`4ax?N_3-^$%$XkFj*oAgy2Q=v0Yb-d5B|s0=^U@RJLw*YqPF4EL8p%p9_;=3p ze;fT55Sg#jUZeeJ$lKojN&on&Gi{Cb-s&*Ru%V;lH@)+hjbZtAba9DtKP;^>6L_)T z4LHEaW~UwG_4D8rLClTI91f`My1`2N5bmyKC&vb)0IZ<{0V(y*R516?9oTRGbPpX0 zip1;+EwMjXMZgV#xc!*?3Ib+acW>`m1ei`>vWiY7|6g(CxfGTAQgEi)hK92*53UY$ zcQch14X^Tz0CNVnswvGMo6ZEv@K0_zsQOd*$S*P_D8XU?q)%M?&Cb3>M+19%zV(8p zrY8N;VWQTDLr6xm1SOXAjEq@BaKGr)NLmVMJ($1N;ayOTRbwr50OKp8Hp5eWjDUFF z?{KLJFY>gsBy4YQ-?V%5h=4DK@Z~`=kCYTKqOkPQ*>_KN2OeD~6Rmz>0>^xeM3Nw| zhK6{=Z2(YXwnjH8gCj??Dc{{AIzxZ}?D8ZtLc)dA9UvMY(w7I5H@vttMd&)*lzt8& zp^Cn(sQAuYa>w}NUCV4nhIR(Bp1f9ud%XhfJjYp#ANuy116CU@IqqJHK@C=RbtMit zA2RKE%1oPVCPbl{ho(2K(!5IrA`mF%k4dArk&?Z+(l((@5Q)J`^j$XBes);16s5>{ z#Sx^+EA+O)bV$VYq7CK)-5pr)_W;g?hUOD=I#+Z{@Ag2cYb`{9uGOpeBNA;z?G`05 z!O>Gv&VZi!iSdLL%q*I-hbJgtsSg^#Csg|7@J+owKy>m^B~{hl-d<{)-%s9#g#4Tw znEln$;|p*MjQ6WTSSuH>Dz8#mMUf?GE8GCvz+P1^3KA%omj+jNKlsl9EZY9Q*a~yd zp7r-%Zj@%}^ZL7Ga8i98U_`c&0=QaOTf-X1SjoYZgIxuDq%NJOc7H0D-%OkUte~Qz zA~g*SU#}ct`LeGmtQ2+5+pZFRUJ?u>fF!?9@&GbYL|y|vZFBH&Uga;G><3Y1h;qvR zp#+0GFkurDdP<`LiZaY$tVhM70P{O#R8^q>)ogMUBa(Xzla~bO0zkMBibJPEvPYrs z-nHm=n+e1^jKSkCOw7vq$q3#BmURaOu!m;3cK(LRZsWS*D7MidzJ4|A{?*8bXAonk zqt(Jz3iN*CNCp&Yaztt7v3|hJQI6a@enEw#dvwFkH0mk%50I}8xq0+ZTq;mN3D7ix zZNr?~;MURdGIvQ|uq-o(K?@5Dtb-1?9NV7oRAd&q_dW*LGP#p)yu zg&w*vm1euDP9++#s8Vy?v$`$ybhd-Up>ouI9Pr~XUG(}1g_Aj$Z{~0KwNh=>(9_a} zOWFXI`t<1&RCMfzbdW0EvW*p~>F8K3B*45EMOIL8Y1bx7df4ygT|4 z`1mj_-)3B@yaQ@q%HS(C90aS};Fe64WQ57tI`jhskujR9d%=b8;o?%ybSnV3nS69f zgE|B>USchr+fa;mG@R7c-4Ttr4p`Cv>|WvF;c|QUbM+9R&*~ESyO(3`U*9ar(d>N3 zs`ZuK_&j@fORY)Kl@JPI{}l6B4tYk2p!T$$J$p`nuvEPQcT}9Y7K5n0(a_R+n_Lqq zAl>cn4@}x}EXhC2bfAp7yPdcgSRMtbr*( z5#KGwWsf>bAzBbiwLyoPq54!tFPn1Wb1ai=fB{l6qsN>^1d>EYyy&%7PRhgW4=ppP zeou?Ijk@-_0N!44w}X!!{~~kf09k-g{nPJNXDAabHz>K8FrU z81Q!W$aaQ~ugilUY&G+;K1ZPl5zW~YN=BBdx*$XK0S4jaJe|YhMbETxIlosSV zFiwPUUDWen>i}*mkCkGw7E48dd`Kku7|L_dM*?J-?LUaB9LATYoo-Ui zOY-pOEks^;a~Fawe5Yl=FkJc8QLsv^mlm1b+TkqLLUjB0*cg}pS*-0b0j?N^^M*|~ z86h5#kDif{te@qHMLk3S*Uw9(Zi}m{SeG4PSfHrt;TF&G89GQRmh;Y)unb;;PdMbi zs?+P%72{P_899`zssU%_Ukpid;wh5UY0An@7T6qkeCYKvOfr;%n($}g&U)!eN+Ue7 z8}!0)@IY*AY&x{%?8b)j)E}#($B}CyT$ zd^aIa`j8uW)JEL`M4**f%$;hg&F#2%cXt<9QiTAw#~EeV6p~U@!)lDahUI@)Ag(;G3x5? z_amTc8z}zvO>eZqNu$)7UdZZqglVO*{Ui>c7QIu`3Y&B0BVK!>*!R|Ij@BYcE{d)q z*DNw4_-rU!ZP$PZ;^^1YU?07#EaBs{oMm@v%Y+xlOLJD2StkA;kNm+JT3o_kPznCTH8}UT{OY%Yz2 z(2LJhaB7vb5fO8(fXT+n^(%Kq7m8r`0>1-^^l|=L+1Bvta4C1jSGeBt7;vt69qoGM zds!#=)=i9z9Besgm00p}AO~}ACv+qwdF)U6&zm^zG;4KCOpHJ>r(BW{5kZ>N8JcP( zLPG~v+tSmwHSNLQqFPE0=UdB^_9Upx#AS|5Bcm`oF=<^6&%fy2w0f+jHJ>e0GhaSa z!Z|O>>IiKK&xpg?)lk&W#tn-M@%ds%4!FRjWCA|B(uJ3EFYB`wv8XTm~9}S6#iHUESgmrrN#_Ley0x$6~ z_hrti-QS|$Jb7+m)Z!lrQxi@#1YRzCNg!f3b(X<>Az8cBw39(}T;+JU2)}jQ*|;Wm ztKZ_5+D5f%*cKRM%wZua0e=LK-EqUg8#i;U5xOMTRP)ab+EvA2$5?+BK}QkZ@KiF1^-|Q~ovXJ4<&(I8-`d zdTiXO&7UqF(5(mWC6CaqY`39{qa#OKLe}jQ2M)K6=cL2f=X0f+zWT@5CrNSJ$?xZ6 z&R@3rSi1VY@6>%Luam%BW?ge^z{xr0+*0wgH)C4qom=)_CJw+aT(!gQ{!P+jMuiBm z0y@m(0A_b}u*j68BswSiJxii14hRJ}hlK%5&;@x^k_fE>WIx3loWw8Ux)vb#G``Tis!CT+^Z0?K$X=bwElAf7E7CBp&S15hzW>+;_5YD~bMlNPTZ{@nG+xFM z7D4rs8oPY#H2rLk^+5_t)wHL7fv;F$30F169xG(^SM0F6<@1|%)LNH1^oV?Du>eimEcRoO4qPtS7r~naU*I5vig2a`;1xKx5m!rr zA{3n!p$mzhR8#DEuap4@<8gj2R8NH~PoP|Z8Uc8MavK?$`qWY?{nl0I)}5)UGZVn! zgBalFyaeq5qDnw&0QUu?238<*6sw*Q^~DYz8ENm~(NTfL0N0nSic}vfx$n;fXyo8> zz?O=rUEc#R#zYw$V?Ex}a}6U+7Kpe#X0M z@T`C~k6u`X$`-Jxgm*#C7Y}c5^rS?C^H6=Ob*Yv$i@RWynCbg~fCaS_k{90};+Ifd zu$cOebMm?hi*38GEh9JAhAc}8LvP`voKpYozbTqPnKW_B0X9ZNNVI8~d358J0hURf zUGTr-GZM^Q*jWmC-RDDi;G;`zuVV8*z}@8HDc%f6=($(EGZT28pJ8zeG!{aO*z_yz zdmrOcS%G;4VmL~o^KSi@G)trzb>Ck`{u+SA-RV^Yh{BKZDakjnj7shIg^#XPBi3=p zq2>yTrfg3{5Ta+$d3nkmd1M&y@-M!@YfY=JrUxwm4$o!Fst#4~gWYFdAkp6PVO7WonZQ3sZ zPMiB+WGfuVq1)NnxnY&TdJ#ew0$4ShhUs6t0Azs;AJ&3D(8mXjy34jzvhPsdI9#QW zyG3o(sFHE&>B>$H(|NW4{JZt>8wSp+zl*;dtfgfw#0&E7u_5o1$$U5*Mn>EvB>70D z0>ae$``0PGCK36z1+QunL1N*xyiDv*v_ndDX=eF=t;9=9ix$e0$!G&c-f=~A$I3&j z;j-dDRp2X#r`*>A6Z0k~Ckua4s0;4y?#_)MIpU}HLcUe{7aO(1|+}CL|=VANh}9lhqfA|4f7CzhlS$-*%|~n(rT4i!7iY^70+U*IcTq z8{k=1b8D)*99>3uIw^Z^riKf z|Fvh|hzi_mZwY64#5Lcij?@_of(77iBR7xhW(!M!+m^{lnH_Fc*3|#%=dS>GVmVww z1oTCj>jraHRu-sY#0bAj*XW?{0$LKxEG=cPlidNOac#8Hn3}A$5H}Qr<^zi8-$ zs#$!@$_j^xscAQm3?OQ@b#%$w2qdLojVdz7%Y)e-(n3C~e#(FWA*LgQiE1>~^m`>y+ z3=mLa2cp**f(_|JY;S+;?&&Eqn13W|G5l{i`nM+W5M!QOisiZRJUsT+VP%g>yIPDJlH{>HL947Yu*j-lbTmv4}N3}RAQ%eFei z&me5jC(bSNnd;C1adNcRYTr;GD>?2uO;mMyxQw8zv6U5}XbrSBhBHO3({=}YK_o#d z1T7#g#8vMF1c7vKLufU~*(;-!>ZmmVAtB0yb;>|l9_XC_OHdD^m#l2C>IMPfHl(XJ z8XSHW1G$r-rwgH!sy{$nuUVK54#oo_{ulv&IYrLJrIgMOOFQ{~G?@PJE|}Q3^$uYp zSy))K;mveL@VA#t$jKbuB3nmeP(w|ZlN3!m6B}n+qk=p9uQ9W!%6arFB}$l6GhdQ? zMk{3bUh)|{ZE#3%S8snXzY@ib#6uka@s~cU7w=oBk(D*K{T4bay^Vtp48BY5jo|9( zpC{9xHlbL4ctffyisp~3xORo3`GeU@IZjjf)bEFfi8%<3p|z4@5$6kbtP({}F0qq# zKT-W=s@R5qxmu(4_)-!z14KtdB)hu(T77y3rfV2tVs~v+tN*Ni^~!|K~K-{|47pF~tnDahv~sq3#>-^K%xP1ViVC z(v(?npHAABPwco8SZ8Fhfiq$xV{msC8vB4Ph0b%$Rvl=#+1PQrtc51S-*A-x<0b+D zb{-Yh>jR);fj*99)B)7-a)Ln!>=if&FwO&(a`@RF+%$b|IfWY+k=o7b?%_eOwhpfH zBjfdJMo~IJcbf(Th`=teX@^8ILYsz`nzQ7ayPYyM?hDIP_T}~^r9+lr#lPkFLN=QX zjvVS2`fxRBviOmP> zJou1IpMysT`by>C8vjDl(n)o7kg!^3f8H8c-=huT9Qy(^Fnjj9AbNCmHUTs#fQL#d zi3C!9`s_?Li^{%Rvq|Z&L&t^N9pyleVh!j{xw7n>F$!RAY}pgfp`YUa`s>a+vtqyv zfMTKb)H@IwZ^3q@!GVVWOFLgx3ydiEZ0&!785HRC_o2hTe=GRHm4PiI9qkEx-!b%c z1EtR^DtZAC@W1%{(VvkDe|=I>Cv}gpW?X9LN}Yb4ZNEU3>~-f(^-hCMUvQn(xdAmT zC@3hm%n@SVFD`FHF=?w&Q(7p^4}t|eLinQu+FVg|%uiG)aB*=#{{?&ZdH;I*^PDvA z<_K?`!#M*YW{M9}+Rr!!IQj zQc)p>*h(q**EWHNk2BvNqKJ{ioq1Qc&AtyxnTCkxd?`IzgFcY37t_kxI2p1 z+ox+LXD31Z><+53L+%<<7DxZ?Icpmnicr3(@qKGAzl=$hG?u8_)q41fLSNZJiZ87|xV!BPG zlK2Z-XA6m5(3t>f{Ap1Y1*xzq{Jjnkvj_O!eu4D=rmti96DsFwp*X89j9;Qk!-;;9dHo1l?!#JVoqJg-rD&oq_}3#|_&hJrh*%G{aQtM6hM5D7j;)L* zw}wx_@drJ6h?ntsPqVV_J|^ej=8h{Fb+4Bc7RCn=6dYoAQ?7>kKFNFyJu4pJmR|$F z*k)*M{y+&zg>)+chNv7iP6O$gEjRcZ6FsOabaW9uRZjGKYop7qnD-8J3%Gbt9YLwc z#{)B5T*)-}>vQoK20NFcC{3m?)nNg_ zhc<;NWh~cB$ReF9byKa$t{B@T(iXK~t%I2L9ruEYirAPL-2A*E1)R`Q_6soY_(Y(*gh z+B?ogwf3obOwoll8aUk$WeU4r3wQNUry^IFko?^ZkxKvM-Be|@$cJe;KhLYQ-cw_v zc$%p!aT}yE>>q1j+gbfAy-KF3u2*R}mU~a;o{*3bkAQ%Yc+Su~UN0MG>c|UDU!3<8 zOv#kJCPkW}Nvs5=&+#QaDh>q}K<^yYi7S{<=ZaFi^OTjmP_d;_n+u+~+xNV@JVRUC zE&=5NjRxqV=s68oN!a<`JwA?fk+*X3G5LmU=2a5Cm!Q6X5MVUs~qJ;{mASM(P z5Jg2rB}tA3Oh~dta*`w&L5f_UVgLnBOa>&5ETtyI-tfB3$A_St)%=YPIU&db!;WdGroxhxPOgbpU&_ikEn~0>wyKXx7!sUDx zIO)=a;mp4)_Xy#?RDE}p#=$$5kkDmWACc_$Qr@sWDPWwyryonrKV9Q<`}|V^-Otx^X_i7v6TB2rey_jt}Yo% z5E3c-Sdc&C)?q2a?oUGv0Y4 zWR%+O64frIYLuui|Jv5=RHq%UIMw*rJGH0}fcmwOE(K1-uI1u}-1ojku-F+t42q5% zr`6-`smu}YcP-#@Fr(kT@2Dl2p^by8@do{zk1HxpgSRoy)Fov5)uzaWpLBf|WZ)Uq^u|BW4j}4_;Z^~GuUUJ_Y&1$sQNmrc4ofH_p zR^*0uhrNk%7O!*Oi_tVZ1y1Fr>7f=`kdM_~s1!NT<|-ro3(pZA_s8{?uMgfY97AIGbv!-7>`5wQoti1bze^sTX z!2W0j#@#s-&qZdN((G|b@d~fek+)ilw)|THOk7>bLmE5B!yl|yJ@zf)B|c8=9e|dK zWM>-{AS3jIHtMH8fAWW9x_{=#CesY;t_y_Nnt%5u$(L`F@N)R^{%GAbt_p>BjJR3b zW;QS1<=^}`)208H2lmzP|z0+CA19BE-T8Rr_t29}mK1(@QA`7KC{Z_mK%w{Xu zP~S~hSMV)&VChP*p`XZ#rQpBy#a`Bm+ODW2j|d8`BCzo)1pe}wEkJ9c+{g7M*pQ#$ z8A9RNxM%p#w?H*LS1DP{faTnGX)+pc2@kGnSiQL@Xh!^iER3}-HPKM3H5cVMD%5*y zsaY)9!J}UWB1mhnf+5W#WH4h9p&|`JON^^-<`1|S=8%jbiF5WaY#*S3NxovNKfS@K zICZq`ih+6oh2JWo&ACr<%i1*&4ShDtqx;hv1Eb5-es~yJN3?yqN;xOC)81WWjNGHu zj<}}PlH%f*7fUz#Xe*a`wzbGdJs=G$tMt+)8QY-6JDLO<`o)GsvW zT48QT{W{@TIDTfjY@=e5R$}Wg-CkOVqQ+<%P+{dYXgggd^#@7H==C}%B%-_4B)05U zJQ+2d>NA~~KkbX&S?oX`3ZY>x$HI&9*MF!?d-c(b%Is~kMtObau1w4J&8wAJ2pZ&S zv@=r`=(;2`ifd+Zc4jI{sG?X(iw&h*?31IJFU2~Cr+%i-$jT+@Vi9^Z)&0cOg<UJV zwY`vNNk_jqIKd_lu36(?^-||2B9E=DZR`x?qCm(atTdiA1EMa5XVZ0HWJK>vOIw>7 z>e!OwI@?-V$%HBGsCy9H}A1h1b`sq9`E{ z@bPp7s)U%>?VzBbQ2Vu$lar`$Y`uJ5k)!UvdER@8oe>92oP-n?UAnEulfQQ+v^3ip z>xLQY={*^^AX`sP);VH|jnNeZl#Y=Rlg44<&ef9rRO|@?UR<>w+D2Q5MOVUG^*(R2 zhk-$tpBx%lA@N{KTKadJqr@|BFIq)dMx4#!VP#US-Lb=%i`EqP!m67o-6y@LayH1q zfm*yJH8Ny6nWpk=e{zgk!RL45$F`LFY~JtGzmyg_aXJ!f5L$%;&O1=|p!$IeGDNu| z>tWzxR%kipQ1jN!(&yX#vcrsh^2Ul37l+j8sWT4-BKsCB&)#IysEvifqI7T)sySFt zJkKsdt-QgHd9P|S9ZRflas>*E?@!V@20_(@3l}Dcf?+h_>kKC?@qf&3Q zC~XIiwc{TrUuaq@D=W>Tlc;b!0}PT&bE`$SuV;ips#)Rizk*z7ex64~F%sC-xv zw}Z~o(a{mk&d$#ln7u=ccvNp`!PPcmwHL=q*QnDzyVv=1-8%W25LU|=-FSeKQ=4^$ zZ!-=C7M_!@Z=mxDz75`pyocr4r?ZYpNbvjRLI*nAJ~br<9H>t@uH^D4e^(M|yn-XP z9VcOV)_3`yY5KuqC!>9rJgP?T7dSYbC`Ot_u(DNtN1xMqqgj?Dq;^% z`Z7ziXnW5&_kD8SknwI%Xmn)csXPOTqMS(kt>N!o0~!lHkx{*s_m9UikgMlV(>K!~ zE_N+4a?~er@$%yFSkvUKc<}ybttQ?8B@Mx_NQEQcTnn&+s)kn%3|L$`PdO(i4BN_Z zY(T&4mVge+SEu`A>(9+E`gDdNluX7F6(8%#dw1`u#4McA?bo_r@useDer4D1E^td7 zbH8|**w}cA?~TLU=gL0Garfq>4}~1y3{+2Of@%~9IVlkG#8~I>;lpHO0?<^flXh)w zttbmR9e1(EOVbfX#?ItW4uKHmTA@jegPLKjs7_;rszJO#b1Pw2Wd+93;)d1LYuC~Q zr9?x`f^<`tmX>18ek65uYL8lF+e10aB&Ids?9rGJ#Mfb!CHQKlQ%y~+#_qEN68Rpo z7`CIl&ZA1O+*yTOfHKjzYPKKFd7QmPAh zi|`Z%yN5hBWVxo?H3FgP{7kuOJV%)phd6N8!&;FD*NJ&KPyj$WSdmLqwv`!xjc)6>M;Wmo8=q8RDs{-@_r9PuvCRgr5G67C~nka<5a z>yEXk`kHT8K$sL3VvSSs=VN71&<5$}Mks0Ky>|hfg+3!>Ma2VrYrD;w7G!oNv7S>Z zsQj$;F8rw$O&J^d#09+(me)P@wS$w+UkV?KT-v$*4l3dm2&i1<%E7@gutc~4{qp0- zkMoD}Q`&>lCp?Rsqltg9adC4ip~F|zA7A?twg=$U+ht$L6fQ2VQ^-PtmTmeJYb?iz zLNj=Z)of-%TC9bVg3y+)k!tHUGAv93V*Mfom%i;peFCS)<8%9< zL5BJasx_=?oD4Zm@7Id_$G{#NTU!lyx)XWRfnHhM z7mtl{Yj1;f;);bubUyY-p*76Rwz4rM9v(ZCDU*`4TglM3t&x|PN2Wq)Vrp?$kI=Ue z`U_q!rJ5A4t)u0?d&dkvrp!;Z9WI^*=wglr4GQbn_QhNXYie$O0M$&px`A$Kx>@R; zD5EpkdZ)AXDy~M80yTberWjI|i;LG{*>Iw{P7f{het_1sk%T~Ap+XW{+i>QASfPH~ zcGl+L8bwY)WsOP;Aqe3?I6S>05}G&?wly|3RwLQrD>QDzMeYKZb$Q*ZSrxm-nyb&P zmE`R%Uq+0rEG;|ZmbNh|yO`8W=FG{w7%jjVP~|lFLv?CqYB&4(Y%Av2QAvx%h$EM- zKK$djtoy~f$;*y;$9WF+isw}sp?fIHFQ_`?QM7JiT_ciDso7@r1-@)(juYCTs7N74 zM#=IxDB_}AnvvGIe#OH>_R{4d5?7dD5q}A*ae>RnN4g$Xe=7z63awq7dZ$>? znJGR02e6jhACOcl9?@uSvF-jF6ZhP}$I(md8>43i(d5ziLJx2lu4z_KSNry(zR^7T zaES8J<9XLgvyQI3d*CST`v+&4pqyS$7X4NM=RAW+*Oxw*YLogJeS`09{N&sdT9kQU z(Q!8Or^=4R#6&62tol64;tP9nJvTeKU6QhBsoQA#^y%DOW+S2qFZU_EZA`sFsc(ql z*)^!7G^Nt9EE*@0=rr+tCagP~0;-8~7ugsT{0lkSR7KjV9E!c?sB>PIPD2pdL2tUx zgd!1O^)^BCq+i=Q8~>D)zdC3p^11iu zs^B{(bLYpaf~s=G|13mg_x$WGZFqQ{kI%VyaYI`QJn}3YFD(;XBU(Fn@x9-t-2!)z z&#(-@Q{zxPGW+4TumWx5n4EiB;A68Yy)fBm28vl58Bey)IBVzxwy5u%)s%XLhiZx? zSATXR60a!xS9msh!=rX(*%V6u=iprx$Ov^Es+6)X*-&s%Ff2Xe&6j$~zVc7+%n-!F z?dj$D`}fzfE(vb=`ynCQP6ea~0#&z^lw{lr2?-%9dv4@a=w@S!%(_1GIp&@5*!o>^ z?l;_eJ(v>{!}L;Q+1J}YyhlB`OdYYRi(sj(m0tM9Q6kJJ9HML?tDn`}U*`ED`I+jD z1ajLatCH8-uf;aky8kxW!67K-!x=N$*x2M+b{$RTm$o#nq^RUp>+d%fqnBJ{WrgJe zGp{x(YzREkoUbIe0Ua{c7jm6`SVG_3e8R$V>C)Oe!C&ho-;t}<$uEZ04wy&tes^}K z9u?tSuu5KIMOyxTe&PE8`)8}}-TUfV;G`*M()4#!Jihj9Nr^m+9kYE^zUrz(@>tQ> z^2@(|?+z=QEm%_c2Bc*9SGB*R+S&5pV!pmHV*RgLfb3=U)#TBB z8+}T2v{gZ89z<`A*)QYcTyYg?^Rz(F)G3@uPbzE;&CGD1<*x0KVJ#!yyY+$71|29s&p&MA_trb{{An5 z|Ibyt|EXHLBTQncIG`#r#BXfHV&CaL^jn+uJKERRscCUH-T%)eM9dujE54=v2VF(L zUC}>2;t^@Mp)LQ@iWZ7v9j`F`_x`Jkd7eke;WZJ?O_Xpkgfj>QxL33dlS1XGFUigA__RQ!Qi;Fd zE7pz)p{(oqDW@*Ck_-onE!t4-#cQ7Adwe|RuOU4q`sIw{LU#jx7>DlM^i*n3 zPF)vDQOKea65zYaB~rJeM6=$d+N^P8JMdkQ&Jq5;S$DbTk&#bRku#Lhd1U>aTk&FX z2iJpXZT5i)93{ia%a;Kafa}8tYRp9;c5yZW$qg*5*QW`pRZ$@j==h(WHVSJW zU4-N7s~8#@YR+3hs~pX+RYc}wSnX>A!N^#2ra+jD&GluHGzGwVfa#ww zj@Nu5`>}d(@`|P9nFj56&90qU__MV9e4M-8tFzHBzyYF(hDrrx%8{c-_k^oNv<=SE z2L1pM63~^yE13x2Cn|TN#k%46(KK6jmHYP?14r+bT_GG-hz?s8iq&0hSenms=OhD4 ztaP0u!AM;N<0H zCg23%eAYEKQW}I-@gl;3!sG@g+B3$87cZ2+g6WzjYYGr|B-=@_l=KPt?Y?~Z>ntrj zEp2xW!;Nkx0?}T~tiDMXDAQeTSF<+NytOzZS=s?vz^I$O<( zM^;55bb|J(^n~?+xh;wzaOj~OJ|kv=emLbRneAJ;DPA^M0qZn~@;>LaThn-6(KGmd z>ZP?!i^io;iTgEBAJrs9YQ$>}SH{*iHX_NXm66z%ewj~LOkqbS+o!RK31>>JKQm*w zXu-N*814Zi=&^YX$ApEOGI-K?T+J9@E2h?z;0DzE1zoT`z80>dY_Pn{r&bfyzzQ4o zYX9`hl?MbFCUeu^=Yb&@kgxTqJoyE8UE8{ z0`T@g+Y)?$NrohcIzKN@nN+ zXx{hl>7fkPJf@4^W{1juVP3Wo;`>LVbrY<>hB*%P{~Q($vq*@Pdelh&a89 z+N^k=GORAL!m+9flAaO^2@jBB3{ogbQ|F2{y+0nPUh-Z|oT7BOZ?~KRv z=U{E!e}+|^i3uuk{5Ebm@QSt)nlE7_v(T!rFxY3z?V^ac^{-~CT?q#KZy|5J;wgtw ze1JcRokhsS>jazT0d&{tb&94ycH*>gvGJdb?4ubIrIIgXUCx|VP*-AVw5b~j|EmW=@rPR`&_L5bE6ob55NSvZ8K%2ypt!2O6y?=ApW}as$ zOt$$cs|lzR2D}RDA@IuXH(vh3LHI&7#vr3C)*5W(35lf<2?_L+)FW4S3WdIr6R7cR zYro|b-rH*gDcHr(gYb1(1oTh08&|<7_r36&V23C3;ta*HAEGPgVvzTC_V(eS$U{Ai z0(`nkXZyBt9vZ|p13U#*l$4}H88(D#gAF`Z5&Sd~qUq>Ss5pPBIknH%ZE{;^TRf%o zUb}c=8{XxLk5BKjj~wl52y+NxRT+H!38#wT_)9aK(t9xNb8@~%Cqa%Qxt-H?=(529 ze}C5m>PF5&xGv~93WW!a@|7(d{hs~=>!H}3rXGv8rn34ewkoO<*cl%eHT7UD)tyuG<$ za>t9#_mFKO?xJ%}h%GDJTgqq zYfK7Q4?|?}%5}2@llU7I8ZH}U=BtqJJj;!)JBHn_AF#OR8H7&qDEe?iBX`(%em&vK zWTT>^muwK-BMrwzt!sI{lA_|`)TISb)vME@c5Et*caQeBF;fqcJQmd8L=dHwL^{VG z%=5v0%40a_?;p|G9z7;S`XffDe)3g~u7&O$&-nI%e(`nh79vp;d871>m7K>!xeIe| zu(pwhMb%;_3*V^&OHKxC7mMg08<sF~Y~XR-}vFEnT6*FDdzUL_nP$x!E3 z%cp-pRM%9mKq)P+IVp1YOd0kJw^p`Klf%%NN%Xh}O#UfZqL!G4>dD>ST{uy5m{=N; zyJzdkNuhLD@^SxJp?%Dhe zy&V&{z+|_|(KNPdj)60_63PbV(B6#?y^H?lw^0FofWnbqaFJ?Ww&%3!y2#Fm+dRyz zr;V6>AuwHJjQ7(!hlTHJKV|;FP7`apF^$x)>OC{B_l@M_qs{e^(|cCGay{jWC(9!x zz$xBTcW-|g%c{&Cr7ZpbjZR_i;l+~7x9ZwIYxM6%RRGJ)(mVc7cC+kxLA?IV_i5_c z{pP9;|I?d|gVZ@aNKz0Tn%|Om6>YpGvC&rrCt8~R6}zXT>_ZaM;3SHEsmY+gPY@fB;)MEeIC0_^TM=+AQgwZ`$+8t<_$+wXp3y^~IGdgIoZ_)w6Wd$3Q4 zeLWC0wtAvH6#pt}YF*^lRGH61VwRSca1?{527npJ;9HwPJ}ekf=}QonmhK$)S&yW8 zx`3g=RZoih3_bzgXqhOo{Yr!>Z_+Ma#s$aXsaPen=$ zrS4G*RYza{DfO80zAfkqPh^9IMRVvzS4DUKcy%$7Rsr$yg5gagkDU`&_3QiP=uu^R z)yZk|ym#>!Y4bs_hJD!p-aPnxc%6 zK*$hgh)y30SLtFZS5nhFvVCCQtY{qF#SNLme0#6Ha3~DO#N-3i4>ym$e@1k8woTHq z0Fm|v(K=_64sTjpy~T3Hxe#A#!<7gPJ{VFW2gs=uMv`erb6nHIyIG!>SWTCHwDmJZHeHn%L1}z320L z94={uHx5$Pi&k*d88QE@)MHvGvV)g5=V%`asrhBTLJ>? z%H&td!@L?W#oofJTxL``xZvVSOEu>nmI8(QM4e;5 zM$zvTp1%BZ-wiS6yt@9EheOuGay}&gu&UXqAo&k`^Jus+JTF-tF-k*I0Cg_0o8ygN zOKV-%ij*iJ{ks)+Ba>LMEyO#q<4mp`asP;;Viz~>IAAN>fuy>8>gwSOsrCK^xlxvk zkvlj!;|^CjI5?15RVL@Xdx|-f4pn%DB_-JO^kn9y1=yLR8-UOUnW)eK7QO>p21K0d zF#DugM^n~R@9lLD5~)Z~*xDTajr(s};W z6>&ZGwiQUiWG0s@7Hn}iJUZ2k^o($oZ+LztWM6d_=h!wo@F=N$Mg`UV@xGAfIQ#3| z#DBg9)`*jkq~6e*Im@~awk#}<&c**jG30U+Zl4LhIP0CTaoH32YxY*Y)0E9)IkNqM zVZo)Xi`!_2o_>73>b%G`t-ohc1$}2!Z6`MCJVUjw9K$yoHqNjb`al#?(!V}`-U2-T z7@i%DBE$)X)mB8W+FkXTXc(+3x|GReS7}=dl~hljqnz9J?c2MG4*P1!}UVAA$ql9X9!^kOCE zU1a51@{O442Pb0>ID8w=eL>F6U5n0XbI1KR9iay<#XnmZ6?!GnTgvHjR7fc22qRr< zMPJ?wj~~S+oGl}Jv$j> zwsABx)94pcldy*L!iq54iS&OeSrS1)zKbKoHd*5>o3=R+?&=lwhbL^eUxF=8)4l9NJ9mnOU^7m!xPx zZm=^&cGFt19uC*Zp?o7r`EV8Th_7h4*yz18(Z+`rq8-oHO5f=j{OR(^D(mZbYjtLB zR6%QlM|X;qSl5JJXRrf_t<>aN)u8a^?6zr>QLNK*(aZC^3tyNO-*GU)n3TaIEaSp-Y7M;0zq1Dyxj;ya4P}*%OE-86c?_E`YX-9_+HOi_fZq$-u^Bwx>KZb%~hYn(V z(KAYBR+c%JKLAqa87XeEVbzBZCz}BQH$dALOLBtrFt%1s2pYK2NpFRRfHJE`E*5DS z7vdfUIjBl;-%g%9ZN9(_zuTc}bX^qlSEVdP)aZ)~gNpYO5>~1j6R1#2mKT2wOhHev zFq2b4r=6&wSc?GqAkYWiN?_gnj~H|f0Z@ugrj?$~90cQ;~GPnhQKX?He#HhV0iL@|YMci>X5qXRYUYnQJ@yuSDQ)=igCA~G0s*RD!QY)79af!pg%uV1oV1d| zEh#%$nW(GOUy*wd>_W8Hoqea{v$Fm_|A8P8z+X|RLTG@n{6Y6%uQ)h37|C?~_)#xy z(4e-D53R8|5npYpx7yCI9pv42D%|(^W*@rf{km`8_>lGl8pssW>YXBZ!5h#Yy&^lFW;z_MVoD@#i;RrK(oCdP z;F6a9nx(6&XIh^J1y%J=bch!#V!96QF6TVD86Rsuq;ycrVcTDewG|8MgcQeMHj#H~ zc2?F#_EQBJ{CFN%I#QHcxk&MkwRYwW z=;!BTdfV>uuTt4kFIR|=&q)d zx=tx;7E&><`GGKMFReLx={7#$m}uX^4@ueeE;sbHTj3ZXJ%R=aI8b)jSTwvGdw=ab zOwfqTu6=N=0Gzr^L&7K{s79%DM3gnp_>bG=8KfkCX&r{0&fdNmh>%OISxhxF>~#F) zKxp_x>1^cZY`~kR%}QUc><^X|>4QKF?+HB$s*n|oUHaokY~75wjrJNBQ@z9y6M>Lh zeZTG@QRTHp9Lqj{@_3aVx*+;ei1L1D(R5EbN~CB^VGI#2p6)JGLy#baEN;ZfC0)J@ z^$4cKV8a{Yq$|eO-#OVcXq&U~1v%>Y=#QFF*S8u6U;PzNxBtaH@l7la7%9qqjN`;Z zghxq~a`djbe`NI;CD**3{xib6Xn@!oW_8i&032IPFF2vPZwsy>oiO}UNtReoW}CP_$19n864&Qb2Sp6}G|P)CX2 zLnuZNE_Y?VHBQ&W=U1L28ey-imV0v-^{Th#MzN5Ss5o5%vYn8Z+p7uIPWuY$5WXDtWep{THkrs7ir1 zvkKQ)y9AGz^N!5Au6ood_DbT#3G*MBzsU=8_0U92>KPAJGpPmV}@*}0%%F7W3OrlM1kTVWu#N% z1G}RewZj-DJ&R%k&lVt|bYa1}Iq5~ZN^@ZLNUL(esOzb>>3&hz;$dAnLmm3ZqSF;aUUKY2Q_Y$9L{gPD%FvT+lf9)S@YBCNVN_zb1SWub{xEQu*K5 z{|f~`{Pnlu^&hPCST^w&K2YD%m2%9R0s$CR&B9y^!%hTa2?Lw+LJL(aN8a4|0L$9d zK^I<`&ZELeZMWsB!x@-g^ENlpF-J*HAY>-#g@72P4S|@m>_;`Y6#2=0dZGZW&UWEC zy?=J!8Gp^x|1=6X4EH=aM){&zh60gaSq83;SfK*MS(QA4^w&;ch_luVLr$<#4>U3( zfZ$SR?ZI#r3~o^mJ*A&53)so!j*&93psbD~r3VB)=(r0il9B?)U$aDgLxTkATnrE2 zoXt!*Q6c(XRsUns7RG#d=w5z^f`iDpKfC| zY^OQ|2JWDmi{?>D62ihauwB!4v?iA%6nT^_3Axf+7xCC0@!LYwZLfWWS7WcklR1a3 zj8*=1XuW{-=#pRiFw8fD1FN?l33ofbLj)x~qpXtI%OIh@D=wrT;#95~l9}0REYHOK znb@}R^!WO1h}+QMa4&^wn77v$h-NIk+XXm z`Ot1Kc`!a$;(a}whmVkU1Vc1Bl{sQ;5y>Q*d~+>e1){pD$k;br+Kge7@DJ59aaOFf=8a&?)lyH>{@<&mlKcYyX1Q>bHEP1SS<_P(qlyRvD0aoOTXo(J_0 zFHvRC)T4*^&`%M>RM}=l=XsN>KGM?-uP3$U6x`Z&{d{vqFoZH4S!Rd)T)lT~+Whz< z{gz=?oI5ccRcOCLwV1sxS_?- z`G~2ZnbBc=$D+$UqEm0L$mSVLV>6(T8U}3aB@A;~d#6gquU={AJxpD4bmi6={Pjxc zDEVU{+vH%c`{GfZ;0u?GBS)KKqdT>xAxrzwSggw%$$cQ!EZL$U=;5~OvUe?9J?Y;p zu%0cJ)uymn!DCBEO*41ve~rSb|7#f=ttBby?b&gk*oh1_~l0xuVbU{sDwjbanM^)+2#kBP3PJh7EAdXX{!t0tStvW z#~9P~O-VroHt9=$NL^p%$TQPJfBJlv|EjgtLOaR7>iS)x#E{wB{=cJKRVl4sbgV5? z8&<>D(y_!$uLC>ou(<1N>wmhdEv%564sJQM(z3HJORj}m?3DEu?~w;zuXxXNUZo3} z_ErUF3%bd4%skINdZ}q2Z17saTE2ci98x>8WB_b`~p6BJ-bs&w~Hd#zYD#2es1%%8trN_vvKq&FfoxIY`V+OZl_; z%U&lRQ;S_kmyeCEPEW?8RWac=lc`4N>Wb~|%>23T&ZFAP_Oxc_#rj~!7SW7vbL5ng z&aAebv*RPm{r%@Y$C56)9Ke5|eJGHB^Xv`JU4P^k3YaIa3!O5=>v}*;e_9zad?sSu8ia z!&!PTa%Y)^39G%5+JC3d$+&Bd#=px^i!Gm*{#oYzF=fW1Wxh*`6(?p_M*G>NK{BnR z^dGfT84X+Z$NUu^Sx=98lD=Qn-#IB!urrDHwv7JvLR&&tLahEvO<8G!3Odd7KE$g5 zZ*1I%3*hzCq&|gyD~0OSl>(AfG`yQA+cV6ILn5Y7OZ7yga!XT1*Z z3>wpaME{;qUe+aAFkYah*%Y8;_pY&_VN6@wZrl1hBz+XhT{*<;jJ&)6G;*80)adW{ z`03Alc!y?*Q8X-SQ4hyaEMj0|1DbGU@=?>~BBk=H&_;88SOBMcR7h`{k$m}bl zz6G?>gWym@MP`gg9-?N3uF9r4#n&{NladjtPWQxAiV0mndwMEqYoCYWpHC0rHkuJP zq2!n#_X^G>^z@4zV3sb&roKzj$4)jG{v=<*@U1nQ&HX*l4^wFd*G->5`3@R*^UTiB z)ju!9YynR(;Ee1GdKKt_uZPO^yBrMtLoWGmOXnkE!@JUE`tl*yg5AV|OJm1?vox5Z zY74kzMoJPAoFmcjLSJt?2L~6~qNfUNjhMeaN^H9Dt{JTeXZ@N1XT#s;=|{cEsS2!> zTC~Cj)n@u}x4%14WF&--Q~3o2m8QTpFf|m5BnJBN)5`|i&1-;A=aDx|>`$QwD=a^- zcD?x)_V5qg-7ma(*584^$o$6VqhZ3hjA!rJO1V>M_h;3N06fsmEuZuW8MO$>X!>n0)ExY{zPclXwSFa1a8Ijh< zKq+RjwxBiPvI0kP%sQ`1?#!BBZ%Q)KOKL#L>IvTE^iaggIqxQr9nscBvxT=;-v0uD$m8(?9cQPJ;q{31Qb%b&R~0keXdVIuDGG9_t%}(aH!%V zPUacheRFVw?>>&Wja%SjHf-9>RL>Q?sg+1FeyI?s#79>5w~1(*7?cf6QqSova8nO{ zxRr{^B-W$+((@oTe%nXysGf%NoN*zN`axH=QqvUXcRZ-TjTYf^7t2kSEX|0C(T3ri zV3_SZ%X^qemW((wxR^0mNA<+LxpnJB{EgBStG zL^$!(*QBC)t1#V+taBz$)PO{@HiWBpyVWb_-#Pi(L3Ytcak&dQh!?~DJGdi1*&a8F5k1pv z?u*~Xt}&=o9{THTZQuNLZoFU0cWHrP1{&S#h8x?IUh&@m$lXL*T7=hC}|?##p8 zia95ByJlm_ybAN*x6*T$q};~1OQihs_d%U%YkT3PEt>tl7~RG|z|`s7rhJzR;yeco$I5jy2yO*sdbbRdBJBO+Rs}2)i58aY`|J0GyWziDdZlL7Q!0 z_LM-%RwX6b)@f!|`t&o1uau0~Qw{Pyf0}^ui*BrAsH4l$#4di5a{0LlIqZI??y+5g zu8W{@BJdi9K0}bS1`NsB6&v0My0iGSUg6aZ?k?+f#jqE=hmgJ9yjOD#kg z7*30M!5e$1WIMv%oxl)Ae6tfFB42CJf4DW7ZKh2;~u$Iej=fzkOE}K2=H>yO&4?TKMhW~j$(a;s_ynefwYrg{_)y@;)MaBU+%h2UvcsMkDM|>Fe}v2<&fsRl=Cpn zU+q|RIJGdNe`$pA@$0S2QiAv5dg&iqsc&8uRKAJvu{`AvCcs}iSQA_4y7iL-QCtUO zs`H0T_ls%@l`Le`X~^R`;+#WInPK1G=(}``@Wri!#zXjGYfS4(p~YD18Ct3sm@_=D zj3oRhuy~xjHT;N3vLRnbw{@H9CfZl*gatPDetJwpE*I%gSnjcCygY3zdg17!@TkbZHcGgGILCZqw4$$(*6Qag3boE-ACz zSL1y=nbiXtPKs>5s}A$`2hMNBx%LZYV8Hs^RI@r=B#Oq8(G1dj*%J~ZSj9$RoW*Tk zTi`&=@7iD4!8!Zz=OsxW=i5JZuYW6F*PPAVp>UM}D~ZB;$U%pG)c<*e%etrF`e3kJ zdwH&AdeY!FmCq9-@j??hz&2i z>Ih`zIm*S#w9z~=fUV{NE&a&~gqSI}M&ANsLYpze48C)Etm)nm|xq&N(CNPL7>jiN~X_sq(l2;pPU)xd0s4?dZy;WMZ16R^wRCqYd z5@ZqpGvx1R!aw^plphSAgfV6MY4xEebdyBVP|=yehD>A3nkqC5Fe*J(^nsA{CEYbR{KC*1t}XHKka zC~$IFkX10RLv9y%{?!CJ&R@?7Y}nS`PVG9h{Q)rd#56`tj52Dk^ffyz2e$;=9t!S4 z@-CQN0+xA<_t;B&q8tO$^?(clgSzs)TE#YC68aT#LO2|}l!DWn3-7aHPSnje2SuBv z=DnSFA!wz?flkJ^1F=EXo{=(>1*d3m(Q*N%IT zG&sI-k=p$#N3<;VWblP?wkzLEj(#KDzo%hPozr_fdx)^@&Motdrfq!hFD$LqFgmn_ zxTJB2=hwCL&?~`X(+?#Cbi^jw47P1*R#Xv}*(%q5Vf_A4FUF{#kV_k5vXbig*Cz)( zJ*YUlq$B?}ytDJ`MAehMLyN1{Si4!i^zf;B_)D(wSYp7sZR;7cb8^t?6bM(*EAyLK zB)YlDes=j)Yb5bBc=7svoQE2(Y>VkcGcWy)$pY9@iahQ!izv z6h+;jsjB*A!&jH_@(ogWVKKV!*P&Nw(e%d6Fc9^HcNzz!RwY+fo@spD2t_U|fr$x) zh9y3RSd_vv*YAYL#LNQ>j>~RQMMYyLPPar9ZLQtiBXcRm#l_!FcO(BG_*J^b!JpXt zUP^`}BZtbuWA&|??)UW`k5%|Fhv56qZL<-6z{q0q^7hH?-Q9Lkia@AH%WKPk-QHI5 zoqBXzQbY%Ns z7KvlwfgxdF=TQ|_4ccg4(z;X?k|K}7d4hWf7=5%HVWpYk_9W)K)!sNfHI)U9^;x|o z#*nNQ;oaO3C{HS-Pp3F~^r#j=L`*Cz#^}(HQL3K!^|+CubFvjv38Q2?30uaDc+HxG zT3~=g?{JkfcTSdysN@$G+R2AE)YaL^RF8~}^*RgjrRh)17ZTO}ZXU{zem--E1?VZ? zXVFu4CqNpe7)4Ken3%lxe1y?P!PIk7+^&Iaxo6h{U!Q!9@9iNFB0xPI_PxVVe8l=f z46}*X!(8dc(VKztLb2X6jje24j+$DTsmdEmXT0;zGA-m%L>`}u14D>bM4KB%@w8Q3fYZj|g?1oBff6 zk#YJ$7tY7TZ?Ke|G|9@(A6~nAl;S@9#xa!iT=MBh%@@t&=4Rv`Qv<= zuKmN8=Nl7yC3cbsV+X`ZTv^DWa~gm0;#4rolFeeEr3IqY!eX|rzw=BvCh35D>VqyE zGp?HVq?zZhZbv_Hj4Ndn9DA*;_+wqh_97L8j6_655xsMYi&J2P{No^rB#Zj`j(G1* z|u_8quFZ_=UXJH#{hM z#)UfhBouJi$}*f4+nLPC*=qXdmbPw@=Rn~q-0bmC6C6g8hA#2p%kYeE#SP)sg75ua z#md`SZpj}y3OR|Mkr7!C^S-M^&QIZ?XnU%I*0T83*U8ECo6E7*%7D!Ot3X}rSiGjd zhD$Tk(;i08(X~#&vrwg<06XsGu=A16mYMwv|54j&3pmR@!KShxf-BUN*=joEt~ z?=>_w>JzPeOW&)@M74eY{(XjpapWchTUa)za@N+?y1tJ8gST1lS+-Wyhs;fs5&v5H@T(0(vRtVZzYz1)j&TQ z`m}z9)pBcXmSk;X?^R7rbo8Bj5gB>i#Y5Zk8#ff4y;e_@Pr1*$vb}QUO4)%5C||AN z@Ay=Nj=z|sH#YI~||uU3yWnnJLXWlfB26NZ@htYLmF9M%>^8}`SW zei^PRd~A`^+V^br%m<891Gm}I*%^;-X1lie_n*=CP_*C#Nw*yi?r5|r~)>D z?5F~}keVzmm7@6&+XEJ&;R)2r+TXv^2FDF*Nn^L8YzFbPqCVxRzUYx(Kx8G{xHu_I zFAmz-gU(E2j-K)pvr8(D7y z!7vuX$S#G*dYPqjpTU8dQB?TfVt`+AW=4i-Pc_73074=4mg3UV@z|AY3zQ}ABbT#E z0fi#QOATm~EEXJ2hSb=!x3yW0D&n4X`1yn1JQPi5%_85D{0Y;xN!x&p#H@QE#-Kl7c3<{!JF1&49T=qRSOZNp^dVx+4C7sB*n z3nBGihomr`DZ32=jkT_sJFxTn8i|GnYH4XnByr^^TWjlU(SkanDr;(L?v|d5p_bL}F6B;CZc$!Rs^=I(so$IzCCez7{(T7UKQqVK+GPdtBhue#B>Vxuiz$mSniP zxp~cGV84z}PFDTvPzPpbY02%%xqBc;nLwAMdog+W7R)+rCH91se*7%ZnS8%dXFm zDEFjQ|IFAQZVmS;`SHBNs?XA@)yQ>L<4t?h8#o;0vs&9?NK&na4eoOPg1l^b+!RJf zucp%KU-T2wF4^o#>dCuaHJ*n<<@Nr36I^pvMh4&cKZrt08*;&7tf!~f0^Eir4BMFf zAz%J;oz=K|hpALIJAW%5AD`wT8`)ByOE??XpI!Cv(8ao0W0`qhqnCe%K;UILuXIAQ z!c_mItfs1AxZHPV>H4}lojx}=H(MZ$o&1Q;KT44ZR~beSW19>eQPPAH>Gl#ly|*^7qr)fuz@tmu3;4dgtVoGHKI~ z=6@l*-=eH}+}(fO-M;gTk|l(9T%LBTrlV? z329GlmYR7GPMrDU*!h^wP_{_8dOvWcTdjz|SFU;2UKFHr>% zrfnJ5q>||Pd@?mA<}{WV8wZD!Ki#Z&0`pw+1&eaMc8=l!iGTwlJ(yxUg$^}Up2|1E5_B(FW zklUq=5ow*mm>TcAW^;S0an4k~0CA1}LiCYj62bAe4iGS1KTe6&HLZUL( z5@hptZhB4|*qAz#K6@~H*Ve6ZonCFM&HX=iF-d=_>O_V9qaET$>lyI&AQI?I~@q-Aao=d&hxUKIdcX8c&g@bD$?Us)D`Cc295a^ zx1I^@HSVW@X1F@s!X=|IpSfai8*G~_B9mi5Sf71( zT#CD`u8uBbOAe@dA|@@Zd)csMxc);>jSV!n`ijR)YfPWdpTNCmQ7iFHTbnDO!W552 z7V7hwE^+qty4UNFB(<4dW)*`kNRqrzKRdHWl_qR*WILv4UIs{h-e4IR7>FSr^^euE zCo>aJ`0@N--Cb!^Q)#x1Q&C+ibhiU7V^?XZs6Z(o3Iy7b!2whT6#@t%0s_*I1QL^! zQc6`(g32T^L_y{u3Iu^9M5QQ7rYI01gd{35goK1KArpBg)qmf5>-E3aZ!MS0sN8k$ z&As1u&ffd%?Xo_!uMn;uDr;)D$mE`f!R9Mh-y^%D?xetuXv+8*r03Tp5cT}FG`SRB z*0K4dC_!mVzpx?P(Y<7J94HiDybnG`5tq}yj#b(p0qfg=G(tuhY^p3#H_Yre7MLU6 z|Iz}>_y?8}V^gxfcNlx?=R?4TAx{Huoh?%(=AGq^>igAIO`fI5Ah#4W)D1wd>!vZSmK z=aHI9k#Q(LU#)Y5U5L(JHuG`WTiAC=DuVYiniplkLYKA-uw? z4Yk@cP*2~)3xz6xNQh^YrDvOC zM&2L2$1wb=g`jGDEkAPa3q+H2`pmO&aRr2h#DC#zXg!>5XF;~t>?!%$O4SJI3O=#1 zl+k(ukIusUHaS`Tb2}Ffbp3)et+&v}fpEmsUOHA$U+JubAj|k%1EaON>5)NWaKse zEVItcIyfOQVC3a=hOIz&he7P}5=>aM>MSi8P2shHmd^9tHtl)su%OW|+!)Ud|Jjf7 z=(c?-gef#;gJt}tej#2L)W@0~Dohh#W*y0_7B~mYIC_Vumn!Y-sPo+7lx87{cR*!&JAsAi z(EhBh4`;4$8ne0(i1Ir>^~hrWHn99Fap~Dtw`l}#Lkdi-dFSgvASJqKLXwj93>LG| z_?;UoLufxj1W+cWC}+oCe{xGrf{XK%WP(oewo}R?!2iculFpf$nx;ts?up@#TrO1i zMMU=5gAWy+aS(}|5)K6$zc78H{UZ9^yC;xhaxI3)Nz1Hx9XEbPuk=NA!?H7~^~R9n zDFfJ{``>yg`G$@cuvVMW^LjF$6eozsHGSH09+ioHcmHAH_Hu;9@h^{UU)E3O}Sn6nsQwFCVF8jfH0W=L^^ zD4noGCrpB?5(ggVDZ1k!?aka1FL-s)a|c91;q&otAGsiroBRx(PIdkHtgCBEZJ?$S z_CFl)MMGZ@VUYrUo1JDSE8&3AQIZL^-q?ZF-y<8tkx_6Py2rW^7(vxe0JnL?LPm9^^NShAs?sS&y}Nv zZ5IOq5>_Y6Wz02j7umy)*QL#Q7~MSzNzhN-wiP{lJvBKAtL8o8sC{eW*gi3Qmm4;$ zZHWs#RCapyulfk_4;`}06eMzRCUYAMpDqQa!}Wt1>A+`d_3_?9WEHp|xIM56s@2U2 zppz~g`ueu5qeJB?hF<1r!CQE*u`5kYTkfA0RTvib!IScBMP^}#T$m6y`s8Jr{;_ZV zVh2lBS(z)K=^+lLxIj}m_%i4i>>HFU_@*ynn<&e8*^~WACP>&HWwgF(SW_rTfEFF5E#E!mt0B#%~f&8;u8wkNUVEt>y>wxZd zn9F4g1lH~z+cW+J31LskY5wY|x0#EF>iaoArW_)Xw6#1vIPR)=V)PH8v#-v~2T!L4 zsf!-v<=G*TsKMlHw{1|wR@n0s+vKJ1dAu5#4AVi@YX^i2YTR$LtiBm9jRsB+5Fy6z zk9J^r+0t{n#OC7uJ|dA(y}FdIlPgMJUEH4W4&p-q>Ka{I)}7v>w2Vx=sG~B- znjx~Hl+EFk0ezrZA;E%77GRgb@D0IxEfI)dzy4s$ERPCcTEr^Wjd7ba7U0yno4*KR zi&&ibm7VSC=kgW+#o%6^pG~BP_+580v*r#W6KtHE0%RL63n+wKVTe>J#V)KI#_RD^ zo+W3E%*+OX;{fG-4ZY#Tiz=_3S7A=$J_&zOvg5d_?nI82Vz7XKl0W;N7N}!Ruqvgb zr7nkiZNjSR!g$OEO5^njET9Y^Ye{S9@hVcBtC-khmcARdy^xUCyHYK31jK38cM;sK z=Vz=_8K=c<1<*0<+V~ZGj~sw%VRWZPX$L@`9+uENAKdu~-JQ7i$Tpc0o`f{@Fqg$} z!6La_79jwa^~%{KY%WHSqROAIbhVbvcc{6Vp~6xmMRI8?o|k~d`Z*cUy<3hqolom&e490`$vTCNl^|_#ctUSd(}nM-$nY(=ay2 z?E>1ksFHKcZHmA0SfEFgB9rPue z1Q03AO7JXny5NMK@*a}2kn;SjJ8!t)o@A=BCHE+|lR&1i8-Dh8<+ZtBRtDa`UJS-D zX<=8Iky^>Lrq3B8K0n($Q8>Rx1^W82oix8K>+n1-6FZ>=6YR7`blLn!JS&UP$jR{Y zZz^y~>bp;dq|AezSBJ~a=9$CUS4a1>NJige_Mr6R^K++1#v0?T>vI$^ae@BKdn&R@ zWr!uCZws;WvGTp=esXUcP{FjKNk^@tR2JHWlIl*mSaZ@SFgj)sG%)#Dtrj#@e2GIN zr#KI3DpySTl*w*zxxez9B?RxfcXqESC?0?izP{4-PqJP+U>i-vV@??HLuxlqKWlEZ z6{Db%@wpZ09@9y1L+kd>(Il}A3_r!RP?065eH2>NM;%55$wZI*mb+Wn4Kx+*sxytN zFW1|U$G*`!-0$gvT5JLA>`;4HseSvhEgp=LbZxH)+TZq&y#Q%l5KtQ%mHNAZ)~uRR z59J;_{$PO3E`b;sf__Sy(UvXuw?VmbyX_M245E1$@XVH3xa(jY0=J7sr&r&+xgsj} zO>)jv+o^|9gCir=RH~hO$&Q0~hO#8|1u&QAu|N<4NHJ^c2$3%u8c;ZAV*MjhPi`OG z84oZ5fUIB?P&rJzabv{6`K0j>*&Dp$YLYJh1_r-iM_oM)D-x&yko{QBPpb2?qt30+ zGXM}6Vp%@{Ni^3YmTaNH?l=T!C_r#o0zfc;!-+zv;y6P?5tcU7Q7(nzFwBeQAjiCB z9IO*?GLaoUgT)s(4HXBE(}&-uGt_xLLZgqIS`5&WfG*rmv*2J@R7j4Za(@5)M<{v$ z!-Ze)2kIW9yB8-if`}vP-utj39IWjc&j-YZqq*DEWgXErhyT;R}GrZ3}<1mEC+W+32ThUPiSolR0 zirPufZLTA7zGPyk{ueHsIbb3?NphTcLkZ5nJHPy={%C&L>J_ zHH+LbZiTChF={u!QMSOx1HJ}eH{5*7=?>!EnJ7OR07O3nypH6kWq@Qkbw%I`DnDY= zpijv}o{S#9gxyiA%38`I+3aue#n;5*#=4U|0S()in=q2z*e7}7U?FIMRK&$0 zzG_?6t#9zTV0?tF&S?`Bg&DNG{&>Be^S15dv#paJW&N$Hx}Xu=zDR-y=K>cJUn%AX zl^DmvJ69YCv<>XdKFBJJtZ^oU`Ia{S$fKlzP8Z|1CIn6Pv_J1V`U!w(0CoM3tdEY4 z4(mAjEx2r?siPq!@Ofb)Z={0=7u1j%^tjb@eETI*(zo~BG7C01YR>&hcmF^}fn9gX z$03}Kd!$+E&5ZgXh&G&S+{CczVPdBO=7-DNV{H`o^Ep<`_+R(fEJA|UuG3q;6Em*( zH%t7uqH(|Fo;jNDi7}26t{WT{stm1-?nYuTgK@}_NE(nwpc>C&ly7bz+a3zD)0(f- z`K1BV5efXJ*kX6ao5?J{z;`Lm3s36E^71?Qhlh79{@|@zfK0z=)Hbo_xze@6PmNRC zO?KdSZaiz1Q=ctgT#QzIW07@wr;R;povM*ajey2|f<=Bo^mZcQClW*q{b_DQEfE#q&0MwMSw@T>s0V6$)Er^L2?X9|qUI^0^R z0$_ChA9Kv(OVp}7)eZZ$tK5T}{hwk^;D=$OLQhvFq`{h}+fXJ@umYI&ITO`Q=$d`e zt+}FBylOg=WCLp<)Dci<3??564=;nNkqtCnG_wE$sP>EAukRd{x}YIi^z1A{&hIaC z(L@v+h%36{s4L63vCNtsV+tvfum@nI4fB?=gM&ycFfxwTxzP;7~ zQhp>F!Q=4?unxT%7IqBen8O2kMTq^emoD8jA6oOhYNU2e6tFg9<154uB1xDvh(8C= z=KjDpgQNbB^&@6gKCjzD&X_B#Ig2|#ejrGB)`XMkPKS@IL_9N$++3}h%V7@Gm}`oB z--H@!z{mUVfW`)=U)KYo{L6n2hOHV(|HQ|}P&{0STK+`G^6iBv%Mub(Zdvg$v~Sc? za*B^YygZT`eColn!jz%tt9O{2HSiDO1u%7Visrh3jUMO>F$RQZGMN+`Nu611ny+^4 zkh7NG-R(3c%%FtHq*fTvEqoxe__?!jDs)5j!XTw4|mTCCV}`-cyF69o}$U%t6#6!ROZoEU`@0u z9wJ$-kKa#N@~f8Km1@O%-F4E7m)s+!)jff#Co!#B8-{|sTvMp=@Kw$*TVKq`Di@yI znNwUwqm`GF;}@1P)~8SExhP7gyn2$ia$+*xQ@AL&TN$&YbxU`yjjh?7a9wRGeB(9! z74QpYI}H}|?c9~GyYUWlKLz!3i{JIV9pkyg>YJYByt-4jn8P7fvWS&$o=d`A*iXCf z_HoJZZ*{HOyx1(hTI}%tu~x=xrGy(DG1ADHQ|~v!$+C{{>bGa%I8&_)X@jmVlD`$H zMI`n8`S#=vvz&!lsDO#60+J+yAkiXc6eTK%h-46aiIS0mB4dF_ z20>DhGZq<&9D0}U_jgZEufJzj_cv>1TnN;yTlb!O&OUoT``OPXL__TkIVlq<0)ZgE zcUSQt0&&s?fgq|lLkvgibk7gLkF$<92?mg zpI?c8KnpS{4;SBbEJ#+Zesg+DNs+`-Ea34kJB);706&*Co#8$8DX*y$w}O%%EGwsx zjs2j`_*>?5bTdu#@7I>N+`qU5f1ek+*yt=;c;lY4YR{|1fi{5}`EjSO=lFdiPodw} zq+AF;wYWT3LQ-2JIk#xq{(^{v{+dw@+4k|C?!nff)Oji@s_x(W)mWRNn#Q-Kli_1E z@za}zQf_@PMu{onTz^ zRubb|p6DX9vlHMKTD!Bapv9LG92`775dg}@_8w>>HE;~kT&VZwuur{*~I-42%v_>$e9gANO=UZ313 z-&l^|#FwP-Kikhd+IsMY#pk=@7>&_&-$(eIw=6!y>W538zdRx5181 z^efafR#sR0 zvX0dgR;NUSZ2hL4GH})ITwD&=1bxS2g_Qd32sUCwl{;4;LubRZ#_vad`#kY-NB1y= zzas-i?y9RXwhUAr7gimr8?7k)ekxy|;<5b$d171$|D}8-ijqz?d^qa*rb0!*;j|J< zgg1KJm-1ld>1tOvMb%am!`fCt%toKbY*<9|exu{&i>E0CS&M5W$84j1D@?4ux!A8h zA;H1+=9liI)b}=?3+$}B^}SStaewZZBuSk`$C*MeQrRuI4mBieOSr*s^+Lo6#J2qA zg{s3@3&IV^aR-D|n~Y;*eN-Dt)F~H1_%EMZO@n3IWucJSm$5(o;VJX=GZ9I$PtAB@ z+0&XGM$3GI_gFUfEsr(>^k3?V=Lv)H_2%O0FOn!5PdT28Qi_=PQEz{+n9j!3Lf?_( zOVM=6NW9l)w&gP6ZsZn(>5|`F{d3RF=~pa6K9e?0Yw*m&N0Iozb-pY6oyYcUgu4eY zQBjS2U|Kmmm7l@&eA?Kp8xIe-v+TxMjzO8+yQs}a-N!oAUG)2f>gHdvJ8_*S5h(d} zDZ+K!7j{=J^z9BR%Qs*mT$nw}c%`T&h8N~mVNTcP{K`5Vk5i6Egfq6T)L*Fc-nKuC*?_%!=mFjx%gnL?U??6IuWDPB>Z zgQ&nlp zrC=jn=psGM^MyyNHptca2g=a?7k>g_z-IIVAFpSf;A8Cb|8>sRRPLj%Z_H{N0~>}< zz;f=fnBO`FVWIk+tBslZn0h_y*=QG^^rb5zM@}Zi!5V{o1){wg4t7>$k^Po?P_ub@Dk1=kxZ%J-`y^h~6 zAuxaKVdaZ!<`43hBD^WwMi0BIa32mgj=ib3W)--17{I_iKLPolTNub|L*uW>f*(nqcx1=YD~(N9lkT_-b<3n zyOU;t!XI%AG&P%kei8+XL2S5>O(zj!^1cI(Qs+xp8%+uJcCe$O64(b@r`Fbj1}xSV zjMUwF@wjnhs~x6;*MS22Fi*;HyzbjfYfN`vUm!SXUN42`c?Gv>$@dui{O;yolIvznr)q8g8 zq2(*C@g64_9rHTG9eqRlc^?PtEO>17L3oHPjXPap`ZVNPUm8a5a<$>4F=D*)c#Cc3 z#dJlyC%Jy~#nUk`U@G04MXXs_fs59Qr#nVpfnPXz*)Xu@sUlws#m|qPl}qv&Yxl2QiaVOkrPxpOex5BHVCuoF2h&Rd4t{m276)J{@)2<{kSLH0yMCm z6@B@xr?q=FH=Rd)Letn;BOcqOl$4ZYefc6X%n+iOgOabMq|G=Ys5W;acqA8%L zNXT6H0$OEJz>V$oR#atjx%x483$2TKX3t%&C>T8Q45~|`s2?Ym=e2wU&)YP0rQGmx z#7+DC5KjjErd*#YLx*~wuwAXa)T&{hX;iIm<#5xdUNd`b?IKUQXLo#<1uP8BmVMg{ zcPy8#giAy<8{68pb#>(A#8WIh-jGsMbpCSo)X6iiZ%MlR?hRdb`{mj9{rh(WV$Gce zzQhw$eOF)I;y~Qsrx&rM32QVi8Ju2+34?*_26oOV7#XD;tin7qval%n`PCZSVZ3

0`R!J!DOHK|WGqcEtp8o!rveB-tcP1BuFfT?&4H5l8kC$Apvrv#su1Vg$ zbLSi?VrQJrqH*f^Us3mZ&iD581SkYiaIi*PVkF~?Q~5}z0mBj$5sB*e-CK2<{y}vr z;3hg8yVP-gYq$wcn|{xHz2%L#2@_3WAOqMxm8?xaRkC0iNxZE`XzM*8(o&&qad ze<*h8whU|2>Z)VCPhNu)#2jso(Uscu=mK`?kX$Qc{nA3qGAy}M=@1qhsg^lI@)a|2 zgELalHtOzQy>cBe=5&D*#2a~l_0 zx>p`Eva*Wjmbk4Lf_;Tns%U8`aYZ%nvoEi#+>uV|ILEqIv3uw{u(VaYWes;+;uvzU zvbsAeAt;Eb9TRW}Yf|aGDMN91co=q(Ok1fAPD&5P zVR~i~WVL;3*(hL_s956fXZCnZ=&~rVpZ9OK6k&-<;}P!tu)h;}$Rh3h!*LNTVe6;X z&*aA3-ak*z{&J|U4&k~yd{#^Av1nnQo{o*Zz4)-bt*z+rXpvbE$Gqa_2VmRI&d!J* z#1aYZmOEV}{uLF{Z5jhU&9|{_9MMZM^(|YDQMO1c~X&D(gc&fb2u+CVz`uD>tyO(dO_ug47qb(7jM1V1a zMG<{E*y6WHPgVfmaNS3PMq9d2cgt3zb}Zu3op5&gu$vEP|Dq15q7)Ju2ZQ;*4d);mMl%r3>z2SV~)<7|YqjXYiV&bWHOHZsF93=S525pt* zd`=A3(UZP5cU84P2-Zy^y|{n z(y)FO=YLWIZEJvY%XYIfH0uc+p# zeKA!9t|+04@Ab*3Ug0-4PBv;}%4N-<0vMlNn|pqKBYiV!z483>M~|Ya)LAmSy1I<_ zbmo%%IRn>u4@+O&TDmGKCN@LP{Chj<`YWAat1rmDD}Bi`o5J~jOw!VM;@jz7cpNb! z9kP&`^%g#@FA?dO_*f$mVd3`@$G25p(m&NF&B>d`uHzabT78MnlkJIdTr+8#p zGZB-JkmEvDdA96O6z?v^^NIzj{q_%cu8#bI*j$OzLdb^OfjRwwo;~ z!+IWv3&1X2^YV?8q$oKIo->wO(tZ5+Dbv?hsf-z43IHWRYb)%B{5Od`}{&odq)RT;3viNxP^r)d(7b&45koVFbxSZ zXz0MVwkr3v4)^vOIre=H-q|6#{cOGmH8n@}WnQ`knk%lALQ+y!S{Y)#pI3DFJ9c9Z ziB^fQc6JtBdCnth)UvXTncLuqQ)!u^Bo0`wFae|Y+FowQ$x>rROp{=L#P(Sj8zaDl zXv9QDM!pwFbC>IN%&5`bHG`x}!yGBhT-+e*_=MsIoB|$-<;a@CpSfM_^JQ9P%0K@L}2|IVyYc3%Qm; z3?c+Xeqk6@SXemZLcm~YCncZ0CE(X@jD7GUnE#E*|0iDB+LgL}vSu zedt^XA=Jd)o+9$D`MrI4?;XKwhE>7w@k}zi(@_=qA$K6p(580+N z*_dsgUtTtB1mLQb|Jy|Mlo(ZordDICK&?UPYLrcpLtCZm(zpC4l^@aKgRbSCcwUtK zNT{sW)@ndN)_u;%Gqba^(>7PBL&n!j%&3qG_#j;X+EQc5$^;$XY|339i@Q<7vraoGw`s_!U(~cQO?GMQ! zLMLj6u`hiShKBSux3*e1THqI{h9Vc7_M3=^R+q-I@nMIq{jDX;!9kTlL0%rYlao`R zosEsn#F{%9zMC?Pbdq_00uwYN;rakISeP-dMdZJ>_B<bC7z&BY>}-1+AV zUMCwQj)u25ILAA#uQUt~v%r+5avN1~BkF#Ac}!lQP~Dy&LFDiK_DPjHRZdP?Q4!Un zM~~J^WA|Bs0O1|w4i2XO@|&BHFv|nw&p&%VlJVTMQo{E4_5xV=fpFScH9@P8J@4)9 zHHOI%6BC=CpGP1Rf~hFjVM$35>-bB7_Zr#W z`A{w_FMmu`t#Sb0$}l|F{rQfNgamgh9i)d>8$%Pxb8>h&BZJAb_Ug1+GUf1B5bqrF z9cm9z2HG$(u#8Xn`4oski&lD`(3fC)0Q^i&SB_Ay?{no+ikZf`j@9^NxVRtU`%jpU z4KzwPuMsB$fbvX`a0pD}Dc|V0ege^-|AcQ}694Skv#ybmtF2V~)Oc@PUfJqwg2T!3 zQ4#iU+2tw0#ZKyYBTLfi?AE5X>af<36b+oThi8EkvT*0p8 zjuYSBw{TSGE@8_$R~wb9@>eQw*9MiZs@*!@S74OFkl(-{T$DfH>gr05cy~X2eQN|J zlY1KgSTLJ*lF{iorXlgwIz{lXApP5$a3ZrQIz>=#$mHPu5qLY@H@2GE#Zeu zOVRwIO_{@3c;#}1O)2gs;Ru(#lO)TRCnSUvnAackiExY_wYAp7))dY6Si6#yaKL;L zr5tlD&-Eg~d1v{TUb=LNh4?ajqL_ywfcj6OE)c3rIPrgEm-&7`TG#XSS3Ys~)rE6o z3Ewko&X`@9|v) zF_rw=MSoT35(ZVFZYVaqEfqx0&1z$i&ZOJglVVo~|8V1yQDUJ_Ri;!0|2khuO5>CIk`2&d!>nY!OWpj*{>Y z8!cyoFawot1=bhhGg1o*C?OdMZklqe9D#HTiM_$jj)_PfTaj4QKb2eUwXNNIJAG>m zi#?ap33!15zK@QMrp<)7{@U=Yh7Z9<&kzS>aL^z+5~VIhTz0Eg2653}dXGfn-YnLW5hWnZFk3s|kMmxEjuv{!eRT*_-xi9@m}5s1nNb(8iOqi8?0g4do!WyD-< zrq5o&mE7I+FTw|d$NM%&pM5{ScIOc>BVW3dBTG`$Ap_ZdkAuE#?DmUHKaPGH%-bV$TQH&nIqvCGc*ek$s(y-RxrzJkQ@cQi^5oa{@~>dBFqQmlxF3u!@L? zApAdmq{jsL2*)Wxv^128Q~7@WD-$!bYLHw6i`2`lt*zqU;!;u}fq}LXM{R9nki3z# z+KDqi%x;-2gT$4N<@?o)-lHYg%Ei-UK^PCaoPI1e44}u%$XIXhUkb%%+|qBQXITF* z7tX+icxp1KgxH(A9h$5`N_*8$%l3H9Slf(|S6l^|i5J z`8=gx_ZRIB7T)f#uZbIZiUoRNWR#R<=H{mWFN1r5jQ(TmwalKc(ra{Tc$An(JcKceDO+{|v*|l%rVBS8? zm|KgJuOULL_6Qsl8O+)m1hoa7c(%QEh475CsD`$@%K9gajx+9! z);z_mOtriD5g{aF_Aav?4Y0LX9Pde}>KHj4+U-X#cqlwMvfa2?ye$ypTkVBAMu^lN zTtygr^;{&J?{Ax64zoP>d7*5#VMNS*?r@CWieux@dp2T4@Rc%R=ZpLx`|S%j+NcvkF-IyYvPE|JBTbpB2J3sl4Tt1nh+>n6 zAA}^6>-~=ArO_R*40iL~&%Q=)M@H&%SMMW-xFy<73~F4D-c{{J2HRiOBDYahRb5w6 zzbQW*qn1gYnq5*tqoAPRF*9H*4vFCfesDisy}jl-nTds(Jf8qonZbfP8ZCF(2z6W0 ziYM50r=|}aVI~Sq5FEP zEZ=|pxZ5n{nW}MyhK9xi&tCj~#d}$v!|A|nr?tLy;8!s#V!99;anyO7KD}j$iRG*d zwt!IemF0KkK4t&pFNwKxAGrfJT-j3ISKm&PORE|-sqeS+wJ5*(tsUkwb$?o`M|yS- zc9gr%>|^AJx}V5puRecUN5W1l=sX}j-ifP3m}5q^{f_d7Ex{rOi5>@^DdHT6Ptr>8 zvfWF*Rc}~H{}xqx_jtUztZH-?h8cGj<5SuCdoM878>TUVe`0*>r2Iu~6FnhbxR?Svlax53*ITm{*_r-i2>MZeF~u{eg%uI>*#XST1ciSVnnW#K)9og*B);B{zQ zF~v{UyQz2~U~1PXtoHfQ-s(n3VzSJ{LZ`Sf?*=o47qw5;Z_Fo1YaP{n;I@=TRs0Y7HRmHAfxV9C=B&mm-cTN{Dcbwr;9ny{^{wzCu}Q%IZOUS3-Iec9kzCCrKz{~Luym5#yr2auOOqS!I$d%JF0zugL)t;*m7?B5=p=_EY<$ zMveJ77IBQvUh#?pkL=T>4J>Z;?MBJzZ6fo4Y+tl*O|qf=_51=fd0c>g=yJ-uWvS)y z(c!tr`35%us#a7~XjjTfhyj%j@#gu!yI^`d2%}eR=A(k`z5jui{lAlqZzyW29`{p@ zek(H+mB%@OUy~RXpq5$P6lh7FR#%jutoa=>pMf7cYJIZfa6FU$EB|}iO!DQHd)ta- zT!E!@n$0qjoN2c<(82S4#W@U(1h|+s`9H_2|NeIu!N12gw%J<#2i)xwKX`D_cRPXd zKcMZ)e_`JLq`+eH82L0)E$Q3*JP+biYU+syxjh~rnu_0R5r~b7)ZDwBL$A*VMAT(2~u4Qto)dXzypt>dsVz8Bjo!GOGwy@70?u zl8%T>^_1@o4T{}$^lxuNS!Nu*@SfzYV6+Bsgm1`jIP>_CmY9Rrq1?$A{wBKY=ijxq zh1cWoOsMVxfg>4K^-WZE9Xef|vaR-CL6 zz@lBaH90>1Nv2PeS4;HNoG;^@&kx8bD44=ayS6BT6!L+;H`bviBc2hi9W!z~Hof={ z4n|TWz4J-jG?IoCJ5jID04gOLhUcK%1wk1DTb?;N-l3|U(i+r|bdYG-*jB1Wn;hG__hQrcHff?3aqU2BvVExjw&;aGJ zdLMN)wQu%it^3p=uTsgO{2?SH6j`8)TzDFA=mzdtRP|ipAEShE1o0^)Qyn6NOx~q*1pK#owx|vjxnu?m*N&m$q>YM4X z^wc4Wy0T{h4p`aRowxN*GCf6*a$v*v@3$dyiMN**7v~BRbi!|Levl>m!u{LGDp<@-cUdqk!#Xh4 z_E4j!hWmalci<}O_J^%}K z&U)fEZ0cUpD_H6qt6f_&XvW(@w@C6i1DFP8@d?W_I~#tgh{}MP=K*|fQKTR1)exNClq{Mnu1p}q+(yn zALo4lzt>zi?JTW|10n|2dgEmttjxebY?Z92sCh*M*e&DtUw)3^;o&V7&F00qg=smw zw&Dp@d2C#2V8{WZGf29Nrb`P8Hw76#r0N?njC+1sSz3Ax)jg@Zv_D z;G(RQl=aZm9NrTK$KM~O$k`>@E;!8^(If=f7}7qzX-deJP@6*x&dvPz5nScx>`V)m z2jw=`%8P66GAp~Eb8=YX85G*~c5NraLUpv~h3G|96*wb#B&YKP%F@%7P%e4_Ks-im0HR91Sfx zAleAQHmSM!o`-(t$~IuCAEQ)37!I$#wmy<#r&UtbQ`@`V8JMh>109wn7iJBzbDo`f zn>GpsAY+X!cNxe}17{{22LvO|myhCjZiT1u1U7L*-v{QL33c6T%XZX>H%V=-v>Bo` zxxz9b(~rFS7iphtu#Mq=BA2$uwpC9Zo8AHN^ACOLwNd?(#s+ zj*cpmhfueh7mG_w{D28hS5Z+RATW!(FTiB}B|m>kh~*30)+v7=oByIdi>UyNi#*dl zgXBn3`&>|k|?ADTmk6(sEkZCqkbit?aH}E+BiTJ0Uj}n$lZ( zw~=vpL#>?D)YN%oLi&#@&7H2Gs5hEC#VJ$ojAY4IG z`7i2qa-+7WE2!#$+QIW#1BTv`v9F~d?H764@dK&+TCUn$7@alxVwmQ_rmQnLIeB0m zby%ahAeB=`U{DY_+b1ySdSgL>cUJL%Pz%4H;WU?f_Qj1)#*`D|0#8bqtqX#nNm-lF_`HP)~*<)LYeE#0E+s|Vm5-(%i2LOr)?*ETONj{sxmb_NC* z_4M`6eY|w*gDw{J^=s^wH_*g!9hIkwH@NT$2@{Uxxpn%XV=H%HCK6E^&qi)V&>^Je z9vu(aSy>6P*w|wOZ*jn??8b9(R{YBSA;1V#d`LcIHrhlao#)T@<>?1e%I*9K+sU54 zvtQPle&QkZmP=uweqK2uJPr9PGuMO4k>#qc2ew|HcH-WeqGMGAfE0vxE&+>uZx*rc zNlHrf)b83x$z@=PFy~EqXum<&ub*f{{!V8L=W~|XGvV*1x5Vy4^@qs%&Yhq{r>BIH zbuaKrP+a#2`DiR?b!G@wSlAqw!VE>xt`e?m8$bK|Nx<&TBmmvA-f)V;je_o-57{OT zJz}rONvQiPFrNyje_yR<+}Xt? z&(-J5AZ0UfQ5Lnn^fSOkff-KA@PwT^brQ->By8NA73nP3UCEw2d2+zvR^jp*Gf|~n z_zoXzL%sf-Gfn?j=+V3D-OqX`r%ujL8uk4Cht{*8tOxJ^hOv+T?gLti7uxrVlr`Sr z`TJ*(1oh*;h)BUeF~DP-=gf2nilXBGKfWw1v-Y+03U7sfsa}aL|R&5a-%aXKGpm&H`q1S zeFA}*hG2copxj@;XF=KhV690=P|%-*)g1vlh@FB((!VED9a8wTd1h-PBR0?g0C#%g zMn2!a14aIPn?-Zx6i7(mngmUYorI($PlQ-ly36SzAsCNj~5gZJI&5KEq(p^jHhemlfVQGo>%TN*Kkj7_lSZRLt%FY z+?}u{xGKPMR`JBDJp_GGku<iKqE6z0}Dr@2hMqLP}c*yvQ6{@71VCY zhx_j_6K#(Oaq|uaaI|opLLfuJ3

n9FGoCim8{5lBD3c#`}L~7S1tn{ z^N6^28G8@jGS~%=`HWUD-LpVrg5xtT1RCKLiuYJA6eTmh?6}C;L+Qo9 zJS3v8ESe&+P{0Z=78Bl%9)i1lY zQj>CgFc*CLGent}X*@dvO>%*XoDUwL0hEO(-traP+};+*@r6JPdBElVM_P0)E-r!o zC|WZ!Gvtm78j$B1Sy@>Gq6}-N_gG7dfJv1etjpQ94jMul02-=5Gr&)9HV6(ZDBA%R z&A;x6nS-6D@f9=xz$*0K8)NS8=`qvEAFGYM1mUpzAEsY}=agy>q?MP5eAv$mZf1lU zM>0!S8wvn|6_Sy$%?e{g_LFpi<|}P!9_qJPNCkHeeP3ZrfUJp?yAv1~I9-E}NX^MX zS{d@grZ2wQzz_{`14qd>fFY_Xtm6q!y5{6$YpcQvFc17paX9F3Leq@FtO2{j=77pV z@u5@5R!VH_J4{-)mFPziUhTdavsE`^O==ZIZ!o*Z!-Q{s%g z!5e)NVNmIsH;HVN@D2U(txcbn z@+r`iP9k=c9S$*jK-;(~30sGdI{t$!kA5yV8!{)$di4oTQ=%<+G4sL5lhfa?R$Y7q+qSadB6MoVYw?X+jk1QDQhW zl|`7v44H|A@CCRorUsZnQPrrK`G7mwXy-k{{22&78qR1C%-FSpV1-}*B5C_Cesic; zQ7lNage&>nyW-X{`7n4?L{@0~{T~pST>7Nabt3L*@|E&~-t0%QNlDS%?DH`Gq&lPhS@Krs}H4*|sS_Kd($3lTwaE>RY_&?*wiQfN)BMlSbqw-%H5=$l~ zOfZ94e}LrqRE?}$c)IHeKJIfA*}vziw9=qBa|0!zx_JP05ALxiS(?g~kYiJrUP}TX zJI)(w$^*(l%*N;J?Cjik=4IH8*^*Ke3e=KJx4Qouf=nG8Mu8iIeKSp{$CwXYA~v5> zr64D7#!fi8ch@(rY=4GyYs+`ecdfgO8G&&E+Tw#)>8Du8l`+kH=%y!GKKEt6Lq?GX z83l+BRa8|$tT++Eoh-Pi7tH$Z55(60BPujkf9K2kYjw5IM7RXIB%UN{WaY)~bvyeE ziDgD+rjWR}<$Opnb_psXxBsG!jB0zaKG${?pHTY;LMjxf{DF|Ka@A8=6K=H(8ov5D z-1FWej0PcFGU5mCUY2Ta91;2l&^k;i? z#~lOQs9s&*t}Oyu)2?*IKUeni}^LO2Z0uBX{p*e zKgEJj1qMIR>N@4MnI8zEdRIAWQn7W@@I&Y3qSd;^|&gc?YHJ0 z7EM(SMkEE#e>a&ZMCrID%6idn{p9oI3E0|lO_X=2$%XT6`f}^z#cT>qFo7p=SEDxO zx<^MTHc}R9=>C4*DZ6dl9xqltm+Yl2$1`0Dm^>ZXQuTlzQ$$16U0i+^qqj@JDibVb z^X&QZF#6#2T<27>7wZk9FnBf7 zKU?Utzg6XlVv`9@O_eBI`iYk=MY&FHGH0$0JJsN1FVA(FVFJl_XPCp4{1RXP{&3Sq zFc{F?XV-QnxY$P?lE5j6%{{t7u1?`!V+TcbL8;rxmpAXy`;s;K;sNIrtkiZD#eE&w zu08gN+UmSO+ID5dbHyli&gDhZ*Spm%Qmz}QYimQiee@Xx5$i^GX4ojHsIImUQV&+Y zgSFRBQ+!-a8k4SyiQHUVSn}Y!2`Bl zL5<+?uh6gWuzDz#jV*c-G`hEez~{2%rx?varLxd*dH7p~Y697|kx{|j zq>dzg_vy$x^s~-*9-WS^u5ZgDl?DACRy_Ka-9B@A$$JdG{B6GSP5As$y55W=60Y}fW>)EqM_ z@wqM>N4cM+mZ+etd=6zNGS+5aX12df>0n#(IX%765qOU1q9^CX?S@`CU#OM=3b1Zh z6v9lTK2lj(`Gqugt+c?0yxjRL(3~Q}V?TesRF2`zeN==LxBFIm&{}J-GBQ}rTO&?e_8rvLp)#3vv!SM2Io zd#{BVwbdRUcq9TlmLMKIiceRL$q&MC&alY1uVVa7nwTA`pc#|G*mTmk*~iV*)iC9{ z*6Y1F-Sxy$YLp#e#rCB4-&EhJESrLB2A<~{$~DGvWFF#?DJgS3fukiaJ8{FpVZAol zq17lAwz(ONMi_lsZYf_y*+}J#1~~$hb%%Rp$9C94uWfrEXWcn6(N8A`hjELfyxM6wGuNs~_tC;a3 z>vpEa(Q0NOoldt71_l*PM3T=hwv7t>rucN=Bj9!z!~fQ6*}4%Px689r)*^*U`m2{j zpR=o}mDNqRf+ws2R-aX2o)($+i}t-IP$DS5G5jPlIVC~du0rmV?xe?)d7<{a{`ViU z0v4vK_({t|V53I-k4mPZSlq-3|7&gCS63R&ew8~EO`!zi7yDQ3iF7-6#IYD-t~jV{ zCc|0K9J3_r8E_M5@SJdyw^{t+iHD9^AA*CeE|2`Ig(?+@j$HozEv^4aHRylmMmAq` z-G$?FE!SYkiXSH(B|lcTfw1J6W-N%R=C!|>Xb?irzmveIwEh;KVGS)Y8d{}`c2$M~ z0MO}dl;HMXMfsTe0KPZA$N_;1{FA68kPpD*L6ID|T>k7tKuA^lv`RN+SPQZeCnhE? z{|bO{+Fy;&xcT4%-N;-h9t5d@=E5P6psH{MScz6VtOVUJr(Q8|$#4vajJ$c@$Nae< zR{#zSs;f}rfg4Qcea_*PVU0-i<2w2_QE1SF!<#~H0Ady?(UMLf590ib8|($S!xb}qmA&5O$i9Aoem0wB)SkuO3{(^h3m)fxmN$gE^G5tQ zVYJ)w_Hndpi=m2eLWp7W6SR5!KYBr~i&zQ-JX*TZywGCuGpq+xI6=34f%d4w` z-g0b+A1(*Jeuh#ML6;oLwIJi}v4$8%pNE4s9R5lJ&}L<3lE|f~+hcoszs}>829T8_ zNVKFqLJ~QB20%}0(%#xM% zp#vte5Xvu+Fr4o06NuIQL+IUrQd;zqs8xxpf{JEM*^psNBvPVRP# zD+;)R94jM)Bhb+ZL0hQJ7tZ7Va1B8+zD4<2`*n5x6Os*{XiTepnSMUEr&x^ipC(o9 zRLW=H?vtSC&e}{ioIHG01#DhV7w`w`T+4&DsL<^zCsTbPpMnBV$-JxOzQ7%*Dj`0| zw&~dVbQ6`EHHE*QnGd@8;vh-@8BqqZy4*biFZH|aWqjfL7j{Y=#Ht{|GxkKkwG!3) znrU+-Q7x0q26B4O?T-m*JoC_w1CmnsKHhbGy-TI6N&kV0V$$Q|lkethhIXaPbR-sgwCXHLBT z#8a`Yl5d;(@*bW}=?arM^ky8nyI-M&LibD&sCO}mYY(A*iq6_yp2_*0C?>R>qj8s7 z;r(8#(FX-G%8xV}kh()vgWhKn;dp3%+D8_|W2QRXEELSYFR8Kf^loT9I|SSa?OhnT zMsd@c1mC#9xKFTMou|G$)1i5h0hg0C0=X1jG+)QFMI5fRvPS2c5bbYAN#3C#5Ddn| zoTrM~#Xrp@O_Kv*6`_Mm;P3&|>UdrOk3293T*!g1Jjne(62gyLSuxsNgB6W*$s4To zJN^a&&@O0K&CiG8K42~?suPm`g4kO@!_ayjoF)9f;}HMf`mD{DY9iI1^I?r-+mN8% zc<><&dl6V0fFmICRvtPA!Ta;INhQ#lk2iCt@OxE8ajQ?hW-#Qbtl@hi&&jJ=6>$cn z*0K~WYIz}!YQkXpqE7!e~_WIbu8rlvspeo0g7s$Tfct;SDx6u+eBn5g!MB5v5( z)Y;ydyMPbG5fnrJpObBQf0R5`&%3Ed$Q|K1}C#4jjJVwJ_vo?pKq&nd?>cI`l zc*2y*?oP^{K;#=%KXbqM+YVIuh-sU}$;L3?ykJWKEAhUdadWzgfVR#~ zGibelB_l}lOKoDjqv*G1h*?#8$Ts>FSH^dCBq57D%g+20p0m5V`vnv};WKj=p}&$a z&;ETkK}@= z9s0M45yFZm>VQ5fge671D_|2+;XU$S^t$WjRz_ww>GK&pPp%38uwVKp0iB%Bm_G6(d0lGet+(yqL%3YWA2Ai@UKYA3f zylk%FdUET7pRbH zy}8*HBHz)<(b5m9dao)ahw|juG+1YV*@Brf!c#&>k9?dTTF=YJMw!}h;gWF7$U1Rwc2qPXdH?WWE-l8sWOXheQwX< zhGJw$A$q`2;^tQjh)_OiQgpXJgLa5O0mDfbpZ+Iq&4$mOQ@<>Pc7!U&%Qf#pTpCdz zen9wZ@UvJ=^eHG%6g6=ozp}~0HaAiaSC6_VwrZw_9 zhY^{??AGlN30-Jutit!{6U6&q=H@<7WB$Z*zy6c;cl)v_uMoPa+Z$~4yzhTqreEw(2%M!-nH$<5a0yvPg>1ccr|8foK9ErJtOVjJG>w*@uPpgi zQB$gh?54|ew1Ec>Yby>qVEXH#X*Av2b0+}M3pgsijTA-C^{Nuo!90F&FOMiF;2y@tT>d*aTSc5

vz?(LDYN?(l8`**kTq|W)ViD69zl_-5@$&LgYP$dRCtwUf8lYI!uH;oz z40{Mp-I@vND~nej(VnIVA}Z1$LqOxL**phQk_EhI3mLbQ#CLrE9Hzy8AvLX^#Tt`l+=aCdweK45|Un zSho3EjIyr>H4ZL>Vc;F#!|_1nEU?Sq8Uv8Z@EvsjIXO^tM529-5YrWVd(+g|VEMy+ zpy?yG!}?2WR1WvjSbUi0aUWZA?JeyiPK3cT-`%M@sHJ@VfIuWFtI(Uoj_lI z80iuDBgH3140a9t{AsFVUor?yKrOt=guITZZ4iaFN~v}jL*?C5DnVzYi`K|yC%7z;&EDo<$DMKB_$z6@~Dl3u9kIw9!I z(UNY>1pOz?+a#(zf>3(IJ+c}og-E=GYMOe!s|14eAFP{D(;J)O;^Lb20gN8bdq&|{ z-fNp-=(g*2#PL$`yQRkPeteJg_&t>@tbfJOxjde5k^tTx4*h7W>9D)(Dp_?)s-Gqw z{FNMLw@O^X@Fbh}+H}sfKvBB89(8IH3FbD>PE}6DriES}iqCL4tM0srt)W7qLZbl(`H42JjP=%{r|55=XWLy>6y>mZQ3G`Dl&m%#h#jtE@?gAYcW*_!uV zb->UUoGUV>=6f95g@D%oSBcxtXu}$(kD>UNo0nIri4wXFD?Z^`iOa_> zzg6Xnn#_~1ovaWgew7v>(qV*mml2bw7x`J>?<$7|$LQo@)05qe|n+aAk}L03BD6&WF~;pw5T%_NVGu@ciwMZ z9i4YcNIn<6l@HrFI{cu&Gc{^Gm6MctCLR)OB$@?UKS9n?({DjX5d?#?kzP(uPk%!4 zOK}83(6q~ylT(SRdqfXan)nsvsjn8{}uOC_Mlr{Pb(P{ws80O3>3IY8&xmRQG!D(a}+S<$~wM5SYo5 z%&=Yjj;yIiXCj!Z$g=}P*t zXc+2;e+U3Qx0>9wD@%}0L#b_uSYz_6Ly<36R6W#(mF?`(?cUn6h^dw&6`$1HcX`rp zv!|-`0IJ;%8w(cHi3SAJdp*e8y<}Y#;urBKLb~B<#Ikx=)yHO zYwLSz_7RGl$d_55n>+nn!hTqAq%oAD#j_i1Q_5Nl{`Lhe>7e1Xse8lDhi9KT$iJ8t z1p|5Uv42eY5cGJW!$Vevab1f}f^x>ji60W0&7TDdf_|(0K!TI|r^`jCDa~H7#2J)m zw`4!HvN{9ezx3Q1*u+*$;du;_rA!AQI3X5_&kwU>_cWhBVGbf%nq4Yw9T0ymV&&6f z1g%#YzDoSt?lLI5i>$1uYHJ6JxHTO;tjQu#9{d@N(jvo)iX`b%wI!(Xa-Nu`{${apK3dk&`|Md-l`MmmtBYH`it?-JKW`{;#W|@!Dl99{SI3uG@tIW5wve2 zF?O;Z#U}mq=~K0p$n5T_m!+EgRz|lcIfy0QIZAo6DSh;k5w#zkI*XVkQ`@A}n?Q(J zty#yE$RYY0EkCt_=T-5Ktz#QvTIWug+*64k5vR=kDR#yL53|Ont$or*GFB}4S^6|e zA0NwcC71KJy<${ziN@S^jpe`(e)TyO*5nU*9YCoBVMTrT=Z?!&GJdyT!bM?YEPV z3|r8D`47L2C^qasNSyuV4FiFVjqUBV@+A{4rGPil>NHl|C(+}NT+g9;?hWhcj7xoX z_s&;I1GxFw5V*Pv8Wxt?cM|jrXkEYMuD5xDJ2ux?N2(=eP%C|_0w=xR*!Ws6zSx<_g|NQqmi8JL>F%yn!qx$8k zDQl4DC7jl1KTbC1%1eXl=Nk$Lcz3F>@dyNG0O3iX@$*l`hLjw!NW&ty4W|8%=rG7ni zi@f{egAQ8chS;{!xayNl63=CcTM4i&xZbBzq9?vfs`9PJ-2`e7hHbl*#GZKw5S$A&V{`sw9J)vbx9h@*F zB~@VJ%dUGHw%)qw7|U(a1}lxr0_D43X>Y-k)Ot}k;w44)er3EJZ&h`5Hi@K{>t9OB z_erO{5ccWYPL6plSRb66oCe0m5~byD-aOP!nLc4dvsmO9@p?_`*_CEIgBbEB#cZv3 za3w!q5&`jo4{);Za~la*Yp=`7m0cKsrEi#l^h)%o73fv9lKjsr%q_u*I;u}Avh$Qxa6lO zaz}(J(OH1q77-KK`uB;uQJI+B#8${|wrL$*)9V6PgZARs;>DhT zNk8!4bMkG~K7ER&?ZKT;o24@jd}7+LE|L21VOFqHvh?#SU7NJZ+gX<>h&IY8!9D1_J@rakjQfD4 zT*k@142Gs%%ra-IgYqNH0*VGpl~zVH&|&%O!9aBHvW?LVCe6A;#_ih?)kBuF#O9<= zJ2n~_9PP``LyIC)PBvj#P)I8kAg0j9uG=WPfa96&|zStlma^F7KW5UAC{ba&h2|kwuNG(yjNG z=lv8TB}M5KA3S*AyOn|Bq@<)2>Q?0F<07)eCw?PiXY937|EZ-FTodDZ$H$XrlbRCe zK)4L}$iH~nDFr;uB71Y(q$?^Kui}(&5*rIk`x$%yK^r2ey^PS~F!EfBd#z4IR4SNQt1&4Ea4ncWswUfwG)VQ+1H z%BDg}N=j5rY+nSjYOv*Dwvb6(wpsr(Z{RC5rE;LrHdF;oZo{$lDqW(h2;ZGD!}1 z8ivB!Zi;Pd4=%oUch;!-r~|F#s3BlBx41UTtULry^a9~#BjRkkXYZbEyvS0?@*J@u z0|Nu0JyNduif`O14cCcOd)GhNPVbKOk2-Tsm(B55trVTkmaC~V$8Y;|aGJC|ZWyw@ z-tp;qzG`)9&+Owfe8LxexRkrhqJ-3hONY#I_d70W7b><+Fi630*a#%Hpu@Dzk3=d!Fz9aeJ z`FTpPx}3_}L(W{Z^wuetzNV@T-YxplbgHOxCQco1l4x?EJR$V^47eHcIGD7_z;mwQ z&j|Xm&O2+%OAiJe#q|7xEj9!%O4rPMJ$+;~7H(iG1RE)5IA?aUVC+Q_XYZF3&iL}ulp>popq zdE&s;X)o>mb<6;`yK=zU2bTNtie2#iZhdbai(TYkpa<{%xX$Kfs(rUxL`1~EB!N~y zgJu~ufc^4w_Af8_U(fQ7a!E-@{0Z#^*?X7*vT;1!FrgEQkXBR-@sJJnkae=ZLj%tJ z6KU!xSJg`+vB{poj6^%qOy2wX$b0^32X_{__TM(P5%L8mCVccoZpj~uJF?my;MKrs z!T}C822%^jjqyx7bPC)wb!A{V^<9*oSz(tCSfm18MZdd1_rZjErpF`ZcWBGJ?BK8s z3Z8h`eBZV=vz-p}t8?WIUvr?pjg2@hB-UDp%_tW%CdRtkKLoapi?hNpGQ}AuL>!s35z)oFQFox^mJv?|l~dW;O!U41|z^`vmxwXTORGB0Kc5tWq4 zIh-bPPUA}WR4x{Cr5`ph?D(kT)LVS(0jpV<+3hToH&<%XyQKXM;o-167noH;rS;bJ zeU5zY=RY&5OI}cErH*FU<`mQG>WYbLR}E_f-e1xn(|VnfuR={t&ro!lYG!fnSym$z zp=oaYlc^!~CAY~whhMerW$Ih?zS_|Q*Y?gHRkS4<*EhM?N6suQG`OxQMzuQ0$S!?d z)l+&f`vj5F?E|MT8JDy)blCKMK7QH3DObVysgG%N)Vu0f|Jx%YBc1z4{R4=#&K}gU zU-F0c$J?HmyK_9)FnHG?&$1txJ>ccv)!bdNNloqh5Sb*Rs)MMh$>EgNrS|$;(2wG} zPCTt1aHC7JhKJI-OF6XzsZBP!l@>l~Twj_K6BoDe=^b!WSP^$lP!IkjTbF$Jh^SQI8rse|a`)Edtx83Owb5w+EhpP(H$*RWu5w!*;x|8q>>Z@sz z@hCE8DpgP@3|tE!@`i9#jE<&WzMK7UYN(;Dti1SsOH0es+tcH{<>kA$r1*!RiEEU1 z>2{S|+YTa)skK#DDnpKqVf^zQit>`fn0Q2x;tR}PuWYe`DoADJFL z#LYgcvHn194imFRP|q9hU574A!{qr*8fz4`Oy1Y1M)goNWi z<~d=T`$H6M+ZBNNO=X8~A2TA}rP=-r$B7ywuo};Z>_T6NOv^U-n*7e1L;fvm{y&}x z|G(tm?GZdH{<}h@k8J8@LPEShXY%V?{iUC=fq|}HsK32>IYo#$KebbuKlahe%UqRI z&k5g1ZpK#GMss|BJnI%-QQG(YXD9jGJIZ@QVQ8Bq?qPBViGw^(Z;~GN`^QZlk_NR_ z;tj;BI2r+J$ZC_0dG^h_U@pQxGXij|Oj~%TM2CaGJFcq>fznxzyt_EFAb<7OFE=BK zlGo3;K?U_DO@5Y60U&XAJvG{hSE5>5WJ{hJHW9gz{DHR!KljR#ouBp&FQAxt2FG;3 zijO{pddbEKKxb;|i6#l8o`OO``?#2*TVW~$LG~G9atV&`3AoartXbOzxTV8!&#e;` z5)$xd+r!GrNkY?^xx4!=XhzX>C$v~12R>Pe(@c3xkZ-_au(L;&#gLz6M`$%-HaY^L zfA~>4b8g=71^CM9Y5+v14%Nvr*YdGXp_LXj18&$35(gmALIi|F0pAQXL^xY^ZzrI1 zBH6v=?xKk>Yfgt__YB@=GKUi3ZD_#s0d`I#)u~5_*MxHQ1ouEHXCNH&{&n!&tG}pU zF2B;odpJc)d+=xZGphKt$Uxjm&%OHk_3xE)uWllTW!busJ^7EYvtV&PScu_IXh7Q^ z+i)OKEov0XXO1HJ;|K`7a1k2`MWtdj5EBWSjANr4!}>1MSuWr@2?*Ty*USWS>5Fd? zmA2km2h<0dle$!{j=;x$d^TvbM6~i{dLAEo=@}IUabzU`m}p+Q;pd1#?_0yo5wgZ< zry1#vjgCPj$n8F@LodKfBqZDx89D-z>=}+yFlagywD-4k zcD28Xv1mKthaw^Qa00W#?Ro*k(r}MxMI=WI%JE5G+BfQ1(v91kNZfr&jCxX(?Z*yD ztic;%n!Ad*Ulac@*tLBR+xj$Gg1w26d&Hpc`BALWQahI9Ef)2cl7?Or z9IuAeWmN z(d?Hz?<;G4PFkNjMfF??DhG$ak0OFBDn#k086HbTF9WlG)G(w@f%db&d5yLoIF1a9 z4#NZS`eLN8dJ~qGb64TMHZ7Ko_~FC_r`BHPUGR;wQz+>@<)91c0EAs+fz9$ZIxtw@ zUH%FV4LyLoA@6;t*Fj07~*D#m7eNxV$%KT~I$aQ>r9nD7- z6iQcqem@CksmpF|zmz!-1h5oz#9D~2@(W`{H%<+I3O@qfb!?p1?GSC7nHBwiilwdj zNmB-WXy+Eijx)c5Wt;zqyt?!?q1>f!(qLWHT98^2b? zD(D}-jsFsT);FbT_i%B@ty>$Le9?gOMIz(7C)~Q)J3CJZgm+$Ci4Zn<*IjbWb@+osxb(D>exg6p*P0;s;ff_S5=P!8*&m-2=%vtG^;@bF<2q-J#W!ji-5u zg7ev(PSt*k({|4xXT};`RA7qr`?bY1aD@oc|EU?53in^MZLF^ubnJCJF@7+Ey?q093UzQ)|nup0I0;0-KbF)#05A3(E#1DuN-nNym5(!s0 zp5SoT#kvKOva(2&d2Tl*Sot%VZ8f)S&qFePst>)OZg+ENjF0P^)kR97{}RbqziXq> zL>#~kCwcE*Dw)!#Z)ao(HIdM}1;8+ImhH}|jjq)JBVYgUt``18;%sFxlqBFMrC_$@ zI7dUDfLcTPljst$GF{qb=ZTJ7Ts3RpE>$ftC);bH&}txxv+Hk0!ZXcLWFgZixQv_92LxHz*PPOF8! zbF_r;`f;2Xb+JAofjqJ5?E}EOWGQHMsz>;=j348xxeCS#fe{>bOi(lEbq8b<& z*exq!R`w8g_aDYbr1+P_6?vZ10^xrh4;TApKS=Ifl_J#C&+x9z-!X0laSAW-czF8} zt}f5Jf+T6oA2pSzbVJJ;-W^x_1^ zroFjqzU;!gPiA7Jo;6zGV%9ofvN95a+kNspdK*PZRWPv1X+aVU+f z!3S{zz|XVsw?>nnj%1A$D=Zzi8va1Td{T*c*~rN~9aj&CojPvS;Ca4Df}QLB<%>4J ze6nOY($NZ5*KBx?p#>hef=6}mk=)3n%nv7oI@Zol#jY_B=DQ~XHWB7K+sa5oo+v*= zeSS70`_MU+WX|(g355yI-wHY(< z^Fll)cF-WssBh=GeuF;I(b0tKpv@6?@Pn4)XBT!T-fvxmLloh%LXxsS)^9=N*bnSJZy zd`@~U%{qB!-1APcFgnoxe%rd-Zk0TJ1tj-mAa?K^VMEnxd$9s-YuxbdpI!P#Y&7=h z{chs_Uskd%v7$w5xH#ZT-QIXx1HP~uZ4{>xk+XbZKrguMTXKaE3h{*UdK|qwy7+H< z{Hug;)SJ9YP4PvWKmhQ2Z-ivA0lWl^MRwk6f9kZ{md;%zem#cib>nO+HJ#jiq(nDf zo+7rB_#hCLiJrdwVmafmOpz9HXl^X{6^VvxxNl0$h76kz7n{x%yT#kk>B5U0%6g(5 zV_Po$UL1(GPFyzYJfqS*^Xf*{?8|bE5rd8J2!tRBH59=kR55YQ9o%Ps3-Zc}u?37O za43?JmLBjy=_IG$#MJcZ1nbs~2&ieb8u7nA9)!7^W9=6r_dohK%lChdlI8CTf4&L);t@7Nl>}MiR13sdntPMO7yhRx4-}gjL!L)*mQiV! zNgHYdojs@HgCOSaWA?(+hqEmoACtAC6S(r2n9D0p+5B8Ozd1oFc^B(ftQ(jh)}z z%e@c$vbvvkvZTA0rWcBlxi@dH^0(mBiU53k@)>Rf3YdIpPF#}sHsm%nLsR(5>9G>G zvoB9>a8^-HcW|^U<&0da-$D$#2)@;^MTpP~b6t}E&?;pZw@t}rq&Mcrhi*>@w<63Tb-_veNo1|ju$ zLhXRKkUq;s+&-c3Kakjvm0d-6`5B7&~D z;l8anJIjMphU0yG`=Qtq@6P>+!c3edzj;7FS>gpuoj5ImGz4KfP|EGG4V#dWop@4LCSP^I*~hCw8r;o<8%bL{(=ikTbt<>xr3 zspw^pA981ltp}&3zGV9*3<^(ToSUm__N%=Y{VK+;DW7XTT*VoNb}jPvB~AW=Yi3q0 z!4KQCMA<&TEvS3(A^V~l-+IL9Ieq)D=aqaM!+p6plI~tW;`CJ|b18n4{P6uj3wJ&*dgjZ@Yf9Hy;>Jl#6-WaTHe&vd}=B zV}?N$NVl6zcs1pwJMR`gAUo;3eq2#e5%s;juC6Ze#zv`TiI6 z47W~{1myT!y^0d{OIp8f6 zOT?+8d)@vDp?B!Jpy${4AZc@@Nd`!%1$vZ#;PFj(zbk zk*+(1LkBD6mlr#)D0W5A>0y+?DR11Yy+9mgOAQ3+Pif6xB>XTa&a9O=UlrJTy{^6B zb6s7F@lut;5I}OF-X~ZEPihB>mGTd?*EKoKNH@RxezlHE#L}0taUaf*SK1$&Nkv6P z{w3eJKupaXC}}w-7wjHexfC3-GCZ7|qNdn=q2Xr8_8?(l;iwmdFt>2)_)Y3$sad9_ z+ROdsbX)@IS{9h9;vA5ej%dC`#z`xFnJ7yd7@L~H_6^k;aVL=;mvC2YheM#Q_QKwX zL}om7`~BsnY>DxpL^~Ll-#olcPoyR)Ha0@T4!=%5riN`NQ5$9KB4bia`5(?_K6nca z)~%aa+H2X{RBzk{^9^`k$P}3vqmSupGb{VjDfBR*;if=HuQfpDb44^v1q@GFF3fbc zj+aS7$#5CXy)mjtlD*V;L9S9W*>(J7w`c3BB06tkE}Yb2sW&`OO^JN*q96&FI4YL!~?iy(fNIDo1u>3IVSHt(MH5;+l1a5eoO1v4hsug{s&3E@GshiX*x;H zRD!yyL(fdqOK|u)?=G#PvgzLcPwxCr$erHgG1Vn|me6WSD;0ze&$f~o50fmz7ixUb zBqbiQO46v$-;KL_6rVY$J-3`XWZ2bEYCjvpv;uG4>7F{1+H$QdD7sd32ig=WpsHnN#El=#N7pv9Ol)GaxYOl#Hxa_MtDTI zzqV)VM(AvRH;s@;A}m`I18Ii&YUI&kCiSKtvb6Z)%~M?hAE2M1*)jSzD*DongP@FT zMVS^iVUs3Yzj_SzEcQ45NA!-eFc{Gp9o_I7=iy@lv67mbK#@hcUu~cu-n1iQ+~FA4 z(=`{NlY&hWjQ8W)Tg?Q*tu&+09Mlw!P=`gXD**XoY8#Qe(n5>r&bHIIN5K@5qjhjT6XwM4N;f!RwoKE_L+O2z$NGEh@T)ESsPVs&k7U z$e`vt2DGccq#-H6vzXV`yy1m1u^g;`{ihrrjqH_g-}Zt##7r>(T(8yD!m_duoK+Ut zSIG6q=5JSUY1Z|GpZjCslGWB5_L>4Y&sqsazaR1iA5Txx;Pcl{p>!gqf%Z+CUSzVr zAIqrswXvlUK58`9e4kqqJ9_j$8*>)xo;}dP=ydM5*xK5nV`dW=aV4mNp@>)Fd>l{F zABj}6aB^Zqk_IVKvbwScR6gANV;gEo9J$%q25K)#s^;*sIC`{%BTy2@FS#=?U=3W3 zW}pVe7v$rVv2k0gB{al|;!sO*0G&+H!ALvE=D&{4z;jUXQ>Ig-nkvusejgYO zdHwu$<8ZFCd>QSN@P7Egdl$4xn1+&C+o~GQKQHjC{!I1k2NCI(M?)+7dC;Syw6D`q zKBO*i6BpC?RRUjW`RLKeC!Y-o4(|0LFlhl`F8n_db#W#G&bRx0l9hN&fYn(Z=o#F4saO;&(PXX-OUj{15X;9%9o?RK-P%!aUXCiLfQjq83tDy zn;r$`lJ1R_7GiOTgD3(%W>Zr6gu!)}VQ7tTfltroDt8#tB#(<72|tHVDo4RnIvIyA z1bHB-$kvdspqhYeqyYx{eMq8n>S?j+IDB6JQTkzA$8NAo%hp3aceaw%?3pPt9)#7A z-i;EBv4N}J)NqO3AWLr9zL{Ut%*;&MAD{X<(8Q0-u2wmsyWp=#`bLt?b}qaa zLc%7W{YM{xLBXA5C#eo#VB6RtU&RFw*8X}}VYEZs4_5xxSE+7AuL15A2u>P~7KfaB zW$}sO{@m}Ph#(ld=$=2DOH@7G8H!6|306{!$ro&Qbo?RqLu4>X%03!*{?a839;^EL z^{0&xo$5#Tft z!tc%wzB(P)`=P(?T(tmvQo_0SX_mguFk?tdOFQO1s8&aU^=@K_&%cNzwUb_m+aPo# zGUYY?MwaGJ{c&41opQItak5OZ=86>_S?EBHcHMgUIazv8QxloYFswp6PHKD(HbHgV zNE)iXeA#jC)lSrK?2h5FZnb)g9O`g?qkwu7^4>3^M{Kzg?LNqkwWy^Hc%CRN3Zg!} z9C3K}$^QMyVD`HhW4an3+bBeA(+TosE(B#*6U}AGyYIGfH1o*`fND%Z<0O+9E3Ol} zvDyLF$(l+tQ|D>L!!NyUMGsb?4bFEo1n6B`py9VgMTdEnMWdcQ6Rk7(N;ILD0b+Fd z@^RrK=wf(ay!^LH0`IVryYTLSdQ<@ot`u0F`_-^~)8r^*5C3 zF6Jo{SD&>9QXXAKKY)AfhuPLmhaYa2WQ!ep9uspbo}Y9w+~U~B#pX!1uk4sX=-+`l z)xs+Y7!z}R6=MqhCkjne;stxD_TE$#H995%x>^oq4r;|GfS5hZ!W1Fr9LA$K*)AM~RU>)o<@Db=ddKF*X z%sa>L$)@+ek3&gsJCD3Fyo9y~&Yx_G!GHS`n%!h*pkoOLB1E#koLh&cKJK-3b=9gb z-C3J{?K%jk)c3AfPek%6FsL6>3sL)WD=SYy(OBSgR3^H49`P`lsNr_a_1}#s;d6lD zQPrvyq#z{ngZ>wFHWVB2C|c)7xy+%v{SgQ+9zn{MmUm- zIN3aQm~hYdyyQPuchw#@-4O$bd=+gh?lvDApc7RxH-FQkVpO?&p?^KSU(NO8-2WgO zm8MLq+P~QTPlexVZnf)4xAAXE-Tq-uB!jgny%;g8xHhex~iM zpD=0kRFMOj`EiGH<{zekDk@7KzgKiRr(hA@==`;~8|;%Mu_d4bX6HZ^Xb$H3X8!s0 zK1)`_-B47LJzj4e665VhQyv;*C*wG0mK{cn9ll>mJ)G1{2?d7ieIY2nl{VuG1*t-G z$5P+5=yEA6qLXd6ql=5BuP*c2yyTNCQ%OO&n{I{-i8^=m9+FM*YvDu1$7#uRJG=M7vllO_W@q*Lz)_cbdqQo$kgu2Vhg%M)w2J;k@ArFqS?=sVO(Qy;i0QSwu6HX1NUyY#5IXl%b( zVIJmY-WhnYHLF5OayDgUHg@9+`qI?0IhKF105psYGC|sqPmt85hOoKbz}`XQG@)y|(+2mcpXUaz zUU0ZtoS}1;2-gxmngmP>%Sn*m&767f8WoVrXEI!zdVArY+EZ4(lHua-u+%D){d08| z5ZI3#ph%8GZgOPYvnW%}TD!dNdY^Z#v*_=&PA(|!X>Qh0H>@zf>gxc=-rjz6WHH|< zq|$;+E^v0@m2vwpy;|?X*y%y}{S*16)>lqTp-hXD^ZB7f_YAwD znTFl&GPj*PeYtlqKYm!pWW(0%mE_;IK_EOyCN-@9RE?;(MR{au>M_^Bkq6AXg(GUG zFKIp5LvsIK^Y{RN!J`56biTD`N1f{R(=oTA(LBRSjeuXfzODMx>@iG0mOwdu=C`ZeD5vt2CLoh%XkVsV0C!pR3ZcahtsB8j_rjnzWmEHoZ z_xyrZS_N&3x4;&wE=*iWxL7DJc`17L;ua z1Z|UZk8@ID4rM%X=**HGI(J}+h__k#wwO2Fr1X9QEVx!l&tg5wJ!@+Bq1*mC^KR6f zB*R`qb!?`uIIWLM%WY76U+Q~=O~EH`;c8M4^|K*ae53li$fLGD-W;FIGJTtERAj)Q zpJiGppyvvH?#;rW$I{G1-?C>>;hb_9hUCI^)n;up&Lj#+ho&E-^tQP-cZW|B-++HxShObfC>`IGn zdS+%{&ErAc-txe}L&qF7>%ld~28^VFRO6u~i0K(7j+d^9vUNqqw%nL)yW;TQk*%=} zEVdWSfk3mEkB#|qMp2t;Hly3~Yek++P_xYnv0;M48vA&QOk(iUjw@fPiifrc4qZAr zQy;E6FgE0kBKb|96pG{vnFDw35x!w9$wl6I%nYM)`qN`ii8Z*8NemJs5S)9)DrgQ+ z?$#T(vUELrQPucO>xbK%sDjC%_hRBV0dbl7Q*<4joamJE<)i1^i>S9x-iVh6RewN1 z0r3t4y7s!=RDbf(zHLKL%iJk4U7qQ0iYqy1JWYR1sYz_dk`I`~^ezVl%7(aC{-0uG zf-tYBsEg#}8`au7ysRpD;7GlT!%FZ|N&WI*TRlqbp+R@2OxN9v^;q&Fx5*w8^62hS z{P#Uh$28ebhlcd6Hl3A{tKiZq!T!s*-*$=9D)=di@(=#4C@+8gbLY_{Sr1wX$YTfE zm5Ayy5i4Xf3`rNsVOTkKFZqu&_DWBB<+}Yh3X9P%fBV|P9P7V8t%`rl ziT)Q`uV%FmZ4(JU7bEzBc7|znInR|vbTpc0>|&%D1o=F^$_D?Y--jFC8S{TmYnJbL zP(JK@$^n-sfM`B*@awHTy5t`?#VLzrPa%vVt(-Hykkok^x0y=udJV`MXFNa^j?5&A z&v{DYDzXBTZQ20OlKn-9Y4LcJfH*uh2hrx%dB+47F~*YrnHh6>-+S+SfVouDbh}~ob?`Hz|495td%Mv zIu_qs?)&7Zb31<}gJ)9$WYo^8_5fG;PXpoz!c){rX75>A2-eE_34B79oJf?(!x;Al z*~yr>1m2a+DLScXbVhAA^8tOI(n5r;nVXJQRt(mpMW7~n{476|2$IKdZWjL_i*iEZ z0NRIGg^eH8`YZB+?`qmI4Qvh4k((SUTC_w^7Ihx9!({H-dJ8H6IqEqE+o@X{kX;9dZL)-q% zNMWB$*hT3bov^pDQC%%JuwgyMarpjC=tv8)Yz*<*DK(!Bp|GatoDkd-MnTM(oZ8vS z^=4*WTb41>I}Ww2zs(yc^&!5PYzZ0n^dy zI7Fh!X%r6P`Q0{4VDvk>W?E6^8uluor058c-an?w3qC&gipB)i+29Ku%<6|!kKB00 z{aeYo37rrPCZR*lqTlf0u%1m&RzF4@Ww{<>^~9^Rx0oj#LLXfG_lJGl8&O+9^=$Ls z;E8fvYHBM(xuJs3bn-5Br+e}Ij6**8pN@@1UPyu^%8xA;pAVAGF^EjGY5dh*cjzGY z2%hdD_f1GGgjSw}Z~n6S^Nx~-paEskOmv6)Gl*hX=f8WWO-gzRIBJiU@^Em-zFyGe z3ANRCf6IYc=qTa3C2Kcdp8Ip8s_Hg%SDv!u^?aKjdU|^Ht+_mAau&~8&$SWJlAZYe z3wDHtzi7PJOmqTxu~fOa041)P*l1aBig+a*-HfFJMaoW(FxA81CcT(l&-|asnG_T6 zMc8|j75BkOB6`*D&f}SpR;(Zyr3=lp`301_Nurb(wbs2FZ8K5dE#qY0bT~3aC%<3( zVT=1uraI5FgHvnl@$hG3Nv7WmL2pEakc8C9*F>4fW5CZMzLC4{5dVjRJ{618R!I;* zqdNIJJ1(e{6&2Y5-L!Q=Cbn81l^vq`J`3p^Ru%9~dLKNnlJ2d)hq(mb_P}h$x`0JL z#nt@v_`I0@z0MEUL}V8Kq#!>k7=BOl)N=SAH_eWn4_z(0R~=1VJE2J1!HGTR*PBt_ z2d=JE9xtG|#NBoLuh`=MLw&#P=VLOJ+lU~Vp7o$ILgNSuq9Y?KT3h#kGk!5z4$z2( zF9F8+4yS4-?-De%d=J{Lc%`Vc+nJYH^3WplcMLB$hOy#wB-+`)y}eZ>j_+nBggp#{ zO17*BZE=TF82c<2m_Pd&;?cv*}D}Tn$3x`X7^)W$#yK=Lb@cK~>bDq0jC)T9Wy~R)B(yU8>sXPQs zPph_m4`4q^*B8?3<9B!S{3rdgn|M>S8!NsLuR*x3p}6qDgPQ|`_8161Bt7TGO(3|U z{Mc6!wCUHSyjiiwwJD90@)x4r!bKTcm;o{VB*tE>AD1*A4TlP;l#;<=yy9#(d z^?!MJl18O5;qS3+5kxnNy@N01Pk>%DKo80xzR8UrrG1p5{BW z5p;s`AX?F2UEB&U4DGHfLm84w(T`0ze|=Vjbr&*(Y|CnzEsH&;=89V*ksCf-RWvpb z7X<->_9EC=oOsRRhgyocDlJ7xRnd_?ZN~_a zE4{T>Q`p>Auu?lmhiDDNqZ-$KcR&Al^xfGHDQV9PDZXFPZ~isc?Khz8XtNyfK>#ZJ z;IXOazP_oqbsM!~`~H)MR$Wb*v@&Qf`>>$qHs`&=Tlf2tj4(ywnJS135b6WV4~rE+N7 zTZ!HcqP;>79Aj#%?pbHRjmtUL`Q|YuJd7O|WmFo{U{OW(=>H>=vbLDD_LrgkP}5d43C zWs)!Hr(xi8|0J{1=m(9E9SRO1yh_fazSm%oH^tIms$t) z&*yiOIoNqkcl?8?{ksb6|9xjZxYosjjrMWae@1J^YY~M-bY!~d{R_$Mr;$|OmDX1K z{zdH`Lz5)J+JA4cK-pj3yWOO1dojC8Gu+Y8udOs}1CRIpJMT4{V5${DYR=52!vW=i z8rA$^AKy;QP1s|6@zuRcY95-VqpE*kj6(RinR{r6K+EC22!I+8*a--cFiSW`2ptP? z0MH3tzl%!_pQHp>wlb103xee2f-TJVSvYv-#Sl3wE_tS@c(+;}9Nh!wBwB5Mw#w3~ zU^_m!`g(LrkV&W-=?Lr=6cMSN^PojM;aSwqvp?XnfG&yFY12}NA;Z5ZvcDGIIGMFD zR+YVM`p1sKDlosWusy%{-t)Nr$b99!1dMe8bAzx4m6%AAo!6{Ux4_qe9}mE$#D_Qp z&^cSwQ&mL|knFnsoqathngUxu{2^%#Dh}XS$5S*zLaMZ}wME1W7Y!5=evl9{n`RXx z!acI$!+!|Nn1ji~GLAzUNJ zfv-uFHJm-rW@3BxhYE@S?s~>@4Ye{Q+1ZHenP{KU#@~?fX>1rB;=cpcY;b4hj|$fFK+?$D$%4G0h5!bFh#j*61w6vfPWf z0KGePqXU+{{x`)(halKS!IGregoc&-(EmxZVZ(8MzW*NeO_kvQrrkC%MuivNoAfD_ zJb4Y3D&eC&dq;|ed*^&g6BTRc%Vy|X3e~2yJgMjrM;ZW55p`jFxp{ptFvEb1aJ!7! zLYH{1eu@vKqB;7eEp-mFaVl-Il*7ynf$**Ijmh$}$hMlLD5NS&fmX?Y3n~p!pj=Sn zmW+%CkpmWwO<6Kd)U+A-4g_Y&0W7JDagwluk(-u5b#iiY@@XdtHC4E}5?bOK2izi` z9=ZS3bMIdbLlma|@m91Ii(;glPZs`hJ|v7|YAeT)@U8G%aV*#IOfwd4%L}ea`M_FO zD2(NUPV~b^oTWD%LG+9cfEn7vj+wBJR-zaXAAu^ZVFSQiFo*Wy9l_!QRn``H6&FyE zhBItDKd8lDHkt50!xZzyf1H`DycJ`!_}ZI^CZs>2>ri{Gn=am+F_w0$YG(08bto@6 zgaJzoBW$p`$uIROLsue>*V({tHS#!s%hc46XQ5}BL)QDh-TU~AxtEs#{f=w{M}5P? z=7-W+KXD0I?y)Psn|`TaH~MpGY{cO%5L6M@rDU?UMlM-vKlXL0te>|hOF*@FXWg-z zwXfRW z?L1<>gCbR}OK4o^Pc~4vS=y!T_*RtBD^Vj;`_E?aYY&AkUW#>E7@7@jIT{ri!z~;r zDDzj3i1H&(+rh}8>gD=Xt5<{Q7$y zvL+InniQ>H!b%Ogu;96V98{yDqdAIm)6)jq-7s9ll^f|qNF&|cnd1WC+Wag6qlYzK zX`d<`{)=l#=#GL@%1?sh1he!|k;0?wp~@!>t3_Rx`-4B(&+3luYk#3JS96{BnjGKG zEs|1F_MV=tiBZC?-Z^wZL({~- z;7iKIBu|ODx}1iW=aZUFon)H5F1Y7`9sW7LBv$e5!rcCKa&?~#v0&ZRoE~j0t-~VK z6V>Qcy#k#D%oo$-sP$PGwHC8 zPo6iCnwnV8h38{{!WEM&E#{94uMM3;Uz}}7>yhH{C-Cs?_UFvQ6g=0-zn-5A!5+#i zLG<**h(6X=$oik0dzF4jA?rcsyLUHX{^dVq=`+#g64cV%%(78<{H4Cq;Fg@7rD|~5 zjEahK^MiMACSuBYXK74FtgCBJ@#`?t#%nZQ(E$eltVxy^P4_54NXa)qwA>x6s^Hs) zq4O}C8sBtq%HQ2R7k2l$Mn-8EW#<-V)3TFVX4o+n{{a5 zfsgg!Bf;>)@eF+tnbTKRA89B2HX$xv!NF!{@rV$*`z{$9=LusBbdA{AX?*&vVFobr zl(c=BlJb%H1M*p!o4eh$OEmP3B12}l=t(4cn?BQsk$r_ySG7?pHZJQ3_sf?nrl=od z%zrtI9u7Yzv+nHCNGS}QQZLLmW9fFeQ~&w10r5&;#aj*8m{znz&2HN`b^~J?(TYlu zx4UxXr{6IT%!WL*UCon^UsOcLTg?61u6uu?YBppvVH3F`FDz-BVLU$7W6UZb<6mK_ z=j(s|7R4ZidB?S^IHQ!Fw^t-m(La7E_F~GDe#Q0jTLo6-91`zTPycG~J@fp<3r`R4 z2%kPKcJ}O^D}QZ0=`|bY;OXi4{!k@C5eFNas>V{Dt+yl;6f*F8GBbr8yx#knWy0fD zwnwkq4xG#=m74!+e77jZx12U9uEmDrT*~-Iiq*H#>Nk(A3tD=gte-srZ)Xe@Y3b}t z#XED@-1Kvi`WCPXCiKa)9xdO}(b18DG0W;|m{_t^#xyx6tGB)VN{kBtd)lwRZ9*MN zjpTBv?}y*8kcR%FtwW_NokblEMn&hsTl|Av932H0NUIpY9Dc#lGQqO`(#4Bmcs=4| zUuFEVZ~pe};a<%;sPzx@`c5byI##1O2T_*gzji5&Z6**jKOukcKj{L-uT2)pk88b-UW?$tu_*B+m!3e_VZOnEKp@bmzWzV(huLQ5@v&g(o-fnWc?U

G+>ZgSxk2P+cuG zJ5v|yC2yK%!WTBV+#}*tp3}+5z%W1Vn;^bG?aj&@>mq8VQoF2==q7fXkJe=w%N@q9 zVi?>87Op-UtY%QC{$=j>k|1D|%U zP5qO^~0Rg5cke1{qU5tPeTKrOW!GJT> zT^i}{rJ);t$6HGAgyK{m^CS_>&kOLRmtxYz3u*rn3>jJ(Fk7{5ocm~{jaS9h{k2tk zm-`J9BcqEaPX-+Xv5%)^w~5~hsQ@}1d^wIRDslwN{xZchl9m?Tv$wweotxWqNra2Z zsN!*v*0W`Az&MvoO?zHDcb$7>;%rEjwz$TDH_STWf^zFo0j;7Hu)10WBQc;|F$}f;T70W>!wosfaOn}Jw4+cwP@yy!`eK1%N%o5 zO((s&I9^DcbDF3&)epcr)!J*-a5813^Nu_9z0LSboA-(;j=ZZv;UU0^n#p7YNwx#k z3}T&kPEkiBq^0H7S?9(mXe2%iI2kZ5^)q$XlHz&BhK@NW-a&~Ga)FSp?f6QRrA2~& z^h;gej_#B9OiwnmwF2d3eqrbjDs&G zDoUVJDpG9}-E6J0*uM1kUgot&;kH$D0%fp_eHK%yIcBn|5*#fUP>fU2@=Cj+V3ZnP z{_EG@*g6r-5dY52%d=wik1meIvKNjZUkx!3kJN#8YvWH3c^-Xz{fLClxv%^sjkxmF_-V*(ryu810r%#JKO3}C$ zW#d(X7^Qe$L|DD**!w}O;1JWVD*HjWqFut8o06!gHj$Jvf4mS)|)t;S&`^glQ?tXRuC}3L- zKE_)oLiW;%*sYKHRFOw`^nJLO(<-DdV@-s08_7o+b(wrzS%&!poG#c=RA)r&snw1S+hEEgkh z8Kj4at-S2)jo3r$UnrDh6db*lDtsRC@Cy;{vz1Lp2<8R4^0XNnv?BuxZD<=IaJf1# z9r946I~gs8cCN0Ci_bq=rSCn2L;q$jI!Gz17K6{{om^%oh`U6|v@Ks!(wlx8ZFljc zMum^79*^zr>+1_CcOBB#TY7$UDR>oqae52?#6!EUcSeLCwXMs_Tm~0#?DiM92;Eka zK^Z~*&gnm72Ftw}4I`tk;uuo5J=!$_DG$sdclpQAhYvAw5)0zIUgxYQQpOPP2cC&S zbz%-)rOyuR_L=HB84bA2-pQ$3yC*3r3GS^Z`REuKIVc=FBhVR$Y@rPGCOPehaW@R# zJhFY?C#;uK%^Qu0R*`2^XFqe8?fBa8z>2b8Fl%m zf5R*=XEa{hWskFt9tNkrTa0ABxaa-n?Ht_PLYGL)<;9(61ot#yShl2sf=P2GqS+`* z8yr8hLp>YYt|FyQd#cp`Op_u5+k;BXSVT~LJ~5Xa?d5QbbN~C|_;R`%^onYY_s{b1 z{#&}b9EGN2H~sxC=oUMN=k}?n@88jWbvnxeF?N(Myvzzl;!;XWO^^z77Nn3pWT_n& zw7(b1_|B%cm=3%!3g{Y;c%O@s1iA!5EPH?0`T2EC$-3jTaT?l0kV?Qa&rfrC9D%ql z>%TZ{Iw?V@;_Q9< z&mSKCZ~cMirnyiWPB!anPIB^Ho+;f!gC5`B(s3WVs_gC_-qZ1Ze-efokFFER+7WHpEND@-AknR$n&-)6s%Fe(;wk zv^Cg9@0WWLI6?Zd5;ylH(f441K1sXU@Sd!&?xs`TqfNjtb@g?LYizZM4AfD_tA9~} zy4t2S%Z?HTo`F)oh2us4S9ez$*7Ut*(`&u9wL;Ze1%cFkLBNXao6AK61Oy}~2vHGG z0)j$-BqnjRmRbcW2#N?PLPT~2LSzZ4+723)ut)-dBmzPRS&%hmzb`Y-GaqN>&bQ7N zeFB=~zx{sid(L^!$>|67qpHb;th;I?qnPiW%W8I;Cxv_6UyeAQ3!cats8W?0n1x@^ z6gHAv^uvkl@py3YyQ)L!8byWeXy&Ew1S}+I;6s*{9=}p#ES;<;wM7#gNkc9t*)Q_R zGk>m+Q(II*m}=lX6iCZ;ms}~+VsRsrbh%IsK|M+dcMkT+jA>-0D7zG1fU)5@U9|;r zTc2m?oT;g);p`*d^}X|a`cT&gW>RSCc$*W_a0*uunMge=3T|^B!kHMlN|to^dEA0Z zCvK}ZvfVZEqy3XgHbjgD=wMphedwO$4UfFAp?kQ%C%N71% zt<^BfamDPoy$Po$LyZi11vOU&8;pqW$Tq`r5!i4iyzuDO&7F}nIJm|@U~{+4ns9@K?*0I$T*A`h#+w4IK92I z@5|J)3oGV&r>3A7%GaJlHw=YrW<}LK%wH*i?3Ne82>(*30<=LvO`uCG`WlOc?47#K zHdZ;4$^4{lbO6b1S@or{Fd_W@V8Uc}7d$%CEB2nPs;r!Z%NP>k$Q)^Pa&kg;oGL${ zyB&MBi-&5D3ZAvkuE=o8fc>v)_1CTg`tPLY`8k*y`|Mff7k94lhb{!hpl=MIE#v3 z!C*@Q-yo}`BDf+6!b!pk3WAPq@>#V?d|b4N+GlQTY&`4x8`a%hTyM~ldH_yOPRSuW zSQzyw)6@PI8uIO}f1C&oqQcuz`@~t|`pM;{sWaCcomL9-TfBFZg-!)}i?>tVMJRp~ z*1Iar;9_#5`(dlty4Z~-(bTB{X-##tZ=Lxz-qkJ5At^@&O27VdJgCjzMKPR+AGvwR zC@nnoAbEBNdG`AaLnx!K;uU6)UWL}ie9|dDM-2Q@zVs*)rWvK+VX(BO6ACET@ZTIg zTDu%fln^nWh5 zP!*+^Z(O>&a>B%?Byu^&u61UWwrg6G0j`}k4i062?o5Ho66#XazP#b|Sn1F3ZmG_# z5n?F!0jQCl#3$z+i}IM8qGlkNNq<-9$= z-`ctuI#mFzytCjvA%6Y|!1)%X8|x#U+=Id!8pCOe z=(QIHKR}pG#^}P$ads7a#+s0tmgRX$aI>#EPqt&j*c#BtJ-?g8sS*uPE0Z<0u2W)-)eSO6O zL3jnpr;$q@7JB$r~A@7GrJ~Q;lYZ+3ExQbe) zdTwhqKj@Rm4W$>^6@-B|;dXGLwy~F4QL9(WBRA5rwa&ECy8gt@cg>7g`Iun(bdsn| z!i$`$edjQmV)|_94(;f;0|WaeZI6Ul<|Em*xJJ$5KG2JJglnqXqE3}z7!0ixhxLmd ze9HI1hl_p|GQRmtG23n>Vn1@o)~mS8Lg7V_cyutq$Ei@*42dKnP|+f!9eqtJ|5{t8m^PVhcpyR z!z1@fvGICAfgZR+kD;bM2a+bWCz{}bqum?=p|^>$F=6C-@tr3`FPaj7fZIGyrNp)H z*x>N^-nP8KuCPl^ihYDU`0h3y0-q*%?LfQS)j)=`(rR(v$QCA}{Mv}E`2I2%;iBzjdL{u$jZI4bhzX`c zlHGUx1Xm^_v9l5rzk=WZ-aHpA66uG_G%sqxNHS4))Ku{a!lFX4o_1G=B^S#Wtav|m zjV5{AB$Qg+FIUx~xh=EN9E(yupL=+2ke{4t|6rhUG?7zCTpX{=`x z1R+%!^t&NDjMH}mYXuaEs`~l!o|Kbfz`7zu?5>U7#O*j(nn309NjAn~yDtVA1%A7JwtkfLVTe+7et5K+y}%=Ft|AV98N_xR11BCVqhB zAVX5?5ZxZsg(Yv1&wBHoX~JQV3WCH=u%CYuvy6$Mg>GH*oEHssH}Gh{XV$w?>@Ob* zz{%t`4dof1u3(4-5NVs{!6%kujKr#jXq604Y8|sD;*7Yom^X9${Z6 zNNOwcn*e%{E*o@ZzbU-$Wo@@X@hhli1L3=arRBR-gfnLj0B(|zRPt(7IgN(xQ?`#^ zDO97w!uSb8RSoWz_XDBs?NMz1xW@z5MOOED7cXEA=Ls;R-8 zJ9h{?+c+r`1EFX%-SU0&+lme#{|e)tWj6$7hUOgI3cO`Z4$e9;Qd_;6B#WW9w1C(^ znx{+dvT<92^t)Tawyv4!%*+=$Tmjo9_sw@LM9&{dbSPyG*;-TG9}Y+dfK8F(X90`g zCF5{|O=-D(a(UC+@hf0)f7v-Of6!3r>|BeCiZa1B&jnj@Gbt6xDp%7kd zu~#m?aB0F*&@r;X$Y`b|K?SpzfmrOqlZL^s60>rfF1}c1P*aM1-4VU_;-JV5Cf(uo ziEk=}d?=tizKs)M&n}Gie>X1eGp_-Ujy)I(Ed2nt)@ArB{-o8^_yMvB1NNNPhkSg} z0lXVj0v%2qJ+1Jb zG1o`MCRHtl2oHLUszaLhUhbn6gQ>LJYE=NFazu+0GIb*07M0VUM(Ia zlg5qwNh(Sa+2nXFp^St?e@fzh!Az!E z+a(af9+IcuHBQj{vISAITO44u6#aZEY6|8YavmKyGeGEUxWc!hb31D^`Qs^7xxdsb zz;Sz(_Mxm`82}>u-WdKxe=-u*C*W}K{uUS9E?)25t#jMZGRrcDeIIz!ke)!)_Us<8 zA}=>2P9Ao5oAx(Q?7ewn^2=QcaWjL#Z#p_ad2(!hy{FxGw;g;Jp$Y^(0fP$;<~CSm z1&sW-FLAEpS^R(TqVAFvH#_saeiF;T`!VT5GhBlYJ}+B{7dSM-UEq}jU}tAY6uA}? z8@t3Af{e<)+Xe7OM%np$>aD@$7Q--Icb3uVU~7xI7aWMBg82vLi?Y60e z_+nTU-h*`I5;O<~B(fq`*e%f+MxCqVVP|8ASDIYxNInGu!BV^T-K#s;O1L z2pAsb=U3%FCHnUG4*0sLj7&_DT1GBXg6|#MZhG+Fhz1XYxbKzdEgD{bC$TmEY`yFe zX5(c#)kPMdoM}qVarA(i5*%17=PXSO)CLzRj#yR`D$iEfffX{e$tHK=cGds($rV`NoP7Cy_VhW8R&}0d{|M2Fn z4`bI?XXZferMw%4NPQymb(qgd4amOZT^q7`?n$xgrajVdEgc3&DZsSe9Aew$BHzw^12NI zvG_&G8ED%P|H-KDUHZ}g{NmX!+MV*lB6<1zn3JKa+k#aI8naWQ*2a6ZKp5X2BVX_6yqK9WP0<(U z^ll`63=`iVlRheg4UVcY$g4Vmk67fkOQXKEgNoLl9}&7W@8IjwR!Fo{HQr3sUD-Og zg3i5W(`RJizU+QdfR$EUHA`2%Z&uCq=|d>mcRxrfn7S^-yasu-`I}UJSU=00g5sx< z-Ls$`b_-r0x9;+csn8Y)HYhDH&0M|0f+(Mjn|SpZ;#!uOgnlqB{AqsyQX3n1xPYuf z>e5}+WsX5aahQbt+)wjRr=h!T_rzB)Pi0j`-o_|IjqnK@nH&2hWJ+NFeL=rB8ShQe zo+#kCE~d7%BM`p}1JODO@+eYsl%kstkB&5Sp84>^4mb1hAVZfzHx(}ZxlVhMR`Lkt z_B3FOiEsM&_p%a^zRg7}CgLlmf4)T2x2cB7%ipMoo=)2H>)U7kzIi{FPLOe^7f6A-s3D9>+U(68Ttqm`CU-8;3bMXN*! zS4-4PC2FLT-SFB*6|a}5@zu5^MPz+NMjRkI8fT6RCZH&#YRY>$hB!Hvv5CdhwILnQ z&Z$!uJ>B}}$n~QeChnDR^{%CChR#pHB|N#1=P4T2YYMw)9!b?M=Pc;@2I$_e4MiX; zjrv9U__vYrYpiLz0ZncJd5++ypHSFR96-x4fS0BngwMP#ExVto^=9Z@_0%;0k$uzi zzmu(?o+JOPDlhNNBr(GQTW6coR!Xn$C`>&BYzCnKs1&nMXp;+Z6GkrD`Mw<9@?@|y z&nZm3ZUDxFi(c+GXgerZYXjcGlj;238RE%2zkZ(Vws cHLw3{PfGc*=Andx@I!>ByYD}$51qOGPijZ^;{X5v diff --git a/windows/security/threat-protection/windows-defender-atp/images/atp-av-scan-action-center.png b/windows/security/threat-protection/windows-defender-atp/images/atp-av-scan-action-center.png index d980fc4ed99669e1bc2703e97a7897c6380fcb23..233b126c5b6018f3dec80ba94616ffb2d4e6d125 100644 GIT binary patch literal 22272 zcmd?RcT|&U*FGA@!dQSA8wvvBh?O?di@+#0lwv`85fP9Y1VTv&s58Jg4xk_)T|}Bd zA|;^)R8+(eA~li#5fK7}5HKW^5cusl?|0Vwt#iKf^>zL@uDF0ZPo8q$``-K7*S>b{ zUa&kPxk+{t0)db;JA3jH0`Z*>{6F&j1{itxr{^~Ku`%$heJ}zc^;-OYO^ULV91Kc? zm|2{X_`G@jwyn~8v3YLahECaq97l!RKn5X7aP4PdXiEqTo%9HH5AqHS@kRz9wr$+I z55_l%$4!xe5kcNwH$o6)((MK?D)ntN$iq#1=uaWu{vHVJdFhSt&PMS&myw$AC z?0-4T6zT8p5fFk9w5K-1*aq=o*4`n09*E-Uu7e1~PYAP<$F0M&rUs+`l4IQ-TRdaT zHRv}l4*9(z@<&drZuYF7)%f*8(+*o{VOkYNH`zfyVgd&CeAt~BQF_$V_E$9V)QJYx z4yEJY2l#2USFd48ZIxVlOZ?-xykCuk*%v=%h^$PS3iZRuYo6%*`0w)lkGSjKynfWs zaCUGFHoBU5=}N^r&zg*>q&X4dj)hIHu<6PhMQP@I`J{hqqN3|!n^n}4)y2d=ze6B? z4IDUP*1VY6ToUGrbt`4S(5-nZ=&v2OcuNqFeT--8Vx)||Qk2Y-L)jx3z~*B^Ue=(|53gI)Y^;otlSihWvl znV!3+SK1Zpt;zWOmEEvf7d4+~DJYACt2|}|UeJuf&YLj*3ay>fKnPx4j#Erk!VaG= zs;S+NKzuqKL^)nALvm@2=H9kY?+#ylgJ&~}atm9f;O1PcSjE{9V~0tE<$M>LihyX| z`>?rAhDqV5VpOy#!(=utw>#Y{C&*|%Mm@VJ58d5yjQ22Sp@r&?(nKI?C-_>$&Wnpy zsQLx&cRTuIWm2`4-pMGH3vl8m@70#Z;znh-P5Iq#qKo2!R~x2xEuX}fvd7ysttRqo zqRn#`da(3aCbOhDC%1PlyO2wnY-3M1@f@PQa zR&}wLtg`iLHwAR(TLk>-k;k+m(uC}jB^sLt@QT~TBIs^8-X^%sh?>?r+X?Oot zExb)Vmn1M=FkJc+XIy66%#)-Um_+jTW5O5h*z|*5c$!5 zWq6+dQW{(9|HINE!=xh4!?1s))73v>x>=jasihDeN+MpwkHM9dCe&BTieZ}SUVZe8 z(JHYzZb4sq?l~5+IJh)2D$^VgR~0&Z_)wn@6T8n{P%-33QjtU4V#mAMG1~7R;2$kE zbCl_8Ush&Cs*RMiNVAbH_Ssh2b0xw#FqEh-<9rAFOV`zhTuBTiaO{Kjmd!+E#)5dN zl}%PBV#(a6X&!44fux{V!s-Z9gkM@LxR<%J>#6F3V{U$8WF9xTPi)`Y6=Vg@g1c6O zUar}T@S`YkXyqs^B|gb%+n5O$U04>CF#nR-c?P*^N5;Ne8Hrwa^2)S@rWH+YFXg5B z)5Ew;(RqqZOG#|vKK14We(J_m-^F(vMc;Jg8hh~_goz}wa6o#S6I8cpc~4TV2u}m-+MVG^WMN&vi?UoDIfL(N5k-Evu07; zY9?u$3sQCU?EKp^bTtWx0(UHpyfSz9Ed?FDz0o^Ym{ymt*ROQ-^>zf}g+u-Bp{cRL z+QD(gm0aH#E%5W~mv0nTS-7#s>CXks3~s=Jnv7BNB(E=eMtY++xcS(MoXlod_Cs8b zpcwl}5&Oq|2rJKz8*wf&cI$qr>{(;o;M*i_Hy9QTZxXLE0Zs5YTz0O<45`b?;-BryVU_4uWZhj<< z+#g)kZql+P4b2ifTC|Kg@iMBzF*Z!?;bHQ!W=lfb^-K5e-Sg4O6lh$|tw{*whto8v z`m5<077V%g*hzl`1F^4pz{g;u7(-?VxQacZh?Y zzAd3(*H6OCzaMUibEeAc1-^)ya&D@utPEP18BUQ<2!9c^Jf5Fe|6T`0n(I2>lt|Ix zybtaZeMz>e@8hLbVdke(`BHoIK3qzxSzaq4RZIWmSCl*-{>UJknr)1w2gH@ojC2IBKdx$b|4=B4Vjp*yhF57G8Fp%= z-d-!=(2>IX7@n9?!sIUOE(~Brg|qFsvrhK*Mq$1r-F7r7QgY3U_^C|h^4NPg+$L(F zMKRQg+jcP5Z_$ORLNyjny-$_I#+|R7{3IL9 zcd$4I4j$x;E=IZx2ig@`W+y4Bs;VB|Bc-g6$Y7U+sU>>YJ2*L68)S#3jFizHWo8DK z2hV&uuANCix$@JuCW~QfC zFIe`>eoEtbZGmO`-G}yF13OF>=Q^b>ja*_&OHHf-1sviQ}*tZQcGxorGfZRfpSukL7`J?m3K z3zXVnX>NWtDK#yPc7+wQS!Vm)lMXqFts|RaPN=R4Wj0}PtwZ;A&}Vbj^0JuMQQRN+ zZ|=$LH{!Vc*os zuyb)CM*pOjE_j5deV%VQo&K$dxw?mD(ZDsI2C=oQZT2<-JuaV@GwTL!<6IpJKMW`3X-mQP!|ApDpb zxpL|`(Zvuh{vk9|HRW7M=ZzadL0wV@hTMlJX-l6!KY>egci{T{Z1`yBi4eN6*U+NP zV9wfR0jf&m(28MoWINNCX8D~n{<*we0XAnhy@y?i^AgT;)0E`(gHBon)=kAF!6HgdQi|MIBs;oG1Wubm&h)7SZ^rt_H@TfhgJsHMoq4h zk{A<^;H7(KM)tc~ad!e7FzhM&_k@l=S;8NwxU@zVW4HN5n19 z@b2ARjjb=YsD}kBv@aiG?TGQT3l9wZ5Y;hNR1wUwWCj}<8nV%TvD`kP?GJQ$q%p)X5Y^Vm4) z&70S+fB*Tx+18vQ{!9mx>{$hN9x6I;OV6}~r+3!&;0lKN8eqb_&YqXs9CM=8F{IjXs4#x)$qy`J`&5|qrzd~zQ3 zKT1w>Zm~S@yM?)V$a3ai!NI{`pSXML8e4q9mhYZCQE;ivr4=)pQ@ym_XRHsk#Jf@$ z=_TBD_jO^@uUqf_4)$|3%@t2`7J8ufQuZ|4sf;yPZQi_Dm6bQRTnxS=#Go8a3gE7S zqrkd8w^J$nO+uPDC!4-EpsJ(fa#18h!^o%{9E=Y+UDJ#1^5Uv>=@pt09|BfvTpVZQ zLb(m0v2hA5`LufiwR+`lOiWBF+FZT^Wgt(5Gtq+w4F>TzMOd_7k^Y8J%M0&YO;&DV zS9rP1NurZ&dsYo$%x3)+jdW`*SrTqF@=BePO^LNbuoU1KT0ScWqqbn=bKGMr*Ew-7 z=d@b@CSM$9*w!H^1^7=5se^#19nj0zfyYs;sQ+I4EX?7Op1zCm4bM7?9~H zAB!GZnR;hK1j+#+)x015jc&O2&vZjQVek&4`6!bb3Wp5LHPW_x_#c64J(AmcRLGZ9 zc3xIXW1};zj}%^|+w1u`yf;tjDLZYxb$1XTzD3Y{$e55Bp~{_Inl&_6p!1(KDF4PZ=In z_TZbaY)9s#V>WiPPgPYF*z2FIBY&R!IU_e0X@3xaTe>-&M`>?9k#`lJe6GN{#9FD% zCE!GE@L;HES&8*Icy&##(Ou=1F}IXw4EMr~`{^()rPlZlh2phW%QN}e}`Ww%)u90uj>ssLrW-txlK1uNC&4ABdJxKJembbR z@rzeVufS{n){R$=?7$4x)#(>>dz)3#+OBJ;j-LGaLF!%`a%ImAEiGf?p^9=%P0i5$ z!Ah0$+qP{xSJW*a{`T8%axTnu>oCuw}Mpkxq_s(t*uweZNzco zbpB0B@VYgK+Vn^Fbzmong!9U2WWH+I;MWvyWMqxfO&5UZ1V_#dtn@hzy#ckkY1jOxW1 z7xZmbZ4@@RwOunIHcHyPNfL<&tE$OX^j;W9{=^Mmoxv#E>l5hz=>8+V1 zEYn=iN)dn}qulq)aF>GVX3skKiU5@MvQf6#o^qPal)85ApH`6KVH-x<(>0Bh z2YycvUDGxfUS1gKNl(z~FY21h5vswnU`N=@A2e?=BRrnD(YM`u16!=Gk#wer z&s%H+Fzbx6IkLk;WA~epn_%{|%94^2Nv3G$A+Wo5gNSPs>BbHM6p?pT62 zL+xecqL{OJ_~?h?Jacg0{|Kr2A9JDqDeAVKK-*!LTF~EbPYZT;cL&EKUtZz8*NqnOX()z&&BQ&|%+G4x21}a2FoiDEJBhSB(>R^#K}ae>KE1eY5kQ%|8O|=R3E`6FCm)~Le`eEQ)U*TU z9pZ8F>HNKB^&$a-!!kc4K1aP83j*fsn9df2&Q(T*d#g=sZ0ww)t1y@*4jRpecN|+; z7(v6O9im=lxR!dJeI@+31#1B3bUu@)K#1F4gJcHagW-VsSc7)_Rn2wRCUrSSr<+%! zoa=(#5I6!3BgOoHGv}sMjBKIp)C90VR#9KKnN^Ynay~~%-a{JZLc#Q4X@7rzf^hU$ zg6GE`OysT1^x%)(jc4{RHpSh0bL~8p{_*3ZsO1sGnl0H;Q|^l0Y&x^H-u)Zjt1$A=bKGmAu<9kSJ+jzkh`r+{M8$R zM*o~9&ASYSGW^Ah5d!Pw?dNBnV?w{sL}T+C`H##r+M%8C62>|Q>&L0D5F7W zSR=54HG|QsqNMB1$fu=T46nc9`SZtT6e3Q-h4D{&6|ue)r1H*t;#CS+70nByVi7M+ z^GBaioz#l1Rosv`;`PyiY$EhpHBXw7rsS?JvjmkKMhzQ`sq@8)TS^l-nCXj<%=y<0 z9+;T?Q2Ha}E9J3zUXPEORwbIO)FS2De|RS!HsD4r*K}Ry`RL6tnZ#CpXJV9f(j3_M z6SgR%oHJ?vYhQRyvN`$!E>qo1@XPS&N7Aq3^#VWL5)E^f3$PGWA&5=D zTm#(bZc9GcpvG%aT$zbwRP8pWW-ZqAt@HlmnM59)Qq&t#4CwMv$G~wfUcAs=UuGI7 z)o&Cu*18Sh7n`$zAmbALQhUG~U1&UWTl%BXWtg@c6>`^n)4UN=BWf;R(JX0Y62EdT z33F%W^k`6BszOEhv4H3c7}i@Xm|$86>f^!=$GtBWb7_da}?#5 z(jQ?Fs&Ylwml@=Samb0d4wg*iuw4)cg=SvHuJ^|Ht^eTT(%FSxIeQwDG@D zYypJad-L#IfdLMvkB1abj(?v+H0f^`TIV#>6Qq03!@kiN?_LvtS{rZxh_QoKIo8J% zn3IJF-55We($P^5ATdHn7I_ywbaf>a78UI`dvon3#lPNOA`^e9HUn+Sh8y~B5_`%s~?7r(&_7F?WE-7uT zFgcm+VYo>0&SD#o?>~h!4ua=RAtXlhj)wSQ)dsoj$(nCiPcT9-e$>d(GRTe#x2JD>e7s(;V>}Hg9=KBYv7xUHRtJ&+x&vB< zm*6>sDKX^&4+bei-i7CJ6rftkGZ%qP(#hn@J7{uS@lpIzRg)l?S<#|TNQ@1n9Z7(0|9$nfCAPA=2G_*Dg)h=@0*k-$L?Hec89HsPx10$itNa=%An z-j7y_MtaL?Y=n*NfdxFmaE*mdW-rhvJ7r`z?w$z+-ld1hjzn+xbk+QuhD0D$QBGO- z^IqwmtMqJNu5YV->(rDVW8~H+w)cf9mGkkZTc-El`<816?u})K4c!#ULf%myK6~xF zKH%ArkrBZNfGXyFH~UnerLdUMuZxXaGz=xj(ckS?))zw$#}`0NvapnZN-CCM(E z)}?sZ%PJ_?80UtOa^o+Rd|5hr>Ckp-m7T!a?YMi=y4=PYkK`$Y#AbrMGZj7KPn)*1 zw7?3&ho(QiJy&q8rUf5Xf8kJVRB=YmS3ey#dMGkVMOC$*3Q3D?cnOUi+5qXjr>Cb* z&w*wggBr7?@AxBxGL1Hn}SQYM(Prrf#?MH=kV9#|TZN+zXV(79Oe#6HuY zF9mc27!YnmLr?EUTsTr*M$O4?e)f3aoK~@_y1McnsfHZDEOFoXI59=YKIMR?5s=KL z)F9ZY%GWt`0y(Uf*Hd!Yd49&JHt@J%*!06{*X!n_M-VS_lQc&MnU1&ptCC-H&0 zWd6$NaA3WhfVB!mo+xr1fYb~(vt`}g#hcger1IkK9@W?PUX9k0?d|I7${0PJf006^ zo_CP+%e(MyKF&!{Xr89-+B7BzAu|}0k(9DGi)-m^!Vv?7#D>%QV&3cM zQOFgXO$3z0&=&iS<>f~9BgJFkA67cXttD_Kj_9MujdN)Q=hLR92iw}(B&oW;kh}-m zB{fNBG8aEbGpkmayR|5hgqJUm(;|)zQ@Ey^ zzW=WKy#HT+{WT8LM}su$<0B*f)u^Z@4hz`d$!Cp_XSKDNVRliGD$hx&6ST`!-=ufY~0}eyPq$%ud>x2>Q_YM|HT4Up`+^*$FWK*hxsf zw+$V=77cPP9BZ+rXp8q6Vlrh5bkZ@*)YYKF$u~xx-mG7H0;oU+_q&$eMgqQ`)c$t zg)qKd2JvM6McSS^CpE8VOM~3`k@>}*iCrik*Ms}^?Q?*CJWVF@*&n%(N<(}UqHfry zVq3q{RPTrw%Hpld?=1E;c035K$$!4$vV83dZ0vNIf{5-6nX<*Cu&8jeQpF=e;%ww>~ zQd=h<(krSy>s_FWHkgr$1Twt)>f;-cov*X?=%sY*p_v#XE8t2+- z$r93feY7!|u=c_To@u0;+e>4G4x$16Y`OK3jGUb5$zA2WO_mT5AUYW0kS>OUQA35@ z-k9xQ#MCl%3Wy?GB%X&+PHsDtZP_58Ev8R>F&gVAy>2KreIk${L&3CWY)lX>a#i3fbe-JhW0KJag6cj;zgW+D61rb^zLd z9R5)C_`2GAADMN@ZBL(c9x{n?<89Dh`F%U$Q{nZ~yLEU}lL&l$%D}#D9i4kic&=a8 zD1mJ1(}CW5&D6R+rs(<~+t{Zru=lMTIDkOdC90AVfd)j-|3BjgP`)P0!oHfO0svKJ zT^-qm{5mSua(*D#$|MtREO2oAd?FpnpWrLzmU&e6w%mo^fty;H=B`)*y9anobOQut zFHl9Sg!9j0XGXVOukQQj{aJFUZ`vwufHlynkMcqx{`y{2L zmee-KwHROoWlwvDExc|78(V@=<^`}WJP$KbCHojwPs+d5_Q+6>V+G<$7*kcd1t`H- zc${uke;K$8U-`?SM^b|PSzjWj{7f76o@5z6TB1Z5=7vf6V-iy$2D}e3G41B~)Ufbw zWNmju!j@pC_Frmw;o)&yi}cYTdq`;j>{i&BL&lQv=n)hyL*(~)8Inl;gIg$Tf4wkw ztXT9ltvSRf;dK5IewE)0ptyg{h)nasn|dLN{=j7xRhIBXxvk8(5!AN>~x`i^M#7?C?R#!A8Sx!K5&|kzreK6;`MhRpC z4HiS_g9i?1>FZC(y|&;!*=-!AP<1*#57y@I5<#{B>Ri&4n;Yvn{=r!#ElA`|LIqI< zz*om7CNgY)tpUP=GtBoPOgh>?u4Ir+q#ZTN18*Yug%~lke3lBQQj?Rzku%EXwk z^x-`&^MXH#RkgLn$p@|ItzC;5M@=?7>wO07K7a-1CRb@+fa|a;VO3$+$O)3pDfjD9 z>oS5)pE<)pKvkMEf`W2>FPo1OtU(aZQIXUNtS}UVORHWw&XzQUN^`fVv{5xK2v$vu zVWMvyNH)tp77;YayOm}7i1YN)VXz}Y}|PUi!2 z-$VwzLm^)yW2P6U=FJ~a0GvO4s@`Tcd?3mhC}=2tx&){9`dkr%r#NE^{3if48MdiF z4+uX$5>xI3uYdqc$g8HpJ!Tvl*Hp+rKF7YcgXf;Fh!S&c5f{kUH6SyGq`oOx)C~2a z@w*3eW(Gt3{Mxm(Acd9x4lG9b5o~MDK;7l8-ntXnL|wix=Eo{5_(UyPzGM*W0?<>0 z*7>eCE<%%<^7dMDPi^L){eeycw;-?9ke=T+VMkyXXHtkg&3#Sjn@t*BzqVcPLLEJM zXnQ5A6kHp#E~c>P4c;FzGAJCwqsz|^W<>|9H4KLh|5;^GIA6}l`N?a1-q#nB8?aiV zgWc4Dfvle&{LztPREiY}2&7+H+AHQ(itVMh3EC55vkk-Q>0^?u9j*O-p{6E?EHPBZ z$Aur8Mo(pL_~e8K#X&2*QYF@S%{mv?6%9z5YytOQwlXS!4Kuk`ap6|fBH49P9FTLu zKi?%rXaA&-sGM!dFx_?c`=@<`t+Fa?-R9L~Kik3ePhh4k&$^}U>I^Zj>+@c@inGn;-X@U>*Cx6M#GI|Q} z;z-IlNYB9K`jegQ?4BpaDM1AVs9L;7ork@uX>I3?9%E1T?(gLG?CJSiRB#?|54R7z zib3{teIxiA*cb4!HEe$!(ZbF0tg<)s(~I+^C}CJcu$`J5eqfGfRU$+rF_xBWFa(!P zCuiaN<2BZNTt>9Bc;bR8ScTG7;A?T-h{Ey%Ga2qbY>L^nwC;y+2G}Z5Lrd!^bBUhY zuybG~ej2muc^#~GXZ{)dBCI{|5L3@R#^lB2zzAX0^n~g1#n5$kc$>_j?Dj7@cme`o zgl_M1pbclv{5x{_`h+_Ura}SdvO8youD9Xig!?Tv`Qmb!#H^wTjY zkS@hExHNaC`Cf*jyNUjcYJY|f_RBuS2~OHfU9haY{1vuqUE}WBL_WM3^7-}M@_>ge zXjfYVqKs+rLr;C!=hqwk8ANCG=H(#vt6)|L%{kY)B*X?v_zw2=oekWTUq?p5CKg#j zW?$w@G2Q=_tjty9DlZ9Ynkf|<5Chgky<&nOqqgaf+~}c-DNAAE?M%0WEaE}StPcwd zwN~7F!GFAuHXQj_;qG8x_XNtM#OmO=*BdGAjd?~$7ys@i>T)^so}Q*QGt$E6d-Nv%Ovw6ZhtA+cVSEAVW8s?v1m>#Kxab9jwgLUK z>87}Bk?l}k>ohfZGqq_DMRUdl8T7iT`-Tl<4Y?LMJJNGZn3aa4u)exg#H|I$-{M4K(xlWpN0UBkMDm4*1$ zl^qsZ7h1#W_hJs*e%?S_RM53D$~_i-!6ba%S>7iG;f~{XD_hGs={S8&I4>&ONtc1x8 zlcMs$MYeTl!+e6yih%@T9l37hj+1U?ni4vP{#vnfa7YsTE-n?NwuxX(hJ6>G zFt=a?<4`c@l|yFrHZ?$*?+>0qAS!{rBc{bo)Q{4O3>$sF1Jf}=&hBVMQ<RCc)D}}K#-$L)D^mpep4&rbEH>igE_XjdbdwVt(S zWD!?4H-0N|I@T1+(@J{X4ub+a>Zjs0YNgRP;n$x&e!VAd`TCUjzfy(yPj@u=HmpZR zhd#~yrWBVj`oDKZ^#}I^tiE0Thja;~4ST*Fbo{?jwx{njI{>W4C7LyeHz9~YW|rA= z1Uj#ju#!HbL5s0cJ0UXwD(Ij`raQ><0~Bg-r1xX#xw+zEOSui(i-2{r@2l@~wX?IM zEy<|6_(iBGBtmM6E8PR>y=eSj3zLl45s=N-?)-nyJsWwSXQF$6t_AVuj>J|V<+VTn zWqx490VGN#Hl-6^+Qj+E^V~#GF6HD96=gQ92N(+}0WI(<@aF>qPOYI(RdNQII7r4* z&Yc2|d3q2sbHE6KdQj%Qxzz6=|5Aq$j z@n=w-m;|0O6bm$fm^J{t(|$97pyO6eW21_BKFa3TWB0%SxcmeKqx!MgwV+C_`PZssmpCo6dJh&}YOX9W-$|{s z-_J)Z1$fwYefy>uNXXa?O&g6)8)OS4Lm{ig4dnv(e%5)TOuvlor{gH)^G!(neC-9G zkbi#g0d$O0*!$4C@)VW53rWqg{YD_%EKj4d7#k`>8-;F@39#nr={L*eHpMsze=#=h zcn;kkT=w?9r60SV8dEN6%KWHj+WYC#WA3T-c^8U3#>KpS5>8;gd*}yu1))V_m^dqM zjoNFT6goXn;#oCu1hdb`5`6g4b4Yi|&p|?)kuM+E0uYyeij)2X>49x}>zuZ2dU%I(2`uzFxs;1Dl_ZS26X0Gqq zWb~e%_JPvSy>HtKf?Vtm*RgJkX%jUypOBDh4-8B7kP5l-U>6e9cNc&=ig_JW=eN2e zCa7-8r)c9{&y}odgXVyIU7kFkL~-fnBEVR5`}1*!ZK7>=e}|HxGaE<%p#q2~KP`23 z=TR>gS(^DUTf}=?Dh>raD<=EGp{D@AX^}cy?5n?EyV1~5^G0m3gaoL%^rEpwUUb2w ziEwHK90hw_s3XVrJ`YI^&ba}M-w6dwhltgVrMF{ymIW;XXDGX`FK!0us8ci%z>S~B zjT>jh;*FYmRe>auw!}NvAvXm6XW$ReZ`7@ONm*S<+lZ~e!b zQUA*hxY!Y6A5L=Ndd$K#Z*RSOQisq8dJ9T`3Q(Su-}69U_TO)q4On;#?Klt3573;{ z!GUE`1bL@Q{lVE+s`y?e$G^D-BrDCy5)Yz5L?6(skG#~o-4)t%kSJhXn|cYUKur3AteWq1|C=E=K7MvqOE{f8;S|n33pv%f_@<796S@A~C8W&W(2@lX5vL)ddnMehQsLe&Ib7wW*3jpnCx-|$`e(2GF2fDx z;D)#N#FDfRNr1WY3Xp%;*dp|>DI-UWZ_0aaO zl9w$3XMr}dvgR)EKEjdNT9OsGa^Nf=&-W*PRTu$Zk0wpaz4}|y%E3YvM)l=3z%mSA zn1L6sNN}V4UJdfo96~>%>`mOIrzD62&p%>S39Lb+PU2Saz z?ErZB(eLg;;Rxb=1m$ZyFjEjSnU22Ir7hL0S23IA$)Qq<-x^+&$3t7>l;WZMDt4T& z8d*>kl4n1YhBon;&Ay^d-j@{dOIkpWfGXx2vta{k3DsL}Jrp28$^rACAW+%935W(9 zAHqjJFSMrHPX`7T<)@O)&-?oXOPS;wtMSV&hl;&P)1QP5b??o`a#Ukt;tT5W1VU z_2opbEJEjs_vRIi+v!!}y6)d`j>ujb9P#z`ZsSA4M<993!pG-H)^^K&A9CER~9o)IvJrj*7OQgB18ST+4<1R;l(^d zu|HF^mj->#;Phfp4c?q4ZSH9v4gEe+#v1|)A#Ow!3r zQTn@g7`nD{`WWij33>fAIf`fW>47bk{bf+6aGeC$qT4R?Rc+jf+=AWc16_XVjWc(e zW@6NDxVaq%2Y{Y^BcrXM@dP+(+~Nj{f=hsTaM8MdLMa+_2%wbsX>2p&?1ALlo2rJ~ zxqi_mPHYMEk(9}Zg~`;vdq|-cJ2zLY1gb$$Ii7=4%Bktzz^8|T4(D0#q>Zk-X~0wJ zW6G!beu6#JhP6ez8v8hyytLNMx;c&*=a-;Mhq^^E6sT)dpmsn9iUpFaYN#H1XrvQI zpLTmg?NoudeH;&}GeA4SijB6j;gO{o>k!{Rf|hmYTDvEsPW-)EEXZArhLnFCbPwpU zbT1w2xZTD_SF=c}@Z6xig!;ArJW?awufNaGDH#N;Q6fDyN==Dyw;s zf+QZBhmPwd<7ROeHgq1O9L$ZZ99`@#vcgXdkr+|SUFX%y;Wy0a+(dV1dP5l3C1Ro= zEs~6#>pWvCrD#0xb$PAyv8!nn|I)^NMiJX{r6|I$PnU!FN9(u0iH?6Dv8|!pULbDe zPE8-}5MXM!)&g-4wLoa92=D88E7&h<{51b?RC^5tK3k+ z;6wJH466y_8rMP0T%B+7q#yNoG!nHi<3{tPF+y3sWXymf+yiY<(_7s##6 zi9R;Z_T72ki-Zi)qZJ!bSK&)>>2sEvj+};SXgW(h&Szql=6rmVmFuOL=rg+bdYje5 zl#3Tg&0R|=U%5jr7gh#+^lP5=_O6VK;%G+-s4m3Rpm|!HAS}9nxMSw?J#{r*!YS2U zs`7)g4=tjh7vX&&h>xMrTRBObve`a=c?w!av@|q6tGL^z0_Os)d|BQk66vji%q6`oCkmXd0awMFV$bWapQhNb~O`~J?yM6QI5uyrN zlUP<-dLC-*N$0Err$-!o(|Azz^Xj)gvcFr)$f^RwlpQRn>FEcQ9tL>`yDb=+JdsGe zWtQH>?j^|Q^i8HTf=u$pcoAL$k2v6HprqA-hEg=Jb@*EB>e1O;<>Sk&c`#`3BUusC zT7Vd@pweYyhqEMra*K7-n}}~6fht%>Rq$MR&{Fwoi;3A2zgu=v&nDM+g9~S}0Sg)|I$mRpN)&t68 zVwv#t5Aml<19;GkVc8vmL?S5%D={OnWmX`X}%ZKz`yL$EUq-2DT&->t(2j^I6gZ>xK zFHNagIF{=cfVM~6jAvn?-#rzKzi>z|Wu9Ywn7SC*bZz&*x%fS;y%1X=le5fWN6hXm z{x)w;Y6rWulmnU{_^O^&OAD?a8N60ucNM*S2lt?$VE>zI6<3NXQqj?bJ6~NBAJ^9> zH8mLnv8m^+7czdoDgZvA@Qcsku+<9q29J#FZ2mF7&mEOfv!Xlo4VhK59UYd?2DqU~ z>1spdV$h)KcN`99hjQWLPwmvGJ2kC-*EQ1rO!2%Ao|RBjLnCzfd~7YEOSUNbS)QCbBK)V1k zI~+(Aj~xQBBxt=ey64+9sb$Xyr6dw`jb8C16o*dho(FY0#XQEp6ACH4j?8(VzONh>K!p>@|mS2vHbqDxAJM}?( zYy4@l!qdr!52PLZDDC5m_||hMRKX~xPfwWFs$~I1Wvb|g_GrK^*qX6g1_tQXCXc~M zy1_KkAX`5mOgg;Cl_8K#vl^nKdjsA> zavki{HBk*9W^j~FdX@ZJL(+T^3cgPOj=imWJbFLU_OIRzl2+#C09M{lxct#N;=wwp z?dzWPX5*yXz#G~Js7dmdPgoTWg*XwJEUhi8@EyPVt1pr$^qEDXhh2nLjV z7>9jIDWcOoRaE2Bm6eq%{>(w`y(tdA`d}x)*VJ4-UYq-5%F_$e031Sao?L7mAULlT zXu@sT@zlEh(Nslvs4WuOv7lfqrEqL~c|*47bP^?CG<2sz=bs8#c zU%@3YRc^o=unGaU3nlIp?+lO8M{U=$bd&rD#xJiZZ*B%C>mhHVXPvKysBloI_Z7!+F|Rz{|~-4kJUAPZb0+jfm~o zjxAfZXbs4EB=(ksG@UJAb~Bo=4Z&+siF@mJ$m%B?2mi*hu$0>-}a`vLc+JGixn zYsH(|WR)KfmaQFBUjEuOb=u$dyj4McDP0@ZOZ?>}PGN=K8$#VdB5sIEaUSFM2v_)W zZP7+|CMSJRB4|wJUHCww75z;>c!^HGH%e~Pqx~@WI4t!Y#QfBTh6et^NTRNXgxF?b z6QR-Q_eY+91BU8_Wu`9D^ZvdM>%g^5{GVd3{U_}!isKsN8s}cIGpU&*RlBYoc3qWr z3SwHV4{Ft^^M$ZXo%4aliCPfwRlEAAR=4OBD>j1S>a<2ss}^h;qn%L}MSO$Ss33l2 zA`e9#yWjl-+kV=QC%L(~_ndofaz3B)Ih5fi$Ukfm-46kEDQ|5&O=RezA-RYIgaML{ zP*w{SW@~|x0Fe6&d&vlt5>T0@Vh_aX%Vrne(w>wL_5^*$pi5w0ck4p2@j#A2tk2}H zyyeA8iNkCF6~1JBz!V81v65OpxP;`q4NLNGRQ~TqI-?&=HyiWF)a`1iAfQ=bzj|J6 zR#e3gX0644atcx0Fvs^JQ>k%Iy@YJ(c8+tRi1`?ty4cHa0iaucK_9@X+thdbT~4?m!GAPX92byKWnTxSy}LQ$WXtC z^tQZWVl`aU3@5kz5^cS+ljFeR(-l56?YhYGP#h-xybcx%dqSk3wJW}N6Us?N3D)Nq z16na#w|#|b8wZ`gSFW+$>oy?kzE43Rd1h#W@w=0?v$bLnJ9omyB`~;nHNH_ca%|o& zd9?PxOO!IVotZ9 zJX_9ymK^2WY{~NLf}UO3v~vhcj;yq@h}MOJfBk49F-njg`tL&pCV}}c%el=zr%>?0?Fks5$1J=npFto5%tsJZWaxHmhu401Yrz!5xq~ zsIIh<_=E)3{;Z(?0T%}!sD$=YtCUBd|vG9 zZ##C%{wBY(d+gVt^VUJ9gM&Q$0uY7R_KR?6V-OrV=Njk|;OQUa>F0~sx^CYAIKEzV z{H&jUSb(RyM-ZY!qFoD)ivKzq;OZoL>E0kuA6JCxti(EaW}WC6Ge5VW5T^iFguVZ= z=;a%Jo!m3f#oGy98i1&ITNMX~e-j&`86|z> zir1%yNTOAb!(3bbr^-zk&%c>n{+6Jf8mcxq7O=U-N@;^uaC?M#PAS3AEOzYdLYjE)KS9F0GKeWxOGKLNu`%N1Hfdky z#_>Z`l=lSG>HjU&#@)I1bGi(3zH_7I;!lCFb3AFNHBL$R}kU$O2AoyP~u)K_tDGuV_)CDtiI~Hx=z&GX~W)}Ed9zh zRXDSHe6SeKw<=s}nJ!RkFdB+sHNEo747;;K8{QmhFO`FyX=~*#e3QV}J+Kf6b`tVt znM=jU#dov)RZA{}d?1>c9l$7l6%17x^q`?BKGoUtp>CCbhE z>&&f-9qqci&&FLs`r3pwhx)cyrHF`*y9OtY+=oEk>1?1 z2%L~WFpE~#E^VA$uI2_Pb(+x1J_uJW@FTb+^)8)#hT%8SNYPPxL7Z@@pl>!iuD1T# zl`M_ih2}L@yTsyjod`=)Su*5r5={lm`}j}ou?KZu2$V5D56o86CAhJBI(-LaqPXWX zjxDj0Xu2?cql|Y>!k-aJV+DSTuRT**CGv9@WIZP-96dC+k=Yj@c6Txx*n73nUg_f)rky>C8`jq^+UZ`vzdq3wv{>jjI%mf0Rr0|QW*Eyft);%2X~rzQC_?Oh zFg%IdGc+^zRg6EP-{@8rEqZlFba+S8=-avGuIPM1T1Iv9x><=IWy?esb>hS5*89`2 zC_)l_8h#F11?A6W*#}4SvK&as%ZsmzAB#Se%N)2b78somV};kA?di(uX}tR(oGb7R zP9&sOM6)IIiifUX9z9))sNKg|d`lp)AMFfY_?TTyZ1nCJD|VC}WB%!D8|Y$j$l|)uFQQeJ)iilP*e?^= zuPUrr`cm2Su3NL36K$lM>$te+ZcNl5Vqv}9t3B4*Df-1uc-x>aCE#iwo;FU+m0qjr$$Ou=D|&cOm#b*63Wbk|Lxl_a0c8&98T}Gcr4GepSmbkhZzw_TGi5op zZ!88{;KGWrOVh0=MM8#e(k8@P{-<62OL6-1j(id^Sxr9IFzsiJ-hJutDwa!s)Li4v z?GrLTGiKk#4WgJC^YE=$w5ze&l85Tnwi9MCHPupGxY;FUzrb&qoX>hH-e7rj|x=+F(oWcM6Y-gt666w}*;via3rWTt>dtI>tQQI@PRio2}6ejK}S`L_#8--?Z0qhS}$G+pe4Q1CVU`+djD&e{>& zWgj7Zyh_SCPM=@8Nlp@ROR|I5U*eD|sP~m%mS#CL^{Ke|=vMF1kBS^!B{O%+mxj4+ zA(!eNhFh@BBJeI8;kdRZ&%;}GEKMv|C)Z8KEnDbEu#M^AG_-a}N91JJG~F*cL4R^J z1nVyC!#)REUpMl5E7^Wm+0zoQ(;hBIFLRekDqZuYgV6#uo-gE8^+GJa&fDP1nOJN8 zNL36+u0p3sJ&hrQqhCjSyQ{#0$hi76KB+QxBTBa}w;GM)^Q|TRQeODN*_DVlVZMy< z_1^i!WF>XuN3BCe=Cby*kwiJGDj%8}rOLVdGmi7Mh2)`3NKDUAG3aY|}RdVZ@(LVotiIMCa2^q!@Ym`kKTVe8_aK zX3-6bIibnQr1WK@l>7;PxIGSOTyEVyf%YNmreDg7WKYmDU2QHMPEbg;?a=%wt#8If z6X&F|%w@>|G&h~ZNqH_j};aq)erX- znq9_+aM8wiZj&Gh&1EzO&HZ$uRIL&d|6JC{OHN8k5|`0y2x4Mp2g+ok=A5hs+-$q_ zmm9dKN|WNLbedl9*mIPopC+8d7di3v_9|oAR8sVpw=1lq()mGC(h`-%tSV*q&d>bg zG*wbMf6ArvcBNvzw0mdzP0n2&PIHF|gLge&0lsvX7kSu|9Se+;8GN5$Mmp{I@IvBn zh)z0jPSgL(DNfS(gpne0*hBIl0MCygeVbt0K=#dgD-o}oz9hVn+ zZ?6(diu!q1rpkT-?$DUYmK-iD$V5`BuwDKd9m)st4_Vg$zJ~t+2P0Rr)+UV<4;li-GR z(r`pWY;*H@f!Ljd!nlEnON&t&7h$9Kruj7;E94E;#XB_K2dvPqSi;|*Yq+9`t(?&I z1LiO_Gt*K>+6ssCSy-t&L~MBf^-V6y@pD2#0tArt_dggbY|QvA=8Tj=ve98OY$QEB zY^aVRv10s9HIi22=ST{dR7kv3=un38_HGwH%y40}B`*vPro#+zrLY6umawHqgQ$A$ zj7iIk%vFSi;EJV7tr4wHq@?@^8R3l+w)(6SgRh@%dp`R+fT$TRQ^`;(;QL?F5#uK~ zR9vz9KI8TNrU|(oDn*ZWDglhQ*tL6iK!-%k8DqMI!+az>7~;l-=3Zo{QhU_nt4Fu> zd8nw3_ekf*xGEi|8q6nQMKv-5U&QsA53$(e}f zL}bvEOLoH0z=ORFqJjFd5hVj<7p}JUb7kxPH4Bq_K79B9^NRj00PT4`r^h08`J_wg z7{6Y(G{JHU=@2`_J)1O4Oin}kEY^S2@>Ce*a;-`&QK`N*Nibu6>VwD^zmI?4Bj!=B zp0TeZVvo^mz!BEF$8iCSs~+_+f`x@~PdEKoDQ)yzCVO<$lY$~)YN&)e-D9DW7!1bP zKBkisir-{=qO~Z&l`7R`g4`LwmtJ`*WCLjvmH71V8lBfElPd0AnLfMyT-NHy=!W;H z>LwEh9A7dnYvCuTF)U-3{f*UqTm-6DbJUG`n)Ycv~=hNCC zrmdL?+l9AjAY+_lK!D+<-&kG}>PEi}eR(%ENCB})TwJXqEhPnJGhkB?A$0N;`|{tK z+)s&eSl=UC-y2-GKwC0yNlDoS!G~hJk}-iZI-GNEfA+P)8%jfsfme`AD^*?CRN=g= zSyScGgLBSjnR_3cJF`>Cp^8{W_QDEJmOgcR>?ps3M=uCub*g6Ew;akjnew=Iw8{&Y z+PLiE;xZHX&bj=BxU|maKCc_~wH+r5u4K)W5OPi_vK_-Q69lce~JGe zNKj8Wdc_ZIkCk(4r(JR>z9XArB)dD-ffC(RWT#kcE?cT`PaG<~9?}(ksl^?*mnVn1 zu&qzgImhETdvjMHe9c$m#6$5%iNh5_qvO-}X7{|f&kE`bJVHbsH~1Iw1^>W5 zV{SZszsLZ8Wj1gCi2HGmc8JJ^xBrf8@by(4nknm;sgQ=3aKjl9Yd!uYaBb|~Ip$q z^?fP|(s9Mt3QLO8Q&Lib$uL3+DgS3!H9Cq*ljC`G5 zF;Fr!-_SG}>o@J4rn|w5L?S^%eb_qm@ZA2?j0_*-VE}I_M%1B>cEXwL>q-fi@>Dc6 zj~UKHZe2(xR*yLw=Uuy$cP&0iqIN!-HDgRE8g+m}pWG^qUBlQTrL&iYm|8XrO=evg zBRGSX&Vwazt?+r{LDGUJ05rafb0W9y!XqAk^=(7gBWzyFd=eAv?3 zYEed^=oYwzL1hpVEOqeLh+2A9?}*Q|ub92gF;i8VM2p*B7jwzTQdTnL5C z;VYRsp3BkY*3Wa3h}9=GG(Pt=Yw7BinjZZwIsVunCp%J)P~>CSySUhJu&zJj#S3fR zRLq&v&n|vsL|2v+3SiTs^xFd%io@sjJ1My%l_}c4E@FfGMdk2a{k~Luh@X}EUVHq5 zx0-X+A=E`Ks6hIot5aD;Pj@ArLjZoj?U;A^s1{CB~{Sis}eF(}s3I?$3s)S)$a7O;MW01FC5C>Z0E+iokZ%$BSR9qlL#$)+j zDHO>6Rz5a*54B_vU#5y({jCu zoC2Y?_6Odf&d##YfigE2N;#tl+shK*Z}$v`M!To-p{hhEWG-W@#sWwO;&gfw?`$Gg zAlE|P^{S~Z6=e@?q#_`eJ>sbFa3t9)*uG15@?L(Tw32hnK=8sJTUb+*p$$HNsnXLr zg+k}k)HF}+52FRQPeuL+#=HgGnrCZuvr(- zq=8Czyk+e=<yh7r!g}GsE1AoW{03YKA>l z_iad*s*u&i0#rCc9r^w}7hd&kvKA5miZM4gmpThH=4w)sOY0K_{_HG!$Z<)I@|Z^G zZ!C9#kl``Ya)f>*^2ex*D@2S_tbYxu`mZe#e?@QKiJ7(X#NO%YDirnS&o|#DLuq`I zOr64FtFj_%c`QnBMQ8F)hp^%8^Z=s5!XQhJG8x{bCn#wWa{NN7h7?{3c7lOQt}{WL zI>MOy{*oO`@jE;Rqg79WzU()(00C`^HZ%u*--Q^1Aci z6T*iRt%6#mLS9?Tk4@mY{V;1*n8@3bF=X?G6!O4)g^Sb-X6ZVx^!f|&D z`)AzpTwHvT(wLifMqMa{9UM^yCA#fos2w+YS#ZcuUog<6#kf)+8duRp5l_%g@)z5# zM7>gHgr0@#_r6n@B7Qxrq>y*tsJN@PYSHCrGO@JyQD0DH6D-`~`py-n*apj&_REx_q*CDTElQjgDc%iK_hlh+Ae>cd3hIv+mRSiyN@rCgz>cRJ6i!ZS}< z!P?ECz^K~}g-UaJ@*!r!&VCDV|D1(!cYXFkkEtjyg|QpGnzJvN^7mpOCe9j=3~bqpGXxLz#7v5xjtKLwq`V z1jvF!D~IxEpNJarG3ET0ut=kf`bq1}U&1R<6h#W|Lj6oiVy<7bfL0&QFJj+Mo4vQv zbH4SnXrD&+w`-VJViTCL>#G7*S;t|Se2@umbxtp0uRtI!+4R4ZsQ$~*6ekVDQ-wUL zvUtVy*!Z?wQIv9pO2@hUk1RgInypHykUx~rrr7tJbz@pY`Li1*3k`Di83O(BiN%{~ zFqh2>Z&Wk{R3y9OQIqS9N*l;thSv^m>G}BaoY{a$;-x$v-E`NB#GRCDg?(tDwfqRO z3;*P+0)8u}+Rr8liX0AQXlMxFq5^TMpX3oDjU<1tNw${nuZo1izAlhOJ)?+ZW`~Qx07>P6BsQj6H&w8x4Pi1e~j~+XCtmzzR_EaU3;9l0EaTU4|D2j7 zR_3oUSal^nbw(9%golTRg<$TxEEEKc4@KM7CIalqQB5iu7 zVsy4V_#6zFAL{lQHNcyZwx1gU>eAu9X#I-%oNC9T+kk!I)TixOvDL$+{DpA2bgZs7 z>|)+Ev`16WXgq+ZYUhj&H7nYg71Kx&M>6sp2$d`Op5g#lM22FMH0Xj@FcQjxs8=Ggvh;h2}-0pXWN1DF%CgtKZ$X zW9QE8;`i-I)qYH@Iy2HNUgh}lFAK*hUaA~gO<7^OLC)9pHrgQ*)0_z%%tBDBf({hF zeNUvc4=RYY+`henvIy9^xw-ktr;|{*BhmEgN-F36nSIPtv`?2-@l5Z|shm3>UhL|R-zgFns=GKBU(aQ=EzDW4KaN@hG zO_FTlr-u|Vs1!6cJt+kiR_vaf3mnUtOL@-Ae*;&HCWhr*D=)jbVZ(-*DnRD5hyO4$ zGee^yfHs*wTbocH=2~fE757&mN-^0Chr|`6p+d4v{f*U$STqArt37io@Jk{hf%9&% z6CXP1d_k~w`h7mb=xG;=%w+oAzf)dbZc$^fD_^xVVTUyD9pmr*y`j*2>e}WV{}n&aPBH9-mg`P=;Sgf|3wcRqCg8F=u3x zi8J@9+&ku_mcdis+p75|O3{o*A7GBsqR!XU|1}2{JA2_}SrvwBf1}*m+oIG)F5^CV zYU$*fJAbeKgC#}ko!ZGWsCseZ1>?*@U%CA_vho#+=a#{rQqRY3IoR zTBlg2(nqHmy5^G^C@DslL^NdZRxOaA4LVd`FZ-;HIz%JQWr$&Ot!W`)m-AK~a4 zCtdP*Um8;0Y9eav6xD-mpA(1kCw))-Zj+Q3q(u*^sR;45IWk<;OQ95;$?m?2YAT1@ zvfAlg+}-E-Q#q>@N@oZF_4%n?xXKOPe(4M^O}1OqZ{ge#bqMS1dgqY~IaitWGqbaT zrR&@qnLO)o_Sc5B;XtQZN!j|W`n=IT`U$nY{V}~yzOMCdx^{>OEF<8AR!1*o>H&Wg2+BbyWv|q)xqBim7 z-8q@66caq}%W%UgpUB8TRlmmUZ9mp1Cy~mA<+nT#@zGMaTNn0khH|*NK@CeAso)|-1L0es^aOMkfz_KC&OZQ)nf0LEfNp+^Nc8T9?{&AL;6A4q-i zqWix7q7#SFXbU2;dnU$O~?%JV(W36p~pN z>#fF4P3~~xghdISUdpp$Yb2{L$G6=eg(tbro2Uc0YHV_~nVE*gT!ED%8+%2U2&=yi zniL4!z6aE8kHg5d-KgM9$w?7nZ#+ri>6EypNLnZ++mh>i4yAQeM_$3!*hR^&{H+2j zh7-YEa~)}l2)r9YwH7{_mpncXlF|Z=Ahd=1eitIVR+tN%3&0b@3Z z?ru~32g<>;4j9KGfJYf7G=Z67vZ|)$Xi+h9r)hCLPTSH!#7A|0{P?kGRw1op>|66A z>~Jx8?BUm5jgSdDQr*}g)+F)9Nm%hB$d}B$v8zh`#EEQRxebZjV0RC;>v6GL4(xDK z!O|?DEK-k&PSK5+`BCgB^diB?y}WqPIr<$)ad?YwkiEya+~lgo^M9<5Nkz(2OSuq2 zo?kqen%_Ef(~1tkIB2x@kRj1g95}t1fUo|a#nnJdNxamI&5|KjRMpnjek-4Z%z(bw z#^M2ds*t}72?{51_Uu`twY3M5U_sZ?wM=)5T{pIu~&{`A}6{(K(Es$p*sWB2u zO%RBxUjECO%-MzlPpban2mRM}iZsVhgc%g!m&B}4^XAPqm;x^x_3DNWkpc}N&hT2JgVo`Lau#qhf{C+oFuldT#&XF-NN-rrum0Ae za)vlDSZ4-^_F2_nN8Pnq6THi?eKdroiHd2GFSCeTw6L%c$%0VV(baVsIl&0Jr^aHN z%MOo?q0wt1W=Rz#N%qAIUpupW&+?mSR;o`LMvdOo*}unc)=e!9mR+EN%O{h(Ygm4I zdRa!W2RY`)pjaiQlG!=hiS+>)wu}}$91)k|NuEOcEd+;Xbv<)>@@RBzh_r;?Y~!)Y zUz|P&X0T^Gy}gZca&iC{U|qhK6x85K6R=^3-yXs;j-F4BzS;Q1AZLLUz2pu`toHRq zDCum2>r#vifGq=c4i>Cd*wpvbF{`87kZZ*X>=X+CuhzXE2ygG`D6Lm5%>dD?u1-_H z@9XQkm&h@f-(gQriyFFTNv*L|2ms(@8;pUyckkZ4ajmc#?SFuF=3ZaqPUG1+-V2~0 zH*MVb`WM_6h35DhAse*um{<^6fRz>CD)}Ul?gwC{X;pnv=CE#ZhoFZpAN3?M8Hy7T4-=f-#7ObDj7p137Zt%m9jpXunUF&nwuU~v>qv0G9SC5cUF z%az)ZUYZDdM^SxuEP7ky{rmStgn%I@?ySb1iK9Q=Pws+>$+dDIiQ5Q^9HNF7t1|rqN-mjVUG%&b`N8h6vQ?4kD`5DS<#>Z$Fif3&mxP zdf~ikYBh;dO^)9t=k7&|uehEQ+<2Y?+*|nKWUFoGa*KLXwwx9Av$~{)=$2JGy`rKR zzCuu*`+)z`RoWd}k5slqGCfpw%SAnld;C}h=l18BeO9xy=0`iX#~Ros4OPLOeE06% zlceA=HoKB=W0U*Nl1dy3gl3=Czr%t9O0>#*o6hH4g*C|xBg;Z{dJ`@y1na&ARUf=AP)9P~EjccJ+sXgz5;u?4*3lUs zOMN3x6kh@Q`}TI2IrRAFeWO(CY&1KKBZ%2t8I^5nsooc;-G98y26L(L~T52LIe6-xLH^UHSo%k=1tI4cM+O)eXZ zFF$gm!;AnGE{aNMX2-lbt72=EI#z>y1Ig6#Sr>3Gick;!1QBuXa#Gmd-VR9HBPz-P z#ts$ca&MQ*sPJm#?!)6LGMlu~_6cQ3wq_pI^t2m<%1{Q?)m~t+Q)% zsENb5+5}-%{??GW=z1qouPmUhq*W%`?#PwQz6b_ST1X@;KGIwKD#0#ql}61|*8PLP zrpG+HcyRppE<= zUo7qRrQvIcN##I^lv+9+=k~NQkPavupF#G|RIZGJoCHd1a4=pQhG&46&K@Xu72-`B_dSXljg=zlD@^Rw*2=S zlvKKOq8&o$e5b@qJR}m?+uIw@2xkj+@2b1pr9%?bH%WTa>n)TT-b{B+HWm3r@zVC7 zK%Dw?SPVB}xs|eWQn^cGgzmX~!k@(XZa4e!!Pecoc1?O>ZlbTwm$~oJMjKteY=sNq zGV;U4Gc>Xb3$1W094eSv<9DvBaUs2FDsdWTS;k`p(|l@FleyHLtf=ZDv$KMhmg&L3 zE>Cun0-Vn#dr#dAlT4+!WgM0?k6sSU4q3^yM|nKhcx(^4+A$0-t*zf>tRp~E>_h54 zdDd)-a3~%cneIGUI@UY2IG;qHsI2@X6ho};hsy@vPZ`csq4DP(lk~Ya!t--qw;tJ} zAX`?~^qS4DUz&?!arjL?W0Zc}7Rw)}i100UZXY+iG$~M%@DdbV-H0*jEIf@184F}( zgvgexh&i)QAw9aFQ%qv4j>V{84|=F1eQ5jo0gKVR`R&8Z&hqGtGpS06LCeBf_E@io z4523TI%}%v)Y;_dLW%?FA#G+)#-_sP0+w^|7@(u>j1Y8fPyuVeojG{>O=bPOw0aj> zFY@QhrsaNHE%dl`;O5d!M`8sHgYKWxgZt_n3BhRDD$h(b&a9bj-vC~M?o8dKVt^u2`qPybHMP)Ni6c{7`d2= zr&I-SNP*1ds0+YudaAYtZ9+<^D+^LS)T3^k>%uGxN?WUNTG5Xj~X;n4t$#KG~;J zZlhfKu(Ci7U#2+C(na#ni8!SyZJA=-XiAT}7~%~&jq$1)wm+(LV^@Q}&mL+0Y_!hdOJlYgnj^)6}MpKn)j|J>izpm-t#qc=Mk2*UFtz|XTL7uS!D zm%E6zZPwh!a@5cr#=JV{?38(O;W2tNVb>gn6;P8EvcPCuSY&DcSfW*4fcdQ_4H|Xl zr@Lg${Taob#ctAA9#JP0>g%DsgK3N(3x2QPIAo;ua)k^Z?rP#2>Ci7L@Ti~;u0)q$ zTyZOsIpFr|9vb-3M@sA?9PLSy^UAI@f^h`G_kU6bj~});_V-vl8;c3&WW2M9n4KU8 z@_5EB{r9G+@WzglWEB*4LNFe`XA52B-Yx)vy;J=%S7d(Hx=+6IEv&_H0KAds9 z(P1DI`z`Ld+CT;a4qnn+4*FgW>TdEH4w%0uz5}=xa7D;s4&e%f=+g{6MxAeF9$%B`y>98i*ofX+A&(gPa~*5~MFscKpBI z0a&hRSKHkqaz{W3&%Iikfi?kh9SAG{T$Gc*S%dLYgfzeprmG7u#@YFO zl>O0dz~vTR%KJ7ZzVZHt)RYuY+cG2}G8) ze14EtX{4TC*$`dAaJP(%m5y|cV;V+x4Zx1DrP>rP;n?L zqAL{bJ9g|yZR%40WSkrwnJ2d<0zfO&j+f)tiittt5Q*O)8GBDedK8+EM}t#wz`NRW z06r0l{D?XjyB>rP>?PoG1+G9lcl-J^A_*imwh-v<$VfXdyUK1`kL4WNvMwUx*~N45 zP+_U+=_wk{EOg$gsjWTgso95HA3xH9aGwXSalDGMvdc0dg|(^fUWh(8VzxZ^6Fxf) zc>;w?#q5CtAcKHdUH@%z71)q!z#JpuUBC@_k(h+@y{}?e@7Y@B%|?DT03SzAPd6a? zgU5i*-L~En2;h*gt>KTs3M)C@($WH4E2uW+jSi0GwzwV-6{)^o7SeUvfM{;Q^=9Zs z^fSZ^XY?*2$qy#0+r!}AMCRFm`N$^My{Klqj2jK^2$*B6D-gUW83O}@A4y;-lj6Kb zDxFE~%Q@jSa(JctYp4-;jfH!`$Qs-Tb9to~mvrodq;orpaC_DSY9l^X=}*I6Al0C} zw{tDaYc4D+E8|2GE6mF%su~)#V-*=l&i#W>Xnv*_l#b!9>8?P8)<9oM<9g3)aV=n+ zQ8nxsD$5=AFQ;1O_}+Z-i09JsF-7?K$E2O)_UC`NtVO(S8360c4S$}D`vB6;ZYe2x_nT^B5cBN9Qm6;YDGMk_ryte7^#t1bA5s z*yu(hxK6;|D4n!fO{W%+FHo8UR%S5RL15de#+n7{%}2w&;wZNQFCbEG^xa%kgMkGC z{h$CKJ4(_`Fft!FqUkfD=@lh#%FG$rSh2VU9C29v{|>vaL@$ui>~{)o*T@OO4zX7G zL16MdcSTuY)e%U|Aeo847Xn)Pr;T zC6NxG#2Z-c07DV|Pm!?v&pROheNg|8jI8h6%Os%OprW@^1ZFg?W9Fp+F&N@KD9UGv zvB2JJThCT3u;s(R6_fZcEkTNW)cpKX9#zrZ#_|Hu$pwgm%r)jfC~K+DdYuLP9f%bv zMlB&rFsBg~+Z`c?xYIye)}{4d5^<9v?k9guVHCu}G=2$N85CADx_WpK5&@{L#bYqQ zbM^o8B(S3o5(sz#xwRq^36w$b2{OZ=6Jv?u)nFr=7@&|$9Jb?u0dbxsMNBk0Y|qZU zb_~=xJiC7pWf9Ff3CoUCe%!TM?t|^JN!(qtIy-dfPzga(`d3p&hef`lu>Hi%q+!lU zRo5hN zh{A%b-27YDSKhM$`e0C%@DBsy%p!17ZEbDa#fYGQ!mj(w2JkEro^eKMX=JGK8;!Iw zEDOz%^|&cq4cn%h@tdlS;EkU>+Z^FI#t%39xf-$eZ?LPEU62mT^|4mo=i}`B3dR31YM%v!gJ>&y zLY4(HBN)^}r2Inv*uA?KsAM5^^(~-uBak}Me!Ja4@G=xEcjyqhe{6$31+nNGH_kzC zjPD7c9AJY3(^Q!ZTMzbb@$SHo$#3T&Ml%-#K4*~(rs>f>H3aliK<1^DNl5FwHpnR- z!)t=i2K?siKQ33CeNnUK#IuW^T{aI*)`IR+L>?=uUWa(=hT7R5z8Sjy#8kKHrPH4P z#J1S~%mbfUDYywKT-2Kb&UGMzXjmDzsN2m(wuWFKrcq!jvQ1x)u6+PYZ4}Jda!G#E zv$Mr8Gj&tWFovQ?I1KDg4?n!7*Fz-| zzt<|z~2j}dL5E4vBkE9qC^>~PKGY~0ynW)pBS0Wm0A^1ARi=Y8! zItO}kzd2tylUlXzH0R5^yO0bl>g@Xa`ksU7-3*m{6U?hIAHL=*s+U0zR7g&d6eyHF zt?1xS17z3;&q2dbzg@Ye+${fcSdO&zH}xoyn{~t1{>-qEl*||v&#g-*Z||!72Zq4{ zjg~}Q&>a%7p8WcG+aB(q` z6u=l_w+3~D1CWDhb*4bSocbN1V0Kmox+bK|{16xvWd7`8E=Lo(3{eyw_KK%wq>-^PZhT5bL>TEPdWH>JX=R|-i1S{o zQ@+ml$v8Bi0OSx>D>WQDGP(r3`^{3WRE`=z9sLU(b+O=U2Obwz4)h&}hk>8P*rgB7 zgc+v>4_V44<_nDuZdu$8L9qURxcWw~M2A@bgg+vuz+`S@5lz)#ls1=*Hi%H71jcxDZgR+&2f_}tZ{4{ zc_B`k45sC}e4iH+TX|gr)c6iJX!QVuXREe+IH4^+xRI_}XNMi7#0BCz!}4u((>m&r z%juZIWh_Uj;Izr-NuNEW3W%_Ak0v=uZm{ zQRM1cb_&(lVYB3RUglOp;MY<=XuyPgSL{u~cr4+(PJo39lvz=w-Sk4}Rb$UmGaBd= zS{DX4hZ&{Yr{`TW1oQ!10u+LxDjpNr5f+>&#+{t%e>eV!8PO6qy5pv_KC!}%ADpSr zooQ$t2wQ64UM67t(Wg`DwQIf#+vlY&=y!I-%|~-l?kS!1;rNH?tw3Jj7Wd3~2FL#F zv>nya)Gz1^=wGl=Zl%}xF=jFNu2(gBQ53~Md0UJD)m|(eqwOim=oIL{ zbqHUYXJLq#xv%$=MTDS=ut_jcNwfyiTq|AUpsiLuXlou=TP#+ zJGH_nsyvent>IMn5p6cto?t&9`n-DR367i<&a<*YIC!SsADu4T^oi2tuOHy-do;cv zyXqFfUQL;%hNUld#!y6OFX}2ZE3gxIbY3YAjQaBSc77l#iQkmf-V`?bp`oiioFPO{ zbp}rGQk328g4Kt^XPfJ|jM?nUi4pjd5Gj^MyGCkd^ddj=8T@|wJYz~41aN#;@RHH4 zDAu5S$XMSod}Jk;K`DJw&eI6jBu+*-2%i*IGCBjl>FP6lsw#R_U(v((V9`HCy6K2S zGTl4m**X%PLLL7vw{*KAz+BoI!SM=NYT&g`dIal9z#s)Zq1w+{A(?*58N)bQbb$%O zwiHWd3=KD6=gD32w6?HW2Z;_8x9$V~tEh<>98uJ~%gMid2GL;J_fDERZN+YJ(|(k z4q)AvR(CUknjZifd;6pFAcQlg8e2aK96VbEOM2i51N$W>tW)d8$rRP#lzV6P2{6CM z8bGJ<_yX9zpb00!h9&R?d1po^Fe-z4gryhJ6^7?|w~PS$0+oqC2RoyY>e`{H%H2!| z9DEYEY*kDa%}+4+EWr6{@noQkAJq?Z5T*$_$Nl19RmNj4!96)z`5VCxzw03zpI$~Cm_7T&1b8%>K#Y5Semb_;>NI?e_{@#?j?Zs2) zXJIL?HqZR|T4Lo6wwbhBhqLGSX_B}x`@6g?Rkv{4G0d%AjfnR-`CCwlc>#GAe_=1( zzL8_LDS(1__a*<3g3aeufvxjQr&f)+K5p{1wk953I1v>>5HPr1hh%DKKGJcfM-RgH zk=yn*86Di&wE4iV@7Jukds@^IvB(%0I96C2$sHT}WJ9=`=58#Z_T=I0RT}VhJp_9@ zJ9!NyM;RO>CE&2qnMl9Y4rMi8w7`SdQ8Wr}mu;9Wwu0?8q-&ln9f$C{_WiLD@<|&9 zog7p-!R1o=`pjFxbEi8BOG`_?PeT__1MSMeEfRKUT-dWqdEkP0u1x<;>roG+f}i*H z#2P63YFt}bJejKS&@ihf*YoI1K7?~9eBjaH*-{5B&mHe06ozT6bNipEOGxJjJQ?x= zxd`~Pz^u!==B`^Ad>$@_ypi0+BI1_ML#@h!&(n=ttAyH~`uCe&Q7*w9(A>&j1qtXL>98e;M@=I6u0bTZ?UY&H$eZL4>> zAtpJW*}KVLd5w#G|I$X^8fcGb_`c|mrvn3_NgS3l=d~s8Z1z@mL`v@7{g65$^50M> z?wL6QYfz4kSwQ`4dvLB@Y)u)Z`1*0{pan2#)D=+`<63i0?R{F)|Ejyr@ff6*#>Pgd z*ev({ew=W5bg^{$C@J7cPKH?GcJSiB0~kb5lf$`ZxQE?=rhvn}1s!G}4|Twgi4t6R;1-%f74}8y{~El~r{J>88`| z1CVJ7Jw?!ee6a@CZ+J=UT)%ieP@58^=mUN&p49?{EEI`9QtZg1#Gxa-h; zd_rGr<%-zHk6$n=Ypj0c4^pYAH|?N~zE)`7Hcwr=bwmucFDs)T{J~I#e`c(%+z^&? zUB1sV6nb`gJo>yHJbZjQG>@!@N&R%u@z`P%Vg7lBf?yE3q<76b@61j9PQ+rCyEmYyfs;EhK1Kdi8)h4qH#zTQkD9OcEGc_FeK7@k zFjbw~m7g#_f3|*yU9}eFGvM_}=!~Ml*qNhUanEi0)z#Hez}lBIZdkn%fK>ZY39B?N z%*wm#$K6d+Ne;Gm7GzZ@+)1x>^m) zGPvsMRAO=h_wL=hBdX_=f3$o9O}CadI9LKLh88zg0bc~;U;%K(qFz#|RK5w+D?p&qSJI5NUFxwmTY z(#0A-#XxQCdMUv0 ziqO}xi1`Yi)5Y%oJ6dIaw1)ix{yL(mkL-+6uG(YCtYh;FUHoCGwqWP}bREp%v0z-N zs^%o8RE=9NVfeR^Sq#t-_I`%W&}v`o*aEADjgm`tq-E3Xa4N1%iS(i_4{bUF?&CtN5k6h?O6m=z9Kul^!O;g&^MWLk&%q+i8U3X{C;+OIN z0^Zi!Xy;b{`gbOpGjp~1_Wv_ZFTH#3jM(G5_oQlnp6%Kh^IQ65KeK&hO#Xg}39J9l z56azpPCY0~a?aFkJG8e4gCbz@s^2R-FMYfm|Kh-A{}+=R9d_;fbniaUFTm(7uCq7( zzqaqq{fQrM14Bil%+mH$@vi*!mVXa_eknLFRyXeNzxU=}Vird;+t-;SM*_2^)2dx= zzFyZ??esgNW%;Ih?$Y+G`o~3XmzSyZ*3Y?g@#FdTfAfOR*(BTQ z|9`tH&hE|i)9rts)x6$)8<+{!tg;I*u88|tez5Z9!6|pGuf2J;_tU#lApUwu7&tDn zD(I?tEpX7yLbMS$pw!?j2wKK&Awq}~`lfZe-gNKy{a2PeefkuXKNl=p<_28%y>~M3 z5Q5NE5eveCgBPEjZJvF3neWtFEY})NKUD(d(77RB;ytcjxd2*}z99;9A}JC1v~<#z rJ$u#!FZWwp9tG4;aDJKZ>@W59Z)<+#>6qF9MHoC?{an^LB{Ts5Qvg$% From 3cf64ce71d9424cd40e79ced1f404f267b190ad1 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 5 Nov 2018 11:22:05 -0800 Subject: [PATCH 23/32] update images --- ...achine-alerts-windows-defender-advanced-threat-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md index 0519af3f67..1d46a897c3 100644 --- a/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md @@ -11,7 +11,7 @@ ms.pagetype: security ms.author: macapara author: mjcaparas ms.localizationpriority: medium -ms.date: 12/12/2017 +ms.date: 11/05/2018 --- # Take response actions on a machine From 4361b22ab444bf6a862c3a1d6732e44ad3160076 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Mon, 5 Nov 2018 20:04:10 +0000 Subject: [PATCH 24/32] Merged PR 12590: Adding section to FAQ Added a short section to the FAQ --- windows/deployment/windows-autopilot/autopilot-faq.md | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/windows/deployment/windows-autopilot/autopilot-faq.md b/windows/deployment/windows-autopilot/autopilot-faq.md index dfdc2fb014..46286ceb3f 100644 --- a/windows/deployment/windows-autopilot/autopilot-faq.md +++ b/windows/deployment/windows-autopilot/autopilot-faq.md @@ -9,7 +9,7 @@ ms.sitesec: library ms.pagetype: deploy author: greg-lindsay ms.author: greg-lindsay -ms.date: 10/31/2018 +ms.date: 11/05/2018 --- # Windows Autopilot FAQ @@ -65,6 +65,11 @@ A [glossary](#glossary) of abbreviations used in this topic is provided at the e | What is difference between OA3 Hardware Hash, 4K Hardware Hash, and Windows Autopilot Hardware Hash? | None. They’re different names for the same thing. The Windows 10, 1703 version of the OA3 tool output is called the OA3 Hash, which is 4K in size, which is usable for the Windows Autopilot deployment scenario. Note: When using a non-1703 version OA3Tool, you get a different sized Hash, which may not be used for Windows Autopilot deployment. | | What is the thought around parts replacement and/or repair for the NIC (network interface controller) and/or Disk? Will the Hardware Hash become invalid? | Yes. If you replace parts, you need to gather the new Hardware Hash, though it depends on what is replaced, and the characteristics of the parts. For example, if you replace the TPM or motherboard, it’s a new device – you MUST have new Hardware Hash. If you replace one network card, it’s probably not a new device, and the device will function with the old Hardware Hash. However, as a best practice, you should assume the old Hardware Hash is invalid and get a new Hardware Hash after any hardware changes – this is Microsoft’s strong recommendation any time you replace parts. | +## Motherboard replacement + +| Question | Answer | +| --- | --- | +| How does Autopilot handle motherboard replacement scenarios?” | Motherboard replacement is out for scope for Autopilot. Any device that is repaired or serviced in a way that alters the ability to identify the device for Windows Autopilot must go through the normal OOBE process, and manually select the right settings or apply a custom image - as is the case today.

To reuse the same device for Windows Autopilot after a motherboard replacement, the device would need to be de-registered from Autopilot, the motherboard replaced, a new 4K HH harvested, and then re-registered using the new 4K HH (or device ID).

**Note**: An OEM will not be able to use the OEM Direct API to re-register the device, since the the OEM Direct API only accepts a tuple or PKID. In this case, the OEM would either have to send the new 4K HH info via a CSV file to customer, and let customer reregister the device via MSfB or Intune.| ## SMBIOS From b964a9218ad4c44252c72ca525f92c7631a48f01 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Mon, 5 Nov 2018 13:45:27 -0800 Subject: [PATCH 25/32] update tests --- .../intelligence/top-scoring-industry-antivirus-tests.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/intelligence/top-scoring-industry-antivirus-tests.md b/windows/security/threat-protection/intelligence/top-scoring-industry-antivirus-tests.md index 5f2f3fbb28..7c2da5de58 100644 --- a/windows/security/threat-protection/intelligence/top-scoring-industry-antivirus-tests.md +++ b/windows/security/threat-protection/intelligence/top-scoring-industry-antivirus-tests.md @@ -52,9 +52,9 @@ Windows Defender Antivirus achieved an overall Protection score of 6.0/6.0, with AV-Comparatives is an independent organization offering systematic testing for security software such as PC/Mac-based antivirus products and mobile security solutions. -### Real-World Protection Test July (Consumer): [Protection Rate 100%](https://www.av-comparatives.org/tests/real-world-protection-test-july-2018-factsheet/) **Latest** +### Malware Protection Test August 2018 (Enterprise): [Protection Rate 99.9%](https://www.av-comparatives.org/tests/malware-protection-test-enterprise-august-2018-testresult/) **Latest** -The results are based on testing against 186 malicious URLs that have working exploits or point directly to malware. +The results are based on testing against 1,556 malware samples. ### Real-World Protection Test March - June (Enterprise): [Protection Rate 98.7%](https://www.av-comparatives.org/tests/real-world-protection-test-enterprise-march-june-2018-testresult/) From ec3956166b5ae63c66b8b3272fba50f48d097699 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Mon, 5 Nov 2018 16:24:50 -0800 Subject: [PATCH 26/32] test update --- .../top-scoring-industry-antivirus-tests.md | 15 ++++++++++----- 1 file changed, 10 insertions(+), 5 deletions(-) diff --git a/windows/security/threat-protection/intelligence/top-scoring-industry-antivirus-tests.md b/windows/security/threat-protection/intelligence/top-scoring-industry-antivirus-tests.md index 7c2da5de58..ae2f14ed2d 100644 --- a/windows/security/threat-protection/intelligence/top-scoring-industry-antivirus-tests.md +++ b/windows/security/threat-protection/intelligence/top-scoring-industry-antivirus-tests.md @@ -48,21 +48,26 @@ Windows Defender Antivirus achieved an overall Protection score of 6.0/6.0, with ![AV-Comparatives Logo](./images/av-comparatives-logo-3.png) -## AV-Comparatives: Perfect protection rating of 100% in the latest test +## AV-Comparatives: Protection rating of 99.8% in the latest test AV-Comparatives is an independent organization offering systematic testing for security software such as PC/Mac-based antivirus products and mobile security solutions. -### Malware Protection Test August 2018 (Enterprise): [Protection Rate 99.9%](https://www.av-comparatives.org/tests/malware-protection-test-enterprise-august-2018-testresult/) **Latest** +### Real-World Protection Test August - September (Enterprise): [Protection Rate 99.8%](https://www.av-comparatives.org/tests/real-world-protection-test-enterprise-august-september-2018-testresult/) **Latest** -The results are based on testing against 1,556 malware samples. +This test, as defined by AV-Comparatives, attempts to assess the effectiveness of each security program to protect a computer against active malware threats while online. +The test set contained 599 test cases (such as malicious URLs). + +### Malware Protection Test August 2018 (Enterprise): [Protection Rate 99.9%](https://www.av-comparatives.org/tests/malware-protection-test-enterprise-august-2018-testresult/) + +This test, as defined by AV-Comparatives, attempts to assesses a security program’s ability to protect a system against infection by malicious files before, during or after execution. The results are based on testing against 1,556 malware samples. ### Real-World Protection Test March - June (Enterprise): [Protection Rate 98.7%](https://www.av-comparatives.org/tests/real-world-protection-test-enterprise-march-june-2018-testresult/) -This test, as defined by AV-Comparatives, attempts to assess the effectiveness of each security program to protect a computer against active malware threats while online. +The test set contained 1,163 test cases (such as malicious URLs). ### Malware Protection Test March 2018 (Enterprise): [Protection Rate 99.9%](https://www.av-comparatives.org/tests/malware-protection-test-enterprise-march-2018-testresult/) -This test, as defined by AV-Comparatives, attempts to assesses a security program’s ability to protect a system against infection by malicious files before, during or after execution. +For this test, 1,470 recent malware samples were used. [Historical AV-Comparatives Microsoft tests](https://www.av-comparatives.org/vendors/microsoft/)

From 0c50be35937a7c921b02043c111b259ac526e0fc Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Tue, 6 Nov 2018 09:21:57 -0800 Subject: [PATCH 27/32] updated scores --- .../intelligence/top-scoring-industry-antivirus-tests.md | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/intelligence/top-scoring-industry-antivirus-tests.md b/windows/security/threat-protection/intelligence/top-scoring-industry-antivirus-tests.md index ae2f14ed2d..fc048a0f42 100644 --- a/windows/security/threat-protection/intelligence/top-scoring-industry-antivirus-tests.md +++ b/windows/security/threat-protection/intelligence/top-scoring-industry-antivirus-tests.md @@ -29,9 +29,13 @@ In the real world, millions of devices are protected from cyberattacks every day The AV-TEST Product Review and Certification Report tests on three categories: protection, performance, and usability. The scores listed below are for the Protection category which has two scores: Real-World Testing and the AV-TEST reference set (known as "Prevalent Malware"). -### May-June 2018 AV-TEST Business User test: [Protection score 6.0/6.0](https://www.av-test.org/en/antivirus/business-windows-client/windows-10/june-2018/microsoft-windows-defender-antivirus-4.12-182374/) | [Analysis](https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2v60I?ocid=cx-docs-avreports) **Latest** +### July-August 2018 AV-TEST Business User test: [Protection score 6.0/6.0](https://www.av-test.org/en/antivirus/business-windows-client/windows-10/august-2018/microsoft-windows-defender-antivirus-4.12--4.18-183212/) | [Analysis](https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2IL3Y) **Latest** - Windows Defender Antivirus achieved an overall Protection score of 6.0/6.0, detecting 100% of 5,790 malware samples. With the latest results, Windows Defender Antivirus has achieved 100% on 10 of the 12 most recent antivirus tests (combined "Real-World" and "Prevalent malware"). + Windows Defender Antivirus achieved an overall Protection score of 6.0/6.0, detecting 100% of 20,022 malware samples. With the latest results, Windows Defender Antivirus has achieved 100% on 9 of the 12 most recent antivirus tests (combined "Real-World" and "Prevalent malware"). + +### May-June 2018 AV-TEST Business User test: [Protection score 6.0/6.0](https://www.av-test.org/en/antivirus/business-windows-client/windows-10/june-2018/microsoft-windows-defender-antivirus-4.12-182374/) | [Analysis](https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2v60I?ocid=cx-docs-avreports) + + Windows Defender Antivirus achieved an overall Protection score of 6.0/6.0, detecting 100% of 5,790 malware samples. ### March-April 2018 AV-TEST Business User test: [Protection score 5.5/6.0](https://www.av-test.org/en/antivirus/business-windows-client/windows-10/april-2018/microsoft-windows-defender-antivirus-4.12-181574/) | [Analysis](https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2ouJA?ocid=cx-docs-avreports) From 43a92b05433c5a3558e1ef555f31aeab3e5c3c87 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Tue, 6 Nov 2018 09:44:03 -0800 Subject: [PATCH 28/32] links --- .../bitlocker-device-encryption-overview-windows-10.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10.md b/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10.md index 29580800e7..d536281716 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10.md +++ b/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10.md @@ -6,7 +6,7 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security author: Justinha -ms.date: 10/27/2017 +ms.date: 11/06/2018 --- # Overview of BitLocker Device Encryption in Windows 10 @@ -14,7 +14,7 @@ ms.date: 10/27/2017 **Applies to** - Windows 10 -This topic explains how BitLocker Device Encryption can help protect data on devices running Windows 10. +This topic explains how BitLocker Device Encryption can help protect data on devices running Windows 10. For an architectural overview about how BitLocker Device Encryption works with Secure Boot, see [Secure boot and BitLocker Device Encryption overview](https://docs.microsoft.com/windows-hardware/drivers/bringup/secure-boot-and-device-encryption-overview). For a general overview and list of topics about BitLocker, see [BitLocker](bitlocker-overview.md). @@ -84,13 +84,13 @@ Exercise caution when encrypting only used space on an existing volume on which SEDs have been available for years, but Microsoft couldn’t support their use with some earlier versions of Windows because the drives lacked important key management features. Microsoft worked with storage vendors to improve the hardware capabilities, and now BitLocker supports the next generation of SEDs, which are called encrypted hard drives. Encrypted hard drives provide onboard cryptographic capabilities to encrypt data on drives, which improves both drive and system performance by offloading cryptographic calculations from the PC’s processor to the drive itself and rapidly encrypting the drive by using dedicated, purpose-built hardware. If you plan to use whole-drive encryption with Windows 10, Microsoft recommends that you investigate hard drive manufacturers and models to determine whether any of their encrypted hard drives meet your security and budget requirements. -For more information about encrypted hard drives, see [Encrypted Hard Drive](/windows/security/hardware-protection/encrypted-hard-drive.md). +For more information about encrypted hard drives, see [Encrypted Hard Drive](../encrypted-hard-drive.md). ## Preboot information protection An effective implementation of information protection, like most security controls, considers usability as well as security. Users typically prefer a simple security experience. In fact, the more transparent a security solution becomes, the more likely users are to conform to it. It is crucial that organizations protect information on their PCs regardless of the state of the computer or the intent of users. This protection should not be cumbersome to users. One undesirable and previously commonplace situation is when the user is prompted for input during preboot, and then again during Windows logon. Challenging users for input more than once should be avoided. -Windows 10 can enable a true SSO experience from the preboot environment on modern devices and in some cases even on older devices when robust information protection configurations are in place. The TPM in isolation is able to securely protect the BitLocker encryption key while it is at rest, and it can securely unlock the operating system drive. When the key is in use and thus in memory, a combination of hardware and Windows capabilities can secure the key and prevent unauthorized access through cold-boot attacks. Although other countermeasures like PIN-based unlock are available, they are not as user-friendly; depending on the devices’ configuration they may not offer additional security when it comes to key protection. For more information, see [BitLocker Countermeasures](bitlocker-countermeasures.md) and [Choose the right BitLocker countermeasure](choose-the-right-bitlocker-countermeasure.md). +Windows 10 can enable a true SSO experience from the preboot environment on modern devices and in some cases even on older devices when robust information protection configurations are in place. The TPM in isolation is able to securely protect the BitLocker encryption key while it is at rest, and it can securely unlock the operating system drive. When the key is in use and thus in memory, a combination of hardware and Windows capabilities can secure the key and prevent unauthorized access through cold-boot attacks. Although other countermeasures like PIN-based unlock are available, they are not as user-friendly; depending on the devices’ configuration they may not offer additional security when it comes to key protection. For more information, see [BitLocker Countermeasures](bitlocker-countermeasures.md). ## Manage passwords and PINs From 14a9647633a2780bb312a2d7ca0f4d7e4e75a91c Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Tue, 6 Nov 2018 10:27:24 -0800 Subject: [PATCH 29/32] updated graphs --- .../images/PrevalentMalware-67-percent.png | Bin 13949 -> 0 bytes .../images/PrevalentMalware0818.png | Bin 9705 -> 0 bytes .../intelligence/images/PrevalentMalware1.png | Bin 0 -> 23173 bytes .../images/RealWorld-67-percent.png | Bin 14050 -> 0 bytes .../intelligence/images/RealWorld0818.png | Bin 10556 -> 0 bytes .../intelligence/images/RealWorld1.png | Bin 0 -> 24104 bytes .../top-scoring-industry-antivirus-tests.md | 2 +- 7 files changed, 1 insertion(+), 1 deletion(-) delete mode 100644 windows/security/threat-protection/intelligence/images/PrevalentMalware-67-percent.png delete mode 100644 windows/security/threat-protection/intelligence/images/PrevalentMalware0818.png create mode 100644 windows/security/threat-protection/intelligence/images/PrevalentMalware1.png delete mode 100644 windows/security/threat-protection/intelligence/images/RealWorld-67-percent.png delete mode 100644 windows/security/threat-protection/intelligence/images/RealWorld0818.png create mode 100644 windows/security/threat-protection/intelligence/images/RealWorld1.png diff --git a/windows/security/threat-protection/intelligence/images/PrevalentMalware-67-percent.png b/windows/security/threat-protection/intelligence/images/PrevalentMalware-67-percent.png deleted file mode 100644 index 8e2221a40bd8e512117566a05dca9780c6580df6..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 13949 zcmV-@HiF5CP) zaB^>EX>4U6ba`-PAZ2)IW&i+q+U=TIcH}yCMgK7h4*`8M9JFiI3_N`A1BRrKQmdB28xy>s7> zoB4WUJ%<9X;rTW1=hbzNr>_%Ad>tR(kDD@I*Qu`yeO&l;!Js>P-n_=u*M)+Aj=R_I zroGPV@ohP;|83pLe-8fndn^QFC9W5|@jJL+`5ASWzzjkSomc&Ip)kmX#`|=C`jCE) zo%wwGBY4IC9y{A#Bf|Gk7@J=M@{bt3j=S`G>~4hKXXHNK`tN_}-F=+$N9@j7^_=~z zuE$KIvUx4azAka!F>nyda8Jv87yc*Sm;2rLt}Jm9^hGuY-_y9}Joi2>y5+h%Zr|7G zCR2=ldxGV?pFZ4UmGCz|Z&ISZ-SLGqEJJpDm}D(**niH&-TStCzv(J>UXGF8aWTgk ze|($Y4*n(QNDYlbvSLisPl=Tp>M5jXQc5|MR8vbm zha7XtIhQPq>Lrv|Qpu&1T3YEf)L2u^wbWW$?aj9Ugr$~SF|D@NdgrE{OLxxhjOcy% z5k?$oUQ$GWN+(Av)7pqGn~bT zI#1ZTc~6V}v}2N!Nk(m)&eypk!7zEAxmMgXKe;>weshCZ&7?&zmvHuJ{EcOo!y=-N zj~!Evz$q0PW1-v(HP*SkTOJ6odoNPwcBx@74M1+AD$XdGJaz`T8Dj00Tm!n~m3UP* zBH*ta9#YkFwV{;1i^gn?_f=t__%=C1c#;JE@Xc+$?=t$JNn-scxkrrP`>WF)R5FCZF1-D|z+R+@u|M zWHx81H}d+k3}2J^no3g@mt=PCF6PoGtXOE1I9`p}Y7To<^qqi(dG;i9MUpVjIal6D zi9$sDsJ<){feKOzIIQwf6aTCvdQG$xv2(TcP=SfO){e!{sx5~xNQz}aXB?L_c_uIt zlc>c@HS+h6*Et-Dqr`dETJ(G&Xhh(&VE!%}Z2+~cESJ<#&5>66AH4S<n$PGmVra&Zs$jBi71QvuY;35}Vp!VjJu566+kqz_LbK&H+Ph2fcGEiD( zjg#hJl>!iCB#X12_t%Zzm+{CF+&G?Fh3*G}@06WpGHhBSVMh9^1ZBRfDq z2^2HMInkcW(e2oQR;zBmDAHX5_lgA+f$bmcR_VLdJe56F4p^RXq-!=|LIzb0vjWS0 zeiUH**)D>a*}8#FRp(&Nta2o=z2+u>(9kmC91d+Y( zQ^0|$?G=2lA(FYAK(I-A&jC_td&&lO4sDON7IRd9RX&~iY{~bH{Lf%Ssnd`j&)Qrg z6y-UGOHgi*NgSIhjhWSY1#c%>+4`|YV^so*gG3-Ap?jpCz@<@O0hQoR+{AZ-4PCCX zPs#}194wS_@9;b%I;R^0$4F$t%&W*II*`R53rQ03)Tx0ca(eT})$#7LJ9F!vvMik0)5fH>1YoSH9 zpGwR@404I>SO?{gvWtB!iwdh9ff!GW2iRr#Mv|b+-e$9*-?p$)ip_r;Nrlx4f{>R$ zb3{ZQ5RL9QTtl*_nu!XM94QbY*b)lDG$d}w>F8qwM-Q06mC78Ubb(KWguwvtO&3YX zR&HpXJEDj)G>zKkVn@Okm5Hc^rC8tK9+Qf%?QlEF{d7MXz<&dzRE|xHFjI=6qfd}t z2_i&z!ibwv8fp2j^^sgO5oI=L!$2=UCKD0WYYh`Ml3mh$DJ5c5P_Sg{>+Fa{V=S=- zaVaFEas%8E;S(Of+9ArgdN7n_Q?TIVRM5*s1k@vaLzhzmDnhO=*_v0kdXm2NI9rr_>{&$mH=h5 zihkULd>8IUcm%4T7%Fkk&QzO#1ad^zSi}JU`jQdlHgQJ3kPWVgoUAw-N}j}8d`&@d zBRkqsUy}X>{pplGYXE@N<*UU7c=);_5nobrO?r)U#c)VxIEqm{wX!EFEdy*AE6^rj zV7UAVD})7L0(xM3+>i(pu>)AocslRAg%Zvz+{j^v%0PytJ|IYl7TtSrh?v;TD9H}o zpzql+A4I67&|y5(DAh#D#He}ugwRz5M~za=6{>)N z01>j~wBLaV5ZRW&ACS(FoA&t(cG6u=>j8ZNua3Qf<={GlvfN`(1gmXYv{AH2dKWE? z-YtkV*m7*RqelZIQ|agqFdQ>Hz$U`hC|$l#+gkZ`3#^PL=oXL2uMyo;DY|SMItS5d zmUbmkVRRs86ZjSa#D2Infbw0BHafI*09?39Ic#-0NRfvLsMYQlOge_PFcDeUDr~`~Yej6( z8Dg8di$Gh(y=9Rv;6JsY0QnJN>eCDfdEByGdJzCkdY<}h2rzO6g}F{WsktE0ChLdh zBaZydW2|OMA|+TPq`1LqR<=cCIED&eAK_$pdILU?r5NjOY*JL(qNOiFq#Bq<#vOJk zf1x2r$f7T}p7%a5@I1~wOQq}Zbxj|Ndu($uRbucTWR%Dtg zWhX#H9)lL3*nV<}g$W6ULX(9&<*?z|4Lno#7QawcT0+U&)VHa!>fdF0O&bjmE48$l ze}jbG)RuJy`r9TdM{5v0bg9+^p?bnS*VbTRqIj*saa2#F=n~{QavzZrZ||l1=Yf#tNAqJWmMfpWOd;3V^oO-9;%?c!G5EkwhCN zho=xHzt!CH>L5#+H_0jQ_WsLTU4)lDF)x75w>fQ3u&LP9eQ&d~5@AZJJ9$-U-NMOG)u2U?6P0(@VEpP*>Y1ER4;n3Y8RYYz$$g0q&0 zo}iP(ay;7y2PF#C1d=wgK~zw^5jf^*)IDBqRTNnS2RmA@P_X^(f;?abA|8j#=3ZCJ zEqYH#M6cZv+q0{XP#|HT6p^e%Yp6La_Uy27!t`ufxfc#$&JwS*?18;ad5zK2h}W1O za8}<>06*!bS`!NR$-&*P3d{Vw@^2Tu*jMg+=rj-}pycVpXWP{>fLK6ZYYD5KYshWAF(3Gyc2F z|Nj|}w~)Oq_$@&kdp0zGM|GBqqd>{l4ACG-BUboohTpo;Jn(#0zZOq>Z18~p3H|q> z70SN|H01;F-bmIgTtEtMJqy^SF}c{HzA;gl1rF$`o%jofjDlACP_cUM zpJ0Awv|$NUE!JWTM&jY(k|=s9`6jCh7SY;^^Dr-%e&jB?G*!8BZ8FKKmXY~gYD8lG zKII77&c9VtP?gP#CMMzw7=$2Ky^j`veK}EXfy1FsqKT`}j(x;CF;6P)cJ`nJpm7 z%<~zGqOA~Qc)yF&z9%}p5K#;n;4wQdY1Q z#@W;uT}|4NRX1->)$cN_K6>F*q#44&7zOmlCh8Ms?GR_1_TAcN8P^87ZEC*HUolec zZgO4IE5THGh45gAo|r2hJ?%hQ>f;`i99P}XgCa{U*k=BW#UPqyJ?JkfIe*mu#}>QC`+65l#I4`t#)m?@Q3c#k_roo zWNsNB#GLqi@Da4qQ-_p8KKh&)E;nlSSoL_fT4>3njZqvVB80rUQ3}GE?l8{=iXPU` zsz|@2{Zff-!K9@4dfXZy>?kgqZG17?5@&6Yegj_!Enqx9iVsDY^tk8Ofqys7{Hp{1 zZk+jd@BCNe%zwI+pX1E`Ha7nsYz^c+cF6n>itQpB z|JT>oSy@@d#l@?ut6W@M+uPge>FH!-Wcm5|Y;0_Tf`a4YTz*#(A@BxwcvA>)0VK_#MA7LkB|BL{X}xad79Pp_WMM0#6)q# zZIRK+*X~7f#jU~RkgVKijn7AP#i6+2*5LBK&gxZw$wqU+7MRq1f2i0001TP*uGE0004EOGiWihy@);00009a7bBm z000*e000*e0m>%xKL7v#2XskIMF-*t5fD2Y<$Uh8001BWNkl5U>*Tlbr$6&p2TwN|WC?T^*zt@0R{>}4*O zO?a8h*_|^EGWpGPjJ@1sf60!$0j&tFoF*g{d|xPTYfGwHFH>wWvhQfKWqKEl2H&~F zetb+dm^^JKW2zMT?6wSHR|qLw?M|!<7>w}zcNFyJHNeNsa1Zl(0eC1O~2{?D>4PpAW!e#&i+%NVhqYKJM2V@Ew?>yEnlDz;)d@6)Xb zD!IMXddKM}g%eO+H4h^o$&SQCi$;pUWsLF@?bO~^<3)GCvM5S;z04Ukyq)eL9gI@a znl(>$Ex@VhsRoF@D#(#5j}NG~(}Ux894)8L5uG{gOx_5|+gcI4@Ade15{- z7YJ$XWTX?8y=2ae5N(f6kdEASQ6qPs=9hY~GEedzBplzCxkI6On`ATwrmL_n=b zgM7IL2Pf z&vvm4hy;2g1hC&{+BH8btV(^bS2l(&&DW!hkg*k$?o{_=Vv zJ*SaCwx3PP=4;Mb?JyU%1Q0@*X+BF3dP$*-m2PZ>)bQW0YI>h!|mo z+BP3fE0#Ql$wC}J!9G9=MA|*o0Ti8(UMXYeC+2+4C5SC5qNR)-am3Je7!~QW90&7M z=C)#E$4Nj@r(iyt5JQPzj1vGHcUk&*I*7Q6b7TPvL=8;hwoDrPI7UV)i?gLxEN8=Z z+CBo3I)SX?TsJNdGe}wfDazPRlgR4fdHLtp1Bea|?quI99bjK!7YwdPvL?!gqW5-| z0&`L#MoSs9c#9hC6vdkxzlc~^+KT)thL&QsSFDfNtKJ_=_m_wbxy%>)Q5;Tj7CFDf z$)@cIeU&42T%K^Jtdy|?vGw)^E(Gkfx0EqF!BjO4cb788ws0!?|4j*NtFgEfL5!M( z&@C|zXP3^Ey{8bKl)k!d zFxL-;ix{Orn9k6jg5LCmuy}gl@s*DLw4Wj4OdFYi@>%G!7|U(8@G@(uF&jN7%Wq)$ z#MU*FY-9P$34C@vHnz{*Uht-~V}mr0m(xWSrUzIM^-=*zEb+?`kOGD$u*wCt9b2In zu-1(3t5d=6Udc_%!{9JHGcHY z1nY-V)>-f4kFng%39-W{Oo`cv2FqZ|DC#g`i+E6umCz(ocuzh0(eK~?_Ve%8>c>YP zeERJlepsvf-~8jB|NQ!!wX*)^-S@tI?~lJ(tHIdUzpmHUZ@ze`zFv{BBXN`vBW%f< zFHd{2Kji_WN?~*?CQ^ACBs0T1VF&jND*4SHe*BLQKl|U`uhWV5zx?py&wl;KHL`yH z?N=Xu{MEPXpbh`{J2v?5U#tVz=YPhm|MTuTef{)b*w^2Fzm`A7Qk1cYlHzB6nvu*w zVah{;6s{C8k`Edh(Bq+S&zbc5A3wqL;jdqQ@Zjq&%dG$W=;g)a^UrwJ&puycy8rRN zc-Bw;w#G#H;Ll})fBW*X4S)EGXZ`q7`QBP_)gP1Hgir*Bsg{!xS)CAKO=V&$v1pLg znYg;XaLs#a-SDV0Dk=8rL%tXyJgnjee}{<`PlIWfA+!4 zH~7;(m07?1{-v{i^xI{F|NhZBS`iT|NR!81I+luvbtOW29huCd5;4_Gv#fKXMfzow zC(z1}|M&j`8-o4#pWj}j|NGsQ^zD`O&rdJXj~|v3cse8~kG>Vnz0%KlXx**(hUkB{@wI zHy(i)%A^nrk(DP%!!LYUXkF%LREGS2{Z-kGAOHG~^Yq0RAFQUY|KGc->H8nf)A#Rx zycCpgs%9pYs;2CBAAiWJ{Z_8HKpvV^g?{muWrN?XIL}U4Ro1_LR%ZR*DjCaKzo}}^ zryuiK^2x6&5u@fU>xwe+7*i$?>r6?A=R#`OiV6Oasn`%`K+>sMcpx+`b1W(m`=*?; zpS@RkfwW!8D1YO_{^i%zPX$&zI|mbN!)dkQrZ`Fzk0nZg&37Yu54XPy{P5n*=J^VQ#a-R}2^k?aP zWDL!=KmY6RpH~|mc_m`-?r;C{<=?)pR_&FD5&4VXefj0@KBzR&;g*%}A3pu@Uq8NA z*0}k-<}D9GeS{kB789si#&Ev>@WVH^7&t|BOfB4=6>eMOxxK-+$XJ>6n`%$) z7R2uCD>Yy1D%EW=c2~-`*Un1Uexeu_YxkG6*50$gY_7i`^12aQJP2Ziz5W2K{}eG@ z8?ltGkJt-5_Nr0b4jcFnw@P-Vd-tQ2=5dikb|)!7L@x%)G7@Wt*>=Nud}3v0c$G2X$K% zEg-ol#$fmZJXUDNbs3YB13X#`#37KR%)$4wi^2kD#6WD2bQW0v;~1{X7^6NA@S<>= zKqC^%=c?tSfjcK)MPW`R;eZlZSX}2ZV3r4XYT#xB;(=Q}_Rspff7sNHNeU73r+QND zkG(#v2ud&Q^g$HTeur-$rqXP11Sh8H_-SPKd^xy!GxP#62-@#p2d8+M2AZDo%`XTW z^i0)~-5^zjd1(5UtY2<0cYzqV?RRX#6fbKp4Dr}h`KD!=N+-{g)M;fSO0~=_SV*t) z7;{GZjM&{Ge?Bo)Iv??S>q$4Kqg3i{C(q}BWh+@G&ad-W*4=e*8mN;-n_-UPIUmCl zC5s)II`&C7?G#DGw%zo)RxH~4eIS--3JSE8tf$I+*MnI)bs-K-ElQ)wVrqE0{5JeC zvz?J*l#e7L@$K6tYDyO6b_$x9gdpjO$Zpn(Ak8C6%n@c+ZOoo``OWVxBSTSYn}nW@ zbwUN|%GY@ea;a;R!ZC<-m~^qi0k&r>0{A{vWQeDNMTA9sxi{dYjLAvSW+Zk2^uUV% z1Pw1b(1`|TfZ8BgJ69}{swhmxC?QhY?owj67ZI55B+72#vData^9^FWJ^H*w=$6DcT9HUF z!qVkXkj38261OXPOh&}$DI;ve_X?6n{8lOgWOpsaAZa@pSnhDJqEe~7GEZy>W~c+5 zW4`GSW``Nd@?zlYKnkS@t*~)9*{|?eK4P+aOo$cs5mGvk2|I1z1k*!=>1cLx5W7}i zzLCcoikzw_xKk}^5#npuju9$$B~THjF!p^x_v1^Al3iLJd}ho?s6N%Wjc7$<94VZZ z^2i$51iI9X^}waKtx{b>Y<_Uq1H$~natjS4pF`9}rhXX9{6-Aw5ue?R7%lZN13!JbRh@>`MPz_ z5!3kYg{qH;NgQw&5gSL#jr7>|A{QHaIEL%CB1bGb<`GFQB6h+NQ=16*Ou=CkW{fWK zsBkZaZ`D>r#7tD9;Ob6`fUfcRDxsYD{Gb>!+9*)5Or;zAF+^;#%MlZHa%2*VZ*Gdy zY!vJwvvrHCLB~@X>gK&Ik2Km&T?+!=oa(%phhC<5vfeYr*q&y=i7a?fVci2`R7Kl? zadlJvL~X;wPFdw7DneTbDiA~R=7XKJDeA^_gnUd9tHf!dTIF&>ija2FnRkxZ>GZvAdKT66?nr_UgJnCbb!8h*dD-Lh6NROo%-$qB8-x1(hTm z9AU?m?7Bb3Rj%R@2!k+2!~{IsE{N=S&H@Xuc#m2k&ChvYb~S_9LWmwyo+Mb$d6m6T9-=o1O{^$fYOcZeeI=ClVw@47$65ld7C zePPm0Iao3oDl$?Fk{gaVDv2=l3+T}6GKPqeo(RT(E-=U87_;^dAa(M<1*Y)bd|X+~ zRg*adYWKXrH2Kkp@1_CAs%an!m^NE_s0-1a8A(1Nu!udx^n;- zaiR`Gax3_R^DWbbLWlcW9&^3W&q-um^Blg#l>m}54AUEV zjIdA`JCf1y$7+)9!bbP{yaWWo{n+6m(+a}(XJ-b&Bg9KZ_8e^nlnT`tpin?*= zAq}vFhomMKSYWgP-Vndj1l2_AB)x&hQl2#*FUnqF4x0jOk15~ncHF>&HgAr1F*vI{W^;}& z%4?G`Mb%$G+2`^ge&_t&zjx`t(L4PyVCgXAai&bgYH0`QT%;&tTr-lyr885f557t@ zd5Bf2#zU;#-@_k6m}h};Iw4e)0Vc>}$9{%r^^lznJufWiS@pW&1FkE+Xx+=!HtKMQ z`-Mv(TCmO$9Z0e!ptXtydjL{MXZC}yE3S`N>p|8PUu)FBi#$eqWA64gd)p5cVKy3{+KjiWGQ2)d*~sLe&Z3Q=_y{Bi}Wy= z6*Z4Nq(62|D{2Cd<(?o=XVGt7pT}}HQ9sIlQk;<3+h88sw3Xm{XhlP5@(sNOyK@Yk z1#?d(Q6W!zb8$hy6CjyRX42E-vBe|t$6o9~TJ9mu;{F&QmWb(V1rSr{<1{h2i+0kl zdF(Cn7(Dr>YJZmg*yCTNdeS`h)b5XMK96nYn@{T4;%9Di&hwPNj$Z5(3j^H^i! zd8}FU*yHB0X6=vF{@6pv*wfufY(xFAC(UEEKekys_VnH^ylHRnzK=ha7DYxtDx~F3 zVhR2tkaOzD_%TD0pD2$#);D-(p>QG*8ulW7;}YWOv68^}u%}SgiKhjuzWMgScx-(c z`}z4}@{C8f$x1;MA^wp$CJ2J**d*2)JeF$irjLNfHcZCSHyOpvR0)7g9KMqn-{r`a z`PN1ve}7@oNqe5wyn=6|=CL=-V|QvryB&&ZxszCl*fEcOi;j3?j+(`hHrDJst9k4p zdF;i=9BGTfNkqAfb`EIfV~vN{f#r?*V`%9(zRonCyD;(UeU+Lkr+IHrBXA;HzwEeLs_O9C6AFE|-!~C&D&0}wu$8PY)fH8(mGuYXi;TSW{zh!<5*u(E~ zRQqGA$x^2W1(8Bm$;%!_Ze&6sx{A$wSF}kHrVpAdE#M`d|{Z(-@_smZrBA|yfB5|MAlGEt~54|~TwsCn#VQ`UTwQ3Eq4 zwB*8BzLk;09hullP`=~Oo{9Q!nzAeJs%5ZlN{Y3!7L#>z%G6vpE2C@o6=iJgbaxcD zY-HlmwsW?Vn8n|G8uiNPHxmpqTy)&S%PcZ&HECnPKeV}MTzr;?%FoS*DSkC6Z8quE ztLe(s&6UGf%IDcGu3y}J{Yni@{QIREdU+V@UA)ZoD~Ea3=F3%k(XnQB4}Z*ZO*JDX zYDSU_3{tqIR^;1MdB;Tn!OFf=i!5C?Z5L~2rOEnP=j-Oo8f*7;-b~kT@Qa9D+ru;^ zM(E2Tg?I+JnJG5RdTE6Ahd_uuO^ajj>57ciPp-dN%j52+YFX%tLQ0a*4d>u^&=OrO zg+}D+CSkLjFgNV82e&*P0aA&1RVv$e_?oZVA2XEV`oTiqlL!bMp}a?0G46^U_s&+( zg3e`m!Kn*mBKodh1=;Wyv2~#XMAso#tJW&KpZFVriY>groX;6#sa?)s@O#dL*liPL zarHXJffizJli71dcvfC5^x_D+p(Y^cRr$ha*cZ@#siB-=`&D+x)v68PF%)rv|1J;7Hcp)F{teIY;@Nuz>=C$}J$BYoL3?NEoH z8wkqTEQG}j$k=5xtU}CkaF#&-@RX%~Fm>(cQINe*ZL6}{ESwxB2+m>97gK5f@Mu|! z>?Zg*F%FKP3Nc+tNvbFsDKz0Uz~-jyGYwMS4OXz)#x01YI5^D7#VDAHXFW4Si7>HY zbb9a>{V~3Ci(yWp*bik0g$u-N0#u3I>e;~@6;B^%U^;ey;<9kg`mvY-F*QY5RCU90 z;~C5qsxV+#(cKu1x)Y>>HA;>!F)N{ zCB;U0hg)ULaKgYJ(ZD4^_#X%vLJrr{)5j-QWAI0=G$DPx(E1HS`bfmq>9%}Bx?wK|%p7N;!qNOlzT3`EQ% z30B(|;7-KEf=}`^4vtwVW40neZ~$+Y#|mt0SR$tRB(piGFvTQZC@*h{-oj(d32e*| zps|s6P1ELf++s#j71ds)ji zDxl0~h;!1244f+I?f%$n)ru3vOq_JGD+nk~eSd|=at9}SN3KSUzlrW>#sDYT&P3MF zIiJgz8^ENSRLU5cj9lP|Y2ZC;b|tb>ZNjUaR#XcY5PF7)m$2x7g`ZzOhp;1 znqr6;5q28H*H{}Ft8I8Y7ZSx~tZ+=w52|{bDK?8d=q&$i$&Fn|YqAF)Y2k>)}9kNUr z97aia0WCYkY8zryX|ynr50)9_&Qw%9u+MD(B5Ryd!a-Cuok6E0Jz(TGhM^<6E|@zP zo(pqLG?)gFTTv|tr%1JhGtk6|j`hrvbGsFt5h@PE^bUXQb!x?Owc;!WXm#xZmM3r1 z&u4p3oMnWon^D}F70#|X%Lgx%d0XDIN|}=YkZU_&+?DgJi)F3$iYmJ+Gr&bxuhe>v zQF`^KYJVQdi1JrmJJRC~P>)vs0001lNklkIsPkQk&S3ebp&ASe#uXgygmA^3!y=VE8 zhPP-m7LDc$pT^>r!;6Z;*K#c0RzVL{e&e3yzt)B}Z@B*Mp?-qaP?no6SnJ2)fKok^|CvviqYA7fVpeQJ) zl#kHvzvoYTTkacBUDag7Q7T6%cJEKnt-y+46qK5H%%3KJ`!*vL1r4c%g@wh%#k;$^ zxw$!AU0nnMQC3!_udlzfw6wdsYi@3SeSK|bXP1_ic6D{->gt-And#%>V{B}EdV1R0 z+8P=f8XFrsK0f~Q=g;WqXm4-t{QUgR&Q1>xkByCugM)()A3mg{q(Gt2`uh6t@bH?N zn(683?(Xi&%F6!!{;{z!YisM_;o;5A&47S_y1Kfeq9QmP-rn9`Qc^NIJ9~6=G&ndo zIXRh_m^d;rvbVQ4zI>9^fOJirO08b$nL2QGcD}y(CF#=RoiTI%{U$y>UedKk(z(a} z-NfMBk(3LfqH8OmeAy~??6pU)NyJEK{(@KPa9rVNZu45l=$<=l+Sb!P*9#F%1MGXybKQwz*Pk=5*<|WO?d~0_!r52O&#@BDSb3r z!zaq%4L*%H!W9nf5|zBN&u;JBJ2~t^-W$u($R%E`muW|Gt&OeGJR;{jk@#-?Gl3x< zF&bm9zNDdcQk1gkml7;lY?ef?sg{TxXut4LH(Pr-p++Oq9M?LHjXk=ej!V94_uvZm zMXv*len6lVJ)lM&Y1N9}wn^>r_~#o~7?uz|Ir$X`P8Gzn=q$`;mgL>{gWu0Zm|u>CEb|n8 zs56m>6Fhb5oRQrhCzWoAlh+u7HC||L*IRe+RWOkrG7*S0bXk54YFY}g{-ontwqH4Z z;U$44mztO^Fa4TsfT4oHN2{y}B?hM#C-vH7K7~`j3|L1Z+)wHa%;rD|4zr1Nmd|kg zmdNO?M?(55_{l!SL;e#HGQ3p#NG_$JHNnPNg17OXm>(@QDuS*Y*B(xKA{krJTU3P~ z*A&;_DD>Wa&)*jyQyUTuNYW>JlTm>56}vj--pM==9MNvg>ZTLtAVWN%%`jRJUHer= zrfjAdHc$F45CIezL@r~sZo#s@hV6>1(S+%Fy=fOulBq5V8+zmjRS3sf-Xxvn7i9VA zoJoNYdh$8$`6pm^BYSCMT*Ho3#>-&$x08?X7wqR^ zu1RDx=2(rf`HBVH;T^!lkmM)%)kHh6k3~DZ`H>=vJX0ipVCm#U^(O!H>O4wjWB4h* z+!V3>I|g>?JMZjsJG}6LLU{6tB?T>?08#iCa@2``t{#jfz+Bvl)N5h8Y!R(`;q4JIX#_S57D&up8%VFVSf|n`04wY zeB9}y2U)qzo5L7(wA<@qg$EBY1p6Emg7e%5Uo7@cJayxjG?reL{6u5{Gts|g_Ptih z()^5pOVAM}rKZIkL82Z{;??|w3!P)}d07&-PcQ!GB;Mtqdz82YJA!I&$n@ygc=p&3 z>b&ME_P9)IPIlH~>vDM58YL8@7F@w`y2pTpl7n;U%BM zVbCA?I!4mHCe)9c8(3Z-o)#c1VQ%Q#R4Y_hS=D#6C=gxbh)!GhC*_I4pNd` zLU1oye<8g=t?%gH*JnrgDl=!eHZ9Y*qnI)IepBZHx(($3z?5kBLKGZn8XDZTZRdnXMyr2=1KC>wBylD z(Z+Yc1Q^9xi_hX zB~kJ?vnM&mm&K1uZ+jYrQ?$S+pADZ45$g+DD)iPJ~kL`Gkt=`n_ocmaL>~^I+qaWmy*HGF2zmk1;b*owy9z> zwvH{=*U6~F!=JOVB5a7tmof=1 zogwYx;4^L&K$EE+SYS>%jvQl!IpIlw!^~rhTFXt^_BLV4jn^MUdJ6f&Ll9Zel9RO@x&)Uw}h=%lw z1VuI3sIU~PRLt5<+7T6gn?mkUti76693c)eoP2pQK-|%xV=binDNQmtkxh&C(}G7F-7-jxCdqSA zg`%_iMYE8@GY^t_#sy#lQmYuyB+lMU^e=jRFlT@25KwOatdG=(S_{{+f<>>jz+Cy68*R zx5Pb0XiIAcFf{kfw*slAvR!GylW$jw1chRj4Q^wF7V6^}>dgoq(bbyO^YN0Zo1j*V zwZ6ax;Tbsv20T8zB8*Wzko5Jy1SNcloP}vpADl$`orLIAk0zFLD|f%f*X2Grt-=(< z40vaQuRUrTqz_{oH-alwOg->helG5hU$LM5-p+&6ek|JD8tn1Ooq>S+DNHi_U?k>b z=xmabD3SgUgLUxcDO(nxhRBqiNPO;yf#b@me$Top&r^x^AX9XgOV~;<&SMd}%-rQw zy%jP=+44=edCC*se0>|2vGNX_nPF84$i|6MxB$Uw4AknA;_bZa`;+Vo9PRMAMeF9K zvl|20DpD9LSobEBbP~QXcwpf(4?86OES1`ME3lq4&y4-|>SnSFK0nZFKr)HG1CaC| zN$wAo;&_bbdtr?=86!w)`fqTO78$lW?HCL{K{3re^DZnL+4|?GOgSUO0tPu@^wMF! zf_zj(K8#}s#_(Hi(6nva5kEag^oDTw6OL^F*qUE?FzOj;`6gn2=*O6Wn%%4Pca48_ z2o=KYMK|;;=d_3Nl0nFSFn?YFh@j#0=<}Bo`7nX8C6W<++}xMr?1aT(+y$r=p7>F_ znB;aPDOyZS@fm;d@0z_3N~(#o7JH{7H+(nrm!!DC*8u*jFhmy4du zMvE9bxy1BJ4u7t5Kk6G3RfwJw;XjL-Z-yLH`StxO^iN3bHpUI~>GKCt9V3}i^8-BYso;UB}WnSWD9{!5)saD}^vGN*O7?ojUkjjOR zmo$51*i6{q<3D4>rQ}SsH0lJ$mQP*;v#~1g> zjCvXP?}{jlAI6(M(lI(*{2pqzQsnrW+`W-3@f{X0iI5UyqNZU2A-tqaj^+{P#ei!B zdS>lV^%bdZ{BDJ3zK(4dK$MA?tyO+f;87WMlCE)A_0>1NiTgIQ1^}!V{1r0m9VJZy zS0D>B&|BGAGt$(MThg#MfDw5rLbfaH>?Z4FYk{?bFg8_*TH|*P)O7Z;+{_?5T}X<) z#6Ue~=#{(;vwa!9uH`lZbsx88P`Y><+xsDQ{L8~o`56ruK0DqiTRXBzoe}^$NZN9) z-o)I|!AO?dPyRp$*qkE6((ElR`Q?Ic4?E!@PL!_8D6kpkXQpiutHI^W6iBi%nopq)r9g2%n$9tX==JTilTwYby2Td^&SqBGZi@PmYB|^Hu-XE` z%pk+W#&xAxmHs|O;1C)uv?=n$%836F=xoqdk!BReNN2(J=qScB|ETvVHM+~!PkX1f zM^KZwbc4O=uakBnY~8%6HmMWAs#>pgxX{dKlS173Xl$+dSP7{Q*sSl>!PRsaIsqe0S9 zT;pb>6He7@NT(FSeTYq6vhDCya6s$#QHEJl`;Ccn&Wgw) zquc5dZ@-&s?aT}W{^EwlSO01*9L19*+&1@(#4C=ZMaJqWfv>6KRK?<7L!J!x?yw?V z3~G@wD$i+++*_54#I97~HOlW}jZqKZv3NO;i+XgEjHJoOfzta!l|z&k(e`wM-ggW) zp<`-Rk9>g$soO06L*h(^7UQkgxUQS6{$XEvwoi7mK zY}9{>0p{Wil9PL*eJpRKkA=-1^>*oq)WqY)i5Rvag(J8Y8CYUOczy0@Xi#HYYb(;nckt>4rNn0=uX5F1L=o~0rQ_N$%v1H5FzL9Jj zw97*+4Z$&woDuE!aT@HCd#T2-a{{0)eqwQMezFU(yXAhd%FnnX||E#(yr)~Joo3$n1SHMoL{*nk~RFvk6TM@C&TO_gG;_W8 zZJYA`NnVdD97D%3Oj?NFb~TV0njFesS&$L2F~lkwlc;c@DKkFW3x_*&Klz87V#&HMvP;e)DUN%Z@{qCEMu&yyK1_aK@E)BDtp3hqUz`6l@{~2F* zZd&-{L4C(T4#!8h@hgfJCrDCH4V%2Fy@;z0&5db&F3z@JxLVjP5#~zS&{Z5G)foSB zMU@pcbw7qxb>m-p2{=1F^wo6=K8T(u#StpEUnsjmrn5H}Z2s`su733$VLgLEIoqhP zk@I;m)yC+cI#tVm+{Au}7h9;j$ymk3I$uw6DUknzLG4 z+)HfxM-9pYK>2_f{v}&lx5vTld9qYsckoKZF{AvBgIgZDrhh zqRaN55V*hmTD=05e_eTx+^P|2dxd&oHa z$7!TKiMjcWdFJ%@!gmED|3`eX{XzB*{(Du7K4bi*;ct>`DBN@$yBHYe=6J#ZwH(rA zqQCKj2edxw?_mv-UDf8|oS9;cM!G-T#`0Sj$GFb!%PfNkp}C@W9N1F~UzPaiC1{)X zS{k3_|MFam4mQZ_nyXrPFfV>SADMa#JmUNs4VjPWm^0YgsqGYPE?9+|WcSFNcJU5e zgMXn}8vn(d2&40T@+jN@BiK`a{fMlx7s-9O6W5nkQ@xao~I4ypn7$f0LT~z_r~1J=4D$y@p=$ z*@A(@raeU6|EO=2Wuq2gZ<_WFzsH->#8&q>&t4K3aju8y!5*SAvP*6@za0YOWq#!s zOl_(R$ zHoXSfOyF<=K0vf6?uN8WzsncjBMx+4%CF@F;81aY#sH}5Zl{FRH6ht5NV6jzf1ZsH zCi1VYGgdqO{LJhMWur@WXr1)D<>CruhhCoj#daQf&JI1~6xHv3Gxk5-0zW~c>{T#X zupjD=Q;h);sKwI&qCWBboONSsLJbP6SZGv8uBwVNCohl%J4_mk=o)7#enI*aK!jn| z$)wXjw(6TYomIWqNFt1SLZ!jhL=-KT!}(ziC!xV%Z|94S>gGf-RbIEm_ioC04xr_H z{uANov0G4M=MS5rRrXY>jvq|) zz6^WU=$_c*jaWF5)2z1-Y4)-yJj-yxkV3sUhf2)1=S))@`duUnflx4E^_{3G}USW&Y zBYNSY^UY#Smf@;AG)~iUXNLAL&Y_pvo5h}=2zsHHm!;beJcL=1-}$oElZAeA&x&Ttv{Zw=hD-Ig|9Vk_x8NY zi*$R-@1WPglJZ%pS1}sNH}mqcZ-UuE*;LQZo&j^UT90GDKY%p7rOO{lfH~_&gR-pz=yQ-|{e27p4|x>Uf^ULRH`iRgAJ|U@I4bH|6=?++#}cQSziL zlx3LAeCZ&qt0>NaLYo2IDXNBr*2!duRkUUKZo;ljrRQ=5jrB zyfdq#3U-|cP-BgW2Ot2f={6Y3`}jX82e#C?;TN2PA$Dmcji zaMYUdUa<}627ExOgPkYlZI_Jo#??)xeJsT5>e?~z<{Gy2!RYq(kYn}M<>qol_afgRE+Aj4v=4_604baVSWFL3%viOAO|-p0FY8d53L| z4+l?GzU)Kg&icewRs!xeL@^{&JmEAaiq>~;=C)5R4Bb8R40`WJTd1BmH?IOnObW1ho)*2!U-cx(J4yL_71$xhFXxEx@Q#_?WBE(Hgki`4Q<~AWsZP-4 zrqG}Rf}xo{+@DB2=-nHR<74fKHhFaTK~kaGx*o%${V#9gok@5_^_#9?o|y@X4h;Q@ ziGf>aXC~ByfqVr5WhZ0egM3HAm*?+0#iv6%wu%__7#+c_w^&Q8!Je4 z;Tnn`?1)z~8+s}V?jLLzE2*+(PPLdPH0=R+`|2Ka7tb+7a9%3+>d+|5-X4oyBh6LH z9UtS$D0Jg4Z)Y%}E>eqev(NiMm-N*auHqn6fRWZt)s)Os2ETO3E~72&JEC`jQ=i|s z@)qT0x<9^kDnv%r_t2!MBBZjmh&NPmJ9W>f52icmXxncBKNEgl&i<*4di}~kV#r1O z)pOdMQT-BwN_tbFz(r*6Vekn`fp37WO`U`)iyuUC^Eo;K?%h>r1x=z}+$0p=!12M8_^f#} z!ZLz0mYYcqaPv)f)uyv}8L9_| z5y9~jc(#OC)qi*313rAAJ?HT|3akmSazvh=Y{u!_+x7jlrXF2)*}Wg(Esd@dy}vz- za>y0T=-G2`+=GJ3NqjuRSSae~OvC$V{%y?rO6&N?FX7L!qo6JVUK^|+1=9*GeRl_4A`TlGLKy<+^8IqCT`<6T#$jDY=~f3gv9P zov$W>;}Y6!cdQ^7_ zU@Py^LIk^#RoC)V)3%9xbgV#Fe%08h%xiI>Z?JTq%Q`qI0g9V-r(?}ILqF2gwf@i{ z1HRe59pkZZ{~M-~bl0GQR48GKUPt%kXJuWHKN5a*{|D7Y%m0Ih|7Si<-3T|?Unn8g zMFd@2Nxy38L*-qZ9;~q|{U^aQnp#og?^tdut!1#Xe)~gRwYoaE>IT=hdQy2-+_X!3 zfg0^^FWyUCZqlbm{MDG*L`-D4;+wh_zzuO8nBxCuty19g`bYlJ4wm_bopg~n-!;Gg zQA!D9i1TB)BL~`gTK`>B>BhNzd887lk49k;29=TTxRJ9U=I>Omu9`6Q zU6A2<8d-5wvp(v5RR^aq@h~RIZ-1w>8abyQ25}g5AOm};*{EWxJg$wI>{H3K;fMpW zQ^17%XI9XqP@WsxBfpdgI8ZubuMM- zGiMgsK{!nBq7SqN`K*kKN-pv99iuKwJ)PoS^`LDe)}8o8oDj*=#K-+cpEUDUn4G9^heyU0vt zGEeXEZ{P2?p66TZ``%~0`(C?S_I3S--*BGCc^t?2^HWlg-bY45wq?tfeX=qVDqFVv z6^Wle?B0n#TU6;J@qarFE=x;n*(Cn=vLq=Czxmr%M$=)-7WR|Gzkj(Vh&khzyBuY& zNbc&}vy+^XXs$9Rc`i;ncu;nmAiJRv*Hdqs9%+Iswqmh5XQ>SQgEUk^H)c*YbKwdVMG zdcAKIDDoVbtr9Q!j?m+OZ)NPgNcGW!@z!rq#qM2a8V+uk$&wI1 zmC~Pogp%?=gP@zj+DQZH@nfg+3=9nVm~6>!UpRhnw;o%C#n0Cjy%#cD1Nsi`-oCYb z&xvrktdbH^;?8el^Uvx{lv%doldi9rCI7*HzI}m;`p*|no+Lhfo0FUPuLq^1aINhh zYyN!V_@hU}rSFCO`NDrbvHRaI+%O`pflvHAUu%+cui}P%LD%K^E?@E65)2oG>5`O~ zi`5!p8ixOVQ1QBHw9J*ds^2cIapbbbeGb)CGGB3{oc4&x_JDcbu-e@x=M0&`<+!-H zKYsnXzrVlV%Eo5f+uU49MaAH?r2PDdiHQmN;w&30tLZWQ&F9h4(UdKA>j$Tf%aZ3? zllnSxEoDM~Q;xlkc>45NY^Ts$8G0q3 z@lV;q{mDwqoc#RNKYmcKva;^ow@*aXRF|0|rr?W10WFC{Vq<3)U7Sm7GSAQ{U~qAj zO9(x5T48!Fc9S+-Za&_O;{d(r>!PAnX~W+!l)=>%J)7%2{mw=DWOrR>`Xt?kW`}>M z-Z1ihy?yInqDw!wZ4B9L-1k{};PYW>(P4GrCZlZV`ES+Il$Ab|4ed7DXGhF7&0D=% z9}dkp(EB7-$DRnQ6tL;F%_X`6Ia(~YAn8tvdk1@dv|VQ3j5nvd`5n1#dXgsxiRD8KbZk&4R;>{$*qs%2EdD;4_ zUcWc*lpp8e;aR15n$+AQ-TA%l(TcH`ZMdAIx%nBb^dm`4e(I^DneZ0=ei8b}}=kaCFn2rvuAbK$cW(s1x6wg#0 zee(3_)`NZ$?`?ax+LX*6aW9D}EfqB}HN|RHyL#1bcA(bFVUA*7<@7WszP_^J9(3&d zeZ5Rm6O;Q{SzNz<{d(`SDcWfEI%gFm|p9H;`N$b7ff)zx(sIt7^V z`l}=lglp)%%F429<*~7`ahU&g^=phsK+n|au-b1VQXt7XDK#}f{MCo(^DZ@m_Ai8- z{C$0QSof4(VFE1TMd1Q6Hw>FwSq*&hJ7jh9rd@y4KCF|5s;ZqXQ{96li`^9lSqB593hW2Tnwy(x zMLk_x*FW}h60et%BIjJ4_wL=d@88As^@%&TS@Csyuimuci(1=z_wLjQ471kNwEE6VIcf&QOp^ zF#Llc^l@!XSSUJZZn)vl?(L5m{g#*A+&w(}s{6089l^5(*A2Q0uKwDbrr)U8G|alT z;P_q4*-_}&l`B_pt6yVdg9t$}HhO zT3Y(%-KlA4kizc7O9!jy>ejclQFV595_=DU>x&7GcNzVy^74x1otJ($DRM>CJ32YNQco>F zTu4n#<>lj3QB}R9sCWR88MDtQ+lOSZ2Y#DTMRFD3>G~uWsuYU-g{jrJUskeUS6m?Q-RkiUtl1XAq|Fwnx4Me zj29yjSke1)Wqu6rK!luz;eOl^A6fGj6O9eNaQs%?U|eA#O|Di+^9Wh*&_lFq_CH(LrzM+$;>phvkPf&*Q7am)J`ax?d(~*zE6J#(F)$F zH!(Cf_nVxwe*XNqfaAzP#506ZWqp0cS4uxqGfNG;y<@^oD}HZld)RJOH9U7Czf<$t zH6m!ed-v`-cjU8Y&yGjRt7vOqM*MRrTRpb_!Cg#epL0=x!|?uEqtMw|`?yACN_L&& z;c|^_Z8BG{9`^F`VkG~Yg_U*Dai!PxSzQE2PEO9P-qIQnj zEcV(8ytnJ$i714Lb33AekrjV+-QGU5u~E6Ou&}MGYv5NiF~gtd`@Tk>=jG)+7+g(U z7*B=g{#;jg=FFK8pCW;WSg3u?8v5ZqO@sFTkok^GOeEyy9)3_!j^uzL^YwvUk7^f@zE%cMYU=6Xp&P${|A=T=e*JM_p%9i4F}jGM7+n>8 z{f3SX8jQ=2*4B8Hw|?|!^b7IB;3 zy6fkUWYr%(eoRmIUc!z-($DVYq}ux=JiK>q8GjqF7u3?ydKMFtn3`(Y>QH6CHQ8NK z*J)E0*gCf3<*Qe>&$~<#*=hNhLbQ-?b^nQ|`s}>CDnO&NXV1PTStE>C=N}EO&au&? z+PiZcA&2z*WH>QzZ;>0Nl|`FW?Ip`n5HCaf@}WVL}gw|81+63?aMm^@)j__yJ$F6?oJ+Ar;>^-J)$%yQr4hj0l}oP#}w#u|+*K zTz{>P68C)y82Rkk&&#V*urT{q#v0Bh%4&-6Z^$9CO! z3+w#u#;D`-?ruG-t2b$B60elL{rK@IcH{SHEUX8(X=bacmX<$WIkusxwN)DLH9tR( zY=_}TRz~E-E&=jg8}nJuG~O3LF+bxf{GK$ao0E(@|KYHD52bwxMSb}3bJUj$F7T9P4P4w#lW!>hRHI$RpWI{hR_-r@;DupuIEluAb zzDOP@g{wb#^5n4$} zmriX)dO<1SxjYzw%=8S13ZX}qk=!g-i%!_}f`bDOo-(s^#UI;^hK5FoB^;NY>?*j# zOcC1C4+#E3z)sw{AsF|!D&U)< z7D*Sl@bkR(`#Nt40;TA0)cKSnD(mTeeL(Nc?BciuP%ir@L!>-656@kNq)SOnwfj=z z;z&HZ%{^7rOm~Vd7{In-eynwnI-XJX zNkl~5?KT9D_WDFM7CQl2AN7|#R(y3+uN%#n&z`Nc&ad0oI_jAH_U-Ya5UffnDyqk< z^B9kqm$r6!ig_>U4`i$Nu2~7E+`P(xoa1u2m9bo`OgfG z76g~3QLLZw@$t8B-+qYD_derdw(Ln)*0U)uilMzC8e2W;IQg7(q>evYfk#B-3VVd1 zk&(n?4R+IFi4R{?I3*259SRyHJ-r}CSpb+DxmqsNy{3WGH*elV48RJ?ZhWVej#~;+ z>8PmOLCgZ~W2Si9IZ?DzAsAC|hJz!bjy+mo?q~TnEH&WQ*D7cFW|m5)v>biv8yXx? z*0etyo^!(zhZ_uNqc8jgmP zg-fZ;pV_bFY9aHYey*!39yts=#26;)C`4i>1+aIy3bW^jNtSR$7OQ=fnlk;cuJL>_vMjdI&dV=w)7#;#1V}ZrwLRk+YJ{$4Tl$+i9Cy|yHJK@h+!LlK+DjnFLHm%p!KEahl_akz<+Lt9 z*|fAYBmybaYe@F;OqV1jcOZ8n3zn|UUd9bXfYl@A@As@vx+r?ZeE+V}?X$VAYrO>( zsC))SKP%}4-GPN)jzZn8{rd`3S@n{dMi)HemBwwqz7VWOv$KXsii%1?s9b8V(tu_P}g#lLJNwX9>%9}(C?C#-VV=erl4 z;M}=$NMS%2F4TtMa+S%dNdRX)29cr@x^E zWWeP%t?}ZDPfyX$W{a%O34qr255j+!=ml3A+;DI>bhrFgqnSi}V@>p9_0$C9EL4T4Ib15;0YuHr z%sxyw8*)biS$5{nF=z0yY}`ji_vzQ%=g%lRU|&F)Jx4ha<110ZF3`q>u>r?Es3c~z1rLSzQ~_I)wPs-aIfTqlvBf)yW| zERVd1LN`48u$%8!lnTAJ*Sse&OW4qjqmHN^-)T)`aC1C0&*J&Lx{f@EC5gfgJ9^nr zEU5{h=oHo7Nv*)&W~cLGMJwM|c6Gg2vrA-@P0P$Q%xNEJub%^z0Ldwo&D;0`SN8v0!jI>vs0Vv zWu~BEl9Q7uzpMN66jfGAwzu6AKOz3=phD7I@ceIk5x`)z#QJOq(gp8&P;p!Q6$<2^ zbIb3MZNMX8V{nRzm02dLd@{+gLrEvPx#oa*My+69oRFSAQ6#C7ijCf1$5Hm=ZtZHp z-k8JK>6}yp_{HnjukVeHnyV!L*kHYc5r~Rf&fJ_Yn@!bUm*e}Kbxqzm;;`u{0yP0; zVwT*_^@JhaqVS%1AhvcpBZJ*7oaA@tbj&D;?MMKvi-298uMO`pKpp%wF{&DFYsDbUE&I~7$=)J>>jmPk|Hrz2)Qe%yK_z*j@xD;yaZ z6u@!?{l*0kkMkxukto$?`l|;k$xur6f?a4Ie14UgB0FHFKUnN3B?W-c%tEJ)Aumm= z*`v)DZLa~xlah9Y)k?5Obk1K)0SM`zv7P8Rhaws~C@v!-==SZuHWopgp+J9JH+W4~ zcQChAuhV!5fC(c@5Fuh~y$5*Doy*G2tpvm?TN~uST0#ElvgQX^0*(VtL#>UyKH8MD zTG^eO=G;5_7qAe*cW?z^$l;;fns5n)ot| zD-f;`eY!$Yg%LNZ`$rAKVY;k`4<9z-rUo>@4}eBgsm=cQy>!#<3tLL`6ptT7&^Scq zE0dt2rlv*|guFESkarPkdZu~~$G*MBhOGU=BDeVX@u>Q~xn<}2Zy@e`QeBIcn14DK z4H`egr^9OR;VDKPRkXC^upxmXo10Mre;AuL$knPHoY!tI3#|TuYs%*4$-*nD$!aLKZ)9ED4L+6|MGnoI^mMPpDm9%m zrny?}?d=znP;fWi25ddJ`+BaHU4afl1nL5?0eE7R0DyzoVuCWUwMJOlfbbR;76bQn zRa8Er?gSNw$bg*76)6wQ0kkQV zU~J!vK-RUrzyQ4!53;VY&3XWvir7g-)D2=_kYMC4Umi3jRdUZQdv3pb5z8066v8>} z{#~JruUf~lw9<>Zr9&Crc9_|nxCju{Yg@yWC3u+k)U}%nhTzJs-Ai(wgK3({?{)S#3cZHu#ez<9zA;WQa#oD=FLir+|XJhR}@^> zJxNW=@vJ|^|9UO{7ul_?Psny~XimOLVvyZI)>9hQ*SWZQ=D6db!oNv+dmCO*JD8e2 z5Zjmu2E!lMI+mP*sHH?u?Za6uGcjns=RFW{AsjV$hj|egrQ31u>35%!sdGU@TiRFp>8_CD_^h6WdVT*T(?v_D6H`MD6jV z2&Sm8XIhVJM;B=H7czPB$)%I7DjBrIsj=v-R2651yb0BYZ{pwDNTxOXc#HTUwsJ2ouI|b8-^ZnO-I( zwn0*?H{yp0-W!}YI3;8Z6c5O>2?+^3jvw0DDk>_9H&({5nZXc!L^hGch=4OBat}BO z{N>+FyKl=MuxbbtZY%KR)2Hp3#j~F?96yQeoK?B4T@kg`uqS}+W>OjTwKG3edYF7R z=j^{ayXsk7;>oA!_wf{}i%w=<7XNF<^m6o-ZjVzRH|G@&Gu>TD@XWMv+%qf2&NkjW zVQO65G3u4<6r~?9BPJRh@50S6=KRVgOrOqWCVxu(2Dh1>7RlNtwX?5fvvHy?zp$ib z-hM3a?U8;TZ@%huKT_d(UmJg6WT2QHDaNhFJf|JidDl5@(A1#Uuz|N62>?u~|NNN@ zYcTsF7fm2CH7cnAOT#Rxb}My-Rjd3?*`y|*s!$n5W`YmOe710xSLH%a@mb zfH8hh0=fV{&KW5Wk_=mF^U)czi=~?ZCeDJN?U{2n*^WOO`d)8L^Z5#gal(Ph>@N3% zOdJ#GZOLh$D!b3A`F33%9j4cRnDsWiyJySIgaS{8NMEwK%gNdTG5syBBWDWJUpn|fi)f-;|5r?lXU!C+moHe*cx(9*`l+30YpXKh0hheQRowChRGFY8Ew zO#u^P)UW))j>42Zm=3C5P&I`qKTV(%o#5eyb5ZpOoXf5=HsNxi7uaekMZ%=*4CNT^bvE5+2}1*Zo?1JO)Jtz&1}KZ(^a$3yp^T*4jxBAvA&{TAAX|HvdXv7KdC(bV*ln(JHtwr;4sR^20F zbUG_vSv!zrgT#?KVkJsNg4p8+l6c$qo2)N}HrF?q3eF!QN%OnLSJa9X>w6q8OlUHP z>Ye;1O~PYKA?aApkl2Rx^9e5@!_^eaAQjG<;D6XJ@I-pYg^5s2PH5ZbaxP*k{z_Wtx0x+JPCZd+X6u zc_ehpc{N}Bm3Sd}X=v*1NZPpivElQ&^65+qBkH~1W~#UvZjY+}xa_1UIQusF9%W@c^=XUDqm1pz`j6IsQ$6^ATR-##kS9f*9|_DU;sfmZr@+R z{LbQVv-csnGY#sDcNq`cK0CKoTvwaZP} z9ExfVbB3P``2q;@L~aMu-JK`D_I`bUS)}nTQIIP)lJH+pO}Ya_{gT z3CPOM{#dunRdM;Aa%R<=P4go;S_z+SH0>eXvlh>%m**#4UhFcM;{GotkpB@dyi>-g z*wHXyOxme8!sNIbk=Pk5J11tT9T`jBlbbHj6m|phUrY=g@#coVS5}1dJ!f`+pWpIc zr^l)=AH^W0zGpeM9XQJG-@ogwzL5?6)YU}`O?jyN?k=KG?u-~5G-lT;u31_Vu*ju> zmdPCn6GRlqVZ0->E$lkrjXitzD3X#Uit@ry{yBot1TB zN-0_{fzW}#0-@eV`Lp1edyLHYJ%}U_$UxoyGBMDCfprMA8ekoI&0m~Q79rgO=A!mQ z#ip&T4XyW3e&_n9l_lNIFjP!=`T2_@d0AQIPB!jF>i!wwtNBSc6=!)#g+)aL9*gV?(=*t*a+dwo(p}F}gp*y2K8yy+>nbRP8lHBiYK|!tW9!i1}0jwm8VAnN(uLqQ+4m+hy@yt$W zR{x47VAim0e5Tf8u`~e2)`s}YVDH%jg#f=O&3)5vY&dhXOz?I|T;_l>kyAz6ORaF(Z22W@w?{(O_-G+}14G&XOQ5~n+%Z-vn+or@< zA;}QMjyzKZsmKK?$}{=Isr1g%v7R5Nd^SBWZn9wgoK~SE6Yl~!&~tsh70d2mK;_cf zTmzwOVr>fL+w_=NTU)n^w6?Sm3(>S8CLt#$tU+w^g{^=*C)E?D^LTUOtsNY~@Lb>s zZAzD!@YaB>Nd8#3K%K%7*4S9t*5I02CJ2!@SBnr&AY~hs5V{LfSTD(?2Q<-l5~<{J zKD-zSmm`=tIEK^nyA3=&Utl=l4FHo=IqFEzv~Qt_mv}6;b#xd&CB=~JDbZ^fA5Tk* z>YUi<)>ais(S{`}O&eM-W~m?i8bMO&6gdZCzk>aU^;)2Y5Q$V61St$&8W)lSXuZo3 z>~`>tKpG>40B{AR7(uk@xeXpB%9O#ni1xO&>sD5Kp_fM4l-Azeb-;)OMKwk{AC3Xd zd^28_1NNYSfKv$4979m>bzy!!L@vQ~k>pZ4Xip5Xhhq^2^7e&W#8mqE`RNvhKY21u zyw$sRpD-)@UQ;^ytmg2g(MwKU=C=%udpyc zC+-JKK0a7M{8wxE1B4oju_~|L)TlC&bCmtN2?>B{#6Kx*hH9n zEp2Tu4A8T)-oKX-rt3Ku0J#cGhbmYWaC(u^(Z(JgQGgjx_mR&~roBLE0&*CC!L{&` z@Zi}Gcek}Il`Q%|!+Rm@7P{Euqt71S_m#vKb)_XeH}`7Gl>`-$tNDb3CN*`&y##;| zaS??r>Hx${BN9?`WK>j`Q%<|pGkGQi1?ZNvLXIN^PT(O3Iv!&(&OHq&hOh?YY6-gk zev{T&Q}ZxQTUxrB2x2!tFd30dOibX8fFsN|F_B3#AFc!tuFj)J{3H-7!J>dkj=7vq zkaz@<8gr4tDd!p+j6y&bW-wu5IPt2$s*nr7nG2mikEiNP=tQ9o79F7zB`p>KCIahk zkZ)wh^-XGOr$)XKvxJY27*^*jkC*w2S{ZCnp^RBsS+}d_ z>hn6}5+L0Z6(ttTtYe9*r_*@{? z0Tn^3W|WO9E!`;K>s4i@0G@ZFoM6BMfz5a87=E&=UiE%(Y_iC; z*L4z#hKT@t?Oy}R7F;E6jWrZbtV2dDzmDwPsi~>y76-VZ)KYK72M%KTqoaq4hlg4| zR8}u1aJX#=+A|%djmT`45!MLRm?Nezw~UL5%KQ&1vZOI*_oU)OdfIz!5k7%xRa9mr zNW3)l>?BBiAQg)o_xOtAt&#Zv(h;-Bp(P`MBlIp^{K(i)5~jlvZU9XJSQFX{%0H}J z@PQCvVU>w%8ift)Q?Kp#Ogr3KwI@4~t>9wBOkvkyF@V3M6>+D47KE{bKT9$}#csTf ztDqO6ZY<>Ef#I+iP3(ed-Ct+i{c}0y~7ct5=)%bk3iPlxL9r9`mjhh}KiIY|NEwn?*=m z-9)2<|KR+HTcu^a2~TFp0u7=9d~lH7Axs#;L2{Je8kSuF`+=H0?dcdZm{^Q`Jh^lw zmGh-lFO4T@BW9>pVWL}eKm(|%-o=AND}X(&L|S$kZRzNcb8?#B(|WT^pgg`d(Z6hQ zWcBbavf!9GM$*ryv|J)zVF41g6A%$Bi(pA%NuhmcU1{W7d0SUGOj^1pxK&m*bm68= zfsVC4X$!&mQtd5r{FB5u^g&kBKeG0Ix)iicW^VG1*ku!iknY26#U zwZLtT$-68zC@5%K=P~W&;$u^U!ONc!}@A zlGzSO&?sdP_B}zjKdv_!RF<-PjkT6N_5y`PqgmHt47O~#`em3lAnbxA{M_VT*3&@X zm5GV)^&*Zt2H&#VZVcKBA}sBHuq|Bf6n(?+9CP?*T~P~=?~Jncl^ms)xDNe_uWq(D z#}ZB!T#c=`4U+3Mw);(^MgYt(cjOcl6r4_+FJWEEpPF`Ur*wk4Im>e-wn&CczcIdb zXm0uRuf%4HMvGjK_O*r0EiK$)V!^P70cF6D^+1Mk_M;Q)Q#<9@bw}2q?tr$51ydrb z!{%vQM1oENndYHX{4Ddz+Vb4?yX7KW>6FRZd{L4~O%tiwc6CMNW2GaGC59 zBp~spciy~GOt28}^GoaM9s|vb-69x6IE~>WLb(mb6=n-8sv;9EU>c;6-BI;~jSofx zT1)TxmfHFn9F*-Zedf8J? zZ(U>WEL75hcoZ68PTIPHNaO8k`9#XW)qP{8?z6qv_^Y^zPlgrqNGh z^KnYd&Z8#qVK%2PP2rV6%wV=X9Ov9ivMo=;RWB_31@ZxmoCcySsm<;`3$JQu^xGEz z3`4Fq{eCuDVd^{F8&_H;8W+@moQ;(KT!=(^1FrXb0URp%I_&wE5sh!Rj!8l;DLkzE zRXx=y!a798NW%lO6_1SwOSp8tfd}g^XS^RkH;kJBm9yeb=N~_V1>-mcnKCoQfU-G6 zD+;pO$*ex|_tJs#Y)4K;)YXbTo&6jh2;y`9={|! z;E({+Q?Kq9mWo%#;-aRbgZ9(6xQYiu_99GbS%%dxuYg%2iZ0w4A7qcGyj_0%WqNub zDoJiZ!86q|;Cpp-b&2o~oHW@}*3cL)4L9rBN^6;kk)ZNXS2c3-GF)RIkKM)gbsufy;U%HYN3`s@O*A>t!aD zltjZP2#<9wMgfnX9aZqA6EL5!Nwb9eL$cnW1m}M(T^$sfu@@npLxnNPfnD?c<@~s# zY!P*+8iQNMD&hak)gr8Lcwh`{u@VX5I)W^UM5LoZg`WPI>si-~i0qsU&nd#%=I_{z zLogFmRS~4R5eWiUnl^W&k(t@U-rgHPI%#S0);2(r*&f~fGv7KpSvhWdhpaz>)f0ZP zhBO43q5QJ-vzT;jHEieiE>m>i;Nap^X-Q8`_9Lc-iwkr@4Liv{bxT0u6?yrZ!ed5v zDu!1Su#n(y7@3+PcsO{#@Cb0V1AyMg^AwzX@!|!M{k4Ym*l59DLB?`*rGlReVGjZy zoPh1=coQOm&A8IWH$Ie00F-(Fh=dVF!SbQkR(Q@s`0|P|Xl6nNK7bwq_(s98!(9U# z1Rw`uBz}WffR2|Su`}UvU>Ok~@Gh9`ht>VSBZLjN(d^T8PI!{otDXFhdDtb6*cS{m z!ZZoq9t5PhrKLw-$GoX*S(*|vB#81+M_?BOwpo6121QbIyPV5qY)D3NbW?f9|pdsZ5pRm=r{@V=&BtamGK0OS46XO@B&~{0B9xPGgL-|2kW!e3XV} zVWb5PV>ruS6&~)4!p-3yjj)Ctig1(Yu(uxSjKZontPCa+V5}_vt%Ze!;g))n96Y+q zXrg*56dJsUGU#S}88I40t1)#e8)Oh{=`{7!u5Q3S7&z^Zft1WndV_+8?u!@c9---0VoJ7vg=$uKa|`ph%@j6e?pvrPX_+jfa{zx zLeYuw@%@oc2iBEFBR0v`{`04~C-Jknr!ROq(}_-fiIqXh?0fCl(LMGQ>kr^mML~%; z3*py@+Yc7IP)0%56m*R=Uj^89J`1cQ_@)G&YHUr7T`6gm5eQP@lA-q)RK1vl|L&01S9k>`))Wu!91Skhij~y>}Wrf*S&-5O&i{@}qc* z^z?lI+*n}LM~`m1j^g_1(<9j7R+=Y6b^~mK^IbN42diGsl-TrvfIn*WHtNVYA6F-* z!@lC>DD}_yq^c+@-&RjG2D^iuh3*X$`2T6mAt89{*`M47%f#aP?(Fw+DO3+xW=G1-(d@$- z^vJmS$L=uU(NL|CNfcII?}=}C>+J3c{V!Vi|3{k}@rnQ47x#beoSSA7Ufdapq7WP` zDm?fXptQio1xSEtg!GNTfCwPc-i&pLF^1Pkp6L)Q{3s|HWeuQEqhvuXf=mp~0o00v zg9A3vzqlIiO7Ih4Avk!`(~0NW_{b9pN)%cU4BOQPSO>z;2MF={9K3bt;-BA%*|`5n|J z?2>Km?Y&KkVno9bDi7@B=|Jst7+!X6gZngIeKR(eBgT@G>YEvFQN~%CD4340Rv=lU zex_kaSZgbpK)|4Bwhnl%*R3cf;AnO_oKu8E*Omb-NVoadP zj5`;3rq>$57V%h~=`TnuAPj}+4$uVNmtgqo0^5;Guat=V9nXU{0yNvPN1(jEsH%Dh z-Fxuw)JVw^dw`=L1i%A|BNq(93?W1{2pb594b;$J7vK(xjEpQd$$>`?I4dzT^8gHM zD4kGr1DwF}3y%@d1$s;xe*b<)+m@M@_Q{HG8v*mbeA!Ew>@u%r=feMCpq!nh_cO(1P7lmNo8ARCIFuPTEq z)ZKns>4`ZxhvFM$!0ID3_E!g^*#a&j>0z6Opa+*QL7lRM$K~az2h9+Dus=B( z9DE*`b5aSo%?_0A#PbINN$6H%K|1Stto$AoX@xfy-G!yY@8uFY9Lj$EvcOLD4JBq@ zHLCW1-b?#G3^JPrt{MBdPsuWn`;C8g)%>!K)eG_0{=R%bWj3oUwP)B-qRmYqsnLuV zP($#N371F?58VmXxF%N<#leE&MLK!jA(1+92St$WrQp6=&%QZN<^`a9Xjyj3$_BNIP@I`f@A{1BKo+{3B*bD8rDHDPUvYtjz{5X zyEv%}RTT;Zq9A;d5Lku?`yT3gPv|w>!{h`Jt`?FLDBdS4i>;w_~Kup9}v{8dA>Jo zanFH-=g#RJtNE=RMGK#exJ{N23to*0A;=9;?YkaCSm+3D+ceheens!g+}v=`kZ^Px z2CWVZ4$7_=Up#nkorwr4;HT}ue1Qo~NwGd(Q`X)I-L{kLqeAD^s|o1qLr}sv^mwnH z1wpcR?_T79EpXrxTd0@@SJB^H^nK!huQ2{s%zCx9wJmwp2cFPW#8bOkoKK2pB0;Kz)xK;xPP`Xk-Cj)W~}!jb-

|71gQhwUr-9f zx(3Hiw4dS;Q5>Q$LZSZ%U5XRVc#R6kBe4G`Wo0Q>8EwCK(EDQX?`MzDZVIHy>>t`M z38NO#2FiPdr$Wa+4#{?2f}|FXcN1M1Iq6Vb^=vy9tDw)unri3SBYR*1<;gV8x(23W z7&}35_3t~!cdtqq?JaLJUv25h+b9d;9DnCEHsc>Be6IGw!R;59jE`rXx`-bn@ctJM zhWvv+w*N!@fAO1p!#7&F4cY%NEwET)KmC-QjIb538Vcq5&UMu6c@>Zmb`u0&Oa*Ml zV?vlubVQ>i0;EaSH89--`OQoQYhV#6DA63a2?>ln;xZet5MqTR)mS9a94of5bP}X8 zXqYV!D)fEU&tX>*WjkU-c6*xJi;OW0`82u-vmp+l9|!cYc&iia3`Bb-Fa-F`Y4C_B z+|Y|`go05zm=024Z0) zUWf3WW0jcPuY+a?$rIf4%hFOhh_fI!1#EwA!4U>=C}dH^p_qnS{3UGVGK?S5ZBzrB zGSLc66UYrp0F?tXGxI@9vOCAePb*5bIspct%7)n#Ea*3DI{MZMgpJ!Iua7x*1vezp4J)x=7AoAScJe127pe?8-0dERsNlQ4{pS- z$P`xlHalA!I1jH0)(p}V`08-Mn5~NBftqYjUp!Vve?hcDlxz)_Z(&AGVWAv%B=4aR z>e@O$FC+l;8XrbgO_T{#R6l=@!WeWGd>Jzv+mrEU#Nw00Af679A;=qqdI-gX{{csd zAE;KTlb`If;_J-21B+dLy<;*n8OTY3%!H`#JVArM5O@wN1{pgs5kkez84F^UoG4a% zk46e5C8g_Mf3vW$eVTBN9}}VreqhE+CLBo%0OU}01#8DY4nJOLKyFk)zY-|+(+A=B z-2&bHi=nBhDKI2xCoqFV$2crOAoO^z97-i7fieVcRbzCQxeB8rK%&(NN}C`i6nr)o z9?a_S^kU#qd_g-w&`zvZAan4WNMF$9 z@hq5}+J*+of1}UCM{&%^g8hrD%g~sY(SbF+DKG-)!j=xAML%6=M1(Z3ANmDu zKqCWT;_yfs``>lF_;>X)=b~u9r#bXdiYTXVw$_}d-49HFF_KWGXsX~`P^Iv_b7w2M zt89W=sfcW12T+xir_FW*UEvlRHV?b792^!7VWt-RYN!I&o%gLdcjm8dx&?cM^zT5* zXbt}K^#2`bB#8L;-$Kv-?{9AC&wRIxFn^BH9JBMYmfI~(95EUZp7=)j4TXEOD`SqG8wLoXTx9yD8or~O%^S8$fX?oD)00{)$I_=NHY zNe+#`#t^vC?uX_tu#JM^IVkvCdb}Q_qyQw?0*wBr4ZUcp^imUClzbzQ%TSs@q5;Fg5dl%mK1f?f=QSE0v8+Ju zpkl+rU|B=cLncK1ju?&7V*Ih_+(gezY2pg##S?QZfPd2oAJlb8Lg3mjd`l{7Y)5SZJc>N z&ud9y4L~tZPEEx(?7?=FuKZ$!`@0?G$kceA?Ys^cW+YU(9L0;A10Tu1r=9?PQczM(6>%Cs@N{$29A|P~t$dr8C&dtgnr)o5 zXtWS9%5$9|2fx$Pqw|l0*Fy$BK#alL0Vfg0crYnfngCL7K%BSY3;4tMqTL;x9mL@! zySIZo!(9&T-3g>cwAEsZlkM4a`}CoGpwKU)JzF8ENv#9lY_{+^agx>lPUi&QCFfON zG}*u$*grE~6cc`N6+3YAQaCyuRT+~d=Cmmk_#UxfrjA$d`m z!r`eVE{b+v&xLkVv*%Jc*Z|Lq&g-nwQlcHV1}Z8fIAhSZw^Wl9;BFILmNyH*(>5zej(<-aU~^{{?OR8|D5B{#w#p=9}H$ z)s{Eh;uH;@O!w^Y*t@7ibK+Y*_n}eR3cP5tJsl>C%@4TxS##Vu^IwWZWR80OfddXW zp2Bp}u&wr5%CD;(<~%^KFm$1#H%9Ly?f&63k*9JAdI9TfKFf9b8;aiE-e0Akh_izy zD%+UP94Y*Id)uxr2SlB8hcTf)acluU;wZ;_I;5Gtg^5n0*&NjrdW!*ZkT;1&bC3=& znIU=<>rG`uzz1MI`u!9*d8A`f_<VL5z1>x7G9y;uBDdpe+1jv)3))~D%$=U~G6XYWp& zVY7GtewC|N=jA#AaY7YfqyXAnf)<`fM&3aAeCfgdo2wTWzJDi&j@nzcxy}JF_b(d- z`GaVva~1vyJ3ccDOWezs*A?rCBX=-hF1%Ob^YWZEBH|jIqN{`HiF2QD{FEHzRHSJM zhH`j)8W2kGF7!TYAt=Eea#u@!(IV;woSrKN6ADsh_k)U|JXG^g#{hYT@&FWJ>cGhr zOf-SdOOjxY#6Ni=yA7SR{%~jJ3U^(Rbsz*Fq4j-xbqTLFDSHiKAD~^#=T#60NHXBz zvWknX78YWXbb#bxZ9{#iaEdrN35_(w!6L9jeEX)PFlEoLM6m-k5jbcE_hlpq;PYpJ z;Tgm!D0mR8aqw3_LiLrpy|P;V6YkN^6S?^LO*5KJf8W93I)tYxKc8rcQ&nw>X|I2O zz%cw#y~qao9$`VnD#p7t6=`c~w$Hd>Eu*6s?uk0{TZpJQuYxcSyb$$zj-zzuV#b}A zzc8x`(>3@pe=^95od`cVUx!LeMJ3cQiO8*>ihy-Ms9(pwiWSya@aWkj&ej36uJ_>o z752|RT*8w$uq4skWS!^N50gwc%L-9sd$_&WBkI^d?HR#+*Oa8_fTBzCa$0hL6HH++qM{DdHLaj?+Mn`hZ0Sd$jx zQdj`lPDCpVr@7Ow=6MfM9KfuV&zAEpWonD~Lr9=!0W2g6YNhD$I85*x`{qqyx-@ z$Odzxl8Oo#(IG%O%t2J36(e~sL{QYFa8E*ef>CyMZf^9~FYzW`cKuSK!3wufY=`YE z9Kv|hPoxag;h1AYNs*jR=aTu&<=D+$99+SJ6%21aPRAh(oJ%;W0pb?GDK{8ONbO*e z72VR16BfHYf)RC)hAgc)n3+ESM)*nK&;dkk9{nGwugl6}|3ig4k&3HL-Rx3QW{09| zkb2=BtIJZwwXi)P~h69$h0kHw4vtIIG_ehy~^)r*aO32!R4xqJZ9 z!^I|EJQ+-W7$19ZT;7|jJy1thek>o`zY8b++^guNT^$@A?*C)k0)7gu9Z;RWDlv4f z-&TO&NAOsXOaLUHhr-i?i(OHMNOv+)9@H)l*FlF_2rxN9B#f}1f+kC|K9~jBrKtm& zETdf)^M|qqjci$C993Z3;LajA&s*qQcw1T;1j)XM7eyJE4BQ);dUR|oJ}vDFTPp%w z{@GTAMbujLUtbCHRF?udxva>Hv;o|2gbEgL~v^ zK_y_~;INS{iWacD11o{|+KhDR=7tB347}UQw=im7An$<_v>;fcfQJcqV1V&?qOy|G z1q4%7=O(9U7~+7CKGAP3Nu#JI9Q}lCN7QqPGPihrXeA+q1$In9Cr5`!6f!-YbNiAM zqKPsG#)C$jnz%eSyvTU$qEIy7d0Y4)PEn8%wiK*F7utqEsdyB*If0zp<&>Wcd(&h5 zz%&ru<(nrDnqh7$Sj!wrw5-)%JXi4;P6Sx_W;a%+P(cur z**Z^qlEq&f8@jTxGBK(wECf!S8Y6Ci2$&a$<3q6NuCe7=23`eJ#=av$2kc2rmPf%( z5WL>|^7lB0OO7wf>sJhPWH1aPg(#Rixz-M2Q$By*clUrOw0~kUi%5izikfQCy#)J( z2SyXPcCp<+u;+{;CBe4(yi;0Q8bJ_c6c64R6b&pG%>Kk`&&c>XE;7YyhHN5-eO6rD z^^WjmI5%5I9erHiT|G3j=aN9|V6s(SRI>%C#kxvB+}Jqbj2fN@Ld#TJWZML{b*X9m zBPsux`tE0O%us5du`-CIdPCL*D1Z(Qe+ejj!od!gqF)VSHQ|Py@?JduuV8}&J+m}p zh)!;ME7RAM8Wh0&Q9K!DZNJ@mq)&!fVHm-PN-6`W9LJ1F5}N*61YDQ&K`>d-c?!7*EE;+%gRHLu#M?nAnFi_|(9kBd5bnT<;+S zwgh1pUR{JhBco4N0uS!rhh5hrr5fHO;GBK8Q_M1u`wJt46ml40hp5<6|5hBl<#lJUmAdn_y!b1oCtz49KDDWejk84 z@ivG!n6RIVs}S=NA4JPDVU-Z{bgdEAv4OSq{@`juCMWr%CN{(e95$3O*07FpQ4Y!+ z0zJeA09`aZWE#Ct5{{%ad$X6ax!2Yf=tS*mCC-46O8~+23A7U^WIQf<2^csyg0cD0 zOQ4s@e_CQL?V5$RcWI5Nx>Z9@o>2#wR?o~j zv{H0EW)o#-^u<5yq~^2-(;KHf8I4DJeMMt_D*=3=+6BRK&=3IC-Q%h^1=# z&UkMp7Z;cg4c+%iQ5bND8v~xgAu%YN16B;iC!B_WldbN+YRZK$-Y^V%^j~m*!UeC+qLh*4Hxh0KJV9rob_^vIS>NwRm`S51Z0j3Rl~t z-*3sEDMuz(%BkM_l$2BJX(pX*eR!`2^RBNIu7TgSY~Ogfdt2pizwaOR=)Wuz&0Zh> zVeR!hQS;7Dt;oI!8RrBx@}8e7`?2cnw#fx=OYVx-{=0qiP3V-DmFu=&-fQn~TP<5w zHF4LruW`UGJaBy-Fueg=9KbF-FumCU(`xCo&_k(*ih~0KH)?x7`!j3LHQ*Kk;0X@< zf1b_%7P~6p;q~hWzgE})*W1lXya`;c@_$uW#>9e|3c&e+*B+obEtbUdg5XIEd$Ri}=9{qS^+#H*E^i>~{eUf8Iz{`Y(Pbt7>Cg@*z literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/intelligence/images/RealWorld-67-percent.png b/windows/security/threat-protection/intelligence/images/RealWorld-67-percent.png deleted file mode 100644 index 9e011c0e6abe759d6394bf040b575a1b8274f1b4..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 14050 zcmV<8HXX@{P) zaB^>EX>4U6ba`-PAZ2)IW&i+q+O3*baveK+Mc*+B4*@w02eHaC@bJAh`Y=;h_jg$= zNn{^18u-EvXqx>$|9#AV@h7ENO-!Zcmb2wgY_a*yH`P9Wp8uVV_uuvc0< z-&oJ3!2jX-G4JPp*SVfPZYc3}eSE!c%6!dJUlYAe{F*T6$)0assCzAyKy@m1O4BA!L$My`IfI#oe(!`R6jwLLySgp^%yuI?0MLQ9mVCYN)4>qDd*`R8mbX^&E1{ zDd$|WFsheOVo4>JQfg_X*HB|kHP=#WZM8Sw0uYv3ZpF0PTI-#McBby!-5JsQ@FR>k z(#WHXI@;)y@|kg_nP-`Gw%M0oVbT68uVPkRZT0OorL^NtJMXgVZo409?SvCgI{B1S zPdoiRYp<++&6@j`xqr@@du2@-i+5c4$QqYRd7HusPLgs)#(Z>SyeI<{v{%k-buoHn zPC2v9(-g^*HJ6l}<&-fp7`OB3xcA(BWbPmHW>Wl*^5*}PIiuA5e`L-mb+63*%-b(n zTm3RhxCv4hDyB9ZfbFoz>}sXhTOfoiq8wXK>@Cbz$JwR%a@O%g3edCk58XR@I4uz% z<~=?e+P>}B&S9zj$Bie#f#Lh*%8g&{E6W>}ktmDleCUgt%HM99t(CnRyWMr{Jcp05 z4rlf*^SC+2E`HQq>a+*CUZiT}0zwR*$i!M<&U_jG9DSietxxuZNj;o->h`9xi1F7| ztPs}nxy|KkDty{po1-K@JEhmsEGC^X+AJGX$!@eonYA_d6ibZKdTUl|N$flaPqA-z zs+~(RqmZ1!f_yy6+SoCrES+QQkVxzubX>5Cxv+L=WRB0~3Ch!1U({vHTLr#ey# z(VRRwU$w2BD7a2hZumzFvWnvJ|?=gT*w^0~?dj+D5HO`oIQ-m!KR-EUw zF*`Rrx8(?zwOef~xHTy1vc^b0COXPc{XWh-M)Z@PcN~pOg)tBdb=GGo`R_$xdLDB{ z_!V$ZqtvtKLds;1%yt+zR@Hj%UEp_1%Z8EFx$o5P5c;vlDNr_-eX2W0;W8+j{S|on#k4v=14Jxs%)w zd})?4HUYE%gSHY3*!5z=IEl(#{d*j~x7-MOZ4iODjAj)ksoxl*N@4ZC(4;6b~% zc?Kv@TS#`GV0xvb8oN-0KH+Wy~1N3gdSdr8!~L`2O&4LWDY z1PiDJo=ZDptq~4jOr6fr6O9A_t+i(ihgJb_DGOjWdpe61l}NkKTest1tz;$AwAv=i zXfz*dE{#?+0544x_yI6lg#c{|U^FK0-u1db*S1ny3Q10f;t66ZRtlix5KaM+$l4ht zDo5q7IdW`rtq3OfN?z=ogaIaj>T*oRQi>-u8&7A(RK{4*+nQ4taGFgJh09uYx1o_m zVp%f6hl~~qDq>cSpu=eI@8}UfBg_LZkk;PNGWjVTKqH#${wwI{HuHYpy=zytnSV}) z84Gr1zrZF07SUlczfy$&>5z@8C4S1sr5Sm(R7rA#kZ9Sn5o0O(?i$&WK1(?`@z#pP zrAVcmI>!mLtKt9cVMwT0BH6LjwQjOcf{Jnn4d9syLexnw9ak3}KtowS=H8&#MkXAS zJFM@StSv|J0~dkn>=;Gck6?MzeJwm;ZR|cRK$V=81s6d{cl)s$kOlt*@E3Ml7ArVN z0;K7NuUR4(iLUA}G0jKj_Ng6g;3IaMUEZsRxHf)`Alg|2OcV5sFl~aXVE)yHfWpFc}ys~>2y0-m>h!%X;l(dAxD1s zId+2}3j!B9n~koZ{QVieC6FmBv`20OTBn=#fn=%hNg@PpEA#|Now!GV7!jFFgh~k( zWY}3Su~;@J1PfETsPto11+?y&OaIRZQ@h+2s<&kbLz;E%VTi4h@E{rI^qn<$qlB2} zl(%`FSv1F15BNz4XFs*{eJ1&aea)fP;TF(5QM?2w3~(eYs#I0u7Ez6Xy$LNzpB}W% z+XFpq71vCwn_Uwsa-})c0MSw6JaQaLux#mG50>$|fg-VA>8!Ty;PV_u|zZ0j`x zX=9_TdyLFM%3eB*Ht+k6L&v}ci`zf$HqY%0Oz1ceL826xZ>Y_xn*dr`MrSpw9X}l! zBn4a~9z!WCe(Z9Hmmpc8r!M#0X|e63si(T2sL*fI)PWFy}E{63sc_5b$s)ornyG^xxK;oAeiSC#wd_LC%b15Jci6C;+xq^F-iP&+bsY z?gk%k?LcxHL#9lb9bhyOt^>|dQJV|YFs+t=7(j`rsIX}wbi|B4((VxLwvDv|U4-Fd zlzL5R1IdmU|>V*bCCj-c`FhQPgL)3#2Mw(}X0 zf=#8pf+Q}DlH;N4@#R4Ar1ovaHBg=#myIz@7Qs(`CYT5Xun=TOM{i-5^+cFxE7!0w zT4c52u$}Ce4rHa^C@5yiE&Y;loI34@8GBUkrkYYn53`+TIEMD10Pqx9 zj;!gF6O?BJm=nPn)bq@%D({16;$tt@GKwT1zNtqqtTGe{uG^x#34%iv;IZ()7(k>8 z9vxMHZ;{2#Fhq=mU#Xz97Ad9C`8HGD*eqpiFQP!ui8A1aI|M(;Ey%W5Dz(a=Z0S3Y zgF+)q;3zhWmdLOMD>KLtZXsGu_C&HBjj)zz6p;5xodHPZTDcz|?03NfG=jPt(rSy@ z1RVw=f#k;bpQK}&C)hyj8G$ZsbZl%bodKf}4rn(%Nat^?(&e}fs2a)!cb^vC2m}Di z!K{vZx=Ua`)A_rS4C^;>qdq$518P!2l<#)}jynC&p&;n$qDy+6!Q+?zG0?uK z_=8*n2t_CNo-qgr)r`%ccJvw88dw51M4z!6wK|qIahB(ra)45+k zglZOAfmIJM-b8TBCAuD~%yyAmfX~_#6#yIJ941viSVl0QH2m2#O?->`HcRIQq6joG|tK>Qws44Xlf==`!sI0=5f!rHmb)e>GTZ8 zDgeM!QHQAOB}Dr0aB=_gfvHbqPrtVVA9cazC61GBh~u{lRpj+HHX~rB?5M?Nt>7R0 zWMx&Sj{CKsw}oX&lkU{%fqL=Vk8k6Q-ZuR#ea8QK_4D-Y6gEZ43z@QctnF84TfPnY zZOnJ~tCt5I-h*39h9kh?p;KMT8HJ6~4{cxghcv@mh3Z)5sztYTDu_ZO{op8V?H1v_ zGKiu{;H7hJ0A)JyvC)Fb54j=>tkNavLnj0zXDLI6b1-dc6&e}$M1sC-daH0HWVK7G zG~$5}WmFQL5Wa>_9}#(|F91U?9Y-*q<=dm)nrQlG=|vqs$E4SH6+MlqWfTE>ZPvVY zJ3oJ>YI<*0y8GyUx$)%CtQ}XiUx(Qr7tFnKUmCv#$N537=X1%CvGrQg+tTK(Y~~u> z= zRH#gM4GhAjur-9=!E0d3%J=(Bl*x@H$WtIMvKr|?*=`J(3Mvv=sS@)rWpSZ2zKFyU zUhg)Y4qSIF#>EbJ&Nw`cj+E8;3BsJ`59t88DpY=vJsbiQ09gi2 zy09_;U40IM51+oLZwP! z39VY&8KD~=u_L0b^R04UwN%5?E+G5- z_osd=@GEMzGM7o%kLO5^-oW!@SO?)lm!Bmg@b;YY`8nU8!ZXbKLq0V_nCqE;Ji?)- z;6MrVTz$~4-iKO+JB4So`8?cxf8y=e@ILSRy4}wZfZ1OfO~k1%Hqr=0pKb4w|DH?p z&tVmjQymxm^;!!&Kza3nTy--%K%-OBGmH-AzDMNYBnkGRX1x@uC-k426pt6phlQ|G zOEN`|DQ)a@$}iN?T#|ctgF%SYh>7ukViXg;R^Q13`|b)FBGKqC`@5*n{XztcV3Ry5&Y)pXKHyHK zr{_c*vmOi---sL$s2*sLf-fkepx?PUMF&Fn>>ziba*Ws@$c`ccyxWM#qvt@!f*UXp z&V1)9wkXF+9B8?!^9SS>76^$N$6!Znye?z0>lItl(2STC&;f8jP|f=)&2Nhobxa{E zagTR(oULD?aRA<`OTW1RaC=h|ZVgFW;yo3N2UwM^D>{c+dimrJWq>3tq_1Z3G4=Z= zIDgUzk>c4<#`yk?8N9zwLehPdxJO7~mWa;+6j22FRUx{oOgT_|TrWMbVmC1pDRiZ| z3?qqO3PxG)Ry#ftUJlp@dYFZeh%7)2O)(!{F?XB`a(Wc1LoNq^ZF)7_4G3{{FV?Im zc>`fW^>n?FN4M&I;ysUA5NAPLvXcunA#@$VPgF;8V^uR9DtBj$zQ2d`L>>AFYS?R$ z7DU!r!_*N5U_W%`d2{Egy0I6X38!Xs_&^N(zK(~qV{R{oXO}YG3#*ydp54Midd;dx ztxaW?m;l^H9bn;pH`$$FVFwBLtbqKxGpJ>3+jPxGyq`WAk zdE&;Iv05HOaiLRy*a^#0l4u27C3bArjVIzq2$j}DFJlJ`p~qF=lRcH;XRbKu9_$tR zIpU4*4-_J9->VV3e%DG>Kzag}xlsgBsWKVYKw2mgFrCQ3{w&6q+K4R1k}~P8cS?x9 zF3@lvk##A<1nL@l9p6c34^MCUYt{R93n?1G50HaEvFI7~?xC=g0o2Bd-A%4R_v`iB z2vM(CgQ?rY$jy%e+1*qH0}CrTJulK{ZCeF{(ThQ zuOrEH4x$74d$8^DYimw#;?4g8niRt(mPQU>0004xP)t-s+1c6J+S>pB|JT>oSy@@d z#l@?ut6W@M+uPge>FH!-Wcm5|Y;0_Tf`a4YTz*#(A@BxwcvA>)0VK_#MA7LkB|BL{X}xad79Pp_WMM0#6)q#ZIRK+*X~7f z#jU~RkgVKijn7AP#i6+2*5LBK&gxZw$wqU+7MRq1f2i0001TP*uGE0004EOGiWihy@);00009a7bBm000*e000*e z0m>%xKL7v#2XskIMF-*t5fK0^V6o1&001BWNklP5F!B(VxScza>(P@mfvFE_~xbd=EPga$JZO%Ny_JZ0KV*0_(34WKfXPnBvTS8 zJF;F(2U8YB6PTHvd8VK4#Uoq(lY$is9V^PEB35|!%NCE73d9OlEXw7^V+CSM7LOHn ztYF2w0G2s+vv$xM%)A~iyyxVrFK3?ACjA3<(@A`pI(E_V*uYc6 zG3j^f^+xj)BI&A{|E{_jzGgc94+8nvY$UtNRJ6JTy+ASFUEE$tj@HBJWhOr2a{v8H ziJxOoCGA7kbuNasbD4JRqIE2*XN>`vtNs4gTIJ-$cx9?Md{@H3ng0(b7+muhu+9u( z{>I)6oXvNLjT@)dS*&xR+3%IFqS5nE#)sbMpk!PNmWdVPMpjpe-vI)iz=AU-rpRK9 z15sBGsBRcp#A^II;=ym0@~ceT%Q;KBh!|zeX-E)kG!GHOW-0ol8tKvNs{R6&C8>Lu<9(HVr#<*Az)6cjV zjJP0hq*Ku?PDL}8awFzE3a0JDOg9%8k6kb;+U=xm6JJBbLJvr)HC97L#`vq7qK+Lf zeDj7w#w$|YMy?wZHCk<~v)VvY)7`0#uvIt zld#*>2L#HyjYiPw{?+vpw@0|K(pVdEQfruvn^Q6y@2=krsnKoRlwfD&@B2FtyNwlZ zx>UJ|_m8L|B+KfI4R`DHDygl8|1)O@Mb}q+=($YlCPZ1Sie;{c(P~%e)Nj;~#8K20 z3BZhojW0(aB-^l~P;UIi0BCmg)x9P0Jbah)cz2K3?v9DW?(Hox#+3GfP_=O{ODe)MX|F*Ky-2pPW(eL#%*CH&NZ0a0Y5tLqU0yH$K?9)i%norW3 z=pKR=uto?3S&`q&ay#~}y>=I;3RzLP(eCvkou_Ly8Q+k4z0DOCdO7hZD@as&kM8!w z{W@*#+9-xBrg*&O3;IfxK&%s;lIG1;ujl61=!#IKz@^C3PB&v~Mz3dn>9lT4=^G+X zxUS88P9|O1&F6~iXr@dZNVXE&HwJiRC_(Mft##eVJtqH{9gGjBqw$Wvzx)Q81)G;Pj zv(H_BikRTeS;RNo9@YwNq3m^>;gON}l?f$|}XVtkKn`K&);x(RTzRN6ZnQ zZRrf0wJBn)ReBgNS^`a>cvd8N5@Elm`IYACpc#atA7*-yJaIuJ$FGt5*4!z>27PdZgWuX6@pdtZ8crwAb9I9uuam7*=Vu zE_e3`AFV`4L$=2yPMSz$AiZP72@29dR#bQOK1gfYzCK+%Nz~2nC-GlG zD%{0xxLSkS?o`LP?uPXMn)~Q0Iw1T-!HT`9j-@!7%x#3bCi;rQDJ$}5#kWN~#_QW` zSMJnHOTvnYAPY#*_f{1JZ8y!70ZYM(k7%7`;%$<@5<62=3=K9- z)sAW2oX`zhi2?5twXlYgVVy)tX^OwCOvx|~!`=?Wm^MjNyi0UHR>pZVht2a$snWcQ zT&D6+T<9V({ZFc#IA8LWS(R^EH~@ZmWz#+nbWd^X_WvxoP{RSW#bdOe;su%oS{#0r~yDA8fx z+7c-*Ov`wu$K?`VZ&ydWy={%M4{ZGBSGWJ~^SkHDiG6wJ&Eu!vU$I8t`{Bjw2R}VK zSKaT=EigQJ`}+2GFVDw{%nnmB&=`p$M@z_9WYlIMCFS)r;-nf*Bq;SO(g(`*?CpQ-R-{N8r1E!r`Jqp>e*5ujEcYM({Kx0+tNUNy$EwfiRU-EN>#s$x z|G0Y&uRr2*f6l$kY@mm9#M?urm~h1&COpu_PT2TfXei z2)0m0c>CyUA7(0U-TA}i|A>*^zyIIQ|L|BJ{FtwkN6#0|Bb-F6bPO?MMMTWjsxBkUMRih! zl%%23;lvU7l_gU#_?B{1!3Ti<{G^Rs6VFE*uc>*<>ZuNLbyuUO>av!7pnf9uw*CwISjb?5o> z$8Uc9<@LY*^Yyp)1u6XR7vC%r_|Bp$uYS!J=hwe18quAni>luFFEP}wzg~!#k{oBn zQdHneHgBNdKJpby|PruzdP(XU`-n*8byvB;(zIZmP zMl`?e<@Zm1`{~tJFWx?V@!-K@Z0+%z+t|=oKmG7Tbo2AA*8;Koi&@b=L*V;4E4*E# z+;MfGwSSP;{PCMbH=M|yJH?6_^5Cc?$Iu+Ms2@)I%NJ9#@ZB?kH7XLS(bKmNP>p{5*S{X$e)06}^Y6a->8HDQZ@qjen!NY! zuYcjye_^NJ-dX6RCua!!1_|ZSVpl0%{Aadze-TvtU?D3g&KdC-fwA~ww^+amYBnZB z<>J3~{-Ma46v>_AY}QwqSc{#-?;gK-@Z{bfU$O*VK7I4%?P6y+&Cv4voNM6SAHMnO z&I^R(&FlYs{P@A`sk?LkmlwAmKYoo$`QX9xJKz2G!>wG6et!1w*+Lp84}ZA*=J6Tc zeR7t-Z_gIEy4dXAdhzDXSBq)<1S@`Y7WZO1HYKDpe1J0$!*QHhHH~L2^Hc#JzI=J> z?hoJn_x;=nc=OxcC*QxcPpFX)crlIV@}416a(;p1v;LI*>|ReIrd%ds?};pwb4SSO z!U=fx&-((hZx=etXCd~UlAK@Q`22?tl#`S3*vDlJoW+XQff)JW7X<9l?Vmp}#H#0> z;fvO>PY$trPaeE}edi^7#)y@dkrmIHfP0jlVNpHBX_) z$7XRCh+VZED_x&=pA@Wk4m);{@fgH?AfOCQm5^+>k;@3p;g(IHG&CKOn4>D8EoF|5 z(TOg zGCPe}R{tFZZgvKv5XzcrMB+>QD6r_hF_r@q zxYR*`$6+>y71hj;P+$cGcHG`cfzw7w24{0t;3GQ*S*&Hm?k1$HC0!M3Fmd=AC;g#{ zOQtE;e6k%VoAgTJv64o)j%+dX91@*4Mh}E6c6MR+Vk`%0OU$`BsXuw^CfaiCxanlfoaA5at8wG|41#S%&35}NZSLV>b(xd)e_6fa9dW- zipNf6m?n}@0%G-zT0S;gGEh<$7!?3Te3rEMe8d!uvbvZ6(?wx@LmXBkhU0f}0_1km zZf8-p*b#v z-^86oY@z`ZX9IesjshEoIICqUFt#tZY$0&GB_;Egm;~{GzykuJdKnR8yHfW^;7#S7 zz_W-&8R;QnNmoMEvUbPV*g7CP`!Xeix~&9dQ)+GP!3VP`5=}zMIEb7 zm+TmcgLg}~1g)+(^GH+VEC}ETV;9gN8_kipt?QR2Ii$ClC{9Q_awJ2UruAh>GpB3}>H_?NL)AN zvQWp!x{nqhHa5_jWw^r8EFjgRS+E=EH%&IE#*>iGMNF85w9fXM#Aze|!Yn8*L&&QQ zaU@tP89{k#4r0BC4|FwKb&`e{YL zgjVKet%x@@sL8Rp0TnGXJXHB80lC#YTz4nz7_xc1E9qTD zRP|A_)Q$~uttP=-J4V`@vFAfGuQ4*v|BIs@NTWCma501w1wKlMIbp}BCuRE+9AzBU zsEg~Wrs!2Jw-s~)#Og&d4($()$EfK^o31$3iR)-ugCQa|&82c}MXE^cQZN%q&LWmn zFuck9Kq$5!BqVK7nD}V*K=IpbI?v4C;d7pOh&4!?K3d6XjZz7C%g6Stn%@*3qS&c_ zbRhPujs+TLy8)Ht4NsgVi=G4-nGsq-$t=sGEh$)R#|{MELD{NPfdNW00*iTO{*f`7 zjiALP6u5`7RYZ+R8F=5H91}S9kBrfbj)8c{#CFiUkh})8Qgj`BTvv7=KD3(H-?pDE ze&%s19;429FHCbCLynyY9n+>dCI%5I>*_GO?x$2Ui1E$+NDHdkb}U>{E~s(C)S3b@ znv7#takU>QWn%;KWLW4l zkr~^=Hi0d1+_${FiKJtH*85{ru`3!wq8@wO;3+KJR-@D!)&^)Xp(Q~Tbu9UWo+~2h z4Y~tA1Ta00a&JJQJ3$Cc9Hzf#QaRyr@>%VVoqTo=J;TS3cv}Qu?O4QP!v5q@8LuJ7 zHjQI;?7CSoGj{Y6aWr45kFy)h=@=s)Y|@X3F7}`=n-$N_;x6{bKL7o(>u1H~K$790bxiEt1{=&BlWLy*hA+J>ai~~nIL&@L z_J!M4f!MXjW6(A-IU5{i=7{8pfwmn|Vr!|F8RgA!VaKjF9y__CN!z1#sATi9-&odG z{8rQ0gTjt|Lh+c$FpWFep^laE?6*mt{e~o24V95I`joQY{)F+^3B(kU#jnSC_8SF~ zb~x$#4g%Oj14hkQWWVhdI(Cim*hxFaw6faqspO|&3FI>OYSl=k8|^r%qKyk6_Tr(v z#CELo8OCF6;lEowNdai8gtescgfyjJgij^|NYhvX>F zLwsXgq=Xi6_OlV&scdD19lK6DHZLBdn^jU4-^wU*sigc{8F%vRH@hwGw0(8Ch^kq&#@lpv_uQI*LG$A4iHt8Y=o=c9B+#|p%*J02tU zP=H{MIzET>jKp%MiNxr20!p~S2^gK$h2#VmyDjI8$BG@z&mbNvo>G0%@mP_Wvs`xU z&zCh&D!v=3(6KAlv0{I0+3Z-MV@n^8edczo$l@+^?5cIFh{u-8julzlOZLp8$m0If z#bX64ehTpzFovVzY?{vjT>KAT5gIB!174hR^l8Ood`liFB<*ZQxhhv8FSLmgd9q_| zc%DPbUU8Dx_1UpGtO))F7vCURhMi56(B2=@VT)-gY)Og%do|lj3eV$OBhB z-Jgob(r{fC9*-4v>{E}& zip-qlvSURScM*>jI(FGQR>Wh=X2%L0E8?-jj$Lv*R``lbremjA(Xwru5@7a0_FMjD z`pTzoi|n`SjmJ(R)_1pzl*FBlNNij}Qy$3)DR)MZYK=zTfK)b%?6>QC<}oLW8;rit zosI&14<$@o2S$CSsbKhu58JK8vzOYAeSZ66U{+8t$7O^aX1`U#OyqfV6qDAPLG!pB zD_HST?HIg29s^U8C2M~6+g7x(Z8A0k5-n%vEsAm-RkPA{RQ(8nOYe`zfHFCV_m5@2 zwGOi1sK|aBZq9yVT&kY4RLkeBsVYi(?ovX5&r?rTv$C51K1a!vbC0#;e8^L(z_a&l zG+~F?Z(fY7n2PMTR$u9Z^ymCmM*CXqSmvCJ$4;?g0^AEM^gJX3GTYG{>TR<~g^d;= z>X0h|ojDYfmJ7r_MBocUY>tj`FVq4~;!qyi;5MNY$-V_jM>dfs*HgSM`!m^Z%DE?i zW#^s%H9h}>(CZQSA`v_Fl!{sw77TS)NSaEABg) zomONKDrr%F;W*lBqFE|?C+|r1Tt=X;Mba5TbEO;4qaN2L(9|M>FA#TYS4o&0?`?G%pm228J;5?ha{x3gGL#Dd7HyqhK-ZFV`ybY|=6RkGriL{d3& z2bs1N?H_zuh{cU2fz3Urd2}&iE%92`A|JBGPDfLwAM@0;aKTzkTR03~7vmqgGB7W4 z_Z;1nlWAQ?=OlGGmz9O`4rHG4RfX9;vu->+SF?<5O=7dLeP#rf+URG za#+R%GVO)4NF`zi*bLwd#4;I|rl&@J$2}bC0L9JrIghflz59}V!H7AG`s>PC4F2YU z$Y3BVs-Y<_UOX_`H+)-hZN8snYYHg(!9r49N~piNzL?qkt*}Q1T3ZI&p^6^g+&-MC zL>DyUjZD6<+d#5Hg*YoM80h2eo9WS%BA?d6jo~6z9JX;@v&cupY}(SK5yUP#R2GLo zNjAO36Kf-4`#{Qay4r-v{=t5uqoV-`yrFRxD}Hnq_sL>P#FjeUeMJMZt${rlFoD>F z(2?Ze_!jG!WZTqOSJlma)}VxIF&hkU%qosd=~QEPp$+sUMP|~Df;v`;+?yF%7;pw- zDiE_s94P~B;iBbkYhZfdAbrBHQqkd{CUd#?QXyv{D-QQs8+^Fk9|3DcjjrNahEJ$7 zZ~zfY2$P#h*guOEg|SxT6xWp6;Cwtt01>0O2r_j)zDia!B(Cq^q7#UfB2a=LL$Wq1 zByJ=)KhBwU3`{o&f>;a&ZBG^iWk4MRG=XTX+KUn6;Usbt*&2?R+RbqGc`InMT*tsf zBiA$*trVpm1k&!nL5-&2_BQra3))GpV}N=?lp$S!*tQ*&Bi0&O=$$AHCM(gHuy)Ym zxsEkuD?d$RK}n`MhKS+HKr&2sf=Z4U43SD(5}c`H7aEU&*R*v94Ae17%Fz)kHgWa_ zWY8EaMob`5+e8Y4Y;}wlm>;ns>Yq^2g@_rj*YKz!bGby6HKl&EECgb~27t5yi?|ql zJ&=3OYKHUWOb$CG3?XcW6k6UQ#A+Zld}xih8$-Wqwe%xbl}7`TX&i0xLd4XFS5Y=e zOLd!!4|_$k3;q^>VZfC=rOM0^rK8Z$H3iWscMcKrD`+uBl3RO^ugEuslEku=k<{5c zsH-CMsw|BbFIY)Jm57NFLd})5m8_n;TgvEEgp#Qxi`IHW5YV<8uX>Ukz~m^bVEc?P z&o|t`BB(25jEvDTL5h60PVJkOBc|;*I1t0v7jZG|qbtNc&v!ejW??&rh@r`Lgt+$A z#beA7$HqAhW0Z;07>@>FiM?$nIb-ecTx<*L5^A$|w}KF#I}SgyCIitMcEN0FAN2y_ z?OAmp?*=^M^Rl@Aj0HZnK3v)2Div7+%T)?i zTsp*x{jp_3tjHQDSg|OV>v>EHRxEU^D3^>_d0^X&~rt_ z0~=E(rE+O9B|60J0000XNkl6orAQi$i%bg@2{RsVHbjE-fuBFE78myeup%=<4bY z3=C9ORvH)>tgNgY92{6!Slr*=+uPfNK%lLyt-`{>r>Cdr=;+wkST{Gf%*@R2@bK>L z?)LWf(9qDkyE`8r9}^Rk-@kuPO-=dw`g(eL9v>g)=H`OI;JUiH#>U39w6wXoxxT)> z;o;%x>gvhK$Izj4tuai|$QBIP!q=rbheIcOR&-Y~Fta&fN}1pWN^v%9-{ zXyKAtz;IB`f{Nep=E03+)a3rjU1`UbW#ou$%!qc-kinO+R_MXd*g|yaNx6~UUJAp&&=$)|h-!Enon%jb-j=B!BEVyw^KM2&_=5fkcUUoh&`N3k z?G5^9W+)GrQ+{2Kqblmd*7_|;f?Bbh8aQySrfF;TM2!I)6@wZo_TdA~GxIWcP&8=G z6(&-WC8>xW^d9ZJP$SZV7$rksmr27y1~1YAHxWysjA5=wPBugkLi)$CkFe9IB66gbU zbh+iC(&e>qduN&Wt?g29r<1nfCkbRRi*q1M;V&%irXGMUq32PdeC_Wmw`; zb;|F&20qcukS~bu5#E$ z32&5727I~krPhT!Ie4*t=-COCvy&P7AcL+DNhp?>`ZT?zJN7J`v^=Mx77XSW4Y#|- zeeW{#G%ov-$d4fHJR)Ku46|VCSK?=P>Bq1zNux2GtKKcjh&p2QR(B51<`DSHD7b)2 zuFzSVZvW@_r>!Mt4osa5CYxT){A>|mnuX{t&uVv3A@eh&edRS`Gf`-rER4Hay4nL; z9-&1WbZd>3BRS1w$HEoc_`b**Qb<=Hr;oL_YG~tMs0k$R3%dj30%&US#gB-M#;hsL zzl70z{Omds`4%^~`s0nflPk(c%>76hEAb&1;87>U_D!@|4t_e_7TzKo+J$d)>E|>! zmy_keiA=#9ZlFU0?B*U9jEASpnWXhn@ zxvUn!Dp^%*L5H5Z!*jII(ZWZ`h+bu1YnTC69QZJzxHfFxPTKjb5o;Dy^kqMa2vXcr}pkHv5CX?ftRK7b2gI> z8a&R7%><5TDpv|?iU_h*IP@-&e8Qh^CR?x`6r$w))wf4glYF>Qu?Hn^%#it+FfU}Q3*L}Qrwa0JWv=MQHwGS?O!JyOo z@7(iF=7Eo2!c=nGSK20e+N}=_34XisYR-%I!Z!MbC_jc~DuPe6dcSpWz^^%&boS~` z`;xR|=W=$2GVz9Yzl7o9+5e0@t+sCf9gF=sBjOxU_o&|Rp9;1{$4hy4Lk~Z9n1mcOn8WrV(&2;2*uow#d^QA)Fi{!znb#C{KH}o z?iD-yNTq+{;KMK@3hIw>oZD=(k0ToYKorrp4TFA# zXGj1>j22sRej1L_svn1*=#_S9cFQfqGx0Cf`LrTWgy0Cfu=36I2)j7Fb6xrrF%w&J z9IZcUy&GmUk0n&0NLroU(#-3@QQh4&SORVHKeu3mFP)L^mBc?N*MJvlN_i|H{z4so zfxWjR2$lDe9foo!wwf@zWrFGqZYm@a-?(uc?a{grLf;b~7U)v@;UJ_7qU^_Zfq99B z?;R9b7?S8vkJ49gvy5lhe0i68c~eF@ax>v{2?t_eFK`{<=cHoaUyrFlbQ&lK)M&!y zIB!ow9Q)&TEsv>(wy*Hq3xUchN#xOihiUMoX82iAy3Pz%uOS6r$}tX-OsRJ=?CKPc zY!r?a^!d@Y5U@a_8gUK%+|Suc_$;BYs4G`%-aM@cX8winY6eg;fzJ^Q$(6@3HZx# z!Iovrse2@REQ-Z*)UL%5PN?{zh3Sr>jh`m(P>Qf7K%!VyHcWF{K9yXU@{12pkU$|? zPYv~4Z#pF_1btiqZfR-(MXq{ISL9n2;}P z@HgTHiC!qHkD3Clt?ivhemTxwevczGUL%-w0O*ZP`dP?6)HLkYa>-VY=67@5(3LaY z*~xJz?&H?VvYP`=>w_msAf1t>lBD6vVYdd`M81x&+_n9rJaTw@xtw@nS3E zE?NzLAXGM&26~U4*AQ~OAdlyrSpYH3@*kfdx65|UGdxbYI_-5wm8jZ{=hCAGsl4Eo z7Z*-42i}5W`)Kp;V9Nk~Jsv)Ebiz?K3D@X{mx2cebT$*Vp5Ov=ea}98R8UQGrS^qy z8vF|3j7EbANzD|9ljz}mtPa`tmt?Vm( zg9op(bcrd+x_E$eW@71BAs0;xT3?Jzpz*6p?t#G@f3>17Ed@Ae#02Q{QNr#!&e#s! zt$?=_64FWPNT?_mJzpTYDl&Fn@5RlqUb+pAJ7+XnazLdQXtMOAE@wk&GR3zaU|I~* ztwn1vVYCvh?FDsIMNPb~u`J$~XN%nVv(PvO%3A^L`&)An{26Vh<{pV7*5ctp0Xd>< zGQnlrpcAJdCZKYOBu>&+Dant4OhVwB&GF%^dbP$t4r%cE>?lpYK}>0vb`@Sj&u2P; zzuxkqfE4j9tfd5ihF+`Ve+l?Fc;CIdMK>z`cTqE@G?VJ}cei96N+|fJ2NmDER{hQy zm>hs&8I1Vu(je)+sdj8cKGkp7grp3X^#ylgm1a><6& zJxp{ay%Y?`gCNP?l_Nep9}2Hk3@1@@w%2?@x(MoSJ3ujug7=75!)9KyMC?Q!ti(Q| z_MblRg3P4>!R{%F*k9JzP&apkL2+?1fNDavZrHCby_6wuP;M)7steqVDDwLzPi5Y= zUB~*+(4glZh8ER7S3(4@+7GKhs@A6v@MhWVwtv%|w*6sew`h1-VQb z{ih-X(I0nmgz`T-Q(z2?a&*B9OJTpL|7=xG%sMDS(nd%oVw$Kk!;%Am%qB)wE)$4w(~U}% z6DddcPb7aIR{$t8xd+>PDb8Mo%mTeZ*V75njWQZgxq^8LGaYZPS@XOM)RzJJa)0)a zZBen0<7>Q3-j}E)g@4*eJw{^!tzp!zaEK^F-6)Yxq;bS~;@`MCq#<>0-Y}3HLDH*P z$ayv%s;L9xL9yZpxMP~wx`?|wo(pg#@p)J&i@eW0r99Q(2Lp$^j|l6u*{_e(fn4nB0bDC^>s9I{0vzD|FmQ$9y>XnNY(@o z5eu>+Ccz9tpS&jhF8l(Ap1^VYySD_PMBT3WyDp=Q06Ahcu6z*jINrKdhM3`p9uKiQ z0=fOe;&Yu(uw<9CnHD@Wc3-Oo9|z6TPl08m?D2A{M9+P(J?%OCR_?s&7!dTv2k)o} zYRvcIHYdXuGH)Waz^ zx)@yS02?lYb+3Nx?A--43>(;iaKWNDrq zu|nFtC&-A@T|mPMtD_a?ML;8St`|u!W}P^+-qI^me|JEH5Yx|r#VH{n+A6Uq0LO^n z#A@pHx5`!AQDt`E#My17u;fK)_@{^xp&yc?dcsnB(^n!oaXH%ZR$S%yuIl9FN0phs zZTP!_3SgaT&UT`G3pSs-@9w*J>a3@pe-;O*%s)1f7p(?8KqWG@zYjlaOD{F;+1mCo zGgtcMb;Kkzf7q;&oAET&LWpfjDfsZ*&5E@1IrHlBCE(t@CJY7xgV(tF&o}v&>(OCn z4-du4=z-T)2d6bP!V6hx@_*cIb9p>I6x|My7LY%>TG+skX%i|cbT$y3f{KXF3}AAI{62U{$r7)(Ng|%4@EJeAllE}DlNs< z3dRgra0cv<&--rW`Q`32D&R26Q}J~9G4T2rWV8Bg_ORJ;huW{-+R3lB%zjy?OD#I?m{(1VP(HwvBf^ii_H&@ zr*bje8>mNhMvaXMQOKvp_jdO^jgRUn2NCqOUH6QG*e!{O^e^!p9RXNgk z#oj-LrG2m4`;6+JAGu&Y-~$CwfcTY1?#>>z|5ySGp}e{MO9-(c+TV z$3Qd|#HdNXlfs}fiH;Z6SY;(*Xb9Xv9xillCGIDvI|m)w!PgLLWM_@v6CW}}g88T? zL!)Mb7oT))43X=CY3pFx!xe-8eW_iAGN4$r4|@t?=LQTejb%N|T{B?}Ev#oLu9~6# zNyy@QTAX>jR3SnGwgcO~wrmU*SK0kFB@gr*Ow6*|qO;@c(p^=FxYIXFJ9JMbeciS-0g)}$ApfrPHC?c z+*It8VX8ZRIL!TGKjUp!S#4rFn8K{HKDLnUnbh;ia#K#S&9_V3CgOwc*7T4keFmMAh5E%;5_$(wj^VB%=eDXM!|F?t(GD68y zhQk|_3L)=MGWveCM?;m9-p?^We&ccqf~2OudW=^hdMCpK8qJ&%q2hjd$IU}sd2O-k zoF)#EpH`gbUPWJ3(Gyl7a`+dx#{uAJ1k(BfB9(HYDZ&4Q5P-pyGCCBT+ip%=>ZD*L z{}SoJ`M#XU`E`ndQ=z(v=1&jGRhfU8dQF%%>dbNGs&&Dh*6oGT8*gV+j2L!ApyBiG zD8w+fd<$%NDdKgH0lz)7ftcEn3~wRBT{8_Z<+=OWLpR^<4Q6*Hu@X_^+=#~;50)Db z-UUK!0O-2YsAY4gHe_WnJpUPCUTa&EfW)NrHIxG|aK)EkM!(IW?$@LZNm>Dznzz8; z{NArQofeeS_wn@9BXR@gzxH)_I=!;|mj?3~8d4 zDZ~ar!w!M#KOyvFAi72xs;s@5@+Ybz(DKz!f6Z>9VIN=?;5nVyWog}@`=wjxy_q4i zeww7X^E^x}A>aBM{Eug+Ki`gJ;U^D>rGH&89HO(7br}GBd&^IOzm#%yg0jhMP|a!?(M2 zO7{wlX3!&)cYmeZGD+~YG#oMx;U7RrJ50(!v*|uo73^YB@?t|Az!XxK0 zEEOR!Z)6#h;}#g5pa3I4Sa)y&Bg}q)Z?T$t5<$X6mGrsGJ4Cja9ok^oQgr$^Xnhz< zHz|r&J#T`p2=7q1Snr+*TJsvvp%!drQTP_B1}04nOcUfw%kXfs$)j;*c#V0M7zJYy zvD=c(EsHA2ls;B+q1{^&W)0{Q!F;jBla5UMBLJL;{EO!|BHsO1Zoum9(s>49rG$%H^Q2{08t&Z zdMOgwJf;ofD*<4Z5*o#YRPW!V!(@i;c}i)?FTITrCDl5r&=E@ZN1%Q{$GFR=v5q;( z^~w$Mw4=7q~-qoLyF#dIzSF5bLZFsL0HGg7-x4K(NLb&qq zGJ)pPZv^e7Mtc+-tu>(vh4C`!ZMX+uD*`uqthGe+tc4QY=mn)Lfxk>)SGyH9oN2d0 zhcyLyq^m50vb%^_8dd%glfd z3p2H(7#gSo*1-%6CTwPnxYA@_Ae5Zjo|RUk-&WO#6`e5y7W1*;&PjS6dcKoP=Q0Zg zFRT4p4sj0OynF7sps$ir{~Ue+p%`&pEbeNDnx;Pfek00;^AgKVDp&27BR;QM!_r(G z*A1!B*b)c#kL#olMZa_O7>Uxj)};APCszckSQo`A#Q@#c%K5~t$^cg;WP(_O^Q&TV zhk}_~HT5gQ&}0QQIZ!;5dJJG8^=>vxXA-p%rx!D9u)pGX4+C+mN0ZEMrmr)&(f*yK7Vp2B5J){7wgK(*6h zrj!f_FfNDu(D4Y396c&5Oewc4R=U9A1G<@d;0X28->%pl4YO1{`om9bx>Gd8*{?63 zp8Dl26YHWKJ;+0mIS#pWz;9Q3z|R7}m?A9-p&&xhHY4p`7hHYW%XPH!I+i`o zSxjxBvtPX-B%B6Zw~{?*gKfrR`JU(opOSSRazDEIdEIVsc=qQ&P9paEcYN6Ef9}5?zfP^JT=z(;lvZ{Ck_L6PrhjW3e&#)VadiW* zV+09|I|fj#o+btmrJ6}Lex8%M!iq*9G0O|YjlxLPdOMRr(vNW;GbZ-zGEmjI?9r91 z)z;bWqD#`cPj^ECL2hndU}1dyR{SZb^^fc2`2ks`5wFVk(5|1t{%u{Y_XxMn1Ny&y zha;~$uHG}!J!a#Gv4 zy2fdPyx8w>kO~9i_66nk>G=?+xokJ+we)v&JCWvSCZ+`^83r8fF%&m7KR2RT35k1J zt_He>6Wun|xF8PntW7s_1D28&$FWGJFAqlvTIk-54IH=okxq5{cRj4~6+B*ffPq(n zuTMDT!ISfz0Amb)Su!1paPCM3A&k^rV2_yz#)IPwFr52R#EiWb(eDEHAB|n$b}g9= z`;@hE=A2->4(c&*K*UuCL(m&lA$Pk?^6KfTh&Aj3PEo?>2Ub_<$x2?sc%ew4G(-W9 zb#RpC+nM2=WbB{cDj&s(ZmG>o8e?Xxo1|DAUJ|V<;cT}{vL*`O3+cB&bKsy<#-c6qZhS-%T zoS%|fN(_)#E!a3IK0uDEWULaAa*DY>w_fl_gNl)k9i^72Z|Y@OxbmURd#>hO5VCoI zCVNX-(}ItQpJRI)(?+2drm+YouUFwd@mvl8z?g)jM6;DK2{? zxs=lrtgU}Dem54O!g<=}0BO-FwF>=Pt@E|kE4q7R-w*j)wUoSUNY%-^TQ3Gm?)UBA@%wHD! zR5yjrYw$tt7`RrG*2G)}>p!!Z1lzj0q{O_B1n*9SzRD|7>;g?BP!+tXtwk(Xlbl?h z%mbS;OflV!_hpJ0hr?5zYUPc-AhNjJ;b1Vax&&A_u|nAQsXm4&1b3V37FL#|A%g1I zohgOe5dVM*8NI}=U=0tco=@IzZrW&4{`fR`A&Wlt`IU+Nx#!(^q2Goh8wMOcz|VwC z2K@+#4+t0ojJ(#kW_fWw@A<0`^-!_X%uOCzctlSjSNCwjVbqHPqeo_^Pso_PPw-s8v4~{5}}nL`jz^4GLn$L;$1TWcQMG zw%aisGQP_fAi5M`DLipBwWuWB+Nbb(uT z3vzu;xYb9|@VmbU{gYpneX29jn0CjF@<&YW%6+WIYbGQ^8ie#{bZ1W_eJ$7^`MyS? z8C}dr>}IKOh2B;73G-6qg7^WL^y-+`MbZ#<7T5(s1Tp{0mjA~-`>DKZR0scM*b=E?rZ0@0pACf(ioK!=cjTVRBAu$cDgOkyQLDs zJ9R01H!Euh_(qM z+tcmjow3`kIxML_;YS80S?bJMR=3l&Gq}E+g4vM^uTtv8i*GbMliU23tTtrWYyD{y z8P6{0q0<=+i)%io(uH}eEjNTTyy-`kR3;lfsWVh~fvHE@vjT(^-{a~Ff23nL$ zA@*zFjW7jDWi1$rCtmDH|A;gH%}aK0F%{c`aT*{wy(~pSg+qE^KN4E$|qo`GKx zpy~N>0>F)o`8_VF05w&b>qQ_QK>ubMK9JQ-cNMS))JYwe4%R)FAv(||eAmAd zH79}a?2MBv*F4k%3mRPrnRu^tm4sx4gp87%olRDDR`yo;mLh~C2}O1YNwO-*N42%PCxTA?)&|It@nLPLrq~fIRiNf3CV6HMOiHpk}VJL@7HA8 z@qZ;P)8z60wp*N2kR{n9{`06JBL<(@>7r=hMnb}OnE3A&?=)#od~%1olB(Q}!Cl*_ z>9`!H#SHK%dUrW}_p{E9j#f_YBxhZ%%-yXlS-tGsZCMqRR5kRj?m0k0!b+kfdq&&) z>tscjo3_D&Z_8zs{Bv?Y`AUuR_B%ehK>DuopL>ZqQTypN9WR_S(u<7Mi40%3t=c8= z@zUl_A^!6ht#n21#p=YjMA6g77o6syI!z*@NXmY?>|al>(sOeGrau#Rv^pQA+ADj7 zJGgFDsM>PLb6TvwbnH~W>qpKHA3ji!)@uCu@LrJkL{iJRXUF#7Gvj;y!N+wyd5)Mv zG~^z3Boy1XT3J~s=W`Js<*wSw2mbtvD^&gr@u4Y9{^uh!Mf1<^q6xo7e5BaY{QZzi zeMEe4F%ZA@AGwylKm5Ob8b7=gd`OA9-ZI)!@D{sL(9Eh*M%%lg*|ENJA_+$r!r4Lx zy(({Tg}$>mu9fwfrMx0PMUuRqXTn{4{cEouU)*7aa4jC%{b#sCN86=nBAF%Mj?EXm zc=5iql{%U|s&Rylo_^qc_`#lXpO}P`&VnaS$nnMbjbEY-liR*yN9pCE_jxgiT%juJ z>O!YZm0f%tmQwfb-M0Dp`BNt98ErjfUX)e+n~7h8Ha7yKRwsq#me=x>FFQF!1Z|83 zam1@ct7Z5s%^ZqS{I|Yd>FvPGF7=;PtG&~7%*=s@M!1z)kDY(3zHyITiHC=0CVz7! zpFO62y6NrE>a%a&I#0BY2Ch$-x@~T(cUZJ6TK4BZeLC~AY&y{S{f!jcKvtSCx%BjO z{Rw1E(tDNL2Dk_>3 zSOT7(EjU8GGjO%L-*tUufl1l?(xtFw>CJ}@B4wP5Y)a8RqweBO3lkkXugg&E-d#{p zv7WoKBKMR`Df*??H1oxa7x^W(;7Lq%m&7L}$w#wqJM$(=J43JpEg=h=8fv&ljl-ue%JM2qckt@Orm zll%ip(fWplgB6Q?sbyseb8~Y{G4xkh$;htFe2~?%C|UHnusc&*SVY8iq+vf>6q$Ug zrY={3{%sYGvushX%>-DLs1p(rzPpR}I4$NKE9T5!9p3uOgR-qn_jS%Q_M{B5q{>>0 zg1WUe3BI^pnlzeO+NXY2{W9W?{c%Yz;~J|57tQ^oq|w(`x6V0_yNkPv_wF%}$gfK3 zuu(T%^-1Op_~}!X+&tzp^KFYszFuXO^Q&a%9}~U96-IuZ6K!MRu^B-_6L~pWSYmA~!GYx`mgVTKm_;>`9R zOj|R4eIwE5p=DQMi&E4uF^S*`eVUgiC@QMR9sAb0=<@GLgNJIIB$qB->Urf6Cd+o! zFn6>r>hSXyFDgF;#Ky*&mvqM`Cud}5ljAv>m{|8$1}H|$vQoVscaLr!GcYiCTu`t# zQ7wdB$-%+FWqwpOrG+b+y``f=K~L|1cw&S?B=hCPpBH{lb=P)w(%F1`=wmI@_4Vsu zPJSgDM`|}_v7OS!cX?$o!?Pp zr(Pcp9I>#lxaQU8vm;Th_R}XSJXRX=e+-R`=;`QK<5lKr4wwo^OE=fD1gQiBNII9# zZWl=iPfI&;{e&q^zSk2ov!8>lrvQg~WLru0#BTM_CxJT%X8{1t=8RPgayd81f zOMbm>#C5GJd7a)c*E8hy0a{wz-;tR5Z|>qgL*XYs*$Nw1`p5tN?dc$LFgf5ieQg9& zYC%C1)-~?omh82Yecor8rH{mo4iB^A&!h0*caMEcJe%L)HuQeCMFHJ~3l|ur{ONLa z!>|yXorOe2>qbX8Qn*@MTFwLoNpBCniicLYHg`_^)T#LR_(OCQcr#*tzj^TH`K#8n zm~8^9lJ{|{)qPnTGUyoP05gWUI53@vF zWx(qFhYw|GeSr(gU)zw%e~Wq3L*(3pB|sZUTtk} zufcD2DeL`L<`B^}8X6nLynZq^H8uIqyxDvMayNlZZGzw z0^W~Jb5hNK%N^x3RMOKla)R*`cphdR9T<9~i^1{@{qjZkW8$fhH)h{r)TO#kyi8I~Tbik++_{bPp@dH~wq{X5 z!5hwGe;K~GYNrw*K|!`M!|DNn#p(W9tn9FwrOBe^Pxi$RPkBXr{HP|iHgopNmoHRu zdy|`MzkOpZHIBgEve8|WN{)<_-nhSY#~v4yJO%~^jhyzIDL4D4ITO{+o0zDns_r%o zTs|`H{$OFj13zNx=-B)Cxw2E2QHj&u$Xc<06=A-(Ft7fAIR46|Yd?QF5icCO5$#_l znjMW}x?+);J2n(G#}&`@eQhnV9I#ydrJAv8Qd3ijwKg}bL`zHi(sPR88tbI^$8BfK zE?x}2b!#Vfg_!Fw8CIl(|I!^iTP*bwr(O#)vn%H_)HDqYvh;;R<>s$_UA(p9d;J+y zE28+JcDReH^3V=(N-yuE4f{uvhMtKj?Zu0Gc&4Zi4BuKYZJv7(|POF?>6 z(^BI-8EpVd6qJ-h*tl+^w;cxPD7N#NRszRFJ|$C26qmbnDQA+Jr$S0d=qz{aApgc7 zKi9EiXKCbG$A!1m6v_hKJfNQDuukTTlg)iO4_O!RR zKQAt>|M_%az#KINmt9yWh?P9+EkSnebzL19`bl0M-*ZD=+OX^R9uW}{RJ)#+mxHC( z+oaQSa~*2~#ut25IQH!c3C_;WwxJnpXdrKFY+Q@moHKP1WhBwo)}AR!UcYT7aIVRCE$~?5ymV#3+zYGqtT|IrJYPGB? zrZ%>5WY9)>m43kG{(}b$l`B7vy?F6r##;jI7*#4WJDX@7+T1nRpDhy$ol~Cg-@gYG z>uovUT)E8QTd@)EXY>Y(JT3K1i%*pBYSi2h+ z*Vf-3+3S??^yzIZ;n|O;ra$%d@fqcwJ9kd_#EIilQW5o*gKNw4bm8*sN^dO+P$pPh zmS)Ti-uL$Qx|Var)Dzv@Aj*J;cGB|{bEHkJ1W_=4{P@8|8%C7)Q>V_EnzG!IB`xb! zb9CgzwP^~5rudwABNP1Q${RDY%a^12`b>UIOjz}A0;Y&3?n!Ru462=2XmGlYx{4j5 z#7+&wNqY5lo?Xnrg9p*S04dO}3lko{dc~kg)796<5!Z;-e+#Ydf*iJRQ<8Z$Hv17+Bml^}w-R|b0zNMk5d1yz&KWCP{SXJ%1PCDR1 zSJKTZU2d4G8*w7mLf{%J71_4oX&;HCvGSgdwo~=!WSb~o{{y%{{97V z?BBy#fH4sSj`0Ei4~7EVk@kC;Q|v@N3mge+qh*wKw?*y!Po9?yam@!3*$Ro zN*?{3=NOKjJKEdWwsSW>!=hG}cJnri2l4y4P&EpK= z=&M|zcflP5=!QGrw(V0pD(QFf`h<(?O#Qzm`TZV|=k1K093A&kZ1?J^;tJKz)devGLet=ShwffnTwHj< zNK^9+7Y$o-b7O#Ep{VI+*LM42AdR^%M$TIz+vbvg`c?HegI6vmR4pIG1{tAiXq1XM zapD9IFE4iE@O2fi8SA2YN1wgPQ zB#JUmbm%v4&IGOvvA7Ms+u0YecmZe_yYXp${zYL1^hOG_pVO?bM;hY_40As;HwR4w z@TJv1qUksqzkZGN8+JQrQ)Q)z+9lmA?O%(FMbDnSUY)LL#^M7tvIq=JDghomxPSNQ z^XK;k2L}@n&fU|Knqs?ETyt1TyFJ*%H|#3TcolRGY_^#0eBB%|FrccX8vdmw=fJb) z&h5fF0SW0UvOzcb{Q0xX)YlV$_X`UP_=`d(PSoTFE*t~y*cnm{S)k8*X!ldyV_Uaw zHGb)G73CRK11$J#$R51Xtel*SE-qB)dT2*NUo5@6PO|vVY(bx}6=pykAOHUSQDLF0 z!sKMxqmGHo;)%xP-cb<|dvtYmXI9r;sjp-8pw$BBM>~idvpEjb?1#Tea6OE)8_r60J2JAZyZcye91ra-)M8+d`I4a3k~x|5ii*V5#p(Gz zzv-5?wzJ}i)=(SV#y(bjA`bwpEGRhsAR%F7T^kUmL)6B|=peqi)~RG3QU^gu&Yy4d zinvU6?X-fz4j`Phm5!?P)YM>aiI1N@(~LDI*E)yS{)DtR&33KF2~um#h}f_&D`OOx=Smu5!h@mUeE@=VO4(wun2Xjdf@exXOVNi z6v_@dWlp;?+BLw-+?=a1Uz`IyqqsX+WbIiUo!Ci*7u{2HKjunF&*xy(Jb(UtvTm)# zRv0V(!Gi}xw=MP6-wJ1(U%!7h zgwXAH`{C_EFn7un6c;ea@=ZjTrgVE^|#udN0kKcJGQl8{LnnHwjHQYKNls z?Lb!p{YBHoYr|rC?NoAJM+d9s&6H(8%($l9jxA~79J4{2a z$wl*hVj?voL*br|ooQJ2)V)|crJXOHKPRCImj{%9{;QkpzHNkWhB&L(Gwl@rlZ} ztuy{%iLBjgZEgJox9iOGP3MnK|63WA zs4vNWc2tQPEb037f3kCO3c9CA2(m5ZuPDI`esvl95r`9C&&oOq8Za_4;>x?qsg$OL zy&2PFJ?mTH8kM5LQN6yph)=%kb^7}CD~Y~=fjPDz7Wp1V(JN{hhnXW$;;dyF2oG z^+g4rYg_rt8TRyyjM9Krk(`{IwWA_Dl*8sPGY0}tcZ>DOB6ep8&o4taIM7I*!M z_Oi_~7CY@z_{!wnYyCNY_6g6H0@;YNwnH4W7Zs_Wf4O)0Wv^1H&gNJ3y3%WPJ+8M~ z;sv^+c$nj&s&_QlWxjZ%S=ASQ?#Zs(O*gy+SdQpX+0ETM{^{qVl%A!EI6OO7J_8{% zpkY@r2o`{CvTSdl&t#}2LW4@_n21kItQndWfb?=}A1Ai$YfHh|nSrxJDQqn;GBSb+ z?*anaB~HGL6uTDmLKGzguhh2K@ZP<9P=UZ;pjC}fSAw^qfjvGOVv_mv+1niRi>I2J zr3{9vOy`9vk}R!x>+7`d+6q^1`0kQlpEwp~Y%)B5NP2TR;OBs!h#dX9Rs|uDSS-5j3n+eGoRa_U0`CS}q^q6a|y_aOO**Wgz z2`2Nt&9l^4mTfQ4$sf>30v5lFnU%rx*EK*N$a?qC3-sT*R zIp*rq*&Mf6JscXT>Z5c`<;?JW0acs=DNR`GrLw_f>y=8jd?6-cX^^FRrd!ww0Bh0I%$q)ZMA5VJF$j(Vs?&!^C?ihc~!NxKp zZLweZX*n{{-&WQgW$Fj>l)t}Gjy@MWp)F=AebSMS-__1N%;8LrhhUi?ZAwF)Tz%Z(~{)Zx@AM`J*FQ2}_zrDlm*L{<-=TrxaPIW)=G}v~N`u4~7OUQ=6#0@|2Yf_W~0nVmiCs9{A2LA<+BxmQ!or_E zeR}=l2RGI|Oah^kCkdJBKh)v{-zp!ExMl!56zOJmu5$ZApD2|VSJ;(oPuSnyzL2z| z>7 zA5FHX{RVrilY^#QB63o%O5U=%87<2eTW$F%MKkBO<=Y4Sb*!OfMwapA@4l;SOR#fh z{$a@xLUNxXzfXq$CiRBP&t<1#%d2lzA4?jrLS>hTt;y_2Y0q4IGOc^I^uhsYlG2pA zPXF7*r+w9pJ?mBWgeg^VHWza#J$177;#o;zkLCTTf4|DUblG1DkV!XZfil$=et<>6 zohIx05!devz9J`29_8oHNJ+T{qyX~iAW~FO5nf~Q#!?Vy09&M}YgjbQFqeah?3-s9 z$TX-zRPz|f*tXy^57jaznH#N(P)Gy>1WrpZXF!++cZ5WfTo7HEx7Dq*CuwJDF3yM41kXQtS_Kdf(E&7Gm$D~V#W_EC)In(1Bklv@&&xx)V(k35pX7W?rq z?UBNGiPCE~r5_%S*|$^P^@$r>lx&iN341)ZnTY)-JDtu3;rqYrAJX!Q6y30n+?#50 zT`l8~>D`y2G?u?K{o{^rQK0NxlHSPPpF7%q>>3(F>zrWUj~|lt0(aS$e%*@(&o||(gX4(o{2@ii?Ort+t&T4O^=1L zK{A0BWO3AQA%Jts$@kaROsfKA*;XeT`pv)0RIT~!n_8XBU;7H}&?7nW#>$H1t$hbV z**5*nZ<$``H#;e5Xk>mmx9`+3;pFD?JhYq7Xv6;iBmpQWXhBdiGcq!Egw@Dgym(kh zNa(LRqXujWb_Uh>CS*;BS)V2rVCk8`j!8@$`J8ngjs#3pH#avlT@DToQU4_YSRRlL zp*8|igONePhL8?0g;%V4?p)*I`{CU+g=_PiVa5S;hc;L5*F5E~>GXfNxzfhQ>DybD z&Pf|eox&x#aZCvej$KMOq9z3kT|q*}?9_uJ@kgm|jVRiLy&Ezhm%HU|!WQ-M5Zj}U z>!(Q*8J?5Ug)^vd@V*e_*Nt)*#chS}t?E-@-(jC4a=Fuvaa(qmZ+sZ{m2?{?8Am^35#8-&zP1U5wJO)|k&w;66@Y)vv_Z zZ`cAsKwMnhQb;+Y?ef~vWw@dD;eO@kN5W5mxCeej__ilc)?VGZqZ6_p3BuS9 z_*T%{hoYBBBWr_M$p{Yyme6-XKjo;cX~bUTIk{x0Jve-rj(ehr?R4mES^t#UH660`16ih}Bb=h>sU zHMnlxjb~YHX>1gxd(O>0CC*5@d-c-o%yw>f-`!D)bO|*#%UZ8?WxlceWOm%1dD_dT zf%NJJbLH{>%mO%D!rn8B-*IZ^()@_MJCM$SLl z*RJU1$Q&X2{(STBfQ5(0ekcu%BVUW8ctWXx*8D4PlGqm8^H{x-?6uM2qJek(c4Fb@ z_^9zt#V2!?f{_<5amSK}8HAaXlqg&CU$B{D`@XYO>56XZd&Bgz6(KRPT%kOCd{Ul? z20VUWL+ahHx^qNwDQ9YvTE{r4AK3BNV1WPd+db?$yV5&qAJ^sDn#% z(_w64^4_{ga^G~o-apiU(rT!lIc0@mc|w@fIXOEerRQexWWjX{{MWOqO8894GZ zB52oV?yIg7lx{IkN%U0=dGco~qw|Xtr@pZK9JMae4DMR0PWXyWVC^GWa+xdCnzE_) zh3~Pr_ivliW5_?5TuLu#zgnIC&>G>1nXRVo$1XfmU^+&|IOXn|-u9w8hP)sqoCp;W(OBD?^6oz(9Dj+*%u343j~j}>^SQaa z?&69553X^AF8NEr6yS)t_4TVEI7tc@%uce9YPb+E&XUD$KG)!S_Ue_gc;b7D0%$BF zZ7(}IIv_Cv--Gu;{R9kL3zUY3fL{Qs8J0$Jvx1dXnz6}XS+oiVk_mGGBnW+c>F5BE z1U70sxMSa~ZSZhOv~_eO-CoINJ&|LjI-S$5b^d&Ci|yS;%cb=|Tna)4MO{43+dq!Y z)o$dW8rAFc#UhXJ@5+E0SKl5(fc|W-ll$J=$3M;>GXy!7I%% zk+{M2K$z$9sZqE-Xw0+T523f=A0YX-N%HHYFabpwBjWmQ$E#%kn!baSp7D$`MoCvs zZwsuyx%Y37v4EnI!lebxylvb+Jzseaw*ngDbI~`83EI=F_p>esxE7FR>a2@S)7|UJCXxSpbJ5X%4rX6vOdqla9!^lD;1$#jj?PD zu;?2b%SN-aD_J1kf~X9e67@-^o^P-N@%!iI1d;cUi)NQsP@rdEh*lrsQ`H?B8Ui3e zcn8Y(QIrRKA0(UV>S|nY>@huW#3-=Aa`f_HBp|k66Bx*>Nds-&%-?@4Eg~OEg7GW& zTgmH_HiQj4JRcbu9x0znNM7C&YPhhWNNJ8lwHQSJhBkF9h<~fi0~gEsCEWxjU^n28 zW*NUZne@Qh=XiRcepGh~RsiGeAVIAV;;Ji{TFutk0QT6_sQ{B%#Hi|7aE zpjD%dS(eQx7=8v$AhE`!uJG(ik$(XVElgP&4CCjbAy-jTb6xn+&J=PuG^Gx~sS@XY z&a>od?hL>3a=9;EJ7B8 zW73;qge-{HT^PNL+ag>Q>RU72{Tui6dE~_tM{z%{(wn0vtB}E(T53{chjf1c;1C;* z&-f)QibJq?X9wl5IPs4Cf3+xpK|#krX=F=i!nNvvWy36oS{9|kVQSwp-=e@WtG@Y5 z9g1CJ^GB?drK8o#x)2Yt`)<)0B*wYq#eZSniLMS`7`%W;} z@rjA<<7fI2z=D9;(%1J9eq;Ro`$%9A3jM3HvXPFA^mIs0r*t15K71HW`x?Rzdsw7C z06f8~hhcUZUKd;l!j%Q_!&BW2B_G}lf)3cHc=>H@ZRqho(jxBFTMA;~N3clq<@X&? zvT${!PHm|}Bty)5hVY-^SwVY0N*hK&LGh`hBg7=1lZtFIGeKBfTp93BQc@CM_%^?M zQ$CegKrW&Xw1!~o&;9U$83LynQ2@j@uoR(e*f}}9ADZ>IDLoRS1R2Tm?%4x!QP?`I zU0q5*j7Zy9`T82>`FFRr${>KF5W#4E`SRru>ZTD_*lU6U0<4X{2dYB~Kdi2-c;5a8 z1yDSZFbLq(fg+=(5s!NC-K{wB_t{VMaZi;)Ud)odvV3tvNCo{`STKjOwYrWp4*U>N z&q+F5J^&~xkXK!Xl^k;n@*c1j09c2$ z=KFP`V5mW9#%1>&D#05kq*4PZ=&LBhKYL1pYlj|}l*A#agEtOa`qbUI@PjA6Pfevk z07fE)@XG|_hY?3(6m_`*Ko!9(*#NH*PN9n^fEr~$Kme#MRDQaH2QQkLnKkFq%eAcS zWg{bnUJq^Xr%NhU4B`%ZLe6?}LV!f=$KQdkR;Qy8Rx=pUele@TK1)OsMedCmRaHOA zbf-fkW!Ep?3bd1LXR!b4e{RA1uJBv5wYT>jKdZ@0yNi%yoJtxgJsxYko?dM0>_jhk ziVjvAs*Sz{`IT&YFp4PN4Tx-^ z(J>lwEN8y5*~+jU)Mc!c?#DOJt?Ro^5SOg0CO~(WGRs4h(Um@u8vR4&G3%lZ5LAIa z1>Q7U)SV0dIyyS8NAI+To}wZ%6QCmsrc+4*!c=k53GjoF+9*8rO!%>rgTv$O-x0=21|=FEJ(%CkT~F5@#ct4&|Kl^F&uyZ|@C+SFS3WJpBdtSD^9d|*#0ZE=#6|PgQV{VD5M2bp z$da2ETNn6~JTv6j_M-7#n|Vob4gGjXG%c9wT>hAADHE-h1aq8ps#X?)2k(Y1r?g}; z=J@*8jSoqoIbVc!h|Gut|}c+ z;h{~{=aD*`j0MXV*L|Fp% z?XHejzAgINY*F6wQm}aRd47KgkUm-hp8zq{(Rd2@L2ctUf#-ADiLef$Fo-@qDJ_k! zsgZ-Yiv?`qR->s&d2(^i}vFhXi`MzP{eP?eN6{ zI<#o$%BWbj&dzZ=-p$MiWNDMb`GA#ljkQiHAfxSQnK+^B>z@Aqp^B_I_nKZ4I_Vyz|C+R4V>Dz{!Lm1~gBeXMaaDJe-(?9dl8fyr0)LJZ;G-Cr^B-Qwijc7{qIUZweY z>2u|Pm4()Sd*BkGoT465O0V5P{Xw8j(alW=ZV~P>8Pcg<;a4p@p_z?(Ke#ky5pkUP zS@3~LreYl1?2DV%tj7nSJg)u9kVczAB-R5P0Xv30p=r=v9RC;wh0h=U?2@R)xnm>w zUWQ42P+pH`jE|C(eClO|!rGXAM<=IrJa!~PLRbP7QOp4ZKr(MAvdc&?kKs=9Wu1FTcP8YTEJEjfycM`uxH`&1m^$r;ayfQwM@;W?JBF+Y-7%$*O zNy+%s)cQx-#Uvx)EbY)^dU>Ca8>)}tByg6e=RGJdiKn~}5+U+i@M*t){~n=MXDMi0 z;k!Swwi>ONo`oeYpb)Jb+JqZeHi9*X#IVtj7d(Id4%#)9Tofc%1b&H-mvzxpSHUbQ zI^YFC$+vIcz65R6YV#LT$Fi{J;mFvyxZFVxk=&inQv#LHrL#c8oHmDD2JE#L9fSrV!Uy1JgU29nMuJ_EXdaO948BdtpoYeBhwoi648`Jym!ju5ko_ z;FMs)wKuH5;pn^r2)Ux+!Y-FhZP9yijpvVCUH|5Xw**4H!1!HSJdzn*4xY7|(`hO> z(f-QxDsW8;{feH`K@xS9k7rkc89g-X4aHj)X)idZXU}fEdfH4OrLK{W3hEwDa_hf< zGFh3KcT9mRfLwZAIHu@VDuuu%1~`& zQP5_fVEl)O&f!KggaHzo(8&#?fDVy)au7*ij5%uXS>5_GvQzb8v$)1QJ5UI8Cf?-e zOV8O$MnM0|jUHfHM; zlnTGWOFU_7zyLsDgzuT19SUFUk9T_wf*LY0lS6^7`%g$qM|Mo4rKfMt?>GlP7^R2c_ufi+C zVt|!@I7(6A`0+yr@(waESlHW>!%amh#>(nC+-Zc2#azCT!1e+|L;@LTmq>EpiGQ#z zVpPyKGD6I7YoeNh03BkwQ2o|bvVSz@-3G$&`SpG8fQx>_89)s!J-yl=Ke8WIGLmg0 z9NMw@%gb|C;FnlhA3lDBN%|*}H|=a^XO1j_B0F2{4&^r+C`7Q@u+3^5L=Ka^ji8y; z)7h$&+A?{E2solzh$gBLM%v^g51@|2P+oisk+z0wMS!JCmk{S{ zbUepSE#WGo_-nxiTP2pe&GhhwG8uP)NO@q;go`qMBXff7mEjQW}9uVRWuy#?~q=_6Tut#ogF8;^faCwwz#3jLq>(S1!S0E1JLadgF1PK24 zfQx8nRZ!Jh0;qtuL=uzTSL8Pldff)!sdf={5^k!WbrVVE=En5qMwJ22y=jRVv~A>x zuzZ2OknXD)n@0o^=r|)MXBRwW!(3|zhufp0)?H6{r%u>9Io)$x1XV$ELg~Q@8Q#B! zZiM_UL2a)f@rNdhro@P6Xk=54?E#V|k}!2?YXAfW1ZUxZ0MRQ@ZTs0@6^VF4ZZ0CD zyf#CC7MD>E#lGut(EuB#Vl6|qgzk?b3|(S}(IrSGS=s={V%}mfPo$DTS~PTZ=ssc+P#8``{6Xt4|nct7Q zxAyf_<}7f8f@5sUX3iGQEZ431m-iixGLr| z#}4$1tq8V4@F;`}>Mik0!T8;fafW>a7NE8XaE5@hyoqF9ZY~l`cn9*SEigksG>M4U zukR3*2VwyJww+n}I{Q$C1BoZt0}XPm=qyB^gba@ngNA7Zw!LDB3m@Wz0N_y%KD%RY5Tk5D~cn_*}H4ob?hJEhJ33JiI2p@ZuZrQPzO21b~EL z82ZKKHdoj%2!p4z*rIp9%*A98h8fUtsqq@S9NrJO5I!()I2a(2y}_n?`<4{uabYZQ z5~Q3_To>%E#=gjC3AJP?Ud}RraWu3M>}s7F#H9=_To}QdCM>X`N4zxT7?5&)`1IWD zKKubVCb)Q1BoqWR0wJ4^W+Dm5{XiB${7n^sU z6IG-@TarHeEh- zU}m5i)@S3vTcI^64-NI^IxvB@?aZAMfk&5gzm6EM+(y6#<`BxnkOxAU`LA-avk6TH zly*D2{+hWj%d*w~cSgvutve zr)CT23rCEd!VR^oDM+oTWU`vW;4;|WVpg6QJoEqEWrIZ(#Q8X=`)RWCd|yY!rlau# zzeM|G$Dgy~9VRaV`ZHcsaK|5WU9GO4^04hb7S?jt{~Jfl&fqs7q2vfRAveSo>Z-y) zM}hp?a4IDN%=X0%cExG>H*1Hm?J<7=RZ}tg-~MUrGMN_=VEAy#P*v{BJidb5&f>}P zY_r}r!wWg>79t67l(GLXRB@Ds9Emn4y4P5dUK+lyb5y5uz@_dW$vK6mSjG5`o!f(v z>XAyeL6^ZhHQ2i&_{`gZXXSgJm6p;&Dy6C_8GRjP2zhR}duZ@h(q1|``-$KI!k5T! zLXU|+mQI6f=G&XCf3sP4E_gvx#zsPOF!ABME^`P~2mq<4)GY)LAJRCnld6J}G0q3l zjR~evda-6G zCEZQL7TJ}7jt-iPm>CqSd-rHz$N`f>e!??@2r>7*h{!7z=nF7}BL-48UH~a7dOu-v zTNG#*868`lm|vDaiS6s_I}n;tp(yxzqArYMYk6MzfBiF}+!mj0SY)IB<}uREzO_7p za=}Y=yEhZ_k2t06OO^A2^(6g^|GaHv-|C<2(`9*OdewN2J9^9A!+#Bo-!%U@b^8Bv zWHsn{dGx+-fG=>O@eqNd{eQR==vxBDVq&kx0=C%C_?T#z5Ksyb4??!kU)c?-6#W>3 zj6ObMcs#F%#CfltJ}uR&pW1Rq?QguPkEN&n88K2D^ov$C>xG8^9U+boQ>!OWhG0fj zRrNTgIk5LpLRC~$>U4z8_4CGxpj;C=I!GE&BSxOg0|J2}ntO#Q4MIvR>%<7#9R| ziHjVe45=oB6x17FCRAu(7lcwF?~i3juR~Y8{*(} zVJ_r*S?A+u-d99i8Z>FBno{}+g0T>0r+4y=yw=*IG7==6Xx%A5p{;|c z*`!jf1Ksw}6tiN(@$vBieD^R$C4umW$vxA}6+I}LVC8HK;mWz>hh&fZgDoH4ZeKI8 zkdn=fN{L$qL&LaS^Vk+7C9#o(*7H)hux2o8`6}-s-FA>R5EiKXXqEs76xFP>VNm}* zFwXvYfNwGL2B85%LoHvv$U{t@^)|NGAv?r<^b_JL5D?(q**dvL*mbw9L|?eMe__LCd~4yHXcB7@t0!J%QJp6;NmjgdIa^ct|{T9 zorA*@Bt7Ibf!Vl1uXRj}{AkZ1*bh=0S?4o8*tkHGd>g!jl2F_*(1@8M5_ldkBrpaC zTM+^?o+U*5*F?Y%kzm99GB=gUg+o)QD7G(u3#Lr+X_{ETAaktEi^YY7_{|GgRS=Js zKKK!Xk<&J>dYz!>EN$*GD|S`3x?oB|!sJby3xE;GETu#LdaKq`3(JrlV*f;T=-)f1 z5C2OgqxfhqK5$O8$9%*x99w9t$0u&M(j^si5V><@V zvfd9@k(a@%hq%E*8}>PyN=94j5rRx$sao8z0u;f}v#`ckg4T{hszW!$b0D;}xsgV6 zwdtLL=veq(fPVv1)3IPmDUAGpUB3Z5$Kx|c`9u<(GQXn{C=S6ug#L&s1C65^gb&pV z2Av#n!`gAB4Q3}XmP;AYR=C5rv9`4Ts=*q+D5p5=v?-?xY8^Ilm%cpP^tK$_we)6v~I~fCLso? zoJw$YAFdGNm%^$-oYY{<5Q}gvhvOO_Pl%I1afbbX;_D{{gjGKK{vaOPrAx_qsu({3M1;Mm?@BXi6Qc8fu)s+d@+w7G|(i7p^Aeioy_RAL#ZO9tfDUB!C*`@ zMVq^&vy+gBLsRa6(lRlPfZc&WVsZe&>L6v%(pFGEMoC}ozvW7qo%*=U<2%czhc~aA z)7@203rIG{W~>&_&}nD<-Ri-lqoYYv)3Z3f=->Ujx4*dG%Rd1N9}IH9rE~JA4tccz ztowIUo@iS}npVeX!yuTzB+`hg=z!X$t&{t5`}r(w3$%EEWPd4BxmezWrb2L^*`eAd zg_GRlhJw)0`lpGS-0!pbC$`Y==9evvoX^kT=vBx5iYcGfz__WoJLyz1<&~DXLa06e ztAb1u4DH68`Bsv>XE?qanlrtUuvYg8_K3;M+4eq9O_p z4DJUS?>*huPe)NVprtWc!$YX78rEql4v;|wlD4;;$T3t}AixdiqimK5lycc`D zntBeQ%rQy_GA1-_e+_LJ`Vzq>-lBowyO1F8EK4M+(Z+l-(!N}=%0O~3^say$!CZyM zg7G(WBz(A_b%Zt^L*Z{t-Ga`8^FH8>zon44VSax+c0Eu!GzC8hxt28sFqr)_Ry%eM z%sCV-;HrCZad>KI;}Xo2+1b>4LYf{COw79IZ-~ zmQh(R;0XW+QDj1@ueOZ~ZzX2+!2EF|=5%-fZYWE@j1SV|E0RIiP*pzkMdnRFn1Dgo z;*p4E4;_a1A;4CmJZLIig+zr>W(=mHZU_hoRb$LEGcOM_M)$C2@bK{7i9%4)O~|`Y zp^@0YHQ?u=p3h67cILDltmoTBs4Y^vzU-NL}qxcR0pP|#mk^nX{Hf{ON7 z<`(t(*nCUapO~wA?1ni6H`Lv*nrppILDs5*Xwf6CbT_V|M;&-6Oc9LUpq$p4GzG9L z^Z41=JZ@mwpSi4eqsOBSSFxtJ6@B`4L!9BrT8!SnnvvPnTGz~(*!`Uzb6wqbKwvhtP z3yFwWr*i`LX_{Z7lrrQ zWWA~uw2IHl^>yG8!&#SH{K$Q#G)mLyw)O*Kz8(HCB)P43m5*R#BTG9wr6FxX{D%26 z42MSf6ol3cQnJ`$ml8p^4iCIb2x+J@5OpZm6ud+k340k|fG~h&1HqBtGZfVrB)>e~ znl^ox_jzkfx{iGpcWEDYfkRo*4_!m3J5k$ihtSzJyh)c3dRkl@i#3;`* z>|@|wRI8Hi@Wv4~+Ax4MSSsLZ(3~I)JZZB7n?fmtlmTc4(*W-fi5LXKw7KQ}j6$Tr zBCrFAn30{`&Z>TOE*jruE~7WiJ$I-5blAdbvA@<~y_OiC3Q!K6hVA_2-5$c(V_Ni^XOe0dnTFxQ2M=Vta92|;BWK0^W%c|BEzd! zRK0?l&HXn5lgr9fc6fYX(Wb}YLm)$ejuYbo`3Lz|BF5VL7j<+=8l^Yqr8lLMoAoX? zK4W|WZ=q^qqAJCX0YNRl(HM0Vm6_H4%_PK8^b8FTV=f&p8!E-oSY=rBsa)h}WW;e} z1p6k0QfA3l)6b`ap>q+DM+iOW)68}Adr(Q?AEGqD(SonGT}~5zUYu3{%t37;EZMn(%V)u`a6^;EB_!H7#qYCKyL2tuo|QvzvTz5=fuCL7NEdRu8KR_h1ARK z+qcV~Rf3iQL7}JrT=hkRf>(j1OL*>(wFM~9%a-PoH$T92K~OA2SG}yp;`qjT|0YvH zlRQSVuLcEj$0D5*U$r*EPgsmaU7tJ>k>@nsm^*-9-69;0ntnF%L1Ob5rZrnreY(QF zz@NY#=qs9={P=MXXe0D{C3YkNYf9b)5*#?hm2?%x4Zf1EhMncVCKk&BQNkj#Xwfr6gA z@rx7E$mR!X1^hh5W58cJ@-Fy|o&Y*VcxG&#sm^tx-x@YP($IZDn*rK7gd&Vk1aTAr z0X<>dL(TsFN)4yXJl6Og&wLG*OkCC45!}PZ#)f2mY}@lwiE0nk#uf!1u0DtQgW)J# zL5%k?)2pM(H;VScols?E*g&8R^yEeJIO8n~On_>2^pVPKk}7HpkCZ`u8b4 z@(IV`Z73N8X~Q-L|A2%C!3S=*&?gY@y9lR3E3d*yjo1n&_&+84&+X)kyVRdoRXuRJ zV?i<>=j`BtH6uEOSiq4#iR+rP<3A7y0;hTDGC=w&PY8(@P?GFyoI`LuZ-U4*0qYRQ zec=!yq~eIJ4?mqa;&J-azjNiT_+=4)$tcPrxD89gwM zW7gZhS&kQqUyg~FmlyHya6!Z&6(v>cQ$p3UBVihX@jXQqIMERY+Tr9ZKnP$WocyyG z$d?XGloR|!E6bVb2lrSR_t@%Dw^C!`JTFuVKs6L^q@S4VCFN2z-7j#`QD{M3Mlp(i zd7L>iL9DEy{t%20?2t4Z%?B5@u(I-F)mmc}&Mk`{6L}`V+$>a@iA{$b+Be`QAl!13 z>BSeyFDViOLcT!H6$vqcyak|vy8Gb3#+()n&=e8jUtacc%gikLST)8K-t zXNQB*baVvcZyV(GR%@xF)g$-~Ddijz%Ron{giOlkT8Czd)7l_J!m$D*CQgWh8nMg_ zp$!3oO$-ve!PGr*mLhC=qH3R6B+lfKV8%N8KZRWTHoEjU`>o&tMgRnCO zqkZ1?57^)5yyrXb`}uw@&+~j9z!EqvB%V_lKIm9CTC= zK|VmU!X85o1S2_z-stO-r2}(G@46>Y5}-KvZ*5i`xNV0O5o(#uioJNeDdaf<8u)lK zNuFbZ?d<#_kS4Et1+IosCRP;U=t?hrP1T8=ZRo@Ru`nfB2||Fqo?9=s9tX2;QnU|{ z5t29@K05IbFMCr-??~pJxjcYkWZ#A7lc*?)XVGdMe3Rv&bv!|3C7)PP)!;<=Cc-F# zyOcXnLICCf4(X;Ayn|;7P!}lWF<&DnnIR#~9gKK{+!_dSpz?u}kZ`Rd%mN%#f= zpsvMT&h#9;WYW-5H$D|%O)I>4zo0Y*Z7qI{IBom~tJ=UyZlgH|-isOu><&*^7Bp9K zgD2#v8sKmr?O)qY#xv{HK@0|}F1Y{zyB!#M0o`%!-ADT?la$XQW8pmk4j6vF(3qYf zQ4d%fw-;^Zapncw0}dOm*wSd)fwVg56&(Z~T81-_{329ya&i_J$z3PL6)ub_EJTtj znM}_aa;GC9IaQ<%#{vY}Z**yBdW$q^DwQgG|0{onvTool#8^hDt-8C*N8UeiVg?s! zr0jaIT9{1ztc^(=ezc9x)VWtyMnn%5svNJ@k+Sk8lo&cAVC6Xt!48wMsCY1&fqgU50Tl$z z>#(o0_G1{q5(nD5=<&PUYr>L}v0HBa02=N$VWix~cd9ao)8kwtrj{xW?}=5f$HarZf?+V>BvT4QUXWjo0K3n#r4|+zkc1I- ztqqV8f;6qHu1*$iM<5JF)ne)aB0U4wNQ^*?c+HGNI=iGLEgXxBzeNAp>7`$9W4y{? z;K+&=f^yF6=xV4}5~}NeqC)IOdZxk>0Qo7OchZp}tL$=1kS~2Nb*8F?uzbW34Dl{- zX|bOaFF4$bOpMTk_zy;=7h8r%tr#v~O z3p0HfCO4> z(T6hc!PfWm?NWdG>w>0;@&IIe;_YycJv#m4jEtC|U6HatYhzTp^KLZDK-o_Mtv?lw#-t6XoahcNmow8bI}9UYqvNg0>KlOBFXnC|Ny!gLX6i)<$4 zBNd6Q000p~#EOzwklOGxrQejdf9qb;e_HR>tlg)#4y~@2TqUM=&x}NYg`v~IZ_1`i zSf;t&dN}(_2zcFl?dLX9p?1l`@cTO2CSa+-g5M@!nWhM_B4|h}WW(mV&=>Z+5Jk(* z1Y@i?2?M|`Q3J2VRy7}>cA<*K!ZkV2g#nbQEMm;(KMm``64)@iUTr@i>TeehVp{`* z9>oxVgpv)igwuHEp6GG7cmW1=Xkgn7KF^eTzm$e<$?wEwL`PR*PvkG_@us(SUyh_X zksl6)=DXNfHQ`;mwq+3VK|oP+D@)Tnn|Bm|WXcnswTC`y+3mZX_Il@%4wQL%uAqLz~1`0c7qo18x*YJZ&D zIYMOJ9d~lG
![AV-Comparatives Logo](./images/av-comparatives-logo-3.png) From 3b8b739a0f36bd2b4a2870e2fc851aba40e43dd5 Mon Sep 17 00:00:00 2001 From: Andrea Bichsel <35236577+andreabichsel@users.noreply.github.com> Date: Tue, 6 Nov 2018 10:52:52 -0800 Subject: [PATCH 30/32] Changed procedures in three asr topics. --- .../attack-surface-reduction-exploit-guard.md | 4 +--- .../controlled-folders-exploit-guard.md | 10 +++++++--- .../network-protection-exploit-guard.md | 9 ++++++--- 3 files changed, 14 insertions(+), 9 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md index 5b78a213a9..e577fe1f8c 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md @@ -183,9 +183,7 @@ You can review the Windows event log to see events that are created when an atta 2. Type **Event viewer** in the Start menu to open the Windows Event Viewer. 3. On the left panel, under **Actions**, click **Import custom view...** - - ![Animation showing the import custom view on the Event viewer window](images/events-import.gif) - + 4. Navigate to the Exploit Guard Evaluation Package, and select the file *asr-events.xml*. Alternatively, [copy the XML directly](event-views-exploit-guard.md). 5. Click **OK**. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md index fb5b4091c5..c3e230964e 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md @@ -38,6 +38,12 @@ You can use [audit mode](audit-windows-defender-exploit-guard.md) to evaluate ho Controlled folder access requires enabling [Windows Defender Antivirus real-time protection](../windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md). +## Review controlled folder access events in the Windows Defender ATP Security Center + +Windows Defender ATP provides detailed reporting into events and blocks as part of its [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). + +You can query Windows Defender ATP data by using [Advanced hunting](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection). If you're using [audit mode](audit-windows-defender-exploit-guard.md), you can use Advanced hunting to see how controlled folder access settings would affect your environment if they were enabled. + ## Review controlled folder access events in Windows Event Viewer You can review the Windows event log to see events that are created when controlled folder access blocks (or audits) an app: @@ -47,9 +53,7 @@ You can review the Windows event log to see events that are created when control 2. Type **Event viewer** in the Start menu to open the Windows Event Viewer. 3. On the left panel, under **Actions**, click **Import custom view...**. - - ![Animation showing the import custom view on the Event viewer window](images/events-import.gif) - + 4. Navigate to where you extracted *cfa-events.xml* and select it. Alternatively, [copy the XML directly](event-views-exploit-guard.md). 4. Click **OK**. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md index 934d1154de..639057a7b2 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md @@ -41,6 +41,11 @@ Windows 10 version | Windows Defender Antivirus - | - Windows 10 version 1709 or later | [Windows Defender AV real-time protection](../windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md) and [cloud-delivered protection](../windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md) must be enabled +## Review network protection events in the Windows Defender ATP Security Center + +Windows Defender ATP provides detailed reporting into events and blocks as part of its [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). + +You can query Windows Defender ATP data by using [Advanced hunting](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection). If you're using [audit mode](audit-windows-defender-exploit-guard.md), you can use Advanced hunting to see how network protection settings would affect your environment if they were enabled. ## Review network protection events in Windows Event Viewer @@ -51,9 +56,7 @@ You can review the Windows event log to see events that are created when network 1. Type **Event viewer** in the Start menu to open the Windows Event Viewer. 2. On the left panel, under **Actions**, click **Import custom view...** - - ![Antimation of the import custom view option](images/events-import.gif) - + 3. Navigate to the Exploit Guard Evaluation Package, and select the file *np-events.xml*. Alternatively, [copy the XML directly](event-views-exploit-guard.md). 4. Click **OK**. From 1b87fca48c2174e365378bfc5e13d735c91e516b Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Tue, 6 Nov 2018 11:24:01 -0800 Subject: [PATCH 31/32] added link to ATP --- .../threat-protection/change-history-for-threat-protection.md | 2 +- windows/security/threat-protection/index.md | 2 +- .../threat-protection/intelligence/understanding-malware.md | 2 +- .../collect-diagnostic-data-update-compliance.md | 2 +- .../command-line-arguments-windows-defender-antivirus.md | 2 +- ...iguration-management-reference-windows-defender-antivirus.md | 2 +- .../configure-advanced-scan-types-windows-defender-antivirus.md | 2 +- ...configure-block-at-first-sight-windows-defender-antivirus.md | 2 +- ...ure-cloud-block-timeout-period-windows-defender-antivirus.md | 2 +- ...configure-end-user-interaction-windows-defender-antivirus.md | 2 +- .../configure-exclusions-windows-defender-antivirus.md | 2 +- ...gure-extension-file-exclusions-windows-defender-antivirus.md | 2 +- ...nfigure-local-policy-overrides-windows-defender-antivirus.md | 2 +- .../configure-network-connections-windows-defender-antivirus.md | 2 +- .../configure-notifications-windows-defender-antivirus.md | 2 +- ...process-opened-file-exclusions-windows-defender-antivirus.md | 2 +- .../configure-protection-features-windows-defender-antivirus.md | 2 +- ...configure-real-time-protection-windows-defender-antivirus.md | 2 +- .../configure-remediation-windows-defender-antivirus.md | 2 +- .../configure-server-exclusions-windows-defender-antivirus.md | 2 +- .../configure-windows-defender-antivirus-features.md | 2 +- ...ize-run-review-remediate-scans-windows-defender-antivirus.md | 2 +- .../deploy-manage-report-windows-defender-antivirus.md | 2 +- .../deploy-windows-defender-antivirus.md | 2 +- .../deployment-vdi-windows-defender-antivirus.md | 2 +- ...lock-potentially-unwanted-apps-windows-defender-antivirus.md | 2 +- .../enable-cloud-protection-windows-defender-antivirus.md | 2 +- .../evaluate-windows-defender-antivirus.md | 2 +- .../limited-periodic-scanning-windows-defender-antivirus.md | 2 +- .../manage-event-based-updates-windows-defender-antivirus.md | 2 +- .../manage-outdated-endpoints-windows-defender-antivirus.md | 2 +- ...age-protection-update-schedule-windows-defender-antivirus.md | 2 +- .../manage-protection-updates-windows-defender-antivirus.md | 2 +- .../manage-updates-baselines-windows-defender-antivirus.md | 2 +- ...age-updates-mobile-devices-vms-windows-defender-antivirus.md | 2 +- .../prevent-end-user-interaction-windows-defender-antivirus.md | 2 +- .../report-monitor-windows-defender-antivirus.md | 2 +- .../restore-quarantined-files-windows-defender-antivirus.md | 2 +- .../review-scan-results-windows-defender-antivirus.md | 2 +- .../run-scan-windows-defender-antivirus.md | 2 +- .../scheduled-catch-up-scans-windows-defender-antivirus.md | 2 +- ...specify-cloud-protection-level-windows-defender-antivirus.md | 2 +- .../windows-defender-antivirus/troubleshoot-reporting.md | 2 +- .../troubleshoot-windows-defender-antivirus.md | 2 +- .../use-group-policy-windows-defender-antivirus.md | 2 +- .../use-intune-config-manager-windows-defender-antivirus.md | 2 +- .../use-powershell-cmdlets-windows-defender-antivirus.md | 2 +- .../use-wmi-windows-defender-antivirus.md | 2 +- ...ize-microsoft-cloud-protection-windows-defender-antivirus.md | 2 +- .../windows-defender-antivirus-compatibility.md | 2 +- .../windows-defender-antivirus-in-windows-10.md | 2 +- .../windows-defender-antivirus-on-windows-server-2016.md | 2 +- .../windows-defender-antivirus/windows-defender-offline.md | 2 +- .../windows-defender-security-center-antivirus.md | 2 +- .../configure-wd-app-guard.md | 2 +- .../windows-defender-application-guard/faq-wd-app-guard.md | 2 +- .../windows-defender-application-guard/install-wd-app-guard.md | 2 +- .../windows-defender-application-guard/reqs-wd-app-guard.md | 2 +- .../test-scenarios-wd-app-guard.md | 2 +- .../windows-defender-application-guard/wd-app-guard-overview.md | 2 +- ...nced-features-windows-defender-advanced-threat-protection.md | 2 +- ...est-practices-windows-defender-advanced-threat-protection.md | 2 +- ...ing-reference-windows-defender-advanced-threat-protection.md | 2 +- .../alerts-queue-windows-defender-advanced-threat-protection.md | 2 +- ...ortal-mapping-windows-defender-advanced-threat-protection.md | 2 +- ...portal-access-windows-defender-advanced-threat-protection.md | 2 +- ...k-simulations-windows-defender-advanced-threat-protection.md | 2 +- ...c-permissions-windows-defender-advanced-threat-protection.md | 2 +- .../block-file-windows-defender-advanced-threat-protection.md | 2 +- ...sensor-status-windows-defender-advanced-threat-protection.md | 2 +- ...ation-package-windows-defender-advanced-threat-protection.md | 2 +- .../community-windows-defender-advanced-threat-protection.md | 2 +- ...tional-access-windows-defender-advanced-threat-protection.md | 2 +- ...gure-arcsight-windows-defender-advanced-threat-protection.md | 2 +- ...tional-access-windows-defender-advanced-threat-protection.md | 2 +- ...notifications-windows-defender-advanced-threat-protection.md | 2 +- ...-endpoints-gp-windows-defender-advanced-threat-protection.md | 2 +- ...endpoints-mdm-windows-defender-advanced-threat-protection.md | 2 +- ...s-non-windows-windows-defender-advanced-threat-protection.md | 2 +- ...ndpoints-sccm-windows-defender-advanced-threat-protection.md | 2 +- ...points-script-windows-defender-advanced-threat-protection.md | 2 +- ...ure-endpoints-windows-defender-advanced-threat-protection.md | 2 +- ...-mssp-support-windows-defender-advanced-threat-protection.md | 2 +- ...roxy-internet-windows-defender-advanced-threat-protection.md | 2 +- ...ver-endpoints-windows-defender-advanced-threat-protection.md | 2 +- ...onfigure-siem-windows-defender-advanced-threat-protection.md | 2 +- ...figure-splunk-windows-defender-advanced-threat-protection.md | 2 +- .../windows-defender-atp/custom-detection-rules.md | 2 +- ...custom-ti-api-windows-defender-advanced-threat-protection.md | 2 +- ...tion-settings-windows-defender-advanced-threat-protection.md | 2 +- ...orage-privacy-windows-defender-advanced-threat-protection.md | 2 +- ...compatibility-windows-defender-advanced-threat-protection.md | 2 +- ...ble-custom-ti-windows-defender-advanced-threat-protection.md | 2 +- ...-secure-score-windows-defender-advanced-threat-protection.md | 2 +- ...m-integration-windows-defender-advanced-threat-protection.md | 2 +- .../threat-protection/windows-defender-atp/evaluate-atp.md | 2 +- ...t-error-codes-windows-defender-advanced-threat-protection.md | 2 +- ...ent-custom-ti-windows-defender-advanced-threat-protection.md | 2 +- .../exposed-apis-windows-defender-advanced-threat-protection.md | 2 +- ...ne-info-by-ip-windows-defender-advanced-threat-protection.md | 2 +- ...alhty-sensors-windows-defender-advanced-threat-protection.md | 2 +- ...r-information-windows-defender-advanced-threat-protection.md | 2 +- ...elated-alerts-windows-defender-advanced-threat-protection.md | 2 +- ...rt-info-by-id-windows-defender-advanced-threat-protection.md | 2 +- ...ed-actor-info-windows-defender-advanced-threat-protection.md | 2 +- ...d-domain-info-windows-defender-advanced-threat-protection.md | 2 +- ...ed-files-info-windows-defender-advanced-threat-protection.md | 2 +- ...lated-ip-info-windows-defender-advanced-threat-protection.md | 2 +- ...-machine-info-windows-defender-advanced-threat-protection.md | 2 +- ...ted-user-info-windows-defender-advanced-threat-protection.md | 2 +- .../get-alerts-windows-defender-advanced-threat-protection.md | 2 +- ...ap-collection-windows-defender-advanced-threat-protection.md | 2 +- ...elated-alerts-windows-defender-advanced-threat-protection.md | 2 +- ...ated-machines-windows-defender-advanced-threat-protection.md | 2 +- ...in-statistics-windows-defender-advanced-threat-protection.md | 2 +- ...e-information-windows-defender-advanced-threat-protection.md | 2 +- ...elated-alerts-windows-defender-advanced-threat-protection.md | 2 +- ...ated-machines-windows-defender-advanced-threat-protection.md | 2 +- ...le-statistics-windows-defender-advanced-threat-protection.md | 2 +- ...ns-collection-windows-defender-advanced-threat-protection.md | 2 +- ...action-object-windows-defender-advanced-threat-protection.md | 2 +- ...ns-collection-windows-defender-advanced-threat-protection.md | 2 +- ...elated-alerts-windows-defender-advanced-threat-protection.md | 2 +- ...ip-statistics-windows-defender-advanced-threat-protection.md | 2 +- ...fo-collection-windows-defender-advanced-threat-protection.md | 2 +- ...machine-by-id-windows-defender-advanced-threat-protection.md | 2 +- ...-log-on-users-windows-defender-advanced-threat-protection.md | 2 +- ...elated-alerts-windows-defender-advanced-threat-protection.md | 2 +- ...action-object-windows-defender-advanced-threat-protection.md | 2 +- ...ns-collection-windows-defender-advanced-threat-protection.md | 2 +- ...ps-collection-windows-defender-advanced-threat-protection.md | 2 +- .../get-machines-windows-defender-advanced-threat-protection.md | 2 +- ...es-collection-windows-defender-advanced-threat-protection.md | 2 +- ...ckage-sas-uri-windows-defender-advanced-threat-protection.md | 2 +- .../threat-protection/windows-defender-atp/get-started.md | 2 +- ...r-information-windows-defender-advanced-threat-protection.md | 2 +- ...elated-alerts-windows-defender-advanced-threat-protection.md | 2 +- ...ated-machines-windows-defender-advanced-threat-protection.md | 2 +- .../threat-protection/windows-defender-atp/incidents-queue.md | 2 +- ...tigate-alerts-windows-defender-advanced-threat-protection.md | 2 +- ...tigate-domain-windows-defender-advanced-threat-protection.md | 2 +- ...stigate-files-windows-defender-advanced-threat-protection.md | 2 +- ...ate-incidents-windows-defender-advanced-threat-protection.md | 2 +- ...nvestigate-ip-windows-defender-advanced-threat-protection.md | 2 +- ...gate-machines-windows-defender-advanced-threat-protection.md | 2 +- ...estigate-user-windows-defender-advanced-threat-protection.md | 2 +- ...s-ip-seen-org-windows-defender-advanced-threat-protection.md | 2 +- ...olate-machine-windows-defender-advanced-threat-protection.md | 2 +- .../licensing-windows-defender-advanced-threat-protection.md | 2 +- ...achine-groups-windows-defender-advanced-threat-protection.md | 2 +- ...view-overview-windows-defender-advanced-threat-protection.md | 2 +- ...manage-alerts-windows-defender-advanced-threat-protection.md | 2 +- ...-blocked-list-windows-defender-advanced-threat-protection.md | 2 +- ...-file-uploads-windows-defender-advanced-threat-protection.md | 2 +- ...er-exclusions-windows-defender-advanced-threat-protection.md | 2 +- ...age-incidents-windows-defender-advanced-threat-protection.md | 2 +- ...ression-rules-windows-defender-advanced-threat-protection.md | 2 +- .../threat-protection/windows-defender-atp/management-apis.md | 2 +- .../windows-defender-atp/microsoft-cloud-app-security-config.md | 2 +- .../microsoft-cloud-app-security-integration.md | 2 +- ...-requirements-windows-defender-advanced-threat-protection.md | 2 +- .../mssp-support-windows-defender-advanced-threat-protection.md | 2 +- ...oard-machines-windows-defender-advanced-threat-protection.md | 2 +- ...ard-configure-windows-defender-advanced-threat-protection.md | 2 +- ...ard-downlevel-windows-defender-advanced-threat-protection.md | 2 +- .../security/threat-protection/windows-defender-atp/onboard.md | 2 +- .../windows-defender-atp/overview-attack-surface-reduction.md | 2 +- .../windows-defender-atp/overview-custom-detections.md | 2 +- .../overview-endpoint-detection-response.md | 2 +- .../windows-defender-atp/overview-hardware-based-isolation.md | 2 +- ...rview-hunting-windows-defender-advanced-threat-protection.md | 2 +- ...-secure-score-windows-defender-advanced-threat-protection.md | 2 +- .../security/threat-protection/windows-defender-atp/overview.md | 2 +- ...rtal-overview-windows-defender-advanced-threat-protection.md | 2 +- ...werbi-reports-windows-defender-advanced-threat-protection.md | 2 +- ...-example-code-windows-defender-advanced-threat-protection.md | 2 +- ...erences-setup-windows-defender-advanced-threat-protection.md | 2 +- ...view-settings-windows-defender-advanced-threat-protection.md | 2 +- .../preview-windows-defender-advanced-threat-protection.md | 2 +- ...sing-rest-api-windows-defender-advanced-threat-protection.md | 2 +- ...-example-code-windows-defender-advanced-threat-protection.md | 2 +- .../rbac-windows-defender-advanced-threat-protection.md | 2 +- ...equest-sample-windows-defender-advanced-threat-protection.md | 2 +- ...d-file-alerts-windows-defender-advanced-threat-protection.md | 2 +- ...achine-alerts-windows-defender-advanced-threat-protection.md | 2 +- ...ponse-actions-windows-defender-advanced-threat-protection.md | 2 +- ...ode-execution-windows-defender-advanced-threat-protection.md | 2 +- .../run-av-scan-windows-defender-advanced-threat-protection.md | 2 +- ...etection-test-windows-defender-advanced-threat-protection.md | 2 +- ...ore-dashboard-windows-defender-advanced-threat-protection.md | 2 +- ...ons-dashboard-windows-defender-advanced-threat-protection.md | 2 +- ...ervice-status-windows-defender-advanced-threat-protection.md | 2 +- ...arantine-file-windows-defender-advanced-threat-protection.md | 2 +- ...upported-apis-windows-defender-advanced-threat-protection.md | 2 +- ...response-apis-windows-defender-advanced-threat-protection.md | 2 +- ...ics-dashboard-windows-defender-advanced-threat-protection.md | 2 +- .../threat-protection/windows-defender-atp/threat-analytics.md | 2 +- ...ator-concepts-windows-defender-advanced-threat-protection.md | 2 +- .../windows-defender-atp/threat-protection-integration.md | 2 +- ...time-settings-windows-defender-advanced-threat-protection.md | 2 +- ...oot-custom-ti-windows-defender-advanced-threat-protection.md | 2 +- ...rror-messages-windows-defender-advanced-threat-protection.md | 2 +- ...ot-onboarding-windows-defender-advanced-threat-protection.md | 2 +- ...bleshoot-siem-windows-defender-advanced-threat-protection.md | 2 +- .../unblock-file-windows-defender-advanced-threat-protection.md | 2 +- ...olate-machine-windows-defender-advanced-threat-protection.md | 2 +- ...ode-execution-windows-defender-advanced-threat-protection.md | 2 +- ...use-custom-ti-windows-defender-advanced-threat-protection.md | 2 +- .../use-windows-defender-advanced-threat-protection.md | 2 +- .../user-roles-windows-defender-advanced-threat-protection.md | 2 +- .../windows-defender-atp/view-incidents-queue.md | 2 +- .../attack-surface-reduction-exploit-guard.md | 2 +- .../audit-windows-defender-exploit-guard.md | 2 +- .../collect-cab-files-exploit-guard-submission.md | 2 +- .../controlled-folders-exploit-guard.md | 2 +- .../customize-attack-surface-reduction.md | 2 +- .../customize-controlled-folders-exploit-guard.md | 2 +- .../customize-exploit-protection.md | 2 +- .../emet-exploit-protection-exploit-guard.md | 2 +- .../enable-attack-surface-reduction.md | 2 +- .../enable-controlled-folders-exploit-guard.md | 2 +- .../windows-defender-exploit-guard/enable-exploit-protection.md | 2 +- .../windows-defender-exploit-guard/enable-network-protection.md | 2 +- .../enable-virtualization-based-protection-of-code-integrity.md | 2 +- .../evaluate-attack-surface-reduction.md | 2 +- .../evaluate-controlled-folder-access.md | 2 +- .../evaluate-exploit-protection.md | 2 +- .../evaluate-network-protection.md | 2 +- .../windows-defender-exploit-guard/event-views-exploit-guard.md | 2 +- .../exploit-protection-exploit-guard.md | 2 +- .../import-export-exploit-protection-emet-xml.md | 2 +- .../windows-defender-exploit-guard/memory-integrity.md | 2 +- .../network-protection-exploit-guard.md | 2 +- ...nes-for-virtualization-based-protection-of-code-integrity.md | 2 +- .../windows-defender-exploit-guard/troubleshoot-asr.md | 2 +- .../troubleshoot-exploit-protection-mitigations.md | 2 +- .../windows-defender-exploit-guard/troubleshoot-np.md | 2 +- .../windows-defender-exploit-guard.md | 2 +- 238 files changed, 238 insertions(+), 238 deletions(-) diff --git a/windows/security/threat-protection/change-history-for-threat-protection.md b/windows/security/threat-protection/change-history-for-threat-protection.md index dfa28ec177..c318406475 100644 --- a/windows/security/threat-protection/change-history-for-threat-protection.md +++ b/windows/security/threat-protection/change-history-for-threat-protection.md @@ -1,5 +1,5 @@ --- -title: Change history for Windows Defender Advanced Threat Protection (Windows Defender ATP) +title: Change history for [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) description: This topic lists new and updated topics in the WWindows Defender ATP content set. ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/index.md b/windows/security/threat-protection/index.md index 090b0c62f7..a83dc7afac 100644 --- a/windows/security/threat-protection/index.md +++ b/windows/security/threat-protection/index.md @@ -13,7 +13,7 @@ ms.date: 10/04/2018 --- # Threat Protection -Windows Defender Advanced Threat Protection (Windows Defender ATP) is a unified platform for preventative protection, post-breach detection, automated investigation, and response. Windows Defender ATP protects endpoints from cyber threats; detects advanced attacks and data breaches, automates security incidents and improves security posture. +[Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) is a unified platform for preventative protection, post-breach detection, automated investigation, and response. Windows Defender ATP protects endpoints from cyber threats; detects advanced attacks and data breaches, automates security incidents and improves security posture.

Windows Defender ATP

diff --git a/windows/security/threat-protection/intelligence/understanding-malware.md b/windows/security/threat-protection/intelligence/understanding-malware.md index 5daf338deb..2f819e06b0 100644 --- a/windows/security/threat-protection/intelligence/understanding-malware.md +++ b/windows/security/threat-protection/intelligence/understanding-malware.md @@ -16,7 +16,7 @@ Malware is a term used to describe malicious applications and code that can caus Cybercriminals that distribute malware are often motivated by money and will use infected computers to launch attacks, obtain banking credentials, collect information that can be sold, sell access to computing resources, or extort payment from victims. -As criminals become more sophisticated with their attacks, Microsoft is here to help. Windows 10 is the most secure version of Windows yet and includes many features to help protect you whether you're at home, at work, or on the go. With Windows Defender Advanced Threat Protection (Windows Defender ATP), businesses can stay protected with next-generation protection and other security capabilities. +As criminals become more sophisticated with their attacks, Microsoft is here to help. Windows 10 is the most secure version of Windows yet and includes many features to help protect you whether you're at home, at work, or on the go. With [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf), businesses can stay protected with next-generation protection and other security capabilities. For good general tips, check out the [prevent malware infection](prevent-malware-infection.md) topic. diff --git a/windows/security/threat-protection/windows-defender-antivirus/collect-diagnostic-data-update-compliance.md b/windows/security/threat-protection/windows-defender-antivirus/collect-diagnostic-data-update-compliance.md index 2e776ea30d..06978674b3 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/collect-diagnostic-data-update-compliance.md +++ b/windows/security/threat-protection/windows-defender-antivirus/collect-diagnostic-data-update-compliance.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) This topic describes how to collect diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues you may encounter when using the Windows Defender AV Assessment section in the Update Compliance add-in. diff --git a/windows/security/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md index 5544020384..cad1984faf 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) You can perform various Windows Defender Antivirus functions with the dedicated command-line tool mpcmdrun.exe. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md index c11220d5fc..2af6cfcbc3 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) You can manage and configure Windows Defender Antivirus with the following tools: diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md index a1880dbc92..b916b9c91e 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md @@ -19,7 +19,7 @@ ms.date: 10/25/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) **Use Microsoft Intune to configure scanning options** diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md index 47b577521b..8f34c26265 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Block at first sight is a feature of next gen protection that provides a way to detect and block new malware within seconds. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus.md index c4712bd823..e78a18862c 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) When Windows Defender Antivirus finds a suspicious file, it can prevent the file from running while it queries the [Windows Defender Antivirus cloud service](utilize-microsoft-cloud-protection-windows-defender-antivirus.md). diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-end-user-interaction-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-end-user-interaction-windows-defender-antivirus.md index a4e4d1798a..f467dac2b6 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-end-user-interaction-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-end-user-interaction-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) You can configure how users of the endpoints on your network can interact with Windows Defender Antivirus. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md index 05da87967e..ca5c66c4f2 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) You can exclude certain files, folders, processes, and process-opened files from Windows Defender Antivirus scans. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md index 7dc4b3d1f6..8292217735 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) You can exclude certain files from Windows Defender Antivirus scans by modifying exclusion lists. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus.md index e948b58760..833abbcaff 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) By default, Windows Defender Antivirus settings that are deployed via a Group Policy Object to the endpoints in your network will prevent users from locally changing the settings. You can change this in some instances. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md index e993bcf60f..922fb0f10d 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 10/08/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) To ensure Windows Defender Antivirus cloud-delivered protection works properly, you need to configure your network to allow connections between your endpoints and certain Microsoft servers. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus.md index d6806de77b..8a98cffbc7 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) In Windows 10, application notifications about malware detection and remediation are more robust, consistent, and concise. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md index 268fccc556..320078778c 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) You can exclude files that have been opened by specific processes from Windows Defender Antivirus scans. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-protection-features-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-protection-features-windows-defender-antivirus.md index 61d9ada7c2..acb2c79bcf 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-protection-features-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-protection-features-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Windows Defender Antivirus uses several methods to provide threat protection: diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md index 72d4740064..801b935d4e 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Always-on protection consists of real-time protection, behavior monitoring, and heuristics to identify malware based on known suspicious and malicious activities. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md index d14d383af2..35159b5198 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) When Windows Defender Antivirus runs a scan, it will attempt to remediate or remove threats that it finds. You can configure how Windows Defender Antivirus should react to certain threats, whether it should create a restore point before remediating, and when it should remove remediated threats. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md index 497772dfde..d7c05e739f 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Windows Defender Antivirus on Windows Server 2016 computers automatically enrolls you in certain exclusions, as defined by your specified server role. See [the end of this topic](#list-of-automatic-exclusions) for a list of these exclusions. diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features.md b/windows/security/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features.md index 03b6bf2fc1..1451728ecf 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) You can configure Windows Defender Antivirus with a number of tools, including: diff --git a/windows/security/threat-protection/windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md index fd8a577fc1..ae4eee36d6 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) You can use Group Policy, PowerShell, and Windows Management Instrumentation (WMI) to configure Windows Defender Antivirus scans. diff --git a/windows/security/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md index 6d27b50ff2..38147632bc 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) You can deploy, manage, and report on Windows Defender Antivirus in a number of ways. diff --git a/windows/security/threat-protection/windows-defender-antivirus/deploy-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/deploy-windows-defender-antivirus.md index 6efcc0eeef..59b048bfda 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/deploy-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/deploy-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Depending on the management tool you are using, you may need to specifically enable or configure Windows Defender Antivirus protection. diff --git a/windows/security/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md index d330eff104..781b5ba5d5 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) In addition to standard on-premises or hardware configurations, you can also use Windows Defender Antivirus in a remote desktop (RDS) or virtual desktop infrastructure (VDI) environment. diff --git a/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md index b149805427..475e161a65 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 10/02/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) The potentially unwanted application (PUA) protection feature in Windows Defender Antivirus can identify and block PUAs from downloading and installing on endpoints in your network. diff --git a/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md index 660a9ce1eb..bc76dcf3d8 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) >[!NOTE] >The Windows Defender Antivirus cloud service is a mechanism for delivering updated protection to your network and endpoints. Although it is called a cloud service, it is not simply protection for files stored in the cloud; rather, it uses distributed resources and machine learning to deliver protection to your endpoints at a rate that is far faster than traditional signature updates. diff --git a/windows/security/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus.md index 743d2497f8..e40b93abd1 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Use this guide to determine how well Windows Defender Antivirus protects you from viruses, malware, and potentially unwanted applications. diff --git a/windows/security/threat-protection/windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus.md index 942585308e..923a59f0ba 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus.md @@ -20,7 +20,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Limited periodic scanning is a special type of threat detection and remediation that can be enabled when you have installed another antivirus product on a Windows 10 device. diff --git a/windows/security/threat-protection/windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus.md index cae61f23dc..6b53608726 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Windows Defender Antivirus allows you to determine if updates should (or should not) occur after certain events, such as at startup or after receiving specific reports from the cloud-delivered protection service. diff --git a/windows/security/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus.md index 6bc628a553..7639c8e05b 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Windows Defender Antivirus lets you define how long an endpoint can avoid an update or how many scans it can miss before it is required to update and scan itself. This is especially useful in environments where devices are not often connected to a corporate or external network, or devices that are not used on a daily basis. diff --git a/windows/security/threat-protection/windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus.md index adec043210..bb3a6e46d7 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Windows Defender Antivirus lets you determine when it should look for and download updates. diff --git a/windows/security/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus.md index 4d2fb15044..24e05dd41a 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus.md index 8fb1e91905..c1d9aad15b 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) There are two types of updates related to keeping Windows Defender Antivirus up to date: 1. Protection updates diff --git a/windows/security/threat-protection/windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus.md index ee85e54424..4ea81cd37f 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Mobile devices and VMs may require additional configuration to ensure performance is not impacted by updates. diff --git a/windows/security/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus.md index eeb27d5a8f..880d56c9e3 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) You can use Group Policy to prevent users on endpoints from seeing the Windows Defender Antivirus interface. You can also prevent them from pausing scans. diff --git a/windows/security/threat-protection/windows-defender-antivirus/report-monitor-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/report-monitor-windows-defender-antivirus.md index ccf84b466b..efa0d8b522 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/report-monitor-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/report-monitor-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) There are a number of ways you can review protection status and alerts, depending on the management tool you are using for Windows Defender Antivirus. diff --git a/windows/security/threat-protection/windows-defender-antivirus/restore-quarantined-files-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/restore-quarantined-files-windows-defender-antivirus.md index adc59b2fe8..569d88a51c 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/restore-quarantined-files-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/restore-quarantined-files-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) If Windows Defender Antivirus is configured to detect and remediate threats on your device, Windows Defender Antivirus quarantines suspicious files. If you are certain these files do not present a threat, you can restore them. diff --git a/windows/security/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus.md index 5ffb2c076c..c75f970b7b 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) After an Windows Defender Antivirus scan completes, whether it is an [on-demand](run-scan-windows-defender-antivirus.md) or [scheduled scan](scheduled-catch-up-scans-windows-defender-antivirus.md), the results are recorded and you can view the results. diff --git a/windows/security/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus.md index 92f95ad535..7f0a6d6037 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) You can run an on-demand scan on individual endpoints. These scans will start immediately, and you can define parameters for the scan, such as the location or type. diff --git a/windows/security/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md index ae3d1249f9..d62ac289fe 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) > [!NOTE] > By default, Windows Defender Antivirus checks for an update 15 minutes before the time of any scheduled scans. You can [Manage the schedule for when protection updates should be downloaded and applied](manage-protection-update-schedule-windows-defender-antivirus.md) to override this default. diff --git a/windows/security/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus.md index df9e3937bc..fe11787198 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) You can specify the level of cloud-protection offered by Windows Defender Antivirus with Group Policy and System Center Configuration Manager. diff --git a/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-reporting.md b/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-reporting.md index 28d9cb0243..d1ae21771c 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-reporting.md +++ b/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-reporting.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) When you use [Windows Analytics Update Compliance to obtain reporting into the protection status of machines or endpoints](/windows/deployment/update/update-compliance-using#wdav-assessment) in your network that are using Windows Defender Antivirus, you may encounter problems or issues. diff --git a/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus.md index a40df9b551..d23df5b8f1 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/11/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) If you encounter a problem with Windows Defender Antivirus, you can search the tables in this topic to find a matching issue and potential solution. diff --git a/windows/security/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md index e5cfbb322b..6581b10ed3 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) You can use [Group Policy](https://msdn.microsoft.com/library/ee663280(v=vs.85).aspx) to configure and manage Windows Defender Antivirus on your endpoints. diff --git a/windows/security/threat-protection/windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md index d453a5b349..89cf104935 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) If you are using System Center Configuration Manager or Microsoft Intune to manage the endpoints on your network, you can also use them to manage Windows Defender Antivirus scans. diff --git a/windows/security/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md index 8501bb8163..25ca31aa0a 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) You can use PowerShell to perform various functions in Windows Defender. Similar to the command prompt or command line, PowerShell is a task-based command-line shell and scripting language designed especially for system administration, and you can read more about it at the [PowerShell hub on MSDN](https://msdn.microsoft.com/powershell/mt173057.aspx). diff --git a/windows/security/threat-protection/windows-defender-antivirus/use-wmi-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/use-wmi-windows-defender-antivirus.md index e0542aea06..0ae7bc9771 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/use-wmi-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/use-wmi-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Windows Management Instrumentation (WMI) is a scripting interface that allows you to retrieve, modify, and update settings. diff --git a/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus.md index 3c436236fe..aebdd79b52 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Microsoft next-gen technologies in Windows Defender Antivirus provide near-instant, automated protection against new and emerging threats. To dynamically identify new threats, these technologies work with large sets of interconnected data in the Microsoft Intelligent Security Graph and powerful artificial intelligence (AI) systems driven by advanced machine learning models. diff --git a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md index 406a5296f8..97655419cf 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md +++ b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Windows Defender Antivirus is automatically enabled and installed on endpoints and devices that are running Windows 10. diff --git a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md index ee54572b4c..7e7820edbb 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md +++ b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Windows Defender Antivirus is a built-in antimalware solution that provides next generation protection for desktops, portable computers, and servers. diff --git a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md index 729d413d7f..e0ce8b36b5 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md +++ b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Windows Defender Antivirus is available on Windows Server 2016. In some instances it is referred to as Endpoint Protection - however, the protection engine is the same. diff --git a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-offline.md b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-offline.md index 3304f1be1d..b705e33977 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-offline.md +++ b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-offline.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Windows Defender Offline is an antimalware scanning tool that lets you boot and run a scan from a trusted environment. The scan runs from outside the normal Windows kernel so it can target malware that attempts to bypass the Windows shell, such as viruses and rootkits that infect or overwrite the master boot record (MBR). diff --git a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus.md index e296c871c2..ca5529dfa1 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus.md @@ -18,7 +18,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) In Windows 10, version 1703 and later, the Windows Defender app is part of the Windows Security. diff --git a/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md index 026ca31daa..3579ace8b1 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md @@ -13,7 +13,7 @@ ms.date: 10/17/2017 # Configure Windows Defender Application Guard policy settings -**Applies to:** Windows Defender Advanced Threat Protection (Windows Defender ATP) +**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Windows Defender Application Guard (Application Guard) works with Group Policy to help you manage your organization's computer settings. By using Group Policy, you can configure a setting once, and then copy it onto many computers. For example, you can set up multiple security settings in a GPO, which is linked to a domain, and then apply all those settings to every computer in the domain. diff --git a/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md index 06a0ab7b13..0c72267505 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md @@ -13,7 +13,7 @@ ms.date: 11/07/2017 # Frequently asked questions - Windows Defender Application Guard -**Applies to:** Windows Defender Advanced Threat Protection (Windows Defender ATP) +**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Answering frequently asked questions about Windows Defender Application Guard (Application Guard) features, integration with the Windows operating system, and general configuration. diff --git a/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard.md index 11d81398e4..bcc683e524 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard.md @@ -14,7 +14,7 @@ ms.date: 10/19/2017 # Prepare to install Windows Defender Application Guard **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) ## Review system requirements diff --git a/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md index e60978932b..72eb82edac 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md @@ -13,7 +13,7 @@ ms.date: 11/09/2017 # System requirements for Windows Defender Application Guard -**Applies to:** Windows Defender Advanced Threat Protection (Windows Defender ATP) +**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) The threat landscape is continually evolving. While hackers are busy developing new techniques to breach enterprise networks by compromising workstations, phishing schemes remain one of the top ways to lure employees into social engineering attacks. Windows Defender Application Guard is designed to help prevent old, and newly emerging attacks, to help keep employees productive. diff --git a/windows/security/threat-protection/windows-defender-application-guard/test-scenarios-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/test-scenarios-wd-app-guard.md index e7f9fe2f97..511904d283 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/test-scenarios-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/test-scenarios-wd-app-guard.md @@ -14,7 +14,7 @@ ms.date: 10/16/2018 # Application Guard testing scenarios -**Applies to:** Windows Defender Advanced Threat Protection (Windows Defender ATP) +**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) We've come up with a list of scenarios that you can use to test hardware-based isolation in your organization. diff --git a/windows/security/threat-protection/windows-defender-application-guard/wd-app-guard-overview.md b/windows/security/threat-protection/windows-defender-application-guard/wd-app-guard-overview.md index de2039986d..b4f08ff71c 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/wd-app-guard-overview.md +++ b/windows/security/threat-protection/windows-defender-application-guard/wd-app-guard-overview.md @@ -13,7 +13,7 @@ ms.date: 09/07/2018 # Windows Defender Application Guard overview -**Applies to:** Windows Defender Advanced Threat Protection (Windows Defender ATP) +**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Windows Defender Application Guard (Application Guard) is designed to help prevent old and newly emerging attacks to help keep employees productive. Using our unique hardware isolation approach, our goal is to destroy the playbook that attackers use by rendering current attack methods obsolete. diff --git a/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md index 0e82c47568..b887fd19b7 100644 --- a/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.date: 09/28/2018 # Configure advanced features in Windows Defender ATP **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedfeats-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md index d215d46fec..046e911ac9 100644 --- a/windows/security/threat-protection/windows-defender-atp/advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md @@ -19,7 +19,7 @@ ms.date: 04/24/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/advanced-hunting-reference-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/advanced-hunting-reference-windows-defender-advanced-threat-protection.md index f12506e54b..dcda5f43d8 100644 --- a/windows/security/threat-protection/windows-defender-atp/advanced-hunting-reference-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/advanced-hunting-reference-windows-defender-advanced-threat-protection.md @@ -19,7 +19,7 @@ ms.date: 06/01/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md index cc70b589cc..182eacc7b7 100644 --- a/windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.date: 04/24/2018 # View and organize the Windows Defender Advanced Threat Protection Alerts queue **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md index 385dfdea3a..421206a7f9 100644 --- a/windows/security/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md @@ -19,7 +19,7 @@ ms.date: 10/16/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md index 0bd1a15c11..700bbaef2b 100644 --- a/windows/security/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md @@ -19,7 +19,7 @@ ms.date: 09/03/2018 **Applies to:** - Azure Active Directory - Office 365 -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-assignaccess-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/attack-simulations-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/attack-simulations-windows-defender-advanced-threat-protection.md index ab1b1ae399..f54267ebfe 100644 --- a/windows/security/threat-protection/windows-defender-atp/attack-simulations-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/attack-simulations-windows-defender-advanced-threat-protection.md @@ -19,7 +19,7 @@ ms.date: 28/02/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/basic-permissions-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/basic-permissions-windows-defender-advanced-threat-protection.md index 9835695e87..11611c7741 100644 --- a/windows/security/threat-protection/windows-defender-atp/basic-permissions-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/basic-permissions-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 09/13/2018 **Applies to:** - Azure Active Directory -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-basicaccess-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md index 077304ed7f..16ae492cd3 100644 --- a/windows/security/threat-protection/windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md index c2b79d845d..4b525298cf 100644 --- a/windows/security/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.date: 04/24/2018 # Check sensor health state in Windows Defender ATP **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection.md index 278068d40a..f6394dc5a6 100644 --- a/windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection.md index 4221621c34..4561797028 100644 --- a/windows/security/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 04/24/2018 # Access the Windows Defender ATP Community Center **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md index 72d6473f97..4e24ca1381 100644 --- a/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.date: 04/24/2018 # Enable conditional access to better protect users, devices, and data **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md index fabaf74f07..b3d5cbfb91 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md @@ -19,7 +19,7 @@ ms.date: 10/16/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-conditional-access-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-conditional-access-windows-defender-advanced-threat-protection.md index eae78c84fa..2c223e0718 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-conditional-access-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-conditional-access-windows-defender-advanced-threat-protection.md @@ -16,7 +16,7 @@ ms.date: 09/03/2018 # Configure conditional access in Windows Defender ATP **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) This section guides you through all the steps you need to take to properly implement conditional access. diff --git a/windows/security/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md index 16d4c73d26..94c5bfc2d5 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.date: 10/08/2018 # Configure alert notifications in Windows Defender ATP **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-emailconfig-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md index 3ca88add4f..9b791272a5 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md @@ -20,7 +20,7 @@ ms.date: 04/24/2018 - Group Policy -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md index 25afed579f..e0c41580fa 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md @@ -19,7 +19,7 @@ ms.date: 09/19/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configureendpointsmdm-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md index e5fa2adf95..3702b187d3 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md @@ -19,7 +19,7 @@ ms.date: 10/03/2018 - macOS - Linux -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-nonwindows-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md index 6758d81fd7..707a5887a8 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md @@ -19,7 +19,7 @@ ms.date: 04/24/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) - System Center 2012 Configuration Manager or later versions diff --git a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md index 04ac622d7d..69bb28ccaa 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md @@ -19,7 +19,7 @@ ms.date: 04/24/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md index 8a41625b88..8371836083 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md @@ -19,7 +19,7 @@ ms.date: 07/12/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md index 1dfed290f7..cbff3e3945 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.date: 09/03/2018 # Configure managed security service provider integration **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-mssp-support-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md index 4b2c89021e..c7d9e056c4 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 09/12/2018 # Configure machine proxy and Internet connectivity settings **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md index d4ac2f4f15..32cc18106d 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 11/02/2018 - Windows Server 2016 - Windows Server, version 1803 - Windows Server, 2019 -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) [!include[Prerelease information](prerelease.md)] diff --git a/windows/security/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md index 84bdc39057..e2c82a3cc0 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md @@ -19,7 +19,7 @@ ms.date: 10/16/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configuresiem-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md index b9cd80ca8b..09b8cf9087 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md @@ -19,7 +19,7 @@ ms.date: 10/16/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/custom-detection-rules.md b/windows/security/threat-protection/windows-defender-atp/custom-detection-rules.md index ae04f96b3d..60545d5706 100644 --- a/windows/security/threat-protection/windows-defender-atp/custom-detection-rules.md +++ b/windows/security/threat-protection/windows-defender-atp/custom-detection-rules.md @@ -17,7 +17,7 @@ ms.date: 10/29/2018 # Create custom detections rules **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) 1. In the navigation pane, select **Advanced hunting**. diff --git a/windows/security/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md index 6f9e0fb968..8bc7172555 100644 --- a/windows/security/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md @@ -19,7 +19,7 @@ ms.date: 04/24/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection.md index 44863a8a91..0232707da6 100644 --- a/windows/security/threat-protection/windows-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 04/24/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md index d06e1d8c9d..c2a6e3f9c3 100644 --- a/windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.date: 09/07/2018 # Windows Defender ATP data storage and privacy **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md index ece3b28679..420fba6b8f 100644 --- a/windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md @@ -20,7 +20,7 @@ ms.date: 04/24/2018 - Windows Defender -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md index 1010fe1684..f13739ad9c 100644 --- a/windows/security/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md @@ -19,7 +19,7 @@ ms.date: 04/24/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection.md index 1e416dcaa7..e88f1959d0 100644 --- a/windows/security/threat-protection/windows-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection.md @@ -19,7 +19,7 @@ ms.date: 04/24/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md index d160ae5c3a..fbe3783a63 100644 --- a/windows/security/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.date: 10/08/2018 # Enable SIEM integration in Windows Defender ATP **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/evaluate-atp.md b/windows/security/threat-protection/windows-defender-atp/evaluate-atp.md index 439774a08a..3422e6cbff 100644 --- a/windows/security/threat-protection/windows-defender-atp/evaluate-atp.md +++ b/windows/security/threat-protection/windows-defender-atp/evaluate-atp.md @@ -15,7 +15,7 @@ ms.date: 08/10/2018 --- # Evaluate Windows Defender ATP -Windows Defender Advanced Threat Protection (Windows Defender ATP) is a unified platform for preventative protection, post-breach detection, automated investigation, and response. +[Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) is a unified platform for preventative protection, post-breach detection, automated investigation, and response. You can evaluate Windows Defender Advanced Threat Protection in your organization by [starting your free trial](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp). diff --git a/windows/security/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md index 4f2681cf36..7d43f2c2a2 100644 --- a/windows/security/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 05/21/2018 - Event Viewer -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md index e0399dc1d9..8aeb2539ee 100644 --- a/windows/security/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md @@ -19,7 +19,7 @@ ms.date: 11/09/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/exposed-apis-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/exposed-apis-windows-defender-advanced-threat-protection.md index 3189b3ffcb..82d6912c6d 100644 --- a/windows/security/threat-protection/windows-defender-atp/exposed-apis-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/exposed-apis-windows-defender-advanced-threat-protection.md @@ -19,7 +19,7 @@ ms.date: 10/23/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md index 0f32d44dd4..0f74a2e1cf 100644 --- a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 07/25/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Find a machine entity around a specific timestamp by internal IP. diff --git a/windows/security/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md index 40fc4f997e..77d40948be 100644 --- a/windows/security/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md @@ -19,7 +19,7 @@ ms.date: 10/23/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/get-actor-information-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-actor-information-windows-defender-advanced-threat-protection.md index c7ad32d81d..12e531ccb6 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-actor-information-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-actor-information-windows-defender-advanced-threat-protection.md @@ -19,7 +19,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/get-actor-related-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-actor-related-alerts-windows-defender-advanced-threat-protection.md index 54c1dd45ee..216bf3fd90 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-actor-related-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-actor-related-alerts-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection.md index b57243b615..d74debcef4 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-actor-info-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-related-actor-info-windows-defender-advanced-threat-protection.md index e914d35ccb..6eb366dc10 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-alert-related-actor-info-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-alert-related-actor-info-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection.md index bc89209fbe..4558e6c341 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection.md index 3efd2de78e..46fc01cffb 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection.md index 3e296665a1..1952732087 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection.md index c5d77400aa..52169b949b 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection.md index 6993fd471d..c60acf0220 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection.md index 200e9bcb18..29b9ca446e 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection-windows-defender-advanced-threat-protection.md index 8b5aa9abb1..ae59bae72e 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 10/07/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Retrieves a map of CVE's to KB's and CVE details. diff --git a/windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection.md index 9ead2dbb39..5f0b8ccfc5 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection.md index 37f79cad7c..c09460e204 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection.md index a3c16e6ca8..2e3cde9b70 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection.md index 7584b147fb..2d6f45993f 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection.md index 05c27cc3c8..89272a50e2 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection.md index 1fbbc3a108..62a8f25bcf 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection.md index 097db254ff..07424aafd3 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/get-fileactions-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-fileactions-collection-windows-defender-advanced-threat-protection.md index 6b46d49d1c..fb469ffac8 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-fileactions-collection-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-fileactions-collection-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md index 129a601d95..0d846e906b 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection.md index b22756a78b..27eb723cd9 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection.md index fad5315c23..32e5f6f95e 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection.md index 5134bd1653..04783ac39e 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection-windows-defender-advanced-threat-protection.md index 60756f6400..700a3ded7d 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 10/07/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Retrieves a collection of KB's and KB details. diff --git a/windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection.md index d61e334add..078641587d 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection.md index 4669b6ac62..0bf2c47c64 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection.md index 9a01fc1a18..4d976968c0 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection.md index 0628465533..2c94ca5628 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection.md index 889383cdab..c86ead0780 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection-windows-defender-advanced-threat-protection.md index 1d2ab14e01..d98a86a488 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 10/07/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Retrieves a collection of RBAC machine groups. diff --git a/windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection.md index 5fc127f082..d442db809b 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection-windows-defender-advanced-threat-protection.md index 1b3f4fe295..8880d2c1b8 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 10/07/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Retrieves a collection of machines security states. diff --git a/windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md index b360312126..60f0e29f88 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/get-started.md b/windows/security/threat-protection/windows-defender-atp/get-started.md index 0d0972f0bd..08d0bcb99e 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-started.md +++ b/windows/security/threat-protection/windows-defender-atp/get-started.md @@ -17,7 +17,7 @@ ms.date: 09/03/2018 # Get started with Windows Defender Advanced Threat Protection **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Learn about the minimum requirements and initial steps you need to take to get started with Windows Defender ATP. diff --git a/windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection.md index ac38166ec1..c4dfae50e6 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection.md index 4283b6db69..aadcc3dd2b 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection.md index 4be3026444..1b66f1961a 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/incidents-queue.md b/windows/security/threat-protection/windows-defender-atp/incidents-queue.md index fa6a121754..01abcc2317 100644 --- a/windows/security/threat-protection/windows-defender-atp/incidents-queue.md +++ b/windows/security/threat-protection/windows-defender-atp/incidents-queue.md @@ -16,7 +16,7 @@ ms.date: 10/08/2018 # Incidents queue in Windows Defender ATP **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) [!include[Prerelease information](prerelease.md)] diff --git a/windows/security/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md index 56ea8cdf4a..87f2d65c02 100644 --- a/windows/security/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 04/24/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md index 65acd1c33c..3529488b89 100644 --- a/windows/security/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 04/24/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md index d680bef4c2..196e04a38f 100644 --- a/windows/security/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 04/24/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/investigate-incidents-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/investigate-incidents-windows-defender-advanced-threat-protection.md index bac3bc4093..464c9131b9 100644 --- a/windows/security/threat-protection/windows-defender-atp/investigate-incidents-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/investigate-incidents-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.date: 10/08/2018 # Investigate incidents in Windows Defender ATP **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) [!include[Prerelease information](prerelease.md)] diff --git a/windows/security/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md index 44daae5c16..0a5384f47f 100644 --- a/windows/security/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 04/24/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md index f9145a0e27..2c1fdf3100 100644 --- a/windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.date: 09/18/2018 # Investigate machines in the Windows Defender ATP Machines list **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-investigatemachines-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md index dcbc200193..7850ace854 100644 --- a/windows/security/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.date: 04/24/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection.md index 7b493211a5..d006cede0b 100644 --- a/windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md index 3ab7ab04d5..61cfbb1c6f 100644 --- a/windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection.md index 002cb3f3e8..3e8115cdf3 100644 --- a/windows/security/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 10/16/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/machine-groups-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/machine-groups-windows-defender-advanced-threat-protection.md index a831efcf16..4f1279bc34 100644 --- a/windows/security/threat-protection/windows-defender-atp/machine-groups-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/machine-groups-windows-defender-advanced-threat-protection.md @@ -20,7 +20,7 @@ ms.date: 05/08/2018 - Azure Active Directory - Office 365 -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md index 830fa8ab3c..71992afbff 100644 --- a/windows/security/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md @@ -19,7 +19,7 @@ ms.date: 09/03/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-machinesview-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md index 76a5039107..352b56b258 100644 --- a/windows/security/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.date: 09/03/2018 # Manage Windows Defender Advanced Threat Protection alerts **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-managealerts-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md index bdecb21ec0..3f276fd070 100644 --- a/windows/security/threat-protection/windows-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md @@ -19,7 +19,7 @@ ms.date: 06/14/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md index c29f83b9b6..99572285a6 100644 --- a/windows/security/threat-protection/windows-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md @@ -19,7 +19,7 @@ ms.date: 04/24/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md index 7fa091f70d..d078349bb4 100644 --- a/windows/security/threat-protection/windows-defender-atp/manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md @@ -19,7 +19,7 @@ ms.date: 04/24/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/manage-incidents-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/manage-incidents-windows-defender-advanced-threat-protection.md index 6f9871b74e..83a65ee991 100644 --- a/windows/security/threat-protection/windows-defender-atp/manage-incidents-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/manage-incidents-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.date: 010/08/2018 # Manage Windows Defender ATP incidents **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) [!include[Prerelease information](prerelease.md)] diff --git a/windows/security/threat-protection/windows-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md index 15632e8fdf..7154f763fb 100644 --- a/windows/security/threat-protection/windows-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md @@ -19,7 +19,7 @@ ms.date: 04/24/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/management-apis.md b/windows/security/threat-protection/windows-defender-atp/management-apis.md index ca0c7f20f7..0837b7356d 100644 --- a/windows/security/threat-protection/windows-defender-atp/management-apis.md +++ b/windows/security/threat-protection/windows-defender-atp/management-apis.md @@ -17,7 +17,7 @@ ms.date: 09/03/2018 # Overview of management and APIs **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-mgt-apis-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-config.md b/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-config.md index 1ccd16747d..bcadd41d25 100644 --- a/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-config.md +++ b/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-config.md @@ -17,7 +17,7 @@ ms.date: 09/19/2018 # Configure Microsoft Cloud App Security integration **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) [!include[Prerelease�information](prerelease.md)] diff --git a/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-integration.md b/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-integration.md index 1a46548cdd..c18f430649 100644 --- a/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-integration.md +++ b/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-integration.md @@ -16,7 +16,7 @@ ms.date: 09/18/2018 # Microsoft Cloud App Security integration overview **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) [!include[Prerelease�information](prerelease.md)] diff --git a/windows/security/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md index db250caeda..4d2d4dc628 100644 --- a/windows/security/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.date: 07/01/2018 # Minimum requirements for Windows Defender ATP **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) There are some minimum requirements for onboarding machines to the service. diff --git a/windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection.md index f94250c812..71a710869a 100644 --- a/windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.date: 10/29/2018 # Managed security service provider support **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-mssp-support-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/offboard-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/offboard-machines-windows-defender-advanced-threat-protection.md index c5dbddb3a0..17bba254f9 100644 --- a/windows/security/threat-protection/windows-defender-atp/offboard-machines-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/offboard-machines-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 04/24/2018 - Linux - Windows Server 2012 R2 - Windows Server 2016 -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md index b2004cfea5..d53fe2abfd 100644 --- a/windows/security/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.date: 07/01/2018 # Onboard machines to the Windows Defender ATP service **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) You need to turn on the sensor to give visibility within Windows Defender ATP. diff --git a/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection.md index b092882ebc..59c6a4e7a2 100644 --- a/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection.md @@ -22,7 +22,7 @@ ms.date: 10/10/2018 - Windows 7 SP1 Pro - Windows 8.1 Pro - Windows 8.1 Enterprise -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) [!include[Prerelease information](prerelease.md)] diff --git a/windows/security/threat-protection/windows-defender-atp/onboard.md b/windows/security/threat-protection/windows-defender-atp/onboard.md index 461847ca9e..eff2042b2e 100644 --- a/windows/security/threat-protection/windows-defender-atp/onboard.md +++ b/windows/security/threat-protection/windows-defender-atp/onboard.md @@ -17,7 +17,7 @@ ms.date: 09/03/2018 # Configure and manage Windows Defender ATP capabilities **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Configure and manage all the Windows Defender ATP capabilities to get the best security protection for your organization. diff --git a/windows/security/threat-protection/windows-defender-atp/overview-attack-surface-reduction.md b/windows/security/threat-protection/windows-defender-atp/overview-attack-surface-reduction.md index 5d7e92ddb8..fdd308623f 100644 --- a/windows/security/threat-protection/windows-defender-atp/overview-attack-surface-reduction.md +++ b/windows/security/threat-protection/windows-defender-atp/overview-attack-surface-reduction.md @@ -17,7 +17,7 @@ ms.date: 07/01/2018 # Overview of attack surface reduction **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Attack surface reduction capabilities in Windows Defender ATP helps protect the devices and applications in your organization from new and emerging threats. diff --git a/windows/security/threat-protection/windows-defender-atp/overview-custom-detections.md b/windows/security/threat-protection/windows-defender-atp/overview-custom-detections.md index 40d4dc50bc..de0be3f887 100644 --- a/windows/security/threat-protection/windows-defender-atp/overview-custom-detections.md +++ b/windows/security/threat-protection/windows-defender-atp/overview-custom-detections.md @@ -17,7 +17,7 @@ ms.date: 10/29/2018 # Custom detections overview **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Alerts in Windows Defender ATP are surfaced through the system based on signals gathered from endpoints. With custom detections, you can create custom queries to monitor events for any kind of behavior such as suspicious or emerging threats. diff --git a/windows/security/threat-protection/windows-defender-atp/overview-endpoint-detection-response.md b/windows/security/threat-protection/windows-defender-atp/overview-endpoint-detection-response.md index ccc6ab2c87..ae60213fe2 100644 --- a/windows/security/threat-protection/windows-defender-atp/overview-endpoint-detection-response.md +++ b/windows/security/threat-protection/windows-defender-atp/overview-endpoint-detection-response.md @@ -17,7 +17,7 @@ ms.date: 09/03/2018 # Overview of endpoint detection and response **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) The Windows Defender ATP endpoint detection and response capabilities provides near real-time actionable advance attacks detections, enables security analysts to effectively prioritize alerts, unfold the full scope of a breach and take response actions to remediate the threat. diff --git a/windows/security/threat-protection/windows-defender-atp/overview-hardware-based-isolation.md b/windows/security/threat-protection/windows-defender-atp/overview-hardware-based-isolation.md index 88596a6cef..99b9d8721c 100644 --- a/windows/security/threat-protection/windows-defender-atp/overview-hardware-based-isolation.md +++ b/windows/security/threat-protection/windows-defender-atp/overview-hardware-based-isolation.md @@ -14,7 +14,7 @@ ms.date: 09/07/2018 # Hardware-based isolation in Windows 10 -**Applies to:** Windows Defender Advanced Threat Protection (Windows Defender ATP) +**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Hardware-based isolation helps protect system integrity in Windows 10 and is integrated with Windows Defender ATP. diff --git a/windows/security/threat-protection/windows-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md index bacc9fdbc1..5bed487738 100644 --- a/windows/security/threat-protection/windows-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md @@ -16,7 +16,7 @@ ms.date: 09/12/2018 # Overview of advanced hunting **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Advanced hunting allows you to hunt for possible threats across your organization using a powerful search and query tool. You can also create custom detection rules based on the queries you created and surface alerts in Windows Defender Security Center. diff --git a/windows/security/threat-protection/windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md index 5cd11935ed..7e3637ad4f 100644 --- a/windows/security/threat-protection/windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md @@ -16,7 +16,7 @@ ms.date: 09/03/2018 # Overview of Secure score in Windows Defender Security Center **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) The Secure score dashboard expands your visibility into the overall security posture of your organization. From this dashboard, you'll be able to quickly assess the security posture of your organization, see machines that require attention, as well as recommendations for actions to further reduce the attack surface in your organization - all in one place. From there you can take action based on the recommended configuration baselines. diff --git a/windows/security/threat-protection/windows-defender-atp/overview.md b/windows/security/threat-protection/windows-defender-atp/overview.md index df560a652f..9741504d5c 100644 --- a/windows/security/threat-protection/windows-defender-atp/overview.md +++ b/windows/security/threat-protection/windows-defender-atp/overview.md @@ -17,7 +17,7 @@ ms.date: 09/03/2018 # Overview of Windows Defender ATP capabilities **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Understand the concepts behind the capabilities in Windows Defender ATP so you take full advantage of the complete threat protection platform. diff --git a/windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md index 1457a0d7dd..562664aec0 100644 --- a/windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.date: 04/24/2018 # Windows Defender Advanced Threat Protection portal overview **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md index 9cac40a33b..48c6104eb8 100644 --- a/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.date: 10/19/2018 # Create and build Power BI reports using Windows Defender ATP data **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md index b61ff7d784..545da6110c 100644 --- a/windows/security/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.date: 04/24/2018 # PowerShell code examples for the custom threat intelligence API **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md index 828c4d45ac..d408ead55e 100644 --- a/windows/security/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md @@ -16,7 +16,7 @@ ms.date: 04/24/2018 # Configure Windows Defender Security Center settings **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-prefsettings-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md index 2e309e3b2e..a3411e8a2a 100644 --- a/windows/security/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md @@ -16,7 +16,7 @@ ms.date: 04/24/2018 # Turn on the preview experience in Windows Defender ATP **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md index 27650aecca..f77b086c9e 100644 --- a/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.date: 11/05/2018 # Windows Defender ATP preview features **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md index 9668da89eb..4ede6cb172 100644 --- a/windows/security/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.date: 10/26/2018 # Pull Windows Defender ATP alerts using REST API **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md index 46742baa03..57d3428cbc 100644 --- a/windows/security/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md @@ -19,7 +19,7 @@ ms.date: 04/24/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/rbac-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/rbac-windows-defender-advanced-threat-protection.md index 5503cf2607..bc2837f2bb 100644 --- a/windows/security/threat-protection/windows-defender-atp/rbac-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/rbac-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 05/08/2018 **Applies to:** - Azure Active Directory - Office 365 -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-rbac-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/request-sample-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/request-sample-windows-defender-advanced-threat-protection.md index d9baf6c10d..8c0f6851d1 100644 --- a/windows/security/threat-protection/windows-defender-atp/request-sample-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/request-sample-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md index 37af693216..e6e881df90 100644 --- a/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.date: 04/24/2018 # Take response actions on a file **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md index 1d46a897c3..cdc3c156e4 100644 --- a/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.date: 11/05/2018 # Take response actions on a machine **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-respondmachine-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md index 565ee7cc61..202606d056 100644 --- a/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.date: 11/12/2017 # Take response actions in Windows Defender ATP **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection.md index c3845d021a..3eb57786f8 100644 --- a/windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.date: 12/08/2017 # Restrict app execution API **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection.md index 52cab18906..73333ff005 100644 --- a/windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.date: 12/08/2017 # Run antivirus scan API **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md index ad6fbc2bec..e0cf7f036b 100644 --- a/windows/security/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md @@ -22,7 +22,7 @@ ms.date: 09/07/2018 - Windows Server 2016 - Windows Server, version 1803 - Windows Server, 2019 -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Run the following PowerShell script on a newly onboarded machine to verify that it is properly reporting to the Windows Defender ATP service. diff --git a/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection.md index 36ff48cd5d..6fff222564 100644 --- a/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection.md @@ -15,7 +15,7 @@ ms.date: 10/26/2018 # Configure the security controls in Secure score **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Each security control lists recommendations that you can take to increase the security posture of your organization. diff --git a/windows/security/threat-protection/windows-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection.md index 907d6c7b27..a5f69cd49c 100644 --- a/windows/security/threat-protection/windows-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.date: 09/04/2018 # Windows Defender Security Center Security operations dashboard **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-secopsdashboard-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection.md index 65de179e29..b74a5f896b 100644 --- a/windows/security/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.date: 04/24/2018 # Check the Windows Defender Advanced Threat Protection service health **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/stop-quarantine-file-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/stop-quarantine-file-windows-defender-advanced-threat-protection.md index 837e642aa1..06af6fc6af 100644 --- a/windows/security/threat-protection/windows-defender-atp/stop-quarantine-file-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/stop-quarantine-file-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.date: 12/08/2017 # Stop and quarantine file API **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/supported-apis-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/supported-apis-windows-defender-advanced-threat-protection.md index 83fbe686fb..e5bb46bc1d 100644 --- a/windows/security/threat-protection/windows-defender-atp/supported-apis-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/supported-apis-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.date: 09/03/2018 # Supported Windows Defender ATP query APIs **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection.md index fe228f3acc..55dd5a1cfc 100644 --- a/windows/security/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.date: 12/01/2017 # Supported Windows Defender ATP query APIs **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-supported-response-apis-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection.md index 321085bc62..4aab3cf41a 100644 --- a/windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection.md @@ -16,7 +16,7 @@ ms.date: 09/03/2018 # Threat analytics for Spectre and Meltdown **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) The **Threat analytics** dashboard provides insight on how emerging threats affect your organization. It provides information that's specific for your organization. diff --git a/windows/security/threat-protection/windows-defender-atp/threat-analytics.md b/windows/security/threat-protection/windows-defender-atp/threat-analytics.md index bfd50a15cf..ba29920b5d 100644 --- a/windows/security/threat-protection/windows-defender-atp/threat-analytics.md +++ b/windows/security/threat-protection/windows-defender-atp/threat-analytics.md @@ -16,7 +16,7 @@ ms.date: 10/29/2018 # Threat analytics **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Cyberthreats are emerging more frequently and prevalently. It is critical for organizations to be able to quickly assess their security posture, including impact, and organizational resilience in the context of specific emerging threats. diff --git a/windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md index 3f5a0597bd..155f23aef6 100644 --- a/windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.date: 09/03/2018 # Understand threat intelligence concepts **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/threat-protection-integration.md b/windows/security/threat-protection/windows-defender-atp/threat-protection-integration.md index 4c9c126a2d..e0301cebc1 100644 --- a/windows/security/threat-protection/windows-defender-atp/threat-protection-integration.md +++ b/windows/security/threat-protection/windows-defender-atp/threat-protection-integration.md @@ -18,7 +18,7 @@ ms.date: 10/12/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Windows Defender ATP is part of the Microsoft Threat Protection solution that helps implement end-to-end security across possible attack surfaces in the modern workplace. diff --git a/windows/security/threat-protection/windows-defender-atp/time-settings-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/time-settings-windows-defender-advanced-threat-protection.md index 4dd9223f2d..e513ef6ba4 100644 --- a/windows/security/threat-protection/windows-defender-atp/time-settings-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/time-settings-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.date: 02/13/2018 # Windows Defender Security Center time zone settings **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md index 813babce81..193e3acb5f 100644 --- a/windows/security/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md @@ -19,7 +19,7 @@ ms.date: 06/25/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md index dce7b35436..01a0beefda 100644 --- a/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md @@ -19,7 +19,7 @@ ms.date: 08/01/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-troublshootonboarding-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md index 7f38e2545a..3a34547911 100644 --- a/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.date: 09/07/2018 # Troubleshoot Windows Defender Advanced Threat Protection onboarding issues **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) - Windows Server 2012 R2 - Windows Server 2016 diff --git a/windows/security/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md index 2d4fc88758..ec2722306c 100644 --- a/windows/security/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.date: 02/13/2018 # Troubleshoot SIEM tool integration issues **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/unblock-file-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/unblock-file-windows-defender-advanced-threat-protection.md index c0abbe6cdd..fffb9ad229 100644 --- a/windows/security/threat-protection/windows-defender-atp/unblock-file-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/unblock-file-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection.md index f7b0fe34b5..560416bc51 100644 --- a/windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection.md index 393d41412f..10def5a55d 100644 --- a/windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 12/08/2017 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md index 9a12d912f6..261e038a76 100644 --- a/windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.date: 04/24/2018 # Use the threat intelligence API to create custom alerts **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) diff --git a/windows/security/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection.md index f41440d094..b61baaafb2 100644 --- a/windows/security/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection.md @@ -18,7 +18,7 @@ ms.date: 03/12/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-usewdatp-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/user-roles-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/user-roles-windows-defender-advanced-threat-protection.md index 829e256921..505e031a5a 100644 --- a/windows/security/threat-protection/windows-defender-atp/user-roles-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/user-roles-windows-defender-advanced-threat-protection.md @@ -17,7 +17,7 @@ ms.date: 09/03/2018 # Create and manage roles for role-based access control **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-roles-abovefoldlink) diff --git a/windows/security/threat-protection/windows-defender-atp/view-incidents-queue.md b/windows/security/threat-protection/windows-defender-atp/view-incidents-queue.md index d905eb0d2b..7ecf9f1fda 100644 --- a/windows/security/threat-protection/windows-defender-atp/view-incidents-queue.md +++ b/windows/security/threat-protection/windows-defender-atp/view-incidents-queue.md @@ -16,7 +16,7 @@ ms.date: 10/08/2018 # View and organize the Windows Defender Advanced Threat Protection Incidents queue **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) [!include[Prerelease information](prerelease.md)] diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md index e577fe1f8c..360b2a59c8 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md @@ -18,7 +18,7 @@ ms.date: 10/15/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Attack surface reduction rules help prevent actions and apps that are typically used by exploit-seeking malware to infect machines. This feature is part of Windows Defender Advanced Threat Protection and provides: diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md index 57927f648c..0131be7167 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md @@ -19,7 +19,7 @@ ms.date: 09/18/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) You can enable attack surface reduction rules, eploit protection, network protection, and controlled folder access in audit mode. This lets you see a record of what *would* have happened if you had enabled the feature. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/collect-cab-files-exploit-guard-submission.md b/windows/security/threat-protection/windows-defender-exploit-guard/collect-cab-files-exploit-guard-submission.md index 83348307d8..9448ed601f 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/collect-cab-files-exploit-guard-submission.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/collect-cab-files-exploit-guard-submission.md @@ -18,7 +18,7 @@ ms.date: 08/08/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) This topic describes how to collect diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues you may encounter when using attack surface reduction rules, network protection, exploit protection, and controlled folder access. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md index c3e230964e..21c0acfc51 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md @@ -18,7 +18,7 @@ ms.date: 10/02/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. Controlled folder access is supported on Windows Server 2019 as well as Windows 10 clients. Controlled folder access works best with [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md), which gives you detailed reporting into controlled folder access events and blocks as part of the usual [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md b/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md index 75725299ff..a948e7db7e 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md @@ -18,7 +18,7 @@ ms.date: 10/17/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Attack surface reduction rules help prevent actions and apps that are typically used by exploit-seeking malware to infect machines. Attack surface reduction rules are supported on Windows Server 2019 as well as Windows 10 clients. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md index 38643b362f..5f501170df 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md @@ -18,7 +18,7 @@ ms.date: 10/02/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. Controlled folder access is supported on Windows Server 2019 as well as Windows 10 clients. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md index 57289d1fe5..7591a39db0 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md @@ -18,7 +18,7 @@ ms.date: 10/02/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Exploit protection automatically applies a number of exploit mitigation techniques on both the operating system processes and on individual apps. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md index becce4ead2..3b65d090e5 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md @@ -18,7 +18,7 @@ ms.date: 08/08/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) >[!IMPORTANT] >If you are currently using EMET, you should be aware that [EMET reached end of life on July 31, 2018](https://blogs.technet.microsoft.com/srd/2016/11/03/beyond-emet/). You should consider replacing EMET with exploit protection in Windows Defender ATP. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md index 86e12c0578..675f449f0b 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md @@ -18,7 +18,7 @@ ms.date: 10/17/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Attack surface reduction rules help prevent actions and apps that are typically used by exploit-seeking malware to infect machines. Attack surface reduction rules are supported on Windows Server 2019 as well as Windows 10 clients. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md index 1d831ea2a9..79fb8541bf 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md @@ -18,7 +18,7 @@ ms.date: 10/02/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. It is part of [Windows Defender Exploit Guard](windows-defender-exploit-guard.md). Controlled folder access is supported on Windows Server 2019 as well as Windows 10 clients. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md index 91f8b6b1bb..70500e0307 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md @@ -18,7 +18,7 @@ ms.date: 08/08/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Exploit protection applies helps protect devices from malware that use exploits to spread and infect. It consists of a number of mitigations that can be applied at either the operating system level, or at the individual app level. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md index af47213614..d147c77d43 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md @@ -18,7 +18,7 @@ ms.date: 05/30/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Network protection helps to prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md index 2c5e663e91..98835fdcfd 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md @@ -13,7 +13,7 @@ ms.date: 08/08/2018 **Applies to** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) This topic covers different ways to enable Hypervisor-protected code integrity (HVCI) on Windows 10. Some applications, including device drivers, may be incompatible with HVCI. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md index b0eb1162cb..a143ed81a3 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md @@ -18,7 +18,7 @@ ms.date: 10/02/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Attack surface reduction rules help prevent actions and apps that are typically used by exploit-seeking malware to infect machines. Attack surface reduction rules are supported on Windows Server 2019 as well as Windows 10 clients. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md index 9fa8ab6d2b..f30804cbd0 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md @@ -18,7 +18,7 @@ ms.date: 10/02/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) [Controlled folder access](controlled-folders-exploit-guard.md) is a feature that helps protect your documents and files from modification by suspicious or malicious apps. Controlled folder access is supported on Windows Server 2019 as well as Windows 10 clients. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md index 412888c242..1d7efe7b59 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md @@ -18,7 +18,7 @@ ms.date: 05/30/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Exploit protection applies helps protect devices from malware that use exploits to spread and infect. It consists of a number of mitigations that can be applied at either the operating system level, or at the individual app level. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md index ee1e9948c7..995cbaeb50 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md @@ -18,7 +18,7 @@ ms.date: 08/09/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Network protection helps prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md index 1bf42dc66c..5f32c57193 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md @@ -19,7 +19,7 @@ ms.date: 08/08/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) You can review attack surface reduction events in Event Viewer. This is useful so you can monitor what rules or settings are working, and determine if any settings are too "noisy" or impacting your day to day workflow. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md index 729d6cbc55..7fb3984ab2 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md @@ -18,7 +18,7 @@ ms.date: 08/09/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Exploit protection automatically applies a number of exploit mitigation techniques on both the operating system processes and on individual apps. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md b/windows/security/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md index dde4c17bfa..99eb36540f 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md @@ -18,7 +18,7 @@ ms.date: 04/30/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Exploit protection applies helps protect devices from malware that use exploits to spread and infect. It consists of a number of mitigations that can be applied at either the operating system level, or at the individual app level. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/memory-integrity.md b/windows/security/threat-protection/windows-defender-exploit-guard/memory-integrity.md index 03dd9e1ec9..11ff56a123 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/memory-integrity.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/memory-integrity.md @@ -18,7 +18,7 @@ ms.date: 08/09/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Memory integrity is a powerful system mitigation that leverages hardware virtualization and the Windows Hyper-V hypervisor to protect Windows kernel-mode processes against the injection and execution of malicious or unverified code. Code integrity validation is performed in a secure environment that is resistant to attack from malicious software, and page permissions for kernel mode are set and maintained by the Hyper-V hypervisor. Memory integrity helps block many types of malware from running on computers that run Windows 10 and Windows Server 2016. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md index 639057a7b2..b1e742ac1b 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md @@ -18,7 +18,7 @@ ms.date: 08/09/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Network protection helps reduce the attack surface of your devices from Internet-based events. It prevents employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md b/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md index 158a8a98ac..1eb3ac9b72 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md @@ -13,7 +13,7 @@ ms.date: 10/20/2017 **Applies to** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Computers must meet certain hardware, firmware, and software requirements in order to take adavantage of all of the virtualization-based security (VBS) features in [Windows Defender Device Guard](../device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md). Computers lacking these requirements can still be protected by Windows Defender Application Control (WDAC) policies—the difference is that those computers will not be as hardened against certain threats. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md index 847b1fa492..5711270ae7 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md @@ -18,7 +18,7 @@ ms.date: 09/18/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) When you use [attack surface reduction rules](attack-surface-reduction-exploit-guard.md) you may encounter issues, such as: diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md index 31f4604299..ede76cf20a 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md @@ -18,7 +18,7 @@ ms.date: 08/09/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) When you create a set of exploit protection mitigations (known as a configuration), you might find that the configuration export and import process does not remove all unwanted mitigations. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md index f2f8024158..b091e01721 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md @@ -18,7 +18,7 @@ ms.date: 08/09/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) - IT administrators diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md index cfea6fdd1f..bdf4311dfe 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md @@ -18,7 +18,7 @@ ms.date: 08/09/2018 **Applies to:** -- Windows Defender Advanced Threat Protection (Windows Defender ATP) +- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) Windows Defender Exploit Guard (Windows Defender EG) is a new set of host intrusion prevention capabilities for Windows 10, allowing you to manage and reduce the attack surface of apps used by your employees. From 6688e725e692902ee17cccac59de61ff105b0056 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Tue, 6 Nov 2018 22:21:01 +0000 Subject: [PATCH 32/32] Merged PR 12629: Added links to modern deployment Links added --- windows/deployment/deploy-m365.md | 10 +++------- windows/deployment/deploy-whats-new.md | 5 ++++- windows/deployment/deploy.md | 6 +++++- windows/deployment/index.yml | 1 + windows/deployment/windows-10-deployment-scenarios.md | 6 +++--- .../deployment/windows-autopilot/existing-devices.md | 6 +++++- 6 files changed, 21 insertions(+), 13 deletions(-) diff --git a/windows/deployment/deploy-m365.md b/windows/deployment/deploy-m365.md index 6ea42e8bc1..f45a135986 100644 --- a/windows/deployment/deploy-m365.md +++ b/windows/deployment/deploy-m365.md @@ -7,7 +7,7 @@ ms.sitesec: library ms.pagetype: deploy keywords: deployment, automate, tools, configure, mdt, sccm, M365 ms.localizationpriority: medium -ms.date: 04/23/2018 +ms.date: 11/06/2018 author: greg-lindsay --- @@ -55,12 +55,8 @@ Examples of these two deployment advisors are shown below. ## Related Topics -[Windows 10 deployment scenarios](windows-10-deployment-scenarios.md) -  - -  - - +[Windows 10 deployment scenarios](windows-10-deployment-scenarios.md)
+[Modern Destop Deployment Center](https://docs.microsoft.com/microsoft-365/enterprise/desktop-deployment-center-home) diff --git a/windows/deployment/deploy-whats-new.md b/windows/deployment/deploy-whats-new.md index c18d4a269e..be1e1f9ea7 100644 --- a/windows/deployment/deploy-whats-new.md +++ b/windows/deployment/deploy-whats-new.md @@ -7,7 +7,7 @@ ms.localizationpriority: medium ms.prod: w10 ms.sitesec: library ms.pagetype: deploy -ms.date: 09/12/2018 +ms.date: 11/06/2018 author: greg-lindsay --- @@ -24,6 +24,9 @@ This topic provides an overview of new solutions and online content related to d - For an all-up overview of new features in Windows 10, see [What's new in Windows 10](https://technet.microsoft.com/itpro/windows/whats-new/index). - For a detailed list of changes to Windows 10 ITPro TechNet library content, see [Online content change history](#online-content-change-history). +## The Modern Desktop Deployment Center + +The [Modern Destop Deployment Center](https://docs.microsoft.com/microsoft-365/enterprise/desktop-deployment-center-home) has launched with tons of content to help you with large-scale deployment of Windows 10 and Office 365 ProPlus. ## Windows 10 servicing and support diff --git a/windows/deployment/deploy.md b/windows/deployment/deploy.md index a38657a7be..ff0a09c58c 100644 --- a/windows/deployment/deploy.md +++ b/windows/deployment/deploy.md @@ -6,7 +6,7 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: medium -ms.date: 11/02/2017 +ms.date: 11/06/2018 author: greg-lindsay --- @@ -29,6 +29,10 @@ Windows 10 upgrade options are discussed and information is provided about plann |[Windows 10 deployment tools](windows-10-deployment-tools-reference.md) |Learn about available tools to deploy Windows 10, such as the Windows ADK, DISM, USMT, WDS, MDT, Windows PE and more. | |[How to install fonts that are missing after upgrading to Windows 10](windows-10-missing-fonts.md)|Windows 10 introduced changes to the fonts that are included in the image by default. Learn how to install additional fonts from **Optional features** after you install Windows 10 or upgrade from a previous version.| +## Related topics + +[Modern Destop Deployment Center](https://docs.microsoft.com/microsoft-365/enterprise/desktop-deployment-center-home) +     diff --git a/windows/deployment/index.yml b/windows/deployment/index.yml index b3b1dbc226..0161bd05b1 100644 --- a/windows/deployment/index.yml +++ b/windows/deployment/index.yml @@ -46,6 +46,7 @@ sections: text: "
+ diff --git a/windows/deployment/windows-10-deployment-scenarios.md b/windows/deployment/windows-10-deployment-scenarios.md index f744169d27..684ee94aa7 100644 --- a/windows/deployment/windows-10-deployment-scenarios.md +++ b/windows/deployment/windows-10-deployment-scenarios.md @@ -7,7 +7,7 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.localizationpriority: medium ms.sitesec: library -ms.date: 04/03/2018 +ms.date: 11/06/2018 author: greg-lindsay --- @@ -19,9 +19,9 @@ author: greg-lindsay To successfully deploy the Windows 10 operating system in your organization, it is important to understand the different ways that it can be deployed, especially now that there are new scenarios to consider. Choosing among these scenarios, and understanding the capabilities and limitations of each, is a key task. The following table summarizes various Windows 10 deployment scenarios. The scenarios are each assigned to one of three categories. -- Modern deployment methods are recommended unless you have a specific need to use a different procedure. +- Modern deployment methods are recommended unless you have a specific need to use a different procedure. These methods are supported with existing tools such as Microsoft Deployment Toolkit (MDT) and System Center Configuration Manager. These methods are discussed in detail on the [Modern Desktop Deployment Center](https://docs.microsoft.com/microsoft-365/enterprise/desktop-deployment-center-home). - Dynamic deployment methods enable you to configure applications and settings for specific use cases. -- Traditional deployment methods use tools such as Microsoft Deployment Toolkit (MDT) and System Center Configuration Manager.
  +- Traditional deployment methods use existing tools to deploy operating system images.
 
[Modern Desktop Deployment Center](https://docs.microsoft.com/microsoft-365/enterprise/desktop-deployment-center-home) Check out the new Modern Deskop Deployment Center and discover content to help you with your Windows 10 and Office 365 ProPlus deployments.
[What's new in Windows 10 deployment](deploy-whats-new.md) See this topic for a summary of new features and some recent changes related to deploying Windows 10 in your organization.
[Windows 10 deployment scenarios](windows-10-deployment-scenarios.md) To successfully deploy the Windows 10 operating system in your organization, it is important to understand the different ways that it can be deployed, especially now that there are new scenarios to consider. Choosing among these scenarios, and understanding the key capabilities and limitations of each, is a key task.
[Windows 10 Subscription Activation](windows-10-enterprise-subscription-activation.md) Windows 10 Enterprise has traditionally been sold as on premises software, however, with Windows 10 version 1703 (also known as the Creator’s Update), both Windows 10 Enterprise E3 and Windows 10 Enterprise E5 are available as true online services via subscription. You can move from Windows 10 Pro to Windows 10 Enterprise with no keys and no reboots. If you are using a Cloud Service Providers (CSP) see the related topic: [Windows 10 Enterprise E3 in CSP](windows-10-enterprise-e3-overview.md).
diff --git a/windows/deployment/windows-autopilot/existing-devices.md b/windows/deployment/windows-autopilot/existing-devices.md index 28d5f2748f..72bca7e019 100644 --- a/windows/deployment/windows-autopilot/existing-devices.md +++ b/windows/deployment/windows-autopilot/existing-devices.md @@ -9,7 +9,7 @@ ms.sitesec: library ms.pagetype: deploy author: greg-lindsay ms.author: greg-lindsay -ms.date: 10/31/2018 +ms.date: 11/05/2018 --- # Windows Autopilot for existing devices @@ -298,3 +298,7 @@ The Task Sequence will download content, reboot, format the drives and install W Devices provisioned through Autopilot will only receive the guided OOBE Autopilot experience on first boot. Once updated to Windows 10, the device should be registered to ensure a continued Autopilot experience in the event of PC reset. You can enable automatic registration for an assigned group using the **Convert all targeted devices to Autopilot** setting. For more information, see [Create an Autopilot deployment profile](https://docs.microsoft.com/en-us/intune/enrollment-autopilot#create-an-autopilot-deployment-profile). Also see [Adding devices to Windows Autopilot](https://docs.microsoft.com/windows/deployment/windows-autopilot/add-devices). + +## Speeding up the deployment process + +To remove around 20 minutes from the deployment process, see Michael Niehaus's blog with instructions for [Speeding up Windows Autopilot for existing devices](https://blogs.technet.microsoft.com/mniehaus/2018/10/25/speeding-up-windows-autopilot-for-existing-devices/).
Category