From a0add6bdf57979d921125553c9ac67a5d87cd3c6 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 23 Oct 2017 14:05:23 -0700 Subject: [PATCH 01/13] features in preview --- ...ed-apis-windows-defender-advanced-threat-protection.md | 2 ++ ...reports-windows-defender-advanced-threat-protection.md | 2 +- ...preview-windows-defender-advanced-threat-protection.md | 8 +++++++- 3 files changed, 10 insertions(+), 2 deletions(-) diff --git a/windows/threat-protection/windows-defender-atp/exposed-apis-windows-defender-advanced-threat-protection.md b/windows/threat-protection/windows-defender-atp/exposed-apis-windows-defender-advanced-threat-protection.md index 8ee8c7f559..50e19938e1 100644 --- a/windows/threat-protection/windows-defender-atp/exposed-apis-windows-defender-advanced-threat-protection.md +++ b/windows/threat-protection/windows-defender-atp/exposed-apis-windows-defender-advanced-threat-protection.md @@ -23,6 +23,8 @@ ms.date: 10/17/2017 - Windows 10 Pro Education - Windows Defender Advanced Threat Protection (Windows Defender ATP) +[!include[Prerelease information](prerelease.md)] + >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) Windows Defender ATP exposes much of the available data and actions using a set of programmatic APIs that are part of the Microsoft Intelligence Security Graph. Those APIs will enable you to automate workflows and innovate based on Windows Defender ATP capabilities. The API access requires OAuth2.0 authentication. For more information, see [OAuth 2.0 Authorization Code Flow](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-v2-protocols-oauth-code). diff --git a/windows/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md b/windows/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md index f025daa7f6..6a11d162cc 100644 --- a/windows/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md +++ b/windows/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md @@ -21,7 +21,7 @@ ms.date: 10/17/2017 - Windows 10 Pro Education - Windows Defender Advanced Threat Protection (Windows Defender ATP) - +[!include[Prerelease information](prerelease.md)] >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-powerbireports-abovefoldlink) diff --git a/windows/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md b/windows/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md index c727d8143d..a9f61d94fe 100644 --- a/windows/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md +++ b/windows/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md @@ -42,7 +42,13 @@ Turn on the preview experience setting to be among the first to try upcoming fea 2. Toggle the setting between **On** and **Off** and select **Save preferences**. ## Preview features -There are currently no preview features. +The following features are included in the preview release: + +- [Create and build Power BI reports using Windows Defender ATP data](powerbi-reports-windows-defender-advanced-threat-protection.md)
+Windows Defender ATP supports the use of Power BI data connectors to enable you to connect and access Windows Defender ATP data using Microsoft Graph. + +- [Use the Windows Defender ATP exposed APIs](exposed-apis-windows-defender-advanced-threat-protection.md)
+ Windows Defender ATP exposes much of the available data and actions using a set of programmatic APIs that are part of the Microsoft Intelligence Security Graph. Those APIs will enable you, to automate workflows and innovate based on Windows Defender ATP capabilities. >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-preview-belowfoldlink) From 039b41c8e5297f93dc7617f48a109666ab60afb8 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Wed, 25 Oct 2017 10:09:16 -0700 Subject: [PATCH 02/13] corrected min length when policy is disabled --- .../bitlocker/bitlocker-group-policy-settings.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/device-security/bitlocker/bitlocker-group-policy-settings.md b/windows/device-security/bitlocker/bitlocker-group-policy-settings.md index 5c3968f8f7..cb8e0ad837 100644 --- a/windows/device-security/bitlocker/bitlocker-group-policy-settings.md +++ b/windows/device-security/bitlocker/bitlocker-group-policy-settings.md @@ -347,7 +347,7 @@ This policy setting is used to set a minimum PIN length when you use an unlock m

When disabled or not configured

-

Users can configure a startup PIN of any length between 4 and 20 digits.

+

Users can configure a startup PIN of any length between 6 and 20 digits.

From 8408bc0ef9ccd83ea124ddb020fd49ce86892705 Mon Sep 17 00:00:00 2001 From: Maricia Alforque Date: Wed, 25 Oct 2017 19:45:04 +0000 Subject: [PATCH 03/13] Merged PR 4060: Policy DDF updated with latest version --- .../client-management/mdm/policy-ddf-file.md | 1944 +++++------------ 1 file changed, 603 insertions(+), 1341 deletions(-) diff --git a/windows/client-management/mdm/policy-ddf-file.md b/windows/client-management/mdm/policy-ddf-file.md index 3049402086..ff7f8c546f 100644 --- a/windows/client-management/mdm/policy-ddf-file.md +++ b/windows/client-management/mdm/policy-ddf-file.md @@ -7,7 +7,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 08/23/2017 +ms.date: 10/23/2017 --- # Policy DDF file @@ -50,7 +50,7 @@ The XML below is the DDF for Windows 10, version 1709. - com.microsoft/5.0/MDM/Policy + com.microsoft/6.0/MDM/Policy @@ -2548,30 +2548,6 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - - DisableBlockingOfOutdatedActiveXControls - - - - - - - - - - - - - - - - - - - text/plain - - - DisableBypassOfSmartScreenWarnings @@ -3868,30 +3844,6 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - - InternetZoneRunNETFrameworkReliantComponentsNotSignedWithAuthenticode - - - - - - - - - - - - - - - - - - - text/plain - - - InternetZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode @@ -3964,30 +3916,6 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - - InternetZoneWebsitesInLessPrivilegedZonesCanNavigateIntoThisZone - - - - - - - - - - - - - - - - - - - text/plain - - - IntranetZoneAllowAccessToDataSources @@ -4252,30 +4180,6 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - - IntranetZoneInitializeAndScriptActiveXControlsNotMarkedSafe - - - - - - - - - - - - - - - - - - - text/plain - - - IntranetZoneJavaPermissions @@ -7060,30 +6964,6 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - - RestrictedSitesZoneNavigateWindowsAndFramesAcrossDomains - - - - - - - - - - - - - - - - - - - text/plain - - - RestrictedSitesZoneRunActiveXControlsAndPlugins @@ -7204,30 +7084,6 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - - RestrictedSitesZoneTurnOnCrossSiteScriptingFilter - - - - - - - - - - - - - - - - - - - text/plain - - - RestrictedSitesZoneTurnOnProtectedMode @@ -7612,30 +7468,6 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - - TrustedSitesZoneDontRunAntimalwareProgramsAgainstActiveXControls - - - - - - - - - - - - - - - - - - - text/plain - - - TrustedSitesZoneInitializeAndScriptActiveXControls @@ -7660,54 +7492,6 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - - TrustedSitesZoneInitializeAndScriptActiveXControlsNotMarkedAsSafe - - - - - - - - - - - - - - - - - - - text/plain - - - - - TrustedSitesZoneInitializeAndScriptActiveXControlsNotMarkedSafe - - - - - - - - - - - - - - - - - - - text/plain - - - TrustedSitesZoneJavaPermissions @@ -7916,6 +7700,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + HidePeopleBar + + + + + + + + Enabling this policy removes the people icon from the taskbar as well as the corresponding settings toggle. It also prevents users from pinning people to the taskbar. + + + + + + + + + + + text/plain + + + StartLayout @@ -8190,6 +7998,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + LowestValueMostSecure @@ -8334,6 +8143,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + phone LowestValueMostSecure @@ -8358,6 +8168,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + LowestValueMostSecure @@ -8381,6 +8192,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + desktop LowestValueMostSecure @@ -8428,6 +8240,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + phone LowestValueMostSecure @@ -8452,6 +8265,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + LowestValueMostSecure @@ -8475,6 +8289,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + phone LowestValueMostSecure @@ -8499,6 +8314,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + phone HighestValueMostSecure @@ -8523,6 +8339,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + phone HighestValueMostSecure @@ -8547,6 +8364,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + LowestValueMostSecure @@ -8574,6 +8392,7 @@ If you disable this setting, the Microsoft Compatibility List will not be used d text/plain + LowestValueMostSecure @@ -8597,6 +8416,7 @@ If you disable this setting, the Microsoft Compatibility List will not be used d text/plain + LowestValueMostSecure @@ -8620,6 +8440,7 @@ If you disable this setting, the Microsoft Compatibility List will not be used d text/plain + phone LowestValueMostSecure @@ -8649,6 +8470,7 @@ This policy will only apply on domain joined machines or when the device is MDM text/plain + LowestValueMostSecure @@ -8672,6 +8494,7 @@ This policy will only apply on domain joined machines or when the device is MDM text/plain + LowestValueMostSecure @@ -8695,6 +8518,7 @@ This policy will only apply on domain joined machines or when the device is MDM text/plain + LowestValueMostSecure @@ -8718,6 +8542,7 @@ This policy will only apply on domain joined machines or when the device is MDM text/plain + LowestValueMostSecure @@ -8741,6 +8566,7 @@ This policy will only apply on domain joined machines or when the device is MDM text/plain + phone LowestValueMostSecure @@ -8799,6 +8625,7 @@ This setting can only be used with domain-joined or MDM-enrolled devices. For mo text/plain + phone LowestValueMostSecure @@ -8931,6 +8758,7 @@ If you disable or don't configure this setting (default), employees can add, imp text/plain + LowestValueMostSecure @@ -8954,6 +8782,7 @@ If you disable or don't configure this setting (default), employees can add, imp text/plain + HighestValueMostSecure @@ -8979,6 +8808,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + phone HighestValueMostSecure @@ -9005,6 +8835,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + HighestValueMostSecure @@ -9028,6 +8859,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + HighestValueMostSecure @@ -9051,6 +8883,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + HighestValueMostSecure @@ -9074,6 +8907,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + HighestValueMostSecure @@ -9127,6 +8961,7 @@ If you disable or don't configure this setting, employees will see the favorites text/plain + phone HighestValueMostSecure @@ -9180,6 +9015,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + phone HighestValueMostSecure @@ -9204,6 +9040,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + phone LowestValueMostSecure @@ -9365,6 +9202,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + HighestValueMostSecure @@ -9589,6 +9427,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + LowestValueMostSecure @@ -9612,6 +9451,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + phone LowestValueMostSecure @@ -9636,6 +9476,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + phone LowestValueMostSecure @@ -9660,6 +9501,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + phone LowestValueMostSecure @@ -9684,6 +9526,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + LowestValueMostSecure @@ -9707,6 +9550,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + LowestValueMostSecure @@ -10537,33 +10381,6 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on LastWrite - - DisableBlockingOfOutdatedActiveXControls - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement - VerMgmtDisable - LastWrite - - DisableBypassOfSmartScreenWarnings @@ -12022,33 +11839,6 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on LastWrite - - InternetZoneRunNETFrameworkReliantComponentsNotSignedWithAuthenticode - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone - IZ_PolicyUnsignedFrameworkComponentsURLaction_1 - LastWrite - - InternetZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode @@ -12130,33 +11920,6 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on LastWrite - - InternetZoneWebsitesInLessPrivilegedZonesCanNavigateIntoThisZone - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone - IZ_PolicyZoneElevationURLaction_1 - LastWrite - - IntranetZoneAllowAccessToDataSources @@ -12454,33 +12217,6 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on LastWrite - - IntranetZoneInitializeAndScriptActiveXControlsNotMarkedSafe - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone - IZ_PolicyScriptActiveXNotMarkedSafe_3 - LastWrite - - IntranetZoneJavaPermissions @@ -15613,33 +15349,6 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on LastWrite - - RestrictedSitesZoneNavigateWindowsAndFramesAcrossDomains - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone - IZ_PolicyNavigateSubframesAcrossDomains_7 - LastWrite - - RestrictedSitesZoneRunActiveXControlsAndPlugins @@ -15775,33 +15484,6 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on LastWrite - - RestrictedSitesZoneTurnOnCrossSiteScriptingFilter - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone - IZ_PolicyTurnOnXSSFilter_Both_Restricted - LastWrite - - RestrictedSitesZoneTurnOnProtectedMode @@ -16234,33 +15916,6 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on LastWrite - - TrustedSitesZoneDontRunAntimalwareProgramsAgainstActiveXControls - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone - IZ_PolicyAntiMalwareCheckingOfActiveXControls_5 - LastWrite - - TrustedSitesZoneInitializeAndScriptActiveXControls @@ -16288,60 +15943,6 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on LastWrite - - TrustedSitesZoneInitializeAndScriptActiveXControlsNotMarkedAsSafe - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone - IZ_PolicyScriptActiveXNotMarkedSafe_5 - LastWrite - - - - TrustedSitesZoneInitializeAndScriptActiveXControlsNotMarkedSafe - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone - IZ_PolicyScriptActiveXNotMarkedSafe_5 - LastWrite - - TrustedSitesZoneJavaPermissions @@ -16436,6 +16037,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + LowestValueMostSecure @@ -16549,6 +16151,31 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + HidePeopleBar + + + + + Enabling this policy removes the people icon from the taskbar as well as the corresponding settings toggle. It also prevents users from pinning people to the taskbar. + 0 + + + + + + + + + + + text/plain + + + phone + LowestValueMostSecure + + StartLayout @@ -16636,7 +16263,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - com.microsoft/5.0/MDM/Policy + com.microsoft/6.0/MDM/Policy @@ -19470,7 +19097,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to cellular data. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to cellular data. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. @@ -19494,7 +19121,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to cellular data. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to cellular data. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. @@ -19518,7 +19145,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the cellular data access setting for the listed apps. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the cellular data access setting for the listed apps. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. @@ -19986,7 +19613,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - EnableWindowsAutoPilotResetCredentials + DisableAutomaticReDeploymentCredentials @@ -20743,6 +20370,54 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + ControlledFolderAccessAllowedApplications + + + + + + + + + + + + + + + + + + + text/plain + + + + + ControlledFolderAccessProtectedFolders + + + + + + + + + + + + + + + + + + + text/plain + + + DaysToRetainCleanedMalware @@ -20768,7 +20443,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - EnableGuardMyFolders + EnableControlledFolderAccess @@ -20887,54 +20562,6 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - - GuardedFoldersAllowedApplications - - - - - - - - - - - - - - - - - - - text/plain - - - - - GuardedFoldersList - - - - - - - - - - - - - - - - - - - text/plain - - - PUAProtection @@ -23723,30 +23350,6 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor - - DisableBlockingOfOutdatedActiveXControls - - - - - - - - - - - - - - - - - - - text/plain - - - DisableBypassOfSmartScreenWarnings @@ -25091,30 +24694,6 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor - - InternetZoneRunNETFrameworkReliantComponentsNotSignedWithAuthenticode - - - - - - - - - - - - - - - - - - - text/plain - - - InternetZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode @@ -25187,30 +24766,6 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor - - InternetZoneWebsitesInLessPrivilegedZonesCanNavigateIntoThisZone - - - - - - - - - - - - - - - - - - - text/plain - - - IntranetZoneAllowAccessToDataSources @@ -25475,30 +25030,6 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor - - IntranetZoneInitializeAndScriptActiveXControlsNotMarkedSafe - - - - - - - - - - - - - - - - - - - text/plain - - - IntranetZoneJavaPermissions @@ -28283,30 +27814,6 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor - - RestrictedSitesZoneNavigateWindowsAndFramesAcrossDomains - - - - - - - - - - - - - - - - - - - text/plain - - - RestrictedSitesZoneRunActiveXControlsAndPlugins @@ -28427,30 +27934,6 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor - - RestrictedSitesZoneTurnOnCrossSiteScriptingFilter - - - - - - - - - - - - - - - - - - - text/plain - - - RestrictedSitesZoneTurnOnProtectedMode @@ -28859,30 +28342,6 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor - - TrustedSitesZoneDontRunAntimalwareProgramsAgainstActiveXControls - - - - - - - - - - - - - - - - - - - text/plain - - - TrustedSitesZoneInitializeAndScriptActiveXControls @@ -28907,54 +28366,6 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor - - TrustedSitesZoneInitializeAndScriptActiveXControlsNotMarkedAsSafe - - - - - - - - - - - - - - - - - - - text/plain - - - - - TrustedSitesZoneInitializeAndScriptActiveXControlsNotMarkedSafe - - - - - - - - - - - - - - - - - - - text/plain - - - TrustedSitesZoneJavaPermissions @@ -29753,66 +29164,6 @@ Default: No message. - - NetworkAccess_DoNotAllowAnonymousEnumerationOfSAMAccountsAndShares - - - - - - - - Network access: Do not allow anonymous enumeration of SAM accounts and shares - -This security setting determines whether anonymous enumeration of SAM accounts and shares is allowed. - -Windows allows anonymous users to perform certain activities, such as enumerating the names of domain accounts and network shares. This is convenient, for example, when an administrator wants to grant access to users in a trusted domain that does not maintain a reciprocal trust. If you do not want to allow anonymous enumeration of SAM accounts and shares, then enable this policy. - -Default: Disabled. - - - - - - - - - - - text/plain - - - - - NetworkAccess_RestrictAnonymousAccessToNamedPipesAndShares - - - - - - - - Network access: Restrict anonymous access to Named Pipes and Shares - -When enabled, this security setting restricts anonymous access to shares and pipes to the settings for: - -Network access: Named pipes that can be accessed anonymously -Network access: Shares that can be accessed anonymously -Default: Enabled. - - - - - - - - - - - text/plain - - - NetworkAccess_RestrictClientsAllowedToMakeRemoteCallsToSAM @@ -29869,34 +29220,6 @@ This policy will be turned off by default on domain joined machines. This would - - RecoveryConsole_AllowAutomaticAdministrativeLogon - - - - - - - - Recovery console: Allow automatic administrative logon - -This security setting determines if the password for the Administrator account must be given before access to the system is granted. If this option is enabled, the Recovery Console does not require you to provide a password, and it automatically logs on to the system. - -Default: This policy is not defined and automatic administrative logon is not allowed. - - - - - - - - - - - text/plain - - - Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn @@ -30488,7 +29811,7 @@ The options are: - + This policy setting allows backup and restore of cellular text messages to Microsoft's cloud services. @@ -30512,7 +29835,7 @@ The options are: - + This policy setting allows you to enable or disable the sending and receiving cellular MMS messages. @@ -30536,7 +29859,7 @@ The options are: - + This policy setting allows you to enable or disable the sending and receiving of cellular RCS (Rich Communication Services) messages. @@ -31512,7 +30835,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to the camera. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to the camera. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. @@ -31536,7 +30859,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to the camera. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to the camera. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. @@ -31560,7 +30883,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the camera privacy setting for the listed apps. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the camera privacy setting for the listed apps. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. @@ -31608,7 +30931,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to contacts. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to contacts. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. @@ -31632,7 +30955,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to contacts. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to contacts. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. @@ -31656,7 +30979,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the contacts privacy setting for the listed apps. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the contacts privacy setting for the listed apps. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. @@ -31704,7 +31027,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to email. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to email. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. @@ -31728,7 +31051,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to email. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to email. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. @@ -31752,7 +31075,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the email privacy setting for the listed apps. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the email privacy setting for the listed apps. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. @@ -31800,7 +31123,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to location. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to location. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. @@ -31824,7 +31147,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to location. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to location. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. @@ -31848,7 +31171,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the location privacy setting for the listed apps. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the location privacy setting for the listed apps. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. @@ -31896,7 +31219,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed to read or send messages (text or MMS). This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed to read or send messages (text or MMS). This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. @@ -31920,7 +31243,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are not allowed to read or send messages (text or MMS). This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are not allowed to read or send messages (text or MMS). This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. @@ -31944,7 +31267,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the messaging privacy setting for the listed apps. This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the messaging privacy setting for the listed apps. This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. @@ -31992,7 +31315,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to the microphone. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to the microphone. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. @@ -32016,7 +31339,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to the microphone. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to the microphone. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. @@ -32040,7 +31363,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the microphone privacy setting for the listed apps. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the microphone privacy setting for the listed apps. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. @@ -32088,7 +31411,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to motion data. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to motion data. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. @@ -32112,7 +31435,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to motion data. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to motion data. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. @@ -32136,7 +31459,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the motion privacy setting for the listed apps. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the motion privacy setting for the listed apps. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. @@ -32184,7 +31507,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to notifications. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to notifications. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. @@ -32208,7 +31531,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to notifications. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to notifications. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. @@ -32232,7 +31555,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the notifications privacy setting for the listed apps. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the notifications privacy setting for the listed apps. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. @@ -32280,7 +31603,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed to make phone calls. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed to make phone calls. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. @@ -32304,7 +31627,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are not allowed to make phone calls. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are not allowed to make phone calls. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. @@ -32328,7 +31651,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the phone call privacy setting for the listed apps. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the phone call privacy setting for the listed apps. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. @@ -32376,7 +31699,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will have access to control radios. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will have access to control radios. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. @@ -32400,7 +31723,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will not have access to control radios. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will not have access to control radios. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. @@ -32424,7 +31747,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the radios privacy setting for the listed apps. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the radios privacy setting for the listed apps. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. @@ -32472,7 +31795,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to tasks. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to tasks. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. @@ -32496,7 +31819,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to tasks. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to tasks. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. @@ -32520,7 +31843,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the tasks privacy setting for the listed apps. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the tasks privacy setting for the listed apps. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. @@ -32568,7 +31891,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will have access to trusted devices. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will have access to trusted devices. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. @@ -32592,7 +31915,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will not have access to trusted devices. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will not have access to trusted devices. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. @@ -32616,7 +31939,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the 'trusted devices' privacy setting for the listed apps. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the 'trusted devices' privacy setting for the listed apps. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. @@ -32856,7 +32179,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will be allowed to communicate with unpaired wireless devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will be allowed to communicate with unpaired wireless devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. @@ -32880,7 +32203,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will not be allowed to communicate with unpaired wireless devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will not be allowed to communicate with unpaired wireless devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. @@ -32904,7 +32227,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the 'Communicate with unpaired wireless devices' privacy setting for the listed apps. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the 'Communicate with unpaired wireless devices' privacy setting for the listed apps. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. @@ -34559,6 +33882,30 @@ The options are: + + AllowOnlineTips + + + + + + + + + + + + + + + + + + + text/plain + + + AllowPowerSleep @@ -35273,30 +34620,6 @@ The options are: - - HidePeopleBar - - - - - - - - Enabling this policy removes the people icon from the taskbar as well as the corresponding settings toggle. It also prevents users from pinning people to the taskbar. - - - - - - - - - - - text/plain - - - HidePowerButton @@ -35893,6 +35216,30 @@ The options are: + + DisableEnterpriseAuthProxy + + + + + + + + This policy setting blocks the Connected User Experience and Telemetry service from automatically using an authenticated proxy to send data back to Microsoft on Windows 10. If you disable or do not configure this policy setting, the Connected User Experience and Telemetry service will automatically use an authenticated proxy to send data back to Microsoft. Enabling this policy will block the Connected User Experience and Telemetry service from automatically using an authenticated proxy. + + + + + + + + + + + text/plain + + + DisableOneDriveFileSync @@ -35902,7 +35249,7 @@ The options are: - This policy setting lets you prevent apps and features from working with files on OneDrive. If you enable this policy setting: users can’t access OneDrive from the OneDrive app and file picker; Microsoft Store apps can’t access OneDrive using the WinRT API; OneDrive doesn’t appear in the navigation pane in File Explorer; OneDrive files aren’t kept in sync with the cloud; Users can’t automatically upload photos and videos from the camera roll folder. If you disable or do not configure this policy setting, apps and features can work with OneDrive file storage. + This policy setting lets you prevent apps and features from working with files on OneDrive. If you enable this policy setting: users can’t access OneDrive from the OneDrive app and file picker; Windows Store apps can’t access OneDrive using the WinRT API; OneDrive doesn’t appear in the navigation pane in File Explorer; OneDrive files aren’t kept in sync with the cloud; Users can’t automatically upload photos and videos from the camera roll folder. If you disable or do not configure this policy setting, apps and features can work with OneDrive file storage. @@ -35965,6 +35312,30 @@ The options are: + + LimitEnhancedDiagnosticDataWindowsAnalytics + + + + + + + + This policy setting, in combination with the Allow Telemetry policy setting, enables organizations to send Microsoft a specific set of diagnostic data for IT insights via Windows Analytics services. To enable this behavior you must complete two steps: 1. Enable this policy setting 2. Set Allow Telemetry to level 2 (Enhanced) When you configure these policy settings, a Basic level of diagnostic data plus additional events that are required for Windows Analytics are sent to Microsoft. These events are documented here: https://go.microsoft.com/fwlink/?linkid=847594. Enabling Enhanced diagnostic data in the Allow Telemetry policy in combination with not configuring this policy will also send the required events for Windows Analytics, plus additional Enhanced level telemetry data. This setting has no effect on computers configured to send Full, Basic or Security level diagnostic data to Microsoft. If you disable or do not configure this policy setting, then the level of diagnostic data sent to Microsoft is determined by the Allow Telemetry policy. + + + + + + + + + + + text/plain + + + TelemetryProxy @@ -38467,6 +37838,7 @@ The options are: text/plain + desktop LowestValueMostSecure @@ -38491,6 +37863,7 @@ The options are: text/plain + LowestValueMostSecure @@ -38514,6 +37887,7 @@ The options are: text/plain + LowestValueMostSecure @@ -38557,6 +37931,7 @@ The options are: text/plain + LowestValueMostSecure @@ -38580,6 +37955,7 @@ The options are: text/plain + LowestValueMostSecure @@ -38603,6 +37979,7 @@ The options are: text/plain + LastWrite @@ -38760,6 +38137,7 @@ The options are: text/plain + LowestValueMostSecure @@ -38806,6 +38184,7 @@ The options are: text/plain + LowestValueMostSecure @@ -38829,6 +38208,7 @@ The options are: text/plain + phone LowestValueMostSecure @@ -38853,6 +38233,7 @@ The options are: text/plain + LowestValueMostSecure @@ -38876,6 +38257,7 @@ The options are: text/plain + desktop LowestValueMostSecure @@ -38924,6 +38306,7 @@ The options are: text/plain + LowestValueMostSecure @@ -38947,6 +38330,7 @@ The options are: text/plain + LowestValueMostSecure @@ -38970,6 +38354,7 @@ The options are: text/plain + LowestValueMostSecure @@ -39789,6 +39174,7 @@ The options are: text/plain + phone LowestValueMostSecure @@ -39813,6 +39199,7 @@ The options are: text/plain + LowestValueMostSecure @@ -39836,6 +39223,7 @@ The options are: text/plain + phone LowestValueMostSecure @@ -39860,6 +39248,7 @@ The options are: text/plain + LowestValueMostSecure @@ -40004,6 +39393,7 @@ The options are: text/plain + LastWrite @@ -40047,6 +39437,7 @@ The options are: text/plain + LowestValueMostSecure @@ -40070,6 +39461,7 @@ The options are: text/plain + LowestValueMostSecure @@ -40093,6 +39485,7 @@ The options are: text/plain + LowestValueMostSecure @@ -40182,6 +39575,7 @@ The options are: text/plain + phone LowestValueMostSecure @@ -40206,6 +39600,7 @@ The options are: text/plain + LowestValueMostSecure @@ -40229,6 +39624,7 @@ The options are: text/plain + desktop LowestValueMostSecure @@ -40276,6 +39672,7 @@ The options are: text/plain + phone LowestValueMostSecure @@ -40300,6 +39697,7 @@ The options are: text/plain + LowestValueMostSecure @@ -40323,6 +39721,7 @@ The options are: text/plain + phone LowestValueMostSecure @@ -40347,6 +39746,7 @@ The options are: text/plain + phone HighestValueMostSecure @@ -40371,6 +39771,7 @@ The options are: text/plain + phone HighestValueMostSecure @@ -40395,6 +39796,7 @@ The options are: text/plain + LowestValueMostSecure @@ -40422,6 +39824,7 @@ If you disable this setting, the Microsoft Compatibility List will not be used d text/plain + LowestValueMostSecure @@ -40445,6 +39848,7 @@ If you disable this setting, the Microsoft Compatibility List will not be used d text/plain + LowestValueMostSecure @@ -40468,6 +39872,7 @@ If you disable this setting, the Microsoft Compatibility List will not be used d text/plain + phone LowestValueMostSecure @@ -40497,6 +39902,7 @@ This policy will only apply on domain joined machines or when the device is MDM text/plain + LowestValueMostSecure @@ -40520,6 +39926,7 @@ This policy will only apply on domain joined machines or when the device is MDM text/plain + LowestValueMostSecure @@ -40543,6 +39950,7 @@ This policy will only apply on domain joined machines or when the device is MDM text/plain + LowestValueMostSecure @@ -40566,6 +39974,7 @@ This policy will only apply on domain joined machines or when the device is MDM text/plain + LowestValueMostSecure @@ -40589,6 +39998,7 @@ This policy will only apply on domain joined machines or when the device is MDM text/plain + phone LowestValueMostSecure @@ -40647,6 +40057,7 @@ This setting can only be used with domain-joined or MDM-enrolled devices. For mo text/plain + phone LowestValueMostSecure @@ -40779,6 +40190,7 @@ If you disable or don't configure this setting (default), employees can add, imp text/plain + LowestValueMostSecure @@ -40802,6 +40214,7 @@ If you disable or don't configure this setting (default), employees can add, imp text/plain + HighestValueMostSecure @@ -40827,6 +40240,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + phone HighestValueMostSecure @@ -40853,6 +40267,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + HighestValueMostSecure @@ -40876,6 +40291,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + HighestValueMostSecure @@ -40899,6 +40315,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + HighestValueMostSecure @@ -40922,6 +40339,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + HighestValueMostSecure @@ -40975,6 +40393,7 @@ If you disable or don't configure this setting, employees will see the favorites text/plain + phone HighestValueMostSecure @@ -41028,6 +40447,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + phone HighestValueMostSecure @@ -41052,6 +40472,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + phone LowestValueMostSecure @@ -41096,6 +40517,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + LowestValueMostSecure @@ -41148,7 +40570,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to cellular data. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to cellular data. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. @@ -41172,7 +40594,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to cellular data. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to cellular data. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. @@ -41196,7 +40618,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the cellular data access setting for the listed apps. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the cellular data access setting for the listed apps. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. @@ -41280,6 +40702,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + LowestValueMostSecure @@ -41349,6 +40772,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + LowestValueMostSecure @@ -41372,6 +40796,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + desktop LowestValueMostSecure @@ -41396,6 +40821,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + desktop LowestValueMostSecure @@ -41420,6 +40846,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + LowestValueMostSecure @@ -41443,6 +40870,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + LowestValueMostSecure @@ -41679,13 +41107,13 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - EnableWindowsAutoPilotResetCredentials + DisableAutomaticReDeploymentCredentials - 0 + 1 @@ -41698,7 +41126,8 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain - LowestValueMostSecure + + HighestValueMostSecure @@ -41881,6 +41310,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + LowestValueMostSecure @@ -42431,6 +41861,54 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on LastWrite + + ControlledFolderAccessAllowedApplications + + + + + + + + + + + + + + + + + text/plain + + phone + LastWrite + + + + ControlledFolderAccessProtectedFolders + + + + + + + + + + + + + + + + + text/plain + + phone + LastWrite + + DaysToRetainCleanedMalware @@ -42456,7 +41934,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - EnableGuardMyFolders + EnableControlledFolderAccess @@ -42575,54 +42053,6 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on LastWrite - - GuardedFoldersAllowedApplications - - - - - - - - - - - - - - - - - text/plain - - phone - LastWrite - - - - GuardedFoldersList - - - - - - - - - - - - - - - - - text/plain - - phone - LastWrite - - PUAProtection @@ -42903,6 +42333,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + phone LowestValueMostSecure @@ -42951,6 +42382,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + phone LastWrite @@ -43307,6 +42739,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + phone HighestValueMostSecure @@ -43331,6 +42764,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + phone LowestValueMostSecureZeroHasNoLimits @@ -43355,6 +42789,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + phone HighestValueMostSecure @@ -43473,6 +42908,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on text/plain + desktop LowestValueMostSecure @@ -44247,6 +43683,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain + desktop LowestValueMostSecure @@ -44271,6 +43708,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain + LowestValueMostSecure @@ -44294,6 +43732,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain + LowestValueMostSecure @@ -44317,6 +43756,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain + LowestValueMostSecure @@ -44340,6 +43780,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain + LowestValueMostSecure @@ -44363,6 +43804,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain + LowestValueMostSecure @@ -44386,6 +43828,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain + LowestValueMostSecure @@ -44409,6 +43852,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain + LowestValueMostSecure @@ -44432,6 +43876,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain + HighestValueMostSecure @@ -44455,6 +43900,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain + LowestValueMostSecure @@ -44478,6 +43924,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain + desktop LowestValueMostSecure @@ -44502,6 +43949,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain + desktop LowestValueMostSecure @@ -44526,6 +43974,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain + phone LowestValueMostSecure @@ -44636,6 +44085,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain + LowestValueMostSecure @@ -44679,6 +44129,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain + phone LowestValueMostSecure @@ -45486,33 +44937,6 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor LastWrite - - DisableBlockingOfOutdatedActiveXControls - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement - VerMgmtDisable - LastWrite - - DisableBypassOfSmartScreenWarnings @@ -47025,33 +46449,6 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor LastWrite - - InternetZoneRunNETFrameworkReliantComponentsNotSignedWithAuthenticode - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone - IZ_PolicyUnsignedFrameworkComponentsURLaction_1 - LastWrite - - InternetZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode @@ -47133,33 +46530,6 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor LastWrite - - InternetZoneWebsitesInLessPrivilegedZonesCanNavigateIntoThisZone - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone - IZ_PolicyZoneElevationURLaction_1 - LastWrite - - IntranetZoneAllowAccessToDataSources @@ -47457,33 +46827,6 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor LastWrite - - IntranetZoneInitializeAndScriptActiveXControlsNotMarkedSafe - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone - IZ_PolicyScriptActiveXNotMarkedSafe_3 - LastWrite - - IntranetZoneJavaPermissions @@ -50616,33 +49959,6 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor LastWrite - - RestrictedSitesZoneNavigateWindowsAndFramesAcrossDomains - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone - IZ_PolicyNavigateSubframesAcrossDomains_7 - LastWrite - - RestrictedSitesZoneRunActiveXControlsAndPlugins @@ -50778,33 +50094,6 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor LastWrite - - RestrictedSitesZoneTurnOnCrossSiteScriptingFilter - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone - IZ_PolicyTurnOnXSSFilter_Both_Restricted - LastWrite - - RestrictedSitesZoneTurnOnProtectedMode @@ -51264,33 +50553,6 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor LastWrite - - TrustedSitesZoneDontRunAntimalwareProgramsAgainstActiveXControls - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone - IZ_PolicyAntiMalwareCheckingOfActiveXControls_5 - LastWrite - - TrustedSitesZoneInitializeAndScriptActiveXControls @@ -51318,60 +50580,6 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor LastWrite - - TrustedSitesZoneInitializeAndScriptActiveXControlsNotMarkedAsSafe - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone - IZ_PolicyScriptActiveXNotMarkedSafe_5 - LastWrite - - - - TrustedSitesZoneInitializeAndScriptActiveXControlsNotMarkedSafe - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone - IZ_PolicyScriptActiveXNotMarkedSafe_5 - LastWrite - - TrustedSitesZoneJavaPermissions @@ -51621,6 +50829,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain + phone LowestValueMostSecure @@ -51645,6 +50854,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor text/plain + phone LowestValueMostSecure @@ -51695,6 +50905,7 @@ If you disable or do not configure this policy (recommended), users will be able text/plain + phone LastWrite @@ -52186,66 +51397,6 @@ Default: No message. LastWrite - - NetworkAccess_DoNotAllowAnonymousEnumerationOfSAMAccountsAndShares - - - - - Network access: Do not allow anonymous enumeration of SAM accounts and shares - -This security setting determines whether anonymous enumeration of SAM accounts and shares is allowed. - -Windows allows anonymous users to perform certain activities, such as enumerating the names of domain accounts and network shares. This is convenient, for example, when an administrator wants to grant access to users in a trusted domain that does not maintain a reciprocal trust. If you do not want to allow anonymous enumeration of SAM accounts and shares, then enable this policy. - -Default: Disabled. - 0 - - - - - - - - - - - text/plain - - phone - LastWrite - - - - NetworkAccess_RestrictAnonymousAccessToNamedPipesAndShares - - - - - Network access: Restrict anonymous access to Named Pipes and Shares - -When enabled, this security setting restricts anonymous access to shares and pipes to the settings for: - -Network access: Named pipes that can be accessed anonymously -Network access: Shares that can be accessed anonymously -Default: Enabled. - 1 - - - - - - - - - - - text/plain - - phone - LastWrite - - NetworkAccess_RestrictClientsAllowedToMakeRemoteCallsToSAM @@ -52302,34 +51453,6 @@ This policy will be turned off by default on domain joined machines. This would LastWrite - - RecoveryConsole_AllowAutomaticAdministrativeLogon - - - - - Recovery console: Allow automatic administrative logon - -This security setting determines if the password for the Administrator account must be given before access to the system is granted. If this option is enabled, the Recovery Console does not require you to provide a password, and it automatically logs on to the system. - -Default: This policy is not defined and automatic administrative logon is not allowed. - 0 - - - - - - - - - - - text/plain - - phone - LastWrite - - Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn @@ -52494,6 +51617,7 @@ The options are: text/plain + phone LastWrite @@ -52811,6 +51935,7 @@ The options are: text/plain + phone LowestValueMostSecure @@ -52855,6 +51980,7 @@ The options are: text/plain + LastWrite @@ -52878,6 +52004,7 @@ The options are: text/plain + LastWrite @@ -52907,7 +52034,7 @@ The options are: - + This policy setting allows backup and restore of cellular text messages to Microsoft's cloud services. 1 @@ -52921,7 +52048,6 @@ The options are: text/plain - desktop LowestValueMostSecure @@ -52931,7 +52057,7 @@ The options are: - + This policy setting allows you to enable or disable the sending and receiving cellular MMS messages. 1 @@ -52955,7 +52081,7 @@ The options are: - + This policy setting allows you to enable or disable the sending and receiving of cellular RCS (Rich Communication Services) messages. 1 @@ -53554,6 +52680,7 @@ The options are: text/plain + LowestValueMostSecure @@ -53577,6 +52704,7 @@ The options are: text/plain + 10.0.10240 LowestValueMostSecure @@ -53601,6 +52729,7 @@ The options are: text/plain + LowestValueMostSecureZeroHasNoLimits @@ -53624,6 +52753,7 @@ The options are: text/plain + HighestValueMostSecure @@ -53941,7 +53071,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to the camera. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to the camera. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. @@ -53965,7 +53095,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to the camera. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to the camera. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. @@ -53989,7 +53119,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the camera privacy setting for the listed apps. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the camera privacy setting for the listed apps. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. @@ -54036,7 +53166,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to contacts. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to contacts. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. @@ -54060,7 +53190,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to contacts. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to contacts. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. @@ -54084,7 +53214,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the contacts privacy setting for the listed apps. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the contacts privacy setting for the listed apps. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. @@ -54131,7 +53261,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to email. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to email. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. @@ -54155,7 +53285,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to email. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to email. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. @@ -54179,7 +53309,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the email privacy setting for the listed apps. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the email privacy setting for the listed apps. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. @@ -54226,7 +53356,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to location. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to location. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. @@ -54250,7 +53380,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to location. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to location. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. @@ -54274,7 +53404,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the location privacy setting for the listed apps. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the location privacy setting for the listed apps. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. @@ -54321,7 +53451,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed to read or send messages (text or MMS). This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed to read or send messages (text or MMS). This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. @@ -54345,7 +53475,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are not allowed to read or send messages (text or MMS). This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are not allowed to read or send messages (text or MMS). This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. @@ -54369,7 +53499,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the messaging privacy setting for the listed apps. This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the messaging privacy setting for the listed apps. This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. @@ -54416,7 +53546,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to the microphone. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to the microphone. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. @@ -54440,7 +53570,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to the microphone. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to the microphone. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. @@ -54464,7 +53594,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the microphone privacy setting for the listed apps. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the microphone privacy setting for the listed apps. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. @@ -54511,7 +53641,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to motion data. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to motion data. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. @@ -54535,7 +53665,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to motion data. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to motion data. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. @@ -54559,7 +53689,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the motion privacy setting for the listed apps. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the motion privacy setting for the listed apps. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. @@ -54606,7 +53736,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to notifications. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to notifications. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. @@ -54630,7 +53760,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to notifications. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to notifications. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. @@ -54654,7 +53784,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the notifications privacy setting for the listed apps. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the notifications privacy setting for the listed apps. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. @@ -54701,7 +53831,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed to make phone calls. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed to make phone calls. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. @@ -54725,7 +53855,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are not allowed to make phone calls. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are not allowed to make phone calls. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. @@ -54749,7 +53879,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the phone call privacy setting for the listed apps. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the phone call privacy setting for the listed apps. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. @@ -54796,7 +53926,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will have access to control radios. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will have access to control radios. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. @@ -54820,7 +53950,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will not have access to control radios. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will not have access to control radios. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. @@ -54844,7 +53974,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the radios privacy setting for the listed apps. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the radios privacy setting for the listed apps. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. @@ -54891,7 +54021,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to tasks. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to tasks. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. @@ -54915,7 +54045,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to tasks. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to tasks. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. @@ -54939,7 +54069,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the tasks privacy setting for the listed apps. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the tasks privacy setting for the listed apps. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. @@ -54986,7 +54116,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will have access to trusted devices. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will have access to trusted devices. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. @@ -55010,7 +54140,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will not have access to trusted devices. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will not have access to trusted devices. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. @@ -55034,7 +54164,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the 'trusted devices' privacy setting for the listed apps. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the 'trusted devices' privacy setting for the listed apps. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. @@ -55271,7 +54401,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will be allowed to communicate with unpaired wireless devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will be allowed to communicate with unpaired wireless devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. @@ -55295,7 +54425,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will not be allowed to communicate with unpaired wireless devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will not be allowed to communicate with unpaired wireless devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. @@ -55319,7 +54449,7 @@ The options are: - List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the 'Communicate with unpaired wireless devices' privacy setting for the listed apps. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the 'Communicate with unpaired wireless devices' privacy setting for the listed apps. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. @@ -55357,6 +54487,7 @@ The options are: text/plain + HighestValueMostSecure @@ -56441,6 +55572,7 @@ The options are: text/plain + LowestValueMostSecure @@ -56464,6 +55596,7 @@ The options are: text/plain + LowestValueMostSecure @@ -56487,6 +55620,7 @@ The options are: text/plain + LowestValueMostSecure @@ -56715,6 +55849,7 @@ The options are: text/plain + LowestValueMostSecure @@ -56738,6 +55873,7 @@ The options are: text/plain + desktop LowestValueMostSecure @@ -56762,6 +55898,7 @@ The options are: text/plain + LowestValueMostSecure @@ -56785,6 +55922,7 @@ The options are: text/plain + desktop LowestValueMostSecure @@ -56809,6 +55947,7 @@ The options are: text/plain + phone HighestValueMostSecure @@ -56945,6 +56084,7 @@ The options are: text/plain + phone LowestValueMostSecure @@ -56969,6 +56109,7 @@ The options are: text/plain + LowestValueMostSecure @@ -56992,6 +56133,7 @@ The options are: text/plain + LowestValueMostSecure @@ -57015,6 +56157,7 @@ The options are: text/plain + LowestValueMostSecure @@ -57038,10 +56181,35 @@ The options are: text/plain + phone LowestValueMostSecure + + AllowOnlineTips + + + + + + 1 + + + + + + + + + + + text/plain + + + LowestValueMostSecure + + AllowPowerSleep @@ -57062,6 +56230,7 @@ The options are: text/plain + phone LowestValueMostSecure @@ -57086,6 +56255,7 @@ The options are: text/plain + phone LowestValueMostSecure @@ -57110,6 +56280,7 @@ The options are: text/plain + phone LowestValueMostSecure @@ -57134,6 +56305,7 @@ The options are: text/plain + LowestValueMostSecure @@ -57157,6 +56329,7 @@ The options are: text/plain + phone LowestValueMostSecure @@ -57181,6 +56354,7 @@ The options are: text/plain + LowestValueMostSecure @@ -57247,6 +56421,7 @@ The options are: text/plain + phone HighestValueMostSecure @@ -57271,6 +56446,7 @@ The options are: text/plain + phone HighestValueMostSecure @@ -57295,6 +56471,7 @@ The options are: text/plain + phone HighestValueMostSecure @@ -57339,6 +56516,7 @@ The options are: text/plain + LowestValueMostSecure @@ -57382,6 +56560,7 @@ The options are: text/plain + phone LowestValueMostSecure @@ -57406,6 +56585,7 @@ The options are: text/plain + phone LowestValueMostSecure @@ -57430,6 +56610,7 @@ The options are: text/plain + phone LowestValueMostSecure @@ -57454,6 +56635,7 @@ The options are: text/plain + phone LowestValueMostSecure @@ -57478,6 +56660,7 @@ The options are: text/plain + phone LowestValueMostSecure @@ -57502,6 +56685,7 @@ The options are: text/plain + phone LowestValueMostSecure @@ -57526,6 +56710,7 @@ The options are: text/plain + phone LowestValueMostSecure @@ -57550,6 +56735,7 @@ The options are: text/plain + phone LowestValueMostSecure @@ -57574,6 +56760,7 @@ The options are: text/plain + phone LowestValueMostSecure @@ -57598,6 +56785,7 @@ The options are: text/plain + phone LowestValueMostSecure @@ -57670,6 +56858,7 @@ The options are: text/plain + LowestValueMostSecure @@ -57693,6 +56882,7 @@ The options are: text/plain + phone LowestValueMostSecure @@ -57717,6 +56907,7 @@ The options are: text/plain + LowestValueMostSecure @@ -57740,30 +56931,7 @@ The options are: text/plain - LowestValueMostSecure - - - - HidePeopleBar - - - - - Enabling this policy removes the people icon from the taskbar as well as the corresponding settings toggle. It also prevents users from pinning people to the taskbar. - 0 - - - - - - - - - - - text/plain - - phone + LowestValueMostSecure @@ -57787,6 +56955,7 @@ The options are: text/plain + LowestValueMostSecure @@ -57810,6 +56979,7 @@ The options are: text/plain + phone LowestValueMostSecure @@ -57834,6 +57004,7 @@ The options are: text/plain + phone LowestValueMostSecure @@ -57858,6 +57029,7 @@ The options are: text/plain + LowestValueMostSecure @@ -57881,6 +57053,7 @@ The options are: text/plain + LowestValueMostSecure @@ -57904,6 +57077,7 @@ The options are: text/plain + LowestValueMostSecure @@ -57927,6 +57101,7 @@ The options are: text/plain + LowestValueMostSecure @@ -57950,6 +57125,7 @@ The options are: text/plain + LowestValueMostSecure @@ -57973,6 +57149,7 @@ The options are: text/plain + LowestValueMostSecure @@ -58020,6 +57197,7 @@ The options are: text/plain + phone HighestValueMostSecure @@ -58182,6 +57360,7 @@ The options are: text/plain + LowestValueMostSecure @@ -58228,6 +57407,7 @@ The options are: text/plain + LowestValueMostSecure @@ -58274,6 +57454,7 @@ The options are: text/plain + LowestValueMostSecure @@ -58320,6 +57501,7 @@ The options are: text/plain + LowestValueMostSecure @@ -58351,12 +57533,12 @@ The options are: - DisableOneDriveFileSync + DisableEnterpriseAuthProxy - This policy setting lets you prevent apps and features from working with files on OneDrive. If you enable this policy setting: users can’t access OneDrive from the OneDrive app and file picker; Microsoft Store apps can’t access OneDrive using the WinRT API; OneDrive doesn’t appear in the navigation pane in File Explorer; OneDrive files aren’t kept in sync with the cloud; Users can’t automatically upload photos and videos from the camera roll folder. If you disable or do not configure this policy setting, apps and features can work with OneDrive file storage. + This policy setting blocks the Connected User Experience and Telemetry service from automatically using an authenticated proxy to send data back to Microsoft on Windows 10. If you disable or do not configure this policy setting, the Connected User Experience and Telemetry service will automatically use an authenticated proxy to send data back to Microsoft. Enabling this policy will block the Connected User Experience and Telemetry service from automatically using an authenticated proxy. 0 @@ -58370,6 +57552,30 @@ The options are: text/plain + LastWrite + + + + DisableOneDriveFileSync + + + + + This policy setting lets you prevent apps and features from working with files on OneDrive. If you enable this policy setting: users can’t access OneDrive from the OneDrive app and file picker; Windows Store apps can’t access OneDrive using the WinRT API; OneDrive doesn’t appear in the navigation pane in File Explorer; OneDrive files aren’t kept in sync with the cloud; Users can’t automatically upload photos and videos from the camera roll folder. If you disable or do not configure this policy setting, apps and features can work with OneDrive file storage. + 0 + + + + + + + + + + + text/plain + + HighestValueMostSecure @@ -58423,6 +57629,30 @@ The options are: LastWrite + + LimitEnhancedDiagnosticDataWindowsAnalytics + + + + + This policy setting, in combination with the Allow Telemetry policy setting, enables organizations to send Microsoft a specific set of diagnostic data for IT insights via Windows Analytics services. To enable this behavior you must complete two steps: 1. Enable this policy setting 2. Set Allow Telemetry to level 2 (Enhanced) When you configure these policy settings, a Basic level of diagnostic data plus additional events that are required for Windows Analytics are sent to Microsoft. These events are documented here: https://go.microsoft.com/fwlink/?linkid=847594. Enabling Enhanced diagnostic data in the Allow Telemetry policy in combination with not configuring this policy will also send the required events for Windows Analytics, plus additional Enhanced level telemetry data. This setting has no effect on computers configured to send Full, Basic or Security level diagnostic data to Microsoft. If you disable or do not configure this policy setting, then the level of diagnostic data sent to Microsoft is determined by the Allow Telemetry policy. + 0 + + + + + + + + + + + text/plain + + + LowestValueMostSecure + + TelemetryProxy @@ -58486,6 +57716,7 @@ The options are: text/plain + phone LowestValueMostSecure @@ -58510,6 +57741,7 @@ The options are: text/plain + phone LowestValueMostSecure @@ -58534,6 +57766,7 @@ The options are: text/plain + phone LowestValueMostSecure @@ -58582,6 +57815,7 @@ The options are: text/plain + phone LowestValueMostSecure @@ -58606,6 +57840,7 @@ The options are: text/plain + phone LowestValueMostSecure @@ -58630,6 +57865,7 @@ The options are: text/plain + phone LowestValueMostSecure @@ -58654,6 +57890,7 @@ The options are: text/plain + LowestValueMostSecure @@ -58677,6 +57914,7 @@ The options are: text/plain + phone LowestValueMostSecure @@ -58792,6 +58030,7 @@ The options are: text/plain + desktop LowestValueMostSecure @@ -58975,6 +58214,7 @@ The options are: text/plain + LowestValueMostSecure @@ -58998,6 +58238,7 @@ The options are: text/plain + LowestValueMostSecure @@ -59044,6 +58285,7 @@ The options are: text/plain + LastWrite @@ -59090,6 +58332,7 @@ The options are: text/plain + LastWrite @@ -59366,6 +58609,7 @@ The options are: text/plain + LowestValueMostSecure @@ -59389,6 +58633,7 @@ The options are: text/plain + LowestValueMostSecure @@ -59780,6 +59025,7 @@ The options are: text/plain + LastWrite @@ -59803,6 +59049,7 @@ The options are: text/plain + LastWrite @@ -59939,6 +59186,7 @@ The options are: text/plain + LowestValueMostSecure @@ -59962,6 +59210,7 @@ The options are: text/plain + LowestValueMostSecure @@ -59985,6 +59234,7 @@ The options are: text/plain + LowestValueMostSecure @@ -60008,6 +59258,7 @@ The options are: text/plain + LowestValueMostSecure @@ -60031,6 +59282,7 @@ The options are: text/plain + LowestValueMostSecure @@ -60453,6 +59705,7 @@ The options are: text/plain + phone LowestValueMostSecure @@ -60575,6 +59828,7 @@ The options are: text/plain + HighestValueMostSecure @@ -60618,6 +59872,7 @@ The options are: text/plain + LowestValueMostSecure @@ -60641,6 +59896,7 @@ The options are: text/plain + LowestValueMostSecure @@ -60666,6 +59922,7 @@ The options are: text/plain + LowestValueMostSecure @@ -60691,6 +59948,7 @@ The options are: text/plain + LowestValueMostSecure @@ -60716,6 +59974,7 @@ The options are: text/plain + phone LowestValueMostSecure @@ -60742,6 +60001,7 @@ The options are: text/plain + LowestValueMostSecure @@ -60765,6 +60025,7 @@ The options are: text/plain + LowestValueMostSecure @@ -60790,6 +60051,7 @@ The options are: text/plain + LowestValueMostSecure From 53990c726051e668e61174a6dca0589c7491405f Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 25 Oct 2017 14:30:25 -0700 Subject: [PATCH 04/13] add preview topics --- windows/threat-protection/TOC.md | 1 + ...ows-defender-advanced-threat-protection.md | 70 +++++++++++++++++++ ...ows-defender-advanced-threat-protection.md | 9 +++ 3 files changed, 80 insertions(+) create mode 100644 windows/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md diff --git a/windows/threat-protection/TOC.md b/windows/threat-protection/TOC.md index ce3a47ceb7..a13dd273a6 100644 --- a/windows/threat-protection/TOC.md +++ b/windows/threat-protection/TOC.md @@ -30,6 +30,7 @@ ###### [Configure endpoints using Microsoft Intune](windows-defender-atp\configure-endpoints-mdm-windows-defender-advanced-threat-protection.md#configure-endpoints-using-microsoft-intune) ##### [Configure endpoints using a local script](windows-defender-atp\configure-endpoints-script-windows-defender-advanced-threat-protection.md) ##### [Configure non-persistent virtual desktop infrastructure (VDI) machines](windows-defender-atp\configure-endpoints-vdi-windows-defender-advanced-threat-protection.md) +#### [Configure non-Windows endpoints](windows-defender-atp\configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md) #### [Configure server endpoints](windows-defender-atp\configure-server-endpoints-windows-defender-advanced-threat-protection.md) #### [Configure proxy and Internet connectivity settings](windows-defender-atp\configure-proxy-internet-windows-defender-advanced-threat-protection.md) #### [Troubleshoot onboarding issues](windows-defender-atp\troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) diff --git a/windows/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md b/windows/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md new file mode 100644 index 0000000000..57ac6b4408 --- /dev/null +++ b/windows/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md @@ -0,0 +1,70 @@ +--- +title: Configure non-Windows endpoints in Windows Defender ATP +description: Configure non-Winodws endpoints so that they can send sensor data to the Windows Defender ATP service. +keywords: configure endpoints non-Windows endpoints, macos, linux, endpoint management, configure Windows ATP endpoints, configure Windows Defender Advanced Threat Protection endpoints +search.product: eADQiWindows 10XVcnh +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +author: mjcaparas +localizationpriority: high +ms.date: 10/02/2017 +--- + +# Configure non-Windows endpoints + +**Applies to:** + +- Mac OS X +- Linux +- Windows Defender Advanced Threat Protection (Windows Defender ATP) + +[!include[Prerelease information](prerelease.md)] + +Windows Defender ATP provides a centralized security operations experience for Windows as well as non-Windows platforms. You'll be able to see alerts from various supported operating systems (OS) in the Windows Defender ATP portal and better protect your organization's network. This experience leverages on a third-party security products’ sensor data. + +You'll need to know the exact Linux distros and Mac OS X versions that are compatible with Windows Defender ATP for the integration to work. + +## Onboard non-Windows endpoints +You'll need to take the following steps to onboard non-Windows endpoints: +1. Turn on third-party integration +2. Run a detection test + +### Turn on third-party integration + +1. In Windows Defender Security Center portal, select **Endpoint management** > **Clients** > **Non-Windows**. Make sure the third-party solution is listed. + +2. Toggle the third-party provider switch button to turn on the third-party solution integration. + +3. Click **Generate access token** button and then **Copy**. + +4. Depending on the third-party implementation you're using, the implementation might vary. Refer to the third-party solution documentation for guidance on how to use the token. + + +>[!WARNING] +>The access token has a limited validity period. If needed, regenerate the token close to the time you need to share it with the third-party solution. + +### Run detection test +There are various methods to run a detection test. Follow the specific instructions for each third-party product as described in the portal. The typical way of running a detection test is by creating an EICAR test file. You can create an EICAR file by saving the string displayed on the portal in an empty text file. Then, introduce the test file to a machine running the third-party antivirus solution. + +The file should trigger a detection and a corresponding alert on Windows Defender ATP. + +### Offboard non-Windows endpoints +To effectively offboard the endpoints from the service, you'll need to disable the data push on the third-party portal first then switch the toggle to off in Windows Defender Security Center. The toggle in the portal only blocks the data inbound flow. + + +1. Follow the third-party documentation to opt-out on the third-party service side. + +2. In Windows Defender Security Center portal, select **Endpoint management**> **Non-Windows**. + +3. Toggle the third-party provider switch button to turn stop telemetry from endpoints. + +>[!WARNING] +>If you decide to turn on the third-party integration again after disabling the integration, you'll need to regenerate the token and reapply it on endpoints. + +## Related topics +- [Configure Windows Defender ATP client endpoints](configure-endpoints-windows-defender-advanced-threat-protection.md) +- [Configure server endpoints](configure-server-endpoints-windows-defender-advanced-threat-protection.md) +- [Configure proxy and Internet connectivity settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md) +- [Troubleshooting Windows Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) \ No newline at end of file diff --git a/windows/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md b/windows/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md index a9f61d94fe..f57a807c89 100644 --- a/windows/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md +++ b/windows/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md @@ -44,6 +44,14 @@ Turn on the preview experience setting to be among the first to try upcoming fea ## Preview features The following features are included in the preview release: +- [Configure server endpoints](configure-server-endpoints-windows-defender-advanced-threat-protection.md)
+Windows Defender ATP supports the onboarding of the following servers: + - Windows Server 2012 R2 + - Windows Server 2016 + +- [Configure non-Windows endpoints](configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md) +Windows Defender ATP provides a centralized security operations experience for Windows as well as non-Windows platforms. You'll be able to see alerts from various supported operating systems (OS) in the Windows Defender ATP portal and better protect your organization's network. This experience leverages on a third-party security products’ sensor data. + - [Create and build Power BI reports using Windows Defender ATP data](powerbi-reports-windows-defender-advanced-threat-protection.md)
Windows Defender ATP supports the use of Power BI data connectors to enable you to connect and access Windows Defender ATP data using Microsoft Graph. @@ -51,5 +59,6 @@ Windows Defender ATP supports the use of Power BI data connectors to enable you Windows Defender ATP exposes much of the available data and actions using a set of programmatic APIs that are part of the Microsoft Intelligence Security Graph. Those APIs will enable you, to automate workflows and innovate based on Windows Defender ATP capabilities. + >Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-preview-belowfoldlink) From 936311258c2135f088d6c56c59a88513e6c6011c Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 25 Oct 2017 14:52:57 -0700 Subject: [PATCH 05/13] update image --- .../images/atp-enable-security-analytics.png | Bin 318767 -> 232675 bytes 1 file changed, 0 insertions(+), 0 deletions(-) diff --git a/windows/threat-protection/windows-defender-atp/images/atp-enable-security-analytics.png b/windows/threat-protection/windows-defender-atp/images/atp-enable-security-analytics.png index 9d8ae5a5cdf2620b50ef385c4c9d5c337c0648ad..a51dd8d30a6c02085c039f27814dc55785910676 100644 GIT binary patch delta 196313 zcmZsDby!s0`t~5Hl7fJ=peT(9NJ%KA(kLM@gh)$=)Fz~15JgHFMLMO2l9Wbb=@73Tz-QSOan7OE;m+|*Tr^m%`LjS{(lDbd)&t~@5 zSR&poEeV@;cfOr+Uwk|(L=6S_kShscq4ZqnyG1v}#4gWvkJfDk~ zf3I|2F&y=)g~L^Itqd2Y7T#GV_NSx0Fj1mmbFD%{G!17ze#ah*$y%e=n$J}UPA=Ft z?D~(4^_HZA(`C3Rw6#drJD~0HCxiF#LHTQ^9O$vgRc&6H1TiP-82zHDbz$Mlz{npT(n$rt?k z?-y>0Z8wqICyDrKM#)S>r-)N1k)jdJ2NSykOvN;rFR|CktmnRcR{CZBBQd}<*^^RP z{P>N=*AQ6#XbX7sABNhLg4UyVAse#3^s1OsR>}%{e{P|!Pl>sLqaB& z6cou=5t|ZSg%B~)O62jizL(_6Y++%swN}z&w7)v&x|HZrti}b*H9d8CKDE8quiP>H zjk+`kF^xlv!zG~D*h~cvYb24Ndo<`+{pwoLNZ@lwWl%!+f@d)}{&gnNLH5l-$-JFQL^WQkxt4 zb@kr#rx)B(%#rm@D80Z$QI~dDzF9f=a~5CX2&<~P+N7HG##Kj0N0<<))=jJtdQs>4 zGHW`|y*|V-j8{l#S^h_)(vNNMFtZYuyAlg!GPGLJ{*#mXu#Y}(75lf8FQGkUp@U)L z?P))f*^AT7m{S$MsUC?-v3E858kKOnPK3}bfx=foA{*p(z<9EWHlK>sm|*wgLtR2* z;@KqkjRw(8BuhE?k|NJj=bt}+PJ`eu;~wHKB}27VjEfYk5c7X7nz%j*GsKRXI#ZBjhKSlv(xNbeKUwcJ24R`h!j%?- z>=+Z)oh|V6jf@1#gi_A5u|!DoQa2&!MgOstnHhm;f?WXTR|1P{k~ieiwd3!17iZk3 zP8sqm7in}Ix&(w)zI`sVop~}`7GC3iI2!?-vFJnRkQ1j?Vf_QOmpBHv0`UC!2$yeT zR4exfkTt#{vjdxl#%5-1k@vLv`Cq<#Y0wofU}kRKAb`^K10SCgnhSfFVoo#Zv8yO{ zIPP$tgQL+@;#7Ntn?oa4k}pnLP7dGeuzJd{!55b=<+PonVET9|xz&BMCh%d8nEGPq zWQi#Wq>=a9|8%38#5CzWYlh<20N?>)7e{l$l@9l6_w#HFH^wV>v_kfM8&c+6Pd&tu zhm-CV3(-2ZQ=W&Z+1bw-$}cZAFI(UjJ5(NXv{Us7!VYxDpEs*F#dY5=e5sg2h;Ef6 zpA%lE;%@qB-fuvSm-K$|7ADIP;9RNLZlQ%tNcFz)37@W&6q$5T>Ute72%Ycs7r7t4 zJ8P6U!|oQEBcu-SdBIadak&q_^v}~NPb)8{+Fj~t1-IJ*DRX*B;!^lxoAHvYmCk|i zVk=NW=;Z6D9Cy_+^WOgc%-5+iR!UASZ?F(z*w%o$^33-b{a+7S>HKV<(=h^n=!yM= zu5egz(0{J`5_tY3d;*HUrl(UnZ(bK-Op6ZHlEuMome+vsIr&gyaa>6&AGg20*pnPF zb+-8EsLRF+n`w7C|9E$4?mGPF3MPps*tfI6h;fGS@bMq;^M5elUA`YfKzOD8p2YF9 zahEC2;h*N1Pz@Ox(l~-V#66B08C$O2OYr9L+77KanhjlO(<9TRAmLV*V+u`~Gb=AB z^NV-T^b|@Uhz%WYv3Py0pMSfV$BV3$-i6LeJB-= zb8fmh%{%0_EXLoJCC>TFtVVp#PY+p037BpKPwysQigim|LLLc@f1bhkq(BNX+ywGTn4?Jet%q+7F3ygFnvJx6nne16fB+_r!hB1$7L4W&^4cjl8x;Gl6p()tfEp5#k~6^Ht5^3Og3HEQ+_Cu|A)b zM6Slby@b0(p-r($n{C{H4D+MKM|D?0P5=QsH)5LHJYMNwx7|!7D(ihYR(DRz;I@4G zY?i97UKu)3H;WILi;!T*(JYWvR3zG{Tw-{yAWdvkH^qZJ9c?mGJ$24Kl&2GjKoDC^ zRNVw+0XSl#NsL}VD0dY>iD{2>0_|$!4#wmV=C@4O(UX1j`U_17zP<(OqL2Hmlgpko zsWSb1LWe2JY=b}NgUPHg`?ci)uK~5G*%kBzd}4iQod^G z9VuwXeG4QV4waL2YUDtCLzjP1cS=3Kh)>i8wYZX*FIAzsxTICgmZ&&Q{ zRF{9x-xMzcPX_EIZEVcKT{(Y4*J<#Tupe@xmhY1T=CS^{yzv=ay@mZr1j(9i_&gRU z)UZ-AETVUs|1pdpKm;>ENy9Pn53!gmrSr68!^&>@7?R0THmH{7TGYS95s=wZ=~Q=U z4mk;457|dD{1hBr51r03;}GZyII_d{YTmJMBk4nwS$Cvli9FY|f=>iw2BwHp6MGYS zea&F=I}R{p`ttm@b>^|};Cj%ddR7#RN*IyXl13t6X4?G8% z*M3H*n?8@6_A)hXRXkI^#@@T~dDhT!b=gFKdYO3is?kp?_AmBp>NsgKk3Gbb2??^D zUShkYjc<5QnL%Ydz!E=BB*lw71%$YKGgp@_1uEG72n7{~I7!oncoGv43Hx@fmdW(0 zawWsc1mQl9;7-%N)afB_Yd!_G7#YK^7G#rQ(ADclBTtVqIm!NNPTS&itRsUk;q^Zi%ApO zB0hA=;H(Yc*Joipc%Y24JWi6Keps*=>}1oCxFMCuS~hohTH@=Q=D`eOx5uf*9$^^O0ActB{drjWZiN3&ksl9QPxNwmphDN%pJW+Q+ z9XqA+K&M?ibfUJJ=sMTjBm`dR(Ud)OMj{eL6uV4wyE|@%Y1Z-EZlWIZXdWYFciaZM z&g(`Ys*O)V>!^WV>$Qu_Up<~QV5e9HdC*O0o9^95d@ zV*iJ!&E)0Tzm8kOvwdO39IwKx_#xl4HXXY0K0xOA)&Jg{nMNm_(7XC=~ZSa5cALe%AlCqE0v}hTwT8&-Iu*nYH zh{FwVF)@us1v*^Sq4|96|9p@NLGgDtn3+#txAx@?-CfCFyV1bv{{+h6=`{97-nweF z+F0q|-_U7gd}-#Q_}5C((syTpo&H{FB+y6I2#SDpd`EhzG3inM$fO%MRdW?bAniRLv6v%6vma8G`(lIE>i!yo3Zg8i~l+{Nyx*!&c!`R*oxz|s*I;7 zr`U|EggqtJwBn7DZufB~Y$c))e{CKVM4ZtVK{4d%ZQjuI4x$#vuJWSJb(v}i%+MJw zS+YJl_kOo5|2-h(79Rf;Lu@pWV)9kJas%y7ga3UmzrHLZ1s+V%uV=~6daUq|ITLk# zV}#g;OQ%tVZ&*iIYq%*`u~()aC0L8ye@Q(+R|F$7%sJ> z;$Pn?x-ao}F%TKq7lVPTp4b5-RYb!>fd-?2b0yc83>&fnjpvl1hygE&+|;Zs^uz6% zuSQ!$BNc{Sb%wTEw%-m$d2^?=27Lavts(rYDYooi0!-p0>q*RLYR}hgj1Q{?hjO*C z8+i?=MG)dA_c?W`n?EaGPy#rQXFwgxX98Wb8e<3*A^p1^GSx^~dWy1hHYNk3kmE<3 zCj-H;a64wf^R*>vJ~jE%Kh%7mv>Z;^zc~@13Mz?OQt;sIurpQ#PlEUi>@p(RLS{x7 zj0yHkTI!`DD%G3@W_<)PeJ=VNF<`YV?U{bRdim?iBAB#ypck(mlRCzCG=5l(VmT)Gz3Ju~LC9v$U&VjI~f`^^`ax%dKZPI``_7 zKZZVnRh-v+-9Ed{!}LYrNwPToNfaAzzj>@VdAwnL88!9)LXCzao%q@hH8!oXa173Z zPHAl$i5}H&ou=rp{#l{G>@V`-L`UeNV$L9*QsL752%zDx2x^g`f=jlfky?7#bn*l2 z4D(-fbRQ@QBvJgaSrkx8gct9_e|MkEBuwN!9si%qGx!&wmCtf>wfpN^b5D8k`>DmO zNDDbR&z=xwrQW7ipY%7;HmiLvTzmFi#ACC8%C=Ea!iQ&C4loTCW(2+b%RVqG*jo{z z#?3(Ucw-gCzY)*Oe5Hlyz8HYTv^G^_Hk;6`U)JRl*TzJM0($T*m-S$A9u44cPaoNK zbd^tcTuwb1pDM$8G_l7EV|pw^K#j+**Yhm|n6DVtk8^g>M;Y-y2c!VoBiAEN_9KbX zo5y_CMdI@2&lOgyv6kJ-NB$hqaG$6+U!v(i6i;j209Vr?qX*vQDHL#;s?%@CL?HU{ z*411rUTa!V#2G|Psp;-2{A*tR7T}Xfk8BtOU08V?%t(PR1TsFv{^8-luyMNWrWK9b zXo_jhGV83wz0T%{v^>$uu(5!AbRp;UGLr_uha_M8tg)kUyEX&gQWq*bd}#l#KLY&O z(gYk*;%wXaXy$Sx%)srMLdUON*nu3YiWo01Z)Edd zS4k6Vd2>J6TBl;IxWo3>c7NY!6@%r__y-Q2Izsf=1$K_+RID~@qA$q7J*JZVj>FNo zdZum!X;0$_aIo>OG?iH!Z%)>bzq<4HhU^9d$Fyfhq6!_-jWN+ihiK95ZAiFZRgI;0n4eifatP zE>f9DJ*awJjI(?2C*CL-raeuRr@ie}ZcPgyIPAf{cIHl3Vl<3ry|DXzJZyUK1SPOM ziXpe85h#fA8&gAwP+q?R4L(Vi1qI2=MhclH(8b;5XXk3t4ZkWgqUb4PZDNoPG&YP3r(#$il8X@iN&vSJv zZ-7U7e~1ms%gbZoSiWu65zR#oRb4uvhf>SRD8s|U$zLOW-=Pdm{qY0;tDyC#{uZ>5 zCuxsQpP7wK&wD*{D=TStchTAHigd_ks#fo!Aio@tULP6_rPEcV)BBL9?5D4U=$!Y^ zV9WR)Ju=>1?7F*O3I5^e;vzapZZ|RA3rAWf3m!?@;hGKv^$}Q zXZenXre>ftv(LuH#wSQt=J4>4h2k20)2Dy@SCJEgF0YVY^Y5KXKBW|3a>#LZcdz!~ zlHJVe|N8Z7-}rb~bTlP+trds0#pAz`-MjPo8Ehnd z#y+c{K+eUbd`U!4PtVNE>|+5-WDpB!Qci8XPoK+^S}3w&gUrzAjhdWXU~UBJ#KOI@ zBV*`#8-xEMce)U_k+940gf)xopY8-<@`;Iwq}Hb@5wx)PYZIq!Ix!17HmT~M0_$=LoUnVLH8>-gU3;%U}0 zdV@|-=t|6Sd*;xy$CorTG{x=r0b3)7Af!AwIeBwD-ap7wH&9J0t*w!-yK?_?HF1#^ zVPaw;jBi~-RaI532EeXDn;ok3IG&7G7mJaUGmF z@oc`5C^)ZN`m*x~21{^TvUD{>rFi5a+G~~@yu|)^PE&iKb6IScDoYkDAAHgjf=rxA zdkTaYeoP+Iz^0FHwsyP^-B@qV!G5}2?Ug^y14EYdNJD(#*I90VkeL6>;x}k-o}=Fs zmV)R>cBN)mQF*GcgRQoU|Y_%#`Vw?BuWZ`gYBLx>$!F%IZ zV+`HVFE6iRLjQPg;gy)4SBC^9mc-$KQ%_xs%b=E!=a#U#|K=am4X9UTo%+8lId)lv<*g zBjsK33Yr4n6+xGPjgNB>qzwK2k}+8N%Bxqel1@okaD1>^aogx#l%5$?iSk&$;f!y) z;=efMzBHmQq8F$yF>J&WuKE7`E;_a=R&zAVy9VIFuq!_L}Q%D%L1~r?Cb4il3Tw90th@eLNcuyo?Tfw zac#d5?1%P7baZrrPu=$yG0bra?K{nLb|0SHzLi2|egA?ditovK`HbywUkh{4-9;XF z?Ks&0dxrkTjS~?{3|uUXfn{lzeLWp=44k#@`c!)!&sPA*60} zQEBPT($Z3pr4SC^V#T#OOBL7MH@xmf|8_bjA3yKOtEw6;3fC@qE4;XnBL@<@o4fnt zg3IQ1P4NP>BtMN4PAZlGNVY-J%BC`SFgU9=A%893bIws z$Jf*FykDHt8en|aH2Lc3!DquMFFtXHaeiTCoDa=Nn?xs^jg$4MH??rGu+t%Jxi*ux ziVy9}zQj;D6B$Vz^ADFNC)`x<@M_*Z0Hv-8yE;-$(*G30{spt` zxm;_RSYo`}ar7&{Ay>B|!ttKnDHY-aC<=TPnQl%7^7)YAoq2+v*_1trh>JI)k>r)< zl?o~L9XA;Pc=YCY?Q3X^Wp#khHQkGdo7GxGOH8e3WyBsp*)BY5W6I7r9|o(s z;@`FbnA4Z)D>Y*WSTvlD;vH_|F+r=b=mN$5s5;OawTkV#?3Y#{P{kIvnl6w-WE~5y zHP7C~XXv)*)phXH(ZP?~HH*s>`L%=V-+?j)0Sxk3!aIjC43sWX;=m%ixt0eb(48BR zjBUVo=~!Z9KFSfLaOsqBqOpIX1P3EUJ7RcTa{EU|SC0zmgQW{CQQWYRawXK@;O`yl z;X*9nN%j+F{2_o(@A~?PN^dGVo4vAD)b(a)b8&m^o8LEtY3vOQU=K|hs3%m-puIdD zPaK~=(a~NMYKhtqH9UO3JVz-)Hk}}_QCKd$)#w4J_N^Ds^J3Vi zinwHI=YGDM5a|&YR5N~095kIgDkmenTUv@jg2?G{(95&b)T9DKI{H>*R@T+uZ}?18 zz72b6$@A05+^6^j*n5}|Hk1tlC=xD2M@%)Iz#=Uk_dP^Ut@|KY#IR`Q%6R zBSx1|IwuO}TDPEDr1Sb~VR+32RnCB=Pj#NRf`k^*wPIqWlB`cg0KnK z1niCmuzkb@3Qy26Q=g@@VHLaMBfu4VFLYT8kG341c`R0#BUFLpSQl z#HH>QPlO}qfQj`0hB7LuryPkfLZ<4$&t`>m9UgSv|~l8z}&v8wCm zzkeFn$t?1d*Rx3~TImNF0S@eqZzdqs6O|g5I{42qbDFVt)kL5l4KOqS zjhWC|VdGY1k0=BDyM|yo=_3h?HjzR(4VMw=p%yIr`BTv%{ED9; zbjV78VLiWMr83O^F|3!LDB9$=)8J0_7!^9iIuuNComOA2O}I}-+)R7wPhC0K+v^Ro z=dJl?te^RCeJpZ!9J13ZycHzXaJGT9`~d*#QI+~`r9OZ6rq3;=Q%Xa!X$)`$K2DeT z&8t^|_4AIi`WI25s0f;Qtb`Rv6b}#YjqPL&;m50j{QUeW#l^+b>t*@?Q&Mv4F2}N7 zc~w(WWAE<26Z~$fw#FcFqMT>xTIa#uUX*Uc6MOnGwRuscYM0G!c8A*Wa{sUeVHE%_ ziD(5~GcwyyL)h5ZNlSZRCDY{+S2+65h2=um1Do&j@Wf=14M38w`DwoRBp98> zRw-y}#~}saR;~1O2?Cas&YR*}4VAHOSqtkcD-Fda9libiegI7ac*_E6(Rom{&^X&m z*(VA8=jZ1j4(`$y7@ZoVT7IpDDkGkyqLWpYb;;93A6X4g9~GymJO%;B$|x&D!%|5Z zRG%h41)FCW$%nj-XUaed={fKD`iO^PItQ;?CNWg_a$p}68M15s#Y5T^wuVEe-CY$to}v&N{Cb?=)T3VAm#h#&anwyE-R*)L|Kvx>-ku?pk%gt-kT@x&P;JqmfC(^6 z_t4nbbC(`VBQ@69A!d6k3lHz$EuJ{hnt%zUmdMM&6hn5cw5}?-w(f^2WqZD5kdz@a zB+|rt-{WIegBsunLH}8pVzSra-1(vV~2HmwKiV|`Oon*`hff`Vy9MP&Q?(7yJu=ZhlaR^nEA zJeJ>zV$rA>kC5LI`axQC85ykTj>zq7xvT-NB7j{~zxN7L05wBg$Za^{=yzrmdgayi zx3icAtCTP+Iarw228e!@VZ18-zm`af=huGRw<4?s?tSeg$HiL>dgcCF9#4BL`31t9d+bST&P!&^0-^2=SP^vtEx@jP-(|AW8)~9Hz5O zH=QTv;_0~;V5xru*B3vx;`#C%7_xFxl4)ArBo)fPw-{`l%@TsK9&G*a^s%}+DgE<- zNbS}2?m6p&wGoyo+=0i%c4KAM#Y&*yU{G4Ux5%h6Db}#95T`^gkYgp3HzE8n_-rS1 zky*{_&gb8`I%d1uBGJsT8tuzv9<4HAW$M_X$Ff#k3BnK2x3zpxW(6K3GMop)5F%PL zj$}xf?~ema=wqE@V*n9sr`##O7S-SXS>TiQUD@*JPX~s%C$~QeQ-P!;_-=ezp6s^l z@(>E;j(EfAuZ2n^Zk*6>9>~ehS4t{3dJQ(j&CRV4ShN#FwB;q}_O&YQ?}9q~!opN_ zabx3M+@F-(+|CESb=2uAke{#SrG2?+5vtC}di3X2fFAe`9a7yWENBY?ixH0e*_JyQt%W+NH&`#e=RdkPu2Br@Z`;<(m^%>Xj)N30w^i0L1N$ zl)Jm@RsBpA3tuHH<9%EXge5F1#uJk>_u6S=- zsC-sx^gV`%j`i&ITcOQ6cuLZ>rUDgQt2`$uqYRbro>A`5>oAe?-?C;h-JXS-lRR@j zZVTZLTrdY2sMMCdv#@Aibx%9r2_L5rPS-5ZUyn_)`Ea1M|MWH;ae7I~LypH%@81gp zcar-u`V_PrI~})G^_#J6_hy~D-q#5@A;k+toi!$9`27uoJmDsP#clOC~YV>hgz^Q(!ebZvcDj`9{Cvc|6=cV1+d+Y1T^+y;bUYO0iy!%`2q zkFiTO?%<#AFHFS8)!va&u5b?UmHqrVuO}z=OmAK)9~3V}CeY{q#;go2o9Nc*{udK{jnkCag z55H;8V@WCBEfb|xFemznLZ#2_r9Q{*cLg(R>o06dI4?0Skt z`|9EIHn4q-GeA+@Y8nTQ1(@Q{f=iDd3T!DEPh5{a@#*d{(d{<-b#92c2$mgg#s~*@ zJQ2rWrlfS}$!;YEKmoTdQM((oGJB|td6!^av0U_a)JVgpeqph?SyxOyy}p-Mf@o_m zSv%OeYr;3-`?W1NH_wfXO7@BNae#~`U!~teIBAYaw-XZCUbsB@GxszsCF#`xy62*> zQ+4fCIiLbW4(_ShMgcIQCgH{!-U=6JLJpC0P= zaG~MT5+_OQriJ19tz}Ko-MsWXlRu1R)XCo83D#Dti1kq0t2qT}Wo1L#fiW~^`)-nS zFkQRmn@1h+3tu@#PYR${3ci;l$w~PXNR|Mb74Q;b_Xq97*?s}kjFIhPl!);eGjJgG z>l+#h*aZ4TKqy^-A-8^AuK?0oyAhL^8B6#n4Vdb!4(9ar_4!Dg&5*#nfo}E+kUiF8 zlzkxNrh()%I_q}r#eTsYMgq9lop>FruJ&=q?D7djg>Xj|C21MRJLg zzKE9ZiRShzD=W83@CyOSke-)E1Y~tz9fgyEmwTD)*BG83JFT2^fT_R{NMv93NXxgG z?RS-05;~=&9nD;)eeh$&XAQ{B>2M;WrN&n|^(FQP)H8E)o8nB9f-wR?_2d%@j9?g6 z??)mY1dzbE9n?w>#CP);MJYx;xKVfM1&dQ{i8e6=&}T~!!LPa@w70hKnE z*;3i5{a#dXpf%rKvVJ73Y9D~iM--!LADo+&_O3A-V)4BCzG3k#9yV3eGd*o4xmu!)z!2! zwysTVFN0csg~+-59>8)*h6ZqASjW=b-M5?2?hjZpJ6=+OX%tIy%9a%Cm29K=bGinsC0;^B8pq>_LmC~k-W*I;c01&k>LbCj%SA?0_?J_GThl4HVA(<*S zAx{4rJ3yK{EcPZ64g{uyQAs!u8{x+hd|a*KmfHhL=*pejlFY6a)ObK+dFCYn1iLJm zZUd@vw-c2*Bw}T}HO?o>thJ)=${kz8v&tRT0wHg#pfyCpuhCCSx0-IUgg0Za^D9E1D?NWG zC5F6YzuWQ9a)?t5D1rHguhX@8a+cjLyXWQInK=Wbs4Nj;YItdi{Y{_~L;y6b?bXOj zN{CnFvN>sIruTQi%gm1J_iGMF4uySxM#|#=!l>f%;uItx&9()FejLoH2bj=SN?8YY zH6d7z&{Bc}G+$hmpI%c#4+PW^bc3`6IB%w@z0cq{A7yS~q|vPm?u1~cct8nW!pLJ6 zV&KsoA?qQLbs(1k4S3U-O;(^+%M%90Qf83I8peyYG z9Wd~%t((X0n6nN)lD%j&b?qQrc6Ro80yyAf%xUs#4qnHt-UfQw{tU&6Y2WKxS<0Tz z5tQO5%jtlal!e7HZ3C}zk>k}2W2VfamsWA>OOwHftZhM(Fa{j6{mITk#{<)DI^io? zIFZd}MzD(Iw9wwEsfg;0s_RpylZP-E$>TjzqoUY3Lub$(L+k%qvTr^$4_-G}>$uNC zu7@DIu5B|LKKX;p7XUwg9env#MlC(U$XN3wvX=jsMzMVYbax z!e(+H3f-6PHXx&;%wmAG8RVYW3LSbi+pmhmXWag$>yr~VEJ9Xy8qx1J*so$QA`g@y zMmjJcjD2X@EluV3SIVKw;5vNh=rVm4rxT?{$XdLb)oxBmlhX>QVPcZisgdLb_`E~?9#*w z6^T+pP!_OPL>F#((561hl6G~IIR!mg>+X3dcF6a=^N^k6?<}26QS3kS$k1jLb@jPe z%7|7~ZS7z%yZ|U!QRO#lva1*Z5XH!jmztWUrKS&%h(^pDjmW5III|2>!@ygc=C&WO z52n6IXg%&W?9&enDH2fzQ&bOUIUxNH;_{QFN2 z_-3+TX;#HCFhNNL!*(z;CD)637P^@wExjkz0H*kn_}hkANTi4FizgtX24+uGyBGt7 z7r7oG2*NZ@j0B*vY0eHXc`z6lXo{)dZ8Cb$v$8REJtrq;!8&~-QdmFT_ImjA_VbD9 zQhFz-Zey&|(!ydM>0!N^&@>t0|C1GdcWcp)YoEEI6(%WG>uIs1Y8ASV{$_Cac`WXk@GS{Qfy4@)FAm9A+ zv4@{7mTK`b*Vn}b_1C{M_<=>`q64av7ua?3y_oX9_~-j?%uR1Nr0K3YL&%fwqYV04 zgvdY7Dh}7hxi`FCFP|*GijHKUEmf{oPo1ygcB`SPM62BI@^e4d%~BrUWCJwF`vS%d z!QW2$Is48r_onvmQ-%s()Y>urc(UYPwC`N*qdDaa7rkc9f!gmyZzMfg5l5cnzP>b? zRG)C_7>xEG{TbyYCoRoC1W|)&yFG@X1v5fe%J=WMI%QVBU%v%yE{57CApoQ8R2BJ2 zeJ$YiAtBcQ{RDmu3=O5Frp}~H6>Ec_7~aI3`q%~M$k>*?fZ6{UY-Dsa%kBN$a#P3$Z)W;7Xk@Hs~d1sfD?B(H9b9R z(!;@j)9r%6IQPITs(W0NV$;pkl)BKg(l4?*zEx4r?NC_%2R? zQkMq~1wpNIz;Qb*e&}A?M}h81PA8b>ySIW)b%dR%sp;e%Y}P}wpkY;Pe>kYPy8H)& zpBewP`u7uN78dMUWm=rkgCsA3ECFF3@Z@%DDLX@i=t=tWb$!%BCsE8e>7-%|6P@;n z9^=Dev0Q(=WE*fkKHwSR`fjx$ z4%kF>`w`^9(#BWJhpesh2(QQj)ebX629DZ|6zSHUeVPRVj?C8um?r>V1U!0qdAS~x z^MzuJwuEm!NB#C}g34II@OVb$iJ#`J^ggq0o);mh4ET0l!N%3^CaQAhG{ACpM+ZUK z0R)iT=_5fwW}0xfZgLYBn*uPzvm^9gL(8TX0}nI+9khMYDJ0}pqnU{^DX5*+Z^_XG zs7cg$t!;#1HeNgEv?3GLXw-eL+|SNRT7v8CyhZ9E^K^aX%J;guslIoBIAdwo&QH?O zU&?epa_?xZ$N^s z=~f#xHMMP6?@bH|;N#=t_d5UXi|CY^n#Y#kOdv?&)9-I{8Zu6Atl7qWK8%!@QqehO zdTo(0o{ckpn@E2%Uj8SWu?*>ZD^;a!8#2_Yu`a2s9C>(OH|Xe!q{mix>l~Q2YWpx7 zjue~hXc)e-vEg}=sxssT&aiP>G%cC|Wl<{u7hvN|zbmP9XliJ%cCcPaCn6%cJ2e~6 z6Qpl7va?^Q*1lLOQEC%n(v;UY+sYvsl|usi$auCpq0i~72i}VrKP^4g)Pw-3JRkdb zzzmhImvr10x_;?9%IK{i%B5S;TZBCEf0;Ef$8^9kYInFXv4gxJalFAfTBm>Y%ZxTcG_wCAcQj3FO>7p{eDR^N%YgO*04*WD-*WOfi2moMxY@(MhLe-DI zLm%^xNu8{KtDCYz)a6DX`W^ZdYiP~*Ns85b@^qJ$k?(hlYi(blxmMHOS%O_=xe!h7 zJ)Q)aae3)jHvVvLZ@xzMN?Vnn8}8fI6Sw=BY(k%Yzftv+1M&7~vFmG$Kn)Tp#=(?a zpx8`LcC6+_N=8PnAP(!@;r=JokKz<}z8ngLsv0xHXH$n3kAuAKh%2CmhLqxe6h%0V07gqVtq;luj8dGJ?A;R%8(MBF zzWqn#9wwo(=|HW*2lsq%er4KE>0Sv?2(>iz-Jox_?1{hrT#ug3psn-Q8Om)M709uj3(o=i zXO69XIZ(Hldd?#U_b1KRkV6PF3a$FFWV&VY$i^2BxUFv>q!{3@LuU-g7RZ8TULA?OGk|t!8Ta zLst-W92trtc(#8Q``F!C1F9oS-;`}cSA;m?8e0QbyK6m`)BPmhat6%GLTQ9W{}h8+ z8PF?%iYX!+TP5ckGRJ-5qbV9Xr)f1Uq?sspnxxWsJTI8kn({^j}js<`uIGl5`pEi z#A6>^dP)PLONf+AF$I*KbfEbJgsAAQKVjr-#=q}W zy%BigIw8&&E^9I=c4!@P{I2})+H=Is{o6YAJ_l_6uMdEeVee z6hH&w`#z#(v;>LN%@ES6aVs^}2U1e-69u5z$~>dfAW`dpukz-pUYQ3L1s+wHc0cHz zFaK<+Xk}0otA)gkF_B>t2jKGvn3blc<`BMJQP}GYEl!O;@0tD}Dk929CBUKeH(tHK z{&Fe3=P3fJcsxJ|g37a^OImiEg|AB?ybIvcau2jDfF`Vf-(ANn%f?8P&4A)7y`bYp9p`lh8!uAyGPN?{a2&YI8^1LI39a}*Q3$M3w>+m?t238EiKz0Ft%u+sX?#U0+QgLY!*`* z1yZXq_5S&C$N7PPV1_=!y+W;Tp6EQutJb8ywx8(X#If)W@36M{R09lsK{@~=wzI5y86Aw4{-bn@AyeM%mgD?vnFwf%R&l8LbBj;s{pWV>HB~jb(grzE zI!U2}qoeFLaX5TZsO;?QG`Z_QW!f1p@FIVcdkWxz-7V%B{zuA8B!~{#Y!e zBykskhD~w2HZ zQPp5{5Rr!}x@F$}(WrfK0~=cP0$e8WxcMs3%%U3{ym!x3`>))z1Vebl;Wuz=UlIbY zJE-HAnKt3AMQmls?-MQk-_28w3z7E&X>RQsa$vV_18@|?aWQrLCE?J#1gDK_oS%R7g##i z42>!%ulspI7Lm|kA31aBz*R&Q108o%paWhK*Uc|2 z%AAyq_4Sg!u{ucDAE<4e59k{WY@XhY!JP8wJMF_J5#v2c_yq{pG7}aPQ=__rUQ*7; zQK^1|BMo8Vj)ID?(A%|J=;vKM-k6t)U=B~lWK_(_y>wG!iEcdawAJ7SfP~nxMmclHf=IeB2x&IbJ~k#9THoLo z&f4_9vYBuj5Dy~!|JaR3@0|A9))%Ajy;oZ5@A^Cb=MHLCw}uqxycozpA(|Hs&Q$8-7b|No7w5F&&S zLXw@mN0gOBWEUZOZx=#Fl4M1Q60*ydJ(Cq>W^c*LUccwn=bYR3ob%W3+|KPBx$%Bq zuJ`MDy`JO#csx&66?0m?!n3v{@M6L=_CycYlJ*Gh9!YWO6`vaay!m0l&lF>vrHB6Q zn+K+uYP$PlUvcIR1^7wh>H6VYe9d0e-aEg8k$belW978QpMQPibwDKT%4gkneQ9qC zndq}k>{u}9un*;L@Ezg&$Dez8&ZJO{Vr>sfq_+>Y<@;P|Lf~E2Bkg_8NlLCx1rl-l z+gdQ(wSf05jn(5O!>AI`&CzE9`2!7#tg0CsOUzdn+EUy4 zQd{Ki{}l)!(~wI!Bu&4G51On-UW_CGo&W1nj3JI-M+MdZ&iua? z5By)22X4&vy-Y&O{WTMfbFop@SRm3xjAZ;J^b?vGRtVssWR6ugz3Ff|B;*0sO#Jg7 zX!GF6P8wYHx^`9Io`-|9O{2fYz;pF?ytYe}sD%nrm8T&$;JW)%7XF1Dg2h4;Bx;5u z#pv_!bScS#)P*>!`hNawj_0Kln|mhj$3nX2B6x@; z?NZD55RTL9Y~LSens1!ar{d~(SrK?m?QxQ)hZ6M7hp1gA`rsBA{C1tUE{&pis+ zCsZiEty4s`Uf6{5gRT4}MFCU-0lT`Cr)6k(b;POqdw)L@RfJkw4e2=u==6M#O(rYu zyn+zP)5bqcGX4w{P>_&UuUcZB^DdAk77Nlm6wlBOC6nl{XDFUeA^AjFf)#yBq(JtHasb=zyx=`|NkycegKh zuVi)PjJVXg*%#arpSkkETYqV_Vrkh(N0RNg)!z0sa2!B1-uH>dYZ-gnjxX!>4(5O^ zMqVBV`KPEgLyB{E2-;!y^z~bPs+v!6vOVxO&wYAV=4(f#>+&sq{fK|nkS{lyflmlU z#R=r$o|3fI=A79j~dy*s?F> zmZsio0XLi0b*=dbAqrc5xCb3quqW?dzl8K?m>r>=z}kbKt835$|5kLB+@KUx>8YfTA3r9*d(3|e z;S5Y;F6Ri0W$xh&tez^#UxpB}`0FF4@AI4Owy!e55e07FXleJn^HT@y5t&nQim#gm z$#0Dnn&SK}pFVRq!!BKagZ(vYJU)MhJx+i>S08GSGU_&B3*?HWjZG8KC<~SV9O<3` z8w&qirqZiRjKp}eg5<1sGKkW=J1m1k0P*zc_RRIxBt zNQfZeRX(wjTL0g;y2G<&!` zyj(NDJMOvTjsnl69@EYps&&XD0H)eN!riryZU{75YVp9OYODIQt>+AiZw{M%`uBTkd zZjt>RFT-T=K_0djh~@-x7^5FCd};GFMhp!j;i95{=y8|uz$HKd-ug#w(f9Gyod{91 z(*!8LJ}vuV{-q_Qz&SSAftXS1H@8so{{Ep=KCnIDLd5w-d?FSMPWA&r+mt0fK1(%1oKb&uZW9nOdtEQKBjc5 z)z;^B9+KEUZu?oowbSfds}oY0XWZpFBs%`uv%I8Z$WD~Bat>O{uw&XB@kAkhetvQz z=b_UZVwx~bdghu$TU&H$aT|UU?zbqZeFCUQG;R$T^Q3#vPP1aZkT+3Yy4k>SA;U@8 zREfp)`iYuB~yyYco^i=@{1Tqh#C5kasa~~KK$17#s^NnEh)m&6r zDMrjFHR?8Mh2I0|j%LPnsP>^~1GLIY_B5%^ox3P5u0O-)Fd>t43#%zO07#^0Hfd>N zT~5$lW>i+*8#F=TPunDA0#>ZRpfEGnU}C<-f3pNGw{P9Tq;|7!K(!1hQ}ajF*nIB4 z4Ipv9`0N_Iz}vT{pxQk&G}O>gcR35Qp0zSHb-!1dl`>fFB6JWUHdvySZ~u+5+%Ec*U6Q=~vgRpQolqB`4D-Nh)zr%0Y9a^V?gflg?f} zN&G4wxX<8^EXbRrhO!ORR#wt>c6I_0K+7B*TB!5J8lH5unJU+1o!z73mq#(b??KJ~ zW8`w7Y2$W>*jo^kK+l$PGbbyH0GNmwai3j>fz3zO)|y5}XPBgnl|M;5uY}6Y@WxHo zt58uJp7Z9E)y-D{p=M{uJ9t6?wEY+>Ym02``AiL~u@P8^;rHd)CjPmKDH_w%gPo>y znNK^lLe^Q&h{8O8Mj7c8IT#G94w;*uA89gXVh9`W=`m4ZiTFD6@oIrQEN-FbgnZ$> za-YsyqL2`mc2dvpvg@b*dwCL3fv=Z(1i=uMY@cB6y^_=5)`mCccYxUXtkvUVn3`12 zTDCt7=wjys#Oxv)wxeV8FM3QB*-g20`m3t<*L8Kx?CZ;Tx?yj!Oq1mVXZU+?8MP@AxB)1Pm58^*DG5Zjuo{! zwu|vgrO;VO_T3&rN{{37m}b_ao6VQ>D^3WPsB?%2cV5OVsZuc&+Xfvn^p%OQl)m6| zo>N`-*_dfB5`CXvnPG1(r3+2mb^3y>gs3U6vs3LhXH-Af5!lN04v+;&`kPN zTFUk|Oo2J;!v}c~q2@`}oABl-<oZpq^9yL zDY~ZbGY~*0PKbO69O$6(Ot>ibh74i@3g)wLI^;#2CL(H1peJDU!dkDG+}tbl+FCN2 z?d|V3>%b4~mKD9%bAxS@_W~%I3Aei2+v@@0XPQI%dl(E)^%^$pthUld&P{&!kc{47v~cEL_+_tJ%ad%(V;!`s4pDv&$?6Z-A)y_*$tv zZ&^?ZdRBzX&jr+YX+A|FEJq^K3hI4HTZ!mCMiU}hV{#Dsn3(WmF$dAF2xUV^jr=xZ zQe_5Q1+QH*ooS0^cA_3+cffX={GQ0Dh!3#}bEr9^=~=SH1OaSn|InIC0sZGIRGD3L zbmFec>GTQeODd1X+Op0#DHr1Y!WQ|Q`2d*0Px4f6%~c>5LkgYe)&H!HkI(h}qO_Qu zclwlXu2;JM?Z6Bd3j^9tW>V4Ngnjq`i7NAnG{-J;iZ?s%Npfm*-928WOeH*9J#@F+ z-pbCdOPMAv7|V-0b-7w`u-zXE=d4l8M3L=?(9FyXYcfkj18X|lNLn`REO582?D6BH zKbzr`G9)7trmx@tgf3foN);4H^i#{f>vfGJvLz0V>d%aHVzK^V8NwIII7G$lKYsiO zI{rn(c-Nwqm|moZN-gQk+1O;wK3I{=kA#Pk)r3j=fFB5Y9Yn17{S2KDv3{8yE(Sme z)0U^_L2e;$Xm|luL5MQz6z$5@n5BE+3J7z4x|6!PdcpkHx&R#80wN+Jz#vk8j4_|b zzb#zRxtKqz3Jp@1*R_Ht0%3#diuQ9RIVE|*A_bCrl|!jg&Q%mm6;xR51&JoSD9;D- zp|^1~8?-l%ddJ4NQ>yaVH!4BTw&-=0luqbt>9&|H*TQGB**_0`AO8Kg5z}Wpx|C9F zBKAA+!Jk1kMFH(v)Nx|1_T-?}WAR-)6yt@5gA|A2e=K^dMCWZ-tM%E`R1|MvVN8WD zMubs1s>of_)3~))-190nHW=EoQLQmd9x*cXk=KLMR0Da!+Pf?bhl~PF-3m|J^7>p# zGM*(>yvjW!3P%llJ<<~JO}zV^U%C+Xfr9G>QCw8?uDVrnL*6L&dtDXt_N};JtDz`8 zs*s<|Mdrz4{a*tnw{iWDi?vE;8A$IWs9YC2xjkfYce_$j=Q0NeS=k`Yfsgr5ST8CI z5vt9bHFcMhFA(oPVyN^?IUB>Sf!gI^2(Zc_%z)T!5b|F-AF1(U;Rz-!K)j*9|1vHv z^Usnb<=d(_fs3(sw~CaF|0Kq^3_P`ImJuTL?VY!qa^YWi!c)op^VI#nM?XzSJEczS znTxCwXMu(e8DD*plf%KmQP=faya;4}`U+RcsA-{!$me(HadB-FIXMy<2}Q9gG(LEO zF#2(HU2++}spko>&<8iOKa=#xg}797pos;6Iwj zv5a~$p$4j`DQ$*Q)OFZ+Y(Kg8DpC)%Alra~l1=er&|?TPg8S6~?iJFS?w^4G;Z#1( zo6nzrx+S^Vv(P>{bK%tlBXQj}gQBUJy_(zOYCbwzS}*OWFxAZph zhU|L7p#Im~+zcdW>CcB_BMXLmN~bE$*ohpxgYf<0qiZq6$z{!b%VvQqNI;i7M#!5$ z_~y-0M?fKk}1?9Jmn9{-?Cpat6%BI@~`pKsTC9GZ6>>i~_WARy^#Pwb}U~EN2V5b_9(XbhOj(n)rtfx@DAYjFnMM8~Txvkzj|>AIOh~AM4wiyyhJWx``Wk;lE#_i6R>C&(A+JDb_`i(rKt^Ju#&b z0hSivFBC8yPB%EGSPwnQTM#^>932Epu$qD5EvViISN0yUEyKb9yoYOIOu5_=Ne7?m zACi~h`XUfEa!P=|ql zv4p#@>O#yniGB-u5-2=xGg?kQzW<|4;qzZ%0BV{E$zmZedWU=6NDJf1u2Ru@tht_U zt)FCm=1Nk`APNUjZa8h;mY{TkuQ|6m6E~bK*c=}N|CUZqmz;%K7cQ8 zlCXUXys87J3Ydk32j=(=QEyDRinB+5xu@!CdPd}skE;U&_buP=8iTO22!#0n6r7JY z^2*L5o$+e#?b`58MUF*LI3FYiNza= z++_Hbe8`SO(UzWr$WzcwOPJz_&(%d|)Frcyq+K~*tUELMmE!_z{B2!brM46Budr&d z*L1|1P>K;7VbiLsk5tdg%2FO2?9}tid|RB&6msUm5~t;JW$n9neQ*S8x6SgG`KZvM z3Y*=RQmW6{`fTV9XS#vRw4*_NXFU)rnq|;#3EI0V?N0II^{-WW)hGJnnGcZtr*r(# zHYu!C4*`Io5K0+kJiwi=LLh54jN3?sjQUMh4|L8N7pl z(&PPIw%`DLap}+JRbSG(MxK|bc#Mdd7;YSZHS_&1FE1xZ`BpBZrl&I-_^dad-{Bd$ z`+VUT@b1a40^Lo(ojaR`tuGs&&;q!kTkh~isNx}^UmB8aEKu(@>Ce(^Yi}?5 z`LNn%h~Lb@Vr1#E(nCn&BX-2a#Yy+`);E#4&W|PDa6rI1{;l25N=EI&k!qH7J=y_` zI&a;%!zvV+lb;Xn>10X%momWcc=xf6jt(;oFROk%U;Jo=@?XtuIlsi~{W@ePRd z2*#!tve@eIE7-T;VMC+c2Ow!Se(q+I&EQ@>N+W6q0CB^&3$wFJH zw&=z`8Ols#%4AYuM~ROUCw`PA_KZknSf_jg%xzF81m~Nvz(x@mX&6Phy15DAouTL0 zfPArRR(AP0BJm8iPNAfyaQ2T_Jg&Af<$RI%@11x(vKagdmcxg-8Gd{H5+0hf*!|>7 zQH&Z&H{Zs>Ws1Qgkt9#jiCTN#q$r9Tu40FeKg1JPKKII+*Q|}q^e31S!a4HS02){< zITKitb*N_DLByuxNzf$hEa#9bI(59n)!+mTWi<#}8iD=i zUK(mJ#4!El2}1*VfPj4Bv~?)ogO-W>s^7)FivnsCsNcG}#JYmSpC0-26o9(wF1U{d zKmrKX4}M4clf@m}jVop2XE3Ope+1MQ$ls`8I~p1N;|Go$ZKWHZQw$hKR$F1`zM5WE z05;)J^A9GX9u}%dlJXT}(@1%mWLMcvCF=)h{v_pED`W<<}VUp~(zbMx)PAilE zSf|Mxdz43(QgVW|w$+4G6C5YSbpo z-nbuZugExGm3 zfm)kI>Eqo837KK2gb23E!Zl_##_^9`VnmoVIC&?)^!z;ZLm(J)*k62)gF#=-%-kF+ zG@|>HV~PPA#^o=&r*CsgdGTt8T&>@cja(5|f)=XCM?zo~n8GF_M?4@%!Vraz8t{W8 z0#?Lhz%r)6HJ#G0T_ujI9^^@GcS0Lg$7RSflwz0+?%WB21B*)Gp9%w-Ow17kDNf4! zr*jDPu0i4JNjirIgrdPFH{^h(Re=t!gb#RP(}+5~6`_i}KDq8;GsTZcu7X33jt&*v zN_3+}wM!s_LAPi}2oMQJ!vD$Rr$9B+2)5W)o7!`8xkfVWjSB86G@UJ$JT=4y>7y~h zuvs=}XvswINoa#E%7;wATmZ@=nU%LbV1#Yaku(hN80;#~38oMO%O$o9!cH^F9uf?r zh-2%8hLd=q)R^Ecfapx%*wL-=sUW+Xt&weW*4canzc>g!hF6(G!|LWfpfX^VjJ@$d ztzl=P{;?xGeqo{aEvm9oP<4-x{TOjaF)vgq47^uLP~8(LvfKFSsFD6PB_-vckGZpx zlT8^JW0*)DE+ieYWw}tzM-Rvam$&1l5~f})D~6e2}Ug{DVf zgi-_j!a)fKuw!6KS8u1d`z-$*!9!7GL%UCKW`2G;_O4M;Sjx-y`O7r?W&{v?tbtyN z@M6O74cinEN9JlHp5yJZT0lVc|0E48cj}&sIe4BzdO?hGwR-c}+Og|tr~#3l=RcK` zbNY?@(f(G0(hx5(9Mq^8yxcQZ~`->nZ+vd?YbTMVFJ7F@a6J*lc}b#hVC7h4G}c3+zhK2t106?9J|4g z9g&+8H3ch2wXy`+VB|Pfe*dOgL(idEG&IJMw81(4C5dfWoP)g)cc^v!M%hgZ`Wc0Ljbn6G>Cq|*=pvi)r z<(#-XdWYe>(k-)l9XjzDG_gUKz&ak?Ctv~qmbNx3Au|QnN4Z6~2rBTP$o0Iw}CJG2#K75y22fjjvK~ znf)yk{A-;ijMZ(EKf#3Gx<-rxAk)G?0b{26>qit<%qJaSgY@{*tF#UY%QWhbAEO}^ zmMCB`1;I3#5H8fyP>cJpTF@j4)#__&qiW$P1Y+(MI5|usUR=2Lh!O(OTSi9Dz#IQO zJmA0bk6@m_;I9j2jD|zE1FGF1?QyT!yntHHffg8RV`D=>aQWO_11u)HfCtD>Ku6jT5;b#(C5`q0aT z>h#yw;?$|W+vg#TOj{O%hcd-)-wHLP2l0lSCA&A_5YLdH+TjGgbR8IC{FQOSxpxj5 zIqc8Y;&Yr*fL598W4s|ZnKCY-D2WXMHr0gZi+>*c=e?()`|{$FO74}1(p4wt6UKIp zS57dP%<}|JJ8O27Ff;IxQ28@i88q<%2(b8yGPDv?~?wj91qSR`#YNw>)w$$>_-Q!%~B_z|M86`oc2OE`5AV_){{DkbbS>zh5whkN)!4|NfRUy<=T; zL(cgq%4eQl%Z8lDl zT)kr4Jbrg-ta%J9Jpc2m5lFZlo3J7pGQWL{*8iFk`_83x{5QF;>2}$L@t9jqQKUhM z=7|2$U5${Jj)&!MTD-okD!u!^Gw*Mn^Gs_{3jEIhRSx?5#hgf>qUnEr1MLwJPzC?* zZz3$Zl>fJV{e211XC|5n{~xawTF#N1<$oU&j@A6ln}J=XNFBpP5uS-1PN;Yn(}zt- z;*X_Pg87O4lBT-yOahyU)vZ5VGT*03J2BM@qIe!JDbi@fCXf}pKc8>i;W4rDe~6_+ z{3;VuIHB#5g_ri{@bU2GtvfQBlYHkqRA(KwFZ}0igS)1wG^}j;eLBGWmA`4zNe-t( zSlVyO9^*9upe>^g4dxx=`8gE;4;4 z2wWH~?^7CJ4eRY-YQ}#qsjrT~XPCGrI4ND}s6DSXhn_?#VqtR1q*eR;PZJgW=Jxog z%5jtWI>|S5)X($*i$*{?XW@2B&)PiR;lss8fR$*AV(AEmkMNM*AO2*uI~-;N0CdJy zLF#n05<~rg@vnev zZjOIWgCKEQ6oQ~UXC zc6yxj{k(OJq>`!`_Dp|i37-o_-iz-3iNO^6p1do_k6@3j@7fE`+;Contom-Uav7A9 zX-M1)i8`*NvK^sxad&Mzu*d27Y(Yv~qQnsb5**3sdP(xHA;T;*Nl(&~{`U$=zA2r? z@i&Jqlh4*{{F;Z0i@Q>h$uYK1(Fi&LXDwGzyiM`_anYKVd%Qh-q~j1LB=HPO5V7}@pe+QYLwTMQ}@kB8m<_sKeQ4nz6J<}^O8 zqlPKbt^4awaxk1GO&A#*VhSU*X7^f2f@LEF_hck5UFAgV&dSO2*sXJwc^qFU5Eq|9 zTc+QBYv!ue<;0Au`(o*pgg8HWNpN|u`OL0QU5Ub{GctZg{yv$YAP0w!=$6;=YEzLEi9 zh>+D3z4Jd?LnhB6dGODsyVm3KT5obVpXyR(TFGi(t1k9paYNQMl1+X$xj(Vg-D;So zNyL%ZG9H-xvZ=(}k z0m2;-gcR&k$nXgKMO+=&+iqA#2lC$~d8?|h%q|4lLEQYG`=h8-4_0{XJC4zmEK`+; z6YXiE#>{ieLpJ$zDY;xe-`{0S{pLTc!XMmHq&}T#@T6NRVyYEP8DOef&@j@P-}>6! zFVM0q#Iv@7-2Qmw%HfLr>g2{1XUE>=iXP&+3@q=Ax|K`Ly|yiB*|gOs(UHG-PH+L^ zd8Ai(f88tbrp6JMcK)UR-YJOth`wDvEw72ycZv(byNe%;r7<#K3o748JG%A}8#DqY z1Nl4?>mJD3Y>MP=yM|xj_l~*g0DK02rGehzefPuih3g#Qf!=d2jh|GBdq`YdSAq#~ z8GhoZ(GeT=^`6@^u3L_b&(187_@C3m)GOdLhKf=*oKS_2Jc8;8dXC6b2WYKRUW=& z@X?wFBeOcr7-z*q6)C$i1I4lv;Q|tP)Zz!+jL(uD?FUe zt{e;MzL(Q5;n*-Ui#onG)HzTJHFM{wE+p>NrHnIg;JxpkS#JJ}+^EWIQDgaF+g1`aV8nPHVs z_z98!y7Z)=Ke~JcNuiY}G865hb>=rRJm#&*L;|xcn52fbk--nvgC9885?1ebULkFC zpL1VtO20mO&Hdu`(s*DtiT~_*j_)l&=a&OdlQ4ARe3(xSrTHC3Nk!hNBvP3lQJZNc z*C)78$$jd2!2nSsZ_uEn9+lwL-}AZK0ls*I@vky35p>?+euqSNu<*SMSYXi;vG~uY zDj_5GPjo{OP1>VdpY`BOdXvSOW)ObkV;a=c2!tB)02XnEB76i)tVvkE(#fh#sNt)NMh z=#UGpIsq~hy#1V_Kr8{#Hl=yzj!XH6moK1_4f*!3ojqJ!T>N*hq2o~M_qH_vppyx) z_%lIJPXID4NbZePr|@}vB!dM1rj^wqx%<`a5SYIR<@-j%$mti~zTHM!fok)mY^-zw z^I|?(`JFY;8ZqlgfhWr196icv{&m^(kN)K`qp zhgp4qIi^$VmJaOGIFL#)7!DF&O^W)w%U1c4tLe|N{}{={2agLT^@6$OxVRWCZPSa# z{=J)pTy@1{+S5@PSOo)DY-s(<2bb186#iTe`^XTbG^m6r3@bf|NR}SDO%rnQ_{Exv zt4pTz*c-p}Q2Ry%jmfw=mSU9c=GuVns_EVULxv^iX#W~|QbsBINe5jCJYpJu@Jf-o zx~#lcOmjN;IW)|nc4^)bx8-^Kvg}agEFs=w&fNy`IJEVCb8M*H%{{0R4=1|KMu|@Xpa=?ZLp%6=vkedoSw(TI4dAwXffQ;(J_!$7no2JUXO%F zt`0*W`h$DqQ2wEw_bZ<&^lng8#LorVnP5%L0JvCCo9S((L4nKsXQ#GO2-!14sU-NWv$#a$$L;MXFU=EXr zsu11i-BvcJMZ>H_6h^pt6S;Xi^C}024C`6)0@T0Jgf|o(ke9KsSf~~Peb@{P(Aqd= zonQ*+8q7M!cYp;kp+qF$@C<4=_p9QRr!TUzE6v1&-{J@Y?aR8DwDdTe3FWzSrn_sC zKs`{nM)$RqE#YBfIX>;Owz86i_i}w#Ng*mKdN~8}dc8P%936cyI26^s&*)F{7?Npd zB8==;2)|usFY^N4iG79wt^@LHs3Pl&Sx7;<4g!U91+S0bnf8b18)id>3PDL@WdFs! zYzmGbqn6@OruAciNQss%M*ytkn4C-7^`5}SpdTa^yP~rLUkL)6)$+{~sWA|W)wm^@ zY&H740BhbS(-D|a$`!YyMkfa7AYbl?*?hO%qboMDV8C)aQpMEtA~eC84_&RjGdH=l zy|p4gI!nGN&=yYiY+sarLk8u3ULe7u-;a2)%tyz>#B4u#2anF%O(~#_pks&PKcJ!l z2!yR`u`|kX1MzWqCST0wVoh3Tf2L=6Dw(v)wV{IQ+b}4ZXDi3bfE}sx$0`;3R=FbN zXE(t1?tO)f71X&GD<6t>vyA4yHgjhEUdfIK;e=T`RF>RqNsO0xxM5K(kg7UopP4G& zq_bCdVm3E_BDP$Xw(;{ETLq)3U8Q?R$3fNK zO1eEIVz!de-Rv3O{(W|V1n(VYs>u4{DZ1>HpH?{^u^Z>T&z$%SHgqV^587GV zJ$iJr{HOv2_@Gsaz^?%Yd-W_g{h3CvR-NCxq)Ua8PS8w)Ee$|dS#$GuWT(vzg3VSQ z+1Zu8dtY^K6a*uYc?|tg+55(s;PVFlOSPvaRrd))5zh-kHVG?KPJ10(U>p!x;XEHM zBz*1Kkc4+ccsOYAt*UH4gET#_z#f`@BCYetX4oI7jHTOW7sN#0pgVo~w2kkXUkA5q z9(K|~S(b&Jz124IA%wf@T6#^5 z(bsX<(P1E`zCQnJ_v~T1)4^w3^rYAdlw9)IsGKW*la-!QW1zc z5e8yB+xw{~7@dEgT$cGl;i@x`;#?2LR{{gEDXFO=#7F>?a^o5*nf;Lh<+`U|Ufw97 zs?6K5^DXt-dbI0<)ZkQJxpX!x?aiBdp_&b!=Lr2f!7l47-|26Zy0uBCx2Hx3`en}* zQs`N_8-WLbtB^irx8+5q6f}qLUoNgMa!X(G@cXI0< zX`UJ~#7Cx!L%VnHN{mnM<$Cyq3MjDaw*al7?@OW$t2gP=qKCK?+enN zV<@3??0-mDgg8DQ1FIdOI*SawUf~K2M>(u|1qeFB)m} zim-wIUBq=HBOeBxba;MQNfQh)4V`x~oY`EI*sIX@eQ|+>{O4XujM<9A+_Fu?=-u|N zcePHm7PVCu9&D$=M2oxRp=qIpdn!6$tQE?tg7?#jOQ{5G{VCwnu(Y$ge&a?M*}WLZ zHz!`Y+QYxCt*?L$oV9mtc{z%Ulss714fdM9oLbaeFbn2_QbEIHAGs~w&6~MWp2^glIU(Jf!9~8lK zi4joapAk||kr<*9jU!C_gnH?~o0LkW@;$hI^G)Pj`e-IdWx*^2xoA+{`FhNQ4IYw9 z1ZKe0s%FL0n`&sLb}h@o&wLSTJ@P{Wjcwr7vxH~WR&EL@3CMO)hwem=w!C<8cElh` zfw|PReh5MN?$S1ES^GJ|oNckIM#<95?aP`_Mlb&OF(y2_-lRw91Za}DHJo5)?tLFA z)Lhd40HIZ0mKWo|7NPiu-F*gXyQf06;ecO?xny}z$eQ81L99x~^-oDWrfD<~!@K#fVP5g#+-Sv1iKrSB-X_dp=Sl*WiJ?dDCVd z?nTAj&AWaD!l~lW-Ue*~sE}QA>=1`$+q@UjwXkH>zinN6%?J_h>0ldMS8IKHDT-tf zX_l;1GuV;$L=~-B(HxVW=+BL}ys8ur-6=!Jqo{OV?q*tDN3q)fpJun^f3+mXt(4}GMO5r zN8lv_U_AP=u=?qMHHys|SVc~}A=1|W47O!Jn>j#{ZiG2~9_WUqb2$RGM)T_)O)ZE! zwV?|+>aBb+Gs)(GZ2AtU{^3Xnj&}xYBuYhDL0TBmmLTTJ36~!Ud=m?F(X`&HD+<#7ZA_r? z;C9a-()H>Z5o)1`miED)Ok(q^fRM^F2r3RY;%l4e?5hLNzXCDTE#S=qB1jM(5gA&fSdZjI8|z0awXgSF0+v$)|d z&I1kyhr8>gI}kp=iVntb$s3nr2h{o5HVq^lcPq>|+6m5A+lp&TuM8G7mOTCS>sQc@ znJhsl(V-w4$~d3PJM=^D70GiO*W^iR@mn>5CsEKjNY&4@qWJD;l%ut~&U$w7 zJ1I7QaUGL5DLS$PIgOJ~Rf}a&UML?dv_GQ4@OdQO#$q>3V=y;ogO8*umu6@lO8#)vood(Wbq2S>Id?_`M)CAvLu53d?lSN3C zg-?Vwata#Xe+O8@{<@Cq4B%4v@%}PcQff?qxney^=Al+I@OGy#P#Zz0py$6@dr~u) z1$sp2rW&~PDhk<~<=}t63=a$-vn>UFTUR_j8=-EE(npILf2Y}tkMErUjfLjz+kqh= zc&e#V7c#A;(4smtwIUb$-s6NG2-F_@u0jWH3fT-|qFQnOIwv|DZ4FFATl_Iu3xs?+ zhdT&zB8)c9)%pqnmIbl{ieA95h4PJ5dkVm|fFgw#l~(~3K5o3O@wUuduYBu={<`$Z zrZmbH-qCJG^?9JVfPP~8rFg*9fqa;Rt7wMhU1-(EhN*iHB^d$|BeW5XmgprINTEFk z%L@hft&l#pqF$Kg{*zr{4(hNp@*%|a0MKB5Rn6vuB!q%Z)qi0595(+@4DSKHC*P0$ z{y#U&D5JZqh0i4t=qVBP%mhNQrvcT{l)5^*5?NcShv);M4QB4t5Zw+$y?T z+BCg(9F=&A1LP~euYand3(uGTE=beMk(Lwc>Mp-BPWr=fLQh4A@RR0wy=%AL+M=a0 z4&Wq2p-tX|q|GR6ZQNiH4}ppRx|#ufpd>E`$Wjr~C3N0Ba6Ol`GBKeMA*|eB({v66 zJE84qXv-{tFp#2?%?*6Fz5_H3&bW_FY06>Ypgx+Yp(E<->JQ!7Bxa{3UShPEhdR}w zre}cF!#EEVt_Na9WcsOqf@rZV7_gxA0hDzBJ6eXnpPdJ!1<-0w<2a3yf>-j(u}}6= zPe52$=rAdV5Hm>7z(o6q&V%xd3>@${qD=p2N|PXsNTF~QY$o-^ToPc82>}ugbjLA} z()|1x83yHPkX_elX-HlYI`!)xgauND2XyREZi9rUWfhRXk84ycNnwN(Y$l*w@mR`! z|4(Ze2n19ZQ={wZ?v9|c>_&h|itaa`?(Hrc_Y<$#E-9FVA0VS6X}QmL2mlZsMgkl# zcY(}aLwNuNDr#zKNLEb2k3g<4bHSlBTEqd?7HG9zIVA0Yj=&HXOo&T^2q+WZ$UoWM z|KXPifaLovIY>@uz)L1@qSUl85>1k{lrj36^q zwsn`&jBSFGOfg8OxB@aUr=D6ti*I;kf{V&R)P(!kDZfh(%vi-!jaFBweI8XEPOI4? zPaTso4o13EZ4KMH(n?Cc|CsMuKs?pAwyHm5Wsxy_onbuvCw~Ppl~VnZgGXb?yN>sT zg}fJEMKdKuTJ>eV;}WJo0k+=?Sl^8G7o~(}LT#B1S=}<9%NRikWqW)3Z zTuTj|IP5G=uD+mmG|(x1g{!i-o~Z5pO(ytUWU6=W^twmTEhX}gW=Rg<&}@ow_Ygus zxE+DwRX~%Kl1yR_sP)zQ*5;Dzfo7&g-Eo6^a*<^*b?GCQ!=qIMAM=!k58EQeldaV5 zCudV1972=&BtWNiV>2(6~WE*}MvkWmItYIkJ!9_{!PT-*M zKYAkkg{y+oIYhwuxCnGTBZDY(lb+IFTcoS1%MV*SWSCFkB3Z6KEetCJDL@NCZR~R~ z$jxvdc;!@Bhs>e$78I}j#y(k5#hLBK*qTX&i=qe3HAoccz1iy{<-CLoX;7lrDwgS=re) z7WIGG2!#D!%)eU32j;32o9LDW#Vpl(>Y1$itDtFs&D!9qsF|`%+`*-xhX!4HNii`9 zOBX5L<9z2IH*!R$O5J**ayF{b{rf24(HZeXz6W@y*fq7$smi>5*ThEoIu@(b>({B5 zW#&>R?W|*~L(q!S+huf^9cpa|e6Y>obwmd(hS41{%e3uea zFOSu_bLZuH=HE7=Gb@5ZBdU*-MJ^SQ56&|l0!(cJWkb17@3Kt8&$2~?efHj&3ZhUa zn|j20wjQk2_#S?xp$X}o9-{AVoL-**#;6`dCbr2yIC(6*dBO`q8JLZU_TzVZqx{S$ zXn`^vScX&pwPu4S$f5JvKq!ZHPC@?i?!5E~68296A6Rr+CVvC#b;_)uy$ zDxlA4;rV45R<%tpzS_|seY{S}WmHY0A-Q#@A=4WLw*7tO*3q!dd-XH*fPr&lVIGqu zj&z0nqUhc+b{#zE?x^TS1e~3FfBw8${W_ax%zITb*=^V=T^ix)IGZxay3jG!0vP~0 zs1O9XQIg)<1S6-X&_520swE-kQTmj0{9;)BZbRnX+h@;RB_YN(&`X5 zBYU?O;Ei~;?8_Iqh-$(+P=qg!O;&cl@}3UPatfogjl3>(4&%M;pDtzc1Auq)=p8)B zj=phXae7ap<4;T1eGmqxr!E)>U;F?$j_Ig*v^h8jPW{+8%2wi6eu>V78CFXCRG-%k z1!ndX@aqdzE3-WOIm~KLtBq)DU#j+=6|%VJUbd;#`CT=Q@p0BDfTd9U+W8^{p!sQQ z##i(Gt)GL37piMQ;Q)C10K4fxU#bks6hiO!AB~B&CUm*$N8JwFMxRpWqO!7afYQH~ zcD=Z!#WpWGPx0KtdJh=?reXEB`mJpRanI*LOxa=kbm4G#7=coKL_~!51w#^66k-CST<>>1gc+1GG41q@`4h~TZ0e4GTRP3>z-Fpj>-3hs$l6gE~ptpg|n3LF9cu;}qq>$&38%SYa}ocL}L-lcozrEJH8Y;+4vWQ*>|V6`R4EoYO` zZ{2ZNXyV`ag*$bB0swNecSo!JxKe&$&ck{qjS9 zM>gNzor%%-%icruMw+RS`V4(OK^jeU#I_?mYfgg);9@ueQ2U_UKHlE}3K|mYr$9*z zhwSf)c?K|-L8)Vv#qk654dIQ%P&r=GAke)7a+;J-hn_$WCi8g15NLfs-m3qS=ld$0 z?=29$g^D`Q5d_>DThmCfc#?EyEP~is!b#$QP2fosS{kLI`n~hek60dw{&sMXk%Tsl z0QcPK_z;f<=rkdV`f=QbUK8lvIMb$yxzECDIG`xVNtmim7Yq{Xbdy<;^U z15~2h!qXx3F?|C;E_d~s94hcer$OwlPdfs|N-+5{7Y~vi;JU#om-@wdsCAjURYw@**iZ%_`Kw$$k;`q^T_rZ@Aq!4Ma4y(?$Pi;Vy3hrl*Hg)4z zK3x8JxVO0u>FFC7T#e3U8ElK};v>cZ-j$nDk^FuRY_CvH!e-+B0-{FP$c9Qy840tx zinD98k;`g;_5z09l<9-KPj)&D2_P491YskujbBYa)tA(bOQr+7#82r(&!W-Ln8!4U z{z%q1sMnyVzXs;|VA$iBFCnbV>eeOtxAUHG1S4QBW^h>l{TI#L!nD7lsY;Poy8YrC z%&j!toE6zstxDhd3nR~Um8kGe5e98Mv~qIcAZ$d6e_L6G{Tn85xRE}N?&J_PPl4uv zDmuS1|1ZN8h)ZN6Hwid(1hfXJfh?_uudgUPFiBm(j$Qw^VhE010DtWVPc1_#Imo7( z>iR>^(#onHcJ1KTIAP5I%tBkyd4;qBfLm`K*m@ihD4`898$br`ho4e*%nBhy z6Rs@Jb4EgZtLJq=CNqS-40fcC%*&J=Dd>v&&`egE%5HGO6@sI|)k zM}MIPW_xcJ8k1q6w>N%W>g|PqQQCN4C7qWr0%nG`f)NWr?KqFnM>+`)UUUpdQk_>9 zB04{T4k&>vcr7ONP=TNgY8oEhFD!GcXwe!Q9B{Bb3`*FYEY}`)JS+i8QV>)&P+$%- zh5fO0x*o1A4E3FhVN)w69P*dszuPB>R^m0J_E^y&LQtiHk^sO}Qy|A^e0w7X1=}Yf zy=(=No()-&y5B^A4rzgjoP6jL1&vF9*U)%k_eWVxF!)Odc^owJ_yvF{_Rh=f98_Nu z0_iLh1o42St$9d*P@fkjfO5AyVfM@(>sJE$o#H-Mi8(0N%3*E`T3IA_m9*?(LVJ!v z%Nd7e-lQA2Y^0Nihdu}x))S(7M40A69(f%C>fhCy>gzbDRUWU~FI|w+hI#ED`9Xye zA^SmDT~FUg@A;=WZ-BT@e^JOKbK}gK8~Nk|Mg!Wud`W0O2ZS(kaS#HC}RBHQaQSD zW6lnv5R~0IeS_>=fNyV;Q)00NuP1hl2H*F9Z@mZVb#u&szjxFIXx~td-hXh{s^<(>)z^OL%c0g#mU?EL<8@&EDCce*@$Q4 z&PqA|F!obld4HU--)oGKBSYMz-i!5m#+hGIi0v@{=N|s+f1grZz_=xE&rasIVy&(2 z-Xm7ZB@f{`jMn9hD5{gfx-%B^v`KrOPc%KgD?UT1eKT$&w(mtA_IJf+^qG;X3)gH7 zl#*)N%|&nxDs1#9T{GWI7mI*I-aJCY&F;F=N?PaWXj2ygf_W$xEZsO#n|+>j6M<;8 zb=t90<5^qm2+Kg?DHqR=G8Nsg$=kXf6sKwIwaW=h#vd3yqmL6l{dPUglSxUSWB$Lc zn%Ge_h=QSAHkwua%l#~yaVDZS#SUCbr^PcO+mVEg3`_klNvCu;sRu2NCLWT@BIabp z)ZDR3n%U|FhUfKUVp()&r;CGw`h)_Wi8q_QFA1UltV&+vk}_)N*(muam7Y*_wH>=y zLdwZ|hVMwE3Cak!>AEMbFAhO^2}Wl|4i{|i`joF<4Y zSh)}vEdPrvS=3GwNh-!PRe^hz9d;$<_$!!?sue! zGv&+@m|6nt-w0?ud%j>2ZR4F=q8f=C?)RibCga*}l0VNaaBksFmNjMDDUi65TbD6g z630|&j;ts6J5={>gq^@0z44zL*&%Wznn|#~<6GcUMp<)S(&8JQkyQ^Up9NluIW#vn zj+yWX_PO(HQzV94Pqtm?By-It-bY*^HD*pHh9zBQx7!&lz$odP%JX)FExogE_J=X4 zXfk7gF{P0DXP&cwr((GI0Kh`r)VVGF%U!5vSnWk0B!23&d$k_Pg;KzXRu znNz}uZuT&K)tOA^d-MDDyZug;d{OUW`;=lEs4paO{4}$RKr$jUzYq4Bxw+*PxeN%4 zCiAD>adWPZOb2^~k+9s8kw6(@iH`NZ_HhK~7qh;jU3Hh3n` zOeOVu_pW~W=#sTV{qhhBeScqHUz|=R$aTue$q9SVLVXSp-Vz@O38GtFd@XM{ABr$T z^ANdfaI0un7pb*@Px<`i%hqC2hSN)r!ah{l6(ECOPzNQ`k;EU_=UgBogN8^JwRdGw zn~A#K>nqJXDh`mQ`NJldlUnG*WotqKJzoO4lW60TpPpO%`@)N&ZpY)w&at~3Nm0klSFBS}cn zwr8mhDMEUBqYQeMM1uA!deD}^IG^N?^izfL)Xg`KTI@$+sk06KvKVxyWdWaaBJ`5< zZ$&hq`p3t#=e3vq7CgFiPcfdx*dq&}R>R^k#__W9*4AuL5n!D_L%f0kEF%CM{3O3gajxv)yk;rt8#TAFj3$xzPKgr<|YXD(9Trn_HFtPC$B5?XZP-Pc*oeQ-S)SF6DtHJiBt-k z&MxCr{&KEOnid2F%<{xLz0aCbDfusRKRo$b4N(e1ylQvpgf)6xs>iO=hYJ+B4n3;b zt3nKRPTYp57@iw5tgct%3NI|;EbagfSZ%li?soY23Nejq%po;uUlhc&Kmr6nzMeQl zL{w!x^&XPXS~@E~GJ}&g&D+m^!D}yJhl5%%_b$N`8={kqRoBppxj# z@Fma@Y535#TPJT`HW0P<1c3rl8#^s$Zv+rAD7fy6uO{I*H*~s45EBfCWv*pzPvj+F3fyv z(Gre_CtZKdh3UZyX=8HYlde;D&);DT^lkixkjs&fl1ab(K>sS}6t16dV%0Yp0>41! zOO5ey>9*K71eC3TbEFKEae0w>`~wDEKf_jU_2ed|1jwKL?Ya3NyEbp}vuJi~1r&p# zkf0E3Za_%M^8~DdU2r^sjy=sJH>gQw@p}{aSxD6Z1qXMOZFv%#MEfsrI|^Vj5VqOQ zgSmhMsI1W=K)Urn_N{DyNz^@o%u`8`5WQ!}l@GT5+}zwWm-$}6+0=pStvw+)iY3b1 zeNdQ{^$hH@LJ8a>`bK0XFvCjR6Df8r=zu6`!Tpd`As-2SY31Djpt9DI5ZZqWwOgzx zNBS!jIw`M*DoH8`pU=VX93u14kXPD&s#gT>zki}rTjRR$$?DMg1>{{qoKWwuPkA0B1rB6YI4N)O zT3cUB6?1!FOQRZetHX4BCR$T1=*x|-w%e)EsS>M*UKjXgPp{6a((Hh)3~F#Lp`UO( z&V>ur@v-T%1Zvkv;2qfE`hUTxKuC=1)z*B1Dn>}&ju+3^S`%7wEL*$`oU};j(AO<1 zWQ_0f5reV~lEq2IuiX23i=nazA{?sjU;M-Z693GstSlwzhhtSvB|a0?E|wWJh;U_! zjQ2ny_3}(LV3&MXY;UHjrbqv*M1P`;tKEM1k?Rn8_2}``$9WRAk zz80G8t*)*Q-`S5`UT}Du&KjJ~+L`i6hm3IL_&|I5CbB1)$=W%e0tbj2u!EUjP8Ro= zGdkX*2tP08u{w6K_BWN37a{`Ou<7o`tnFldG6)D21|X;6QZ>uZ+MiOegqqlQ!k<^T zdx5rZhF_bc55Sp{DbB$89xOtQ8}Lg;5{<845*q^|Wj@10x^$`*vOOG_NeOzkzSnShx0CH`5sDJNX=l;(II!t!;mVjHK zb*RkzC3uzy1e>#0IKaCI?!6m}+K%VAR~`ud<(5GvJ2nA3K9_t)$Q|3?Joo| zz|8*8DL7eK&gqU%;+1%{EY}D6bkNX2Ru5Of65ylUKXhWO0%X9+;|mXhf{fYSJQZGH zu)GO>&A9P9%FQ}7t3n%&`Vhrq0WNbqnvssJkcTy1yBp+{jnFm;u^O#d;W{@wq~Yy9 zKGJsvA|I9D4S)hx$@t-iK-bxbGjEB}C*{kgSb4GK^W36tG5yxS1GbmD_^{y+iQ}eB@%M6)??aU zRdY8}7Kl@>t0kN{d^%`$@eC(oSF}Fe#t%=8t9m9yS88v%>@Q59D_R;1>yp5i(1gQlamntSv&4m9 z1FPWU^6i6c+Aws~q_aLg(?h03CO>k9+UNIoPN}1_>tnt9t4J+TyJ$XO$1z$(dB8MB zP!+u00+pr#)6VF`^_H~P^em~E^I@mAfeuC=CWRp4hBOp?Ni^HFUtgIio2;8MJ zzO@bcm*HdmFrTq{=!Q5|BA@xqj1X;--)iD3s5gFrxOVxoL4`iW1}GIQ<2DM?(he;iV``*X6!#+!LB`rU z?3LxH|3iNmc0q-%vW>;M@wU((O3`)l(nfW7<5pgsMg*EMXXzubx)8TXb!DpuehrTj*yOgBe&!F>apil=hY%tPu{RF!v9WxPw+VO#mL$=mmM z7kqRVUi$pWsX@H$W@J|AxW}@f*Rx)7wlxSa<4@Sac1p% zeuQk_k}6Zi!(R+a@#~8zk4^I(3F*P=C+Yhn7J;mvPy<$PM24A#7kZSYK;s-zNJZdxSAX5{2)XdZ3Hm*o%2>C4@ zS03B8#ZVGhwUY{sH^W>`gYHI90IUJOg0@eCXwX&w9nn0VdN4$C!R_`mBolU`H?4V{ zSrCAHtrOl$`&g4Gll3^IvTbSnf-imGHcg{fYLA8K&z`*wFV5=z9o*c}iL1BJCG3Cy zNhw2uK2Hn&vobpj$)lo1OO$sGm%XSPHgkA#-YgIoCSzY5&l7|&J}!n9V{ zadZXm$uDwx$KA|K7t7XQgU5jB5xSJaGg9$xf$vuA+oAxMe_b8yGkVKkp3cdAzRs{k73EzuW3{h_0D$MW^LPr{6b zHHB1EUfcw}IV*gMlM{@X9*sM9$j)b6uGIC{9<5+{s@1aK9kHaJV>DAH7xXZNLY1hQ zxNlQ2Q={ZiUe3(3p>oll@S&AG%aGg7qL9Y_?j8J3w0A2lyXA%s^3Lppa>^RC)$PSN z)OVl=|Id90bBH^`RrQ3us1BXHs4`-;e&7D&xl1i*M{cWEHLp*2(9<_%)31;|=b6FP z3F-~sdEE8#>JpE^d(w{kx?1HEcdlNL7hPtLoGM^@q5MvN=;hwW(tInUh~1fI{tH|a zdUnKdrN82;ki@ig_q+eOvcsqEF419~OP>G*+lk+c+6_0a#spW3w7t04+?~J=t1}@8 zCoJG(6u~s$>a}_%dolZE!T|eJHNiwy;3>Jn@2_p#Z;>?8UXt^2!30vKx)T3nSD$cA zz^v+Bd~#dA*}^EnF2bBYK_x$I=Okj`A5ax-PDR5i%=w?I=%aWn??&dNHkNEm3BAqM zyi*|@GzylJ$e-RnAB%)Ghcn3j$<+YG9I94&1+(q7MlS1zZ`T7~63Yz>nUZur#38va z*%vZL61O%%DxAqNaMvdIQx?14;$@r@t7l+rRF)!jaa$}qLAF9vA(M{O&uxX2#gao8 zxmJd$4p|N_gT=r1&xHPa9SAOMDACTZQtGz{j2-P24dUBpMcykm5w$K*(!;U{oez3| zr#j{P1o*l{2V{Sgw?xC_{7l5*Ax#+#V{fO&RJ)sjaA)3ybti|Q=?NQ(BY&IMoZ&@ zw80oZcg3Cl{^|V4A~dW;Q%eheBl+V?9tAX)&4v!oXgXL)DFFg6P3k&P7P3Etm9*y%Hc^6B9YE1XGmfFz!g~nOp zw48iN1tMYQLfzO_Ad7l{cIyKY?eps@H~N{1V0tbt9jibW;s~t?450x(c4N0Kd5I2R zpt&yFB+PN$i)5<)hMH?`)XyPI%NK@r%&Z6@B&(^@$S=qBbv#{&R1_sG`BuX~!8|@4PTciWZ0r`(=IK$V2l89O(crS}er zO4Jr<;|Li~Pm)RQdE%f7Mpu?rbEm1!M{+NO@DXR6bg{r%twC<{;P)8YxX-to-(+^1 z?Lw`ot$pKa3}ejARypU~q7fv^%3<5snJQ5y_JSQnS!l;@rlf^eF!dRWN#)UhuUus2 z+9Rf|ZXg*)M=hi+fOvGWMIV+iKDbM?kC%Djd@KhQH9Es?AT(}wGDNTgLxL;pe(v}d zfAcit2$lA4F?;PxP$W&fHad9}3*sh2`Gj<%z7wUdWjsB{zt6jY0!YCRlKXDrmGO|UYz11w`gI1Yz-4ZtAa2a1qrz5t49 zKg#9zcFq+l9W`EOr5s|GJUm9Rw{J(4-ffmQt-7 zFE6!%_M#J31zGquPoLeGh+0+Cye;vOHY835yZzK8PzUNNz6rIq+wwpGq|7^k?hE=! zUee0fX+(=60A)l$7=l<&)=NTevjx=F)Xwb;C==W-bhMF1mgOUtmWw9jgwv zM!>tA%vB@AAh#7Ehc;S8hCT4Uln7)t!*)K0^3fG`u<)Zlg^dutbQ0KIA%m1Uq%{0! zznSjnJ&^Jx93c=L{Q^Xj5%u2t3cbby7xZDrgS{Ay97FRB!3#W}Xj2%pcPQMjdv3_^ zF(+V`s2~eXo<0D)2tD4MK=sxjc}u*5Ty2%7FlYg6&J*^Y3_Ei%HyELi8!R2=i$6l!ThMq!`KCHnA zo(5WsT|3_GbA^gWUFeO7CXs7PPl8%@#`fTsFVM9GK#P}SW#IDH2N1)oOqZi89k`RO zQWWVXYewa`@`oO+7qsQy~1kOrs!QPah%zEFiA2 zK$a=1!9WEgZfa_3e3Iec&nLQ1lGEa}UaUMAs$e?x8%^$1gO_9hGT%TQVacqJHDK*E zIe+8Y9?9l>pCybjYL77|v$7G^)C-qt{fW$&6>tJ)7okBB41sQNhg@u>3G~y}udV;N zS>WJ(hMrV*6sdIRJH?Vj+!YsN^&EUJH`2}E(*S8hW3R&o7xtw_D;>gG?&zl4jqB1@qy&S-&QDOsYaa!93dZMi6mP}&AWa8opGly znuW2DU}o;U17l+1#ZHS}zW1PsCTI?a+lAnqOX&P$^hs#6LKHj%5BFCpGZp|P4GWsh zy>oTYeE|cOZYyudH+==4)?X31LW_&VlH>@%ZPRokfV&zUE^24+-4a`PZH2KY(*^LK zk`s=3&uJgAhLCfnL&G<84J>(KRo(we&G_F(By$g|yH-e16(cx<85x{F%n#CNF;c?T z{)b=gYNLtos9GmfYR`(E>-S}vwp9GrJ#*ijQs(7xN`vCB`W9EYstUjTl`6*{?^kWk zcagd+XtsNMbsU3^X!No`1$H&~p&}tMi%Gd?PC`C@;3BqY#2s8i5)1QvWh(dOVXXH^ z8y!OZ*2w>E!f|mkVaV3=YVN>~SN&=eM7v0tjJIRh2$dx#VdcmPi}Gvf*n`Dd4VHh) zWH)k{j;0V(`D`LW-O3?CWo;P4l-12_!r9A& zYe>d#G-0YduwzbOfr@`oX3?RhP@YwIN3w%51&Vr*9lnTF+Ah#_IKOMyX$!Em%6s9_ z19T}becmIz-(ArqF}GJ(w{a8QML@(m0v-}LtGnmFOpU|*1&<;BoE#=H<<*B>m9f?J z8zG|*jVDL>50HDFnostih50oPXVVM-sQRC{Fg{6`N~>bJM#MZ`|A{DT`tBS~`q)>P zz&a^KY|DwhZ$x{@6p7%TDGHqPeS*4Og7oVc7cKY_;_0nVr)SCPNMW2vl+x~eWkay- z;kwtoQ(+uPkaC-cR|2=ypC*eByTthwqUY4kie%sE3-3Gi-K;g2%;LF(D;+J$(X@5Z zGU=(gE;RWe>f21;PH3uKssXnjgVrh((x!Ih93cRK$eDL_QNQLUz^;J?tzaY3t#&rI zUAx{@3RO)Sz@6wx0I>?3ub z`_Ae);j#B{0vKptAA{-vlKd~oyTx-kw6FBRHV0LiAEe_4ql@L}A%yvVgMl%f9>Vp2 zxk?%7*tP}8G&;>zmpnt^WpG8Zxo+J?CwsZWWD0st=JojR99u@Na(;E|xv`@v{i&1# z4y|p_Uh0g198rAO7$$5PGb^oT7E3*flQ2VXJ|)v*QFa!(n)Ge5UcDMTR)V$^KnJHZ zakyGGQ^f6)yZrk`e^j^Lsi0|Y;xU6Wc^yovGTRc$%7VJ;5+vITqxze_YIPJ=KJBv0V$trb&;r~ zRJ>4rLHbUt;Hbs+^Ih*WXY)s;$sK1coccQ-w+D4BxQZcz_;Wp{TnrdBSR%GC-mFbk z)vB329rdwpT@?cRbb&z!77dtLjQ5?Kqhlq=T@8S$$!qWngkb&OcOvahk*wWXC+S>e zz%~`aybOB6sGq3YGnFOSs;*84Tn!tMQM3<#*rD%AvoOe7g$wzwU;5teY4S4uJ$}=xX1W8jHo+MdnATR?nh5in5jEXgSE7RUI$XKVC`k`fFZa3LP&R6> z@uLsS!ua8xws=-1x|T%Htnp0r)vEl%DbOuol;l2kBJnCaaGm$Cqe$aZ>a7bC$k^xUQSr_@6ZH|(ALwc_|TAi2vHS$RP^5uO_y6I!9VHq zZMuf7iHDv*=EC2^(EmmV>5TmMLs1Kc_TzI-wp0Wq9B0}_Qb%9^_gyv?UUlaFZ*;SyvLSV&SJHNW z_vgyl6HjA$Zb^v%t!OrGH;BKzvfi_(Z5Yl6B-wJ@g@4M9ZFaDTuly(jzH>cVY^l0>YXdgbzJKgH^-eus?o}hvfBr!_>pm&m z?v-|7s(_t)s-gkO2a{tv#_D-c7+$VI~5>w{ghMA>6x$8o-{PKn27 z>H|}IWNK8^IC|&!U&yjFNQrCtXogPks4R}uF8&_(ApA~GP;6J*53O?_Nd|vi^QIfE zFioXt3!01h+0$oC`QhkFHommffatX_-B8hS(o&XkB-A}kk})2(b- zqznk(-mdR(ShB)Yx?}uH8Vu{Hg}aNcoi&*~xx1OkabacFc(sn=o|@0f?rbJag<0PG zv4Fbdc+~$!FRVQ@iCS;(DSJzb5Dp{cPwCdCQxD<+&e{0FUGY6!*14>1ht~G+#~+84 zkA$@XmlosMG%3?SK71}l>|lB}Y-2c$t8koc4hM>V{rG6|m?>G!1@coMk^DnT(0Qi* z3d_Efh@6C*nQNQX-RP+wAf_t>*n2xa`v7I`g60f;;1V}A$&N;*MF^#dKW5w@0vHjZ zBVNee&Amm8i!1#eWHBQ1NiJx@JLKfs2pCa519aunf~JKf;B(a&>N)VKH+C6j#VG`onk1t4^Q^FhU@L% zb5uw2TZwU=;KVv1viHN3b!FqOg8mu}*QMW+2llBrj9FHk42>NWr9lAOb4N6PM)f=jKH-`C0&G0Xy&2W-^z|LdFj_lg%Un8wJNl z{o#rOKMz?Z=DOB@K%k4C7F>V5GuK5*%$F7yS-H4Ezi_iLW18|uw7!Gs zY#OYoqHw|vspps1(^b&_C`~N4#4m5D+e_w?NmF`GP{{n}_qjg0;a#e8p4^49SFYVS zs*Ai97NBL1G2fUEtD~#@{%fekl6}3m^Ef8sYB&q^Mz4{$(UW9kior(7;!*vC^if$9 zH#dU#@;B+>yIqqL-=SDK-C?Y&ga$dJs>j)xOmVGBI?pT@F4fYf^gAr&&JMC?Sjt&T%S0MkI1ZavqLFij)Q42{9*uH_-rUX4<)4#Q z5l*fmSYfB9W)@@HWStM+TvTXzx+v;lN z-^%nNX>0AUF{ybAgc-6AqN7Wvnz9~proXLwo+PVN5vH3}E;)i|Sn_kpjqvC5_+7Bb zX-*?#Ii3`g(U;MuW^NNcfz2Vq(e&(R^NFStXFN&7_dB|7)?LcMd$5^#Z`gR^vaRQR zPcu$TzWH=yEzbP2YVCKXnm>n!M~F(w=r)38*Merlu{ElnJ-uLp1Z?RTOX_wp*oY3N zr6K{tHOK$jcSEVa-q+Ld{N9&W&|1m~N7O#y22TOuF-HjNIAUOVqDzj8HBuvX zGMPUR@H{9Q91Ui^FSOAawWG)AQ!Lb7f=DpN@}()WBLju^G@``f%2>Ztz%4K zh(sh{!Q6AKf=m>00{&IggJiMtFH|x$A_%Vf=E{kAfm&f6dNP?n3Qt7U)vevl)MJ(7 zqr-KHFqGk!yRP;kMoiKB(e`r3xW^>T7jrnCqg@{E1Gxe=1C-1KZUs({FOtgO&({EZ z_z{W)0=oc!&%b{`VY-2YzSuMJUq+E}IPv~X1)(X*g-ahw{n@Wxt%4>aXc`J+v1FvD z`@$!!H=W^@+xPuOR0ZZtD&$juW-lZ;vD$@Kv2)aSQGzz?knawt{sQ^4>r1!BDlDeQuNAf|^5 zhr+-mfXf0vvdbW;zV|a5AjjsV_0ka}3zIJ5C8$P-RuyHiW2Efoc(3H(AB6&p? zFtqXTXEohpOkRmN|C*XNWDsI-_jA#fsG4A@)|Ts)9$UkeIpSw{85KYkmFdrMS;TBZ z^h0&r^N{B@RUtMd8-*r0FO!;$7nS{Uxz(|wPuRydp5qTkcC|?A@5%)~A;Wq)JL4SC zyf>!&fBOoVxvDfC@;wwM+09TZUJ(NP1KMrj0fpdCoc}?zh-7R{hWa;kbiiRc*qLGGUnUC*F~WJ zR%cgNH9Rj9zk*B+HeY&rOi!d*wi7i=@Qa5isX1ONY>t?tGuE%Ov$Opi2Toa#mDgA6 z>~+BCfIrFDLPrRw?gU8#dfIXM-!SY>fO1R+IxeQw*QcPJvYg)$0#*bw?g&kbn<9bs zFX}^4NAgEfQN5rg^XooyGgFbcR6k#mK45(5PP>9v9?;%qfdrs?oyR?heu zJ%KC%;Z&-FcMBEfxVIx_{1o3-H6<=J$I#{S_EyE;yN~>LS%cbX>W~@hEBJQ&3D89f zzUmZ;pg~_b6M!j80#71N$(^N$`fG3)`0k0 z2U)W`%!DBz!1}>!&p@Wf3FBr z;;kPbHI4SGgPFezF}PbkDhgdT1;4hz*0e#X)?a)#vrK{f~V zMhTk2c@WyOG8@@)BT^f}P7_Yb?};2se@5NRZojSa4L|$=PRb4S-#?S)huzjB=z_nJ zTJTYmSy&CNvi~~%5J&mQg6istYyJY(wr39L{cLJQX3B~-vmao*YL}-Jywm(B$Q4XH zPM>48ruFNXR+sA9?U2Ama^C|&rRdmc_MYRr7f7pLUNyBj|-pOjtXn#H*NQJ8f> zYy^$LTBlKN2J~O4glP(?7p*`-q854;P~U@43hinbk#hi91LSoC!U6ZndIPvhjUZuV zZ+oQ+Fx6R#3HLGUX0ZuggKF-9gef-W|SNKQMq&Y4`I`KODAVLnYN?yH%`3ClQ!cI zkl8Q4KG=T#d9?dDt|CF$uxI-2KkNK#8DmkYl26v~bpA6HV{Vo=uY*I@ZEQ+T6`!)+ zF@JdY7J2Ev-H3ZJu7RsIb>aN8+f(A@xkT&Kbd%@SlAb)`EAO~h&d_5}NjN=gzC*It zdY`U)smN}I-N@PT1m;9TMeH4QC$$%$CoyH|2+6)u7Er?iq)PY2V(2{@AA+D^pv3eB z-^eCvGPEfh>K=zZaC1JE>jYDQZsXlt->Gh}wnGw}PD9CkSjKa1Xv=Njk zF)(5ywgTt7{N60TzU~u+g@sw*1OUP(*uiU>O8ugeIfNm}&p!oh}p5GJa^hGTt z1zX44&C2|x6$dxlANfe_edt|i%_UJ;B+8GJz2RQ7V zV!g>8IEzj>+0u?t-rcYV(#NurT}Ym?zr9I)>Kvn$vk$*UcDN%ej&;S!YTYYK`y40Z z1V*h>rh7K)4|v_Xbrf2Rof_YUR-YVxO5@amEfq;K=bST#S`F|nN!n&$$_^d+EA z^?LhtM?M4GakQ)EzE6HVqYTFTN(4e4`S$D@8f@D#Lr?Gno<3w;zg&dCHk3(!94fYm zc9L6&f5<$wg=$J?qcu&!G%;ZX7+>WpQ6rbz(n=ruQ*tTY?{pBJ!Qbs_6(ysH`!<)V z50RpyPHQ-+?>F^W-h37E38#Ya6^;Y?_d9h-ej;lb7(K>IczpMf*G`6b?Vl|lZpCOP z@NGT)F_<(O{H4otaOV&nvbSn-(>a;^DpS>xl3XfRK2@H1VTVs|$u+$MOiyk<`!PZ~ z_YzzBtHqJR_2z+dbIw`KTD|idxc&=|g!a26h$`hY5ARF0mSne!si;@Jou&9X_sO20 zyrYY5TJ_YAkB*wyfrvcm-xzvux|h~WfvAwykGT#1O+sOgYsXi8-{TEkdCyW@_FL=O zj+8G`{Ud4}U4q4nkDFz?y{rVa4L|u=R~oAE>gpGfvuyHSj&1v_r{Fl-DjC1KcIm^U z0F|#;v3LEW7Gck0CW7Th*y6I+$u$^o$#v}Sgz+4g%HXpju9uR!kH5$Jz9guTeDv$Y z6h#&kDJC$xli;>r*AHwrG#wkz*1in9orO$t^h>#6cqDpL072lLB($ zT$uSJy2HQ*=$@p0{PL3E)q4ty^fC|mSgKJJ1gaWTVdxEKg<&gi zX9fg{p6@kWpcuru#C0$m0l+Bihw!#&Kqe{(b#VswX*`Hwq9F~iNZs}sfkxJoy+<4DVG(MM}Yx>>DHKn$PHh7-7smrn&!k&Awy<2nD zV|B(4KHwt>jCH%>h5uj<8@m0aS1&xfKffs`NhH4V&AbdG&(EoMdZyoRIw}XRU)#Or z12~v-@nZlY3F!$&XU611n`e}wsvU=OCDy)q*{A$I;X{0%BKy<>8`0G&2Z$@81JO1N zo4q{_vJ3r*5}X*Gg;blH0c3dJg1mvuOe7PaH;KLs&?${UK9>3j zoOp;(?HQEHz>|ATqFM!N_hDmnW4Z@|++fL*oatRT>KVfze$qDbc4L-6C4yka(n;N3 z7unMfe2OWmtWD6|W2>57=)Bzk^LlJSmW8JuZcwQCB=|Wh6X?C4^=b;*)S@7G4Z~aA|*8J)`;x zmTpgr#$3ODCS~m3je;=Of=t`P4~Tj7x})Is@7%T>XU}EMdw3c7wqgO z7~uI_gP!8HR=y8ncUb9Zv-IHWY98&Ve0TnbnSdP8H=dt5m?>hW__$n2Y-+yYdX{T* zdC8Xx;GG(HYjzsPBKh^I3?DK?rj}UqJ1*zBtJt`rA{#Rgb1P+8a@N{%4Og6j`$c0) zXILITQ0ps^C~|%6IpSpg(C%7Btx2Y|ouF%&=G^V0rgr{2a&VnI0Mbfj;jiBxkQQm}S5|({3iqWn{7bS(AHBZ8-FfI*E_ay!|hFkAV<mDpl# zQ@`jh3IDxRRsDnDT6+&hjPl^g)Yk@=+a1#SljnPBhW(BiS;U@KRS&SO4L3D7jsy$g zN(XwZ8RNcni$?t4;u^P`Uoe`AY&2kvaSy1rI^Va8eS#~}CHXNn>g9q?3$~+IqB>_pZ#6aQ$c!ba_DIcrX_G|-{l zRY34-Yb$C+%-b`W!gChY_@b&_(1Sb(DR>FRJO+0_G|GaPMDH9ADA@jVD(%U7O6plR(0bh>hGJ}2z8D2(+#n(7`Z zSkp6BIO8{#_u5~@fF^W_)Sp3k;`jN|i&e9+9aZx3X8afRS>lo(k8cgFuQfMhnC=%j z-i~PYBkHvPJq;A4-}Z5hug7n}%k^@Lo~Itnu>AI9D6B6eBot$1A)upI%qm6#(=7%$ zh-<&aN?Xk^YB_t!OGJlknJE-VOeNjSG>O0~_0b*d9#rYYU%wF$Rmi$YVq)bemLM9O zl`&kJulNFXfs&9#fMVa>I$h+;meX$O3DW*Ykg5ACezR|xiA22H?ex?EKOMy_LToca z$GBxC&EJCjygg?v2JDi%*%8T)c;AniCFnk}g-{qBu-DJu*lh%3B&mWg&u-mh()duv zsiuMsFCn_9O1okj0xv@QfoId9`zI%yK;)1cdDIjj6XinWGl*{k5MD}JSZcE zr?pBumRD5&^^N7_xxUm};2(k&{45YUU_pKMl1g|3+<|D`nHi#8yYxgh<@(cSRPqqg z53nwD%IbtlFXN}d&@7l)8Y}D|X))l32m<481RUsX)GlXX??KbW3P}9}W?m&Z7k;Hk z=*!Z)t6z$$&)^p*Q28ZKdo#r7z!!yf;lod?Z^k6;t4I%*a@g0d2%+L9RF#MTba_tT zEDwviQbA+)lekG{65}1M<95}0@N)NqC=D=W0bkc z>fV5xz*s1e%{{-fd;IWQguI!x-@NWaJEK}g+B|3j(QTZU zWCctgD4wRSAS7Uxd&MD=jC9i7jpyz0oo)o9Kc{*L#Lo~4=m`+EN!t{hXhq;}XjaGP zTd43E2nN$o(JS{RZ?Aei%~qJ(E6yD$ThlNg-#ge{)bwG$${Gf@f9 za|42rra(z(Llzfa*H3|q1^I?j&uQFsmf1+EBNFO@EKav%4ci>4N+F&R)WpT2r?-km zSTq_?oqrOD=Fr;v09xtVe?~UULUm&azA*kywBtpTGYLx@I#m12&Yl;jSE3hoH7_1v zo|B5S&Hjgt=uG*T{-vX+sPEKUHN#@OF;@~c;nwI}&4;_QL%ZO9=M^P_ zE4}C=g6us%0A@OrD-zU~KE#f&z&mcX1c7-Y0kres&IV)YNtmuu4#(uAyu$h;P1~B% zYmQ@1ZT;D|=m6AJ17Zb$C#uPVIbqa5ac##l_hy&>%vh5&@ooJ(a^W4<#gaoFS!E8C z?OvE^O&DW!qi0O~Ik2#nAs z%s=J%Y>io6`0gfMHh9E;t&WR3*UE5lf$nA1fT;5p6);I#1_ZGYc&QR!h zK}{<31P{@V0hiTBdMgM6yA3{^){l^J?hC&?3z}}w+vgyE8K}VSB0=h!)_9qdP%Chf zGCw~bWy+upyy!i2FF`FthK9Y+y2gN`YYJs#pp1N&(pKd(P04frI`c2I@`Mgw@YOF? zhx*aq2Lp==M(8DU4jahR=0^E52%F7dQ2_)FxHgoSgH;yHqicxwwa$V{I}DI%C|CEF zGs?33ocUwucaaLfK7^|izwIGg0_iBsAatjM+O^oKKiw)7&_q}qqEILv#K7n~qHZg= z^`MOI-{$1v%F-?})CcGu)D+;d>#g(L)B*pHz{7lrFCZNzMJ-auyeBGkg$4Tls1SHa zB)}yJD8oh9pA*UGn?qzwDyW=!$#q>(fd{Zo#JH#*6g7|mVTUptAh6x4{Kp&~{mxha z0_i=hvK*W7)^=`}=|MMlUf<3={W^Ljqt&u{(l z9LIC?JaOOG^?tv``8r?cImp>4_Tjb0%kr%vj8ly=Yg~5ykz(yJ;x-;67;bTF?@PN@ z`&I7`q3JN8##=l#*6?cdWkvAqvmEjt9Iw5!rS165z}K@?Z{2x}m8Fde`WtP$Sa)w+ zK1-|TTKb@`T`ywOe8J(}af^~>(G4y-QQl8@Httt9NeJ%#sRCp^sb(A<;kEOx!0FEg zS)h5oHi(?SKpP_W7BTObrun#>Tu^~ZD~%Xcm6!{?)my{lkblgEwb8IpS|d- z<`@2zA^p$l>eVAW8BZ-=3kLdczq)UG6_5HprB|%EIqHT#J&1!-i+x||dBSNg{fN)G zG;}LrQ2u5^P|!eSfb{iP>86L!e}g(}QnBZe>s^{IE_pnHGZJ)|VNx5!4?6r(MkCiq z8nlp8zyXH^@l~q$o6AjiKu;zOCBWgiXKftuh~H9qb?j!D6&zV%jjF4w`yTkUD>9rh z0TYiB_n9PYK-G76v}GAar`17CRZEoB3RCWDSjr+f_K-tw&Ne+tc8!XPG-t3R=f-`< z=kjL13iX>KoY~GJt-TOoD#&g?&7*E%k?3xH>CzMyG%({q0{Q0MCrySI45#V5v7aaj z#Z~<2dn|{2AaKY@WvCsK%OB{tLZYH-Fs~_u@CIrgHUsIWkY_&Mk>~!%f}KObD;EBq zmNEQfGQm%_!c`#=5x^bx@Li%Abg8YKlYoj;+nBq58Y*XR49LC|yWN0B)BVvR(%V42 z8p~}T?yP@vr41CK!xA>l1TTo;iqH%sQ_th0H^pGiMOIIE20#1ubYfEOc;m)nnHy>K zjTpm2SFjSH1%p_!lp8f)jX~^bI%ycZ3kBf zA1?Z>dyjdqp`l&3aqHgqsSmiU4NYr=X1&*P5Jwc5cW=1o@L9wbbJ^mR1t}<9sd}ww zUi6d-R14=nU|IPB)p{6qweIQsCd$M3#=$J#QnvUr0S0A)F!-7-h)DTX!^>&VtD7< z0p$vFy)K#TS6CQ=3<GHpGrSrdcV_CKq z?n7x*cXYyf$ts(}!owX*qp&>ZNB-=#CeK;oXS!U>iLc|>N6=YRr5v+-n2VV{67JI< z3P+AaVKYR~vEA7e3)qd2NDmq)KycqcGYT^eMWZHqWO|c#nUvK-*tWrGEQL5Ubip1&Vo85 zXLieSUB0OYpGxJ$-w6t-c4Jy{)OX*v>hLS?xF$d!wEZo^?w0j`sF&g!YGjyt9b*~9 zIC_}<#v}t9EsN!K&-E*f$4bmHW>y?vx?&-h$nv$GK341;)oU8=*hjyc&{@qhKmpk zTk4VFvsI+9>^zTuN%+i?p$8x-2b-u;nmRD6_X!~8&{%_1Bi9j4DGWbaj2 zG!xCuq{dj9O*48e(l2JT2(@QCIw^W@)LXBu8(2wl;(IU&j=wnjmMq$EmnM9)C%A^l zeJY(2)u0YgP?~bBHJrcvMjq3IbRNzE1LQgm0><9Q9FS4b4}L>L=ilzK1noFkax(>r ziRB3^(*pO2z(B*e)*SQh8?~AEyjZUm=GwV)XZ&2Q=Cw4#u@48?Pn!RnbVK9A*Ztm)&jv)tTYgzr zZ08+#EXcg9J!vZ)4Xw%chj({uL08Mlz_w@IkxhvblY~*MDzDO?bUT$V{zv$d(gJ#U zEt|Z)?p4kii#jg1B{5{vbqm_SN7)tw^%CcMX!CxDLX%KR)K#kOy9le^}eq*H!qBMtl^ zu?Bv!e0TA4O}CCQyishMWgZqnu?a=OV?0tH$o#W{_OB&HjfJs-Yye4o76ripY{{MA zf4KX|L$dmTJ%NPNkS+muV%+99w=rBQKkvH_f6oAGW3(AhT;(42NyA?8?#GXsI_w*S z&S5YvBqXGsN4{ljWqH9s+}(7j$Yi$Ykd}VilS+ActiIyJxXNieI!ZzYPZYg??(qFi zJ19#UiT`J<8glL=pkX2p3TBOJ;9dP!o?G_r4nuEoN=OP;uWX=D_EBS@u7+ zOkU?o_!S>)K~y(w|GM?!T8Z(!{rm5944#zM*rQ&t*}go|{v)sUxeW@uzR?l|oG-W& zH<>c1ZV(8N*t#L<;>M$eo0t@qBye51K;`1H!-^p1G2dsQcb9mx3&)JJ z!fzq|q+`JjXrq=}sXS6ICy!fg2scz=cdBmn1_zzAwE@m}Y+xLU1HFIqyH9hAo_%|z z3WJ1`Xb~fhj6gvtsn`mG@j9^3c7zJ0Jl~q8)L&2g9xUL;@URmgK97S|}S6^)2`x;Q2?HyjA6K&i@wuz}78( z4jg{azswi;4wCRGhW%?G^mwti+?SMHB~PS&AYGV3=y4g7Mky_x(2a<`q;d!8J>`wh z6@tT?Sww>=XVTCDBc3zB_V< zT%1o{F=&bJl|3IDKI`bdnXLeY5!6!G;)hRE?)3cgs%DP(-sqJ!wvAa`&cvCiTKNE@ zPN!+v&7oC86V;nT@hRAZztmU#0B6H25|-0V(4&FLm^!L&L)jJGHMu{{1v;IZsbq6R zGS*2O?>t*jWakqAh?Jf3`-TGfA?md+$T@9ZB-8C=FsJYfbYcKY67Z*lz#0;-0RKU~ zyVTRrZ3~yYCbAYw*Z3=T@sjBj^q%{R$ z1CrL3uh>yo3E)WP)O$#CoF2e2=f{e6|NLOW8M8dHX)rc6uGcslY$4jcr-nSP{6~)x zPe7u^v>l7LTg^RZBEvqx#K!L~9TTbBaiaMj7JUJ$WKijc_cuPuC4kTVfj9t)|Fx*g zBp5-wtOcFu6Ep~R6y}8IFZ@!3ip$y!jC;k!gV9h&R4d~)jvI@qy!0uD=Z}p?@=+j77wx6#7W$$2^*BeUypVs03r_WWVZ zBfEUnx4pD2&sG!NwN|8X=~e20jt)Cvk)0ymc+fI_b+bTdnedqWzrV&O+sbr2(W&%| zdxHq~1qzL;^K>%wB|XvfjT$FH3-|`O!rrS^@*a_3Us9(*9Qbqpg2iLjOOf%%LoYoH zm)`YRN^36ESENBmK<`1NvqQ3@nAkJJSWA`h@NUFDY`=(;b+I1Tz6#OgeqS@IC3gjHj1!ACBV|{k8cvC|@=pMKK zN}p$s9yr%Y%zS&cql9 z^k4Y%ZT9>wX%)v`FLz9OzB?b=L%l_0Fh26wM3*Q)yKXMs@7x&o9|65SmGXT@F09FZ z!Qpj-F>rSE?b@<)E|w&dD3gt2b9Dr4&T?8Qx@0s%U({M%1Q=bQHhV0H}CpfdSy6v=obB+ zi`xDl#EQzo_`1S4ZX+fW< zN`Tw`2a_=l;K} zzPi(A&9xRWg(S0z^`5NPr~e1oUP8^ zd8WF9h|sKA9OIRvb~-j%bT}19_45C^S9Gz5!nW7yy#jp-+{8|Q6*@!9FScRJfeN0B z$NBmg*SrWaSo6qy)KZtN;dvlKrRCwom%j9saqEtF9EiB8sPy?eRfoRO?A?-l19#%S z2hu&v0zouBf@|xo(iyffM#LP>v(o?m=7Z#Wq2Q=Z?zG&JNA^k=$>QupiE6g+um&cb zuwT>8cSWG!TZpljuF3pr=u5sPf+fBrmW!_-DT-@kc2kt8JFPG={vd% zLFGpuKl_5E*{$@!7ur?%w((1cCfmC?y10F`YLHjsWiC(KWPR8mms#i=ua(iDTJrKi8$O2l|G|=zT^D-z6BBv`Mn;TYH+l*Bc3I`UD6bVQFFX$dTIoQuwwpXHL5W zOaJpqcL_~Rk$#O~TJeMQA9;C>`B2X>zR%dCVko*+>05qjcqX%TFRoCy^!Qg*6 zk)P*Lgy3Y@q9HqDi)t|%1IM0(K56M6A3RqYvq$5Pa(tQ1HrGG(BhQxb=n{{hTP}2b zvBVZ!)A(*ssqxuHcem-KciGQYo(;v^ADdm}dZ0o`>9A=mTF$s9%6@H`iK@wr! z^h$QBA-Qa2sWD`n%CWpa+`phC9vJ_qYf$Vo-AW@{eS6h(g>QearRSW|>X`^TQPy|o zyTn=>#s2-_8WmS~KVQ&~2H_}48vW)=f~-b|z#IF+m{E4lwnNWWj- zmvfUK3PLywzj;y%c}lpQ$5zLcmXG<>w)###UoE@e|32Xiv1>JMvYb%3Xs((t++LXN zVWv>_?VC|(_JqPzgaxGF66<@nn*k|aNRc&m4u%ShY5LZ8~>V>~rpO9kHaX8QR znah{)sP6uEZvt#$;)@$R^}K%CH@8fOUs;h2YYfxr$ZK1EWF2?OwQg09@X}LSVY4(n z@_y!DU0=hND2HP?EG|4=ZN;eqVI^lSCniEce}dr^g{Ck>yEt0KO@Vk*`e}@ z?a8f?waKjsL~C$_Mq^+K-#}Y~*s@A<}FYMnES*i8`0&w zoH%;C#C$#{>dmqL*uuTZf13V z19j+V$%>QAY%qv9)Mu(E+V+SGlpm&kAKndR$_vp9^0#m5t_x^l3{QlLc{s}jE=X)l5TszipoS3af zdysi5xmrPXH_b|2;_eqk4(mW15r27W-VqvaAL}DUjDf^MCX-h|At9dPK?Q_K1)38= zJbI)exLr2*@*WTf(4NBui9xzMdQ#_k)db7F)9_9K!q3TErNbP+EnXSTuCfwPsM(bo zC{7?FRBl?ewne>OGKgKoIL=+?t3OAro&feMhoQRESVGITGKolB3+ zefRKu4Ez_->I2Drug^vlS!D07UC~_rrjy^H+=jj6m-O2$N$4P6tXfa?@@^x!^sUZD7Y`|FnDn`692`$nPp#RHvu>V zVn?JN4%|ic-(E2sY0nuSzUtmh4c`ltrp3iQA=0r7)3sQ6&lva~!f>dFsL`35vo3w} z#(?sU$IS!#SH`a_*MrYJ(;B7iGQ50tr9FW=2io|)@Z^g@V{^KofTz(DUxM7T0;ol; zy&a#Xtvc7iqU#f8etP44Qf8dd5aJcAK)A;* z_ZOL`IrC@`0wvC#hNl)AJQoU*SuRhyb{=<}ui0QKHY3L%lRellUYMSqJZnV}r=4FJ zd6wfy?N`I|Z*0j~P>N_RNmvuMK+ol+2&E>1c4o_tddsMjF{Gpgi=h?X4dPK#0@+q+>Mn#Yjjew)!{EkF6$<_?u{orO*dbgfHR zrbq`K(fZ~r&SK5f%e8~U5B4rN}GiXkC8m6T9h6{jx%SuF(wy^G^G z6PN+c2g^4(`>;TM~Z!>AND@MwvhN=JE#?9XSUxPUk|F;Ip1vo{oyx ztQv`?O^0_0IPLsGgfA{#c-PIcfR)~Th`^~(rCS4`fzD+8>BH^L=|M7j*LzHtBIPtn zRCk^rRyF3QW&Eez;xr>1N3HJ2yX?C60SO`+EE{M!rYv~Ek0#5``EmPzx?_e(wI{=#bGQrq z7&ZZ{Yd(0XneCy-ol@@|!8QLKF~a3fkNL`gxdh`~65@9n>S=m`BIwO3=YjxkQq&eP z<5fcc!Kdu;)a)K+F|Yr+_BFww!e0c6Eahq}4-DAyt3-MQ%d2JAc4+c16tzd##9X1> zf8j2Bh-Jn|hl+L5mcil|{jW=B^k;Qn**@v-zW~2^N!1H_g)4$^pm+++&AXt)RYuu%JKgFLPB-NMTa@fWrZ@*Q`;YauF@Lb2-F&@JTgv0A(H)T zws1%v!^i`m`ssUylOW^05^d<)Hge>V^Z4O1HeT2K_w{)WYBf4RweKPnbBLekG|YXr z`X|2dNF1>+3=0d3po@E>qoT6G&CLyPVL0ZT?#+?ZA{u4f&W?0v@jsQrQl4}bMV&#(2z5M%YxzjjV}Dvjn&7Aoe_8_?&M1ih+5?1q z!#gu^9wskKgO&CUMW?rBc5$6PH~K<93QVtLg}-8>Zeo>bSqvslY1U^1zYXK^wBub? zjIxefH_K8!>AF;0rCFCFAKW~6ntIFgTG-O?vL-b}e9IzR;LPOl>sL*^rm5;Bb+KwW z2Ujh#&1T=bb$!(152bS}9oxUGKchqTgkt+ma^uVI(d2Dbd0Ivm=RFC`MK}G%Op|w? zv@}XfNpY3C=`)R;&m^8%NC_qv%b0omJtTSXAf(F`?pcsy`k5e%F36$8`_U4(F(-H} z2>JT@-VfrGys!~dpKp1eNOfPq?Mc9(Q6Ejgo=n*C53-ImfuV+|NrCQ8TR?xHnDFbw ze+0g)rmjw|=`-$<@^_W{jO}UA&uJhZnht4tk`7BI==rI^XKDnJL*d`N4ttK8*M_@` zyL2tj7cY!Fa8G6HeuxN1`gKY#i6JmL0q!fy{Q53@CAJn@e zg$;kfdj5rE?&gXfa_+Dp!;EnJM6wzN69{d9o$NA>yr3-nM&+fa@&z^wD(>z@)Lfcq ztinQ0`AkQ*wa9?~wtbjY2g@(`gG2zgY(-JlOsbO^?@j?mgku#t3U3U7{^!RR_G=w)Z8 z3EsqUUglnyLF^R~352XKd=W{RNlJW^=fboFCgbqt4n$#xD6gufMmoNc_VUNdRmoMz z*1S`pO-IKH?h;tlodhv5BsTUVh*P*VTS1#36%3$$Cul{wwZQ*xcZI~|A8#`KIuRJj znI;yWtU3+@Yfni{CCwjD@3}#46_{wmrbCm>8sbghY5-7GmFD;jEd@}hBQa-+hpO~l z@If9LiB^-k&3BpPGl+QoP`bC;oayQ5Enq3)x;|AUB^4%7y@({AmFrNhCiRtZ0>~Y} z0F`9&?V_gJ)sS2J@nb(86fcIDB;x~e8cd+AK!F=`dEm7Nv46XcWk$H%Ti zE)QQi9HSXjr8F7vmLqMQ!G5p;7XnlTkh^r$)i;sik)$ZLdZh51tL+c*=0l^RPF}po zA2LxI4~=EyS@K+yMd>-aLf^G?#Fh!vkKs?AXy8L2tz&+hfQr-sG6=$^i-4TN(KLX* zL+`63w>;f)|0(Ed>q*c*gveLgHWdw$^%ly8y-zmE+1jjU`P}jEsl15PCN!)@O}FhtEcts5>WO298b|mRgWZpdeh|y5GF*fQ^5y% z2{rYz$lmyax=)|1G3x?b3S2*)Uz5`K5>j@Z(HP7J+$HFkBw<)W@~C%7T|S0U1PI;$ z?0v!8e;{7AgcQIW*^SxB6#AJgdks=36SmgdjKxdmczzZ+??bYMdbA@-WGtm)UXR%| z8WvK*+pwEd)rLzwKdSK1P%;=mDS#ZZ)ujz_v^yKWxg5HS$k%E~!L)!8K68k4U}eL? zL5BP-fo$TZdAm`4+#W3=DWTXfc*r4BZoWcgBSqQ4Qy~3O$y11ffWd|Y&O2BK8qyqT z_%%@dSAW2T`W=;?ke)a?Q3#j|e=kDAv{TytY4g!AB6LUGH7^20;fQP4Z}uZS3rP9W zm)I>Jn>h;$?nl;5&y5d4DEL1*;OmPI>aU{3E5KaF4O7Otj~`Ra%e=_`%fLVxS9Bgk zHX4vP*Fa^MWDfE$2ZZ4CnwiDd4?@V8+)@Hx0^Aw$Xa?tJLCa#8e&n;MCMVgG3XcrCE*{Z1A3ri#eHnInPTP058PDEsUnqL_HT*SNyKLvBj zIjnCC?7YD%jx9~dF2`~s@}MrmLefE8J^-Q9|HJ=5|85BZ5DYJk-DWU8+a*0{z5L&d4ABSb z0eA|ThR;|*sO8(f=>SN5Q|_0Xux}sr1l)X-u1k8B7sOEkaF#9dc*j9 zP2Wp>pon`bzh@?g6z>(*R_4!fEmP2s$rw~XISo?4xhlqGWMNkV zisPgjzM%|`UNvTS_igws#YoB&##as~*r&kd!+^CA2Rfk25;U6=RXZa7TO|MucOGWy ziYT@aoiIv%OlCfq7llSdD1*yX^ZIP9c#9ONoB{^L7MvP!fC@0?HEBov=7ar)<`?H6 znqM+=8V}5=h#6?r+2+^!ssk5yM77N4{MT^h``N zy}abxO>S&P3q;Zz$?FP1C}zB4Y~e7sxH7X%h$})oo|YUu+CRSr~KJR$Y$sj7m;v zG-G;zbaX=7Ap6Ha1@BuMHLU8pGB|EgtSp za1254u|kX@qu;MzmfG=hbp*WQS|7DxUQSwS$S+MCM}Wk`UwvOSqT zI^2N|H~`uwYB}g$S0lk1y2Cw^1~tlm3)LiJ0|zVx$*X>AJUSXE-t=Sf@r<<*+FS5D z^;7gnH%L(Mz#-_xZec2ZO$vbm0!IQ`=MAtMK=p(p9+HrtgYdCNP*CtZJ~8?BrEHpg z;4Mh1^GsreTj-Y+_#<*KF5nzLLiyTN|i1p#mZ~ zaG<6^!-yUgAdK-gfWEs|K;UFs&QJmJuq4Vhe0KuOcM<`FD>wcg3T9H&28Njj5oVym zQ3JyflGKJW2^*3`FR#VBdf` zQu<-ClE{wj+b4$86G*Bs*pA9bvDE%LQV)hK2?8)^ywXRb6& zpgzP0_QMIya%sBxca9P>JKo(0f`S_I1&M@$)*l2a)&!a~pT+qD>r<~U!-73%&(TK_5!-S1PDRN6fRJei=LULQdsYbp2)-}s7b^*DAUBOEZwV^d)1b*7-wgIlyxs&9@u`3*4#We+K zHHb^WtgQoFrkxV!y_^4fjXT*?EG^w4W60;tu84<`+5RfY>MPX`_Ylvjf1_Oal4Gub zXii$0?4-EAscAU^uHX8fc&mCjW)$)z;v_ZVMX6&Qhg=RsShqqVBKcr=Td$G0$U+vE zg2ol8`7zkfI5Bb5djRL9u6_-|<;`>i-GQki52QU_9D`x;hTLy&YzUUJxhnD6+S)bD zz5DxR;Zs!Xc98U+(Tb76+A7$w6bwvuT_si*yQgsbGS{zLE$@d(j?MR6KC~-q$^8tH zJk&ohKtnQFL668}z4S=TR9#W=cG#gh{VP|5Nj47JpJKq|Bp(gjOXf|!WZ>+`BW$g( z6mrb+_8{V}t_3$92`NEH1}n6dhz$1_cPe>#mB#qh@;u_~x`+dR3!Mh}UWo!h6=^tRt;aQSJ?fLm3=2Jdy`}q8K%%ppph-94YFKKq$myt%Hfmg`gGPdBDi^ zQ&?jtnjUG>aHCI8OLHXtd^@lP=}!|&vj%%^!hsk83JPXG(RaX?F$L=uL}s-r?qAXa2-f4t$Ak$H?y@#<>3 z7(%_8on7{o1hhxbzR;8Gnb()_EDZ>>IQT%@0+ewE$W9X9Jv=t{&-W}bdybQCKWU|| zcg12y8JcXQ2L`yZ`0Rn;S)!A!c?|N6Bg@ zR}=;v)i^L1`yfYTN#~+%MDTp8g^BF0L&TL7RvGflT-bgdodKL-v}|ksVgnrXn!U^c zTLY9yITjGbbgK(&Vo1g`KA;u*hR2T|3s+XbaRs@Y&Tq?}@;uxBb}LwrTrydCup9(8 z>cJU{P&azEz12ls!Kv}3OH>VP02r1qK?xLiWrl4xPY3bH`V=}Ol$Iw^r;Z#2R@4Vm ziu#Oflq|?va5>B_8WASH1M=|!#=B(bJpX>pi6IxP^^omGk`oG`H=q*(T!I2Cs*Oqq z4m^QOD#<%~d&sQz`tth^_DR}6cm^2`W(L)e`OwQ8J~E2S3&B&!uFGBbfmqO3hL8C*!5Q3YiSjc@gi;> zeha2qKB?b#rnUpNJg3{PqwgTk?!kll58QBitq~25@vy#})>3uN zgcGdhjE&nT_y{4DWUR0R*I>PE(CzQD1|^bG-H|VjW(dUSQ<-{vD9`WPcHogVVUwM2eulQLT|10a|+6=I3PV(FM2o?RUb>s zL*Rx*#;P+qw>#H;1`mt*05N0Kuwb`V5&cR5;0VL+>@zv>BiDQFqtTum1Ql1ag?Hb+ zyKmk|X~#g%_I(Xf#Mn3ri>P&;l9-tqA%Whs%hiKo)-kM1Y_J&M3Ku z7&2j!1DK(kAXZCw@~khBWbgps(&JM~nsXAC?!1p`aO1t-%w)PhM>r`#n^reoxOyk#SXDhdUm$^0fa>4Ay*+V*I!lI%E z?;29Z$chy&Ud|#pWrfC>iTAfNl;;SRlMgvQNHCHy9Y;M<>_L@fR>`_%wp1O}Xn)*? zW-L&?o%)+Tl7QKZ$=QMn6yLYW)}I##R*wi%i<(Pn`;Yv*`bp=)Q2V05hn0Y!)t7Xu zG#c)V+(fC^^b@;irK)tzQI*^BYZk1w4%^IGIn0l$5cd?)5)@8nbc(Mfl9tR)UE8lP z?Xmpo!}Oc!zus)Z`Kz<|T}ypW!(aD2Fcw-J?J{vMdtp{m)O<9F0l>ivMu(A4o(#z*3TlTX|cyX-9ZA`wgXt zq3Wj=>;~B;--(0SYw-80to$*3io($lwrt6v8z{xnN_beFZ=!xB?T1eM27v%br@_zKOC^-)1BF0Vt^^KZi;J{G z^Y+=cgjSk_ld=ple{na=*bC#+#Kepck8emn>^txjO16Ik8lxj3QW%wL95C07IjJ)8 z^@WC-8hxH^OVSAj)FXFCi#TMR{E;|OcW)uvI-I}=fs5F$kaix4pc-+YYe)8pcMB0? zleOU+m_vUR;pdFDn&g5;+^KyW@@&U`<_D;tQul1}BhM zm{L{Gv}$+$UhMW-;3IhMv9iwUpY+M?45m}h{Dv^%K=004A@MEOI#4)gh z_TFew*7&en_+YJzqc>SN0VdkSz!1rCbFA~bzK(2RNMvMcecIr;aSy$(aOX3_Fq^0j z=F&mEI}baqbG_WU3re4Xce$ZAjvO3AVf}fktJT?`uzNOo`1`;8jbLygTexT6G(EG- zKSKZ*GW>^Qkx{I=c)ttG3$~#dBOHiE0)s?64du{byc23|noZ1o#@6Gts+8J)9--aX zbIo)k@LMPQ2o!~!VQ2gl?!D_iopJVU)+MlqpHyV%M=ZO4^P)}Q3%2Y&W! zM60^&zQ48GJ^9~@f8n<#=eKqwFRFBo&rMWV_!j|p%E|s^%<@vA{3M!k+7_SK@GF_` zk-ueB7xYma91&EPlg$zWoJk$J<@3C4FLmILh8Zx4K~n$VUYGM_7ohIj4`?tsW+2sDv>E`qR3L3_@s z)8l3$>Ww%KNwD0~ndwGcJvr-5zrcaBxA_GCW;OrVk>3|AX$Lpb?35UgT~2ZFbW9RC zZ{ZonefQ0Kok#Ug)32Xu&S@dq1(?0|y-8AgC@(Y1!nEK`-}NnC^2?CVoiX~9-Cvcy z)vhyWe5ZMDT1w=;GjF(-rzM|TnA7rVUFNTa{*wZ!sX_KD^pnkIG(sGE->=$5X(iLL z6JB$PKSt6=B_97tkaKHJp6Y*H*~VgZfHU~U^w6mRH~xEf?HGqRZM-juhAu6zjd;!V z(gn-QxlaoM$QqI57IH2TIalJlW@6MMjy;4rq+(}m{P>5`czXcqEu6E;aPyx>UtI4l zy@kh%KK`U_Z{G9DUK_{Uf8=ath8SrBiy@gB6tIBcW{}Nb8L_|M# zBZ?Iqiu;%CP-g4DF4Kv5W6mb=|itqj5Z6BryecG@<0 zHGkGg8cBKf@yX2Eyp(QYC?(vCvqehA;nzAukux)b&gmXW2{JdTTL>`upI7hh$WznN zxdf;c)jOydsnc=9;AcFCaqeCO`821;rO`aIBYwUk1G7=4^-ib2t2t)12QZcI}wrOAXrfmzoaYaAHt!_Xv zs9+@PS?i4xvuZI(BFf?cjPq=I%TzD)cOYRUIeo914z@NH{umm6`h53>{{qftuF10X zl3QzewGu?@31uUJ^Hq1PV7=J?`*-e@HsQvn*}MJHY}~b7qNE0-jN_bUn4H`-HRnx( zF8{otHr6iSzM`+gry%+Gi`s?4uVs4s#}|b2Zy_XR;qaQ#RB-m3Key3t7GU2Vr9hO4wS z4x~3<+s*HGbguk=?^%3#X>lAlaaz1F_RgU#Ve_--5FHce1<7B5`9s0Ue! zLt;Y<>a(ih4!zivh)z>ODDwNV!?XiaLHGiwIyk%%?#4(c;z(wEe0PN%%rRpLjKr|W zCP_xGxy~NY%J)riW)r~(de>0>LA#SlZ4^mgXT;HVF!YIhS1@$=S1HXY*opw$P-y|ErV>2|) zL-O9N5hXc!#L+cl-bS{3{+4y&?D2YylAnhK-e@dh-QpgEp|gN+7P|?X1cdx0(RgsP zPI+ELY9Bc-qsqaK0i7yNG(qoIL86?bw=cGrksbl!kxNsQeDpKIpR+5&BbI7=wTfm3 zF_QiarEyY3yww@S6sNca_r!_QKB{3ZsCzJta#xjGy_2J@G}3Q}NNHT;lo@s#k4=ac z3(e#}0%g8jS5O#NsCeAgHnw=JgAT`xqS`ZQcM~9mgs5YGuj*h993UFVIVePe0FIgr zvvAvDn&(41tL zqmwj0#MpPTW3^_QfaE(VV1rUacyp#z;mN3Tb!C+yhZ*kzKxEvvP4+wj%7~XIO{Kz3 zmsn-?2bk81)P!M9bOToJo9ZZq1WJ&RHImpQdwXREU}b%`)){{r{=5++j&>46O?~Z7 z%v?E}Z>I%nU9KqL(C;Y1Nhd+_QBanZFC>F~fPNAQ)I6hDtt{;7Qs5yk@z4J)rJ?0= zp4-D~nWuhPu!Kv^45%aoG)nx6P4Vj>v*4SX4@L1-*UQGNA6jX_`}@pECWg%a{B$PW_WQ~2g}C7x_Mt9@b57Dko$R0rGPVULRDU?bNY}O zec#j3lRqD}v9(TLO^Ky0AotmPd3rmn1w{{pvD>n@#|@2xq=7tn3D`S{+~^7_qfy>2 zbd7xjwtcW`g}KE2KHl&BW`HACSGWJWe!X#Y=AZ0J)9Otk@&8q`>%d?Yi>-4axDM zp5CuXgD(_u=sWaIDt{@7pKkN;q)qc+Ht3H^cuvbokW1TWUbHbNcf<6#k-;jFr8=y% zzb+v={v@SwL3n@c?#r7iCR{%cZ+JUqalx1s_ymS1Qz8rxPERIH ztDOUO>Hg5#xYMac3zt~M_8{ZNUaShu9zSwHneaFJ=g~35U{^G`j($AQVF1qOd;$VD z0L^8sD$l}b9v|g16lqAtf||BA#=oEhuxqyTg9v<)1Z_Ryvxb*(4R^Rx$$l$Lbt%+ilbQrc(8EkF_nS1v zJ|w9`d&Uea+6Wi=2fP+%$IW}ceJyYxA?D;QdZ2P4;k)^-^L%Akd#yzZrxSPprU&d& zm$$-efuJXk^en0XbX-F}-yH$CasdSl*}Y=usa+QyFK{4*T&=`jYXvGK@Wk0?^J8*v^APy6k@7BPob@rI7H9LNWYJT?Y*NofeL`d_VQi{5VWWvOpX&#u!97Y zE3AC`y|bzHw^BgS!W$gWd66%v&4ixWA-fw`H*6k-3t@ z9w0S2`+Qr0){m@{i_F`%HM64Bf@H}A0s1#dgF-8UT4LY+{aSC$0mTDgkw9grKlKPt zFLUi(-m#o9EwR5P;Ok-;v60;IecVk$%Ku>c0$=fi=o^1eUXEIH4t|TpYLcx$dJ#;J zY$+bydfr$2xLTvVMmg9pg&Z6)(4D< zCzKneLi*77;H`%M0BJZAA;u}^`Z8?os$4dN;mAP@W)qxl{oBZ60;+T+svsmI^4t%c zxas(1rc|3+uff`D(ryjGC9-@c4=@F=Lg2XN>!K zU~)b%|Gih?*fo*!RVH(B#|z$BCL3K11Y5wy!KwHckk@AR!aO7l?nz|QnM{)t|`F5 zIfIS4Q?*+9LA8%%M*O8d=9t@9aE$ExKL;?zhIzGOxo~ofWgh2egmL|wk*q_y&y8~G1SLxzdA6mpjv|#Z861u&YJV#%xlxeDq zHe^W@-%$`%Isy5)sCmo*Nhh72LwlWhW;%%LWdj(#T7P+}STER8;+85V9P`|N@bkW4 zxpIWC%l3+x*GZZ%4f78 zrhMDVpe40;p^}%?K&sSRy;6Wj*)1qZ&VQr-Js$33qT6Uv5B3O_-f7*)ICmw8-C~UL zmssxWdV4AE)8pI9r|K8Hy9|NwcQt=J-QA*SCwab@G8l2pA#V6h-ON znb*RC7Os|1PR8ZT9wdr`+h2IhD@V(Fr>=zQ96O=a8JeLqIO(eEy71I!yhB)njcY4a zLhV>D>kGM0?xhn;y>}(W%&3a%>5rUB+DKH>Slm?K{xDw5Qz=h!`cmr3t>%U(Vo;-J z#?|mqnUjv)`V4~B?`-BsP4bsf3qzZ}fr_d7?WXb{)Y_YFM2{#Et*?!8T29S`|H@p| zp1E7z_vnKOM~;M8V;&iT8(j|RTfj^Kuhn)ZY}1?($i%sWtR-N(gtrDtepHXb%!dPMKL&? zFMK@b*^=49%{$bvvQdIsl=Chyxp<9m{r)Ttr!#9h_xc9fEy<2mZ&*VL!4NA`2?fJx zPn2x^cH0jPr`~#cYhYfj+nMH7u8y`r*RXTUO7N~D_Cs^HJ@%+B_eH8_PI&Ko?Qc@z zeu$*5l6uaGPE!H9DDjbPz8RGBN%0yBuEE*C^#@lJm=cKYDE{NgKMbrrkA4`XVH-|f z2(B;h8AvQUH?g?J0^vD-B|D}4($Bw7;}e!{#%vs%)k$xGpaOU4!iWgw5rW&rS45xx z@eKTua67WDk zda3br2QCpb$HWgW1Rkas4YO1B&Nmz+*jq|m1wOy%uKnT9M7t(~PkVZT)|*)B<4UC4 zoS*%)ac`}dju{4fplqc6`d}_!*tRZV{RVGPwLZ+g);K@3{;rv;kiuMv(3s*@!3K)E z%+t}iiiGClr!H;C%2PB=;Kue5Lr+5)^Vyoc!24WIlgMvxcd!k|8?0nseHR}|m z|Ml2L=-7qMFeGHG6<)aEDH*hIWMtpQk%Wxyw3jnFrXN$sO+S}WQc?om&$`MAkUxK}K0DJ_oa$^JaIm>FNg>ln6!SJ66U*4e#_dbp}$uwk|C zN>saI{7JdhpR0WT720Ux+19kaQ+O+0q_F&X^dM2zo^Zy%ukZ;W zqrQ7UXy8e_dFMiSeNg^p_cQGRr(HXqdg#eCyDb^3oPOahHQZH@#)h?jdQ6k)l;2PBAsjXzE3TrDdf}dsu&uhoqxS) zqr&k5U*TB>Et}NhfpFK(PkYx4sQcFh64bDT3-^!YtTi|@Bs-Gh){!brr6vz<8mDt3 z8U=Rw8;QF3*J?Kk$^RZG7pe+nsJRu(Hghy#yTDM1fBU}Dk@tCjzig6R87r@8c9KsG zZ9h{Kzi@S#;-?Tiv`0s0U+Ue#C-Q2l-AwJPx*S5Ai_Ew;mIqYTU0Tdpa2w$W9t$Ga zxKx|&-j}s~YPq-a(sdi}&zFpbxy!jMJGoxUuStBYEr0d-xylKeeMDx{{%x0!jZ1&# zemyqrSbfQGW~ZB1>^gJG=jmJwY})Q=$YoDcRo5DMZiu6vVf%3V{%r-~14=x8_>Kjj zz$WRA)ue`wiF2D_V$=mYnyM*zVq@;nG8CM2XZ{g4cFMPhEAo%D?LxjfIBxeHQwyMQz*0N9SLMFcmvB>~=rBb=o5$HLmmx5xbgw z&b;Yh1k>3}xdPw);)L0_Act6W^G&gdk;$gM7iE_wE=7q&he+fw^~^8Nd%AfJG#=@4 zagCjxWxxNr^veBriisZtxODZ6A~?;)>yiSPUJi5oU#z_eFxT(?H~h6^i4bMUTGs4I zQud`t3Pn)}DXEktMd2fbP)b6JB@{xG%2wISR#7S~WREDj?A)*G-2d}C=bmStndhE) zW;!#SpM1Zc<+|S2dwDIgY%kvpkF8Z);ZnkQyL}=oT|hVE#l+;gAI$FOgOdz~w2O!D zH?LcI=f@e!Xa7%q=9AKzZpG#gBTfo!-a3+^?loZXW2ekA=VwME9YZ00c?lIg{!%B$ zG~3uKS*E3XgQ60fSBTmdjKAIJYxe;R{^YY2vm8GHe1Gh*S};5`U#iHoOJr=OrmH6S zw8?t2(i7c!Zrg{F*2?!k89(FNdWHMiGn5zsUdt178mJ8UKHFAiZ5`f2&mLS=kntP* zAX7(wee`_uZbeVT*epP(()*)#YWz_}wxyL^a^b3=&-}d?-LA=9GfyHq>$@y%v^}QA zt~LArP%>Xk+aE9>xMx)R+TAev)=_KfwYgTPK-S3(lqN-G8*!2)zBT^*`5Z) z5|gls?&WwJXTLNbPz?PawCIJ$4)mlE}@jkH3e`b4t&(VA2dRuCqXR5MnmVxF8+o!$0mG$wx_Z6ppU3i&MT-}wE zeziF?<8)=$tBnE?`xJ#GJKsOkJUM<|qjV?Vx^ZeUx6W`y>!=l9*~CJSXvA&jP96!1 ziI{i2Zu)$`CRi`Y#0eMs(8MHGS^ib5YRc>_;3)VOnJIcB?o_0h!dQcW@Hl zhV!qf@6y0n44Efd{SA27`y}#5Z=b)=5OZx%ycz$8i*edt)8mpCG}C8iO0EJ#6WUqR zB_J93!NWezXYrcJef;70)v(sgSHMtfy>H^kP{~kezxGMFvv-;>YoxcUX@Wgp;`>c! z{eSvz{m2+?UlL=N)qJbYR&aR6nLp&{g%uRXGrpHC)0>J%R(#r2C%UlHU^+`s(ZU`r z6uBGHXYH7{1VS@<>F0CV%EuEbGJdz}^UbE#Ez8JgIF(e_l3_TZGxJ>Ukbf@n8z$-O zwW%)jiBTKa)o5am0?X=rMK~NPf_!g0yvVvhf0wgyB66>2BRT}^#Ecmw&w1|w>NA05 z7NRmXQ0k_UTKr>Fb73%S1W~d>dW&pO8E6) z0Q6Jt-D7-vXCpX4S`hVw=b$aDrj`=zWO#+j1MJ6v58a9;vfQ)H$#I?wV)65kB8j7x(}~&ukH)xmTcTQZ*Q|{Ypc;!4beA7VN9oXTDCrr&rRtx zzjaM;i`B%qyX%$B>6x2%f1S)^x?g;Em3KqNrwtZC%9QZc%mS+zQ6)J$)vV07TY8pU zZRi+{qMDmluH<~lE|b}Nsp-Bn$r)q8EPk_2jf|%+&fday2jUN~WCEr$uppslL7uE!zWvE2}F% z)n+Jj>{YXxkbIGSbzC?j&*e*$b~MK%M_KLz`JqS&(X7o%vceWayfOFBr#AQ2&Ab-( z4+#^KXOUKv&X(~@QHBw9kKakumJIDz|D9~}ap<*iqRP;mpZvi7z#DTkLVct|Z zWOC&7_dNM$RqI$}{q$FbB+pR_wuM|e)3s($MK@a6fK}xL?d{c~7oU!)QLgpQDnK)G z0!5M~pS(nmi}9a79X|So9S7qv?i1Aw?jZ#AWlgG4JJabb=*E-L0cw^*)KAc$lexUYdMdlJ_JA2Syq8puj$(18RV(V9v!M=C>5751+P)`LBb8xCT;?N3)rvEPD zOVEG*2-RQ8^uC-r8!oS;6ne;}u0Zj?*?Rxue_EgO(T1}Q%$vBeL#bv28k=m7t=Z9* zg);9=B!lQzUj-76gbUgupApKb#kV(MHDw=S@%R_bW|lsbFJ!HDagxmF_i;$3g=YJu z`Ynx(iE%_j2`?$U_>5Gvp2{slf*#zW>~@6Faw@I!&fCHq;zmnAaU^IU9He!cIgJ4i zcLgu^!Po^cUF4V`Xk9Y+u=>C6f`zIUU$a!S>)MfRK@x6{%7n+7MEQ;)QgJk?t_zs+ z0b`-#+FRQ`FEo0{swB%s-n(nW$C&HqoeB5l6UOp~rlmOi7?`=w__uNXQH_s_gA)t1&Aq*|}kkh++G@7qV zx+QG(ra9ZG+)N9@6ul=d4r@aS7#EdWmy6q?%Iwsyl^!tREM*wicJtRetNKo7+r zK*K0LH~Z%FPh~x>i|@K(D{hz-TbBR?2Kc7r(+-CDALzwF+Xf1Z%OH3!o8WiGg}b*l z&-%aCydGENM#B}_uan=t?bBeb%o)gBJioMlf1VUmAdrEgq*OZmE}oTkl%b$r@wur@ z>E{Q#nSqGdL+!~&zv>k%1R`)nOJ}hTt4sW63F=-p!f|P;tY2GbmwH|BlCW}#K4{lS z{@xcG3?5@DnvxRVen69TsxS2_K_z5PVG#f*$AZ5na=ZHeFt=}feJW>wke-y;8Tjl@ zMTHBt^3fDarkwtDCh*Fe|4OHX9kwy1`DuT+^7lVG7+bl++5nqasBJQ4LhejyS?ij{ z*Iq59xxKz*)5959Q4?e&Hj7Ut{`s8PSFb zgJ#QKMm-#*OvLC>A0u~jTieT6vXp4lvq!GCjisW2S#}%W>LhE!5ls_fq!aOJry~R+ zdI25xFv5XYj7jp{yEHWHAx#Yc$pvoL+Gk7!;Zjjw^4-7yTmk}1m1LZ4 z%4m4RcZr*Ev9Uxma`mx;^?CX!ns##kwF4*=T!OE+E4^I7KBe;{pwDNnI(~4dJY8dN z*D3I+%UDdyXh%FsgR`H>1;qzvMtMonmX9-b9C-{$V9b2GLnA}}dzIc@2S(!K6})zJF{BSo6ngTe(sX|uNCL+d})^DpBMGN?;mfT zESiqO*DQIwT+xnjDOX4w`{AbeapCDSHSmQhZl=Y z)vo`&Apd#(WJSscmr4hT1zI?UUlQw8x*^IyYnybuoi?Ls-~Owqsoz&bzJ7CeL6^dn znB;UmmUJ8SZxVEm1QfpwDY%3kldW&H{@XOa_ivN-hDn1H2i3pTz8(HW|7ZOwX_wVP zyR|QS71Vy6+jG%VdHi|8^LGt4EYe=pZ>ji0%C9OnTrV1)w;lD=j-DTFS#s+Be{HFX zD33Wg&uaCYJ9hemzKJuZ?DmFTx@EeDHtK&M>|V}*tmBk*=m!^mCZTH9`K==b@^Ys{ zJl3#O2$>w@VtgdOoptfQ?>op{esyexkpT3;(uZb4t=~|uyF7dnnVVFRL2$1)-({fs zOrEV|s8X4|%E@NCDR;n*CPOa9VSmwlx6o`CGl}i{WVg#6Y*IDL7#AKW+?tZ<&%>EjNrT^(v~hBEA3rxQwm(kp zp8xH}#;O1fPHNcC`W@e;R|jjvSlhFiXuW4*7oNP^ z%+uPSAx$n|)M>Wc@4QslakXEHb(`q2j07gVKrt5m=_+bH zI|B})l3C-se?^`hZ8z>(>1`%!rWG)kXyHgVRnX*KI5k2|4bP6vee9B(u=w|J*70S_ z)?;l9zfP^v4XzPnq_b_dy5PD>S0mD^=I)|(wKBUT6UbrN7m8xC580UL4r`i)byZ)G z9FHn{Sp49PA(wW@ux;5>hgCMo&1!Vj40~PqM&Ew+N?oaFi_Uee(I05e19S;S9sYd7)VU8Pyo$zxAr=p4b3;qJ|5+>*lcCm2 zDNf`F8y=nv|i*(J}*BiAt`U=`tc zcEvW|J?}zuU6L{*Z!taMF1r~f=`%Yda_vaijJ8x*)|FcL84dsKcs;J8JUYLZGK?;gk888u&fJ`9*U^LoMWlB@` z0)?g#knAZ)^+~b-k}yD+M86oc_;uau1!xq(eUoBW$NhJyRmGv-+R&e&^Pz%fDp|I_ddB>BORp+u;vdhCH5=M&z2-f#**o zIY0(wole(^?bzc%VPXn%TYhanb;yFC$M)EJV2|y&KhMxz10OSMpNW}v$kj82EaUL1 zYX{-I0+3&xQBegUyPE2pI|J{WHi^Daep2Gg;2hjxM~lsA32x4>c1(;78oHw^PeW$D zo|pMeJawEF;(9oD%un)1KX1i&sj&0I$_wgTj3U&vX(p^Mwb4M@rI_Kol9PH^fMkkwU;GPV_Jzk zKT~FwKK__J?3Q!z`{_MZ4K_2^54g9tja6@-SDk!N|LTMIW7Rb6D5(Y+ZRacX3USl2 zJa_dQnW%~r=X}1E$Q4F#FC0&u>d(@@x4`=EO(^tS=zDk47ljw)-o;Kc=y&q5d-3oWS8$ zEHO8%9+02vMT7pFDJ^h_`kAeuAb41wsb1wtY{i>J`GTJh!^@=gICN>&`3WlrgJ_Y_ zbnFa(4OD<@bt!#OnWbT_L7}kg-D>0e`^1);IS+Nr+O+Y~xWnLKW4*MVF(-qFz)5{aQ#F_@$G#;^{jb(g7xh@ z7uC$O8>&v@y97G~8$2BEM11=9lOP?hiZ1g?=H$T_0ZS&8-UHToCl{pM1a3^~3zHU2~w<`Cc;4Ob=Gl`TWXKM7r6V zGweAfa&n*j+gH~!+EN)KWR_p5wrJof`56B$_0&L#-h|n5(-J{?YZiy{zrtTi7#P*K zzOZl^1*-2{M^{Pr`o*#vU$*GJHh6Qn@>J8K1kb7StkoO2%0dLp)+oD8<#6gK)8v@= zc^&ZkAq#%|!;WQFUUgJ+D{C^i(=}@{^z7Wg&rJPoXP*_ke5A|ib(uQTr?JL$?(d~& zOdIGIJQaqWEd;Lr@;7$Yz97JWb=qUR#?7*_mHHOWNqgpM_hx?8y2)ccAxjz_IWP&_ z)Z6N|iwG8^qB3}3xfG3&YOvByzsXhAXk7F2-&lev?e-vrwiOC!w4kpdBTLEZgS7^z zO9Uq6L>tBKj6{m;j`5L_F4C8VEKsD(qRzt9!4Z^<(`t&cvbzET)}8>9stl-zFc50w6+h zw0!ub3O}|$OW9!1KLBH40$hY<{n95gJ`;FbApQ|3raW#Ah7UMb#cj{Be6G(piD>OXF0-hpkR)yz7R#5qbajb1$^BKEvhAi*H*tk2KED?GiN*%v+)tNPOgg ztF|uklmwR3pjp^;$~IfFd4*90dOe}2db{A%faAGRI*IZN0)mXTGDY#BYR4ovJM`DQ zwVnb*PrApre*>s-a6c%G&<>g1zHtW+M02MV($udvCK^lR1w8Q=g-Gg*`oF6Q*zk<3 z^}DgU<3<&8tNzWC9MAAUU-GX2ktVac05v)K*dhcMSn(TvfKYyVOq|#755R3q1_g+f z1+6NmpI&smObA0#BNzxYdi zJI0T%1$R9HBif2df3%=FFU?R^RD;#PfqMx2q@EkJ-3{` ziP2B2W_y`gy5p4nXPrl`G`c5HjSP?u%Cuu)q;WB_T;_M!_b9%B#*^Xe&UfO-?o0i$ zDPLz-?fH9Kvn|x|cAuSd*U(TvI3@g8g8MK%^B+;VlB>C;bJQbR;U0F8z>7olX{>B? z^vzowsymp!<_|+mjG*k2|89b$4T4b$RKW_nuW!%Wma=0|#^epX<;l>tXFA_RmztzP zuIf_Vc z#4h0(Y(1e}-Bnhc~$74ai6YW)RF^jpVGFYQt2<8p5(j0MZzP2r7lJMCimMXuCCQ z{VUNmi^Q4({0#ghQE-thTsQZ|ds(i!UVCrp9kx})NK|vR0R>D! zSxOh@hphYvpc( ztf40DSga*VruF`w%h@rN7`oZ}iQtDNx_g}e!uz3JZolK*6T)SArd2#6+1L2RTwca| zHPM&R-{{F3Dpo!&C?E|BK`#rChrwc3lbAZJVpG5ksgyF(`Ne~P>clGIsj)Ru=z*;y zY1tjEEgd}C?(CtZ$D3pOXu_Wo1;BlY2%PdH2Y237ro)ao-|Ne->7%?bp04AFbBN^a z;EF)VBJA2HV*49>woY@!xwDq4ciMN6%VP6ub7ZPoZR&u0eFf&D%OhTqRxD}mBaBv|&riDA zgr-8vOUdl@#fx9f$I()JnK1%l17)f^Y$-S_u5Nn;BsOaRR&!{!=(5T(oKBZarBZDV zqw9?EdMbwPG_Fw(Fn0pcVHKhgfPX4tHWrsw;8Hg2hOtKIM}y$8b}v_VaVPPB30z7i z#X?`0lQkNgy_C3kIbi_64}B8Pl@(p`e&=l0bLQM)7H6Rx80q}FvxDENJG^$}4|JWX z;ZN@jOu8ss5IC+U@iI4RoKwd4ug?6FH=Z}kH_|vND(LuQS#L`DHC4I#1_skuY09=` z?vCYwSF)|y8}#1LWtJOA@sw>iUS=Y$+@#LW?@m`mH?@;CrRLC6{`4RVJww>dP%7Xt z8?p*Z!5i->=VhNN$vtLgvyb=)>2VR@>Jdn{5cv{K7$B3E2fc=6V!taj`xkjuRw}zg z|6nz?H#pYB6_7^cj;3J$m}zT5M5Rs4H?T8c67mZ0a-s@Gq)U9jGg=45IY~wr6@i|u zB;kO!5n+>1WQ>YT28wd5y1{|RZ%YwRZlauro_T$oQZ>+&9lnYE8!@B+#=8;O*vd1T zIh<$J2Nf?opIWzr2L)WFs4WyxPP`b|`tLa}Ao?Tl;?^s=BqJwhpmM7!e5IT_;G+*V zuSX^UQzc#^k_J))HS#hh`k!{!aO;{u@kkYkn(JKbmdAZmy?&a4IIen1n-!fd@&-*V zN!0w&$DD%<2#P zWOKo-NC~a*VW5B?P($6)H>;L-&fevTc*WtNK-Lc7=G+Oz)_ zn_0IDKMio;kDktX4rBhJ01dpxWGxIkLRK$$&N|VvZY{Z2$P8HByg^A^j(Vna{}?ET znSM3>a7;&*fw2Yr>$2X)$e3lw%e0<~->=C)l@T=sEPyWJQw!fZ*f(M_zj}LisSA5$ zV2o**h7VUxoL=@mkrsxZuzPREQL!#s*PukxwW+6tJ+I`BXf z3xMc5k)aBW6#7@epLfLD2bH40lWhef9m$jlOB&jxSW)1RL6pr9`7y!LV5UK(q57}u zkDa0V3o@>D$*mvvEbfWj50o!GF6r5^y_%yn;>mgG+S&;_<&tl=d^K-fi$ViBULmJ8 zKb+|X0w6;f%Bz?0m%Er2qqzZ&nRZU;!r2W)QvbA_g$`VjL1LI3#WZ!xlqvR5xkvo9 zEwbk8rl|BGkmt6_^RlrrO6U%Ld&U-KsLvWtswa@$Sik2#Myg9(r08h22vv2#hO#k4 zK&HJoXVsTnyXSjY*>0I`4Ks1}F#eotyW*!l!>gn!?!4=%PtPTWf{{?B%uck6XgA7C z^i|tdgnjtsYhQCamQk@j&m6~AJOx^V_0uEEX%|P+U%ap_N@!GgvNjTDDLH)wT;k~} zmCd1rMHo!4>hs+sODLF>xeGBv?n>gRM^eoV3Uub#Yuj1t^9ZD$95s4e?O3>50CNIY z+8{^v;-b)o`wrcHPdm+5H+kEtW}l`V5Sn8yx%??8+Jkba9&KM8c>bizvH_b3T7%IB zKaPfpYx&%?z}Cl4Mn0&tj}AQHE%laXdn7Lu$jT6S@S8Htw2gLryIP2_dLZ3gjaJ}I zVFUToCW?~U@=dgM`jXJ67R%HEt)(uo1$?6|j{Q~r^ttee03#itiJ%ZPu(<i`10Sz0&W|TeyCfoSt^Ra>$14-5)+(%P`DC`MPIfgC5sitf~GMF_vq_5|*3# z?mPl#9y4Xr3BeG@yAT^7YKNd_Aep*mDrMj=GqGAid3Pbf6yOXq7}O^RCq|+mD79nE zxSQw5$E*F(=9YVrodj>8B6y({CBe;Vd+PlbV+n3NTC4|c=ag*xIMZzYj9L@VKh3R3 ztt$U2i>(I&gn@UY-C>%4I(}zCdUZ0=JD5c3)$ElBE zL?_hULID!P;>AStDzrHvZe^-KN#{UxQK-6{a7tx%c%=69N?ccuWcZ$M;Kb}k&n)IV zvOPtn&GaN-4eoY)M5HG6wFHaT9r5fzXQ*$k!TVeBVbVEBG?jHRMwwL%;T zs}Rzn$7)>qK_PhzB_(K~^3dEdHg-T*I_jl;V%dBL6)M_ECX#^0={u>1sg9Qp&8pA- ze&YE3?`q!Lwi$vrVYtH>ftV4^d&e8OCV-|PVvx0GM|&|xyECon;=txdZ-&ZD)%Qkz zExxT0o0SWuW7(bUI&Vb0T7Und2{~)DHMiNHm)!mts!BMHR}5Z`){EeMYsDNbqdU7eV z<-Mso^fCuI|EP^U{*zWHoFfy zoUSy~-eg?*zA9yC7X4UC;hpA~DO@PbV)&9SiCb*CWg4OufXM;EfN<)SbpZZdz=BAD zdZ8?5hS~jrsr8o_9UI1mkt6#xzxofDz|V|Cn2tU7gt!k+al4hMei_pwLX2fZKMJ}! z6VDy_`ydX5Lm=ID9TFRW6jDyKQpHpC2Nr?=qIz%+3R26UJV!*g_T?XckX=u_hmq!V z5WEZ&?W}AIPPRpYu$r}4bhGZ^xgs-1kuxV&Z+C3*pKQ&5=o1lDd?)?*qWpmR4AWlc z8kx!YQwmpezelNwuxz4BN zw2O_LEdyGK2|%7d;-XiDVmsi0|AZoPI!7Nxle5#xUi@&Vt`T=Yvwc?E_r*Qo#7 zS;3t*XnrczK_4VI1F36CUQMbavu%qakR7ascZpN;2muEIB%RweR`f`4?=wTUm|uvVr9V71wn8)YaDj9=%(r3cf=1v$6Z&b(TK_t zk~yoOVPsH`@H$fMH25ekeFFEZxt#W3*tTftKf6qr--3d)j9_gJ`&=?Pa z5}3D}$}M&q)3cu-lz&Q=SHsJxcvzw_#q&yF8iiK*iVg|OI#Ty85ul9d3|N0A%u zVV$v^k{Y=Z*9u}<5VSLs3k&&a#HOT^yNs}gd*<8OpK0~RB3}ve24CiG=tfXS z#JBB}ER)_abunUa_sxQ49s$%K5JLQLg^W6-YO)K=@re zVP_ZW7b852eQT8|0C@2ajBP##fWL&H2N5p>MUYsDYR>efD(~PSy?2z1Rtq1-P%!~? z!Dv@}svHnz0uT%1k(QNn++2z+Oq^cOj#>v+qNHVdlPhut5gLJ+0EHriqBwA9mINRG zI3FY`p-&-7ltm~MluS5B$#RyH({NrBIQSL9A$|~&L@`PWBqtYN>C_THmB##6#{4H! z7j}9v{$YE0;Ntp$(8y})&94O!zhbWqJB?tyaJh^T>3ieF7Vdem0-@rirKv_dC5D15 zC%ac1y0wMDW8cy@3MVJVrle^TR07kYgvmhZ*tswH!rZw zJuF8{<&oA8{#e%zU315YozaXXL*lwQi6XCqgL-=V9db^3T-oh;{t%6pPjRu(n%Qam zfw%T9FBQ{GOj_w+SI_9sp1*#(`=Zvy6sEj+>x$MStyXOP93Y19 zTR}%B0(SGdkGV-+@jv*7#ds{5u-Qwg%MNgu4qv&OQssDJ$FcAEql>i)yM1rk9=Y#c zl;l)mA;h;~nn@p5CUUjXyY*Vb!Mww1Z=?DG{JPd~U-WO=+vaU?C)>03Kw62a4d3x? zwmnzdrQ*Y^jtdQiJ2vk{+lj7>HPLcAaJ zK6jpK%TQ%AilXUWTX~Uzaq3Slo5#CNy=5v2lH=bW-^}bv9AXHeTfcWti-O6=18RPG zTzfV;Q-<$e$BC-Z%!*FafMyhG@f*AH$TR&?`)s9wKUMhf7GxvXYY611wYWX0Q zosaU_MvL5+^R}U*`FdIHMv+b@1@p&ix!U+ybd3#v-YJbT-`?T*xHA9GHTUfO??+Xa z+je)mw%-x|HQA9P=riLgpxXB3QoG;_kL7XgIqUj1hp%U?D>k!QNcd3mFlQnUaC<-i zW_Ja=AG*=7LW-}&SHSa(a7BT*@1X2MMpr7aVvMpEyl|d z4&CLW4AudGO`3e^=d}A*C8dNsS*Daf&7Q?1**GeH_b|;`fbTS|EQjgKCx>=1cA+XCg4H{gnS71XPEQp&uHJ#`n5opUs4rT|A*zuW+vD4gxrKo_Z*TLVG)1^iO`J0qDwJa%+<)_VY`e#ORde<6T01Wmqqwp& zjyKgVmoc#OXw!6P#dfQ(AK#9j`pwW>7wz{6EXF#9C3wgNvBS7ud7Xo$&pM}ffPcE zO{4$BvW~*L+k?UaL<+*wPNBtteBL_tev9n2J8UA9mY>_)Y4kU+)?DDO# zJLFzkZ5w~zvz?+>E;#kmynuHnz8KONw1p~z zy68S#&ZVRE3Z~Q1V#k*{+~t*j!b?w!>?)76QKl;l*i-*-Y2Md@d4{5spYp1`nr*ac z3@q$?x->qUtiyt?w7>|)7c}GU+Y}RrU$v16uk(@)v2AB+sQc3Aj2dco==(J+yf;(x zDK(v^pIoj~@gMA`yXKnAj}{?}+Z3HZBpv^-ZZIh}$tXpuk19Pb(F{rp5CWmG*%?2fSn&2q}*b64%gQ(co%Y%ZJQY>lt=cvuNe zykBggVi+bjn9_5y{}Sx!>pF;hW38hhBfmP&V;Iaf@la;hNZ*g~4;7 z_VRwY!!c|vf37?|@b7ob*x|DkU@PWAN$Qqj`{l&``bDf> zZReDheP`?Q+0M1EEj6IIGFzTK;DqH&N+<7x#+gscy&u{ijtNe!j*A#@a-3>4x8U)l z_a9^#YH@nZXxm_rh#EhuJWt-zVAZf@nQ6ru$1ju1r?lCdE;{aeq#((;H(bD(MvJ6w zJ>!y6YF5kRtv&Ctik=prxb?BEdty|aR>L%RzVHQ?_;7|3ftnhEi>J(&<=Z5$-7Wvd zc1E6C^8PAet5bVbXgBIt{c~4(>h{aG1J$_G$FD6ofoIa`^yekCx$LWs{5A(lYr@LY z5?amQOy&)Wz~pAZLFdrMhhx+ey-_AYDb- z%l~Uj!*$JZaz6Eb+E@W%GCWBk&pcY#!Jw)gsAp{9ibPpWQNh@rijLjM z@Jh*PrW%}8La*$$a@-r6J9B1G>QZP{x>2d9jebX?w+jB2fYU@XXG^A zwQ^bU=4QB$Qv>5Od{&|pFFsU8W@cGTcAK~M{K?4F%&ME;^--&jD(2MD$=o^oboi0a zoh(_-@u8SkS$V~R-Y2X&_DpEB`EAU+ybwJrysfC;_uk}wi|I^C+NW)gjmDL_b6Tx4 z{&E^3F$Z2KWoJ{}u36bhjg|KsGK$l?e1EL=-XMErW?dqcZsEVha^Hj($KIjLvmwI2 zo^-k=&8#0Z9z5{X>tW`Cj_lRUvwsIXZq(Z2HFr20{0p_(aWVM$-PJlBPrr)OCK6`Z zdUITas_6n7JyzZ5S3Fs`UrqS>&!rz|)9;J8i< z>$LaJ-l>w@4-K#4WORmaP-jKnp9zlVo9<3@w+Ic8c1&Qq^TKa!Vr19F zx*S=Lu%TtTBV84&ZT#zGb$+S$2!y`7|8#h+(`jW}nH4qJ%xU?QHSy|=y)E?s-IjA>`Aiw#GF!LQ{2D71nnMOlRqaeS8GJqTCQy$ zQ%Ui$@K1hwbZx*Xj-Ho_Det|{7S7zeDZ*Sw1za99XmgFW4+!w}EeaR?v?=@o;D^UA zy`jb;n+;x?wfDU0m|yYg>SWdm=9zcj1x^m!NU}7Nar?;mYr>4u?&~RUs`}3J>`bDF zh}y(ji=2;BW5JVSnmaVFd~_M{Y^qP1j2Pb!fQwe8EKlJBoi4#61Jlrt6zZ2&A1@s& zzS3D!uTT9L_R2i_I<3j|*|rUf2|4#&+%Smn@7@{%tbs1t zgXl;&-adRU*V~_FQW7@Zz7c1$$kkB4NH0gOniCG&nrBLKJG0oNF}r4^w#}8;YPOHu zJE&@H|K#v8XmSLhjTt<8p}mvu)mslC;$~Bhn*V*eS<FOdF zL^4`JUoFc=2UY~cObF}>-cgCJ5Y!^fFFZd^_bB+Q0nO0NTMukS%V6j+nV{s$aV2 zQ#V00OND!h4_xjBo$HK+O6pr7ZIHS6knK*!(wTmKOHjls6R~1)56#jIgaYY z9&!X0gy7%XXSEee=RDE22pzqx_NvD$~ZC?eG4T;S`2nknX!;xF&hf2I`@N&KmlWS~mDCq(C8Y=ti^B%W-bPb0y=d*p&ZN_9n&=X zv|m4IywhKtvL7CJa5>R$bXz=H!Dti%`KSxo&iBL&2ev{qF^y|G(wngESL+2+ z+5jr9j@WTm|4Wm?$!$JePPByW7xn}(^|sV)=et`NBY*ALmszldE;jAdSVp9?CqHfM zk?=5RyB5v#d4*zW;=7K|kBilHJNli%q3*3!Y)-vX=q>bKTbgKiB8aVeJb`f^cS5a` z;?c@Rneynm^B?Z+H}G5@6mh}!4J5_Z0s$0`M*qcr!B^1{W)eI5dEG1oqege^@NEHD z;}X8{VkD;CtcktErDF@3#n}5nBQ0ZZuE?$jH@M9vPK|87%XZjL|H9~%>|Z{s`Y25k z=C;dGY*#Hs`=}G^OnNPZdw94(b3re-5UPNmHegm!iGrN?cQ}Ik+t}fq@a-4r2w@aP zbeS^Wjj##^2#4*kESLymPK=aT{0K-<@tFH-Nc8ABc80#jQ_Y z$$YinSh3+q`jCVwH9E6$!?r3{bQg$l`UiaF&_R$j{$*@4)$##t8HhJ6fj^82ejW+u ztu0{>2!RMK-$q2BYuAkb#C$NF2;85)t7Thu+SF(*zu57F#JD&r#-q&RI(z{WE=ddWKb!mSs2J_IH>$Q{XYQnh zp|>r+KcAohjAU{r!k86}3Duw??6T$`#Mz5Ht4{pcGAvpA)bFE*5cSOT2a3C%)n zwl6?)*C4D>vu%8Q*R**Hb^QBl-0&x@j1oz1R!I)e$Cvt7D)A)l9Hgh!gePkz<_w@q zTl}TqWK!O7#z3sFyBG{W;<|u)H=5#{^?9&-5iQm!kGt))Iw9h7OL$zY!*2EByT(Z^ z!L)=1g|*WXjLG|%cm22?5rWVY`*ZiS>hUjJ1f+nL?qdo9v*v|2MC@p-P=yT`PZfP| z+NgprNjYVpQ2o`Gjj~FLQzNyEnG7%94xf9!p}4Q=VZyfKUEWa@lFKi5njA8o=QU$i zIwrf{e>Ak8i}mb`3B!q^f#Mv`jtYhCMLm<4D3TTsTI(UBrGU(UEmXOBK25P=RMq^) zb#-H^+1#$%?Y5znNqUz$c6n&`#%ErT&{&XY?{|{R&3f_9OU~)X#(~afiHCzG^@`T91Me=kyG+O1>k7By*6thuypO19gJ0s1pUUM(R*I~Q+CXctPe5UoZ*dCS|J!4r#zzw% zscTroc}x=TUEbVWcU1Wsjv;7IFBLz1pP7HFj1ZPUuGUS8iAd<*YvA# z^ry`BMuIzmlSL7CF!2kM+uC(ey`l+EATc=y;qFQ>NUs1~ad5DuXbSqkF}m*fx)deCL>!Yu%C z(%OlYD_KIx5bweu6yob!ar_b4&}xrI=O#~>CTz9}Q^Ji}jr5Ki=$x9m404|WD z7elzqkOCw~Aeag2)~FN%|3q-#kBL&jkwzLqsR0E30K6N)3u35Qy5=KG9*3}Mg?#$XR7vae=XqB z4w%fY$*{b;KRZ20=7R1mK%hop8W0t$K-Lq(H4a5P`oPSCK)Hwz20gQ=9~UOd@Do&p zFdo7Ig0eWAVg$ns>AilwDF+DXf*8vqpn&k6Ni!AN(k!0_fPUb|V_LR~Qe~Mwy(F-7 z{?AGBq^txQ!x^hRhS6qE2FeJKWul9x3~w~6UXWNxKfTY(V*GKnNF^Dz1Ms>k_D~0A zQHGlnUIP>OKb%#%?XmKDcy)M6c;@f(-S%%dU$vwGFVqRzh9;_6$lHkL&!+`S6zX|I zfEu$19zY`*Fxnztj!^~#)68qm3}g8$XQU$rKo@tl?$cnQfARO*u_?4N8_}YU*-J2* zuvc-fm5hT#D`{EFMiSCAxn|rl6g7mQXF#d0@ zgDByJv3DArx~E@l!(9_uw|MW*HdDEaGfHs8VuhBwrRz!XHK9%FuC?*>Z)+jo|G